CCNP ISCW www.itttc.net A+ 220-601 ﻪﻣﺎﻧﺮ ﺷزﻮﻣﺑﻲ دﺎﻬﻨﺸﻴﭘآي

Network+ 2009 (N10-004)

CCNA 640-802 (R & S)

CCNP MCSA MCITP MCITP 4 Classes MCSE Enterprise MCSE Administrator Administrator Security ITTTC 70-620 ITTTC BSCI (642-901) CWNA 70-640 70-640 Cisco VoIP CCNA ONT (642-845) 70-270 640-721 70-642 70-642 640-460 Security ISCW (642-825) 70-290 70-646 70-643 640-553 BCMSN (642-812) 70-291 CCNA 70-647 CCNA Voice Security+ Wireless

70-293 MCITP 70-294 MCITP Enterprise 70-298 Database Messaging Administrator Administrator CCVP CCSP 70-350 5 Classes 5 Classes 70-431 70-236 70-443 70-237 70-444 70-238

www.itttc.net www.itttc.net CompTIA

A+ Essentials Network+ 2007 Security+ 2007

www.itttc.net www.itttc.net CompTIA 220-601 A+ Essentials

Chapter-1 Personal Computer Components Chapter-6 Security

1.1 PC Components Part I 6.1 Security Part I 1.2 PC Components Part II 6.2 Security Part II 1.3 PC Components Part III 6.3 Install & Configure & Upgrade and Optimize Security 1.4 Install, Configure & Optimize PC Components Part I 6.4 Preventative Maintenance for Computer Security 1.5 Install, Configure & Optimize PC Components Part II 1.6 Identify Tools and Diagnostics for PC Components Part I Chapter-7 Safety and Environmental Issues 1.7 Identify Tools and Diagnostics for PC Components Part II

1.8 Performing Preventive Maintenance on PCs 7.1 Perform Preventative Maintenance for Computer Security Chapter-2 Laptops and Portable Devices 7.2 Hazards & Safety Procedures 7.3 Identify Disposal Procedures 2.1 Principals of Laptops and Desktop Devices 2.2 Upgrade and Optimize Laptops and Portable Devices Chapter-8 Professionalism and Communication 2.3 Identify Tools and Diagnostic Procedures

2.4 Preventative Maintenance for Laptops and Portable 8.1 Use Good Communication Skills Devices 8.2 Use Appropriate Job-Related Behavior

Chapter-3 Operating Systems Appendix-A New Technologies

3.1 Operating Systems Fundamentals Animations 3.2 Installing and Configuring Operating Systems

3.3 Troubleshooting Operating Systems Part I A1 Public Key Encryption 3.4 Troubleshooting Operating Systems Part II A2 IP Addressing & Classes 3.5 Preventative Operating System Maintenance A3 Wireless LANs A4 Fiber Optic Cabling Chapter-4 Printers and Scanners A5 Disk Mirroring, Duplexing & Stripping

4.1 Printer Technologies Wireless Technologies 4.2 Scanners and Communication Types 4.3 Installing & configuring & upgrading printers and scanners A6 Wireless Networking Organizations 4.4 Troubleshooting Printers and Scanners A7 WiMax Overview A8 802.11n Overview Chapter-5 Networks A9 D-Link WLAN Products A10 Linksys WLAN Products 5.1 Networking Fundamentals Part I A11 WLAN Security Protocols 5.2 Networking Fundamentals Part II 5.3 Install & configure & optimize and upgrade networks 5.4 Troubleshooting Networks

www.itttc.net Appendix-B Networking Topics Ultimate Lessons & Labs

B1 Internetworking Overview Lab 3.1 Windows Vista Overview B2 OSI Model Lab 3.2 Getting Around Windows Vista B3 Ethernet Networks Lab 3.3 Installing Windows Vista Ultimate Edition B4 Ethernet Cabling Lab 3.4 , , Activation, Recycle Bin B5 Network Domains Lab 3.5 Taskbar & Start Menu & Overview B6 Ethernet Addressing Lab 3.6 Control Panel & B7 Cisco Routers Lab 3.7 Customizing Start Menu, Searching & Windows Gadgets Lab 3.8 Windows XP Labs A+ 220-601 Utilities CDs Lab 1.1 Installing Windows XP SP2 Lab 1.2 System Properties  Ebooks Lab 1.3 Printing  A+ 220-601 Exam Lab 1.4 Authentication  A+ Videos Lab 1.5 Display & Device Properties  VMWare Workstation Software Lab 1.6 Accessibility  VMWare Workstation Software Training in Farsi Lab 1.7 Screen Effects Lab 1.8 Display Resolution Lab 1.9 & Add Hardware Wizard Lab 1.10 Hardware Profiles Lab 1.11 Power Options Lab 1.12 TCP/IP Addressing & IPCONFIG Lab 1.13 & Restore Lab 1.14 & Safe Mode Lab 1.15 Performance Options &

Windows Server 2003 Labs

Lab 2.1 Installing Server 2003 Enterprise Edition Lab 2.2 MMC & Computer Management Console Lab 2.3 Disk Defragmenter Lab 2.4 Printing Lab 2.5 Compression & Encryption Lab 2.6 Automated System Recovery Lab 2.7 Device Manager, Hardware & Resources Lab 2.8 Automatic Updates

www.itttc.net CompTIA Network+ 2007

Chapter-1 Introduction to Networking Chapter-7 Survey of Network Operating Systems

1.1 What is a Network? 7.1 Network Operating Systems 1.2 Network Configuration Overview 7.2 UNIX 1.3 Network Components 7.3 Novel Netware Integration

Chapter-2 Network Communications & OSI Layers Chapter-8 Wide Area Networking

2.1 Network Communications & OSI Layers 8.1 Switching Methods 8.2 Cell Switching Chapter-3 Introduction to Server 2003 & TCP/IP 8.3 Using the Digital Telephone with ISDN 8.4 DSL 3.1 The Five Flavors of Server 2003 8.5 Cable Modem 3.2 Windows 2003 Networking Models 8.6 Using Fiber Optics with FDDI 3.3 Installation Types 8.7 Frame Relay 3.4 Network Addressing & TCP/IP 8.8 T-Carrier System 3.5 TCP/IP Addressing 8.9 SONET 3.6 TCP/IP Troubleshooting Tools 3.7 TCP/IP Subnetting Chapter-9 Network Services & Support 3.8 Network Traffic 3.9 Introduction to NAT 9.1 Name Resolution 3.10 Other TCP/IP Protocols 9.2 DHCP 9.3 WINS Chapter-4 Network Communication & Network 9.4 DNS Connectivity Devices 9.5 IP Configuration in Windows 9.6 Network Troubleshooting 4.1 Data Communication & Signals 4.2 Modems Chapter-10 Networking with Remote Clients & Servers & 4.3 Expanding a Network Using Components Network Security

Chapter-5 IEEE Standards, Physical Media, Wireless 10.1 Remote Node Technologies & Network Layout Design 10.2 Terminal Server 10.3 IPSec 5.1 IEEE Standards 10.4 VPN 5.2 Physical Media 10.5 Trust Relationships 5.3 Wireless Technologies 10.6 Firewalls 5.4 Network Layout Design Chapter-11 Network Configuration Chapter-6 Networking Architectures 11.1 VLAN 6.1 Networking Architectures (Ethernet) 11.2 Disaster Recovery 6.2 Token Ring Architecture 11.3 SOHO 6.3 AppleTalk & ArcNet www.itttc.net Chapter-12 IPv6 Overview & Cisco 3-Layer Hierarchy Chapter-18 WAN Overview, Frame Relay & ISDN

12.1 IPv6 Overview 18.1 WAN Overview 12.2 Cisco 3-Layer Hierarchy 18.2 Introduction to Frame Relay 12.3 Fast Switching vs. Process Switching 18.3 ISDN Overview 18.4 ISDN Types Cisco CCNA & Wireless LAN Topics 18.5 ISDN Functional Groups and Reference Points 18.6 ISDN Standards

Chapter-13 Introduction to Cisco Internetworking 18.7 ISDN & Cisco Routers

13.1 Internetworking Chapter-19 Introduction to Wireless LANs 13.2 OSI Model 13.3 Ethernet Networks 19.1 History of Wireless LANs 13.4 Ethernet Cabling 19.2 Today's Wireless LAN Standards 13.5 Network Domains 19.3 Applications of Wireless LANs 13.6 Ethernet Addressing 19.4 Wireless Networking Standards 13.7 Cisco 3-Layer Hierarchical Model 19.5 Radio Frequency Spectrum 13.8 Ethernet Framing 19.6 FHSS vs. DSSS

Chapter-14 IP Addressing, Subnetting, VLSM & NAT Windows XP Service Pack 2 Lessons

14.1 IP Addressing Overview 1. Hardware Requirements 14.2 Subnetting Overview 2. Simple File Sharing 14.3 VLSM Overview 3. User and Group Accounts 14.4 Network Address Translation 4. Configuring and Managing User Profiles 5. Hardware Chapter-15 Static vs. Dynamic Routing & RIP 6. Disk Storage 7. Configuring and Troubleshooting TCP/IP Part I 15.1 Distance Vector vs. Link State Routing 8. Windows XP Backup 15.2 RIP Windows Server 2003 Enterprise Lessons Chapter-16 Ethernet, Switch Function & Switch Types 1. Windows Server 2003 Networking Models 16.1 Ethernet Overview 2. Disk Types 16.2 Switch vs. Bridge 3. Using Saved Queries 16.3 Switch Function 4. Server 2003 Printing Terminology 16.4 Switch Function Example #1 5. Authentication 16.5 LAN Switch Types 6. Backup & Restore 7. Chapter-17 Introduction to STP & VLANs 8. Device Manager

17.1 Spanning Tree Protocols 17.2 Introduction to VLANs

www.itttc.net Windows Vista Lessons Networking Animations

1. Windows Vista Overview A1 Backbone & Segments 2. Getting Around Windows Vista A2 Bridges vs. Switches 3. Automated Help & Support A3 Physical Topologies 4. Customizing the Desktop & Interface A4 LANs, MANs & WANs 5. Installing and Maintaining Programs A5 Wireless LANs 6. Understanding User & Group Accounts A6 Fiber Optic Cabling 7. A7 Network Cables 8. Configuring User and Computer Policies A8 Mirror Volume A9 Public Key Encryption Introduction ISA Server 2004 Lessons A10 IP Spoofing A11 Proxy Server  ISA Server Capabilities & Operation A12 DMZ (Demiliterized Zone)  ISA Server 2004 vs. other Firewall Products A13 Access Control Lists  ISA Server 2004 Lab A14 PPTT/VPN Servers A15 IP Address Classes

Introduction to Cisco VoIP Lessons A16 Making a Patch Cable (Steps) A17 RJ-45, AUI, Patch Panel & CAT-5 A18 Cisco Three Layer Hierarchy & Cisco Products  Telephony Networks, Components & PSTN A19 OSI Model  PBX vs. Key Systems A20 OSI Layers  VoIP Network Components & Advantages A21 Checking Router Cabling A22 Cisco Routers A23 TCP/IP Windowing Cisco CCNA Router & Switch Labs A24 Layer-2 Switch Functionality A25 Layer-2 Switch Responsibilities CCNA-Lab-1 Basic Router Configuration CCNA-Lab-2 Routing in Two Subnets Packet Tracer Labs CCNA-Lab-3 Routing in Four Subnets CCNA-Lab-4 PC to PC Comm. using Cisco 2950 Switch P1 PC to PC Communication CCNA-Lab-5 Configuring Cisco Discovery Protocol P2 Single Device: Hub CCNA-Lab-6 LAN Switching using Two Cisco 2950 Switches P3 Single Device: Switch P4 Single Device: Router P5 Multiple Devices: Multiple Hubs P6 Multiple Devices: Multiple Switches P7 Multiple Devices: Multiple Routers P8 Mixed Environement (Hubs, Switches, Routers)

www.itttc.net Windows XP Labs Network+ 2007 Utilities CD

XP-1 Installing Windows XP SP2  E-books XP-2 System Properties  Packet Tracer XP-3 Printing  NetSIM XP-4 Authentication  Subnet XP-5 Display & Device Properties  Wildcard Calculator XP-6 Accessibility  Network+ Exam XP-7 Screen Effects  VMWare Workstation Software XP-8 Display Resolution  VMWare Workstation Software Training in Farsi XP-9 Device Manager & Add Hardware Wizard XP-10 Hardware Profiles

Windows Server 2003 Enterprise Labs

Server-1 Installing Server 2003 Server-2 APIA & IPCONFIG Server-3 Loopback Test & PING Server-4 Administrative Tools Server-5 Event Viewer Server-6 Service Console Server-7 System Properties Server-8 Network Connection Types

Windows Vista Ultimate Labs

Vista-1 Installing Windows Vista Ultimate Edition Vista-2 Taskbar & Start Menu Vista-3 Password Reset Disk Vista-4 System Startup and Recovery & System Configuration Vista-5 Taskbar & Start Menu & Control Panel Vista-6 Control Panel & Disk Cleanup Vista-7 Device Manager & Performance Options Vista-8 Local Area Connection Properties & TCP/IP Configuration

www.itttc.net CompTIA Security+

Chapter 1 General Networking and Security Concepts Chapter 6 Application Security

1.1 The Big Picture 6.1 E- Security 1.2 Identifying Threats 6.2 Web Security 1.3 Intrusion Points 6.3 File Transfer 1.4 Defending against Threats 1.5 Organizational and Operational Security Chapter 7 User Security

Chapter 2 TCP/IP Basics 7.1 Understanding Authentication 7.2 Understanding Access Control Models 2.1 TCP/IP Layers and Vulnerabilities Chapter 8 Security Baselines Chapter 3 Certificate Basics 8.1 Network Device and Operating System Hardening 2.1 Understanding & Using Cryptography 8.2 Server Application Hardening 2.2 Types of Protected Integrity 2.3 Identifying the components of a Public Key Infrastructure Chapter 9 Operational Security 2.4 Certificate Authorities 2.5 Understanding Certificate Life Cycle and Key 9.1 Physical Security Management 9.2 Privilege Management 2.6 Supplement #1 & Summary 9.3 Removable Media 9.4 Protecting Business Continuity Chapter 4 Network Infrastructure Security Chapter 10 Organizational Security 4.1 Securing Network Cabling 4.2 Securing Connectivity Devices 10.1 Documentation 4.3 Firewalls 10.2 Risk Assessment 4.4 Remote Access 10.3 Security Education 4.5 Telecommunications Hacking 4.6 Wireless Network Chapter 11 Incident Detection and Response 4.7 NAT 4.8 VLAN 11.1 Attacks and Malicious Code 4.9 Protecting Mobil Devices 11.2 Intrusion Detection Systems 4.10 Implementing IDS & using Honeypots and Honeynets 11.3 Incident Response

Chapter 5 Communications Security

5.1 Understanding Remote Access Connectivity 5.2 Providing Secure Remote Access 5.3 Understanding Wireless Standards and Protocols

www.itttc.net Appendix-A Security Topics & Security Tools  Robocopy.exe: Robust File Copy Utility  Rpcdump.exe: RPC Dump Cisco Security Topics Parts I, II, III  Sc.exe: Service Controller Tool  Sclist.exe  Cisco Router Passwords  Setspn.exe: Manipulate Service Principal Names for  Standard IP ACLs Accounts  Extended IP ACLs  Showacls.exe  Switch CAM Table  Showpriv.exe: Show Privilege  Static MAC Address  Shutdown.exe: Remote Shutdown  Port Security for 1900/2500 series switches  Srvany.exe: Applications as Services Utility  Cisco Discovery Protocol  Srvcheck.exe  CDP Commands  Srvinfo.exe  Su.exe Server 2003 Security Topics  Subinacl.exe  Uptime.exe  Server 2003 Security Lab  Vadump.exe: Virtual Address Dump  Whoami.exe Server 2003 Resource Kit Security Tools (37 Tools)  Xcacls.exe

 Auditpol.exe: Audit Policy Internet Top 75 Security Tools  Clearmem.exe: Clear Memory

 Drivers.exe: List Loaded Drivers  Nessus  Dsstore.exe: Directory Services Store  Ethereal  Dumpel.exe: Dump Event Log  Snort  Efsinfo.exe: Encrypting Information  Netcat  Findgrp.exe: Find Group  TCPDump/WinDump  Getmac.exe: GetMAC  Hping2  Getsid.exe  DSniff  Gettype.exe: Get Type Version Information  GFI LANguard  Ipsecpol.exe: Internet Protocol Security Policies Tool  Ettercap  Kerbtray.exe: Kerberos Tray  Whisker/LibWhisker  Klist.exe: Kerberos List  John the Ripper  Logoff.exe  OpenSSH / SSH  Ntrights.exe  Sam Spade  Pulist.exe  ISS Internet Scanner  Regback.exe: Registry Backup  Tripwire  Regdmp.exe  Nikto  Regfind.exe  Kismet  Regini.exe: Registry Change by Script  SuperScan  Regrest.exe: Registry Restoration  L0phtCrack 4  Retina www.itttc.net  Netfilter  Authentication Protocols  Fport  Encryption  SAINT   Network Stumbler  Security Under SP2  SARA  N-Stealth Appendix-C Server 2003 Security Topics  AirSnort  NBTScan  Security Framework  GnuPG /PGP  Segmenting Networks  Firewalk  Encryption Authentication  Cain & Abel  PKI  XProbe2  Auditing  SolarWinds Toolsets  IPSec  NGrep  Securing IIS Web Sites  Perl / Python  RRAS IAS  THC-Amap  Securing Wireless Networks  OpenSSL  NTop ISA Server Lab  Nemesis   LSOF ISA Server 2004 Overview Lab  Honeyd Appendix-D: Windows Vista Ultimate Security Topics  Achilles  Brutus  User & Security Groups  Stunnel  Local Logon  Paketoo Keiretsu  Stored Passwords  Fragroute  Managing Local User Accounts and Groups  Spike Proxy  Managing Remote Access to Workstations  THC-Hydra  File Security and Resource Sharing  ISA Server 2004 Overview Basic/Special Permissions  File Ownership/ Inheritance   ISA Server 2004 Capabilities Effective Permissions   ISA Server 2004 Operation Sharing Files & Folders over the Network  Public Folder Sharing

Appendix-B Windows XP SP2 Security Topics  Vista Networking Features  TCP/IP and Dual IP Stack  Authentication  Diagnosing and Resolving Problems  Security  Optimizing and Safeguarding Disk Drives  Data Compression  Windows Security Center Windows Firewall  Data Encryption  Windows Defender  Configuring & Troubleshooting TCP/IP  Automatic Updates  Task Manager  Reliability and www.itttc.net

11 Categories of Shareware Security Tools Security+ Utilities CD

 Crytp  E-books  Email Antispam  Freeware Security Tools  File Encryption  Windows Security Tools  File Wiping  VMWare Workstation Software  IP Address Tools  VMWare Workstation Software Training in Farsi  Network Info Tools  Security+ Exam  Network Monitoring  Networking Tools  Other Tools  Password Dictionaries  Personal Firewalls

Appendix-E WLAN Security Topics

 WLAN Security  WEP (Wired Equivalent Privacy)  Solutions to WEP Weaknesses  AES (Advanced Encryption Standard)  Filtering  Attacks on Wireless LANs  Emerging Security Solutions  Corporate Security Policy  Security Recommendations

www.itttc.net Microsoft

MCSA MCSE MCSE Security

www.itttc.net www.itttc.net MCSA / MCSE 70-270 Windows XP Professional SP2

Chapter-1 Installing and Deploying Windows XP 4.6 Multiple Language Support & Regional Options Professional 4.7 Files Settings and Transfer Wizard 4.8 Accessibility Options 4.9 Advanced Video Display Options 1.1 Hardware Requirements 4.10 Fax Features & Scheduled Tasks 1.2 Upgrading to Windows XP Professional 1.3 Installation Options for Windows XP Professional Chapter-5 Installing, Configuring, and 1.4 Joining a Workgroup or Domain 1.5 Using USMT and FAST Wizard Troubleshooting Hardware Devices and 1.6 Deploying Service Packs Drivers 1.7 Automatic and Dynamic Updates 1.8 Product Activation 5.1 Hardware 1.9 Troubleshooting Failed Installation 5.2 Device Drivers, Drive Signing & using Devices 5.3 Wireless Networking Support Chapter-2 Establishing, Configuring, and Managing 5.4 Video Display Resources 5.5 Removable Storage Support 5.6 Upgrading a System from One to Two Processors

2.1 Simple File Sharing 5.7 Mobile Computing 2.2 Shared Folders 5.8 Managing Hardware Profiles 2.3 Access to Files and Folders 5.9 Power Management Support 2.4 Managing and Troubleshooting Web Server Resources 5.10 Managing Card Services 2.5 Printing Concepts Chapter-6 Implementing, Managing, and Chapter-3 Setting Up, Managing, and Troubleshooting Disk Storage Troubleshooting Security Accounts and Policies 6.1 Disk Storage 6.2 Partitions vs. Volumes 3.1 User and Group Accounts 6.3 File Systems & Disk Quotas 3.2 Authentication 6.4 Data Compression & Encryption 3.3 Managing Domain User Accounts 3.4 GPO and RSoP Chapter-7 Implementing, Managing, and 3.5 Security Troubleshooting Network Protocols and Services Chapter-4 Implementing and Managing User and Desktop Settings 7.1 Configuring and Troubleshooting TCP/IP Part I 7.2 Configuring and Troubleshooting TCP/IP Part II 4.1 Configuring and Managing User Profiles 7.3 Novel Netware & UNIX Connectivity 4.2 Using Offline Files 7.4 Network Bridging 4.3 Configuring & Troubleshooting Desktop Settings 7.5 4.4 Troubleshooting and System Settings 7.6 Remote Desktop & Remote Assistance 4.5 Service

www.itttc.net Chapter-8 System Monitoring, Performance Chapter-3 Labs Optimization, and Recovery Features Lab 3.1 User and Group Accounts 8.1 Windows XP Backup Lab 3.2 Authentication 8.2 Volume Technology Lab 3.3 Managing Domain User Accounts 8.3 Troubleshooting and Repairing Windows XP Lab 3.4 GPO and RSoP Professional Systems Lab 3.5 Security 8.4 Measuring and Managing Performance 8.5 Task Manager & Monitoring Event Logs Chapter-4 Labs

Chapter-9 Installing, Administering, and Lab 4.1 Configuring and Managing User Profiles Troubleshooting Remote Access Services Lab 4.2 Using Offline Files Lab 4.3 Configuring & Troubleshooting Desktop Settings

9.1 Authentication Protocols Lab 4.6 Multiple Language Support & Regional Options 9.2 Encryption Lab 4.7 Files Settings and Transfer Wizard 9.3 Connecting to Remote Access Servers Lab 4.8 Accessibility Options 9.4 Configuring Windows Firewall Lab 4.9 Advanced Video Display Options 9.5 Configuring and Troubleshooting ICS 9.6 Security Under SP2 Chapter-5 Labs

Lab 5.1 Hardware Windows XP Professional SP2 Labs Lab 5.2 Device Drivers, Drive Signing & using Devices Lab 5.3 Wireless Networking Support Lab 5.4 Video Display Chapter-1 Labs Lab 5.8 Managing Hardware Profiles Lab 5.9 Power Management Support Lab 1.3 Installation Options for Windows XP Professional Lab 1.4 Joining a Workgroup or Domain Chapter-6 Labs Lab 1.5 Using USMT and FAST Wizard Lab 1.7 Automatic and Dynamic Updates Lab 6.1 Disk Storage

Chapter-2 Labs Lab 6.2 Partitions vs. Volumes Lab 6.3 File Systems & Disk Quotas Lab 6.4 Data Compression & Encryption Lab 2.1 Simple File Sharing Lab 2.2 Shared Folders Lab 2.3 Access to Files and Folders Chapter-7 Labs Lab 2.4 Managing and Troubleshooting Web Server Resources Lab 7.2 Configuring and Troubleshooting TCP/IP Part II Lab 2.5 Printing Concepts Lab 7.5 Windows Messenger Lab 7.6 Remote Desktop & Remote Assistance

www.itttc.net Chapter-8 Labs 70-270 Additional Features  E-book Lab 8.1 Windows XP Backup  70-270 Exam Lab 8.2 Volume Shadow Copy Technology  Tool: USMT 3.0 Lab 8.3 Troubleshooting and Repairing Windows XP Professional Systems ITTTC Utilities CD Lab 8.4 Measuring and Managing Performance Lab 8.5 Task Manager & Monitoring Event Logs  Windows Vista Ultimate Lessons and Lab  Chapter-9 Labs VMWare Workstation Software  VMWare Workstation Software Training in Farsi  Lab 9.1 Authentication Protocols Windows XP Service Pack 3 Information  Lab 9.2 Encryption Windows XP Animations Lab 9.3 Connecting to Remote Access Servers Lab 9.4 Configuring Windows Firewall Lab 9.5 Configuring and Troubleshooting ICS Lab 9.6 Security Under SP2

www.itttc.net www.itttc.net MCSA / MCSE 70-290 Server 2003 Environment Management and Maintenance

Chapter-1 Introduction to Windows Server 2003 & 4.9 Managing printing from the command line Chapter-5 Windows 2003 Security 1.1 Windows 2003 Networking Models 5.1 Authentication 1.2 Installation Types 5.2 Cryptography 1.3 What is a Directory? Active Directory 5.3 (EFS) 1.4 MMC 5.4 Security Configuration Tools 1.5 Administrating User Accounts 5.5 Auditing in Server 2003 1.6 Server 2003 Groups 1.7 User Profiles Chapter-6 & Managing Data 1.8 Account Policies Storage

Chapter-2 Server 2003 File System, Disks Shared 6.1 Backup & Restore Folders, NTFS Permissions 6.2 ASR 6.3 Shadow Copies of Shared Folders 2.1 Disk Types 6.4 NTFS Compression 2.2 Windows 2003 File Systems 6.5 Disk Quota 2.3 Using NTFS Mounted Drives 2.4 Shared Folders Chapter-7 Group Policy 2.5 NTFS Permissions

2.6 NTFS Partitions 7.1 What is Group Policy? 2.7 Disk Defragmenter 7.2 SW Deployment Methods using Group Policy 2.8 Disk Management Commands 7.3 RSoP (Resultant Set of Policy) 7.4 Group Policy Management Console (GPMC) Chapter-3 Active Directory Part II Chapter-8 Devices, Drivers, Automatic Updates & 3.1 Saved Queries Software Update Service 3.2 Active Directory Command Line Tools 3.3 Operations Master Roles 8.1 Device Manager 8.2 Driver Signing Chapter-4 Setting up and Configuring Printers in 8.3 System Update Features Server 2003 8.4 Software Update Services

4.1 Server 2003 Printing Terminology Chapter-9 Administrative Tools Remote Desktop & 4.2 Network Printing Requirements System Monitor Performance Logs & Alerts 4.3 Guidelines for Network Printing 4.4 Adding other types of printers 9.1 Server 2003 Tools 4.5 Internet Printing 9.2 Remote Connections 4.6 Configuring Network Printers 9.3 System Monitor & Performance Logs & Alerts 4.7 Print Spooler 9.4 Tuning System Performance 4.8 Printer Administration www.itttc.net Chapter-10 Domains/Forests Functional Levels & Chapter-3 Labs IIS 6.0 Lab 3.1 Saved Queries 10.1 Domain & Forest Functional Levels Lab 3.2 Active Directory Command Line Tools 10.2 IIS 6.0 Lab 3.3 Operations Master Roles 10.3 FTP Chapter-4 Labs Chapter-11 Terminal Services Lab 4.4 Adding other types of printers 11.1 Terminal Services Overview Lab 4.5 Internet Printing 11.2 Terminal Services Benefits Lab 4.6 Configuring Network Printers 11.3 Using Terminal Server to host applications centrally Lab 4.7 Print Spooler 11.4 Terminal Services Administrative Tools Lab 4.8 Printer Administration 11.5 Managing TS from the Command Line Lab 4.9 Managing printing from the command line 11.6 TS Client Overview 11.7 TS Client Features Chapter-5 Labs 11.8 TS Licensing Overview 11.9 TS Licensing Modes Lab 5.1 Authentication 11.10 TS Troubleshooting Lab 5.2 Cryptography Lab 5.3 Encrypting File System (EFS) 70-290 Server 2003 Environment Labs Lab 5.4 Security Configuration Tools Lab 5.5 Auditing in Server 2003 Chapter-1 Labs Chapter-6 Labs Lab 1.1 Windows 2003 Networking Models Lab 1.2 Installation Types Lab 6.1 Backup & Restore Lab 1.3 What is a Directory? Active Directory Lab 6.2 ASR Lab 1.4 MMC Lab 6.3 Shadow Copies of Shared Folders Lab 1.5 Administrating User Accounts Lab 6.4 NTFS Compression Lab 1.6 Server 2003 Groups Lab 6.5 Disk Quota Lab 1.7 User Profiles Lab 1.8 Account Policies Chapter-7 Labs

Chapter-2 Labs Lab 7.1 What is Group Policy? Lab 7.2 SW Deployment Methods using Group Policy Lab 7.3 RSoP (Resultant Set of Policy) Lab 2.1 Disk Types Lab 7.4 Group Policy Management Console (GPMC) Lab 2.3 Using NTFS Mounted Drives Lab 2.4 Shared Folders Lab 2.5 NTFS Permissions Lab 2.7 Disk Defragmenter Lab 2.8 Disk Management Commands

www.itttc.net Chapter-8 Labs 70-290 Additional Features  E-book Lab 8.1 Device Manager  70-290 Exam Lab 8.2 Driver Signing  Tools Lab 8.3 System Update Features Lab 8.4 Software Update Services ITTTC Utilities CD

Chapter-9 Labs  Windows Vista Ultimate Lessons and Lab  VMWare Workstation Software Lab 9.1 Server 2003 Tools  VMWare Workstation Software Training in Farsi Lab 9.2 Remote Connections  Windows XP Service Pack 3 Information Lab 9.3 System Monitor & Performance Logs & Alerts  Windows XP Animations Lab 9.4 Tuning System Performance

Chapter-10 Labs

Lab 10.1 Domain & Forest Functional Levels Lab 10.2 IIS 6.0 Lab 10.3 FTP

Chapter-11 Labs

Lab 11.3 Using Terminal Server to host applications centrally Lab 11.4 Terminal Services Administrative Tools Lab 11.5 Managing TS from the Command Line Lab 11.7 TS Client Features Lab 11.9 TS Licensing Modes

www.itttc.net www.itttc.net MCSA / MCSE 70-291 Server 2003 Network Infrastructure I

Chapter-1 Understanding Server 2003 Networks Chapter-7 Configuring DHCP Servers & Clients

1.1 Understanding Network Infrastructures 7.1 Introducing DHCP 1.2 Networking with Default Components in Server 2003 7.2 DHCP Terminology 1.3 Extending a Server 2003 Network Infrastructure 7.3 DHCP Options 7.4 DHCP Database Chapter-2 Understanding TCP/IP 7.5 Configuring DHCP Relay 7.6 Managing DHCP 2.1 Understanding TCP/IP 7.7 Managing DHCP Database 2.2 Understanding IP Addressing 7.8 DHCP Option Classes 2.3 Subnetting & Supernetting IP Networks 7.9 Configuring DHCP Servers to Perform DNS Updates 2.4 Installing & Configuring TCP/IP Chapter-8 Monitoring & Troubleshooting DHCP Chapter-3 Monitoring & Troubleshooting TCP/IP Connections 8.1 DHCP Messages 8.2 Monitoring DHCP Through Audit Logging 3.1 Analyzing Traffic using Network Monitor 8.3 DHCP Performance Monitoring 3.2 Troubleshooting TCP/IP Connections 8.4 Troubleshooting DHCP

Chapter-4 Configuring DNS Servers & Clients Chapter-9 Routing with Server 2003

4.1 Understanding Name Resolution in Server 2003 9.1 Configuring Windows Server 2003 for LAN Routing 4.2 Understanding DNS in Server 2003 Networks 9.2 Configuring RRAS 4.3 Deploying DNS Servers 9.3 Configuring Demand-Dial Routing 4.4 Deploying DNS Clients 9.4 Example of Configuring Demand-Dial Routing 9.5 Commands for RAS Chapter-5 Implementing a DNS Infrastructure 9.6 Configuring NAT Part 1 9.7 Configuring NAT Part 2 5.1 Configuring DNS Server Properties 9.8 Internet Connection Sharing 5.2 Configuring Zone Properties & Transfers 9.9 Configuring and Managing Routing Protocols 5.3 Configuring Advanced DNS Server Properties 9.10 RIP for IP Security 5.4 Creating Zone Delegations 9.11 Configuring RIP for IP Router 5.5 Deploying Stub Zones 9.12 OSPF 9.13 Configuring Packet Filters Chapter-6 Monitoring & Troubleshooting DNS Chapter-10 Configuring and Managing Remote Access 6.1 Using DNS Troubleshooting Tools 6.2 Using DNS Monitoring Tools 10.1 Configuring Remote Access Connections 10.2 Authorizing Remote Access Connections 10.3 Implementing VPNs 12.1 Introduction to IAS

www.itttc.net 10.4 Installing and Configuring the IAS Chapter-4 Labs 10.5 Configuring RRAS and IAS 10.6 Configuring IAS Lab 4.3 Deploying DNS Servers Lab 4.4 Deploying DNS Clients Chapter-11 Managing Network Security Chapter-5 Labs 11.1 Introduction to Security Protocols & Security Templates 11.2 IPSec and Levels of Security Lab 5.1 Configuring DNS Server Properties 11.3 IPSec Rules Lab 5.2 Configuring Zone Properties & Transfers 11.4 Checking IPSec Functionality Lab 5.3 Configuring Advanced DNS Server Properties 11.5 IPSec Security Protocols & Modes of Operation Lab 5.4 Creating Zone Delegations 11.6 IPSec Components Lab 5.5 Deploying Stub Zones 11.7 IPSec Phases of Operation 11.8 Description of IPSec Policy Chapter-6 Labs 11.9 IPSec Tools 11.10 Troubleshooting Network Protocol Security Lab 6.1 Using DNS Troubleshooting Tools Lab 6.2 Using DNS Monitoring Tools Chapter-12 Maintaining a Network Infrastructure Chapter-7 Labs 12.2 Monitoring Network Performance 12.3 Troubleshooting Internet Connectivity Lab 7.3 DHCP Options 12.4 Troubleshooting Server Services Lab 7.4 DHCP Database Lab 7.5 Configuring DHCP Relay 70-291 Server 2003 Network Infrastructure I Labs Lab 7.6 Managing DHCP Lab 7.7 Managing DHCP Database Lab 7.8 DHCP Option Classes Chapter-1 Labs Lab 7.9 Configuring DHCP Servers to Perform DNS Updates

Lab 1.2 Networking with Default Components in Server 2003 Chapter-8 Monitoring & Troubleshooting DHCP Lab 1.3 Extending a Server 2003 Network Infrastructure Lab 8.2 Monitoring DHCP Through Audit Logging Lab 8.3 DHCP Performance Monitoring Chapter-2 Labs Lab 8.4 Troubleshooting DHCP

Lab 2.3 Subnetting & Supernetting IP Networks Chapter-9 Routing with Server 2003 Lab 2.4 Installing & Configuring TCP/IP

Lab 9.2 Configuring RRAS Chapter-3 Labs Lab 9.3 Configuring Demand-Dial Routing Lab 9.5 NETSH Commands for RAS Lab 3.1 Analyzing Traffic using Network Monitor Lab 9.7 Configuring NAT Part 2 Lab 3.2 Troubleshooting TCP/IP Connections Lab 9.8 Internet Connection Sharing Lab 9.9 Configuring and Managing Routing Protocols Lab 9.11 Configuring RIP for IP Router Lab 9.13 Configuring Packet Filters

www.itttc.net Chapter-10 Configuring and Managing Remote Access 70-291 Additional Features  E-books & MOC Lab 10.1 Configuring Remote Access Connections  70-291 Exam Lab 10.2 Authorizing Remote Access Connections Lab 10.3 Implementing VPNs ITTTC Utilities CD Lab 10.6 Configuring RRAS and IAS  Lab 10.7 Configuring IAS Windows Vista Ultimate Lessons and Lab  VMWare Workstation Software  Chapter-11 Managing Network Security VMWare Workstation Software Training in Farsi  Windows XP Service Pack 3 Information

Lab 11.1 Introduction to Security Protocols & Security  Windows XP Animations Templates Lab 11.4 Checking IPSec Functionality Lab 11.6 IPSec Components Lab 11.9 IPSec Tools

Chapter-12 Maintaining a Network Infrastructure

Lab 12.1 Monitoring Network Performance Lab 12.2 Troubleshooting Internet Connectivity Lab 12.3 Troubleshooting Server Services

www.itttc.net www.itttc.net CompTIA Security+

Chapter 1 General Networking and Security Concepts Chapter 6 Application Security

1.1 The Big Picture 6.1 E-mail Security 1.2 Identifying Threats 6.2 Web Security 1.3 Intrusion Points 6.3 File Transfer 1.4 Defending against Threats 1.5 Organizational and Operational Security Chapter 7 User Security

Chapter 2 TCP/IP Basics 7.1 Understanding Authentication 7.2 Understanding Access Control Models 2.1 TCP/IP Layers and Vulnerabilities Chapter 8 Security Baselines Chapter 3 Certificate Basics 8.1 Network Device and Operating System Hardening 2.1 Understanding & Using Cryptography 8.2 Server Application Hardening 2.2 Types of Protected Integrity 2.3 Identifying the components of a Public Key Infrastructure Chapter 9 Operational Security 2.4 Certificate Authorities 2.5 Understanding Certificate Life Cycle and Key 9.1 Physical Security Management 9.2 Privilege Management 2.6 Supplement #1 & Summary 9.3 Removable Media 9.4 Protecting Business Continuity Chapter 4 Network Infrastructure Security Chapter 10 Organizational Security 4.1 Securing Network Cabling 4.2 Securing Connectivity Devices 10.1 Documentation 4.3 Firewalls 10.2 Risk Assessment 4.4 Remote Access 10.3 Security Education 4.5 Telecommunications Hacking 4.6 Wireless Network Chapter 11 Incident Detection and Response 4.7 NAT 4.8 VLAN 11.1 Attacks and Malicious Code 4.9 Protecting Mobil Devices 11.2 Intrusion Detection Systems 4.10 Implementing IDS & using Honeypots and Honeynets 11.3 Incident Response

Chapter 5 Communications Security

5.1 Understanding Remote Access Connectivity 5.2 Providing Secure Remote Access 5.3 Understanding Wireless Standards and Protocols

www.itttc.net Appendix-A Security Topics & Security Tools  Robocopy.exe: Robust File Copy Utility  Rpcdump.exe: RPC Dump Cisco Security Topics Parts I, II, III  Sc.exe: Service Controller Tool  Sclist.exe  Cisco Router Passwords  Setspn.exe: Manipulate Service Principal Names for  Standard IP ACLs Accounts  Extended IP ACLs  Showacls.exe  Switch CAM Table  Showpriv.exe: Show Privilege  Static MAC Address  Shutdown.exe: Remote Shutdown  Port Security for 1900/2500 series switches  Srvany.exe: Applications as Services Utility  Cisco Discovery Protocol  Srvcheck.exe  CDP Commands  Srvinfo.exe  Su.exe Server 2003 Security Topics  Subinacl.exe  Uptime.exe  Server 2003 Security Settings Lab  Vadump.exe: Virtual Address Dump  Whoami.exe Server 2003 Resource Kit Security Tools (37 Tools)  Xcacls.exe

 Auditpol.exe: Audit Policy Internet Top 75 Security Tools  Clearmem.exe: Clear Memory

 Drivers.exe: List Loaded Drivers  Nessus  Dsstore.exe: Directory Services Store  Ethereal  Dumpel.exe: Dump Event Log  Snort  Efsinfo.exe: Encrypting File System Information  Netcat  Findgrp.exe: Find Group  TCPDump/WinDump  Getmac.exe: GetMAC  Hping2  Getsid.exe  DSniff  Gettype.exe: Get Type Version Information  GFI LANguard  Ipsecpol.exe: Internet Protocol Security Policies Tool  Ettercap  Kerbtray.exe: Kerberos Tray  Whisker/LibWhisker  Klist.exe: Kerberos List  John the Ripper  Logoff.exe  OpenSSH / SSH  Ntrights.exe  Sam Spade  Pulist.exe  ISS Internet Scanner  Regback.exe: Registry Backup  Tripwire  Regdmp.exe  Nikto  Regfind.exe  Kismet  Regini.exe: Registry Change by Script  SuperScan  Regrest.exe: Registry Restoration  L0phtCrack 4  Retina www.itttc.net  Netfilter  Authentication Protocols  Fport  Encryption  SAINT  Windows Firewall  Network Stumbler  Security Under SP2  SARA  N-Stealth Appendix-C Server 2003 Security Topics  AirSnort  NBTScan  Security Framework  GnuPG /PGP  Segmenting Networks  Firewalk  Encryption Authentication  Cain & Abel  PKI  XProbe2  Auditing  SolarWinds Toolsets  IPSec  NGrep  Securing IIS Web Sites  Perl / Python  RRAS IAS  THC-Amap  Securing Wireless Networks  OpenSSL  NTop ISA Server Lab  Nemesis   LSOF ISA Server 2004 Overview Lab  Honeyd Appendix-D: Windows Vista Ultimate Security Topics  Achilles  Brutus  User & Security Groups  Stunnel  Local Logon  Paketoo Keiretsu  Stored Passwords  Fragroute  Managing Local User Accounts and Groups  Spike Proxy  Managing Remote Access to Workstations  THC-Hydra  File Security and Resource Sharing  ISA Server 2004 Overview Basic/Special Permissions  File Ownership/ Inheritance   ISA Server 2004 Capabilities Effective Permissions   ISA Server 2004 Operation Sharing Files & Folders over the Network  Public Folder Sharing

Appendix-B Windows XP SP2 Security Topics  Vista Networking Features  TCP/IP and Dual IP Stack  Authentication  Diagnosing and Resolving Problems  Security  Optimizing and Safeguarding Disk Drives  Data Compression  Windows Security Center Windows Firewall  Data Encryption  Windows Defender  Configuring & Troubleshooting TCP/IP  Automatic Updates  Task Manager  Reliability and Performance Monitor www.itttc.net

11 Categories of Shareware Security Tools Security+ Utilities CD

 Crytp  E-books  Email Antispam  Freeware Security Tools  File Encryption  Windows Security Tools  File Wiping  VMWare Workstation Software  IP Address Tools  VMWare Workstation Software Training in Farsi  Network Info Tools  Security+ Exam  Network Monitoring  Networking Tools  Other Tools  Password Dictionaries  Personal Firewalls

Appendix-E WLAN Security Topics

 WLAN Security  WEP (Wired Equivalent Privacy)  Solutions to WEP Weaknesses  AES (Advanced Encryption Standard)  Filtering  Attacks on Wireless LANs  Emerging Security Solutions  Corporate Security Policy  Security Recommendations

www.itttc.net MCSE 70-293 Planning and Maintaining a Server 2003 Network Infrastructure II

Chapter-1 Planning and Implementing Server Roles Chapter-5 Planning, Implementing, and Maintaining and Server Security Network Security and Infrastructure

1.1 OS Selection: Client & Server 5.1 Configuring Port and Protocol Security 1.2 Default Security Settings 5.2 IPSec Policy 1.3 Security Configuration & Security Templates 5.3 Remote Desktop and Remote Assistance 1.4 Configuring Server Role Based Security 5.4 Planning Security for Wireless Networks 5.5 Troubleshooting IPSec Chapter-2 Planning, Implementing, and Maintaining 5.6 Planning a Security Update Infrastructure a Network Infrastructure 5.7 Configuring PKI that uses Certificate Services 5.8 Using Smart Card for Authentication 2.1 Network Topology, Infrastructure & Protocols 5.9 Configuring Certificate Services 2.2 Planning the Physical Placement of Network Resources 70-293 Labs 2.3 IP Addressing, IP Routing and IP Subnetting 2.4 Planning an Internet Connectivity Strategy Chapter-1 Labs 2.5 Understanding Bandwidth Requirements 2.6 Choosing an Internet Access Solution Lab 1.2 Default Security Settings 2.7 Client Configuration and Name Resolution Lab 1.4 Configuring Server Role Based Security 2.8 Resolving LAN/WAN Problems 2.9 Planning Name Resolution (DNS & NetBIOS) Chapter-2 Labs

Chapter-3 Planning, Implementing, and Maintaining Lab 2.2 Planning the Physical Placement of Network Routing and Remote Access Resources Lab 2.4 Planning an Internet Connectivity Strategy 3.1 Routing Protocols and Routing Topologies Lab 2.5 Understanding Bandwidth Requirements 3.2 Static and Dynamic Routing Protocols Lab 2.8 Resolving LAN/WAN Problems 3.3 IP Multicast Routing 3.4 Dial-in Tab Security Chapter-3 Labs 3.5 RAS Client Authentication 3.6 Remote Access Policies Lab 3.3 IP Multicast Routing Lab 3.4 Dial-in Tab Security Chapter-4 Planning, Implementing, and Maintaining Lab 3.5 RAS Client Authentication Server Availability Lab 3.6 Remote Access Policies

4.1 Server Avaiility & High Avaiility Chapter-4 Labs 4.2 Network Load Balancing & Implementing NLB 4.3 Clustering Services & Implementing Clustering Service Lab 4.2 Network Load Balancing & Implementing NLB 4.4 Backup & Recover Strategy Lab 4.3 Clustering Services & Implementing Clustering Service

www.itttc.net Chapter-5 Labs 70-293 Server 2003 Review Labs

Lab 5.4 Planning Security for Wireless Networks 1. Configuring Windows Components Lab 5.7 Configuring PKI that uses Certificate Services 2. Configuring TCP/IP Filtering and using NETSH Lab 5.9 Configuring Certificate Services 3. Configuring DHCP Service 4. Configuring DNS Service 70-293 Scenarios 5. Configuring and Removing Active Directory 6. Configuring Group Policy and RSoP Chapter-1 Scenarios 7. Configuring Network Connections 8. Configuring Routing and Remove Access Server S1.1 OS Selection: Client & Server 9. Configuring Demand Dial Interface S1.3 Security Configuration & Security Templates 10. Configuring RIP and OSPF Routing Protocols 11. Configuring RADIUS Client and Server

Chapter-2 Scenarios 12. Configuring Packet Filtering 13. Configuring IP Security

S2.1 Network Topology, Infrastructure & Protocols S2.3 IP Addressing, IP Routing and IP Subnetting S2.6 Choosing an Internet Access Solution 70-293 Additional Features S2.7 Client Configuration and Name Resolution  E-books S2.9 Planning Name Resolution (DNS & NetBIOS)  70-293 Exam

Chapter-3 Scenarios

ITTTC Utilities CD S3.1 Routing Protocols and Routing Topologies S3.2 Static and Dynamic Routing Protocols  Windows Vista Ultimate Lessons and Lab Chapter-4 Scenarios  VMWare Workstation Software  VMWare Workstation Software Training in Farsi S4.1 Server Availability & High Availability  Windows XP Service Pack 3 Information S4.4 Backup & Recover Strategy  Windows XP Animations

Chapter-5 Scenarios

S5.1 Configuring Port and Protocol Security S5.2 IPSec Policy S5.3 Remote Desktop and Remote Assistance

www.itttc.net MCSE 70-294 Planning, Implementing & Maintaining Server 2003 Active Directory

Chapter-1 Introduction to Active Directory 5.3 Configuring Intersite Replication 5.4 Configuring Global Catalog Servers 1.1 Introduction to Active Directory 5.5 Configuring Application Directory Partitions 1.2 Active Directory Logical and Physical Structures 5.6 Monitoring and Troubleshooting Replication 1.3 Active Directory Data Store 1.4 Trust Relationships Chapter-6 Implementing OU Structure 1.5 Group Policy Overview 1.6 Active Directory Object Naming 6. 1 Understanding OUs 1.7 AD Design Process 6. 2 Creating and Administering an OU Structure 1.8 ADsPaths Chapter-7 Administering User Accounts Chapter-2 Installing & Configuring Active Directory 7.1 Understanding User Accounts 2.1 Preparing for Active Directory Installation 7.2 Creating User Accounts 2.2 Installing and Removing Active Directory 7.3 Managing User Profiles and Home Folders 2.3 Verifying Active Directory Installation 7.4 Maintaining User Accounts 2.4 Troubleshooting Active Directory Installation and Removal Chapter-8 Administering Groups Chapter-3 Administering Active Directory 8.1 Understanding Groups 3.1 Using Active Directory Administration Tools 8.2 Creating and Administering Groups & Administration 3.2 Domain & Forest Functional Levels Strategies 3.3 UPN Suffixes 3.4 Backing up Active Directory Chapter-9 Administering AD Objects 3.5 Restoring Active Directory 3.6 Miscellaneous 9.1 Locating AD Objects 9.2 Controlling Access to AD Objects Chapter-4 Installing & Managing Domains, Trees & Forests 9.3 Delegating Administrative Control of AD Objects

4.1 Creating Multiple Domains, Trees, and Forests Chapter-10 Implementing Group Policy 4.2 Renaming and Restructuring Domains and Renaming DCs 4.3 Managing Operations Master Roles 10.1 Understanding Group Policy 4.4 Managing Trust Relationships 10.2 Group Policy Planning Strategies 10.3 Implementing a GPO Chapter-5 Configuring Sites & Managing Replication Chapter-11 Administering Group Policy 5.1 Understanding Sites and Replication 5.2 Configuring Sites 11.1 Managing Group Policy with RSoP 11.2 Managing Special Folders with Group Policy 11.3 Troubleshooting Group Policy

www.itttc.net Chapter-12 Deploying Software with Group Policy Chapter-4 Labs

12.1 Understanding Software Deployment with Group Policy 4.1 Creating Multiple Domains, Trees, and Forests 12.2 Deploying Software with Group Policy 4.2 Renaming and Restructuring Domains and Renaming DCs 12.3 Maintaining Software Deployed with Group Policy 4.3 Managing Operations Master Roles 12.4 Troubleshooting Software Deployed with Group Policy 4.4 Managing Trust Relationships

Chapter-13 Administering Security with Group Policy Chapter-5 Lab

13.1 Understanding AD Security 5.2 Configuring Sites 13.2 Implementing Software Restriction Policies 5.3 Configuring Intersite Replication 13.3 Implementing an Audit Policy & Administering the 5.4 Configuring Global Catalogs Security Log 5.6 Monitoring and Troubleshooting Replication 13.4 Using Security Templates 13.5 Using Security Configuration And Analysis Chapter-6 Lab

Chapter-14 Managing AD Performance 6. 2 Creating and Administering an OU Structure

14.1 Monitoring Performance with Service Logs and System Chapter-7 Labs Monitor 14.2 Monitoring Performance with Performance Logs And 7.2 Creating User Accounts Alerts 7.3 Managing User Profiles and Home Folders 14.3 Optimizing and Troubleshooting AD Performance Chapter-8 Labs 70-294 Active Directory Labs 8.2 Creating and Administering Groups & Administration Chapter-2 Labs Strategies

2.2 Installing and Removing Active Directory Chapter-9 Labs 2.3 Verifying Active Directory Installation 2.4 Troubleshooting Active Directory Installation and Removal 9.1 Locating AD Objects 9.2 Controlling Access to AD Objects Chapter-3 Labs 9.3 Delegating Administrative Control of AD Objects

3.1 Using Active Directory Administration Tools Chapter-10 Labs 3.2 Backing Up Active Directory 3.3 Restoring Active Directory 10.1 Understanding Group Policy 3.4 Domain & Forest Functional Levels 10.2 Group Policy Planning Strategies 3.5 UPN Suffixes 10.3 Implementing a GPO 3.6 Backing up AD

www.itttc.net Chapter-11 Labs 70-294 Additional Features  E-books 11.1 Managing Group Policy with RSoP  70-294 Exam 11.2 Managing Special Folders with Group Policy 11.3 Troubleshooting Group Policy ITTTC Utilities CD

Chapter-12 Labs  Windows Vista Ultimate Lessons and Lab  VMWare Workstation Software 12.2 Deploying Software with Group Policy  VMWare Workstation Software Training in Farsi  Windows XP Service Pack 3 Information Chapter-13 Labs  Windows XP Animations

13.2 Implementing Software Restriction Policies 13.3 Implementing an Audit Policy & Administering the Security Log 13.4 Using Security Templates 13.5 Using Security Configuration And Analysis

Chapter-14 Labs

14.1 Monitoring Performance with Service Logs and System Monitor 14.2 Monitoring Performance with Performance Logs And Alerts

www.itttc.net www.itttc.net MCSE 70-298 Designing Security for Server 2003 Network

Chapter-1 General Network Security Framework Chapter-6 Data Access Control Strategies

1.1 Security Policy 6.1 Windows Security Permissions 1.2 Segmenting Networks 6.2 Encrypting File System 1.3 Encryption 1.4 Authentication Server 2003 Security Labs 1.5 Public Key Infrastructure 1.6 Audit Lab-1 Preventing Automatic Installation of New Hardware Drivers Chapter-2 Security Infrastructure Technologies Lab-2 Protecting Against Modified Device Drivers Lab-3 Encrypting the SAM 2.1 Securing Infrastructure Server Lab-4 Enabling SYN Flood Protection 2.2 Certificate Services Lab-5 Disabling Router Discovery 2.3 Patch Management Lab-6 Configuring a Recovery Agent 2.4 Remote Administration Tools Lab-7 Changing Encryption Algorithms 2.5 Terminal Services Lab-8 Configuring Time Synchronization Settings 2.6 Windows Trust Models Lab-9 Configuring Service Parameters Lab-10 Disabling LM Hash Storage Chapter-3 Securing Network Communications Lab-11 Requiring NTLM Authentication Lab-12 Signing LDAP Communications 3.1 IP Security Lab-13 Restricting Remote Access to the Registry 3.2 Securing IIS Web Sites Lab-14 Disabling Internet Printing 3.3 Routing and Remote Access Service Lab-15 Configuring HTTP Authentication 3.4 Internet Authentication Service Lab-16 Configuring FTP Authentication 3.5 Securing Wireless Networks Lab-17 Configuring Trusted Certification Authorities Lab-18 Using Preshared Keys Chapter-4 Secure Active Directory Design Lab-19 Configuring Session Encryption Lab-20 Requiring a Password for Connection

4.1 Secure Active Director Design Lab-21 Allowing Silent Session Monitoring 4.2 Active Directory Delegation Lab-22 Restricting Access to the CA 4.3 Group Design Lab-23 Shutting Down Windows When Unable to Log Events

Chapter-5 Client Hardening Lab-24 Finding More Information about an Event Lab-25 Disabling

5.1 GPO Application Order 5.2 Popularly Tested GPO Settings 5.3 Security Templates 5.4 Windows Firewall and Legacy Clients

www.itttc.net Case Studies 70-298 Additional Features  E-books, Checklists, Security Templates 1. OmniPresence  70-298 Exam 2. GeoTrek  Windows Security Resource Kit 3. VisionWorx  RK Tools for Server 2003 4. GlobeComm 5. DreamSuites ITTTC Utilities CD 6. TeleSoft 7. CredTech  Windows Vista Ultimate Lessons and Lab  VMWare Workstation Software Review Labs  VMWare Workstation Software Training in Farsi  Windows XP Service Pack 3 Information Lab-1 DNS  Windows XP Animations Lab-2 Group Policy Lab-3 RADIUS Clients and Servers Lab-4 Inbound and Outbound Filters Lab-5 Security Settings

Microsoft Security Web Site

Appendix-A Windows Server 2003 RK Security Tools (50 Tools)

www.itttc.net MCSE 70-350 Microsoft Internet Security and Acceleration Server 2004/2006

Chapter 0 ISA Server 2004 ON-LINE HELP Chapter 7 Configuring ISA Server Firewall Policy

0.1 ISA Server 2004 ON-LINE HELP 7.1 Configuring ISA Server Firewall Policy 0.2 ISA Server 2004 Web Site 7.2 System Policy 7.3 Overview of Firewall Policy Chapter 1 ISA Server 2004 Overview 7.4 Access Rules 7.5 Web & Server Publishing 1.1 ISA Server Capabilities & Operation 7.6 Troubleshooting FW Policy 1.2 ISA Server 2004 Editions and System Requirements 1.3 ISA Server Tools and Remote Administration Chapter 8 Configuring Multinetworking 1.4 ISA Server as a Firewall 1.5 Comparing ISA 2004 to Other Firewall Products 8.1 Multinetworking Overview 1.6 ISA Server Deployment Scenarios 8.2 Working with Network Templates 8.3 Networks & Network Sets & Network Rules Chapter 2 Installing and Configuring ISA Server 2004 8.4 Web & Firewall Chaining Standard Chapter 9 ISA Server Security and Administration 2.1 Installing & Configuring ISA Server 2004 Std. Edition 2.2 Understanding Caching Concepts 9.1 Overview 9.2 Security Policy Administration Chapter 3 ISA Server 2004 Clients Chapter 10 Securing VPN Access 3.1 Overview of ISA Server 2004 Client Types 3.2 ISA Server 2004 Client Types 10.1 Securing VPN Access 3.3 Using Infrastructure Servers 10.2 Site to Site VPN Configuration 10.3 VPN Quarantine Chapter 4 Upgrading from ISA Server 2000 Chapter 11 Configuring Arrays 4.1 Upgrading ISA Server 2004 4.2 Troubleshooting ISA Server Upgrades 11.0 Installing ISA Server 2004 Enterprise Edition 11.1 Configuring Arrays Chapter 5 Monitoring and Reporting 11.2 Troubleshooting Array Configuration

5.1 Monitoring and Reporting Chapter 12 Enterprise and Array Policies 5.2 Performance Monitor 12.1 Using Enterprise and Array Policies Chapter 6 Configuring Toolbox Elements 12.2 Enterprise Policy Administration 12.3 Array Policy Administration 6.1 Configuring Toolbox Elements 6.2 Network Objects

www.itttc.net Chapter 13 Enterprise Technologies Lab #8 System Policy Lab #9 Overview of Firewall Policy 13.1 Enterprise Technologies and ISA Server 2004 Lab #10 Access Rules 13.2 Network Load Balancing Lab #11 Web & Server Publishing Lab #12 Working with Network Templates

Chapter 14 ISA Server and Exchange Server 2003 Lab #13 Networks & Network Sets & Network Rules Lab #14 Web & Firewall Chaining Lab #15 ISA Server Security and Administration Overview 14.1 Configuring ISA Server with Exchange Server 2003 Lab #16 Security Policy Administration 14.2 Remote Access for Exchange Clients Lab #17 Securing VPN Access Lab #18 Site to Site VPN Configuration Chapter-15 ISA Server 2006 Enterprise Edition Lab #19 Installing ISA Server 2004 Enterprise Edition Lab #20 Configuring Arrays 15.1 ISA Server 2006 System Requirements Lab #21 Enterprise Policy Administration 15.2 ISA Server 2006 Editions Comparison Lab #22 Enterprise Technologies and ISA Server 2004 15.3 ISA Server 2006 New Features Lab #23 Network Load Balancing 15.4 65 ISA Server 2006 Key Features Lab #24 ISA Server 2006 System Requirements Lab #25 ISA Server 2006 Editions Comparison ISA Server Labs Lab #26 ISA Server 2006 New Features

Lab #1 ISA Server 2004 ON-LINE HELP 70-350 Additional Information Lab #2 Installing & Configuring ISA Server 2004 Standard  E-book & MOC, Skillsoft Edition  ISA Server 2004 Enterprise Edition SP2 Software Lab #3 ISA Server 2004 Client Types  Lab #4 Monitoring and Reporting Lab #5 Performance Monitor ITTTC Utilities CD Lab #6 Configuring Toolbox Elements  Windows Vista Ultimate Lessons and Lab Lab #7 Network Objects  VMWare Workstation Software  VMWare Workstation Software Training in Farsi  Windows XP Service Pack 3 Information  Windows XP Animations

www.itttc.net Microsoft

MCTS MCITP Server Administrator Enterprise Administrator Database Administrator Enterprise Messaging Administrator

www.itttc.net www.itttc.net MCTS / MCITP 70-620 Installing and Configuring Windows Vista Ultimate

Chapter 1 Introduction to Windows Vista Administration 6.4 Local User Accounts and Groups 6.5 Remote Access 1.1 Windows Vista Overview 1.2 Vista Upgrade Considerations Chapter-7 Managing Laptops and Traveling Users 1.3 Installing Windows Vista 1.4 Troubleshooting Installation Problems 7.1 Power Management Settings 1.5 Windows Vista Architectural Changes 7.2 Networking for Laptops 1.6 Automating the Windows Vista Installation

Chapter-8 Configuring User and Computer Policies Chapter 2 Managing Windows Vista Systems

8.1 Group Policy Essentials 2.1 Getting Around Windows Vista 8.2 Configuring Policies 2.2 and Elevation Prompts 8.3 Access & Connectivity Policies 2.3 Supporting Computers Running Windows Vista 8.4 Computer & User Scripts Policies 2.4 System Support Tools 2.5 System Properties Chapter-9 Managing Disk Drives & File System

Chapter 3 Configuring Systems, Hardware Devices, and 9.1 Disk Drives & File Systems Drivers 9.2 Disk Performance 9.3 Working with Basic & Dynamic Disks 3.1 Automated Help And Support 9.4 Using Basic & Dynamic Disks 3.2 Devices & Device Manger & Device Drivers 9.5 Disks, Partitions & Volumes 3.3 Managing & Customizing Hardware 9.6 Partitioning Disks 3.4 Internet Time

Chapter-10 Managing File Security & Resource Sharing Chapter 4 Customizing the Desktop and the Interface

10.1 File Security & Resource Sharing 4.1 Desktop and the Interface Part 1 10.2 File & Folder NTFS Permissions 4.2 Desktop and the Interface Part 2 10.3 Sharing Files & Folders over the Network

10.4 Public Folder Sharing

Chapter 5 Installing and Maintaining Programs Chapter-11 Explorer Options, Offline Lines & Disk Quotas

5.1 Installing and Maintaining Programs 11.1 Configuring Advanced Explorer Options 5.2 Program Compatibility & Managing Programs 11.2 Offline Files

11.3 Disk Quotas Chapter 6 Managing User Access and Security

6.1 User and Group Accounts 6.2 Local Logon 6.3 Stored Passwords

www.itttc.net Chapter-12 TCP/IP Networking 70-620 Windows Vista Ultimate Labs

12.1 Windows Vista Networking Features Chapter-1 Labs 12.2 TCP/IP & Dual IP Stack Lab #1 Installing Windows Vista Ultimate 12.3 Local Area Connections Lab #2 Task Bar & Start Menu Properties 12.4 Resolving Local Area Connection Problems Lab #3 Vista Applications, Desktop, Recycle Bin, UAC & Control 12.5 IPv4 Addressing Panel Overview Lab #4 CTL-ALT-DEL Options Lab #5 Password Reset Disk Chapter-13 Mobile Networking & Remote Access Lab #6 System Overview Lab #7 System Configuration 13.1 Mobile Networking & Remote Access Lab #8 BCDEDIT Lab #9 13.2 Creating Remote Access Connections 13.3 Configuring Connection Properties Chapter-2 Labs 13.4 Wireless Networking Lab #1 Task Bar Chapter-14 Advanced Internet Options and Security Lab #2 Control Panel Lab #3 MMC, Snap-ins, Computer Management, Services 14.1 Internet Options and Security Lab #4 Windows Management Instrumentation (WMI) 14.2 Cookies & Other Internet Files Lab #5 UAC & Security Settings 14.3 Security Zones Lab #6 UAC Settings Lab #7 Disk Cleanup Lab #8 File Signature Verification Chapter-15 Optimizing Windows Vista Lab #9 System Properties Lab #10 System Restore 15.1 Safeguarding Disk Drives 15.2 Windows Security Center Chapter-3 Labs 15.3 Windows Firewalls 15.4 Windows Defender Lab #1 Problem Reports and Solutions 15.5 Automatic Updates Lab #2 Windows Memory Diagnostics Tool 15.6 Reliability & Performance Monitor Lab #3 Vista Support Services Lab #4 Troubleshooting and Diagnostics using GPO Chapter-16 Supporting & Troubleshooting Windows Lab #5 Windows Update & Windows Ultimate Extras Vista Lab #6 Device Manager Lab #7 Device Drivers 16.1 Remote Assistance & Event Logs Lab #8 Using Signed and Unsigned Drivers using GPO 16.2 Task Scheduling Lab #9 Driver Searching using GPO 16.3 Backing up & Recovering a Computer Lab #10 Restricting Driver Installation using GPO 16.4 Troubleshooting Startup & Shutdown Lab #11 Keyboard Settings Lab #12 Mouse Settings Lab #13 Audio Driver Lab #14 Regional Options & Settings Lab #15 Windows Time Service Lab #16 Configuring Internet Time for Workgroups Lab #17 Configuring Internet Time for Domains

www.itttc.net Chapter-4 Labs Lab #8 Configuring Assigning Computer & User Scripts in GP

Lab #1 Personalization Chapter-9 Labs Lab #2 Start Menu & Search Lab #3 Vista Gadgets Lab #1 Disk Management Lab #2 Configuring Dynamic Disk & Volumes Spanned & Chapter-5 Labs Simple Volumes Lab #3 GPT vs. MBR Lab #1 Administrative Privilege Lab #4 Disk Scaling Lab #2 User Account Control & RunAS Lab #5 Diskpart Command Lab #3 UAC Security Options using GPO Lab #6 Convert Command Lab #4 Default Programs Lab #5 Accessories Chapter-10 Labs Lab #6 Turning Features ON or OFF Lab #7 Windows Vista Contacts Lab #1 NTFS Permissions Lab #8 Windows Vista Lab #2 Shared Folders Lab #9 Windows Mail Lab #3 Public Folders Lab #10 Lab #11 , Media Player, Photo Gallary Chapter-11 Labs

Lab #1 Configuring GP settings for Windows Explorer Chapter-6 Labs Lab #2 Sync Center Lab #3 Offline Files Lab #1 Users and Groups Lab #4 Disk Quotas Lab #2 Interactive Logon using Security Options in GPO Lab #3 Logon Settings using GPO Chapter-12 Labs Lab #4 Key Ring Entries Lab #5 Secure Guest Account Lab #1 Network and Sharing Center Lab #6 Remote Assistance & Remote Desktop Lab #2 Network Connections & Bridging Lab #7 Remote Desktop Connection Lab #3 Local Area Connection Properties & TCP/IP Settings Lab #4 IPCONFIG Command & Options Chapter-7 Labs Chapter-13 Labs Lab #1 Power Plans & Power Options Lab #2 Powercfg Command Lab #1 Phone & Modem Connection Lab #3 Power Management using GPO Lab #2 Creating and Configuring a Dial-up Connection Lab #4 Sleep Mode Lab #3 Creating and Configuring a Broadband Connection Lab #5 TCP/IP Addressing Configuration Overview Lab #4 Creating and Configuring a VPN Connection Lab #6 Netsh Command Lab #5 Enabling or Disabling Windows Firewall per Connection Lab #7 Connecting to a Network Projector Lab #6 Proxy Settings Lab #8 Printing Lab #9 Print Management Chapter-14 Labs

Chapter-8 Labs Lab #1 Configuring IE settings in Group Policy Lab #2 Configuring Parental Control Lab #1 Group Policy Object Settings Overview Lab #3 Configuring IE 7 Options Popup Filter, Phishing Filter Lab #2 Configuring Policy Templates in GP Lab #3 Configuring Disk Quota setting in GP Lab #4 Configuring System Restore settings in GP Lab #5 Configuring Offline Files settings in GP Lab #6 Configuring Networking settings in GP Lab #7 Configuring Remote Assistance settings in GP

www.itttc.net Chapter-15 Labs Windows Vista Utilities CD

Lab #1 Chkdsk  70-620 Exam Lab #2 TPM  Windows Vista E-books Lab #3 BitLocker  VMWare Workstation Software Lab #4 Windows Security Center  VMWare Workstation Software Training in Farsi Lab #5 Windows Firewall Lab #6 Windows Firewall with Advanced Security Lab #7 Windows Defender Lab #8 Configuring Windows Update in GP

Chapter-16 Labs

Lab #1 Event Viewer Lab #2 Task Scheduler Lab #3 Lab #4 Backup & Restore Center Lab #5 Task Manager Lab #6 Reliability and Performance Monitor

www.itttc.net MCTS 70-236 Microsoft Exchange Server 2007 Implementation & Maintenance

Chapter 1 Exchange Server 2007 Deployment Chapter 5 Exchange Server 2007 Security & Data Storage Groups 1.1 Overview, Hardware & Editions 1.2 Exchange Server, Windows & Active Directory 5.1 Exchange Server 2007 Security 1.3 Administration Tools 5.2 Exchange Administrator Permissions 1.4 Messaging Roles 5.3 Auditing 1.5 Exchange Server Roles & Active Directory 5.4 Information Store 1.6 Exchange Server & Existing Exchange Organizations 5.5 Content Indexing

Chapter 2 Managing Exchange Server 2007 Chapter 6 Mailbox & Public Folder Database Clients & Mobile Messaging Users Administration

2.1 Mail Clients 6.1 Mailbox and Public Folder Database Administration 2.2 Managing Exchange Server Service in Outlook 2007 6.2 Public Folder Databases & Managing Databases 2.3 Mail Profiles 6.3 Managed Folders and Managed Records 2.4 Mobile Messaging Users 6.4 Accessing and Managing Public Folders 2.5 Mobile Device & Wireless Access 2.6 Remote Mail and Outlook Anywhere Chapter 7 Managing Transport Servers and Client Access Servers Chapter 3 Exchange Server 2007 Administration &

Exchange Management Shell 7.1 Managing Hub Transport and Edge Transport Servers 7.2 Completing Transport Server Setup 3.1 Exchange Server 2007 Organizations 7.3 Managing Message Pickup and Replay 3.2 Data Storage 7.4 Managing Accepted Domains & Email Policies 3.3 Message Queues 7.5 Remote Domains, Antispam & Message Filtering Options 3.4 Exchange Management Shell 7.6 Managing Client Access Servers 3.5 Cmdlets 7.7 Enabling POP3 and IMAP4 & Deploying Outlook Anywhere Chapter 4 User, Contact, Mailbox Administration, 7.8 Managing Exchange Server Features for Mobile Devices Groups & Address Lists Chapter 8 Exchange Server 2007 Maintenance, 4.1 User and Contact Administration Backup & Restore 4.2 Managing User Accounts and Mail Features 4.3 Mailbox Administration 8.1 Troubleshooting, Logging & Tracking 4.4 Distribution Groups and Address Lists 8.2 Monitoring Events, Services, Servers, and Resource Usage 8.3 Exchange Queues 8.4 Backing Up and Restoring Exchange Server 2007 8.5 Recovering Exchange Server & Restoring Mailboxes

www.itttc.net Chapter-9 Exchange Server 2007 Clustering Solution Center & FAQ

9.1 Clustering Overview 1.7 Exchange Server 2007 Solution Center 9.2 Single Copy Clusters 1.8 Exchange Server 2007 FAQ 9.3 Clustered Continuous Replication Clusters 9.4 High Availability & Server Availability Exchange Server 2007 Labs

Appendix-A Active Directory Lessons Lab-0 Installing Exchange Server 2007 Lab-1 Exchange Server 2007 Maintenance Mode A1 Active Directory Overview Lab-2 Exchange Management Console Overview A2 Active Directory Logical & Physical Structures Lab-3 Windows PowerShell Overview A3 Active Director Data Store Lab-4 Exchange Management Shell Overview A4 Installing & Configuring Active Directory Lab-5 Microsoft Exchange Security Groups A5 Active Directory Administrative Consoles Lab-6 Modify Configuration Domain Controller & Recipient A6 Domain and Forest Functional Levels Scope Lab-7 Event Viewer Logs & Exchange Services Appendix-A Active Directory Lessons Lab-8 Recipient Configuration Node (User Mail Box) Lab-9 Recipient Configuration Node (Room Mail Box) A7 Active Directory Installation and Removal Lab-10 Recipient Configuration Node (Equipment Mail Box) A8 Active Directory Installation Verification Lab-11 Recipient Configuration Node (Link Mail Box) A9 Active Directory Setup Logs Lab-12 Recipient Configuration Node (Mail Contact) A10 Domain and Forest Functional Levels Lab-13 Recipient Configuration Node (Mail User) Lab-14 Distribution & Dynamic Distribution Groups Appendix-B Exchange Server 2007 Information Lab-15 Recipient Configuration Review Lab-16 Server Configuration (Mailbox Role) ONLINE HELP Lab-17 Mailbox Role : Mailbox & Public Folder Database Lab-18 Server Configuration (Client Access Role) 1.1 Exchange 2007 ONLINE Help Overview Lab-19 Server Configuration (Hub Transport Role) 1.2 Exchange 2007 ONLINE Help Categories Lab-20 Creating a New SMTP Receive Connector 1.3 Exchange 2007 ONLINE Help Getting Started Lab-21 Add New Exchange Administrator Role Lab-22 Configuring Service Startup Product Information & Versions Lab-23 Creating a New Address Lists Lab-24 Managed Default Folders 1.4 Exchange Server 2007 Product Information Lab-25 Managed Custom Folders 1.5 Exchange Server Version Comparison Lab-26 Managed Folder Mailbox Policies Lab-27 Offline Address Book Service Pack 1 & Update Rollup 1 Lab-28 Assigning Advanced Exchange Server Permissions Lab-29 Auditing Exchange Server Usage 1.6 Exchange Server 2007 Service Pack 1 Lab-30 Hub Transport: Remote Domains 1.7 Update Rollup 1 for Exchange Server 2007 SP1 Lab-31 Hub Transport: Accepted Domains

www.itttc.net Exchange Server 2007 Labs Utilities DVD

Lab-32 Hub Transport: Email Address Policies  Exchange Server 2007 Software DVD 32-bit Edition Lab-33 Hub Transport: Transport Rules  Exchange Server 2007 E-books Lab-34 Hub Transport: Journaling  Exchange Server 2007 Installation Components Lab-35 Hub Transport: Send Connectors  VMWare Workstation Software Lab-36 Hub Transport: Edge Subscriptions  VMWare Workstation Training in Farsi Lab-37 Exchange Server 2007 Performance Counters  Exchange Glossary Lab-38 Mail Client: Outlook 2007 Online Help  Exchange Server 2007 Tools Lab-39 Mail Client: Outlook 2007 Overview  Exchange Server 2007 CBT Lab-40 Mail Client: Outlook 2007 Details Lab-41 Mail Client: Outlook 2007 Web Site Lab-42 Toolbox: Best Practice Analyzer Lab-43 Toolbox: Database Recovery Management Lab-44 Toolbox: Database Troubleshooter Lab-45 Toolbox: Mail Flow Troubleshooter Lab-46 Toolbox: Message Tracking Lab-47 Toolbox: Queue Viewer Lab-48 Toolbox: Performance Troubleshooter Lab-49 Tools Web Site Lab-50 Exchange 2007 File Paths Lab-51 Exchange Server 2007 Backup & Restore Lab-52 Exchange Setup Parameters Lab-53 Office Outlook Web Access Lab-54 Creating Multiple Storage Groups Lab-55 Enabling & Verifying LCR Lab-56 PowerShell Scripts, Properties & Commands Lab-57 Unified Messaging: Configuring Dial Plans Lab-58 Unified Messaging: Configuring IP Gateways Lab-59 Unified Messaging: Configuring Mailbox Policies Lab-60 Unified Messaging: Configuring Auto Attendants

www.itttc.net www.itttc.net MCTS 70-431 Microsoft SQL Server 2005 Implementation & Maintenance

Chapter 0 Introduction to RDBM & SQL Chapter 5 Introducing More Database Objects

0.1 Database Basics 5.1 Stored Procedures 0.2 SQL Basics Part I 5.2 Triggers 0.3 SQL Basics Part II 5.3 Event Notifications 5.4 Functions Chapter 1 Installing Microsoft SQL Server 2005 5.5 User Defined Types

1.1 Introduction to SQL Server 2005 Chapter 6 Implementing Security in SQL Server 2005 1.2 Prerequisites 1.3 Preparing to Install 6.1 SQL Server Security Modes 1.4 Upgrading from a Previous version 6.2 SQL Server Logins & Fixed Server Roles 1.5 Installing SQL Server 2005 6.3 Creating Database User Accounts 1.6 Relational Database Concepts 6.4 Permissions & Permission States 1.7 SQL Server Management Studio 6.5 Database Roles 6.6 Ownership Chains Chapter 2 Creating and Configuring Databases 6.7 Linked Server Security 6.8 Encryption & Security Plan 2.1 Planning your database 2.2 Filegroups Chapter 7 Working with Relational Data 2.3 Database File Placement 2.4 Creating Data Storage Structures 7.1 Transactions 2.5 Estimating Storage Requirements 7.2 Populating Tables 2.6 Creating and Configuring Databases 7.3 Bulk Inserting XML & Bulk-Logged Recovery Model 7.4 Supporting Different Collation Types and Orders When Chapter 3 Working with Tables and Views Querying Data 7.5 Casting and Converting 3.1 Planning Tables 7.6 Datatype Precedence & Collations 3.2 Introducing Built-in Data Types 7.7 Error Handling 3.3 Creating Tables 3.4 Restricting the Data Chapter 8 Working with XML Data 3.5 Partitioning Tables 3.6 Understanding Views 8.1 XML Data, Datatypes & XML Schema 8.2 Querying XML Data Chapter 4 Performing Indexing and Full-Text 8.3 Creating XML Indexes Searching Chapter 9 Working with Service Broker and HTTP 4.1 Index Architecture 9.1 Service Broker 4.2 Clustered Indexes 9.2 Working with Service Broker 4.3 Non-Clustered Indexes 9.3 Using Service Broker 4.4 Indexes, Primary Keys & Full Text Searching 9.4 HTTP Endpoints

www.itttc.net Chapter 10 Maintaining and Automating SQL Server 70-431 SQL Server 2005 Labs

10.1 Maintaining Indexes Section-1 Labs 10.2 Maintaining Statistics 10.3 Maintaining Databases Lab 1.1 Installing SQL Server 2005 10.4 Automation Basics Lab 1.2 Installing SQL Server 2005 Service Pack 2 10.5 Configuring Database Mail Lab 1.3 SQL Server Management Studio Overview 10.6 Creating Operators & Jobs Lab 1.4 Installing the 2nd Instance 10.7 Creating Alerts Lab 1.5 Exploring the SQL Server Management Studio 10.8 Maintenance Plan Wizard & Copying Databases Lab 1.6 Creating Tables

Chapter 11 Performing and Restores Section-2 Labs

11.1 Backup a Database Lab 2.1 Creating a Database using Management Studio 11.2 Restoring a Database Lab 2.2 Gathering Information about your Database 11.3 Devising a Backup Strategy Lab 2.3 Setting Database Options

Chapter 12 Achieving High Availability through Section-3 Labs Replication

Lab 3.1 Creating the Products Table 12.1 Introducing Replication Lab 3.2 Creating the Customers Table 12.2 Introducing the Publisher Subscriber Metaphor Lab 3.3 Creating the Orders Table 12.3 Replication Factors and Distribution Lab 3.4 Creating the Valid Zip Code Constraint 12.4 Replication Internals Lab 3.5 Testing your Constraint 12.5 Replication Types Lab 3.6 Creating Default Constraint 12.6 Publication & Distributor Issues Lab 3.7 Creating a Unique Constraint 12.7 Replication Models Lab 3.8 Creating a Partition Function and Schema 12.8 Replicating over the Internet and to Heterogeneous Lab 3.9 Creating the Contact_in_398 View Database Servers Lab 3.10 Creating an Updatable View 12.9 Installing, Using & Managing Replication

Section-4 Labs Chapter 13 Introducing More High-Availability Methods

Lab 4.1 Creating a Table Scan 13.1 Choosing the High-Availability Features You Need Lab 4.2 Creating an Index 13.2 Database Mirroring Overview Lab 4.3 Creating a Primary Key 13.3 Database Mirroring Implementation Lab 4.4 Creating a Full-Text Catalog & Index 13.4 Log Shipping 13.5 Database Snapshots

Chapter 14 Monitoring and Optimizing SQL Server 2005 14.1 System Monitor 14.2 SQL Profiler & Database Engine Tuning Advisor 14.3 Troubleshooting SQL Server

www.itttc.net Section-5 Labs Lab 8.10 Creating an Alert for a Standard Error Lab 8.11 Testing an Alert with RAISEERROR() Lab 5.1 Viewing System Stored Procedures in Object Explorer Lab 8.12 Creating and Firing an Alert Based on a Custom Error Lab 5.2 Using Predefined Templates Lab 8.13 Creating a Performance Alert Lab 5.3 Creating a Simple Stored Procedure Lab 8.14 Creating a WMI Alert Lab 5.4 Creating a DDL Trigger Lab 8.15 Maintenance Plan Wizard Lab 5.5 Creating a Scalar User-Defined Function Lab 8.16 Copy Database Wizard Lab 5.6 Creating a T-SQL User-Defined Type Section-9 Labs Section-6 Labs Lab 9.1 Creating a Permanent Backup Device Lab 6.1 Setting the Authentication Mode Lab 9.2 Performing a Full Backup Lab 6.2 Creating Standard Logins Lab 9.3 Performing a Differential Backup Lab 6.3 Creating Windows Accounts Lab 9.4 Performing a Transaction Log Backup Lab 6.4 Creating SQL Server Logins for Windows Accounts Lab 9.5 Performing a Filegroup Backup Lab 6.5 Testing SQL Server Logins for Windows Accounts Lab 9.6 Backing Up to Multiple Devices Lab 6.6 Adding Logins to Fixed Server Roles Lab 9.7 Restoring a Database Lab 6.7 Creating User Accounts in AdventureWorks Lab 6.8 Statement and Object Permissions Section-10 Labs Lab 6.9 Adding Users to Fixed Database Roles Lab 6.10 Creating and Adding Users to Custom Database Lab 10.1 Installing a Distribution Server Roles Lab 10.2 Creating a Publication Lab 6.11 Creating an Application Role Lab 10.3 Creating a Subscription Lab 10.4 Replication Monitor Section-7 Labs Section-11 Labs Lab 7.1 bcp & sqlcmd parameters Lab 7.2 Bulk-Logged Recovery Model Lab 11.1 System Monitor Lab 7.3 TRY…CATCH Block Lab 11.2 Creating a Trace with Profiler Lab 11.3 Replaying a Trace Section-8 Labs Lab 11.4 Database Engine Tuning Advisor Lab 11.5 Reading SQL Server & Windows Event Logs Lab 8.1 Reconstructing an Index Lab 11.6 Activity Monitor Lab 8.2 Updating Index Statistics Lab 11.7 Connecting to the DAC Lab 8.3 Using DBCC CHECKDB on AdventureWorks Lab 8.4 Shrinking the Database Appendix-A SQL Server 2005 & 2008 Lab 8.5 Configuring a Mailhost Lab 8.6 Configuring the SQL Server Agent to Use the A1 SQL Server 2005 Books Online Mailhost A2 SQL Server 2005 Product Information Lab 8.7 Configuring an Operator A3 Update package 7 for SQL Server 2005 Service Pack 2 Lab 8.8 Creating a Fail-Safe Operator A4 SQL Server 2005 Solution Center Lab 8.9 Creating a Job A5 SQL Server 2008 Product Information

www.itttc.net 70-431 Utilities DVD

 SQL Server 2005 E-books  70-431 Exam  SQL Server 2005 Software Evaluation Edition (CD-1, CD-2 & SP1)  VMWARE Software  SQL Server CBT

www.itttc.net Cisco

CCNA CCNP Cisco VoIP

www.itttc.net www.itttc.net CCNA 640-802 (ICND-1 640-822 + ICND-2 640-816) Cisco Certified Network Associate

Routing Units Unit-4 IP Routing & Routing Protocols

4.1 Distance Vector vs. Link State Routing Chapter-0 Evolving Network Model 4.2 Link State Operation 4.3 Routing Updates 0.1 IIN & SONA 4.4 Routing Tables 0.2 Campus Network 0.3 Enterprise Model Unit-5 Dynamic Routing Protocols Part I

Unit-1 Internetworking 5.1 RIP v1 Overview 5.2 IGRP Overview 1.1 Internetworking 5.3 EIGRP Overview 1.2 OSI Model 5.4 OSPF Overview 1.3 Ethernet Networks 1.4 Ethernet Cabling Unit-6 Managing a Cisco Router & Internetwork 1.5 Network Domain 1.6 Ethernet Addressing 6.1 Router Configuration Register 1.7 Cisco 3-Layer Hierarchical Model 6.2 Router Password Recovery 1.8 Ethernet Frame Types 6.3 IOS Image Backup and Upgrade 6.4 IP Host Tables Unit-2 TCP/IP Addressing & Protocols

Unit-7 IP Access Lists 2.1 IP Addressing Overview 2.2 IP Subnetting Part I 7.1 Standard IP Access List 2.3 VLSM Part I 7.2 Extended IP Access List 2.4 NAT Overview

Unit-3 Basic Router Configuration Switching & WAN Units

3.1 Cisco Routers Unit-1 Layer-2 Switching 3.2 Connecting to a Cisco Router 3.3 Booting a Cisco Router 1.1 Ethernet Overview 3.4 Cisco Router Components 1.2 Switch vs. Bridge 3.5 Cisco Router Models 1.3 Switch Functions 3.6 Cisco Router Passwords 1.4 How a Switch Works (Example) 3.7 Cisco Router Commands 1.5 LAN Switch Types 3.8 Cisco Router Banner 1.6 Configuring Cisco 1900 Series 3.9 Cisco Router Interfaces 1.7 Configuring Cisco 2950 Series 3.10 Cisco Router Serial Interfaces 1.8 Cisco Switch Verification 3.11 Router Configuration Commands 1.9 Switch Port Security 3.12 Troubleshooting 1.10 Static MAC Addresses 3.13 Verifying Router Configuration 1.11 Port Security on 1900

www.itttc.net 1.12 Port Security on 2950 5.4E Example: LMI Configuration 1.13 CDP Overview 5.5 Frame Relay Congestion Control 1.14 CDP Commands 5.6 Subinterfaces 5.7 Monitoring Frame Relay Unit-2 Spanning Tree Protocol Routing, Switching & WAN Part II 2.1 STP Overview 2.2 STP Terminology Unit-1 TCP/IP Addressing & Protocols 2.3 STP Operation 2.4 STP Port States 1.1 IP Subnetting Part II 2.5 When to use STP 1.2 VLSM Part II 2.6 STP Examples 1.3 TCP/IP Suite Overview 1.4 Application Layer Protocols Unit-3 Virtual LANs 1.5 Transport Layer Protocols 1.6 Internet Layer Protocols 3.1 VLAN Overview 3.2 VLAN Trunking Unit-2 Cisco’s IOS and Security Device Manager 3.3 VLAN Trunking Protocols 3.4 VTP Pruning 2.1 SSH, Do Command & using the PIPE 3.5 Routing between VLANs 2.2 Cisco Security Device Manager (SDM) 3.6 Configuring VLANs 2.3 Cisco ASDM 5.2 for ASA (Demo) 3.7 Configuring Trunk Ports 2.4 SDM User Guide 3.6 Configuring Inter-VLAN Routing 3.7 Configuring VTP Unit-3 IP Routing & Routing Protocols

Unit-4 Wide Area Network 3.1 Routing Basics 3.2 IP Routing Examples 4.1 Introduction to WANs 3.3 Routing Loops 4.2 WAN Terminology 3.4 RIPv2 4.3 WAN Interface Types 4.4 WAN Connection Types Unit-4 Dynamic Routing Protocols Part II 4.5 WAN Protocols (HDLC) 4.6 WAN Protocols (PPP & Its Components) 4.1 EIGRP Overview 4.7 PPP LCP Configuration Options 4.2 Configuring EIGRP 4.8 PPP Session Establishment & Auth. Methods 4.3 OSPF 4.9 Configuring & Verifying PPP 4.4 Configuring OSPF 4.5 Configuring EIGRP & OSPF Summary Routes Unit-5 Frame Relay 4.6 Route Redistribution

5.1 Introduction to Frame Relay Unit-5 Managing a Cisco Router & Internetwork 5.2 Frame Relay Technology and Terminology 5.3 Frame Relay Encapsulation, VCs & DLCI 5.1 Boot System Command and using Cisco IFS 5.4 Local Management Interface 5.2 Using SDM 5.2 for ASA to Manage Configuration Files www.itttc.net Unit-6 Layer-2 Switching & Advanced STP Topics 11.5 Migrating to IPv6 11.6 Configuring IPv6 6.1 Cisco 2960 Switches 6.2 Switching Services Unit-12 WAN Part II 6.3 PostFast, UplinkFast & BackboneFast 6.4 RSTP & Etherchannel 12.1 Cable & DSL 6.5 Catalyst Switch Configuration 12.2 Using SDM for WAN Connections 6.6 Getting Started with Cisco Network Assistant 12.3 VPNs 12.4 Introduction to Cisco IOS IPSec Unit-7 Voice VLANs 12.5 Using ASDM 5.2 for ASA for VPN & IPSec 12.6 Effective Bandwidth 7.1 Configuring Voice VLANs & IP Phone Voice Traffic 7.2 Using the CNA to Configure VLANs & Inter-VLAN Unit-13 Cisco Special Topics Routing 13.1 Telephony Network Unit-8 Security 13.2 PBX vs. Key System 13.3 Signaling 8.1 Secured Networking and Cisco IOS Firewalls 13.4 VoIP Network Components & Advantages 8.2 Advanced ACLs 13.5 Overview of Traffic Types 13.6 Multicast Addressing Unit-9 Network Address Translation 13.7 DHCP Overview 13.8 Configuring DHCP 9.1 NAT, NAT Types & NAT Names 13.9 DHCP Verification Commands 9.2 How NAT Works 9.3 Testing & Troubleshooting NAT Routing Labs 9.4 Using ASDM 5.2 for ASA to Configure NAT

Lab-1 Basic Router Configuration Unit-10 Cisco’s Wireless Technologies Lab-2 Routing in Two Subnets Lab-3 Routing in Four Subnets 10.1 Wireless Networking Overview Lab -4 Using Static and Default Routes 10.2 802.11 Standards Lab -5 Serial Communication 10.3 Cisco’s Unified Wireless Solution Lab -6 Configuring RIPv1 10.4 Split MAC Architecture Lab -7 Configuring IGPR 10.5 Wireless Security Lab -8 Configuring EIGRP Lab -9 Configuring OSPF Unit-11 IPv6 Lab -10 Configuring IP ACLs

11.1 Needs and Benefits of IPv6 11.2 IPv6 Addressing & Address Types 11.3 IPv6 Autoconfiguartion 11.4 Configuring Cisco Routers with IPv6, DHCPv6 & ICMPv6 11.5 IPv6 Routing Protocols

www.itttc.net Switching and WAN Labs  CCNA 640-802 Exam  Cisco Configuration Whitepapers (12)  Lab-1 PC to PC Communication Cisco Tools Configuration Guides: Lab-2 Configuring CDP  Cisco Switch 2960 Configuration Guide Lab-3 LAN Switching 2950  Cisco Network Assistant Lab-4 Configuring 1900 Series Switches  Cisco Security Device Manager Lab-5 Configuring the 2950 Switches Lab-6 Configuring STP on 1900 Series Cisco CCNA 640-802 Video Mentor (ICND-1 & ICND-2) Labs Lab-7 Configuring VLAN on 1900 Series Lab-8 Configuring VLAN on 2950 Switches ICND1 Labs Lab-9 Configuring VLAN Trunking Lab-10 Configuring & Verifying PPP Lab 1 Navigating a Router/Switch Command-Line Interface Lab-11 Configuring and Verifying Frame Relay Lab 2 Router Configuration and Managing Configuration Files Lab-12 Configuring and Verifying FR Subinterfaces Lab 3 Switch Basics: Learning, Forwarding/Filtering, and Interface Settings Review Scenarios Lab 4 Finding the Subnet Number Lab 5 Finding the Broadcast Address and Range of Addresses in a Subnet  OSI, Ethernet, NAT , Connections Lab 6 Finding All Subnets of a Network with Less Than 8  TCP/IP Protocols, Addressing, Subnetting Subnet Bits  IOS Commands, Routes, IP Routing Table Lab 7 IP Subnet Design and Implementation  CDP & Administrative Distance Lab 8 Static and Connected Routes  Routing Protocols Lab 9 RIP Configuration  RIP, IGRP, EIGRP & OSPF  Switch & Switch Configuration ICND2 Labs  STP General, Port States, Root Bridge  VLAN Configuration, VLAN Troubleshooting, VTP Lab 1 Configuring VLANs  Configuration Registration, Password Recovery, Lab 2 VTP Servers and Clients Configuration Files, IOS Images Lab 3 RIP V1 with Split Horizon, Route Poisoning, and Poison  Standard IP ACLS, Extended IP ACLs Reverse  WAN (HDLC & PPP & ATM) Lab 4 Single Area and Multi-area OSPF Configuration  Frame Relay General & Configuration Lab 5 EIGRP Configuration and Operation Lab 6 Understanding EIGRP Metric Calculations ITTTC CCNA 640-802 Utilities CD Lab 7 NAT Overload (PAT) Lab 8 IPv6 Subnetting and Address Configuration  Boson NetSIM 6 Lab 9 PPP and CHAP Configuration  Cisco CCNA Discovery & Exploration Lab 10 Access Lists  E-books Lab 11 Access Lists II  Tools: ADSM 5.21, IP Subnet Calculator, SDM, Wildcard Calculator  CCNA 640-802 Video Mentor Labs

www.itttc.net CCNP BSCI 642-901 Building Scalable Cisco Internetworks

Chapter-0 Evolving Network Model Chapter-6 EIGRP in Scalable Networks

0.1 IIN & SONA 6.1 EIGRP Usage 0.2 Campus Network 6.2 EIGRP Scalability 0.3 Enterprise Model Chapter-7 Integrated IS-IS Chapter-1 IP Routing Principles 7.1 Integrated IS-IS Overview 1.1 Routing Fundamentals 7.2 Integrated IS-IS Operation 1.2 Routing Environment and Protocols 7.3 Configuring Integrated IS-IS 1.3 Routing Protocols and Convergence 7.4 Verifying and Troubleshooting Integrated IS-IS 1.4 Routing Table Analysis Chapter-8 Configuring BGP Chapter-2 IP Addressing 8.1 BGP Overview 2.1 IP Addressing Overview 8.2 BGP Terminology and Attributes 2.2 VLSM Fundamentals 8.3 BGP Operation 2.3 Route Summarization 8.4 BGP Configuration 2.4 CIDR Mechanism and Helper Address CS Case Study: BGP

Chapter-3 Configuring OSPF in a Single Area Chapter-9 Implementing BGP in Scalable Networks

3.1 OSPF Fundamentals 9.1 BGP Scalability Issues and Solutions 3.2 OSPF Operating Environments 9.2 Policy Control Fundamentals 3.1 Configuring OSPF in a Single Area 9.3 Multihoming 9.4 Redistributing with IGPs Chapter-4 Interconnecting Multiple OSPF Areas CS Case Study: Prefix Lists CS Case Study: Multihomed BGP 4.1 Creating Multiple OSPF Areas 4.2 OSPF Operation Across Multiple Areas Chapter-10 Network Connections 4.3 Configuring OSPF Multiarea Components 4.4 Route Summarization 10.1 Routing Protocols and Redistribution CS Case Study: Multiarea OSPF Configuration 10.2 Configuring Redistribution 10.3 Controlling Routing Update Traffic Chapter-5 EIGRP Operation and Configuration CS Case Study: Redistribution

5.1 EIGRP Fundamentals Chapter-11 Policy Based Routing Configuration 5.2 EIGRP Operation 5.3 EIGRP Configuration 11.1 Route Maps 11.2 Policy Based Routing

www.itttc.net Chapter-12 Multicasting CCNP BSCI Utilities CD

12.1 Overview of Traffic Types BSCI Labs 12.2 Multicast Addressing 12.3 Client Registration Lab-1 Configuring EIGRP 12.4 Multicast Routing Lab-2 Configuring OSPF for Multiple Areas and Frame Relay 12.5 Multicasting and Switches Nonbroadcast 12.6 Configuring your RPs Lab-3 Configuring Multihome BGP Lab-4 Configuring Multicast Chapter-13 DHCP & Configuration

Tools, Whitepapers & Exam 13.1 DHCP Overview and Addressing 13.2 Configuring DHCP  13.3 IP Helper Address and DHCP Relay Services ADSM 5.21  13.4 DHCP Verification Commands IP Subnet Calculator  13.5 Configuring DHCP Packet Tracer  Security Device Manager (SDM) Chapter-14 IPv6  Wildcard Calculator  NetSIM 6 14.1 IPv6 Overview & Address Representation  Cisco Configuration Whitepapers (17 Whitepaper) 14.2 IPv6 Header Fields  642-901 Practice Exam 14.3 IPv6 Address Types & Mobility 14.4 IPv6 Routing using OSPFv3 Cisco BSCI Flash Simulation Labs 14.5 Configuring and Verifying OSPFv3 14.6 IPv6-to-IPv4 Transition Mechanisms Lab-1 Network Discovery - Router 1 Lab-2 Network Discovery - Router 2 Lab-3 Network Discovery - Router 3 Lab-4 IP Address - Helper Command Lab-5 Configuring Single Area OSPF Lab-6 Verifying Single Area OSPF Lab-7 Configuring OSPF- NBMA Environment Lab-8 Enabling OSPF- NBMA Network Lab-9 Configure Multi-area OSPF Network Lab-10 Configure Multi-area OSPF Network II Lab-11 Stub Areas Lab-12 Totally Stubby Areas Lab-13 Not So Stubby Areas – Creation Lab-14 Virtual Links – Setup Lab-15 Virtual Links – Creation Lab-16 Redundant EIGRP - Routers A-C Lab-17 Redundant EIGRP - Routers D-E Lab-18 Redundant EIGRP - Testing

www.itttc.net Lab-19 EIGRP Across Frame - Relay I Lab-20 EIGRP Across Frame - Relay II Lab-21 Configuring BGP Lab-22 Configuring Basic BGP Lab-23 Creating a BGP Route Reflector Lab-24 BGP Route Reflection AS 100 Lab-25 BGP Route Reflection AS 100 and 300 Lab-26 BGP Route Reflection - Router C Lab-27 Configuring BGP Connection Weight Lab-28 Route Redistribution - Routers A and B Lab-29 Route Redistribution - Routers C and D Lab-30 Route Redistribution – Verification Lab-31 Modifying Redistributed Administrative Distances Lab-32 Redistribution with Route Filters Lab-33 Route Map Creation Lab-34 IGRP Integration Lab-35 Directed-Broadcast Handling

www.itttc.net www.itttc.net CCNP ONT 642-845 Optimizing Converged Cisco Networks

Chapter-0 Evolving Network Model Chapter 6 Implementing QoS Pre-Classify and Deploying End-to-End QoS 0.1 IIN & SONA 0.2 Campus Network 6.1 Implementing QoS Pre-Classify 0.3 Enterprise Model 6.2 Deploying End-to-End QoS

Chapter 1 Cisco VoIP Implementations Chapter 7 Implementing AutoQoS

1.1 Introduction to VoIP Networks 7.1 Introducing AutoQoS 1.2 Digitizing & Packetizing Voice 7.2 Implementing and Verifying AutoQoS 1.3 Encapsulating Voice Packets 7.3 AutoQoS Shortcoming and Remedies 1.4 Bandwidth Calculation 1.5 Implementing VoIP Support in Enterprise Network Chapter 8 Wireless LAN QoS, Security & Management

Chapter 2 IP QoS 8.1 Wireless LAN QoS 8.2 Wireless LAN Security 2.1 Introduction to QoS 8.3 Wireless LAN Management 2.2 Identifying and Comparing QoS Models 2.3 QoS Implementation Methods Chapter 9 Cisco Special Topics

Chapter 3 Classification, Marking & NBAR 9.1 Cisco Security Device Manager 9.2 Cisco Network Assistant 3.1 Classification and Marking 9.3 Cisco AutoQoS Animation 3.2 The DiffServ, DSCP & PHBs 9.4 Cisco IOS QoS Animation 3.3 QoS Service Class, Trust Boundaries & NBAR 9.5 Cisco QoS Solutions Configuration Guide 3.4 Configuring NBAR using IOS

Chapter 4 Congestion Management and Queuing ONT Review Scenarios

4.1 Effective Bandwidth  Cisco VoIP Implementations 4.2 Congestion Management and Queuing  IP QoS 4.3 Weighted Fair Queuing  Classification, Marking & NBAR 4.4 Class-Based Weighted Fair Queuing  Congestion Management and Queuing 4.5 Low Latency Queuing  Congestion Avoidance, Policing, Shaping, and Link 4.6 Queuing Comparison Efficiency Mechanisms  Implementing QoS Pre-Classify and Deploying Chapter 5 Congestion Avoidance, Policing, Shaping, and End-to-End QoS Link Efficiency Mechanisms  Implementing AutoQoS 5.1 Congestion Avoidance  Wireless LAN QoS, Security & Management 5.2 Traffic Shaping and Policing 5.3 Link Efficiency Mechanisms

www.itttc.net CCNP ONT Utilities CD

ONT Labs

Lab-1 Placing and Examining VoIP Calls Lab-2 Configuring CB-WFQ and LLQ Queuing Mechanisms Lab-3 Configuring Class-Based Header Compression Lab-4 Configuring LFI

Tools, Ebooks, Whitepapers

 ADSM 5.21  IP Subnet Calculator  Packet Tracer  Security Device Manager (SDM)  Wildcard Calculator  NetSIM 6  Cisco Configuration Whitepapers  Cisco ONT CBT

www.itttc.net CCNP ISCW 642-825 Implementing Secure Converged Wide Area Networks

Chapter-1 Network Conceptual Models Chapter-5 Cisco Device Hardening

1.1 IIN and SONA 5.1 Mitigating Network Attacks 1.2 Introduction to Campus Network 5.2 Disabling unused Cisco Router Network Services & 1.3 Enterprise Model Interfaces 5.3 Securing Cisco Router Installations and Administrative Chapter-2 Providing SOHO Teleworker Connectivity Access 5.4 Mitigating Threats and Attacks with Access Lists 2.1 Providing SOHO Teleworker Connectivity 5.5 Securing Management and Reporting Features 2.2 Cable Technology 5.6 Configuring AAA on Cisco Routers 2.3 DSL Technology 2.4 Layer-2 over DSL Chapter-6 Cisco IOS Threat Defenses 2.5 Configuring DSL CPE 2.6 Troubleshooting ADSL 6.1 Introducing the Cisco IOS Firewall 6.2 Configuring the Cisco IOS Firewall Chapter-3 Frame Mode MPLS 6.3 Introducing the Cisco IOS IPS 6.4 Configuring the Cisco IOS IPS 3.1 Introducing MPLS Networks 3.2 MPLS & MPLS VPN Terminology ISCW Review Scenarios 3.3 Frame Mode MPLS & CEF 3.4 MPLS Routers and MPLS Labels  Providing SOHO Teleworker Connectivity 3.5 Label Distribution and Label Tables  Frame Mode MPLS 3.6 Penultimate Hop Popping  IPSec 3.7 Configuring Frame Mode MPLS  Cisco Device Hardening 3.8 MPLS VPNs  Cisco IOS Threat Defenses 3.9 Handling Customer Routes CCNP ISCW Utilities CD Chapter-4 IPSec ISCW Labs 4.1 IPSec 4.2 Establishing an IPSec VPN Lab-1 Configuring Frame Mode MPLS 4.3 Configuring a Site-to-Site VPN using SDM Lab-2 Configuring Site-to-Site VPN 4.4 Using and Configuring GRE Tunnel with IPSec Lab-3 Securing Cisco Routers 4.5 High Availability VPNs Lab-4 Configuring an IOS Firewall 4.6 Cisco Easy VPN & Configuring VPN Client Tools, Ebooks, Whitepapers

 ADSM 5.21 / IP Subnet Calculator  Packet Tracer 5 / Security Device Manager (SDM)  Wildcard Calculator / Cisco Configuration Whitepapers  Cisco ISCW CBT / ISCW Exam

www.itttc.net www.itttc.net CCNP BCMSN 642-815 Building Cisco Multilayer Switched Networks

Chapter-1 Network Requirements Chapter-5 Enhancements to STP

1.1 IIN & SONA 5.1 Cisco Enhancements to STP 1.2 Campus Network 5.2 Rapid STP 1.3 Enterprise Model 5.3 Multiple Spanning Tree 1.4 Nonhierarchical Network Devices.ppt 5.4 EtherChannels 5.5 EtherChannel Configuration Commands Chapter-2 Basic Switch Operation 5.6 Other STP Enhancements 5.7 Troubleshooting Tips & Debug Commands 2.1 Layer-2 Switch Operation 2.2 Multi Layer Switch Operation Chapter-6 Implementing InterVLAN Routing 2.3 Switching Tables 2.4 Troubleshooting Switching Tables 6.1 Routing Considerations 6.2 Configuring Routing between VLANs Chapter-3 VLANs 6.3 Routing Configuration on a Switch 6.4 Router on a Stick Setup 3.1 VLANs 6.5 Multi Layer Switching (MLS) Overview 3.2 VLAN Implementations 6.6 MLS using CEF 3.3 VLAN Assignment 6.7 CEF Example 3.4 Trunks & Frame Tagging 3.5 VLAN Tagging Mechanisms Chapter-7 Implementing High Availability in Campus 3.6 Native VLANs Networks 3.7 VLAN Ranges, Mapping & Services 3.8 Dynamic Trunk Protocol 7.1 Introducing HSRP Part I 3.9 Configuring, Verifying & Troubleshooting Trunk 7.2 Introducing HSRP Part II Connections 7.3 Configuring HSRP 3.10 VLAN Trunk Protocol 7.4 Virtual Router Redundancy Protocol (VRRP) 3.11 Configuring, Verifying and Troubleshooting VTP 7.5 Gateway Load Balancing Protocol (GLBP) 7.6 Redundancy with Switch Chassis Part I Chapter-4 Implementing STP 7.7 Redundancy with Switch Chassis Part II

4.1 Transparent Bridging Chapter-8 Wireless LANs 4.2 Spanning Tree Protocol (STP) 4.3 STP Components & Operation 8.1 WLAN Overview 4.4 STP Algorithm 8.2 802.11 Standards 4.5 Spanning Trees 8.3 Cisco's Unified Wireless Solution 4.6 Configuring and Verifying STP 8.4 Split MAC Architecture 8.5 Wireless Security 8.6 WLAN QoS 8.7 WLAN Security 8.8 WLAN Management

www.itttc.net

Chapter-9 Configuring Campus Switches to Support BCMSN Review Scenarios Voice  Implement VLANs 9.1 Power Over Ethernet (PoE)  Conduct the operation of STPs in a hierarchical network 9.2 Configuring & Verifying PoE  Implement Inter-VLAN routing 9.3 Voice VLANs  Implement gateway redundancy technologies 9.4 Voice QoS  Describe and configure wireless client access 9.5 Diffserve QoS  Describe and configure security features in a switched 9.6 Implementing QoS for Voice network 9.7 AutoQoS  Configure support for voice 9.8 Verifying Voice QoS CCNP BCMSN Utilities CD

Chapter-10 Securing your Switch BCMSN Labs

10.1 Switch Security Lab-1 Configuring VLANs and VTP 10.2 Authentication, Authorization & Accounting (AAA) Lab-2 Routing Between VLANs 10.3 Switch Port Security Lab-3 Enabling and Optimizing HSRP 10.4 Port-based Authentication with 802.1X Lab-4 Configuring IP Telephony Support 10.5 VLAN ACLs 10.6 Private VLANs (PVLAN) Tools, Ebooks, Whitepapers 10.7 PVLAN Configuration 10.8 Mitigating Spoofing Attacks  ADSM 5.21

 IP Subnet Calculator  Packet Tracer 5  Security Device Manager (SDM)  Wildcard Calculator  Cisco Configuration Whitepapers  BCMSN CBT  BCMSN Exam

www.itttc.net Introduction to Cisco Voice over IP

Chapter-1 Introduction to Telephony Network Chapter-6 Quality of Service

1.1 Telephony Network 6.1 Effective Bandwidth 1.2 PBX vs. Key System 6.2 Configuring QoS 1.3 Signaling 6.3 Voice Priority 1.4 VoIP Network Components and Advantages 6.4 Congestion Management 6.5 Policing and Shaping Chapter-2 Digitizing Voice 6.6 Shaping Frame Relay Networks 6.7 Using Compression 2.1 Sampling 6.8 Applying AutoQoS 2.2 Nyquist Theorem 2.3 Waveform Compression Chapter-7 Unified Messaging 2.4 Voice Bandwidth Calculation 7.1 Unified Messaging Chapter-3 Preparing for a VOIP Network 7.2 Conference Calling 7.3 Call Centers 3.1 PBX Reliability 3.2 Reliability vs. Availability 3.3 Replacing PBX Trunks Cisco VoIP Case Studies 3.4 Connecting a Router to a Phone Line

3.5 Connecting a Router to a Digital Circuit  Chapter-1 VoIP Case Study 3.6 VoIP in the Home  Chapter-2 VoIP Case Study  Chapter-3 VoIP Case Study Chapter-4 Cisco Call Manager  Chapter-4 VoIP Case Study  Chapter-5 VoIP Case Study 4.1 Cisco Call Manager  Chapter-6 VoIP Case Study 4.2 CCM Roles and Redundancy  Chapter-7 VoIP Case Study 4.3 Placing Cisco CallManagers in the Network 4.4 Partitions and Calling Search Spaces Voice Bandwidth Calculators 4.5 Replacing Old Phones with IP Phones 4.6 Selecting Features for IP Phones VoIP Utilities CD 4.7 Securing Voice 4.8 Adding Video to Voice Calls  4.9 Cisco Call Manager Express VoIP Related Articles  VoIP Related Ebooks Chapter-5 Gateway Protocols  WAN Configuration Review Ebooks  Information on CCVP Certification 5.1 Gateway Protocols 5.2 H.323 5.3 Cisco’s MGCP 5.4 SIP

www.itttc.net www.itttc.net CWNP

CWNA

www.itttc.net www.itttc.net CWNA: Certified Wireless Network Administrator

Chapter-1 Introduction to Wireless LANs 5.11 WLAN Accessories: RF Pigtail Adapter Cable 5.12 WLAN Accessories: Frequency Convertors 1.1 History of WLANs 5.13 WLAN Accessories: Bandwidth Control Units 1.2 Today’s WLAN Standards 5.14 WLAN Accessories: Test Kits 1.3 Applications of WLAN Chapter-6 Wireless LAN Organizations and Standards Chapter-2 Radio Frequency (RF) Fundamentals 6.1 FCC, ISM & UNII Bands 2.1 Concepts of RF behavior 6.2 Power Output Rules & WLAN Standards 2.2 RF Terminology 6.3 WLAN Organizations 2.3 VSWR (Voltage Standing Wave Ratio) 2.4 Line of Sight Chapter-7 802.11 Network Architecture 2.5 Calculating Power 7.1 Locating a Wireless LAN Chapter-3 Spread Spectrum Technology 7.2 SSIDs 7.3 Beacons 3.1 Spread Spectrum and its applications 7.4 WLAN Scanning 3.2 Spread Spectrum Technology: FHSS 7.5 Authentication & Association 3.3 Spread Spectrum Technology: DSSS 7.6 WLAN Authentication Methods 3.4 Comparing FHSS vs. DSSS 7.7 Emerging Wireless Security Solutions 7.8 Service Sets Chapter-4 Wireless LAN Infrastructure Devices 7.9 Roaming 7.10 VPN Solutions 4.1 Wireless LAN Infrastructure devices 7.11 Power Management Features 4.2 Access Point Options 4.3 Configuration & Management Chapter-8 MAC & Physical Layers 4.4 Wireless Bridge 4.5 Wireless Workgroup Bridge 8.1 Wireless LAN Frames vs. Ethernet Frames 4.6 Wireless LAN client devices 8.2 Collision Handling 4.7 Wireless LAN gateway devices 8.3 Fragmentation 8.4 Dynamic Rate Shifting Chapter-5 Antennas and Accessories 8.5 Distributed Coordination Function 8.6 Inter-Frame Spacing 5.1 RF Antenna Types 8.7 Slot Time 5.2 RF Antenna Concepts 8.8 Communication Process 5.3 RF Antenna Installation 8.9 RTS / CTS 5.4 PoE Devices 8.10 Configuring RTS / CTS 5.5 WLAN Accessories: Amplifiers 8.11 Modulation 5.6 WLAN Accessories: Attenuators 5.7 WLAN Accessories: Lightening Arrestors 5.8 WLAN Accessories: RF Splitters 5.9 WLAN Accessories: RF Connectors 5.10 WLAN Accessories: RF Cables

www.itttc.net Chapter-9 Troubleshooting Wireless LAN Installations 10.7 Emerging Security Solutions  WEP Key Management 9.1 Multipath  Wireless VPNs 9.2 Troubleshooting Multipath  TKIP 9.3 Solutions for Multipath  AES Based Solutions 9.4 Hidden Node  Wireless Gateways  Solutions to Hidden Node Problem  802.1x & EAP 9.5 Near / Far

9.6 System throughput 10.8 Corporate Security Policy 9.7 Co-location 10.9 Security Recommendations 9.8 Types of Interference

 Narrow band Interference Chapter-11 Site Survey Fundamentals  All band interference  RF Signal Degradation & Interference 11.1 What is a Site Survey?  Adjacent Channel & Co-Channel Interference 11.2 Preparing for a Site Survey 9.9 Range Considerations 11.3 Site Survey Equipment 11.4 Conducting a Site Survey Chapter-10 WLAN Security 11.5 Site Survey Reporting

10.1 WLAN Security IEEE 802.16 WIMAX Technology 10.2 WEP (Wired Equivalent Privacy)

10.3 Solutions to WEP Weakness  WIMAX Overview  WEP Keys  Introduction to WIMAX  Static WEP Keys  How WIMAX Works  Centralized Key Server  What can WIMAX do  WIMAX Cost 10.4 AES (Advanced Encryption Standard)  WIMAX Scenario 10.5 Filtering  By SSID IEEE 802.11n Standard  By MAC Address  802.11n Overview  By Protocol  802.11n MIMO  802.11n Linksys Products 10.6 Attacks on WLANs  Passive  Active  Jamming  Man in the Middle

www.itttc.net Wimax & 802.11n Products  WLAN Scanning  Emerging Wireless Security Solutions  D-Link Range Boosters  VPN Solutions  D-Link Power over Ethernet (PoE)  Power Management Features  D-Link WIFI Phone  Dynamic Rate Shifting  D-Link VoIP Router  RTS / CTS  D-Link Wireless Router  Modulation  D-Link MIMO Devices  Multipath  Proxim WIMAX  Hidden Node  Solectek WIMAX  WEP  Passive Attacks on Wireless LANs Linksys Products Demo and Wireless LAN Policy  WEP Key Management  Site Survey Equipment  Linksys Products Description  Linksys Products Demo CWNA Additional Features  Configuring Wireless LAN Policy in Server 2003

 Wireless LAN Articles CWNA Wireless LAN Labs  CWNA Labs  Wireless E-Books  Today’s WLAN Standards  Linksys Products  Concepts of RF behavior  Wireless Tools (Netstumbler)  Comparing FHSS vs. DSSS  Access Point Options  Wireless Bridge  Wireless Workgroup Bridge  Wireless LAN client devices  Wireless LAN gateway devices  RF Antenna Types  PoE Devices  WLAN Accessories: Amplifiers  WLAN Accessories: Attenuators  WLAN Accessories: Lightening Arrestors  WLAN Accessories: RF Splitters  WLAN Accessories: RF Connectors  WLAN Accessories: RF Cables  WLAN Accessories: RF Pigtail Adapter Cable  WLAN Accessories: Frequency Convertors  WLAN Accessories: Bandwidth Control Units  WLAN Accessories: Test Kits  WLAN Organizations

www.itttc.net www.itttc.net