CCNP ISCW www.itttc.net A+ 220-601 ﻪﻣﺎﻧﺮ ﺷزﻮﻣﺑﻲ دﺎﻬﻨﺸﻴﭘآي
Network+ 2009 (N10-004)
CCNA 640-802 (R & S)
CCNP MCSA MCITP MCITP 4 Classes MCSE Server Enterprise MCSE Administrator Administrator Security ITTTC 70-620 ITTTC BSCI (642-901) CWNA 70-640 70-640 Cisco VoIP CCNA ONT (642-845) 70-270 640-721 70-642 70-642 640-460 Security ISCW (642-825) 70-290 70-646 70-643 640-553 BCMSN (642-812) 70-291 CCNA 70-647 CCNA Voice Security+ Wireless
70-293 MCITP 70-294 MCITP Enterprise 70-298 Database Messaging Administrator Administrator CCVP CCSP 70-350 5 Classes 5 Classes 70-431 70-236 70-443 70-237 70-444 70-238
www.itttc.net www.itttc.net CompTIA
A+ Essentials Network+ 2007 Security+ 2007
www.itttc.net www.itttc.net CompTIA 220-601 A+ Essentials
Chapter-1 Personal Computer Components Chapter-6 Security
1.1 PC Components Part I 6.1 Security Part I 1.2 PC Components Part II 6.2 Security Part II 1.3 PC Components Part III 6.3 Install & Configure & Upgrade and Optimize Security 1.4 Install, Configure & Optimize PC Components Part I 6.4 Preventative Maintenance for Computer Security 1.5 Install, Configure & Optimize PC Components Part II 1.6 Identify Tools and Diagnostics for PC Components Part I Chapter-7 Safety and Environmental Issues 1.7 Identify Tools and Diagnostics for PC Components Part II
1.8 Performing Preventive Maintenance on PCs 7.1 Perform Preventative Maintenance for Computer Security Chapter-2 Laptops and Portable Devices 7.2 Hazards & Safety Procedures 7.3 Identify Disposal Procedures 2.1 Principals of Laptops and Desktop Devices 2.2 Upgrade and Optimize Laptops and Portable Devices Chapter-8 Professionalism and Communication 2.3 Identify Tools and Diagnostic Procedures
2.4 Preventative Maintenance for Laptops and Portable 8.1 Use Good Communication Skills Devices 8.2 Use Appropriate Job-Related Behavior
Chapter-3 Operating Systems Appendix-A New Technologies
3.1 Operating Systems Fundamentals Animations 3.2 Installing and Configuring Operating Systems
3.3 Troubleshooting Operating Systems Part I A1 Public Key Encryption 3.4 Troubleshooting Operating Systems Part II A2 IP Addressing & Classes 3.5 Preventative Operating System Maintenance A3 Wireless LANs A4 Fiber Optic Cabling Chapter-4 Printers and Scanners A5 Disk Mirroring, Duplexing & Stripping
4.1 Printer Technologies Wireless Technologies 4.2 Scanners and Communication Types 4.3 Installing & configuring & upgrading printers and scanners A6 Wireless Networking Organizations 4.4 Troubleshooting Printers and Scanners A7 WiMax Overview A8 802.11n Overview Chapter-5 Networks A9 D-Link WLAN Products A10 Linksys WLAN Products 5.1 Networking Fundamentals Part I A11 WLAN Security Protocols 5.2 Networking Fundamentals Part II 5.3 Install & configure & optimize and upgrade networks 5.4 Troubleshooting Networks
www.itttc.net Appendix-B Networking Topics Windows Vista Ultimate Lessons & Labs
B1 Internetworking Overview Lab 3.1 Windows Vista Overview B2 OSI Model Lab 3.2 Getting Around Windows Vista B3 Ethernet Networks Lab 3.3 Installing Windows Vista Ultimate Edition B4 Ethernet Cabling Lab 3.4 Taskbar, Start Menu, Activation, Recycle Bin B5 Network Domains Lab 3.5 Taskbar & Start Menu & Control Panel Overview B6 Ethernet Addressing Lab 3.6 Control Panel & Disk Cleanup B7 Cisco Routers Lab 3.7 Customizing Start Menu, Searching & Windows Gadgets Lab 3.8 Event Viewer Windows XP Labs A+ 220-601 Utilities CDs Lab 1.1 Installing Windows XP SP2 Lab 1.2 System Properties Ebooks Lab 1.3 Printing A+ 220-601 Exam Lab 1.4 Authentication A+ Videos Lab 1.5 Display & Device Properties VMWare Workstation Software Lab 1.6 Accessibility VMWare Workstation Software Training in Farsi Lab 1.7 Screen Effects Lab 1.8 Display Resolution Lab 1.9 Device Manager & Add Hardware Wizard Lab 1.10 Hardware Profiles Lab 1.11 Power Options Lab 1.12 TCP/IP Addressing & IPCONFIG Lab 1.13 Backup & Restore Lab 1.14 System Restore & Safe Mode Lab 1.15 Performance Options & Task Manager
Windows Server 2003 Labs
Lab 2.1 Installing Server 2003 Enterprise Edition Lab 2.2 MMC & Computer Management Console Lab 2.3 Disk Defragmenter Lab 2.4 Printing Lab 2.5 Compression & Encryption Lab 2.6 Automated System Recovery Lab 2.7 Device Manager, Hardware & Resources Lab 2.8 Automatic Updates
www.itttc.net CompTIA Network+ 2007
Chapter-1 Introduction to Networking Chapter-7 Survey of Network Operating Systems
1.1 What is a Network? 7.1 Network Operating Systems 1.2 Network Configuration Overview 7.2 UNIX 1.3 Network Components 7.3 Novel Netware Integration
Chapter-2 Network Communications & OSI Layers Chapter-8 Wide Area Networking
2.1 Network Communications & OSI Layers 8.1 Switching Methods 8.2 Cell Switching Chapter-3 Introduction to Server 2003 & TCP/IP 8.3 Using the Digital Telephone with ISDN 8.4 DSL 3.1 The Five Flavors of Server 2003 8.5 Cable Modem 3.2 Windows 2003 Networking Models 8.6 Using Fiber Optics with FDDI 3.3 Installation Types 8.7 Frame Relay 3.4 Network Addressing & TCP/IP 8.8 T-Carrier System 3.5 TCP/IP Addressing 8.9 SONET 3.6 TCP/IP Troubleshooting Tools 3.7 TCP/IP Subnetting Chapter-9 Network Services & Support 3.8 Network Traffic 3.9 Introduction to NAT 9.1 Name Resolution 3.10 Other TCP/IP Protocols 9.2 DHCP 9.3 WINS Chapter-4 Network Communication & Network 9.4 DNS Connectivity Devices 9.5 IP Configuration in Microsoft Windows 9.6 Network Troubleshooting 4.1 Data Communication & Signals 4.2 Modems Chapter-10 Networking with Remote Clients & Servers & 4.3 Expanding a Network Using Components Network Security
Chapter-5 IEEE Standards, Physical Media, Wireless 10.1 Remote Node Technologies & Network Layout Design 10.2 Terminal Server 10.3 IPSec 5.1 IEEE Standards 10.4 VPN 5.2 Physical Media 10.5 Trust Relationships 5.3 Wireless Technologies 10.6 Firewalls 5.4 Network Layout Design Chapter-11 Network Configuration Chapter-6 Networking Architectures 11.1 VLAN 6.1 Networking Architectures (Ethernet) 11.2 Disaster Recovery 6.2 Token Ring Architecture 11.3 SOHO 6.3 AppleTalk & ArcNet www.itttc.net Chapter-12 IPv6 Overview & Cisco 3-Layer Hierarchy Chapter-18 WAN Overview, Frame Relay & ISDN
12.1 IPv6 Overview 18.1 WAN Overview 12.2 Cisco 3-Layer Hierarchy 18.2 Introduction to Frame Relay 12.3 Fast Switching vs. Process Switching 18.3 ISDN Overview 18.4 ISDN Types Cisco CCNA & Wireless LAN Topics 18.5 ISDN Functional Groups and Reference Points 18.6 ISDN Standards
Chapter-13 Introduction to Cisco Internetworking 18.7 ISDN & Cisco Routers
13.1 Internetworking Chapter-19 Introduction to Wireless LANs 13.2 OSI Model 13.3 Ethernet Networks 19.1 History of Wireless LANs 13.4 Ethernet Cabling 19.2 Today's Wireless LAN Standards 13.5 Network Domains 19.3 Applications of Wireless LANs 13.6 Ethernet Addressing 19.4 Wireless Networking Standards 13.7 Cisco 3-Layer Hierarchical Model 19.5 Radio Frequency Spectrum 13.8 Ethernet Framing 19.6 FHSS vs. DSSS
Chapter-14 IP Addressing, Subnetting, VLSM & NAT Windows XP Service Pack 2 Lessons
14.1 IP Addressing Overview 1. Hardware Requirements 14.2 Subnetting Overview 2. Simple File Sharing 14.3 VLSM Overview 3. User and Group Accounts 14.4 Network Address Translation 4. Configuring and Managing User Profiles 5. Hardware Chapter-15 Static vs. Dynamic Routing & RIP 6. Disk Storage 7. Configuring and Troubleshooting TCP/IP Part I 15.1 Distance Vector vs. Link State Routing 8. Windows XP Backup 15.2 RIP Windows Server 2003 Enterprise Lessons Chapter-16 Ethernet, Switch Function & Switch Types 1. Windows Server 2003 Networking Models 16.1 Ethernet Overview 2. Disk Types 16.2 Switch vs. Bridge 3. Using Saved Queries 16.3 Switch Function 4. Server 2003 Printing Terminology 16.4 Switch Function Example #1 5. Authentication 16.5 LAN Switch Types 6. Backup & Restore 7. Group Policy Chapter-17 Introduction to STP & VLANs 8. Device Manager
17.1 Spanning Tree Protocols 17.2 Introduction to VLANs
www.itttc.net Windows Vista Lessons Networking Animations
1. Windows Vista Overview A1 Backbone & Segments 2. Getting Around Windows Vista A2 Bridges vs. Switches 3. Automated Help & Support A3 Physical Topologies 4. Customizing the Desktop & Interface A4 LANs, MANs & WANs 5. Installing and Maintaining Programs A5 Wireless LANs 6. Understanding User & Group Accounts A6 Fiber Optic Cabling 7. Windows Mobility Center A7 Network Cables 8. Configuring User and Computer Policies A8 Mirror Volume A9 Public Key Encryption Introduction ISA Server 2004 Lessons A10 IP Spoofing A11 Proxy Server ISA Server Capabilities & Operation A12 DMZ (Demiliterized Zone) ISA Server 2004 vs. other Firewall Products A13 Access Control Lists ISA Server 2004 Lab A14 PPTT/VPN Servers A15 IP Address Classes
Introduction to Cisco VoIP Lessons A16 Making a Patch Cable (Steps) A17 RJ-45, AUI, Patch Panel & CAT-5 A18 Cisco Three Layer Hierarchy & Cisco Products Telephony Networks, Components & PSTN A19 OSI Model PBX vs. Key Systems A20 OSI Layers VoIP Network Components & Advantages A21 Checking Router Cabling A22 Cisco Routers A23 TCP/IP Windowing Cisco CCNA Router & Switch Labs A24 Layer-2 Switch Functionality A25 Layer-2 Switch Responsibilities CCNA-Lab-1 Basic Router Configuration CCNA-Lab-2 Routing in Two Subnets Packet Tracer Labs CCNA-Lab-3 Routing in Four Subnets CCNA-Lab-4 PC to PC Comm. using Cisco 2950 Switch P1 PC to PC Communication CCNA-Lab-5 Configuring Cisco Discovery Protocol P2 Single Device: Hub CCNA-Lab-6 LAN Switching using Two Cisco 2950 Switches P3 Single Device: Switch P4 Single Device: Router P5 Multiple Devices: Multiple Hubs P6 Multiple Devices: Multiple Switches P7 Multiple Devices: Multiple Routers P8 Mixed Environement (Hubs, Switches, Routers)
www.itttc.net Windows XP Labs Network+ 2007 Utilities CD
XP-1 Installing Windows XP SP2 E-books XP-2 System Properties Packet Tracer XP-3 Printing NetSIM XP-4 Authentication Subnet XP-5 Display & Device Properties Wildcard Calculator XP-6 Accessibility Network+ Exam XP-7 Screen Effects VMWare Workstation Software XP-8 Display Resolution VMWare Workstation Software Training in Farsi XP-9 Device Manager & Add Hardware Wizard XP-10 Hardware Profiles
Windows Server 2003 Enterprise Labs
Server-1 Installing Server 2003 Server-2 APIA & IPCONFIG Server-3 Loopback Test & PING Server-4 Administrative Tools Server-5 Event Viewer Server-6 Service Console Server-7 System Properties Server-8 Network Connection Types
Windows Vista Ultimate Labs
Vista-1 Installing Windows Vista Ultimate Edition Vista-2 Taskbar & Start Menu Vista-3 Password Reset Disk Vista-4 System Startup and Recovery & System Configuration Vista-5 Taskbar & Start Menu & Control Panel Vista-6 Control Panel & Disk Cleanup Vista-7 Device Manager & Performance Options Vista-8 Local Area Connection Properties & TCP/IP Configuration
www.itttc.net CompTIA Security+
Chapter 1 General Networking and Security Concepts Chapter 6 Application Security
1.1 The Big Picture 6.1 E-mail Security 1.2 Identifying Threats 6.2 Web Security 1.3 Intrusion Points 6.3 File Transfer 1.4 Defending against Threats 1.5 Organizational and Operational Security Chapter 7 User Security
Chapter 2 TCP/IP Basics 7.1 Understanding Authentication 7.2 Understanding Access Control Models 2.1 TCP/IP Layers and Vulnerabilities Chapter 8 Security Baselines Chapter 3 Certificate Basics 8.1 Network Device and Operating System Hardening 2.1 Understanding & Using Cryptography 8.2 Server Application Hardening 2.2 Types of Protected Integrity 2.3 Identifying the components of a Public Key Infrastructure Chapter 9 Operational Security 2.4 Certificate Authorities 2.5 Understanding Certificate Life Cycle and Key 9.1 Physical Security Management 9.2 Privilege Management 2.6 Supplement #1 & Summary 9.3 Removable Media 9.4 Protecting Business Continuity Chapter 4 Network Infrastructure Security Chapter 10 Organizational Security 4.1 Securing Network Cabling 4.2 Securing Connectivity Devices 10.1 Documentation 4.3 Firewalls 10.2 Risk Assessment 4.4 Remote Access 10.3 Security Education 4.5 Telecommunications Hacking 4.6 Wireless Network Chapter 11 Incident Detection and Response 4.7 NAT 4.8 VLAN 11.1 Attacks and Malicious Code 4.9 Protecting Mobil Devices 11.2 Intrusion Detection Systems 4.10 Implementing IDS & using Honeypots and Honeynets 11.3 Incident Response
Chapter 5 Communications Security
5.1 Understanding Remote Access Connectivity 5.2 Providing Secure Remote Access 5.3 Understanding Wireless Standards and Protocols
www.itttc.net Appendix-A Security Topics & Security Tools Robocopy.exe: Robust File Copy Utility Rpcdump.exe: RPC Dump Cisco Security Topics Parts I, II, III Sc.exe: Service Controller Tool Sclist.exe Cisco Router Passwords Setspn.exe: Manipulate Service Principal Names for Standard IP ACLs Accounts Extended IP ACLs Showacls.exe Switch CAM Table Showpriv.exe: Show Privilege Static MAC Address Shutdown.exe: Remote Shutdown Port Security for 1900/2500 series switches Srvany.exe: Applications as Services Utility Cisco Discovery Protocol Srvcheck.exe CDP Commands Srvinfo.exe Su.exe Server 2003 Security Topics Subinacl.exe Uptime.exe Server 2003 Security Settings Lab Vadump.exe: Virtual Address Dump Whoami.exe Server 2003 Resource Kit Security Tools (37 Tools) Xcacls.exe
Auditpol.exe: Audit Policy Internet Top 75 Security Tools Clearmem.exe: Clear Memory
Drivers.exe: List Loaded Drivers Nessus Dsstore.exe: Directory Services Store Ethereal Dumpel.exe: Dump Event Log Snort Efsinfo.exe: Encrypting File System Information Netcat Findgrp.exe: Find Group TCPDump/WinDump Getmac.exe: GetMAC Hping2 Getsid.exe DSniff Gettype.exe: Get Type Version Information GFI LANguard Ipsecpol.exe: Internet Protocol Security Policies Tool Ettercap Kerbtray.exe: Kerberos Tray Whisker/LibWhisker Klist.exe: Kerberos List John the Ripper Logoff.exe OpenSSH / SSH Ntrights.exe Sam Spade Pulist.exe ISS Internet Scanner Regback.exe: Registry Backup Tripwire Regdmp.exe Nikto Regfind.exe Kismet Regini.exe: Registry Change by Script SuperScan Regrest.exe: Registry Restoration L0phtCrack 4 Retina www.itttc.net Netfilter Authentication Protocols Fport Encryption SAINT Windows Firewall Network Stumbler Security Under SP2 SARA N-Stealth Appendix-C Server 2003 Security Topics AirSnort NBTScan Security Framework GnuPG /PGP Segmenting Networks Firewalk Encryption Authentication Cain & Abel PKI XProbe2 Auditing SolarWinds Toolsets IPSec NGrep Securing IIS Web Sites Perl / Python RRAS IAS THC-Amap Securing Wireless Networks OpenSSL NTop ISA Server Lab Nemesis LSOF ISA Server 2004 Overview Lab Honeyd Appendix-D: Windows Vista Ultimate Security Topics Achilles Brutus User & Security Groups Stunnel Local Logon Paketoo Keiretsu Stored Passwords Fragroute Managing Local User Accounts and Groups Spike Proxy Managing Remote Access to Workstations THC-Hydra File Security and Resource Sharing ISA Server 2004 Overview Basic/Special Permissions File Ownership/ Inheritance ISA Server 2004 Capabilities Effective Permissions ISA Server 2004 Operation Sharing Files & Folders over the Network Public Folder Sharing
Appendix-B Windows XP SP2 Security Topics Vista Networking Features TCP/IP and Dual IP Stack Authentication Diagnosing and Resolving Problems Security Optimizing and Safeguarding Disk Drives Data Compression Windows Security Center Windows Firewall Data Encryption Windows Defender Configuring & Troubleshooting TCP/IP Automatic Updates Task Manager Reliability and Performance Monitor www.itttc.net
11 Categories of Shareware Security Tools Security+ Utilities CD
Crytp E-books Email Antispam Freeware Security Tools File Encryption Windows Security Tools File Wiping VMWare Workstation Software IP Address Tools VMWare Workstation Software Training in Farsi Network Info Tools Security+ Exam Network Monitoring Networking Tools Other Tools Password Dictionaries Personal Firewalls
Appendix-E WLAN Security Topics
WLAN Security WEP (Wired Equivalent Privacy) Solutions to WEP Weaknesses AES (Advanced Encryption Standard) Filtering Attacks on Wireless LANs Emerging Security Solutions Corporate Security Policy Security Recommendations
www.itttc.net Microsoft
MCSA MCSE MCSE Security
www.itttc.net www.itttc.net MCSA / MCSE 70-270 Windows XP Professional SP2
Chapter-1 Installing and Deploying Windows XP 4.6 Multiple Language Support & Regional Options Professional 4.7 Files Settings and Transfer Wizard 4.8 Accessibility Options 4.9 Advanced Video Display Options 1.1 Hardware Requirements 4.10 Fax Features & Scheduled Tasks 1.2 Upgrading to Windows XP Professional 1.3 Installation Options for Windows XP Professional Chapter-5 Installing, Configuring, and 1.4 Joining a Workgroup or Domain 1.5 Using USMT and FAST Wizard Troubleshooting Hardware Devices and 1.6 Deploying Service Packs Drivers 1.7 Automatic and Dynamic Updates 1.8 Product Activation 5.1 Hardware 1.9 Troubleshooting Failed Installation 5.2 Device Drivers, Drive Signing & using Devices 5.3 Wireless Networking Support Chapter-2 Establishing, Configuring, and Managing 5.4 Video Display Resources 5.5 Removable Storage Support 5.6 Upgrading a System from One to Two Processors
2.1 Simple File Sharing 5.7 Mobile Computing 2.2 Shared Folders 5.8 Managing Hardware Profiles 2.3 Access to Files and Folders 5.9 Power Management Support 2.4 Managing and Troubleshooting Web Server Resources 5.10 Managing Card Services 2.5 Printing Concepts Chapter-6 Implementing, Managing, and Chapter-3 Setting Up, Managing, and Troubleshooting Disk Storage Troubleshooting Security Accounts and Policies 6.1 Disk Storage 6.2 Partitions vs. Volumes 3.1 User and Group Accounts 6.3 File Systems & Disk Quotas 3.2 Authentication 6.4 Data Compression & Encryption 3.3 Managing Domain User Accounts 3.4 GPO and RSoP Chapter-7 Implementing, Managing, and 3.5 Security Troubleshooting Network Protocols and Services Chapter-4 Implementing and Managing User and Desktop Settings 7.1 Configuring and Troubleshooting TCP/IP Part I 7.2 Configuring and Troubleshooting TCP/IP Part II 4.1 Configuring and Managing User Profiles 7.3 Novel Netware & UNIX Connectivity 4.2 Using Offline Files 7.4 Network Bridging 4.3 Configuring & Troubleshooting Desktop Settings 7.5 Windows Messenger 4.4 Troubleshooting and System Settings 7.6 Remote Desktop & Remote Assistance 4.5 Windows Installer Service
www.itttc.net Chapter-8 System Monitoring, Performance Chapter-3 Labs Optimization, and Recovery Features Lab 3.1 User and Group Accounts 8.1 Windows XP Backup Lab 3.2 Authentication 8.2 Volume Shadow Copy Technology Lab 3.3 Managing Domain User Accounts 8.3 Troubleshooting and Repairing Windows XP Lab 3.4 GPO and RSoP Professional Systems Lab 3.5 Security 8.4 Measuring and Managing Performance 8.5 Task Manager & Monitoring Event Logs Chapter-4 Labs
Chapter-9 Installing, Administering, and Lab 4.1 Configuring and Managing User Profiles Troubleshooting Remote Access Services Lab 4.2 Using Offline Files Lab 4.3 Configuring & Troubleshooting Desktop Settings
9.1 Authentication Protocols Lab 4.6 Multiple Language Support & Regional Options 9.2 Encryption Lab 4.7 Files Settings and Transfer Wizard 9.3 Connecting to Remote Access Servers Lab 4.8 Accessibility Options 9.4 Configuring Windows Firewall Lab 4.9 Advanced Video Display Options 9.5 Configuring and Troubleshooting ICS 9.6 Security Under SP2 Chapter-5 Labs
Lab 5.1 Hardware Windows XP Professional SP2 Labs Lab 5.2 Device Drivers, Drive Signing & using Devices Lab 5.3 Wireless Networking Support Lab 5.4 Video Display Chapter-1 Labs Lab 5.8 Managing Hardware Profiles Lab 5.9 Power Management Support Lab 1.3 Installation Options for Windows XP Professional Lab 1.4 Joining a Workgroup or Domain Chapter-6 Labs Lab 1.5 Using USMT and FAST Wizard Lab 1.7 Automatic and Dynamic Updates Lab 6.1 Disk Storage
Chapter-2 Labs Lab 6.2 Partitions vs. Volumes Lab 6.3 File Systems & Disk Quotas Lab 6.4 Data Compression & Encryption Lab 2.1 Simple File Sharing Lab 2.2 Shared Folders Lab 2.3 Access to Files and Folders Chapter-7 Labs Lab 2.4 Managing and Troubleshooting Web Server Resources Lab 7.2 Configuring and Troubleshooting TCP/IP Part II Lab 2.5 Printing Concepts Lab 7.5 Windows Messenger Lab 7.6 Remote Desktop & Remote Assistance
www.itttc.net Chapter-8 Labs 70-270 Additional Features E-book Lab 8.1 Windows XP Backup 70-270 Exam Lab 8.2 Volume Shadow Copy Technology Tool: USMT 3.0 Lab 8.3 Troubleshooting and Repairing Windows XP Professional Systems ITTTC Utilities CD Lab 8.4 Measuring and Managing Performance Lab 8.5 Task Manager & Monitoring Event Logs Windows Vista Ultimate Lessons and Lab Chapter-9 Labs VMWare Workstation Software VMWare Workstation Software Training in Farsi Lab 9.1 Authentication Protocols Windows XP Service Pack 3 Information Lab 9.2 Encryption Windows XP Animations Lab 9.3 Connecting to Remote Access Servers Lab 9.4 Configuring Windows Firewall Lab 9.5 Configuring and Troubleshooting ICS Lab 9.6 Security Under SP2
www.itttc.net www.itttc.net MCSA / MCSE 70-290 Server 2003 Environment Management and Maintenance
Chapter-1 Introduction to Windows Server 2003 & 4.9 Managing printing from the command line Active Directory Chapter-5 Windows 2003 Security 1.1 Windows 2003 Networking Models 5.1 Authentication 1.2 Installation Types 5.2 Cryptography 1.3 What is a Directory? Active Directory 5.3 Encrypting File System (EFS) 1.4 MMC 5.4 Security Configuration Tools 1.5 Administrating User Accounts 5.5 Auditing in Server 2003 1.6 Server 2003 Groups 1.7 User Profiles Chapter-6 Backup and Restore & Managing Data 1.8 Account Policies Storage
Chapter-2 Server 2003 File System, Disks Shared 6.1 Backup & Restore Folders, NTFS Permissions 6.2 ASR 6.3 Shadow Copies of Shared Folders 2.1 Disk Types 6.4 NTFS Compression 2.2 Windows 2003 File Systems 6.5 Disk Quota 2.3 Using NTFS Mounted Drives 2.4 Shared Folders Chapter-7 Group Policy 2.5 NTFS Permissions
2.6 NTFS Partitions 7.1 What is Group Policy? 2.7 Disk Defragmenter 7.2 SW Deployment Methods using Group Policy 2.8 Disk Management Commands 7.3 RSoP (Resultant Set of Policy) 7.4 Group Policy Management Console (GPMC) Chapter-3 Active Directory Part II Chapter-8 Devices, Drivers, Automatic Updates & 3.1 Saved Queries Software Update Service 3.2 Active Directory Command Line Tools 3.3 Operations Master Roles 8.1 Device Manager 8.2 Driver Signing Chapter-4 Setting up and Configuring Printers in 8.3 System Update Features Server 2003 8.4 Software Update Services
4.1 Server 2003 Printing Terminology Chapter-9 Administrative Tools Remote Desktop & 4.2 Network Printing Requirements System Monitor Performance Logs & Alerts 4.3 Guidelines for Network Printing 4.4 Adding other types of printers 9.1 Server 2003 Tools 4.5 Internet Printing 9.2 Remote Connections 4.6 Configuring Network Printers 9.3 System Monitor & Performance Logs & Alerts 4.7 Print Spooler 9.4 Tuning System Performance 4.8 Printer Administration www.itttc.net Chapter-10 Domains/Forests Functional Levels & Chapter-3 Labs IIS 6.0 Lab 3.1 Saved Queries 10.1 Domain & Forest Functional Levels Lab 3.2 Active Directory Command Line Tools 10.2 IIS 6.0 Lab 3.3 Operations Master Roles 10.3 FTP Chapter-4 Labs Chapter-11 Terminal Services Lab 4.4 Adding other types of printers 11.1 Terminal Services Overview Lab 4.5 Internet Printing 11.2 Terminal Services Benefits Lab 4.6 Configuring Network Printers 11.3 Using Terminal Server to host applications centrally Lab 4.7 Print Spooler 11.4 Terminal Services Administrative Tools Lab 4.8 Printer Administration 11.5 Managing TS from the Command Line Lab 4.9 Managing printing from the command line 11.6 TS Client Overview 11.7 TS Client Features Chapter-5 Labs 11.8 TS Licensing Overview 11.9 TS Licensing Modes Lab 5.1 Authentication 11.10 TS Troubleshooting Lab 5.2 Cryptography Lab 5.3 Encrypting File System (EFS) 70-290 Server 2003 Environment Labs Lab 5.4 Security Configuration Tools Lab 5.5 Auditing in Server 2003 Chapter-1 Labs Chapter-6 Labs Lab 1.1 Windows 2003 Networking Models Lab 1.2 Installation Types Lab 6.1 Backup & Restore Lab 1.3 What is a Directory? Active Directory Lab 6.2 ASR Lab 1.4 MMC Lab 6.3 Shadow Copies of Shared Folders Lab 1.5 Administrating User Accounts Lab 6.4 NTFS Compression Lab 1.6 Server 2003 Groups Lab 6.5 Disk Quota Lab 1.7 User Profiles Lab 1.8 Account Policies Chapter-7 Labs
Chapter-2 Labs Lab 7.1 What is Group Policy? Lab 7.2 SW Deployment Methods using Group Policy Lab 7.3 RSoP (Resultant Set of Policy) Lab 2.1 Disk Types Lab 7.4 Group Policy Management Console (GPMC) Lab 2.3 Using NTFS Mounted Drives Lab 2.4 Shared Folders Lab 2.5 NTFS Permissions Lab 2.7 Disk Defragmenter Lab 2.8 Disk Management Commands
www.itttc.net Chapter-8 Labs 70-290 Additional Features E-book Lab 8.1 Device Manager 70-290 Exam Lab 8.2 Driver Signing Tools Lab 8.3 System Update Features Lab 8.4 Software Update Services ITTTC Utilities CD
Chapter-9 Labs Windows Vista Ultimate Lessons and Lab VMWare Workstation Software Lab 9.1 Server 2003 Tools VMWare Workstation Software Training in Farsi Lab 9.2 Remote Connections Windows XP Service Pack 3 Information Lab 9.3 System Monitor & Performance Logs & Alerts Windows XP Animations Lab 9.4 Tuning System Performance
Chapter-10 Labs
Lab 10.1 Domain & Forest Functional Levels Lab 10.2 IIS 6.0 Lab 10.3 FTP
Chapter-11 Labs
Lab 11.3 Using Terminal Server to host applications centrally Lab 11.4 Terminal Services Administrative Tools Lab 11.5 Managing TS from the Command Line Lab 11.7 TS Client Features Lab 11.9 TS Licensing Modes
www.itttc.net www.itttc.net MCSA / MCSE 70-291 Server 2003 Network Infrastructure I
Chapter-1 Understanding Server 2003 Networks Chapter-7 Configuring DHCP Servers & Clients
1.1 Understanding Network Infrastructures 7.1 Introducing DHCP 1.2 Networking with Default Components in Server 2003 7.2 DHCP Terminology 1.3 Extending a Server 2003 Network Infrastructure 7.3 DHCP Options 7.4 DHCP Database Chapter-2 Understanding TCP/IP 7.5 Configuring DHCP Relay 7.6 Managing DHCP 2.1 Understanding TCP/IP 7.7 Managing DHCP Database 2.2 Understanding IP Addressing 7.8 DHCP Option Classes 2.3 Subnetting & Supernetting IP Networks 7.9 Configuring DHCP Servers to Perform DNS Updates 2.4 Installing & Configuring TCP/IP Chapter-8 Monitoring & Troubleshooting DHCP Chapter-3 Monitoring & Troubleshooting TCP/IP Connections 8.1 DHCP Messages 8.2 Monitoring DHCP Through Audit Logging 3.1 Analyzing Traffic using Network Monitor 8.3 DHCP Performance Monitoring 3.2 Troubleshooting TCP/IP Connections 8.4 Troubleshooting DHCP
Chapter-4 Configuring DNS Servers & Clients Chapter-9 Routing with Server 2003
4.1 Understanding Name Resolution in Server 2003 9.1 Configuring Windows Server 2003 for LAN Routing 4.2 Understanding DNS in Server 2003 Networks 9.2 Configuring RRAS 4.3 Deploying DNS Servers 9.3 Configuring Demand-Dial Routing 4.4 Deploying DNS Clients 9.4 Example of Configuring Demand-Dial Routing 9.5 NETSH Commands for RAS Chapter-5 Implementing a DNS Infrastructure 9.6 Configuring NAT Part 1 9.7 Configuring NAT Part 2 5.1 Configuring DNS Server Properties 9.8 Internet Connection Sharing 5.2 Configuring Zone Properties & Transfers 9.9 Configuring and Managing Routing Protocols 5.3 Configuring Advanced DNS Server Properties 9.10 RIP for IP Security 5.4 Creating Zone Delegations 9.11 Configuring RIP for IP Router 5.5 Deploying Stub Zones 9.12 OSPF 9.13 Configuring Packet Filters Chapter-6 Monitoring & Troubleshooting DNS Chapter-10 Configuring and Managing Remote Access 6.1 Using DNS Troubleshooting Tools 6.2 Using DNS Monitoring Tools 10.1 Configuring Remote Access Connections 10.2 Authorizing Remote Access Connections 10.3 Implementing VPNs 12.1 Introduction to IAS
www.itttc.net 10.4 Installing and Configuring the IAS Chapter-4 Labs 10.5 Configuring RRAS and IAS 10.6 Configuring IAS Lab 4.3 Deploying DNS Servers Lab 4.4 Deploying DNS Clients Chapter-11 Managing Network Security Chapter-5 Labs 11.1 Introduction to Security Protocols & Security Templates 11.2 IPSec and Levels of Security Lab 5.1 Configuring DNS Server Properties 11.3 IPSec Rules Lab 5.2 Configuring Zone Properties & Transfers 11.4 Checking IPSec Functionality Lab 5.3 Configuring Advanced DNS Server Properties 11.5 IPSec Security Protocols & Modes of Operation Lab 5.4 Creating Zone Delegations 11.6 IPSec Components Lab 5.5 Deploying Stub Zones 11.7 IPSec Phases of Operation 11.8 Description of IPSec Policy Chapter-6 Labs 11.9 IPSec Tools 11.10 Troubleshooting Network Protocol Security Lab 6.1 Using DNS Troubleshooting Tools Lab 6.2 Using DNS Monitoring Tools Chapter-12 Maintaining a Network Infrastructure Chapter-7 Labs 12.2 Monitoring Network Performance 12.3 Troubleshooting Internet Connectivity Lab 7.3 DHCP Options 12.4 Troubleshooting Server Services Lab 7.4 DHCP Database Lab 7.5 Configuring DHCP Relay 70-291 Server 2003 Network Infrastructure I Labs Lab 7.6 Managing DHCP Lab 7.7 Managing DHCP Database Lab 7.8 DHCP Option Classes Chapter-1 Labs Lab 7.9 Configuring DHCP Servers to Perform DNS Updates
Lab 1.2 Networking with Default Components in Server 2003 Chapter-8 Monitoring & Troubleshooting DHCP Lab 1.3 Extending a Server 2003 Network Infrastructure Lab 8.2 Monitoring DHCP Through Audit Logging Lab 8.3 DHCP Performance Monitoring Chapter-2 Labs Lab 8.4 Troubleshooting DHCP
Lab 2.3 Subnetting & Supernetting IP Networks Chapter-9 Routing with Server 2003 Lab 2.4 Installing & Configuring TCP/IP
Lab 9.2 Configuring RRAS Chapter-3 Labs Lab 9.3 Configuring Demand-Dial Routing Lab 9.5 NETSH Commands for RAS Lab 3.1 Analyzing Traffic using Network Monitor Lab 9.7 Configuring NAT Part 2 Lab 3.2 Troubleshooting TCP/IP Connections Lab 9.8 Internet Connection Sharing Lab 9.9 Configuring and Managing Routing Protocols Lab 9.11 Configuring RIP for IP Router Lab 9.13 Configuring Packet Filters
www.itttc.net Chapter-10 Configuring and Managing Remote Access 70-291 Additional Features E-books & MOC Lab 10.1 Configuring Remote Access Connections 70-291 Exam Lab 10.2 Authorizing Remote Access Connections Lab 10.3 Implementing VPNs ITTTC Utilities CD Lab 10.6 Configuring RRAS and IAS Lab 10.7 Configuring IAS Windows Vista Ultimate Lessons and Lab VMWare Workstation Software Chapter-11 Managing Network Security VMWare Workstation Software Training in Farsi Windows XP Service Pack 3 Information
Lab 11.1 Introduction to Security Protocols & Security Windows XP Animations Templates Lab 11.4 Checking IPSec Functionality Lab 11.6 IPSec Components Lab 11.9 IPSec Tools
Chapter-12 Maintaining a Network Infrastructure
Lab 12.1 Monitoring Network Performance Lab 12.2 Troubleshooting Internet Connectivity Lab 12.3 Troubleshooting Server Services
www.itttc.net www.itttc.net CompTIA Security+
Chapter 1 General Networking and Security Concepts Chapter 6 Application Security
1.1 The Big Picture 6.1 E-mail Security 1.2 Identifying Threats 6.2 Web Security 1.3 Intrusion Points 6.3 File Transfer 1.4 Defending against Threats 1.5 Organizational and Operational Security Chapter 7 User Security
Chapter 2 TCP/IP Basics 7.1 Understanding Authentication 7.2 Understanding Access Control Models 2.1 TCP/IP Layers and Vulnerabilities Chapter 8 Security Baselines Chapter 3 Certificate Basics 8.1 Network Device and Operating System Hardening 2.1 Understanding & Using Cryptography 8.2 Server Application Hardening 2.2 Types of Protected Integrity 2.3 Identifying the components of a Public Key Infrastructure Chapter 9 Operational Security 2.4 Certificate Authorities 2.5 Understanding Certificate Life Cycle and Key 9.1 Physical Security Management 9.2 Privilege Management 2.6 Supplement #1 & Summary 9.3 Removable Media 9.4 Protecting Business Continuity Chapter 4 Network Infrastructure Security Chapter 10 Organizational Security 4.1 Securing Network Cabling 4.2 Securing Connectivity Devices 10.1 Documentation 4.3 Firewalls 10.2 Risk Assessment 4.4 Remote Access 10.3 Security Education 4.5 Telecommunications Hacking 4.6 Wireless Network Chapter 11 Incident Detection and Response 4.7 NAT 4.8 VLAN 11.1 Attacks and Malicious Code 4.9 Protecting Mobil Devices 11.2 Intrusion Detection Systems 4.10 Implementing IDS & using Honeypots and Honeynets 11.3 Incident Response
Chapter 5 Communications Security
5.1 Understanding Remote Access Connectivity 5.2 Providing Secure Remote Access 5.3 Understanding Wireless Standards and Protocols
www.itttc.net Appendix-A Security Topics & Security Tools Robocopy.exe: Robust File Copy Utility Rpcdump.exe: RPC Dump Cisco Security Topics Parts I, II, III Sc.exe: Service Controller Tool Sclist.exe Cisco Router Passwords Setspn.exe: Manipulate Service Principal Names for Standard IP ACLs Accounts Extended IP ACLs Showacls.exe Switch CAM Table Showpriv.exe: Show Privilege Static MAC Address Shutdown.exe: Remote Shutdown Port Security for 1900/2500 series switches Srvany.exe: Applications as Services Utility Cisco Discovery Protocol Srvcheck.exe CDP Commands Srvinfo.exe Su.exe Server 2003 Security Topics Subinacl.exe Uptime.exe Server 2003 Security Settings Lab Vadump.exe: Virtual Address Dump Whoami.exe Server 2003 Resource Kit Security Tools (37 Tools) Xcacls.exe
Auditpol.exe: Audit Policy Internet Top 75 Security Tools Clearmem.exe: Clear Memory
Drivers.exe: List Loaded Drivers Nessus Dsstore.exe: Directory Services Store Ethereal Dumpel.exe: Dump Event Log Snort Efsinfo.exe: Encrypting File System Information Netcat Findgrp.exe: Find Group TCPDump/WinDump Getmac.exe: GetMAC Hping2 Getsid.exe DSniff Gettype.exe: Get Type Version Information GFI LANguard Ipsecpol.exe: Internet Protocol Security Policies Tool Ettercap Kerbtray.exe: Kerberos Tray Whisker/LibWhisker Klist.exe: Kerberos List John the Ripper Logoff.exe OpenSSH / SSH Ntrights.exe Sam Spade Pulist.exe ISS Internet Scanner Regback.exe: Registry Backup Tripwire Regdmp.exe Nikto Regfind.exe Kismet Regini.exe: Registry Change by Script SuperScan Regrest.exe: Registry Restoration L0phtCrack 4 Retina www.itttc.net Netfilter Authentication Protocols Fport Encryption SAINT Windows Firewall Network Stumbler Security Under SP2 SARA N-Stealth Appendix-C Server 2003 Security Topics AirSnort NBTScan Security Framework GnuPG /PGP Segmenting Networks Firewalk Encryption Authentication Cain & Abel PKI XProbe2 Auditing SolarWinds Toolsets IPSec NGrep Securing IIS Web Sites Perl / Python RRAS IAS THC-Amap Securing Wireless Networks OpenSSL NTop ISA Server Lab Nemesis LSOF ISA Server 2004 Overview Lab Honeyd Appendix-D: Windows Vista Ultimate Security Topics Achilles Brutus User & Security Groups Stunnel Local Logon Paketoo Keiretsu Stored Passwords Fragroute Managing Local User Accounts and Groups Spike Proxy Managing Remote Access to Workstations THC-Hydra File Security and Resource Sharing ISA Server 2004 Overview Basic/Special Permissions File Ownership/ Inheritance ISA Server 2004 Capabilities Effective Permissions ISA Server 2004 Operation Sharing Files & Folders over the Network Public Folder Sharing
Appendix-B Windows XP SP2 Security Topics Vista Networking Features TCP/IP and Dual IP Stack Authentication Diagnosing and Resolving Problems Security Optimizing and Safeguarding Disk Drives Data Compression Windows Security Center Windows Firewall Data Encryption Windows Defender Configuring & Troubleshooting TCP/IP Automatic Updates Task Manager Reliability and Performance Monitor www.itttc.net
11 Categories of Shareware Security Tools Security+ Utilities CD
Crytp E-books Email Antispam Freeware Security Tools File Encryption Windows Security Tools File Wiping VMWare Workstation Software IP Address Tools VMWare Workstation Software Training in Farsi Network Info Tools Security+ Exam Network Monitoring Networking Tools Other Tools Password Dictionaries Personal Firewalls
Appendix-E WLAN Security Topics
WLAN Security WEP (Wired Equivalent Privacy) Solutions to WEP Weaknesses AES (Advanced Encryption Standard) Filtering Attacks on Wireless LANs Emerging Security Solutions Corporate Security Policy Security Recommendations
www.itttc.net MCSE 70-293 Planning and Maintaining a Server 2003 Network Infrastructure II
Chapter-1 Planning and Implementing Server Roles Chapter-5 Planning, Implementing, and Maintaining and Server Security Network Security and Infrastructure
1.1 OS Selection: Client & Server 5.1 Configuring Port and Protocol Security 1.2 Default Security Settings 5.2 IPSec Policy 1.3 Security Configuration & Security Templates 5.3 Remote Desktop and Remote Assistance 1.4 Configuring Server Role Based Security 5.4 Planning Security for Wireless Networks 5.5 Troubleshooting IPSec Chapter-2 Planning, Implementing, and Maintaining 5.6 Planning a Security Update Infrastructure a Network Infrastructure 5.7 Configuring PKI that uses Certificate Services 5.8 Using Smart Card for Authentication 2.1 Network Topology, Infrastructure & Protocols 5.9 Configuring Certificate Services 2.2 Planning the Physical Placement of Network Resources 70-293 Labs 2.3 IP Addressing, IP Routing and IP Subnetting 2.4 Planning an Internet Connectivity Strategy Chapter-1 Labs 2.5 Understanding Bandwidth Requirements 2.6 Choosing an Internet Access Solution Lab 1.2 Default Security Settings 2.7 Client Configuration and Name Resolution Lab 1.4 Configuring Server Role Based Security 2.8 Resolving LAN/WAN Problems 2.9 Planning Name Resolution (DNS & NetBIOS) Chapter-2 Labs
Chapter-3 Planning, Implementing, and Maintaining Lab 2.2 Planning the Physical Placement of Network Routing and Remote Access Resources Lab 2.4 Planning an Internet Connectivity Strategy 3.1 Routing Protocols and Routing Topologies Lab 2.5 Understanding Bandwidth Requirements 3.2 Static and Dynamic Routing Protocols Lab 2.8 Resolving LAN/WAN Problems 3.3 IP Multicast Routing 3.4 Dial-in Tab Security Chapter-3 Labs 3.5 RAS Client Authentication 3.6 Remote Access Policies Lab 3.3 IP Multicast Routing Lab 3.4 Dial-in Tab Security Chapter-4 Planning, Implementing, and Maintaining Lab 3.5 RAS Client Authentication Server Availability Lab 3.6 Remote Access Policies
4.1 Server Avaiility & High Avaiility Chapter-4 Labs 4.2 Network Load Balancing & Implementing NLB 4.3 Clustering Services & Implementing Clustering Service Lab 4.2 Network Load Balancing & Implementing NLB 4.4 Backup & Recover Strategy Lab 4.3 Clustering Services & Implementing Clustering Service
www.itttc.net Chapter-5 Labs 70-293 Server 2003 Review Labs
Lab 5.4 Planning Security for Wireless Networks 1. Configuring Windows Components Lab 5.7 Configuring PKI that uses Certificate Services 2. Configuring TCP/IP Filtering and using NETSH Lab 5.9 Configuring Certificate Services 3. Configuring DHCP Service 4. Configuring DNS Service 70-293 Scenarios 5. Configuring and Removing Active Directory 6. Configuring Group Policy and RSoP Chapter-1 Scenarios 7. Configuring Network Connections 8. Configuring Routing and Remove Access Server S1.1 OS Selection: Client & Server 9. Configuring Demand Dial Interface S1.3 Security Configuration & Security Templates 10. Configuring RIP and OSPF Routing Protocols 11. Configuring RADIUS Client and Server
Chapter-2 Scenarios 12. Configuring Packet Filtering 13. Configuring IP Security
S2.1 Network Topology, Infrastructure & Protocols S2.3 IP Addressing, IP Routing and IP Subnetting S2.6 Choosing an Internet Access Solution 70-293 Additional Features S2.7 Client Configuration and Name Resolution E-books S2.9 Planning Name Resolution (DNS & NetBIOS) 70-293 Exam
Chapter-3 Scenarios
ITTTC Utilities CD S3.1 Routing Protocols and Routing Topologies S3.2 Static and Dynamic Routing Protocols Windows Vista Ultimate Lessons and Lab Chapter-4 Scenarios VMWare Workstation Software VMWare Workstation Software Training in Farsi S4.1 Server Availability & High Availability Windows XP Service Pack 3 Information S4.4 Backup & Recover Strategy Windows XP Animations
Chapter-5 Scenarios
S5.1 Configuring Port and Protocol Security S5.2 IPSec Policy S5.3 Remote Desktop and Remote Assistance
www.itttc.net MCSE 70-294 Planning, Implementing & Maintaining Server 2003 Active Directory
Chapter-1 Introduction to Active Directory 5.3 Configuring Intersite Replication 5.4 Configuring Global Catalog Servers 1.1 Introduction to Active Directory 5.5 Configuring Application Directory Partitions 1.2 Active Directory Logical and Physical Structures 5.6 Monitoring and Troubleshooting Replication 1.3 Active Directory Data Store 1.4 Trust Relationships Chapter-6 Implementing OU Structure 1.5 Group Policy Overview 1.6 Active Directory Object Naming 6. 1 Understanding OUs 1.7 AD Design Process 6. 2 Creating and Administering an OU Structure 1.8 ADsPaths Chapter-7 Administering User Accounts Chapter-2 Installing & Configuring Active Directory 7.1 Understanding User Accounts 2.1 Preparing for Active Directory Installation 7.2 Creating User Accounts 2.2 Installing and Removing Active Directory 7.3 Managing User Profiles and Home Folders 2.3 Verifying Active Directory Installation 7.4 Maintaining User Accounts 2.4 Troubleshooting Active Directory Installation and Removal Chapter-8 Administering Groups Chapter-3 Administering Active Directory 8.1 Understanding Groups 3.1 Using Active Directory Administration Tools 8.2 Creating and Administering Groups & Administration 3.2 Domain & Forest Functional Levels Strategies 3.3 UPN Suffixes 3.4 Backing up Active Directory Chapter-9 Administering AD Objects 3.5 Restoring Active Directory 3.6 Miscellaneous 9.1 Locating AD Objects 9.2 Controlling Access to AD Objects Chapter-4 Installing & Managing Domains, Trees & Forests 9.3 Delegating Administrative Control of AD Objects
4.1 Creating Multiple Domains, Trees, and Forests Chapter-10 Implementing Group Policy 4.2 Renaming and Restructuring Domains and Renaming DCs 4.3 Managing Operations Master Roles 10.1 Understanding Group Policy 4.4 Managing Trust Relationships 10.2 Group Policy Planning Strategies 10.3 Implementing a GPO Chapter-5 Configuring Sites & Managing Replication Chapter-11 Administering Group Policy 5.1 Understanding Sites and Replication 5.2 Configuring Sites 11.1 Managing Group Policy with RSoP 11.2 Managing Special Folders with Group Policy 11.3 Troubleshooting Group Policy
www.itttc.net Chapter-12 Deploying Software with Group Policy Chapter-4 Labs
12.1 Understanding Software Deployment with Group Policy 4.1 Creating Multiple Domains, Trees, and Forests 12.2 Deploying Software with Group Policy 4.2 Renaming and Restructuring Domains and Renaming DCs 12.3 Maintaining Software Deployed with Group Policy 4.3 Managing Operations Master Roles 12.4 Troubleshooting Software Deployed with Group Policy 4.4 Managing Trust Relationships
Chapter-13 Administering Security with Group Policy Chapter-5 Lab
13.1 Understanding AD Security 5.2 Configuring Sites 13.2 Implementing Software Restriction Policies 5.3 Configuring Intersite Replication 13.3 Implementing an Audit Policy & Administering the 5.4 Configuring Global Catalogs Security Log 5.6 Monitoring and Troubleshooting Replication 13.4 Using Security Templates 13.5 Using Security Configuration And Analysis Chapter-6 Lab
Chapter-14 Managing AD Performance 6. 2 Creating and Administering an OU Structure
14.1 Monitoring Performance with Service Logs and System Chapter-7 Labs Monitor 14.2 Monitoring Performance with Performance Logs And 7.2 Creating User Accounts Alerts 7.3 Managing User Profiles and Home Folders 14.3 Optimizing and Troubleshooting AD Performance Chapter-8 Labs 70-294 Active Directory Labs 8.2 Creating and Administering Groups & Administration Chapter-2 Labs Strategies
2.2 Installing and Removing Active Directory Chapter-9 Labs 2.3 Verifying Active Directory Installation 2.4 Troubleshooting Active Directory Installation and Removal 9.1 Locating AD Objects 9.2 Controlling Access to AD Objects Chapter-3 Labs 9.3 Delegating Administrative Control of AD Objects
3.1 Using Active Directory Administration Tools Chapter-10 Labs 3.2 Backing Up Active Directory 3.3 Restoring Active Directory 10.1 Understanding Group Policy 3.4 Domain & Forest Functional Levels 10.2 Group Policy Planning Strategies 3.5 UPN Suffixes 10.3 Implementing a GPO 3.6 Backing up AD
www.itttc.net Chapter-11 Labs 70-294 Additional Features E-books 11.1 Managing Group Policy with RSoP 70-294 Exam 11.2 Managing Special Folders with Group Policy 11.3 Troubleshooting Group Policy ITTTC Utilities CD
Chapter-12 Labs Windows Vista Ultimate Lessons and Lab VMWare Workstation Software 12.2 Deploying Software with Group Policy VMWare Workstation Software Training in Farsi Windows XP Service Pack 3 Information Chapter-13 Labs Windows XP Animations
13.2 Implementing Software Restriction Policies 13.3 Implementing an Audit Policy & Administering the Security Log 13.4 Using Security Templates 13.5 Using Security Configuration And Analysis
Chapter-14 Labs
14.1 Monitoring Performance with Service Logs and System Monitor 14.2 Monitoring Performance with Performance Logs And Alerts
www.itttc.net www.itttc.net MCSE 70-298 Designing Security for Microsoft Windows Server 2003 Network
Chapter-1 General Network Security Framework Chapter-6 Data Access Control Strategies
1.1 Security Policy 6.1 Windows Security Permissions 1.2 Segmenting Networks 6.2 Encrypting File System 1.3 Encryption 1.4 Authentication Server 2003 Security Labs 1.5 Public Key Infrastructure 1.6 Audit Lab-1 Preventing Automatic Installation of New Hardware Drivers Chapter-2 Security Infrastructure Technologies Lab-2 Protecting Against Modified Device Drivers Lab-3 Encrypting the SAM 2.1 Securing Infrastructure Server Lab-4 Enabling SYN Flood Protection 2.2 Certificate Services Lab-5 Disabling Router Discovery 2.3 Patch Management Lab-6 Configuring a Recovery Agent 2.4 Remote Administration Tools Lab-7 Changing Encryption Algorithms 2.5 Terminal Services Lab-8 Configuring Time Synchronization Settings 2.6 Windows Trust Models Lab-9 Configuring Service Parameters Lab-10 Disabling LM Hash Storage Chapter-3 Securing Network Communications Lab-11 Requiring NTLM Authentication Lab-12 Signing LDAP Communications 3.1 IP Security Lab-13 Restricting Remote Access to the Registry 3.2 Securing IIS Web Sites Lab-14 Disabling Internet Printing 3.3 Routing and Remote Access Service Lab-15 Configuring HTTP Authentication 3.4 Internet Authentication Service Lab-16 Configuring FTP Authentication 3.5 Securing Wireless Networks Lab-17 Configuring Trusted Certification Authorities Lab-18 Using Preshared Keys Chapter-4 Secure Active Directory Design Lab-19 Configuring Session Encryption Lab-20 Requiring a Password for Connection
4.1 Secure Active Director Design Lab-21 Allowing Silent Session Monitoring 4.2 Active Directory Delegation Lab-22 Restricting Access to the CA 4.3 Group Design Lab-23 Shutting Down Windows When Unable to Log Events
Chapter-5 Client Hardening Lab-24 Finding More Information about an Event Lab-25 Disabling Windows Update
5.1 GPO Application Order 5.2 Popularly Tested GPO Settings 5.3 Security Templates 5.4 Windows Firewall and Legacy Clients
www.itttc.net Case Studies 70-298 Additional Features E-books, Checklists, Security Templates 1. OmniPresence 70-298 Exam 2. GeoTrek Windows Security Resource Kit 3. VisionWorx RK Tools for Server 2003 4. GlobeComm 5. DreamSuites ITTTC Utilities CD 6. TeleSoft 7. CredTech Windows Vista Ultimate Lessons and Lab VMWare Workstation Software Review Labs VMWare Workstation Software Training in Farsi Windows XP Service Pack 3 Information Lab-1 DNS Windows XP Animations Lab-2 Group Policy Lab-3 RADIUS Clients and Servers Lab-4 Inbound and Outbound Filters Lab-5 Security Settings
Microsoft Security Web Site
Appendix-A Windows Server 2003 RK Security Tools (50 Tools)
www.itttc.net MCSE 70-350 Microsoft Internet Security and Acceleration Server 2004/2006
Chapter 0 ISA Server 2004 ON-LINE HELP Chapter 7 Configuring ISA Server Firewall Policy
0.1 ISA Server 2004 ON-LINE HELP 7.1 Configuring ISA Server Firewall Policy 0.2 ISA Server 2004 Web Site 7.2 System Policy 7.3 Overview of Firewall Policy Chapter 1 ISA Server 2004 Overview 7.4 Access Rules 7.5 Web & Server Publishing 1.1 ISA Server Capabilities & Operation 7.6 Troubleshooting FW Policy 1.2 ISA Server 2004 Editions and System Requirements 1.3 ISA Server Tools and Remote Administration Chapter 8 Configuring Multinetworking 1.4 ISA Server as a Firewall 1.5 Comparing ISA 2004 to Other Firewall Products 8.1 Multinetworking Overview 1.6 ISA Server Deployment Scenarios 8.2 Working with Network Templates 8.3 Networks & Network Sets & Network Rules Chapter 2 Installing and Configuring ISA Server 2004 8.4 Web & Firewall Chaining Standard Chapter 9 ISA Server Security and Administration 2.1 Installing & Configuring ISA Server 2004 Std. Edition 2.2 Understanding Caching Concepts 9.1 Overview 9.2 Security Policy Administration Chapter 3 ISA Server 2004 Clients Chapter 10 Securing VPN Access 3.1 Overview of ISA Server 2004 Client Types 3.2 ISA Server 2004 Client Types 10.1 Securing VPN Access 3.3 Using Infrastructure Servers 10.2 Site to Site VPN Configuration 10.3 VPN Quarantine Chapter 4 Upgrading from ISA Server 2000 Chapter 11 Configuring Arrays 4.1 Upgrading ISA Server 2004 4.2 Troubleshooting ISA Server Upgrades 11.0 Installing ISA Server 2004 Enterprise Edition 11.1 Configuring Arrays Chapter 5 Monitoring and Reporting 11.2 Troubleshooting Array Configuration
5.1 Monitoring and Reporting Chapter 12 Enterprise and Array Policies 5.2 Performance Monitor 12.1 Using Enterprise and Array Policies Chapter 6 Configuring Toolbox Elements 12.2 Enterprise Policy Administration 12.3 Array Policy Administration 6.1 Configuring Toolbox Elements 6.2 Network Objects
www.itttc.net Chapter 13 Enterprise Technologies Lab #8 System Policy Lab #9 Overview of Firewall Policy 13.1 Enterprise Technologies and ISA Server 2004 Lab #10 Access Rules 13.2 Network Load Balancing Lab #11 Web & Server Publishing Lab #12 Working with Network Templates
Chapter 14 ISA Server and Exchange Server 2003 Lab #13 Networks & Network Sets & Network Rules Lab #14 Web & Firewall Chaining Lab #15 ISA Server Security and Administration Overview 14.1 Configuring ISA Server with Exchange Server 2003 Lab #16 Security Policy Administration 14.2 Remote Access for Exchange Clients Lab #17 Securing VPN Access Lab #18 Site to Site VPN Configuration Chapter-15 ISA Server 2006 Enterprise Edition Lab #19 Installing ISA Server 2004 Enterprise Edition Lab #20 Configuring Arrays 15.1 ISA Server 2006 System Requirements Lab #21 Enterprise Policy Administration 15.2 ISA Server 2006 Editions Comparison Lab #22 Enterprise Technologies and ISA Server 2004 15.3 ISA Server 2006 New Features Lab #23 Network Load Balancing 15.4 65 ISA Server 2006 Key Features Lab #24 ISA Server 2006 System Requirements Lab #25 ISA Server 2006 Editions Comparison ISA Server Labs Lab #26 ISA Server 2006 New Features
Lab #1 ISA Server 2004 ON-LINE HELP 70-350 Additional Information Lab #2 Installing & Configuring ISA Server 2004 Standard E-book & MOC, Skillsoft Edition ISA Server 2004 Enterprise Edition SP2 Software Lab #3 ISA Server 2004 Client Types Lab #4 Monitoring and Reporting Lab #5 Performance Monitor ITTTC Utilities CD Lab #6 Configuring Toolbox Elements Windows Vista Ultimate Lessons and Lab Lab #7 Network Objects VMWare Workstation Software VMWare Workstation Software Training in Farsi Windows XP Service Pack 3 Information Windows XP Animations
www.itttc.net Microsoft
MCTS MCITP Server Administrator Enterprise Administrator Database Administrator Enterprise Messaging Administrator
www.itttc.net www.itttc.net MCTS / MCITP 70-620 Installing and Configuring Windows Vista Ultimate
Chapter 1 Introduction to Windows Vista Administration 6.4 Local User Accounts and Groups 6.5 Remote Access 1.1 Windows Vista Overview 1.2 Vista Upgrade Considerations Chapter-7 Managing Laptops and Traveling Users 1.3 Installing Windows Vista 1.4 Troubleshooting Installation Problems 7.1 Power Management Settings 1.5 Windows Vista Architectural Changes 7.2 Networking for Laptops 1.6 Automating the Windows Vista Installation
Chapter-8 Configuring User and Computer Policies Chapter 2 Managing Windows Vista Systems
8.1 Group Policy Essentials 2.1 Getting Around Windows Vista 8.2 Configuring Policies 2.2 User Account Control and Elevation Prompts 8.3 Access & Connectivity Policies 2.3 Supporting Computers Running Windows Vista 8.4 Computer & User Scripts Policies 2.4 System Support Tools 2.5 System Properties Chapter-9 Managing Disk Drives & File System
Chapter 3 Configuring Systems, Hardware Devices, and 9.1 Disk Drives & File Systems Drivers 9.2 Disk Performance 9.3 Working with Basic & Dynamic Disks 3.1 Automated Help And Support 9.4 Using Basic & Dynamic Disks 3.2 Devices & Device Manger & Device Drivers 9.5 Disks, Partitions & Volumes 3.3 Managing & Customizing Hardware 9.6 Partitioning Disks 3.4 Internet Time
Chapter-10 Managing File Security & Resource Sharing Chapter 4 Customizing the Desktop and the Interface
10.1 File Security & Resource Sharing 4.1 Desktop and the Interface Part 1 10.2 File & Folder NTFS Permissions 4.2 Desktop and the Interface Part 2 10.3 Sharing Files & Folders over the Network
10.4 Public Folder Sharing
Chapter 5 Installing and Maintaining Programs Chapter-11 Explorer Options, Offline Lines & Disk Quotas
5.1 Installing and Maintaining Programs 11.1 Configuring Advanced Explorer Options 5.2 Program Compatibility & Managing Programs 11.2 Offline Files
11.3 Disk Quotas Chapter 6 Managing User Access and Security
6.1 User and Group Accounts 6.2 Local Logon 6.3 Stored Passwords
www.itttc.net Chapter-12 TCP/IP Networking 70-620 Windows Vista Ultimate Labs
12.1 Windows Vista Networking Features Chapter-1 Labs 12.2 TCP/IP & Dual IP Stack Lab #1 Installing Windows Vista Ultimate 12.3 Local Area Connections Lab #2 Task Bar & Start Menu Properties 12.4 Resolving Local Area Connection Problems Lab #3 Vista Applications, Desktop, Recycle Bin, UAC & Control 12.5 IPv4 Addressing Panel Overview Lab #4 CTL-ALT-DEL Options Lab #5 Password Reset Disk Chapter-13 Mobile Networking & Remote Access Lab #6 System Overview Lab #7 System Configuration 13.1 Mobile Networking & Remote Access Lab #8 BCDEDIT Lab #9 Sysprep 13.2 Creating Remote Access Connections 13.3 Configuring Connection Properties Chapter-2 Labs 13.4 Wireless Networking Lab #1 Task Bar Chapter-14 Advanced Internet Options and Security Lab #2 Control Panel Lab #3 MMC, Snap-ins, Computer Management, Services 14.1 Internet Options and Security Lab #4 Windows Management Instrumentation (WMI) 14.2 Cookies & Other Internet Files Lab #5 UAC & Security Settings 14.3 Security Zones Lab #6 UAC Settings Lab #7 Disk Cleanup Lab #8 File Signature Verification Chapter-15 Optimizing Windows Vista Lab #9 System Properties Lab #10 System Restore 15.1 Safeguarding Disk Drives 15.2 Windows Security Center Chapter-3 Labs 15.3 Windows Firewalls 15.4 Windows Defender Lab #1 Problem Reports and Solutions 15.5 Automatic Updates Lab #2 Windows Memory Diagnostics Tool 15.6 Reliability & Performance Monitor Lab #3 Vista Support Services Lab #4 Troubleshooting and Diagnostics using GPO Chapter-16 Supporting & Troubleshooting Windows Lab #5 Windows Update & Windows Ultimate Extras Vista Lab #6 Device Manager Lab #7 Device Drivers 16.1 Remote Assistance & Event Logs Lab #8 Using Signed and Unsigned Drivers using GPO 16.2 Task Scheduling Lab #9 Driver Searching using GPO 16.3 Backing up & Recovering a Computer Lab #10 Restricting Driver Installation using GPO 16.4 Troubleshooting Startup & Shutdown Lab #11 Keyboard Settings Lab #12 Mouse Settings Lab #13 Audio Driver Lab #14 Regional Options & Settings Lab #15 Windows Time Service Lab #16 Configuring Internet Time for Workgroups Lab #17 Configuring Internet Time for Domains
www.itttc.net Chapter-4 Labs Lab #8 Configuring Assigning Computer & User Scripts in GP
Lab #1 Personalization Chapter-9 Labs Lab #2 Start Menu & Search Lab #3 Vista Gadgets Lab #1 Disk Management Lab #2 Configuring Dynamic Disk & Volumes Spanned & Chapter-5 Labs Simple Volumes Lab #3 GPT vs. MBR Lab #1 Administrative Privilege Lab #4 Disk Scaling Lab #2 User Account Control & RunAS Lab #5 Diskpart Command Lab #3 UAC Security Options using GPO Lab #6 Convert Command Lab #4 Default Programs Lab #5 Accessories Chapter-10 Labs Lab #6 Turning Features ON or OFF Lab #7 Windows Vista Contacts Lab #1 NTFS Permissions Lab #8 Windows Vista Calendar Lab #2 Shared Folders Lab #9 Windows Mail Lab #3 Public Folders Lab #10 Windows Meeting Space Lab #11 Windows Media Center, Media Player, Photo Gallary Chapter-11 Labs
Lab #1 Configuring GP settings for Windows Explorer Chapter-6 Labs Lab #2 Sync Center Lab #3 Offline Files Lab #1 Users and Groups Lab #4 Disk Quotas Lab #2 Interactive Logon using Security Options in GPO Lab #3 Logon Settings using GPO Chapter-12 Labs Lab #4 Key Ring Entries Lab #5 Secure Guest Account Lab #1 Network and Sharing Center Lab #6 Remote Assistance & Remote Desktop Lab #2 Network Connections & Bridging Lab #7 Remote Desktop Connection Lab #3 Local Area Connection Properties & TCP/IP Settings Lab #4 IPCONFIG Command & Options Chapter-7 Labs Chapter-13 Labs Lab #1 Power Plans & Power Options Lab #2 Powercfg Command Lab #1 Phone & Modem Connection Lab #3 Power Management using GPO Lab #2 Creating and Configuring a Dial-up Connection Lab #4 Sleep Mode Lab #3 Creating and Configuring a Broadband Connection Lab #5 TCP/IP Addressing Configuration Overview Lab #4 Creating and Configuring a VPN Connection Lab #6 Netsh Command Lab #5 Enabling or Disabling Windows Firewall per Connection Lab #7 Connecting to a Network Projector Lab #6 Proxy Settings Lab #8 Printing Lab #9 Print Management Chapter-14 Labs
Chapter-8 Labs Lab #1 Configuring IE settings in Group Policy Lab #2 Configuring Parental Control Lab #1 Group Policy Object Settings Overview Lab #3 Configuring IE 7 Options Popup Filter, Phishing Filter Lab #2 Configuring Policy Templates in GP Lab #3 Configuring Disk Quota setting in GP Lab #4 Configuring System Restore settings in GP Lab #5 Configuring Offline Files settings in GP Lab #6 Configuring Networking settings in GP Lab #7 Configuring Remote Assistance settings in GP
www.itttc.net Chapter-15 Labs Windows Vista Utilities CD
Lab #1 Chkdsk 70-620 Exam Lab #2 TPM Windows Vista E-books Lab #3 BitLocker VMWare Workstation Software Lab #4 Windows Security Center VMWare Workstation Software Training in Farsi Lab #5 Windows Firewall Lab #6 Windows Firewall with Advanced Security Lab #7 Windows Defender Lab #8 Configuring Windows Update in GP
Chapter-16 Labs
Lab #1 Event Viewer Lab #2 Task Scheduler Lab #3 Windows Easy Transfer Lab #4 Backup & Restore Center Lab #5 Task Manager Lab #6 Reliability and Performance Monitor
www.itttc.net MCTS 70-236 Microsoft Exchange Server 2007 Implementation & Maintenance
Chapter 1 Exchange Server 2007 Deployment Chapter 5 Exchange Server 2007 Security & Data Storage Groups 1.1 Overview, Hardware & Editions 1.2 Exchange Server, Windows & Active Directory 5.1 Exchange Server 2007 Security 1.3 Administration Tools 5.2 Exchange Administrator Permissions 1.4 Messaging Roles 5.3 Auditing 1.5 Exchange Server Roles & Active Directory 5.4 Information Store 1.6 Exchange Server & Existing Exchange Organizations 5.5 Content Indexing
Chapter 2 Managing Exchange Server 2007 Chapter 6 Mailbox & Public Folder Database Clients & Mobile Messaging Users Administration
2.1 Mail Clients 6.1 Mailbox and Public Folder Database Administration 2.2 Managing Exchange Server Service in Outlook 2007 6.2 Public Folder Databases & Managing Databases 2.3 Mail Profiles 6.3 Managed Folders and Managed Records 2.4 Mobile Messaging Users 6.4 Accessing and Managing Public Folders 2.5 Mobile Device & Wireless Access 2.6 Remote Mail and Outlook Anywhere Chapter 7 Managing Transport Servers and Client Access Servers Chapter 3 Exchange Server 2007 Administration &
Exchange Management Shell 7.1 Managing Hub Transport and Edge Transport Servers 7.2 Completing Transport Server Setup 3.1 Exchange Server 2007 Organizations 7.3 Managing Message Pickup and Replay 3.2 Data Storage 7.4 Managing Accepted Domains & Email Policies 3.3 Message Queues 7.5 Remote Domains, Antispam & Message Filtering Options 3.4 Exchange Management Shell 7.6 Managing Client Access Servers 3.5 Cmdlets 7.7 Enabling POP3 and IMAP4 & Deploying Outlook Anywhere Chapter 4 User, Contact, Mailbox Administration, 7.8 Managing Exchange Server Features for Mobile Devices Groups & Address Lists Chapter 8 Exchange Server 2007 Maintenance, 4.1 User and Contact Administration Backup & Restore 4.2 Managing User Accounts and Mail Features 4.3 Mailbox Administration 8.1 Troubleshooting, Logging & Tracking 4.4 Distribution Groups and Address Lists 8.2 Monitoring Events, Services, Servers, and Resource Usage 8.3 Exchange Queues 8.4 Backing Up and Restoring Exchange Server 2007 8.5 Recovering Exchange Server & Restoring Mailboxes
www.itttc.net Chapter-9 Exchange Server 2007 Clustering Solution Center & FAQ
9.1 Clustering Overview 1.7 Exchange Server 2007 Solution Center 9.2 Single Copy Clusters 1.8 Exchange Server 2007 FAQ 9.3 Clustered Continuous Replication Clusters 9.4 High Availability & Server Availability Exchange Server 2007 Labs
Appendix-A Active Directory Lessons Lab-0 Installing Exchange Server 2007 Lab-1 Exchange Server 2007 Maintenance Mode A1 Active Directory Overview Lab-2 Exchange Management Console Overview A2 Active Directory Logical & Physical Structures Lab-3 Windows PowerShell Overview A3 Active Director Data Store Lab-4 Exchange Management Shell Overview A4 Installing & Configuring Active Directory Lab-5 Microsoft Exchange Security Groups A5 Active Directory Administrative Consoles Lab-6 Modify Configuration Domain Controller & Recipient A6 Domain and Forest Functional Levels Scope Lab-7 Event Viewer Logs & Exchange Services Appendix-A Active Directory Lessons Lab-8 Recipient Configuration Node (User Mail Box) Lab-9 Recipient Configuration Node (Room Mail Box) A7 Active Directory Installation and Removal Lab-10 Recipient Configuration Node (Equipment Mail Box) A8 Active Directory Installation Verification Lab-11 Recipient Configuration Node (Link Mail Box) A9 Active Directory Setup Logs Lab-12 Recipient Configuration Node (Mail Contact) A10 Domain and Forest Functional Levels Lab-13 Recipient Configuration Node (Mail User) Lab-14 Distribution & Dynamic Distribution Groups Appendix-B Exchange Server 2007 Information Lab-15 Recipient Configuration Review Lab-16 Server Configuration (Mailbox Role) ONLINE HELP Lab-17 Mailbox Role : Mailbox & Public Folder Database Lab-18 Server Configuration (Client Access Role) 1.1 Exchange 2007 ONLINE Help Overview Lab-19 Server Configuration (Hub Transport Role) 1.2 Exchange 2007 ONLINE Help Categories Lab-20 Creating a New SMTP Receive Connector 1.3 Exchange 2007 ONLINE Help Getting Started Lab-21 Add New Exchange Administrator Role Lab-22 Configuring Service Startup Product Information & Versions Lab-23 Creating a New Address Lists Lab-24 Managed Default Folders 1.4 Exchange Server 2007 Product Information Lab-25 Managed Custom Folders 1.5 Exchange Server Version Comparison Lab-26 Managed Folder Mailbox Policies Lab-27 Offline Address Book Service Pack 1 & Update Rollup 1 Lab-28 Assigning Advanced Exchange Server Permissions Lab-29 Auditing Exchange Server Usage 1.6 Exchange Server 2007 Service Pack 1 Lab-30 Hub Transport: Remote Domains 1.7 Update Rollup 1 for Exchange Server 2007 SP1 Lab-31 Hub Transport: Accepted Domains
www.itttc.net Exchange Server 2007 Labs Utilities DVD
Lab-32 Hub Transport: Email Address Policies Exchange Server 2007 Software DVD 32-bit Edition Lab-33 Hub Transport: Transport Rules Exchange Server 2007 E-books Lab-34 Hub Transport: Journaling Exchange Server 2007 Installation Components Lab-35 Hub Transport: Send Connectors VMWare Workstation Software Lab-36 Hub Transport: Edge Subscriptions VMWare Workstation Training in Farsi Lab-37 Exchange Server 2007 Performance Counters Exchange Glossary Lab-38 Mail Client: Outlook 2007 Online Help Exchange Server 2007 Tools Lab-39 Mail Client: Outlook 2007 Overview Exchange Server 2007 CBT Lab-40 Mail Client: Outlook 2007 Details Lab-41 Mail Client: Outlook 2007 Web Site Lab-42 Toolbox: Best Practice Analyzer Lab-43 Toolbox: Database Recovery Management Lab-44 Toolbox: Database Troubleshooter Lab-45 Toolbox: Mail Flow Troubleshooter Lab-46 Toolbox: Message Tracking Lab-47 Toolbox: Queue Viewer Lab-48 Toolbox: Performance Troubleshooter Lab-49 Tools Web Site Lab-50 Exchange 2007 File Paths Lab-51 Exchange Server 2007 Backup & Restore Lab-52 Exchange Setup Parameters Lab-53 Office Outlook Web Access Lab-54 Creating Multiple Storage Groups Lab-55 Enabling & Verifying LCR Lab-56 PowerShell Scripts, Properties & Commands Lab-57 Unified Messaging: Configuring Dial Plans Lab-58 Unified Messaging: Configuring IP Gateways Lab-59 Unified Messaging: Configuring Mailbox Policies Lab-60 Unified Messaging: Configuring Auto Attendants
www.itttc.net www.itttc.net MCTS 70-431 Microsoft SQL Server 2005 Implementation & Maintenance
Chapter 0 Introduction to RDBM & SQL Chapter 5 Introducing More Database Objects
0.1 Database Basics 5.1 Stored Procedures 0.2 SQL Basics Part I 5.2 Triggers 0.3 SQL Basics Part II 5.3 Event Notifications 5.4 Functions Chapter 1 Installing Microsoft SQL Server 2005 5.5 User Defined Types
1.1 Introduction to SQL Server 2005 Chapter 6 Implementing Security in SQL Server 2005 1.2 Prerequisites 1.3 Preparing to Install 6.1 SQL Server Security Modes 1.4 Upgrading from a Previous version 6.2 SQL Server Logins & Fixed Server Roles 1.5 Installing SQL Server 2005 6.3 Creating Database User Accounts 1.6 Relational Database Concepts 6.4 Permissions & Permission States 1.7 SQL Server Management Studio 6.5 Database Roles 6.6 Ownership Chains Chapter 2 Creating and Configuring Databases 6.7 Linked Server Security 6.8 Encryption & Security Plan 2.1 Planning your database 2.2 Filegroups Chapter 7 Working with Relational Data 2.3 Database File Placement 2.4 Creating Data Storage Structures 7.1 Transactions 2.5 Estimating Storage Requirements 7.2 Populating Tables 2.6 Creating and Configuring Databases 7.3 Bulk Inserting XML & Bulk-Logged Recovery Model 7.4 Supporting Different Collation Types and Orders When Chapter 3 Working with Tables and Views Querying Data 7.5 Casting and Converting 3.1 Planning Tables 7.6 Datatype Precedence & Collations 3.2 Introducing Built-in Data Types 7.7 Error Handling 3.3 Creating Tables 3.4 Restricting the Data Chapter 8 Working with XML Data 3.5 Partitioning Tables 3.6 Understanding Views 8.1 XML Data, Datatypes & XML Schema 8.2 Querying XML Data Chapter 4 Performing Indexing and Full-Text 8.3 Creating XML Indexes Searching Chapter 9 Working with Service Broker and HTTP 4.1 Index Architecture 9.1 Service Broker 4.2 Clustered Indexes 9.2 Working with Service Broker 4.3 Non-Clustered Indexes 9.3 Using Service Broker 4.4 Indexes, Primary Keys & Full Text Searching 9.4 HTTP Endpoints
www.itttc.net Chapter 10 Maintaining and Automating SQL Server 70-431 SQL Server 2005 Labs
10.1 Maintaining Indexes Section-1 Labs 10.2 Maintaining Statistics 10.3 Maintaining Databases Lab 1.1 Installing SQL Server 2005 10.4 Automation Basics Lab 1.2 Installing SQL Server 2005 Service Pack 2 10.5 Configuring Database Mail Lab 1.3 SQL Server Management Studio Overview 10.6 Creating Operators & Jobs Lab 1.4 Installing the 2nd Instance 10.7 Creating Alerts Lab 1.5 Exploring the SQL Server Management Studio 10.8 Maintenance Plan Wizard & Copying Databases Lab 1.6 Creating Tables
Chapter 11 Performing Backups and Restores Section-2 Labs
11.1 Backup a Database Lab 2.1 Creating a Database using Management Studio 11.2 Restoring a Database Lab 2.2 Gathering Information about your Database 11.3 Devising a Backup Strategy Lab 2.3 Setting Database Options
Chapter 12 Achieving High Availability through Section-3 Labs Replication
Lab 3.1 Creating the Products Table 12.1 Introducing Replication Lab 3.2 Creating the Customers Table 12.2 Introducing the Publisher Subscriber Metaphor Lab 3.3 Creating the Orders Table 12.3 Replication Factors and Distribution Lab 3.4 Creating the Valid Zip Code Constraint 12.4 Replication Internals Lab 3.5 Testing your Constraint 12.5 Replication Types Lab 3.6 Creating Default Constraint 12.6 Publication & Distributor Issues Lab 3.7 Creating a Unique Constraint 12.7 Replication Models Lab 3.8 Creating a Partition Function and Schema 12.8 Replicating over the Internet and to Heterogeneous Lab 3.9 Creating the Contact_in_398 View Database Servers Lab 3.10 Creating an Updatable View 12.9 Installing, Using & Managing Replication
Section-4 Labs Chapter 13 Introducing More High-Availability Methods
Lab 4.1 Creating a Table Scan 13.1 Choosing the High-Availability Features You Need Lab 4.2 Creating an Index 13.2 Database Mirroring Overview Lab 4.3 Creating a Primary Key 13.3 Database Mirroring Implementation Lab 4.4 Creating a Full-Text Catalog & Index 13.4 Log Shipping 13.5 Database Snapshots
Chapter 14 Monitoring and Optimizing SQL Server 2005 14.1 System Monitor 14.2 SQL Profiler & Database Engine Tuning Advisor 14.3 Troubleshooting SQL Server
www.itttc.net Section-5 Labs Lab 8.10 Creating an Alert for a Standard Error Lab 8.11 Testing an Alert with RAISEERROR() Lab 5.1 Viewing System Stored Procedures in Object Explorer Lab 8.12 Creating and Firing an Alert Based on a Custom Error Lab 5.2 Using Predefined Templates Lab 8.13 Creating a Performance Alert Lab 5.3 Creating a Simple Stored Procedure Lab 8.14 Creating a WMI Alert Lab 5.4 Creating a DDL Trigger Lab 8.15 Maintenance Plan Wizard Lab 5.5 Creating a Scalar User-Defined Function Lab 8.16 Copy Database Wizard Lab 5.6 Creating a T-SQL User-Defined Type Section-9 Labs Section-6 Labs Lab 9.1 Creating a Permanent Backup Device Lab 6.1 Setting the Authentication Mode Lab 9.2 Performing a Full Backup Lab 6.2 Creating Standard Logins Lab 9.3 Performing a Differential Backup Lab 6.3 Creating Windows Accounts Lab 9.4 Performing a Transaction Log Backup Lab 6.4 Creating SQL Server Logins for Windows Accounts Lab 9.5 Performing a Filegroup Backup Lab 6.5 Testing SQL Server Logins for Windows Accounts Lab 9.6 Backing Up to Multiple Devices Lab 6.6 Adding Logins to Fixed Server Roles Lab 9.7 Restoring a Database Lab 6.7 Creating User Accounts in AdventureWorks Lab 6.8 Statement and Object Permissions Section-10 Labs Lab 6.9 Adding Users to Fixed Database Roles Lab 6.10 Creating and Adding Users to Custom Database Lab 10.1 Installing a Distribution Server Roles Lab 10.2 Creating a Publication Lab 6.11 Creating an Application Role Lab 10.3 Creating a Subscription Lab 10.4 Replication Monitor Section-7 Labs Section-11 Labs Lab 7.1 bcp & sqlcmd parameters Lab 7.2 Bulk-Logged Recovery Model Lab 11.1 System Monitor Lab 7.3 TRY…CATCH Block Lab 11.2 Creating a Trace with Profiler Lab 11.3 Replaying a Trace Section-8 Labs Lab 11.4 Database Engine Tuning Advisor Lab 11.5 Reading SQL Server & Windows Event Logs Lab 8.1 Reconstructing an Index Lab 11.6 Activity Monitor Lab 8.2 Updating Index Statistics Lab 11.7 Connecting to the DAC Lab 8.3 Using DBCC CHECKDB on AdventureWorks Lab 8.4 Shrinking the Database Appendix-A SQL Server 2005 & 2008 Lab 8.5 Configuring a Mailhost Lab 8.6 Configuring the SQL Server Agent to Use the A1 SQL Server 2005 Books Online Mailhost A2 SQL Server 2005 Product Information Lab 8.7 Configuring an Operator A3 Update package 7 for SQL Server 2005 Service Pack 2 Lab 8.8 Creating a Fail-Safe Operator A4 SQL Server 2005 Solution Center Lab 8.9 Creating a Job A5 SQL Server 2008 Product Information
www.itttc.net 70-431 Utilities DVD
SQL Server 2005 E-books 70-431 Exam SQL Server 2005 Software Evaluation Edition (CD-1, CD-2 & SP1) VMWARE Software SQL Server CBT
www.itttc.net Cisco
CCNA CCNP Cisco VoIP
www.itttc.net www.itttc.net CCNA 640-802 (ICND-1 640-822 + ICND-2 640-816) Cisco Certified Network Associate
Routing Units Unit-4 IP Routing & Routing Protocols
4.1 Distance Vector vs. Link State Routing Chapter-0 Evolving Network Model 4.2 Link State Operation 4.3 Routing Updates 0.1 IIN & SONA 4.4 Routing Tables 0.2 Campus Network 0.3 Enterprise Model Unit-5 Dynamic Routing Protocols Part I
Unit-1 Internetworking 5.1 RIP v1 Overview 5.2 IGRP Overview 1.1 Internetworking 5.3 EIGRP Overview 1.2 OSI Model 5.4 OSPF Overview 1.3 Ethernet Networks 1.4 Ethernet Cabling Unit-6 Managing a Cisco Router & Internetwork 1.5 Network Domain 1.6 Ethernet Addressing 6.1 Router Configuration Register 1.7 Cisco 3-Layer Hierarchical Model 6.2 Router Password Recovery 1.8 Ethernet Frame Types 6.3 IOS Image Backup and Upgrade 6.4 IP Host Tables Unit-2 TCP/IP Addressing & Protocols
Unit-7 IP Access Lists 2.1 IP Addressing Overview 2.2 IP Subnetting Part I 7.1 Standard IP Access List 2.3 VLSM Part I 7.2 Extended IP Access List 2.4 NAT Overview
Unit-3 Basic Router Configuration Switching & WAN Units
3.1 Cisco Routers Unit-1 Layer-2 Switching 3.2 Connecting to a Cisco Router 3.3 Booting a Cisco Router 1.1 Ethernet Overview 3.4 Cisco Router Components 1.2 Switch vs. Bridge 3.5 Cisco Router Models 1.3 Switch Functions 3.6 Cisco Router Passwords 1.4 How a Switch Works (Example) 3.7 Cisco Router Commands 1.5 LAN Switch Types 3.8 Cisco Router Banner 1.6 Configuring Cisco 1900 Series 3.9 Cisco Router Interfaces 1.7 Configuring Cisco 2950 Series 3.10 Cisco Router Serial Interfaces 1.8 Cisco Switch Verification 3.11 Router Configuration Commands 1.9 Switch Port Security 3.12 Troubleshooting 1.10 Static MAC Addresses 3.13 Verifying Router Configuration 1.11 Port Security on 1900
www.itttc.net 1.12 Port Security on 2950 5.4E Example: LMI Configuration 1.13 CDP Overview 5.5 Frame Relay Congestion Control 1.14 CDP Commands 5.6 Subinterfaces 5.7 Monitoring Frame Relay Unit-2 Spanning Tree Protocol Routing, Switching & WAN Part II 2.1 STP Overview 2.2 STP Terminology Unit-1 TCP/IP Addressing & Protocols 2.3 STP Operation 2.4 STP Port States 1.1 IP Subnetting Part II 2.5 When to use STP 1.2 VLSM Part II 2.6 STP Examples 1.3 TCP/IP Suite Overview 1.4 Application Layer Protocols Unit-3 Virtual LANs 1.5 Transport Layer Protocols 1.6 Internet Layer Protocols 3.1 VLAN Overview 3.2 VLAN Trunking Unit-2 Cisco’s IOS and Security Device Manager 3.3 VLAN Trunking Protocols 3.4 VTP Pruning 2.1 SSH, Do Command & using the PIPE 3.5 Routing between VLANs 2.2 Cisco Security Device Manager (SDM) 3.6 Configuring VLANs 2.3 Cisco ASDM 5.2 for ASA (Demo) 3.7 Configuring Trunk Ports 2.4 SDM User Guide 3.6 Configuring Inter-VLAN Routing 3.7 Configuring VTP Unit-3 IP Routing & Routing Protocols
Unit-4 Wide Area Network 3.1 Routing Basics 3.2 IP Routing Examples 4.1 Introduction to WANs 3.3 Routing Loops 4.2 WAN Terminology 3.4 RIPv2 4.3 WAN Interface Types 4.4 WAN Connection Types Unit-4 Dynamic Routing Protocols Part II 4.5 WAN Protocols (HDLC) 4.6 WAN Protocols (PPP & Its Components) 4.1 EIGRP Overview 4.7 PPP LCP Configuration Options 4.2 Configuring EIGRP 4.8 PPP Session Establishment & Auth. Methods 4.3 OSPF 4.9 Configuring & Verifying PPP 4.4 Configuring OSPF 4.5 Configuring EIGRP & OSPF Summary Routes Unit-5 Frame Relay 4.6 Route Redistribution
5.1 Introduction to Frame Relay Unit-5 Managing a Cisco Router & Internetwork 5.2 Frame Relay Technology and Terminology 5.3 Frame Relay Encapsulation, VCs & DLCI 5.1 Boot System Command and using Cisco IFS 5.4 Local Management Interface 5.2 Using SDM 5.2 for ASA to Manage Configuration Files www.itttc.net Unit-6 Layer-2 Switching & Advanced STP Topics 11.5 Migrating to IPv6 11.6 Configuring IPv6 6.1 Cisco 2960 Switches 6.2 Switching Services Unit-12 WAN Part II 6.3 PostFast, UplinkFast & BackboneFast 6.4 RSTP & Etherchannel 12.1 Cable & DSL 6.5 Catalyst Switch Configuration 12.2 Using SDM for WAN Connections 6.6 Getting Started with Cisco Network Assistant 12.3 VPNs 12.4 Introduction to Cisco IOS IPSec Unit-7 Voice VLANs 12.5 Using ASDM 5.2 for ASA for VPN & IPSec 12.6 Effective Bandwidth 7.1 Configuring Voice VLANs & IP Phone Voice Traffic 7.2 Using the CNA to Configure VLANs & Inter-VLAN Unit-13 Cisco Special Topics Routing 13.1 Telephony Network Unit-8 Security 13.2 PBX vs. Key System 13.3 Signaling 8.1 Secured Networking and Cisco IOS Firewalls 13.4 VoIP Network Components & Advantages 8.2 Advanced ACLs 13.5 Overview of Traffic Types 13.6 Multicast Addressing Unit-9 Network Address Translation 13.7 DHCP Overview 13.8 Configuring DHCP 9.1 NAT, NAT Types & NAT Names 13.9 DHCP Verification Commands 9.2 How NAT Works 9.3 Testing & Troubleshooting NAT Routing Labs 9.4 Using ASDM 5.2 for ASA to Configure NAT
Lab-1 Basic Router Configuration Unit-10 Cisco’s Wireless Technologies Lab-2 Routing in Two Subnets Lab-3 Routing in Four Subnets 10.1 Wireless Networking Overview Lab -4 Using Static and Default Routes 10.2 802.11 Standards Lab -5 Serial Communication 10.3 Cisco’s Unified Wireless Solution Lab -6 Configuring RIPv1 10.4 Split MAC Architecture Lab -7 Configuring IGPR 10.5 Wireless Security Lab -8 Configuring EIGRP Lab -9 Configuring OSPF Unit-11 IPv6 Lab -10 Configuring IP ACLs
11.1 Needs and Benefits of IPv6 11.2 IPv6 Addressing & Address Types 11.3 IPv6 Autoconfiguartion 11.4 Configuring Cisco Routers with IPv6, DHCPv6 & ICMPv6 11.5 IPv6 Routing Protocols
www.itttc.net Switching and WAN Labs CCNA 640-802 Exam Cisco Configuration Whitepapers (12) Lab-1 PC to PC Communication Cisco Tools Configuration Guides: Lab-2 Configuring CDP Cisco Switch 2960 Configuration Guide Lab-3 LAN Switching 2950 Cisco Network Assistant Lab-4 Configuring 1900 Series Switches Cisco Security Device Manager Lab-5 Configuring the 2950 Switches Lab-6 Configuring STP on 1900 Series Cisco CCNA 640-802 Video Mentor (ICND-1 & ICND-2) Labs Lab-7 Configuring VLAN on 1900 Series Lab-8 Configuring VLAN on 2950 Switches ICND1 Labs Lab-9 Configuring VLAN Trunking Lab-10 Configuring & Verifying PPP Lab 1 Navigating a Router/Switch Command-Line Interface Lab-11 Configuring and Verifying Frame Relay Lab 2 Router Configuration and Managing Configuration Files Lab-12 Configuring and Verifying FR Subinterfaces Lab 3 Switch Basics: Learning, Forwarding/Filtering, and Interface Settings Review Scenarios Lab 4 Finding the Subnet Number Lab 5 Finding the Broadcast Address and Range of Addresses in a Subnet OSI, Ethernet, NAT , Connections Lab 6 Finding All Subnets of a Network with Less Than 8 TCP/IP Protocols, Addressing, Subnetting Subnet Bits IOS Commands, Routes, IP Routing Table Lab 7 IP Subnet Design and Implementation CDP & Administrative Distance Lab 8 Static and Connected Routes Routing Protocols Lab 9 RIP Configuration RIP, IGRP, EIGRP & OSPF Switch & Switch Configuration ICND2 Labs STP General, Port States, Root Bridge VLAN Configuration, VLAN Troubleshooting, VTP Lab 1 Configuring VLANs Configuration Registration, Password Recovery, Lab 2 VTP Servers and Clients Configuration Files, IOS Images Lab 3 RIP V1 with Split Horizon, Route Poisoning, and Poison Standard IP ACLS, Extended IP ACLs Reverse WAN (HDLC & PPP & ATM) Lab 4 Single Area and Multi-area OSPF Configuration Frame Relay General & Configuration Lab 5 EIGRP Configuration and Operation Lab 6 Understanding EIGRP Metric Calculations ITTTC CCNA 640-802 Utilities CD Lab 7 NAT Overload (PAT) Lab 8 IPv6 Subnetting and Address Configuration Boson NetSIM 6 Lab 9 PPP and CHAP Configuration Cisco CCNA Discovery & Exploration Lab 10 Access Lists E-books Lab 11 Access Lists II Tools: ADSM 5.21, IP Subnet Calculator, SDM, Wildcard Calculator CCNA 640-802 Video Mentor Labs
www.itttc.net CCNP BSCI 642-901 Building Scalable Cisco Internetworks
Chapter-0 Evolving Network Model Chapter-6 EIGRP in Scalable Networks
0.1 IIN & SONA 6.1 EIGRP Usage 0.2 Campus Network 6.2 EIGRP Scalability 0.3 Enterprise Model Chapter-7 Integrated IS-IS Chapter-1 IP Routing Principles 7.1 Integrated IS-IS Overview 1.1 Routing Fundamentals 7.2 Integrated IS-IS Operation 1.2 Routing Environment and Protocols 7.3 Configuring Integrated IS-IS 1.3 Routing Protocols and Convergence 7.4 Verifying and Troubleshooting Integrated IS-IS 1.4 Routing Table Analysis Chapter-8 Configuring BGP Chapter-2 IP Addressing 8.1 BGP Overview 2.1 IP Addressing Overview 8.2 BGP Terminology and Attributes 2.2 VLSM Fundamentals 8.3 BGP Operation 2.3 Route Summarization 8.4 BGP Configuration 2.4 CIDR Mechanism and Helper Address CS Case Study: BGP
Chapter-3 Configuring OSPF in a Single Area Chapter-9 Implementing BGP in Scalable Networks
3.1 OSPF Fundamentals 9.1 BGP Scalability Issues and Solutions 3.2 OSPF Operating Environments 9.2 Policy Control Fundamentals 3.1 Configuring OSPF in a Single Area 9.3 Multihoming 9.4 Redistributing with IGPs Chapter-4 Interconnecting Multiple OSPF Areas CS Case Study: Prefix Lists CS Case Study: Multihomed BGP 4.1 Creating Multiple OSPF Areas 4.2 OSPF Operation Across Multiple Areas Chapter-10 Network Connections 4.3 Configuring OSPF Multiarea Components 4.4 Route Summarization 10.1 Routing Protocols and Redistribution CS Case Study: Multiarea OSPF Configuration 10.2 Configuring Redistribution 10.3 Controlling Routing Update Traffic Chapter-5 EIGRP Operation and Configuration CS Case Study: Redistribution
5.1 EIGRP Fundamentals Chapter-11 Policy Based Routing Configuration 5.2 EIGRP Operation 5.3 EIGRP Configuration 11.1 Route Maps 11.2 Policy Based Routing
www.itttc.net Chapter-12 Multicasting CCNP BSCI Utilities CD
12.1 Overview of Traffic Types BSCI Labs 12.2 Multicast Addressing 12.3 Client Registration Lab-1 Configuring EIGRP 12.4 Multicast Routing Lab-2 Configuring OSPF for Multiple Areas and Frame Relay 12.5 Multicasting and Switches Nonbroadcast 12.6 Configuring your RPs Lab-3 Configuring Multihome BGP Lab-4 Configuring Multicast Chapter-13 DHCP & Configuration
Tools, Whitepapers & Exam 13.1 DHCP Overview and Addressing 13.2 Configuring DHCP 13.3 IP Helper Address and DHCP Relay Services ADSM 5.21 13.4 DHCP Verification Commands IP Subnet Calculator 13.5 Configuring DHCP Packet Tracer Security Device Manager (SDM) Chapter-14 IPv6 Wildcard Calculator NetSIM 6 14.1 IPv6 Overview & Address Representation Cisco Configuration Whitepapers (17 Whitepaper) 14.2 IPv6 Header Fields 642-901 Practice Exam 14.3 IPv6 Address Types & Mobility 14.4 IPv6 Routing using OSPFv3 Cisco BSCI Flash Simulation Labs 14.5 Configuring and Verifying OSPFv3 14.6 IPv6-to-IPv4 Transition Mechanisms Lab-1 Network Discovery - Router 1 Lab-2 Network Discovery - Router 2 Lab-3 Network Discovery - Router 3 Lab-4 IP Address - Helper Command Lab-5 Configuring Single Area OSPF Lab-6 Verifying Single Area OSPF Lab-7 Configuring OSPF- NBMA Environment Lab-8 Enabling OSPF- NBMA Network Lab-9 Configure Multi-area OSPF Network Lab-10 Configure Multi-area OSPF Network II Lab-11 Stub Areas Lab-12 Totally Stubby Areas Lab-13 Not So Stubby Areas – Creation Lab-14 Virtual Links – Setup Lab-15 Virtual Links – Creation Lab-16 Redundant EIGRP - Routers A-C Lab-17 Redundant EIGRP - Routers D-E Lab-18 Redundant EIGRP - Testing
www.itttc.net Lab-19 EIGRP Across Frame - Relay I Lab-20 EIGRP Across Frame - Relay II Lab-21 Configuring BGP Lab-22 Configuring Basic BGP Lab-23 Creating a BGP Route Reflector Lab-24 BGP Route Reflection AS 100 Lab-25 BGP Route Reflection AS 100 and 300 Lab-26 BGP Route Reflection - Router C Lab-27 Configuring BGP Connection Weight Lab-28 Route Redistribution - Routers A and B Lab-29 Route Redistribution - Routers C and D Lab-30 Route Redistribution – Verification Lab-31 Modifying Redistributed Administrative Distances Lab-32 Redistribution with Route Filters Lab-33 Route Map Creation Lab-34 IGRP Integration Lab-35 Directed-Broadcast Handling
www.itttc.net www.itttc.net CCNP ONT 642-845 Optimizing Converged Cisco Networks
Chapter-0 Evolving Network Model Chapter 6 Implementing QoS Pre-Classify and Deploying End-to-End QoS 0.1 IIN & SONA 0.2 Campus Network 6.1 Implementing QoS Pre-Classify 0.3 Enterprise Model 6.2 Deploying End-to-End QoS
Chapter 1 Cisco VoIP Implementations Chapter 7 Implementing AutoQoS
1.1 Introduction to VoIP Networks 7.1 Introducing AutoQoS 1.2 Digitizing & Packetizing Voice 7.2 Implementing and Verifying AutoQoS 1.3 Encapsulating Voice Packets 7.3 AutoQoS Shortcoming and Remedies 1.4 Bandwidth Calculation 1.5 Implementing VoIP Support in Enterprise Network Chapter 8 Wireless LAN QoS, Security & Management
Chapter 2 IP QoS 8.1 Wireless LAN QoS 8.2 Wireless LAN Security 2.1 Introduction to QoS 8.3 Wireless LAN Management 2.2 Identifying and Comparing QoS Models 2.3 QoS Implementation Methods Chapter 9 Cisco Special Topics
Chapter 3 Classification, Marking & NBAR 9.1 Cisco Security Device Manager 9.2 Cisco Network Assistant 3.1 Classification and Marking 9.3 Cisco AutoQoS Animation 3.2 The DiffServ, DSCP & PHBs 9.4 Cisco IOS QoS Animation 3.3 QoS Service Class, Trust Boundaries & NBAR 9.5 Cisco QoS Solutions Configuration Guide 3.4 Configuring NBAR using IOS
Chapter 4 Congestion Management and Queuing ONT Review Scenarios
4.1 Effective Bandwidth Cisco VoIP Implementations 4.2 Congestion Management and Queuing IP QoS 4.3 Weighted Fair Queuing Classification, Marking & NBAR 4.4 Class-Based Weighted Fair Queuing Congestion Management and Queuing 4.5 Low Latency Queuing Congestion Avoidance, Policing, Shaping, and Link 4.6 Queuing Comparison Efficiency Mechanisms Implementing QoS Pre-Classify and Deploying Chapter 5 Congestion Avoidance, Policing, Shaping, and End-to-End QoS Link Efficiency Mechanisms Implementing AutoQoS 5.1 Congestion Avoidance Wireless LAN QoS, Security & Management 5.2 Traffic Shaping and Policing 5.3 Link Efficiency Mechanisms
www.itttc.net CCNP ONT Utilities CD
ONT Labs
Lab-1 Placing and Examining VoIP Calls Lab-2 Configuring CB-WFQ and LLQ Queuing Mechanisms Lab-3 Configuring Class-Based Header Compression Lab-4 Configuring LFI
Tools, Ebooks, Whitepapers
ADSM 5.21 IP Subnet Calculator Packet Tracer Security Device Manager (SDM) Wildcard Calculator NetSIM 6 Cisco Configuration Whitepapers Cisco ONT CBT
www.itttc.net CCNP ISCW 642-825 Implementing Secure Converged Wide Area Networks
Chapter-1 Network Conceptual Models Chapter-5 Cisco Device Hardening
1.1 IIN and SONA 5.1 Mitigating Network Attacks 1.2 Introduction to Campus Network 5.2 Disabling unused Cisco Router Network Services & 1.3 Enterprise Model Interfaces 5.3 Securing Cisco Router Installations and Administrative Chapter-2 Providing SOHO Teleworker Connectivity Access 5.4 Mitigating Threats and Attacks with Access Lists 2.1 Providing SOHO Teleworker Connectivity 5.5 Securing Management and Reporting Features 2.2 Cable Technology 5.6 Configuring AAA on Cisco Routers 2.3 DSL Technology 2.4 Layer-2 over DSL Chapter-6 Cisco IOS Threat Defenses 2.5 Configuring DSL CPE 2.6 Troubleshooting ADSL 6.1 Introducing the Cisco IOS Firewall 6.2 Configuring the Cisco IOS Firewall Chapter-3 Frame Mode MPLS 6.3 Introducing the Cisco IOS IPS 6.4 Configuring the Cisco IOS IPS 3.1 Introducing MPLS Networks 3.2 MPLS & MPLS VPN Terminology ISCW Review Scenarios 3.3 Frame Mode MPLS & CEF 3.4 MPLS Routers and MPLS Labels Providing SOHO Teleworker Connectivity 3.5 Label Distribution and Label Tables Frame Mode MPLS 3.6 Penultimate Hop Popping IPSec 3.7 Configuring Frame Mode MPLS Cisco Device Hardening 3.8 MPLS VPNs Cisco IOS Threat Defenses 3.9 Handling Customer Routes CCNP ISCW Utilities CD Chapter-4 IPSec ISCW Labs 4.1 IPSec 4.2 Establishing an IPSec VPN Lab-1 Configuring Frame Mode MPLS 4.3 Configuring a Site-to-Site VPN using SDM Lab-2 Configuring Site-to-Site VPN 4.4 Using and Configuring GRE Tunnel with IPSec Lab-3 Securing Cisco Routers 4.5 High Availability VPNs Lab-4 Configuring an IOS Firewall 4.6 Cisco Easy VPN & Configuring VPN Client Tools, Ebooks, Whitepapers
ADSM 5.21 / IP Subnet Calculator Packet Tracer 5 / Security Device Manager (SDM) Wildcard Calculator / Cisco Configuration Whitepapers Cisco ISCW CBT / ISCW Exam
www.itttc.net www.itttc.net CCNP BCMSN 642-815 Building Cisco Multilayer Switched Networks
Chapter-1 Network Requirements Chapter-5 Enhancements to STP
1.1 IIN & SONA 5.1 Cisco Enhancements to STP 1.2 Campus Network 5.2 Rapid STP 1.3 Enterprise Model 5.3 Multiple Spanning Tree 1.4 Nonhierarchical Network Devices.ppt 5.4 EtherChannels 5.5 EtherChannel Configuration Commands Chapter-2 Basic Switch Operation 5.6 Other STP Enhancements 5.7 Troubleshooting Tips & Debug Commands 2.1 Layer-2 Switch Operation 2.2 Multi Layer Switch Operation Chapter-6 Implementing InterVLAN Routing 2.3 Switching Tables 2.4 Troubleshooting Switching Tables 6.1 Routing Considerations 6.2 Configuring Routing between VLANs Chapter-3 VLANs 6.3 Routing Configuration on a Switch 6.4 Router on a Stick Setup 3.1 VLANs 6.5 Multi Layer Switching (MLS) Overview 3.2 VLAN Implementations 6.6 MLS using CEF 3.3 VLAN Assignment 6.7 CEF Example 3.4 Trunks & Frame Tagging 3.5 VLAN Tagging Mechanisms Chapter-7 Implementing High Availability in Campus 3.6 Native VLANs Networks 3.7 VLAN Ranges, Mapping & Services 3.8 Dynamic Trunk Protocol 7.1 Introducing HSRP Part I 3.9 Configuring, Verifying & Troubleshooting Trunk 7.2 Introducing HSRP Part II Connections 7.3 Configuring HSRP 3.10 VLAN Trunk Protocol 7.4 Virtual Router Redundancy Protocol (VRRP) 3.11 Configuring, Verifying and Troubleshooting VTP 7.5 Gateway Load Balancing Protocol (GLBP) 7.6 Redundancy with Switch Chassis Part I Chapter-4 Implementing STP 7.7 Redundancy with Switch Chassis Part II
4.1 Transparent Bridging Chapter-8 Wireless LANs 4.2 Spanning Tree Protocol (STP) 4.3 STP Components & Operation 8.1 WLAN Overview 4.4 STP Algorithm 8.2 802.11 Standards 4.5 Spanning Trees 8.3 Cisco's Unified Wireless Solution 4.6 Configuring and Verifying STP 8.4 Split MAC Architecture 8.5 Wireless Security 8.6 WLAN QoS 8.7 WLAN Security 8.8 WLAN Management
www.itttc.net
Chapter-9 Configuring Campus Switches to Support BCMSN Review Scenarios Voice Implement VLANs 9.1 Power Over Ethernet (PoE) Conduct the operation of STPs in a hierarchical network 9.2 Configuring & Verifying PoE Implement Inter-VLAN routing 9.3 Voice VLANs Implement gateway redundancy technologies 9.4 Voice QoS Describe and configure wireless client access 9.5 Diffserve QoS Describe and configure security features in a switched 9.6 Implementing QoS for Voice network 9.7 AutoQoS Configure support for voice 9.8 Verifying Voice QoS CCNP BCMSN Utilities CD
Chapter-10 Securing your Switch BCMSN Labs
10.1 Switch Security Lab-1 Configuring VLANs and VTP 10.2 Authentication, Authorization & Accounting (AAA) Lab-2 Routing Between VLANs 10.3 Switch Port Security Lab-3 Enabling and Optimizing HSRP 10.4 Port-based Authentication with 802.1X Lab-4 Configuring IP Telephony Support 10.5 VLAN ACLs 10.6 Private VLANs (PVLAN) Tools, Ebooks, Whitepapers 10.7 PVLAN Configuration 10.8 Mitigating Spoofing Attacks ADSM 5.21
IP Subnet Calculator Packet Tracer 5 Security Device Manager (SDM) Wildcard Calculator Cisco Configuration Whitepapers BCMSN CBT BCMSN Exam
www.itttc.net Introduction to Cisco Voice over IP
Chapter-1 Introduction to Telephony Network Chapter-6 Quality of Service
1.1 Telephony Network 6.1 Effective Bandwidth 1.2 PBX vs. Key System 6.2 Configuring QoS 1.3 Signaling 6.3 Voice Priority 1.4 VoIP Network Components and Advantages 6.4 Congestion Management 6.5 Policing and Shaping Chapter-2 Digitizing Voice 6.6 Shaping Frame Relay Networks 6.7 Using Compression 2.1 Sampling 6.8 Applying AutoQoS 2.2 Nyquist Theorem 2.3 Waveform Compression Chapter-7 Unified Messaging 2.4 Voice Bandwidth Calculation 7.1 Unified Messaging Chapter-3 Preparing for a VOIP Network 7.2 Conference Calling 7.3 Call Centers 3.1 PBX Reliability 3.2 Reliability vs. Availability 3.3 Replacing PBX Trunks Cisco VoIP Case Studies 3.4 Connecting a Router to a Phone Line
3.5 Connecting a Router to a Digital Circuit Chapter-1 VoIP Case Study 3.6 VoIP in the Home Chapter-2 VoIP Case Study Chapter-3 VoIP Case Study Chapter-4 Cisco Call Manager Chapter-4 VoIP Case Study Chapter-5 VoIP Case Study 4.1 Cisco Call Manager Chapter-6 VoIP Case Study 4.2 CCM Roles and Redundancy Chapter-7 VoIP Case Study 4.3 Placing Cisco CallManagers in the Network 4.4 Partitions and Calling Search Spaces Voice Bandwidth Calculators 4.5 Replacing Old Phones with IP Phones 4.6 Selecting Features for IP Phones VoIP Utilities CD 4.7 Securing Voice 4.8 Adding Video to Voice Calls 4.9 Cisco Call Manager Express VoIP Related Articles VoIP Related Ebooks Chapter-5 Gateway Protocols WAN Configuration Review Ebooks Information on CCVP Certification 5.1 Gateway Protocols 5.2 H.323 5.3 Cisco’s MGCP 5.4 SIP
www.itttc.net www.itttc.net CWNP
CWNA
www.itttc.net www.itttc.net CWNA: Certified Wireless Network Administrator
Chapter-1 Introduction to Wireless LANs 5.11 WLAN Accessories: RF Pigtail Adapter Cable 5.12 WLAN Accessories: Frequency Convertors 1.1 History of WLANs 5.13 WLAN Accessories: Bandwidth Control Units 1.2 Today’s WLAN Standards 5.14 WLAN Accessories: Test Kits 1.3 Applications of WLAN Chapter-6 Wireless LAN Organizations and Standards Chapter-2 Radio Frequency (RF) Fundamentals 6.1 FCC, ISM & UNII Bands 2.1 Concepts of RF behavior 6.2 Power Output Rules & WLAN Standards 2.2 RF Terminology 6.3 WLAN Organizations 2.3 VSWR (Voltage Standing Wave Ratio) 2.4 Line of Sight Chapter-7 802.11 Network Architecture 2.5 Calculating Power 7.1 Locating a Wireless LAN Chapter-3 Spread Spectrum Technology 7.2 SSIDs 7.3 Beacons 3.1 Spread Spectrum and its applications 7.4 WLAN Scanning 3.2 Spread Spectrum Technology: FHSS 7.5 Authentication & Association 3.3 Spread Spectrum Technology: DSSS 7.6 WLAN Authentication Methods 3.4 Comparing FHSS vs. DSSS 7.7 Emerging Wireless Security Solutions 7.8 Service Sets Chapter-4 Wireless LAN Infrastructure Devices 7.9 Roaming 7.10 VPN Solutions 4.1 Wireless LAN Infrastructure devices 7.11 Power Management Features 4.2 Access Point Options 4.3 Configuration & Management Chapter-8 MAC & Physical Layers 4.4 Wireless Bridge 4.5 Wireless Workgroup Bridge 8.1 Wireless LAN Frames vs. Ethernet Frames 4.6 Wireless LAN client devices 8.2 Collision Handling 4.7 Wireless LAN gateway devices 8.3 Fragmentation 8.4 Dynamic Rate Shifting Chapter-5 Antennas and Accessories 8.5 Distributed Coordination Function 8.6 Inter-Frame Spacing 5.1 RF Antenna Types 8.7 Slot Time 5.2 RF Antenna Concepts 8.8 Communication Process 5.3 RF Antenna Installation 8.9 RTS / CTS 5.4 PoE Devices 8.10 Configuring RTS / CTS 5.5 WLAN Accessories: Amplifiers 8.11 Modulation 5.6 WLAN Accessories: Attenuators 5.7 WLAN Accessories: Lightening Arrestors 5.8 WLAN Accessories: RF Splitters 5.9 WLAN Accessories: RF Connectors 5.10 WLAN Accessories: RF Cables
www.itttc.net Chapter-9 Troubleshooting Wireless LAN Installations 10.7 Emerging Security Solutions WEP Key Management 9.1 Multipath Wireless VPNs 9.2 Troubleshooting Multipath TKIP 9.3 Solutions for Multipath AES Based Solutions 9.4 Hidden Node Wireless Gateways Solutions to Hidden Node Problem 802.1x & EAP 9.5 Near / Far
9.6 System throughput 10.8 Corporate Security Policy 9.7 Co-location 10.9 Security Recommendations 9.8 Types of Interference
Narrow band Interference Chapter-11 Site Survey Fundamentals All band interference RF Signal Degradation & Interference 11.1 What is a Site Survey? Adjacent Channel & Co-Channel Interference 11.2 Preparing for a Site Survey 9.9 Range Considerations 11.3 Site Survey Equipment 11.4 Conducting a Site Survey Chapter-10 WLAN Security 11.5 Site Survey Reporting
10.1 WLAN Security IEEE 802.16 WIMAX Technology 10.2 WEP (Wired Equivalent Privacy)
10.3 Solutions to WEP Weakness WIMAX Overview WEP Keys Introduction to WIMAX Static WEP Keys How WIMAX Works Centralized Key Server What can WIMAX do WIMAX Cost 10.4 AES (Advanced Encryption Standard) WIMAX Scenario 10.5 Filtering By SSID IEEE 802.11n Standard By MAC Address 802.11n Overview By Protocol 802.11n MIMO 802.11n Linksys Products 10.6 Attacks on WLANs Passive Active Jamming Man in the Middle
www.itttc.net Wimax & 802.11n Products WLAN Scanning Emerging Wireless Security Solutions D-Link Range Boosters VPN Solutions D-Link Power over Ethernet (PoE) Power Management Features D-Link WIFI Phone Dynamic Rate Shifting D-Link VoIP Router RTS / CTS D-Link Wireless Router Modulation D-Link MIMO Devices Multipath Proxim WIMAX Hidden Node Solectek WIMAX WEP Passive Attacks on Wireless LANs Linksys Products Demo and Wireless LAN Policy WEP Key Management Site Survey Equipment Linksys Products Description Linksys Products Demo CWNA Additional Features Configuring Wireless LAN Policy in Server 2003
Wireless LAN Articles CWNA Wireless LAN Labs CWNA Labs Wireless E-Books Today’s WLAN Standards Linksys Products Concepts of RF behavior Wireless Tools (Netstumbler) Comparing FHSS vs. DSSS Access Point Options Wireless Bridge Wireless Workgroup Bridge Wireless LAN client devices Wireless LAN gateway devices RF Antenna Types PoE Devices WLAN Accessories: Amplifiers WLAN Accessories: Attenuators WLAN Accessories: Lightening Arrestors WLAN Accessories: RF Splitters WLAN Accessories: RF Connectors WLAN Accessories: RF Cables WLAN Accessories: RF Pigtail Adapter Cable WLAN Accessories: Frequency Convertors WLAN Accessories: Bandwidth Control Units WLAN Accessories: Test Kits WLAN Organizations
www.itttc.net www.itttc.net