Jewellery Designing Interrior Designing Fashion Designing Aonline Training Franchise Scheme Send Free E-Greetings
Franchise Scheme Latest Courses At Compufield
Compufield now in Bandr
Franchise enquiry welcome It corporate Training World wide

  Network Certification Courses :
    PC Assembling I A+ Certification I Network Engineering I MCSE 2003 I CCNA I CCNP I CCIE I CWNA I LINUX  I A+ & MCSE 2003 I
    A+ & MCSE 2003 + CCNA I A+ & MCSE 2003 + CCNA + LINUX I A+ & MCSE 2003 + CCNA + CCNP I A+ & MCSE 2003 + CCNA + CCNP + LINUX I
   MCSE 2003 + CCNA I MCSE 2003 + CCNA + LINUX I MCSE 2003 + CCNA + CCNP I MCSE 2003 + CCNA + CCNP + LINUX I CCNA + CCNP I
    CCNA + CCNP + LINUX I CCNA + CCNP + CCIE I CCNA + CCNP + CCIE + LINUX I

   Network Security Courses :
   PIX Firewall Advanced I COMPTIA Security+ I Checkpoint I CCSA I
Search For Our Courses

ISO 9001:2000 Certified Computer Institute
Why do
Foreign/Indian Students prefer to study at COMPUFIELD?

Home
Join our Newsletter


Enter your E-Mail


ABout Us
Courses
Registration
Our Students
Business Offer

MCSE_2003 + CCNA + CCNP

MCSE_2003
( Micorsoft Certified Systems Engineer )



     
 


Divesh.I, Course-"MCSE + CCNA + CCNP", Country-"India"
Divesh.I
(Ind)

Saiyed.K, Course-"MCSE + CCNA + CCNP", Country-"UK"
Saiyed.K
(British)

Akinsey.K, Course-"MCSE + CCNA + CCNP", Country-"Nigeria"
Akinsey.K
(Nigeria)

Sameer.R, Course-"MCSE + CCNA + CCNP", Country-"Afganistan"
Sameer.R
(Afganistan)

Robert.K, Course-"MCSE + CCNA + CCNP", Country-"UK"
Robert.K
(UK)
View Our Networking Student's Review

h startig frod

 For Corporate Training in this course CLICK HERE

pril at

Enquire About This Course
   
Name :
   
*Country Name
    e.g.India, UK, ....
Residence / Office Number :
Country Code City Code Number
    (Number-Coutry code & city code)
e.g. +91-22-23676218
     
Mobile Number :
     
*Email :
     
*Course Of Interest :
     
Enquiry :
    (*) Signed fields are mandatory.
   
   



Installing & Configuring Windows XP Professional (70-270)
  • Installing Windows XP Professional
  • Perform and troubleshoot an attended installation of Windows XP Professional.    Perform and troubleshoot an unattended installation of Windows XP Professional.    Install Windows XP Professional by using Remote Installation Services (RIS).    Install Windows XP Professional by using the System Preparation Tool. Create unattended answer files by using Setup Manager to automate the installation of    Windows XP Professional. Upgrade from a previous version of Windows to    Windows XP Professional. Prepare a computer to meet upgrade requirements.    Migrate existing user environments to a new installation. Perform post-installation updates and product activation. Troubleshoot failed installations.
  • Configuring and Troubleshooting the Desktop Environment
  • Configure and manage user profiles and desktop settings. Create users and     configure user environment by user profiles. Configure users for various roles.     Configure and manage groups. Configure support for multiple languages or     multiple locations. Enable multiple-language support. Configure multiple-language     support for users. Configure local settings. Configure Windows XP Professional for     multiple locations. Manage applications by using Windows Installer packages.     Configure Internet and Remote Access and VPN connectivity.
  • Implementing and Conducting Administration of Resources
  • Monitor, manage, and troubleshoot access to files and folders. Configure,    manage, and troubleshoot file compression. Control access to files and folders by    using permissions. Optimize access to files and folders. Manage and troubleshoot    access to shared folders. Create and remove shared folders. Control access to    shared folders by using permissions. Manage and troubleshoot Web server    resources. Connect to local and network print devices. Manage printers and print    jobs. Control access to printers by using permissions. Connect to an Internet    printer. Connect to a local print device. Configure and manage file systems.    Convert from one file system to another file system. Configure NTFS, FAT32, or    FAT file systems. Manage and troubleshoot access to and synchronization of    offline files.
  • Implementing, Managing, Monitoring, and Troubleshooting Hardware Devices and    Drivers
  • Implement, manage, and troubleshoot disk devices. Install, configure, and    manage DVD and CD-ROM devices. Monitor and configure disks. Monitor,    configure, and troubleshoot volumes. Monitor and configure removable media,    such as tape devices. Implement, manage, and troubleshoot display devices.    Configure multiple-display support. Install, configure, and troubleshoot a video    adapter. Configure Advanced Configuration Power Interface (ACPI). Implement,    manage, and troubleshoot input and output (I/O) devices. Monitor, configure, and    troubleshoot I/O devices, such as printers, scanners, multimedia devices, mouse,    keyboard, and smart card reader. Monitor, configure, and troubleshoot multimedia    hardware, such as cameras. Install, configure, and manage modems. Install,    configure, and manage Infrared Data Association (IrDA) devices. Install,    configure, and manage wireless devices. Install, configure, and manage USB    devices. Install, configure, and manage hand held devices. Install, configure, and    manage network adapters. Manage and troubleshoot drivers and driver signing.    Monitor and configure multiprocessor computers.
  • Monitoring and Optimizing System Performance and Reliability
  • Monitor, optimize, and troubleshoot performance of the Windows XP Professional    desktop. Optimize and troubleshoot memory performance. Optimize and    troubleshoot processor utilization. Optimize and troubleshoot disk performance.    Optimize and troubleshoot application performance.
  • Configure, manage, and troubleshoot Scheduled Tasks. Manage, monitor, and    optimize system performance for mobile users. Restore and back up the operating    system, System State data, and user data. Recover System State data and user    data by using Windows Backup. Troubleshoot system restoration by starting in    safe mode. Recover System State data and user data by using the Recovery    console.
  • Implementing, Managing, and Troubleshooting Network Protocol Services
  • Configure and troubleshoot the TCP/IP protocol. Connect to computers by using    dial-up networking. Connect to computers by using a virtual private network    (VPN) connection. Create a dial-up connection to connect to a remote access    server. Connect to the Internet by using dial-up networking. Configure and    troubleshoot Internet Connection Sharing (ICS). Connect to resources by using    Internet Explorer. Configure, manage, and implement Internet Information    Services (IIS). Configure, manage, and troubleshoot Remote Desktop and Remote    Assistance. Configure, manage, and troubleshoot an Internet Connection Firewall    (ICF).
  • Managing Windows Server 2003 Server (70-290)
  • Managing and Maintaining Physical and Logical Devices
  • Tools might include Device Manager, the Hardware Troubleshooting Wizard, and    appropriate Control Panel items.
  • Manage basic disks and dynamic disks.
  • Optimize server disk performance.
  • Implement a RAID solution
  • De-fragment volumes and partitions.
  • Monitor and Troubleshoot server hardware devices.
  • Install and configure server hardware devices.
  • Configure driver-signing options.
  • Configure device properties and resource settings for a device.
  • Diagnose and resolve issues related to server hardware settings and hardware    device driver upgrades.
  • Managing Users, Computers, and Groups
  • Manage local, roaming, and mandatory user profiles.
  • Create and manage computer accounts in an Active Directory environment.
  • Create and manage groups. Identify and modify the scope of a group.
  • Find domain groups in which a user is a member. Manage group membership.
  • Create and modify groups by using the Active Directory Users and Computers     Microsoft Management Console (MMC) snap-in.
  • Create and modify groups by using automation.
  • Create and manage user accounts. Import user accounts.
  • Create and modify user accounts by using the Active Directory Users    and Computers
  • Managing and Maintaining Access to Resources
  • Troubleshoot user authentication issues.
  • Troubleshoot Terminal Services.
  • Diagnose and resolve issues related to Terminal Services security.
  • Diagnose and resolve issues related to client access to Terminal Services.
  • Configure access to shared folders. Manage shared folder permissions.
  • Configure file system permissions.
  • Verify effective permissions when granting permissions.
  • Change ownership of files and folders.
  • Troubleshoot access to files and shared folders.
  • Troubleshoot print queues.
  • Manage a Web server. Manage Internet Information Services (IIS).
  • Manage security for IIS.
  • Managing and Maintaining a Server Environment
  • Monitor and analyze events. Tools might include Event Viewer and System    Monitor.
  • Manage software update infrastructure. Manage software site licensing.
  • Manage servers remotely. Manage a server by using Remote Assistance.
  • Manage a server by using Terminal Services remote administration mode
  • Manage a server by using available support tools.
  • Monitor system performance.
  • Monitor file and print servers. Tools might include Task Manager, Event Viewer,    and System Monitor.
  • Monitor disk quotas. Monitor print queues. Monitor server hardware for    bottlenecks.
  • Monitor and optimize a server environment for application performance.
  • Monitor memory performance objects.
  • Monitor network performance objects.
  • Monitor process performance objects.
  • Managing and Implementing Disaster Recovery
  • Perform system recovery for a server.
  • Implement Automated System Recovery (ASR).
  • Restore data from shadow copy volumes.
  • Back up files and System State data to media.
  • Configure security for backup operations.
  • Manage backup procedures.
  • Verify the successful completion of backup jobs.
  • Manage backup storage media.
  • Recover from server hardware failure.
  • Restore backup data. Schedule backup jobs

  • Planning Windows 2003 Server Network Infrastructure (70-291)
  • Implementing, Managing, and Maintaining IP Addressing
  • Configure TCP/IP addressing on a server computer. Manage DHCP. Manage DHCP    clients and leases. Manage DHCP Relay Agent. Manage DHCP databases. Manage    DHCP scope options. Manage reservations and reserved clients. Troubleshoot    TCP/IP addressing. Diagnose and resolve issues related to Automatic Private IP    Addressing (APIPA). Diagnose and resolve issues related to incorrect TCP/IP    configuration. Troubleshoot DHCP. Diagnose and resolve issues related to DHCP    authorization. Verify DHCP reservation configuration. Examine the system event    log and DHCP server audit log files to find related events. Diagnose and resolve    issues related to configuration of DHCP server and scope options. Verify that the    DHCP Relay Agent is working correctly. Verify database integrity.
  • Implementing, Managing, and Maintaining Name Resolution
  • Install and configure the DNS Server service. Configure DNS server options.    Configure DNS zone options. Configure DNS forwarding. Configure DNS caching    only.
  • Manage DNS. Manage DNS zone settings. Manage DNS record settings. Manage    DNS server options. Manage DNS zone options.
  • Monitor DNS. Tools might include System Monitor, Event Viewer, Replication    Monitor, and DNS debug logs
  • Implementing, Managing, and Maintaining Routing and Remote Access
  • Configure Routing and Remote Access user authentication. Configure remote    access authentication protocols. Configure Internet Authentication Service (IAS)    to provide authentication for Routing and Remote Access clients. Configure    Routing and Remote Access policies to permit or deny access. Manage remote    access. Manage packet filters. Manage Routing and Remote Access routing    interfaces. Manage devices and ports. Manage routing protocols. Manage Routing    and Remote Access clients. Manage TCP/IP routing. Manage routing protocols.    Manage routing tables. Manage routing ports. Implement secure access between    private networks. Troubleshoot user access to remote access services. Diagnose    and resolve issues related to remote access VPNs. Diagnose and resolve issues    related to establishing a remote access connection. Diagnose and resolve user    access to resources beyond the remote access server. Troubleshoot Routing and    Remote Access routing. Troubleshoot demand-dial routing. Troubleshoot    router- to-router VPNs.
  • Implementing, Managing, and Maintaining Network Infrastructure and Security
  • Implement secure network administration procedures. Implement security baseline    settings and audit security settings by using security templates. Implement the    principle of least privilege. Install and configure software update infrastructure.    Install and configure software update services. Install and configure automatic    client update settings. Configure software updates on earlier operating systems.    Monitor network protocol security. Tools might include the IP Security Monitor    Microsoft Management Console (MMC) snap-in and Kerberos support tools.    Troubleshoot network protocol security. Tools might include the IP Security    Monitor MMC snap-in, Event Viewer, and Network Monitor. Monitor network    traffic. Tools might include Network Monitor and System Monitor. Troubleshoot    connectivity to the Internet. Troubleshoot server services. Diagnose and resolve    issues related to service dependency. Use service recovery options to diagnose    and resolve service-related issues

  • Planning Windows 2003 Server Network Infrastructure (70-293)
  • Planning and Implementing Server Roles and Server Security
  • Configure security for servers that are assigned specific roles. Plan a secure    baseline installation. Plan a strategy to enforce system default security settings    on new systems. Identify client operating system default security settings.    Identify all server operating system default security settings. Plan security for    servers that are assigned specific roles. Roles might include domain controllers,    Web servers, database servers, and mail servers. Deploy the security    configuration for servers that are assigned specific roles. Create custom security    templates based on server roles. Evaluate and select the operating system to    install on computers in an enterprise. Identify the minimum configuration to    satisfy security requirements.
  • Planning, Implementing, and Maintaining a Network Infrastructure
  • Plan a TCP/IP network infrastructure strategy. Analyze IP addressing    requirements. Plan an IP routing solution. Create an IP subnet scheme. Plan and    modify a network topology. Plan the physical placement of network resources.    Identify network protocols to be used. Plan an Internet connectivity strategy.    Troubleshoot connectivity to the Internet. Troubleshoot TCP/IP addressing.    Diagnose and resolve issues related to Network Address Translation (NAT).    Diagnose and resolve issues related to name resolution cache information
  • Diagnose and resolve issues related to client configuration. Diagnose and resolve    issues related to client computer configuration. Diagnose and resolve issues    related to DHCP server address assignment. Plan a host name resolution strategy.    Plan a DNS namespace design. Plan zone replication requirements. Plan a    forwarding configuration. Plan for DNS security. Examine the interoperability of    DNS with third-party DNS solutions. Plan a NetBIOS name resolution strategy.    Plan a WINS replication strategy. Plan NetBIOS name resolution by using the    Lmhosts file. Troubleshoot host name resolution. Diagnose and resolve issues    related to DNS services. Diagnose and resolve issues related to client computer    configuration
  • Planning, Implementing, and Maintaining Routing and Remote Access
  • Plan a routing strategy. Plan routing for IP multicast traffic. Identify routing    protocols to use in a specified environment. Plan security for remote access    users. Plan remote access policies. Analyze protocol security requirements. Plan    authentication methods for remote access clients. Implement secure access    between private networks. Create and implement an IPSec policy. Troubleshoot    TCP/IP routing. Tools might include the route, tracert, ping, pathping, and netsh    commands and Network Monitor.
  • Planning, Implementing, and Maintaining Server Availability
  • Configure Active Directory service for certificate publication. Plan a public key    infrastructure (PKI) that uses Certificate Services. Identify the appropriate type    of certificate authority to support certificate issuance requirements. Plan the    enrollment and distribution of certificates. Plan for the use of smart cards for    authentication. Plan a framework for planning and implementing security. Plan for    security monitoring. Plan a change and configuration management framework for    security. Plan a security update infrastructure. Tools might include Microsoft    Baseline Security Analyzer and Microsoft Software Update Services. Plan network    traffic monitoring. Tools might include Network Monitor and System Monitor.

  • Planning & Implementing Active Directory Infrastructure (70-294)
  • Planning and Implementing an Active Directory Infrastructure
  • Plan a strategy for placing global catalog servers. Evaluate network traffic    considerations when placing global catalog servers. Evaluate the need to enable    universal group caching. Plan flexible operations master role placement. Plan for    business continuity of operations master roles. Identify operations master role    dependencies. Implement an Active Directory service forest and domain    structure. Create the forest root domain. Create a child domain. Create and    configure Application Data Partitions. Install and configure an Active Directory    domain controller. Set an Active Directory forest and domain functional level    based on requirements. Establish trust relationships. Types of trust relationships    might include external trusts, shortcut trusts, and cross-forest trusts. Implement    an Active Directory site topology. Configure site links. Configure preferred    bridgehead servers.
  • Managing and Maintaining an Active Directory Infrastructure
  • Manage an Active Directory forest and domain structure. Manage trust    relationships. Manage schema modifications. Add or remove a UPN suffix. Manage    an Active Directory site. Configure site boundaries. Configure replication    schedules. Configure site link costs.
  • Monitor Active Directory replication failures. Tools might include Replication    Monitor, Event Viewer, and support tools. Monitor Active Directory replication.    Monitor File Replication service (FRS) replication. Restore Active Directory    services. Perform an authoritative restore operation. Perform a non-authoritative    restore operation. Troubleshoot Active Directory. Diagnose and resolve issues    related to Active Directory replication. Diagnose and resolve issues related to    operations master role failure. Diagnose and resolve issues related to the Active    Directory database.
  • Planning and Implementing User, Computer, and Group Strategies
  • Plan Group Policy strategy. Plan a Group Policy strategy by using Resultant Set of    Policy (RSoP) Planning mode. Plan a strategy for configuring the user environment    by using Group Policy. Plan a strategy for configuring the computer environment    by using Group Policy. Configure the user environment by using Group Policy.    Distribute software by using Group Policy. Automatically enroll user certificates by    using Group Policy. Redirect folders by using Group Policy. Configure user security    settings by using Group Policy. Deploy a computer environment by using Group    Policy. Distribute software by using Group Policy. Automatically enroll computer    certificates by using Group Policy. Configure computer security settings by using    Group Policy. Managing and Maintaining Group Policy Troubleshoot issues related    to Group Policy application deployment. Tools might include RSoP and the gpresult    command. Maintain installed software by using Group Policy. Distribute updates to    software distributed by Group Policy. Configure automatic updates for network    clients by using Group Policy. Troubleshoot the application of Group Policy    security settings. Tools might include RSoP and the gpresult command.

  • Designing Active Directory & Network Infrastructure (70-297)
  • Creating the Conceptual Design by Gathering and Analyzing Business and    Technical Requirements
  • Environment. Analyze current network administration model. Analyze network    requirements. Analyze DNS for Active Directory service implementation. Analyze    the current DNS infrastructure. Analyze the current namespace. Analyze existing    network operating system implementation. Identify the existing domain model.    Identify the number and location of domain controllers on the network. Identify    the configuration details of all servers on the network
  • Analyze security requirements for the Active Directory service. Analyze current    security policies, standards, and procedures. Identify the impact of Active    Directory on the current security infrastructure. Identify the existing trust    relationships.
  • Identify constraints in the current network infrastructure. Interpret current    baseline performance requirements for each major subsystem. Analyze the impact    of the infrastructure design on the existing technical
  • Design the Active Directory and Network Services infrastructure to meet business    and technical requirements
  • Create the conceptual design of the Active Directory forest structure. Design the    Active Directory replication strategy. Create the conceptual design of the    organizational unit (OU) structure. Create the conceptual design of the DNS    infrastructure. Create the conceptual design of the WINS infrastructure. Create    the conceptual design of the DHCP infrastructure. Creating the Logical Design for    an Active Directory Infrastructure Design an OU structure. Identify the Group    Policy requirements for the OU structure. Design an OU structure for the purpose    of delegating authority. Design a security group strategy. Define the scope of a    security group to meet requirements.
  • Define user roles. Design a user and computer authentication strategy. Identify     common authentication requirements. Select authentication mechanisms.
  • Design a user and computer account strategy. Specify account policy    requirements. Specify account requirements for users, computers, administrators,    and services. Design an Active Directory naming strategy.
  • Identify NetBIOS naming requirements. Design migration paths to Active    Directory. Define whether the migration will include an in-place upgrade, domain    restructuring, or migration to a new Active Directory environment.
  • Design the administration of Group Policy objects (GPOs).
  • Creating the Logical Design for a Network Services Infrastructure
  • Design a DNS name resolution strategy. Create the namespace design. Identify    DNS interoperability with Active Directory, WINS, and DHCP. Specify zone    requirements. Specify DNS security. Design a DNS strategy for interoperability    with UNIX Berkeley Internet Name Domain (BIND) to support Active Directory.    Design a NetBIOS name resolution strategy. Design a WINS replication strategy
  • Design security for remote access users.
  • Design remote access policies. Specify logging and auditing settings. Design a    DNS service implementation. Design a strategy for DNS zone storage. Specify the    use of DNS server options. Identify the registration requirements of specific DNS    records. Design a remote access strategy. Specify the remote access method.    Specify the authentication method for remote access. Design an IP address    assignment strategy. Specify DHCP integration with DNS infrastructure. Specify    DHCP interoperability with client types.
  • Creating the Physical Design for an Active Directory and Network Infrastructure
  • Design DNS service placement. Design an Active Directory implementation plan.    Design the placement of domain controllers and global catalog servers. Plan the    placement of flexible operations master roles. Select the domain controller    creation process. Specify the server specifications to meet system requirements.    Design Internet connectivity for a company. Design a network and routing    topology for a company. Design a TCP/IP addressing scheme through the use of    IP subnets. Specify the placement of routers. Design IP address assignment by    using DHCP. Design a perimeter network. Design the remote access infrastructure.    Plan capacity. Ascertain network settings required to access resources. Design    for availability, redundancy, and survivability.
  • Skills measured by exam (70-298)
    Creating the Conceptual Design for Network Infrastructure Security by Gathering and Analyzing Business and Technical Requirements
    Analyze business requirements for designing security. Considerations include existing policies and procedures, sensitivity of data, cost, legal requirements, end-user impact, interoperability, maintainability, scalability, and risk.
    Analyze existing security policies and procedures.
    Analyze the organizational requirements for securing data.
    Analyze the security requirements of different types of data.
    Analyze risks to security within the current IT administration structure and security practices.

    Design a framework for designing and implementing security. The framework should include prevention, detection, isolation, and recovery.
    Predict threats to your network from internal and external sources.
    Design a process for responding to incidents.
    Design segmented networks.
    Design a process for recovering services.

    Analyze technical constraints when designing security.
    Identify capabilities of the existing infrastructure.
    Identify technology limitations.
    Analyze interoperability constraints.

    Creating the Logical Design for Network Infrastructure Security
    Design a public key infrastructure (PKI) that uses Certificate Services.
    Design a certification authority (CA) hierarchy implementation. Types include geographical, organizational, and trusted.
    Design enrollment and distribution processes.
    Establish renewal, revocation and auditing processes.
    Design security for CA servers.

    Design a logical authentication strategy.
    Design certificate distribution.
    Design forest and domain trust models.
    Design security that meets interoperability requirements.
    Establish account and password requirements for security.

    Design security for network management.
    Manage the risk of managing networks.
    Design the administration of servers by using common administration tools. Tools include Microsoft Management Console (MMC), Terminal Server, Remote Desktop for Administration, Remote Assistance, and Telnet.
    Design security for Emergency Management Services.

    Design a security update infrastructure.
    Design a Software Update Services (SUS) infrastructure.
    Design Group Policy to deploy software updates.
    Design a strategy for identifying computers that are not at the current patch level.

    Creating the Physical Design for Network Infrastructure Security
    Design network infrastructure security.
    Specify the required protocols for a firewall configuration.
    Design IP filtering.
    Design an IPSec policy.
    Secure a DNS implementation.
    Design security for data transmission.

    Design security for wireless networks.
    Design public and private wireless LANs.
    Design 802.1x authentication for wireless networks.

    Design user authentication for Internet Information Services (IIS).
    Design user authentication for a Web site by using certificates.
    Design user authentication for a Web site by using IIS authentication.
    Design user authentication for a Web site by using RADIUS for IIS authentication.

    Design security for Internet Information Services (IIS).
    Design security for Web sites that have different technical requirements by enabling only the minimum required services.
    Design a monitoring strategy for IIS.
    Design an IIS baseline that is based on business requirements.
    Design a content management strategy for updating an IIS server.

    Design security for communication between networks.
    Select protocols for VPN access.
    Design VPN connectivity.
    Design demand-dial routing between internal networks.

    Design security for communication with external organizations.
    Design an extranet infrastructure.
    Design a strategy for cross-certification of Certificate Services.

    Design security for servers that have specific roles. Roles include domain controller, network infrastructure server, file server, IIS server, terminal server, and POP3 mail server.
    Define a baseline security template for all systems.
    Create a plan to modify baseline security templates according to role.

    Designing an Access Control Strategy for Data
    Design an access control strategy for directory services.
    Create a delegation strategy.
    Analyze auditing requirements.
    Design the appropriate group strategy for accessing resources.
    Design a permission structure for directory service objects.

    Design an access control strategy for files and folders.
    Design a strategy for the encryption and decryption of files and folders.
    Design a permission structure for files and folders.
    Design security for a backup and recovery strategy.
    Analyze auditing requirements.

    Design an access control strategy for the registry.
    Design a permission structure for registry objects.
    Analyze auditing requirements.

    Creating the Physical Design for Client Infrastructure Security
    Design a client authentication strategy.
    Analyze authentication requirements.
    Establish account and password security requirements.

    Design a security strategy for client remote access.
    Design remote access policies.
    Design access to internal resources.
    Design an authentication provider and accounting strategy for remote network access by using Internet Authentication Service (IAS).

    Design a strategy for securing client computers. Considerations include desktop and portable computers.
    Design a strategy for hardening client operating systems.
    Design a strategy for restricting user access to operating system features.

    Top

    Number
    MCSE Exam Description
    070-210
    Installing, Configuring, and Administering Microsoft Windows
    2000 Professional
    070-215
    Installing, Configuring, and Administering Microsoft Windows
    2000 Server
    070-216
    Implementing and Administering Microsoft Windows 2000 Network Infrastructure
    070-217
    Implementing and Administering Microsoft Windows 2000 Directory Services Infrastructure
    070-219
    Designing a Microsoft Windows 2000 Directory Services Infrastructure
    070-220
    Designing Security for a Microsoft Windows 2000 Network
    070-221
    Designing a Microsoft Windows 2000 Network Infrastructure

    MCSE Study material


    MCSE (MICROSOFT CERTIFIED SYSTEM ENGINEER)
    4-IN-1 Study System

    by Alan R. Carter

    Click here for more info

    Course Fees includes Study Material
    Course Fees does not include Examination Charges

    Overseas / Outstation & Local students can complete the course
    within 6 weeks if you take 8hrs daily

    Examination Fees : US $ 50 for one paper.

    CCNA

    ( CISCO Certified Network Associate )

    Topic Guidelines for CCNA Exam

     For Corporate Training in this course CLICK HERE



    The following topics are general guidelines for the content likely to be included on
    the CCNA exam. However, other related topics may also appear on any specific
    delivery of the exam.

    Bridging/Switching
    • Name and describe two switching methods
    • Distinguish between cut-through and store-and-forward LAN switching.
    • Describe the operation of the Spanning Tree Protocol and its benefits.
    • Describe the benefits of virtual LANs.

    OSI Reference Model & Layered Communications

    • Describe data link and network addresses and identify key differences
      between them.
    • Define and describe the function of the MAC address.
    • List the key internetworking functions for the OSI Network layer.
    • Identify at least three reasons why the industry uses a layered model.
    • Describe the two parts of network addressing; then identify the parts
      in specific protocol address examples.
    • Define and explain the five conversion steps of data encapsulation.
    • Describe connection-oriented network service and connectionless
      network service, and identify their key differences.
    • Identify the parts in specific protocol address examples.
    • Describe the advantages of LAN segmentation.
    • Describe LAN segmentation using bridges.
    • Describe LAN segmentation using routers.
    • Describe LAN segmentation using switches.
    • Describe the benefits of network segmentation with bridges.
    • Describe the benefits of network segmentation with routers.
    • Describe the benefits of network segmentation with switches.

    Network Protocols

    • Describe the different classes of IP addresses (and subnetting).
    • Identify the functions of the TCP/IP network-layer protocol.
    • Identify the functions performed by ICMP.
    • Configure IP addresses.
    • Verify IP addresses.
    • List the required IPX address and encapsulation type.

    Routing

    • Define flow control and describe the three basic methods used in
      networking.
    • Add the RIP routing protocol to your configuration.
    • Add the IGRP routing protocol to your configuration.

    WAN Protocols

    • Recognize key Frame Relay terms and features.
    • List commands to configure Frame Relay LMIs, maps, and subinterfaces.
    • List commands to monitor Frame Relay operation in the router.
    • State a relevant use and context for ISDN networking.
    • Identify ISDN protocols, function groups, reference points, and channels.
    • Identify PPP operations to encapsulate WAN data on CISCO routers

    Network Management

    • Configure standard access lists to figure IP traffic.
    • Configure extended access lists to filter IP traffic
    • Monitor and verify selected access list operations on the router.

    LAN Design

    • Describe full- and half-duplex Ethernet operation.
    • Describe network congestion problem in Ethernet networks.
    • Describe the features and benefits of Fast Ethernet.
    • Describe the guidelines and distance limitations of Fast Ethernet.

    Cisco Basics, IOS & Network Basics

    • Examine router elements.
    • Manage configuration files from the privilege EXEC mode.
    • Control router passwords, identification, and banner.
    • Identify the main CISCO IOS software commands for router startup.
    • Log in to a router in both user and privilege modes.
    • Check an initial configuration using the setup command.
    • Use the context-sensitive help facility.
    • Use the command history and editing features.
    • List the commands to load CISCO IOS software from: Flash memory,
      a TFTP server, or ROM.
    • Prepare to backup, upgrade, and load a backup CISCO IOS software
      image.
    • List problems that each routing type encounters when dealing with
      topology changes, and describe techniques to reduce the number of
      these problems.
    • Prepare the initial configuration of your router and enable IP.

      Exam Spotlight
    640 - 821 CCNA Two Part Harmony
    Exam # 640-821 Introduction to Cisco Technology (INTRO)
    Reviewer's Rating
    This new exam will test your knowledge of basic router configuration, cable type, IOS commands, the OSI model & subnetting
    Test 55 to 65 question, 60 minute time limit
    Information
    Cost Irs 2,000/- (US $ 50) candidates for CCNA must take in conjuction with #640-811 ICND exam
    Who Should take this exam?  
    640 - 811 CCNA Second Test
    Exam # 640-811 Interconnecting Cisco Networking Devices (ICND)
    Reviewer's Rating
    This new exam will test your knowledge of basic router troubleshooting, VLANs, IOS, commands, the OSI model & subnetting
    Test 55 to 65 question, 60 minute time limit
    Information
    Cost Irs 6,000/- (US $ 150) candidates for CCNA must take in conjuction with #640-821 INTRO exam
    Who Should take this exam? Current CCNA may use this exam to recertify.
    Students can take Paper 811 & 821 or 801

    640 - 801 NEW CCNA Exam
    Exam CCNA Exam (CCNA # 640-801)
    Reviewer's Rating
    will test your knowledge of extending switched networks with VLANS, determining IP routes, managing IP traffic with access lists
    Test
    55 to 65 question,(three simulation) 90 minutes time limit apx. score of 849 needed to pass
    Information Cost Irs 6,000/- (US $ 150)
    Who Should take this exam?
    Those who want to learn to earn their CCNA in one attempt (others can take the new two exam option)

    CCNA Study material


    CCNA: Cisco Certified Network Associate Study Guide (3rd Edition)
    by Todd Lammle

    Click here for more info


    CCNP Course module:

    Cisco Certified Network Associate (CCNA) certification is recommended for students to enroll in the Cisco Certified Network Professional (CCNP) curriculum. This advanced curriculum trains students to install, configure and operate local-and wide-area networks (LANs and WANs), and dial access services for organizations with networks from 100 to more than 500 nodes with protocols and technologies such as: TCP/IP, OSPF, EIGRP, BGP, ISDN, Frame Relay, STP, and VTP. The focus is on developing those skills that enable students to implement scalable networks, build campus networks using multilayer switching technologies, create and deploy a global intranet, and troubleshoot an environment using Cisco routers and switches for multiprotocol client hosts and services.


    CCNP features:

    • CCNP1—Advanced Routing
    • CCNP2—Remote Access
    • CCNP3—Multilayer Switching
    • CCNP4—Network Troubleshooting

    CCNP1 Advanced Routing Competencies:

    Upon completion of CCNP1, students will be able to perform advanced routing tasks including:

    Selecting and configuring scalable IP addresses.
    Implementing technologies to redistribute and support multiple, advanced, IP routing protocols such as OSPF, EIGRP, and BGP.
    Configuring access lists.
    Designing and testing edge router connectivity into a BGP network.

    CCNP2 Remote Access Competencies:

    Upon completion of CCNP2, students will be able to perform advanced remote access tasks including:

    • Configuring Asynchronous connections.
    • Point-to-Point Protocol (PPP) architecture, protocol, callback, and compression.
    • ISDN architecture, protocol layers, BRI and DDR.
    • Configuring X.25, Frame Relay, and AAA.

    CCNP3 Multilayer Switching Competencies:

    Upon completion of CCNP3, students will be able to perform multilayer switching tasks including:

    • Fast Ethernet, Gigabit Ethernet.
    • VLAN basics, types, identification, and trunking protocol.
    • Spanning Tree Protocol.
    • MLS processes, and configuration.
    • Multicasting protocols, routing, and tasks.

    CCNP4 Network Troubleshooting Competencies:

    Upon completion of CCNP4, students will be able to perform network-troubleshooting tasks in areas such as:

    • OSI Layers 1, 2, and 3.
    • TCP/IP, LAN switching, VLANs, Frame Relay, ISDN, Appletalk, Novell, EIGRP, OSPF, BGP Industry-Recognized Certification

    Cisco Certified Network Professional (CCNP) coursework prepares students for CCNP certification.

    A CCNP certified individual can perform the following tasks:

    • Implement appropriate technologies to build a scalable routed network
    • Build campus networks using multilayer switching technologies
    • Improve traffic flow, reliability, redundancy, and performance for campus LANs,    routed and switched WANs, and remote access networks
    • Create and deploy a global intranet
    • Troubleshoot an environment that uses Cisco routers and switches for    multiprotocol client hosts and services

    Positions for a CCNP certified individual include:

    • Network administrator
    • Level 2 support engineer
    • Level 2 systems engineer
    • Network technician
    • Deployment engineer

    Advance Your Career CCNP Certification

    Expand Your Professional Options Gaining and Certifying Advanced Skills
    The CCNP certification validates an individual’s networking skills at the midcareer level. Candidates who pass the required proctored exams will receive a CCNP certificate from Cisco and may use the CCNP designation on their business cards.
    CCNP forms the professional level of the Cisco Career Certification program.

    Who is the course for?

    Anyone with a good background in Computer Networks and the Internet and preferably CCNA qualified.

    What will the course give you?

    • Preparation for the CISCO Certified Network Professional Exams
    • Advanced networking skills to design, install and maintain large routed computer   networks.
    • Increased professional credibility by gaining high standards of technical expertise.
    • Skills necessary to improve your opportunities within the workforce.
    • The knowledge and skills necessary to take the CCNP exams

    What material is covered ?

    • Extending IP Addresses Using VLSMs
    • Configuring OFPF, Enhanced IGRP and BGP
    • Assembling and Cabling WAN Components
    • Using ISDN and DDR to Enhance Remote Connectivity
    • Scaling IP Addresses with PAT and NAT

    Introduction to Switching Concepts and Virtual LANs
    Support Resources for Troubleshooting
    Workgroup Discovery Lab and CCO
    • Documenting Symptoms, Actions and Results
    Tracking Log-ins and Connections
    • Troubleshooting VLANs on Routers and Switches

    CCNP Prereuisites
    Valid CCNA certification

    Exam Recommended Training FEES (IRS) US $
    642-901 BSCI Building Scalable Cisco Internetworks (BSCI) 7,500 150
    642-812 BCMSN Building Cisco Multilayer Switched Networks (BCMSN) 7,500 150
    642-825 ISCW Implementing Secure Converged Wide Area Networks (ISCW) 7,500 150
    642-845 ONT Optimizing Converged Cisco Networks (ONT) 7,500 150

    Building Scalable Cisco Internetworks Exam (BSCI)(642-901)

    The Building Scalable Cisco Internetworks (BSCI 642-901) is a qualifying exam for the Cisco Certified Network Professional CCNP, Cisco Certified Design Professional CCDP, and Cisco Certified Internetwork Professional CCIP certifications. The BSCI 642-901 exam will certify that the successful candidate has important knowledge and skills necessary to use advanced IP addressing and routing in implementing scalability for Cisco ISR routers connected to LANs and WANs. The exam covers topics on Advanced IP Addressing, Routing Principles, Multicast Routing, IPv6, Manipulating Routing Updates, Configuring basic BGP, Configuring EIGRP, OSPF, and IS-IS.

    Exam Topics

    The following information provides general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes the guidelines below may change at any time without notice.

    Implement EIGRP operations.

    • Explain the functions and operations of EIGRP (e.g., DUAL).
    • Configure EIGRP routing. (e.g., Stub Routing, authentication, etc.)
    • Verify or troubleshoot EIGRP routing configurations.

    Implement multiarea OSPF operations.

    • Explain the functions and operations of multiarea OSPF.
    • Configure multiarea OSPF routing. (e.g., Stub, NSSA, authentication, etc.)
    • Verify or troubleshoot multiarea OSPF routing configurations.

    Describe integrated IS-IS.

    • Describe the features and benefits of integrated IS-IS.
    • Configure and verify integrated IS-IS.

    Implement Cisco IOS routing features.

    • Describe, configure or verify route redistribution between IP routing IGPs. (e.g., route-maps, default routes, etc.)
    • Describe, configure or verify route filtering (i.e., distribute-lists and passive interfaces).
    • Describe and configure DHCP services (e.g., Server, Client, IP helper address, etc.).

    Implement BGP for enterprise ISP connectivity

    • Describe the functions and operations of BGP.
    • Configure or verify BGP operation in a non-transit AS (e.g., authentication).
    • Configure BGP path selection. (i.e., Local Preference, AS Path, Weight or MED attributes).

    Implement multicast forwarding.

    • Describe IP Multicast (e.g., Layer-3 to Layer-2 mapping, IGMP, etc.).
    • Describe, configure, or verify IP multicast routing (i.e., PIM Sparse-Dense Mode).

    Implement IPv6.

    • Describe IPv6 addressing operations.
    • Describe IPv6 interoperation with IPv4.
    • Describe, configure or verify OSPF routing with IPv6 addressing.

    Building Cisco Multilayer Switched Networks (BCMSN)(642-812)

    The Building Converged Cisco Multilayer Switched Networks (BCMSN 642-812) is a qualifying exam for the Cisco Certified Network Professional CCNP® and the Cisco Certified Design Professional CCDP® certifications. The BCMSN 642-812 exam will certify that the successful candidate has important knowledge and skills necessary to implement scalable multilayer switched networks. The exam includes topics on Campus Networks, describing and implementing advanced Spanning Tree concepts, VLANs and Inter-VLAN routing, High Availability, Wireless Client Access, Access Layer Voice concepts, and minimizing service Loss and Data Theft in a Campus Network.

    Exam Topics

    The following information provides general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes the guidelines below may change at any time without notice.

    Implement VLANs.

    • Explain the functions of VLANs in a hierarchical network.
    • Configure VLANs (e.g., Native, Default, Static and Access).
    • Explain and configure VLAN trunking (i.e., IEEE 802.1Q and ISL).
    • Explain and configure VTP.
    • Verify or troubleshoot VLAN configurations.

    Conduct the operation of Spanning Tree protocols in a hierarchical network.

    • Explain the functions and operations of the Spanning Tree protocols (i.e., RSTP, PVRST, MISTP).
    • Configure RSTP (PVRST) and MISTP.
    • Describe and configure STP security mechanisms (i.e., BPDU Guard, BPDU Filtering, Root Guard).
    • Configure and Verify UDLD and Loop Guard.
    • Verify or troubleshoot Spanning Tree protocol operations.
    • Configure and verify link aggregation using PAgP or LACP.

    Implement Inter-VLAN routing.

    • Explain and configure Inter-VLAN routing (i.e., SVI and routed ports).
    • Explain and enable CEF operation.
    • Verify or troubleshoot InterVLAN routing configurations.

    Implement gateway redundancy technologies.

    • Explain the functions and operations of gateway redundancy protocols (i.e., HSRP, VRRP, and GLBP).
    • Configure HSRP, VRRP, and GLBP.
    • Verify High Availability configurations.

    Describe and configure wireless client access.

    • Describe the components and operations of WLAN topologies (i.e., AP and Bridge).
    • Describe the features of Client Devices, Network Unification, and Mobility Platforms (i.e., CCX, LWAPP).
    • Configure a wireless client (i.e., ADU).

    Describe and configure security features in a switched network.

    • Describe common Layer 2 network attacks (e.g., MAC Flooding, Rogue Devices, VLAN Hopping, DHCP Spoofing, etc.)
    • Explain and configure Port Security,802.1x, VACLs, Private VLANs, DHCP Snooping, and DAI.
    • Verify Catalyst switch (IOS-based) security configurations (i.e., Port Security, 802.1x, VACLs, Private VLANs, DHCP Snooping, and DAI).

    Configure support for voice.

    • Describe the characteristics of voice in the campus network.
    • Describe the functions of Voice VLANs and trust boundaries.
    • Configure and verify basic IP Phone support (i.e. Voice VLAN, Trust and CoS options, AutoQoS for voice)

    Implementing Secure Converged Wide Area Networks (ISCW) (642-825)

    In the Building Cisco Remote Access Networks course, students learn how to build, configure and troubleshoot a remote access network to interconnect central sites to branch offices and home offices. Students also learn how to control access to the central site, as well as to maximize bandwidth utilization over the remote links.

    Exam Topics

    The following information provides general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes the guidelines below may change at any time without notice.

    Implement basic teleworker services.

    • Describe Cable (HFC) technologies.
    • Describe xDSL technologies.
    • Configure ADSL (i.e., PPPoE or PPPoA).
    • Verify basic teleworker configurations.

    Implement Frame-Mode MPLS.

    • Describe the components and operation of Frame-Mode MPLS (e.g., packet-based MPLS VPNs).
    • Configure and verify Frame-Mode MPLS.

    Implement a site-to-site IPSec VPN

    • Describe the components and operations of IPSec VPNs and GRE Tunnels.
    • Configure a site-to-site IPSec VPN/GRE Tunnel with SDM (i.e., preshared key).
    • Verify IPSec/GRE Tunnel configurations (i.e., IOS CLI configurations).
    • Describe, configure, and verify VPN backup interfaces.
    • Describe and configure Cisco Easy VPN solutions using SDM.

    Describe network security strategies.

    • Describe and mitigate common network attacks (i.e., Reconnaissance, Access, and Denial of Service).
    • Describe and mitigate Worm, Virus, and Trojan Horse attacks.
    • Describe and mitigate application-layer attacks (e.g., management protocols).

    Implement Cisco Device Hardening

    • Describe, Configure, and verify AutoSecure/One-Step Lockdown implementations (i.e., CLI and SDM).
    • Describe, configure, and verify AAA for Cisco Routers.
    • Describe and configure threat and attack mitigation using ACLs.
    • Describe and configure IOS secure management features (e.g., SSH, SNMP, SYSLOG, NTP, Role-Based CLI, etc.)

    Implement Cisco IOS firewall.

    • Describe the functions and operations of Cisco IOS Firewall (e.g., Stateful Firewall, CBAC, etc.).
    • Configure Cisco IOS Firewall with SDM.
    • Verify Cisco IOS Firewall configurations (i.e., IOS CLI configurations, SDM Monitor).

    Describe and configure Cisco IOS IPS.

    • Describe the functions and operations of IDS and IPS systems (e.g., IDS/IPS signatures, IPS Alarms, etc.)
    • Configure Cisco IOS IPS using SD
    Optimizing Converged Cisco Networks (ONT) (642-845)

    The Optimizing Converged Cisco Networks (642-845 ONT) is a qualifying exam for the Cisco Certified Network Professional CCNP. The ONT 642-845 exam will certify that the successful candidate has important knowledge and skills in optimizing and providing effective QOS techniques for converged networks. The exam topics include implementing a VOIP network, implementing QoS on converged networks, specific IP QoS mechanisms for implementing the DiffServ QoS model, AutoQoS, wireless security and basic wireless management.

    Exam Topics

    The following information provides general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes the guidelines below may change at any time without notice.

    Describe Cisco VoIP implementations.

    • Describe the functions and operations of a VoIP network (e.g., packetization, bandwidth considerations, CAC, etc.).
    • Describe and identify basic voice components in an enterprise network (e.g. Gatekeepers, Gateways, etc.)

    Describe QoS considerations.

    • Explain the necessity of QoS in converged networks (e.g., bandwidth, delay, loss, etc.).
    • Describe strategies for QoS implementations (e.g. QoS Policy, QoS Models, etc.).

    Describe DiffServ QoS implementations.

    • Describe classification and marking (e.g., CoS, ToS, IP Precedence, DSCP, etc.).
    • Describe and configure NBAR for classification.
    • Explain congestion management and avoidance mechanisms (e.g., FIFO, PQ, WRR, WRED, etc.).
    • Describe traffic policing and traffic shaping (i.e., traffic conditioners).
    • Describe Control Plane Policing.
    • Describe WAN link efficiency mechanisms (e.g., Payload/Header Compression, MLP with interleaving, etc.).
    • Describe and configure QoS Pre-Classify.

    Implement AutoQoS.

    • Explain the functions and operations of AutoQoS.
    • Describe the SDM QoS Wizard.
    • Configure, verify, and torubleshoot AutoQoS implementations (i.e., MQC).

    Implement WLAN security and management.

    • Describe and Configure wireless security on Cisco Clients and APs (e.g., SSID, WEP, LEAP, etc.).
    • Describe basic wireless management (e.g., WLSE and WCS). Configure and verify basic WCS configuration (i.e., login, add/review controller/AP status, security, and import/review maps).
    • Describe and configure WLAN QoS.

     

    CCNA+CCNP
    Course Duration Fees (Indian Rs.) Fees (US $)
    330 hours 59,250 1695

    MCSE_2003 + CCNA + CCNP
    Course Duration Fees (Indian Rs.) Fees (US $)
    330 hours 66,000/- 1885

    • For Individual Training as per your schedule add 40% to the above mentioned price.

     



    Examination Fees
    Examination
    Subject
    Per Paper
    IRS.
    Per Paper
    US$
    No. of Papers Total Exam Fees
    IRS.
    Total Exam Fees
    US $
    MCSE_2003 2,500 50 7
    17,500
    350
    CCNA 6,750 150 1
    6,750
    150
    CCNP 6,750 150 4
    27,000
    600
         
    Total    51,250
    1100



    Lodging, boarding and travelling not included in the fees.
    The above mentioned fees is for one course.
       
    COMPUFIELD offers a unique style of learning -

    One computer : One student : One Instructor
    Maximum Instructor to Student Ratio 1:4
    Sessions : Each session will be of 1 hour.
    The timing can be fixed based on our mutual convenience,between 9.00 a.m. to 7.00 p.m.
    Overseas Students take 5 to 10 hours per day to complete their courses.
    Course duration in days = total sessions divide by number of sessions per day.
    The Above Mentioned Tuition Fees Includes Service Tax 12.36%
    No extra charges/refund for more/less time taken to complete the course.


    top

    Solve your Queries Online related to our Courses

    Mobile Number
    M.E. Khairaz (MD)
    +91 - 9820134058

    Gmail
     compufield@gmail.com
    Yahoo Messenger
    Yahoo Messenger
    compufield@yahoo.com
    ICQ
    MSN Messenger
    compufield@hotmail.co.uk
    Skype
    compufieldinfo@skype.com
    Facebook
    Facebook
    Twitter
    Twitter
    Address-HO : Chinoy Mansion, 1st Flr, Block #2, Opp. St.Stephen's Church, Warden Road, Mumbai-400 036, India.+91-22-236762182