MCTS 2008 Certification Training in Classroom by MCTS Certified engineers
when you buy 3 or more courses
The discount will be automaticallyThere are no open public schedule dates for MCTS Windows Server 2008 Network Infrastructure, Configuring Certification course. We can offer you a private training or arrange a public course for you. Contact us here and we can make arrangements for your course.
This Microsoft Certified Technology Specialist (MCTS) Windows Server 2008 Network Infrastructure, Configuring Certification course is designed to provide delegates with the necessary knowledge to pursue MCTS 2008. Network Infrastructure certification validates your ability to build comprehensive network infrastructure solutions. Show that you have the skills needed to run a highly efficient and modern data center, with expertise in identity management, systems management, virtualization, storage, and networking.
This course can be taken as fast track in five days by network engineers. The normal track course is recommended for beginners and last for 5 weeks (one class on weekend or two classes in weekday evenings)
This short MCTS fast track course is hands-on, instructor led and classroom based. This training can be taken as a part-time evening course or even on the weekends.
This training course is for you if you are interested in becoming Microsoft Certified Technology Specialist.
Training Dragon consultants have been implementing professional Microsoft networking solutions across a range of companies for many years. Those consultants write and teach our MCTS training courses, so their experience directly informs course content.
This MCTS training is designed to prepare you not only for MCTS certification, but also to train you for your next job. To do this, next to certification you will also work on real-world practical MCTS related exercises in this MCTS course. This will ensure that you can apply the knowledge gained from this course to your work environment.
MCTS electronic notes are included in this course. You will also take practice exams as part of the course.
After completing this training you will receive MCTS course completion certificate.
After the course if you have any problems or questions regarding MCTS, do not hesitate to contact us. Training Dragon’s trainers and career consultants are expert in their fields and if you need any help with you career choice, please speak to one of our career consultants.
We are sure that you will pass your MCTS certification exam at first attempt. However, if you don’t, you can come back within a year and take the complete course for free.
This MCTS certification course is based on the official Microsoft recommended course syllabus.
This MCTS certification course prepares you for following exams.
In order to become an MCTS 2008 you will need to pass total threeexams.
Following three are MCTS Windows Server 2008 exams:
After completing MCTS 2008 Windows Server Certification then you can take two additional exams to become MCSE 2008. More details about MCSE 2008 here
Module 1: Planning and Configuring IPv4This module explains how to deploy and configure networking services in your organization. This module explains how to implement an IPv4 addressing scheme, determine which name services to deploy, and troubleshoot network-related problems.Lessons
Lab : Planning and Configuring IPv4
Module 2: Configuring and Troubleshooting DHCPThis module introduces you to Dynamic Host Configuration Protocol (DHCP), which plays an important role in the Windows Server 2008 R2 infrastructure. It is the primary means of distributing important network configuration information to network clients, and it provides configuration information to other network-enabled services, including Windows Deployment Services (WDS) and Network Access Protection (NAP). To support and troubleshoot a Windows Server-based network infrastructure, it is important that you understand how to deploy, configure, and troubleshoot the DHCP Server Role.Lessons
Lab : Configuring and Troubleshooting the DHCP Server Role
Module 3: Configuring and Troubleshooting DNSThis module introduces you to Domain Name System (DNS), which is the foundation name service in Windows Server 2008 R2. It is vital that you understand how to deploy, configure, manage, and troubleshoot this critical service.Lessons
Lab : Configuring and Troubleshooting DNS
Module 4: Configuring and Troubleshooting IPv6 TCP/IPThis module introduces you to IPv6, a technology that will help ensure that the Internet can support a growing user base and the increasingly large number of IP-enabled devices. The current Internet Protocol Version 4 (IPv4) has served as the underlying Internet protocol for almost thirty years. Its robustness, scalability, and limited feature set is now challenged by the growing need for new IP addresses, due in large part to the rapid growth of new network-aware devices.Lessons
Lab : Configuring an ISATAP Router
Lab : Converting the Network to Native IPv6
Module 5: Configuring and Troubleshooting Routing and Remote AccessTo support your organization’s distributed workforce, you must become familiar with technologies that enable remote users to connect to your organization’s network infrastructure. These technologies include virtual private networks (VPNs) and DirectAccess. It is important that you understand how to configure and secure your remote access clients by using network policies. This module explores these remote access technologies.Lessons
Lab : Configuring and Managing Network Access
Lab : Configuring and Managing DirectAccess
Module 6: Installing, Configuring, and Troubleshooting the Network Policy Server Role ServiceNPS provides support for the Remote Authentication Dial-In User Service (RADIUS) protocol, and can be configured as a RADIUS server or proxy. Additionally, NPS provides functionality that is essential for the implementation of Network Access Protection (NAP). This module explains how to install, configure, and troubleshoot NPS.Lessons
Lab : Configuring and Managing Network Policy Server
Module 7: Implementing Network Access ProtectionIn this module, you will learn about Network Access Protection (NAP). NAP enables you to create customized health-requirement policies to validate computer health before allowing access or communication. NAP also automatically updates compliant computers to ensure on-going compliance and can limit the access of noncompliant computers to a restricted network until they become compliant.Lessons
Lab : Implementing NAP into a VPN Remote Access Solution
Module 8: Increasing Security for Windows ServersSecurity is an essential consideration for networking with Windows Server 2008. In this module, you will learn how to implement various methods to increase security. Windows Firewall with Advanced Security is one of the features in Windows Server 2008 that is used to increase security. You can also use Windows Server Update Services to ensure that approved security updates are applied to servers in a timely way.Lessons
Lab : Increasing Security for Windows Servers
Module 9: Increasing Security for Network CommunicationInternet Protocol security (IPsec) is a framework of open standards for protecting communications over IP networks through cryptographic security services. IPsec supports network-level peer authentication, data-origin authentication, data integrity, data confidentiality (encryption), and replay protection. The Microsoft IPsec implementation is based on standards that the Internet Engineering Task Force (IETF) IPsec working group developed. In this module, you will learn how to implement, configure, and troubleshoot IPsec.Lessons
Lab : Increasing Security for Network Communication
Module 10: Configuring and Troubleshooting Network File and Print ServicesFile and print services are some of the most commonly implemented network services for end users. Unlike infrastructure services like DNS, file and print services are highly visible to the end users. In this module, you will learn how to configure and troubleshoot file and print services to provide high quality service to end users. In addition, you will see how both EFS and BitLocker can be used to increase the security of files that are located in file shares.Lessons
Lab : Configuring and Troubleshooting Network File and Print Services
Module 11: Optimizing Data Access for Branch Offices
Lessons
Lab : Implementing DFS
Lab : Implementing BranchCache
Module 12: Controlling and Monitoring Network StorageNetwork storage for users is a finite resource that must be managed appropriately to ensure that it remains available for all users. If network storage is not monitored and managed, it can become filled with irrelevant data, such as personal music or movies. Irrelevant data increases network storage costs and in some cases can prevent useful data from placement on the network storage. In this module, you will learn how to monitor and manage network storage.Lessons
Lab : Controlling and Monitoring Network Storage
Module 13: Recovering Network Data and ServersThis module explains how to recover network data and servers. There are a variety of scenarios where a network data or a server that provides networks services can be lost. Volume shadow copies can be used to restore previous versions of files when a file is accidentally deleted or modified on a computer that is running Windows Server 2008. Windows Server Backup can be used to back up and restore data files or an entire server.Lessons
Lab : Recovering Network Data and Servers
Module 14: Monitoring Windows Server 2008 Network Infrastructure Servers
Lessons
Lab : Monitoring Windows Server 2008 Network Infrastructure Servers