Microsoft Certified IT Professional Training(MCITP)

Microsoft Certified IT Professionalmcitp syllabus

  • 4.50

What is MCITP?

MCITP or Microsoft Certified IT Professional is a certification program for validating candidate knowledge to perform a particular job task like database administrator or enterprise messaging. MCIPT demonstrates that an individual is capable of managing day-after-day server operations as well as providing Windows Server 2008 administration.

Students learning for MCIPT will get exposure to:

1. Handle day to day management of the server os, file structure and directory services

2. Handle software distribution and updates

3. Monitor servers

4. Troubleshoot servers

5. Configure the server

6. Implement an auditing policy

7. Peform scheduled vulnerability assessment scans

WHY SHOULD YOU CONSIDER MCITP TRAINING?

MCITP affirmations/accreditations are based on the specialized capability measured in the Microsoft Certified Technology Specialist (MCTS) certifications. You will likewise appreciate taking advantages, for example:

1. Industry acknowledgment of your insight and capability with Microsoft items and innovations.

2. Access to specialized and product data coordinates from Microsoft through a secured zone of the MCP webpage.

3. MCITP authentication, transcript, wallet card, and lapel stick to distinguish you as a Microsoft Certified Professional to partners or customers.

Softcrayons Tech Solution being the best MCITP training Institute provides MCITP training to its students; with the help of our IT Proficient Faculty having +5 years of Industrial Experience handling live projects in this Sector. Students opting for this MCITP training course will get exposure to the list above, with live examples and practical applications. Students after the completion of the MCITP training course will get 100% Job placement assistance. We provide MCITP training in practical learning sessions with live projects under the guidance of expert faculty.Free lifetime membership card for MCITP training course is provided as well. We facilitate extra problem-solving classes excluding curriculum classes that help students to get the answer to problems faced in MCITP training course.

WHY SHOULD YOU CONSIDER MCITP TRAINING?

Students after the completion of MCITP Training can have job opportunities in the following designations:.

1. Senior Technical Consultant

2. MCITP trainer

3. System Administrator

Hired by top companies like WIPRO, SUPPRORT STAR, AMDOCS etc

Total Course Module

  • Describe the key features, editions, and hardware requirements of Windows 7
  • Perform a clean installation of Windows 7
  • Upgrade and Migrate to Windows 7 from an earlier version of Windows
  • Perform an image-based installation of Windows 7
  • Resolve common application compatibility issues.
  • Partitioning Disks in Windows 7
  • Managing Disk Volumes
  • Maintaining Disks in Windows 7
  • Installing and Configuring Device Drivers
  • Configuring Disk Quotas (Optional)
  • Updating a Device Driver
  • Overview of Windows File Systems
  • Managing File Access in Windows 7
  • Managing Shared Folders
  • Configuring File Compression
  • Create and Configure a Public Shared Folder for all Users
  • Configuring IPv4 Network Connectivity
  • Configuring IPv6 Network Connectivity
  • Implementing Automatic IP Address Allocation
  • Overview of Name Resolution
  • Troubleshooting Network Issues
  • Configuring Network Connectivity
  • Overview of Security Management in Windows 7
  • Securing a Windows 7 Client Computer by Using Local Security Policy Settings
  • Securing Data by Using EFS
  • Configuring User Account Control
  • Configuring Windows Firewall
  • Configuring Security Settings in Internet Explorer 8
  • Configuring Windows Defender
  • Configuring Remote Desktop and Remote Assistance for Remote Access
  • Overview of Active Directory, Identity, and Access
  • Active Directory Components and Concepts
  • Install Active Directory Domain Services
  • Determining Active Directory Forest Design Requirements
  • Designing an Active Directory Forest
  • Designing Active Directory Forest Trusts
  • Managing the Active Directory Schema
  • Understanding Windows Time Service
  • Designing Active Directory Domains
  • Designing the Integration of DNS Namespaces
  • Designing the Placement of Domain Controllers
  • Designing Active Directory Domain Trusts
  • Work with Active Directory Administration Tools
  • Find Objects in Active Directory
  • Create and Administer User Accounts
  • Configure User Object Attributes
  • Create and Configure Managed Service Accounts
  • Overview of Groups
  • Administer Groups
  • Best Practices for Group Management
  • Create Computers and Join the Domain
  • Administer Computer Objects and Accounts
  • Perform an Offline Domain Join
  • Understand Group Policy
  • Implement GPOs
  • Manage Group Policy Scope
  • Group Policy Processing
  • Troubleshoot Policy Application
  • Implement Administrative Templates
  • Configure Group Policy Preferences
  • Manage Software with GPSI
  • Manage Group Membership by Using Group Policy Settings
  • Manage Security Settings
  • Auditing
  • Delegate Administrative Permissions
  • Audit Active Directory Administration
  • Configure Password and Lockout Policies
  • Audit Authentication
  • Configure Read-Only Domain Controllers
  • Install and Configure DNS in an AD DS Domain
  • Integration of AD DS, DNS, and Windows
  • Advanced DNS Configuration and Administration
  • Domain Controller Installation Options
  • Install a Server Core Domain Controller
  • Manage Operations Masters
  • Configure Global Catalog
  • Configure Sites and Subnets
  • Configure Replication
  • Configure Sites and Subnets
  • Configure Replication
  • Configure Domain and Forest Functional Levels
  • Manage Multiple Domains and Trust Relationships
  • Move Objects between Domains and Forests
  • Overview of Active Directory Lightweight Directory Services
  • Deploying and Configuring Active Directory Lightweight Directory Services
  • Configuring AD LDS Instances and Partitions
  • Configuring Active Directory Lightweight Directory Services
  • Replication
  • Troubleshooting Active Directory Lightweight Directory Services
  • Overview of Active Directory Lightweight Directory Services
  • Deploying and Configuring Active Directory Lightweight Directory Services
  • Configuring AD LDS Instances and Partitions
  • Configuring Active Directory Lightweight Directory Services
  • Replication
  • Troubleshooting Active Directory Lightweight Directory Services
  • Overview of Active Directory Federation Services 2.0
  • Deploying Active Directory Federation Services
  • Configuring Active Directory Federation Services Partner
  • Organizations and Claims
  • Troubleshooting Active Directory Federation Services
  • Overview of Active Directory Rights Management Services
  • Deploying and Configuring Active Directory Rights Management Services
  • Configuring AD RMS Rights Policy Templates and Exclusion Policies
  • Configuring Active Directory Rights Management Services Trust Policies
  • Troubleshooting Active Directory Rights Management Services
  • Implementing an IPv4 Network Infrastructure
  • Overview of Name Resolution Services in an IPv4 Network Infrastructure
  • Configuring and Troubleshooting Ipv4
  • Selecting an IPv4 Addressing scheme for branch offices
  • Implementing and Verifying IPv4 in the branch office
  • Overview of the DHCP Server Role
  • Configuring DHCP Scopes
  • Configuring DHCP Options
  • Managing a DHCP Database
  • Monitoring and Troubleshooting DHCP
  • Configuring DHCP Security
  • Installing the DNS Server Role
  • Configuring the DNS Server Role
  • Configuring DNS Zones
  • Configuring DNS Zone Transfers
  • Managing and Troubleshooting DNS
  • Overview of Ipv6
  • IPv6 Addressing
  • Coexistence with Ipv6
  • IPv6 Transition Technologies
  • Transitioning from IPv4 to Ipv6
  • Configuring Network Access
  • Configuring VPN Access
  • Overview of Network Policies
  • Troubleshooting Routing and Remote Access
  • Configure the PKI Environment
  • Configuring RADIUS Clients and Servers
  • Overview of Network Access Protection
  • How NAP Works
  • Configuring NAP
  • Windows Security Overview
  • Configuring Windows Firewall with Advanced Security
  • Deploying Updates with Windows Server Update Services
  • Overview of IPSec
  • Configuring Connection Security Rules
  • Monitoring and Troubleshooting IPSec
  • Configuring and Troubleshooting File Shares
  • Encrypting Network Files with EFS
  • Encrypting Partitions with Bit Locker
  • Configuring and Troubleshooting Network Printing
  • Branch Office Data Access
  • DFS Overview
  • Overview of DFS Namespaces
  • Configuring DFS Replication
  • Monitoring Network Storage
  • Controlling Network Storage Utilization
  • Managing File Types on Network Storage
  • Recovering Network Data with Volume Shadow Copies
  • Recovering Network Data and Servers with Windows Server Backup
  • Monitoring Tools
  • Using Performance Monitor
  • Monitoring Event Logs
  • Planning Windows Server 2008 R2 Installations
  • Performing a Windows Server 2008 R2 Installation
  • Configuring Windows Server 2008 R2 Following Installation
  • Automating Server Activation Using Microsoft Volume Activation
  • Selecting a Deployment Strategy
  • Using the Windows Automated Installation Kit
  • Working with Images
  • Working with Unattended Answer Files
  • Overview of Windows Deployment Services (WDS)
  • Implementing Deployment with WD
  • Maintaining Images
  • Overview of Upgrading Windows Server 2008 R2 Active Directory
  • Upgrading Domain Controllers to Windows Server 2008 R2
  • Introducing the Windows File and Print Servers
  • Implementing Read-Only Domain Controller
  • Implementing Remote Infrastructur
  • Overview of Microsoft Virtualizatio
  • Installing Hyper-V
  • Configuring TS Role
  • Configuring TS Settings
  • Configuring TS Licensing
  • Managing TS Licenses
  • Installing Applications
  • Configuring Remote Applications
  • Configuring Printers
  • Configuring Terminal Services Web Access
  • Installing the TS Web Access Role Service
  • Configuring Session Broker
  • Configuring TS Gateway
  • Troubleshooting TS Gateway Connectivity Issues
  • Introducing Internet Information Services 7.0
  • Installing the Web Server Role in Windows Server 2008
  • Configuring Application Development, Health, and HTTP Features
  • Configuring Performance, Security, and Server Component Features
  • Configuring Secure Web Sites and Servers
  • Configuring Logging for IIS 7.0
  • Configuring Remote Administration
  • Configuring Feature Delegation
  • Backing Up and Restoring Web Sites
  • Working with Shared Configurations
  • Preparing for Network Infrastructure Design
  • Designing the Network Topology
  • Designing Network Infrastructure for Virtualization
  • Designing a Change Management Structure for a Network
  • Overview of Network Security Design
  • Creating a Network Security Plan
  • Identifying Threats to Network Security
  • Analyzing Security Risks
  • Designing an IPv4 Addressing Scheme
  • Designing an IPv6 Addressing Scheme
  • Designing DHCP Implementation
  • Designing DHCP Configuration Options
  • Preparing for Designing a Network Routing Topology
  • Selecting Network Devices
  • Designing Internet Connectivity and Perimeter Networks
  • Designing Routing Communications
  • Evaluating Network Performance
  • Designing Windows Firewall Implementation
  • Overview of IPSec
  • Designing IPSec Implementation
  • Designing File Services
  • Designing DFS
  • Designing the FSRM Configuration
  • Overview of a Print Services Design
  • Windows Server 2008 Printing Features
  • Designing Print Services
  • Understanding AD DS High Availability
  • Designing an AD DS High Availability Strategy
  • Designing an Active Directory Database Maintenance Strategy
  • Designing an Active Directory Backup and Recovery Strategy
  • Designing an AD DS Monitoring Strategy
  • Overview of PKI and Active Directory Certificate Services
  • Designing a Certification Authority Hierarchy
  • Designing Certificate Template
  • Designing Certificate Distribution and Revocation
  • AD LDS Deployment Scenarios
  • Overview of an AD LDS Implementation Design
  • Designing AD LDS Schema and Replication
  • Integrating AD LDS with AD DS
  • Choosing an Active Directory Migration Strategy
  • Designing a Domain Upgrade Strategy
  • Designing a Domain Restructure Strategy
FooterLogo

693, Sector-14A, Opposite Sahibabad Sabji Mandi, Vasundhara, Ghaziabad(U.P.) 201012

Useful Links

Useful Links

Connect With Us
Subscribe Us