دوره: ‌MCSA 2025

معرفی :

 

مخاطبین :

  • دانشجویان رشته کامپیوتر
  • علاقه مندان به حوزه شبکه

سرفصل :‌

Introduction
  • Overview of networking
  • Overview of workgroup
  • Overview of domain
  • Overview of client
  • Overview of server
Protocols and ports
  • Overview of Protocols and ports
  • Overview of Protocol types
  • Overview of SSH
  • Overview of DNS
  • Overview of SMTP
  • Overview of FTP
  • Overview of TFTP
  • Overview of TELNET
  • Overview of SSH
  • Overview of DHCP
  • Overview of HTTP
  • Overview of HTTPS
  • Overview of SNMP
  • Overview of RDP
  • Overview of NTP
  • Overview of SIP
  • Overview of SMB
  • Overview of POP3
  • Overview of IMAP4
  • Overview of ICMP
  • Overview of UDP
  • Overview of TCP
  • Overview of IP
  • Overview of Connection-oriented vs. connectionless
  • Overview of port number classification
Devices, Applications, Protocols, and Services at Each OSI Layers
  • Overview of OSI model
  • Overview of Layer 7
  • Overview of Layer 6
  • Overview of Layer 5
  • Overview of Layer 4
  • Overview of Layer 3
  • Overview of Layer 2
  • Overview of Layer 1
Devices, Applications, Protocols, and Services at Each TCP/IP Layers
  • Overview of TCP/IP model
  • Overview of Layer 1
  • Overview of Layer 2
  • Overview of Layer 3
  • Overview of Layer 4 / 5
Concepts and Characteristics of Routing and Switching
  • Overview of network traffic
  • Overview of Broadcast domains
  • Overview of CSMA/CD
  • Overview of CSMA/CA
  • Overview of Protocol data units
  • Overview of MTU
  • Overview of Broadcast
  • Overview of Multicast
  • Overview of Unicast
  • Overview of Segmentation and interface properties
  • Overview of ARP table
  • Overview of Routing
  • Overview of Routing protocols
  • Overview of Distance-vector routing protocols
  • Overview of Link-state routing protocols
  • Overview of Routing types
  • Overview of Static
  • Overview of Dynamic
  • Overview of QoS
  • Overview of NAT/PAT
Internet Protocol Addressing
  • Overview of NIC
  • Overview of MAC address
  • Overview of Private vs. public
  • Overview of Loopback and Apipa
  • Overview of Default gateway
  • Overview of Subnet mask
  • Overview of Subnetting
  • Overview of Supernetting
  • Overview of Classes A, B, C, D, and E
  • Overview of CIDR
  • Overview of Address assignments
  • Overview of DHCP
  • Overview of APIPA
  • Overview of Loopback
Network Topologies
  • Overview of Wired Topologies
  • Overview of Logical vs. Physical
  • Overview of Star
  • Overview of Mesh
  • Overview of Bus
  • Overview of Tree
  • Overview of Hybrid
  • Overview of Ring
  • Overview of LAN
  • Overview of WLAN
  • Overview of MAN
  • Overview of WAN
  • Overview of CAN
  • Overview of SAN
  • Overview of PAN
Wireless Technologies and Configurations
  • Overview of Wireless Topologies
  • Overview of Ad hoc
  • Overview of Infrastructure
  • Overview of 802.11 standards:
    • 802.11a
    • 802.11b
    • 802.11g
    • 802.11n
    • 802.11ac
    • 802.11ax
    • 802.11be
  • Overview of Radio Frequencies:
    • 2.4 GHz
    • 5.0 GHz
  • Overview of Speed and distance requirements
  • Overview of Channel bandwidth
  • Overview of Unidirectional/omnidirectional
  • Overview of Wireless Security
Cabling
  • Overview of Media types
  • Overview of Copper
  • Overview of UTP
  • Overview of STP
  • Overview of Coaxial
  • Overview of Fiber
  • Overview of Single-mode
  • Overview of Multimode
  • Connector types
  • Overview of Copper
  • Overview of RJ-45
  • Overview of RJ-11
  • Overview of BNC
  • Overview of F-type
  • Overview of Fiber
  • Overview of LC
  • Overview of ST
  • Overview of SC
  • Overview of MTRJ
  • Overview of Transceivers
  • Overview of SFP
  • Overview of SFP+
  • Overview of QSFP
  • Overview of Characteristics of fiber transceivers
  • Overview of Half Duplex
  • Overview of Full Duplex
  • Overview of Single mode
  • Overview of Multiple mode
  • Overview of Patch panel
  • Overview of Copper cable standards
  • Overview of Cat 3
  • Overview of Cat 5
  • Overview of Cat 5e
  • Overview of Cat 6
  • Overview of Cat 6a
  • Overview of Cat 7
  • Overview of RG-6
  • Overview of RG-59
  • Overview of Copper termination standards
  • Overview of TIA/EIA 568a
  • Overview of TIA/EIA 568b
  • Overview of Crossover
  • Overview of Straight-through
  • Overview of Ethernet deployment standards
  • Overview of 100BASE-T
  • Overview of 1000BASE-T
  • Overview of 1000BASE-LX
  • Overview of 1000BASE-SX
  • Overview of 10GBASE-T
Appropriate placement of Networking devices on a network.
  • Firewall
  • Router
  • Switch
  • Hub
  • Bridge
  • Wireless access point
Networking Attacks
  • Overview of DoS
  • Overview of DDoS
  • Overview of Social engineering
  • Overview of Rogue access point
  • Overview of Phishing
  • Overview of Ransomware
  • Overview of Brute force
  • Overview of Man-in-the-middle
  • Overview of Exploits and vulnerabilities
Configuration and Commands
  • Configuring and managing NIC by GUI
  • Configuring and managing NIC by Command
  • Configuring Networking between devices
  • ping
  • ipconfig
  • ARP
  • getmac
  • nslookup
  • pathping
  • tracert
  • Optional: Overview and installing cisco packet tracer
  • Optional: Capturing frames
  • Optional: Overview of Ethernet frame
  • Optional: Basic configuration of Router (CLI)
  • Optional: Basic configuration of Switch (CLI)
  • Optional: Overview of Dynamic Routing
  • Optional: Overview of Static Routing
  • Optional: Overview of Autonomous System, EGP and BGP
  • Optional: Configuring Static Route
Virtualization
  • Overview of Virtualization
  • Installing VMWare Workstation
  • Configuring and Managing VMWare Workstation
  • Creating Virtual Machines
  • Configuring Virtual Machines
  • Managing Virtual Machines
  • Configuring VMWare Workstation Storage
  • Configuring VMWare Workstation Networking
  • Advance Settings of VMWare Workstation
Installing Windows 11
  • Overview of Windows 11 and Workgroup
  • Navigating the User Interface
  • Comparing Different Versions and Architectures
  • Overview of Different Types of Installation
  • Overview of Sysprep and OOBE
  • Using Sysprep to Change SID
  • Installing Windows 11
  • Basic Configuration
  • Upgrading to Windows 11
  • ***Optional: Using Hiren and Reseting Password
Users, Groups and Profile
  • Overview of User and Built in Groups
  • Common Configuration Options
  • Managing User Accounts
  • Managing Groups
  • Managing Users and Groups by Commands
  • Creating Mass User Creation
  • Overview of Different Types of Profile
  • Managing Local Profile
Network Connectivity
  • Overview of Networking
  • Configuring IP Network Connectivity
  • Configuring Networking and Virtual Switch
Storage
  • Overview of Different Types of Storage
  • Overview of Different Types of File System
  • Overview of Different Types of RAIDS
  • Managing Disks
  • Overview of MBR and GPT
  • Creating Basic Partitions, Primaty, Extended and Logical
  • Creating Dynamic Volumes, Simple, Spanned, Striped and Mirror
  • Creating Virtual Hard Disks
  • Managing Partitions and Volumes
  • Managing Disks, Partitions and Volumes by Command
  • File Systems and Allocation Unit Size
  • Creating and Managing Storage Spaces and Pools
  • Overview of Redundancy in Storage Spaces
  • Managing 1 Way and 2 Way Mirror
  • Managing RAID 5
  • Advance Settings of Storage
  • Creating Bootable USB by CMD
  • Creating Bootable USB by Rufus
  • Managing BIOS Partitions
  • Managing UEFI Partitions
Managing Files and Printers
  • Overview of File and Printers
  • Configuring and Managing Printers
  • Configuring and Managing File Access
  • Configuring and Managing Shared Folders
  • Configuring and Managing Offline File
  • Configuring and Managing Map Networtk Drive
  • Overview of Administrative Shares
  • Creating Hidden Share
  • Disabling Administrative Shares by Registry
Implementing Group Policy
  • Overview of Local Group Policy
  • Managing Local Group Policy
  • Configuring and Managing Password Policies
  • Configuring and Managing Account Lockout Policies
  • Configuring and Managing Audit Policies
  • Configuring and Managing User Right Assignments
  • Configuring and Managing Security Options
  • Configuring and Managing Application Control Policies
  • Configuring and Managing Administrative templates Sub Policies
BIOS
  • Overview of Power on Self-Test
  • Overview of UEFI
  • Overview of Legacy Traditional
Security
  • Overview of Data-Related Security Threats and Access Control List (ACL)
  • Overview of Device Security
  • Overview of Using Security Settings to Mitigate Threats
  • Overview of User Account Control
  • Overview of NTFS Permissions, Inheritance, Default Permissions
  • Managing NTFS Permissions
  • Managing Share Permissions
  • Overview of Encryption File System (EFS)
  • Securing Data with EFS
  • Creating Recovey Agent Key for EFS
  • Implementing and Managing BitLocker
  • Managing User Account Control
  • Overview of Network-Related Security Threats
  • Configuring and Managing Windows Firewall
  • Configuring and Managing Connection Security Rules
  • Configuring and Managing Windows Defender
Troubleshooting and Recovery
  • Overview of Devices and Drivers
  • System Image Backup
  • Recovering Files and Images
  • Restore Point
  • File History
  • Previous Version Tab
  • ***Optional: Overview of Veeam
Maintaining Windows 11
  • Overview of Maintenance
  • Updating Windows
  • Monitoring Windows 11
  • Optimizing Performance
  • Performance Monitor
  • Resource Monitor
Remote Desktop
  • Overview of Remote Desktop
  • Configuring and Managing Remote Desktop
  • Configuring and Managing Remote Desktop Assistance
  • Advance Settings of Remote Desktop
  • Overview of Team Viewr and Anydesk
  • Changing RDP Port by Registry
  • ***Optional: Overview of VDI
Virtualization
  • Overview of Virtualization
  • Installing VMWare Workstation
  • Configuring and Managing VMWare Workstation
  • Creating Virtual Machines
  • Configuring Virtual Machines
  • Managing Virtual Machines
  • Configuring and Managing VMWare Workstation Storage
  • Configuring VMWare Workstation Networking
  • Advance Settings VMWare Workstation
Installing, Upgrading, and Migrating servers and workloads
  • Introducing Windows Server
  • Preparing for Upgrades
  • Upgrading Windows Server
  • Managing Windows Server
  • Overview of Windows Server Dashboard
  • Overview of Roles and Features
Active Directory
  • Overview of Domain
  • Installing Active Directory Domain Services
  • Creating and Configuring Forest and Domain Controller
  • Overview of Active Directory Users and Computers
  • Managing Active Directory Container
  • Implementing and Managing OUs in Active Directory
  • Creating and Managing User Accounts in Active Directory
  • Creating and Managing Groups in Active Directory
  • Managing Computer Accounts in Active Directory
  • Managing Users by User Template
  • Configuring and Managing Additional Domain Controllers
  • Overview of Install from Media
  • Configuring Additional Domain Controllers by IFM
  • Configuring and Managing Read-Only Domain Controllers
  • Configuring Pre-Stage or Pre-Created Read-Only Domain Controllers
  • Performing Bulk Active Directory Operations
  • Demoting DC and Removing Metadata
  • Joining Computers to Domain by Using GUI
  • Joining Computers to Domain by Using PowerShell and CMD
  • Using Offline Join
  • Introducing PowerShell in Active Directory
  • Configuring and Managing Active Directory by CMD
  • Configuring and Managing Active Directory by PowerShell
  • Advance Settings of Active Directory
  • Troubleshooting Active Directory Installations
  • Overview of Kerberos
  • Overview of NTLM
  • Overview of LDAP
  • Overview of Mass User Creation
  • Creating Multiple Users by CSVDE and LDIFDE
  • Redirect Users and Computers to a Specific OU
Account and Profile
  • Overview of Account Tab
  • Overview of Profile Tab
  • Overview of Local Profile, Roaming Profile, Mandatory Profile
  • Configuring and Managing Roaming Profile
Group Policy
  • Overview of Domain Group Policy
  • Overview of Group Policy Storage, Linking, Hierarchy
  • Creating and configuring GPOs
  • Administering GPOs
  • Managing Group Policy Tabs, Inheritance, Starter GPO, Copy GPO
  • Configuring and Managing WMI Filtering and Queries
  • Configuring and Managing Password Policy and Lockout Policy by GPO
  • Configuring and Managing Password Setting Object (PSO) by GPO
  • Configuring and Managing Kerberos and Audit Policy by GPO
  • Configuring and Managing User Right Assignment and Delegation by GPO
  • Configuring and Managing Security Options by GPO
  • Configuring and Managing Restricted Group, System by GPO Service
  • Configuring and Managing Firewall by GPO Service
  • Configuring and Managing App Locker by GPO Service
  • Configuring and Managing Software Installation by GPO Service
  • Overview of Policies for Group Policy
  • Configuring and Managing Loopback Processing, Replace and Merge
  • Implementing Administrative Templates
  • Configuring and Managing Group Policy Preferences
  • Planning Group Policy
  • Configuring and Managing Group Policy Modeling
  • Configuring and Managing Group Policy Results
  • Backup and Restore GPOs
Backup and Recovery
  • Overview of Backup and Restore in Windows server
  • Overview of Active Directory Backup and Restore in Windows server
  • Creating Active Directory Full and System State Backup
  • Using Authoritative and Non-Authoritative Recovery
  • Creating, Managing and Restoring Active Directory Snapshot
  • Managing and Restoring Recycle Bin in Active Directory
  • Using Tombstone for Recovery
  • Overview of Incremental and Decremental Backup
  • ***Optional: Overview of Veeam
Monitoring
  • Overview of Windows Server 2025 Monitoring Tools
  • Using Performance Monitor
  • Monitoring Event Logs
  • Establishing a Performance Baseline
Dynamic Access Control (DAC) and NIC Teaming
  • Overview of Dynamic Access Control
  • Configuring and Managing DAC
  • Overview of NIC Teaming
  • Overview of Teaming Modes
  • Overview of load Balancing
  • Configuring and Managing NIC Teaming
Internet Information Services (IIS)
  • Overview of Internet Information Services (IIS)
  • Creating and Managing FTP and Web Site in IIS
Dynamic Host Configuration Protocol (DHCP)
  • Overview of the DHCP Role Service
  • Planning a DHCP Server Implementation
  • Installing and Configuring DHCP Server
  • Validating the DHCP Server Implementation
  • Creating and Managing Scopes and Options
  • Creating and Managing Super Scope
  • Creating and Managing Multicast Scope
  • Creating and Managing Split Scope
  • Creating and Managing Failover by Built in DHCP Failover
  • Creating and Managing DHCP Policies
  • Managing DHCP by Commands
  • Overview of DHCP and BOOTP
  • Overview of Time 1 and Time 2
  • Overview of Lease Duration
  • Monitoring DHCP
  • Advance Settings of DHCP
Domain Name Service (DNS)
  • Overview of NetBIOS Name
  • Overview of Fully Qualify Domain Name
  • Overview of DNS and WINS Servers
  • Planning DNS Name Resolution
  • Implementing DNS servers
  • Overview of Standard and Active Directory Integrated Zones
  • Overview of Forward Look up Zone
  • Overview of Revers Lookup Zone
  • Configuring and Managing Primary Zone
  • Creating and Managing Secondary Zone
  • Creating and Managing Stub Zone
  • Overview of Records
  • Managing A, AAAA, CNAME, PTR, MX and SRV Records
  • Managing DNS Zone Tabs
  • Managing DNS Server Tabs
  • Managing Advanced DNS Settings
  • Configuring and Managing Scopes
  • Overview of Recursive and Iterative
  • Configuring and Managing Caching Only DNS Server
  • Configuring and Managing Root DNS Server
  • Configuring and Managing DNS Delegation
  • Configuring and Managing DNS Policies
  • Configuring and Managing Global Name Zone
  • Configuring and Managing Forwarder and Conditional Forwarder
  • Configuring and Managing Advance Round Robin by PowerShell and Policies
  • Overview of DNS Threats and Mitigations
  • Securing DNS Server
  • Troubleshooting DNS
  • Advance Settings of Domain Name Service
Internet Protocol Address Management (IPAM)
  • Overview of IPAM
  • Deploying IPAM
  • Installing and Configuring IPAM Server
  • Managing IP Address Spaces and Blocks by Using IPAM
  • Managing DHCP Servers by Using IPAM
  • Managing DNS Servers by Using IPAM
  • Advance Settings of Internet Protocol Address Management
Routing and Remote Access Server (RRAS)
  • Overview of Routing and Remote Access in Windows Server
  • Overview of Network Address Translation (NAT)
  • Implementing NAT
  • Configuring and Managing Server as a Router
  • Overview of Virtual Private Network (VPN)
  • Configuring and Managing VPN Remote Access
  • Configuring and Managing DHCP Relay Agent
File Server Resource Manager (FSRM)
  • Overview of Disk Quota
  • Configuring and Managing Disk Quota
  • Overview of File Server Resource Manager (FSRM)
  • Configuring and Managing Folder Quota
  • Configuring and Managing a File screening to a Volume or Folder
  • Configuring and Managing Storage Reports Management
  • Managing Quota and File Screening Templates
  • Advance Settings of File Server Resource Manager
Distributed File System (DFS) and DFS-Replication
  • Overview of Distributed File System (DFS)
  • Configuring and Managing DFS Namespaces
  • Overview of Distributed File System Replication
  • Configuring and Managing DFS Replication
  • Managing DFS Replication Groups
  • Configuring Advance Tabs of DFS
Server Core
  • Overview of Server Core
  • Installing Server Core
  • Managing Server Core
  • Configuring Server Core
  • Using CMD and PowerShell to Configure Server Core
  • Using Remote Access to Configure Server Core
  • Installing Active Directory on a Server Core
  • Configuring and Managing Server Core as a Domain Controller
  • Configuring and Managing Server Core as an Additional Domain Controller
  • Configuring and Managing Server Core as a Read Only Domain Controller
IPSec
  • Overview of Man in the Middle Attack
  • Overview of IPSec
  • Overview of Microsoft Network Monitor and Wireshark
  • Securing FTP connection by Using IPSec
Service Account
  • Overview of Service Account
  • Managing Service Accounts
  • Creating and Managing Standalone Managed Service Account (sMSA)
  • Creating and Managing Group Managed Service Account (gMSA)
  • Creating and Managing Virtual Group Service Account
IPv4 and IPv6
  • Overview of IPv4 and IPv6
  • Overview IPv6
  • Subnetting
  • Superneting
IPSec
  • Overview of IPv4
  • Overview of IPv6
  • Subnetting
  • uperneting
Active Directory Domain and Trust (ADDT)
  • Overview of Root Tree Domains and Child Domains
  • Configuring and Managing Child Domain Controllers
  • Configuring and Managing Root Tree Domain Controllers in the Same Forest
  • Overview of Forest, External, Realm, Parent-Child, Root Tree Domain and Shortcut Trusts
  • Configuring and Managing Forest, External, Realm, and Shortcut Trusts
  • Configuring and Managing Forest-Wide Authentication and Selective authorization
  • Configuring and Managing SID Filtering
  • Configuring and Managing Name Suffix Routing
  • Advance Settings of Active Directory Domain and Trust
Active Directory Site and service (ADSS)
  • Overview of Active Directory Domain Controllers Replication
  • Configuring and Managing Active Directory Sites
  • Configuring and Managing Active Directory Subnets
  • Configuring and Managing Site Links
  • Overview of Knowledge Consistency Checker (KCC)
  • Configuring and Managing Replication Topology
  • Overview of Active Directory Partitions
  • Configuring and Managing ADDS Intra-Site Replication
  • Creating and Managing Site Link Bridges
  • Manage Registration of SRV Records
  • Managing Replication by Command
  • Monitoring and Troubleshooting ADDS Replication
  • Advance Settings of Active Directory Site and service
Active Directory Certificate Service (ADCS)
  • Overview of Encryption
  • Overview of Symmetric and Asymmetric Encryption
  • Overview of Certificate and Digital Signature
  • Overview of ADCS Role Service
  • Choosing between a standalone and an enterprise CA
  • Choosing between a root and a subordinate CA
  • Overview of different role Service of ADCS
  • Installing and Configuring Certificate Authority
  • Configuring and Managing Online/Offline Root and Subordinate CAs
  • Configuring and Managing Certificate Templates
  • Enrolling Certificate Manually
  • Auto Enrolling Certificate by GPO
  • Installing and Configuring CA Web Enrollment Role Service
  • Enrolling Certificate by using CA Web Enrollment
  • Exporting and Importing Certificates
  • Using Internal CA for Publishing a HTTPS Web Site
  • Configuring and Managing Revocation
  • Troubleshooting and Maintaining CAs
Active Directory Rights Management Services (ADRMS)
  • Overview of ADRMS
  • Installing ADRMS
  • Configuring and Managing ADRMS
  • Configuring and Managing Rights Policy Templates
  • Configuring and Managing Exclusion Policies
  • Configuring and Managing Security Policies
  • ADRMS Backup and Restore
  • Configuring Client Side to Use ADRMS
  • Using ADRMS on Clients to Protect Data
  • Advance Settings of Active Directory Rights Management Services
Advance Active Directory Configuration
  • Overview of Active Directory Defragmentation
  • Configuring Offline Active Directory Defragmentation
  • Changing Directory Restore Mode Password
  • Changing Source of Windows server Roles and Feature
  • Changing Tombstone Lifetime
  • Managing Default Workstation Number a User Can Join to the domain
  • Renaming Domain Name
Storage and Share
  • Overview of SMB and NFS
  • Configuring and Managing Share Folders
  • Planning Storage Requirements
  • Configuring and Managing iSCSI Target Server
  • Overview of Storage Replication
  • Configuring and Managing Storage Replication
  • Overview of Data Deduplication
  • Configuring and Managing Data Deduplication
Failover Clustering
  • Overview of Failover Cluster
  • Planning a Failover Cluster
  • Configuring and Managing Failover Cluster
  • Configuring and Managing Cluster Networking
  • Configuring and Managing Cluster Storage
  • Configuring and optimizing Clustered Shared Volumes (CSVs)
  • Configuring and Managing Quorum
  • Configuring and Managing Disk and File Share Witness
  • Configuring and Managing Failover Cluster for DHCP
  • Configuring and Managing Failover Cluster for File Server
  • Verifying High Availability
  • Maintaining and Troubleshooting Failover Cluster
  • Advance Settings of Failover Cluster
Network Load Balancing (NLB)
  • Overview of NLB
  • Configuring NLB Cluster
  • Planning NLB Implementation
  • Configuring and Managing the NLB Cluster
  • Managing Affinity
  • Managing Unicast, Multicast and IGMP
  • Managing Cluster Operation Modes
  • Managing Cluster Filtering Modes
  • Validating High Availability for NLB Cluster
Flexible Single Master Operations (FSMO) and Functional Levels
  • Overview of Flexible Single Master Operations
  • Managing Domain Naming and Schema Operation Master Roles
  • Managing RID, PDC and Infrastructure Operation Master Roles
  • Transferring Operation Master Roles (GUI)
  • Transferring Operation Master Roles (Command)
  • Seizing Operation Master Roles
  • Overview of Domain and Forest Functional Level
  • Managing Domain Functional Level
  • Managing Forest Functional Level
Nested Groups
  • Overview of Active Directory Nested Groups
  • Managing Universal, Global and Local Groups
  • Managing Security and Distribution Groups
Print Server
  • Overview of Windows printer deployments
  • Overview of Printer Permissions
  • Configuring and Managing Printer
  • Overview of Spooling and Advance Tab Options
  • Configuring and Managing Shared Printer and Deployment Types
  • Overview of Printer Pooling
  • Configuring Printer Pooling
***Optional Extra
  • Overview of Unified Threat Management (UTM)
  • Configuring and Managing Kerio Control (UTM)
  • Practical Scenario: Publishing Website by Using Public IP Address, Domain Name and Kerio UTM on the Internet
  • Practical Scenario: Publishing FTP Site by Using Public IP Address, Domain Name and Kerio UTM on the Internet
  • Practical Scenario: Remote Desktop by Using Public IP Address, Domain Name and Kerio UTM on the Internet
  • Practical Scenario: VPN Remote Access (Routing and Remote Access Server) by Using Public IP Address, Domain Name and Kerio UTM on the Internet
  • Overview of Windows Deployment Service (WDS)
  • Configuring and Managing WDS
  • Overview of Windows Server Update Services (WSUS)
  • Configuring and Managing WSUS

مدت :‌ 230 ساعت

پیش نیاز: گذراندن دوره ICDL برای ورود به دوره الزامی است.

 

ارتباط با دپارتمان

تلفن تماس = 02634127

گروه شبکه: 128