Introduction | - Overview of networking
- Overview of workgroup
- Overview of domain
- Overview of client
- Overview of server
|
Protocols and ports | - Overview of Protocols and ports
- Overview of Protocol types
- Overview of SSH
- Overview of DNS
- Overview of SMTP
- Overview of FTP
- Overview of TFTP
- Overview of TELNET
- Overview of SSH
- Overview of DHCP
- Overview of HTTP
- Overview of HTTPS
- Overview of SNMP
- Overview of RDP
- Overview of NTP
- Overview of SIP
- Overview of SMB
- Overview of POP3
- Overview of IMAP4
- Overview of ICMP
- Overview of UDP
- Overview of TCP
- Overview of IP
- Overview of Connection-oriented vs. connectionless
- Overview of port number classification
|
Devices, Applications, Protocols, and Services at Each OSI Layers | - Overview of OSI model
- Overview of Layer 7
- Overview of Layer 6
- Overview of Layer 5
- Overview of Layer 4
- Overview of Layer 3
- Overview of Layer 2
- Overview of Layer 1
|
Devices, Applications, Protocols, and Services at Each TCP/IP Layers | - Overview of TCP/IP model
- Overview of Layer 1
- Overview of Layer 2
- Overview of Layer 3
- Overview of Layer 4 / 5
|
Concepts and Characteristics of Routing and Switching | - Overview of network traffic
- Overview of Broadcast domains
- Overview of CSMA/CD
- Overview of CSMA/CA
- Overview of Protocol data units
- Overview of MTU
- Overview of Broadcast
- Overview of Multicast
- Overview of Unicast
- Overview of Segmentation and interface properties
- Overview of ARP table
- Overview of Routing
- Overview of Routing protocols
- Overview of Distance-vector routing protocols
- Overview of Link-state routing protocols
- Overview of Routing types
- Overview of Static
- Overview of Dynamic
- Overview of QoS
- Overview of NAT/PAT
|
Internet Protocol Addressing | - Overview of NIC
- Overview of MAC address
- Overview of Private vs. public
- Overview of Loopback and Apipa
- Overview of Default gateway
- Overview of Subnet mask
- Overview of Subnetting
- Overview of Supernetting
- Overview of Classes A, B, C, D, and E
- Overview of CIDR
- Overview of Address assignments
- Overview of DHCP
- Overview of APIPA
- Overview of Loopback
|
Network Topologies | - Overview of Wired Topologies
- Overview of Logical vs. Physical
- Overview of Star
- Overview of Mesh
- Overview of Bus
- Overview of Tree
- Overview of Hybrid
- Overview of Ring
- Overview of LAN
- Overview of WLAN
- Overview of MAN
- Overview of WAN
- Overview of CAN
- Overview of SAN
- Overview of PAN
|
Wireless Technologies and Configurations | - Overview of Wireless Topologies
- Overview of Ad hoc
- Overview of Infrastructure
- Overview of 802.11 standards:
- 802.11a
- 802.11b
- 802.11g
- 802.11n
- 802.11ac
- 802.11ax
- 802.11be
- Overview of Radio Frequencies:
- Overview of Speed and distance requirements
- Overview of Channel bandwidth
- Overview of Unidirectional/omnidirectional
- Overview of Wireless Security
|
Cabling | - Overview of Media types
- Overview of Copper
- Overview of UTP
- Overview of STP
- Overview of Coaxial
- Overview of Fiber
- Overview of Single-mode
- Overview of Multimode
- Connector types
- Overview of Copper
- Overview of RJ-45
- Overview of RJ-11
- Overview of BNC
- Overview of F-type
- Overview of Fiber
- Overview of LC
- Overview of ST
- Overview of SC
- Overview of MTRJ
- Overview of Transceivers
- Overview of SFP
- Overview of SFP+
- Overview of QSFP
- Overview of Characteristics of fiber transceivers
- Overview of Half Duplex
- Overview of Full Duplex
- Overview of Single mode
- Overview of Multiple mode
- Overview of Patch panel
- Overview of Copper cable standards
- Overview of Cat 3
- Overview of Cat 5
- Overview of Cat 5e
- Overview of Cat 6
- Overview of Cat 6a
- Overview of Cat 7
- Overview of RG-6
- Overview of RG-59
- Overview of Copper termination standards
- Overview of TIA/EIA 568a
- Overview of TIA/EIA 568b
- Overview of Crossover
- Overview of Straight-through
- Overview of Ethernet deployment standards
- Overview of 100BASE-T
- Overview of 1000BASE-T
- Overview of 1000BASE-LX
- Overview of 1000BASE-SX
- Overview of 10GBASE-T
|
Appropriate placement of Networking devices on a network. | - Firewall
- Router
- Switch
- Hub
- Bridge
- Wireless access point
|
Networking Attacks | - Overview of DoS
- Overview of DDoS
- Overview of Social engineering
- Overview of Rogue access point
- Overview of Phishing
- Overview of Ransomware
- Overview of Brute force
- Overview of Man-in-the-middle
- Overview of Exploits and vulnerabilities
|
Configuration and Commands | - Configuring and managing NIC by GUI
- Configuring and managing NIC by Command
- Configuring Networking between devices
- ping
- ipconfig
- ARP
- getmac
- nslookup
- pathping
- tracert
- Optional: Overview and installing cisco packet tracer
- Optional: Capturing frames
- Optional: Overview of Ethernet frame
- Optional: Basic configuration of Router (CLI)
- Optional: Basic configuration of Switch (CLI)
- Optional: Overview of Dynamic Routing
- Optional: Overview of Static Routing
- Optional: Overview of Autonomous System, EGP and BGP
- Optional: Configuring Static Route
|
Virtualization | - Overview of Virtualization
- Installing VMWare Workstation
- Configuring and Managing VMWare Workstation
- Creating Virtual Machines
- Configuring Virtual Machines
- Managing Virtual Machines
- Configuring VMWare Workstation Storage
- Configuring VMWare Workstation Networking
- Advance Settings of VMWare Workstation
|
Installing Windows 11 | - Overview of Windows 11 and Workgroup
- Navigating the User Interface
- Comparing Different Versions and Architectures
- Overview of Different Types of Installation
- Overview of Sysprep and OOBE
- Using Sysprep to Change SID
- Installing Windows 11
- Basic Configuration
- Upgrading to Windows 11
- ***Optional: Using Hiren and Reseting Password
|
Users, Groups and Profile | - Overview of User and Built in Groups
- Common Configuration Options
- Managing User Accounts
- Managing Groups
- Managing Users and Groups by Commands
- Creating Mass User Creation
- Overview of Different Types of Profile
- Managing Local Profile
|
Network Connectivity | - Overview of Networking
- Configuring IP Network Connectivity
- Configuring Networking and Virtual Switch
|
Storage | - Overview of Different Types of Storage
- Overview of Different Types of File System
- Overview of Different Types of RAIDS
- Managing Disks
- Overview of MBR and GPT
- Creating Basic Partitions, Primaty, Extended and Logical
- Creating Dynamic Volumes, Simple, Spanned, Striped and Mirror
- Creating Virtual Hard Disks
- Managing Partitions and Volumes
- Managing Disks, Partitions and Volumes by Command
- File Systems and Allocation Unit Size
- Creating and Managing Storage Spaces and Pools
- Overview of Redundancy in Storage Spaces
- Managing 1 Way and 2 Way Mirror
- Managing RAID 5
- Advance Settings of Storage
- Creating Bootable USB by CMD
- Creating Bootable USB by Rufus
- Managing BIOS Partitions
- Managing UEFI Partitions
|
Managing Files and Printers | - Overview of File and Printers
- Configuring and Managing Printers
- Configuring and Managing File Access
- Configuring and Managing Shared Folders
- Configuring and Managing Offline File
- Configuring and Managing Map Networtk Drive
- Overview of Administrative Shares
- Creating Hidden Share
- Disabling Administrative Shares by Registry
|
Implementing Group Policy | - Overview of Local Group Policy
- Managing Local Group Policy
- Configuring and Managing Password Policies
- Configuring and Managing Account Lockout Policies
- Configuring and Managing Audit Policies
- Configuring and Managing User Right Assignments
- Configuring and Managing Security Options
- Configuring and Managing Application Control Policies
- Configuring and Managing Administrative templates Sub Policies
|
BIOS | - Overview of Power on Self-Test
- Overview of UEFI
- Overview of Legacy Traditional
|
Security | - Overview of Data-Related Security Threats and Access Control List (ACL)
- Overview of Device Security
- Overview of Using Security Settings to Mitigate Threats
- Overview of User Account Control
- Overview of NTFS Permissions, Inheritance, Default Permissions
- Managing NTFS Permissions
- Managing Share Permissions
- Overview of Encryption File System (EFS)
- Securing Data with EFS
- Creating Recovey Agent Key for EFS
- Implementing and Managing BitLocker
- Managing User Account Control
- Overview of Network-Related Security Threats
- Configuring and Managing Windows Firewall
- Configuring and Managing Connection Security Rules
- Configuring and Managing Windows Defender
|
Troubleshooting and Recovery | - Overview of Devices and Drivers
- System Image Backup
- Recovering Files and Images
- Restore Point
- File History
- Previous Version Tab
- ***Optional: Overview of Veeam
|
Maintaining Windows 11 | - Overview of Maintenance
- Updating Windows
- Monitoring Windows 11
- Optimizing Performance
- Performance Monitor
- Resource Monitor
|
Remote Desktop | - Overview of Remote Desktop
- Configuring and Managing Remote Desktop
- Configuring and Managing Remote Desktop Assistance
- Advance Settings of Remote Desktop
- Overview of Team Viewr and Anydesk
- Changing RDP Port by Registry
- ***Optional: Overview of VDI
|
Virtualization | - Overview of Virtualization
- Installing VMWare Workstation
- Configuring and Managing VMWare Workstation
- Creating Virtual Machines
- Configuring Virtual Machines
- Managing Virtual Machines
- Configuring and Managing VMWare Workstation Storage
- Configuring VMWare Workstation Networking
- Advance Settings VMWare Workstation
|
Installing, Upgrading, and Migrating servers and workloads | - Introducing Windows Server
- Preparing for Upgrades
- Upgrading Windows Server
- Managing Windows Server
- Overview of Windows Server Dashboard
- Overview of Roles and Features
|
Active Directory | - Overview of Domain
- Installing Active Directory Domain Services
- Creating and Configuring Forest and Domain Controller
- Overview of Active Directory Users and Computers
- Managing Active Directory Container
- Implementing and Managing OUs in Active Directory
- Creating and Managing User Accounts in Active Directory
- Creating and Managing Groups in Active Directory
- Managing Computer Accounts in Active Directory
- Managing Users by User Template
- Configuring and Managing Additional Domain Controllers
- Overview of Install from Media
- Configuring Additional Domain Controllers by IFM
- Configuring and Managing Read-Only Domain Controllers
- Configuring Pre-Stage or Pre-Created Read-Only Domain Controllers
- Performing Bulk Active Directory Operations
- Demoting DC and Removing Metadata
- Joining Computers to Domain by Using GUI
- Joining Computers to Domain by Using PowerShell and CMD
- Using Offline Join
- Introducing PowerShell in Active Directory
- Configuring and Managing Active Directory by CMD
- Configuring and Managing Active Directory by PowerShell
- Advance Settings of Active Directory
- Troubleshooting Active Directory Installations
- Overview of Kerberos
- Overview of NTLM
- Overview of LDAP
- Overview of Mass User Creation
- Creating Multiple Users by CSVDE and LDIFDE
- Redirect Users and Computers to a Specific OU
|
Account and Profile | - Overview of Account Tab
- Overview of Profile Tab
- Overview of Local Profile, Roaming Profile, Mandatory Profile
- Configuring and Managing Roaming Profile
|
Group Policy | - Overview of Domain Group Policy
- Overview of Group Policy Storage, Linking, Hierarchy
- Creating and configuring GPOs
- Administering GPOs
- Managing Group Policy Tabs, Inheritance, Starter GPO, Copy GPO
- Configuring and Managing WMI Filtering and Queries
- Configuring and Managing Password Policy and Lockout Policy by GPO
- Configuring and Managing Password Setting Object (PSO) by GPO
- Configuring and Managing Kerberos and Audit Policy by GPO
- Configuring and Managing User Right Assignment and Delegation by GPO
- Configuring and Managing Security Options by GPO
- Configuring and Managing Restricted Group, System by GPO Service
- Configuring and Managing Firewall by GPO Service
- Configuring and Managing App Locker by GPO Service
- Configuring and Managing Software Installation by GPO Service
- Overview of Policies for Group Policy
- Configuring and Managing Loopback Processing, Replace and Merge
- Implementing Administrative Templates
- Configuring and Managing Group Policy Preferences
- Planning Group Policy
- Configuring and Managing Group Policy Modeling
- Configuring and Managing Group Policy Results
- Backup and Restore GPOs
|
Backup and Recovery | - Overview of Backup and Restore in Windows server
- Overview of Active Directory Backup and Restore in Windows server
- Creating Active Directory Full and System State Backup
- Using Authoritative and Non-Authoritative Recovery
- Creating, Managing and Restoring Active Directory Snapshot
- Managing and Restoring Recycle Bin in Active Directory
- Using Tombstone for Recovery
- Overview of Incremental and Decremental Backup
- ***Optional: Overview of Veeam
|
Monitoring | - Overview of Windows Server 2025 Monitoring Tools
- Using Performance Monitor
- Monitoring Event Logs
- Establishing a Performance Baseline
|
Dynamic Access Control (DAC) and NIC Teaming | - Overview of Dynamic Access Control
- Configuring and Managing DAC
- Overview of NIC Teaming
- Overview of Teaming Modes
- Overview of load Balancing
- Configuring and Managing NIC Teaming
|
Internet Information Services (IIS) | - Overview of Internet Information Services (IIS)
- Creating and Managing FTP and Web Site in IIS
|
Dynamic Host Configuration Protocol (DHCP) | - Overview of the DHCP Role Service
- Planning a DHCP Server Implementation
- Installing and Configuring DHCP Server
- Validating the DHCP Server Implementation
- Creating and Managing Scopes and Options
- Creating and Managing Super Scope
- Creating and Managing Multicast Scope
- Creating and Managing Split Scope
- Creating and Managing Failover by Built in DHCP Failover
- Creating and Managing DHCP Policies
- Managing DHCP by Commands
- Overview of DHCP and BOOTP
- Overview of Time 1 and Time 2
- Overview of Lease Duration
- Monitoring DHCP
- Advance Settings of DHCP
|
Domain Name Service (DNS) | - Overview of NetBIOS Name
- Overview of Fully Qualify Domain Name
- Overview of DNS and WINS Servers
- Planning DNS Name Resolution
- Implementing DNS servers
- Overview of Standard and Active Directory Integrated Zones
- Overview of Forward Look up Zone
- Overview of Revers Lookup Zone
- Configuring and Managing Primary Zone
- Creating and Managing Secondary Zone
- Creating and Managing Stub Zone
- Overview of Records
- Managing A, AAAA, CNAME, PTR, MX and SRV Records
- Managing DNS Zone Tabs
- Managing DNS Server Tabs
- Managing Advanced DNS Settings
- Configuring and Managing Scopes
- Overview of Recursive and Iterative
- Configuring and Managing Caching Only DNS Server
- Configuring and Managing Root DNS Server
- Configuring and Managing DNS Delegation
- Configuring and Managing DNS Policies
- Configuring and Managing Global Name Zone
- Configuring and Managing Forwarder and Conditional Forwarder
- Configuring and Managing Advance Round Robin by PowerShell and Policies
- Overview of DNS Threats and Mitigations
- Securing DNS Server
- Troubleshooting DNS
- Advance Settings of Domain Name Service
|
Internet Protocol Address Management (IPAM) | - Overview of IPAM
- Deploying IPAM
- Installing and Configuring IPAM Server
- Managing IP Address Spaces and Blocks by Using IPAM
- Managing DHCP Servers by Using IPAM
- Managing DNS Servers by Using IPAM
- Advance Settings of Internet Protocol Address Management
|
Routing and Remote Access Server (RRAS) | - Overview of Routing and Remote Access in Windows Server
- Overview of Network Address Translation (NAT)
- Implementing NAT
- Configuring and Managing Server as a Router
- Overview of Virtual Private Network (VPN)
- Configuring and Managing VPN Remote Access
- Configuring and Managing DHCP Relay Agent
|
File Server Resource Manager (FSRM) | - Overview of Disk Quota
- Configuring and Managing Disk Quota
- Overview of File Server Resource Manager (FSRM)
- Configuring and Managing Folder Quota
- Configuring and Managing a File screening to a Volume or Folder
- Configuring and Managing Storage Reports Management
- Managing Quota and File Screening Templates
- Advance Settings of File Server Resource Manager
|
Distributed File System (DFS) and DFS-Replication | - Overview of Distributed File System (DFS)
- Configuring and Managing DFS Namespaces
- Overview of Distributed File System Replication
- Configuring and Managing DFS Replication
- Managing DFS Replication Groups
- Configuring Advance Tabs of DFS
|
Server Core | - Overview of Server Core
- Installing Server Core
- Managing Server Core
- Configuring Server Core
- Using CMD and PowerShell to Configure Server Core
- Using Remote Access to Configure Server Core
- Installing Active Directory on a Server Core
- Configuring and Managing Server Core as a Domain Controller
- Configuring and Managing Server Core as an Additional Domain Controller
- Configuring and Managing Server Core as a Read Only Domain Controller
|
IPSec | - Overview of Man in the Middle Attack
- Overview of IPSec
- Overview of Microsoft Network Monitor and Wireshark
- Securing FTP connection by Using IPSec
|
Service Account | - Overview of Service Account
- Managing Service Accounts
- Creating and Managing Standalone Managed Service Account (sMSA)
- Creating and Managing Group Managed Service Account (gMSA)
- Creating and Managing Virtual Group Service Account
|
IPv4 and IPv6 | - Overview of IPv4 and IPv6
- Overview IPv6
- Subnetting
- Superneting
|
IPSec | - Overview of IPv4
- Overview of IPv6
- Subnetting
- uperneting
|
Active Directory Domain and Trust (ADDT) | - Overview of Root Tree Domains and Child Domains
- Configuring and Managing Child Domain Controllers
- Configuring and Managing Root Tree Domain Controllers in the Same Forest
- Overview of Forest, External, Realm, Parent-Child, Root Tree Domain and Shortcut Trusts
- Configuring and Managing Forest, External, Realm, and Shortcut Trusts
- Configuring and Managing Forest-Wide Authentication and Selective authorization
- Configuring and Managing SID Filtering
- Configuring and Managing Name Suffix Routing
- Advance Settings of Active Directory Domain and Trust
|
Active Directory Site and service (ADSS) | - Overview of Active Directory Domain Controllers Replication
- Configuring and Managing Active Directory Sites
- Configuring and Managing Active Directory Subnets
- Configuring and Managing Site Links
- Overview of Knowledge Consistency Checker (KCC)
- Configuring and Managing Replication Topology
- Overview of Active Directory Partitions
- Configuring and Managing ADDS Intra-Site Replication
- Creating and Managing Site Link Bridges
- Manage Registration of SRV Records
- Managing Replication by Command
- Monitoring and Troubleshooting ADDS Replication
- Advance Settings of Active Directory Site and service
|
Active Directory Certificate Service (ADCS) | - Overview of Encryption
- Overview of Symmetric and Asymmetric Encryption
- Overview of Certificate and Digital Signature
- Overview of ADCS Role Service
- Choosing between a standalone and an enterprise CA
- Choosing between a root and a subordinate CA
- Overview of different role Service of ADCS
- Installing and Configuring Certificate Authority
- Configuring and Managing Online/Offline Root and Subordinate CAs
- Configuring and Managing Certificate Templates
- Enrolling Certificate Manually
- Auto Enrolling Certificate by GPO
- Installing and Configuring CA Web Enrollment Role Service
- Enrolling Certificate by using CA Web Enrollment
- Exporting and Importing Certificates
- Using Internal CA for Publishing a HTTPS Web Site
- Configuring and Managing Revocation
- Troubleshooting and Maintaining CAs
|
Active Directory Rights Management Services (ADRMS) | - Overview of ADRMS
- Installing ADRMS
- Configuring and Managing ADRMS
- Configuring and Managing Rights Policy Templates
- Configuring and Managing Exclusion Policies
- Configuring and Managing Security Policies
- ADRMS Backup and Restore
- Configuring Client Side to Use ADRMS
- Using ADRMS on Clients to Protect Data
- Advance Settings of Active Directory Rights Management Services
|
Advance Active Directory Configuration | - Overview of Active Directory Defragmentation
- Configuring Offline Active Directory Defragmentation
- Changing Directory Restore Mode Password
- Changing Source of Windows server Roles and Feature
- Changing Tombstone Lifetime
- Managing Default Workstation Number a User Can Join to the domain
- Renaming Domain Name
|
Storage and Share | - Overview of SMB and NFS
- Configuring and Managing Share Folders
- Planning Storage Requirements
- Configuring and Managing iSCSI Target Server
- Overview of Storage Replication
- Configuring and Managing Storage Replication
- Overview of Data Deduplication
- Configuring and Managing Data Deduplication
|
Failover Clustering | - Overview of Failover Cluster
- Planning a Failover Cluster
- Configuring and Managing Failover Cluster
- Configuring and Managing Cluster Networking
- Configuring and Managing Cluster Storage
- Configuring and optimizing Clustered Shared Volumes (CSVs)
- Configuring and Managing Quorum
- Configuring and Managing Disk and File Share Witness
- Configuring and Managing Failover Cluster for DHCP
- Configuring and Managing Failover Cluster for File Server
- Verifying High Availability
- Maintaining and Troubleshooting Failover Cluster
- Advance Settings of Failover Cluster
|
Network Load Balancing (NLB) | - Overview of NLB
- Configuring NLB Cluster
- Planning NLB Implementation
- Configuring and Managing the NLB Cluster
- Managing Affinity
- Managing Unicast, Multicast and IGMP
- Managing Cluster Operation Modes
- Managing Cluster Filtering Modes
- Validating High Availability for NLB Cluster
|
Flexible Single Master Operations (FSMO) and Functional Levels | - Overview of Flexible Single Master Operations
- Managing Domain Naming and Schema Operation Master Roles
- Managing RID, PDC and Infrastructure Operation Master Roles
- Transferring Operation Master Roles (GUI)
- Transferring Operation Master Roles (Command)
- Seizing Operation Master Roles
- Overview of Domain and Forest Functional Level
- Managing Domain Functional Level
- Managing Forest Functional Level
|
Nested Groups | - Overview of Active Directory Nested Groups
- Managing Universal, Global and Local Groups
- Managing Security and Distribution Groups
|
Print Server | - Overview of Windows printer deployments
- Overview of Printer Permissions
- Configuring and Managing Printer
- Overview of Spooling and Advance Tab Options
- Configuring and Managing Shared Printer and Deployment Types
- Overview of Printer Pooling
- Configuring Printer Pooling
|
***Optional Extra | - Overview of Unified Threat Management (UTM)
- Configuring and Managing Kerio Control (UTM)
- Practical Scenario: Publishing Website by Using Public IP Address, Domain Name and Kerio UTM on the Internet
- Practical Scenario: Publishing FTP Site by Using Public IP Address, Domain Name and Kerio UTM on the Internet
- Practical Scenario: Remote Desktop by Using Public IP Address, Domain Name and Kerio UTM on the Internet
- Practical Scenario: VPN Remote Access (Routing and Remote Access Server) by Using Public IP Address, Domain Name and Kerio UTM on the Internet
- Overview of Windows Deployment Service (WDS)
- Configuring and Managing WDS
- Overview of Windows Server Update Services (WSUS)
- Configuring and Managing WSUS
|