Information Technology Network Specialist - Year 2 - Course Outline

Download as pdf or txt
Download as pdf or txt
You are on page 1of 18

Diploma Information Technology Network

Specialist

Course Outline

Revised for the Academic Year


(2020/21)

YEAR 2

Page 29 of 46
YEAR 2 TRIMESTER 1
DIPLOMA INFORMATION TECHNOLOGY NETWORK SPECIALIST
COURSE OUTLINE

UPON SUCCESSFUL COMPLETION OF THIS PROGRAMME THE STUDENT SHOULD BE ABLE TO


PERFORM THE FOLLOWING OUTCOMES AND OBJECTIVES

IT2-DIP-001 - SOFTWARE DEVELOPMENT FUNDAMENTALS 90 HOURS

A. Core Programming 9 Hours


Outcome: Students will be able to:
1. Understand computer storage and data types
2. How a computer stores programs and the instructions in computer memory, memory stacks and
heaps, memory size requirements for the various data storage types, numeric data and textual data
3. Understand computer decision structures
4. Explain Various decision structures used in all computer programming languages, If decision
structures, multiple decision structures, such as If…Else and switch/Select Case, reading flowcharts,
decision tables, evaluating expressions
5. Identify the appropriate method for handling repetition
6. Explain For loops, While loops, Do...While loops, and recursion
7. Understand error handling
8. Structured exception handling

B. Object Oriented Programming 24 Hours


Outcome: Students will be able to:
1. Understand the fundamentals of classes
2. Properties, methods, events, and constructors, how to create a class, how to use classes in code
3. Understand inheritance Inheriting the functionality of a base class into a derived class
4. Understand polymorphism
5. Extending the functionality in a class after inheriting from a base class
6. Overriding methods in the derived class
7. Understand encapsulation
8. Creating classes that hide their implementation details while still allowing access to the required
functionality through the interface, access modifiers

C. General Software Development 6 Hours


Outcome: Students will be able to:
1. Understand application life cycle management Phases of application life cycle management,
software testing
2. Interpret application specifications Reading application specifications and translating them into
prototypes, code, select appropriate application type, and components
3. Understand algorithms and data structures Arrays, stacks, queues, linked lists, and sorting
algorithms, performance implications of various data structures, choosing the right data structure

Page 30 of 46
D. Web Applications 21 Hours
Outcome: Students will be able to:
1. Explain web page development HTML, Cascading Style Sheets (CSS), JavaScript
2. Use Microsoft ASP.NET web application development Page life cycle, event model, state
management, client-side versus server-side programming
3. Demonstrate web hosting Creating virtual directories and websites, deploying web applications,
understanding the role of Internet Information Services
4. Demonstrate web services Web services that will be consumed by client applications, accessing web
services from a client application, SOAP and Web Service Definition Language (WSDL)

E. Desktop Applications 12 Hours


Outcome: Students will be able to:
1. Explain Windows Store apps UI design guideline categories, characteristics and capabilities of Store
Apps
2. Identify gestures
3. Describe console-based applications Characteristics and capabilities of console-based applications
4. Demonstrate Windows Services Characteristics and capabilities of Windows Services

F. Databases 18 Hours
Outcome: Students will be able to:
1. Understand relational database management systems Characteristics and capabilities of database
products, database design, Entity Relationship Diagrams (ERDs), normalization concepts
2. Demonstrate database query methods Structured query language (SQL), creating and accessing
stored procedures
3. Updating data and selecting data
4. Understand database connection methods Connecting to various types of data stores, such as flat
file, XML file, in-memory object, resource optimization

IT2-DIP-002 - DATABASE ADMINISTRATION FUNDAMENTALS 90 HOURS

A. Core Database Concepts 18 Hours


Outcome: Students will be able to:
1. Explain how data is stored in tables
2. Demonstrate what a table is and how it relates to the data that will be stored in the database,
columns/fields, rows/records
3. Describe relational database concepts
4. Explain what a relational database is, the need for relational database management systems
(RDBMS), and how relations are established
5. Demonstrate data manipulation language (DML)
6. Explain what DML is and its role in databases
7. Demonstrate data definition language (DDL)
8. Explain how T-SQL can be used to create database objects, such as tables and views

Page 31 of 46
B. Create Database Objects 18 Hours
Outcome: Students will be able to:
1. Choose data types
2. Explain what data types are, why they are important, and how they affect storage requirements
3. Describe tables and how to create them
4. Explain Purpose of tables, create tables in a database by using proper ANSI SQL syntax
5. Create views
6. Demonstrate when to use views and how to create a view by using T-SQL or a graphical designer
7. Create stored procedures and functions
8. Select, insert, update, or delete data

C. Manipulate Data 18 Hours


Outcome: Students will be able to:
1. Select data
2. Utilize SELECT queries to extract data from one table, extract data by using joins, combine result
sets by using UNION and INTERSECT
3. Insert data
4. Demonstrate how data is inserted into a database, how to use INSERT statements
5. Update data
6. Demonstrate how data is updated in a database and how to write the updated data to the database
by using the appropriate UPDATE statements, update by using a table
7. Delete data
8. Delete data from single or multiple tables, ensure data and referential integrity by using transactions

D. Data Storage 12 Hours


Outcome: Students will be able to:
1. Explain normalization
2. Explain the reasons for normalization, the five most common levels of normalization, how to
normalize a database to third normal form
3. Demonstrate primary, foreign, and composite keys
4. Explain the reason for keys in a database, choose appropriate primary keys, select appropriate data
type for keys, select appropriate fields for composite keys, understand the relationship between
foreign and primary keys
5. Demonstrate indexes
6. Describe clustered and non-clustered indexes and their purpose in a database

E. Administer a Database 24 Hours


Outcome: Students will be able to:
1. Understand database security concepts
2. Understand the need to secure a database, what objects can be secured, what objects should be
secured, user accounts, and roles
3. Understand database backups and restore
4. Understand various backup types, such as full and incremental, importance of backups, how to
restore a database

Page 32 of 46
IT2-DIP-003 - WINDOWS SERVER ADMINISTRATION FUNDAMENTALS 90 HOURS

Prerequisite: Windows Operating System Fundamentals

A. Server Installation 9 Hours


Outcome: Students will be able to:
1. Understand device drivers
2. Installation, removal, disabling, update/upgrade, rollback, troubleshooting, Plug & Play, IRQ,
interrupts, driver signing
3. Explain what services are, which statuses a service can be in, startup types, recovery options,
delayed startup, Run As settings for a service, stopping or pausing a service, service accounts,
dependencies
4. Understand server installation options
5. Choosing correct OS version, partitioning, F8 options, server core vs. full, interactive install,
unattended install, automated install using WDS, upgrade vs. clean install, firmware updates
including BIOS

B. Server Roles 27 Hours


Outcome: Students will be able to:
1. Identify application servers, mail servers, database servers, collaboration servers, monitoring
servers, threat management
2. Demonstrate Web services, IIS, WWW, and FTP, separate worker processes, adding components,
sites, ports, SSL, certificates
3. Demonstrate remote access, remote assistance, remote administration tools, Remote Desktop
Services, licensing, RD Gateway, VPN, application virtualization, multiple ports
4. Demonstrate the file and print services Local printers, network printers, printer pools, web printing,
web management, driver deployment, file, folder, and share permissions vs. rights, auditing, print job
management
5. Explain server virtualization, virtualization modes, VHDs, virtual memory, virtual networks, snapshots
and saved states, physical to virtual, virtual to physical

C. Active Directory 21 Hours


Outcome: Students will be able to:
1. Understand accounts and groups
2. Explain Domain accounts, local accounts, user profiles, group types, group scopes, group nesting,
AGDLP
3. Demonstrate organizational units and containers
4. Explain the Purpose of organizational units, purpose of containers, delegation, default
5. Explain Active Directory infrastructure
6. Domain controllers, forests, operation masters roles, domain vs. workgroup, child domains, trusts,
functional levels, namespace, sites, replication
7. Demonstrate Group policy processing, Group Policy Management Console, computer policies, user
policies, local policies

Page 33 of 46
D. Storage 12 Hours
Outcome: Students will be able to:
1. Identify storage technologies
2. Explain the Advantages and disadvantages of different storage types, local (SATA, SCSI, IDE), NAS,
SAN, fibre channel, iSCSI, NFS, FC HBA and FC switches, iSCSI hardware
3. Describe RAID, RAID 0, RAID 1, RAID 5, RAID 10 and combinations, hardware and software RAID
4. Describe disk types ATA, basic disk, dynamic disk, mount points, file systems, mounting a virtual
hard disk, distributed file systems, optical disks

E. Server Performance Management 9 Hours


Outcome: Students will be able to:
1. Identify major server hardware components Memory, disk, processor, network, 32 / 64 bits,
removable drives, graphic cards, cooling, power usage, ports
2. Demonstrate performance monitoring Methodology, procedures, effect of network, CPU, memory
and disk, creating a baseline, perfmon, resmon, Task Manager, performance counters
3. Describe logs and alerts Purpose of performance logs and alerts.

F. Server Maintenance 12 Hours


Outcome: Students will be able to:
1. Identify steps in the startup process BIOS, bootsector, bootloader, MBR, boot.ini, bcdedit, POST, Safe
Mode
2. Explain business continuity Backup and restore, disaster recovery, clustering, AD restore, folder
redirection, data redundancy, uninterruptible power supply (UPS)
3. Demonstrate updates Software, driver, operating systems, applications, Windows Update, Windows
Server Update Service (WSUS)
4. Explain troubleshooting methodology Processes, procedures, best practices, systematic vs. specific
approach, perfmon, Event Viewer, Resource Monitor, Information Technology Infrastructure Library,
central logging, event filtering, default logs

IT2-PRJ-001 – PRACTICAL PROJECT 60 HOURS

A. Project to demonstrate students’ knowledge and skills. 60 Hours

Page 34 of 46
YEAR 2 TRIMESTER 2
DIPLOMA INFORMATION TECHNOLOGY NETWORK SPECIALIST
COURSE OUTLINE

UPON SUCCESSFUL COMPLETION OF THIS PROGRAMME THE STUDENT SHOULD BE ABLE TO


PERFORM THE FOLLOWING OUTCOMES AND OBJECTIVES

IT2-DIP-004 - CLOUD FUNDAMENTALS 90 HOURS


Prerequisite: N/A.

A. The Cloud 9 Hours


Outcome: Students will be able to:
1. Differentiate between on-premises IT service models
2. Differentiate between subscription or pay-as-you-go versus upfront CapEx/OpEx funding model, use
cloud services to expand capacity (elasticity of the cloud), scalability, redundancy, and availability
3. Differentiate between cloud services that are configurable versus on-premises services that are
customizable
4. Describe how cloud services manage privacy, how compliance goals are met, how data is secured
at rest or on-the-wire, and how data and operations transparency requirements are met
5. Describe How a cloud service stays up to date and available
6. Describe the service/feature improvement process, monitor service health, service maintenance, and
future roadmap publishing, identify guarantees, service level agreements (SLA), and capping of
liability of the cloud service provider
7. Explain Cloud services
8. Differentiate between types of cloud services and their characteristics, including infrastructure as a
service (IaaS), platform as a service (PaaS), and software as a service (SaaS), integrate the cloud
with on-premises services in hybrid scenarios

B. Enable Microsoft Cloud Services 27 Hours


Outcome: Students will be able to:
1. Identify the requirements and dependencies for using Office 365 and Microsoft Intune
2. Plan networking and domains, firewall rule, client requirements, bandwidth implications, and DNS
3. Select a cloud service plan
4. Understand the different options and plans available for Office 365 and Microsoft Intune
5. Sign up for cloud services
6. Name your tenant, set up your first administrator, determine tenant location
7. Set up the initial configuration of cloud services
8. Register domains, verify domains, choose the domain purpose; identify required DNS record types

C. Administer Office 365 and Microsoft Intune 24 Hours


Outcome: Students will be able to:
1. Identify the requirements and dependencies for using Office 365 and Microsoft Intune
2. Plan networking and domains, firewall rule, client requirements, bandwidth implications, and DNS
3. Select a cloud service plan Understand the different options and plans available for Office 365 and
Microsoft Intune
4. Sign up for cloud services

Page 35 of 46
5. Name your tenant, set up your first administrator, determine tenant location
6. Set up the initial configuration of cloud services
7. Register domains, verify domains, choose the domain purpose; identify required DNS record types

D. Use and Configure Microsoft Cloud Services 18 Hours


Outcome: Students will be able to:
1. Configure Exchange Online Manage recipients (mailboxes, shared mailboxes, resources, contacts,
groups), manage anti-spam and antivirus settings
2. Configure SharePoint Online, including OneDrive
3. Create SharePoint team sites, configure external sharing, set up social features using newsfeeds or
Yammer, apply themes, set storage and resource limits
4. Configure Skype for Business Online
5. Manage Skype for Business user options, manage external communication settings, configure dial-
in settings and meeting invitation options, configure Skype for Business Online DNS
6. Configure Microsoft Intune
7. Install Microsoft Intune client management software, create and deploy policies, automate installs,
identify software requirements, set up notifications, identify mobile device management policies

E. Support Cloud Users 12 Hours


Outcome: Students will be able to:
1. Resolve sign-in and Office application installation issues Troubleshoot sign-in issues, forgotten
passwords, connection problems, difficulty activating Office applications, and difficulty connecting
mobile devices to Office 365 or Microsoft Intune, choose between 32-bit and 64-bit, identify when an
Office repair is required
2. Identify operating system requirements for Office 365 ProPlus, browser requirements and specific
versions of Internet Explorer
3. Resolve email and calendar issues Troubleshoot issues receiving and sending email, troubleshoot
issues accessing a delegated mailbox
4. Resolve SharePoint and OneDrive issues Identify storage limits, troubleshoot “Open with Explorer”
not working and OneDrive not syncing, recover deleted files
5. Resolve Skype for Business issues
6. Troubleshoot Skype for Business sign-in issues, troubleshoot connection issues to Skype for
Business Online, troubleshoot communicating to Skype consumer users and users in other
companies using Skype for Business

IT2-DIP-005 - Installing and Configuring Windows Server 2012 R2 90 HOURS

A. Install and Configure Servers 12 Hours


Outcome: Students will be able to:
1. Install servers Plan for a server installation, plan for server roles, plan for a server upgrade, install
Server Core, optimize resource utilization by using Features on Demand
2. Migrate roles from previous versions of Windows Server
3. Configure Server Core, delegate administration
4. Add and remove features in offline images, deploy roles on remote servers
5. Convert Server Core to/from full GUI, configure services, configure NIC teaming, install and configure
Windows PowerShell Desired State Configuration (DSC)

Page 36 of 46
6. Configure local storage Design storage spaces
7. Configure basic and dynamic disks, configure master boot record (MBR) and GUID partition table
(GPT) disks, manage volumes
8. Create and mount virtual hard disks (VHDs)
9. Configure storage pools and disk pools
10. Create storage pools by using disk enclosures.

B. Configure Server Roles and Features 12 Hours


Outcome: Students will be able to:
1. Configure file and share access
2. Create and configure shares
3. Configure share permissions
4. Configure offline files
5. Configure NTFS permissions
6. Configure access-based enumeration (ABE)
7. Configure Volume Shadow Copy Service (VSS)
8. Configure NTFS quotas
9. Create and configure Work Folders
10. Configure print and document services
11. Configure the Easy Print driver
12. Configure Enterprise Print Management
13. Configure drivers, configure printer pooling
14. Configure print priorities
15. Configure printer permissions
16. Configure servers for remote management
17. Configure WinRM, configure down-level server management
18. Configure servers for day-to-day management tasks
19. Configure multi-server management
20. Configure Server Core, configure Windows Firewall
21. Manage non-domain joined servers

C. Configure Hyper-V 12 Hours


Outcome: Students will be able to:
1. Create and configure virtual machine settings
2. Configure dynamic memory, configure smart paging
3. Configure Resource Metering
4. Configure guest integration services
5. Create and configure Generation 1 and 2 virtual machines
6. Configure and use enhanced session mode, configure RemoteFX
7. Create and configure virtual machine storage
8. Create VHDs and VHDX, configure differencing drives, modify VHDs
9. Configure pass-through disks, manage checkpoints
10. Implement a virtual Fibre Channel adapter
11. Configure storage Quality of Service
12. Create and configure virtual networks
13. Configure Hyper-V virtual switches, optimize network performance
14. Configure MAC addresses

Page 37 of 46
15. Configure network isolation
16. Configure synthetic and legacy virtual network adapters
17. Configure NIC teaming in virtual machines

D. Deploy and Configure Core Network Services 18 Hours


Outcome: Students will be able to:
1. Configure IPv4 and IPv6 addressing
2. Configure IP address options
3. Configure IPv4 or IPv6 subnetting
4. Configure supernetting
5. Configure interoperability between IPv4 and IPv6
6. Configure Intra-site Automatic Tunnel Addressing Protocol (ISATAP), configure Teredo
7. Deploy and configure Dynamic Host Configuration Protocol (DHCP) service
8. Create and configure scopes
9. Configure a DHCP reservation
10. Configure DHCP options
11. Configure client and server for PXE boot
12. Configure DHCP relay agent
13. Authorize DHCP server
14. Deploy and configure DNS service
15. Configure Active Directory integration of primary zones
16. Configure forwarders, configure Root Hints
17. Manage DNS cache
18. Create A and PTR resource records

E. Install and Administer Active Directory 18 Hours


Outcome: Students will be able to:
1. Install domain controllers
2. Add or remove a domain controller from a domain
3. Upgrade a domain controller
4. Install Active Directory Domain Services (AD DS) on a Server Core installation
5. Install a domain controller from Install from Media (IFM), resolve DNS SRV record registration issues,
configure a global catalog server
6. Deploy Active Directory infrastructure as a service (IaaS) in Microsoft Azure
7. Create and manage Active Directory users and computers
8. Automate the creation of Active Directory accounts
9. Create, copy, configure, and delete users and computers, configure templates
10. Perform bulk Active Directory operations
11. Configure user rights, offline domain join
12. Manage inactive and disabled accounts
13. Create and manage Active Directory groups and organizational units (OUs)
14. Configure group nesting, convert groups, including security, distribution, universal, domain local, and
domain global
15. Manage group membership using Group Policy, enumerate group membership, delegate the
creation and management of Active Directory objects
16. Manage default Active Directory containers, create, copy, configure, and delete groups and OUs

Page 38 of 46
F. Create and Manage Group Policies 18 Hours
Outcome: Students will be able to:
1. Create Group Policy objects (GPOs)
2. Configure a Central Store, manage starter GPOs
3. Configure GPO links
4. Configure multiple local Group Policies
5. Configure security policies
6. Configure User Rights Assignment
7. Configure Security Options settings
8. Configure Security templates, configure Audit Policy
9. Configure Local Users and Groups
10. Configure User Account Control (UAC)
11. Configure application restriction policies
12. Configure rule enforcement, configure AppLocker rules
13. Configure Software Restriction Policies
14. Configure Windows Firewall
15. Configure rules for multiple profiles using Group Policy
16. Configure connection security rules
17. Configure Windows Firewall to allow or deny applications, scopes, ports, and users
18. Configure authenticated firewall exceptions; import and export settings

IT2-DIP-006 - MOBILITY AND DEVICES FUNDAMENTALS 90 HOURS

Prerequisite: Windows Operating System Fundamentals

A. Device Configurations 6 Hours


Outcome: Students will be able to:
1. Configure device options
2. Describe Microsoft account, configure Control Panel, configure system options
3. Configure desktop settings
4. Configure the Start menu, profiles, display settings, shortcuts, and group configurations and
capabilities
5. Configure drive encryption
6. Configure BitLocker, prepare for file encryption
7. Configure updates
8. Describe Windows Update, describe app updates, describe device system updates

B. Data Access and Management 24 Hours


Outcome: Students will be able to:
1. Explain cloud storage services
2. Describe OneDrive, Microsoft Azure storage, OneNote, Outlook and Office 365
3. Explain local storage
4. Describe storage spaces and storage pools
5. Describe file systems
6. Describe FAT, FAT32, NTFS and Resilient File System Overview (ReFS)
7. Describe file and print sharing

Page 39 of 46
8. Demonstrate NTFS and share permissions, HomeGroup, print drivers and effective permissions,
create public, basic and advanced shares, map drives
9. Describe data encryption
10. Demonstrate encrypting file system (EFS), describe how EFS-encrypted folders impact moving and
copying files, describe BitLocker To Go, virtual private network (VPN), public key and private key,
certificate services, and SSL

C. Device Security 12 Hours


Outcome: Students will be able to:
1. Describe the differences between the Internet, an intranet and an extranet
2. Describe uses of private networks, public networks, firewalls and clouds
3. Explain user authentication
4. Describe Multifactor authentication, describe smart cards, describe Windows Rights Management
Services, describe biometrics and password procedures
5. Explain permissions
6. Configure file and share permissions; describe the behaviour when moving or copying files from one
location to another; describe basic and advanced permissions; describe taking ownership, delegating
and resultant permissions
7. Describe malware
8. Describe computer viruses, Trojan horses, spyware and adware; describe antivirus and antimalware
strategies

D. Cloud Services 24 Hours


Outcome: Students will be able to:
1. Describe the types of cloud services
2. Describe productivity services, storage services, communications services and search services
3. Describe Microsoft Intune
4. Describe Microsoft Intune capabilities, describe selective wipe, describe location settings
5. Describe Microsoft Azure
6. Describe virtual machines; describe Azure services
7. Describe disaster recovery, high availability, redundancy and fault tolerance

E. Enterprise Mobility 24 Hours


Outcome: Students will be able to:
1. Explain identity services
2. Describe Windows Server Active Directory and Azure Active Directory, Microsoft Account and
federation services
3. Explain business data access
4. Describe Company Portal, describe Work Folders, describe Azure RemoteApp
5. Describe Bring Your Own Device (BYOD)
6. Demonstrate device-centric to people-centric IT, describe desktop virtualization, describe Dynamic
Access Control policies, describe Windows Rights Management

IT2-PRJ-002 – PRACTICAL PROJECT 60 HOURS

A. Project to demonstrate students’ knowledge and skills. 60 Hours

Page 40 of 46
YEAR 2 TRIMESTER 3
DIPLOMA INFORMATION TECHNOLOGY NETWORK SPECIALIST
COURSE OUTLINE

UPON SUCCESSFUL COMPLETION OF THIS PROGRAMME THE STUDENT SHOULD BE ABLE TO


PERFORM THE FOLLOWING OUTCOMES AND OBJECTIVES

IT2-DIP-007 - ADMINISTERING WINDOWS SERVER 2012 R2 90 HOURS

A. Deploy, Manage and Maintain Servers 24 Hours


Outcome: Students will be able to:
1. Deploy and manage server images
2. Install the Windows Deployment Services (WDS) role
3. Configure and manage boot, install, and discover images
4. Update images with patches, hotfixes, and drivers
5. Install features for offline images
6. Configure driver groups and packages
7. Implement patch management
8. Install and configure the Windows Server Update Services (WSUS) role
9. Configure group policies for updates
10. Configure client-side targeting, configure WSUS synchronization
11. Configure WSUS groups, manage patch management in mixed environments
12. Monitor servers
13. Configure Data Collector Sets (DCS)
14. Configure alerts, monitor real-time performance, monitor virtual machines (VMs), monitor events
15. Configure event subscriptions
16. Configure network monitoring
17. Schedule performance monitoring

B. Configure Network Services and Access 21 Hours


Outcome: Students will be able to:
1. Configure DNS zones
2. Configure primary and secondary zones
3. Configure stub zones
4. Configure conditional forwards
5. Configure zone and conditional forward storage in Active Directory
6. Configure zone delegation, configure zone transfer settings
7. Configure notify settings
8. Configure DNS records
9. Create and configure DNS Resource Records (RR), including A, AAAA, PTR, SOA, NS, SRV,
CNAME, and MX records
10. Configure zone scavenging
11. Configure record options, including Time To Live
12. (TTL) and weight; configure round robin; configure secure dynamic updates

Page 41 of 46
13. Configure virtual private network (VPN) and routing
14. Install and configure the Remote Access role
15. Implement Network Address Translation (NAT), configure VPN settings, configure remote dial-in
settings for users, configure routing
16. Configure Web Application proxy in pass through mode
17. Configure Direct Access
18. Implement server requirements
19. Implement client configuration, configure DNS for Direct Access
20. Configure certificates for Direct Access

C. Configure and Manage Active Directory 24 Hours


Outcome: Students will be able to:
1. Configure service authentication
2. Create and configure Service Accounts
3. Create and configure Group Managed Service Accounts
4. Configure Kerberos delegation, manage Service Principal Names (SPNs)
5. Configure virtual accounts
6. Configure domain controllers
7. Transfer and seize operations master roles
8. Install and configure a read-only domain controller (RODC)
9. Configure domain controller cloning
10. Maintain Active Directory
11. Back up Active Directory and SYSVOL
12. Manage Active Directory offline
13. Optimize an Active Directory database, clean up metadata, configure Active Directory snapshots
14. Perform object- and container-level recovery, perform Active Directory restore
15. Configure and restore objects by using the Active Directory Recycle Bin
16. Configure account policies
17. Configure domain and local user password policy settings
18. Configure and apply Password Settings Objects (PSOs), delegate password settings management
19. Configure account lockout policy settings
20. Configure Kerberos policy settings

D. Configure Files and Print Services 21 Hours


Outcome: Students will be able to:
1. Configure Distributed File System (DFS)
2. Install and configure DFS namespaces
3. Configure DFS Replication Targets
4. Configure Replication Scheduling
5. Configure Remote Differential Compression settings
6. Configure staging, configure fault tolerance
7. Clone a DFS database
8. Recover DFS databases, optimize DFS replication
9. Configure File Server Resource Manager (FSRM)
10. Install the FSRM role service, configure quotas
11. Configure file screens, configure reports
12. Configure file management tasks

Page 42 of 46
13. Configure file and disk encryption
14. Configure BitLocker encryption
15. Configure the Network Unlock feature
16. Configure BitLocker policies
17. Configure the EFS recovery agent
18. Manage EFS and BitLocker certificates, including backup and restore
19. Configure advanced audit policies
20. Implement auditing using Group Policy and AuditPol.exe
21. Create expression-based audit policies
22. Create removable device audit policies

IT2-DIP-008 - ADMINISTERING AND CONFIGURING ADVANCED WINDOWS SERVER 2012 R2


SERVICES 90 HOURS

A. Configure Network Policy Server (NPS) Infrastructure 24 Hours


Outcome: Students will be able to:
1. Configure Network Policy Server
2. Configure a RADIUS server, including RADIUS proxy
3. Configure RADIUS clients; configure NPS templates; configure RADIUS accounting
4. Configure certificates
5. Configure NPS policies
6. Configure connection request policies,
7. Configure network policies for VPN clients (multilink and bandwidth allocation, IP filters, encryption,
IP addressing), import and export NPS policies
8. Configure Network Access Protection (NAP)
9. Configure System Health Validators (SHVs)
10. Configure health policies, configure NAP enforcement using DHCP and VPN
11. Configure isolation and remediation of non-compliant computers using DHCP and VPN
12. Configure NAP client settings.

B. Configure and Manage Group Policies 24 Hours


Outcome: Students will be able to:
1. Configure Group Policy processing
2. Configure processing order and precedence, configure blocking of inheritance
3. Configure enforced policies
4. Configure security filtering and Windows Management Instrumentation (WMI) filtering
5. Configure loopback processing
6. Configure and manage slow-link processing and Group Policy caching
7. Configure client-side extension (CSE) behaviour, force Group Policy Update
8. Configure Group Policy settings
9. Configure settings, including software installation, folder redirection, scripts, and administrative
template settings
10. Import security templates, import custom administrative template file
11. Configure property filters for administrative templates
12. Manage Group Policy objects (GPOs)
13. Back up, import, copy, and restore GPOs

Page 43 of 46
14. Create and configure Migration Table, reset default GPOs
15. Delegate Group Policy management
16. Configure Group Policy preferences (GPP)
17. Configure GPP settings, including printers, network drive mappings, power options, custom registry
settings, Control Panel settings, Internet Explorer settings, file and folder deployment, and shortcut
deployment, configure item-level targeting

C. Configure and Manage High Availability 24 Hours


Outcome: Students will be able to:
1. Configure Network Load Balancing (NLB)
2. Install NLB nodes, configure NLB prerequisites
3. Configure affinity, configure port rules
4. Configure cluster operation mode, upgrade an NLB cluster
5. Configure failover clustering
6. Configure quorum, configure cluster networking, restore single node or cluster configuration,
configure cluster storage
7. Implement Cluster-Aware Updating, upgrade a cluster
8. Configure and optimize clustered shared volumes
9. Configure clusters without network names, configure storage spaces
10. Manage failover clustering roles
11. Configure role-specific settings, including continuously available shares
12. Configure virtual machine (VM) monitoring
13. Configure failover and preference settings
14. Configure guest clustering
15. Manage VM movement
16. Perform live migration
17. Perform quick migration
18. Perform storage migration, import, export, and copy VMs
19. Configure VM network health protection
20. Configure drain on shutdown

D. Implement Business Continuity and Disaster Recovery 18 Hours


Outcome: Students will be able to:
1. Configure and manage backups
2. Configure Windows Server backups
3. Configure Microsoft Azure backups
4. Configure role-specific backups, manage VSS settings using VSSAdmin
5. Recover servers
6. Restore from backups, perform a Bare Metal Restore (BMR)
7. Recover servers using Windows Recovery Environment (Win RE) and safe mode
8. Configure the Boot Configuration Data (BCD) store
9. Configure site-level fault tolerance
10. Configure Hyper-V Replica, including Hyper-V Replica Broker and VMs
11. Configure multi-site clustering, including network settings, Quorum, and failover settings,
12. Configure Hyper-V Replica extended replication
13. Configure Global Update Manager
14. Recover a multi-site failover cluster

Page 44 of 46
IT2-DIP-009 - CONFIGURING ADVANCED WINDOWS SERVER 2012 SERVICES 90 HOURS

A. Configure the Active Directory Infrastructure 18 Hours


Outcome: Students will be able to:
1. Configure a forest or a domain
2. Implement multi-domain and multi-forest Active Directory environments, including
interoperability with previous versions of Active Directory
3. Upgrade existing domains and forests, including environment preparation and functional levels,
4. Configure multiple user principal name (UPN) suffixes
5. Configure trusts
6. Configure external, forest, shortcut, and realm trusts
7. Configure trust authentication, configure SID filtering
8. Configure name suffix routing
9. Configure sites
10. Configure sites and subnets
11. Create and configure site links, manage site coverage
12. Manage registration of SRV records, move domain controllers between sites
13. Manage Active Directory and SYSVOL replication
14. Configure replication to Read-Only Domain Controllers (RODCs)
15. Configure Password Replication Policy (PRP) for RODC
16. Monitor and manage replication, upgrade SYSVOL replication to Distributed File System
Replication (DFSR)

B. Configure file and Storage Solutions 21 Hours


Outcome: Students will be able to:
1. Configure advanced file services
2. Configure Network File System (NFS) data store
3. Configure BranchCache, configure File Classification Infrastructure (FCI) using File Server
Resource Manager (FSRM)
4. Configure file access auditing
5. Implement Dynamic Access Control (DAC)
6. Configure user and device claim types
7. Implement policy changes and staging, perform access-denied remediation
8. Configure file classification, create and configure Central Access rules and policies
9. Create and configure resource properties and lists
10. Configure and optimize storage
11. Configure iSCSI target and initiator
12. Configure Internet Storage Name server (iSNS)
13. Implement thin provisioning and trim
14. Manage server free space using Features on Demand
15. Configure tiered storage.

C. Configure Network Services 27 Hours


Outcome: Students will be able to:
1. Implement an advanced Dynamic Host Configuration Protocol (DHCP) solution
2. Create and configure superscopes and multicast scopes

Page 45 of 46
3. Implement DHCPv6, configure high availability for DHCP, including DHCP failover and split
scopes, configure DHCP Name Protection
4. Configure DNS registration
5. Implement an advanced DNS solution
6. Configure security for DNS, including Domain Name System Security Extensions (DNSSEC),
DNS Socket Pool, and cache locking
7. Configure DNS logging
8. Configure delegated administration
9. Configure recursion, configure net mask ordering
10. Configure a Global Names zone, analyze zone level statistics
11. Deploy and manage IP Address Management (IPAM)
12. Provision IPAM manually or by using Group Policy
13. Configure server discovery
14. Create and manage IP blocks and ranges
15. Monitor utilization of IP address space, migrate to IPAM
16. Delegate IPAM administration
17. Manage IPAM collections
18. Configure IPAM database storage

D. Configure Identity and Access Solutions 24 Hours


Outcome: Students will be able to:
1. Implement Active Directory Federation Services (AD FS)
2. Install AD FS, implement claims-based authentication, including Relying Party Trusts
3. Configure authentication policies
4. Configure Workplace Join
5. Configure multi-factor authentication
6. Install and configure Active Directory Certificate Services (AD CS)
7. Install an Enterprise Certificate Authority (CA)
8. Configure certificate revocation lists (CRL) distribution points
9. Install and configure Online Responder
10. Implement administrative role separation
11. Configure CA backup and recovery
12. Manage certificates
13. Manage certificate templates
14. Implement and manage certificate deployment, validation, and revocation
15. Manage certificate renewal
16. Manage certificate enrolment and renewal to computers and users using Group Policies,
17. Configure and manage key archival and recovery
18. Install and configure Active Directory Rights Management Services (AD RMS)
19. Install a licensing or certificate AD RMS server
20. Manage AD RMS Service Connection Point (SCP)
21. Manage RMS templates
22. Configure Exclusion Policies and Backup and restore AD RMS

IT2-PRJ-003 – PRACTICAL PROJECT 60 HOURS

A. Project to demonstrate students’ knowledge and skills. 60 Hours

Page 46 of 46

You might also like