Information Technology Network Specialist - Year 2 - Course Outline
Information Technology Network Specialist - Year 2 - Course Outline
Information Technology Network Specialist - Year 2 - Course Outline
Specialist
Course Outline
YEAR 2
Page 29 of 46
YEAR 2 TRIMESTER 1
DIPLOMA INFORMATION TECHNOLOGY NETWORK SPECIALIST
COURSE OUTLINE
Page 30 of 46
D. Web Applications 21 Hours
Outcome: Students will be able to:
1. Explain web page development HTML, Cascading Style Sheets (CSS), JavaScript
2. Use Microsoft ASP.NET web application development Page life cycle, event model, state
management, client-side versus server-side programming
3. Demonstrate web hosting Creating virtual directories and websites, deploying web applications,
understanding the role of Internet Information Services
4. Demonstrate web services Web services that will be consumed by client applications, accessing web
services from a client application, SOAP and Web Service Definition Language (WSDL)
F. Databases 18 Hours
Outcome: Students will be able to:
1. Understand relational database management systems Characteristics and capabilities of database
products, database design, Entity Relationship Diagrams (ERDs), normalization concepts
2. Demonstrate database query methods Structured query language (SQL), creating and accessing
stored procedures
3. Updating data and selecting data
4. Understand database connection methods Connecting to various types of data stores, such as flat
file, XML file, in-memory object, resource optimization
Page 31 of 46
B. Create Database Objects 18 Hours
Outcome: Students will be able to:
1. Choose data types
2. Explain what data types are, why they are important, and how they affect storage requirements
3. Describe tables and how to create them
4. Explain Purpose of tables, create tables in a database by using proper ANSI SQL syntax
5. Create views
6. Demonstrate when to use views and how to create a view by using T-SQL or a graphical designer
7. Create stored procedures and functions
8. Select, insert, update, or delete data
Page 32 of 46
IT2-DIP-003 - WINDOWS SERVER ADMINISTRATION FUNDAMENTALS 90 HOURS
Page 33 of 46
D. Storage 12 Hours
Outcome: Students will be able to:
1. Identify storage technologies
2. Explain the Advantages and disadvantages of different storage types, local (SATA, SCSI, IDE), NAS,
SAN, fibre channel, iSCSI, NFS, FC HBA and FC switches, iSCSI hardware
3. Describe RAID, RAID 0, RAID 1, RAID 5, RAID 10 and combinations, hardware and software RAID
4. Describe disk types ATA, basic disk, dynamic disk, mount points, file systems, mounting a virtual
hard disk, distributed file systems, optical disks
Page 34 of 46
YEAR 2 TRIMESTER 2
DIPLOMA INFORMATION TECHNOLOGY NETWORK SPECIALIST
COURSE OUTLINE
Page 35 of 46
5. Name your tenant, set up your first administrator, determine tenant location
6. Set up the initial configuration of cloud services
7. Register domains, verify domains, choose the domain purpose; identify required DNS record types
Page 36 of 46
6. Configure local storage Design storage spaces
7. Configure basic and dynamic disks, configure master boot record (MBR) and GUID partition table
(GPT) disks, manage volumes
8. Create and mount virtual hard disks (VHDs)
9. Configure storage pools and disk pools
10. Create storage pools by using disk enclosures.
Page 37 of 46
15. Configure network isolation
16. Configure synthetic and legacy virtual network adapters
17. Configure NIC teaming in virtual machines
Page 38 of 46
F. Create and Manage Group Policies 18 Hours
Outcome: Students will be able to:
1. Create Group Policy objects (GPOs)
2. Configure a Central Store, manage starter GPOs
3. Configure GPO links
4. Configure multiple local Group Policies
5. Configure security policies
6. Configure User Rights Assignment
7. Configure Security Options settings
8. Configure Security templates, configure Audit Policy
9. Configure Local Users and Groups
10. Configure User Account Control (UAC)
11. Configure application restriction policies
12. Configure rule enforcement, configure AppLocker rules
13. Configure Software Restriction Policies
14. Configure Windows Firewall
15. Configure rules for multiple profiles using Group Policy
16. Configure connection security rules
17. Configure Windows Firewall to allow or deny applications, scopes, ports, and users
18. Configure authenticated firewall exceptions; import and export settings
Page 39 of 46
8. Demonstrate NTFS and share permissions, HomeGroup, print drivers and effective permissions,
create public, basic and advanced shares, map drives
9. Describe data encryption
10. Demonstrate encrypting file system (EFS), describe how EFS-encrypted folders impact moving and
copying files, describe BitLocker To Go, virtual private network (VPN), public key and private key,
certificate services, and SSL
Page 40 of 46
YEAR 2 TRIMESTER 3
DIPLOMA INFORMATION TECHNOLOGY NETWORK SPECIALIST
COURSE OUTLINE
Page 41 of 46
13. Configure virtual private network (VPN) and routing
14. Install and configure the Remote Access role
15. Implement Network Address Translation (NAT), configure VPN settings, configure remote dial-in
settings for users, configure routing
16. Configure Web Application proxy in pass through mode
17. Configure Direct Access
18. Implement server requirements
19. Implement client configuration, configure DNS for Direct Access
20. Configure certificates for Direct Access
Page 42 of 46
13. Configure file and disk encryption
14. Configure BitLocker encryption
15. Configure the Network Unlock feature
16. Configure BitLocker policies
17. Configure the EFS recovery agent
18. Manage EFS and BitLocker certificates, including backup and restore
19. Configure advanced audit policies
20. Implement auditing using Group Policy and AuditPol.exe
21. Create expression-based audit policies
22. Create removable device audit policies
Page 43 of 46
14. Create and configure Migration Table, reset default GPOs
15. Delegate Group Policy management
16. Configure Group Policy preferences (GPP)
17. Configure GPP settings, including printers, network drive mappings, power options, custom registry
settings, Control Panel settings, Internet Explorer settings, file and folder deployment, and shortcut
deployment, configure item-level targeting
Page 44 of 46
IT2-DIP-009 - CONFIGURING ADVANCED WINDOWS SERVER 2012 SERVICES 90 HOURS
Page 45 of 46
3. Implement DHCPv6, configure high availability for DHCP, including DHCP failover and split
scopes, configure DHCP Name Protection
4. Configure DNS registration
5. Implement an advanced DNS solution
6. Configure security for DNS, including Domain Name System Security Extensions (DNSSEC),
DNS Socket Pool, and cache locking
7. Configure DNS logging
8. Configure delegated administration
9. Configure recursion, configure net mask ordering
10. Configure a Global Names zone, analyze zone level statistics
11. Deploy and manage IP Address Management (IPAM)
12. Provision IPAM manually or by using Group Policy
13. Configure server discovery
14. Create and manage IP blocks and ranges
15. Monitor utilization of IP address space, migrate to IPAM
16. Delegate IPAM administration
17. Manage IPAM collections
18. Configure IPAM database storage
Page 46 of 46