Loading...
Login / Register

Save 36%

IT Security Administration Package

This course will equip you with the necessary skills needed to run a highly efficient and modern data center, with expertise in cloud technologies, identity management, systems management, virtualization, storage, and ne... Show More
Course Prerequisites:
CompTIA A+ and Network+ or a minimum of 2 years related working experience.
Add to Cart Request a Quote

Instructor-Led Training (ILT)

Attend training in a classroom environment at a campus near you. Instructor-led training is still the number one delivery method of choice because it allows you to interact and discuss the training material, either individually or in a group setting, and you gain access to expert knowledge from certified instructors. This form of guided learning is impactful and produces positive learning outcomes. Day, evening and Saturday classes are offered.

Course Price (ILT)
R23,920.00

* incl. VAT

Exam
Included

Duration
32 Evenings and Saturdays (3 months)

Additional Terms of this Package

  • *Two evenings per week and two Saturdays per month
  • The course must be completed within 6 months of accepting this quote
  • Includes 1x Microsoft Exam Only

Course Content

Course 20740A MCSA: 70-740 Installation, Storage, and Compute with Windows Server 2016 (8 Evenings and Saturdays)

Module 1: Installing, upgrading, and migrating servers and workloads
This module explains how to prepare and install Nano Server and Server Core. This module also explains how to upgrade and migrate server roles and workloads. Finally, this module explains how to choose an activation model based on your environment characteristics.

Module 2: Configuring local storage
This module explains how to manage disks and volumes in Windows Server 2016.

Module 3: Implementing enterprise storage solutions
This module describes the direct-attached storage (DAS), network-attached storage (NAS), and storage area networks (SANs). It also helps you understand Microsoft Internet Storage Name Service (iSNS) Server, data center bridging, and Multipath I/O (MPIO). Additionally, this module also compares Fibre Channel, Internet Small Computer System Interface (iSCSI), and Fibre Channel Over Ethernet (FCoE), and describes how to configure sharing in Windows Server 2016.

Module 4: Implementing Storage Spaces and Data Deduplication
This module explains how to implement and manage Storage Spaces. This module also explains how to implement Data Deduplication.

Module 5: Installing and configuring Hyper-V and virtual machines
This module provides an overview of Hyper-V. This module also explains how to configure, manage, and install Hyper-V.

Module 6: Deploying and managing Windows Server and Hyper-V containers
This module provides and overview of containers in Windows Server 2016. It also explains how to deploy, install, configure, and manage containers in Windows Server 2016.

Module 7: Overview of high availability and disaster recovery
This module provides an overview of high availability, business continuity, and disaster recovery. It further explains how to plan high availability and disaster recovery solutions. Additionally, in this module you will know how to back up and restore the Windows Server 2016 operating system and data by using Windows Server Backup. Finally, you will learn about Windows Server 2016 high availability with failover clustering.

Module 8: Implementing and managing failover clustering
This module explains how to plan, create, configure, maintain, and troubleshoot a failover cluster. This module also explains how to implement site high availability with stretch clustering.

Module 9: Implementing failover clustering for Hyper-V virtual machines
This module describes integrating Hyper-V virtual machines in a clustered environment. It also explains how to implement and maintain Hyper-V virtual machines on failover clusters. Additionally, this module also explains how to configure network health protection.

Module 10: Implementing Network Load Balancing
This module provides an overview of NLB clusters. It also explains how to plan and configure an NLB cluster implementation.

Module 11: Creating and managing deployment images
This module provides an introduction to deployment images. It also explains how to create and manage deployment images by using the Microsoft Deployment Toolkit (MDT). Additionally, it explains how to evaluate an organization’s requirements for server virtualization.

Module 12: Managing, monitoring, and maintaining virtual machine installations
This module provides an overview on WSUS and explains the deployment options. It explains how to update management process with WSUS and also how to use Performance Monitor. Additionally, this module also provides an overview of PowerShell Desired State Configuration (DSC) and Windows Server 2016 monitoring tools. Finally, this module describes how to use Performance Monitor and monitor Event Logs.

+ See less details

Course 20741A MCSA: 70-741 Networking with Windows Server 2016 (8 Evenings and Saturdays)

Module 1: Planning and implementing an IPv4 network
This module explains how to plan and implement an IPv4 addressing scheme to support organizational needs. This module also explains how to use fundamental networking tools and techniques to configure and troubleshoot IPv4-based networks.

Module 2: Implementing DHCP
This module explains how to plan and implement DHCP to support the IPv4 infrastructure.

Module 3: Implementing IPv6
This module explains how to implement IPv6, and how to integrate IPv6 and IPv4 networks.

Module 4: Implementing DNS
This module explains how to install, configure, and troubleshoot DNS within the organization’s network.

Module 5: Implementing and managing IPAM
This module explains how to implement and manage the IPAM feature in Windows Server 2016. This module also explains how to use IPAM to manage services such as DHCP and DNS.

Module 6: Remote access in Windows Server 2016
This module explains how to plan for remote access in Windows Server 2016 and how to implement Web Application Proxy.

Module 7: Implementing DirectAccess
This module explains how to implement and manage DirectAccess in Windows Server 2016.

Module 8: Implementing VPNs
This module explains how to implement and manage remote access in Windows Server 2016 by using VPNs.

Module 9: Implementing networking for branch offices
This module explains how to implement network services for branch offices.

Module 10: Configuring advanced networking features
This module explains how to implement an advanced networking infrastructure.

Module 11: Implementing software defined networking
This module explains how to implement software defined networking.

+ See more details

Course 20742A MCSA: 70-742 Identity with Windows Server 2016 (8 Evenings and Saturdays)

Module 1: Installing and configuring DCs
This module describes features of AD DS and how to install domain controllers (DCs). It also covers the considerations for deploying DCs.

Module 2: Managing objects in AD DS
This module describes how to use various techniques to manage objects in AD DS. This includes creating and configuring user, group, and computer objects.

Module 3: Advanced AD DS infrastructure management
This module describes how to plan and implement an AD DS deployment that includes multiple domains and forests. The module provides an overview of the components in an advanced AD DS deployment, the process of implementing a distributed AD DS environment, and the procedure for configuring AD DS trusts.

Module 4: Implementing and administering AD DS sites and replication
This module describes how to plan and implement an AD DS deployment that includes multiple locations. The module explains how replication works in a Windows Server 2016 AD DS environment.

Module 5: Implementing Group Policy
This module describes how to implement a GPO infrastructure. The module provides an overview of the components and technologies that compose the Group Policy framework.

Module 6: Managing user settings with GPOs
This module describes how to configure Group Policy settings and Group Policy preferences. This includes implementing administrative templates, configuring folder redirection and scripts, and configuring Group Policy preferences.

Module 7: Securing AD DS
This module describes how to configure domain controller security, account security, password security, and Group Managed Service Accounts (gMSA).

Module 8: Deploying and managing AD CS
This module describes how to implement an AD CS deployment. This includes deploying, administering, and troubleshooting CAs.

Module 9: Deploying and managing certificates
This module describes how to deploy and manage certificates in an AD DS environment. This involves deploying and managing certificate templates, managing certificate revocation and recovery, using certificates in a business environment, and implementing smart cards.

Module 10: Implementing and administering AD FS
This module describes AD FS and how to configure AD FS in a single-organization scenario and in a partner-organization scenario.

Module 11: Implementing and administering AD RMS
This module describes how to implement an AD RMS deployment. The module provides an overview of AD RMS, explains how to deploy and manage an AD RMS infrastructure, and explains how to configure AD RMS content protection.

Module 12: Implementing AD DS synchronization with Azure AD
This module describes how to plan and configure directory syncing between Microsoft Azure Active Directory (Azure AD) and on-premises AD DS. The modules describes various sync scenarios, such as Azure AD sync, AD FS and Azure AD, and Azure AD Connect.

Module 13: Monitoring, managing, and recovering AD DS
This module describes how to monitor, manage, and maintain AD DS to help achieve high availability of AD DS.

+ See more details

CompTIA Security+ (8 Evenings and Satrudays)

1.0 Network Security

  • Implement security configuration parameters on network devices and other technologies.
  • Given a scenario, use secure network administration principles.
  • Explain network design elements and components.
  • Given a scenario, implement common protocols and services.
  • Given a scenario, troubleshoot security issues related to wireless networking.

2.0 Compliance and Operational Security

  • Explain the importance of risk related concepts.
  • Summarize the security implications of integrating systems and data with third parties.
  • Given a scenario, implement appropriate risk mitigation strategies.
  • Given a scenario, implement basic forensic procedures.
  • Summarize common incident response procedures.
  • Explain the importance of security related awareness and training.
  • Compare and contrast physical security and environmental controls.
  • Summarize risk management best practices.
  • Given a scenario, select the appropriate control to meet the goals of security.

3.0 Threats and Vulnerabilities

  • Summarize various types of attacks.
  • Summarize social engineering attacks and the associated effectiveness with each attack.
  • Explain types of wireless attacks.
  • Explain types of application attacks.
  • Analyze a scenario and select the appropriate type of mitigation and deterrent techniques.
  • Given a scenario, use appropriate tools and techniques to discover security threats and vulnerabilities.
  • Explain the proper use of penetration testing versus vulnerability scanning.

4.0 Application, Data and Host Security

  • Explain the importance of application security controls and techniques.
  • Summarize mobile security concepts and technologies.
  • Given a scenario, select the appropriate solution to establish host security.
  • Implement the appropriate controls to ensure data security.
  • Compare and contrast alternative methods to mitigate security risks in static environments.

5.0 Access Control and Identity Management

  • Compare and contrast the function and purpose of authentication services.
  • Given a scenario, select the appropriate authentication, authorization or access control.
  • Install and configure security controls when performing account management, based on best practices.

6.0 Cryptography

  • Given a scenario, utilize general cryptography concepts.
  • Given a scenario, use appropriate cryptographic methods.
  • Given a scenario, use appropriate PKI, certificate management and associated components.

+ See more details

CTU Training Solutions , Updated: January 8th, 2019

Share with friends

Request a Quote



Your Name

Your Surname

Contact Number

Your Email

Company

Which campus would you like to study at?

Your job title

Will your training be sponsored?

Message

The course information above is subject to change without notification due to market trends in the industry, legislation and/or programme version updates. Terms and Conditions

Join the CTU community

Join the CTU Community Portal and gain access to superior resources.

Join for Free

Thank you for printing this page.
Logo
0861 100 395
[email protected]
www.ctutraining.ac.za

X

Call me Back

Leave your details and we'll contact you back!

Your Name:

Your Email:


Contact Number:

Choose a campus