0% found this document useful (0 votes)
15 views

Training Module

Uploaded by

Abdiaziz
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Training Module

Uploaded by

Abdiaziz
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 28

Somali regional state

Training manual
By

Brothers IT PLC

April, 2021
1. CCNA Course Overview
The Implementing and Administering Cisco Solutions (CCNA) v1.0 course gives you a broad
range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on
labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and
IPv6 networks. The course covers configuring network components such as switches, routers, and
wireless LAN controllers; managing network devices; and identifying basic security threats. The
course also gives you a foundation in network programmability, automation, and software-
defined networking.

This course helps you prepare to take the 200-301 Cisco® Certified Network Associate
(CCNA®) exam. By passing this one exam, you earn CCNA certification

Course details
Objectives

 Identify the components of a computer network and describe their basic characteristics
 Understand the model of host-to-host communication
 Describe the features and functions of the Cisco Internetwork Operating System (IOS®)
software
 Describe LANs and the role of switches within LANs
 Describe Ethernet as the network access layer of TCP/IP and describe the operation of
switches
 Install a switch and perform the initial configuration
 Describe the TCP/IP Internet layer, IPv4, its addressing scheme, and sub netting
 Describe the TCP/IP Transport layer and Application layer
 Explore functions of routing
 Implement basic configuration on a Cisco router
 Explain host-to-host communications across switches and routers
 Identify and resolve common switched network issues and common problems associated
with IPv4 addressing
 Describe IPv6 main features and addresses, and configure and verify basic IPv6
connectivity
 Describe the operation, benefits, and limitations of static routing
 Describe, implement, and verify Virtual Local Area Networks (VLANs) and trunks
 Describe the application and configuration of inter-VLAN routing
 Explain the basics of dynamic routing protocols and describe components and terms of
Open Shortest Path First (OSPF)
 Explain how Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol (RSTP)
work
 Configure link aggregation using Ether Channel
 Describe the purpose of Layer 3 redundancy protocols
 Describe basic WAN and VPN concepts
 Describe the operation of Access Control Lists (ACLs) and their applications in the
network
 Configure Internet access using Dynamic Host Configuration Protocol (DHCP) clients and
explain and configure Network Address Translation (NAT) on Cisco routers
 Describe basic Quality of Service (QoS) concepts
 Describe the concepts of wireless networks, which types of wireless networks can be built,
and how to use Wireless LAN Controllers (WLCs)
 Describe network and device architectures and introduce virtualization
 Introduce the concept of network programmability and Software-Defined Networking
(SDN) and describe smart network management solutions such as Cisco DNA Center™,
Software-Defined Access (SD-Access), and Software-Defined Wide Area Network (SD-
WAN)
 Configure basic IOS system monitoring tools
 Describe the management of Cisco devices
 Describe the current security threat landscape
 Describe threat defense technologies
 Implement a basic security configuration of the device management plane
 Implement basic steps to harden network devices

Prerequisites

Before taking this course, you should have:

 Basic computer literacy


 Basic PC operating system navigation skills
 Basic Internet usage skills
 Basic IP address knowledge

Course Duration

 Instructor-led training: 5 days in the classroom

Learning outcome

 Learn the knowledge and skills to install, configure, and operate a small- to medium-sized
network
 Gain a foundation in the essentials of networking, security, and automation

Target students

This course is designed for anyone seeking CCNA certification. The course also provides
foundational knowledge for all support technicians involved in the basic installation, operation,
and verification of Cisco networks.
The job roles best suited to the material in this course are:
 Entry-level network engineer
 Network administrator
 Network support technician
 Help desk technician
Outline

This class includes lecture sections and some self-study sections. In instructor-led classes, lectures
are delivered in real-time, either in person or via video conferencing. In e-learning classes, the
lectures are on recorded videos.

Section title Learning mode

Implementing VLANs and Trunks Lecture

Routing Between VLANs Lecture

Introducing OSPF Lecture

Building Redundant Switched Topologies Self-study

Improving Redundant Switched Topologies with EtherChannel Lecture

Exploring Layer 3 Redundancy Self-study

Introducing WAN Technologies Self-study

Explaining Basics of ACL Lecture

Enabling Internet Connectivity Lecture

Introducing QoS Self-study

Explaining Wireless Fundamentals Self-study

Introducing Architectures and Virtualization Self-study

Explaining the Evolution of Intelligent Networks Lecture

Introducing System Monitoring Lecture

Managing Cisco Devices Lecture

Examining the Security Threat Landscape Self-study

Implementing Threat Defense Technologies Self-study

Securing Administrative Access Lecture

Implementing Device Hardening Lecture

Sorry, no results matched your search criteria(s). Please try again.


Lab outline

 Get Started with Cisco Command-Line Interface (CLI)


 Observe How a Switch Operates
 Perform Basic Switch Configuration
 Implement the Initial Switch Configuration
 Inspect TCP/IP Applications
 Configure an Interface on a Cisco Router
 Configure and Verify Layer 2 Discovery Protocols
 Implement an Initial Router Configuration
 Configure Default Gateway
 Explore Packet Forwarding
 Troubleshoot Switch Media and Port Issues
 Troubleshoot Port Duplex Issues
 Configure Basic IPv6 Connectivity
 Configure and Verify IPv4 Static Routes
 Configure IPv6 Static Routes
 Implement IPv4 Static Routing
 Implement IPv6 Static Routing
 Configure VLAN and Trunk
 Troubleshoot VLANs and Trunk
 Configure a Router on a Stick
 Implement Multiple VLANs and Basic Routing Between the VLANs
 Configure and Verify Single-Area OSPF
 Configure and Verify EtherChannel
 Improve Redundant Switched Topologies with EtherChannel
 Configure and Verify IPv4 ACLs
 Implement Numbered and Named IPv4 ACLs
 Configure a Provider-Assigned IPv4 Address
 Configure Static NAT
 Configure Dynamic NAT and Port Address Translation (PAT)
 Implement PAT
 Log into the WLC
 Monitor the WLC
 Configure a Dynamic (VLAN) Interface
 Configure a DHCP Scope
 Configure a WLAN
 Define a Remote Access Dial-In User Service (RADIUS) Server
 Explore Management Options
 Explore the Cisco DNA™ Center
 Configure and Verify NTP
 Configure System Message Logging
 Create the Cisco IOS Image Backup
 Upgrade Cisco IOS Image
 Configure WLAN Using Wi-Fi Protected Access 2 (WPA2) Pre-Shared Key (PSK) Using
the GUI
 Secure Console and Remote Access
 Enable and Limit Remote Access Connectivity
 Secure Device Administrative Access
 Configure and Verify Port Security
 Implement Device Hardening

2. Windows Active Directory


Course 10969-B: Active Directory® Services with Windows Server®

 5 Days
 Instructor-led training
 Advanced
 English

Get Hands on instruction and practice administering Active Directory


technologies in Windows Server and Windows Server in this 5-day Microsoft
Official Course. You will learn the skills you need to better manage and
protect data access and information, simplify deployment and management
of your identity infrastructure, and provide more secure access to data. You
will learn how to configure some of the key features in Active Directory such
as Active Directory Domain Services (AD DS), Group Policy, Dynamic Access
Control (DAC), Work Folders, Work Place Join, Certificate Services, Rights
Management Services (RMS), Federation Services, as well as integrating your
on premise environment with cloud based technologies such as Windows
Azure Active Directory. As part of the learning experience, you will perform
hands-on exercises in a virtual lab environment.

Target students

This course is intended for Information Technology (IT) Professionals who


have Active Directory Domain Services (AD DS) experience and are looking to
for a single course that will further develop knowledge and skills using Access
and Information Protection technologies in Windows Server and Windows
Server. This would typically include:

 AD DS Administrators who are looking to further develop skills in the latest


Access and Information Protection technologies with Windows Server and
Windows Server R2.
 System or Infrastructure administrators with general AD DS experience and
knowledge who are looking to build upon that core knowledge and cross-train
into advanced Active Directory technologies in Windows Server and Windows
Server R2.
 IT Professionals who have taken the 10967A: Fundamentals of a Windows
Server Infrastructure course and are looking to build upon that Active
directory knowledge.

Skills gained

 Understand available solutions for identity management and be able to


address scenarios with appropriate solutions.
 Deploy and administer AD DS in Windows Server .
 Secure AD DS deployment.
 Implement AD DS sites, configure and manage replication
 Implement and manage Group Policy
 Manage user settings with Group Policy
 Implement certification authority (CA) hierarchy with AD CS and how to
manage CAs.
 Implement, deploy and manage certificates.
 Implement and manage AD RMS.
 Implement and administer AD FS.
 Secure and provision data access using technologies such as Dynamic Access
Control, Work Folders and Workplace Join
 Monitor, troubleshoot and establish business continuity for AD DS services.
 Implement Windows Azure Active Directory.
 Implement and administer Active Directory Lightweight Directory Services (AD
LDS).

Show more

Prerequisites

Before attending this course, students must have:

 Experience working with Active Directory Domain Services (AD DS)


 Experience working in a Windows Server Infrastructure enterprise environment
 Experience working with and troubleshooting core networking infrastructure
technologies such as name resolution, IP Addressing, Domain Name System
(DNS) and Dynamic Host Configuration Protocol (DHCP)
 Experience working with Hyper-V and Server Virtualization concepts
 An awareness and understanding of general security best practices
 Experience working hands on with Windows client operating systems such as
Windows Vista, Windows 7 or Windows 8

Course outline

Module 1: Overview of Access and Information Protection

This module provides an overview of multiple Access and Information Protection


(AIP) technologies and services what are available with Windows Server and
Windows Server from a business perspective and maps business problems to
technical solutions. It also includes coverage of Forefront Identify Manager (FIM).

Lessons

 Introduction to Access and Information Protection Solutions in Business


 Overview of AIP Solutions in Windows Server
 Overview of FIM 2010 R2

Lab : Choosing an Appropriate Access and Information Protection


Management Solution

After completing this module students will be able to:

 Describe Access and Information Protection solutions in business.


 Describe Access and Information Protection solutions in Windows Server and
Windows Server R2.
 Describe Microsoft Forefront Identity Manager (FIM) 2010 R2.

Module 2: Advanced Deployment and Administration of AD DS

This module explains how to deploy AD DS remotely and describes the virtualization
safeguards, cloning abilities and extending AD DS to the cloud.

Lessons

 Deploying AD DS
 Deploying and Cloning Virtual Domain Controllers
 Deploying Domain Controllers in Windows Azure
 Administering AD DS

Lab : Deploying and Administering AD DS

After completing this module, students will be able to:

 Describe and perform various deployment techniques for AD DS.


 Describe virtual domain controller deployment considerations.
 Explain how new technologies in Windows Server and Windows Server support
virtual domain controllers.
 Describe Domain Controller cloning.
 Implement AD DS using the tools provided in Windows Server and Windows
Server R2.

Module 3: Securing AD DS

This module describes the threats to domain controllers and what methods can be
used to secure the AD DS and its domain controllers.

Lessons

 Securing Domain Controllers


 Implementing Account Security
 Implementing Audit Authentication

Lab : Securing AD DS

After completing this module, students will be able to:

 Understand the importance of securing domain controllers.


 Describe the benefit of read-only domain controllers (RODCs).
 Explain and implement password and account lockout policies.
 Implement audit authentication.

Module 4: Implementing and Administering AD DS Sites and Replication

This module explains how AD DS replicates information between domain controllers


within a single site and throughout multiple sites. This module also explains how to
create multiple sites and how to monitor replication to help optimize AD DS
replication and authentication traffic.

Lessons

 Overview of AD DS Replication
 Configuring AD DS Sites
 Configuring and Monitoring AD DS Replication

Lab : Implementing AD DS Sites and Replication

After completing this module, students will be able to:

 Describe AD DS replication.
 Configure AD DS sites.
 Configure and monitor AD DS replication.

Module 5: Implementing Group Policy

This module describes Group Policy, how it works, and how best to implement it
within your organization.

Lessons

 Introducing Group Policy


 Implementing and Administering GPOs
 Group Policy Scope and Group Policy Processing
 Troubleshooting the Application of GPOs

Lab : Implementing and Troubleshooting a Group Policy Infrastructure

After completing this module, students will be able to:

 Describe Group Policy.


 Implement and administer GPOs.
 Describe Group Policy scope and Group Policy processing.
 Troubleshoot the application of GPOs.

Module 6: Managing User Settings with Group Policy

This module describes how to how to use GPO Administrative Templates, Folder
Redirection, and Group Policy features to configure users’ computer settings.

Lessons
 Implementing Administrative Templates
 Configuring Folder Redirection and Scripts
 Configuring Group Policy Preferences

Lab : Managing User Desktops with Group Policy

After completing this module, students will be able to:

 Implement Administrative Templates.


 Configure Folder Redirection and scripts.
 Configure Group Policy preferences.

Module 7: Deploying and Managing AD CS

This module explain how to deploy and manage Certificate Authorities (CAs) with
Active Directory Certificate Services (AD CS)

Lessons

 Deploying CAs
 Administering CAs
 Troubleshooting, Maintaining, and Monitoring CAs

Lab : Deploying and Configuring a Two-Tier CA Hierarchy

After completing this module, students will be able to:

 Deploy Certificate Authorities.


 Administer Certificate Authorities.
 Troubleshoot, maintain, and monitor Certificate Authorities.

Module 8: Deploying and Managing Certificates

This module describes certificate usage in business environments and explains how
to deploy and manage certificates, configure certificate templates and manage
enrolment process. This module also covers the deployment and management of
smart cards.
Lessons

 Using Certificates in a Business Environment


 Deploying and Managing Certificate Templates
 Managing Certificates Deployment, Revocation, and Recovery
 Implementing and Managing Smart Cards

Lab : Deploying and Using Certificates

After completing this module, students will be able to:

 Use certificates in business environments.


 Deploy and manage certificate templates.
 Manage certificates deployment, revocation and recovery.
 Implement and manage smart cards.

Module 9: Implementing and Administering AD RMS

This module introduces Active Directory Rights Management Services (AD RMS). It
also describes how to deploy AD RMS, how to configure content protection, and how
to make AD RMS–protected documents available to external users.

Lessons

 Overview of AD RMS
 Deploying and Managing an AD RMS Infrastructure
 Configuring AD RMS Content Protection
 Configuring External Access to AD RMS

Lab : Implementing an AD RMS Infrastructure

After completing this module, students will be able to:

 Describe AD RMS.
 Explain how to deploy and manage an AD RMS infrastructure.
 Explain how to configure AD RMS content protection.
 Explain how to configure external access to AD RMS.
Module 10: Implementing and Administering AD FS

This module explains AD FS, and then provides details on how to configure AD FS in
both a single organization scenario and in a partner organization scenario. This
module also describes the Web Application Proxy feature in Windows Server that
functions as an AD FS proxy and reverse proxy for web-based applications.

Lessons

 Overview of AD FS
 Deploying AD FS
 Implementing AD FS for a Single Organization
 Deploying AD FS in a Business-to-Business Federation Scenario
 Extending AD FS to External Clients

Lab : Implementing AD FS

After completing this module, students will be able to:

 Describe AD FS.
 Explain how to configure the AD FS prerequisites, and deploy AD FS services.
 Describe how to implement AD FS for a single organization.
 Deploy AD FS in a business-to-business federation scenario.
 Deploy the Web Application Proxy.

Module 11: Implementing Secure Shared File Access

This module explains how to use Dynamic Access Control (DAC), Work Folders, Work
place Join and how to plan and implement these technologies.

Lessons

 Overview of Dynamic Access Control


 Implementing DAC Components
 Implementing DAC for Access Control
 Implementing Access Denied Assistance
 Implementing and Managing Work Folders
 Implementing Workplace Join

Lab : Implementing Secure File Access

After completing this module, students will be able to:

 Describe DAC.
 Implement DAC components.
 Implement DAC for access control.
 Implement access-denied assistance.
 Implement and manage Work Folders.
 Implement Workplace Join.

Module 12: Monitoring, Managing, and Recovering AD DS

This module explains how to use tools that help monitor performance in real time,
and how to record performance over time to spot potential problems by observing
performance trends. This module also explains how to optimize and protect your
directory service and related identity and access solutions so that if a service does
fail, you can restart it as quickly as possible.

Lessons

 Monitoring AD DS
 Managing the AD DS Database
 AD DS Backup and Recovery Options for AD DS and Other Identity and Access
Solutions

Lab : Monitoring AD DS

Lab : Recovering Objects in AD DS

After completing this module, students will be able to:

 Monitor AD DS.
 Manage the AD DS database.
 Recover objects from the AD DS database.
Module 13: Implementing Windows Azure Active Directory

This module explains the concepts and technologies in Windows Azure Active
Directory and how to implement and integrate it within your organization

Lessons

 Overview of Windows Azure AD


 Managing Windows Azure AD Accounts

Lab : Implementing Windows Azure AD

After completing this module, students will be able to:

 Describe Windows Azure AD.


 Administer Azure AD.

Module 14: Implementing and Administering AD LDS

This module explains how to deploy and configure Active Directory


Lightweight Directory Services (AD LDS)

Lessons

 Overview of AD LDS
 Deploying AD LDS
 Configuring AD LDS Instances and Partitions
 Configuring AD LDS Replication
 Integrating AD LDS with AD DS

Lab : Implementing and Administering AD LDS

After completing this module, students will be able to:

 Describe AD LDS.
 Explain how to deploy AD LDS.
 Explain how to configure AD LDS instances and partitions.
 Explain how to configure AD LDS replication.
3.Administering Microsoft Exchange Server
2016/2019

Course 20345-1-B: Administering Microsoft Exchange Server


2016/2019

 5 Days
 Instructor-led training
 Advanced
 English

This course teaches IT professionals how to administer and support Exchange


Server. The course covers how install and configure Exchange Server. It also
covers how to manage mail recipients and public folders, including how to
perform bulk operations by using Exchange Management Shell. In addition,
the course covers how to manage client connectivity, message transport and
hygiene, and highly available Exchange Server deployments. It also covers
how to implement disaster recovery solutions. Finally, the course covers how
to maintain and monitor an Exchange Server deployment and how to
administer Exchange Online in a Office 365 deployment.

Target students

The audience for this course includes enterprise-level messaging


administrators on Exchange Server. IT generalists and helpdesk professionals
who want to learn about Exchange Server may also take this course. Students
taking this course are expected to have at least two years of experience
working in the IT field—typically in the areas of Windows Server
administration, network administration, helpdesk, or system administration.
They are also expected to have some experience with Exchange Server
concepts but previous experience managing Exchange Server is not a
requirement.
Skills gained

 Deploy Exchange Server.


 Plan and configure storage for Exchange Server.
 Create and manage various recipient objects in Exchange Server.
 Perform recipient management and Exchange server management tasks by
using Exchange Server cmdlets.
 Deploy Client Access services in Exchange Server.
 Manage high availability in Exchange Server.
 Implement disaster recovery for Exchange Server.
 Configure and manage message transport in Exchange Server.
 Configure message security in Exchange Server.
 Monitor and troubleshoot Exchange Server.
 Configure Exchange Server role-based access control permissions and
configure audit logging for both administrators and users.
 Implement and manage integration with Exchange Online.

Show more

Prerequisites

In addition to their professional experience, students who attend this training should
already have the following technical knowledge:

 Minimum of two years of experience administering Windows Server.


 Minimum of two years of experience working with Active Directory Domain
Services (AD DS).
 Minimum of two years of experience working with name resolution, including
Domain Name System (DNS).
 Understanding of TCP/IP and networking concepts.
 Understanding of security concepts such as authentication and authorization.
 Understanding of Simple Mail Transfer Protocol (SMTP).
 Working knowledge of public key infrastructure (PKI) technologies, including
Active Directory Certificate Services (AD CS).
Course outline

Module 1: Deploying Exchange Server

This module explains the key features and architecture of Exchange Server. It also
explains the prerequisites and requirements for deploying Exchange Server.
Additionally, it explains how to use the Exchange admin center and the Exchange
management shell to manage Exchange Server.

Lessons

 Overview of Exchange Server


 Exchange Server architecture
 Requirements for Exchange Server
 Deploying Exchange Server Exchange Server
 Exchange Server Management Tools

Lab : Deploying Exchange Server

 Evaluating requirements and prerequisites for an Exchange Server 2019


installation
 Deploying Exchange Server 2019
 Verifying Exchange Server functionality
 Installing Exchange Server 2019 on Windows Server Core 2019 (optional)

After completing this module, students will be able to:

 Describe the key features and functionality of Exchange Server.


 Describe the Exchange Server architecture.
 Describe the requirements and options for deploying Exchange Server.
 Deploy Exchange Server.
 Describe how to use management tools to manage Exchange Server.

Module 2: Managing Exchange Server 2016 storage


This module explains the features of Exchange Server mailbox databases and the
storage options available for Exchange Server. It also explains how to configure
Exchange Server mailbox databases and storage.

Lessons

 Exchange Server mailbox databases


 Exchange Server storage
 Configuring Exchange Server mailbox databases and storage

Lab : Configuring Exchange Server storage

 Creating and configuring mailbox databases

After completing this module, students will be able to:

 Describe the features of Exchange Server mailbox databases.


 Explain the storage options available for Exchange Server.
 Configure Exchange Server mailbox databases and storage.

Module 3: Managing recipient objects

This module explains how to manage the user, shared, resource, public folder,
arbitration mailboxes in Exchange Server. It also explains how to manage contacts,
mail users, and distribution groups in Exchange Server. Finally, it explains how to
configure address lists and email address and address book policies in Exchange
Server.

Lessons

 Managing user mailboxes


 Managing other types of mailboxes
 Managing other recipients objects
 Configuring policies and adress lists

Lab : Managing recipient objects


 Configuring recipient objects
 Managing public folder mailboxes

Lab : Configuring address lists and policies

 Managing email address policies


 Managing address lists and address book policies

After completing this module, students will be able to:

 Manage user mailboxes in Exchange Server.


 Manage shared, resource, public folder, and arbitration mailboxes in Exchange
Server.
 Manage contacts, mail users, and distribution groups in Exchange Server.
 Configure address lists, and email address and address book policies in
Exchange Server.

Module 4: Managing recipients and Exchange servers by using Exchange


Server cmdlets

This module describes how to manage recipients by using Exchange Server cmdlets.
It also explains how to manage Exchange servers by using Exchange Server cmdlets
and scripts.

Lessons

 Overview of the Exchange Management Shell


 Managing Exchange Servers by using Exchange Management Shell cmdlets
 Managing Exchange servers by using scripts

Lab : Managing Exchange Server and recipient objects by using Exchange


Management Shell

 Using Exchange Management Shell to manage recipients


 Using Exchange Management Shell to manage Exchange Server

After completing this module, students will be able to:


 Manage recipients by using Exchange Server cmdlets.
 Manage Exchange servers by using Exchange Server cmdlets.
 Manage Exchange servers by using scripts.

Module 5: Implementing client connectivity

This module explains how to configure and manage client access services in
Exchange Server. It also explains the client connectivity options for Exchange Server
and how to configure Outlook on the web. Additionally, it explains how to configure
mobile messaging for Exchange Server.

Lessons

 Configuring client access services


 Managing client access services
 Client connectivity in Exchange Server
 Configuring Outlook on the web
 Configuring mobile messaging

Lab : Configuring client access services

 Configuring namespaces for client access


 Configuring certificates for client access
 Configuring custom MailTips

Lab : Deploying and configuring client access services on Exchange Server

 Configuring Exchange Server for Outlook


 Configuring Outlook on the web
 Configuring Microsoft Exchange ActiveSync

After completing this module, students will be able to:

 Configure client access services in Exchange Server.


 Manage client access services.
 Describe client connectivity and publishing of Exchange Server services.
 Configure Outlook on the web.
 Configure mobile messaging on Exchange Server.

Module 6: Managing high availability in Exchange Server

This module describes the high availability options for Exchange Server. It also
explains how to configure highly available mailbox databases and Client Access
services by using load balancing methods.

Lessons

 High availability on Exchange Server


 Configuring highly available mailbox databases
 Configuring high availability of Client Access services

Lab : Implementing DAGs

 Creating and configuring a DAG

Lab : Implementing and testing high availability

 Deploying a high availability solution for Client Access services


 Testing the high availability configuration

After completing this module, students will be able to:

 Describe the high availability in Exchange Server.


 Configure highly available mailbox databases.
 Configure high available Client Access services.

Module 7: Implementing disaster recovery for Exchange Server

This module describes Exchange Server backup and restore features and the details
that you need to consider when you create a backup plan.

Lessons

 Implementing Exchange Server backup


 Implementing Exchange Server recovery
Lab : Backing up Exchange Server data

 Backing up an Exchange Server mailbox database

Lab : Restoring Exchange Server data

 Restoring Exchange Server mailbox


 Restoring a database availability group (DAG) member (optional)

After completing this module, students will be able to:

 Back up Exchange Server data.


 Restore Exchange Server data by using the configured backups.

Module 8: Configuring and managing message transport

This module explains messaging transport in Exchange Server. It also explains how
to configure message transport in Exchange Server and manage transport rules in
Exchange Server.

Lessons

 Overview of message transport


 Configuring message transport
 Managing transport rules

Lab : Configuring and managing message transport

 Configuring message transport


 Monitoring and verifying message delivery
 Configuring a disclaimer transport rule
 Configuring a DLP policy for financial data

After completing this module, students will be able to:

 Describe messaging transport in Exchange Server.


 Configure message transport in Exchange Server.
 Manage transport rules in Exchange Server.
Module 9: Configuring message security

This module describes how to deploy and manage an Edge Transport server for
message security. It also explains how to implement antivirus and antispam
solutions for Exchange Server.

Lessons

 Deploying and managing an Edge Transport server for message security


 Implementing an antivirus solution for Exchange Server
 Implementing an antispam solution for Exchange Server

Lab : Configuring message security in Exchange Server

 Configuring and testing EdgeSync


 Configuring antivirus, antispam and malware protection features

After completing this module, students will be able to:

 Deploy and manage an Edge Transport server for message security.


 Implement an antivirus solution for Exchange Server.
 Implement an antispam solution for Exchange Server.

Module 10: Monitoring and troubleshooting Exchange Server

This module explains how to configure performance monitoring and troubleshoot


issues in Exchange Server.

Lessons

 Monitoring Exchange Server


 Troubleshooting Exchange Server

Lab : Monitoring and troubleshooting Exchange Server

 Monitoring Exchange Server


 Troubleshooting database availability
 Troubleshooting Client Access servers
After completing this module, students will be able to:

 Configure performance monitoring in Exchange Server.


 Troubleshoot issues in Exchange Server.

Module 11: Securing and maintaining Exchange Server

This module explains how to secure Exchange Server by using role-based access
control (RBAC). It also explains how to configure audit logging in Exchange Server
and how to maintain and update Exchange Server.

Lessons

 Securing Exchange Server by using RBAC


 Configuring audit logging in Exchange Server
 Maintaining Exchange Server

Lab : Securing and maintaining Exchange Server

 Configuring Exchange Server permissions


 Configuring audit logging
 Maintaining Exchange Server

After completing this module, students will be able to:

 Secure Exchange Server by using RBAC.


 Configure audit logging in Exchange Server.
 Maintain and update Exchange Server.

Module 12: Implementing and managing Exchange Online deployments

This module explains Exchange Online and Office 365 and how to manage it. It also
explains how to implement a migration to Exchange Online.

Lessons

 Overview of Exchange Online and Office 365


 Managing Exchange Online
 Implementing the migration to Exchange Online
 Managing a hybrid environment

Lab : Managing Exchange Online

 Managing Exchange Online

After completing this module, students will be able to:

 Provide an overview of Exchange Online and Office 365.


 Manage Exchange Online.
 Implement a migration to Exchange Online.

You might also like