Top 50 Practice Exams
Name | Exam | Posted |
Show next 20 exams |
1. Networking Fundamentals
- The OSI Reference Model
- TCP/IP and the OSI Reference Model
- Networks
- The Cisco IOS Software
- Spanning-Tree Protocol (STP)
2. Virtual LANs and Trunking
3. IP Addressing and Subnetting
- IP Addressing
- Subneting
- Summarization
- Determining the Network ID using the Logical AND Operation
- IP Version 6
4. Routing
- Routing Tables
- Routing Protocols
- Basic Switching Functions
- Convergence
- Testing and Troubleshooting Routes
5. Link-State Protocols
- Building Routing Table on New OSPF-Configured Routers
- Steady-State Operation
- OSPF Areas
- Balanced Hybrid Routing Protocol and EIGRP
- Router Configuration
6. Advanced TCP/IP
- Private IP Addressing
- Network Address Translation (NAT)
- Internet Control Message Protocol (ICMP)
- FTP and TFTP
- MTU and Fragmentation
7. Wide Area Networks (WANs)
8. IP Access List Security
1. Installing and Deploying Windows XP Professional
- Installing Windows XP Professional
- The Windows XP Professional Boot Process
- The Registry
- The Boot.ini File
2. Configuring Windows XP Professional
- Configuring Hardware Profiles
- Installing New Hardware
- Using Driver Signing
- Configuring Display Settings
- Configuring System Settings
- Configuring the Desktop Environment
- Configuring Accessibility Options
- Configuring Hard Disks
- Configuring Power Management on Portable Computers
3. Configuring the Network
- Creating Network Connections
- IP Addressing
- Name Resolution
- Enabling and Configuring Internet Connection Firewall
- Enabling Internet Connection Sharing
- Enabling and Configuring Network Bridge
- Using the Network Setup Wizard
- Connecting to a Novell NetWare Network
- Connecting to a UNIX Network
4. Setting up and Managing User Accounts
- Types of User Accounts
- Creating User Accounts
- Configuring Account Policies
- Managing Users and User Accounts
- Managing Users by Using Groups
5. Network Printing
- Setting Up Client Computers
- Setting Up a Printer Pool
- Setting Printer Priorities
- Novell and UNIX Printers
6. Controlling Access to Network Resources
7. Controlling Access to Network Resources
8. Monitoring Resources and Performance
- Monitoring Applications
- Monitoring Processes
- Monitoring System Performance
- Monitoring Network Connectivity
- Monitoring Event Logs
- Audit Policies
- Archiving Logs
- Monitoring Access to Shared Folders
9. Practice Labs
- Converting a Hard Drive to NTFS
- Configuring Dual Boot Options
- Supporting Printing for UNIX Clients
- Setting Printer Priorities
- Installing New Hardware Devices
- Working with Device Drivers
- Creating New User Accounts
- Creating User Groups
- Configuring Disk Quotas
- Compressing Files and Folders
- Encrypting Files and Folders
1. Hardware
- Identifying the Principals of Personal Storage Devices and Backup Media
- Identifying Motherboard Components
- Working with Power Supplies
- Characteristics of CPUs
- Compare and Contrast Memory Types
- Cooling Methods
- Display Devices
- Input and Peripherals Devices
- Principals of Laptops and Portable Devices
- Install and configure Printers
2. Troubleshooting, Repair and Maintenance
- The Basics of Troubleshooting
- Common Hardware and Operating System Symptoms and Causes
- Common Printer Problems
- Printer Hardware Troubleshooting
- Common Laptop Issues
- Performing Preventive Maintenance
3. Troubleshooting, Repair and Maintenance
- Operating Systems and Software
- Proper Use of User Interfaces
- Configuring Windows
- Identifying Boot Sequences
4. Networking
- The Basics of networking
- Network Protocols
- Status Indicators
- Virtual Private Networks
- Bandwidth and Latency
- Network Cabling and Connectors
- Different Network Types
5. Security
- The Basic Principles of Security
- Encryption Technologies
- Authentication Technologies
- Basics of Data Sensitivity and Security
- Security Features
6. Operational Procedure
1. General Networking Theory
- The OSI Reference Model
- Networks
- Network Technologies
- Network Addressing
- The Cisco Hierarchical Model
- Routing and Switching in a Cisco Router
- The Structure of a Routing Table
- Routing Tables
- Routing Protocols
- Convergence
- Testing and Troubleshooting Routes
2. Bridging and LAN Switching Concepts
- Overview
- Switching Concepts
- VLANs
- VLAN Trunking
- VLAN Trunking Protocol (VTP)
- Port Aggregation with EtherChannel
- Cisco Discovery Protocol (CDP)
- LAN Security
3. IP
- The TCP/IP Architecture
- Internet Protocol (IP)
- IPv4 Addressing
- Private IP Addressing
- Multicast Addressing
- Services and Applications
- IP Access Lists
4. IP Routing
- Overview
- Open Shortest Path First (OSPF)
- Border Gateway Protocol (BGP)
- Enhanced Interior Gateway Routing Protocol (EIGRP)
- Policy Routing
5. Quality of Service (QoS)
6. Wide Area Networks (WANs)
7. IP Multicast
8. Security
9. MPLS
- Label Switching Router (LSR)
- Label Switched Path (LSP)
- Route Descriptor
- Label Format
- Label imposition/disposition
- Label Distribution
10. IPv6
1. Network Theory
- Discuss the standard network models
- Identify common physical network topologies
- Explain common logical network topologies and their characteristics (Peer to peer, Client/server, VPN, VLAN)
- Categorize standard cable types and their properties
- Identify common connector types (RJ-1 1, RJ-45, BNC, SC, ST, LC, RS-232, RG-59, and RG-6)
- Given a scenario, differentiate and implement appropriate wiring standards (568A, 568B, Straight vs. crossover, Rollover, Loopback)
- Install components of wiring distribution
- Verify Wiring Installation and Termination
- Install, configure, and differentiate among common network devices
- Explain the advanced features of a switch (PoE, Spanning tree, VLAN, Trunking, Port mirroring, Port authentication)
- Identify the functions of specialized network devices (Multilayer switch, Content switch IDS/IPS, Load balancer, Multifunction network devices, DNS server, Bandwidth shaper, Proxy server, CSU/DSU)
2. Explain the function of common networking protocols
- Explain the function of common networking protocols
- Transmission Control Protocol /Internet Protocol (TCP/IP) Protocol Suite
- Identify commonly used TCP and UDP default ports
3 .Network Data Delivery
- Identify the following address formats (IPv6, IPv4, MAC addressing)
- Given a scenario, evaluate the proper use of the following addressing technologies.
- Discuss the various Address Schemes
- Explain the purpose and properties of routing and identify common IPv4 and IPv6 routing protocols
4 .Network Implementation
- Discuss LAN Properties
- Differentiate between Broadband and Baseband Signaling
- Categorize LAN technology types
5 .Wireless Networking
- Implement a basic wireless network (Install client, Access point placement, Install access point, Configure appropriate encryption, Configure channels and frequencies, Set ESSID and beacon, Verify installation)
- Setting up Communication between Wireless Networks
- Beacon Management Frame
- Configuring the Wireless Connection
- Troubleshooting Wireless Signals
- Define Access Control, Authentication, Authorization, and Encryption with reference to Wireless Networks
- Discuss the security standards for Wireless Networks
- Compare the characteristics of wireless communication standards (802.1 1 a/b/g/n- Speeds, Distance, Channels and Frequency
- Compare the characteristics of wireless communication standards Wireless Radio Channels
6 .WAN Infrastructure
- Discuss the differences between a public and a private WAN
- Discuss the various Switching Methods available
- Discuss the various Switching Methods available
7 .The OSI Model
8 .Network Management
- Discuss the rationales behind network optimization
- Discuss the strategies implemented for resource optimization
9 .Network Troubleshooting
- Discuss the basics of troubleshooting
- Given a scenario, troubleshoot common connectivity issues and select an appropriate solution
10 .Networking Tools
- Given a scenario, select the appropriate command line interface tool and interpret the output to verify functionality.
- Explain the purpose of network scanners
- Describe various methods used for network protection
- Given a scenario, utilize the appropriate hardware tools
11 .Network Security
- Explain the function of hardware and software security devices
- Explain common features of firewall
- Explain the method of network access security
- What are the various tunneling and encryption protocols SSL VPN
- What are the various Remote access procedures
- Explain methods of user authentication Public Key Infrastructure (PKI)
- Discuss AAA and various protocols that provide AAA features AAA (Authentication, Authorization and Accounting)
- Discuss various point-to-point authentication protocols uses in PPP
- Explain issues that affect device security
- Describe various secure methods for accessing devices across the network Secure Socket Layer (SSH)
- Discuss various unsecure methods for accessing devices across the network Telnet
- Identify common security threats and mitigation techniques
- Describe various mitigation techniques policies and procedures
1. Security Concepts
1.1 General Security Concepts
1.2 Operational Organizational Security
- Policies, Standards, Guidelines, and Procedures
- The Security Perimeter
- Logical Access Controls
- Social Engineering
- Organizational Policies and Procedures
2. Cryptography and Applications
2.1 Cryptography
2.2 Public Key Infrastructure
- The Basics of Public Key Infrastructures
- Certificate Authorities
- Certificate Repositories
- Public Certificate Authorities
2.3 Security in Infrastructure
2.4 Security in Transmissions
2.5 Types of Attacks and Malicious Software
2.6 Protocols
2.7 Code-Based Vulnerabilities
2.8 Application-Based Weaknesses
1 Introduction to VMware vSphere 4
- What is vSphere 4?
- VMware ESX and ESXi
- VMware Virtual Symmetric Multi-Processing
- VMware vCenter Server
- vCenter Update Manager
- vSphere 4 Client
- vMotion and Storage vMotion
- High Availability
- Fault Tolerance
- Distributed Resource Scheduler
- Distributed Power Management (DPM)
- vShield Zones
- vCenter Orchestrator
- Benefits of Choosing VMware vSphere
2 Planning, Installing and Managing VMware ESX and ESXi
- Planning vSphere4 deployment
- Selecting VMware ESX or VMware ESXi
- Choosing a Server Platform
- Determining a Storage Architecture
- Integrating with the Network Infrastructure
- DeployingVMware ESX
- DeployingVMware ESXi
- Installing the vSphere Client
- Performing Post-installation Configuration
3 Install and Configure vCenter Server
- Introduction to vCenter Server
- Planning and Designing a vCenter Server Deployment
- vCenter Server Installation
- Installing vCenter Server in a Linked Mode Group
- Exploring vCenter Server
- Creating and Managing a vCenter Server Inventory
- Exploring vCenter Server's Management Features
- Managing vCenter Server Settings
- Install and Configure vCenter Update Manager
- Create and Manage Virtual Networks
- Setting up and Managing Storage Devices
1. Installing and Deploying Windows Server 2003
- System Requirements
- Installing Windows Server 2003 from the CD-Rom
- Installing Windows Server 2003 from a Network Share
- Performing an Unattended Installation
- Windows Server 2003 Licensing
- Deploying Software Applications
- The Windows Server 2003 Advanced Boot Options
- The Recovery Console
2. Managing Windows Server 2003
- Installing New Hardware
- Using Driver Signing
- Configuring Hard Disks
- Configuring File Systems
- Defragmenting Volumes and Partitions
- Backing Up and Restoring Data
- Planning System Recovery with Automated System Recovery (ASR)
- Adding Additional Hardware
3. Configuring the Windows Server 2003 Network
- Creating Network Connections
- Configuring Automatic IP Addressing
- Name Resolution
- Domain Name Space
- DNS Zones
- Name Servers
- Configuring Dynamic DNS
- Testing IP Connections
4. The Windows Server 2003 Network Infrastructure
- Directory Service Functionality
- Active Directory Support for Client Computers
- Active Directory Structure
- Domain Functional Levels
- Forest Functional Levels
- Active Directory Replication
- Administering Active Directory
- Auditing Access to Active Directory Objects
5. Microsoft Internet Information Services (IIS) 6.0
6. Routing and Remote Access Service (RRAS)
- Routing and Remote Access Service Features
- Installation and Configuration
- Connecting to RRAS
- Remote Access Security
- Securing RRAS Clients
- Virtual Private Networks (VNP)
- RRAS Tools
- Routing
7. Terminal Services
- Terminal Services Components
- Client Software and Installation
- Connecting to Terminal Services
- Administering Terminal Services
- Troubleshooting Terminal Services
8. Creating and Managing User and Computer Accounts
- Types of User Accounts
- Computer Accounts
- Creating User Accounts
- Group Accounts
- Configuring Account Policies
- Managing User Data
- Group Policy
- Managing User Environment
- Software Deployment
9. Controlling Access to Network Resources
- Access Control List
- NTFS Permissions
- Shared Folder Permissions
- Offline Files
- Combining Shared Folder Permissions and NTFS Permissions
10. Monitoring Network Resources
- Monitoring Access to Shared Folders
- Auditing
- Using Event Viewer
- Using Group Policy
- The Shutdown Event Tracker
11. Monitoring System Performance
1. The Campus Switching Network
- The Traditional Shared Campus Network
- The New Campus Network
- Switching Technologies
- Switched Campus Network Design
2. Basic Switch and Port Configuration
- Network Technologies
- Connecting Switches
- Switch Management
- Switch File Management
- Switch Port Configuration
3. Implement VLAN based solutions
4. Redundant Switch Links
- Switch Port Aggregation with EtherChannel
- Spanning-Tree Protocol (STP)
- Spanning-Tree Communication
- STP States
- STP Timers
- Convergence
- Spanning-Tree Design
- STP Types
- Spanning Tree Protocol Security Features
- Protecting Against the Sudden Loss of BPDUs
- Advanced Spanning-Tree Protocol
5. Wireless LAN
- Wireless LAN Technology Overview
- Wireless LAN Security
- Wireless Mobility
- Cisco Aironet Client Installation and Configuration
6. Implement Switch based Layer 3 services
7. Multi-Layer Switching
- Multi-Layer Switching Components
- MLS-RP Advertisements
- Configuring Multi-Layer Switching
- Flow Masks
- Configuring the MLS-SE
8. Cisco Express Forwarding (CEF)
9. Implement High Availability: HSRP
- Traditional Redundancy Methods
- Hot Standby Router Protocol (HSRP)
- HSRP Operations
- Configuring HSRP
- Troubleshooting HSRP
10. Quality of Service
11. Support for Voice and Video
12. Controlling Access in the Campus Environment
- Access Policies
- Managing Network Devices
- Access Layer Policy and Port Security
- Distribution Layer Policy
- Core Layer Policy
13. Monitoring and Troubleshooting
1. Networking Fundamentals
- The OSI Reference Model
- TCP/IP and the OSI Reference Model
- Networks
- The Cisco IOS Software
- Spanning-Tree Protocol (STP)
2. Virtual LANs and Trunking
3. IP Addressing and Subnetting
- IP Addressing
- Subneting
- Summarization
- Determining the Network ID using the Logical AND Operation
- IP Version 6
4. Routing
- Routing Tables
- Routing Protocols
- Basic Switching Functions
- Convergence
- Testing and Troubleshooting Routes
5. Link-State Protocols
- Building Routing Table on New OSPF-Configured Routers
- Steady-State Operation
- OSPF Areas
- Balanced Hybrid Routing Protocol and EIGRP
- Router Configuration
6. Advanced TCP/IP
- Private IP Addressing
- Network Address Translation (NAT)
- Internet Control Message Protocol (ICMP)
- FTP and TFTP
- MTU and Fragmentation
7. Wide Area Networks (WANs)
8. IP Access List Security
1. Installing and Deploying Windows XP Professional
- Installing Windows XP Professional
- The Windows XP Professional Boot Process
- The Registry
- The Boot.ini File
2. Configuring Windows XP Professional
- Configuring Hardware Profiles
- Installing New Hardware
- Using Driver Signing
- Configuring Display Settings
- Configuring System Settings
- Configuring the Desktop Environment
- Configuring Accessibility Options
- Configuring Hard Disks
- Configuring Power Management on Portable Computers
3. Configuring the Network
- Creating Network Connections
- IP Addressing
- Name Resolution
- Enabling and Configuring Internet Connection Firewall
- Enabling Internet Connection Sharing
- Enabling and Configuring Network Bridge
- Using the Network Setup Wizard
- Connecting to a Novell NetWare Network
- Connecting to a UNIX Network
4. Setting up and Managing User Accounts
- Types of User Accounts
- Creating User Accounts
- Configuring Account Policies
- Managing Users and User Accounts
- Managing Users by Using Groups
5. Network Printing
- Setting Up Client Computers
- Setting Up a Printer Pool
- Setting Printer Priorities
- Novell and UNIX Printers
6. Controlling Access to Network Resources
7. Controlling Access to Network Resources
8. Monitoring Resources and Performance
- Monitoring Applications
- Monitoring Processes
- Monitoring System Performance
- Monitoring Network Connectivity
- Monitoring Event Logs
- Audit Policies
- Archiving Logs
- Monitoring Access to Shared Folders
9. Practice Labs
- Converting a Hard Drive to NTFS
- Configuring Dual Boot Options
- Supporting Printing for UNIX Clients
- Setting Printer Priorities
- Installing New Hardware Devices
- Working with Device Drivers
- Creating New User Accounts
- Creating User Groups
- Configuring Disk Quotas
- Compressing Files and Folders
- Encrypting Files and Folders
1. Hardware
- Identifying the Principals of Personal Storage Devices and Backup Media
- Identifying Motherboard Components
- Working with Power Supplies
- Characteristics of CPUs
- Compare and Contrast Memory Types
- Cooling Methods
- Display Devices
- Input and Peripherals Devices
- Principals of Laptops and Portable Devices
- Install and configure Printers
2. Troubleshooting, Repair and Maintenance
- The Basics of Troubleshooting
- Common Hardware and Operating System Symptoms and Causes
- Common Printer Problems
- Printer Hardware Troubleshooting
- Common Laptop Issues
- Performing Preventive Maintenance
3. Troubleshooting, Repair and Maintenance
- Operating Systems and Software
- Proper Use of User Interfaces
- Configuring Windows
- Identifying Boot Sequences
4. Networking
- The Basics of networking
- Network Protocols
- Status Indicators
- Virtual Private Networks
- Bandwidth and Latency
- Network Cabling and Connectors
- Different Network Types
5. Security
- The Basic Principles of Security
- Encryption Technologies
- Authentication Technologies
- Basics of Data Sensitivity and Security
- Security Features
6. Operational Procedure
1. General Networking Theory
- The OSI Reference Model
- Networks
- Network Technologies
- Network Addressing
- The Cisco Hierarchical Model
- Routing and Switching in a Cisco Router
- The Structure of a Routing Table
- Routing Tables
- Routing Protocols
- Convergence
- Testing and Troubleshooting Routes
2. Bridging and LAN Switching Concepts
- Overview
- Switching Concepts
- VLANs
- VLAN Trunking
- VLAN Trunking Protocol (VTP)
- Port Aggregation with EtherChannel
- Cisco Discovery Protocol (CDP)
- LAN Security
3. IP
- The TCP/IP Architecture
- Internet Protocol (IP)
- IPv4 Addressing
- Private IP Addressing
- Multicast Addressing
- Services and Applications
- IP Access Lists
4. IP Routing
- Overview
- Open Shortest Path First (OSPF)
- Border Gateway Protocol (BGP)
- Enhanced Interior Gateway Routing Protocol (EIGRP)
- Policy Routing
5. Quality of Service (QoS)
6. Wide Area Networks (WANs)
7. IP Multicast
8. Security
9. MPLS
- Label Switching Router (LSR)
- Label Switched Path (LSP)
- Route Descriptor
- Label Format
- Label imposition/disposition
- Label Distribution
10. IPv6
1. Network Theory
- Discuss the standard network models
- Identify common physical network topologies
- Explain common logical network topologies and their characteristics (Peer to peer, Client/server, VPN, VLAN)
- Categorize standard cable types and their properties
- Identify common connector types (RJ-1 1, RJ-45, BNC, SC, ST, LC, RS-232, RG-59, and RG-6)
- Given a scenario, differentiate and implement appropriate wiring standards (568A, 568B, Straight vs. crossover, Rollover, Loopback)
- Install components of wiring distribution
- Verify Wiring Installation and Termination
- Install, configure, and differentiate among common network devices
- Explain the advanced features of a switch (PoE, Spanning tree, VLAN, Trunking, Port mirroring, Port authentication)
- Identify the functions of specialized network devices (Multilayer switch, Content switch IDS/IPS, Load balancer, Multifunction network devices, DNS server, Bandwidth shaper, Proxy server, CSU/DSU)
2. Explain the function of common networking protocols
- Explain the function of common networking protocols
- Transmission Control Protocol /Internet Protocol (TCP/IP) Protocol Suite
- Identify commonly used TCP and UDP default ports
3 .Network Data Delivery
- Identify the following address formats (IPv6, IPv4, MAC addressing)
- Given a scenario, evaluate the proper use of the following addressing technologies.
- Discuss the various Address Schemes
- Explain the purpose and properties of routing and identify common IPv4 and IPv6 routing protocols
4 .Network Implementation
- Discuss LAN Properties
- Differentiate between Broadband and Baseband Signaling
- Categorize LAN technology types
5 .Wireless Networking
- Implement a basic wireless network (Install client, Access point placement, Install access point, Configure appropriate encryption, Configure channels and frequencies, Set ESSID and beacon, Verify installation)
- Setting up Communication between Wireless Networks
- Beacon Management Frame
- Configuring the Wireless Connection
- Troubleshooting Wireless Signals
- Define Access Control, Authentication, Authorization, and Encryption with reference to Wireless Networks
- Discuss the security standards for Wireless Networks
- Compare the characteristics of wireless communication standards (802.1 1 a/b/g/n- Speeds, Distance, Channels and Frequency
- Compare the characteristics of wireless communication standards Wireless Radio Channels
6 .WAN Infrastructure
- Discuss the differences between a public and a private WAN
- Discuss the various Switching Methods available
- Discuss the various Switching Methods available
7 .The OSI Model
8 .Network Management
- Discuss the rationales behind network optimization
- Discuss the strategies implemented for resource optimization
9 .Network Troubleshooting
- Discuss the basics of troubleshooting
- Given a scenario, troubleshoot common connectivity issues and select an appropriate solution
10 .Networking Tools
- Given a scenario, select the appropriate command line interface tool and interpret the output to verify functionality.
- Explain the purpose of network scanners
- Describe various methods used for network protection
- Given a scenario, utilize the appropriate hardware tools
11 .Network Security
- Explain the function of hardware and software security devices
- Explain common features of firewall
- Explain the method of network access security
- What are the various tunneling and encryption protocols SSL VPN
- What are the various Remote access procedures
- Explain methods of user authentication Public Key Infrastructure (PKI)
- Discuss AAA and various protocols that provide AAA features AAA (Authentication, Authorization and Accounting)
- Discuss various point-to-point authentication protocols uses in PPP
- Explain issues that affect device security
- Describe various secure methods for accessing devices across the network Secure Socket Layer (SSH)
- Discuss various unsecure methods for accessing devices across the network Telnet
- Identify common security threats and mitigation techniques
- Describe various mitigation techniques policies and procedures
1. Security Concepts
1.1 General Security Concepts
1.2 Operational Organizational Security
- Policies, Standards, Guidelines, and Procedures
- The Security Perimeter
- Logical Access Controls
- Social Engineering
- Organizational Policies and Procedures
2. Cryptography and Applications
2.1 Cryptography
2.2 Public Key Infrastructure
- The Basics of Public Key Infrastructures
- Certificate Authorities
- Certificate Repositories
- Public Certificate Authorities
2.3 Security in Infrastructure
2.4 Security in Transmissions
2.5 Types of Attacks and Malicious Software
2.6 Protocols
2.7 Code-Based Vulnerabilities
2.8 Application-Based Weaknesses
1 Introduction to VMware vSphere 4
- What is vSphere 4?
- VMware ESX and ESXi
- VMware Virtual Symmetric Multi-Processing
- VMware vCenter Server
- vCenter Update Manager
- vSphere 4 Client
- vMotion and Storage vMotion
- High Availability
- Fault Tolerance
- Distributed Resource Scheduler
- Distributed Power Management (DPM)
- vShield Zones
- vCenter Orchestrator
- Benefits of Choosing VMware vSphere
2 Planning, Installing and Managing VMware ESX and ESXi
- Planning vSphere4 deployment
- Selecting VMware ESX or VMware ESXi
- Choosing a Server Platform
- Determining a Storage Architecture
- Integrating with the Network Infrastructure
- DeployingVMware ESX
- DeployingVMware ESXi
- Installing the vSphere Client
- Performing Post-installation Configuration
3 Install and Configure vCenter Server
- Introduction to vCenter Server
- Planning and Designing a vCenter Server Deployment
- vCenter Server Installation
- Installing vCenter Server in a Linked Mode Group
- Exploring vCenter Server
- Creating and Managing a vCenter Server Inventory
- Exploring vCenter Server's Management Features
- Managing vCenter Server Settings
- Install and Configure vCenter Update Manager
- Create and Manage Virtual Networks
- Setting up and Managing Storage Devices
1. Installing and Deploying Windows Server 2003
- System Requirements
- Installing Windows Server 2003 from the CD-Rom
- Installing Windows Server 2003 from a Network Share
- Performing an Unattended Installation
- Windows Server 2003 Licensing
- Deploying Software Applications
- The Windows Server 2003 Advanced Boot Options
- The Recovery Console
2. Managing Windows Server 2003
- Installing New Hardware
- Using Driver Signing
- Configuring Hard Disks
- Configuring File Systems
- Defragmenting Volumes and Partitions
- Backing Up and Restoring Data
- Planning System Recovery with Automated System Recovery (ASR)
- Adding Additional Hardware
3. Configuring the Windows Server 2003 Network
- Creating Network Connections
- Configuring Automatic IP Addressing
- Name Resolution
- Domain Name Space
- DNS Zones
- Name Servers
- Configuring Dynamic DNS
- Testing IP Connections
4. The Windows Server 2003 Network Infrastructure
- Directory Service Functionality
- Active Directory Support for Client Computers
- Active Directory Structure
- Domain Functional Levels
- Forest Functional Levels
- Active Directory Replication
- Administering Active Directory
- Auditing Access to Active Directory Objects
5. Microsoft Internet Information Services (IIS) 6.0
6. Routing and Remote Access Service (RRAS)
- Routing and Remote Access Service Features
- Installation and Configuration
- Connecting to RRAS
- Remote Access Security
- Securing RRAS Clients
- Virtual Private Networks (VNP)
- RRAS Tools
- Routing
7. Terminal Services
- Terminal Services Components
- Client Software and Installation
- Connecting to Terminal Services
- Administering Terminal Services
- Troubleshooting Terminal Services
8. Creating and Managing User and Computer Accounts
- Types of User Accounts
- Computer Accounts
- Creating User Accounts
- Group Accounts
- Configuring Account Policies
- Managing User Data
- Group Policy
- Managing User Environment
- Software Deployment
9. Controlling Access to Network Resources
- Access Control List
- NTFS Permissions
- Shared Folder Permissions
- Offline Files
- Combining Shared Folder Permissions and NTFS Permissions
10. Monitoring Network Resources
- Monitoring Access to Shared Folders
- Auditing
- Using Event Viewer
- Using Group Policy
- The Shutdown Event Tracker
11. Monitoring System Performance
1. The Campus Switching Network
- The Traditional Shared Campus Network
- The New Campus Network
- Switching Technologies
- Switched Campus Network Design
2. Basic Switch and Port Configuration
- Network Technologies
- Connecting Switches
- Switch Management
- Switch File Management
- Switch Port Configuration
3. Implement VLAN based solutions
4. Redundant Switch Links
- Switch Port Aggregation with EtherChannel
- Spanning-Tree Protocol (STP)
- Spanning-Tree Communication
- STP States
- STP Timers
- Convergence
- Spanning-Tree Design
- STP Types
- Spanning Tree Protocol Security Features
- Protecting Against the Sudden Loss of BPDUs
- Advanced Spanning-Tree Protocol
5. Wireless LAN
- Wireless LAN Technology Overview
- Wireless LAN Security
- Wireless Mobility
- Cisco Aironet Client Installation and Configuration
6. Implement Switch based Layer 3 services
7. Multi-Layer Switching
- Multi-Layer Switching Components
- MLS-RP Advertisements
- Configuring Multi-Layer Switching
- Flow Masks
- Configuring the MLS-SE
8. Cisco Express Forwarding (CEF)
9. Implement High Availability: HSRP
- Traditional Redundancy Methods
- Hot Standby Router Protocol (HSRP)
- HSRP Operations
- Configuring HSRP
- Troubleshooting HSRP
10. Quality of Service
11. Support for Voice and Video
12. Controlling Access in the Campus Environment
- Access Policies
- Managing Network Devices
- Access Layer Policy and Port Security
- Distribution Layer Policy
- Core Layer Policy
13. Monitoring and Troubleshooting
1. Networking Fundamentals
- The OSI Reference Model
- TCP/IP and the OSI Reference Model
- Networks
- The Cisco IOS Software
- Spanning-Tree Protocol (STP)
2. Virtual LANs and Trunking
3. IP Addressing and Subnetting
- IP Addressing
- Subneting
- Summarization
- Determining the Network ID using the Logical AND Operation
- IP Version 6
4. Routing
- Routing Tables
- Routing Protocols
- Basic Switching Functions
- Convergence
- Testing and Troubleshooting Routes
5. Link-State Protocols
- Building Routing Table on New OSPF-Configured Routers
- Steady-State Operation
- OSPF Areas
- Balanced Hybrid Routing Protocol and EIGRP
- Router Configuration
6. Advanced TCP/IP
- Private IP Addressing
- Network Address Translation (NAT)
- Internet Control Message Protocol (ICMP)
- FTP and TFTP
- MTU and Fragmentation
7. Wide Area Networks (WANs)
8. IP Access List Security
1. Installing and Deploying Windows XP Professional
- Installing Windows XP Professional
- The Windows XP Professional Boot Process
- The Registry
- The Boot.ini File
2. Configuring Windows XP Professional
- Configuring Hardware Profiles
- Installing New Hardware
- Using Driver Signing
- Configuring Display Settings
- Configuring System Settings
- Configuring the Desktop Environment
- Configuring Accessibility Options
- Configuring Hard Disks
- Configuring Power Management on Portable Computers
3. Configuring the Network
- Creating Network Connections
- IP Addressing
- Name Resolution
- Enabling and Configuring Internet Connection Firewall
- Enabling Internet Connection Sharing
- Enabling and Configuring Network Bridge
- Using the Network Setup Wizard
- Connecting to a Novell NetWare Network
- Connecting to a UNIX Network
4. Setting up and Managing User Accounts
- Types of User Accounts
- Creating User Accounts
- Configuring Account Policies
- Managing Users and User Accounts
- Managing Users by Using Groups
5. Network Printing
- Setting Up Client Computers
- Setting Up a Printer Pool
- Setting Printer Priorities
- Novell and UNIX Printers
6. Controlling Access to Network Resources
7. Controlling Access to Network Resources
8. Monitoring Resources and Performance
- Monitoring Applications
- Monitoring Processes
- Monitoring System Performance
- Monitoring Network Connectivity
- Monitoring Event Logs
- Audit Policies
- Archiving Logs
- Monitoring Access to Shared Folders
9. Practice Labs
- Converting a Hard Drive to NTFS
- Configuring Dual Boot Options
- Supporting Printing for UNIX Clients
- Setting Printer Priorities
- Installing New Hardware Devices
- Working with Device Drivers
- Creating New User Accounts
- Creating User Groups
- Configuring Disk Quotas
- Compressing Files and Folders
- Encrypting Files and Folders
1. Hardware
- Identifying the Principals of Personal Storage Devices and Backup Media
- Identifying Motherboard Components
- Working with Power Supplies
- Characteristics of CPUs
- Compare and Contrast Memory Types
- Cooling Methods
- Display Devices
- Input and Peripherals Devices
- Principals of Laptops and Portable Devices
- Install and configure Printers
2. Troubleshooting, Repair and Maintenance
- The Basics of Troubleshooting
- Common Hardware and Operating System Symptoms and Causes
- Common Printer Problems
- Printer Hardware Troubleshooting
- Common Laptop Issues
- Performing Preventive Maintenance
3. Troubleshooting, Repair and Maintenance
- Operating Systems and Software
- Proper Use of User Interfaces
- Configuring Windows
- Identifying Boot Sequences
4. Networking
- The Basics of networking
- Network Protocols
- Status Indicators
- Virtual Private Networks
- Bandwidth and Latency
- Network Cabling and Connectors
- Different Network Types
5. Security
- The Basic Principles of Security
- Encryption Technologies
- Authentication Technologies
- Basics of Data Sensitivity and Security
- Security Features
6. Operational Procedure
1. General Networking Theory
- The OSI Reference Model
- Networks
- Network Technologies
- Network Addressing
- The Cisco Hierarchical Model
- Routing and Switching in a Cisco Router
- The Structure of a Routing Table
- Routing Tables
- Routing Protocols
- Convergence
- Testing and Troubleshooting Routes
2. Bridging and LAN Switching Concepts
- Overview
- Switching Concepts
- VLANs
- VLAN Trunking
- VLAN Trunking Protocol (VTP)
- Port Aggregation with EtherChannel
- Cisco Discovery Protocol (CDP)
- LAN Security
3. IP
- The TCP/IP Architecture
- Internet Protocol (IP)
- IPv4 Addressing
- Private IP Addressing
- Multicast Addressing
- Services and Applications
- IP Access Lists
4. IP Routing
- Overview
- Open Shortest Path First (OSPF)
- Border Gateway Protocol (BGP)
- Enhanced Interior Gateway Routing Protocol (EIGRP)
- Policy Routing
5. Quality of Service (QoS)
6. Wide Area Networks (WANs)
7. IP Multicast
8. Security
9. MPLS
- Label Switching Router (LSR)
- Label Switched Path (LSP)
- Route Descriptor
- Label Format
- Label imposition/disposition
- Label Distribution
10. IPv6
1. Network Theory
- Discuss the standard network models
- Identify common physical network topologies
- Explain common logical network topologies and their characteristics (Peer to peer, Client/server, VPN, VLAN)
- Categorize standard cable types and their properties
- Identify common connector types (RJ-1 1, RJ-45, BNC, SC, ST, LC, RS-232, RG-59, and RG-6)
- Given a scenario, differentiate and implement appropriate wiring standards (568A, 568B, Straight vs. crossover, Rollover, Loopback)
- Install components of wiring distribution
- Verify Wiring Installation and Termination
- Install, configure, and differentiate among common network devices
- Explain the advanced features of a switch (PoE, Spanning tree, VLAN, Trunking, Port mirroring, Port authentication)
- Identify the functions of specialized network devices (Multilayer switch, Content switch IDS/IPS, Load balancer, Multifunction network devices, DNS server, Bandwidth shaper, Proxy server, CSU/DSU)
2. Explain the function of common networking protocols
- Explain the function of common networking protocols
- Transmission Control Protocol /Internet Protocol (TCP/IP) Protocol Suite
- Identify commonly used TCP and UDP default ports
3 .Network Data Delivery
- Identify the following address formats (IPv6, IPv4, MAC addressing)
- Given a scenario, evaluate the proper use of the following addressing technologies.
- Discuss the various Address Schemes
- Explain the purpose and properties of routing and identify common IPv4 and IPv6 routing protocols
4 .Network Implementation
- Discuss LAN Properties
- Differentiate between Broadband and Baseband Signaling
- Categorize LAN technology types
5 .Wireless Networking
- Implement a basic wireless network (Install client, Access point placement, Install access point, Configure appropriate encryption, Configure channels and frequencies, Set ESSID and beacon, Verify installation)
- Setting up Communication between Wireless Networks
- Beacon Management Frame
- Configuring the Wireless Connection
- Troubleshooting Wireless Signals
- Define Access Control, Authentication, Authorization, and Encryption with reference to Wireless Networks
- Discuss the security standards for Wireless Networks
- Compare the characteristics of wireless communication standards (802.1 1 a/b/g/n- Speeds, Distance, Channels and Frequency
- Compare the characteristics of wireless communication standards Wireless Radio Channels
6 .WAN Infrastructure
- Discuss the differences between a public and a private WAN
- Discuss the various Switching Methods available
- Discuss the various Switching Methods available
7 .The OSI Model
8 .Network Management
- Discuss the rationales behind network optimization
- Discuss the strategies implemented for resource optimization
9 .Network Troubleshooting
- Discuss the basics of troubleshooting
- Given a scenario, troubleshoot common connectivity issues and select an appropriate solution
10 .Networking Tools
- Given a scenario, select the appropriate command line interface tool and interpret the output to verify functionality.
- Explain the purpose of network scanners
- Describe various methods used for network protection
- Given a scenario, utilize the appropriate hardware tools
11 .Network Security
- Explain the function of hardware and software security devices
- Explain common features of firewall
- Explain the method of network access security
- What are the various tunneling and encryption protocols SSL VPN
- What are the various Remote access procedures
- Explain methods of user authentication Public Key Infrastructure (PKI)
- Discuss AAA and various protocols that provide AAA features AAA (Authentication, Authorization and Accounting)
- Discuss various point-to-point authentication protocols uses in PPP
- Explain issues that affect device security
- Describe various secure methods for accessing devices across the network Secure Socket Layer (SSH)
- Discuss various unsecure methods for accessing devices across the network Telnet
- Identify common security threats and mitigation techniques
- Describe various mitigation techniques policies and procedures
1. Security Concepts
1.1 General Security Concepts
1.2 Operational Organizational Security
- Policies, Standards, Guidelines, and Procedures
- The Security Perimeter
- Logical Access Controls
- Social Engineering
- Organizational Policies and Procedures
2. Cryptography and Applications
2.1 Cryptography
2.2 Public Key Infrastructure
- The Basics of Public Key Infrastructures
- Certificate Authorities
- Certificate Repositories
- Public Certificate Authorities
2.3 Security in Infrastructure
2.4 Security in Transmissions
2.5 Types of Attacks and Malicious Software
2.6 Protocols
2.7 Code-Based Vulnerabilities
2.8 Application-Based Weaknesses
1 Introduction to VMware vSphere 4
- What is vSphere 4?
- VMware ESX and ESXi
- VMware Virtual Symmetric Multi-Processing
- VMware vCenter Server
- vCenter Update Manager
- vSphere 4 Client
- vMotion and Storage vMotion
- High Availability
- Fault Tolerance
- Distributed Resource Scheduler
- Distributed Power Management (DPM)
- vShield Zones
- vCenter Orchestrator
- Benefits of Choosing VMware vSphere
2 Planning, Installing and Managing VMware ESX and ESXi
- Planning vSphere4 deployment
- Selecting VMware ESX or VMware ESXi
- Choosing a Server Platform
- Determining a Storage Architecture
- Integrating with the Network Infrastructure
- DeployingVMware ESX
- DeployingVMware ESXi
- Installing the vSphere Client
- Performing Post-installation Configuration
3 Install and Configure vCenter Server
- Introduction to vCenter Server
- Planning and Designing a vCenter Server Deployment
- vCenter Server Installation
- Installing vCenter Server in a Linked Mode Group
- Exploring vCenter Server
- Creating and Managing a vCenter Server Inventory
- Exploring vCenter Server's Management Features
- Managing vCenter Server Settings
- Install and Configure vCenter Update Manager
- Create and Manage Virtual Networks
- Setting up and Managing Storage Devices
1. Installing and Deploying Windows Server 2003
- System Requirements
- Installing Windows Server 2003 from the CD-Rom
- Installing Windows Server 2003 from a Network Share
- Performing an Unattended Installation
- Windows Server 2003 Licensing
- Deploying Software Applications
- The Windows Server 2003 Advanced Boot Options
- The Recovery Console
2. Managing Windows Server 2003
- Installing New Hardware
- Using Driver Signing
- Configuring Hard Disks
- Configuring File Systems
- Defragmenting Volumes and Partitions
- Backing Up and Restoring Data
- Planning System Recovery with Automated System Recovery (ASR)
- Adding Additional Hardware
3. Configuring the Windows Server 2003 Network
- Creating Network Connections
- Configuring Automatic IP Addressing
- Name Resolution
- Domain Name Space
- DNS Zones
- Name Servers
- Configuring Dynamic DNS
- Testing IP Connections
4. The Windows Server 2003 Network Infrastructure
- Directory Service Functionality
- Active Directory Support for Client Computers
- Active Directory Structure
- Domain Functional Levels
- Forest Functional Levels
- Active Directory Replication
- Administering Active Directory
- Auditing Access to Active Directory Objects
5. Microsoft Internet Information Services (IIS) 6.0
6. Routing and Remote Access Service (RRAS)
- Routing and Remote Access Service Features
- Installation and Configuration
- Connecting to RRAS
- Remote Access Security
- Securing RRAS Clients
- Virtual Private Networks (VNP)
- RRAS Tools
- Routing
7. Terminal Services
- Terminal Services Components
- Client Software and Installation
- Connecting to Terminal Services
- Administering Terminal Services
- Troubleshooting Terminal Services
8. Creating and Managing User and Computer Accounts
- Types of User Accounts
- Computer Accounts
- Creating User Accounts
- Group Accounts
- Configuring Account Policies
- Managing User Data
- Group Policy
- Managing User Environment
- Software Deployment
9. Controlling Access to Network Resources
- Access Control List
- NTFS Permissions
- Shared Folder Permissions
- Offline Files
- Combining Shared Folder Permissions and NTFS Permissions
10. Monitoring Network Resources
- Monitoring Access to Shared Folders
- Auditing
- Using Event Viewer
- Using Group Policy
- The Shutdown Event Tracker
11. Monitoring System Performance
1. The Campus Switching Network
- The Traditional Shared Campus Network
- The New Campus Network
- Switching Technologies
- Switched Campus Network Design
2. Basic Switch and Port Configuration
- Network Technologies
- Connecting Switches
- Switch Management
- Switch File Management
- Switch Port Configuration
3. Implement VLAN based solutions
4. Redundant Switch Links
- Switch Port Aggregation with EtherChannel
- Spanning-Tree Protocol (STP)
- Spanning-Tree Communication
- STP States
- STP Timers
- Convergence
- Spanning-Tree Design
- STP Types
- Spanning Tree Protocol Security Features
- Protecting Against the Sudden Loss of BPDUs
- Advanced Spanning-Tree Protocol
5. Wireless LAN
- Wireless LAN Technology Overview
- Wireless LAN Security
- Wireless Mobility
- Cisco Aironet Client Installation and Configuration
6. Implement Switch based Layer 3 services
7. Multi-Layer Switching
- Multi-Layer Switching Components
- MLS-RP Advertisements
- Configuring Multi-Layer Switching
- Flow Masks
- Configuring the MLS-SE
8. Cisco Express Forwarding (CEF)
9. Implement High Availability: HSRP
- Traditional Redundancy Methods
- Hot Standby Router Protocol (HSRP)
- HSRP Operations
- Configuring HSRP
- Troubleshooting HSRP
10. Quality of Service
11. Support for Voice and Video
12. Controlling Access in the Campus Environment
- Access Policies
- Managing Network Devices
- Access Layer Policy and Port Security
- Distribution Layer Policy
- Core Layer Policy
13. Monitoring and Troubleshooting