MCSE Server Infrastructure Courses in Cape Town
About this Course
Cisco Certified Network Associate Security (CCNA Security) validates associate-level knowledge and skills required to secure Cisco networks. With a CCNA Security certification, a network professional demonstrates the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. The CCNA Security curriculum emphasizes core security technologies, the installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices, and competency in the technologies that Cisco uses in its security structure.
Included in your course fees
Breakfast and lunch on course days
Teas and coffees
Below is the latest salary pay scale, from payscale web site, for jobs in Cape Town, on 9 March 2019.
Installing and Configuring Windows Server 2012
Module 1: Deploying and Managing Windows Server 2012
This module introduces students to the editions of Windows Server 2012 and the new Windows Server 2012 management tools. It also covers how to install Windows Server 2012, how to perform post-deployment tasks, and how to perform basic administrative tasks.
Windows Server 2012 Overview
Installing Windows Server 2012
Post-Installation Configuration of Windows Server 2012
Overview of Windows Server 2012 Management
Introduction to Windows PowerShell
Module 2: Introduction to Active Directory Domain Services
This module covers the structure of Active Directory Domain Services (AD DS) and its various components, such as forest, domain, and organizational units (OUs). It also gives an overview of domain controllers, in addition to choices that are available with Windows Server 2012 for installing AD DS on a server.
Overview of AD DS
Overview of Domain Controllers
Installing a Domain Controller
Module 3: Managing
Active Directory Domain Services Objects
This module describes how to manage user accounts and computer accounts, including how to manage various consumer devices that employees use. The module also covers how to manage an enterprise network by managing groups, and how to delegate administrative tasks to designated users or groups.
Managing User Accounts
Managing Computer Accounts
Module 4: Automating Active Directory Domain Services Administration
This module describes how to use command line tools and Windows PowerShell to automate AD DS administration. It discusses various command-line tools and Windows PowerShell commands, and then describes how to use these tools and commands to modify objects individually and in bulk operations.
Using Command-line Tools for AD DS Administration
Using Windows PowerShell for AD DS Administration
Performing Bulk Operations with Windows PowerShell
Module 5: Implementing IPv4This module discusses using IPv4, which is the network protocol used on the Internet and on local area networks
. In this module, students learn how to implement an IPv4 addressing scheme and how to troubleshoot network communication. This module also covers how to determine and troubleshoot network-related problems.
Overview of TCP/IP
Understanding IPv4 Addressing
Subnetting and Supernetting
Configuring and Troubleshooting IPv4
Module 6: Implementing Dynamic Host Configuration Protocol
This module covers supporting and troubleshooting a Windows Server-based network infrastructure by deploying, configuring, and troubleshooting the Dynamic Host Configuration Protocol (DHCP) server role.
Overview of the DHCP Server Role
Configuring DHCP Scopes
Managing a DHCP Database
Securing and Monitoring DHCP
Module 7: Implementing DNS
This module describes name resolution for Windows operating system clients and Windows Server servers. It also covers installing and configuring a DNS Server service and its components.
Name Resolution for Windows Clients and Servers
Installing a DNS Server
Managing DNS Zones
Module 8: Implementing IPv6
This module discusses the features and benefits of IPv6, how IPv6 affects IPv4 networks, and how to integrate IPv6 into IPv4 networks by using various transition technologies.
Overview of IPv6
Coexistence with IPv4
IPv6 Transition Technologies
Module 9: Implementing Local Storage
This module introduces several different storage technologies. It discusses how to implement the storage solutions in Windows Server 2012, and how to use the new Storage Spaces feature, which enables you to combine disks into pools that you can configure for automatic management.
Overview of Storage
Managing Disks and Volumes
Implementing Storage Spaces
Module 10: Implementing File and Print Services
This module discusses how to provide file and print resources with Windows Server 2012. It describes how to secure files and folders, how to protect previous versions of files and folders by using shadow copies, and how to give workers remote access to corporate files by implementing the new Work Folders role service. It also describes new network printing features that help manage the network printing environment.
Securing Files and Folders
Protecting Shared Files and Folders by Using Shadow Copies
Configuring Work Folders
Configuring Network Printing
11. Module 11: Implementing Group Policy
This module provides an overview of Group Policy and provides details about how to implement Group Policy.
Overview of Group Policy
Group Policy Processing
Implementing a Central Store for Administrative Templates
Module 12: Securing Windows Servers Using Group Policy Objects
This module describes Windows Server 2012 operating system security. It covers how to identify security threats, plan your strategy to mitigate security threats, and secure your Windows Server 2012 infrastructure.
Security Overview for Windows Operating Systems
Configuring Security Settings
Configuring Windows Firewall with Advanced Security
Module 13: Implementing Server Virtualization with Hyper-V
This module describes virtualization technologies available on Windows, specifically focusing on the Hyper-V role in Windows Server 2012 and Windows Server 2012 R2. It covers the components of the Hyper-V role, configuring and deploying the role, in addition to and how to configure and manage key components of a Hyper-V implementation, such as Storage and Networking.
Overview of Virtualization Technologies
Managing Virtual Machine Storage
Managing Virtual Networks
Administering Windows Server 2012
1. Configuring and Troubleshooting Domain Name System
This module explains how to configure and troubleshoot DNS, including DNS replication and caching.
Configuring the DNS Server Role
Configuring DNS Zones
Configuring DNS Zone Transfers
Managing and Troubleshooting DNS
2. Maintaining Active Directory Domain Services
This module explains how to implement virtualized domain controllers and read-only domain controller (RODCs). It also explains how to perform common AD DS administrative tasks and manage the AD DS Database.
Overview of AD DS
Implementing Virtualized Domain Controllers
Administering AD DS
Managing the AD DS Database
3. Managing User and Service Accounts
This module explains how to create, configure and automate the creation of user accounts. It also explains how to configure account-related properties of user objects. It further explains how to create and administer Managed Service Accounts.
Configuring Password Policy and User Account Lockout Settings
Configuring Managed Service Accounts
4. Implementing a Group Policy Infrastructure
This module explains how to implement a GPO infrastructure. This also teaches how to perform common GPO management tasks, and manage GPOs by using Windows PowerShell. It also focuses on troubleshooting the application of GPOs.
Introducing Group Policy
Implementing and Administering GPOs
Group Policy Scope and Group Policy Processing
Troubleshooting the Application of GPOs
5. Managing User Desktops with Group Policy
This module explains how you can use Group Policy Objects (GPOs) to implement desktop environments across your organization by using Administrative Templates, Folder Redirection, Group Policy preferences, and where applicable, use software deployment to install and update application programs. It is important to know how to use these various GPO features so that you can configure your users' computer settings properly.
Implementing Administrative Templates
Configuring Folder Redirection and Scripts
Configuring Group Policy Preferences
Managing Software with Group Policy
6. Installing, Configuring, and Troubleshooting the Network Policy Server Role
This module explains how to install and configure NPS, RADIUS Clients and servers. It also describes NPS authentication methods. It describe NPS authentication methods and how to monitor and troubleshoot NPS.
Installing and Configuring a Network Policy Server
Configuring RADIUS Clients and Servers
NPS Authentication Methods
Monitoring and Troubleshooting a Network Policy Server
7. Implementing Network Access Protection
This module explains how to configure, monitor, and troubleshoot NAP. It also explains how NAP can help to protect your network and the various NAP enforcement processes.
Overview of Network Access Protection
Overview of NAP Enforcement Processes
Configuring IPSec Enforcement for NAP
Monitoring and Troubleshooting NAP
8. Implementing Remote Access
In this module, you will learn how to implement and manage remote access in Windows Server 2012. You will also learn how to implement DirectAccess by using the Getting Started wizard, implement and manage an advanced DirectAccess infrastructure, and implement VPN.
Overview of Remote Access
Implementing DirectAccess by Using the Getting Started Wizard
Implementing and Managing an Advanced DirectAccess Infrastructure
Implementing Web Application Proxy
Lab : Implementing
DirectAccess by Using the Getting Started Wizard
Verifying Readiness for a DirectAccess Deployment
Validating the DirectAccess Deployment
9. Optimizing File Services
This module describes FSRM, configure quotas, file screening, and storage reports and implement classification management and file management tasks. It describes the components of the DFS. I also explains how to configure DFS namespaces and DFS replication.
Overview of FSRM
Using FSRM to Manage Quotas, File Screens, and Storage Reports
Implementing Classification and File Management Tasks
Overview of DFS
Configuring DFS Namespaces
Configuring and Troubleshooting DFS Replication
10. Configuring Encryption and Advanced Auditing
This module explains how to encrypt files using EFS and configure advanced auditing features.
Encrypting Drives by Using BitLocker
Encrypting Files by Using EFS
Configuring Advanced Auditing
11. Deploying and Maintaining Server Images
This module explains how to create and manage server images by using Windows Deployment Services
Overview of Windows Deployment Services
Implementing Deployment with Windows Deployment Services
Administering Windows Deployment Services
12. Implementing Update Management
This module explains how to use Windows Server Update Services (WSUS) to deploy updates to Windows servers and clients.
Overview of WSUS
Deploying Updates with WSUS
13. Monitoring Windows Server 2012
This module explains the monitoring tools available in Windows Server 2012. It also explains how to use Performance Monitor and monitor events.
Using Performance Monitor
Monitoring Event Logs
Configuring Advanced Windows Server 2012 Services
1. Implementing Advanced Network Services
In this module students will be able to configure advanced features for Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS), and configure IP Address Management (IPAM).
Configuring Advanced DHCP Features
Configuring Advanced DNS Settings
Managing IP Address Spaces with IPAM
2. Implementing Advanced File Services
In this module students will be able to configure file services to meet advanced business requirements.
Configuring iSCSI Storage
Optimizing Storage Usage
3. Implementing Dynamic Access Control
In this module students will be able to configure Dynamic Access Control (DAC) to manage and audit access to shared files.
Overview of DAC
Implementing DAC Components
Implementing DAC for Access Control
Implementing Access Denied Assistance
Implementing and Managing Work Folders
4. Implementing Distributed Active Directory Domain Services Deployments
In this module students will be able to plan and implement an Active Directory Domain Services (AD DS) deployment that includes multiple domains and forests.
Overview of Distributed AD DS Deployments
Deploying a Distributed AD DS Environment
Configuring AD DS Trusts
5. Implementing Active Directory Domain Services Sites and Replication
In this module students will be able to plan and implement an AD DS deployment that includes multiple locations.
AD DS Replication Overview
Configuring AD DS Sites
Configuring and Monitoring AD DS Replication
6.In this module students will be able to implement an Active Directory Certificate Services (AD CS) deployment.
Using Certificates in a Business Environment
Deploying and Managing Certificate Templates
Implementing Certificate Distribution and Revocation
Managing Certificate Recovery
7. Implementing Active Directory Rights Management Services
In this module students will be able to implement an AD RMS deployment.
AD RMS Overview
Deploying and Managing an AD RMS Infrastructure
Configuring AD RMS Content Protection
Configuring External Access to AD RMS
8. Implementing and Administering AD FS
In this module students will be able to implement an Active Directory Federation Services (AD FS) deployment.
Overview of AD FS
Deploying AD FS
Implementing AD FS for a Single Organization
Deploying AD FS in a Business-to-Business Federation Scenario
Extending AD FS to External Clients
9. Implementing Network Load Balancing
In this module students will be able to provide high availability and load balancing for web-based applications by implementing Network Load Balancing (NLB).
Overview of NLB
Configuring an NLB Cluster
Planning an NLB Implementation
10. Implementing Failover Clustering
In this module students will be able to provide high availability for network services and applications by implementing failover clustering.
Overview of Failover Clustering
Implementing a Failover Cluster
Configuring Highly Available Applications and Services on a Failover Cluster
Maintaining a Failover Cluster
Implementing a Multi-Site Failover Cluster
11. Implementing Failover Clustering with Hyper-V
In this module students will be able to deploy and manage Hyper-V virtual machines in a failover cluster.
Overview of Integrating Hyper-V with Failover Clustering
Implementing Hyper-V Virtual Machines on Failover Clusters
Implementing Hyper-V Virtual Machine Movement
12. Implementing Business Continuity and Disaster Recovery
In this module students will be able to implement a backup and disaster recovery solution based on business and technical requirements
Data Protection Overview
Implementing Windows Server Backup
Implementing Server and Data Recovery
Designing and Implementing a Server Infrastructure
1.Planning Server Upgrade and Migration
This module explains how to plan a server upgrade and migration strategy.
Considerations for Upgrades and Migrations
Creating a Server Upgrade and Migration Plan
Planning for Virtualization
2. Planning and Implementing a Server Deployment Strategy
This module explains how to design an automated server installation strategy and plan and implement a server deployment infrastructure.
Selecting an Appropriate Server Deployment Strategy
Implementing an Automated Deployment Strategy
3.Planning and Deploying Servers Using Virtual Machine Manager
This module explains how to plan and deploy a Virtual Machine Manager (VMM) infrastructure for deploying servers.
System Center 2012 R2 Virtual Machine Manager Overview
Implementing a Virtual Machine Manager Library and Profiles
Planning and Deploying Virtual Machine Manager Services
4.Designing and Maintaining an IP Configuration and Address Management Solution
This module explains how to design and maintain IP address management (IPAM) and a Dynamic Host Configuration Protocol (DHCP) solution.
Designing DHCP Servers
Planning DHCP Scopes
Designing an IPAM Provisioning Strategy
Managing Servers and Address Spaces by Using IPAM
5.Designing and Implementing Name Resolution
This module explains how to design a name resolution strategy.
Designing a DNS Server Implementation Strategy
Designing the DNS Namespace
Designing DNS Zones
Designing DNS Zone Replication and Delegation
Optimizing DNS Servers
Designing DNS for High Availability and Security
Implementing an Active Directory Domain Services Forest and Domain
This module explains how to design and implement an AD DS forest and domain infrastructure.
Designing an Active Directory Forest
Designing and Implementing Active Directory Forest Trusts
Designing Active Directory Integration with Windows Azure Active Directory
Designing and Implementing Active Directory Domains
Designing DNS Namespaces in Active Directory Environments
Designing Active Directory Domain Trusts
7. Designing and Implementing an AD DS Organizational Unit Infrastructure
This module explains how to design and implement an OU infrastructure and an AD DS permissions model.
Planning the Active Directory Administrative Tasks Delegation Model
Designing an OU Structure
Designing and Implementing an AD DS Group Strategy
8. Designing and Implementing a Group Policy Object Strategy
This module explains how to design and implement a Group Policy Object (GPO) strategy.
Collecting the Information Required for a GPO Design
Designing and Implementing GPOs
Designing GPO Processing
Planning Group Policy Management
9. Designing and Implementing an AD DS Physical Topology
This module explains how to design an AD DS sites topology and a domain controller placement strategy.
Designing and Implementing Active Directory Sites
Designing Active Directory Replication
Designing the Placement of Domain Controllers
Virtualization Considerations for Domain Controllers
Designing Highly Available Domain Controllers
10. Planning and Implementing Storage and File Services
This module explains how to plan and implement storage and file services.
Planning and Implementing iSCSI SANs
Planning and Implementing Storage Spaces
Optimizing File Services for Branch Offices
11. Designing and Implementing Network Protection
This module explains how to design and implement network protection.
Overview of Network Security Design
Designing and Implementing a Windows Firewall Strategy
Designing and Implementing a NAP Infrastructure
12. Designing and Implementing Remote Access Services
This module explains how to design and implement remote access services.
Planning and Implementing DirectAccess
Planning and Implementing VPN
Planning and Implementing Web Application Proxy
Implementing an Advanced Server Infrastructure
1. Overview of Management in an Enterprise Data Center
In this module, students will be able to describe the enterprise data center and how to use System Center 2012 to manage the enterprise data center.
Overview of the Enterprise Data Center
Overview of the Microsoft System Center 2012 R2 Components
2. Planning and Implementing a Server Virtualization Strategy
In this module, students will be able to plan and implement a server virtualization strategy using System Center 2012.
Planning a VMM Deployment
Planning and Implementing a Server Virtualization Host Environment
3. Planning and Implementing Networks and Storage for Virtualization
In this module, students will be able to plan and implement the network and storage infrastructure required to deploy a virtualized server infrastructure.
Planning a Storage Infrastructure for Virtualization
Implementing a Storage Infrastructure for Virtualization
Planning and Implementing a Network Infrastructure for Virtualization
Planning and Implementing Network Virtualization
4. Planning and Deploying Virtual Machines
In this module, students will be able to plan and deploy virtual machines on Windows Hyper-V.
Planning a Virtual Machine Configuration
Preparing for Virtual Machine Deployments with VMM
Deploying Virtual Machines
Planning and Implementing Hyper-V Replica
5. Planning and Implementing a Virtualization Administration Solution
In this module, students will be able to plan and implement a virtualization administration solution by using System Center 2012.
Planning and Implementing Automation with System Center 2012
Planning and Implementing System Center 2012 Administration
Planning and Implementing Self-Service Options in System Center 2012
Planning and Implementing Updates in a Server Virtualization Infrastructure
6. Planning and Implementing a Server Monitoring Strategy
In this module, students will be able to plan and implement a server monitoring strategy using the Windows Server 2012 tools and using Operations Manager.
Planning Monitoring in Windows Server 2012
Overview of Operations Manager
Planning and Configuring Monitoring Components
Configuring Integration with VMM
7. Planning and Implementing High Availability for File Services and Applications
In this module, students will be able to plan and implement an application and file services infrastructure that is highly available.
Planning and Implementing Storage Spaces
Planning and Implementing a DFS
Planning and Implementing NLB
8. Planning and Implementing a High Availability Infrastructure Using Failover Clustering
In this module, students will be able to plan and implement a high availability server infrastructure by using the failover clustering features in Windows Server 2012.
Planning an Infrastructure for Failover Clustering
Implementing Failover Clustering
Planning and Implementing Updates for Failover Clusters
Integrating Failover Clustering with Server Virtualization
Planning a Multisite Failover Cluster
9. Planning and Implementing a Business Continuity Strategy
In this module, students will be able to plan and implement a business continuity strategy in a Windows Server 2012 environment.
Overview of Business Continuity Planning
Planning and Implementing Backup Strategies
Planning and Implementing Recovery
Planning and Implementing Backup and Recovery of Virtual Machines
10. Planning and Implementing an Public Key Infrastructure
In this Module, students will be able to plan and implement a PKI deployment, and plan and implement a certificate management solution.
Planning and Implementing Deployment of a Certification Authority
Planning and Implementing Certificate Templates
Planning and Implementing Certificate Distribution and Revocation
Planning and Implementing Key Archival and Recovery
11. Planning and Implementing an Identity Federation Infrastructure
In this module, students will be able to plan and implement an AD FS server deployment and claims aware application access.
Planning and Implementing an AD FS Server Infrastructure
Planning and Implementing AD FS Claim Providers and Relying Parties
Planning and Implementing AD FS Claims and Claim Rules
Planning and Implementing Web Application Proxy
12. Planning and Implementing Data Access for Users and Devices
In this module, students will be able to plan and implement Dynamic Access Control (DAC), Workplace Join and Work Folders.
Planning and Implementing DAC
Planning Workplace Join
Planning Work Folders
Validating and Remediating DAC
13. Planning and Implementing an Information Rights Management Infrastructure
In this module, students will be able to plan and implement an AD RMS deployment, plan and manage AD RMS templates and access, and plan and implement external access to AD RMS services.
AD RMS Overview
Planning and Implementing an AD RMS Cluster
Planning and Implementing AD RMS Templates and Policies
Planning and Implementing External Access to AD RMS Services
Planning and Implementing AD RMS Integration with Dynamic Access Control
2KO is an IT consulting and training company, offering both business services and multi-platform training. 2KO Africa's wide range of computer courses are available as full time classes, or as online learning, enabling 2KO students the opportunity to study courses online world-wide, to ensure students have access to the best training possible.