Top 50 Practice Exams

Name Exam Posted
Show next 20 exams

MCSE
Microsoft MCSE: Installing, Configuring, and Administering Microsoft Windows XP Professional

1. Installing and Deploying Windows XP Professional

  1. Installing Windows XP Professional
  2. The Windows XP Professional Boot Process
  3. The Registry
  4. The Boot.ini File

2. Configuring Windows XP Professional

  1. Configuring Hardware Profiles
  2. Installing New Hardware
  3. Using Driver Signing
  4. Configuring Display Settings
  5. Configuring System Settings
  6. Configuring the Desktop Environment
  7. Configuring Accessibility Options
  8. Configuring Hard Disks
  9. Configuring Power Management on Portable Computers

3. Configuring the Network

  1. Creating Network Connections
  2. IP Addressing
  3. Name Resolution
  4. Enabling and Configuring Internet Connection Firewall
  5. Enabling Internet Connection Sharing
  6. Enabling and Configuring Network Bridge
  7. Using the Network Setup Wizard
  8. Connecting to a Novell NetWare Network
  9. Connecting to a UNIX Network

4. Setting up and Managing User Accounts

  1. Types of User Accounts
  2. Creating User Accounts
  3. Configuring Account Policies
  4. Managing Users and User Accounts
  5. Managing Users by Using Groups

5. Network Printing

  1. Setting Up Client Computers
  2. Setting Up a Printer Pool
  3. Setting Printer Priorities
  4. Novell and UNIX Printers

6. Controlling Access to Network Resources

  1. Shared Files and Folders
  2. Offline Files

7. Controlling Access to Network Resources

  1. Access Control List
  2. NTFS Permissions

8. Monitoring Resources and Performance

  1. Monitoring Applications
  2. Monitoring Processes
  3. Monitoring System Performance
  4. Monitoring Network Connectivity
  5. Monitoring Event Logs
  6. Audit Policies
  7. Archiving Logs
  8. Monitoring Access to Shared Folders

9. Practice Labs

  1. Converting a Hard Drive to NTFS
  2. Configuring Dual Boot Options
  3. Supporting Printing for UNIX Clients
  4. Setting Printer Priorities
  5. Installing New Hardware Devices
  6. Working with Device Drivers
  7. Creating New User Accounts
  8. Creating User Groups
  9. Configuring Disk Quotas
  10. Compressing Files and Folders
  11. Encrypting Files and Folders
Network+
CompTIA Network+ N10-004

1. Network Theory

  1. Discuss the standard network models
  2. Identify common physical network topologies
  3. Explain common logical network topologies and their characteristics (Peer to peer, Client/server, VPN, VLAN)
  4. Categorize standard cable types and their properties
  5. Identify common connector types (RJ-1 1, RJ-45, BNC, SC, ST, LC, RS-232, RG-59, and RG-6)
  6. Given a scenario, differentiate and implement appropriate wiring standards (568A, 568B, Straight vs. crossover, Rollover, Loopback)
  7. Install components of wiring distribution
  8. Verify Wiring Installation and Termination
  9. Install, configure, and differentiate among common network devices
  10. Explain the advanced features of a switch (PoE, Spanning tree, VLAN, Trunking, Port mirroring, Port authentication)
  11. Identify the functions of specialized network devices (Multilayer switch, Content switch IDS/IPS, Load balancer, Multifunction network devices, DNS server, Bandwidth shaper, Proxy server, CSU/DSU)

2. Explain the function of common networking protocols

  1. Explain the function of common networking protocols
  2. Transmission Control Protocol /Internet Protocol (TCP/IP) Protocol Suite
  3. Identify commonly used TCP and UDP default ports

3 .Network Data Delivery

  1. Identify the following address formats (IPv6, IPv4, MAC addressing)
  2. Given a scenario, evaluate the proper use of the following addressing technologies.
  3. Discuss the various Address Schemes
  4. Explain the purpose and properties of routing and identify common IPv4 and IPv6 routing protocols

4 .Network Implementation

  1. Discuss LAN Properties
  2. Differentiate between Broadband and Baseband Signaling
  3. Categorize LAN technology types

5 .Wireless Networking

  1. Implement a basic wireless network (Install client, Access point placement, Install access point, Configure appropriate encryption, Configure channels and frequencies, Set ESSID and beacon, Verify installation)
  2. Setting up Communication between Wireless Networks
  3. Beacon Management Frame
  4. Configuring the Wireless Connection
  5. Troubleshooting Wireless Signals
  6. Define Access Control, Authentication, Authorization, and Encryption with reference to Wireless Networks
  7. Discuss the security standards for Wireless Networks
  8. Compare the characteristics of wireless communication standards (802.1 1 a/b/g/n- Speeds, Distance, Channels and Frequency
  9. Compare the characteristics of wireless communication standards Wireless Radio Channels

6 .WAN Infrastructure

  1. Discuss the differences between a public and a private WAN
  2. Discuss the various Switching Methods available
  3. Discuss the various Switching Methods available

7 .The OSI Model

  1. Explain the function of each layer of the OSI model

8 .Network Management

  1. Discuss the rationales behind network optimization
  2. Discuss the strategies implemented for resource optimization

9 .Network Troubleshooting

  1. Discuss the basics of troubleshooting
  2. Given a scenario, troubleshoot common connectivity issues and select an appropriate solution

10 .Networking Tools

  1. Given a scenario, select the appropriate command line interface tool and interpret the output to verify functionality.
  2. Explain the purpose of network scanners
  3. Describe various methods used for network protection
  4. Given a scenario, utilize the appropriate hardware tools

11 .Network Security

  1. Explain the function of hardware and software security devices
  2. Explain common features of firewall
  3. Explain the method of network access security
  4. What are the various tunneling and encryption protocols SSL VPN
  5. What are the various Remote access procedures
  6. Explain methods of user authentication Public Key Infrastructure (PKI)
  7. Discuss AAA and various protocols that provide AAA features AAA (Authentication, Authorization and Accounting)
  8. Discuss various point-to-point authentication protocols uses in PPP
  9. Explain issues that affect device security
  10. Describe various secure methods for accessing devices across the network Secure Socket Layer (SSH)
  11. Discuss various unsecure methods for accessing devices across the network Telnet
  12. Identify common security threats and mitigation techniques
  13. Describe various mitigation techniques policies and procedures
A+
Managing and Maintaining a Microsoft Windows Server 2003

1. Installing and Deploying Windows Server 2003

  1. System Requirements
  2. Installing Windows Server 2003 from the CD-Rom
  3. Installing Windows Server 2003 from a Network Share
  4. Performing an Unattended Installation
  5. Windows Server 2003 Licensing
  6. Deploying Software Applications
  7. The Windows Server 2003 Advanced Boot Options
  8. The Recovery Console

2. Managing Windows Server 2003

  1. Installing New Hardware
  2. Using Driver Signing
  3. Configuring Hard Disks
  4. Configuring File Systems
  5. Defragmenting Volumes and Partitions
  6. Backing Up and Restoring Data
  7. Planning System Recovery with Automated System Recovery (ASR)
  8. Adding Additional Hardware

3. Configuring the Windows Server 2003 Network

  1. Creating Network Connections
  2. Configuring Automatic IP Addressing
  3. Name Resolution
  4. Domain Name Space
  5. DNS Zones
  6. Name Servers
  7. Configuring Dynamic DNS
  8. Testing IP Connections

4. The Windows Server 2003 Network Infrastructure

  1. Directory Service Functionality
  2. Active Directory Support for Client Computers
  3. Active Directory Structure
  4. Domain Functional Levels
  5. Forest Functional Levels
  6. Active Directory Replication
  7. Administering Active Directory
  8. Auditing Access to Active Directory Objects

5. Microsoft Internet Information Services (IIS) 6.0

  1. Installing IIS 6.0
  2. Managing IIS 6.0
  3. Security
  4. Managing Websites

6. Routing and Remote Access Service (RRAS)

  1. Routing and Remote Access Service Features
  2. Installation and Configuration
  3. Connecting to RRAS
  4. Remote Access Security
  5. Securing RRAS Clients
  6. Virtual Private Networks (VNP)
  7. RRAS Tools
  8. Routing

7. Terminal Services

  1. Terminal Services Components
  2. Client Software and Installation
  3. Connecting to Terminal Services
  4. Administering Terminal Services
  5. Troubleshooting Terminal Services

8. Creating and Managing User and Computer Accounts

  1. Types of User Accounts
  2. Computer Accounts
  3. Creating User Accounts
  4. Group Accounts
  5. Configuring Account Policies
  6. Managing User Data
  7. Group Policy
  8. Managing User Environment
  9. Software Deployment

9. Controlling Access to Network Resources

  1. Access Control List
  2. NTFS Permissions
  3. Shared Folder Permissions
  4. Offline Files
  5. Combining Shared Folder Permissions and NTFS Permissions

10. Monitoring Network Resources

  1. Monitoring Access to Shared Folders
  2. Auditing
  3. Using Event Viewer
  4. Using Group Policy
  5. The Shutdown Event Tracker

11. Monitoring System Performance

  1. The System Monitor
  2. Task Manager
  3. Command-Line Monitoring Tools
CCDP
Cisco CCDP 642-813

1. The Campus Switching Network

  1. The Traditional Shared Campus Network
  2. The New Campus Network
  3. Switching Technologies
  4. Switched Campus Network Design

2. Basic Switch and Port Configuration

  1. Network Technologies
  2. Connecting Switches
  3. Switch Management
  4. Switch File Management
  5. Switch Port Configuration

3. Implement VLAN based solutions

  1. VLAN Membership
  2. Extent of VLANs
  3. VLAN Trunks
  4. Service Provider Tunneling
  5. VLAN Trunking Protocol (VTP)

4. Redundant Switch Links

  1. Switch Port Aggregation with EtherChannel
  2. Spanning-Tree Protocol (STP)
  3. Spanning-Tree Communication
  4. STP States
  5. STP Timers
  6. Convergence
  7. Spanning-Tree Design
  8. STP Types
  9. Spanning Tree Protocol Security Features
  10. Protecting Against the Sudden Loss of BPDUs
  11. Advanced Spanning-Tree Protocol

5. Wireless LAN

  1. Wireless LAN Technology Overview
  2. Wireless LAN Security
  3. Wireless Mobility
  4. Cisco Aironet Client Installation and Configuration

6. Implement Switch based Layer 3 services

  1. InterVLAN Routing Design
  2. Routing with an Integrated Router
  3. InterVLAN Routing Configuration

7. Multi-Layer Switching

  1. Multi-Layer Switching Components
  2. MLS-RP Advertisements
  3. Configuring Multi-Layer Switching
  4. Flow Masks
  5. Configuring the MLS-SE

8. Cisco Express Forwarding (CEF)

  1. CEF Components
  2. CEF Operation Modes
  3. Configuring Cisco Express Forwarding

9. Implement High Availability: HSRP

  1. Traditional Redundancy Methods
  2. Hot Standby Router Protocol (HSRP)
  3. HSRP Operations
  4. Configuring HSRP
  5. Troubleshooting HSRP

10. Quality of Service

  1. Understanding the Need for Quality of Service
  2. QoS Types
  3. Differentiated Services QoS
  4. Configuring QoS

11. Support for Voice and Video

  1. VOIP Befefits
  2. Inline Power
  3. Voice VLANs
  4. Voice QoS
  5. VOIP Verification

12. Controlling Access in the Campus Environment

  1. Access Policies
  2. Managing Network Devices
  3. Access Layer Policy and Port Security
  4. Distribution Layer Policy
  5. Core Layer Policy

13. Monitoring and Troubleshooting

  1. Monitoring Cisco Switches
  2. General Troubleshooting Model

MCSE
Microsoft MCSE: Installing, Configuring, and Administering Microsoft Windows XP Professional

1. Installing and Deploying Windows XP Professional

  1. Installing Windows XP Professional
  2. The Windows XP Professional Boot Process
  3. The Registry
  4. The Boot.ini File

2. Configuring Windows XP Professional

  1. Configuring Hardware Profiles
  2. Installing New Hardware
  3. Using Driver Signing
  4. Configuring Display Settings
  5. Configuring System Settings
  6. Configuring the Desktop Environment
  7. Configuring Accessibility Options
  8. Configuring Hard Disks
  9. Configuring Power Management on Portable Computers

3. Configuring the Network

  1. Creating Network Connections
  2. IP Addressing
  3. Name Resolution
  4. Enabling and Configuring Internet Connection Firewall
  5. Enabling Internet Connection Sharing
  6. Enabling and Configuring Network Bridge
  7. Using the Network Setup Wizard
  8. Connecting to a Novell NetWare Network
  9. Connecting to a UNIX Network

4. Setting up and Managing User Accounts

  1. Types of User Accounts
  2. Creating User Accounts
  3. Configuring Account Policies
  4. Managing Users and User Accounts
  5. Managing Users by Using Groups

5. Network Printing

  1. Setting Up Client Computers
  2. Setting Up a Printer Pool
  3. Setting Printer Priorities
  4. Novell and UNIX Printers

6. Controlling Access to Network Resources

  1. Shared Files and Folders
  2. Offline Files

7. Controlling Access to Network Resources

  1. Access Control List
  2. NTFS Permissions

8. Monitoring Resources and Performance

  1. Monitoring Applications
  2. Monitoring Processes
  3. Monitoring System Performance
  4. Monitoring Network Connectivity
  5. Monitoring Event Logs
  6. Audit Policies
  7. Archiving Logs
  8. Monitoring Access to Shared Folders

9. Practice Labs

  1. Converting a Hard Drive to NTFS
  2. Configuring Dual Boot Options
  3. Supporting Printing for UNIX Clients
  4. Setting Printer Priorities
  5. Installing New Hardware Devices
  6. Working with Device Drivers
  7. Creating New User Accounts
  8. Creating User Groups
  9. Configuring Disk Quotas
  10. Compressing Files and Folders
  11. Encrypting Files and Folders
Network+
CompTIA Network+ N10-004

1. Network Theory

  1. Discuss the standard network models
  2. Identify common physical network topologies
  3. Explain common logical network topologies and their characteristics (Peer to peer, Client/server, VPN, VLAN)
  4. Categorize standard cable types and their properties
  5. Identify common connector types (RJ-1 1, RJ-45, BNC, SC, ST, LC, RS-232, RG-59, and RG-6)
  6. Given a scenario, differentiate and implement appropriate wiring standards (568A, 568B, Straight vs. crossover, Rollover, Loopback)
  7. Install components of wiring distribution
  8. Verify Wiring Installation and Termination
  9. Install, configure, and differentiate among common network devices
  10. Explain the advanced features of a switch (PoE, Spanning tree, VLAN, Trunking, Port mirroring, Port authentication)
  11. Identify the functions of specialized network devices (Multilayer switch, Content switch IDS/IPS, Load balancer, Multifunction network devices, DNS server, Bandwidth shaper, Proxy server, CSU/DSU)

2. Explain the function of common networking protocols

  1. Explain the function of common networking protocols
  2. Transmission Control Protocol /Internet Protocol (TCP/IP) Protocol Suite
  3. Identify commonly used TCP and UDP default ports

3 .Network Data Delivery

  1. Identify the following address formats (IPv6, IPv4, MAC addressing)
  2. Given a scenario, evaluate the proper use of the following addressing technologies.
  3. Discuss the various Address Schemes
  4. Explain the purpose and properties of routing and identify common IPv4 and IPv6 routing protocols

4 .Network Implementation

  1. Discuss LAN Properties
  2. Differentiate between Broadband and Baseband Signaling
  3. Categorize LAN technology types

5 .Wireless Networking

  1. Implement a basic wireless network (Install client, Access point placement, Install access point, Configure appropriate encryption, Configure channels and frequencies, Set ESSID and beacon, Verify installation)
  2. Setting up Communication between Wireless Networks
  3. Beacon Management Frame
  4. Configuring the Wireless Connection
  5. Troubleshooting Wireless Signals
  6. Define Access Control, Authentication, Authorization, and Encryption with reference to Wireless Networks
  7. Discuss the security standards for Wireless Networks
  8. Compare the characteristics of wireless communication standards (802.1 1 a/b/g/n- Speeds, Distance, Channels and Frequency
  9. Compare the characteristics of wireless communication standards Wireless Radio Channels

6 .WAN Infrastructure

  1. Discuss the differences between a public and a private WAN
  2. Discuss the various Switching Methods available
  3. Discuss the various Switching Methods available

7 .The OSI Model

  1. Explain the function of each layer of the OSI model

8 .Network Management

  1. Discuss the rationales behind network optimization
  2. Discuss the strategies implemented for resource optimization

9 .Network Troubleshooting

  1. Discuss the basics of troubleshooting
  2. Given a scenario, troubleshoot common connectivity issues and select an appropriate solution

10 .Networking Tools

  1. Given a scenario, select the appropriate command line interface tool and interpret the output to verify functionality.
  2. Explain the purpose of network scanners
  3. Describe various methods used for network protection
  4. Given a scenario, utilize the appropriate hardware tools

11 .Network Security

  1. Explain the function of hardware and software security devices
  2. Explain common features of firewall
  3. Explain the method of network access security
  4. What are the various tunneling and encryption protocols SSL VPN
  5. What are the various Remote access procedures
  6. Explain methods of user authentication Public Key Infrastructure (PKI)
  7. Discuss AAA and various protocols that provide AAA features AAA (Authentication, Authorization and Accounting)
  8. Discuss various point-to-point authentication protocols uses in PPP
  9. Explain issues that affect device security
  10. Describe various secure methods for accessing devices across the network Secure Socket Layer (SSH)
  11. Discuss various unsecure methods for accessing devices across the network Telnet
  12. Identify common security threats and mitigation techniques
  13. Describe various mitigation techniques policies and procedures
A+
Managing and Maintaining a Microsoft Windows Server 2003

1. Installing and Deploying Windows Server 2003

  1. System Requirements
  2. Installing Windows Server 2003 from the CD-Rom
  3. Installing Windows Server 2003 from a Network Share
  4. Performing an Unattended Installation
  5. Windows Server 2003 Licensing
  6. Deploying Software Applications
  7. The Windows Server 2003 Advanced Boot Options
  8. The Recovery Console

2. Managing Windows Server 2003

  1. Installing New Hardware
  2. Using Driver Signing
  3. Configuring Hard Disks
  4. Configuring File Systems
  5. Defragmenting Volumes and Partitions
  6. Backing Up and Restoring Data
  7. Planning System Recovery with Automated System Recovery (ASR)
  8. Adding Additional Hardware

3. Configuring the Windows Server 2003 Network

  1. Creating Network Connections
  2. Configuring Automatic IP Addressing
  3. Name Resolution
  4. Domain Name Space
  5. DNS Zones
  6. Name Servers
  7. Configuring Dynamic DNS
  8. Testing IP Connections

4. The Windows Server 2003 Network Infrastructure

  1. Directory Service Functionality
  2. Active Directory Support for Client Computers
  3. Active Directory Structure
  4. Domain Functional Levels
  5. Forest Functional Levels
  6. Active Directory Replication
  7. Administering Active Directory
  8. Auditing Access to Active Directory Objects

5. Microsoft Internet Information Services (IIS) 6.0

  1. Installing IIS 6.0
  2. Managing IIS 6.0
  3. Security
  4. Managing Websites

6. Routing and Remote Access Service (RRAS)

  1. Routing and Remote Access Service Features
  2. Installation and Configuration
  3. Connecting to RRAS
  4. Remote Access Security
  5. Securing RRAS Clients
  6. Virtual Private Networks (VNP)
  7. RRAS Tools
  8. Routing

7. Terminal Services

  1. Terminal Services Components
  2. Client Software and Installation
  3. Connecting to Terminal Services
  4. Administering Terminal Services
  5. Troubleshooting Terminal Services

8. Creating and Managing User and Computer Accounts

  1. Types of User Accounts
  2. Computer Accounts
  3. Creating User Accounts
  4. Group Accounts
  5. Configuring Account Policies
  6. Managing User Data
  7. Group Policy
  8. Managing User Environment
  9. Software Deployment

9. Controlling Access to Network Resources

  1. Access Control List
  2. NTFS Permissions
  3. Shared Folder Permissions
  4. Offline Files
  5. Combining Shared Folder Permissions and NTFS Permissions

10. Monitoring Network Resources

  1. Monitoring Access to Shared Folders
  2. Auditing
  3. Using Event Viewer
  4. Using Group Policy
  5. The Shutdown Event Tracker

11. Monitoring System Performance

  1. The System Monitor
  2. Task Manager
  3. Command-Line Monitoring Tools
CCDP
Cisco CCDP 642-813

1. The Campus Switching Network

  1. The Traditional Shared Campus Network
  2. The New Campus Network
  3. Switching Technologies
  4. Switched Campus Network Design

2. Basic Switch and Port Configuration

  1. Network Technologies
  2. Connecting Switches
  3. Switch Management
  4. Switch File Management
  5. Switch Port Configuration

3. Implement VLAN based solutions

  1. VLAN Membership
  2. Extent of VLANs
  3. VLAN Trunks
  4. Service Provider Tunneling
  5. VLAN Trunking Protocol (VTP)

4. Redundant Switch Links

  1. Switch Port Aggregation with EtherChannel
  2. Spanning-Tree Protocol (STP)
  3. Spanning-Tree Communication
  4. STP States
  5. STP Timers
  6. Convergence
  7. Spanning-Tree Design
  8. STP Types
  9. Spanning Tree Protocol Security Features
  10. Protecting Against the Sudden Loss of BPDUs
  11. Advanced Spanning-Tree Protocol

5. Wireless LAN

  1. Wireless LAN Technology Overview
  2. Wireless LAN Security
  3. Wireless Mobility
  4. Cisco Aironet Client Installation and Configuration

6. Implement Switch based Layer 3 services

  1. InterVLAN Routing Design
  2. Routing with an Integrated Router
  3. InterVLAN Routing Configuration

7. Multi-Layer Switching

  1. Multi-Layer Switching Components
  2. MLS-RP Advertisements
  3. Configuring Multi-Layer Switching
  4. Flow Masks
  5. Configuring the MLS-SE

8. Cisco Express Forwarding (CEF)

  1. CEF Components
  2. CEF Operation Modes
  3. Configuring Cisco Express Forwarding

9. Implement High Availability: HSRP

  1. Traditional Redundancy Methods
  2. Hot Standby Router Protocol (HSRP)
  3. HSRP Operations
  4. Configuring HSRP
  5. Troubleshooting HSRP

10. Quality of Service

  1. Understanding the Need for Quality of Service
  2. QoS Types
  3. Differentiated Services QoS
  4. Configuring QoS

11. Support for Voice and Video

  1. VOIP Befefits
  2. Inline Power
  3. Voice VLANs
  4. Voice QoS
  5. VOIP Verification

12. Controlling Access in the Campus Environment

  1. Access Policies
  2. Managing Network Devices
  3. Access Layer Policy and Port Security
  4. Distribution Layer Policy
  5. Core Layer Policy

13. Monitoring and Troubleshooting

  1. Monitoring Cisco Switches
  2. General Troubleshooting Model

MCSE
Microsoft MCSE: Installing, Configuring, and Administering Microsoft Windows XP Professional

1. Installing and Deploying Windows XP Professional

  1. Installing Windows XP Professional
  2. The Windows XP Professional Boot Process
  3. The Registry
  4. The Boot.ini File

2. Configuring Windows XP Professional

  1. Configuring Hardware Profiles
  2. Installing New Hardware
  3. Using Driver Signing
  4. Configuring Display Settings
  5. Configuring System Settings
  6. Configuring the Desktop Environment
  7. Configuring Accessibility Options
  8. Configuring Hard Disks
  9. Configuring Power Management on Portable Computers

3. Configuring the Network

  1. Creating Network Connections
  2. IP Addressing
  3. Name Resolution
  4. Enabling and Configuring Internet Connection Firewall
  5. Enabling Internet Connection Sharing
  6. Enabling and Configuring Network Bridge
  7. Using the Network Setup Wizard
  8. Connecting to a Novell NetWare Network
  9. Connecting to a UNIX Network

4. Setting up and Managing User Accounts

  1. Types of User Accounts
  2. Creating User Accounts
  3. Configuring Account Policies
  4. Managing Users and User Accounts
  5. Managing Users by Using Groups

5. Network Printing

  1. Setting Up Client Computers
  2. Setting Up a Printer Pool
  3. Setting Printer Priorities
  4. Novell and UNIX Printers

6. Controlling Access to Network Resources

  1. Shared Files and Folders
  2. Offline Files

7. Controlling Access to Network Resources

  1. Access Control List
  2. NTFS Permissions

8. Monitoring Resources and Performance

  1. Monitoring Applications
  2. Monitoring Processes
  3. Monitoring System Performance
  4. Monitoring Network Connectivity
  5. Monitoring Event Logs
  6. Audit Policies
  7. Archiving Logs
  8. Monitoring Access to Shared Folders

9. Practice Labs

  1. Converting a Hard Drive to NTFS
  2. Configuring Dual Boot Options
  3. Supporting Printing for UNIX Clients
  4. Setting Printer Priorities
  5. Installing New Hardware Devices
  6. Working with Device Drivers
  7. Creating New User Accounts
  8. Creating User Groups
  9. Configuring Disk Quotas
  10. Compressing Files and Folders
  11. Encrypting Files and Folders
Network+
CompTIA Network+ N10-004

1. Network Theory

  1. Discuss the standard network models
  2. Identify common physical network topologies
  3. Explain common logical network topologies and their characteristics (Peer to peer, Client/server, VPN, VLAN)
  4. Categorize standard cable types and their properties
  5. Identify common connector types (RJ-1 1, RJ-45, BNC, SC, ST, LC, RS-232, RG-59, and RG-6)
  6. Given a scenario, differentiate and implement appropriate wiring standards (568A, 568B, Straight vs. crossover, Rollover, Loopback)
  7. Install components of wiring distribution
  8. Verify Wiring Installation and Termination
  9. Install, configure, and differentiate among common network devices
  10. Explain the advanced features of a switch (PoE, Spanning tree, VLAN, Trunking, Port mirroring, Port authentication)
  11. Identify the functions of specialized network devices (Multilayer switch, Content switch IDS/IPS, Load balancer, Multifunction network devices, DNS server, Bandwidth shaper, Proxy server, CSU/DSU)

2. Explain the function of common networking protocols

  1. Explain the function of common networking protocols
  2. Transmission Control Protocol /Internet Protocol (TCP/IP) Protocol Suite
  3. Identify commonly used TCP and UDP default ports

3 .Network Data Delivery

  1. Identify the following address formats (IPv6, IPv4, MAC addressing)
  2. Given a scenario, evaluate the proper use of the following addressing technologies.
  3. Discuss the various Address Schemes
  4. Explain the purpose and properties of routing and identify common IPv4 and IPv6 routing protocols

4 .Network Implementation

  1. Discuss LAN Properties
  2. Differentiate between Broadband and Baseband Signaling
  3. Categorize LAN technology types

5 .Wireless Networking

  1. Implement a basic wireless network (Install client, Access point placement, Install access point, Configure appropriate encryption, Configure channels and frequencies, Set ESSID and beacon, Verify installation)
  2. Setting up Communication between Wireless Networks
  3. Beacon Management Frame
  4. Configuring the Wireless Connection
  5. Troubleshooting Wireless Signals
  6. Define Access Control, Authentication, Authorization, and Encryption with reference to Wireless Networks
  7. Discuss the security standards for Wireless Networks
  8. Compare the characteristics of wireless communication standards (802.1 1 a/b/g/n- Speeds, Distance, Channels and Frequency
  9. Compare the characteristics of wireless communication standards Wireless Radio Channels

6 .WAN Infrastructure

  1. Discuss the differences between a public and a private WAN
  2. Discuss the various Switching Methods available
  3. Discuss the various Switching Methods available

7 .The OSI Model

  1. Explain the function of each layer of the OSI model

8 .Network Management

  1. Discuss the rationales behind network optimization
  2. Discuss the strategies implemented for resource optimization

9 .Network Troubleshooting

  1. Discuss the basics of troubleshooting
  2. Given a scenario, troubleshoot common connectivity issues and select an appropriate solution

10 .Networking Tools

  1. Given a scenario, select the appropriate command line interface tool and interpret the output to verify functionality.
  2. Explain the purpose of network scanners
  3. Describe various methods used for network protection
  4. Given a scenario, utilize the appropriate hardware tools

11 .Network Security

  1. Explain the function of hardware and software security devices
  2. Explain common features of firewall
  3. Explain the method of network access security
  4. What are the various tunneling and encryption protocols SSL VPN
  5. What are the various Remote access procedures
  6. Explain methods of user authentication Public Key Infrastructure (PKI)
  7. Discuss AAA and various protocols that provide AAA features AAA (Authentication, Authorization and Accounting)
  8. Discuss various point-to-point authentication protocols uses in PPP
  9. Explain issues that affect device security
  10. Describe various secure methods for accessing devices across the network Secure Socket Layer (SSH)
  11. Discuss various unsecure methods for accessing devices across the network Telnet
  12. Identify common security threats and mitigation techniques
  13. Describe various mitigation techniques policies and procedures
A+
Managing and Maintaining a Microsoft Windows Server 2003

1. Installing and Deploying Windows Server 2003

  1. System Requirements
  2. Installing Windows Server 2003 from the CD-Rom
  3. Installing Windows Server 2003 from a Network Share
  4. Performing an Unattended Installation
  5. Windows Server 2003 Licensing
  6. Deploying Software Applications
  7. The Windows Server 2003 Advanced Boot Options
  8. The Recovery Console

2. Managing Windows Server 2003

  1. Installing New Hardware
  2. Using Driver Signing
  3. Configuring Hard Disks
  4. Configuring File Systems
  5. Defragmenting Volumes and Partitions
  6. Backing Up and Restoring Data
  7. Planning System Recovery with Automated System Recovery (ASR)
  8. Adding Additional Hardware

3. Configuring the Windows Server 2003 Network

  1. Creating Network Connections
  2. Configuring Automatic IP Addressing
  3. Name Resolution
  4. Domain Name Space
  5. DNS Zones
  6. Name Servers
  7. Configuring Dynamic DNS
  8. Testing IP Connections

4. The Windows Server 2003 Network Infrastructure

  1. Directory Service Functionality
  2. Active Directory Support for Client Computers
  3. Active Directory Structure
  4. Domain Functional Levels
  5. Forest Functional Levels
  6. Active Directory Replication
  7. Administering Active Directory
  8. Auditing Access to Active Directory Objects

5. Microsoft Internet Information Services (IIS) 6.0

  1. Installing IIS 6.0
  2. Managing IIS 6.0
  3. Security
  4. Managing Websites

6. Routing and Remote Access Service (RRAS)

  1. Routing and Remote Access Service Features
  2. Installation and Configuration
  3. Connecting to RRAS
  4. Remote Access Security
  5. Securing RRAS Clients
  6. Virtual Private Networks (VNP)
  7. RRAS Tools
  8. Routing

7. Terminal Services

  1. Terminal Services Components
  2. Client Software and Installation
  3. Connecting to Terminal Services
  4. Administering Terminal Services
  5. Troubleshooting Terminal Services

8. Creating and Managing User and Computer Accounts

  1. Types of User Accounts
  2. Computer Accounts
  3. Creating User Accounts
  4. Group Accounts
  5. Configuring Account Policies
  6. Managing User Data
  7. Group Policy
  8. Managing User Environment
  9. Software Deployment

9. Controlling Access to Network Resources

  1. Access Control List
  2. NTFS Permissions
  3. Shared Folder Permissions
  4. Offline Files
  5. Combining Shared Folder Permissions and NTFS Permissions

10. Monitoring Network Resources

  1. Monitoring Access to Shared Folders
  2. Auditing
  3. Using Event Viewer
  4. Using Group Policy
  5. The Shutdown Event Tracker

11. Monitoring System Performance

  1. The System Monitor
  2. Task Manager
  3. Command-Line Monitoring Tools
CCDP
Cisco CCDP 642-813

1. The Campus Switching Network

  1. The Traditional Shared Campus Network
  2. The New Campus Network
  3. Switching Technologies
  4. Switched Campus Network Design

2. Basic Switch and Port Configuration

  1. Network Technologies
  2. Connecting Switches
  3. Switch Management
  4. Switch File Management
  5. Switch Port Configuration

3. Implement VLAN based solutions

  1. VLAN Membership
  2. Extent of VLANs
  3. VLAN Trunks
  4. Service Provider Tunneling
  5. VLAN Trunking Protocol (VTP)

4. Redundant Switch Links

  1. Switch Port Aggregation with EtherChannel
  2. Spanning-Tree Protocol (STP)
  3. Spanning-Tree Communication
  4. STP States
  5. STP Timers
  6. Convergence
  7. Spanning-Tree Design
  8. STP Types
  9. Spanning Tree Protocol Security Features
  10. Protecting Against the Sudden Loss of BPDUs
  11. Advanced Spanning-Tree Protocol

5. Wireless LAN

  1. Wireless LAN Technology Overview
  2. Wireless LAN Security
  3. Wireless Mobility
  4. Cisco Aironet Client Installation and Configuration

6. Implement Switch based Layer 3 services

  1. InterVLAN Routing Design
  2. Routing with an Integrated Router
  3. InterVLAN Routing Configuration

7. Multi-Layer Switching

  1. Multi-Layer Switching Components
  2. MLS-RP Advertisements
  3. Configuring Multi-Layer Switching
  4. Flow Masks
  5. Configuring the MLS-SE

8. Cisco Express Forwarding (CEF)

  1. CEF Components
  2. CEF Operation Modes
  3. Configuring Cisco Express Forwarding

9. Implement High Availability: HSRP

  1. Traditional Redundancy Methods
  2. Hot Standby Router Protocol (HSRP)
  3. HSRP Operations
  4. Configuring HSRP
  5. Troubleshooting HSRP

10. Quality of Service

  1. Understanding the Need for Quality of Service
  2. QoS Types
  3. Differentiated Services QoS
  4. Configuring QoS

11. Support for Voice and Video

  1. VOIP Befefits
  2. Inline Power
  3. Voice VLANs
  4. Voice QoS
  5. VOIP Verification

12. Controlling Access in the Campus Environment

  1. Access Policies
  2. Managing Network Devices
  3. Access Layer Policy and Port Security
  4. Distribution Layer Policy
  5. Core Layer Policy

13. Monitoring and Troubleshooting

  1. Monitoring Cisco Switches
  2. General Troubleshooting Model