MCSA (Microsoft Certified Solutions Associate)

Course Details

MCSA (Microsoft Certified Solutions Associate) is a certification program is an entry level certification program for the people who need to make their foot path in IT industry. MCSA Windows server 2016 certification covers in planning, configuring, maanging of windows server 2016. From Configuring Virtual Disks,Failover Clustering, Implement Hyper-V Clusters and Stretch Clusters, a mid level expert in DNS handling – Configure Domain Controller Cloning, Troubleshooting Active Directory Installations,Implement Web Application Proxy, Install and Configure Active Directory Rights Management Services.

BatchesRegularWeekendFast Track
Duration40-45 Days8 Weekend15 Days
Hours Per Day2 Hours6 Hours5 Hours
Demo ClassYes - 2 DaysYes - 1 WeekendYes - 1 Day
Deploying and Managing Windows Server 2012
    1. Overview of Windows Server 2012 R2
    2. Windows Server 2012 R2 Installation
    3. Post-Installation Configuration of Windows Server 2012 R2
    4. Windows Server 2012 R2 Management Overview
    5. Introduction to Windows PowerShell
Introduction to Active Directory Domain Services
    1. Overview of AD DS
    2. Overview of Domain Controllers
    3. Installing a Domain Controller
Managing Active Directory Domain Services Objects
    1. Managing User Accounts
    2. Managing Groups
    3. Managing Computer Account
    4. Delegating Administration
Automation of Active Directory Domain Services Administration
    1. Using Command-line Tools for AD DS Administration
    2. Using Windows PowerShell for AD DS Administration
    3. Performing Bulk Operations with Windows PowerShell
Implementation of IPv4
    1. Overview of TCP/IP
    2. Understanding IPv4 Addressing
    3. Subnetting and Supernetting
Implementation of Dynamic Host Configuration Protocol
    1. Installation of a DHCP Server Role
    2. Configuring DHCP Scopes
    3. Managing a DHCP Database
    4. Securing and Monitoring DHCP
Implementation of DNS
    1. Name Resolution for Windows Clients and Servers
    2. Installing a DNS Server
    3. Managing DNS Zones
Implementation of Local Storage
    1. Overview of Storage
    2. Managing Disks and Volumes
    3. Implementing Storage Spaces
Implementation of File and Print Services
    1. Securing Files and Folders
    2. Protecting Shared Files and Folders by Using Shadow Copies
    3. Configuring Work Folders
    4. Configuring Network Printing
Implementation of Group Policy
    1. Overview of Group Policy
    2. Group Policy Processing
    3. Implementing a Central Store for Administrative Templates
Implementation of Server Virtualization with Hyper-V
    1. Overview of Virtualization Technologies
    2. Implementing Hyper-V
    3. Managing Virtual Machine Storage
    4. Managing Virtual Networks
Configuration and Troubleshooting of Domain Name System
    1. Configuring the DNS Server Role
    2. Configuring DNS Zones
    3. Configuring DNS Zone Transfers
    4. Managing and Troubleshooting DNS
Maintaining Active Directory Domain Services
    1. Overview of AD DS
    2. Implementing Virtualized Domain Controllers
    3. Implementing RODCs
    4. Administering AD DS
    5. Managing the AD DS Database
Managing User and Service Accounts
    1. Configuring Password Policy and User Account Lockout Settings
    2. Configuring Managed Service Accounts
Implementation of a Group Policy Infrastructure
    1. Introduction of Group Policy
    2. Implementing and Administering GPOs
    3. Group Policy Scope and Group Policy Processing
    4. Troubleshooting the Application of GPOs
Managing User Desktops with Group Policy
    1. Implementation of Administrative Templates
    2. Configuring Folder Redirection and Scripts
    3. Configuring Group Policy Preferences
    4. Managing Software with Group Policy
Implementing Remote Access
    1. Overview of Remote Access
    2. Implementing DirectAccess by Using the Getting Started Wizard
    3. Implementing and Managing an Advanced DirectAccess Infrastructure
    4. Implementing VPN
    5. Implementing Web Application Proxy
Installing, Configuring, and Troubleshooting the Network Policy Server Role
    1. Installing and Configuring a Network Policy Server
    2. Configuring RADIUS Clients and Servers
    3. NPS Authentication Methods
    4. Monitoring and Troubleshooting a Network Policy Server
Implementation of Network Access Protection
    1. Overview of Network Access Protection
    2. Overview of NAP Enforcement Processes
    3. Configuring NAP
    4. Configuring IPSec Enforcement for NAP
    5. Monitoring and Troubleshooting NAP
Optimization of File Services
    1. Overview of FSRM
    2. Using FSRM to Manage Quotas, File Screens, and Storage Reports
    3. Implementing Classification and File Management Tasks
    4. Overview of DFS
    5. Configuring DFS Namespaces
    6. Configuring and Troubleshooting DFS Replication
Deploying and Maintaining Server Images
    1. Overview of Windows Deployment Services
    2. Managing Images
    3. Implementing Deployment with Windows Deployment Services
    4. Administering Windows Deployment Services
Implementation of Update Management
    1. Overview of WSUS
    2. Deploying Updates with WSUS
Implementation of Active Directory Certificate Services
    1. Using Certificates in a Business Environment
    2. PKI Overview
    3. Deploying CAs
    4. Deploying and Managing Certificate Templates
    5. Implementing Certificate Distribution and Revocation
    6. Managing Certificate Recovery
Implementation of Active Directory Federation Services
    1. Overview of AD FS
    2. Deploying AD FS
    3. Implementing AD FS for a Single Organization
    4. Deploying AD FS in a Business-to-Business Federation Scenario
    5. Extending AD FS to External Clients
Implementation of Network Load Balancing
    1. Overview of NLB
    2. Configuring an NLB Cluster
    3. Planning an NLB Implementation
Implementation of Failover Clustering
    1. Overview of Failover Clustering
    2. Implementation of a Failover Cluster
    3. Configuring Highly Available Applications and Services on a Failover Cluster
    4. Maintaining a Failover Cluster
    5. Implementation of a Multi-Site Failover Cluster