Total Pageviews

Sunday, 15 May 2016


Welcome to Planet Star
AUTHORISED IANT FRANCHISEE KERALA 

 II FLOOR, GOLDEN TOWER, RAJAJI CROSS ROAD, BEHIND INDOOR STADIUM, OPP. GANGA MOVIE,   CALICUT - 673004, KERALA, INDIA

Call Us :  0495-2725307 , 9995515141

Email :  iantcalicut@gmail.com

Web Site :  Click Here >>>>    www.planetstar.co.in 



IANT - INSTITUTE OF ADVANCE NETWORK TECHNOLOGY.

PLANET STAR is the best hardware/networking institute in Malabar, established

in 2002 to provide quality training in the field of Information Technology. It

provides international certification courses to meet the requirements of

multinational companies across the world. One of the remarkable quality of

PLANET STAR is that the certified and experienced engineers are taking classes,

that provide a real time experience to students. Training and certifications are

including for the courses of Microsoft, Cisco, RedHat and Comptia. 

PLANET STAR students are working around the world with multinational

companies in different areas of networking field with variety of positions. We have

provided job to many students in India and abroad. We welcome students who

have good ambition to be a part of Information Technology for growing their

Now PLANET STAR BECOMES IANT …..

Planet Star is the authorised  Franchisee of IANT, a network of 110+ quality

education centres equipped with latest infrastructure and a team of high end IT

professionals.












IANT:The Gateway to Global Opportunities

IANT (Institute of Advance Network Technology) is a premier IT Company facilitating Advanced IT [Retail & Corporate] Training, International Educational Certifications, Infrastructure Development, Manpower Outsourcing & Recruitment. Incorporated in 1999 by Eminent Educationalist Mr. R. F. Kherani, IANT has successfully established a vision for IT education in India.

Why should you choose IANT?

India's No.1 Hardware and Networking Institute , IANT is emerging as a prospective leader in IT education and headed to establish a benchmark in Education Industry. Quality thoughts & quality trend is driving the organization to adapt to latest technology& techniques. Technological growth of students is perforated with personality traits,which make them an asset for any organization.

CHNA – Computer Hardware & Networking Administrator


CHNA course is designed by transform the career of a school/ college student into internationally certified networking & security specialist Engineer. The intensive training modules of the course starts with the easy to learn basic computer operation, hardware knowledge & networking concepts, and leads to international certification training programme authorized by Technology service provide i.e. CompTIA, Microsoft, Cisco, Redhat & EC Council. The integrated soft skills and language training curriculum in the course ensures that trained professionals are technically proficient and competent for the job in MNCs and abroad.

M.S.OFFICE - 2013


  • Introduction to basic of Computers.
  • Learn how to work with Computers.
  • Learn to work in corporate sector, which is a must in today's competitive market.

EC-Council - CSCU (Certified Secure Computer User)


  • In CSCU what will you learn ?
    Safe Browsing, Passwords, Online transactions security, Mobile device security, Email Security, Social Networking, Blue Tooth Security, Personal Computer Security & many more.

CompTIA A+ CERTIFICATION PROGRAM


  • The only Hardware Certification in the world, which is 2nd Largest Certification program in the world.
  • A+ Certification is offered by Computing Technology Industry Association (CompTIA) and backed by Association for Field Service Management International (AFSMI).
  • This course enables student to master in all aspects of computer hardware.

CompTIA NETWORK+ CERTIFICATION PROGRAM


  • Only a non-vendor specific course for networking offered by CompTIA, which provides the knowledge of networking as a subject.
  • Builds a strong foundation in PC-Based network features, benefits, performance issues and troubleshooting.
  • This course covers networking fundamentals, network protocols, cabling, developing network design, implementation and troubleshooting, maintenance of different networks.

RHCE /RHEL- 7 (Red hat Certified Engineer)


Red Hat is the world's leading provider of Open Source Solutions. Through Linux it can provide reliable and High Performing Cloud, Visualization, Storage and security services. Most of the MNC's, Corporate as well as Government departments are using Red Hat Linux as their server's OS. Student will get 3 participation certificate as well from Red Hat. Courses covered are RH-124, RH-134, and RH-254.

EXTRA


  • English Speaking, Personality Development. (Containing 5 Book's Set with Audio & Video CD's)
  • Additional Marketing, Sales, HRD knowledge or best Job option.

MCSA 2012 (Microsoft Certified Solution Associate)


  • Equips the student to maintain, troubleshoot and administrate one of the most popular networking operating system.
  • Course Covers : 410, 411, 412.
  • Latest course offered by the world's largest IT Company – MICROSOFT.

CCNA


  • The most sought after course in Network Administration in today's IT Industry around world.
  • Cisco has set the standard for business transformation by using internet technology to integrate its core process and culture.
  • The course covers the latest technologies offering of routers.

EC- COUNCIL- CEH (Certifies Ethical Hacker)


  • This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
  • The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems.
  • Student will begin by understanding how perimeter defences work and then be lead into scanning and attacking their own networks, no real network is harmed.
  • Student will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS attacks, Buffer Overflows and Virus creation.
  • This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.

CompTIA Security+ SY0-401


CompTIA Security+ certification designates knowledgeable professionals in the field of security, one of the fastest-growing fields in IT. CompTIA Security+ covers the most important foundational principles for securing a network and managing risk. Looking for a job in IT security? CompTIA Security+ SY0-401 prepares you to pass your exam and get one of the following hot IT jobs:
  • Security Engineer
  • Security Consultant
  • Network Administrator
  • IA Technician
  • IA Manager

CompTIA Cloud+ (Overview)


The CompTIA Cloud+ certification validates the knowledge and the best practices of IT practioners working in cloud computing environments, who must understand and deliver cloud infrastructure. The compTIA Cloud+ certification covers standard methodology required to securely implement and maintain cloud technologies.

IMS-ID-CHNA


This course is meant for students who are pursuing engineering education or students willing to pursue their career in IT Management. IMS-ID-CHNA covers highly in demand technologies and adds an edge to the profile of CHNA trained engineers. The integrated technologies in the course ensures higher remuneration and direct entry in high profile jobs which is normally meant for Post Graduate & Engineering (BE/BTECH) graduates.

M.S. office – 2013


  • Introduction to basic of Computers.
  • Learn how to work with Computers.
  • Learn to work in corporate sector, which is a must in today's competitive market.

EC-Council - CSCU (Certified Secure Computer User)


  • In CSCU what will you learn ?
    Safe Browsing, Passwords, Online transactions security, Mobile device security, Email Security, Social Networking, Blue Tooth Security, Personal Computer Security & many more.

CompTIA A+ CERTIFICATION PROGRAM


  • The only Hardware Certification in the world, which is 2nd Largest Certification program in the world.
  • A+ Certification is offered by Computing Technology Industry Association (CompTIA) and backed by Association for Field Service Management International (AFSMI).
  • This course enables student to master in all aspects of computer hardware.

CompTIA NETWORK+ CERTIFICATION PROGRAM


  • Only a non-vendor specific course for networking offered by CompTIA, which provides the knowledge of networking as a subject.
  • Builds a strong foundation in PC-Based network features, benefits, performance issues and troubleshooting.
  • This course covers networking fundamentals, network protocols, cabling, developing network design, implementation and troubleshooting, maintenance of different networks.

RHCE /RHEL- 7 (Red hat Certified Engineer)


Red Hat is the world's leading provider of Open Source Solutions. Through Linux it can provide reliable and High Performing Cloud, Visualization, Storage and security services. Most of the MNC's, Corporate as well as Government departments are using Red Hat Linux as their server's OS. Student will get 3 participation certificate as well from Red Hat. Courses covered are RH-124, RH-134, and RH-254.

EXTRA


  • English Speaking, Personality Development. (Containing 5 Book's Set with Audio & Video CD's)
  • Additional Marketing, Sales, HRD knowledge or best Job option.

MCSE 2012 ( Microsoft Certified solution expert )


  • Equips the student to maintain, troubleshoot and administrate one of the most popular networking operating system.
  • Course Covers : 410, 411, 412, 413 & 414.
  • Latest course offered by the world's largest IT Company – MICROSOFT.

CCNA


The most sought after course in Network Administration in today's IT Industry around world. Router has set the standard for business transformation by using internet technology to integrate its core process and culture. The course covers the latest technologies offering of routers.

CCNA VOICE


  • VOIP Fundamentals.
  • Communication Manager Express Implementation.
  • Smart Business Communication Implementation.

CWNA Wireless


It covers Wireless Network with any operating system. Wireless Router, Wireless LAN Card, Lap Top and Network without using wire

CEH – COMPUTER ETHICAL HACKING


  • Introduction to Ethical Hacking
  • Scanning Networks
  • System Hackings
  • Viruses and Worms
  • Social Engineering
  • Session Hijacking
  • Hacking Web Applications
  • Hacking Wireless Networks
  • Buffer Overflows
  • Penetration Testing
  • Footprinting and Reconnaissance
  • Enumeration
  • Trojans and Backdoors
  • Sniffers
  • Denial of Service
  • Hacking Webservers
  • SQL Injection
  • Evading IDS, Firewalls and Honeypots
  • Cryptography

CompTIA Cloud+


  • Cloud Concepts and Models
  • Infrastructure
  • Security
  • Business Continuity in the cloud
  • Virtualization
  • Resource Management
  • Systems Management

CHNE -Certified Hardware Networking Engineer

CHNE course is the Ultimate Training program offered exclusively at IANT. The technical proficiency level as deemed in Masters Degree Programs in Information Technology is imparted in this course and certifications of the candidates is rendered *directly by Global technology service providers. Course leads to IT Management profiles & corporate job opportunities in Global IT Market. Students are enrolled in this course, after a preliminary interaction and interview schedule to meet up the basic need of the global positions available.


Module 1
Basic
Module 2
CSCU
Module 3
CompTIA A+
Module 4
CompTIA Network+
Module 5
CompTIA Server +
Module 6
MCSE 2012 - Microsoft Certified Solution Expert • 410, 411, 412, 413 & 414
Module 7
English Speaking & Personality Development
Module 8
CCNA
Module 9
REDHAT RHEL 6 - RHCE (124, 134 & 254)
Module 10
REDHAT - RHCVA (REDHAT Certified Virtualization Administrator)
Module 11
Cloud Computing
Module 12
CCNA - VOICE
Module 13
EC - COUNCIL - CEH (Certified Ethical Hacker)
Module 14
CWNA - Wireless
Module 15
CCSA - Checkpoint Security Administrator
Module 16
CCNP - 642-902, 642-813, 642-832
Module 17
EC - COUNCIL - CHFI (Computer Hacking Forensic Investigator)
Module 18
Microsoft Exchange Server 2013 - 341 & 342


NCE -Network Certified Engineer




Module 1
Basic
Module 2
CSCU
Module 3
CompTIA A+
Module 4
CompTIA Network+
Module 5
CompTIA Server +
Module 6
MCSE 2012 - Microsoft Certified Solution Expert (any one paper)(410)
Module 7
Overview CCNA & Red Hat Linux (124) & (134) RHCSA





CompTIA A+




New series 2 in 1 complete

CompTIA A+ 220-801 covers the fundamentals of computer technology, installation and configuration of PCs, laptops and related hardware, and basic networking. CompTIA A+ 220-802 covers the skills required to install and configure PC operating systems, as well as configuring common features (e.g. network connectivity and email) for mobile operating systems Android and Apple iOS.



CompTIA A+ 2012 Essentials (Exam 220-801)

The CompTIA A+ Essentials training course comprises various lessons:
Bios and Motherboard
  • Distinguish between the functions of the BIOS chip and the CMOS chip
  • Describe the characteristics of a typical CMOS setup program
  • Recognize the configuration options offered by BIOS
  • Describe the characteristics of the built-in diagnostic features of BIOS
  • Match the potential problems with how they are monitored by the BIOS
  • Match the expansion slots with their descriptions
  • Distinguish between different types of RAM slots
  • Recognize how the bus architecture functions
  • Describe the characteristics of key motherboard connections


Memory, Expansion Cards and Storage Device
  • Describe the types of memory used in computer systems
  • Recognize key characteristics of different types of RAM
  • Describe the considerations involved in expansion card installation
  • Match the expansion cards to descriptions of their characteristics
  • Propose solutions for specific system upgrade scenarios
  • Classify the characteristics of storage devices
  • Describe how to upgrade a system hard drive in a given scenario


CPUs, Connections and Power Supplies


  • Match the characteristics of modern x86 processors to their descriptions
  • Recognize types of CPUs
  • Describe the characteristics of CPU sockets
  • Match the physical I/O connection types to their description
  • Match the wireless technologies to their descriptions
  • Describe the considerations involved in choosing a power supply


Configurations, Displays, Connectors and Peripherals
  • Describe the configuration considerations involved in setting up a graphics work station
  • Identify the key components of an audio/video workstation
  • Distinguish between VDI modes of operation
  • Match the home PC configuration considerations to the appropriate PC type
  • Determine the most appropriate choice for a home server OS
  • Distinguish between CRT, LCD, and projector technologies used for display devices
  • Describe how to install the keyboard and mouse
  • Recognize key characteristics of touch screen monitors
  • Choose the most appropriate peripherals for a given scenario


Network Cabling, IP Addressing, Ports and Protocols
  • Distinguish between shielded and unshielded twisted-pair cabling
  • Describe how fiber cabling works
  • Distinguish between RG-6 and RG-59 coaxial cabling
  • Specify the class of an IP address
  • Distinguish between IPv4 and IPv6 addressing types
  • Identify the default subnet masks for Class A, B, and C networks
  • Describe how DHCP assignment works
  • Recognize how common ports are used


Networking Technologies
  • Distinguish between the standards used for wireless networks
  • Use encryption methods to secure wireless networks
  • Implement the features of small office/home office routers
  • Use encryption techniques to secure wireless networks
  • Implement SOHO routers
  • Use the appropriate network topology for a given scenario
  • Determine the most appropriate network types for given requirements


Networking Devices and Tools
  • Distinguish between the functions of different network level devices
  • Recognize the advantages of NAS servers
  • Describe the key characteristics of firewalls
  • Match the networking tools to descriptions their functions
  • Identify the correct application for different network devices


Laptops
  • Recognize key characteristics of laptop computer cards
  • Describe how a USB flash drive works
  • Recognize the differences between the display technologies used for laptops
  • Choose appropriate laptop displays in given scenarios
  • Use laptop features
  • Describe how laptop components are used


Printers
  • Describe the differences between laser, inkjet, thermal, and impact printers
  • Install a printer using Windows 8
  • Install printers using Windows 7
  • Share printers
  • Install printers
  • Protect yourself when servicing a printer
  • Replace printer consumables


Operational Procedures
  • Describe best practice when ensuring the safety of personnel in an IT work environment
  • Describe preventative maintenance measures for the workplace
  • Recognize how to guard against risks to data and equipment in an electronic environment
  • Match the key principles of information security to their descriptions
  • Describe measures that can be taken to ensure information security
  • Take steps to ensure information security
  • Follow best practices when working with and maintaining personal computers
  • Apply troubleshooting methodology to a given scenario
  • Describe the considerations involved in troubleshooting motherboards



CompTIA A+ 2012 Practical Application (exam 220-802)

The CompTIA A+ Practical Application training course comprises various lessons:


Introducing Microsoft Windows
  • Distinguish between Windows operating systems
  • Distinguish between 32-bit and 64-bit operating systems
  • Match Windows features to their descriptions
  • Match the security and administrative tools to their descriptions
  • Choose the appropriate Windows tool for a particular task


Installing and Configuring Windows
  • Choose a Windows installation method
  • Describe the different Windows installation types
  • Describe the decisions that need to be made prior to running a Windows Installation
  • Distinguish between the formatting options available when working in Windows
  • Identify basic Windows configuration tasks
  • Describe the characteristics of key OS command tools
  • Add Administrative Tools to the Start menu
  • Use Administrative Tools


Optimizing Windows
  • Manage hard drive volumes
  • Describe Windows migration tools
  • Use the correct Windows utility for a given scenario
  • Use Windows optimization tools
  • Determine the most appropriate Windows Utility to use in a given scenario


Managing Windows
  • Configure Windows using the Control Panel
  • Describe the characteristics of a workgroup
  • Connect to a network
  • Use the Control Panel to configure Windows
  • Use Windows networking features
  • Perform Windows maintenance tasks
  • Describe the characteristics of System Protection
  • Describe the features of access control in Windows
  • Distinguish between the options available for implementing virtualization
  • Choose a virtualization option for a given scenario


Security and Data Disposal
  • Identify the type of social engineering techniques being used in a given scenario
  • Identify malware attack types
  • Propose security solutions for given scenarios
  • Propose appropriate techniques for destroying magnetic media
  • Describe the functions of a data leakage prevention strategy
  • Describe how to connect to a network using an Ethernet connection
  • Describe how a firewall works when a connection is made
  • Recognize how to connect to a wireless network
  • Match the wireless network security measure to its description
  • Securely connect to wired and wireless networks


Mobile Devices
  • Match the mobile device to its characteristics
  • Distinguish between iOS and Android systems
  • Describe the features of iOS synchronization
  • Describe the options available when synchronizing with Android-based devices
  • Describe how to configure a mobile device
  • Describe the considerations involved in getting online with mobile devices
  • Distinguish between the security characteristics of iOS and Android
  • Describe the backup options available on Android
  • Recognize how to manage online access with a mobile device
  • Describe how to secure a mobile device


System Troubleshooting
  • Apply troubleshooting methodology to a given scenario
  • Describe the considerations involved in troubleshooting motherboards
  • Recognize the causes of RAM errors
  • Describe how to troubleshoot hardware and software related problems
  • Describe the characteristics of CPU failures
  • Determine if an issue is related electrical supply problems
  • Troubleshoot hard drives
  • Sequence the steps to troubleshoot RAID drives
  • Identify the probable source of a hardware problem


General Troubleshooting
  • Describe the options for dealing with malware
  • Troubleshoot network problems
  • Propose solutions to deal with security issues
  • Match each video issue with its probable cause
  • Match the considerations involved in performing specific laptop maintenance tasks to the appropriate tasks
  • Recognize how to isolate the source of a printer problem
  • Describe how to troubleshoot printers

CompTIA Network+



CompTIA Network+ : N10-006



Module 1 / Topologies and Infrastructure



Topologies and the OSI Model
  • Network Topologies
  • The OSI Model
  • OSI Model Summary
Ethernet
  • Ethernet Frames
  • Modern Ethernet Standards
  • MAC Addressing
  • Address Resolution Protocol (ARP)
Infrastructure and Design
  • Planning an Enterprise Campus Network
  • Planning a SOHO Network Installation
  • Planning an Industrial Control System
  • TCP/IP Protocol Suite


Module 2 / Addressing and Routing



IPv4 Addressing
  • IP Addressing Schemes
  • Subnetting and Classless Addressing
  • Public Internet Addressing
  • Multicast and IGMP
IPv6 Addressing
  • IPv6 Address Format
  • Configuring IPv6 Addresses
  • Migrating to IPv6
Routing
  • Routing Protocols
  • Routing Algorithms and Metrics
  • Installing and Configuring Routers


Module 3 / Troubleshooting and Management



Transport Protocols
  • Transmission Control Protocol (TCP)
  • User Datagram Protocol (UDP)
  • TCP/IP Ports
Name Resolution
  • Host Names and FQDNs
  • Domain Name System (DNS
  • nslookup and nbtstat
Troubleshooting
  • Troubleshooting Procedures
  • Troubleshooting Connectivity Issues
  • Troubleshooting Configuration Issues
  • Troubleshooting Internetworking
  • Troubleshooting Services
Applications and Services
  • HTTP and HTTPS
  • FTP, TFTP, and SMB
  • Email (SMTP / POP / IMAP)
  • Multilayer Switches
Management and Monitoring
  • Network Monitoring Utilities
  • Simple Network Management Protocol
  • Remote Administration Tools
Cloud and Virtualization
  • Virtualization Technologies
  • Storage Area Networks
  • Cloud Computing


Module 4 / Installation Network Sites



  • Wiring Distribution
  • HVAC (Heating, Ventilation, Air Conditioning)
  • Fire Prevention and Suppression
Installing Cable
  • Twisted Pair Cable (UTP / STP / ScTP
  • Other Copper Cable Types
  • Fiber Optic Cable and Connectors
  • Troubleshooting Fiber Cable Issues
Installing Wireless Networks
  • Wireless Standards (IEEE 802.11)
  • Wireless Site Design
  • Troubleshooting Wireless Links
WAN Technologies
  • Modern Telecommunications Networks
  • Packet-switched WAN Services
  • Wireless WANs
Remote Access
  • Remote Access Services (RAS)
  • Virtual Private Networks (VPN)
  • PPTP and SSL VPNs
  • IP Security (IPsec)
  • Troubleshooting WAN Issues


Module 5 / Security



Vulnerabilities and Threats Security Basics
  • Wireless Security
  • Network Attack Strategies
  • Denial of Service
Security Appliances
  • Demilitarized Zones (DMZ)
  • Network Address Translation
  • Firewalls
  • Configuring a Firewall
  • Proxies and Gateways
  • Intrusion Detection Systems (IDS)
Authentication
  • Authentication Technologies
  • NTLM and Kerberos
  • RADIUS and TACACS+
  • PAP, CHAP, and EAP
  • Wi-Fi Authentication
  • Mobile Device Management
  • Troubleshooting Authentication and ACLs
Incident Response
  • Business Continuity Concepts
  • Disaster Recovery Planning
  • IT Contingency Planning
  • Incident Response Procedures
  • Forensic Procedures
  • Collection of Evidence
Change and Configuration Management
  • Change and Configuration Management
  • Procedures and Standards
  • Employee Policies
  • Backup Plans and Policies

CompTIA Mobility+



1. Over-the-Air Technologies



  • Compare and contrast different cellular technologies
  • Configure and implement WiFi client technologies using appropriate options.
  • Interpret site survey to ensure over the air communication


2. Network Infrastructure



  • Compare and contrast physical and logical infrastructure technologies and protocols
  • Disaster recovery principles and how it affects mobile devices.
  • Compare and contrast common network ports and protocols for mobile devices


3. Mobile Device Management



  • Explain policy required to certify device capabilities.
  • Install and configure mobile solutions based on given requirements.
  • Implement mobile device on-boarding and off-boarding procedures.
  • Configure and deploy mobile applications and associated technologies


4. Security



  • Identify various encryption methods for securing mobile environments.
  • Monitoring and reporting techniques to address security requirements
  • Risks, threats and mitigation strategies affecting the mobile ecosystem.


5. Troubleshooting



  • Troubleshoot common device problems.
  • Troubleshoot common application problems.
  • Troubleshoot common over-the-air connectivity problems.
  • Troubleshoot common security problems.

CompTIA Security+



CompTIA Security+ certification designates knowledgeable professionals in the field of security, one of the fastest-growing fields in IT. CompTIA Security+ covers the most important foundational principles for securing a network and managing risk. Looking for a job in IT security? CompTIA Security+ SY0-401 prepares you to pass your exam and get one of the following hot IT jobs:


  • Security engineer
  • Security consultant
  • Network administrator
  • IA technician
  • IA manager


MITIGATING THREATS



  • System maintenance
  • Application security
  • Physical security
  • Malware
  • Social engineering


CRYPTOGRAPHY



  • Symmetric cryptography
  • Public key cryptography


AUTHENTICATION



  • Authentication factors and requirements
  • Authentication systems
  • Authentication system vulnerabilities


USER- AND ROLE-BASED SECURITY



  • Baseline security policies
  • Resource access


PERIPHERAL SECURITY



  • File and disk encryption
  • Peripheral and component security
  • Mobile device security


PUBLIC KEY INFRASTRUCTURE



  • Public key cryptography
  • Implementing public key infrastructure
  • Web server security with PKI


APPLICATION AND MESSAGING SECURITY



  • Application security
  • E-mail security
  • Social networking and messaging


PORTS AND PROTOCOLS



  • TCP/IP basics
  • Protocol-based attacks


NETWORK SECURITY



  • Network devices
  • Secure network topologies
  • Secure networking
  • Virtualization and cloud computing


WIRELESS SECURITY



  • Wireless network security
  • Mobile device security


REMOTE ACCESS SECURITY



  • Remote access
  • Virtual private networks


VULNERABILITY TESTING AND MONITORING



  • Risk and vulnerability assessment
  • Auditing and logging
  • Intrusion detection and prevention systems
  • Incident response


ORGANIZATIONAL SECURITY



  • Organizational policies
  • Education and training
  • Disposal and destruction


BUSINESS CONTINUITY



  • Business continuity planning
  • Disaster recovery
  • Environmental controls

Mcse 2012


MSCE - 2012 EXAM CODE 410 (Installing and Configuring Windows Server 2012)


Module 1
Deploying and Managing Windows Server 2012
Module 2
Introduction to Active Directory Domain Services
Module 3
Managing Active Directory Domain Services Objects
Module 4
Automating Active Directory Domain Services Administration
Module 5
Implementing Ipv4
Module 6
Implementing Dynamic Host Configuration Protocol
Module 7
Implementing Domain Name System
Module 8
Implementing Ipv6
Module 9
Implementing Local Storage
Module 10
Implementing File and Print Services
Module 11
Implementing Group Policy
Module 12
Securing Windows Servers Using Group Policy Objects
Module 13
Implementing Server Virtualization with Hyper-V

MSCE - 2012 EXAM CODE 411 (Administering Windows Server 2012)


Module 1
Deploying and Maintaining Server Images
Module 2
Configuring and Troubleshooting Domain Name System
Module 3
Maintaining Active Directory Domain Services
Module 4
Managing User and Service Accounts
Module 5
Implementing a Group Policy Infrastructure
Module 6
Managing User Desktops with Group Policy
Module 7
Configuring and Troubleshooting Remote Access
Module 8
Installing, Configuring, and Troubleshooting the Network Policy Server Role
Module 9
Implementing Network Access Protection
Module 10
Optimizing File Services
Module 11
Configuring Encryption and Advanced Auditing
Module 12
Implementing Update Management
Module 13
Monitoring Windows Server 2012

MSCE - 2012 EXAM CODE 412 (Configuring Advanced Windows Server 2012 Services)


Module 1
Implementing Advanced Network Services
Module 2
Implementing Advanced File Services
Module 3
Implementing Dynamic Access Control
Module 4
Implementing Distributed Active Directory Domain Services Deployments
Module 5
Implementing Active Directory Domain Services Sites and Replication
Module 6
Implementing Active Directory Certificate Services
Module 7
Implementing Active Directory Rights Management Services
Module 8
Implementing Active Directory Federation Services
Module 9
Implementing Network Load Balancing
Module 10
Implementing Failover Clustering
Module 11
Implementing Failover Clustering with Hyper-V
Module 12
Implementing Disaster Recovery

MSCE - 2012 EXAM CODE 413 (Designing and Implementing a Server Infrastructure)


Module 1
Planning Server Upgrade and Migration
Module 2
Planning and Implementing a Server Deployment Infrastructure
Module 3
Designing and Maintaining an IP Configuration and IP Address Management Solution
Module 4
Designing and Implementing Name Resolution
Module 5
Designing and Implementing an AD DS Forest Infrastructure
Module 6
Designing and Implementing an AD DS Domain Infrastructure
Module 7
Designing and Implementing an AD DS OU Infrastructure and AD DS Delegation Model
Module 8
Designing and Implementing Group Policy Object Strategy
Module 9
Designing and Implementing an AD DS Physical Topology
Module 10
Planning and Implementing Storage
Module 11
Designing and Implementing File Services
Module 12
Designing and Implementing Network Access Service
Module 13
Designing and Implementing Network Protection

MSCE - 2012 EXAM CODE 414 (Implementing an Advanced Server Infrastructure)


Module 1
Planning and Implementing a Server Virtualization Strategy
Module 2
Planning and Implementing Networks and Storage for Virtualization
Module 3
Planning and Deploying Virtual Machines
Module 4
Planning and Implementing a Virtualization Administration Solution
Module 5
Planning and Implementing a Server Monitoring Strategy
Module 6
Planning and Implementing High Availability for File Services and Applications
Module 7
Planning and Implementing a Highly Available Infrastructure Using Failover Clustering
Module 8
Planning and Implementing an Server Updates Infrastructure
Module 9
Planning and Implementing a Business Continuity Strategy
Module 10
Planning and Implementing an Public Key Infrastructure
Module 11
Planning and Implementing an Identity Federation Infrastructure
Module 12
Planning and Implementing an Information Rights Management Infrastructure