共有 7 個考試科目。課堂由導師教授理論及進行眾多的商業實習,而學員於家中親自以導師指引進行商業實習。
Exam 070-270
Installing, Configuring, and Administering Microsoft Windows XP Professional
1. Deploying Windows Server 2003 & Windows XP Professional
2. More about Windows Installation
2.1 Master Boot Record (MBR)
2.2 USB Support
2.3 Windows Driver Model (WDM)
2.4 Windows XP Setup Disks
2.5 Deploying Windows XP Dynamic Update package
2.6 Dual-booting with Windows NT4
2.7 Installing Additional ( 後加 ) Devices
2.8 Rolling Back Driver
2.9 Driver Signing
2.10 Windows File Protection (WFP)
3. Hardware Profiles ( 硬件描述 )
4. Primary and Extended Partitions
4.1 Primary Partitions
4.2 Extended Partitions
4.3 Location ( 位置 ) of System and Boot Partitions
4.4 實習
5. Boot.ini
6. Basic Concept of IDE and SCSI
6.1 IDE
6.2 SCSI
7. IDE 硬碟及 SCSI 硬碟的基本接駁方式
7.1 IDE 硬碟的基本接駁方式
7.2 SCSI 硬碟的基本接駁方式
8. ARC Name
8.1 scsi(x) or multi(x)
8.2 disk(y)
8.3 rdisk(z)
8.4 partition(a)
8.5 Questions
9. Basic Concept of Windows XP Registry ( 登錄檔 )
10. Windows XP Boot Process
10.1 Boot Files
10.2 Boot Process
11. Last Known Good Configuration
11.1 Basic Concept of Last Known Good Configuration ( 最近已知為好的設定 )
11.2 實習
12. Automatic System Recovery (ASR)
12.1 Creating ( 建立 ) an ASR Recovery set
12.2 An Example of Using an ASR
13. Recovery Console ( 恢復台 ) and System Restore ( 系統還原 )
13.1 About Recovery Console
13.2 Installing Recovery Console to Harddisk
13.3 About System Restore
13.4 Password Recovery
14. Windows Server Role ( 角色 )
14.1 Domain Controller (DC, 網域控制器 )
14.2 Member Server ( 成員伺服器 )
15. Basic Concept of User Accounts ( 使用者戶口 )
15.1 Local User Accounts
15.2 Domain User Accounts
15.3 Built-in ( 內置 ) Local User Accounts
15.4 Some Built-in ( 內置 ) Domain User Accounts
16. Creating and Managing User Accounts
16.1 To Create Local User Accounts
16.2 To Create Domain User Accounts
16.3 Deleting and Renaming User Accounts
17. Basic Concept of Groups ( 群組 )
17.1 Global Groups ( 全球性群組 )
17.2 Local Groups ( 本地性群組 )
17.3 Common Usage ( 普遍用法 ) of a Global Group and a Local Group
17.4 Some Built-in ( 內置 ) Global Groups
17.5 Some Built-in ( 內置 ) Local Groups
17.6 Domain Local Groups ( 網域的本地性群組 )
17.7 Built-in System Groups
18. User Profiles ( 使用者描述 )
18.1 Basic Concept of User Profiles
18.2 實習
18.3 Roaming ( 流浪式 ) User Profiles
18.4 Mandatory ( 不可修改 ) User Profiles
19. Home Folder
19.1 To Create and Share a Folder on a Network Server
19.2 To Specify the Path to the Home Folder
20. Encrypting File System (EFS, 加密檔案系統 )
21. Disk Quotas ( 限額 )
21.1 Features of Disk Quotas
21.2 實習
21.3 More about UNC
22. Basic Concept of NTFS Permissions
22.1 Standard NTFS Permissions on Folders
22.2 Standard NTFS Permissions on Files
22.3 How NTFS Permissions Are Applied ( 應用 )
22.4 Taking Ownership ( 擁有權 ) of Folders and Files
22.5 Giving Users the Ability to Take Ownership
22.6 To Take ( 取得 ) Ownership
22.7 More About Taking Ownership
23. More about FAT/FAT32 and NTFS Partitions
23.1 Converting ( 轉換 ) FAT/FAT32 to NTFS
23.2 Managing Windows XP Compression
24. Offline Files
24.1 To Enable Offline Files
24.2 To Make Available Offline
24.3 Security of Offline Files
25. Event Viewer ( 事件檢視器 )
25.1 System Log ( 系統日誌 )
25.2 Application Log ( 應用程式日誌 )
25.3 Security Log ( 保安日誌 )
25.4 Using Event Viewer to View the Logs
26. Services
27. Task Scheduler ( 工作排程器 )
28. Process ( 程序 ) and Thread ( 執行單位 )
28.1 Description of Process and Thread
28.2 Process Affinity Option
28.3 Performance Options – Disabling Translucent Selection Rectangle
29. Stand-By & Hibernation ( 冬眠 )
29.1 Enabling Hibernation
29.2 Assigning Button for Hibernation
30. Accessibility Options ( 協助工具選項 )
30.1 Use of Accessibility Options
30.2 Use of Accessibility Wizard ( 精靈 )
31. Windows 2003/XP Printing
31.1 Windows Printing Terms
31.2 To Add and Share a Printer
31.3 Setting Up a Network Client
32. Configuring a Printer
32.1 Setting Priorities ( 優先次序 ) Between Printers
32.2 Redirecting ( 重新引導 ) Documents
32.3 Changing the Location of the Spool Folder and Notification ( 通告 )
32.4 Printer Pooling ( 溶合 )
33. Basic Concept of Protocols ( 通訊協定 )
33.1 TCP/IP (Transmission Control Protocol/Internet Protocol)
33.2 NWLink IPX/SPX/NetBIOS Compatible ( 兼容 ) Transport Protocol
33.3 NetBEUI
33.4 An Example
34. IP Address ( 位址 )
34.1 Structure ( 結構 ) of IP Address
34.2 Concept of Binary Number
34.3 Network ID and Host ID
34.4 Identifying ( 辨認 ) the Network ID
34.5 問題
34.6 重要事實
34.7 更改 IP Address 的步驟
35. Subnet Mask ( 子網路遮罩 )
35.1 Use of Subnet Mask
35.2 Subnetting ( 子網路化 )
36. Gateway ( 閘口 )
36.1 Static Route ( 靜態路線 )
36.2 Default Gateway ( 預設閘口 )
36.3 An Example
36.4 設定 Default Gateway 的步驟
37. Assigning ( 指定 ) IP Addresses and Subnet Masks
37.1 Statically Assign
37.2 Dynamically Assign (i.e. Use of a DHCP Server)
37.3 Use Alternate Configuration
37.4 Use APIPA (Automatic Private IP Addressing)
38. More About DHCP Server
39. DNS Server
39.1 Basic Concept of Fully Qualified Domain Name (FQDN)
39.2 The Domain Name Space
39.3 Basic Concept of a DNS Server
39.4 Windows Server 2003 DNS Server
39.5 DNS Suffix ( 後置 )
40. WINS Server
40.1 Basic Concept of NetBIOS Name
40.2 Basic Concept of a WINS Server
40.3 WINS Server Requirements
40.4 WINS Client Requirement
40.5 實習
40.6 Windows Versions
40.7 重要事實
41. Terminology ( 術語 )
41.1 Intranet ( 內聯網 )
41.2 Internet Information Server (IIS)
41.3 Proxy ( 代理 ) Server
41.4 Exchange Server
42. Basic Concept of Active Directory
42.1 Logical Structure ( 非實在的結構 )
42.2 Physical Structure ( 實在的結構 )
43. Basic Concept of Windows Policy ( 規則 )
43.1 Local Computer Policy
43.2 Site, Domain or OU Policy
43.3 Priority of Windows Policies
43.4 其他事實
43.5 More about Group Policy
44. Security Template ( 保安樣版 )
44.1 Basic Concept of a Security Template
44.2 Viewing or Adjusting a Security Template
44.3 Applying ( 實施 ) a Security Template
45. Importing Security Template to GPO
45.1 Background
46. Unattended ( 無須注意 ) Installation
46.1 To Install Windows XP Professional by Unattended Installation
47. Answer File
48. Disk Duplication ( 硬碟複製 )
49. Remote Installation Services (RIS)
49.1 Installation of RIS
49.2 RIS Network Requirements
49.3 RIS Client Requirement
49.4 Assigning an Answer File to a RIS image
49.5 Installation of Client Computers with RIS
49.6 Creating of RIS Image for Installation (An Extra Technique)
50. Hardware Abstraction Layer (HAL)
51. Paging Files
51.1 Basic Concept of a Paging File
51.2 實習
51.3 To Solve ( 解決 ) Excessive ( 過量 ) Paging
52. NTVDM
52.1 MS-DOS-based Applications
52.2 Win16-based Applications
Exam 070-290
Managing and Maintaining a Microsoft Windows Server 2003 Environment
1. Disk Management
1.1 Windows Disk Types
1.2 Extend ( 伸延 ) a Simple Volume
1.3 Spanned Volume ( 橫跨容體 )
1.4 Striped Volume ( 等量溶體 )
1.5 RAID-5 Volume
1.6 Mirrored Volume ( 鏡像容體 )
1.7 Comparison ( 比較 ) of Different Disk Management
1.8 Compatibility of volumes in different OS
1.9 Hot Swapping Disks ( 無須關機來更換硬碟 )
1.10 Mounted ( 鑲嵌而成的 ) Drive
2. Terminal ( 終端機 ) Services and Remote Desktop Client
2.1 Setting Up a Terminal Server (Application Mode)
2.2 Setting Up a Remote Desktop Client
2.3 Connecting to the Terminal Server Desktop
2.4 Connecting to an Application of a Terminal Server
2.5 Settings for Terminal Services
2.6 Security for Terminal Server (Application Mode)
2.7 Setting up Terminal Server (Remote Administration Mode)
3. Share Permissions
4. Combining Share Permissions and NTFS Permissions
5. Root Directory Default Permissions
5.1 Default NTFS Permissions on Root Directory
5.2 Default Share Permissions
6. Backup and Disaster Recovery
6.1 實習一 : Using Normal and Incremental backup
6.2 Using Normal and Differential backup
6.3 Copy type backup
6.4 實習二 : Disaster Recovery
6.5 Using Automated System Recovery (ASR) on domain controllers
6.6 Backup network computers
7. Account Management
7.1 Importing User Accounts to Active Directory
7.2 LDAP
7.3 Enabling User Accounts
7.4 Enabling Computer Accounts
7.5 Account Expiry ( 到期 ) Date
7.6 Creating User from Template ( 樣板 ) user account
8. Auditing ( 核算 )
8.1 Basic Concept of Auditing
8.2 實習
9. Shadow Copy Service
9.1 Enabling Shadow Copies of Shared Folders
9.2 Deploying “Previous Versions” client software to Windows XP Professional
9.3 Accessing Shadow Copies of Shared Folders
9.4 Scheduling Shadow Copy
10. IIS
10.1 Installing IIS 5.1 on Windows XP Professional
10.2 Default Web Site and Document Root
10.3 Installing IIS 6.0 on Windows Server 2003
10.4 IIS WebDAV
10.5 Multiple Domain – Using Host Headers
10.6 Default Document
10.7 IIS Role-based Permissions
10.8 Deploying Authenticated Access and Disabling Anonymous Access
10.9 More on Per-File Access Control
11. Remote Access Service (RAS, 遙遠存取服務 )
11.1 實習
11.2 Authentication Methods ( 驗證方式 )
12. Internet Connection Sharing (ICS)
12.1 實習
12.2 Limitation ( 規限 ) of ICS
13. Remote Management
13.1 About Remote Registry Service
13.2 Administration Tools Pack
13.3 Run As
14. System Monitor
14.1 實習
14.2 Using “LogicalDisk” Object
15. Advanced Logging
15.1 To setup Counter Logs for monitoring CPU time and Printer Queue
15.2 Viewing Counter Logs
15.3 To setup Trace Logs for monitoring Active Directory
15.4 Viewing Trace Logs
15.5 Using Filter to view Security Log
15.6 Retention Settings for Security Log
15.7 Group Policies regarding Security Log
16. Account Lockout Policy
Exam 070-291
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
1. Incorrect TCP/IP Configuration
1.1 Incorrect IP Address
1.2 Incorrect Subnet Mask
1.3 Incorrect Default Gateway Address
1.4 Missing Default Gateway Address
1.5 Incorrect Order of Default Gateway Address
2. TCP Sockets
3. Network Address Translation
3.1 Public IP Address
3.2 Private IP Address
3.3 Source Network Address Translation
4. DHCP in Network Infrastructure
4.1 DHCP Scope
4.2 Reservation
4.3 User Classes
4.4 Server Side Conflict Detection
4.5 Windows DHCP Server's DNS Updating
4.6 How DHCP Works
4.7 Multiple DHCP Servers on the Same Network
4.8 Multiple DHCP Servers on Different Networks
5. Router
5.1 Two Router Forms
6. DHCP Relay Agent
7. Network Monitor
7.1 Buffer Size and Frame Size
7.2 Parser
8. Network Bridge
8.1 Introduction to Network Bridge
8.2 實習
8.3 Conclusion
8.4 Practical Use of Network Bridge
9. Roaming VPN
9.1 實習
9.2 PPTP and L2TP
9.3 Default Gateway Address of VPN Clients
10. Remote Access Policies and Dial-in Properties
10.1 Remote Access Policies
10.2 Dial-in Properties
10.3 Combining Remote Access Policies and Dial-in Properties
10.4 Examples of Combining Remote Access Policies and Dial-in Properties
10.5 排列 Remote Access Policies 次序的技巧
10.6 設定 Remote Access Server 的驗證方式 (Authentication Methods)
10.7 Data Encryption ( 資料加密 )
11. Domain Functional Level
11.1 Domain Modes
11.2 Group Types ( 種類 ) in Windows 2000 Native Mode
11.3 Scopes ( 範圍 ) of Security Group in Windows 2000 Native Mode
11.4 Common Usage of Global Group, Universal Group and Local Group
11.5 Creation of a Group
11.6 Universal Group Membership Caching
11.7 Default Kerberos policy
11.8 Special ( 特別的 ) Domain Controller Roles ( 角色 )
12. GPO Linking and Permissions
12.1 Group Policy Object (GPO) Assignment (Linking)
12.2 More on Permissions of a GPO
13. DNS in Network Infrastructure
13.1 The Domain Name Space
13.2 Types of Windows DNS Zones
13.3 Active Directory Integrated Zone
13.4 Standard Primary Zone
13.5 Standard Secondary Zone
13.6 Three Methods to Implement a DNS Zone
13.7 Forward Lookup Zone and Host (A) Records
13.8 Reverse Lookup Zone and Pointer (PTR) Records
13.9 Forward Lookup Zone and Mail Exchanger (MX) Records
13.10 Name Server (NS) Record and the Name Servers Tab
13.11 More about Zone Transfer from Primary to Standard Secondary
13.12 AXFR and IXFR
13.13 DNS Subdomains
Exam 070-293
Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
1. More about WINS Server
1.1 NetBIOS Name Re-registration ( 重新登記 )
1.2 Static Mapping
1.3 Database Replication Between WINS Servers
1.4 Tombstoning ( 建立墓碑 )
1.5 Backing Up and Restoring the WINS Database
1.6 Compacting WINS Database
2. Integrating DNS and WINS
2.1 Client compatibility
2.2 WINS forward lookup
3. DNS in Network Infrastructure
3.1 Round Robin Mechanism ( 輪流運作的技巧 )
3.2 Three Tiers ( 三重 ) of Caching ( 緩衝 )
3.3 Enable Netmask Ordering
3.4 BIND Secondaries
3.5 Forwarders
3.6 Root Zone, Root Hints
3.7 Internet Domain Name Registration
4. Certificate Service
4.1 Installation of an Enterprise CA
4.2 Certificate Template ( 證書樣版 )
4.3 To Request a Recovery Agent Certificate
4.4 To Export a Recovery Certificate and Publish to Active Directory
4.5.2 To Assign a Recovery Agent
4.6 Using Certificate Services for IIS-SSL
4.7 More about Commercial CA
4.8 Group Policy regarding “Trusted Root Certification Authorities”
4.9 Auto-Enrollment of Digital Certificates
4.10 Role-based Permissions
4.11 Certificate Revocation List (CRL) and Revoking a Certificate
5. Internet Protocol Security
5.1 Internet Protocol Security (IPSec)
5.2 Deploying IPSec
5.3 Viewing the three default IPSec policies
5.4 Configuring RAS-L2TP IPSec policy
5.5 Monitoring IPSec activities
6. Additional Domain Controllers
6.1 Installing Additional Domain Controllers for existing domain
6.2 Effects on the domain with additional domain controllers
6.3 Transferring Operation Masters
6.4 Removing a domain controller
6.5 Seize ( 強奪 ) PDC Emulator Role
7. Windows Clustering Service
7.1 Introduction to Windows Clustering ( 群集 ) Service
7.2 Jargons ( 術語 ) in Windows Clustering Service
7.3 Three Cluster Models
7.4 Configuring a Single node cluster
7.5 Recovering a Single Quorum device cluster
7.6 Configuring a Majority node set cluster
8. Network Load Balancing
8.1 Introduction to Network Load Balancing
8.2 Configuring a Network Load Balancing Web cluster
9. Baseline Security Analyzer
9.1 Introduction to Baseline Security Analyzer
9.2 Installing and using Baseline Security Analyzer
9.3 Batch scanning for your domain
Exam 070-294
Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure
1. Securing Domain Controllers
1.1 Syskey utility
1.2 LAN Manager Authentication Level
1.3 Building Custom Security Template
2. More on Windows Policies
2.1 Windows NT System Policy
2.2 Use of “Deny-Apply Group Policy” Permission
2.3 Refresh Interval for Group Policy
2.4 Logon Banner
2.5 Allow log on locally
2.6 Scripts
2.7 Allow log on locally
3. Software Deployment
3.1 Basic Concept of Software Deployment
3.2 Publishing Software to Users
3.3 Assigning Software to Users
3.4 Software Category
3.5 Using Zero Administration Package
4. Additional Domains
4.1 Additional Domains in existing Forest
4.2 Configuring a new domain tree to join existing forest
4.3 Conditional DNS Forwarding
4.4 Raise Domain Functional Level for xyz.com
4.5 Enabling Global Catalog (GC) for xyz.com
4.6 An Example of Domain-Wide authentication and Resource assessment
4.7 Assigning Permissions in a multi-domain environment
5. More about Sites
5.1 實習
5.2 More about Assigning Domain Controller Objects to Sites
6. Active Directory Management
6.1 Replication Monitor
6.2 ADSI Editor
6.3 Active Directory Database Files
6.4 LostAndFound
6.5 Saved Queries
6.6.2 Administrator Account
6.7 Active Directory Migration Tool
6.8 Resultant Set of Policy (Planning Mode)
6.9 Permissions of Active Directory Objects
6.10 Delegation of Control
6.11 OU Delegation Model
7. Forest Functional Level
7.1 Three Forest Functional Levels
7.2 Forest features
7.3 Renaming a Domain Controller
7.4 Raising Forest Functional Level
8. Forest Trusts
8.1 Types of Trust within a Forest
8.2 Types of Inter-Forest Trust
8.3 Creating Forest Trust
8.4 External Trust
8.5 Selective Authentication
9. Distributed File System (DFS)
9.1 Setting up a Dfs Root and a Dfs Link
9.2 Setting up an Additional Dfs Link to a Shared Folder in Another Computer
9.3 Dfs Replication
10. More about Remote Access Service (RAS)
10.1 Callback Options
10.2 Assign a Static IP Address to a User
10.3 PPP (Point-to-Point Protocol) and LCP (Link Control Protocol)
10.4 IP Address Assignment
10.5 Name Resolution
10.6 Logging
11. Internet Authentication Service (IAS)
12. More about DNS Server
12.1 Dynamic Update
Exam 070-297
Designing a Microsoft Windows Server 2003 Active Directory and Network Infrastructure
Analyze the impact of Active Directory on the existing technical environment.
Analyze hardware and software requirements.
Analyze DNS for Active Directory directory service implementation.
Analyze existing network operating system implementation.
Analyze security requirements for the Active Directory directory service.
Design the Active Directory infrastructure to meet business and technical requirements.
Design the network services infrastructure to meet business and technical requirements.
Identify network topology and performance levels.
Analyze the impact of the infrastructure design on the existing technical environment.
Creating the Logical Design for an Active Directory Infrastructure.
Design a security group strategy.
Design a user and computer authentication strategy.
Design a user and computer account strategy.
Design an Active Directory naming strategy.
Design migration paths to Active Directory.
Design a strategy for Group Policy implementation.
Design an Active Directory directory service site topology.
Creating the Logical Design for a Network Services Infrastructure.
Design a NetBIOS name resolution strategy.
Design security for remote access users.
Design a DNS service implementation.
Design a remote access strategy.
Design an IP address assignment strategy.
Creating the Physical Design for an Active Directory and Network Infrastructure.
Specify the server specifications to meet system requirements.
Design the remote access infrastructure.
Exam 070-680
TS: Windows 7, Configuring
1. Windows 7 Deployment
1.1 Install Windows 7 using Autounattend answer file
1.2 Deploying Windows 7 Using a reference installation
1.3 Virtual Hard Disks in Windows 7
1.4 Shrinking a disk volume
2. Windows 7 User Interface
2.1 Aero Peek
2.2 Snap
2.3 Aero Shake
2.4 Jump List
2.5 Gadgets
3. Branch Cache
3.1 Configuring BranchCache
4. Application Locker
4.1 Configuring Application Locker
4.2 Applocker rule behavior
4.3 Monitoring Applocker
5. Internet Explorer 8
5.1 InPrivate Browsing
5.2 Web Slice
5.3 Internet Explorer Accelerators
5.4 SmartScreen Filter
5.5 General Internet Explorer Configurations
6. Bitlocker in Windows 7
6.1 Configuring Bitlocker To Go
6.2 Configuring Bitlocker To Go in Group Policy
7 Home Group
7.1 Creating a Home Group
7.2 Using HomeGroup
7.3 Domain-joined computers in HomeGroup
8. Encrypting File System (EFS)
8.1 Configure self signed certificate to use ECC algorithms
8.2 Sharing EFS file
9. Credential Manager
9.1 Adding a Credential
9.2 Using RunAs command
10. Direct Access
11. Windows Search
11.1 Configure Indexing Options
11.2 Federated Search in Windows 7
12. Backup and Restore
12.1 Perform Common backup
12.2 Create a system image
12.3 Perform system restore from an image
|