" /> System Engineer | Compu21

Setup Menus in Admin Panel


Setup Menus in Admin Panel

System Engineer

I. MCITP Overview The Microsoft Certified IT Professional (MCITP) certification helps validate that an individual has the comprehensive set of …


    I. MCITP


    The Microsoft Certified IT Professional (MCITP) certification helps validate that an individual
    has the comprehensive set of skills necessary to perform a particular job role, such as database administrator or enterprise messaging administrator. MCITP certifications build on the technical proficiency measured in the Microsoft Certified Technology Specialist (MCTS) certifications. Therefore, you will earn one or more MCTS certifications on your way to earning an MCITP certification.


    TS: Windows 7, Configuring

    • Installing, Upgrading, and Migrating to Windows 7
    • Deploying Windows 7
    • Configuring Hardware and Applications
    • Configuring Network Connectivity
    • Configuring Access to Resources
    • Configuring Mobile Computing
    • Monitoring and Maintaining Systems that Run Windows 7
    • Configuring Backup and Recovery Options

    Windows Server 2008 Active Directory, Configuring

    • Configuring Domain Name System (DNS) for Active Directory
    • Configuring the Active Directory infrastructure
    • Configuring additional Active Directory server roles
    • Creating and maintaining Active Directory objects
    • Maintaining the Active Directory environment
    • Configuring Active Directory Certificate Services

    TS: Windows Server 2008 Network Infrastructure, Configuring

    • Configuring IP Addressing and Services
    • Configuring Name Resolution
    • Configuring Network Access
    • Configuring File and Print Services
    • Monitoring and Managing a Network Infrastructure

    TS: Windows Server 2008 Applications Infrastructure, Configuring

    • Deploying Servers
    • Configuring a Web Services Infrastructure
    • Configuring Terminal Services
    • Configuring Network Application Services

    Windows Server 2008, Enterprise Administrator

    • Planning network and application services
    • Designing core identity and access management components
    • Designing support identity and access management components
    • Designing for business continuity and data availability
    • Microsoft Exchange Server 2010

    TS: Microsoft Exchange Server 2010, Configuring

    • Installing and Configuring Exchange Servers
    • Configuring Exchange Recipients and Public Folders
    • Configuring Client Access
    • Configuring Message Transport
    • Monitoring and Reporting
    • Implementing High Availability and Recovery
    • Configuring Message Compliance and Security

    Pro: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010

    • Planning the Exchange Server 2010 Infrastructure
    • Deploying the Exchange Server 2010 Infrastructure
    • Designing and Deploying Security for the Exchange Organization
    • Designing and Deploying Exchange Server 2010 Availability and Recovery
    • Designing and Deploying Messaging Compliance, System Monitoring, and Reporting

    II. A+


    • Storage devices
    • Motherboards
    • Power Supplies
    • Processor / CPU
    • Memory
    • Display devices
    • Input devices
    • Adapter cards
    • Ports and cables
    • Storage devices: Drive
    • Driver / firmware updates, Scheduling preventive maintenance


    Principles of laptops and portable devices

    • Form factors – memory and hard drives,  Peripherals -docking station, Expansion slots – PCMCIA I, II and III,  Communication connections – Bluetooth, infrared, cellular WAN, Ethernet, Power and electrical input devices – auto-switching and fixed-input power, supplies, batteries, Input devices -stylus / digitizer, function (Fn) keys and pointing devices such as touch pad, point stick / track point,

    Install, configure, optimize and upgrade laptops and portable devices

    • Power management: features of BIOS-ACPI, suspend, hibernate and standby
    • Safe removal of hardware, hot-swappable devices and non-hot-swappable devices

    UNIT 3. OPERATING SYSTEMS: Windows 2003/2008, Windows 7/ XP/Vista, and Media Center

    • Differences between operating systems (Mac, Windows, Linux) and revision levels – GUI, system requirements, application and hardware compatibility
    • Registry, virtual memory and file systems
    • Windows Explorer, My Computer, Control Panel, Command Prompt, My Network Places, Task bar / systray, Start Menu
    • Files: BOOT.INI, NTLDR, NTDETECT.COM, NTBOOTDD.SYS, Registry data files
    • Disks (active, primary, extended and logical partitions), File systems, Files -extensions, attributes

     Install, configure, optimize and upgrade operating systems

    • Hardware compatibility and minimum requirements, Installation methods – CD, floppy or USB, network installation, imaging, attended / unattended.
    • Upgrade (hardware, application compatibility), Implementation (backup data, install additional Windows components)
    • Device driver installation (automated and / or manual search and installation of device drivers), driver signing, device manager
    • Optimize operating systems: virtual memory, temporary files, service, startup and applications

    Tools, diagnostic procedures and troubleshooting techniques for operating systems

    • Boot sequence, recovering OS, Boot methods – safe mode, recovery console, restore point, ASR, ERD
    • Operational issues such as bluescreen, system lock-up, start or load and Windows-specific printing problems (print spool stalled, incorrect / incompatible driver for print)
    • Common error messages and codes: -invalid boot disk, missing NTLDR
    • Operating system utilities: DEFRAG, NTBACKUP, CHKDSK, Format, device and task manager, MSCONFIG.EXE, Windows Explorer, ATTRIB.EXE

    Preventive maintenance on operating systems

    • software and Windows updates (service packs), scheduled backups / restore, restore points


    • Types:  laser, inkjet, thermal, solid ink, impact
    • Printer and scanner components (memory, driver) and consumables (toner, ink cartridge, paper)
    • Interfaces used by printers and scanners / port and cable type: Parallel, Network (NIC, print servers), USB, Serial, IEEE 1394 / firewire, Wireless -bluetooth, 802.11, infrared, SCSI


    • Addressing, , Bandwidth, indicators, Protocols – TCP / IP, IPX / SPX, NWLINK, NETBEUI / NETBIOS), Cables, Peer-to-peer and client / server.
    • Common network cables: Plenum / PVC, UTP (e.g. CAT3, CAT5 / 5e, CAT6), STP, Fiber
    • Connectors – RJ45 and RJ11, ST / SC / LC, MT-RJ
    • LAN / WAN, ISDN, Broadband -DSL, cable, satellite, Dial-up, Wireless, Infrared, Bluetooth, Cellular


    • Hardware and software security: Hardware deconstruction / recycling, Smart cards / biometrics – key fobs, cards, chips and scans, Authentication – user name, password, biometrics, smart cards, Malicious software -viruses, Trojans, worms, spam, spyware, adware, firewalls, File system security
    • Wireless security: Wireless encryption – WEP.x and WPA.x, Access points – disable DHCP / use static IP, disable SSID broadcast, MAC filtering, update firmware, firewall
    • Data access (basic local security policy), Encryption technologies, Backups, Data migration, Password management, Locking workstation

    Preventive maintenance for computer security

    • Installing service packs and patches


    • ESD precautions and procedures, safe work environment and equipment handling
    • Proper disposal procedures for batteries, display devices and chemical solvents and cans


    • Use good communication skills including listening and tact / discretion, when communicating with customers and colleagues
    • Use clear, concise and direct statements, Allow the customer to complete statements – avoid interrupting,  Clarify customer statements – ask pertinent questions, Avoid using jargon, abbreviations and acronyms, Listen to customers

    III. Network

    Networking Basics

    • Local Area Networks
    • Wide Area Networks
    • Broadband and Baseband
    • Client/Server Networking
    • Peer-to-Peer Networking
    • Protocols
    • The OSI Model

    Network Hardware

    • Physical Topologies
    • Network Cable Types
    • Network Interface Adapters
    • Hubs
    • Token Ring MAU
    • Bridges
    • Switches
    • Routers and Gateways

    Networking Software

    • Windows NT Operating System
    • Windows 2000 Operating System
    • Other Operating Systems
    • NetWare Operating System
    • UNIX Operating System
    • Windows Clients
    • NetWare Clients
    • NetWare Bindery
    • Novell Directory Services
    • Windows NT Domains
    • Active Directory
    • Network Clients
    • Directory Services

    Network Security

    • Password Protection
    • User-Level Security
    • Share-Level Security
    • Firewalls
    • Packet Filtering
    • NAT

    Proxy Servers  802 Standards

    • Ethernet Specifications
    • Ethernet Cabling Guidelines
    • Ethernet Frame
    • Ethernet Addressing
    • CSMA/CD
    • Token Ring Specifications
    • Token Passing
    • Token Ring Frames

    Network Layer Protocols

    • IP, IPX, NetBEUI

    Transport Layer Protocols

    • TCP, UDP, SPX , NCP

    TCP/IP Fundamentals

    • TCP/IP Protocols
    • IP Addressing
    • Subnetting and supernetting

    Network Maintenance

    • Anti-Virus Policies
    • Preventing Virus Infections
    • Patches
    • Driver Updates
    • Software Upgrades
    • Backup

    Computer Ports

    • Serial Ports
    • Parallel Ports
    • Video Ports
    • Keyboard and Mouse Ports
    • USB Ports
    • SCSI Ports
    • Network Cable Connectors

    Configuring a Network

    • Selecting TCP/IP Parameters
    • Creating Accounts

    Fault Tolerance

    RAID Levels   TCP/IP Services

    • DHCP
    • HOST File and DNS
    • Forward/Reverse Query
    • DNS Resource Records
    • LMHOST File and WINS

    Routing Protocols

    • RIP, OSPF

    TCP/IP Utilities

    • Ping
    • Traceroute
    • Ifconfig and Ipconfig
    • ARP
    • Netstat
    • Nbtstat
    • Telnet
    • FTP

    Remote Network Access

    • PSTN – Public Switched Telephone Network
    • VPN – Virtual Private Network
    • ISDN – Integrated Services Digital Network
    • DSL – Digital Subscriber Line
    • CATV – Cable Television

    Network Testing

    • Crossover Cables
    • Hardware Loopback Connectors
    • Tone Generators
    • Wire Map Testers
    • Multifunction Cable Testers

    Logs and Indicators

    • Power and Drive Lights
    • Link Pulse Lights
    • Error Displays
    • Event Logs
    • Network Management Products
    • Performance Monitors
    • Protocol Analyzers

    IV. Security +

    Unit 1: Security Fundamentals

    • Security Building Blocks
    • Authentication Methods
    • Cryptography Fundamentals
    • Security Policy Fundamentals
    • Types of attacks
    • Firewalls

    Unit 2: Security Threats

    • Social Engineering
    • Software-Based Threats
    • Hardware-Based Threats

    Unit 3: Hardening Internal Systems and Services

    • Harden Operating Systems
    • Harden Directory Services
    • Harden DHCP Servers
    • Harden File and Print Servers
    • Manage Access Control

    Unit 4: Hardening Internetwork Devices and Services

    • Harden Internetwork Connection Devices
    • Harden DNS and BIND Servers
    • Harden Web Servers
    • Harden FTP Servers
    • Harden NNTP Servers
    • Harden Email Servers
    • Harden Conferencing and Messaging Servers

    Unit 5: Securing Network Communications

    • Protect Network Traffic with IP Security (IPSec)
    • Secure Wireless Traffic
    • Harden a Web Browser
    • Secure the Remote Access Channel

    Unit 6: Managing Public Key Infrastructure

    • Install a Certificate Authority (CA) Hierarchy
    • Harden a Certificate Authority
    • Back Up a CA
    • Restore a CA

    Unit 7: Managing Certificates

    • Enroll Certificates
    • Secure Network Traffic by Using Certificates
    • Renew Certificates
    • Revoke Certificates and manage CRL
    • Back Up Certificates and Private Keys
    • Restore Certificates and Private Keys

    Unit 8: Enforcing Organizational Security Policies

    • Enforce Corporate Security Policy Compliance
    • Enforce Legal Compliance
    • Enforce Physical Security Compliance
    • Educate Users

    Unit 9: Monitoring the Security Infrastructure

    • Scan for Vulnerabilities
    • Intrusion detection
    • Set Up a Honeypot
    • Respond to Security Incidents


    Part I.

    • Introduction to Red Hat Linux
    • Popularly used Linix commands
    • Introduction to Hardware and Device Configuration


    1) Unit 3 Lab in text book for RH033;

    2) commandline1.pdf;

    3) xterm exercise;

    4) vi exercise;

    5) set up putty

    Part II

    • Introduction to Red Hat Installation
    • User and Group Administration
    • System Initialization and Services and Run Level


    1) Exercise 1,2,6,7 in commandline2.pdf

    2) Install Virtual box and Red Hat Linux;

    3) Unit 4 Lab in text book for RH033

    Part III.

    • File system Management
    • RPM Management
    • Boot Loaders
    • Kernel Services and Configuration
    • Process control and task automation
    • Printing Service


    1) Exercise 3,4,5 in commandline2.pdf ;

    2) Build RPM;

    3) Booting into a maintenance runlevel;

    4) Setup crontab;

    5) Creating a new filesystem;

    6) adding swap

    Part IV.

    • System Administration Tools (/usr/sbin/system*; /usr/bin/system*)
    • Network Configuration
    • Linux Security
    • NFS Setup


    1) Get familiar with system-config-* utilities;

    2) Creation static network settings;

    3) Create a NFS system and an auto-mount home directory system;

    4) Set iptable rules

    Part V

    • DNS – Domain Name System
    • FTP – File Transfer Protocol
    • NIS – Network Information System
    • DHCP – Dynamic Host Configuration Protocol


    1) Configure DNS client (and server, optional);

    2) Configure anonymous FTP server;

    3) Configure a NIS server

    Part VI

    • Kickstart installation
    • Bash Shell Scripting
    • Other Advanced Topics – Performance tuning, etc


    1) Configure a kickstart installation server;

    2) Bash shell scripting exercise 1, 2, 3


    I. Fundamental Unix

    1. Introduction to Unix

    • Navigating around the Unix File System
    • Adding user accounts and set up user environment
    • Setting up file permission and authorization
    • Using VI editor manipulate text file

    2. Unix Essentials

    • Command scripts and introduction to shell programming
    • System Start & Shutdown sequences
    • Directories Structures & Unix File System
    • Disk commands and utilities
    • Schedule backup with cron

    3. Networking in UNIX-TCP/IP

    • Overview of TCP/IP
    • Setting up of Unix Network
    • Setting Up Network File System (NFS)

    4. Unix System Administration

    • Installation Solaris Operating System & 3rd Parties Software product
    • SAF-Service Access Facility–Terminal & Modem & Printer Setup

    5. Unix Networking

    • Routing Services – DNS
    • Introduction To NIS & NIS+
    • Setting up NIS+ server
    • Application in NIS+ Environment
    • Automount – features & setup
    • Sendmail – features and setup

    II. Advanced Unix Administrator

    It teaches students hand-by-hand about all of the major topics of a senior Unix administrator needs to know.

    1. Custom web start installation
    2. Network Installation
    3. Shell Scripting
    4. Oracle Installation
    5. Email Configuration
    6. NIS, NIS+, DNS, NFS, Automounter
    7. Apache Web Server
    8. Firewall Introduction (Checkpoint)

    Course Reviews

    No Reviews found for this course.

    • 10 Days

    Advanced Course Search Widget

    Popular Courses

    Recent Posts