IT Guides - Improve your IT Knowledge
- Access control - Basic SE and ISSE Principles
- Elements of Technical Management
- Information Security Governance and Risk Management - Security Management
- Operations Security - The Preliminary System Concept of Operations
- Security Architecture and Design - ISSE Activity-1
- Security Architecture and Design - system security requirements
- Security Services
- Software Development security - Defining System and Security Architecture
- Systems Engineering Activity
- Technical Management
- Describe IPV6 addresses
- Describe VPN technology (including: importance, benefits, role, impact, components)
- Analyze Subnetting and Addressing Needs
- Frame Relay and Packet-Switching Services
- Improving Performance by Using Switches Instead of Hubs
- OSI Networking Model
- Routing (Forwarding)
- TCP/IP Networking Model
- Configuring Active Directory Infrastructure - configuring the global catalog
- Configuring Active Directory Infrastructure - domain and forest functional levels
- Configuring Active Directory Roles and Services - Read-only domain controllers
- Configuring Domain Name System for Active Directory
- Creating and Maintaining Active Directory Object - Group Policy Architecture
- Creating and Maintaining Active Directory Objects - finegrain password policies
- Creating and Maintaining Active Directory Objects - group accounts
- Creating and Maintaining Active Directory Objects - user accounts
- Creating DHCP Scopes
- Device Drivers and the OSI Model
- DHCP
- Subnetting a Network
- Understanding DNS Components
- Understanding IP Addressing
- Understanding IPv6
- Understanding TCP/IP
- Understanding the OSI Model
- Windows Network Models
- Configure Remote Desktop licensing - deploy licensing server
- Configuring a web services infrastructure - simple mail transfer protocol
- Configuring network application services streaming media
- Configuring Remote Desktop Services - remote desktop connections
- Deploying Servers - failover clusters
- Deploying Servers - network load balancing
- Deploying Servers - snapshots
- Deploying Servers - virtual hard disks
- Configuring a VPN Server
- Configuring Clients through DHCPv6
- Configuring IPv4 Addressing
- Configuring IPv6 Addressing
- Configuring Static Routing
- Network Address Translation
- Using IPv6 Tools
- Using Routing Information Protocol
- Windows Server 2008 and RADIUS
- Analyzing the IPv6 Address Structure
- Determine which edition of Windows Server is appropriate for a specific set of circumstances
- IPv4-to-IPv6 Compatibility and Transition to IPv6
- Multicast, Scheduled, and Automatic Deployment
- Plan for the installation of or upgrade to Windows Server 2008 or Windows Server 2008 R2
- Planning an IPv6 Network
- Planning Windows Server 2008 and Windows Server 2008 R2 DNS
- Using IPv6 Tools
- Windows Deployment Services
- Windows Server 2008 R2 Answer Files
- Determining Signal Strength Influence
- Discusses wireless LAN topologies from a high-level perspective (Part I)
- Discusses wireless network topologies defined by the IEEE (Part II)
- How Bandwidth is achieved from RF Signals
- Influences on Wireless Transmissions
- Modulation Techniques and How They Work
- Principles of Antennas
- Configuring Backup and Recovery Options - configure backup - Backing up files, folders, or full system
- Configuring Backup and Recovery Options - Configure Backup - creating a system recovery disk
- Configuring Backup and Recovery Options - Configure file recovery options - restore user profiles
- Configuring Backup and Recovery Options - configure file recovery options - Restoring damaged and deleted files by using shadow copies
- Configuring Backup and Recovery Options - Configure System Recovery Options
- Configuring Backup and Recovery Options - Configure System Recovery Options - restore system settings
- Operating Systems And Software - Configure Power Management
- Operating Systems And Software - Device Manager
- Operating Systems And Software - File systems
- Operating Systems And Software - Virtual Memory
- Operational Procedure - Physical Safety
- Security - Encryption Technologies
- Security - Malicious Software Protection
- Security - Usernames and Passwords
- Configuring Public Folder Limits
- Create and configure address lists
- Create and configure mailbox databases
- Create and configure public folder databases
- Create and Configure Public Folders
- Create Mailboxes
- Determine which software components need to be installed prior to deploying Exchange Server 2010
- Mail Contacts
- Mail-Enabled Users
- Prepare the Active Directory environment for the introduction of Exchange Server 2010
- Create an EIGRP verification Plan
- Create an OSPF Verification Plan
- Describe Basic VPN Technologies
- Describe Network resources for implementing EIGRP in a network
- Determine Network Resources needed for Implementing OSPF on a Network
- Troubleshoot Access-ports for VLAN Based Solution