Somali regional state
Training manual
By
Brothers IT PLC
April, 2021
1. CCNA Course Overview
The Implementing and Administering Cisco Solutions (CCNA) v1.0 course gives you a broad
range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on
labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and
IPv6 networks. The course covers configuring network components such as switches, routers, and
wireless LAN controllers; managing network devices; and identifying basic security threats. The
course also gives you a foundation in network programmability, automation, and software-
defined networking.
This course helps you prepare to take the 200-301 Cisco® Certified Network Associate
(CCNA®) exam. By passing this one exam, you earn CCNA certification
Course details
Objectives
Identify the components of a computer network and describe their basic characteristics
Understand the model of host-to-host communication
Describe the features and functions of the Cisco Internetwork Operating System (IOS®)
software
Describe LANs and the role of switches within LANs
Describe Ethernet as the network access layer of TCP/IP and describe the operation of
switches
Install a switch and perform the initial configuration
Describe the TCP/IP Internet layer, IPv4, its addressing scheme, and sub netting
Describe the TCP/IP Transport layer and Application layer
Explore functions of routing
Implement basic configuration on a Cisco router
Explain host-to-host communications across switches and routers
Identify and resolve common switched network issues and common problems associated
with IPv4 addressing
Describe IPv6 main features and addresses, and configure and verify basic IPv6
connectivity
Describe the operation, benefits, and limitations of static routing
Describe, implement, and verify Virtual Local Area Networks (VLANs) and trunks
Describe the application and configuration of inter-VLAN routing
Explain the basics of dynamic routing protocols and describe components and terms of
Open Shortest Path First (OSPF)
Explain how Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol (RSTP)
work
Configure link aggregation using Ether Channel
Describe the purpose of Layer 3 redundancy protocols
Describe basic WAN and VPN concepts
Describe the operation of Access Control Lists (ACLs) and their applications in the
network
Configure Internet access using Dynamic Host Configuration Protocol (DHCP) clients and
explain and configure Network Address Translation (NAT) on Cisco routers
Describe basic Quality of Service (QoS) concepts
Describe the concepts of wireless networks, which types of wireless networks can be built,
and how to use Wireless LAN Controllers (WLCs)
Describe network and device architectures and introduce virtualization
Introduce the concept of network programmability and Software-Defined Networking
(SDN) and describe smart network management solutions such as Cisco DNA Center™,
Software-Defined Access (SD-Access), and Software-Defined Wide Area Network (SD-
WAN)
Configure basic IOS system monitoring tools
Describe the management of Cisco devices
Describe the current security threat landscape
Describe threat defense technologies
Implement a basic security configuration of the device management plane
Implement basic steps to harden network devices
Prerequisites
Before taking this course, you should have:
Basic computer literacy
Basic PC operating system navigation skills
Basic Internet usage skills
Basic IP address knowledge
Course Duration
Instructor-led training: 5 days in the classroom
Learning outcome
Learn the knowledge and skills to install, configure, and operate a small- to medium-sized
network
Gain a foundation in the essentials of networking, security, and automation
Target students
This course is designed for anyone seeking CCNA certification. The course also provides
foundational knowledge for all support technicians involved in the basic installation, operation,
and verification of Cisco networks.
The job roles best suited to the material in this course are:
Entry-level network engineer
Network administrator
Network support technician
Help desk technician
Outline
This class includes lecture sections and some self-study sections. In instructor-led classes, lectures
are delivered in real-time, either in person or via video conferencing. In e-learning classes, the
lectures are on recorded videos.
Section title Learning mode
Implementing VLANs and Trunks Lecture
Routing Between VLANs Lecture
Introducing OSPF Lecture
Building Redundant Switched Topologies Self-study
Improving Redundant Switched Topologies with EtherChannel Lecture
Exploring Layer 3 Redundancy Self-study
Introducing WAN Technologies Self-study
Explaining Basics of ACL Lecture
Enabling Internet Connectivity Lecture
Introducing QoS Self-study
Explaining Wireless Fundamentals Self-study
Introducing Architectures and Virtualization Self-study
Explaining the Evolution of Intelligent Networks Lecture
Introducing System Monitoring Lecture
Managing Cisco Devices Lecture
Examining the Security Threat Landscape Self-study
Implementing Threat Defense Technologies Self-study
Securing Administrative Access Lecture
Implementing Device Hardening Lecture
Sorry, no results matched your search criteria(s). Please try again.
Lab outline
Get Started with Cisco Command-Line Interface (CLI)
Observe How a Switch Operates
Perform Basic Switch Configuration
Implement the Initial Switch Configuration
Inspect TCP/IP Applications
Configure an Interface on a Cisco Router
Configure and Verify Layer 2 Discovery Protocols
Implement an Initial Router Configuration
Configure Default Gateway
Explore Packet Forwarding
Troubleshoot Switch Media and Port Issues
Troubleshoot Port Duplex Issues
Configure Basic IPv6 Connectivity
Configure and Verify IPv4 Static Routes
Configure IPv6 Static Routes
Implement IPv4 Static Routing
Implement IPv6 Static Routing
Configure VLAN and Trunk
Troubleshoot VLANs and Trunk
Configure a Router on a Stick
Implement Multiple VLANs and Basic Routing Between the VLANs
Configure and Verify Single-Area OSPF
Configure and Verify EtherChannel
Improve Redundant Switched Topologies with EtherChannel
Configure and Verify IPv4 ACLs
Implement Numbered and Named IPv4 ACLs
Configure a Provider-Assigned IPv4 Address
Configure Static NAT
Configure Dynamic NAT and Port Address Translation (PAT)
Implement PAT
Log into the WLC
Monitor the WLC
Configure a Dynamic (VLAN) Interface
Configure a DHCP Scope
Configure a WLAN
Define a Remote Access Dial-In User Service (RADIUS) Server
Explore Management Options
Explore the Cisco DNA™ Center
Configure and Verify NTP
Configure System Message Logging
Create the Cisco IOS Image Backup
Upgrade Cisco IOS Image
Configure WLAN Using Wi-Fi Protected Access 2 (WPA2) Pre-Shared Key (PSK) Using
the GUI
Secure Console and Remote Access
Enable and Limit Remote Access Connectivity
Secure Device Administrative Access
Configure and Verify Port Security
Implement Device Hardening
2. Windows Active Directory
Course 10969-B: Active Directory® Services with Windows Server®
5 Days
Instructor-led training
Advanced
English
Get Hands on instruction and practice administering Active Directory
technologies in Windows Server and Windows Server in this 5-day Microsoft
Official Course. You will learn the skills you need to better manage and
protect data access and information, simplify deployment and management
of your identity infrastructure, and provide more secure access to data. You
will learn how to configure some of the key features in Active Directory such
as Active Directory Domain Services (AD DS), Group Policy, Dynamic Access
Control (DAC), Work Folders, Work Place Join, Certificate Services, Rights
Management Services (RMS), Federation Services, as well as integrating your
on premise environment with cloud based technologies such as Windows
Azure Active Directory. As part of the learning experience, you will perform
hands-on exercises in a virtual lab environment.
Target students
This course is intended for Information Technology (IT) Professionals who
have Active Directory Domain Services (AD DS) experience and are looking to
for a single course that will further develop knowledge and skills using Access
and Information Protection technologies in Windows Server and Windows
Server. This would typically include:
AD DS Administrators who are looking to further develop skills in the latest
Access and Information Protection technologies with Windows Server and
Windows Server R2.
System or Infrastructure administrators with general AD DS experience and
knowledge who are looking to build upon that core knowledge and cross-train
into advanced Active Directory technologies in Windows Server and Windows
Server R2.
IT Professionals who have taken the 10967A: Fundamentals of a Windows
Server Infrastructure course and are looking to build upon that Active
directory knowledge.
Skills gained
Understand available solutions for identity management and be able to
address scenarios with appropriate solutions.
Deploy and administer AD DS in Windows Server .
Secure AD DS deployment.
Implement AD DS sites, configure and manage replication
Implement and manage Group Policy
Manage user settings with Group Policy
Implement certification authority (CA) hierarchy with AD CS and how to
manage CAs.
Implement, deploy and manage certificates.
Implement and manage AD RMS.
Implement and administer AD FS.
Secure and provision data access using technologies such as Dynamic Access
Control, Work Folders and Workplace Join
Monitor, troubleshoot and establish business continuity for AD DS services.
Implement Windows Azure Active Directory.
Implement and administer Active Directory Lightweight Directory Services (AD
LDS).
Show more
Prerequisites
Before attending this course, students must have:
Experience working with Active Directory Domain Services (AD DS)
Experience working in a Windows Server Infrastructure enterprise environment
Experience working with and troubleshooting core networking infrastructure
technologies such as name resolution, IP Addressing, Domain Name System
(DNS) and Dynamic Host Configuration Protocol (DHCP)
Experience working with Hyper-V and Server Virtualization concepts
An awareness and understanding of general security best practices
Experience working hands on with Windows client operating systems such as
Windows Vista, Windows 7 or Windows 8
Course outline
Module 1: Overview of Access and Information Protection
This module provides an overview of multiple Access and Information Protection
(AIP) technologies and services what are available with Windows Server and
Windows Server from a business perspective and maps business problems to
technical solutions. It also includes coverage of Forefront Identify Manager (FIM).
Lessons
Introduction to Access and Information Protection Solutions in Business
Overview of AIP Solutions in Windows Server
Overview of FIM 2010 R2
Lab : Choosing an Appropriate Access and Information Protection
Management Solution
After completing this module students will be able to:
Describe Access and Information Protection solutions in business.
Describe Access and Information Protection solutions in Windows Server and
Windows Server R2.
Describe Microsoft Forefront Identity Manager (FIM) 2010 R2.
Module 2: Advanced Deployment and Administration of AD DS
This module explains how to deploy AD DS remotely and describes the virtualization
safeguards, cloning abilities and extending AD DS to the cloud.
Lessons
Deploying AD DS
Deploying and Cloning Virtual Domain Controllers
Deploying Domain Controllers in Windows Azure
Administering AD DS
Lab : Deploying and Administering AD DS
After completing this module, students will be able to:
Describe and perform various deployment techniques for AD DS.
Describe virtual domain controller deployment considerations.
Explain how new technologies in Windows Server and Windows Server support
virtual domain controllers.
Describe Domain Controller cloning.
Implement AD DS using the tools provided in Windows Server and Windows
Server R2.
Module 3: Securing AD DS
This module describes the threats to domain controllers and what methods can be
used to secure the AD DS and its domain controllers.
Lessons
Securing Domain Controllers
Implementing Account Security
Implementing Audit Authentication
Lab : Securing AD DS
After completing this module, students will be able to:
Understand the importance of securing domain controllers.
Describe the benefit of read-only domain controllers (RODCs).
Explain and implement password and account lockout policies.
Implement audit authentication.
Module 4: Implementing and Administering AD DS Sites and Replication
This module explains how AD DS replicates information between domain controllers
within a single site and throughout multiple sites. This module also explains how to
create multiple sites and how to monitor replication to help optimize AD DS
replication and authentication traffic.
Lessons
Overview of AD DS Replication
Configuring AD DS Sites
Configuring and Monitoring AD DS Replication
Lab : Implementing AD DS Sites and Replication
After completing this module, students will be able to:
Describe AD DS replication.
Configure AD DS sites.
Configure and monitor AD DS replication.
Module 5: Implementing Group Policy
This module describes Group Policy, how it works, and how best to implement it
within your organization.
Lessons
Introducing Group Policy
Implementing and Administering GPOs
Group Policy Scope and Group Policy Processing
Troubleshooting the Application of GPOs
Lab : Implementing and Troubleshooting a Group Policy Infrastructure
After completing this module, students will be able to:
Describe Group Policy.
Implement and administer GPOs.
Describe Group Policy scope and Group Policy processing.
Troubleshoot the application of GPOs.
Module 6: Managing User Settings with Group Policy
This module describes how to how to use GPO Administrative Templates, Folder
Redirection, and Group Policy features to configure users’ computer settings.
Lessons
Implementing Administrative Templates
Configuring Folder Redirection and Scripts
Configuring Group Policy Preferences
Lab : Managing User Desktops with Group Policy
After completing this module, students will be able to:
Implement Administrative Templates.
Configure Folder Redirection and scripts.
Configure Group Policy preferences.
Module 7: Deploying and Managing AD CS
This module explain how to deploy and manage Certificate Authorities (CAs) with
Active Directory Certificate Services (AD CS)
Lessons
Deploying CAs
Administering CAs
Troubleshooting, Maintaining, and Monitoring CAs
Lab : Deploying and Configuring a Two-Tier CA Hierarchy
After completing this module, students will be able to:
Deploy Certificate Authorities.
Administer Certificate Authorities.
Troubleshoot, maintain, and monitor Certificate Authorities.
Module 8: Deploying and Managing Certificates
This module describes certificate usage in business environments and explains how
to deploy and manage certificates, configure certificate templates and manage
enrolment process. This module also covers the deployment and management of
smart cards.
Lessons
Using Certificates in a Business Environment
Deploying and Managing Certificate Templates
Managing Certificates Deployment, Revocation, and Recovery
Implementing and Managing Smart Cards
Lab : Deploying and Using Certificates
After completing this module, students will be able to:
Use certificates in business environments.
Deploy and manage certificate templates.
Manage certificates deployment, revocation and recovery.
Implement and manage smart cards.
Module 9: Implementing and Administering AD RMS
This module introduces Active Directory Rights Management Services (AD RMS). It
also describes how to deploy AD RMS, how to configure content protection, and how
to make AD RMS–protected documents available to external users.
Lessons
Overview of AD RMS
Deploying and Managing an AD RMS Infrastructure
Configuring AD RMS Content Protection
Configuring External Access to AD RMS
Lab : Implementing an AD RMS Infrastructure
After completing this module, students will be able to:
Describe AD RMS.
Explain how to deploy and manage an AD RMS infrastructure.
Explain how to configure AD RMS content protection.
Explain how to configure external access to AD RMS.
Module 10: Implementing and Administering AD FS
This module explains AD FS, and then provides details on how to configure AD FS in
both a single organization scenario and in a partner organization scenario. This
module also describes the Web Application Proxy feature in Windows Server that
functions as an AD FS proxy and reverse proxy for web-based applications.
Lessons
Overview of AD FS
Deploying AD FS
Implementing AD FS for a Single Organization
Deploying AD FS in a Business-to-Business Federation Scenario
Extending AD FS to External Clients
Lab : Implementing AD FS
After completing this module, students will be able to:
Describe AD FS.
Explain how to configure the AD FS prerequisites, and deploy AD FS services.
Describe how to implement AD FS for a single organization.
Deploy AD FS in a business-to-business federation scenario.
Deploy the Web Application Proxy.
Module 11: Implementing Secure Shared File Access
This module explains how to use Dynamic Access Control (DAC), Work Folders, Work
place Join and how to plan and implement these technologies.
Lessons
Overview of Dynamic Access Control
Implementing DAC Components
Implementing DAC for Access Control
Implementing Access Denied Assistance
Implementing and Managing Work Folders
Implementing Workplace Join
Lab : Implementing Secure File Access
After completing this module, students will be able to:
Describe DAC.
Implement DAC components.
Implement DAC for access control.
Implement access-denied assistance.
Implement and manage Work Folders.
Implement Workplace Join.
Module 12: Monitoring, Managing, and Recovering AD DS
This module explains how to use tools that help monitor performance in real time,
and how to record performance over time to spot potential problems by observing
performance trends. This module also explains how to optimize and protect your
directory service and related identity and access solutions so that if a service does
fail, you can restart it as quickly as possible.
Lessons
Monitoring AD DS
Managing the AD DS Database
AD DS Backup and Recovery Options for AD DS and Other Identity and Access
Solutions
Lab : Monitoring AD DS
Lab : Recovering Objects in AD DS
After completing this module, students will be able to:
Monitor AD DS.
Manage the AD DS database.
Recover objects from the AD DS database.
Module 13: Implementing Windows Azure Active Directory
This module explains the concepts and technologies in Windows Azure Active
Directory and how to implement and integrate it within your organization
Lessons
Overview of Windows Azure AD
Managing Windows Azure AD Accounts
Lab : Implementing Windows Azure AD
After completing this module, students will be able to:
Describe Windows Azure AD.
Administer Azure AD.
Module 14: Implementing and Administering AD LDS
This module explains how to deploy and configure Active Directory
Lightweight Directory Services (AD LDS)
Lessons
Overview of AD LDS
Deploying AD LDS
Configuring AD LDS Instances and Partitions
Configuring AD LDS Replication
Integrating AD LDS with AD DS
Lab : Implementing and Administering AD LDS
After completing this module, students will be able to:
Describe AD LDS.
Explain how to deploy AD LDS.
Explain how to configure AD LDS instances and partitions.
Explain how to configure AD LDS replication.
3.Administering Microsoft Exchange Server
2016/2019
Course 20345-1-B: Administering Microsoft Exchange Server
2016/2019
5 Days
Instructor-led training
Advanced
English
This course teaches IT professionals how to administer and support Exchange
Server. The course covers how install and configure Exchange Server. It also
covers how to manage mail recipients and public folders, including how to
perform bulk operations by using Exchange Management Shell. In addition,
the course covers how to manage client connectivity, message transport and
hygiene, and highly available Exchange Server deployments. It also covers
how to implement disaster recovery solutions. Finally, the course covers how
to maintain and monitor an Exchange Server deployment and how to
administer Exchange Online in a Office 365 deployment.
Target students
The audience for this course includes enterprise-level messaging
administrators on Exchange Server. IT generalists and helpdesk professionals
who want to learn about Exchange Server may also take this course. Students
taking this course are expected to have at least two years of experience
working in the IT field—typically in the areas of Windows Server
administration, network administration, helpdesk, or system administration.
They are also expected to have some experience with Exchange Server
concepts but previous experience managing Exchange Server is not a
requirement.
Skills gained
Deploy Exchange Server.
Plan and configure storage for Exchange Server.
Create and manage various recipient objects in Exchange Server.
Perform recipient management and Exchange server management tasks by
using Exchange Server cmdlets.
Deploy Client Access services in Exchange Server.
Manage high availability in Exchange Server.
Implement disaster recovery for Exchange Server.
Configure and manage message transport in Exchange Server.
Configure message security in Exchange Server.
Monitor and troubleshoot Exchange Server.
Configure Exchange Server role-based access control permissions and
configure audit logging for both administrators and users.
Implement and manage integration with Exchange Online.
Show more
Prerequisites
In addition to their professional experience, students who attend this training should
already have the following technical knowledge:
Minimum of two years of experience administering Windows Server.
Minimum of two years of experience working with Active Directory Domain
Services (AD DS).
Minimum of two years of experience working with name resolution, including
Domain Name System (DNS).
Understanding of TCP/IP and networking concepts.
Understanding of security concepts such as authentication and authorization.
Understanding of Simple Mail Transfer Protocol (SMTP).
Working knowledge of public key infrastructure (PKI) technologies, including
Active Directory Certificate Services (AD CS).
Course outline
Module 1: Deploying Exchange Server
This module explains the key features and architecture of Exchange Server. It also
explains the prerequisites and requirements for deploying Exchange Server.
Additionally, it explains how to use the Exchange admin center and the Exchange
management shell to manage Exchange Server.
Lessons
Overview of Exchange Server
Exchange Server architecture
Requirements for Exchange Server
Deploying Exchange Server Exchange Server
Exchange Server Management Tools
Lab : Deploying Exchange Server
Evaluating requirements and prerequisites for an Exchange Server 2019
installation
Deploying Exchange Server 2019
Verifying Exchange Server functionality
Installing Exchange Server 2019 on Windows Server Core 2019 (optional)
After completing this module, students will be able to:
Describe the key features and functionality of Exchange Server.
Describe the Exchange Server architecture.
Describe the requirements and options for deploying Exchange Server.
Deploy Exchange Server.
Describe how to use management tools to manage Exchange Server.
Module 2: Managing Exchange Server 2016 storage
This module explains the features of Exchange Server mailbox databases and the
storage options available for Exchange Server. It also explains how to configure
Exchange Server mailbox databases and storage.
Lessons
Exchange Server mailbox databases
Exchange Server storage
Configuring Exchange Server mailbox databases and storage
Lab : Configuring Exchange Server storage
Creating and configuring mailbox databases
After completing this module, students will be able to:
Describe the features of Exchange Server mailbox databases.
Explain the storage options available for Exchange Server.
Configure Exchange Server mailbox databases and storage.
Module 3: Managing recipient objects
This module explains how to manage the user, shared, resource, public folder,
arbitration mailboxes in Exchange Server. It also explains how to manage contacts,
mail users, and distribution groups in Exchange Server. Finally, it explains how to
configure address lists and email address and address book policies in Exchange
Server.
Lessons
Managing user mailboxes
Managing other types of mailboxes
Managing other recipients objects
Configuring policies and adress lists
Lab : Managing recipient objects
Configuring recipient objects
Managing public folder mailboxes
Lab : Configuring address lists and policies
Managing email address policies
Managing address lists and address book policies
After completing this module, students will be able to:
Manage user mailboxes in Exchange Server.
Manage shared, resource, public folder, and arbitration mailboxes in Exchange
Server.
Manage contacts, mail users, and distribution groups in Exchange Server.
Configure address lists, and email address and address book policies in
Exchange Server.
Module 4: Managing recipients and Exchange servers by using Exchange
Server cmdlets
This module describes how to manage recipients by using Exchange Server cmdlets.
It also explains how to manage Exchange servers by using Exchange Server cmdlets
and scripts.
Lessons
Overview of the Exchange Management Shell
Managing Exchange Servers by using Exchange Management Shell cmdlets
Managing Exchange servers by using scripts
Lab : Managing Exchange Server and recipient objects by using Exchange
Management Shell
Using Exchange Management Shell to manage recipients
Using Exchange Management Shell to manage Exchange Server
After completing this module, students will be able to:
Manage recipients by using Exchange Server cmdlets.
Manage Exchange servers by using Exchange Server cmdlets.
Manage Exchange servers by using scripts.
Module 5: Implementing client connectivity
This module explains how to configure and manage client access services in
Exchange Server. It also explains the client connectivity options for Exchange Server
and how to configure Outlook on the web. Additionally, it explains how to configure
mobile messaging for Exchange Server.
Lessons
Configuring client access services
Managing client access services
Client connectivity in Exchange Server
Configuring Outlook on the web
Configuring mobile messaging
Lab : Configuring client access services
Configuring namespaces for client access
Configuring certificates for client access
Configuring custom MailTips
Lab : Deploying and configuring client access services on Exchange Server
Configuring Exchange Server for Outlook
Configuring Outlook on the web
Configuring Microsoft Exchange ActiveSync
After completing this module, students will be able to:
Configure client access services in Exchange Server.
Manage client access services.
Describe client connectivity and publishing of Exchange Server services.
Configure Outlook on the web.
Configure mobile messaging on Exchange Server.
Module 6: Managing high availability in Exchange Server
This module describes the high availability options for Exchange Server. It also
explains how to configure highly available mailbox databases and Client Access
services by using load balancing methods.
Lessons
High availability on Exchange Server
Configuring highly available mailbox databases
Configuring high availability of Client Access services
Lab : Implementing DAGs
Creating and configuring a DAG
Lab : Implementing and testing high availability
Deploying a high availability solution for Client Access services
Testing the high availability configuration
After completing this module, students will be able to:
Describe the high availability in Exchange Server.
Configure highly available mailbox databases.
Configure high available Client Access services.
Module 7: Implementing disaster recovery for Exchange Server
This module describes Exchange Server backup and restore features and the details
that you need to consider when you create a backup plan.
Lessons
Implementing Exchange Server backup
Implementing Exchange Server recovery
Lab : Backing up Exchange Server data
Backing up an Exchange Server mailbox database
Lab : Restoring Exchange Server data
Restoring Exchange Server mailbox
Restoring a database availability group (DAG) member (optional)
After completing this module, students will be able to:
Back up Exchange Server data.
Restore Exchange Server data by using the configured backups.
Module 8: Configuring and managing message transport
This module explains messaging transport in Exchange Server. It also explains how
to configure message transport in Exchange Server and manage transport rules in
Exchange Server.
Lessons
Overview of message transport
Configuring message transport
Managing transport rules
Lab : Configuring and managing message transport
Configuring message transport
Monitoring and verifying message delivery
Configuring a disclaimer transport rule
Configuring a DLP policy for financial data
After completing this module, students will be able to:
Describe messaging transport in Exchange Server.
Configure message transport in Exchange Server.
Manage transport rules in Exchange Server.
Module 9: Configuring message security
This module describes how to deploy and manage an Edge Transport server for
message security. It also explains how to implement antivirus and antispam
solutions for Exchange Server.
Lessons
Deploying and managing an Edge Transport server for message security
Implementing an antivirus solution for Exchange Server
Implementing an antispam solution for Exchange Server
Lab : Configuring message security in Exchange Server
Configuring and testing EdgeSync
Configuring antivirus, antispam and malware protection features
After completing this module, students will be able to:
Deploy and manage an Edge Transport server for message security.
Implement an antivirus solution for Exchange Server.
Implement an antispam solution for Exchange Server.
Module 10: Monitoring and troubleshooting Exchange Server
This module explains how to configure performance monitoring and troubleshoot
issues in Exchange Server.
Lessons
Monitoring Exchange Server
Troubleshooting Exchange Server
Lab : Monitoring and troubleshooting Exchange Server
Monitoring Exchange Server
Troubleshooting database availability
Troubleshooting Client Access servers
After completing this module, students will be able to:
Configure performance monitoring in Exchange Server.
Troubleshoot issues in Exchange Server.
Module 11: Securing and maintaining Exchange Server
This module explains how to secure Exchange Server by using role-based access
control (RBAC). It also explains how to configure audit logging in Exchange Server
and how to maintain and update Exchange Server.
Lessons
Securing Exchange Server by using RBAC
Configuring audit logging in Exchange Server
Maintaining Exchange Server
Lab : Securing and maintaining Exchange Server
Configuring Exchange Server permissions
Configuring audit logging
Maintaining Exchange Server
After completing this module, students will be able to:
Secure Exchange Server by using RBAC.
Configure audit logging in Exchange Server.
Maintain and update Exchange Server.
Module 12: Implementing and managing Exchange Online deployments
This module explains Exchange Online and Office 365 and how to manage it. It also
explains how to implement a migration to Exchange Online.
Lessons
Overview of Exchange Online and Office 365
Managing Exchange Online
Implementing the migration to Exchange Online
Managing a hybrid environment
Lab : Managing Exchange Online
Managing Exchange Online
After completing this module, students will be able to:
Provide an overview of Exchange Online and Office 365.
Manage Exchange Online.
Implement a migration to Exchange Online.