MCITP Certification

Do you want to be taken seriously as an IT professional, who has the knowledge and expertise not only to design but also implement the technical infrastructure for solutions for business that are based on the Microsoft Windows and .NET Enterprise platform? If yes, then the Microsoft Certifications for IT Professionals(MCITP)certification is a must.
Enrol in our MCITP certification course that is hands-on for 10 weeks and includes a free mock-exam. You also get unlimited practice hours.
Once you have the MCITP certification, it also indicates that you have spent time and dedication towards this field and that you have what it takes to get the job done. That is the number one reason why employers stress on MCITP certification training. Employees who work for consulting organizations also know that their customers recognize the value of MCITP certification training. They look for and ask MCITP certified individuals. MCITP certification will also improve your productivity and confidence needed, which will help you to grow in your career.

Microsoft Certifications for IT Professionals(MCITP)
MCITP: Enterprise Administrator Windows 2008 Server and Windows 7
Tutor Led, Practical Oriented and Hands-on Vocational Training

Certifications CCNA Duration : 190 hrs
Microsoft Certifications for IT Professionals (MCITP) Windows 2008 Exams:
■ MCIPT Exam 70-640 Windows Server 2008 Active Directory Configuration
■ MCIPT Exam 70-642 Windows Server 2008 Network Infrastructure Configuration
■ MCIPT Exam 70-643 Windows Server 2008 Applications Infrastructure Configuration
■ MCIPT Exam 70-680 Windows 7 Configuration
■ MCIPT Exam 70-647: PRO: Windows Server 2008, Enterprise Administrator

MCITP Enterprise Administrator

Does your job profile include working with the Windows Server 2008 OS? If finding your way around the maze of WS 2008 architecture is child’s play for you, then going for the MCITP exam as an Enterprise Administrator would prove to be a valuable asset on your resume. The exam will make you credible for the in-demand job roles of Enterprise system/security administrator, network administrator, systems architect etc.
The MCITP certificate for EA is about infrastructure design. The core level business planning capabilities of students will be tested here. They will be required to offer suggestions, policies and plans for new technology practices and co-ordinate with the other business levels of an organization. They will also formulate security solutions and design key components that will affect an organization at multiple levels across the hierarchy. They will take an active part in an enterprise’s decision-making policies and devise key strategies that conform to the industry standards.
The applicants can make the best use of our state-of-the-art teaching technology as the students of London College, to gain maximum practical exposure to the industry standards in demand for this course.

MCITP certification Exam 70-640

Windows Server 2008 Active Directory Configuration

Configuring Domain Name System (DNS) for Active Directory
■ Configure zones.
■ Dynamic DNS (DENS), Non-dynamic DNS (NIDD'S), and Secure Dynamic DNS (SADDENS).
■ Time to Live (TITLE), Global Names, Primary, Secondary, Active Directory Integrated,  Stub, SOAK, zone scavenging, forward lookup, reverse lookup

DNS server settings, zone transfers and replication
■ Configure DNS, Forwarding, root hints, configure zone delegation, round robin, disable recursion, debug logging, server scavenging
■ Configure replication scope (forestDNSzone, domainDNSzone),  incremental zone transfers, DNS Notify, secure zone transfers
■ Configure name servers, application directory partitions.

Configuring the Active Directory Infrastructure
■ Configure a forest or a domain, Remove a domain, perform an unattended installation, Active Directory Migration Tool (ADMIT) 3M (pruning and grafting), raise forest and domain functional levels, interoperability with previous versions of Active Directory, alternate user principal name (PUN) suffix, forest prep, domain prep

Configure trusts, Sites, global catalog, operations masters and Active Directory replication
■ Forest trust, selective authentication versus forest-wide authentication, Transitive trust, external trust, shortcut trust, SID filtering, Create Active Directory subnets, configure site links,  Configure site link costing, configure sites infrastructure, Distributed File System, one-way replication, Bridgehead server, Replication scheduling, configure replication protocols, force interstice replication, Universal Group Membership Caching (GUM), Partial attribute set, promote to global catalog, Seize and transfer, backup operations master, operations master placement, Schema Master, extending the schema, time service

Configuring Additional Active Directory Server Roles
■ Configure Active Directory Lightweight Directory Service (AD LDS).
■ Migration to AD LDS, configure data within AD LDS,
■ Configure an authentication server, server core, Windows Server 2008 Hyper-VS.

Configure Active Directory Rights Management Service (AD RAMS).
■ Certificate request and installation, self-enrollments, delegation, Active Directory Met directory Services (AD MDS), Windows Server virtualization

Configure the read-only domain controller (ROD).
■ Unidirectional replication, Administrator role separation, read-only DNS, Bit Locker, credential caching, password replication, system, Windows Server virtualization

Configure Active Directory Federation Services (AD FS).
■ Install AD FS server role, exchange certificate with AD FS agents, configure trust policies, configure user and group claim mapping, Windows Server virtualization

Creating and Maintaining Active Directory Objects
■ Automate creation of Active Directory accounts.
■ Bulk import, configure the PUN, create computer, user, and group accounts (scripts, import, migration), template accounts, contacts, distribution lists

Maintain Active Directory accounts.
■ Configure group membership, account resets, delegation, AGEDLY/AGEDLY, deny domain local group, local versus domain, Protected Admin, disabling accounts versus deleting accounts, deprovisioning, contacts, creating organizational units (Oust), delegation of control

Create and apply Group Policy objects (Goes)
■ GPO templates and software deployment Goes Enforce, OUR hierarchy, block inheritance, and enabling user objects, group policy processing priority, WIMP, group policy filtering, group policy loopback User rights, ADMIX Central Store, administrative templates, security templates, restricted groups, security options, starter Goes, shell access policies Publishing to users, assigning software to users, assigning to computers, software removal

Configure account policies and audit policy by using Goes
■ Domain password policy, account lockout policy, Fine-grain password policies
Audit logon events, audit account logon events, Audit policy change, audit access privilege use, Audit directory service access, audit object access.

Maintaining the Active Directory Environment

Configure backup and recovery.
■ Using Windows Server Backup, back up files and system state data to media
■ Back up and restore by using removable media
■ Perform an authoritative or non-authoritative Active Directory restore
■ Linked value replication, Directory Services Recovery Mode (DORM) (reset admin password),
■ Back up and restore Goes

Perform offline maintenance
■ Offline defragmentation and compaction, Restart able Active Directory,
■ Active Directory database storage allocation

Monitor Active Directory
■ Network Monitor, Task Manager, Event Viewer
■ Revlon, Readmit, Windows System Resource Manager,
■ Reliability and Performance Monitor, Server Performance Advisor, SOP

Configuring Active Directory Certificate Services

Install Active Directory Certificate Services.
■ Standalone versus enterprise, CA hierarchies—root versus subordinate
■ Certificate requests, certificate practice statement

Configure CA server settings.
■ Key archival, certificate database backup and restore,
■ Assigning administration roles

Manage certificate templates, enrollments and certificate revocations
■ Certificate template types, securing template permissions, managing different certificate template versions, key recovery agent
■ Network device enrollment service (NODES), Auto enrollment,
■ Web enrollment, smart card enrollment, creating enrollment agents
■ Configure Online Responders, Certificate Revocation List (CURL),
■ CURL Distribution Point (CAP), Authority Information Access (ARIA)

MCITP certification Exam 70-642

Windows Server 2008 Network Infrastructure Configuration

Configuring IP Addressing and Services
■ Configure Ivy and Ivy addressing.
■ Configure IP options, subletting, super netting, alternative configuration

Configure Dynamic Host Configuration Protocol (DUCK)
■ DUCK options, creating new options, PIE boot, default user profiles, DUCK relay agents, exclusions, authorize server in Active Directory, scopes, server core, Windows Server Hyper-VS.
Configure routing IPSec, Name Resolution
■ Static routing, persistent routing, Routing Internet Protocol (RIP), Open Shortest Path First (SOP)
■ Create IPSec policy, IPSec Authentication Header (AH), IPSec Encapsulating Security Payload (ESP)

Configure a Domain Name System (DNS) server, DNS zones, DNS records and DNS replication
■ Conditional forwarding, external forwarders, root hints, cache-only, server core, WINS and DNS integration, Windows Server virtualization
■ DNS Refresh no-refresh, intervals, DNS listserv address (NSLOOKUP), primary/secondary zones, Active Directory integration, Dynamic Domain Name System (DENS), Global Names, SOAK refresh.
■ Record types, host, pointer, MIX, SERVE, NS, dynamic updates, Time to Live (TITLE).
■ DNS secondary zones, DNS stub zones, DNS scavenging interval, replication scope.

Configure name resolution for client computers
■ DNS and WINS integration, configuring HOSTS file, IMPOSTS, node type, Link-Local Multicast Name Resolution (LIMNER), broadcasting, resolver cache, DNS Server list, Suffix Search order, manage client settings by using group policy

Configuring Network Access, remote access, Network Access Protection (NAP) and network authentication.
■ Dial-up, Remote Access Policy, Network Address Translation (NAT), Internet Connection Sharing (ICS), VAN, Routing and Remote Access Services (ARRAS), inbound/outbound filters, configure Remote Authentication Dial-In User Service (RADIUS) server, configure RADIUS proxy, remote access protocols, Connection Manager
Network layer protection, DUCK enforcement, VAN enforcement, configure NAP health policies, IPSec enforcement, 802.ax enforcement, flexible host isolation.
■ LAN authentication by using NTLMv2 and Kerberos, WAN authentication by using 802.ax, RAS authentication by using MS-CHAP, MS-CHAP eve, and EARP.

Configure wireless access, firewall settings
■ Set Service Identifier (SAID), Wired Equivalent Privacy (WEEP), We-If Protected Access (SPA), We-If Protected Access 2 (WAR), ad hoc versus infrastructure mode, group policy for wireless.
■ Incoming and outgoing traffic filtering, Active Directory account integration, identify ports and protocols, Microsoft Windows Firewall versus Windows Firewall with Advanced Security, configure firewall by using group policy, isolation policy.

Configuring File and Print Services
■ Configure a file server.
■ File share publishing, Offline Files, share permissions, NETS permissions, encrypting file system (EVES)

Configure Distributed File System (DOFFS)
■ DOFFS namespace, DOFFS configuration and application, creating and configuring targets, DOFFS replication

Configure shadow copy services and backup and restore
■ Recover previous versions, set schedule, set storage locations
■ Backup types, backup schedules, managing remotely, restoring data
■ Manage disk quotas.
■ Quota by volume or quota by user, quota entries, quota templates

Configure and monitor print services
■ Printer share, publish printers to Active Directory, printer permissions, deploy printer connections, install printer drivers, export and import print queues and printer settings, add counters to Reliability and Performance Monitor to monitor print servers, print pooling, print priority

Monitoring and Managing a Network Infrastructure
■ Configure Windows Server Update Services (WISES) server settings.
update type selection, client settings, Group Policy object (GPO), client targeting, software updates, test and approval, disconnected networks

Capture performance data
■ Data Collector Sets, Performance Monitor, Reliability Monitor, monitoring System Stability Index

Monitor event logs
■ Custom views, application and services logs, subscriptions, DNS log
■ Gather network data.
■ Simple Network Management Protocol (SNMP), Baseline Security Analyzer, Network Monitor

MCITP certification Exam 70-643

Windows Server 2008 Applications Infrastructure Configuration

Deploying Servers

Deploy images by using Windows Deployment Services.
■  Install from media (IF), configure Windows Deployment Services, capture Windows Deployment Services images, deploy Windows Deployment Services images, server core

Configure Microsoft Windows activation
■ Install a KAMES server, create a DNS SERVE record, replicate volume license data

Configure Windows Server Hyper-VS. and virtual machines
■ Virtual networking, virtualization hardware requirements, Virtual Hard Disks, migrate from physical to virtual, VIM additions, backup, optimization, server core

Configure high availability, storage
■ Fail over clustering, Network Load Balancing, hardware redundancy, RAID types, Virtual Disk Specification (VS.) API, Network Attached Storage, discs and Fiber Channel storage area networks, mount points

Configuring Terminal Services

Configure Windows Server 2008 Terminal Services RemoteApp (TS RemoteApp)
■ Configuring Terminal Services Web Access, configuring Terminal Services Remote Desktop Web Connection

Configure Terminal Services Gateway, Terminal Services load balancing
■ Certificate configuration, Terminal Services Gateway Manager (TS Gateway Manager), specifying resources that users can access through TS Gateway by using Terminal Services resource authorization policy (TS RAP) and Terminal Services connection authorization policy (TS CAP), Terminal Services group policy
■ Terminal Services Session Broker redirection modes, DNS registration, setting through group policy.

Configure and monitor Terminal Services resources
■ Allocate resources by using Windows Server Resource Manager, configure application logging
Configure Terminal Services licensing, server options and Services client connections
■ Deploy licensing server, connectivity between terminal servers and Terminal Services licensing server, recovering Terminal Services licensing server, managing Terminal Services client access licenses (TS Calls)
■ Connecting local devices and resources to a session, Terminal Services profiles, Terminal Services home folders, Remote Desktop Connection (RED), single sign-on, Remote Desktop Snap-In, MASTS.exe
■ Logoff, disconnect, reset, remote control, monitor, Remote Desktop Protocol (RAP) permissions, connection limits, session time limits, managing by using Goes, viewing processes, session permissions, display data prioritization

Configuring a Web Services Infrastructure

Configure Web applications, Web sites, File Transfer Protocol (FTP) server and Simple Mail Transfer Protocol (SMTP)
■ Directory-dependent, publishing, URL-specified configuration, Microsoft .NET components, for example, .NET and asp, configure application pools.
■ Migrate sites and Web applications, publish IBIS Web sites, configure virtual directories
■ Configure for extranet users, configure permissions
■ Setting up smart hosts, configuring size limitations, setting up security and authentication to the delivering server, creating proper service accounts, authentication, SMTP relay

Manage Internet Information Services (IBIS), SAL security
■ Web site content backup and restore, IBIS configuration backup, monitor IBIS, configure logging, delegation of administrative rights
■ Configure certificates, requesting SAL certificate, renewing SAL certificate, exporting and importing certificates

Configure Web site authentication and permissions
■ Configure site permissions and authentication, configure application permissions, client certificate mappings

Configuring Network Application Services
■ Configure Windows Media server.
■ On-demand replication, configure time-sensitive content, caching and proxy
■ Configure Digital Rights Management (DRAM)
■ Encryption, sharing business rules, configuring license delivery, configuring policy templates
■ Configure Microsoft Windows SharePoint Services server options
■ Site permissions, backup, antivirus, configuring Windows SharePoint Services service accounts
■ Configure Windows SharePoint Services a-mail integration
■ Configuring a document library to receive a-mail, configuring incoming versus outgoing a-mail

MCITP certification Exam 70-680

MCITP certification Exam 70-680

Installing Windows 7
■ Introduction, Installing Windows 7 Using Image-Based Installation, Migrating User Settings, simper, image for deployment, Capture the image and copy to a network share, Image Using Image, disk and image the new computer, Migrate User Settings

Configure Hardware and Software
■ Capture a system image, preparing system for capture; creating a WIMP file; automated capture; manual capture
■ Prepare a system image for deployment., inserting an application into a system image; inserting a driver into a system image; inserting an update into a system image; configuring tasks to run after deployment
■ Deploy a system image, automated deployment methods; manually deploying a customized image
■ Configure a PHD, creating, deploying, booting, mounting, and updating PhDs; offline updates; offline servicing

Configure the Network
■ Configure Ivy network settings, setting up a network connection, network locations, resolving issues, APIA.
■ Configure Ivy network settings, Configuring name resolution; connecting to a network; setting up a connection for a network; network locations; resolving connectivity issues; link local multicast name resolution
■ Configure networking settings, physically connected(wired), wireless devices connecting to wireless network, configuring security, set preferred wireless.
■ Configure Windows Firewall., configuring authenticated exceptions, remote management, configuring remote management tools, executing PowerSheell Commands.

Configure TCP/IP Settings
■ Configure Static Ivy Settings, Configure Ivy for Dynamic IP Addressing, Configure Ivy Addressing, Configure TCP/IP settings using IVY and Ivy, Using PING, ipconfig, tracer, nslookup, Configure Windows Firewall, Configure Remote Management, Configure Remote Desktop

Sharing and Securing Resources
■ Configure Shared Resources, Home Group Settings, User Account Control (AUK), Branch Cache, Shared Folders in Computer Management, Share a printer, AUK Group Policy Settings, Account Policies, Configure NETS Permissions and View Effective Permissions, Credential Manager Vault

Windows 7 and Mobile Computing
■ Configure Bit Locker and Bit Locker Togo, Direct Access, Mobility Options, Configure Offline Files, Manage Offline File Settings, Configure Remote Connections, Bit Locker
Monitoring and Maintaining Windows 7
■ Configure Updates, Manage Disks, Monitor Systems, Configure Performance Settings, Windows Updates, Automatic Updates, Configure Windows Update using Group Policy,

Manage Disks
■ Create Disk Volumes, Extend a Volume, Shrink, and Delete Volumes, Extend Partitions Across Disks (Spanned Volumes), Convert a Disk to Dynamic, Create a PHD, disk part, Defragment a Drive

Monitor Systems and Configure Performance Settings
■ Configure the Event Log Settings, Clear and Archive Logs, Filter Event Logs and Create Custom Views, Configure Page File settings, Configure Drive Caching, Configure Power Settings, Adjust Performance Settings

Configuring Backup and Recovery Options
■ Configure backup, Creating a system recovery disk; backing up files, folders, or full system; scheduling backups, configuring file restore points; restoring previous versions of files and folders; restoring damaged or deleted files by using shadow copies; restore user profiles

MCITP certification Exam 70-647

PRO: Windows Server 2008, Enterprise Administrator

Planning Network and Application Services:

Plan for name resolution and IP addressing.
■ Internal and external naming strategy, naming resolution support for legacy clients, Naming resolution for directory services, IP addressing scheme, TCP/IP version coexistence

Design for network access
■ Network access policies, remote access strategy, Perimeter networks, server and domain isolation

Plan for application delivery
■ Application virtualization, presentation virtualization, Locally installed software, Web-based applications

Plan for Terminal Services
■ Terminal Services licensing, Terminal Services infrastructure

Designing Core Identity and Access Management Components

Design Active Directory forests and domains
■ Forest structure
■ Forest and domain functional levels
■ Intra-organizational authorization and authentication
■ Schema modifications

Design the Active Directory physical topology
■ Placement of servers
■ Site and replication topology
■ Printer location policies

Design the Active Directory administrative model
■ Delegation
■ Group strategy
■ Compliance auditing
■ Group administration
■ Organizational structure

Design the enterprise-level group policy strategy
■ Group policy hierarchy and scope filtering
■ Control device installation
■ Authentication and authorization

Designing Support Identity and Access Management Components

Plan for domain or forest migration, upgrade, and restructuring.
■ Cross-forest authentication, backward compatibility, object migration,
■ Migration planning, implementation planning, environment preparation

Design the branch office deployment
■ Authentication strategy
■ server security

Design and implement public key infrastructure
■ Certificate services
■ POI operations and maintenance
■ Certificate life cycle management

Plan for interoperability
■ Inter-organizational authorization and authentication
■ Application authentication interoperability, cross-platform interoperability

Designing for Business Continuity and Data Availability
■ Plan for business continuity
■ Service availability
■ Directory service recovery

Design for software updates and compliance management
■ Patch management and patch management compliance
■ Microsoft Update and Windows Update,
■ Security baselines
■ System health models

Design the operating system virtualization strategy
■ Server consolidation
■ Application compatibility,
■ Virtualization management
■ Placement of servers

Design for data management and data access
■ Data security
■ Data accessibility and redundancy
■ Data collaboration.