<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Microsoft Archives - Morten</title>
	<atom:link href="https://www.morten.com.tr/en/category/egitimler/microsoft/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.morten.com.tr/en/category/egitimler/microsoft/</link>
	<description></description>
	<lastbuilddate>Mon, 18 Aug 2025 14:15:21 +0000</lastbuilddate>
	<language>en-US</language>
	<sy:updateperiod>
	hourly	</sy:updateperiod>
	<sy:updatefrequency>
	1	</sy:updatefrequency>
	<generator>https://wordpress.org/?v=6.6.2</generator>

<image>
	<url>https://www.morten.com.tr/wp-content/uploads/2024/12/cropped-Morten-Logo-Bordo-Kopya-2-32x32.png</url>
	<title>Microsoft Archives - Morten</title>
	<link>https://www.morten.com.tr/en/category/egitimler/microsoft/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Microsoft Identity and Access Administrator (SC-300)</title>
		<link>https://www.morten.com.tr/en/microsoft-identity-and-access-administrator-sc-300/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=microsoft-identity-and-access-administrator-sc-300</link>
		
		<dc:creator><![CDATA[dvususer]]></dc:creator>
		<pubdate>Thu, 09 Jan 2025 12:55:31 +0000</pubdate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Eğitimler]]></category>
		<category><![CDATA[Microsoft]]></category>
		<guid ispermalink="false">http://18.199.85.50/?p=995120</guid>

					<description><![CDATA[<p>Eğitim Hakkında Microsoft SC-300 eğitimi, kurumsal uygulamalara güvenli kimlik doğrulama ve yetkilendirme erişimi sağlama gibi görevleri yürütmeyi öğretiyor. Ayrıca tüm kullanıcılar için sorunsuz deneyimler ve self-servis yönetim yetenekleri sunmayı da kapsar. Katılımcılar, kimlik ve erişim yönetimi çözümlerinin uyarlanabilir erişim ve yönetimini oluşturmayı, çevrenizi izleme, sorun giderme ve raporlama üzerine bilgi sahibi olurlar. Bu rol, tek...</p>
<p>The post <a href="https://www.morten.com.tr/en/microsoft-identity-and-access-administrator-sc-300/">Microsoft Identity and Access Administrator (SC-300)</a> appeared first on <a href="https://www.morten.com.tr/en">Morten</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div data-elementor-type="wp-post" data-elementor-id="995120" class="elementor elementor-995120" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-5c62cda e-flex e-con-boxed e-con e-parent" data-id="5c62cda" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-5d6a6c0 elementor-widget elementor-widget-text-editor" data-id="5d6a6c0" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><strong>About Education</strong></p><p>Microsoft SC-300 eğitimi, kurumsal uygulamalara güvenli kimlik doğrulama ve yetkilendirme erişimi sağlama gibi görevleri yürütmeyi öğretiyor. Ayrıca tüm kullanıcılar için sorunsuz deneyimler ve self-servis yönetim yetenekleri sunmayı da kapsar. Katılımcılar, kimlik ve erişim yönetimi çözümlerinin uyarlanabilir erişim ve yönetimini oluşturmayı, çevrenizi izleme, sorun giderme ve raporlama üzerine bilgi sahibi olurlar. Bu rol, tek bir birey ya da daha büyük bir ekibin üyesi olabilir. Eğitim boyunca bu rolün organizasyondaki diğer rollerle birlikte stratejik kimlik projelerini yürütmek için nasıl işbirliği yaptığı gösterilmektedir. Nihai amaç, kimlik çözümlerini modernize etmek, hibrit kimlik çözümleri uygulamak ve kimlik yönetimini hayata geçirmektir.</p><p><strong>Prerequisites</strong></p><p>No prerequisites are specified.</p><p><strong>Duration of Training</strong></p><p><strong>Toplam Süre:</strong> 4 Gün (Günde 6 saat)<br /><strong>Toplam Eğitim Saati:</strong> 24 saat<br /><strong>Eğitim Formatı:</strong> Uygulamalı ve interaktif yüz yüze /online ortam</p><p><strong>Who Should Participate?</strong></p><p>This course is designed for Identity and Access Administrators who plan to take the relevant certification exam or who perform identity and access management tasks in their daily work. It is also suitable for administrators or engineers who want to specialize in providing identity solutions and access management systems for Azure-based solutions.</p><p><strong>Educational Content</strong></p><p><strong>Module 1: Discover Identities in Microsoft Entra ID</strong></p><ul><li>Define common identity terms and explain how they are used in the Microsoft Cloud.</li><li>Explore the common management tools and needs of an identity solution.</li><li>Examine the purpose of the Zero Trust approach and how it is implemented in the Microsoft Cloud.</li><li>Explore available identity services in the Microsoft Cloud.</li></ul><p><strong>Module 2: SC-300: Identity Management Solution Implementation</strong></p><ul><li>Implementing initial configuration of Microsoft Entra ID</li><li>Create, configure and manage identities</li><li>Implement and manage external identities</li><li>Implementing and managing hybrid identity</li></ul><p><strong>Module 3: SC-300: Implementing an Authentication and Access Management Solution</strong></p><ul><li>Securing Microsoft Entra users with multi-factor authentication</li><li>Managing user authentication</li><li>Planning, implementing and managing Conditional Access</li><li>Microsoft Entra Identity Protection management</li><li>Implement access management for Azure resources</li><li>Deploy and configure Microsoft Entra Global Secure Access</li></ul><p><strong>Module 4: SC-300: Implementing Access Management for Applications</strong></p><ul><li>Planning and designing the integration of enterprise applications for SSO</li><li>Implement and monitor the integration of enterprise applications</li><li>Apply application registration</li><li>Register apps using Microsoft Entra ID</li></ul><p><strong>Module 5: SC-300: Identity Management Strategy Planning and Implementation</strong></p><ul><li>Planning and implementing authorization management</li><li>Planning, implementing and managing access reviews</li><li>Privileged access planning and implementation</li><li>Monitor and maintain Microsoft Entra ID</li><li>Explore the features of Microsoft Entra Permissions Management</li></ul><p class="translation-block"><strong>What You Will Gain at the End of the Training</strong> Participants will learn:</p><ul><li>Explore identities in Microsoft Entra ID.</li><li>SC-300: Implement identity management solution.</li><li>SC-300: Implement authentication and access management solution.</li><li>SC-300: Implement access management for applications.</li><li>SC-300: Planning and implementing identity management strategy.</li></ul>								</div>
				</div>
				<div class="vamtam-has-theme-widget-styles elementor-element elementor-element-5154baa elementor-align-right elementor-widget elementor-widget-button" data-id="5154baa" data-element_type="widget" data-e-type="widget" data-widget_type="button.default">
				<div class="elementor-widget-container">
									<div class="elementor-button-wrapper">
					<a class="elementor-button elementor-button-link elementor-size-sm" href="/wp-content/uploads/2025/01/Microsoft-Identity-and-Access-Administrator-SC-300.pdf" target="_blank">
						<span class="elementor-button-content-wrapper">
									<span class="elementor-button-text">Download PDF</span>
					</span>
					</a>
				</div>
								</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-2deef6d e-flex e-con-boxed e-con e-parent" data-id="2deef6d" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-78e9af8 elementor-widget elementor-widget-spacer" data-id="78e9af8" data-element_type="widget" data-e-type="widget" data-widget_type="spacer.default">
				<div class="elementor-widget-container">
							<div class="elementor-spacer">
			<div class="elementor-spacer-inner"></div>
		</div>
						</div>
				</div>
					</div>
				</div>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-0094d7d elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="0094d7d" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d0d3196" data-id="d0d3196" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-9039b84 elementor-widget elementor-widget-spacer" data-id="9039b84" data-element_type="widget" data-e-type="widget" data-widget_type="spacer.default">
				<div class="elementor-widget-container">
							<div class="elementor-spacer">
			<div class="elementor-spacer-inner"></div>
		</div>
						</div>
				</div>
				<div class="elementor-element elementor-element-ac09c6a elementor-widget elementor-widget-spacer" data-id="ac09c6a" data-element_type="widget" data-e-type="widget" data-widget_type="spacer.default">
				<div class="elementor-widget-container">
							<div class="elementor-spacer">
			<div class="elementor-spacer-inner"></div>
		</div>
						</div>
				</div>
				<div class="elementor-element elementor-element-b18bade elementor-widget__width-initial elementor-widget elementor-widget-heading" data-id="b18bade" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<span class="elementor-heading-title elementor-size-default"><a href="https://www.morten.com.tr/en/cozumlerimiz/ag-cozumleri/">Network Solutions</a></span>				</div>
				</div>
				<div class="elementor-element elementor-element-75297ca animated-slow bkheader elementor-invisible elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading" data-id="75297ca" data-element_type="widget" data-e-type="widget" data-settings="{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_tablet&quot;:&quot;none&quot;}" data-widget_type="theme-post-title.default">
				<div class="elementor-widget-container">
					<h1 class="elementor-heading-title elementor-size-default">Microsoft Identity and Access Administrator (SC-300)</h1>				</div>
				</div>
				<div class="elementor-element elementor-element-c09bc80 elementor-widget elementor-widget-spacer" data-id="c09bc80" data-element_type="widget" data-e-type="widget" data-widget_type="spacer.default">
				<div class="elementor-widget-container">
							<div class="elementor-spacer">
			<div class="elementor-spacer-inner"></div>
		</div>
						</div>
				</div>
					</div>
		</div>
					</div>
		</section>
		<div class="elementor-element elementor-element-6c9387b e-flex e-con-boxed e-con e-parent" data-id="6c9387b" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
					</div>
				</div>
				</div><p>The post <a href="https://www.morten.com.tr/en/microsoft-identity-and-access-administrator-sc-300/">Microsoft Identity and Access Administrator (SC-300)</a> appeared first on <a href="https://www.morten.com.tr/en">Morten</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Microsoft Azure Security Technologies (AZ-500)</title>
		<link>https://www.morten.com.tr/en/microsoft-azure-security-technologies-az-500/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=microsoft-azure-security-technologies-az-500</link>
		
		<dc:creator><![CDATA[dvususer]]></dc:creator>
		<pubdate>Thu, 09 Jan 2025 12:52:03 +0000</pubdate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Eğitimler]]></category>
		<category><![CDATA[Microsoft]]></category>
		<guid ispermalink="false">http://18.199.85.50/?p=995112</guid>

					<description><![CDATA[<p>Eğitim Hakkında Microsoft AZ-500 eğitimi, IT Güvenlik Profesyonellerine güvenlik kontrollerini uygulamak, bir organizasyonun güvenlik duruşunu korumak ve güvenlik açıklarını tespit edip gidermek için gereken bilgi ve becerileri kazandırır. Microsoft AZ-500 eğitimi; kimlik ve erişim güvenliği, platform koruması, veri ve uygulama güvenliği ile güvenlik operasyonlarını kapsar. Ön Koşullar Önceden belirli bir şart belirtilmemiştir. Ancak temel Azure ve...</p>
<p>The post <a href="https://www.morten.com.tr/en/microsoft-azure-security-technologies-az-500/">Microsoft Azure Security Technologies (AZ-500)</a> appeared first on <a href="https://www.morten.com.tr/en">Morten</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div data-elementor-type="wp-post" data-elementor-id="995112" class="elementor elementor-995112" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-5c62cda e-flex e-con-boxed e-con e-parent" data-id="5c62cda" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-5d6a6c0 elementor-widget elementor-widget-text-editor" data-id="5d6a6c0" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><strong>About Education</strong></p><p><strong>Microsoft AZ-500 eğitimi</strong>, IT Güvenlik Profesyonellerine güvenlik kontrollerini uygulamak, bir organizasyonun güvenlik duruşunu korumak ve güvenlik açıklarını tespit edip gidermek için gereken bilgi ve becerileri kazandırır. <strong>Microsoft AZ-500 eğitimi</strong>; kimlik ve erişim güvenliği, platform koruması, veri ve uygulama güvenliği ile güvenlik operasyonlarını kapsar.</p><p><strong>Prerequisites</strong></p><ul><li>There are no specific requirements listed above, but basic Azure and security knowledge may be helpful.</li></ul><p><strong>Duration of Training</strong></p><p><strong>Toplam Süre:</strong> 4 Gün (Günde 6 saat)<br /><strong>Toplam Eğitim Saati:</strong> 24 saat<br /><strong>Eğitim Formatı:</strong> Uygulamalı ve interaktif yüz yüze /online ortam</p><p><strong>Who Should Participate?</strong></p><p><strong style="color: var( --e-global-color-vamtam_accent_6 ); text-align: var(--text-align); letter-spacing: var(--vamtam-primary-font-letter-spacing-desktop,normal); text-transform: var(--vamtam-primary-font-transform,none);">Microsoft AZ-500 eğitimi</strong>, Azure Güvenlik Mühendisinin ilgili sertifikasyon sınavına hazırlanması ya da günlük işlerinde güvenlik görevlerini yerine getirmesi için tasarlanmıştır. Azure tabanlı dijital platformlar için güvenlik sağlamada uzmanlaşmak ve bir organizasyonun verilerini korumada önemli bir rol oynamak isteyen mühendisler için uygundur.</p><p><strong>Educational Content</strong></p><p><strong>AZ-500: Managing Identity and Access</strong></p><ul><li>Managing identities in Microsoft Entra ID</li><li>Managing authentication with Microsoft Entra ID</li><li>Managing authorization with Microsoft Entra ID</li><li>Managing app access in Microsoft Entra ID</li></ul><p><strong>AZ-500: Securing the Network</strong></p><ul><li>Planning and implementing security for virtual networks</li><li>Planning and implementing security for private access to Azure resources</li><li>Planning and implementing security for public access to Azure resources</li></ul><p><strong>AZ-500: Securing Computing, Storage and Databases</strong></p><ul><li>Planning and implementing advanced security for computing</li><li>Planning and implementing security for storage</li><li>Planning and implementing security for Azure SQL Database and Azure SQL Managed Instance</li></ul><p><strong>AZ-500: Managing Security Operations</strong></p><ul><li>Planning, implementing and managing management for security</li><li>Managing security posture with Microsoft Defender for Cloud</li><li>Configure and manage threat protection with Microsoft Defender for Cloud</li><li>Configure and manage security monitoring and automation solutions</li></ul><p><strong>What You Will Gain at the End of Training</strong> </p><p>Katılımcılar aşağıdaki konularda bilgi sahibi olacaklar:</p><ul><li>AZ-500: Managing Identity and Access</li><li>AZ-500: Securing the Network</li><li>AZ-500: Securing Computing, Storage and Databases</li><li>AZ-500: Managing Security Operations</li></ul>								</div>
				</div>
				<div class="vamtam-has-theme-widget-styles elementor-element elementor-element-5154baa elementor-align-right elementor-widget elementor-widget-button" data-id="5154baa" data-element_type="widget" data-e-type="widget" data-widget_type="button.default">
				<div class="elementor-widget-container">
									<div class="elementor-button-wrapper">
					<a class="elementor-button elementor-button-link elementor-size-sm" href="/wp-content/uploads/2025/01/Microsoft-Azure-Security-Technologies-AZ-500.pdf" target="_blank">
						<span class="elementor-button-content-wrapper">
									<span class="elementor-button-text">Download PDF</span>
					</span>
					</a>
				</div>
								</div>
				</div>
					</div>
				</div>
				</div><p>The post <a href="https://www.morten.com.tr/en/microsoft-azure-security-technologies-az-500/">Microsoft Azure Security Technologies (AZ-500)</a> appeared first on <a href="https://www.morten.com.tr/en">Morten</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Designing and Implementing Microsoft Azure Networking Solutions (AZ-700)</title>
		<link>https://www.morten.com.tr/en/designing-and-implementing-microsoft-azure-networking-solutions-az-700/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=designing-and-implementing-microsoft-azure-networking-solutions-az-700</link>
		
		<dc:creator><![CDATA[dvususer]]></dc:creator>
		<pubdate>Thu, 09 Jan 2025 12:49:19 +0000</pubdate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Eğitimler]]></category>
		<category><![CDATA[Microsoft]]></category>
		<guid ispermalink="false">http://18.199.85.50/?p=995104</guid>

					<description><![CDATA[<p>Eğitim Hakkında Microsoft AZ-700 Eğitimi, Network Engineers (Ağ Mühendisleri) için Azure ağ çözümlerini tasarlama, uygulama ve bakımını yapma becerilerini geliştirir. Microsoft AZ-700 Eğitimi; Azure’un temel ağ altyapısını tasarlama, uygulama ve yönetme süreçlerini, hibrit ağ bağlantılarını, trafik yük dengelemesini, ağ yönlendirmesini, Azure hizmetlerine özel erişimi, ağ güvenliğini ve izlemeyi kapsar. Azure&#8217;da güvenli ve güvenilir bir ağ altyapısını...</p>
<p>The post <a href="https://www.morten.com.tr/en/designing-and-implementing-microsoft-azure-networking-solutions-az-700/">Designing and Implementing Microsoft Azure Networking Solutions (AZ-700)</a> appeared first on <a href="https://www.morten.com.tr/en">Morten</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div data-elementor-type="wp-post" data-elementor-id="995104" class="elementor elementor-995104" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-5c62cda e-flex e-con-boxed e-con e-parent" data-id="5c62cda" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-5d6a6c0 elementor-widget elementor-widget-text-editor" data-id="5d6a6c0" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><strong>About Education</strong></p><p><strong>Microsoft AZ-700 Eğitimi</strong>, Network Engineers (Ağ Mühendisleri) için Azure ağ çözümlerini tasarlama, uygulama ve bakımını yapma becerilerini geliştirir. <strong>Microsoft AZ-700 Eğitimi</strong>; Azure’un temel ağ altyapısını tasarlama, uygulama ve yönetme süreçlerini, hibrit ağ bağlantılarını, trafik yük dengelemesini, ağ yönlendirmesini, Azure hizmetlerine özel erişimi, ağ güvenliğini ve izlemeyi kapsar. Azure&#8217;da güvenli ve güvenilir bir ağ altyapısını nasıl tasarlayıp uygulayacağınızı, hibrit bağlantıları nasıl kuracağınızı ve Azure hizmetlerini izlemeyi öğrenirsiniz.</p><p><strong>Prerequisites</strong></p><p>To make a successful start for the Azure Network Engineers role, it is recommended to have the following qualifications:</p><ul><li>Experience with enterprise networking, on-premises or cloud infrastructures, and network security.</li><li>Having knowledge about virtualization technologies, virtual machines (VMs), virtual network and virtual hard disks.</li><li>Understanding network configurations such as TCP/IP, Domain Name System (DNS), virtual private networks (VPNs), firewalls, and encryption technologies.</li><li>Knowledge of software-defined networking (SDN) technologies.</li><li>Understanding hybrid network connection methods, such as VPN.</li><li>Understanding of resilience and disaster recovery, including high availability and recovery operations.</li></ul><p><strong>Duration of Training</strong></p><p><strong>Toplam Süre:</strong> 3 Gün (Günde 6 saat)<br /><strong>Toplam Eğitim Saati:</strong> 18 saat<br /><strong>Eğitim Formatı:</strong> Uygulamalı ve interaktif yüz yüze /online ortam</p><p><strong>Who Should Participate?</strong></p><p><strong style="color: var( --e-global-color-vamtam_accent_6 ); text-align: var(--text-align); letter-spacing: var(--vamtam-primary-font-letter-spacing-desktop,normal); text-transform: var(--vamtam-primary-font-transform,none);">Microsoft AZ-700 Eğitimi</strong>, Azure ağ çözümleri konusunda uzmanlaşmayı hedefleyen Ağ Mühendisleri için tasarlanmıştır. Bir Azure Network Engineer; Azure temel ağ altyapısını tasarlar ve uygular, hibrit ağ bağlantılarını gerçekleştirir, trafik yük dengeleme, ağ yönlendirme, Azure hizmetlerine özel erişim, ağ güvenliği ve izleme konularında çözümler geliştirir. Bu mühendisler, performansı optimize etmek, dayanıklılığı ve ölçeklenebilirliği sağlamak ve güvenliği artırmak için ağ çözümlerini yönetir.</p><p><strong>Educational Content</strong></p><ul><li>Introduction to Azure Virtual Networks</li><li>Designing and Implementing a Hybrid Network</li><li>Azure ExpressRoute Design and Implementation</li><li>Load Balancing Non-HTTP(S) Traffic in Azure</li><li>HTTP(S) Traffic Load Balancing in Azure</li><li>Network Security Design and Implementation</li><li>Design and Implementation of Private Access to Azure Services</li><li>Network Monitoring Design and Implementation</li></ul><p><strong>What You Will Gain at the End of Training</strong></p><ul><li>Microsoft Azure Networking Solutions design and implementation skills</li><li>Designing Azure network infrastructure in a secure, resilient, and performance-optimized way</li><li>Expertise in hybrid connections, private access and monitoring</li></ul>								</div>
				</div>
				<div class="vamtam-has-theme-widget-styles elementor-element elementor-element-5154baa elementor-align-right elementor-widget elementor-widget-button" data-id="5154baa" data-element_type="widget" data-e-type="widget" data-widget_type="button.default">
				<div class="elementor-widget-container">
									<div class="elementor-button-wrapper">
					<a class="elementor-button elementor-button-link elementor-size-sm" href="/wp-content/uploads/2025/01/Designing-and-Implementing-Microsoft-Azure-Networking-Solutions-AZ-700.pdf" target="_blank">
						<span class="elementor-button-content-wrapper">
									<span class="elementor-button-text">Download PDF</span>
					</span>
					</a>
				</div>
								</div>
				</div>
					</div>
				</div>
				</div><p>The post <a href="https://www.morten.com.tr/en/designing-and-implementing-microsoft-azure-networking-solutions-az-700/">Designing and Implementing Microsoft Azure Networking Solutions (AZ-700)</a> appeared first on <a href="https://www.morten.com.tr/en">Morten</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Designing Microsoft Azure Infrastructure Solutions (AZ-305)</title>
		<link>https://www.morten.com.tr/en/designing-microsoft-azure-infrastructure-solutions-az-305/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=designing-microsoft-azure-infrastructure-solutions-az-305</link>
		
		<dc:creator><![CDATA[dvususer]]></dc:creator>
		<pubdate>Thu, 09 Jan 2025 12:46:09 +0000</pubdate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Eğitimler]]></category>
		<category><![CDATA[Microsoft]]></category>
		<guid ispermalink="false">http://18.199.85.50/?p=995093</guid>

					<description><![CDATA[<p>Eğitim Hakkında Microsoft AZ-305 Eğitimi, Azure Çözüm Mimarlarına altyapı çözümleri tasarlamayı öğretiyor. Eğitim kapsamında yönetim, hesaplama, uygulama mimarisi, depolama, veri entegrasyonu, kimlik doğrulama, ağlar, iş sürekliliği ve geçişler ele alınıyor. Dersler, temel mimari tasarım ilkelerini göstermek için vaka çalışmaları ile birleştiriliyor. Ön Koşullar Microsoft AZ-700 Eğitimine katılmadan önce, katılımcıların Azure kaynaklarını dağıtma veya yönetme konusunda deneyim sahibi...</p>
<p>The post <a href="https://www.morten.com.tr/en/designing-microsoft-azure-infrastructure-solutions-az-305/">Designing Microsoft Azure Infrastructure Solutions (AZ-305)</a> appeared first on <a href="https://www.morten.com.tr/en">Morten</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div data-elementor-type="wp-post" data-elementor-id="995093" class="elementor elementor-995093" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-5c62cda e-flex e-con-boxed e-con e-parent" data-id="5c62cda" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-5d6a6c0 elementor-widget elementor-widget-text-editor" data-id="5d6a6c0" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><strong>About Education</strong></p><p><strong>Microsoft AZ-305 Eğitimi</strong>, Azure Çözüm Mimarlarına altyapı çözümleri tasarlamayı öğretiyor. Eğitim kapsamında yönetim, hesaplama, uygulama mimarisi, depolama, veri entegrasyonu, kimlik doğrulama, ağlar, iş sürekliliği ve geçişler ele alınıyor. Dersler, temel mimari tasarım ilkelerini göstermek için vaka çalışmaları ile birleştiriliyor.</p><p><strong>Prerequisites</strong> <strong>Microsoft AZ-700 Eğitimine </strong>katılmadan önce, katılımcıların Azure kaynaklarını dağıtma veya yönetme konusunda deneyim sahibi olmaları ve aşağıdaki konularda güçlü kavramsal bilgiye sahip olmaları gerekmektedir:</p><ul><li>Azure compute technologies such as virtual machines, containers, and serverless solutions</li><li>Azure virtual network technologies, including load balancers</li><li>Azure storage technologies (unstructured data and databases)</li><li>General application design concepts such as messaging and high availability</li></ul><p><strong>Recommended Prerequisites:</strong></p><ul><li>M-AZ104 &#8211; Microsoft Azure Administrator (AZ-104)</li></ul><p><strong>Duration of Training</strong></p><p><strong>Toplam Süre:</strong> 4 Gün (Günde 6 saat)<br /><strong>Toplam Eğitim Saati:</strong> 24 saat<br /><strong>Eğitim Formatı:</strong> Uygulamalı ve interaktif yüz yüze /online ortam</p><p><strong>Who Should Participate?</strong></p><p><strong style="color: var( --e-global-color-vamtam_accent_6 ); text-align: var(--text-align); letter-spacing: var(--vamtam-primary-font-letter-spacing-desktop,normal); text-transform: var(--vamtam-primary-font-transform,none);">Microsoft AZ-700 Eğitimi</strong>, ağ yönetimi, sanallaştırma, kimlik, güvenlik, iş sürekliliği, felaket kurtarma, veri platformları ve yönetim gibi BT operasyonları konusunda deneyim ve bilgi sahibi olan katılımcılara yöneliktir. Katılımcılar ayrıca çözüm tasarlama ve mimarı oluşturma deneyimine sahiptir.</p><p><strong>Educational Content</strong></p><p><strong>AZ-305 Microsoft Azure Architect Design Prerequisites</strong></p><ul><li>Explain the core architectural components of Azure</li><li>Introducing Azure compute and networking services</li><li>Introducing Azure storage services</li><li>Introducing Azure identity, access and security services</li><li>Microsoft Cloud Adoption Framework for Azure</li><li>Introduction to Microsoft Azure Good Architecture Framework</li></ul><p><strong>AZ-305: Designing Identity, Management and Monitoring Solutions</strong></p><ul><li>Designing management solutions</li><li>Designing authentication and authorization solutions</li><li>Design a solution to monitor and log Azure resources</li></ul><p><strong>AZ-305: Designing Business Continuity Solutions</strong></p><ul><li>Introducing high availability and disaster recovery strategies</li><li>Designing a solution for backup and disaster recovery</li></ul><p><strong>AZ-305: Designing Data Storage Solutions</strong></p><ul><li>Designing a data storage solution for unstructured data</li><li>Designing a data storage solution for structured data</li><li>Designing data integration</li></ul><p><strong>AZ-305: Designing Infrastructure Solutions</strong></p><ul><li>Designing an Azure compute solution</li><li>Designing application architecture</li><li>Designing network solutions</li><li>Designing transitions</li></ul><p><strong>Building Great Solutions with Microsoft Azure Well-Architected Framework</strong></p><ul><li>Introduction to Microsoft Azure Good Architecture Framework</li><li>Microsoft Azure Well-Architected Framework – Cost Optimization</li><li>Microsoft Azure Well-Architected Framework – Operational Excellence</li><li>Microsoft Azure Well-Architected Framework – Performance Efficiency</li><li>Microsoft Azure Well-Architected Framework – Reliability</li><li>Microsoft Azure Well-Architected Framework – Security</li></ul><p><strong>Accelerating Cloud Adoption with Microsoft Cloud Adoption Framework for Azure</strong></p><ul><li>Getting started with Microsoft Cloud Adoption Framework for Azure</li><li>Prepare for successful cloud adoption with a well-defined strategy</li><li>Prepare for cloud adoption with a data-driven plan</li><li>Choose the best Azure landing pad to support your cloud operating needs</li><li>Migrate your workload to the cloud using the Cloud Adoption Framework Migration methodology</li><li>Addressing tangible risks with the Govern methodology of the Microsoft Cloud Adoption Framework for Azure</li><li>Provide stable operations and optimization for all supported loads deployed in the cloud</li><li>Innovating applications using Azure cloud technologies</li><li>Preparing for cloud security with Microsoft Cloud Adoption Framework for Azure</li></ul><p><strong>What You Will Gain at the End of Training</strong></p><ul><li>AZ-305 Microsoft Azure Architect Design Prerequisites</li><li>AZ-305: Designing Identity, Management and Monitoring Solutions</li><li>AZ-305: Designing Business Continuity Solutions</li><li>AZ-305: Designing Data Storage Solutions</li><li>AZ-305: Designing Infrastructure Solutions</li><li>Building great solutions with Microsoft Azure Well-Architected Framework</li><li>Accelerating cloud adoption with Microsoft Cloud Adoption Framework for Azure</li></ul>								</div>
				</div>
				<div class="vamtam-has-theme-widget-styles elementor-element elementor-element-5154baa elementor-align-right elementor-widget elementor-widget-button" data-id="5154baa" data-element_type="widget" data-e-type="widget" data-widget_type="button.default">
				<div class="elementor-widget-container">
									<div class="elementor-button-wrapper">
					<a class="elementor-button elementor-button-link elementor-size-sm" href="/wp-content/uploads/2025/01/Designing-Microsoft-Azure-Infrastructure-Solutions-AZ-305.pdf" target="_blank">
						<span class="elementor-button-content-wrapper">
									<span class="elementor-button-text">Download PDF</span>
					</span>
					</a>
				</div>
								</div>
				</div>
					</div>
				</div>
				</div><p>The post <a href="https://www.morten.com.tr/en/designing-microsoft-azure-infrastructure-solutions-az-305/">Designing Microsoft Azure Infrastructure Solutions (AZ-305)</a> appeared first on <a href="https://www.morten.com.tr/en">Morten</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Configuring Windows Server Hybrid Advanced Services (AZ-801)</title>
		<link>https://www.morten.com.tr/en/configuring-windows-server-hybrid-advanced-services-az-801/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=configuring-windows-server-hybrid-advanced-services-az-801</link>
		
		<dc:creator><![CDATA[dvususer]]></dc:creator>
		<pubdate>Thu, 09 Jan 2025 12:43:26 +0000</pubdate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Eğitimler]]></category>
		<category><![CDATA[Microsoft]]></category>
		<guid ispermalink="false">http://18.199.85.50/?p=995085</guid>

					<description><![CDATA[<p>Eğitim Hakkında Microsoft AZ-801 Eğitimi, IT profesyonellerine hibrit ve bulut teknolojilerini kullanarak ileri düzey Windows Server hizmetlerini konfigüre etmeyi öğretiyor. Azure&#8217;un hibrit yeteneklerinden yararlanmayı, sanal ve fiziksel sunucu yüklerini Azure IaaS&#8217;ıa taşımayı ve Windows Server çalışan Azure VM&#8217;lerini güvence altına almayı kapsar. Microsoft AZ-801 Eğitimi ayrıca yüksek kullanılabilirlik, sorun giderme ve felaket kurtarma ile ilgili...</p>
<p>The post <a href="https://www.morten.com.tr/en/configuring-windows-server-hybrid-advanced-services-az-801/">Configuring Windows Server Hybrid Advanced Services (AZ-801)</a> appeared first on <a href="https://www.morten.com.tr/en">Morten</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div data-elementor-type="wp-post" data-elementor-id="995085" class="elementor elementor-995085" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-5c62cda e-flex e-con-boxed e-con e-parent" data-id="5c62cda" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-5d6a6c0 elementor-widget elementor-widget-text-editor" data-id="5d6a6c0" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><strong>About Education</strong></p><p><strong>Microsoft AZ-801 Eğitimi</strong>, IT profesyonellerine hibrit ve bulut teknolojilerini kullanarak ileri düzey Windows Server hizmetlerini konfigüre etmeyi öğretiyor. Azure&#8217;un hibrit yeteneklerinden yararlanmayı, sanal ve fiziksel sunucu yüklerini Azure IaaS&#8217;ıa taşımayı ve Windows Server çalışan Azure VM&#8217;lerini güvence altına almayı kapsar. <b>Microsoft AZ-801 Eğitimi</b> ayrıca yüksek kullanılabilirlik, sorun giderme ve felaket kurtarma ile ilgili görevleri öğretir. Eğitimde Windows Admin Center, PowerShell, Azure Arc, Azure Automation Update Management, Microsoft Defender for Identity, Azure Security Center, Azure Migrate ve Azure Monitor gibi yönetim araçları ve teknolojiler vurgulanmaktadır.</p><p><strong>Prerequisites</strong></p><ul><li>Experience working with Windows Server technologies in IT infrastructures.</li><li>Having basic knowledge about Azure and hybrid technologies.</li></ul><p><strong>Duration of Training</strong></p><p><strong>Toplam Süre:</strong> 4 Gün (Günde 6 saat)<br /><strong>Toplam Eğitim Saati:</strong> 24 saat<br /><strong>Eğitim Formatı:</strong> Uygulamalı ve interaktif yüz yüze /online ortam</p><p><strong>Who Should Participate?</strong></p><p>Bu dört günlük <b>Microsoft AZ-801 Eğitimi</b>, Windows Server ve hibrit teknolojileri birleştirerek yerinde altyapılarının yeteneklerini genişletmek isteyen Windows Server Hybrid Yöneticileri için tasarlanmıştır. Mevcut temel teknolojileri yöneten ve uygulayan yöneticiler; sanal ve fiziksel yükleri Azure IaaS&#8217;ıa taşımak, yüksek kullanılabilir ve tam yedekli bir ortam oluşturmak, izleme ve sorun giderme yapmak isteyen katılımcılar için uygundur.</p><p><strong>Educational Content</strong></p><ol><li><strong> Securing Windows Server in On-Premise and Hybrid Infrastructures</strong></li></ol><ul><li>Implementing Windows Server IaaS VM network security</li><li>Audit the security of Windows Server IaaS Virtual Machines</li><li>Managing Azure updates</li><li>Creating and enforcing application permission lists with adaptive application control</li><li>Configure BitLocker disk encryption for Windows IaaS Virtual Machines</li><li>Implement change tracking and file integrity monitoring for Windows IaaS VMs</li><li>Securing Windows Server DNS</li><li>Securing Windows Server user accounts</li><li>Windows Server hardening</li><li>Manage Windows Server updates</li></ul><ol start="2"><li><strong> Implementing Windows Server High Availability</strong></li></ol><ul><li>Introducing Cluster Shared Volumes</li><li>Applying Windows Server failover clustering</li><li>Ensuring high availability of Windows Server Virtual Machines</li><li>Ensuring Windows Server File Server high availability</li><li>Implementing scale and high availability with Windows Server VM</li></ul><ol start="3"><li><strong> Implementing Disaster Recovery in Windows Server Environments</strong></li></ol><ul><li>Implementing Hyper-V Replica</li><li>Implementing hybrid backup and recovery with Windows Server IaaS</li><li>Protecting on-site infrastructure from disasters with Azure Site Recovery</li><li>Protecting Azure infrastructure with Azure Site Recovery</li><li>Protecting virtual machines using Azure Backup</li></ul><ol start="4"><li><strong> Server and Payload Migration in On-Premises and Hybrid Environments</strong></li></ol><ul><li>Migrate on-premises Windows Server loads to Azure IaaS virtual machines</li><li>Upgrade and migrate Windows Server IaaS virtual machines</li><li>Active Directory Domain Services migration</li><li>Migrate file server loads with Storage Migration Service</li><li>Migrate Windows Server roles</li><li>Containerize and migrate ASP.NET applications to Azure App Service</li></ul><ol start="5"><li><strong> Monitoring and Troubleshooting Windows Server Environments</strong></li></ol><ul><li>Monitoring Windows Server IaaS Virtual Machines and hybrid instances</li><li>Monitoring Azure Virtual Machines with Azure Monitor</li><li>Monitor Windows Server performance</li><li>Manage and monitor Windows Server event logs</li><li>Apply Windows Server auditing and diagnostics</li><li>On-premises and hybrid network troubleshooting</li><li>Troubleshooting Windows Server Virtual Machines in Azure</li><li>Active Directory troubleshooting</li></ul><p><strong>What You Will Gain at the End of Training</strong></p><ul><li>Securing Windows Server in on-premises and hybrid infrastructures</li><li>Ensure Windows Server high availability</li><li>Implementing disaster recovery in on-premises and hybrid environments</li><li>Server and payload migration in on-premises and hybrid environments</li><li>Monitoring and troubleshooting Windows Server environments</li></ul>								</div>
				</div>
				<div class="vamtam-has-theme-widget-styles elementor-element elementor-element-5154baa elementor-align-right elementor-widget elementor-widget-button" data-id="5154baa" data-element_type="widget" data-e-type="widget" data-widget_type="button.default">
				<div class="elementor-widget-container">
									<div class="elementor-button-wrapper">
					<a class="elementor-button elementor-button-link elementor-size-sm" href="/wp-content/uploads/2025/01/Configuring-Windows-Server-Hybrid-Advanced-Services-AZ-801.pdf" target="_blank">
						<span class="elementor-button-content-wrapper">
									<span class="elementor-button-text">Download PDF</span>
					</span>
					</a>
				</div>
								</div>
				</div>
					</div>
				</div>
				</div><p>The post <a href="https://www.morten.com.tr/en/configuring-windows-server-hybrid-advanced-services-az-801/">Configuring Windows Server Hybrid Advanced Services (AZ-801)</a> appeared first on <a href="https://www.morten.com.tr/en">Morten</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Administering Windows Server Hybrid Core Infrastructure (AZ-800)</title>
		<link>https://www.morten.com.tr/en/administering-windows-server-hybrid-core-infrastructure-az-800/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=administering-windows-server-hybrid-core-infrastructure-az-800</link>
		
		<dc:creator><![CDATA[dvususer]]></dc:creator>
		<pubdate>Thu, 09 Jan 2025 12:38:58 +0000</pubdate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Eğitimler]]></category>
		<category><![CDATA[Microsoft]]></category>
		<guid ispermalink="false">http://18.199.85.50/?p=995074</guid>

					<description><![CDATA[<p>Eğitim Hakkında Microsoft AZ-800 Eğitimi, IT Profesyonellerine Windows Server iş yüklerini ve hizmetlerini şirket içi, hibrit ve bulut teknolojilerini kullanarak yönetmeyi öğretir. Kurs, IT Profesyonellerine kimlik, yönetim, bilgi işlem, ağ ve depolama gibi şirket içi ve hibrit çözümleri bir Windows Server hibrit ortamında uygulama ve yönetmeyi öğretir. Ön Koşullar Önemli: Microsoft AZ-800 Eğitimi Çok Faktörlü Kimlik Doğrulama...</p>
<p>The post <a href="https://www.morten.com.tr/en/administering-windows-server-hybrid-core-infrastructure-az-800/">Administering Windows Server Hybrid Core Infrastructure (AZ-800)</a> appeared first on <a href="https://www.morten.com.tr/en">Morten</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div data-elementor-type="wp-post" data-elementor-id="995074" class="elementor elementor-995074" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-5c62cda e-flex e-con-boxed e-con e-parent" data-id="5c62cda" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-5d6a6c0 elementor-widget elementor-widget-text-editor" data-id="5d6a6c0" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><strong>About Education</strong></p><p><strong>Microsoft AZ-800 Eğitimi</strong>, IT Profesyonellerine Windows Server iş yüklerini ve hizmetlerini şirket içi, hibrit ve bulut teknolojilerini kullanarak yönetmeyi öğretir. Kurs, IT Profesyonellerine kimlik, yönetim, bilgi işlem, ağ ve depolama gibi şirket içi ve hibrit çözümleri bir Windows Server hibrit ortamında uygulama ve yönetmeyi öğretir.</p><p><strong>Prerequisites</strong></p><ul><li><strong>Important:</strong> <strong>Microsoft AZ-800 Eğitimi</strong> Çok Faktörlü Kimlik Doğrulama (MFA) gerektirir. Lütfen bu bağlantıyı okuyun ve eğitime katılmadan önce MFA uygulamasını indirin.</li><li>Experience managing Windows Server operating system and Windows Server workloads (including AD DS, DNS, DFS, Hyper-V, File and Storage Services) in on-premises scenarios.</li><li>Experience with common Windows Server administration tools.</li><li>Basic knowledge of core Microsoft computing, storage, networking and virtualization technologies.</li><li>Experience and understanding of basic networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP).</li><li>Experience working with Microsoft Hyper-V and knowledge of basic server virtualization concepts.</li><li>Basic experience in implementing and managing IaaS services in Microsoft Azure.</li><li>Basic knowledge about Azure Active Directory.</li><li>Practical experience working with Windows client operating systems such as Windows 10 or Windows 11.</li><li>Basic working experience with Windows PowerShell.</li></ul><p><strong>Duration of Training</strong></p><p><strong>Toplam Süre:</strong> 5 Gün (Günde 6 saat)<br /><strong>Toplam Eğitim Saati:</strong> 30 saat<br /><strong>Eğitim Formatı:</strong> Uygulamalı ve interaktif yüz yüze /online ortam</p><p><strong>Target Group</strong></p><p>Bu beş günlük <strong>Microsoft AZ-800 Eğitimi</strong>, Windows Server ile çalışma deneyimi olan ve şirket içi ortamlarının yeteneklerini şirket içi ve hibrit teknolojileri birleştirerek genişletmek isteyen Windows Server Hibrit Yöneticileri için tasarlanmıştır. Windows Server Hibrit Yöneticileri, Windows Server hibrit ortamında kimlik, yönetim, bilgi işlem, ağ ve depolama gibi şirket içi ve hibrit çözümleri uygular ve yönetir.</p><p><strong>Educational Content</strong></p><p><strong>Module 1: Introduction to AD DS</strong></p><ul><li>Active Directory Domain Services (AD DS) basics in Windows Server 2019</li><li>Forests, domains, sites, domain controllers, organizational units (OUs), users, and groups</li><li><strong>Learning Outcomes:</strong><ul><li>Defining AD DS.</li><li>Identifying users, groups, and computers.</li><li>Define and designate AD DS forests and domains.</li><li>Defining OUs.</li><li>Managing objects and their properties in AD DS.</li></ul></li></ul><p><strong>Module 2: Managing AD DS Domain Controllers and FSMO Roles</strong></p><ul><li>Deployment of domain controllers, backup and restore, and schema management</li><li>Design considerations for the number, roles, and location of domain controllers</li><li><strong>Learning Outcomes:</strong><ul><li>Deploy AD DS domain controllers.</li><li>Protecting AD DS domain controllers.</li><li>Explain the AD DS global catalog role and deployment considerations.</li><li>Explain AD DS operational key roles, deployment considerations, and administrative tasks.</li><li>Describe the AD DS schema and administrative tasks.</li></ul></li></ul><p><strong>Module 3: Implementing Group Policy Objects</strong></p><ul><li>Implement Group Policy Objects (GPOs) in Active Directory Domain Services (AD DS) in Windows Server 2019</li><li><strong>Learning Outcomes:</strong><ul><li>Identifying GPOs.</li><li>Defining GPO scope and inheritance.</li><li>Identifying domain-based GPOs.</li><li>Creating and configuring GPOs.</li><li>Explaining GPO storage.</li><li>Explain administrative templates and Central Repository.</li></ul></li></ul><p><strong>Module 4: Managing Advanced Features of AD DS</strong></p><ul><li>Creating trust relationships, implementing Enhanced Security Administration Environment (ESAE) forests, monitoring and troubleshooting AD DS replication, and creating custom AD DS partitions</li><li><strong>Learning Outcomes:</strong><ul><li>To determine the purpose, types and process of creating trust relationships.</li><li>To explain the purpose and process of implementing ESAE forests.</li><li>Monitor and troubleshoot AD DS replication.</li><li>Determine the purpose and process of creating custom AD DS partitions.</li></ul></li></ul><p><strong>Module 5: Implementing Hybrid Identity with Windows Server</strong></p><ul><li>Configure an Azure environment to support Windows IaaS workloads that require Active Directory</li><li>Integrating on-premises Active Directory Domain Services (AD DS) environment into Azure</li><li><strong>Learning Outcomes:</strong><ul><li>Choosing a Microsoft Entra integration model.</li><li>Planning for Microsoft Entra integration.</li><li>Prepare on-premises AD DS for directory synchronization.</li><li>Install and configure directory sync using Microsoft Entra Connect.</li><li>Implementing seamless Single Sign-On (SSO).</li><li>Enabling Microsoft Entra sign-in for an Azure Windows virtual machine (VM).</li><li>Defining Microsoft Entra Domain Services.</li><li>Implementing and configuring Microsoft Entra Domain Services.</li><li>Administering Windows Server 2019 on a Microsoft Entra Domain Services instance.</li><li>Embedding a Windows Server VM into a managed domain.</li></ul></li></ul><p><strong>Module 6: Deploy and manage Azure IaaS Active Directory domain controllers in Azure</strong></p><ul><li>Extend an existing Active Directory environment to Azure by placing domain controllers configured as IaaS VMs in a specially configured Azure virtual network (VNet) subnet</li><li><strong>Learning Outcomes:</strong><ul><li>Choosing an option to implement directory and identity services using Active Directory Domain Services (AD DS) in Azure.</li><li>Deploy and configure AD DS domain controllers on Azure VMs.</li><li>Installing a replica AD DS domain controller in an Azure VM.</li><li>Installing a new AD DS forest in an Azure VNet.</li></ul></li></ul><p><strong>Module 7: Windows Server secure management</strong></p><ul><li>Principle of least privilege, knowing when to use privileged access workstations, and the ability to identify built-in privileged accounts</li><li><strong>Learning Outcomes:</strong><ul><li>Explain least privilege management models.</li><li>Apply authorized privileges.</li><li>Defining privileged access workstations.</li><li>Identifying hop servers.</li></ul></li></ul><p><strong>Module 8: Defining Windows Server administration tools</strong></p><ul><li>Selecting and using the most appropriate Windows Server administration tool for a given situation</li><li><strong>Learning Outcomes:</strong><ul><li>Identifying Windows Admin Center.</li><li>Describe the use of Remote Server Administration Tools (RSAT) to manage servers.</li><li>Defining Server Manager.</li><li>Describing the use of Windows PowerShell to manage servers.</li><li>Explain how to use Windows PowerShell to remotely administer a server.</li></ul></li></ul><p><strong>Module 9: Perform post-installation configuration of Windows Server</strong></p><ul><li>Perform post-installation configuration of Windows Server using various methods and tools</li><li><strong>Learning Outcomes:</strong><ul><li>Describe post-installation configuration and identify available post-installation configuration tools.</li><li>Using Sconfig to configure Windows Server.</li><li>Explain how to use Desired State Configuration (DSC) to define and configure Windows Server</li></ul></li></ul><p><strong>Module 10: Simplifying Windows Server Administration with Just Enough Administration (JEA)</strong></p><ul><li class="translation-block"><strong>Purpose:</strong> To facilitate management and limit unauthorized access in Windows Server environments using JEA.</li><li><strong>Contents:</strong><ul><li>JEA concept</li><li>Role group capabilities and session configurations</li><li>Create and connect a JEA endpoint</li></ul></li><li><strong>Learning Outcomes:</strong><ul><li>Explain what JEA is and how it works.</li><li>Defining role capabilities for JEA endpoints.</li><li>Creating a session configuration file to register a JEA endpoint.</li><li>Explaining how JEA endpoints limit access to the PowerShell session.</li><li>Connecting to a JEA endpoint.</li></ul></li></ul><p><strong>Module 11: Remotely Administer and Manage Windows Server IaaS Virtual Machines</strong></p><ul><li class="translation-block"><strong>Purpose:</strong> To use appropriate tools and techniques to remotely manage Windows IaaS VMs.</li><li><strong>Contents:</strong><ul><li>Choosing appropriate remote management tools.</li><li>Secure management connections to Windows Azure IaaS VMs with Azure Bastion.</li><li>Configure JIT VM access.</li></ul></li><li><strong>Learning Outcomes:</strong><ul><li>Choosing the appropriate remote management tool.</li><li>Managing Windows Virtual Machines with Azure Bastion.</li><li>Create an Azure Bastion host.</li><li>Configuring just-in-time management.</li></ul></li></ul><p><strong>Module 12: Managing Hybrid Workloads with Azure Arc</strong></p><ul><li class="translation-block"><strong>Purpose:</strong> Define Azure Arc, implement Azure Arc with on-premises server instances, deploy Azure policies with Azure Arc, and use role-based access control (RBAC) to limit access to Log Analytics data.</li><li><strong>Contents:</strong><ul><li>Defining Azure Arc.</li><li>Adding on-premises Windows Server instances to Azure Arc.</li><li>Connecting hybrid machines to Azure.</li><li>Managing devices using Azure Arc.</li><li>Limiting access using RBAC.</li></ul></li><li><strong>Learning Outcomes:</strong><ul><li>Defining Azure Arc.</li><li>Adding Windows Server instances to Azure Arc.</li><li>Connecting hybrid machines to Azure.</li><li>Managing Windows Server instances using Azure Arc.</li><li>Limiting access with RBAC.</li></ul></li></ul><p><strong>Module 13: Configuring and Managing Hyper-V</strong></p><ul><li class="translation-block"><strong>Purpose:</strong> To learn virtualization and Microsoft Hyper-V role with Windows Server. Learn best practices for provisioning Hyper-V hosts, additionally implementing Hyper-V networking features and nested virtualization.</li><li><strong>Contents:</strong><ul><li>Functionality and features of Hyper-V in Windows Server.</li><li>Installing Hyper-V on Windows Server.</li><li>Defining options for managing Hyper-V virtual machines (VMs) in Windows Server.</li><li>Describe Hyper-V networking features and functionality in Windows Server.</li><li>Creating virtual switches (vSwitches) to be used with Hyper-V.</li><li>Defining the use of nested virtualization in Hyper-V.</li></ul></li><li><strong>Learning Outcomes:</strong><ul><li>Defining Hyper-V.</li><li>Configuring Hyper-V hosts according to best practices.</li><li>Configuring the Hyper-V network.</li><li>Defining nested virtualization.</li></ul></li></ul><p><strong>A Similar Structure for the Remaining Modules:</strong></p><ul><li class="translation-block"><strong>Module 14-33:</strong> Hyper-V virtual machines, security, containers, Kubernetes, Azure VMs, storage solutions (Storage Spaces, Storage Spaces Direct, Data Deduplication, iSCSI, Storage Replica), hybrid file servers etc. Detailed modules covering topics.</li></ul><p><strong>Each module will include the following elements:</strong></p><ul><li class="translation-block"><strong>Theoretical Knowledge:</strong> Basic concepts, technologies and architecture related to the subject.</li><li class="translation-block"><strong>Applied Studies:</strong> Practical exercises to reinforce the subject in a laboratory environment.</li><li class="translation-block"><strong>Scenarios:</strong> Examples based on real-world scenarios.</li><li class="translation-block"><strong>Learning Outcomes:</strong> Skills to be gained at the end of the module.</li><li class="translation-block"><strong>Knowledge Check:</strong> Quizzes or exams to measure how well students have learned information.</li><li class="translation-block"><strong>Summary:</strong> Review of the main points of the module.</li></ul><p><strong>What You Will Gain at the End of Training</strong></p><ul><li>To ensure that participants can effectively manage hybrid environments with Windows Server and Azure technologies.</li><li>Teaching participants current best practices and trends.</li><li>To develop participants' troubleshooting and optimization skills.</li><li>Helping participants prepare for Microsoft certification exams.</li></ul>								</div>
				</div>
				<div class="vamtam-has-theme-widget-styles elementor-element elementor-element-5154baa elementor-align-right elementor-widget elementor-widget-button" data-id="5154baa" data-element_type="widget" data-e-type="widget" data-widget_type="button.default">
				<div class="elementor-widget-container">
									<div class="elementor-button-wrapper">
					<a class="elementor-button elementor-button-link elementor-size-sm" href="/wp-content/uploads/2025/01/Administering-Windows-Server-Hybrid-Core-Infrastructure-AZ-800.pdf" target="_blank">
						<span class="elementor-button-content-wrapper">
									<span class="elementor-button-text">Download PDF</span>
					</span>
					</a>
				</div>
								</div>
				</div>
					</div>
				</div>
				</div><p>The post <a href="https://www.morten.com.tr/en/administering-windows-server-hybrid-core-infrastructure-az-800/">Administering Windows Server Hybrid Core Infrastructure (AZ-800)</a> appeared first on <a href="https://www.morten.com.tr/en">Morten</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Microsoft Certified: Azure Administrator Associate</title>
		<link>https://www.morten.com.tr/en/microsoft-certified-azure-administrator-associate/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=microsoft-certified-azure-administrator-associate</link>
		
		<dc:creator><![CDATA[dvususer]]></dc:creator>
		<pubdate>Thu, 09 Jan 2025 12:32:08 +0000</pubdate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Eğitimler]]></category>
		<category><![CDATA[Microsoft]]></category>
		<guid ispermalink="false">http://18.199.85.50/?p=995064</guid>

					<description><![CDATA[<p>Eğitim Hakkında Özel: Azure Yöneticisi, bir bulut ortamında kimlik, yönetişim, depolama, bilgi işlem ve sanal ağları uygular, yönetir ve izler. Bu kurs, BT Profesyonellerine Azure aboneliklerini yönetmeyi, kimlikleri güvenliğini sağlamayı, altyapıyı yönetmeyi, sanal ağları yapılandırmayı, Azure&#8217;u ve şirket içi siteleri bağlamayı, ağ trafiğini yönetmeyi, depolama çözümleri uygulamayı, sanal makineleri oluşturmayı ve ölçeklendirmeyi, web uygulamaları ve...</p>
<p>The post <a href="https://www.morten.com.tr/en/microsoft-certified-azure-administrator-associate/">Microsoft Certified: Azure Administrator Associate</a> appeared first on <a href="https://www.morten.com.tr/en">Morten</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div data-elementor-type="wp-post" data-elementor-id="995064" class="elementor elementor-995064" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-5c62cda e-flex e-con-boxed e-con e-parent" data-id="5c62cda" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-5d6a6c0 elementor-widget elementor-widget-text-editor" data-id="5d6a6c0" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><strong>About Education</strong></p><ul><li class="translation-block"><strong>Special:</strong> Azure Manager implements, manages, and monitors identity, governance, storage, compute, and virtual networks in a cloud environment. This course teaches IT Professionals how to manage Azure subscriptions, secure identities, manage infrastructure, configure virtual networks, connect Azure and on-premises sites, manage network traffic, implement storage solutions, create and scale virtual machines, implement web applications and containers, data teaches them how to backup and share and monitor your solution.</li></ul><p><strong>Prerequisites</strong></p><p>Successful Azure Administrators begin this role with experience in virtualization, networking, Identity, and storage.</p><ul><li>Understanding of on-premises virtualization technologies, including: VMs, virtual networking, and virtual hard disks.</li><li>Knowledge of network configurations, TCP/IP, Domain Name System (DNS), virtual private networks (VPNs), firewalls and encryption technologies.</li><li>To have knowledge about Active Directory concepts, users, groups and role-based access control.</li><li>Resilience and understanding of disaster recovery, including backup and restore operations.</li></ul><p><strong>Duration of Training</strong></p><p><strong>Toplam Süre:</strong> 5 Gün (Günde 6 saat)<br /><strong>Toplam Eğitim Saati:</strong> 30 saat<br /><strong>Eğitim Formatı:</strong> Uygulamalı ve interaktif yüz yüze /online ortam</p><p><strong>Who Should Participate?</strong></p><p>This course is for Azure Administrators. Azure Administrator implements, manages, and monitors identity, governance, storage, compute, and virtual networks in a cloud environment. Azure Administrator will provision, size, monitor, and tune resources as appropriate.</p><p><strong>Educational Content</strong></p><ul><li><strong>AZ-104: Prerequisites for Azure administrators</strong><ul><li>Using Azure Resource Manager</li><li>Introduction to Azure Cloud Shell</li><li>Introduction to Bash</li><li>Introduction to PowerShell</li><li>Configure resources with Azure Resource Manager templates</li></ul></li><li><strong>AZ-104: Manage identities and governance in Azure</strong><ul><li>Understanding Microsoft Entra ID</li><li>Configure user and group accounts</li><li>Configure subscriptions</li><li>Configure Azure Policy</li><li>Configure role-based access control</li><li>Create Azure users and groups in Microsoft Entra ID</li><li>Secure your Azure resources with Azure role-based access control (Azure RBAC)</li><li>Let users reset their passwords with Microsoft Entra self-service password reset</li></ul></li><li><strong>AZ-104: Implement and manage storage in Azure</strong><ul><li>Configure storage accounts</li><li>Configuring Azure Blob Storage</li><li>Configure Azure Storage security</li><li>Configure Azure Files and Azure File Sync</li><li>Creating an Azure Storage account</li><li>Controlling access to Azure Storage with shared access signatures</li><li>Upload, download and manage data with Azure Storage Explorer</li></ul></li><li><strong>AZ-104: Configure and manage virtual networks for Azure administrators</strong><ul><li>Configuring virtual networks</li><li>Configuring network security groups</li><li>Configure Azure Virtual Network peering</li><li>Configuring network routing and endpoints</li><li>Configure Azure Load Balancer</li><li>Configure Azure Application Gateway</li><li>Design an IP addressing scheme for your Azure deployment</li><li>Deploy your services across Azure virtual networks and integrate them using virtual network peering</li><li>Host your domain on Azure DNS</li><li>Manage and control traffic flow in your Azure deployment with redirects</li><li>Increase application scalability and flexibility using Azure Load Balancer</li></ul></li><li><strong>AZ-104: Deploy and manage Azure computing resources</strong><ul><li>Configuring virtual machines</li><li>Configuring virtual machine availability</li><li>Configure Azure App Service plans</li><li>Configure Azure App Service</li><li>Configure Azure Container Instances</li><li>Managing virtual machines with Azure CLI</li><li>Creating a Windows virtual machine in Azure</li><li>Host a web app with Azure App Service</li></ul></li><li><strong>AZ-104: Monitor and backup Azure resources</strong><ul><li>Configuring virtual machine backups</li><li>Configure Azure Monitor</li><li>Configuring Log Analytics</li><li>Configuring Network Monitor</li><li>Improve incident response with Azure Monitor alerts</li><li>Analyze your Azure infrastructure using Azure Monitor logs</li><li>Monitor your Azure virtual machines with Azure Monitor</li></ul></li></ul><p><strong>What You Will Gain at the End of Training</strong></p><p>Students will learn:</p><ul><li>AZ-104: Prerequisites for Azure administrators</li><li>AZ-104: Manage identities and governance in Azure</li><li>AZ-104: Implement and manage storage in Azure</li><li>AZ-104: Configure and manage virtual networks for Azure administrators</li><li>AZ-104: Deploy and manage Azure computing resources</li><li>AZ-104: Monitor and backup Azure resources</li></ul>								</div>
				</div>
				<div class="vamtam-has-theme-widget-styles elementor-element elementor-element-5154baa elementor-align-right elementor-widget elementor-widget-button" data-id="5154baa" data-element_type="widget" data-e-type="widget" data-widget_type="button.default">
				<div class="elementor-widget-container">
									<div class="elementor-button-wrapper">
					<a class="elementor-button elementor-button-link elementor-size-sm" href="/wp-content/uploads/2025/01/Microsoft-Certified-Azure-Administrator-Associate.pdf" target="_blank">
						<span class="elementor-button-content-wrapper">
									<span class="elementor-button-text">Download PDF</span>
					</span>
					</a>
				</div>
								</div>
				</div>
					</div>
				</div>
				</div><p>The post <a href="https://www.morten.com.tr/en/microsoft-certified-azure-administrator-associate/">Microsoft Certified: Azure Administrator Associate</a> appeared first on <a href="https://www.morten.com.tr/en">Morten</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Securing Windows Server 2016</title>
		<link>https://www.morten.com.tr/en/securing-windows-server-2016/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=securing-windows-server-2016</link>
		
		<dc:creator><![CDATA[dvususer]]></dc:creator>
		<pubdate>Tue, 11 Dec 2018 11:23:05 +0000</pubdate>
				<category><![CDATA[Eğitimler]]></category>
		<category><![CDATA[Microsoft]]></category>
		<guid ispermalink="false">http://10.41.150.12/?p=991043</guid>

					<description><![CDATA[<p>Eğitim Hakkında  Windows Server 2016 ortamlarında güvenliği sağlama becerilerini kazandırmayı amaçlayan bu eğitim, katılımcılara sistemlerinizi güvenli hale getirmek, tehditleri tespit etmek ve etkili bir şekilde yanıt vermek için gerekli araç ve teknikleri öğretir. Eğitimde Windows Defender, BitLocker, AppLocker, Dynamic Access Control, Just Enough Administration (JEA) gibi modern güvenlik araçları ve özellikler ele alınır.    Ön...</p>
<p>The post <a href="https://www.morten.com.tr/en/securing-windows-server-2016/">Securing Windows Server 2016</a> appeared first on <a href="https://www.morten.com.tr/en">Morten</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div data-elementor-type="wp-post" data-elementor-id="991043" class="elementor elementor-991043" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-0e3bcb1 e-flex e-con-boxed e-con e-parent" data-id="0e3bcb1" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-b0c0b07 elementor-widget elementor-widget-text-editor" data-id="b0c0b07" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><b><span data-contrast="auto">About Education</span></b><span data-ccp-props="{}"> </span></p><p class="translation-block"><span data-contrast="auto">This training aims to provide security skills in Windows Server 2016 environments and teaches participants the tools and techniques needed to secure your systems, detect threats and respond effectively. In Education </span><b><span data-contrast="auto">Windows Defender</span></b><span data-contrast="auto">, </span><b><span data-contrast="auto">BitLocker</span></b><span data-contrast="auto">, </span><b><span data-contrast="auto">AppLocker</span></b><span data-contrast="auto">, </span><b><span data-contrast="auto">Dynamic Access Control</span></b><span data-contrast="auto">, </span><b><span data-contrast="auto">Just Enough Administration (JEA)</span></b><span data-contrast="auto"> are discussed.</span><span data-ccp-props="{}"> </span></p><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Prerequisites</span></b><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">It is recommended to have the following knowledge and skills before attending this training:</span><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="147" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Basic network and security knowledge</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="147" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Experience in Windows Server administration</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="147" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Active Directory Domain Services (AD DS) configuration information</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="147" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Basic knowledge of using PowerShell</span><span data-ccp-props="{}"> </span></li></ul><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Duration of Training</span></b><span data-ccp-props="{}"> </span></p><p><strong>Toplam Süre:</strong> 5 Gün (Günde 6 saat)<br /><strong>Toplam Eğitim Saati:</strong> 30 saat<br /><strong>Eğitim Formatı:</strong> Uygulamalı ve interaktif yüz yüze /online ortam</p><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Who Should Participate?</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="149" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">System administrators</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="149" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Security experts</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="149" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">IT professionals who manage Windows Server infrastructure</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="149" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Network engineers looking to optimize Windows Server security</span><span data-ccp-props="{}"> </span></li></ul><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Training Content and Laboratory Details</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 1: Understanding Attacks, Detecting Breaches, and Sysinternals Tools</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="150" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Understanding attack types and vectors</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="150" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Detecting security breaches</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="150" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Examining activities with Sysinternals tools</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="151" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Identifying types of attacks</span></li><li data-leveltext="%1." data-font="" data-listid="151" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Exploring Sysinternals tools</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 2: Credentials and Privileged Access Protection</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="152" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">User rights and account security</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="152" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Privileged Access Workstations (PAWs)</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="152" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Local Administrator Password Solution (LAPS)</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="153" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Configuring user rights</span></li><li data-leveltext="%1." data-font="" data-listid="153" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">LAPS deployment and testing</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 3: Limiting Administrators with Just Enough Administration (JEA)</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="154" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">JEA's foundations</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="154" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">JEA configuration and deployment</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="155" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Create and test a JEA endpoint</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 4: Privileged Access Management (PAM) and Management Forests</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="156" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">ESAE forests</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="156" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Microsoft Identity Manager (MIM)</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="156" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Just-in-Time Privilege Management (JIT)</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="157" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Configuring and managing PAM roles</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 5: Malware and Threat Mitigation</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="158" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Configuring Windows Defender and AppLocker</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="158" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Using Device Guard</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="159" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Application security with Windows Defender and AppLocker</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 6: Advanced Auditing and Log Analytics</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="160" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Advanced control configuration</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="160" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">PowerShell logging</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="161" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Configuring file system access control</span><span data-ccp-props="{}"> </span></li><li data-leveltext="%1." data-font="" data-listid="161" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">PowerShell logging and auditing</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 7: Advanced Threat Analytics and Management Tools</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="162" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Advanced Threat Analytics (ATA) yapılandırması</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="162" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Using Microsoft Operations Management Suite (OMS)</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="163" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Implementation and configuration of ATA and OMS</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 8: Security of Virtualization Infrastructure</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="164" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Shielded fabrics and Shielded VMs</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="165" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Deploy Guarded Fabric with administrator-trusted authentication</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 9: Application Development and Server Workload Security</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="166" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Use of Security Compliance Toolkit (SCT)</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="166" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Configuring Windows and Hyper-V containers</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="167" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Configuring security baselines with SCT</span></li><li data-leveltext="%1." data-font="" data-listid="167" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Deploying Windows containers</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 10: Planning and Protecting Data</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="168" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Encryption and BitLocker applications</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="168" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Using Azure Information Protection</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="169" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Protect data using encryption and BitLocker</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 11: Optimizing and Securing File Services</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="170" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Using File Server Resource Manager (FSRM)</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="170" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Dynamic Access Control (DAC) applications</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="171" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Configuring FSRM quotas and file scanning settings</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 12: Securing Network Traffic with Firewalls and Encryption</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="172" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Windows Firewall and IPsec configurations</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="173" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Configuring outbound and inbound rules</span><span data-ccp-props="{}"> </span></li><li data-leveltext="%1." data-font="" data-listid="173" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Creating connection security rules</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 13: Securing Network Traffic</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="174" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">DNSSEC and SMB security</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="175" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Configuring and testing DNSSEC</span><span data-ccp-props="{}"> </span></li><li data-leveltext="%1." data-font="" data-listid="175" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Verifying SMB encryption</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">What You Will Gain at the End of Training</span></b><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Participants who complete this training will:</span><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="176" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Can use Windows Server 2016 security features.</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="176" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">It can detect and manage malware threats.</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="176" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Can configure credential and privileged access management applications.</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="176" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Can apply dynamic access control and encryption methods.</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="176" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto">Can deploy and manage advanced threat analytics tools.</span><span data-ccp-props="{}"> </span></li></ul>								</div>
				</div>
				<div class="vamtam-has-theme-widget-styles elementor-element elementor-element-bedf545 elementor-align-right elementor-widget elementor-widget-button" data-id="bedf545" data-element_type="widget" data-e-type="widget" data-widget_type="button.default">
				<div class="elementor-widget-container">
									<div class="elementor-button-wrapper">
					<a class="elementor-button elementor-button-link elementor-size-sm" href="/wp-content/uploads/2024/12/Securing-Windows-Server-2016.pdf" target="_blank">
						<span class="elementor-button-content-wrapper">
									<span class="elementor-button-text">Download PDF</span>
					</span>
					</a>
				</div>
								</div>
				</div>
					</div>
				</div>
				</div><p>The post <a href="https://www.morten.com.tr/en/securing-windows-server-2016/">Securing Windows Server 2016</a> appeared first on <a href="https://www.morten.com.tr/en">Morten</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Networking With Windows Server 2016</title>
		<link>https://www.morten.com.tr/en/networking-with-windows-server-2016/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=networking-with-windows-server-2016</link>
		
		<dc:creator><![CDATA[dvususer]]></dc:creator>
		<pubdate>Tue, 11 Dec 2018 11:21:25 +0000</pubdate>
				<category><![CDATA[Eğitimler]]></category>
		<category><![CDATA[Microsoft]]></category>
		<guid ispermalink="false">http://10.41.150.12/?p=991035</guid>

					<description><![CDATA[<p>Eğitim Hakkında  Bu eğitim, Windows Server 2016&#8216;nın ağ yönetimi yeteneklerini uygulamalı olarak öğrenmek isteyen IT profesyonelleri için hazırlanmıştır. Eğitim, IPv4 ve IPv6 ağlarının yapılandırılması, DHCP ve DNS gibi temel ağ hizmetlerinin uygulanması ve yönetilmesi, uzak erişim çözümleri ve yazılım tanımlı ağ (SDN) uygulamaları gibi konulara odaklanır.    Ön Koşullar  Bu eğitime katılmadan önce aşağıdaki bilgi...</p>
<p>The post <a href="https://www.morten.com.tr/en/networking-with-windows-server-2016/">Networking With Windows Server 2016</a> appeared first on <a href="https://www.morten.com.tr/en">Morten</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div data-elementor-type="wp-post" data-elementor-id="991035" class="elementor elementor-991035" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-c4958e5 e-flex e-con-boxed e-con e-parent" data-id="c4958e5" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-cc7f6a5 elementor-widget elementor-widget-text-editor" data-id="cc7f6a5" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><b><span data-contrast="auto">About Education</span></b><span data-ccp-props="{}"> </span></p><p class="translation-block"><span data-contrast="auto">This training is designed for IT professionals who want to learn the network management capabilities of </span><b><span data-contrast="auto">Windows Server 2016</span></b><span data-contrast="auto"> in a hands-on way. The training focuses on topics such as configuring IPv4 and IPv6 networks, implementing and managing basic network services such as DHCP and DNS, remote access solutions and software-defined networking (SDN) applications.</span><span data-ccp-props="{}"> </span></p><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Prerequisites</span></b><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">It is recommended to have the following knowledge and skills before attending this training:</span><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="121" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Basic networking knowledge (e.g. IP addressing, subnetting)</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="121" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Basic administrative experience in Windows Server environment</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="121" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Experience working on Windows client operating systems</span><span data-ccp-props="{}"> </span></li></ul><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Duration of Training</span></b><span data-ccp-props="{}"> </span></p><p><strong>Toplam Süre:</strong> 5 Gün (Günde 6 saat)<br /><strong>Toplam Eğitim Saati:</strong> 30 saat<br /><strong>Eğitim Formatı:</strong> Uygulamalı ve interaktif yüz yüze/online ortam</p><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Who Should Participate?</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="123" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">IT managers and network specialists</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="123" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">System administrators who manage Windows Server 2016 environments</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="123" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Professionals involved in network infrastructure installation and management</span><span data-ccp-props="{}"> </span></li></ul><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Training Content and Laboratory Details</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 1: Planning and Implementing an IPv4 Network</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="124" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">IPv4 addressing planning</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="124" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Configuring IPv4 network</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="124" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Managing and troubleshooting IPv4 connectivity</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="125" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Planning IPv4 address assignments</span><span data-ccp-props="{}"> </span></li><li data-leveltext="%1." data-font="" data-listid="125" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Verify and troubleshoot IPv4 connectivity</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 2: DHCP Implementation</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="126" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">DHCP server role overview</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="126" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">DHCP deployment and management</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="126" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Resolving DHCP issues</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="127" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Configuring the DHCP server</span><span data-ccp-props="{}"> </span></li><li data-leveltext="%1." data-font="" data-listid="127" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Verify DHCP configuration</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 3: IPv6 Implementation</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="128" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">IPv6 addressing</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="128" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Interoperability of IPv6 and IPv4 networks</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="128" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">IPv4 to IPv6 migration methods</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="129" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Implementation of DHCPv6</span><span data-ccp-props="{}"> </span></li><li data-leveltext="%1." data-font="" data-listid="129" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Configuration of ISATAP and 6to4 connection technologies</span><span data-ccp-props="{}"> </span></li><li data-leveltext="%1." data-font="" data-listid="129" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Verifying IPv6 connectivity</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 4: DNS Implementation</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="130" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Configuring DNS servers</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="130" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Managing DNS zones</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="130" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Integration of DNS with Active Directory</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="130" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Advanced DNS settings</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="131" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Implementation of DNS servers and zones</span><span data-ccp-props="{}"> </span></li><li data-leveltext="%1." data-font="" data-listid="131" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Configuring DNS policies</span><span data-ccp-props="{}"> </span></li><li data-leveltext="%1." data-font="" data-listid="131" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Resolving DNS issues</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 5: Implementation and Management of IPAM</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="132" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">IP Address Management (IPAM) feature overview</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="132" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Deployment and configuration of IPAM</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="132" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Management of IP address spaces</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="133" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Installation and configuration of IPAM server</span><span data-ccp-props="{}"> </span></li><li data-leveltext="%1." data-font="" data-listid="133" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Monitoring and management of IP addresses</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 6: Remote Access and Web Application Proxy</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="134" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Remote access overview</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="134" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Implementation and validation of Web Application Proxy</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="135" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Configuring Web Application Proxy</span><span data-ccp-props="{}"> </span></li><li data-leveltext="%1." data-font="" data-listid="135" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Verification of the application</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 7: DirectAccess Application</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="136" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">DirectAccess overview</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="136" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Implementation of DirectAccess infrastructure</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="136" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">DirectAccess configuration and management</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="137" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Implement DirectAccess and verify configuration</span><span data-ccp-props="{}"> </span></li><li data-leveltext="%1." data-font="" data-listid="137" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Implementing the advanced DirectAccess solution</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 8: Implementing VPNs</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="138" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">VPN planning</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="138" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">VPN configuration</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="138" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Troubleshooting VPN issues</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="139" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Configure and verify VPN application</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 9: Network Services for Branch Offices</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="140" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Network features for branch offices</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="140" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Distributed File System (DFS) applications</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="140" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">BranchCache configuration</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="141" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">DFS and BranchCache configuration and verification</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 10: Configuring Advanced Network Features</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="142" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Hyper-V networking features</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="142" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">High performance network solutions</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="143" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Configuring and managing Hyper-V virtual switches</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 11: Software Defined Networking (SDN) Implementation</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="144" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">SDN overview</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="144" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Network virtualization applications</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="144" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Configuring the Network Controller</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="145" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Network Controller installation and management</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">What You Will Gain at the End of Training</span></b><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Participants who complete this training will be able to:</span><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="146" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Planning, implementing and managing IPv4 and IPv6 networks</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="146" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Configure basic network services such as DHCP, DNS, and IPAM</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="146" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Implementing DirectAccess, VPN and SDN solutions</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="146" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Managing Hyper-V virtual network infrastructure</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="146" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto">Optimizing branch office network infrastructures</span><span data-ccp-props="{}"> </span></li></ul>								</div>
				</div>
				<div class="vamtam-has-theme-widget-styles elementor-element elementor-element-4238306 elementor-align-right elementor-widget elementor-widget-button" data-id="4238306" data-element_type="widget" data-e-type="widget" data-widget_type="button.default">
				<div class="elementor-widget-container">
									<div class="elementor-button-wrapper">
					<a class="elementor-button elementor-button-link elementor-size-sm" href="/wp-content/uploads/2024/12/Networking-With-Windows-Server-2016.pdf" target="_blank">
						<span class="elementor-button-content-wrapper">
									<span class="elementor-button-text">Download PDF</span>
					</span>
					</a>
				</div>
								</div>
				</div>
					</div>
				</div>
				</div><p>The post <a href="https://www.morten.com.tr/en/networking-with-windows-server-2016/">Networking With Windows Server 2016</a> appeared first on <a href="https://www.morten.com.tr/en">Morten</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Installing And Configuring Windows Server 2012</title>
		<link>https://www.morten.com.tr/en/installing-and-configuring-windows-server-2012/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=installing-and-configuring-windows-server-2012</link>
		
		<dc:creator><![CDATA[dvususer]]></dc:creator>
		<pubdate>Tue, 11 Dec 2018 11:19:43 +0000</pubdate>
				<category><![CDATA[Eğitimler]]></category>
		<category><![CDATA[Microsoft]]></category>
		<guid ispermalink="false">http://10.41.150.12/?p=991027</guid>

					<description><![CDATA[<p>Eğitim Hakkında  Bu beş günlük eğitim, Windows Server 2012 ve Windows Server 2012 R2&#8216;nin kurulumu ve yapılandırılmasını öğretir. Eğitim, çekirdek Windows Server 2012 altyapısını uygulamak ve yapılandırmak için gerekli bilgi ve becerileri kazandırmayı hedefler. Eğitimin odak noktası; ağ, depolama, Active Directory Domain Services (AD DS), Grup İlkesi (Group Policy), dosya ve yazdırma hizmetleri, ve Hyper-V...</p>
<p>The post <a href="https://www.morten.com.tr/en/installing-and-configuring-windows-server-2012/">Installing And Configuring Windows Server 2012</a> appeared first on <a href="https://www.morten.com.tr/en">Morten</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div data-elementor-type="wp-post" data-elementor-id="991027" class="elementor elementor-991027" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-216b77b e-flex e-con-boxed e-con e-parent" data-id="216b77b" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-2bc2cdd elementor-widget elementor-widget-text-editor" data-id="2bc2cdd" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><b><span data-contrast="auto">About Education</span></b><span data-ccp-props="{}"> </span></p><p class="translation-block"><span data-contrast="auto">This five-day training teaches you how to install and configure</span><b><span data-contrast="auto">Windows Server 2012</span></b><span data-contrast="auto"> and </span><b><span data-contrast="auto">Windows Server 2012 R2</span></b><span data-contrast="auto">. The training aims to provide you with the knowledge and skills required to implement and configure the core Windows Server 2012 infrastructure. The training focuses on; is the initial configuration of core services such as networking, storage, Active Directory Domain Services (AD DS), Group Policy, file and print services, and </span><b><span data-contrast="auto">Hyper-V <br><b><span data-contrast="auto">Ideal for preparing for the Microsoft Certified Solutions Associate (MCSA) Exam 410: Installing and Configuring Windows Server 2012</span></b><span data-contrast="auto"> exam.</span><span data-ccp-props="{}"> </span></p><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Prerequisites</span></b><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">It is recommended to have the following knowledge and skills before attending the training:</span><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="90" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Knowledge of networking basics (e.g. TCP/IP, subnetting)</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="90" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Basic knowledge of Active Directory Domain Services (AD DS)</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="90" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Awareness of security best practices</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="90" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Server hardware basics</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="90" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto">Experience working on Windows client operating systems (Windows 7 or 8)</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Recommended Training:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="91" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">10967A:</span></b><span data-contrast="auto"> Fundamentals of a Windows Server Infrastructure</span><span data-ccp-props="{}"> </span></li></ul><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Duration of Training</span></b><span data-ccp-props="{}"> </span></p><p><strong>Toplam Süre:</strong> 5 Gün (Günde 6 saat)<br /><strong>Toplam Eğitim Saati:</strong> 30 saat<br /><strong>Eğitim Formatı:</strong> Uygulamalı ve interaktif yüz yüze /online ortam</p><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Who Should Participate?</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="93" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Windows Server administrators</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="93" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">IT professionals who have experience with non-Microsoft technologies and want to migrate to Windows Server</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="93" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1" class="translation-block"><b><span data-contrast="auto">MCSA 410: Installing and Configuring Windows Server 2012</span></b><span data-contrast="auto"> Individuals preparing for the exam</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="93" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1" class="translation-block"><span data-contrast="auto">IT professionals targeting the </span><b><span data-contrast="auto">Microsoft Certified Solutions Expert (MCSE)</span></b><span data-contrast="auto"> certifications in the data center, desktop infrastructure and messaging space</span><span data-ccp-props="{}"> </span></li></ul><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Training Content and Laboratory Details</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 1: Implementing IPv4</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="94" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">TCP/IP protocol suite overview</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="94" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">IPv4 addressing and subnetting</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="94" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">IPv4 configuration and troubleshooting</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-contrast="auto"> IPv4 Application</span><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="95" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Defining subnets</span><span data-ccp-props="{}"> </span></li><li data-leveltext="%1." data-font="" data-listid="95" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Resolving IPv4 issues</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 2: DHCP Implementation</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="96" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Installing the DHCP Server Role</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="96" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Configuring DHCP scopes</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="96" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">DHCP database management and monitoring</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-contrast="auto"> DHCP Application</span><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="97" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Performing DHCP setup</span><span data-ccp-props="{}"> </span></li><li data-leveltext="%1." data-font="" data-listid="97" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Implement DHCP Forwarding Agent (optional)</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 3: Implementing DNS</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="98" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Name resolution on Windows clients and servers</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="98" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Setup and management of DNS server</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="98" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Configuring DNS zones</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-contrast="auto"> DNS Application</span><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="99" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">DNS setup and configuration</span><span data-ccp-props="{}"> </span></li><li data-leveltext="%1." data-font="" data-listid="99" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Creating host records</span><span data-ccp-props="{}"> </span></li><li data-leveltext="%1." data-font="" data-listid="99" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Managing DNS cache</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 4: Deployment and Management of Windows Server 2012</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="100" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Installation and configuration of Windows Server 2012 R2</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="100" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Server management with Windows PowerShell</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-contrast="auto"> Managing Windows Server 2012</span><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="101" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Windows Server 2012 R2 deployment</span><span data-ccp-props="{}"> </span></li><li data-leveltext="%1." data-font="" data-listid="101" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Server Core configuration</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 5: Introduction to Active Directory Domain Services</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="102" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Structure and components of AD DS</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="102" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Installation of Domain Controllers</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-contrast="auto"> Domain Controller Installation</span><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="103" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Setting up a Domain Controller using IFM</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 6: Managing AD DS Objects</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="104" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Management of user, group and computer accounts</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="104" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Delegation of administrative duties</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-contrast="auto"> AD DS Object Management</span><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="105" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Configuring user and group accounts</span><span data-ccp-props="{}"> </span></li><li data-leveltext="%1." data-font="" data-listid="105" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Management of computer objects</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 7: Automating Active Directory Management</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="106" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Using PowerShell and command line tools</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="106" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">PowerShell for bulk operations</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-contrast="auto"> AD DS Management with PowerShell</span><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="107" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Creating bulk user accounts with PowerShell</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 8: IPv6 Implementation</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="108" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Features and advantages of IPv6</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="108" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Interoperability with IPv4</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-contrast="auto"> IPv6 Application</span><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="109" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Configuring IPv6 network</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 9: Implementing Local Storage</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="110" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Management of storage spaces and use of Storage Spaces</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-contrast="auto"> Local Storage Application</span><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="111" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Installation and configuration of a new disk</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 10: File and Print Services</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="112" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Configuring file sharing and printing services</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="112" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Using shadow copies and Work Folders</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-contrast="auto"> File and Print Services</span><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="113" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Creating a file share</span><span data-ccp-props="{}"> </span></li><li data-leveltext="%1." data-font="" data-listid="113" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Configuring the print pool</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 11: Group Policy Implementation</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="114" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Creation of GPOs and central store configuration</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-contrast="auto"> Group Policy Implementation</span><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="115" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Configuring Group Policy Objects</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 12: Ensuring Security with Group Policy</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="116" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Configuring security settings</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="116" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Windows Firewall management</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-contrast="auto"> Security Management with Group Policy</span><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="117" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Configuring AppLocker policies</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Module 13: Virtualization with Hyper-V</span></b><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">Topics:</span></b><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="118" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Hyper-V installation and management</span><span data-ccp-props="{}"> </span></li></ul><p><b><span data-contrast="auto">Lab:</span></b><span data-contrast="auto"> Server Virtualization with Hyper-V</span><span data-ccp-props="{}"> </span></p><ol><li data-leveltext="%1." data-font="" data-listid="119" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Creating and configuring a virtual machine</span><span data-ccp-props="{}"> </span></li><li data-leveltext="%1." data-font="" data-listid="119" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Management of virtual networks</span><span data-ccp-props="{}"> </span></li></ol><p><span data-ccp-props="{}"> </span></p><p><b><span data-contrast="auto">What You Will Gain at the End of Training</span></b><span data-ccp-props="{}"> </span></p><p><span data-contrast="auto">Participants who complete this training will be able to:</span><span data-ccp-props="{}"> </span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="120" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Installing and configuring Windows Server 2012</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="120" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Applying AD DS and group policies</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="120" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">IPv4 and IPv6 configuration</span><span data-ccp-props="{}"> </span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="120" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Managing file, print, and virtualization services</span><span data-ccp-props="{}"> </span></li></ul>								</div>
				</div>
				<div class="vamtam-has-theme-widget-styles elementor-element elementor-element-15eccfd elementor-align-right elementor-widget elementor-widget-button" data-id="15eccfd" data-element_type="widget" data-e-type="widget" data-widget_type="button.default">
				<div class="elementor-widget-container">
									<div class="elementor-button-wrapper">
					<a class="elementor-button elementor-button-link elementor-size-sm" href="/wp-content/uploads/2024/12/Installing-And-Configuring-Windows-Server-2012.pdf" target="_blank">
						<span class="elementor-button-content-wrapper">
									<span class="elementor-button-text">Download PDF</span>
					</span>
					</a>
				</div>
								</div>
				</div>
					</div>
				</div>
				</div><p>The post <a href="https://www.morten.com.tr/en/installing-and-configuring-windows-server-2012/">Installing And Configuring Windows Server 2012</a> appeared first on <a href="https://www.morten.com.tr/en">Morten</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>