Overview
The MCSE certification is recognized worldwide as the gold standard in IT certification. Our MCSE mapped course will give you a comprehensive understanding of Microsoft technologies and the ability to design, implement, and manage innovative solutions that drive business success.
The Linux Administrator course is a comprehensive training program designed to provide IT professionals with the skills and knowledge needed to effectively manage Linux-based systems. This course covers a wide range of topics, including Linux installation and configuration, system administration, networking, security, and scripting.
Curriculum
- Networking Concepts, History of Server OS
- Introduction to Windows Server 2012 R2 / 2016 / 2019 / 2022
- Features of Windows Server 2019/2022
- Installation of Windows Server 2019
- Installation of Windows Server 2022
- Installation of Windows 10
- Introduction and Creation of User Accounts
- Conversion of GUI to Server Core
- Conversion of Server Core to GUI
- IP Addressing Course Curriculum
- Introduction to Read-Only Domain
- Logical Topologies - Peer-Peer & Domain Models
- Introduction to Directory Services
- Evolution of Active Directory Services - LDAP Protocol
- Features of Active Directory
- Installing Active Directory – Domain Controller
- Configuring Member Servers and Clients
- Creating Users in AD-DS
- User Logon Policies
- Password Policies
- Account Lockout Policies
- User Properties
- File Systems
- Security and Sharing Permissions - Folders & Files
- Configuring Map Network Drive
- Access Based Enumeration
- Types of Profiles – Local & Roaming
- Home Folder
- Configuring Quotas using FSRM
- Implementing File Screening using FSRM
- Configuring Storage Reports Management
- Introduction to Distributed File System
- Creating Organisational Unit
- Delegating Control to a User
- Configuring ADC
- Tree Structure - Child Domain
- Forest Structure
- Roles of AD - DS
- Transferring of Roles
- Seizing of Roles
- User and Computer Policies
- Scope of Policies - OU, Domain, Sites
- Group Policy Modeling (RSOP)
- Software Deployment
- Scripts, Folder Redirection
- Group Policy Preferences
- Auditing
- Introduction to Trust Relationship
- Categories, Directions & Types of Trusts
- Functional Levels
- Authentication Protocols Controller
- Sites and Global Catalog
- Replication between the Domain Controllers
- AD-DS Partitions
- Active Directory Recycle Bin
- Introduction and Configuration of DHCP Server
- DHCP Client Configuration
- Reservations
- DHCP Backup and Configuring DHCP Failover
- Configuring Forest Trusts between 2022 Forests
- Internet Basics, Host & LM Host Files
- DNS Naming Hierarchy
- Lookup Zones - Forward and Reverse lookup Zones
- Types of Zones – Primary, Secondary & Stub Zone
- Resource Records, Integration with ADS, SRV Records
- Forwarders, Dynamic Updates
- IIS 10.0 Configuration
- Hosting Websites, Virtual Directories
- Redirecting Web Sites
- Backup & Restoring Sites
- FTP Sites
- Introduction and Configuration of WDS Server
- Attended and Unattended Installation
- Installation of Hyper-V
- Configuring Virtual Machine
- Configuring Virtual Networks
- Configuring Virtual Hard Disks
- Configuring Hyper-V Replica
- Remote Access Server Configuration
- NAT and VPN - PPTP
- Remote Administration Mode
- Configuring iSCSI Target and Initiator
- Introduction to Storage Spaces and Storage Pools
- Configuring Simple Volume (RAID – 0)
- Configuring Mirror Volume (RAID – 1)
- Configuring Parity Volume (RAID – 5)
- Configuring Failover on Hyper-V Virtual Machines
- Windows Server Backup
- Overview of AD-FS, LDS, RMS, CS
- Upgrading Windows Server 2016 to 2019/2022
- Configuring NLB Cluster
- Overview of NAP
- History of Unix & Linux
- Features of Linux
- FHS
- Creating Files Using Cat
- Touch Commands
- Modifying Using Vi/Vim Editors
- Copying Files & Directories
- Removing Files & Directories
- Filtering Commands
- Creating and Deleting Users From Systems
- Creating and Deleting Groups
- Modifying & Verifying File Permissions Using Basic File Permissions
- Installing and Deleting Software Packages Using Rpm and Yum
- Querying and Updating Software Packages
- Configuring NFS File Sharing Server
- Mounting NFS Shared Folder From Client Systems
Course Schedule
Course Schedule
7:00 PM to 9:00 PM
(IST - GMT +5.30)
1 Month
2 Hrs/Day
Sunday Off
8:00 AM to 10:00 AM
(IST - GMT +5.30)
1 Month
2 Hrs/Day
Sunday Off
8:30 AM to 10:30 AM
(IST - GMT +5.30)
1 Month
2 Hrs/Day
Sunday Off
7:00 PM to 9:00 PM
(IST - GMT +5.30)
1 Month
2 Hrs/Day
Sunday Off
8:00 AM to 10:00 AM
(IST - GMT +5.30)
1 Month
2 Hrs/Day
Sunday Off
7:00 PM to 9:00 PM
(IST - GMT +5.30)
1 Month
2 Hrs/Day
Sunday Off
8:30 AM to 10:30 AM
(IST - GMT +5.30)
1 Month
2 Hrs/Day
Sunday Off
7:00 PM to 9:00 PM
(IST - GMT +5.30)
1 Month
2 Hrs/Day
Sunday Off
For Online Training Students
- Instructions will be Provided to do Lab Practicals with your PC at Home
- You will receive a link to your email in an hour after the class from Webex to Download the Recorded Videos..
- All our study materials are available for free access on our online portal for registered students
Imp. Note
- Fees once paid will not be refunded or adjusted against other courses / batches / students under any circumstances whatsoever.
- Organization reserves the right to expel any student during the training period.
- In case, a student fails to attend the given batch the amount given will be forfeited against his / her name.
FAQ'S
US-Council Certification is a set of comprehensive programs aiming to create cybersecurity experts capable of defending against cyber threats. Unlike other cybersecurity certification, which focuses on ethical hacking, US-Council provides a broader approach towards cybersecurity education and awareness, including proactive defense strategies and security testing services.
Choosing US-Council for your cybersecurity certification ensures that you receive thorough education and awareness about the latest security measures and cyber threats. With certifications from US-Council, you gain access to free white papers, the opportunity to become an authorized partner, and insights from informative live webinars, all tailored to help you secure or perish in the face of cybercrime.