دوره MCSA 2022 مایکروسافت
راه اندازی و مدیریت انواع شبکه های سازمانی با استفاده از سیستم عامل های مایکروسافتی در سطح کلاینت و سرور، که شما را آماده ورود به بازار کار می کند تا تبدیل به یک مدیر شبکه حرفه ای شوید.

توضیحات
دوره ی آموزش سرور 2022 بر اساس استاندارد آموزشی سناریو محور و پرکتیکال آموزش داده شده و برای تبدیل شدن به یک فرد توانمند در حوزه ی مایکروسافت و سرویس های ویندوز سرور 2022 ، به طور قطع دوره آموزش سرور 2022 بسیار کاربردی و مفید خواهد بود.
یکی از سوالات دانشجویان دوره های آموزش شبکه و آموزش مایکروسافت ( دوره آموزش MCSA) در مورد دوره ی آموزش سرور 2022 در مورد این موضوع است که با وجود اینکه همچنان سرور 2016 و سرور 2019 در شبکه ها استفاده میشود آیا یادگیری سرور 2022 ( MCSA 2022 ) لازم است ؟
جواب ساده و قطعی است ، بله ضروری است که شما دوره آموزش MCSA 2022 و MCSE 2022 ( آموزش سرور 2022 ) را به شکل کامل یاد گرفته و بر سرور 2022 مسلط شوید به این علت که با یادگیری سرور 2022 ( MCSA/MCSE 2022) شما علاوه بر یادگیری سرور 2016 و سرور 2019 مباحث کامل و جدید سرور 2022 را هم فرا میگیرید و با دیدن این دوره آموزشی (MCSA 2022 و MCSE 2022) بر دوره های MCSA 2016 و MCSA 2019 به شکل کامل مسلط می شوید.
در دوره آموزش سرور 2022 ( آموزش MCSA و MCSE 2022) بالغ بر 90 ساعت آموزش تخصصی شبکه و پیاده سازی سرویس های مختلف سرور 2022 همراه با تست خروجی سناریو در لابراتوار است که به شما این اطمینان را میدهد که تمام نکات لازم تا حصول نتیجه را بدیت آورده اید.
به نوعی میتوان گفت آموزش شبکه با آموزش مایکروسافت گره خورده است و هر فردی علاقمند به آموزش دیدن در زمینه شبکه باشد بعد از گذراندن دوره آموزش نتورک پلاس برای ادامه کار به سراغ آموزش سرور 2022 یا همان دوره آموزش MCSA/MCSE 2022 رفته و در این زمینه شروع به یادگیری می کند و علت این موضوع هم ساده است، می توان گفت در 99 درصد سازمانها به طور قطع از ویندوز سرور با ورژن های مختلف از جمله سرور 2016، 2019 و 2022 استفاده می شود.
لذا هر فردی که در زمینه سرویس دهنده ها و سیستم عامل قصد فعالیت داشته باشد باید با گذراندن دوره آموزش MCSA و MCSE 2022 ( آموزش سرور 2022 ) خود را در زمینه آموزش شبکه ارتقا داده و برای فعالیت در سازمان ها آمادگی لازم را بدست آورد.
- سر فصل های دوره MCSA 2022
Installing windows 11
Overview of Windows 11 and Workgroup
Navigating the User Interface
Comparing Different Versions and Architectures
Overview of Different Types of Installation
Overview of Sysprep and OOBE
Using Sysprep to Change SID
Installing Windows 11
Basic Configuration
Upgrading to Windows 11
Using Hiren and Reseting Password
Users, Groups and Profile
Overview of User and Built in Groups
Common Configuration Options
Managing User Accounts
Managing Groups
Managing Users and Groups by Commands
Creating Mass User Creation
Overview of Different Types of Profile
Managing Local Profile
Network Connectivity
Overview of Networking
Configuring IP Network Connectivity
Configuring Networking and Virtual Switch
Storage
Overview of Different Types of Storage
Overview of Different Types of File System
Overview of Different Types of RAIDS
Managing Disks
Overview of MBR and GPT
Creating Basic Partitions, Primaty, Extended and Logical
Creating Dynamic Volumes, Simple, Spanned, Striped and Mirror
Creating Virtual Hard Disks
Managing Partitions and Volumes
Managing Disks, Partitions and Volumes by Command
File Systems and Allocation Unit Size
Creating and Managing Storage Spaces and Pools
Overview of Redundancy in Storage Spaces
Managing 1 Way and 2 Way Mirror
Managing RAID 5
Advance Settings of Storage
Creating Bootable USB by CMD
Creating Bootable USB by Rufus
Managing Files and Printers
Overview of File and Printers
Configuring and Managing Printers
Configuring and Managing File Access
Configuring and Managing Shared Folders
Configuring and Managing Offline File
Configuring and Managing Map Networtk Drive
Overview of Administrative Shares
Creating Hidden Share
Disabling Administrative Shares by Registry
Implementing Group Policy
Overview of Local Group Policy
Managing Local Group Policy
Configuring and Managing Password Policies
Configuring and Managing Account Lockout Policies
Configuring and Managing Audit Policies
Configuring and Managing User Right Assignments
Configuring and Managing Security Options
Configuring and Managing Application Control Policies
Configuring and Managing Administrative templates Sub Policies
Managing Apps in Windows 11
Overview of Providing Apps to Users
Windows Store
Web Browsers
BIOS
Overview of Power on Self-Test
Overview of UEFI
Overview of Legacy Traditional
Security
Overview of Data-Related Security Threats and Access Control List (ACL)
Overview of Device Security
Overview of Using Security Settings to Mitigate Threats
Managing NTFS Permissions
Managing Share Permissions
Securing Data with Encryption File System (EFS)
Implementing and Managing BitLocker
Managing User Account Control
Overview of Network-Related Security Threats
Configuring and Managing Windows Firewall
Configuring and Managing Connection Security Rules
Configuring and Managing Windows Defender
Troubleshooting and Recovery
Overview of Devices and Drivers
System Image Backup
Recovering Files and Images
Restore Point
File History
Previous Version Tab
Remote Desktop
Overview of Remote Desktop
Configuring and Managing Remote Desktop
Configuring and Managing Remote Desktop Assistance
Advance Settings of Remote Desktop
Overview of Team Viewr and Anydesk
Changing RDP Port by Registry
Virtualization
Overview of Virtualization
Installing VMWare Workstation
Configuring and Managing VMWare Workstation
Creating Virtual Machines
Configuring Virtual Machines
Managing Virtual Machines
Configuring and Managing VMWare Workstation Storage
Configuring VMWare Workstation Networking
Advance Settings VMWare Workstation
Installing, Upgrading, and Migrating servers and workloads
Introducing Windows Server
Preparing for Upgrades
Upgrading Windows Server
Managing Windows Server
Overview of Windows Server Dashboard
Overview of Roles and Features
Active Directory
Overview of Domain
Installing Active Directory Domain Services
Creating and Configuring Forest and Domain Controller
Overview of Active Directory Users and Computers
Managing Active Directory Container
Implementing and Managing OUs in Active Directory
Creating and Managing User Accounts in Active Directory
Creating and Managing Groups in Active Directory
Managing Computer Accounts in Active Directory
Managing Users by User Template
Configuring and Managing Additional Domain Controllers
Overview of Install from Media
Configuring Additional Domain Controllers by IFM
Configuring and Managing Read-Only Domain Controllers
Configuring Pre-Stage or Pre-Created Read-Only Domain Controllers
Performing Bulk Active Directory Operations
Demoting DC and Removing Metadata
Joining Computers to Domain by Using GUI
Joining Computers to Domain by Using PowerShell and CMD
Using Offline Join
Introducing PowerShell in Active Directory
Configuring and Managing Active Directory by CMD
Configuring and Managing Active Directory by PowerShell
Advance Settings of Active Directory
Troubleshooting Active Directory Installations
Overview of Kerberos
Overview of NTLM
Overview of LDAP
Overview of Mass User Creation
Creating Multiple Users by CSVDE and LDIFDE
Redirect Users and Computers to a Specific OU
Profile
Overview of profile
Configuring and Managing Roaming Profile
Configuring and Managing Mandatory Profile
Group Policy
Overview of Domain Group Policy
Overview of Group Policy Storage, Linking, Hierarchy
Creating and configuring GPOs
administering GPOs
Managing Group Policy Tabs, Inheritance, Starter GPO, Copy GPO
Configuring and Managing WMI Filtering and Queries
Configuring and Managing Password Policy, Lockout Policy
Configuring and Managing Password Setting Object (PSO)
Configuring and Managing Kerberos and Audit Policy
Configuring and Managing User Right Assignment and Delegation
Configuring and Managing Security Options
Configuring and Managing Restricted Group, System Service
Configuring and Managing Firewall, App Locker
Configuring and Managing Software Installation
Overview of Policies for Group Policy
Configuring and Managing Loopback Processing, Replace and Merge
Implementing Administrative Templates
Configuring and Managing Group Policy Preferences
Planning Group Policy
Configuring and Managing Group Policy Modeling
Configuring and Managing Group Policy Results
Backup and Restore GPOs
Backup and Recovery
Overview of Backup and Restore in Windows server
Overview of Active Directory Backup and Restore in Windows server
Creating Active Directory Full and System State Backup
Overview of Authoritative and Non-Authoritative Recovery
Creating, Managing and Restoring Active Directory Snapshot
Managing and Restoring Recycle Bin in Active Directory
Changing DSRM Password
Using Tombstone for Recovery
Overview of Incremental and Decremental Backup
Overview of Third-Party Backup Tools
Monitoring
Overview of Windows Server 2022 Monitoring Tools
Using Performance Monitor
Monitoring Event Logs
Establishing a Performance Baseline
Identifying the Source of a Performance Problem
Viewing and Configuring Centralized Event Logs
Dynamic Access Control (DAC) and NIC Teaming
Overview of Dynamic Access Control
Configuring and Managing DAC
Overview of NIC Teaming
Configuring and Managing NIC Teaming
Overview of Teaming Modes
Overview of load Balancing
Configuring and Managing NIC Teaming
Internet Information Services (IIS)
Overview of Internet Information Services (IIS)
Creating and Managing Web Site in IIS
Creating and Managing Ftp Site in IIS
Overview of Authentication methods
Configuration Authentication and Authorization
Creating and Managing Virtual Directory
Managing Limits
Creating HTTPS Site with Self-Sign Certificate
Dynamic Host Configuration Protocol (DHCP)
Overview of the DHCP Role Service
Planning a DHCP Server Implementation
Installing and Configuring DHCP Server
Validating the DHCP Server Implementation
Creating and Managing Scopes and Options
Creating and Managing Super Scope
Creating and Managing Multicast Scope
Creating and Managing Split Scope
Creating and Managing Failover by Built in DHCP Failover
Creating and Managing DHCP Policies
Managing DHCP by Commands
Overview of DHCP and BOOTP
Overview of Time 1 and Time 2
Overview of Lease Duration
Monitoring DHCP
Advance Settings of DHCP
Domain Name Service (DNS)
Overview of NetBIOS Name
Overview of Fully Qualify Domain Name
Overview of DNS and WINS Servers
Planning DNS Name Resolution
Implementing DNS servers
Overview of Standard and Active Directory Integrated Zones
Overview of Forward Look up Zone
Overview of Revers Lookup Zone
Configuring and Managing Primary Zone
Creating and Managing Secondary Zone
Creating and Managing Stub Zone
Overview of Records
Managing A, AAAA, CNAME, PTR, MX and SRV Records
Managing DNS Zone Tabs
Managing DNS Server Tabs
Managing Advanced DNS Settings
Configuring and Managing Scopes
Overview of Recursive and Iterative
Configuring and Managing Caching Only DNS Server
Configuring and Managing Root DNS Server
Configuring and Managing DNS Delegation
Configuring and Managing DNS Policies
Configuring and Managing Global Name Zone
Configuring and Managing Forwarder and Conditional Forwarder
Configuring and Managing Advance Round Robin by PowerShell and Policies
Overview of DNS Threats and Mitigations
Securing DNS Server
Troubleshooting DNS
Advance Settings of Domain Name Service
Internet Protocol Address Management (IPAM)
Overview of IPAM
Deploying IPAM
Installing and Configuring IPAM Server
Managing IP Address Spaces and Blocks by Using IPAM
Managing DHCP Servers by Using IPAM
Managing DNS Servers by Using IPAM
Advance Settings of Internet Protocol Address Management
Routing and Remote Access Server (RRAS)
Overview of Routing and Remote Access in Windows Server
Overview of Static and Dynamic Network Address Translation (NAT)
Overview of Port Address Translation (PAT)
Implementing NAT
Overview of Static Routing
Overview of Dynamic Routing
Configuring and Managing Server as a Router
Configuring Static Route
Configuring Dynamic Routing Protocol
Overview of Virtual Private Network (VPN)
Overview of VPN Tunneling Protocols
Overview of VPN Authentication Protocols
Configuring and Managing VPN Remote Access
Configuring and Managing VPN Site to Site
Configuring and Managing DHCP Relay Agent
Configuring and Managing Basic Firewall by RRAS
Advance Settings of Routing and Remote Access Server
File Server Resource Manager (FSRM)
Overview of Disk Quota
Configuring and Managing Disk Quota
Overview of File Server Resource Manager (FSRM)
Configuring and Managing Folder Quota
Configuring and Managing a File screening to a Volume or Folder
Configuring and Managing Storage Reports Management
Managing Quota and File Screening Templates
Advance Settings of File Server Resource Manager
Distributed File System (DFS) and DFS-Replication
Overview of Distributed File System (DFS)
Configuring and Managing DFS Namespaces
Overview of Distributed File System Replication
Configuring and Managing DFS Replication
Managing DFS Replication Groups
Configuring Advance Tabs of DFS
Server Core
Overview of Server Core
Installing Server Core
Managing Server Core
Configuring Server Core
Using CMD and PowerShell to Configure Server Core
Using Remote Access to Configure Server Core
Installing Active Directory on a Server Core
Configuring and Managing Server Core as a Domain Controller
Configuring and Managing Server Core as an Additional Domain Controller
Configuring and Managing Server Core as a Read Only Domain Controller
Service Account
Overview of Service Account
Managing Service Accounts
Creating and Managing Standalone Managed Service Account (sMSA)
Creating and Managing Group Managed Service Account (gMSA)
Creating and Managing Virtual Group Service Account
IPv4 and IPv6
Overview of IPv4 and IPv6
Overview IPv6
Subnetting
Superneting
Active Directory Domain and Trust (ADDT)
Overview of Root Tree Domains and Child Domains
Configuring and Managing Child Domain Controllers
Configuring and Managing Root Tree Domain Controllers in the Same Forest
Overview of Forest, External, Realm, Parent-Child, Root Tree Domain and Shortcut Trusts
Configuring and Managing Forest, External, Realm, and Shortcut Trusts
Configuring and Managing Forest-Wide Authentication and Selective authorization
Configuring and Managing SID Filtering
Configuring and Managing Name Suffix Routing
Advance Settings of Active Directory Domain and Trust
Active Directory Site and service (ADSS)
Overview of Active Directory Domain Controllers Replication
Configuring and Managing Active Directory Sites
Configuring and Managing Active Directory Subnets
Configuring and Managing Site Links
Overview of Knowledge Consistency Checker (KCC)
Configuring and Managing Replication Topology
Overview of Active Directory Partitions
Configuring and Managing AD DS Intra-Site Replication
Configuring and Managing AD DS Inter-Site Replication
Creating and Managing Site Link Bridges
Manage Registration of SRV Records
Managing Replication by Command
Monitoring and Troubleshooting ADDS Replication
Advance Settings of Active Directory Site and service
Active Directory Certificate Service (ADCS)
Overview of Encryption
Overview of Symmetric and Asymmetric Encryption
Overview of Certificate and Digital Signature
Overview of ADCS Role Service
Choosing between a standalone and an enterprise CA
Choosing between a root and a subordinate CA
Overview of different role Service of ADCS
Installing and Configuring Certificate Authority
Configuring and Managing Online Root and Subordinate CAs
Installing and Configuring Offline Root and Subordinate CAs
Configuring and Managing Certificate Templates
Enrolling Certificate Manually
Auto Enrolling Certificate by GPO
Installing and Configuring CA Web Enrollment Role Service
Enrolling Certificate by using CA Web Enrollment
Exporting and Importing Certificates
Using Internal CA for Publishing a HTTPS Web Site
Configuring and Managing CRL and CDP
Configuring and Managing and manage key archival and recovery
Installing and Configuring Online Responder Role Service
Managing Online Responder
Configuring CA Backup and Recovery
Troubleshooting and Maintaining CAs
Advance Settings of Active Directory Certificate Service
Active Directory Rights Management Services (ADRMS)
Overview of ADRMS
Installing ADRMS
Configuring and Managing ADRMS
Configuring and Managing Rights Policy Templates
Configuring and Managing Exclusion Policies
Configuring and Managing Security Policies
ADRMS Backup and Restore
Configuring Client Side to Use ADRMS
Using ADRMS on Clients to Protect Data
Advance Settings of Active Directory Rights Management Services
Advance Active Directory Configuration
Overview of Active Directory Defragmentation
Configuring Offline Active Directory Defragmentation
Changing Directory Restore Mode Password
Changing Source of Windows server Roles and Feature
Storage and Share
Overview of SMB and NFS
Configuring and Managing Share Folders
Planning Storage Requirements
Configuring and Managing iSCSI Target Server
Overview of Storage Replica
Configuring and Managing Storage Replica
Overview of Data Deduplication
Configuring and Managing Data Deduplication
Failover Clustering
Overview of Failover Cluster
Planning a Failover Cluster
Configuring and Managing Failover Cluster
Configuring and Managing Cluster Networking
Configuring and Managing Cluster Storage
Configuring and optimizing Clustered Shared Volumes (CSVs)
Configuring and Managing Quorum
Configuring and Managing Failover Cluster for DHCP
Configuring and Managing Failover Cluster for File Server
Verifying High Availability
Maintaining and Troubleshooting Failover Cluster
Advance Settings of Failover Cluster
Network Load Balancing (NLB)
Overview of NLB
Configuring NLB Cluster
Planning NLB Implementation
Configuring and Managing the NLB Cluster
Managing Cluster Operation Modes
Managing Cluster Filtering Modes
Validating High Availability for NLB Cluster
Flexible Single Master Operations (FSMO) and Functional Levels
Overview of Flexible Single Master Operations
Managing Domain Naming and Schema Operation Master Roles
Managing RID, PDC and Infrastructure Operation Master Roles
Transferring Operation Master Roles (GUI)
Transferring Operation Master Roles (Command)
Seizing Operation Master Roles
Overview of Domain and Forest Functional Level
Managing Domain Functional Level
Managing Forest Functional Level
Nested Groups and Renaming Domain Controller Name
Overview of Active Directory Nested Groups
Managing Universal, Global and Local Groups
Managing Security and Distribution Groups
Overview of Renaming Domain Controller Name
Renaming Domain Controller Name
Windows Deployment Service WDS
Overview of Windows Deployment Service
Configuring and Managing Windows Deployment Service
Installing OS by WDS
IPSec
Overview of IPSec
Overview of Man in the Middle Attack
Overview of Microsoft Network Monitor and Wireshark
Securing FTP connection by Using IPSec
Print Server
Overview of Windows printer deployments
Overview of Printer Permissions
Configuring and Managing Printer
Overview of Spooling and Advance Tab Options
Overview of Printer Pooling
Configuring Printer Pooling
شرکت در دوره
برای شرکت در دوره شما باید تصمیم بگیرید که آیا می خواهید به یک متخصص شبکه در زمینه مایکروسافت تبدیل شوید یا خیر. سپس با شرکت در این دوره ما به شما کمک می کنیم تا به تخصص لازم برسید و مدعی مدیریت در دنیای شبکه شوید.
با ما تماس بگیرید تا مشاوران ما هر آنچه که لازم هست تا شما بدانید برای یک شروع هیجان انگیز در اختیارتان بگذارند.

میلاد ندیم خواه
بیشتر از ۱۵ سال هست که در حال فعالیت در حوزه شبکه و امنیت و انجام پروژه های مختلف هستم و ۱۰ سالی هست که آموزش شبکه رو به صورت تخصصی به علاقمندان حوزه شبکه ارائه می دم. در همه این مدت بیش از ۲۰۰۰ ساعت سابقه تدریس دارم و عاشق این هستم که تجربه و دانشم رو در اختیار علاقه مندان به یادگیری بذارم.