Windows Server and System Administration Training

Description

Windows Server and System Administration Training

Get Information

According to research, there is a need for approximately 39,000 fully trained network experts in Turkey in the fields of developing network structures and information security systems.

In the industry, 8 out of 10 companies use at least one of the virtualization technologies such as VMware or Hyper-V extensively.

For those who want to enter the IT sector, it has become a necessity to know technologies such as Windows Server, Firewall, Mail Server, Network Devices.

With this training, you will complete the aspects you feel lacking and continue to take firm steps in the sector.

This training, where you will learn the stages of becoming a System Administrator from scratch, is a training that all friends who want to work in Information Processing Departments in public institutions and organizations and private sector must and absolutely must take.

In addition, if your goal is to progress towards Microsoft certifications and prepare for the most important Microsoft certifications MCSA and MCSE certifications, this training is your first step.

This is a very comprehensive course for those who are considering a career in computer networking, those who want to become a system administrator and those who want to build a solid foundation in this field.

With this training, you will be able to learn in detail how to manage the entire system in departments such as IT and similar departments.

Education Objectives

  • To perform IP Addressing Operations at Expertise Level,
  • Working with Binary and Decimal Number Systems,
  • Establishing and Managing Corporate Computer Networks,
  • Realizing Remote Connection to the desired PC, Phone, Tablet and Server,
  • Detecting Connection Problems in the Network and Providing Solutions,
  • Detecting IP Addresses of Web Servers and Reading Attack Scenarios,
  • Create Network Drivers and Create Resource Assignments,
  • 5 IP Address Analysis in Separate Classes and Learning Special Rules,
  • To have knowledge about internal (private) and external (public) IP Addresses,
  • Understanding Special Cases in IP Address Definitions,
  • Understand Subnet Mask Concept, Default Gateway and DNS IPs,
  • To learn Network Protocols,
  • Learn Virtual System Setups,
  • Developing Different Approaches to Connectivity Issues,
  • To be able to analyze MAC Addresses and Forensic Case Studies,
  • To have knowledge about Local Area Networks (LAN) and Wide Area Networks (WAN),
  • Network Configuration in Storey Structures with Scenarios,
  • To make speed calculations and data transfer analysis in the network,
  • To learn modems and their functions,
  • To have knowledge about Network Devices Used in the Network, Switch-Hub-Router,
  • Understand Network Cables, Speeds and Types,
  • Connecting to Phones and Tablets,
  • To learn Network Types and Topologies,
  • Learn Windows Server Installation and Current Settings from scratch,
  • Understanding Role Configurations on Servers,
  • Domain, Domain Controller and Active Directory
  • To learn Active Directory Architecture, Logical and Physical Structure,
  • Learn Domain Setup step by step,
  • See Domain User Accounts,
  • To learn Authorization Restrictions for Users and Computers in the domain,
  • Understanding Organizational Units in Active Directory,
  • See Private Groups and Group Memberships in the domain,
  • Including Computers in the Domain,
  • See Local and Domain User Accounts,
  • To make Domain User Operations with scenarios,
  • Resource Sharing and Permitting in Large Structures,
  • Producing Sample Solutions to Authority Conflicts in Shares,
  • Realize Confidential Access to Shared Resources,
  • Confidential Data Sharing on the network,
  • File Server Setup, Settings and Sample Applications,
  • Understand NTFS Permissions and Authorization Hierarchies,
  • Setting Data Quotas,
  • To realize Group Policy Applications from Real Scenarios,
  • Perform Inheritance, Enforce and Priority Adjustments to Bans,
  • Analyze Custom Bans, User Parses and Report with GPOs,
  • Installing Software on Remote Computers,
  • User Profile Migration and Redirection, Folder Redirection,
  • Understanding DNS,
  • Set up Remote Connections with Remote Desktop,
  • Install and Configure DHCP Server from Scratch,
  • Learning Security Threats and Approaches in Domains,
  • Understanding NAT Logic with scenarios,
  • To learn Workgroup and Domain Distinctions,
  • Port Concept and Applied Advanced Port Forwarding,
  • Detecting Users and Computers Accessing Domain Resources,
  • To see the management of IT infrastructures of companies, Microsoft services, management of network devices of industry giants such as Cisco and HP, virtualization technologies such as Microsoft Hyper-V and VMware, Microsoft Exchange Server and firewall,
  • Prepared to train the IT specialists needed by the IT sector, this training has a wide-ranging content that covers the most demanded products and technologies in the sector, fed by current and real-life scenarios. Trainings will be given on the current Windows Server platform.
  • After the training; you will be able to recognize and manage devices, products, solutions and systems in the IT infrastructure of companies.
  • You will be able to make purchasing decisions about network devices such as computers, switches, routers, wireless access points; server and storage products, security products such as firewall and antivirus.
  • You will have all the technical and practical knowledge of Microsoft Exchange Server mail server, you will be able to configure Cisco network devices (Router, Switch).
  • You will be able to build the necessary infrastructures for company staff and customers to access services from anywhere, on any device, reliably and without interruption.
  • You will be able to take precautions according to disaster scenarios and ensure business continuity.
  • You will learn current virtualization technologies in practice.

Education Content

  • IP ADDRESSES AND COMPUTER NETWORK ACCESS

Basic Network Introduction

What is IP

IP address translation and OKTET concept

Limit values of an IP address

Practice recognizing IP addresses and General Rules

IP address classes

Network ID and Host ID concepts

Internal and external IP addresses

IP addresses used inside (PRIVATE IPs)

Virtual computer setups and settings

How an IP address is given to a computer – What is APIPA – Subnet Mask and Gateway

Connection tests PING and IPCONFIG commands

Detection of connection problems and solutions

Enabling communication between virtual and real computers

IP addresses and default gateway relationship + What is DHCP and DNS

Update information IPV6

Performing a remote desktop connection

Connecting to your home computer from a different location, Port Forwarding

Another way to connect to the computer you want

What is MAC Address

Network types / Local and Wide Area Networks

How are network configurations performed in tiered structures?

How to share files and folders on a local network?

How to access a shared resource on a local network?

Permission assignments in local resource shares

What does the special number CIDR at the end of IP addresses mean?

Data rate calculations in network BIT and BYTE distinction

Connecting to phones and tablets

 

  • WINDOWS SERVER SYSTEM ADMINISTRATION FROM SCRATCH

Current Windows Server Installation

VirtualBox settings after installation

Server startup settings after installation

Connection tests after installation

Active Directory / Domain and Domain Controller

Active Directory – Logical and Physical Structure

Login to server manager panel before installation

First look after Domain Controller installation

How to create a user in Active Directory?

OU configuration in Active Directory

How to delete protected Active Directory folders OUs?

Creating user groups in Active Directory and group memberships

Download an up-to-date Windows ISO file

To install up-to-date Windows for domain participation

Current Windows post-installation settings

How to include a computer in a domain?

Domain users and Local users

Ban domainers from using computers

Resetting users’ domain passwords

Determine the login hours of domain users

Creating accounts in the domain for temporary employees

Deactivating a domain account

How to share files and folders on a network?

How to access a shared resource in a domain?

Close security gaps in user permission assignments and sharing

Prevent authorization conflicts in resource sharing

Hidden network shares and access to them

How to perform confidential access to all drives of a computer on a network?

Detect and block hidden browsing on your computer

Hierarchy and inheritance concepts in user permission configuration

How to create network drives?

How to add a member server to the server administration panel?

How to configure a Windows server as a File Server?

Project implementation with File Server management panel

Special quota applications in resource sharing

How to prevent unwanted data from entering File Server resources?

Introduction to bans – What is Group Policy? How to create it?

Assigning bans to users with Group Policy

Inheritance, enforce and priority concepts in Group Policies

Important settings, parsing and reporting operations in Group Policies

What is Starter GPO? How to create it?

How to install software on remote computers?

Folder Redirection with GPO and user profile redirection

Weaken domain password policy + wallpaper application with GPO

Print Server Setup and Management

Remotely assign printers on Print Server to users with GPO

Closing vulnerabilities in Print Server and Print Server advanced applications

Service that automatically distributes IP addresses – What is DHCP and how to set it up?

How to configure DHCP service from scratch?

Testing DHCP – DNS information and Remote Desktop Application

Who Should Receive the Training?

  • IT professionals working in the IT sector,
  • Those who want to specialize in networking,
  • Those who want to specialize in virtualization technology,
  • Those who want to have knowledge in Mail Server management,
  • Meeting the firewall and security demands of companies,
  • Those who are responsible for the management of networks and systems in the organization they work for and want to improve themselves in this field,
  • Anyone considering a career in computer networking,
  • Those who want to build a solid foundation in MCSE,
  • Those who want to build and manage centrally managed networks,
  • Those who want to perform the installation and management of Windows Servers,
  • It is for participants who want to design, build and manage end-to-end IT infrastructures using the latest technologies of Microsoft and Cisco; who want to master IT solutions and the latest trends in this field.

Plan this training institutionally!

This training can be planned in different durations and content specific to your organization. Please contact us for detailed rich content and planning to realize your training objectives.

Get in touch

Additional information

Lokasyon

Online

Kontenjan

20

Eğitmen

Academy Club