CISS 131 Server Technologies I

This course provides the student with the skills to plan, install, and manage Microsoft network operating systems.

Credits

3

Semester Contact Hours Lecture

15

Semester Contact Hours Lab

45

General Education Competency

[GE Core type]

CISS 131Server Technologies I

Please note: This is not a course syllabus. A course syllabus is unique to a particular section of a course by instructor. This curriculum guide provides general information about a course.

I. General Information

Department

Information Technology

II. Course Specification

Course Type

Program Requirement

General Education Competency

[GE Core type]

Credit Hours Narrative

3

Semester Contact Hours Lecture

15

Semester Contact Hours Lab

45

Grading Method

Letter grade

Repeatable

N

III. Catalog Course Description

This course provides the student with the skills to plan, install, and manage Microsoft network operating systems.

IV. Student Learning Outcomes

Upon completion of this course, a student will be able to:

  • Students will comprehend the role and purpose of a network administrator for Windows Server 2012.
  • Successful completion of assignments and lab activities.
  • To develop skills with the terminology, design, implementation and troubleshooting of computer networks.
  • Demonstrating mastery of terminology, design, and troubleshooting simple local area networks (LANs) by completing assigned activities to a passing level.
  • Outcome: To manipulate and customize the Microsoft Server 2012 operating system.
  • Given a lab or written scenario, the students will complete the hands on labs to the satisfaction of the instructor.

V. Topical Outline (Course Content)

Install and configure servers (15–20%) Install servers Plan for a server installation; plan for server roles; plan for a server upgrade; install Server Core; optimize resource utilization by using Features on Demand; migrate roles from previous versions of Windows Server Configure servers Configure Server Core; delegate administration; add and remove features in offline images; deploy roles on remote servers; convert Server Core to/from full GUI; configure services; configure NIC teaming Configure local storage Design storage spaces; configure basic and dynamic disks; configure MBR and GPT disks; manage volumes; create and mount virtual hard disks (VHDs); configure storage pools and disk pools Configure server roles and features (15–20%) Configure file and share access Create and configure shares; configure share permissions; configure offline files; configure NTFS permissions; configure access-based enumeration (ABE); configure Volume Shadow Copy Service (VSS); configure NTFS quotas Configure print and document services Configure the Easy Print print driver; configure Enterprise Print Management; configure drivers; configure printer pooling; configure print priorities; configure printer permissions Configure servers for remote management Configure WinRM; configure down-level server management; configure servers for day-to-day management tasks; configure multi-server management; configure Server Core; configure Windows Firewall Configure Hyper-V (15–20%) Create and configure virtual machine settings Configure dynamic memory; configure smart paging; configure Resource Metering; configure guest integration services Create and configure virtual machine storage Create VHDs and VHDX; configure differencing drives; modify VHDs; configure pass-through disks; manage snapshots; implement a virtual Fibre Channel adapter Create and configure virtual networks Implement Hyper-V Network Virtualization; configure Hyper-V virtual switches; optimize network performance; configure MAC addresses; configure network isolation; configure synthetic and legacy virtual network adapters Deploy and configure core network services (15–20%) Configure IPv4 and IPv6 addressing Configure IP address options; configure subnetting; configure supernetting; configure interoperability between IPv4 and IPv6; configure ISATAP; configure Teredo Deploy and configure Dynamic Host Configuration Protocol (DHCP) service Create and configure scopes; configure a DHCP reservation; configure DHCP options; configure client and server for PXE boot; configure DHCP relay agent; authorize DHCP server Deploy and configure DNS service Configure Active Directory integration of primary zones; configure forwarders; configure Root Hints; manage DNS cache; create A and PTR resource records Install and administer Active Directory (15–20%) Install domain controllers Add or remove a domain controller from a domain; upgrade a domain controller; install Active Directory Domain Services (AD DS) on a Server Core installation; install a domain controller from Install from Media (IFM); resolve DNS SRV record registration issues; configure a global catalog server Create and manage Active Directory users and computers Automate the creation of Active Directory accounts; create, copy, configure, and delete users and computers; configure templates; perform bulk Active Directory operations; configure user rights; offline domain join; manage inactive and disabled accounts Create and manage Active Directory groups and organizational units (OUs) Configure group nesting; convert groups including security, distribution, universal, domain local, and domain global; manage group membership using Group Policy; enumerate group membership; delegate the creation and management of Active Directory objects; manage default Active Directory containers; create, copy, configure, and delete groups and OUs Create and manage Group Policy (15–20%) Create Group Policy objects (GPOs) Configure a Central Store; manage starter GPOs; configure GPO links; configure multiple local group policies; configure security filtering Configure security policies Configure User Rights Assignment; configure Security Options settings; configure Security templates; configure Audit Policy; configure Local Users and Groups; configure User Account Control (UAC) Configure application restriction policies Configure rule enforcement; configure Applocker rules; configure Software Restriction Policies Configure Windows Firewall Configure rules for multiple profiles using Group Policy; configure connection security rules; configure Windows Firewall to allow or deny applications, scopes, ports, and users; configure authenticated firewall exceptions; import and export settings

VI. Delivery Methodologies