CURRICULUM FOR
Department
Computer & Information Technology
Major Network Systems Support
Semesters 1437H - May 2016
Bachelor's Degree
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation Director General for Curricula Design & Development
Qualification for Technical Colleges
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
1
Program Description:
Network Systems Support bachelor program gives you technical knowledge and skills in network
systems support, communications, and security. In this program will cover MCSE, virtual systems, cloud
management, information security, systems administration and more.
This program will give you skills needed to configure and manage different network systems. These
skills are helpful in getting the job in the network system industry. As Telecomm & Electronics College is
a part from MICROSOFT Academy Program, The various certifications (MCSE and MCSE Private
Cloud) are embedded into the program modules.
Most of companies and government organizations are demand for trained networking professionals
to meet the rising network services inside these companies and organizations.
Students complete the program, which provides the knowledge students need in leadership, and
interpersonal and communication skills.
In addition, students can gain real-world experience through participation in the Co-op / training.
Index Content Page 1 Program Description 1
2 Index 1
3 Study Plan 2
4 Brief Description 4
5 Courses Description 6
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
2
First semester
Course
Code Course Name Prerequisites
No. of Units CRH L P T CTH
1 MAT 9325 Mathematics (1) 3 2 2 0 4
2 PHY 9325 Physics 3 2 2 0 4
3 ENG 9305 English Language (1) 3 3 0 1 4
4 CMT 325 Computer Programming 3 2 2 0 4
5 NET 345 Computer Networks 3 2 2 0 4
6 NTS 9325 Basic Network Systems
Administration 3 2 2 2 6
Total 18 13 10 3 26
CRH: Credit Hours L: Lecture P: Practical T: Tutorial CTH: Contact Hours
Second semester
Course
Code Course Name Prerequisites
No. of Units CRH L P T CTH
1 ISL 9305 Islamic studies 2 2 0 0 2
2 MAT 9326 Mathematics (2) MAT 9325 3 2 2 0 4
3 ENG 9306 English Language (2) ENG 9305 3 3 0 1 4
4 STA 9425 Engineering Statistics and
Probability 4 3 2 0 5
5 NTS 9365 Advanced Network Administration NTS 9325 4 2 4 0 6
6 NTS 367 Network Technologies 1 (CCNA3) NET 345 3 2 2 0 4
Total 19 14 10 1 25
CRH: Credit Hours L: Lecture P: Practical T: Tutorial CTH: Contact Hours
Third semester
Course
Code Course Name Prerequisites
No. of Units CRH L P T CTH
1 ARB 9305 Arabic Language 2 2 0 0 2
2 GMS 9437 Engineering Project Management 3 3 0 0 3
3 ENG 9307 English Language (3) ENG 9306 3 3 0 1 4
4 GMS 335 Introduction to Management and
Leadership 2 2 0 0 2
5 NTS 346 Virtual Systems NTS 9325 3 2 2 0 4
6 NTS 368 Network Technologies 2 (CCNA4) NTS 367 3 2 2 0 4
7 NTS 465 Mail Server Management Network NTS 9365 3 2 2 2 6
Total 19 16 6 3 25
CRH: Credit Hours L: Lecture P: Practical T: Tutorial CTH: Contact Hours
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
3
Fourth semester
Course
Code Course Name Prerequisites
No. of Units CRH L P T CTH
1 GMS 9436 Communication Skills 2 2 0 1 3
2 GMS 9438 Quality Tools and Applications 3 3 0 0 3
3 GMS 9439 Engineering Economy 2 2 0 0 2
4 NTS 366 Network Cloud Management NTS 346 3 2 2 2 6
5 NET 466 Networks and Information Security NET 345 3 2 2 0 4
6 NTS 9496 Project NTS 368 4 2 4 0 6
Total 17 13 8 3 24
CRH: Credit Hours L: Lecture P: Practical T: Tutorial CTH: Contact Hours
Fifth semester
Course
Code Course Name Prerequisites
No. of Units
CRH L P T CTH
1 NTS 499 Co-operative Training 4 490
Total 77 56 34 10 100
The total training hours (16X100+490) 2090 CRH: Credit Hours L: Lecture P: Practical T: Tutorial CTH: Contact Hours
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
4
Brief Description
Trainee learns also about OSI and TCP/IP protocols by examining packet and protocol traces.
Hands-on exercises include the use of a variety of standard model-based applications and protocols.
NTS 365 Advanced Network Administration
This course provides the skills and knowledge necessary to design and implement a Windows
Server 2012 R2 infrastructure in an enterprise environment.
The course collectively covers designing, planning, deploying, securing, monitoring, automating,
and virtualizing an enterprise server infrastructure.
This course also covers the knowledge and skills needed to provide an enterprise solution that
supports manual and automated server installations in a physical and virtual environment including the
supporting file and storage services.
Additionally, this course covers the knowledge and skills to plan and implement a highly available,
secure infrastructure with focus on Active Directory Federation Service (AD FS), public key
infrastructure (PKI), and Active Directory Rights Management Services (AD RMS). On the other hand,
trainees will learn the skills necessary to provide enterprise-networking solutions such as DHCP, IPAM,
VPN, and Direct Access.
They will also learn the skills necessary to design and implement a forest and domain infrastructure
including multi domains/forest and branch office scenarios.
Trainees will also learn the skills needed to plan and deploy virtual machines including self-service
and automation of virtual machine deployments as well as planning and implementing a monitoring
strategy that includes Microsoft System Center 2012 R2-Operations Manager.
NTS 367 Network Technologies 1 (CCNA3)
This course provides a comprehensive, theoretical, and practical approach to learning the
technologies and protocols needed to design and implement a converged switched network.
Trainees will learn about the hierarchical network design model and how to select devices for each
layer.
The course explains how to configure a switch for basic functionality and how to implement Virtual
LAN's, VTP, and Inter-VLAN routing in a converged network
NTS 346 Virtual systems
This course describes how to monitor and operate a private cloud with Microsoft System Center
2012. IT focuses on how to manage and administer the private cloud, and it describes how you can
monitor key infrastructure elements and applications that run within the private cloud.
This course is intended for datacenter administrators who are responsible for monitoring and
protecting the private cloud infrastructure.
It is also intended for solution architects who are responsible for designing private cloud
architectures and extending existing private cloud solutions. The primary audience for this course is
administrators who create service requests. The secondary audience includes datacenter administrators—
who are responsible for providing provisioning for applications including configuring and deploying
those applications-application/service business owners and administrators who implement service
requests.
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
5
NTS 368 Network Technologies 2 (CCNA4)
This course explains the WAN Technologies which is the last of four courses leading to the Cisco
Certified Network Associate (CCNA).
The course focuses on advanced IP addressing techniques (Network Address Translation [NAT],
Port Address Translation [PAT], and DHCP), WAN technology and terminology, PPP, ISDN, DDR,
Frame Relay, network management, and introduction to optical networking
NTS 366 Network Cloud Management
This course describes how to monitor and operate a private cloud with Microsoft System Center
2012.This course focuses on how to manage and administer the private cloud, and it describes how you
can monitor key infrastructure elements and applications that run within the private cloud. As well as, it
will explain the planning and implementation for private cloud
NET 466 Networks and Information Security
The course covers theory and practice of network and information security, focusing in particular
on the security aspects of the network and web. It surveys cryptographic tools used to provide security.
The program validates advanced knowledge and skills required to engineer secure network
infrastructures, web application and data security.
The curriculum emphasizes the real-world best practices of network security engineering utilizing
Cisco IOS Software security features, Cisco ASA adaptive security appliance features, Cisco Intrusion
Prevention Systems (IPSs), Cisco security management tools, and techniques to implement a secure Web
server and application witch PKI.
NTS 467 Management Communication Server
This course will describe how to plan, design, deploy, configure, and administer a Microsoft Lync
Server 2013 solution.
The course emphasizes Lync Server 2013 Enterprise Unified Communications features with
particular emphasis on coexisting with and migrating from legacy communication services.
The labs in this course create a solution that includes IM and Presence, Conferencing, and Persistent
Chat.
This course also will provide trainees the knowledge to design and configure Enterprise Voice and
Online Services in Microsoft Lync Server 2013.
It will provide them with the knowledge and skills to configure and manage a Lync Server 2013 on
premises, in the cloud or in a mixed deployment. In addition, it will provide the skills needed by IT or
telephony consultants to deliver a Lync based enterprise voice solution.
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
6
Courses Description
Department Computer & Information
Technology Major Computer Networks
Course Name Computer Networks Course Code NET 345
Prerequisites Credit Hours
CRH
3 CTH 4
L 2 P 2 T 0 CRH: Credit Hours L: Lecture P: Practical T: Tutorial CTH: Contact Hours
Course description :
This course provides a global review of the basic knowledge in computer network and
its applications. It focuses on configuring, managing and troubleshooting elements of the
basic network infrastructure. Trainee learns how to configure workstations, to operate and
manage a basic network.
Trainee learns also about OSI and TCP/IP protocols by examining packet and protocol
traces. Hands-on exercises include the use of a variety of standard model-based applications
and protocols.
Topics :
Module 1 Networking Basics.
Module 2 OSI and TCP/IP Models.
Module 3 Cables and Connectors.
Module 4Data link.
Module 5 Wireless Networking WLAN.
Module 6Addressing and Subnetworks.
Module 7Routing Protocols.
Module 8 Transport Layer.
Module 9 Network Applications.
Module 10 Troubleshooting.
Experiments: If applicable, it will support the course topics.
References :
Bibliography :
Computer Networks, Fifth Edition, by Larry L. Peterson and Bruce S. Davie (Morgan
Kaufmann, 2012). Available on:
http://searchenterprisewan.techtarget.com/feature/Computer-Networks-PDF-Free-
chapter-download
Netography :
www.netacad.net
http://www.scte.org/documents/pdf/CCNA3%20Sample.pdf\
http://www.cisco.com/
http://www.huawei.com/
Detailed of Contents
Contents Hours
1 Module 1 Networking Basics
Identify Computer components, NIC, Ports
Identify characteristics of network ports (speed, voltage, Power…)
4
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
7
2 Module 3 Cables and Connectors
Identify Cable specification and termination, Coaxial cable, Shielded
copper cable, UTP cable Straight-through, crossover, rollover and
Optical Media.
Realizing twisted Pair Cables
4
3 Module 3 Cables and Connectors
Identify Cable specification and termination, Coaxial cable, Shielded
copper cable, UTP cable Straight-through, crossover, rollover and
Optical Media.
Realizing twisted Pair Cables
4
4 Module 4 Ethernet
Install and configuring Ethernet Network
Assign IP Address (Manually and automatic configuration)
4
5 Module 4 Ethernet
Network Commands: IPconfig, Ping, Netview…
Assign Network groups
4
6 Module 4 Ethernet
Network Commands: IPconfig, Ping, Netview…
Assign Network groups
4
7 Module 5 Wireless Networking (WLAN) Install WLAN Network
Configure WLAN Passwords
Configure Broadcast distance
4
8 Module 5 Wireless Networking (WLAN) Install WLAN Network
Control Access Point
4
9 Module 5 Wireless Networking (WLAN) ( 4 hrs practice )
Install WLAN Network
Configure WLAN Passwords
4
10 Module 5 Wireless Networking (WLAN)
Configure Broadcast distance
Control Access Point
4
11 Module 9 Network Applications
Configuring protocols in Web Pages
Activate/desactivate Services and Ports …
4
12 Module 9 Network Applications
How to determine key details related to SMTP, POP-3 and IMAP.
Understand email is sent and read.
4
13 Module 9 Network Applications
Understand email is sent and read.
4
14 Module 9 Network Applications
Capture traffic for traces.
4
15 Module 9 Troubleshooting
Ethernet Network Troubleshooting
4
16 Module 9 Troubleshooting
Ethernet Network Troubleshooting
4
Total 64
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
8
Textbook:
Department Computer & Information
Technology Major Network Systems Support
Course Name Basic Network Systems
Administration Course Code NTS 325
Prerequisites Credit Hours
CRH
3 CTH 6
L 2 P 2 T 2 CRH: Credit Hours L: Lecture P: Practical T: Tutorial CTH: Contact Hours
Course description :
This course provides the skills and knowledge necessary to implement a core
Windows Server 2012 infrastructure in an existing enterprise environment. It collectively
covers implementing, managing, maintaining and provisioning services and infrastructure in
a Windows Server 2012 environment.
In addition, this course focuses on the initial implementation and configuration of core
services, such as Networking, Storage, Active Directory Domain Services (AD DS), Group
Policy, File and Print Services, and Hyper-V.
Topics :
Install and configure servers
Configure server roles and features
Configure Hyper-V
Deploy and configure core network services
Install and administer Active Directory
Create and manage Group Policy
Deploy, manage, and maintain servers
Configure file and print services
Configure network services and access
Configure a Network Policy Server infrastructure
Configure and manage Active Directory
Configure and manage Group Policy
Configure and manage high availability
Configure file and storage solutions
Implement business continuity and disaster recovery
Configure network services
Configure the Active Directory infrastructure
Configure identity and access solutions
Configure access and information protection solutions
Experiments: If applicable, it will support the course topics.
References :
http://www.microsoft.com/learning/en-us/mcsa-windows-server-certification.aspx
http://www.microsoft.com/learning/en-us/exam-70-410.aspx
Exam Ref 70-410: Installing and Configuring Windows Server 2012. Published:
October 2012
http://www.microsoft.com/learning/en-us/exam-70-411.aspx
Training Guide: Administering Windows Server 2012. Published: April 2013
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
9
(estimated)
http://www.microsoft.com/learning/en-us/exam-70-412.aspx
Exam Ref 70-412: Configuring Advanced Windows Server 2012 Services. Published:
August 2013 (estimated)
Detailed of Contents
No. Contents Hours
1 Deploying and Managing Windows Server 2012
Deploying Windows Server 2012
Configuring Windows Server 2012 Server Core
Managing Servers
Using Windows PowerShell to Manage Servers
6
2 Lab : Installing Domain Controllers
Installing a Domain Controller
Installing a Domain Controller by Using IFM
Lab : Managing Active Directory Domain Services Objects
Delegating Administration for a Branch Office
Creating and Configuring User Accounts in AD DS
Managing Computer Objects in AD DS
6
3 Lab : Automating AD DS Administration by Using Windows PowerShell
Creating User Accounts and Groups by Using Windows PowerShell
Using Windows PowerShell to Create User Accounts in Bulk
Using Windows PowerShell to Modify User Accounts in Bulk
Lab : Implementing IPv4
Identifying Appropriate Subnets
Troubleshooting IPv4
Lab : Implementing DHCP
Implementing DHCP
Implementing a DHCP Relay Agent (Optional Exercise)
6
4 Lab : Implementing DNS
Installing and Configuring DNS
Creating Host Records in DNS
Managing the DNS Server Cache
6
5 Lab : Implementing IPv6
Configuring an IPv6 Network
Configuring an ISATAP Router
Lab : Implementing Local Storage
Installing and Configuring a New Disk
Resizing Volumes
Configuring a Redundant Storage Space
Lab : Implementing File and Print Services
Creating and Configuring a File Share
Configuring Shadow Copies
Enabling and Configuring Work Folders
Creating and Configuring a Printer Pool
6
6 Lab : Implementing Group Policy 6
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
11
Configuring a central store
Creating GPOs
Lab : Increasing Security for Server Resources
Using Group Policy to Secure Member Servers
Auditing File System Access
Auditing Domain Logons
Lab : Configuring App Locker and Windows Firewall
Configuring App Locker Policies
Configuring Windows Firewall
Lab : Implementing Server Virtualization with Hyper-V
Installing the Hyper-V Role onto a Server
Configuring Virtual Networking
Creating and Configuring a Virtual Machine
Using Virtual Machine Checkpoints
7 Lab : Configuring and Troubleshooting DNS
Configuring DNS Resource Records
Configuring DNS Conditional Forwarding
Installing and Configuring DNS Zones
Troubleshooting DNS
Lab : Maintaining AD DS
Installing and Configuring a RODC
Configuring AD DS Snapshots
Configuring the Active Directory Recycle Bin
Optional Exercise- Cloning a domain controller
Lab : Managing User and Service Accounts
Configuring Password Policy and Account Lockout Settings
Creating and Associating a Managed Service Account
6
8 Lab : Implementing a Group Policy Infrastructure
Creating and Configuring Group Policy Objects
Managing GPO Scope
Verify GPO Application
Managing GPOs
Lab : Managing User Desktops with Group Policy
Implement Settings by Using Group Policy Preferences
Managing Office 2013 by using Administrative Templates
Deploying Software by using Group Policy
Configuring Folder Redirection
Lab : Installing and Configuring a Network Policy Server
Installing and Configuring NPS to Support RADIUS
Configuring and Testing a RADIUS Client
6
9 Lab : Implementing Network Access Protection
Configuring NAP Components
Configuring Virtual Private Network Access
Configuring the Client Settings to Support NAP
Lab : Implementing Direct Access by Using the Getting Started Wizard
6
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
11
Verifying Readiness for a Direct Access Deployment
Configuring Direct Access
Validating the Direct Access Deployment
Lab : Deploying an Advanced Direct Access Solution
Preparing the Environment for Direct Access
Implementing the Advanced Direct Access Infrastructure
Validating the Direct Access Deployment
10
Lab : Implementing VPN
Implementing VPN
Validating the VPN Deployment
Lab : Implementing Web Application Proxy
Implementing Web Application Proxy
Validating the Web Application Proxy Deployment
Lab : Configuring Quotas and File Screening Using File Server Resource
Manager
Configuring File Server Resource Manager Quotas
Configuring File Screening and Storage Reports
Lab : Implementing Distributed File System
Installing the DFS role service
Configuring a DFS Namespace
Configuring DFS Replication
6
11 Lab : Configuring Encryption and Advanced Auditing
Using Windows BitLocker Drive Encryption to Secure Data Drives
Encrypting and Recovering Files
Configuring Advanced Auditing
Lab : Using Windows Deployment Services to Deploy Windows Server
2012
Installing and Configuring Windows Deployment Services
Creating Operating System Images with Windows Deployment Services
Configuring Custom Computer Naming
Deploying Images with Windows Deployment Services
Lab : Implementing Update Management
Implementing the WSUS Server Role
Configuring Update Settings
Approving and Deploying an Update by using WSUS
Lab : Monitoring Windows Server 2012
Establishing a Performance Baseline
Identifying the Source of a Performance Problem
Viewing and Configuring Centralized Event Logs
6
12 Implementing Advanced Network Services
Configuring Advanced DHCP Settings
Configuring Advanced DNS Settings
Configuring IPAM
Implementing Advanced File Services
Configuring iSCSI Storage
6
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
12
Configuring the File Classification Infrastructure
13 Implementing BranchCache
Configuring the Main Office Servers for BranchCache
Configuring the Branch Office Servers for BranchCache
Configuring Client Computers for BranchCache
Monitoring BranchCache
Implementing Secure Data Access
Preparing for DAC deployment
Implementing DAC
Validating and Remediating DAC
Implementing Work Folders
6
14 Implementing Distributed AD DS Deployments
Implementing Child Domains in AD DS
Implementing Forest Trusts
Implementing AD DS Sites and Replication
Modifying the Default Site
Creating Additional Sites and Subnets
Configuring AD DS Replication
Monitoring and Troubleshooting AD DS Replication
Deploying and Configuring CA Hierarchy
Deploying a Stand-Alone Root CA
Deploying an Enterprise Subordinate CA
Deploying and Managing Certificates
Configuring Certificate Templates
Configuring Certificate Enrollment
Configuring Certificate Revocation
Configuring Key Recovery
6
15 Implementing AD RMS
Installing and Configuring AD RMS
Configuring AD RMS Templates
Implementing the AD RMS Trust Policies
Verifying AD RMS on a Client
Implementing AD FS
Installing and Configuring AD FS
Configuring an Internal Application for AD FS
Implementing AD FS for External Partners and Users
Configuring AD FS for a Federated Business Partner
Configuring Web Application Proxy
Implementing NLB
Implementing an NLB Cluster
Configuring and Managing the NLB Cluster
Validating High Availability for the NLB Cluster
6
16 Implementing Failover Clustering
Configuring a Failover Cluster
Deploying and Configuring a Highly Available File Server
6
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
13
Validating the Deployment of the Highly Available File Server
Configuring CAU on the Failover Cluster
Implementing Failover Clustering with Hyper-V
Configuring Hyper-V Replicas
Configuring a Failover Cluster for Hyper-V
Configuring a Highly Available Virtual Machine
Implementing Windows Server Backup and Restore
Backing Up Data on a Windows Server 2012 R2 Server
Restoring Files Using Windows Server Backup
96
Textbook:
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
14
Department Computer & Information
Technology Major Network Systems Support
Course Name Advanced Network
Administration Course Code NTS 365
Prerequisites NTS 325 Credit Hours
CRH
4 CTH 6
L 2 P 4 T 0 CRH: Credit Hours L: Lecture P: Practical T: Tutorial CTH: Contact Hours
Course description :
This course provides the skills and knowledge necessary to design and implement a
Windows Server 2012 R2 infrastructure in an enterprise environment.
The course collectively covers designing, planning, deploying, securing, monitoring,
automating, and virtualizing an enterprise server infrastructure.
This course also covers the knowledge and skills needed to provide an enterprise
solution that supports manual and automated server installations in a physical and virtual
environment including the supporting file and storage services.
Additionally, this course covers the knowledge and skills to plan and implement a
highly available, secure infrastructure with focus on Active Directory Federation Service
(AD FS), public key infrastructure (PKI), and Active Directory Rights Management
Services (AD RMS).
On the other hand, trainees will learn the skills necessary to provide enterprise
networking solutions such as DHCP, IPAM, VPN, and Direct Access.
They will also learn the skills necessary to design and implement a forest and domain
infrastructure including multi domains/forest and branch office scenarios.
Trainees will also learn the skills needed to plan and deploy virtual machines including
self-service and automation of virtual machine deployments as well as planning and
implementing a monitoring strategy that includes Microsoft System Center 2012 R2-
Operations Manager.
Topics :
Planning Server Upgrade and Migration
Planning and Implementing a Server Deployment Strategy
Planning and Deploying Servers Using Virtual Machine Manager
Designing and Maintaining an IP Configuration and Address Management Solution
Designing and Implementing Name Resolution
Designing and Implementing an Active Directory Domain Services Forest and Domain
Infrastructure
Designing and Implementing an AD DS Organizational Unit Infrastructure
Designing and Implementing a Group Policy Object Strategy
Designing and Implementing an AD DS Physical Topology
Planning and Implementing Storage and File Services
Designing and Implementing Network Protection
Designing and Implementing Remote Access Services
Overview of Management in an Enterprise Data Center
Planning and Implementing a Server Virtualization Strategy
Planning and Implementing Networks and Storage for Virtualization
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
15
Planning and Deploying Virtual Machines
Planning and Implementing a Virtualization Administration Solution
Planning and Implementing a Server Monitoring Strategy
Planning and Implementing High Availability for File Services and Applications
Planning and Implementing a High Availability Infrastructure Using Failover
Clustering
Planning and Implementing a Business Continuity Strategy
Planning and Implementing an Public Key Infrastructure
Planning and Implementing an Identity Federation Infrastructure
Planning and Implementing Data Access for Users and Devices
Planning and Implementing an Information Rights Management Infrastructure
Experiments: if applicable it will support the course topics.
References :
http://www.microsoft.com/learning/en-us/mcse-server-infrastructure-certification.aspx
http://www.microsoft.com/learning/en-us/mcse-desktop-infrastructure-
certification.aspx
http://www.microsoft.com/learning/en-us/exam-70-413.aspx
Exam Ref 70-413: Designing and Implementing a Server Infrastructure. Published:
November 2012
http://www.microsoft.com/learning/en-us/exam-70-414.aspx
Exam Ref 70-414: Implementing an Advanced Server Infrastructure. Published:
September 2013 (estimated)
Detailed of Contents
No. Contents Hours
1 Planning Server Upgrade and Migration
Planning a Strategy for Server Upgrade and Migration
Evaluating Candidates for Server Virtualization
Planning and Implementing a Server Deployment Strategy
Planning an Automated Server Installation and Deployment Strategy
Preparing the Windows Server 2012 R2 Image
Deploying Windows Server 2012 R2
6
2 Planning and Deploying Servers Using Virtual Machine Manager
Planning Microsoft System Center 2012 R2 Virtual Machine Manager
Components
Planning Virtual Machine and Service Templates
Implementing Virtual Machine Manager Components
Designing and Maintaining an IP Configuration and Address Management
Solution
Planning DHCP to Support Your Proposal
Planning an IPAM Deployment
Implementing DHCP and IPAM
6
3 Designing and Implementing Name Resolution
Designing a Strategy for DNS Name Resolution
Designing a Strategy for DNS Server Placement
6
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
16
Designing DNS Zones and DNS Zone Replication
Implementing DNS
4 Designing and Implementing an Active Directory Domain Services Forest
Infrastructure
Designing an Active Directory Forest Infrastructure
Implementing Active Directory Forest Trusts
Designing and Implementing an Active Directory Domain Infrastructure
Designing an Active Directory Domain Infrastructure
Implementing an Active Directory Domain Infrastructure
6
5 Designing and Implementing an AD DS Organizational Unit Infrastructure
Designing an Organizational Unit Infrastructure
Implementing the OU Design
Designing and Implementing an Active Directory Permissions Model
Designing and Implementing a Group Policy Object Strategy
Designing a GPO Strategy
Implementing the GPO Design
6
6 Designing and Implementing an Active Directory Domain Services
Physical Topology
Designing Active Directory Sites and Replication
Planning the Placement of Domain Controllers and Active Directory
Replication
Implementing Active Directory Sites and Domain Controllers
Planning and Implementing Storage
Planning a Storage Solution
Implementing iSCSI Storage
Configuring a Redundant Storage Space
6
7 Designing and Implementing Network Protection
Designing a Windows Firewall Solution
Implementing a Windows Firewall Solution
Designing a NAP Solution
Implementing NAP with IPsec Enforcement
Designing and Implementing Network Access Services
Designing a Remote Access Strategy
Planning and Implementing a Direct Access Solution
Planning and Implementing a VPN Solution
Implementing Web Application Proxy
6
8 Considerations for Implementing an Enterprise Data Center
Planning the Secure Implementation of Services Within an Enterprise
Data Center
Planning and Implementing a Server Virtualization Strategy
Planning a Hyper-V Host Deployment
Configuring Hyper-V Host Groups
Configuring VMM Libraries
6
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
17
9 Planning and Implementing Virtual Networks and Storage
Planning a Storage Infrastructure for Virtualization
Planning a Network Infrastructure for Virtualization
Implementing a Storage Infrastructure for Virtualization
Implementing a Network Infrastructure for Virtualization
6
10 Planning and Implementing a Virtual Machine Deployment and
Management Strategy
Planning Virtual Machine and Service Templates
Configuring VMM Profiles and Templates
Implementing Hyper-V Replica
Planning and Implementing an Administration Solution for Virtualization
Configuring Process Automation in System Center
Planning Administrative Delegation and Self-Service in System Center
2012
Configuring Delegated Administration and Self-Service in VM
Implementing Host Updating in VMM
6
11 Implementing a Server Monitoring Strategy
Configuring Server Monitoring Using Windows Server 2012
Implementing Operations Manager Monitoring
Configuring the Operations Manager Monitoring Components
Planning and Implementing High Availability for File Services and
Applications
Planning a High Availability Strategy for File Services
Planning a High Availability Strategy for Web Applications
Implementing a High Availability Solution for File Storage
Implementing a High Availability Solution Using NLB
6
12 Planning and Implementing a Highly Available Infrastructure Using
Failover Clustering
Designing Highly Available Server Roles
Deploying a Failover Cluster
Implementing a Scale-Out File Server
Configuring Cluster-Aware Updating
Implementing Highly Available Virtual Machines
Implementing Operations Manager and VMM Integration
6
13 Implementing a Virtual Machine Backup Strategy with DPM
Configuring DPM
Implementing Backup and Restore for Virtual Machine Data
Implementing Virtual Machine Backup and Recovery using DPM
Planning and Implementing an Active Directory Certificate Services
Infrastructure
Planning the Active Directory Certificate Services Deployment
Deploying the CA Infrastructure
Implementing Certificate Templates
Implementing Certificate Revocation and Distribution
6
14 Planning and Implementing an AD FS Infrastructure
Designing the AD FS Deployment
6
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
18
Configuring Prerequisite Components for AD FS
Deploying AD FS for Internal Users
Deploying AD FS for a Partner Organization
Deploying the Web Application Proxy
15 Implementing DAC and Access Denied Assistance
Planning and Implementing DAC
Preparing DAC Deployment
Implementing DAC
Validating and Remediating DAC
6
16 Implementing Work Folders
Preparing and Implementing an Infrastructure for Work Folders
Configuring AD FS and Web Application Proxy For Work Folders
Publishing
Validating Work Folders Functionality
Planning and Implementing an AD RMS Infrastructure
Planning an AD RMS Deployment
Deploying an AD RMS Infrastructure for Internal Users
Implementing AD RMS Integration with Dynamic Access Control
Implementing AD RMS Integration for External Users
6
Total 96
Textbook:
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
19
Department Computer & Information
Technology Major Network Systems Support
Course Name Network Technologies 1
(CCNA3) Course Code NTS 367
Prerequisites NET 345 Credit Hours
CRH
3 CTH 4
L 2 P 2 T 0 CRH: Credit Hours L: Lecture P: Practical T: Tutorial CTH: Contact Hours
Course description :
This course provides a comprehensive, theoretical, and practical approach to learning
the technologies and protocols needed to design and implement a converged switched
network.
Trainees will learn about the hierarchical network design model and how to select
devices for each layer. The course explains how to configure a switch for basic functionality
and how to implement Virtual LAN's, VTP, and Inter-VLAN routing in a converged
network
Topics :
Part I: LAN Switching
Introduction to Scaling Networks
Switching and Spanning Tree Protocol
LAN Redundancy
VLANs & VTP
Wireless LANs
Part II: IP Version 6 Routing Protocols
Implementing OSPF for IPv6
Understanding EIGRP Concepts
Implementing EIGRP for IPv6
Troubleshooting Routing Protocols
Part III :Managing IOS Files
License
Experiments: if applicable it will support the course topics.
References :
http://www.cisco.com/web/learning/exams/list/ccna_composite2.html#~Topics
Cisco CCNA Routing and Switching ICND2 200-101 Official Cert
Guidehttp://store.fullpond.com/cisco/ProductCompactBooks.aspx?catalogid=1&categor
yid=0&productid=20229
Detailed of Contents
No. Contents Hours
1 General review for NTS 367 4
2 Introduction to Scaling Networks
Network by Design
Selecting Switching Hardware
Layered Network Design Simulation
4
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
21
3 Switching and Spanning Tree Protocol
Understanding Switching and Switches
Initial Configuration of a Catalyst Switch
Spanning Tree Protocol (STP)
Cisco’s additions to STP (Portfast, BPDUGuard, BPDUFilter,
UplinkFast, BackboneFast)
4
4 LAN Redundancy
Rapid Spanning Tree Protocol (RSTP) – 802.1w
Per-VLAN Spanning Tree Plus (PVST+) and Per-VLAN RSTP
(Rapid-PVST)
EtherChannel
4
5 VLANs
MAC Address Table
Virtual LANs (VLANs)
Types of Switch Ports
VLAN Trunking: ISL and 802.1Q
VLAN Trunking Protocol (VTP)
4
6 VTP Inter-VLAN Routing
VLAN Configuration
Inter-VLAN Routing Configuration
VTP Troubleshooting
Voice VLAN Configuration
4
7 Wireless LANs
Make Mine Wireless
Investigating Wireless Implementations
Configuring a Wireless Router and Client
Inside and Outside Control
4
8 Implementing OSPF v3
OSPFv3 ICND1 Configuration Review
Example Multi-Area OSPFv3 Configuration
• Single Area Configuration on the Three Internal Routers
• Adding Multi-Area Configuration on the Area Border
Router
Other OSPFv3 Configuration Settings
• Setting OSPFv3 Interface Cost to Influence Route
Selection
• OSPF Load Balancing
• Injecting Default Routes
4
9 OSPF for IPv6 OSPFv3 Interfaces
• Verifying OSPFv3 Interfaces
• Troubleshooting OSPFv3 Interfaces
OSPFv3 Neighbors
• Verifying OSPFv3 Neighbors
• Troubleshooting OSPFv3 Neighbors
OSPFv3 LSDB and LSAs
4
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
21
• Verifying OSPFv3 LSAs
• Troubleshooting OSPFv3 LSAs
OSPFv3 Metrics and IPv6 Routes
• Verifying OSPFv3 Interface Cost and Metrics
Troubleshooting IPv6 Routes Added by OSPFv3
10 Implementing EIGRP
EIGRPv6 Configuration Basics
EIGRPv6 Configuration Example
Other EIGRPv6 Configuration Settings
• Setting Bandwidth and Delay to Influence EIGRPv6
Route Selection
• EIGRP Load Balancing
• EIGRP Timers
4
11 Advanced EIGRP IPv6
EIGRPv6 Interfaces
EIGRPv6 Neighbors
EIGRPv6 Topology Database
EIGRPv6 IPv6 Routes
4
12 Managing IOS Files
Upgrading a Cisco IOS Software Image into Flash Memory
The Cisco IOS Software Boot Sequence
• The Three Router Operating Systems
• The Configuration Register
• How a Router Chooses Which OS to Load
• Recovering If the IOS Does Not Load
• Verifying the IOS Image Using the show version
Command
4
13 IOS Recovery
The General Ideas Behind Cisco Password Recovery/Reset
A Specific Password Reset Example
Configuration File Basics
Copying and Erasing Configuration Files
Initial Configuration (Setup Mode)
4
14 Managing IOS Licensing IOS Images per Model, Series, and per Software Version/Release
Original Packaging: One IOS Image per Feature Set Combination
New IOS Packaging: One Universal Image with All Feature Sets
Managing Software Activation with Cisco License Manager
4
15 IOS Activating
Manually Activating Software Using Licenses
Example of Manually Activating a License
Showing the Current License Status
Adding a Permanent Technology Package License
Right-to-Use Licenses
4
16 General review 4
Total 64
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
22
Textbook
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
23
Department Computer & Information
Technology Major Network Systems Support
Course Name Virtual systems Course Code NTS 346
Prerequisites NTS 325 Credit Hours
CRH
3 CTH 4
L 2 P 2 T 0 CRH: Credit Hours L: Lecture P: Practical T: Tutorial CTH: Contact Hours
Course description :
This course will provide you with the knowledge and skills necessary to create, maintain,
monitor, and protect a virtualization infrastructure. You will learn about creating and managing
virtual machines, managing virtual machine networks, and providing high availability for a
Windows Server® 2012 R2 Hyper-V® environment. This course also will describe how to
create and manage virtual machines, clouds, and services by using Microsoft® System Center
2012 R2 Virtual Machine Manager (VMM).Topics :
Install and configure the Hyper-V server role.
Create virtual machines, create and manage virtual hard disks and work with
snapshots.
Create and configure virtual machine networks in a Hyper-V environment.
Implement virtual machine movement and Hyper-V Replica.
Provide high availability for Hyper-V environment by implementing failover
clustering.
Manage virtual environment by using System Center 2012 R2 Virtual Machine
Manager.
Manage networking and storage infrastructure in Virtual Machine Manager.
Configure and manage Virtual Machine Manager library and library objects.
Create and manage virtual machines by using Virtual Machine Manager.
Create and manage clouds by using System Center 2012 R2 Virtual Machine
Manager.
Create and manage services in System Center 2012 R2 Virtual Machine Manager.
Protect virtualization infrastructure by using Windows Server Backup and Data
Protection Manager.
Experiments: If applicable, it will support the course topics.
References :
Bibliography :
www.microsoft.com/en-sa/learning/course.aspx?cid=20409 Netography :
www.microsoft.com
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
24
Detailed of Contents
No. Contents Hours
1
Module 1: Evaluating the Environment for Virtualization
Lesson 1: Overview of Microsoft Virtualization
Lesson 2: Overview of System Center 2012 R2 Components
Lesson 3: Evaluating the Current Environment for Virtualization
Lesson 4: Extending Virtualization to the Cloud Environment
Lab: Evaluating the Environment for Virtualization
4
2 Module 2: Installing and Configuring the Hyper-V Role
Lesson 1: Installing the Hyper-V Role
Lesson 2: Managing Hyper-V
Lesson 3: Configuring Hyper-V Settings
Lesson 4: Hyper-V Host Storage and Networking
Lab: Installing and Configuring the Hyper-V Role
4
3
Module 3: Creating and Managing Virtual Hard Disks, Virtual Machines,
and Checkpoints
Lesson 1: Creating and Configuring Virtual Hard Disks
Lesson 2: Creating and Configuring Virtual Machines
Lab A: Creating and Managing Virtual Hard Disks and Virtual Machines
Lesson 3: Installing and Importing Virtual Machines
Lesson 4: Managing Virtual Machine Checkpoints
Lesson 5: Monitoring Hyper-V
Lesson 6: Designing Virtual Machines for Server Roles and Services
Lab B: Creating and Managing Checkpoints and Monitoring Hyper-V
4
4
Module 4: Creating and Configuring Virtual Machine Networks
Lesson 1: Creating and Using Hyper-V Virtual Switches
Lab A: Creating and Using Hyper-V Virtual Switches
Lesson 2: Advanced Hyper-V Networking Features
Lab B: Creating and Using Advanced Virtual Switch Features
Lesson 3: Configuring and Using Hyper-V Network Virtualization
Lab C: Configuring and Testing Hyper-V Network Virtualization
4
5 Module 5: Virtual Machine Movement and Hyper-V Replica
Lesson 1: Providing High Availability and Redundancy for Virtualization
Lesson 2: Implementing Virtual Machine Movement
4
6 Module 5: Virtual Machine Movement and Hyper-V Replica
Lab A: Moving Virtual Machine and Configuring Constrained Delegation
Lesson 3: Implementing and Managing Hyper-V Replica
Lab B: Configuring and Using Hyper-V Replica
4
7 Module 6: Implementing Failover Clustering with Hyper-V
Lesson 1: Overview of Failover Clustering
Lesson 2: Configuring and Using Shared Storage
4
8 Module 6: Implementing Failover Clustering with Hyper-V
Lesson 3: Implementing and Managing Failover Clustering with Hyper-V
Lab: Implementing Failover Clustering with Hyper-V
4
9 Module 7: Installing and Configuring Microsoft System Center 2012 R2
Virtual Machine Manager 4
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
25
Lesson 1: Integrating System Center and Server Virtualization
Lesson 2: Overview of VMM
Lesson 3: Installing VMM
Lesson 4: Adding Hosts and Managing Host Groups
Lab: Installing and Configuring System Center 2012 R2 Virtual
Machine Manager
10 Module 8: Managing the Network and Storage Infrastructure in Microsoft
System Center 2012 R2 Virtual Machine Manager
Lesson 1: Managing Networking Infrastructure
Lab A: Network Infrastructure Management
Lesson 2: Managing Storage Infrastructure
Lab B: Managing Infrastructure Storage
Lesson 3: Managing Infrastructure Updates
Lab C: Infrastructure Updates Management
4
11 Module 9: Creating and Managing Virtual Machines by Using Microsoft
System Center 2012 R2 Virtual Machine Manager
Lesson 1: Virtual Machine Management Tasks in VMM
Lesson 2: Creating, Cloning, and Converting Virtual Machines
Lesson 3: Overview of Virtual Machine Updating
Lab: Creating and Managing Virtual Machines by Using System
Center 2012 R2 Virtual Machine Manager
4
12 Module 10: Configuring and Managing the Microsoft System Center 2012
R2
Virtual Machine Manager Library and Library Objects
Lesson 1: Overview of the Virtual Machine Manager Library
Lesson 2: Working with Profiles and Templates
Lab: Configuring and Managing the Microsoft System Center 2012 R2
Virtual Machine Manager Library and Library Objects
4
13 Module 11: Managing Clouds in Microsoft System Center 2012 R2 Virtual
Machine Manager
Lesson 1: Introduction to Clouds
Lesson 2: Creating and Managing a Cloud
4
14 Module 11: Managing Clouds in Microsoft System Center 2012 R2 Virtual
Machine Manager
Lesson 3: Working With User Roles in Virtual Machine Manager
Lab: Managing Clouds in Microsoft System Center 2012 R2
Virtual Machine Manager
4
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
26
15 Module 12: Managing Services in Microsoft System Center 2012 R2 Virtual
Machine Manager and App Controller
Lesson 1: Understanding Services in VMM
Lesson 2: Creating and Managing Services in VMM
Lesson 3: Using App Controller 12-16
Lab: Managing Services in Microsoft System Center 2012 R2
Virtual Machine Manager and App Controller
4
16 Module 13: Protecting and Monitoring Virtualization Infrastructure
Lesson 1: Overview of Backup and Restore Options for Virtual Machines
Lesson 2: Protecting Virtualization Infrastructure by Using DPM
Lesson 3: Using Operations Manager for Monitoring and Reporting
Lesson 4: Integrating VMM with Operations Manager
Lab: Monitoring and Reporting Virtualization Infrastructure
4
Total 64
Textbook:
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
27
Department Computer & Information
Technology Major Network Systems Support
Course Name Network Technologies 2
(CCNA4) Course Code NTS 368
Prerequisites NTS 367 Credit Hours
CRH
3 CTH 4
L 2 P 2 T 0 CRH: Credit Hours L: Lecture P: Practical T: Tutorial CTH: Contact Hours
Course description :
This course explains the WAN Technologies which is the last of four courses leading
to the Cisco Certified Network Associate (CCNA). The course focuses on advanced IP
addressing techniques (Network Address Translation [NAT], Port Address Translation
[PAT], and DHCP), WAN technology and terminology, PPP, ISDN, DDR, Frame Relay,
network management, and introduction to optical networking
Topics :
Part I: Wide-Area Networks Implementing Point-to-Point WANs
Understanding Frame Relay Concepts
Implementing Frame Relay
Identifying Other Types of WANs
Part II: WAN
Types of WANs
Troubleshooting IPv6 Routing
Part III: Network Management
Broadband Solutions
Site-to-Site GRE Tunnels
Managing Network Devices
References :
http://www.cisco.com/web/learning/exams/list/ccna_composite2.html#~Topics
Cisco CCNA Routing and Switching ICND2 200-101 Official Cert Guide
http://store.fullpond.com/cisco/ProductCompactBooks.aspx?catalogid=1&categoryid=0
&productid=20229
Detailed of Contents
No. Contents Hours
1 General review for NTS 367 4
2 Introduction to WAN Technologies
3 Hierarchical Network Design
Class Activity Design Hierarchical
Cisco Enterprise Architecture
Evolving Network Architecture
4
4 Implementing Point-to-Point WANs
Layer 1 Leased Lines
• The Physical Components of a Leased Line
• Leased Lines and the T-Carrier System
• The Role of the CSU/DSU
4
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
28
• Building a WAN Link in a Lab
Layer 2 Leased Lines with HDLC
Configuring HDLC
PPP Concepts
• PPP Framing
• PPP Control Protocols
• PPP Authentication
5 Implementing Point-to-Point WANs
Configuring PPP
CHAP Configuration and Verification
Troubleshooting Layer 1 Problems
Troubleshooting Layer 2 Problems
• Keepalive Failure
• PAP and CHAP Authentication Failure
Troubleshooting Layer 3 Problems
4
6 Understanding Frame Relay Concepts Virtual Circuits
LMI and Encapsulation Types
Frame Relay Encapsulation and Framing
Frame Relay Local Addressing
Frame Forwarding with One DLCI Field
Frame Relay Layer 3 Addressing: One Subnet Containing All Frame
Relay DTEs
Frame Relay Layer 3 Addressing: One Subnet Per VC
Frame Relay Layer 3 Addressing: Hybrid Approach
4
7 Implementing Frame Relay Planning a Frame Relay Configuration
Configuring Using Physical Interfaces and One IP Subnet
Configuring the Encapsulation and LMI
Frame Relay Address Mapping
Configuring Point-to-Point Subinterfaces
Configuring with Multipoint Subinterfaces
4
8 Implementing Frame Relay OSPF Issues on Frame Relay Multipoint and Physical Interfaces
A Suggested Frame Relay Troubleshooting Process
Layer 1 Issues on the Access Link (Step 1)
Layer 2 Issues on the Access Link (Step 2)
PVC Problems and Status (Step 3)
Frame Relay Mapping Issues (Step 4)
End-to-End Encapsulation (Step 5)
Mismatched Subnet Numbers (Step 6)
4
9 Identifying Other Types of WANs Leased Lines
Frame Relay
Ethernet WANs
MPLS
VSAT
4
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
29
Internet Access (WAN) Links
Dial Access with Modems and ISDN
Digital Subscriber Line
Cable Internet
Mobile Phone Access with 3G/4G
PPP over Ethernet 10 Troubleshooting IPv6 Routing
Unicast IPv6 Addresses and IPv6 Subnetting
Assigning Addresses to Hosts
• Stateful DHCPv6
• Stateless Address Autoconfiguration
• Router Address and Static Route Configuration
• Configuring IPv6 Routing and Addresses on Routers
• IPv6 Static Routes on Routers
Verifying IPv6 Connectivity
• Verifying Connectivity from IPv6 Hosts
• Verifying IPv6 from Routers
4
11 Troubleshooting IPv6 Routing Pings from the Host Work Only in Some Cases
Pings Fail from a Host to Its Default Router
Problems Using Any Function That Requires DNS
Host Is Missing IPv6 Settings: Stateful DHCP Issues
Host Is Missing IPv6 Settings: SLAAC Issues
Traceroute Shows Some Hops, But Fails
Routing Looks Good, But Traceroute Still Fails
4
12 Broadband Solutions
Teleworking
Comparing Broadband Solutions
Configuring xDSL Connectivity
4
13 Site-to-Site GRE Tunnels
VPNs
IPsec
Remote Access
4
14 Managing Network Devices
Describing SNMP
The Management Information Base
Configuring SNMP Version 2c
SNMP Version 3
An Overview of System Message Logging
System Message Format
System Message Severity Levels
4
15 Advanced Managing Network Devices
Configuring and Verifying Syslog
Using a Syslog Server
An Overview of NetFlow
4
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
31
Network Flows
Configuring NetFlow
Verifying and Using NetFlow
The NetFlow Collector
16 Review 4
Total 56
Textbook:
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
31
Department Computer & Information
Technology Major Network Systems Support
Course Name Mail server management
network Course Code NTS 465
Prerequisites Credit Hours
CRH
3 CTH 6
L 2 P 2 T 2 CRH: Credit Hours L: Lecture P: Practical T: Tutorial CTH: Contact Hours
Course description :
This course will describes the knowledge and skills to plan, deploy, manage, secure,
and support Microsoft Exchange Server 2013. It explains how to configure Exchange Server
2013 and gives the information which be needed to monitor, maintain, and troubleshoot
Exchange Server 2013. This course will also provide guidelines, best practices, and
considerations that will help trainees optimize performance and minimize errors and security
threats in Exchange Server 2013.
Topics :
Deploying and Managing Microsoft Exchange Server 2013
Planning and Configuring Mailbox Servers
Managing Recipient Objects
Planning and Deploying Client Access Servers
Planning and Configuring Messaging Client Connectivity
Planning and Implementing High Availability
Planning and Implementing Disaster Recovery
Planning and Configuring Message Transport
Planning and Configuring Message Hygiene
Planning and Configuring Administrative Security and Auditing
Monitoring and Troubleshooting Microsoft Exchange Server 2013
Designing and Implementing Site Resilience
Planning Virtualization for Microsoft Exchange Server 2013
Overview of Exchange Server 2013 Unified Messaging
Designing and Implementing Exchange Server 2013 Unified Messaging
Designing and Implementing Message Transport Security
Designing and Implementing Message Retention
Designing and Implementing Messaging Compliance
Designing and Implementing Administrative Security and Auditing
Experiments: If applicable, it will support the course topics.
References :
http://www.microsoft.com/learning/en-us/mcse-messaging-certification.aspx
http://www.microsoft.com/learning/en-us/exam-70-341.aspx
http://www.microsoft.com/learning/en-us/exam-70-342.aspx
Detailed of Contents
No. Contents Hours
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
32
1 Deploying and Managing Exchange Server 2013 Evaluating Requirements and Prerequisites for an Exchange Server 2013
Installation
Deploying Exchange Server 2013
Managing Exchange Server 2013
6
2 Configuring Mailbox Servers Planning Configuration for Mailbox Servers
Configuring Storage on the Mailbox Servers
Creating and Configuring Mailbox Databases
6
3 Managing Recipient Objects Configuring Trey Research Recipients
Configuring Address Lists and Policies for Trey Research
Configuring Public Folders for Trey Research
6
4 Deploying and Configuring a Client Access Server Role Configuring Certificates for the Client Access Server
Configuring Client Access Services Options
Configuring Custom MailTips
6
5 Planning and Configuring Messaging Client Connectivity Planning Client Connectivity
Configuring Outlook Web App and Outlook Anywhere
Configuring Exchange ActiveSync
Publishing Exchange Server 2013 through TMG 2010
6
6 Implementing High Availability
Creating and Configuring a Database Availability Group
Deploying Highly Available Client Access Servers
Testing the High-Availability Configuration
6
7 Implementing Disaster Recovery for Exchange Server 2013 Backing Up Exchange 2013
Restoring Exchange Server 2013 Data
6
8 Planning and Configuring Message Transport Configuring Message Transport
Troubleshooting Message Delivery
Configuring Transport Rules and Data-Loss Prevention Policies
6
9 Planning and Configuring Message Security Configuring Antimalware Options in Exchange Server 2013
Configuring Anti-Spam Options on Exchange Server
Validating Antimalware and Anti-Spam Configuration
6
10 Configuring Administrative Security and Auditing Configuring Exchange Server Permissions
Configuring Audit Logging
Configuring RBAC Split Permissions on Exchange Server 2013
6
11 Monitoring and Troubleshooting Exchange Server 2013 Monitoring Exchange Server
Troubleshooting Database Availability
Troubleshooting Client Access Servers
6
12 Designing and Implementing Site Resiliency Implementing Site Resilience
6
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
33
Validating Site Resilience
13 Planning the Virtualization of Exchange Server Roles Designing a Microsoft Exchange Server 2013 Deployment for a Large
Organization
Designing an Exchange Server 2013 Deployment for a Medium-Sized
Organization
Designing an Exchange Server 2013 Deployment for a Medium
Complexity Organization
6
14 Unified Messaging Overview Identifying Unified Messaging Components
Designing and Implementing Exchange Server 2013 Unified Messaging Designing the Unified Messaging Implementation
Configuring Unified Messaging Features
Configuring Unified Messaging Integration with Lync Server 2013
Verify Unified Messaging Functionality
6
15 Designing and Implementing Message Transport Security Planning a Message Transport Implementation
Implementing Message Transport Security
Implementing AD RMS and Exchange Server Integration
Designing and Implementing Message Retention Designing Message Retention and Archiving
Implementing Message Retention and Archiving
6
16 Designing and Implementing Messaging Compliance Designing Messaging Compliance
Implementing Data Loss Prevention
Implementing In-Place eDiscovery
Comparing Messaging Policy and Compliance Options
Designing and Implementing Administrative Security and Auditing Designing a Solution
Implementing Role-Based Access Control
Implementing Mailbox Audit Logging
Using Administrative Audit Logging to Troubleshoot
Implementing and Testing Active Directory Split Permissions
6
Total 96
Textbook:
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
34
Department Computer & Information
Technology Major Network Systems Support
Course Name Network Cloud Management Course Code NTS 366
Prerequisites NTS 346 Credit Hours
CRH
3 CTH 6
L 2 P 2 T 2 CRH: Credit Hours L: Lecture P: Practical T: Tutorial CTH: Contact Hours
Course description :
This course describes how to monitor and operate a private cloud
with Microsoft System Center 2012.This course focuses on how to manage and administer
the private cloud, and it describes how you can monitor key infrastructure elements and
applications that run within the private cloud. As well as, it will explain the planning and
implementation for private cloud
Topics :
Introduction to the Private Cloud
Configuring and Optimizing Business Unit Clouds
Deploying Cloud Services
Monitoring Private Cloud Services
Configuring Application Performance Monitoring
Operating and Extending Service Management in the Private Cloud
Automatic Incident Creation, Remediation, and Change Requests
Problem Management in the Private Cloud
Automating Self-Service Provisioning
Private Cloud Protection and Recovery
Configuring Compliance in the Private Cloud
Configuring SLAs, Dashboards, and Widgets
Planning for the Private Cloud
Configuring and Deploying the Private Cloud with System Center 2012 -Virtual
Machine Manager
Extending and Maintaining the Private Cloud Infrastructure
Configuring Application Delivery
Creating the Private Cloud Building Blocks
Deploying and Accessing a Private Cloud
Monitoring the Private Cloud Infrastructure
Extending and Customizing Monitoring of the Private Cloud Infrastructure
Implementing Service Management for the Private Cloud
Protecting the Private Cloud Infrastructure
Automating and Standardizing the Private Cloud
Configuring the Cloud Services Process Pack
Experiments: If applicable, it will support the course topics.
References :
http://www.microsoft.com/learning/en-us/private-cloud-certification.aspx
http://www.microsoft.com/learning/en-us/exam-70-246.aspx Exam
http://www.microsoft.com/learning/en-us/exam-70-247.aspx
Detailed of Contents
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
35
Contents Hours
1 Verifying the Private Cloud Infrastructure Verifying the Infrastructure
Verifying System Center Components
Verifying the Compliance of the Private Cloud Infrastructure Exercise: Checking Compliance
6
2 Configuring and Optimizing Business Unit Clouds Configuring Network Resources
Creating the Business Unit Cloud
Configuring Security
Importing and Deploying the Stock Trader Application Deploying a Single Tier Service
Configuring Prerequisites
Preparing the Stock Trader Service Template
Deploying the Service Template
6
3 Monitoring Private Cloud Services Deploying an Agent
Configuring Custom Monitoring
Creating a Distributed Application Model
Detecting and Recovering from a Failure
6
4 Configuring Application Performance Monitoring Configuring Basic Monitoring in Application Performance Monitoring
Customizing the Performance Thresholds
Validating Monitoring
Creating a Distributed Application Model for the DinnerNow
Application
6
5 Operating and Extending Service Management in the Cloud Configuring Security Roles
Configuring Notifications
Publishing an Incident Service Offering
Raising an Incident
Creating an Approving a Change Request
Creating an Assigning a Release Record
6
6 Automating Incident Creation, Remediation, and Change Requests Configuring the Incident Template
Configuring Incidents That Affect the StockTrader Service
Automating Incident Remediation and Change Requests
Automating Problem Management in the Private Cloud Manually Creating a Problem Record
Creating a Custom Event Rule in Operations Manager
Configuring Automated Problem Record Creation
6
7 Automating Self-Service Provisioning Completing the Prerequisites for the System Center Cloud Services
Process Pack
Installing the System Center Cloud Services Process Pack
Configuring the System Center Cloud Services Process Pack
Deploying a Virtual Machine for StockTrader by using the Cloud
Services Process Pack
6
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
36
Private Cloud Protection and Recovery Configuring Manual Protection and Recovery of Key Service Data
Configuring Automatic Protection and Recovery of Key Service Data
Monitoring Protection Status
8 Configuring Compliance in the Private Cloud Creating an IT GRC Control Management Program
Adding Test Results to a Manual Control Activity and View Compliance
Reports
Assigning a Baseline
6
9 Configuring SLAs, Dashboards, and Widgets Configuring Service Level Tracking
Configuring Service Level Management
Configuring Microsoft Excel Analytics
Configuring PerformancePoint Analytics
Planning for the Private Cloud Deploying the Virtual Machine Manager Agent
Creating a Hyper-V Host Cluster Using VMM
6
10 Configuring and Deploying the Private Cloud Infrastructure Reviewing and Configuring Hosts
Configuring Host Groups
Configuring User Roles and Run As Accounts
Configuring the Library
Preparing the Private Cloud Infrastructure
Deploying a New Virtual Machine
6
11 Maintaining the Private Cloud Infrastructure Configuring a PXE Server in VMM
Configuring a Host Profile
Configuring an Update Server Role in VMM
Configuring a Software Update Baseline in VMM
Configuring Virtual Application Delivery Configuring the Server App-V Sequencer
Configuring the Server App-V Agent
Sequencing an Application
Testing the Server App-V Package Deployment
6
12 Creating the Private Cloud Building Blocks Configuring Profiles
Configuring Virtual Machine Templates
Configuring a Service Template
Configuring a User Role
Deploying the StockTrader Application Service
6
13 Deploying and Accessing a Private Cloud Creating and Configuring a Private Cloud
Configuring App Controller
Creating, Deploying and Managing Services
Monitoring the Private Cloud Infrastructure Deploying Agents
Deploying and Configuring Monitoring Management Packs
6
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
37
Configuring Notifications
Configuring VMM Integration
Configuring DPM Integration
14 Extending and Customizing Monitoring Creating Custom Monitoring
Creating a Distributed Application
Configuring Service Level Management
Creating Views for Private Cloud Infrastructure
Configuring SharePoint Integration
Implementing Service Management for the Private Cloud Configuring Service Manager Basic Settings
Configuring Service Manager Connectors
Configuring the Self-Service Portal
Configuring Notifications
6
15 Protecting the Private Cloud Infrastructure Configuring the Storage Pool
Deploying DPM Protection Agents
Creating and Configuring Protection Groups
Configuring SQL Server Self-Service Recovery
Restoring Data from a SQL Server Protection Group
Performing Self-Service Recovery to Recover SQL Server Data
Automating the Private Cloud Creating a Runbook Server and Configuring Integration Packs
Configuring a Template to Deploy Agents on a New Virtual Machine
Creating a Runbook to Protect All Resources on a Virtual Machine
6
16 Configuring the Cloud Service Process Pack Installing the Cloud Service Process Pack
Configuring User Roles and Settings
Configuring Service Offerings
Creating an Incident Request
Configuring Service Level Management
6
Total 96
Textbook:
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
38
Department Computer & Information
Technology Major Computer Networks
Course Name Network and Information
Security Course Code NET 466
Prerequisites NET 345 Credit Hours
CRH
3 CTH 4
L 2 P 2 T 0 CRH: Credit Hours L: Lecture P: Practical T: Tutorial CTH: Contact Hours
Course description :
The course covers theory and practice of network and information security, focusing in
particular on the security aspects of the network and web. It surveys cryptographic tools
used to provide security.
The program validates advanced knowledge and skills required to engineer secure
network infrastructures, web application and data security. The curriculum emphasizes the
real-world best practices of network security engineering utilizing Cisco IOS Software
security features, Cisco ASA adaptive security appliance features, Cisco Intrusion
Prevention Systems (IPSs), Cisco security management tools, and techniques to implement a
secure Web server and application witch PKI.
Topics :
Upon successful completion of this course, students will be able to:
Identify the fundamental concepts of network security.
Identify security threats and vulnerabilities.
Implement network security.
Manage certificates.
Identify and implement access control and account management security measures.
Configure Firewalls
Configure a wireless network security.
Experiments: If applicable, it will support the course topics.
References :
Computer & Information Technology security handbook, by George Sadowsky and all, the
world bank edition 2003
Computer security handbook, by Seymour Boswrth and all, Wiley edition 2009
Detailed of Contents
Contents Hours
1 Researching Network Attacks and Security Audit Tools :
Researching Network Attacks
Researching Security Audit Tools
4
2 Exploring Encryptions Methods :
Create a Vigenere Cipher Encrypted Message and Decrypt It
Use Steganography to Embed a Secret Message in a Graphic
4
3 Exploring Encryptions Methods :
Symetric and asymmetric encryption
Singing and hashing
4
4 Implementing public key infrastructure : 4
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
39
Implementing PKI Windows
Implementing PKI Linux
5 Securing the Router for Administrative Access :
Configure and encrypt all passwords.
Configure enhanced username password security.
Configure enhanced virtual login security.
Configure an SSH server/client on a router.
4
6 Securing the Router for Administrative Access : Create multiple role views and grant varying privileges.
Verify and contrast views.
Secure the Cisco IOS image and configuration files.
Configure Syslog support on a router.
Install a Syslog server on a PC and enable it.
Secure IOS-based Routers using automated features
4
7 User Authentication : Securing Administrative Access Using AAA and
RADIUS
Configure the local user database using Cisco IOS. Configure AAA local authentication using Cisco IOS.
Configure users on the RADIUS server.
4
8 User Authentication : Securing Administrative Access Using AAA and
RADIUS Use Cisco IOS to configure AAA services on a router to access the
RADIUS server for authentication.
Test the AAA RADIUS configuration.
4
9 User Authentication : Kerberos
Install Kerberos server and domain creation
Creation realm, creation account
ACL creation for Kadmin
Installation client
4
10 User Authentication : Kerberos
Installing Kerberized applications for client and server over Windows
and Linux
Test authentication
Configure Kerberos inter domains
4
11 Firewalls: Configuring Basic ASA Settings and Interface Security Levels
Configuring Routing, Address Translation and Inspection Policy Using
CLI.
4
12 Firewalls:
Configuring a DMZ, Static NAT, and ACLs
4
13 IDS & IPS:
Implement Cisco IOS IPS operations
Verify and monitor the Cisco IOS IPS operations
4
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
41
14 Securing Layer 2 Switches :
Secure Trunks and Access Ports
Enable storm control for broadcasts.
Configure access ports.
Configure and verify port security.
4
15 Securing Layer 2 Switches :
Configure the PVLAN Edge Feature on a port.
Configure Switched Port Analyzer (SPAN).
Analyze a sourced attack.
4
16 Wireless security :
Analyze Threats in Wireless Networks
Configure simple Authentications
Configure centralized Authentication
Configure authentication and Encryption.
4
Total 64
Textbook:
Handbook of applied cryptography by Alfred J Menezes and all, CRC press
2001
The Cisco Networking Academy CCNA Security.
Security+ Study Guide & DVD Training System, Syngress Publishing 2007
CCNP Security FIREWALL 642-618 Official Cert Guide, David Hucaby and
all, ciscopress 2012.
CCNP Security IPS 642-627 Official Cert Guide, David Hucaby and all,
ciscopress 2012.
CCNP Security SECURE 642-637 Official Cert Guide, Sean Wilkins,
Ciscopress 2011.
Websphere application Server V6.1 security Handbook, Rufus Credle and
all, IBM, 2006.
Wirelless security Handbook by Aoron E Earle, Auerbach publications 2006
KINGDOM OF SAUDI ARABIA Technical and Vocational Training Corporation
Directorate General for Curricula Design & Development
Computer & Information
Technology
Network Systems Support
41
Department Computer & Information
Technology Major Network Systems Support
Course Name Project Course Code NTS 9496
Prerequisites NTS 368 Credit Hours
CRH 4 CTH 6
L 2 P 4 T 0
CRH: Credit Hours L: Lecture P: Practical T: Tutorial CTH: Contact Hours
Course description :
In this project trainees must design a network system based on all solutions and services they studied
during the program. They must plan and build the project within the 16 weeks of semester.
Topics :
Week 1: Start project planning
Week 2: Project proposal due
Week 3: Share project proposal with peers.
Week 4-7: Project building
Week 8: Midpoint implementation and testing progress report and presentation Week 9-12: Project building
Week 13: Testing and troubleshooting
Week 14: Final inspection and verification
Week 15: All material due to instructor
Week 16: Final demonstration and presentation