Microsoft Technology Associate (MTA) - IT Infrastructure

The Microsoft Technology Associate (MTA) is Microsoft’s newest suite of technology certification exams that validate fundamental knowledge needed to begin building a career using Microsoft technologies. This program provides an appropriate entry point to a future career in technology and assumes some hands-on experience or training but does not assume on-the-job experience.

Summary

MTA IT Infrastructure track is a four-part series for those intending to build a career in desktop or server infrastructure or private cloud computing. Each of the following 3-day instructor-led courses is leading to another MTA certification:

  • 40366: Networking Fundamentals
  • 40349: Windows Operating System Fundamentals
  • 40365: Windows Server Administration Fundamentals
  • 40367: Security Fundamentals

Audience Profile

MTA certification is the gateway to advanced Microsoft Certifications. For those individuals with little exposure to foundational technology concepts, MTA provides that essential “first step”, and the baseline understanding that they need to successfully pursue MCSA, MCSE and MCSD credentials.

Prerequisites

There are no prerequisites for these courses.

Find even more details on the Microsoft website. Click here

Module 1: Understanding Local Area Networking
  • Examining Local Area Networks, Devices and Data Transfer
    • Defining a LAN
    • Identifying Types of LANs
    • Getting to Know Perimeter Networks
  • Identifying Network Topologies and Standards
    • Identifying Network Topologies
    • Defining Ethernet Standards
    • Identifying the Differences between Client/Server and
    • Peer-to-Peer Distributed Networks
Module 2: Defining Networks with the OSI Model
  • Understanding OSI Basics
    • Defining the Layers in the OSI Model
  • Defining the Communications Subnetwork
  • Defining the Upper OSI Layers
    • Reviewing the OSI Layers
    • Defining the TCP/IP Model
Module 3: Understanding Wired and Wireless Networks
  • Recognizing Wired Networks and Media Types
    • Identifying and Working with Twisted-Pair Cables
    • Identifying and Working with Fiber Optic Cable
  • Comprehending Wireless Networks
    • Identifying Wireless Devices
    • Identifying Wireless Networking Standards
Module 4: Understanding Internet Protocol
  • Working with IPv4
    • Categorizing IPv4 Addresses
    • Default Gateways and DNS Servers
    • Defining Advanced IPv4 Concepts
    • Defining Classless Inter-Domain Routing (CIDR)
  • Working with IPv6
    • Understanding IPv6
    • Configuring IPv6
Module 5: Implementing TCP/IP in the Command Line
  • Using Basic TCP/IP Commands
    • Working with the Command Prompt
    • Working with Ipconfig and Ping
  • Working with Advanced TCP/IP Commands
Module 6: Working with Networking Services
  • Setting Up Common Networking Services
    • Working with DHCP
    • Working with Terminal Services
  • Defining More Networking Services
    • Defining RRAS
    • Defining IPsec
  • Defining Name Resolution Techniques
    • Defining DNS
    • Defining WINS
Module 7: Understanding Wide Area Networks
  • Understanding Routing
    • Identifying Static and Dynamic Routing
  • Defining Common WAN Technologies and Connections
    • Defining Packet Switching
    • Defining T-Carriers
    • Defining Other WAN Technologies and Internet Connectivity
Module 8: Defining Network Infrastructures and Network Security
  • Understanding Networks outside the LAN
    • Defining the Internet
    • Defining Intranets and Extranets
    • Understanding VPNs
  • Understanding Security Devices and Zones
    • Defining Firewalls and Other Perimeter Security Devices
    • Redefining the DMZ
  • Putting It All Together
Module 1: Introducing, Installing, and Upgrading Windows 7
  • Identifying Windows Operating System Editions
    • Windows 7 Home Premium, Professional, and Ultimate
    • Other Windows 7 Editions: Starter, Home Basic, and Enterprise
    • 32-Bit Computing versus 64-Bit Computing
    • Windows 7 System Requirements
  • Identifying Upgrade Paths
    • Upgrade Paths from Windows XP
    • Upgrade Paths from Windows Vista
    • Upgrade Paths from Other Operating Systems
    • Using Windows 7 Upgrade Advisor
  • Identifying Application Compatibility
  • Understanding Product Identification Keys
    • Activating Windows 7
  • Understanding Installation Types
    • Using Windows Easy Transfer
Module 2: Understanding Operating System Configurations
  • Understanding User Accounts and User Account Control (UAC)
    • Understanding Standard User Accounts and Administrative User Accounts
    • Understanding User Account Control (UAC)
    • Understanding Types of UAC Prompts and Levels
  • Configuring Control Panel Options
    • Configuring Administrative Tools
    • Configuring Accessibility Options
  • Configuring Desktop Settings
    • Exploring and Configuring the Aero Interface
    • Configuring Display Settings
    • Creating and Managing Shortcuts
    • Configuring Gadgets
    • Configuring Profiles
  • Understanding Virtualized Clients
    • Understanding Windows XP Mode
  • Understanding Application Virtualization
    • Understanding Med-V
    • Understanding VDI and App-V
Module 3: Understanding Native Applications, Tools, Mobility, and Remote Management and Assistance
  • Understanding Windows Internet Explorer
    • Using Pinned Sites
    • Managing Security Features
  • Introducing Accessory Programs
  • Using the Snipping Tool
  • Playing Back and Recording to Media
    • Using Windows Media Player
    • Using Windows Media Center
  • Understanding Sync Center
  • Using Windows Mobility Center
  • Understanding Remote Desktop Services
  • Understanding Remote Management and Assistance
    • Using the MMC
    • Using Windows PowerShell
Module 4: Managing Applications, Services, Folders, and Libraries
  • Installing and Managing Applications
    • Removing or Uninstalling an Application
    • Understanding Group Policy and Network Application Installation
  • Understanding Services
    • Understanding Service Startup Types
  • Using MSCONFIG (System Configuration utility)
    • Understanding MSCONFIG
  • Understanding File Systems
    • Understanding FAT, FAT32, and NTFS
  • Exploring and Managing Libraries
    • Adding Local and Networked Locations to a Library
  • Encrypting and Compressing Files and Folders
    • Understanding Encrypting File System (EFS)
    • Understanding Compression
    • Understanding BitLocker
Module 5: Managing Devices
  • Understanding Storage
    • Understanding Disk and Drive Types
    • Using Disk Management
    • Spanned Volumes
    • Striped Volumes
    • Mirrored Volumes
    • Understanding Storage Device Types
    • External Serial Advanced Technology Attachment (eSATA)
    • Universal Serial Bus (USB) and USB 2.0
    • IEEE 1394 (also known as FireWire)
    • Internet Small Computer System Interface (iSCSI)
    • Understanding Cloud Storage
    • Windows Live SkyDrive
    • OneNote to SkyDrive
    • Windows Live Mesh
  • Understanding Printing Devices
    • Understanding Local Printers
    • Understanding Network Printers
    • Printing a Document
    • Understanding Print to File
    • Understanding Print Queues
    • Understanding Internet Printing
  • Understanding System Devices
    • Understanding Video, Audio, and Input Devices
    • Understanding Plug-and-Play Technology
    • Understanding Device Manager
Module 6: Understanding File and Print Sharing
  • Understanding File and Printer Sharing Basics
  • Understanding HomeGroup
  • Creating Public, Basic, and Advanced Shares
    • Using Public Folders
    • Using Basic and Advanced Shares
  • Mapping Drives
  • Understanding Permissions
    • Understanding NTFS, Share, and Effective Permissions
  • Setting Up Printer Sharing
  • Understanding Print Drivers
  • Troubleshooting Printers
Module 7: Maintaining, Updating, and Protecting Windows 7
  • Exploring Built-in Maintenance Tools
    • Understanding Disk Defragmenter
    • Understanding Disk Cleanup
    • Understanding Task Scheduler
    • Understanding Action Center
    • Understanding System Information
  • Maintaining the Windows Registry
  • Updating the System
  • Defending Your System from Malicious Software
    • Understanding Action Center
    • Understanding Windows Firewall
    • Understanding Windows Defender
    • Understanding Microsoft Security Essentials
    • Using the Malicious Software Removal Tool
    • Understanding Windows Forefront Endpoint Protection
    • System Requirements
    • Deploying to Clients
Module 8: Understanding Backup and Recovery Methods
  • Understanding Local, Network, and Automated Backup Methods
  • Creating a System Image
  • Creating a Repair Disc
  • Understanding System Restore
  • Using System Restore
    • Restoring Your System Using System Restores
  • Understanding Recovery Boot Options
Module 1: Server Overview
  • Understanding What a Server Does
    • Introducing Server Roles
    • Selecting Server Hardware
    • Selecting the Software
  • Installing Windows Server 2008 RS
    • Performing Clean Installations
    • Performing an Upgrade
    • Disk Cloning and System Preparation Tool
    • Performing an Unattended Installation
    • Using Windows Deployment Services
    • Understanding Windows Licensing
    • Understanding Windows Activation
    • Understanding Windows Updates
Module 2: Managing Windows Server 2008 R2
  • Performing Initial Configuration Tasks
  • Using the Control Panel
    • Understanding User Account Control
    • Introducing System Settings
    • Changing Computer Name and Domain Settings
    • Configuring Remote Settings
    • Changing Date and Time
  • Configuring IP Address Settings
  • Managing Devices and Device Drivers
    • Understanding Plug and Play Devices
    • Understanding Signed Drivers
    • Using Devices and Printers
    • Using Device Manager
  • Using Microsoft Management Console and Administrative Tools
    • Using Computer Management Console and Server Management Console
  • Installing Programs, Roles, and Features
    • Managing Programs
    • Managing Roles and Features
  • Managing Services
  • Understanding the Registry
  • Managing Server Core
Module 3: Managing Storage
  • Identifying Storage Technologies
    • Comparing IDE and SCSI Drives
    • Introducing Redundant Arrays of Independent Disks
    • Introducing Hot Spares
  • Looking at Network Attached Storage and Storage Area Networks
    • Introducing Fibre Channel
    • Introducing iSCSI
    • Using Storage Explorer and Storage Manager
  • Understanding Disk Structure
    • Introducing Disk Partitioning Styles
    • Comparing Types of Disks
    • Introducing File Systems
  • Using Disk Management Tools
Module 4: Monitoring and Troubleshooting Servers
  • Managing Information Technology
  • Introducing Troubleshooting Methodology
    • System Information
    • Using the Event Viewer
  • Booting the System
    • Understanding Boot.ini
    • Understanding BCDEdit
    • Understanding Advanced Boot Menu
    • Using the System Configuration Tool
  • Understanding Performance
    • Understanding Virtual Memory and Paging File
    • Using Task Manager
    • Using Performance Monitor
    • Using Resource Monitor
  • Introducing Business Continuity
    • Introducing Fault-Tolerant Components
    • Understanding Clustering
    • Understanding Power
  • Understanding Backups
    • Introducing Backup Media
    • Introducing Backup Items
    • Understanding Backup Methods
    • Introducing Microsoft Windows Backup
    • Understanding Shadow Copies of Shared Folders
  • Performing Server Repair
Module 5: Essential Services
  • Naming Resolution
    • Understanding HOSTS and LMHOSTS Files
    • Exploring DNS
    • WINS
  • DHCP Services
  • Introducing Directory Services with Active Directory
    • Introducing Domains, Trees, and Forests
    • Introducing Sites and Domain Controllers
    • Introducing Organizational Units
    • Looking at Objects
    • Introducing Groups
    • Introducing Group Policy
Module 6: File and Print Services
  • Introducing NTFS
    • Setting NTFS Permissions
    • Looking at Effective NTFS Permissions
    • Copying and Moving Files
    • Looking at Folder and File Owners
    • Encrypting Files with NTFS
  • Sharing Drives and Folders
    • Network Discovery and Browsing
    • Looking at Special and Administrative Shares
  • Looking at Printers
    • Installing Printers
    • Looking at Printer Properties
    • Setting Printer Permissions
    • Managing Print Jobs
    • Configuring Internet Printing
  • Enabling Auditing
Module 7: Popular Windows Network Services and Applications
  • Introducing the Web Server
    • Managing Web Sites with IIS
    • Managing FTP with IIS
  • Understanding Remote Access
  • Introducing Remote Administration
  • Understanding Server Virtualization
    • Creating Virtual Machines
    • Managing Virtual Machines
Module 1: Understanding Security Layers
  • Introducing Security
    • Understanding Confidentiality
    • Understanding Integrity
    • Understanding Availability
    • Defining Threats and Risk Management
    • Understanding the Principle of Least Privilege
    • Understanding Attack Surface
    • Understanding Social Engineering
    • Linking Cost with Security
  • Looking at Physical Security as the First Line of Defense
    • Understanding Site Security
    • Understanding Computer Security
Module 2: Authentication, Authorization, and Accounting
  • Starting Security with Authentication
    • Authenticating with What You Know
    • Authenticating with What You Own or Possess
    • Authenticating with What You Are
    • Introducing RADIUS and TACACS1
    • Using Run As
  • Introducing Directory Services with Active Directory
    • Looking at Domain Controllers
    • Introducing NTLM
    • Introducing Kerberos
    • Using Organizational Units
    • Looking at Objects
    • Using Groups
    • Looking at Web Server Authentication
  • Comparing Rights and Permissions
  • Looking at NTFS
    • Using NTFS Permissions
    • Looking at Effective NTFS Permissions
    • Copying and Moving Files
    • Using Folder and File Owners
  • Sharing Drives and Folders
    • Looking at Special and Administrative Shares
  • Introducing the Registry
  • Using Encryption to Protect Data
    • Examining Types of Encryption
    • Introducing Public Key Infrastructure
    • Encrypting Email
    • Encrypting Files with EFS
    • Encrypting Disks in Windows
  • Introducing IPSec
    • Encrypting with VPN Technology
  • Using Auditing to Complete the Security Picture
Module 3: Understanding Security Policies
  • Using Password Policies to Enhance Security
  • Using Password Complexity to Make a Stronger Password
  • Using Account Lockout to Prevent Hacking
  • Looking at Password Length
  • Using Password History to Enforce Security
  • Setting the Time between Password Changes
  • Using Password Group Policies to Enforce Security
  • Understanding Common Attack Methods
Module 4: Understanding Network Security
  • Using Dedicated Firewalls to Protect a Network
    • Examining Hardware Firewalls and Their Characteristics
    • Using Hardware Firewalls versus Software Firewalls
    • Using Stateful versus Stateless Inspection
  • Controlling Access with Network Access Protection (NAP)
    • Understanding the Purpose of NAP
    • Looking at How NAP Works
    • Examining the Requirements for NAP
  • Using Isolation to Protect the Network
    • Understanding Virtual LANs
    • Understanding Routing
    • Looking at Intrusion Detection and Intrusion Prevention Systems
    • Looking at Honeypots
    • Looking at DMZs
    • Understanding Network Address Translation (NAT)
    • Understanding Virtual Private Networks (VPNs)
    • Understanding Internet Protocol Security (IPsec)
    • Using Other VPN Protocols
    • Looking at Server and Domain Isolation
  • Protecting Data with Protocol Security
    • Understanding Tunneling
    • Using DNS Security Extensions (DNSSEC)
    • Looking at Protocol Spoofing
    • Utilizing Network Sniffing
    • Understanding Common NETWORK Attack Methods
  • Securing Wireless Network
    • Using Service Set Identifier (SSID)
    • Understanding Keys
    • Utilizing MAC Filters
    • Considering Pros and Cons of Specific Security Types
Module 5: Protecting the Server and Client
  • Protecting the Client Computer
    • Protecting Your Computer from Malware
    • Utilizing Windows Updates
    • Utilizing User Account Control
    • Using Windows Firewall
    • Using Offline Files
    • Locking Down a Client Computer
  • Protecting Your Email
    • Dealing with Spam
    • Relaying Email
  • Securing Internet Explorer
    • Looking at Cookies and Privacy Settings
    • Examining Content Zones
    • Phishing and Pharming
  • Protecting Your Server
    • Placing the Server
    • Hardening the Server
    • Using Secure Dynamic DNS

Price

One Course is 18,000 MUR including original Microsoft Courseware and Prometric Exam Voucher

Bundle Price for all four courses is 55,000 MUR including original Microsoft Courseware and Prometric Exam Voucher

Early Bird: Register 1 month in advance and get 10% discount.

Ask us for a Group Discounts as from 4 students.

Courseware

Each participant will receive the Microsoft Original Courseware (MOC).

Certification

The courses are preparing students for the exams 98-366: Networking Fundamentals, 98-349: Windows Operating System Fundamentals, 98-365: Windows Server Administration Fundamentals and 98-367: Security Fundamentals. The Prometric exam voucher is already included and students can pass the exam in our Testing Center.