Documents
Resources
Learning Center
Upload
Plans & pricing Sign in
Sign Out

Comptia Network+ Certification Training

VIEWS: 16 PAGES: 1

									   Windows 7 Enterprise Desktop Support Technician (2010)
      Microsoft Certified IT Professional (MCITP) Exam: 70-865 + {Already Passed Exam 70-860}

Session 1                                    Session 2 (continued)                Session 3 (continued)
Section A: Introduction                      Section C: Basic Network             Section D: Hardware Troubleshooting
 The 70-685 Exam                            Troubleshooting                      Tools
 Problem Resolution                          A Basic Network Diagram             chkdsk
 The Troubleshooting Process                 Testing Network Hardware            chkfnts
 New Windows 7 Tools                         Verifying IP Settings               chkdsk via GUI
Section B: Planning Deployment                IP Verification via Command Line    Viewing Reports
 Software Licensing                          Link Lights                         Device Manager
 Reviewing an Office License                 Proxy Settings                      Disk Defragmenter
 Reviewing a GNU Public License             Section D: Advanced Network          Section E: Memory and BIOS Errors
 Digital Signing                            Troubleshooting                       Memory Failures
 Certificate Verification Tools              Problem Scope                       Memory Diagnostics
 Application Digital Signatures              Computer vs. Network Problems       BIOS Issues
 signtool.exe                                Traceroute                          Determining the BIOS Version
Section C: Application Compatibility          Pathping                            BIOS Downloads
 ACT                                         netsh                              Section F: Wireless Fundamentals
 Installing ACT                              Network and Sharing Center          Wireless Standards
 Launching ACT                              Section E: Logon Problems             Wireless Security
 Configuring ACT                             Authentication Components           Wireless Infrastructure
 Viewing the ACT Database                    Kerberos Message Exchanges          Configuring Wi-Fi Clients
 Log File Location/Processing                Switching Users/Domains             Public Hotspots
 Using ACT                                   Local Account Properties
 Standard User Analyzer                      Domain Account Properties
 Downloading Application Verifier            Logon Group Policies               Session 4
 Launching Application Verifier             Section F: Device Name Resolution    Section A: Troubleshooting Wireless
 Compatibility Manager
 Creating Fixes (Shims)                      Name Resolution                    Connections
Section D: Troubleshooting
                                              Nslookup                            Wireless Connections
                                              Primary DNS Suffix                  Creating Wireless Profiles
Deployment                                    DNS Cache
 Installation Permissions                                                         Managing Wireless Profiles
                                              DNS Registration                   Section B: Troubleshooting Remote
 Permission Levels/Credentials              Section G: Network Printer
 GUI Permissions Management                                                      Access
                                              Windows 7 Printers                  DirectAccess
 Command Line Permissions Management         Printer Problems
 Local Administrator                                                              Virtual Private Connections
                                              Installing a Network Printer        Dial-Up Connections
 Managing Local Administrators               Gathering Device Information
Section E: Software Configuration             Print Spooler Service               Remote Access Settings
                                                                                  Section C: Supporting Remote Users
Settings                                      Group Policy Preferences
 Enabling Programs and Features                                                   Configuring a VPN Connection
 Microsoft Office Diagnostics                                                     Enabling Remote Desktop
 Add/Remove Office Features                 Session 3                             Connection to a Remote Desktop
                                                                                   Dial-In User Settings
 Advanced Application Settings              Section A: System Performance
 Mapping Network Drives                                                          Section D: Windows 7 Security
 Network Shares in Local Libraries           Performance Principles              User Account Control
                                              First Principle                     BitLocker
Section F: Application Imaging                Second Principle
 Application Image Process                                                        Configuring User Account Controls
                                              Third Principle                     UAC Group Policies
 Custom Application Installs                 Tuning Process
 Pre-Scan Before Snapshot                                                         Detecting Malicious Programs
                                              Tuning Tools                        Checking Services for Malware
 Turbo Navigator Setup Wizard                Performance Gains
 Post-Scan After Snapshot                                                         Viewing the Tasklist
                                              Performance Tips                    Process Explorer
 Scan Comparison/Creating the MSI Package   Section B: Performance Analysis
 Verifying the MSI Package                                                       Section E: IE Security Settings
                                             Tools                                 Certificates
 Installing with the MSI package
                                              Log Analysis                        Adding Trusted Sites
                                              Creating a Custom View              InPrivate Filtering
Session 2                                     Disabling Unnecessary Services
                                              Disk Cleanup
                                                                                   InPrivate Browsing
Section A: Troubleshooting
                                                                                   SmartScreen Filter
                                              Virtual Memory                      Add-Ons/Plug-Ins
Application Problems                          Visual Effects Tab                  IE Security via Group Policies
 Application Troubleshooting                 Windows Experience Index           Section F: Encryption Solutions
 Problem Steps Recorder                      Power Management                    Encryption
 Event Logs                                 Section C: Data Collector Sets        Key Encryption Factors
Section B: Repairing Network                  Performance Monitor                 BitLocker To Go
Applications                                  System Data Collector Sets          Encrypting File System
 Reliability Monitor                         View DCS Report                     Exporting EFS Certificates
 Programs and Features Tool                  Creating a DCS                     Section G: Windows Updates
 Repair Options                              Configuring a DCS                   Automatic Updates
 System Restore Feature                      Event Traces                        Manually Check/Install Updates
 Configuring System Restore                  DCS Storage Location                Update History
 Verification of Snapshot                                                         Removing Updates
                                                                                   Hiding/Unhiding Updates

								
To top