McAfee Secure

IT Guides - Improve your IT Knowledge

  1. Access control - Basic SE and ISSE Principles
  2. Elements of Technical Management
  3. Information Security Governance and Risk Management - Security Management
  4. Operations Security - The Preliminary System Concept of Operations
  5. Security Architecture and Design - ISSE Activity-1
  6. Security Architecture and Design - system security requirements
  7. Security Services
  8. Software Development security - Defining System and Security Architecture
  9. Systems Engineering Activity
  10. Technical Management
  11. Describe IPV6 addresses
  12. Describe VPN technology (including: importance, benefits, role, impact, components)
  13. Analyze Subnetting and Addressing Needs
  14. Frame Relay and Packet-Switching Services
  15. Improving Performance by Using Switches Instead of Hubs
  16. OSI Networking Model
  17. Routing (Forwarding)
  18. TCP/IP Networking Model
  19. Configuring Active Directory Infrastructure - configuring the global catalog
  20. Configuring Active Directory Infrastructure - domain and forest functional levels
  21. Configuring Active Directory Roles and Services - Read-only domain controllers
  22. Configuring Domain Name System for Active Directory
  23. Creating and Maintaining Active Directory Object - Group Policy Architecture
  24. Creating and Maintaining Active Directory Objects - finegrain password policies
  25. Creating and Maintaining Active Directory Objects - group accounts
  26. Creating and Maintaining Active Directory Objects - user accounts
  27. Creating DHCP Scopes
  28. Device Drivers and the OSI Model
  29. DHCP
  30. Subnetting a Network
  31. Understanding DNS Components
  32. Understanding IP Addressing
  33. Understanding IPv6
  34. Understanding TCP/IP
  35. Understanding the OSI Model
  36. Windows Network Models
  37. Configure Remote Desktop licensing - deploy licensing server
  38. Configuring a web services infrastructure - simple mail transfer protocol
  39. Configuring network application services streaming media
  40. Configuring Remote Desktop Services - remote desktop connections
  41. Deploying Servers - failover clusters
  42. Deploying Servers - network load balancing
  43. Deploying Servers - snapshots
  44. Deploying Servers - virtual hard disks
  45. Configuring a VPN Server
  46. Configuring Clients through DHCPv6
  47. Configuring IPv4 Addressing
  48. Configuring IPv6 Addressing
  49. Configuring Static Routing
  50. Network Address Translation
  51. Using IPv6 Tools
  52. Using Routing Information Protocol
  53. Windows Server 2008 and RADIUS
  54. Analyzing the IPv6 Address Structure
  55. Determine which edition of Windows Server is appropriate for a specific set of circumstances
  56. IPv4-to-IPv6 Compatibility and Transition to IPv6
  57. Multicast, Scheduled, and Automatic Deployment
  58. Plan for the installation of or upgrade to Windows Server 2008 or Windows Server 2008 R2
  59. Planning an IPv6 Network
  60. Planning Windows Server 2008 and Windows Server 2008 R2 DNS
  61. Using IPv6 Tools
  62. Windows Deployment Services
  63. Windows Server 2008 R2 Answer Files
  64. Determining Signal Strength Influence
  65. Discusses wireless LAN topologies from a high-level perspective (Part I)
  66. Discusses wireless network topologies defined by the IEEE (Part II)
  67. How Bandwidth is achieved from RF Signals
  68. Influences on Wireless Transmissions
  69. Modulation Techniques and How They Work
  70. Principles of Antennas
  71. Configuring Backup and Recovery Options - configure backup - Backing up files, folders, or full system
  72. Configuring Backup and Recovery Options - Configure Backup - creating a system recovery disk
  73. Configuring Backup and Recovery Options - Configure file recovery options - restore user profiles
  74. Configuring Backup and Recovery Options - configure file recovery options - Restoring damaged and deleted files by using shadow copies
  75. Configuring Backup and Recovery Options - Configure System Recovery Options
  76. Configuring Backup and Recovery Options - Configure System Recovery Options - restore system settings
  77. Operating Systems And Software - Configure Power Management
  78. Operating Systems And Software - Device Manager
  79. Operating Systems And Software - File systems
  80. Operating Systems And Software - Virtual Memory
  81. Operational Procedure - Physical Safety
  82. Security - Encryption Technologies
  83. Security - Malicious Software Protection
  84. Security - Usernames and Passwords
  85. Configuring Public Folder Limits
  86. Create and configure address lists
  87. Create and configure mailbox databases
  88. Create and configure public folder databases
  89. Create and Configure Public Folders
  90. Create Mailboxes
  91. Determine which software components need to be installed prior to deploying Exchange Server 2010
  92. Mail Contacts
  93. Mail-Enabled Users
  94. Prepare the Active Directory environment for the introduction of Exchange Server 2010
  95. Create an EIGRP verification Plan
  96. Create an OSPF Verification Plan
  97. Describe Basic VPN Technologies
  98. Describe Network resources for implementing EIGRP in a network
  99. Determine Network Resources needed for Implementing OSPF on a Network
  100. Troubleshoot Access-ports for VLAN Based Solution