Home :: Software :: Business & Office  

Business Accounting
Communication
Database
Document Management
e-Commerce
Networking
Office Suites
Personal Finance
Presentation
Project Management
Reports & Forms
Schedule & Contact Management
Spreadsheet
Tax Preparation
Training & Tutorials
Word Processing
CIW Server Administrator Part 5: Server Integrity CBT Training CD

CIW Server Administrator Part 5: Server Integrity CBT Training CD

List Price:
Your Price:
Product Info Reviews

<< 1 >>

Rating: 5 stars
Summary: CIW Server Administrator Part 5: Server Integrity
Review: Course Overview
This is the final course in a five part series that deals with optimizing server performance and services and protecting the integrity of servers. The course will also cover server optimization, security, and fault tolerance.

Learn To

Identify services that are critical for a Web-based organization.
Match network security services with their features.
Identify functions of log files in system logging.
Identify areas of vulnerability for servers.
Identify methods for enhancing server security.
Match types of firewalls with their descriptions.
Identify functions of Redundant Array of Independent Disks (RAID).
Identify data protection options.
Identify the considerations for planning a backup strategy.

Audience
The audience for this course includes LAN/WAN administrators, system administrators, systems managers, intranet administrators, network engineers, and internetworking engineers. The prerequisite for this course is that students must have CIW Foundations certification or equivalent experience. CIW accepts CompTIA's i-Net+ certification in place of the CIW Foundations course. This course covers exam number 1D0-450.

Deployment Options
e-Learning

Accreditation
NASBA credits: 4 CPE Credits
CEU credits: 0.70 CEUs

Language Options
US English

Total Learning Time
6 to 8 hours

Objectives
Unit 1: Server Optimization 3 hours

Identify services that are critical for a Web-based organization.
Match network security services with their features.
Identify functions of log files in system logging.
Identify methods for optimizing server performance and fault tolerance.
Identify considerations for analyzing server performance.
Identify the effects of queues and bottlenecks.
Monitor the effects of Internet-based connections on system performance.
Identify features of the top program.
Identify the functions of the vmstat program.
Identify methods to improve Internet server performance by using hardware.
Adjust Web server performance in Internet Information Server (IIS).
Adjust the Web server performance in Apache server.
Identify features of logging.
Match Hypertext Transport Protocol (HTTP) server log files with their functions.
Configure extended logging in IIS.
Configure a File Transfer Protocol (FTP) log file in IIS.
Configure logging in Apache Server.
Identify the syntax used to view FTP information contained in Linux log files.
Identify the steps involved in the installation of the WebTrends Log Analyzer.
View traffic statistics by using the WebTrends Log Analyzer to generate a report.
Identify the settings used to create a WebTrends Log Analyzer profile.

Unit2 : Security 1 - 2 hours

Identify areas of vulnerability for servers.
Identify methods for enhancing server security.
Match types of firewalls with their descriptions.
Identify features of intrusion detection systems (IDSs).
Identify features of the Secure Sockets Layer (SSL) protocol.
Sequence the phases in the SSL handshake process.
Identify the certificate types used to begin SSL sessions.
Identify the features of the X.509v3 certification standard.
Identify the capabilities of certificates.
Identify steps in the procedure for requesting SSL certificates.
Identify the steps for installing a server certificate.
Identify the capabilities of proxy servers.
Install EasyProxy Server in Windows 2000.
Configure AnalogX proxy server.
Identify syntax used to configure an Apache server as a Web proxy server.

Unit 3: Fault Tolerance 2 - 3 hours

Identify functions of Redundant Array of Independent Disks (RAID).
Identify data protection options.
Identify the considerations for planning a backup strategy.
Identify the syntax used to archive and extract data by using the tar command.
Identify the syntax used to compress and decompress files.
Sequence the steps for combining the tar and gzip commands to archive and extract directories.
Identify the syntax used to back up and recover data by using the dump and restore commands.
Identify the characteristics of a Windows 2000 boot disk.
Create a Linux boot disk.
Sequence the steps required to create a Windows 2000 Emergency Repair Disk (ERD).
Sequence the steps to enter Windows 2000 Safe Mode.
Sequence the steps required to launch a rescue session in Linux.


<< 1 >>

© 2004, ReviewFocus or its affiliates