| |
1. Installing and Deploying Windows XP Professional |
|
| |
| 1.1 |
System Requirements |
|
| 1.2 |
Installing Windows XP Professional from the CD-Rom. |
|
| 1.2.1 |
Booting from the CD-Rom. |
|
| 1.2.2 |
Booting from Boot Disks. |
|
| 1.3 |
Installing Windows XP Professional over the Network |
|
| 1.4 |
Performing an Unattended Installation. |
|
| 1.4.1 |
Using an Unattended Answer File. |
|
| 1.4.2 |
Using the System Preparation Tool (disk imaging). |
|
| 1.4.3 |
Using Remote Installation Services (RIS). |
|
| 1.4.3.1 |
Setting up the RIS Server. |
|
| 1.4.3.2 |
Client requirements for Remote Installation. |
|
| 1.4.4 |
Deploying Software Applications |
|
| 1.4.4.1 |
Overview. |
|
| 1.4.4.2 |
Windows Installer |
|
| 1.5 |
Upgrading to Windows XP Professional. |
|
| 1.6 |
Deploying Service Packs |
|
| 1.7 |
Installing Windows XP Professional on a Dual Boot Configuration |
|
| 1.8 |
Activating Windows XP Professional |
|
| 1.9 |
The Windows XP Professional Boot Process |
|
| 1.9.1 |
Files Used in the Boot Process |
|
| 1.9.1.1 |
Preboot Sequence |
|
| 1.9.1.2 |
Boot Sequence |
|
| 1.9.1.3 |
Kernel Load |
|
| 1.9.1.4 |
Kernel Initialization |
|
| 1.9.1.5 |
Logon |
|
| 1.10 |
The Registry |
|
| 1.10.1 |
The Hierarchical Structure of the Registry |
|
| 1.10.2 |
The HKEY_LOCAL_MACHINE Subtree |
|
| 1.11 |
The Boot.ini File |
|
| 1.11.1 |
Components of the Boot.ini File |
|
| 1.11.2 |
ARC Paths |
|
| 1.11.3 |
Boot.ini Switches |
|
| 1.12 |
Advanced Boot Options |
|
| 1.12.1 |
The Recovery Console |
|
| 1.12.1.1 |
Installing and Starting the Recovery Console |
|
| 1.12.1.2 |
Using the Recovery Console |
|
| 1.12.2 |
Automated System Recovery (ASR) |
|
|
| ---------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| |
2. Configuring Windows XP Professional |
|
| |
| 2.1 |
Configuring Hardware Profiles |
|
| 2.2 |
Installing New Hardware
|
|
| 2.2.1 |
Installing Additional Processors |
|
| 2.2.2 |
Installing and Configuring Fax Devices |
|
| 2.3 |
Using Driver Signing |
|
| 2.3.1 |
Configuring Driver Signing |
|
| 2.3.2 |
System File Checker |
|
| 2.3.3 |
The File Signature Verification Utility |
|
| 2.3.4 |
Device Driver Rollback |
|
| 2.4 |
Configuring Display Settings |
|
| 2.5 |
Configuring System Settings |
|
| 2.6 |
Configuring the Desktop Environment |
|
| 2.7 |
Configuring Accessibility Options |
|
| 2.8 |
Configuring Hard Disks |
|
| 2.8.1 |
Disk Storage Types |
|
| 2.8.2 |
Configuring File Systems |
|
| 2.8.3 |
Encrypting File System (EFS) |
|
| 2.8.3.1 |
Recovering an Encrypted Folder or File |
|
| 2.8.3.2 |
Backing Up and Restoring Encrypted Files and Folders |
|
| 2.8.4 |
Volume Mounting |
|
| 2.8.5 |
File Compression |
|
| 2.8.5.1 |
Copying and Moving Compressed Files and Folders |
|
| 2.8.6 |
Disk Quotas |
|
| 2.8.7 |
Using Disk Defragmenter |
|
| 2.8.8 |
Backing Up and Restoring Data |
|
| 2.8.8.1 |
Windows Backup |
|
| 2.8.8.2 |
Backup Types |
|
| 2.8.8.3 |
Restoring Data |
|
| 2.9 |
Configuring Power Management on Portable Computers |
|
|
| ---------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| |
3. Configuring the Network |
|
| |
| 3.1 |
Creating Network Connections |
|
| 3.1.1 |
Local Area Network (LAN) |
|
| 3.1.2 |
Remote Connections |
|
| 3.1.2.1 |
Remote Access Protocols |
|
| 3.1.2.2 |
Security for Remote Connections |
|
| 3.1.3 |
Virtual Private Network (VNP) |
|
| 3.2 |
IP Addressing |
|
| 3.2.1 |
Configuring automatic IP Addressing |
|
| 3.2.1.1 |
DHCP Addressing |
|
| 3.2.1.2 |
Automatic Private IP Addressing |
|
| 3.2.2 |
Configuring Static IP Addressing |
|
| 3.2.3 |
Testing TCP/IP Configuration |
|
| 3.3 |
Name Resolution |
|
| 3.3.1 |
NetBIOS Name Resolution |
|
| 3.3.2 |
Host Name Resolution |
|
| 3.4 |
Enabling and Configuring Internet Connection Firewall |
|
| 3.5 |
Enabling Internet Connection Sharing |
|
| 3.6 |
Enabling and Configuring Network Bridge |
|
| 3.7 |
Using the Network Setup Wizard |
|
| 3.8 |
Connecting to a Novell NetWare Network |
|
| 3.8.1 |
Configuring NWLink |
|
| 3.9 |
Connecting to a UNIX Network |
|
| 3.9.1 |
Configuring Interoperability with UNIX |
|
| 3.9.2 |
Telnet |
|
| 3.9.2.1 |
Telnet Client |
|
| 3.9.2.2 |
Telnet Server |
|
|
| ---------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| |
4. Setting up and Managing User Accounts |
|
| |
| 4.1 |
Types of User Accounts |
|
| 4.1.1 |
Local User Accounts |
|
| 4.1.2 |
Domain User Accounts |
|
| 4.1.3 |
Built-In User Accounts |
|
| 4.1.3.1 |
Administrator |
|
| 4.1.3.2 |
Guest |
|
| 4.2 |
Creating User Accounts |
|
| 4.2.1 |
Creating Local User Accounts |
|
| 4.2.1.1 |
In User Accounts |
|
| 4.2.1.2 |
In Computer Management |
|
| 4.2.2 |
Creating Domain User Accounts |
|
| 4.2.3 |
Copying Domain User Accounts |
|
| 4.3 |
Configuring Account Policies |
|
| 4.3.1 |
Configuring Password Policy |
|
| 4.3.2 |
Configuring Account Lockout Policy |
|
| 4.4 |
Managing Users and User Accounts |
|
| 4.4.1 |
Managing User Data |
|
| 4.4.2 |
Using User Profiles |
|
| 4.4.2.1 |
Roaming User Profiles |
|
| 4.4.2.2 |
Mandatory User Profiles |
|
| 4.5 |
Managing Users by Using Groups |
|
|
| ---------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| |
5. Network Printing |
|
| |
| 5.1 |
Setting Up Client Computers |
|
| 5.1.1 |
Using the Add Printer Wizard |
|
| 5.1.2 |
Downloading Printer Drivers |
|
| 5.2 |
Setting Up a Printer Pool |
|
| 5.3 |
Setting Printer Priorities |
|
| 5.4 |
Novel and UNIX Printers |
|
| 5.4.1 |
Installing a Printer Using LPR |
|
|
| ---------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| |
6. Shared Network Resources |
|
| |
| 6.1 |
Shared Files and Folders |
|
| 6.1.1 |
Shared Folder Permissions |
|
| 6.1.2 |
Combining Shared Folder Permissions and NTFS Permissions |
|
| 6.1.3 |
Shared Application Folders |
|
| 6.1.4 |
Data Folders |
|
| 6.1.5 |
Administrative Shares |
|
| 6.2 |
Offline Files |
|
| 6.2.1 |
Enabling Offline Files |
|
| 6.2.2 |
Offline File Synchronization |
|
|
| ---------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| |
7. Controlling Access to Network Resources |
|
| |
| 7.1 |
Access Control List |
|
| 7.2 |
NTFS Permissions |
|
| 7.2.1 |
NTFS Folder Permissions |
|
| 7.2.2 |
NTFS File Permissions |
|
| 7.2.3 |
NTFS Permissions |
|
| 7.2.4 |
Cumulative Permissions |
|
| 7.2.5 |
The Deny Permission |
|
| 7.2.6 |
Setting NTFS Permissions |
|
| 7.2.7 |
NTFS Permissions Inheritance |
|
| 7.2.8 |
Assigning Special Access Permissions |
|
| 7.2.8.1 |
Changing Permissions |
|
| 7.2.8.2 |
Taking Ownership |
|
| 7.2.9 |
Copying and Moving Files and Folders |
|
|
| ---------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| |
8. Monitoring Resources and Performance |
|
| |
| 8.1 |
Monitoring Applications |
|
| 8.2 |
Monitoring Processes |
|
| 8.2.1 |
Using Process Measures to Identify Resource Usage |
|
| 8.2.2 |
Promoting and Demoting Process Priority |
|
| 8.3 |
Monitoring System Performance |
|
| 8.3.1 |
Using Task Manager |
|
| 8.3.2 |
Using the Performance Console |
|
| 8.3.2.1 |
Adding Counters |
|
| 8.4 |
Monitoring Network Connectivity |
|
| 8.5 |
Monitoring Event Logs |
|
| 8.5.1 |
Event Logs |
|
| 8.5.2 |
System and Application Events |
|
| 8.6 |
Audit Policies |
|
| 8.6.1 |
Configuring Auditing |
|
| 8.6.2 |
Setting up Auditing |
|
| 8.6.2.1 |
Setting an Audit Policy |
|
| 8.6.3 |
Auditing Access to Files and Folders |
|
| 8.6.4 |
Auditing Access to Printers |
|
| 8.6.5 |
Locating Events |
|
| 8.7 |
Archiving Logs |
|
| 8.8 |
Monitoring Access to Shared Folders |
|
|
| ---------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| |
9. Practice Labs |
|
| |
| 9.1 |
Converting the hard drive to NTFS |
|
| 9.2 |
Configuring Dual Boot Options |
|
| 9.3 |
Supporting Printing for UNIX clients |
|
| 9.3.1 |
Installing Print Services for UNIX |
|
| 9.3.2 |
Installing a Printer for UNIX Clients |
|
| 9.4 |
Setting Printer Priorities |
|
| 9.5 |
Installing New Hardware Devices |
|
| 9.6 |
Working with Device Drivers |
|
| 9.6.1 |
Updating Device Drivers |
|
| 9.6.2 |
Setting Driver Signing options |
|
| 9.6.3 |
Using Driver Roll Back |
|
| 9.7 |
Creating New User Accounts |
|
| 9.7.1 |
Using User Accounts |
|
| 9.7.2 |
Using Computer Management |
|
| 9.8 |
Creating User Groups |
|
| 9.9 |
Configuring Disk Quotas |
|
| 9.10 |
Compressing Files and Folders |
|
| 9.11 |
Encrypting Files and Folders |
|
|
| |
Course Duration: - 48 hours (week days and week end classes)
|