Advanced Certificate in Networking

(Microsoft)

G5J9 17

Group Award Requirements

Advanced Certificate in Networking (NT4)

Vendor Specific (Microsoft)

Professional Development Award (PDA)

Vendor Specific (Microsoft)

Advanced Certificate in Networking

Group Award Objectives

The objective of this group award is to provide an award for computing professionals and continuing students, which is recognised by SQA and Microsoft. This award provides a means by which candidates can demonstrate competence in networking in a practical environment using specific vendor hardware and/or software.

Group Award Content

The award comprises the following four SQA units which must be undertaken according to the vendors specification, in this case Microsoft.

Unit Title / Unit Number / Credit Value
Multi User and Network System Administration (Microsoft) / D3BX 04 / 3
Network Technology (Microsoft) / D3BY 04 / 1
Stand Alone Computer System Support (Microsoft) / D3C0 04 / 2
Local Area Networks and Wide Area Networks in the Organisation (Microsoft) / D3C1 04 / 1
Total Credit Value / 7

Context

In order to gain Microsoft endorsement this specific version of the award must be delivered according to the requirements of the following Microsoft Official Curriculum (MOC) specifications.

MOC Course Number / MOC Course Title
803 / Administering Microsoft Windows NT 4.0.
922 / Supporting Microsoft Windows NT 4.0 – Core Technologies.
689 / Supporting Microsoft Windows NT Server 4.0 – Enterprise Technologies.
Microsoft Press ISBN 1-57231-527-X / Networking Essentials (Study Pack).

Full details of this curriculum are provided in the MOC documents. Details of curriculum coverage are provided in the tables at the end of this document.

Microsoft Certified Systems Engineer (MCSE)

Candidates who satisfactorily complete this award will have acquired the necessary skills, knowledge and understanding to enter the following Microsoft Certified Systems Engineer (MCSE) examinations.

Please note this award does NOT provide exemption from the examinations.

Exam Number / Exam Title
70-058 / Networking Essentials
70-067 / Implementing and Supporting Microsoft Windows NT Server 4.0
70-068 / Implementing and Supporting Microsoft Windows NT Server 4.0 in the Enterprise
70-073 / Implementing and Supporting Microsoft Windows NT Workstation 4.0

Evidence requirements

Candidate evidence requirements for this vendor specific version of the award is a combination of records and checklists that confirm satisfactory completion of all activities, demonstrations, labs and questioning sessions specified in the MOC.

In addition some units contain stand-alone assessments (exemplars provided) where the SQA competences exceed those of the MOC material.

Internal and external moderation, and other assessment quality assurance procedures must ensure that these special mandatory evidence requirements are adhered to for this vendor specific award.

Microsoft Official Curriculum - Course 803
Administering MS Windows NT 4.0 - Topics Covered
Content
1Introduction
1.1Windows NT Administrative tools
1.2Logging on to a Computer or a Domain
1.3Windows NT security Dialog Box
2Setting up user accounts
2.1Where accounts are created
2.2Planning new accounts
2.3naming conventions
2.4passwords
2.5Logon times
2.6Workstation and account options
2.7Dial in Permissions
2.8Deleting and renaming user accounts
2.9Managing the user work environment
2.10Roaming profiles
2.11Defining the users environment
3Setting up group accounts
3.1Local and global groups
3.2Planning a group strategy
3.3Planning, creating and deleting local and global groups
3.4Planning and implementing built in groups
4Administering User and Group Accounts
4.1User account templates
4.2Planning and implementing an account policy
4.3Multiple user accounts
4.4Managing and maintaining domain controllers
5Securing Network Resources with Shared Folder Permissions
5.1Shared folders and permissions
5.2Guidelines for sharing folders
5.3Application, data and home folders
5.4Sharing folders
6Securing Network Resources with NTFS Permissions
6.1The six individual NTFS permissions
6.2How permissions are applied
6.3Combining shared folder and NTFS permissions
6.4Assigning NTFS permissions
6.5Taking ownership of folders and files
6.6Copying and moving folders and files
6.7Troubleshooting permission problems
7Setting up a Network Printer
7.1Windows NT printing and printer permissions
7.2Setting up a network printer
7.3Sharing and assigning printer permissions
7.4Setting up a network client and printer drivers
7.5Accessing a network printer
7.6Creating a printer pool
7.7Setting priorities
7.8Assigning forms to trays
7.9Setting a separator page
8Administering Network Printers
8.1How documents print
8.2Deleting a document
8.3Setting a notification, priority and printing time
8.4Pausing, resuming and purging a printer
8.5Redirecting a document
8.6Taking ownership of a printer
8.7Identifying printing problems
9Auditing Resources and Events
9.1Planning an audit policy
9.2Implementing an audit policy
9.3Auditing files, directories and printers
9.4Using an event viewer
10Monitoring Network Resources
10.1Monitoring computer properties
10.2Monitoring user sessions, shared resources and resources in use
10.3Setting administrative alerts
10.4Sending messages to users
10.5Viewing system configuration
11Backing up and Restoring Data
11.1Planning a backup strategy
11.2Files and folders to backup
11.3Determining the type of backup to use
11.4Backup sets, catalogues, and logs
11.5Scheduling backups
11.6Restoring data
11.7Selecting restore options and logging restoration
12Practical Work
12.1Plan and create user accounts
12.2Configure user profiles
12.3Plan and create local and global groups
12.4Implement built in groups
12.5Manage accounts
12.6Manage domain controllers
12.7Plan and set up folder sharing
12.8Plan assign and manage NTFS permissions
12.9Set up and manage network printers
12.10Audit resources and events
12.11Monitor network resources
12.12Plan, backup and restore data
Microsoft Official Curriculum - Course 922
NT 4.0 Core Technologies - Topics Covered
Content
13Windows NT 4.0 Environment
13.1Microsoft Windows operating systems
13.2Windows NT architecture
13.3Domains and workgroups
13.4Logging on and creating a computer account
13.5Adding computers to a domain
14Installing Windows NT 4.0
14.1Preparing for installation
14.2Installing Windows NT
14.3Installing Windows NT networking
14.4Performing a server-based installation
14.5Troubleshooting installation
14.6Upgrading to Windows NT 4.0
14.7Initial parameter files
14.8OEM set up tools
14.9Using books on line
14.10Removing Windows NT
15Configuring the Windows NT Environment
15.1Registry overview
15.2Control panel hardware settings
15.3Control panel software settings
15.4Registry editor
16Managing System Policies
16.1System policies
16.2How system policy works
16.3Implementing system policies
16.4Using system policy editor
16.5Creating system policy
16.6Modifying system policy
16.7System policy troubleshooting
17Managing File Systems
17.1File systems supported by Windows NT
17.2File system comparison
17.3Auto-generated and long file names
17.4Managing long file names
17.5Managing NTFS compression
18Managing Partitions
18.1Partitioning a disk
18.2Managing partitions using disk administrator
18.3General maintenance and troubleshooting
19Managing Fault Tolerance
19.1RAID systems
19.2Recovering from hard disk failure
19.3Implementing fault tolerance
20Supporting Applications
20.1Supporting Win32 based applications
20.2Supporting MS-DOS-based and WIN16 applications
20.3Supporting applications in other subsystems
20.4Supporting applications on different hardware platforms
20.5Distributed component object model
20.6Managing and running applications
21The Windows NT Networking Environment
21.1Windows NT network environments
21.2Windows NT network architecture
21.3Distributed processing
21.4Accessing file and print resources
21.5Distributed file system
22Configuring Windows NT Protocols
22.1Using the network program in control panel
22.2Microsoft TCP/IP
22.3Configuring TCP/IP
22.4NWLink IPX/SPX
22.5Installing and configuring NWLink
22.6NetBEUI
22.7Network bindings
22.8Installing and configuring NetBEUI
23Windows NT Network Services
23.1Installing network services
23.2Dynamic host configuration protocol
23.3Installing and configuring DHCP
23.4Windows Internet Name Service WINS
23.5Installing and configuring WINS
23.6Domain Name System DNS
23.7Installing and configuring DNS
23.8Computer browser service
23.9Configuring browsers
24Remote Access Service RAS
24.1RAS and dial-up networking
24.2Telephony API (TAPI)
24.3Installing and configuring RAS
24.4Installing and configuring dial-up networking
24.5Troubleshooting RAS
25Internet working and intranet working
25.1Internet and intranet overview
25.2Internet information server IIS and peer web services PWS components
25.3Using Microsoft Internet explorer
25.4Securing Internet and Intranet sites
25.5Installing and configuring IIS
26Interoperability with Novell NetWare
26.1Windows NT connectivity with NetWare
26.2Client and Gateway services for NetWare
26.3Installing and configuring CSNW and GSNW
27Implementing Network Clients
27.1Windows NT server 4.0 licensing
27.2Client access licenses
27.3Licensing modes
27.4Licensing administration
27.5Client software included with Windows NT server
27.6Network client administrator
27.7Client-based network administration tools
27.8Services for Macintosh
27.9Creating a Network installation start up disk
28Implementing Directory Replication
28.1Directory replication overview
28.2Preparing for directory replication
28.3Managing directory replication
28.4Replication troubleshooting overview
28.5Implementing directory replication
29The Windows NT Boot Process
29.1Overview of the Windows boot process
29.2Windows NT load phases
29.3Troubleshooting the Windows NT Boot process
29.4Last known good configuration
29.5Emergency repair
30Troubleshooting resources
30.1Troubleshooting categories
30.2Diagnostic tools
30.3Additional resources for troubleshooting
Microsoft Official Curriculum - Course 689
NT Server 4.0 Enterprise Technologies - Topics Covered
Content
Unit 1 Implementing Directory Services
31Defining NT Directory Services
31.1NT Directory services and the enterprise
31.2Domains and trust relationships
31.3Directory services components and features
31.4Implementing Directory Services
32Establishing Trust Relationships
32.1Introduction to trust relationships
32.2Group strategies across trusts
32.3Granting permissions across trusts
32.4The Net Logon service
32.5Pass through authentication
32.6Resource management scenarios
32.7Establishing and managing trust relationships
33Choosing a Directory Services Structure
33.1Domains in directory services
33.2Considerations in implementing Directory Services
33.3Interaction between computers and domains
33.4The single domain model
33.5The single master domain model
33.6The multiple master domain model
33.7The complete trust domain model
34Planning a Directory Services Structure for Performance
34.1Building an effective directory services structure
34.2Directory services database size factors
34.3Determining the optimum number of domain controllers
34.4Directory services over WAN links
34.5Planning domain and server locations
34.6Implementing effective synchronisation
34.7Planning directory services
Unit 2 Server Analysis and Optimisation
35Securing Network Resources with Shared Folder Permissions
35.1Introduction to server analysis and optimisation
35.2Resources to monitor
35.3Tools for server analysis and optimisation
35.4Using performance monitor
35.5Performance monitor views
35.6Techniques for server analysis and optimisation
35.7NT approach to server analysis and optimisation
36Implementing a Measurement Baseline
36.1Collecting system data
36.2Creating a measurement baseline
36.3Using performance monitor to create a measurement baseline
36.4Establishing a database of measurement information
37Performance Analysis, Forecasting and Record Keeping
37.1Performance analysis overview
37.2NT server environments
37.3Determining workload characterisation
37.4Charting bottlenecks
37.5Setting expectations of system usage and availability
37.6Monitoring network utilisation
37.7Forecasting future resources allocation
37.8Establishing a plan for long term record keeping
37.9Collecting and analysing data
38Analysing System Performance in the File and Print Server Environment
38.1Analysis in the file and print server environment
38.2Resource implications in the file and print server environment
38.3Monitoring IIS (cache) in a file and print server environment
38.4Considerations when forecasting in a file and print server environment
38.5Calculating the number of users that a file and print server can support
39Analysing System Performance in the Application Server Environment
39.1Analysis in the application server environment
39.2Resource implications in the application server environment
39.3Considerations when forecasting in the application server environment
39.4Calculating the number of users that an application server can support
40Analysing System Performance in the Domain Server Environment
40.1Analysis in the domain server environment
40.2Resource implications in the domain server environment
40.3Considerations when forecasting in the domain server environment
40.4Calculating the number of users that a domain server can support
Unit 3 Network Analysis and Optimisation
41Introduction to Analysing Network Traffic
41.1Network traffic analysis
41.2Network monitor
41.3Installing and using network monitor
42Analysing and Optimising Client Initialisation Traffic
42.1Client initialisation analysis
42.2Analysing and optimising DHCP traffic
42.3Analysing and optimising WINS client traffic
42.4Analysing and optimising file session traffic
42.5Analysing and optimising logon validation traffic
43Analysing and Optimising Client to Server Traffic
43.1Client to server analysis
43.2Analysing and optimising client browser traffic
43.3Analysing and optimising DNS traffic
43.4Analysing and optimising intranet browsing traffic
44Analysing and Optimising Server to Server Traffic
44.1Server to server analysis
44.2Analysing and optimising account synchronisation traffic
44.3Analysing and optimising trust relationship traffic
44.4Analysing and optimising server browser traffic
44.5Analysing and optimising WINS replication traffic
44.6Analysing and optimising directory replication traffic
44.7Analysing and optimising DNS server traffic
45Predicting Network Traffic
45.1Guidelines and summary of network traffic
45.2Traffic prediction scenarios
45.3Other WAN traffic considerations
46Troubleshooting NT 4.0 in the Enterprise Environment
46.1Troubleshooting Windows NT server
46.2Successful troubleshooting
46.3Troubleshooting resources
46.4Troubleshooting methodology
47Windows NT Architecture
47.1Overview
47.2Kernel mode components
47.3NT networking architecture
47.4Kernel mode networking components
47.5Distributed networking components (User mode)
47.6Troubleshooting from an architectural perspective
47.7Tools for troubleshooting from an architectural perspective
48Modifying the System Through the Registry
48.1Overview of the registry
48.2Registry structure
48.3Registry editor
48.4Other tools in the NT resource kit
48.5Troubleshooting with HKEY_LOCAL_MACHINE
48.6HKEY_LOCAL_MACHINE - Hardware
48.7HKEY_LOCAL_MACHINE - System
48.8Troubleshooting through the registry
49Examining the Boot Process
49.1Identifying steps in a successful boot
49.2Initial phase
49.3Boot loader phase
49.4Kernel phase
49.5Logon phase
49.6The Boot.ini file
49.7Verifying loaded drivers
49.8Replacing damaged or missing files
50Examining Stop Screens
50.1Stop screen sections
50.2Debugging overview
50.3Kernel debugger
50.4CrashDump
50.5Dump analysis utilities
50.6Dr. Watson overview
Mapping - Microsoft Official Curriculum - Course 578
Networking Essentials - Objectives
Content
51NETWORK ORIENTATION
51.1Networking
51.1.1Identify the components of a local network
51.1.2Describe the advantages of networking.
51.2Two Major Types of Networks
51.2.1Describe peer-to-peer network
51.2.2Describe server-based network.
51.2.3Describe server functions and assign servers. (Practical - Shared directories)
51.2.4Determine suitable network for a site.
51.3Network Design
51.3.1Identify the standard topologies and their variations.
51.3.2Describe the advantages and disadvantages of each topology
51.3.3Determine an appropriate topology for a given network plan.
52CONNECTING NETWORK COMPONENTS
52.1Network Cabling - The physical media
52.1.1Define terms related to cabling including shielding, crosstalk, attenuation and plenum.
52.1.2Identify the primary types of network cabling.
52.1.3Distinguish between baseband and broadband transmission and identify appropriate uses for each.
52.1.4Determine which type of cabling and connection hardware would be appropriate for a particular network environment.
52.2Wireless Network Communications
52.2.1Identify the three types of wireless networks and the uses of each
52.2.2Describe the four transmission techniques used in LAN
52.2.3Describe the three types of signal transmission used in mobile computing.
52.3Network Adaptor Cards
52.3.1Describe the role of the Network Adaptor Card in a Network including preparing, sending and controlling data
52.3.2Describe the Configurable Options for Network Adaptor Cards
52.3.3List the Primary considerations for selecting a network adaptor card
52.3.4Describe at least two enhancements to adaptor cards that will improve network performance
53HOW A NETWORK FUNCTIONS
53.1The OSI and 802 Networking Models
53.1.1Describe the primary function of each OSI layer
53.1.2Identify the OSI layer at which a particular network activity takes place
53.1.3Identify the OSI layer at which a particular network component functions
53.1.4Describe the Project 802 enhancements to the OSI model
53.2Drivers
53.2.1Describe the role of drivers in a network environment, including their place in the OSI model
53.2.2Identify sources for different drivers
53.2.3Describe how to select and implement drivers given a networking situation
53.2.4Install, update and remove drivers (Practical - Install a network adaptor card)
53.3How Networks Send Data
53.3.1Define the term packet, including its function and components.
53.3.2Describe the contents and function of each packet component: header, data and trailer
53.3.3Describe how packets are sent across a network
53.4Protocols
53.4.1Identify the function of protocols and protocol stacks
53.4.2Describe the network processes which use protocols and how they use them
53.4.3Map particular protocols to the appropriate OSI levels
54NETWORK ARCHITECTURES
54.1Ethernet
54.1.1Identify the standard Ethernet components
54.1.2Describe the features of each Ethernet standard topology
54.1.3Identify the cabling for a given IEEE Ethernet standard topology
54.1.4Determine which Ethernet topology would be appropriate to use for a given site.
54.2Token Ring
54.2.1Describe the features of a Token Ring network
54.2.2Identify the major components of a Token Ring network
54.2.3Determine the components needed to implement a Token Ring network at a given site
54.3Apple Talk and Arc Net
54.3.1Identify the components and features of AppleTalk
54.3.2Identify the components and features of Arc Net
55NETWORK OPERATIONS
55.1Networking Operating System Setup
55.1.1Identify essential networking operating system components
55.1.2Define pre-emptive and non-pre-emptive multitasking
55.1.3Describe the elements of client software
55.1.4Define the elements of server software
55.1.5Define network services
55.1.6Identify the major considerations in a network operating system installation
55.1.7Install Windows NT Server (Windows 2000 Server) (Practical - Install NOS)
55.2Network Printing
55.2.1Identify the steps for installing and using a shared printer
55.2.2List the tasks included in managing a shared printer
55.2.3Determine whether a sharing fax service would be appropriate for a given site
55.3Implementing Network Applications
55.3.1Identify the features and uses of e-mail
55.3.2Identify the features and uses of scheduling
55.3.3Describe the purpose of each of the four primary e-mail and messaging standards
55.3.4Describe the considerations for sharing applications on a network
55.3.5List steps the administrator needs to perform to share an application
55.3.6Determine appropriate policies and procedures for implementing and managing an e-mail system
55.4Networks in Multi-Vendor Environments
55.4.1Define a client solution and a server solution for interoperability
55.4.2Identify methods vendors use to integrate their products with those from other vendors
55.4.3Determine which network operating systems and redirectors would be appropriate for a given site
55.5The Client/Server Environment
55.5.1Describe the differences between client/server and centralised computing
55.5.2List the six steps of the client/server process
55.5.3Identify client functions
55.5.4Identify server functions
55.5.5Determine if a client/server is appropriate for a given networking environment
56NETWORK ADMINISTRATION AND SUPPORT
56.1Managing Network Accounts
56.1.1Describe the process for creating a user account
56.1.2List and define the four types of group accounts
56.1.3Determine the appropriate types of accounts for a given network environment
56.1.4Create a user account and a group account (Practical - Create a user account)
56.2Managing Network Performance
56.2.1Identify major sources of network problems
56.2.2List potential bottlenecks in network performance
56.2.3Describe the simple network management protocol SNMP
56.2.4Develop a network performance monitoring plan (Practical - Monitor performance)
56.2.5Describe the functions of the network monitor utility
56.2.6Create appropriate network documentation
56.3Ensuring Network Data Security
56.3.1List the basic security requirements for any network
56.3.2Describe the primary components to be considered for physical security
56.3.3Describe the features of password protected shares
56.3.4Describe the features of access permissions
56.4Avoiding Data Loss
56.4.1List the considerations for implementing a backup system
56.4.2Determine a backup approach appropriate for a given site including the method and schedule
56.4.3List the considerations for implementing an un- interruptible power supply
56.4.4Describe each of the following types of fault tolerant systems: disk swapping, disk mirroring, sector sparing, mirrored drive arrays and clustering
57LARGER NETWORKS
57.1Modems in Network Communications
57.1.1Define synchronous and asynchronous communications
57.1.2Identify modem standards
57.1.3Describe the two types of carriers for modem communications
57.1.4Determine which type of modem would be appropriate for a given site (Practical - Setup a modem, dial up networking and remote access)
57.2Creating Larger Networks
57.2.1Describe the function of: Bridges, Repeaters, Routers, Brouters, and Gateways
57.2.2Determine where to expand a LAN
57.2.3Determine appropriate components in a given network expansion situation
57.3Wide Area Networks Transmission
57.3.1Identify the features of analogue activity
57.3.2Identify the features of digital connectivity
57.3.3Identify the features of packet switching networks
57.3.4Identify the major transmission components necessary for a simple single protocol WAN
57.3.5Distinguish between the major data carriers (common carriers) and determine which would be most appropriate in a given WAN
57.4Advanced WAN Technologies
57.4.1Identify the primary features of each of the following technologies: X.25, Frame relay, ATM (Asynchronous transfer mode), ISDN (integrated service digital network), FDDI (fibre distributed data interface), SONET (Synchronous optical network), SMDS (synchronous multi-megabit data service)
57.4.2Determine which technologies would be appropriate for a given network site
58SOLVING NETWORK PROBLEMS
58.1Monitoring Network Behaviour to Prevent Problems
58.1.1List five strategies that are part of a network management plan for avoiding problems
58.1.2Describe how establishing a baseline aids in preventing problems
58.1.3Describe how documentation aids in troubleshooting
58.1.4Incorporate a pre-emptive troubleshooting approach into a network plan
58.2Network Troubleshooting
58.2.1List the five steps that comprise a structured troubleshooting approach
58.2.2Describe how a terminator is used in trouble shooting
58.2.3Identify the capabilities of a protocol analyser
58.2.4Identify sources of up to date networking and troubleshooting information
58.2.5Install Microsoft Technical Information Network (TechNet)
58.2.6Access the Microsoft Download Library (MSDL)
58.2.7Determine how to approach a given network problem in order to isolate and identify the cause
58.2.8Identify any special equipment which would make it easier to solve a given network problem
58.3The Internet - A Worldwide Resource
58.3.1Identify Internet Services
58.3.2Access the Microsoft Network (MSN)
58.3.3Access the Microsoft FTP site
59PRACTICAL WORK
59.1Set up a shared directory and stop sharing a shared directory (5.3.4, 5.3.5)
59.2Create and Delete User Accounts (6.1.4)
59.3Install a modem and configure dial-up networking and remote access facilities (7.1.4)
59.4Install and configure a network adaptor card (2.3, 3.2.4)
59.5Install and configure a network operating system (5.1.7)
59.6Monitor a system using performance and network monitors and SNMP (6.1.8, 8)

Advanced Certificate in Networking (NT4)1