0% found this document useful (0 votes)
62 views2 pages

IT Fundamentals

This document outlines the modules for an enterprise IT training program, covering topics such as enterprise IT environments, hardware and software stacks, virtualization, cloud computing, computer networking fundamentals, network security, and Microsoft 365. Module 1 introduces key enterprise IT concepts. Module 2 focuses on computer networking basics. Module 3 covers enterprise security fundamentals including threats, vulnerabilities, authentication, and secure network design. Module 4 presents additional topics like Microsoft Active Directory, Exchange Server, and Microsoft Teams.

Uploaded by

Alok Sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
0% found this document useful (0 votes)
62 views2 pages

IT Fundamentals

This document outlines the modules for an enterprise IT training program, covering topics such as enterprise IT environments, hardware and software stacks, virtualization, cloud computing, computer networking fundamentals, network security, and Microsoft 365. Module 1 introduces key enterprise IT concepts. Module 2 focuses on computer networking basics. Module 3 covers enterprise security fundamentals including threats, vulnerabilities, authentication, and secure network design. Module 4 presents additional topics like Microsoft Active Directory, Exchange Server, and Microsoft Teams.

Uploaded by

Alok Sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
You are on page 1/ 2

Module 01: Enterprise IT Fundamentals

1.1 Enterprise IT Environments - Dev, QA, UAT, Prod, DR


1.2 Hardware Stacks – Compute, Storage, Network
1.3 Software Stacks
1.4 Network Stacks
1.5 Virtualization Technologies
1.6 Cloud Computing & Services
1.7 Private vs Public Clouds

Module 02: Computer Networking


2.1 Basic Networking Terms
2.2 OSI Model
2.3 IP Addressing
2.4 Setup GNS3 for Labs
2.5 IP Subnetting
2.6 TCP UDP
2.7 DHCP DNS
2.8 VLANs
2.9 VLANs and 802.1Q Demos

Module 03: Enterprise Security Fundamentals


5.1 Attacks, Threats, and Vulnerabilities
5.1.1 Compare and contrast different types of social engineering techniques.
5.1.2 Explain different threat actors, vectors, and intelligence sources.
5.2 Architecture and Design
5.2.1 Explain the importance of security concepts in an enterprise environment.
5.2.2 Secure application development, deployment, and automation concepts.
5.2.3 Authentication and authorization design concepts.
5.3 Implementation
5.3.1 Secure protocols
5.3.2 Host or application security solutions
5.3.3 Secure network designs
5.3.4 Wireless security settings
5.3.5 Secure mobile solutions
5.3.6 Identity and account management controls
5.3.7 Authentication and authorization solutions
5.3.8 Public key infrastructure

Module 04: Add on topics


What is Microsoft 365?
Microsoft 365 productivity and teamwork solutions
Engage employees with Microsoft Teams
Get more done with Office across all devices
Overview of AD DS
Overview of AD DS domain controllers
Deploying a domain controller
Lab: Deploying and administering AD DS
Managing objects in AD DS
Introduction to Azure Active Directory
Synchronizing On promises Active Directory with Azure Active Directory
New features in Exchange Server 2016
Gathering business requirements for an Exchange Server 2016 deployment
Planning for an Exchange Server deployment
What is Microsoft 365?
Microsoft 365 productivity and teamwork solutions
Engage employees with Microsoft Teams
Get more done with Office across all devices
Overview of AD DS

You might also like