Microsoft Certified Solution Expert (MCSE)

1800 Students taken this course

Paper Code :-

70-740 Installation, Storage, and Compute
70-741 Networking with Windows Server 2016
Identity with Windows Server 2016
Securing Windows Server 2016




2 Months


1. Above fee is applicable in class / Group study.
2. Fee package will be Different for one on one session & International Students.

About this Course

What is MCSE Certification?

MCSE stands for Microsoft Certified Systems Engineer, which has been upgraded to Microsoft Certified Solutions Expert. This certification certifies your competence in administering and configuring computer systems running on Microsoft servers. However, Microsoft Certified Systems Engineer Certification is still accepted as a legacy credential. This credential must be renewed once every three years by passing a recertification exam. MCSE certification offers IT professionals the opportunity of working for consulting firms, computer companies, financial organizations and other businesses.

What are the Requirements for MCSE Certification?

To obtain MCSE certification, you are required to pass five exams which comprise of approximately 50 questions each. Your answers must show your ability to design, install, administer and troubleshoot a Microsoft-server-based computer and networking systems.

Modes of Trainings Available:

  • Online Training
  • Class Room Training
  • One to One Training
  • Regular and Weekend Training

Course Content

Installing, upgrading, and migrating servers and workloads
Introducing Windows Server 2016
Preparing and installing Server Core
Preparing for upgrades and migrations
Migrating server roles and workloads
Windows Server activation models

Configuring local storage
Managing disks in Windows Server
Managing volumes in Windows Server

Implementing enterprise storage solutions
Overview of DAS, NAS, and SANs
Comparing Fiber Channel, iSCSI, and Fiber Channel over Ethernet
Understanding iSNS, DCB, and MPIO
Configuring sharing in Windows Server 2016

Implementing Storage Spaces and Data
Implementing Storage Spaces
Managing Storage Spaces
Implementing Data Deduplication

Installing and configuring Hyper-V and virtual machines
Overview of Hyper-V
Installing Hyper-V
Configuring storage on Hyper-V host servers
Configuring networking on Hyper-V host servers
Configuring Hyper-V virtual machines
Managing virtual machines

Deploying and managing Windows and Hyper-V containers
Overview of containers in Windows Server 2016
Deploying Windows Server and Hyper-V containers
Installing, configuring, and managing containers by using Docker

Overview of high availability and disaster recovery
Defining levels of availability
Planning high availability and disaster recovery solutions with Hyper-V virtual machines
Backing up and restoring by using Windows Server Backup
High availability with failover clustering in Windows Server 2016

Implementing failover clustering
Planning a failover cluster
Creating and configuring a new failover cluster
Maintaining a failover cluster
Troubleshooting a failover cluster
Implementing site high availability with stretch clustering

Implementing failover clustering with Windows Server 2016 Hyper-V
Overview of the integration of Hyper-V Server 2016 with failover clustering
Implementing Hyper-V VMs on failover clusters
Key features for VMs in a clustered environment

Implementing Network Load Balancing
Overview of NLB
Configuring an NLB cluster
Planning an NLB implementation

Creating and managing deployment images
Introduction to deployment images
Creating and managing deployment images by using MDT
Virtual machine environments for different workloads

Managing, monitoring, and maintaining virtual machine installations
WSUS overview and deployment options
Update management process with WSUS
Overview of Windows PowerShell DSC
Overview of Windows Server 2016 monitoring tools
Using Performance Monitor
Monitoring event logs

Planning and implementing an IPv4 network
• Planning IPv4 addressing
• Configuring an IPv4 host
• Managing and troubleshooting IPv4 network connectivity

Implementing DHCP
• Overview of the DHCP server role
• Deploying DHCP
• Managing and troubleshooting DHCP

Implementing IPv6
• Overview of IPv6 addressing
• Configuring an IPv6 host
• Implementing IPv6 and IPv4 coexistence
• Transitioning from IPv4 to IPv6

Implementing DNS
• Implementing DNS servers
• Configuring zones in DNS
• Configuring name resolution between DNS zones
• Configuring DNS integration with Active Directory Domain Services (AD DS)
• Configuring advanced DNS settings

Implementing and managing IPAM
• Overview of IPAM
• Deploying IPAM
• Managing IP address spaces by using IPAM

Remote access in Windows Server 2016

• Overview of remote access
• Implementing the Web Application Proxy

Implementing Direct Access
• Overview of Direct Access
• Implementing Direct Access by using the Getting Started Wizard
• Implementing and managing an advanced Direct Access infrastructure

Implementing VPNs
• Planning VPNs
• Implementing VPNs

Implementing networking for branch offices
• Networking features and considerations for branch offices
• Implementing Distributed File System (DFS) for branch offices
• Implementing BranchCache for branch offices

Configuring advanced networking features
• Overview of high performance networking features
• Configuring advanced Microsoft Hyper-V networking features

Installing and configuring domain controllers

Overview of AD DS
Overview of AD DS domain controllers
Deploying a domain controller

Managing objects in AD DS
Managing user accounts
Managing groups in AD DS
Managing computer objects in AD DS
Using Windows PowerShell for AD DS administration
Implementing and managing OUs

Advanced AD DS infrastructure management
Overview of advanced AD DS deployments
Deploying a distributed AD DS environment
Configuring AD DS trusts

Implementing and administering AD DS sites and replication
Overview of AD DS replication
Configuring AD DS sites
Configuring and monitoring AD DS replication

Implementing Group Policy
Introducing Group Policy
Implementing and administering GPOs
Group Policy scope and Group Policy processing
Troubleshooting the application of GPOs

Managing user settings with Group Policy
Implementing administrative templates
Configuring Folder Redirection, software installation, and scripts
Configuring Group Policy preferences

Securing Active Directory Domain Services
Securing domain controllers
Implementing account security
Implementing audit authentication
Configuring managed service accounts

Deploying and managing AD CS
Deploying CAs
Administering CAs
Troubleshooting and maintaining CAs

Deploying and managing certificates
Deploying and managing certificate templates
Managing certificate deployment, revocation, and recovery
Using certificates in a business environment
Implementing and managing smart cards

Implementing and administering AD FS
Overview of AD FS
AD FS requirements and planning
Deploying and configuring AD FS
Web Application Proxy Overview

Implementing and administering AD RMS
Overview of AD RMS
Deploying and managing an AD RMS infrastructure
Configuring AD RMS content protection

 Attacks, breach detection, and Sysinternals tools
Understanding attacks
Detecting security breaches
Examining activity with the Sysinternals tools

Protecting credentials and privileged access
Understanding user rights
Computer and service accounts
Protecting credentials
Privileged Access Workstations and jump servers
Local administrator password solution

Limiting administrator rights with Just Enough Administration
Understanding JEA
Verifying and deploying JEA

Privileged access management and administrative forests
ESAE forests
Overview of Microsoft Identity Manager
Overview of JIT administration and PAM

Mitigating malware and threats
Configuring and managing Windows Defender
Restricting software
Configuring and using the Device Guard feature

Analyzing activity with advanced auditing and log analytics
Overview of auditing
Advanced auditing
Windows PowerShell auditing and logging

Deploying and configuring Advanced Threat Analytics and Microsoft Operations Management Suite
Deploying and configuring ATA
Deploying and configuring Microsoft Operations

Management Suite
Deploying and configuring Azure Security Center

Secure Virtualization Infrastructure
Guarded fabric
Shielded and encryption-supported virtual machines

Securing application development and server work load infrastructure
Using SCT
Understanding containers

Planning and protecting data
Planning and implementing encryption
Planning and implementing BitLocker
Protecting data by using Azure Information Protection

Optimizing and securing file services
File Server Resource Manager
Implementing classification and file management tasks
Dynamic Access Control

Securing network traffic with firewalls and encryption
Understanding network-related security threats
Understanding Windows Firewall with Advanced Security
Configuring IPsec
Datacenter Firewall

Securing network traffic
Configuring advanced DNS settings
Examining network traffic with Message Analyzer
Securing and analyzing SMB traffic

Reviews and Ratings

Top Reviews