• Blog
  • Reviews
  • Contact Us
  • Locations
1-844-BOOTCAMP
or 1-941-218-0007
Certification Camps
  • BOOTCAMPS
    • Microsoft 365 Enterprise
      • MCE Microsoft 365 Enterprise Administrator
      • MCE Microsoft 365 Teams Voice Engineer
      • MCA Microsoft 365 Messaging Administrator
      • MCA Microsoft 365 Security Administrator
      • MCA Microsoft 365 Teams Administrator
      • MCA Microsoft 365 Modern Desktop
    • Microsoft Azure Admin
      • MCE Azure Solutions Architect
      • MCE Azure DevOps Engineer
      • MCA Azure Administrator
      • MCA Azure Security Engineer
      • MCA Windows Server Hybrid Administrator
      • MCS Azure Virtual Desktop
    • Microsoft Azure Data
      • MCA Azure Database Administrator
      • MCA Azure Data Engineer
      • MCA Azure Data Analyst Power BI
    • Microsoft Power Platform
      • MCE Microsoft Power Platform Combo
      • MCE Power Platform Solution Architect
      • MCA Power Platform Functional Consultant
      • MCA Power Platform Developer
    • Microsoft Developer
      • MCE Azure DevOps Engineer
      • MCA Azure Developer
      • MCA Power Platform Developer
      • MCA Microsoft 365 Developer
    • Microsoft Security
      • MCE Cyber Security Architect Expert
      • MCA Identity & Access Admin
      • MCA Information Protection Admin
      • MCA Security Operations Analyst
    • Combo Classes
      • Azure Admin & Azure Architect
      • Azure Developer & Azure DevOps
      • Microsoft 365 Desktop & Enterprise Admin
      • Microsoft 365 Security & Enterprise Admin
      • Power Platform Consultant & Architect
    • Amazon Web Services
      • Architecting on AWS Accelerator
      • AWS Cloud Prac Solutions & Architect Associate
      • AWS Certified Developer Associate
      • AWS Certified DevOps Engineer Professional
    • CompTia
      • CompTia A+ Essentials
      • CompTIA Cloud+ 5 Days (1 Course, 1 Exam, 1 Cert)
      • CompTIA CySA+ (Cyber Security Analyst+)
      • CompTia Network+
      • CompTia Security+
    • Information Security
      • EC-Council Certified Ethical Hacker (CEH)
      • (ISC)² CISSP
    • Cisco
      • Cisco CCNP Routing and Switching
      • Cisco CCNA
  • Find Training
    • Training By Job Role
      • Developer
      • Administrator
      • Architect
      • Data Engineer
      • DevOps
      • Security
    • Vendors
      • Microsoft
      • Amazon
      • Cisco
      • CompTIA
      • Ec-Council
    • Microsoft Technical
      • Azure
      • Microsoft 365
      • Power Platform
      • Security
      • Messaging
      • Modern Desktop
      • Windows Server
      • SQL Server
    • Click here to find your course
  • SCHEDULE
  • Role Based Certifications
  • Pay an Invoice
Home > Bootcamps
WINDOWS SERVER BOOTCAMP

MCSE Core Infrastructure (Security) w/ MCSA Windows Server 2016 Training & Certification Boot Camp – 13 Days

$5,995 CLASSROOM LIVE
Price includes: Instructor Led Class, Official Courseware, Labs and Exams

Certifications

  • MCSE: Core Infrastructure (Security)
  • MCSA: Windows Server 2016

Course Delivery

This course is available in the following formats:

Classroom Live
Duration:
13 days
Remote Classroom Live
Duration:
13 days
Request More Information

Exams Included & Administered During Camp:

70-740: Installation, Storage, and Compute with Windows Server 2016

70-741: Networking with Windows Server 2016

70-742: Identity with Windows Server 2016

70-744: Securing Windows Server 2016

What's Included

  • Airfare To/From Sarasota or TampaAirfare - Your Location To Tampa, FL*
  • 4 Microsoft Test Vouchers4 Microsoft Test Vouchers
  • Microsoft Training Books4 Microsoft Official Courses
  • 12 Nights of Lodging13 Nights of Lodging
  • 2 Retake Vouchers (If needed)1 Retake Voucher (per exam, if needed)
  • Microsoft Study Labs & SimulationsMicrosoft Study Labs & Simulations
  • Ground TransportationGround Transportation
  • Onsite Prometric Testing CenterOnsite Pearson Vue Test Center
  • Instructor Led Classroom TrainingInstructor Led Classroom Training
  • Course Description
  • Microsoft Gold Learning
  • Certification Camps Campus
  • Certification Camps vs Competition

PLEASE NOTE - We will continue to offer this camp WITHOUT testing / certification for dates beyond Jan 31st, 2021 (date Microsoft retires exams)

The MCSE: Core Infrastructure (Security) w/ MCSA Windows Server 2016 Training & Certification Boot Camp covers Windows Server 2016 Admin & Security in one combined 13 day course. Student will learn Windows Server 2016 topics such as installing, configuring, administering plus learn how to enhance the security of the IT infrastructure that they administer.

This Windows Server 2016 boot camp incorporates Microsoft Official Courseware

20740 Installation, Storage, and Compute with Windows Server 2016
20741 Networking with Windows Server 2016
20742 Identity with Windows Server 2016
20744 Securing Windows Server 2016

While attending this training program - you take four exams to test and certify for the Microsoft Certified Solutions Expert MCSE Core Infrastructure plus MCSA Windows Server 2016 official certifications. If your goal is to learn how to implement, administer and secure Azure and Windows Server 2016 services plus pass the certification exams (70-740, 70-741, 70-742 & 70-744) - you've found the right place. This course is a hybrid of actual hands on learning combined with focused materials mapped to exam objectives.

Skills Gained:

Prepare and install Nano Server, a Server Core installation, and plan a server upgrade and migration strategy.
Describe enterprise storage solutions, and select the appropriate solution for a given situation.
Implement and manage Storage Spaces and Data Deduplication.
Install and configure Microsoft Hyper-V.
Deploy, configure, and manage Windows and Hyper-V containers.
Describe the high availability and disaster recovery technologies in Windows Server 2016.
Plan, create, and manage a failover cluster.
Implement failover clustering for Hyper-V virtual machines.
Configure a Network Load Balancing (NLB) cluster, and plan for an NLB implementation.
Create and manage deployment images.
Manage, monitor, and maintain virtual machine installations.

Plan and implement an IPv4 network.
Implement Dynamic Host Configuration Protocol (DHCP).
Implement IPv6.
Implement Domain Name System (DNS).
Implement and manage IP address management (IPAM).
Plan for remote access.
Implement DirectAccess.
Implement virtual private networks (VPNs).
Implement networking for branch offices.
Configure advanced networking features.
Implement software defined networking

Install and configure domain controllers.
Manage objects in AD DS by using graphical tools and Windows PowerShell.
Implement AD DS in complex environments.
Implement AD DS sites, and configure and manage replication.
Implement and manage Group Policy Objects (GPOs).
Manage user settings by using GPOs.
Secure AD DS and user accounts.
Implement and manage a certificate authority (CA) hierarchy with AD CS.
Deploy and manage certificates.
Implement and administer AD FS.
Implement and administer Active Directory Rights Management Services (AD RMS).
Implement synchronization between AD DS and Azure AD.
Monitor, troubleshoot, and establish business continuity for AD DS services.

Secure Windows Server.
Secure application development and a server workload infrastructure.
Manage security baselines.
Configure and manage just enough and just-in-time (JIT) administration.
Manage data security.
Configure Windows Firewall and a software-defined distributed firewall.
Secure network traffic.
Secure your virtualization infrastructure.
Manage malware and threats.
Configure advanced auditing.
Manage software updates.
Manage threats by using Advanced Threat Analytics (ATA) and Microsoft Operations Management Suite (OMS).

Topics Covered in this Official Boot Camp

Installing, upgrading, and migrating servers and workloadsConfiguring local storageImplementing enterprise storage solutionsImplementing Storage Spaces and Data DeduplicationInstalling and configuring Hyper-V and virtual machinesDeploying and managing Windows and Hyper-V containersOverview of high availability and disaster recoveryImplementing failover clusteringImplementing failover clustering with Windows Server 2016 Hyper-VImplementing Network Load BalancingCreating and managing deployment imagesManaging, monitoring, and maintaining virtual machine installationsPlanning and implementing an IPv4 networkImplementing DHCPImplementing IPv6Implementing DNSImplementing and managing IPAMRemote access in Windows Server 2016Implementing DirectAccessImplementing VPNsImplementing networking for branch officesConfiguring advanced networking featuresImplementing Software Defined NetworkingInstalling and configuring domain controllersManaging objects in AD DSAdvanced AD DS infrastructure managementImplementing and administering AD DS sites and replicationImplementing Group PolicyManaging user settings with Group PolicySecuring Active Directory Domain ServicesDeploying and managing AD CSDeploying and managing certificatesImplementing and administering AD FSImplementing and administering AD RMSImplementing AD DS synchronization with Microsoft Azure ADMonitoring, managing, and recovering AD DSAttacks, breach detection, and Sysinternals toolsProtecting credentials and privileged accessLimiting administrator rights with Just Enough AdministrationPrivileged access management and administrative forestsMitigating malware and threatsAnalyzing activity with advanced auditing and log analyticsDeploying and configuring Advanced Threat Analytics and Microsoft Operations Management SuiteSecure Virtualization InfrastructureSecuring application development and server-workload infrastructurePlanning and protecting dataOptimizing and securing file servicesSecuring network traffic with firewalls and encryptionSecuring network traffic
Installing, upgrading, and migrating servers and workloads

Installing, upgrading, and migrating servers and workloads

This module describes the new features of Windows Server 2016, and explains how to prepare for and install Nano Server and Server Core. This module also describes how to plan a server upgrade and migration strategy, and explains how to perform a migration of server roles and workloads within and across domains. Finally, this module explains how to choose an activation model based on your environment characteristics.

Lessons

  • Introducing Windows Server 2016
  • Preparing and installing Server Core
  • Preparing for upgrades and migrations
  • Migrating server roles and workloads
  • Windows Server activation models

Lab : Installing and configuring Server Core

  • Installing Server Core
  • Completing post-installation tasks on Windows Server 2016 Core
  • Performing remote management

After completing this module, students will be able to:

  • Describe the new features of Windows Server 2016.
  • Prepare for and install Server Core.
  • Plan a server upgrade and migration strategy.
  • Perform a migration of server roles and workloads within a domain and across domains.
  • Choose an appropriate activation model.
Configuring local storage

Configuring local storage

This module explains how to manage disks and volumes in Windows Server 2016.

Lessons

  • Managing disks in Windows Server
  • Managing volumes in Windows Server

Lab : Configuring local storage

  • Creating and managing volumes
  • Resizing volumes
  • Managing virtual hard disks

After completing this module, students will be able to:

  • Manage disks in Windows Server.
  • Manage volumes in Windows Server.
Implementing enterprise storage solutions

Implementing enterprise storage solutions

This module discusses direct-attached storage (DAS), network-attached storage (NAS), and storage area networks (SANs). It also explains the purpose of Microsoft Internet Storage Name Service (iSNS) Server, data center bridging (DCB), and Multipath I/O (MPIO). Additionally, this module compares Fibre Channel, Internet Small Computer System Interface (iSCSI), and Fibre Channel over Ethernet (FCoE), and describes how to configure sharing in Windows Server 2016.

Lessons

  • Overview of DAS, NAS, and SANs
  • Comparing Fibre Channel, iSCSI, and Fibre Channel over Ethernet
  • Understanding iSNS, DCB, and MPIO
  • Configuring sharing in Windows Server 2016

Lab : Planning and configuring storage technologies and components

  • Planning storage requirements
  • Configuring iSCSI storage
  • Configuring and managing the share infrastructure

After completing this module, students will be able to:

  • Describe DAS, NAS, and SANs.
  • Compare Fibre Channel, iSCSI, and FCoE.
  • Explain the use of iSNS, DCB, and MPIO.
  • Configure sharing in Windows Server.
Implementing Storage Spaces and Data Deduplication

Implementing Storage Spaces and Data Deduplication

This module explains how to implement and manage Storage Spaces. This module also explains how to implement Data Deduplication.

Lessons

  • Implementing Storage Spaces
  • Managing Storage Spaces
  • Implementing Data Deduplication

Lab : Implementing Storage Spaces

  • Creating a Storage Space

Lab : Implementing Data Deduplication

  • Installing Data Deduplication
  • Configuring Data Deduplication

After completing this module, students will be able to:

  • Describe and implement the Storage Spaces feature in the context of enterprise storage needs.
  • Manage and maintain Storage Spaces.
  • Describe and implement Data Deduplication.
Installing and configuring Hyper-V and virtual machines

Installing and configuring Hyper-V and virtual machines

This module provides an overview of Hyper-V and virtualization. It explains how to install Hyper-V, and how to configure storage and networking on Hyper-V host servers. Additionally, it explains how to configure and manage Hyper-V virtual machines.

Lessons

  • Overview of Hyper-V
  • Installing Hyper-V
  • Configuring storage on Hyper-V host servers
  • Configuring networking on Hyper-V host servers
  • Configuring Hyper-V virtual machines
  • Managing virtual machines

Lab : Installing and configuring Hyper-V

  • Verify installation of the Hyper-V server role
  • Configuring Hyper-V networks
  • Creating and configuring virtual machines
  • Enable nested virtualization for a virtual machine

After completing this module, students will be able to:

  • Describe Hyper-V and virtualization.
  • Install Hyper-V.
  • Configure storage on Hyper-V host servers.
  • Configure networking on Hyper-V host servers.
  • Configure Hyper-V virtual machines.
  • Manage Hyper-V virtual machines.
Deploying and managing Windows and Hyper-V containers

Deploying and managing Windows and Hyper-V containers

This module provides an overview of containers in Windows Server 2016. Additionally, this module explains how to deploy Windows Server and Hyper-V containers. It also explains how to install, configure, and manage containers by using Docker.

Lessons

  • Overview of containers in Windows Server 2016
  • Deploying Windows Server and Hyper-V containers
  • Installing, configuring, and managing containers by using Docker

Lab : Installing and configuring containers

  • Installing and configuring Windows Server containers by using Windows PowerShell
  • Installing and configuring Windows Server containers by using Docker

After completing this module, students will be able to:

  • Describe containers in Windows Server 2016.
  • Explain how to deploy containers.
  • Explain how to install, configure, and manage containers using Docker.
Overview of high availability and disaster recovery

Overview of high availability and disaster recovery

This module provides an overview of high availability and high availability with failover clustering in Windows Server 2016. It further explains how to plan high availability and disaster recovery solutions with Hyper-V virtual machines. Additionally, this module explains how to back up and restore the Windows Server 2016 operating system and data by using Windows Server Backup.

Lessons

  • Defining levels of availability
  • Planning high availability and disaster recovery solutions with Hyper-V virtual machines
  • Backing up and restoring by using Windows Server Backup
  • High availability with failover clustering in Windows Server 2016

Lab : Planning and implementing a high availability and disaster recovery solution

  • Determining the appropriate high availability and disaster recovery solution
  • Implementing storage migration
  • Configuring Hyper-V replicas

After completing this module, students will be able to:

  • Define levels of availability.
  • Plan high availability and disaster recovery solutions with Hyper-V virtual machines.
  • Back up and restore data by using Windows Server Backup.
  • Describe high availability with failover clustering in Windows Server 2016.
Implementing failover clustering

Implementing failover clustering

This module explains how to plan for failover clustering. It also explains how to create, manage, and troubleshoot a failover cluster.

Lessons

  • Planning a failover cluster
  • Creating and configuring a new failover cluster
  • Maintaining a failover cluster
  • Troubleshooting a failover cluster
  • Implementing site high availability with stretch clustering

Lab : Implementing failover clustering

  • Creating a failover cluster
  • Verifying quorum settings and adding a node

Lab : Managing a failover cluster

  • Evicting a node and verifying quorum settings
  • Changing the quorum from disk witness to file-share witness, and defining node voting
  • Verifying high availability

After completing this module, students will be able to:

  • Plan for a failover-clustering implementation.
  • Create and configure a failover cluster.
  • Maintain a failover cluster.
  • Troubleshoot a failover cluster.
  • Implement high availability and stretch clustering for a site.
Implementing failover clustering with Windows Server 2016 Hyper-V

Implementing failover clustering with Windows Server 2016 Hyper-V

This module describes how Hyper-V integrates with failover clustering. It also explains how to implement Hyper-V virtual machines (VMs) in failover clusters.

Lessons

  • Overview of the integration of Hyper-V Server 2016 with failover clustering
  • Implementing Hyper-V VMs on failover clusters
  • Key features for VMs in a clustered environment

Lab : Implementing failover clustering with Windows Server 2016 Hyper-V

  • Configure iSCSI storage
  • Configuring a failover cluster for Hyper-V
  • Configuring a highly available VM

After completing this module, students will be able to:

  • Describe how Hyper-V integrates with failover clustering.
  • Implement Hyper-V VMs on failover clusters.
  • Describe the key features for VMs in a clustered environment.
Implementing Network Load Balancing

Implementing Network Load Balancing

This module provides an overview of NLB clusters. It also explains how to plan and configure an NLB cluster implementation.

Lessons

  • Overview of NLB
  • Configuring an NLB cluster
  • Planning an NLB implementation

Lab : Implementing NLB

  • Implementing a Network Load Balancing (NLB) cluster
  • Configuring and managing the NLB cluster
  • Validating high availability for the NLB cluster

After completing this module, students will be able to:

  • Describe NLB.
  • Configure an NLB cluster.
  • Explain how to plan an NLB implementation.
Creating and managing deployment images

Creating and managing deployment images

This module provides an overview of the Windows Server 2016 image deployment process. It also explains how to create and manage deployment images by using the Microsoft Deployment Toolkit (MDT). Additionally, it describes different workloads in the virtual machine environment.

Lessons

  • Introduction to deployment images
  • Creating and managing deployment images by using MDT
  • Virtual machine environments for different workloads

Lab : Using MDT to deploy Windows Server 2016

  • Configuring MDT
  • Creating and deploying an image

After completing this module, students will be able to:

  • Describe the Windows Server 2016 image deployment process.
  • Create and manage deployment images by using MDT.
  • Describe the different workloads in the virtual machine environment.
Managing, monitoring, and maintaining virtual machine installations

Managing, monitoring, and maintaining virtual machine installations

 

This module provides an overview on Windows Server Update Services (WSUS) and the requirements to implement WSUS. It explains how to manage the update process with WSUS. Additionally, this module provides an overview of Windows PowerShell Desired State Configuration (DSC) and Windows Server 2016 monitoring tools. Finally, this module describes how to use Performance Monitor, and how to manage event logs.

Lessons

  • WSUS overview and deployment options
  • Update management process with WSUS
  • Overview of Windows PowerShell DSC
  • Overview of Windows Server 2016 monitoring tools
  • Using Performance Monitor
  • Monitoring event logs

Lab : Implementing WSUS and deploying updates

  • Implementing WSUS
  • Configuring update settings
  • Approving and deploying an update by using WSUS

Lab : Monitoring and troubleshooting Windows Server 2016

  • Establishing a performance baseline
  • Identifying the source of a performance problem
  • Viewing and configuring centralized event logs

After completing this module, students will be able to:

  • Describe the purpose of WSUS and the requirements to implement WSUS.
  • Manage the update process with WSUS.
  • Describe the purpose and benefits of Windows PowerShell DSC.
  • Describe the monitoring tools available in Windows Server 2016.
  • Use Performance Monitor.
  • Manage event logs.

 

Planning and implementing an IPv4 network

Planning and implementing an IPv4 network

This module also explains how to use fundamental networking tools and techniques to configure and troubleshoot IPv4-based networks.

Lessons

  • Planning IPv4 addressing
  • Configuring an IPv4 host
  • Managing and troubleshooting IPv4 network connectivity

Lab : Planning an IPv4 network

  • Planning the IPv4 address assignments

Lab : Implementing and troubleshooting an IPv4 network

  • Verifying IPv4
  • Troubleshooting IPv4

After completing this module, students will be able to:

  • Plan IPv4 addressing.
  • Configure an IPv4 host.
  • Manage and troubleshoot IPv4 network connectivity
Implementing DHCP

Implementing DHCP

This module explains how to plan and implement DHCP to support the IPv4 infrastructure.

Lessons

  • Overview of the DHCP server role
  • Deploying DHCP
  • Managing and troubleshooting DHCP

Lab : Implementing DHCP

  • Planning a DHCP server implementation
  • Implementing the DHCP configuration
  • Validating the DHCP implementation

After completing this module, students will be able to:

  • Explain the DHCP server role.
  • Deploy DHCP.
  • Manage and troubleshoot DHCP.
Implementing IPv6

Implementing IPv6

This module explains how to implement IPv6, and how to integrate IPv6 and IPv4 networks.

Lessons

  • Overview of IPv6 addressing
  • Configuring an IPv6 host
  • Implementing IPv6 and IPv4 coexistence
  • Transitioning from IPv4 to IPv6

Lab : Configuring and evaluating IPv6 transition technologies

  • Reviewing the default IPv6 configuration
  • Implementing DHCPv6
  • Configuring network integration by using ISATAP
  • Configuring native IPv6 connectivity
  • Configuring 6to4 connectivity

After completing this module, students will be able to:

  • Describe the features and benefits of IPv6.
  • Configure an IPv6 host.
  • Implement the coexistence between IPv4 and IPv6 networks.
  • Transition from an IPv4 network to an IPv6 network.
Implementing DNS

Implementing DNS

This module explains how to install, configure, and troubleshoot DNS within the organization’s network.

Lessons

  • Implementing DNS servers
  • Configuring zones in DNS
  • Configuring name resolution between DNS zones
  • Configuring DNS integration with Active Directory Domain Services (AD DS)
  • Configuring advanced DNS settings

Lab : Planning and implementing name resolution by using DNS

  • Planning DNS name resolution
  • Implementing DNS servers and zones

Lab : Integrating DNS with Active Directory

  • Integrating DNS with Active Directory

Lab : Configuring advanced DNS settings

  • Configuring DNS policies
  • Validating the DNS implementation
  • Troubleshooting DNS

After completing this module, students will be able to:

  • Implement DNS servers.
  • Configure zones in DNS.
  • Configure name resolution between DNS zones.
  • Configure DNS integration with AD DS.
  • Configure advanced DNS settings
Implementing and managing IPAM

Implementing and managing IPAM

This module explains how to implement and manage the IPAM feature in Windows Server 2016. This module also explains how to use IPAM to manage services such as DHCP and DNS.

Lessons

  • Overview of IPAM
  • Deploying IPAM
  • Managing IP address spaces by using IPAM

Lab : Implementing IPAM

  • Installing the IPAM Server feature
  • Provisioning the IPAM Server
  • Managing IP address spaces by using IPAM

After completing this module, students will be able to:

  • Describe the IPAM functionality and components.
  • Deploy IPAM.
  • Manage IP address spaces by using IPAM.
Remote access in Windows Server 2016

Remote access in Windows Server 2016

This module explains how to plan for remote access in Windows Server 2016 and how to implement Web Application Proxy.

Lessons

  • Overview of remote access
  • Implementing the Web Application Proxy

Lab : Implementing Web Application Proxy

  • Implementing Web Application Proxy
  • Validating the Web Application Proxy deployment

After completing this module, students will be able to:

  • Describe remote access.
  • Implement Web Application Proxy.
Implementing DirectAccess

Implementing DirectAccess

This module explains how to implement and manage DirectAccess in Windows Server 2016.

Lessons

  • Overview of DirectAccess
  • Implementing DirectAccess by using the Getting Started Wizard
  • Implementing and managing an advanced DirectAccess infrastructure

Lab : Implementing DirectAccess by using the Getting Started Wizard

  • Verifying readiness for a DirectAccess deployment
  • Configuring DirectAccess
  • Validating the DirectAccess deployment

Lab : Deploying an advanced DirectAccess solution

  • Preparing the environment for DirectAccess
  • Implementing the advanced DirectAccess infrastructure
  • Validating the DirectAccess deployment

After completing this module, students will be able to:

  • Explain DirectAccess and how it works.
  • Implement DirectAccess by using the Getting Started Wizard.
  • Implement and manage an advanced DirectAccess infrastructure.
Implementing VPNs

Implementing VPNs

This module explains how to implement and manage remote access in Windows Server 2016 by using VPNs.

Lessons

  • Planning VPNs
  • Implementing VPNs

Lab : Implementing VPN

  • Implementing VPN
  • Validating the VPN deployment
  • Troubleshooting VPN access

After completing this module, students will be able to:

  • Plan a VPN solution.
  • Implement VPNs.
Implementing networking for branch offices

Implementing networking for branch offices

This module explains how to implement network services for branch offices.

Lessons

  • Networking features and considerations for branch offices
  • Implementing Distributed File System (DFS) for branch offices
  • Implementing BranchCache for branch offices

Lab : Implementing DFS for branch offices

  • Implementing DFS
  • Validating the deployment

Lab : Implementing BranchCache

  • Implementing BranchCache
  • Validating the deployment

After completing this module, students will be able to:

  • Describe the networking features and considerations for branch offices.
  • Implement DFS for branch offices.
  • Implement BranchCache for branch offices.
Configuring advanced networking features

Configuring advanced networking features

This module explains how to implement an advanced networking infrastructure.

Lessons

  • Overview of high performance networking features
  • Configuring advanced Microsoft Hyper-V networking features

Lab : Configuring advanced Hyper-V networking features

  • Creating and using Hyper-V virtual switches
  • Configuring and using the advanced features of a virtual switch

After completing this module, students will be able to:

  • Describe the high performance networking enhancements in Windows Server 2016.
  • Configure the advanced Microsoft Hyper-V networking features.
Implementing Software Defined Networking

Implementing Software Defined Networking

 

This module explains how to implement SDN.

Lessons

  • Overview of SDN.
  • Implementing network virtualization
  • Implementing Network Controller

Lab : Deploying Network Controller

  • Preparing to deploy Network Controller
  • Deploying Network Controller

After completing this module, students will be able to:

  • Describe SDN.
  • Implement network virtualization.
  • Implement Network Controller.

 

Installing and configuring domain controllers

Installing and configuring domain controllers

This module describes the features of AD DS and how to install domain controllers (DCs). It also covers the considerations for deploying DCs.

Lessons

  • Overview of AD DS
  • Overview of AD DS domain controllers
  • Deploying a domain controller

Lab : Deploying and administering AD DS

  • Deploying AD DS
  • Deploying domain controllers by performing domain controller cloning
  • Administering AD DS

After completing this module, students will be able to:

  • Describe AD DS and its main components.
  • Describe the purpose and roles of domain controllers.
  • Describe the considerations for deploying domain controllers.
Managing objects in AD DS

Managing objects in AD DS

This module describes how to use various techniques to manage objects in AD DS. This includes creating and configuring user, group, and computer objects.

Lessons

  • Managing user accounts
  • Managing groups in AD DS
  • Managing computer objects in AD DS
  • Using Windows PowerShell for AD DS administration
  • Implementing and managing OUs

Lab : Managing AD DS objects

  • Creating and managing groups in AD DS
  • Creating and configuring user accounts in AD DS
  • Managing computer objects in AD DS

Lab : Administering AD DS

  • Delegate administration for OUs
  • Creating and modifying AD DS objects with Windows PowerShell

After completing this module, students will be able to:

  • Manage user accounts in AD DS.
  • Manage groups in AD DS.
  • Manage computer objects in AD DS.
  • Use Windows PowerShell for AD DS administration.
  • Implement and manage OUs.
  • Administer AD DS.
Advanced AD DS infrastructure management

Advanced AD DS infrastructure management

This module describes how to plan and implement an AD DS deployment that includes multiple domains and forests. The module provides an overview of the components in an advanced AD DS deployment, the process of implementing a distributed AD DS environment, and the procedure for configuring AD DS trusts.

Lessons

  • Overview of advanced AD DS deployments
  • Deploying a distributed AD DS environment
  • Configuring AD DS trusts

Lab : Domain and trust management in AD DS

  • Implementing forest trusts
  • Implementing child domains in AD DS

After completing this module, students will be able to:

  • Describe the components of an advanced AD DS deployment.
  • Deploy a distributed AD DS environment.
  • Configure AD DS trusts.
Implementing and administering AD DS sites and replication

Implementing and administering AD DS sites and replication

This module describes how to plan and implement an AD DS deployment that includes multiple locations. The module explains how replication works in a Windows Server 2016 AD DS environment.

Lessons

  • Overview of AD DS replication
  • Configuring AD DS sites
  • Configuring and monitoring AD DS replication

Lab : Implementing AD DS sites and replication

  • Modifying the default site
  • Creating additional sites and subnets
  • Configuring AD DS replication
  • Monitoring and troubleshooting AD DS replication

After completing this module, students will be able to:

  • Describe how AD DS replication works.
  • Configure AD DS sites to help optimize authentication and replication traffic.
  • Configure and monitor AD DS replication.
Implementing Group Policy

Implementing Group Policy

This module describes how to implement a GPO infrastructure. The module provides an overview of the components and technologies that compose the Group Policy framework.

Lessons

  • Introducing Group Policy
  • Implementing and administering GPOs
  • Group Policy scope and Group Policy processing
  • Troubleshooting the application of GPOs

Lab : Implementing a Group Policy infrastructure

  • Creating and configuring GPOs
  • Managing GPO scope

Lab : Troubleshooting Group Policy infrastructure

  • Verify GPO application
  • Troubleshooting GPOs

After completing this module, students will be able to:

  • Explain what Group Policy is.
  • Implement and administer GPOs.
  • Describe Group Policy scope and Group Policy processing.
  • Troubleshoot GPO application.
Managing user settings with Group Policy

Managing user settings with Group Policy

This module describes how to configure Group Policy settings and Group Policy preferences. This includes implementing administrative templates, configuring folder redirection and scripts, and configuring Group Policy preferences.

Lessons

  • Implementing administrative templates
  • Configuring Folder Redirection, software installation, and scripts
  • Configuring Group Policy preferences

Lab : Managing user settings with GPOs

  • Using administrative templates to manage user settings
  • Implement settings by using Group Policy preferences
  • Configuring Folder Redirection
  • Planning Group Policy (optional)

After completing this module, students will be able to:

  • Implement administrative templates.
  • Configure Folder Redirection, software installation, and scripts.
  • Configure Group Policy preferences.
Securing Active Directory Domain Services

Securing Active Directory Domain Services

This module describes how to configure domain controller security, account security, password security, and Group Managed Service Accounts (gMSA).

Lessons

  • Securing domain controllers
  • Implementing account security
  • Implementing audit authentication
  • Configuring managed service accounts

Lab : Securing AD DS

  • Implementing security policies for accounts, passwords, and administrative groups
  • Deploying and configuring an RODC
  • Creating and associating a group MSA

After completing this module, students will be able to:

  • Secure domain controllers.
  • Implement account security.
  • Implement audit authentication.
  • Configure managed service accounts (MSAs).
Deploying and managing AD CS

Deploying and managing AD CS

This module describes how to implement an AD CS deployment. This includes deploying, administering, and troubleshooting CAs.

Lessons

  • Deploying CAs
  • Administering CAs
  • Troubleshooting and maintaining CAs

Lab : Deploying and configuring a two-tier CA hierarchy

  • Deploying an offline root CA
  • Deploying an enterprise subordinate CA

After completing this module, students will be able to:

  • Deploy CAs.
  • Administer CAs.
  • Troubleshoot and maintain CAs.
Deploying and managing certificates

Deploying and managing certificates

This module describes how to deploy and manage certificates in an AD DS environment. This involves deploying and managing certificate templates, managing certificate revocation and recovery, using certificates in a business environment, and implementing smart cards.

Lessons

  • Deploying and managing certificate templates
  • Managing certificate deployment, revocation, and recovery
  • Using certificates in a business environment
  • Implementing and managing smart cards

Lab : Deploying and using certificates

  • Configuring certificate templates
  • Enrolling and using certificates
  • Configuring and implementing key recovery

After completing this module, students will be able to:

  • Deploy and manage certificate templates.
  • Manage certificates deployment, revocation, and recovery.
  • Use certificates in a business environment.
  • Implement and manage smart cards
Implementing and administering AD FS

Implementing and administering AD FS

This module describes AD FS and how to configure AD FS in a single-organization scenario and in a partner-organization scenario.

Lessons

  • Overview of AD FS
  • AD FS requirements and planning
  • Deploying and configuring AD FS
  • Web Application Proxy Overview

Lab : Implementing AD FS

  • Configuring AD FS prerequisites
  • Installing and configuring AD FS
  • Configuring an internal application for AD
  • Configuring AD FS for federated business partners

After completing this module, students will be able to:

  • Describe AD FS.
  • Explain how to deploy AD FS.
  • Explain how to implement AD FS for a single organization.
  • Explain how to extend AD FS to external clients.
  • Implement single sign-on (SSO) to support online services.
Implementing and administering AD RMS

Implementing and administering AD RMS

This module describes how to implement an AD RMS deployment. The module provides an overview of AD RMS, explains how to deploy and manage an AD RMS infrastructure, and explains how to configure AD RMS content protection.

Lessons

  • Overview of AD RMS
  • Deploying and managing an AD RMS infrastructure
  • Configuring AD RMS content protection

Lab : Implementing an AD RMS infrastructure

  • Installing and configuring AD RMS
  • Configuring AD RMS templates
  • Using AD RMS on clients

After completing this module, students will be able to:

  • Describe AD RMS.
  • Deploy and manage an AD RMS infrastructure.
  • Configure AD RMS content protection.
Implementing AD DS synchronization with Microsoft Azure AD

Implementing AD DS synchronization with Microsoft Azure AD

This module describes how to plan and configure directory syncing between Microsoft Azure Active Directory (Azure AD) and on-premises AD DS. The modules describes various sync scenarios, such as Azure AD sync, AD FS and Azure AD, and Azure AD Connect.

Lessons

  • Planning and preparing for directory synchronization
  • Implementing directory synchronization by using Azure AD Connect
  • Managing identities with directory synchronization

Lab : Configuring directory synchronization

  • Preparing for directory synchronization
  • Configuring directory synchronization
  • Managing Active Directory users and groups and monitoring directory synchronization

After completing this module, students will be able to:

  • Plan and prepare for directory synchronization.
  • Implement directory synchronization by using Microsoft Azure Active Directory Connect (Azure AD Connect).
  • Manage identities with directory synchronization.
Monitoring, managing, and recovering AD DS

Monitoring, managing, and recovering AD DS

 

This module describes how to monitor, manage, and maintain AD DS to help achieve high availability of AD DS.

Lessons

  • Monitoring AD DS
  • Managing the Active Directory database
  • Active Directory backup and recovery options for AD DS and other identity and access solutions

Lab : Recovering objects in AD DS

  • Backing up and restoring AD DS
  • Recovering objects in AD DS

After completing this module, students will be able to:

  • Monitor AD DS.
  • Manage the Active Directory database.
  • Describe the backup and recovery options for AD DS and other identity access solutions.

 

Attacks, breach detection, and Sysinternals tools

Attacks, breach detection, and Sysinternals tools

This module frames the course so that students are thinking about security in environments where the infrastructure’s basis is predominantly Microsoft products. The module begins with teaching students about the “assume breach” philosophy and getting them to understand the different types of attacks that can occur, including attack timelines and vectors. Additionally, it gets students thinking about key resources, how they respond when they detect an incident, and how an organization’s direct needs and legislative requirements dictate its security policy.

Lessons

  • Understanding attacks
  • Detecting security breaches
  • Examining activity with the Sysinternals tools

Lab : Basic breach detection and incident response strategies

  • Identifying attack types
  • Exploring Sysinternals tools

After completing this module, students will be able to:

  • Describe the types of attacks that can occur.
  • Explain how to detect security breaches.
  • Explain how to examine activity by using the Sysinternals suite of tools.
Protecting credentials and privileged access

Protecting credentials and privileged access

This module covers user accounts and rights, computer and service accounts, credentials, Privileged Access Workstations, and the Local Administrator Password Solution. In this module, students will learn about configuring user rights and security options, protecting credentials by using Credential Guard, implementing Privileged Access Workstations, and managing and deploying Local Administrator Password Solution to manage local administrator account passwords.

Lessons

  • Understanding user rights
  • Computer and service accounts
  • Protecting credentials
  • Privileged Access Workstations and jump servers
  • Local administrator password solution

Lab : Implementing user rights, security options, and group managed service accounts

  • Configuring user rights and account-security options
  • Delegating privileges
  • Creating group Managed Service Accounts
  • Locating problematic accounts

Lab : Configuring and deploying LAPs

  • Installing and configuring LAPs
  • Deploying and testing LAPs

After completing this module, students will be able to:

  • Configure user rights.
  • Implement computer and service accounts.
  • Protect credentials.
  • Describe how to configure Privileged Access Workstations and jump servers.
  • Configure the Local Administrator Password Solution (LAPS).
Limiting administrator rights with Just Enough Administration

Limiting administrator rights with Just Enough Administration

This module explains how to deploy and configure Just Enough Administration (JEA), which is an administrative technology that allows students to apply role-based access control (RBAC) principles through Windows PowerShell remote sessions.

Lessons

  • Understanding JEA
  • Verifying and deploying JEA

Lab : Limiting administrator privileges with JEA

  • Creating a role-capability file
  • Creating a session-configuration file
  • Creating a JEA endpoint
  • Connecting and testing a JEA endpoint
  • Deploying a JEA configuration to another computer

After completing this module, students will be able to:

  • Understand JEA.
  • Verify and deploy JEA.
Privileged access management and administrative forests

Privileged access management and administrative forests

This module explains the concepts of Enhanced Security Administrative Environment (ESAE) forests, Microsoft Identity Manager (MIM), and Just In Time (JIT) Administration, or Privileged Access Management (PAM).

Lessons

  • ESAE forests
  • Overview of Microsoft Identity Manager
  • Overview of JIT administration and PAM

Lab : Limiting administrator privileges with PAM

  • Layered approach to security
  • Configuring trust relationships and shadow principals
  • Requesting privileged access
  • Managing PAM roles

After completing this module, students will be able to:

  • Describe ESAE forests.
  • Describe MIM.
  • Understand JIT administration and PAM.
Mitigating malware and threats

Mitigating malware and threats

This module explains how to use tools such as Windows Defender, Windows AppLocker, Microsoft Device Guard, Windows Defender Application Guard, and Windows Defender Exploit Guard.

Lessons

  • Configuring and managing Windows Defender
  • Restricting software
  • Configuring and using the Device Guard feature

Lab : Securing applications with Windows Defender, AppLocker, and Device Guard Rules

  • Configuring Windows Defender
  • Configuring AppLocker
  • Configuring Device Guard

After completing this module, students will be able to:

  • Configure and manage Windows Defender.
  • Use software restriction policies and AppLocker.
  • Configure and use the Device Guard feature.
Analyzing activity with advanced auditing and log analytics

Analyzing activity with advanced auditing and log analytics

This module provides an overview of auditing, and then goes into detail about how to configure advanced auditing and Windows PowerShell auditing and logging.

Lessons

  • Overview of auditing
  • Advanced auditing
  • Windows PowerShell auditing and logging

Lab : Configuring advanced auditing

  • Configuring the auditing of file system access
  • Auditing domain sign-ins
  • Managing advanced audit policy configuration
  • Windows PowerShell logging and auditing

After completing this module, students will be able to:

  • Describe auditing.
  • Understand advanced auditing.
  • Configure Windows PowerShell auditing and logging.
Deploying and configuring Advanced Threat Analytics and Microsoft Operations Management Suite

Deploying and configuring Advanced Threat Analytics and Microsoft Operations Management Suite

This module explains the Microsoft Advanced Threat Analytics tool and the Microsoft Operations Management suite (OMS). It also explains how you can use them to monitor and analyse the security of a Windows Server deployment. You will also learn about Microsoft Azure Security Center, which allows you to manage and monitor the security configuration of workloads both on-premises and in the cloud.

Lessons

  • Deploying and configuring ATA
  • Deploying and configuring Microsoft Operations Management Suite
  • Deploying and configuring Azure Security Center

Lab : Deploying ATA, Microsoft Operations Management Suite, and Azure Security Center

  • Preparing and deploying ATA
  • Preparing and deploying Microsoft Operations Management Suite
  • Deploying and configuring Azure Security Center

After completing this module, students will be able to:

  • Deploy and configure ATA.
  • Deploy and configure Microsoft Operations Management Suite.
  • Deploy and configure Azure Security Center.
Secure Virtualization Infrastructure

Secure Virtualization Infrastructure

This module explains how to configure Guarded Fabric VMs, including the requirements for shielded and encryption-supported VMs.

Lessons

  • Guarded fabric
  • Shielded and encryption-supported virtual machines

Lab : Guarded fabric with Admin-trusted attestation and shielded VMs

  • Deploying a guarded fabric with admin-trusted attestation
  • Deploying a shielded VM

After completing this module, students will be able to:

  • Configure the guarded fabric.
  • Describe shielded and encryption-supported VMs.
Securing application development and server-workload infrastructure

Securing application development and server-workload infrastructure

This module describes the SCT, which is a free, downloadable set of tools that you can use to create and apply security settings. You will also learn about improving platform security by reducing the size and scope of application and compute resources by containerizing workloads.

Lessons

  • Using SCT
  • Understanding containers

Lab : Using SCT

  • Configuring a security baseline for Windows Server 2016
  • Deploying the security baseline for Windows Server 2016

Lab : Deploying and configuring containers

  • Deploying and managing a Windows container

After completing this module, students will be able to:

  • Install SCT, and create and deploy security baselines.
  • Configure Windows and Hyper-V containers in Windows Server 2016.
Planning and protecting data

Planning and protecting data

This module explains how to configure Encrypting File System (EFS) and BitLocker drive encryption to protect data at rest. You will also learn about extending protection into the cloud by using Azure Information Protection.

Lessons

  • Planning and implementing encryption
  • Planning and implementing BitLocker
  • Protecting data by using Azure Information Protection

Lab : Protecting data by using encryption and BitLocker

  • Encrypting and recovering access to encrypted files
  • Using BitLocker to protect data

After completing this module, students will be able to:

  • Plan and implement encryption.
  • Plan and implement BitLocker.
  • Plan and implement Azure Information Protection.
Optimizing and securing file services

Optimizing and securing file services

This module explains how to optimize file services by configuring File Server Resource Manager (FSRM) and Distributed File System (DFS). Students also will learn how to manage access to shared files by configuring Dynamic Access Control (DAC).

Lessons

  • File Server Resource Manager
  • Implementing classification and file management tasks
  • Dynamic Access Control

Lab : Quotas and file screening

  • Configuring File Server Resource Manager quotas
  • Configuring file screening and storage reports

Lab : Implementing Dynamic Access Control

  • Preparing for implementing Dynamic Access Control
  • Implementing Dynamic Access Control
  • Validating and remediating Dynamic Access Control

After completing this module, students will be able to:

  • Describe File Server Resource Manager.
  • Implement classification and file management tasks.
  • Implement Dynamic Access Control.
Securing network traffic with firewalls and encryption

Securing network traffic with firewalls and encryption

This module explains how you can use Windows Firewall as an important part of an organization’s protection strategy. It explains the use of Internet Protocol security (IPsec) to encrypt network traffic and to establish security zones on your network. You will also learn about the Datacenter Firewall feature that you can use to help protect your on-premises virtual environments.

Lessons

  • Understanding network-related security threats
  • Understanding Windows Firewall with Advanced Security
  • Configuring IPsec
  • Datacenter Firewall

Lab : Configuring Windows Firewall with Advanced Security

  • Creating and testing inbound rules
  • Creating and testing outbound rules
  • Creating and testing connection security rules

After completing this module, students will be able to:

  • Describe network-related security threats and how to mitigate them.
  • Configure Windows Firewall with Advanced Security.
  • Configure IPsec.
  • Describe Datacenter Firewall.
Securing network traffic

Securing network traffic

 

This module explores some of the Windows Server 2016 technologies that you can use to help mitigate network-security threats. It explains how you can configure DNSSEC to help protect network traffic, and use Microsoft Message Analyzer to monitor network traffic. The module also describes how to secure Server Message Block (SMB) traffic.

Lessons

  • Configuring advanced DNS settings
  • Examining network traffic with Message Analyzer
  • Securing and analyzing SMB traffic

Lab : Securing DNS

  • Configuring and testing DNSSEC
  • Configuring DNS policies and RRL

Lab : Microsoft Message Analyzer and SMB encryption

  • Installing and using the Message Analyzer
  • Configuring and verifying SMB encryption on SMB shares

After completing this module, students will be able to:

  • Configure advanced DNS settings.
  • Use the Message Analyzer.
  • Secure SMB traffic.

 

Certification Camps has developed a comprehensive training / delivery format which focuses on learning beyond the core content accessible to any Microsoft training provider. Our program incorporates interactive demonstrations with explanations which go beyond the content of the book. Additional content, videos, labs & demonstrations are provided to expand on advanced topics - providing additional insight and perspective.  Certification Camps training is NOT your typical book & PowerPoint presentation found at any local training center.

As a Microsoft Certified Partner with Gold Learning Competency - we adhere to the strict guidelines, standards and requirements to use Microsoft's exclusive curriculum. More over - our standards go beyond the "minimum requirements" set forth by Microsoft Learning.

We leverage our partnership benefits of courseware customization to build end to end technology training solutions. Students gain practical skills which can be implemented immediately.

At most training centers - learning starts on the first day of class and ends on the last day. Our boot camp training program is designed to offer resources before, during and after.

During Camp - While attending camp - you will work hands on with an industry leading "real world experienced" Microsoft Certified Trainer.

 

CERTIFICATION CAMPS CAMPUS

CAMPUS - Certification Camps invested $150,000 into a complete training center construction build out. Larger classrooms, no sound transference between training rooms, new desk / executive leather chairs & great common areas.

CLASSROOM SERVERS - Students work on a dedicated Dell 8500 / 8700 with an Intel i7 (4th generation), minimum of 16GB memory (Most with 32 GB) and most with 512GB SSD drives.

CAMPUS INTERNET - The campus is connected with a 300Mbs Verizon Fios Business Connection which provides complete internet (including VPN) access for students.

COMMON AREA - Unlike any training facility ever - break room with Mame Arcade, high end "kitchen" with snacks, drinks (Starbucks Coffee, 100% juices, sodas, etc) and breathtaking terrace.

LODGING - We use the Marriott Fairfield Inn & Suites Lakewood Ranch. This "upgraded" hotel offers extremely comfortable beds, great breakfast and very fast (Verizon) internet access.

NEAR BY AMENITIES - Many shops, restaurants and grocery options are available within walking distance. Additionally - the hotel provided scheduled shuttle services. Restaurants like Bone Fish Grill, Ruby Tuesday's, Five Guys, Chipotle, Quiznos, Chili's and over 20 additional choices in the immediate area. All of these options are offered in a pedestrian walking village.

CERTIFICATION CAMPS DIFFERENCE

Certification Camps provides an in-depth hands on learning environment. Our instructors teach using demonstrations and explain concepts beyond the scope of the courseware. The best instructors are contracted from all across the US.  These professionals are real world consultants who actually implement these technologies. Certification Camps knows our clients work in the "real world" and it only makes sense to have an instructor with the experience in the real world.

Facilities - Many of our competitors over-crowd classrooms by placing 2 to 3 students per desk and 20+ students per instructor. Often these companies "extend" the life of very old equipment with slow performance on the software used today. Our average class size is 8 students. Our facilities have the best equipment with the most comfortable, focused environment for learning.

Instructors - Our CEO, Chester Flake holds one of the rarest Microsoft Certifications - the Microsoft Certified Learning Consultant (MCLC) Certification.  This certification reflects a commitment to make sure our instructors are also actively engaged in real world consulting projects. Students expect a professional who can answer questions and demonstrate the technology.

Face to Face Training - We believe the best way to interact and learn is face to face training.  Many of our competitors which offer local training are simply providing students with headphones/mic to attend class with an instructor at a remote location.

Test Pass - We offer a free retake voucher (if needed) for each of the exams required for certification. Any training center offering a "100% pass guarantee" would have to use unethical practices or unlimited test vouchers (which is not likely or practical).

Distractions - Students often look for a "local" training center so they can be close to home and work. Boot camp requires a tremendous time commitment during the program.  Long class hours combined with self study each evening. The goal of boot camp is to achieve certification in a fraction of the time. We strongly recommend students attend camp away from home and work in a focused, distraction free environment.

Boot Camp - Boot camp is an accelerated training focused on teaching technology and testing students on the official exams. Most training providers "added" boot camps to the existing standard training classes they offer.  These training centers think a boot camp is just a regular class where you send the student home with a voucher on the last day.  Certification Camps  administers exams throughout the camp. Equally important - not every trainer can teach a boot camp and not all courseware is designed for boot camp format.  Our trainers know the boot camp format and our courseware is designed for accelerated learning.

Florida - Certification Camps has one of the most scenic locations boasting some of the best weather in US. We believe students should have a comfortable and inviting atmosphere while attending these otherwise intense programs. We place our location, facilities and amenities up against that any competitor.

Popular Bootcamps
Azure Administrator
Microsoft 365 Enterprise Administrator
Windows Server Hybrid Administrator
Azure Solutions Architect
Architecting on AWS Accelerator

About

  • About Us
  • Reviews
  • Contact Us
  • Blog

Bootcamps

  • SQL Server
  • Microsoft 365 Enterprise
  • Windows Server
  • Microsoft Azure Admin
  • Windows Client
  • Exchange Server
  • System Center
  • Microsoft Developer
  • Information Security
  • CompTia
  • Cisco

Vendors

  • Microsoft
  • Amazon
  • Cisco
  • CompTia
  • Ec-Council

Job Role

  • Developer
  • Administrator
  • Architect
  • Data Engineer
  • DevOps
  • Security

Registration

  • More Info
  • Register for a Bootcamp
  • Pay Invoice

Copyright © 2023 Certification Camps. All rights reserved.

  • Terms & Conditions
  • Privacy Policy