MCITP [Microsoft Certified IT Professional]

Duration: 3 Months

The Microsoft Certified IT Professional (MCITP) certification helps validate that an individual has the comprehensive set of skills necessary to perform a particular job role, such as database administrator or enterprise messaging administrator. MCITP certifications build on the technical proficiency measured in the Microsoft Certified Technology Specialist (MCTS) certifications. Therefore, you will earn one or more MCTS certifications on your way to earning an MCITP certification.




MCITP is based on Windows 2008 Server & Windows 7

Part 1: Enterprise Desktop Administrator on Windows 7


Chapter 1: Installing, Upgrading, and Migrating to Windows 7
Chapter 2: Deploying Windows 7
Chapter 3: Configuring Hardware and Applications
Chapter 4: Configuring Network Connectivity 
Chapter 5: Configuring Access to Resources 
Chapter 6: Configuring Mobile Computing 
Chapter 7: Monitoring and Maintaining Systems that Run Windows 7
Chapter 8: Configuring Backup and Recovery Options


Part 2: Windows Server 2008 Application Server Infrastructure, Configuring


Chapter 1: Hyper-V
Chapter 2: Managing Remote Desktop Services
Chapter 3: Implementing Remote Apps
Chapter 4: Configuring Windows Media Services
Chapter 5: Configuring Windows Deployment Services (WDS) 
Chapter 6: Planning and Configuring File Server
Chapter 7: Distributed File System Management (DFS) 
Chapter 8: Managing Server 2008 Storage
Chapter 9: Managing Disk Quota Drive Map
Chapter 10: Implementing Shadows Copies
Chapter 11: Managing Offline Files, Sync Center


Part 3: Windows Server 2008 Network Infrastructure Configuration


Chapter 1: Installing and Configuring Domain Name System (DNS)
Chapter 2: Installing and Configuring Dynamic Host Configuration Protocol (DHCP)
Chapter 3: Configuring Dynamic Host Configuration Protocol Media Access Control Filtering
Chapter 4: Configuring Network Access Protection
Chapter 5:  Setting Up Routing and Remote Access Services
Chapter 6: Implementing Virtual Private Network (VPN)
Chapter 7: Managing Sharing and Securing Resources
Chapter 8: Managing Print Services
Chapter 9: Planning Backup and Recovery
Chapter 10: Managing Windows Firewall with Advanced Security
Chapter 11: Managing Windows Update Services (Wsus)
Chapter 12: Setting Up Internet Protocol Security (IPSec)


Part 4: Active Directory Administration


Chapter 1: Configuring Active Directory Domain Services Features
Chapter 2: Creating and Managing active directory Objects
Chapter 3: Configuring Group Policy Objects
Chapter 4: Configuring Group Policy based on the Custom Starter GPO
Chapter 5: Configuring Group Policy Backup and Recovery
Chapter 6: Implementing Resultant Set of Policies
Chapter 7: Maintaining and recovering Active Directory
Chapter 8: Active Directory Domain Services including additional Domain Controllers
Chapter 9: Configuring Operations Masters or FSMO Roles
Chapter 10: Designing Solutions for Additional Domain Controllers Disaster
Chapter 11: Designing Solutions for Active Directory Branch Office
Chapter 12: Active Directory Domain Services including read-only Domain Controllers
Chapter 13: Active Directory Domain and Forest Functional Levels
Chapter 14: Configuring Active Directory Services Interface (adsiedit)
Chapter 15: Implement fine-ingrained password policies
Chapter 16: Active Recycle Bin feature in windows server 2008 R2
Chapter 17: Enable Active directory recycle bin feature
Chapter 18: Configuring Active Directory Recycle Bin
Chapter 19: Restore the deleted Active Directory objects.
Chapter 20: Configuring Active Directory Sites and Replication


Part 4: Windows Server 2008, Enterprise Administrator


Chapter 1: Designing Windows Server 2008 Infrastructure
Chapter 2: Designing Solutions for Data Sharing Data Security, and Business Continuity
Chapter 3: Designing Active Directory Administration and Group policy Strategy
Chapter 4: Designing Software Update Infrastructure and Managing Compliance
Chapter 5: Planning Remote Desktop Services
Chapter 6: Planning Active Directory Administrative Model
Chapter 7: Planning For Business Continuity and Backup
Chapter 8: Using Virtualization for Productivity