Microsoft Certified Solution Expert (MCSE)

Microsoft Certified Solution Expert (MCSE)

1800 Students taken this course
Paper Code :-

70-740 Installation, Storage, and Compute
70-741 Networking with Windows Server 2016
70-742 Identity with Windows Server 2016
70-744 Securing Windows Server 2016


2 Months









2 Months


1. Above fee is applicable in class / Group study.
2. Fee package will be Different for one on one session & International Students.

About this Course

What is MCSE Certification?

MCSE stands for Microsoft Certified Systems Engineer, which has been upgraded to Microsoft Certified Solutions Expert. This certification certifies your competence in administering and configuring computer systems running on Microsoft servers. However, Microsoft Certified Systems Engineer Certification is still accepted as a legacy credential. This credential must be renewed once every three years by passing a recertification exam. MCSE certification offers IT professionals the opportunity of working for consulting firms, computer companies, financial organizations and other businesses.


What are the Requirements for MCSE Certification?

To obtain MCSE certification, you are required to pass five exams which comprise of approximately 50 questions each. Your answers must show your ability to design, install, administer and troubleshoot a Microsoft-server-based computer and networking systems.

Why Choose Us

  • Online Training
  • One to One Training
  • Regular and Weekend Training

Modes of Trainings Available:

  • Online Training
  • Class Room Training
  • One to One Training
  • Regular and Weekend Training

Course Content

Installing, upgrading, and migrating servers and workloads
• Introducing Windows Server 2016
• Preparing and installing Server Core
• Preparing for upgrades and migrations
• Migrating server roles and workloads
• Windows Server activation models


Configuring local storage
• Managing disks in Windows Server
• Managing volumes in Windows Server


Implementing enterprise storage solutions
• Overview of DAS, NAS, and SANs
• Comparing Fiber Channel, iSCSI, and Fiber Channel over Ethernet
• Understanding iSNS, DCB, and MPIO
• Configuring sharing in Windows Server 2016


Implementing Storage Spaces and Data
• Implementing Storage Spaces
• Managing Storage Spaces
• Implementing Data Deduplication


Installing and configuring Hyper-V and virtual machines
• Overview of Hyper-V
• Installing Hyper-V
• Configuring storage on Hyper-V host servers
• Configuring networking on Hyper-V host servers
• Configuring Hyper-V virtual machines
• Managing virtual machines


Deploying and managing Windows and Hyper-V containers
• Overview of containers in Windows Server 2016
• Deploying Windows Server and Hyper-V containers
• Installing, configuring, and managing containers by using Docker


Overview of high availability and disaster recovery
• Defining levels of availability
• Planning high availability and disaster recovery solutions with Hyper-V virtual machines
• Backing up and restoring by using Windows Server Backup
• High availability with failover clustering in Windows Server 2016


Implementing failover clustering
• Planning a failover cluster
• Creating and configuring a new failover cluster
• Maintaining a failover cluster
• Troubleshooting a failover cluster
• Implementing site high availability with stretch clustering


Implementing failover clustering with Windows Server 2016 Hyper-V
• Overview of the integration of Hyper-V Server 2016 with failover clustering
• Implementing Hyper-V VMs on failover clusters
• Key features for VMs in a clustered environment


Implementing Network Load Balancing
• Overview of NLB
• Configuring an NLB cluster
• Planning an NLB implementation


Creating and managing deployment images
• Introduction to deployment images
• Creating and managing deployment images by using MDT
• Virtual machine environments for different workloads


Managing, monitoring, and maintaining virtual machine installations
• WSUS overview and deployment options
• Update management process with WSUS
• Overview of Windows PowerShell DSC
• Overview of Windows Server 2016 monitoring tools
• Using Performance Monitor
• Monitoring event logs

Planning and implementing an IPv4 network
• Planning IPv4 addressing
• Configuring an IPv4 host
• Managing and troubleshooting IPv4 network connectivity


Implementing DHCP
• Overview of the DHCP server role
• Deploying DHCP
• Managing and troubleshooting DHCP


Implementing IPv6
• Overview of IPv6 addressing
• Configuring an IPv6 host
• Implementing IPv6 and IPv4 coexistence
• Transitioning from IPv4 to IPv6


Implementing DNS
• Implementing DNS servers
• Configuring zones in DNS
• Configuring name resolution between DNS zones
• Configuring DNS integration with Active Directory Domain Services (AD DS)
• Configuring advanced DNS settings


Implementing and managing IPAM
• Overview of IPAM
• Deploying IPAM
• Managing IP address spaces by using IPAM


Remote access in Windows Server 2016

• Overview of remote access
• Implementing the Web Application Proxy


Implementing Direct Access
• Overview of Direct Access
• Implementing Direct Access by using the Getting Started Wizard
• Implementing and managing an advanced Direct Access infrastructure


Implementing VPNs
• Planning VPNs
• Implementing VPNs


Implementing networking for branch offices
• Networking features and considerations for branch offices
• Implementing Distributed File System (DFS) for branch offices
• Implementing BranchCache for branch offices


Configuring advanced networking features
• Overview of high performance networking features
• Configuring advanced Microsoft Hyper-V networking features

Installing and configuring domain controllers

• Overview of AD DS
• Overview of AD DS domain controllers
• Deploying a domain controller


Managing objects in AD DS
• Managing user accounts
• Managing groups in AD DS
• Managing computer objects in AD DS
• Using Windows PowerShell for AD DS administration
• Implementing and managing OUs


Advanced AD DS infrastructure management
• Overview of advanced AD DS deployments
• Deploying a distributed AD DS environment
• Configuring AD DS trusts


Implementing and administering AD DS sites and replication
• Overview of AD DS replication
• Configuring AD DS sites
• Configuring and monitoring AD DS replication


Implementing Group Policy
• Introducing Group Policy
• Implementing and administering GPOs
• Group Policy scope and Group Policy processing
• Troubleshooting the application of GPOs


Managing user settings with Group Policy
• Implementing administrative templates
• Configuring Folder Redirection, software installation, and scripts
• Configuring Group Policy preferences


Securing Active Directory Domain Services
• Securing domain controllers
• Implementing account security
• Implementing audit authentication
• Configuring managed service accounts


Deploying and managing AD CS
• Deploying CAs
• Administering CAs
• Troubleshooting and maintaining CAs


Deploying and managing certificates
• Deploying and managing certificate templates
• Managing certificate deployment, revocation, and recovery
• Using certificates in a business environment
• Implementing and managing smart cards


Implementing and administering AD FS
• Overview of AD FS
• AD FS requirements and planning
• Deploying and configuring AD FS
• Web Application Proxy Overview


Implementing and administering AD RMS
• Overview of AD RMS
• Deploying and managing an AD RMS infrastructure
• Configuring AD RMS content protection

Attacks, breach detection, and Sysinternals tools
• Understanding attacks
• Detecting security breaches
• Examining activity with the Sysinternals tools


Protecting credentials and privileged access
• Understanding user rights
• Computer and service accounts
• Protecting credentials
• Privileged Access Workstations and jump servers
• Local administrator password solution


Limiting administrator rights with Just Enough Administration
• Understanding JEA
• Verifying and deploying JEA


Privileged access management and administrative forests
• ESAE forests
• Overview of Microsoft Identity Manager
• Overview of JIT administration and PAM


Mitigating malware and threats
• Configuring and managing Windows Defender
• Restricting software
• Configuring and using the Device Guard feature


Analyzing activity with advanced auditing and log analytics
• Overview of auditing
• Advanced auditing
• Windows PowerShell auditing and logging


Deploying and configuring Advanced Threat Analytics and Microsoft Operations Management Suite
• Deploying and configuring ATA
• Deploying and configuring Microsoft Operations


Management Suite
• Deploying and configuring Azure Security Center


Secure Virtualization Infrastructure
• Guarded fabric
• Shielded and encryption-supported virtual machines


Securing application development and server work load infrastructure
• Using SCT
• Understanding containers


Planning and protecting data
• Planning and implementing encryption
• Planning and implementing BitLocker
• Protecting data by using Azure Information Protection


Optimizing and securing file services
• File Server Resource Manager
• Implementing classification and file management tasks
• Dynamic Access Control


Securing network traffic with firewalls and encryption
• Understanding network-related security threats
• Understanding Windows Firewall with Advanced Security
• Configuring IPsec
• Datacenter Firewall


Securing network traffic
• Configuring advanced DNS settings
• Examining network traffic with Message Analyzer
• Securing and analyzing SMB traffic

Reviews and Ratings

Top Reviews


Get 50% off before it's tool late


Registration Form