Esteban L. Denon
Information related to: Microsoft - Cisco - Ubiquiti - MikroTik - TP-Link - Linux - Networking - IT - RedHat - Support
Chromium Blog: Bookmarks Here, Bookmarks There, Bookmarks Everywh...
Move Outlook calendar
click on Edit->Select all ->Cut
click on Edit -> paste
CCIE Security 2.X Verification Commands “Cheat Sheet”
PIX/ASA 7.2
AAA
debug tacacs
show aaa-server protocol PROTOCOL_NAME
test aaa-server
Access Control Lists
show run | include ACCESS_LIST_NAME
show run object-group
show run time-range
Application Inspection
show service-policy
Configuring Interfaces
show int
show int ip brief
show ip
show mode
show nameif
show run interface INTERFACE_NAME
show version
Connections and Translations
show conn
show conn detail
show local-host all
clear local-host all (clears all connections)
show log
show run | begin policy-map
show run global
show run nat
show xlate
test regex
Failover
debug fo txip
show failover
show ip
IP Routing
debug rip
show ospf database
show ospf interface
show ospf neighbor
show ospf PROCESS_ID
show ospf virtual-links
show route
Multicast
show mroute
show pim interface
show pim neighbor
PKI
debug crypto ca transactions
show crypto ca certificates
show crypto ca crls
show crypto key mypubkey rsa
Quality of Service
show run class-map
show run policy-map
show service-policy global
show service-policy interface INTERFACE_NAME
show service-policy priority
show service-policy shape
Security Contexts
show context
show mode
System Management
show crypto key mypubkey rsa
show logging
show ntp status
show running-config
show snmp-server statistics
show ssh sessions
show startup-config
Transparent Firewall
debug l2-indication
debug mac-address-table
show access-list
show arp-inspection
show conn
show firewall
show mac-address-table
VPNs
debug crypto isakmp
show crypto ipsec sa
show crypto isakmp sa detail
show route
WebVPN
debug ssl cipher
show vpn-sessiondb summary
show vpn-sessiondb webvpn
Example TACACS+ CCNA Security
IP packet debugging is on (detailed) for access list 101
R0#debug aaa authent
R0#debug aaa authentication
AAA Authentication debugging is on
R0#
R0#
R0#
R0#
*Mar 1 01:55:28.799: AAA/BIND(00000007): Bind i/f
*Mar 1 01:55:28.803: AAA/AUTHEN/LOGIN (00000007): Pick method list 'default'
*Mar 1 01:55:28.819: IP: tableid=0, s=192.168.115.254 (local), d=192.168.115.100 (FastEthernet0/0), routed via FIB
*Mar 1 01:55:28.819: IP: s=192.168.115.254 (local), d=192.168.115.100 (FastEthernet0/0), len 44, sending
*Mar 1 01:55:28.819: TCP src=44579, dst=49, seq=1941678704, ack=0, win=4128 SYN
*Mar 1 01:55:30.823: IP: tableid=0, s=192.168.115.254 (local), d=192.168.115.100 (FastEthernet0/0), routed via FIB
*Mar 1 01:55:30.823: IP: s=192.168.115.254 (local), d=192.168.115.100 (FastEthernet0/0), len 44, sending
*Mar 1 01:55:30.827: TCP src=44579, dst=49, seq=1941678704, ack=0, win=4128 SYN
*Mar 1 01:55:31.627: IP: tableid=0, s=192.168.115.254 (local), d=192.168.115.100 (FastEthernet0/0), routed via FIB
*Mar 1 01:55:31.627: IP: s=192.168.115.254 (local), d=192.168.115.100 (FastEthernet0/0), len 40, sending
*Mar 1 01:55:31.631: TCP src=44579, dst=49, seq=1941678705, ack=1103661260, win=4128 ACK
*Mar 1 01:55:31.635: IP: tableid=0, s=192.168.115.254 (local), d=192.168.115.100 (FastEthernet0/0), routed via FIB
*Mar 1 01:55:31.639: IP: s=192.168.115.254 (local), d=192.168.115.100 (FastEthernet0/0), len 83, sending
*Mar 1 01:55:31.639: TCP src=44579, dst=49, seq=1941678705, ack=1103661260, win=4128 ACK
*Mar 1 01:55:31.847: IP: tableid=0, s=192.168.115.254 (local), d=192.168.115.100 (FastEthernet0/0), routed via FIB
*Mar 1 01:55:31.847: IP: s=192.168.115.254 (local), d=192.168.115.100 (FastEthernet0/0), len 40, sending
*Mar 1 01:55:31.851: TCP src=44579, dst=49, seq=1941678748, ack=1103661288, win=4100 ACK
*Mar 1 01:55:36.571: IP: tableid=0, s=192.168.115.254 (local), d=192.168.115.100 (FastEthernet0/0), routed via FIB
*Mar 1 01:55:36.575: IP: s=192.168.115.254 (local), d=192.168.115.100 (FastEthernet0/0), len 62, sending
*Mar 1 01:55:36.575: TCP src=44579, dst=49, seq=1941678748, ack=1103661288, win=4100 ACK
*Mar 1 01:55:37.051: IP: tableid=0, s=192.168.115.254 (local), d=192.168.115.100 (FastEthernet0/0), routed via FIB
*Mar 1 01:55:37.051: IP: s=192.168.115.254 (local), d=192.168.115.100 (FastEthernet0/0), len 40, sending
*Mar 1 01:55:37.051: TCP src=44579, dst=49, seq=1941678770, ack=1103661306, win=4082 ACK
CONFIG:
R0#sho run
Building configuration...
Current configuration : 1089 bytes
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname R0
!
boot-start-marker
boot-end-marker
!
enable secret 5 $1$FGPM$.ZJO8E/kwowrMca3fsrym0
!
aaa new-model
!
!
aaa authentication login default group tacacs+ local
aaa authentication login consoleport none
!
!
aaa session-id common
memory-size iomem 5
ip cef
!
!
!
!
ip domain name pekoe.local
!
multilink bundle-name authenticated
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
archive
log config
hidekeys
!
!
!
!
!
!
!
!
interface FastEthernet0/0
ip address 192.168.115.254 255.255.255.0
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
!
ip forward-protocol nd
!
!
ip http server
no ip http secure-server
!
access-list 101 permit ip host 192.168.115.254 host 192.168.115.100
!
!
!
!
!
tacacs-server host 192.168.115.100 single-connection
tacacs-server key cisco123
!
control-plane
!
!
!
!
!
!
!
!
!
!
line con 0
login authentication consoleport
line aux 0
line vty 0 4
transport input ssh
!
!
end
R0#
CCNA Security Commands
##########
### ROUTER COMMANDS ###
##########
##########
enable secret C1SCO
%
line con 0
password C1SCO
login
%
line aux 0
password C1SCO
login
%
line vty 0 4
login
password C1SCO
%
service password-encryption
%
username Bob secret 0 C1SCO
%
security authentication failure rate 5 log
%
line con 0
exec-timeout 2 30
%
line aux 0
exec-timeout 2 30
%
line vty 0 4
exec-timeout 2 30
%
privilege exec level 5 debug
enable secret level 5 C1SCO
%
aaa new-model
enable view
parser view HELPDESK
secret 0 C1SCO
command exec include all copy
commands exec include traceroute
commands exec include ping
%
secure boot-image
secure boot-config
%
login block-for 30 attempts 5 within 10
login quiet-mode access-class 101
login delay 3
login on-failure log
login on-success log
%
banner motd $
%
ip http server
ip http secure-server
ip http authentication local
username Bill privilege 15 secret 0 C1SCO
%
aaa authentication login default local
aaa authentication arap
aaa authentication banner
aaa authentication enable default
aaa authentication fail-message
aaa authentication local-override
aaa authentication login
aaa authentication nasi
aaa authentication password-prompt
aaa authentication ppp
aaa authentication username-prompt
%
line console 0
login authentication console-in
%
int s3/0
ppp authentication chap dial-in
%
aaa authorization commands 1 Bill local
aaa authorization commands 15 Bob local
%
aaa accounting commands 15 default stop-only group tacacs+
aaa accounting auth-proxy default start-stop group tacacs+
%
debug aaa authentication
debug aaa authorization
debug aaa accounting
%
tacacs-server host 192.168.10.75 single connection
tacacs-server key shared1
%
auto-secure
%
ip domain-name ciscopress.com
crypto key zeroise rsa
crypto key generate rsa general-keys modulus 1024
ip ssh time-out 120
ip ssh authentication-retries 4
ling vty 0 4
transport input ssh
%
show crypto key mypubkey rsa
%
access-list compiled
%
access-list 150 deny ip 12.1.1.0 0.0.0.255 any log
access-list 150 deny ip 127.0.0.0 0.255.255.255 any log
interface e0/1
ip access-group 150 in
%
access-list 114 permit icmp 12.2.1.0 0.0.0.255 any echo
access-list 114 permit icmp 12.2.1.0 0.0.0.255 any parameter-problem
access-list 114 permit icmp 12.2.1.0 0.0.0.255 any packet-too-big
access-list 114 permit icmp 12.2.1.0 0.0.0.255 any source-quech
access-list 114 deny icmp any any log
interface e0/1
ip access-group 114 out
%
access-list 90 permit host 12.2.1.3 log
access-list 90 deny any log
line vty 0 4
login authentication vty-sysadmin
transport input ssh
access-class 90 in
%
access-list 12 deny 12.2.2.0 0.0.0.255
access-list 12 permit any
router rip
distribute-list 12 out
version 2
no auto-summary
network 12.0.0.0
%
ip access-list 104 deny ip any any
ip access-list 103 permit http any any
ip inspect name FWRULE tcp
interface S0
ip access-group 103 out
ip access-group 104 in
ip inspect FWRULE out
%
crypto isakmp policy 1
authentication pre-share
hash sha
encryption aes 128
group 2
lifetime 86400
%
crypto isakmp key SECRET address 172.30.2.2
crypto ipsec transform-set MYSET esp-aes esp-sha
access-list 101 permit ip 10.1.1.0 0.0.0.255 192.168.0.0 0.0.0.255
crypto map ROUTER1_TO_ROUTER2 ipsec-isakmp
set peer 172.30.2.2
match address 101
set transform-set MYSET
%
interface serial 1/0
crypto map ROUTER1_TO_ROUTER2
ip route 192.168.0.0 255.255.255.0 172.30.2.2
%
##########
##########
### SWITCH COMMANDS ###
##########
##########
%
interface gigabitethernet 0/3
switchport mode access
%
interface gigabitethernet 0/4
switchport trunk encapsulation dot1q
switchport mode trunk
switch nonegotiate
%
interface gigabitethernet 0/5
switchport trunk native vlan 400
%
interface gigabitethernet 0/6
spanning-tree guard root
%
interface gigabitethernet 0/7
spanning-tree portfast bpduguard
%
ip dhcp snooping
%
interface gigabitethernet 0/8
ip dhcp snooping trust
%
ip arp inspection vlan 100
%
interface gigabitethernet 0/9
ip arp inspection trust
%
monitor session 1 source interface gigabitethernet0/10
monitor session 1 destination interface gigabitethernet0/11
%
access-list 100 permit tcp any host 10.1.1.2 eq telnet
vlan access-map ALLOWTELNET 10
match ip address 100
action forward
%
vlan filter ALLOWTELNET vlan-list 1-100
%
interface gigabitethernet 0/12
switchport mode access
switchport port-security
switchport port-security maximum 5
switchport port-security violation protect
switchport port-security mac-address 1234.1234.1234
switchport port-security mac-address sticky
%
show port-security
%
radius-server host 192.168.10.1
radius-server key RADIUS!123
%
CCIE Security 2.X Verification Commands “Cheat Sheet”
PIX/ASA 7.2
AAA
debug radiusdebug tacacs
show aaa-server protocol PROTOCOL_NAME
test aaa-server
Access Control Lists
show access-listshow run | include ACCESS_LIST_NAME
show run object-group
show run time-range
Application Inspection
show conn state STATE_TYPE detailshow service-policy
Configuring Interfaces
show firewallshow int
show int ip brief
show ip
show mode
show nameif
show run interface INTERFACE_NAME
show version
Connections and Translations
clear xlateshow conn
show conn detail
show local-host all
clear local-host all (clears all connections)
show log
show run | begin policy-map
show run global
show run nat
show xlate
test regex
Failover
debug fo rxipdebug fo txip
show failover
show ip
IP Routing
deug ospf eventdebug rip
show ospf database
show ospf interface
show ospf neighbor
show ospf PROCESS_ID
show ospf virtual-links
show route
Multicast
show igmp interfaceshow mroute
show pim interface
show pim neighbor
PKI
debug crypto ca messagesdebug crypto ca transactions
show crypto ca certificates
show crypto ca crls
show crypto key mypubkey rsa
Quality of Service
show priority-queue statisticsshow run class-map
show run policy-map
show service-policy global
show service-policy interface INTERFACE_NAME
show service-policy priority
show service-policy shape
Security Contexts
show admin-contextshow context
show mode
System Management
show clockshow crypto key mypubkey rsa
show logging
show ntp status
show running-config
show snmp-server statistics
show ssh sessions
show startup-config
Transparent Firewall
debug arp-inspectiondebug l2-indication
debug mac-address-table
show access-list
show arp-inspection
show conn
show firewall
show mac-address-table
VPNs
debug crypto ipsecdebug crypto isakmp
show crypto ipsec sa
show crypto isakmp sa detail
show route
WebVPN
debug menu wbvpndebug ssl cipher
show vpn-sessiondb summary
show vpn-sessiondb webvpn
Creating Site‐to‐Site VPNs with Pre‐Shared Keys @ Cisco Router
1. Document your IKE Phase 1 negotiation criteria (example below)
• Hashing: SHA‐1
• Authentication: pre‐shared
• Key exchange: Diffie‐Hellman Group 2
2. Document your IPSec (IKE Phase 2) negotiation criteria (example below)
• Encryption algorithm: esp‐aes 128
• Authentication: esp‐sha‐hmac
Configuring IKE Phase 1:
1. Enable ISAKMP
• Router(config)#crypto isakmp enable
2. Create ISAKMP Policy : Router(config)#crypto isakmp policy <1-10000>
• Router(config)#crypto isakmp policy 100
• Router(config-isakmp)#encryption aes 128
• Router(config-isakmp)#authentication pre-share
• Router(config-isakmp)#group 2
• Router(config-isakmp)#hash sha
• Router(config-isakmp)#exit
3. Configure ISAKMP Identity: Router(config)#crypto isakmp identity <address/hostname>
• Router(config)#crypto isakmp identity address
4. Configure ISAKMP Key: Router(config)#crypto isakmp key 0 <Pre-Shared-Key> address <remote IP address>
• Router(config)#crypto isakmp key 0 SUPERSECRETKEY address 1.1.1.2
Configuring IKE Phase 2:
1. Create transform sets: Router(config)#crypto ipsec transform-set <name> <methods>
• Router(config)#crypto ipsec transform-set SET-NAME esp-aes128 esp-sha-hmac
• Router(cfg-crypto-trans)#mode tunnel
• Router(cfg-crypto-trans)#exit
2. (optional) Configure IPSec lifetime : Router(config)#crypto ipsec securityassociation lifetime <seconds/kilobytes> <value>
• Router(config)#crypto ipsec security-association lifetime seconds 86400
3. Create mirrored ACLs defining traffic to be encrypted and the traffic expected to be received encrypted. Router(config)#ip access-list extended <name>,
Router(config)#permit ip <source network | wildcard> <destination network | wildcard>
• Router(config)#ip access-list extended S2S-VPN-TRAFFIC
• Router(config-ext-nacl)#permit ip 172.30.2.0 0.0.0.255 192.168.1.0 0.0.0.255
• Router(config-ext-nacl)#exit
4. Set up IPSec crypto‐map : Router(config)#crypto map <name> <seq> ipseciskmp
• Router(config)#crypto map S2S-VPN 100 ipsec-isakmp
o Router(config-crypto-map)#match address S2S-VPNTRAFFIC
o Router(config-crypto-map)#set peer 1.1.1.2 <remote IP>
o Router(config-crypto-map)#set pfs group2 <group1/2/5optional>
o Router(config-crypto-map)#set transform-set SET-NAME<set>
Apply to Interface:
1. Apply crypto‐map to interface
• Router(config)#int fa4
• Router(config-int)#crypto map S2S-VPN
Create Interesting Traffic:
1. Ping from source network to destination network.
Verify:
2. Show and debug commands (QM_IDLE is good)
• Router#show crypto isakmp sa
• Router#show crypto ipsec sa
• Router#debug crypto isakmp
• Router#debug crypto ipsec
• Router#show crypto map
• Router#show crypto isakmp policy
• Router#show crypto ipsec transform-set
• Router#clear crypto sa
Summary of telnet commands
To ... Do this ...
Connect to a remote system telnet> open remote_system_name Suspend a telnet connection Ctrl ] and return to the telnet prompt Close a connection to a Ctrl ] remote system telnet> close**Suspend telnet and work on telnet> z the local system **Resume the use of telnet prompt% fg telnet> End the telnet session telnet> quit To display a list of telnet telnet> ? commands To get an explanation of a telnet> help name_of_command command
** These commands only work if you are using the C shell, Korn shell, TC shell or BASH shell.
Invitation to Grooveshark
|
642-617 Deploying Cisco ASA Firewall Solutions Exam Topics (Blueprint)
The 642-617 Deploying Cisco ASA Firewall Solutions (FIREWALL v1.0) exam is associated with the CCSP, CCNP Security and Cisco Firewall Specialist certifications. This exam tests a candidate's knowledge and skills needed to implement and maintain Cisco ASA-based perimeter solutions. Successful graduates will be able to reduce risk to the IT infrastructure and applications using Cisco ASA features, and provide detailed operations support for the Cisco ASA. Candidates can prepare for this exam by taking the Deploying Cisco ASA Firewall Solutions course.
Exam Topics
The following information provides general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes the guidelines below may change at any time without notice.
Pre-Production Design
Choose ASA Perimeter Security technologies/features to implement HLD based on given security requirements
Choose the correct ASA model to implement HLD based on given performance requirements
Create and test initial ASA appliance configurations using CLI
Determine which ASA licenses will be required based on given requirements
Complex Operations Support
Optimize ASA Perimeter Security features performance, functions, and configurations
Create complex ASA security perimeter policies such as ACLs, NAT/PAT, L3/L4/L7 stateful inspections, QoS policies, cut-thru proxy, threat detection, botnet detection/filter using CLI and/or ASDM
Perform initial setup on the AIP-SSM and CSC-SSM using CLI and/or ASDM
Configure, verify and troubleshoot High Availability ASAs (A/S and A/A FO) operations using CLI and/or ASDM
Configure, verify and troubleshoot static routing and dynamic routing protocols on the ASA using CLI and/or ASDM
Configure, verify and troubleshoot ASA transparent firewall operations using CLI
Configure, verify and troubleshoot management access/protocols on the ASA using CLI and/or ASDM
Describe Advanced Troubleshooting
Advanced ASA security perimeter configuraiton/software/hardware troubleshooting using CLI and/or ASD fault finding and repairing
Certificaciones de Microsoft
Estos grupos, según el site de certificaciones oficial, son:
Microsoft Office
Server and Windows Technologies
Developer tools and applications
Windows client
Microsoft Dynamics
Security and other solutions
De las certificaciones que nos ocuparemos en este post es de las dos más comunes que se desprenden del grupo Server and Windows Technologies:
MCITP (Microsoft Certified IT Professional): Server Administrator (antes llamada MCSA: Microsoft Certified Systems Administrator)
MCITP (Microsoft Certified IT Professional): Enterprise Administrator (antes llamada MCSE: Microsoft Certified Systems Engineer)
Cabe aclarar, que desde hace algún tiempo, cada examen nos otorga una certificación como especialista en la tecnología específica que rendimos, éstas certificaciones se llaman Microsoft Certified Technology Specialist (MCTS).
Podemos consultar todas las certificaciones MCTS acá.
Ahora bien, en lo que uno generalmente se confunde es en los números y nombres de los cursos, exámenes, certificaciones y libros. Veamos:
Uno puede certificarse sin hacer ningún curso. Para esto, debe registrarse en www.prometric.com y sacar un turno en alguno de los Centros Autorizados que Prometric nos indica en nuestra zona.
Hasta acá todo bárbaro, ahora aclaremos qué exámenes son necesarios para obtener las dos certificaciones enumeradas arriba (MCITP: SA y MCITP: EA).
--------------------------------------------------------------------------------
Para MCITP: SA:
Examen 70-640 (Windows Server 2008 Active Directory, Configuring)
Examen 70-642 (Windows Server 2008 Network Infrastructure, Configuring)
Examen 70-646 (Windows Server 2008, Server Administrator)
--------------------------------------------------------------------------------
Para MCITP: EA:
Examen 70-640 (Windows Server 2008 Active Directory, Configuring)
Examen 70-642 (Windows Server 2008 Network Infrastructure, Configuring)
Examen 70-643 (Windows Server 2008 Applications Infrastructure, Configuring)
Examen 70-647 (Windows Server 2008, Enterprise Administrator)
más sólo uno de los siguientes:
Examen 70-620 (Configuring Microsoft Windows Vista Client)
Examen 70-680 (Windows 7, Configuring)
Examen 70-681 (Windows 7 and Office 2010, Deploying)
--------------------------------------------------------------------------------
Ahora que ya entendimos qué exámenes tenemos que rendir para obtener las certificaciones profesionales, expliquemos qué son las MCTS (Microsoft Certified Technology Specialist).
Como comentamos más arriba, estas certificaciones las obtenemos con cada examen que rendimos (no con todos, solo los que Microsoft indica como TS).
Veamos qué certificaciones obtenemos con cada uno de los exámenes necesarios para las dos carreras que estamos viendo:
--------------------------------------------------------------------------------
Para MCITP: SA:
Examen Certificación obtenida
70-640 MCTS: Windows Server 2008 Active Directory, Configuration
70-642 MCTS: Windows Server 2008 Network Infrastructure, Configuring
70-646 Ninguna.
--------------------------------------------------------------------------------
Para MCITP: EA:
Examen Certificación obtenida
70-640 MCTS: Windows Server 2008 Active Directory, Configuration
70-642 MCTS: Windows Server 2008 Network Infrastructure, Configuring
70-643 MCTS: Windows Server 2008 Applications Infrastructure, Configuring
70-647 Ninguna.
70-620 MCTS: Configuring Microsoft Windows Vista Client
70-680 MCTS: Windows 7, Configuring
70-681 MCTS: Windows 7 and Office 2010, Deploying
--------------------------------------------------------------------------------
Es decir, que si rendimos los exámenes necesarios para convertirnos en MCITP: Server Administrator, obtenemos 3 certificaciones:
MCTS: Windows Server 2008 Active Directory, Configuration
MCTS: Windows Server 2008 Network Infrastructure, Configuring
MCITP: SA
y para MCITP: Enterprise Administrator obtenemos 5 certificaciones:
MCTS: Windows Server 2008 Active Directory, Configuration
MCTS: Windows Server 2008 Network Infrastructure, Configuring
MCTS: Windows Server 2008 Applications Infrastructure, Configuring
MCITP: EA
Una de éstas:
MCTS: Configuring Microsoft Windows Vista Client
MCTS: Windows 7, Configuring
MCTS: Windows 7 and Office 2010, Deploying
--------------------------------------------------------------------------------
Bien, sigamos. Vamos ahora con los cursos. Éstos se denominan Microsoft Official Course (MOC).
Generalmente uno se inclina a realizar los cursos para luego rendir los exámenes y obtener las ansiadas certificaciones y se encuentra con que los cursos sirven para varias certificaciones, que un examen abarca el temario de más de un curso y que los cursos también tienen nomenclatura numerada!
Para esto, vamos a ver también claramente qué cursos comprenden cada examen (y por transitividad, cuáles para cada certificación).
--------------------------------------------------------------------------------
Para MCITP: SA:
Examen Cursos que contiene
70-640 MOC 6425 - Configuring and Troubleshooting Windows Server® 2008 Active Directory Domain Services.
MOC 6426 - Configuring and Troubleshooting Identity and Access Solutions with Windows Server 2008 Active Directory
70-642 MOC 6420 - Fundamentals of Windows Server 2008 Network Infrastructure and Application Platform
MOC 6421 - Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure
70-646 MOC 6430 - Planning and Administering Windows Server 2008 Servers
--------------------------------------------------------------------------------
Para MCITP: EA:
Examen Cursos que contiene
70-640 MOC 6425 - Configuring and Troubleshooting Windows Server® 2008 Active Directory Domain Services.
MOC 6426 - Configuring and Troubleshooting Identity and Access Solutions with Windows Server 2008 Active Directory
70-642 MOC 6420 - Fundamentals of Windows Server 2008 Network Infrastructure and Application Platform
MOC 6421 - Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure
70-643 MOC 6428 - Configuring and Troubleshooting Windows Server 2008 Terminal Services
MOC 6418 - Deploying Windows Server 2008
MOC 6427 - Configuring and Troubleshooting Internet Information Services in Windows Server 2008
70-647 MOC 6437 - Designing a Windows Server 2008 Applications Infrastructure
MOC 6435 - Designing a Windows Server 2008 Network Infrastructure
MOC 6436 - Designing a Windows Server 2008 Active Directory Infrastructure and Services
70-620 MOC 5115 - Installing and Configuring the windows vista operating system
70-680 MOC 6292 - Installing and Configuring Windows 7 Client
70-681 No hay cursos por el momento
--------------------------------------------------------------------------------
Algo que también pueden notar en la numeración de los cursos es que terminan con diferentes letras, éstas indican el “ciclo de vida” de los cursos, es decir que el MOC 6420AK tiene material más nuevo y corregido que el MOC 6420A.
Espero que este post sirva para dar un poco de luz a algo que en principio nos espanta con tantos números y caminos posibles.