Kurslar
Qeydiyyat Kurs adı Tarix Qiymət Endirim Qiymət + Endirim Müddət
Windows 10 (MD-100) 2019-11-18 250 AZN 0 % 250 AZN 1 ay
Prepare for installation requirements
Install Windows 10
Configure devices and device drivers
Post-installation configuration
Implement Windows in an enterprise environment
Configure networking
Configure storage
Configure data access and usage
Implement Apps
Configure remote management
Configure updates
Monitor Windows
Configure system and data recovery
Configure authorization and authentication
Configure advanced management tools
System Administrasiyası 2019-11-18 250 AZN 0 % 250 AZN 6 ay

MICROSOFT WINDOWS TRAINING’S

Installing and Configuring Windows 10 (70-698)
Prepare for installation requirements
Install Windows 10
Configure devices and device drivers
Post-installation configuration
Implement Windows in an enterprise environment
Configure networking
Configure storage
Configure data access and usage
Implement Apps
Configure remote management
Configure updates
Monitor Windows
Configure system and data recovery
Configure authorization and authentication
Configure advanced management tools

Windows Server Installing and Configuring
Installing Windows Server  
Introduction to Windows PowerShell 
Installing Active Directory Domain Services 
User Account Management 
Group Account Management 
Computer Account Management 
Working with Organizational Units (OUs) 
Managing Active Directory Domain Services Using PowerShell 
Implementing IPv4 
Implementing IPv6 
Implementing DHCP 
Implementing DNS 
Implementing Local Storage 
Implementing File Services 
Implementing Print Services 
Introduction to Group Policy 
Implementing a Group Policy Infrastructure 
Working with Group Policy Exceptions 
Implementing Server Virtualization with Hyper-V 
Installing Server Core 
Deploying and Maintaining Server Images 
Implementing Patch Management 
Monitoring Windows Server
Configuring File and Disk Encryption 
Configuring File Server Resource Manager (FSRM) 
Configuring Distributed File System (DFS) 
Configuring Advanced Auditing 
Configuring and Troubleshooting DNS 
Maintaining Active Directory Domain Services 
Implementing Read-Only Domain Controllers 
Configuring Domain Controllers 
Implementing a Group Policy Infrastructure 
Configuring Group Policy Settings 
Configuring Account Policies 
Configuring Group Policy Preferences 
Managing Group Policy Objects 
Configuring VPNs and Routing 
Configuring DirectAccess 
Installing and Configuring a Network Policy Server 
Implementing Network Access Protection (NAP) 
New Features of DHCP 
Securing DNS with DNSSEC 
Basic Configuration of Network Load Balancing 
Customizing Network Load Balancing 
Storage Management and Cluster Shared Volumes 
Configuring Quorum 
Cluster Properties and Failover Settings 
Backup and Restore of Failover Clusters 
Cluster-Aware Updating 
Implementing Hyper-V Clustering 
Migrating Hyper-V Virtual Machines 
Managing Hyper-V with SCVMM 
Disaster Recovery Technologies 
Configuring Microsoft Online Backup Service 
Domain and Forest Functional Levels 
Trust Relationships and UPN Suffixes 
Configuring Replication – Sites and Subnets 
Site Link Bridging and Universal Group Caching 
Read-Only Domain Controller Configuration 
Deploying a Certificate Authority 
Templates and Deploying Certificates 
Validating Certificates 
Certificate Recovery 
Rights Management 
Deploying Rights Management 
Configuring Rights Policy Templates 
Exposing RMS Access to External Clients 
Understanding and Installing AD Federation Services 
Claims Providers and Relying Parties 
Claims Provider Trusts/Relying Party Trusts 
Business to Business Federation 

Microsoft Exchange Server
Installation 
User Management 
Configuring Outlook 
Setup Internet Gateway for Exchange 
SMTP Relay Server 
OWA 
Remote Access – POP3 
Information Store 
Public Folders 
Exchange Management 
Exchange Groups, Address list 
Security in Exchange 
Disaster Recovery 
Routing Groups and Connectors 

 
 
Linux Redhat RHCSA\RHCE 2019-11-27 250 AZN 0 % 250 AZN 6 ay

RHCSA

 

Understand and use essential tools

●Access a shell prompt and issue commands with correct syntax

●Use input-output redirection (>, >>, |, 2>, etc.)

●Use grep and regular expressions to analyze text

●Access remote systems using ssh

●Log in and switch users in multiuser targets

●Archive, compress, unpack, and uncompress files using tar, star, gzip, and bzip2

●Create and edit text files

●Create, delete, copy, and move files and directories

●Create hard and soft links

●List, set, and change standard ugo/rwx permissions

●Locate, read, and use system documentation including man, info, and files in /usr/share/doc

Note: Red Hat may use applications during the exam that are not included in Red Hat Enterprise Linux for the purpose of evaluating candidate's abilities to meet this objective.

Operate running systems

●Boot, reboot, and shut down a system normally

●Boot systems into different targets manually

●Interrupt the boot process in order to gain access to a system

●Identify CPU/memory intensive processes, adjust process priority with renice, and kill processes

●Locate and interpret system log files and journals

●Access a virtual machine's console

●Start and stop virtual machines

●Start, stop, and check the status of network services

●Securely transfer files between systems

Configure local storage

●List, create, delete partitions on MBR and GPT disks

●Create and remove physical volumes, assign physical volumes to volume groups, and create and delete logical volumes

●Configure systems to mount file systems at boot by Universally Unique ID (UUID) or label

●Add new partitions and logical volumes, and swap to a system non-destructively

Create and configure file systems

●Create, mount, unmount, and use vfat, ext4, and xfs file systems

●Mount and unmount CIFS and NFS network file systems

●Extend existing logical volumes

●Create and configure set-GID directories for collaboration

●Create and manage Access Control Lists (ACLs)

●Diagnose and correct file permission problems

Deploy, configure, and maintain systems

●Configure networking and hostname resolution statically or dynamically

●Schedule tasks using at and cron

●Start and stop services and configure services to start automatically at boot

●Configure systems to boot into a specific target automatically

●Install Red Hat Enterprise Linux automatically using Kickstart

●Configure a physical machine to host virtual guests

●Install Red Hat Enterprise Linux systems as virtual guests

●Configure systems to launch virtual machines at boot

●Configure network services to start automatically at boot

●Configure a system to use time services

●Install and update software packages from Red Hat Network, a remote repository, or from the local file system

●Update the kernel package appropriately to ensure a bootable system

●Modify the system bootloader

Manage users and groups

●Create, delete, and modify local user accounts

●Change passwords and adjust password aging for local user accounts

●Create, delete, and modify local groups and group memberships

●Configure a system to use an existing authentication service for user and group information

Manage security

●Configure firewall settings using firewall-config, firewall-cmd, or iptables

●Configure key-based authentication for SSH

●Set enforcing and permissive modes for SELinux

●List and identify SELinux file and process context

●Restore default file contexts

●Use boolean settings to modify system SELinux settings

●Diagnose and address routine SELinux policy violations

 

 

RHCE

 

System configuration and management

●Use network teaming or bonding to configure aggregated network links between two Red Hat Enterprise Linux systems

●Configure IPv6 addresses and perform basic IPv6 troubleshooting

●Route IP traffic and create static routes

●Use firewalld and associated mechanisms such as rich rules, zones and custom rules, to implement packet filtering and configure network address translation (NAT)

●Configure a system to authenticate using Kerberos

●Configure a system as either an iSCSI target or initiator that persistently mounts an iSCSI target

●Produce and deliver reports on system utilization (processor, memory, disk, and network)

●Use shell scripting to automate system maintenance tasks

Network services

Network services are an important subset of the exam objectives. RHCE candidates should be capable of meeting the following objectives for each of the network services listed below:

●Install the packages needed to provide the service

●Configure SELinux to support the service

●Use SELinux port labeling to allow services to use non-standard ports

●Configure the service to start when the system is booted

●Configure the service for basic operation

●Configure host-based and user-based security for the service

HTTP/HTTPS

           

●Configure a virtual host        

●Configure access restrictions on directories

●Deploy a basic CGI application

●Configure group-managed content

●Configure TLS security

                                                                                                                       

DNS

           

●Configure a caching-only name server

●Troubleshoot DNS client issues

NFS

           

●Provide network shares to specific clients

●Provide network shares suitable for group collaboration

●Use Kerberos to control access to NFS network shares

SMB

           

●Provide network shares to specific clients

●Provide network shares suitable for group collaboration

SMTP

           

●Configure a system to forward all email to a central mail server

SSH

           

●Configure key-based authentication

●Configure additional options described in documentation

NTP

           

●Synchronize time using other NTP peers

Database services

           

●Install and configure MariaDB

●Backup and restore a database

●Create a simple database schema

●Perform simple SQL queries against a database

 

BASH SCRIPTING
Bash Files - .bash_profile .bashrc
Displaying Environment Variables in a Script
Using Variables on the Command Line
Setting and Using Variables in Scripts
Comment Types and Structure
Exit Status
Arithmetic Operations
Global and Local Environment Variables
Special Characters - Quotes and Escapes
Exercise: Using Arrays
If/Then/Else
For Loop
Case Statement
While Loop
Until Loop
Cisco CCNA 2019-11-28 250 AZN 0 % 250 AZN 3 ay
CISCO-CCNA Routing and Switching 

Part I: Networking Fundamentals 
• The TCP/IP and OSI Networking Models 
• Fundamentals of Ethernet LANs
• Fundamentals of WANs
• Fundamentals of IPv4 Addressing and Routing 
• Fundamentals of TCP/IP Transport and Applications 
Part II: Ethernet LANs and Switches 
• Building Ethernet LANs with Switches 
• Installing and Operating Cisco LAN Switches 
• Configuring Ethernet Switching 
• Implementing Ethernet Virtual LANs 
• Troubleshooting Ethernet LANs 
Part III: IP Version 4 Addressing and Subnetting 
• Perspectives on IPv4 Subnetting 
• Analyzing Classful IPv4 Networks 
• Analyzing Subnet Masks 
• Analyzing Existing Subnets 
Part IV: Implementing IP Version 4 
• Operating Cisco Routers 
• Configuring IPv4 Addresses and Routes 
• Learning IPv4 Routes with OSPFv2 
• Configuring and Verifying Host Connectivity 
Part V: Advanced IPv4 Addressing Concepts 
• Subnet Design 
• Variable-Length Subnet Masks 
• Part VI: IPv4 Services 
• Basic IPv4 Access Control Lists
• Advanced IPv4 ACLs and Device Security 
• Network Address Translation
Part VII: IP Version 6 
• Fundamentals of IP Version 6 
• IPv6 Addressing and Subnetting 
• Implementing IPv6 Addressing on Routers 
• Implementing IPv6 Addressing on Hosts 
• Implementing IPv6 Routing 
Part I: LAN Switching 
• Spanning Tree Protocol Concepts
• Spanning Tree Protocol Implementation 
• Troubleshooting LAN Switching 
Part II: IP Version 4 Routing 
• Troubleshooting IPv4 Routing
• Creating Redundant First-Hop Routers
• Virtual Private Networks 
Part III: IP Version 4 Routing Protocols 
• Implementing OSPF for IPv4 
• Understanding EIGRP Concepts 
• Implementing EIGRP for IPv4 
• Troubleshooting IPv4 Routing Protocols
Part IV: Wide-Area Networks 
• Implementing Point-to-Point WANs 
• Understanding Frame Relay Concepts 
• Implementing Frame Relay 
• Identifying Other Types of WANs 
Part V: IP Version 
• Troubleshooting IPv6 Routing 
• Implementing OSPF for IPv6 
• Implementing EIGRP for IPv6 
Part VI: Network Management 555
• Managing Network Devices 
• Managing IOS Files 
• Managing IOS Licensing 

• Final Preparation 
Microsoft Exchange Server 2020-02-11 250 AZN 0 % 250 AZN 1 ay
Installation 
User Management 
Configuring Outlook 
Setup Internet Gateway for Exchange 
SMTP Relay Server 
OWA 
Remote Access – POP3 
Information Store 
Public Folders 
Exchange Management 
Exchange Groups, Address list 
Security in Exchange 
Disaster Recovery 
Routing Groups and Connectors 
ASP.NET MVC 5 2020-02-26 250 AZN 0 % 250 AZN 0 ay
ASP.NET MVC 5
1.ASP.NET MVC Fundamentals
-MVC Architectural Pattern
-Action Result
-Action Parameters
-Convention-based Routing
-Attribute Routing
-Passing Data to Views
-View Models
-Razor Syntax
-Partial Views
2.Working with DATA
-Entity Framework
-Database-first vs Code-first
-Code-first Migrations
-Changing the Model
-Seeding the Database
-Overriding Conventions
-Querying Objects
-Eager Loading
3.Building Forms
-The Markup
-Labels,Drop-down Lists
-Model Binding
-Saving Data
-Edit Form
-Updating Data
4.Implementing Validation
-Adding Validation
-Styling Validation Errors
-Data Annotations
-Custom Validation
-Refactoring Magic Number
-Validation Summary
-Anti-forgey Tokens
5.Building RESTful Services with ASP.NET Web API
-Restful Convention
-Building an API
-Testing an API
-Data Transfer Objects
-Auto Mapper
-Using Camel Notation
-IHttpActionResult
6.Client-side Development
-Calling an API Using jQuery
-Bootbox Plug-in
-Optimizing jQuery Code
-DataTables Plug-in
-DataTables with Ajax Source
-Returning Hierarchical Data
-DataTables:Removing Records
-DataTables:Discussion Points
-Single Page Application
7.Authentication and Authorization
- Authentication Options
-ASP.NET Identity
-Restricting Access
-Seeding Users and Roles
-Working with Roles
-Adding Profile Data
-OAuth
-Social Logins
8.Performance Optimization
-Data Tier
-Glimpse
-Output Cache
-Data Cache
-Async
-Release Build
-Disabling Session
-Client Tier
-Chrome Developer Tools Tip
9.Building a Feature End-to-End Systematically
-Domain Modelling
-Building the Simplest API
-Adding the Details
-Edge Cases
-Building the Front-end
-Adding Auto-completion
-Updating the DOM
-Improving the Look and Feel
-Filtering Records
-Submitting the Form
-Displaying Toast Notifications
-Implementing Client-side Validation
10.Deployment
-Deploying the Application
-Deploying the Database
-Build Configurations
-Application Settings
-Securing Configuration Settings
-Customer Error Pages
-Logging Unhandled Exceptions