CCNA Wireless 640-722 IUWNE Exam Topics Exam Description The 640-722 Implementing Cisco Unified Wireless Network Essential (IUWNE) exam is the exam associated with the CCNA Wireless certification. This exam tests a candidate’s knowledge of installing, configuring, operating, and troubleshooting small to medium-size WLANs. Candidates can prepare for this exam by taking the Implementing Cisco Unified Wireless Network Essential (IUWNE) course. Exam Topics The following information provides general guidelines for the content likely to be included on the Implementing Cisco Unified Wireless Networking Essentials (IUWNE) exam. However, other related topics may also appear on any specific delivery of the exam. Describe WLAN fundamentals Describe basics of spread spectrum technology Describe the impact of various wireless technologies (Bluetooth, WiMAX, ZigBee, and cordless phone) Describe wireless regulatory bodies, standards and certifications (FCC, ETSI, 802.11a/b/g/n, and WiFi Alliance) Describe Wireless LAN (WLAN) RF principles (antenna types, RF gain/loss, Effective Isotropic Radiated Power (EIRP), refraction, reflection, and so on) Describe networking technologies used in wireless (SSID to WLAN_ID to Interface to VLAN, 802.1q trunking) Describe wireless topologies, such as Independent Basic Service Set (IBSS), Basic Service Set (BSS), Extended Service Set (ESS), Point-to-Point, Point-to-Multipoint, Mesh, and bridging) Describe 802.11 authentication and encryption methods (Open, Shared, 802.1X, EAP, TKIP, and AES) Describe frame types (associated and unassociated, management, control, and data) Describe basic RF deployment considerations related to site survey design of data or VoWLAN applications, common RF interference sources such as devices, building material, AP location, and basic RF site survey design related to channel reuse, signal strength, and cell overlap Install a basic Cisco wireless LAN Identify the components of the Cisco Unified Wireless Network architecture (Split MAC, LWAPP, stand-alone AP vs controller-based AP, specific hardware examples) Install and configure autonomous access points in the small business environment Describe the modes of controller-based AP deployment (local, monitor, HREAP, sniffer, rogue detector, bridge, OEAP, and SE-Connect) Describe controller-based AP discovery and association (DHCP, DNS, Master-Controller, Primary-Secondary-Tertiary, and n+1 redundancy) Describe roaming (Layer 2 and Layer 3, intra-controller and inter-controller, and mobility list) Configure a WLAN controller and access points WLC: ports, interfaces, WLANs, NTP, CLI and Web UI, CLI wizard, and link aggregation group (LAG) AP: Channel and Power Describe Radio Resource Management (RRM) fundamentals including ED-RRM. Verify basic wireless network operation Install Wireless Clients Describe client WLAN configuration requirements, such as Service Set Identifier (SSID), security selection, and authentication Identify basic configuration of common wireless supplicants (Macintosh, Intel Wireless Pro, Windows, iOS, and Android) Describe basic AnyConnect 3.0 or above wireless configuration parameters Identity capabilities available in CCX versions 1 through 5 Implement basic WLAN Security Describe the general framework of wireless security and security components (authentication, encryption, MFP, and IPS) Describe the evolution of supported authentication methods (PSK, 802.1X including EAP-TLS, EAP-FAST, PEAP, LEAP, and WPA/WPA2) Configure the different sources of authentication (EAP-local or -external, and Radius) Configure authentication and encryption methods on a WLAN (WPA/WPA2 with PSK and 802.1x) Implement wireless Guest networking Operate basic WCS Identify key functions of Cisco Wireless Control System (WCS) and Navigator (versions and licensing) Navigate WCS interface Configure controllers and access points (APs) (using the Configuration tab not templates) Use preconfigured maps in the WCS (adding/relocating/removing access points, turn on/off heat maps, view client location, and view CleanAir zones of influence) Use the WCS monitor tab and alarm summary to verify the WLAN operations Generate standard WCS reports (inventory, CleanAir, client-related, AP-related, and utilization) Conduct basic WLAN Maintenance and Troubleshooting Identify and use basic WLAN troubleshooting tools (WLC show debug and logging) for client to AP connectivity, AP to controller connectivity Use the WCS client troubleshooting tool Transfer logs, configuration files, and O/S images to and from the WLC via the GUI Differentiate and use WLC and AP (autonomous and LAP) management access methods (console port, CLI, telnet, ssh, http, https, and wired vs wireless management)
Security+ Certification Exam Objectives: SY0-501 The CompTIA Security+ exam will certify that the successful candidate has the knowledge and skills required to identify risk and participate in risk mitigation activities, provide infrastructure, application, operational and information security, apply security controls to maintain confidentiality, integrity and availability, identify appropriate technologies and products, and operate with an awareness of applicable policies, laws and regulations. 1.0 NetworkSecurity 1.1 Explain the security function and purpose of network devices and technologies 1.2 Apply and implement secure network administration principles 1.3 Distinguish and differentiate network design elements and compounds 1.4 Implement and use common protocols 1.5 Identify commonly used default network ports 1.6 Implement wireless network in a secure manner 2.0 Compliance and Operational Security 2.1 Explain risk related concepts 2.2 Carry out appropriate risk mitigation strategies 2.3 Execute appropriate incident response procedures 2.4 Explain the importance of security related awareness and training 2.5 Compare and contrast aspects of business continuity 2.6 Explain the impact and proper use of environmental controls 2.7 Execute disaster recovery plans and procedures 2.8 Exemplify the concepts of confidentiality, integrity and availability (CIA) 3.0 Threats and Vulnerabilities 3.1 Analyze and differentiate among types of malware 3.2 Analyze and differentiate among types of attacks 3.3 Analyze and differentiate among types of social engineering attacks 3.4 Analyze and differentiate among types of wireless attacks 3.5 Analyze and differentiate among types of application attacks 3.6 Analyze and differentiate among types of mitigation and deterrent techniques 3.7 Implement assessment tools and techniques to discover security threats and vulnerabilities 3.8 Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning 4.0 Application, Data and Host Security 4.1 Explain the importance of application security 4.2 Carry out appropriate procedures to establish host security 4.3 Explain the importance of data security 5.0 Access Control and Identity Management 5.1 Explain the function and purpose of authentication services 5.2 Explain the fundamental concepts and best practices related to authentication, authorization and access control 5.3 Implement appropriate security controls when performing account management 6.0 Cryptography 6.1 Summarize general cryptography concepts 6.2 Use and apply appropriate cryptographic tools and products 6.3 Explain the core concepts of public key infrastructure 6.4 Implement PKI, certificate management and associated components
MCSE – Microsoft Certified Solution Expert “Server 2012”
$5,355.00
0 Available seats
A. Designing and Implementing a Server Infrastructure 413 B. Implementing an Advanced Server Infrastructure 414 A. Designing and Implementing a Server Infrastructure 413 Plan and Deploy a Server Infrastructure (20%) Design an automated server installation strategy. This objective may include but is not limited to: Design considerations including images and bare metal/virtual deployment; design a server implementation using Windows Assessment and Deployment Kit (ADK); design a virtual server deployment Plan and implement a server deployment infrastructure. This objective may include but is not limited to: Configure multicast deployment; configure multi-site topology and distribution points; configure a multi-server topology; configure autonomous and replica Windows Deployment Services (WDS) servers Plan and implement server upgrade and migration. This objective may include but is not limited to: Plan for role migration; migrate server roles; migrate servers across domains and forests; design a server consolidation strategy; plan for capacity and resource optimization Plan and deploy Virtual Machine Manager services. This objective may include but is not limited to: Design Virtual Machine Manager service templates; define operating system profiles; configure hardware and capability profiles; manage services; configure image and template libraries; manage logical networks Plan and implement file and storage services. This objective may include but is not limited to: Planning considerations include iSCSI SANs, Fibre Channel SANs, Virtual Fibre Channel, storage spaces, storage pools, and data de-duplication; configure the iSCSI Target server; configure the Internet Storage Name server (iSNS); configure Network File System (NFS); install Device Specific Modules (DSMs) Design and Implement Network Infrastructure Services (20%) Design and maintain a Dynamic Host Configuration Protocol (DHCP) solution. This objective may include but is not limited to: Design considerations including a highly available DHCP solution including split scope, DHCP failover, and DHCP failover clustering, DHCP interoperability, and DHCPv6; implement DHCP filtering; implement and configure a DHCP management pack; maintain a DHCP database Design a name resolution solution strategy. This objective may include but is not limited to: Design considerations including secure name resolution, DNSSEC, DNS Socket Pool, cache locking, disjoint namespaces, DNS interoperability, migration to application partitions, IPv6, Single-Label DNS Name Resolution, zone hierarchy, and zone delegation Design and manage an IP address management solution. This objective may include but is not limited to: Design considerations including IP address management technologies including IPAM, Group Policy based, and manual provisioning, and distributed vs. centralized placement; configure role-based access control; configure IPAM auditing; migrate IPs; manage and monitor multiple DHCP and DNS servers; configure data collection for IPAM Design and Implement Network Access Services (17%) Design a VPN solution. This objective may include but is not limited to: Design considerations including certificate deployment, firewall configuration, client/site to site, bandwidth, protocol implications, and VPN deployment configurations using Connection Manager Administration Kit (CMAK) Design a DirectAccess solution. This objective may include but is not limited to: Design considerations including topology, migration from Forefront UAG, DirectAccess deployment, and enterprise certificates Implement a scalable remote access solution. This objective may include but is not limited to: Configure site-to-site VPN; configure packet filters; implement packet tracing; implement multi-site Remote Access; configure Remote Access clustered with Network Load Balancing (NLB); configure DirectAccess Design a network protection solution. This objective may include but is not limited to: Design considerations including Network Access Protection (NAP) enforcement methods for DHCP, IPSec, VPN, and 802.1x, capacity, placement of servers, firewall, Network Policy Server (NPS), and remediation network Implement a network protection solution. This objective may include but is not limited to: Implement multi-RADIUS deployment; configure NAP enforcement for IPSec and 802.1x; deploy and configure the Endpoint Protection client; create anti-malware and firewall policies; monitor for compliance Design and Implement an Active Directory Infrastructure (Logical) (22%) Design a forest and domain infrastructure. This objective may include but is not limited to: Design considerations including multi-forest architecture, trusts, functional levels, domain upgrade, domain migration, forest restructure, and Hybrid Cloud services Implement a forest and domain infrastructure. This objective may include but is not limited to: Configure domain rename; configure Kerberos realm trusts; implement a domain upgrade; implement a domain migration; implement a forest restructure; deploy and manage a test forest including synchronization with production forests Design a Group Policy strategy. This objective may include but is not limited to: Design considerations including inheritance blocking, enforced policies, loopback processing, security, and WMI filtering, site-linked Group Policy Objects (GPOs), slow-link processing, group strategies, organizational unit (OU) hierarchy, and Advanced Group Policy Management (AGPM) Design an Active Directory permission model. This objective may include but is not limited to: Design considerations including Active Directory object security and Active Directory quotas; customize tasks to delegate in Delegate of control wizard; deploy administrative tools on the client computer; delegate permissions on administrative users (AdminSDHolder); configure Kerberos delegation Design and Implement an Active Directory Infrastructure (Physical) (21%) Design an Active Directory sites topology. This objective may include but is not limited to: Design considerations including proximity of domain controllers, replication optimization, and site link; monitor and resolve Active Directory replication conflicts Design a domain controller strategy. This objective may include but is not limited to: Design considerations including global catalog, operations master roles, Read-Only Domain Controllers (RODCs), partial attribute set, and domain controller cloning Design and implement a branch office infrastructure. This objective may include but is not limited to: Design considerations including RODC, Universal Group Membership Caching (UGMC), global catalog, DNS, DHCP, and BranchCache; implement confidential attributes; delegate administration; modify filtered attributes set; configure password replication policy; configure hash publication B. Implementing an Advanced Server Infrastructure 414 Manage and Maintain a Server Infrastructure (27%) Design an administrative model. This objective may include but is not limited to: Design considerations including user rights, built-in groups, and end-user self-service portal; design a delegation of administration structure for Microsoft System Center 2012 Design a monitoring strategy. This objective may include but is not limited to: Design considerations including monitoring servers using Audit Collection Services (ACS), performance monitoring, centralized monitoring, and centralized reporting; implement and optimize System Center 2012 – Operations Manager management packs; plan for monitoring
640-461 ICOMM v8.0 Exam Topics (Blueprint) Exam Description The 640-461 Introducing Cisco Voice and Unified Communications (ICOMM) v8.0 exam is associated with the CCNA Voice certification. This exam tests a candidate’s knowledge of the architecture, components, functionalities, and features of Cisco Unified Communications solutions. It also tests the knowledge needed to perform tasks such as system monitoring, moves, additions and changes on Cisco Unified Communications Manager, Cisco Unified Communications Manager Express, Cisco Unity Connection, and Cisco Unified Presence. Candidates can prepare for this exam by taking the ICOMMv8.0 Introducing Cisco Voice and Unified Communications Administration v8.0 course.. Exam Topics The following topics are general guidelines for the content likely to be included on the Introducing Cisco Voice and Unified Communications (ICOMM) v8.0 exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice. Describe the characteristics of a Cisco Unified Communications solution Describe the Cisco Unified Communications components and their functions Describe call signalling and media flows Describe quality implications of a VoIP network Provision end users and associated devices Describe user creation options for Cisco Unified Communications Manager and Cisco Unified Communications Manager Express Create or modify user accounts for Cisco Unified Communications Manager Create or modify user accounts for Cisco Unified Communications Manager Express using the GUI Create or modify endpoints for Cisco Unified Communications Manager Create or modify endpoints for Cisco Unified Communications Manager Express using the GUI Describe how calling privileges function and how calling privileges impact system features Create or modify directory numbers Enable user features and related calling privileges for extension mobility, call coverage, intercom, native presence, and unified mobility remote destination configuration Enable end users for Cisco Unified Presence Verify user features are operational Configure voice messaging and presence Describe user creation options for voice messaging Create or modify user accounts for Cisco Unity Connection Describe Cisco Unified Presence Configure Cisco Unified Presence Maintain Cisco Unified Communications system Generate CDR and CMR reports Generate capacity reports Generate usage reports Generate RTMT reports to monitor system activities Monitor voicemail usage Remove unassigned directory numbers Perform manual system backup Provide end user support Verify PSTN connectivity Define fault domains using information gathered from end user Troubleshoot endpoint issues Identify voicemail issues and resolve issues related to user mailboxes Describe causes and symptoms of call quality issues Reset single devices Describe how to use phone applications
642-902 ROUTE Exam Topics Exam Description The Implementing Cisco IP Routing (ROUTE 642-902) is a qualifying exam for the Cisco Certified Network Professional CCNP®, Cisco Certified Internetwork Professional CCIP®, and Cisco Certified Design Professional CCDP® certifications. The ROUTE 642-902 exam will certify that the successful candidate has the knowledge and skills necessary to use advanced IP addressing and routing in implementing scalable and secure Cisco ISR routers connected to LANs and WANs. The exam also covers configuration of secure routing solutions to support branch offices and mobile workers. Exam Topics The following information provides general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes the guidelines below may change at any time without notice. Implement an EIGRP based solution, given a network design and a set of requirements Determine network resources needed for implementing EIGRP in a network Create an EIGRP implementation plan Create an EIGRP verification plan Configure EIGRP routing Verify an EIGRP solution was implemented properly using show and debug commands Document the verification results for an EIGRP implementation Implement a multi-area OSPF Network, given a network design and a set of requirements Determine network resources needed for implementing OSPF on a network Create an OSPF implementation plan Create an OSPF verification plan Configure OSPF routing Verify OSPF solution was implemented properly using show and debug commands Document the verification results for an OSPF implementation plan Implement an eBGP based solution, given a network design and a set of requirements Determine network resources needed for implementing eBGP on a network Create an eBGP implementation plan Create an eBGP verification plan Configure eBGP routing Verify eBGP solution was implemented properly using show and debug commands Document verification results for an eBGP implementation plan Implement an IPv6 based solution, given a network design and a set of requirements Determine network resources needed for implementing IPv6 on a network Create an IPv6 implementation plan Create an IPv6 verification plan Configure IPv6 routing Configure IPv6 interoperation with IPv4 Verify IPv6 solution was implemented properly using show and debug commands Document verification results for an IPv6 implementation plan Implement an IPv4 or IPv6 based redistribution solution, given a network design and a set of requirements Create a redistribution implementation plan based upon the results from a redistribution analysis Create a redistribution verification plan Configure a redistribution solution Verify that a redistribution was implemented Document results of a redistribution implementation and verification plan Identify the differences between implementing an IPv4 and IPv6 redistribution solution Implement Layer 3 Path Control Solution Create a Layer 3 path control implementation plan based upon the results of the redistribution analysis Create a Layer 3 path control verification plan Configure Layer 3 path control Verify that a Layer 3 path control was implemented Document results of a Layer 3 path control implementation and verification plan Implement basic teleworker and branch services Describe broadband technologies Configure basic broadband connections Describe basic VPN technologies Configure GRE Describe branch access technologies
MCSE Private Cloud Certification Pre-requisite: MCSA Server 2008 or 2012 A. Monitoring and Operating a Private Cloud with System Center 2012 246 B. Configuring and Deploying a Private Cloud with System Center 2012 247 A. Monitoring and Operating a Private Cloud with System Center 2012 246 Configure Data Center Process Automation (17%) Implement workflows. This objective may include but is not limited to: SCO Runbook automation, automate remediation of incidents, design and build end-to-end automation incorporating System Center 2012 technologies Implement service offerings. This objective may include but is not limited to: Add a new service offering to the service catalog, create a custom workflow using the Service Manager console, reference Orchestrator workflows in Service Manager Deploy Resource Monitoring (20%) Deploy end-to-end monitoring. This objective may include but is not limited to: Deploy agents, Discover and deploy network device monitoring, import and configure management packs, deploy and configure monitoring of a heterogeneous virtualization infrastructure Configure end-to-end monitoring. This objective may include but is not limited to: Configure overrides, create synthetic transactions, configure Outside-In monitoring, configure application performance monitoring (APM), create distributed application models Create monitoring reports and dashboards. This objective may include but is not limited to: Service-level tracking, reports, dashboards Monitor Resources (23%) Monitor network devices. This objective may include but is not limited to: Analyze network device health, manage Operations Manager alerts, manage notifications Monitor servers. This objective may include but is not limited to: Monitor the Operating System Environment (OSE), monitor server applications, manage Operations Manager alerts, manage notifications Monitor the virtualization layer. This objective may include but is not limited to: Monitor host and guest performance, monitor virtual applications, manage Operations Manager alerts, manage notifications Monitor application health. This objective may include but is not limited to: Application Performance Management (APM), synthetic transactions, manage Operations Manager alerts, manage notifications, distributed applications Configure and Maintain Service Management (18%) Implement service level management. This objective may include but is not limited to: Define service level objectives (SLOs) and service level agreements (SLAs), implement SLA management and escalation, maintain SLAs (including planning for future growth), analyze SLAs (reporting) Manage problems and incidents. This objective may include but is not limited to: Working with problems, working with incidents, root cause analysis/diagnosis Manage cloud resources. This objective may include but is not limited to: Deploy new applications, deploy VM/service (applications, SQL, roles), demonstrate application deployment leveraging service templates, manage applications, manage VM hardware (CPUs, Dynamic memory), manage self service Manage Configuration and Protection (22%) Manage compliance and configuration. This objective may include but is not limited to: Security and compliance management (includes IT GRC process management pack), analyze and remediate configuration compliance, analyze data in System Center Advisor Manage updates. This objective may include but is not limited to: Update machine roles in a service template, manage and update applications across multiple clouds, manage software updates Implement backup and recovery. This objective may include but is not limited to: Back up/recover product settings, Back up/recover the cloud infrastructure, manage backups (protection groups, storage), implement business continuity for the cloud B. Configuring and Deploying a Private Cloud with System Center 2012 247 Design and Deploy System Center (19%) Design a scalable System Center architecture. This objective may include but is not limited to: Planing for capacity, high availability, scalability, business continuity, and disaster recovery, assess the current datacenter environment, identify the appropriate System Center components for the private cloud implementation Install the System Center Infrastructure. This objective may include but is not limited to: Install prerequisites required for System Center, install System Center components Upgrade System Center components. This objective may include but is not limited to: In-place upgrade, side-by-side migration Configure System Center Infrastructure (21%) Configure System Center components. This objective may include but is not limited to: Configure Data Protection Manager (DPM) storage pools, configure DPM site-to-site replication, configure System Center agents, configure System Center Management Groups, configure System Center data retention, configure Orchestrator watcher nodes, configure Public Key Infrastructure (PKI) for System Center, configure user roles, Run-As accounts, Run-As profiles, configure Service Manager database Configure portals and dashboards. This objective may include but is not limited to: App Controller portal, Virtual Machine Manager (VMM) self-service portal, Service Manager self-service portal, VMM SSP 2.0, System Center dashboards Configure the Fabric (27%) Configure the storage fabric. This objective may include but is not limited to: Classification and pools, providers, arrays Configure the network fabric. This objective may include but is not limited to: Virtual and logical networks, IP/MAC resource pools, VIP templates, load balancing Configure the deployment and update servers. This objective may include but is not limited to: Windows Server Update Services (WSUS) server, library server, Windows Deployment Services (WDS)/PXE Configure clouds and virtualization hosts. This objective may include but is not limited to: Clouds and host groups, configure and deploy virtualization hosts Configure System Center Integration (16%) Configure private cloud integration. This objective may include but is not limited to: Configure Operations Manager connectors, Orchestrator integration packs, Service Manager connectors, SharePoint integration Configure integration of private and public clouds. This objective may include but is not limited to: Configure host profiles, guest operating system profiles, hardware profiles, SQL server profiles, application profiles Configure and Deploy Virtual Machines and Services (17%) Configure profiles. This objective may include but is not limited to: Configure host profiles, guest operating system profiles, hardware profiles, SQL server profiles, application profiles Create and configure server App-V packages. This objective may include but is not limited to: Sequence an application, configure App-V package settings, configure and deploy a server App-V agent Configure and deploy a service. This objective may include but is not limited to: Import and export templates, configure VM templates, configure service templates, deploy a SQL DAC package, deploy a Web deploy package, deploy an App-V package, create and configure pre-install and post-install scripts Update a service. This objective may include but is not limited to: Applying updating to existing VMs (in-place), deploy new VMs with updated settings, update/replace OS, update/replace app,
MCSE Data Platform Pre-requisite: MCSA Server 2012 A. Developing MS SQL 2012 Databases 464 B. Designing Database Solutions for SQL 2012 465 A. Developing MS SQL 2012 Databases 464 Implement Programming Objects (21%) Write automation scripts. This objective may include but is not limited to: automate backup testing; shrink file; check index fragmentation; archive data; run an SQL Server Integration Services (SSIS) job; check disk space; automate backups Design and implement stored procedures. This objective may include but is not limited to: create stored procedures and other programmatic objects; techniques for developing stored procedures; different types of stored procedure results; create stored procedure for data access layer; analyze and rewrite procedures and processes; program stored procedures, with T-SQL and CLR#; use table valued parameters; encryption Design T-SQL table-valued and scalar functions. This objective may include but is not limited to: ensure code non regression by keeping consistent signature for procedure, views and function (interfaces); turn scripts that use cursors and loops into a SET based operation Create, use, and alter user-defined functions (UDFs). This objective may include but is not limited to: understand deterministic, non-deterministic functions; using cross apply with UDFs; Common Language Runtime (CLR) Create and alter views (complex statements). This objective may include but is not limited to: set up and configure partitioned tables and partitioned views; design a best practice for using views and stored procedures and remove the direct usage of tables Implement Database Objects (31%) Create and alter tables (complex statements). This objective may include but is not limited to: develop an optimal strategy for using temporary objects (table variables and temporary tables); how not to rely on triggers solely as a means to manage a table; data version control and management; create tables without using the built in tools; understand the difference between @Table and #table Design, implement, and troubleshoot security. This objective may include but is not limited to: grant, deny, revoke; unable to connect; execute as; certificates; loginless user; database roles and permissions; contained users; change permission chain Design the locking granularity level. This objective may include but is not limited to: choose the right lock mechanism for a given task, handling and/or avoiding deadlocks; fix locking and blocking issues caused by previous development or third-party apps; analyze a deadlock scenario to alleviate the issue; impact of isolation level and ado defaults; impact of locks and lock escalation; reduce locking scenarios; how isolation levels affect blocking and locking; identify bottlenecks in the data design and improve Maintain indexes. This objective may include but is not limited to: inspect physical characteristics of indexes and perform index maintenance; identify fragmented indexes; identify unused indexes; implement indexes; defrag/rebuild indexes; set up a maintenance strategy for indexes and statistics; optimize indexes (full, filter index); statistics (full, filter) force or fix queue; when to rebuild versus reorg and index; create a tuning and maintenance strategy for proactive operations Implement data types. This objective may include but is not limited to: use appropriate data types; develop a CLR data type; understand the difference between @Table and #table; impact of GUID (newid, newsequentialid) on database performance, indexing and privacy; use spatial data; LOB data types; understand when and how to use column store and sparse columns; implicit and explicit conversions, integer math Create and modify constraints (complex statements). This objective may include but is not limited to: create constraints on tables; define constraints; performance implications Work with XML Data. This objective may include but is not limited to: implement XML; use XML (Query, Input, Output); transform XML data into relational data; retrieve relational data as XML; FOR XML; design a strategy to transform XML into relational data; design a strategy to query and modify XML data; understand xml data types and their schemas and interoperability, limitations, and restrictions; implement XML schemas and handling of XML data; how to handle it in SQL Server and when and when not to use it, including XML namespaces; import and export XML Design Database Objects (24%) Design tables. This objective may include but is not limited to: data design patterns; develop normalized and de-normalized SQL tables; understand the difference between physical tables, temp tables, temp table variables and common table expressions; design transactions; design views; describe advantages / disadvantages of using a GUID as a clustered index; understand performance implications of # versus @ temp tables and how to decide which to use, when and why; use of set based rather than row based logic; encryption (other than TDE); table partitioning; filestream and filetable Design for concurrency. This objective may include but is not limited to: develop a strategy to minimize concurrency; handle concurrency to minimize locking and eliminate as much blocking as possible, and to avoid deadlocks; manage the transactions to limit the time to hold lock and have fast transactions (maximize concurrency); define locking and concurrency strategy; impact of read committed snapshot / snapshot isolation; understand what it solves and what it costs Create and alter indexes. This objective may include but is not limited to: create indexes and data structures; create filtered indexes; create an indexing strategy; design and optimize indexes; design indexes and statistics; assess which indexes on a table are likely to be used given different search arguments (SARG); column store indexes; semantic indexes Design data integrity. This objective may include but is not limited to: design table data integrity policy (checks, private key/foreign key, uniqueness, XML schema); select a primary key; data usage patterns Design for implicit and explicit transactions. This objective may include but is not limited to: manage transactions; use transactions in code; ensure data integrity by using transactions; use transactions inside the database using T-SQL and from the “outside” via C#/VB; distributed transaction escalation Optimize and Troubleshoot Queries (24%) Optimize and tune queries. This objective may include but is not limited to: tune a badly performing query; identify long running queries; review and optimize code; analyze execution plans to optimize queries; tune a query that is poorly written; tune queries using execution
MCSE Business Intelligence Pre-requisite: MCSA Server 2012 Implementing Data Models and Reports with SQL Server 2012 466 Designing business Intelligence Solutions with MS SQL 2012 467 A. Implementing Data Models and Reports with SQL Server 2012 466 Build a Tabular Data Model (17%) Configure permissions and roles in Business Intelligence Semantic Model (BISM). This objective may include but is not limited to: server roles; SSAS database roles; implement dynamic security (custom security approaches); role-based access; Test security permissions; cell level permissions Implement a tabular data model. This objective may include but is not limited to: define tables; import data; calculated columns; relationships; hierarchies and perspectives; manage visibility of columns and tables; optimize BISM for Crescent; mark a date table; sort a column by another column Implement business logic in a tabular data model. This objective may include but is not limited to: measures and KPIs; DAX; relationship navigation; time intelligence; context modification Implement data access for a tabular data model. This objective may include but is not limited to: manage partitions; processing; Vertipaq versus Direct Query Manage, Maintain, and Troubleshoot an SSAS Database (18%) Analyze data model performance. This objective may include but is not limited to: performance consequences of DWH design; optimize performance by changing the design of the cube or dimension; Analyze and optimize performances of an MDX/DAX query; optimize queries for huge data sets; optimize MDX in the calculations; performance monitor counters; DMVs; performance counters (new for tabular model), growth of the cache, logging options Process data models. This objective may include but is not limited to: processing tables or partitions for tabular models; processing databases, cubes, dimensions for multidimensional models; full processing versus incremental processing, remote processing; lazy aggregations; automate with Analysis Management Objects (AMO) or XML for Analysis (XMLA) Troubleshoot data analysis issues. This objective may include but is not limited to: use SQL Profiler; troubleshoot duplicate key dimension processing errors; error logs and event viewer logs of SSAS, mismatch of data: incorrect relationships or aggregations; dynamic security issues; validate logic and calculations Deploy SSAS databases. This objective may include but is not limited to: Deployment Wizard; BIDS; SSMS; automation; test solution post deployment; deciding whether or not to process Install and maintain a SSAS instance. This objective may include but is not limited to: software installation of SSAS; development tools, development and production box installation considerations; upgrade; data file and program file location, planning for Administrator accounts; Updates (service packs); install and maintain each instance type of Analysis Services, including PowerPivot; restore and import PowerPivot. Build an Analysis Services Database (38%) Design dimensions and measures. This objective may include but is not limited to: given a requirement, identify the dimension/measure group relationship that should be selected; design patterns for representing business facts and dimensions (many-to-many relationships); design dimensions to support multiple related measure groups (many related fact tables); handle degenerate dimensions in a cube; identify the attributes for dimensions; identify the measures; aggregation behavior for the measures; hierarchies Implement and configure dimensions in a cube. This objective may include but is not limited to: translations; attribute relations; hierarchies; implement SQL Server Analysis Services (SSAS) dimensions and cubes; identify the Attribute Relationships that should be made for a given set of Attributes in a dimension; develop new custom attributes on dimensions; detect possible design flaws in attribute relationships; create attribute relationships correctly in an analysis services dimension; implement time Dimensions in cubes; manage SSAS parent-child dimensions; dimension type Design a schema to support cube architecture. This objective may include but is not limited to: multidimensional modeling starting from a star schema; relational modeling for a Data Mart; choose or create a topology; identify the appropriate data types with correct precision and size Create measures. This objective may include but is not limited to: logically group measures; select appropriate aggregation functions; format measures Implement a cube. This objective may include but is not limited to: use Business Intelligence Development Studio (BIDS) to build the cube; use BIDS to do non additive or semi additive measures in a cube; measures, perspectives; translations; dimension usage; cube specific dimension properties; measure groups; implement reference dimensions; implement many to many relationships; implement fact relationships; implement role-playing relationships; define granularity; create and manage linked measure groups and linked dimensions; actions Create Multidimensional Expressions (MDX) queries. This objective may include but is not limited to: MDX authoring; identify the structures of MDX and the common functions (tuples, sets, topcount, SCOPE, etc.); identify which MDX statement would return the required result; implement a custom MDX or logical solution for a pre-prepared case task; graphical query designer or the generic query designer Implement custom logic in a data model. Must include: Data Analysis Expressions (DAX) calculated columns and measures. This objective may include but is not limited to: key performance indicators (KPI); calculated members; use MDX functions to calculate members; relative Measures (growth, YoY, same period last year), % of total using MDX; named sets; adding intelligence to dimensions; Analysis Services stored procedures Implement storage design in a multidimensional model. This objective may include but is not limited to: aggregations; partitions; storage modes; proactive caching; manage write-back partitions Select an appropriate model for data analysis. This objective may include but is not limited to: UDM; Scalability, Cleansed; traditional hierarchical; high volume of data; advanced features (support for financial applications; many to many); organizational BI; Tabular Data Model: raw data; relational tables and relationships; simpler data structures; Team and personal BI; choose between multidimensional and tabular models Build a Report with SQL Server Reporting Services (SSRS) (28%) Design a report. This objective may include but is not limited to: selecting report components (crosstab report, Tablix, design chart, data visualization components), report templates (Report Definition Language), identify the data source and parameters; designing a grouping structure; drill-down reports, drill-through reports; determine if any expressions are required to display data that is not coming directly from the data source Implement a report layout. This objective may include but is not limited to: formatting; apply conditional formatting; page configuration;