CISS 131 Server Technologies I*

This course provides the student with the skills to plan, install, and manage Microsoft network operating systems.


3 Credits


CISS 107

CISS 131Server Technologies I*

Please note: This is not a course syllabus. A course syllabus is unique to a particular section of a course by instructor. This curriculum guide provides general information about a course.

I. General Information


Information Technology

II. Course Specification

Course Type

Program Requirement

Credit Hours Narrative

3 Credits

Semester Contact Hours Lecture


Semester Contact Hours Lab


Prerequisite Narrative

CISS 107

Grading Method

Letter grade



III. Catalog Course Description

This course provides the student with the skills to plan, install, and manage Microsoft network operating systems.

IV. Student Learning Outcomes

Upon completion of this course, a student will be able to:

Outcome: Students will comprehend the role and purpose of a network administrator for Windows Server 2012. Assessment: Successful completion of assignments and lab activities. Outcome: To develop skills with the terminology, design, implementation and troubleshooting of computer networks. Assessment: Demonstrating mastery of terminology, design, and troubleshooting simple local area networks (LANs) by completing assigned activities to a passing level. Outcome: To manipulate and customize the Microsoft Server 2012 operating system. Assessment: Given a lab or written scenario, the students will complete the hands-on labs to the satisfaction of the instructor.

V. Topical Outline (Course Content)

Install and configure servers (15–20%) Install servers Plan for a server installation; plan for server roles; plan for a server upgrade; install Server Core; optimize resource utilization by using Features on Demand; migrate roles from previous versions of Windows Server Configure servers Configure Server Core; delegate administration; add and remove features in offline images; deploy roles on remote servers; convert Server Core to/from full GUI; configure services; configure NIC teaming Configure local storage Design storage spaces; configure basic and dynamic disks; configure MBR and GPT disks; manage volumes; create and mount virtual hard disks (VHDs); configure storage pools and disk pools Configure server roles and features (15–20%) Configure file and share access Create and configure shares; configure share permissions; configure offline files; configure NTFS permissions; configure access-based enumeration (ABE); configure Volume Shadow Copy Service (VSS); configure NTFS quotas Configure print and document services Configure the Easy Print print driver; configure Enterprise Print Management; configure drivers; configure printer pooling; configure print priorities; configure printer permissions Configure servers for remote management Configure WinRM; configure down-level server management; configure servers for day-to-day management tasks; configure multi-server management; configure Server Core; configure Windows Firewall Configure Hyper-V (15–20%) Create and configure virtual machine settings Configure dynamic memory; configure smart paging; configure Resource Metering; configure guest integration services Create and configure virtual machine storage Create VHDs and VHDX; configure differencing drives; modify VHDs; configure pass-through disks; manage snapshots; implement a virtual Fibre Channel adapter Create and configure virtual networks Implement Hyper-V Network Virtualization; configure Hyper-V virtual switches; optimize network performance; configure MAC addresses; configure network isolation; configure synthetic and legacy virtual network adapters Deploy and configure core network services (15–20%) Configure IPv4 and IPv6 addressing Configure IP address options; configure subnetting; configure supernetting; configure interoperability between IPv4 and IPv6; configure ISATAP; configure Teredo Deploy and configure Dynamic Host Configuration Protocol (DHCP) service Create and configure scopes; configure a DHCP reservation; configure DHCP options; configure client and server for PXE boot; configure DHCP relay agent; authorize DHCP server Deploy and configure DNS service Configure Active Directory integration of primary zones; configure forwarders; configure Root Hints; manage DNS cache; create A and PTR resource records Install and administer Active Directory (15–20%) Install domain controllers Add or remove a domain controller from a domain; upgrade a domain controller; install Active Directory Domain Services (AD DS) on a Server Core installation; install a domain controller from Install from Media (IFM); resolve DNS SRV record registration issues; configure a global catalog server Create and manage Active Directory users and computers Automate the creation of Active Directory accounts; create, copy, configure, and delete users and computers; configure templates; perform bulk Active Directory operations; configure user rights; offline domain join; manage inactive and disabled accounts Create and manage Active Directory groups and organizational units (OUs) Configure group nesting; convert groups including security, distribution, universal, domain local, and domain global; manage group membership using Group Policy; enumerate group membership; delegate the creation and management of Active Directory objects; manage default Active Directory containers; create, copy, configure, and delete groups and OUs Create and manage Group Policy (15–20%) Create Group Policy objects (GPOs) Configure a Central Store; manage starter GPOs; configure GPO links; configure multiple local group policies; configure security filtering Configure security policies Configure User Rights Assignment; configure Security Options settings; configure Security templates; configure Audit Policy; configure Local Users and Groups; configure User Account Control (UAC) Configure application restriction policies Configure rule enforcement; configure Applocker rules; configure Software Restriction Policies Configure Windows Firewall Configure rules for multiple profiles using Group Policy; configure connection security rules; configure Windows Firewall to allow or deny applications, scopes, ports, and users; configure authenticated firewall exceptions; import and export settings

VI. Delivery Methodologies