MCSE Training in Pune

MCSE Training in Pune - ETLHIVE

MCSE Training in Pune

About the Course

The MCSE training course at ETLhive prepares candidates for Microsoft Certified Solutions Expert (MCSE) Exams which are globally recognized certifications to validate your skills in the fields of identity management, systems management, virtualization, storage, and networking. After obtaining an MCSE certification, the candidate will be able to target good jobs as computer support specialist and information security analyst wherein the individuals will have expertise in designing, configuration, and troubleshooting of the servers. As such, the candidates appearing for Microsoft Certified Solutions Expert Certification will have eight options such as server infrastructure, desktop infrastructure, private cloud, data platform, business intelligence, messaging, communication, and SharePoint. And it is advisable to gain expertise in these fields before the candidate appears for the MCSE exam. As the fact of the matter, gaining an MCSE Certification will prove your worth and will validate your skills you already have and here at ETLhive, we take upon ourselves the task to prepare the candidates in such a way that they are able to clear their MCSE certification exams for availing better opportunities lying ahead.  

Intended Audience for MCSE Training Course

The MCSE Course is ideal for IT Professionals, network administrators, system administrator, system engineer, windows server administrator, and monitoring operators.

Prerequisites for MCSE 

As such the MCSE training course at ETLhive is designed to prepare the candidates for the MCSE certification exams which are conducted in the domains such as server infrastructure, desktop infrastructure, private cloud, data platform, business intelligence, messaging, communication, and SharePoint. Therefore, it is logical that any individual opting for MCSE training course should have some experience in these domains. Further, individuals who want to appear for MCSE certification exam should have 2 years of experience in the above mentioned domains. 

MCSE Course Content


MCSE Exam 70-410

Windows Server 2012

  • Windows Server 2012: Installation & Configuration
  • Installing Servers Plan for a Server Installation
  • Planning for Server Roles
  • Planning for a Server Upgrade
  • Installation of a Server Core
  • How to Optimize Resource Utilization by using Features on Demand?
  • How to Migrate Roles from Previous Versions of Windows Server 
  • Configuring Servers Core
  • Delegating Administration
  • Adding and Removing Features in Offline Images
  • Deploying Roles on Remote Servers
  • Converting Server Core to/from full GUI
  • Configuring NIC Teaming
  • Configuring Local Storage Design Storage Spaces
  • Configuring Basic and Dynamic Disks
  • Configuring MBR and GPT Disks
  • Managing Volumes
  • Creating and Mounting Virtual Hard Disks (VHDs)
  • Configuring Storage Pools and Disk Pools 


Server Roles and Features 

  • Configuring File and Share Access
  • Creating and Configuring Shares
  • Share Permissions & Offline Files
  • NTFS Permissions & Access-Based Enumeration (ABE)
  • Configuring Volume Shadow Copy Service (VSS)
  • Configuring NTFS Quotas 
  • Print and Document Services
  • Configuring Easy Print Driver
  • Enterprise Print Management
  • Configuring Printer Pooling
  • Print Priorities & Printer Permissions
  • Configuring Servers for Remote Management
  • Configuring WinRM
  • Configuring Down-level Server Management
  • Configuring Servers for day-to-day Management Tasks
  • Configuring Multi-Server Management
  • Configuring Server Core
  • Configuring Windows Firewall 


  • Creating and Configuring Virtual Machine Settings
  • Dynamic Memory & Smart Paging
  • Resource Metering & Guest Integration Services
  • Creating and Configuring Virtual Machine Storage 
  • Creating VHDs and VHDX
  • Configuring Differencing Drives
  • Modifying VHDs
  • Configuring Passthrough Disks
  • Managing Snapshots
  • Implementing a Virtual Fibre Channel Adapter
  • Creating and Configuring Virtual Networks Implement
  • Hyper-V Network Virtualization
  • Configuring Hyper-V Virtual Switches
  • Optimizing Network Performance
  • Configuring MAC Addresses
  • Configuring Network Isolation
  • Configuring Synthetic and Legacy Virtual Network Adapters 

Core Network Services

  • Configuring IPv4 and IPv6 Addressing
  • Configuring IP Address Options
  • Configuring Subnetting
  • Configuring Interoperability between IPv4 and IPv6
  • ISATAP & Teredo
  • Deploying and Configuring Dynamic Host Configuration Protocol (DHCP) Service
  • Creating and Configuring Scopes
  • Configuring a DHCP Reservation
  • Configuring DHCP Options
  • Configuring Client and Server for PXE Boot
  • Configuring DHCP Relay Agent
  • Authorizing DHCP Server
  • Deploying and Configuring DNS Service
  • Configuring Active Directory Integration of Primary Zones
  • Configuring Forwarders & Root Hints
  • Managing DNS Cache
  • Creating A and PTR Resource Records 



Active Directory

  • Installing Domain Controllers
  • Adding or Removing a Domain Controller from a Domain
  • Upgrading a Domain Controller
  • Installing Active Directory Domain Services (AD DS) on a Server Core Installation
  • Installing a Domain Controller from Install from Media (IFM)
  • Resolving a DNS SRV Record Registration Issues
  • Configuring a Global Catalog Server
  • Creating and Managing Active Directory Users and Computers
  • Automating the Creation of Active Directory Accounts
  • Creating, Copying, Configuring, and Deleting Users and Computers
  • Configuring Templates
  • Performing Bulk Active Directory Operations
  • Configuring User Rights
  • Offline Domain Join
  • Managing Inactive and Disabled Accounts
  • Creating and Managing Active Directory Groups and Organizational Units (OUs)
  • Configuring Group Nesting
  • Converting Groups including Security, Distribution, Universal, Domain Local, and Domain Global
  • Managing Group Membership using Group Policy
  • Enumerate Group Membership
  • Delegating the Creation and Management of Active Directory Objects
  • Managing Default Active Directory Containers; create, copy, configure, and delete groups and OUs 

Create and Manage Group Policy

  • Create Group Policy objects (GPOs)
  • Configure a Central Store
  • Managing Starter GPOs
  • Configuring GPO Links
  • Configuring Multiple Local Group Policies
  • Configuring Security Filtering
  • Configuring Security Policies
  • Configuring User Rights Assignment
  • Configuring Security Options Settings
  • Configuring Security Templates
  • Configuring Audit Policy
  • Configuring Local Users and Groups
  • Configuring User Account Control (UAC)
  • Configure Application Restriction Policies
  • Configuring Rule Enforcement
  • Configuring Applocker Rules
  • Configuring Software Restriction Policies
  • Configuring Windows Firewall
  • Configuring Rules for Multiple Profiles using Group Policy
  • Configuring Connection Security Rules
  • Configuring Windows Firewall to Allow or Deny Applications, scopes, ports, and users
  • Configuring Authenticated Firewall Exceptions
  • Import and Export Settings 

70-411 Administering Windows Server 2012


Deploy, Manage, and Maintain Servers

  • Deploying and Managing Server Images
  • Install the Windows Deployment Services (WDS) Role
  • Configuring and Manage Boot, Install, and Discover Images
  • Updating Images with Patches, Hotfixes, and Drivers
  • Installing features for Offline Images
  • Implementing Patch Management
  • Installing and Configuring the Windows Server Update Services (WSUS) Role
  • Configuring Group Policies for Updates
  • Configuring Client-side Targeting
  • Configuring WSUS Synchronization
  • Configuring WSUS Groups
  • Monitoring Servers 
  • Configuring Data Collector Sets (DCS)
  • Configuring Alerts
  • Monitoring Real-Time Performance
  • Monitoring Virtual Machines (VMs)
  • Monitoring Events
  • Configuring Event Subscriptions
  • Configuring Network Monitoring 

File and Print Services

  • Configuring Distributed File System (DFS) 
  • Installing and Configuring DFS Namespaces
  • Configuring DFS Replication Targets
  • Configuring Replication Scheduling
  • Configuring Remote Differential Compression Settings
  • Configuring Staging
  • Configuring Fault Tolerance
  • Configuring File Server Resource Manager (FSRM)
  • Installing the FSRM Role
  • Configuring Quotas
  • Configuring File Screens
  • Configuring Reports
  • Configuring File and Disk Encryption
  • Configuring Bitlocker Encryption
  • Configuring the Network Unlock Feature
  • Configuring Bitlocker Policies
  • Configuring the EFS Recovery Agent
  • Managing EFS and Bitlocker Certificates including Backup and Restore
  • Configuring Advanced Audit Policies
  • Implementing Auditing using Group Policy and AuditPol.exe
  • Creating Expression-based Audit Policies
  • Creating Removable Device Audit Policies

Network Services and Access

  • DNS Zones 
  • Configuring Primary and Secondary Zones
  • Configuring Stub Zones
  • Configuring Conditional Forwards
  • Configuring Zone and Conditional Forward Storage in Active Directory
  • Configuring Zone Delegation
  • Configuring Zone Transfer Settings
  • Configuring Notify Settings
  • Configuring DNS Records
  • Creating and Configuring DNS Resource Records (RR)
  • A, AAAA, PTR, SOA, NS, SRV, CNAME, and MX Records
  • Configuring Zone Scavenging
  • Configuring Record Options including Time To Live (TTL) and Weight
  • Configuring Round Robin
  • Configuring Secure Dynamic Updates
  • Configuring VPN and Routing
  • Installing and Configuring the Remote Access Role
  • Implementing Network Address Translation (NAT)
  • Configuring VPN Settings
  • Configuring Remote Dial-in Settings for Users
  • Configure Routing
  • Configuring Direct Access
  • Implementing Server Requirements
  • Implementing Client Configuration
  • Configuring DNS for Direct Access

Network Policy Server Infrastructure

  • Configuring Network Policy Server (NPS)
  • Configuring RADIUS Server Infrastructures
  • Configuring RADIUS Clients, Accounting
  • RADIUS Templates
  • Configuring NPS Policies & Connection Request Policies
  • Configuring Network Policies for VPN Clients 
  • Multilink and bandwidth allocation, IP filters, encryption, IP addressing
  • NPS templates and NPS policies
  • Configuring Network Access Protection (NAP) 
  • Configuring System Health Validators (SHVs)
  • Configuring NAP enforcement using DHCP and VPN
  • Noncompliant Computers: Isolation and Remediation using DHCP and VPN

Active Directory

  • Service Authentication: Create and Configure Service Accounts
  • Creating and Configuring Group Managed Service Accounts
  • Managed Service Accounts
  • Kerberos Delegation
  • Service Principal Names (SPNs)
  • Domain Controllers
  • Universal Group Membership Caching (UGMC)
  • Configuring a Read-only Domain Controller (RODC)
  • Domain Controller Cloning
  • Active Directory Back up
  • Active Directory and SYSVOL
  • Ways to Optimize an Active Directory Database
  • Cleaning up Metadata
  • Active Directory Snapshots
  • Object- and Container-level Recovery
  • Domain User Password Policy
  • Password Settings Objects (PSOs)
  • Local User Password Policy & Account Lockout Settings

Group Policy

  • Group Policy Processing 
  • Processing Order and Precedence 
  • Blocking of Inheritance
  • Security Filtering and WMI Filtering
  • Loopback & Slow-Link Processing
  • Client-side Extension (CSE) Behavior
  • Group Policy Settings: Software Installation, Folder Redirection
  • Group Policy Settings: Scripts, Administrative Template Settings 
  • Group Policy Settings: Import Security Templates
  • Importing Custom Administrative Template File
  • Converting Administrative Templates using ADMX Migrator
  • Property Filters for Administrative Templates
  • Manage Group Policy Objects (GPOs)
  • Migration Table & Reset Default GPOs
  • Group Policy Preferences (GPP) 
  • Network Drive Mappings & Power Options
  • Settings: Custom Registry, Control Panel, Internet Explorer
  • Deployment: File & Folder, and Shortcut

70-412 Configuring Advanced Windows Server 2012 Services

Network Load Balancing (NLB)

  • NLB Prerequisites & NLB Nodes
  • Configuring Affinity, Port Rules & Cluster Operation Mode
  • Upgrading an NLB Cluster 
  • Failover Clustering & Quorum
  • Cluster Networking
  • Restoring Single Node or Cluster Configuration
  • Cluster Storage & Cluster Aware Updating
  • VM Monitoring & Movement 
  • Live & Quick Migration
  • Storage Migration: Import, Export, and Copy VMs
  • Migrate from P2V and V2V Platforms


File and Storage Solutions

  • Configuring NFS Data Store
  • BranchCache
  • File Classification Infrastructure (FCI) & File Server Resource Manager (FSRM)
  • Dynamic Access Control (DAC)
  • User-Device Claim Types
  • Policy Changes and Staging
  • Performing Access-denied Remediation
  • Configuring File Classification& Storage
  • The iSCSI Target and Initiator
  • Internet Storage Name Server (iSNS)
  • Thin Provisioning and Trim

Business Continuity and Disaster Recovery 

  • Configuring and Managing Backups
  • Configuring Windows Server Backups
  • Windows Online Backups & Role-specific Backups
  • VSS Settings using VSSAdmin
  • System Restore Snapshots
  • Bare Metal Restore (BMR)
  • Windows Recovery Environment (Win RE) & Safe Mode
  • Boot Configuration Data (BCD) Store
  • Configuring Site-level Fault Tolerance
  • Hyper-V Replica, Replica Broker and VMs
  • Multi-site Clustering: Network Settings, Quorum, and Failover Settings 

70-413 Designing and Implementing a Server Infrastructure Plan and Deploying a Server Infrastructure 


Design an Automated Server Installation Strategy

  • Design Considerations: Images & Bare Metal/Virtual Deployment
  • Server Implementation: Windows Assessment & Deployment Kit (ADK)
  • Virtual Server Deployment
  • Configuring Multicast Deployment
  • Multi-site Topology and Distribution Points
  • Configuring a Multi-server Topology
  • Windows Deployment Services (WDS) Servers: Autonomous & Replica
  • Server Upgrade and Migration
  • Role Migration & Migrating Server Roles
  • Migrating Servers across Domains and Forests
  • Server Consolidation Strategy
  • Capacity and Resource Optimization
  • Deploying Virtual Machine Manager Services
  • Virtual Machine Manager Service Templates
  • System Profiles & Capability Profiles
  • Image and Template Libraries
  • File and Storage Services 
  • Planning Considerations: iSCSI SANs, Fibre Channel SANs, 
  • Planning Considerations: Virtual Fibre Channel, Data De-duplication
  • Planning Considerations: Storage Spaces, Storage Pools
  • iSCSI Target Server & Internet Storage Name Server (iSNS)
  • Network File System (NFS)
  • Device Specific Modules (DSMs)

Network Infrastructure Services

  • Dynamic Host Configuration Protocol (DHCP) Solution
  • DHCP Solution: Split Scope, DHCP Failover
  • DHCP & DHCPv6 
  • Failover Clustering & Interoperability
  • DHCP Filtering & DHCP Management Pack
  • Ways to Maintain a DHCP database 
  • Resolution Solution Strategy
  • Secure Name Resolution
  • DNSSEC & DNS Socket Pool
  • Cache Locking & Disjoint Namespaces
  • DNS Interoperability
  • Migration to Application Partitions
  • Single-Label DNS Name Resolution
  • Zone Hierarchy & Zone Delegation
  • IP Address Management Solution
  • IPAM, Group Policy Based, Manual Provisioning
  • Distributed vs. Centralized Placement
  • Role-based Access Control
  • IPAM Auditing & Migrating IPs
  • Monitoring DHCP and DNS Servers




Data Collection for IPAM Design and Implementation of Network Access Services

  • Designing a VPN solution
  • Certificate Deployment, Firewall Configuration
  • Client/Site to site, Bandwidth
  • Protocol Implications
  • VPN Deployment Configurations using Connection Manager Administration Kit (CMAK)
  • Designing a DirectAccess Solution
  • Designing Considerations: Topology & DIrectAccess Deployment
  • Migration from Forefront UAG
  • Scalable Remote Access Solution
  • Configuring Site-to-Site VPN
  • Packet Filters & Packet Tracing
  • Multi-site Remote Access
  • Configuring Remote Access clustered with Network Load Balancing (NLB)
  • Configuring DirectAccess
  • Designing a Network Protection Solution
  • Network Access Protection (NAP) 
  • DHCP, IPSec, VPN, and 802.1x
  • Capacity, Placement of Servers, Firewall
  • Network Policy Server (NPS) & Remediation Network
  • Implement a Network Protection Solution
  • Implement Multi-RADIUS Deployment
  • NAP Enforcement for IPSec and 802.1x
  • Endpoint Protection Client
  • Anti-Malware and Firewall Policies

Designing and Implementing an Active Directory Infrastructure - Logical 

  • Design a Forest and Domain Infrastructure
  • Multi-Forest Architecture, Trusts, Functional Levels
  • Domain Upgrade and Domain Migration
  • Forest Restructure and Hybrid Cloud Services
  • Configuring Domain Rename
  • Kerberos Realm Trusts
  • Group Policy Strategy
  • Inheritance Blocking
  • Enforced Policies
  • Loopback Processing
  • WMI Filtering
  • Site-linked Group Policy Objects (GPOs) 
  • Slowlink Processing & Group Strategies
  • Organizational Unit (OU) Hierarchy
  • Advanced Group Policy Management (AGPM)
  • Active Directory Permission Model
  • Active Directory Object Security & Quotas
  • Delegate of Control Wizard
  • Administrative Tools & Administrative Users (AdminSDHolder)
  • Kerberos Delegation

Design and Implement an Active Directory Infrastructure - Physical

  • Active Directory Sites Topology
  • Proximity of Domain Controllers, Replication Optimization, and Site Link
  • Resolving Active Directory Replication Conflicts
  • Domain Controller Strategy
  • Global Catalog & Operations Master Roles
  • Read-Only Domain Controllers (RODCs)
  • Partial Attribute Set & Domain Controller Cloning
  • RODC, Universal Group Membership Caching (UGMC)
  • DNS, DHCP, and BranchCache
  • Confidential & Filtered Attributes Set
  • Configuring Hash Publication

Designing an Administrative Model

  • Designing an Administrative Model
  • User Rights, Built-in Groups
  • End-user Self-service Portal
  • Designing a delegation of Administration Structure for Microsoft System Center 2012
  • Designing Monitoring Servers using Audit Collection Services (ACS)
  • Performance & Centralized Monitoring and Reporting
  • Optimizing System Center 2012
  • Operations Manager Management Packs
  • Active Directory Automated Remediation
  • Updating Baseline in Virtual Machine Manager
  • Desired Configuration Management (DCM) Baseline
  • Virtual Machine Manager Integration with Operations Manager
  • System Center 2012 for Automatic Remediation into your existing enterprise infrastructure

Planning and Implementing a Highly Available Enterprise Infrastructure

  • Failover Clustering Plan: Multi-node and Multi-site Clustering
  • Design Considerations: Redundant Networks
  • Network Priority & DNS Settings
  • Resource Failover and Failback
  • Heartbeat and Quorum Configuration
  • Storage Placement and Replication
  • Network Load Balancing (NLB)
  • Fault-tolerant Networking
  • Multicast vs. Unicast Configuration
  • Automated Deployment of NLB using Virtual Machine Manager Service Templates
  • Storage Solutions: Storage Spaces and Storage Pools
  • Multi-Replica DFS namespaces
  • Multi-path I/O: Server Core
  • iSCSI Target and iSNS Server 
  • Dynamic Host Configuration Protocol (DHCP) Server
  • Hyper-V Clustering
  • Continuously Available File Shares
  • DFS Namespace Server
  • Generic Application, Script, and Service Clustering 
  • Domain Controller Restore and Cloning
  • Active Directory Object
  • Container Restore using Authoritative Restore and Recycle Bin

Planning and Implementing a Server Virtualization Infrastructure

  • Virtualization Hosts & Environment
  • Hosts, Services, and VMs
  • Self-Service Capabilities
  • Multi-host Libraries
  • Host Resource Optimization
  • Third-party Virtualization Platforms
  • Guest Resource Optimization
  • Smart Page File
  • Dynamic Memory & RemoteFX
  • Virtual Machine Manager Templates
  • Planning and Implementing Virtualization Networking
  • Virtual Machine Manager Logical Networks
  • IP Address and MAC Address 
  • Hyper-V hosts Setting
  • IP Virtualization
  • Virtual Network Optimization
  • Virtualization Storage & Hyper-V Host Storage
  • Stand-alone and Clustered Setup using SMB 2.2 and CSV
  • Hyper-V Guest Storage: Virtual Fibre Channel
  • The iSCSI and Pass-through Disks
  • Live, SAN, and Network Migration between Hyper-V Hosts
  • Managing P2V and V2V
  • Server Virtualization Infrastructure
  • Dynamic & Resource Optimization
  • Operations Manager Integration using PRO Tips
  • Automating VM Software and Configuration Updates
  • Using Service Templates & Maintaining Library Updates

Designing and Implementing Identity and Access Solutions 

  • Designing Certificate Services Infrastructure 
  • Multi-tier Certificate Authority (CA) Hierarchy with Offline Root CA
  • Multiforest CA Deployment
  • Network Device Enrolment
  • Disaster Recovery 
  • Implementing and Managing a Certificate Services Infrastructure
  • Configuring and Managing Offline Root CA
  • Network Device Enrollment Services
  • Online Certificates & Status Protocol Responders
  • Administrator Role Separation
  • Implementing and Managing Trust between Organizations
  • Managing Certificate Templates
  • Deployment, Validation, and Revocation
  • Certificate Deployment and Renewal to Network Devices
  • Configuring Key Archival and Recovery Design
  • Implementing a Federated Identity Solution 
  • Claims-based Authentication
  • Active Directory Lightweight Directory Services (AD LDS)
  • Active Directory Federation Services (ADFS) Certificates
  • Identity Integration with Cloud Services
  • Active Directory Rights Management Services (AD RMS)
  • Trusted User Domains & Publishing Domains
  • Distributed and Archived Rights Policy Template

MCSE Course Features



One Stop Solution!

   Ability to attend missed sessions

    Complete documentation

   Resume preparation

   Certification preparation.

   Interview preparation

   Placement assistance

We Deliver What We Promise!




"What our customers say"

Social Reviews


Justdial-Pimple Sudagar


etlhive-yet5-pimple saudagar

ETLHIVE is a Trademark of Itelligence Infotech Pvt Ltd.   *PMP®, PMBOK, PMI, PgMP, CAPM, PMI-RMP, and PMI-ACP are registered trademarks of the Project Management Institute, Inc. *ITIL®, IT Infrastructure Library, Swirl Logo, Prince2 are registered trademarks of AXELOS Limited.
Online Demo – Selenium : 4pm (2nd Apr) | Salesforce : 1pm (4th Apr) | Python : 9pm (3rd Apr) | Data Science : 9pm (1st Apr) | Tableau : 9pm (3rd Apr) | Data Science : 2pm (4th Apr) | Devops : 2pm (4th Apr) | AWS : 3pm (5th Apr) |