加入 Systematic Facebook 擁躉群  

這個頁面上的內容需要較新版本的 Adobe Flash Player。

取得 Adobe Flash Player


想定期知道最新課程及優惠嗎?
免費訂閱本中心的課程通訊!
觀看課程通訊
Reasonable Spread:
Permission email marketing

課堂錄影隨時睇 10 大優點之時間自由:無論您是夜班或輪班工作,在日間或晚間亦可隨時來上課!而視像會在您到達時才開始播放,亦可按您需要而隨時暫停,不會因遲到或人有三急而錯過課程任何重點!

CompTIA Server+ 認證課程

  • 課程時間
  • 課程簡介
  • 課程特點
  • 認證要求
  • 考試須知
  • 課程內容

推介服務:課堂錄影隨時睇
編號 地點 可預約星期及時間 學費低至 8 折  
AZ1703MV 旺角 一至五:11:30 - 22:30   六及日:10:30 - 21:30   (公眾假期休息) 95 折後只需 $1,881 按此報名
AZ1703OV 觀塘 一至五:13:30 - 22:00   六及日:12:30 - 21:00   (星期三及公眾假期休息) 9 折後只需 $1,782 按此報名
AZ1703PV 北角 一至五:13:30 - 22:00   六及日:12:30 - 21:00   (星期三及公眾假期休息) 9 折後只需 $1,782 按此報名
AZ1703SV 沙田 一至五:13:30 - 22:00   六及日:12:30 - 21:00   (星期三及公眾假期休息) 9 折後只需 $1,782 按此報名
AZ1703YV 屯門 一至五:13:30 - 22:00   六及日:12:30 - 21:00   (星期三及公眾假期休息) 8 折後只需 $1,584 按此報名
* 各政府部門可使用 P Card 付款  
免費試睇: 首 1 小時,請致電與本中心職員預約。 查看各地點電話
旺角 2332-6544
觀塘 3563-8425
北角 3580-1893
沙田 2151-9360
屯門 3523-1560
免費重睇: 學員可於享用時期內於報讀地點不限次數地重看課堂錄影,從而可反覆重溫整個課程!
導師解答: 學員可於觀看某一課堂錄影後提出課堂直接相關的問題,課程導師會樂意為學員以單對單的形式解答!
課時: 18 小時
享用時期: 可於報讀日至 4 星期內觀看整個課程,另加 2 星期備用時期。進度由您控制,可快可慢。
課堂錄影導師: Larry (任教課程清單)
課堂錄影隨時睇: 詳情及示範片段


CompTIA (The Computing Technology Industry Association) 於 1982 年成立,其推行的 Server+ 認證是一套中立的 (Vendor Neutral) 國際認證,目的是要確認您擁有建立、管理、保護與優化各種伺服器的能力。


CompTIA

為何要考取 CompTIA Server+ 認證?

  • 因其中立的特性,通常成為投身 I.T. 界人士首先考取的認證。
  • 全球 50 萬人持有,反映其受歡迎程度。
  • Server+ 認證重視今日與未來的 I.T. 技術需求,如虛擬化數據中心,軟件定義網絡,資訊安全及各式儲存設備及伺服器硬件等等。
  • 領先而中立的認證,會被全球各地的國際級機構重視,並被設定為必要的入職條件。例如 Intel, HP, Dell, IBM 及 Lenovo Partner Network 技術人員便必需持有 CompTIA Server+ 認證。
  • 為進修 Microsoft MCSA / MCSE、Linux LPI、VMware VCA 等等更高級的商業認證作準備。


課程時數: 合共 18 小時 (共 6 堂),共 1 科
適合人士: 任何人士
授課語言: 以廣東話為主,輔以英語
課程筆記: 本中心導師親自編寫英文為主筆記,而部份英文字附有中文對照。


1. 模擬考試題目: 本中心為學員提供約 100 條模擬考試題目,每條考試題目均附有標準答案。
2. 時數適中: 本中心的 CompTIA Server+ 國際認可證書課程時數適中,有 18 小時。令學員能真正了解及掌握課程內容,而又能於 1 個月內考獲 CompTIA Server+ 國際認可證書。
3. Larry Chan 親自教授: Larry 具備了 21 年以上電腦、網絡、數據庫及保安系統的工作經驗,而最近 17 年更於本中心全職教學。
4. Larry Chan 親身編寫筆記: Larry 親自編寫筆記,絕對適合考試及實際管理伺服器之用,令你無須「死鋤」如字典般厚及不適合香港讀書格調的書本。
5. 免費重讀: 傳統課堂學員可於課程結束後三個月內免費重看課堂錄影。

CompTIA 已公佈考生必須通過以下 1 個 CompTIA Server+ 相關科目的考試,便可獲發 CompTIA Server+ 國際認可證書:

考試編號 科目名稱
SK0-004 CompTIA Server+




本中心為 CompTIA 指定的考試試場。報考時請致電本中心,登記欲報考之科目、考試日期及時間 (最快可即日報考)。臨考試前考生須出示身份證及繳付考試費。

考試編號 SK0-004 的考試費為 HK$2,352。

考試題目由澳洲考試中心傳送到你要應考的電腦,考試時以電腦作答。所有考試題目均為英文,而大多數的考試題目為選擇題。作答完成後會立即出現你的分數,結果即考即知!考試不合格便可重新報考,不限次數。欲知道作答時間、題目總數、合格分數等詳細考試資料,可瀏覽本中心網頁
"各科考試分數資料"。




SK0-004 CompTIA Server+ (18 Hours)

1. Server Hardware
1.1 Server Form Factors
1.2 Cable Management Arms
1.3 Tower
1.4 Blade Technology
1.5 Concepts of Server Components
1.6 Power and Cooling Requirements

2. Installing and Configuring Servers
2.1 Installing and Configuring Server Operating Systems
2.2 Determining the Server Role/Purpose
2.3 Boot Sequence
2.4 Disk Preparation
2.5 RAID Types
2.6 RAID 0 (Striped Disks)
2.7 RAID 1
2.8 RAID 3 or 4 (Striped Disks with Dedicated Parity)
2.9 RAID 5 (Striped Disks with Distributed Parity)
2.10 RAID 6 (Striped Disks with Dual Parity)
2.11 RAID 1+0
2.12 RAID 0+1
2.13 RAID Setup
2.14 Partitioning
2.15 Filesystems
2.16 Swap or Page File
2.17 Local Account Setup
2.18 Connecting to the Network
2.19 Joining a Domain/Directory
2.20 Security Considerations
2.21 Installing Features, Roles, Applications, and Drivers
2.22 Performance baselining
2.23 Server Optimization
2.24 Swap or Pagefile Optimization
2.25 Unattended Installations
2.26 Deploying Images and Cloning
2.27 Scripted Installs
2.28 Server Administration Access and Control Method
2.29 Network-Based Operating System Administration
2.30 Purpose and Operation of Virtualization Components
2.31 Management Interface for Virtual Machines
2.32 Hardware Compatibility List
2.33 BIOS/UEFI Compatibility and Support
2.34 CPU Compatibility Support
2.35 Resource Allocation Between Guest and Host

3. Server Maintenance
3.1 Server Roles and Requirements
3.2 Web Server Role
3.3 Application Server Role
3.4 Directory Services Server Role
3.5 Database Server Role
3.6 File Servers Role
3.7 Print Server Role
3.8 Instant Messaging Server
3.9 Mail Server Role
3.10 Routing and Remote Access Service Server Role
3.11 Dynamic Host Configuration Protocol (DHCP) Server Role
3.12 Domain Name System (DNS) Server Role
3.13 Network Time Protocol (NTP) Server Role
3.14 Server Maintenance Techniques
3.15 Compatibility Lists
3.16 Outages and Service-Level Agreements
3.17 Performance Monitoring
3.18 Processes and Services Monitoring
3.19 Hardware Maintenance
3.20 Replace Failed Components
3.21 Preventive Maintenance
3.22 Proper Shutdown Procedures
3.23 Fault Tolerance and High Availability Techniques
3.24 Load Balancing
3.25 Asset Management and Documentation
3.26 Life-Cycle Management
3.27 Inventory
3.28 Documentation
3.29 Recovery Documentation
3.30 Baseline Documentation
3.31 Change Management Policies
3.32 Service-Level Agreement
3.33 Server Configuration Documentation
3.34 Secure Storage of Sensitive Documentation

4. Server Storage Technologies
4.1 Direct Attached Storage (DAS)
4.2 Network-Attached Storage (NAS)
4.3 Storage Area Networks (SANs)
4.4 Fibre Channel
4.5 HBAs and Fabric Switches
4.6 LUN Masking
4.7 iSCSI
4.8 Fibre Channel over Ethernet (FCoE)
4.9 JBOD
4.10 Tape Drive
4.11 Tape Library
4.12 Optical Drive
4.13 Flash, Compact Flash, and USB Drive
4.14 Installing and Deploying Primary Storage Devices
4.15 Disk Specifications
4.16 Interfaces
4.17 Fibre Channel

5. Capacity and Fault Tolerance Requirements
5.1 Calculating Appropriate Storage Capacity and Planning for Future Growth
5.2 Disk Quotas
5.3 Compression
5.4 Capacity Planning Considerations
5.5 Software vs. Hardware RAID
5.6 Configuration Specifications
5.7 Hot-Swap Support and Consequences
5.8 Hot Spare vs. Cold Spare
5.9 Array Controller

6. Securing the Server
6.1 Physical Security Methods and Concepts
6.2 Single-Factor Authentication (SFA)
6.3 Multi-Factor Authentication (MFA) 176
6.4 Mantrap
6.5 RFID
6.6 ID Card
6.7 Biometric
6.8 Keypad
6.9 Access List
6.10 Security Guard
6.11 Security Camera
6.12 Keys and Locks
6.13 Cabinet
6.14 Rack Mount
6.15 Server Chassis/ Tower Server Locks
6.16 Server Hardening Techniques
6.17 Endpoint Security
6.18 Host-based Intrusion Detection System (HIDS)
6.19 Anti-Malware
6.20 Vulnerability Scanners
6.21 Hardware Hardening
6.22 Disabling Unneeded Hardware and Physical Ports/Devices
6.23 BIOS Password
6.24 Disable Wake on LAN (WoL)
6.25 Chassis Locks and Intrusion Detection
6.26 Environmental Controls techniques
6.27 Uninterrupted Power Supply (UPS)
6.28 Power Distribution Unit (PDU)
6.29 Capacity Planning
6.30 Safety
6.31 ESD Protection Procedures
6.32 Proper Lifting Techniques
6.33 Rack Stability

7. Securing Server Data and Network Access
7.1 Basic Network Security Systems and Protocols
7.2 Firewalls
7.3 Network Access Control
7.4 Router Access Control List (ACL)
7.5 NIDS
7.6 Authentication Protocols
7.7 Public Key Infrastructure (PKI)
7.8 SSL and TLS
7.9 Virtual Private Network (VPN)
7.10 Internet Protocol Security (IPsec)
7.11 Virtual Local Area Networks (VLANs)
7.12 Security Zones - DMZ
7.13 Security Zones - Intranet and Extranet
7.14 Security Zones - Public and Private
7.15 Logical Access Control Methods
7.16 Data Security Methods and Secure Storage Disposal
7.17 Storage Media
7.18 Physical Destruction

8. Disaster Recovery
8.1 Disaster Recovery Principles
8.2 Site Types
8.3 Replication Methods
8.4 Continuity of Operations
8.5 Backup
8.6 Snapshot
8.7 Data Restore vs. Operating System Restore
8.8 Backup Media Types
8.9 Media and Restore Best Practices
8.10 Tape Rotation and Retention
8.11 Media Storage Location
8.12 Security Considerations
8.13 Environmental Considerations

9. Troubleshooting
9.1 Troubleshooting Theory and Methodologies
9.2 Identifying the Problem and Determining the Scope
9.3 Question Users/Stakeholders and Identify Changes to the Server/Environment
9.4 Collect Additional Documentation/Logs
9.5 Replicate the Problem as Appropriate
9.6 Perform Backups Before Making Changes
9.7 Establish a Theory of Probable Cause
9.8 Determine Whether There Is a Common Element of Symptom Causing Multiple Problems
9.9 Test the Theory to Determine Cause
9.10 Once Theory Is Confirmed, Determine Next Steps to Resolve Problem
9.11 If Theory Is Not Confirmed, Establish New Theory or Escalate
9.12 Establish a Plan of Action to Resolve the Problem and Notify Impacted Users
9.13 Implement the Solution or Escalate as Appropriate
9.14 Make One Change at a Time and Test/Confirm the Change Has Resolved the Problem
9.15 Reverse the Change If Appropriate and Implement New Change
9.16 Verify Full System Functionality and If Applicable Implement Preventative Measures
9.17 Performing a Root Cause Analysis
9.18 Document Findings, Actions, and Outcomes Throughout the Process
9.19 Common Hardware-related problems
9.20 Common “Operating System Not Found” problems
9.21 Power Supply Failure
9.22 I/O Failure
9.23 Cooling Failur
9.24 Environmental Issues which affects server normal operation


 

更多綜合課程
  法律課程
  • 代理人的法律責任
  • 公司董事和合夥人的法律責任
  • 婚姻的法律責任
  • 遺產繼承的合法權益
  英文課程
  • IPA 拼音:級別 1 2 3 4
  普通話課程
  • 基礎普通話拼音課程 (免費)
  • 進階普通話拼音課程
  • 普通話會話:級別 1 2 3
  西班牙語文課程
  • 級別 1 2 3
  中醫課程
  • 濕疹與皮膚敏感病
  • 暗瘡與色斑 | 鼻敏感與感冒
  • 脫髮與白髮 | 從五官看健康
  攝影課程
  • 攝影初級
  • 攝影中級 (風景專題)
  • 戶外實景攝影實習
  風水命理課程
  • 紫微斗數:級別 1 2 3
  • 子平八字:級別 1 2 3
  • 八字風水:級別 1 2 3
  • 奇門遁甲:級別 1 2 3

這個頁面上的內容需要較新版本的 Adobe Flash Player。

取得 Adobe Flash Player