我整理的微軟認證

 暈,從微軟官方網站查詢微軟認證,居然都是2k的,目前2003早就成爲主流了阿。
爲了大家方便,特意整理如下,希望對大家有用。
href="file:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtml1/01/clip_filelist.xml" rel="File-List" />

微軟專家認證(Microsoft Certified Professional,簡稱MCP

Microsoft Certified Professionals (MCPs) stand apart from other IT personnel. They have demonstrated undeniable expertise with Microsoft products and platforms to colleagues, employers, and—most important—to themselves.

獲得微軟專家認證資格就意味着,微軟承認你已具備較高專業技術水平,能夠運用微軟軟件產品或技術手段爲企業單位商務活動提供所需解決方案。

微軟認證系統管理員(Microsoft Certified Systems Administrator,簡稱MCSA

The Microsoft Certified Systems Administrator (MCSA) certification will advance your career by ensuring that you have the skills to successfully manage and troubleshoot system environments running on the Microsoft Windows operating system.

獲得微軟認證系統管理員資格就意味着,微軟承認您已具備較高專業技術水準,能夠實施、管理和檢修當前基於微軟Windows2000Windows .NET服務器平臺的網絡與系統環境。

 

Exam 1 Installing, Configuring, and Administering Microsoft Windows XP Professional

Installing Windows XP Professional

²        Perform and troubleshoot an attended installation of Windows XP Professional.

²        Perform and troubleshoot an unattended installation of Windows XP Professional.

²        Upgrade from a previous version of Windows to Windows XP Professional.

²        Perform post-installation updates and product activation.

²        Troubleshoot failed installations.

Implementing and Conducting Administration of Resources

²        Monitor, manage, and troubleshoot access to files and folders.

²        Manage and troubleshoot access to shared folders.

²        Connect to local and network print devices.

²        Configure and manage file systems.

²        Manage and troubleshoot access to and synchronization of offline files.

Implementing, Managing, Monitoring, and Troubleshooting Hardware Devices and Drivers

²        Implement, manage, and troubleshoot disk devices.

²        Implement, manage, and troubleshoot display devices.

²        Configure Advanced Configuration Power Interface (ACPI).

²        Implement, manage, and troubleshoot input and output (I/O) devices.

²        Manage and troubleshoot drivers and driver signing.

²        Monitor and configure multiprocessor computers.

Monitoring and Optimizing System Performance and Reliability

²        Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

²        Manage, monitor, and optimize system performance for mobile users.

²        Restore and back up the operating system, System State data, and user data.

²        Configuring and Troubleshooting the Desktop Environment

²        Configure and manage user profiles and desktop settings.

²        Configure support for multiple languages or multiple locations.

²        Manage applications by using Windows Installer packages.

Configuring and Troubleshooting the Desktop Environment

²        Configure and troubleshoot the TCP/IP protocol.

²        Connect to computers by using dial-up networking.

²        Connect to resources by using Internet Explorer.

²        Configure, manage, and implement Internet Information Services (IIS).

²        Configure, manage, and troubleshoot Remote Desktop and Remote Assistance.

²        Configure, manage, and troubleshoot an Internet Connection Firewall (ICF).

Implementing, Managing, and Troubleshooting Network Protocols and Services

Configuring, Managing, and Troubleshooting Security

²        Configure, manage, and troubleshoot Encrypting File System (EFS).

²        Configure, manage, and troubleshoot a security configuration and local security policy.

²        Configure, manage, and troubleshoot local user and group accounts.

²        Configure, manage, and troubleshoot Internet Explorer security settings.

²        Connect to resources by using Internet Explorer.

Exam 2 Managing and Maintaining a Windows Server 2003 Environment

Managing and Maintaining Physical and Logical Devices

²        Manage basic disks and dynamic disks.

²        Monitor server hardware. Tools might include Device Manager, the Hardware Troubleshooting Wizard, and appropriate Control Panel items.

²        Optimize server disk performance.

²        Troubleshoot server hardware devices.

²        Install and configure server hardware devices.

Managing Users, Computers, and Groups

²        Manage local, roaming, and mandatory user profiles.

²        Create and manage computer accounts in an Active Directory environment.

²        Create and manage user accounts.

²        Troubleshoot computer accounts.

²        Troubleshoot user accounts.

²        Troubleshoot user authentication issues.

Managing and Maintaining Access to Resources

²        Configure access to shared folders.

²        Troubleshoot Terminal Services.

²        Configure file system permissions.

²        Troubleshoot access to files and shared folders.

Managing and Maintaining a Server Environment

²        Monitor and analyze events. Tools might include Event Viewer and System Monitor.

²        Manage software update infrastructure.

²        Manage software site licensing.

²        Manage servers remotely.

²        Troubleshoot print queues.

²        Monitor system performance.

²        Monitor file and print servers. Tools might include Task Manager, Event Viewer, and System Monitor.

²        Monitor and optimize a server environment for application performance.

²        Manage a Web server.

Managing and Implementing Disaster Recovery

²        Perform system recovery for a server.

²        Manage backup procedures.

²        Recover from server hardware failure.

²        Restore backup data.

²        Schedule backup jobs.

Exam 3 Implementing, Managing, and Maintaining a Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining IP Addressing

²        Configure TCP/IP addressing on a server computer.

²        Manage DHCP.

²        Troubleshoot TCP/IP addressing.

²        Troubleshoot DHCP.

Implementing, Managing, and Maintaining Name Resolution

²        Install and configure the DNS Server service.

²        Manage DNS.

²        Monitor DNS. Tools might include System Monitor, Event Viewer, Replication Monitor, and DNS debug logs.

Implementing, Managing, and Maintaining Network Security

²        Implement secure network administration procedures.

²        Install and configure software update infrastructure.

²        Monitor network protocol security. Tools might include the IP Security Monitor Microsoft Management Console (MMC) snap-in and Kerberos support tools.

²        Troubleshoot network protocol security. Tools might include the IP Security Monitor MMC snap-in, Event Viewer, and Network Monitor.

Implementing, Managing, and Maintaining Routing and Remote Access

²        Configure Routing and Remote Access user authentication.

²        Manage remote access.

²        Manage TCP/IP routing.

²        Implement secure access between private networks.

²        Troubleshoot user access to remote access services.

²        Troubleshoot Routing and Remote Access routing.

Maintaining a Network Infrastructure

²        Monitor network traffic. Tools might include Network Monitor and System Monitor.

²        Troubleshoot connectivity to the Internet.

²        Troubleshoot server services.

Exam 4Installing, Configuring, and Administering Microsoft SQL Server 2000 Enterprise Edition

Installing and Configuring SQL Server 2000

²        Install SQL Server 2000. Considerations include clustering, default collation, file locations, number of instances, and service accounts.

²        Upgrade to SQL Server 2000.

²        Create a linked server.

²        Configure SQL Mail and SQLAgentMail.

²        Configure network libraries.

²        Troubleshoot failed installations.

Creating SQL Server 2000 Databases

²        Configure database options for performance. Considerations include capacity, network connectivity, physical drive configurations, and storage locations.

²        Attach and detach databases.

²        Create and alter databases.

²        Create and manage objects. Objects include constraints, indexes, stored procedures, triggers, and views.

Managing, Monitoring, and Troubleshooting SQL Server 2000 Databases

²        Optimize database performance. Considerations include indexing, locking, and recompiling.

²        Optimize data storage.

²        Modify the database schema.

²        Perform disaster recovery operations.

²        Perform integrity checks. Methods include configuring the Database Maintenance Plan Wizard and using the Database Consistency Checker (DBCC).

²        Troubleshoot transactions and locking by using SQL Profiler, SQL Server Enterprise Manager, or Transact-SQL.

Extracting and Transforming Data with SQL Server 2000

²        Set up IIS virtual directories to support XML.

²        Import and export data. Methods include the Bulk Insert task, the bulk copy program, Data Transformation Services (DTS), and heterogeneous queries.

²        Develop and manage DTS packages.

²        Manage linked servers.

²        Convert data types.

²        Configure, maintain, and troubleshoot replication services.

Managing and Monitoring SQL Server 2000 Security

Configure mixed security modes or Windows Authentication. Considerations include client connectivity, client operating system, and security infrastructure.

²        Create and manage log ons.

²        Create and manage database users.

²        Create and manage security roles. Roles include application, database, and server.

²        Enforce and manage security by using stored procedures, triggers, views, and user-defined functions.

²        Set permissions in a database. Considerations include object permissions, object ownership, and statement permissions.

²        Manage security auditing. Methods include SQL Profiler and C2 auditing.

Managing, Monitoring, and Troubleshooting SQL Server 2000

²        Create, manage, and troubleshoot SQL Server Agent jobs.

²        Configure alerts and operators by using SQL Server Agent.

²        Optimize hardware resource usage. Resources include CPU, disk I/O, and memory.

²        Optimize and troubleshoot SQL Server system activity. Activities include cache hits, connections, locks, memory allocation, recompilation, and transactional throughput.

 

 

微軟認證系統工程師(Microsoft Certified Systems Engineer,簡稱MCSE

Earn the Microsoft Certified Systems Engineer (MCSE) certification and prove your expertise in designing and implementing the infrastructure for business solutions based on the Microsoft Windows 2000 platform and Windows Server System.

獲得微軟認證系統工程師資格就意味着,微軟承認您已具備較高專業技術水平,能夠分析商業需求,並使用微軟2000系列平臺和微軟服務器軟件來設計並實現商務解決方案的基礎架構。微軟認證系統工程師是這方面最爲重要的認證資格。

Exam 1 Installing, Configuring, and Administering Microsoft Windows XP Professional

Installing Windows XP Professional

²        Perform and troubleshoot an attended installation of Windows XP Professional.

²        Perform and troubleshoot an unattended installation of Windows XP Professional.

²        Upgrade from a previous version of Windows to Windows XP Professional.

²        Perform post-installation updates and product activation.

²        Troubleshoot failed installations.

Implementing and Conducting Administration of Resources

²        Monitor, manage, and troubleshoot access to files and folders.

²        Manage and troubleshoot access to shared folders.

²        Connect to local and network print devices.

²        Configure and manage file systems.

²        Manage and troubleshoot access to and synchronization of offline files.

Implementing, Managing, Monitoring, and Troubleshooting Hardware Devices and Drivers

²        Implement, manage, and troubleshoot disk devices.

²        Implement, manage, and troubleshoot display devices.

²        Configure Advanced Configuration Power Interface (ACPI).

²        Implement, manage, and troubleshoot input and output (I/O) devices.

²        Manage and troubleshoot drivers and driver signing.

²        Monitor and configure multiprocessor computers.

Monitoring and Optimizing System Performance and Reliability

²        Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

²        Manage, monitor, and optimize system performance for mobile users.

²        Restore and back up the operating system, System State data, and user data.

²        Configuring and Troubleshooting the Desktop Environment

²        Configure and manage user profiles and desktop settings.

²        Configure support for multiple languages or multiple locations.

²        Manage applications by using Windows Installer packages.

Configuring and Troubleshooting the Desktop Environment

²        Configure and troubleshoot the TCP/IP protocol.

²        Connect to computers by using dial-up networking.

²        Connect to resources by using Internet Explorer.

²        Configure, manage, and implement Internet Information Services (IIS).

²        Configure, manage, and troubleshoot Remote Desktop and Remote Assistance.

²        Configure, manage, and troubleshoot an Internet Connection Firewall (ICF).

Implementing, Managing, and Troubleshooting Network Protocols and Services

Configuring, Managing, and Troubleshooting Security

²        Configure, manage, and troubleshoot Encrypting File System (EFS).

²        Configure, manage, and troubleshoot a security configuration and local security policy.

²        Configure, manage, and troubleshoot local user and group accounts.

²        Configure, manage, and troubleshoot Internet Explorer security settings.

²        Connect to resources by using Internet Explorer.

Exam 2 Managing and Maintaining a Windows Server 2003 Environment

Managing and Maintaining Physical and Logical Devices

²        Manage basic disks and dynamic disks.

²        Monitor server hardware. Tools might include Device Manager, the Hardware Troubleshooting Wizard, and appropriate Control Panel items.

²        Optimize server disk performance.

²        Troubleshoot server hardware devices.

²        Install and configure server hardware devices.

Managing Users, Computers, and Groups

²        Manage local, roaming, and mandatory user profiles.

²        Create and manage computer accounts in an Active Directory environment.

²        Create and manage user accounts.

²        Troubleshoot computer accounts.

²        Troubleshoot user accounts.

²        Troubleshoot user authentication issues.

Managing and Maintaining Access to Resources

²        Configure access to shared folders.

²        Troubleshoot Terminal Services.

²        Configure file system permissions.

²        Troubleshoot access to files and shared folders.

Managing and Maintaining a Server Environment

²        Monitor and analyze events. Tools might include Event Viewer and System Monitor.

²        Manage software update infrastructure.

²        Manage software site licensing.

²        Manage servers remotely.

²        Troubleshoot print queues.

²        Monitor system performance.

²        Monitor file and print servers. Tools might include Task Manager, Event Viewer, and System Monitor.

²        Monitor and optimize a server environment for application performance.

²        Manage a Web server.

Managing and Implementing Disaster Recovery

²        Perform system recovery for a server.

²        Manage backup procedures.

²        Recover from server hardware failure.

²        Restore backup data.

²        Schedule backup jobs.

Exam 3 Implementing, Managing, and Maintaining a Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining IP Addressing

²        Configure TCP/IP addressing on a server computer.

²        Manage DHCP.

²        Troubleshoot TCP/IP addressing.

²        Troubleshoot DHCP.

Implementing, Managing, and Maintaining Name Resolution

²        Install and configure the DNS Server service.

²        Manage DNS.

²        Monitor DNS. Tools might include System Monitor, Event Viewer, Replication Monitor, and DNS debug logs.

Implementing, Managing, and Maintaining Network Security

²        Implement secure network administration procedures.

²        Install and configure software update infrastructure.

²        Monitor network protocol security. Tools might include the IP Security Monitor Microsoft Management Console (MMC) snap-in and Kerberos support tools.

²        Troubleshoot network protocol security. Tools might include the IP Security Monitor MMC snap-in, Event Viewer, and Network Monitor.

Implementing, Managing, and Maintaining Routing and Remote Access

²        Configure Routing and Remote Access user authentication.

²        Manage remote access.

²        Manage TCP/IP routing.

²        Implement secure access between private networks.

²        Troubleshoot user access to remote access services.

²        Troubleshoot Routing and Remote Access routing.

Maintaining a Network Infrastructure

²        Monitor network traffic. Tools might include Network Monitor and System Monitor.

²        Troubleshoot connectivity to the Internet.

²        Troubleshoot server services.

Exam 4Installing, Configuring, and Administering Microsoft SQL Server 2000 Enterprise Edition

Installing and Configuring SQL Server 2000

²        Install SQL Server 2000. Considerations include clustering, default collation, file locations, number of instances, and service accounts.

²        Upgrade to SQL Server 2000.

²        Create a linked server.

²        Configure SQL Mail and SQLAgentMail.

²        Configure network libraries.

²        Troubleshoot failed installations.

Creating SQL Server 2000 Databases

²        Configure database options for performance. Considerations include capacity, network connectivity, physical drive configurations, and storage locations.

²        Attach and detach databases.

²        Create and alter databases.

²        Create and manage objects. Objects include constraints, indexes, stored procedures, triggers, and views.

Managing, Monitoring, and Troubleshooting SQL Server 2000 Databases

²        Optimize database performance. Considerations include indexing, locking, and recompiling.

²        Optimize data storage.

²        Modify the database schema.

²        Perform disaster recovery operations.

²        Perform integrity checks. Methods include configuring the Database Maintenance Plan Wizard and using the Database Consistency Checker (DBCC).

²        Troubleshoot transactions and locking by using SQL Profiler, SQL Server Enterprise Manager, or Transact-SQL.

Extracting and Transforming Data with SQL Server 2000

²        Set up IIS virtual directories to support XML.

²        Import and export data. Methods include the Bulk Insert task, the bulk copy program, Data Transformation Services (DTS), and heterogeneous queries.

²        Develop and manage DTS packages.

²        Manage linked servers.

²        Convert data types.

²        Configure, maintain, and troubleshoot replication services.

Managing and Monitoring SQL Server 2000 Security

Configure mixed security modes or Windows Authentication. Considerations include client connectivity, client operating system, and security infrastructure.

²        Create and manage log ons.

²        Create and manage database users.

²        Create and manage security roles. Roles include application, database, and server.

²        Enforce and manage security by using stored procedures, triggers, views, and user-defined functions.

²        Set permissions in a database. Considerations include object permissions, object ownership, and statement permissions.

²        Manage security auditing. Methods include SQL Profiler and C2 auditing.

Managing, Monitoring, and Troubleshooting SQL Server 2000

²        Create, manage, and troubleshoot SQL Server Agent jobs.

²        Configure alerts and operators by using SQL Server Agent.

²        Optimize hardware resource usage. Resources include CPU, disk I/O, and memory.

²        Optimize and troubleshoot SQL Server system activity. Activities include cache hits, connections, locks, memory allocation, recompilation, and transactional throughput.

Exam 5Planning and Maintaining a Windows Server 2003 Network Infrastructure

Planning and Implementing Server Roles and Server Security

²        Configure security for servers that are assigned specific roles.

²        Plan a secure baseline installation.

²        Plan security for servers that are assigned specific roles. Roles might include domain controllers, Web servers, database servers, and mail servers.

²        Evaluate and select the operating system to install on computers in an enterprise.

Planning, Implementing, and Maintaining a Network Infrastructure

²        Plan a TCP/IP network infrastructure strategy.

²        Plan and modify a network topology.

²        Plan an Internet connectivity strategy.

²        Plan network traffic monitoring. Tools might include Network Monitor and System Monitor.

²        Troubleshoot connectivity to the Internet.

²        Troubleshoot TCP/IP addressing.

²        Plan a host name resolution strategy.

²        Plan a NetBIOS name resolution strategy.

²        Troubleshoot host name resolution.

Planning, Implementing, and Maintaining Routing and Remote Access

²        Plan a routing strategy.

²        Plan security for remote access users.

²        Implement secure access between private networks.

²        Troubleshoot TCP/IP routing. Tools might include the route, tracert, ping, pathping, and netsh commands and Network Monitor.

Planning, Implementing, and Maintaining Server Availability

²        Plan services for high availability.

²        Identify system bottlenecks, including memory, processor, disk, and network related bottlenecks.

²        Implement a cluster server.

²        Manage Network Load Balancing. Tools might include the Network Load Balancing Monitor Microsoft Management Console (MMC) snap-in and the WLBS cluster control utility.

²        Plan a backup and recovery strategy.

Planning and Maintaining Network Security

²        Configure network protocol security.

²        Configure security for data transmission.

²        Plan for network protocol security.

²        Plan secure network administration methods.

²        Plan security for wireless networks.

²        Plan security for data transmission.

²        Troubleshoot security for data transmission. Tools might include the IP Security Monitor MMC snap-in and the Resultant Set of Policy (RSoP) MMC snap-in.

Planning, Implementing, and Maintaining Security Infrastructure.

²        Configure Active Directory directory service for certificate publication.

²        Plan a public key infrastructure (PKI) that uses Certificate Services.

²        Plan a framework for planning and implementing security.

²        Plan a security update infrastructure. Tools might include Microsoft Baseline Security Analyzer and Microsoft Software Update Services.

Exam 6Planning, Implementing, and Maintaining a Windows Server 2003 Active Directory Infrastructure

Planning and Implementing an Active Directory Infrastructure

²        Plan a strategy for placing global catalog servers.

²        Plan flexible operations master role placement.

²        Implement an Active Directory directory service forest and domain structure.

²        Implement an Active Directory site topology.

²        Plan an administrative delegation strategy.

Managing and Maintaining an Active Directory Infrastructure

²        Manage an Active Directory forest and domain structure.

²        Manage an Active Directory site.

²        Monitor Active Directory replication failures. Tools might include Replication Monitor, Event Viewer, and support tools.

²        Restore Active Directory directory services.

²        Troubleshoot Active Directory.

Planning and Implementing User, Computer, and Group Strategies

²        Plan a security group strategy.

²        Plan a user authentication strategy.

²        Plan an OU structure.

²        Implement an OU structure.

Planning and Implementing Group Policy

²        Plan Group Policy strategy.

²        Configure the user environment by using Group Policy.

²        Deploy a computer environment by using Group Policy.

Managing and Maintaining Group Policy

²        Troubleshoot issues related to Group Policy application. deployment. Tools might include RSoP and the gpresult command.

²        Maintain installed software by using Group Policy.

Exam 7Designing Security for a Windows Server 2003 Network

Creating the Conceptual Design for Network Infrastructure Security by Gathering and Analyzing Business and Technical Requirements

²        Analyze business requirements for designing security. Considerations include existing policies and procedures, sensitivity of data, cost, legal requirements, end-user impact, interoperability, maintainability, scalability, and risk.

²        Design a framework for designing and implementing security. The framework should include prevention, detection, isolation, and recovery.

²        Analyze technical constraints when designing security.

Creating the Logical Design for Network Infrastructure Security

²        Design a public key infrastructure (PKI) that uses Certificate Services.

²        Design a logical authentication strategy.

²        Design security for network management.

²        Design a security update infrastructure.

Creating the Physical Design for Network Infrastructure Security

²        Design network infrastructure security.

²        Design security for wireless networks.

²        Design user authentication for Internet Information Services (IIS).

²        Design security for Internet Information Services (IIS).

²        Design security for communication between networks.

²        Design security for communication with external organizations.

²        Design security for servers that have specific roles. Roles include domain controller, network infrastructure server, file server, IIS server, terminal server, and POP3 mail server.

Designing an Access Control Strategy for Data

²        Design an access control strategy for directory services.

²        Design an access control strategy for files and folders.

²        Design an access control strategy for the registry.

Creating the Physical Design for Client Infrastructure Security

²        Design a client authentication strategy.

²        Design a security strategy for client remote access.

²        Design a strategy for securing client computers. Considerations include desktop and portable computers.

 

微軟認證應用程序開發專家(MCAD

Now is the time to validate your Microsoft .NET Framework 1.0 and Microsoft .NET Framework 1.1 developer skills with the Microsoft Certified Application Developer (MCAD) for Microsoft .NET credential. MCAD candidates are required to pass two core exams and one elective exam in an area of specialization. See the table that follows for a complete list of exams and related training resources.

獲取能夠幫助您以終極速度建立廣泛應用程序的相關培訓,並藉助面向Microsoft .NET的最新技術認證-微軟認證應用程序開發專家(MCAD)證書來證明您所擁有的這些專業技能。

Exam 1Developing and Implementing Web Applications with Microsoft Visual C# .NET and Microsoft Visual Studio .NET

Creating User Services

²        Create ASP.NET pages.

²        Add Web server controls, HTML server controls, user controls, and HTML code to ASP.NET pages.

²        Implement navigation for the user interface.

²        Implement error handling in the user interface.

²        Implement online user assistance.

²        Incorporate existing code into ASP.NET pages.

²        Display and update data.

²        Instantiate and invoke Web services or components.

²        Implement globalization.

²        Handle events.

²        Implement accessibility features.

Creating and Managing Components and .NET Assemblies

²        Create and modify a .NET assembly.

²        Create Web custom controls and Web user controls.

Consuming and Manipulating Data

²        Access and manipulate data from a Microsoft SQL Server database by creating and using ad hoc queries and stored procedures.

²        Access and manipulate data from a data store. Data stores include relational databases, XML documents, and flat files. Methods include XML techniques and ADO.NET.

²        Handle data errors.

Testing and Debugging

²        Create a unit test plan.

²        Implement tracing.

²        Debug, rework, and resolve defects in code.

Deploying a Web Application

²        Plan the deployment of a Web application.

²        Create a setup program that installs a Web application and allows for the application to be uninstalled.

²        Deploy a Web application.

²        Add assemblies to the global assembly cache.

Maintaining and Supporting a Web Application

²        Optimize the performance of a Web application.

²        Diagnose and resolve errors and issues.

Configuring and Securing a Web Application

²        Configure a Web application.

²        Configure security for a Web application.

²        Configure authorization. Authorization methods include file-based methods and URL-based methods.

²        Configure and implement caching. Caching types include output, fragment, and data.

²        Configure and implement session state in various topologies such as a Web garden and a Web farm.

²        Install and configure server services.

Exam 2 Developing and Implementing Windows-based Applications with Microsoft Visual C# .NET and Microsoft Visual Studio .NET

Creating User Services

²        Create a Windows Form by using the Windows Forms Designer.

²        Add controls to a Windows Form.

²        Implement navigation for the user interface (UI).

²        Validate user input.

²        Implement error handling in the UI.

²        Implement online user assistance.

²        Display and update data.

²        Instantiate and invoke a Web service or component.

²        Implement globalization.

²        Create, implement, and handle events.

²        Implement print capability.

²        Implement accessibility features.

Creating and Managing Components and .NET Assemblies

²        Create and modify a .NET assembly.

²        Create a Windows control.

Consuming and Manipulating Data

²        Access and manipulate data from a Microsoft SQL Server database by creating and using ad hoc queries and stored procedures.

²        Access and manipulate data from a data store. Data stores include relational databases, XML documents, and flat files. Methods include XML techniques and ADO .NET.

²        Handle data errors.

Testing and Debugging

²        Create a unit test plan.

²        Implement tracing.

²        Debug, rework, and resolve defects in code.

Deploying a Windows-based Application

²        Plan the deployment of a Windows-based application.

²        Create a setup program that installs an application and allows for the application to be uninstalled.

²        Deploy a Windows-based application.

²        Add assemblies to the Global Assembly Cache.

²        Verify security policies for a deployed application.

Maintaining and Supporting a Windows-based Application

²        Optimize the performance of a Windows-based application.

²        Diagnose and resolve errors and issues.

Configuring and Securing a Windows-based Application

²        Configure a Windows-based application.

²        Configure security for a Windows-based application.

²        Configure authorization.

Exam 3Developing XML Web Services and Server Components with Microsoft Visual C# and the Microsoft .NET Framework

Creating and Managing Microsoft Windows Services, Serviced Components, .NET Remoting Objects, and XML Web Services

²        Create and manipulate a Windows service.

²        Create and consume a serviced component.

²        Create and consume a .NET Remoting object.

²        Create and consume an XML Web service.

²        Implement security for a Windows service, a serviced component, a .NET Remoting object, and an XML Web service.

²        Access unmanaged code from a Windows service, a serviced component, a .NET Remoting object, and an XML Web service.

Consuming and Manipulating Data

²        Access and manipulate data from a Microsoft SQL Server database by creating and using ad hoc queries and stored procedures.

²        Create and manipulate DataSets.

²        Access and manipulate XML data.

Testing and Debugging

²        Create a unit test plan.

²        Implement tracing.

²        Instrument and debug a Windows service, a serviced component, a .NET Remoting object, and an XML Web service.

²        Use interactive debugging.

²        Log test results.

Deploying Windows Services, Serviced Components, .NET Remoting Objects, and XML Web Services

²        Plan the deployment of and deploy a Windows service, a serviced component, a .NET Remoting object, and an XML Web service.

²        Create a setup program that installs a Windows service, a serviced component, a .NET Remoting object, and an XML Web service.

²        Publish an XML Web service.

²        Configure client computers and servers to use a Windows service, a serviced component, a .NET Remoting object, and an XML Web service.

²        Plan, configure, and deploy side-by-side deployments and applications.

²        Configure security for a Windows service, a serviced component, a .NET Remoting object, and an XML Web service.

Exam 4Designing and Implementing Databases with Microsoft SQL Server 2000 Enterprise Edition

Developing a Logical Data Model

²        Define entities. Considerations include entity composition and normalization.

²        Design entity keys. Considerations include FOREIGN KEY constraints, PRIMARY KEY constraints, and UNIQUE constraints.

²        Design attribute domain integrity. Considerations include CHECK constraints, data types, and nullability.

Implementing the Physical Database

²        Create and alter databases. Considerations include file groups, file placement, growth strategy, and space requirements.

²        Create and alter database objects. Objects include constraints, indexes, stored procedures, tables, triggers, user-defined functions, and views.

²        Alter database objects to support replication and partitioned views.

²        Troubleshoot failed object creation.

Retrieving and Modifying Data

²        Import and export data. Methods include the bulk copy program, the Bulk Insert task, and Data Transformation Services (DTS).

²        Manipulate heterogeneous data. Methods include linked servers, OPENQUERY, OPENROWSET, and OPENXML.

²        Retrieve, filter, group, summarize, and modify data by using Transact-SQL.

²        Manage result sets by using cursors and Transact-SQL. Considerations include locking models and appropriate usage.

²        Extract data in XML format. Considerations include output format and XML schema structure.

Programming Business Logic

²        Manage data manipulation by using stored procedures, transactions, triggers, user-defined functions, and views.

²        Enforce procedural business logic by using stored procedures, transactions, triggers, user-defined functions, and views.

²        Troubleshoot and optimize programming objects. Objects include stored procedures, transactions, triggers, user-defined functions, and views.

Tuning and Optimizing Data Access

²        Analyze the query execution plan. Considerations include query processor operations and steps.

²        Capture, analyze, and replay SQL Profiler traces. Considerations include lock detection, performance tuning, and trace flags.

²        Create and implement indexing strategies. Considerations include clustered index, covering index, indexed views, nonclustered index, placement, and statistics.

²        Improve index use by using the Index Tuning Wizard.

²        Monitor and troubleshoot database activity by using SQL Profiler.

Designing a Database Security Plan

²        Control data access by using stored procedures, triggers, user-defined functions, and views.

²        Define object-level security including column-level permissions by using GRANT, REVOKE, and DENY.

²        Create and manage application roles.

 

微軟認證解決方案開發專家(Microsoft Certified Solution Developer,簡稱MCSD

The Microsoft Certified Solution Developer (MCSD) for Microsoft .NET credential is the top-level certification for advanced developers who design and develop leading-edge enterprise solutions using Microsoft development tools and technologies in addition to the Microsoft .NET Framework 1.0 and Microsoft .NET Framework 1.1.

獲得微軟認證解決方案開發專家資格就意味着,微軟承認您已具備較高專業技術水平,能夠運用微軟開發工具、技術手段和微軟Windows體系結構來設計開發代表一流水平的商務解決方案。

Exam 1Developing and Implementing Web Applications with Microsoft Visual C# .NET and Microsoft Visual Studio .NET

Creating User Services

²        Create ASP.NET pages.

²        Add Web server controls, HTML server controls, user controls, and HTML code to ASP.NET pages.

²        Implement navigation for the user interface.

²        Implement error handling in the user interface.

²        Implement online user assistance.

²        Incorporate existing code into ASP.NET pages.

²        Display and update data.

²        Instantiate and invoke Web services or components.

²        Implement globalization.

²        Handle events.

²        Implement accessibility features.

Creating and Managing Components and .NET Assemblies

²        Create and modify a .NET assembly.

²        Create Web custom controls and Web user controls.

Consuming and Manipulating Data

²        Access and manipulate data from a Microsoft SQL Server database by creating and using ad hoc queries and stored procedures.

²        Access and manipulate data from a data store. Data stores include relational databases, XML documents, and flat files. Methods include XML techniques and ADO.NET.

²        Handle data errors.

Testing and Debugging

²        Create a unit test plan.

²        Implement tracing.

²        Debug, rework, and resolve defects in code.

Deploying a Web Application

²        Plan the deployment of a Web application.

²        Create a setup program that installs a Web application and allows for the application to be uninstalled.

²        Deploy a Web application.

²        Add assemblies to the global assembly cache.

Maintaining and Supporting a Web Application

²        Optimize the performance of a Web application.

²        Diagnose and resolve errors and issues.

Configuring and Securing a Web Application

²        Configure a Web application.

²        Configure security for a Web application.

²        Configure authorization. Authorization methods include file-based methods and URL-based methods.

²        Configure and implement caching. Caching types include output, fragment, and data.

²        Configure and implement session state in various topologies such as a Web garden and a Web farm.

²        Install and configure server services.

Exam 2 Developing and Implementing Windows-based Applications with Microsoft Visual C# .NET and Microsoft Visual Studio .NET

Creating User Services

²        Create a Windows Form by using the Windows Forms Designer.

²        Add controls to a Windows Form.

²        Implement navigation for the user interface (UI).

²        Validate user input.

²        Implement error handling in the UI.

²        Implement online user assistance.

²        Display and update data.

²        Instantiate and invoke a Web service or component.

²        Implement globalization.

²        Create, implement, and handle events.

²        Implement print capability.

²        Implement accessibility features.

Creating and Managing Components and .NET Assemblies

²        Create and modify a .NET assembly.

²        Create a Windows control.

Consuming and Manipulating Data

²        Access and manipulate data from a Microsoft SQL Server database by creating and using ad hoc queries and stored procedures.

²        Access and manipulate data from a data store. Data stores include relational databases, XML documents, and flat files. Methods include XML techniques and ADO .NET.

²        Handle data errors.

Testing and Debugging

²        Create a unit test plan.

²        Implement tracing.

²        Debug, rework, and resolve defects in code.

Deploying a Windows-based Application

²        Plan the deployment of a Windows-based application.

²        Create a setup program that installs an application and allows for the application to be uninstalled.

²        Deploy a Windows-based application.

²        Add assemblies to the Global Assembly Cache.

²        Verify security policies for a deployed application.

Maintaining and Supporting a Windows-based Application

²        Optimize the performance of a Windows-based application.

²        Diagnose and resolve errors and issues.

Configuring and Securing a Windows-based Application

²        Configure a Windows-based application.

²        Configure security for a Windows-based application.

²        Configure authorization.

Exam 3Developing XML Web Services and Server Components with Microsoft Visual C# and the Microsoft .NET Framework

Creating and Managing Microsoft Windows Services, Serviced Components, .NET Remoting Objects, and XML Web Services

²        Create and manipulate a Windows service.

²        Create and consume a serviced component.

²        Create and consume a .NET Remoting object.

²        Create and consume an XML Web service.

²        Implement security for a Windows service, a serviced component, a .NET Remoting object, and an XML Web service.

²        Access unmanaged code from a Windows service, a serviced component, a .NET Remoting object, and an XML Web service.

Consuming and Manipulating Data

²        Access and manipulate data from a Microsoft SQL Server database by creating and using ad hoc queries and stored procedures.

²        Create and manipulate DataSets.

²        Access and manipulate XML data.

Testing and Debugging

²        Create a unit test plan.

²        Implement tracing.

²        Instrument and debug a Windows service, a serviced component, a .NET Remoting object, and an XML Web service.

²        Use interactive debugging.

²        Log test results.

Deploying Windows Services, Serviced Components, .NET Remoting Objects, and XML Web Services

²        Plan the deployment of and deploy a Windows service, a serviced component, a .NET Remoting object, and an XML Web service.

²        Create a setup program that installs a Windows service, a serviced component, a .NET Remoting object, and an XML Web service.

²        Publish an XML Web service.

²        Configure client computers and servers to use a Windows service, a serviced component, a .NET Remoting object, and an XML Web service.

²        Plan, configure, and deploy side-by-side deployments and applications.

²        Configure security for a Windows service, a serviced component, a .NET Remoting object, and an XML Web service.

Exam 4Designing and Implementing Databases with Microsoft SQL Server 2000 Enterprise Edition

Developing a Logical Data Model

²        Define entities. Considerations include entity composition and normalization.

²        Design entity keys. Considerations include FOREIGN KEY constraints, PRIMARY KEY constraints, and UNIQUE constraints.

²        Design attribute domain integrity. Considerations include CHECK constraints, data types, and nullability.

Implementing the Physical Database

²        Create and alter databases. Considerations include file groups, file placement, growth strategy, and space requirements.

²        Create and alter database objects. Objects include constraints, indexes, stored procedures, tables, triggers, user-defined functions, and views.

²        Alter database objects to support replication and partitioned views.

²        Troubleshoot failed object creation.

Retrieving and Modifying Data

²        Import and export data. Methods include the bulk copy program, the Bulk Insert task, and Data Transformation Services (DTS).

²        Manipulate heterogeneous data. Methods include linked servers, OPENQUERY, OPENROWSET, and OPENXML.

²        Retrieve, filter, group, summarize, and modify data by using Transact-SQL.

²        Manage result sets by using cursors and Transact-SQL. Considerations include locking models and appropriate usage.

²        Extract data in XML format. Considerations include output format and XML schema structure.

Programming Business Logic

²        Manage data manipulation by using stored procedures, transactions, triggers, user-defined functions, and views.

²        Enforce procedural business logic by using stored procedures, transactions, triggers, user-defined functions, and views.

²        Troubleshoot and optimize programming objects. Objects include stored procedures, transactions, triggers, user-defined functions, and views.

Tuning and Optimizing Data Access

²        Analyze the query execution plan. Considerations include query processor operations and steps.

²        Capture, analyze, and replay SQL Profiler traces. Considerations include lock detection, performance tuning, and trace flags.

²        Create and implement indexing strategies. Considerations include clustered index, covering index, indexed views, nonclustered index, placement, and statistics.

²        Improve index use by using the Index Tuning Wizard.

²        Monitor and troubleshoot database activity by using SQL Profiler.

Designing a Database Security Plan

²        Control data access by using stored procedures, triggers, user-defined functions, and views.

²        Define object-level security including column-level permissions by using GRANT, REVOKE, and DENY.

²        Create and manage application roles.

Exam 5Analyzing Requirements and Defining Microsoft .NET Solution Architectures

Envisioning the Solution

²        Develop a solution concept.

²        Analyze the feasibility of the solution.

²        Analyze and refine the scope of the solution project.

²        Identify key project risks.

Gathering and Analyzing Business Requirements

²        Gather and analyze business requirements.

²        Gather and analyze user requirements.

²        Gather and analyze operational requirements.

²        Gather and analyze requirements for hardware, software, and network infrastructure.

Developing Specifications

²        Transform requirements into functional specifications. Considerations include performance, maintainability, extensibility, scalability, availability, deployability, security, and accessibility.

²        Transform functional specifications into technical specifications. Considerations include performance, maintainability, extensibility, scalability, availability, deployability, security, and accessibility.

Creating the Conceptual Design

²        Create a conceptual model of business requirements or data requirements. Methods include Object Role Modeling (ORM).

²        Validate the conceptual design.

Creating the Logical Design

²        Create the logical design for the solution.

²        Create the logical data model.

²        Validate the proposed logical design.

Creating the Physical Design

²        Select the appropriate technologies for the physical design of the solution.

²        Create the physical design for the solution.

²        Create the physical design for deployment.

²        Create the physical design for maintenance.

²        Create the physical design for the data model.

²        Validate the physical design.

Creating Standards and Processes

²        Establish standards. Standards can apply to development documentation, coding, code review, UI, and testing.

²        Establish processes. Processes include reviewing development documentation, reviewing code, creating builds, tracking issues, managing source code, managing change, managing release, and establishing maintenance tasks. Methods include Microsoft Visual Studio .NET Enterprise Templates.

²        Establish quality and performance metrics to evaluate project control, organizational performance, and return on investment.

 

發佈了114 篇原創文章 · 獲贊 3 · 訪問量 26萬+
發表評論
所有評論
還沒有人評論,想成為第一個評論的人麼? 請在上方評論欄輸入並且點擊發布.
相關文章