我整理的微软认证

 晕,从微软官方网站查询微软认证,居然都是2k的,目前2003早就成为主流了阿。
为了大家方便,特意整理如下,希望对大家有用。
href="file:///C:/DOCUME~1/ADMINI~1/LOCALS~1/Temp/msohtml1/01/clip_filelist.xml" rel="File-List" />

微软专家认证(Microsoft Certified Professional,简称MCP

Microsoft Certified Professionals (MCPs) stand apart from other IT personnel. They have demonstrated undeniable expertise with Microsoft products and platforms to colleagues, employers, and—most important—to themselves.

获得微软专家认证资格就意味着,微软承认你已具备较高专业技术水平,能够运用微软软件产品或技术手段为企业单位商务活动提供所需解决方案。

微软认证系统管理员(Microsoft Certified Systems Administrator,简称MCSA

The Microsoft Certified Systems Administrator (MCSA) certification will advance your career by ensuring that you have the skills to successfully manage and troubleshoot system environments running on the Microsoft Windows operating system.

获得微软认证系统管理员资格就意味着,微软承认您已具备较高专业技术水准,能够实施、管理和检修当前基于微软Windows2000Windows .NET服务器平台的网络与系统环境。

 

Exam 1 Installing, Configuring, and Administering Microsoft Windows XP Professional

Installing Windows XP Professional

²        Perform and troubleshoot an attended installation of Windows XP Professional.

²        Perform and troubleshoot an unattended installation of Windows XP Professional.

²        Upgrade from a previous version of Windows to Windows XP Professional.

²        Perform post-installation updates and product activation.

²        Troubleshoot failed installations.

Implementing and Conducting Administration of Resources

²        Monitor, manage, and troubleshoot access to files and folders.

²        Manage and troubleshoot access to shared folders.

²        Connect to local and network print devices.

²        Configure and manage file systems.

²        Manage and troubleshoot access to and synchronization of offline files.

Implementing, Managing, Monitoring, and Troubleshooting Hardware Devices and Drivers

²        Implement, manage, and troubleshoot disk devices.

²        Implement, manage, and troubleshoot display devices.

²        Configure Advanced Configuration Power Interface (ACPI).

²        Implement, manage, and troubleshoot input and output (I/O) devices.

²        Manage and troubleshoot drivers and driver signing.

²        Monitor and configure multiprocessor computers.

Monitoring and Optimizing System Performance and Reliability

²        Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

²        Manage, monitor, and optimize system performance for mobile users.

²        Restore and back up the operating system, System State data, and user data.

²        Configuring and Troubleshooting the Desktop Environment

²        Configure and manage user profiles and desktop settings.

²        Configure support for multiple languages or multiple locations.

²        Manage applications by using Windows Installer packages.

Configuring and Troubleshooting the Desktop Environment

²        Configure and troubleshoot the TCP/IP protocol.

²        Connect to computers by using dial-up networking.

²        Connect to resources by using Internet Explorer.

²        Configure, manage, and implement Internet Information Services (IIS).

²        Configure, manage, and troubleshoot Remote Desktop and Remote Assistance.

²        Configure, manage, and troubleshoot an Internet Connection Firewall (ICF).

Implementing, Managing, and Troubleshooting Network Protocols and Services

Configuring, Managing, and Troubleshooting Security

²        Configure, manage, and troubleshoot Encrypting File System (EFS).

²        Configure, manage, and troubleshoot a security configuration and local security policy.

²        Configure, manage, and troubleshoot local user and group accounts.

²        Configure, manage, and troubleshoot Internet Explorer security settings.

²        Connect to resources by using Internet Explorer.

Exam 2 Managing and Maintaining a Windows Server 2003 Environment

Managing and Maintaining Physical and Logical Devices

²        Manage basic disks and dynamic disks.

²        Monitor server hardware. Tools might include Device Manager, the Hardware Troubleshooting Wizard, and appropriate Control Panel items.

²        Optimize server disk performance.

²        Troubleshoot server hardware devices.

²        Install and configure server hardware devices.

Managing Users, Computers, and Groups

²        Manage local, roaming, and mandatory user profiles.

²        Create and manage computer accounts in an Active Directory environment.

²        Create and manage user accounts.

²        Troubleshoot computer accounts.

²        Troubleshoot user accounts.

²        Troubleshoot user authentication issues.

Managing and Maintaining Access to Resources

²        Configure access to shared folders.

²        Troubleshoot Terminal Services.

²        Configure file system permissions.

²        Troubleshoot access to files and shared folders.

Managing and Maintaining a Server Environment

²        Monitor and analyze events. Tools might include Event Viewer and System Monitor.

²        Manage software update infrastructure.

²        Manage software site licensing.

²        Manage servers remotely.

²        Troubleshoot print queues.

²        Monitor system performance.

²        Monitor file and print servers. Tools might include Task Manager, Event Viewer, and System Monitor.

²        Monitor and optimize a server environment for application performance.

²        Manage a Web server.

Managing and Implementing Disaster Recovery

²        Perform system recovery for a server.

²        Manage backup procedures.

²        Recover from server hardware failure.

²        Restore backup data.

²        Schedule backup jobs.

Exam 3 Implementing, Managing, and Maintaining a Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining IP Addressing

²        Configure TCP/IP addressing on a server computer.

²        Manage DHCP.

²        Troubleshoot TCP/IP addressing.

²        Troubleshoot DHCP.

Implementing, Managing, and Maintaining Name Resolution

²        Install and configure the DNS Server service.

²        Manage DNS.

²        Monitor DNS. Tools might include System Monitor, Event Viewer, Replication Monitor, and DNS debug logs.

Implementing, Managing, and Maintaining Network Security

²        Implement secure network administration procedures.

²        Install and configure software update infrastructure.

²        Monitor network protocol security. Tools might include the IP Security Monitor Microsoft Management Console (MMC) snap-in and Kerberos support tools.

²        Troubleshoot network protocol security. Tools might include the IP Security Monitor MMC snap-in, Event Viewer, and Network Monitor.

Implementing, Managing, and Maintaining Routing and Remote Access

²        Configure Routing and Remote Access user authentication.

²        Manage remote access.

²        Manage TCP/IP routing.

²        Implement secure access between private networks.

²        Troubleshoot user access to remote access services.

²        Troubleshoot Routing and Remote Access routing.

Maintaining a Network Infrastructure

²        Monitor network traffic. Tools might include Network Monitor and System Monitor.

²        Troubleshoot connectivity to the Internet.

²        Troubleshoot server services.

Exam 4Installing, Configuring, and Administering Microsoft SQL Server 2000 Enterprise Edition

Installing and Configuring SQL Server 2000

²        Install SQL Server 2000. Considerations include clustering, default collation, file locations, number of instances, and service accounts.

²        Upgrade to SQL Server 2000.

²        Create a linked server.

²        Configure SQL Mail and SQLAgentMail.

²        Configure network libraries.

²        Troubleshoot failed installations.

Creating SQL Server 2000 Databases

²        Configure database options for performance. Considerations include capacity, network connectivity, physical drive configurations, and storage locations.

²        Attach and detach databases.

²        Create and alter databases.

²        Create and manage objects. Objects include constraints, indexes, stored procedures, triggers, and views.

Managing, Monitoring, and Troubleshooting SQL Server 2000 Databases

²        Optimize database performance. Considerations include indexing, locking, and recompiling.

²        Optimize data storage.

²        Modify the database schema.

²        Perform disaster recovery operations.

²        Perform integrity checks. Methods include configuring the Database Maintenance Plan Wizard and using the Database Consistency Checker (DBCC).

²        Troubleshoot transactions and locking by using SQL Profiler, SQL Server Enterprise Manager, or Transact-SQL.

Extracting and Transforming Data with SQL Server 2000

²        Set up IIS virtual directories to support XML.

²        Import and export data. Methods include the Bulk Insert task, the bulk copy program, Data Transformation Services (DTS), and heterogeneous queries.

²        Develop and manage DTS packages.

²        Manage linked servers.

²        Convert data types.

²        Configure, maintain, and troubleshoot replication services.

Managing and Monitoring SQL Server 2000 Security

Configure mixed security modes or Windows Authentication. Considerations include client connectivity, client operating system, and security infrastructure.

²        Create and manage log ons.

²        Create and manage database users.

²        Create and manage security roles. Roles include application, database, and server.

²        Enforce and manage security by using stored procedures, triggers, views, and user-defined functions.

²        Set permissions in a database. Considerations include object permissions, object ownership, and statement permissions.

²        Manage security auditing. Methods include SQL Profiler and C2 auditing.

Managing, Monitoring, and Troubleshooting SQL Server 2000

²        Create, manage, and troubleshoot SQL Server Agent jobs.

²        Configure alerts and operators by using SQL Server Agent.

²        Optimize hardware resource usage. Resources include CPU, disk I/O, and memory.

²        Optimize and troubleshoot SQL Server system activity. Activities include cache hits, connections, locks, memory allocation, recompilation, and transactional throughput.

 

 

微软认证系统工程师(Microsoft Certified Systems Engineer,简称MCSE

Earn the Microsoft Certified Systems Engineer (MCSE) certification and prove your expertise in designing and implementing the infrastructure for business solutions based on the Microsoft Windows 2000 platform and Windows Server System.

获得微软认证系统工程师资格就意味着,微软承认您已具备较高专业技术水平,能够分析商业需求,并使用微软2000系列平台和微软服务器软件来设计并实现商务解决方案的基础架构。微软认证系统工程师是这方面最为重要的认证资格。

Exam 1 Installing, Configuring, and Administering Microsoft Windows XP Professional

Installing Windows XP Professional

²        Perform and troubleshoot an attended installation of Windows XP Professional.

²        Perform and troubleshoot an unattended installation of Windows XP Professional.

²        Upgrade from a previous version of Windows to Windows XP Professional.

²        Perform post-installation updates and product activation.

²        Troubleshoot failed installations.

Implementing and Conducting Administration of Resources

²        Monitor, manage, and troubleshoot access to files and folders.

²        Manage and troubleshoot access to shared folders.

²        Connect to local and network print devices.

²        Configure and manage file systems.

²        Manage and troubleshoot access to and synchronization of offline files.

Implementing, Managing, Monitoring, and Troubleshooting Hardware Devices and Drivers

²        Implement, manage, and troubleshoot disk devices.

²        Implement, manage, and troubleshoot display devices.

²        Configure Advanced Configuration Power Interface (ACPI).

²        Implement, manage, and troubleshoot input and output (I/O) devices.

²        Manage and troubleshoot drivers and driver signing.

²        Monitor and configure multiprocessor computers.

Monitoring and Optimizing System Performance and Reliability

²        Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

²        Manage, monitor, and optimize system performance for mobile users.

²        Restore and back up the operating system, System State data, and user data.

²        Configuring and Troubleshooting the Desktop Environment

²        Configure and manage user profiles and desktop settings.

²        Configure support for multiple languages or multiple locations.

²        Manage applications by using Windows Installer packages.

Configuring and Troubleshooting the Desktop Environment

²        Configure and troubleshoot the TCP/IP protocol.

²        Connect to computers by using dial-up networking.

²        Connect to resources by using Internet Explorer.

²        Configure, manage, and implement Internet Information Services (IIS).

²        Configure, manage, and troubleshoot Remote Desktop and Remote Assistance.

²        Configure, manage, and troubleshoot an Internet Connection Firewall (ICF).

Implementing, Managing, and Troubleshooting Network Protocols and Services

Configuring, Managing, and Troubleshooting Security

²        Configure, manage, and troubleshoot Encrypting File System (EFS).

²        Configure, manage, and troubleshoot a security configuration and local security policy.

²        Configure, manage, and troubleshoot local user and group accounts.

²        Configure, manage, and troubleshoot Internet Explorer security settings.

²        Connect to resources by using Internet Explorer.

Exam 2 Managing and Maintaining a Windows Server 2003 Environment

Managing and Maintaining Physical and Logical Devices

²        Manage basic disks and dynamic disks.

²        Monitor server hardware. Tools might include Device Manager, the Hardware Troubleshooting Wizard, and appropriate Control Panel items.

²        Optimize server disk performance.

²        Troubleshoot server hardware devices.

²        Install and configure server hardware devices.

Managing Users, Computers, and Groups

²        Manage local, roaming, and mandatory user profiles.

²        Create and manage computer accounts in an Active Directory environment.

²        Create and manage user accounts.

²        Troubleshoot computer accounts.

²        Troubleshoot user accounts.

²        Troubleshoot user authentication issues.

Managing and Maintaining Access to Resources

²        Configure access to shared folders.

²        Troubleshoot Terminal Services.

²        Configure file system permissions.

²        Troubleshoot access to files and shared folders.

Managing and Maintaining a Server Environment

²        Monitor and analyze events. Tools might include Event Viewer and System Monitor.

²        Manage software update infrastructure.

²        Manage software site licensing.

²        Manage servers remotely.

²        Troubleshoot print queues.

²        Monitor system performance.

²        Monitor file and print servers. Tools might include Task Manager, Event Viewer, and System Monitor.

²        Monitor and optimize a server environment for application performance.

²        Manage a Web server.

Managing and Implementing Disaster Recovery

²        Perform system recovery for a server.

²        Manage backup procedures.

²        Recover from server hardware failure.

²        Restore backup data.

²        Schedule backup jobs.

Exam 3 Implementing, Managing, and Maintaining a Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining IP Addressing

²        Configure TCP/IP addressing on a server computer.

²        Manage DHCP.

²        Troubleshoot TCP/IP addressing.

²        Troubleshoot DHCP.

Implementing, Managing, and Maintaining Name Resolution

²        Install and configure the DNS Server service.

²        Manage DNS.

²        Monitor DNS. Tools might include System Monitor, Event Viewer, Replication Monitor, and DNS debug logs.

Implementing, Managing, and Maintaining Network Security

²        Implement secure network administration procedures.

²        Install and configure software update infrastructure.

²        Monitor network protocol security. Tools might include the IP Security Monitor Microsoft Management Console (MMC) snap-in and Kerberos support tools.

²        Troubleshoot network protocol security. Tools might include the IP Security Monitor MMC snap-in, Event Viewer, and Network Monitor.

Implementing, Managing, and Maintaining Routing and Remote Access

²        Configure Routing and Remote Access user authentication.

²        Manage remote access.

²        Manage TCP/IP routing.

²        Implement secure access between private networks.

²        Troubleshoot user access to remote access services.

²        Troubleshoot Routing and Remote Access routing.

Maintaining a Network Infrastructure

²        Monitor network traffic. Tools might include Network Monitor and System Monitor.

²        Troubleshoot connectivity to the Internet.

²        Troubleshoot server services.

Exam 4Installing, Configuring, and Administering Microsoft SQL Server 2000 Enterprise Edition

Installing and Configuring SQL Server 2000

²        Install SQL Server 2000. Considerations include clustering, default collation, file locations, number of instances, and service accounts.

²        Upgrade to SQL Server 2000.

²        Create a linked server.

²        Configure SQL Mail and SQLAgentMail.

²        Configure network libraries.

²        Troubleshoot failed installations.

Creating SQL Server 2000 Databases

²        Configure database options for performance. Considerations include capacity, network connectivity, physical drive configurations, and storage locations.

²        Attach and detach databases.

²        Create and alter databases.

²        Create and manage objects. Objects include constraints, indexes, stored procedures, triggers, and views.

Managing, Monitoring, and Troubleshooting SQL Server 2000 Databases

²        Optimize database performance. Considerations include indexing, locking, and recompiling.

²        Optimize data storage.

²        Modify the database schema.

²        Perform disaster recovery operations.

²        Perform integrity checks. Methods include configuring the Database Maintenance Plan Wizard and using the Database Consistency Checker (DBCC).

²        Troubleshoot transactions and locking by using SQL Profiler, SQL Server Enterprise Manager, or Transact-SQL.

Extracting and Transforming Data with SQL Server 2000

²        Set up IIS virtual directories to support XML.

²        Import and export data. Methods include the Bulk Insert task, the bulk copy program, Data Transformation Services (DTS), and heterogeneous queries.

²        Develop and manage DTS packages.

²        Manage linked servers.

²        Convert data types.

²        Configure, maintain, and troubleshoot replication services.

Managing and Monitoring SQL Server 2000 Security

Configure mixed security modes or Windows Authentication. Considerations include client connectivity, client operating system, and security infrastructure.

²        Create and manage log ons.

²        Create and manage database users.

²        Create and manage security roles. Roles include application, database, and server.

²        Enforce and manage security by using stored procedures, triggers, views, and user-defined functions.

²        Set permissions in a database. Considerations include object permissions, object ownership, and statement permissions.

²        Manage security auditing. Methods include SQL Profiler and C2 auditing.

Managing, Monitoring, and Troubleshooting SQL Server 2000

²        Create, manage, and troubleshoot SQL Server Agent jobs.

²        Configure alerts and operators by using SQL Server Agent.

²        Optimize hardware resource usage. Resources include CPU, disk I/O, and memory.

²        Optimize and troubleshoot SQL Server system activity. Activities include cache hits, connections, locks, memory allocation, recompilation, and transactional throughput.

Exam 5Planning and Maintaining a Windows Server 2003 Network Infrastructure

Planning and Implementing Server Roles and Server Security

²        Configure security for servers that are assigned specific roles.

²        Plan a secure baseline installation.

²        Plan security for servers that are assigned specific roles. Roles might include domain controllers, Web servers, database servers, and mail servers.

²        Evaluate and select the operating system to install on computers in an enterprise.

Planning, Implementing, and Maintaining a Network Infrastructure

²        Plan a TCP/IP network infrastructure strategy.

²        Plan and modify a network topology.

²        Plan an Internet connectivity strategy.

²        Plan network traffic monitoring. Tools might include Network Monitor and System Monitor.

²        Troubleshoot connectivity to the Internet.

²        Troubleshoot TCP/IP addressing.

²        Plan a host name resolution strategy.

²        Plan a NetBIOS name resolution strategy.

²        Troubleshoot host name resolution.

Planning, Implementing, and Maintaining Routing and Remote Access

²        Plan a routing strategy.

²        Plan security for remote access users.

²        Implement secure access between private networks.

²        Troubleshoot TCP/IP routing. Tools might include the route, tracert, ping, pathping, and netsh commands and Network Monitor.

Planning, Implementing, and Maintaining Server Availability

²        Plan services for high availability.

²        Identify system bottlenecks, including memory, processor, disk, and network related bottlenecks.

²        Implement a cluster server.

²        Manage Network Load Balancing. Tools might include the Network Load Balancing Monitor Microsoft Management Console (MMC) snap-in and the WLBS cluster control utility.

²        Plan a backup and recovery strategy.

Planning and Maintaining Network Security

²        Configure network protocol security.

²        Configure security for data transmission.

²        Plan for network protocol security.

²        Plan secure network administration methods.

²        Plan security for wireless networks.

²        Plan security for data transmission.

²        Troubleshoot security for data transmission. Tools might include the IP Security Monitor MMC snap-in and the Resultant Set of Policy (RSoP) MMC snap-in.

Planning, Implementing, and Maintaining Security Infrastructure.

²        Configure Active Directory directory service for certificate publication.

²        Plan a public key infrastructure (PKI) that uses Certificate Services.

²        Plan a framework for planning and implementing security.

²        Plan a security update infrastructure. Tools might include Microsoft Baseline Security Analyzer and Microsoft Software Update Services.

Exam 6Planning, Implementing, and Maintaining a Windows Server 2003 Active Directory Infrastructure

Planning and Implementing an Active Directory Infrastructure

²        Plan a strategy for placing global catalog servers.

²        Plan flexible operations master role placement.

²        Implement an Active Directory directory service forest and domain structure.

²        Implement an Active Directory site topology.

²        Plan an administrative delegation strategy.

Managing and Maintaining an Active Directory Infrastructure

²        Manage an Active Directory forest and domain structure.

²        Manage an Active Directory site.

²        Monitor Active Directory replication failures. Tools might include Replication Monitor, Event Viewer, and support tools.

²        Restore Active Directory directory services.

²        Troubleshoot Active Directory.

Planning and Implementing User, Computer, and Group Strategies

²        Plan a security group strategy.

²        Plan a user authentication strategy.

²        Plan an OU structure.

²        Implement an OU structure.

Planning and Implementing Group Policy

²        Plan Group Policy strategy.

²        Configure the user environment by using Group Policy.

²        Deploy a computer environment by using Group Policy.

Managing and Maintaining Group Policy

²        Troubleshoot issues related to Group Policy application. deployment. Tools might include RSoP and the gpresult command.

²        Maintain installed software by using Group Policy.

Exam 7Designing Security for a Windows Server 2003 Network

Creating the Conceptual Design for Network Infrastructure Security by Gathering and Analyzing Business and Technical Requirements

²        Analyze business requirements for designing security. Considerations include existing policies and procedures, sensitivity of data, cost, legal requirements, end-user impact, interoperability, maintainability, scalability, and risk.

²        Design a framework for designing and implementing security. The framework should include prevention, detection, isolation, and recovery.

²        Analyze technical constraints when designing security.

Creating the Logical Design for Network Infrastructure Security

²        Design a public key infrastructure (PKI) that uses Certificate Services.

²        Design a logical authentication strategy.

²        Design security for network management.

²        Design a security update infrastructure.

Creating the Physical Design for Network Infrastructure Security

²        Design network infrastructure security.

²        Design security for wireless networks.

²        Design user authentication for Internet Information Services (IIS).

²        Design security for Internet Information Services (IIS).

²        Design security for communication between networks.

²        Design security for communication with external organizations.

²        Design security for servers that have specific roles. Roles include domain controller, network infrastructure server, file server, IIS server, terminal server, and POP3 mail server.

Designing an Access Control Strategy for Data

²        Design an access control strategy for directory services.

²        Design an access control strategy for files and folders.

²        Design an access control strategy for the registry.

Creating the Physical Design for Client Infrastructure Security

²        Design a client authentication strategy.

²        Design a security strategy for client remote access.

²        Design a strategy for securing client computers. Considerations include desktop and portable computers.

 

微软认证应用程序开发专家(MCAD

Now is the time to validate your Microsoft .NET Framework 1.0 and Microsoft .NET Framework 1.1 developer skills with the Microsoft Certified Application Developer (MCAD) for Microsoft .NET credential. MCAD candidates are required to pass two core exams and one elective exam in an area of specialization. See the table that follows for a complete list of exams and related training resources.

获取能够帮助您以终极速度建立广泛应用程序的相关培训,并借助面向Microsoft .NET的最新技术认证-微软认证应用程序开发专家(MCAD)证书来证明您所拥有的这些专业技能。

Exam 1Developing and Implementing Web Applications with Microsoft Visual C# .NET and Microsoft Visual Studio .NET

Creating User Services

²        Create ASP.NET pages.

²        Add Web server controls, HTML server controls, user controls, and HTML code to ASP.NET pages.

²        Implement navigation for the user interface.

²        Implement error handling in the user interface.

²        Implement online user assistance.

²        Incorporate existing code into ASP.NET pages.

²        Display and update data.

²        Instantiate and invoke Web services or components.

²        Implement globalization.

²        Handle events.

²        Implement accessibility features.

Creating and Managing Components and .NET Assemblies

²        Create and modify a .NET assembly.

²        Create Web custom controls and Web user controls.

Consuming and Manipulating Data

²        Access and manipulate data from a Microsoft SQL Server database by creating and using ad hoc queries and stored procedures.

²        Access and manipulate data from a data store. Data stores include relational databases, XML documents, and flat files. Methods include XML techniques and ADO.NET.

²        Handle data errors.

Testing and Debugging

²        Create a unit test plan.

²        Implement tracing.

²        Debug, rework, and resolve defects in code.

Deploying a Web Application

²        Plan the deployment of a Web application.

²        Create a setup program that installs a Web application and allows for the application to be uninstalled.

²        Deploy a Web application.

²        Add assemblies to the global assembly cache.

Maintaining and Supporting a Web Application

²        Optimize the performance of a Web application.

²        Diagnose and resolve errors and issues.

Configuring and Securing a Web Application

²        Configure a Web application.

²        Configure security for a Web application.

²        Configure authorization. Authorization methods include file-based methods and URL-based methods.

²        Configure and implement caching. Caching types include output, fragment, and data.

²        Configure and implement session state in various topologies such as a Web garden and a Web farm.

²        Install and configure server services.

Exam 2 Developing and Implementing Windows-based Applications with Microsoft Visual C# .NET and Microsoft Visual Studio .NET

Creating User Services

²        Create a Windows Form by using the Windows Forms Designer.

²        Add controls to a Windows Form.

²        Implement navigation for the user interface (UI).

²        Validate user input.

²        Implement error handling in the UI.

²        Implement online user assistance.

²        Display and update data.

²        Instantiate and invoke a Web service or component.

²        Implement globalization.

²        Create, implement, and handle events.

²        Implement print capability.

²        Implement accessibility features.

Creating and Managing Components and .NET Assemblies

²        Create and modify a .NET assembly.

²        Create a Windows control.

Consuming and Manipulating Data

²        Access and manipulate data from a Microsoft SQL Server database by creating and using ad hoc queries and stored procedures.

²        Access and manipulate data from a data store. Data stores include relational databases, XML documents, and flat files. Methods include XML techniques and ADO .NET.

²        Handle data errors.

Testing and Debugging

²        Create a unit test plan.

²        Implement tracing.

²        Debug, rework, and resolve defects in code.

Deploying a Windows-based Application

²        Plan the deployment of a Windows-based application.

²        Create a setup program that installs an application and allows for the application to be uninstalled.

²        Deploy a Windows-based application.

²        Add assemblies to the Global Assembly Cache.

²        Verify security policies for a deployed application.

Maintaining and Supporting a Windows-based Application

²        Optimize the performance of a Windows-based application.

²        Diagnose and resolve errors and issues.

Configuring and Securing a Windows-based Application

²        Configure a Windows-based application.

²        Configure security for a Windows-based application.

²        Configure authorization.

Exam 3Developing XML Web Services and Server Components with Microsoft Visual C# and the Microsoft .NET Framework

Creating and Managing Microsoft Windows Services, Serviced Components, .NET Remoting Objects, and XML Web Services

²        Create and manipulate a Windows service.

²        Create and consume a serviced component.

²        Create and consume a .NET Remoting object.

²        Create and consume an XML Web service.

²        Implement security for a Windows service, a serviced component, a .NET Remoting object, and an XML Web service.

²        Access unmanaged code from a Windows service, a serviced component, a .NET Remoting object, and an XML Web service.

Consuming and Manipulating Data

²        Access and manipulate data from a Microsoft SQL Server database by creating and using ad hoc queries and stored procedures.

²        Create and manipulate DataSets.

²        Access and manipulate XML data.

Testing and Debugging

²        Create a unit test plan.

²        Implement tracing.

²        Instrument and debug a Windows service, a serviced component, a .NET Remoting object, and an XML Web service.

²        Use interactive debugging.

²        Log test results.

Deploying Windows Services, Serviced Components, .NET Remoting Objects, and XML Web Services

²        Plan the deployment of and deploy a Windows service, a serviced component, a .NET Remoting object, and an XML Web service.

²        Create a setup program that installs a Windows service, a serviced component, a .NET Remoting object, and an XML Web service.

²        Publish an XML Web service.

²        Configure client computers and servers to use a Windows service, a serviced component, a .NET Remoting object, and an XML Web service.

²        Plan, configure, and deploy side-by-side deployments and applications.

²        Configure security for a Windows service, a serviced component, a .NET Remoting object, and an XML Web service.

Exam 4Designing and Implementing Databases with Microsoft SQL Server 2000 Enterprise Edition

Developing a Logical Data Model

²        Define entities. Considerations include entity composition and normalization.

²        Design entity keys. Considerations include FOREIGN KEY constraints, PRIMARY KEY constraints, and UNIQUE constraints.

²        Design attribute domain integrity. Considerations include CHECK constraints, data types, and nullability.

Implementing the Physical Database

²        Create and alter databases. Considerations include file groups, file placement, growth strategy, and space requirements.

²        Create and alter database objects. Objects include constraints, indexes, stored procedures, tables, triggers, user-defined functions, and views.

²        Alter database objects to support replication and partitioned views.

²        Troubleshoot failed object creation.

Retrieving and Modifying Data

²        Import and export data. Methods include the bulk copy program, the Bulk Insert task, and Data Transformation Services (DTS).

²        Manipulate heterogeneous data. Methods include linked servers, OPENQUERY, OPENROWSET, and OPENXML.

²        Retrieve, filter, group, summarize, and modify data by using Transact-SQL.

²        Manage result sets by using cursors and Transact-SQL. Considerations include locking models and appropriate usage.

²        Extract data in XML format. Considerations include output format and XML schema structure.

Programming Business Logic

²        Manage data manipulation by using stored procedures, transactions, triggers, user-defined functions, and views.

²        Enforce procedural business logic by using stored procedures, transactions, triggers, user-defined functions, and views.

²        Troubleshoot and optimize programming objects. Objects include stored procedures, transactions, triggers, user-defined functions, and views.

Tuning and Optimizing Data Access

²        Analyze the query execution plan. Considerations include query processor operations and steps.

²        Capture, analyze, and replay SQL Profiler traces. Considerations include lock detection, performance tuning, and trace flags.

²        Create and implement indexing strategies. Considerations include clustered index, covering index, indexed views, nonclustered index, placement, and statistics.

²        Improve index use by using the Index Tuning Wizard.

²        Monitor and troubleshoot database activity by using SQL Profiler.

Designing a Database Security Plan

²        Control data access by using stored procedures, triggers, user-defined functions, and views.

²        Define object-level security including column-level permissions by using GRANT, REVOKE, and DENY.

²        Create and manage application roles.

 

微软认证解决方案开发专家(Microsoft Certified Solution Developer,简称MCSD

The Microsoft Certified Solution Developer (MCSD) for Microsoft .NET credential is the top-level certification for advanced developers who design and develop leading-edge enterprise solutions using Microsoft development tools and technologies in addition to the Microsoft .NET Framework 1.0 and Microsoft .NET Framework 1.1.

获得微软认证解决方案开发专家资格就意味着,微软承认您已具备较高专业技术水平,能够运用微软开发工具、技术手段和微软Windows体系结构来设计开发代表一流水平的商务解决方案。

Exam 1Developing and Implementing Web Applications with Microsoft Visual C# .NET and Microsoft Visual Studio .NET

Creating User Services

²        Create ASP.NET pages.

²        Add Web server controls, HTML server controls, user controls, and HTML code to ASP.NET pages.

²        Implement navigation for the user interface.

²        Implement error handling in the user interface.

²        Implement online user assistance.

²        Incorporate existing code into ASP.NET pages.

²        Display and update data.

²        Instantiate and invoke Web services or components.

²        Implement globalization.

²        Handle events.

²        Implement accessibility features.

Creating and Managing Components and .NET Assemblies

²        Create and modify a .NET assembly.

²        Create Web custom controls and Web user controls.

Consuming and Manipulating Data

²        Access and manipulate data from a Microsoft SQL Server database by creating and using ad hoc queries and stored procedures.

²        Access and manipulate data from a data store. Data stores include relational databases, XML documents, and flat files. Methods include XML techniques and ADO.NET.

²        Handle data errors.

Testing and Debugging

²        Create a unit test plan.

²        Implement tracing.

²        Debug, rework, and resolve defects in code.

Deploying a Web Application

²        Plan the deployment of a Web application.

²        Create a setup program that installs a Web application and allows for the application to be uninstalled.

²        Deploy a Web application.

²        Add assemblies to the global assembly cache.

Maintaining and Supporting a Web Application

²        Optimize the performance of a Web application.

²        Diagnose and resolve errors and issues.

Configuring and Securing a Web Application

²        Configure a Web application.

²        Configure security for a Web application.

²        Configure authorization. Authorization methods include file-based methods and URL-based methods.

²        Configure and implement caching. Caching types include output, fragment, and data.

²        Configure and implement session state in various topologies such as a Web garden and a Web farm.

²        Install and configure server services.

Exam 2 Developing and Implementing Windows-based Applications with Microsoft Visual C# .NET and Microsoft Visual Studio .NET

Creating User Services

²        Create a Windows Form by using the Windows Forms Designer.

²        Add controls to a Windows Form.

²        Implement navigation for the user interface (UI).

²        Validate user input.

²        Implement error handling in the UI.

²        Implement online user assistance.

²        Display and update data.

²        Instantiate and invoke a Web service or component.

²        Implement globalization.

²        Create, implement, and handle events.

²        Implement print capability.

²        Implement accessibility features.

Creating and Managing Components and .NET Assemblies

²        Create and modify a .NET assembly.

²        Create a Windows control.

Consuming and Manipulating Data

²        Access and manipulate data from a Microsoft SQL Server database by creating and using ad hoc queries and stored procedures.

²        Access and manipulate data from a data store. Data stores include relational databases, XML documents, and flat files. Methods include XML techniques and ADO .NET.

²        Handle data errors.

Testing and Debugging

²        Create a unit test plan.

²        Implement tracing.

²        Debug, rework, and resolve defects in code.

Deploying a Windows-based Application

²        Plan the deployment of a Windows-based application.

²        Create a setup program that installs an application and allows for the application to be uninstalled.

²        Deploy a Windows-based application.

²        Add assemblies to the Global Assembly Cache.

²        Verify security policies for a deployed application.

Maintaining and Supporting a Windows-based Application

²        Optimize the performance of a Windows-based application.

²        Diagnose and resolve errors and issues.

Configuring and Securing a Windows-based Application

²        Configure a Windows-based application.

²        Configure security for a Windows-based application.

²        Configure authorization.

Exam 3Developing XML Web Services and Server Components with Microsoft Visual C# and the Microsoft .NET Framework

Creating and Managing Microsoft Windows Services, Serviced Components, .NET Remoting Objects, and XML Web Services

²        Create and manipulate a Windows service.

²        Create and consume a serviced component.

²        Create and consume a .NET Remoting object.

²        Create and consume an XML Web service.

²        Implement security for a Windows service, a serviced component, a .NET Remoting object, and an XML Web service.

²        Access unmanaged code from a Windows service, a serviced component, a .NET Remoting object, and an XML Web service.

Consuming and Manipulating Data

²        Access and manipulate data from a Microsoft SQL Server database by creating and using ad hoc queries and stored procedures.

²        Create and manipulate DataSets.

²        Access and manipulate XML data.

Testing and Debugging

²        Create a unit test plan.

²        Implement tracing.

²        Instrument and debug a Windows service, a serviced component, a .NET Remoting object, and an XML Web service.

²        Use interactive debugging.

²        Log test results.

Deploying Windows Services, Serviced Components, .NET Remoting Objects, and XML Web Services

²        Plan the deployment of and deploy a Windows service, a serviced component, a .NET Remoting object, and an XML Web service.

²        Create a setup program that installs a Windows service, a serviced component, a .NET Remoting object, and an XML Web service.

²        Publish an XML Web service.

²        Configure client computers and servers to use a Windows service, a serviced component, a .NET Remoting object, and an XML Web service.

²        Plan, configure, and deploy side-by-side deployments and applications.

²        Configure security for a Windows service, a serviced component, a .NET Remoting object, and an XML Web service.

Exam 4Designing and Implementing Databases with Microsoft SQL Server 2000 Enterprise Edition

Developing a Logical Data Model

²        Define entities. Considerations include entity composition and normalization.

²        Design entity keys. Considerations include FOREIGN KEY constraints, PRIMARY KEY constraints, and UNIQUE constraints.

²        Design attribute domain integrity. Considerations include CHECK constraints, data types, and nullability.

Implementing the Physical Database

²        Create and alter databases. Considerations include file groups, file placement, growth strategy, and space requirements.

²        Create and alter database objects. Objects include constraints, indexes, stored procedures, tables, triggers, user-defined functions, and views.

²        Alter database objects to support replication and partitioned views.

²        Troubleshoot failed object creation.

Retrieving and Modifying Data

²        Import and export data. Methods include the bulk copy program, the Bulk Insert task, and Data Transformation Services (DTS).

²        Manipulate heterogeneous data. Methods include linked servers, OPENQUERY, OPENROWSET, and OPENXML.

²        Retrieve, filter, group, summarize, and modify data by using Transact-SQL.

²        Manage result sets by using cursors and Transact-SQL. Considerations include locking models and appropriate usage.

²        Extract data in XML format. Considerations include output format and XML schema structure.

Programming Business Logic

²        Manage data manipulation by using stored procedures, transactions, triggers, user-defined functions, and views.

²        Enforce procedural business logic by using stored procedures, transactions, triggers, user-defined functions, and views.

²        Troubleshoot and optimize programming objects. Objects include stored procedures, transactions, triggers, user-defined functions, and views.

Tuning and Optimizing Data Access

²        Analyze the query execution plan. Considerations include query processor operations and steps.

²        Capture, analyze, and replay SQL Profiler traces. Considerations include lock detection, performance tuning, and trace flags.

²        Create and implement indexing strategies. Considerations include clustered index, covering index, indexed views, nonclustered index, placement, and statistics.

²        Improve index use by using the Index Tuning Wizard.

²        Monitor and troubleshoot database activity by using SQL Profiler.

Designing a Database Security Plan

²        Control data access by using stored procedures, triggers, user-defined functions, and views.

²        Define object-level security including column-level permissions by using GRANT, REVOKE, and DENY.

²        Create and manage application roles.

Exam 5Analyzing Requirements and Defining Microsoft .NET Solution Architectures

Envisioning the Solution

²        Develop a solution concept.

²        Analyze the feasibility of the solution.

²        Analyze and refine the scope of the solution project.

²        Identify key project risks.

Gathering and Analyzing Business Requirements

²        Gather and analyze business requirements.

²        Gather and analyze user requirements.

²        Gather and analyze operational requirements.

²        Gather and analyze requirements for hardware, software, and network infrastructure.

Developing Specifications

²        Transform requirements into functional specifications. Considerations include performance, maintainability, extensibility, scalability, availability, deployability, security, and accessibility.

²        Transform functional specifications into technical specifications. Considerations include performance, maintainability, extensibility, scalability, availability, deployability, security, and accessibility.

Creating the Conceptual Design

²        Create a conceptual model of business requirements or data requirements. Methods include Object Role Modeling (ORM).

²        Validate the conceptual design.

Creating the Logical Design

²        Create the logical design for the solution.

²        Create the logical data model.

²        Validate the proposed logical design.

Creating the Physical Design

²        Select the appropriate technologies for the physical design of the solution.

²        Create the physical design for the solution.

²        Create the physical design for deployment.

²        Create the physical design for maintenance.

²        Create the physical design for the data model.

²        Validate the physical design.

Creating Standards and Processes

²        Establish standards. Standards can apply to development documentation, coding, code review, UI, and testing.

²        Establish processes. Processes include reviewing development documentation, reviewing code, creating builds, tracking issues, managing source code, managing change, managing release, and establishing maintenance tasks. Methods include Microsoft Visual Studio .NET Enterprise Templates.

²        Establish quality and performance metrics to evaluate project control, organizational performance, and return on investment.

 

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 1
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值