MasterClass: Troubleshooting Windows Infrastructure - From Zero to Hero
Kursavgift: kr 25 000 | Varighet: 5 dager
Enterprise administrators, infrastructure architects, security
professionals, systems engineers, network administrators, IT
professionals, security consultants and other people responsible for implementing network and perimeter security.
To attend this training you should have good hands-on experience in administering Windows infrastructure. At least 8 years
in the field is recommended. You should have good understanding of how operating system works. Ideally you should have
read the book “Windows Internals” by Mark Russinovich.
Author’s unique tools, over 150 pages of exercises, presentations slides with notes.
Module 1: Virtualization performance analysis
This module allows students to understand how virtualization impacts performance. Exercises contain usage of tools and
making business related decisions based on the measurements. Training cover optimization techniques for known
Module 2: Operating system monitoring
This module covers generic system monitoring to learn the basics of monitoring. It is a great introduction to go further with
Module 3: Advanced Memory Analysis
This module explains to students what is happening in the memory, how it works, how to get into it and how to monitor it.
Students except for memory analysis will practice debugging memory dumps.
Module 4: Advanced disk performance analysis
Within this module students will become familiar with disk performance monitoring – starting with RAIDs, ending up with
cluster configuration techniques. For some server roles cluster size really matters, so that administrators can achieve the best
performance in specific infrastructure configuration.
Module 5: Xperf and usage scenarios
Several tools allow to get very detailed information about the system performance. This is needed when you need to figure
out these delicate problems that slow servers down. Students in this module gain knowledge about how to monitor several
operating system components and how to cope with the every--day situations like: processor usage, disk usage, memory
usage, network activity, slow booting and other.
Module 6: Kernel Mode and User Mode monitoring techniques
From the continuity perspective blues screen is always an unpleasant experience. From the debugging perspective – we have
just been protected from malicious things that could happen to operating system integrity. Blue screen is positive in its own
way – it helps to intricate who caused the problem, it needs to be analyzed though. Within this module students will become
familiar with kernel mode and user mode techniques and tools.
Module 7: Network monitoring
Starting from simple network sniffing, ending up with advanced network monitoring to the size of the buffers written. Several
techniques used during the training.