• 02038757827
  • info@robustittraining.com
  • Facebook:
  • LinkedIn:
  • Youtube:

1st / 2nd Line IT Support Engineer Package

£2,500 + VAT
Save £1150.00 Enquire Now

Who this package is for?

If you are thinking of making a career in IT but do not have any experience or qualifications, then this training package is the one for you. It will train you from the very basics and build you up to an intermediate level of expertise.

This training package is made up of four professional certifications, which are are in high demand by employers. On completing this training package you will be eligble for any 1st/2nd These are as follows:

  • CompTIA A+

  • CompTIA Network+

  • Microsoft 365 Certified: Modern Desktop Administrator Association (MCMDAA: Windows 10)

  • Microsoft Certified Professional Server 2012

Benefits of training with us

  • Intuitive and rewarding online training resources

  • 24/7 access to our unique course materials

  • Custom built practical tasks and challenges

  • Official mock examinations to fully prepare you for any final exams

  • Career advice and CV support once training has been completed

  • Full printable course materials, allowing you take your learning offline at your own convenience

Enquiry Form

Request More Information

Cert Description CompTIA is constantly reviewing and updating the items on our certification exams with major revisions every three years. The CompTIA A+ Core Series is the latest version with expanded content on growing parts of the IT support role including an expansion of baseline security topics and a different approach to defining competency in operational procedures. Click here to learn about how this exciting new version of A+ is helping develop proven problem solvers for today's digital world.
Exam Codes CompTIA A+ 220-1001 (Core 1) and 220-1002 (Core 2)

Candidates must complete both 1001 and 1002 to earn certification. Exams cannot be combined across the series.
What you will learn
    Identifying, using, and connecting hardware components and devices
    Install and support Windows OS including command line & client support
    Troubleshoot PC and mobile device issues including application security support
    Install & configure laptops and other mobile devices
    Follow best practices for safety, environmental impacts, and communication and professionalism
    Explain types of networks and connections including TCP/IP, WIFI and SOHO
    Troubleshoot device and network issues
    Identify and protect against security vulnerabilities for devices and their network connections
    Understand Mac OS, Linux and mobile OS
Cert Description The CompTIA Network+ certification is a worldwide recognised qualification that validates the skills of networking professionals. The qualification recognises a technician's ability to describe the features and functions of network components and to manage, maintain, troubleshoot, install, operate and configure basic network infrastructure.
This certification will verify that the successful candidate has the knowledge and skills required to implement a defined network architecture with basic network security. Furthermore, a successful candidate will be able to configure, maintain, and troubleshoot network devices using appropriate network tools and understand the features and purpose of network technologies. Candidates will be able to make basic solution recommendations, analyse network traffic, and be familiar with common protocols and media types.
CompTIA Network+ helps develop a career in IT infrastructure covering troubleshooting, configuring, and managing networks.
Exam Codes CompTIA A+ N10-007

Candidates must complete the N10-007 to earn certification.
What you will learn
  • Networking Concepts:
    Explain the purpose of a variety of networking concepts and implement them appropriately
  • Infrastructure:
    Comprehend the financial aspects of engaging a cloud provider, as well as the business aspects of managing vendor relations in cloud adoptions.
  • Network Operations:
    Use best practices to manage the network, determine policies & ensure business continuity
  • Network Security:
    Summarize physical security & common attacks while securing the wired and wireless network
  • Network Troubleshooting & Tools:
    Explain the network troubleshooting methodology & appropriate tools to support connectivity & performances
Cert Description If you passed Exam 70-698 before it expired on March 31, 2019, you only need to take MD-101 to earn the Modern Desktop certification. Candidates for this exam are administrators who deploy, configure, secure, manage, and monitor devices and client applications in an enterprise environment. Candidates manage identity, access, policies, updates, and apps.
As an administrator, candidates typically collaborate with the M365 Enterprise Administrator to design and implement a device strategy that meets the business needs of a modern organization.
Candidates must be familiar with M365 workloads and must be proficient and experienced in deploying, configuring, and maintaining Windows 10 and non-Windows devices and technologies.
Exam Codes MD-100 & MD-101

Candidates must complete both MD-100 & MD-101 to earn certification. Exams cannot be combined across the series.
What you will learn
Deploy Windows
Deploy Windows 10
  • configure language packs

  • perform a clean installation

  • migrate user data

  • perform an in-place upgrade (using tools such as MDT, WDS, ADK, etc.)

  • select the appropriate Windows edition

  • troubleshoot activation issues
Perform post-installation configuration
  • configure Edge and Internet Explorer

  • configure mobility settings

  • configure sign-in options

  • customize the Windows desktop

Manage devices and data
Manage local users, local groups, and devices
  • manage devices in directories

  • manage local groups

  • manage local users
Configure data access and protection
  • configure NTFS permissions

  • configure shared permissions
Configure devices by using local policies
  • configure local registry

  • implement local policy

  • troubleshoot group policies on devices
Manage Windows security
  • configure user account control (UAC)

  • configure Windows Defender Firewall

  • implement encryption

Configure connectivitys
Configure networking
  • configure client IP settings

  • configure mobile networking

  • configure VPN client

  • troubleshoot networking

  • configure Wi-Fi profiles
Configure remote connectivity
  • configure remote management

  • enable PowerShell Remoting

  • configure remote desktop access

Maintain Windows
Configure system and data recovery
  • perform file recovery (including OneDrive)

  • recover Windows 10

  • troubleshoot startup/boot process
Manage updates
  • check for updates

  • troubleshoot updates

  • validate and test updates

  • select the appropriate servicing channel

  • configure Windows update options
Monitor and manage Windows
  • configure and analyze event logs

  • manage performance

  • manage Windows 10 environment

Deploy and update operating systems
Plan and implement Windows 10 by using dynamic deployment
  • evaluate and select an appropriate deployment options

  • pilot deployment

  • manage and troubleshoot provisioning packages
Plan and implement Windows 10 by using Windows Autopilot
  • evaluate and select an appropriate deployment options

  • pilot deployment

  • create, validate, and assign deployment profile

  • extract device HW information to CSV file

  • import device HW information to cloud service

  • troubleshoot deployment
Upgrade devices to Windows 10
  • identify upgrade and downgrade paths

  • manage in-place upgrades

  • configure a Windows analytics environment

  • perform Upgrade Readiness assessment

  • migrate user profiles
Manage updates
  • configure Windows 10 delivery optimization

  • configure Windows Update for Business

  • deploy Windows updates

  • implement feature updates

  • monitor Windows 10 updates
Manage device authentication
  • manage authentication policies

  • manage sign-on options

  • perform Azure AD join

Manage policies and profiles
Plan and implement co-management
  • implement co-management precedence

  • migrate group policy to MDM policies

  • recommend a co-management strategy
Implement conditional access and compliance policies for devices
  • implement conditional access policies

  • manage conditional access policies

  • plan conditional access policies

  • implement device compliance policies

  • manage device compliance policies

  • plan device compliance policies
Configure device profiles
  • implement device profiles

  • manage device profiles

  • plan device profiles
Manage user profiles
  • configure user profiles

  • configure Enterprise State Roaming in Azure AD

  • configure sync settings

  • implement Folder Redirection (including OneDrive)
Manage and protect devices
Manage Windows Defender
  • implement and manage Windows Defender Application Guard

  • implement and manage Windows Defender Credential Guard

  • implement and manage Windows Defender Exploit Guard

  • implement Windows Defender Advanced Threat Protection

  • integrate Windows Defender Application Control

  • manage Windows Defender Antivirus
Manage Intune device enrollment and inventory
  • configure enrollment settings

  • configure Intune automatic enrollment

  • enable device enrollment

  • enroll non-Windows devices

  • enroll Windows devices

  • generate custom device inventory reports

  • review device inventory
Monitor devices
  • monitor device health (e.g., log analytics, Windows Analytics, or other cloud-based tools)

  • monitor device security
Manage apps and data
Deploy and update applications
  • assign apps to groups

  • deploy apps by using Intune

  • deploy apps by using Microsoft Store for Business

  • deploy O365 ProPlus; enable sideloading of apps into images

  • gather Office readiness data

  • configure IE Enterprise mode

  • configure and implement assigned access or public devices
Implement Mobile Application Management (MAM)
  • implement MAM policies

  • manage MAM policies

  • plan MAM

  • configure Windows Information Protection

  • implement Azure Information Protection templates

  • securing data by using Intune

Cert Description This exam is part two of a series of three exams that test the skills and knowledge necessary to administer a Windows Server 2012 infrastructure in an enterprise environment. Passing this exam validates a candidate's ability to administer the tasks required to maintain a Windows Server 2012 infrastructure, such as user and group management, network access, and data security. Passing this exam along with the other two exams confirms that a candidate has the skills and knowledge necessary for implementing, managing, maintaining, and provisioning services and infrastructure in a Windows Server 2012 environment.
Exam Codes Microsoft Exam Code: 70-411

Candidates must complete the 70-411 to earn certification. Exams cannot be combined across the series.
What you will learn
Deploy, Manage, and Maintain Servers
Deploy and manage server images
  • Install the Windows Deployment Services (WDS) role; configure and manage boot, install, and discover images; update images with patches, hotfixes, and drivers; install features for offline images; configure driver groups and packages
Implement patch management
  • Install and configure the Windows Server Update Services (WSUS) role; configure group policies for updates; configure client-side targeting; configure WSUS synchronization; configure WSUS groups; manage patch management in mixed environments
Monitor servers
  • Configure Data Collector Sets (DCS); configure alerts; monitor real-time performance; monitor virtual machines (VMs); monitor events; configure event subscriptions; configure network monitoring; schedule performance monitoring

Configure File and Print Service
Configure Distributed File System (DFS)
  • Install and configure DFS namespaces; configure DFS Replication Targets; configure Replication Scheduling; configure Remote Differential Compression settings; configure staging; configure fault tolerance; clone a DFS database; recover DFS databases; optimize DFS replication
Configure File Server Resource Manager (FSRM)
  • Install the FSRM role service; configure quotas; configure file screens; configure reports; configure file management tasks
Configure file and disk encryption
  • Configure Bitlocker encryption; configure the Network Unlock feature; configure Bitlocker policies; configure the EFS recovery agent; manage EFS and Bitlocker certificates including backup and restore
Configure advanced audit policies
  • Implement auditing using Group Policy and AuditPol.exe; create expression-based audit policies; create removable device audit policies

Configure Network Services and Access
Configure DNS zones
  • Configure primary and secondary zones; configure stub zones; configure conditional forwards; configure zone and conditional forward storage in Active Directory; configure zone delegation; configure zone transfer settings; configure notify settings
Configure DNS records
  • Create and configure DNS Resource Records (RR) including A, AAAA, PTR, SOA, NS, SRV, CNAME, and MX records; configure zone scavenging; configure record options including Time To Live (TTL) and weight; configure round robin; configure secure dynamic updates
Configure VPN and routing
  • Install and configure the Remote Access role; implement Network Address Translation (NAT); configure VPN settings; configure remote dial-in settings for users; configure routing; configure Web Application proxy in passthrough mode
Configure DirectAccess
  • Implement server requirements; implement client configuration; configure DNS for Direct Access; configure certificates for Direct Access

Configure a Network Policy Server Infrastructure
Configure Network Policy Server (NPS)
  • Configure a RADIUS server including RADIUS proxy; configure RADIUS clients; configure NPS templates; configure RADIUS accounting; configure certificates
Configure NPS policies
  • Configure connection request policies; configure network policies for VPN clients (multilink and bandwidth allocation, IP filters, encryption, IP addressing); import and export NPS policies

Configure and Manage Active Directory
Configure service authentication
  • Create and configure Service Accounts; create and configure Group Managed Service Accounts; configure Kerberos delegation; manage Service Principal Names (SPNs); configure virtual accounts
Configure Domain Controllers
  • Transfer and seize operations master roles; install and configure a read-only domain controller (RODC); configure Domain Controller cloning
Maintain Active Directory
  • Back up Active Directory and SYSVOL; manage Active Directory offline; optimize an Active Directory database; clean up metadata; configure Active Directory snapshots; perform object- and container-level recovery; perform Active Directory restore; configure and restore objects by using the Active Directory Recycle Bins
Configure account policies
  • Configure domain and local user password policy settings; configure and apply Password Settings Objects (PSOs); delegate password settings management; configure account lockout policy settings; configure Kerberos policy settings

Configure and Manage Group Policy
Configure Group Policy processing
  • Configure processing order and precedence; configure blocking of inheritance; configure enforced policies; configure security filtering and WMI filtering; configure loopback processing; configure and manage slow-link processing and Group Policy caching; configure client-side extension (CSE) behavior; force Group Policy Update
Configure Group Policy settings
  • Configure settings including software installation, folder redirection, scripts, and administrative template settings; import security templates; import custom administrative template file; configure property filters for administrative templates
Manage Group Policy objects (GPOs)
  • Back up, import, copy, and restore GPOs; create and configure Migration Table; reset default GPOs; delegate Group Policy management
Configure Group Policy Preferences (GPP)
  • Configure GPP settings including printers, network drive mappings, power options, custom registry settings, Control Panel settings, Internet Explorer settings, file and folder deployment, and shortcut deployment; configure item-level targeting

Enquire now

If you are interested in any of these training packages get in touch with us today. One of our friendly and expert course advisors will be in touch.

Our training is trusted and accredited
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1
Brand 1