Nux Solutions whatsapp

CompTIA Server+ Training and Certification


Nux Software Solutions offers exceptional CompTIA Server+ training in Coimbatore, designed to elevate your server administration skills and career prospects. Our program stands out with:

  • Industry-expert instructors with extensive real-world experience
  • Advanced, 24/7 accessible lab infrastructure
  • Hands-on, practical learning approach
  • Flexible training options for professionals and corporations
  • Innovative learning methods and delivery models
  • Cost-effective programs tailored to your needs

Why Choose CompTIA Server+ Certification?

CompTIA Server+ is a globally recognized certification that sets you apart in the IT industry:

  • Performance-based assessment ensures real-world readiness
  • Trusted by employers worldwide for identifying skilled server administrators
  • Regularly updated to reflect current industry demands and technologies
  • Validates core skills in server hardware, software, storage, and troubleshooting

Our Training Approach

At Nux Software Solutions, we prioritize your success:

  • Comprehensive curriculum covering all CompTIA Server+ exam objectives
  • Blend of theoretical knowledge and practical application
  • Simulated server environments for hands-on experience
  • Personalized attention to address individual learning needs

Career Opportunities

CompTIA Server+ certification opens doors to various IT roles, including:

  • Server Administrator
  • Systems Engineer
  • Cloud Engineer
  • Data Center Technician

Invest in your future with our CompTIA Server+ training. Gain the skills and confidence to excel in server administration and propel your IT career forward.

Ready to become a server expert? Contact Nux Software Solutions today to enroll in the best CompTIA Server+ training in Coimbatore!


CompTIA Server+ Syllabus


Server Architecture - 12%
  • Explain the purpose and function of server form factors.
  • 1. Rack mount, Dimensions, 1U, 2U, 4U, Cable management arms, Rail kits, 2. Tower, 3. Blade technology, Blade enclosure, Backplane/midplane, Power supply sockets, Network modules/switches, Management modules, Blade server,

  • Given a scenario, install, configure and maintain server components.
  • 1. CPU, Multiprocessor vs. multicore, Socket type, Cache levels: L1, L2, L3, Speeds, Core, Bus, Multiplier, CPU stepping, Architecture, x86, x64, ARM, 2. RAM, ECC vs. non-ECC, DDR2, DDR3, Number of pins, Static vs. dynamic, Module placement, CAS latency, Timing, Memory pairing, 3. Bus types, bus channels and expansion slots, Height differences and bit rate differences, PCI, PCIe, PCI-X, 4. NICs, 5. Hard drives, 6. Riser cards, 7. RAID controllers, 8. BIOS/UEFI, CMOS battery, 9. Firmware, 10. USB interface/port, 11. Hotswap vs. non-hotswap components,

  • Compare and contrast power and cooling components
  • 1. Power, Voltage, 110v vs. 220v vs. -48v, 208v vs. 440v/460v/480v, Wattage, Consumption, Redundancy, 1-phase vs. 3-phase power, Plug types, NEMA, Edison, Twist lock, 2. Cooling, Airflow, Thermal dissipation, Baffles/shrouds, Fans, Liquid cooling,

    Server Administration - 24%
  • Install and configure server operating systems
  • 1. Determine server role/purpose, 2. Update firmware, 3. BIOS/UEFI configuration, Boot order, 4. Disk preparation, RAID setup, Partitioning, Formatting, File system type, Ext 2, 3, 4, NTFS, FAT32, ReiserFS, UFS, VMFS, ZFS, Swap, 5. Configure host name, 6. Local account setup, 7. Connect to network, 8. Join domain/directory, 9. Address security concerns, Patching, OS hardening, Compliance to company procedures/standards, 10. Enable services, 11. Install features/roles/applications/drivers, 12. Performance baseline, Server optimization, Swap or pagefile optimization, 13. Unattended/remote installations, Deploying images and cloning, Scripted installs, PXE boot, TFTP,

  • Compare and contrast server roles and requirements for each.
  • 1. Web server, 2. Application server, 3. Directory server, 4. Database server, 5. File server, 6. Print server, 7. Messaging server, 8. Mail server, 9. Routing and remote access server, 10. Network services server, DHCP, DNS/WINS, NTP,

  • Given a scenario, use access and control methods to administer a server.
  • 1. Local hardware administration, KVM, Serial, Virtual administration console, 2. Network-based hardware administration, KVM over IP, ILO, iDRAC, 3. Network-based operating system administration, RDP, SSH, VNC, Command line/shell,

  • Given a scenario, perform proper server maintenance techniques.
  • 1. Change management, 2. Patch management, Operating system updates, Application updates, Security software updates, Firmware updates, Device drivers updates, Compatibility lists, Operating systems, Hardware, Applications, Testing and validation, 3. Outages and service level agreements, Scheduled downtime, Unscheduled downtime, Impact analysis, Client notification, MTTR, 4. Performance monitoring, CPU utilization, Memory utilization, Network utilization, Disk utilization, Disk IOPS, Storage capacity, Comparison against performance baseline, Processes and services monitoring, Log monitoring, 5. Hardware maintenance, Check system health indicators, LEDs, Error codes, Beep codes, LCD messages, Replace failed components, Fans, Hard drives, RAM, Backplanes, Batteries, Preventive maintenance, Clearing dust, Check proper air flow, Proper shut down procedures, 6. Fault tolerance and high availability techniques, Clustering, Active/active, Active/passive, Load balancing, Round robin, Heartbeat,

  • Explain the importance of asset management and documentation.
  • 1. Asset management, Licensing, Labeling, Warranty, Life cycle management, Procurement, Usage, End of life, Disposal/recycling, Inventory, Make, Model, Serial number, Asset tag, 2. Documentation, Service manuals, Network diagrams, Architecture diagrams, Dataflow diagrams, Recovery documentation, Baseline documentation, Change management policies, Service level agreement, Server configuration, 3. Secure storage of sensitive documentation,

  • Explain the purpose and operation of virtualization components.
  • 1. Hosts and guests, 2. Management interface for virtual machines, 3. Hypervisor, Type I, Type II, Hybrid, 4. Hardware compatibility list, BIOS/UEFI compatibility and support, CPU compatibility support, AMD-V/Intel VT, 5. Resource allocation between guest and host, CPU, Storage, Memory, Network connectivity, Direct access (bridging) vs. NAT, Virtual NICs, Virtual switches, Video,

    Storage - 12%
  • Given a scenario, install and deploy primary storage devices based on given specifications and interfaces.
  • 1. Disk specifications, RPM, Dimensions/form factor, Capacity, Bus width, IOPS, Seek time and latency, Hotswap vs. non-hotswap components, 2. Interfaces, SAS, SATA, SCSI, USB, Fibre channel, 3. Hard drive vs. SSD,

  • Given a scenario, configure RAID using best practices
  • 1. RAID levels and performance considerations, 0, 1, 5, 6, 10, 2. Software vs. hardware RAID, Performance considerations, 3. Configuration specifications, Capacity, Bus types, Drive RPM, 4. Hotswap support and ramifications, 5. Hot spare vs. cold spare, 6. Array controller, Memory, Battery backed cache, Redundant controller,

  • Summarize hardware and features of various storage technologies.
  • 1. DAS, 2. NAS, CIFS/SMB, NFS, 3. SAN, iSCSI, FCoE, Fibre channel, LUN and LUN masking, HBAs and fabric switches, 4. JBOD, 5. Tape, Drive, Libraries, 6. Optical drive, 7. Flash, compact flash and USB drive,

  • Given a scenario, calculate appropriate storage capacity and plan for future growth.
  • 1. Base10 vs. Base2 disk size calculation (1000 vs. 1024), 2. Disk quotas, 3. Compression, 4. Capacity planning considerations, Operating system growth, Patches, Service packs, Log files, Temporary directories, Databases, Application servers, File servers, Archival,

    Security - 13%
  • Compare and contrast physical security methods and concepts.
  • 1. Multifactor authentication, Something you have, Something you know, Something you are, 2. Security concepts, Mantrap, RFID chip, ID card, Biometric, Keypad, Access list, Security guard, Security camera, Keys and locks, Cabinet, Rack mount, Server,

  • Given a scenario, apply server hardening techniques.
  • 1. OS hardening, Stopping unneeded services/ closing unneeded ports, Install only required software, Install latest operating system patches, 2. Application hardening, Install latest patches, Disabling unneeded services/roles/features, 3. Endpoint security, HIDS, Anti-malware, 4. Remediate security issues based on a vulnerability scan, 5. Hardware hardening, Disabling unneeded hardware and physical ports/devices, BIOS password, Disable WOL (Wake on LAN), Setup boot order, Chassis locks/intrusion detection,

  • Explain basic network security systems and protocols
  • 1. Firewall, Network-based, Host-based, 2. Port security/802.1x/NAC, 3. Router access list, 4. NIDS, 5. Authentication protocols, LDAP, RADIUS, TACACS, TACACS+, 6. PKI, Private key, Public key, Certificate authority, SSL/TLS, 7. VPN, 8. IPSec, 9. VLAN, 10. Security zones, DMZ, Public and private, Intranet and extranet

  • Implement logical access control methods based on company policy.
  • 1. ACLs, Users, Groups, Roles, Resources, File system, Network ACLs, Peripheral devices, Administrative rights, Distribution lists, 2. Permissions, Read, Write/modify, Execute, Delete, Full control/superuser, File vs. share,

  • Implement data security methods and secure storage disposal techniques.
  • 1. Storage encryption, File level encryption, Disk encryption, Tape encryption, 2. Storage media, Soft wipe, File deletion, Hard wipe, Zero out all sectors, Physical destruction, Remote wipe,

  • Given a scenario, implement proper environmental controls and techniques.
  • 1. Power concepts and best practices, UPS, Runtime vs. capacity, Automated graceful shutdown of attached devices, Periodic testing of batteries, Maximum load, Bypass procedures, Remote management, PDU, Connect redundant rack PDUs to separate circuits, Capacity planning, PDU ratings Total potential power draw, Multiple circuits, Connect redundant power supplies to separate PDUs, 2. Safety, ESD procedures, Fire suppression, Proper lifting techniques, Rack stability, Floor load limitations, Sharp edges and pinch points, 3. HVAC, Room and rack temperature and humidity, Monitoring and alert notifications, Air flow, Rack filler/baffle/blanking panels, Hot aisle and cold aisle,

    Networking - 10%
  • Given a scenario, configure servers to use IP addressing and network infrastructure services.
  • 1. IPv4 vs. IPv6, 2. Default gateway, 3. CIDR notation and subnetting, 4. Public and private IP addressing, 5. Static IP assignment vs. DHCP, 6. DNS, FQDN, Default domain suffix/search domain, 7. WINS, 8. NetBIOS, 9. NAT/PAT 10. MAC addresses, 11. Network Interface Card configuration, NIC teaming, Duplexing, Full, Half, Auto, Speeds, 10/100/1000 Mbps, 10 Gbps,

  • Compare and contrast various ports and protocols
  • 1. TCP vs. UDP
    2. SNMP 161
    3. SMTP 25
    4. FTP 20/21
    5. SFTP 22
    6. SSH 22
    7. SCP 22
    8. NTP 123
    9. HTTP 80
    10. HTTPS 443
    11. TELNET 23
    12. IMAP 143
    13. POP3 110
    14. RDP 3389
    15. FTPS 989/990
    16. LDAP 389/3268
    17. DNS 53
    18. DHCP 67/68

  • Given a scenario, install cables and implement proper cable management procedures.
  • 1. Copper, Patch cables, Crossover, Straight through, Rollover, 2. Fiber, Single mode, Multimode, 3. Connectors, ST, LC, BNC, SC, SFP, RJ-45, RJ-11, 4. Cable placement and routing, Cable channels, Cable management trays, Vertical, Horizontal, 5. Labeling, 6. Bend radius, 7. Plenum cables, 8. Cable ties,

    Disaster Recovery - 9%
  • Explain the importance of disaster recovery principles.
  • 1. Site types Hot site Cold site Warm site 2. Replication methods Disk-to-disk Server-to-server Site-to-site 3. Continuity of operations Disaster recovery plan Business continuity plan Business impact analysis Who is affected What is affected Severity of impact

  • Given a scenario, implement appropriate backup techniques.
  • 1. Methodology, Full/normal, Copy, Incremental, Differential, Snapshot, Selective, Bare metal, Open file, Data vs. OS restore, 2. Backup media, Linear access, Tape, Random access, Disk, Removable media, Optical media, 3. Media and restore best practices, Labeling, Integrity verification, Test restorability, Tape rotation and retention, 4. Media storage location, Offsite, Onsite, Security considerations, Environmental considerations,

    Troubleshooting - 20%
  • Explain troubleshooting theory and methodologies
  • 1. Identify the problem and determine the scope

    Question users/stakeholders and identify changes to the server/environment
    Collect additional documentation/logs
    If possible, replicate the problem as appropriate
    If possible, perform backups before making changes
    2. Establish a theory of probable cause (question the obvious)

    Determine whether there is a common element of symptom causing multiple problems
    3. Test the theory to determine cause

    Once theory is confirmed, determine next steps to resolve problem
    If theory is not confirmed, establish new theory or escalate
    4. Establish a plan of action to resolve the problem and notify impacted users
    5. Implement the solution or escalate as appropriate

    Make one change at a time and test/ confirm the change has resolved the problem
    If the problem is not resolved, reverse the change if appropriate and implement new change
    6. Verify full system functionality and if applicable implement preventative measures
    7. Perform a root cause analysis
    8. Document findings, actions and outcomes throughout the process

  • Given a scenario, effectively troubleshoot hardware problems, selecting the appropriate tools and methods.
  • 1. Common problems
    Failed POST
    Overheating
    Memory failure
    Onboard component failure
    Processor failure
    Incorrect boot sequence
    Expansion card failure
    Operating system not found
    Drive failure
    Power supply failure
    I/O failure
    2. Causes of common problems
    Third-party components or incompatible components
    Incompatible or incorrect BIOS
    Cooling failure
    Mismatched components
    Backplane failure
    3. Environmental issues
    Dust
    Humidity
    Temperature
    Power surge/failure
    4. Hardware tools
    Power supply tester (multimeter)
    Hardware diagnostics
    Compressed air
    ESD equipment

  • Given a scenario, effectively troubleshoot software problems, selecting the appropriate tools and methods.
  • 1. Common problems
    , User unable to log on, User cannot access resources, Memory leak, BSOD/stop, OS boot failure, Driver issues, Runaway process, Cannot mount drive, Cannot write to system log, Slow OS performance, Patch update failure, Service failure, Hangs no shut down, Users cannot print, 2. Cause of common problems
    , User Account Control (UAC/SUDO), Corrupted files, Lack of hard drive space, Lack of system resources, Virtual memory (misconfigured, corrupt), Fragmentation, Print server drivers/services, Print spooler, 3. Software tools
    , System logs, Monitoring tools (resource monitor, performance monitor), Defragmentation tools, Disk property tools (usage, free space, volume or drive mapping),

  • Given a scenario, effectively diagnose network problems, selecting the appropriate tools and methods.
  • 1. Common problems
    , Internet connectivity failure, Email failure, Resource unavailable, DHCP server misconfigured, Non-functional or unreachable, Destination host unreachable, Unknown host, Default gateway misconfigured, Failure of service provider, Cannot reach by host name/FQDN, 2. Causes of common problems
    , Improper IP configuration, VLAN configuration, Port security, Improper subnetting, Component failure, Incorrect OS route tables, Bad cables, Firewall (misconfiguration, hardware failure, software failure), Misconfigured NIC, routing/switch issues, DNS and/or DHCP failure, Misconfigured hosts file, IPv4 vs. IPv6 misconfigurations, 3. Networking tools
    , ping, tracert/traceroute, ipconfig/ifconfig, nslookup, net use/mount, route, nbtstat, netstat

  • Given a scenario, effectively troubleshoot storage problems, selecting the appropriate tools and methods.
  • 1. Common problems
    , Slow file access, OS not found, Data not available, Unsuccessful backup, Error lights, Unable to mount the device, Drive not available, Cannot access logical drive, Data corruption, Slow I/O performance, Restore failure, Cache failure, Multiple drive failure, 2. Causes of common problems
    , Media failure, Drive failure, Controller failure, HBA failure, Loose connectors, Cable problems, Misconfiguration, Improper termination, Corrupt boot sector, Corrupt file system table, Array rebuild, Improper disk partition, Bad sectors, Cache battery failure, Cache turned off, Insufficient space, Improper RAID configuration, Mismatched drives, Backplane failure, 3. Storage tools, Partitioning tools, Disk management, RAID array management, Array management, System logs, Net use/mount command, Monitoring tools,

  • Given a scenario, effectively diagnose security issues, selecting the appropriate tools and methods.
  • 1. Common problems
    , File integrity issue, Privilege escalation, Applications will not load, Cannot access network file/shares, Unable to open files, Excessive access, Excessive memory utilization, 2. Causes of common problems
    , Open ports, Active services, Inactive services, Intrusion detection configurations, Anti-malware configurations, Local/group policies, Firewall rules, Misconfigured permissions, Virus infection, Rogue processes/services, 3. Security tools
    , Port scanners, Sniffers, Cipher, Checksums, Telnet client, Anti-malware