وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Active Directory and Windows Server 40+ Hour with Labs

سرفصل های دوره

Domain Controllers (DC), Global Catalog, FSMO, Groups, Users, Security, Domains and Forests ,Trusts, GPO, much more..


1. Active Directory Introduction and Administration Tools
  • 1. Course introduction
  • 2. Module 1 Installing and configuring domain controllers. Overview
  • 3. AD DS components
  • 4. AD DS A Guide to its Logical and Physical Components.html
  • 5. AD DS Logical and Physical Components.html
  • 6. What is the AD DS schema
  • 7. Understanding the AD DS Schema.html
  • 8. Exploring the AD DS Schema Components, Roles, and Modification.html
  • 9. What is an AD DS forest
  • 10. Active Directory Domain Services (AD DS) Forests and Domain Trees.html
  • 11. Real-Life Scenario Expanding a Growing Organization with Active Directory.html
  • 12. Exploring Active Directory Domain Services (AD DS) Forests and Domain Trees.html
  • 13. What is an AD DS domain
  • 14. What are OUs
  • 15. What is Azure AD
  • 16. Overview of AD DS administration tools
  • 17. Using the Active Directory Administrative Center to administer and manage AD DS

  • 2. Overview of AD DS domain controllers
  • 1. Introduction
  • 2. What is a domain controller
  • 3. What is a global catalog
  • 4. Overview of domain controller SRV records
  • 5. AD DS sign-in process
  • 6. What are operations masters
  • 7. Transferring and seizing roles

  • 3. Deploying a domain controller
  • 1. Deploying a domain controller
  • 2. Installing a domain controller from Server Manager
  • 3. Demonstration Installing a domain controller from Server Manager
  • 4. Installing a domain controller on a Server Core installation of Windows Server 2
  • 5. Installing a domain controller by installing from media
  • 6. Cloning domain controllers
  • 7. Demonstration Cloning domain controllers
  • 8. Best Practices for Domain Controller Virtualization
  • 9. Demonstration Adding Another domain controllers
  • 10. Demonstration Installing a domain controller with Powershell
  • 11. Demonstration FSMO Roles

  • 4. Demo Building Windows Server 2022 Lab
  • 1. Introduction and Installing Windows Server 2022
  • 2. Activating Windows Server 2022
  • 3. Post-Install Tasks. Part 1
  • 4. Post-Install Tasks. Part 2
  • 5. Setting a Base Image with SYSPREP
  • 6. Recap
  • 7. Setting up your first DC
  • 8. Installing WAC and Joing a workstation to the domain
  • 9. Server Core
  • 10. Adding a Child Domain to the Lab
  • 11. Recap Base Lab SOP
  • 12. AD DS Admin Tools

  • 5. Managing user accounts
  • 1. Managing user accounts
  • 2. Creating user accounts
  • 3. Configuring user account attributes
  • 4. Demonstration Managing user accounts
  • 5. Demonstration Creating user profiles
  • 6. Demonstration User account templates

  • 6. Using Windows PowerShell cmdlets to manage user accounts
  • 1. Using Windows PowerShell cmdlets to manage user accounts
  • 2. Using Windows PowerShell to create users
  • 3.1 9.Using Windows PowerShell for bulk users operations
  • 3. Using Windows PowerShell for bulk users operations
  • 4. Using Windows PowerShell to modify users properties
  • 5. Using Windows PowerShell to add users to groups
  • 6. Using Windows PowerShell to modify users properties. Part2
  • 7. Using Windows PowerShell to enablemove users
  • 8. Using Windows PowerShell to delete users
  • 9. Identity with Windows Server.html

  • 7. Managing groups in AD DS
  • 1. Managing groups in AD DS Section Overview
  • 2. Group types
  • 3. Group scopes
  • 4. Implementing group management
  • 5. Managing members with GPO
  • 6. Default groups
  • 7. Special identities
  • 8. Demonstration Managing groups in Windows Server
  • 9. Demonstration Managing groups in Windows Server with Powershell

  • 8. Managing computer objects in AD DS
  • 1. Managing computer objects in AD DS Section Overview
  • 2. Specifying the location of computer accounts
  • 3. Controlling permissions to create computer accounts
  • 4. Joining a computer to a domain
  • 5. Resetting the computer account (secure channel)
  • 6. Performing an offline domain join

  • 9. Implementing and managing OUs
  • 1. Implementing and managing OUs Section Overview
  • 2. Planning OUs
  • 3. OU hierarchy considerations
  • 4. Considerations for using OUs
  • 5. AD DS permissions
  • 6. Delegating AD DS permissions

  • 10. Using Windows PowerShell for groups and computers administration
  • 1. Using Windows PowerShell for AD DS administration Section Overview
  • 2. Using Windows PowerShell cmdlets to manage groups
  • 3. PowerShell Managing, configuring and modifying Group objects. Part 1
  • 4. PowerShell Managing, configuring and modifying Group objects. Part 2
  • 5. PowerShell Managing, configuring and modifying Group objects. Part 3
  • 6. PowerShell Managing, configuring and modifying Group objects. Part 4
  • 7. PowerShell Managing, configuring and modifying Group objects. Part 5
  • 8. Windows PowerShell cmdlets to manage computers and OUs
  • 9. PowerShell Managing, configuring and modifying Computer objects. Part 1
  • 10. PowerShell Managing, configuring and modifying Computer objects. Part 2
  • 11. Powershell Key Concepts

  • 11. Advanced AD DS infrastructure management
  • 1. Course Overview
  • 2. Section Overview
  • 3. Overview of domain and forest boundaries in an AD DS structure
  • 4. Why implement multiple domains
  • 5. Why implement multiple forests
  • 6. Deploying a domain controller in Azure IaaS
  • 7. Managing objects in complex AD DS deployments
  • 8. Deploying a distributed AD DS environment. Section Overview
  • 9. AD DS domain functional levels
  • 10. AD DS forest functional levels
  • 11. Deploying new AD DS domains
  • 12. Considerations for implementing complex AD DS environments
  • 13. Demo Installing a domain controller in a new domain in an existing forest
  • 14. Upgrading a previous version of AD DS to Windows Server 2016
  • 15. Migrating to Windows Server 2016 AD DS from a previous version
  • 16. Configuring AD DS trusts. Section Overview
  • 17. Overview of different AD DS trust types
  • 18. How trusts work in a forest
  • 19. How trusts work between forests
  • 20. Configuring advanced AD DS trust settings

  • 12. Implementing and administering AD DS sites and replication
  • 1. Course Overview
  • 2. Section Overview
  • 3. What are AD DS partitions
  • 4. Characteristics of AD DS replication
  • 5. How AD DS replication works within a site
  • 6. Resolving replication conflicts
  • 7. How replication topology is generated
  • 8. How SYSVOL replication works
  • 9. Configuring AD DS sites Section Overview
  • 10. What are AD DS sites
  • 11. Why implement additional sites
  • 12. How replication works between sites
  • 13. What is the ISTG
  • 14. Overview of SRV records
  • 15. How client computers locate domain controllers within sites
  • 16. Moving domain controllers between sites
  • 17. Configuring and monitoring AD DS replication Section Overview
  • 18. What are AD DS site links
  • 19. What is site link bridging
  • 20. What is universal group membership caching
  • 21. Lab Sites and Replication. Exercies and Tasks
  • 22. Lab Sites and Replication. Solution
  • 23. Identity with Windows Server.html

  • 13. Implementing Group Policy
  • 1. Introduction
  • 2. What is Configuration management
  • 3. Overview of Group Policy tools and consoles
  • 4. Computer Configuration and User Configuration
  • 5. Demonstration Exploring Group Policy tools and consoles
  • 6. Benefits of using Group Policy
  • 7. Group Policy Objects
  • 8. Overview of GPO scope
  • 9. Overview of GPO inheritance
  • 10. The Group Policy Client service and client-side extensions
  • 11. Lesson 2 Implementing and administering GPOs
  • 12. What are domain-based GPOs
  • 13. GPO storage
  • 14. What are starter GPOs
  • 15. Common GPO management tasks
  • 16. Delegating administration of Group Policy
  • 17. Demo Delegating administration of Group Policy
  • 18. Lesson 3 Group Policy scope and Group Policy processing
  • 19. What are GPO links
  • 20. Group Policy processing order
  • 21. Configuring GPO inheritance and precedence
  • 22. Using security filtering to modify Group Policy scope
  • 23. What are WMI filters
  • 24. Lab A Tasks Implementing a Group Policy infrastructure
  • 25. Lab A Solution Implementing a Group Policy infrastructure
  • 26. Lab Review

  • 14. Troubleshooting the application of GPOs
  • 1. Troubleshooting the application of GPOs Lesson Overview
  • 2. What is RSoP and Generating RSoP Report
  • 3. Demo Performing a what-if analysis with Group Policy Modeling Wizard
  • 4. Examining Group Policy event logs
  • 5. Detecting Group Policy health issues
  • 6. Review and Takeaways
  • 7. Lab B Tasks Troubleshooting Group Policy infrastructure
  • 8. Lab B Solution Troubleshooting Group Policy infrastructure
  • 9. Lab Review
  • 10. Module Review and Takeaways

  • 15. Managing user settings with Group Policy
  • 1. Course Overview
  • 2. Section Overview
  • 3. What are administrative templates
  • 4. What are .adm and .admx files
  • 5. Overview of the central store
  • 6. Demonstration Configuring settings with administrative templates
  • 7. Importing security templates
  • 8. Managing administrative templates

  • 16. Configuring Folder Redirection, Software Installation, and Scripts
  • 1. Section Overview
  • 2. What is Folder Redirection
  • 3. Settings for configuring Folder Redirection
  • 4. Security settings for redirected folders
  • 5. Demonstration Configuring Folder Redirection
  • 6. Managing software with Group Policy
  • 7. Group Policy settings for applying scripts
  • 8. Demonstration Configuring scripts with GPOs
  • 9. Identity with Windows Server.html

  • 17. Configuring Group Policy preferences
  • 1. Section Overview
  • 2. What are Group Policy preferences Comparing with Policy settings
  • 3. Features of Group Policy preferences
  • 4. Item-level targeting options
  • 5. Demonstration Configuring Group Policy preferences
  • 6. Identity with Windows Server.html
  • 7. Lab Tasks Managing user settings with Group Policy
  • 8. Lab Solution Managing user settings with Group Policy
  • 9. Lab Review Managing user settings with Group Policy
  • 10. Module Review and Takeaways Managing user settings with Group Policy

  • 18. Group Policy Deployment Strategies
  • 1. Designing a Group Policy Friendly AD
  • 2. Demo Designing a Group Policy Friendly AD
  • 3. Best Practices for GP Deployment
  • 4. Demo Best Practices for GP Deployment
  • 5. Designing for Performance
  • 6. Module Review and Takeaways

  • 19. Introduction to Group Policy Scripting
  • 1. The Microsoft Group Policy PowerShell Module
  • 2. Demo The Microsoft Group Policy PowerShell Module
  • 3. Basic GPO Management With PowerShell
  • 4. Demo Basic GPO Management With PowerShell

  • 20. Securing domain controllers
  • 1. Section Overview
  • 2. Security risks that can affect domain controllers
  • 3. Modifying the security settings of domain controllers
  • 4. Implementing secure authentication
  • 5. Securing physical access to domain controllers
  • 6. What are RODCs
  • 7. Deploying an RODC
  • 8. Planning and configuring an RODC password replication policy
  • 9. Demonstration Configuring a password replication policy
  • 10. Separating RODC local administration

  • 21. Implementing account security
  • 1. Section Overview
  • 2. Password policies
  • 3. Account lockout policies
  • 4. Kerberos policies
  • 5. Demonstration Configuring a fine-grained password policy
  • 6. Protecting groups in AD DS
  • 7. Fine-grained password and lockout policies
  • 8. Tools for creating PSOs
  • 9. Demonstration Configuring authentication-related audit policies and viewing log
  • 10. PSO precedence and resultant PSO
  • 11. Account-security options
  • 12. Configuring user account policies

  • 22. Implementing audit authentication
  • 1. Section Overview
  • 2. Account logon and logon events
  • 3. Demonstration Configuring authentication-related audit policies and viewing log
  • 4. Scoping audit policies

  • 23. Configuring managed service accounts
  • 1. Section Overview
  • 2. Overview of service accounts
  • 3. Challenges of using service accounts
  • 4. Overview of managed service accounts
  • 5. What are group MSAs
  • 6. Demonstration Configuring group MSAs
  • 7. Lab Securing AD DS Exercises and Tasks
  • 8. Lab Securing AD DS. Solution
  • 9. Lab Securing AD DS. Solution. Part 2
  • 10. Lab Review
  • 11. Module Review and Takeaways

  • 24. Securing Windows Server and Group Policy
  • 1. SMB Security Features
  • 2. Demo Securing SMB - Auditing and Blocking SMBv1
  • 3. Demo Securing SMB Part 2 - SMB Signing and Encryption
  • 4. NTLM Security
  • 5. Implementing NTLM Security
  • 6. DNS Security
  • 7. Implementing DNSSEC
  • 8. Secure Management
  • 9. Managing Servers Using Windows Admin Center
  • 10. Protecting Credentials
  • 11. Microsoft Tiering Model
  • 12. Using the Protected Users Group
  • 13. Authentication Policy and Silo
  • 14. Protecting Privileged Accounts with Authentication Policies and Silos
  • 15. Local Admin Password Solution (LAPS)
  • 16. Preparing Active Directory for LAPS
  • 17. Installing the LAPS Client Side Extension
  • 18. Working with LAPS
  • 19. Credential Guard
  • 20. Verifying Hardware Compatibility for Credential Guard
  • 21. Enabling Credential Guard
  • 22. User Rights Assignment
  • 23. Working with User Rights Assignment
  • 24. Privileged Access Workstation (PAW)

  • 25. Deploying CAs
  • 1. Plan Your Progress
  • 2. Course Overview
  • 3. Section Overview Deploying CAs
  • 4. What is AD CS
  • 5. Options for implementing CA hierarchies
  • 6. Standalone vs. enterprise CAs
  • 7. Considerations for deploying a root CA
  • 8. Demonstration Deploying an enterprise root CA
  • 9. Considerations for deploying a subordinate CA
  • 10. How to use the CAPolicy.inf file for installing a CA

  • 26. Administering CAs
  • 1. Section Overview Administering CAs
  • 2. Managing CAs
  • 3. Configuring CA security
  • 4. Security roles for CA administration
  • 5. Configuring CA policy and exit modules
  • 6. Configuring CDPs and AIA locations
  • 7. Demonstration Configuring CA properties

  • 27. Troubleshooting and maintaining CAs
  • 1. Section Overview Troubleshooting CAs
  • 2. Troubleshooting CAs
  • 3. Renewing a CA certificate
  • 4. Moving a root CA to another computer
  • 5. Monitoring CA operations
  • 6. Lab Task Deploying and managing AD CS
  • 7. Lab Demonstration Steps Deploying and managing AD CS

  • 28. Deploying and managing certificates. Deploying and managing certificate template
  • 1. Course Overview
  • 2. Section Overview
  • 3. What are certificates and certificate templates
  • 4. Certificate template versions in Windows Server
  • 5. Configuring certificate template permissions
  • 6. Configuring certificate template settings
  • 7. Options for updating a certificate template
  • 8. Demonstration Modifying and enabling a certificate template

  • 29. Managing certificate deployment, revocation, and recovery
  • 1. Assess Your Knowledge. Section Overview Managing certificate deployment
  • 2. Certificate enrollment methods
  • 3. Overview of certificate autoenrollment
  • 4. What is an enrollment agent
  • 5. How does certificate revocation work
  • 6. Overview of key archival and recovery
  • 7. Demonstration Configuring a CA for key archival
  • 8. Using certificates for SSL
  • 9. Using certificates for digital signatures
  • 10. Using certificates for content encryption
  • 11. Demonstration Signing a document digitally. Encrypting a file with EFS

  • 30. Lab Deploying and using certificates
  • 1. Lab Task Deploying and using certificates
  • 2. Lab Demonstration Steps Deploying and using certificates
  • 3. Module Review and Takeaways

  • 31. Implementing and Administering AD FS
  • 1. Course Overview
  • 2. Overview of AD FS section Overview
  • 3. What is identity federation
  • 4. What are claims-based identity and claims-based authentication
  • 5. Overview of web services
  • 6. What is AD FS
  • 7. Whats new in AD FS in Windows Server 2016
  • 8. How AD FS enables SSO in a single organization
  • 9. How AD FS enables SSO in a business-to-business federation
  • 10. Section overview AD FS requirements and Planning
  • 11. AD FS components
  • 12. AD FS requirements
  • 13. PKI and certificate requirements
  • 14. Federation server roles
  • 15. Planning an AD FS deployment for online services
  • 16. Planning a highly available AD FS deployment
  • 17. Capacity planning

  • 32. Deploying and configuring AD FS
  • 1. Section Overview Deploying and configuring AD FS
  • 2. What are AD FS claims and claim rules
  • 3. What is a claims provider trust
  • 4. What is a relying party trust
  • 5. Installing and configuring AD FS
  • 6. Configuring an account partner and a resource partner
  • 7. Configuring claims rules
  • 8. How home realm discovery works
  • 9. Managing an AD FS deployment

  • 33. Web Application Proxy
  • 1. Web Application Proxy. Section Overview
  • 2. What is the Web Application Proxy
  • 3. Web Application Proxy authentication methods
  • 4. Scenarios for using the Web Application Proxy
  • 5. Installing and configuring the Web Application Proxy

  • 34. Even More on Group Policy - Group Policy Processing
  • 1. Group Policy Processing
  • 2. Demo Understanding Group Policy Processing
  • 3. Group Policy Targeting
  • 4. Demo Group Policy Targeting at Work
  • 5. Group Policy Linking, Filtering, and Order of Processing
  • 6. Demo Examples of GPO Linking, Filtering, and LSDOU
  • 7. GPO Processing Hierarchy
  • 8. Demo GPO Processing Hierarchy
  • 9. Summary

  • 35. Tools of the Trade
  • 1. Installing the GPMC
  • 2. Demo Downloading and Installing GPMC
  • 3. Navigating the GPMC
  • 4. Demo Navigating the GPMC
  • 5. Understanding GPO Properties
  • 6. Demo Understanding GPO Properties
  • 7. Creating and Editing GPOs
  • 8. Demo Creating, Editing, and Commenting GPOs
  • 9. Summary

  • 36. How Group Policy Gets Applied
  • 1. The Group Policy Processing Cycle
  • 2. Background and Foreground Processing
  • 3. Synchronous and Asynchronous Processing
  • 4. Demo Synchronous and Asynchronous Processing
  • 5. Group Policy Processing Mechanics
  • 6. Demo Group Policy Processing Mechanics
  • 7. Manual GP Processing
  • 8. Demo Manual GP Processing
  • 9. Summary

  • 37. Policy Scenarios - Desktop and Server Lockdown
  • 1. Understanding Administrative Templates Policy
  • 2. Demo How Registry Tattooing Works
  • 3. Administrative Templates and ADMX Files
  • 4. Demo Administrative Templates and ADMX Files
  • 5. Deploying Administrative Templates
  • 6. Summary

  • 38. Policy Scenarios - Security Policy
  • 1. Overview of Available Security Policy
  • 2. Deployment Scenario Group Membership Control
  • 3. Demo Group Membership Control
  • 4. Deployment Scenario Managing Windows Firewall
  • 5. Demo Managing Windows Firewall
  • 6. Application Control Policies (AppLocker)
  • 7. Demo AppLocker
  • 8. Demo AppLocker

  • 39. Policy Scenarios - Managing Internet Explorer Configuration
  • 1. The Three Policy Areas for Managing IE
  • 2. Demo Introducing the Three IE Policy Areas
  • 3. Using GP Preferences Internet Settings
  • 4. Demo Using GP Preferences Internet Settings
  • 5. Using IE Administrative Templates
  • 6. Demo Using IE Administrative Templates
  • 7. Managing (and Removing) IE Maintenance Policy
  • 8. Demo Managing (and Removing) IE Maintenance Policy
  • 9. Summary

  • 40. Even More on Group Policy - Scenarios - Deploying Software Using Group Policy
  • 1. Capabilities and Features in Group Policy Software Installation
  • 2. Demo Capabilities & Features in Group Policy Installation
  • 3. GPSI Best Practices
  • 4. Demo Deploying Software Using Group Policy
  • 5. Managing the Software Lifecycle
  • 6. Demo Patching an Existing Deployment
  • 7. Summary

  • 41. Policy Scenarios - Folder Redirection, User Settings, and Data
  • 1. How Folder Redirection Helps Redirect User Settings & Data
  • 2. Demo Understanding the User Profile
  • 3. Implementing Folder Redirection
  • 4. Demo Implementing Folder Redirection
  • 5. Using Group Policy Preferences for Folder Redirection
  • 6. Demo Using Group Policy Preferences for Folder Redirection
  • 7. Summary

  • 42. Policy Scenarios - Introduction to Group Policy Preferences
  • 1. Group Policy Preferences Overview
  • 2. Demo Group Policy Preferences Overview
  • 3. Managing Local Users and Groups
  • 4. Demo Managing Local Users and Groups
  • 5. GPP Drive Mapping
  • 6. Demo GPP Drive Mapping
  • 7. GPP Printer Mapping
  • 8. Demo GPP Printer Mapping
  • 9. Using GPP for Registry Changes
  • 10. Demo Using GPP for Registry Changes
  • 11. Summary

  • 43. Policy Scenarios - Managing StartupLogon Scripts
  • 1. Group Policy Scripts Capabilities and Limitations
  • 2. Demo Navigating Group Policy Scripts
  • 3. Deploying StartupShutdown Scripts
  • 4. Demo Deploying StartupShutdown Scripts
  • 5. Deploying LogonLogoff Scripts
  • 6. Demo Deploying LogonLogoff Scripts
  • 7. Script Configuration Options
  • 8. Summary

  • 44. Kiosks and Remote Desktop Services Scenario
  • 1. Understanding Group Policy Loopback Processing
  • 2. Demo Understanding Group Policy Loopback Processing
  • 3. Kiosk Configurations and Loopback Processing
  • 4. Demo Kiosk Configurations and Loopback Processing
  • 5. RDS, VDI, and Loopback Processing
  • 6. Summary

  • 45. Group Policy Management Tasks
  • 1. GPO Backup and Restoral
  • 2. Demo GPO Backup and Restoral
  • 3. Group Policy Delegation
  • 4. Demo Group Policy Delegation
  • 5. GPO Import Tasks
  • 6. Demo GPO Import Tasks
  • 7. Demo Starter GPO

  • 46. Basic Group Policy Troubleshooting
  • 1. Common Group Policy Problems
  • 2. Troubleshooting with RSoP
  • 3. Demo Troubleshooting with RSoP
  • 4. Monitoring GPO Replication
  • 5. Demo Monitoring GPO Replication
  • 6. Group Policy Logging
  • 7. Demo Group Policy Logging
  • 8. Group Policy Tracing
  • 9. Demo Group Policy Tracing

  • 47. Implementing and administering AD RMS
  • 1. What is AD RMS
  • 2. Usage scenarios for AD RMS
  • 3. Overview of AD RMS components
  • 4. AD RMS certificates and licenses
  • 5. How AD RMS works
  • 6. What is Azure RMS
  • 7. Comparing AD RMS, Azure RMS, and Azure RMS for Office 365
  • 8. Lesson 2 Deploying and managing an AD RMS infrastructure
  • 9. Configuring the AD RMS cluster
  • 10. AD RMS client requirements
  • 11. Backuping, Decommissioning, Monitoring
  • 12. Lesson 3 Configuring AD RMS content protection
  • 13. Providing rights policy templates for offline use

  • 48. Managing and Maintaining Active Directory
  • 1. Monitor and Manage Replication
  • 2. Configure Password Replication Policies (PRP) for an RODC
  • 3. Perform Active Directory Restore
  • 4. Back up Active Directory and SYSVOL
  • 5. Perform AD Maintenance Tasks
  • 6. Automate User Account Lockout Maintenance
  • 7. Automate Password Resets
  • 8. Manage Inactive and Disabled Accounts
  • 9. Manage containers, OUs, Groups
  • 10. Magage groups
  • 11. Manage Service Principal Names
  • 12. Understand and Manage Group Managed Service Accounts
  • 13. Configure Kerberos Policy Settings and Constrained Delegation
  • 14. Configure Virtual Account
  • 15. Configure Domain Password Policy Settings and Account Lockout Settings
  • 16. Delegate Password Settings Management and Configure PSOs
  • 17. Monitor and Manage Replication
  • 18. Configure Password Replication Policies (PRP) for an RODC
  • 19. Back up Active Directory and SYSVOL
  • 20. Perform Active Directory Restore
  • 21. Perform AD Maintenance Tasks
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 33319
    حجم: 17435 مگابایت
    مدت زمان: 2644 دقیقه
    تاریخ انتشار: ۲۵ اردیبهشت ۱۴۰۳
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید