وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Active Directory and Windows Server 40+ Hour with Labs

سرفصل های دوره

Domain Controllers (DC), Global Catalog, FSMO, Groups, Users, Security, Domains and Forests ,Trusts, GPO, much more..


1. Active Directory Introduction and Administration Tools
  • 1. Course introduction
  • 2. Module 1 Installing and configuring domain controllers. Overview
  • 3. AD DS components
  • 4. AD DS A Guide to its Logical and Physical Components.html
  • 5. AD DS Logical and Physical Components.html
  • 6. What is the AD DS schema
  • 7. Understanding the AD DS Schema.html
  • 8. Exploring the AD DS Schema Components, Roles, and Modification.html
  • 9. What is an AD DS forest
  • 10. Active Directory Domain Services (AD DS) Forests and Domain Trees.html
  • 11. Real-Life Scenario Expanding a Growing Organization with Active Directory.html
  • 12. Exploring Active Directory Domain Services (AD DS) Forests and Domain Trees.html
  • 13. What is an AD DS domain
  • 14. What are OUs
  • 15. What is Azure AD
  • 16. Overview of AD DS administration tools
  • 17. Using the Active Directory Administrative Center to administer and manage AD DS

  • 2. Overview of AD DS domain controllers
  • 1. Introduction
  • 2. What is a domain controller
  • 3. What is a global catalog
  • 4. Overview of domain controller SRV records
  • 5. AD DS sign-in process
  • 6. What are operations masters
  • 7. Transferring and seizing roles

  • 3. Deploying a domain controller
  • 1. Deploying a domain controller
  • 2. Installing a domain controller from Server Manager
  • 3. Demonstration Installing a domain controller from Server Manager
  • 4. Installing a domain controller on a Server Core installation of Windows Server 2
  • 5. Installing a domain controller by installing from media
  • 6. Cloning domain controllers
  • 7. Demonstration Cloning domain controllers
  • 8. Best Practices for Domain Controller Virtualization
  • 9. Demonstration Adding Another domain controllers
  • 10. Demonstration Installing a domain controller with Powershell
  • 11. Demonstration FSMO Roles

  • 4. Demo Building Windows Server 2022 Lab
  • 1. Introduction and Installing Windows Server 2022
  • 2. Activating Windows Server 2022
  • 3. Post-Install Tasks. Part 1
  • 4. Post-Install Tasks. Part 2
  • 5. Setting a Base Image with SYSPREP
  • 6. Recap
  • 7. Setting up your first DC
  • 8. Installing WAC and Joing a workstation to the domain
  • 9. Server Core
  • 10. Adding a Child Domain to the Lab
  • 11. Recap Base Lab SOP
  • 12. AD DS Admin Tools

  • 5. Managing user accounts
  • 1. Managing user accounts
  • 2. Creating user accounts
  • 3. Configuring user account attributes
  • 4. Demonstration Managing user accounts
  • 5. Demonstration Creating user profiles
  • 6. Demonstration User account templates

  • 6. Using Windows PowerShell cmdlets to manage user accounts
  • 1. Using Windows PowerShell cmdlets to manage user accounts
  • 2. Using Windows PowerShell to create users
  • 3.1 9.Using Windows PowerShell for bulk users operations
  • 3. Using Windows PowerShell for bulk users operations
  • 4. Using Windows PowerShell to modify users properties
  • 5. Using Windows PowerShell to add users to groups
  • 6. Using Windows PowerShell to modify users properties. Part2
  • 7. Using Windows PowerShell to enablemove users
  • 8. Using Windows PowerShell to delete users
  • 9. Identity with Windows Server.html

  • 7. Managing groups in AD DS
  • 1. Managing groups in AD DS Section Overview
  • 2. Group types
  • 3. Group scopes
  • 4. Implementing group management
  • 5. Managing members with GPO
  • 6. Default groups
  • 7. Special identities
  • 8. Demonstration Managing groups in Windows Server
  • 9. Demonstration Managing groups in Windows Server with Powershell

  • 8. Managing computer objects in AD DS
  • 1. Managing computer objects in AD DS Section Overview
  • 2. Specifying the location of computer accounts
  • 3. Controlling permissions to create computer accounts
  • 4. Joining a computer to a domain
  • 5. Resetting the computer account (secure channel)
  • 6. Performing an offline domain join

  • 9. Implementing and managing OUs
  • 1. Implementing and managing OUs Section Overview
  • 2. Planning OUs
  • 3. OU hierarchy considerations
  • 4. Considerations for using OUs
  • 5. AD DS permissions
  • 6. Delegating AD DS permissions

  • 10. Using Windows PowerShell for groups and computers administration
  • 1. Using Windows PowerShell for AD DS administration Section Overview
  • 2. Using Windows PowerShell cmdlets to manage groups
  • 3. PowerShell Managing, configuring and modifying Group objects. Part 1
  • 4. PowerShell Managing, configuring and modifying Group objects. Part 2
  • 5. PowerShell Managing, configuring and modifying Group objects. Part 3
  • 6. PowerShell Managing, configuring and modifying Group objects. Part 4
  • 7. PowerShell Managing, configuring and modifying Group objects. Part 5
  • 8. Windows PowerShell cmdlets to manage computers and OUs
  • 9. PowerShell Managing, configuring and modifying Computer objects. Part 1
  • 10. PowerShell Managing, configuring and modifying Computer objects. Part 2
  • 11. Powershell Key Concepts

  • 11. Advanced AD DS infrastructure management
  • 1. Course Overview
  • 2. Section Overview
  • 3. Overview of domain and forest boundaries in an AD DS structure
  • 4. Why implement multiple domains
  • 5. Why implement multiple forests
  • 6. Deploying a domain controller in Azure IaaS
  • 7. Managing objects in complex AD DS deployments
  • 8. Deploying a distributed AD DS environment. Section Overview
  • 9. AD DS domain functional levels
  • 10. AD DS forest functional levels
  • 11. Deploying new AD DS domains
  • 12. Considerations for implementing complex AD DS environments
  • 13. Demo Installing a domain controller in a new domain in an existing forest
  • 14. Upgrading a previous version of AD DS to Windows Server 2016
  • 15. Migrating to Windows Server 2016 AD DS from a previous version
  • 16. Configuring AD DS trusts. Section Overview
  • 17. Overview of different AD DS trust types
  • 18. How trusts work in a forest
  • 19. How trusts work between forests
  • 20. Configuring advanced AD DS trust settings

  • 12. Implementing and administering AD DS sites and replication
  • 1. Course Overview
  • 2. Section Overview
  • 3. What are AD DS partitions
  • 4. Characteristics of AD DS replication
  • 5. How AD DS replication works within a site
  • 6. Resolving replication conflicts
  • 7. How replication topology is generated
  • 8. How SYSVOL replication works
  • 9. Configuring AD DS sites Section Overview
  • 10. What are AD DS sites
  • 11. Why implement additional sites
  • 12. How replication works between sites
  • 13. What is the ISTG
  • 14. Overview of SRV records
  • 15. How client computers locate domain controllers within sites
  • 16. Moving domain controllers between sites
  • 17. Configuring and monitoring AD DS replication Section Overview
  • 18. What are AD DS site links
  • 19. What is site link bridging
  • 20. What is universal group membership caching
  • 21. Lab Sites and Replication. Exercies and Tasks
  • 22. Lab Sites and Replication. Solution
  • 23. Identity with Windows Server.html

  • 13. Implementing Group Policy
  • 1. Introduction
  • 2. What is Configuration management
  • 3. Overview of Group Policy tools and consoles
  • 4. Computer Configuration and User Configuration
  • 5. Demonstration Exploring Group Policy tools and consoles
  • 6. Benefits of using Group Policy
  • 7. Group Policy Objects
  • 8. Overview of GPO scope
  • 9. Overview of GPO inheritance
  • 10. The Group Policy Client service and client-side extensions
  • 11. Lesson 2 Implementing and administering GPOs
  • 12. What are domain-based GPOs
  • 13. GPO storage
  • 14. What are starter GPOs
  • 15. Common GPO management tasks
  • 16. Delegating administration of Group Policy
  • 17. Demo Delegating administration of Group Policy
  • 18. Lesson 3 Group Policy scope and Group Policy processing
  • 19. What are GPO links
  • 20. Group Policy processing order
  • 21. Configuring GPO inheritance and precedence
  • 22. Using security filtering to modify Group Policy scope
  • 23. What are WMI filters
  • 24. Lab A Tasks Implementing a Group Policy infrastructure
  • 25. Lab A Solution Implementing a Group Policy infrastructure
  • 26. Lab Review

  • 14. Troubleshooting the application of GPOs
  • 1. Troubleshooting the application of GPOs Lesson Overview
  • 2. What is RSoP and Generating RSoP Report
  • 3. Demo Performing a what-if analysis with Group Policy Modeling Wizard
  • 4. Examining Group Policy event logs
  • 5. Detecting Group Policy health issues
  • 6. Review and Takeaways
  • 7. Lab B Tasks Troubleshooting Group Policy infrastructure
  • 8. Lab B Solution Troubleshooting Group Policy infrastructure
  • 9. Lab Review
  • 10. Module Review and Takeaways

  • 15. Managing user settings with Group Policy
  • 1. Course Overview
  • 2. Section Overview
  • 3. What are administrative templates
  • 4. What are .adm and .admx files
  • 5. Overview of the central store
  • 6. Demonstration Configuring settings with administrative templates
  • 7. Importing security templates
  • 8. Managing administrative templates

  • 16. Configuring Folder Redirection, Software Installation, and Scripts
  • 1. Section Overview
  • 2. What is Folder Redirection
  • 3. Settings for configuring Folder Redirection
  • 4. Security settings for redirected folders
  • 5. Demonstration Configuring Folder Redirection
  • 6. Managing software with Group Policy
  • 7. Group Policy settings for applying scripts
  • 8. Demonstration Configuring scripts with GPOs
  • 9. Identity with Windows Server.html

  • 17. Configuring Group Policy preferences
  • 1. Section Overview
  • 2. What are Group Policy preferences Comparing with Policy settings
  • 3. Features of Group Policy preferences
  • 4. Item-level targeting options
  • 5. Demonstration Configuring Group Policy preferences
  • 6. Identity with Windows Server.html
  • 7. Lab Tasks Managing user settings with Group Policy
  • 8. Lab Solution Managing user settings with Group Policy
  • 9. Lab Review Managing user settings with Group Policy
  • 10. Module Review and Takeaways Managing user settings with Group Policy

  • 18. Group Policy Deployment Strategies
  • 1. Designing a Group Policy Friendly AD
  • 2. Demo Designing a Group Policy Friendly AD
  • 3. Best Practices for GP Deployment
  • 4. Demo Best Practices for GP Deployment
  • 5. Designing for Performance
  • 6. Module Review and Takeaways

  • 19. Introduction to Group Policy Scripting
  • 1. The Microsoft Group Policy PowerShell Module
  • 2. Demo The Microsoft Group Policy PowerShell Module
  • 3. Basic GPO Management With PowerShell
  • 4. Demo Basic GPO Management With PowerShell

  • 20. Securing domain controllers
  • 1. Section Overview
  • 2. Security risks that can affect domain controllers
  • 3. Modifying the security settings of domain controllers
  • 4. Implementing secure authentication
  • 5. Securing physical access to domain controllers
  • 6. What are RODCs
  • 7. Deploying an RODC
  • 8. Planning and configuring an RODC password replication policy
  • 9. Demonstration Configuring a password replication policy
  • 10. Separating RODC local administration

  • 21. Implementing account security
  • 1. Section Overview
  • 2. Password policies
  • 3. Account lockout policies
  • 4. Kerberos policies
  • 5. Demonstration Configuring a fine-grained password policy
  • 6. Protecting groups in AD DS
  • 7. Fine-grained password and lockout policies
  • 8. Tools for creating PSOs
  • 9. Demonstration Configuring authentication-related audit policies and viewing log
  • 10. PSO precedence and resultant PSO
  • 11. Account-security options
  • 12. Configuring user account policies

  • 22. Implementing audit authentication
  • 1. Section Overview
  • 2. Account logon and logon events
  • 3. Demonstration Configuring authentication-related audit policies and viewing log
  • 4. Scoping audit policies

  • 23. Configuring managed service accounts
  • 1. Section Overview
  • 2. Overview of service accounts
  • 3. Challenges of using service accounts
  • 4. Overview of managed service accounts
  • 5. What are group MSAs
  • 6. Demonstration Configuring group MSAs
  • 7. Lab Securing AD DS Exercises and Tasks
  • 8. Lab Securing AD DS. Solution
  • 9. Lab Securing AD DS. Solution. Part 2
  • 10. Lab Review
  • 11. Module Review and Takeaways

  • 24. Securing Windows Server and Group Policy
  • 1. SMB Security Features
  • 2. Demo Securing SMB - Auditing and Blocking SMBv1
  • 3. Demo Securing SMB Part 2 - SMB Signing and Encryption
  • 4. NTLM Security
  • 5. Implementing NTLM Security
  • 6. DNS Security
  • 7. Implementing DNSSEC
  • 8. Secure Management
  • 9. Managing Servers Using Windows Admin Center
  • 10. Protecting Credentials
  • 11. Microsoft Tiering Model
  • 12. Using the Protected Users Group
  • 13. Authentication Policy and Silo
  • 14. Protecting Privileged Accounts with Authentication Policies and Silos
  • 15. Local Admin Password Solution (LAPS)
  • 16. Preparing Active Directory for LAPS
  • 17. Installing the LAPS Client Side Extension
  • 18. Working with LAPS
  • 19. Credential Guard
  • 20. Verifying Hardware Compatibility for Credential Guard
  • 21. Enabling Credential Guard
  • 22. User Rights Assignment
  • 23. Working with User Rights Assignment
  • 24. Privileged Access Workstation (PAW)

  • 25. Deploying CAs
  • 1. Plan Your Progress
  • 2. Course Overview
  • 3. Section Overview Deploying CAs
  • 4. What is AD CS
  • 5. Options for implementing CA hierarchies
  • 6. Standalone vs. enterprise CAs
  • 7. Considerations for deploying a root CA
  • 8. Demonstration Deploying an enterprise root CA
  • 9. Considerations for deploying a subordinate CA
  • 10. How to use the CAPolicy.inf file for installing a CA

  • 26. Administering CAs
  • 1. Section Overview Administering CAs
  • 2. Managing CAs
  • 3. Configuring CA security
  • 4. Security roles for CA administration
  • 5. Configuring CA policy and exit modules
  • 6. Configuring CDPs and AIA locations
  • 7. Demonstration Configuring CA properties

  • 27. Troubleshooting and maintaining CAs
  • 1. Section Overview Troubleshooting CAs
  • 2. Troubleshooting CAs
  • 3. Renewing a CA certificate
  • 4. Moving a root CA to another computer
  • 5. Monitoring CA operations
  • 6. Lab Task Deploying and managing AD CS
  • 7. Lab Demonstration Steps Deploying and managing AD CS

  • 28. Deploying and managing certificates. Deploying and managing certificate template
  • 1. Course Overview
  • 2. Section Overview
  • 3. What are certificates and certificate templates
  • 4. Certificate template versions in Windows Server
  • 5. Configuring certificate template permissions
  • 6. Configuring certificate template settings
  • 7. Options for updating a certificate template
  • 8. Demonstration Modifying and enabling a certificate template

  • 29. Managing certificate deployment, revocation, and recovery
  • 1. Assess Your Knowledge. Section Overview Managing certificate deployment
  • 2. Certificate enrollment methods
  • 3. Overview of certificate autoenrollment
  • 4. What is an enrollment agent
  • 5. How does certificate revocation work
  • 6. Overview of key archival and recovery
  • 7. Demonstration Configuring a CA for key archival
  • 8. Using certificates for SSL
  • 9. Using certificates for digital signatures
  • 10. Using certificates for content encryption
  • 11. Demonstration Signing a document digitally. Encrypting a file with EFS

  • 30. Lab Deploying and using certificates
  • 1. Lab Task Deploying and using certificates
  • 2. Lab Demonstration Steps Deploying and using certificates
  • 3. Module Review and Takeaways

  • 31. Implementing and Administering AD FS
  • 1. Course Overview
  • 2. Overview of AD FS section Overview
  • 3. What is identity federation
  • 4. What are claims-based identity and claims-based authentication
  • 5. Overview of web services
  • 6. What is AD FS
  • 7. Whats new in AD FS in Windows Server 2016
  • 8. How AD FS enables SSO in a single organization
  • 9. How AD FS enables SSO in a business-to-business federation
  • 10. Section overview AD FS requirements and Planning
  • 11. AD FS components
  • 12. AD FS requirements
  • 13. PKI and certificate requirements
  • 14. Federation server roles
  • 15. Planning an AD FS deployment for online services
  • 16. Planning a highly available AD FS deployment
  • 17. Capacity planning

  • 32. Deploying and configuring AD FS
  • 1. Section Overview Deploying and configuring AD FS
  • 2. What are AD FS claims and claim rules
  • 3. What is a claims provider trust
  • 4. What is a relying party trust
  • 5. Installing and configuring AD FS
  • 6. Configuring an account partner and a resource partner
  • 7. Configuring claims rules
  • 8. How home realm discovery works
  • 9. Managing an AD FS deployment

  • 33. Web Application Proxy
  • 1. Web Application Proxy. Section Overview
  • 2. What is the Web Application Proxy
  • 3. Web Application Proxy authentication methods
  • 4. Scenarios for using the Web Application Proxy
  • 5. Installing and configuring the Web Application Proxy

  • 34. Even More on Group Policy - Group Policy Processing
  • 1. Group Policy Processing
  • 2. Demo Understanding Group Policy Processing
  • 3. Group Policy Targeting
  • 4. Demo Group Policy Targeting at Work
  • 5. Group Policy Linking, Filtering, and Order of Processing
  • 6. Demo Examples of GPO Linking, Filtering, and LSDOU
  • 7. GPO Processing Hierarchy
  • 8. Demo GPO Processing Hierarchy
  • 9. Summary

  • 35. Tools of the Trade
  • 1. Installing the GPMC
  • 2. Demo Downloading and Installing GPMC
  • 3. Navigating the GPMC
  • 4. Demo Navigating the GPMC
  • 5. Understanding GPO Properties
  • 6. Demo Understanding GPO Properties
  • 7. Creating and Editing GPOs
  • 8. Demo Creating, Editing, and Commenting GPOs
  • 9. Summary

  • 36. How Group Policy Gets Applied
  • 1. The Group Policy Processing Cycle
  • 2. Background and Foreground Processing
  • 3. Synchronous and Asynchronous Processing
  • 4. Demo Synchronous and Asynchronous Processing
  • 5. Group Policy Processing Mechanics
  • 6. Demo Group Policy Processing Mechanics
  • 7. Manual GP Processing
  • 8. Demo Manual GP Processing
  • 9. Summary

  • 37. Policy Scenarios - Desktop and Server Lockdown
  • 1. Understanding Administrative Templates Policy
  • 2. Demo How Registry Tattooing Works
  • 3. Administrative Templates and ADMX Files
  • 4. Demo Administrative Templates and ADMX Files
  • 5. Deploying Administrative Templates
  • 6. Summary

  • 38. Policy Scenarios - Security Policy
  • 1. Overview of Available Security Policy
  • 2. Deployment Scenario Group Membership Control
  • 3. Demo Group Membership Control
  • 4. Deployment Scenario Managing Windows Firewall
  • 5. Demo Managing Windows Firewall
  • 6. Application Control Policies (AppLocker)
  • 7. Demo AppLocker
  • 8. Demo AppLocker

  • 39. Policy Scenarios - Managing Internet Explorer Configuration
  • 1. The Three Policy Areas for Managing IE
  • 2. Demo Introducing the Three IE Policy Areas
  • 3. Using GP Preferences Internet Settings
  • 4. Demo Using GP Preferences Internet Settings
  • 5. Using IE Administrative Templates
  • 6. Demo Using IE Administrative Templates
  • 7. Managing (and Removing) IE Maintenance Policy
  • 8. Demo Managing (and Removing) IE Maintenance Policy
  • 9. Summary

  • 40. Even More on Group Policy - Scenarios - Deploying Software Using Group Policy
  • 1. Capabilities and Features in Group Policy Software Installation
  • 2. Demo Capabilities & Features in Group Policy Installation
  • 3. GPSI Best Practices
  • 4. Demo Deploying Software Using Group Policy
  • 5. Managing the Software Lifecycle
  • 6. Demo Patching an Existing Deployment
  • 7. Summary

  • 41. Policy Scenarios - Folder Redirection, User Settings, and Data
  • 1. How Folder Redirection Helps Redirect User Settings & Data
  • 2. Demo Understanding the User Profile
  • 3. Implementing Folder Redirection
  • 4. Demo Implementing Folder Redirection
  • 5. Using Group Policy Preferences for Folder Redirection
  • 6. Demo Using Group Policy Preferences for Folder Redirection
  • 7. Summary

  • 42. Policy Scenarios - Introduction to Group Policy Preferences
  • 1. Group Policy Preferences Overview
  • 2. Demo Group Policy Preferences Overview
  • 3. Managing Local Users and Groups
  • 4. Demo Managing Local Users and Groups
  • 5. GPP Drive Mapping
  • 6. Demo GPP Drive Mapping
  • 7. GPP Printer Mapping
  • 8. Demo GPP Printer Mapping
  • 9. Using GPP for Registry Changes
  • 10. Demo Using GPP for Registry Changes
  • 11. Summary

  • 43. Policy Scenarios - Managing StartupLogon Scripts
  • 1. Group Policy Scripts Capabilities and Limitations
  • 2. Demo Navigating Group Policy Scripts
  • 3. Deploying StartupShutdown Scripts
  • 4. Demo Deploying StartupShutdown Scripts
  • 5. Deploying LogonLogoff Scripts
  • 6. Demo Deploying LogonLogoff Scripts
  • 7. Script Configuration Options
  • 8. Summary

  • 44. Kiosks and Remote Desktop Services Scenario
  • 1. Understanding Group Policy Loopback Processing
  • 2. Demo Understanding Group Policy Loopback Processing
  • 3. Kiosk Configurations and Loopback Processing
  • 4. Demo Kiosk Configurations and Loopback Processing
  • 5. RDS, VDI, and Loopback Processing
  • 6. Summary

  • 45. Group Policy Management Tasks
  • 1. GPO Backup and Restoral
  • 2. Demo GPO Backup and Restoral
  • 3. Group Policy Delegation
  • 4. Demo Group Policy Delegation
  • 5. GPO Import Tasks
  • 6. Demo GPO Import Tasks
  • 7. Demo Starter GPO

  • 46. Basic Group Policy Troubleshooting
  • 1. Common Group Policy Problems
  • 2. Troubleshooting with RSoP
  • 3. Demo Troubleshooting with RSoP
  • 4. Monitoring GPO Replication
  • 5. Demo Monitoring GPO Replication
  • 6. Group Policy Logging
  • 7. Demo Group Policy Logging
  • 8. Group Policy Tracing
  • 9. Demo Group Policy Tracing

  • 47. Implementing and administering AD RMS
  • 1. What is AD RMS
  • 2. Usage scenarios for AD RMS
  • 3. Overview of AD RMS components
  • 4. AD RMS certificates and licenses
  • 5. How AD RMS works
  • 6. What is Azure RMS
  • 7. Comparing AD RMS, Azure RMS, and Azure RMS for Office 365
  • 8. Lesson 2 Deploying and managing an AD RMS infrastructure
  • 9. Configuring the AD RMS cluster
  • 10. AD RMS client requirements
  • 11. Backuping, Decommissioning, Monitoring
  • 12. Lesson 3 Configuring AD RMS content protection
  • 13. Providing rights policy templates for offline use

  • 48. Managing and Maintaining Active Directory
  • 1. Monitor and Manage Replication
  • 2. Configure Password Replication Policies (PRP) for an RODC
  • 3. Perform Active Directory Restore
  • 4. Back up Active Directory and SYSVOL
  • 5. Perform AD Maintenance Tasks
  • 6. Automate User Account Lockout Maintenance
  • 7. Automate Password Resets
  • 8. Manage Inactive and Disabled Accounts
  • 9. Manage containers, OUs, Groups
  • 10. Magage groups
  • 11. Manage Service Principal Names
  • 12. Understand and Manage Group Managed Service Accounts
  • 13. Configure Kerberos Policy Settings and Constrained Delegation
  • 14. Configure Virtual Account
  • 15. Configure Domain Password Policy Settings and Account Lockout Settings
  • 16. Delegate Password Settings Management and Configure PSOs
  • 17. Monitor and Manage Replication
  • 18. Configure Password Replication Policies (PRP) for an RODC
  • 19. Back up Active Directory and SYSVOL
  • 20. Perform Active Directory Restore
  • 21. Perform AD Maintenance Tasks
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 33319
    حجم: 17435 مگابایت
    مدت زمان: 2644 دقیقه
    تاریخ انتشار: 25 اردیبهشت 1403
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید