In order to understand how to exploit windows, one must be able to visualise the basic structure of the operating system itself at a high level.
| Feature | MCSE 2008 (Legacy) | MCSE 2012 (Rebooted) |
|---|---|---|
| Core Focus | Windows Server 2008 infrastructure, Active Directory, networking, security, Exchange | Windows Server 2012, virtualization (Hyper‑V), System Center, private cloud |
| Entry Path | MCSA: Windows Server 2008 → MCSE | MCSA: Windows Server 2012 → MCSE |
| Exam Examples | - 70‑640: Configuring Active Directory- 70‑642: Network Infrastructure- 70‑643: Applications Infrastructure- 70‑647: Enterprise Admin | - 70‑410: Installing & Configuring WS2012- 70‑411: Administering WS2012- 70‑412: Advanced Services- 70‑246: Monitoring & Operating Private Cloud- 70‑247: Configuring Private Cloud |
| Specializations | Messaging (Exchange), Security, Infrastructure | Private Cloud, SQL Server 2012, SharePoint, Lync |
| Design Philosophy | Traditional on‑prem IT: AD forests, DNS/DHCP, Exchange mail flow, Group Policy | Hybrid/cloud IT: virtualization, automation, orchestration, System Center suite |
| Career Alignment | Enterprise IT admin, systems engineer, Exchange specialist | Cloud architect, virtualization engineer, datacenter administrator |
| Retirement | Retired with shift to role‑based certs (2020–2021) | Also retired by 2021, replaced by role‑based Azure/Cloud certs |
Wangapi ICDL? @miritiandes
