Search

MCSE: Server Infrastructure Solutions Expert Certification - OnDemand Learning

Sale Price: $1,295.00
Item Number: MS-MCSE-Cert
Configuration: -online

* denotes required field

Media Content*
MCTS: .NET Framework 3.5 ASP .NET Applications
Package Includes
  • 12 Months Online Access, Featuring OnDemand Instructor-Led Classroom Sessions with Full Audio and Video Lectures
  • Hands-on Lab Video Demonstrations
  • Self-Assessment Module Review Quizzes
  • Printable Workbooks
  • Certificate of Completion
  • Free 1 Year Upgrade Policy
  • Mobile Access via iPhones and iPads



DWTEXT

Sandra Batakis - A+ Trainer, MCT, MCSE, CIW
Sandra is a Senior Microsoft Certified Instructor with over 15 years in the IT certification training and courseware development field. She has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies. She possesses extensive hands-on IT experience including working with building computer networking infrastructure, configuring LAN, WAN and Internet security gateways, Implementing and migrating to Microsoft Exchange 5, 2000, 2003, 2007 and the new Exchange 2010. She has delivered numerous Microsoft, CompTIA and Adobe classroom-based as well as online Boot Camps and Seminars across the United States.

Kenneth Mayer - Microsoft Certified Trainer (CCSI, MCT, CCNP, CCDA)
Ken Mayer is a Microsoft Certified Trainer as well as a Certified Ethical Hacker Trainer and Security consultant. He started his career in computer technology in 1980s. He has offered a wide variety of IT training and high Chapter consulting projects for Fortune 500 companies across the United States and Western Europe. He has achieved the Certified Cisco Systems Instructor certification. The CCSI certification involved a two-day lab and observation event held on Cisco in Paris, France Facility. This gave Ken the accreditation to be able to deliver Cisco Authorized Courses as a CCSI. He has taught the full line of Cisco CCNA, CCDA, CCNP, CCDP and CCIP course curriculums, including Cisco's security appliances such as PIX and IDS.

Course Features:
       

70-410: Installing and Configuring
Windows Server 2012 R2

Module 01 - Server 2012 Overview
Server 2012 Overview
On Premise vs. Cloud
Common Cloud Computing
Cloud Computing
Local Resources Provided to Clients
Windows Server 2012 Editions
Server 2012 Server Roles
Features with Windows Server 2012
Server Core
Installation Options
Install Options Integrated
Media Formats
Windows DS
Other Install Options
Demo - Installing Windows 2012 Enterprise
Windows Server Installation
Server Upgrades
Server Migration
Minimum Hardware Requirements
Installation Steps
Post Server Installation Tasks – Round One
Demo - Introduction to Server Manager
Windows Activation
Offline Domain Join
Post Server Installation Tasks – Round Two
Using PowerShell to Manage Servers
Resources Utilization by Using Features on Demand
Features on Demand – Order of Search
How to Override Features on Demand (Default Behavior)
Removing Feature Files
Migrate Roles from Previous Versions of Windows Server
Supported Operation Systems (Source)
Module 01 Review
Module 02 - Windows Server 2012 Management
Windows Server 2012 Management
Server Manager
Demo - Add Roles Server Manager
Demo - Event Viewer
Demo - Best Practice Analyzer
Administrative Tools Available
Demo - Administrative Tools Available
Enabling Remote Management
Delegate Administration
Delegation Planning
Demo - Delegation of Domain Administration
Advanced Services
Configuring NIC Teaming
Switch Dependent Teaming Modes
802.11ac Support
NetSh Commands with Windows Server 2012 R2
Wired and Wireless Ethernet Access Passwords
Module 02 Review

Module 03 - Working with Server Core
Working with Server Core
Demo - Installing Server Core
Introduction to PowerShell
Demo - PowerShell
Adding GUI to Server Core
Removing GUI to Server Core
To Install a Removed Role or Feature Using WIM Image
Server Core Tools
Demo - Recover from Closing Command Prompt
Roles Available to Server Core
Listing Roles on Server Core
Enabling Remote Management
Demo - Netsh-Firewall
Server Configuration - Core
Demo - Sconfig on Server Core
Features Not Supported by Server Core
Installing Domain Controllers on Server Core - Options
PowerShell Examples for User Management
PowerShell Examples for Group Management
PowerShell Examples for Computer Management
PowerShell Examples for OU's
Module 03 Review
Module 04 - Configuring Local Storage
Configuring Local Storage
Key Features of Storage
Disk Types and Performance
Enhanced Integrated Drive Electronics (EIDE)
Serial Advanced Technology Attachment (SATA)
Small Computer System Interface (SCSI)
Solid State Drives
Direct Attached Storage (DAS)
Network Attached Storage (NAS)
Storage Area Network (SAN)
Common RAID Levels
Windows Server 2012 R2 Storage Features
Storage Spaces
Demo - Configuring Storage Spaces
Work Folders
Work Folder Limitations
Work Folder Components
Certificate Notes
Work Folder Server Components
Work Folder Server Configuration
Work Folder Server Configuration PowerShell Commands
Work Folders Client Configuration
Demo - Configuring Work Folders
Offload Data Transfers (ODX)
SMB 3.0 Support
File System Enhancements
Storage Management
Resilient File System (ReFS)
Storage PowerShell Cmdlets
Configure Basic Disks
Configure Dynamic Disks
Common Operations – Basic and Dynamic Disks
Demo - Creating Volume Mount Points
Configuring MBR Disks
Configuring GPT Disks
Installing And Configuring A New Disk
eNotes: Types of Volumes / Pools
Demo - Create VHDs
Extending and Shrinking Volumes
Utilities for Volumes
BranchCache
BranchCache Requirements
BranchCache Server Settings
BranchCache Client Settings
Enabling Distributed Cache Mode or Hosted Cache Mode
Module 04 Review
Module 05 - Configure File and Print Access
File Shares and Permissions
Create and Configure Shares
File Sharing Profiles
Demo - Configure File Shares
Configure Offline Files
Offline Files Settings
Configure NTFS Permissions
NTFS Permissions
eNotes: NTFS Permission Examples
Access Based Enumeration (ABE)
Configure Volume Shadow Copy Service (VSS)
Demo - Shadow Copies
Configure Print and Document Services
Demo - Install Print and Document Services Role
Easy Print - Print Driver
Network Printing Security Options
Demo - Create a Shared Printer
Printer Pooling
Demo - Creating a Printer Pool
Branch Office Direct Printing
Options to Deploy Printers
Printer Migration for Web Services for Devices (WSD Print Devices)
Server 2012 R2 New and Updated
Module 05 Review
Module 06 - Remote Management and Virtualization
Remote Management
Demo - Enable Remote Management
Remote Management - MISC
Remote Desktop
Remote Desktop Services Role Services
Server 2012 R2 Improvements and Additions
Demo - Remote Desktop
Multi-Server Management
Demo - Server Groups
Virtualization
Presentation Virtualization
Remote Desktop Gateway
Virtualization
Hyper-V
Application Virtualization (App-V)
Microsoft Enterprise Desktop Virtualization (MED-V)
Simulated Hardware for VM's
Demo - Create a VM
Demo - Hyper-V Settings
Dynamic Memory
Integration Services
Start and Stop Actions
Resource Metering
Virtual Hard Disk
Virtual Disk Types
Shrinking Fixed Virtual Hard Disks
VHD’s vs. VHDX
Demo - Managing VHD’s
Differencing Disks
Virtual Hard Disk Operations/Maintenance Operations
Methods of Creating Virtual Hard Disk
VHD’s and File Shares
Differencing Disks
Virtual Networks
Virtual Network Extensions
Demo - Hyper-V Network Settings
Virtual Adapters
Legacy Network Adapters
Demo - Creating Network Adapters
Considerations for VM Network Configuration
Important Note – External Virtual Networks
Virtual Machine MAC Address
Using Snapshots
Module 06 Review








Module 07 - TCP/IP Protocol Suite
TCP/IP Protocol Suite
Components of Network Infrastructure
TCP/IP Protocol
Architecture
TCP/IP Applications
Sockets
Ports
IPv4 Addressing
IP Configuration
Public vs. Private IPv4 Addresses
Relating to Binary
IP Address Classes
CIDR Notations / VLSM
eNotes: CIDR
Configuring IP Addresses Using Server Manager
Configuring IP Address Using a Command Line
Configure IP Address Using PowerShell
Demo - Configure IP Address Using PowerShell
TCP/IP Troubleshooting with PowerShell
TCP/IP Diagnostics
Network Card Teaming
Supernetting
Supernetting Examples
Overview Of IPv6
IPv4 vs IPv6
Comparing IPv4 and IPv6
IPv6 Benefits
Equivalents
IPv6 Addressing
Link Local Unicast Addresses
Host Private Address
Zone ID’s
Hexadecimal Numbering System
Converting Binary to Hex
Binary To Hex Examples
Things to Know About TCP/IPv6
Global Unicast Addresses
Global Unicast Addresses Structure
Unique Local Unicast Address
Zone ID
Format Prefixes
IPv6 Address Structure
Demo - Configuring IPv6 Client
Autoconfiguration IPv6 Addresses
Autoconfiguration Address States
Autoconfiguration Process
IPv6 Over IPv4 Tunneling
Defining Capabilities: Node Types
Configure ISATAP
Host Configuration
6to4
Teredo
PortProxy
Transition Process
Module 07 Review
Module 08 - DHCP and DNS
DNS
DNS for Name Resolution
eNotes: How Names are Resolved – Iterative Queries
Link-Local Multicast Name Resolution
WINS
Single Label Names - WINS
Tools and Commands
Demo - Tools and Commands
DNS Terms to Know
DNS Zones
DNS Registration Enhancements Windows Server 2012 R2
Demo - Installing the DNS Server Role
Enhanced Zone Level Statistics Windows Server 2012 R2
Enhanced PowerShell Support Server 2012 R2
Dynamic Updates
DNS Server Cache and Forwarding
DNS Cache
DNS Records Required for IPv6 Coexistence
Troubleshooting Name Resolution
eNotes: Troubleshooting Name Resolution
DHCP
Dynamic Host Configuration Protocol (DHCP) Service
Lease Generation
DHCP Relay Agent
DHCP on Server Core
DHCP Installation
Demo - Install DHCP
Create and Configure Scopes IPv4
Create and Configure Scopes IPv6
DHCP Reservation
Common DHCP Options
Order Options are Assigned
Managing DHCP Database
Move DHCP Database
Securing DHCP and Unauthorized Computers
Improved PowerShell Commands for DHCP in Server 2012 R2
New PowerShell Commands for DHCP
Configure Client and Server for PXE Boot
DHCP Audit Logging
Common Event Codes
DHCP Issues - Discussion
Module 08 Review
Module 09 - Overview of Active Directory Domain Services
Overview of Active Directory Domain Services
Physical Components of Active Directory
Logical Components of Active Directory
Domain Structures - Domain and Forest
Domain Structure - Forest
Domain Structure - Schema
Domain Structures - Logical
Default Containers and OU's
Domain Structures - Sites (Physical)
Components of Site Structure
Domain - Wide Scope
Overview of Domain Controllers
What Domain Controllers Do
Depreciated Features Server 2012 Related to AD DS
Server 2012 R2 Enhancements
AD and Workplace Join
Global Catalog
Demo - Global Catalog
Operations Master Roles
Best Practices - FSMO and GC
Forest and Domain Functional Levels
Guidelines for Raising Domain and Forest Functional Levels
Functional Level Options
Functional Levels and Recycle Bin
Demo - Functional Levels and FSMO
Forest Functional Levels
ADPrep Commands
RODC
How DC's are Found and Used
Demo - SRV Records DNS
The AD DS Logon Process
Install Domain Controllers
DC Install Questions and Required Information
Required Information to Collect Pre-Install
Demo - Install Domain Controllers
Upgrading Domain Controllers
Clean Installation of Windows Server 2012 Domain Controllers
Install Domain Controller Using IFM
Demo - Remove A Domain Controller From A Domain
Active Directory Management Tools
User Accounts
Uniqueness of Accounts
Attributes of Users
Creating Account Templates
Locking vs. Disabled
Directory Service Command Line Tools
Groups
Group Scopes
Helpful Acronyms
E-Notes
Default Groups
Protected Users Security Group
Protected Users Security Group User Limitations
Special Identities
Computer Accounts
Troubleshooting Computer Accounts
Troubleshooting Steps
Listing Group Membership
Delegate Management of Active Directory Objects
CSVDE for Exporting
CSVDE for Importing
Ldifde
Ldifde - Export
Ldifde - Import
Managing AD DS with PowerShell
Module 09 Review
Module 10 - Windows Security
Windows Security
Windows Security – Defense in Depth
Security Templates
Methods to Distribute Security Templates
User Rights
Demo - Local Security Policy
Auditing
Restricted Groups
Account Policies
Security Compliance Manager (SCM)
Group Policy
GPO Locations - Content
Components of Group Policy
Group Policy Structure
Administrative Templates
ADM Files
Group Policy Central Store
Multiple Local Group Policies
Notes: Local Group Policies
Group Policy Preferences
Common Preferences
Starter GPO
GPO Permissions
Group Policy Processing
Inheritance
Default GPO’s
Demo - Create a GPO
Authentication Policies – Server 2012 R2
Software Restriction Policies
Basics: Software Restriction Policies
AppLocker
AppLocker Rules
Windows Firewall
Windows Firewall with Advanced Security
Enhancements Over Standard Windows Firewall
Firewall Profiles
Connection Security Rules
Deploy Firewall Rules
Configure Authenticated Firewall Exceptions
Module 10 Review
Course Closure


70-411: Administering Windows Server 2012 R2

Module 01 - Server Deployment and Image Management
Server Deployment and Image Management
WDS Server Role Services
Windows Deployment Services
Functionality
PowerShell Cmdlets for WDS
Prerequisites for Installing WDS Deployment and Transport Server (AD Integrated)
Prerequisites for Installing WDS Deployment and Transport Server (Standalone)
Demo - Installing WDS
Installing with Windows PowerShell
Demo - Installing with Windows PowerShell and WDSUTIL
Configuring WDS Role
Types of Images
Steps for Adding Images
Demo - Configuring WDS
Demo - WDS Install Images and Server Configuration
Client Prerequisites for Installing Images
Client Steps for Installing Images
Configuring Boot Menu
Creating Capture Image
Custom Install Images
Creating Custom Install Images
Discover Images
Creating Discover Images
Creating Media for Discover Image
Demo - Creating Media for Discover Image
Unattended Installations
Unattended Steps
Sample Unattended File
Multicast Transmissions
Demo - Configuring Transmissions
Demo - Adding Second Image Files
Adding Driver Packages to Boot Images
Common Administrative Tasks
Phases of Automated Deployments
Tools to Create and Service Images
Module 01 Review
Module 02 - Managing Servers and Updates
WSUS
Implementing Update Management
WSUS 3.0 SP2 Prerequisites
Computer Groups
Approval - Updates
WSUS Management Process
Group Policy and Automatic Updates
Demo - Configuring WSUS Group Policy
WSUS Management with PowerShell
Demo - Installing and Configuring WSUS
Demo - Approve Updates
Monitoring Servers
Monitor Servers
Tools
Demo - Task Manager and Resource Monitor
Demo - Performance Monitor
Demo - Performance Monitor Counters
Demo - Data Collector Sets
Virtual Machine Overview
Demo - Monitoring Virtual Machines
Monitoring Event Logs
Demo - Event Viewer
Demo - Event Forwarding
Monitoring Network Infrastructure
Demo - Monitoring Network Infrastructure
Module 02 Review
Module 03 - File and Print Services
FSRM
File System Resource Manager (FSRM)
Installing FSRM
Demo - Installing and Configuring FSRM
Managing FSRM with PowerShell 3.0
Demo - Managing FSRM with PowerShell 3.0
Demo - Legacy FSRM Commands
Remote Management of FSRM
Quota Management
Demo - Creating and Using Quota Templates
Demo - Testing Quota Limits
File Screening Management
File Screen Templates
File Groups
Demo - File Groups and File Screens
Storage Reports
Storage Report Types
Reports Continued
Demo - Storage Reports
Report Tasks
Classification Management
Classification Properties
Handling Classification Property Conflicts
Classification Rule Properties
Classification Examples
File Management
New and Changed Functionality Windows Server 2012 R2
DFS
DFS Role Services
Domain Based Namespaces
Standalone Namespaces
Demo - Installing DFS
Demo - Configure DFS
DFS Replication with Windows Server 2012 R2
Configure File and Disk Encryption
EFS
EFS and Network Shares
Encryption Keys
EFS File Encryption Process
EFS File Decryption Process
EFS File Recovery
Managing Recovery Agents
Demo - EFS Encryption
BitLocker Device Encryption
Audit Policies
Configure Advanced Audit Policies
Audit Policies (Cont.)
Demo - Configuring Audit Policies
Module 03 Review
Module 04 - Configuring Network Services and Access
Configuring Network Services and Access
DNS Components
DNS Zones
Demo - DNS Zones
Stub Zones vs. Conditional Forwarders
DNS Records
Demo - DNS Zones and Records
Demo - Using DNSCMD
How DNS Forwarding Works
Demo - Adding DNS and Conditional Forwarders
DNS Namespaces
DNS Naming Contexts and Rules
External vs. Internal Namespaces
Zone Transfers
Demo - Using DNSCMD and Zone Transfers
Demo - Troubleshooting DNS
Zone Scavenging
Configuring Zone Scavenging
Demo - Scavenging DNS
Other Configuration Options
DNS Caching
Commands for DNS Cache
Storage of Information
Considerations
Module 04 Review

Module 05 - Network Policy Servers
Network Policy Servers
Remote Access Methods
Components of Network Access Services
Roles and Features
VPN and Routing Configuration Components
Demo - Configure Routing and Remote Access
Network Authentication
PKI Components
DHCP Relationship with Remote Access
VPN Access
Requirements of VPN Server
Properties of VPN Connection
Tunneling Protocols for VPN Connections
VPN Reconnect
Demo - Advanced RAS Configuration
VPN Post Installation Checklist
Demo - Using CMAK
Components of Network Policy
Properties of Network Policy
Network Policy Processing
Direct Access Features
What’s New in Direct Access
Deployment Phases of Direct Access
Required Infrastructure: Server
Required Infrastructure: Clients
Required Infrastructure: Network Location Server
Required Infrastructure: Internal Resources
Required Infrastructure: Active Directory Domain | Group Policy | DNS
Required Infrastructure: PKI | NAP
Name Resolution Policy Table
Internal Client Interaction with Direct Access
External Client Interaction with Direct Access
Troubleshooting Tools
VPN Connectivity Troubleshooting
Common Error Codes
Network Address Translation
Configure Remote Dial-in Settings for Users
Network Policy and Access Services
Network Policy Server
Demo - Installing NPS Role
Network Policy Server Tools
RADIUS Clients
RADIUS Proxy
Certificates
Required Certificates
Monitoring NPS
Module 05 Review
Module 06 - Active Directory
Active Directory
Active Directory Directory Services (AD DS)
AD DS Forest Structure
AD DS Schema
AD DS Domain Structure
AD DS Domain Controllers
AD DS Default Containers
Organizational Units
Virtualized Domain Controllers
Cloning Virtual Domain Controllers
Process: Cloning Server 2012 VDC
DcCloneConfig.xml Syntax
DcCloneConfig.xml Parameters
Domain Controller Safe Backup and Restore
PowerShell for Hyper-V Snapshot Managment
Demo - Introduction to Active Directory Administration Tools
Importing User Accounts
Common LDAP Attributes
Demo - Advanced AD Attributes
Demo - Using CSVDE
Demo - Export User Accounts Using CSVDE
Demo - Importing Accounts Using LDIF
Demo - Active Directory and PowerShell
Managed Service Accounts
Requirements for Service Accounts
Configuring Managed Service Accounts Using PowerShell
Kerberos Version 5 – Server 2012 Features
Kerberos Configurations Available
Service Principal Names (SPNs)
Passwords
Create Account Policies and User Rights Assignments
Demo - Creating Password Policies
Notes Create Fine Grained Password Policies
Demo - Password Settings Container
Universal Group Membership Caching (UGMC)
Operations Master Roles
Demo - Operations Master Roles
Maintain Active Directory Domain Services
Demo - AD Recycle Bin
Demo - Restore Deleted Items
Demo - AD DB Maintenance and Snapshots
Read Only Domain Controllers (RODC)
Demo - Installing RODC
Manage RODC Caching
Module 06 Review
Module 07 - Group Policy
Group Policy
Defining Options
Group Policy and IPv6
Group Policy Examples of Usage
Demo - Group Policy Management Console
Group Policy Objects
Group Policy Application
CSE Policy Refresh
Windows Client Policy Processing
Scripts Node of Group Policy
Group Policy Nodes
Default Group Policies
Group Policy Storage
Replication of GPO’s
Starter GPO’s
Slow Link Processing
Configure Loopback Processing
Security Templates
Demo - Group Policy Folder Redirection
Demo - Group Policy Software Installation
Demo - Administrative Templates
Group Policy Links
Group Policy Processing
Group Policy Inheritance and Precedence
Precedence – How to Handle Multiple Linked GPO’s
Demo - Local Policies
Other Group Policy Options
WMI Filters
Security Templates (Cont.)
Demo - Group Policy Objects
Group Policy Preferences
Demo - Configure Group Policy Preferences
Maintaining GPO’s
Group Policy and PowerShell
Demo - Creating Login Policies
Demo - Configuring User Desktops
Module 07 Review
Course Closure













70-412: Configuring Advanced Windows Server 2012 R2 Services

Module 01 - Network Services
Network Services
Demo - Navigation in Windows Server 2012
DHCP – Definition and Purpose
Components of DHCP Server
Components of Scopes
DHCP Lease Process
DHCP Options
DNS Integration
Super Scopes and Multinetting
Demo - Create a Super Scope
Multicast Scopes
DHCPv6
DHCPv6 Regional Registries
Demo - Configuring DHCP Scope
DHCP Name Protection
Demo - Enable DHCP Name Protection
DNS Solutions
Basics of DNS Permissions
DNS Logging
Demo - Configuring DNS Debug Logging
DNS Security
DNSSEC
DNSSEC Overview
Deploying DNSSEC
DNSSEC Zone Signing Wizard
Improving DNSSEC Windows Server 2012 R2
Resource Records
Signing the Zone
Demo - Deploying DNSSEC
DNS Cache Locking
Demo - DNS Cache Locking
DNS Socket Pool
Demo - DNS Socket Pool
DNS Aging and Scavenging
Maintaining DNS Database
Demo - Maintaining DNS Database
Name Resolution Optimization
Creating Stub Zones
Global Names Zone
Demo - Create Global Names Zone
Demo - Add Alias Global Names Zone
IPAM (IP Address Management)
IPAM and DHCP
Role Based Access Control
Role Based Access Control Roles Provided by Default
IPAM Monitoring
VMM and System Center 2012 Integration
IPAM Prerequisites
Hardware & Software Requirements Server 2012
Hardware & Software Requirements Server 2008/2008 R2
IPAM Abilities
IPAM Database Support
IPAM Users and Groups
IPAM Modules
IPAM Deployment Methods
IPAM Components
Provisioning for IPAM
Manual Provisioning for IPAM
Manual Provisioning for IPAM (Cont)
GPO Provisioning
Views of IP Address Space
Monitoring and Managing IPAM
Migrating IPAM to Windows Server 2012
Using PowerShell with IPAM
Demo - Installing IPAM
Demo - Configuring IPAM
Adding Address Space to IPAM
Adding IP Address Block to IPAM
Adding IP Address Subnet to IPAM
Adding IP Address Range to IPAM
Adding IP Address to IPAM
Importing and Updating Address Spaces
Text File Examples
Module 01 Review
Module 02 - High Availability
High Availability
NLB – Network Load Balancing
NLB Uses
NLB Prerequisites
How NLB Works
Server Failures & NLB
NLB PowerShell Cmdlets
NLB Port Rules
Configuring NLB Networks
Using NLB with VMs
Upgrading NLB Clusters
Demo - Implementing NLB Clusters
Demo - Configuring NLB Affinity and Port Rules
Securing NLB
Server 2012 Failover Clustering
Windows Server 2012 R2 Failover Clustering
Clustering and High Availability
Depreciated Cluster Features
Storage Options
CSV – Cluster Shared Volumes
CSV – Clustered Shared Volumes
Network Considerations | CSV
Windows Requirements for Failover Cluster
Infrastructure Requirements
Failover Clustering - Quorum
Failover Clustering: Hardware Requirements
Clustering and Hyper-V Hardware Requirements
Quorum | Definitions
Quorum Witness
Quorum Configuration Options
Quorum Modes
Failover Cluster Networks
Cluster Networking
Demo - Create a Cluster
Multi-Site Failover Cluster
Configuring Multi-Site Failover Clusters
Configuring Applications and Services
Procedure Reference: Installing Clustering Server Roles
Demo - Deploying Highly Available Servers
Cluster Aware Updating
Common Cluster Management Tasks
Management Tools
Backing up Clusters
Restoring a Cluster
DHCP Failover
Configuring DHCP Failover
DHCP Failover Modes
Demo - Configuring DHCP Failover
DHCP MCLT Parameters
Module 02 Review
Module 03 - Hyper-V and High Availability
Hyper-V and High Availability
High Availability | Host Clustering
New Features Server 2012 VM Host Clustering
Prerequisites for Hyper-V Clusters Server Hardware and Software
Prerequisites: Network Infrastructure Requirements
Procedure Reference: Configuring Failover Clustering
Components of Hyper-V Clusters
High Availability | Guest Clustering
Windows Server 2012 R2 Shared Virtual Disk
Shared Virtual Disks in Guest Clusters
SMB 3.0 for Virtual Machines
Scale-Out File Server
High Availability | Network Load Balancing
Cluster Shared Volumes (CSVs)
Failover Process
VM Failover and Preference Settings
Virtual Machine Manager | System Center 2012
VMM Components
VMM 2012 Prerequisites
What is VMM?
Enhancements with Server 2012 R2
How to Deploy Virtual Machines with VMM
ODX Capable Storage for VM’s
P2V Migration
V2V Migration
Migration Methods
Virtual Machine and Storage Migration
Live Migration
Quick Migration
Hyper-V Replica
Demo - Implementing Hyper-V Replica
Hyper-V Replica Components
Hyper-V Replica Prerequisites
Importing & Exporting
Demo - Importing Virtual Machines
Demo - Exporting Virtual Machines
Module 03 Review
Module 04 - Active Directory
Active Directory
AD DS
AD DS Domain Boundaries
AD DS Forest Boundary
Multi-Domain Configuration
Multiple Forest Configuration
DNS Recommendations
Demo - Install AD DS
Demo - Installing a New Domain in a New Forest
Domain Functional Levels
UPNs
Demo - Functional Levels and UPNs
Demo - Configuring Trusts
Upgrading Domain Controllers
Restructure and Migration
Pre-Migration Steps
SID-History Attribute
Restructure & Migration Steps
Trust Relationships
SID Filtering | Selected Authentication
AD DS Partitions
AD DS Replication
AD Sites and Replication
Conflicts | Replication
Replication Topology
RODC Replication
RODC Replication Options
SYSVOL Replication
DFS Replication
AD DS Sites
Demo - Creating Additional Sites
Replication in Same Site
Site Replication in Between Sites
Demo - Moving Servers Between Sites
AD and SYSVOL Replication
ISTG - Intersite Topology Generator
AD DS Site Links
Demo - Site Links
Site Link Bridging
Site Link Costs
Demo - Configuring AD DS Intersite Replication
Universal Group Membership Caching
Demo - Configuring RODC Replication Policies
Managing Replication
Demo - Using Replication Tools: DC Diag
Demo - Using Replication Tools: Rep Admin
SRV Resource Records for Domain Controllers
SRV Record Contents
Service Record Example
Locating a Login Server
Integrating Cloud Services
Azure Considerations
Implementing Azure
Complex AD DS Environments
Module 04 Review


Module 05 - Active Directory Federation Services
Active Directory Federation Services
AD FS
Authentication Policies
Multi Factor Authentication
AD FS Claim Rules
Claims Provider Trusts
Claims Based Identity
Web Services
New Features to Server 2012
SSO within Organization
SSO Business to Business
Prerequisites for AD FS
Certificate Requirements
AD FS Components
Demo - Install AD Federation Services Role
Multi-Factor Access Control in AD FS
Multi-Factor Access Control in AD FS with Windows Server 2012 R2
Claim Types Available in AD FS with Windows Server 2012 R2
AD and Workplace Join
Device Registration Service
Accessing Web Application before Workplace Join your Device
Workplace Joining Your Windows Device
Workplace Joining Your iOS Device
Module 05 Review
Module 06 - File and Storage Services
File and Storage Services
Work Folders
Work Folder Functionality
BranchCache
SMB Server 2012 R2 Enhancements
BranchCache Requirements
BranchCache Server Settings
BranchCache Client Settings
Demo - Configure Client Firewall Rules
Demo - Implementing BranchCache
Demo - Simulate Slow Link to Branch Office
Enabling Distributed Cache Mode or Hosted Cache Mode
Discretionary Access Control
DAC Scenarios
DAC Claims
Resource Properties
Accessing Resources with DAC
DAC Requirements
Enabling Support in AD DS KDC
Creating Claims
Creating Resource Properties
Central Access Control Rules
Demo - Enable File Share for BranchCache
Demo - Configure BranchCache for Branch Office
File Server Resource Manager
Demo - Installing FSRM
File Classification
File Classification Properties
File Classification Rules Properties
Demo - Implementing DAC
Demo - Resource Property Definitions
Demo - Configure Central Access Rules and Policies
Demo - Configure Central Access Denied
Demo - Manual Classification
Demo - Publish Central Group Policy
Optimizing Classification Management
Storage Optimization Features
iSCSI
iSCSI Components
iSCSI Security Components
Demo - Configure iSCSI
Demo - iSCSI Powershell
Demo - Bring a New Volume Online
Module 06 Review
Module 07 - Business Continuity and Disaster Recovery
Business Continuity and Disaster Recovery
Disaster Recovery Requirements
Service Level Agreements
Recovery Plans
Data Recovery
Service Recovery
Full Server Recovery
Site Recovery
Backup Types
Backup Technologies
VSS Admin
Backup Planning
Backup Security
Windows Server Backup
Demo - Installing and Using Windows Server Backup
Demo - Create a Scheduled Backup
Options | Windows Backup
Options | Recovery Wizard
System Restore
Demo - Restoring Files Using Windows Server Backup
Windows Azure Online Backup
Demo - Windows Azure Backup
Data Protection Manager (DPM)
Installing DPM
Demo - Installing DPM
Single Instance Storage
Windows RE
Windows RE Entry Points
Windows Setup and Windows RE
Demo - Windows RE Entry Points
Safe Boot
Demo - Safe Boot
Boot Configuration Data Store
Module 07 Review
Module 08 - Active Directory Certificate Services
Active Directory Certificate Services
AD CS
SSL Certificates
Configuring SSL Certificates
SSL Certificate Issued from Internal CA
Purchasing SSL Certificate
Using Certificates for Digital Signatures
Certificates and EFS
Certificates for Authentication
PKI Definitions
Certificate Services Infrastructure
AD CS Server Role
New Features AD CS Server 2012
Private CA
Public CA
CA Hierarchies
Standalone CA
Demo - Deploying Standalone Root CA
Enterprise CA
Demo - Deploying an Enterprise Root CA
Root CA Considerations
Offline Root CA Considerations
Demo - Deploying Root CA Servers
Subordinate CA Deployment
Demo - Subordinate CA Deployment
CAPolicy.inf
AIA | CDP
Certificate Templates
Template Settings | Users
Template Settings | Computers
Template Permissions
Certificate Template Versions Available in Server 2012
Demo - Modify and Enable Certificate Templates
Demo - Configure Certificate Templates
Certificate AutoEnrollment
Demo - Configure AutoEnrollment
Demo - Verify AutoEnrollment
Manual Enrollment
CA Web Enrollment
Enrollment on Behalf
Demo - Restricted Enrollment Agent
Credential Roaming
Network Device Enrollment Service
Certificate Revocation
Demo - Certificate Revocation Location
Online Responders
Demo - Configuring Online Responder
Demo - Updating Web Server Certificates
Losing Recovery Keys
Key Recovery Agents (KRA)
Demo - Key Recovery
New Functionality with Certificates in Windows Server 2012
CA Administration
Policy Module and Exit Module
Module 08 Review
Module 09 - Active Directory Rights Management Services
Active Directory Rights Management Services
AD RMS
RMS Examples
AD RMS Client Requirements
AD RMS Licensing Requirements
Demo - Installing AD RMS
Components
Temporary RAC’s
RMS Process
Creating AD RMS Cluster
Policy Rights Templates
Demo - AD RMS Templates
Template Offline Use
Super Users Group
Enabling External Users and AD RMS Access
Back up AD RMS
Decommission AD RMS
Module 09 Review
Course Closure
















































70-413: Designing and Implementing a Server Infrastructure

Module 01 - Server Infrastructure - Upgrade and Migration
Server Infrastructure - Upgrade and Migration
Planning for Deployment
Windows Server Editions
Choice Summary
Pre-installation Requirements
Windows Server 2012 Upgrades
Upgrade Options
Migration to Windows Server 2012
Roles That Can Be Migrated
Roles That Can Be Combined on a Single Server
MAP Toolkit
Windows Assessment and Deployment Kit (ADK)
Windows Server 2012 Licensing
Activation Strategies
Considerations for Virtualization
Virtualization Planning
Hyper-V Virtual Licensing
Planning Hardware for Hyper-V Hosts
Deployment Considerations for Virtualized Workloads
Tools for Deploying Virtual Machines
Virtual Machines and Domain Controllers
Cloning Domain Controllers
Demo - Cloning Domain Controllers
VHDs
VHDXs
Imaging Strategies
Windows Imaging Format
WIM File Structure
High Touch Retail Media Deployments
High Touch with Retail Media Deployment Steps
High Touch Standard Image Deployment
High Touch with Standard Image Process
Lite Touch
Zero Touch High-Volume Deployments
Designing the ZTI Environment
Automated Deployment Methods
Types of Images
Choosing a Deployment Method
Deployment Scenarios
Tools for Image-Based Installation of Windows
ImageX Tasks
Image Servicing and Management: DISM
Windows AIK
Tools Available in Windows AIK
Demo - Installing Windows AIK
Windows PE
Windows DS
Windows DS Architecture
New Features in Windows DS
MDT 2012
Configuration Manager
Configuration Manager Task Sequence and Packages
Module 01 Review
Module 02 - Storage and File Services
Storage and File Services
Direct Attached Storage (DAS)
Network Attached Storage (NAS)
Storage Area Network (SAN)
SAN Components
iSCSI
iSCSI Target Server and iSCSI Initiator
iSCSI Target Server Scenarios
Windows Server 2012 R2 New and Changed Functionality
iSCSI and High-Availability
Defense in Depth
DFS
DFSR Replication
Standalone DFS Namespace
Domain DFS Namespace
DFS Uses
Demo - Deploying and Configuring DFS
BranchCache
BranchCache Modes
Procedure Reference to Install
Demo - Implementing BrancheCache
Discretionary Access Control
Dynamic Access Control
DAC Scenarios
DAC Requirements
Central Access Policy
Creating Central Access Policies
Implementing Central Access Policy
DAC Claims
Creating Claims
Resource Properties
Accessing Resources with DAC
Enabling Support in AD DS KDC
Creating Resource Properties
Central Access Control Rules
File Access Auditing
Planning for Access Denied Assistance
Dynamic Access Control Prerequisites
Module 02 Review
Module 03 - Network Infrastructure Services
Network Infrastructure Services
Best Practices for Designing an IPv4 Addressing Scheme
How to Plan and Implement the Appropriate Addressing Scheme
Selecting an Address Scheme (eNotes)
DHCP Server Placement Infrastructure
DHCP Redundancy Options
DHCP Failover
DHCP Super Scopes
DHCP Reservations
DHCP Option Classes
IPv6 Autoconfiguration
Autoconfigured Address States
Improved PowerShell Commands for DHCP in Server 2012 R2
New PowerShell Commands for DHCP
New PowerShell Commands for DHCP (Cont)
DHCP Guidelines
IPAM Definition and Benefits
IPAM
IPAM and DHCP
IPAM Components
Role Based Access Control
Role Based Access Control Roles Provided by Default
IPAM Prerequisites
IPAM Database Support
IPAM Users and Groups
Manual Provisioning for IPAM
Manual Provisioning for IPAM (Cont)
IPAM Design Considerations
IPAM Views
IPAM Monitoring
DNS Namespace Design
Evaluating a Namespace Design
DNS Namespaces (eNotes)
NetBIOS Name Resolution
GlobalNames
WINS vs. GNZ
DNS and AD DS
DNS Records Needed by AD
Demo - DNS Records Needed by AD
DNS Design Considerations
Integrating Multiple DNS Namespaces
DNS Application Partitions
DNS Server Capacity Planning
Demo - Performance Monitor and DNS
DNS Server Roles
DNS Zone Types
DNS Zone Delegation
Zone Transfers and Replications
DNS BIND Versions
Zone Transfer Security
Root Hints Servers
Optimizing DNS Root Hints
DNS Forwarders | Conditional | Stub Zones
Demo - Configuring Zone Transfers
NetBIOS Name Resolution (Cont.)
Demo - Creating DNS Zones
Optimizing Queries
Optimizing DNS Server
Optimizing Active Directory Integrated Zones
DNS and High-Availability
Common DNS Security Issues
DNS Security Levels
Additional DNS Security Settings
Module 03 Review





















































Module 04 - Planning for External User Access
Planning for External User Access
Types of Network Access Services
Types of Users
Considerations of Data to Access
Remote Access Methods
Tunneling Protocols: PPTP
Tunneling Protocols: L2TP
Tunneling Protocols: SSTP
Tunneling Protocols: IKEv2
Authentication Protocols and Methods
Encryption Protocols and Methods Set
Planning for Remote Access
New Features in Remote Access Windows Server 2012
New Features Windows 8.1
Placement of VPN Servers
Network Access Policies
Connection Request Policies
How Policies are Applied
Order of Applying Connections
Demo - Creating a VPN
Perimeter Networks
Common Perimeter Network Applications and Protocols
Types of Firewall Configurations Windows Firewall with Advanced Security
Secure Outside Access Options
DirectAccess
DirectAccess Server Functions
DirectAccess Infrastructure Prerequisites
DirectAccess Server Prerequisites
DirectAccess Client Prerequisites
Methods of Client Connections
DirectAccess Client Connections
Planning DirectAccess
Getting Ready: DirectAccess
Configure DirectAccess Server
DirectAccess with a Single Network Card
RADIUS Authentication and NPS
NPS RADIUS Server
RADIUS Proxy
RADIUS Client
RADIUS Client Examples
Connection Request Policies Conditions | Settings
Conditions | Settings | Default Connection Policy
Connection Request Processing
Network Security
Defense in Depth
Network Policies
Points of Failure for Security Policies
Employee Training
Reasons For Network Attacks
Types of Network Attacks
STRIDE Model
Security Measures
Windows Firewall
Connection Security Rules
IPsec
Server and Domain Isolation
Authentication Options
Best Practices
Demo - Connection Security Rules
Module 04 Review
Module 05 - Design and Implement Logical AD Infrastructure
Design and Implement Logical AD Infrastructure
AD DS Forest Designed
Forest Models: Single
Forest Models: Organizational
Forest Models: Resource Forest Model
Forest Models: Restricted Access
Benefits of Multiple Forests
Guidelines for Designing AD DS Forests
Demo - Creating a Forest Root
Demo - Viewing and Editing the Schema
Forest Trusts
Security Considerations Forest Trust
Accessing Resources in Another Forest
Forest Trust Guidelines
Demo - Creating a Forest Trust
AD DS Domains
Domain Models
Forest Root Domains
Password Policies
Demo - Install Second Domain Controller to Domain
Items That Affected Domain Design
Replication and WAN Links
Trust Relationships
Trusts within a Domain
Trusts Between Domains
Shortcut Trusts
External Trusts
Realm Trusts
Best Practice for Domain Trusts
AD Delegation Options
Delegation Models
Examples of Delegation
Administrative Models
How to Start Planning Resource Management
Administrative Permissions
Branch Office Management
OU Strategies
Users and Permissions
OU Security Descriptors
Demo - Exploring AD Permissions within OU Structure
Delegation Administrative Methods
Where OU Permissions Fall
Examples of Permissions at OU Level (eNotes)
OU Accidental Deletion
Protecting OUs using PowerShell
Demo - Protecting OUs using PowerShell
Active Directory Groups
Group Scope and Nesting
Demo - Creating Groups with Active Directory Administration Center
Demo - Creating Groups with PowerShell
Group Strategy
Default Groups
Protected Users Security Group
Protected Users Security Group User Limitations
Special Identities
Computer Accounts
Best Practices
Module 05 Review
Module 06 - AD GPO
AD GPO
Factors for Group Policy Design
Planning for Desktop Environments with Group Policy
Planning Group Policy for Administrative Models
Group Policy Components
Uses for Group Policy
Demo - Group Policy Categories
Group Policy Templates
Nodes: Computer
Nodes: User
Group Policy Preferences
Configuring Group Policy Preference
GPO Design Considerations
Group Policy Inheritance
Group Policy Filtering
Group Policy Processing
Group Policy, Backup and Restore and Documentation
PowerShell Cmdlets
Migrating GPOs to a New Domain Set
Migration Table Editor
Administration of Group Policy
Slow Link Detection
Module 06 Review
Module 07 - Designing a Physical AD Infrastructure
Designing a Physical AD Infrastructure
AD DS Sites
Location of AD DS Site Configuration
Replication Traffic
Service Localization
Designing AD DS Sites
Factors that Determine AD DS Site Design
Automatic Site Coverage
AD DS and DNS
AD DS Site Considerations
Domain Controller Placement
AD DS Replication Components: Connection Objects
AD DS Replication Components: Notification and Polling
KCC
ISTG - Intersite Topology Generator
Replication Topologies: Ring
Replication Topologies: Hub and Spoke
Replication Topologies: Full Mesh
Replication Topologies: Hybrid
Replication Protocols
Notes on SMTP
Replication and RODCs
Replication and Global Catalogs
Replication and SYSVOL
Site Links
Bridgehead Servers
Site Link Bridging
Virtualized Domain Controllers
Cloning Virtual Domain Controllers
Process: Cloning Server 2012 VDC
DcCloneConfig.xml Syntax
DcCloneConfig.xml Parameters
Domain Controller Safe Backup and Restore
PowerShell for Hyper-V Snapshot Managment
Module 07 Review
Module 08 - Domain Controllers
Domain Controllers
Hardware Requirements for Domain Controllers
Installing Server Core
FSMO Roles
FSMO Locations
RODC Limitations
Tools For Monitoring Domain Controllers
Best Practices Analyzer
Demo - Best Practices Analyzer
Security Best Practices
High-Availability
Defining High-Availability Needs for Active Directory
Active Directory, High-Availability
DNS High-Availability
Backup and Recovery AD DS
Types of Backups
Backing Up Critical Volumes
Active Directory Restores
Restoring Active Directory
Active Directory Recycle Bin
Module 08 Review
Course Closure

70-414: Implementing an Advanced Server Infrastructure

Module 01 - Creating the Virtualization Infrastructure
Lesson 1: Introducing Microsoft System Center 2012
Components
What is the VMM
What is Operations Manager
What is Orchestrator
What is the App Controller
What is Service Manager
What is Data Protection Manager
What is Configuration Manager
System Center Services and Tools
Lesson 2: Using System Center for Virtualization
Scaling VMs with the VMM
Management with App Controller
Monitoring with Operations Manager
Using Service Manager
Automating Tasks with Orchestrator
Using Data Protection Manager to Help Protect a Virtual Deployment
Demo - Using the VMM Management Console
Lesson 3: Planning a VMM Deployment
Calculating the VMM Deployment Topology
Planning a VMM Management Server
Creating a VMM Library
Creating a VMM Database
Lesson 4: Creating the Virtualization Host
Deploying Hyper-V Hosts
What are Host Groups
Demo - Configuring Host Groups
Working with VMM Libraries
Demo - Working with Libraries
Lesson 5: Storage Infrastructure
Storage Options for Server Virtualization
Options for Configuring Virtual Disks
Using Fibre Channel Storage
Implementing iSCSI Storage
Implementing NFS and SMB 3 Storage
HA for Storage
Lesson 6: Configuring a Storage Infrastructure for Virtualization
iSCSI Configuration Overview
Managing Storage in VMM
Demo - Configuring Storage in VMM
Lesson 7: Network Infrastructure for Virtualization
Networking Requirements
Hyper-V Virtual Switch
New Features Hyper-V Virtual Switch Server 2012 R2
Configuration Options for Virtual Networks
Demo - Configuring Virtual Networks
Planning Networks for a Hyper-V Deployment
Managing Virtual Networks in VMM
What Is Network Virtualization
Demo - Configuring Virtual Networks in VMM
Module 01 Review
Module 02 - Planning and Deploying Virtual Machines
Lesson 1: Considerations for Virtual Machine Setup
When to Virtualize
Virtual Machine Components
Microsoft Solution Accelerators
VMM Integration with System Center 2012
Windows Server 2012 R2 as Gateway With VMM
Planning for Virtual Machine Configuration
Virtualizing Exchange
SQL Server
SharePoint Server
Planning Virtual Machines for Active Directory Domain Services
Virtualized Domain Controllers Server 2012 R2
Cloning Virtual Domain Controllers
Process: Cloning Server 2012 VDC
DcCloneConfig.xml Syntax
DcCloneConfig.xml Parameters
Domain Controller Safe Backup and Restore
Lesson 2: Planning Virtual Machine Deployment with VMM
Profiles - OS
Profiles - Hardware
Configuring SQL Server Using SQL Server Profiles
Profiles - Applications
Service Templates
VM Templates
Guidelines for VMM Profiles and Templates
Lesson 3: How to Deploy a Virtual Machine
Using VMM for Deployment
Using VMM for Smart Placement
P2V
Considerations for Implementing P2V Conversions
V2V Machine Conversions
Considerations for V2V Conversions
Demo - Configuring a Virtual Machine
Module 02 Review
Module 03 - Monitoring
Lesson 1: Monitoring in Windows Server 2012
Introduction to Monitoring Tools in Windows Server 2012
Using Server Manager for Monitoring
Strategies for Monitoring
Monitoring Server Roles
Options for Monitoring Virtualization
Considerations for Monitoring Virtual Machines
Demo - Enabling and Viewing Resource Metering Data
Lesson 2: Introduction to Operations Manager
Features of Operations Manager
Operations Manager Components
Options for Operations Manager Agent Installation
Demo - Installing the Operations Manager Agent
What is ACS?
Deploying Audit Collection Services
Considerations for Deploying Operations Manager
Demo - Using the Operations Manager Console
Lesson 3: Management Packs
Overview of Management Packs
Management Pack Authoring
Using Management Packs
Creating Overrides
Planning Monitoring with Operations Manager
Lesson 4: Notifications and Reporting
Overview of Notifications
Configuring Notifications
Overview of Reporting
Configuring Reports and Reporting
Implementing Notifications and Reports
Lesson 5: Integration with VMM
Operations Manager Integration with VMM
Configuring Operations Manager and VMM Integration
What is PRO?
Comparing PRO and Advanced Placement Options in VMM
Considerations for Implementing PRO
Configuring Advanced Monitoring for Virtualization Components
Module 03 Review
Module 04 - Solution for the Virtualization Administration
Lesson 1: System Center 2012 Administration
Overview of Run As Accounts in System Center 2012
Administration Delegation for VMM
Administration Delegation for App Controller
Administration Delegation for Service Manager
Administration Delegation for Operations Manager
Administration Delegation for Orchestrator
Administration Delegation Plans for System Center
Demo - Delegated Administration
Using Self-Service Options in VMM
Using Self-Service Options in Service Manager
Using Self-Service Options in Orchestrator
Using Self-Service Options in System Center 2012
Lesson 2: Automation with System Center 2012
Options for Automating Virtualization Management in Service Manager
Options for Automating Virtualization Management in Orchestrator
Options for Automating Virtualization Management in Operations Manager
Implementing Process Automation in System Center 2012
Demo - VMM Private Clouds
Module 04 Review
Module 05 - High Availability
Lesson 1: Storage Spaces
Describing Storage Spaces
Storage Space Configurations
Clustered Storage Space
How to Configure Storage Spaces
Storage Space Configuration
Storage Space Needs
Demo - RAID
DFS Components
Scenarios for Using DFS
DFS Namespace
Referrals
DFS Namespaces
Best Practices
Designing DFS Replication
Lesson 2: NLB
Scenarios
NLB
Port Rules
Data Storage for NLB Clusters
Managing NLB with VMM
VMM Control of NLB
Lesson 3: The Infrastructure for Failover Clustering
What is Failover Clustering
Considerations for Server Workloads on Failover Clusters
Cluster Nodes Hardware
Network Components
Storage Components
Cluster Quorum
Application Considerations
Lesson 4: Defining Failover Clustering
Configuring a Failover Cluster
New Features to Failover Clustering Windows Server 2012 R2
New Features to Failover Clustering Windows Server 2012 R2 (Cont)
Improved Features For Failover Clustering In Windows Server 2012 R2
What Server Roles are Used
Settings for a Failover Cluster
Application and Resource Settings
The Scale-Out File Server for Server 2012
Lesson 5: Integrating Failover Clustering with Server Virtualization
Options for Making Virtual Machine Workloads Highly Available
How Does a Failover Cluster Work with Hyper-V?
Infrastructure Requirements for Implementing Failover Clustering for Hyper-V
Implementing Storage Migration
Implementing Live Migration
Implementing Hyper-V Replica
Implementing Virtual Machine Availability
Lesson 6: Multisite Planning a Multisite Failover Cluster
Multisite Challenges for Planning Multisite Clusters
Multisite Planning Data Replication in a Multisite Failover Cluster
Network Infrastructure Considerations
Quorum Mode Considerations
Multisite General Guidelines for Planning Multisite Clusters
Module 05 Review
Module 06 - PKI
Lesson 1: The Certificate Authority
Certification Authorities
CA Hierarchy
Internal and Public CAs
Planning a CA Hierarchy
When to Use Standalone and Enterprise CAs
Deploying a Root CA
Designing a CA Hierarchy
CA Recovery
Migrating and Upgrading Certification Authorities
Lesson 2: Certificate Templates
Describing the CA
Template Versions
Modifying Certificate Templates
Certificate Template Security
Designing Certificate Templates
Demo - Overview of Certificate Services
Lesson 3: CRL
Enrollments
Auto Enrollment
Choosing an Enrollment Method
Certificate Revocation
Designing Certificate Revocation
Delegating CA and Certificate Management
Lesson 4: Key Archival
Scenarios for Private Key Recovery
Options for Configuring Key Archival
Options for Configuring Key Recovery
Managing Key Archival and Recovery
Module 06 Review
Module 07 - Updates
Lesson 1: WSUS Deployment
WSUS Topology
Designing a WSUS Infrastructure
Configuring WSUS Replicas
WSUS on Isolated Networks
WSUS Database
Update Storage Location
WSUS Management
Considerations for Managing Update Deployment
Demo - WSUS
Lesson 2: Using Configuration Manager 2012
Introducing Software Updates Feature in Configuration Manager
Implementing the Software Updates Feature
Software Updates Feature
Working with Software Updates Feature
The Software Update Point
Software Update Deployments
Selecting an Update Management Technology
Lesson 3: Updating Virtualization
Cluster-Aware Updating
Considerations for Configuring CAU
Update Management in VMM
Update Baseline
Considerations for integrating WSUS and VMM
Module 07 Review
Module 08 - BCP
Lesson 1: BCP
Requirements for BCP
Strategies for BCP
SLAs
Components of a Backup Strategy
Components of a Restore Strategy
Using Windows Server Backup
Using System Center 2012 DPM
Considerations for Using Windows Azure Online Backup
Lesson 2: Backups
Planning Server Backups
AD DS Backup
Backing Up Windows Server 2012 Roles
Backing Up File Storage
Performing Windows Server Backups with DPM
Planning a Backup Strategy
Demo - Windows Backup Utility
Lesson 3: Recovery
Planning Server Recovery
AD DS Restore
Restoring Windows Server 2012 Roles
Restoring Files and Data
Restoring Windows Servers
Performing Windows Server Restores with DPM
Recovery Strategy
Disaster Recovery Site
Lesson 4: Backup and Recovery of VMs
Options for Implementing Backups for Virtual Machines
Using DPM
Configuring DPM
Backing Up VMs
Restoring VMs
Configuring Hyper-V Replica
Planning for Implementing Virtual Machine Backup and Recovery
Module 08 Review
Module 09 - IDA
Lesson 1: Planning and Implementing an AD FS Server
Infrastructure
What is AD FS?
Overview of AD FS Components
AD FS Operational Flow
Overview of AD FS Deployment Scenarios
Options for Implementing the AD FS Server Role
Configuring Certificates
Choosing an AD FS Deployment Scenario
Configuring High Availability for AD FS Services
Integrating AD FS with Online Services
Lesson 2: Planning and Implementing AD FS Claims Providers and Relying Parties
Overview of Claims Provider and Relying Party Roles
Overview of AD FS Compatible Applications
Options for Implementing Attribute Stores
Overview of Claims Provider Trust Components
Overview of Relying Party-Trust Components
Configuring Claims Provider Trusts
Configuring Relying Party Trusts
Lesson 3: Planning and Implementing AD FS Claims and Claim Rules
Claims
Options for Configuring Claim Rules on a Federation Trust
Creating Claim Rules by Using the Claims Rule Language
Designing AD FS Claims
Options for Interoperation with Previous Versions of AD FS
Lesson 4: Planning and Implementing an AD RMS Cluster
What is IRM?
How AD RMS Works
AD RMS Deployment Scenarios
AD RMS Components
Options for Configuring AD RMS Clusters
Guidelines for Designing AD RMS Clusters
Configuring High Availability for AD RMS Services
Planning AD RMS Management
Implementing an AD RMS Backup and Recovery Strategy
Decommissioning and Removing AD RMS
Demo - Installing an AD RMS Cluster
Lesson 5: Planning and Implementing AD RMS Templates and Policies
Options for Configuring AD RMS Rights Policy Templates
Planning for AD RMS Template Distribution
Options for Configuring AD RMS Exclusion Policies
Planning the AD RMS Super Users Group
Planning for AD RMS Client Applications
Lesson 6: Planning and Implementing External Access to AD RMS Services
Options for Enabling External Users to Access AD RMS
Options for Enabling Application Access for AD RMS Clients
Planning Trusted User Domains
Planning Trusted Publishing Domains
Integrating AD RMS with Microsoft Federation Gateway Support
Integrating AD RMS with Windows Live ID
Integrating AD RMS with AD FS
Considerations for Enabling External User Access to AD RMS
Lesson 7: Planning and Implementing AD RMS Integration with DAC
What is DAC?
Overview of Dynamic Access Control Configuration Process
Integrating AD RMS and DAC
How AD RMS Integrates with DAC
Module 09 Review
Course Closure

Related Products

MCITP Training
Shopping Cart
Your cart is empty.

Need More IT Certification Online 

Training 

Courses?

Win A Free Course

Our Reputation Speaks for Itself!

"I have worked with Career Academy in many different formats over the last 8 years. I have been an instructor in their products, a reseller, and a business partner. I have been continually impressed with Career Academy's professionalism, quality of products, and ethics. Their whole team works very hard on all fronts and treats their customers and partners with respect. Career Academy is certainly one of the 'good guys' in the industry who can be trusted to do the right thing by all. "

Shon Harris
President
Logical Security
Author of Best Selling
"CISSP All-in-One Exam Guide"


"New Horizons of Columbus, Omaha, Memphis, Pittsburgh, Lincoln, Atlanta, Indianapolis, and Nashville's addition of Career Academy's VideoTrainer learning systems has given us the ability to offer our students an additional training venue. The Remote Mentored Learning capabilities offered by Career Academy have helped revolutionize our virtual training delivery worldwide. Career Academy's Video Learning Solution through New Horizons Computer Learning Centers delivery gives our customers what they want, how they want and when they want with quality delivery."

Bob Outlaw
Director/General Manager
New Horizons of Omaha and Lincoln

  • See More...