Microsoft MCITP Enterprise Administrator Training - OnDemand Learning

MCITP Training
Sale Price: $1,495.00
Item Number: MS-MCITP-EA
Configuration: -online

* denotes required field

Media Content*
Untitled Document
Our reputation speaks for itself! See what others are saying... Testimonials
Package Includes

MCITP : Enterprise Administrator

Course Name
Printable Courseware
List Price
Configuring Windows Server 2008 Active Directory
Configuring Windows Server 2008 Network Infrastructure
Complete Training Totals:  
Retail Price
Sale Price
You Save $980

  • 12 Months Online Access, Featuring OnDemand Instructor-Led Classroom Sessions with Full Audio and Video Lectures
  • Software Video Demonstrations
  • Self-Assessment Module Review Quizzes
  • Printable Courseware
  • Certificate of Completion
  • Free 1 Year Upgrade Policy
  • Mobile Access via iPhones and iPads
MCITP Training

Kenneth Mayer - Certified CEH Trainer (CCSI, MCT, CCNP, CCDA)
Ken Mayer is a Microsoft Certified Trainer as well as a Certified Ethical Hacker Trainer and Security consultant. He started his career in computer technology in 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies across the United States and Western Europe. He has achieved the Certified Cisco Systems Instructor certification. The CCSI certification involved a two-day lab and observation event held on Cisco in Paris, France Facility. This gave Ken the accreditation to be able to deliver Cisco Authorized Courses as a CCSI. He has taught the full line of Cisco CCNA, CCDA, CCNP, CCDP and CCIP course curriculums, including Cisco's security appliances such as PIX and IDS.

Course Features:

70-640: Configuring Windows
Server 2008 Active Directory

Chapter 01 - Installing the Active Directory Role
Lesson 1: What is IDA?
What is Active Directory Identity and Access (IDA)
Five Components of the IDA Platform
What Windows 2008 Server Offers Beyond the IDA
Lesson 2: How to Install the AD DS Role
What are the Different Components?
Preparation Checklist for Creating a Windows Server 2008 Forest
How to Add the Directory Service Role
Demo - Creating a Windows Server 2008 Forest
Lesson 3: The New Windows 2008 Server Core
Understanding Server Core
Lesson 4: Installing AD DS Server Core
Installing Server Core
Demo - Installing a Server Core Domain Controller
Chapter 01 Review
Chapter 02 - Working With Active Directory Objects
Lesson 1: Working with the MMC
Understanding the MMC
How to Use the Microsoft Management Console (MMC)
Customize the MMC with Snap-ins
Learn How to Use the Alternate Login Credentials
Demo - Custom MMC
Lesson 2: Working with Objects in Active Directory
Creating an OU
Creating a User Object
Creating a Group Object
Lesson 3: How to Search Through Active Directory
How to Find Objects in Active Directory
Introducing LDAP
Demo - Using Active Directory
Lesson 4: Securing and Delegating AD Objects
Understanding Delegation
What are User Rights?
Using the Delegation of Control Wizard
Demo - Delegation
Lesson 5: Adding Computer Accounts to AD
Understanding Workgroups, Domains, and Trusts
Identifying Requirements for Joining a Computer to the Domain
Offline Domain Join
Lesson 6: Organizing AD with Container Objects
Understanding Containers
Creating OUs for Computers
Adding a Computer to the Domain
Restricting the Ability of Users to Create Computers
Demo - Joining the Domain
Lesson 7: Working With Computer Objects and Accounts
Configuring Computer Properties
Moving a Computer
Managing a Computer with the AD Users and Computers
Recognizing a Computer Account Problem
How to Reset a Computer Account
How to Rename a Computer
Ways to Disable/Enable Computer Accounts
How to Delete a Computer Account
Recycling the Computer Account
Demo - Recycling the Computer Account
Lesson 8: Automating Computer Account Creation
Importing Computers with CSVDE
Importing Computers with LDIFDE
Creating Computers with DSadd
Creating Computers with Netdom
Windows PowerShell
Creating Computers with VBScript
Demo - Automating Computer Creation
Chapter 02 Review
Chapter 03 - Understanding GPOs
Lesson 1: Using Group Policy
Review of Group Policy
Lesson 2: What Are Group Policy Objects
Group Policy Objects
Policy Settings
Filtering Administrative Template Policy Settings
Demo - Group Policy
Lesson 3: Restricted Group Policies
Understanding Restricted Groups Policies
Demo - Restricted Groups
Lesson 4: Analyzing Security Settings
How to Configure the Local Security Policy
Using Security Templates and Deploying the GPOs
Analyzing the Security Configuration of a Computer
Creating Security Templates from the Results
Lesson 5: Using The Security Configuration Wizard
The Security Configuration Wizard
Security Policy
Demo - SCW
Lesson 6: Deploying Software with Group Policy
Understanding GP Software Installation
Windows Installer Programs
Preparing an SDP
Creating a Software Deployment GPO
Managing the Scope of Software Deployment GPO
Demo - Software Deployment
Lesson 7: Understanding Group Policy Scope
GPO Links
What is Inheritance and Precedence?
Security Filtering to Modify GPO Scope
WMI Filters
Enabling or Disabling GPOs and GPO Nodes
Lesson 8: How Group Policy Settings are Processed
Group Policy Processing
Group Policy Options
Demo - Group Policy Scope
Lesson 9: Verifying Group Policy Settings
Resultant Set of Policy
GP Results Wizard
Group Policy Modeling Wizard
Demo - Verifying Group Policy
Lesson 10: Enabling Auditing
Audit Policy
How to Audit Access to Files and Folders
Global Access Auditing
“Reason for Access” Reporting
Enabling the Audit Policy
Demo - Auditing
Chapter 03 Review
Chapter 04 - Managing Users and Groups with AD
Lesson 1: Automating User Account Creation
Automating the Creation of User Accounts with Templates
Introduction to the Active Directory Command-Line Tools
Demo - Automating User Accounts
Lesson 2: Working with User Attributes
How to Manage User Attributes
Understanding the Name and Other User Attributes
Account Properties
Managing User Attributes without the GUI
Lesson 3: User Account Administrative Tasks
Administrative Tasks
Protected Admin
Demo - Supporting User Accounts
Lesson 4: Using PowerShell to Create User Accounts
What is Windows PowerShell?
Key Elements of PowerShell
User Creation with PowerShell
PowerShell Scripting
Demo - Creating Users with PowerShell
Lesson 5: Group Creation and Management
Managing Your Enterprise with Groups
Defining Group Naming Conventions
Lesson 6: The Basics of Groups
Understanding Groups
What’s a Group Scope?
Allowed Group Scope Conversions
Managing Group Membership
Using Groups for Permissions
AGDLP and AGGUDLP Illustrated
Local vs. Domain
Demo - Managing Groups
Lesson 7: Best Practices for Using AD Groups
Best Practices for Group Attributes
Default Windows Groups
Lesson 8: Automating Group Creation
Creating and Managing Groups
Managing Group Membership with Windows PowerShell and VBScript
Demo - Automating Creation of Groups
Lesson 9: Advanced Group Options
Protecting Groups from Accidental Deletion
Delegating the Management of Group Membership
What are Shadow Groups?
Special Groups
Demo - Administering Groups
Chapter 04 Review
Chapter 04 Review

Chapter 05 - Working With Domain Controllers
Lesson 1: Installation Options
Creating a New Forest
Creating a New Tree
Migrating a Domain
Deleting a Domain
Lesson 2: How to Install a Domain Controller
Installing a DC with the Windows GUI
Using Unattended Installation and Answer Files
Installation Options
Lesson 3: Introducing the Operations Masters
Single Master Operations
Forest Wide Roles
Domain-Wide Roles
Lesson 4: Designing Where to Deploy the Operation Masters
Where to Place These Operations Masters
Identifying the Operations Masters
Transferring Operations Master Roles
Seizing Operations Masters
How to Seize or Transfer Operation Master Roles
Extending the Schema
Demo - FSMO
Lesson 5: SYSVOL Replication with DFS
How to Raise the Domain Functional Level
Understanding the Migration Steps
Chapter 05 Review
Chapter 06 - Adding DNS
Lesson 1: DNS Basics
DNS and IPv6
Peer Name Resolution Protocol
Types of DNS Servers
Dynamic DNS
Secure Dynamic DNS (SDDNS)
The Split Brain Option
Lesson 2: DNS Definitions and Terms
Understanding DNS
DNS Terms
Types of Records
Windows Server DNS Features
Demo - DNS
Lesson 3: Setting up DNS for the Enterprise
Configuring DNS
Considerations for Security
Working with DNS Server Settings
Application Directory Partitions
Administering DNS Servers
Demo - Global Names
Chapter 06 Review
Chapter 07 - Securing the Authentication Process
Lesson 1: Password Security Policies
Understanding Password Policies
Understanding Password Settings Object
Demo - Passwords
Lesson 2: Introducing the Read-Only Domain Controller
RODC Options
Lesson 3: Installing the RODC
Deploying an RODC
Password Replication Policy
Lesson 4: Auditing Authentication Events
Account Logon Events
Configuring Authentication-Related Audit Polices
Demo - Account Logging
Chapter 07 Review
Chapter 08 - Monitoring and Supporting AD
Lesson 1: Preparing for Recovery
Important Concepts
Twelve Categories of AD DS Administration
Lesson 2: Active Directory Tools
Performing Online/Offline Maintenance
Offline Maintenance
Built-in Directory Protection Measures
Proactive Restores
Restarting in DSRM
Identifying the Backup Set
Other Options
Backup/Restore GPOs
Using the AD Recycle Bin
Lesson 3: Monitoring Active Directory Performance
Managing System Resources
Task Manager
Event Viewer
Server Manager
Demo - Performance Monitor
Chapter 08 Review
Chapter 09 - Planning Active Directory Deployment
Lesson 1: What Are Sites?
Understanding What a Site Is
Site Traffic
Planning Sites
Controlling Replication
Site Links
Bridgehead Server
Replication Scheduling
Replication Protocols
Forcing Intersite Replication
Summarizing Site Planning
Lesson 2: Deciding on Site Boundaries
Defining Sites
Managing Domain Controllers in Sites
Site Coverage
Demo - Sites and Subnets
Lesson 3: Working with Global Catalog Placement with AD Partitions
Reviewing AD Partitions
Understanding the Global Catalog
Placing GC Servers
What’s Found in the Global Catalog
Universal Group Membership Caching (UGMC)
Partial Attribute Set
Promoting a Domain Controller to a Global Catalog
Lesson 4: Controlling Replication Between Sites
Understanding AD Replication
Intersite Replication
Monitoring Replication
Lesson 5: Managing the Global Catalog
Configuring a Global Catalog
Understanding Application Directory Partitions
Lesson 6: Configuring AD Trust Relationships
Defining the Forest Infrastructure
Moving Objects
Migration Issues
Trust Relationships
Securing Trust Relationships
Demo - Trusts
Lesson 7: Choosing the Domain and Forest Functional Levels
Functional Levels
Domain Functional Levels
Forest Functional Levels
Chapter 09 Review
Chapter 10 - IDA Solutions
Lesson 1: Understanding AD FS
Understanding AD FS
Support of AD FS
The AD FS Process
Working with FS Designs
AD FS Components
Lesson 2: Installing AD FS
Installing AD FS
Lesson 3: Configuring and Using AD FS
Finalizing the Configuration of AD FS
Using and Managing AD FS
Lesson 4: Understanding AD RMS
Understanding AD RMS
New AD RMS Features
Basic Concepts
AD RMS Installation Scenarios
Preparing AD RMS Installation Prerequisites
Lesson 5: Installing AD RMS
AD RMS Considerations
Understanding AD RMS Certificates
Lesson 6: Configuring and Using AD RMS
Configuring AD RMS
Lesson 7: Understanding AD LDS
What is AD LDS?
Comparing LDS with DS
AD LDS Scenarios
Lesson 8: Installing AD LDS
Installing AD LDS
Demo - Installing AD LDS
Lesson 9: Configuring and Using AD LDS
Working with AD LDS Tools
Creating an LDS Instance
Other Options
Lesson 10: Security Review
Chapter 10 Review
Chapter 11 - Active Directory Certificate Services
Lesson 1: Understanding AD CS
Understanding AD CS
CA Options
Creating the CA Hierarchy
Some Best Practices
Additional Planning Requirements
Certificate Enrollment Types
Network Device Enrollment Service (NDES)
Configuring AutoEnrollment
Web Enrollment
Authentication Mechanism Assurance
Enrollment Agents
Deploying Multi-Forest Certificates
X.509 Certificate Mapping
AD CS Illustration
Lesson 2: Installing AD CS
Installing AD CS
Supported Deployments
Standalone Root & Subordinate
Enterprise Root & Subordinate
Lesson 3: Configuring and Using AD CS
Finalizing the Configuration of an Issuing CA
More about the CRL
Considerations for the Use and Management of AD CS
More on Certificate Templates
Types of Templates
Chapter 11 Review
Course Closure

70-642: Configuring Windows Server 2008 Network Infrastructure

Chapter 1 - Understanding and Configuring IP
Lesson: Introducing the OSI Model
Understanding the Network Layers
OSI Model
The Encapsulation Process
OSI vs TCP/IP Model
Lesson: How IPv4 Works
Ipv4 Address Structure
Why the Subnet Mask
How to Convert Binary to Decimal and Vice-Versa
Understanding What Routing and Default Gateways Are
Discussion of RFC 1918
Lesson: Increasing Networks with Subnetting
What is Subnetting
Demo - IP Addressing
Lesson: What's New with IPv6
Introducing IPv6
IPv6 Address Types
IPv6 Transition Technologies
Lesson: Configuring Windows with an IPv4 Address
Configuring Networking Properties for Vista and 2008 Server
Viewing Network Connections
Network Connection Components
Methods of Configuring and Verifying an IP Address
Troubleshooting Network Connectivity
Demo - Configuring IP
Demo - Testing Connectivity
Chapter 01 Review
Chapter 2 - Configuring IP Based Solutions
Lesson: Why Use a DHCP Server
What are DHCP Address Assignments?
Configuring the Address Leases
Understanding the DHCP Scope
Adding the DHCP Server Role
What is the DHCPv6 Stateless Role?
Demo - DHCP
Demo - DHCP Options
Lesson: Creating DHCP Servers for Your Network
Post-Installation Tasks
Other DHCP Options
DHCP on the Server Core
Lesson: How Windows Performs Name to IP Resolution
Name Resolution Methods in Windows
Broadcast Name Resolution
WINS Server Name Resolution
Lesson: Configuring Windows to Use DNS
Specifying DNS Servers
The Suffix Search List
How to Clear the Client’s Cache
Using Dynamic Update Settings
Demo - DNS Client
Lesson: How Does DNS Really Work
How a DNS Query Works
DNS Query Example
DNS Query Illustrated
How Caching Works
Demo - Name Resolution
Lesson: Deploying DNS Servers
DNS on DC Deployment
Using Server-Core for DNS Services
Making a Stand-Alone or Member-Server DNS
Configuring a Caching-only DNS Server
Configuring Server Properties
Demo - Configuring DNS
Lesson: DNS Configurable Options
Integrating WINS records into DNS
Aging and Scavenging
Demo - Global Names Zone
Lesson: Managing Different Types of DNS Zones
How to Create Zones
The Scope of AD Zone Replication
Creating and Using the Forward and/or Reverse Lookup Zone
Using Dynamic Updates
Exploring the Built-in Resource Records
Lesson: Configuring Zone Replication and Transfers
Configure a Zone Replication Scope for Active Directory
Choosing Zone Replication Scope
Creating Custom Application Directory Partitions
Zone Transfers
Implementing Stub Zones
Demo - Secondary Zone
Chapter 02 Review
Chapter 3 - Understanding IP Routing
Lesson: Routing Explained
Routing Overview
Routing Process
Tools Used to Verify Routing
Lesson: Router Communication Protocols
Routing Protocols
Routing and Remote Access
Demo - IP Routing
Demo - Routing Protocols
Chapter 03 Review
Chapter 4 - Connecting Windows to the LAN
Lesson: NAT Explained
NAT Concepts
Windows 2008 NAT Options
Lesson: Making NAT Work
Configuring ICS
Configuring NAT using RRAS
Troubleshooting NAT
Lesson: Remote Access to Other Networks
Remote Access Overview
Configuring VPN Connections
Configuring Dial-Up Server
Configuring the VPN Server
Other Options
Testing Connectivity
Demo - VPN Connections
Lesson: WiFi Basics
Wireless Networking Concepts
Wireless Networking Standards
Wireless Security Standards
Wireless Infrastructure
Authenticating Wireless with Windows Server 2008
Connecting to Wireless Networks
Best Practices
Demo - Wireless Network
Demo - Wireless Group Policy
Chapter 04 Review

Chapter 5 - Securing the Client, Network, and Communications
Lesson: Communication Security: IPSec
Explaining IPSec
IPSec Policies
Understanding Connection Security Rules
Security Associations
How IPSec Establishes Connections
What Authentication Methods can be used with IPSec
Lesson: Enforcing IPSec with Policies
Looking at the Predefined IPSec Policies
Using the IPSec Security Rule Wizard
Using the Connection Security Rule Wizard
Demo - IPSec
Lesson: Network Security with NAP
Concepts of NAP
System Health Agents and Validators
The NAP Process
Planning NAP Deployment
Installing and Configuring NAP
Lesson: Client Security with Windows Firewall
Why are Firewalls Important?
Outbound Filtering
Inbound Filtering
Firewall Scope
Using Group Policies
Authorizing Connections
Demo - Windows Firewall Inbound
Demo - Windows Firewall Outbound
Lesson: Other Security Solutions
Other Configurations
IPSec Rules
802.1x Configuration
Configuring DHCP
Configuring NAP Components
Configuring SHVs
Configuring Network Policies
Demo - Install NAP
Demo - NPS
Demo - SHV
Demo - Health Policy
Chapter 05 Review
Chapter 6 - Managing Files
Lesson: Working with File Security
NTFS Files Permissions
NTFS Permissions
Methods of Securing Files
Lesson: Server Role - File Services
The File Services Server Role
Using Quotas
Configuring Quotas
Lesson: Using DFS
Sharing Folders
DFS Overview
Installing DFS
Demo - DFS
Lesson: Using EFS
How to Encrypt a File/Folder
Sharing Encrypted Files
Configuring EFS Using GPS
Demo - File Security
Demo - EFS
Lesson: Performing a Backup and Restore
Shadow Copies
Managing Shadow Copies
Windows Server Backup
Demo - Back Up
Chapter 06 Review
Chapter 7 - Monitoring Systems
Lesson: How to Install and Use Network Monitor
Installing Network Monitor
Analyze Network Data
Demo - Network Monitor
Lesson: Windows Performance and Reliability Monitoring
Performance Monitor
Reliability Monitor
Built-In Data Collector Sets
Demo - WRPM
Lesson: Looking at Event Logs
Event Forwarding Concepts
Lesson: Configuring Event Forwarding
How to Configure Event Forwarding
Configuring the Collecting Computer
Creating a Subscription
Configure Event Forwarding to use HTTPS
Demo - Monitoring Events
Chapter 07 Review
Chapter 8 - Managing Printers
Lesson: Server Role: Print Services
Installing the Print Services Server Role
Installing Printers
Lesson: How to Share Printers
Sharing Printers
Printer Pooling
Printer Priority
Managing Internet Printing
Generating Notifications
Migrating Printers
Managing Printers with the CLI
Demo - Managing Printers
Demo - Web Printing
Chapter 08 Review
Chapter 9 - Securing Windows Through Updates
Lesson: What is Windows Server Update Services
WSUS Overview
WSUS Architecture
WSUS Minimum Requirements
Lesson: Planning & Deploying the WSUS Installation
Planning for the WSUS Installation
Auditing Updates
Demo - Install WSUS
Lesson: Using Windows Server Update Services
How to Troubleshoot Update Problems
How to Remove Updates
Chapter 09 Review
Course Closure

70-643: Configuring a Windows Server 2008 Applications Infrastructure, Configuring

Module 01 - Deploying Windows in the Enterprise
Lesson 1: How to Deploy Windows in the 2008 Server Environment
Basics of Windows Deployment
Tools of the Planning Phase
Tools of the Building Phase
Tools of the Deployment Phase
Basics of Windows Deployment, Cont.
Windows PE
Image X
Windows SIM
WIM: A Closer Look
Ways to Deploy Windows
Manual Deployment
Lite & Zero-Touch Deployment
Lesson 2: Working with WDS
Looking at Windows Deployment Services
WDS Components
The WDS Role
Initial WDS Configuration
WDS Server Properties
Image Capturing
How Deployment Works
What Happens in the Background
Demo - Configuring WDS
Demo - Install Boot Image
Lesson 3: Virtual Machine Deployment
Understanding What a VM Is
Prior Virtualization Options
Hyper-V Disk Types
Hyper-V Networks
Demo - Install Hyper-V
Lesson 4: Putting in an Activation Infrastructure
Windows Activation Types
The MAK Model
KMS Activation
Module 01 Review
Module 02 - Working with Terminal Services
Lesson 1: Terminal Server Setup and Deployment
Basics of Terminal Services
TS Features
Remote Desktop
How to Install TS
TS License Options
Preparing the Terminal Server
Installing Application on the TS
Demo - Installing Terminal Services
Demo - TS Licensing
Lesson 2: Working with Terminal Services
Configuration Console
RDP Connection Properties
More on the TS General Tab
Using Group Policy with TS
Demo - Terminal Services Manager
Module 02 Review
Module 03 - Working with a Terminal Services Infrastructure
Lesson 1: Using Terminal Server Clients
Working with the TS Client
RDP as a TS Client
Using GPO to Configure the Client
Using TS User Profiles
Setting Up User Connections
TSM Properties
Managing Connected Users
Common User Management Tasks
Working with Client Resources
Lesson 2: Introducing the Terminal Services Gateway
What is the TS Gateway?
Example Design of the TS Gateway
TS Gateway Installation and Initial Configuration
The Installation Options
Demo - Terminal Services Infrastructure
Lesson 3: Application Publishing, Using the TS RemoteApp
Using TS RemoteApp to Publish an Application
Advantages of Using RemoteApp
Hosting a RemoteApp on a Server
Using TS Web Access to Deploy a RemoteApp
Distributing RemoteApps with RDP
Using the Windows Installer and Remote Application for Distribution
Demo - RemoteApp
Demo - RDPFile
Module 03 Review
Module 04 - Storage and High-Availability
Lesson 1: Server Storage Options and Setup
Overview of Server Storage Options
Managing Storage
Using Diskmgmt.msc
Advanced Volume Features
Demo - Working with Disk Sets
Lesson 2: Server Clusters
High-Availability Options
More About Load Balancing
Installing and Configuring High-Availability
Demo - NLB
Module 04 Review
Module 05 - File and Email Services
Lesson 1: Working with FTP
Publishing Services
FTP Publishing Service
FTP Security
Other FTP Settings
Working with FTP 7
FTP 7 Configuration Files
FTP User Security
More on User Isolation
Securing Network Access to/from FTP
FTP Firewall
Site Settings
Logs - Unsung Hero of Security
Directory Browsing
Demo - Configuring FTP
Demo - Working with FTP
Lesson 2: Working with SMTP
The SMTP Feature
Working with SMTP Services
SMTP Server Settings
Securing SMTP
SMTP Messages Options
Delivery Properties
Management Permission
Using SMTP
Accessing Email with ASP.NET
Demo - Installing SMTP
Module 05 Review

Module 06 - Working with Web Applications
Lesson 1: Installing IIS
IIS Security
What’s New in IIS 7.0
IIS Components and Options
The Application Server Role on Windows 2008 Server
Features of the Application Role
The IIS 7.0 Role on Windows 2008 Server
IIS Default Role Services
Review of the Role Services
Installing the IIS Role
Post IIS Installation Notes
What is the WSRM
Demo - Installing IIS
Lesson 2: Configuring IIS
Management Tools for IIS
IIS Management Console
Working with Web Sites
Sites and Bindings
Your Default Site
New Web Sites
Limiting Sites
Site Logging
How Do Web Applications Fit Into IIS?
Application Pools
Virtual Directories
Working with the CLI
The appcmd
More Command Line Options
Working with the Web Server Config Files
Operations on Web Sites and Applications
Centralized Configuration
Migrating from IIS 6.0
Demo - Creating Web Sites
Demo - Backup IIS
Module 06 Review
Module 07 - Web Server Management & Security
Lesson 1: Working with IIS Security
What Accounts Were Created with IIS Installation?
File System Permissions
Working with IIS Administration Features
What are Request Handlers
Configuring Handlers
Handler Security
Handler Mappings
More Handler Security
Demo - Managing IIS Security
Demo - Managed Handler Mappings
Lesson 2: Securing Access to Web Services
Working with IIS Authentication
Types of Authentication
Authentication Requirements
Authentication Levels
URL Authorization Rules
Configuring Server Certificates
Getting the Certificate
Other Types of Certificates
Confirming the Certificate
Import and Export of Certificates
More Security Options
.NET Trust Levels
Implementing .NET Trust Levels
Demo - Securing Web Services
Demo - Configuring Server Certificates
Module 07 Review
Module 08 - Collaboration with WSS
Lesson 1: Working with Windows SharePoint Services
What is WSS?
WSS Deployment Options
WSS Access
Options for Deployment
Demo - Installing SharePoint
WSS Configuration Wizard
Confirming Proper WSS Installation
Accessing WSS via the Web Client
Administering WSS from the Web Browser
The Administration Page
Managing SharePoint
Demo - Working with SharePoint
WSS Security
E-mail Options
WSS Logging
Usage Analysis
WSS Job Management
Administration Automation
Disaster Recovery for WSS
Working with WSS Sites
Site Collection Options
Quota Options
Managing the Site Settings
Working with Web Applications
Web Application Settings
Web Application Security
Using Application Templates
Module 08 Review
Module 09 - Working with Windows Media
Lesson 1: Windows Media Services
How to Configure Windows Media Service
Management Tools for Windows Media
Working with Publishing Points
Add Publishing Point Wizard
Administration of Publishing Points
Monitoring Publishing Points
Publishing Point Source Settings
The Create Wrapper Wizard
The Announcement Wizard
Settings for the Publishing Point
Advertising Settings
Securing Windows Media Services
Cache/Proxy Features
Cache Settings
Proxy Settings
Monitoring Proxy/Cache Servers
Protecting Content
Demo - Installing Media Services
Demo - Making a Publishing Point
Module 09 Review
Course Closure

70-647: Windows Server Enterprise Administration

Chapter 01 - Planning for Active Directory
Lesson 1: Logical Design
The Forest
How Will AD DS be Used?
How Many Forests are Needed?
Forest Model
Requirements (Cont.)
The Domain Model
How Many Domains?
Upgrade or Create New Domains
The First Domain
Functional Levels
Domain Functional Level Features
Functional Levels (Cont.)
Forest Functional Level Features
Working with Trusts
Demo - Creating a New Forest
Demo - Creating a New Tree
Lesson 2: Physical Topology
Physical Networks
Review of Domain Controller Replication
Site Design Options
Site Replication Design
Site Links
Site Link Bridging
Site Replication Example
Domain Controller Placement
Printer Location Policies
Demo - Creating Sites and IP Subnets
Demo - Creating Site Link Bridges
Chapter 01 Review
Chapter 02 - Network Infrastructure
Lesson 1: DNS
DNS Considerations
DNS Record Types
Using DNS with Windows 2008 Server
The Stub Zone
DNS Options
Managing DNS
New DNS Features with Windows 2008 Server
Replacing WINS
IPv6 Support
Background Zone Loading
Designing the DNS Infrastructure
Choosing a Zone Type
Miscellaneous DNS Options
Demo - Exploring DNS
Demo - Creating GlobalNames Zone
Lesson 2: Planning IP Distribution
Introducing IPv6
Examples of IPv6 Abbreviation
Introducing IPv6 (Cont.)
The IPv6 Multicast
Advantages of IPv6
IPv4 to IPv6 Compatibility
Transitioning to IPv6
IPv6 Tools
Configure IPv6
Verifying IPv6
Designing an IPv6 Network
Demo - Configuring IPv6
Demo - Testing IPv6
Chapter 02 Review
Chapter 03 - Advanced Active Directory Issues
Lesson 1: Migration Strategies
Planning and Preparing to Move to Windows 2008 Server
Domain Upgrade
Preparing for the Upgrade
Domain Restructure
Upgrade then Restructure
Cross Forest Trust
Demo - Raising Domain Functional Level
Lesson 2: Working with Other Forests
One Solution: AD FS
What is AD FS?
AD FS Roles
AD FS Example
MS Identity Lifecycle Manager 2007 FP1
Working with UNIX
Imitating UNIX
Migration of UNIX NIS to Windows NIS
Imitating UNIX Continued
Working with NFS
Chapter 03 Review
Chapter 04 - Active Directory Administration
Lesson 1: Active Directory Administration
Delegation of Control
Delegating Active Directory
Data Management
Service Management
Scope of Delegated Administration
Administration Models
Using Groups for Delegation
Management Roles
Service Management (Cont.)
Data Roles
Types of Trusts
Delegation of Data Management
Starter GPOs
Group Policy Modeling
Auditing AD DS
AD Auditing
Looking at the Organizational Structure
Demo - Delegation of Control
Demo - AD Auditing
Lesson 2: Using Group Policies
Understanding the Group Policy Infrastructure
Guidelines for Planning GPOs
GPOs and Active Directory
Understanding Domains
Domain Services Store
Controlling Hardware Installation with GPOs
Which GPO Settings Control Hardware Installation?
Stronger Authentication
Fine-Grained Password Policies
How to Use PSOs
Demo - Creating PSO
Chapter 04 Review
Chapter 05 - Deploying Windows 2008 to the Small/Medium Office
Lesson 1: Small/Medium Office
Services Needed in the Small/Medium Office
The DSMGMT Service
Components Often Needed in the ROBO
Optional Components Used for the ROBO
More on the Server Core
Should You Install a Domain Controller?
Other DC Options
Services to Consider at the ROBO
Communication Options
WAN Connections
Securing Traffic
Tunnel Diagram Example
Lesson 2: Small/Medium Server Security
Overview of Security
Security Training
Security at the Branch
Server Hardening
Secure Options for the ROBO
RODC Password Replication Policy
RODC Operation
Securing Data
Demo - Creating an RODC
Demo - Using SCW
Chapter 05 Review
Chapter 06 - Using Remote Desktop Services and Application Setup
Lesson 1: Planning for Remote Desktop Services
Planning and Deploying Remote Desktop Services
RDS Components
Demo - Installing Remote Desktop Services
Lesson 2: License Server
Types of Licenses
Maintaining the License Server
License Server Deployment
Lesson 3: Deploying Applications
RDS Web Access
RemoteApp Deployment
RDS Load Balancing
Planning RDS Gateway Servers
RDS Gateway Server Connection
Using GPO to Deploy Applications
Publishing Software
Assigning Software with GPOs
Installing Software by GPO
Deploying Software with SC Essentials
SCCM 2007
SCCM 2007 Architecture
SCCM 2007 Client
SCCM 2007 Application Deployment
Demo - Accessing RDS Web Access
Chapter 06 Review

Chapter 07 - Securing the Network
Lesson 1: Designing a Secure Perimeter
Designing the Perimeter
The Border Network
Perimeter Network
Internal Network
Perimeter Firewall
Firewall Options
ISA Server
ISA Server Deployment
What Else Can Be Found in the Perimeter?
Web Servers in the Perimeter
Setting Up Remote Access
VPN Tunneling Protocols
Authenticating Connections
Securing VPN Servers
Authentication using RADIUS
Microsoft RADIUS
RADIUS Security
RADIUS Proxy Options
Lesson 2: Introducing NAP
Network Access Protection
Where Do You Find NAP?
NAP Considerations
NAP Provides Another Layer of Security With IPSec
Disadvantages of NAP
NAP IPSec Enforcement
More NAP Component Needs
NAP VPN Enforcement
802.1X NAP Enforcement
802.1X Enforcement
DHCP/NAP Considerations
NAP Illustrated
Lesson 3: Domain and Server Isolation
Domain Isolation
Comparing Server and Domain Isolation
Chapter 07 Review
Chapter 08 - Supporting PKI
Lesson 1: What is PKI?
Applications Use of PKI
Certificate Use Illustration
Who is Issued a Certificate
PKI Security
Security Policies
Business Requirements
External Needs
AD Needs
Lesson 2: The CA Hierarchy
The CA Infrastructure
CA Hierarchy Illustration
When to Use an Internal CA
When to Use an External CA
Enterprise vs. Standalone
How Many CAs are Needed
Demo - Installing CA
Lesson 3: Managing Certificates
Enrollment Methods
Enrollment Policies
Improving Control over Certificate Issuance
Automatic vs. Manual Certificate Approval
How to Do Enrollment
Certificate Renewal Strategies
Certificate Revocation Policy
Issues with CRLs
Publication Points
Demo - Working with Certificates
Chapter 08 Review
Chapter 09 - Virtualization Solutions
Lesson 1: Using Virtualization
Benefits to Virtualization
Virtualization Solutions
Choosing What to Virtualize
Managing Virtualized Servers
What Can Be Virtualized
Migrating P2V
The Power of SCVMM
SCVMM Components
SCVMM Illustrated
Managing VMs at the Branch Office
Demo - Working With Hyper-V
Demo - Creating a Virtual Windows 2008 Server
Lesson 2: Planning Virtualization for Applications
Microsoft SoftGrid
When Should You Use SoftGrid
Designing Application Virtualization
Branch Office Deployments
Chapter 09 Review
Chapter 10 - Windows Updates
Lesson 1: WSUS
The Windows Server Update Services Infrastructure
Consider WSUS
Managing WSUS
WSUS Design
WSUS Administration
Update Deployment
WSUS Hierarchy Illustrated
Policies for Updates
Planning Automatic Approvals
SC Essentials
SCCM 2007
Demo - Installing WSUS
Demo - Exploring WSUS
Lesson 2: Software Update Compliance
WSUS Reports
SCCM 2007 Compliance and Reporting
Best Practices of Role Based Security Policies
Demo - Using MBSA
Chapter 10 Review
Chapter 11 - Making Data Secure and Available
Lesson 1: Sharing and Collaborating Your Data
Advanced DFS
DFS Replication, Settings, and Features
DFS Design Checklist
WSS Feature Set
WSS Deployment
MOSS 2007
Demo - Installing WSS
Demo - Exploring WSS
Lesson 2: Protecting Data at Rest
BitLocker Authentication
BitLocker Design Thoughts
EFS Best Practices
Using RMS
RMS Policy Elements
RMS Illustrated
Demo - Using EFS
Lesson 3: System Recoverability and Availability
AD DS Backup
AD DS Backup Utilities
AD DS Recovery
Authoritative Restore
Authoritative Restore Illustrated
AD DS Service
Working with FSMOs
NLB Illustrated
Failover Clustering
Cluster Prerequisites
Demo - AD DS Backup
Chapter 11 Review
Course Closure

70-680: Microsoft Windows 7, Configuring

Chapter 01 - Basic Windows 7 Installation
Lesson: Installation Options
New Features of Windows 7
Minimum Hardware Requirements
Why Use 64-bit Windows 7
Installation Options
Windows 7 Offerings
Lesson: Choosing To Do the Clean Install
Discussion: Considerations for a Clean Installation
Discussion: Common Installation Errors
Ways To Do A Clean Installation
Demo - Configuring the Computer Name and Domain/Workgroup Settings
Chapter 01 Review
Chapter 02 - Advanced Windows 7 Installation
Lesson: Performing an Image Installation
What is Windows Imaging File Format?
Which Tools You Can Use
The Process for Image-Based Installation
Using SysPrep
Capturing and Applying the Installation Image by Using ImageX
Migrating User Data and Settings by Using USMT 4.0
Configuring VHDs
Lesson: Doing an Upgrade or Migration to Windows 7
How to Choose Migration or Upgrade
Upgrade Paths
Determining the Feasibility of an Upgrade Using Windows Upgrade Advisor
Steps to Upgrade to Windows 7
Ways to Migrate User Data and Settings
Steps to Migrate to Windows 7
Migrating User Settings and Data by Using WET
Lesson: Planning for Application Compatibility
Common Compatibility Problems
Common Mitigation Methods
Updating Shims
Chapter 02 Review
Chapter 03 - Understanding Disk Types and File Systems
Lesson: Windows 7 Disk Types and Formats
The MBR Disk
The GPT Disk
Tools for Disk Management
Demo - Converting an MBR Partition to a GPT Partition
Lesson: Managing Hard Drives with Volumes
A Simple Volume
Demo - Creating a Simple Volume
What are Spanned and Striped Volumes?
Demo - Creating Spanned Volumes
Demo - Creating Striped Volumes
Why Would you Resize a Volume?
Demo - Resizing a Volume
Lesson: Hard Drive Maintenance
Disk Fragmentation
How to Defragment a Disk
Disk Quotas
Demo - Configuring Disk Quotas
Chapter 03 Review
Chapter 04 - Network Configuration
Lesson: IP Addressing
Understanding the IPv4 Address
Understanding the Subnet Mask
Public and Private Address Space
Why the Default Gateway
Demo - Configuring an IPv4 Address
Types of Computer Names
Methods for Resolving Computer Names
Why IPv6
Windows 7 Support for IPv6
Understanding the IPv6 Address Space
Types of IPv6 Address Scopes
Demo - Configuring an IPv6 Address
Lesson: Auto IP Configuration
Auto Configuration of IPv4 Settings
Auto Configuration of IPv6 Settings
Demo - Configuring a Computer to Obtain an IPv4 Address Dynamically
Troubleshooting Client-Side DHCP Issues
Lesson: Troubleshooting Networking
Troubleshooting Tools
Troubleshooting Methodology
Demo - How to Troubleshoot Network-Related Problems
Lesson: Introducing Wireless Networks
Describing a Wireless Network
Technologies Used in WiFi
How Do You Secure WiFi?
Lesson: Connecting Windows 7 to the Wireless Network
Configuring the Hardware
Wireless Network Settings
How to Improve WiFi Signal Strength
Troubleshooting WiFi Connections
Chapter 04 Review
Chapter 05 - Sharing Files, Folders, and Printers
Lesson: Planning for Authentication and Authorization
Understanding Authentication and Authorization
The Process of Authentication and Authorization
New Authentication Features
Lesson: Securing File Access
NTFS Permission
Permission Inheritance
Demo - Configuring NTFS Permissions for Files and Folders
How Permissions May Change with File Copy or Moving
What are Effective Permissions?
Discussion: Determining Effective Permissions
Lesson: Compressing Files
What is NTFS File Compression?
How Compression Settings are Affected with File Move or Copy
Zipped Folders
Demo - Compressing Files and Folders
Lesson: Sharing Folders and Printers
What are Shared Folders?
Ways to Share Folders
Discussion: Combining NTFS and Share Permissions
Using the Network and Sharing Center
Managing Printing
Printing Components in Windows 7
Demo - Installing and Sharing a Printer
Location-Aware Printing
Client-Side Printing
Chapter 05 Review
Chapter 06 - Working with Windows 7 Client Performance
Lesson: Installing and Configuring Device Drivers
Overview of Device Drivers
How to Install Devices and Drivers
Tools for Device Driver Management
Methods for Updating Drivers
Managing Signed Drivers
Discussion: Options for Recovering from a Driver Problem
Demo - Managing Drivers by Using Device Manager
Lesson: Windows 7 Performance Monitoring Tools
Discussion: What Are Performance and Reliability Problems?
Tools to Gather Performance Information
Monitoring Performance and Using Data Collector Sets
Demo - Using the Resource Monitor
Demo - Analyzing System Performance by Using Data Collector Sets and Performance Monitor
How Performance Monitor Can Help You
Lesson: Monitoring Reliability of Windows 7
How WDT Can Help You Solve Problems
Windows Network Diagnostics Tools
Windows Startup and Recovery
Introducing the Windows Memory Diagnostics Tool
Looking at the Reliability Monitor and Problems Reports and Solutions Tool
Chapter 06 Review
Chapter 07 - Basic Desktop Security
Lesson: Discussion of Security Management in Windows 7
New Security Features in Windows 7
Introducing the New Action Center
Demo - Configuring Action Center Settings
Lesson: Using Windows Defender
Watch Out for Malware
What is Windows Defender?
How Windows Defender Can Help You
Demo - Configuring Windows Defender Settings
Lesson: How does UAC Work?
Revisiting UAC
Improvements to How UAC Works
Demo - Configuring Group Policy
Getting Your Notifications
Lesson: Using Windows Firewall
Discussion: What is a Firewall?
Basic Firewall Settings
Advanced Security Options
Know Your "Well-Known" Ports
Demo - Configuring Inbound, Outbound, and Connection Security Rules
Chapter 07 Review
Chapter 08 - Advanced Desktop Security
Lesson: Using Local Policies to Secure Windows 7
Introducing Group Policies
How GPOs are Applied
Order of Operations for Multiple Policies
Demo - Creating Multiple Local Group Policies
Demo - Configuring Local Security Policy Settings
Lesson: How EFS and BitLocker Secure Your Data
Demo - Encrypting and Decrypting Files and Folders by Using EFS
Introducing BitLocker
BitLocker Requirements
BitLocker Modes
Setting BitLocker Options with Group Policies
Configuring BitLocker
Configuring BitLocker To Go
Recovering BitLocker Encrypted Drives
Lesson: Security With Application Restrictions
Introducing AppLocker
AppLocker Rules
Demo - Configuring AppLocker
What are Software Restriction Policies?
Lesson: IE Version 8 Privacy Features
Discussion: Compatibility Features in Internet Explorer 8
Internet Explorer 8's Enhanced Privacy Features
Using the SmartScreen Feature in Internet Explorer 8
Other Security Features in Internet Explorer 8
Demo - Configuring Security in Internet Explorer 8
Chapter 08 Review
Chapter 09 - Disaster Recovery & Prevention
Lesson: Backing Up and Restore Options with Windows 7
Discussion: Why Do Backups?
Introducing the Backup and Restore Tool
Demo - Perform a Backup
Lesson: How System Restore Works
Using Previous File Versions
Configuring System Protection Settings
Demo - Restore a System
Lesson: Using the Windows Update
What is Windows Update?
Using Windows Update Settings
Windows Updates with GPOs
Chapter 09 Review
Chapter 10 - Remote Access Options
Lesson: Configuring Windows 7 for Mobility
Discussion: What Devices Would be Considered Mobile?
Settings to Configure on Mobile Computers
What is a Sync Partnerships?
Managing Power Options in Windows 7
Demo - How to Configure a Power Plan
Lesson: Remote Access Solutions
Introducing Remote Desktop and Remote Assistance
Setting Up Remote Desktop
Understanding VPN Connections
How to Make a VPN
What is DirectAccess?
How DirectAccess Works
Requirements for Setting Up DirectAccess
What is BranchCache?
How BranchCache Works
Requirements for Setting Up BranchCache
Demo - Configuring BranchCache on a Windows 7 Client Computer
Chapter 10 Review
Chapter 11 - Introducing Windows PowerShell 2.0
Lesson: What is Windows PowerShell 2.0?
Overview of Windows PowerShell
Improvements in Windows PowerShell 2.0
Using cmdlets in Windows PowerShell 2.0
Understanding Windows PowerShell Eventing
Introducing the Windows PowerShell 2.0 Integrated Scripting Environment (ISE)
Operating the Windows PowerShell ISE Editor
Lesson: Remoting With Windows PowerShell 2.0
Overview of Windows PowerShell Remoting
How to Connect to a Remote Computer
Processing of Remote Commands
Issuing Remote Commands
Lesson: Configuring Group Policy with PowerShell 2.0
PowerShell 2.0 Has New cmdlets for Group Policy Administration
Requirements for Group Policy
Chapter 11 Review
Course Closure

Related Products

70-680 Real LIVE Practice-Labs: Windows 7, Configuring
List Price: $295.00
Sale Price: $195.00
70-680 Real LIVE Practice-Labs: Windows 7, Configuring
MCITP Training

Test drive our training for yourself!

Shopping Cart
Your cart is empty.

  • "It was great having an instructor who used to sit on the board of directors for PMI! He definitely knows his stuff and explains it in a detailed way."

  • - Sean W.
    Project Management Certification Training Bundle

  • "...Courses are excellent as exam prep materials..."

  • - Liza B.
    Project Management Certification Training Bundle

  • "...A great resource for the beginner and expert levels..."

  • - Corey S.
    CompTIA IT Certification Training Bundle

  • - Read More Here -