Microsoft MCITP Server Administrator Training - OnDemand Learning

MCITP Training
Sale Price: $895.00
Item Number: MS-MCITP-SA
Configuration: -online

* denotes required field

Media Content*
Untitled Document
Package Includes

MCITP : Server Administrator

Course Name
Printable Courseware
List Price
Configuring Windows Server 2008 Active Directory
Configuring Windows Server 2008 Network Infrastructure
Managing and Maintaining Windows Server 2008 Servers
Complete Training Totals:  
Retail Price
Sale Price
You Save $190

  • 12 Months Online Access, Featuring OnDemand Instructor-Led Classroom Sessions with Full Audio and Video Lectures
  • Software Video Demonstrations
  • Self-Assessment Module Review Quizzes
  • Printable Courseware
  • Certificate of Completion
  • Free 1 Year Upgrade Policy
  • Mobile Access via iPhones and iPads
MCITP Training

Kenneth Mayer - Certified CEH Trainer (CCSI, MCT, CCNP, CCDA)
Ken Mayer is a Microsoft Certified Trainer as well as a Certified Ethical Hacker Trainer and Security consultant. He started his career in computer technology in 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies across the United States and Western Europe. He has achieved the Certified Cisco Systems Instructor certification. The CCSI certification involved a two-day lab and observation event held on Cisco in Paris, France Facility. This gave Ken the accreditation to be able to deliver Cisco Authorized Courses as a CCSI. He has taught the full line of Cisco CCNA, CCDA, CCNP, CCDP and CCIP course curriculums, including Cisco's security appliances such as PIX and IDS.

Course Features:

70-640: Configuring Windows
Server 2008 Active Directory

Chapter 01 - Installing the Active Directory Role
Lesson 1: What is IDA?
What is Active Directory Identity and Access (IDA)
Five Components of the IDA Platform
What Windows 2008 Server Offers Beyond the IDA
Lesson 2: How to Install the AD DS Role
What are the Different Components?
Preparation Checklist for Creating a Windows Server 2008 Forest
How to Add the Directory Service Role
Demo - Creating a Windows Server 2008 Forest
Lesson 3: The New Windows 2008 Server Core
Understanding Server Core
Lesson 4: Installing AD DS Server Core
Installing Server Core
Demo - Installing a Server Core Domain Controller
Chapter 01 Review
Chapter 02 - Working With Active Directory Objects
Lesson 1: Working with the MMC
Understanding the MMC
How to Use the Microsoft Management Console (MMC)
Customize the MMC with Snap-ins
Learn How to Use the Alternate Login Credentials
Demo - Custom MMC
Lesson 2: Working with Objects in Active Directory
Creating an OU
Creating a User Object
Creating a Group Object
Lesson 3: How to Search Through Active Directory
How to Find Objects in Active Directory
Introducing LDAP
Demo - Using Active Directory
Lesson 4: Securing and Delegating AD Objects
Understanding Delegation
What are User Rights?
Using the Delegation of Control Wizard
Demo - Delegation
Lesson 5: Adding Computer Accounts to AD
Understanding Workgroups, Domains, and Trusts
Identifying Requirements for Joining a Computer to the Domain
Offline Domain Join
Lesson 6: Organizing AD with Container Objects
Understanding Containers
Creating OUs for Computers
Adding a Computer to the Domain
Restricting the Ability of Users to Create Computers
Demo - Joining the Domain
Lesson 7: Working With Computer Objects and Accounts
Configuring Computer Properties
Moving a Computer
Managing a Computer with the AD Users and Computers
Recognizing a Computer Account Problem
How to Reset a Computer Account
How to Rename a Computer
Ways to Disable/Enable Computer Accounts
How to Delete a Computer Account
Recycling the Computer Account
Demo - Recycling the Computer Account
Lesson 8: Automating Computer Account Creation
Importing Computers with CSVDE
Importing Computers with LDIFDE
Creating Computers with DSadd
Creating Computers with Netdom
Windows PowerShell
Creating Computers with VBScript
Demo - Automating Computer Creation
Chapter 02 Review
Chapter 03 - Understanding GPOs
Lesson 1: Using Group Policy
Review of Group Policy
Lesson 2: What Are Group Policy Objects
Group Policy Objects
Policy Settings
Filtering Administrative Template Policy Settings
Demo - Group Policy
Lesson 3: Restricted Group Policies
Understanding Restricted Groups Policies
Demo - Restricted Groups
Lesson 4: Analyzing Security Settings
How to Configure the Local Security Policy
Using Security Templates and Deploying the GPOs
Analyzing the Security Configuration of a Computer
Creating Security Templates from the Results
Lesson 5: Using The Security Configuration Wizard
The Security Configuration Wizard
Security Policy
Demo - SCW
Lesson 6: Deploying Software with Group Policy
Understanding GP Software Installation
Windows Installer Programs
Preparing an SDP
Creating a Software Deployment GPO
Managing the Scope of Software Deployment GPO
Demo - Software Deployment
Lesson 7: Understanding Group Policy Scope
GPO Links
What is Inheritance and Precedence?
Security Filtering to Modify GPO Scope
WMI Filters
Enabling or Disabling GPOs and GPO Nodes
Lesson 8: How Group Policy Settings are Processed
Group Policy Processing
Group Policy Options
Demo - Group Policy Scope
Lesson 9: Verifying Group Policy Settings
Resultant Set of Policy
GP Results Wizard
Group Policy Modeling Wizard
Demo - Verifying Group Policy
Lesson 10: Enabling Auditing
Audit Policy
How to Audit Access to Files and Folders
Global Access Auditing
“Reason for Access” Reporting
Enabling the Audit Policy
Demo - Auditing
Chapter 03 Review
Chapter 04 - Managing Users and Groups with AD
Lesson 1: Automating User Account Creation
Automating the Creation of User Accounts with Templates
Introduction to the Active Directory Command-Line Tools
Demo - Automating User Accounts
Lesson 2: Working with User Attributes
How to Manage User Attributes
Understanding the Name and Other User Attributes
Account Properties
Managing User Attributes without the GUI
Lesson 3: User Account Administrative Tasks
Administrative Tasks
Protected Admin
Demo - Supporting User Accounts
Lesson 4: Using PowerShell to Create User Accounts
What is Windows PowerShell?
Key Elements of PowerShell
User Creation with PowerShell
PowerShell Scripting
Demo - Creating Users with PowerShell
Lesson 5: Group Creation and Management
Managing Your Enterprise with Groups
Defining Group Naming Conventions
Lesson 6: The Basics of Groups
Understanding Groups
What’s a Group Scope?
Allowed Group Scope Conversions
Managing Group Membership
Using Groups for Permissions
AGDLP and AGGUDLP Illustrated
Local vs. Domain
Demo - Managing Groups
Lesson 7: Best Practices for Using AD Groups
Best Practices for Group Attributes
Default Windows Groups
Lesson 8: Automating Group Creation
Creating and Managing Groups
Managing Group Membership with Windows PowerShell and VBScript
Demo - Automating Creation of Groups
Lesson 9: Advanced Group Options
Protecting Groups from Accidental Deletion
Delegating the Management of Group Membership
What are Shadow Groups?
Special Groups
Demo - Administering Groups
Chapter 04 Review
Chapter 04 Review

Chapter 05 - Working With Domain Controllers
Lesson 1: Installation Options
Creating a New Forest
Creating a New Tree
Migrating a Domain
Deleting a Domain
Lesson 2: How to Install a Domain Controller
Installing a DC with the Windows GUI
Using Unattended Installation and Answer Files
Installation Options
Lesson 3: Introducing the Operations Masters
Single Master Operations
Forest Wide Roles
Domain-Wide Roles
Lesson 4: Designing Where to Deploy the Operation Masters
Where to Place These Operations Masters
Identifying the Operations Masters
Transferring Operations Master Roles
Seizing Operations Masters
How to Seize or Transfer Operation Master Roles
Extending the Schema
Demo - FSMO
Lesson 5: SYSVOL Replication with DFS
How to Raise the Domain Functional Level
Understanding the Migration Steps
Chapter 05 Review
Chapter 06 - Adding DNS
Lesson 1: DNS Basics
DNS and IPv6
Peer Name Resolution Protocol
Types of DNS Servers
Dynamic DNS
Secure Dynamic DNS (SDDNS)
The Split Brain Option
Lesson 2: DNS Definitions and Terms
Understanding DNS
DNS Terms
Types of Records
Windows Server DNS Features
Demo - DNS
Lesson 3: Setting up DNS for the Enterprise
Configuring DNS
Considerations for Security
Working with DNS Server Settings
Application Directory Partitions
Administering DNS Servers
Demo - Global Names
Chapter 06 Review
Chapter 07 - Securing the Authentication Process
Lesson 1: Password Security Policies
Understanding Password Policies
Understanding Password Settings Object
Demo - Passwords
Lesson 2: Introducing the Read-Only Domain Controller
RODC Options
Lesson 3: Installing the RODC
Deploying an RODC
Password Replication Policy
Lesson 4: Auditing Authentication Events
Account Logon Events
Configuring Authentication-Related Audit Polices
Demo - Account Logging
Chapter 07 Review
Chapter 08 - Monitoring and Supporting AD
Lesson 1: Preparing for Recovery
Important Concepts
Twelve Categories of AD DS Administration
Lesson 2: Active Directory Tools
Performing Online/Offline Maintenance
Offline Maintenance
Built-in Directory Protection Measures
Proactive Restores
Restarting in DSRM
Identifying the Backup Set
Other Options
Backup/Restore GPOs
Using the AD Recycle Bin
Lesson 3: Monitoring Active Directory Performance
Managing System Resources
Task Manager
Event Viewer
Server Manager
Demo - Performance Monitor
Chapter 08 Review
Chapter 09 - Planning Active Directory Deployment
Lesson 1: What Are Sites?
Understanding What a Site Is
Site Traffic
Planning Sites
Controlling Replication
Site Links
Bridgehead Server
Replication Scheduling
Replication Protocols
Forcing Intersite Replication
Summarizing Site Planning
Lesson 2: Deciding on Site Boundaries
Defining Sites
Managing Domain Controllers in Sites
Site Coverage
Demo - Sites and Subnets
Lesson 3: Working with Global Catalog Placement with AD Partitions
Reviewing AD Partitions
Understanding the Global Catalog
Placing GC Servers
What’s Found in the Global Catalog
Universal Group Membership Caching (UGMC)
Partial Attribute Set
Promoting a Domain Controller to a Global Catalog
Lesson 4: Controlling Replication Between Sites
Understanding AD Replication
Intersite Replication
Monitoring Replication
Lesson 5: Managing the Global Catalog
Configuring a Global Catalog
Understanding Application Directory Partitions
Lesson 6: Configuring AD Trust Relationships
Defining the Forest Infrastructure
Moving Objects
Migration Issues
Trust Relationships
Securing Trust Relationships
Demo - Trusts
Lesson 7: Choosing the Domain and Forest Functional Levels
Functional Levels
Domain Functional Levels
Forest Functional Levels
Chapter 09 Review
Chapter 10 - IDA Solutions
Lesson 1: Understanding AD FS
Understanding AD FS
Support of AD FS
The AD FS Process
Working with FS Designs
AD FS Components
Lesson 2: Installing AD FS
Installing AD FS
Lesson 3: Configuring and Using AD FS
Finalizing the Configuration of AD FS
Using and Managing AD FS
Lesson 4: Understanding AD RMS
Understanding AD RMS
New AD RMS Features
Basic Concepts
AD RMS Installation Scenarios
Preparing AD RMS Installation Prerequisites
Lesson 5: Installing AD RMS
AD RMS Considerations
Understanding AD RMS Certificates
Lesson 6: Configuring and Using AD RMS
Configuring AD RMS
Lesson 7: Understanding AD LDS
What is AD LDS?
Comparing LDS with DS
AD LDS Scenarios
Lesson 8: Installing AD LDS
Installing AD LDS
Demo - Installing AD LDS
Lesson 9: Configuring and Using AD LDS
Working with AD LDS Tools
Creating an LDS Instance
Other Options
Lesson 10: Security Review
Chapter 10 Review
Chapter 11 - Active Directory Certificate Services
Lesson 1: Understanding AD CS
Understanding AD CS
CA Options
Creating the CA Hierarchy
Some Best Practices
Additional Planning Requirements
Certificate Enrollment Types
Network Device Enrollment Service (NDES)
Configuring AutoEnrollment
Web Enrollment
Authentication Mechanism Assurance
Enrollment Agents
Deploying Multi-Forest Certificates
X.509 Certificate Mapping
AD CS Illustration
Lesson 2: Installing AD CS
Installing AD CS
Supported Deployments
Standalone Root & Subordinate
Enterprise Root & Subordinate
Lesson 3: Configuring and Using AD CS
Finalizing the Configuration of an Issuing CA
More about the CRL
Considerations for the Use and Management of AD CS
More on Certificate Templates
Types of Templates
Chapter 11 Review
Course Closure

70-642: Configuring Windows Server 2008 Network Infrastructure

Chapter 1 - Understanding and Configuring IP
Lesson: Introducing the OSI Model
Understanding the Network Layers
OSI Model
The Encapsulation Process
OSI vs TCP/IP Model
Lesson: How IPv4 Works
Ipv4 Address Structure
Why the Subnet Mask
How to Convert Binary to Decimal and Vice-Versa
Understanding What Routing and Default Gateways Are
Discussion of RFC 1918
Lesson: Increasing Networks with Subnetting
What is Subnetting
Demo - IP Addressing
Lesson: What's New with IPv6
Introducing IPv6
IPv6 Address Types
IPv6 Transition Technologies
Lesson: Configuring Windows with an IPv4 Address
Configuring Networking Properties for Vista and 2008 Server
Viewing Network Connections
Network Connection Components
Methods of Configuring and Verifying an IP Address
Troubleshooting Network Connectivity
Demo - Configuring IP
Demo - Testing Connectivity
Chapter 01 Review
Chapter 2 - Configuring IP Based Solutions
Lesson: Why Use a DHCP Server
What are DHCP Address Assignments?
Configuring the Address Leases
Understanding the DHCP Scope
Adding the DHCP Server Role
What is the DHCPv6 Stateless Role?
Demo - DHCP
Demo - DHCP Options
Lesson: Creating DHCP Servers for Your Network
Post-Installation Tasks
Other DHCP Options
DHCP on the Server Core
Lesson: How Windows Performs Name to IP Resolution
Name Resolution Methods in Windows
Broadcast Name Resolution
WINS Server Name Resolution
Lesson: Configuring Windows to Use DNS
Specifying DNS Servers
The Suffix Search List
How to Clear the Client’s Cache
Using Dynamic Update Settings
Demo - DNS Client
Lesson: How Does DNS Really Work
How a DNS Query Works
DNS Query Example
DNS Query Illustrated
How Caching Works
Demo - Name Resolution
Lesson: Deploying DNS Servers
DNS on DC Deployment
Using Server-Core for DNS Services
Making a Stand-Alone or Member-Server DNS
Configuring a Caching-only DNS Server
Configuring Server Properties
Demo - Configuring DNS
Lesson: DNS Configurable Options
Integrating WINS records into DNS
Aging and Scavenging
Demo - Global Names Zone
Lesson: Managing Different Types of DNS Zones
How to Create Zones
The Scope of AD Zone Replication
Creating and Using the Forward and/or Reverse Lookup Zone
Using Dynamic Updates
Exploring the Built-in Resource Records
Lesson: Configuring Zone Replication and Transfers
Configure a Zone Replication Scope for Active Directory
Choosing Zone Replication Scope
Creating Custom Application Directory Partitions
Zone Transfers
Implementing Stub Zones
Demo - Secondary Zone
Chapter 02 Review
Chapter 3 - Understanding IP Routing
Lesson: Routing Explained
Routing Overview
Routing Process
Tools Used to Verify Routing
Lesson: Router Communication Protocols
Routing Protocols
Routing and Remote Access
Demo - IP Routing
Demo - Routing Protocols
Chapter 03 Review
Chapter 4 - Connecting Windows to the LAN
Lesson: NAT Explained
NAT Concepts
Windows 2008 NAT Options
Lesson: Making NAT Work
Configuring ICS
Configuring NAT using RRAS
Troubleshooting NAT
Lesson: Remote Access to Other Networks
Remote Access Overview
Configuring VPN Connections
Configuring Dial-Up Server
Configuring the VPN Server
Other Options
Testing Connectivity
Demo - VPN Connections
Lesson: WiFi Basics
Wireless Networking Concepts
Wireless Networking Standards
Wireless Security Standards
Wireless Infrastructure
Authenticating Wireless with Windows Server 2008
Connecting to Wireless Networks
Best Practices
Demo - Wireless Network
Demo - Wireless Group Policy
Chapter 04 Review

Chapter 5 - Securing the Client, Network, and Communications
Lesson: Communication Security: IPSec
Explaining IPSec
IPSec Policies
Understanding Connection Security Rules
Security Associations
How IPSec Establishes Connections
What Authentication Methods can be used with IPSec
Lesson: Enforcing IPSec with Policies
Looking at the Predefined IPSec Policies
Using the IPSec Security Rule Wizard
Using the Connection Security Rule Wizard
Demo - IPSec
Lesson: Network Security with NAP
Concepts of NAP
System Health Agents and Validators
The NAP Process
Planning NAP Deployment
Installing and Configuring NAP
Lesson: Client Security with Windows Firewall
Why are Firewalls Important?
Outbound Filtering
Inbound Filtering
Firewall Scope
Using Group Policies
Authorizing Connections
Demo - Windows Firewall Inbound
Demo - Windows Firewall Outbound
Lesson: Other Security Solutions
Other Configurations
IPSec Rules
802.1x Configuration
Configuring DHCP
Configuring NAP Components
Configuring SHVs
Configuring Network Policies
Demo - Install NAP
Demo - NPS
Demo - SHV
Demo - Health Policy
Chapter 05 Review
Chapter 6 - Managing Files
Lesson: Working with File Security
NTFS Files Permissions
NTFS Permissions
Methods of Securing Files
Lesson: Server Role - File Services
The File Services Server Role
Using Quotas
Configuring Quotas
Lesson: Using DFS
Sharing Folders
DFS Overview
Installing DFS
Demo - DFS
Lesson: Using EFS
How to Encrypt a File/Folder
Sharing Encrypted Files
Configuring EFS Using GPS
Demo - File Security
Demo - EFS
Lesson: Performing a Backup and Restore
Shadow Copies
Managing Shadow Copies
Windows Server Backup
Demo - Back Up
Chapter 06 Review
Chapter 7 - Monitoring Systems
Lesson: How to Install and Use Network Monitor
Installing Network Monitor
Analyze Network Data
Demo - Network Monitor
Lesson: Windows Performance and Reliability Monitoring
Performance Monitor
Reliability Monitor
Built-In Data Collector Sets
Demo - WRPM
Lesson: Looking at Event Logs
Event Forwarding Concepts
Lesson: Configuring Event Forwarding
How to Configure Event Forwarding
Configuring the Collecting Computer
Creating a Subscription
Configure Event Forwarding to use HTTPS
Demo - Monitoring Events
Chapter 07 Review
Chapter 8 - Managing Printers
Lesson: Server Role: Print Services
Installing the Print Services Server Role
Installing Printers
Lesson: How to Share Printers
Sharing Printers
Printer Pooling
Printer Priority
Managing Internet Printing
Generating Notifications
Migrating Printers
Managing Printers with the CLI
Demo - Managing Printers
Demo - Web Printing
Chapter 08 Review
Chapter 9 - Securing Windows Through Updates
Lesson: What is Windows Server Update Services
WSUS Overview
WSUS Architecture
WSUS Minimum Requirements
Lesson: Planning & Deploying the WSUS Installation
Planning for the WSUS Installation
Auditing Updates
Demo - Install WSUS
Lesson: Using Windows Server Update Services
How to Troubleshoot Update Problems
How to Remove Updates
Chapter 09 Review
Course Closure

70-646: Managing and Maintaining Windows Server 2008 Servers

Chapter 01 - Preparing for Windows 2008 Installation
Lesson: Overview of Windows Server 2008 Deployment
Business Needs
Consolidation Benefits with Server 2008
High Availability
64-bit Systems Options
Virtualization Options
Any Issues With Compatibility
Lesson: Making a Deployment Plan for Windows 2008 Server
Document and study the Current Network Environment
Designing Server Deployments
Maintenance and Deployment Schedules
Lesson: Planning Migration
Creating a Migration Plan
Using the Upgrade Plan
What Can Delay Your Windows 2008 Server Installation?
Chapter 01 Review
Chapter 02 - Configuration Change Plan
Lesson: Developing a Change Control Process
How Does the Change Control Process Work?
Create a Communication Plan
Classifying Change Requests
Approving the Change
The Emergency Change
Lesson: Developing Configuration Changes
Overview of Developing Configuration Changes
Analyzing the Change
The Testing Process
Have a Backup Plan - Rollback
Lesson: Reviewing Configuration Changes
Testing the Success of a Change
Analyzing the Success of a Change
Documentation Update
Chapter 02 Review
Chapter 03 - Preparing for Server 2008 Migration
Lesson: Server Migration
Making a Windows 2008 Server Deployment Plan
How Virtualization Helps
Planning for a Rollback
Migrating Data And Services
Lesson: How to Plan for the Server Decommissioning Process
Considerations for Decommissioning a Server
Lesson: Planning an Example of Commissioning a Windows Server 2008 File Server
Server Deployment Tools
Planning According to Policy
Migrating File Servers
Demo - Installation Part A
Demo - Installation Part B
Chapter 03 Review
Chapter 04A - Server Migration and Planning for Roles
Lesson: Planning for Windows Server 2008 Hardware
How Windows Server 2008 Uses Process and Memory Resources
How to Choose either 32-Bit or 64-Bit Hardware
Guidelines for Combining Server Roles
Hardware Redundancy
Lesson: Planning for Windows Server 2008 Core
Why the Server Core?
Hardware Requirements for Windows Server 2008 Server Core
Demo - Role Consolidation
Demo - File Resource Manager
Lesson: Combining Windows Server 2008 Server Roles
What are Server Roles
Performance Implications of Combining Server Roles
Recommendations for Combining Servers
Options for Maintaining High Availability
Lesson: Planning for Windows Server 2008 File Servers
File Storage in Windows Server 2008
Recommendations for File Storage
High-Availability File Servers
Clustering Options for File Servers
Chapter 04B - Server Migration and Planning for Roles
Lesson: Understanding Application Server Role Requirements
What Scenarios Require the Application Server Role
Preparing for Installation of the Application Server Role
Supporting Technologies for Applications
Lesson: Overview of the Application Server Role Components
Windows Workflow Foundation
Windows Presentation Foundation
Windows Communication Foundation
Lesson: Supporting the .NET Framework
How the .NET Framework is Used
.NET Versions
Chapter 04 Review
Chapter 05 - Distributed File System
Lesson: What's Required for DFS
Needed Services for DFS
DFS Architecture
Lesson: Planning for High Availability in DFS
DFS Namespaces
DFS Replication
Data Storage
Comparing Domain and Stand-Alone DFS
Lesson: Managing DFS
DFS Management Tools
Delegating DFS Administration
Demo - DFS
Chapter 05 Review
Chapter 06 - Windows Server 2008 High Availability
Lesson: Network Load Balancing
Features of Network Load Balancing
Changes in Network Load Balancing for Windows Server 2008
Troubleshooting Network Load Balancing
Lesson: Understanding Failover Clustering in Windows Server 2008
Features of Clustering in Windows Server 2008
Failover Clustering Enhancements in Windows Server 2008
Validating a Failover Clustering Solution in Windows Server 2008
Tools to Manage Failover Clustering in Windows Server 2008
Lesson: Creating Clusters in Windows Server 2008
Hardware Requirements for Failover Clustering
Planning Failover Clusters in Windows Server 2008
Managing Failover Clustering in Windows Server 2008
Chapter 06 Review
Chapter 07 - Monitoring Windows Server
Lesson: Setting Up Monitoring
Why Should You Monitor
Monitoring Options
Planning for Event Monitoring
Lesson: Measuring Performance Objects
Server Role Metrics
Key Performance Counters
Lesson: Calculating a Server Baseline
Key Hardware Components to Monitor
Common Performance Metrics
Analyzing Performance Trends
Planning for Future Capacity Requirements
Lesson: Which Monitoring Tools to Use
Windows Server 2008 Monitoring Tools
Reliability and Performance Monitor
Windows Performance Monitor
Third-Party Monitoring Tools
Lesson: Planning Notification Methods
What is Good for the Business
How Can I Be Notified?
When to Escalate
Demo - WRPM
Chapter 07 Review
Chapter 08 - Windows Server Security
Lesson: Designing a Multi-Layer Defense
Multi-Layer Defense Strategy
What Defense Layers Should Be Considered?
Lesson: Network-Based Security for Windows Server 2008
Network Security Terms
Options for Network Security
Recommendations for Implementing Windows Server 2008 Server Core
Demo - Security
Demo - Server Core Introduction
Lesson: Host-Based Security for Windows Server 2008
Assigning Administrative Permissions
Windows Server 2008 Firewall Configuration
Security Templates
Converting Security Configuration Wizard Settings to Security Templates
Chapter 08 Review
Chapter 09 - Windows Server Backup and Restore
Lesson: Backup Strategies with Windows Server 2008
Selecting Backup Software and Backup Operators
Planning Backup in Windows Server 2008
Backup Scheduling
Making the Data Rentention Plan
Backing Up Encrypted Files and Virtual Machines
Factors Affecting Backup Policy
Storage and Security Considerations
Process for Selecting Backup Operators
Demo - Backup
Lesson: Planning a Server Restore Policy
Server Restore
Challenges of a Server Restore
Backup Plan Options
Change Management Considerations
Lesson: Verifying Restored Data
Restore Logs
Accessing Data After Restore
Security Analysis
Updating Backup Policy
Lesson: Planning an EFS Restore Policy
Planning for Restoring EFS Data
Requirements for EFS Recovery
Chapter 09 Review
Chapter 10 - Windows Server Maintenance Plan
Lesson: Planning for Security Update Management
WSUS Deployment Considerations
WSUS Group Policy Settings
Obtaining Updates
Server Core Security Updates
Demo - Management Tasks
Lesson: Basic Windows Server 2008 Management Tasks
Windows Server 2008 Management Tasks
Tasks Most Servers Share
Frequency of Management Tasks
Lesson: Automating Windows Server 2008 Maintenance
Automation Requirements
Task Automation Tools
Tool Selection Process
Chapter 10 Review
Chapter 11 - Planning for Business Continuity
Lesson: Planning for Business Continuity
Software Failure and the BIA
How Much of an Impact from Software Failure
Tracking Service Level Agreements
Creating Change Management Procedures
Typical Stages in a Troubleshooting Methodology
Lesson: Reviewing Core Operating System Components
Identifying Core Operating System Components
Identifying Additional Roles and Services
Server Applications
Lesson: Reviewing Log Files
Monitoring Log Files by Using Event Viewer
Monitoring Application Logs
Lesson: Evaluating Security Issues
Troubleshooting Group Policy Security Settings
Defense-in-Depth Components
Identifying Faults
Chapter 11 Review
Chapter 12 - Windows Server Troubleshooting
Lesson: Discovering Hardware Support Issues
Tools Used for Troubleshooting
Evaluating Hardware Devices
Lesson: Handling Device Driver Failures
Determining Drivers in Use
When to Escalate
Replacing Drivers
Lesson: Handling Hardware Component Failures
Documenting Vulnerable Hardware Components
Replacing Devices
Lesson: Determining the Scale of Network Issues
Business Impact of Network Failure
Scale of Failure
Service Level Agreements
Change Management Procedures
Interaction with Other Teams
Lesson: Name Resolution in Windows Server 2008
Domain Name System
Link-Local Multicast Name Resolution
Legacy Protocols
Lesson: Fixing IP Connectivity Issues
Which Versions of IP Are Being Used?
Resolving Logical Addressing Problems
Chapter 12 Review
Course Closure

Related Products

MCITP Training

Test drive our training for yourself!

Shopping Cart
Your cart is empty.

  • "It was great having an instructor who used to sit on the board of directors for PMI! He definitely knows his stuff and explains it in a detailed way."

  • - Sean W.
    Project Management Certification Training Bundle

  • "...Courses are excellent as exam prep materials..."

  • - Liza B.
    Project Management Certification Training Bundle

  • "...A great resource for the beginner and expert levels..."

  • - Corey S.
    CompTIA IT Certification Training Bundle

  • - Read More Here -