need to fill in this title

Overview

Content

Prerequisite

Objective

Could use a title

Overview

Content

Prerequisite

Objective

Career Reskilling title

Overview

Content

Prerequisite

Objective

Process Improvement

Overview

Content

Prerequisite

Objective

Effective Interpersonal Communicaiton for Business Professionals

Overview

Content

Lesson 1: Interacting with Others Topic A: Understand the Communication Process Topic B: Apply Core Communication Skills Topic C: Observe Nonverbal Communication Lesson 2: Building Positive Relationships Topic A: Create Connection Topic B: Adapt Appropriately to Different Communication Styles Topic C: Accommodate Diversity Lesson 3: Considering Organizational Communication Systems Topic A: Analyze Organizational Culture Topic B: Ensure Communication Flows Effectively Lesson 4: Communicating with Peers Topic A: Interact Effectively with Peers Topic B: Work Productively in a Group Topic C: Engage in Productive Meetings Topic D: Lead a Team Lesson 5: Communicating with Supervisors Topic A: Communicate with Different Supervisor Styles Topic B: Discuss Important Topics with Your Supervisor Lesson 6: Communicating with External People Topic A: Interact Effectively with Customers Topic B: Work Productively with Vendors Lesson 7: Communicating During Conflict and Change Topic A: Communicate Through Conflict Topic B: Communicate Through Change

Prerequisite

Lesson 1: Interacting with Others Topic A: Understand the Communication Process Topic B: Apply Core Communication Skills Topic C: Observe Nonverbal Communication Lesson 2: Building Positive Relationships Topic A: Create Connection Topic B: Adapt Appropriately to Different Communication Styles Topic C: Accommodate Diversity Lesson 3: Considering Organizational Communication Systems Topic A: Analyze Organizational Culture Topic B: Ensure Communication Flows Effectively Lesson 4: Communicating with Peers Topic A: Interact Effectively with Peers Topic B: Work Productively in a Group Topic C: Engage in Productive Meetings Topic D: Lead a Team Lesson 5: Communicating with Supervisors Topic A: Communicate with Different Supervisor Styles Topic B: Discuss Important Topics with Your Supervisor Lesson 6: Communicating with External People Topic A: Interact Effectively with Customers Topic B: Work Productively with Vendors Lesson 7: Communicating During Conflict and Change Topic A: Communicate Through Conflict Topic B: Communicate Through Change

Objective

Lesson 1: Interacting with Others Topic A: Understand the Communication Process Topic B: Apply Core Communication Skills Topic C: Observe Nonverbal Communication Lesson 2: Building Positive Relationships Topic A: Create Connection Topic B: Adapt Appropriately to Different Communication Styles Topic C: Accommodate Diversity Lesson 3: Considering Organizational Communication Systems Topic A: Analyze Organizational Culture Topic B: Ensure Communication Flows Effectively Lesson 4: Communicating with Peers Topic A: Interact Effectively with Peers Topic B: Work Productively in a Group Topic C: Engage in Productive Meetings Topic D: Lead a Team Lesson 5: Communicating with Supervisors Topic A: Communicate with Different Supervisor Styles Topic B: Discuss Important Topics with Your Supervisor Lesson 6: Communicating with External People Topic A: Interact Effectively with Customers Topic B: Work Productively with Vendors Lesson 7: Communicating During Conflict and Change Topic A: Communicate Through Conflict Topic B: Communicate Through Change

Managing Innovation and Creativity

Overview

Content

Prerequisite

Objective

Team Participation

Overview

Content

Prerequisite

Objective

Organizational Skills

Overview

Content

Prerequisite

Objective

Effective Interpersonal COmmunication for Business Professionals

Overview

Content

Prerequisite

Objective

Career ReSkilling & UpSkilling

Overview

Content

Prerequisite

Objective

Career ReSkilling & UpSkilling

Overview

Content

Prerequisite

Objective

Career ReSkilling & UpSkilling

Overview

Content

Prerequisite

Objective

Career ReSkilling & UpSkilling

Overview

Content

Prerequisite

Objective

Cloud & Datacenter Monitoring with System Center Operations Manager

Overview

Content

Module 1: Overview and Architecture Before implementing Operations Manager, it is important you understand the key features and functionality that it provides. This will help you understand how Operations Manager can be used to solve many common problems that arise in the cloud or datacenter such as ensuring service levels are maintained, and critical line-of –business applications are available and performing at optimum levels. Operations Manager is a comprehensive monitoring solution that requires careful planning before it is deployed into any IT environment. You must understand the hardware and software requirements of the solution and any security implications that may arise, such as monitoring computers in a trust boundary, perimeter network or public cloud. When you configure the storage for the Operations Manager databases, you should have a good understanding of the number of computers and devices that are monitored to appropriately size the databases. This module introduces students to the components contained in an Operations Manager Management Group and describes the dependency and relationships between the various components. Students will be shown how to plan for and design an Operations Manager Management Group. Lessons Overview of Operations Manager Overview of Key Features in Operations Manager Overview of Core Components and Topology Addressing Cloud and Datacenter Issues by Using Operations Manager Planning and Sizing System Center 2012 R2 Operations Manager Lab: Using the System Center 2012 Operations Manager Sizing Helper Tool After completing this module, students will be able to: Describe the purpose and functionality of System Center 2012 R2 Operations Manager. Describe the key features of System Center 2012 R2 Operations Manager. Describe the System Center 2012 R2 Operations Manager components and topology. Describe the key cloud and datacenter problems that Operations Manager addresses. Describe how to design and size an Operations Manager Management Group. Module 2: Deploying a new System Center 2012 R2 Operations Manager Management Group When planning a new deployment of Operations Manager, as well as the hardware and sizing requirements that you may have, you should also consider other factors. Factors including the security accounts that Operations Manager requires and the design of the Management Group should also be considered. For example, you may have a requirement to install two separate Management Groups in order to scale Operations Manager to meet your monitoring requirements. After installing Operations Manager you should also be aware of some of the most common settings that should be configured such as data retention (database grooming) settings and manual agent installation approval settings. You should also be aware of the agent deployment methods that are available including when you should use the console (or push) method or manual installation method of deploying an agent in Operations Manager. Lessons Overview of Security Considerations Designing the Management Group Installing System Center 2012 R2 Operations Manager Configuring Operations Manager Default Settings Deploying the Operations Manager Agent Configuring Agentless Exception Monitoring (AEM) Configuring Audit Collection Services Lab: Installing System Center 2012 R2 Operations Manager and Deploying Agents After completing this module, students will be able to: Know the security considerations when deploying Operations Manager. Know the Management Group design considerations. Install System Center 2012 R2 Operations Manager. Configure common settings in System Center 2012 R2 Operations Manager. Deploy agents in System Center 2012 R2 Operations Manager. Configure Agentless Exception Monitoring in System Center 2012 R2 Operations Manager. Configure Audit Collection Services in System Center 2012 R2 Operations Manager. Module 3: Upgrading Operations Manager If you have already made investments in Operations Manager 2007 R2 it is important that you understand the upgrade path from Operations Manager 2007 R2 to System Center 2012 R2 Operations Manager. Upgrading the core components to System Center 2012 R2 Operations Manager can only be performed on an Operations Manager 2007 R2 or later environment. Earlier versions of Operations Manager such as Operations Manager 2007 SP1 must be upgraded to Operations Manager 2007 R2 before they can be upgraded to System Center 2012 Operations Manager. Additionally, the Operations Manager 2007 R2 installation must be running at least Cumulative Update 4. Before upgrading to System Center 2012 Operations Manager there are several important tasks that must be performed. In this module we will cover the upgrade order that should be applied when you upgrade to System Center 2012 Operations Manager. Before the upgrade to System Center 2012 R2 Operations Manager can be performed, the Management Group must be running System Center 2012 SP1 Operations Manager. Lessons Overview of Migration and Upgrade Planning Upgrading to System Center 2012 R2 Operations Manager Migrating to System Center 2012 R2 Operations Manager Lab: Upgrading to System Center 2012 R2 Operations Manager After completing this module, students will be able to: Plan an upgrade or migration to System Center 2012 R2 Operations Manager. Upgrade from Operations Manager 2007 R2 to System Center 2012 R2 Operations Manager. Migrate to System Center 2012 R2 Operations Manager. Module 4: Configuring Fabric and Application Monitoring With Operations Manager deployed and agents installed on the computers hosting the applications and services you need to monitor you must now install Management Packs to start monitoring them. Before you install Management Packs you should understand Management Pack concepts including all elements of a Management Pack. You should also understand how to configure fabric and application monitoring in Operations Manager for both your private and public cloud environments including how Operations Manager and Virtual Machine Manager is integrated and how you integrate Operations Manager with Windows Azure. You should also understand how to configure Management Packs to monitor applications that are running on your fabric such as Microsoft SQL Server, IIS Server and SharePoint Server. Finally, you should understand how to configure integration between Operations Manager and System Center Advisor so you can view Advisor alerts relating to your fabric components and applications. Lessons Introduction to Management Packs Configuring Network Device Monitoring Configuring Fabric Monitoring Configuring Application Monitoring Lab: Configuring Application and Fabric Monitoring After completing this module, students will be able to: Describe Management Packs fundamentals in Operations Manager. Configure Network Device Monitoring in Operations Manager. Configure Fabric monitoring in Operations Manager. Configure Application monitoring in Operations Manager. Module 5: Application Performance Monitoring Most organizations utilize the Microsoft .NET Framework to build custom applications such as for intranet web sites. As there will not be an available Management Pack for these custom applications you should understand how Application Performance Monitoring (APM) is configured in Operations Manager. APM provides extensive monitoring for .NET and Java based applications that include both Server and Client side monitoring. In addition to monitoring .NET applications directly through Operations Manager it is important that you understand how APM can be used with the full functionality of Visual Studio IntelliTrace Collector for gathering full application profiling traces. With System Center 2012 you can also integrate Operations Manager with Team Foundation Server. It is important that you understand how this integration is configured so that Operations Manager can be used to synchronize alerts with work items in Team Foundation Server. Lessons Application Performance Monitoring Using IntelliTrace Team Foundation Server Integration Lab: Monitoring .NET Framework Applications After completing this module, students will be able to: Configure Application Performance Monitoring. Configure IntelliTrace with APM to debug .NET applications. Integrate Operations Manager with Team Foundation Server.

Prerequisite

Module 1: Overview and Architecture Before implementing Operations Manager, it is important you understand the key features and functionality that it provides. This will help you understand how Operations Manager can be used to solve many common problems that arise in the cloud or datacenter such as ensuring service levels are maintained, and critical line-of –business applications are available and performing at optimum levels. Operations Manager is a comprehensive monitoring solution that requires careful planning before it is deployed into any IT environment. You must understand the hardware and software requirements of the solution and any security implications that may arise, such as monitoring computers in a trust boundary, perimeter network or public cloud. When you configure the storage for the Operations Manager databases, you should have a good understanding of the number of computers and devices that are monitored to appropriately size the databases. This module introduces students to the components contained in an Operations Manager Management Group and describes the dependency and relationships between the various components. Students will be shown how to plan for and design an Operations Manager Management Group. Lessons Overview of Operations Manager Overview of Key Features in Operations Manager Overview of Core Components and Topology Addressing Cloud and Datacenter Issues by Using Operations Manager Planning and Sizing System Center 2012 R2 Operations Manager Lab: Using the System Center 2012 Operations Manager Sizing Helper Tool After completing this module, students will be able to: Describe the purpose and functionality of System Center 2012 R2 Operations Manager. Describe the key features of System Center 2012 R2 Operations Manager. Describe the System Center 2012 R2 Operations Manager components and topology. Describe the key cloud and datacenter problems that Operations Manager addresses. Describe how to design and size an Operations Manager Management Group. Module 2: Deploying a new System Center 2012 R2 Operations Manager Management Group When planning a new deployment of Operations Manager, as well as the hardware and sizing requirements that you may have, you should also consider other factors. Factors including the security accounts that Operations Manager requires and the design of the Management Group should also be considered. For example, you may have a requirement to install two separate Management Groups in order to scale Operations Manager to meet your monitoring requirements. After installing Operations Manager you should also be aware of some of the most common settings that should be configured such as data retention (database grooming) settings and manual agent installation approval settings. You should also be aware of the agent deployment methods that are available including when you should use the console (or push) method or manual installation method of deploying an agent in Operations Manager. Lessons Overview of Security Considerations Designing the Management Group Installing System Center 2012 R2 Operations Manager Configuring Operations Manager Default Settings Deploying the Operations Manager Agent Configuring Agentless Exception Monitoring (AEM) Configuring Audit Collection Services Lab: Installing System Center 2012 R2 Operations Manager and Deploying Agents After completing this module, students will be able to: Know the security considerations when deploying Operations Manager. Know the Management Group design considerations. Install System Center 2012 R2 Operations Manager. Configure common settings in System Center 2012 R2 Operations Manager. Deploy agents in System Center 2012 R2 Operations Manager. Configure Agentless Exception Monitoring in System Center 2012 R2 Operations Manager. Configure Audit Collection Services in System Center 2012 R2 Operations Manager. Module 3: Upgrading Operations Manager If you have already made investments in Operations Manager 2007 R2 it is important that you understand the upgrade path from Operations Manager 2007 R2 to System Center 2012 R2 Operations Manager. Upgrading the core components to System Center 2012 R2 Operations Manager can only be performed on an Operations Manager 2007 R2 or later environment. Earlier versions of Operations Manager such as Operations Manager 2007 SP1 must be upgraded to Operations Manager 2007 R2 before they can be upgraded to System Center 2012 Operations Manager. Additionally, the Operations Manager 2007 R2 installation must be running at least Cumulative Update 4. Before upgrading to System Center 2012 Operations Manager there are several important tasks that must be performed. In this module we will cover the upgrade order that should be applied when you upgrade to System Center 2012 Operations Manager. Before the upgrade to System Center 2012 R2 Operations Manager can be performed, the Management Group must be running System Center 2012 SP1 Operations Manager. Lessons Overview of Migration and Upgrade Planning Upgrading to System Center 2012 R2 Operations Manager Migrating to System Center 2012 R2 Operations Manager Lab: Upgrading to System Center 2012 R2 Operations Manager After completing this module, students will be able to: Plan an upgrade or migration to System Center 2012 R2 Operations Manager. Upgrade from Operations Manager 2007 R2 to System Center 2012 R2 Operations Manager. Migrate to System Center 2012 R2 Operations Manager. Module 4: Configuring Fabric and Application Monitoring With Operations Manager deployed and agents installed on the computers hosting the applications and services you need to monitor you must now install Management Packs to start monitoring them. Before you install Management Packs you should understand Management Pack concepts including all elements of a Management Pack. You should also understand how to configure fabric and application monitoring in Operations Manager for both your private and public cloud environments including how Operations Manager and Virtual Machine Manager is integrated and how you integrate Operations Manager with Windows Azure. You should also understand how to configure Management Packs to monitor applications that are running on your fabric such as Microsoft SQL Server, IIS Server and SharePoint Server. Finally, you should understand how to configure integration between Operations Manager and System Center Advisor so you can view Advisor alerts relating to your fabric components and applications. Lessons Introduction to Management Packs Configuring Network Device Monitoring Configuring Fabric Monitoring Configuring Application Monitoring Lab: Configuring Application and Fabric Monitoring After completing this module, students will be able to: Describe Management Packs fundamentals in Operations Manager. Configure Network Device Monitoring in Operations Manager. Configure Fabric monitoring in Operations Manager. Configure Application monitoring in Operations Manager. Module 5: Application Performance Monitoring Most organizations utilize the Microsoft .NET Framework to build custom applications such as for intranet web sites. As there will not be an available Management Pack for these custom applications you should understand how Application Performance Monitoring (APM) is configured in Operations Manager. APM provides extensive monitoring for .NET and Java based applications that include both Server and Client side monitoring. In addition to monitoring .NET applications directly through Operations Manager it is important that you understand how APM can be used with the full functionality of Visual Studio IntelliTrace Collector for gathering full application profiling traces. With System Center 2012 you can also integrate Operations Manager with Team Foundation Server. It is important that you understand how this integration is configured so that Operations Manager can be used to synchronize alerts with work items in Team Foundation Server. Lessons Application Performance Monitoring Using IntelliTrace Team Foundation Server Integration Lab: Monitoring .NET Framework Applications After completing this module, students will be able to: Configure Application Performance Monitoring. Configure IntelliTrace with APM to debug .NET applications. Integrate Operations Manager with Team Foundation Server.

Objective

Module 1: Overview and Architecture Before implementing Operations Manager, it is important you understand the key features and functionality that it provides. This will help you understand how Operations Manager can be used to solve many common problems that arise in the cloud or datacenter such as ensuring service levels are maintained, and critical line-of –business applications are available and performing at optimum levels. Operations Manager is a comprehensive monitoring solution that requires careful planning before it is deployed into any IT environment. You must understand the hardware and software requirements of the solution and any security implications that may arise, such as monitoring computers in a trust boundary, perimeter network or public cloud. When you configure the storage for the Operations Manager databases, you should have a good understanding of the number of computers and devices that are monitored to appropriately size the databases. This module introduces students to the components contained in an Operations Manager Management Group and describes the dependency and relationships between the various components. Students will be shown how to plan for and design an Operations Manager Management Group. Lessons Overview of Operations Manager Overview of Key Features in Operations Manager Overview of Core Components and Topology Addressing Cloud and Datacenter Issues by Using Operations Manager Planning and Sizing System Center 2012 R2 Operations Manager Lab: Using the System Center 2012 Operations Manager Sizing Helper Tool After completing this module, students will be able to: Describe the purpose and functionality of System Center 2012 R2 Operations Manager. Describe the key features of System Center 2012 R2 Operations Manager. Describe the System Center 2012 R2 Operations Manager components and topology. Describe the key cloud and datacenter problems that Operations Manager addresses. Describe how to design and size an Operations Manager Management Group. Module 2: Deploying a new System Center 2012 R2 Operations Manager Management Group When planning a new deployment of Operations Manager, as well as the hardware and sizing requirements that you may have, you should also consider other factors. Factors including the security accounts that Operations Manager requires and the design of the Management Group should also be considered. For example, you may have a requirement to install two separate Management Groups in order to scale Operations Manager to meet your monitoring requirements. After installing Operations Manager you should also be aware of some of the most common settings that should be configured such as data retention (database grooming) settings and manual agent installation approval settings. You should also be aware of the agent deployment methods that are available including when you should use the console (or push) method or manual installation method of deploying an agent in Operations Manager. Lessons Overview of Security Considerations Designing the Management Group Installing System Center 2012 R2 Operations Manager Configuring Operations Manager Default Settings Deploying the Operations Manager Agent Configuring Agentless Exception Monitoring (AEM) Configuring Audit Collection Services Lab: Installing System Center 2012 R2 Operations Manager and Deploying Agents After completing this module, students will be able to: Know the security considerations when deploying Operations Manager. Know the Management Group design considerations. Install System Center 2012 R2 Operations Manager. Configure common settings in System Center 2012 R2 Operations Manager. Deploy agents in System Center 2012 R2 Operations Manager. Configure Agentless Exception Monitoring in System Center 2012 R2 Operations Manager. Configure Audit Collection Services in System Center 2012 R2 Operations Manager. Module 3: Upgrading Operations Manager If you have already made investments in Operations Manager 2007 R2 it is important that you understand the upgrade path from Operations Manager 2007 R2 to System Center 2012 R2 Operations Manager. Upgrading the core components to System Center 2012 R2 Operations Manager can only be performed on an Operations Manager 2007 R2 or later environment. Earlier versions of Operations Manager such as Operations Manager 2007 SP1 must be upgraded to Operations Manager 2007 R2 before they can be upgraded to System Center 2012 Operations Manager. Additionally, the Operations Manager 2007 R2 installation must be running at least Cumulative Update 4. Before upgrading to System Center 2012 Operations Manager there are several important tasks that must be performed. In this module we will cover the upgrade order that should be applied when you upgrade to System Center 2012 Operations Manager. Before the upgrade to System Center 2012 R2 Operations Manager can be performed, the Management Group must be running System Center 2012 SP1 Operations Manager. Lessons Overview of Migration and Upgrade Planning Upgrading to System Center 2012 R2 Operations Manager Migrating to System Center 2012 R2 Operations Manager Lab: Upgrading to System Center 2012 R2 Operations Manager After completing this module, students will be able to: Plan an upgrade or migration to System Center 2012 R2 Operations Manager. Upgrade from Operations Manager 2007 R2 to System Center 2012 R2 Operations Manager. Migrate to System Center 2012 R2 Operations Manager. Module 4: Configuring Fabric and Application Monitoring With Operations Manager deployed and agents installed on the computers hosting the applications and services you need to monitor you must now install Management Packs to start monitoring them. Before you install Management Packs you should understand Management Pack concepts including all elements of a Management Pack. You should also understand how to configure fabric and application monitoring in Operations Manager for both your private and public cloud environments including how Operations Manager and Virtual Machine Manager is integrated and how you integrate Operations Manager with Windows Azure. You should also understand how to configure Management Packs to monitor applications that are running on your fabric such as Microsoft SQL Server, IIS Server and SharePoint Server. Finally, you should understand how to configure integration between Operations Manager and System Center Advisor so you can view Advisor alerts relating to your fabric components and applications. Lessons Introduction to Management Packs Configuring Network Device Monitoring Configuring Fabric Monitoring Configuring Application Monitoring Lab: Configuring Application and Fabric Monitoring After completing this module, students will be able to: Describe Management Packs fundamentals in Operations Manager. Configure Network Device Monitoring in Operations Manager. Configure Fabric monitoring in Operations Manager. Configure Application monitoring in Operations Manager. Module 5: Application Performance Monitoring Most organizations utilize the Microsoft .NET Framework to build custom applications such as for intranet web sites. As there will not be an available Management Pack for these custom applications you should understand how Application Performance Monitoring (APM) is configured in Operations Manager. APM provides extensive monitoring for .NET and Java based applications that include both Server and Client side monitoring. In addition to monitoring .NET applications directly through Operations Manager it is important that you understand how APM can be used with the full functionality of Visual Studio IntelliTrace Collector for gathering full application profiling traces. With System Center 2012 you can also integrate Operations Manager with Team Foundation Server. It is important that you understand how this integration is configured so that Operations Manager can be used to synchronize alerts with work items in Team Foundation Server. Lessons Application Performance Monitoring Using IntelliTrace Team Foundation Server Integration Lab: Monitoring .NET Framework Applications After completing this module, students will be able to: Configure Application Performance Monitoring. Configure IntelliTrace with APM to debug .NET applications. Integrate Operations Manager with Team Foundation Server.

Securing Windows Server 2016

Overview

Content

Module 1: Attacks, breach detection, and Sysinternals tools This module frames the course so that students are thinking about security in environments where the infrastructure’s basis is predominantly Microsoft products. The module begins with teaching students about the “assume breach” philosophy and getting them to understand the different types of attacks that can occur, including attack timelines and vectors. Additionally, it gets students thinking about key resources, how they respond when they detect an incident, and how an organization’s direct needs and legislative requirements dictate its security policy. Lessons Understanding attacks Detecting security breaches Examining activity with the Sysinternals tools Lab: Basic breach detection and incident response strategies Identifying attack types Exploring Sysinternals tools After completing this module, students will be able to: Describe the types of attacks that can occur. Explain how to detect security breaches. Explain how to examine activity by using the Sysinternals suite of tools. Module 2: Protecting credentials and privileged access This module covers user accounts and rights, computer and service accounts, credentials, Privileged Access Workstations, and the Local Administrator Password Solution. In this module, students will learn about configuring user rights and security options, protecting credentials by using Credential Guard, implementing Privileged Access Workstations, and managing and deploying Local Administrator Password Solution to manage local administrator account passwords. Lessons Understanding user rights Computer and service accounts Protecting credentials Privileged Access Workstations and jump servers Local administrator password solution Lab: Implementing user rights, security options, and group managed service accounts Configuring user rights and account-security options Delegating privileges Creating group Managed Service Accounts Locating problematic accounts Lab: Configuring and deploying LAPs Installing and configuring LAPs Deploying and testing LAPs After completing this module, students will be able to: Configure user rights. Implement computer and service accounts. Protect credentials. Describe how to configure Privileged Access Workstations and jump servers. Configure the Local Administrator Password Solution (LAPS). Module 3: Limiting administrator rights with Just Enough Administration This module explains how to deploy and configure Just Enough Administration (JEA), which is an administrative technology that allows students to apply role-based access control (RBAC) principles through Windows PowerShell remote sessions. Lessons Understanding JEA Verifying and deploying JEA Lab: Limiting administrator privileges with JEA Creating a role-capability file Creating a session-configuration file Creating a JEA endpoint Connecting and testing a JEA endpoint Deploying a JEA configuration to another computer After completing this module, students will be able to: Understand JEA. Verify and deploy JEA. Module 4: Privileged access management and administrative forests This module explains the concepts of Enhanced Security Administrative Environment (ESAE) forests, Microsoft Identity Manager (MIM), and Just In Time (JIT) Administration, or Privileged Access Management (PAM). Lessons ESAE forests Overview of Microsoft Identity Manager Overview of JIT administration and PAM Lab: Limiting administrator privileges with PAM Layered approach to security Configuring trust relationships and shadow principals Requesting privileged access Managing PAM roles After completing this module, students will be able to: Describe ESAE forests. Describe MIM. Understand JIT administration and PAM. Module 5: Mitigating malware and threats This module explains how to use tools such as Windows Defender, Windows AppLocker, Microsoft Device Guard, Windows Defender Application Guard, and Windows Defender Exploit Guard. Lessons Configuring and managing Windows Defender Restricting software Configuring and using the Device Guard feature Lab: Securing applications with Windows Defender, AppLocker, and Device Guard Rules Configuring Windows Defender Configuring AppLocker Configuring Device Guard After completing this module, students will be able to: Configure and manage Windows Defender. Use software restriction policies and AppLocker. Configure and use the Device Guard feature. Module 6: Analyzing activity with advanced auditing and log analytics This module provides an overview of auditing, and then goes into detail about how to configure advanced auditing and Windows PowerShell auditing and logging. Lessons Overview of auditing Advanced auditing Windows PowerShell auditing and logging Lab: Configuring advanced auditing Configuring the auditing of file system access Auditing domain sign-ins Managing advanced audit policy configuration Windows PowerShell logging and auditing After completing this module, students will be able to: Describe auditing. Understand advanced auditing. Configure Windows PowerShell auditing and logging. Module 7: Deploying and configuring Advanced Threat Analytics and Microsoft Operations Management Suite This module explains the Microsoft Advanced Threat Analytics tool and the Microsoft Operations Management suite (OMS). It also explains how you can use them to monitor and analyse the security of a Windows Server deployment. You will also learn about Microsoft Azure Security Center, which allows you to manage and monitor the security configuration of workloads both on-premises and in the cloud. Lessons Deploying and configuring ATA Deploying and configuring Microsoft Operations Management Suite Deploying and configuring Azure Security Center Lab: Deploying ATA, Microsoft Operations Management Suite, and Azure Security Center Preparing and deploying ATA Preparing and deploying Microsoft Operations Management Suite Deploying and configuring Azure Security Center After completing this module, students will be able to: Deploy and configure ATA. Deploy and configure Microsoft Operations Management Suite. Deploy and configure Azure Security Center.

Prerequisite

Module 1: Attacks, breach detection, and Sysinternals tools This module frames the course so that students are thinking about security in environments where the infrastructure’s basis is predominantly Microsoft products. The module begins with teaching students about the “assume breach” philosophy and getting them to understand the different types of attacks that can occur, including attack timelines and vectors. Additionally, it gets students thinking about key resources, how they respond when they detect an incident, and how an organization’s direct needs and legislative requirements dictate its security policy. Lessons Understanding attacks Detecting security breaches Examining activity with the Sysinternals tools Lab: Basic breach detection and incident response strategies Identifying attack types Exploring Sysinternals tools After completing this module, students will be able to: Describe the types of attacks that can occur. Explain how to detect security breaches. Explain how to examine activity by using the Sysinternals suite of tools. Module 2: Protecting credentials and privileged access This module covers user accounts and rights, computer and service accounts, credentials, Privileged Access Workstations, and the Local Administrator Password Solution. In this module, students will learn about configuring user rights and security options, protecting credentials by using Credential Guard, implementing Privileged Access Workstations, and managing and deploying Local Administrator Password Solution to manage local administrator account passwords. Lessons Understanding user rights Computer and service accounts Protecting credentials Privileged Access Workstations and jump servers Local administrator password solution Lab: Implementing user rights, security options, and group managed service accounts Configuring user rights and account-security options Delegating privileges Creating group Managed Service Accounts Locating problematic accounts Lab: Configuring and deploying LAPs Installing and configuring LAPs Deploying and testing LAPs After completing this module, students will be able to: Configure user rights. Implement computer and service accounts. Protect credentials. Describe how to configure Privileged Access Workstations and jump servers. Configure the Local Administrator Password Solution (LAPS). Module 3: Limiting administrator rights with Just Enough Administration This module explains how to deploy and configure Just Enough Administration (JEA), which is an administrative technology that allows students to apply role-based access control (RBAC) principles through Windows PowerShell remote sessions. Lessons Understanding JEA Verifying and deploying JEA Lab: Limiting administrator privileges with JEA Creating a role-capability file Creating a session-configuration file Creating a JEA endpoint Connecting and testing a JEA endpoint Deploying a JEA configuration to another computer After completing this module, students will be able to: Understand JEA. Verify and deploy JEA. Module 4: Privileged access management and administrative forests This module explains the concepts of Enhanced Security Administrative Environment (ESAE) forests, Microsoft Identity Manager (MIM), and Just In Time (JIT) Administration, or Privileged Access Management (PAM). Lessons ESAE forests Overview of Microsoft Identity Manager Overview of JIT administration and PAM Lab: Limiting administrator privileges with PAM Layered approach to security Configuring trust relationships and shadow principals Requesting privileged access Managing PAM roles After completing this module, students will be able to: Describe ESAE forests. Describe MIM. Understand JIT administration and PAM. Module 5: Mitigating malware and threats This module explains how to use tools such as Windows Defender, Windows AppLocker, Microsoft Device Guard, Windows Defender Application Guard, and Windows Defender Exploit Guard. Lessons Configuring and managing Windows Defender Restricting software Configuring and using the Device Guard feature Lab: Securing applications with Windows Defender, AppLocker, and Device Guard Rules Configuring Windows Defender Configuring AppLocker Configuring Device Guard After completing this module, students will be able to: Configure and manage Windows Defender. Use software restriction policies and AppLocker. Configure and use the Device Guard feature. Module 6: Analyzing activity with advanced auditing and log analytics This module provides an overview of auditing, and then goes into detail about how to configure advanced auditing and Windows PowerShell auditing and logging. Lessons Overview of auditing Advanced auditing Windows PowerShell auditing and logging Lab: Configuring advanced auditing Configuring the auditing of file system access Auditing domain sign-ins Managing advanced audit policy configuration Windows PowerShell logging and auditing After completing this module, students will be able to: Describe auditing. Understand advanced auditing. Configure Windows PowerShell auditing and logging. Module 7: Deploying and configuring Advanced Threat Analytics and Microsoft Operations Management Suite This module explains the Microsoft Advanced Threat Analytics tool and the Microsoft Operations Management suite (OMS). It also explains how you can use them to monitor and analyse the security of a Windows Server deployment. You will also learn about Microsoft Azure Security Center, which allows you to manage and monitor the security configuration of workloads both on-premises and in the cloud. Lessons Deploying and configuring ATA Deploying and configuring Microsoft Operations Management Suite Deploying and configuring Azure Security Center Lab: Deploying ATA, Microsoft Operations Management Suite, and Azure Security Center Preparing and deploying ATA Preparing and deploying Microsoft Operations Management Suite Deploying and configuring Azure Security Center After completing this module, students will be able to: Deploy and configure ATA. Deploy and configure Microsoft Operations Management Suite. Deploy and configure Azure Security Center.

Objective

Module 1: Attacks, breach detection, and Sysinternals tools This module frames the course so that students are thinking about security in environments where the infrastructure’s basis is predominantly Microsoft products. The module begins with teaching students about the “assume breach” philosophy and getting them to understand the different types of attacks that can occur, including attack timelines and vectors. Additionally, it gets students thinking about key resources, how they respond when they detect an incident, and how an organization’s direct needs and legislative requirements dictate its security policy. Lessons Understanding attacks Detecting security breaches Examining activity with the Sysinternals tools Lab: Basic breach detection and incident response strategies Identifying attack types Exploring Sysinternals tools After completing this module, students will be able to: Describe the types of attacks that can occur. Explain how to detect security breaches. Explain how to examine activity by using the Sysinternals suite of tools. Module 2: Protecting credentials and privileged access This module covers user accounts and rights, computer and service accounts, credentials, Privileged Access Workstations, and the Local Administrator Password Solution. In this module, students will learn about configuring user rights and security options, protecting credentials by using Credential Guard, implementing Privileged Access Workstations, and managing and deploying Local Administrator Password Solution to manage local administrator account passwords. Lessons Understanding user rights Computer and service accounts Protecting credentials Privileged Access Workstations and jump servers Local administrator password solution Lab: Implementing user rights, security options, and group managed service accounts Configuring user rights and account-security options Delegating privileges Creating group Managed Service Accounts Locating problematic accounts Lab: Configuring and deploying LAPs Installing and configuring LAPs Deploying and testing LAPs After completing this module, students will be able to: Configure user rights. Implement computer and service accounts. Protect credentials. Describe how to configure Privileged Access Workstations and jump servers. Configure the Local Administrator Password Solution (LAPS). Module 3: Limiting administrator rights with Just Enough Administration This module explains how to deploy and configure Just Enough Administration (JEA), which is an administrative technology that allows students to apply role-based access control (RBAC) principles through Windows PowerShell remote sessions. Lessons Understanding JEA Verifying and deploying JEA Lab: Limiting administrator privileges with JEA Creating a role-capability file Creating a session-configuration file Creating a JEA endpoint Connecting and testing a JEA endpoint Deploying a JEA configuration to another computer After completing this module, students will be able to: Understand JEA. Verify and deploy JEA. Module 4: Privileged access management and administrative forests This module explains the concepts of Enhanced Security Administrative Environment (ESAE) forests, Microsoft Identity Manager (MIM), and Just In Time (JIT) Administration, or Privileged Access Management (PAM). Lessons ESAE forests Overview of Microsoft Identity Manager Overview of JIT administration and PAM Lab: Limiting administrator privileges with PAM Layered approach to security Configuring trust relationships and shadow principals Requesting privileged access Managing PAM roles After completing this module, students will be able to: Describe ESAE forests. Describe MIM. Understand JIT administration and PAM. Module 5: Mitigating malware and threats This module explains how to use tools such as Windows Defender, Windows AppLocker, Microsoft Device Guard, Windows Defender Application Guard, and Windows Defender Exploit Guard. Lessons Configuring and managing Windows Defender Restricting software Configuring and using the Device Guard feature Lab: Securing applications with Windows Defender, AppLocker, and Device Guard Rules Configuring Windows Defender Configuring AppLocker Configuring Device Guard After completing this module, students will be able to: Configure and manage Windows Defender. Use software restriction policies and AppLocker. Configure and use the Device Guard feature. Module 6: Analyzing activity with advanced auditing and log analytics This module provides an overview of auditing, and then goes into detail about how to configure advanced auditing and Windows PowerShell auditing and logging. Lessons Overview of auditing Advanced auditing Windows PowerShell auditing and logging Lab: Configuring advanced auditing Configuring the auditing of file system access Auditing domain sign-ins Managing advanced audit policy configuration Windows PowerShell logging and auditing After completing this module, students will be able to: Describe auditing. Understand advanced auditing. Configure Windows PowerShell auditing and logging. Module 7: Deploying and configuring Advanced Threat Analytics and Microsoft Operations Management Suite This module explains the Microsoft Advanced Threat Analytics tool and the Microsoft Operations Management suite (OMS). It also explains how you can use them to monitor and analyse the security of a Windows Server deployment. You will also learn about Microsoft Azure Security Center, which allows you to manage and monitor the security configuration of workloads both on-premises and in the cloud. Lessons Deploying and configuring ATA Deploying and configuring Microsoft Operations Management Suite Deploying and configuring Azure Security Center Lab: Deploying ATA, Microsoft Operations Management Suite, and Azure Security Center Preparing and deploying ATA Preparing and deploying Microsoft Operations Management Suite Deploying and configuring Azure Security Center After completing this module, students will be able to: Deploy and configure ATA. Deploy and configure Microsoft Operations Management Suite. Deploy and configure Azure Security Center.

Upgrading Your Skills to MCSA: Windows Server

Overview

Content

Module 1: Installing and configuring Windows Server 2016 This module explains how to install and perform post-installation configuration of Windows Server 2016 servers. Lessons Introducing Windows Server 2016 Installing Windows Server 2016 Configuring Windows Server 2016 Preparing for upgrades and migrations Migrating server roles and workloads Windows Server activation models Lab: Installing and configuring Server Core Installing Server Core Completing post-installation tasks on Windows Server 2016 Core Performing remote management After completing this course, students will be able to: Explain Windows Server 2016. Install Windows Server 2016. Configure Windows Server 2016. Prepare for upgrades and migrations. Migrate server roles and workloads. Describe the Windows Server activation models. Module 2: Overview of storage in Windows Server 2016 This module explains how to configure storage in Windows Server 2016. Lessons Overview of storage in Windows Server 2016 Implementing Data Deduplication Configuring iSCSI storage Configuring the Storage Spaces feature in Windows Server 2016 Lab: Implementing and managing storage Implementing File Server Resource Manager (FSRM) Implementing Data Deduplication Configuring iSCSI storage After completing this module, students will be able to: Explain storage in Windows Server 2016. Implement Data Deduplication. Configure iSCSI storage. Configure the Storage Spaces feature in Windows Server 2016. Module 3: Implementing directory services This module explains how to implement the Directory Services feature. Lessons Deploying Active Directory domain controllers Implementing service accounts Azure AD Lab: Implementing and managing AD DS Cloning a domain controller Implementing service accounts After completing this module, students will be able to: Deploy AD DS domain controllers. Implement service accounts. Explain Azure AD. Module 4: Implementing AD FS This module explains how to implement an AD FS deployment. Lessons Overview of AD FS Deploying AD FS Implementing AD FS for a single organization Implementing Web Application Proxy Implementing SSO with Microsoft online services Lab: Implementing AD FS Installing and configuring AD FS Configuring an internal application for AD FS Lab: Implementing Web Application Proxy Implementing Web Application Proxy After completing this module, students will be able to: Describe AD FS. Deploy AD FS. Implement AD FS for a single organization. Implement Web Application Proxy. Implement SSO with Microsoft online services. Module 5: Implementing network services This module explains how to configure advanced features for Dynamic Host Configuration Protocol (DHCP) and configure IP Address Management (IPAM). Lessons Overview of networking enhancements Implementing IPAM Managing IP address spaces with IPAM Lab: Implementing network services Configuring DNS policies Configuring DHCP failover Configuring IPAM After completing this module, students will be able to: Describe networking enhancements. Implement IP address management. Manage IP address spaces with IPAM. Module 6: Implementing Hyper-V This module explains how to install and configure Hyper-V virtual machines. Lessons Configuring the Hyper-V role in Windows Server 2016 Configuring Hyper-V storage Configuring Hyper-V networking Configuring Hyper-V virtual machines Lab: Implementing server virtualization with Hyper-V Installing the Hyper-V server role Configuring virtual networking Creating and configuring a virtual machine After completing this module, students will be able to: Configure the Hyper-V role in Windows Server 2016. Configure Hyper-V storage. Configure Hyper-V networking. Configure Hyper-V virtual machines.

Prerequisite

Module 1: Installing and configuring Windows Server 2016 This module explains how to install and perform post-installation configuration of Windows Server 2016 servers. Lessons Introducing Windows Server 2016 Installing Windows Server 2016 Configuring Windows Server 2016 Preparing for upgrades and migrations Migrating server roles and workloads Windows Server activation models Lab: Installing and configuring Server Core Installing Server Core Completing post-installation tasks on Windows Server 2016 Core Performing remote management After completing this course, students will be able to: Explain Windows Server 2016. Install Windows Server 2016. Configure Windows Server 2016. Prepare for upgrades and migrations. Migrate server roles and workloads. Describe the Windows Server activation models. Module 2: Overview of storage in Windows Server 2016 This module explains how to configure storage in Windows Server 2016. Lessons Overview of storage in Windows Server 2016 Implementing Data Deduplication Configuring iSCSI storage Configuring the Storage Spaces feature in Windows Server 2016 Lab: Implementing and managing storage Implementing File Server Resource Manager (FSRM) Implementing Data Deduplication Configuring iSCSI storage After completing this module, students will be able to: Explain storage in Windows Server 2016. Implement Data Deduplication. Configure iSCSI storage. Configure the Storage Spaces feature in Windows Server 2016. Module 3: Implementing directory services This module explains how to implement the Directory Services feature. Lessons Deploying Active Directory domain controllers Implementing service accounts Azure AD Lab: Implementing and managing AD DS Cloning a domain controller Implementing service accounts After completing this module, students will be able to: Deploy AD DS domain controllers. Implement service accounts. Explain Azure AD. Module 4: Implementing AD FS This module explains how to implement an AD FS deployment. Lessons Overview of AD FS Deploying AD FS Implementing AD FS for a single organization Implementing Web Application Proxy Implementing SSO with Microsoft online services Lab: Implementing AD FS Installing and configuring AD FS Configuring an internal application for AD FS Lab: Implementing Web Application Proxy Implementing Web Application Proxy After completing this module, students will be able to: Describe AD FS. Deploy AD FS. Implement AD FS for a single organization. Implement Web Application Proxy. Implement SSO with Microsoft online services. Module 5: Implementing network services This module explains how to configure advanced features for Dynamic Host Configuration Protocol (DHCP) and configure IP Address Management (IPAM). Lessons Overview of networking enhancements Implementing IPAM Managing IP address spaces with IPAM Lab: Implementing network services Configuring DNS policies Configuring DHCP failover Configuring IPAM After completing this module, students will be able to: Describe networking enhancements. Implement IP address management. Manage IP address spaces with IPAM. Module 6: Implementing Hyper-V This module explains how to install and configure Hyper-V virtual machines. Lessons Configuring the Hyper-V role in Windows Server 2016 Configuring Hyper-V storage Configuring Hyper-V networking Configuring Hyper-V virtual machines Lab: Implementing server virtualization with Hyper-V Installing the Hyper-V server role Configuring virtual networking Creating and configuring a virtual machine After completing this module, students will be able to: Configure the Hyper-V role in Windows Server 2016. Configure Hyper-V storage. Configure Hyper-V networking. Configure Hyper-V virtual machines.

Objective

Module 1: Installing and configuring Windows Server 2016 This module explains how to install and perform post-installation configuration of Windows Server 2016 servers. Lessons Introducing Windows Server 2016 Installing Windows Server 2016 Configuring Windows Server 2016 Preparing for upgrades and migrations Migrating server roles and workloads Windows Server activation models Lab: Installing and configuring Server Core Installing Server Core Completing post-installation tasks on Windows Server 2016 Core Performing remote management After completing this course, students will be able to: Explain Windows Server 2016. Install Windows Server 2016. Configure Windows Server 2016. Prepare for upgrades and migrations. Migrate server roles and workloads. Describe the Windows Server activation models. Module 2: Overview of storage in Windows Server 2016 This module explains how to configure storage in Windows Server 2016. Lessons Overview of storage in Windows Server 2016 Implementing Data Deduplication Configuring iSCSI storage Configuring the Storage Spaces feature in Windows Server 2016 Lab: Implementing and managing storage Implementing File Server Resource Manager (FSRM) Implementing Data Deduplication Configuring iSCSI storage After completing this module, students will be able to: Explain storage in Windows Server 2016. Implement Data Deduplication. Configure iSCSI storage. Configure the Storage Spaces feature in Windows Server 2016. Module 3: Implementing directory services This module explains how to implement the Directory Services feature. Lessons Deploying Active Directory domain controllers Implementing service accounts Azure AD Lab: Implementing and managing AD DS Cloning a domain controller Implementing service accounts After completing this module, students will be able to: Deploy AD DS domain controllers. Implement service accounts. Explain Azure AD. Module 4: Implementing AD FS This module explains how to implement an AD FS deployment. Lessons Overview of AD FS Deploying AD FS Implementing AD FS for a single organization Implementing Web Application Proxy Implementing SSO with Microsoft online services Lab: Implementing AD FS Installing and configuring AD FS Configuring an internal application for AD FS Lab: Implementing Web Application Proxy Implementing Web Application Proxy After completing this module, students will be able to: Describe AD FS. Deploy AD FS. Implement AD FS for a single organization. Implement Web Application Proxy. Implement SSO with Microsoft online services. Module 5: Implementing network services This module explains how to configure advanced features for Dynamic Host Configuration Protocol (DHCP) and configure IP Address Management (IPAM). Lessons Overview of networking enhancements Implementing IPAM Managing IP address spaces with IPAM Lab: Implementing network services Configuring DNS policies Configuring DHCP failover Configuring IPAM After completing this module, students will be able to: Describe networking enhancements. Implement IP address management. Manage IP address spaces with IPAM. Module 6: Implementing Hyper-V This module explains how to install and configure Hyper-V virtual machines. Lessons Configuring the Hyper-V role in Windows Server 2016 Configuring Hyper-V storage Configuring Hyper-V networking Configuring Hyper-V virtual machines Lab: Implementing server virtualization with Hyper-V Installing the Hyper-V server role Configuring virtual networking Creating and configuring a virtual machine After completing this module, students will be able to: Configure the Hyper-V role in Windows Server 2016. Configure Hyper-V storage. Configure Hyper-V networking. Configure Hyper-V virtual machines.

Administering Windows Server®

Overview

Content

Module 1: Configuring and Troubleshooting Domain Name System This module explains how to configure and troubleshoot DNS, including DNS replication and caching. Lessons Configuring the DNS Server Role Configuring DNS Zones Configuring DNS Zone Transfers Managing and Troubleshooting DNS Lab: Configuring and Troubleshooting DNS After completing this module, students will be able to: Install and configure the DNS server role. Create and configure DNS zones. Configure DNS zone transfers. Manage and troubleshoot DNS. Module 2: Maintaining Active Directory Domain Services This module explains how to implement virtualized domain controllers and read-only domain controller (RODCs). It also explains how to perform common AD DS administrative tasks and manage the AD DS Database. Lessons Overview of AD DS Implementing Virtualized Domain Controllers Implementing RODCs Administering AD DS Managing the AD DS Database Lab: Maintaining AD DS After completing this module, students will be able to: Implement virtualized domain controllers. Implement RODCs. Administer AD DS. Manage the AD DS database Module 3: Managing User and Service Accounts This module explains how to create, configure and automate the creation of user accounts. It also explains how to configure account-related properties of user objects. It further explains how to create and administer Managed Service Accounts. Lessons Configuring Password Policy and User Account Lockout Settings Configuring Managed Service Accounts Lab: Managing User and Service Accounts After completing this module, students will be able to: Configure password policy and user account lockout settings. Configure managed service accounts. Module 4: Implementing a Group Policy Infrastructure This module explains how to implement a GPO infrastructure. This also teaches how to perform common GPO management tasks, and manage GPOs by using Windows PowerShell. It also focuses on troubleshooting the application of GPOs. Lessons Introducing Group Policy Implementing and Administering GPOs Group Policy Scope and Group Policy Processing Troubleshooting the Application of GPOs Lab: Implementing a Group Policy Infrastructure After completing this module, students will be able to: Explain what Group Policy is. Implement and administer Group Policy Objects (GPOs). Manage Group Policy scope and Group Policy processing. Troubleshoot the application of GPOs. Module 5: Managing User Desktops with Group Policy This module explains how you can use Group Policy Objects (GPOs) to implement desktop environments across your organization by using Administrative Templates, Folder Redirection, Group Policy preferences, and where applicable, use software deployment to install and update application programs. It is important to know how to use these various GPO features so that you can configure your users’ computer settings properly. Lessons Implementing Administrative Templates Configuring Folder Redirection and Scripts Configuring Group Policy Preferences Managing Software with Group Policy Lab: Managing User Desktops with Group Policy After completing this module, students will be able to: Configure folder redirection and scripts by using GPOs. Describe and implement Administrative Templates. Configure GPO preferences. Deploy software by using GPOs. Module 6: Installing, Configuring, and Troubleshooting the Network Policy Server Role This module explains how to install and configure NPS, RADIUS Clients and servers. It also describes NPS authentication methods. I describe NPS authentication methods and how to monitor and troubleshoot NPS. Lessons Installing and Configuring a Network Policy Server Configuring RADIUS Clients and Servers NPS Authentication Methods Monitoring and Troubleshooting a Network Policy Server Lab: Installing and Configuring a Network Policy Server After completing this module, students will be able to: Install and configure a Network Policy Server (NPS). Configure clients and servers with the Remote Authentication Dial-In User Service (RADIUS) protocol. Explain NPS authentication methods. Monitor and troubleshoot NPS.

Prerequisite

Module 1: Configuring and Troubleshooting Domain Name System This module explains how to configure and troubleshoot DNS, including DNS replication and caching. Lessons Configuring the DNS Server Role Configuring DNS Zones Configuring DNS Zone Transfers Managing and Troubleshooting DNS Lab: Configuring and Troubleshooting DNS After completing this module, students will be able to: Install and configure the DNS server role. Create and configure DNS zones. Configure DNS zone transfers. Manage and troubleshoot DNS. Module 2: Maintaining Active Directory Domain Services This module explains how to implement virtualized domain controllers and read-only domain controller (RODCs). It also explains how to perform common AD DS administrative tasks and manage the AD DS Database. Lessons Overview of AD DS Implementing Virtualized Domain Controllers Implementing RODCs Administering AD DS Managing the AD DS Database Lab: Maintaining AD DS After completing this module, students will be able to: Implement virtualized domain controllers. Implement RODCs. Administer AD DS. Manage the AD DS database Module 3: Managing User and Service Accounts This module explains how to create, configure and automate the creation of user accounts. It also explains how to configure account-related properties of user objects. It further explains how to create and administer Managed Service Accounts. Lessons Configuring Password Policy and User Account Lockout Settings Configuring Managed Service Accounts Lab: Managing User and Service Accounts After completing this module, students will be able to: Configure password policy and user account lockout settings. Configure managed service accounts. Module 4: Implementing a Group Policy Infrastructure This module explains how to implement a GPO infrastructure. This also teaches how to perform common GPO management tasks, and manage GPOs by using Windows PowerShell. It also focuses on troubleshooting the application of GPOs. Lessons Introducing Group Policy Implementing and Administering GPOs Group Policy Scope and Group Policy Processing Troubleshooting the Application of GPOs Lab: Implementing a Group Policy Infrastructure After completing this module, students will be able to: Explain what Group Policy is. Implement and administer Group Policy Objects (GPOs). Manage Group Policy scope and Group Policy processing. Troubleshoot the application of GPOs. Module 5: Managing User Desktops with Group Policy This module explains how you can use Group Policy Objects (GPOs) to implement desktop environments across your organization by using Administrative Templates, Folder Redirection, Group Policy preferences, and where applicable, use software deployment to install and update application programs. It is important to know how to use these various GPO features so that you can configure your users’ computer settings properly. Lessons Implementing Administrative Templates Configuring Folder Redirection and Scripts Configuring Group Policy Preferences Managing Software with Group Policy Lab: Managing User Desktops with Group Policy After completing this module, students will be able to: Configure folder redirection and scripts by using GPOs. Describe and implement Administrative Templates. Configure GPO preferences. Deploy software by using GPOs. Module 6: Installing, Configuring, and Troubleshooting the Network Policy Server Role This module explains how to install and configure NPS, RADIUS Clients and servers. It also describes NPS authentication methods. I describe NPS authentication methods and how to monitor and troubleshoot NPS. Lessons Installing and Configuring a Network Policy Server Configuring RADIUS Clients and Servers NPS Authentication Methods Monitoring and Troubleshooting a Network Policy Server Lab: Installing and Configuring a Network Policy Server After completing this module, students will be able to: Install and configure a Network Policy Server (NPS). Configure clients and servers with the Remote Authentication Dial-In User Service (RADIUS) protocol. Explain NPS authentication methods. Monitor and troubleshoot NPS.

Objective

Module 1: Configuring and Troubleshooting Domain Name System This module explains how to configure and troubleshoot DNS, including DNS replication and caching. Lessons Configuring the DNS Server Role Configuring DNS Zones Configuring DNS Zone Transfers Managing and Troubleshooting DNS Lab: Configuring and Troubleshooting DNS After completing this module, students will be able to: Install and configure the DNS server role. Create and configure DNS zones. Configure DNS zone transfers. Manage and troubleshoot DNS. Module 2: Maintaining Active Directory Domain Services This module explains how to implement virtualized domain controllers and read-only domain controller (RODCs). It also explains how to perform common AD DS administrative tasks and manage the AD DS Database. Lessons Overview of AD DS Implementing Virtualized Domain Controllers Implementing RODCs Administering AD DS Managing the AD DS Database Lab: Maintaining AD DS After completing this module, students will be able to: Implement virtualized domain controllers. Implement RODCs. Administer AD DS. Manage the AD DS database Module 3: Managing User and Service Accounts This module explains how to create, configure and automate the creation of user accounts. It also explains how to configure account-related properties of user objects. It further explains how to create and administer Managed Service Accounts. Lessons Configuring Password Policy and User Account Lockout Settings Configuring Managed Service Accounts Lab: Managing User and Service Accounts After completing this module, students will be able to: Configure password policy and user account lockout settings. Configure managed service accounts. Module 4: Implementing a Group Policy Infrastructure This module explains how to implement a GPO infrastructure. This also teaches how to perform common GPO management tasks, and manage GPOs by using Windows PowerShell. It also focuses on troubleshooting the application of GPOs. Lessons Introducing Group Policy Implementing and Administering GPOs Group Policy Scope and Group Policy Processing Troubleshooting the Application of GPOs Lab: Implementing a Group Policy Infrastructure After completing this module, students will be able to: Explain what Group Policy is. Implement and administer Group Policy Objects (GPOs). Manage Group Policy scope and Group Policy processing. Troubleshoot the application of GPOs. Module 5: Managing User Desktops with Group Policy This module explains how you can use Group Policy Objects (GPOs) to implement desktop environments across your organization by using Administrative Templates, Folder Redirection, Group Policy preferences, and where applicable, use software deployment to install and update application programs. It is important to know how to use these various GPO features so that you can configure your users’ computer settings properly. Lessons Implementing Administrative Templates Configuring Folder Redirection and Scripts Configuring Group Policy Preferences Managing Software with Group Policy Lab: Managing User Desktops with Group Policy After completing this module, students will be able to: Configure folder redirection and scripts by using GPOs. Describe and implement Administrative Templates. Configure GPO preferences. Deploy software by using GPOs. Module 6: Installing, Configuring, and Troubleshooting the Network Policy Server Role This module explains how to install and configure NPS, RADIUS Clients and servers. It also describes NPS authentication methods. I describe NPS authentication methods and how to monitor and troubleshoot NPS. Lessons Installing and Configuring a Network Policy Server Configuring RADIUS Clients and Servers NPS Authentication Methods Monitoring and Troubleshooting a Network Policy Server Lab: Installing and Configuring a Network Policy Server After completing this module, students will be able to: Install and configure a Network Policy Server (NPS). Configure clients and servers with the Remote Authentication Dial-In User Service (RADIUS) protocol. Explain NPS authentication methods. Monitor and troubleshoot NPS.

Installing and Configuring Windows Server®

Overview

Content

Module 1: Deploying and Managing Windows Server 2012 This module introduces students to the editions of Windows Server 2012 and the new Windows Server 2012 management tools. It also covers how to install Windows Server 2012, how to perform post-deployment tasks, and how to perform basic administrative tasks. Lessons Windows Server 2012 Overview Installing Windows Server 2012 Post-Installation Configuration of Windows Server 2012 Overview of Windows Server 2012 Management Introduction to Windows PowerShell Lab: Deploying and Managing Windows Server 2012 After completing this module, students will be able to: Describe Windows Server 2012. Install Windows Server 2012. Perform post-installation configuration of Windows Server 2012. Describe the management tools available in Windows Server 2012. Perform basic administrative tasks using Windows PowerShell. Module 2: Introduction to Active Directory Domain Services This module covers the structure of Active Directory Domain Services (AD DS) and its various components, such as forest, domain, and organizational units (OUs). It also gives an overview of domain controllers, in addition to choices that are available with Windows Server 2012 for installing AD DS on a server. Lessons Overview of AD DS Overview of Domain Controllers Installing a Domain Controller Lab: Installing Domain Controllers After completing this module, students will be able to: Describe the structure of AD DS. Describe the purpose of domain controllers. Install a domain controller. Module 3: Managing Active Directory Domain Services Objects This module describes how to manage user accounts and computer accounts, including how to manage various consumer devices that employees use. The module also covers how to manage an enterprise network by managing groups, and how to delegate administrative tasks to designated users or groups. Lessons Managing User Accounts Managing Groups Managing Computer Accounts Delegating Administration Lab: Managing Active Directory Domain Services Objects After completing this module, students will be able to: Manage user accounts with graphical tools. Manage group accounts with graphical tools. Manage computer accounts. Delegate permissions to perform AD DS administration. Module 4: Automating Active Directory Domain Services Administration This module describes how to use command-line tools and Windows PowerShell to automate AD DS administration. It discusses various command-line tools and Windows PowerShell commands, and then describes how to use these tools and commands to modify objects individually and in bulk operations. Lessons Using Command-line Tools for AD DS Administration Using Windows PowerShell for AD DS Administration Performing Bulk Operations with Windows PowerShell Lab: Automating AD DS Administration by Using Windows PowerShell After completing this module, students will be able to: Use command-line tools for AD DS administration. Use Windows PowerShell cmdlets for AD DS administration. Perform bulk operations by using Windows PowerShell. Module 5: Implementing IPv4 This module discusses using IPv4, which is the network protocol used on the Internet and on local area networks. In this module, students learn how to implement an IPv4 addressing scheme and how to troubleshoot network communication. This module also covers how to determine and troubleshoot network-related problems. Lessons Overview of TCP/IP Understanding IPv4 Addressing Subnetting and Supernetting Configuring and Troubleshooting IPv4 Lab: Implementing IPv4 After completing this module, students will be able to: Describe the TCP/IP protocol suite. Describe IPv4 addressing. Determine a subnet mask necessary for supernetting or subnetting. Configure IPv4 and troubleshoot IPv4 communication. Module 6: Implementing Dynamic Host Configuration Protocol This module covers supporting and troubleshooting a Windows Server–based network infrastructure by deploying, configuring, and troubleshooting the Dynamic Host Configuration Protocol (DHCP) server role. Lessons Overview of the DHCP Server Role Configuring DHCP Scopes Managing a DHCP Database Securing and Monitoring DHCP Lab: Implementing DHCP After completing this module, students will be able to: Explain the DHCP server role. Configure DHCP scopes. Manage a DHCP database. Secure and monitor the DHCP server role.

Prerequisite

Module 1: Deploying and Managing Windows Server 2012 This module introduces students to the editions of Windows Server 2012 and the new Windows Server 2012 management tools. It also covers how to install Windows Server 2012, how to perform post-deployment tasks, and how to perform basic administrative tasks. Lessons Windows Server 2012 Overview Installing Windows Server 2012 Post-Installation Configuration of Windows Server 2012 Overview of Windows Server 2012 Management Introduction to Windows PowerShell Lab: Deploying and Managing Windows Server 2012 After completing this module, students will be able to: Describe Windows Server 2012. Install Windows Server 2012. Perform post-installation configuration of Windows Server 2012. Describe the management tools available in Windows Server 2012. Perform basic administrative tasks using Windows PowerShell. Module 2: Introduction to Active Directory Domain Services This module covers the structure of Active Directory Domain Services (AD DS) and its various components, such as forest, domain, and organizational units (OUs). It also gives an overview of domain controllers, in addition to choices that are available with Windows Server 2012 for installing AD DS on a server. Lessons Overview of AD DS Overview of Domain Controllers Installing a Domain Controller Lab: Installing Domain Controllers After completing this module, students will be able to: Describe the structure of AD DS. Describe the purpose of domain controllers. Install a domain controller. Module 3: Managing Active Directory Domain Services Objects This module describes how to manage user accounts and computer accounts, including how to manage various consumer devices that employees use. The module also covers how to manage an enterprise network by managing groups, and how to delegate administrative tasks to designated users or groups. Lessons Managing User Accounts Managing Groups Managing Computer Accounts Delegating Administration Lab: Managing Active Directory Domain Services Objects After completing this module, students will be able to: Manage user accounts with graphical tools. Manage group accounts with graphical tools. Manage computer accounts. Delegate permissions to perform AD DS administration. Module 4: Automating Active Directory Domain Services Administration This module describes how to use command-line tools and Windows PowerShell to automate AD DS administration. It discusses various command-line tools and Windows PowerShell commands, and then describes how to use these tools and commands to modify objects individually and in bulk operations. Lessons Using Command-line Tools for AD DS Administration Using Windows PowerShell for AD DS Administration Performing Bulk Operations with Windows PowerShell Lab: Automating AD DS Administration by Using Windows PowerShell After completing this module, students will be able to: Use command-line tools for AD DS administration. Use Windows PowerShell cmdlets for AD DS administration. Perform bulk operations by using Windows PowerShell. Module 5: Implementing IPv4 This module discusses using IPv4, which is the network protocol used on the Internet and on local area networks. In this module, students learn how to implement an IPv4 addressing scheme and how to troubleshoot network communication. This module also covers how to determine and troubleshoot network-related problems. Lessons Overview of TCP/IP Understanding IPv4 Addressing Subnetting and Supernetting Configuring and Troubleshooting IPv4 Lab: Implementing IPv4 After completing this module, students will be able to: Describe the TCP/IP protocol suite. Describe IPv4 addressing. Determine a subnet mask necessary for supernetting or subnetting. Configure IPv4 and troubleshoot IPv4 communication. Module 6: Implementing Dynamic Host Configuration Protocol This module covers supporting and troubleshooting a Windows Server–based network infrastructure by deploying, configuring, and troubleshooting the Dynamic Host Configuration Protocol (DHCP) server role. Lessons Overview of the DHCP Server Role Configuring DHCP Scopes Managing a DHCP Database Securing and Monitoring DHCP Lab: Implementing DHCP After completing this module, students will be able to: Explain the DHCP server role. Configure DHCP scopes. Manage a DHCP database. Secure and monitor the DHCP server role.

Objective

Module 1: Deploying and Managing Windows Server 2012 This module introduces students to the editions of Windows Server 2012 and the new Windows Server 2012 management tools. It also covers how to install Windows Server 2012, how to perform post-deployment tasks, and how to perform basic administrative tasks. Lessons Windows Server 2012 Overview Installing Windows Server 2012 Post-Installation Configuration of Windows Server 2012 Overview of Windows Server 2012 Management Introduction to Windows PowerShell Lab: Deploying and Managing Windows Server 2012 After completing this module, students will be able to: Describe Windows Server 2012. Install Windows Server 2012. Perform post-installation configuration of Windows Server 2012. Describe the management tools available in Windows Server 2012. Perform basic administrative tasks using Windows PowerShell. Module 2: Introduction to Active Directory Domain Services This module covers the structure of Active Directory Domain Services (AD DS) and its various components, such as forest, domain, and organizational units (OUs). It also gives an overview of domain controllers, in addition to choices that are available with Windows Server 2012 for installing AD DS on a server. Lessons Overview of AD DS Overview of Domain Controllers Installing a Domain Controller Lab: Installing Domain Controllers After completing this module, students will be able to: Describe the structure of AD DS. Describe the purpose of domain controllers. Install a domain controller. Module 3: Managing Active Directory Domain Services Objects This module describes how to manage user accounts and computer accounts, including how to manage various consumer devices that employees use. The module also covers how to manage an enterprise network by managing groups, and how to delegate administrative tasks to designated users or groups. Lessons Managing User Accounts Managing Groups Managing Computer Accounts Delegating Administration Lab: Managing Active Directory Domain Services Objects After completing this module, students will be able to: Manage user accounts with graphical tools. Manage group accounts with graphical tools. Manage computer accounts. Delegate permissions to perform AD DS administration. Module 4: Automating Active Directory Domain Services Administration This module describes how to use command-line tools and Windows PowerShell to automate AD DS administration. It discusses various command-line tools and Windows PowerShell commands, and then describes how to use these tools and commands to modify objects individually and in bulk operations. Lessons Using Command-line Tools for AD DS Administration Using Windows PowerShell for AD DS Administration Performing Bulk Operations with Windows PowerShell Lab: Automating AD DS Administration by Using Windows PowerShell After completing this module, students will be able to: Use command-line tools for AD DS administration. Use Windows PowerShell cmdlets for AD DS administration. Perform bulk operations by using Windows PowerShell. Module 5: Implementing IPv4 This module discusses using IPv4, which is the network protocol used on the Internet and on local area networks. In this module, students learn how to implement an IPv4 addressing scheme and how to troubleshoot network communication. This module also covers how to determine and troubleshoot network-related problems. Lessons Overview of TCP/IP Understanding IPv4 Addressing Subnetting and Supernetting Configuring and Troubleshooting IPv4 Lab: Implementing IPv4 After completing this module, students will be able to: Describe the TCP/IP protocol suite. Describe IPv4 addressing. Determine a subnet mask necessary for supernetting or subnetting. Configure IPv4 and troubleshoot IPv4 communication. Module 6: Implementing Dynamic Host Configuration Protocol This module covers supporting and troubleshooting a Windows Server–based network infrastructure by deploying, configuring, and troubleshooting the Dynamic Host Configuration Protocol (DHCP) server role. Lessons Overview of the DHCP Server Role Configuring DHCP Scopes Managing a DHCP Database Securing and Monitoring DHCP Lab: Implementing DHCP After completing this module, students will be able to: Explain the DHCP server role. Configure DHCP scopes. Manage a DHCP database. Secure and monitor the DHCP server role.

Active Directory® Services with Windows Server®

Overview

Content

Module 1: Overview of Access and Information Protection This module provides an overview of multiple Access and Information Protection (AIP) technologies and services what are available with Windows Server 2012 and Windows Server 2012 R2 from a business perspective and maps business problems to technical solutions. It also includes coverage of Forefront Identify Manager (FIM). Lessons Introduction to Access and Information Protection Solutions in Business Overview of AIP Solutions in Windows Server 2012 Overview of FIM 2010 R2 Lab: Choosing an Appropriate Access and Information Protection Management Solution After completing this module students will be able to: Describe Access and Information Protection solutions in business. Describe Access and Information Protection solutions in Windows Server 2012 and Windows Server 2012 R2. Describe Microsoft Forefront Identity Manager (FIM) 2010 R2. Module 2: Advanced Deployment and Administration of AD DS This module explains how to deploy AD DS remotely and describes the virtualization safeguards, cloning abilities and extending AD DS to the cloud. Lessons Deploying AD DS Deploying and Cloning Virtual Domain Controllers Deploying Domain Controllers in Windows Azure Administering AD DS Lab: Deploying and Administering AD DS After completing this module, students will be able to: Describe and perform various deployment techniques for AD DS. Describe virtual domain controller deployment considerations. Explain how new technologies in Windows Server 2012 and Windows Server 2012 R2 support virtual domain controllers. Describe Domain Controller cloning. Implement AD DS using the tools provided in Windows Server 2012 and Windows Server 2012 R2. Module 3: Securing AD DS This module describes the threats to domain controllers and what methods can be used to secure the AD DS and its domain controllers. Lessons Securing Domain Controllers Implementing Account Security Implementing Audit Authentication Lab: Securing AD DS After completing this module, students will be able to: Understand the importance of securing domain controllers. Describe the benefit of read-only domain controllers (RODCs). Explain and implement password and account lockout policies. Implement audit authentication. Module 4: Implementing and Administering AD DS Sites and Replication This module explains how AD DS replicates information between domain controllers within a single site and throughout multiple sites. This module also explains how to create multiple sites and how to monitor replication to help optimize AD DS replication and authentication traffic. Lessons Overview of AD DS Replication Configuring AD DS Sites Configuring and Monitoring AD DS Replication Lab: Implementing AD DS Sites and Replication After completing this module, students will be able to: Describe AD DS replication. Configure AD DS sites. Configure and monitor AD DS replication. Module 5: Implementing Group Policy This module describes Group Policy, how it works, and how best to implement it within your organization. Lessons Introducing Group Policy Implementing and Administering GPOs Group Policy Scope and Group Policy Processing Troubleshooting the Application of GPOs Lab: Implementing and Troubleshooting a Group Policy Infrastructure After completing this module, students will be able to: Describe Group Policy. Implement and administer GPOs. Describe Group Policy scope and Group Policy processing. Troubleshoot the application of GPOs. Module 6: Managing User Settings with Group Policy This module describes how to how to use GPO Administrative Templates, Folder Redirection, and Group Policy features to configure users’ computer settings. Lessons Implementing Administrative Templates Configuring Folder Redirection and Scripts Configuring Group Policy Preferences Lab: Managing User Desktops with Group Policy After completing this module, students will be able to: Implement Administrative Templates. Configure Folder Redirection and scripts. Configure Group Policy preferences. Module 7: Deploying and Managing AD CS This module explain how to deploy and manage Certificate Authorities (CAs) with Active Directory Certificate Services (AD CS) Lessons Deploying CAs Administering CAs Troubleshooting, Maintaining, and Monitoring CAs Lab: Deploying and Configuring a Two-Tier CA Hierarchy After completing this module, students will be able to: Deploy Certificate Authorities. Administer Certificate Authorities. Troubleshoot, maintain, and monitor Certificate Authorities.

Prerequisite

Module 1: Overview of Access and Information Protection This module provides an overview of multiple Access and Information Protection (AIP) technologies and services what are available with Windows Server 2012 and Windows Server 2012 R2 from a business perspective and maps business problems to technical solutions. It also includes coverage of Forefront Identify Manager (FIM). Lessons Introduction to Access and Information Protection Solutions in Business Overview of AIP Solutions in Windows Server 2012 Overview of FIM 2010 R2 Lab: Choosing an Appropriate Access and Information Protection Management Solution After completing this module students will be able to: Describe Access and Information Protection solutions in business. Describe Access and Information Protection solutions in Windows Server 2012 and Windows Server 2012 R2. Describe Microsoft Forefront Identity Manager (FIM) 2010 R2. Module 2: Advanced Deployment and Administration of AD DS This module explains how to deploy AD DS remotely and describes the virtualization safeguards, cloning abilities and extending AD DS to the cloud. Lessons Deploying AD DS Deploying and Cloning Virtual Domain Controllers Deploying Domain Controllers in Windows Azure Administering AD DS Lab: Deploying and Administering AD DS After completing this module, students will be able to: Describe and perform various deployment techniques for AD DS. Describe virtual domain controller deployment considerations. Explain how new technologies in Windows Server 2012 and Windows Server 2012 R2 support virtual domain controllers. Describe Domain Controller cloning. Implement AD DS using the tools provided in Windows Server 2012 and Windows Server 2012 R2. Module 3: Securing AD DS This module describes the threats to domain controllers and what methods can be used to secure the AD DS and its domain controllers. Lessons Securing Domain Controllers Implementing Account Security Implementing Audit Authentication Lab: Securing AD DS After completing this module, students will be able to: Understand the importance of securing domain controllers. Describe the benefit of read-only domain controllers (RODCs). Explain and implement password and account lockout policies. Implement audit authentication. Module 4: Implementing and Administering AD DS Sites and Replication This module explains how AD DS replicates information between domain controllers within a single site and throughout multiple sites. This module also explains how to create multiple sites and how to monitor replication to help optimize AD DS replication and authentication traffic. Lessons Overview of AD DS Replication Configuring AD DS Sites Configuring and Monitoring AD DS Replication Lab: Implementing AD DS Sites and Replication After completing this module, students will be able to: Describe AD DS replication. Configure AD DS sites. Configure and monitor AD DS replication. Module 5: Implementing Group Policy This module describes Group Policy, how it works, and how best to implement it within your organization. Lessons Introducing Group Policy Implementing and Administering GPOs Group Policy Scope and Group Policy Processing Troubleshooting the Application of GPOs Lab: Implementing and Troubleshooting a Group Policy Infrastructure After completing this module, students will be able to: Describe Group Policy. Implement and administer GPOs. Describe Group Policy scope and Group Policy processing. Troubleshoot the application of GPOs. Module 6: Managing User Settings with Group Policy This module describes how to how to use GPO Administrative Templates, Folder Redirection, and Group Policy features to configure users’ computer settings. Lessons Implementing Administrative Templates Configuring Folder Redirection and Scripts Configuring Group Policy Preferences Lab: Managing User Desktops with Group Policy After completing this module, students will be able to: Implement Administrative Templates. Configure Folder Redirection and scripts. Configure Group Policy preferences. Module 7: Deploying and Managing AD CS This module explain how to deploy and manage Certificate Authorities (CAs) with Active Directory Certificate Services (AD CS) Lessons Deploying CAs Administering CAs Troubleshooting, Maintaining, and Monitoring CAs Lab: Deploying and Configuring a Two-Tier CA Hierarchy After completing this module, students will be able to: Deploy Certificate Authorities. Administer Certificate Authorities. Troubleshoot, maintain, and monitor Certificate Authorities.

Objective

Module 1: Overview of Access and Information Protection This module provides an overview of multiple Access and Information Protection (AIP) technologies and services what are available with Windows Server 2012 and Windows Server 2012 R2 from a business perspective and maps business problems to technical solutions. It also includes coverage of Forefront Identify Manager (FIM). Lessons Introduction to Access and Information Protection Solutions in Business Overview of AIP Solutions in Windows Server 2012 Overview of FIM 2010 R2 Lab: Choosing an Appropriate Access and Information Protection Management Solution After completing this module students will be able to: Describe Access and Information Protection solutions in business. Describe Access and Information Protection solutions in Windows Server 2012 and Windows Server 2012 R2. Describe Microsoft Forefront Identity Manager (FIM) 2010 R2. Module 2: Advanced Deployment and Administration of AD DS This module explains how to deploy AD DS remotely and describes the virtualization safeguards, cloning abilities and extending AD DS to the cloud. Lessons Deploying AD DS Deploying and Cloning Virtual Domain Controllers Deploying Domain Controllers in Windows Azure Administering AD DS Lab: Deploying and Administering AD DS After completing this module, students will be able to: Describe and perform various deployment techniques for AD DS. Describe virtual domain controller deployment considerations. Explain how new technologies in Windows Server 2012 and Windows Server 2012 R2 support virtual domain controllers. Describe Domain Controller cloning. Implement AD DS using the tools provided in Windows Server 2012 and Windows Server 2012 R2. Module 3: Securing AD DS This module describes the threats to domain controllers and what methods can be used to secure the AD DS and its domain controllers. Lessons Securing Domain Controllers Implementing Account Security Implementing Audit Authentication Lab: Securing AD DS After completing this module, students will be able to: Understand the importance of securing domain controllers. Describe the benefit of read-only domain controllers (RODCs). Explain and implement password and account lockout policies. Implement audit authentication. Module 4: Implementing and Administering AD DS Sites and Replication This module explains how AD DS replicates information between domain controllers within a single site and throughout multiple sites. This module also explains how to create multiple sites and how to monitor replication to help optimize AD DS replication and authentication traffic. Lessons Overview of AD DS Replication Configuring AD DS Sites Configuring and Monitoring AD DS Replication Lab: Implementing AD DS Sites and Replication After completing this module, students will be able to: Describe AD DS replication. Configure AD DS sites. Configure and monitor AD DS replication. Module 5: Implementing Group Policy This module describes Group Policy, how it works, and how best to implement it within your organization. Lessons Introducing Group Policy Implementing and Administering GPOs Group Policy Scope and Group Policy Processing Troubleshooting the Application of GPOs Lab: Implementing and Troubleshooting a Group Policy Infrastructure After completing this module, students will be able to: Describe Group Policy. Implement and administer GPOs. Describe Group Policy scope and Group Policy processing. Troubleshoot the application of GPOs. Module 6: Managing User Settings with Group Policy This module describes how to how to use GPO Administrative Templates, Folder Redirection, and Group Policy features to configure users’ computer settings. Lessons Implementing Administrative Templates Configuring Folder Redirection and Scripts Configuring Group Policy Preferences Lab: Managing User Desktops with Group Policy After completing this module, students will be able to: Implement Administrative Templates. Configure Folder Redirection and scripts. Configure Group Policy preferences. Module 7: Deploying and Managing AD CS This module explain how to deploy and manage Certificate Authorities (CAs) with Active Directory Certificate Services (AD CS) Lessons Deploying CAs Administering CAs Troubleshooting, Maintaining, and Monitoring CAs Lab: Deploying and Configuring a Two-Tier CA Hierarchy After completing this module, students will be able to: Deploy Certificate Authorities. Administer Certificate Authorities. Troubleshoot, maintain, and monitor Certificate Authorities.

Fundamentals of a Windows Server® Infrastructure

Overview

Content

Module 1: Installing and Configuring Windows Server 2012 This module explains how the Windows Server 2012 editions, installation options, optimal service and device configuration and general post-installation configuration all contribute to the functionality and effectiveness of your Windows Server implementation. Lessons Windows Server Architecture. Installing Windows Server. Configuring Services. Configuring Devices and Device Drivers. Lab: Installing and Configuring Windows Server 2012 After completing this module, student will be able to: Describe Windows Server components and architecture. Install Windows Server 2012. Configure services. Configure devices and device drivers. Module 2: Implementing Storage in Windows Server This module will introduce you to different storage technologies and discuss how to implement the storage solutions in Windows Server. There is also a discussion on how to create a resilient strategy for your storage, helping to avoid unplanned downtime and loss of data. Lessons Identifying Storage Technologies. Managing Disks and Volumes. Fault Tolerance. Lab: Implementing Storage in Windows Server After completing this module, students will be able to: Identify a suitable storage technology. Manage storage within Windows Server. Implement disk fault tolerance. Module 3: Understanding Network Infrastructure In this module, students will learn how to describe fundamental network component and terminology thus enabling the student to select an appropriate network component in a particular scenario. Lessons Network Architecture Standards. Local Area Networking. Wide Area Networking. Wireless Networking. Connecting to the Internet. Remote Access. Lab: Selecting Network Infrastructure Components After completing this module, students will be able to: Describe physical network topologies and standards. Define local area networks (LANs). Define wide area networks (WANs). Describe wireless networking technologies. Explain how to connect a network to the Internet. Describe how technologies are used for remote access. Module 4: Connecting Network Components This module explores the functionality of low-level networking components, including switches and routers. In addition, the module provides guidance on how best to connect these and other components together to provide additional network functionality. Lessons Understanding the OSI Model. Understanding Media Types. Understanding Adapters, Hubs, and Switches. Understanding Routing. Lab: Connecting Network Components After completing this module, students will be able to: Describe the industry standard protocol model. Describe wiring methodologies and standards. Describe adapters, hubs, and switches. Describe routing technologies and protocols. Module 5: Implementing TCP/IP This module describes the requirements of a protocol stack and then focuses on the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol stack. Lessons Overview of TCP/IP. IPv4 Addressing. IPv6 Addressing. Name Resolution. Lab: Implementing TCP/IP After completing this module, students will be able to: Describe the Functionality of the TCP/IP Suite. Describe IPv4 Addressing. Configure an IPv4 Network. Describe IPv6 Addressing and Transition. Describe the Various Name Resolution Methods Used by TCP/IP Hosts. Module 6: Implementing Windows Server Roles This module explains the functional requirements of a server computer and how to select and deploy appropriate server roles to support these functional requirements. Lessons Role-Based Deployment. Deploying Role-Specific Services. Considerations for Provisioning Roles. Lab: Implementing Server RolesLab: Implementing Server Roles After completing this module, students will be able to: Describe role-based deployment. Deploy role-specific servers. Describe deployment options for server roles.

Prerequisite

Module 1: Installing and Configuring Windows Server 2012 This module explains how the Windows Server 2012 editions, installation options, optimal service and device configuration and general post-installation configuration all contribute to the functionality and effectiveness of your Windows Server implementation. Lessons Windows Server Architecture. Installing Windows Server. Configuring Services. Configuring Devices and Device Drivers. Lab: Installing and Configuring Windows Server 2012 After completing this module, student will be able to: Describe Windows Server components and architecture. Install Windows Server 2012. Configure services. Configure devices and device drivers. Module 2: Implementing Storage in Windows Server This module will introduce you to different storage technologies and discuss how to implement the storage solutions in Windows Server. There is also a discussion on how to create a resilient strategy for your storage, helping to avoid unplanned downtime and loss of data. Lessons Identifying Storage Technologies. Managing Disks and Volumes. Fault Tolerance. Lab: Implementing Storage in Windows Server After completing this module, students will be able to: Identify a suitable storage technology. Manage storage within Windows Server. Implement disk fault tolerance. Module 3: Understanding Network Infrastructure In this module, students will learn how to describe fundamental network component and terminology thus enabling the student to select an appropriate network component in a particular scenario. Lessons Network Architecture Standards. Local Area Networking. Wide Area Networking. Wireless Networking. Connecting to the Internet. Remote Access. Lab: Selecting Network Infrastructure Components After completing this module, students will be able to: Describe physical network topologies and standards. Define local area networks (LANs). Define wide area networks (WANs). Describe wireless networking technologies. Explain how to connect a network to the Internet. Describe how technologies are used for remote access. Module 4: Connecting Network Components This module explores the functionality of low-level networking components, including switches and routers. In addition, the module provides guidance on how best to connect these and other components together to provide additional network functionality. Lessons Understanding the OSI Model. Understanding Media Types. Understanding Adapters, Hubs, and Switches. Understanding Routing. Lab: Connecting Network Components After completing this module, students will be able to: Describe the industry standard protocol model. Describe wiring methodologies and standards. Describe adapters, hubs, and switches. Describe routing technologies and protocols. Module 5: Implementing TCP/IP This module describes the requirements of a protocol stack and then focuses on the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol stack. Lessons Overview of TCP/IP. IPv4 Addressing. IPv6 Addressing. Name Resolution. Lab: Implementing TCP/IP After completing this module, students will be able to: Describe the Functionality of the TCP/IP Suite. Describe IPv4 Addressing. Configure an IPv4 Network. Describe IPv6 Addressing and Transition. Describe the Various Name Resolution Methods Used by TCP/IP Hosts. Module 6: Implementing Windows Server Roles This module explains the functional requirements of a server computer and how to select and deploy appropriate server roles to support these functional requirements. Lessons Role-Based Deployment. Deploying Role-Specific Services. Considerations for Provisioning Roles. Lab: Implementing Server RolesLab: Implementing Server Roles After completing this module, students will be able to: Describe role-based deployment. Deploy role-specific servers. Describe deployment options for server roles.

Objective

Module 1: Installing and Configuring Windows Server 2012 This module explains how the Windows Server 2012 editions, installation options, optimal service and device configuration and general post-installation configuration all contribute to the functionality and effectiveness of your Windows Server implementation. Lessons Windows Server Architecture. Installing Windows Server. Configuring Services. Configuring Devices and Device Drivers. Lab: Installing and Configuring Windows Server 2012 After completing this module, student will be able to: Describe Windows Server components and architecture. Install Windows Server 2012. Configure services. Configure devices and device drivers. Module 2: Implementing Storage in Windows Server This module will introduce you to different storage technologies and discuss how to implement the storage solutions in Windows Server. There is also a discussion on how to create a resilient strategy for your storage, helping to avoid unplanned downtime and loss of data. Lessons Identifying Storage Technologies. Managing Disks and Volumes. Fault Tolerance. Lab: Implementing Storage in Windows Server After completing this module, students will be able to: Identify a suitable storage technology. Manage storage within Windows Server. Implement disk fault tolerance. Module 3: Understanding Network Infrastructure In this module, students will learn how to describe fundamental network component and terminology thus enabling the student to select an appropriate network component in a particular scenario. Lessons Network Architecture Standards. Local Area Networking. Wide Area Networking. Wireless Networking. Connecting to the Internet. Remote Access. Lab: Selecting Network Infrastructure Components After completing this module, students will be able to: Describe physical network topologies and standards. Define local area networks (LANs). Define wide area networks (WANs). Describe wireless networking technologies. Explain how to connect a network to the Internet. Describe how technologies are used for remote access. Module 4: Connecting Network Components This module explores the functionality of low-level networking components, including switches and routers. In addition, the module provides guidance on how best to connect these and other components together to provide additional network functionality. Lessons Understanding the OSI Model. Understanding Media Types. Understanding Adapters, Hubs, and Switches. Understanding Routing. Lab: Connecting Network Components After completing this module, students will be able to: Describe the industry standard protocol model. Describe wiring methodologies and standards. Describe adapters, hubs, and switches. Describe routing technologies and protocols. Module 5: Implementing TCP/IP This module describes the requirements of a protocol stack and then focuses on the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol stack. Lessons Overview of TCP/IP. IPv4 Addressing. IPv6 Addressing. Name Resolution. Lab: Implementing TCP/IP After completing this module, students will be able to: Describe the Functionality of the TCP/IP Suite. Describe IPv4 Addressing. Configure an IPv4 Network. Describe IPv6 Addressing and Transition. Describe the Various Name Resolution Methods Used by TCP/IP Hosts. Module 6: Implementing Windows Server Roles This module explains the functional requirements of a server computer and how to select and deploy appropriate server roles to support these functional requirements. Lessons Role-Based Deployment. Deploying Role-Specific Services. Considerations for Provisioning Roles. Lab: Implementing Server RolesLab: Implementing Server Roles After completing this module, students will be able to: Describe role-based deployment. Deploy role-specific servers. Describe deployment options for server roles.

Get In Touch

Contact Us

Toll-Free: 1-855-380-1488

Calgary: 403-879-8882

Edmonton: 587-882-2880

Locations

Calgary Campus

Suite 109, 11012 Macleod Trail South

Calgary, Alberta T2J 6A5

Remote Support

ReTrain AnyDesk Client
  • LinkedIn Social Icon
  • Facebook

Copyright © 2018 ReTrain Canada - All Rights Reserved.