Windows Server 2012 & 2016 Classes, Training in Nanded


Why MCSE ?

The MCITP certification is a Professional Series certification that tests network and systems administrators on ....... Enroll Now

MCITP Requirements

Candidates for the MCITP: Enterprise Administrator certification on Windows Server 2008 must pass a total of five Windows Server 2008 core exams. The core examinations are Windows Server 2008 Active Directory, Configuring (70-640); Windows Server 2008 Network Infrastructure, Configuring (70-642); and Windows Server 2008 Applications Infrastructure, Configuring (70-643). For the elective, you must take either the Configuring Windows Vista Client (70-620) exam or the Deploying and Maintaining Windows Vista Client and 2007 Microsoft Office System Desktops (70-624) exam. This culminates with the Windows Server 2008 Enterprise Administrator (70-647) exam.

Syllabus

Page 1

  • Windows Server 2008 Enterprise Administrator (70-647) exam
  • Designing a Complex Windows Server 2008 Infrastructure
  • Overview of Design Models
  • Designing a Forest Structure
  • Designing an Active Directory Domain Structure
  • Overview of Forest and Domain Trust Models
  • Overview of Physical Requirements and Physical Topology
  • Overview of Site and Replication Topology
  • Choosing Server Roles

  • Planning Naming Conventions, Networking, and Access Principles
  • Network Addressing
  • Naming Conventions for Windows Server 2008
  • Planning for Network Access

  • Planning for Forestwide and Domainwide Upgrades with Server 2008
  • The Essence of Migration
  • Using the Active Directory Migration Tool
  • Using Caution with Migration
  • Migrating Objects
  • Options with the Active Directory Migration Tool (ADMT
  • Migrating User Accounts
  • Migrating Computer Accounts
  • Cross-forest Authentication
  • Planning for Upgrades in an Existing Forest

  • Planning for Terminal Services and Application Virtualization
  • Reviewing Terminal Services’ Roles
  • Terminal Services Server Load
  • Terminal Services Licensing
  • Terminal Services Gateway
  • Terminal Services Session Broker
  • Terminal Services Web Access
  • Terminal Services Group Policy Options and Changes
  • Terminal Services Maintenance and Error Recovery
  • Application Virtualization
  • Scaling an Enterprise with Application Virtualization
  • SoftGrid Infrastructure Planning and Design

  • Designing an Effective Administration Model
  • Object Essentials
  • OU Design Requirements
  • Groups in Active Directory
  • Group Scope
  • Planning for Groups
  • Planning Delegation
  • Inheritance
  • Using the Security Configuration Wizard

  • Planning and Designing Group Policy
  • Understanding Group Policy Scope
  • Applying Group Policy
  • Understanding Loopback Processing
  • Understanding Group Policy Security Filtering
  • Planning Group Policy
  • Working with the Default Domain Policy and Domain Controllers Policy
  • Delegating Group Policy Administration
  • Exploring New Windows Server 2008 Group Policy Features
  • Configuring Automatic Updates with Group Policy
  • Restricting Group Membership with Group Policy
  • Controlling User Installation of Devices
  • Searching GPOs
  • Using the Group Policy Modeling Tool

  • Administering Security in an Enterprise-Level Infrastructure
  • Enterprise Security Concerns
  • Using Windows Server 2008 PKI Additions in a Legacy Environment
  • Designing a Certificate Authority Hierarchy
  • Modeling Your Structure
  • Design Factors
  • X.509
  • Using Certificate-Monitoring Tools
  • Reasons for a PKI
  • Components of the Public Key Infrastructure
  • Certificate Authority Roles
  • Using the Online Certificate Status Protocol
  • OCSP Components
  • Working with Certificate Templates
  • Using Cryptography Next Generation
  • Managing External Clients
  • Enrollment Strategies
  • Types of Enrollment
  • Enrollment Agents and Restricted Enrollment Agents
  • The Network Device Enrollment Service
  • Virtual Private Networks and Security

  • Page 2

    Planning for Business Continuity and Backup
  • Introducing RAID
  • Introducing the Distributed File System
  • Introducing Failover Clustering
  • Introducing Quorums
  • Introducing Network Load Balancing
  • Using Windows Server Backup Tools
  • Introducing the Encrypting File System
  • Introducing Windows BitLocker
  • Recovering Active Directory Domains Services
  • Introducing Windows Recovery Environment
  • Using Windows Recovery
  • Using Volume Shadow Copy
  • Using Server Core
  • Introducing Active Directory Rights

  • Designing a Windows Update Strategy for the Enterprise
  • Establishing a Security Baseline
  • The Microsoft Baseline Security Analyzer Tool
  • System and Environment Health Models
  • Planning and Implementing Windows
  • WSUS Options
  • Overview of System Center Essentials 2007
  • Overview of System Center Configuration Manager 2007
  • Overview of Windows Update
  • Overview of Microsoft Update
  • Real-World Update Practices
  • Update Compliance

  • Using Virtualization to Increase Productivity and Facilitate Consolidation e
  • Introducing Virtualization
  • The Different Types of Virtualization
  • Introducing Server Consolidation
  • Understanding Virtualized Machine Components
  • Network Setups with All Types of Virtual Machines
  • Virtual Networks
  • Multiple Network Interface Cards with Virtual Networks
  • Installing Hyper-V
  • Introducing iSCSI
  • Windows Vista x64 Hyper-V Management
  • Server Core and Virtualization
  • Using System Center Virtual Machine Manager 2007
  • Using Virtual Server 2005 R2

  • MCITP 70-640 TRAINING COURSE
  • Configuring Domain Name System (DNS) for Active Directory
  • Configure zones.
  • Configure DNS server settings
  • Configure zone transfers and replication.

  • Configuring the Active Directory infrastructure
  • Configure a forest or a domain
  • Configure trusts
  • Configure sites
  • Configure Active Directory replication
  • Configure the global catalog
  • Configure operations masters

  • Configuring Active Directory Roles and Services
  • Configure Active Directory Lightweight Directory Service (AD LDS)
  • Configure the read-only domain controller (RODC)
  • Configure Active Directory Federation Services (AD FSv2)

  • Creating and maintaining Active Directory objects
  • Automate creation of Active Directory accounts
  • Maintain Active Directory accounts
  • Configure GPO templates
  • Deploy and manage software by using GPOs.
  • Configure account policies

  • Maintaining the Active Directory environment
  • Configure backup and recovery.
  • Perform offline maintenance
  • Monitor Active Directory

  • Configuring Active Directory Certificate Services
  • Install Active Directory Certificate Services
  • Configure CA server settings.
  • Manage enrollment
  • Manage certificate revocations
  • Page 3

  • Installing and Configuring Windows Server® 2012 Exam 70-410
  • Installing Servers
  • Performing a Clean Installation
  • Performing an Upgrade Installation
  • Installing Windows Server Migration Tools (WSMT)
  • Accessing a WSMT Distribution Point

  • Configuring Servers
  • Completing PostInstallation Tasks
  • Adding Roles and Features
  • Converting the GUI Interface to Server Core
  • Using the Server Core Interface

  • Configuring Local Storage
  • Initializing Disks
  • Creating Simple Volumes
  • Creating a Storage Pool
  • Removing Storage Components

  • Configuring File and Share Access
  • Sharing a Folder
  • Testing Share Access
  • Working with NTFS Permissions
  • Creating Shares with Server Manager
  • Creating Shares with Windows PowerShell

  • Configuring Print and Document Services
  • Installing a Printer
  • Deploying Printers Using Active Directory
  • Scheduling Printer Access
  • Creating a Printer Pool

  • Configuring Servers for Remote Management
  • Adding Servers to Server Manager
  • Working with Remote Servers
  • Configuring Windows Firewall
  • Using Remote Server Administration Tools

  • Creating and Configuring Virtual Machine Settings
  • Installing the Hyper-V Role
  • Creating a Virtual Machine
  • Creating a Virtual Machine Using Windows PowerShell
  • Configuring Dynamic Memory
  • Configuring Dynamic Memory Using Windows PowerShell

  • Creating and Configuring Virtual Machine Storage
  • Creating a Virtual Hard Disk
  • Editing a Virtual Hard Disk File
  • Creating a Virtual Machine with an Existing Virtual Hard Disk
  • Creating a Pass-Through Disk
  • Creating a Snapshot

  • Creating and Configuring Virtual Networks
  • Creating a Virtual Switch
  • Creating a Virtual Network
  • Creating an Isolated Network

  • Configuring IPv4 and IPv6 Addressing
  • Calculating IP Addresses
  • Manually Configuring TCP/IP
  • Configuring TCP/IP Using Windows PowerShel
  • Testing Network Connections

  • Deploying and Configuring the DHCP Service
  • Installing the DHCP Server Role
  • reating a DHCPv4 Scope
  • Creating a DHCPv6 Scope
  • Activating DHCP
  • Confirming DHCP

  • Deploying and Configuring the DNS Service
  • Designing a DNS Namespace
  • Remote DNS Administration
  • Creating a DNS Zone
  • Creating DNS Domains
  • Creating DNS Resource Records
  • Using Reverse Name Resolution

  • Installing Domain Controllers
  • Installing Active Directory Domain Services Role
  • Creating a New Forest
  • Creating a Child Domain
  • Installing AD DS on Server Core

  • Creating and Managing Active Directory Users and Computers
  • Creating Computer Objects
  • Creating a Single User
  • Using Active Directory Administrative Center
  • Creating Users with Windows PowerShell
  • Creating Multiple Users with LDIFDE

  • Page 4

    Creating and Managing Active Directory Groups and Organizational Units
  • Creating Organizational Units
  • Creating Domain Local Groups
  • Creating Global Groups
  • Nesting Groups
  • Delegating Administration

  • Creating Group Policy Objects
  • Installing Group Policy Management
  • Creating a Starter GPO
  • Creating Group Policy Objects
  • Linking a Group Policy Object
  • Confirming GPO Application

  • Configuring Security Policies
  • Configuring Security Policies
  • Assigning User Rights
  • Configuring Audit Policies
  • Viewing Auditing Data

  • Configuring Application Restriction Policies
  • Configuring Software Restriction Policies
  • Using AppLocker
  • Creating Additional Rules

  • Configuring Windows Firewall
  • Installing Internet Information Services
  • Testing IIS Connectivity
  • Allowing Apps through the Windows Firewall Control Panel
  • Creating Windows Firewall Rules
  • Creating an FTP Server Rule

  • Many More.....

  • Some of the other Classes / Training...





    Know 5 Solid Reasons to join our training / Class

    1] Most experienced , Trainers

    All our trainers are the most experienced (+10 years) certified. and certified on multiple technologies. They really know the subject very well. There is an open secret: "Everything in training is totally depends on the trainer knowledge." So, we don't have appointed any fresher faculty for any single subject. .....

    Read More..

    HomeComputerPrinterAntivirusNetworkingWeb ServiceContact Us

    © 2016 Developed By Gaurav Sontakke & Vinay Pawar Degloor Dist Nanded .