IT Networking Training Catalog – 70-413 – Designing and Implementing a Server Infrastructure (MCSE) Series!

Overview: This series covers everything you need to know about designing and implementing a server infrastructure. Students will learn about server infrastructure upgrade and migration, storage and file services, designing a physical AD infrastructure, and planning for external user access. Students will also learn about designing and implementing logical AD infrastructure, AD GPO, network infrastructure services, and domain controllers.

Certification Details

This certification validates that you have the skills needed to run a highly efficient and modern data center, with expertise in identity management, systems management, virtualization, storage, and networking. It confirms that a candidate has the skills and knowledge necessary for designing, deploying, and maintaining infrastructure services in a Windows Server 2012 environment.

Certification Exam Details:
Designing and Implementing a Server Infrastructure – Exam 70-413: Learn More about this certification exam.

Series Taught By: Sandra Batakis

Available CEUs for Course Series Completion: 16
Students can earn up to 16 CEUs for fully completing this course series. This information will be displayed on the certificate of completion. Learn More

$75.00Add to cart

Course Modules

(Duration: 2h 14m)

  1. Workbook (Pdf)
  2. Server Infrastructure – Upgrade and Migration
  3. Planning for Deployment
  4. Windows Server Editions
  5. Choice Summary
  6. Pre-installation Requirements
  7. Windows Server 2012 Upgrades
  8. Upgrade Options
  9. Migration to Windows Server 2012
  10. Roles That Can Be Migrated
  11. Roles That Can Be Combined on a Single Server
  12. MAP Toolkit
  13. Windows Assessment and Deployment Kit (ADK)
  14. Windows Server 2012 Licensing
  15. Activation Strategies
  16. Considerations for Virtualization
  17. Virtualization Planning
  18. Hyper-V Virtual Licensing
  19. Planning Hardware for Hyper-V Hosts
  20. Deployment Considerations for Virtualized Workloads
  21. Tools for Deploying Virtual Machines
  22. Virtual Machines and Domain Controllers
  23. Cloning Domain Controllers
  24. Demo – Cloning Domain Controllers
  25. VHDs
  26. VHDXs
  27. Imaging Strategies
  28. Windows Imaging Format
  29. WIM File Structure
  30. High Touch Retail Media Deployments
  31. High Touch with Retail Media Deployment Steps
  32. High Touch Standard Image Deployment
  33. High Touch with Standard Image Process
  34. Lite Touch
  35. Zero Touch High-Volume Deployments
  36. Designing the ZTI Environment
  37. Automated Deployment Methods
  38. Types of Images
  39. Choosing a Deployment Method
  40. Deployment Scenarios
  41. Tools for Image
  42. -Based Installation of Windows
  43. ImageX Tasks
  44. Image Servicing and Management: DISM
  45. Windows AIK
  46. Tools Available in Windows AIK
  47. Demo
  48. – Installing Windows AIK
  49. Windows PE
  50. Windows DS
  51. Windows DS Architecture
  52. New Features in Windows DS
  53. MDT 2012
  54. Configuration Manager
  55. Configuration Manager Task Sequence and Packages
  56. Module 01 Review
  57. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 1h 38m)

  1. Workbook (Pdf)
  2. Storage and File Services
  3. Direct Attached Storage (DAS)
  4. Network Attached Storage (NAS)
  5. Storage Area Network (SAN)
  6. SAN Components
  7. iSCSI
  8. iSCSI Target Server and iSCSI Initiator
  9. iSCSI Target Server Scenarios
  10. Windows Server 2012 R2 New and Changed Functionality
  11. iSCSI and High
  12. -Availability
  13. Defense in Depth
  14. DFS
  15. DFSR Replication
  16. Standalone DFS Namespace
  17. Domain DFS Namespace
  18. DFS Uses
  19. Demo
  20. – Deploying and Configuring DFS
  21. BranchCache
  22. BranchCache Modes
  23. Procedure Reference to Install
  24. Demo
  25. – Implementing BrancheCache
  26. Discretionary Access Control
  27. Dynamic Access Control
  28. DAC Scenarios
  29. DAC Requirements
  30. Central Access Policy
  31. Creating Central Access Policies
  32. Implementing Central Access Policy
  33. DAC Claims
  34. Creating Claims
  35. Resource Properties
  36. Accessing Resources with DAC
  37. Enabling Support in AD DS KDC
  38. Creating Resource Properties
  39. Central Access Control Rules
  40. File Access Auditing
  41. Planning for Access Denied Assistance
  42. Dynamic Access Control Prerequisites
  43. Module 02 Review
  44. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 2h 51m)

  1. Workbook (Pdf)
  2. Network Infrastructure Services
  3. Best Practices for Designing an IPv4 Addressing Scheme
  4. How to Plan and Implement the Appropriate Addressing Scheme
  5. Selecting an Address Scheme (eNotes)
  6. DHCP Server Placement Infrastructure
  7. DHCP Redundancy Options
  8. DHCP Failover
  9. DHCP Super Scopes
  10. DHCP Reservations
  11. DHCP Option Classes
  12. IPv6 Autoconfiguration
  13. Autoconfigured Address States
  14. Improved PowerShell Commands for DHCP in Server 2012 R2
  15. New PowerShell Commands for DHCP
  16. New PowerShell Commands for DHCP (Cont)
  17. DHCP Guidelines
  18. IPAM Definition and Benefits
  19. IPAM
  20. IPAM and DHCP
  21. IPAM Components
  22. Role Based Access Control
  23. Role Based Access Control Roles Provided by Default
  24. IPAM Prerequisites
  25. IPAM Database Support
  26. IPAM Users and Groups
  27. Manual Provisioning for IPAM
  28. Manual Provisioning for IPAM (Cont)
  29. IPAM Design Considerations
  30. IPAM Views
  31. IPAM Monitoring
  32. DNS Namespace Design
  33. Evaluating a Namespace Design
  34. DNS Namespaces (eNotes)
  35. NetBIOS Name Resolution
  36. GlobalNames
  37. WINS vs. GNZ
  38. DNS and AD DS
  39. DNS Records Needed by AD
  40. Demo – DNS Records Needed by AD
  41. DNS Design Considerations
  42. Integrating Multiple DNS Namespaces
  43. DNS Application Partitions
  44. DNS Server Capacity Planning
  45. Demo – Performance Monitor and DNS
  46. DNS Server Roles
  47. DNS Zone Types
  48. DNS Zone Delegation
  49. Zone Transfers and Replications
  50. DNS BIND Versions
  51. Zone Transfer Security
  52. Root Hints Servers
  53. Optimizing DNS Root Hints
  54. DNS Forwarders | Conditional | Stub Zones
  55. Demo
  56. – Configuring Zone Transfers
  57. NetBIOS Name Resolution (Cont.)
  58. Demo
  59. – Creating DNS Zones
  60. Optimizing Queries
  61. Optimizing DNS Server
  62. Optimizing Active Directory Integrated Zones
  63. DNS and High
  64. -Availability
  65. Common DNS Security Issues
  66. DNS Security Levels
  67. Additional DNS Security Settings
  68. Module 03 Review
  69. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 2h 05m)

  1. Workbook (Pdf)
  2. Planning for External User Access
  3. Types of Network Access Services
  4. Types of Users
  5. Considerations of Data to Access
  6. Remote Access Methods
  7. Tunneling Protocols: PPTP
  8. Tunneling Protocols: L2TP
  9. Tunneling Protocols: SSTP
  10. Tunneling Protocols: IKEv2
  11. Authentication Protocols and Methods
  12. Encryption Protocols and Methods Set
  13. Planning for Remote Access
  14. New Features in Remote Access Windows Server 2012
  15. New Features Windows 8.1
  16. Placement of VPN Servers
  17. Network Access Policies
  18. Connection Request Policies
  19. How Policies are Applied
  20. Order of Applying Connections
  21. Demo
  22. – Creating a VPN
  23. Perimeter Networks
  24. Common Perimeter Network Applications and Protocols
  25. Types of Firewall Configurations
  26. Windows Firewall with Advanced Security
  27. Secure Outside Access Options
  28. DirectAccess
  29. DirectAccess Server Functions
  30. DirectAccess Infrastructure Prerequisites
  31. DirectAccess Server Prerequisites
  32. DirectAccess Client Prerequisites
  33. Methods of Client Connections
  34. DirectAccess Client Connections
  35. Planning DirectAccess
  36. Getting Ready: DirectAccess
  37. Configure DirectAccess Server
  38. DirectAccess with a Single Network Card
  39. RADIUS Authentication and NPS
  40. NPS RADIUS Server
  41. RADIUS Proxy
  42. RADIUS Client
  43. RADIUS Client Examples
  44. Connection Request Policies Conditions | Settings
  45. Conditions | Settings | Default Connection Policy
  46. Connection Request Processing
  47. Network Security
  48. Defense in Depth
  49. Network Policies
  50. Points of Failure for Security Policies
  51. Employee Training
  52. Reasons For Network Attacks
  53. Types of Network Attacks
  54. STRIDE Model
  55. Security Measures
  56. Windows Firewall
  57. Connection Security Rules
  58. IPsec
  59. Server and Domain Isolation
  60. Authentication Options
  61. Best Practices
  62. Demo – Connection Security Rules
  63. Module 04 Review
  64. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 3h 38m)

  1. Workbook (Pdf)
  2. Design and Implement Logical AD Infrastructure
  3. AD DS Forest Designed
  4. Forest Models: Single
  5. Forest Models: Organizational
  6. Forest Models: Resource Forest Model
  7. Forest Models: Restricted Access
  8. Benefits of Multiple Forests
  9. Guidelines for Designing AD DS Forests
  10. Demo – Creating a Forest Root
  11. Demo – Viewing and Editing the Schema
  12. Forest Trusts
  13. Security Considerations Forest Trust
  14. Accessing Resources in Another Forest
  15. Forest Trust Guidelines
  16. Demo – Creating a Forest Trust
  17. AD DS Domains
  18. Domain Models
  19. Forest Root Domains
  20. Password Policies
  21. Demo – Install Second Domain Controller to Domain
  22. Items That Affected Domain Design
  23. Replication and WAN Links
  24. Trust Relationships
  25. Trusts within a Domain
  26. Trusts Between Domains
  27. Shortcut Trusts
  28. External Trusts
  29. Realm Trusts
  30. Best Practice for Domain Trusts
  31. AD Delegation Options
  32. Delegation Models
  33. Examples of Delegation
  34. Administrative Models
  35. How to Start Planning Resource Management
  36. Administrative Permissions
  37. Branch Office Management
  38. OU Strategies
  39. Users and Permissions
  40. OU Security Descriptors
  41. Demo – Exploring AD Permissions within OU Structure
  42. Delegation Administrative Methods
  43. Where OU Permissions Fall
  44. Examples of Permissions at OU Level (eNotes)
  45. OU Accidental Deletion
  46. Protecting OUs using PowerShell
  47. Demo – Protecting OUs using PowerShell
  48. Active Directory Groups
  49. Group Scope and Nesting
  50. Demo – Creating Groups with Active Directory Administration Center
  51. Demo – Creating Groups with PowerShell
  52. Group Strategy
  53. Default Groups
  54. Protected Users Security Group
  55. Protected Users Security Group User Limitations
  56. Special Identities
  57. Computer Accounts
  58. Best Practices
  59. Module 05 Review
  60. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 51m)

  1. Workbook (Pdf)
  2. AD GPO
  3. Factors for Group Policy Design
  4. Planning for Desktop Environments with Group Policy
  5. Planning Group Policy for Administrative Models
  6. Group Policy Components
  7. Uses for Group Policy
  8. Demo – Group Policy Categories
  9. Group Policy Templates
  10. Nodes: Computer
  11. Nodes: User
  12. Group Policy Preferences
  13. Configuring Group Policy Preference
  14. GPO Design Considerations
  15. Group Policy Inheritance
  16. Group Policy Filtering
  17. Group Policy Processing
  18. Group Policy, Backup and Restore and Documentation
  19. PowerShell Cmdlets
  20. Migrating GPOs to a New Domain Set
  21. Migration Table Editor
  22. Administration of Group Policy
  23. Slow Link Detection
  24. Module 06 Review
  25. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 41m)

  1. Workbook (Pdf)
  2. Designing a Physical AD Infrastructure
  3. AD DS Sites
  4. Location of AD DS Site Configuration
  5. Replication Traffic
  6. Service Localization
  7. Designing AD DS Sites
  8. Factors that Determine AD DS Site Design
  9. Automatic Site Coverage
  10. AD DS and DNS
  11. AD DS Site Considerations
  12. Domain Controller Placement
  13. AD DS Replication Components: Connection Objects
  14. AD DS Replication Components: Notification and Polling
  15. KCC
  16. ISTG
  17. – Intersite Topology Generator
  18. Replication Topologies: Ring
  19. Replication Topologies: Hub and Spoke
  20. Replication Topologies: Full Mesh
  21. Replication Topologies: Hybrid
  22. Replication Protocols
  23. Notes on SMTP
  24. Replication and RODCs
  25. Replication and Global Catalogs
  26. Replication and SYSVOL
  27. Site Links
  28. Bridgehead Servers
  29. Site Link Bridging
  30. Virtualized Domain Controllers
  31. Cloning Virtual Domain Controllers
  32. Process: Cloning Server 2012 VDC
  33. DcCloneConfig.xml Syntax
  34. DcCloneConfig.xml Parameters
  35. Domain Controller Safe Backup and Restore
  36. PowerShell for Hyper
  37. -V Snapshot Management
  38. Module 07 Review
  39. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 36m)

  1. Workbook (Pdf)
  2. Domain Controllers
  3. Hardware Requirements for Domain Controllers
  4. Installing Server Core
  5. FSMO Roles
  6. FSMO Locations
  7. RODC Limitations
  8. Tools For Monitoring Domain Controllers
  9. Best Practices Analyzer
  10. Demo – Best Practices Analyzer
  11. Security Best Practices
  12. High-Availability
  13. Defining High-Availability Needs for Active Directory
  14. Active Directory, High-Availability
  15. DNS High-Availability
  16. Backup and Recovery AD DS
  17. Types of Backups
  18. Backing Up Critical Volumes
  19. Active Directory Restores
  20. Restoring Active Directory
  21. Active Directory Recycle Bin
  22. Module 08 Review
  23. Course Closure
  24. Review Quiz (Number of attempts allowed: Unlimited)

This course includes

  • about 14.40 hours on-demand video
  • 8 downloadable Pdf Workbooks
  • Unlimited time access (During Membership)
  • Access on mobile and Desktop
  • Certificate of Completion

Course Features Include:

  • Expert Lectures
    Learn on-demand from top instructors who are industry subject matter experts. Our highly certified expert instructors possess a superior understanding of the subject matter in their fields and have the ability to convey this knowledge in an effective, engaging, and professional manner to a wide audience.

  • Certificates of Completion
    Upon completion of a series of courses you can earn a certificate of completion from Career Academy. Certificates of Completion will display your full name, course completed, as well as the date of completion. Students have the ability to print this out or save it digitally to showcase your accomplishment.

  • PowerPoint Visuals:
    Many of the in-depth theories and processes discussed in our courses can be learned most efficiently through the detailed PowerPoint slides presented. These visuals are accompanied by an instructor voice-over to provide our students with a clear, efficient, and complete presentation of concepts.

  • Professional Development Activities
    Students are provided access to professional development activity files which allow for an individual to test out course theories and apply the knowledge they earned from the course.

  • Review Quizzes
    Once a course is completed, test your knowledge by taking our course review quiz! Students have the ability to retake any review quizzes as many times as they wish to ensure they understand the material or to improve upon their scores.

  • Mobile Access
    With our universal course player, you can learn from your computer, tablet as well as mobile devices. Keep up with your training on the go!

Trusted by Aspiring IT Professionals, Corporations and
Government agencies
for more than a Decade

Get unlimited online access learn anywhere, anytime using your computer or mobile device!