The 70-647: Microsoft Windows Server 2008 R2 Enterprise Administration online training course is designed to provide students with the knowledge and skills to plan and deploy networking technologies associated with a Microsoft Windows Server 2008 R2 network infrastructure. This online training course also includes networking services, application deployment, Terminal Services, Virtualization, and Active Directory.

Course Instructor: Doug Bassett

Course Outline

01. Chapter 1: Designing a Complex Microsoft Windows Server 2008 Infrastructure

  • Overview of Design Models
  • Designing a Forest Structure
  • Designing an Active Directory Domain Structure
  • Overview of Forest and Domain Trust Models
  • Overview of Physical Requirements and Physical Topology
  • Overview of Site and Replication Topology
  • Choosing Server Roles

02. Chapter 2: Planning Naming Conventions, Networking, and Access Principles

  • Network Addressing
  • Naming Conventions for Windows Server 2008
  • Planning for Network Access

03. Chapter 3: Planning for Forestwide and Domainwide Upgrades with Server 2008

  • The Essence of Migration
  • Using the Active Directory Migration Tool
  • Using Caution with Migration
  • Migrating Objects
  • Options with the Active Directory Migration Tool (ADMT)
  • Migrating User Accounts
  • Migrating Computer Accounts
  • Cross-forest Authentication
  • Planning for Upgrades in an Existing Forest

04. Chapter 4: Planning for Terminal Services and Application Virtualization

  • Reviewing Terminal Services’ Roles
  • Terminal Services Server Load
  • Terminal Services Licensing
  • Terminal Services Gateway
  • Terminal Services Session Broker
  • Terminal Services Web Access
  • Terminal Services Group Policy Options and Changes
  • Terminal Services Maintenance and Error Recovery
  • Application Virtualization
  • Scaling an Enterprise with Application Virtualization

05. Chapter 5: Designing an Effective Administration Model

  • Object Essentials
  • OU Design Requirements
  • Groups in Active Directory
  • Group Scope
  • Planning for Groups
  • Planning Delegation
  • Inheritance
  • Using the Security Configuration Wizard for Compliance Auditing

06. Chapter 6: Planning and Designing Group Policy

  • Understanding Group Policy Scope
  • Applying Group Policy
  • Understanding Loopback Processing
  • Understanding Group Policy Security Filtering
  • Planning Group Policy
  • Working with the Default Domain Policy and Domain Controllers
  • Policy
  • Delegating Group Policy Administration
  • Exploring New Windows Server 2008 Group Policy Features
  • Configuring Automatic Updates with Group Policy
  • Restricting Group Membership with Group Policy
  • Controlling User Installation of Devices
  • Searching GPOs
  • Using the Group Policy Modeling Tool

07. Chapter 7: Administering Security in an Enterprise-Level Infrastructure

  • Enterprise Security Concerns
  • Using Windows Server 2008 PKI Additions in a Legacy Environment
  • Designing a Certificate Authority Hierarchy
  • Modeling Your Structure
  • Following the Administrative Structure
  • Following an Independent Structure
  • Design Factors
  • X.509
  • Using Certificate-Monitoring Tools
  • Reasons for a PKI
  • Components of the Public Key Infrastructure
  • Certificate Authority Roles
  • Using the Online Certificate Status Protocol
  • OCSP Components
  • Working with Certificate Templates
  • Using Cryptography Next Generation
  • Managing External Clients
  • Enrollment Strategies
  • Types of Enrollment
  • Enrollment Agents and Restricted Enrollment Agents
  • The Network Device Enrollment Service
  • Virtual Private Networks and Security

08. Chapter 8: Planning for Business Continuity and Backup

  • Introducing RAID
  • Introducing the Distributed File System
  • Introducing Failover Clustering
  • Introducing Quorums
  • Introducing Network Load Balancing
  • Using Windows Server Backup Tools
  • Introducing the Encrypting File System
  • Introducing Windows BitLocker
  • Recovering Active Directory Domains Services
  • Introducing Windows Recovery Environment
  • Using Windows Recovery
  • Using Volume Shadow Copy
  • Using Server Core
  • Introducing Active Directory Rights

09. Chapter 9: Designing a Windows Update Strategy for the Enterprise

  • Establishing a Security Baseline
  • The Microsoft Baseline Security Analyzer Tool
  • System and Environment Health Models
  • Planning and Implementing Windows
  • WSUS Options
  • Overview of System Center Essentials 2007
  • Overview of System Center Configuration Manager 2007
  • Overview of Windows Update
  • Real-World Update Practices
  • Update Compliance

10. Chapter 10: Using Virtualization to Increase Productivity and Facilitate Consolidation

  • Introducing Virtualization
  • The Different Types of Virtualization
  • Introducing Server Consolidation
  • Understanding Virtualized Machine Components
  • Network Setups with All Types of Virtual Machines
  • Virtual Networks
  • Multiple Network Interface Cards with Virtual Networks
  • Installing Hyper-V
  • Introducing iSCSI
  • Windows Vista x64 Hyper-V Management Server Core and Virtualization
  • Using System Center Virtual Machine Manager 2007
  • Using Virtual Server 2005 R2

Skills Learned

After completing this online training course, students will be able to:

  • Describe key components of network infrastructure design.
  • Describe how to design a secure network.
  • Design a plan for allocating IP addresses to workstations and servers.
  • Design a network topology.
  • Describe the internal considerations for network security and how they can be addressed.
  • Design an appropriate name resolution system that incorporates Domain Name System (DNS).
  • Optimize a name resolution system that incorporates DNS and Windows Internet Name Service (WINS).
  • Design a solution for network access.
  • Design a Network Access Protection (NAP) solution.
  • Design a solution for operating system deployment and maintenance.
  • Design the deployment of file services.
  • Design print services in Windows Server 2008.
  • Design high availability for applications and services.