70-647 – Windows Server Enterprise Administration Series!

$75.00Add to cart

Overview: The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. This course will address topics such as Deploying Servers, Configuring Remote Desktop Services, Configuring a Web Services Infrastructure, and Configuring Network Application Services.

Series Taught By:  Ken Mayer

Available CEUs for Course Series Completion: 18
Students can earn up to 18 CEUs for fully completing this course series. This information will be displayed on the certificate of completion. Learn More

Course Modules:

Module 01 – Planning for Active Directory

(Duration: 2h 4m)

  1. Workbook (Pdf)
  2. Lesson 1: Logical Design
  3. The Forest
  4. How Will AD DS be Used?
  5. Requirements
  6. How Many Forests are Needed?
  7. Forest Model
  8. Domains
  9. Requirements (Cont.)
  10. The Domain Model
  11. How Many Domains?
  12. Upgrade or Create New Domains
  13. The First Domain
  14. Functional Levels
  15. Domain Functional Level Features
  16. Functional Levels (Cont.)
  17. Forest Functional Level Features
  18. Schema
  19. Working with Trusts
  20. Demo – Creating a New Forest
  21. Demo – Creating a New Tree
  22. Lesson 2: Physical Topology
  23. Physical Networks
  24. Review of Domain Controller Replication
  25. Site Design Options
  26. Site Replication Design
  27. Site Links
  28. Site Link Bridging
  29. Site Replication Example
  30. Domain Controller Placement
  31. Printer Location Policies
  32. Demo – Creating Sites and IP Subnets
  33. Demo – Creating Site Link Bridges
  34. Chapter 01 Review
  35. Review Quiz (Number of attempts allowed: Unlimited)

Module 03 -Advanced Active Directory Issues

(Duration: 32m)

  1. Workbook (Pdf)
  2. Lesson 1: Migration Strategies
  3. Planning and Preparing to Move to Windows 2008 Server
  4. Domain Upgrade
  5. Preparing for the Upgrade
  6. Domain Restructure
  7. Upgrade then Restructure
  8. Cross Forest Trust
  9. Demo – Raising Domain Functional Level
  10. Lesson 2: Working with Other Forests
  11. One Solution: AD FS
  12. What is AD FS?
  13. AD FS Roles
  14. AD FS Example
  15. MS Identity Lifecycle Manager 2007 FP1
  16. Working with UNIX
  17. Imitating UNIX
  18. Migration of UNIX NIS to Windows NIS
  19. Imitating UNIX Continued
  20. Working with NFS
  21. Chapter 03 Review
  22. Review Quiz (Number of attempts allowed: Unlimited)

Module 05 – Deploying Windows 2008 to the Small/Medium Office

(Duration: 1h 28m)

  1. Workbook (Pdf)
  2. Lesson 1: Small/Medium Office
  3. Services Needed in the Small/Medium Office
  4. The DSMGMT Service
  5. Components Often Needed in the ROBO
  6. Optional Components Used for the ROBO
  7. More on the Server Core
  8. Should You Install a Domain Controller?
  9. Other DC Options
  10. Services to Consider at the ROBO
  11. Communication Options
  12. WAN Connections
  13. Securing Traffic
  14. Tunnel Diagram Example
  15. Lesson 2: Small/Medium Server Security
  16. Overview of Security
  17. Security Training
  18. Security at the Branch
  19. Server Hardening
  20. Secure Options for the ROBO
  21. RODC
  22. RODC Password Replication Policy
  23. RODC Operation
  24. Securing Data
  25. EFS
  26. BitLocker
  27. NAP
  28. Demo – Creating an RODC
  29. Demo – Using SCW
  30. Chapter 05 Review
  31. Review Quiz (Number of attempts allowed: Unlimited)

Module 07 – Securing the Network

(Duration: 1h 34m)

  1. Workbook (Pdf)
  2. Lesson 1: Designing a Secure Perimeter
  3. Designing the Perimeter
  4. The Border Network
  5. Perimeter Network
  6. Internal Network
  7. Perimeter Firewall
  8. Firewall Options
  9. ISA Server
  10. ISA Server Deployment
  11. What Else Can Be Found in the Perimeter?
  12. Web Servers in the Perimeter
  13. Setting Up Remote Access
  14. VPN Tunneling Protocols
  15. PPTP
  16. L2TP
  17. SSTP
  18. Authenticating Connections
  19. Securing VPN Servers
  20. Authentication using RADIUS
  21. Microsoft RADIUS
  22. RADIUS Security
  23. RADIUS Proxy Options
  24. Lesson 2: Introducing NAP
  25. Network Access Protection
  26. Where Do You Find NAP?
  27. NAP Considerations
  28. NAP Provides Another Layer of Security With IPSec
  29. Disadvantages of NAP
  30. NAP IPSec Enforcement
  31. More NAP Component Needs
  32. NAP VPN Enforcement
  33. 802.1X NAP Enforcement
  34. 802.1X Enforcement
  35. NAP and DHCP
  36. DHCP/NAP Considerations
  37. NAP Illustrated
  38. Lesson 3: Domain and Server Isolation
  39. Isolation
  40. Domain Isolation
  41. Comparing Server and Domain Isolation
  42. Chapter 07 Review
  43. Review Quiz (Number of attempts allowed: Unlimited)

Module 09 -Virtualization Solutions

(Duration: 51m)

  1. Workbook (Pdf)
  2. Lesson 1: Using Virtualization
  3. Benefits to Virtualization
  4. Virtualization Solutions
  5. Choosing What to Virtualize
  6. Managing Virtualized Servers
  7. What Can Be Virtualized
  8. Migrating P2V
  9. The Power of SCVMM
  10. SCVMM Components
  11. SCVMM Illustrated
  12. Managing VMs at the Branch Office
  13. Demo – Working With Hyper-V
  14. Demo – Creating a Virtual Windows 2008 Server
  15. Lesson 2: Planning Virtualization for Applications
  16. Microsoft SoftGrid
  17. When Should You Use SoftGrid
  18. Designing Application Virtualization
  19. Branch Office Deployments
  20. Chapter 09 Review
  21. Review Quiz (Number of attempts allowed: Unlimited)

Module 11 -Making Data Secure and Available

(Duration: 1h 38m)

  1. Workbook (Pdf)
  2. Lesson 1: Sharing and Collaborating Your Data
  3. D
  4. FS
  5. Advanced DFS
  6. DFS Replication, Settings, and Features
  7. DFS Design Checklist
  8. Collaboration
  9. WSS Feature Set
  10. WSS Deployment
  11. MOSS 2007
  12. Demo – Installing WSS
  13. Demo – Exploring WSS
  14. Lesson 2: Protecting Data at Rest
  15. BitLocker
  16. BitLocker Authentication
  17. BitLocker Design Thoughts
  18. EFS
  19. EFS Best Practices
  20. AD RMS
  21. Using RMS
  22. RMS Policy Elements
  23. RMS Illustrated
  24. Demo – Using EFS
  25. Lesson 3: System Recoverability and Availability
  26. AD DS Backup
  27. AD DS Backup Utilities
  28. AD DS Recovery
  29. Authoritative Restore
  30. Authoritative Restore Illustrated
  31. AD DS Service
  32. Working with FSMOs
  33. Scalability
  34. NLB
  35. NLB Illustrated
  36. Failover Clustering
  37. Cluster Prerequisites
  38. Demo – AD DS Backup
  39. Chapter 11 Review
  40. Course Closure
  41. Review Quiz (Number of attempts allowed: Unlimited)

Module 02 – Network Infrastructure

(Duration: 1h 51m)

  1. Workbook (Pdf)
  2. Lesson 1: DNS
  3. DNS Considerations
  4. DNS Record Types
  5. Using DNS with Windows 2008 Server
  6. The Stub Zone
  7. DNS Options
  8. Managing DNS
  9. New DNS Features with Windows 2008 Server
  10. Replacing WINS
  11. IPv6 Support
  12. Background Zone Loading
  13. RODC
  14. Designing the DNS Infrastructure
  15. Choosing a Zone Type
  16. Miscellaneous DNS Options
  17. Demo – Exploring DNS
  18. Demo – Creating GlobalNames Zone
  19. Lesson 2: Planning IP Distribution
  20. Introducing IPv6
  21. Examples of IPv6 Abbreviation
  22. Introducing IPv6 (Cont.)
  23. The IPv6 Multicast
  24. Advantages of IPv6
  25. IPv4 to IPv6 Compatibility
  26. Transitioning to IPv6
  27. IPv6 Tools
  28. Configure IPv6
  29. Verifying IPv6
  30. Troubleshooting
  31. Designing an IPv6 Network
  32. Demo – Configuring IPv6
  33. Demo – Testing IPv6
  34. Chapter 02 Review
  35. Review Quiz (Number of attempts allowed: Unlimited)

Module 04 – Active Directory Administration

(Duration: 1h 46m)

  1. Workbook (Pdf)
  2. Lesson 1: Active Directory Administration
  3. Delegation of Control
  4. Delegating Active Directory
  5. Data Management
  6. Service Management
  7. Scope of Delegated Administration
  8. Administration Models
  9. Using Groups for Delegation
  10. Management Roles
  11. Service Management (Cont.)
  12. Data Roles
  13. Types of Trusts
  14. Delegation of Data Management
  15. Starter GPOs
  16. Group Policy Modeling
  17. Auditing AD DS
  18. AD Auditing
  19. Looking at the Organizational Structure
  20. Demo – Delegation of Control
  21. Demo – AD Auditing
  22. Lesson 2: Using Group Policies
  23. Understanding the Group Policy Infrastructure
  24. Guidelines for Planning GPOs
  25. GPOs and Active Directory
  26. Understanding Domains
  27. Domain Services Store
  28. Controlling Hardware Installation with GPOs
  29. Which GPO Settings Control Hardware Installation?
  30. AAA
  31. Stronger Authentication
  32. Fine-Grained Password Policies
  33. How to Use PSOs
  34. Demo – Creating PSO
  35. Chapter 04 Review
  36. Review Quiz (Number of attempts allowed: Unlimited)

Module 06- Using Remote Desktop Services and Application Setup

(Duration: 1h 3m)

  1. Workbook (Pdf)
  2. Lesson 1: Planning for Remote Desktop Services
  3. Planning and Deploying Remote Desktop Services
  4. RDS Components
  5. Demo – Installing Remote Desktop Services
  6. Lesson 2: License Server
  7. Licensing
  8. Types of Licenses
  9. Maintaining the License Server
  10. License Server Deployment
  11. Lesson 3: Deploying Applications
  12. RDS Web Access
  13. RemoteApp
  14. RemoteApp Deployment
  15. RDS Load Balancing
  16. Planning RDS Gateway Servers
  17. RDS Gateway Server Connection
  18. Using GPO to Deploy Applications
  19. Publishing Software
  20. Assigning Software with GPOs
  21. Installing Software by GPO
  22. Deploying Software with SC Essentials
  23. SCCM 2007
  24. SCCM 2007 Architecture
  25. SCCM 2007 Client
  26. SCCM 2007 Application Deployment
  27. Demo – Accessing RDS Web Access
  28. Chapter 06 Review
  29. Review Quiz (Number of attempts allowed: Unlimited)

Module 08 – Supporting PKI

(Duration: 1h 24m)

  1. Workbook (Pdf)
  2. Lesson 1: What is PKI?
  3. Concepts
  4. Applications Use of PKI
  5. Certificate Use Illustration
  6. Who is Issued a Certificate
  7. PKI Security
  8. Security Policies
  9. Business Requirements
  10. External Needs
  11. AD Needs
  12. Lesson 2: The CA Hierarchy
  13. The CA Infrastructure
  14. CA Hierarchy Illustration
  15. When to Use an Internal CA
  16. When to Use an External CA
  17. MS ADCS
  18. Enterprise vs. Standalone
  19. How Many CAs are Needed
  20. Demo – Installing CA
  21. Lesson 3: Managing Certificates
  22. Enrollment Methods
  23. Enrollment Policies
  24. Improving Control over Certificate Issuance
  25. Automatic vs. Manual Certificate Approval
  26. How to Do Enrollment
  27. Certificate Renewal Strategies
  28. Certificate Revocation Policy
  29. Issues with CRLs
  30. Publication Points
  31. Demo – Working with Certificates
  32. Chapter 08 Review
  33. Review Quiz (Number of attempts allowed: Unlimited)

Module 10 – Windows Updates

(Duration: 1h 2m)

  1. Workbook (Pdf)
  2. Lesson 1: WSUS
  3. The Windows Server Update Services Infrastructure
  4. Consider WSUS
  5. Managing WSUS
  6. WSUS Design
  7. WSUS Administration
  8. Update Deployment
  9. WSUS Hierarchy Illustrated
  10. Policies for Updates
  11. Planning Automatic Approvals
  12. SC Essentials
  13. SCCM 2007
  14. Demo – Installing WSUS
  15. Demo – Exploring WSUS
  16. Lesson 2: Software Update Compliance
  17. MBSA
  18. WSUS Reports
  19. SCCM 2007 Compliance and Reporting
  20. SCW
  21. SCWCMD
  22. Best Practices of Role Based Security Policies
  23. Demo – Using MBSA
  24. Chapter 10 Review
  25. Review Quiz (Number of attempts allowed: Unlimited)
This course includes
  • about 15.19 hours on-demand video
  • 11 downloadable Pdf Workbooks
  • Unlimited time access (During Membership)
  • Access on mobile and Desktop
  • Certificate of Completion

$75.00Add to cart

Course Features Include:

  • Expert Lectures
    Learn on-demand from top instructors who are industry subject matter experts. Our highly certified expert instructors possess a superior understanding of the subject matter in their fields and have the ability to convey this knowledge in an effective, engaging, and professional manner to a wide audience.

  • Certificates of Completion
    Upon completion of a series of courses you can earn a certificate of completion from Career Academy. Certificates of Completion will display your full name, course completed, as well as the date of completion. Students have the ability to print this out or save it digitally to showcase your accomplishment.

  • PowerPoint Visuals:
    Many of the in-depth theories and processes discussed in our courses can be learned most efficiently through the detailed PowerPoint slides presented. These visuals are accompanied by an instructor voice-over to provide our students with a clear, efficient, and complete presentation of concepts.

  • Professional Development Activities
    Students are provided access to professional development activity files which allow for an individual to test out course theories and apply the knowledge they earned from the course.

  • Review Quizzes
    Once a course is completed, test your knowledge by taking our course review quiz! Students have the ability to retake any review quizzes as many times as they wish to ensure they understand the material or to improve upon their scores.

  • Mobile Access
    With our universal course player, you can learn from your computer, tablet as well as mobile devices. Keep up with your training on the go!

Trusted by Aspiring IT Professionals, Corporations and
Government agencies
for more than a Decade

Get unlimited online access learn anywhere, anytime using your computer or mobile device!