+91 8884191303
Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Service Pack 2 Course Outline Module 1: Deploying Microsoft Exchange Server 2010
  • Overview of Exchange Server 2010 Requirements
  • Installing Exchange Server 2010 Server Roles
  • Completing an Exchange Server 2010 Installation

Module 2: Configuring Mailbox Servers Lessons
  • Overview of Exchange Server 2010 Administrative Tools
  • Configuring Mailbox Server Roles
  • Configuring Public Folders

Module 3: Managing Recipient Objects Lessons
  • Managing Mailboxes
  • Managing Other Recipients
  • Configuring Email Address Policies
  • Configuring Address Lists and Address Book Policies
  • Performing Bulk Recipient Management Tasks
  • Configure address lists and address book policies.
  • Perform bulk recipient management tasks.

Module 4: Managing Client Access Lessons
  • Configuring the Client Access Server Role
  • Configuring Client Access Services for Outlook Clients
  • Configuring Outlook Web App
  • Configuring Mobile Messaging

Module 5: Managing Message Transport Lessons
  • Overview of Message Transport
  • Configuring Message Transport

Module 6: Implementing Messaging Security Lessons
  • Deploying Edge Transport Servers
  • Deploying an Antivirus Solution
  • Configuring an Anti-Spam Solution
  • Configuring Secure SMTP Messaging

Module 7: Implementing High Availability Lessons
  • Overview of High Availability Options
  • Configuring Highly Available Mailbox Databases
  • Deploying Highly Available Non-Mailbox Servers
  • Deploying High Availability with Site Resilience

Module 8: Implementing Backup and Recovery This module describes the Exchange Server 2010 backup and restore features, and what you should consider when creating a backup plan. Lessons
  • Planning Backup and Recovery
  • Backing Up Exchange Server 2010
  • Restoring Exchange Server 2010

Module 9: Configuring Messaging Policy and Compliance Lessons
  • Introducing Messaging Policy and Compliance
  • Configuring Transport Rules
  • Configuring Journaling and Multi-Mailbox Search
  • Configuring Personal Archives
  • Configuring Messaging Records Management

Module 10: Securing Microsoft Exchange Server 2010 Lessons
  • Configuring Role Based Access Control
  • Configuring Audit Logging
  • Configuring Secure Internet Access

Module 11: Maintaining Microsoft Exchange Server 2010 Lessons
  • Monitoring Exchange Server 2010
  • Maintaining Exchange Server 2010
  • Troubleshooting Exchange Server 2010
Course Outline
Module 1: Deploying and Managing Exchange Server 2013 Lessons
  • Server 2013 Prerequisites and Requirements
  • Exchange Server 2013 Deployment
  • Managing Exchange Server 2013

Module 2: Planning and Configuring Mailbox Servers Lessons
  • Overview of the Mailbox Server Role
  • Planning the Mailbox Server Deployment
  • Configuring Mailbox Servers
Module 3: Managing Recipient Objects
Lessons
  • Managing Exchange Server 2013 Recipients
  • Managing Exchange Recipients
  • Managing Address Lists and Policies on Mailbox Server Role
  • .

Module 4: Planning and Deploying Client Access Servers Lessons
  • Planning Client Access Server Deployment
  • Configuring the Client Access Server Role
  • Managing Client Access Services

Module 5: Planning and Configuring Messaging Client Connectivity Lessons
  • Client Connectivity to Client Access Server
  • Configuring Outlook Web App
  • Planning and Configuring Mobile Messaging
  • Configuring Secure Internet Access for Client Access Server
  • Configuring Secure Internet Access for Client Access Server
  • Configure secure Internet access for Client Access server.

Module 6: Planning and Configuring Message Transport Lessons
  • Overview of Message Transport
  • Planning and Configuring Message Transport
  • Managing Transport Rules

Module 7: Planning and Implementing High Availability Lessons
  • High Availability on Exchange Server 2013
  • Configuring Highly Available Mailbox Databases
  • Configuring Highly Available Client Access Servers

Module 8: Planning and Implementing Disaster Recovery Lessons
  • Planning for Disaster Mitigation
  • Planning and Implementing Exchange Server 2013 Backup
  • Planning and Implementing Exchange Server 2013 Recovery

Module 9: Planning and Configuring Message Security Options Lessons
  • Planning Messaging Security
  • Implementing an Antivirus Solution for Exchange Server 2013
  • Implementing an Antispam Solution for Exchange Server 2013
  • Configuring Role-Based Access Control
  • Configuring Audit Logging

Module 10: Monitoring and Troubleshooting Exchange Server 2013 Lessons
  • Monitoring Exchange Server 2013
  • Maintaining Exchange Server 2013
  • Troubleshooting Exchange Server 2013
Module 1: Designing and Implementing Site Resilience Lessons
  • Site Resilience and High Availability in Exchange Server 2013
  • Planning a Site Resilient Implementation
  • Implementing Site Resilience

Module 2: Planning Virtualization for Microsoft Exchange Server 2013 Lessons
  • Planning a Hyper-V Deployment to Exchange Server 2013
  • Virtualizing Exchange Server 2013 Server Roles

Module 3: Overview of Exchange Server 2013 Unified Messaging Lessons
  • Overview of Telephony Technologies
  • Unified Messaging in Exchange Server 2013
  • Unified Messaging Components

Module 4: Designing and Implementing Exchange Server 2013 Unified Messaging Lessons
  • Designing a Unified Messaging Deployment
  • Deploying and Configuring Unified Messaging Components
  • Designing and Implementing Exchange Server 2013 UM Integration with Lync Server 2013

Module 5: Designing and Implementing Message Transport Security Lessons
  • Overview of Messaging Policy and Compliance Requirements
  • Designing and Implementing Transport Compliance
  • Designing and Implementing Active Directory Rights Management Services (AD RMS) Integration with Exchange Server 2013

Module 6: Designing and Implementing Message Retention Lessons
  • Overview of Messaging Records Management and Archiving
  • Designing In-Place Archiving
  • Designing and Implementing Message Retention
Module 7: Designing and Implementing Messaging Compliance Lessons
  • Designing and Implementing Data Loss Prevention
  • Designing and Implementing In-Place Hold
  • Designing and Implementing In-Place eDiscovery

Module 8: Designing and Implementing Administrative Security and Auditing Lessons
  • Designing and Implementing Role-Based Access Control (RBAC)
  • Designing and Implementing Split Permissions
  • Planning and Implementing Audit Logging

Module 9: Managing Exchange Server 2013 with Exchange Management Shell Lessons
  • Overview of Windows PowerShell 3.0
  • Managing Exchange Server Recipients by Using the Exchange Management Shell
  • Using Windows PowerShell to Manage Exchange Server

Module 10: Designing and Implementing Integration with Microsoft Exchange Online Lessons
  • Planning for Exchange Online
  • Planning and Implementing the Migration to Exchange Online
  • Planning to Coexist with Exchange Online

Module 11: Designing and Implementing Messaging Coexistence Lessons
  • Designing and Implementing Federation
  • Designing Coexistence Between Exchange Server Organizations
  • Designing and Implementing Cross-Forest Mailbox Moves
Module 1: Deploying and Maintaining Server Images Lessons
  • Overview of Windows Deployment Services
  • Implementing Deployment with Windows Deployment Services
  • Administering Windows Deployment Services
Module 2: Configuring and Troubleshooting Domain Name System Lessons
  • Installing the DNS Server Role
  • Configuring the DNS Server Role
  • Configuring DNS Zones
  • Configuring DNS Zone Transfers
  • Managing and Troubleshooting DNS
Module 3: Maintaining Active Directory Domain Services Lessons
  • Overview of AD DS
  • Implementing Virtualized Domain Controllers
  • Implementing RODC
  • Administering AD DS
  • Managing the AD DS Database
Module 4: Managing User and Service Accounts Lessons
  • Automating User Account Management
  • Configuring Password-Policy and User-Account Lockout Settings
  • Configuring Managed Service Accounts
Module 5: Implementing a Group Policy Infrastructure Lessons
  • Introducing Group Policy
  • Implementing and Administering Group Policy Objects (GPOs)
  • Group Policy Scope and Group Policy Processing
  • Troubleshooting the Application of GPOs
  • Manage Group Policy scope.
Module 6: Managing User Desktops with Group Policy Lessons
  • Implementing Administrative Templates
  • Configuring Folder Redirection and Scripts
  • Configuring Group Policy Preferences
  • Managing Software with Group Policy
Module 7: Configuring and Troubleshooting Remote Access Lessons
  • Configuring Network Access
  • Configuring Virtual Private Network (VPN) Access
  • Overview of Network Policies
  • Troubleshooting Routing and Remote Access
  • Configuring DirectAccess
Module 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role This module explains how to install, configure, and troubleshoot Network Policy Server (NPS). Lessons
  • Installing and Configuring a NPS
  • Configuring Remote Authentication Dial-In User Service (RADIUS) Clients and Servers
  • NPS Authentication Methods
  • Monitoring and Troubleshooting a NPS
Module 9: Implementing Network Access Protection Lessons
  • Overview of Network Access Protection
  • Overview of NAP Enforcement Processes
  • Configuring NAP
  • Monitoring and Troubleshooting NAP
Module 10: Optimizing File Services .Lessons
  • Overview of FSRM
  • Using FSRM to Manage Quotas, File Screens, and Storage Reports
  • Implementing Classification and File Management Tasks
  • Overview of Distributed File System (DFS)
  • Configuring DFS Namespaces
  • Configuring and Troubleshooting Distributed File System Replication (DFS-R)
Module 11: Configuring Encryption and Advanced Auditing .Lessons
  • Encrypting Files by Using Encrypting File System
  • Configuring Advanced Auditing
Module 12: Implementing Update Management Lessons
  • Overview of WSUS
  • Deploying Updates with WSUS
  • Deploy updates with WSUS.
Module 13: Monitoring Windows Server 2012 This module explains how to improve performance using performance monitoring tools to identify components that require additional tuning and troubleshooting. Lessons
  • Monitoring Tools
  • Using Performance Monitor
Monitoring Event Logs
Module 1: Implementing Advanced Network Services Lessons
  • Configuring Advanced DHCP Features
  • Configuring Advanced DNS Settings
  • Implementing IPAM
Module 2: Implementing Advanced File Services Lessons
  • Configuring iSCSI Storage
  • Configuring BranchCache
  • Optimizing Storage Usage
Module 3: Implementing Dynamic Access Control This module describes how to plan and implement Dynamic Access Control. Lessons
  • Overview of Dynamic Access Control
  • Planning for Dynamic Access Control
  • Deploying Dynamic Access Control
Module 4: Implementing Distributed Active Directory Domain Services Deployments Lessons
  • Overview of Distributed AD DS Deployments
  • Deploying a Distributed AD DS Environment
  • Configuring AD DS Trusts
. Module 5: Implementing Active Directory Domain Services Sites and Replication Lessons
  • Overview of AD DS Replication
  • Configuring AD DS Sites
  • Configuring and Monitoring AD DS Replication
Module 6: Implementing Active Directory Certificate Services Lessons
  • PKI Overview
  • Deploying CAs
  • Deploying and Configuring CA Hierarchy
  • Deploying and Managing Certificate Templates
  • Implementing Certificate Distribution and Revocation
  • Managing Certificate Recovery
Module 7: Implementing Active Directory Rights Management Services Lessons
  • AD RMS Overview
  • Deploying and Managing an AD RMS Infrastructure
  • Configuring AD RMS Content Protection
  • Configuring External Access to AD RMS
Module 8: Implementing Active Directory Federation Services Lessons
  • Overview of AD FS
  • Deploying AD FS
  • Implementing AD FS for a Single Organization
  • Deploying AD FS in a B2B Federation Scenario
Module 9: Implementing Network Load Balancing Lessons
  • Overview of NLB
  • Configuring an NLB Cluster
  • Planning an NLB Implementation
Module 10: Implementing Failover Clustering Lessons
  • Overview of Failover Clustering
  • Implementing a Failover Cluster
  • Configuring Highly Available Applications and Services on a Failover Cluster
  • Maintaining a Failover Cluster
  • Implementing a Multi-Site Failover Cluster
Module 11: Implementing Failover Clustering with Hyper-V Lessons
  • Overview of Integrating Hyper-V with Failover Clustering
  • Implementing Hyper-V Virtual Machines on Failover Clusters
  • Implementing Hyper-V Virtual Machine Movement
  • Managing Hyper-V Virtual Environments by Using VMM
Module 12: Implementing Disaster Recovery Lessons
  • Overview of Disaster Recovery
  • Implementing Windows Server Backup
  • Implementing Server and Data Recovery
Module 1: Planning Server Upgrade and MigrationThis module explains how to plan a server upgrade and migration strategy.Lessons
  • Upgrade and Migration Considerations
  • Creating a Server Upgrade and Migration Plan
  • Planning for Virtualization.
Module 2: Planning and Implementing a Server Deployment Infrastructure This module explains how to design an automated server installation strategy and plan and implement a server deployment infrastructure. Lessons
  • Selecting an Appropriate Server Imaging Strategy
  • Selecting a Deployment Automation Strategy
  • Implementing an Automated Deployment Strategy
Module 3: Designing and Maintaining an IP Configuration and Address Management Solution This module explains how to design and maintain IP address management (IPAM) and a Dynamic Host Configuration Protocol (DHCP) solution. Lessons
  • Designing and Implementing DHCP
  • Planning and Implementing DHCP Scopes
  • Planning and Implementing an IPAM Provisioning Strategy
Module 4: Designing and Implementing Name Resolution This module explains how to design a name resolution solution strategy. Lessons
  • Designing a DNS Server Implementation Strategy
  • Designing the DNS Namespace
  • Designing and Implementing DNS Zones
  • Designing and Configuring DNS Zone Replication and Delegation
  • Optimizing DNS Servers
  • Designing DNS for High Availability and Security
Module 5: Designing and Implementing an Active Directory Domain Services Forest and Domain Infrastructure This module explains how to design and implement an AD DS forest and domain infrastructure. Lessons
  • Designing an AD DS Forest
  • Designing and Implementing AD DS Forest Trusts
  • Designing and Implementing AD DS Domains
  • Designing DNS Namespaces in AD DS Environments
  • Designing AD DS Domain Trusts
Module 6: Designing and Implementing an OU Infrastructure and AD DS Permissions Model This module explains how to design and implement an organizational unit (OU) infrastructure and AD DS permissions model. Lessons
  • Planning the AD DS Administrative Tasks Delegation Model
  • Designing the OU Structure
  • Designing and Implementing an AD DS Group Strategy
Module 7: Designing and Implementing a Group Policy Object Strategy This module explains how to design and implement a Group Policy Object (GPO) strategy. Lessons
  • Gathering the Information Required for a GPO Design
  • Designing and Implementing GPOs
  • Designing GPO Processing
  • Planning Group Policy Management
  Module 8: Designing and Implementing an AD DS Physical Topology This module explains how to design an AD DS sites topology and a domain controller placement strategy. Lessons
  • Designing and Implementing AD DS Sites
  • Designing AD DS Replication
  • Designing the Placement of Domain Controllers
  • Virtualization Considerations for Domain Controllers
  • Designing Highly-Available Domain Controllers
Module 9: Planning and Implementing StorageThis module explains how to plan and implement storage. Lessons
  • Storage Considerations
  • Planning and Implementing iSCSI SANs
Module 10: Planning and Implementing File Services This module explains how to plan and implement file services. Lessons
  • Planning and Implementing a Distributed File System
  • Planning and Implementing BranchCache
  • Planning and Implementing Dynamic Access Control
Module 11: Designing and Implementing Network Access Services This module explains how to design and implement network access services. Lessons
  • Designing and Implementing Remote Access Services
  • Designing RADIUS Authentication by Using a Network Policy Server
  • Designing a Perimeter Network
  • Planning and Implementing DirectAccess
Module 1: Overview of Management in an Enterprise Data Center This module describes some of the changes and new requirements that organizations are experiencing in their data centers. The module then describes how you can use System Center 2012 to manage this environment.   Lessons
  • Overview of the Enterprise Data Center
  • Overview of the Microsoft System Center 2012 Components
  • Considerations for Implementing an Enterprise Data Center
Lab : Considerations for Implementing an Enterprise Data Center
  • Planning the Secure Implementation of Services Within an Enterprise Data Center
After completing this module, students will be able to:
  • Describe the enterprise data center.
  • Describe how you can use System Center 2012 to manage the enterprise data center.
  Module 2: Planning and Implementing a Server Virtualization Strategy This module introduces the Microsoft System Center 2012 components. You will see how they can integrate to enable you to configure, deploy, and manage a server virtualization environment. Later, you will review the planning steps and considerations for a Microsoft System Center 2012 - Virtual Machine Manager (VMM) deployment.   Lessons
  • Planning a VMM Deployment
  • Planning and Implementing a Server Virtualization Host Environment
  • Planning and Implementing a Network Infrastructure for Virtualization
Lab : Planning and Implementing a Server Virtualization Strategy
  • Planning the Hyper-V Host Deployment
  • Configuring Hyper-V Host Groups
  • Configuring VMM Libraries
After completing this module, students will be able to:
  • Describe how you can use System Center 2012 to deploy and manage a virtualization environment.
  • Plan and implement a sever virtualization strategy by using Windows Server 2012 Hyper-V and VMM.
  • Deploy Hyper-V hosts, configure host groups, and implement VMM libraries.
  Module 3: Planning and Implementing Networks and Storage for Virtualization This module describes the factors that you must consider when you are planning the storage and network infrastructure for your virtual environment, and details on how to deploy these components in Windows Server 2012 Hyper-V and VMM.   Lessons
  • Planning a Storage Infrastructure for Virtualization
  • Implementing a Storage Infrastructure for Virtualization
  • Planning and Implementing a Network Infrastructure for Virtualization
Lab : Planning and Implementing Virtualization Networks and Storage
  • Planning a Storage Infrastructure for Virtualization
  • Planning a Network Infrastructure for Virtualization
  • Implementing a Storage Infrastructure for Virtualization
  • Implementing a Network Infrastructure for Virtualization
After completing this module, students will be able to:
  • Plan a storage infrastructure for server virtualization.
  • Implement a storage infrastructure for server virtualization.
  • Plan and implement a network infrastructure for server virtualization.
  Module 4: Planning and Deploying Virtual Machines In this module, you will learn how to configure virtual machines, reusable profiles, and templates to aid in deployment. You also will review application specific workloads, and learn about the options for physical and virtual machine migrations.   Lessons
  • Planning Virtual Machine Configuration
  • Preparing for Virtual Machine Deployments with VMM
  • Deploying Virtual Machines
Lab : Planning and Implementing a Virtual Machine Deployment and Management Strategy
  • Planning Physical-to-Virtual Server Conversions
  • Planning Virtual Machine and Service Templates
  • Configuring VMM Profiles and Templates
  • Deploying Virtual Machines by Using VMM Templates
After completing this module, students will be able to:
  • Plan virtual machine configurations.
  • Plan and configure the VMM profiles and templates that you can use to implement a VMM deployment.
  • Plan and implement a virtual machine deployment in VMM.
  Module 5: Planning and Implementing a Virtualization Administration Solution This module will prepare you for designing an administrative model that you can use to manage virtualization using System Center 2012. You will see and use VMM, Microsoft System Center 2012 – Orchestrator (Orchestrator) and Microsoft System Center 2012 – App Controller (App Controller). Use these components to delegate administrative functions, plan for basic self-service, design and implement automation. The skills gained in this module are the foundation for the basic building blocks used to operate an IT infrastructure that is similar or equal to that of cloud computing.   Lessons
  • Planning and Implementing Automation with System Center 2012
  • Planning and Implementing System Center 2012 Administration
  • Planning and Implementing Self-Service Options in System Center 2012
Lab : Planning and Implementing an Administration Solution for Virtualization
  • Configuring Process Automation in System Center
  • Planning Administrative Delegation and Self-Service in System Center 2012
  • Configuring Delegated Administration and Self-Service in VMM
After completing this module, students will be able to:
  • Plan automation of a virtual machine environment by using Orchestrator and System Center 2012 integration.
  • Plan a delegated administration model using VMM.
  • Plan self-service in a virtual machine environment by using VMM and App Controller.
  Module 6: Planning and Implementing a Server Monitoring StrategyThis module explains how to use the monitoring tools included in Windows Server 2012 and Microsoft System Center 2012 – Operations Manager (Operations Manager).Lessons
  • Planning Monitoring in Windows Server 2012
  • Overview of System Center Operations Manager
  • Planning and Configuring Management Packs
  • Planning and Configuration Notifications and Reporting
  • Configuring Integration with VMM
Lab : Implementing a Server Monitoring Strategy
  • Configuring Server Monitoring Using Windows Server 2012
  • Implementing the Microsoft System Center 2012 - Operations Manager Agent
  • Configuring Operations Manager Monitoring Components
After completing this module, students will be able to:
  • Plan monitoring in Windows Server 2012.
  • Describe Operations Manager.
  • Plan the configuration of management packs.
  • Plan the configuration of notifications and reporting.
  • Configure integration of Operations Manager and VMM.
  Module 7: Planning and Implementing High Availability for File Services and Applications This module explains how to plan and implement high availability for file services and applications. Lessons
  • Planning and Implementing Storage Spaces
  • Planning and Implementing Distributed File System (DFS)
  • Planning and Implementing Network Load Balancing (NLB)
Lab : Planning and Implementing High Availability for File Services and Applications
  • Planning a High Availability Strategy for File Services
  • Planning a High Availability Strategy for Web Applications
  • Implementing a High Availability Solution for File Storage
  • Implementing a High Availability Solution by Using NLB
After completing this module, students will be able to:
  • Explain how to plan and implement Storage Spaces.
  • Explain how to plan and implement DFS.
  • Explain how to plan and implement NLB.
  • Explain how to plan and implement high availability for file services and applications.
  Module 8: Planning and Implementing a High Availability Infrastructure Using Failover ClusteringThis module explains how to plan and implement failover clustering.Lessons
  • Planning an Infrastructure for Failover Clustering
  • Implementing Failover Clustering
  • Integrating Failover Clustering with Server Virtualization
  • Planning a Multisite Failover Cluster
Lab : Planning and Implementing a High Availability Infrastructure by Using Failover Clustering
  • Designing High Availability Server Roles
  • Implement Hyper-V Replica
  • Deploy a Failover Cluster
  • Implement a Scale-Out File Server
  • Implement High Availability Virtual Machines
  • Implement Operations Manager and VMM Integration
After completing this module, students will be able to:
  • Plan an infrastructure for failover clustering.
  • Implement failover clustering.
  • Integrate failover clustering with server virtualization.
  • Plan a multisite failover clustering.
  Module 9: Planning and Implementing Server Update InfrastructureThis module explains how to plan and implement server update infrastructure by using Windows Server Update Service (WSUS), Configuration Manager, and VMM.Lessons
  • Planning and Implementing a WSUS Deployment
  • Planning Software Updates with System Center 2012 Configuration Manager
  • Planning and Implementing Updates in a Server Virtualization Infrastructure
  • Planning and Implementing Virtual Machine Backup and Recovery
Lab : Planning and Implementing an Update Remediation Infrastructure
  • Implement Host Updating in VMM
  • Configuring Failover Clustering and Cluster Aware Updating (CAU)
  • Planning a WSUS Deployment
  • Deploying a Replica WSUS Server
  • Configure Client Update Options
After completing this module, students will be able to:
  • Plan and implement a WSUS Deployment.
  • Plan software updates with Configuration Manager.
  • Plan and implement updates in a server virtualization infrastructure.
  Module 10: Planning and Implementing a Business Continuity StrategyThis module explains how to plan and implement a business-continuity strategy for your organization, and how to plan and implement backup and recovery strategies, including virtual-machine backup and recovery.Lessons
  • Overview of Business Continuity Planning
  • Planning and Implementing Backup Strategies
  • Planning and Implementing Recovery
  • Planning and Implementing Backup and Recovery of Virtual Machines
Lab : Implementing a Virtual Machine Backup Strategy with DPM
  • Configure DPM
  • Backup and restore virtual machine data
  • Backup and restore virtual machines
After completing this module, students will be able to:
  • Understand the importance of business continuity planning.
  • Plan and implement backup strategies.
  • Plan and implement recovery.
  • Plan and implement virtual machine backup and recovery.
Module 11: Planning and Implementing an Public Key InfrastructureThis module explains how to plan and implement the various aspects of a PKI, and build an internal PKI by using AD CS.Lessons
  • Planning and Implementing Deployment of a Certification Authority
  • Planning and Implementing Certificate Templates
  • Planning and Implementing Certificate Distribution and Revocation
  • Planning and Implementing Key Archival and Recovery
Lab : Planning and Implementing an AD CS Infrastructure
  • Planning the AD CS Deployment
  • Deploying the CA Infrastructure
  • Implementing Certificate Templates
  • Implementing Certificate Revocation and Distribution
After completing this module, students will be able to:
  • Plan and implement CA deployment.
  • Plan and implement certificate templates.
  • Plan and implement certificate distribution and revocation.
  • Plan and implement key archival and recovery.
  Module 12: Planning and Implementing an Identity Federation Infrastructure This module describes how to plan and implement an identity federation infrastructure. Lessons
  • Planning and Implementing an Active Directory Federation Services (AD FS) Server Infrastructure
  • Planning and Implementing AD FS Claims Providers and Relying Parties
  • Planning and Implementing AD FS Claims and Claim Rules
Lab : Planning and Implementing AD FS Infrastructure
  • Designing the AD FS Deployment
  • Configuring Prerequisite Components for AD FS
  • Deploying AD FS for Internal Users
  • Deploying AD FS for a Partner Organization
After completing this module, students will be able to:
  • Plan and implement an identity federation infrastructure, including claims-aware application access.
  • Plan and implement an AD FS server infrastructure.
  • Plan and configure AD FS claim providers and relying parties.
  • Design and deploy AD FS claims and claim rules.
  Module 13: Planning and Implementing an Information Rights Management Infrastructure This module explains how to plan and implement an Active Directory Rights Management Services (AD RMS) deployment to protect content. Lessons
  • Planning and Implementing an AD RMS Cluster
  • Planning and Implementing AD RMS Templates and Policies
  • Planning and Implementing External Access to AD RMS Services
  • Planning and Implementing AD RMS Integration with Dynamic Access Control (DAC)
Lab : Planning and Implementing an AD RMS Infrastructure
  • Planning the AD RMS Deployment
  • Deploying the AD RMS Infrastructure for Internal Users
  • Implementing AD RMS Integration with DAC
  • Implementing AD RMS Integration with External Users
After completing this module, students will be able to:
  • Plan and implement an AD RMS deployment.
  • Plan and manage AD RMS templates and access.
  • Plan and implement external access to AD RMS services.
  • Plan and implement AD RMS integration with DAC.
  • Module 1: Introducing, Installing, and Upgrading Windows 7
  • Module 2: Introducing, Installing, and Upgrading Windows 7
  • Module 3: Understanding Native Applications, Tools, Mobility, and Remote Management and Assistance
  • Module 4: Managing Applications, Services, Folders, and Libraries
  • Module 5: Managing Devices
  • Module 6: Understanding File and Print Sharing
  • Module 7: Maintaining, Updating, and Protecting Windows 7
  • Module 8: Understanding Backup and Recovery Method
  • Course OutlineModule 1: Server Overview
  • Module 2: Managing Windows Server 2008 R2
  •  Module 3: Managing Storage
  •  Module 4: Monitoring and Troubleshooting Servers
  •  Module 5: Essential Services
  •  Module 6: File and Print Services
  •  Module 7: Popular Windows Network Services and Applications
  • Module 1: Understanding Local Area Networking
  •  Module 2: Defining Networks with the OSI Model
  •  Module 3: Understanding Wired and Wireless Networks
  •  Module 4: Understanding Internet Protocol
  •  Module 5: Implementing TCP/IP in the Command Line
  •  Module 6: Working with Networking Services
  •  Module 7: Understanding Wide Area Networks
  •  Module 8: Defining Network Infrastructures and Network Security
  • Module 1: Understanding Security Layers
  •  Module 2: Authentication, Authorization, and Accounting.
  •  Module 3: Understanding Security Policies
  •  Module 4: Understanding Network Security
  •  Module 5: Protecting the Server and Client
Module 1: Overview and Architecture Lessons
  • Operations Manager in the Cloud and Data Center
  • Operations Manager Overview
  • Core Components and Topology
  • Key features of System Center 2012 R2 Operations Manager
  • Planning and Sizing System Center 2012 R2 Operations Manager
Module 2: Deploying a new System Center 2012 R2 Operations Manager Management Group Lessons
  • Security Considerations
  • Management Group Design Considerations
  • Installing System Center 2012 R2 Operations Manager
  • Configuring Operations Manager Default Settings
  • Configuring Agentless Exception Monitoring (AEM)
  • Agent Deployment Methods
  • Configuring Audit Collection Services
Module 3: Configuring Fabric and Application Monitoring Lessons
  • Management Packs Fundamentals
  • Configuring Network Device Monitoring
  • Configuring Fabric Monitoring
  • Configuring Application Monitoring
Module 4: Application Performance Monitoring Lessons
  • Application Performance Monitoring
  • Using IntelliTrace
  • Team Foundation Server Integration
Module 5: End to End Service Monitoring Lessons
  • Management Pack Templates
  • Distributed Application Models
  • Global Service Monitor
  • Real-time Visio Dashboards
Module 6: Scorecards, Dashboards and Reporting Lessons
  • Configuring and Managing Reporting in Operations Manager
  • Configuring Service Level Tracking
  • Configuring the Operations Manager SharePoint WebPart
  • Configuring Dashboards and Widgets
  • Creating Custom Dashboards
Module 7: Configuring and Customizing the Console Lessons
  • Security, Scoping and User Roles
  • Creating Custom Views
  • Configuring Notification Subscriptions
  • Creating Diagnostic and Recovery Tasks
Module 8: Management Pack Authoring Lessons
  • Management Packs Authoring Concepts
  • Authoring a Management Pack
Module 9: System Center Integration Lessons
  • Integrating Operations Manager with Service Manager
  • Integrating Operations Manager with Data Protection Manager
  • Integrating Operations Manager with Orchestrator
Module 10: Troubleshooting, Tuning and Disaster Recovery Lessons
  • Troubleshooting Operations Manager Core Components
  • Configuring SQL AlwaysOn for Operations Manager
  • Configuring Data Retention in Operations Manager
  • Using Reports to troubleshoot Operations Manager
  • Disaster Recovery
Module 1: Evaluating the Environment for Virtualization Lessons
  • Overview of Microsoft Virtualization
  • Overview of System Center 2012 R2 Components
  • Evaluating Current Environment for Virtualization
  • Extending Virtualization to the Cloud
Module 2: Installing and Configuring the Hyper-V Server Role Lessons
  • Installing the Hyper-V Server Role
  • Managing Hyper-V
  • Configuring Hyper-V Settings
  • Hyper-V Host Storage and Networking
Module 3: Creating and Managing Virtual Hard Disks, Virtual Machines, and Checkpoints
  • Creating and Configuring Virtual Hard Disks
  • Creating and Configuring Virtual Machines
  • Installing and Importing Virtual Machines
  • Managing Virtual Machine Checkpoints
  • Monitoring Hyper-V
  • Designing and Managing Virtual Machines
  • Monitor Hyper-V.
  • Design and manage virtual machines.
Module 4: Creating and Configuring Virtual Machine Networks Lessons
  • Creating and Using Hyper-V Virtual Switches
  • Advanced Hyper-V Networking Features
  • Configuring and Using Hyper-V Network Virtualization
Module 5: Virtual Machine Movement and Hyper-V Replica Lessons
  • Providing High Availability and Redundancy for Virtualization
  • Implementing Virtual Machine Movement
  • Implementing and Managing Hyper-V Replica
Module 6: Implementing Failover Clustering with Hyper-V Lessons
  • Overview of Failover Clustering
  • Configuring and Using Shared Storage
  • Implementing and Managing Failover Clustering with Hyper-V
Module 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Lessons
  • Integrating System Center and Server Virtualization
  • Overview of System Center 2012 Virtual Machine Manager
  • Installing System Center 2012 R2 Virtual Machine Manager
  • Adding Hosts and Managing Host Groups
Module 8: Managing the Networking and Storage Infrastructure in System Center 2012 R2 Virtual Machine Manager Lessons
  • Managing Networking Infrastructure
  • Managing Storage Infrastructure
  • Managing Infrastructure Updates
Module 9: Creating and Managing Virtual Machines by Using Microsoft System Center 2012 R2 Virtual Machine Manager Lessons
  • Virtual Machine Management Tasks in VMM
  • Creating, Cloning, and Converting Virtual Machines
  • Overview of Virtual Machine Updating
  • Describe methods and tools for updating virtual machines.
Module 10: Configuring and Managing the System Center 2012 R2 Virtual Machine Lessons
  • Overview of the Virtual Machine Manager Library
  • Working With Profiles and Templates
Module 11: Managing Clouds in System Center 2012 R2 Virtual Machine Manager Lessons
  • Introduction to Clouds
  • Creating and Managing a Cloud
  • Working With User Roles in Virtual Machine Manager
Module 12: Managing Services in System Center 2012 R2 Virtual Machine Manager and App Controller Lessons
  • Understanding Services in System Center 2012 R2 Virtual Machine Manager
  • Creating and Managing Services in VMM
  • Using System Center 2012 R2 App Controller
Module 13: Protecting and Monitoring Virtualization Infrastructure Lessons
  • Overview of Backup and Restore Options for Virtual Machines
  • Protecting Virtualization Infrastructure by Using Data Protection Manager
  • Using System Center Operations Manager for Monitoring and Reporting
  • Integrating Virtual Machine Manager with Operations Manager
OutlineModule 1: Overview of Microsoft System Center Configuration Manager 2007This module explains Microsoft System Center Configuration Manager 2007 features, and describes primary infrastructure components and deployment scenarios of Configuration Manager 2007.Lessons
  • Introduction to System Center Configuration Manager 2007
  • Configuration Manager Features
  • Configuration Manager Deployment Scenarios
  • Overview of the Configuration Manager Client
After completing this module, students will be able to:
  • Describe Configuration Manager 2007.
  • Describe the Configuration Manager 2007 features.
  • Describe the Configuration Manager 2007 deployment scenarios.
  • Describe the Configuration Manager client.
Module 2: Planning and Deploying a Single-Site ArchitectureThis module describes planning considerations and deployment tasks for implementing Microsoft System Center Configuration Manager 2007 single-site architecture.Lessons
  • Planning a Configuration Manager 2007 Site Deployment
  • Preparing to Deploy a Configuration Manager 2007 Site
  • Installing a Configuration Manager 2007 Site Server
  • Performing Post-Setup Configuration Tasks
  • Discovering Resources
  • Tools for Monitoring and Troubleshooting Configuration Manager 2007
Lab : Deploying a Configuration Manager Site Server
  • Installing Configuration Manager Prerequisites
  • Extending the Active Directory Schema for Configuration Manager
  • Installing Configuration Manager 2007 SP2
  • Verifying a Successful Configuration Manager Site Server Installation
  • Verifying the Creation of the System Management Container
  • Installing Configuration Manager 2007 R3
Lab : Managing Users and Configuring Boundaries and Discovery Methods
  • Managing Configuration Manager Users
  • Configuring Boundaries
  • Enabling and Configuring Discovery Methods
Lab : Monitoring and Troubleshooting Configuration Manager 2007
  • Using the ConfigMgr Service Manager
  • Reviewing Log Files with Trace32
  • Reviewing Discovery Status Messages
  • Configuring Status Messages
After completing this module, students will be able to:
  • Plan a Configuration Manager 2007 site deployment.
  • Prepare to deploy a Configuration Manager 2007 site.
  • Install a Configuration Manager 2007 site server.
  • Perform post-setup configuration tasks.
  • Configure and enable discovery methods.
  • Monitor and troubleshoot Configuration Manager 2007.
Module 3: Planning for and Completing Client DeploymentThis module explains how to plan and deploy Configuration Manager 2007 clients.Lessons
  • Client Deployment Methods
  • Deploying Clients
  • Managing Configuration Manager 2007 Clients
  • Using Configuration Manager Reporting with Client Installation
Lab : Deploying Configuration Manager 2007 Clients
  • Preparing the Site for Client Installation
  • Deploying the Configuration Manager Client Using the Client Push Installation Method
Lab : Verifying Client Deployment
  • Verifying Client Deployment
After completing this module, students will be able to:
  • Determine the most appropriate client deployment method.
  • Deploy Configuration Manager 2007 clients.
  • Manage and verify Configuration Manager 2007 client deployment.
  • Use Configuration Manager reporting to monitor client deployment.
Module 4: Inventory Collection, Software Metering, and Asset IntelligenceThis module explains how to collect and manage hardware and software inventory, implement software metering, and use Asset Intelligence.Lessons
  • Overview of Inventory Collection
  • Collecting Hardware Inventory
  • Collecting Software Inventory
  • Managing and Troubleshooting Inventory
  • Asset Intelligence
  • Metering Software Usage
Lab : Collecting Inventory
  • Configuring and Managing Hardware Inventory
  • Modifying Hardware Inventory Collection
  • Configuring and Managing Software Inventory
Lab : Using Asset Intelligence
  • Configuring Asset Intelligence Prerequisites
  • Configuring Asset Intelligence
  • Customizing Asset Intelligence
  • Viewing Asset Intelligence Reports
Lab : Configuring Software Metering
  • Configuring Software Metering
After completing this module, students will be able to:
  • Describe inventory collection.
  • Explain how to collect hardware inventory.
  • Explain how to collect software inventory.
  • Manage and troubleshoot inventory.
  • Explain how to configure and use Asset Intelligence.
  • Describe how to implement software metering.
Module 5: Querying and Reporting DataThis module describes the data structure for data queries and status message queries, and also describes the available reporting options and how to configure and deploy the available reporting options.Lessons
  • Introduction to Data and Status Message Queries
  • Managing Queries
  • Configuring and Deploying a Reporting Point
  • SQL Reporting Services in Configuration Manager 2007 R2
  • Client Status Reporting in Configuration Manager 2007
Lab : Using Queries and Reports
  • Creating and Running Queries
  • Installing and Using a Reporting Point
Lab : Using SQL Reporting Services
  • Installing the Reporting Services Point Role
  • Managing the Reporting Services Point
  • Viewing SQL Reporting Services Reports
Lab : Installing and Using Client Status Reporting
  • Installing and Configuring Client Status Reporting
  • Installing and Viewing Client Status Reporting Reports
After completing this module, students will be able to:
  • Describe data and status message queries.
  • Manage queries.
  • Configure and deploy a reporting point.
  • Manage reports.
  • Create and use dashboards.
  • Install and use SQL Reporting Services in Configuration Manager 2007 R3.
  • Use client status reporting in Configuration Manager 2007.
Module 6: Distributing Software Using Microsoft System Center Configuration Manager 2007This module describes the processes and components used to prepare for and manage software distribution using Configuration Manager 2007.Lessons
  • Overview of the Software Distribution Process
  • Preparing for Software Distribution
  • Overview of Distribution Points
  • Creating and Populating Collections
  • Configuring Collection Settings
  • Creating and Configuring Packages and Programs
  • Distributing Packages
  • Advertising Programs
  • Monitoring and Troubleshooting Software Distribution
Lab : Preparing for Software Distribution
  • Configuring the Software Distribution Component
  • Configuring the Advertised Programs Client Agent
  • Configuring a Distribution Point
Lab : Creating and Configuring a Collection
  • Creating a Collection for Software Distribution
Lab : Creating a Package and Configuring Programs
  • Creating a Package and Configuring Programs
Lab : Deploying Applications by Using Software Distribution
  • Distributing a Package to a Distribution Point
  • Advertising a Program to a Collection
  • Running an Advertised Program
  • Reviewing Results
After completing this module, students will be able to:
  • Describe the software distribution process.
  • Explain how to prepare a site for software distribution.
  • Describe how distribution points work.
  • Explain how to create and populate collections for targeting software distribution.
  • Explain how to configure collections for targeting software distribution.
  • Explain how to create and configure packages and programs.
  • Explain how to distribute packages.
  • Explain how to advertise programs.
  • Explain how to monitor and troubleshoot the software distribution process.
Module 7: Deploying Virtual Applications Using Microsoft System Center Configuration Manager 2007This module explains how to deploy virtual applications using Configuration Manager 2007.Lessons
  • Configuring the Infrastructure to Support Application Virtualization
  • Deploying and Managing Application Virtualization Packages
  • Using Virtual Application Programs
Lab : Deploying Virtual Applications to Configuration Manager Clients
  • Preparing the Infrastructure for Application Virtualization
  • Deploying a Virtual Application Package
  • Launching and Monitoring a Virtual Application Program
After completing this module, students will be able to:
  • Describe infrastructure requirements to support App-V.
  • Deploy and manage virtual application packages.
  • Launch virtual applications on Configuration Manager clients.
Module 8: Deploying and Managing Software UpdatesThis module explains how to deploy and manage software updates to client computers throughout the enterprise.Lessons
  • Overview of Software Updates
  • Preparing the Configuration Manager 2007 Site for Software Updates
  • Managing Software Updates
  • Monitoring and Troubleshooting Software Updates
Lab : Deploying and Managing Software Updates
  • Configuring the Software Updates Infrastructure
  • Determining the Software Update Compliance
  • Deploying Software Updates to Clients
After completing this module, students will be able to:
  • Describe how the software updates feature integrates with System Center Configuration Manager 2007.
  • Prepare a Configuration Manager site for software updates.
  • Manage software updates.
  • Monitor and troubleshoot software updates.
Module 9: Deploying Operating Systems Using Microsoft System Center Configuration Manager 2007This module explains how to deploy operating systems using Configuration Manager 2007.Lessons
  • Overview of Operating System Deployment
  • Preparing for Operating System Deployment
  • Task Sequences in Operating System Deployment
  • Capturing Operating System Images
  • Managing User Data
  • Deploying an Operating System
Lab : Preparing for Operating System Capture and Deployment
  • Preparing the Reference Computer for Capture
  • Creating Packages for Operating System Deployment
  • Managing Drivers
  • Preparing the Environment for Operating System Deployment
Lab : Capturing a Reference Computer
  • Creating the Capture Operating System Task Sequence
  • Modifying the Capture Operating System Task Sequence
  • Advertising the Capture Operating System Task Sequence
Lab : Performing an In-Place Upgrade Using Hard Links
  • Preparing the Operating System Image
  • Creating a Task Sequence to Deploy a New Image
  • Advertising and Running the Task Sequence
After completing this module, students will be able to:
  • Describe operating system deployment.
  • Explain how to prepare for operating system deployment.
  • Describe task sequences in operating system deployment.
  • Capture operating system images.
  • Manage user data.
  • Deploy operating systems.
Module 10: Working with Desired Configuration ManagementThis module explains how to determine computer compliance using desired configuration management.Lessons
  • Overview of Desired Configuration Management
  • Configuring Desired Configuration Management
  • Viewing and Troubleshooting Compliance Results
Lab : Configuring Desired Configuration Management
  • Configuring Desired Configuration Management for Forefront Client Security
  • Assigning a Baseline and Performing a Baseline Evaluation
  • Viewing Desired Configuration Management Reports
After completing this module, students will be able to:
  • Describe desired configuration management.
  • Configure desired configuration management.
  • View and troubleshoot compliance results.
Module 11: Configuring Wake On LAN, Power Management, and Remote ToolsThis module explains how to configure the Wake On LAN, power management, and remote tools features in Configuration Manager 2007.Lessons
  • Overview of Wake On LAN
  • Overview of Power Management
  • Overview of Configuration Manager 2007 Remote Tools
  • Configuring the Remote Tools Client Agent
Lab : Configuring and Using Remote Tools
  • Configuring the Remote Tools Client Agent
  • Using Remote Tools
  • Monitoring Remote Tools Usage
After completing this module, students will be able to:
  • Describe the Wake On LAN feature.
  • Describe power management.
  • Describe the Configuration Manager 2007 Remote Tools feature.
  • Configure the Remote Tools Client Agent.
Module 12: Planning and Configuring a Multiple Site HierarchyThis module describes how to configure a multiple site hierarchy in Configuration Manager 2007.Lessons
  • Introduction to the Configuration Manager 2007 Site Hierarchy
  • Configuring Configuration Manager 2007 Site Communications
  • Installing a Secondary Site Server
  • Roaming in Multiple Site Hierarchies
  • Decommissioning Sites and Hierarchies
Lab : Planning a Configuration Manager 2007 Hierarchy and Installing a Primary Child Site
  • Planning a Configuration Manager Hierarchy
  • Preparing the Central Site
  • Configuring Parent-Site Communications Settings
  • Configuring Child-Site Communications Settings
  • Establishing the Parent-Child Relationship
  • Verifying Communication Between Parent and Child Sites
  • Transferring Site Settings
Lab : Installing Secondary Sites and Proxy Management Points
  • Installing a Secondary Site
  • Configuring Site Boundaries
  • Installing a Proxy Management Point
Lab : Roaming Between Configuration Manager 2007 Sites
  • Preparing Packages for Roaming
  • Roaming to a Primary Child Site
  • Roaming to a Secondary Child Site
After completing this module, students will be able to:
  • Describe Configuration Manager site hierarchies.
  • Describe site-to-site communication, and how to connect primary sites to parent sites.
  • Explain how to install a secondary child site.
  • Describe client roaming in multiple site hierarchies.
  • Explain how to decommission sites and hierarchies.
Module 13: Maintaining and Monitoring Microsoft System Center Configuration Manager 2007This module explains how to maintain and monitor Configuration Manager 2007.Lessons
  • Configuration Manager 2007 Maintenance Tasks
  • Backup and Recovery of Configuration Manager 2007
  • Using Windows Performance Monitor to Monitor Configuration Manager 2007
Lab : Backing Up and Repairing a Primary Site System
  • Configuring the Backup Configuration Files
  • Preparing the Configuration Manager Hierarchy
  • Backing up a Primary Site System
  • Performing a Site Repair
After completing this module, students will be able to:
  • Describe and schedule site maintenance tasks for Configuration Manager.
  • Describe and schedule backup and recovery tasks for Configuration Manager.
  • Explain how to use System Center Operations Manager 2007 to monitor Configuration Manager 2007.
  • Use Windows Performance Monitor to monitor Configuration Manager 2007.
Module 14: Microsoft System Center Configuration Manager 2007 Native Mode and Internet-Based Client ManagementThis module explains Configuration Manager 2007 native mode, and how to install it.Lessons
  • Introduction to the Configuration Manager 2007 Native Mode
  • The Public Key Infrastructure Required for Native Mode
  • Configuring Sites for Native Mode
  • Internet-Based Client Management
Lab : Configuring Native Mode
  • Configuring the Certificate Templates
  • Enrolling Certificates Required for Native Mode
  • Changing From Mixed Mode to Native Mode
Lab : Configuring a Site for Internet-Based Client Management
  • Configuring Site Roles for Internet-Based Client Management
  • Configuring Clients for Internet-Based Client Management
After completing this module, students will be able to:
  • Describe System Center Configuration Manager native mode.
  • Describe Public Key Infrastructure requirements for native mode.
  • Configure sites for native mode.
  • Configure Internet-Based Client Management.
OutlineModule 1: Evaluating and Planning for VirtualizationDescribe virtualization as it relates to server, desktop, and application environments. Students also will learn how to plan for critical decision points related to hardware requirements, storage, availability, and security.Lessons
  • Overview of Microsoft Virtualization
  • Overview of Microsoft Virtualization
  • Evaluating the Current Environment for Virtualization
  • Evaluating the Current Environment for Virtualization
Lab : Evaluating the Network Environment for Virtualization
  • Planning for the Hyper-V Server Role
  • Assessing the Computing Environment by Using the MAP Toolkit
After completing this module, students will be able to:
  • Describe the challenges that traditional network environments face, which organizations can address by using virtualization technologies.
  • Describe virtualization technology.
  • Identify options available for server virtualization.
  • Identify options available for desktop and presentation virtualization.
  • Identify options available for application virtualization.
  • Determine the most appropriate virtualization solution based upon organizational requirements.
  • Describe management tasks for a virtual environment.
  • Describe the components that make up the Microsoft System Center solution.
  • Describe how you can use System Center Virtual Machine Manager  to manage virtual environments.
  • Describe how you can use  System Center Data Protection Manager  to backup and recover a virtual environment.
  • Describe how you can use System Center Operations Manager to monitor and respond to performance issues that relate to the virtual environment.
  • Describe how you can use System Center Operations Manager to manage and maintain both physical and virtual systems.
  • Describe management tasks for a virtual environment.
  • Describe the components that make up the Microsoft System Center solution.
  • Describe how you can use System Center Virtual Machine Manager  to manage virtual environments.
  • Describe how you can use  System Center Data Protection Manager  to backup and recover a virtual environment.
  • Describe how you can use System Center Operations Manager to monitor and respond to performance issues that relate to the virtual environment.
  • Describe how you can use System Center Operations Manager to manage and maintain both physical and virtual systems.
  • Describe the Hyper-V Server Role.
  • Describe requirements and limits for the Hyper-V Server Role.
  • Describe planning considerations for Hyper-V disks and storage.
  • Describe options for storage configuration in Hyper-V.
  • Describe options for providing high availability for Hyper-V.
Module 2: Installing and Configuring the Hyper-V Server RoleAfter completing this module, you will be able to install the Hyper-V server role, and configure host and virtual network settings.Lessons
  • Installing the Hyper-V Server Role
  • Configuring Hyper-V Settings and Virtual Networks
Lab : Installing and Configuring the Hyper-V Server Role
  • Installing the Hyper-V Role
  • Determining Virtual Network Configuration Settings Based On Organizational Requirements
  • Configuring Virtual Network  Settings Using Virtual Network ManagerIn this exercise, you will: Configure virtual networks based on the design in Exercise 2
  • Installing Remote Management Tools
After completing this module, students will be able to:
  • Describe the prerequisites for installing Hyper-V.
  • Describe the process for installing Hyper-V on a Windows Server 2008 R2 host.
  • Identify the management tools that you can use to manage the Hyper-V server role.
  • Install and configure Hyper-V management for remote administration.
  • Installing the Hyper-V Server Role on a Server Core Installation of Windows Server 2008 R2.
  • Modify the default folders for virtual machines and virtual hard disks.
  • Configure Hyper-V user settings.
  • Determine when to use external, internal, or private virtual machine networks.
  • Use Virtual Network Manager to configure virtual networks.
  • Configure Hyper-V to support VLANs.
Module 3: Creating and Configuring Virtual Hard Disks and Virtual MachinesAfter completing this module, you will be able to determine and configure the most appropriate virtual hard disk(s) to use in a virtual machine. Students also will be able to create and configure virtual machines.Lessons
  • Creating and Configuring Virtual Hard Disks
  • Creating and Configuring Virtual Machines
  • Managing Virtual Machine Snapshots
  • Working with the Virtual Machine Connection Application
Lab : Creating Virtual Hard Disks and Virtual Machines
  • Creating Appropriate Virtual Hard Disks, Based On Organizational Requirements
  • Creating New Virtual Machines Using the Virtual Machine Wizard
  • Modifying Virtual Machine Settings
  • Creating and Modifying Virtual Machine Snapshots
After completing this module, students will be able to:
  • Describe storage options for virtual machines.
  • Prepare the host computer to attach physical disks to a virtual machine.
  • Configure storage based on Internet Small Computer System Interface (iSCSI).
  • Describe the types of virtual hard disks.
  • Describe the use and benefits of pass-through disks.
  • Create a new virtual hard disk using the new Virtual Hard Disk Wizard.
  • Edit and inspect virtual hard disks.
  • Describe considerations for creating new virtual machines.
  • Create a new virtual machine using the new Virtual Machine Wizard.
  • Configure virtual machine settings.
  • Describe the Hyper-V integration services.
  • Import and export virtual machines.
  • Describe the file formats that you use for virtual machines.
  • Migrate legacy virtual machines to Hyper-V.
  • Describe what a virtual machine snapshot is and how you use it. Be sure to include information on the file format.
  • Describe considerations for using snapshots, including storage sizing and requirements.
  • Creating and managing virtual machine snapshots.
  • This lesson will begin by describing a snapshot and the scenarios in which you use snapshots in the enterprise environment.
  • This lesson also describes the concept of a virtual machine snapshot. -This lesson focuses on the management aspects of applying, and deleting, and reverting snapshots. This lesson will also discuss how to configure the snapshot storage. location.
  • Describe the Virtual Machine Connection Tool.
  • List the considerations for using the virtual machine connection tool.
  • Discuss connecting to remote virtual machines from a domain and to a virtual machine in a remote domain.
Module 4: Integrating System Center Virtual Machine Manager with Microsoft Hyper-V Server 2008 R2After completing this module, students will be able to plan for, and deploy, System Center Virtual Machine Manager with their Hyper-V solution.Lessons
  • Planning for Integration of System Center Virtual Machine Manager
  • Installing the VMM Server and Administrator Console
  • Managing Hosts and Host Groups
Lab : Planning and Deploying VMM 2008 R2
  • Planning for the Implementation of SCVMM 2008 R2, Based Upon Organizational Requirements
  • Installing and Configuring SCVMM Server and Administration Console Components
After completing this module, students will be able to:
  • Creating and Managing Host Groups
  • Describe the VMM.
  • Describe VMM 2008 R2 components.
  • Describe system requirements for installing VMM 2008 R2 components.
  • Plan for the management of hosts and host groups.
  • Plan for the implementation of the VMM database.
  • Plan for the implementation of the VMM Library.
  • Describe considerations for installing the VMM Server and Administrator console, including domain requirements, account requirements, and other requirements.
  • Describe the process for installing the VMM Server.
  • Use the VMM Configuration Analyzer to identify configuration issues.
  • Describe the installation and features of the VMM administrator console.
  • Describe common post-installation tasks.
  • Describe the Windows PowerShell – VMM command shell.
  • Describe reasons for using host groups.
  • Create and modify the properties of host groups.
  • Describe the types of hosts that you can add to VMM 2008.
  • Configure default virtual machine paths.
  • Describe the process for adding hosts in an Active Directory directory service domain.
  • Describe the process for adding hosts located in a perimeter network.
  • Describe the management options for a host.
  Module 5: Creating and Deploying Virtual Machines Using System Center Virtual Machine Manager 2008 R2After completing this module, students will be able to use VMM 2008 R2 to create and deploy virtual machines.Lessons
  • Creating a New Virtual Machine Using VMM 2008 R2
  • Converting a Physical Server to a Virtual Machine
  • Converting and Migrating Virtual Machines
Lab : Creating and Deploying Virtual Machines
  • Creating a New Virtual Machine
  • Deploying a New Virtual Machine from the VMM Library
  • Converting a VMware-Based Virtual Machine to a Hyper-V Based Virtual Machine
After completing this module, students will be able to:
  • Describe supported operating systems and hardware capabilities for virtual machines.
  • Identify sources that you can use for new virtual machines.
  • Describe placement options when creating a new virtual machine.
  • Describe how you use ratings to determine appropriate placement.
  • Describe how to customize placement ratings for a specific virtual machine.
  • Deploy stored virtual machines from a VMM Library.
  • Describe considerations and methods for determining physical-to-virtual (P2V) machine conversion candidates.
  • Describe requirements for physical source computers.
  • Perform a P2V conversion.
  • Identify the difference between converting and migrating a virtual machine.
  • Describe requirements for performing a V2V conversion.
  • Describe the options you have when performing a V2V conversion.
  • Describe the considerations and the process for migrating a virtual machine.
  • Describe scenarios for cloning an existing virtual machine.
  • Describe considerations for cloning a virtual machine.
  • Describe the process and decision points for cloning a virtual machine.
Module 6: Managing Virtual Machines Using Virtual Machine Manager 2008This module explains how to perform various management tasks on virtual machines stored within the VMM infrastructure.Lessons
  • Overview of VMM Management Tasks
  • Creating and Managing Checkpoints
Lab : Managing Virtual Machines Using VMM 2008 R2
  • Modifying Virtual Machine Properties
  • Managing Virtual Machine Checkpoints
After completing this module, students will be able to:
  • Describe common actions for operating and managing virtual machines.
  • Perform actions used to operate a virtual machine.
  • Perform actions used to deploy, migrate, and store virtual machines.
  • Perform actions used to manage configurations, disks, and checkpoints.
  • Describe virtual machine property options.
  • Perform actions to configure virtual machine property options.
  • Describe considerations for using checkpoints.
  • Create and modify a VMM checkpoint.
  • Manage VMM checkpoints.
Module 7: Configuring and Managing the VMM LibraryThis module explains how to configure and manage resources in the VMM Library.Lessons
  • Overview of the VMM Library
  • Managing Profiles and Templates
  • Designing Fault Tolerance for the VMM Library
Lab : Configuring and Managing the VMM Library
  • Adding a Library Server and Library Resources
  • Creating a Hardware Profile
  • Creating a Guest Operating-System Profile
  • Creating a Virtual Machine Template
  • Configuring highly available file servers for Virtual Machine Library Using DFS
After completing this module, students will be able to:
  • Describe what the VMM Library is and the types of resources that are stored within the library.
  • Add a Library Server and assign library groups.
  • Add library shares to a library server.
  • Add file-based resources to the library.
  • Describe hardware profiles and benefits of their usage.
  • Describe guest operating system profiles and benefits of their usage.
  • Show how to create a hardware and guest operating-system profile.
  • Describe the benefits for creating and using virtual machine templates.
  • Describe the components that make up a virtual machine template.
  • Create a virtual machine template.
  • Describe options for providing fault tolerance for the VMM Library.
  • Compare and evaluate the differences between the options.
  • List the considerations for supporting highly available Library Servers.
Module 8: Configuring User Roles and the Virtual Machine Manager Self-Service PortalThis module explains how to configure and manage user roles and the Virtual Machine Manager Self-Service Portal.Lessons
  • Configuring User Roles
  • Installing and Configuring the VMM Self-Service Portal
Lab : Configuring the VMM Self-Service Portal
  • Preparing the Host Group and User Role Requirements
  • Implementing the Self-Service Portal
After completing this module, students will be able to:
  • Describe the concept of role-based security in VMM 2008 R2.
  • Describe the role types that are available in VMM 2008 R2.
  • Describe the objects that you can delegate by using Role-based security.
  • Describe the process for creating a user role in VMM 2008.
  • Create user roles in VMM 2008 R2.
  • Determine the most appropriate role-based security configuration based upon organizational requirements.
  • Describe considerations for implementing the VMM Self-Service Portal.
  • Describe the overall process for implementing the Self-Service Portal.
  • Describe system requirements for the VMM Self-Service Portal.
  • Install the SCVMM Self-Service Portal.
  • Configure user access to the SCVMM Self-Service Portal.
  • Describe security best practices for the SCVMM Self-Service Portal.
Module 9: Implementing High Availability for Server VirtualizationThis module explains how to configure high availability for server virtualization.Lessons
  • Overview of Failover Clustering
  • Implementing Failover Clustering with Hyper-V
  • Implementing High Availability with VMM 2008 R2
Lab : Implementing High Availability for Server Virtualization
  • Installing and Configuring the Failover Clustering Feature
  • Configuring Live Migration
  • Integrating Failover Clustering with VMM 2008 R2
After completing this module, students will be able to:
  • Describe options for providing high availability for virtualization.
  • Describe what a Failover Cluster is and how it provides high availability for virtual machines.
  • Describe new Failover Cluster functionality available in Windows Server 2008 R2.
  • Describe considerations for a Failover Cluster design.
  • Determine appropriate Quorum configurations for Failover Clusters.
  • Describe how Failover Clusters work with Hyper-V.
  • Describe best practices for implementing Failover clustering with Hyper-V.
  • Describe requirements for using Hyper-V with failover clustering.
  • Describe the overall process for implementing Hyper-V and failover clustering.
  • Implement failover clustering with Hyper-V.
  • Describe Live Migration.
  • Describe the overall process for implementing Live Migration.
  • Perform Live Migration using Hyper-V.
  • Describe planning considerations for implementing high availability with SCVMM 2008 R2.
  • Describe the overall process for configuring host clusters to support high availability.
  • Describe how to manage host clusters.
  • Implement clustering using VMM 2008.
Module 10: Maintaining Software Updates Using the Offline Virtual Machine Servicing ToolThis module explains how to maintain software updates using the Offline Virtual Machine Servicing Tool.Lessons
  • Overview of the Offline Virtual Machine Servicing Tool
  • Configuring WSUS and the Offline Virtual Machine Servicing Tool
Lab : Maintaining Software Updates Using the Offline Virtual Machine Servicing Tool
  • Configuring Infrastructure Prerequisites to Support the Offline Virtual Machine Servicing Tool
  • Installing and Configuring the Offline Virtual Machine Servicing Tool
After completing this module, students will be able to:
  • Describe methods for maintaining software updates.
  • Describe how the Offline Virtual Machine Servicing Tool works.
  • Describe infrastructure requirements for the Offline Virtual Machine Servicing Tool.
  • Describe tasks required to prepare the virtual machines for offline software-update management.
  • Describe the process for configuration WSUS to support virtual machine servicing.
  • Configure WSUS to support virtual machine servicing.
  • Describe the process for installing and configuring the Offline Virtual Machine Servicing Tool.
  • Install and configure the Offline Virtual Machine Servicing Tool.
Module 11: Monitoring and Reporting VirtualizationThis module explains how to use the monitoring tools included with VMM 2008 and integrate System Center Operations Manager to provide extended monitoring, reporting, and troubleshooting capabilities.Lessons
  • Monitoring Jobs in VMM 2008 R2
  • Integrating System Center Operations Manager with VMM 2008 R2
  • Configuring Performance and Resource Optimization
Lab : Integrating System Center Operations Manager with VMM 2008
  • Configuring System Center Operations Manager for VMM 2008 Integration
  • Configuring PRO
After completing this module, students will be able to:
  • Describe the VMM jobs feature.
  • Describe the methods used to view job status.
  • Cancel and restart jobs.
  • Filter job status.
  • Track changes using Jobs view.
  • Perform management tasks related to job status in VMM.
  • Identify reporting needs for specific virtual environment scenarios.
  • Describe features provided by integrating System Center Operations Manger.
  • Describe prerequisites for integrating Operations Manager.
  • Describe the process for integrating Operations Manager with VMM 2008 R2.
  • Enable reporting in VMM 2008 R2.
  • Describe Performance and Resource Optimization (PRO).
  • Plan for the implementation of PRO.
  • Enable PRO integration.
  • View and implement PRO Tips.
  Module 12: Backup and Restore Strategies for Virtual MachinesThis module explains how to configure and manage resources in the VMM Library.Lessons
  • Overview of Backup and Restore Options for Virtual Machines and the VMM Database
  • Implementing Data Protection Manager for Backing Up the VMM Infrastructure
Lab : Using Data Protection Manager to Back Up the VMM 2008 Infrastructure After completing this module, students will be able to:
  • Describe options for backing up virtual machines.
  • Use the SCVMM Administrator console to back up the VMM database.
  • Describe the process and tools used to restore the VMM database.
  • Describe the features of Data Protection Manager 2007 SP1.
  • Describe the prerequisites for installing and implementing Data Protection Manager 2007 SP1.
  • Describe the process for installing and configuring Data Protection Manager 2007 SP1.
  • Describe the process for configuring backup processes for SCVMM 2008 and Data Protection Manager 2007 SP1.
Module 13: Desktop Virtualization Using Remote Desktop ServicesThis module explains how to describe and implement the core role services included in the Remote Desktop Services server Role.Lessons
  • Overview of Remote Desktop Services
  • Implementing the Remote Desktop Session Host
  • Implementing Remote Desktop Connection Broker
  • Implementing the Remote Desktop Connection Virtualization Host
Lab : Implementing Remote Desktop Services
  • Installing the Remote Desktop Session Host
  • Installing and configuring the Remote Desktop Session Host
  • Installing the Remote Desktop Connection Broker
  • Configuring the Remote Desktop Connection Broker
  • Installing and Configuring the Remote Desktop Virtualization Host
  • Deploying an Application Using RemoteApp
After completing this module, students will be able to:
  • Describe the benefits of Remote Desktop Services.
  • Describe the Role Services included with the Remote Desktop Services sever role.
  • Describe updates to the client experience with Remote Desktop Services.
  • Describe RD Licensing.
  • Describe the prerequisites for installing and implementing the RD Session Host.
  • Describe common configuration and management tasks for the RD Session Host.
  • Describe how to secure an RD Session Host.
  • What is the RDS Broker Role?
  • Describe the prerequisites for installing and implementing the RDS Connection Broker.
  • Describe common configuration and management tasks for the RDS Connection Broker.
  • Deploying RemoteApp to a Windows 7 Client Start menu.
  • Describe the virtual desktop infrastructure concept and how the Remote Desktop Virtualization host works.
  • Describe the prerequisites for installing and implementing the RD Virtualization Host.
  Module 14: Extending Remote Desktop Services Outside the OrganizationThis module explains how to implement and configure the Remote Desktop Gateway and Remote Desktop Web Access.Lessons
  • Configuring the Remote Desktop Gateway
  • Configuring Remote Desktop Web Access
Lab : Integrating Remote Desktop Web Access into the Desktop Virtualization Infrastructure
  • Installing Remote Desktop Gateway
  • Installing Remote Desktop Web Access
  • Configuring Remote Desktop Web Access
  • Integrating RemoteApp and Desktop Connection with Remote Desktop Web Access
Module 1: Overview of System Center 2012 Configuration Manager This module describes the System Center 2012 Configuration Manager feature set and explains how to manage sites by using the System Center 2012 Configuration Manager Console.Lessons
  • Introduction to System Center 2012 Configuration Manager
  • Overview of System Center 2012 Configuration Manager Architecture
  • Overview of the Configuration Manager Console
  • Tools for Monitoring and Troubleshooting a Configuration Manager Site
Lab : Exploring the Configuration Manager Console
  • Exploring the Configuration Manager Console
  • Searching in the Configuration Manager Console
Lab : Monitoring and Troubleshooting a Configuration Manager Site
  • Configuring Status Summarizers
  • Managing Components by Using Configuration Manager Service Manager
  • Monitoring Site and Component Status
  • Reviewing Log Files by Using Configuration Manager Trace Log Tool
After completing this module, students will be able to:
  • Describe the purpose and functionality of System Center 2012 Configuration Manager.
  • Describe the System Center 2012 Configuration Manager architecture.
  • Identify and locate the management features available in the Configuration Manager console.
  • Identify and use the tools available to monitor and troubleshoot a Configuration Manager site.
Module 2: Discovering and Organizing ResourcesThis module explains how to configure discovery methods, configure boundaries and boundary groups, manage user and device collections, and implement role-based security.Lessons
  • Configuring Resource Discovery
  • Configuring Boundaries and Boundary Groups
  • Configuring User and Device Collections
  • Configuring Role-Based Administration
Lab : Configuring Resource Discovery and Boundaries
  • Configuring Active Directory Discovery Methods
  • Configuring Boundaries and Boundary Groups
Lab : Configuring User and Device Collections
  • Creating a Device Collection
  • Creating a User Collection
  • Configuring a Maintenance Window
Lab : Configuring Role-Based Administration
  • Configuring a New Scope for Toronto Administrators
  • Configuring a New Administrative User
After completing this module, students will be able to:
  • Configure resource discovery.
  • Configure boundaries and boundary groups.
  • Configure user and device collections.
  • Configure role-based administration.
Module 3: Managing the Configuration Manager ClientThis module explains how to configure client deployment methods and client settings, and monitor client status.Lessons
  • Overview of the Configuration Manager Client
  • Deploying the Configuration Manager Client
  • Managing Client Agents
  • Configuring and Monitoring Client Status
Lab : Deploying the Configuration Manager Client
  • Preparing the Site for Client Installation
  • Deploying the Configuration Manager Client by Using Client Push Installation
  • Deploying the Configuration Manager Client by Using Group Policy (Optional)
Lab : Managing Client Settings
  • Configuring Client Settings
Lab : Configuring and Monitoring Client Status
  • Configuring and Monitoring Client Communication and Health Status
After completing this module, students will be able to:
  • Describe the requirements for installing the Configuration Manager 2012 client.
  • Describe the site roles and methods used to deploy the Configuration Manager client.
  • Describe how to configure the client agent settings.
  • Describe how to monitor client health.
Module 4: Managing Inventory and Software MeteringThis module explains how to configure and manage hardware and software inventory, monitor inventory data flow, and use asset intelligence and software metering. Lessons
  • Overview of Inventory Collection
  • Configuring Hardware Inventory
  • Configuring Software Inventory
  • Managing Inventory Collection
  • Configuring Asset Intelligence
  • Configuring Software Metering
Lab : Configuring and Managing Inventory Collection
  • Configuring Hardware Inventory
  • Configuring Software Inventory
Lab : Configuring and Managing Asset Intelligence
  • Preparing the Site for Asset Intelligence
  • Configuring Asset Intelligence
  • Customizing Asset Intelligence
  • Viewing Asset Intelligence Reports
Lab : Configuring Software Metering
  • Configuring Software Metering
After completing this module, students will be able to:
  • Describe inventory collection.
  • Configure and collect hardware inventory.
  • Configure and collect software inventory.
  • Manage inventory collection.
  • Configure asset intelligence.
  • Configure software metering.
Module 5: Querying and Reporting DataThis module explains how to create queries and run reports by using SQL Server Reporting Services.Lessons
  • Introduction to Queries
  • Managing Queries
  • Configuring SQL Server Reporting Services
Lab : Creating and Running Queries
  • Creating Data Queries
  • Creating Subselect Queries
  • Creating Status Message Queries
Lab : Configuring Reporting
  • Configuring a Reporting Services Point
After completing this module, students will be able to:
  • Describe data and status message queries.
  • Configure and manage data and status message queries.
  • Configure and manage SQL Server Reporting Services in Configuration Manager.
Module 6: Managing Software Deployments by Using Packages and ProgramsThis module explains how to create and deploy packages and programs.Lessons
  • Configuring Software Distribution
  • Configuring Packages and Programs
  • Distributing Content to Distribution Points
  • Deploying Programs to Configuration Manager Clients
Lab : Managing Software Deployment by Using Packages and Programs
  • Preparing the Infrastructure for Software Deployment
  • Creating a Package and Configuring Programs
  • Distributing Content to a Distribution Point
  • Deploying a Program to Configuration Manager Clients
After completing this module, students will be able to:
  • Describe the software distribution process and configure software distribution settings.
  • Configure packages and programs.
  • Distribute content to distribution points.
  • Deploy programs to Configuration Manager clients.
Module 7: Creating and Deploying ApplicationsThis module explains how to create and deploy applications by using the System Center 2012 Configuration Manager application model.Lessons
  • Overview of Application Management
  • Creating Applications
  • Deploying Applications
  • Configuring the Application Catalog
Lab : Creating and Deploying an Application
  • Creating and Deploying a Required Application
  • Creating and Deploying an Available Application
Lab : Deploying Applications from the Application Catalog
  • Installing and Configuring the Application Catalog
  • Creating and Deploying Applications to the Application Catalog
  • Installing Applications from the Application Catalog
After completing this module, students will be able to:
  • Describe application management in Configuration Manager.
  • Create applications.
  • Deploy applications.
  • Configure the Application Catalog.
Module 8: Managing Application DeploymentThis module explains how to configure application deployment requirements, application supersedence, application un-installation, and multiple deployment types.Lessons
  • Configuring Requirements and Dependencies for Deployment Types
  • Configuring Multiple Deployment Types and User Device Affinity
  • Managing Applications
Lab : Advanced Application Deployment
  • Configuring User Device Affinity
  • Creating Applications with Requirements
  • Deploying Required Applications to Users
  • Creating an Application with Multiple Deployment Types
Lab : Managing Application Supersedence and Removal
  • Using Application Supersedence
  • Uninstalling the Excel Viewer Application
After completing this module, students will be able to:
  • Describe the requirement rules and dependencies for deployment types.
  • Configure multiple deployment types and user device affinity.
  • Manage applications by uninstalling and replacing applications using application supersedence.
Module 9: Deploying and Managing Software UpdatesThis module explains how to deploy and manage software updates.Lessons
  • Overview of Software Updates
  • Preparing the Configuration Manager Site for Software Updates
  • Managing Software Updates
  • Configuring Automatic Deployment Rules
  • Monitoring and Troubleshooting Software Updates
Lab : Configuring the Site for Software Updates
  • Configuring and Synchronizing the Software Update Point
Lab : Deploying and Managing Software Updates
  • Determining Software Update Compliance
  • Deploying Software Updates to Clients
  • Configuring Automatic Deployment Rules
After completing this module, students will be able to:
  • Describe how the software updates feature integrates with Configuration Manager 2012.
  • Prepare a Configuration Manager site for software updates.
  • Manage software update evaluation and deployment.
  • Configure automatic deployment rules.
  • Monitor and troubleshoot software updates.
Module 10: Implementing Endpoint Protection in Configuration Manager 2012This module explains how to integrate and implement System Center 2012 Endpoint Protection with System Center 2012 Configuration Manager.Lessons
  • Overview of Endpoint Protection in Configuration Manager
  • Configuring and Monitoring Endpoint Protection Policies
Lab : Implementing Endpoint Protection
  • Configuring the Endpoint Protection Point and Client Settings
  • Configuring and Deploying Endpoint Protection Policies
  • Monitoring Endpoint Protection
After completing this module, students will be able to:
  • Describe how Endpoint Protection is used to detect and remediate malware and security vulnerabilities.
  • Configure and monitor Endpoint Protection policies.
Module 11: Managing Operating System DeploymentThis module explains how to deploy operating systems by using the System Center 2012 Configuration Manager infrastructure.Lessons
  • Overview of Operating System Deployment
  • Preparing the Site for Operating System Deployment
  • Capturing an Operating System Image
  • Deploying an Operating System
Lab : Preparing the Environment for Operating System Deployment
  • Managing Site System Roles Used to Support Operating System Deployment
  • Managing Packages to Support Operating System Deployment
Lab : Building and Capturing a Reference Image
  • Creating a Build and Capture Task Sequence
  • Capturing the Reference Computer
Lab : Performing an In-Place Upgrade
  • Preparing the Operating System Image
  • Creating a Task Sequence to Deploy an Image
  • Deploying an Image
After completing this module, students will be able to:
  • Describe operating system deployment.
  • Prepare a site for operating system deployment.
  • Capture operating system images.
  • Deploy operating systems.
Module 12: Managing Compliance SettingsThis module explains how to manage configuration items and baselines to assess and remediate the compliance of settings on devices.Lessons
  • Overview of Compliance Settings
  • Configuring Compliance Settings
  • Viewing Compliance Results
Lab : Managing Compliance Settings
  • Managing Configuration Items and Baselines
  • Viewing Compliance Settings Reports
  • Configuring Remediation in Compliance Settings
  • Using Compliance Information to Create Collections
After completing this module, students will be able to:
  • Describe the Compliance Settings feature.
  • Configure the Compliance Settings feature.
  • View compliance results.
Module 13: Managing Mobile DevicesThis module explains how to configure the mobile device management settings.Lessons
  • Configuring Mobile Device Management
  • Depth Management of Mobile Devices
  • Deploying Applications to Mobile Devices
Lab : Managing Mobile Devices
  • Preparing the Infrastructure for Mobile Device Management
  • Enrolling a Mobile Device
  • Managing Compliance Settings for a Mobile Device
  • Deploying an Application to a Mobile Device
After completing this module, students will be able to:
  • Configure mobile device management.
  • Describe how you can use depth management to manage supported mobile devices.
  • Deploy applications to mobile devices.
Module 14: Configuring Wake On LAN, Power Management, and Remote ControlThis module explains how to configure Wake On LAN, power management policies, and Remote Control.Lessons
  • Configuring Wake On LAN
  • Overview of Out of Band Management
  • Configuring Power Management Settings
  • Configuring Remote Control
Lab : Configuring Power Management Settings
  • Applying a Power Management Plan
Lab : Configuring Remote Control
  • Configuring the Remote Tools Client Settings and Permissions
  • Managing Desktops by Using Remote Control
After completing this module, students will be able to:
  • Configure the Wake On LAN feature.
  • Describe out of band management.
  • Configure power management settings.
  • Configure Remote Control features.
OutlineModule 1: Overview of System Center 2012 Configuration Manager This module describes the Configuration Manager 2012 infrastructure and typical deployment scenarios. Lessons
  • Introduction to System Center 2012 Configuration Manager
  • Overview of the Configuration Manager 2012 Server Default Site System Roles
  • Overview of the Configuration Manager 2012 Server Optional Site System Roles
  • Overview of Configuration Manager 2012 Deployment Scenarios
After completing this module, students will be able to:
  • Describe the System Center 2012 Configuration Manager architecture.
  • Describe the Configuration Manager 2012 server infrastructure.
  • Describe typical Configuration Manager 2012 deployment scenarios.
  • Describe the Configuration Manager 2012 client.
Module 2: Planning and Deploying a Stand-Alone Primary Site This module explains the planning process, inputs, and typical planning activities for deploying a stand-alone primary site. It also describes the prerequisites for installing a site server and related components, the process of installing, configuring, and monitoring a stand-alone primary site. This module also describes the requirements for managing Internet-based clients and configuring a Microsoft PKI solution. Lessons
  • Planning a System Center 2012 Configuration Manager Stand-Alone Primary Site Deployment
  • Preparing to Deploy a Configuration Manager 2012 Primary Site
  • Installing a Configuration Manager 2012 Site Server
  • Performing Post-Setup Configuration Tasks
  • Tools for Monitoring and Troubleshooting a Configuration Manager 2012 Installation
  • Managing Internet-Based Clients
Lab : Installing a Configuration Manager 2012 Primary Site
  • Configuring the Prerequisites for Configuration Manager 2012 Deployment
  • Extending the Active Directory Schema
  • Installing a Configuration Manager 2012 Stand-Alone Primary Site
Lab : Performing Post-Setup Configuration Tasks
  • Validating the Installation of the Primary Site
  • Performing the Initial Configuration of the Primary Site
Lab : Configuring PKI for Configuration Manager
  • Creating Certificate Templates for Configuration Manager
  • Deploying Certificates for Configuration Manager
After completing this module, students will be able to:
  • Describe the planning tasks for a Configuration Manager 2012 primary site deployment.
  • Identify the preparation steps for deploying Configuration Manager 2012.
  • Install a Configuration Manager 2012 primary site.
  • Perform post-setup configuration tasks.
  • Describe the tools used to monitor and troubleshoot a Configuration Manager 2012 installation.
  • Describe processes used to manage Internet-based clients.
Module 3: Planning and Configuring Role-Based AdministrationThis module explains how to plan and configure administrative roles.Lessons
  • Overview of Role-Based Administration
  • Identifying IT Roles in Your Organization
  • Configuring Role-Based Administration
Lab : Planning and Configuring Role-Based Administration
  • Reviewing Built-in Security Roles and Scopes
  • Creating Custom Security Roles and Scopes
  • Testing the Permissions of the New Role
After completing this module, students will be able to:
  • Describe role-based administration concepts.
  • Describe the process of identifying a typical IT department’s job roles and identify their responsibilities and activities.
  • Create new security roles and configure scopes in Configuration Manager 2012.
Module 4: Planning and Deploying a Multiple-Site Hierarchy This module explains how to plan and deploy a multiple-site hierarchy including the central administration site, primary sites, and secondary sites. Lessons
  • Planning a Configuration Manager 2012 Multiple-Site Hierarchy
  • Deploying a Configuration Manager 2012 Site
  • Deploying the Central Administration Site
  • Deploying Primary Sites in a Hierarchy
  • Deploying Secondary Sites
Lab : Installing the Central Administration Site
  • Extending the Active Directory Schema
  • Installing the Central Administration Site
  • Validating the Installation
Lab : Installing a Primary Site in an Existing Hierarchy
  • Installing a Primary Site in an Existing Hierarchy
  • Validating the Installation
  • Automating the Installation of a Primary Site
Lab : Installing a Secondary Site
  • Configuring Prerequisites
  • Installing a Secondary Site from a Primary Site
  • Validating the Installation
After completing this module, students will be able to:
  • Describe the Configuration Manager 2012 hierarchy model, types of sites, and when to use each site type.
  • Describe the role of the central administration site in a hierarchy.
  • Install the central administration site.
  • Install a primary site in an existing hierarchy.
  • Install a secondary site.
Module 5: Data Replication and Content ManagementThis module describes types and data replication, monitoring and troubleshooting data replication throughout the hierarchy, and planning for, configuring, and monitoring content management.Lessons
  • Introduction to Data Types and Replication
  • Monitoring and Troubleshooting Data Replication
  • Planning for Content Management
  • Configuring and Monitoring Content Management
Lab : Monitoring and Troubleshooting Data Replication
  • Monitoring Replication
  • Troubleshooting Replication
Lab : Configuring Content Management
  • Create a Distribution Point and a Distribution Point Group
  • Distribute and Monitor Content
  • Perform Content Prestaging
After completing this module, students will be able to:
  • Describe site and global data types and how data is replicated throughout the hierarchy.
  • Monitor and troubleshoot data replication.
  • Plan for content management.
  • Configure and monitor content management.
Module 6: Planning and Completing System Center 2012 Configuration Manager Client DeploymentThis module explores various methods to plan and deploy Configuration Manager 2012 clients, including discovery methods, client deployment methods, managing clients, and monitoring client status.Lessons
  • Introduction to Discovery Methods
  • Introduction to Configuration Manager 2012 Client Deployment
  • Deploying Configuration Manager 2012 Clients
  • Managing Configuration Manager 2012 Clients
  • Monitoring Configuration Manager 2012 Client Status
Lab : Planning and Completing Configuration Manager 2012 Client Deployment
  • Configuring Active Directory Discovery Methods
  • Using Client Push to Install Configuration Manager 2012 Clients
  • Verifying Configuration Manager 2012 Client Installation
After completing this module, students will be able to:
  • Describe resource discovery processes and methods.
  • Describe the client installation process and client deployment methods.
  • Plan and complete a typical client deployment.
  • Describe managing Configuration Manager 2012 clients after installation.
  • Describe the new Client Health feature in Configuration Manager 2012.
Module 7: Maintaining and Monitoring System Center 2012 Configuration ManagerThis module describes how to perform various Configuration Manager 2012 maintenance tasks, and how to monitor site systems.Lessons
  • Overview of Configuration Manager 2012 Site Maintenance
  • Performing Backup and Recovery of a Configuration Manager 2012 Site
  • Monitoring Configuration Manager 2012 Site Systems
Lab : Maintaining and Monitoring System Center 2012 Configuration Manager
  • Configuring the Site Backup Task
  • Recovering the Site from a Backup
  • Monitoring Configuration Manager
After completing this module, students will be able to:
  • Describe Configuration Manager 2012 site maintenance tasks.
  • Back up and recover a Configuration Manager 2012 site.
  • Monitor Configuration Manager 2012 site systems.
Module 8: Migrating from System Center Configuration Manager 2007 to System Center 2012 Configuration ManagerThis module describes the migration of objects from Configuration Manager 2007 to Configuration Manager 2012.Lessons
  • Overview of the Migration Process
  • Preparing Configuration Manager 2007 Sites for Migration
  • Configuring Migration Settings
  • Migrating Objects
Lab : Migrating from System Center Configuration Manager 2007 to System Center 2012 Configuration Manager
  • Configuring the Source Hierarchy
  • Creating a Migration Job and Performing Migration
After completing this module, students will be able to:
  • Describe the migration process from Configuration Manager 2007 to Configuration Manager 2012.
  • Prepare Configuration Manager 2007 sites for migration.
  • Configure migration settings.
  • Migrate objects.
Course Outline Module 1: Introduction to the Private Cloud This module gives students an overview of a private cloud infrastructure, including what it is, the business and technical drivers behind implementing it, and how they can use System Center 2012 to monitor and operate it. Students will understand the key concepts of a private cloud and verify key components of System Center 2012.Lessons
  • Overview of the Cloud Computing Model
  • Requirements for the Private Cloud
  • Operating a Private Cloud Infrastructure with System Center
  • Maintaining the Health of the Private Cloud
  • Integrating System Center Components
  • Verifying the Compliance of the Private Cloud Infrastructure
Lab : Verifying the Private Cloud Infrastructure
  • Verifying the Infrastructure
  • Verifying System Center Components
Lab : Verifying the Compliance of the Private Cloud Infrastructure
  • Exercise: Checking Compliance
After completing this module, students will be able to:
  • Describe the features of a cloud computing model.
  • Describe the requirements for the private cloud.
  • Describe how you can use System Center to monitor and manage the private cloud.
  • Describe how to maintain the health of the private cloud infrastructure.
  • Describe how to integrate System Center components.
  • Verify the compliance of the private cloud infrastructure.
Module 2: Configuring and Optimizing Business Unit CloudsThis module explains how to configure a new business unit cloud within Virtual Machine Manager.Lessons
  • Overview of System Center Virtual Machine Manager
  • Managing a Virtual Environment with Virtual Machine Manager
  • Creating Business Unit Clouds
Lab : Configuring and Optimizing Business Unit Clouds
  • Configuring Network Resources
  • Creating the Business Unit Cloud
  • Configuring Security
After completing this module, students will be able to:
  • Describe the core components, key features, architecture, and security features of Virtual Machine Manager, and the role it plays in the private cloud.
  • Use Virtual Machine Manager to manage private cloud infrastructure.
  • Describe how to build and configure resources and security for a business unit cloud.
Module 3: Deploying Cloud ServicesThis module explains how to deploy pre-packaged applications and create a new service template to deploy a service into the cloud.Lessons
  • Overview of Service Templates
  • VMM Profiles
  • Web Deploy Packages
  • Overview of Server App-V
  • Data-Tier Application Packages
Lab : Importing and Deploying the Stock Trader Application
  • Deploying a Single Tier Service
  • Configuring Prerequisites
  • Preparing the Stock Trader Service Template
  • Deploying the Service Template
After completing this module, students will be able to:
  • Create service templates in VMM by using the Service Template Designer.
  • Describe the process of creating VMM profiles.
  • Describe the process of creating Web Deploy packages.
  • Describe the process of sequencing by using Server App-V.
  • Describe the process of creating data-tier application packages.
Module 4: Monitoring Private Cloud ServicesThis module provides an overview of System Center Operations Manager. The students are shown how Operations Manager is used to monitor the various services that underpin the private cloud. The students are then shown how to deploy agents to key service components running within the private cloud. Custom monitoring is then applied to these components which include the creation of a distributed application model to give a holistic view of the health of the private cloud infrastructure.Lessons
  • Overview of System Center Operations Manager
  • Agent Deployment in Operations Manager
  • Configuring Custom Monitoring
  • Monitoring the Network Infrastructure
  • Monitoring Distributed Applications
Lab : Monitoring Private Cloud Services
  • Deploying an Agent
  • Configuring Custom Monitoring
  • Creating a Distributed Application Model
  • Detecting and Recovering from a Failure
After completing this module, students will be able to:
  • Describe the key features of Operations Manager.
  • Describe the architecture of Operations Manager, including databases, management servers, management server pools, consoles, gateways, and reporting.
  • Describe how to secure access to Operations Manager by using User Roles.
Module 5: Configuring Application Performance MonitoringThis module gives students a deep insight into the Application Performance Monitoring (APM) feature of Operations Manager. A .NET application has been installed into the lab environment that will be used for this module. Students will learn to configure APM to monitor the performance and availability of this application. A break in the application is then instigated where students will see how Operations Manager detects and reports this with the Alerting and Diagnostics tools that are built into Operations Manager.Lessons
  • Application Performance Monitoring
  • Advanced Monitoring in Application Performance Monitoring
  • Viewing Application Performance in Operations Manager
Lab : Configuring Application Performance Monitoring
  • Configuring Basic Monitoring in Application Performance Monitoring
  • Customizing the Performance Thresholds
  • Validating Monitoring
  • Creating a Distributed Application Model for the DinnerNow Application
After completing this module, students will be able to:
  • Describe the core components in APM and the best practices when implementing them.
  • Describe how to implement advanced monitoring features that are available in APM.
  • Describe how to view application performance in Operations Manager.
Module 6: Operating and Extending Service Management in the Private Cloud This module explains the core functionality of Service Manager and the steps to create and manage change requests, incidents, and release records. The module also describes about the security model behind Service Manager so that students can customize and extend the integral functionality of the service. Lessons
  • Overview of Service Manager
  • Configuring Security and User Roles
  • Configuring Work Items
  • Configuring Incident Queues
  • Configuring Service Offerings
Lab : Operating and Extending Service Management in the Cloud
  • Configuring Security Roles
  • Configuring Notifications
  • Publishing an Incident Service Offering
  • Raising an Incident
  • Creating an Approving a Change Request
  • Creating an Assigning a Release Record
After completing this module, students will be able to:
  • Describe Service Manager.
  • Describe configuring security and user roles.
  • Describe configuring work items.
  • Describe configuring incident queues.
  • Describe configuring service offerings.
Module 7: Automatic Incident Creation, Remediation, and Change RequestsThis module provides an overview of Orchestrator and explains how Orchestrator integrates with Operations Manager and Service Manager.Lessons
  • Overview of System Center Orchestrator 2012
  • Integrating Orchestrator with Operations Manager and Service Manager
Lab : Automating Incident Creation, Remediation, and Change Requests
  • Configuring the Incident Template
  • Configuring Incidents That Affect the StockTrader Service
  • Automating Incident Remediation and Change Requests
After completing this module, students will be able to:
  • Describe the Orchestrator components and the available Integration Packs.
  • Integrate Orchestrator with Operations Manager and Service Manager.
Module 8: Problem Management in the Private CloudThis module provides an overview of problem management and explains how students can use it within a service management framework. Additionally, this module explains its implementation as a manual feature of Service Manager. Finally, this module describes how to create a custom event monitor in Operations Manager and then use it to identify and route incidents and problems to Service Manager.Lessons
  • Overview of Problem Management
  • Creating Custom Rules
Lab : Automating Problem Management in the Private Cloud
  • Manually Creating a Problem Record
  • Creating a Custom Event Rule in Operations Manager
  • Configuring Automated Problem Record Creation
After completing this module, students will be able to:
  • Describe problem management.
  • Create custom rules.
Module 9: Automating Self-Service Provisioning This module explains about automating self-service provisioning by using the System Center Cloud Service Process Pack, including the configuration items that are created and the request items that are contained in the System Center Cloud Service Process Pack. Lessons
  • Installing and Configuring the System Center Cloud Services Process Pack
  • Cloud Services Configuration Items
  • Cloud Services Request Items
Lab : Automating Self-Service Provisioning
  • Completing the Prerequisites for the System Center Cloud Services Process Pack
  • Installing the System Center Cloud Services Process Pack
  • Configuring the System Center Cloud Services Process Pack
  • Deploying a Virtual Machine for StockTrader by using the Cloud Services Process Pack
After completing this module, students will be able to:
  • Describe how to install and configure the System Center Cloud Services Process Pack.
  • Describe the various Cloud Services configuration items that make up the System Center Cloud Service Process Pack.
  • Describe the various Cloud Services request items that are included in the System Center Cloud Services Process Pack.
Module 10: Private Cloud Protection and RecoveryThis module explains how to protect the resources in the private cloud by using Data Protection Manager. It also explains how to implement a recovery action by using Orchestrator to recover a database.Lessons
  • Protecting Data in the Private Cloud
  • Recovering Data in the Private Cloud
Lab : Private Cloud Protection and Recovery
  • Configuring Manual Protection and Recovery of Key Service Data
  • Configuring Automatic Protection and Recovery of Key Service Data
  • Monitoring Protection Status
After completing this module, students will be able to:
  • Configure data protection in the private cloud.
  • Configure data recovery in the private cloud.
Module 11: Configuring Compliance in the Private CloudThis module explains how to implement IT Governance, Risk Management, and Compliance (GRC) in a private cloud environment by using System Center 2012. It also explains how to implement Software Update Compliance in Virtual Machine Manager to verify whether key private cloud infrastructure is correctly updated with the latest software updates. The module also describes how to implement the IT GRC Management Pack in Service Manager to check for compliance across key Service Components and remediate non-compliant items.Lessons
  • Overview of the Process Pack for IT GRC
  • Installing and Configuring the Process Pack for IT GRC
  • Implementing an IT GRC Control Management Program
  • Maintaining Compliance through VMM Security Baselines and System Center Advisor
Lab : Configuring Compliance in the Private Cloud
  • Creating an IT GRC Control Management Program
  • Adding Test Results to a Manual Control Activity and View Compliance Reports
  • Assigning a Baseline
After completing this module, students will be able to:
  • Describe the System Center 2012 Process Pack for IT GRC.
  • Describe installing and configuring the Process Pack for IT GRC.
  • Describe implementing an IT GRC Control Management Program.
  • Describe maintaining compliance by using VMM Security Baselines and System Center Advisor.
Module 12: Configuring SLAs, Dashboards, and WidgetsThis module describes the various methods for surfacing service and performance-related data from Operations Manager and Service Manager to SharePoint and Microsoft Excel.Lessons
  • Service Level Tracking
  • Configuring and Deploying Widgets and Dashboards
  • Publishing Real-Time State with Microsoft Visio Snap-in
  • System Center Analytics
  • Using Excel and SSRS to View Data
  • Overview of PerformancePoint
Lab : Configuring SLAs, Dashboards, and Widgets
  • Configuring Service Level Tracking
  • Configuring Service Level Management
  • Configuring Microsoft Excel Analytics
  • Configuring PerformancePoint Analytics
After completing this module, students will be able to:
  • Describe Service Level Tracking in Microsoft System Center 2012 Operations Manager.
  • Configure and deploy widgets and dashboards.
  • Describe publishing in real time state with Microsoft Visio.
  • Describe using System Center analytics.
  • View data with Microsoft Office Excel and Microsoft SQL Server Reporting Services.
  • Describe using Microsoft PerformancePoint.
OutlineModule 1: Planning for the Private CloudThis module describes the core components of a private cloud and the prerequisites for deploying a private cloud.Lessons
  • Understanding the Private Cloud
  • Requirements for Deploying a Private Cloud
  • Designing the Private Cloud Infrastructure
  • Overview of System Center 2012 Components
  • Deploying Hyper-V Clustering with VMM
Lab : Planning for the Private Cloud
  • Deploying the Virtual Machine Manager Agent
  • Creating a Hyper-V Host Cluster Using VMM
After completing this module, students will be able to:
  • Describe the private cloud.
  • Describe the requirements for deploying a private cloud.
  • Design a private cloud infrastructure.
  • Describe the System Center 2012 components.
  • Deploy Hyper-V clustering with VMM.
Module 2: Configuring and Deploying the Private Cloud with System Center 2012 -Virtual Machine ManagerThis module describes how to configure infrastructure components by using System Center 2012 -Virtual Machine ManagerLessons
  • Overview of VMM Architecture and Components
  • Installing and Upgrading VMM
  • Configuring VMM Security and Roles
  • Understanding Host Groups
Lab : Configuring and Deploying the Private Cloud Infrastructure
  • Reviewing and Configuring Hosts
  • Configuring Host Groups
  • Configuring User Roles and Run As Accounts
  • Configuring the Library
  • Preparing the Private Cloud Infrastructure
  • Deploying a New Virtual Machine
After completing this module, students will be able to:
  • Describe VMM architecture and components.
  • Install and upgrade VMM.
  • Configure VMM security and roles.
  • Understand host groups.
Module 3: Extending and Maintaining the Private Cloud InfrastructureThis module describes how to integrate features provided by Windows Deployment Services (WDS) and Windows Server Update Services (WSUS) to help extend and manage the VMM private cloud infrastructure resources.Lessons
  • Overview of the PXE and Update Server Roles
  • Deploying Bare-Metal Hyper-V Host Servers
  • Configuring the Update Server Role
  • Creating and Using an Update Baseline
Lab : Maintaining the Private Cloud Infrastructure
  • Configuring a PXE Server in VMM
  • Configuring a Host Profile
  • Configuring an Update Server Role in VMM
  • Configuring a Software Update Baseline in VMM
After completing this module, students will be able to:
  • Describe how VMM integrates with WDS and WSUS to provide PXE and Update server roles.
  • Describe how to deploy bare-metal Hyper-V host servers.
  • Describe how to maintain updates within the VMM infrastructure.
  • Configure the Update server role.
  • Create and use a software update compliance baseline.
Module 4: Configuring Application DeliveryThis module explains how to use the Microsoft Web Deployment Tool and Server App-V to dynamically deploy applications in the private cloud.Lessons
  • Dynamic Application Deployment Overview
  • Web Deployment Packages
  • Server Application Virtualization Overview
  • Configuring Server App-V Components
  • Sequencing and Deploying Virtual Applications
Lab : Configuring Virtual Application Delivery
  • Configuring the Server App-V Sequencer
  • Configuring the Server App-V Agent
  • Sequencing an Application
  • Testing the Server App-V Package Deployment
After completing this module, students will be able to:
  • Describe dynamic application deployment.
  • Create web deployment packages by using the Web Deployment Tool.
  • Describe server application virtualization.
  • Configure the Server App-V agent and sequencer.
  • Sequence and then test a Server App-V virtualized application.
Module 5: Creating the Private Cloud Building BlocksThis module explains how to prepare and deploy the underlying infrastructure components that are used as building blocks for delivering private cloud services.Lessons
  • Configuring Guest Operating System Profiles
  • Configuring Hardware Profiles
  • Configuring SQL Server Using SQL Server Profiles
  • Configuring Application Profiles
  • Configuring Virtual Machine Templates
  • Configuring the Self-Service User Role
Lab : Creating the Private Cloud Building Blocks
  • Configuring Profiles
  • Configuring Virtual Machine Templates
  • Configuring a Service Template
  • Configuring a User Role
  • Deploying the StockTrader Application Service
After completing this module, students will be able to:
  • Configure guest operating system profiles.
  • Configure hardware profiles.
  • Deploy SQL Server using SQL Server profiles.
  • Configure application profiles for a deployment.
  • Configure virtual machine templates.
  • Configure the self-service user role.
Module 6: Deploying and Accessing a Private CloudThis module explains private clouds, System Center 2012 - App Controller, and private cloud services.Lessons
  • Understanding Private Cloud Computing
  • Installing and Configuring App Controller
  • Creating and Managing Services and Service Templates
Lab : Deploying and Accessing a Private Cloud
  • Creating and Configuring a Private Cloud
  • Configuring App Controller
  • Creating, Deploying and Managing Services
After completing this module, students will be able to:
  • Describe private cloud computing.
  • Install and configure App Controller.
  • Create and manage services and service templates.
Module 7: Monitoring the Private Cloud InfrastructureThis module explains how to monitor the private cloud infrastructure by using System Center 2012 - Operations Manager.Lessons
  • Operations Manager Architecture and Security
  • Upgrading Operations Manager 2007 R2
  • Configuring Notifications
  • Configuring Management Packs
  • Configuring Integration with System Center 2012
Lab : Monitoring the Private Cloud Infrastructure
  • Deploying Agents
  • Deploying and Configuring Monitoring Management Packs
  • Configuring Notifications
  • Configuring VMM Integration
  • Configuring DPM Integration
After completing this module, students will be able to:
  • Describe Operations Manager architecture and security considerations.
  • Upgrade from Operations Manager 2007 R2 to System Center 2012 – Operations Manager.
  • Describe the notification options available in Operations Manager.
  • Install, configure, and upgrade management packs.
  • Install and configure Operations Manager integration with VMM and DPM.
Module 8: Extending and Customizing Monitoring of the Private Cloud InfrastructureThis module explains how to use Operations Manager templates to monitor various applications and implement distributed application monitoring.Lessons
  • Configuring the SharePoint Server Portal
  • Monitoring Templates
  • Distributed Application Monitoring
Lab : Extending and Customizing Monitoring
  • Creating Custom Monitoring
  • Creating a Distributed Application
  • Configuring Service Level Management
  • Creating Views for Private Cloud Infrastructure
  • Configuring SharePoint Integration
After completing this module, students will be able to:
  • Integrate Operations Manager data into a SharePoint portal.
  • Describe how to use monitoring templates.
  • Implement distributed application monitoring.
Module 9: Implementing Service Management for the Private CloudThis module explains how to setup, configure, and integrate the core components of System Center 2012 - Service Manager into the private cloud infrastructure.Lessons
  • Service Manager Architecture Overview
  • Upgrading to System Center 2012 - Service Manager
  • Understanding Service Manager Work Items
  • Configuring Service Manager Connectors
  • Configuring Service Manager Notifications
Lab : Implementing Service Management for the Private Cloud
  • Configuring Service Manager Basic Settings
  • Configuring Service Manager Connectors
  • Configuring the Self-Service Portal
  • Configuring Notifications
After completing this module, students will be able to:
  • Setup and configure the core components of Service Manager.
  • Plan an upgrade from Service Manager 2010 R2 to System Center 2012 - Service Manager.
  • Describe the various work items and their relationships with each other.
  • Configure the Service Manager connectors.
  • Configure notifications.
Module 10: Protecting the Private Cloud InfrastructureThis module describes how to deploy and configure Data Protection Manager in a private cloud.Lessons
  • Planning DPM Deployment
  • DPM Architecture and Components
  • Upgrading DPM
  • Configuring DPM for the Private Cloud
  • Configuring Application Protection for the Private Cloud
  • Restoring Applications to the Private Cloud
Lab : Protecting the Private Cloud Infrastructure
  • Configuring the Storage Pool
  • Deploying DPM Protection Agents
  • Creating and Configuring Protection Groups
  • Configuring SQL Server Self-Service Recovery
  • Restoring Data from a SQL Server Protection Group
  • Performing Self-Service Recovery to Recover SQL Server Data
After completing this module, students will be able to:
  • Describe Data Protection Manager architecture and security considerations.
  • Plan an upgrade from Data Protection Manager 2010 R2 to System Center 2012 - Data Protection Manager.
  • Configure the components required to provide protection for the private cloud infrastructure.
  • Configure protection of key applications within the private cloud infrastructure.
  • Restore key applications within the private cloud infrastructure.
Module 11: Automating and Standardizing the Private CloudThis module explains how to deploy and configure System Center Orchestrator in a private cloud and integrate it with other System Center 2012 components.Lessons
  • Orchestrator Architecture and Components Overview
  • Deploying and Configuring Core Components
  • Managing Runbooks
  • Configuring Integration Packs
Lab : Automating the Private Cloud
  • Creating a Runbook Server and Configuring Integration Packs
  • Configuring a Template to Deploy Agents on a New Virtual Machine
  • Creating a Runbook to Protect All Resources on a Virtual Machine
After completing this module, students will be able to:
  • Describe key components of System Center Orchestrator.
  • Describe how to deploy and configure key Orchestrator components in a private cloud.
  • Configure the System Center integration packs in Orchestrator.
  • Create runbooks.
  • Configure Service Manager to execute runbooks.
Module 12: Configuring the Cloud Services Process PackThis modules describes how to implement the Cloud Services Process Pack and use service level management.Lessons
  • Implementing the Cloud Services Process Pack
  • Service Level Management
Lab : Configuring the Cloud Service Process Pack
  • Installing the Cloud Service Process Pack
  • Configuring User Roles and Settings
  • Configuring Service Offerings
  • Creating an Incident Request
  • Configuring Service Level Management
After completing this module, students will be able to:
  • Describe the service catalog and how to implement it in Service Manager.
  • Implement a Cloud Services Process Pack.
  • Configure service request fulfillment.
  • Configure service offerings.
  • Use service level management.
OutlineModule 1: Evaluating the Environment for VirtualizationThis module provides an overview of Microsoft virtualization technologies and the various components of System Center 2012 R2. The module also explains how to evaluate the current environment for virtualization and extend virtualization to the cloud.Lessons
  • Overview of Microsoft Virtualization
  • Overview of System Center 2012 R2 Components
  • Evaluating Current Environment for Virtualization
  • Extending Virtualization to the Cloud
Lab : Evaluating the Environment for Virtualization
  • Selecting the Appropriate Virtualization Method
  • Accessing the Environment by Using MAP
After completing this module, students will be able to:
  • Describe the various virtualization technologies and the scenarios where you would apply each technology.
  • Describe the different System Center 2012 R2 components and explain how they can be used to manage both traditional and modern infrastructure solutions.
  • Evaluate an organization’s virtualization requirements and plan for server virtualization.
  • Explain the concept of a public cloud and how to extend virtualization to the cloud.
Module 2: Installing and Configuring the Hyper-V Server RoleThis module describes how to install and manage the Hyper-V server role. The module also explains how to configure Hyper-V settings, storage, and networking.Lessons
  • Installing the Hyper-V Server Role
  • Managing Hyper-V
  • Configuring Hyper-V Settings
  • Hyper-V Host Storage and Networking
Lab : Installing and Configuring the Hyper-V Server Role
  • Installing the Hyper-V Server Role
  • Configuring Hyper-V Settings
  • Accessing and Managing Hyper-V Remotely
After completing this module, students will be able to:
  • Install the Hyper-V server role.
  • Manage Hyper-V.
  • Configure Hyper-V settings.
  • Describe Hyper-V host storage and networking.
Module 3: Creating and Managing Virtual Hard Disks, Virtual Machines, and CheckpointsThis module explains how to create and configure virtual hard disks and virtual machines. The module then describes how to install, import, monitor, and manage virtual machines.Lessons
  • Creating and Configuring Virtual Hard Disks
  • Creating and Configuring Virtual Machines
  • Installing and Importing Virtual Machines
  • Managing Virtual Machine Checkpoints
  • Monitoring Hyper-V
  • Designing and Managing Virtual Machines
Lab : Creating and Managing Virtual Hard Disks and Virtual Machines
  • Creating and Managing Virtual Hard Disks
  • Creating and Managing Virtual Machines
Lab : Creating and Managing Checkpoints, and Monitoring Hyper-V
  • Importing Virtual Machines and Working with Checkpoints
  • Monitoring Hyper-V
After completing this module, students will be able to:
  • Create and configure virtual hard disks.
  • Create and configure virtual machines.
  • Install and import virtual machines.
  • Manage virtual machine checkpoints.
  • Monitor Hyper-V.
  • Design and manage virtual machines.
Module 4: Creating and Configuring Virtual Machine NetworksThis module explains how to create and use Hyper-V virtual switches and Hyper-V networking features. The module also describes how to configure and implement Hyper-V network virtualization.Lessons
  • Creating and Using Hyper-V Virtual Switches
  • Advanced Hyper-V Networking Features
  • Configuring and Using Hyper-V Network Virtualization
Lab : Creating and Configuring Virtual Machine Networks
  • Creating and Using Hyper-V Virtual Switches
  • Configuring and Using Advanced Virtual Switch Features
  • Configuring Hyper-V Network Virtualization
After completing this module, students will be able to:
  • Describe the Hyper-V virtual switch.
  • Describe the different types of virtual switches.
  • Describe VLAN tagging.
  • Explain how to use Virtual Switch Manager.
  • Explain the use of dynamic switch ports.
  • Explain how to configure and use VLANs.
Module 5: Virtual Machine Movement and Hyper-V ReplicaThis module describes how to provide high availability and redundancy for virtualization. The module also explains how to implement virtual machine movement and Hyper-V Replica.Lessons
  • Providing High Availability and Redundancy for Virtualization
  • Implementing Virtual Machine Movement
  • Implementing and Managing Hyper-V Replica
Lab : Virtual Machine Movement and Hyper-V Replica
  • Moving Hyper-V Storage and Virtual Machines
  • Configuring and Managing Hyper-V Replica
After completing this module, students will be able to:
  • Explain the importance of providing high availability and redundancy for virtualization.
  • Implement virtual machine movement.
  • Implement and manage Hyper-V Replica.
Module 6: Implementing Failover Clustering with Hyper-VThis module provides an overview of failover clustering. The module also describes how configure shared storage, and how to implement failover clustering with Hyper-V.Lessons
  • Overview of Failover Clustering
  • Configuring and Using Shared Storage
  • Implementing and Managing Failover Clustering with Hyper-V
Lab : Implementing Failover Clustering with Hyper-V
  • Creating Hyper-V Failover Cluster
  • Managing Hyper-V Failover Cluster
After completing this module, students will be able to:
  • Describe failover clustering.
  • Configure and use shared storage.
  • Implement and manage failover clustering with Hyper-V.
Module 7: Installing and Configuring System Center 2012 R2 Virtual Machine ManagerThis module describes how to integrate System Center and server virtualization. The module also describes how to install System Center 2012 R2 Virtual Machine Manager, add hosts, and manage host groups.Lessons
  • Integrating System Center and Server Virtualization
  • Overview of System Center 2012 Virtual Machine Manager
  • Installing System Center 2012 R2 Virtual Machine Manager
  • Adding Hosts and Managing Host Groups
Lab : Installing and Configuring System Center 2012 R2 Virtual Machine Manager
  • Installing and Configuring System Center 2012 VMM SP1
  • Managing Hosts and Host Groups
After completing this module, students will be able to:
  • Explain how to use different System Center 2012 R2 SP1 components for managing a virtual environment.
  • Describe the key features of System Center 2012 R2 VMM.
  • Install System Center 2012 R2 VMM.
  • Add virtualization hosts to VMM, and manage virtualization hosts and host groups.
Module 8: Managing the Networking and Storage Infrastructure in System Center 2012 R2 Virtual Machine ManagerThis module describes how to manage networking infrastructure, storage infrastructure, and infrastructure updates.Lessons
  • Managing Networking Infrastructure
  • Managing Storage Infrastructure
  • Managing Infrastructure Updates
Lab : Managing the Networking and Storage Infrastructure in System Center 2012 R2 Virtual Machine Manager
  • Implementing a Network Infrastructure
  • Implementing a Storage Infrastructure
  • Managing Infrastructure Updates
After completing this module, students will be able to:
  • Manage networking and storage infrastructure in VMM
  • Integrate Windows Update Services Server
  • Create update baselines, scan and remediated non-compliant servers.
Module 9: Creating and Managing Virtual Machines by Using Microsoft System Center 2012 R2 Virtual Machine ManagerThis module explains how to create, clone, and convert virtual machines. The module also provides an overview of virtual machine updating.Lessons
  • Virtual Machine Management Tasks in VMM
  • Creating, Cloning, and Converting Virtual Machines
  • Overview of Virtual Machine Updating
Lab : Creating and Managing Virtual Machines by Using System Center 2012 R2 Virtual Machine Manager
  • Creating a Virtual Machine and Modifying Its Properties
  • Cloning a Virtual Machine
After completing this module, students will be able to:
  • Explain virtual machine management tasks in VMM.
  • Explain how to create, clone, and convert virtual machines.
  • Describe methods and tools for updating virtual machines.
Module 10: Configuring and Managing the System Center 2012 R2 Virtual MachineThis module provides an overview of the Virtual Machine Library. The module also describes how to work with profiles and templates.Lessons
  • Overview of the Virtual Machine Manager Library
  • Working With Profiles and Templates
Lab : Configuring and Managing the System Center 2012 R2 Virtual Machine Manager SP1 Library and Library Objects
  • Configuring and Managing the Virtual Machine Manager Library
  • Creating and Managing Profiles and Templates
After completing this module, students will be able to:
  • Perform virtual machine management tasks in Virtual Machine Manager.
  • Create and manage profiles and templates by using different options.
Module 11: Managing Clouds in System Center 2012 R2 Virtual Machine ManagerThis module provides an introduction to clouds and describes how to create and manage a cloud. The module also describes how to work with user roles in VMM.Lessons
  • Introduction to Clouds
  • Creating and Managing a Cloud
  • Working With User Roles in Virtual Machine Manager
Lab : Working With User Roles in Virtual Machine Manager
  • Creating a Cloud
  • Working With User Roles
  • Deploying Virtual Machines to a Cloud
After completing this module, students will be able to:
  • Explain the concept of a cloud and describe how Virtual Machine Manager can be used for creating a cloud.
  • Create and manage a cloud.
  • Create and use user roles in Virtual Machine Manager.
Module 12: Managing Services in System Center 2012 R2 Virtual Machine Manager and App ControllerThis module provides an overview of services in System Center 2012 R2 VMM. The module also describes how to create and manage services in VMM and how to use System Center 2012 R2 App Controller.Lessons
  • Understanding Services in System Center 2012 R2 Virtual Machine Manager
  • Creating and Managing Services in VMM
  • Using System Center 2012 R2 App Controller
Lab : Managing Services in System Center 2012 R2 VMM and App Controller
  • Creating a Service Template
  • Deploying a Service and Updating Service Template
  • Configuring an App Controller
  • Deploying Virtual Machine in App Controller
After completing this module, students will be able to:
  • Explain purpose and functionality of a service.
  • Create and manage services in VMM.
  • Describe how to use System Center 2012 R2 App Controller.
Module 13: Protecting and Monitoring Virtualization InfrastructureThis module provides an overview of backup and restore options for virtual machines. The module describes how to use DPM and System Center Operations Manager for protection, monitoring, and reporting.Lessons
  • Overview of Backup and Restore Options for Virtual Machines
  • Protecting Virtualization Infrastructure by Using Data Protection Manager
  • Using System Center Operations Manager for Monitoring and Reporting
  • Integrating Virtual Machine Manager with Operations Manager
Lab : Monitoring and Reporting Virtualization Infrastructure
  • Implementing System Center 2012 R2 Operations Manager Agent
  • Configuring Operations Manager Monitoring Components
  • Configuring Operations Manager Integration with Virtual Machine Manager
After completing this module, students will be able to:
  • Use backup and restore options provided in Windows Server 2012 R2 and Virtual Machine Manager.
  • Explain the benefits of using DPM for protecting virtualization environment.
  • Describe the Operations Manager components and describe how Operations Manager can be used to monitor physical and virtual servers.
  • Configure Operations Manager integration with Virtual Machine Manager.
OutlineModule 1: Installing Microsoft System Center Operations Manager 2007 This module explains how to install System Center Configuration Manager 2007 in a single Root Management Server configuration and a clustered highly available Root Management Server configuration. Lessons
  • Preparing for Operations Manager 2007 R2
  • Using System Center Capacity Planner
  • Security
  • Installing System Center Operations Manager 2007
  • Post Installation
Lab : Installing Microsoft System Center Operations Manager
  • Installing the Operations Manager Components
After completing this module, students will be able to:
  • Identify the requirements for installing System Center Operations Manager 2007.
  • Install System Center Operations Manager 2007 and verify a successful installation.
Module 2: Using the Operations Console This module explains how to use the Operations Console and how to perform configuration tasks. Lessons
  • Reviewing the Workspaces
  • Using the Web Console
  • Working with Views
  • Reviewing Security Roles
Lab : Creating Operator Accounts and Views
  • Creating Operator Accounts and Views
After completing this module, students will be able to:
  • Install the Operations Console on another system.
  • Understand the workspaces and views.
  • Work with the Actions available for a given object.
Module 3: Configuring Management Group and Agent Settings This module explains how to configure the global management group settings and the individual agent settings within Operations Manager 2007. Lessons
  • Global Settings
  • Overriding Global Settings
  • Creating Notifications
Lab : Configuring Notification Settings
  • Setting Management Group Notification Options
  • Creating Notification Recipients
  • Creating Notification Subscriptions
  • Testing Notification Subscriptions
After completing this module, students will be able to:
  • Configure default management group settings.
  • Override the default management group setting.
  • Configure notification settings and define who will receive the notifications.
Module 4: Agent Installation This module explains how to deploy the Operations Manager agent within the management group. Lessons
  • Configuring Active Directory
  • Push Installation
  • Manual Installation
  • Managing Agents
Lab : Agent Installation
  • Manually Installing the Agent
  • Approving the Manually Installed Agent
After completing this module, students will be able to:
  • Create an Active Directory container for automatic agent assignment.
  • Configure automatic installation settings.
  • Manually install and approve an agent.
Module 5: Management Packs This module explains how to import, export and manage the objects within a management pack. Lessons
  • Management Pack Overview
  • Importing and Exporting Management Packs
  • Creating and Sealing Management Packs
Lab : Creating Monitors
  • Creating a Self-Tuning Threshold
  • Creating a Correlated Windows Event Unit Monitor
Lab : Creating Tasks
  • Creating a Task
  • Testing a Task
Lab : Associating Run As Profiles with a Management Pack
  • Creating a Run As Profile
  • Testing a Task
Lab : Configuring Overrides
  • Create and Verify the Override
After completing this module, students will be able to:
  • Define the components that make up a management pack.
  • Create a new management pack.
  • Export and import management packs.
  • Seal a management pack.
Module 6: Reporting This module explains how to install and configure SQL Reporting Services and then install Operations Manager Reporting and create reports. Lessons
  • Installing and Configuring SQL Reporting Services
  • Installing Operations Manager Reporting
  • Creating and Viewing Reports
Lab : Creating Reports
  • Creating a Model
  • Creating a Report
After completing this module, students will be able to:
  • Install and configure SQL Reporting Services.
  • Install and configure Operations Manager Reporting.
  • View reports.
  • Create reports using Report Builder.
Module 7: Agentless Exception Monitoring This module explains how to configure Agentless Exception Monitoring to monitor for application faults and then monitor the client systems. Lessons
  • Configuring Exception Monitoring
  • Managing Clients
Lab : Configuring Agentless Exception Monitoring
  • Configuring Client Monitoring
  • Configuring Group Policy
  • Testing Client Monitoring
After completing this module, students will be able to:
  • Configure a management server as an Agentless Exception Monitoring collector.
  • Configure clients to generate error reports and send them to the management server.
Module 8: Audit Collection Services This module explains how to install and configure Audit Collection Services, how to enable forwarders and how to manage collectors and forwarders using the Command Shell. Lessons
  • Audit Collection Services Overview
  • Installing Audit Collection Services
  • Configuring Forwarders and Collectors
  • Importing ACS Reports
Lab : Configuring Forwarders
  • Enabling Forwarders
Lab : Configuring ACS Reports
  • Import ACS Reports
After completing this module, students will be able to:
  • Install and configure Audit Collection Services.
  • Optimizing auditing.
  • Create Auditing reports.
Module 9: Synthetic Transactions This module explains how to create a synthetic transaction to proactively monitor components. Lessons
  • Synthetic Transactions
Lab : Creating Synthetic Transactions
  • Building the Synthetic Transaction
  • Testing the Synthetic Transaction
After completing this module, students will be able to:
  • Create and use Synthetic Transactions.
Module 10: Distributed Applications This module explains how to create and use distributed applications to provide end-to-end service monitoring. Lessons
  • Distributed Applications
Lab : Creating a Distributed Application
  • Building the Model
  • Building the Model
After completing this module, students will be able to:
  • Create and use Distributed Applications.
Module 11: Monitoring Non-Microsoft Platforms This module introduces the components that allow monitoring of UNIX, Linux and network devices. Lessons
  • Tools for Monitoring Non-Microsoft Platforms
  • Using the Cross-Platform Extensions
After completing this module, students will be able to:
  • Identify and use the built-in tolls for managing non-Microsoft platforms.
  • Configure and use the Cross-Platform Extensions for monitoring UNIX and Linux systems.
  • Install the Cross-Platform extensions.
Module 12: Complex Environments This module explains how to configure agents to send monitoring data to multiple management servers in multiple management groups. It also explains how to install and configure a Gateway server for clients in untrusted domains and how to configure multiple management groups to interoperate. Lessons
  • Multi-homing Agents
  • Untrusted Environments
  • Multi-Tiered Environments
Lab : Connecting Management Groups
  • Connecting Management Groups
  • Configuring Operator Accounts
After completing this module, students will be able to:
  • Multi-Home and agent.
  • Create a Gateway server to monitor an untrusted domain
  • Create connectors to other management groups and third party management products.
Module 13: Backup and Recovery This module explains how to backup and restore a management group and the management servers within the management group. Lessons
  • Planning Backup and Restore
  • Performing a Backup
  • Planning Recovery Strategies
Lab : Converting Management Packs
  • Promoting a Management Server
After completing this module, students will be able to:
  • Identify the components to back up
  • Plan a backup strategy
  • Implement a backup strategy
  • Implement a restore strategy.
Course OutlineModule 1: Installing and Configuring Windows Server 2008This module explains how to plan and prepare the environment and servers for installation, upgrade, and migration to Windows Server 2008 and Windows Server 2008 R2 operating systems from Windows Server 2003.Lessons
  • Overview of Windows Server
  • Installing Windows Server 2008
  • Managing Server Roles and Features
  • Configuring and Managing Windows Server 2008 Server Core
  • Choosing a Deployment Strategy
  • Deploying Windows Server 2008
Lab : Installing Windows Server and Configuring Post-Installation Settings
  • Install Windows Server 2008 R2
  • Configuring Server Core
  • Enabling Remote Management
  • Adding the Domain Name System and Dynamic Host Configuration Protocol Server Roles
Lab : Deploying Windows Server 2008
  • Installing and Configuring Windows Deployment Services
  • Creating Operating System Images with Windows Deployment Services
  • Using an Unattended File with Windows Deployment Services
  • Completing Windows Deployment Services Configuration
After completing this module, students will be able to: •Describe the steps necessary to prepare to install Windows Server 2008. •Install Windows Server 2008. •Add and remove server roles and features. •Configure and manage Server Core. •Select a deployment technology. •Deploy Windows Server 2008. Module 2: Server Management in Windows Server 2008This module explains new technologies and options available to manage the operating system environment. The module discusses and allows students practice storage configuration, boot configuration, scheduled tasks and services, event logs, and performance monitoring.Lessons
  • Managing Windows Server with Server Manager
  • Managing Server Updates by using WSUS
  • Managing Backup and Restore by Using Windows Server Backup
  • Managing Event Logs and Auditing
  • Performance and Resource Management
Lab : Managing Windows Server 2008
  • Configuring a Replica WSUS Server
  • Managing Windows Server Backup
  • Configuring Event Logging
After completing this module, students will be able to: •Describe and use Server Manager. •Manage server updates by using Windows Server Update Services 3.0 SP2. •Manage backup and restore by using Windows Server Backup. •Describe and perform event logging and auditing. •Perform reliability and performance monitoring. Module 3: Configuring Networking and Network ServicesThis module describes how to configure and troubleshoot the new networking technologies and settings on Windows Server 2008.Lessons
  • Configuring IPv6 Addressing
  • Migrating from IPv4 to IPv6
  • DHCP and DNS Enhancements in Windows Server 2008
  • Configuring and Managing Windows Firewall with Advanced Security
  • Configuring Routing and Networking with Windows Server 2008
Lab : Configuring Networking and Network Services
  • Configuring an ISATAP Router
  • Configuring DHCP and DNS
  • Configuring Windows Firewall
After completing this module, students will be able to: •Configure IPv6 addressing. •Describe and implementIPv6 migration technologies. •Describe the enhancements to DHCP and DNS in Windows Server 2008 •Configure Windows Firewall with Advanced Security. •Configure routing with Windows Server 2008. Module 4: Configuring Network Policy Server and Remote Access servicesThis module explains how to configure Network Policy Server and Remote Access Services in Windows Server 2008. It outlines how to secure your remote access clients by using network policies and, where appropriate, Network Access Protection (NAP) as well as covering technologies such as VPN and also explaining DirectAccess, a feature available with Windows Server 2008 R2Lessons
  • Overview of Network Policy Server
  • Configuring a Network Policy Server
  • Configuring Remote Access
  • Managing DirectAccess in Windows Server 2008 R2
  • Implementing Network Access Protection
  • Configuring VPN Enforcement by Using NAP
Lab : Configuring Network Policy Server and Remote Access Services
  • Configuring Routing and Remote Access as a VPN Remote Access Solution
  • Configuring a Custom Network Policy
  • Create and Distribute a CMAK Profile
Lab : Configuring NAP with VPN Enforcement
  • Configuring NAP Components
  • Configuring Client Settings to Support NAP
After completing this module, students will be able to:
  • Understand the purpose of the Network Policy and Access Services server role.
  • Configure NPS.
  • Configure remote access.
  • Describe and deploy DirectAccess.
  • Describe NAP. Configure VPN enforcement by using NAP.
Module 5: Configuring and Managing Active Directory Domain ServicesThis module explains the new and improved features of Windows 2008 and Windows 2008 R2 Active Directory Domain Services, such as RODC, fine-grained password policies and advanced auditing and others.Lessons
  • Active Directory Enhancements in Windows Server 2008 and 2008 R2
  • Installing and Configuring Domain Controllers
  • Configuring Read-Only Domain Controllers
  • Configuring Fine-Grained Password Policies
  • Managing Active Directory Objects with Windows PowerShell
  • Active Directory Database Management
Lab : Configuring Active Directory Domain Services
  • Installing and Configuring an RODC
  • Implementing Fine-Grained Password Policies
Lab : Managing AD DS Objects and Database
  • Using PowerShell Commands to Administer Active Directory
  • Working with Active Directory Snapshots
  • Restoring Deleted Objects with Active Directory Recycle Bin
After completing this module, students will be able to: •Describe Active Directory Enhancements in Windows Server 2008 and 2008 R2. •Install and configure domain controllers. •Configure read-only domain controllers. •Configure fine-grained password policies. •Manage Active Directory objects with Windows PowerShell. •Perform Active Directory database management. Module 6: Managing Group Policy in Active Directory Domain ServicesThis module explains what is new in the management of an Active Directory Domain Services infrastructure, what improvements were made to Group Policy, what are Group Policy Preferences, and how the ability to restart the Active Directory database service (NTDS) supports and simplifies advanced administrative tasks.Lessons
  • Group Policy Enhancements in Windows server 2008
  • Managing Security with Group Policy
  • Managing Clients With Group Policy Preferences
Lab : Managing Group Policies
  • Creating a Central Store
  • Configuring Administrative Templates
Lab : Managing Client Security with Group Policy
  • Configuring Application Control Policies
Lab : Managing Clients with Group Policy Preferences
  •  Deploying Group Policy Preferences
After completing this module, students will be able to: •Describe the new features in Group Policy. •Implement security settings with Group Policy. •Configure Group Policy preferences. Module 7: Configuring Active Directory Certificate ServicesThis module explains how to manage enterprise PKI smoothly in Windows Server 2008 and Windows Server 2008 R2 while ensuring a manageable, secure infrastructure, maintaining application and legacy system compatibility.Lessons
  • Active Directory Certificate Services Overview
  • Deploying Active Directory Certificate Services
  • Managing Certificate Templates
  • Managing Certificate Enrollment
  • Managing Certificate Revocation
  • Managing Certificate Recovery
Lab : Configuring and Managing Active Directory Certificate Services
  • Installing the AD CS Server Role and Configuring CAs
  • Managing Certificate Revocation
  • Managing Certificate Recovery
After completing this module, students will be able to: •Describe Active Directory Certificate Services and enhancements in Windows Server 2008. •Deploy AD CS infrastructure. •Manage certificate templates. •Manage certificate enrollment. •Manage certificate revocation. •Manage certificate recovery. Module 8: Configuring Active Directory Identity and Access SolutionsThis module explains the Active Directory(AD) roles of AD LDS, AD FS and AD RMS, how they fit into the overall Windows Server 2008 management concept, and how to configure a Windows Server 2008 and Windows Server 2008 R2 infrastructure to incorporate these roles.Lessons
  • Installing and Configuring AD LDS
  • Installing and Configuring AD FS
  • Overview of AD RMS
  • Installing and Configuring AD RMS
Lab : Configuring AD LDS
  • Configuring AD LDS Instances and Partitions
  • Configuring AD LDS Replication
Lab : Configuring AD RMS
  • Installing the AD RMS Server Role
  • Configuring AD RMS Templates
  • Configuring AD RMS Trust Policies
  • Testing AD RMS Functionality
After completing this module, students will be able to: •Install and configure Active Directory Lightweight Directory Services. •Describe Active Directory Federation Services. •Describe Active Directory Rights Management Services. •Install and configure Active Directory Rights Management Services. Module 9: Installing and Configuring Remote Desktop Services This module provides an overview of RDS and related role services, and the procedures for connecting to an RD Session host. The module describes RemoteApp programs and the methods for accessing them. The module also explains how to use RD Gateway to access RDS infrastructure securely from an external network. Lessons
  • Overview of Remote Desktop Services
  • Implementing RemoteApp Infrastructure
  • Implementing Remote Desktop Gateway
Lab : Implementing Remote Desktop Services
  • Preparing the RDS Environment
  • Publishing RemoteApp programs
  • Accessing Published RemoteApp Programs
After completing this module, students will be able to: •Describe Remote Desktop Services. •Implement Remote Applications. •Implement Remote Desktop Gateway. Module 10: Managing Remote Desktop Services It is very important to manage client connections for Remote Desktop to provide a stable and secure environment. In this module, you will learn about Remote Desktop Session Host and Connection Broker, Remote Desktop Licensing, and Remote Desktop client connections management. Lessons
  • Managing RD Session Host and Connection Broker
  • Configuring and Managing Remote Desktop Licensing
  • Managing Remote Desktop Client Connections
Lab : Managing Remote Desktop Services
  • Installing the RDS Role Services and Reviewing the RDL Manager Tool
  • Using WSRM to apply an equal per user resource management policy
  • Installing and Configuring Remote Desktop Services Connection Broker
After completing this module, students will be able to: •Manage Remote Desktop Session Host and Connection Broker. •Manage Remote Desktop Licensing. •Manage Remote Desktop client connections. Module 11: Installing and Configuring Web Servers and Applications with Internet Information ServicesThis module explains the new Web Server (IIS) 7.0 and 7.5 roles available on Windows Server 2008 and Windows Server 2008 R2, respectively. This module also describes the application servers that help configure a simple website, an FTP server, and an SMTP server within the IIS role.Lessons
  • Managing the Web Server Role
  • Configuring web Applications and Sites
  • Configuring a File Transfer Protocol Server and Simple Mail Transfer Protocol Server
  • Configuring Secure Websites and Servers
Lab : Installing and Configuring IIS and Creating a Website in IIS
  • Deploying the Web Server (IIS) Server Role
  • Configuring the Contoso Website to enable logging and back up the site configuration
Lab : Implementing FTP and SMTP Services in IIS
  • Installing FTP and SMTP
  • Configuring and Testing FTP
  • Configuring and Testing SMTP
Lab : Implementing Security on Websites
  • Enabling Integrated Windows Authentication
  • Configuring SSL
After completing this module, students will be able to: •Manage the Web Server role. •Configure websites, applications, and virtual folders. •Configure both the File Transfer Protocol and the Simple Mail Transfer Protocol. •Configure IIS to enable a more secure website platform. Module 12: Configuring Storage Technologies in Windows Server 2008 This module defines basic storage terminology, types of available configurations, and information about storage area networks (SANs). Lessons
  • Configuring Distributed File System
  • Managing Storage with File System Resource Management
  • Implementing Classification Management and File Management Tasks
  • Configuring Storage in Windows Server 2008
Lab : Configuring Storage Technologies in Windows Server 2008
  • Installing the Distributed File System Role Service
  • Creating a DFS Namespace
  • Configuring Folder Targets
  • Configuring DFS Folder Replication
  • Installing the FSRM Role Service and Configuring Quotas
  • Configuring File Screening and Storage Reports
After completing this module, students will be able to: •Configure DFS. •Manage storage by using File System Resource Management. •Describe how Classification Management and File Management enable you to organize your server-based files. •Describe storage area network connectivity. Module 13: Configuring High Availability in Windows Server 2008 This module explains the functionality of Network Load Balancing and how it has changed from previous versions of Windows Server to Windows Server 2008 to understand and implement a Windows Server 2008 failover cluster. This module covers the management and configuration aspects of both Network Load Balancing and failover clustering. Lessons
  • Configuring Network Load Balancing
  • Overview of Windows Server 2008 Failover Clusters
  • Preparing for Failover Clustering
  • Creating and Configuring Failover Clusters
Lab : Configuring High Availability in Windows server 2008
  • Creating and Validating a Cluster
  • Clustering the Print Services Role by Using Failover Cluster Management
  • Configuring Cluster Resources
After completing this module, students will be able to: •Configure Network Load Balancing. •Describe Windows Server 2008 failover clusters. •Prepare for failover clustering implementation. •Create and configure failover clusters. Module 14: Configuring Virtualization in Windows Server 2008 This module explains the features, requirements, and usage of the Hyper-V role of Windows Server 2008, as well as implementation of Virtual Desktop Infrastructure. Lessons
  • Hyper-V Overview
  • Installing and Configuring Hyper-V and Virtual Machines
  • Overview of Virtualization Management
  • High Availability in a Hyper-V Environment
  • Implementing Virtual Desktop Infrastructure
Lab : Configuring Hyper-V and Virtual Machines
  •  Configuring Hyper-V Settings
  • Creating and Configuring Virtual Networks
  • Creating Virtual Hard Disks
  • Creating and Managing Virtual Machines
After completing this module, students will be able to: •Describe Hyper-V virtualization platform . •Install and configure Hyper-V. •Describe management technologies for a virtual environment. •Describe high availability options in a Hyper-V environment. •Describe Virtual Desktop Infrastructure.
Module 1: Installing and Configuring Microsoft Windows Server 2008 R2This  module describes the installation options and requirements for Windows Server 2008 R2.Lessons
  • Lesson 1: Planning Windows Server 2008 R2 Installations
  • Lesson 2: Performing a Windows Server 2008 R2 Installation
  • Lesson 3: Configuring Windows Server 2008 R2 Following Installation
  • Lesson 4: Automating Server Activation Using Microsoft Volume Activation
Lab : Lab A: Planning to Install Windows Server 2008 R2
  • Exercise: Using the Microsoft Assessment and Planning (MAP)Toolkit
Lab : Lab B: Installing Windows Server and Configuring Post-Installation Settings
  • Exercise 1: Installing Windows Server 2008 R2
  • Exercise 2: Configuring Server Core
  • Exercise 3: Enabling Remote Management
Lab : Lab C: Managing Roles and Features
  • Exercise 1: Adding the DNS and DHCP Server Roles
  • Exercise 2: Managing Server Core
Lab : Lab D: Configuring Windows Server 2008 R2 Licensing
  • Exercise: Planning Volume Activation
After completing this module, students will be able to:
  • Plan Windows Server 2008 R2 installations.
  • Perform a Windows Server 2008 R2 installation.
  • Configure Windows Server 2008 R2 following installation.
  • Automate server activation using Microsoft Volume Activation.
Module 2: Implementing Deployment TechnologiesThis module describes the various deployment technologies available for use with Windows Server 2008 R2 and Windows 7.Lessons
  • Lesson 1: Selecting a Deployment Strategy
  • Lesson 2: Using the Windows Automated Installation Kit
  • Lesson 3: Working with Images
  • Lesson 4: Working with Unattended Answer Files
Lab : Deploying Windows Server 2008 with an Answer File
  • Exercise 1: Verifying the Configuration of WAIK
  • Exercise 2: Creating an Answer File
After completing this module, students will be able to:
  • Select a suitable deployment strategy.
  • Describe the Windows Automated Installation Kit (WAIK).
  • Describe the different types of images.
  • Perform an unattended Windows Server 2008 R2 installation.
Module 3: Using Windows Deployment ServicesThis module explains how to create and deploy custom system images by using Windows Deployment Services and images.Lessons
  • Lesson 1: Overview of Windows Deployment Services (WDS)
  • Lesson 2: Implementing Deployment with WD
  • Lesson 3: Maintaining Images
Lab : Using WDS to Deploy Windows Server
  • Exercise 1: Installing and configuring WDS
  • Exercise 2: Creating Operating System Images with WDS
  • Exercise 3: Using an Unattended File with WDS
  • Exercise 4: Configuring Custom Computer Naming for Large-Scale Deployments
  • Exercise 5: Deploying Images with WDS
After completing this module, students will be able to:
  • Describe the important features and functionality of WDS.
  • Configure WDS in Windows Server 2008 R2.
  • Perform deployments with WDS.
Module 4: Implementing the Microsoft Deployment ToolkitThis module explains how to deploy and create custom system images for common server configurations by using the Microsoft Deployment Toolkit.Lessons
  • Lesson 1: Introducing the Microsoft Deployment Toolkit
  • Lesson 2: Using the Microsoft Deployment Toolkit
  • Lesson 3: Maintaining Images with Microsoft Deployment Toolkit
Lab : Implementing the Microsoft Deployment Toolkit
  • Exercise 1: Installing MDT 2010
  • Exercise 2: Configuring MDT 2010
  • Exercise 3: Creating an MDT 2010 Build
  • Exercise 4: Creating Deployment Points
  • Exercise 5: Performing a Lite-Touch Deployment
After completing this module, students will be able to:
  • Describe the MDT.
  • Use the MDT for low and zero-touch deployments.
  • Use MDT to maintain image files.
Module 5: Migrating Active Directory Directory ServiceThis module explains how to upgrade and migrate Active Directory directory service from Windows 2000 Server or Windows Server 2003 to Windows Server 2008 R2.Lessons
  • Lesson 1: Overview of Upgrading Windows Server 2008 R2 Active Directory
  • Lesson 2: Upgrading Domain Controllers to Windows Server 2008 R2
Lab : Migrating Active Directory
  • Exercise 1: Preparing the Existing Forest
  • Exercise 2: Deploying a Windows Server 2008 R2 DC
  • Exercise 3: Removing Legacy Domain Controllers
  • Exercise 4: Enabling New Active Directory Features
After completing this module, students will be able to:
  • Describe the considerations and changes resulting from the Active Directory upgrade.
  • Upgrade a legacy forest.
Module 6: Migrating File, Print, and Web ServicesThis module provides guidance for upgrading and migrating file and print servers from Microsoft Windows 2000 Server or Windows Server 2003 to Windows Server 2008 R2. This module also includes guidance for upgrading and migrating application and Web servers from Windows Server 2003 to Windows Server 2008 R2.Lessons
  • Lesson 1: Introducing the Windows Server Migration Tools
  • Lesson 2: Migrating File and Print Servers
  • Lesson 3: Migrating Web and Application Servers
Lab : Lab A: Migrating Windows Server 2003 File and Print Services
  • Exercise 1: Installing and Configuring the File and Print Server Roles
  • Exercise 2: Enabling Windows Server Migration Tools
  • Exercise 3: Migrating File and Print Services
  • Exercise 4: Verifying the migration of file and print services
Lab : Lab B: Lesson 3: Migrating Web and Application Servers
  • Exercise 1: Installing the Required Roles on Windows Server 2008 R2
  • Exercise 2: Installing the Migration Tools
  • Exercise 3: Migrating the Application
  • Exercise 4: Verifying the Migration
After completing this module, students will be able to:
  • Describe the Windows Server Migration Tools.
  • Upgrade file and print servers.
  • Upgrade Web and application servers.
Module 7: Deploying Branch Office and Remote Access ServicesThis module provides guidance for upgrading and migrating branch offices and Remote Access Services to Windows Server 2008 R2.Lessons
  • Lesson 1: Implementing Read-Only Domain Controllers
  • Lesson 2: Implementing Remote Infrastructure
Lab : Lab A: Deploying an RODC to a Branch Office
  • Exercise 1: Enabling the Forest to Support RODC Deployment
  • Exercise 2: Deploying the RODC Role on Server Core
  • Exercise 3: Creating the Branch Office Site
  • Exercise 4: Securing the RODC
Lab : Lab B: Implementing Branch Cache
  • Exercise 1: Configuring BranchCache on a Server
  • Exercise 2: Configuring Client-Side BranchCache Settings
  • Exercise 3: Verify BranchCache Functionality
After completing this module, students will be able to:
  • Implement read-only domain controllers (RODC) to support branch offices.
  • Implement remote infrastructure features to support branch offices.
Module 8: Migrating Workloads to Microsoft Virtual MachinesThis module provides guidance for migrating existing workloads to a virtual machine environment using the Hyper-V Server 2008 R2 Hyper-V role.Lessons
  • Lesson 1: Overview of Microsoft Virtualization
  • Lesson 2: Installing Hyper-V
  • Lesson 3: Migrating workloads to Hyper-V
Lab : Lab: Migrating Workloads to Microsoft Virtual Machines
  • Exercise 1: Planning to Migrate Workloads
  • Exercise 2: Deploying the Hyper-V Role
  • Exercise 3: Creating Virtual Machines, Virtual Networks, and Virtual Hard Disks
After completing this module, students will be able to:
  • Describe Microsoft server virtualization solutions.
  • Install and configure Hyper-V.
  • Plan the migration of workloads to Microsoft virtual machines.
Module 1: Planning and Configuring IPv4This module explains how to deploy and configure networking services in your organization. This module explains how to implement an IPv4 addressing scheme, determine which name services to deploy, and troubleshoot network-related problems.Lessons
  • Implementing an IPv4 Network Infrastructure
  • Overview of Name Resolution Services in an IPv4 Network Infrastructure
  • Configuring and Troubleshooting IPv4
Lab : Planning and Configuring IPv4
  • Selecting an IPv4 Addressing scheme for branch offices
  • Implementing and Verifying IPv4 in the branch office
After completing this module, students will be able to:
  • Plan an IPv4 addressing scheme.
  • Determine which name services you must deploy.
  • Configure and troubleshoot an IPv4 network.
Module 2: Configuring and Troubleshooting DHCPThis module introduces you to Dynamic Host Configuration Protocol (DHCP), which plays an important role in the Windows Server 2008 R2 infrastructure. It is the primary means of distributing important network configuration information to network clients, and it provides configuration information to other network-enabled services, including Windows Deployment Services (WDS) and Network Access Protection (NAP). To support and troubleshoot a Windows Server-based network infrastructure, it is important that you understand how to deploy, configure, and troubleshoot the DHCP Server Role.Lessons
  • Overview of the DHCP Server Role
  • Configuring DHCP Scopes
  • Configuring DHCP Options
  • Managing a DHCP Database
  • Monitoring and Troubleshooting DHCP
  • Configuring DHCP Security
Lab : Configuring and Troubleshooting the DHCP Server Role
  • Selecting a Suitable DHCP Configuration
  • Implementing DHCP
  • Reconfiguring DHCP in the Head Office
  • Testing the Configuration
  • Troubleshooting DHCP Issues
After completing this module, students will be able to:
  • Describe the function of the DHCP Server Role.
  • Configure DHCP scopes.
  • Configure DHCP options.
  • Manage a DHCP database.
  • Monitor and troubleshoot the DHCP Server Role.
  • Configure security the DHCP Server Role.
Module 3: Configuring and Troubleshooting DNSThis module introduces you to Domain Name System (DNS), which is the foundation name service in Windows Server 2008 R2. It is vital that you understand how to deploy, configure, manage, and troubleshoot this critical service.Lessons
  • Installing the DNS Server Role
  • Configuring the DNS Server Role
  • Configuring DNS Zones
  • Configuring DNS Zone Transfers
  • Managing and Troubleshooting DNS
Lab : Configuring and Troubleshooting DNS
  • Selecting a DNS Configuration
  • Deploying and Configuring DNS
  • Troubleshooting DNS
After completing this module, students will be able to:
  • Install the DNS server role.
  • Configure the DNS server role.
  • Create and configure DNS zones.
  • Configure zone transfers.
  • Manage and troubleshoot DNS.
Module 4: Configuring and Troubleshooting IPv6 TCP/IPThis module introduces you to IPv6, a technology that will help ensure that the Internet can support a growing user base and the increasingly large number of IP-enabled devices. The current Internet Protocol Version 4 (IPv4) has served as the underlying Internet protocol for almost thirty years. Its robustness, scalability, and limited feature set is now challenged by the growing need for new IP addresses, due in large part to the rapid growth of new network-aware devices.Lessons
  • Overview of IPv6
  • IPv6 Addressing
  • Coexistence with IPv6
  • IPv6 Transition Technologies
  • Transitioning from IPv4 to IPv6
Lab : Configuring an ISATAP Router
  • Configuring a New IPv6 Network and Client
  • Configuring an ISATAP Router to Enable Communication Between an IPv4 Network and an IPv6 Network
Lab : Converting the Network to Native IPv6
  • Transitioning to a Native IPv6 Network
After completing this module, students will be able to:
  • Describe the features and benefits of IPv6.
  • Implement IPv6 addressing.
  • Implement an IPv6 coexistence strategy.
  • Describe and select a suitable IPv6 transition solution.
  • Transition from IPv4 to IPv6.
  • Troubleshoot an IPv6-based network.
Module 5: Configuring and Troubleshooting Routing and Remote AccessTo support your organization’s distributed workforce, you must become familiar with technologies that enable remote users to connect to your organization’s network infrastructure. These technologies include virtual private networks (VPNs) and DirectAccess. It is important that you understand how to configure and secure your remote access clients by using network policies. This module explores these remote access technologies.Lessons
  • Configuring Network Access
  • Configuring VPN Access
  • Overview of Network Policies
  • Overview of the Connection Manager Administration Kit
  • Troubleshooting Routing and Remote Access
  • Configuring DirectAccess
Lab : Configuring and Managing Network Access
  • Configuring Routing and Remote Access as a VPN Remote Access Solution
  • Configuring a Custom Network Policy
  • Create and distribute a CMAK Profile
Lab : Configuring and Managing DirectAccess
  • Configure the AD DS Domain Controller and DNS
  • Configure the PKI Environment
  • Configure the DirectAccess Clients and Test Intranet Access
  • Configure the DirectAccess Server
  • Verify DirectAccess Functionality
After completing this module, students will be able to:
  • Configure network access.
  • Create and configure a VPN solution.
  • Describe the role of network policies.
  • Use the Connection Manager Administration Kit to create and configure client connection profiles.
  • Troubleshoot routing and remote access.
  • Implement DirectAccess.
Module 6: Installing, Configuring, and Troubleshooting the Network Policy Server Role ServiceNPS provides support for the Remote Authentication Dial-In User Service (RADIUS) protocol, and can be configured as a RADIUS server or proxy. Additionally, NPS provides functionality that is essential for the implementation of Network Access Protection (NAP). This module explains how to install, configure, and troubleshoot NPS.Lessons
  • Installing and Configuring a Network Policy Server
  • Configuring RADIUS Clients and Servers
  • NPS Authentication Methods
  • Monitoring and Troubleshooting a Network Policy Server
Lab : Configuring and Managing Network Policy Server
  • Installing and Configuring the Network Policy Server Role Service
  • Configuring a RADIUS Client
  • Configuring Certificate Auto-Enrollment
  • Configuring and Testing the VPN
After completing this module, students will be able to:
  • Install and configure NPS.
  • Configure RADIUS clients and servers.
  • Describe NPS authentication methods.
  • Monitor and troubleshoot NPS.
Module 7: Implementing Network Access ProtectionIn this module, you will learn about Network Access Protection (NAP). NAP enables you to create customized health-requirement policies to validate computer health before allowing access or communication. NAP also automatically updates compliant computers to ensure on-going compliance and can limit the access of noncompliant computers to a restricted network until they become compliant.Lessons
  • Overview of Network Access Protection
  • How NAP Works
  • Configuring NAP
  • Monitoring and Troubleshooting NAP
Lab : Implementing NAP into a VPN Remote Access Solution
  • Configuring NAP Components
  • Configuring Client Settings to Support NAP
After completing this module, students will be able to:
  • Describe how NAP can help protect your network.
  • Describe the various NAP enforcement processes.
  • Configure NAP.
  • Monitor and troubleshoot NAP.
Module 8: Increasing Security for Windows ServersSecurity is an essential consideration for networking with Windows Server 2008. In this module, you will learn how to implement various methods to increase security. Windows Firewall with Advanced Security is one of the features in Windows Server 2008 that is used to increase security. You can also use Windows Server Update Services to ensure that approved security updates are applied to servers in a timely way.Lessons
  • Windows Security Overview
  • Configuring Windows Firewall with Advanced Security
  • Deploying Updates with Windows Server Update Services
Lab : Increasing Security for Windows Servers
  • Deploying a Windows Firewall Rule
  • Implementing WSUS
After completing this module, students will be able to:
  • Describe a process for increasing the security of Windows Server 2008.
  • Configure Windows Firewall with Advanced Security.
  • Describe Windows Server Update Services and how to use it.
Module 9: Increasing Security for Network CommunicationInternet Protocol security (IPsec) is a framework of open standards for protecting communications over IP networks through cryptographic security services. IPsec supports network-level peer authentication, data-origin authentication, data integrity, data confidentiality (encryption), and replay protection. The Microsoft IPsec implementation is based on standards that the Internet Engineering Task Force (IETF) IPsec working group developed. In this module, you will learn how to implement, configure, and troubleshoot IPsec.Lessons
  • Overview of IPsec
  • Configuring Connection Security Rules
  • Configuring NAP with IPsec Enforcement
  • Monitoring and Troubleshooting IPsec
Lab : Increasing Security for Network Communication
  • Selecting a Network Security Configuration
  • Configuring IPsec to Authenticate Computers
  • Testing IPsec Authentication
After completing this module, students will be able to:
  • Describe when and how to use IPsec.
  • Configure Connection Security rules.
  • Configure IPsec with NAP Enforcement.
  • Describe how to monitor and troubleshoot IPsec.
Module 10: Configuring and Troubleshooting Network File and Print ServicesFile and print services are some of the most commonly implemented network services for end users. Unlike infrastructure services like DNS, file and print services are highly visible to the end users. In this module, you will learn how to configure and troubleshoot file and print services to provide high quality service to end users. In addition, you will see how both EFS and BitLocker can be used to increase the security of files that are located in file shares.Lessons
  • Configuring and Troubleshooting File Shares
  • Encrypting Network Files with EFS
  • Encrypting Partitions with BitLocker
  • Configuring and Troubleshooting Network Printing
Lab : Configuring and Troubleshooting Network File and Print Services
  • Creating and Configuring a File Share
  • Encrypting and Recovering Files
  • Creating and Configuring a Printer Pool
After completing this module, students will be able to:
  • Describe how to manage file share security.
  • Explain how to encrypt network files with EFS.
  • Describe how to encrypt partitions with BitLocker.
  • Discuss how to configure and troubleshoot network printing.
Module 11: Optimizing Data Access for Branch Offices Many organizations maintain a large number of file resources that need to be organized and made highly available to users. These file resources are often stored on servers and provided to users who are distributed geographically in widespread locations. In this module, you will learn how to provide efficient access to network resources with minimal traffic over a WAN link. Lessons
  • Branch Office Data Access
  • DFS Overview
  • Overview of DFS Namespaces
  • Configuring DFS Replication
  • Configuring BranchCache
Lab : Implementing DFS
  • Installing the DFS Role Service
  • Configuring the Required Namespace
  • Configuring DFS Replication
Lab : Implementing BranchCache
  • Performing Initial Configuration Tasks for BranchCache
  • Configuring BranchCache Clients
  • Configuring BranchCache on the Branch Server
  • Monitoring BranchCache
After completing this module, students will be able to:
  • Describe the challenges experienced when providing data access to branch offices.
  • Identify the basic components of DFS.
  • Describe DFS namespaces.
  • Explain how to configure DFS replication.
  • Discuss how to configure BranchCache.
Module 12: Controlling and Monitoring Network StorageNetwork storage for users is a finite resource that must be managed appropriately to ensure that it remains available for all users. If network storage is not monitored and managed, it can become filled with irrelevant data, such as personal music or movies. Irrelevant data increases network storage costs and in some cases can prevent useful data from placement on the network storage. In this module, you will learn how to monitor and manage network storage.Lessons
  • Monitoring Network Storage
  • Controlling Network Storage Utilization
  • Managing File Types on Network Storage
Lab : Controlling and Monitoring Network Storage
  • Configuring FSRM Quotas
  • Configuring File Screening
  • Configuring File Classification and File Management
After completing this module, students will be able to:
  • Describe how to monitor network storage by using FSRM.
  • Explain how to manage quotas by using FSRM.
  • Describe how to implement file screening, classification management, and file management tasks by using FSRM.
Module 13: Recovering Network Data and ServersThis module explains how to recover network data and servers. There are a variety of scenarios where a network data or a server that provides networks services can be lost. Volume shadow copies can be used to restore previous versions of files when a file is accidentally deleted or modified on a computer that is running Windows Server 2008. Windows Server Backup can be used to back up and restore data files or an entire server.Lessons
  • Recovering Network Data with Volume Shadow Copies
  • Recovering Network Data and Servers with Windows Server Backup
Lab : Recovering Network Data and Servers
  • Configuring Shadow Copies
  • Configuring a Scheduled Backup
After completing this module, students will be able to:
  • Describe how to configure and use volume shadow copies.
  • Describe how to configure and use Windows Server Backup.
Module 14: Monitoring Windows Server 2008 Network Infrastructure Servers When a system failure or an event that affects system performance occurs, you need to be able to repair the problem or resolve the issue quickly and efficiently. With so many variables and possibilities in the modern network environment, the ability to determine the root cause quickly often depends on having an effective performance monitoring methodology and toolset. In this module, you will learn to use performance-monitoring tools to identify components that require additional tuning and troubleshooting. By identifying components that require additional tuning, you can improve the efficiency of your servers. Lessons
  • Monitoring Tools
  • Using Performance Monitor
  • Monitoring Event Logs
Lab : Monitoring Windows Server 2008 Network Infrastructure Servers
  • Establishing a Performance Baseline
  • Identifying the Source of a Performance Problem
  • Centralizing Events Logs
After completing this module, students will be able to:
  • Describe monitoring tools for Windows Server 2008 R2.
  • Describe how to use performance monitor.
  • Describe how to monitor event logs.
Module 1: Introducing Active Directory Domain Services This module provides an overview of Active Directory components and concepts and steps through the basics of installing and configuring an Active Directory domain Lessons
  • Lesson 1: Overview of Active Directory, Identity, and Access
  • Lesson 2: Active Directory Components and Concepts
  • Lesson 3: Install Active Directory Domain Services
Lab : Install an AD DS DC to Create a Single Domain Forest
  • Perform Post-Installation Configuration Tasks
  • Install a New Windows Server 2008 Forest with the Windows Interface
  • Raise Domain and Forest Functional Levels
After completing this module, students will be able to:
  • Describe the functionality of AD DS in an enterprise in relation to identity and access.
  • Describe the major components of AD DS.
  • Install AD DS and configure it as a domain controller.
Module 2: Administering Active Directory Securely and Efficiently This module explains how to work securely and efficiently in Active Directory using Administration Tools and some best practices as well as use of Windows PowerShell. Lessons
  • Work with Active Directory Administration Tools
  • Custom Consoles and Least Privilege
  • Find Objects in Active Directory
  • Use Windows PowerShell to Administer Active Directory
Lab : Administer Active Directory Using Administrative Tools
  • Perform Administrative Tasks by Using Administrative Tools
  • Create a Custom Active Directory Administrative Console
  • Perform Administrative Tasks with Least Privilege, Run As Administrator, and User Account Control
Lab : Find Objects in Active Directory
  • Find Objects in Active Directory
  • Use Saved Queries
Lab : Use Windows PowerShell to Administer Active Directory
  • Use PowerShell Commands to Administer Active Directory
After completing this module, students will be able to:
  • Describe and work with Active Directory administration tools.
  • Describe the purpose and functionality of custom consoles and least privilege.
  • Locate objects in Active Directory.
  • Administer Active Directory by using Windows PowerShell.
Module 3: Managing Users and Service Accounts This module explains how to create, manage and support user and Managed Service Accounts in Active Directory. Lessons
  • Create and Administer User Accounts
  • Configure User Object Attributes
  • Automate User Account Creation
  • Create and Configure Managed Service Accounts
Lab : Create and Administer User Accounts
  • Create User Accounts
  • Administer User Accounts
Lab : Configure User Object Attributes
  • Examine User Object Attributes
  • Manage User Object Attributes
  • Create Users from a Template
Lab : Automate User Account Creation
  • Export and Import Users with CSVDE
  • Import Users with LDIFDE
  • Import Users by Using Windows PowerShell
Lab : Create and Administer Managed Service Accounts
  • Create and Associate a Managed Service Account
After completing this module, students will be able to:
  • Create and administer user accounts.
  • Configure user object attributes.
  • Automate user account creation.
  • Create and configure managed service accounts.
Module 4: Managing Groups This module explains how to create, modify, delete, and support group objects in Active Directory. Lessons
  • Overview of Groups
  • Administer Groups
  • Best Practices for Group Management
Lab : Administer Groups
  • Implement Role-Based Management by Using Groups
  • (Advanced Optional) Explore Group Membership Reporting Tools
  • (Advanced Optional) Understand “Account Unknown” Permissions
Lab : Best Practices for Group Management
  • Implement Best Practices for Group Management
After completing this module, students will be able to:
  • Describe the role of groups in managing an enterprise.
  • Administer groups with by using the built-in tools in Windows Server 2008
  • Describe the best practices for managing groups.
Module 5: Managing Computer Accounts This module explains how to create and configure computer accounts. Lessons
  • Create Computers and Join the Domain
  • Administer Computer Objects and Accounts
  • Perform an Offline Domain Join
Lab : Create Computers and Join the Domain
  • Join a computer to the Domain with the Windows Interface
  • Secure Computer Joins
  • Manage Computer Account Creation
Lab : Administer Computer Objects and Accounts
  • Administer Computer Objects Through Their Life Cycle
  • Administer and Troubleshoot Computer Accounts
Lab : Perform an Offline Domain Join
  • Perform an Offline Domain Join
After completing this module, students will be able to:
  • Create computer accounts and join them to a domain.
  • Administer computer objects and accounts by using the Windows Interface and command-line tools.
  • Describe and perform the Offline Domain Join process.
Module 6: Implementing a Group Policy Infrastructure This module explains what Group Policy is, how it works, and how best to implement Group Policy in your organization. Lessons
  • Understand Group Policy
  • Implement GPOs
  • Manage Group Policy Scope
  • Group Policy Processing
  • Troubleshoot Policy Application
Lab : Implement Group Policy
  • Create, Edit, and Link GPOs
  • Use Filtering and Commenting
Lab : Manage Group Policy Scope
  • Configure GPO Scope with Links
  • Configure GPO Scope with Filtering
  • Configure Loopback Processing
Lab : Troubleshoot Policy Application
  • Perform RSoP Analysis
  • Use the Group Policy Modeling Wizard
  • View Policy Events
After completing this module, students will be able to:
  • Describe the components and technologies that comprise the Group Policy framework.
  • Implement GPOs.
  • Configure and understand a variety of policy setting types.
  • Scope GPOs by using links, security groups, Windows Management Instrumentation filters, loopback processing, and preference targeting.
  • Describe how GPOs are processed.
  • Locate the event logs containing Group Policy–related events and troubleshoot Group Policy application.
Module 7: Managing User Desktop with Group Policy This module explains how to manage and configure desktop environments using Administrative templates and Group Policy Preferences as well as how to deploy software using Group Policy Lessons
  • Implement Administrative Templates
  • Configure Group Policy Preferences
  • Manage Software with GPSI
Lab : Manage Administrative Templates and Central Store
  •  Manage Administrative Templates
Lab : Manage Group Policy Preferences
  • Configure Group Policy Preferences
  • Verify Group Policy Preferences Application
Lab : Manage Software with GPSI
  • Deploy Software with GPSI
  • Upgrade Applications with GPSI
After completing this module, students will be able to:
  • Describe Administrative Templates
  • Understand and Configure Group Policy preferences
  • Manage software by using GPSI
Module 8: Managing Enterprise Security and Configuration with Group Policy Settings This module explains how to use Group Policy to manage a variety of components and features  of Windows. It will also explain how to audit files and folders and how to restrict access to applications using application control policies. Lessons
  • Manage Group Membership by Using Group Policy Settings
  • Manage Security Settings
  • Auditing
  • Software Restriction Policy and Applocker
Lab : Using Group Policy to Manage Group Membership
  • Configure the Membership of Administrators by Using Restricted Group Policies
Lab : Manage Security Settings
  • Manage Local Security Settings
  • Create a Security Template
  • Use the security Configuration Wizard
Lab : Audit File System Access
  • Configure Permissions and Audit Settings
  • Configure Audit Policy
  • Examine Audit Results
Lab : Configure Application Control Policies
  • Configure Application Control Policies
After completing this module, students will be able to:
  • Manage group membership by using Group Policy Settings
  • Manage security settings
  • Describe the purpose and functionality of auditing
  • Describe the purpose of the Software Restriction Policy and Applocker
Module 9: Securing Administration This module explains how to administer Active Directory Domain Services Securely. Lessons
  • Delegate Administrative Permissions
  • Audit Active Directory Administration
Lab : Delegate Administration
  • Delegate Permission to Create and Support User Accounts
  • View Delegated Permissions
  • Remove and Reset Permissions
Lab : Audit Active Directory Changes
  • Audit Changes to Active Directory Using Default Audit Policy
  • Audit Changes to Active Directory Using Directory Service Changes Auditing
After completing this module, students will be able to:
  • Delegate administrative permissions.
  • Audit Active Directory administration.
Module 10: Improving the Security of Authentication in an AD DS Domain This module explains the domain-side components of authentication, including the policies that specify password requirements and the auditing of authentication-related activities. Lessons
  • Configure Password and Lockout Policies
  • Audit Authentication
  • Configure Read-Only Domain Controllers
Lab : Configure Password and Account Lockout Policies
  • Configure the Domain’s Password and Lockout Policies
  • Configure a Fine-Grained Password Policy
Lab : Audit Authentication
  • Audit Authentication
Lab : Configure Read-Only Domain Controllers
  • Exercise 1: Install an RODC
  • Exercise 2: Configure Password Replication Policy
  • Exercise 3: Manage Credential Caching
After completing this module, students will be able to:
  • Configure password and lockout policies.
  • Audit authentication.
  • Configure read-only domain controllers.
Module 11: Configuring Domain Name System This module explains how to implement DNS to support name resolution both within your AD DS domain and outside your domain and your intranet. Lessons
  • Install and Configure DNS in an AD DS Domain
  • Integration of AD DS, DNS, and Windows
  • Advanced DNS Configuration and Administration
Lab : Installing the DNS Service
  • Add the DNS Server Role
  • Configure Forward Lookup Zones and Resource Records
Lab : Advanced Configuration of DNS
  • Enable Scavenging of DNS Zones
  • Explore Domain Controller Location
  • Configure Name Resolution for External Domains
After completing this module, students will be able to:
  • Install and configure DNS in an AD DS domain.
  • Describe the integration of AD DS, DNS, and Windows.
  • Describe advanced DNS configuration and administration tasks.
Module 12: Administering AD DS Domain Controllers This module explains how to add Windows Server 2008 domain controllers to a forest or domain, how to prepare a Microsoft Windows Server 2003 forest or domain for its first Windows Server 2008 DC, how to manage the roles performed by DCs, and how to migrate the replication of SYSVOL from the File Replication Service (FRS) used in previous versions of Windows to the Distributed File System Replication (DFS-R) mechanism that provides more robust and manageable replication. Lessons
  • Domain Controller Installation Options
  • Install a Server Core Domain Controller
  • Manage Operations Masters
  • Configure Global Catalog
  • Configure DFS-R Replication of SYSVOL
Lab : Install Domain Controllers
  • Create an Additional DC with the Active Directory Domain Services Installation Wizard
  • Add a Domain Controller from the Command Line
  • Create a Domain Controller from Installation Media
Lab : Install a Server Core Domain Controller
  • Perform Post-Installation Configuration on Server Core
  • Create a Domain Controller with Server Core
Lab : Transfer Operations Masters Roles
  • Identify Operations Masters
  • Transfer Operations Masters Roles
Lab : Configure the Global Catalog and Universal Group Membership Caching
  • Configure a Global Catalog
  • Configure Universal Group Membership Caching
Lab : Configure DFS-R Replication of SYSVOL
  • Observe the Replication of SYSVOL
  • Prepare to Migrate to DFS-R
  • Migrate SYSVOL Replication to DFS-R
  • Verify DFS-R Replication of SYSVOL
After completing this module, students will be able to:
  • Identify the domain controller installation options.
  • Install a Server Core DC.
  • Manage operations masters.
  • Configure Global Catalog
  • Configure DFS-R replication of SYSVOL.
Module 13: Managing Sites and Active Directory Replication This module explains how to create a distributed directory service that supports domain controllers in portions of your network that are separated by expensive, slow, or unreliable links and how to configure replication amongst those servers. Lessons
  • Configure Sites and Subnets
  • Configure Replication
Lab : Configure Sites and Subnets
  • Configure the Default Site
  • Create Additional Sites
  • Move Domain Controllers into Sites
Lab : Configure Replication
  • Create a Connection Object
  • Create Site Links
  • Designate a Preferred Bridgehead Server
  • Configure Intersite Replication
After completing this module, students will be able to:
  • Configure sites and subnets.
  • Configure replication.
Module 14: Directory Service Continuity This module explains about the technologies and tools that are available to help ensure the health and longevity of the directory service. You will explore tools that help you monitor performance in real time, and you will learn to log performance over time so that you can keep an eye on performance trends in order to spot potential problems. Lessons
  • Monitor Active Directory
  • Manage the Active Directory Database
  • Active Directory Recycle Bin
  • Back Up and Restore AD DS and Domain Controllers
Lab : Monitor Active Directory Events and Performance
  • Monitor AD DS with Performance Monitor
  • Work with Data Collector Sets
Lab : Manage the Active Directory Database
  • Perform Database Maintenance
  • Work with Snapshots and Recover a Deleted User
Lab : Using Active Directory Recycle Bin
  • Enable Active Directory Recycle Bin
  • Restore Deleted Objects with Active Directory Recycle Bin
Lab : Back Up and Restore Active Directory
  • Back Up Active Directory
  • Restore Active Directory and a Deleted OU
After completing this module, students will be able to:
  • Monitor Active Directory.
  • Manage the Active Directory database.
  • Describe the purpose of the Active Directory Recycle Bin.
  • Back up and restore AD DS and domain controllers.
Module 15: Managing Multiple Domains and Forests This module explains how to raise the domain and forest functionality levels within your environment, how to design the optimal AD DS infrastructure for your enterprise, how to migrate objects between domains and forests, and how to enable authentication and resources access across multiple domains and forests. Lessons
  • Configure Domain and Forest Functional Levels
  • Manage Multiple Domains and Trust Relationships
  • Move Objects between Domains and Forests
Lab : Administer Trust Relationships
  • Configure Name Resolution between Contoso.com and Tailspintoys.com
  • Create a Forest Trust
After completing this module, students will be able to:
  • Configure domain and forest functional levels.
  • Manage multiple domains and trust relationships.
  • Move objects between domains and forests.
Module 1: Exploring Identity and Access Solutions This module introduces Identity and Access Management (IDA Management) solutions. You will learn the fundamental IDA components and Windows Server 2008 and Windows Server 2008 R2 IDA technologies. This module also provides an overview of Microsoft Forefront technologies that further enhance IDA solutions. Lessons
  • Overview of Identity and Access Techniques
  • Active Directory Identity and Access Solutions Server Roles
  • Additional Identity and Access Management Tools and Solutions
Lab : Identifying IDA Roles to Meet Business Requirements
  • Exploring How Active Directory Server Roles Provide IDA Management Solutions
After completing this module, students will be able to:
  • Describe IDA techniques
  • Describe Windows Server 2008 IDA server roles
  • Describe additional IDA tools and solutions
Module 2: Deploying and Configuring Active Directory Certificate Services This module explains the concepts of public key infrastructure (PKI) and certification authority (CA). You will learn how to deploy a CA hierarchy and install AD CS. This module also describes how to configure AD CS and how to resolve common AD CS issues. Lessons
  • Overview of Public Key Infrastructure
  • Overview of Certification Authorities
  • Deploying Certification Authorities
  • Configuring Certification Authorities
  • Troubleshooting Active Directory Certificate Services
Lab : Deploying and Configuring Active Directory Certificate Services
  • Deploying an Standalone Root CA
  • Deploying and Configuring an Enterprise Subordinate CA
After completing this module, students will be able to:
  • Describe Public Key Infrastructure
  • Describe Certification Authorities
  • Deploy Certification Authorities
  • Configure Certification Authorities
  • Resolve common Active Directory Certificate Services issues
Module 3: Deploying and Configuring Certificates This module describes the deployment of certificates by using AD CS. In addition, the module elaborates on managing enrollment to deploy certificates, certificate revocation, and configuration of certificate template and certificate recovery. Lessons
  • Managing Certificate Templates
  • Deploying Certificates and Managing Enrollment
  • Managing Certificate Revocation
  • Configuring Certificate Recovery
Lab : Deploying Certificates and Managing Enrolment
  • Configuring Certificate Templates
  • Configuring Autoenrollment
  • Managing Certificate Revocation
  • Configuring Key Recovery
After completing this module, students will be able to:
  • Manage certificate templates
  • Deploy certificates and manage enrollment
  • Manage certificate revocation
  • Configure certificate recovery
Module 4: Deploying and Configuring Active Directory Lightweight Directory Services This module explains the concept of AD LDS. You will learn how to install AD LDS, configure AD LDS instances and partitions, and configure AD LDS replication. This module also describes how to resolve common AD LDS issues. Lessons
  • Overview of Active Directory Lightweight Directory Services
  • Deploying and Configuring Active Directory Lightweight Directory Services
  • Configuring AD LDS Instances and Partitions
  • Configuring Active Directory Lightweight Directory Services Replication
  • Troubleshooting Active Directory Lightweight Directory Services
Lab : Deploying and Configuring Active Directory Lightweight Directory Services
  • Configuring AD LDS Instances and Partitions
  • Configuring AD LDS Replication
  • Identifying AD LDS Solution Tools and Troubleshooting Steps
After completing this module, students will be able to:
  • Describe Active Directory Lightweight Directory Services
  • Deploy and configure Active Directory Lightweight Directory Services
  • Configure Active Directory Lightweight Directory Services instances and partitions
  • Configure Active Directory Lightweight Directory Services replication
  • Resolve common Active Directory Lightweight Directory Services issues
Module 5: Deploying and Configuring Active Directory Federation Services This module presents the concept of AD FS 2.0 and its deployment scenarios. You will learn how to deploy AD FS 2.0 and implement AD FS claims. This module also describes how to resolve common AD FS issues. Lessons
  • Overview of Active Directory Federation Services 2.0
  • Deploying Active Directory Federation Services
  • Configuring Active Directory Federation Services Partner Organizations and Claims
  • Troubleshooting Active Directory Federation Services
Lab : Deploying and Configuring Active Directory Federation Services
  • Installing the PKI Infrastructure and Preparing for Federated Collaboration with ADFS 2.0
  • Installing and Configuring Active Directory Federation Services (ADFS) 2.0
  • Configuring AD FS 2.0 for Internal Users to Access an Internal Claim Aware Application
  • Configuring AD FS 2.0 for Internal Users to Access a Partner’s Claim Aware Application
After completing this module, students will be able to:
  • Describe Active Directory Federation Services
  • Deploy Active Directory Federation Services
  • Configure Active Directory Federation Services partner organizations and claims
  • Resolve common Active Directory Federation Services issues
Module 6: Deploying and Configuring Active Directory Rights Management Services This module explains the concept of AD RMS. You will learn how to install and configure AD RMS server components, administer AD RMS rights policy templates, and implement AD RMS trust policies. This module also describes how to resolve common AD RMS issues. Lessons
  • Overview of Active Directory Rights Management Services
  • Deploying and Configuring Active Directory Rights Management Services
  • Configuring AD RMS Rights Policy Templates and Exclusion Policies
  • Configuring Active Directory Rights Management Services Trust Policies
  • Troubleshooting Active Directory Rights Management Services
Lab : Deploying and Configuring Active Directory Rights Management Services
  • Installing and Configuring AD RMS
  • Configuring AD RMS Templates
  • Configuring AD RMS Trust Policies
  • Testing AD RMS Functionality
  • Generating AD RMS Reports
After completing this module, students will be able to:
  • Describe Active Directory Rights Management Services
  • Deploy and configure Active Directory Rights Management Services
  • Configure Active Directory Rights Management Services rights policy templates and exclusion policies
  • Configure Active Directory Rights Management Services trust policies
  • Resolve common Active Directory Rights Management Services issues
Module 7: Maintaining Windows Server 2008 Active Directory Identity and Access Solutions This module explains the maintenance of AD CS, AD LDS, AD FS 2.0, and AD RMS. Lessons
  • Maintaining Active Directory Certificate Services
  • Maintaining Active Directory Lightweight Directory Services
  • Maintaining Active Directory Federation Services
  • Maintaining Active Directory Rights Management Services
Lab : Maintaining Windows Server 2008 Active Directory Identity and Access Solutions
  • Configuring CA Event Auditing
  • Backing up Active Directory Certificate Services
  • Backing up and Restoring an Active Directory Lightweight Directory Services Instance
  • Configuring AD RMS Logging
After completing this module, students will be able to:
  • Maintain Active Directory Certificate Services
  • Maintain Active Directory Lightweight Directory Services
  • Maintain Active Directory Federation Services
Maintain Active Directory Rights Management Services
Module 1: Designing IP Addressing and ConfigurationThis module describes how to design a strategy for allocating IP addresses to workstations and servers in Windows Server 2008. The module also describes how to design DHCP implementation and the configuration options that are available.Lessons
  • Designing an IPv4 Addressing Scheme
  • Designing an IPv6 Addressing Scheme
  • Designing an IPv6 Transition Strategy
  • Designing an IPv4 DHCP Implementation
  • Planning DHCP Scope Configuration
Lab : Designing and Implementing IP Addressing in Windows Server 2008
  • Designing an IPv4 Addressing Scheme
  • Designing an IPv6 Addressing Scheme
  • Designing a DHCP Implementation
  • Discuss IP Address Allocation
  • Implementing an IPv4 Addressing Scheme
After completing this module, students will be able to:
  • Design an IPv4 addressing scheme.
  • Design an IPv6 addressing scheme.
  • Develop an IPv6 transition strategy.
  • Design a DHCP implementation.
  • Plan DHCP scope configuration and options.
Module 2: Designing Name ResolutionThis module explains how to design an appropriate name resolution strategy that incorporates DNS. The module also covers DNS namespaces, DNS zone implementation, replication, and delegation.Lessons
  • Collecting Information for a Name Resolution Design
  • Designing a DNS Server Strategy
  • Designing a DNS Namespace
  • Designing DNS Zone Implementation
  • Designing Zone Replication and Delegation
Lab : Designing and Implementing a Name Resolution Strategy in Windows Server 2008
  • Designing a DNS Namespace
  • Designing a DNS Server Strategy
  • Designing a DNS Zone and Replication Strategy
  • Implementing Name Resolution
After completing this module, students will be able to:
  • Determine the information required to plan name resolution.
  • Design a DNS server strategy.
  • Design a DNS namespace.
  • Design a DNS zone strategy.
  • Design a DNS zone replication strategy.
Module 3: Designing Advanced Name ResolutionThis module explains how to design an advanced name resolution strategy by optimizing DNS queries, designing DNS for high availability, and designing a NetBios name resolution plan.Lessons
  • Optimizing DNS Queries
  • Designing DNS for High Availability and Security
  • Designing a NetBIOS Name Resolution Strategy
Lab : Designing and Implementing Advanced Name Resolution in Windows Server 2008
  • Designing an Optimized DNS Solution
  • Designing High Availability for Name Resolution
  • Designing NetBIOS Name Resolution
  • Implementing the Optimized Design
After completing this module, students will be able to:
  • Optimize DNS resolution.
  • Design DNS for high availability and security.
  • Design a NetBIOS name resolution strategy.
Module 4: Designing Network AccessThis module explains how to design a network access solution. The module also describes how to secure network access, design a strategy for RADIUS authentication with NPS, design wireless access,  and Internet connectivity.Lessons
  • Securing and Controlling Network Access
  • Designing Remote Access Services
  • Designing RADIUS Authentication with Network Policy Services
  • Designing Wireless Access
  • Designing Internet Connectivity and Perimeter Networks
Lab : Designing and Implementing a Network Access Solution
  • Designing a VPN Solution
  • Designing Network Policy Services
  • Designing a Wireless Connection Solution
  • Implementing Network Access
Lab : Designing a Network Access Solution
  • Designing a Perimeter Network
After completing this module, students will be able to:
  • Secure and control network access.
  • Design remote access services.
  • Design a Remote Authentication Dial-In User Service (RADIUS) solution.
  • Design wireless access.
  • Design a perimeter network.
  • Describe how to design network infrastructure to support Windows 7 DirectAccess.
Module 5: Designing Network SecurityThis module explains how to design a network security plan. The module describes the defense-in-depth model for network security and explains how to implement Windows Firewall and NAP policies.Lessons
  • Overview of Network Security Design
  • Identifying and Analyzing Threats to Network Security
  • Designing a Windows Firewall Implementation
  • Designing a Network Access Protection Infrastructure
Lab : Designing a Network Security Plan
  • Assembling a Team for the Security Plan
  • Identifying Security Threats
Lab : Designing and Implementing a Windows Firewall Solution
  • Designing a Windows Firewall Implementation
  • Designing an IPsec Implementation
  • Implementing Windows Firewall
Lab : Designing and Implementing NAP
  • Analyze NAP Enforcement Methods
  • Designing DHCP NAP Enforcement
  • Designing IPsec NAP Enforcement
  • Implementing VPN NAP Enforcement
After completing this module, students will be able to:
  • Describe the network security design process.
  • Describe how to identify and analyze threats to network security.
  • Describe a Windows Firewall implementation.
  • Design a NAP infrastructure.
Module 6: Designing Application DeploymentThis explains how to design application deployment. This includes deployment of local applications, virtual applications, and virtual desktop.  Lessons
  • Overview of Application Deployment
  • Designing Deployment of Local Applications
  • Designing Deployment of Virtual Applications
  • Designing Deployment of Virtual Desktops
Lab : Designing Application Deployment
  • Selecting an Application Deployment Method
  • Deploying a Desktop Application
After completing this module, students will be able to:
  • Describe the different ways that you can deploy applications to users.
  • Select an appropriate way to deploy desktop applications.
  • Determine how to use Microsoft Application Virtualization (App-V) and Microsoft Enterprise Desktop Virtualization (Med-V) for application deployment.
  • Determine how to use virtual desktops for application deployment.
Module 7: Designing Remote Desktop ServicesThis module explains how to design remote desktop services. This includes designing RemoteApp, remote connectivity for RDS, and planning a monitoring and management strategy for RDS.Lessons
  • Designing Remote Desktop Services Connectivity
  • Designing RemoteApp
  • Designing Remote Connectivity for RDS
  • Monitoring and Managing RDS
Lab : Designing Remote Desktop Services
  • Designing Deployment for a Line of Business Application
  • Deploying an Application by Using RemoteApp
After completing this module, students will be able to:
  • Design RDS connectivity.
  • Design RemoteApp deployment.
  • Design the Remote Desktop Gateway (RD Gateway) service and Remote Desktop Connection Broker (RD Connection Broker) deployment.
  • Monitor and manage RDS.
Module 8: Designing Internet Information Services for Web-Based ApplicationsThis module explains how to design IIS for web-based applications. The module describes how to design a plan to optimize IIS performance, security, and maintenance.Lessons
  • Designing Web-based Application Infrastructure
  • Optimizing IIS Performance and Stability
  • Designing IIS Security
  • Monitoring and Maintaining IIS
Lab : Designing IIS for Web-Based Applications
  • Designing the Infrastructure for a Web-Based Application
  • Configuring IIS for a Web-Based Application
After completing this module, students will be able to:
  • Design an appropriate IIS infrastructure for hosting web-based applications.
  • Determine the appropriate IIS configuration options to increase performance and scalability of web-based applications.
  • Determine the appropriate IIS configuration option to secure web-based applications.
  • Design a strategy to maintain IIS for web-based applications.
Module 9: Designing File and Print ServicesThe module explains how to design file and print services.Lessons
  • Designing File Services
  • Designing File Server Resource Management
  • Designing File Encryption
  • Designing Print Services
Lab : Designing File and Print Services
  • Designing File Services
  • Designing Print Services
  • Implementing a Consolidated File Share
After completing this module, students will be able to:
  • Design a file share configuration.
  • Determine the appropriate way to deploy File Server Resource Manager.
  • Design file encryption.
  • Design print services.
Module 10: Designing File Replication and CachingThis module explains how to design a file replication and caching strategy. The module describes how to use DFS to implement file replication and caching.Lessons
  • Branch Office Data Access
  • Designing Distributed File System
  • Designing File Caching
Lab : Designing File Replication and Caching
  • Creating a Design for File Replication and Caching
  • Implementing DFS
After completing this module, students will be able to:
  • Describe data access for branch offices, and how it can be improved.
  • Design a distributed file system.
  • Design file caching for branch offices and mobile users.
Module 11: Designing for Business Continuity This module explains how to design for business continuity by planning for disaster recovery. The module also describes how to design network load balancing, failover clustering, and geographically dispersed clusters. Lessons
  • Disaster Recovery Planning
  • Designing Windows Server 2008 Network Load Balancing
  • Designing Failover Clustering for High Availability
  • Designing Geographically Dispersed Clusters
Lab : Designing for Business Continuity
  • Creating a Disaster Recovery Plan
  • Creating a High Availability Plan for a Stateful Application
  • Implementing NLB
After completing this module, students will be able to:
  • Design a disaster recovery plan.
  • Design Windows Network Load Balancing.
  • Deploy an application using App-V.
  • Design geographically dispersed clusters.
Module 12: Designing a Server Virtualization InfrastructureThis module explains how to design a virtualization infrastructure.Lessons
  • Introduction to Virtualization
  • Determining Virtualization Suitability
  • Server Virtualization Design Considerations
  • Migrating and Managing Virtualized Workloads
Lab : Designing a Virtualization Infrastructure
  • Designing Server Migration to a Virtualized Environment
After completing this module, students will be able to:
  • Describe the benefits of virtualization.
  • Determine virtualization suitability.
  • Design a server virtualization strategy.
  • Explain how to migrate workloads to a virtual environment, and then manage those virtualized workloads.
Module 13: Designing an Update Deployment StrategyThis module explains how to design an update deployment strategy. This includes designing a WSUS topology and an update management strategy.Lessons
  • Designing a WSUS Topology
  • Designing an Update Management Strategy
Lab : Designing and Implementing an Update Deployment Strategy
  • Designing an Update Deployment Strategy
  • Implementing the Update Deployment Strategy
After completing this module, students will be able to:
  • Design a WSUS topology.
  • Design an update management strategy.
Before attending this course, students must have:
  • Experience configuring Windows 7.
  • Experience configuring Active Directory Domain Services, such as domains, forests, sites, trusts, certificates, user and computer accounts.
  • Experience configuring Windows Server 2008 Network Infrastructure, such as IP addressing, name resolution, network access, file and print services, and Windows Server Update Services (WSUS).
  • Experience configuring applications infrastructure such as server deployment, remote desktop services, and web services infrastructure.
Students who attend this training can meet the prerequisites by attending the following courses, or obtaining equivalent knowledge and skills:
  • 6421B: Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure
  • 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
  • 6426C: Configuring and Troubleshooting Identity and Access Solutions with Windows Server 2008 Active Directory
  • 6427A: Configuring and Troubleshooting Internet Information Services in Windows Server 2008
  • 6428A: Configuring and Troubleshooting Windows Server 2008 Terminal Services
Module 1: Overview of Active Directory Design For most organizations, the Active Directory deployment may be the single most important component in the IT infrastructure. When organizations deploy AD DS or any of the other Active Directory services within Windows Server 2008, they are deploying a central authentication and authorization service that provides SSO access to many other network services in the organization. AD DS provides the primary security mechanism within most organizations, and it enables policy-based management for user and computer accounts. You can use the other Active Directory services to extend some of this functionality to users who are external to the organization. The critical functionality that the Active Directory services provide means that you should design your Active Directory infrastructure to meet your organization’s unique requirements. This module provides an overview of the information that you must gather to prepare for an Active Directory deployment, and it provides an overview of the steps that you use as you create an Active Directory design. Lessons
  • Preparing For Active Directory Design
  • Designing the Internal AD DS Infrastructure
  • Extending the Active Directory Design
Lab : Exploring the Lab Scenario
  • Exploring the Contoso Ltd. Scenario
  • Exploring Additional Scenarios for Active Directory Designs
After completing this module, students will be able to:
  • Prepare for Active Directory design.
  • Design the internal AD DS infrastructure.
  • Extend the Active Directory design.
Module 2: Designing an AD DS Forest Infrastructure To design the infrastructure of an AD DS forest for your organization, first you must collect organizational and administrative requirements, and then you must decide which design to use. There are several possible designs, and each one requires some trade-offs. Based on the requirements of your organization, you must determine the type of AD DS forest and forest root domain. You also must plan for trusts between forests, determine whether your organization requires multiple forests, and determine which modifications, if any, you must make to the AD DS schema. In addition, you must design for the time synchronization of all computer clocks in your organization by using the Windows Time service (Win32Time). In this module, you will learn about forest design concepts as well as about forest trusts, the AD DS schema, and the Windows Time Service. Lessons
  • Designing an AD DS Forest
  • Designing AD DS Forest Trusts
  • Planning for AD DS Schema Changes
  • Designing a Windows Time Service Deployment
Lab : Designing an AD DS Forest Infrastructure
  • Design an AD DS Forest
  • Create and Implement Forest Trusts
After completing this module, students will be able to:
  • Design an AD DS forest.
  • Design AD DS forest trusts.
  • Plan for AD DS schema changes.
  • Design a Windows Time service deployment.
Module 3: Designing an AD DS Domain Infrastructure After designing the infrastructure for the AD DS forest as described in Module 1, you need to design the AD DS domain infrastructure. To do this, you first need to decide on the AD DS domain design model and the placement and deployment of domain controllers, based on your organization's needs. After designing the AD DS domain, you then integrate the internal and external DNS namespaces with the AD DS domain by using DNS servers. If your design consists of multiple domains, you can create domain trusts to enable easy and reliable communication from one domain to another. You need to choose the right type of domain trust, based on your organization's needs. In this module, you will learn about designing AD DS domains, DNS, and domain trusts. Lessons
  • Designing AD DS Domains
  • Designing DNS Namespaces in an AD DS Environment
  • Designing AD DS Domain Trusts
Lab : Designing an AD DS Domain Infrastructure
  • Designing and Implementing AD DS Domains
  • Designing and Implementing DNS Integration
  • Designing and Implementing Domain Trusts
After completing this module, students will be able to
  • Design AD DS domains.
  • Design DNS namespaces in an AD DS environment.
  • Design AD DS domain trusts.
Module 4: Designing AD DS Sites and Replication You should design the site topology for the network after you design the logical structure of the AD DS infrastructure in your organization. The site topology is a logical representation of the physical network. You use the site topology to manage replication and logon network traffic, among other things. When you create the site design, include information about the location of the AD DS sites, the AD DS domain controllers within each site, and the site links and site-link bridges that support AD DS replication between sites. Windows Server 2008 uses site information for many purposes, including routing replication, client affinity, system volume (SYSVOL) replication, Distributed File System (DFS) namespaces, and service locations. In this module, you will learn how to design a distributed directory service that supports domain controllers that are in portions of your network that are separated by expensive, slow, or unreliable links. Lessons
  • Designing AD DS Sites
  • Designing AD DS Replication
Lab : Designing AD DS Sites and Replication
  • Designing and Implementing AD DS Sites
  • Designing and Implementing AD DS Replication
After completing this module, students will be able to:
  • Design AD DS sites.
  • Design AD DS replication.
Module 5: Designing AD DS Domain ControllersThis module explains how to design an AD DS domain controller.Lessons
  • Designing Domain Controllers and Domain Controller Placement
  • Designing RODC Deployments
  • Designing Domain Controllers As Virtual Machines
  • Designing Domain Controller Availability
Lab : Designing AD DS Domain Controllers
  • Designing an AD DS Controller Deployment
  • Designing and Implementing an RODC Deployment
After completing this module, students will be able to:
  • Design domain controllers and domain controller placement.
  • Design read only domain controller (RODC) deployments.
  • Design domain controllers as virtual machines.
  • Design domain controller availability.
Module 6: Designing AD DS Domain Administration You can use an AD DS domain to simplify the administration of your IT resources by creating a manageable structure that underlies a network infrastructure based on the Windows operating system. To design the effective administration of an AD DS domain, you need to first assess the state of the configuration and administration of the AD DS environment. To determine the best design for your AD DS domain administration, first collect information about how your organization needs to administer the various resources in your AD DS domain environment. This information provides the basis on which you can design and build the AD DS domain structures that will enable the most effective AD DS domain administrative methods for your organization, such as organizational units (OUs), AD DS groups, and user and computer account objects. Lessons
  • Planning the Delegation of AD DS Administration
  • Designing the Structure of OUs
  • Designing an AD DS Group Strategy
  • Planning to Manage User and Computer Accounts
Lab : Designing AD DS Domain Administration
  • Creating and Implementing an OU Design
  • Creating and Implementing an AD DS Group Design
  • Automating User and Group Management
After completing this module, students will be able to:
  • Plan the delegation of AD DS administration.
  • Design the structure of OUs.
  • Design an AD DS group strategy.
  • Plan to manage user and computer accounts.
Module 7: Designing AD DS Group Policy The AD DS Group Policy environment is the principal vehicle for configuration management in Windows Server 2008. An effective Group Policy design means a more standardized and easy-to-manage environment in which to perform all other administrative tasks. This module introduces the key concepts for designing Group Policy as they relate to planning, implementing. and managing Group Policy in AD DS. Lessons
  • Preparing for Group Policy Design
  • Designing Group Policy Objects
  • Designing Group Policy Processing
  • Planning for Group Policy Management
Lab : Designing AD DS Group Policy
  • Designing and Implementing Group Policy Objects
  • Designing and Implementing Group Policy Application
After completing this module, students will be able to:
  • Prepare for Group Policy design.
  • Design Group Policy objects.
  • Design Group Policy processing.
  • Plan for Group Policy management.
Module 8: Designing AD DS Security One of the primary reasons to deploy a directory service like AD DS is to provide security for the organization’s network. Managing secure access to network resources is critical to ensuring that only authorized users can access the data and that only authorized administrators can make changes to the environment. By ensuring that the AD DS deployment is secure, you can help ensure system stability and reliability, and you can minimize the number of successful attempts to jeopardize system security and integrity. Lessons
  • Preparing to Design AD DS Security
  • Designing AD DS Account and Password Policies
  • Designing AD DS Domain Controller Security
  • Designing AD DS Administrator Security
Lab : Designing and Implementing AD DS Security
  • Designing and Implementing Security Policies for Accounts and Passwords
  • Designing and Implementing Administrative Security Policies
After completing this module, students will be able to:
  • Prepare to design AD DS security.
  • Design AD DS account and password policies.
  • Design AD DS domain controller security.
  • Design AD DS administrator security.
Module 9: Designing a Public Key InfrastructureThis module explains how to design a PKI deployment by using Windows Server 2008 AD CS.Lessons
  • Overview of PKI and AD CS
  • Designing a Certification Authority Deployment
  • Designing Certificate Templates
  • Designing Certificate Distribution and Revocation
Lab : Designing and Implementing a PKI Deployment
  • Designing and Implementing a CA Hierarchy
  • Designing and Implementing AD CS Certificate Templates
After completing this module, students will be able to:
  • Describe the PKI and AD CS features and components.
  • Design a certification authority (CA) deployment hierarchy in AD CS.
  • Design certificate templates.
  • Design a strategy for distributing and revoking certificates.
Module 10: Designing and Deploying AD RMSThis module explains how to design and implement a rights protection infrastructure by using AD RMS.Lessons
  • AD RMS Overview
  • Designing an AD RMS Deployment
  • Extending the AD RMS Deployment Outside an Organization
Lab : Designing and Deploying AD RMS
  • Designing an AD RMS Deployment
  • Implementing an Internal AD RMS Deployment
  • Verifying the AD RMS Deployment
After completing this module, students will be able to:
  • Describe the AD RMS components and functionality.
  • Design an AD RMS deployment.
  • Extend an AD RMS deployment outside an organization.
Module 11: Designing an AD LDS InfrastructureThis module explains how to design and implement an AD LDS deployment.Lessons
  • AD LDS Deployment Scenarios
  • Designing an AD LDS Server Deployment
  • Designing AD LDS Replication
  • Integrating AD LDS with AD DS
Lab : Designing and Implementing an AD LDS Infrastructure
  • Designing AD LDS Replication for Internal Applications
  • Designing AD LDS Replication for External Applications
  • Designing Highly Available LDAP Services for Multiple Applications
  • Implementing an AD LDS Solution
After completing this module, students will be able to:
  • Describe the AD LDS deployment scenarios.
  • Design an AD LDS server deployment.
  • Design an AD LDS replication topology.
  • Integrate AD LDS with AD DS.
Module 12: Designing an AD FS InfrastructureThis module explains how to design an implementation of Active Directory Federation Services (AD FS).Lessons
  • Overview of an AD FS Design
  • Designing an AD FS Deployment
  • Designing AD FS Claims and Applications
Lab : Integrating AD FS and AD RMS
  • Configuring AD FS in the Account Partner
  • Configuring AD FS in the Resource Forest
  • Adding Resource and Account Partners
  • Configuring AD RMS to Work with AD FS
  • Configuring the AD FS Client
  • Verifying AD RMS and AD FS Functionality
After completing this module, students will be able to:
  • Describe the AD FS components and deployment scenarios.
  • Design an AD FS deployment.
  • Design AD FS claims and applications.
Module 13: Designing AD DS TransitionsThis module explains how to design and implement AD DS upgrades and migrations.Lessons
  • Choosing an AD DS Transition Strategy
  • Designing a Domain-Upgrade Strategy
  • Designing a Domain-Restructure Strategy
  • Designing AD DS Domain Renaming
Lab : Designing and Implementing an AD DS Domain Restructure
  • Designing an AD DS Domain Restructure
  • Implementing an AD DS Domain Restructure
After completing this module, students will be able to:
  • Choose the best AD DS transition strategy, based on the current environment and requirements.
  • Design a domain-upgrade strategy.
  • Design a domain-restructure strategy.
  • Design AD DS domain renaming.
Outline Module 1: Configuring Storage for Windows Server 2008 ApplicationsThis module covers the storage options most commonly associated with Windows Server 2008 and Windows Server 2008 R2 instances today.  It introduces storage architectures, mediums, and protocols, guides students through the configuration steps for connecting iSCSI storage, and introduces the concept of VHDs as storage and boot devices.Lessons
  • Lesson 1: Storage Concepts in Windows Server 2008
  • Lesson 2: Configuring iSCSI Storage for Windows Server
  • Lesson 3: Working with Virtual Hard Disks
Lab : Lab A: Configuring iSCSI Storage for Windows Server 2008
  • Exercise 1: Configuring iSCSI Storage Connections for Windows Server
  • Exercise 2: Configuring the MPIO DSM
  • Exercise 3: Configuring a Redundant iSCSI Connection Using MPIO
Lab : Lab B: Managing Virtual Hard Disks
  • Exercise 1: Creating a Virtual Hard Disk
  • Exercise 2: Mounting a Virtual Hard Disk in Windows Server
  • Exercise 3: Configuring Windows Server to Startup from a Virtual Hard Disk
After completing this module, students will be able to:
  • Understand general Storage concepts in Windows Server 2008
  • Configure iSCSI Storage for Windows Server
  • Work with Virtual Hard Disks in Windows Server 2008
Module 2: Configuring High Availability for Windows Server 2008 ApplicationsThis module covers Windows Server 2008 and Windows Server 2008 R2’s built-in platforms that facility high availability for business applications.  These general-purpose platforms include Network Load Balancing and Windows Failover Clustering in both single-site and multiple-site configurations.Lessons
  • Lesson 1: Network Load Balancing Fundamentals
  • Lesson 2: Implementing a Network Load Balancing Cluster
  • Lesson 3: Windows Failover Cluster Fundamentals
  • Lesson 4: Preparing for Failover Clustering
  • Lesson 5: Implementing a Windows Failover Cluster
Lab : Lab A: Installing and Managing an NLB Cluster
  • Exercise 1: Building an NLB Cluster
  • Exercise 2: Configuring NLB Cluster Options
  • Exercise 3: Testing the NLB Cluster
  • Exercise 4: Managing an NLB Cluster
Lab : Lab B: Building a Windows Failover Cluster
  • Exercise 1: Preparing Windows Server for Hosting a Failover Cluster
  • Exercise 2: Running the Cluster Validation Wizard
  • Exercise 3: Building a Failover Cluster
  • Exercise 4: Validating a Successful Failover Cluster Creation
Lab : Lab C: Managing a Windows Failover Cluster
  • Exercise 1: Creating Cluster Resources
  • Exercise 2: Configuring Cluster Resource Dependencies
  • Exercise 3: Configuring Resource Policies and Owners
  • Exercise 4: Testing Cluster Fail Over
After completing this module, students will be able to:
  • Understand Network Load Balancing Fundamentals
  • Implement a Network Load Balancing Cluster
  • Understand Windows Failover Cluster Fundamentals
  • Prepare for Failover Clustering
  • Implementing a Windows Failover Cluster in Windows Server 2008
Module 3: Configuring Remote Desktop ServicesThis module covers the introductory steps required to bring a single Remote Desktop Services Host server online and prepare it for remote application delivery to users.  Students in this module will complete all aspects of the single-server configuration while preparing the environment for adding potential future servers.Lessons
  • Lesson 1: Remote Desktop Services Overview
  • Lesson 2: Configuring a Remote Desktop Services Host Server
  • Lesson 3: Configuring the Remote Desktop User Experience
  • Lesson 4: Deploying and Connecting to Remote App programs
  • Lesson 5: Connecting Users to Applications with RD Web Access and RADC
  • Lesson 6: Configuring Licensing for Remote Desktop Services
Lab : Lab A: Installing and Configuring an RD Session Host Server
  • Exercise 1: Install the RD Session Host Role Service
  • Exercise 2: Install an Application on the RD Session Host Server
  • Exercise 3: Prepare the RD Session Host Server for Users
  • Exercise 4: Connect to an RD Session Host with the RD Client
Lab : Lab B: Customizing the User Experience
  • Exercise 1: Configure RD Session Host Printing
  • Exercise 2: Configure RD Session Host Device Redirection
  • Exercise 3: Configure the Desktop Experience
  • Exercise 4: Configure Multimedia Redirection
  • Exercise 5: Configure IP Virtualization
Lab : Lab C: Deploying and Connecting to Remote App programs
  • Exercise 1: Create a RemoteApp Program
  • Exercise 2: Deploy a RemoteApp
  • Exercise 3: Connect to a Deployed RemoteApp Program
Lab : Lab D: Connecting Users to Applications with RD Web Access and RADC
  • Exercise 1 Install and Configure RD Web Access
  • Exercise 2: Use RD Web Access to Connect to Remote App programs
  • Exercise 3: Configure Single Sign-On
  • Exercise 4: Configure RADC
  • Exercise 5: Use Group Policy to Distribute RADC Settings
  • Exercise 6: Use RADC to Connect to RemoteApp programs
Lab : Lab E: Configuring Licensing for RDS
  • Exercise 1 Install and Configure and RD Licensing Server
  • Exercise 2: Configure RD Session Host Servers for Licensing
  • Exercise 3: Review Licensing Configuration and Diagnosis
After completing this module, students will be able to:
  • Understand Remote Desktop Services Windows Server 2008 and Windows Server 2008 R2
  • Configure a Remote Desktop Services Host Server
  • Configure the Remote Desktop User Experience
  • Deploy and Connect to Remote App programs
  • Connect Users to Applications with RD Web Access and RADC
  • Configure Licensing for Remote Desktop Services
Module 4: RDS in the Multiple-Server ConfigurationThis module covers the extra activities and knowledge required to expand a single-RDSH server environment to one with multiple RDSH servers in a farm configuration.Lessons
  • Lesson 1: Building an RDS Server Farm
  • Lesson 2: Monitoring the RDS Environment
Lab : Lab A: Building an RDS Server Farm
  • Exercise 1: Install RDSH on NYC-RDSH2
  • Exercise 2: Configure an RDSH Server via Group Policy
  • Exercise 3: Configure RDCB and NLB to create an RDS Farm
  • Exercise 4: Configure RD Roaming Profiles
  • Exercise 5: Test the connection to an RDS Farm
Lab : Lab B: Monitoring the RDS Environment
  • Exercise 1: Use the RD Manager to Administer User Sessions
  • Exercise 2: Use WSRM to Monitor RDS Resource Usage
  • Exercise 3: Configure Fair Share CPU Scheduling
After completing this module, students will be able to:
  • Build an RDS Server Farm
  • Monitor and Configure the RDS Environment
Module 5: Securely Delivering RDS Applications to the InternetThis module covers the additional activities that are necessary to build and secure a Remote Desktop Gateway server for the purposes of protecting RDS communication as it passes through untrusted networks such as the InternetLessons
  • Lesson 1: Remote Desktop Gateway Fundamentals
  • Lesson 2: Installing and Managing the RDG
Lab : Lab: Installing and Managing the RDG
  • Exercise 1: Installing and Configuring the RDG
  • Exercise 2: Configuring RD CAPs and RD RAPs
  • Exercise 3: Configuring SSO for User Connections
  • Exercise 4: Testing RemoteApp Connections with the RDG
After completing this module, students will be able to:
  • Remote Desktop Gateway Fundamentals
Install, configure and  Manage the RDG Module 6: IIS Web Applications This module covers the primary use of IIS as a Web application platform. Students will learn to set up and maintain a Web site and application configuration based upon business and developer requirements. Although ASP.NET Web sites are commonly maintained by developers, IT professionals are typically called upon to configure the platform and assist with maintenance.  This module will cover IIS 7.5 and IIS 7.0 and outline distinctions between them but will focus on IIS 7.5 as in Windows Server 2008 R2 Lessons
  • Lesson 1: IIS Functional Overview
  • Lesson 2: Creating IIS Web Sites and Applications
  • Lesson 3: Managing IIS Web Sites and Applications
Lab : Lab A: Creating IIS Web Sites and Applications
  • Exercise 1: Configuring IIS Server Settings
  • Exercise 2: Configuring an Application Pool
  • Exercise 3: Creating and Configuring a Web Site
  • Exercise 4: Configuring Basic Settings for a Web Application
  • Exercise 5: Backing Up IIS Configuration Settings
  • Exercise 6: Configuring a Virtual Directory
Lab : Lab B: Managing IIS Web Sites and Applications
  • Exercise 1: Configuring ASP.NET
  • Exercise 2: Configuring ASP.NET Application Settings
  • Exercise 3: Configuring ASP.NET Security
After completing this module, students will be able to:
  • Understand how IIS Works and What it can do in Windows Server 2008 and Windows Server 2008 R2
  • Create IIS Web Sites and Applications
  • Manage IIS Web Sites and Applications
Module 7: IIS FTP and SMTP ServicesThis module covers IIS' other major feature areas such as file transfer and email functionality. These features are commonly used to support Web sites, and this module will discuss how to properly configure these features in accordance with best practices and based upon business requirements.Lessons
  • Lesson 1: Implementing and Configuring IIS FTP Sites
  • Lesson 2: Implementing and Configuring IIS SMTP Sites
Lab : Lab: Implementing FTP and SMTP
  • Exercise 1: Installing FTP and SMTP
  • Exercise 2: Configuring and Testing FTP
  • Exercise 3: Configuring and Testing SMTP
After completing this module, students will be able to:
  • Implement and Configure IIS FTP Sites
  • Implement and Configure IIS SMTP Sites
Module 8: IIS Server and SSL ManagementThis module focuses on IIS' security-related features, including SSL, logging, delegated permissions, remote administration, and other features. Students will practice a variety of scenarios that reflect common real-world business requirements.Lessons
  • Lesson 1: Monitoring and Logging IIS
  • Lesson 2: Managing IIS and SSL Security
  • Lesson 3: Managing IIS Administrative Delegation and Remote Administration
Lab : Lab A: Managing IIS and SSL Security
  • Exercise 1: Configuring SSL Bindings
  • Exercise 2: Configuring IP Address Blocking
  • Exercise 3: Configuring Logging
  • Exercise 4: Testing and Validating the Configuration
Lab : Lab B: Configuring Remote and Delegated Administration in IIS
  • Exercise 1: Configuring IIS Remote Administration
  • Exercise 2: Configuring IIS Delegated Administration
  • Exercise 3: Configuring IIS Feature Delegation
After completing this module, students will be able to:
  • Configure and Monitor IIS and the IIS Logs
  • Manage IIS and SSL Security
  • Manage IIS Administrative Delegation and Remote Administration
Module 9: Microsoft SharePoint FoundationThis module covers the installation and configuration of this evolution of Windows SharePoint Services. Students will learn to set up and configure a basic document-sharing site that meets many common organizational and project requirements. It will focus on SharePoint Foundation 2010 as implemented in Windows Server 2008 and Windows Server 2008 R2Lessons
  • Lesson 1: Installing and Configuring SharePoint Foundation
  • Lesson 2: SharePoint Foundation Integration
Lab : Lab: Installing and Configuring SharePoint Foundation
  • Exercise 1: Install SharePoint Foundation 2010
  • Exercise 2: Create an initial SharePoint site and document library
  • Exercise 3: Delegate site permissions
  • Exercise 4: Backup and recover the SharePoint site
  • Exercise 5: Configure SharePoint Timer jobs
  • Exercise 6: Configure usage and Report logging
  • Exercise 7: Resetting the lab environment
After completing this module, students will be able to:
  • Install and Configure SharePoint Foundation
  • SharePoint Foundation Integration
Module 10: Windows Streaming Media Services This module looks at the Media Services features of the Windows Server 2008 and Windows Server 2008 R2 platform, and introduces students to key concepts such as Real-Time Streaming Protocol, authentication, authorization, and more. Students will learn to install and configure Media Services to support use of the system features. Lessons
  • Lesson 1:  Installing and Configuring Streaming Media Services
  • Lesson 2:  Securing Streaming Media
Lab : Lab A: Installing and Configuring Media Services
  • Exercise 1: Installing the Media Services Role
  • Exercise 2: Configuring On-Demand Streaming and RTSP
  • Exercise 3: Configuring Bandwidth and Connection Limits
  • Exercise 4: Verify and Tune Media Services delivery
  • Exercise 4: Configuring Web-based Administration of Media Services
Lab : Lab B: Configuring Media Services Content Security
  • Exercise 1: Configuring Authentication for a Publishing Point
  • Exercise 2: Restricting Access to Files to Specified Users
  • Exercise 3: Allowing Anonymous Access to Files on a New Publishing Point
  • Exercise 4: Allowing Access to Intranet Users
After completing this module, students will be able to:
  • Install and Configure Streaming Media Services
  • Secure Streaming Media
Module 1: Designing IP Addressing and ConfigurationThis module describes how to design a strategy for allocating IP addresses to workstations and servers in Windows Server 2008. The module also describes how to design DHCP implementation and the configuration options that are available.Lessons
  • Designing an IPv4 Addressing Scheme
  • Designing an IPv6 Addressing Scheme
  • Designing an IPv6 Transition Strategy
  • Designing an IPv4 DHCP Implementation
  • Planning DHCP Scope Configuration
Lab : Designing and Implementing IP Addressing in Windows Server 2008
  • Designing an IPv4 Addressing Scheme
  • Designing an IPv6 Addressing Scheme
  • Designing a DHCP Implementation
  • Discuss IP Address Allocation
  • Implementing an IPv4 Addressing Scheme
After completing this module, students will be able to:
  • Design an IPv4 addressing scheme.
  • Design an IPv6 addressing scheme.
  • Develop an IPv6 transition strategy.
  • Design a DHCP implementation.
  • Plan DHCP scope configuration and options.
Module 2: Designing Name ResolutionThis module explains how to design an appropriate name resolution strategy that incorporates DNS. The module also covers DNS namespaces, DNS zone implementation, replication, and delegation.Lessons
  • Collecting Information for a Name Resolution Design
  • Designing a DNS Server Strategy
  • Designing a DNS Namespace
  • Designing DNS Zone Implementation
  • Designing Zone Replication and Delegation
Lab : Designing and Implementing a Name Resolution Strategy in Windows Server 2008
  • Designing a DNS Namespace
  • Designing a DNS Server Strategy
  • Designing a DNS Zone and Replication Strategy
  • Implementing Name Resolution
After completing this module, students will be able to:
  • Determine the information required to plan name resolution.
  • Design a DNS server strategy.
  • Design a DNS namespace.
  • Design a DNS zone strategy.
  • Design a DNS zone replication strategy.
Module 3: Designing Advanced Name ResolutionThis module explains how to design an advanced name resolution strategy by optimizing DNS queries, designing DNS for high availability, and designing a NetBios name resolution plan.Lessons
  • Optimizing DNS Queries
  • Designing DNS for High Availability and Security
  • Designing a NetBIOS Name Resolution Strategy
Lab : Designing and Implementing Advanced Name Resolution in Windows Server 2008
  • Designing an Optimized DNS Solution
  • Designing High Availability for Name Resolution
  • Designing NetBIOS Name Resolution
  • Implementing the Optimized Design
After completing this module, students will be able to:
  • Optimize DNS resolution.
  • Design DNS for high availability and security.
  • Design a NetBIOS name resolution strategy.
Module 4: Designing Network AccessThis module explains how to design a network access solution. The module also describes how to secure network access, design a strategy for RADIUS authentication with NPS, design wireless access,  and Internet connectivity.Lessons
  • Securing and Controlling Network Access
  • Designing Remote Access Services
  • Designing RADIUS Authentication with Network Policy Services
  • Designing Wireless Access
  • Designing Internet Connectivity and Perimeter Networks
Lab : Designing and Implementing a Network Access Solution
  • Designing a VPN Solution
  • Designing Network Policy Services
  • Designing a Wireless Connection Solution
  • Implementing Network Access
Lab : Designing a Network Access Solution
  • Designing a Perimeter Network
After completing this module, students will be able to:
  • Secure and control network access.
  • Design remote access services.
  • Design a Remote Authentication Dial-In User Service (RADIUS) solution.
  • Design wireless access.
  • Design a perimeter network.
  • Describe how to design network infrastructure to support Windows 7 DirectAccess.
Module 5: Designing Network SecurityThis module explains how to design a network security plan. The module describes the defense-in-depth model for network security and explains how to implement Windows Firewall and NAP policies.Lessons
  • Overview of Network Security Design
  • Identifying and Analyzing Threats to Network Security
  • Designing a Windows Firewall Implementation
  • Designing a Network Access Protection Infrastructure
Lab : Designing a Network Security Plan
  • Assembling a Team for the Security Plan
  • Identifying Security Threats
Lab : Designing and Implementing a Windows Firewall Solution
  • Designing a Windows Firewall Implementation
  • Designing an IPsec Implementation
  • Implementing Windows Firewall
Lab : Designing and Implementing NAP
  • Analyze NAP Enforcement Methods
  • Designing DHCP NAP Enforcement
  • Designing IPsec NAP Enforcement
  • Implementing VPN NAP Enforcement
After completing this module, students will be able to:
  • Describe the network security design process.
  • Describe how to identify and analyze threats to network security.
  • Describe a Windows Firewall implementation.
  • Design a NAP infrastructure.
Module 6: Designing Application DeploymentThis explains how to design application deployment. This includes deployment of local applications, virtual applications, and virtual desktop.  Lessons
  • Overview of Application Deployment
  • Designing Deployment of Local Applications
  • Designing Deployment of Virtual Applications
  • Designing Deployment of Virtual Desktops
Lab : Designing Application Deployment
  • Selecting an Application Deployment Method
  • Deploying a Desktop Application
After completing this module, students will be able to:
  • Describe the different ways that you can deploy applications to users.
  • Select an appropriate way to deploy desktop applications.
  • Determine how to use Microsoft Application Virtualization (App-V) and Microsoft Enterprise Desktop Virtualization (Med-V) for application deployment.
  • Determine how to use virtual desktops for application deployment.
Module 7: Designing Remote Desktop ServicesThis module explains how to design remote desktop services. This includes designing RemoteApp, remote connectivity for RDS, and planning a monitoring and management strategy for RDS.Lessons
  • Designing Remote Desktop Services Connectivity
  • Designing RemoteApp
  • Designing Remote Connectivity for RDS
  • Monitoring and Managing RDS
Lab : Designing Remote Desktop Services
  • Designing Deployment for a Line of Business Application
  • Deploying an Application by Using RemoteApp
After completing this module, students will be able to:
  • Design RDS connectivity.
  • Design RemoteApp deployment.
  • Design the Remote Desktop Gateway (RD Gateway) service and Remote Desktop Connection Broker (RD Connection Broker) deployment.
  • Monitor and manage RDS.
Module 8: Designing Internet Information Services for Web-Based ApplicationsThis module explains how to design IIS for web-based applications. The module describes how to design a plan to optimize IIS performance, security, and maintenance.Lessons
  • Designing Web-based Application Infrastructure
  • Optimizing IIS Performance and Stability
  • Designing IIS Security
  • Monitoring and Maintaining IIS
Lab : Designing IIS for Web-Based Applications
  • Designing the Infrastructure for a Web-Based Application
  • Configuring IIS for a Web-Based Application
After completing this module, students will be able to:
  • Design an appropriate IIS infrastructure for hosting web-based applications.
  • Determine the appropriate IIS configuration options to increase performance and scalability of web-based applications.
  • Determine the appropriate IIS configuration option to secure web-based applications.
  • Design a strategy to maintain IIS for web-based applications.
Module 9: Designing File and Print ServicesThe module explains how to design file and print services.Lessons
  • Designing File Services
  • Designing File Server Resource Management
  • Designing File Encryption
  • Designing Print Services
Lab : Designing File and Print Services
  • Designing File Services
  • Designing Print Services
  • Implementing a Consolidated File Share
After completing this module, students will be able to:
  • Design a file share configuration.
  • Determine the appropriate way to deploy File Server Resource Manager.
  • Design file encryption.
  • Design print services.
Module 10: Designing File Replication and CachingThis module explains how to design a file replication and caching strategy. The module describes how to use DFS to implement file replication and caching.Lessons
  • Branch Office Data Access
  • Designing Distributed File System
  • Designing File Caching
Lab : Designing File Replication and Caching
  • Creating a Design for File Replication and Caching
  • Implementing DFS
After completing this module, students will be able to:
  • Describe data access for branch offices, and how it can be improved.
  • Design a distributed file system.
  • Design file caching for branch offices and mobile users.
Module 11: Designing for Business Continuity This module explains how to design for business continuity by planning for disaster recovery. The module also describes how to design network load balancing, failover clustering, and geographically dispersed clusters. Lessons
  • Disaster Recovery Planning
  • Designing Windows Server 2008 Network Load Balancing
  • Designing Failover Clustering for High Availability
  • Designing Geographically Dispersed Clusters
Lab : Designing for Business Continuity
  • Creating a Disaster Recovery Plan
  • Creating a High Availability Plan for a Stateful Application
  • Implementing NLB
After completing this module, students will be able to:
  • Design a disaster recovery plan.
  • Design Windows Network Load Balancing.
  • Deploy an application using App-V.
  • Design geographically dispersed clusters.
Module 12: Designing a Server Virtualization InfrastructureThis module explains how to design a virtualization infrastructure.Lessons
  • Introduction to Virtualization
  • Determining Virtualization Suitability
  • Server Virtualization Design Considerations
  • Migrating and Managing Virtualized Workloads
Lab : Designing a Virtualization Infrastructure
  • Designing Server Migration to a Virtualized Environment
After completing this module, students will be able to:
  • Describe the benefits of virtualization.
  • Determine virtualization suitability.
  • Design a server virtualization strategy.
  • Explain how to migrate workloads to a virtual environment, and then manage those virtualized workloads.
  Module 13: Designing an Update Deployment StrategyThis module explains how to design an update deployment strategy. This includes designing a WSUS topology and an update management strategy.Lessons
  • Designing a WSUS Topology
  • Designing an Update Management Strategy
Lab : Designing and Implementing an Update Deployment Strategy
  • Designing an Update Deployment Strategy
  • Implementing the Update Deployment Strategy
After completing this module, students will be able to:
  • Design a WSUS topology.
  • Design an update management strategy.
Before attending this course, students must have:
  • Experience configuring Windows 7.
  • Experience configuring Active Directory Domain Services, such as domains, forests, sites, trusts, certificates, user and computer accounts.
  • Experience configuring Windows Server 2008 Network Infrastructure, such as IP addressing, name resolution, network access, file and print services, and Windows Server Update Services (WSUS).
  • Experience configuring applications infrastructure such as server deployment, remote desktop services, and web services infrastructure.
  Students who attend this training can meet the prerequisites by attending the following courses, or obtaining equivalent knowledge and skills:
  • 6421B: Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure
  • 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
  • 6426C: Configuring and Troubleshooting Identity and Access Solutions with Windows Server 2008 Active Directory
  • 6427A: Configuring and Troubleshooting Internet Information Services in Windows Server 2008
  • 6428A: Configuring and Troubleshooting Windows Server 2008 Terminal Services
Module 1: Overview of Active Directory Design For most organizations, the Active Directory deployment may be the single most important component in the IT infrastructure. When organizations deploy AD DS or any of the other Active Directory services within Windows Server 2008, they are deploying a central authentication and authorization service that provides SSO access to many other network services in the organization. AD DS provides the primary security mechanism within most organizations, and it enables policy-based management for user and computer accounts. You can use the other Active Directory services to extend some of this functionality to users who are external to the organization.   The critical functionality that the Active Directory services provide means that you should design your Active Directory infrastructure to meet your organization’s unique requirements. This module provides an overview of the information that you must gather to prepare for an Active Directory deployment, and it provides an overview of the steps that you use as you create an Active Directory design. Lessons
  • Preparing For Active Directory Design
  • Designing the Internal AD DS Infrastructure
  • Extending the Active Directory Design
Lab : Exploring the Lab Scenario
  • Exploring the Contoso Ltd. Scenario
  • Exploring Additional Scenarios for Active Directory Designs
After completing this module, students will be able to:
  • Prepare for Active Directory design.
  • Design the internal AD DS infrastructure.
  • Extend the Active Directory design.
Module 2: Designing an AD DS Forest Infrastructure To design the infrastructure of an AD DS forest for your organization, first you must collect organizational and administrative requirements, and then you must decide which design to use. There are several possible designs, and each one requires some trade-offs. Based on the requirements of your organization, you must determine the type of AD DS forest and forest root domain. You also must plan for trusts between forests, determine whether your organization requires multiple forests, and determine which modifications, if any, you must make to the AD DS schema. In addition, you must design for the time synchronization of all computer clocks in your organization by using the Windows Time service (Win32Time).   In this module, you will learn about forest design concepts as well as about forest trusts, the AD DS schema, and the Windows Time Service. Lessons
  • Designing an AD DS Forest
  • Designing AD DS Forest Trusts
  • Planning for AD DS Schema Changes
  • Designing a Windows Time Service Deployment
Lab : Designing an AD DS Forest Infrastructure
  • Design an AD DS Forest
  • Create and Implement Forest Trusts
After completing this module, students will be able to:
  • Design an AD DS forest.
  • Design AD DS forest trusts.
  • Plan for AD DS schema changes.
  • Design a Windows Time service deployment.
Module 3: Designing an AD DS Domain Infrastructure After designing the infrastructure for the AD DS forest as described in Module 1, you need to design the AD DS domain infrastructure. To do this, you first need to decide on the AD DS domain design model and the placement and deployment of domain controllers, based on your organization's needs. After designing the AD DS domain, you then integrate the internal and external DNS namespaces with the AD DS domain by using DNS servers. If your design consists of multiple domains, you can create domain trusts to enable easy and reliable communication from one domain to another. You need to choose the right type of domain trust, based on your organization's needs.   In this module, you will learn about designing AD DS domains, DNS, and domain trusts. Lessons
  • Designing AD DS Domains
  • Designing DNS Namespaces in an AD DS Environment
  • Designing AD DS Domain Trusts
Lab : Designing an AD DS Domain Infrastructure
  • Designing and Implementing AD DS Domains
  • Designing and Implementing DNS Integration
  • Designing and Implementing Domain Trusts
After completing this module, students will be able to
  • Design AD DS domains.
  • Design DNS namespaces in an AD DS environment.
  • Design AD DS domain trusts.
Module 4: Designing AD DS Sites and Replication You should design the site topology for the network after you design the logical structure of the AD DS infrastructure in your organization. The site topology is a logical representation of the physical network. You use the site topology to manage replication and logon network traffic, among other things. When you create the site design, include information about the location of the AD DS sites, the AD DS domain controllers within each site, and the site links and site-link bridges that support AD DS replication between sites. Windows Server 2008 uses site information for many purposes, including routing replication, client affinity, system volume (SYSVOL) replication, Distributed File System (DFS) namespaces, and service locations.   In this module, you will learn how to design a distributed directory service that supports domain controllers that are in portions of your network that are separated by expensive, slow, or unreliable links. Lessons
  • Designing AD DS Sites
  • Designing AD DS Replication
Lab : Designing AD DS Sites and Replication
  • Designing and Implementing AD DS Sites
  • Designing and Implementing AD DS Replication
After completing this module, students will be able to:
  • Design AD DS sites.
  • Design AD DS replication.
Module 5: Designing AD DS Domain ControllersThis module explains how to design an AD DS domain controller.Lessons
  • Designing Domain Controllers and Domain Controller Placement
  • Designing RODC Deployments
  • Designing Domain Controllers As Virtual Machines
  • Designing Domain Controller Availability
Lab : Designing AD DS Domain Controllers
  • Designing an AD DS Controller Deployment
  • Designing and Implementing an RODC Deployment
After completing this module, students will be able to:
  • Design domain controllers and domain controller placement.
  • Design read only domain controller (RODC) deployments.
  • Design domain controllers as virtual machines.
  • Design domain controller availability.
Module 6: Designing AD DS Domain Administration You can use an AD DS domain to simplify the administration of your IT resources by creating a manageable structure that underlies a network infrastructure based on the Windows operating system.   To design the effective administration of an AD DS domain, you need to first assess the state of the configuration and administration of the AD DS environment. To determine the best design for your AD DS domain administration, first collect information about how your organization needs to administer the various resources in your AD DS domain environment. This information provides the basis on which you can design and build the AD DS domain structures that will enable the most effective AD DS domain administrative methods for your organization, such as organizational units (OUs), AD DS groups, and user and computer account objects. Lessons
  • Planning the Delegation of AD DS Administration
  • Designing the Structure of OUs
  • Designing an AD DS Group Strategy
  • Planning to Manage User and Computer Accounts
Lab : Designing AD DS Domain Administration
  • Creating and Implementing an OU Design
  • Creating and Implementing an AD DS Group Design
  • Automating User and Group Management
After completing this module, students will be able to:
  • Plan the delegation of AD DS administration.
  • Design the structure of OUs.
  • Design an AD DS group strategy.
  • Plan to manage user and computer accounts.
Module 7: Designing AD DS Group Policy The AD DS Group Policy environment is the principal vehicle for configuration management in Windows Server 2008. An effective Group Policy design means a more standardized and easy-to-manage environment in which to perform all other administrative tasks.   This module introduces the key concepts for designing Group Policy as they relate to planning, implementing. and managing Group Policy in AD DS. Lessons
  • Preparing for Group Policy Design
  • Designing Group Policy Objects
  • Designing Group Policy Processing
  • Planning for Group Policy Management
Lab : Designing AD DS Group Policy
  • Designing and Implementing Group Policy Objects
  • Designing and Implementing Group Policy Application
After completing this module, students will be able to:
  • Prepare for Group Policy design.
  • Design Group Policy objects.
  • Design Group Policy processing.
  • Plan for Group Policy management.
Module 8: Designing AD DS Security One of the primary reasons to deploy a directory service like AD DS is to provide security for the organization’s network. Managing secure access to network resources is critical to ensuring that only authorized users can access the data and that only authorized administrators can make changes to the environment.   By ensuring that the AD DS deployment is secure, you can help ensure system stability and reliability, and you can minimize the number of successful attempts to jeopardize system security and integrity. Lessons
  • Preparing to Design AD DS Security
  • Designing AD DS Account and Password Policies
  • Designing AD DS Domain Controller Security
  • Designing AD DS Administrator Security
Lab : Designing and Implementing AD DS Security
  • Designing and Implementing Security Policies for Accounts and Passwords
  • Designing and Implementing Administrative Security Policies
After completing this module, students will be able to:
  • Prepare to design AD DS security.
  • Design AD DS account and password policies.
  • Design AD DS domain controller security.
  • Design AD DS administrator security.
Module 9: Designing a Public Key InfrastructureThis module explains how to design a PKI deployment by using Windows Server 2008 AD CS.Lessons
  • Overview of PKI and AD CS
  • Designing a Certification Authority Deployment
  • Designing Certificate Templates
  • Designing Certificate Distribution and Revocation
Lab : Designing and Implementing a PKI Deployment
  • Designing and Implementing a CA Hierarchy
  • Designing and Implementing AD CS Certificate Templates
After completing this module, students will be able to:
  • Describe the PKI and AD CS features and components.
  • Design a certification authority (CA) deployment hierarchy in AD CS.
  • Design certificate templates.
  • Design a strategy for distributing and revoking certificates.
Module 10: Designing and Deploying AD RMSThis module explains how to design and implement a rights protection infrastructure by using AD RMS.Lessons
  • AD RMS Overview
  • Designing an AD RMS Deployment
  • Extending the AD RMS Deployment Outside an Organization
Lab : Designing and Deploying AD RMS
  • Designing an AD RMS Deployment
  • Implementing an Internal AD RMS Deployment
  • Verifying the AD RMS Deployment
After completing this module, students will be able to:
  • Describe the AD RMS components and functionality.
  • Design an AD RMS deployment.
  • Extend an AD RMS deployment outside an organization.
Module 11: Designing an AD LDS InfrastructureThis module explains how to design and implement an AD LDS deployment.Lessons
  • AD LDS Deployment Scenarios
  • Designing an AD LDS Server Deployment
  • Designing AD LDS Replication
  • Integrating AD LDS with AD DS
Lab : Designing and Implementing an AD LDS Infrastructure
  • Designing AD LDS Replication for Internal Applications
  • Designing AD LDS Replication for External Applications
  • Designing Highly Available LDAP Services for Multiple Applications
  • Implementing an AD LDS Solution
After completing this module, students will be able to:
  • Describe the AD LDS deployment scenarios.
  • Design an AD LDS server deployment.
  • Design an AD LDS replication topology.
  • Integrate AD LDS with AD DS.
Module 12: Designing an AD FS InfrastructureThis module explains how to design an implementation of Active Directory Federation Services (AD FS).Lessons
  • Overview of an AD FS Design
  • Designing an AD FS Deployment
  • Designing AD FS Claims and Applications
Lab : Integrating AD FS and AD RMS
  • Configuring AD FS in the Account Partner
  • Configuring AD FS in the Resource Forest
  • Adding Resource and Account Partners
  • Configuring AD RMS to Work with AD FS
  • Configuring the AD FS Client
  • Verifying AD RMS and AD FS Functionality
After completing this module, students will be able to:
  • Describe the AD FS components and deployment scenarios.
  • Design an AD FS deployment.
  • Design AD FS claims and applications.
Module 13: Designing AD DS TransitionsThis module explains how to design and implement AD DS upgrades and migrations.Lessons
  • Choosing an AD DS Transition Strategy
  • Designing a Domain-Upgrade Strategy
  • Designing a Domain-Restructure Strategy
  • Designing AD DS Domain Renaming
Lab : Designing and Implementing an AD DS Domain Restructure
  • Designing an AD DS Domain Restructure
  • Implementing an AD DS Domain Restructure
After completing this module, students will be able to:
  • Choose the best AD DS transition strategy, based on the current environment and requirements.
  • Design a domain-upgrade strategy.
  • Design a domain-restructure strategy.
  • Design AD DS domain renaming.
Module 1: Installing and Deploying Windows Lessons
  • Introducing Windows 8
  • Preparing to Install Windows 8
  • Installing Windows 8
  • Automating the Installation of Windows 8
  • Activating Windows 8
Module 2: Upgrading and Migrating to Windows 8 Lessons
  • Upgrading to Windows 8
  • Migrating to Windows 8
  • Migrating User Data and Settings
Module 3: Managing Disks and Device Drivers Lessons
  • Managing Disks, Partitions, and Volumes
  • Maintaining Disks, Partitions, and Volumes
  • Working with Virtual Hard Disks
  • Installing and Configuring Device Drivers
Module 4: Configuring and Troubleshooting Network Connections Lessons
  • Configuring IPv4 Network Connectivity
  • Configuring IPv6 Network Connectivity
  • Implementing Automatic IP Address Allocation
  • Implementing Name Resolution
  • Troubleshooting Network Connectivity
  • Troubleshoot common network-related problems.
Module 5: Implementing Wireless Network Connections Lessons
  • Overview of Wireless Networks
  • Implementing a Wireless Network
Module 6: Implementing Network Security Lessons
  • Overview of Threats to Network Security
  • Configuring Windows Firewall
  • Securing Network Traffic
  • Configuring Windows Defender
Module 7: Configuring File Access and Printers on Windows 8 Clients Lessons
  • Managing File Access
  • Managing Shared Folders
  • Configuring File Compression
  • Managing Printers
  • Overview of SkyDrive
Module 8: Securing Windows 8 Desktops Lessons
  • Authentication and Authorization in Windows 8
  • Implementing GPOs
  • Securing Data with EFS and BitLocker
  • Configuring User Account Control
Module 9: Configuring Applications Lessons
  • Install and Configure Applications
  • Managing Apps from the Windows Store
  • Configuring Internet Explorer Settings
  • Configuring Application Restrictions in the Enterprise
Module 10: Optimizing and Maintaining Windows 8 Client Computers Lessons
  • Optimizing the Performance of Windows 8
  • Managing the Reliability of Windows 8
  • Managing Windows 8 Updates
Module 11: Configuring Mobile Computing and Remote Access Lessons
  • Configuring Mobile Computers and Device Settings
  • Configuring VPN Access
  • Configuring Remote Desktop and Remote Assistance
  • Overview of DirectAccess
Module 12: Implementing Hyper-V
  • Overview of Hyper-V
  • Creating Virtual Machines
  • Managing Virtual Hard Disks
  • Managing Snapshots
Module 13: Troubleshooting and Recovering Windows 8
  • Backing Up and Restoring Files in Windows 8
  • Recovery Options in Windows 8
Module 1: Introduction to Azure
This module introduces cloud solutions in general and then focuses on the services that Azure offers. The module goes on to describe the portals that you can use to manage Azure subscriptions and services before introducing the Azure PowerShell modules and Azure Command Line Interface (CLI) as scripting technologies for managing Azure. Finally, the module provides explanations and guidance for the use of Azure Resource Manager.
Lessons
  • Cloud Technology Overview
  • Overview of Azure
  • Managing Azure with the Azure portal
  • Managing Azure with Windows PowerShell
  • Overview of Azure Resource Manager
  • Azure management services
Lab : Managing Microsoft Azure
  • Use the Azure portals.
  • Use Azure Resource Manager features via the Azure portal.
  • Use Azure PowerShell.
After completing this module, students will be able to:
  • Identify suitable apps for the cloud.
  • Identify services and capabilities that Microsoft Azure provides.
  • Use Azure portals to manage Azure services and subscriptions.
  • Use Windows PowerShell to manage Azure services and subscriptions.
  • Use Azure Resource Manager to manage Azure resources.
  • Use Azure Resource Manager to manage Azure resources.
Module 2: Implement and Manage Virtual Networks
networkingThis module explains how virtual networking provides the glue that brings together VMs, web apps, and storage to enable you to publish a service onto the Internet
Lessons
  • Overview of Azure networking
  • Implementing and managing Azure virtual networks
  • Configuring Azure virtual networks
  • Configuring Azure virtual network connectivity
  • Overview of Azure classic networking
Lab : Using a deployment template to implement Azure virtual networks
  • Creating an Azure virtual network by using a deployment template
  • Creating a virtual network by using PowerShell
  • Configure virtual networks
Lab : Configuring connectivity between classic and Azure Resource Manager virtual networks
  • Using a PowerShell script to connect a classic VNet and an Azure Resource Manager VNet
  • Configuring a point-to-site VPN
  • Validating virtual network connectivity
After completing this module, students will be able to:
  • Plan virtual networks in Azure.
  • Explain how to implement and manage virtual networks.
  • Use a deployment template and Azure PowerShell to implement Azure virtual networks.
  • Explain how to configure an Azure virtual network.
  • Describe Azure classic networking.
Module 3: Implement Virtual Machines
This module introduces the fundamentals of Azure Virtual Machines, and discusses the different ways in which you can deploy and manage them.
Lessons
  • Overview of Azure Resource Manager virtual machines
  • Planning for Azure virtual machines
  • Deploying Azure Resource Manager virtual machines
  • Authoring Azure Resource Manager templates
  • Overview of classic virtual machines
Lab : Creating Azure Resource Manager virtual machines in Azure
  • Creating virtual machines by using the Azure portal and Azure PowerShell
  • Validating virtual machine creation
Lab : Deploying Azure Resource Manager virtual machines by using Azure Resource Manager templates
  • Using Visual Studio and an Azure Resource Manager template to deploy virtual machines
  • Using Azure PowerShell and an Azure Resource Manager template to deploy virtual machines
After completing this module, students will be able to:
  • Describe main characteristics of Azure Resource Manager virtual machines.
  • Plan for Azure Virtual Machines.
  • Deploy Azure Resource Manager virtual machines.
  • Author Azure Resource Manager templates.
  • Explain IaaS v1 virtual machines.
Module 4: Managing Virtual Machines
This module explains how to manage virtual machines including configuring virtual machines, configuring virtual machine disks, and managing and monitor virtual machines.
Lessons
  • Configuring Virtual Machines
  • Configuring virtual machine disks
  • Managing and monitoring Azure virtual machines
  • Managing classic virtual machines
Lab : Managing Azure virtual machines
  • Configuring availability
  • Implementing desired state configuration (DSC)
  • Implementing storage space–based volumes
After completing this module, students will be able to:
  • Configure virtual machines.
  • Configure virtual machine disks.
  • Manage and monitor virtual machines
Module 5: Implementing Azure App services
This module explains the different types of apps that you can create by using the Microsoft Azure App Service, and how you can select an App Service plan and deployment method for apps in Microsoft Azure. Students will learn how to use Microsoft Visual Studio, File Transfer Protocol (FTP) clients, and Azure PowerShell to deploy web and mobile apps to Azure. Additionally, they will learn how to configure web apps and use the Azure WebJobs feature to schedule tasks, monitor the performance of web apps, and create and configure mobile apps. Lastly, they will learn how to use Azure Traffic Manager to distribute requests between two or more app services.
Lessons
  • Introduction to App Service
  • Planning app deployment in App Service
  • Implementing and maintaining web apps
  • Configuring web apps
  • Monitoring web apps and WebJobs
  • Implementing mobile apps
  • Traffic Manager
Lab : Implementing websites
  • Creating web apps
  • Deploying a web app
  • Managing web apps
  • Implementing Traffic Manager
After completing this module, students will be able to:
  • Explain the different types of apps that you can create by using the Microsoft Azure App Service.
  • Select an App Service plan and deployment method for apps in Microsoft Azure.
  • Use Microsoft Visual Studio, File Transfer Protocol (FTP) clients, and Azure PowerShell to deploy web and mobile apps to Azure.
  • Configure web apps and use the Azure WebJobs feature to schedule tasks.
  • Monitor the performance of web apps.
  • Create and configure mobile apps.
  • Use Azure Traffic Manager to distribute requests between two or more app services.
Module 6: Planning and implementing storage, backup, and recovery services
This module explains how to plan and implement storage, backup, and recovery services. Students will learn how to choose appropriate Microsoft Azure Storage options to address business needs. This module also explains how to implement and manage Azure Storage, and students will learn how to improve web-application performance by implementing Azure Content Delivery Networks (CDNs). Lastly, they will learn how to protect on-premises systems and Azure VMs by using Azure Backup, and they will be able to describe Azure Site Recovery capabilities
Lessons
  • Planning Storage
  • Implementing and Managing Storage
  • Implementing Azure Content Delivery Networks
  • Implementing Azure Backup
  • Planning for and implementing Azure Site Recovery
Lab : Planning and implementing Azure storage
  • Creating and configuring Azure storage
  • Using Azure file storage
  • Protecting data with Microsoft Azure Backup
After completing this module, students will be able to:
  • Choose appropriate Microsoft Azure Storage options to address business needs.
  • Implement and manage Azure Storage.
  • Improve web application performance by implementing Azure content delivery networks.
  • Protect on-premises systems and Azure virtual machines (VMs) by using Azure Backup.
  • Describe Azure Site Recovery capabilities.
Module 7: Planning and implementing Azure SQL Database
This module explains how to plan and implement Azure SQL Database, and identify relational database services in Microsoft Azure. This module explains how to provision, configure, and manage the Azure SQL Database data-management service. Students will learn how to configure security for Azure SQL Database and monitor Azure SQL Database, as well as manage data recovery and availability for Azure SQL Database
Lessons
  • Planning and deploying Azure SQL Database
  • Implementing and managing Azure SQL Database
  • Managing Azure SQL Database security
  • Monitoring Azure SQL Database
  • Managing Azure SQL Database Business Continuity
Lab : Planning and implementing Azure SQL Database
  • Creating, securing, and monitoring an Azure SQL Database
  • Migrating a Microsoft SQL Server database to Azure SQL Database
  • Restoring a database
After completing this module, students will be able to:
  • Identify relational database services in Microsoft Azure.
  • Provision, configure, and manage Azure SQL Database.
  • Configure security for Azure SQL Database.
  • Monitor Azure SQL Database.
  • Manage data recovery and availability for Azure SQL Database.
Module 8: Implementing PaaS cloud services
This module explains how to plan and deploy Azure Cloud Services. This module also explains how to manage and maintain Azure Cloud Services.
Lessons
  • Planning and Deploying PaaS Cloud Services
  • Managing and maintaining cloud services
Lab : Implementing PaaS cloud services
  • Deploying a PaaS cloud service
  • Configuring deployment slots and Remote Desktop Protocol (RDP)
  • Monitoring cloud services
After completing this module, students will be able to:
  • Plan and deploy Azure Cloud Services.
  • Explain how to manage and maintain Azure Cloud Services.
Module 9: Implementing Azure Active Directory
This module explains how to implement Azure AD. Students will learn how to create and manage Azure AD tenants. This module also explains how to configure single sign-on (SSO) for cloud applications and resources, and implement Azure Role-Based Access Control (RBAC) for cloud resources. Lastly, this module explains the functionality of Azure AD Premium, and how to implement Azure Multi-Factor Authentication
Lessons
  • Creating and managing Azure AD tenants
  • Configuring application and resource access with Azure AD
  • Overview of Azure AD Premium
Lab : Implementing Azure AD
  • Administering Active AD
  • Configuring SSO
  • Configuring Multi-Factor Authentication
  • Configuring SSO from a Windows 10–based computer that is joined to Azure AD
After completing this module, students will be able to:
  • Create and manage Azure AD tenants.
  • Configure single sign-on (SSO) for cloud applications and resources, and implement Azure Role-Based Access Control (RBAC) for cloud resources.
  • Explain the functionality of Azure AD Premium and implement Azure Multi-Factor Authentication.
Module 10: Managing Active Directory in a hybrid environment
This module explains how to manage Active Directory in a hybrid environment. Students will learn how to extend an on-premises Active Directory domain to Azure Infrastructure as a Service (IaaS) environments and synchronize user, group, and computer accounts between on-premises AD DS and Azure AD. This module also explains how to set up SSO by using federation between on-premises Active Directory and Azure AD.
Lessons
  • Extending an on-premises Active Directory domain to Azure IaaS
  • Implementing directory synchronization by using Azure AD Connect
  • Implementing federation
Lab : Implementing and managing Azure AD synchronization
  • Configuring directory synchronization
  • Synchronizing directories
After completing this module, students will be able to:
  • Extend an on-premises Active Directory domain to Azure IaaS environments.
  • Synchronize user, group, and computer accounts between on-premises AD DS and Azure AD.
  • Set up SSO by using federation between on-premises Active Directory and Azure AD.
Module 1: Installing and Configuring Servers Based on Windows Server 2012This module covers the installation and initial configuration and management of Windows Server 2012. It also explains how to configure remote management in Windows Server 2012.Lessons
  • Installing Windows Server 2012
  • Configuring Windows Server 2012
  • Configuring Remote Management for Windows Server 2012 Servers
Lab : Installing and Configuring Servers Based on Windows Server 2012
  • Install Windows Server 2012 Server Core
  • Configure a Computer Running a Server Core Installation of Windows Server 2012
  • Configure Remote Management for Servers Running Windows Server 2012
After completing this module, students will be able to:
  • Install Windows Server 2012.
  • Configure Windows Server 2012.
  • Configure remote management for Windows Server 2012 servers.
Module 2: Monitoring and Maintaining Windows Server 2012 This module covers monitoring and maintenance tasks when managing Windows Server 2012. It also explains the options for backup in Windows Server 2012 including Windows Server Backup and Microsoft Online Backup. It also describes server and data recovery options. Lessons
  • Monitoring Windows Server 2012
  • Implementing Windows Server Backup
  • Implementing Server and Data Recovery
Lab : Monitoring and Maintaining Windows Server 2012
  • Configuring Centralized Monitoring for Windows Server 2012 Servers
  • Backing Up Windows Server 2012
  • Restoring Files by Using Windows Server Backup
  • Implementing Microsoft Online Backup and Restore
After completing this module, students will be able to:
  • Monitor Windows Server 2012.
  • Implement Windows Server Backup.
  • Restore data and servers by using Windows Server Backup.
Module 3: Managing Windows Server 2012 by Using Windows PowerShell 3.0This module explains the features and functionality of Windows PowerShell 3.0. It also describes managing Windows Server 2012 servers and AD DS with Windows PowerShell.Lessons
  • Overview of Windows PowerShell 3.0
  • Using Windows PowerShell 3.0 to Manage AD DS
  • Managing Servers by Using Windows PowerShell 3.0
Lab : Managing Servers Running Windows Server 2012 by Using Windows PowerShell 3.0
  • Introduction to Windows PowerShell 3.0
  • Managing AD DS by Using Windows PowerShell 3.0
  • Managing Servers by Using Windows PowerShell 3.0
After completing this module, students will be able to:
  • Describe the Windows PowerShell command-line interface.
  • Use Windows PowerShell to manage Active Directory Domain Service (AD DS).
  • Manage servers by using Windows PowerShell.
Module 4: Managing Storage for Windows Server 2012 This modules describes new storage features in Windows Server 2012 such as data deduplication, thin provisioning and trim storage, File Server Resource Manager, and Resilient File System (ReFS). The module also describes iSCSI and storage spaces as well as how to implement BranchCache. Lessons
  • New Features in Windows Server 2012 Storage
  • Configuring iSCSI Storage
  • Configuring Storage Spaces in Windows Server 2012
  • Configuring BranchCache in Windows Server 2012
Lab : Managing Storage for Servers Based on Windows Server 2012
  • Configuring iSCSI Storage
  • Configuring a Redundant Storage Space
Lab : Implementing BranchCache
  • Performing Initial Configuration Tasks for BranchCache
  • Configuring BranchCache Client Computers
  • Configuring BranchCache on the Branch Server
After completing this module, students will be able to:
  • Describe the new features in Windows Server 2012 storage.
  • Configure iSCSI storage.
  • Configure storage spaces.
  • Configure BranchCache.
Module 5: Implementing Network Services This module describes the new features in DNS and DHCP in Windows Server 2012. It also explains how to implement IP Address Management(IPAM) and Network Access Protection (NAP) with VPN, IPsec, DHCP, and 802.1x. Lessons
  • Implementing DNS and DHCP Enhancements
  • Implementing IP Address Management
  • NAP Overview
  • Implementing NAP
Lab : Implementing Network Services
  • Configuring New Features in DNS and DHCP
  • Configuring IP Address Management
  • Configuring NAP
  • Verifying the NAP Deployment
After completing this module, students will be able to:
  • Implement DHCP and DNS enhancements.
  • Implement IP address management.
  • Describe NAP.
  • Implement NAP.
Module 6: Implementing DirectAccessThis module describes the new features and functionality with DirectAccess in Windows Server 2012. It also explains how to implement and configure various components of DirectAccess such as AD DS and DNS. It also discusses the Name Resolution Policy table (NRPT) and the client-side requirements for Windows 7 and Windows 8.Lessons
  • Overview of DirectAccess
  • Installing and Configuring DirectAccess Components
Lab : Implementing DirectAccess
  • Configuring the DirectAccess Infrastructure
  • Configuring the DirectAccess Clients
  • Verifying the DirectAccess Configuration
After completing this module, students will be able to:
  • Describe the DirectAccess functionality in Windows Server 2012 and Windows 8.
  • Install and configure DirectAccess in Windows Server 2012 and Windows 8.
Module 7: Implementing Failover ClusteringThis module describes new features and functionality in Failover Clustering in Windows Server 2012. It also explains how to implement Failover Clustering and how to configure specific server roles in a cluster, such as a File Server. It also explains new maintenance features such as Cluster Aware Updating (CAU).Lessons
  • Overview of Failover Clustering
  • Implementing a Failover Cluster
  • Configuring Highly-Available Applications and Services on a Failover Cluster
  • Maintaining a Failover Cluster
  • Implementing a Multi-Site Failover Cluster
Lab : Implementing Failover Clustering
  • Configuring a Failover Cluster
  • Deploying and Configuring a Highly-Available File Server
  • Validating the Deployment of the Highly-Available File Server
  • Configuring Cluster-Aware Updating on the Failover Cluster
After completing this module, students will be able to:
  • Describe Failover Clustering.
  • Implement a failover cluster.
  • Configure highly-available applications and services.
  • Maintain a failover cluster.
  • Implement a multi-site failover cluster.
Module 8: Implementing Hyper-V This module explains how to configure Hyper-V and Hyper-V storage options in Windows Server 2012. It also describes networking features and various feature options and requirements in Hyper-V 3.0 as well as how to configure virtual machines. Lessons
  • Configuring Hyper-V Servers
  • Configuring Hyper-V Storage
  • Configuring Hyper-V Networking
  • Configuring Hyper-V Virtual Machines
Lab : Implementing Server Virtualization with Hyper-V
  • Installing the Hyper-V Server Role
  • Configuring Virtual Networking
  • Creating and Configuring a Virtual Machine
After completing this module, students will be able to:
  • Configure Hyper-V servers.
  • Configure Hyper-V storage.
  • Configure Hyper-V networking.
  • Configure Hyper-V virtual machines.
Module 9: Implementing Failover Clustering with Hyper-VThis module explains how to make virtual machines highly available and how to implement virtual machines in a failover cluster deployed on the host. It also explains the movement of virtual machines on virtual machine storage. It also provides a high level overview of System Center Virtual Machine Manager (SCVMM) 2012.Lessons
  • Overview of the Integration of Hyper-V with Failover Clustering
  • Implementing Hyper-V Virtual Machines on Failover Clusters
  • Implementing Hyper-V Virtual Machine Movement
  • Managing Hyper-V Virtual Environments by Using System Center Virtual Machine Manager
Lab : Implementing Failover Clustering with Hyper-V
  • Configuring Hyper-V Replicas
  • Configuring a Failover Cluster for Hyper-V
  • Configuring a Highly-Available Virtual Machine
After completing this module, students will be able to:
  • Describe how Hyper-V integrates with failover clustering.
  • Implement Hyper-V virtual machines on failover clusters.
  • Implement Hyper-V virtual machine movement.
  • Manage a Hyper-V virtual environment by using VMM.
Module 10: Implementing Dynamic Access Control This module explains how to implement Dynamic Access Control (DAC) in Windows Server 2012. It also describes core DAC concepts such as claims, Central Access Rules, and policies and their implementation. Lessons
  • Overview of Dynamic Access Control
  • Planning for a Dynamic Access Control Implementation
  • Implementing and Configuring Dynamic Access Control
Lab : Implementing Dynamic Access Control
  • Planning the Dynamic Access Control Implementation and Preparing AD DS for Dynamic Access Control
  • Configuring User and Device Claims
  • Configuring Resource Properties and File Classifications
  • Configuring Central Access Rules and Policies
  • Validating and Remediating Access Control
After completing this module, students will be able to:
  • Describe Dynamic Access Control and its components.
  • Plan for Dynamic Access Control implementation.
  • Configure Dynamic Access Control.
Module 11: Implementing Active Directory Domain ServicesThis module explains the advanced implementation of Active Directory domain controllers in Windows Server 2012 such as server core deployments, read-only domain controllers (RODCs), and cloning. It also explains domain controller configuration, managed service accounts, Group Policy implementation, and maintenance tasks for AD DS.Lessons
  • Deploying AD DS Domain Controllers
  • Configuring AD DS Domain Controllers
  • Implementing Service Accounts
  • Implementing Group Policy in AD DS
  • Maintaining AD DS
Lab : Implementing AD DS
  • Deploying a Read-Only Domain Controller
  • Troubleshooting Group Policy
  • Implementing Service Accounts in AD DS
  • Maintaining AD DS
After completing this module, students will be able to:
  • Deploy domain controllers.
  • Configure domain controllers.
  • Implement service accounts.
  • Implement Group Policy.
  • Maintain AD DS.
Module 12: Implementing Active Directory Federation ServicesThis module explains Active Directory Federation Services (AD FS) and how it can be used to address various organizational and business identity federation services and scenarios. It also describes configuration of prerequisites and the deployment of the AD FS services. It also explain implementing AD FS to enable internal single sign on (SSO) in an organization and implementing AD FS to enable SSO between federated partners.Lessons
  • Overview of Active Directory Federation Services
  • Deploying Active Directory Federation Services
  • Implementing AD FS for a Single Organization
  • Deploying AD FS in a Business to Business Federation Scenario
Lab : Implementing AD FS
  • Configuring AD FS Prerequisites
  • Installing and Configuring AD FS
  • Configuring AD FS for a Single Organization
  • Configuring AD FS for Federated Business Partners
After completing this module, students will be able to:
  • Describe the identity-federation business scenarios, and how you can use AD FS to address the scenarios.
  • Configure the AD FS prerequisites, and deploy the AD FS services.
Module 1: Deploying and Maintaining Server Images This module explains the functionality of Windows Deployment Services, and explains how to use Windows Deployment Services tools to perform lite-touch deployments. Lessons
  • Overview of Windows Deployment Services
  • Implementing Deployment with Windows Deployment Services
  • Administering Windows Deployment Services
Lab : Using Windows Deployment Services to Deploy Windows Server 2012
  • Installing and Configuring Windows Deployment Services
  • Creating Operating System Images with Windows Deployment Services
  • Configuring Custom Computer Naming
  • Deploying Images with Windows Deployment Services
After completing this module, students will be able to:
  • Describe the important features and functionality of Windows Deployment Services.
  • Configure Windows Deployment Services in Windows Server 2012.
  • Perform deployments with Windows Deployment Services.
Module 2: Configuring and Troubleshooting Domain Name System This module explains how the Domain Name System (DNS) is the foundation name service in Windows Server 2012. It provides name resolution, and enables DNS clients to locate network services, such as AD DS domain controllers, global catalog servers, and messaging servers. If you configure your DNS infrastructure poorly, or it is not working correctly, these important network services will be inaccessible to your network servers and clients. Consequently, it is vital that you understand how to deploy, configure, manage, and troubleshoot this critical service. Lessons
  • Installing the DNS Server Role
  • Configuring the DNS Server Role
  • Configuring DNS Zones
  • Configuring DNS Zone Transfers
  • Managing and Troubleshooting DNS
Lab : Configuring and Troubleshooting DNS
  • Configuring DNS Resource Records
  • Configuring DNS Conditional Forwarding
  • Configuring DNS Conditional Forwarding
  • Troubleshooting DNS
After completing this module, students will be able to:
  • Install the DNS server role.
  • Configure the DNS server role.
  • Create and configure DNS zones.
  • Configure DNS zone transfers.
  • Manage and troubleshoot DNS.
Module 3: Maintaining Active Directory Domain ServicesThis module explains the new features, such as virtualized domain controller cloning, recent features like read-only domain controllers (RODCs), and a host of other features and tools that you can use in the AD DS environment.Lessons
  • Overview of AD DS
  • Implementing Virtualized Domain Controllers
  • Implementing RODC
  • Administering AD DS
  • Managing the AD DS Database
Lab : Maintaining AD DS
  • Installing and Configuring a RODC
  • Configuring AD DS snapshots
  • Configuring the Active Directory Recycle Bin
After completing this module, students will be able to:
  • Explain the general structure of AD DS.
  • Implement virtualized domain controllers.
  • Implement RODCs.
  • Administer AD DS.
  • Manage the AD DS database.
Module 4: Managing User and Service Accounts This module explains how to manage large groups of user accounts, explain the different options available for providing adequate password security for accounts in your environment, and show you how to configure accounts to provide authentication for system services and background processes. Lessons
  • Automating User Account Management
  • Configuring Password-Policy and User-Account Lockout Settings
  • Configuring Managed Service Accounts
Lab : Managing User and Service Accounts
  • Configuring Password-Policy and Account-Lockout Settings
  • Creating and Associating a Managed Service Account
After completing this module, students will be able to:
  • Automate user account creation.
  • Configure password-policy and account-lockout settings.
  • Configure managed service accounts.
Module 5: Implementing a Group Policy Infrastructure This module explains Group Policy is, how it works, and how best to implement it in your organization. Lessons
  • Introducing Group Policy
  • Implementing and Administering Group Policy Objects (GPOs)
  • Group Policy Scope and Group Policy Processing
  • Troubleshooting the Application of GPOs
Lab : Implementing a Group Policy Infrastructure
  • Creating and Configuring GPOs
  • Managing GPO Scope
  • Verifying GPO Application
  • Managing GPOs
After completing this module, students will be able to:
  • Understand Group Policy.
  • Implement and administer GPOs.
  • Manage Group Policy scope.
  • Process Group Policy.
  • Troubleshoot the application of GPOs.
Module 6: Managing User Desktops with Group Policy This module explains how to configure Administrative Templates. Lessons
  • Implementing Administrative Templates
  • Configuring Folder Redirection and Scripts
  • Configuring Group Policy Preferences
  • Managing Software with Group Policy
Lab : Managing User Desktops with Group Policy
  • Implementing Settings by Using Group Policy Preferences
  • Configuring Folder Redirection
After completing this module, students will be able to:
  • Describe and implement Administrative Templates.
  • Configure folder redirection and scripts by using GPOs.
  • Configure GPO preferences.
  • Deploy software by using GPOs.
Module 7: Configuring and Troubleshooting Remote AccessThis module explains how to configure and secure your remote access clients by using network.Lessons
  • Configuring Network Access
  • Configuring Virtual Private Network (VPN) Access
  • Overview of Network Policies
  • Troubleshooting Routing and Remote Access
  • Configuring DirectAccess
Lab : Configuring Remote Access
  • Configuring a VPS Server
  • Configuring VPN Clients
Lab : Configuring DirectAccess
  • Configuring the DirectAccess Infrastructure
  • Configuring the DirectAccess Clients
  • Verifying the DirectAccess Configuration
After completing this module, students will be able to:
  • Configure network access.
  • Create and configure a VPN solution.
  • Describe the role of network policies.
  • Troubleshoot routing and remote access.
  • Configure DirectAccess.
Module 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role This module explains how to install, configure, and troubleshoot Network Policy Server (NPS). Lessons
  • Installing and Configuring a NPS
  • Configuring Remote Authentication Dial-In User Service (RADIUS) Clients and Servers
  • NPS Authentication Methods
  • Monitoring and Troubleshooting a NPS
Lab : Installing and Configuring a Network Policy Server
  • Installing and Configuring NPS to Support RADIUS
  • Configuring and Testing a RADIUS Client
After completing this module, students will be able to:
  • Install and configure NPS.
  • Configure RADIUS clients and servers.
  • Explain NPS authentication methods.
  • Monitor and troubleshoot NPS.
Module 9: Implementing Network Access ProtectionThis module explains how to create customized health requirement policies to validate computer health before allowing access or communication with NAP.Lessons
  • Overview of Network Access Protection
  • Overview of NAP Enforcement Processes
  • Configuring NAP
  • Monitoring and Troubleshooting NAP
Lab : Implementing NAP
  • Configuring NAP Components
  • Configuring VPN Access
  • Configuring the Client Settings to Support NAP
After completing this module, students will be able to:
  • Describe how NAP can help protect your network.
  • Describe the various NAP enforcement processes.
  • Configure NAP.
  • Monitor and troubleshoot NAP.
Module 10: Optimizing File ServicesThis module explains how to use File Server Resource Manager (FSRM) to place quotas on storage volumes, screen files and folders, generate comprehensive storage reports, control the file classification infrastructure, and use file management tasks to perform scheduled actions on sets of files.Lessons
  • Overview of FSRM
  • Using FSRM to Manage Quotas, File Screens, and Storage Reports
  • Implementing Classification and File Management Tasks
  • Overview of Distributed File System (DFS)
  • Configuring DFS Namespaces
  • Configuring and Troubleshooting Distributed File System Replication (DFS-R)
Lab : Configuring Quotas and File Screening Using FSRM
  • Configuring FSRM Quotas
  • Configuring File Screening and Storage Reports
Lab : Implementing DFS
  • Installing the DFS Role Service
  • Configuring a DFS Namespace
  • Configuring DFS-R
After completing this module, students will be able to:
  • Describe FSRM.
  • Use FSRM to manage quotas, file screens, and storage reports.
  • Implement classification and file management tasks.
  • Describe DFS.
  • Configure DFS namespaces.
  • Configure and troubleshoot DFS Replication.
Module 11: Configuring Encryption and Advanced Auditing This module describes how to use Windows Server 2012 tools to help you to provide increased file system security on your servers. Lessons
  • Encrypting Files by Using Encrypting File System
  • Configuring Advanced Auditing
Lab : Configuring Encryption and Advanced Auditing
  • Encrypting and Recovering Files
  • Configuring Advanced Auditing
After completing this module, students will be able to:
  • Encrypt files by using Encrypting File System (EFS).
  • Configure advanced auditing.
Module 12: Implementing Update ManagementThis module introduces key features of the Windows Server Update Services (WSUS) server role.Lessons
  • Overview of WSUS
  • Deploying Updates with WSUS
Lab : Implementing Update Management
  • Implementing the WSUS Server Role
  • Configuring Update Settings
  • Approving and Deploying an Update by Using WSUS
After completing this module, students will be able to:
  • Describe the role of WSUS.
  • Deploy updates with WSUS.
Module 13: Monitoring Windows Server 2012 This module explains how to improve performance using performance monitoring tools to identify components that require additional tuning and troubleshooting. Lessons
  • Monitoring Tools
  • Using Performance Monitor
  • Monitoring Event Logs
Lab : Monitoring Windows Server 2012
  • Establishing a Performance Baseline
  • Identifying the Source of a Performance Problem
  • Viewing and Configuring Centralized Event Logs
After completing this module, students will be able to:
  • Describe the monitoring tools for Windows Server 2012.
  • Use Performance Monitor to view and analyze performance statistics of programs that are running on your servers.
  • Monitor event logs to view and interpret the events that occurred.
Module 1: Implementing Advanced Network Services This module describes how to configure advanced features in the Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) with Windows Server 2012, and it covers IP Address Management (IPAM).Lessons
  • Configuring Advanced DHCP Features
  • Configuring Advanced DNS Settings
  • Implementing IPAM
Lab : Implementing Advanced Network Services
  • Configuring Advanced DHCP Settings
  • Configuring Advanced DNS Settings
  • Configuring IPAM
After completing this module, students will be able to:
  • Configure advanced DNS services.
  • Configure advanced DHCP services.
  • Implement IPAM.
Module 2: Implementing Advanced File Services This module describes how to configure and manage iSCSI and BranchCache, and how to implement Windows 2012 features that optimize storage utilization, such as File Server Resource Manager, file classification, and data duplication. Lessons
  • Configuring iSCSI Storage
  • Configuring BranchCache
  • Optimizing Storage Usage
Lab : Implementing Advanced File Services
  • Configuring iSCSI Storage
  • Configuring the File Classification Infrastructure
Lab : Implementing BranchCache
  • Configuring the Main Office Servers for BranchCache
  • Configuring the Branch Office Servers for BranchCache
  • Configuring Client Computers for BranchCache
  • Monitoring BranchCache
After completing this module, students will be able to:
  • Configure iSCSI storage.
  • Configure BranchCache.
  • Optimize storage usage.
Module 3: Implementing Dynamic Access Control This module describes how to plan and implement Dynamic Access Control. Lessons
  • Overview of Dynamic Access Control
  • Planning for Dynamic Access Control
  • Deploying Dynamic Access Control
Lab : Implementing Dynamic Access Control
  • Planning the Dynamic Access Control Implementation
  • Configuring User and Device Claims
  • Configuring Resource Property Definitions
  • Configuring Central Access Rules and Central Access Policies
  • Validating and Remediating Dynamic Access Control
  • Implementing New Resource Policies
After completing this module, students will be able to:
  • Plan for Dynamic Access Control.
  • Deploy Dynamic Access Control.
Module 4: Implementing Distributed Active Directory Domain Services DeploymentsThis module describes the components of a highly complex AD DS deployment, which includes implementing a distributed AD DS deployment and configuring AD DS forest trusts.Lessons
  • Overview of Distributed AD DS Deployments
  • Deploying a Distributed AD DS Environment
  • Configuring AD DS Trusts
Lab : Implementing Complex AD DS Deployments
  • Implementing Child Domains in AD DS
  • Implementing Forest Trusts
After completing this module, students will be able to:
  • Describe and understand distributed AD DS deployments.
  • Implement a distributed AD DS deployment.
  • Configure AD DS trusts.
Module 5: Implementing Active Directory Domain Services Sites and ReplicationThis module describes how replication works in a Windows Server 2012 AD DS environment, including how to configure AD DS sites so that you can optimize AD DS network traffic and how to configure and monitor AD DS replication.Lessons
  • Overview of AD DS Replication
  • Configuring AD DS Sites
  • Configuring and Monitoring AD DS Replication
Lab : Implementing AD DS Sites and Replication
  • Modifying the Default Site
  • Creating Additional Sites and Subnets
  • Configuring AD DS Replication
After completing this module, students will be able to:
  • Describe AD DS replication.
  • Configure AD DS sites.
  • Configure and monitor AD DS replication.
Module 6: Implementing Active Directory Certificate ServicesThis module describes the Public Key Infrastructure (PKI) components and concepts. It covers implementing a certification authority infrastructure, planning and implementing a certificate template deployment using an AD CS certification authority, and planning and implementing certificate distribution and revocation.Lessons
  • PKI Overview
  • Deploying CAs
  • Deploying and Configuring CA Hierarchy
  • Deploying and Managing Certificate Templates
  • Implementing Certificate Distribution and Revocation
  • Managing Certificate Recovery
Lab : Deploying and Managing Certificates
  • Configuring Certificate Templates
  • Configuring Certificate Enrollment
  • Configuring Certificate Revocation
  • Configuring Key Recovery
After completing this module, students will be able to:
  • Describe the PKI.
  • Deploy certification authorities.
  • Deploy and configure the CA hierarchy.
  • Deploy and manage certificate templates.
  • Implement certificate distribution and revocation.
  • Manage certificate recovery.
Module 7: Implementing Active Directory Rights Management ServicesThis module describes the AD RMS features and functionality. It explains how to use AD RMS to configure content protection, and deploy and manage an AD RMS infrastructure.Lessons
  • AD RMS Overview
  • Deploying and Managing an AD RMS Infrastructure
  • Configuring AD RMS Content Protection
  • Configuring External Access to AD RMS
Lab : Implementing AD RMS
  • Installing and Configuring AD RMS
  • Configuring AD RMS Templates
  • Implementing the AD RMS Trust Policies
  • Verifying the AD RMS Deployment
After completing this module, students will be able to:
  • Describe AD RMS.
  • Deploy and manage an AD RMS infrastructure.
  • Configure AD RMS content protection.
  • Configure external access to AD RMS.
Module 8: Implementing Active Directory Federation ServicesThis module provides identity federation business scenarios, and it describes how to use AD FS to address such scenarios. It explains how to configure AD FS prerequisites, deploy AD FS services, enable single sign-on (SSO) for an organization, and enable SSO between federated business partners.Lessons
  • Overview of AD FS
  • Deploying AD FS
  • Implementing AD FS for a Single Organization
  • Deploying AD FS in a B2B Federation Scenario
Lab : Implementing AD FS
  • Configuring AD FS Prerequisites
  • Installing and Configuring AD FS
  • Configuring AD FS for a Single Organization
  • Configuring AD FS for Federated Business Partners
After completing this module, students will be able to:
  • Describe AD FS.
  • Deploy AD FS.
  • Implement AD FS for a single organization.
  • Deploy AD FS in a business-to-business federation scenario.
Module 9: Implementing Network Load BalancingThis module describes how to plan and implement NLB. It will cover managing and configuring an NLB cluster and validating high availability for an NLB cluster.Lessons
  • Overview of NLB
  • Configuring an NLB Cluster
  • Planning an NLB Implementation
Lab : Implementing Network Load Balancing
  • Implementing a Network Load Balancing Cluster
  • Configuring and Managing the NLB Cluster
  • Validating High Availability for the NLB Cluster
After completing this module, students will be able to:
  • Configure an NLB cluster.
  • Plan an NLB implementation.
Module 10: Implementing Failover Clustering This module describes the failover clustering features in Windows Server 2012. It explains how to implement a failover cluster, configure highly available applications and services on a failover cluster, maintain a failover cluster, and use new maintenance features such as Cluster Aware Updating (CAU). It will also cover how to implement multi-site failover clustering. Lessons
  • Overview of Failover Clustering
  • Implementing a Failover Cluster
  • Configuring Highly Available Applications and Services on a Failover Cluster
  • Maintaining a Failover Cluster
  • Implementing a Multi-Site Failover Cluster
Lab : Implementing Failover Clustering
  • Configuring a Failover Cluster
  • Deploying and Configuring a Highly Available File Server
  • Validating the Deployment of the Highly Available File Server
  • Configuring Cluster-Aware Updating on the Failover Cluster
After completing this module, students will be able to:
  • Implement a failover cluster.
  • Configure highly available applications and services on a failover cluster.
  • Maintain a failover cluster.
  • Implement a multi-site failover cluster.
Module 11: Implementing Failover Clustering with Hyper-V This module describes the options for making virtual machines highly available. It explains how to implement virtual machines in a failover cluster that was deployed on a host and how you can move a virtual machine or its storage. In addition, it provides a high-level overview of System Center Virtual Machine Manager (SCVMM) 2012. Lessons
  • Overview of Integrating Hyper-V with Failover Clustering
  • Implementing Hyper-V Virtual Machines on Failover Clusters
  • Implementing Hyper-V Virtual Machine Movement
  • Managing Hyper-V Virtual Environments by Using VMM
Lab : Implementing Failover Clustering with Hyper-V
  • Configuring Hyper-V Replicas
  • Configuring a Failover Cluster for Hyper-V
  • Configuring a Highly Available Virtual Machine
After completing this module, students will be able to:
  • Describe Hyper-V integration with failover clustering.
  • Implement Hyper-V virtual machines on failover clusters.
  • Implement Hyper-V virtual machine movement.
  • Manage Hyper-V virtual environments by using VMM.
Module 12: Implementing Disaster Recovery This module describes considerations for implementing a disaster recovery solution, and how to plan and implement a backup solution for Windows Server 2012. In addition, it explains how to plan and implement server and data recovery using Windows Server backup and Microsoft Online backup. Lessons
  • Overview of Disaster Recovery
  • Implementing Windows Server Backup
  • Implementing Server and Data Recovery
Lab : Implementing Windows Server Backup and Restore
  • Backing Up Data on a Windows Server 2012 Server
  • Restoring Files Using Windows Server Backup
  • Implementing Microsoft Online Backup and Restore
After completing this module, students will be able to:
  • Describe disaster recovery.
  • Implement Windows Server backup using Windows Server backup and Microsoft Online backup.
  • Implement server and data recovery.
Module 1: Planning Server Upgrade and MigrationThis module explains how to plan a server upgrade and migration strategy.Lessons
  • Upgrade and Migration Considerations
  • Creating a Server Upgrade and Migration Plan
  • Planning for Virtualization
Lab : Planning Server Upgrade and Migration
  • Planning a Server Upgrade and Migration Strategy
After completing this module, students will be able to:
  • Analyze upgrade and migration considerations.
  • Create a server upgrade and migration plan.
  • Plan for virtualization.
Module 2: Planning and Implementing a Server Deployment InfrastructureThis module explains how to design an automated server installation strategy and plan and implement a server deployment infrastructure.Lessons
  • Selecting an Appropriate Server Imaging Strategy
  • Selecting a Deployment Automation Strategy
  • Implementing an Automated Deployment Strategy
Lab : Planning and Implementing a Server Deployment Infrastructure
  • Planning an Automated Server Installation and Deployment Strategy
  • Preparing the Windows Server Image
  • Deploying Windows Server
After completing this module, students will be able to:
  • Describe how to select an appropriate server imaging strategy.
  • Describe how to select a deployment automation strategy.
  • Implement an automated deployment strategy.
Module 3: Designing and Maintaining an IP Configuration and Address Management SolutionThis module explains how to design and maintain IP address management (IPAM) and a Dynamic Host Configuration Protocol (DHCP) solution.Lessons
  • Designing and Implementing DHCP
  • Planning and Implementing DHCP Scopes
  • Planning and Implementing an IPAM Provisioning Strategy
Lab : Designing and Maintaining an IP Configuration and IP Address Management Solution
  • Designing an IP Addressing Scheme for Contoso (Optional)
  • Planning DHCP to Support Your Proposed Scheme
  • Planning an IPAM Deployment
  • Implementing DHCP and IPAM
After completing this module, students will be able to:
  • Design and implement DHCP.
  • Plan DHCP scope configuration and options.
  • Design and implement an IPAM provisioning strategy.
Module 4: Designing and Implementing Name ResolutionThis module explains how to design a name resolution solution strategy.Lessons
  • Designing a DNS Server Implementation Strategy
  • Designing the DNS Namespace
  • Designing and Implementing DNS Zones
  • Designing and Configuring DNS Zone Replication and Delegation
  • Optimizing DNS Servers
  • Designing DNS for High Availability and Security
Lab : Designing and Implementing Name Resolution
  • Designing a DNS Name Resolution Strategy
  • Planning a DNS Server Placement Strategy
  • Planning DNS Zones and DNS Zone Replication
  • Implementing DNS
After completing this module, students will be able to:
  • Design a Domain Name System (DNS) server implementation strategy.
  • Design a DNS namespace.
  • Design and implement a DNS zone strategy.
  • Design and configure DNS zone replication.
  • Optimize the DNS server configuration.
  • Design DNS for high availability and security.
Module 5: Designing and Implementing an Active Directory Domain Services Forest and Domain InfrastructureThis module explains how to design and implement an AD DS forest and domain infrastructure.Lessons
  • Designing an AD DS Forest
  • Designing and Implementing AD DS Forest Trusts
  • Designing and Implementing AD DS Domains
  • Designing DNS Namespaces in AD DS Environments
  • Designing AD DS Domain Trusts
Lab : Designing and Implementing an AD DS Forest Infrastructure
  • Designing an AD DS Forest Infrastructure
  • Implementing AD DS Forest Trusts
Lab : Designing and Implementing an AD DS Domain Infrastructure
  • Designing an AD DS Domain Infrastructure
  • Implementing an AD DS Domain Infrastructure
After completing this module, students will be able to:
  • Design an AD DS forest.
  • Design and implement AD DS forest trusts.
  • Design and implement AD DS domains.
  • Design DNS namespaces in an AD DS environment.
  • Design and implement AD DS domain trusts.
Module 6: Designing and Implementing an OU Infrastructure and AD DS Permissions ModelThis module explains how to design and implement an organizational unit (OU) infrastructure and AD DS permissions model.Lessons
  • Planning the AD DS Administrative Tasks Delegation Model
  • Designing the OU Structure
  • Designing and Implementing an AD DS Group Strategy
Lab : Designing and Implementing an AD DS OU Infrastructure and AD DS Delegation Model
  • Designing an OU Infrastructure
  • Implementing the OU Design
  • Designing and Implementing an AD DS Permissions Model
After completing this module, students will be able to:
  • Plan an AD DS administrative tasks delegation model.
  • Design an OU structure.
  • Design and implement an AD DS group strategy.
Module 7: Designing and Implementing a Group Policy Object StrategyThis module explains how to design and implement a Group Policy Object (GPO) strategy.Lessons
  • Gathering the Information Required for a GPO Design
  • Designing and Implementing GPOs
  • Designing GPO Processing
  • Planning Group Policy Management
Lab : Designing and Implementing Group Policy Object Strategy
  • Designing a GPO Strategy
  • Implementing the GPO Design
After completing this module, students will be able to:
  • Gather information required for a GPO design.
  • Design and implement GPOs.
  • Design GPO processing.
  • Plan Group Policy management.
Module 8: Designing and Implementing an AD DS Physical TopologyThis module explains how to design an AD DS sites topology and a domain controller placement strategy.Lessons
  • Designing and Implementing AD DS Sites
  • Designing AD DS Replication
  • Designing the Placement of Domain Controllers
  • Virtualization Considerations for Domain Controllers
  • Designing Highly-Available Domain Controllers
Lab : Designing and Implementing an AD DS Physical Topology
  • Designing AD DS Sites and AD DS Replication
  • Planning the Placement of Domain Controllers
  • Implementing AD DS Sites and Domain Controllers
After completing this module, students will be able to:
  • Design and implement AD DS sites.
  • Design and configure AD DS replication.
  • Design domain controller placement.
  • Plan for virtualization of the domain controller role.
  • Design domain controller deployments for high availability.
Module 9: Planning and Implementing StorageThis module explains how to plan and implement storage.Lessons
  • Storage Considerations
  • Planning and Implementing iSCSI SANs
Lab : Planning and Implementing Storage
  • Planning a Storage Solution
  • Implementing Storage Services
After completing this module, students will be able to:
  • Plan for efficient storage.
  • Plan and implement an iSCSI storage area network.
Module 10: Planning and Implementing File ServicesThis module explains how to plan and implement file services.Lessons
  • Planning and Implementing a Distributed File System
  • Planning and Implementing BranchCache
  • Planning and Implementing Dynamic Access Control
Lab : Designing and Implementing File Services
  • Planning Data Access
  • Planning and Implementing Dynamic Access Control
After completing this module, students will be able to:
  • Plan and implement DFS.
  • Plan and implement BranchCache.
  • Plan and implement dynamic access control.
Module 11: Designing and Implementing Network Access ServicesThis module explains how to design and implement network access services.Lessons
  • Designing and Implementing Remote Access Services
  • Designing RADIUS Authentication by Using a Network Policy Server
  • Designing a Perimeter Network
  • Planning and Implementing DirectAccess
Lab : Designing and Implementing Network Access Services
  • Planning and Implementing a VPN Solution
  • Planning and Implementing a DirectAccess Solution
After completing this module, students will be able to:
  • Design and implement remote access services.
  • Design a Remote Authentication Dial-In User Service (RADIUS) solution.
  • Design a perimeter network.
  • Plan and implement DirectAccess.
Module 12: Designing and Implementing Network ProtectionThis module explains how to design and implement network protection.Lessons
  • Overview of Network Security Design
  • Identifying and Mitigating Common Network Security Threats
  • Designing and Implementing a Windows Firewall Strategy
  • Designing and Implementing a Network Access Protection Infrastructure
Lab : Designing and Implementing Network Protection
  • Designing a Windows Firewall Solution
  • Implementing a Windows Firewall Solution
  • Designing a NAP Solution
  • Implementing NAP with VPN Enforcement
After completing this module, students will be able to:
  • Describe the network security design process.
  • Describe how to identify and analyze network security threats.
  • Describe a Windows Firewall implementation.
  • Design Network Access Protection (NAP).
Module 1: Overview of Management in an Enterprise Data Center This module describes some of the changes and new requirements that organizations are experiencing in their data centers. The module then describes how you can use System Center 2012 to manage this environment. Lessons
  • Overview of the Enterprise Data Center
  • Overview of the Microsoft System Center 2012 Components
  • Considerations for Implementing an Enterprise Data Center
Lab : Considerations for Implementing an Enterprise Data Center
  • Planning the Secure Implementation of Services Within an Enterprise Data Center
After completing this module, students will be able to:
  • Describe the enterprise data center.
  • Describe how you can use System Center 2012 to manage the enterprise data center.
Module 2: Planning and Implementing a Server Virtualization Strategy This module introduces the Microsoft System Center 2012 components. You will see how they can integrate to enable you to configure, deploy, and manage a server virtualization environment. Later, you will review the planning steps and considerations for a Microsoft System Center 2012 - Virtual Machine Manager (VMM) deployment. Lessons
  • Planning a VMM Deployment
  • Planning and Implementing a Server Virtualization Host Environment
  • Planning and Implementing a Network Infrastructure for Virtualization
Lab : Planning and Implementing a Server Virtualization Strategy
  • Planning the Hyper-V Host Deployment
  • Configuring Hyper-V Host Groups
  • Configuring VMM Libraries
After completing this module, students will be able to:
  • Describe how you can use System Center 2012 to deploy and manage a virtualization environment.
  • Plan and implement a sever virtualization strategy by using Windows Server 2012 Hyper-V and VMM.
  • Deploy Hyper-V hosts, configure host groups, and implement VMM libraries.
Module 3: Planning and Implementing Networks and Storage for Virtualization This module describes the factors that you must consider when you are planning the storage and network infrastructure for your virtual environment, and details on how to deploy these components in Windows Server 2012 Hyper-V and VMM. Lessons
  • Planning a Storage Infrastructure for Virtualization
  • Implementing a Storage Infrastructure for Virtualization
  • Planning and Implementing a Network Infrastructure for Virtualization
Lab : Planning and Implementing Virtualization Networks and Storage
  • Planning a Storage Infrastructure for Virtualization
  • Planning a Network Infrastructure for Virtualization
  • Implementing a Storage Infrastructure for Virtualization
  • Implementing a Network Infrastructure for Virtualization
After completing this module, students will be able to:
  • Plan a storage infrastructure for server virtualization.
  • Implement a storage infrastructure for server virtualization.
  • Plan and implement a network infrastructure for server virtualization.
Module 4: Planning and Deploying Virtual Machines In this module, you will learn how to configure virtual machines, reusable profiles, and templates to aid in deployment. You also will review application specific workloads, and learn about the options for physical and virtual machine migrations. Lessons
  • Planning Virtual Machine Configuration
  • Preparing for Virtual Machine Deployments with VMM
  • Deploying Virtual Machines
Lab : Planning and Implementing a Virtual Machine Deployment and Management Strategy
  • Planning Physical-to-Virtual Server Conversions
  • Planning Virtual Machine and Service Templates
  • Configuring VMM Profiles and Templates
  • Deploying Virtual Machines by Using VMM Templates
After completing this module, students will be able to:
  • Plan virtual machine configurations.
  • Plan and configure the VMM profiles and templates that you can use to implement a VMM deployment.
  • Plan and implement a virtual machine deployment in VMM.
Module 5: Planning and Implementing a Virtualization Administration Solution This module will prepare you for designing an administrative model that you can use to manage virtualization using System Center 2012. You will see and use VMM, Microsoft System Center 2012 – Orchestrator (Orchestrator) and Microsoft System Center 2012 – App Controller (App Controller). Use these components to delegate administrative functions, plan for basic self-service, design and implement automation. The skills gained in this module are the foundation for the basic building blocks used to operate an IT infrastructure that is similar or equal to that of cloud computing. Lessons
  • Planning and Implementing Automation with System Center 2012
  • Planning and Implementing System Center 2012 Administration
  • Planning and Implementing Self-Service Options in System Center 2012
Lab : Planning and Implementing an Administration Solution for Virtualization
  • Configuring Process Automation in System Center
  • Planning Administrative Delegation and Self-Service in System Center 2012
  • Configuring Delegated Administration and Self-Service in VMM
After completing this module, students will be able to:
  • Plan automation of a virtual machine environment by using Orchestrator and System Center 2012 integration.
  • Plan a delegated administration model using VMM.
  • Plan self-service in a virtual machine environment by using VMM and App Controller.
Module 6: Planning and Implementing a Server Monitoring StrategyThis module explains how to use the monitoring tools included in Windows Server 2012 and Microsoft System Center 2012 – Operations Manager (Operations Manager).Lessons
  • Planning Monitoring in Windows Server 2012
  • Overview of System Center Operations Manager
  • Planning and Configuring Management Packs
  • Planning and Configuration Notifications and Reporting
  • Configuring Integration with VMM
Lab : Implementing a Server Monitoring Strategy
  • Configuring Server Monitoring Using Windows Server 2012
  • Implementing the Microsoft System Center 2012 - Operations Manager Agent
  • Configuring Operations Manager Monitoring Components
After completing this module, students will be able to:
  • Plan monitoring in Windows Server 2012.
  • Describe Operations Manager.
  • Plan the configuration of management packs.
  • Plan the configuration of notifications and reporting.
  • Configure integration of Operations Manager and VMM.
Module 7: Planning and Implementing High Availability for File Services and Applications This module explains how to plan and implement high availability for file services and applications. Lessons
  • Planning and Implementing Storage Spaces
  • Planning and Implementing Distributed File System (DFS)
  • Planning and Implementing Network Load Balancing (NLB)
Lab : Planning and Implementing High Availability for File Services and Applications
  • Planning a High Availability Strategy for File Services
  • Planning a High Availability Strategy for Web Applications
  • Implementing a High Availability Solution for File Storage
  • Implementing a High Availability Solution by Using NLB
After completing this module, students will be able to:
  • Explain how to plan and implement Storage Spaces.
  • Explain how to plan and implement DFS.
  • Explain how to plan and implement NLB.
  • Explain how to plan and implement high availability for file services and applications.
Module 8: Planning and Implementing a High Availability Infrastructure Using Failover ClusteringThis module explains how to plan and implement failover clustering.Lessons
  • Planning an Infrastructure for Failover Clustering
  • Implementing Failover Clustering
  • Integrating Failover Clustering with Server Virtualization
  • Planning a Multisite Failover Cluster
Lab : Planning and Implementing a High Availability Infrastructure by Using Failover Clustering
  • Designing High Availability Server Roles
  • Implement Hyper-V Replica
  • Deploy a Failover Cluster
  • Implement a Scale-Out File Server
  • Implement High Availability Virtual Machines
  • Implement Operations Manager and VMM Integration
After completing this module, students will be able to:
  • Plan an infrastructure for failover clustering.
  • Implement failover clustering.
  • Integrate failover clustering with server virtualization.
  • Plan a multisite failover clustering.
Module 9: Planning and Implementing Server Update InfrastructureThis module explains how to plan and implement server update infrastructure by using Windows Server Update Service (WSUS), Configuration Manager, and VMM.Lessons
  • Planning and Implementing a WSUS Deployment
  • Planning Software Updates with System Center 2012 Configuration Manager
  • Planning and Implementing Updates in a Server Virtualization Infrastructure
  • Planning and Implementing Virtual Machine Backup and Recovery
Lab : Planning and Implementing an Update Remediation Infrastructure
  • Implement Host Updating in VMM
  • Configuring Failover Clustering and Cluster Aware Updating (CAU)
  • Planning a WSUS Deployment
  • Deploying a Replica WSUS Server
  • Configure Client Update Options
After completing this module, students will be able to:
  • Plan and implement a WSUS Deployment.
  • Plan software updates with Configuration Manager.
  • Plan and implement updates in a server virtualization infrastructure.
Module 10: Planning and Implementing a Business Continuity StrategyThis module explains how to plan and implement a business-continuity strategy for your organization, and how to plan and implement backup and recovery strategies, including virtual-machine backup and recovery.Lessons
  • Overview of Business Continuity Planning
  • Planning and Implementing Backup Strategies
  • Planning and Implementing Recovery
  • Planning and Implementing Backup and Recovery of Virtual Machines
Lab : Implementing a Virtual Machine Backup Strategy with DPM
  • Configure DPM
  • Backup and restore virtual machine data
  • Backup and restore virtual machines
After completing this module, students will be able to:
  • Understand the importance of business continuity planning.
  • Plan and implement backup strategies.
  • Plan and implement recovery.
  • Plan and implement virtual machine backup and recovery.
Module 11: Planning and Implementing an Public Key InfrastructureThis module explains how to plan and implement the various aspects of a PKI, and build an internal PKI by using AD CS.Lessons
  • Planning and Implementing Deployment of a Certification Authority
  • Planning and Implementing Certificate Templates
  • Planning and Implementing Certificate Distribution and Revocation
  • Planning and Implementing Key Archival and Recovery
Lab : Planning and Implementing an AD CS Infrastructure
  • Planning the AD CS Deployment
  • Deploying the CA Infrastructure
  • Implementing Certificate Templates
  • Implementing Certificate Revocation and Distribution
After completing this module, students will be able to:
  • Plan and implement CA deployment.
  • Plan and implement certificate templates.
  • Plan and implement certificate distribution and revocation.
  • Plan and implement key archival and recovery.
Module 12: Planning and Implementing an Identity Federation Infrastructure This module describes how to plan and implement an identity federation infrastructure. Lessons
  • Planning and Implementing an Active Directory Federation Services (AD FS) Server Infrastructure
  • Planning and Implementing AD FS Claims Providers and Relying Parties
  • Planning and Implementing AD FS Claims and Claim Rules
Lab : Planning and Implementing AD FS Infrastructure
  • Designing the AD FS Deployment
  • Configuring Prerequisite Components for AD FS
  • Deploying AD FS for Internal Users
  • Deploying AD FS for a Partner Organization
After completing this module, students will be able to:
  • Plan and implement an identity federation infrastructure, including claims-aware application access.
  • Plan and implement an AD FS server infrastructure.
  • Plan and configure AD FS claim providers and relying parties.
  • Design and deploy AD FS claims and claim rules.
Module 13: Planning and Implementing an Information Rights Management Infrastructure This module explains how to plan and implement an Active Directory Rights Management Services (AD RMS) deployment to protect content. Lessons
  • Planning and Implementing an AD RMS Cluster
  • Planning and Implementing AD RMS Templates and Policies
  • Planning and Implementing External Access to AD RMS Services
  • Planning and Implementing AD RMS Integration with Dynamic Access Control (DAC)
Lab : Planning and Implementing an AD RMS Infrastructure
  • Planning the AD RMS Deployment
  • Deploying the AD RMS Infrastructure for Internal Users
  • Implementing AD RMS Integration with DAC
  • Implementing AD RMS Integration with External Users
After completing this module, students will be able to:
  • Plan and implement an AD RMS deployment.
  • Plan and manage AD RMS templates and access.
  • Plan and implement external access to AD RMS services.
  • Plan and implement AD RMS integration with DAC.
Module 1: Designing an Application Distribution Strategy This module discusses the high-level aspects of designing an application distribution strategy. The topics covered can help students identify the aspects in an environment that influence application distribution and identify the most common distribution methods used in the Windows environment. Lessons
  • Developing an Application Lifecycle Strategy
  • Determining Business Requirements for Application Distribution
  • Overview of Application Distribution Strategies
Lab : Designing an Application Distribution Strategy
  • Choosing an Appropriate Application Deployment Strategy for the Product Catalog App
After completing this module, students will be able to:
  • Describe how to develop an application lifecycle strategy.
  • Describe the important factors to assess prior to application distribution design, including client configuration and deployment infrastructure.
  • Describe application distribution strategies.
  • Design an application distribution strategy.
Module 2: Diagnosing and Remediating Application Compatibility This module describes the process for addressing common application compatibility issues experienced during a new operating system deployment. The module also explains how to use Microsoft Application Compatibility Toolkit (ACT) to help inventory, analyze, and mitigate application compatibility issues. Lessons
  • Diagnosing Application Compatibility Issues
  • Evaluating and Implementing Remediation Solutions
  • Resolving Compatibility Issues by Using ACT
Lab : Diagnosing and Remediating Application Compatibility
  • Analyzing Applications for Potential Compatibility Issues
  • Mitigating Application Compatibility Issues
After completing this module, students will be able to:
  • Understand important considerations for diagnosing application compatibility issues.
  • Explain the solutions available for remediating application compatibility issues.
  • Resolve application compatibility issues with ACT.
Module 3: Deploying Software by Using Group Policy and Windows IntuneThis module discusses using Group Policy and Windows Intune to deploy software as part of a software deployment strategy. It also covers sideloading, which is the specialized software deployment method specific to Windows Store apps.Lessons
  • Deploying Software by Using Group Policy
  • Sideloading Windows Store Apps
  • Deploying Software by Using Windows Intune
Lab : Centralizing Software Deployment by Using Group Policy and Windows Intune
  • Deploying Software by Using Group Policy
  • Sideloading a Windows Store App
  • Performing Windows Intune Simulations
After completing this module, students will be able to:
  • Deploy software centrally by using Group Policy.
  • Install Windows Store apps by using sideloading.
  • Deploy software to clients by using Windows Intune.
Module 4: Deploying Applications by Using Microsoft System Center 2012 Configuration Manager SP1 This module describes how to use System Center 2012 Configuration Manager SP1 to manage the software deployment and management lifecycle, including deploying software, targeting a group of user or computers, validating the success of software deployment, and removing software from computers when that software is no longer required. Lessons
  • Understanding Software Deployment by Using System Center 2012 Configuration Manager SP1
  • Deploying Software by Using System Center 2012 Configuration Manager SP1
Lab : Deploying Applications by Using System Center 2012 Configuration Manager SP1
  • Creating Queries by Using System Center 2012 Configuration Manager SP1
  • Creating User and Device Collections
  • Deploying Applications to Collections
After completing this module, students will be able to:
  • Understand methods of deploying software with Microsoft System Center 2012 Configuration Manager Service Pack 1 (SP1).
  • Use System Center 2012 Configuration Manager SP1 to deploy software.
Module 5: Configuring Self-Service Application Deployment This module describes planning, configuring and using self‑service application deployment. It describes configuring self‑service application deployment for Windows Intune clients and for Microsoft System Center 2012 Configuration Manager clients, in addition to using Microsoft System Center 2012 - Service Manager and Microsoft System Center 2012 - Orchestrator to improve the self‑service application deployment process. Lessons
  • Understanding Self-Service Application Deployment
  • Configuring Self-Service with Windows Intune
  • Self-Service Deployment by Using System Center 2012 Configuration Manager SP1
  • Self-Service Deployment with Service Manager and Orchestrator
Lab : Configuring Self-Service Application Deployment
  • Planning Self-Service Application Deployment
  • Deploying Self-Service Software by Using the Configuration Manager Application Catalog
  • Using the Configuration Manager Application Catalog
After completing this module, students will be able to:
  • Plan self‑service application deployment.
  • Configure self‑service application deployment for Windows Intune clients.
  • Configure self‑service application deployment for Microsoft System Center 2012 Configuration Manager clients.
  • Use Microsoft System Center 2012 - Service Manager and Microsoft System Center 2012 - Orchestrator to improve the self‑service application deployment process.
Module 6: Designing and Implementing Presentation Virtualization Infrastructure This module introduces you to presentation virtualization concepts and to the components that are used for presentation virtualization in computers running Windows so that you can plan the deployment of apps using presentation virtualization in your environment. Lessons
  • Assessing Presentation Virtualization Requirements
  • Planning Presentation Virtualization Infrastructure
  • Deploying Presentation Virtualization Infrastructure
  • Extending the Presentation Virtualization Infrastructure
Lab : Deploying and Implementing Presentation Virtualization Infrastructure
  • Assessing Capacity Requirements for Presentation Virtualization
  • Configuring Presentation Virtualization Infrastructure
  • Configuring High Availability for Presentation Virtualization Infrastructure
  • Configuring Remote Access for Presentation Virtualization Infrastructure
After completing this module, students will be able to:
  • Describe how to assess presentation virtualization requirements.
  • Describe how to plan presentation virtualization infrastructure.
  • Describe how to deploy presentation virtualization infrastructure.
  • Describe how to extend presentation virtualization infrastructure.
Module 7: Preparing, Configuring, and Deploying Presentation Virtualization Applications This module discusses presentation virtualization strategies and which strategy to use in a given situation. It also discusses how to deploy applications to Remote Desktop Session Host servers as traditional, RemoteApp, and Remote Desktop Web Access applications. Lessons
  • Determining Presentation Virtualization Application Strategies
  • Planning and Deploying Remote Desktop, RemoteApp, and Remote Desktop Web Access
Lab : Configuring Applications for Presentation Virtualization
  • Configuring Access to RD Session Host Resources
  • Deploying RD Session Host Desktop Applications
  • Configuring and Deploying a RemoteApp Application
  • Verifying Applications by Using RD Web Access
After completing this module, students will be able to:
  • Determine an appropriate presentation virtualization application strategy.
  • Plan how to deploy applications and deploy them to Remote Desktop Session Host (RD Session Host) servers as traditional, RemoteApp, and Remote Desktop Web Access (RD Web Access) applications.
Module 8: Designing and Deploying an Application Virtualization Environment This module discusses how to determine which application virtualization infrastructure model best suits an organization’s needs. Additionally, this module covers how to determine which Windows Server 2012 roles and features are needed to support the model you have selected, and which Group Policy settings should be configured. Lessons
  • Overview of Application Virtualization Models
  • Deploying Application Virtualization Infrastructure Components
  • Configuring Application Virtualization Client Support
Lab : Planning and Deploying Application Virtualization Infrastructure
  • Planning the Deployment of App-V Roles and Features
  • Deploying App-V Infrastructure
  • Configuring App-V Client Settings
After completing this module, students will be able to:
  • Choose an appropriate application virtualization model to meet your business requirements.
  • Deploy components to support your chosen application virtualization model.
  • Deploy and configure the Microsoft Application Virtualization (App‑V) 5 client.
Module 9: Preparing, Sequencing, and Deploying Virtual Applications This module describes sequencing applications by using the Microsoft Application Virtualization (App-V) Sequencer. It also describes how to stream sequenced applications and how to locally install sequenced applications. Lessons
  • Sequencing Applications with App-V
  • Deploying App-V Applications
Lab : Preparing, Sequencing, and Deploying Virtual Applications
  • Installing and Configuring the App-V Sequencer
  • Sequencing Applications
  • Preparing App-V Applications by Using System Center 2012 Configuration Manager SP1
  • Deploying Sequenced Applications
After completing this module, students will be able to:
  • Install the App‑V 5.0 Sequencer and sequence applications.
  • Deploy sequenced applications.
Module 10: Planning and Implementing Application Updates and Security This module discusses how to configure the appropriate infrastructure to streamline the deployment of software updates to applications. It also covers how to plan and configure application security. Lessons
  • Planning Application Updates
  • Deploying Updates by Using WSUS
  • Deploying Application Updates by Using System Center 2012 Configuration Manager SP1
  • Implementing Application Security
Lab : Preparing and Deploying Application Updates
  • Preparing a System Center 2012 Configuration Manager SP1 Site to Support Software Updates
  • Updating Deployed Applications by Using System Center 2012 Configuration Manager SP1
  • Resequencing an App-V Application
  • Deploying AppLocker Policy
After completing this module, students will be able to:
  • Plan application updates.
  • Deploy application updates by using Microsoft Windows Server Update Services (WSUS).
  • Deploy application updates by using Microsoft System Center 2012 Configuration Manager with Service Pack 1 (SP1).
  • Implement application security.
Module 11: Planning and Implementing Application Upgrades This module covers planning and implementing application upgrades and supersedence, including how to deploy multiple versions of an application, how to uninstall applications, how to retire applications, and how to manage user settings.  It also covers planning application concurrency and implementing it by using App-V, Client Hyper-V, RemoteApp, VDI, and Remote Desktop Services. Lessons
  • Overview of Application Upgrades
  • Overview of Application Concurrency
Lab : Upgrading Applications
  • Planning an Application Upgrade Strategy
  • Deploying an Application
  • Replacing a Deployed Application
  • Configuring Application Version Coexistence
After completing this module, students will be able to:
  • Plan and implement application upgrades and supersedence.
  • Plan and implement application concurrency.
Module 12: Monitoring Application Deployment, Use, and Performance This module describes using application monitoring as an essential part of managing applications in an enterprise environment. It also covers planning software inventory and metering, and monitoring application resource use. Lessons
  • Planning Application Monitoring
  • Planning Software Inventory and Metering
  • Monitoring Application Resource Utilization
Lab : Monitoring Application Deployment, Utilization, and Performance
  • Configuring Asset Intelligence
  • Configuring System Center 2012 Operations Manager SP1 for Monitoring a Server
After completing this module, you will be able to:
  • Describe how to plan application monitoring.
  • Describe how to plan software inventory and metering.
  • Describe how to monitor application resource use.
Module 1: Deploying and Managing Windows Server 2012 This module introduces the new Windows Server 2012 administrative interface. This module covers the different roles and features that are available with the Windows Server 2012 operating system. It also discusses the various installation and configuration options you can use when deploying and configuring Windows Server 2012. Lessons
  • Windows Server 2012 Overview
  • Overview of Windows Server 2012 Management
  • Installing Windows Server 2012
  • Post-Installation Configuration of Windows Server 2012
  • Introduction to Windows PowerShell
Lab : Deploying and Managing Windows Server 2012
  • Deploying Windows Server 2012
  • Configuring Windows Server 2012 Server Core
  • Managing Servers
  • Using Windows PowerShell to Manage Servers
After completing this module, students will be able to:
  • Describe Windows Server 2012.
  • Describe the management tools available in Windows Server 2012.
  • Install Windows Server 2012.
  • Perform post-installation configuration of Windows Server 2012.
  • Perform basic administrative tasks using Windows PowerShell.
Module 2: Introduction to Active Directory Domain ServicesThis module introduces Active Directory Domain Services (AD DS) in Windows Server 2012. It covers general AD DS infrastructure including forests, trees, schema, Global Catalog, and Operations Masters. It also covers installing and configuring domain controllers.Lessons
  • Overview of AD DS
  • Overview of Domain Controllers
  • Installing a Domain Controller
Lab : Installing Domain Controllers
  • Installing a Domain Controller
  • Installing a Domain Controller by Using IFM
After completing this module, students will be able to:
  • Describe the structure of AD DS.
  • Describe the purpose of domain controllers.
  • Explain how to install a domain controller.
Module 3: Managing Active Directory Domain Services ObjectsThis module covers configuring Active Directory objects such as users, groups and computers. The functionality of AD DS administrative tools is addressed, in addition to the configuration of user profiles and the process of delegating permissions to perform AD DS administration.Lessons
  • Managing User Accounts
  • Managing Group Accounts
  • Managing Computer Accounts
  • Delegating Administration
Lab : Managing Active Directory Domain Services Objects
  • Delegating Administration for a Branch Office
  • Creating and Configuring User Accounts in AD DS
  • Managing Computer Objects in AD DS
After completing this module, students will be able to:
  • Manage user accounts with graphical tools.
  • Manage group accounts with graphical tools.
  • Manage computer accounts.
  • Delegate permissions to perform AD DS administration.
Module 4: Automating Active Directory Domain Services AdministrationThis module covers using command-line tools to configure and administer AD DS. It introduces using Windows PowerShell cmdlets for AD DS administration, and using Windows PowerShell to perform bulk AD DS administrative operations.Lessons
  • Using Command-line Tools for AD DS Administration
  • Using Windows PowerShell for AD DS Administration
  • Performing Bulk Operations with Windows PowerShell
Lab : Automating AD DS Administration by Using Windows PowerShell
  • Creating User Accounts and Groups by Using Windows PowerShell
  • Using Windows PowerShell to Create User Accounts in Bulk
  • Using Windows PowerShell to Modify User Accounts in Bulk
After completing this module, students will be able to:
  • Use command-line tools for AD DS administration.
  • Use Windows PowerShell cmdlets for AD DS administration.
  • Perform bulk operations by using Windows PowerShell.
Module 5: Implementing IPv4This module covers Internet Protocol Version 4 (IPv4) addressing. It details the various IPv4 components, covers subnetting and supernetting, and discusses configuring and general troubleshooting of IPv4 addresses.Lessons
  • Overview of TCP/IP
  • Understanding IPv4 Addressing
  • Subnetting and Supernetting
  • Configuring and Troubleshooting IPv4
Lab : Implementing IPv4
  • Identifying Appropriate Subnets
  • Troubleshooting IPv4
After completing this module, students will be able to:
  • Describe the TCP/IP protocol suite.
  • Describe IPv4 addressing.
  • Determine a subnet mask necessary for subnetting or supernetting.
  • Configure IPv4 and troubleshoot IPv4 communication.
Module 6: Implementing Dynamic Host Configuration ProtocolThis module covers the installation and configuration of DHCP in addition to managing a DHCP database. It also covers security and monitoring of DHCP, including auditing and logging.Lessons
  • Installing a DHCP Server Role
  • Configuring DHCP Scopes
  • Managing a DHCP Database
  • Securing and Monitoring DHCP
Lab : Implementing DHCP
  • Implementing DHCP
  • Implementing a DHCP Relay Agent (Optional Exercise)
After completing this module, students will be able to:
  • Install the DHCP server role.
  • Configure DHCP scopes.
  • Manage a DHCP database.
  • Secure and monitor the DHCP server role.
Module 7: Implementing Domain Name SystemThis module covers name resolution for Windows Server and clients. It details the installation of a Domain Name System (DNS) server and configuring Active Directory Integrated DNS zones.Lessons
  • Name Resolution for Windows Client and Servers
  • Installing and Managing a DNS Server
  • Managing DNS Zones
Lab : Implementing DNS
  • Installing and Configuring DNS
  • Creating Host Records in DNS
  • Managing the DNS Server Cache
After completing this module, students will be able to:
  • Describe name resolution for Windows operating system clients and Windows Server servers.
  • Install and manage DNS Server service.
  • Manage DNS zones.
Module 8: Implementing IPv6This module covers understanding and implementing IPv6 addressing. It covers configuration and troubleshooting as well as co-existence with IPv4 using transition technologies.Lessons
  • Overview of IPv6
  • IPv6 Addressing
  • Coexistence with IPv6
  • IPv6 Transition Technologies
Lab : Implementing IPv6
  • Configuring an IPv6 Network
  • Configuring an ISATAP Router
After completing this module, students will be able to:
  • Describe the features and benefits of IPv6.
  • Describe IPv6 addressing.
  • Describe IPv6 coexistence with IPv4.
  • Describe IPv6 transition technologies.
Module 9: Implementing Local StorageThis module covers the storage configuration options for Windows Server 2012, including managing disks and volumes and implementing file systems. It also covers creating and managing storage pools.Lessons
  • Overview of Storage
  • Managing Disks and Volumes
  • Implementing Storage Spaces
Lab : Implementing Local Storage
  • Installing and Configuring a New Disk
  • Resizing Volumes
  • Configuring a Redundant Storage Space
After completing this module, students will be able to:
  • Describe the various storage technologies.
  • Explain how to manage disks and volumes.
  • Explain how to implement Storage Spaces.
Module 10: Implementing File and Print ServicesThis module covers securing files, folders and network file shares, in addition to using shadow copies to protect network file shares. It also covers configuring network printing and creating a printer pool.Lessons
  • Securing Files and Folders
  • Protecting Shared Files and Folders by Using Shadow Copies
  • Configuring Network Printing
Lab : Implementing File and Print Services
  • Creating and Configuring a File Share
  • Configuring Shadow Copies
  • Creating and Configure a Printer Pool
After completing this module, students will be able to:
  • Secure shared files and folders.
  • Protect shared files and folders by using shadow copies.
  • Configure network printing.
Module 11: Implementing Group PolicyThis module covers using Group Policy to centrally manage and apply configuration settings.Lessons
  • Overview of Group Policy
  • Group Policy Processing
  • Implementing a Central Store for Administrative Templates
Lab : Implementing Group Policy
  • Configuring a Central Store
  • Creating GPOs
After completing this module, students will be able to:
  • Create and manage Group Policy Objects.
  • Describe Group Policy processing.
  • Implement a central store for administrative templates.
Module 12: Securing Windows Servers Using Group Policy ObjectsIncrease security in a Windows Server 2012 infrastructure by using Group Policy Objects, AppLocker, and Windows Firewall.Lessons
  • Windows Operating Systems Security Overview
  • Configuring Security Settings
  • Restricting Software
  • Configuring Windows Firewall with Advanced Security
Lab : Lab A: Increasing Security for Server Resources
  • Using Group Policy to Secure Member Servers
  • Auditing File System Access
  • Auditing Domain Logons
Lab : Lab B: Configuring AppLocker and Windows Firewall
  • Configuring AppLocker Policies
  • Configuring Windows Firewall
After completing this module, students will be able to:
  • Describe Windows Server operating system Security.
  • Configure security settings by using Group Policy.
  • Restrict unauthorized software from running on servers and clients.
  • Configure Windows Firewall with Advanced Security.
Module 13: Implementing Server Virtualization with Hyper-VThis module describes Microsoft Virtualization technologies. It covers installing and configuring Hyper-V virtual machines, configuring virtual storage, and configuring virtual networks.Lessons
  • Overview of Virtualization Technologies
  • Implementing Hyper-V
  • Managing Virtual Machine Storage
  • Managing Virtual Networks
Lab : Implementing Server Virtualization with Hyper-V
  • Installing the Hyper V Role onto a Server
  • Configuring Virtual Networking
  • Creating and Configuring a Virtual Machine
  • Using Virtual Machine Snapshots
After completing this module, students will be able to:
  • Describe virtualization technologies.
  • Implement Hyper‑V.
  • Manage virtual machine storage.
  • Manage virtual networks.
Module 1: Introduction to the Private Cloud This module gives students an overview of a private cloud infrastructure, including what it is, the business and technical drivers behind implementing it, and how they can use System Center 2012 to monitor and operate it. Students will understand the key concepts of a private cloud and verify key components of System Center 2012.Lessons
  • Overview of the Cloud Computing Model
  • Requirements for the Private Cloud
  • Operating a Private Cloud Infrastructure with System Center
  • Maintaining the Health of the Private Cloud
  • Integrating System Center Components
  • Verifying the Compliance of the Private Cloud Infrastructure
Lab : Verifying the Private Cloud Infrastructure
  • Verifying the Infrastructure
  • Verifying System Center Components
Lab : Verifying the Compliance of the Private Cloud Infrastructure
  • Exercise: Checking Compliance
After completing this module, students will be able to:
  • Describe the features of a cloud computing model.
  • Describe the requirements for the private cloud.
  • Describe how you can use System Center to monitor and manage the private cloud.
  • Describe how to maintain the health of the private cloud infrastructure.
  • Describe how to integrate System Center components.
  • Verify the compliance of the private cloud infrastructure.
Module 2: Configuring and Optimizing Business Unit CloudsThis module explains how to configure a new business unit cloud within Virtual Machine Manager.Lessons
  • Overview of System Center Virtual Machine Manager
  • Managing a Virtual Environment with Virtual Machine Manager
  • Creating Business Unit Clouds
Lab : Configuring and Optimizing Business Unit Clouds
  • Configuring Network Resources
  • Creating the Business Unit Cloud
  • Configuring Security
After completing this module, students will be able to:
  • Describe the core components, key features, architecture, and security features of Virtual Machine Manager, and the role it plays in the private cloud.
  • Use Virtual Machine Manager to manage private cloud infrastructure.
  • Describe how to build and configure resources and security for a business unit cloud.
Module 3: Deploying Cloud ServicesThis module explains how to deploy pre-packaged applications and create a new service template to deploy a service into the cloud.Lessons
  • Overview of Service Templates
  • VMM Profiles
  • Web Deploy Packages
  • Overview of Server App-V
  • Data-Tier Application Packages
Lab : Importing and Deploying the Stock Trader Application
  • Deploying a Single Tier Service
  • Configuring Prerequisites
  • Preparing the Stock Trader Service Template
  • Deploying the Service Template
After completing this module, students will be able to:
  • Create service templates in VMM by using the Service Template Designer.
  • Describe the process of creating VMM profiles.
  • Describe the process of creating Web Deploy packages.
  • Describe the process of sequencing by using Server App-V.
  • Describe the process of creating data-tier application packages.
Module 4: Monitoring Private Cloud ServicesThis module provides an overview of System Center Operations Manager. The students are shown how Operations Manager is used to monitor the various services that underpin the private cloud. The students are then shown how to deploy agents to key service components running within the private cloud. Custom monitoring is then applied to these components which include the creation of a distributed application model to give a holistic view of the health of the private cloud infrastructure.Lessons
  • Overview of System Center Operations Manager
  • Agent Deployment in Operations Manager
  • Configuring Custom Monitoring
  • Monitoring the Network Infrastructure
  • Monitoring Distributed Applications
Lab : Monitoring Private Cloud Services
  • Deploying an Agent
  • Configuring Custom Monitoring
  • Creating a Distributed Application Model
  • Detecting and Recovering from a Failure
After completing this module, students will be able to:
  • Describe the key features of Operations Manager.
  • Describe the architecture of Operations Manager, including databases, management servers, management server pools, consoles, gateways, and reporting.
  • Describe how to secure access to Operations Manager by using User Roles.
Module 5: Configuring Application Performance MonitoringThis module gives students a deep insight into the Application Performance Monitoring (APM) feature of Operations Manager. A .NET application has been installed into the lab environment that will be used for this module. Students will learn to configure APM to monitor the performance and availability of this application. A break in the application is then instigated where students will see how Operations Manager detects and reports this with the Alerting and Diagnostics tools that are built into Operations Manager.Lessons
  • Application Performance Monitoring
  • Advanced Monitoring in Application Performance Monitoring
  • Viewing Application Performance in Operations Manager
Lab : Configuring Application Performance Monitoring
  • Configuring Basic Monitoring in Application Performance Monitoring
  • Customizing the Performance Thresholds
  • Validating Monitoring
  • Creating a Distributed Application Model for the DinnerNow Application
After completing this module, students will be able to:
  • Describe the core components in APM and the best practices when implementing them.
  • Describe how to implement advanced monitoring features that are available in APM.
  • Describe how to view application performance in Operations Manager.
Module 6: Operating and Extending Service Management in the Private Cloud This module explains the core functionality of Service Manager and the steps to create and manage change requests, incidents, and release records. The module also describes about the security model behind Service Manager so that students can customize and extend the integral functionality of the service. Lessons
  • Overview of Service Manager
  • Configuring Security and User Roles
  • Configuring Work Items
  • Configuring Incident Queues
  • Configuring Service Offerings
Lab : Operating and Extending Service Management in the Cloud
  • Configuring Security Roles
  • Configuring Notifications
  • Publishing an Incident Service Offering
  • Raising an Incident
  • Creating an Approving a Change Request
  • Creating an Assigning a Release Record
After completing this module, students will be able to:
  • Describe Service Manager.
  • Describe configuring security and user roles.
  • Describe configuring work items.
  • Describe configuring incident queues.
  • Describe configuring service offerings.
Module 7: Automatic Incident Creation, Remediation, and Change RequestsThis module provides an overview of Orchestrator and explains how Orchestrator integrates with Operations Manager and Service Manager.Lessons
  • Overview of System Center Orchestrator 2012
  • Integrating Orchestrator with Operations Manager and Service Manager
Lab : Automating Incident Creation, Remediation, and Change Requests
  • Configuring the Incident Template
  • Configuring Incidents That Affect the StockTrader Service
  • Automating Incident Remediation and Change Requests
After completing this module, students will be able to:
  • Describe the Orchestrator components and the available Integration Packs.
  • Integrate Orchestrator with Operations Manager and Service Manager.
Module 8: Problem Management in the Private CloudThis module provides an overview of problem management and explains how students can use it within a service management framework. Additionally, this module explains its implementation as a manual feature of Service Manager. Finally, this module describes how to create a custom event monitor in Operations Manager and then use it to identify and route incidents and problems to Service Manager.Lessons
  • Overview of Problem Management
  • Creating Custom Rules
Lab : Automating Problem Management in the Private Cloud
  • Manually Creating a Problem Record
  • Creating a Custom Event Rule in Operations Manager
  • Configuring Automated Problem Record Creation
After completing this module, students will be able to:
  • Describe problem management.
  • Create custom rules.
Module 9: Automating Self-Service Provisioning This module explains about automating self-service provisioning by using the System Center Cloud Service Process Pack, including the configuration items that are created and the request items that are contained in the System Center Cloud Service Process Pack. Lessons
  • Installing and Configuring the System Center Cloud Services Process Pack
  • Cloud Services Configuration Items
  • Cloud Services Request Items
Lab : Automating Self-Service Provisioning
  • Completing the Prerequisites for the System Center Cloud Services Process Pack
  • Installing the System Center Cloud Services Process Pack
  • Configuring the System Center Cloud Services Process Pack
  • Deploying a Virtual Machine for StockTrader by using the Cloud Services Process Pack
After completing this module, students will be able to:
  • Describe how to install and configure the System Center Cloud Services Process Pack.
  • Describe the various Cloud Services configuration items that make up the System Center Cloud Service Process Pack.
  • Describe the various Cloud Services request items that are included in the System Center Cloud Services Process Pack.
Module 10: Private Cloud Protection and RecoveryThis module explains how to protect the resources in the private cloud by using Data Protection Manager. It also explains how to implement a recovery action by using Orchestrator to recover a database.Lessons
  • Protecting Data in the Private Cloud
  • Recovering Data in the Private Cloud
Lab : Private Cloud Protection and Recovery
  • Configuring Manual Protection and Recovery of Key Service Data
  • Configuring Automatic Protection and Recovery of Key Service Data
  • Monitoring Protection Status
After completing this module, students will be able to:
  • Configure data protection in the private cloud.
  • Configure data recovery in the private cloud.
Module 11: Configuring Compliance in the Private CloudThis module explains how to implement IT Governance, Risk Management, and Compliance (GRC) in a private cloud environment by using System Center 2012. It also explains how to implement Software Update Compliance in Virtual Machine Manager to verify whether key private cloud infrastructure is correctly updated with the latest software updates. The module also describes how to implement the IT GRC Management Pack in Service Manager to check for compliance across key Service Components and remediate non-compliant items.Lessons
  • Overview of the Process Pack for IT GRC
  • Installing and Configuring the Process Pack for IT GRC
  • Implementing an IT GRC Control Management Program
  • Maintaining Compliance through VMM Security Baselines and System Center Advisor
Lab : Configuring Compliance in the Private Cloud
  • Creating an IT GRC Control Management Program
  • Adding Test Results to a Manual Control Activity and View Compliance Reports
  • Assigning a Baseline
After completing this module, students will be able to:
  • Describe the System Center 2012 Process Pack for IT GRC.
  • Describe installing and configuring the Process Pack for IT GRC.
  • Describe implementing an IT GRC Control Management Program.
  • Describe maintaining compliance by using VMM Security Baselines and System Center Advisor.
Module 12: Configuring SLAs, Dashboards, and WidgetsThis module describes the various methods for surfacing service and performance-related data from Operations Manager and Service Manager to SharePoint and Microsoft Excel.Lessons
  • Service Level Tracking
  • Configuring and Deploying Widgets and Dashboards
  • Publishing Real-Time State with Microsoft Visio Snap-in
  • System Center Analytics
  • Using Excel and SSRS to View Data
  • Overview of PerformancePoint
Lab : Configuring SLAs, Dashboards, and Widgets
  • Configuring Service Level Tracking
  • Configuring Service Level Management
  • Configuring Microsoft Excel Analytics
  • Configuring PerformancePoint Analytics
After completing this module, students will be able to:
  • Describe Service Level Tracking in Microsoft System Center 2012 Operations Manager.
  • Configure and deploy widgets and dashboards.
  • Describe publishing in real time state with Microsoft Visio.
  • Describe using System Center analytics.
  • View data with Microsoft Office Excel and Microsoft SQL Server Reporting Services.
  • Describe using Microsoft PerformancePoint.
Module 1: Overview of Access and Information Protection Lessons
  • Introduction to Access and Information Protection Solutions in Business
  • Overview of AIP Solutions in Windows Server 2012
  • Overview of FIM 2010 R2
Module 2: Advanced Deployment and Administration of AD DS Lessons
  • Deploying AD DS
  • Deploying and Cloning Virtual Domain Controllers
  • Deploying Domain Controllers in Windows Azure
  • Administering AD DS
Module 3: Securing AD DS Lessons
  • Securing Domain Controllers
  • Implementing Account Security
  • Implementing Audit Authentication
Module 4: Implementing and Administering AD DS Sites and Replication .Lessons
  • Overview of AD DS Replication
  • Configuring AD DS Sites
  • Configuring and Monitoring AD DS Replication
Module 5: Implementing Group Policy Lessons
  • Introducing Group Policy
  • Implementing and Administering GPOs
  • Group Policy Scope and Group Policy Processing
  • Troubleshooting the Application of GPOs
Module 6: Managing User Settings with Group Policy .Lessons
  • Implementing Administrative Templates
  • Configuring Folder Redirection and Scripts
  • Configuring Group Policy Preferences
Module 7: Deploying and Managing AD CS Lessons
  • Deploying CAs
  • Administering CAs
  • Troubleshooting, Maintaining, and Monitoring CAs
Module 8: Deploying and Managing Certificates
  • Using Certificates in a Business Environment
  • Deploying and Managing Certificate Templates
  • Managing Certificates Deployment, Revocation, and Recovery
  • Implementing and Managing Smart Cards
  • Implement and manage smart cards.
Module 9: Implementing and Administering AD RMS Lessons
  • Overview of AD RMS
  • Deploying and Managing an AD RMS Infrastructure
  • Configuring AD RMS Content Protection
  • Configuring External Access to AD RMS
Module 10: Implementing and Administering AD FS Lessons
  • Overview of AD FS
  • Deploying AD FS
  • Implementing AD FS for a Single Organization
  • Deploying AD FS in a Business-to-Business Federation Scenario
  • Extending AD FS to External Clients
Module 11: Implementing Secure Shared File Access Lessons
  • Overview of Dynamic Access Control
  • Implementing DAC Components
  • Implementing DAC for Access Control
  • Implementing Access Denied Assistance
  • Implementing and Managing Work Folders
  • Implementing Workplace Join
Module 12: Monitoring, Managing, and Recovering AD DS . Lessons
  • Monitoring AD DS
  • Managing the AD DS Database
  • AD DS Backup and Recovery Options for AD DS and Other Identity and Access Solutions
Module 13: Implementing Windows Azure Active Directory Lessons
  • Overview of Windows Azure AD
  • Managing Windows Azure AD Accounts
Module 14: Implementing and Administering AD LDS Lessons
  • Overview of AD LDS
  • Deploying AD LDS
  • Configuring AD LDS Instances and Partitions
  • Configuring AD LDS Replication
  • Integrating AD LDS with AD DS
Module 1: Assessing and Determining Desktop Deployment Options This module describes the enterprise desktop lifecycle and explains how you can assess hardware and infrastructure readiness. The module then describes how to identify and select the most appropriate deployment option based upon organizational requirements. Lessons
  • Overview of the Enterprise Desktop Life Cycle
  • Assessing Hardware and Infrastructure Readiness for a Desktop Deployment
  • Using MAP to Assess Deployment Readiness
  • Overview of Enterprise Desktop Deployment Methods
  • Volume Activation Technologies for Enterprise Desktops
Lab : Assessing and Determining Desktop Deployment Options
  • Planning a Desktop Deployment Strategy
  • Collecting Infrastructure Data
  • Implementing a Volume Activation Solution
After completing this module, students will be able to:
  • Describe the enterprise desktop life cycle.
  • Explain how to assess hardware and infrastructure readiness for a desktop deployment.
  • Describe how to use MAP to assess deployment readiness.
  • Describe the available methods for deploying enterprise desktops.
  • Describe volume activation technologies for enterprise desktops.
Module 2: Planning An Image Management Strategy This modules describes Windows image formats and helps you to define an efficient image management strategy based upon business requirements .Lessons
  • Overview of Windows Image Format
  • Overview of Image Management
Lab : Planning an Image Management Strategy
  • Assessing Business Requirements to Support an Image Management Strategy
After completing this module, students will be able to:
  • Describe image formats used for Windows desktop deployments.
  • Determine the type and content of images used in an image management strategy.
Module 3: Implementing Desktop Security This module describes how to deploy and manage a secure desktop by implementing centralized policies, Bit Locker settings, and Encrypted File System (EFS) settings. Lessons
  • Implementing a Centralized Desktop Security Solution
  • Planning and Implementing Bit Locker
  • Planning and Implementing EFS
Lab : Configuring Desktop Security
  • Configuring Desktop Security by Using Group Policy
  • Configuring Drive Encryption by Using BitLocker and MBAM
Lab : Configuring File Encryption by Using EFS
  • Implementing a Centrally Managed EFS Solution
  • Verifying EFS Document Recovery
After completing this module, students will be able to:
  • Implement a centralized secure desktop solution by using Group Policy settings.
  • Plan and implement device encryption by using BitLocker.
  • Plan and implement a centrally managed EFS solution to secure files and folders on enterprise desktops.
Module 4: Capturing and Managing a Desktop Operating System Image This module describes how to use the Windows Assessment and Deployment Kit (ADK) and Windows Deployment Services (WDS) to create, capture, and manage a desktop operating system image. Lessons
  • Overview of Windows ADK
  • Managing Windows PE
  • Building a Reference Image by Using Windows SIM and Sysprep
  • Capturing and Servicing a Reference Image
  • Configuring and Managing Windows DS
Lab : Preparing the Imaging and the Windows PE Environment
  • Installing Windows ADK
  • Configuring a Custom Windows PE Environment
Lab : Building a Reference Image by Using Windows SIM and Sysprep
  • Building a Custom Answer File Using Windows SIM
  • Installing a Reference Computer by Using a Custom Answer File
  • Generalizing a Reference Computer by Using Sysprep
Lab : Capturing and Servicing a Reference Image
  • Capturing a Reference System Image
  • Servicing a Reference System Image
Lab : Configuring and Managing Windows DS
  • Planning the Windows Deployment Services Environment
  • Installing and Configuring the Windows Deployment Services Server Role
  • Capturing a Reference Image by Using Windows DS
  • Deploying an Image by Using Windows DS
After completing this module, students will be able to:
  • Identify the purpose and key features of the Windows ADK.
  • Describe the Windows PE environment and how it can be customized to address specific image and deployment requirements.
  • Describe the Windows Setup and preparation process and how it can be modified using answer files created with Windows SIM and the Sysprep utility.
  • Use DISM to capture and service a reference image.
  • Configure and manage Windows DS to help support an image capture and deployment solution.
Module 5: Planning and Implementing User State Migration This modules describes how to use the User State Migration Tool (USMT) to migrate appropriate user data and settings to a new desktop operating system.Lessons
  • Overview of User State Migration
  • Planning User State Migration by Using USMT
  • Migrating User State by Using USMT
Lab : Planning and Implementing User State Migration
  • Planning for User State Migration
  • Creating and Customizing the USMT XML Files
  • Capturing and Restoring User State by Using USMT
Lab : Migrating User State by Using Hard-Link Migration
  • Performing a Hard-Link Migration by Using USMT
After completing this module, students will be able to:
  • Describe user state migration.
  • Plan user state migration.
  • Migrate user state by using the USMT.
Module 6: Planning and Deploying Desktops Using the Microsoft Deployment Toolkit This module describes how to use the Microsoft Deployment Toolkit (MDT) 2012 to deploy Windows operating systems in lite touch installation scenarios. Lessons
  • Planning for the LTI Environment
  • Implementing MDT 2012 for LTI
  • Integrating Windows DS with MDT
Lab : Planning and Deploying Desktops by Using MDT
  • Planning for the MDT LTI Environment
  • Installing MDT 2012 and Prerequisites
  • Creating and Configuring the MDT 2012 Deployment Share
  • Deploying and Capturing a Reference Operating System Image
  • Integrating Windows DS with MDT 2012 To Provide PXE-Boot Capabilities
After completing this module, students will be able to:
  • Plan for the LTI environment.
  • Implement MDT 2012 for LTI.
  • Integrate Windows Deployment Services (DS) with the MDT 2012.
Module 7: Planning and Deploying Desktops by Using System Center 2012 Configuration ManagerThis describes how to use System Center 2012 Configuration Manager to implement a zero touch installation for deploying enterprise desktops.Lessons
  • Planning the ZTI Environment
  • Preparing the Site for Operating System Deployment
  • Building