Eligibility: (Pre-requisites) | Any Computer Hardware course or NTMS hardware module I |
Medium of instruction: | English |
Solutions Associate
The foundation for your professional career
Show that you have the primary set of Windows Server 2012 skills, relevant across multiple solution areas in a business environment, to reduce IT costs and deliver more business value.
MCSA: Server Administrator certification
Let the success begin
Introduction
The MCSA:certification can help you develop and validate your skills in your current position, or propel you toward a future role, such as:
• Windows server administrator
• Server systems administrator
• Monitoring operator
• Network administrator
Prerequisites
Before attending this course, students must have:
Any Computer Hardware course or NTMS hardware module I
Course Outline
Install and Configure Servers
Install servers
Plan for a server installation; plan for server roles; plan for a server upgrade; install Server Core; optimize resource utilization by using Features on Demand; migrate roles from previous versions of Windows Server
Configure servers
Configure Server Core; delegate administration; add and remove features in offline images; deploy roles on remote servers; convert Server Core to/from full GUI; configure services; configure NIC teaming
Configure local storage
Design storage spaces; configure basic and dynamic disks; configure MBR and GPT disks; manage volumes; create and mount virtual hard disks (VHDs); configure storage pools and disk pools
Configure Server Roles and Features
Configure file and share access
Create and configure shares; configure share permissions; configure offline files; configure NTFS permissions; configure access-based enumeration (ABE); configure Volume Shadow Copy Service (VSS); configure NTFS quotas
Configure print and document services
Configure the Easy Print print driver; configure Enterprise Print Management; configure drivers; configure printer pooling; configure print priorities; configure printer permissions
Configure servers for remote management
Configure WinRM; configure down-level server management; configure servers for day-to-day management tasks; configure multi-server management; configure Server Core; configure Windows Firewall
Configure Hyper-V
Create and configure virtual machine settings
Configure dynamic memory; configure smart paging; configure Resource Metering; configure guest integration services
Create and configure virtual machine storage
Create VHDs and VHDX; configure differencing drives; modify VHDs; configure pass-through disks; manage snapshots; implement a virtual Fibre Channel adapter
Create and configure virtual networks
Implement Hyper-V Network Virtualization; configure Hyper-V virtual switches; optimize network performance; configure MAC addresses; configure network isolation; configure synthetic and legacy virtual network adapters
Deploy and Configure Core Network Services
Configure IPv4 and IPv6 addressing
Configure IP address options; configure subnetting; configure supernetting; configure interoperability between IPv4 and IPv6; configure ISATAP; configure Teredo
Deploy and configure Dynamic Host Configuration Protocol (DHCP) service
Create and configure scopes; configure a DHCP reservation; configure DHCP options; configure client and server for PXE boot; configure DHCP relay agent; authorize DHCP server
Deploy and configure DNS service
Configure Active Directory integration of primary zones; configure forwarders; configure Root Hints; manage DNS cache; create A and PTR resource records
Install and Administer Active Directory
Install domain controllers
Add or remove a domain controller from a domain; upgrade a domain controller; install Active Directory Domain Services (AD DS) on a Server Core installation; install a domain controller from Install from Media (IFM); resolve DNS SRV record registration issues; configure a global catalog server
Create and manage Active Directory users and computers
Automate the creation of Active Directory accounts; create, copy, configure, and delete users and computers; configure templates; perform bulk Active Directory operations; configure user rights; offline domain join; manage inactive and disabled accounts
Create and manage Active Directory groups and organizational units (OUs)
Configure group nesting; convert groups including security, distribution, universal, domain local, and domain global; manage group membership using Group Policy; enumerate group membership; delegate the creation and management of Active Directory objects; manage default Active Directory containers; create, copy, configure, and delete groups and Ous
Create and Manage Group Policy
Create Group Policy objects (GPOs)
Configure a Central Store; manage starter GPOs; configure GPO links; configure multiple local group policies; configure security filtering
Configure security policies
Configure User Rights Assignment; configure Security Options settings; configure Security templates; configure Audit Policy; configure Local Users and Groups; configure User Account Control (UAC)
Configure application restriction policies
Configure rule enforcement; configure Applocker rules; configure Software Restriction Policies
Configure Windows Firewall
Configure rules for multiple profiles using Group Policy; configure connection security rules; configure Windows Firewall to allow or deny applications, scopes, ports, and users; configure authenticated firewall exceptions; import and export settings
Deploy, Manage, and Maintain Servers
Deploy and manage server images.
Install the Windows Deployment Services (WDS) role; configure and manage boot, install, and discover images; update images with patches, hotfixes, and drivers; install features for offline images
Implement patch management.
Install and configure the Windows Server Update Services (WSUS) role; configure group policies for updates; configure client-side targeting; configure WSUS synchronization; configure WSUS groups
Monitor servers.
Configure Data Collector Sets (DCS); configure alerts; monitor real-time performance; monitor virtual machines (VMs); monitor events; configure event subscriptions; configure network monitoring
Configure File and Print Services
Configure Distributed File System (DFS).
Install and configure DFS namespaces; configure DFS Replication Targets; configure Replication Scheduling; configure Remote Differential Compression settings; configure staging; configure fault tolerance
Configure File Server Resource Manager (FSRM).
Install the FSRM role; configure quotas; configure file screens; configure reports
Configure file and disk encryption.
Configure Bitlocker encryption; configure the Network Unlock feature; configure Bitlocker policies; configure the EFS recovery agent; manage EFS and Bitlocker certificates including backup and restore
Configure advanced audit policies.
Implement auditing using Group Policy and AuditPol.exe; create expression-based audit policies; create removable device audit policies
Configure Network Services and Access
Configure DNS zones.
Configure primary and secondary zones; configure stub zones; configure conditional forwards; configure zone and conditional forward storage in Active Directory; configure zone delegation; configure zone transfer settings; configure notify settings
Configure DNS records.
Create and configure DNS Resource Records (RR) including A, AAAA, PTR, SOA, NS, SRV, CNAME, and MX records; configure zone scavenging; configure record options including Time To Live (TTL) and weight; configure round robin; configure secure dynamic updates
Configure VPN and routing.
Install and configure the Remote Access role; implement Network Address Translation (NAT); configure VPN settings; configure remote dial-in settings for users; configure routing
Configure DirectAccess.
Implement server requirements; implement client configuration; configure DNS for Direct Access; configure certificates for Direct Access
Configure a Network Policy Server Infrastructure
Configure Network Policy Server (NPS).
Configure multiple RADIUS server infrastructures; configure RADIUS clients; manage RADIUS templates; configure RADIUS accounting; configure certificates
Configure NPS policies.
Configure connection request policies; configure network policies for VPN clients (multilink and bandwidth allocation, IP filters, encryption, IP addressing); manage NPS templates; import and export NPS policies
Configure Network Access Protection (NAP).
Configure System Health Validators (SHVs); configure health policies; configure NAP enforcement using DHCP and VPN; configure isolation and remediation of non-compliant computers using DHCP and VPN; configure NAP client settings
Configure and Manage Active Directory
Configure service authentication.
Create and configure Service Accounts; create and configure Group Managed Service Accounts; create and configure Managed Service Accounts; configure Kerberos delegation; manage Service Principal Names (SPNs)
Configure Domain Controllers.
Configure Universal Group Membership Caching (UGMC); transfer and seize operations masters; install and configure a read-only domain controller (RODC); configure Domain Controller cloning
Maintain Active Directory.
Back up Active Directory and SYSVOL; manage Active Directory offline; optimize an Active Directory database; clean up metadata; configure Active Directory snapshots; perform object- and container-level recovery; perform Active Directory restore
Configure account policies.
Configure domain user password policy; configure and apply Password Settings Objects (PSOs); delegate password settings management; configure local user password policy; configure account lockout settings
Configure and Manage Group Policy
Configure Group Policy processing.
Configure processing order and precedence; configure blocking of inheritance; configure enforced policies; configure security filtering and WMI filtering; configure loopback processing; configure and manage slow-link processing; configure client-side extension (CSE) behavior
Configure Group Policy settings.
Configure settings including software installation, folder redirection, scripts, and administrative template settings; import security templates; import custom administrative template file; convert administrative templates using ADMX Migrator; configure property filters for administrative templates
Manage Group Policy objects (GPOs).
Back up, import, copy, and restore GPOs; create and configure Migration Table; reset default GPOs; delegate Group Policy management
Configure Group Policy preferences.
Configure Group Policy Preferences (GPP) settings including printers, network drive mappings, power options, custom registry settings, Control Panel settings, Internet Explorer settings, file and folder deployment, and shortcut deployment; configure item-level targeting
Configure and Manage High Availability
Configure Network Load Balancing (NLB).
Install NLB nodes; configure NLB prerequisites; configure affinity; configure port rules; configure cluster operation mode; upgrade an NLB cluster
Configure failover clustering.
Configure Quorum; configure cluster networking; restore single node or cluster configuration; configure cluster storage; implement Cluster Aware Updating; upgrade a cluster
Manage failover clustering roles.
Configure role-specific settings including continuously available shares; configure VM monitoring; configure failover and preference settings
Manage Virtual Machine (VM) movement.
Perform Live Migration; perform quick migration; perform storage migration; import, export, and copy VMs; migrate from other platforms (P2V and V2V)
Configure File and Storage Solutions
Configure advanced file services.
Configure NFS data store; configure BranchCache; configure File Classification Infrastructure (FCI) using File Server Resource Manager (FSRM); configure file access auditing
Implement Dynamic Access Control (DAC).
Configure user and device claim types; implement policy changes and staging; perform access-denied remediation; configure file classification
Configure and optimize storage.
Configure iSCSI Target and Initiator; configure Internet Storage Name server (iSNS); implement thin provisioning and trim; manage server free space using Features on Demand
Implement Business Continuity and Disaster Recovery
Configure and manage backups.
Configure Windows Server backups; configure Windows Online backups; configure role-specific backups; manage VSS settings using VSSAdmin; create System Restore snapshots
Recover servers.
Restore from backups; perform a Bare Metal Restore (BMR); recover servers using Windows Recovery Environment (Win RE) and safe mode; apply System Restore snapshots; configure the Boot Configuration Data (BCD) store
Configure site-level fault tolerance.
Configure Hyper-V Replica including Hyper-V Replica Broker and VMs; configure multi-site clustering including network settings, Quorum, and failover settings
Configure Network Services
Implement an advanced Dynamic Host Configuration Protocol (DHCP) solution.
Create and configure superscopes and multicast scopes; implement DHCPv6; configure high availability for DHCP including DHCP failover and split scopes; configure DHCP Name Protection
Implement an advanced DNS solution.
Configure security for DNS including DNSSEC, DNS Socket Pool, and cache locking; configure DNS logging; configure delegated administration; configure recursion; configure netmask ordering; configure a GlobalNames zone
Deploy and manage IPAM.
Configure IPAM manually or by using Group Policy; configure server discovery; create and manage IP blocks and ranges; monitor utilization of IP address space; migrate to IPAM; delegate IPAM administration; manage IPAM collections
Configure the Active Directory Infrastructure
Configure a forest or a domain.
Implement multi-domain and multi-forest Active Directory environments including interoperability with previous versions of Active Directory; upgrade existing domains and forests including environment preparation and functional levels; configure multiple user principal name (UPN) suffixes
Configure trusts.
Configure external, forest, shortcut, and realm trusts; configure trust authentication; configure SID filtering; configure name suffix routing
Configure sites.
Configure sites and subnets; create and configure site links; manage site coverage; manage registration of SRV records; move domain controllers between sites
Manage Active Directory and SYSVOL replication.
Configure replication to Read-Only Domain Controllers (RODCs); configure Password Replication Policy (PRP) for RODCs; monitor and manage replication; upgrade SYSVOL replication to Distributed File System Replication (DFSR)
Configure Identity and Access Solutions
Implement Active Directory Federation Services 2.1 (AD FSv2.1).
Implement claims-based authentication including Relying Party Trusts; configure Claims Provider Trust rules; configure attribute stores including Active Directory Lightweight Directory Services (AD LDS); manage AD FS certificates; configure AD FS proxy; integrate with Cloud Services
Install and configure Active Directory Certificate Services (AD CS).
Install an Enterprise Certificate Authority (CA); configure CRL distribution points; install and configure Online Responder; implement administrative role separation; configure CA backup and recovery
Manage certificates.
Manage certificate templates; implement and manage certificate deployment, validation, and revocation; manage certificate renewal; manage certificate enrollment and renewal to computers and users using Group Policies; configure and manage key archival and recovery
Install and configure Active Directory Rights Management Services (AD RMS).
Install a licensing or certificate AD RMS server; manage AD RMS Service Connection Point (SCP); manage AD RMS client deployment; manage Trusted User Domains; manage Trusted Publishing Domains; manage Federated Identity support; manage RMS templates; configure Exclusion Policies
Course Prerequisites: Student should have basic knowledge of Computer Hardware. NTMS hardware course is recommended.
Course Materials: Course materials are provided in your USB/harddisk.
Course Contents: This course content is subject to change at any time without prior notice and at the sole discretion of NTMS.
Ex-students of MCITP batch, can avail of 50% discount in above course.
Classroom - Regular | ||||
When | Duration | Where | Remarks | Price |
18th January, 2014 (10:30 AM - 4:00 PM) Sat |
Not Specified | All Venues | Not Specified | Price On Request |
3rd February, 2014 (8:00 PM - 10:00 PM) |
Not Specified | All Venues | Not Specified | Price On Request |
9th March, 2014 (7:30 AM - 12:30 PM) Sun |
Not Specified | All Venues | Not Specified | Price On Request |
Price Notes: Ex-students of MCITP batch, can avail of 50% discount in above course. |
NTMS Training Institute
Founded 1998
Name of Trainers(Current & past): Sanjay Dubey, Sunesh Medhi, Shashikant Patil, Shabbir, Prashant Talele, Prashant Jadhav, Mayur Shetye, Nachiket, Jyoti, Makrand, Parag, Meghana, Ashwini, Pallavi, Ajay,.Erusinol & Vikas
Description
The ultimate goal of our IT training courses is to help students to improve their technical skills and prepare them to advance in their professional life. Our training is job oriented designed to prepare you to sit for MCITP or Cisco certification exams and real solutions to improve productivity at work and overcome the real problems (difficult to understand technologies,Job interviews,exam,self-confidence ) faced by students. The NTMS class is gained through word of mouth recommendations - a proof we feel to our quality of service and reputation.
Mission
The task of the excellent teacher is to stimulate "apparently ordinary" people to unusual effort. The tough problem is not in identifying winners: it is in making winners out of ordinary people. Training is a mixture of theory and practicals to give the student the confidence to master the skills necessary to pass the IT certification exam but also to put them to use on live networks.
Awards Success of students are our awards.
Courses Computer Hardware,MCITP,CCNA/CCNP, ADS,Linux,MS Exchange, Cloud and Security