MCSE

mcse-cover

Successsful Careeer

RSTForum has trained more than 100,000 students to date. Many students have gone on to successful careers in a variety of industries, while others have harnessed the entrepreneurial spirit and knowledge they acquired in RST Forum to start their own businesses and create new jobs.

Labs on cloud

RSTForum uses Cloud computing to efficiently provide “Platform As A Service” (PAAS) to its students enabling them to quickly access Technology Racks over the internet and practice lab exercise from home These Racks are populated with latest equipment's required for practical exercises'.

Web Forums

RST Forum’s web based forum allows its users to ask, hundreds of technical experts about their technology and certification problem. RST forum is a tight knit community of working professionals that provide timely help on technical, certification and design related queries.

Microsoft Certified Solution Expert

Introduction

The Microsoft Certified Solutions Expert (MCSE): Server Infrastructure certification validates your ability to build comprehensive server infrastructure solutions. Show that you have the skills needed to run a highly efficient and modern datacenter, with expertise in identity management, systems management, virtualization, storage, and networking RSTForum has a comprehensive training program to obtain skills to become Certified in MCSE 2012 Server Infrastructure

 

The program is organized with the objective to help  students gain employment in the technology industry. MCSE Course focuses on a skill level and creating the ability to design and build technology solutions in the cloud and on premises, which may include integrating multiple technology products. The Microsoft Certified Solutions Expert certification requires recertification every three years.

This Course Includes following Certification Exams:

  • 70-410: Installing and Configuring Windows Server 2012
  • 70-411: Administering Windows Server 2012
  • 70-412: Configuring Advanced Windows Server 2012 Services
  • 70-413: Designing and Implementing a Server Infrastructure
  • 70-414: Implementing an Advanced Server Infrastructure
Course Highlights

This 30 day (Weekdays – 2.5hrs.) OR 12-week (Sunday/Saturday) instructor led MCSE course is designed to provide professionals with extensive server knowledge to accomplish their day to day job and MCSE certifications. The key to a high success rate is based on the program’s objectives as follows:

  • Course contents are based on MICROSOFT guide lines
  • Dedicated Monitoring to evaluate candidates’ progress
  • Extensive hands-on lab exercises
  • Regular evaluation
  • Industry Experienced Certified instructors
  • The MCSE module is designed to meet the objective of the MCSE program.
  • The course is customized keeping in mind the ultimate aim of achieving technology expertise and MCSE certification.  
  • Assigned project manager will manage this program and drive the program from its registration stage to monitoring and tracking of the candidates’ performance.
  • Curriculum is based on MCSE course outlines
  • The Instructor-led certified course is designed for the MCSE candidates with an aim to build theoretical knowledge supplemented by ample hands-on lab exercises
  • 12 week or 30 days, of intensive training.
  • Courseware includes course kits and other reference material to enable students to prepare for MCSE certification exams.
  • Optimal balance of theory classes and practical labs every week to ensure maximum absorption of technology by participants
  • Customized tests at the end of course to be attempted by every participant
  • Stringent passing standards with progress report of each participant
  • Facility of Lab on cloud available.(based on booking)
  • Repeating of lectures allowed.
Course Objectives

After completing this Course, students will be able to:

  • Implement server upgrade and migration.
  • Design an automated server installation strategy.
  • Plan and implement file, storage services and  server deployment infrastructure.
  • Design and implement a Dynamic Host Configuration Protocol (DHCP) solution.
  • Design a name resolution solution strategy.
  • Design and manage an IP address management solution.
  • Design a VPN solution and a Direct Access solution.
  • Implement a scalable remote access solution.
  • Design and implement a network protection solution.
  • Design and implement a forest and domain infrastructure.
  • Design a Group Policy strategy.
  • Design an Active Directory permission model and  sites topology.
  • Design a domain controller strategy.
  • Design and implement a branch office infrastructure
  • Plan and implement server virtualization strategy.
  • Plan and implement networks and storage for virtualization.
  • Plan and deploy virtual machines and manage virtual machine deployment.
  • Plan and implement a server monitoring strategy.
  • Plan and implement high availability for file services and applications.
  • Plan and implement a highly available infrastructure using failover clustering.
  • Plan and implement an server updates infrastructure.
  • Plan and implement a business continuity strategy.
  • Plan and implement a public key infrastructure (PKI).
  • Plan and implement an identity federation infrastructure.
  • Plan and Implement an information rights management infrastructure.
Course Topics

Following Topics will be covered in  MCSE Course.

70-410, COURSE OUTLINE:

MODULE 1 :

Deploying and Managing Windows Server 2012.This module introduces students to the editions of Windows Server 2012 and the new Windows Server 2012 management tools. It also covers how to install Windows Server 2012, how to perform post-deployment tasks, and how to perform basic administrative tasks.

LESSONS :

  • Windows Server 2012 Overview
  • Installing Windows Server 2012
  • Post-Installation Configuration of Windows Server 2012
  • Overview of Windows Server 2012 Management
  • Introduction to Windows PowerShell

LAB :

  • Deploying and Managing Windows Server 2012Deploying Windows Server 2012
  • Configuring Windows Server 2012 Server Core
  • Managing Servers
  • Using Windows PowerShell to Manage Servers
  • After completing this module, students will be able to:
  • Describe Windows Server 2012.
  • Install Windows Server 2012.
  • Perform post‑installation configuration of Windows Server 2012.
  • Describe the management tools available in Windows Server 2012.
  • Perform basic administrative tasks using Windows PowerShell

MODULE 2 :

Introduction to Active Directory Domain Services This module covers the structure of Active Directory Domain Services (AD DS) and its various components, such as forest, domain, and organizational units (OUs). It also gives an overview of domain controllers, in addition to choices that are available with Windows Server 2012 for installing AD DS on a server.

LESSONS :

  • Overview of AD DS
  • Overview of Domain Controllers
  • Installing a Domain Controller

LAB :

  • Installing a Domain Controller
  • Installing a Domain Controller by Using IFM

MODULE 3 :

Managing Active Directory Domain Services Objects, This module describes how to manage user accounts and computer accounts, including how to manage various consumer devices that employees use. The module also covers how to manage an enterprise network by managing groups, and how to delegate administrative tasks to designated users or groups.

LESSONS :

  • Managing User Accounts
  • Managing Groups
  • Managing Computer Accounts
  • Delegating Administration

LAB :

  • Managing Active Directory Domain Services Objects
  • Delegating Administration for a Branch Office
  • Creating and Configuring User Accounts in AD DS
  • Managing Computer Objects in AD DS

MODULE 4:

Automating Active Directory Domain Services Administration. This module describes how to use command‑line tools and Windows PowerShell to automate AD DS administration. It discusses various command-line tools and Windows PowerShell commands, and then describes how to use these tools and commands to modify objects individually and in bulk operations.

LESSONS :

  • Using Command-line Tools for AD DS Administration
  • Using Windows PowerShell for AD DS Administration
  • Performing Bulk Operations with Windows PowerShell

LAB :

  • Automating AD DS Administration by Using Windows PowerShell
  • Creating User Accounts and Groups by Using Windows PowerShell
  • Using Windows PowerShell to Create User Accounts in Bulk
  • Using Windows PowerShell to Modify User Accounts in Bulk

MODULE 5:

Implementing IPv4  This module discusses using IPv4, which is the network protocol used on the Internet and on local area networks. In this module, students learn how to implement an IPv4 addressing scheme and how to troubleshoot network communication. This module also covers how to determine and troubleshoot network-related problems.

LESSONS :

  • Overview of TCP/IP
  • Understanding IPv4 Addressing
  • Subnetting and Supernetting
  • Configuring and Troubleshooting IPv4

LAB :

  • Identifying Appropriate Subnets
  • Troubleshooting IPv4

MODULE 6:

Implementing Dynamic Host Configuration Protocol, This module covers supporting and troubleshooting a Windows Server–based network infrastructure by deploying, configuring, and troubleshooting the Dynamic Host Configuration Protocol (DHCP) server role.

LESSONS :

  • Overview of the DHCP Server Role
  • Configuring DHCP Scopes
  • Managing a DHCP Database
  • Securing and Monitoring DHCP

LAB :

  • Implementing DHCP
  • Implementing a DHCP Relay Agent (Optional Exercise)

MODULE 7:

This module describes name resolution for Windows operating system clients and Windows Server servers. It also covers installing and configuring a DNS Server service and its components.

LESSONS :

  • Name Resolution for Windows Clients and Servers
  • Installing a DNS Server
  • Managing DNS Zones

LAB :

  • Installing and Configuring DNS
  • Creating Host Records in DNS
  • Managing the DNS Server Cache

MODULE 8:

Implementing IPv6, This module discusses the features and benefits of IPv6, how IPv6 affects IPv4 networks, and how to integrate IPv6 into IPv4 networks by using various transition technologies.

LESSONS :

  • Overview of IPv6
  • IPv6 Addressing
  • Coexistence with IPv4
  • IPv6 Transition Technologies

LAB :

  • Configuring an IPv6 Network
  • Configuring an ISATAP Router

MODULE 9:

Implementing Local Storage

This module introduces several different storage technologies. It discusses how to implement the storage solutions in Windows Server 2012, and how to use the new Storage Spaces feature, which enables you to combine disks into pools that you can configure for automatic management.

LESSONS :

  • Overview of Storage
  • Managing Disks and Volumes
  • Implementing Storage Spaces

LAB :

  • Installing and Configuring a New Disk
  • Resizing Volumes
  • Configuring a Redundant Storage Space

MODULE 10:

Implementing File and Print Services, This module discusses how to provide file and print resources with Windows Server 2012. It describes how to secure files and folders, how to protect previous versions of files and folders by using shadow copies, and how to give workers remote access to corporate files by implementing the new Work Folders role service. It also describes new network printing features that help manage the network printing environment

LESSONS :

  • Securing Files and Folders
  • Protecting Shared Files and Folders by Using Shadow Copies
  • Configuring Work Folders
  • Configuring Network Printing

LAB :

  • Creating and Configuring a File Share
  • Configuring Shadow Copies
  • Enabling and Configuring Work Folders
  • Creating and Configuring a Printer Poo

MODULE 11:

This module provides an overview of Group Policy and provides details about how to implement Group Policy.

LESSONS :

  • Overview of Group Policy
  • Group Policy Processing
  • Implementing a Central Store for Administrative Templates

LAB :

  • Configuring a central store
  • Creating GPOs

MODULE 12:

Securing Windows Servers Using Group Policy Objects, This module describes Windows Server 2012 operating system security. It covers how to identify security threats, plan your strategy to mitigate security threats, and secure your Windows Server 2012 infrastructure.

LESSONS :

  • Security Overview for Windows Operating Systems
  • Configuring Security Settings and Restricting Software
  • Configuring Windows Firewall with Advanced Security

LAB :

  • Using Group Policy to Secure Member Servers
  • Auditing File System Access and Domain Logons
  • Configuring AppLocker Policies and Configuring Windows Firewall

MODULE 13:

Implementing Server Virtualization with Hyper-V, This module describes virtualization technologies available on Windows, specifically focusing on the Hyper-V role in Windows Server 2012 and Windows Server 2012 R2. It covers the components of the Hyper-V role, configuring and deploying the role, in addition to and how to configure and manage key components of a Hyper-V implementation, such as Storage and Networking.

LESSONS :

  • Overview of Virtualization Technologies
  • Implementing Hyper-V
  • Managing Virtual Machine Storage and Managing Virtual Networks

LAB :

  • Installing the Hyper-V Role onto a Server
  • Configuring Virtual Networking
  • Creating and Configuring a Virtual Machine
  • Using Virtual Machine Checkpoints

70-411, COURSE OUTLINE:

MODULE 1:

Deploy and manage server images

  • Install the Windows Deployment Services (WDS) role
  • Configure and manage boot, install, and discover images
  • Update images with patches, hotfixes, and drivers
  • Install features for offline images
  • Configure driver groups and packages *(New Topic)
  • Implement patch management
  • Install and configure the Windows Server Update Services (WSUS) role
  • Configure group policies for updates
  • Configure client-side targeting
  • Configure WSUS synchronization
  • Configure WSUS groups
  • Manage patch management in mixed environments *(New Topic)
  • Monitor servers
  • Configure Data Collector Sets (DCS)
  • Configure alerts; monitor real-time performance
  • Monitor virtual machines (VMs)
  • Monitor events
  • Configure event subscriptions
  • Configure network monitoring
  • Schedule performance monitoring *(New Topic)

MODULE 2:

Configure file and print services

  • Configure Distributed File System (DFS)
  • Install and configure DFS namespaces
  • Configure DFS Replication Targets
  • Configure Replication Scheduling
  • Configure Remote Differential Compression settings
  • Configure staging; configure fault tolerance
  • Clone a DFS database *(New Topic)
  • Recover DFS databases *(New Topic)
  • Optimize DFS replication *(New Topic)
  • Configure File Server Resource Manager (FSRM)
  • Install the FSRM roles
  • Configure quotas
  • Configure file screens
  • Configure reports
  • Configure file management tasks *(New Topic)
  • Configure file and disk encryption
  • Configure Bitlocker encryption
  • Configure the Network Unlock feature
  • Configure Bitlocker policies
  • Configure the EFS recovery agent
  • Manage EFS and Bitlocker certificates including backup and restore
  • Configure advanced audit policies
  • Implement auditing using Group Policy and AuditPol.exe
  • Create expression-based audit policies
  • Create removable device audit policies

MODULE 3:

Configure DNS zones

  • Configure primary and secondary zones
  • Configure stub zones
  • Configure conditional forwards
  • Configure zone and conditional forward storage in Active Directory
  • Configure zone delegation and zone transfer settings
  • Configure DNS records
  • Create and configure DNS (RR) including A, AAAA, PTR, SOA, CNAME, and MX records
  • Configure zone scavenging
  • Configure record options including Time To Live (TTL) and weight
  • Configure round robin
  • Configure secure dynamic updates

Configure VPN and routing

  • Install and configure the Remote Access role
  • Implement Network Address Translation (NAT)
  • Configure VPN settings
  • Configure remote dial-in settings for users
  • Configure routing
  • Configure Web Application proxy in passthrough mode *(New Topic)

Configure DirectAccess

  • Implement server requirements
  • Implement client configuration
  • Configure DNS for Direct Access
  • Configure certificates for Direct Access

MODULE 4:

Configure Network Policy Server

  • Configure a RADIUS server, including RADIUS proxy
  • Configure RADIUS clients
  • Configure NPS templates *(New Topic)
  • Configure RADIUS accounting
  • Configure certificates

Configure NPS policies

  • Configure connection request policies
  • Configure network policies for VPN clients
    • Multilink and bandwidth allocation
    • IP filters
    • Encryption
    • IP addressing
  • Manage NPS templates
  • Import and export NPS policies

Configure Network Access Protection (NAP)

  • Configure System Health Validators (SHVs)
  • Configure health policies
  • Configure NAP enforcement using DHCP and VPN
  • Configure isolation and remediation of non-compliant computers using DHCP
  • Configure NAP client settings

MODULE 5:

  • Configure service authentication
  • Create and configure Service Accounts,
  • Create and configure Group Managed Service Accounts,
  • Configure Kerberos delegation,
  • Manage Service Principal Names (SPNs),
  • Configure virtual accounts
  • Configure domain controllers
  • Transfer and seize operations master roles,
  • Install and configure a read-only domain controller (RODC),
  • Configure domain controller cloning
  • Maintain Active Directory
  • Back up Active Directory and SYSVOL,
  • Manage Active Directory offline, optimise an Active Directory database, metadata
  • Configure Active Directory snapshots.
  • Configure account policies
  • Configure domain and local user password policy settings,
  • Configure and apply Password Settings Objects (PSOs),
  • Delegate password settings management, configure account lockout policy
  • Configure Kerberos policy settings

MODULE 6:

Configure Group Policy processing

  • Configure processing order and precedence
  • Configure blocking of inheritance
  • Configure enforced policies
  • Configure security filtering and WMI filtering
  • Configure loopback processing
  • Configure and manage slow-link processing
  • Configure client-side extension (CSE) behavior
  • Force Group Policy update *(New Topic)
  • Configure and manage slow-link process and Group Policy caching *(New Topic)

Configure Group Policy settings

  • Configure settings for software installation, folder redirection, scripts, and administrative template setting
  • Import security templates and custom administrative template file
  • Convert administrative templates using ADMX Migrator
  • Configure property filters for administrative templates

Manage Group Policy objects (GPOs)

  • Back up, import, copy, and restore GPOs
  • Create and configure Migration Table
  • Reset default GPOs
  • Delegate Group Policy management

Configure Group Policy preferences

  • Configure Group Policy Preferences (GPP) settings
    • Printer, Network drive mappings, Power options, Custom registry settings, Control Panel settings, Internet Explorer settings, File and folder deployment and Shortcut deployment

70-412, COURSE OUTLINE:

MODULE 1:

Configure Network Load Balancing (NLB)

  • Install NLB nodes and configure NLB prerequisites
  • Configure affinity
  • Configure port rules
  • Configure cluster operation mode and upgrade an NLB cluster

Configure failover clustering

  • Configure quorum
  • Configure cluster networking
  • Restore single node or cluster configuration
  • Configure cluster storage and implement Cluster-Aware Updating
  • Upgrade a cluster
  • Configure and optimize clustered shared volumes* (New Topic)
  • Configure clusters without network names* (New Topic)
  • Configure storage spaces* (New Topic)

Manage failover clustering roles

  • Configure role-specific settings
  • Including continuously available shares
  • Configure virtual machine (VM) monitoring
  • Configure failover and preference settings
  • Configure guest clustering* (New Topic)

Manage VM movement

  • Perform live and quick migration
  • Perform storage migration
  • Import, export, and copy VMs
  • Configure VM network health protection* (New Topic)
  • Configure drain on shutdown* (New Topic)

MODULE 2:

Configure advanced file services  

  • Configure Network File System (NFS) data store
  • Configure Branch Cache
  • Configure File Classification Infrastructure (FCI) using File Server Resource
  • Configure file access auditing

Implement Dynamic Access Control (DAC)

  • Configure user and device claim types
  • Implement policy changes and staging
  • Perform access-denied remediation
  • Configure file classification
  • Create and configure Central Access rules and policies*(New Topic)
  • Create and configure resource properties and lists* (New Topic)
  • Configure and optimize storage
  • Configure iSCSI target and initiator
  • Configure Internet Storage Name server (iSNS)
  • Implement thin provisioning and trim
  • Manage server free space using Features on Demand
  • Configure tiered storage* (New Topic)

MODULE 3:

Configure and manage backups  

  • Configure Windows Server backups
  • Configure Microsoft Azure backups and role-specific backups
  • Manage VSS settings using VSSAdmin

Recover servers

  • Restore from backups
  • Perform a Bare Metal Restore (BMR)
  • Recover servers using Windows Recovery Environment (Win RE) and safe mode
  • Configure the Boot Configuration Data (BCD) store

Configure site-level fault tolerance

  • Hyper-V Replica including Hyper-V Replica Broker and VMs
  • Configure multi-site clustering, including network settings, Quorum, failover configure Hyper-V Replica extended replication* (New Topic)
  • Configure Global Update Manager* (New Topic)
  • Recover a multi-site failover cluster* (New Topic)

Configure Group Policy preferences

  • Configure Group Policy Preferences (GPP) settings
  • Printer, Network drive mappings, Power options, Custom registry settings, Control Panel settings, Internet Explorer settings, File and folder deployment and Shortcut deployment

MODULE 4:

Implement an advanced Dynamic Host Configuration Protocol (DHCP) solution

  • Create and configure superscopes and multicast scopes
  • Implement DHCPv6
  • Configure high availability for DHCP, including DHCP failover, split scopes
  • Configure DHCP Name Protection
  • Configure DNS registration*

Implement an advanced DNS solution

  • Configure security for DNS, including Domain Name System Security Extensions (DNSSEC), DNS Socket Pool, cache locking
  • Configure DNS logging
  • Configure delegated administration
  • Configure recursion
  • Configure netmask ordering
  • Configure a GlobalNames zone
  • Analyze zone level statistics* (New Topic)

Deploy and manage IP Address Management (IPAM)

  • Provision IPAM manually or by using Group Policy
  • Configure server discovery
  • Create and manage IP blocks and ranges
  • Monitor utilization of IP address space
  • Migrate to IPAM
  • Delegate IPAM administration
  • Manage IPAM collections

MODULE 5:

Configure a forest or a domain

  • Implement multi-domain and multi-forest Active Directory environments interoperability with previous versions of Active Directory
  • upgrade existing domains and forests, including, environment preparation and l levels
  • configure multiple user principal name (UPN) suffixes

Configure trusts

  • Configure external, forest, shortcut, and realm trusts
  • Configure trust authentication
  • Configure SID filtering
  • Configure name suffix routing

Configure sites

  • Configure sites and subnets
  • Create and configure site links
  • Manage site coverage
  • Manage registration of SRV records
  • Move domain controllers between sites

Manage Active Directory and SYSVOL replication

  • Configure replication to Read-Only Domain Controllers (RODCs)
  • Configure Password Replication Policy (PRP) for RODC
  • Monitor and manage replication
  • Upgrade SYSVOL replication to Distributed File System Replication (DFSR)

MODULE 6:

Implement Active Directory Federation Services (AD FS)

  • Install AD FS* (New Topic)
  • Implement claims-based authentication, including, Relying Party Trusts
  • Configure authentication policies* (New Topic)
  • Configure Workplace Join* (New Topic)
  • Configure multi-factor authentication*(New Topic)

Install and configure Active Directory Certificate Services (AD CS)

  • Install an Enterprise Certificate Authority (CA)
  • Configure certificate revocation lists (CRL) distribution points
  • Install and configure Online Responder
  • Implement administrative role separation
  • Configure CA backup and recovery

Manage certificates

  • Manage certificate templates
  • Implement and manage certificate deployment, validation, and revocation
  • Manage certificate enrolment renewal to computers and user
  • Configure and manage key archival and recovery

Install and configure Active Directory Rights Management Services (AD RMS)

  • Install a licensing or certificate AD RMS server
  • Manage AD RMS Service Connection Point (SCP)
  • Manage RMS templates
  • Configure Exclusion Policies
  • Backup and restore AD RMS* (New Topic)

70-413, COURSE OUTLINE:

MODULE 1:

Planning Server Upgrade and Migration, This module explains how to plan a server upgrade and migration strategy Configure failover clustering

LESSONS :

  • Considerations for Upgrades and Migrations
  • Creating a Server Upgrade and Migration Plan
  • Planning for Virtualization

LAB :

  • Planning a Server Upgrade and Migration
  • Planning a Strategy for Server Upgrade and Migration
  • Evaluating Candidates for Server Virtualization

MODULE 2:

Planning and Implementing a Server Deployment Strategy This module explains how to design an automated server installation strategy and plan and implement a server deployment infrastructure.

LESSONS :

  • Selecting an Appropriate Server Deployment Strategy
  • Implementing an Automated Deployment Strategy

LAB :

  • Planning and Implementing a Server Deployment Infrastructure Planning an Automated Server
  • Installation and Deployment Strategy
  • Preparing the Windows Server 2012 R2 Image
  • Deploying Windows Server 2012 R2

MODULE 3:

Planning and Deploying Servers Using Virtual Machine Manager, This module explains how to plan and deploy a Virtual Machine Manager (VMM) infrastructure for deploying servers.

LESSONS :

  • System Center 2012 R2 Virtual Machine Manager Overview
  • Implementing a Virtual Machine Manager Library and Profiles
  • Planning and Deploying Virtual Machine Manager Services

LAB :

  • Planning and Deploying Virtual Machines by Using Virtual Machine Manager
  • Planning Microsoft System Center 2012 R2 Virtual Machine Manager Components
  • Planning Virtual Machine and Service Templates
  • Implementing Virtual Machine Manager Components

MODULE 4:

Designing and Maintaining an IP Configuration and Address Management Solution, This module explains how to design and maintain IP address management (IPAM) and a Dynamic Host Configuration Protocol (DHCP) solution.

LESSONS :

  • Designing DHCP Servers
  • Planning DHCP Scopes
  • Designing an IPAM Provisioning Strategy
  • Managing Servers and Address Spaces by Using IPAM

LAB :

  • Designing and Maintaining an IP Configuration and IP Address Management Solution
  • Planning DHCP to Support Your Proposal
  • Planning an IPAM Deployment
  • Implementing DHCP and IPAM

MODULE 5:

Designing and Implementing Name Resolution, This module explains how to design a name resolution strategy.

LESSONS :

  • Designing a DNS Server Implementation Strategy
  • Designing the DNS Namespace and DNS Zones
  • Designing DNS Zone Replication and Delegation and Optimizing DNS Servers
  • Designing DNS for High Availability and Security

LAB :

  • Designing and Implementing Name Resolution
  • Designing a Strategy for DNS Name Resolution and DNS Server Placement
  • Designing DNS Zones and DNS Zone Replication
  • Implementing DNS

MODULE 6:

Designing and Implementing an Active Directory Domain Services Forest and Domain Infrastructure, This module explains how to design and implement an AD DS forest and domain infrastructure.

LESSONS :

  • Designing an Active Directory Forest
  • Designing and Implementing Active Directory Forest Trusts and Domains
  • Designing Active Directory Integration with Windows Azure Active Directory
  • Designing DNS Namespaces in Active Directory Environments
  • Designing Active Directory Domain Trusts

LAB :

  • Designing and Implementing an Active Directory Domain Services Forest Infrastructure
  • Designing an Active Directory Forest and Domain Infrastructure
  • Implementing Active Directory Forest and Domain Trusts

MODULE 7:

Designing and Implementing an AD DS Organizational Unit Infrastructure, This module explains how to design and implement an OU infrastructure and an AD DS permissions model.

LESSONS :

  • Planning the Active Directory Administrative Tasks Delegation Model
  • Designing an OU Structure
  • Designing and Implementing an AD DS Group Strategy

LAB :

  • Designing and Implementing an Active Directory OU Infrastructure and Delegation Model
  • Designing an Organizational Unit Infrastructure
  • Implementing the OU Design
  • Designing and Implementing an Active Directory Permissions Model

MODULE 8:

Designing and Implementing a Group Policy Object Strategy, This module explains how to design and implement a Group Policy Object (GPO) strategy.

LESSONS :

  • Collecting the Information Required for a GPO Design
  • Designing and Implementing GPOs
  • Designing GPO Processing
  • Planning Group Policy Management

LAB :

  • Designing a GPO Strategy
  • Implementing the GPO Design

MODULE 9:

Designing and Implementing an AD DS Physical Topology, This module explains how to design an AD DS sites topology and a domain controller placement strategy.

LESSONS :

  • Designing and Implementing Active Directory Sites
  • Designing Active Directory Replication
  • Designing the Placement of Domain Controllers
  • Virtualization Considerations for Domain Controllers
  • Designing Highly Available Domain Controllers

LAB :

  • Designing and Implementing an Active Directory Domain Services Physical Topology
  • Designing Active Directory Sites and Replication
  • Planning the Placement of Domain Controllers and Active Directory Replication
  • Implementing Active Directory Sites and Domain Controllers

MODULE 10:

Planning and Implementing Storage and File Services, This module explains how to plan and implement storage and file services.

LESSONS :

  • Planning and Implementing iSCSI SANs
  • Planning and Implementing Storage Spaces
  • Optimizing File Services for Branch Offices

LAB :

  • Planning and Implementing Storage
  • Planning a Storage Solution
  • Implementing iSCSI Storage
  • Configuring a Redundant Storage Space

MODULE 11:

Designing and Implementing Network Protection This module explains how to design and implement network protection.

LESSONS :

  • Overview of Network Security Design
  • Designing and Implementing a Windows Firewall Strategy
  • Designing and Implementing a NAP Infrastructure

LAB :

  • Designing and Implementing Network Protection
  • Designing a Windows Firewall Solution
  • Implementing a Windows Firewall Solution
  • Designing a NAP Solution
  • Implementing NAP with IPsec Enforcement

MODULE 12:

Designing and Implementing Remote Access Services, This module explains how to design and implement remote access services.

LESSONS :

  • Planning and Implementing DirectAccess
  • Planning and Implementing VPN
  • Planning and Implementing Web Application Proxy
  • Planning a Complex Remote Access Infrastructure

LAB :

  • Designing and Implementing Network Access Services
  • Designing a Remote Access Strategy
  • Planning and Implementing a DirectAccess Solution
  • Planning and Implementing a VPN Solution
  • Implementing Web Application Proxy

70-414, COURSE OUTLINE:

MODULE 1:

Design an administrative model

  • Design considerations, including user rights and built-in groups;
  • Design a delegation of administration structure for Microsoft System Centre
  • Design self-service portals by using System Centre Service Manager;
  • Delegate rights for managing private cloud by using AppController and System
  • Virtual Machine Manager

Design a monitoring strategy

  • Design considerations including monitoring servers using Audit Collection and System Centre Global Service Monitor,
  • Performance monitoring, application monitoring,
  • Centralized monitoring, and centralized reporting;
  • Implement and optimize System Centre 2012 – Operations Manager plan for         
  • Managing Active Directory

Plan and implement automated remediation

  • Create an Update Baseline in Virtual Machine Manager;
  • Implement a Desired Configuration Management (DCM) Baseline;
  • Implement Virtual Machine Manager integration with Operations Manager;
  • Configure Virtual Machine Manager to move a VM dynamically based on policy
  • Integrate System Centre 2012 for automatic remediation into your existing infrastructure

MODULE 2:

Plan and implement failover clustering

  • Plan for and implement multi-node and multi-site clustering including the use of networking storage, name resolution, and Global Update Manager (GUM);
  • Design considerations including redundant networks, network priority settings, failover and failback, heartbeat and DNS settings, Quorum configuration, storage
  • Placement and replication, and cluster aware updates

Plan and implement highly available network services

  • Plan for and configure Network Load Balancing (NLB);
  • Design considerations including fault-tolerant networking, multicast vs. unicast configuration, state management, and automated deployment of NLB using Virtual Machine Manager service templates

Plan and implement highly available storage solutions

  • Plan for and configure storage spaces and storage pools; design highly available, replica DFS namespaces;
  • Plan for and configure multi-path I/O (MPIO);
  • Configure highly available iSCSI Target and iSNS Server;
  • Plan for and implement storage using SMB multi-channel

Plan and implement highly available roles

  • Plan for a highly available Dynamic Host Configuration Protocol (DHCP) Server, clustering, Continuously Available File Shares, and a DFS Namespace Server;
  • Plan for and implement highly available applications, services and scripts using  Application, Generic Script and Generic Service clustering roles

Plan and implement a business continuity and disaster recovery solution

  • Plan a backup and recovery strategy;
  • Planning considerations including Active Directory domain and forest recovery, replica including using Microsoft Azure Hyper-V Recovery Manager, restore and cloning, and Active Directory object and container restore using authoritative restore and Recycle Bin;
  • Plan for and implement backup and recovery by using System Centre Data Protection Manager

MODULE 3:

Plan and implement virtualization hosts

  • Plan for and implement delegation of virtualization environment (hosts, services and VMs), including self-service capabilities;
  • Plan and implement multi-host libraries including equivalent objects; plan for and implement host resource; optimization;
  • Integrate third-party virtualization platforms; deploying Hyper-V hosts to bare metal
  • Plan and implement virtual machines
  • Plan for and implement highly available VMs; plan for and implement guest resource optimization including shared VHDx; configure placement rules;
  • Create Virtual Machine Manager templates

Plan and implement virtualization networking

  • Plan for and configure Virtual Machine Manager logical networks, including virtual switch extensions and logical switches;
  • Plan for and configure IP address and MAC address settings across multiple Hyper-V hosts, including network virtualization; and configure virtual network optimization;
  • Plan and implement Windows Serer Gateway;
  • Plan and implement VLANs and pVLANs;
  • Plan and implement Virtual Machine(VM) networks;
  • Plan and implement converged networks

Plan and implement virtualization storage

  • Plan for and configure Hyper-V host clustered storage;
  • Plan for and configure Hyper-V virtual machine storage including virtual Fiber Channel, iSCSI and shared VHDx;storage optimization;
  • Plan and implement storage using SMB 3.0 file

Plan and implement virtual machine movement

  • Plan for and configure live and storage migration between Hyper-V hosts;
  • Plan for and manage P2V and V2V;
  • Plan and implement virtual machine migration between clouds

Manage and maintain a server virtualization infrastructure

  • Manage dynamic optimization and resource optimization;
  • Integrate Operations Manager with System Centre Virtual Machine Manager and System Centre Service Manager
  • Update virtual machine images in libraries;
  • Plan for and implement recovery of virtualization infrastructure by using System Centre Data Protection Manager (DPM)

MODULE 4:

Design a Certificate Services infrastructure

  • Design a multi-tier Certificate Authority (CA) hierarchy with offline root CA;
  • Plan for multi-forest CA deployment; plan for Certificate Enrolment Web Services and Certificate Enrolment Policy Web services;
  • Plan for Network Device Enrolment Services;
  • Plan for certificate validation and revocation; plan for disaster recovery;
  • Plan for trust between organizations including Certificate Trust Lists (CTL), cross certifications and bridge CAs

Implement and manage a Certificate Services infrastructure

  • Configure and manage offline root CA;
  • Configure and manage Certificate Enrolment Web Services and  Certificate Enrolment Policy Web Services;
  • Configure and manage Network Device Enrolment Services;
  • Configure Online Certificates Status Protocol (OSPF) responders;
  • Migrate CA; implement administrator  role separation;
  • Implement and manage trust between organizations including Certificate Trust Lists (CTL), cross certifications and bridge CAs;
  • Monitor CA health

Implement and manage certificates

  • Manage certificate templates;
  • Implement and manage certificate deployment, validation, renewal,  revocation and publishing including Internet-based clients, CAs and network devices;
  • Configure and  manage key archival and recovery

Design and implement a federated identity solution

  • Plan for and implement claims-based authentication including planning and implementing Relying Party  Trusts;
  • Plan for and configure Claims Provider and Relying Party Trust claim rules; plan for and configure attribute stores including Active Directory Lightweight Directory Services (AD LDS);
  • Plan  for and manage Active Directory Federation Services (AD FS) certificates;
  • Plan for and implement  Identity Integration with cloud services;
  • Integrate Web ApplicationProxy with AD FS

Design and implement Active Directory Rights Management Services (AD RMS)

  • Plan for highly available AD RMS deployment; plan for AD RMS client deployment;
  • Manage Trusted User Domains;manage Trusted Publishing Domains;
  • Manage Federated Identity support; upgrade or migrate  ADRMS;
  • Decommission ADRMS
Lab Topics

Enroll for this course now and get ahead in your career.

Course Fees:

₹13500

Enroll Now

Virtual Classroom

  • Instructor led online training is an ideal vehicle for delivering training to individuals anywhere in the world at any time.
  • This innovative approach presents live content with instructor delivering the training online.
  • Candidates will be performing labs remotely on our labs on cloud in presence of an online instructor.
  • Rstforum uses microsoft lync engine to deliver instructor led online training.
  • Advances in computer network technology, improvements in bandwidth, interactions, chat and conferencing, and realtime audio and video offers unparalleled training opportunities.
  • Instructor led online training can helps today’s busy professionals to perform their jobs and upgrade knowledge by integrating self-paced instructor led online training in their daily routines.

Miscellaneous

  • Minimum batch size required for batch is 10 participants in the this course.
  • The RST Forum reserves the right to cancel/postpone the class.
  • Course schedule will be provided before commencement of the course.
  • Certificate of participation will be awarded to participants with a minimum 90% attendance.
  • All attendees are to observe the Copyright Law on intellectual properties such as software.
  • and courseware from respective vendors.
  • The RST Forum reserves the right to include external participants in the program either for the entire course or individual courses.
  • The RST Forum reserves the right to change/alter the sequence of courses. RST FORUM published Book would be given at 50% discounted rate to the forum students.