Mcitp 2008 Server Syllabus
-
Upload
ashok-kumar-maheshwari -
Category
Documents
-
view
9 -
download
1
description
Transcript of Mcitp 2008 Server Syllabus
MCITP 2008 SERVER Syllabus
Network Essentials
Networking Concepts, History of Server OS
Introduction to windows server 2003 & 2008
Features of Windows Server 2008
Installation of Windows Server 2008
Installation of windows Vista
Introduction and Creation of Users accounts
RODC & Physical Structure of AD-DS
Introduction & Configuration of Read-Only Domain Controller
SITES and Global Catalog
Backup Strategies
Replication between the Domain Controllers
AD-DS Partitions
Active Directory - Domain Services
IP Addressing
Logical Topologies - Peer-Peer & Domain Models
Introduction to Directory Services
Evolution of Active Directory Services - LDAP Protocol
Features of Active Directory
Installing Active Directory – Domain Controller
Dynamic Host Configuration Protocol (DHCP)
Introduction and Configuration of DHCP Server
DHCP Client Configuration
Reservations
BOOTP Server
DHCP Backup
Member Servers, Clients, User Configuration
Configuring Member Servers and Clients.
Creating Users in AD-DS
User Logon policies
Password policies
Account Lockout policies
User properties
Domain Name System (DNS) Internet Basics, Host & LM Host Files
DNS Naming Hierarchy
Lookup Zones - Forward and Reverse lookup Zones
Types of Zones – Primary, Secondary & Stub Zone
Resource Records, Integration with ADS, SRV Records
Terminal Services Terminal Server Configuration
Terminal Server Licensing Mode
Remote Desktop
T.S Web access administration and T.S Remote Apps.
Overview of T.S Gateway service
Internet Information Services IIS 7.0 Configuration
Hosting Websites, Virtual Directories
Backup & Restoring Sites
FTP Server Configuration
User Profile
Types of Profiles
Local, Roaming and Mandatory Profiles
Home Folder
Disk Quotas
Permissions/Access Control Lists File Systems
Security and Sharing Permissions - Folders & Files
Offline Folder
Logical Structure of AD - DS Configuring ADC
Tree Structure - Child Domain
FOREST Structure
Routing & Remote Access Routing Configuration - Static Routes
ICS, NAT, DHCP Relay Agent
Remote Access Server Configuration
Dial-in & Dial-out
VPN - PPTP, L2TP
FSMO Roles of AD - DS Roles of AD - DS
Transferring of Roles
Seizing of Roles
Windows Deployment Services Introduction & Configuration of WDS Server
Attended & Unattended Installation
Distributed File System, Backup & Recovery, Printers Introduction to DFS & File server
Configuring Namespace, Folders etc
Introduction to Backup & Backup media
Types of Backups & Strategies
Recovery of Data from any backup media
Introduction to printers
Types of printers & configuration
Disk Management Basic & Dynamic Disks
Types of Volumes
RAID 0, 1, 5 Levels
Remote Hard disk Partitioning
Mounting Concepts
Active Directory Trusts Introduction to Trust Relationship
Categories, Directions & Types of Trusts
Functional Levels
Authentication Protocols
Configuring Forest Trusts between 2008 Forests
Advanced Topics Windows Server Core
Upgrading windows server 2003 to 2008
Groups, VSS, Paging File
System state backup & restoration
Domain Renaming, Auditing policies
Overview of AD- FS, LDS, RMS, CS
Group Policy / System Policy Organizational Unit, Delegation of Control
User & Computer Policies
Scope of Policies - OU, Domain, Sites
Group policy modeling (RSOP)
Software Deployment
Scripts, Folder Redirection
MCITP Syllabus
MCITP Syllabus. Planning and Maintaining a Microsoft® Windows® Server 2008 Network InfrastructureImplementing and Configuring a Windows Deployment Infrastructure• Deploying Windows in a Windows Server 2008 Environment• Windows Deployment Fundamentals• Windows Deployment Methods• Introducing Windows Deployment Services• Understanding WDS Infrastructure Components• Installing WDS• Configuring WDS• Capturing Images with WDS• Deploying Images with WDS• What Are Virtual Machines?• Virtual PC 2007• Virtual Server 2005 R2 SP1Configuring Server Storage and Clusters• Understanding Server Storage Technologies• Managing Disks, Volumes, and Partitions in Windows Server 2008• Working with Disk Sets• Server Cluster Fundamentals• Configuring an NLB Cluster• Creating a Failover Cluster• Configure Storage• Configure High Availability
Installing and Configuring Terminal Services• Deploying a Terminal Server• Understanding Terminal Services• Enabling Remote Desktop• Installing Terminal Services• Staging the Terminal Server• Introducing the Terminal Services Configuration Console• Configuring Connection (RDP-Tcp) Properties• Configuring Terminal Services Server Properties• Configuring Terminal Services Printer Redirection• Deploy a Terminal Server FarmConfiguring and Managing a Terminal Services Infrastructure.• Configuring and Managing Terminal Services Clients• Configuring Terminal Services Client Settings• Configuring User Profiles for Terminal Services
• Managing Terminal Services User Connections• Managing Resources in Client Sessions• Deploying Terminal Services Gateway• Overview of Terminal Services Gateway• Installing and Configuring a TS Gateway Server• Publishing Applications with TS RemoteApp• Configuring a Server to Host RemoteApp Programs• Adding Programs for Publication in TS RemoteApp Manager• Deploying a RemoteApp Program through TS Web Access• Creating an RDP File of a RemoteApp Program for Distribution• Creating a Windows Installer Package of a RemoteApp Program forDistribution• Deploy a Terminal Services Infrastructure
Installing and Configuring Web Applications• Installing the Web Server (IIS) Role• Understanding Web Server Security• Understanding IIS Components and Options• Understanding the Application Server Role• Understanding IIS 7.0 Role Services• Installing the Web Server (IIS) Role• Using Windows System Resource Manager• Configuring Internet Information Services• Working with IIS Management Tools• Creating and Configuring Web Sites• Understanding Web Applications• Working with Application Pools• Working with Virtual Directories• Using Command-Line Management• Managing Web Server Configuration Files• Migrating From IIS 6.0Managing Web Server Security• Understanding IIS 7 Security Accounts• Managing File System Permissions• Configuring IIS Administration Features• Managing Request Handlers• Managing IIS Security Settings• Managing IIS Authentication• Managing URL Authorization Rules• Configuring Server Certificates• Configuring IP Address and Domain Restrictions• Configuring .NET Trust Levels
• Implementing Web Server Security
Configuring FTP and SMTP Services• Configuring FTP• Installing the FTP Publishing Service• Configuring FTP Sites by Using IIS 6.0 Manager• Installing and Managing FTP 7• Managing FTP Sites• Managing FTP User Security• Configuring FTP Network Security• Managing FTP Site Settings• Using FTP Client Software• Configuring and Testing FTP• Configuring SMTP• Installing the SMTP Server Feature• Configuring SMTP Services• Monitoring SMTP Virtual Servers• Using an SMTP Virtual ServerConfiguring Windows Media Services• Configuring Windows Media Services• Understanding Media Services• Installing Streaming Media Services• Using Windows Media Services Management Tools• Managing Publishing Points• Configuring Source Settings• Creating Announcements• Configuring Publishing Point Properties• Managing Advertising Settings• Configuring Security for Windows Media Services• Enabling Cache/Proxy Features• Protecting Media by Using DRM
Configuring Windows SharePoint Services• Configuring and Managing Windows SharePoint Services• Understanding Windows SharePoint Services• Understanding WSS Deployment Options• Verifying the WSS Installation• Using the SharePoint Central Administration Web Site• Managing SharePoint Operations Settings• Understanding Backup and Recovery for WSS• Deploying and Configuring SharePoint Sites• Managing Web Applications
• Installing Application Templates
Planning, Implementing, and Maintaining a MicrosoftWindows Server 2008 Active Directory InfrastructureInstalling, Upgrading, and Deploying Windows Server 2008• Planning Windows Server 2008 Installation and Upgrade• Selecting the Right Edition of Windows Server 2008• Windows Server 2008 Server Core• Installing Windows Server 2008• Upgrading from Windows Server 2003• Windows Server 2008 Answer Files• Windows Deployment Services• Multicast, Scheduled, and Automatic Deployment• Rollback Preparation• Deployment Services RoleConfiguring Network Connectivity• Using IPv6 in Windows Server 2008• Addressing Problems Caused by IPv4 Limitations• Analyzing the IPv6 Address Structure• Planning an IPv4 to IPv6 Transition Strategy• Implementing IPv4-to-IPv6 Compatibility• Using IPv6 Tools• Configuring Clients Through DHCPv6• Planning an IPv6 Network• Configuring DNS• Using Windows Server 2008 DNS• Examining New DNS Features and Enhancements• Planning a DNS Infrastructure
Active Directory and Group Policy• Windows Server 2008 Active Directory• Introducing the Windows Server 2008 Directory Server Role• Planning Domain and Forest Functionality• Planning Forest-Level Trusts• Raising Domain and Forest Functional Levels and Configuring Fine-Grained Password Policy• Group Policy in Windows Server 2008• Understanding Group Policy• Planning and Managing Group Policy• Troubleshooting Group PolicyApplication Servers and Services• Application Servers
• Planning Application Availability• Ensuring Application Availability• Implementing Application Accessibility• Planning Application Resilience• Application Deployment• Deploying Applications Using System Center Essentials• Using System Center Configuration Manager 2007
Terminal Services and Application and Server Virtualization• Terminal Services• Planning Terminal Server Infrastructure• Terminal Services Licensing• Configuring Terminal Servers• Terminal Services Web Access• Terminal Server Session Broker• Monitoring Terminal Services• Terminal Services Gateway• Server and Application Virtualization• Managing Virtualized Servers• Terminal Services RemoteApp• Microsoft Application VirtualizationFile and Print Servers• Managing File and Print Servers• Planning the File Services Server Role• Managing Access Control• Using FSRM to Configure Quotas and File Screen Policy• Planning the Print Services Server Role• Using DFS Namespace to Plan and Implement a Shared Folder• Structure and Enhance Data Availability• Configuring a DFSR Structure• Configuring Offline Data Access• Configuring Indexing in the Windows Search Service
Windows Server 2008 Management, Monitoring, and Delegation• Server Management Strategies• Tools for the Administration of Windows Server 2008• Remote Administration Technologies• Managing Windows Server 2008 Event Logs• Remotely Managing Windows Server 2008• Monitoring and Optimizing Performance• Reliability and Performance• Optimizing Windows Server 2008 Performance
• Windows System Resource Manager• Data Collector Sets, Reports, and WSRM Policies• Delegating Authority• Delegation Policies• Delegation Procedures• Credential Delegation• Delegating the Management of Applications• Delegating Administrative PermissionsPatch Management and Security• Windows Server 2008 Patch Management Strategies• Deploying Updates with WSUS• Replica Mode and Autonomous Mode• Using Computer Groups• WSUS Client Configuration• Updates and Synchronization Strategies• Update Management and Compliance• Other Patch Management Tools• Monitoring Server Security• Encrypting File System• Windows Firewall with Advanced Security
Remote Access and Network Access Protection• Managing Remote Access• VPN Protocols and Authentication• Network Policy Server• Remote Access Accounting• Terminal Services Gateway Servers• Network Access Protection• System Health Agents and Validators• NAP Enforcement Methods• Remediation ServersCertificate Services and Storage Area Networks• Configuring Active Directory Certificate Services• Types of Certificate Authority• Certificate Services Role-Based Administration• Configuring Credential Roaming• Configuring Auto enrollment• Configuring Web Enrollment Support• Configuring Certificate Revocation Lists• Configuring an Online Responder for Certificate Services• Network Device Enrollment Service• Using Enterprise PKI to monitor CA Health
• Planning the Deployment of Storage Area Networks• Logical Unit Numbers• VDS• Storage Manager For SANs• Multipath I/O• Storage Explorer
Clustering and High Availability• Understanding DNS Round Robin and Load Balancing• Plan Availability Strategies• DNS Round Robin• Configuring Windows Network Load Balancing• Windows Server 2008 Cluster Tools• Selecting Redundancy Strategies• Understanding Cluster Concepts• Configuring Failover ClusteringBackup and Recovery• Backing Up Data• Shadow Copies of Shared Folders• Windows Server Backup• The wbadmin Command-Line Tool• Backing Up Server Roles and Applications• Remotely Backing Up Computers• Further Considerations for Planning Backups• System Center Data Protection Manager• Backing Up Windows Server 2008• Disaster Recovery• Windows Server Backup Recovery Modes• Recovering Active Directory• Hyper-V and Disaster Recovery
Designing Security for Microsoft® NetworksIntroduction to Designing Security• Introduction to Designing Security for Microsoft Networks• Contoso Pharmaceuticals: A Case StudyCreating a Plan for Network Security• Introduction to Security Policies• Defining a Process for Designing Security• Creating a Security Design Team• Planning a Security FrameworkIdentifying Threats to Network Security• Introduction to Security Threats
• Predicting Threats to SecurityAnalyzing Security Risks• Introduction to Risk Management• Creating a Risk Management PlanCreating a Security Design for Physical Resources• Determining Threats and Analyzing Risks to Physical Resources• Designing Security for Physical ResourcesCreating a Security Design for Computers• Determining Threats and Analyzing Risks to Computers• Designing Security for Computers
Creating a Security Design for Accounts• Determining Threats and Analyzing Risks to Accounts• Designing Security for AccountsCreating a Security Design for Authentication• Determining Threats and Analyzing Risks to Authentication• Designing Security for AuthenticationCreating a Security Design for Data• Determining Threats and Analyzing Risks to Data• Designing Security for DataCreating a Security Design for Data Transmission• Determining Threats and Analyzing Risks to Data Transmission• Designing Security for Data TransmissionCreating a Security Design for Network Perimeters• Determining Threats and Analyzing Risks to Network Perimeters• Designing Security for Network PerimetersDesigning Responses to Security Incidents• Introduction to Auditing and Incident Response• Designing an Audit Policy• Designing an Incident Response Procedure