Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure (Examen: 70-642)
€2190, aangeboden door Master it Training
Deze vijfdaagse Windows Server 2008 training geeft cursisten de kennis en vaardigheden om een Windows Server 2008 R2 network infrastructure te configureren en te troubleshooten. Cursisten leren secure network access te implementeren en te configureren en fault tolerant storage technologies te implementeren. De deelnemers verkrijgen een beter begrip van de network technologies die het meest worden gebruikt met Windows Server 2008 R2 en IPenabled networks. Daarnaast leren cursisten servers te beveiligen en update compliance te beheren.
Let op. Deze training is exclusief het examen.
Doelgroep
De primaire doelgroep voor deze training zijn o.a. Active Directory technology specialists die Enterprise Administrators (Tier 4 daytoday network operations) of Network Administrators (Tier 2) willen worden. Echter is deze training ook erg zinvol voor ervaren Server Administrators die Enterprise Administrators willen worden.De tweede doelgroep voor deze training zijn Storage Area Network Administrators die over deze informatie moeten beschikken om hun huidige storage infrastructure uit te rollen of uit te breiden. Operations Managers die deze kennis nodig hebben om troubleshooting inspanningen en business decisions te ondersteunen zijn ook gebaad bij deze training.
Voorkennis voor de Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure training
Reeds enige praktijkervaring opgedaan met Windows Server 2003. Enige kennis van Active Directory. Kennis van beveiligingsconcepten en methoden (bijvoorbeeld corporate policies). Enige kennis van DHCP. Enige kennis van IPsec.
Examen
70-642
Onderwerpen in de Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure training
Module 1: Planning and Configuring IPv4This module explains how to deploy and configure networking services in your organization. This module explains how to implement an IPv4 addressing scheme, determine which name services to deploy, and troubleshoot networkrelated problems.Lessons:Implementing an IPv4 Network Infrastructure Overview of Name Resolution Services in an IPv4 Network Infrastructure Configuring and Troubleshooting IPv4 Module 2: Configuring and Troubleshooting DHCPThis module introduces you to Dynamic Host Configuration Protocol (DHCP), which plays an important role in the Windows Server 2008 R2 infrastructure. It is the primary means of distributing important network configuration information to network clients, and it provides configuration information to other networkenabled services, including Windows Deployment Services (WDS) and Network Access Protection (NAP). To support and troubleshoot a Windows Serverbased network infrastructure, it is important that you understand how to deploy, configure, and troubleshoot the DHCP Server Role.Lessons:Overview of the DHCP Server Role Configuring DHCP Scopes Configuring DHCP Options Managing a DHCP Database Monitoring and Troubleshooting DHCP Configuring DHCP Security Module 3: Configuring and Troubleshooting DNSThis module introduces you to Domain Name System (DNS), which is the foundation name service in Windows Server 2008 R2. It is vital that you understand how to deploy, configure, manage, and troubleshoot this critical service.Lessons:Installing the DNS Server Role Configuring the DNS Server Role Configuring DNS Zones Configuring DNS Zone Transfers Managing and Troubleshooting DNS Module 4: Configuring and Troubleshooting IPv6 TCP/IPThis module introduces you to IPv6, a technology that will help ensure that the Internet can support a growing user base and the increasingly large number of IPenabled devices. The current Internet Protocol Version 4 (IPv4) has served as the underlying Internet protocol for almost thirty years. Its robustness, scalability, and limited feature set is now challenged by the growing need for new IP addresses, due in large part to the rapid growth of new networkaware devices.Lessons:Overview of IPv6 IPv6 Addressing Coexistence with IPv6 IPv6 Transition Technologies Transitioning from IPv4 to IPv6 Module 5: Configuring and Troubleshooting Routing and Remote AccessTo support your organizationÂ’s distributed workforce, you must become familiar with technologies that enable remote users to connect to your organizationÂ’s network infrastructure. These technologies include virtual private networks (VPNs) and DirectAccess. It is important that you understand how to configure and secure your remote access clients by using network policies. This module explores these remote access technologies.Lessons:Configuring Network Access Configuring VPN Access Overview of Network Policies Overview of the Connection Manager Administration Kit Troubleshooting Routing and Remote Access Configuring DirectAccess Module 6: Installing, Configuring, and Troubleshooting the Network Policy Server Role ServiceNPS provides support for the Remote Authentication DialIn User Service (RADIUS) protocol, and can be configured as a RADIUS server or proxy. Additionally, NPS provides functionality that is essential for the implementation of Network Access Protection (NAP). This module explains how to install, configure, and troubleshoot NPS.Lessons:Installing and Configuring a Network Policy Server Configuring RADIUS Clients and Servers NPS Authentication Methods Monitoring and Troubleshooting a Network Policy Server Module 7: Implementing Network Access ProtectionIn this module, you will learn about Network Access Protection (NAP). NAP enables you to create customized healthrequirement policies to validate computer health before allowing access or communication. NAP also automatically updates compliant computers to ensure ongoing compliance and can limit the access of noncompliant computers to a restricted network until they become compliant.Lessons:Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP Module 8: Increasing Security for Windows ServersSecurity is an essential consideration for networking with Windows Server 2008. In this module, you will learn how to implement various methods to increase security. Windows Firewall with Advanced Security is one of the features in Windows Server 2008 that is used to increase security. You can also use Windows Server Update Services to ensure that approved security updates are applied to servers in a timely way.Lessons:Windows Security Overview Configuring Windows Firewall with Advanced Security Deploying Updates with Windows Server Update Services Module 9: Increasing Security for Network CommunicationInternet Protocol security (IPsec) is a framework of open standards for protecting communications over IP networks through cryptographic security services. IPsec supports networklevel peer authentication, dataorigin authentication, data integrity, data confidentiality (encryption), and replay protection. The Microsoft IPsec implementation is based on standards that the Internet Engineering Task Force (IETF) IPsec working group developed. In this module, you will learn how to implement, configure, and troubleshoot IPsec.Lessons:Overview of IPsec Configuring Connection Security Rules Configuring NAP with IPsec Enforcement Monitoring and Troubleshooting IPsec Module 10: Configuring and Troubleshooting Network File and Print ServicesFile and print services are some of the most commonly implemented network services for end users. Unlike infrastructure services like DNS, file and print services are highly visible to the end users. In this module, you will learn how to configure and troubleshoot file and print services to provide high quality service to end users. In addition, you will see how both EFS and BitLocker can be used to increase the security of files that are located in file shares.Lessons:Configuring and Troubleshooting File Shares Encrypting Network Files with EFS Encrypting Partitions with BitLocker Configuring and Troubleshooting Network Printing Module 11: Optimizing Data Access for Branch OfficesMany organizations maintain a large number of file resources that need to be organized and made highly available to users. These file resources are often stored on servers and provided to users who are distributed geographically in widespread locations. In this module, you will learn how to provide efficient access to network resources with minimal traffic over a WAN link.Lessons:Branch Office Data Access DFS Overview Overview of DFS Namespaces Configuring DFS Replication Configuring BranchCache Module 12: Controlling and Monitoring Network StorageNetwork storage for users is a finite resource that must be managed appropriately to ensure that it remains available for all users. If network storage is not monitored and managed, it can become filled with irrelevant data, such as personal music or movies. Irrelevant data increases network storage costs and in some cases can prevent useful data from placement on the network storage. In this module, you will learn how to monitor and manage network storage.Lessons:Monitoring Network Storage Controlling Network Storage Utilization Managing File Types on Network Storage Module 13: Recovering Network Data and ServersThis module explains how to recover network data and servers. There are a variety of scenarios where a network data or a server that provides networks services can be lost. Volume shadow copies can be used to restore previous versions of files when a file is accidentally deleted or modified on a computer that is running Windows Server 2008. Windows Server Backup can be used to back up and restore data files or an entire server.Lessons:Recovering Network Data with Volume Shadow Copies Recovering Network Data and Servers with Windows Server Backup Module 14: Monitoring Windows Server 2008 Network Infrastructure ServersWhen a system failure or an event that affects system performance occurs, you need to be able to repair the problem or resolve the issue quickly and efficiently. With so many variables and possibilities in the modern network environment, the ability to determine the root cause quickly often depends on having an effective performance monitoring methodology and toolset. In this module, you will learn to use performancemonitoring tools to identify components that require additional tuning and troubleshooting. By identifying components that require additional tuning, you can improve the efficiency of your servers.Lessons:Monitoring Tools Using Performance Monitor Monitoring Event Logs