+
        

Request Course Details

MCSE 2012 Training

Microsoft Certified Solutions Expert – MCSE 2012 Training

MCSE TrainingThe Microsoft Certified Solutions Expert (MCSE): Server Infrastructure certification validates that you have the skills needed to run a highly efficient and modern data center, with expertise in identity management, systems management, virtualization, storage, and networking.

Earning an MCSE:

Server Infrastructure certification will qualify you for such jobs as computer support specialist and information security analyst. This course provides the skills and knowledge necessary to implement a core Windows Server 2012 infrastructure in an existing enterprise environment. The three courses collectively cover implementing, managing, maintaining, and provisioning services and infrastructure in a Windows Server 2012 environment. While there is some cross-over in skills and tasks across the courses, this course primarily covers the initial implementation and configuration of core services including Active Directory Domain Services (AD DS), networking services, Microsoft Hyper-V Server 2012 configuration. Implementing Server Images, User and Group management with Active Directory Domain Services(AD DS) and Group Policy, networking services, Application Services, Load balancing, clustering, Remote Access and Network Policies, Data Security, Monitoring and Update Management.

Want to choose their career into windows network infrastructure.

Prerequisite:

Before attending this course, students must have:

A good understanding of networking fundamentals.

An understanding of and experience with configuring security and administration tasks in an enterprise environment.

Experience supporting or configuring Windows operating system clients.

Good hands-on Windows client operating system experience with Windows Vista, Windows 7, or Windows 8.

An understanding of basic Active Directory Domain Services (AD DS) concepts, such as the purpose of user accounts and computer accounts.

Students would also benefit from having some previous Windows Server operating system experience.

MCITP syllabus :

Deploying and Managing Windows Server 2012

Overview of windows server 2012

Installing windows server 2012

Post installation of server 2012

Configuring windows server2012 core

Introduction to Windows PowerShell

Introduction to Active Directory Domain Services

Overview of AD DS

Overview of Domain Controllers

Installing a Domain Controller

Managing Active Directory Domain Services Objects

Managing User Accounts

Managing Group Accounts

Managing Computer Accounts

Delegating Administration

Automating User Account Management

Configuring Password-Policy and User-Account Lockout Settings

Configuring Managed Service Accounts

Automating Active Directory Domain Services Administration

Creating User Accounts and Groups by Using Windows PowerShell

Using Windows PowerShell to Create User Accounts in Bulk

Using Windows PowerShell to Modify User Accounts in Bulk

Implementing Domain Name System

Name Resolution for Windows Client and Servers

Installing and Managing a DNS Server

Managing DNS Zones

Implementing Local Storage

Overview of Storage

Managing Disks and Volumes

Implementing Storage Spaces

Installing and Configuring a New Disk

Resizing Volumes

Configuring a Redundant Storage Space

Designing and Implementing an Active Directory Domain Services Forest and Domain Infrastructure

Designing an AD DS Forest Infrastructure

Implementing AD DS Forest Trusts

Designing an AD DS Domain Infrastructure

Implementing an AD DS Domain Infrastructure

Implementing Distributed Active Directory Domain Services Deployments

Overview of Distributed AD DS Deployments

Implementing Child Domains in AD DS

Implementing Forest Trusts

Implementing Active Directory Rights Management Services

Overview of AD RMS

Installing and Configuring AD RMS

Configuring AD RMS Templates

Implementing the AD RMS Trust Policies

Verifying the AD RMS Deployment

Implementing Active Directory Federation Services

Overview of AD FS

Installing and Configuring AD FS

Configuring AD FS for a Single Organization

Configuring AD FS for Federated Business Partners

Implementing Active Directory Domain Services Sites and Replication

Overview of AD DS Replication

Configuring AD DS Sites

Configuring and Monitoring AD DS Replication

Creating Additional Sites and Subnets

Configuring AD DS Replication

Implementing Group Policy

Overview of Group Policy

Group Policy Processing

Configuring Folder Redirection

Software deployment using GPO

Securing Windows Servers Using Group Policy Objects

Windows Operating Systems Security Overview

Configuring Security Settings

Restricting Software

Configuring Windows Firewall with Advanced Security

Using Group Policy to Secure Member Servers

Auditing File System Access

Auditing Domain Logons

Implementing Active Directory Certificate Services

PKI Overview

Configuring Certificate Templates

Configuring Certificate Enrollment

Configuring Certificate Revocation

Configuring Key Recovery

Implementing Advanced File Services

Configuring iSCSI Storage

Configuring the File Classification Infrastructure

Planning and Implementing DFS

Configuring the Main Office Servers for BranchCache

Configuring the Branch Office Servers for BranchCache

Configuring Client Computers for BranchCache

Monitoring BranchCache

Configuring AppLocker and Windows Firewall

Configuring AppLocker Policies

Configuring Windows Firewall

Implementing Dynamic Access Control

Overview of Dynamic Access Control

Planning the Dynamic Access Control Implementation

Configuring User and Device Claims

Configuring Resource Property Definitions

Configuring Central Access Rules and Central Access Policies

Validating and Remediating Dynamic Access Control

Implementing New Resource Policies

Implementing File and Print Services

Creating and Configuring a File Share

Protecting Shared Files and Folders by Using Shadow Copies

Configuring Network Printing

Optimizing File Services

Overview of FSRM

Using FSRM to Manage Quotas, File Screens, and Storage Reports

Configuring FSRM Quotas

Installing the DFS Role Service

Configuring a DFS Namespace

Configuring DFS-R

Implementing IPv6

Overview of IPv6

IPv6 Addressing

Coexistence with IPv6

IPv6 Transition Technologies

Implementing Dynamic Host Configuration Protocol

Installing a DHCP Server Role

Configuring DHCP Scopes

Managing a DHCP Database

Securing and Monitoring DHCP

Configuring IPAM

Configuring Internet Information Services

Introduction IIS architecture

Web Server Overview

Deployment of a webserver

Virtual webhosting

Webserver Security

Configuring and Managing FTP server

Confguring FTP logon attempt restrictions

Configuring Encryption and Advanced Auditing

Encrypting and Recovering Files

Configuring Advanced Auditing

Implementing Update Management

Overview of WSUS

Deploying Updates with WSUS

Implementing the WSUS Server Role

Configuring Update Settings

Approving and Deploying an Update by Using WSUS

Planning and Implementing a Server Deployment Infrastructure

Implementing an Automated Deployment Strategy

Planning an Automated Server Installation and Deployment Strategy

Preparing the Windows Server 2012 Image

Deploying Windows Server 2012

Designing and Implementing Network Access Services

Designing and Implementing Remote Access Services

Designing RADIUS Authentication by Using NPS

Designing a Perimeter Network

Overview of VPN

Planning and implementing a VPN solution

Implementing Network Load Balancing

Overview of NLB

Configuring an NLB Cluster

Implementing a Network Load Balancing Cluster

Configuring and Managing the NLB Cluster

Validating High Availability for the NLB Cluster

Implementing Failover Clustering

Overview of Failover Clustering

Configuring a Failover Cluster

Deploying and Configuring a Highly Available File Server

Validating the Deployment of the Highly Available File Server

Configuring Cluster-Aware Updating on the Failover Cluster

Implementing Server Virtualization with Hyper-V

Overview of Virtualization Technologies

Implementing Hyper-V

Managing Virtual Machine Storage

Managing Virtual Networks

Installing the Hyper V Role onto a Server

Configuring Virtual Networking

Creating and Configuring a Virtual Machine

Using Virtual Machine Snapshots

Implementing Failover Clustering with Hyper-V

Overview of Integrating Hyper-V with Failover Clustering

Configuring Hyper-V Replicas

Configuring a Failover Cluster for Hyper-V

Configuring a Highly Available Virtual Machine

Implementing Disaster Recovery

Overview of Disaster Recovery

Implementing Windows Server Backup

Implementing Server and Data Recovery

Backing Up Data on a Windows Server 2012 Server

Restoring Files Using Windows Server Backup

Implementing Microsoft Online Backup and Restore

Designing and Implementing Network Protection

Designing a Windows Firewall solution

Implementing a Windows Firewall solution

Designing a NAP solution

Implementing NAP with VPN Enforcement

Installing and Configuring a Network Policy Server

Installing and Configuring a NPS

Configuring Remote Authentication Dial-In User Service (RADIUS) Clients and Servers

NPS Authentication Methods

Monitoring and Troubleshooting a NPS

Implementing Network Access Protection

Overview of Network Access Protection

Configuring NAP Components

Configuring VPN Access

Configuring the Client Settings to Support NAP

Monitoring Windows Server 2012

Monitoring Tools

Using Performance Monitor

Monitoring Event Logs

Establishing a Performance Baseline

Identifying the Source of a Performance Problem

Viewing and Configuring Centralized Event Logs

Download Soft Copy Request Course Details

  • pardhiv

    Name: Pardhiv reddy Designation: Security Analyst Company: FI

  • jagdeesh

    Name: Jagdeesh Kumar Designation: Security Analyst Company: Allied

  • sisir

    Name: Sisir Kumar Designation: Sr. Security Consultant Company:

  • amith-solanki

    Name: Amit Solanki Designation: Security researcher Company: Eagleclaw Co

  • venkatesh

    Name: Venkatesh Designation: System Admin

  • sampath

    Name: Sampath varma Designation: System Administrator Company:

  • kanisha

    Name: Kanishka Designation: Security Analyst Company: Torrid

  • pavan-kumar

    Name: Pavankumar Designation: Network Administrator Company: Trace Network S

  • rajesh-kumar

    Name: Rajesh Kumar Designation: ISMS Company: Exp

  • kishore

    Name: Kishore Kumar Designation: ISMS Company: Exp