->
Oreilly - Microsoft 70-742: Identity in Windows Server 2016 - 300000006A0100
Oreilly - Microsoft 70-742: Identity in Windows Server 2016
by Integrity Training | Publisher: Stone River eLearning | Release Date: September 2018 | ISBN: 300000006A0100


This 70-742: Identity in Windows Server 2016 course teaches IT professionals on the deployment, configuration and troubleshooting of identity services such as Active Directory Domain Services (AD DS) and Group Policy in Windows Server 2016. Additionally, this course also covers the deployment and installation of other Active Directory server roles, such as Active Directory Federation Services (AD FS) and Active Directory Certificate Services (AD CS). The course 70-742: Identity in Windows Server 2016 is part of a three course series required to pass the MCSA: Windows Server 2016 certification. The course curriculum is designed keeping in view the exam topics covered in the Microsoft exam 70-742. In this way, this course is equally helpful for IT professionals looking to gain their knowledge as well as the candidates willing to appear in the said exam.
  1. Course Introduction
    • Introduction 00:00:10
    • Course Introduction 00:03:08
    • Instructor Introduction 00:01:25
  2. Chapter 01 - Installing and Configuring Domain Controllers
    • Chapter 1 Introduction 00:01:11
    • Topic A: Overview of Active Directory Domain Services 00:00:51
    • Information Protection Concepts 00:03:28
    • Identity and Access (IDA) 00:01:38
    • Authentication and Authorization 00:05:21
    • AD DS Terms 00:02:51
    • Access Tokens 00:02:10
    • Access Control Lists 00:02:07
    • The Kerberos Logon Process 00:06:05
    • Workgroup vs. Domain 00:02:30
    • Understanding AD DS Domains 00:02:12
    • AD DS Components and Concepts 00:01:03
    • Active Directory Database 00:02:21
    • Physical Data Store 00:01:33
    • Logical Partitions 00:04:23
    • Active Directory Schema 00:04:18
    • Domains 00:03:09
    • Trees and Forests 00:03:00
    • Organizational Units 00:02:29
    • AD DS Sites 00:02:27
    • Controlling Replication 00:00:51
    • Trust Relationships 00:03:41
    • Topic B: Overview of Domain Controllers 00:00:18
    • Introducing Domain Controllers 00:01:59
    • Global Catalog Servers 00:04:02
    • Read-Only Domain Controllers 00:01:40
    • FSMO Roles 00:07:06
    • Demo - Working with FSMO Roles 00:06:49
    • Locating Domain Controllers 00:03:26
    • Demo - Viewing SRV Records 00:04:25
    • Topic C: Deploying Domain Controllers 00:00:13
    • Reasons for Multiple Domain Controllers 00:02:47
    • Installing from Server Manager 00:02:54
    • Considerations for Installing Domain Controllers 00:03:10
    • Demo - Installing a Domain Controller 00:09:13
    • Installing on Server Core 00:02:30
    • Demo - Promoting a Server Core DC 00:14:41
    • Upgrading Domain Controllers 00:02:00
    • Additional Installation Options 00:01:34
    • Cloning Domain Controllers 00:02:37
    • Demo - Cloning Domain Controllers 00:17:31
    • Chapter 01 Summary 00:01:39
    • Chapter 01 Review 00:00:10
  3. Chapter 02 - Managing Active Directory Objects
    • Chapter 2 Introduction 00:01:01
    • Topic A: Overview of AD DS Object Management 00:00:18
    • Understanding AD DS Objects 00:02:01
    • Names for AD DS Objects 00:02:51
    • Management Tools 00:04:06
    • Demo - Overview of AD DS Management Tools 00:13:34
    • Topic B: Managing User Accounts 00:00:18
    • The Importance of the User Account 00:01:50
    • Naming Considerations 00:03:05
    • Configuring User Passwords 00:03:29
    • Creating User Accounts 00:02:06
    • Demo - Creating AD DS Users 00:32:39
    • Managing User Attributes 00:01:56
    • User Account Management 00:01:47
    • Demo - Managing Users 00:20:29
    • Topic C: Managing Groups 00:00:16
    • Group Types and Scopes 00:03:13
    • Types of Groups 00:02:01
    • Group Scopes 00:01:45
    • Domain Local and Global Groups 00:01:42
    • Universal Groups 00:00:36
    • Group Nesting 00:00:59
    • Group Naming Considerations 00:01:26
    • Creating and Configuring Groups 00:01:15
    • Demo - Creating and Configuring Groups 00:14:39
    • Introduction to Default Groups 00:01:40
    • Identifying Default Groups 00:02:33
    • Administrative Groups 00:00:47
    • Demo - Configuring Default Groups 00:03:56
    • Using Special Identities 00:02:28
    • Strategies for Using Groups 00:04:42
    • Group Nesting Strategies 00:06:18
    • Demo - Group Nesting 00:16:00
    • Topic D: Managing Computer Accounts 00:00:20
    • Introduction to Computer Accounts 00:02:11
    • Creating Computer Accounts 00:02:02
    • Working with Secure Channel Passwords 00:03:20
    • Offline Domain Joins 00:02:04
    • Demo - Working with Computer Accounts 00:09:58
    • Topic E: Managing Organizational Units 00:00:43
    • Planning Organizational Units 00:05:04
    • OU Hierarchy Considerations 00:00:53
    • Creating OUs 00:01:47
    • Demo - Creating an OU Hierarchy 00:10:37
    • Object Security in AD DS 00:01:21
    • AD DS Object Permissions 00:01:34
    • Demo - Viewing Object Permissions in Active Directory 00:05:41
    • Delegating Administrative Control 00:01:53
    • Modifying Delegated Rights 00:01:32
    • Best Practices for Administrative Delegation 00:01:25
    • Demo - Delegating Administrative Control 00:08:35
    • Chapter 02 Summary 00:01:29
    • Chapter 02 Review 00:00:10
  4. Chapter 03 - Securing Active Directory Domain Services
    • Chapter 03 Introduction 00:01:25
    • Topic A: Securing Domain Controllers 00:00:14
    • Understanding Security Risks 00:04:13
    • Using Group Policy 00:01:46
    • Group Policy Security Settings 00:02:15
    • Securing the Authentication Process 00:03:49
    • Physical Access Security 00:03:06
    • Branch Office Domain Controllers 00:02:07
    • RODC Features 00:03:29
    • RODC Limitations and Considerations 00:01:56
    • Deploying RODCs 00:02:18
    • Demo - Installing an RODC 00:08:13
    • Password Replication Policies 00:02:04
    • Topic B: Implementing Account Security 00:00:17
    • Account Security in Windows Server 2016 00:02:04
    • Complexity Options 00:01:36
    • Password Policies 00:02:39
    • Account Lockout Policies 00:03:17
    • Configuring Domain Password and Lockout Policies 00:01:23
    • Demo - Configuring Account Policies in Group Policy 00:05:45
    • Configuring Fine-Grained Password Policies 1 00:01:35
    • Configuring Fine-Grained Password Policies 2 00:02:32
    • Configuring Fine-Grained Password Policies 3 00:01:31
    • Demo - Configuring Fine-Grained Password Policies 00:12:02
    • Restricted Groups 00:02:03
    • Protected Users Security Groups 00:02:03
    • Authentication Policies 00:02:58
    • Authentication Silos 00:01:13
    • Enhancing Password Authentication 00:04:14
    • Topic C: Auditing AD DS 00:00:12
    • Utilizing Auditing 00:01:42
    • The Purpose of Auditing 00:01:36
    • Types of Events 00:04:04
    • Auditing Goals 00:01:05
    • Auditing File and Object Access 00:02:27
    • Advanced Auditing 00:02:07
    • Demo - Configuring Auditing 00:13:00
    • Topic D: Configuring Managed Service Accounts 00:00:14
    • Overview of Service Accounts 00:02:37
    • Challenges to Managing Service Accounts 00:01:40
    • Managed Service Accounts 00:01:09
    • Group MSAs 00:01:01
    • Demo - Configuring Group MSAs 00:07:09
    • Chapter 03 Summary 00:01:49
    • Chapter 03 Review 00:00:10
  5. Chapter 04 - Working with Complex AD DS Infrastructures
    • Chapter 04 Introduction 00:01:52
    • Topic A: Overview of Advanced AD DS Deployments 00:00:13
    • Domain Boundaries 00:03:28
    • Forest Boundaries 00:01:32
    • Reasons for Implementing Multiple Domains 00:03:22
    • Reasons for Implementing Multiple Forests 00:02:39
    • Deploying Domain Controllers in Azure 00:06:26
    • Managing Objects 00:02:47
    • Topic B: Deploying a Distributed AD DS Environment 00:00:14
    • Domain Functional Levels 00:02:36
    • Forest Functional Levels 00:01:09
    • Deploying AD DS Domains 00:01:40
    • DNS Considerations 00:04:52
    • UPN Considerations 00:01:59
    • Demo - Deploying a Child Domain 00:05:55
    • Understanding Trust Relationships 00:03:05
    • Types of Trusts 00:03:23
    • How Trusts Work 00:02:43
    • Forest Trusts 00:01:52
    • Advanced Trust Settings 00:03:49
    • Demo - Configuring a Forest Trust 00:11:20
    • Topic C: Overview of AD DS Replication 00:00:21
    • AD DS Partitions 00:01:34
    • AD DS Replication 00:03:31
    • Types of Replication 00:02:47
    • Resolving Replication Conflicts 00:03:34
    • Topic D: Configuring AD DS Sites 00:00:23
    • Reasons for Sites 00:02:47
    • Planning for Sites 00:02:01
    • Overview of Sites and Subnets 00:01:50
    • Moving Domain Controller Accounts 00:00:49
    • Domain Controller Placement 00:03:43
    • Demo - Creating Sites 00:08:00
    • Controlling Inter-Site Replication 00:01:46
    • Defining Site Links 00:01:16
    • Site Links 00:01:29
    • Site Link Properties 00:02:13
    • Demo - Creating Site Links 00:06:46
    • Bridgehead Servers 00:01:25
    • Bridging Site Links 00:01:48
    • Monitor and Manage Replication 00:01:34
    • Chapter 04 Summary 00:01:08
    • Chapter 04 Review 00:00:10
  6. Chapter 05 - Implementing Group Policy
    • Chapter 05 Introduction 00:01:13
    • Topic A: Overview of Group Policy 00:00:12
    • What is Group Policy? 00:02:23
    • Group Policy Settings 00:01:39
    • Local Group Policies 00:01:47
    • Policies vs. Preferences 00:02:17
    • Demo - Examining Policy Settings 00:06:24
    • Domain Policies 00:02:43
    • GPO Storage 00:01:37
    • Linking GPOs 00:01:29
    • GPO Processing Order 00:02:04
    • Controlling Inheritance 00:01:39
    • Determining Inheritance 00:00:46
    • GPO Link Options 00:02:18
    • Security Filtering 00:03:50
    • WMI Filtering 00:02:21
    • Refreshing Policies 00:02:12
    • Other Processing Options 00:03:28
    • Topic B: Creating and Configuring GPOs 00:00:12
    • Creating GPOs 00:01:18
    • Starter GPOs 00:01:59
    • Administrative Templates 00:03:38
    • Group Policy Preferences 00:01:12
    • Demo - Creating and Configuring Policies 00:37:40
    • Group Policy Management 00:00:43
    • Delegation of Control 00:02:06
    • Demo - Managing GPOs 00:07:54
    • Topic C: Monitoring and Troubleshooting Group Policy 00:00:24
    • Troubleshooting Group Policy Application 1 00:03:06
    • Troubleshooting Group Policy Application 2 00:02:49
    • Demo - Troubleshooting Group Policy Application 00:11:41
    • Topic D: Security Management Using Group Policy 00:01:03
    • Security Management Using Group Policy 00:00:50
    • Configuring User Rights 00:01:25
    • Managing Security Options 00:01:52
    • User Account Control 00:02:09
    • Demo - Managing Security Options 00:05:43
    • Controlling Applications 00:01:09
    • Software Restriction Policies 00:03:23
    • Security Levels 00:01:09
    • AppLocker 00:01:41
    • Support for AppLocker 00:00:59
    • AppLocker Rules 00:01:56
    • Creating Default Rules 00:03:00
    • Demo - Controlling Applications Using Group Policy 00:11:36
    • Configuring the Windows Firewall 00:01:58
    • Windows Firewall with Advanced Security 00:01:31
    • Firewall Profiles 00:01:03
    • Creating Firewall Rules 00:00:24
    • Configuring the Windows Firewall 00:00:53
    • Types of Rules 00:01:32
    • Connection Security Rules 00:01:43
    • Demo - Configuring Firewalls using Group Policy 00:07:30
    • Topic E: Managing User Environments 00:00:24
    • Using Scripts in Group Policy 00:01:18
    • What is Folder Redirection? 00:01:54
    • Common Folders for Redirection 00:01:06
    • Redirection Options 00:01:39
    • Demo - Configuring Folder Redirection 00:05:39
    • Deploying Software Using Group Policy 00:02:10
    • How Software Distribution Works 00:00:44
    • Using Windows Installer 00:01:36
    • Software Life Cycle 00:00:58
    • Deploying Software 00:01:06
    • Deployment Options 00:02:04
    • Maintaining Software through Group Policy 00:00:57
    • Removing Software Deployments 00:00:45
    • Chapter 05 Summary 00:01:43
    • Chapter 05 Review 00:00:10
  7. Chapter 06 - Understanding Microsoft Azure AD and Directory Synchronization
    • Chapter 06 Introduction 00:01:19
    • Topic A: Planning Directory Synchronization 00:00:19
    • Overview of Azure AD 00:05:39
    • Limitations of AD DS 00:02:38
    • Extending AD DS Authentication 00:03:36
    • Comparing AD DS and Azure AD 00:01:59
    • Authentication Options 00:04:55
    • Planning Directory Synchronization 00:02:57
    • Enabling AD DS Synchronization 00:02:04
    • Topic B: Implementing Azure AD Connect 00:00:11
    • What is Azure AD Connect? 00:01:51
    • Azure AD Connect Requirements 00:04:02
    • Azure AD Connect Express Settings 00:01:06
    • Azure AD Connect Custom Installation 00:02:07
    • Monitoring Azure AD 00:01:06
    • Privileged Identity Management 00:01:24
    • Topic C: Managing Identities with Directory Synchronization 00:00:07
    • Managing Users 00:08:02
    • Managing Groups 00:00:56
    • Filtering Azure AD Connect 00:02:04
    • Monitoring Directory Synchronization 00:01:47
    • Troubleshooting Directory Synchronization 00:01:24
    • Chapter 06 Summary 00:01:29
    • Chapter 06 Review 00:00:10
  8. Chapter 07 - Monitoring and Recovering AD DS
    • Chapter 07 Introduction 00:01:26
    • Topic A: Monitoring AD DS 00:00:16
    • Performance Monitoring Benefits 00:02:05
    • Establishing Performance Baselines 00:02:14
    • Introduction to Monitoring Tools 00:00:51
    • Event Viewer 00:02:34
    • Demo - Using Event Viewer 00:05:13
    • Reliability Monitor 00:01:52
    • Real-Time Monitoring 00:02:42
    • Data Collector Sets 00:01:26
    • Data Collection Points 00:00:49
    • Common AD DS Counters 00:04:35
    • Best Practices 00:02:48
    • Topic B: Database Management 00:00:08
    • Physical Data Store 00:03:00
    • Using NTDSUtil 00:02:36
    • AD DS Maintenance 00:01:28
    • Topic C: Backup and Recovery in AD DS 00:00:12
    • Disaster Recovery for Active Directory 00:01:27
    • Backing Up Active Directory 00:04:17
    • Using Backup Tools 00:00:40
    • Backup Requirements 00:01:44
    • Restoring Data 00:04:28
    • Additional Restore Options 00:03:54
    • Demo - Enabling the AD Recycle Bin 00:03:23
    • Best Practices for Backup and Recovery 00:01:27
    • Chapter 07 Summary 00:01:58
    • Chapter 07 Review 00:00:10
  9. Chapter 08 - Implementing Active Directory Certificate Services
    • Chapter 08 Introduction 00:01:27
    • Topic A: Overview of Public Key Infrastructure and AD CS 00:00:09
    • What is a PKI? 00:01:38
    • Encryption Types 00:02:06
    • PKI Components 00:01:57
    • PKI Enabled Applications 00:01:49
    • Certificate Authorities 00:01:45
    • CA Types 00:00:50
    • Internal vs. External CAs 00:03:24
    • AD CS in Windows Server 2016 00:03:16
    • Topic B: Deploying Certificate Authority Hierarchy 00:00:14
    • Decision Factors for CA Hierarchy 00:00:39
    • CA Hierarchy Roles 00:01:40
    • Best Practices for CA Hierarchies 00:01:23
    • Installing Root CAs Part 1 00:01:18
    • Installing Root CAs Part 2 00:01:17
    • Demo - Installing a Root CA 00:08:02
    • Installing Subordinate CAs 00:00:50
    • Benefits of Using Subordinates 00:01:36
    • Automating Installations 00:01:59
    • Topic C: Administering Certificate Authorities 00:00:26
    • Administration Tools 00:03:09
    • Configuring CA Security 00:01:23
    • Security Roles for CA Administration 00:01:59
    • Policy and Exit Modules 00:01:30
    • Certificate Revocation Lists (CRL) 00:02:37
    • Publishing the CRL 00:00:58
    • Publishing AIAs and CDPs 00:01:14
    • Topic D: Deploying and Managing Certificates 00:00:08
    • Digital Certificates 00:01:55
    • Certificate Templates 00:01:08
    • Template Versions in Windows Server 2016 00:02:11
    • Certificate Template Permissions 00:01:13
    • Updating Templates 00:01:21
    • Demo - Modifying and Enabling a Certificate Template 00:05:44
    • Enrollment Types 00:02:02
    • Manual Enrollment 00:00:58
    • Automating Enrollment 00:00:36
    • Autoenrollment Components 00:00:57
    • Demo - Configuring Autoenrollment 00:07:23
    • Credential Roaming 00:00:48
    • Topic E: Managing Revocation and Distribution 00:00:22
    • Certificate Revocation 00:01:25
    • Online Responder 00:01:41
    • Online Responder Process 00:00:51
    • Comparing CRL and OCSP 00:01:32
    • Configuring an Online Responder 00:01:01
    • Topic F: Configuring Certificate Recovery 00:00:16
    • Importance of Key Archival and Recovery 00:01:03
    • Key Archival 00:01:27
    • Data Recovery vs. Key Recovery 00:01:24
    • Archival Methods 00:00:45
    • Export Methods 00:00:46
    • Automating Archival 00:01:01
    • Recovering Lost Keys 00:01:12
    • Chapter 08 Summary 00:01:57
    • Chapter 08 Review 00:00:10
  10. Chapter 09 - Implementing Active Directory Federation Services (AD FS)
    • Chapter 09 Introduction 00:01:17
    • Topic A: Overview of AD FS 00:00:10
    • What is Identity Federation? 00:03:09
    • Federation Benefits 00:01:36
    • AD FS Components 00:02:13
    • Additional AD FS Terms 00:04:03
    • Identity Federation Scenarios 00:01:49
    • Business to Business Scenario 00:01:55
    • Business to Employee Scenario 00:00:47
    • Business to Consumer Scenario 00:00:32
    • New Features in Windows Server 2016 00:01:31
    • Topic B: Planning and Deploying AD FS 00:00:06
    • AD FS Requirements 00:02:11
    • Server Roles 00:02:04
    • Planning High Availability 00:03:05
    • AD FS Claims 00:02:35
    • AD FS Claim Rules 00:03:39
    • Trust Relationships 00:02:32
    • Installing AD FS 00:02:59
    • Demo - Installing AD FS 00:08:39
    • Configuring Partners 00:03:35
    • Home Realm Discovery 00:02:07
    • Managing AD FS 00:01:53
    • Topic C: Overview of Web Application Proxy 00:00:17
    • Introducing the Web Application Proxy 00:02:49
    • Web Application Proxy and AD FS Proxy 00:01:47
    • Authentication Methods 00:02:02
    • Publishing Software 00:01:27
    • Chapter 09 Summary 00:01:05
    • Chapter 09 Review 00:00:10
  11. Chapter 10 - Implementing Active Directory Rights Management Services
    • Chapter 10 Introduction 00:00:45
    • Topic A: Overview of AD RMS 00:00:13
    • Introducing AD RMS 00:02:57
    • The AD RMS Difference 00:02:58
    • AD RMS Components 00:02:07
    • Certificates and Licenses 00:02:36
    • Protecting Content 00:00:59
    • Consuming Content 00:01:33
    • Azure RMS 00:00:58
    • Topic B: Deploying AD RMS 00:00:10
    • Deployment Scenarios 00:02:04
    • Installation Overview 00:01:15
    • AD RMS Configuration 00:01:08
    • Demo - Installing AD RMS Cluster 00:05:59
    • AD RMS Management 00:02:02
    • External Sharing 00:01:44
    • Topic C: Protecting Content with AD RMS 00:00:09
    • Rights Policy Templates 00:01:14
    • Configuring Templates for Offline Usage 00:00:49
    • Demo - Configuring Rights Management Templates 00:05:37
    • Exclusion Policies 00:01:24
    • Chapter 10 Summary 00:00:45
    • Chapter 10 Review 00:00:10
    • Course Closure 00:02:29
  12. Oreilly - Microsoft 70-742: Identity in Windows Server 2016

    300000006A0100.Microsoft.70742.Identity.in.Windows.Server.2016.part1.OR.rar

    300000006A0100.Microsoft.70742.Identity.in.Windows.Server.2016.part2.OR.rar

    300000006A0100.Microsoft.70742.Identity.in.Windows.Server.2016.part3.OR.rar

    300000006A0100.Microsoft.70742.Identity.in.Windows.Server.2016.part4.OR.rar

    300000006A0100.Microsoft.70742.Identity.in.Windows.Server.2016.part5.OR.rar


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.




rss