Oreilly - 70-411: Administering Windows 2012 R2 - 300000006A0107
Oreilly - 70-411: Administering Windows 2012 R2
by Integrity Training | Publisher: Stone River eLearning | Release Date: June 2018 | ISBN: 300000006A0107


The 70-411: Administering Windows Server 2012 R2 course is a preparatory course for the exam conducted by Microsoft. It covers the exam topics in a great detail and prepares the students on system administration related functions, including deploying, managing, and maintaining servers, configuring file and print services, configuring network services and access, configuring NPS infrastructure, configuring and managing active directory, and configuring and managing group policy. The 70-411 course is the second course in the three course series required to completely prepare for the Microsoft Certifies Solutions Associate (MCSA) certification. The other two being 70-410 and 70-412. Students are strongly encouraged to take these three courses before taking the corresponding exams from Microsoft. This course covers the administration aspect of a Microsoft Windows Server 2012 R2 environment and prepares the students to effectively manage the users, access, policies and data security features of Windows Server 2012 R2.
  1. Course Introduction
    • Introduction 00:00:10
    • Instructor Introduction 00:01:38
    • Course Introduction 00:05:15
  2. Server Deployment and Image Management
    • Server Deployment and Image Management 00:00:40
    • WDS Server Role Services 00:02:33
    • Windows Deployment Services 00:02:27
    • Functionality 00:01:45
    • Functionality (cont.) 00:01:19
    • Functionality (cont. Part 2 ) 00:01:02
    • PowerShell Cmdlets for WDS 00:00:45
    • Prerequisites for Installing WDS Deployment and Transport Server (AD Integrated) 00:02:22
    • Prerequisites for Installing WDS Deployment and Transport Server (Standalone) 00:00:37
    • Demo - Installing WDS 00:07:26
    • Installing with Windows PowerShell 00:01:58
    • Demo - Installing with Windows PowerShell and WDSUTIL 00:07:13
    • Configuring WDS Role 00:01:35
    • Types of Images 00:01:01
    • Steps for Adding Images 00:01:39
    • Demo - Configuring WDS 00:07:05
    • Demo - WDS Install Images and Server Configuration 00:12:00
    • Client Prerequisites for Installing Images 00:00:47
    • Client Steps for Installing Images 00:01:09
    • Configuring Boot Menu 00:00:57
    • Creating Capture Image 00:00:24
    • Custom Install Images 00:00:12
    • Creating Custom Install Images 00:03:18
    • Discover Images 00:00:30
    • Creating Discover Images 00:00:21
    • Creating Media for Discover Image 00:03:11
    • Demo - Creating Media for Discover Image 00:10:52
    • Unattended Installations 00:01:22
    • Unattended Steps 00:00:23
    • Sample Unattended File 00:01:58
    • Multicast Transmissions 00:01:15
    • Multicast Transmissions (Cont.) 00:00:13
    • Demo - Configuring Transmissions 00:04:44
    • Demo - Adding Second Image Files 00:03:41
    • Adding Driver Packages to Boot Images 00:01:10
    • Common Administrative Tasks 00:01:02
    • Phases of Automated Deployments 00:00:38
    • Tools to Create and Service Images 00:01:14
    • Module 01 Review 00:00:53
  3. Module 02 - Managing Servers and Updates
    • Managing Servers and Updates 00:01:37
    • WSUS 00:00:59
    • Implementing Update Management 00:01:33
    • WSUS 3.0 SP2 Prerequisites 00:02:10
    • Computer Groups 00:01:24
    • Approval - Updates 00:02:26
    • WSUS Management Process 00:03:37
    • Group Policy and Automatic Updates 00:01:56
    • Demo - Configuring WSUS Group Policy 00:04:50
    • WSUS Management with PowerShell 00:01:20
    • Demo - Installing and Configuring WSUS 00:15:58
    • Demo - Approve Updates 00:04:17
    • Monitoring Servers 00:00:46
    • Monitor Servers 00:00:48
    • Tools 00:03:27
    • Demo - Task Manager and Resource Monitor 00:10:27
    • Demo - Performance Monitor 00:10:17
    • Demo - Performance Monitor Counters 00:16:50
    • Demo - Data Collector Sets 00:11:26
    • Virtual Machine Overview 00:01:05
    • Demo - Monitoring Virtual Machines 00:06:42
    • Monitoring Event Logs 00:01:38
    • Demo - Event Viewer 00:08:54
    • Demo - Event Forwarding 00:06:07
    • Monitoring Network Infrastructure 00:01:22
    • Demo - Monitoring Network Infrastructure 00:10:23
    • Module 02 Review 00:01:04
  4. Module 03 - File and Print Services
    • File and Print Services 00:01:40
    • FSRM 00:01:21
    • File System Resource Manager (FSRM) 00:01:00
    • Installing FSRM 00:00:27
    • Demo - Installing and Configuring FSRM 00:06:36
    • Managing FSRM with PowerShell 3.0 00:01:58
    • Demo - Managing FSRM with PowerShell 3.0 00:03:32
    • Demo - Legacy FSRM Commands 00:06:32
    • Remote Management of FSRM 00:00:47
    • Quota Management 00:03:11
    • Demo - Creating and Using Quota Templates 00:08:06
    • Demo - Testing Quota Limits 00:05:06
    • File Screening Management 00:03:13
    • File Screen Templates 00:00:33
    • File Groups 00:02:40
    • Demo - File Groups and File Screens 00:07:10
    • Storage Reports 00:01:27
    • Storage Report Types 00:01:33
    • Reports Continued 00:01:19
    • Demo - Storage Reports 00:10:36
    • Report Tasks 00:00:50
    • Classification Management 00:02:00
    • Classification Properties 00:00:33
    • Handling Classification Property Conflicts 00:00:53
    • Classification Rule Properties 00:00:31
    • Classification Examples 00:00:48
    • File Management 00:01:44
    • New and Changed Functionality Windows Server 2012 R2 00:00:30
    • DFS 00:01:24
    • DFS Role Services 00:00:56
    • DFS Role Services (cont.) 00:01:55
    • Domain Based Namespaces 00:01:50
    • Standalone Namespaces 00:01:14
    • Demo - Installing DFS 00:11:16
    • Demo - Configure DFS 00:05:46
    • DFS Replication with Windows Server 2012 R2 00:01:40
    • Session Management 00:02:23
    • EFS 00:01:21
    • EFS and Network Shares 00:00:57
    • Encryption Keys 00:01:21
    • EFS File Encryption Process 00:01:45
    • EFS File Decryption Process 00:01:26
    • EFS File Recovery 00:02:15
    • Managing Recovery Agents 00:00:54
    • Demo - EFS Encryption 00:09:12
    • BitLocker Device Encryption 00:01:16
    • Audit Policies 00:01:21
    • Configure Advanced Audit Policies 00:00:23
    • Audit Policies (Cont.Part 1) 00:01:59
    • Audit Policies (Cont. Part 2) 00:03:44
    • Demo - Configuring Audit Policies 00:11:01
    • Module 03 Review 00:00:43
  5. Module 04 - Configuring Network Services and Access
    • Configuring Network Services and Access 00:00:41
    • DNS Components 00:02:48
    • DNS Components (cont.) 00:03:32
    • DNS Zones 00:05:37
    • Demo - DNS Zones 00:06:09
    • Stub Zones vs. Conditional Forwarders 00:01:07
    • DNS Records 00:04:05
    • Demo - DNS Zones and Records 00:09:09
    • Demo - Using DNSCMD 00:06:25
    • How DNS Forwarding Works 00:03:34
    • Demo - Adding DNS and Conditional Forwarders 00:06:59
    • DNS Namespaces 00:02:20
    • DNS Naming Contexts and Rules 00:01:23
    • External vs. Internal Namespaces 00:07:01
    • Zone Transfers 00:01:55
    • Demo - Using DNSCMD and Zone Transfers 00:06:20
    • Demo - Troubleshooting DNS 00:07:25
    • Zone Scavenging 00:01:08
    • Configuring Zone Scavenging 00:02:01
    • Demo - Scavenging DNS 00:03:32
    • Other Configuration Options 00:01:21
    • DNS Caching 00:01:02
    • Commands for DNS Cache 00:01:08
    • Storage of Information 00:00:36
    • Considerations 00:00:49
    • Module 04 Review 00:00:35
  6. Module 05 - Network Policy Servers
    • Network Policy Servers 00:01:01
    • Remote Access Methods 00:01:41
    • Components of Network Access Services 00:03:40
    • Roles and Features 00:02:30
    • VPN and Routing Configuration Components 00:02:04
    • Demo - Configure Routing and Remote Access 00:23:58
    • Network Authentication 00:04:00
    • PKI Components 00:05:49
    • DHCP Relationship with Remote Access 00:01:21
    • VPN Access 00:02:44
    • Requirements of VPN Server 00:01:01
    • Properties of VPN Connection 00:01:28
    • Tunneling Protocols for VPN Connections 00:04:04
    • VPN Reconnect 00:01:37
    • Demo - Advanced RAS Configuration 00:06:22
    • VPN Post Installation Checklist 00:01:20
    • Demo - Using CMAK 00:18:47
    • Components of Network Policy 00:02:30
    • Properties of Network Policy 00:01:15
    • Network Policy Processing 00:03:26
    • Direct Access Features 00:01:33
    • What’s New in Direct Access 00:01:45
    • Deployment Phases of Direct Access 00:01:55
    • Required Infrastructure: Server 00:01:02
    • Required Infrastructure: Clients 00:01:46
    • Required Infrastructure: Network Location Server 00:01:06
    • Required Infrastructure: Internal Resources 00:00:37
    • Required Infrastructure: Active Directory Domain | Group Policy | DNS 00:01:01
    • Required Infrastructure: PKI | NAP 00:00:49
    • Name Resolution Policy Table 00:01:01
    • Name Resolution Policy Table (cont.) 00:02:23
    • Internal Client Interaction with Direct Access 00:02:16
    • External Client Interaction with Direct Access 00:01:04
    • Troubleshooting Tools 00:01:30
    • VPN Connectivity Troubleshooting 00:01:07
    • Common Error Codes 00:00:52
    • Network Address Translation 00:02:13
    • Configure Remote Dial-in Settings for Users 00:01:43
    • Network Policy and Access Services 00:00:46
    • Network Policy Server 00:01:48
    • Demo - Installing NPS Role 00:16:40
    • Network Policy Server Tools 00:00:38
    • RADIUS Clients 00:01:09
    • RADIUS Proxy 00:00:43
    • Certificates 00:00:55
    • Required Certificates 00:01:27
    • Monitoring NPS 00:00:43
    • Module 05 Review 00:00:52
  7. Module 06 - Active Directory
    • Active Directory 00:01:32
    • Demo - Cloning Virtual Domain Controller 00:10:29
    • Demo - Cloning Virtual Domain Controller (Cont.) 00:06:42
    • AD DS Forest Structure 00:01:17
    • AD DS Schema 00:01:04
    • AD DS Domain Structure 00:01:45
    • AD DS Domain Controllers 00:00:34
    • AD DS Default Containers 00:00:56
    • Organizational Units 00:00:56
    • Virtualized Domain Controllers 00:00:56
    • Cloning Virtual Domain Controllers 00:01:13
    • Process: Cloning Server 2012 VDC 00:00:23
    • DcCloneConfig.xml Syntax 00:00:37
    • DcCloneConfig.xml Parameters 00:00:50
    • Domain Controller Safe Backup and Restore 00:01:09
    • PowerShell for Hyper-V Snapshot Management 00:00:16
    • Active Directory Directory Services (AD DS) 00:03:47
    • Importing User Accounts 00:01:45
    • Common LDAP Attributes 00:02:15
    • Common LDAP Attributes (cont.) 00:00:45
    • Demo - Advanced AD Attributes 00:06:16
    • Demo - Using CSVDE 00:07:06
    • Demo - Export User Accounts Using CSVDE 00:04:38
    • Demo - Importing Accounts Using LDIF 00:05:12
    • Managed Service Accounts 00:03:43
    • Requirements for Service Accounts 00:00:55
    • Configuring Managed Service Accounts Using PowerShell 00:03:56
    • Demo - Configuring Manged Service Accounts 00:06:58
    • Kerberos Version 5 – Server 2012 Features 00:01:49
    • Kerberos Configurations Available 00:01:01
    • Kerberos Configurations Available (cont.) 00:01:06
    • Service Principal Names (SPNs) 00:01:34
    • Passwords 00:01:27
    • Create Account Policies and User Rights Assignments 00:02:27
    • Demo - Creating Password Policies 00:07:09
    • Notes Create Fine Grained Password Policies 00:03:24
    • Demo - Password Settings Container 00:06:05
    • Universal Group Membership Caching (UGMC) 00:02:46
    • Operations Master Roles 00:09:41
    • Demo - Operations Master Roles 00:08:22
    • Maintain Active Directory Domain Services 00:03:48
    • Demo - AD Recycle Bin 00:05:42
    • Demo - Restore Deleted Items 00:06:15
    • Demo - AD DB Maintenance and Snapshots 00:09:09
    • Read Only Domain Controllers (RODC) 00:03:04
    • Demo - Installing RODC 00:12:43
    • Manage RODC Caching 00:01:09
    • Module 06 Review 00:00:59
  8. Module 07 - Group Policy
    • Group Policy 00:00:42
    • Group Policy (Cont.) 00:01:51
    • Defining Options 00:00:29
    • Group Policy and IPv6 00:01:01
    • Group Policy Examples of Usage 00:00:51
    • Demo - Group Policy Management Console 00:13:55
    • Group Policy Objects 00:01:22
    • Group Policy Application 00:01:15
    • CSE Policy Refresh 00:01:22
    • Windows Client Policy Processing 00:00:47
    • Scripts Node of Group Policy 00:01:06
    • Group Policy Nodes 00:00:55
    • Default Group Policies 00:01:42
    • Group Policy Storage 00:00:55
    • Replication of GPO’s 00:02:16
    • Starter GPO’s 00:00:39
    • Slow Link Processing 00:03:10
    • Configure Loopback Processing 00:04:18
    • Security Templates 00:01:07
    • Demo - Group Policy Folder Redirection 00:10:48
    • Demo - Group Policy Software Installation 00:06:00
    • Demo - Administrative Templates 00:04:25
    • Group Policy Links 00:00:57
    • Group Policy Processing 00:01:53
    • Group Policy Inheritance and Precedence 00:01:29
    • Precedence – How to Handle Multiple Linked GPO’s 00:00:21
    • Demo - Local Policies 00:15:04
    • Other Group Policy Options 00:00:56
    • WMI Filters 00:04:31
    • Security Templates (Cont.) 00:00:36
    • Demo - Group Policy Objects 00:23:26
    • Group Policy Preferences 00:01:50
    • Demo - Configure Group Policy Preferences 00:06:16
    • Maintaining GPO’s 00:03:09
    • Group Policy and PowerShell 00:01:09
    • Demo - Creating Login Policies 00:08:58
    • Demo - Configuring User Desktops 00:15:00
    • Module 07 Review 00:01:21
    • Course Closure 00:02:14
  9. Oreilly - 70-411: Administering Windows 2012 R2

    300000006A0107.70411.Administering.Windows.2012.R2.part1.OR.rar

    300000006A0107.70411.Administering.Windows.2012.R2.part2.OR.rar

    300000006A0107.70411.Administering.Windows.2012.R2.part3.OR.rar

    300000006A0107.70411.Administering.Windows.2012.R2.part4.OR.rar

    300000006A0107.70411.Administering.Windows.2012.R2.part5.OR.rar

    300000006A0107.70411.Administering.Windows.2012.R2.part6.OR.rar


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.


SermonBox - Seasonal Collection

SermonBox - The Series Pack Collection

Top Rated News

  • Christmas Material
  • Laser Cut & Print Design Elements Bundle - ETSY
  • Daz3D - All Materials - SKU 37000-37999
  • Cgaxis - All Product - 2019 - All Retail! - UPDATED!!!
  • DigitalXModels Full Collections
  • Rampant Design Tools Full Collections Total: $4400
  • FilmLooks.Com Full Collection
  • All PixelSquid Product
  • The Pixel Lab Collection
  • Envato Elements Full Sources- 3200+ Files
  • Ui8.NET Full Sources
  • The History of The 20th Century
  • The Dover Collections
  • Snake Interiors Collections
  • Inspirational Collections
  • Veer Fancy Collections
  • All Ojo Images
  • All ZZVE Collections
  • All Sozaijiten Collections
  • All Image Broker Collections
  • Shuterstock Bundle Collections
  • Tattoo Collections
  • Blend Images Collections
  • Authors Tuorism Collections
  • Motion Mile - Big Bundle
  • PhotoBacks - All Product - 2018
  • Dekes Techniques - Photoshop & Illustrator Course - 1 to 673
Telegram GFXTRA Group
Udemy - Turkce Gorsel Ogrenme Setleri - Part 2
Videohive Wow Pack Series


rss