->
Oreilly - 70-647: Microsoft Windows Server Enterprise Administration - 300000006A0116
Oreilly - 70-647: Microsoft Windows Server Enterprise Administration
by Integrity Training | Publisher: Stone River eLearning | Release Date: July 2018 | ISBN: 300000006A0116


The 70-647: Microsoft Windows Server 2008 Enterprise Administration course focuses on multi-domain and enterprise-wide planning and implementation tasks that are to be performed by the system administrators of that enterprise. The course enhances the students' ability to choose the appropriate Windows Server solution for a design requirement, and the ability to perform domain-wide administration tasks.
  1. Course Introduction
    • Course Introduction 00:06:08
    • Instructor Introduction 00:01:06
  2. Chapter 01 - Planning for Active Directory
    • Planning for Active Directory 00:00:42
    • Lesson 1: Logical Design 00:00:25
    • The Forest 00:01:11
    • The Forest Continued 00:01:58
    • How Will AD DS be Used? 00:02:15
    • How Will ADS DS be used? Continued 00:02:17
    • Requirements ( Part 1 ) 00:01:29
    • Requirements ( Part 2 ) 00:02:45
    • Requirements ( Part 3 ) 00:03:19
    • How Many Forests are Needed? 00:00:55
    • Forest Model 00:04:36
    • Domains 00:04:34
    • Requirements 00:01:33
    • The Domain Model 00:01:52
    • How Many Domains? 00:03:06
    • Upgrade or Create New Domains 00:01:24
    • The First Domain 00:03:14
    • Functional Levels 00:01:31
    • Domain Functional Level Features 00:03:28
    • Functional Levels Continued 00:01:10
    • Forest Functional Level Features 00:01:09
    • Schema 00:02:36
    • Working with Trusts 00:02:35
    • Demo - Creating a New Forest 00:11:39
    • Demo - Creating a New Tree 00:10:49
    • Lesson 2: Physical Topology 00:00:08
    • Physical Networks 00:02:05
    • Review of Domain Controller Replication 00:05:39
    • Site Design Options 00:02:33
    • Site Replication Design 00:05:42
    • Site Links 00:01:31
    • Site Links Continued 00:02:29
    • Site Link Bridging 00:01:24
    • Site Replication Example 00:04:53
    • Domain Controller Placement 00:04:13
    • Domain Controller Placement Continued 00:02:25
    • Printer Location Policies 00:01:37
    • Demo - Creating Sites and IP Subnets 00:12:36
    • Demo - Creating Site Link Bridges 00:02:45
    • Chapter 01 Review 00:01:27
  3. Chapter 02 - Network Infrastructure
    • Network Infrastructure 00:00:30
    • Lesson 1: DNS 00:00:26
    • DNS Considerations 00:06:44
    • DNS Record Types 00:01:36
    • Using DNS with Windows 2008 Server 00:03:46
    • The Stub Zone 00:01:26
    • DNS Options 00:04:25
    • Managing DNS 00:03:36
    • New DNS Features with Windows 2008 Server 00:04:35
    • Replacing WINS 00:03:23
    • IPv6 Support 00:01:23
    • Background Zone Loading 00:02:03
    • RODC 00:02:06
    • Designing the DNS Infrastructure 00:01:45
    • Designing the DNS Infrastructure Continued 00:05:45
    • Choosing a Zone Type 00:02:34
    • Choosing a Zone Type Continued 00:01:56
    • Miscellaneous DNS Options 00:01:36
    • Demo - Exploring DNS 00:09:27
    • Demo - Creating GlobalNames Zone 00:02:22
    • Lesson 2: Planning IP Distribution 00:00:39
    • Introducing IPv6 00:02:04
    • Examples of IPv6 Abbreviation 00:06:55
    • Examples of IPv6 (Cont.) 00:02:23
    • Introducing IPv6 (Cont.) 00:08:07
    • The IPv6 Multicast 00:02:47
    • Advantages of IPv6 00:05:35
    • IPv4 to IPv6 Compatibility 00:02:28
    • Transitioning to IPv6 00:03:03
    • IPv6 Tools 00:01:35
    • Configure IPv6 00:01:14
    • Verifying IPv6 00:00:47
    • Troubleshooting 00:01:38
    • Designing an IPv6 Network 00:01:08
    • Demo - Configuring IPv6 00:02:55
    • Demo - Testing IPv6 00:05:15
    • Chapter 02 Review 00:01:06
  4. Chapter 03 - Advanced Active Directory Issues
    • Advanced Active Directory Issues 00:00:31
    • Lesson 1: Migration Strategies 00:01:11
    • Planning and Preparing to Move to Windows 2008 Server 00:01:01
    • Domain Upgrade 00:01:41
    • Preparing for the Upgrade 00:02:04
    • Domain Restructure 00:02:41
    • Upgrade then Restructure 00:01:21
    • Cross Forest Trust 00:01:52
    • Demo - Raising Domain Functional Level 00:00:39
    • Lesson 2: Working with Other Forests 00:00:57
    • One Solution: AD FS 00:02:41
    • What is AD FS? 00:01:07
    • AD FS Roles 00:01:33
    • AD FS Example 00:02:27
    • MS Identity Lifecycle Manager 2007 FP1 00:02:47
    • Working with UNIX 00:01:35
    • Imitating UNIX 00:01:28
    • Migration of UNIX NIS to Windows NIS 00:01:26
    • Imitating UNIX Continued 00:00:55
    • Working with NFS 00:01:11
    • Chapter 03 Review 00:00:49
  5. Chapter 04 - Active Directory Administration
    • Active Directory Administration 00:00:36
    • Lesson 1: Active Directory Administration 00:00:18
    • Delegation of Control Part 1 00:02:20
    • Delegation of Control Part 2 00:01:45
    • Delegation of Control Part 3 00:01:53
    • Delegation of Control Part4 00:02:57
    • Delegating Active Directory 00:01:00
    • Data Management 00:01:16
    • Service Management 00:00:46
    • Scope of Delegated Administration 00:02:04
    • Administration Models 00:00:32
    • Administration Models Continued 00:01:10
    • Using Groups for Delegation Part 1 00:00:45
    • Using Groups for Delegation Part 2 00:00:51
    • Using Groups for Delegation Part 3 00:01:37
    • Management Roles 00:00:27
    • Service Management 00:00:55
    • Data Roles 00:00:50
    • Types of Trusts 00:01:37
    • Types of Trusts Continued 00:04:08
    • Delegation of Data Management 00:02:07
    • Starter GPOs 00:01:05
    • Group Policy Modeling 00:01:08
    • Auditing AD DS 00:01:29
    • AD Auditing 00:01:11
    • Looking at the Organizational Structure 00:02:05
    • Looking at the Organizational Structure Continued 00:05:24
    • Demo - Delegation of Control 00:15:56
    • Demo - AD Auditing 00:08:20
    • Lesson 2: Using Group Policies 00:00:43
    • Understanding the Group Policy Infrastructure 00:04:01
    • Understanding the Group Policy Infrastructure Continued 00:00:58
    • Guidelines for Planning GPOs 00:03:33
    • Guidelines for Planning GPOs Continued 00:00:51
    • GPOs and Active Directory 00:01:27
    • GPOs and Active Directory Continued 00:01:56
    • Understanding Domains 00:02:03
    • Understanding Domains Continued 00:00:47
    • Domain Services Store 00:01:25
    • Controlling Hardware Installation with GPOs 00:02:20
    • Which GPO Settings Control Hardware Installation? 00:01:01
    • AAA 00:02:32
    • Stronger Authentication 00:02:14
    • Fine-Grained Password Policies 00:02:24
    • How to Use PSOs 00:00:54
    • Demo - Creating PSO 00:08:38
    • Chapter 04 Review 00:01:16
  6. Chapter 05 - Deploying Windows 2008 to the Small/Medium Office
    • Deploying Windows 2008 to the Small/Medium Office 00:00:29
    • Lesson 1: Small/Medium Office 00:00:14
    • Services Needed in the Small/Medium Office 00:00:54
    • The DSMGMT Service 00:01:06
    • Components Often Needed in the ROBO 00:01:49
    • Optional Components Used for the ROBO 00:04:08
    • More on the Server Core 00:02:38
    • Should You Install a Domain Controller? 00:02:54
    • Shoud You Install a Domain Controller? Continued 00:01:37
    • Other DC Options 00:04:35
    • Others DC Options Continued 00:03:03
    • Services to Consider at the ROBO 00:02:55
    • Communication Options 00:02:33
    • Communication Options Continued 00:02:56
    • WAN Connections 00:01:43
    • Securing Traffic 00:04:15
    • Tunnel Diagram Example 00:06:12
    • Lesson 2: Small/Medium Server Security 00:00:14
    • Overview of Security 00:02:50
    • Security Training 00:01:19
    • Security at the Branch 00:02:31
    • Server Hardening 00:03:28
    • Server Hardening Continued Part 1 00:02:42
    • Server Hardening Continued Part 2 00:02:01
    • Secure Options for the ROBO 00:01:07
    • RODC 00:01:12
    • RODC Password Replication Policy 00:01:15
    • RODC Operation 00:01:34
    • RODC Operation Continued 00:00:52
    • Securing Data 00:00:47
    • EFS 00:03:03
    • BitLocker 00:01:55
    • NAP 00:02:08
    • Demo - Creating an RODC 00:05:33
    • Demo - Using SCW 00:08:29
    • Chapter 05 Review 00:01:01
  7. Chapter 06 - Using Remote Desktop Services and Application Setup
    • Using Remote Desktop Services and Application Setup 00:00:25
    • Lesson 1: Planning for Remote Desktop Services 00:00:11
    • Planning and Deploying Remote Desktop Services 00:04:41
    • RDS Components 00:01:39
    • Demo - Installing Remote Desktop Services 00:12:01
    • Lesson 2: License Server 00:00:14
    • Licensing Part 1 00:00:42
    • Licensing Part 2 00:02:12
    • Licensing Part 3 00:00:41
    • Types of Licenses 00:02:06
    • Types of Licenses Continued 00:01:40
    • Maintaining the License Server 00:00:59
    • License Server Deployment 00:01:10
    • Lesson 3: Deploying Applications 00:00:39
    • RDS Web Access 00:01:24
    • RemoteApp 00:00:51
    • RemoteApp Deployment 00:00:51
    • RDS Load Balancing 00:02:18
    • Planning RDS Gateway Servers 00:04:19
    • RDS Gateway Server Connection 00:01:13
    • Using GPO to Deploy Applications 00:02:07
    • Publishing Software 00:01:27
    • Assigning Software with GPOs 00:01:33
    • Installing Software by GPO 00:01:00
    • Deploying Software with SC Essentials 00:01:35
    • SCCM 2007 00:00:27
    • SCCM 2007 Architecture 00:04:41
    • SCCM 2007 Client 00:01:39
    • SCCM 2007 Application Deployment 00:01:09
    • Demo - Accessing RDS Web Access 00:06:39
    • Chapter 06 Review 00:00:34
  8. Chapter 07 - Securing the Network
    • Securing the Network 00:00:32
    • Lesson 1: Designing a Secure Perimeter 00:00:29
    • Designing the Perimeter 00:01:23
    • The Border Network 00:01:52
    • Perimeter Network 00:01:45
    • Internal Network 00:01:47
    • Perimeter Firewall 00:04:37
    • Firewall Options 00:17:20
    • ISA Server 00:02:10
    • ISA Server Deployment 00:04:18
    • What Else Can Be Found in the Perimeter? 00:01:04
    • Web Servers in the Perimeter 00:01:03
    • Setting Up Remote Access 00:03:49
    • VPN Tunneling Protocols 00:03:58
    • PPTP 00:02:09
    • L2TP 00:03:29
    • SSTP 00:00:55
    • Authenticating Connections 00:03:07
    • Securing VPN Servers 00:02:34
    • Authentication using RADIUS 00:00:45
    • Microsoft RADIUS 00:01:25
    • RADIUS Security 00:00:51
    • RADIUS Proxy Options 00:01:23
    • Lesson 2: Introducing NAP 00:00:21
    • Network Access Protection 00:02:10
    • Where Do You Find NAP? 00:04:43
    • NAP Considerations 00:02:46
    • NAP Provides Another Layer of Security With IPSec 00:02:13
    • Disadvantages of NAP 00:00:48
    • NAP IPSec Enforcement 00:02:12
    • More NAP Component Needs 00:01:21
    • NAP VPN Enforcement 00:01:27
    • 802.1X NAP Enforcement 00:01:34
    • 802.1X Enforcement 00:02:19
    • NAP and DHCP 00:00:57
    • DHCP/NAP Considerations 00:00:45
    • NAP Illustrated 00:02:23
    • Lesson 3: Domain and Server Isolation 00:00:19
    • Isolation 00:03:04
    • Domain Isolation 00:00:36
    • Comparing Server and Domain Isolation 00:00:23
    • Chapter 07 Review 00:00:53
  9. Chapter 08 - Supporting PKI
    • Supporting PKI 00:00:32
    • Lesson 1: What is PKI? 00:00:39
    • Concepts 00:05:16
    • Applications Use of PKI 00:04:01
    • Certificate Use Illustration 00:04:57
    • Who is Issued a Certificate 00:01:37
    • PKI Security 00:03:17
    • Security Policies 00:01:12
    • Business Requirements 00:05:05
    • External Needs 00:01:48
    • AD Needs 00:01:28
    • Lesson 2: The CA Hierarchy 00:00:16
    • The CA Infrastructure 00:04:22
    • CA Hierarchy Illustration 00:09:34
    • When to Use an Internal CA 00:00:52
    • When to Use an External CA 00:01:50
    • MS ADCS 00:02:43
    • Enterprise vs. Standalone 00:01:05
    • How Many CAs are Needed 00:01:31
    • Demo - Installing CA 00:05:23
    • Lesson 3: Managing Certificates 00:00:25
    • Enrollment Methods 00:02:18
    • Enrollment Policies 00:02:56
    • Improving Control over Certificate Issuance 00:01:44
    • Automatic vs. Manual Certificate Approval 00:02:03
    • How to Do Enrollment 00:02:27
    • Certificate Renewal Strategies 00:02:01
    • Certificate Revocation Policy 00:02:28
    • Issues with CRLs 00:02:29
    • Publication Points 00:01:45
    • Demo - Working with Certificates 00:04:55
    • Chapter 08 Review 00:00:34
  10. Chapter 09 - Virtualization Solutions
    • Virtualization Solutions 00:00:34
    • Lesson 1: Using Virtualization 00:00:39
    • Benefits to Virtualization 00:02:02
    • Benefits to Virtualization Part 1 00:00:49
    • Benefits to Virtualization Part 2 00:02:13
    • Benefits to Vitualization Part 3 00:01:47
    • Virtualization Solutions Part 1 00:00:44
    • Virtualization Solutions Part 2 00:00:38
    • Virtualization Solutions Part 3 00:01:39
    • Choosing What to Virtualize 00:01:27
    • Choosing What to Virtualize Continued 00:02:51
    • Managing Virtualized Servers 00:01:37
    • Managing Virtualized Servers Continued 00:00:55
    • What Can Be Virtualized 00:01:32
    • Migrating P2V 00:00:40
    • SCVMM 00:01:20
    • The Power of SCVMM 00:01:26
    • SCVMM Components 00:01:40
    • SCVMM Illustrated 00:02:23
    • Managing VMs at the Branch Office 00:01:29
    • Demo - Working With Hyper-V 00:09:10
    • Demo - Creating a Virtual Windows 2008 Server 00:03:54
    • Lesson 2: Planning Virtualization for Applications 00:00:18
    • Microsoft SoftGrid Part 1 00:01:50
    • Microsoft SoftGrid Part 2 00:00:49
    • Microsoft SoftGrid Part 3 00:00:23
    • When Should You Use SoftGrid 00:01:32
    • When Shoud You Use SoftGrid Continued 00:00:57
    • Designing Application Virtualization 00:00:56
    • Branch Office Deployments 00:01:23
    • Chapter 09 Review 00:01:11
  11. Chapter 10 - Windows Updates
    • Windows Updates 00:00:24
    • Lesson 1: WSUS 00:00:31
    • The Windows Server Update Services Infrastructure 00:08:46
    • Consider WSUS 00:00:56
    • Managing WSUS 00:01:22
    • WSUS Design 00:01:37
    • WSUS Administration 00:01:05
    • Update Deployment 00:03:34
    • WSUS Hierarchy Illustrated 00:03:14
    • Policies for Updates 00:02:17
    • Planning Automatic Approvals 00:00:59
    • SC Essentials 00:01:10
    • SCCM 2007 00:02:02
    • Demo - Installing WSUS 00:04:14
    • Demo - Exploring WSUS 00:06:20
    • Lesson 2: Software Update Compliance 00:00:21
    • MBSA 00:02:11
    • WSUS Reports 00:02:27
    • SCCM 2007 Compliance and Reporting 00:03:22
    • SCW 00:03:48
    • SCWCMD 00:00:44
    • Best Practices of Role Based Security Policies 00:01:38
    • Demo - Using MBSA 00:07:16
    • Chapter 10 Review 00:01:21
  12. Chapter 11 - Making Data Secure and Available
    • Making Data Secure and Available 00:00:39
    • Lesson 1: Sharing and Collaborating Your Data 00:00:14
    • DFS 00:00:53
    • DFS Continued 00:03:08
    • Advanced DFS 00:01:48
    • DFS Replication, Settings, and Features 00:00:53
    • DFS Replication, Settings, and Features Continued 00:02:12
    • DFS Design Checklist 00:00:53
    • Collaboration 00:00:32
    • WSS Feature Set 00:00:58
    • WSS Feature Set Continued Part 1 00:01:09
    • WSS Feature Set Continued Part 2 00:00:28
    • WSS Feature Set Continued Part 3 00:00:40
    • WSS Deployment 00:01:27
    • MOSS 2007 00:00:37
    • Demo - Installing WSS 00:06:10
    • Demo - Exploring WSS 00:09:36
    • Lesson 2: Protecting Data at Rest 00:00:24
    • BitLocker 00:01:45
    • BitLocker Authentication 00:02:35
    • BitLocker Design Thoughts 00:01:08
    • EFS 00:00:58
    • EFS Best Practices 00:03:18
    • AD RMS Part1 00:01:42
    • AD RMS Part2 00:00:34
    • AD RMS Part3 00:01:10
    • Using RMS 00:00:29
    • RMS Policy Elements 00:01:28
    • RMS Illustrated 00:08:06
    • Demo - Using EFS 00:03:35
    • Lesson 3: System Recoverability and Availability 00:00:31
    • AD DS Backup 00:00:38
    • AD DS Backup Utilities 00:02:37
    • AD DS Recovery 00:01:39
    • Authoritative Restore 00:00:27
    • Authoritative Restore Illustrated 00:07:38
    • AD DS Service 00:01:21
    • Working with FSMOs 00:01:16
    • Scalability 00:00:22
    • NLB 00:02:05
    • NLB Illustrated 00:02:55
    • Failover Clustering 00:02:33
    • Cluster Prerequisites 00:00:19
    • Demo - AD DS Backup 00:09:33
    • Chapter 11 Review 00:01:06
    • Course Closure 00:02:54
  13. Oreilly - 70-647: Microsoft Windows Server Enterprise Administration

    300000006A0116.70647.Microsoft.Windows.Server.Enterprise.Administration.OR.rar

    300000006A0116.70647.Microsoft.Windows.Server.Enterprise.Administration.part1.OR.rar

    300000006A0116.70647.Microsoft.Windows.Server.Enterprise.Administration.part2.OR.rar

    300000006A0116.70647.Microsoft.Windows.Server.Enterprise.Administration.part3.OR.rar

    300000006A0116.70647.Microsoft.Windows.Server.Enterprise.Administration.part4.OR.rar

    300000006A0116.70647.Microsoft.Windows.Server.Enterprise.Administration.part5.OR.rar

    300000006A0116.70647.Microsoft.Windows.Server.Enterprise.Administration.part6.OR.rar


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.




rss