Active Directory Services with Windows Server

Corso

A Milano

Prezzo da consultare

Chiama il centro

Hai bisogno di un coach per la formazione?

Ti aiuterà a confrontare vari corsi e trovare l'offerta formativa più conveniente.

Descrizione

  • Tipologia

    Corso

  • Luogo

    Milano

  • Inizio

    Scegli data

Introduction to Access and Information Protection Solutions in Business Overview of AIP Solutions in Windows Server 2012 Overview of FIM 2010 R2 Analyze the Lab Scenario and Identify Business Requirements

Sedi e date

Luogo

Inizio del corso

Milano
Visualizza mappa
viale Piero e Alberto Pirelli 6, 20126

Inizio del corso

Scegli dataIscrizioni aperte

Domande e risposte

Aggiungi la tua domanda

I nostri consulenti e altri utenti potranno risponderti

Chi vuoi che ti risponda?

Inserisci i tuoi dati per ricevere una risposta

Pubblicheremo solo il tuo nome e la domanda

Opinioni

Materie

  • Web master
  • Windows Server 2008
  • Server
  • Proxy
  • Windows Server
  • Active Directory
  • Windows
  • E-business

Programma

Propose a Solution


After completing this module students will be able to:


Describe Access and Information Protection solutions in business.


Describe Access and Information Protection solutions in Windows Server 2012 and Windows Server 2012 R2.


Describe Microsoft Forefront Identity Manager (FIM) 2010 R2.


This module explains how to deploy AD DS remotely and describes the virtualization safeguards, cloning abilities and extending AD DS to the cloud.


Deploying AD DS


Deploying and Cloning Virtual Domain Controllers


Deploying Domain Controllers in Windows Azure


Administering AD DS


Deploying AD DS


Deploying Domain Controllers by Performing Domain Controller Cloning


Administering AD DS


After completing this module, students will be able to:


Describe and perform various deployment techniques for AD DS.


Describe virtual domain controller deployment considerations.


Explain how new technologies in Windows Server 2012 and Windows Server 2012 R2 support virtual domain controllers.


Describe Domain Controller cloning.


Implement AD DS using the tools provided in Windows Server 2012 and Windows Server 2012 R2.


This module describes the threats to domain controllers and what methods can be used to secure the AD DS and its domain controllers.


Securing Domain Controllers


Implementing Account Security


Implementing Audit Authentication


Implementing Security Policies for Accounts, Passwords, and Administrative Groups


Deploying and Configuring an RODC


After completing this module, students will be able to:


Understand the importance of securing domain controllers.


Describe the benefit of read-only domain controllers (RODCs).


Explain and implement password and account lockout policies.


Implement audit authentication.


This module explains how AD DS replicates information between domain controllers within a single site and throughout multiple sites. This module also explains how to create multiple sites and how to monitor replication to help optimize AD DS replication and authentication traffic.


Overview of AD DS Replication


Configuring AD DS Sites


Configuring and Monitoring AD DS Replication


Creating Subnets and Sites


Deploying an Additional Domain Controller


Configuring AD DS Replication


Troubleshooting AD DS Replication


After completing this module, students will be able to:


Describe AD DS replication.


Configure AD DS sites.


Configure and monitor AD DS replication.


This module describes Group Policy, how it works, and how best to implement it within your organization.


Introducing Group Policy


Implementing and Administering GPOs


Group Policy Scope and Group Policy Processing


Troubleshooting the Application of GPOs


Creating and Configuring GPOs


Managing GPO Scope


Verifying GPO Application


Managing GPOs


Troubleshooting GPOs


After completing this module, students will be able to:


Describe Group Policy.


Implement and administer GPOs.


Describe Group Policy scope and Group Policy processing.


Troubleshoot the application of GPOs.


This module describes how to how to use GPO Administrative Templates, Folder Redirection, and Group Policy features to configure users’ computer settings.


Implementing Administrative Templates


Configuring Folder Redirection and Scripts


Configuring Group Policy Preferences


Implementing Settings by Using Group Policy Preferences


Configuring Folder Redirection


After completing this module, students will be able to:


Implement Administrative Templates.


Configure Folder Redirection and scripts.


Configure Group Policy preferences.


This module explain how to deploy and manage Certificate Authorities (CAs) with Active Directory Certificate Services (AD CS)


Deploying CAs


Administering CAs


Troubleshooting, Maintaining, and Monitoring CAs


Deploying an Offline Root CA


Deploying an Enterprise Subordinate CA


After completing this module, students will be able to:


Deploy Certificate Authorities.


Administer Certificate Authorities.


Troubleshoot, maintain, and monitor Certificate Authorities.


This module describes certificate usage in business environments and explains how to deploy and manage certificates, configure certificate templates and manage enrolment process. This module also covers the deployment and management of smart cards.


Using Certificates in a Business Environment


Deploying and Managing Certificate Templates


Managing Certificates Deployment, Revocation, and Recovery


Implementing and Managing Smart Cards


Configuring Certificate Templates


Enrolling and using certificates


Configuring and Implementing Key Recovery


After completing this module, students will be able to:


Use certificates in business environments.


Deploy and manage certificate templates.


Manage certificates deployment, revocation and recovery.


Implement and manage smart cards.


This module introduces Active Directory Rights Management Services (AD RMS). It also describes how to deploy AD RMS, how to configure content protection, and how to make AD RMS–protected documents available to external users.


Overview of AD RMS


Deploying and Managing an AD RMS Infrastructure


Configuring AD RMS Content Protection


Configuring External Access to AD RMS


Install and Configure AD RMS


Configure AD RMS Templates


Verifying AD RMS on Clients


Configure AD RMS Monitoring and Reporting


After completing this module, students will be able to:


Describe AD RMS.


Explain how to deploy and manage an AD RMS infrastructure.


Explain how to configure AD RMS content protection.


Explain how to configure external access to AD RMS.


This module explains AD FS, and then provides details on how to configure AD FS in both a single organization scenario and in a partner organization scenario. This module also describes the Web Application Proxy feature in Windows Server 2012 R2 that functions as an AD FS proxy and reverse proxy for web-based applications.


Overview of AD FS


Deploying AD FS


Implementing AD FS for a Single Organization


Deploying AD FS in a Business-to-Business Federation Scenario


Extending AD FS to External Clients


Installing and Configuring AD FS


Configure an Internal Application for AD FS


Configuring AD FS for a Federated Business Partner


Configuring Web Application Proxy


After completing this module, students will be able to:


Describe AD FS.


Explain how to configure the AD FS prerequisites, and deploy AD FS services.


Describe how to implement AD FS for a single organization.


Deploy AD FS in a business-to-business federation scenario.


Deploy the Web Application Proxy.


This module explains how to use Dynamic Access Control (DAC), Work Folders, Work place Join and how to plan and implement these technologies.


Overview of Dynamic Access Control


Implementing DAC Components


Implementing DAC for Access Control


Implementing Access Denied Assistance


Implementing and Managing Work Folders


Implementing Workplace Join


Preparing for DAC Deployment


Implementing DAC


Validating and Remediating DAC


Implementing Work Folders


After completing this module, students will be able to:


Describe DAC.


Implement DAC components.


Implement DAC for access control.


Implement access-denied assistance.


Implement and manage Work Folders.


Implement Workplace Join.


This module explains how to use tools that help monitor performance in real time, and how to record performance over time to spot potential problems by observing performance trends. This module also explains how to optimize and protect your directory service and related identity and access solutions so that if a service does fail, you can restart it as quickly as possible.


Monitoring AD DS


Managing the AD DS Database


AD DS Backup and Recovery Options for AD DS and Other Identity and Access Solutions


Monitoring AD DS with Performance Monitor


Backing Up and Restoring AD DS


Recovering Objects in AD DS


After completing this module, students will be able to:


Monitor AD DS.


Manage the AD DS database.


Recover objects from the AD DS database.


This module explains the concepts and technologies in Windows Azure Active Directory and how to implement and integrate it within your organization


Overview of Windows Azure AD


Managing Windows Azure AD Accounts


Implementing Windows Azure AD for Office 365


Implementing Windows Azure AD for a Cloud-Based Application


After completing this module, students will be able to:


Describe Windows Azure AD.


Administer Azure AD.


This module explains how to deploy and configure Active Directory Lightweight Directory Services (AD LDS)


Overview of AD LDS


Deploying AD LDS


Configuring AD LDS Instances and Partitions


Configuring AD LDS Replication


Integrating AD LDS with AD DS


Configuring AD LDS Instances and Partitions


Configuring AD LDS Replication


Synchronizing AD LDS with AD DS


After completing this module, students will be able to:


Describe AD LDS.


Explain how to deploy AD LDS.


Explain how to configure AD LDS instances and partitions.


Explain how to configure AD LDS replication.


Chiama il centro

Hai bisogno di un coach per la formazione?

Ti aiuterà a confrontare vari corsi e trovare l'offerta formativa più conveniente.

Active Directory Services with Windows Server

Prezzo da consultare