Configuring Advanced Windows Server 2012 Services

Corso

A Milano

Prezzo da consultare

Chiama il centro

Hai bisogno di un coach per la formazione?

Ti aiuterà a confrontare vari corsi e trovare l'offerta formativa più conveniente.

Descrizione

  • Tipologia

    Corso

  • Luogo

    Milano

  • Inizio

    Scegli data

Configuring Advanced DHCP Features Configuring Advanced DNS Settings Implementing IPAM Configuring Advanced DHCP Settings Configuring Advanced DNS Settings Configuring IPAM After completing this module, students will be able to:

Sedi e date

Luogo

Inizio del corso

Milano
Visualizza mappa
viale Piero e Alberto Pirelli 6, 20126

Inizio del corso

Scegli dataIscrizioni aperte

Domande e risposte

Aggiungi la tua domanda

I nostri consulenti e altri utenti potranno risponderti

Chi vuoi che ti risponda?

Inserisci i tuoi dati per ricevere una risposta

Pubblicheremo solo il tuo nome e la domanda

Opinioni

Materie

  • Windows Server 2008
  • Server
  • Clustering
  • Windows Server
  • Windows
  • E-business

Programma

Configure advanced DNS services.


Configure advanced DHCP services.


Implement IPAM.


This module describes how to configure and manage iSCSI and BranchCache, and how to implement Windows 2012 features that optimize storage utilization, such as File Server Resource Manager, file classification, and data duplication.


Configuring iSCSI Storage


Configuring BranchCache


Optimizing Storage Usage


Configuring iSCSI Storage


Configuring the File Classification Infrastructure


Configuring the Main Office Servers for BranchCache


Configuring the Branch Office Servers for BranchCache


Configuring Client Computers for BranchCache


Monitoring BranchCache


After completing this module, students will be able to:


Configure iSCSI storage.


Configure BranchCache.


Optimize storage usage.


This module describes how to plan and implement Dynamic Access Control.


Overview of Dynamic Access Control


Planning for Dynamic Access Control


Deploying Dynamic Access Control


Planning the Dynamic Access Control Implementation


Configuring User and Device Claims


Configuring Resource Property Definitions


Configuring Central Access Rules and Central Access Policies


Validating and Remediating Dynamic Access Control


Implementing New Resource Policies


After completing this module, students will be able to:


Plan for Dynamic Access Control.


Deploy Dynamic Access Control.


This module describes the components of a highly complex AD DS deployment, which includes implementing a distributed AD DS deployment and configuring AD DS forest trusts.


Overview of Distributed AD DS Deployments


Deploying a Distributed AD DS Environment


Configuring AD DS Trusts


Implementing Child Domains in AD DS


Implementing Forest Trusts


After completing this module, students will be able to:



Describe and understand distributed AD DS deployments.


Implement a distributed AD DS deployment.


Configure AD DS trusts.



This module describes how replication works in a Windows Server 2012 AD DS environment, including how to configure AD DS sites so that you can optimize AD DS network traffic and how to configure and monitor AD DS replication.


Overview of AD DS Replication


Configuring AD DS Sites


Configuring and Monitoring AD DS Replication


Modifying the Default Site


Creating Additional Sites and Subnets


Configuring AD DS Replication


After completing this module, students will be able to:



Describe AD DS replication.


Configure AD DS sites.


Configure and monitor AD DS replication.



This module describes the Public Key Infrastructure (PKI) components and concepts. It covers implementing a certification authority infrastructure, planning and implementing a certificate template deployment using an AD CS certification authority, and planning and implementing certificate distribution and revocation.


PKI Overview


Deploying CAs


Deploying and Configuring CA Hierarchy


Deploying and Managing Certificate Templates


Implementing Certificate Distribution and Revocation


Managing Certificate Recovery


Configuring Certificate Templates


Configuring Certificate Enrollment


Configuring Certificate Revocation


Configuring Key Recovery


After completing this module, students will be able to:



Describe the PKI.


Deploy certification authorities.


Deploy and configure the CA hierarchy.


Deploy and manage certificate templates.


Implement certificate distribution and revocation.


Manage certificate recovery.



This module describes the AD RMS features and functionality. It explains how to use AD RMS to configure content protection, and deploy and manage an AD RMS infrastructure.


AD RMS Overview


Deploying and Managing an AD RMS Infrastructure


Configuring AD RMS Content Protection


Configuring External Access to AD RMS


Installing and Configuring AD RMS


Configuring AD RMS Templates


Implementing the AD RMS Trust Policies


Verifying the AD RMS Deployment


After completing this module, students will be able to:



Describe AD RMS.


Deploy and manage an AD RMS infrastructure.


Configure AD RMS content protection.


Configure external access to AD RMS.



This module provides identity federation business scenarios, and it describes how to use AD FS to address such scenarios. It explains how to configure AD FS prerequisites, deploy AD FS services, enable single sign-on (SSO) for an organization, and enable SSO between federated business partners.


Overview of AD FS


Deploying AD FS


Implementing AD FS for a Single Organization


Deploying AD FS in a B2B Federation Scenario


Configuring AD FS Prerequisites


Installing and Configuring AD FS


Configuring AD FS for a Single Organization


Configuring AD FS for Federated Business Partners


After completing this module, students will be able to:



Describe AD FS.


Deploy AD FS.


Implement AD FS for a single organization.


Deploy AD FS in a business-to-business federation scenario.



This module describes how to plan and implement NLB. It will cover managing and configuring an NLB cluster and validating high availability for an NLB cluster.


Overview of NLB


Configuring an NLB Cluster


Planning an NLB Implementation


Implementing a Network Load Balancing Cluster


Configuring and Managing the NLB Cluster


Validating High Availability for the NLB Cluster


After completing this module, students will be able to:



Configure an NLB cluster.


Plan an NLB implementation.



This module describes the failover clustering features in Windows Server 2012. It explains how to implement a failover cluster, configure highly available applications and services on a failover cluster, maintain a failover cluster, and use new maintenance features such as Cluster Aware Updating (CAU). It will also cover how to implement multi-site failover clustering.


Overview of Failover Clustering


Implementing a Failover Cluster


Configuring Highly Available Applications and Services on a Failover Cluster


Maintaining a Failover Cluster


Implementing a Multi-Site Failover Cluster


Configuring a Failover Cluster


Deploying and Configuring a Highly Available File Server


Validating the Deployment of the Highly Available File Server


Configuring Cluster-Aware Updating on the Failover Cluster


After completing this module, students will be able to:



Implement a failover cluster.


Configure highly available applications and services on a failover cluster.


Maintain a failover cluster.


Implement a multi-site failover cluster.



This module describes the options for making virtual machines highly available. It explains


how to implement virtual machines in a failover cluster that was deployed on a host and how you can move a virtual machine or its storage. In addition, it provides a high-level overview of System Center Virtual Machine Manager (SCVMM) 2012.


Overview of Integrating Hyper-V with Failover Clustering


Implementing Hyper-V Virtual Machines on Failover Clusters


Implementing Hyper-V Virtual Machine Movement


Managing Hyper-V Virtual Environments by Using VMM


Configuring Hyper-V Replicas


Configuring a Failover Cluster for Hyper-V


Configuring a Highly Available Virtual Machine


After completing this module, students will be able to:



Describe Hyper-V integration with failover clustering.


Implement Hyper-V virtual machines on failover clusters.


Implement Hyper-V virtual machine movement.


Manage Hyper-V virtual environments by using VMM.



This module describes considerations for implementing a disaster recovery solution, and how to plan and implement a backup solution for Windows Server 2012. In addition, it explains how to plan and implement server and data recovery using Windows Server backup and Microsoft Online backup.


Overview of Disaster Recovery


Implementing Windows Server Backup


Implementing Server and Data Recovery


Backing Up Data on a Windows Server 2012 Server


Restoring Files Using Windows Server Backup


Implementing Microsoft Online Backup and Restore


After completing this module, students will be able to:



Describe disaster recovery.


Implement Windows Server backup using Windows Server backup and Microsoft Online backup.


Implement server and data recovery.


Chiama il centro

Hai bisogno di un coach per la formazione?

Ti aiuterà a confrontare vari corsi e trovare l'offerta formativa più conveniente.

Configuring Advanced Windows Server 2012 Services

Prezzo da consultare