Digi Academy

Designing a Windows Server 2008 Network Infrastructure

Digi Academy
A Milano

Chiedi il prezzo
Chiedi informazioni a un consulente Emagister

Informazioni importanti

Tipologia Corso
Luogo Milano
Inizio Scegli data
  • Corso
  • Milano
  • Inizio:
    Scegli data
Descrizione

Designing an IPv4 Addressing Scheme Designing an IPv6 Addressing Scheme Designing an IPv6 Transition Strategy Designing an IPv4 DHCP Implementation Planning DHCP Scope Configuration Designing an IPv4 Addressing Scheme

Strutture (1)
Dove e quando
Inizio Luogo
Scegli data
Milano
Via Valtellina, 63, 20124, Milano, Italia
Visualizza mappa
Inizio Scegli data
Luogo
Milano
Via Valtellina, 63, 20124, Milano, Italia
Visualizza mappa

Cosa impari in questo corso?

Web master
Windows Server 2008
Server
Security
Management
Windows Server
Wireless
Windows
NetBIOS
Firewall

Programma

Designing an IPv6 Addressing Scheme


Designing a DHCP Implementation


Discuss IP Address Allocation


Implementing an IPv4 Addressing Scheme


After completing this module, students will be able to:


Design an IPv4 addressing scheme.


Design an IPv6 addressing scheme.


Develop an IPv6 transition strategy.


Design a DHCP implementation.


Plan DHCP scope configuration and options.


This module explains how to design an appropriate name resolution strategy that incorporates DNS. The module also covers DNS namespaces, DNS zone implementation, replication, and delegation.


Collecting Information for a Name Resolution Design


Designing a DNS Server Strategy


Designing a DNS Namespace


Designing DNS Zone Implementation


Designing Zone Replication and Delegation


Designing a DNS Namespace


Designing a DNS Server Strategy


Designing a DNS Zone and Replication Strategy


Implementing Name Resolution


After completing this module, students will be able to:


Determine the information required to plan name resolution.


Design a DNS server strategy.


Design a DNS namespace.


Design a DNS zone strategy.


Design a DNS zone replication strategy.


This module explains how to design an advanced name resolution strategy by optimizing DNS queries, designing DNS for high availability, and designing a NetBios name resolution plan.


Optimizing DNS Queries


Designing DNS for High Availability and Security


Designing a NetBIOS Name Resolution Strategy


Designing an Optimized DNS Solution


Designing High Availability for Name Resolution


Designing NetBIOS Name Resolution


Implementing the Optimized Design


After completing this module, students will be able to:


Optimize DNS resolution.


Design DNS for high availability and security.


Design a NetBIOS name resolution strategy.


This module explains how to design a network access solution. The module also describes how to secure network access, design a strategy for RADIUS authentication with NPS, design wireless access, and Internet connectivity.


Securing and Controlling Network Access


Designing Remote Access Services


Designing RADIUS Authentication with Network Policy Services


Designing Wireless Access


Designing Internet Connectivity and Perimeter Networks


Designing a VPN Solution


Designing Network Policy Services


Designing a Wireless Connection Solution


Implementing Network Access


Designing a Perimeter Network


After completing this module, students will be able to:


Secure and control network access.


Design remote access services.


Design a Remote Authentication Dial-In User Service (RADIUS) solution.


Design wireless access.


Design a perimeter network.


Describe how to design network infrastructure to support Windows 7 DirectAccess.


This module explains how to design a network security plan. The module describes the defense-in-depth model for network security and explains how to implement Windows Firewall and NAP policies.


Overview of Network Security Design


Identifying and Analyzing Threats to Network Security


Designing a Windows Firewall Implementation


Designing a Network Access Protection Infrastructure


Assembling a Team for the Security Plan


Identifying Security Threats


Designing a Windows Firewall Implementation


Designing an IPsec Implementation


Implementing Windows Firewall


Analyze NAP Enforcement Methods


Designing DHCP NAP Enforcement


Designing IPsec NAP Enforcement


Implementing VPN NAP Enforcement


After completing this module, students will be able to:


Describe the network security design process.


Describe how to identify and analyze threats to network security.


Describe a Windows Firewall implementation.


Design a NAP infrastructure.


This explains how to design application deployment. This includes deployment of local applications, virtual applications, and virtual desktop.


Overview of Application Deployment


Designing Deployment of Local Applications


Designing Deployment of Virtual Applications


Designing Deployment of Virtual Desktops


Selecting an Application Deployment Method


Deploying a Desktop Application


After completing this module, students will be able to:


Describe the different ways that you can deploy applications to users.


Select an appropriate way to deploy desktop applications.


Determine how to use Microsoft Application Virtualization (App-V) and Microsoft Enterprise Desktop Virtualization (Med-V) for application deployment.


Determine how to use virtual desktops for application deployment.


This module explains how to design remote desktop services. This includes designing RemoteApp, remote connectivity for RDS, and planning a monitoring and management strategy for RDS.


Designing Remote Desktop Services Connectivity


Designing RemoteApp


Designing Remote Connectivity for RDS


Monitoring and Managing RDS


Designing Deployment for a Line of Business Application


Deploying an Application by Using RemoteApp


After completing this module, students will be able to:


Design RDS connectivity.


Design RemoteApp deployment.


Design the Remote Desktop Gateway (RD Gateway) service and Remote Desktop Connection Broker (RD Connection Broker) deployment.


Monitor and manage RDS.


This module explains how to design IIS for web-based applications. The module describes how to design a plan to optimize IIS performance, security, and maintenance.


Designing Web-based Application Infrastructure


Optimizing IIS Performance and Stability


Designing IIS Security


Monitoring and Maintaining IIS


Designing the Infrastructure for a Web-Based Application


Configuring IIS for a Web-Based Application


After completing this module, students will be able to:


Design an appropriate IIS infrastructure for hosting web-based applications.


Determine the appropriate IIS configuration options to increase performance and scalability of web-based applications.


Determine the appropriate IIS configuration option to secure web-based applications.


Design a strategy to maintain IIS for web-based applications.


The module explains how to design file and print services.


Designing File Services


Designing File Server Resource Management


Designing File Encryption


Designing Print Services


Designing File Services


Designing Print Services


Implementing a Consolidated File Share


After completing this module, students will be able to:


Design a file share configuration.


Determine the appropriate way to deploy File Server Resource Manager.


Design file encryption.


Design print services.


This module explains how to design a file replication and caching strategy. The module describes how to use DFS to implement file replication and caching.


Branch Office Data Access


Designing Distributed File System


Designing File Caching


Creating a Design for File Replication and Caching


Implementing DFS


After completing this module, students will be able to:


Describe data access for branch offices, and how it can be improved.


Design a distributed file system.


Design file caching for branch offices and mobile users.


This module explains how to design for business continuity by planning for disaster recovery. The module also describes how to design network load balancing, failover clustering, and geographically dispersed clusters.


Disaster Recovery Planning


Designing Windows Server 2008 Network Load Balancing


Designing Failover Clustering for High Availability


Designing Geographically Dispersed Clusters


Creating a Disaster Recovery Plan


Creating a High Availability Plan for a Stateful Application


Implementing NLB


After completing this module, students will be able to:


Design a disaster recovery plan.


Design Windows Network Load Balancing.


Deploy an application using App-V.


Design geographically dispersed clusters.


This module explains how to design a virtualization infrastructure.


Introduction to Virtualization


Determining Virtualization Suitability


Server Virtualization Design Considerations


Migrating and Managing Virtualized Workloads


Designing Server Migration to a Virtualized Environment


After completing this module, students will be able to:


Describe the benefits of virtualization.


Determine virtualization suitability.


Design a server virtualization strategy.


Explain how to migrate workloads to a virtual environment, and then manage those virtualized workloads.


This module explains how to design an update deployment strategy. This includes designing a WSUS topology and an update management strategy.


Designing a WSUS Topology


Designing an Update Management Strategy


Designing an Update Deployment Strategy


Implementing the Update Deployment Strategy


After completing this module, students will be able to:


Design a WSUS topology.


Design an update management strategy.



Gli utenti che erano interessati a questo corso si sono informati anche su...
Leggi tutto