Description for CBT Nuggets 70 647 Windows Server 2008 Enterprise Admin CBT Nuggets 70-647 Windows Server 2008 Enterprise Admin | 1.2 GB
info
Exam-Pack 070-647 Professional: Windows Server 2008 Enterprise Administrator contains the following videos:
* Design Active Directory Forests and Domains
* Forest and Domain Functional Levels
* UPN and ADPREP
* Trust Relationships
* Active Directory Physical Topology
* Global Catalog, Universal Group Membership Caching, Printer Location Policy
* "Read Only Domain Controllers (RODC)" (free video)
* The Active Directory Administrative Model
* Enterprise-Level Group Policy Strategy
* Upgrade and Migrate Domains, Interoperability
* IP Addressing
* DNS
* Network Access
* Terminal Services
* Application Delivery
* Business Continuity
* Software Updates
* Compliance Management
* Virtualization Strategy
* Data Management and Access
* Designing a PKI Part 1
* Designing a PKI Part 2
* Designing a PKI Part 3
Here's what you'll learn in each video of Exam-Pack 70-647 Professional: Windows Server 2008 Enterprise Administrator:
Video 1 - "Series Intro"
Video 2 - "Design Active Directory Forests and Domains" - Designing Core Identity and Access Management Components, Design Active Directory Forests and Domains, purpose of active directory, enterprise directory, internet directory, network operating system, reasons for single and multiple forests, reasons for single and multiple domains, administrative autonomy, administrative isolation, custom schema modifications, enterprise admins, domain admins, forest root, dedicated forest root, empty forest root.
Video 3 - "Forest and Domain Functional Levels" - Designing Core Identity and Access Management Components, Design Active Directory Forests and Domains, Plan for Interoperability, inter-organizational authorization and authentication, forest and domain functional levels, Domain functional level, forest functional level, fine-grained password policy, forest trust, domain rename, linked value replication, rodc, knowledge consistency checker, KCC, intersite topology generator, ISTG, inetorgperson, DFS-R Sysvol replication, domain controller rename, LastLogonTimestamp, redirusr, redircmp, selective authentication, constrained delegation, authorization manager.
Video 4 - "UPN and ADPREP" - Designing Core Identity and Access Management Components, design active directory forests and domains, user principal name (UPN), adprep, /forestprep, /domainprep, /gpprep, /rodcprep.
Video 5 - "Trust Relationships" - Designing Core Identity and Access Management Components, design active directory forests and domains, intra-organizational authorization and authentication, Cross-forest authentication, manual trust, external trust, realm trust, UNIX kerberos v5 trust, forest trust, shortcut trust.
Video 6 - "Active Directory Physical Topology" - Designing Core Identity and Access Management Components, Placement of servers, site and replication topology, repadmin /bridgeheads, intrasite replication, intersite replication, sites, connection objects, site links, bridgehead servers, site link cost, replication interval, replication schedule, subnets.
Video 7 - "Global Catalog, Universal Group Membership Caching, Printer Location Policy" - Designing Core Identity and Access Management Components, Placement of servers, site and replication topology, global catalog, universal group membership caching, printer location tracking.
Video 8 - "Read Only Domain Controllers (RODC)" - Design the Branch Office Deployment, Authentication Strategy, Server Security, Configure the Read-Only Domain Controller (RODC), dcpromo, advanced options, answer files, Universal Group Membership Caching (UGMC), global catalog, adprep /rodcprep, credential caching, cached passwords, administrator role separation, decommissioning domain controllers.
Video 9 - "The Active Directory Administrative Model" - Design the Active Directory Administrative Model, delegation, group strategy, compliance auditing, group administration, organizational structure, auditpol.exe.
Video 10 - "Enterprise-Level Group Policy Strategy" - Design the enterprise-level group policy strategy. group policy hierarchy and scope filtering, control device installation, authentication and authorization, organizational structure, organizational unity design, scope of management, order of inheritance, modify group policy scope, WMI filters, windows management instrumentation, software deployment using GPO, template files, adm files, admx files, central store.
Video 11 - "Upgrade and Migrate Domains, Interoperability" - Plan for interoperability. inter-organizational authorization and authentication, application authentication interoperability, cross-platform interoperability, Designing support identity and access management components, cross-forest authentication, backward compatibility, object migration, active directory migration tool 3.1, ADMT, active directory federation services, AD FS, domain upgrade, domain restructure, domain upgrade-then-restructure, identity lifecycle manager feature pack 1, ILM FP1, metaverse, identity management for unix, password synchronization, subsystem for UNIX-based applications, SUA, server for NIS, services for NFS.
Video 12 - "IP Addressing" - Planning network and application services, Plan for name resolution and IP addressing, IP addressing scheme, TCP/IP version coexistence, 128-bit addresses, 8 groups of hex characters, IPv4, IPv6, Link-local address, FE80, Unique-local, site-local address, global scope address, internet 2, anycast, transitioning to IPv6, transition richness, dual-stack routers, tunneling 6to4, tunneling 4to6, NAT Protocol Translation, NAT-PT, teredo.
Video 13 - "DNS" - Plan for name resolution, internal and external naming strategy, naming resolution support for legacy clients, naming resolution for directory services. background zone loading, IPv6 support, primary read-only zone, global names zone, GNZ, WINS, dynamic update, netbios name, fully qualified domain name, fqdn, authoritative dns server, dnscmd, split dns, overlapping namespace, cname, isa server, primary zone, primary active directory-integrated zone, secondary zone, DomainDNSzones, ForestDNSzones, child domains, delegation, stub zone, nslookup, glue records, reverse lookup, forwarders, internet root, top level domain servers, TLD servers, caching only dns servers, conditional forwards, dynamic update, secure dynamic update, insecure dynamic update.
Video 14 - "Network Access" - Design for Network Access, network access policies, remote access strategy, perimeter networks, server and domain isolation. Virtual private network, vpn, layer two tunneling protocol, l2tp, point-to-point tunneling protocol, pptp, secure socket tunneling protocol, sstp, eap, eap-tls, peap, ms-chap v2, network access protection, health policy, health registration authority, hra, health requirement server, NAP health policy servers, system health agent, remediation servers, antivirus definitions, restricted network, malware.
Video 15 - "Terminal Services" - Plan for Terminal Services. Terminal Services Licensing, Terminal Services Infrastructure, Terminal Server Fram, terminal services license servers, terminal services gateway servers (TS Gateway), per user client access license, per device client access license, CAL, terminal services web access, terminal services connection authorization policies (TS CAP), terminal services resource authorization policies (TS RAP), terminal services session broker, windows system resource manager (WSRM).
Video 16 - "Application Delivery" - Plan for Application Delivery, Application virtualization, presentation virtualization, locally installed software, softgrid, Microsoft system center application virtualization, management server, app-v, application virtualization client, application virtualization sequencer, port 554, firewall rules.
Video 17 - "Business Continuity" - Plan for business continuity, service availability, directory service recovery. Network load balancing, NLB, clustering, quorum, witness, terminal server farm, web farm, isa server farm, flexible single master operation, operation master, pdc emulator, rid master, schema master, infrastructure master, domain naming master.
Video 18 - "Software Updates" - Design for software updates and compliance management, patch management, patch management compliance, Microsoft update and windows update, windows server update services, WSUS, System center essentials 2007, SCE, system center configuration manager 2007, SCCM, system center operations manager 2007, SCOM.
Video 19 - "Compliance Management" - Design for software updates and compliance management, security baselines, Microsoft baseline security analyzer, MBSA, security configuration wizard, SCW, SCCM baseline, auditing, WSUS.
Video 20 - "Virtualization Strategy" - Design the operating system virtualization strategy, server consolidation, application compatibility, virtualization management, placement of servers, server consolidation, application virtualization, hyper-v, hyper-v clustering, system center virtual machine manager, iSCSI, fibre-channel san, FC-SAN, sandboxing, serial attached scsi, SAS.
Video 21 - "Data Management and Access" - Data Design for data management and data access. Data security, data accessibility, data redundancy, data collaboration, Windows Sharepoint Services, WSS, Microsoft Office Sharepoint Services, MOSS, Distributed File System, DFS, Rights management services, RMS, BitLocker, Windows Server Backup, system state, authoritative restore, wbadmin, complete PC restore.
Video 22 - "Designing a PKI Part 1" - Design and Implement Public Key Infrastructure, Certificate lifecycle management, encryption, signing, hash value, sha-1, certificate templates V1, V2, V3, security requirements, business requirements, active directory, code signing, encrypting file system, EFS, message digest, signature function, private key, public key, S/MIME, clear signed, opaque signed, network device enrollment service, NDES, simple certificate enrollment protocol, SCEP, key length, key lifetime, algorithm.
Video 23 - "Designing a PKI Part 2" - Design and Implement Public Key Infrastructure, enterprise certificate authority CA, standalone certificate authority, root ca, subordinate ca, policy ca, issuing ca, internal ca, external ca, certificate template versions, V1, V2, V3.
Video 24 - "Designing a PKI Part 3" - Design and Implement Public Key Infrastructure, certificate revocation, certificate revocation list, CRL, authority information access AIA, CRL distribution point CDP, smart card enrollment, enrollment agents, certificate templates, autoenrollment, web server certificates.
DOWNLOAD:
Available for users only
NO MORE MIRRORS PLEASE... FOLLOW THE RULES