Designing and Implementing Windows Server 2012 Network Infrastructure and Security
Details
An administrator needs to control the user environment, so students will look at the architecture, scope, inheritance, replication and troubleshooting in group policy before learning to restrict and enable users with login scripts, rights, desktop policies and software deployment and control. We'll also look at further controlling computers through security policies, loopback processing, and templates. Attendees will delegate administration of the configuration policies, control application and inheritance and explore tools to refine the user experience. Comprehensive labs and exercises give the students real experience installing and configuring Active Directory while securing the network.
Prerequisites: Completion of Windows Server 2012 R2 System Administration course or equivalent knowledge.
Outline
- DNS Server Role Introduction
- DNS Architecture
- DNS Name Resolution
- Creating and Managing DNS Zones
- DNS Zone Transfers
- Dynamic DNS
- Integration with Active Directory
- Active Directory DNS Naming Strategy
- DNS AD-Integrated Zones
- Active Directory Architecture
- AD Trust Relationships
- Domain and Forest Functional Levels
- Read-Only Domain Controller (RODC) Configuration
- DHCP Lease Process
- Troubleshooting DHCP Clients
- Authorizing a DHCP Server in Active Directory
- Scopes
- Reservations
- DHCP Options
- Server 2012 Monitoring Tools
- Flexible Single Master of Operations (FSMO) Roles
- Backing Up the AD Database
- Restore Methods
- Troubleshooting AD and Group Policy
- Defining the Active Directory Schema
- Administering the Active Directory Schema
- Schema Modification
- Object Classes and Attributes
- Deactivating Schema Objects
- Group Policy Overview
- Centralized Configuration
- Domain and Local Policies
- Policy Scope
- Policy Inheritance
- Security Configuration Wizard (SCW)
- GPO Replication
- Troubleshooting Conflicts and Inheritance
- Logon Scripts
- Folder Redirection
- User Rights
- Desktop Restrictions
- Application Limitations
- Deploying User Software with .msi Files
- Assigning Applications to the Desktop
- Security Settings
- Policy Refresh Interval
- Loopback Processing
- Reducing Attack Surface through GPO
- Creating Security Policies
- Using Custom Templates
- Fine-Grained Password Policies
- Software Restrictions
- Application Control Policies
- Refreshing the Policy Manually
- Delegating GPO Administration
- Group Policy Management Console (GPMC)
- Combining Policies
- Disabling GPOs
- Block Inheritance
- Enforcement
- Analyzing Resultant Set of Policy (RSoP)
- Group Policy Modeling
- Importing Policies
- Backup and Restore GPOs
- Starter GPOs
- Assigning Software to Users or Computers
- Publishing Applications to Users
- Upgrading and Removing Applications
- Customizing Distributed Software
- Public Key Infrastructure (PKI)
- Installing and Configuring Internet Information Server (IIS) 7.5
- Installing Active Directory Certificate Services
- Web-Based Certificate Request
- Granting and Revoking Certificates
- Publishing the Certificate Revocation List
- PKI Applications and Uses
- Certificate Authorities
- Virtual Private Network (VPN) Configuration
- VPN and Authentication Protocols
- Remote Access Policies
- Network Policy Server (NPS)
- Configuring a RADIUS Server
- Troubleshooting
- Remote Desktop Architecture
- Remote Desktop
- Remote Applications
- RD Web Access
- Mapping Local Resources
- Terminal Server Licensing
- RD Gateway Server
- RD Session Broker
- Remote Desktop Client
- Network Level Authentication
- TCP/IP version 4 (IPv4)
- IPv4 Addressing
- TCP/IP version 6 (IPv6)
- Dynamic Host Configuration Protocol (DHCP)
- TCP/IP Diagnostic Tools
- Windows Firewall with Advanced Security
- Network Troubleshooting
Software Skills Training, Inc. (SST) is a leading provider of task-oriented training courses for IT professionals. Our task-based training philosophy is focused on saving you time and assuring that you are able to work more productively and with higher quality results after training. Founded in 2000, SST has delivered high-powered training to tens of thousands of IT professionals.
Choose from a variety of delivery options:
- Face-to-face in the classroom in over 100 cities
- Live remote attendance
- On-demand streaming
- Group training at your facility
We guarantee the overall quality of our courses with a 100% money-back guarantee. If any student is not totally satisfied for any reason, they can withdraw before the second day of class. Notify the instructor and return all course materials and receive a 100% refund.
Why Choose SST?- 50% hands on labs
- Small class sizes typically under 14 students
- Expert instructors that average over 10 years of teaching experience
- Students can retake any portion of a class that has been completed, within 12 months at no extra cost
- No registration fees or cancellation fees