0% found this document useful (0 votes)
128 views14 pages

Mcitp 2008 Server Syllabus

mcitp syllabus
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
128 views14 pages

Mcitp 2008 Server Syllabus

mcitp syllabus
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

MCITP 2008 SERVER Syllabus

Network Essentials Networking Concepts, History of Server OS Introduction to windows server 2003 & 2008 Features of Windows Server 2008 Installation of Windows Server 2008 Installation of windows Vista Introduction and Creation of Users accounts

RODC & Physical Structure of AD-DS Introduction & Configuration of Read-Only Domain Controller SITES and Global Catalog Backup Strategies Replication between the Domain Controllers AD-DS Partitions

Active Directory - Domain Services IP Addressing Logical Topologies - Peer-Peer & Domain Models Introduction to Directory Services Evolution of Active Directory Services - LDAP Protocol Features of Active Directory Installing Active Directory Domain Controller

Dynamic Host Configuration Protocol (DHCP) Introduction and Configuration of DHCP Server DHCP Client Configuration Reservations BOOTP Server DHCP Backup

Member Servers, Clients, User Configuration Configuring Member Servers and Clients. Creating Users in AD-DS User Logon policies Password policies Account Lockout policies User properties

Domain Name System (DNS) Internet Basics, Host & LM Host Files DNS Naming Hierarchy Lookup Zones - Forward and Reverse lookup Zones Types of Zones Primary, Secondary & Stub Zone Resource Records, Integration with ADS, SRV Records

Terminal Services Terminal Server Configuration Terminal Server Licensing Mode Remote Desktop

T.S Web access administration and T.S Remote Apps. Overview of T.S Gateway service

Internet Information Services

IIS 7.0 Configuration

Hosting Websites, Virtual Directories Backup & Restoring Sites FTP Server Configuration

User Profile Types of Profiles Local, Roaming and Mandatory Profiles Home Folder Disk Quotas

Permissions/Access Control Lists File Systems Security and Sharing Permissions - Folders & Files Offline Folder

Logical Structure of AD - DS Configuring ADC Tree Structure - Child Domain FOREST Structure

Routing & Remote Access Routing Configuration - Static Routes ICS, NAT, DHCP Relay Agent

Remote Access Server Configuration Dial-in & Dial-out VPN - PPTP, L2TP

FSMO Roles of AD - DS Roles of AD - DS Transferring of Roles Seizing of Roles

Windows Deployment Services Introduction & Configuration of WDS Server Attended & Unattended Installation

Distributed File System, Backup & Recovery, Printers Introduction to DFS & File server Configuring Namespace, Folders etc Introduction to Backup & Backup media Types of Backups & Strategies Recovery of Data from any backup media Introduction to printers Types of printers & configuration

Disk Management Basic & Dynamic Disks Types of Volumes RAID 0, 1, 5 Levels Remote Hard disk Partitioning

Mounting Concepts

Active Directory Trusts Introduction to Trust Relationship Categories, Directions & Types of Trusts Functional Levels Authentication Protocols Configuring Forest Trusts between 2008 Forests

Advanced Topics Windows Server Core Upgrading windows server 2003 to 2008 Groups, VSS, Paging File System state backup & restoration Domain Renaming, Auditing policies Overview of AD- FS, LDS, RMS, CS

Group Policy / System Policy Organizational Unit, Delegation of Control User & Computer Policies Scope of Policies - OU, Domain, Sites Group policy modeling (RSOP) Software Deployment Scripts, Folder Redirection

MCITP Syllabus

MCITP Syllabus . Planning and Maintaining a Microsoft Windows Server 2008 Network Infrastructure Implementing and Configuring a Windows Deployment Infrastructure Deploying Windows in a Windows Server 2008 Environment Windows Deployment Fundamentals Windows Deployment Methods Introducing Windows Deployment Services Understanding WDS Infrastructure Components Installing WDS Configuring WDS Capturing Images with WDS Deploying Images with WDS What Are Virtual Machines? Virtual PC 2007 Virtual Server 2005 R2 SP1 Configuring Server Storage and Clusters Understanding Server Storage Technologies Managing Disks, Volumes, and Partitions in Windows Server 2008 Working with Disk Sets Server Cluster Fundamentals Configuring an NLB Cluster Creating a Failover Cluster Configure Storage Configure High Availability Installing and Configuring Terminal Services Deploying a Terminal Server Understanding Terminal Services Enabling Remote Desktop Installing Terminal Services Staging the Terminal Server Introducing the Terminal Services Configuration Console Configuring Connection (RDP-Tcp) Properties Configuring Terminal Services Server Properties Configuring Terminal Services Printer Redirection Deploy a Terminal Server Farm Configuring and Managing a Terminal Services Infrastructure. Configuring and Managing Terminal Services Clients Configuring Terminal Services Client Settings Configuring User Profiles for Terminal Services Managing Terminal Services User Connections

Managing Resources in Client Sessions Deploying Terminal Services Gateway Overview of Terminal Services Gateway Installing and Configuring a TS Gateway Server Publishing Applications with TS RemoteApp Configuring a Server to Host RemoteApp Programs Adding Programs for Publication in TS RemoteApp Manager Deploying a RemoteApp Program through TS Web Access Creating an RDP File of a RemoteApp Program for Distribution Creating a Windows Installer Package of a RemoteApp Program for Distribution Deploy a Terminal Services Infrastructure Installing and Configuring Web Applications Installing the Web Server (IIS) Role Understanding Web Server Security Understanding IIS Components and Options Understanding the Application Server Role Understanding IIS 7.0 Role Services Installing the Web Server (IIS) Role Using Windows System Resource Manager Configuring Internet Information Services Working with IIS Management Tools Creating and Configuring Web Sites Understanding Web Applications Working with Application Pools Working with Virtual Directories Using Command-Line Management Managing Web Server Configuration Files Migrating From IIS 6.0 Managing Web Server Security Understanding IIS 7 Security Accounts Managing File System Permissions Configuring IIS Administration Features Managing Request Handlers Managing IIS Security Settings Managing IIS Authentication Managing URL Authorization Rules Configuring Server Certificates Configuring IP Address and Domain Restrictions Configuring .NET Trust Levels Implementing Web Server Security

Configuring FTP and SMTP Services Configuring FTP Installing the FTP Publishing Service Configuring FTP Sites by Using IIS 6.0 Manager Installing and Managing FTP 7 Managing FTP Sites Managing FTP User Security Configuring FTP Network Security Managing FTP Site Settings Using FTP Client Software Configuring and Testing FTP Configuring SMTP Installing the SMTP Server Feature Configuring SMTP Services Monitoring SMTP Virtual Servers Using an SMTP Virtual Server Configuring Windows Media Services Configuring Windows Media Services Understanding Media Services Installing Streaming Media Services Using Windows Media Services Management Tools Managing Publishing Points Configuring Source Settings Creating Announcements Configuring Publishing Point Properties Managing Advertising Settings Configuring Security for Windows Media Services Enabling Cache/Proxy Features Protecting Media by Using DRM Configuring Windows SharePoint Services Configuring and Managing Windows SharePoint Services Understanding Windows SharePoint Services Understanding WSS Deployment Options Verifying the WSS Installation Using the SharePoint Central Administration Web Site Managing SharePoint Operations Settings Understanding Backup and Recovery for WSS Deploying and Configuring SharePoint Sites Managing Web Applications Installing Application Templates Planning, Implementing, and Maintaining a Microsoft

Windows Server 2008 Active Directory Infrastructure Installing, Upgrading, and Deploying Windows Server 2008 Planning Windows Server 2008 Installation and Upgrade Selecting the Right Edition of Windows Server 2008 Windows Server 2008 Server Core Installing Windows Server 2008 Upgrading from Windows Server 2003 Windows Server 2008 Answer Files Windows Deployment Services Multicast, Scheduled, and Automatic Deployment Rollback Preparation Deployment Services Role Configuring Network Connectivity Using IPv6 in Windows Server 2008 Addressing Problems Caused by IPv4 Limitations Analyzing the IPv6 Address Structure Planning an IPv4 to IPv6 Transition Strategy Implementing IPv4-to-IPv6 Compatibility Using IPv6 Tools Configuring Clients Through DHCPv6 Planning an IPv6 Network Configuring DNS Using Windows Server 2008 DNS Examining New DNS Features and Enhancements Planning a DNS Infrastructure Active Directory and Group Policy Windows Server 2008 Active Directory Introducing the Windows Server 2008 Directory Server Role Planning Domain and Forest Functionality Planning Forest-Level Trusts Raising Domain and Forest Functional Levels and Configuring FineGrained Password Policy Group Policy in Windows Server 2008 Understanding Group Policy Planning and Managing Group Policy Troubleshooting Group Policy Application Servers and Services Application Servers Planning Application Availability Ensuring Application Availability Implementing Application Accessibility Planning Application Resilience

Application Deployment Deploying Applications Using System Center Essentials Using System Center Configuration Manager 2007 Terminal Services and Application and Server Virtualization Terminal Services Planning Terminal Server Infrastructure Terminal Services Licensing Configuring Terminal Servers Terminal Services Web Access Terminal Server Session Broker Monitoring Terminal Services Terminal Services Gateway Server and Application Virtualization Managing Virtualized Servers Terminal Services RemoteApp Microsoft Application Virtualization File and Print Servers Managing File and Print Servers Planning the File Services Server Role Managing Access Control Using FSRM to Configure Quotas and File Screen Policy Planning the Print Services Server Role Using DFS Namespace to Plan and Implement a Shared Folder Structure and Enhance Data Availability Configuring a DFSR Structure Configuring Offline Data Access Configuring Indexing in the Windows Search Service Windows Server 2008 Management, Monitoring, and Delegation Server Management Strategies Tools for the Administration of Windows Server 2008 Remote Administration Technologies Managing Windows Server 2008 Event Logs Remotely Managing Windows Server 2008 Monitoring and Optimizing Performance Reliability and Performance Optimizing Windows Server 2008 Performance Windows System Resource Manager Data Collector Sets, Reports, and WSRM Policies Delegating Authority Delegation Policies Delegation Procedures

Credential Delegation Delegating the Management of Applications Delegating Administrative Permissions Patch Management and Security Windows Server 2008 Patch Management Strategies Deploying Updates with WSUS Replica Mode and Autonomous Mode Using Computer Groups WSUS Client Configuration Updates and Synchronization Strategies Update Management and Compliance Other Patch Management Tools Monitoring Server Security Encrypting File System Windows Firewall with Advanced Security Remote Access and Network Access Protection Managing Remote Access VPN Protocols and Authentication Network Policy Server Remote Access Accounting Terminal Services Gateway Servers Network Access Protection System Health Agents and Validators NAP Enforcement Methods Remediation Servers Certificate Services and Storage Area Networks Configuring Active Directory Certificate Services Types of Certificate Authority Certificate Services Role-Based Administration Configuring Credential Roaming Configuring Auto enrollment Configuring Web Enrollment Support Configuring Certificate Revocation Lists Configuring an Online Responder for Certificate Services Network Device Enrollment Service Using Enterprise PKI to monitor CA Health Planning the Deployment of Storage Area Networks Logical Unit Numbers VDS Storage Manager For SANs Multipath I/O Storage Explorer

Clustering and High Availability Understanding DNS Round Robin and Load Balancing Plan Availability Strategies DNS Round Robin Configuring Windows Network Load Balancing Windows Server 2008 Cluster Tools Selecting Redundancy Strategies Understanding Cluster Concepts Configuring Failover Clustering Backup and Recovery Backing Up Data Shadow Copies of Shared Folders Windows Server Backup The wbadmin Command-Line Tool Backing Up Server Roles and Applications Remotely Backing Up Computers Further Considerations for Planning Backups System Center Data Protection Manager Backing Up Windows Server 2008 Disaster Recovery Windows Server Backup Recovery Modes Recovering Active Directory Hyper-V and Disaster Recovery

Designing Security for Microsoft Networks


Introduction to Designing Security Introduction to Designing Security for Microsoft Networks Contoso Pharmaceuticals: A Case Study Creating a Plan for Network Security Introduction to Security Policies Defining a Process for Designing Security Creating a Security Design Team Planning a Security Framework Identifying Threats to Network Security Introduction to Security Threats Predicting Threats to Security Analyzing Security Risks Introduction to Risk Management Creating a Risk Management Plan Creating a Security Design for Physical Resources Determining Threats and Analyzing Risks to Physical Resources Designing Security for Physical Resources

Creating a Security Design for Computers Determining Threats and Analyzing Risks to Computers Designing Security for Computers Creating a Security Design for Accounts Determining Threats and Analyzing Risks to Accounts Designing Security for Accounts Creating a Security Design for Authentication Determining Threats and Analyzing Risks to Authentication Designing Security for Authentication Creating a Security Design for Data Determining Threats and Analyzing Risks to Data Designing Security for Data Creating a Security Design for Data Transmission Determining Threats and Analyzing Risks to Data Transmission Designing Security for Data Transmission Creating a Security Design for Network Perimeters Determining Threats and Analyzing Risks to Network Perimeters Designing Security for Network Perimeters Designing Responses to Security Incidents Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response Procedure

You might also like