70-642 R5: Configuring Windows Server 2008 R2 Network Infrastructure

Course Introduction 4m
Course Introduction
Chapter 01 – Understanding and Configuring IP 1hr 49m
Lesson 1: Introducing the OSI Model
Understanding the Network Layers
7 Layers of the OSI
Encapsulation / De-Encapsulation
Comparing the OSI and TCP/IP Models
Lesson 2: How IPv4 Works
Ipv4 Address Structure
Why the Subnet Mask
How to Convert Binary to Decimal and Vice-Versa
Understanding What Routing and Default Gateways Are
Discussion of RFC 1918
Lesson 3: Subnets and Supernets
What is Subnetting
What is Supernetting
Draw On Supernetting Example
Demo – Testing Connectivity
Lesson 4: What’s New with IPv6
Introducing IPv6
IPv6 Address Types
IPv6 Transition Technologies
Lesson 5: Configuring Windows with an IPv4 Address
Configuring Networking Properties for Vista and 2008 Server
Viewing Network Connections
Network Connection Components
Methods of Configuring and Verifying an IP Address
Troubleshooting Network Connectivity
Demo – Configuring IP
Chapter 01 Review
Chapter 02 – Configuring IP Based Solutions 3hrs 53m
Lesson 1: Why Use a DHCP Server
What are DHCP Address Assignments?
Configuring the Address Leases
Understanding the DHCP Scope
SuperScope
DHCP Class Options
DHCP Sizing
Adding the DHCP Server Role
Authorizing the DHCP Server
What is the DHCPv6 Stateless Role?
Demo – DHCP
Demo – DHCP Options
Lesson 2: Creating DHCP Servers for Your Network
Post-Installation Tasks
Other DHCP Options
DHCP Relay Agent
Post Installation Management Concerns
DHCP Database Files
DHCP on the Server Core
Lesson 3: How Windows Performs Name to IP Resolution
Name Resolution Methods in Windows
What’s New with 2008 R2
Broadcast Name Resolution
WINS Server Name Resolution
Lesson 4: Configuring Windows to Use DNS
Specifying DNS Servers
The Suffix Search List
DNS Forwarding Options
Cache Locking
How to Clear the Client’s Cache
Using Dynamic Update Settings
Demo – DNS Client
Lesson 5: How Does DNS Really Work
First Some Definitions
How a DNS Query Works
DNS Query Example
DNS Query Illustrated
Forwarders
How Caching Works
Demo – Name Resolution
Lesson 6: Deploying DNS Servers
Zone Transfers
Securing Zone Transfers
DNS on DC Deployment
Using Server-Core for DNS Services
Making a Stand-Alone or Member-Server DNS
Configuring a Caching-only DNS Server
Configuring Server Properties
DNSSEC
Zone Delegation
Demo – Configuring DNS
Lesson 7: DNS Configurable Options
Integrating WINS records into DNS
Aging and Scavenging
Demo – Global Names Zone
Lesson 8: Managing Different Types of DNS Zones
How to Create Zones
The Scope of AD Zone Replication
Creating and Using the Forward and/or Reverse Lookup Zone
Using Dynamic Updates
Exploring the Built-in Resource Records
DNS Record Options
Round Robin
TTL
Weight
Netmask Ordering
DNSUpdateProxy Group
Lesson 9: Configuring Zone Replication and Transfers
Configure a Zone Replication Scope for Active Directory
Choosing Zone Replication Scope
Creating Custom Application Directory Partitions
Zone Transfers
Implementing Stub Zones
Demo – Secondary Zone
Chapter 02 Review
Chapter 03 – Understanding IP Routing 1hr 19m
Lesson 1: Routing Explained
Routing Overview
Routing Process
Tools Used to Verify Routing
Lesson 2: Router Communication Protocols
Routing Protocols
RIP – Detail
Other Routing Options
Routing and Remote Access
Demo – IP Routing
Demo – Routing Protocols
Chapter 03 Review
Chapter 04 – Connecting Windows to the LAN 1hr 27m
Lesson 1: NAT Explained
NAT Concepts
Windows 2008 NAT Options
Lesson 2: Making NAT Work
Configuring ICS
Configuring NAT using RRAS
Troubleshooting NAT
Lesson 3: Remote Access to Other Networks
Remote Access Overview
Configuring VPN Connections
Configuring Dial-Up Server
Configuring the VPN Server
Other Options
Testing Connectivity
Demo – VPN Connections
Lesson 4: WiFi Basics
Wireless Networking Concepts
Wireless Networking Standards
Wireless Security Standards
Wireless Infrastructure
Authenticating Wireless with Windows Server 2008
Connecting to Wireless Networks
Best Practices
Demo – Wireless Network
Demo – Wireless Group Policy
Chapter 04 Review
Chapter 05 – Securing the Client, Network, and Communications 3hrs 35m
Lesson 1: Communication Security: IPSec
Explaining IPSec
IPSec Policies
Understanding Connection Security Rules
Security Associations
How IPSec Establishes Connections
What Authentication Methods can be used with IPSec
Lesson 2: Enforcing IPSec with Policies
Looking at the Predefined IPSec Policies
Using the IPSec Security Rule Wizard
IPSec Negotiations
Name Resolution Policy Table
Name Resolution Policy Table Continued
Using the Connection Security Rule Wizard
Demo – IPSec
Lesson 3: Network Security with NAP
Concepts of NAP
System Health Agents and Validators
The NAP Process
Planning for NAP Deployment
Installing and Configuring NAP
What Is NAP Tracing?
Configuring NAP Tracing
Lesson 4: Client Security with Windows Firewall
Why are Firewalls Important
Outbound Filtering
Inbound Filtering
Custom Rules
NEW-Firewall Scope
Using Group Policies
Policy Options
Policy Options Continued
Authorizing Connections
IPSec DoS Defense
IPsec DoS Defense Continued
Isolation Illustrated
Demo – Windows Firewall Inbound
Demo – Windows Firewall Outbound
Lesson 5: Other Security Solutions
IPSec Rules
802.1x Configuration
Configuring DHCP
Configuring NAP Components
Configuring SHVs
Configuring Network Policies
Demo – Install NAP
Demo – NPS
Demo – SHV
Demo – Health Policy
Chapter 05 Review
Chapter 06 – Managing Files 2hrs 11m
Lesson 1: Working with File Security
NTFS Files Permissions
NTFS Permissions
Methods of Securing Files
Lesson 2: Server Role – File Services
The File Services Server Role
FSRM
Using Quotas
Configuring Quotas
Quotas
Quota Options
Quota Template
File Screening
File Screen Groups
File Screen Templates
Storage Reports
Report Task
Lesson 3: Using DFS
Sharing Folders
Offline Files
DFS Overview
Installing DFS
Type of DFS
How DFS Namespaces Work (Domain Based)
Creating the DFS NameSpace
DFS Configuration
DFS Replication
DFS Replication Continued
High Availability for DFS
DFS Scalability
How DFS-R Works
How DFS-R Works Continued
Demo – DFS
Lesson 4: Using EFS
EFS
How to Encrypt a File/Folder
Sharing Encrypted Files
Configuring EFS Using GPS
Other File Options
Bit Locker
Access-Based Enumeration (ABE)
Branch Cache
Demo – File Security
Demo – EFS
Lesson 5: Performing a Backup and Restore
Shadow Copies
Managing Shadow Copies
Windows Server Backup
Volume Snapshot Service
Recovery
Demo – Back Up
Chapter 06 Review
Chapter 07 – Monitoring Systems 1hr 45m
Lesson 1: How to Install and Use Network Monitor and SNMP
Installing Network Monitor
Analyze Network Data
SNMP
SNMP Continued
Demo – Network Monitor
Lesson 2: Windows Performance and Reliability Monitoring
Performance Monitor
Reliability Monitor
Built-In Data Collector Sets
Demo – WRPM
Lesson 3: Looking at Event Logs
Types of Event Logs
Creating Custom Views
Attaching Tasks to Events
Attaching Tasks to Events Continued
Lesson 4: Configuring Event Forwarding
Event Forwarding Concepts
How to Configure Event Forwarding
Configuring the Collecting Computer
Creating a Subscription
Configure Event Forwarding Using HTTPS
Demo – Monitoring Events
Chapter 07 Review
Chapter 08 – Managing Printers 39m
Lesson 1: Server Role – Print Services
Installing the Print Services Server Role
Installing Printers
Lesson 2: How to Share Printers
Sharing Printers
Publishing Printers to Active Directory
Deploy Printer Connections
Importing/Exporting Print Queue’s
Printer Pooling
Printer Priority
Managing Internet Printing
Generating Notifications
Migrating Printers
Managing Printers with the CLI
Printer Permissions
Demo – Managing Printers
Demo – Web Printing
Chapter 08 Review
Chapter 09 – Securing Windows Through Updates 50m
Lesson 1: What is Windows Server Update Services?
WSUS Overview
WSUS Architecture
WSUS Minimum Requirements
Lesson 2: Planning & Deploying the WSUS Installation
Planning for the WSUS Installation
Auditing Updates
Lesson 3: Using Windows Server Update Services
WSUS
How to Troubleshoot Update Problems
How to Remove Updates
Demo – Install WSUS
WSUS Administration
Lesson 4: Using WSUS
Update Selection
Client Settings
Using Group Policy
Managing Computer Groups
Disconnected Networks
WSUS Illustrated
Test and Approval
Chapter 09 Review
Course Closure
Total Duration: 17hrs 32m

Leave Comment