10969: Active Directory Services with Windows Server Training

We offer private customized training for groups of 3 or more attendees.

Course Description

 
Get hands-on instruction and practice administering Active Directory technologies in Windows Server 2012 and Windows Server 2012 R2 in this 5-day Microsoft Official Course. You will learn the skills you need to better manage and protect data access and information, simplify deployment and management of your identity infrastructure, and provide more secure access to data from virtually anywhere. You will learn how to configure some of the key features in Active Directory such as Active Directory Domain Services, Group Policy, Dynamic Access Control, Work Folders, Workplace Join, Certificate Services, Rights Management Services and Federation Services, as well as integrating your on premise environment with cloud based technologies such as Windows Azure Active Directory. As part of the learning experience, you will perform hands-on exercises in a virtual lab environment. NOTE: This course is based on Windows Server 2012 and Windows Server 2012 R2. This course is designed for experienced IT professionals who support medium to large enterprises and have fundamental knowledge and experience administering Active Directory
Course Length: 5 Days
Course Tuition: $2090 (US)

Prerequisites

This course is intended for Information Technology (IT) professionals who have Active Directory Domain Services (AD DS) experience and are looking for a single course that will further develop knowledge and skills using Access and Information Protection technologies in Windows Server 2012 and Windows Server 2012 R2. This would typically include: AD DS administrators who are looking to further develop skills in the latest Access and Information Protection technologies with Windows Server 2012 and Windows Server 2012 R2. System or Infrastructure administrators with general AD DS experience and knowledge who are looking to build upon that core knowledge and cross-train into advanced Active Directory technologies in Windows Server 2012 and Windows Server 2012 R2 IT Professionals who have taken the 10967A: Fundamentals of a Windows Server Infrastructure course and are looking to build upon that Active Directory knowledge.

Course Outline

 

Module 1: Overview of Access and Information Protection
This module explains Access and Information Protection (AIP) solutions from the business perspective and maps business problems to technical solutions.
Lessons
Introduction to Access and Information Protection Solutions in Business
Overview of AIP Solutions in Windows Server 2012
Overview of Forefront Identity Manager 2010 R2
Lab: Choosing an Appropriate Access and Information Protection Management Solution
Analyze the Lab Scenario and Identify Business Requirements
Propose a Solution

After completing this module, students will be able to:
Describe Access and Information Protection solutions in business.
Describe Access and Information Protection solutions in Windows Server 2012.
Describe Microsoft Forefront Identity Manager (FIM) 2010 R2.

Module 2: Advanced Deployment and Administration of AD DS
This module explains how to deploy AD DS remotely and describes the virtualization safeguards, cloning abilities and extending AD DS to the cloud.

Lessons
Deploying AD DS
Deploying and Cloning Virtual Domain Controllers
Deploying Domain Controllers in Windows Azure
Administering AD DS
Lab: Deploying and Administering AD DS
Deploying AD DS
Deploying Domain Controller by Performing Domain Controller Cloning
Administering AD DS

After completing this module, students will be able to:
Describe and perform various deployment techniques for AD DS.
Describe virtual domain controller deployment considerations.
Explain how new technologies in Windows Server 2012 support virtual domain controllers.
Describe Domain Controller cloning.
Implement AD DS using the tools provided in Windows Server 2012.

Module 3: Securing Active Directory Domain Services
This module describes the threats to domain controllers and what methods can be used to secure the AD DS and its domain controllers.
Lessons
Securing Domain Controllers
Implementing Password and Lockout Policies
Audit Authentication
Lab: Securing Active Directory Domain Services
Implementing Security Policies for Accounts and Passwords and Administrative Groups
Deploying and Configuring a RODC

After completing this module, students will be able to:
Understand the importance of securing domain controllers.
Describe the benefit of read-only domain controllers (RODCs).
Explain and implement password and account lockout policies.
Implement audit authentication.

Module 4: Monitoring, Managing, and Recovering AD DS
This module explains how to use tools that help monitor performance in real time, and how to record performance over time to spot potential problems by observing performance trends. This module also explains how to optimize and protect your directory service and related identity and access solutions so that if a service does fail, you can restart it as quickly as possible.

Lessons
Monitoring AD DS
Managing the AD DS Database
AD DS Backup and Recovery Options for AD°DS and Other Identity and Access Solutions
Lab: Monitoring AD DS
Monitoring AD DS with Performance Monitor
Lab: Recovering Objects in AD DS
Backing up and Restoring AD DS
Recovering Objects in AD DS

After completing this module, students will be able to:
Monitor AD DS.
Manage the AD DS database.
Recover objects from the AD DS database.

Module 5: Implementing and Administering AD DS Sites and Replication
This module explains how AD DS replicates information between domain controllers within a single site and throughout multiple sites. This module also explains how to create multiple sites and how to monitor replication to help optimize AD DS replication and authentication traffic.

Lessons
Overview of AD DS Replication
Configuring AD DS Sites
Configuring and Monitoring AD DS Replication
Lab: Implementing AD DS Sites and Replication
Creating Subnets and Sites
Deploying an Additional Domain Controller
Configuring AD DS Replication
Troubleshooting AD DS Replication

After completing this module, students will be able to:
Describe AD DS replication.
Configure AD DS sites.
Configure and monitor AD DS replication.

Module 6: Implementing Group Policy
This module describes Group Policy, how it works, and how best to implement it in your organization.
Lessons
Introducing Group Policy
Implementing and Administering GPOs
Group Policy Scope and Group Policy Processing
Troubleshooting the Application of GPOs
Lab: Implementing and Troubleshooting a Group Policy Infrastructure
Creating and Configuring GPOs
Managing GPO Scope
Verifying GPO Application
Managing GPOs
Troubleshooting GPOs

After completing this module, students will be able to:
Describe Group Policy.
Implement and administer GPOs.
Describe Group Policy scope and Group Policy processing.
Troubleshoot the application of GPOs.

Module 7: Managing User Settings with Group Policy
This module describes how to how to use GPO Administrative Templates, Folder Redirection, and Group Policy features to configure users’ computer settings.
Lessons
Implementing Administrative Templates
Configuring Folder Redirection and Scripts
Configuring Group Policy Preferences
Lab: Managing User Desktops with Group Policy
Implementing Settings by Using Group Policy Preferences
Configuring Folder Redirection

After completing this module, students will be able to:
Implement Administrative Templates.
Configure Folder Redirection and scripts.
Configure Group Policy preferences.

Module 8: Implementing Secure Shared File Access
This module explains how to use Dynamic Access Control (DAC) and Work Folders and how to plan and implement these technologies.
Lessons
Overview of DAC
Implementing DAC Components
Implementing DAC for Access Control
Implementing Access Denied Assistance
Implementing and Managing Work Folders
Implementing Workplace Join
Lab: Implementing Secure File Access
Preparing for DAC Deployment
Implementing DAC
Validating and Remediating DAC
Implementing Work Folders

After completing this module, students will be able to:
Describe DAC.
Implement DAC components.
Implement DAC for access control.
Implement access-denied assistance.
Implement and manage Work Folders.
Implement Workplace Join.

Module 9: Deploying and Managing Active Directory Certificate Services
This module explain how to deploy and manage CAs.
Lessons
Deploying CAs
Administering CAs
Troubleshooting, Maintaining, and Monitoring CAs
Lab: Deploying and Configuring a Two-Tier CA Hierarchy
Deploying an Offline Root CA
Deploying an Enterprise Subordinate CA

After completing this module, students will be able to:
Deploy CAs.
Administer CAs.
Troubleshoot, maintain, and monitor CAs.

Module 10: Deploying and Managing Certificates
This module explains how to deploy and manage certificates, configure certificate templates and manage enrollment process. Also, this module describes certificate usage in business environments and about deployment and management of smart cards.

Lessons
Deploying and Managing Certificate Templates
Managing Certificates Deployment, Revocation and Recovery
Using Certificates in a Business Environment
Implementing and Managing Smart Cards
Lab: Deploying and Using Certificates
Configuring Certificate Templates
Enrolling and Using Certificates
Configuring and Implementing Key Recovery

After completing this module, students will be able to:
Deploy and manage certificate templates.
Manage certificates deployment, revocation and recovery.
Use certificates in business environments.
Implement and manage smart cards.

Module 11: Implementing and Administering Active Directory Rights Management Services
This module introduces Active Directory Rights Management Services (AD RMS). It also describes how to deploy AD RMS, how to configure content protection, and how to make AD RMS–protected documents available to external users.

Lessons
Overview of AD RMS
Deploying and Managing an AD RMS Infrastructure
Configuring AD RMS Content Protection
Configuring External Access to AD RMS
Lab: Implementing AD RMS Infrastructure
Installing and Configure AD RMS
Configuring  AD RMS Templates
Using ADRMS on Clients
Configuring AD RMS Monitoring and Reporting

After completing this module, students will be able to:
Describe AD RMS.
Explain how to deploy and manage an AD RMS infrastructure.
Explain how to configure AD RMS content protection.
Explain how to configure external access to AD RMS.

Module 12: Implementing and Administering AD FS
This module explains AD FS, and then provides details on how to configure AD FS in both a single organization scenario and in a partner organization scenario. This module also describes the Web Application Proxy feature in Windows Server 2012 R2 that functions as an AD FS proxy and reverse proxy for web-based applications.

Lessons
Overview of AD FS
Deploying AD FS
Implementing AD FS for a Single Organization
Deploying AD FS in a Business to Business Federation Scenario
Extending AD FS to External Clients
Lab: Implementing AD FS
Installing and Configuring AD FS
Configuring an Internal Application for AD FS
Configuring AD FS for a Federated Business Partner
Configuring a Web Application Proxy

After completing this module, students will be able to:
Describe AD FS.
Explain how to configure the AD FS prerequisites, and deploy AD FS
services.
Describe how to implement AD FS for a single organization.
Deploy AD FS in a business-to-business federation scenario.
Deploy the Web Application Proxy.

Module 13: Implementing Windows Azure Active Directory
This module explains how to implement Windows Azure Active Directory.
Lessons
Overview of Windows Azure Active Directory
Administering Windows Azure Active Directory
Lab: Implementing Azure AD
Planning to Implement Azure AD
Administering Azure AD

After completing this module, students will be able to:
Describe Windows Azure AD.
Administer Azure AD.

Module 14: Implementing and Administering AD LDS
This module explains how to deploy and configure AD LDS.
Lessons
Overview of AD LDS
Deploying AD LDS
Configuring AD LDS Instances and Partitions
Configuring AD LDS Replication
Lab: Implementing and Administering AD LDS
Configuring AD LDS Instances and Partitions
Configuring AD LDS Replication

After completing this module, students will be able to:
Describe AD LDS.
Explain how to deploy AD LDS.
Explain how to configure AD LDS instances and partitions.
Explain how to configure AD LDS replication.






 

Course Directory [training on all levels]

Upcoming Classes
Gain insight and ideas from students with different perspectives and experiences.

Interesting Reads Take a class with us and receive a book of your choosing for 50% off MSRP.