Description
Stone River Elearning – Microsoft 70-413: Designing and Implementing a Server Infrastructure
The Microsoft’s 70-413: Designing and Implementing a Server Infrastructure certification exam tests the candidates’ abilities to plan, design and deploy a physical or virtual Windows Server infrastructure. This preparatory course will enable the students to pass the exam as well as enhance their skills on the Microsoft Windows Server. The topics covered in this course are comprehensive and teach the students to automate the server installation processes in a physical or virtual environment. In addition to this, other related topics such as DHCP, VPN, DirectAccess and IPAM are also covered in detail.
This Microsoft Windows Server course enables the students in designing and implementing a server infrastructure along with establishing a secure remote access solution. The course provides hands-on practice to put the students on the path to become a Server Infrastructure expert and also prepare the -students to undertake the Microsoft’s 70-413 certification exam.
The candidates opting for this course are required to have a minimum of one year experience with good working knowledge of Windows Server operating system. The candidates are also required to have sound knowledge of AD DS and networking technologies to completely understand this course.
Course Curriculum
- Designing and Implementing a Server Infrastructure (3:28)
- Instructor Introduction (2:59)
- Course Overview Part1 (3:20)
- Course Overview Part2 (4:38)
- Prerequisites (2:47)
- Domainwise (1:34)
- Networkwise (1:09)
- Windows Server (2:23)
- Certification Overview (1:11)
- Microsoft Learning Quote (1:11)
- Chapter Review (1:16)
- Windows Server 2012 Topology (0:59)
- Course Tips (4:16)
- Lab Setup (0:35)
- Build Environment (1:09)
- Presentation Types (2:21)
- What Microsoft is Showing Us Part1 (0:06)
- What Microsoft is Showing Us Part2 (3:50)
- Chapter Review (1:54)
- Plan: Installs/Images/Deployment (0:28)
- Course Overview (1:26)
- Topology (3:45)
- Flavors (2:04)
- Requirements (1:13)
- Fresh Install (1:21)
- Image (0:57)
- Deployment Tools (2:14)
- Installation Deployment Part1 (4:09)
- Installation Deployment Part2 (3:34)
- Windows Server 2012 Image (3:49)
- System Center Manager (1:15)
- Prepare for Deployment Part1 (0:27)
- Prepare for Deployment Part2 (5:24)
- Prepare for Deployment Part3 (5:22)
- Prepare for Deployment Part4 (7:25)
- Prepare for Deployment Part5 (5:41)
- Prepare for Deployment Part6 (7:00)
- Prepare for Deployment Part7 (5:01)
- Prepare for Deployment Part8 (3:03)
- Best Practices (1:05)
- Chapter Review (1:33)
- Plan: Migration/Upgrades/Capacity Part1 (0:41)
- Plan: Migration/Upgrades/Capacity Part2 (1:09)
- Whiteboard Part1 (3:25)
- Whiteboard Part2 (3:05)
- Upgrade Plans (2:43)
- Migration Plans (2:29)
- Identifying Requirements (0:30)
- Licensing (2:40)
- Activating Windows Server (1:07)
- Considerations (1:50)
- Private Cloud (2:47)
- Virtualization (2:14)
- Microsoft Assessment and Planning Toolkit Part1 (0:20)
- Microsoft Assessment and Planning Toolkit Part2 (4:47)
- Microsoft Assessment and Planning Toolkit Part3 (5:51)
- Microsoft Assessment and Planning Toolkit Part4 (5:17)
- Chapter Review (1:23)
- Plan: Storage/Virtual Machine Part1 (0:37)
- Plan: Storage/Virtual Machine Part2 (0:28)
- Storage Basics (1:14)
- Redundant Array of Independent Disks (RAID) (1:05)
- Storage Options (0:39)
- Direct-Attached Storage (DAS) (2:02)
- Network-Attached Storage (NAS) (2:26)
- Storage Area Network (SAN) (3:59)
- Internet Small Computer System Interface (iSCSI) (1:18)
- iSCSI Target Server (1:09)
- High Availability (1:39)
- iSCSI Virtual Disks Part1 (0:10)
- iSCSI Virtual Disks Part2 (3:13)
- iSCSI Virtual Disks Part3 (4:43)
- iSCSI Virtual Disks Part4 (4:02)
- iSCSI Virtual Disks Part5 (1:59)
- Chapter Review (0:32)
- Networking: Domain Name System (DNS) Part1 (0:53)
- Networking: Domain Name System (DNS) Part2 (1:09)
- Basics (2:43)
- Planning (4:35)
- Design (1:59)
- Exchange (2:05)
- Zone Types Part1 (2:45)
- Zone Types Part2 (0:30)
- Zone Types Part3 (1:35)
- Zone Types Part4 (0:20)
- Zone Types Part5 (1:04)
- Query (1:48)
- Optimize (1:06)
- Security (1:28)
- DNS Security Extensions (DNSSEC) Part1 (0:20)
- DNS Security Extensions (DNSSEC) Part2 (0:56)
- Common Attacks Part1 (0:44)
- Common Attacks Part2 (0:57)
- DNS Basics Part1 (0:12)
- DNS Basics Part2 (3:43)
- DNS Basics Part3 (5:03)
- DNS Basics Part4 (4:39)
- Chapter Review (0:59)
- Networking: Dynamic Host Configuration Protocol (DHCP) Part1 (0:35)
- Networking: Dynamic Host Configuration Protocol (DHCP) Part2 (0:32)
- Basics (1:15)
- Planning Part1 (2:56)
- Planning Part2 (3:13)
- Process Review (2:17)
- Play Nice (0:50)
- Availability (4:07)
- Scope (0:42)
- Internet Protocol version 6 (IPv6) (1:09)
- Name Protection (1:17)
- Configure DHCP Failover Part1 (0:10)
- Configure DHCP Failover Part2 (4:41)
- Configure DHCP Failover Part3 (4:33)
- Chapter Review (1:31)
- Networking: Internet Protocol address management (IPAM) Part1 (0:22)
- Networking: Internet Protocol address management (IPAM) Part2 (1:54)
- Network Topology Part1 (0:09)
- Network Topology Part2 (4:16)
- IPAM Basics (2:21)
- Reasons To Use (2:41)
- Components (0:57)
- Requirements (1:21)
- Security (5:17)
- Install and Configure IPAM Part1 (0:31)
- Install and Configure IPAM Part2 (4:51)
- Install and Configure IPAM Part3 (6:42)
- Chapter Review (0:43)
- Logical: Domains/Forest/Trusts Part1 (0:30)
- Logical: Domains/Forest/Trusts Part2 (1:04)
- Forest (3:31)
- Domain Tree (3:30)
- Models (2:26)
- Single (1:56)
- Multi (2:26)
- Functional (3:33)
- Upgrade/Migrate (1:29)
- Trusts (2:26)
- Planning (1:51)
- Implement Forest Trusts Part1 (0:10)
- Implement Forest Trusts Part2 (7:13)
- Implement Forest Trusts Part3 (5:05)
- Implement Forest Trusts Part4 (6:59)
- Implement Forest Trusts Part5 (3:18)
- Chapter Review (0:34)
- Logical: Advanced Group Policy Management (AGPM) Part1 (0:57)
- Logical: Advanced Group Policy Management (AGPM) Part2 (1:01)
- Group Policy Object (GPO) (1:35)
- Organizational Control (2:05)
- Windows OS (2:45)
- Practical Application (2:29)
- GPO Types (4:36)
- GPO Storage (0:44)
- Central Store (2:45)
- Planning Part1 (2:24)
- Planning Part2 (4:18)
- Links (2:58)
- Templates (1:37)
- Export/Import (1:23)
- Delegate (1:22)
- Design a GPO Part1 (0:19)
- Design a GPO Part2 (5:29)
- Design a GPO Part3 (6:30)
- Design a GPO Part4 (6:08)
- Design a GPO Part5 (5:05)
- Chapter Review (0:56)
- AD DS Physical: Sites/DC Part1 (0:34)
- AD DS Physical: Sites/DC Part2 (1:16)
- Domain Controller (DC) (2:32)
- Locating Local DC (2:13)
- Virtual Domain Controller Part1 (4:03)
- Virtual Domain Controller Part2 (3:30)
- Monitor (1:45)
- AD Sites (3:57)
- Site to Site Replication (1:22)
- Planning and Implementing Part1 (3:28)
- Planning and Implementing Part2 (3:15)
- Inter-Site Topology Generator (ISTG) (1:32)
- Knowledge Consistency Checker (KCC) (1:17)
- Replication Topology and Protocol (1:26)
- Build a Domain Controller Part1 (0:35)
- Build a Domain Controller Part2 (5:44)
- Build a Domain Controller Part3 (6:48)
- Chapter Review (2:18)
- AD DS Physical: Roles/Branches Part1 (0:54)
- AD DS Physical: Roles/Branches Part2 (1:01)
- Files (2:31)
- Distributed File System (DFS) (1:57)
- DFS Namespace (2:39)
- DFS Replication (3:20)
- What Is Branch Cache? (2:01)
- Branch Cache Objectives (1:43)
- Branch Cache Modes (2:30)
- Managing and Monitoring (1:21)
- Dynamic Access Control Basics (3:08)
- New vs. Old (1:35)
- Central Access Policy (1:17)
- Implementing (3:28)
- Deploy (3:04)
- Controlling Access Part1 (0:15)
- Controlling Access Part2 (6:29)
- Controlling Access Part3 (7:42)
- Controlling Access Part4 (7:59)
- Controlling Access Part5 (7:26)
- Controlling Access Part6 (8:58)
- Controlling Access Part7 (7:23)
- Controlling Access Part8 (7:36)
- Chapter Review (0:55)
- Access: VPN/Certificates Part1 (0:26)
- Access: VPN/Certificates Part2 (0:48)
- Virtual Private Network (VPN) Part1 (2:55)
- Virtual Private Network (VPN) Part2 (2:57)
- Methods or Protocols (3:10)
- Authentication Methods (2:13)
- Connection Manager Administration Kit (CMAK) (1:16)
- Planning VPN (2:53)
- PKI and Certificate Basics (2:17)
- Components (1:18)
- Certificate Authority Part1 (1:19)
- Certificate Authority Part2 (0:36)
- Certificate Authority Part3 (0:42)
- Certificate Revocation List (CRL) (1:20)
- New Features (1:12)
- Recovery (1:01)
- Perimeter Network (DMZ) (5:14)
- Firewalls (4:21)
- Networks (3:05)
- Chapter Review (1:01)
- Access: Direct Access Part1 (0:32)
- Access: Direct Access Part2 (0:48)
- What is Direct Access? (3:18)
- Components (2:01)
- Features (1:44)
- Name Resolution Policy Table (NRPT) (0:58)
- Connecting Internally (0:35)
- Connecting Externally (2:34)
- Direct Access vs. VPN (3:15)
- Planning (2:32)
- Build and Design Part1 (0:17)
- Build and Design Part2 (1:30)
- Build and Design Part3 (6:27)
- Build and Design Part4 (7:49)
- Build and Design Part5 (5:44)
- Configure Direct Access Part1 (9:51)
- Configure Direct Access Part2 (9:50)
- Configure Direct Access Part3 (6:25)
- Configure Direct Access Part4 (8:31)
- Configure Direct Access Part5 (9:24)
- Chapter Review (1:07)
- Access: NAP/Network Policy Server (NPS) Part1 (0:45)
- Access: NAP/Network Policy Server (NPS) Part2 (1:13)
- Components (0:30)
- Authentication vs. Authorization (4:01)
- Network Policy and Access Roles Part1 (0:45)
- Network Policy and Access Roles Part2 (0:33)
- Network Policy and Access Roles Part3 (5:03)
- Policy Processing Part1 (3:05)
- Policy Processing Part2 (2:46)
- Policy Processing Part3 (1:27)
- Remote Authentication Dial In User Service (RADIUS) Part1 (1:12)
- Remote Authentication Dial In User Service (RADIUS) Part2 (1:13)
- Network Access Protection (NAP) Part1 (0:23)
- Network Access Protection (NAP) Part2 (0:28)
- Network Access Protection (NAP) Part3 (0:34)
- Network Access Protection (NAP) Part4 (0:27)
- Network Access Protection (NAP) Part5 (1:20)
- Remediation Part1 (3:00)
- Remediation Part2 (1:51)
- Components (1:49)
- Police-Regulate-Enforce (0:27)
- Security Demonstration Part1 (0:19)
- Security Demonstration Part2 (7:35)
- Security Demonstration Part3 (7:24)
- Security Demonstration Part4 (7:22)
- Security Demonstration Part5 (7:00)
- Security Demonstration Part6 (6:24)
- Security Demonstration Part7 (7:13)
- Chapter Review (1:10)
- Course Review Part1 (3:59)
- Course Review Part2 (2:29)
- Audience Profiles (0:58)
- Certification Overview (0:53)
- Instant Expert (1:24)
- Study Recommendations (2:03)
- Exam Preparation Part1 (1:30)
- Exam Preparation Part1 (0:22)
Sale Page: https://stoneriverelearning.com/p/microsoft-70-413
Archive: https://archive.ph/wip/Yat7F
Reviews
There are no reviews yet.