Designing and Implementing a MS Server Infrastructure - Exam: 70-413

simplilearn
Online

Price on request
You can also call the Study Centre
81510... More
Want to speak to an Advisor about this course?
Students that were interested in this course also looked at...
See all

Important information

  • Course
  • Online
Description

Simplilearn is the World’s Largest Certification Training Provider, with over 400,000+ professionals trained globally
Trusted by the Fortune 500 companies as their learning provider for career growth and training
2000+ certified and experienced trainers conduct trainings for various courses across the globe
All our Courses are designed and developed under a tried and tested Unique Learning Framework that is proven to deliver 98.6% pass rate in first attempt.

Important information

Opinions

There are no opinions on this course yet

What you'll learn on the course

Designing
Server

Course programme

Course Preview
  • Designing and Implementing a Server Infrastructure - 70-413
    • Lesson 00 - Course Overview
      • 0.1 Course Overview
      • 0.2 Before you start
      • 0.3 Objectives
      • 0.4 About the Course
      • 0.5 About the Course (contd.)
      • 0.6 Value of this course
      • 0.7 Lessons covered
      • 0.8 Exam Question Types
      • 0.9 Designing and Implementing a Server Infrastructure Certification
      • 0.010 Sources of Information
      • 0.011 Conclusion
    • Lesson 01 - Server Infrastructure Setup, Migration, and Upgrades
      • 1.1 Server Infrastructure Setup, Migration, and Upgrades
      • 1.2 Objectives
      • 1.3 Introducing Windows Server 2012 R2
      • 1.4 Windows Server 2012
      • 1.5 Windows Server 2012 R2
      • 1.6 Windows Server 2012 R2 Editions
      • 1.7 New Features of Windows Server 2012
      • 1.8 New Features of Windows Server 2012 (Contd.)
      • 1.9 New Features of Windows Server 2012 R2 (Contd.)
      • 1.10 Physical and Logical Infrastructure
      • 1.11 Physical Server Infrastructure
      • 1.12 Logical Server Infrastructure
      • 1.13 Scaling Up vs. Scaling Out
      • 1.14 Upgrade vs. Migration
      • 1.15 Upgrade vs. Migration
      • 1.16 Planning an Upgrade
      • 1.17 Planning a Migration
      • 1.18 Using the MAP Toolkit
      • 1.19 Introducing the MAP Toolkit
      • 1.20 Installing MAP Toolkit
      • 1.21 Installing MAP Toolkit Demo 01
      • 1.22 Running the Map Analysis
      • 1.23 Running an Analysis using the MAP Toolkit
      • 1.24 Running an Analysis using the MAP Toolkit. Demo 02
      • 1.25 Analysis Results
      • 1.26 Excel Report Sample
      • 1.27 Viewing the results
      • 1.28 Viewing the results Demo 03
      • 1.29 Quiz
      • 1.30 Summary
      • 1.31 Conclusion
    • Lesson 02 - Deployment Strategies for Operating Systems
      • 2.1 Deployment Strategies for Operating Systems
      • 2.2 Objectives
      • 2.3 Planning Deployment Strategies
      • 2.4 Deployment Planning
      • 2.5 Methods of Deployment
      • 2.6 Architecture
      • 2.7 Deployment Files WIM Vs. VHDX
      • 2.8 OS Imaging
      • 2.9 Image Formats
      • 2.10 WIM Images
      • 2.11 Introduction to WDS
      • 2.12 Windows Deployment Service
      • 2.13 WDS Components
      • 2.14 Planning a WDS-Based Deployment
      • 2.15 Getting WDS Ready
      • 2.16 Installing and Configuring WDS
      • 2.17 Installing and Configuring WDS Demo 01
      • 2.18 Unicast Vs. Multicast
      • 2.19 Capturing the Image for Deployment
      • 2.20 Capturing the Image for Deployment Demo 02
      • 2.21 Implementing WDS
      • 2.22 Processing the Deployment
      • 2.23 Deploying the image on target
      • 2.24 Deploying the image on target Demo 03
      • 2.25 Quiz
      • 2.26 Summary
      • 2.27 Conclusion
    • Lesson 03 - DHCP
      • 3.1 DHCP
      • 3.2 Objectives
      • 3.3 Introducing DHCP and Advanced Features
      • 3.4 Dynamic Host Control Protocol
      • 3.5 Advanced Features of DHCP
      • 3.6 DHCP Scopes and Types
      • 3.7 DHCP Scope
      • 3.8 DHCP Scope Advanced
      • 3.9 Demo 01-Adding a DHCP Role
      • 3.10 Demo 01 Adding a DHCP Role
      • 3.11 Demo 02-Using Split and Super Scopes
      • 3.12 Demo 02-Using Split and Super Scopes
      • 3.13 DHCP Name Protection
      • 3.14 Use of Name Protection in DHCP
      • 3.15 How Name Protection Works
      • 3.16 Demo 03-Configuring Name Protection
      • 3.17 Demo 03-Configuring Name Protection
      • 3.18 DHCP Failover
      • 3.19 Understanding Failover
      • 3.20 Types of DHCP Failover
      • 3.21 Demo 04-Configuring DHCP Failover
      • 3.22 Demo 04-Configuring DHCP Failover.mp4
      • 3.23 Policy-Based Leases
      • 3.24 Introducing PBL for DHCP
      • 3.25 Demo 05 Adding Policy Based Leases
      • 3.26 Demo 05 Adding Policy Based Leases
      • 3.27 DHCPv6
      • 3.28 Using DHCPv6 for IPv6 Addressing
      • 3.29 DHCPv6 Modes
      • 3.30 Demo 06-Implementing DHCPv6
      • 3.31 Demo 06-Implementing DHCPv6
      • 3.32 Quiz
      • 3.33 Summary
      • 3.34 Conclusion
    • Lesson 04 - DNS
      • 4.1 DNS
      • 4.2 Objectives
      • 4.3 Implement a Basic DNS Infrastructure
      • 4.4 DNS Overview
      • 4.5 Demo 01-Implement a DNS role
      • 4.6 Demo 01-Implement a DNS role
      • 4.7 Secure the DNS Infrastructure with DNSSEC
      • 4.8 Introducing DNSSEC
      • 4.9 DNSSEC Process
      • 4.10 DNSSEC Security Features
      • 4.11 Demo 02-Secure DNS Zone with DNSSEC
      • 4.12 Demo 02-Secure DNS Zone with DNSSEC
      • 4.13 Socket Pools and Cache Locking
      • 4.14 Securing DNS with Socket Pools
      • 4.15 DNS Socket Pool Configuration
      • 4.16 Cache Locking
      • 4.17 Demo 03-Configure and View Socket Pool and Cache Locking settings
      • 4.18 Demo 03-Configure and View Socket Pool and Cache Locking settings
      • 4.19 Advanced DNS Features
      • 4.20 Advanced DNS Features
      • 4.21 Forwarders
      • 4.22 Reverse Lookup Zone
      • 4.23 CNAME Records
      • 4.24 GlobalNames Zone
      • 4.25 NetMask Ordering
      • 4.26 Delegated Administration
      • 4.27 Demo 04-Using Advanced Features of DNS
      • 4.28 Demo 04-Using Advanced Features of DNS
      • 4.29 Quiz
      • 4.30 Summary
      • 4.31 Conclusion
    • Lesson 05 - IPAM
      • 5.1 IPAM
      • 5.2 Objectives
      • 5.3 IPAM Overview
      • 5.4 IP Address Management Overview
      • 5.5 Requirements for IPAM
      • 5.6 Demo 01-Installing the IPAM Feature
      • 5.7 Demo 01-Installing the IPAM Feature
      • 5.8 IPAM Working Process
      • 5.9 IPAM Process Flow
      • 5.10 IPAM Discovery
      • 5.11 Query And Monitoring
      • 5.12 IPAM Configuration
      • 5.13 IPAM Blocks and Ranges
      • 5.14 IPAM Auditing
      • 5.15 IPAM Administration
      • 5.16 Demo 02-Setup GPO for Configuring IPAM
      • 5.17 Demo 02-Setup GPO for Configuring IPAM
      • 5.18 Demo 03-Administer IP Block
      • 5.19 Demo 03-Administer IP Block
      • 5.20 Demo 04-View IP Address Utilization
      • 5.21 Demo 04-View IP Address Utilization
      • 5.22 Quiz
      • 5.23 Summary
      • 5.24 Conclusion
    • Lesson 06 - File and Storage Services
      • 6.1 File and Storage Services
      • 6.2 Objectives
      • 6.3 The Distributed File System
      • 6.4 DFS Overview
      • 6.5 DFS Terminology
      • 6.6 Demo 01-Setting up and implementing DFS
      • 6.7 Demo 01-Setting up and implementing DFS
      • 6.8 Using Encryption for Files
      • 6.9 File Encryption
      • 6.10 Encrypting File System(EFS)
      • 6.11 EFS Process
      • 6.12 Demo 02-Using EFS to encrypt a file
      • 6.13 Demo 02-Using EFS to encrypt a file
      • 6.14 Advanced File Manipulation and Services
      • 6.15 Network File System (NFS)
      • 6.16 File Server Resource Manager(FSRM)
      • 6.17 File Classification Infrastructure(FCI)
      • 6.18 File Classification Infrastructure(FCI)
      • 6.19 Demo 03-Setting up and Configuring NFS
      • 6.20 Demo 03-Setting up and Configuring NFS
      • 6.21 Storage Spaces
      • 6.22 Storage Spaces
      • 6.23 Storage Space Process
      • 6.24 Demo 04-Implement Storage Spaces
      • 6.25 Demo 04-Implement Storage Spaces
      • 6.26 Understand iSCSI and iSNS
      • 6.27 iSCSI Overview
      • 6.28 iSNS
      • 6.29 Demo 05-Configure iSCSI storage on network
      • 6.30 Demo 05-Configure iSCSI storage on network
      • 6.31 Quiz
      • 6.32 Summary
      • 6.33 Conclusion
    • Lesson 07 - Active Directory Domain Services
      • 7.1 Active Directory Domain Services
      • 7.2 Objectives
      • 7.3 AD DS Overview
      • 7.4 Introduction to Active Directory Domain Services
      • 7.5 Uses of AD DS
      • 7.6 AD DS Components
      • 7.7 AD DS Infrastructure
      • 7.8 Requirements for AD DS infrastructure
      • 7.9 AD DS Implementation
      • 7.10 Demo 01-Installing a domain controller for a new forest
      • 7.11 Demo 01-Installing a domain controller for a new forest
      • 7.12 Exploring AD DS Tools and Objects
      • 7.13 AD DS Tools
      • 7.14 Active Directory Object Architecture
      • 7.15 Object Naming Convention
      • 7.16 Demo 02-Explore AD DS Tools and Structures
      • 7.17 Demo 02-Explore AD DS Tools and Structures
      • 7.18 AD DS Schema Extensions
      • 7.19 AD DS Schema
      • 7.20 Demo 03-Extend the Active Directory Schema
      • 7.21 Demo 03-Extend the Active Directory Schema
      • 7.22 Quiz
      • 7.23 Summary
      • 7.24 Conclusion
    • Lesson 08 - Multi-domain Sites And Trusts
      • 8.1 Multi-domain Sites And Trusts
      • 8.2 Objectives
      • 8.3 Multi-domain AD Setup
      • 8.4 Need for Multi-Domain Architecture
      • 8.5 Domain Tree
      • 8.6 Multi-Forest Architectures
      • 8.7 Backward Compatibility of AD DS
      • 8.8 UPN Suffixes
      • 8.9 Demo 01-Adding a child domain to create a Domain Tree
      • 8.10 Demo 01-Adding a child domain to create a Domain Tree
      • 8.11 Demo 02-Set the UPN Suffix for users
      • 8.12 Demo 02-Set the UPN Suffix for users
      • 8.13 Sites and Subnets
      • 8.14 Subnets in AD DS
      • 8.15 Site
      • 8.16 Site Links
      • 8.17 Demo 03-Adding Sites Subnets and Site Links
      • 8.18 Demo 03-Adding Sites Subnets and Site Links
      • 8.19 Trust Relationships
      • 8.20 Trust Relationships
      • 8.21 Trust Modes
      • 8.22 Trust Types
      • 8.23 Default Trusts
      • 8.24 Demo 04-View and configure Trusts
      • 8.25 Demo 04-View and configure Trusts
      • 8.26 Quiz
      • 8.27 Summary
      • 8.28 Conclusion
    • Lesson 09 - Organizational Units and Group Policies
      • 9.1 Organizational Units and Group Policies
      • 9.2 Objectives
      • 9.3 Organizational Units
      • 9.4 Organizational Units
      • 9.5 Need for Organizational Units
      • 9.6 Structure of OUs
      • 9.7 Demo 01-Creating OUs in Active Directory
      • 9.8 Demo 01-Creating OUs in Active Directory
      • 9.9 Group Policies
      • 9.10 Group Policies
      • 9.11 Group Policy Components
      • 9.12 Group Policy Components(Contd.)
      • 9.13 Group Policy Components(Contd.)
      • 9.14 Group Policy Structure
      • 9.15 Special Items
      • 9.16 How Group Policies Work?
      • 9.17 Group Policy Processing
      • 9.18 Group Policy Processing(Contd.)
      • 9.19 GPO Linking
      • 9.20 Working with Group Policy
      • 9.21 Using GPOs
      • 9.22 Demo 02-Creating a simple GPO
      • 9.23 Demo 02-Creating a simple GPO
      • 9.24 Central Store
      • 9.25 Why Central Store?
      • 9.26 Central Store Implementation
      • 9.27 Demo 03-Create an Administrative Central Store
      • 9.28 Demo 03-Create an Administrative Central Store
      • 9.29 User Account Policies
      • 9.30 Computer Group Policies
      • 9.31 Configure Computer Group Policies
      • 9.32 Quiz
      • 9.33 Summary
      • 9.34 Conclusion
    • Lesson 10 - Network Access and Security Design
      • 10.1 Network Access and Security Design
      • 10.2 Objectives
      • 10.3 External Access to Organization Network
      • 10.4 Need for External Network Access
      • 10.5 Virtual Private Networks
      • 10.6 VPN Protocols
      • 10.7 Connection Manager Administration Kit
      • 10.8 Demo 01-Installing and setting up CMAK
      • 10.9 Demo 01-Installing and setting up CMAK
      • 10.10 Working with DirectAccess
      • 10.11 Introduction to DirectAccess
      • 10.12 DirectAccess Process
      • 10.13 DirectAccess in Windows Server 2012 R2
      • 10.14 Demo 02-Setting up DirectAccess
      • 10.15 Demo 02-Setting up DirectAccess
      • 10.16 Using Network Access Protection
      • 10.17 Network Protection
      • 10.18 Network Access Protection
      • 10.19 Demo 03-Configuring a NAP
      • 10.20 Demo 03-Configuring a NAP
      • 10.21 Quiz
      • 10.22 Summary
      • 10.23 Conclusion
    • Lesson 11 - Working with Virtual Machines
      • 11.1 Working with Virtual Machines
      • 11.2 Objectives
      • 11.3 Overview of Virtual Machines
      • 11.4 Virtual Machines
      • 11.5 Enterprise Virtual Machines
      • 11.6 Introduction to SCVMM
      • 11.7 Introducing System Center
      • 11.8 Virtual Machine Manager
      • 11.9 VM Library
      • 11.10 Components of SCVMM
      • 11.11 SCVMM Architecture
      • 11.12 Non-Domain Joined Hosts
      • 11.13 SCVMM Capabilities
      • 11.14 Network Capabilities
      • 11.15 Service Templates
      • 11.16 Service Templates (Contd.)
      • 11.17 Demo 01-Setting up SCVMM
      • 11.18 Demo 01-Setting up SCVMM
      • 11.19 Demo 02-Explore SCVMM Console
      • 11.20 Demo 02-Explore SCVMM Console
      • 11.21 Demo 03-Setup a VM
      • 11.22 Demo 03-Setup a VM
      • 11.23 Quiz
      • 11.24 Summary
      • 11.25 Conclusion

Achievements for this centre

2016

Students that were interested in this course also looked at...
See all