Quality Seal Emagister EMAGISTER CUM LAUDE

Designing and Implementing a MS Server Infrastructure - Exam: 70-413

simplilearn
Online

Price on request
You can also call the Study Centre
81510... More
Compare this course with other similar courses
See all

Important information

  • Course
  • Online
Description

Simplilearn is the World’s Largest Certification Training Provider, with over 400,000+ professionals trained globally
Trusted by the Fortune 500 companies as their learning provider for career growth and training
2000+ certified and experienced trainers conduct trainings for various courses across the globe
All our Courses are designed and developed under a tried and tested Unique Learning Framework that is proven to deliver 98.6% pass rate in first attempt.

Important information

Opinions

There are no opinions on this course yet

What you'll learn on the course

Designing
Server

Course programme

Course Preview
  • Designing and Implementing a Server Infrastructure - 70-413
    • Lesson 00 - Course Overview
      • 0.1 Course Overview
      • 0.2 Before you start
      • 0.3 Objectives
      • 0.4 About the Course
      • 0.5 About the Course (contd.)
      • 0.6 Value of this course
      • 0.7 Lessons covered
      • 0.8 Exam Question Types
      • 0.9 Designing and Implementing a Server Infrastructure Certification
      • 0.010 Sources of Information
      • 0.011 Conclusion
    • Lesson 01 - Server Infrastructure Setup, Migration, and Upgrades
      • 1.1 Server Infrastructure Setup, Migration, and Upgrades
      • 1.2 Objectives
      • 1.3 Introducing Windows Server 2012 R2
      • 1.4 Windows Server 2012
      • 1.5 Windows Server 2012 R2
      • 1.6 Windows Server 2012 R2 Editions
      • 1.7 New Features of Windows Server 2012
      • 1.8 New Features of Windows Server 2012 (Contd.)
      • 1.9 New Features of Windows Server 2012 R2 (Contd.)
      • 1.10 Physical and Logical Infrastructure
      • 1.11 Physical Server Infrastructure
      • 1.12 Logical Server Infrastructure
      • 1.13 Scaling Up vs. Scaling Out
      • 1.14 Upgrade vs. Migration
      • 1.15 Upgrade vs. Migration
      • 1.16 Planning an Upgrade
      • 1.17 Planning a Migration
      • 1.18 Using the MAP Toolkit
      • 1.19 Introducing the MAP Toolkit
      • 1.20 Installing MAP Toolkit
      • 1.21 Installing MAP Toolkit Demo 01
      • 1.22 Running the Map Analysis
      • 1.23 Running an Analysis using the MAP Toolkit
      • 1.24 Running an Analysis using the MAP Toolkit. Demo 02
      • 1.25 Analysis Results
      • 1.26 Excel Report Sample
      • 1.27 Viewing the results
      • 1.28 Viewing the results Demo 03
      • 1.29 Quiz
      • 1.30 Summary
      • 1.31 Conclusion
    • Lesson 02 - Deployment Strategies for Operating Systems
      • 2.1 Deployment Strategies for Operating Systems
      • 2.2 Objectives
      • 2.3 Planning Deployment Strategies
      • 2.4 Deployment Planning
      • 2.5 Methods of Deployment
      • 2.6 Architecture
      • 2.7 Deployment Files WIM Vs. VHDX
      • 2.8 OS Imaging
      • 2.9 Image Formats
      • 2.10 WIM Images
      • 2.11 Introduction to WDS
      • 2.12 Windows Deployment Service
      • 2.13 WDS Components
      • 2.14 Planning a WDS-Based Deployment
      • 2.15 Getting WDS Ready
      • 2.16 Installing and Configuring WDS
      • 2.17 Installing and Configuring WDS Demo 01
      • 2.18 Unicast Vs. Multicast
      • 2.19 Capturing the Image for Deployment
      • 2.20 Capturing the Image for Deployment Demo 02
      • 2.21 Implementing WDS
      • 2.22 Processing the Deployment
      • 2.23 Deploying the image on target
      • 2.24 Deploying the image on target Demo 03
      • 2.25 Quiz
      • 2.26 Summary
      • 2.27 Conclusion
    • Lesson 03 - DHCP
      • 3.1 DHCP
      • 3.2 Objectives
      • 3.3 Introducing DHCP and Advanced Features
      • 3.4 Dynamic Host Control Protocol
      • 3.5 Advanced Features of DHCP
      • 3.6 DHCP Scopes and Types
      • 3.7 DHCP Scope
      • 3.8 DHCP Scope Advanced
      • 3.9 Demo 01-Adding a DHCP Role
      • 3.10 Demo 01 Adding a DHCP Role
      • 3.11 Demo 02-Using Split and Super Scopes
      • 3.12 Demo 02-Using Split and Super Scopes
      • 3.13 DHCP Name Protection
      • 3.14 Use of Name Protection in DHCP
      • 3.15 How Name Protection Works
      • 3.16 Demo 03-Configuring Name Protection
      • 3.17 Demo 03-Configuring Name Protection
      • 3.18 DHCP Failover
      • 3.19 Understanding Failover
      • 3.20 Types of DHCP Failover
      • 3.21 Demo 04-Configuring DHCP Failover
      • 3.22 Demo 04-Configuring DHCP Failover.mp4
      • 3.23 Policy-Based Leases
      • 3.24 Introducing PBL for DHCP
      • 3.25 Demo 05 Adding Policy Based Leases
      • 3.26 Demo 05 Adding Policy Based Leases
      • 3.27 DHCPv6
      • 3.28 Using DHCPv6 for IPv6 Addressing
      • 3.29 DHCPv6 Modes
      • 3.30 Demo 06-Implementing DHCPv6
      • 3.31 Demo 06-Implementing DHCPv6
      • 3.32 Quiz
      • 3.33 Summary
      • 3.34 Conclusion
    • Lesson 04 - DNS
      • 4.1 DNS
      • 4.2 Objectives
      • 4.3 Implement a Basic DNS Infrastructure
      • 4.4 DNS Overview
      • 4.5 Demo 01-Implement a DNS role
      • 4.6 Demo 01-Implement a DNS role
      • 4.7 Secure the DNS Infrastructure with DNSSEC
      • 4.8 Introducing DNSSEC
      • 4.9 DNSSEC Process
      • 4.10 DNSSEC Security Features
      • 4.11 Demo 02-Secure DNS Zone with DNSSEC
      • 4.12 Demo 02-Secure DNS Zone with DNSSEC
      • 4.13 Socket Pools and Cache Locking
      • 4.14 Securing DNS with Socket Pools
      • 4.15 DNS Socket Pool Configuration
      • 4.16 Cache Locking
      • 4.17 Demo 03-Configure and View Socket Pool and Cache Locking settings
      • 4.18 Demo 03-Configure and View Socket Pool and Cache Locking settings
      • 4.19 Advanced DNS Features
      • 4.20 Advanced DNS Features
      • 4.21 Forwarders
      • 4.22 Reverse Lookup Zone
      • 4.23 CNAME Records
      • 4.24 GlobalNames Zone
      • 4.25 NetMask Ordering
      • 4.26 Delegated Administration
      • 4.27 Demo 04-Using Advanced Features of DNS
      • 4.28 Demo 04-Using Advanced Features of DNS
      • 4.29 Quiz
      • 4.30 Summary
      • 4.31 Conclusion
    • Lesson 05 - IPAM
      • 5.1 IPAM
      • 5.2 Objectives
      • 5.3 IPAM Overview
      • 5.4 IP Address Management Overview
      • 5.5 Requirements for IPAM
      • 5.6 Demo 01-Installing the IPAM Feature
      • 5.7 Demo 01-Installing the IPAM Feature
      • 5.8 IPAM Working Process
      • 5.9 IPAM Process Flow
      • 5.10 IPAM Discovery
      • 5.11 Query And Monitoring
      • 5.12 IPAM Configuration
      • 5.13 IPAM Blocks and Ranges
      • 5.14 IPAM Auditing
      • 5.15 IPAM Administration
      • 5.16 Demo 02-Setup GPO for Configuring IPAM
      • 5.17 Demo 02-Setup GPO for Configuring IPAM
      • 5.18 Demo 03-Administer IP Block
      • 5.19 Demo 03-Administer IP Block
      • 5.20 Demo 04-View IP Address Utilization
      • 5.21 Demo 04-View IP Address Utilization
      • 5.22 Quiz
      • 5.23 Summary
      • 5.24 Conclusion
    • Lesson 06 - File and Storage Services
      • 6.1 File and Storage Services
      • 6.2 Objectives
      • 6.3 The Distributed File System
      • 6.4 DFS Overview
      • 6.5 DFS Terminology
      • 6.6 Demo 01-Setting up and implementing DFS
      • 6.7 Demo 01-Setting up and implementing DFS
      • 6.8 Using Encryption for Files
      • 6.9 File Encryption
      • 6.10 Encrypting File System(EFS)
      • 6.11 EFS Process
      • 6.12 Demo 02-Using EFS to encrypt a file
      • 6.13 Demo 02-Using EFS to encrypt a file
      • 6.14 Advanced File Manipulation and Services
      • 6.15 Network File System (NFS)
      • 6.16 File Server Resource Manager(FSRM)
      • 6.17 File Classification Infrastructure(FCI)
      • 6.18 File Classification Infrastructure(FCI)
      • 6.19 Demo 03-Setting up and Configuring NFS
      • 6.20 Demo 03-Setting up and Configuring NFS
      • 6.21 Storage Spaces
      • 6.22 Storage Spaces
      • 6.23 Storage Space Process
      • 6.24 Demo 04-Implement Storage Spaces
      • 6.25 Demo 04-Implement Storage Spaces
      • 6.26 Understand iSCSI and iSNS
      • 6.27 iSCSI Overview
      • 6.28 iSNS
      • 6.29 Demo 05-Configure iSCSI storage on network
      • 6.30 Demo 05-Configure iSCSI storage on network
      • 6.31 Quiz
      • 6.32 Summary
      • 6.33 Conclusion
    • Lesson 07 - Active Directory Domain Services
      • 7.1 Active Directory Domain Services
      • 7.2 Objectives
      • 7.3 AD DS Overview
      • 7.4 Introduction to Active Directory Domain Services
      • 7.5 Uses of AD DS
      • 7.6 AD DS Components
      • 7.7 AD DS Infrastructure
      • 7.8 Requirements for AD DS infrastructure
      • 7.9 AD DS Implementation
      • 7.10 Demo 01-Installing a domain controller for a new forest
      • 7.11 Demo 01-Installing a domain controller for a new forest
      • 7.12 Exploring AD DS Tools and Objects
      • 7.13 AD DS Tools
      • 7.14 Active Directory Object Architecture
      • 7.15 Object Naming Convention
      • 7.16 Demo 02-Explore AD DS Tools and Structures
      • 7.17 Demo 02-Explore AD DS Tools and Structures
      • 7.18 AD DS Schema Extensions
      • 7.19 AD DS Schema
      • 7.20 Demo 03-Extend the Active Directory Schema
      • 7.21 Demo 03-Extend the Active Directory Schema
      • 7.22 Quiz
      • 7.23 Summary
      • 7.24 Conclusion
    • Lesson 08 - Multi-domain Sites And Trusts
      • 8.1 Multi-domain Sites And Trusts
      • 8.2 Objectives
      • 8.3 Multi-domain AD Setup
      • 8.4 Need for Multi-Domain Architecture
      • 8.5 Domain Tree
      • 8.6 Multi-Forest Architectures
      • 8.7 Backward Compatibility of AD DS
      • 8.8 UPN Suffixes
      • 8.9 Demo 01-Adding a child domain to create a Domain Tree
      • 8.10 Demo 01-Adding a child domain to create a Domain Tree
      • 8.11 Demo 02-Set the UPN Suffix for users
      • 8.12 Demo 02-Set the UPN Suffix for users
      • 8.13 Sites and Subnets
      • 8.14 Subnets in AD DS
      • 8.15 Site
      • 8.16 Site Links
      • 8.17 Demo 03-Adding Sites Subnets and Site Links
      • 8.18 Demo 03-Adding Sites Subnets and Site Links
      • 8.19 Trust Relationships
      • 8.20 Trust Relationships
      • 8.21 Trust Modes
      • 8.22 Trust Types
      • 8.23 Default Trusts
      • 8.24 Demo 04-View and configure Trusts
      • 8.25 Demo 04-View and configure Trusts
      • 8.26 Quiz
      • 8.27 Summary
      • 8.28 Conclusion
    • Lesson 09 - Organizational Units and Group Policies
      • 9.1 Organizational Units and Group Policies
      • 9.2 Objectives
      • 9.3 Organizational Units
      • 9.4 Organizational Units
      • 9.5 Need for Organizational Units
      • 9.6 Structure of OUs
      • 9.7 Demo 01-Creating OUs in Active Directory
      • 9.8 Demo 01-Creating OUs in Active Directory
      • 9.9 Group Policies
      • 9.10 Group Policies
      • 9.11 Group Policy Components
      • 9.12 Group Policy Components(Contd.)
      • 9.13 Group Policy Components(Contd.)
      • 9.14 Group Policy Structure
      • 9.15 Special Items
      • 9.16 How Group Policies Work?
      • 9.17 Group Policy Processing
      • 9.18 Group Policy Processing(Contd.)
      • 9.19 GPO Linking
      • 9.20 Working with Group Policy
      • 9.21 Using GPOs
      • 9.22 Demo 02-Creating a simple GPO
      • 9.23 Demo 02-Creating a simple GPO
      • 9.24 Central Store
      • 9.25 Why Central Store?
      • 9.26 Central Store Implementation
      • 9.27 Demo 03-Create an Administrative Central Store
      • 9.28 Demo 03-Create an Administrative Central Store
      • 9.29 User Account Policies
      • 9.30 Computer Group Policies
      • 9.31 Configure Computer Group Policies
      • 9.32 Quiz
      • 9.33 Summary
      • 9.34 Conclusion
    • Lesson 10 - Network Access and Security Design
      • 10.1 Network Access and Security Design
      • 10.2 Objectives
      • 10.3 External Access to Organization Network
      • 10.4 Need for External Network Access
      • 10.5 Virtual Private Networks
      • 10.6 VPN Protocols
      • 10.7 Connection Manager Administration Kit
      • 10.8 Demo 01-Installing and setting up CMAK
      • 10.9 Demo 01-Installing and setting up CMAK
      • 10.10 Working with DirectAccess
      • 10.11 Introduction to DirectAccess
      • 10.12 DirectAccess Process
      • 10.13 DirectAccess in Windows Server 2012 R2
      • 10.14 Demo 02-Setting up DirectAccess
      • 10.15 Demo 02-Setting up DirectAccess
      • 10.16 Using Network Access Protection
      • 10.17 Network Protection
      • 10.18 Network Access Protection
      • 10.19 Demo 03-Configuring a NAP
      • 10.20 Demo 03-Configuring a NAP
      • 10.21 Quiz
      • 10.22 Summary
      • 10.23 Conclusion
    • Lesson 11 - Working with Virtual Machines
      • 11.1 Working with Virtual Machines
      • 11.2 Objectives
      • 11.3 Overview of Virtual Machines
      • 11.4 Virtual Machines
      • 11.5 Enterprise Virtual Machines
      • 11.6 Introduction to SCVMM
      • 11.7 Introducing System Center
      • 11.8 Virtual Machine Manager
      • 11.9 VM Library
      • 11.10 Components of SCVMM
      • 11.11 SCVMM Architecture
      • 11.12 Non-Domain Joined Hosts
      • 11.13 SCVMM Capabilities
      • 11.14 Network Capabilities
      • 11.15 Service Templates
      • 11.16 Service Templates (Contd.)
      • 11.17 Demo 01-Setting up SCVMM
      • 11.18 Demo 01-Setting up SCVMM
      • 11.19 Demo 02-Explore SCVMM Console
      • 11.20 Demo 02-Explore SCVMM Console
      • 11.21 Demo 03-Setup a VM
      • 11.22 Demo 03-Setup a VM
      • 11.23 Quiz
      • 11.24 Summary
      • 11.25 Conclusion

Compare this course with other similar courses
See all