6.Microsoft Certified Solutions Expert (MCSE): Server Infrastructure certification
The Microsoft Certified Solutions Expert (MCSE): Server Infrastructure certification validates that you have the skills needed to run a highly efficient and modern data centre, with expertise in identity management, systems management, virtualization, storage and networking.
Required exams and exam objectives
​
For More Details Please Contact / Ring
Tel : 04822 200199, 04822 200299
Mob : 9496804551
This module introduces the new Windows Server 2012 administrative interface, including roles and features that are available with the Windows Server 2012 operating system. It also discusses various Windows Server 2012 installation options and configuration steps performed during installation and after deployment, in addition to using Windows PowerShell to perform common administrative tasks in Windows Server 2012.
Lessons
• Windows Server 2012 R2 Overview
• Installing Windows Server 2012 R2
• Post-Installation Configuration of Windows Server 2012 R2
• Overview of Windows Server 2012 R2 Management
• Introduction to Windows PowerShell
Lab : Deploying and Managing Windows Server 2012 R2
• Deploying Windows Server 2012 R2
• Configuring Windows Server 2012 R2 Server Core
• Managing Servers
• Using Windows PowerShell to Manage Servers
After completing this module, students will be able to:
• Describe Windows Server 2012 R2.
• Install Windows Server 2012 R2.
• Perform post installation configuration of Windows Server 2012 R2.
• Describe the management tools available in Windows Server 2012 R2.
• Perform basic administrative tasks with Windows PowerShell.
This module covers the structure of Active Directory Domain Services (AD DS) and its various components, such as forest, domain, and organizational units (OUs). It also gives an overview of Domain Controllers, in addition to choices that are available with Windows Server 2012 for installing AD DS on a server.
Lessons
• Overview of AD DS
• Overview of Domain Controllers
• Installing a Domain Controller
Lab : Installing Domain Controllers
• Installing a Domain Controller
• Installing a Domain Controller by Using IFM
After completing this module, students will be able to:
• Describe the structure of Active Directory Domain Services (AD DS).
• Describe the purpose of domain controllers.
• Install a domain controller.
This module describes how to manage user accounts and computer accounts, including how to manage various consumer devices that employees use. The module also covers how to manage an enterprise network by managing groups, and how to delegate administrative tasks to designated users or groups.
Lessons
• Managing User Accounts
• Managing Groups
• Managing Computer Accounts
• Delegating Administration
Lab : Managing Active Directory Domain Services Objects
• Delegating Administration for a Branch Office
• Creating and Configuring User Accounts in AD DS
• Managing Computer Objects in AD DS
After completing this module, students will be able to:
• Manage user accounts with graphical tools.
• Manage group accounts with graphical tools.
• Manage computer accounts.
• Delegate permissions to perform AD DS administration.
This module describes how to use command line tools and Windows PowerShell to automate AD DS administration. It discusses various command-line tools and Windows PowerShell commands, and then describes how to use these tools and commands to modify objects individually and in bulk operations.
Lessons
• Using Command-line Tools for AD DS Administration
• Using Windows PowerShell for AD DS Administration
• Performing Bulk Operations with Windows PowerShell
Lab : Automating AD DS Administration by Using Windows PowerShell
• Creating User Accounts and Groups by Using Windows PowerShell
• Using Windows PowerShell to Create User Accounts in Bulk
• Using Windows PowerShell to Modify User Accounts in Bulk
After completing this module, students will be able to:
• Use command line tools for AD DS administration.
• Use Windows PowerShell cmdlets for AD DS administration.
• Perform bulk operations by using Windows PowerShell.
In this module, students see how to implement an IPv4 addressing scheme. This module discusses using IPv4, which is the network protocol used on the Internet and on local area networks, to troubleshoot network communication. It also covers determining and troubleshooting network-related problems.
Lessons
• Overview of TCP/IP
• Understanding IPv4 Addressing
• Subnetting and Supernetting
• Configuring and Troubleshooting IPv4
Lab : Implementing IPv4
• Identifying Appropriate Subnets
• Troubleshooting IPv4
After completing this module, students will be able to:
• Describe the TCP/IP protocol suite.
• Describe IPv4 addressing.
• Determine a subnet mask necessary for supernetting or subnetting.
• Configure IPv4 and troubleshoot IPv4 communication.
This module covers supporting and troubleshooting a Windows Server–based network infrastructure by deploying, configuring, and troubleshooting the Dynamic Host Configuration Protocol (DHCP) server role.
Lessons
• Installing a DHCP Server Role
• Configuring DHCP Scopes
• Managing a DHCP Database
• Securing and Monitoring DHCP
Lab : Implementing DHCP
• Implementing DHCP
• Implementing a DHCP Relay Agent (Optional Exercise)
After completing this module, students will be able to:
• Install the Dynamic Host Configuration Protocol (DHCP) server role.
• Configure DHCP scopes.
• Manage a DHCP database.
• Secure and monitor the DHCP server role.
This module describes name resolution for Windows operating system clients and Windows Server servers. It also covers installing and configuring a DNS Server service and its components.
Lessons
• Name Resolution for Windows Clients and Servers
• Installing a DNS Server
• Managing DNS Zones
Lab : Implementing DNS
• Installing and Configuring DNS
• Creating Host Records in DNS
• Managing the DNS Server Cache
After completing this module students will be able to:
• Describe name resolution for Windows operating system clients and Windows Server servers.
• Install and manage a DNS Server.
• Manage DNS zones.
This module discusses the features and benefits of IPv6, how IPv6 affects IPv4 networks, and how to integrate IPv6 into IPv4 networks by using various transition technologies.
Lessons
• Overview of IPv6
• IPv6 Addressing
• Coexistence with IPv4
• IPv6 Transition Technologies
Lab : Implementing IPv6
• Configuring an IPv6 Network
• Configuring an ISATAP Router
After completing this module students will be able to:
• Describe the features and benefits of IPv6.
• Describe IPv6 addressing.
• Describe IPv6 coexistence with IPv4.
• Describe IPv6 transition technologies.
This module gives an overview of different storage technologies, including managing disks and volumes. It also discusses how to implement the storage solutions in Windows Server 2012, and how to use Storage Spaces, a new feature that you can use to combine disks into pools that are then managed automatically.
Lessons
• Overview of Storage
• Managing Disks and Volumes
• Implementing Storage Spaces
Lab : Implementing Local Storage
• Installing and Configuring a New Disk
• Resizing Volumes
• Configuring a Redundant Storage Space
After completing this module, students will be able to:
• Describe various storage technologies.
• Explain how to manage disks and volumes.
• Explain how to implement Storage Spaces.
This module discusses how to enable and configure File and Print Services in Windows Server 2012, including securing files and folders on Windows Server 2012 and using shadow copies. It also describes configuring the new Work Folders role service, in addition to important considerations and best practices for working with File and Print Services.
Lessons
• Securing Files and Folders
• Protecting Shared Files and Folders by Using Shadow Copies
• Configuring Work Folders
• Configuring Network Printing
Lab : Implementing File and Print Services
• Creating and Configuring a File Share
• Configuring Shadow Copies
• Enabling and Configuring Work Folders
• Creating and Configuring a Printer Pool
After completing this module students will be able to:
• Secure files and folders.
• Protect shared files and folders by using shadow copies.
• Configure the Work Folders role service.
• Configure network printing.
This module provides an overview of Group Policy and provides details about how to implement Group Policy, including creating and managing Group Policy Objects and implementing a Central Store for administrative templates.Lessons
• Overview of Group Policy
• Group Policy Processing
• Implementing a Central Store for Administrative Templates
Lab : Implementing Group Policy
• Configuring a Central Store
• Creating GPOs
After completing this module students will be able to:
• Create and manage Group Policy Objects (GPOs).
• Describe Group Policy processing.
• Implement a Central Store for administrative templates.
This module describes Windows Server 2012 operating system security, and how to configure security settings by using Group Policy and Security Compliance Manager. It also covers how to identify security threats, restrict unauthorized software, and secure a Windows Server 2012 infrastructure by configuring Windows Firewall with Advanced Security.
Lessons
• Windows Operating Systems Security Overview
• Configuring Security Settings
• Restricting Software
• Configuring Windows Firewall with Advanced Security
Lab : Increasing Security for Server Resources
• Using Group Policy to Secure Member Servers
• Auditing File System Access
• Auditing Domain Logons
Lab : Configuring AppLocker and Windows Firewall
• Configuring AppLocker Policies
• Configuring Windows Firewall
After completing this module, students will be able to:
• Describe WindowsServer operating system security.
• Configure security settings by using Group Policy.
• Increase security for server resources.
• Restrict unauthorized software from running on servers and clients.
• Configure Windows Firewall with Advanced Security.
This module explains how to configure and troubleshoot DNS, including DNS replication and caching.
Lessons
• Configuring the DNS Server Role
• Configuring DNS Zones
• Configuring DNS Zone Transfers
• Managing and Troubleshooting DNS
Lab : Configuring and Troubleshooting DNS
• Configuring DNS Resource Records
• Configuring DNS Conditional Forwarding
• Installing and Configuring DNS Zones
• Troubleshooting DNS
After completing this module, students will be able to:
• Install and configure the DNS server role.
• Create and configure DNS zones.
• Configure DNS zone transfers.
• Manage and troubleshoot DNS.
This module explains how to implement virtualized domain controllers and read-only domain controller (RODCs). It also explains how to perform common AD DS administrative tasks
and manage the AD DS Database.
Lessons
• Overview of AD DS
• Implementing Virtualized Domain Controllers
• Implementing RODCs
• Administering AD DS
• Managing the AD DS Database
Lab : Maintaining AD DS
• Installing and Configuring a RODC
• Configuring AD DS Snapshots
• Configuring the Active Directory Recycle Bin
• Cloning a domain controller
After completing this module, students will be able to:
• Explain the general structure of AD DS.
• Implement virtualized domain controllers.
• Implement RODCs.
• Administer AD DS.
• Manage the AD DS database
This module explains how to create, configure and automate the creation of user accounts. It also explains how to configure account-related properties of user objects. It further explains how to create and administer Managed Service Accounts.
Lessons
• Configuring Password Policy and User Account Lockout Settings
• Configuring Managed Service Accounts
Lab : Managing User and Service Accounts
• Configuring Password Policy and Account Lockout Settings
• Creating and Associating a Managed Service Account
After completing this module, students will be able to:
• Configure password policy and user account lockout settings.
• Configure managed service accounts.
This module explains how to implement a GPO infrastructure. This also teaches how to perform common GPO management tasks, and manage GPOs by using Windows PowerShell. It also focuses on troubleshooting the application of GPOs.
Lessons
• Introducing Group Policy
• Implementing and Administering GPOs
• Group Policy Scope and Group Policy Processing
• Troubleshooting the Application of GPOs
Lab : Implementing a Group Policy Infrastructure
• Creating and Configuring Group Policy Objects
• Managing GPO Scope
• Verify GPO Application
• Managing GPOs
After completing this module, students will be able to:
• Describe the components and technologies that comprise the Group Policy framework.
• Configure and understand a variety of policy setting types.
• Scope GPOs by using links, security groups, Microsoft Windows Management Instrumentation (WMI) filters, loopback processing, and preference targeting.
• Describe how GPOs are processed.
• Locate the event logs that contain Group Policy-related events and troubleshoot the Group Policy application
This module explains how you can use Group Policy Objects (GPOs) to implement desktop environments across your organization by using Administrative Templates, Folder Redirection, Group Policy preferences, and where applicable, use software deployment to install and update application programs. It is important to know how to use these various GPO features so that you can configure your users’ computer settings properly.
Lessons
• Implementing Administrative Templates
• Configuring Folder Redirection and Scripts
• Configuring Group Policy Preferences
• Managing Software with Group Policy
Lab : Managing User Desktops with Group Policy
• Implement Settings by Using Group Policy Preferences
• Managing Office 2013 by using Administrative Templates
• Deploying Software by using Group Policy
• Configuring Folder Redirection
After completing this module, students will be able to:
• Describe and implement Administrative Templates
• Configure folder redirection and scripts by using GPOs
• Configure GPO preferences
• Deploy software by using GPOs
In this module, you will learn how to implement and manage remote access in Windows Server 2012. You will also learn how to implement DirectAccess by using the Getting Started wizard, implement and manage an advanced DirectAccess infrastructure, and implement VPN.
Lessons
• Overview of Remote Access
• Implementing DirectAccess by Using the Getting Started Wizard
• Implementing and Managing an Advanced DirectAccess Infrastructure
• Implementing VPN
• Implementing Web Application Proxy
Lab : Implementing DirectAccess by Using the Getting Started Wizard
• Verifying Readiness for a DirectAccess Deployment
• Configuring DirectAccess
• Validating the DirectAccess Deployment
Lab : Deploying an Advanced DirectAccess Solution
• Preparing the Environment for DirectAccess
• Implementing the Advanced DirectAccess Infrastructure
• Validating the DirectAccess Deployment
Lab : Implementing VPN
• Implementing VPN
• Validating the VPN Deployment
Lab : Implementing Web Application Proxy
• Implementing Web Application Proxy
• Validating the Web Application Proxy Deployment
After completing this module, students will be able to:
• Install and manage the Remote Access role in Windows Server 2012
• Implement DirectAccess by using the Getting Started Wizard
• Implement and manage an advanced DirectAccess Infrastructure
• Implement VPN access
• Implement Web Application Proxy
This module explains how to install and configure NPS, RADIUS Clients and servers. It also describes NPS authentication methods. It describe NPS authentication methods and how to
monitor and troubleshoot NPS.
Lessons
• Installing and Configuring a Network Policy Server
• Configuring RADIUS Clients and Servers
• NPS Authentication Methods
• Monitoring and Troubleshooting a Network Policy Server
Lab : Installing and Configuring a Network Policy Server
• Installing and Configuring NPS to Support RADIUS
• Configuring and Testing a RADIUS Client
After completing this module, students will be able to:
• Install and configure NPS
• Configure both RADIUS clients and servers
• Describe NPS authentication methods
• Monitor and troubleshoot NPS
This module explains how to configure, monitor, and troubleshoot NAP. It also explains how NAP can help to protect your network and the various NAP enforcement processes.
Lessons
• Overview of Network Access Protection
• Overview of NAP Enforcement Processes
• Configuring NAP
• Configuring IPSec Enforcement for NAP
• Monitoring and Troubleshooting NAP
Lab : Implementing Network Access Protection
• Configuring NAP Components
• Configuring Virtual Private Network Access
• Configuring the Client Settings to Support NAP
After completing this module, students will be able to:
• Describe how NAP can help to protect your network
• Describe the various NAP enforcement processes
• Configure NAP
• Monitor and troubleshoot NAP
This module describes FSRM, configure quotas, file screening, and storage reports and implement classification management and file management tasks. It describes the components of the DFS. I also explains how to configure DFS namespaces and DFS replication.
Lessons
• Overview of FSRM
• Using FSRM to Manage Quotas, File Screens, and Storage Reports
• Implementing Classification and File Management Tasks
• Overview of DFS
• Configuring DFS Namespaces
• Configuring and Troubleshooting DFS Replication
Lab : Configuring Quotas and File Screening Using File Server Resource Manager
• Configuring File Server Resource Manager Quotas
• Configuring File Screening and Storage Reports
Lab : Implementing Distributed File System
• Installing the DFS role service
• Configuring a DFS Namespace
• Configuring DFS Replication
After completing this module, students will be able to:
• Describe FSRM.
• Use FSRM to manage quotas, file screens, and storage reports.
• Implement classification and file management tasks.
• Describe DFS.
• Configure DFS namespaces.
• Configure and troubleshoot DFS Replication
This module explains how to encrypt files using EFS and configure advanced auditing features.
Lessons
• Encrypting Drives by Using BitLocker
• Encrypting Files by Using EFS
• Configuring Advanced Auditing
Lab : Configuring Encryption and Advanced Auditing
• Encrypting and Recovering Files
• Configuring Advanced Auditing
• Using Windows BitLocker Drive Encryption to Secure Data Drives
After completing this module, students will be able to:
• Encrypt hard drives by using Windows BitLocker Drive Encryption.
• Encrypt files by using Encrypting File System (EFS).
• Configure advanced auditing
This module explains how to create and manage server images by using Windows Deployment Services
Lessons
• Overview of Windows Deployment Services
• Managing Images
• Implementing Deployment with Windows Deployment Services
• Administering Windows Deployment Services
Lab : Using Windows Deployment Services to Deploy Windows Server 2012
• Installing and Configuring Windows Deployment Services
• Creating Operating System Images with Windows Deployment Services
• Configuring Custom Computer Naming
• Deploying Images with Windows Deployment Services
After completing this module, students will be able to:
• Describe the important features and functionality of Windows Deployment Services.
• Manage images by using Windows Assessment and Deployment Kit (Windows ADK) Tools.
• Configure Windows Deployment Services in Windows Server 2012.
• Perform deployments with Windows Deployment Services.
This module explains how to use Windows Server Update Services (WSUS) to deploy updates to Windows servers and clients.
Lessons
• Overview of WSUS
• Deploying Updates with WSUS
Lab : Implementing Update Management
• Implementing the WSUS Server Role
• Configuring Update Settings
• Approving and Deploying an Update by using WSUS
After completing this module, students will be able to:
• Describe the role of WSUS.
• Describe the WSUS update management process.
• Deploy updates with WSUS.
This module explains the monitoring tools available in Windows Server 2012. it also explains how to use Performance Monitor and monitor events.
Lessons
• Monitoring Tools
• Using Performance Monitor
• Monitoring Event Logs
Lab : Monitoring Windows Server 2012
• Establishing a Performance Baseline
• Identifying the Source of a Performance Problem
• Viewing and Configuring Centralized Event Logs
After completing this module, students will be able to:
• Describe the monitoring tools for the Windows Server 2012 operating system.
• Use Performance Monitor to view and analyze performance statistics of programs that are running on their servers.
• Monitor event logs to view and interpret the recorded events.
PAPER : 3
Configuring Advanced Windows Server 2012 Services
EXAM CODE : 70 – 412
In this module students will be able to configure advanced features for Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS), and configure IP Address Management (IPAM).
Lessons
• Configuring Advanced DHCP Features
• Configuring Advanced DNS Settings
• Implementing IPAM
• Managing IP Address Spaces with IPAM
Lab : Implementing Advanced Network Services
• Configuring Advanced DHCP Settings
• Configuring Advanced DNS Settings
• Configuring IPAM
After completing this module, students will be able to:
• Configure advanced features in DHCP with Windows Server 2012.
• Configure the advanced DNS settings in Windows Server 2012.
• Implement IP Address Management in Windows Server 2012.
In this module students will be able to configure file services to meet advanced business requirements.
Lessons
• Configuring iSCSI Storage
• Configuring BranchCache
• Optimizing Storage Usage
Lab : Implementing Advanced File Services
• Configuring iSCSI Storage
• Configuring the File Classification Infrastructure
Lab : Implementing BranchCache
• Configuring the Main Office Servers for BranchCache
• Configuring the Branch Office Servers for BranchCache
• Configuring Client Computers for BranchCache
• Monitoring BranchCache
After completing this module, students will be able to:
• Learn how to configure and manage iSCSI.
• Implement BranchCache using Windows Server 2012.
• Implement Windows Server 2012 features that optimize storage utilization.
In this module students will be able to configure Dynamic Access Control (DAC) to manage and audit access to shared files.
Lessons
• Overview of DAC
• Implementing DAC Components
• Implementing DAC for Access Control
• Implementing Access Denied Assistance
• Implementing and Managing Work Folders
Lab : Implementing Secure Data Access
• Preparing for DAC deployment
• Implementing DAC
• Validating and Remediating DAC
• Implementing Work Folders
After completing this module, students will be able to:
• Describe DAC.
• Implement and configure components of DAC.
• Implement DAC on file servers.
• Describe and implement access- denied assistance.
• Implement the integration of Work Folders with DAC.
In this module students will be able to plan and implement an Active Directory Domain Services (AD DS) deployment that includes multiple domains and forests.
Lessons
• Overview of Distributed AD DS Deployments
• Deploying a Distributed AD DS Environment
• Configuring AD DS Trusts
Lab : Implementing Distributed AD DS Deployments
• Implementing Child Domains in AD DS
• Implementing Forest Trusts
After completing this module, students will be able to:
• Describe the components of a highly complex AD DS deployment.
• Implement a complex AD DS deployment.
• Configure AD DS trusts.
In this module students will be able to plan and implement an AD DS deployment that includes multiple locations.
Lessons
• AD DS Replication Overview
• Configuring AD DS Sites
• Configuring and Monitoring AD DS Replication
Lab : Implementing AD DS Sites and Replication
• Modifying the Default Site
• Creating Additional Sites and Subnets
• Configuring AD DS Replication
• Monitoring and Troubleshooting AD DS Replication
After completing this module, students will be able to:
• Describe how replication works in a Windows Server 2012 AD DS environment.
• Configure AD DS sites in order to optimize AD DS network traffic.
• Configure and monitor AD DS replication.
In this module students will be able to implement an Active Directory Certificate Services (AD CS) deployment.Lessons
• Using Certificates in a Business Environment
• PKI Overview
• Deploying CAs
• Deploying and Managing Certificate Templates
• Implementing Certificate Distribution and Revocation
• Managing Certificate Recovery
Lab : Deploying and Configuring CA Hierarchy
• Deploying a Stand-alone Root CA
• Deploying an Enterprise Subordinate CA
Lab : Deploying and Managing Certificates
• Configuring Certificate Templates
• Configuring Certificate Enrollment
• Configuring Certificate Revocation
• Configuring Key Recovery
After completing this module, students will be able to:
• Describe and use certificates in business environments.
• Describe the Public Key Infrastructure (PKI) components and concepts, and describe the options for implementing a certification authority infrastructure.
• Plan and implement an AD CS certification authority infrastructure.
• Plan and implement a certificate template deployment using an AD CS certification authority.
• Plan and implement certificate distribution and revocation.
• Configure and manage key archival and recovery.
In this module students will be able to implement an AD RMS deployment.
Lessons
• AD RMS Overview
• Deploying and Managing an AD RMS Infrastructure
• Configuring AD RMS Content Protection
• Configuring External Access to AD RMS
Lab : Implementing AD RMS
• Installing and Configuring AD RMS
• Configuring AD RMS Templates
• Implementing the AD RMS Trust Policies
• Verifying the AD RMS Deployment
After completing this module, students will be able to:
• Describe what AD RMS is, and how it can be used to achieve content protection.
• Deploy and manage an AD RMS infrastructure.
• Configure content protection using AD RMS.
• Enable users outside the organization to access content protected by using AD RMS.
In this module students will be able to implement an Active Directory Federation Services (AD FS) deployment.
Lessons
• Overview of AD FS
• Deploying AD FS
• Implementing AD FS for a Single Organization
• Deploying AD FS in a Business-to-Business Federation Scenario
• Extending AD FS to External Clients
Lab : Implementing AD FS
• Installing and Configuring AD FS
• Configuring an Internal Application for AD FS
Lab : Implementing AD FS for External Partners and Users
• Configuring AD FS for a Federated Business Partner
• Configuring Web Application Proxy
After completing this module, students will be able to:
• Describe the identity federation business scenarios and how AD FS can be used to address the scenarios.
• Configure the AD FS prerequisites and deploy the AD FS services.
• Implement AD FS to enable SSO in a single organization.
• Implement AD FS to enable SSO between federated partners.
• Implement the Web Application Proxy and describe WorkPlace Join integration with AD FS.
In this module students will be able to provide high availability and load balancing for web-based applications by implementing Network Load Balancing (NLB).
Lessons
• Overview of NLB
• Configuring an NLB Cluster
• Planning an NLB Implementation
Lab : Implementing NLB
• Implementing an NLB Cluster
• Configuring and Managing the NLB Cluster
• Validating High Availability for the NLB Cluster
After completing this module, students will be able to:
• Describe how NLB works.
• Configure an NLB cluster.
• Plan an NLB implementation.
In this module students will be able to provide high availability for network services and applications by implementing failover clustering.
Lessons
• Failover Clustering Overview
• Implementing a Failover Cluster
• Configuring Highly Available Applications and Services on a Failover Cluster
• Maintaining a Failover Cluster
• Implementing a Multi-Site Failover Cluster
Lab : Implementing Failover Clustering
• Configuring a Failover Cluster
• Deploying and Configuring a Highly Available File Server
• Validating the Deployment of the Highly Available File Server
• Configuring Cluster-Aware Updating on the Failover Cluster
After completing this module, students will be able to:
• Explain failover clustering features in Windows Server 2012.
• Describe how to implement a failover cluster.
• Explain how to configure highly available applications and services on a failover cluster.
• Explain how to maintain a failover cluster and how to use new maintenance features.
• Describe how to implement multi-site failover cluster.
In this module students will be able to deploy and manage Hyper-V virtual machines in a failover cluster.
Lessons
• Overview of Integrating Hyper-V with Failover Clustering
• Implementing Hyper-V Virtual Machines on Failover Clusters
• Implementing Hyper-V Virtual Machine Movement
• Managing Hyper-V Virtual Environments by Using VMM
Lab : Implementing Failover Clustering with Hyper-V
• Configuring Hyper-V Replicas
• Configuring a Failover Cluster for Hyper-V
• Configuring a Highly Available Virtual Machine
After completing this module, students will be able to:
• Explain options for making virtual machines highly available.
• Describe how to implement virtual machines in a failover cluster deployed on a host.
• Explain options for moving a virtual machine or its storage.
• Explain a high level overview of Microsoft System Center 2012- Virtual Machine Manager (VMM) 2012.
In this module students will be able to implement a backup and disaster recovery solution based on business and technical requirements.
Lessons
• Data Protection Overview
• Implementing Windows Server Backup
• Implementing Server and Data Recovery
Lab : Implementing Windows Server Backup and Restore
• Backing Up Data on a Windows Server 2012 R2 Server
• Restoring Files Using Windows Server Backup
After completing this module, students will be able to:
• Describe the considerations that must be included when you are implementing a disaster recovery solution.
• Plan and implement a backup solution for Windows Server 2012.
• Plan and implement server and data recovery.
PAPER : 5
Implementing an advanced server infrastructure
EXAM CODE 70 – 414
This module describes some of the changes and new requirements that organizations are experiencing in their data centers. The module then describes how you can use System Center 2012 to manage this environment.
Lessons
• Overview of the Enterprise Data Center
• Overview of the Microsoft System Center 2012 Components
• Considerations for Implementing an Enterprise Data Center
Lab : Considerations for Implementing an Enterprise Data Center
• Planning the Secure Implementation of Services Within an Enterprise Data Center
After completing this module, students will be able to:
• Describe the enterprise data center.
• Describe how you can use System Center 2012 to manage the enterprise data center.
This module introduces the Microsoft System Center 2012 components. You will see how they can integrate to enable you to configure, deploy, and manage a server virtualization environment. Later, you will review the planning steps and considerations for a Microsoft System Center 2012 – Virtual Machine Manager (VMM) deployment.
Lessons
• Planning a VMM Deployment
• Planning and Implementing a Server Virtualization Host Environment
• Planning and Implementing a Network Infrastructure for Virtualization
Lab : Planning and Implementing a Server Virtualization Strategy
• Planning the Hyper-V Host Deployment
• Configuring Hyper-V Host Groups
• Configuring VMM Libraries
After completing this module, students will be able to:
• Describe how you can use System Center 2012 to deploy and manage a virtualization environment.
• Plan and implement a sever virtualization strategy by using Windows Server 2012 Hyper-V and VMM.
• Deploy Hyper-V hosts, configure host groups, and implement VMM libraries.
This module describes the factors that you must consider when you are planning the storage and network infrastructure for your virtual environment, and details on how to deploy these components in Windows Server 2012 Hyper-V and VMM.
Lessons
• Planning a Storage Infrastructure for Virtualization
• Implementing a Storage Infrastructure for Virtualization
• Planning and Implementing a Network Infrastructure for Virtualization
Lab : Planning and Implementing Virtualization Networks and Storage
• Planning a Storage Infrastructure for Virtualization
• Planning a Network Infrastructure for Virtualization
• Implementing a Storage Infrastructure for Virtualization
• Implementing a Network Infrastructure for Virtualization
After completing this module, students will be able to:
• Plan a storage infrastructure for server virtualization.
• Implement a storage infrastructure for server virtualization.
• Plan and implement a network infrastructure for server virtualization.
In this module, you will learn how to configure virtual machines, reusable profiles, and templates to aid in deployment. You also will review application specific workloads, and learn about the options for physical and virtual machine migrations.
Lessons
• Planning Virtual Machine Configuration
• Preparing for Virtual Machine Deployments with VMM
• Deploying Virtual Machines
Lab : Planning and Implementing a Virtual Machine Deployment and Management Strategy
• Planning Physical-to-Virtual Server Conversions
• Planning Virtual Machine and Service Templates
• Configuring VMM Profiles and Templates
• Deploying Virtual Machines by Using VMM Templates
After completing this module, students will be able to:
• Plan virtual machine configurations.
• Plan and configure the VMM profiles and templates that you can use to implement a VMM deployment.
• Plan and implement a virtual machine deployment in VMM.
This module will prepare you for designing an administrative model that you can use to manage virtualization using System Center 2012. You will see and use VMM, Microsoft System Center 2012 – Orchestrator (Orchestrator) and Microsoft System Center 2012 – App Controller (App Controller). Use these components to delegate administrative functions, plan for basic self-service, design and implement automation. The skills gained in this module are the foundation for the basic building blocks used to operate an IT infrastructure that is similar or equal to that of cloud computing.
Lessons
• Planning and Implementing Automation with System Center 2012
• Planning and Implementing System Center 2012 Administration
• Planning and Implementing Self-Service Options in System Center 2012
Lab : Planning and Implementing an Administration Solution for Virtualization
• Configuring Process Automation in System Center
• Planning Administrative Delegation and Self-Service in System Center 2012
• Configuring Delegated Administration and Self-Service in VMM
After completing this module, students will be able to:
• Plan automation of a virtual machine environment by using Orchestrator and System Center 2012 integration.
• Plan a delegated administration model using VMM.
• Plan self-service in a virtual machine environment by using VMM and App Controller.
This module explains how to use the monitoring tools included in Windows Server 2012 and Microsoft System Center 2012 – Operations Manager (Operations Manager)
Lessons
• Planning Monitoring in Windows Server 2012
• Overview of System Center Operations Manager
• Planning and Configuring Management Packs
• Planning and Configuration Notifications and Reporting
• Configuring Integration with VMM
Lab : Implementing a Server Monitoring Strategy
• Configuring Server Monitoring Using Windows Server 2012
• Implementing the Microsoft System Center 2012 – Operations Manager Agent
• Configuring Operations Manager Monitoring Components
After completing this module, students will be able to:
• Plan monitoring in Windows Server 2012.
• Describe Operations Manager.
• Plan the configuration of management packs.
• Plan the configuration of notifications and reporting.
• Configure integration of Operations Manager and VMM.
This module explains how to plan and implement high availability for file services and applications.
Lessons
• Planning and Implementing Storage Spaces
• Planning and Implementing Distributed File System (DFS)
• Planning and Implementing Network Load Balancing (NLB)
Lab : Planning and Implementing High Availability for File Services and Applications
• Planning a High Availability Strategy for File Services
• Planning a High Availability Strategy for Web Applications
• Implementing a High Availability Solution for File Storage
• Implementing a High Availability Solution by Using NLB
After completing this module, students will be able to:
• Explain how to plan and implement Storage Spaces.
• Explain how to plan and implement DFS.
• Explain how to plan and implement NLB.
• Explain how to plan and implement high availability for file services and applications.
This module explains how to plan and implement failover clustering.
Lessons
• Planning an Infrastructure for Failover Clustering
• Implementing Failover Clustering
• Integrating Failover Clustering with Server Virtualization
• Planning a Multisite Failover Cluster
Lab : Planning and Implementing a High Availability Infrastructure by Using Failover Clustering
• Designing High Availability Server Roles
• Implement Hyper-V Replica
• Deploy a Failover Cluster
• Implement a Scale-Out File Server
• Implement High Availability Virtual Machines
• Implement Operations Manager and VMM Integration
After completing this module, students will be able to:
• Plan an infrastructure for failover clustering.
• Implement failover clustering.
• Integrate failover clustering with server virtualization.
• Plan a multisite failover clustering.
This module explains how to plan and implement server update infrastructure by using Windows Server Update Service (WSUS), Configuration Manager, and VMM.
Lessons
• Planning and Implementing a WSUS Deployment
• Planning Software Updates with System Center 2012 Configuration Manager
• Planning and Implementing Updates in a Server Virtualization Infrastructure
• Planning and Implementing Virtual Machine Backup and Recovery
Lab : Planning and Implementing an Update Remediation Infrastructure
• Implement Host Updating in VMM
• Configuring Failover Clustering and Cluster Aware Updating (CAU)
• Planning a WSUS Deployment
• Deploying a Replica WSUS Server
• Configure Client Update Options
After completing this module, students will be able to:
• Plan and implement a WSUS Deployment.
• Plan software updates with Configuration Manager.
• Plan and implement updates in a server virtualization infrastructure.
This module explains how to plan and implement a business-continuity strategy for your organization, and how to plan and implement backup and recovery strategies, including virtual-machine backup and recovery.
Lessons
• Overview of Business Continuity Planning
• Planning and Implementing Backup Strategies
• Planning and Implementing Recovery
• Planning and Implementing Backup and Recovery of Virtual Machines
Lab : Impleme
Pendanathu Plaza , 2nd Floor,IDBI Bank, Near Head Post Office, Main Road-Pala,Kottayam, Kerala, Pin : 686575
Ph : +91 4822 200199, +91 4822 200 299, Mob : +91 9496804551, +91 9947889245
Email: csoftpala@gmail.com, Web: www.csoftitsolutions.com
2nd Floor, Ninarpally Bldg, Central Junction
Erattupetta - 686121, Kottayam District, Kerala
+91 4822- 277 341, +91 9544900199, +91 9496804551
Email: csoftetpa@gmail.com, Web: www.csofteducation.com