Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com
Table of Contents
Table of Contents…………………………………………………………………………………………………. 1
Course Overview …………………………………………………………………………………………………. 3
Section 0.1: Introduction……………………………………………………………………………………….. 5
Section 0.2: Server Management ……………………………………………………………………………. 6
Section 0.3: Remote Management ………………………………………………………………………….. 7
Section 0.4: Mathematical Foundations…………………………………………………………………… 8
Section 1.1: IPv4 Addressing…………………………………………………………………………………. 9
Section 1.2: IPv4 Subnetting………………………………………………………………………………… 10
Section 1.3: IPv4 Host Configuration……………………………………………………………………. 11
Section 2.1: IPv6………………………………………………………………………………………………… 12
Section 2.2: IPv6 Addressing……………………………………………………………………………….. 13
Section 2.3: IPv6 Configuration …………………………………………………………………………… 14
Section 2.4: IPv6 Implementation…………………………………………………………………………. 15
Section 3.1: DHCP Configuration ………………………………………………………………………… 16
Section 3.2: DHCP Options …………………………………………………………………………………. 17
Section 3.3: Advanced DHCPv4 Settings………………………………………………………………. 18
Section 3.4: Server Placement ……………………………………………………………………………… 19
Section 3.5: Superscopes and Split Scopes…………………………………………………………….. 20
Section 3.6: DHCPv6………………………………………………………………………………………….. 21
Section 4.1: DNS Concepts………………………………………………………………………………….. 22
Section 4.2: Name Resolution………………………………………………………………………………. 23
Section 4.3: Zone Configuration…………………………………………………………………………… 24
Section 4.4: Active Directory-integrated Zones ……………………………………………………… 25
Section 4.5: Resource Records …………………………………………………………………………….. 26
Section 4.6: Client Configuration …………………………………………………………………………. 27
Section 4.7: Dynamic DNS………………………………………………………………………………….. 28
Section 4.8: Stub Zones and Forwarding……………………………………………………………….. 29
Section 4.9: Root Hints and Root Zone …………………………………………………………………. 30
Section 4.10: Zone Delegation……………………………………………………………………………… 31
Section 4.11: WINS and GlobalNames …………………………………………………………………. 32
Section 4.12: DNS Features…………………………………………………………………………………. 33
Section 4.13: DNS Design …………………………………………………………………………………… 34
Section 5.1: Routing……………………………………………………………………………………………. 35
Section 5.2: RIP …………………………………………………………………………………………………. 36
Section 5.3: Demand-dial Routing………………………………………………………………………… 37
Section 5.4: ICS and NAT …………………………………………………………………………………… 38
Section 6.1: Remote Access Concepts…………………………………………………………………… 39
Section 6.2: Dial-up and VPN ……………………………………………………………………………… 40
Section 6.3: SSTP ………………………………………………………………………………………………. 41
Section 6.4: CMAK ……………………………………………………………………………………………. 42
Section 7.1: Network Location Profiles…………………………………………………………………. 43
Section 7.2: Wireless ………………………………………………………………………………………….. 44
Section 7.3: RADIUS………………………………………………………………………………………….. 45
Section 7.4: Network Access Protection (NAP) ……………………………………………………… 46
Section 7.5: Network Authentication…………………………………………………………………….. 47
Section 7.6: Firewall …………………………………………………………………………………………… 48
Section 7.7: IPsec……………………………………………………………………………………………….. 49
Section 8.1: File Services…………………………………………………………………………………….. 50
Section 8.2: File Shares……………………………………………………………………………………….. 51
Section 8.3: Offline Files …………………………………………………………………………………….. 52
Section 8.4: NTFS Permissions ……………………………………………………………………………. 53
Section 8.5: Share and NTFS Permissions …………………………………………………………….. 54
Section 8.6: EFS…………………………………………………………………………………………………. 55
Section 8.7: Distributed File System (DFS) …………………………………………………………… 56
Section 8.8: Shadow Copy…………………………………………………………………………………… 57
Section 8.9: Backup and Restore ………………………………………………………………………….. 58
Section 8.10: Disk Quotas……………………………………………………………………………………. 59
Section 8.11: FSRM Features ………………………………………………………………………………. 60
Section 8.12: Print Services …………………………………………………………………………………. 61
Section 9.1: WSUS …………………………………………………………………………………………….. 62
Section 9.2: Client Configuration …………………………………………………………………………. 63
Section 9.3: MBSA …………………………………………………………………………………………….. 64
Section 10.1: Reliability and Performance Monitor ………………………………………………… 65
Section 10.2: Event Viewer …………………………………………………………………………………. 66
Section 10.3: Network Monitor ……………………………………………………………………………. 67
Section 10.4: SNMP……………………………………………………………………………………………. 68
Practice Exams…………………………………………………………………………………………………… 69
Course Overview
This course prepares students for the 70-642 Technology Specialist exam: Windows Server 2008 Network Infrastructure, Configuring. It focuses on the details of configuring the infrastructure of a network.
Module 0 – Introduction
This module introduces Microsoft’s recommendations of the technical experience a candidate should have before attempting the certification test. Students will become familiar with server and remote management tools. This module provides the mathematical calculations of how to convert numbers from binary to decimal and hexadecimal. This mathematical foundation is necessary for students to understand the IPv4 and IPv6 addresses they will be studying in the course.
Module 1 – IPv4
This module discusses the details of configuring IPv4 addressing and subnetting. This includes topics of converting IPv4 addresses from binary to decimal, converting subnet masks to slant notation, identifying Ipv4 classes and ranges of IP addresses, and determining local and non-local hosts. Students will learn how to customize the number of subnets and hosts allowed on each subnet.
Module 2 – IPv6
In this module students will learn why it will become necessary to migrate to IPv6. They will learn the basic format of IPv6 addresses, identifying IPv6 address types, and configuring IPv6 addresses using the GUI and command line. Interoperability strategies for implementing IPv4 and IPv6 are explored.
Module 3 – DHCP
This module covers DHCP configuration, customization options, and advanced settings. Students will learn proper server placement to assure client communication with the DHCP server, the rationale for creating superscopes and split scopes, and DHCPv6 options.
Module 4 – DNS
In Module 4 students will learn the details of how DNS translates host names to IP addresses and the process of DNS name resolution for both the client and server. Topics will also include; creating zone and zone transfers, creating or converting an Active Directory-integrated zone, creating and editing resource records, configuring client registration, automatically updating DNS using Dynamic DNS, resolving queries using stub zones and forwarding, using root hints and a root zone, managing zones through zone delegation, creating WINS-integrated zones and GlobalNames zones support, and implementing strategies and goals when designing a DNS solution.
Module 5 – Routing
Module 5 teaches the students the basics of routing and how to manage routing table entries. Students will become familiar with installing RRAS components, and configuring RIP, demand-dial routing, and NAT solutions.
Module 6 – Remote Access
Module 6 discusses the details of configuring remote access and network authentication. Topics include; configuring a Remote Access server to use Dial-up and VPN connections, configuring client connections, configuring a VPN using SSTP, and using CMAK to manage remote access.
Module 7 – Network Access and Security
In Module 7 students will learn several strategies for controlling network access and enhancing network security. These will include: controlling network location profiles, configuring wireless connection, configuring a RADIUS client, server and proxy, configuring a DHCP server as an enforcement point, enforcing network authentication using Kerberos and NTLM, configuring a firewall, and configuring IPsec to protect IP packets during transmission.
Module 8 – File and Print
This module discusses managing network files and printing. Topics include: managing network file sharing and shared folders, controlling access using NTFS and share permissions, encrypting files and folders, protecting integrity of data through shadow copy, and backup and restore, restricting disk space using disk quotas and FSRM, and managing print services.
Module 9 – WSUS
In this module students will learn how to configure a WSUS server and client to manage the updating of software. They will also learn how to use MBSA to scan for security compliance.
Module 10 – Performance and Reliability
This module covers tools that are used to collect and monitor network data for performance and reliability. The Reliability and Performance Monitor provides network performance statistics. Event Viewer is used to monitor event logs. Network Monitor is used to gather information about network traffic. SNMP is used to manage networkattached devices.
Practice Exams In Practice Exams students will have the opportunity to test themselves and verify that they understand the concepts and are ready to take the certification test.
Section 0.1: Introduction
Preparation
This course prepares students for the 70-642 Technology Specialist exam: Windows Server 2008 Network Infrastructure, Configuring. Microsoft recommends at least one year experience in the following underlying technologies:
• IP addressing and services
• Names resolution
• File and print services
• Network access and remote access
• Monitoring network services
This section introduces the instructor and the concepts that will be covered in this course.
Time
About 2 minutes
Section 0.2: Server Management
Preparation
This section discusses a new management console, Server Manager, used to install and manage server components. Server Manager uses the following elements:
• Role
• Role services
• Feature
Server Core, a scaled-down version of Server 2008, provides a reduced foot print, reduced maintenance, less crashes and downtimes, and uses less disk space. To provide these benefits a limited set of server roles are supported. Student will learn how to configure and manage a server using Server Manager. They will also learn how to install roles on a Server Core server.
Configuring Server 2008 Network Infrastructure Objectives
• 102. Configure Dynamic Host Configuration Protocol (DHCP)
• 201. Configure a Domain Name System (DNS) server.
Lecture Focus Questions:
• What are the differences among roles, role services, and features?
• How are dependencies handled during role installation?
• How does the server core installation differ from a standard server installation?
• What are the limitations of a server core installation? What are the advantages?
Time
About 20 minutes
Section 0.3: Remote Management
Preparation
This section examines remote management options. Students will learn how to enable Remote Desktop on a Server Core, enable remote management of the firewall, and open firewall ports to allow remote use of MMC snap-ins.
Lecture Focus Questions:
• How do firewall ports affect your ability to remotely manage a server?
• What firewall port must be opened for Remote Desktop connections?
• What advantage does using TS Gateway have over using Remote
Desktop?
• What is the effect of enabling the Remote Administration exception in the firewall?
• What are the operating system requirements for RSAT?
• Which remote administration tools could you use if the firewall had only ports 80 and 443 open?
Time
About 25 minutes
Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com