وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Active Directory and Windows Server 40+ Hour with Labs

سرفصل های دوره

Domain Controllers (DC), Global Catalog, FSMO, Groups, Users, Security, Domains and Forests ,Trusts, GPO, much more..


1. Active Directory Introduction and Administration Tools
  • 1. Course introduction
  • 2. Module 1 Installing and configuring domain controllers. Overview
  • 3. AD DS components
  • 4. What is the AD DS schema
  • 5. What is an AD DS forest
  • 6. What is an AD DS domain
  • 7. What are OUs
  • 8. What is new in AD DS in Windows Server 2016
  • 9. What is Azure AD
  • 10. Overview of AD DS administration tools
  • 11. Using the Active Directory Administrative Center to administer and manage AD DS

  • 2. Overview of AD DS domain controllers
  • 1. Introduction
  • 2. What is a domain controller
  • 3. What is a global catalog
  • 4. Overview of domain controller SRV records
  • 5. AD DS sign-in process
  • 6. What are operations masters
  • 7. Transferring and seizing roles

  • 3. Deploying a domain controller
  • 1. Deploying a domain controller
  • 2. Installing a domain controller from Server Manager
  • 3. Demonstration Installing a domain controller from Server Manager
  • 4. Installing a domain controller on a Server Core installation of Windows Server 2
  • 5. Installing a domain controller by installing from media
  • 6. Cloning domain controllers
  • 7. Demonstration Cloning domain controllers
  • 8. Best Practices for Domain Controller Virtualization
  • 9. Demonstration Adding Another domain controllers
  • 10. Demonstration Installing a domain controller with Powershell
  • 11. Demonstration FSMO Roles

  • 4. Managing user accounts
  • 1. Managing user accounts
  • 2. Creating user accounts
  • 3. Configuring user account attributes
  • 4. Demonstration Managing user accounts
  • 5. Demonstration Creating user profiles
  • 6. Demonstration User account templates

  • 5. Using Windows PowerShell cmdlets to manage user accounts
  • 1. Using Windows PowerShell cmdlets to manage user accounts
  • 2. Using Windows PowerShell to create users
  • 3.1 9.Using Windows PowerShell for bulk users operations
  • 3. Using Windows PowerShell for bulk users operations
  • 4. Using Windows PowerShell to modify users properties
  • 5. Using Windows PowerShell to add users to groups
  • 6. Using Windows PowerShell to modify users properties. Part2
  • 7. Using Windows PowerShell to enablemove users
  • 8. Using Windows PowerShell to delete users
  • 9. Identity with Windows Server.html

  • 6. Managing groups in AD DS
  • 1. Managing groups in AD DS Section Overview
  • 2. Group types
  • 3. Group scopes
  • 4. Implementing group management
  • 5. Managing members with GPO
  • 6. Default groups
  • 7. Special identities
  • 8. Demonstration Managing groups in Windows Server

  • 7. Managing computer objects in AD DS
  • 1. Managing computer objects in AD DS Section Overview
  • 2. Specifying the location of computer accounts
  • 3. Controlling permissions to create computer accounts
  • 4. Joining a computer to a domain
  • 5. Resetting the computer account (secure channel)
  • 6. Performing an offline domain join

  • 8. Implementing and managing OUs
  • 1. Implementing and managing OUs Section Overview
  • 2. Planning OUs
  • 3. OU hierarchy considerations
  • 4. Considerations for using OUs
  • 5. AD DS permissions
  • 6. Delegating AD DS permissions

  • 9. Using Windows PowerShell for groups and computers administration
  • 1. Using Windows PowerShell for AD DS administration Section Overview
  • 2. Using Windows PowerShell cmdlets to manage groups
  • 3. PowerShell Managing, configuring and modifying Group objects. Part 1
  • 4. PowerShell Managing, configuring and modifying Group objects. Part 2
  • 5. PowerShell Managing, configuring and modifying Group objects. Part 3
  • 6. PowerShell Managing, configuring and modifying Group objects. Part 4
  • 7. PowerShell Managing, configuring and modifying Group objects. Part 5
  • 8. Windows PowerShell cmdlets to manage computers and OUs
  • 9. PowerShell Managing, configuring and modifying Computer objects. Part 1
  • 10. PowerShell Managing, configuring and modifying Computer objects. Part 2
  • 11. Powershell Key Concepts

  • 10. Advanced AD DS infrastructure management
  • 1. Course Overview
  • 2. Section Overview
  • 3. Overview of domain and forest boundaries in an AD DS structure
  • 4. Why implement multiple domains
  • 5. Why implement multiple forests
  • 6. Deploying a domain controller in Azure IaaS
  • 7. Managing objects in complex AD DS deployments
  • 8. Deploying a distributed AD DS environment. Section Overview
  • 9. AD DS domain functional levels
  • 10. AD DS forest functional levels
  • 11. Deploying new AD DS domains
  • 12. Considerations for implementing complex AD DS environments
  • 13. Demo Installing a domain controller in a new domain in an existing forest
  • 14. Upgrading a previous version of AD DS to Windows Server 2016
  • 15. Migrating to Windows Server 2016 AD DS from a previous version
  • 16. Configuring AD DS trusts. Section Overview
  • 17. Overview of different AD DS trust types
  • 18. How trusts work in a forest
  • 19. How trusts work between forests
  • 20. Configuring advanced AD DS trust settings

  • 11. Implementing and administering AD DS sites and replication
  • 1. Course Overview
  • 2. Section Overview
  • 3. What are AD DS partitions
  • 4. Characteristics of AD DS replication
  • 5. How AD DS replication works within a site
  • 6. Resolving replication conflicts
  • 7. How replication topology is generated
  • 8. How SYSVOL replication works
  • 9. Configuring AD DS sites Section Overview
  • 10. What are AD DS sites
  • 11. Why implement additional sites
  • 12. How replication works between sites
  • 13. What is the ISTG
  • 14. Overview of SRV records
  • 15. How client computers locate domain controllers within sites
  • 16. Moving domain controllers between sites
  • 17. Configuring and monitoring AD DS replication Section Overview
  • 18. What are AD DS site links
  • 19. What is site link bridging
  • 20. What is universal group membership caching
  • 21. Lab Sites and Replication. Exercies and Tasks
  • 22. Lab Sites and Replication. Solution
  • 23. Identity with Windows Server.html

  • 12. Implementing Group Policy
  • 1. Part 1
  • 2. Part 2
  • 3. Part 3
  • 4. Part 4
  • 5. Part 5
  • 6. Part 6
  • 7. Part 7
  • 8. Part 8
  • 9. Part 9
  • 10. Part 11
  • 11. Part 12
  • 12. Part 13
  • 13. Part 14
  • 14. Part 15
  • 15. Part 15
  • 16. Part 16
  • 17. Part 17
  • 18. Part 18
  • 19. Demo Delegating administration of Group Policy
  • 20. Part 19
  • 21. Part 20
  • 22. Part 21
  • 23. Part 22
  • 24. Part 23. Using sec. filtering
  • 25. Part 24
  • 26. Part 25
  • 27. Part 26
  • 28. Part 27
  • 29. Part 28
  • 30. Part 29
  • 31. Lab A Tasks Implementing a Group Policy infrastructure
  • 32. Lab A Solution Implementing a Group Policy infrastructure
  • 33. Lab Review

  • 13. Troubleshooting the application of GPOs
  • 1. Troubleshooting the application of GPOs Lesson Overview
  • 2. Refreshing GPOs
  • 3. What is RSoP
  • 4. Generating RSoP Report
  • 5. Demo Performing a what-if analysis with Group Policy Modeling Wizard
  • 6. Examining Group Policy event logs
  • 7. Detecting Group Policy health issues
  • 8. Review and Takeaways
  • 9. Lab B Tasks Troubleshooting Group Policy infrastructure
  • 10. Lab B Solution Troubleshooting Group Policy infrastructure
  • 11. Lab Review
  • 12. Module Review and Takeaways

  • 14. Managing user settings with Group Policy
  • 1. Course Overview
  • 2. Section Overview
  • 3. What are administrative templates
  • 4. What are .adm and .admx files
  • 5. Overview of the central store
  • 6. Demonstration Configuring settings with administrative templates
  • 7. Importing security templates
  • 8. Managing administrative templates

  • 15. Configuring Folder Redirection, Software Installation, and Scripts
  • 1. Section Overview
  • 2. What is Folder Redirection
  • 3. Settings for configuring Folder Redirection
  • 4. Security settings for redirected folders
  • 5. Demonstration Configuring Folder Redirection
  • 6. Managing software with Group Policy
  • 7. Group Policy settings for applying scripts
  • 8. Demonstration Configuring scripts with GPOs
  • 9. Identity with Windows Server.html

  • 16. Configuring Group Policy preferences
  • 1. Section Overview
  • 2. What are Group Policy preferences Comparing with Policy settings
  • 3. Features of Group Policy preferences
  • 4. Item-level targeting options
  • 5. Demonstration Configuring Group Policy preferences
  • 6. Identity with Windows Server.html
  • 7. Lab Tasks Managing user settings with Group Policy
  • 8. Lab Solution Managing user settings with Group Policy
  • 9. Lab Review Managing user settings with Group Policy
  • 10. Module Review and Takeaways Managing user settings with Group Policy

  • 17. Group Policy Deployment Strategies
  • 1. Designing a Group Policy Friendly AD
  • 2. Demo Designing a Group Policy Friendly AD
  • 3. Best Practices for GP Deployment
  • 4. Demo Best Practices for GP Deployment
  • 5. Designing for Performance
  • 6. Module Review and Takeaways

  • 18. Introduction to Group Policy Scripting
  • 1. The Microsoft Group Policy PowerShell Module
  • 2. Demo The Microsoft Group Policy PowerShell Module
  • 3. Basic GPO Management With PowerShell
  • 4. Demo Basic GPO Management With PowerShell

  • 19. Securing domain controllers
  • 1. Section Overview
  • 2. Security risks that can affect domain controllers
  • 3. Modifying the security settings of domain controllers
  • 4. Implementing secure authentication
  • 5. Securing physical access to domain controllers
  • 6. What are RODCs
  • 7. Deploying an RODC
  • 8. Planning and configuring an RODC password replication policy
  • 9. Demonstration Configuring a password replication policy
  • 10. Separating RODC local administration

  • 20. Implementing account security
  • 1. Section Overview
  • 2. Password policies
  • 3. Account lockout policies
  • 4. Kerberos policies
  • 5. Demonstration Configuring a fine-grained password policy
  • 6. Protecting groups in AD DS
  • 7. Fine-grained password and lockout policies
  • 8. Tools for creating PSOs
  • 9. Demonstration Configuring authentication-related audit policies and viewing log
  • 10. PSO precedence and resultant PSO
  • 11. Account-security options
  • 12. Configuring user account policies

  • 21. Implementing audit authentication
  • 1. Section Overview
  • 2. Account logon and logon events
  • 3. Demonstration Configuring authentication-related audit policies and viewing log
  • 4. Scoping audit policies

  • 22. Configuring managed service accounts
  • 1. Section Overview
  • 2. Overview of service accounts
  • 3. Challenges of using service accounts
  • 4. Overview of managed service accounts
  • 5. What are group MSAs
  • 6. Demonstration Configuring group MSAs
  • 7. Lab Securing AD DS Exercises and Tasks
  • 8. Lab Securing AD DS. Solution
  • 9. Lab Securing AD DS. Solution. Part 2
  • 10. Lab Review
  • 11. Module Review and Takeaways

  • 23. Securing Windows Server and Group Policy
  • 1. SMB Security Features
  • 2. Demo Securing SMB - Auditing and Blocking SMBv1
  • 3. Demo Securing SMB Part 2 - SMB Signing and Encryption
  • 4. NTLM Security
  • 5. Implementing NTLM Security
  • 6. DNS Security
  • 7. Implementing DNSSEC
  • 8. Secure Management
  • 9. Managing Servers Using Windows Admin Center

  • 24. Deploying CAs
  • 1. Plan Your Progress
  • 2. Course Overview
  • 3. Section Overview Deploying CAs
  • 4. What is AD CS
  • 5. Options for implementing CA hierarchies
  • 6. Standalone vs. enterprise CAs
  • 7. Considerations for deploying a root CA
  • 8. Demonstration Deploying an enterprise root CA
  • 9. Considerations for deploying a subordinate CA
  • 10. How to use the CAPolicy.inf file for installing a CA

  • 25. Administering CAs
  • 1. Section Overview Administering CAs
  • 2. Managing CAs
  • 3. Configuring CA security
  • 4. Security roles for CA administration
  • 5. Configuring CA policy and exit modules
  • 6. Configuring CDPs and AIA locations
  • 7. Demonstration Configuring CA properties

  • 26. Troubleshooting and maintaining CAs
  • 1. Section Overview Troubleshooting CAs
  • 2. Troubleshooting CAs
  • 3. Renewing a CA certificate
  • 4. Moving a root CA to another computer
  • 5. Monitoring CA operations
  • 6. Lab Task Deploying and managing AD CS
  • 7. Lab Demonstration Steps Deploying and managing AD CS

  • 27. Deploying and managing certificates. Deploying and managing certificate template
  • 1. Plan Your Progress
  • 2. Course Overview
  • 3. Section Overview
  • 4. What are certificates and certificate templates
  • 5. Certificate template versions in Windows Server 2016
  • 6. Configuring certificate template permissions
  • 7. Configuring certificate template settings
  • 8. Options for updating a certificate template
  • 9. Demonstration Modifying and enabling a certificate template

  • 28. Managing certificate deployment, revocation, and recovery
  • 1. Section Overview Section Overview Managing certificate deployment, revocation,
  • 2. Certificate enrollment methods
  • 3. Overview of certificate autoenrollment
  • 4. What is an enrollment agent
  • 5. How does certificate revocation work
  • 6. Overview of key archival and recovery
  • 7. Demonstration Configuring a CA for key archival
  • 8. Using certificates for SSL
  • 9. Using certificates for digital signatures
  • 10. Using certificates for content encryption
  • 11. Demonstration Signing a document digitally. Encrypting a file with EFS

  • 29. Lab Deploying and using certificates
  • 1. Lab Task Deploying and using certificates
  • 2. Lab Demonstration Steps Deploying and using certificates

  • 30. Implementing and Administering AD FS
  • 1. Course Overview
  • 2. Overview of AD FS Section Overview
  • 3. What is identity federation
  • 4. What are claims-based identity and claims-based authentication
  • 5. Overview of web services
  • 6. What is AD FS
  • 7. Whats new in AD FS in Windows Server 2016
  • 8. How AD FS enables SSo in a single organization
  • 9. Section overview AD FS requirements and planning
  • 10 AD FS components
  • 11 AD FS requirements
  • 12. PKI and certificate requirements
  • 13. Federation server roles
  • 14. Planning an AD FS deployment for online services
  • 15. Planning a highly available AD FS deployment
  • 16. Capacity planning

  • 31. Deploying and configuring AD FS
  • 1. Section Overview Deploying and configuring AD FS
  • 2. What are AD FS claims and claim rules
  • 3. What is a claims provider trust
  • 4. Installing and configuring AD FS
  • 5. Configuring an account partner and a resource partner
  • 6. Configuring claims rules
  • 7. How home realm discovery works
  • 8. Managing an AD FS deployment

  • 32. Web Application Proxy
  • 1. Web Application Proxy. Section Overview
  • 2. What is the Web Application Proxy
  • 3. Web Application Proxy and AD FS proxy
  • 4. Web Application Proxy authentication methods
  • 5. Scenarios for using the Web Application Proxy

  • 33. Implementing Server 2019 Identity Federation and Access Hands-On and Exras
  • 1. Understanding Active Directory Federation Services
  • 2. Whats New in ADFS 2019
  • 3. The Lab Environment
  • 4. Understanding Certificates for ADFS
  • 5. Generating the ADFS Service Certificate
  • 6. Installing ADFS 2019
  • 7. Understanding the ADFS Upgrade Process
  • 8. Upgrading an ADFS 2016 Environment to ADFS 2019
  • 9. Exploring the ADFSHelp Website
  • 10. The ADFS Diagnostics Analyzer
  • 11. The ADFS Rapid Restore Tool
  • 12. Understanding Claims in ADFS
  • 13. Single Sign-on and Federation with WS-Federation and SAML
  • 14. Modern Authentication with OpenID Connect and OAuth 2.0
  • 15. Understanding Application Groups
  • 16. Configuring an Application Group and Claims in ADFS
  • 17. Deploy the Sample Application to IIS

  • 34. Even More on Group Policy - Group Policy Processing
  • 1. Group Policy Processing
  • 2. Demo Understanding Group Policy Processing
  • 3. Group Policy Targeting
  • 4. Demo Group Policy Targeting at Work
  • 5. Group Policy Linking, Filtering, and Order of Processing
  • 6. Demo Examples of GPO Linking, Filtering, and LSDOU
  • 7. GPO Processing Hierarchy
  • 8. Demo GPO Processing Hierarchy
  • 9. Summary

  • 35. Tools of the Trade
  • 1. Installing the GPMC
  • 2. Demo Downloading and Installing GPMC
  • 3. Navigating the GPMC
  • 4. Demo Navigating the GPMC
  • 5. Understanding GPO Properties
  • 6. Demo Understanding GPO Properties
  • 7. Creating and Editing GPOs
  • 8. Demo Creating, Editing, and Commenting GPOs
  • 9. Summary

  • 36. How Group Policy Gets Applied
  • 1. The Group Policy Processing Cycle
  • 2. Background and Foreground Processing
  • 3. Synchronous and Asynchronous Processing
  • 4. Demo Synchronous and Asynchronous Processing
  • 5. Group Policy Processing Mechanics
  • 6. Demo Group Policy Processing Mechanics
  • 7. Manual GP Processing
  • 8. Demo Manual GP Processing
  • 9. Summary

  • 37. Policy Scenarios - Desktop and Server Lockdown
  • 1. Understanding Administrative Templates Policy
  • 2. Demo How Registry Tattooing Works
  • 3. Administrative Templates and ADMX Files
  • 4. Demo Administrative Templates and ADMX Files
  • 5. Deploying Administrative Templates
  • 6. Summary

  • 38. Policy Scenarios - Security Policy
  • 1. Overview of Available Security Policy
  • 2. Deployment Scenario Group Membership Control
  • 3. Demo Group Membership Control
  • 4. Deployment Scenario Managing Windows Firewall
  • 5. Demo Managing Windows Firewall
  • 6. Application Control Policies (AppLocker)
  • 7. Demo AppLocker
  • 8. Demo AppLocker

  • 39. Policy Scenarios - Managing Internet Explorer Configuration
  • 1. The Three Policy Areas for Managing IE
  • 2. Demo Introducing the Three IE Policy Areas
  • 3. Using GP Preferences Internet Settings
  • 4. Demo Using GP Preferences Internet Settings
  • 5. Using IE Administrative Templates
  • 6. Demo Using IE Administrative Templates
  • 7. Managing (and Removing) IE Maintenance Policy
  • 8. Demo Managing (and Removing) IE Maintenance Policy
  • 9. Summary

  • 40. Even More on Group Policy - Scenarios - Deploying Software Using Group Policy
  • 1. Capabilities and Features in Group Policy Software Installation
  • 2. Demo Capabilities & Features in Group Policy Installation
  • 3. GPSI Best Practices
  • 4. Demo Deploying Software Using Group Policy
  • 5. Managing the Software Lifecycle
  • 6. Demo Patching an Existing Deployment
  • 7. Summary

  • 41. Policy Scenarios - Folder Redirection, User Settings, and Data
  • 1. How Folder Redirection Helps Redirect User Settings & Data
  • 2. Demo Understanding the User Profile
  • 3. Implementing Folder Redirection
  • 4. Demo Implementing Folder Redirection
  • 5. Using Group Policy Preferences for Folder Redirection
  • 6. Demo Using Group Policy Preferences for Folder Redirection
  • 7. Summary

  • 42. Policy Scenarios - Introduction to Group Policy Preferences
  • 1. Group Policy Preferences Overview
  • 2. Demo Group Policy Preferences Overview
  • 3. Managing Local Users and Groups
  • 4. Demo Managing Local Users and Groups
  • 5. GPP Drive Mapping
  • 6. Demo GPP Drive Mapping
  • 7. GPP Printer Mapping
  • 8. Demo GPP Printer Mapping
  • 9. Using GPP for Registry Changes
  • 10. Demo Using GPP for Registry Changes
  • 11. Summary

  • 43. Policy Scenarios - Managing StartupLogon Scripts
  • 1. Group Policy Scripts Capabilities and Limitations
  • 2. Demo Navigating Group Policy Scripts
  • 3. Deploying StartupShutdown Scripts
  • 4. Demo Deploying StartupShutdown Scripts
  • 5. Deploying LogonLogoff Scripts
  • 6. Demo Deploying LogonLogoff Scripts
  • 7. Script Configuration Options
  • 8. Summary

  • 44. Kiosks and Remote Desktop Services Scenario
  • 1. Understanding Group Policy Loopback Processing
  • 2. Demo Understanding Group Policy Loopback Processing
  • 3. Kiosk Configurations and Loopback Processing
  • 4. Demo Kiosk Configurations and Loopback Processing
  • 5. RDS, VDI, and Loopback Processing
  • 6. Summary

  • 45. Group Policy Management Tasks
  • 1. GPO Backup and Restoral
  • 2. Demo GPO Backup and Restoral
  • 3. Group Policy Delegation
  • 4. Demo Group Policy Delegation
  • 5. GPO Import Tasks
  • 6. Demo GPO Import Tasks
  • 7. Demo Starter GPO

  • 46. Basic Group Policy Troubleshooting
  • 1. Common Group Policy Problems
  • 2. Troubleshooting with RSoP
  • 3. Demo Troubleshooting with RSoP
  • 4. Monitoring GPO Replication
  • 5. Demo Monitoring GPO Replication
  • 6. Group Policy Logging
  • 7. Demo Group Policy Logging
  • 8. Group Policy Tracing
  • 9. Demo Group Policy Tracing
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 30258
    حجم: 18878 مگابایت
    مدت زمان: 2473 دقیقه
    تاریخ انتشار: ۲ اسفند ۱۴۰۲
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید