Oreilly - 70-640: Microsoft Windows Server 2008 Active Directory Configuration - 300000006A0112
Oreilly - 70-640: Microsoft Windows Server 2008 Active Directory Configuration
by Integrity Training | Publisher: Stone River eLearning | Release Date: July 2018 | ISBN: 300000006A0112


The 70-640: Microsoft Windows Server 2008 Active Directory Configuration training course trains the candidates to manage and protect data access and information, simplify deployment and management of the enterprise’s identity infrastructure, and provide more secure and traceable access to data. The course focuses on the configuration aspect of the key features of Active Directory such as Active Directory Domain Services (AD DS), Group Policy, Dynamic Access Control (DAC), Work Folders, Work Place Join, Certificate Services, and Rights Management Services (RMS). This intensive training course on Microsoft Active Directory provides in-depth training on implementing, configuring, managing and troubleshooting Active Directory Domain Services (AD DS) in Windows Server 2008 and Windows Server 2008 R2 environments. The course contents cover the fundamental concepts of AD DS, its features and functionalities such as implementing Group Policies, performing backup and restore and monitoring and troubleshooting Active Directory related issues. The course also maps directly to the exam objectives of Microsoft’s 70-640 exam.
  1. Course Introduction
    • Course Introduction 00:02:12
    • Instructor Intruduction 00:01:15
  2. Chapter 01 - Installing the Active Directory Role
    • Installing the Active Directory Role 00:00:37
    • Lesson 1: What is IDA? 00:00:29
    • What is Active Directory Identity and Access (IDA) 00:02:18
    • What is Active Directory Identity and Access (IDA) Cont. 00:03:59
    • Five Components of the IDA Platform 00:02:14
    • Certificate Services 00:02:47
    • Federation Services 00:01:26
    • What Windows 2008 Server Offers Beyond the IDA 00:01:42
    • Lesson 2: How to Install the AD DS Role 00:00:24
    • What are the Different Components? 00:05:51
    • Preparation Checklist for Creating a Windows Server 2008 Forest 00:04:24
    • How to Add the Directory Service Role 00:01:13
    • Demo - Creating a Windows Server 2008 Forest 00:22:39
    • Lesson 3: The New Windows 2008 Server Core 00:00:25
    • Understanding Server Core 00:07:12
    • Understanding Server Core Continued 00:01:52
    • Lesson 4: Installing AD DS Server Core 00:00:23
    • Installing Server Core 00:02:00
    • Demo - Installing a Server Core Domain Controller 00:19:55
    • Chapter 01 Review 00:00:49
  3. Chapter 02 - Working With Active Directory Objects
    • Working With Active Directory Objects 00:01:28
    • Lesson 1: Working with the MMC 00:00:43
    • Understanding the MMC 00:03:12
    • How to Use the Microsoft Management Console (MMC) 00:05:45
    • Customize the MMC with Snap-ins 00:03:03
    • Customize the MMC with Snap-ins Cont. 00:01:53
    • Learn How to Use the Alternate Login Credentials 00:03:12
    • Demo - Custom MMC 00:14:41
    • Lesson 2: Working with Objects in Active Directory 00:00:15
    • Creating an OU 00:02:44
    • Creating a User Object 00:06:47
    • Creating a Group Object 00:03:00
    • Lesson 3: How to Search Through Active Directory 00:00:35
    • How to Find Objects in Active Directory 00:03:34
    • Introducing LDAP 00:03:27
    • Demo - Using Active Directory 00:13:13
    • Lesson 4: Securing and Delegating AD Objects 00:00:40
    • Understanding Delegation 00:04:31
    • What are User Rights? 00:03:32
    • Using the Delegation of Control Wizard 00:01:50
    • Using the Delegation of Control Wizard Cont. 00:01:27
    • Demo - Delegation 00:05:21
    • Lesson 5: Adding Computer Accounts to AD 00:00:21
    • Understanding Workgroups, Domains, and Trusts 00:02:35
    • Identifying Requirements for Joining a Computer to the Domain 00:04:26
    • Offline Domain Join 00:01:10
    • Lesson 6: Organizing AD with Container Objects 00:00:46
    • Understanding Containers 00:02:54
    • Creating OUs for Computers 00:03:31
    • Adding a Computer to the Domain 00:01:39
    • Pre-stage Computer Account 00:01:48
    • Pre-stage Computer Account Cont. 00:01:08
    • Restricting the Ability of Users to Create Computers 00:01:37
    • Demo - Joining the Domain 00:08:19
    • Lesson 7: Working With Computer Objects and Accounts 00:00:56
    • Configuring Computer Properties 00:01:10
    • Moving a Computer 00:02:29
    • Managing a Computer with the AD Users and Computers 00:01:55
    • Recognizing a Computer Account Problem 00:02:40
    • How to Reset a Computer Account 00:02:46
    • How to Rename a Computer 00:02:05
    • Ways to Disable/Enable Computer Accounts 00:01:10
    • How to Delete a Computer Account 00:01:15
    • Recycling the Computer Account 00:00:56
    • Demo - Recycling the Computer Account 00:01:43
    • Lesson 8: Automating Computer Account Creation 00:00:53
    • Importing Computers with CSVDE 00:02:48
    • Importing Computers with LDIFDE 00:01:20
    • Creating Computers with DSadd 00:02:34
    • Creating Computers with Netdom 00:00:47
    • Windows PowerShell 00:01:28
    • Creating Computers with VBScript 00:00:30
    • Demo - Automating Computer Creation 00:04:38
    • Chapter 02 Review 00:01:01
  4. Chapter 03 - Understanding GPOs
    • Understanding GPOs 00:01:00
    • Lesson 1: Using Group Policy 00:00:18
    • Review of Group Policy 00:03:18
    • Lesson 2: What Are Group Policy Objects 00:00:15
    • Group Policy Objects 00:02:15
    • Group Policy Objects Cont. 00:03:04
    • Scope 00:06:52
    • Policy Settings 00:07:57
    • Filtering Administrative Template Policy Settings 00:01:26
    • Demo - Group Policy 00:05:51
    • Lesson 3: Restricted Group Policies 00:00:19
    • Understanding Restricted Groups Policies 00:02:34
    • Demo - Restricted Groups 00:03:29
    • Lesson 4: Analyzing Security Settings 00:00:52
    • How to Configure the Local Security Policy 00:01:04
    • How to Configure the Local Security Policy Cont. 00:01:53
    • Using Security Templates and Deploying the GPOs 00:01:24
    • Using Security Templates and Deploying the GPOs Cont. 00:02:00
    • Analyzing the Security Configuration of a Computer 00:02:26
    • Analyzing the Security Configuration of a Computer Cont. 00:01:18
    • Creating Security Templates from the Results 00:01:25
    • Lesson 5: Using The Security Configuration Wizard 00:00:10
    • The Security Configuration Wizard 00:04:18
    • Security Policy 00:01:05
    • Demo - SCW 00:08:10
    • Lesson 6: Deploying Software with Group Policy 00:00:41
    • Understanding GP Software Installation 00:02:28
    • Windows Installer Programs 00:04:21
    • Preparing an SDP 00:00:32
    • Creating a Software Deployment GPO 00:00:54
    • Managing the Scope of Software Deployment GPO 00:01:32
    • Demo - Software Deployment 00:02:53
    • Lesson 7: Understanding Group Policy Scope 00:01:02
    • GPO Links 00:02:43
    • What is Inheritance and Precedence? 00:02:06
    • Security Filtering to Modify GPO Scope 00:01:33
    • WMI Filters 00:01:12
    • Enabling or Disabling GPOs and GPO Nodes 00:02:41
    • Lesson 8: How Group Policy Settings are Processed 00:00:19
    • Group Policy Processing 00:04:47
    • Group Policy Options 00:04:07
    • Demo - Group Policy Scope 00:11:33
    • Lesson 9: Verifying Group Policy Settings 00:00:38
    • Resultant Set of Policy 00:01:06
    • GP Results Wizard 00:01:39
    • GPresult.exe 00:00:58
    • Group Policy Modeling Wizard 00:01:04
    • Demo - Verifying Group Policy 00:03:52
    • Lesson 10: Enabling Auditing 00:00:18
    • Audit Policy 00:05:45
    • How to Audit Access to Files and Folders 00:02:33
    • Global Access Auditing 00:01:22
    • “Reason for Access” Reporting 00:01:14
    • Enabling the Audit Policy 00:01:48
    • Demo - Auditing 00:04:21
    • Chapter 03 Review 00:00:59
  5. Chapter 04 - Managing Users and Groups with AD
    • Managing Users and Groups with AD 00:00:43
    • Lesson 1: Automating User Account Creation 00:00:18
    • Automating the Creation of User Accounts with Templates 00:04:02
    • Introduction to the Active Directory Command -Line Tools 00:05:21
    • Demo - Automating User Accounts 00:07:30
    • Lesson 2: Working with User Attributes 00:00:25
    • How to Manage User Attributes 00:03:01
    • Understanding the Name and Other User Attributes 00:04:26
    • Account Properties 00:07:04
    • Managing User Attributes without the GUI 00:00:35
    • Lesson 3: User Account Administrative Tasks 00:00:11
    • Administrative Tasks 00:03:58
    • Protected Admin 00:01:16
    • Demo - Supporting User Accounts 00:04:53
    • Lesson 4: Using PowerShell to Create User Accounts 00:00:18
    • What is Windows PowerShell? 00:01:41
    • Key Elements of PowerShell 00:04:29
    • User Creation with PowerShell 00:02:45
    • PowerShell Scripting 00:00:43
    • Demo - Creating Users with PowerShell 00:07:18
    • Lesson 5: Group Creation and Management 00:00:22
    • Managing Your Enterprise with Groups 00:05:28
    • Defining Group Naming Conventions 00:02:41
    • Lesson 6: The Basics of Groups 00:00:25
    • Understanding Groups 00:03:45
    • What’s a Group Scope? 00:07:19
    • Allowed Group Scope Conversions 00:02:53
    • Managing Group Membership 00:05:23
    • Using Groups for Permissions 00:00:30
    • AGDLP and AGGUDLP Illustrated 00:03:56
    • Local vs. Domain 00:01:01
    • Demo - Managing Groups 00:08:26
    • Lesson 7: Best Practices for Using AD Groups 00:00:11
    • Best Practices for Group Attributes 00:02:26
    • Default Windows Groups 00:05:54
    • Lesson 8: Automating Group Creation 00:00:19
    • Creating and Managing Groups 00:02:42
    • Managing Group Membership with Windows PowerShell and VBScript 00:02:33
    • Demo - Automating Creation of Groups 00:06:40
    • Lesson 9: Advanced Group Options 00:00:14
    • Protecting Groups from Accidental Deletion 00:02:31
    • Delegating the Management of Group Membership 00:01:33
    • What are Shadow Groups? 00:02:21
    • Special Groups 00:02:45
    • Demo - Administering Groups 00:05:01
    • Chapter 04 Review 00:00:54
  6. Chapter 05 - Working With Domain Controllers
    • Working With Domain Controllers 00:00:42
    • Lesson 1: Installation Options 00:00:17
    • Creating a New Forest 00:01:58
    • Creating a New Tree 00:00:37
    • Migrating a Domain 00:01:22
    • Deleting a Domain 00:01:54
    • Lesson 2: How to Install a Domain Controller 00:00:25
    • Installing a DC with the Windows GUI 00:00:56
    • Using Unattended Installation and Answer Files 00:00:55
    • Installation Options 00:02:14
    • Installation Options Continued 00:01:30
    • Lesson 3: Introducing the Operations Masters 00:00:44
    • Single Master Operations 00:01:20
    • Forest Wide Roles 00:03:17
    • Domain - Wide Roles 00:03:56
    • Domain - Wide Roles Cont. 00:02:26
    • Lesson 4: Designing Where to Deploy the Operation Masters 00:00:32
    • Where to Place These Operations Masters 00:03:10
    • Identifying the Operations Masters 00:02:09
    • Transferring Operations Master Roles 00:01:40
    • Seizing Operations Masters 00:02:15
    • How to Seize or Transfer Operation Master Roles 00:02:59
    • Extending the Schema 00:01:18
    • Demo - FSMO 00:03:56
    • Lesson 5: SYSVOL Replication with DFS 00:00:18
    • How to Raise the Domain Functional Level 00:01:03
    • Understanding the Migration Steps 00:01:27
    • Chapter 05 Review 00:00:28
  7. Chapter 06 - Adding DNS
    • Adding DNS 00:00:11
    • Lesson 1: DNS Basics 00:00:30
    • Overview 00:03:03
    • DNS and IPv6 00:04:18
    • Peer Name Resolution Protocol 00:02:47
    • Types of DNS Servers 00:00:32
    • Dynamic DNS 00:01:37
    • Secure Dynamic DNS (SDDNS) 00:01:17
    • The Split Brain Option 00:01:19
    • Lesson 2: DNS Definitions and Terms 00:00:13
    • Understanding DNS 00:05:48
    • DNS Terms 00:03:17
    • Types of Records 00:05:24
    • Windows Server DNS Features 00:02:43
    • Demo - DNS 00:05:58
    • Lesson 3: Setting up DNS for the Enterprise 00:00:22
    • Configuring DNS 00:01:05
    • Considerations for Security 00:02:54
    • Working with DNS Server Settings 00:02:47
    • Application Directory Partitions 00:01:07
    • Administering DNS Servers 00:01:35
    • Demo - Global Names 00:09:01
    • Chapter 06 Review 00:00:37
  8. Chapter 07 - Securing the Authentication Process
    • Securing the Authentication Process 00:00:39
    • Lesson 1: Password Security Policies 00:00:32
    • Understanding Password Policies 00:04:57
    • Understanding Password Policies Cont. 00:05:30
    • Understanding Password Policies Cont. 00:01:32
    • Understanding Password Settings Object 00:01:58
    • Demo - Passwords 00:03:20
    • Lesson 2: Introducing the Read - Only Domain Controller 00:00:28
    • Why RODC 00:02:53
    • RODC Options 00:01:48
    • RODC Options Cont. 00:01:22
    • Lesson 3: Installing the RODC 00:00:33
    • Deploying an RODC 00:00:31
    • Password Replication Policy 00:01:51
    • PRP Cont. 00:02:35
    • Lesson 4: Auditing Authentication Events 00:00:24
    • Account Logon Events 00:02:12
    • Configuring Authentication 00:01:04
    • Demo - Account Logging 00:03:16
    • Chapter 07 Review 00:01:04
  9. Chapter 08 - Monitoring and Supporting AD
    • Monitoring and Supporting AD 00:00:27
    • Lesson 1: Preparing for Recovery 00:00:25
    • Important Concepts 00:02:39
    • Twelve Categories of AD DS Administration 00:06:59
    • Lesson 2: Active Directory Tools 00:00:40
    • Tools 00:03:14
    • Performing Online/Offline Maintenance 00:01:36
    • Offline Maintenance 00:01:22
    • Built-in Directory Protection Measures 00:05:53
    • Backups 00:01:06
    • Proactive Restores 00:04:09
    • Restarting in DSRM 00:01:59
    • Identifying the Backup Set 00:01:35
    • Other Options 00:01:42
    • Backup/Restore GPOs 00:00:42
    • Using the AD Recycle Bin 00:01:01
    • Lesson 3: Monitoring Active Directory Performance 00:00:25
    • Managing System Resources 00:00:36
    • Task Manager 00:00:54
    • Event Viewer 00:01:05
    • WRPM 00:02:46
    • WSRM 00:01:57
    • Server Manager 00:01:12
    • PowerShell 00:01:01
    • Baselines 00:01:44
    • Demo - Performance Monitor 00:09:38
    • Chapter 08 Review 00:01:01
  10. Chapter 09 - Planning Active Directory Deployment
    • Planning Active Directory Deployment 00:00:58
    • Lesson 1: What Are Sites? 00:00:30
    • Understanding What a Site Is 00:10:01
    • Site Traffic 00:04:19
    • Planning Sites 00:02:46
    • Planning Sites Cont. 00:01:02
    • Controlling Replication 00:01:55
    • Site Links 00:00:50
    • Bridgehead Server 00:00:38
    • Replication Scheduling 00:02:05
    • Replication Protocols 00:00:51
    • Forcing Intersite Replication 00:00:50
    • Summarizing Site Planning 00:01:12
    • Lesson 2: Deciding on Site Boundaries 00:00:15
    • Defining Sites 00:01:55
    • Managing Domain Controllers in Sites 00:02:07
    • SRVs 00:01:45
    • Site Coverage 00:01:01
    • Demo - Sites and Subnets 00:08:17
    • Lesson 3: Working with Global Catalog Placement with AD Partitions 00:00:16
    • Reviewing AD Partitions 00:01:28
    • Understanding the Global Catalog 00:02:10
    • Placing GC Servers 00:01:36
    • What’s Found in the Global Catalog 00:01:18
    • Universal Group Membership Caching (UGMC) 00:01:22
    • Partial Attribute Set 00:00:38
    • Promoting a Domain Controller to a Global Catalog 00:00:47
    • Lesson 4: Controlling Replication Between Sites 00:00:23
    • Understanding AD Replication 00:10:15
    • Replication 00:01:17
    • Intersite Replication 00:07:34
    • Monitoring Replication 00:01:06
    • Lesson 5: Managing the Global Catalog 00:00:15
    • Configuring a Global Catalog 00:01:39
    • Understanding Application Directory Partitions 00:02:11
    • Lesson 6: Configuring AD Trust Relationships 00:00:22
    • Defining the Forest Infrastructure 00:03:41
    • Defining the Forest Infrastructure Cont. 00:03:37
    • Moving Objects 00:03:25
    • Migration Issues 00:02:02
    • Trust Relationships 00:09:55
    • Trust Relationships Cont. 00:07:48
    • Securing Trust Relationships 00:01:30
    • Demo - Trusts 00:03:40
    • Lesson 7: Choosing the Domain and Forest Functional Levels 00:00:21
    • Functional Levels 00:01:59
    • Domain Functional Levels 00:02:20
    • Domain Functional Levels Cont. 00:01:23
    • Forest Functional Levels 00:01:38
    • Chapter 09 Review 00:01:05
  11. Chapter 10 - IDA Solutions
    • IDA Solutions 00:00:55
    • Lesson 1: Understanding AD FS 00:00:39
    • Understanding AD FS 00:02:10
    • B2B 00:01:23
    • Support of AD FS 00:00:36
    • The AD FS Process 00:02:01
    • Working with FS Designs 00:02:15
    • AD FS Components 00:00:59
    • Lesson 2: Installing AD FS 00:00:09
    • Installing AD FS 00:01:11
    • Lesson 3: Configuring and Using AD FS 00:00:16
    • Finalizing the Configuration of AD FS 00:01:57
    • Using and Managing AD FS 00:01:09
    • Lesson 4: Understanding AD RMS 00:00:33
    • Understanding AD RMS 00:01:19
    • New AD RMS Features 00:01:50
    • Basic Concepts 00:02:35
    • AD RMS Installation Scenarios 00:03:00
    • Preparing AD RMS Installation Prerequisites 00:01:17
    • Lesson 5: Installing AD RMS 00:00:18
    • AD RMS Considerations 00:01:25
    • Understanding AD RMS Certificates 00:01:55
    • Lesson 6: Configuring and Using AD RMS 00:00:09
    • Configuring AD RMS 00:02:33
    • Configuring AD RMS Cont. 00:00:54
    • Configuring AD RMS Cont. 00:01:52
    • Preparing the Accounts in the Access Rights 00:01:52
    • Lesson 7: Understanding AD LDS 00:00:33
    • What is AD LDS? 00:04:19
    • Comparing LDS with DS 00:02:10
    • AD LDS Scenarios 00:01:13
    • Lesson 8: Installing AD LDS 00:00:24
    • Installing AD LDS 00:02:26
    • Demo - Installing AD LDS 00:05:05
    • Lesson 9: Configuring and Using AD LDS 00:00:21
    • Working with AD LDS Tools 00:02:38
    • Creating an LDS Instance 00:03:17
    • Other Options 00:01:11
    • Lesson 10: Security Review 00:00:20
    • Review 00:02:02
    • Review Cont. 00:02:16
    • Chapter 10 Review 00:00:57
  12. Chapter 11 - Active Directory Certificate Services
    • Active Directory Certificate Services 00:00:17
    • Lesson 1: Understanding AD CS 00:00:21
    • Understanding AD CS 00:01:31
    • CA Options 00:02:05
    • Creating the CA Hierarchy 00:02:25
    • Some Best Practices 00:02:37
    • Additional Planning Requirements 00:00:46
    • Certificate Enrollment Types 00:00:34
    • Network Device Enrollment Service (NDES) 00:00:46
    • AutoEnrollment 00:00:25
    • Configuring AutoEnrollment 00:00:46
    • Web Enrollment 00:00:55
    • Web Enrollment Continued 00:01:15
    • Authentication Mechanism Assurance 00:00:51
    • Authentication Mechanism Assurance Continued 00:01:26
    • Enrollment Agents 00:00:36
    • Deploying Multi-Forest Certificates 00:01:49
    • X.509 Certificate Mapping 00:00:24
    • AD CS Illustration 00:09:23
    • Lesson 2: Installing AD CS 00:00:04
    • Installing AD CS 00:00:38
    • Supported Deployments 00:00:10
    • Standalone Root & Subordinate 00:00:24
    • Enterprise Root & Subordinate 00:01:15
    • Lesson 3: Configuring and Using AD CS 00:00:15
    • Finalizing the Configuration of an Issuing CA 00:01:44
    • More about the CRL 00:02:01
    • Considerations for the Use and Management of AD CS 00:02:23
    • More on Certificate Templates 00:00:44
    • Types of Templates 00:01:16
    • Chapter 11 Review 00:00:41
    • Course Closure 00:01:36
  13. Oreilly - 70-640: Microsoft Windows Server 2008 Active Directory Configuration

    300000006A0112.70640.Microsoft.Windows.Server.2008.Active.Directory.Configuration.part1.OR.rar

    300000006A0112.70640.Microsoft.Windows.Server.2008.Active.Directory.Configuration.part2.OR.rar

    300000006A0112.70640.Microsoft.Windows.Server.2008.Active.Directory.Configuration.part3.OR.rar

    300000006A0112.70640.Microsoft.Windows.Server.2008.Active.Directory.Configuration.part4.OR.rar

    300000006A0112.70640.Microsoft.Windows.Server.2008.Active.Directory.Configuration.part5.OR.rar

    300000006A0112.70640.Microsoft.Windows.Server.2008.Active.Directory.Configuration.part6.OR.rar


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.


SermonBox - Seasonal Collection

SermonBox - The Series Pack Collection

Top Rated News

  • Christmas Material
  • Laser Cut & Print Design Elements Bundle - ETSY
  • Daz3D - All Materials - SKU 37000-37999
  • Cgaxis - All Product - 2019 - All Retail! - UPDATED!!!
  • DigitalXModels Full Collections
  • Rampant Design Tools Full Collections Total: $4400
  • FilmLooks.Com Full Collection
  • All PixelSquid Product
  • The Pixel Lab Collection
  • Envato Elements Full Sources- 3200+ Files
  • Ui8.NET Full Sources
  • The History of The 20th Century
  • The Dover Collections
  • Snake Interiors Collections
  • Inspirational Collections
  • Veer Fancy Collections
  • All Ojo Images
  • All ZZVE Collections
  • All Sozaijiten Collections
  • All Image Broker Collections
  • Shuterstock Bundle Collections
  • Tattoo Collections
  • Blend Images Collections
  • Authors Tuorism Collections
  • Motion Mile - Big Bundle
  • PhotoBacks - All Product - 2018
  • Dekes Techniques - Photoshop & Illustrator Course - 1 to 673
Telegram GFXTRA Group
Udemy - Turkce Gorsel Ogrenme Setleri - Part 2
Videohive Wow Pack Series


rss