Muutke küpsiste eelistusi

Exam 70-413 Designing and Implementing a Server Infrastructure [Pehme köide]

  • Formaat: Paperback / softback, 576 pages, kõrgus x laius x paksus: 274x210x18 mm, kaal: 1066 g
  • Ilmumisaeg: 19-Dec-2014
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 1118789180
  • ISBN-13: 9781118789186
  • Pehme köide
  • Hind: 209,80 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 576 pages, kõrgus x laius x paksus: 274x210x18 mm, kaal: 1066 g
  • Ilmumisaeg: 19-Dec-2014
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 1118789180
  • ISBN-13: 9781118789186
This Microsoft Official Academic Course (MOAC) IT Professional curriculum prepares certification students for success every step of the way. This 70-413 Designing and Implementing a Server Infrastructure  exam course is the first of a series of two exams Microsoft Certified Solutions Associates (MCSE) candidates are required to pass to gain the  MCSE: Windows Server 2012 and Windows Server 2012 R2 certification. These MCSE exams test the skills and knowledge necessary to design, implement, and maintain a Windows Server 2012 infrastructure in an enterprise scaled, highly virtualized environment. Passing these exams confirms students ability to plan, configure, and implement the Windows Server 2012 services, such as server deployment, server virtualization, and network access and infrastructure.   This complete ready-to-teach MOAC program is mapped to all of the exam objectives.

 
Lesson 1 Designing and Planning an Automated Server Installation Strategy 1(32)
Designing a Server Imaging Strategy
2(5)
Selecting Image Characteristics
3(2)
Selecting Thick Images, Thin Images, and Hybrid Images
3(1)
Selecting Sector-Based Images or File-Based Images
4(1)
Selecting Image Formats
4(1)
Selecting Image Types
5(7)
Determining the Number of Images
6(1)
Planning for Bare Metal/Virtual Deployments
7(1)
Selecting an Appropriate Server Deployment Strategy
8(2)
Planning for Windows Deployment Services (WDS)
10(1)
Planning for Multicast Deployment
11(1)
Designing a Server Implementation Using Windows Assessment and Deployment Kit (Adk)
12(12)
Using Windows PE
13(3)
Creating and Configuring a Reference Computer and Image
16(1)
Creating and Using Answer Files with Windows SIM
17(4)
Using Sysprep to Prepare the Reference Computer
21(1)
Capturing a Reference Image by Using DISM
22(1)
Performing an Unattended Installation by Using WDS
23(1)
Designing a Virtual Server Deployment
24(1)
Planning for Deploying Servers to the Cloud
25(2)
Planning for Deploying Servers to Microsoft Azure Infrastructure as a service (IaaS)
25(1)
Planning for Deploying Servers to Public and Private Clouds
26(1)
Skill Summary
27(1)
Knowledge Assessment
28(3)
Business Case Scenarios
31(2)
Lesson 2 Implementing a Server Deployment Infrastructure 33(30)
Implementing a Server Deployment Infrastructure with WDS
34(5)
Deploying WDS
34(3)
Configuring Multicast Deployment in WDS
37(1)
Configuring Multisite Topology and Transport Servers
38(1)
Implementing a Server Deployment Infrastructure with Configuration Manager
39(13)
Installing System Center 2012 R2 Configuration Manager
40(4)
Configuring PXE Boot and Multicast Support
44(2)
Configuring Task Sequences, Collections, and Advertisements
46(5)
Configuring Multisite Topology and Distribution Points with System Center Configuration Manager
51(1)
Implementing a Server Deployment Infrastructure with Microsoft Deployment Toolkit (MDT)
52(3)
Deploying Servers to Microsoft Azure IaaS
55(1)
Deploying Servers to Public and Private Cloud by Using App Controller and Windows PowerShell
56(2)
Skill Summary
58(1)
Knowledge Assessment
58(3)
Business Case Scenarios
61(2)
Lesson 3 Planning and Implementing Server Upgrade and Migration 63(21)
Planning a Windows Server 2012 R2 Upgrade
64(3)
Planning for and Implementing Role Migration
67(7)
Developing a Deployment Plan
67(1)
Using Proper License Keys and Activating Windows
68(1)
Using the Microsoft Assessment and Planning (MAP) Toolkit
69(4)
Using the Windows Server Migration Tools
73(1)
Migrating Servers Across Domains and Forests
74(1)
Designing a Server Consolidation Strategy
74(1)
Planning for Capacity and Resource Optimization
75(3)
Skill Summary
78(1)
Knowledge Assessment
79(3)
Business Case Scenarios
82(2)
Lesson 4 Planning and Deploying Virtual Machine Manager Services 84(26)
Designing Virtual Machine Manager Service Templates
85(4)
Installing Virtual Machine Manager
85(4)
Designing Virtual Machine Manager Service Templates
89(16)
Creating VM Templates
89(2)
Creating Service Templates
91(2)
Planning and Deploying Profiles
93(6)
Planning and Deploying Operating System Profiles
93(1)
Planning and Deploying Hardware and Capability Profiles
94(2)
Planning and Deploying Application Profiles
96(1)
Planning and Deploying SQL Profiles
97(2)
Planning and Managing Services
99(1)
Configuring Virtual Machine Manager Libraries
100(1)
Managing Logical Networks
101(1)
Planning and Deploying Services to Non-Trusted Domains and Workgroups
102(3)
Skill Summary
105(1)
Knowledge Assessment
105(3)
Business Case Scenarios
108(2)
Lesson 5 Planning and Implementing File and Storage Services 110(37)
Planning and Implementing storage technology
111(19)
Planning and Implementing iSCSI SAN
112(1)
Configuring the iSCSI Initiator
113(3)
Configuring the iSCSI Target Server
116(2)
Configuring the iSCSI MPIO Features
118(2)
Configuring the Internet Storage Name Server (iSNS)
120(1)
Using iSCSI Best Practices
121(1)
Planning and Implementing Fibre Channel SANS
122(1)
Planning and Implementing Virtual Fibre Channel
123(2)
Installing Device-Specific Modules (DSMs)
125(1)
Planning and Implementing Storage Spaces and Storage Pools
125(6)
Creating Storage Pools
126(1)
Creating Storage Spaces
127(3)
Planning and Implementing Data deduplication
130(1)
Configuring Services for Network file System (NFS)
131(7)
Obtaining User and Group Information
132(3)
Creating an NFS Share
135(1)
Installing and Configuring the NFS Datastore
136(2)
Planning and Implementing SMB 3.0 Based Storage
138(2)
Planning for Windows Offloaded Data Transfer (ODX)
140(1)
Skill Summary
141(1)
Knowledge Assessment
142(4)
Business Case Scenarios
146(1)
Lesson 6 Designing and Maintaining a Dynamic Host Configuration Protocol (DHCP) Solution 147(35)
Planning DHCP Design and Maintenance
148(1)
Designing and Maintaining DHCP High Availability
149(8)
Configuring DHCP Failover
150(4)
DHCP Failover and Windows PowerShell
152(2)
Configuring DHCP Split-Scope
154(2)
Understanding DHCP Failover Clusters
156(1)
Integrating DHCP Interoperability with Microsoft services
157(7)
Configuring DHCP Interoperability with Domain Name Systems (DNS)
157(2)
Configuring DHCP Interoperability with Active Directory Domain Services (AD DS)
159(1)
Configuring DHCP Interoperability with Routing and Remote Access Service (RRAS)
160(1)
Configuring DHCP Interoperability with Network Access Protection (NAP)
161(2)
Configuring DHCP Interoperability with IP Address Management (IPAM)
163(1)
Understanding DHCP Interoperability with Windows Internet Name Service (WINS)
163(1)
Implementing DHCPv6
164(3)
Configuring DHCPv6
164(3)
Configuring for Stateless and Stateful Autoconfiguration
164(1)
Configuring Advanced DHCPv6 Settings
165(1)
Configuring DHCPv6 with Windows PowerShell
165(2)
Implementing DHCP Access Restrictions and Policies
167(4)
Configuring DHCP Policies
167(2)
Configuring DHCP Policies with Windows PowerShell
168(1)
Configuring DHCP Link-Layer Filters
169(2)
Implementing Microsoft System Center 2012 Management Pack for Windows Server 2012 DHCP
171(1)
Configuring the Microsoft System Center 2012 Management Pack for Windows Server 2012 DHCP
171(1)
Maintaining a DHCP Database
172(6)
Performing a DHCP Database Backup
173(1)
Restoring a DHCP Database
174(1)
Compacting the DHCP Database
175(1)
Reconciling the DHCP Database
176(1)
Performing a DHCP Server Migration
177(1)
Skill Summary
178(1)
Knowledge Assessment
178(3)
Business Case Scenarios
181(1)
Lesson 7 Designing a Name Resolution Strategy 182(28)
Creating a Name Resolution Strategy
183(5)
Reviewing DNS Names and Zones
184(3)
Understanding DNS Names and Zones
184(1)
Understanding the Address Resolution Mechanism
185(2)
Reviewing DNS Resource Records
187(1)
Designing a Zone Hierarchy and Zone Delegation
188(8)
Designing a Zone Hierarchy
188(2)
Creating an Internal Domain Naming Hierarchy
190(1)
Adding AD DS Domains to an Existing DNS Hierarchy
190(1)
Designing Disjoint Namespaces
190(1)
Designing a Physical DNS Infrastructure
191(1)
Designing a Zone Delegation
192(2)
Using Forwarders
192(2)
Designing DNS Interoperability
194(1)
Supporting IPv6 with DNS
195(1)
Designing Migration to DNS Application Partitions
195(1)
Designing Secure Name Resolution
196(7)
Designing Active Directory—Integrated Zones
197(1)
Designing Secure Dynamic Updates
198(1)
Designing DNSSEC
198(4)
Designing a DNS Socket Pool
202(1)
Designing DNS Cache Locking
202(1)
Designing a Single-Label DNS Name Resolution
203(2)
Understanding WINS
203(1)
Designing a GlobalNames Zone
204(1)
Skill Summary
205(1)
Knowledge Assessment
206(3)
Business Case Scenarios
209(1)
Lesson 8 Designing and Managing an IP Address Management Solution 210(22)
Designing and Managing an Address Management System
211(16)
Planning IP Address Management Technologies
211(4)
Understanding IPAM Requirements
212(1)
Understanding Group Policy-Based and Manual Provisioning
213(1)
Understanding Distributed, Centralized, and Hybrid Placement
214(1)
Setting Up Database Storage
214(1)
Configuring Data Collection for IPAM
215(4)
Configuring Role-Based Access Control (RBAC)
219(1)
Configuring IPAM Auditing
220(1)
Managing and Migrating IP Addresses
221(4)
Managing and Monitoring Multiple DHCP and DNS Servers
225(1)
Integrating IPAM with Virtual Machine Manager (VMM)
226(1)
Skill Summary
227(1)
Knowledge Assessment
228(2)
Business Case Scenarios
230(2)
Lesson 9 Designing a VPN Solution 232(21)
Planning and Designing a VPN Solution
233(15)
Selecting a Tunneling Protocol
234(3)
Understanding PPTP
234(1)
Understanding L2TP/IPsec
235(1)
Understanding Secure Socket Tunneling Protocol (SSTP)
236(1)
Understanding IKEv2
236(1)
Deploying Security Certificates
237(2)
Designing VPN Solution with Firewalls
239(3)
Designing Client-to-Site VPN Solutions
242(1)
Designing Site-to-Site VPN Solutions
243(1)
Planning for Bandwidth and Protocol Implications
244(1)
Using Connection Manager Administration Kit (CMAK)
244(3)
Planning for Microsoft Azure IaaS
247(1)
Skill Summary
248(1)
Knowledge Assessment
249(2)
Business Case Scenarios
251(2)
Lesson 10 Designing a DirectAccess Solution 253(20)
Designing a DirectAccess Solution
253(16)
Understanding the DirectAccess Connection Process
254(2)
Understanding DirectAccess Enhancements in Windows Server 2012 R2
256(1)
Understanding DirectAccess Requirements
257(1)
Understanding DirectAccess Server Requirements
257(1)
Understanding DirectAccess Client Requirements
258(1)
Designing a DirectAccess Deployment Topology
258(2)
Migrating from Forefront UAG
260(1)
Designing a DirectAccess Server Infrastructure and Deployment
261(5)
Determining the Scope of the DirectAccess Project
262(1)
Determining Network Requirements
262(1)
Designing a DirectAccess Deployment
263(1)
Designing an Enterprise Certificate Deployment
263(2)
Using One-Time Password (OTP) with DirectAccess
265(1)
Choosing an Access Method
265(1)
Using the Getting Started Wizard to Set Up a Remote Access Server
266(3)
Skill Summary
269(1)
Knowledge Assessment
269(3)
Business Case Scenarios
272(1)
Lesson 11 Designing a Web Application Proxy Solution 273(21)
Understanding Active Directory Federation Services
274(5)
Installing AD FS
276(2)
Configuring Claims Provider Trust Rules
278(1)
Designing a Web Application Proxy Solution
279(11)
Planning for Applications, Authentication, and Authorization
282(1)
Planning for Integrated Windows Authentication
282(1)
Planning for Microsoft Office Forms Based Authentication Clients
283(1)
Planning for Windows Store App Clients
283(1)
Planning for Single Sign-On (SSO)
283(1)
Using Multi-Factor Authentication with AD FS
284(2)
Using Multi-Factor Access Control
286(2)
Adding Devices with Workplace Join
288(1)
Configuring CAs and Certificates
289(1)
Planning Access for Internal and External Clients
289(1)
Skill Summary
290(1)
Knowledge Assessment
290(3)
Business Case Scenarios
293(1)
Lesson 12 Implementing a Scalable Remote Access Solution 294(31)
Configuring Site-to-Site VPN
295(3)
Configuring Packet Filters
298(7)
Exploring the WFAS Profiles
298(2)
Understanding Inbound Rules, Outbound Rules, and Connection Security Rules
300(4)
Addressing Conflicts with Firewall Rules
304(1)
Exporting Firewall Configuration Rules
304(1)
Implementing Packet Tracing
305(2)
Implementing MultiSite Remote Access
307(2)
Configuring Remote Access Clustered with Network Load Balancing (NLB)
309(1)
Implementing an Advanced DirectAccess Solution
310(4)
Configuring Multiple RADIUS Server Groups and Infrastructure
314(5)
Installing and Configuring Network Policy Server
315(1)
Configuring Multiple RADIUS Servers
315(4)
Configuring Web Application Proxy for Clustering
319(2)
Skill Summary
321(1)
Knowledge Assessment
322(2)
Business Case Scenarios
324(1)
Lesson 13 Designing and Implementing a Network Protection Solution 325(22)
Designing Network Access Protection (NAP)
326(17)
Choosing a NAP Enforcement Method
328(1)
Designing for NAP Capacity
329(1)
Designing Placement of Servers, Firewall, Network Policy Server, and Remediation Network
330(1)
Configuring NAP Enforcement for IPsec
330(6)
Configuring NAP Enforcement for 802.1x
336(2)
Configuring System Health Validators (SHVs)
338(2)
Configuring Health Policies
340(1)
Configuring Isolation and Remediation
341(1)
Monitoring NAP Compliance
342(1)
Skill Summary
343(1)
Knowledge Assessment
343(3)
Business Case Scenarios
346(1)
Lesson 14 Designing a Forest and Domain Infrastructure 347(35)
Designing a Forest and Domain Infrastructure
348(23)
Using Microsoft Operations Framework
350(1)
Gathering Information
350(4)
Determining the Role of AD DS
351(2)
Diagramming the Current Infrastructure
353(1)
Determining Business Requirements
353(1)
Designing a Multi-Forest Architecture
354(4)
Shared Forest Elements
354(1)
Why Create Multiple Forests?
355(1)
Perimeter Networks
355(1)
Incompatible Schema
355(1)
Trust Relationships
355(1)
Information Protection
355(1)
Administrative Isolation
355(1)
Choosing a Forest Model
356(1)
Organizational Forest Model
356(1)
Resource Forest Model
357(1)
Restricted Access Forest Model
357(1)
Designing a Domain Structure
358(4)
Creating a Forest Root Domain
359(1)
Creating a Domain Hierarchy
360(2)
Designing Trust Relationships
362(4)
External Trusts
363(1)
Forest Trusts
363(1)
Realm Trusts
364(1)
Shortcut Trusts
365(1)
Designing Functional Levels
366(5)
Migrating to Windows Server 2012 R2
371(3)
Designing a Domain Migration
371(1)
Designing Domain Upgrades
372(27)
Preparing the Forest
373(1)
Preparing the Domain
373(1)
Upgrading a Domain
374(1)
Designing Forest Restructure
374(2)
Designing Microsoft Azure Active Directory
376(1)
Using DirSync
377(1)
Skill Summary
377(1)
Knowledge Assessment
378(3)
Business Case Scenarios
381(1)
Lesson 15 Implementing a Forest and Domain Infrastructure 382(15)
Configuring Domain Rename
382(2)
Configuring Forest and Domain Trusts
384(2)
Configuring Kerberos Realm Trusts
386(1)
Implementing a Domain Upgrade
387(1)
Implementing a Domain Migration
387(3)
Implementing a Forest Restructure
390(1)
Deploying and Managing a Test Forest
391(2)
Skill Summary
393(1)
Knowledge Assessment
393(3)
Business Case Scenarios
396(1)
Lesson 16 Designing a Group Policy Strategy 397(41)
Understanding Group Policy
398(1)
Planning Group Policy
399(6)
Planning Organizational Unit (OU) Hierarchy
399(2)
Identifying Group Policy Goals
401(2)
Meeting Organizational Requirements
403(1)
Planning Delegated Administration
404(1)
Group Policy Design
405(7)
Designing for Group Policy Object Placement
405(1)
Designing for Inheritance Blocking
405(3)
Designing for Policy Enforcement
408(1)
Designing for Security Filters
409(1)
Designing for WMI Filtering
410(2)
Deploying Group Policy
412(13)
Deploying Group Policy Objects
413(3)
Performing a Group Policy Update
413(1)
Modifying Group Policy Refresh Interval
414(1)
Forcing an Update through Group Policy Management Console
414(1)
Deploying a Loopback Policy
414(2)
Staging Group Policy Objects for Deployment
416(2)
Using the Group Policy Modeling Wizard
416(1)
Creating an OU for Testing
417(1)
Deploying Group Policy for Slow Links
418(1)
Deploying Site-Linked Group Policy Objects
419(2)
Deploying Delegated Administration
421(3)
Understanding Group Policy Caching
424(1)
Managing Group Policy
425(8)
Performing Maintenance on Group Policy
426(1)
Configuring Advanced Group Policy Management
427(1)
Managing Group Policy through Windows PowerShell
428(5)
Skill Summary
433(1)
Knowledge Assessment
434(3)
Business Case Scenarios
437(1)
Lesson 17 Designing an Active Directory Permission Model 438(19)
Designing an Active Directory Permission Model
438(14)
Designing Active Directory Object Security
439(1)
Customizing Tasks Using the Delegation of Control Wizard
440(3)
Designing Active Directory Quotas
443(1)
Deploying Administrative Tools on the Client Computer
443(1)
Delegating Permissions on Administrative Users
444(3)
Configuring a Plan for Kerberos Delegation
447(10)
Managing Service Principal Names (SPNS)
449(2)
Configuring Kerberos Delegation
451(1)
Skill Summary
452(1)
Knowledge Assessment
453(2)
Business Case Scenarios
455(2)
Lesson 18 Designing an Active Directory Sites Topology 457(29)
Planning an Active Directory Sites
457(25)
Gathering Network Information
458(1)
Determining Proximity of Domain Controllers
459(1)
Designing Sites
460(3)
Using a Single Site
461(1)
Using Multiple Sites
461(1)
Creating a Site
462(1)
Optimizing Replication
463(9)
Understanding lntrasite Replication
464(2)
Understanding Intersite Replication
466(1)
Understanding Connection Objects
466(2)
Selecting a Replication Model
468(1)
Selecting a Replication Model
468(1)
Hub and Spoke
469(1)
Full Mesh
470(1)
Hybrid
470(1)
Planning Global Catalog and RODC Replication
471(1)
Planning for SYSVOL Replication
471(1)
Determining Site Links
472(6)
Configuring Site Link Costs
473(1)
Configuring Site Link Schedules
474(1)
Creating Site Link Bridges
475(3)
Identifying and Resolving Active Directory Replication Conflicts
478(8)
Monitoring Replication with the Active Directory Replication Status Tool (ADREPLSTATUS)
479(3)
Skill Summary
482(1)
Knowledge Assessment
482(3)
Business Case Scenarios
485(1)
Lesson 19 Designing a Domain Controller Strategy 486(17)
Designing a Domain Controller Strategy
486(13)
Designing Global Catalogs
487(1)
Designing Partial Attribute Sets
488(1)
Designing Operations Master Roles
489(4)
Transferring the Operations Masters Role
491(1)
Seizing the Operations Masters Role
492(1)
Designing Read-Only Domain Controllers (RODCs)
493(2)
Planning Virtualizing Domain Controllers
495(1)
Planning Domain Controller Cloning
496(2)
Planning Domain Controller Placement
498(6)
How Many Domain Controllers?
498(1)
Deploying Forest Root Domain Controllers
498(1)
Skill Summary
499(1)
Knowledge Assessment
499(3)
Business Case Scenarios
502(1)
Lesson 20 Designing and Implementing a Branch Office Infrastructure 503(27)
Designing a Branch Office Strategy
504(5)
Using AD DS in the Branch Office
504(1)
Designing a Branch Office Topology
505(1)
Evaluating Full Domain Controller and Server Core Domain Controller
506(1)
Using a Full Domain Controller
507(1)
Using a Server Core Domain Controller
507(1)
Designing Global Catalogs and Universal Group Membership Caching at Branch Offices
507(2)
Designing a Read-Only Domain Controller for a Branch Office
509(3)
Configuring Password Replication Policy
509(2)
Modifying Filtered Attributes Set and Confidential Attributes
511(1)
Choosing Branch Office Services
512(3)
Designing DNS for the Branch Office
514(1)
Designing DHCP for the Branch Office
514(1)
Using the 80/20 Split Scopes
514(1)
Using DCHP Failover
515(1)
Delegating Administration
515(3)
Using the Delegation of Control Wizard
515(2)
Using Administrator Role Separation
517(1)
Designing Branchcache
518(7)
Understanding BranchCache Benefits
518(1)
Understanding Content Servers
518(1)
Understanding BranchCache Operating Modes
519(3)
Enabling BranchCache on Content Servers
522(1)
Configuring a Hosted Cache Mode Server
523(1)
Configuring Hash Publications
524(1)
Configuring BranchCache Clients
525(1)
Skill Summary
525(1)
Knowledge Assessment
526(3)
Business Case Scenarios
529(1)
Appendix A 530(2)
Index 532
The Microsoft Official Academic Course (MOAC) Program is the official product for Microsoft Programs in higher education. These learning products are created especially for the academic market and combine the business world focus and market research of Microsoft with 200 years of successful higher education publishing from Wiley. The program is based upon the same curriculum as the Microsoft IT Certifications to build the skills students need to succeed at work and the preparation they need to validate those skills and get the jobs they seek. All the support instructors need to deliver great courses on Microsoft software is in the program. Student copies of the textbooks include the trial software in select markets and student files for completing homework assignments. Microsoft Updates will bring you the latest information on new products and curriculums and are a part of the program. MOAC is a great way for instructors to get ready to teach and for students to get ready for work.