Configuring And Troubleshooting A Windows Server Network Infrastructure Egabi Learn
Price: TBA

    Course details

    This course provides students with the knowledge and skills to configure and troubleshoot Windows Server 2008 and Windows Server 2008 R2 Sp1 Network Infrastructures. It will cover networking technologies most commonly used with Windows Server 2008 and Windows Server 2008 R2 Sp1 such as DNS, DHCP, IPv4 and IPv6 network addressing, Network Policy server and Network Access Protection and configuring secure network access. It also covers fault tolerant storage technologies, Network Storage and routing and remote access, monitoring and compliance updates as well as other relevant technologies.

    Course Objectives :

    After completing this course, students will be able to:

    • Plan and configure an IPv4 network infrastructure.
    • Implement DHCP within their organization.
    • Configure and troubleshoot DNS.
    • Configure, transition to, and troubleshoot IPv6.
    • Configure and troubleshoot Routing and Remote Access.
    • Install, configure, and troubleshoot the Network Policy Server Role service.
    • Implement Network Access Protection.
    • Implement security features within Windows Server 2008 and Windows Server 2008 R2.
    • Implement security features within Windows Server 2008 and Windows Server 2008 R2 that help to secure network communications.
    • Configure and troubleshot file and print services.
    • Enable and configure services to optimize branch office data access.
    • Control and monitor network storage.
    • Recover data on Windows Server 2008 and Windows Server 2008 R2 servers.
    • Monitor Windows Server 2008 and Windows Server R2 network infrastructure services.

    Course Topics:

    • Configuring Network Access
    • Configuring VPN Access
    • Overview of Network Policies
    • Overview of the Connection Manager Administration Kit
    • Troubleshooting Routing and Remote Access
    • Configuring DirectAccess

    Lab : Configuring and Managing Network Access

    • Configuring Routing and Remote Access as a VPN Remote Access Solution
    • Configuring a Custom Network Policy
    • Create and distribute a CMAK Profile

    Lab : Configuring and Managing DirectAccess

    • Configure the AD DS Domain Controller and DNS
    • Configure the PKI Environment
    • Configure the DirectAccess Clients and Test Intranet Access
    • Configure the DirectAccess Server
    • Verify DirectAccess Functionality

    After completing this module, students will be able to:

    • Configure network access.
    • Create and configure a VPN solution.
    • Describe the role of network policies.
    • Use the Connection Manager Administration Kit to create and configure client connection profiles.
    • Troubleshoot routing and remote access.
    • Implement DirectAccess.

    Module 6: Installing, Configuring, and Troubleshooting the Network Policy Server Role ServiceNPS provides support for the Remote Authentication Dial-In User Service (RADIUS) protocol, and can be configured as a RADIUS server or proxy. Additionally, NPS provides functionality that is essential for the implementation of Network Access Protection (NAP). This module explains how to install, configure, and troubleshoot NPS.Lessons

    • Installing and Configuring a Network Policy Server
    • Configuring RADIUS Clients and Servers
    • NPS Authentication Methods
    • Monitoring and Troubleshooting a Network Policy Server

    Lab : Configuring and Managing Network Policy Server

    • Installing and Configuring the Network Policy Server Role Service
    • Configuring a RADIUS Client
    • Configuring Certificate Auto-Enrollment
    • Configuring and Testing the VPN

    After completing this module, students will be able to:

    • Install and configure NPS.
    • Configure RADIUS clients and servers.
    • Describe NPS authentication methods.
    • Monitor and troubleshoot NPS.

    Module 7: Implementing Network Access ProtectionIn this module, you will learn about Network Access Protection (NAP). NAP enables you to create customized health-requirement policies to validate computer health before allowing access or communication. NAP also automatically updates compliant computers to ensure on-going compliance and can limit the access of noncompliant computers to a restricted network until they become compliant.Lessons

    • Overview of Network Access Protection
    • How NAP Works
    • Configuring NAP
    • Monitoring and Troubleshooting NAP

    Lab : Implementing NAP into a VPN Remote Access Solution

    • Configuring NAP Components
    • Configuring Client Settings to Support NAP

    After completing this module, students will be able to:

    • Describe how NAP can help protect your network.
    • Describe the various NAP enforcement processes.
    • Configure NAP.
    • Monitor and troubleshoot NAP.

    Module 8: Increasing Security for Windows ServersSecurity is an essential consideration for networking with Windows Server 2008. In this module, you will learn how to implement various methods to increase security. Windows Firewall with Advanced Security is one of the features in Windows Server 2008 that is used to increase security. You can also use Windows Server Update Services to ensure that approved security updates are applied to servers in a timely way.Lessons

    • Windows Security Overview
    • Configuring Windows Firewall with Advanced Security
    • Deploying Updates with Windows Server Update Services

    Lab : Increasing Security for Windows Servers

    • Deploying a Windows Firewall Rule
    • Implementing WSUS

    After completing this module, students will be able to:

    • Describe a process for increasing the security of Windows Server 2008.
    • Configure Windows Firewall with Advanced Security.
    • Describe Windows Server Update Services and how to use it.

    Module 9: Increasing Security for Network CommunicationInternet Protocol security (IPsec) is a framework of open standards for protecting communications over IP networks through cryptographic security services. IPsec supports network-level peer authentication, data-origin authentication, data integrity, data confidentiality (encryption), and replay protection. The Microsoft IPsec implementation is based on standards that the Internet Engineering Task Force (IETF) IPsec working group developed. In this module, you will learn how to implement, configure, and troubleshoot IPsec.Lessons

    • Overview of IPsec
    • Configuring Connection Security Rules
    • Configuring NAP with IPsec Enforcement
    • Monitoring and Troubleshooting IPsec

    Lab : Increasing Security for Network Communication

    • Selecting a Network Security Configuration
    • Configuring IPsec to Authenticate Computers
    • Testing IPsec Authentication

    After completing this module, students will be able to:

    • Describe when and how to use IPsec.
    • Configure Connection Security rules.
    • Configure IPsec with NAP Enforcement.
    • Describe how to monitor and troubleshoot IPsec.

    Module 10: Configuring and Troubleshooting Network File and Print ServicesFile and print services are some of the most commonly implemented network services for end users. Unlike infrastructure services like DNS, file and print services are highly visible to the end users. In this module, you will learn how to configure and troubleshoot file and print services to provide high quality service to end users. In addition, you will see how both EFS and BitLocker can be used to increase the security of files that are located in file shares.Lessons

    • Configuring and Troubleshooting File Shares
    • Encrypting Network Files with EFS
    • Encrypting Partitions with BitLocker
    • Configuring and Troubleshooting Network Printing

    Lab : Configuring and Troubleshooting Network File and Print Services

    • Creating and Configuring a File Share
    • Encrypting and Recovering Files
    • Creating and Configuring a Printer Pool

    After completing this module, students will be able to:

    • Describe how to manage file share security.
    • Explain how to encrypt network files with EFS.
    • Describe how to encrypt partitions with BitLocker.
    • Discuss how to configure and troubleshoot network printing.

    Module 11: Optimizing Data Access for Branch Offices

    Many organizations maintain a large number of file resources that need to be organized and made highly available to users. These file resources are often stored on servers and provided to users who are distributed geographically in widespread locations. In this module, you will learn how to provide efficient access to network resources with minimal traffic over a WAN link.

    Lessons

    • Branch Office Data Access
    • DFS Overview
    • Overview of DFS Namespaces
    • Configuring DFS Replication
    • Configuring BranchCache

    Lab : Implementing DFS

    • Installing the DFS Role Service
    • Configuring the Required Namespace
    • Configuring DFS Replication

    Lab : Implementing BranchCache

    • Performing Initial Configuration Tasks for BranchCache
    • Configuring BranchCache Clients
    • Configuring BranchCache on the Branch Server
    • Monitoring BranchCache

    After completing this module, students will be able to:

    • Describe the challenges experienced when providing data access to branch offices.
    • Identify the basic components of DFS.
    • Describe DFS namespaces.
    • Explain how to configure DFS replication.
    • Discuss how to configure BranchCache.

    Module 12: Controlling and Monitoring Network StorageNetwork storage for users is a finite resource that must be managed appropriately to ensure that it remains available for all users. If network storage is not monitored and managed, it can become filled with irrelevant data, such as personal music or movies. Irrelevant data increases network storage costs and in some cases can prevent useful data from placement on the network storage. In this module, you will learn how to monitor and manage network storage.Lessons

    • Monitoring Network Storage
    • Controlling Network Storage Utilization
    • Managing File Types on Network Storage

    Lab : Controlling and Monitoring Network Storage

    • Configuring FSRM Quotas
    • Configuring File Screening
    • Configuring File Classification and File Management

    After completing this module, students will be able to:

    • Describe how to monitor network storage by using FSRM.
    • Explain how to manage quotas by using FSRM.
    • Describe how to implement file screening, classification management, and file management tasks by using FSRM.

    Module 13: Recovering Network Data and ServersThis module explains how to recover network data and servers. There are a variety of scenarios where a network data or a server that provides networks services can be lost. Volume shadow copies can be used to restore previous versions of files when a file is accidentally deleted or modified on a computer that is running Windows Server 2008. Windows Server Backup can be used to back up and restore data files or an entire server.Lessons

    • Recovering Network Data with Volume Shadow Copies
    • Recovering Network Data and Servers with Windows Server Backup

    Lab : Recovering Network Data and Servers

    • Configuring Shadow Copies
    • Configuring a Scheduled Backup

    After completing this module, students will be able to:

    • Describe how to configure and use volume shadow copies.
    • Describe how to configure and use Windows Server Backup.

    Module 14: Monitoring Windows Server 2008 Network Infrastructure Servers

    When a system failure or an event that affects system performance occurs, you need to be able to repair the problem or resolve the issue quickly and efficiently. With so many variables and possibilities in the modern network environment, the ability to determine the root cause quickly often depends on having an effective performance monitoring methodology and toolset. In this module, you will learn to use performance-monitoring tools to identify components that require additional tuning and troubleshooting. By identifying components that require additional tuning, you can improve the efficiency of your servers.

    Lessons

    • Monitoring Tools
    • Using Performance Monitor
    • Monitoring Event Logs

    Lab : Monitoring Windows Server 2008 Network Infrastructure Servers

    • Establishing a Performance Baseline
    • Identifying the Source of a Performance Problem
    • Centralizing Events Logs

    After completing this module, students will be able to:

    • Describe monitoring tools for Windows Server 2008 R2.
    • Describe how to use performance monitor.
    • Describe how to monitor event logs.
    Updated on 08 November, 2015

    About Egabi Learn

    egabi Learn is a Professional Authorized Training Services and solutions provider covering a wide range of technical and management specializations. In addition, egabi Learn provides Rollout services covering end-to-end implementation to facilitate the entire rollout process as Theyll as outsTheircing services. egabi Learn offers various advanced learning solutions provided by experienced partners.

    Since its establishment in 2007, egabi Learn has demonstrated remarkable growth, and is considered as one of the leading training services providers across MEA Region.

    egabi Learn has acquired an impressive client base encompassing top multinational companies and key regional businesses from a wide range of business sectors covering government, telecommunication, banking and private sector companies.

    See all Egabi Learn courses
    Are you from Egabi Learn ? Claim your course!
    Courses you can instantly connect with... Do an online course on Windows Server starting now. See all courses

    Is this the right course for you?

    Didn't find what you were looking for ?

    or