MCITP Syllabus
.
Planning and
Maintaining a Microsoft® Windows® Server
2008 Network
Infrastructure
Implementing and
Configuring a Windows Deployment Infrastructure
• Deploying
Windows in a Windows Server 2008 Environment
• Windows
Deployment Fundamentals
• Windows
Deployment Methods
• Introducing
Windows Deployment Services
• Understanding
WDS Infrastructure Components
• Installing WDS
• Configuring WDS
• Capturing Images
with WDS
• Deploying Images
with WDS
• What Are Virtual
Machines?
• Virtual PC 2007
• Virtual Server
2005 R2 SP1
Configuring
Server Storage and Clusters
• Understanding
Server Storage Technologies
• Managing Disks,
Volumes, and Partitions in Windows Server 2008
• Working with
Disk Sets
• Server Cluster
Fundamentals
• Configuring an
NLB Cluster
• Creating a
Failover Cluster
• Configure
Storage
• Configure High
Availability
Installing and
Configuring Terminal Services
• Deploying a
Terminal Server
• Understanding
Terminal Services
• Enabling Remote
Desktop
• Installing
Terminal Services
• Staging the
Terminal Server
• Introducing the
Terminal Services Configuration Console
• Configuring
Connection (RDP-Tcp) Properties
• Configuring
Terminal Services Server Properties
• Configuring
Terminal Services Printer Redirection
• Deploy a
Terminal Server Farm
Configuring and
Managing a Terminal Services Infrastructure.
• Configuring and
Managing Terminal Services Clients
• Configuring
Terminal Services Client Settings
• Configuring User
Profiles for Terminal Services
• Managing
Terminal Services User Connections
• Managing
Resources in Client Sessions
• Deploying
Terminal Services Gateway
• Overview of
Terminal Services Gateway
• Installing and
Configuring a TS Gateway Server
• Publishing
Applications with TS RemoteApp
• Configuring a
Server to Host RemoteApp Programs
• Adding Programs
for Publication in TS RemoteApp Manager
• Deploying a
RemoteApp Program through TS Web Access
• Creating an RDP
File of a RemoteApp Program for Distribution
• Creating a
Windows Installer Package of a RemoteApp Program for
Distribution
• Deploy a
Terminal Services Infrastructure
Installing and
Configuring Web Applications
• Installing the
Web Server (IIS) Role
• Understanding
Web Server Security
• Understanding
IIS Components and Options
• Understanding
the Application Server Role
• Understanding
IIS 7.0 Role Services
• Installing the
Web Server (IIS) Role
• Using Windows
System Resource Manager
• Configuring Internet
Information Services
• Working with IIS
Management Tools
• Creating and
Configuring Web Sites
• Understanding
Web Applications
• Working with
Application Pools
• Working with
Virtual Directories
• Using
Command-Line Management
• Managing Web
Server Configuration Files
• Migrating From
IIS 6.0
Managing Web
Server Security
• Understanding
IIS 7 Security Accounts
• Managing File
System Permissions
• Configuring IIS
Administration Features
• Managing Request
Handlers
• Managing IIS
Security Settings
• Managing IIS
Authentication
• Managing URL
Authorization Rules
• Configuring
Server Certificates
• Configuring IP
Address and Domain Restrictions
• Configuring .NET
Trust Levels
• Implementing Web
Server Security
Configuring FTP
and SMTP Services
• Configuring FTP
• Installing the
FTP Publishing Service
• Configuring FTP
Sites by Using IIS 6.0 Manager
• Installing and
Managing FTP 7
• Managing FTP
Sites
• Managing FTP
User Security
• Configuring FTP
Network Security
• Managing FTP
Site Settings
• Using FTP Client
Software
• Configuring and
Testing FTP
• Configuring SMTP
• Installing the
SMTP Server Feature
• Configuring SMTP
Services
• Monitoring SMTP
Virtual Servers
• Using an SMTP
Virtual Server
Configuring
Windows Media Services
• Configuring
Windows Media Services
• Understanding
Media Services
• Installing
Streaming Media Services
• Using Windows
Media Services Management Tools
• Managing
Publishing Points
• Configuring
Source Settings
• Creating
Announcements
• Configuring
Publishing Point Properties
• Managing
Advertising Settings
• Configuring
Security for Windows Media Services
• Enabling
Cache/Proxy Features
• Protecting Media
by Using DRM
Configuring
Windows SharePoint Services
• Configuring and
Managing Windows SharePoint Services
• Understanding
Windows SharePoint Services
• Understanding
WSS Deployment Options
• Verifying the
WSS Installation
• Using the
SharePoint Central Administration Web Site
• Managing
SharePoint Operations Settings
• Understanding
Backup and Recovery for WSS
• Deploying and
Configuring SharePoint Sites
• Managing Web
Applications
• Installing
Application Templates
Planning,
Implementing, and Maintaining a Microsoft
Windows Server
2008 Active Directory Infrastructure
Installing,
Upgrading, and Deploying Windows Server 2008
• Planning Windows
Server 2008 Installation and Upgrade
• Selecting the
Right Edition of Windows Server 2008
• Windows Server
2008 Server Core
• Installing
Windows Server 2008
• Upgrading from
Windows Server 2003
• Windows Server
2008 Answer Files
• Windows
Deployment Services
• Multicast,
Scheduled, and Automatic Deployment
• Rollback
Preparation
• Deployment
Services Role
Configuring
Network Connectivity
• Using IPv6 in
Windows Server 2008
• Addressing
Problems Caused by IPv4 Limitations
• Analyzing the
IPv6 Address Structure
• Planning an IPv4
to IPv6 Transition Strategy
• Implementing
IPv4-to-IPv6 Compatibility
• Using IPv6 Tools
• Configuring
Clients Through DHCPv6
• Planning an IPv6
Network
• Configuring DNS
• Using Windows
Server 2008 DNS
• Examining New
DNS Features and Enhancements
• Planning a DNS
Infrastructure
Active Directory
and Group Policy
• Windows Server
2008 Active Directory
• Introducing the
Windows Server 2008 Directory Server Role
• Planning Domain
and Forest Functionality
• Planning
Forest-Level Trusts
• Raising Domain
and Forest Functional Levels and Configuring Fine-
Grained Password Policy
• Group Policy in
Windows Server 2008
• Understanding
Group Policy
• Planning and
Managing Group Policy
• Troubleshooting
Group Policy
Application
Servers and Services
• Application
Servers
• Planning
Application Availability
• Ensuring
Application Availability
• Implementing
Application Accessibility
• Planning
Application Resilience
• Application
Deployment
• Deploying
Applications Using System Center Essentials
• Using System
Center Configuration Manager 2007
Terminal
Services and Application and Server Virtualization
• Terminal
Services
• Planning
Terminal Server Infrastructure
• Terminal
Services Licensing
• Configuring
Terminal Servers
• Terminal
Services Web Access
• Terminal Server
Session Broker
• Monitoring
Terminal Services
• Terminal
Services Gateway
• Server and
Application Virtualization
• Managing
Virtualized Servers
• Terminal
Services RemoteApp
• Microsoft
Application Virtualization
File and Print
Servers
• Managing File
and Print Servers
• Planning the
File Services Server Role
• Managing Access
Control
• Using FSRM to
Configure Quotas and File Screen Policy
• Planning the
Print Services Server Role
• Using DFS
Namespace to Plan and Implement a Shared Folder
• Structure and
Enhance Data Availability
• Configuring a
DFSR Structure
• Configuring
Offline Data Access
• Configuring
Indexing in the Windows Search Service
Windows Server
2008 Management, Monitoring, and Delegation
• Server
Management Strategies
• Tools for the
Administration of Windows Server 2008
• Remote
Administration Technologies
• Managing Windows
Server 2008 Event Logs
• Remotely
Managing Windows Server 2008
• Monitoring and
Optimizing Performance
• Reliability and
Performance
• Optimizing
Windows Server 2008 Performance
• Windows System
Resource Manager
• Data Collector
Sets, Reports, and WSRM Policies
• Delegating
Authority
• Delegation
Policies
• Delegation
Procedures
• Credential
Delegation
• Delegating the
Management of Applications
• Delegating
Administrative Permissions
Patch Management
and Security
• Windows Server
2008 Patch Management Strategies
• Deploying
Updates with WSUS
• Replica Mode and
Autonomous Mode
• Using Computer
Groups
• WSUS Client
Configuration
• Updates and
Synchronization Strategies
• Update
Management and Compliance
• Other Patch
Management Tools
• Monitoring
Server Security
• Encrypting File
System
• Windows Firewall
with Advanced Security
Remote Access
and Network Access Protection
• Managing Remote
Access
• VPN Protocols
and Authentication
• Network Policy
Server
• Remote Access
Accounting
• Terminal
Services Gateway Servers
• Network Access
Protection
• System Health
Agents and Validators
• NAP Enforcement
Methods
• Remediation
Servers
Certificate
Services and Storage Area Networks
• Configuring
Active Directory Certificate Services
• Types of
Certificate Authority
• Certificate
Services Role-Based Administration
• Configuring
Credential Roaming
• Configuring Auto
enrollment
• Configuring Web
Enrollment Support
• Configuring
Certificate Revocation Lists
• Configuring an
Online Responder for Certificate Services
• Network Device
Enrollment Service
• Using Enterprise
PKI to monitor CA Health
• Planning the
Deployment of Storage Area Networks
• Logical Unit
Numbers
• VDS
• Storage Manager
For SANs
• Multipath I/O
• Storage Explorer
Clustering and
High Availability
• Understanding
DNS Round Robin and Load Balancing
• Plan
Availability Strategies
• DNS Round Robin
• Configuring
Windows Network Load Balancing
• Windows Server
2008 Cluster Tools
• Selecting
Redundancy Strategies
• Understanding
Cluster Concepts
• Configuring
Failover Clustering
Backup and
Recovery
• Backing Up Data
• Shadow Copies of
Shared Folders
• Windows Server
Backup
• The wbadmin
Command-Line Tool
• Backing Up
Server Roles and Applications
• Remotely Backing
Up Computers
• Further
Considerations for Planning Backups
• System Center
Data Protection Manager
• Backing Up
Windows Server 2008
• Disaster
Recovery
• Windows Server
Backup Recovery Modes
• Recovering
Active Directory
• Hyper-V and Disaster
Recovery
Designing
Security for Microsoft® Networks
Introduction to
Designing Security
• Introduction to
Designing Security for Microsoft Networks
• Contoso
Pharmaceuticals: A Case Study
Creating a Plan
for Network Security
• Introduction to
Security Policies
• Defining a
Process for Designing Security
• Creating a
Security Design Team
• Planning a
Security Framework
Identifying
Threats to Network Security
• Introduction to
Security Threats
• Predicting
Threats to Security
Analyzing
Security Risks
• Introduction to
Risk Management
• Creating a Risk
Management Plan
Creating a
Security Design for Physical Resources
• Determining
Threats and Analyzing Risks to Physical Resources
• Designing
Security for Physical Resources
Creating a
Security Design for Computers
• Determining
Threats and Analyzing Risks to Computers
• Designing
Security for Computers
Creating a
Security Design for Accounts
• Determining
Threats and Analyzing Risks to Accounts
• Designing
Security for Accounts
Creating a
Security Design for Authentication
• Determining
Threats and Analyzing Risks to Authentication
• Designing
Security for Authentication
Creating a
Security Design for Data
• Determining
Threats and Analyzing Risks to Data
• Designing
Security for Data
Creating a
Security Design for Data Transmission
• Determining
Threats and Analyzing Risks to Data Transmission
• Designing
Security for Data Transmission
Creating a
Security Design for Network Perimeters
• Determining
Threats and Analyzing Risks to Network Perimeters
• Designing
Security for Network Perimeters
Designing
Responses to Security Incidents
• Introduction to
Auditing and Incident Response
• Designing an
Audit Policy
• Designing an Incident
Response Procedure