Tuesday, January 15, 2013

MCITP Syllabus

MCITP Syllabus
.
Planning and Maintaining a Microsoft® Windows® Server
2008 Network Infrastructure
Implementing and Configuring a Windows Deployment Infrastructure
Deploying Windows in a Windows Server 2008 Environment
Windows Deployment Fundamentals
Windows Deployment Methods
Introducing Windows Deployment Services
Understanding WDS Infrastructure Components
Installing WDS
Configuring WDS
Capturing Images with WDS
Deploying Images with WDS
What Are Virtual Machines?
Virtual PC 2007
Virtual Server 2005 R2 SP1
Configuring Server Storage and Clusters
Understanding Server Storage Technologies
Managing Disks, Volumes, and Partitions in Windows Server 2008
Working with Disk Sets
Server Cluster Fundamentals
Configuring an NLB Cluster
Creating a Failover Cluster
Configure Storage
Configure High Availability

Installing and Configuring Terminal Services
Deploying a Terminal Server
Understanding Terminal Services
Enabling Remote Desktop
Installing Terminal Services
Staging the Terminal Server
Introducing the Terminal Services Configuration Console
Configuring Connection (RDP-Tcp) Properties
Configuring Terminal Services Server Properties
Configuring Terminal Services Printer Redirection
Deploy a Terminal Server Farm
Configuring and Managing a Terminal Services Infrastructure.
Configuring and Managing Terminal Services Clients
Configuring Terminal Services Client Settings
Configuring User Profiles for Terminal Services
Managing Terminal Services User Connections
Managing Resources in Client Sessions
Deploying Terminal Services Gateway
Overview of Terminal Services Gateway
Installing and Configuring a TS Gateway Server
Publishing Applications with TS RemoteApp
Configuring a Server to Host RemoteApp Programs
Adding Programs for Publication in TS RemoteApp Manager
Deploying a RemoteApp Program through TS Web Access
Creating an RDP File of a RemoteApp Program for Distribution
Creating a Windows Installer Package of a RemoteApp Program for
Distribution
Deploy a Terminal Services Infrastructure

Installing and Configuring Web Applications
Installing the Web Server (IIS) Role
Understanding Web Server Security
Understanding IIS Components and Options
Understanding the Application Server Role
Understanding IIS 7.0 Role Services
Installing the Web Server (IIS) Role
Using Windows System Resource Manager
Configuring Internet Information Services
Working with IIS Management Tools
Creating and Configuring Web Sites
Understanding Web Applications
Working with Application Pools
Working with Virtual Directories
Using Command-Line Management
Managing Web Server Configuration Files
Migrating From IIS 6.0
Managing Web Server Security
Understanding IIS 7 Security Accounts
Managing File System Permissions
Configuring IIS Administration Features
Managing Request Handlers
Managing IIS Security Settings
Managing IIS Authentication
Managing URL Authorization Rules
Configuring Server Certificates
Configuring IP Address and Domain Restrictions
Configuring .NET Trust Levels
Implementing Web Server Security

Configuring FTP and SMTP Services
Configuring FTP
Installing the FTP Publishing Service
Configuring FTP Sites by Using IIS 6.0 Manager
Installing and Managing FTP 7
Managing FTP Sites
Managing FTP User Security
Configuring FTP Network Security
Managing FTP Site Settings
Using FTP Client Software
Configuring and Testing FTP
Configuring SMTP
Installing the SMTP Server Feature
Configuring SMTP Services
Monitoring SMTP Virtual Servers
Using an SMTP Virtual Server
Configuring Windows Media Services
Configuring Windows Media Services
Understanding Media Services
Installing Streaming Media Services
Using Windows Media Services Management Tools
Managing Publishing Points
Configuring Source Settings
Creating Announcements
Configuring Publishing Point Properties
Managing Advertising Settings
Configuring Security for Windows Media Services
Enabling Cache/Proxy Features
Protecting Media by Using DRM

Configuring Windows SharePoint Services
Configuring and Managing Windows SharePoint Services
Understanding Windows SharePoint Services
Understanding WSS Deployment Options
Verifying the WSS Installation
Using the SharePoint Central Administration Web Site
Managing SharePoint Operations Settings
Understanding Backup and Recovery for WSS
Deploying and Configuring SharePoint Sites
Managing Web Applications
Installing Application Templates

Planning, Implementing, and Maintaining a Microsoft
Windows Server 2008 Active Directory Infrastructure
Installing, Upgrading, and Deploying Windows Server 2008
Planning Windows Server 2008 Installation and Upgrade
Selecting the Right Edition of Windows Server 2008
Windows Server 2008 Server Core
Installing Windows Server 2008
Upgrading from Windows Server 2003
Windows Server 2008 Answer Files
Windows Deployment Services
Multicast, Scheduled, and Automatic Deployment
Rollback Preparation
Deployment Services Role
Configuring Network Connectivity
Using IPv6 in Windows Server 2008
Addressing Problems Caused by IPv4 Limitations
Analyzing the IPv6 Address Structure
Planning an IPv4 to IPv6 Transition Strategy
Implementing IPv4-to-IPv6 Compatibility
Using IPv6 Tools
Configuring Clients Through DHCPv6
Planning an IPv6 Network
Configuring DNS
Using Windows Server 2008 DNS
Examining New DNS Features and Enhancements
Planning a DNS Infrastructure

Active Directory and Group Policy
Windows Server 2008 Active Directory
Introducing the Windows Server 2008 Directory Server Role
Planning Domain and Forest Functionality
Planning Forest-Level Trusts
Raising Domain and Forest Functional Levels and Configuring Fine-
Grained Password Policy
Group Policy in Windows Server 2008
Understanding Group Policy
Planning and Managing Group Policy
Troubleshooting Group Policy
Application Servers and Services
Application Servers
Planning Application Availability
Ensuring Application Availability
Implementing Application Accessibility
Planning Application Resilience
Application Deployment
Deploying Applications Using System Center Essentials
Using System Center Configuration Manager 2007

Terminal Services and Application and Server Virtualization
Terminal Services
Planning Terminal Server Infrastructure
Terminal Services Licensing
Configuring Terminal Servers
Terminal Services Web Access
Terminal Server Session Broker
Monitoring Terminal Services
Terminal Services Gateway
Server and Application Virtualization
Managing Virtualized Servers
Terminal Services RemoteApp
Microsoft Application Virtualization
File and Print Servers
Managing File and Print Servers
Planning the File Services Server Role
Managing Access Control
Using FSRM to Configure Quotas and File Screen Policy
Planning the Print Services Server Role
Using DFS Namespace to Plan and Implement a Shared Folder
Structure and Enhance Data Availability
Configuring a DFSR Structure
Configuring Offline Data Access
Configuring Indexing in the Windows Search Service

Windows Server 2008 Management, Monitoring, and Delegation
Server Management Strategies
Tools for the Administration of Windows Server 2008
Remote Administration Technologies
Managing Windows Server 2008 Event Logs
Remotely Managing Windows Server 2008
Monitoring and Optimizing Performance
Reliability and Performance
Optimizing Windows Server 2008 Performance
Windows System Resource Manager
Data Collector Sets, Reports, and WSRM Policies
Delegating Authority
Delegation Policies
Delegation Procedures
Credential Delegation
Delegating the Management of Applications
Delegating Administrative Permissions
Patch Management and Security
Windows Server 2008 Patch Management Strategies
Deploying Updates with WSUS
Replica Mode and Autonomous Mode
Using Computer Groups
WSUS Client Configuration
Updates and Synchronization Strategies
Update Management and Compliance
Other Patch Management Tools
Monitoring Server Security
Encrypting File System
Windows Firewall with Advanced Security

Remote Access and Network Access Protection
Managing Remote Access
VPN Protocols and Authentication
Network Policy Server
Remote Access Accounting
Terminal Services Gateway Servers
Network Access Protection
System Health Agents and Validators
NAP Enforcement Methods
Remediation Servers
Certificate Services and Storage Area Networks
Configuring Active Directory Certificate Services
Types of Certificate Authority
Certificate Services Role-Based Administration
Configuring Credential Roaming
Configuring Auto enrollment
Configuring Web Enrollment Support
Configuring Certificate Revocation Lists
Configuring an Online Responder for Certificate Services
Network Device Enrollment Service
Using Enterprise PKI to monitor CA Health
Planning the Deployment of Storage Area Networks
Logical Unit Numbers
VDS
Storage Manager For SANs
Multipath I/O
Storage Explorer

Clustering and High Availability
Understanding DNS Round Robin and Load Balancing
Plan Availability Strategies
DNS Round Robin
Configuring Windows Network Load Balancing
Windows Server 2008 Cluster Tools
Selecting Redundancy Strategies
Understanding Cluster Concepts
Configuring Failover Clustering
Backup and Recovery
Backing Up Data
Shadow Copies of Shared Folders
Windows Server Backup
The wbadmin Command-Line Tool
Backing Up Server Roles and Applications
Remotely Backing Up Computers
Further Considerations for Planning Backups
System Center Data Protection Manager
Backing Up Windows Server 2008
Disaster Recovery
Windows Server Backup Recovery Modes
Recovering Active Directory
Hyper-V and Disaster Recovery

Designing Security for Microsoft® Networks
Introduction to Designing Security
Introduction to Designing Security for Microsoft Networks
Contoso Pharmaceuticals: A Case Study
Creating a Plan for Network Security
Introduction to Security Policies
Defining a Process for Designing Security
Creating a Security Design Team
Planning a Security Framework
Identifying Threats to Network Security
Introduction to Security Threats
Predicting Threats to Security
Analyzing Security Risks
Introduction to Risk Management
Creating a Risk Management Plan
Creating a Security Design for Physical Resources
Determining Threats and Analyzing Risks to Physical Resources
Designing Security for Physical Resources
Creating a Security Design for Computers
Determining Threats and Analyzing Risks to Computers
Designing Security for Computers

Creating a Security Design for Accounts
Determining Threats and Analyzing Risks to Accounts
Designing Security for Accounts
Creating a Security Design for Authentication
Determining Threats and Analyzing Risks to Authentication
Designing Security for Authentication
Creating a Security Design for Data
Determining Threats and Analyzing Risks to Data
Designing Security for Data
Creating a Security Design for Data Transmission
Determining Threats and Analyzing Risks to Data Transmission
Designing Security for Data Transmission
Creating a Security Design for Network Perimeters
Determining Threats and Analyzing Risks to Network Perimeters
Designing Security for Network Perimeters
Designing Responses to Security Incidents
Introduction to Auditing and Incident Response
Designing an Audit Policy
Designing an Incident Response Procedure

5 comments: