Computer Fundamentals
Generation of Computer
Post Graduate Diploma in Computer hardware and Networking is Open to anyone with the Knowledge of English. This hands-on course is our recommended curriculum for those who want to upgrade, repair, maintain and troubleshoot computers. This course covers the full range of IBM and IBM-compatible systems. This is a preliminary course recommended for candidates wish to enter Network and System administration field.
Advanced Hardware and Networking Diploma is the course of Diploma Level Networking. The course provides a competitive edge for candidates in the IT world. Their technical skills include the ability to build a computer from scratch as well as computers and network configurations to optimize performance by implementing, managing and maintaining it. Course provides a cutting-edge domain for learners and allows them to build a machine from scratch.
After passing the course they can go for further Master’s Degree and then for research studies such as M.Phil. and Ph.D. They can have jobs mainly in professional, scientific and technical services, public administration and safety and financial and insurance services.
This skill-oriented course provides candidates with the necessary information to configure and manage OS Server, Networks, Router, L2/L3 Switch, Cloud Computing, Wireless & Security and equip them with the necessary skills to protect and recover computer systems & networks from various security threats.
Hardware and networking forms an integral part of IT sector. What is IT sector all about, you may ask. IT stands for Information Technology. This sector deals with storage, transmission, retrieval, processing and manipulation of data/information.
Computer Fundamentals, Computer Typing
Theory on Software, Hardware, Networking & Internetworking
Microsoft Windows Based Desktop Operating Systems
Microsoft Office Suit (Word, Excel, PowerPoint, Access)
Microsoft Office Suit (Outlook, Picture Manager, Project)
Productivity Product (Adobe Acrobat)
Connectivity (LAN, Wireless, Remote Access)
Internet (Browsing, E-Mail, Chat, Search Engines, download, Upload etc.)
Storage & Archive Services Scanning, Printing, Multimedia
Computer Fundamentals
Generation of Computer
MS-DOS Commands
Autoexec.bat & Config.sys
Working on Windows 98/XP
Conventional & Extended Memory
Types of Memory EDO, SDRAM, DDR, RAMBUS
Card and Connector Identification
Assembling a Latest PC
Installation of Windows 98/XP
Installation of Application Software
Start Menu
File Management
Configure using Control Panel
Adding and Removing the Drivers
Intro of MS-Word, Excel & Powerpoint
Start Menu
The Number System
Gates and Flip-Flop
Counter and Register
Microprocessor Basics (8088)
Microprocessor Internal Architecture
Bus Architecture (ISA, PCI, AGP etc.)
Support Chips (8284, 8288, 8237, 8259)
Intel 80386, 80486, Celeron, P-II, P-III,PIV
Non-Intel Processors (Cyrix, AMD)
Math Co-Processors
Advanced Motherboard Types
Magnetic Memory
Data Encoding Scheme
FDC and FDD
HDD Interfaces
FDISK and FORMAT
HDD Organization
Optical Storage (CD, DVD)
HDD Interfaces
Types of Viruses
Virus Infection and Prevention
Virus Scanning using Anti-Virus Software
Parallel and USB Port Basics
SPP/EPP/ECP
Interfacing devices to USB and Parallel Port
How Dot-Matrix, Inkjet & Laser Printer works
Loading the Drivers and enable print sharing
Serial Port RS-232 Signals
Internal and External Modem
Configuring Modem for Internet connection
How Laptops are like Desktop
How Laptops are different from Desktop
Docking Connecto
CMOS Setting
Operating System Troubleshooting
Hardware Troubleshooting
Client/Server
Peer-to-Peer
LAN - Local Area Network
CAN - Campus Area Network
MAN - Metropolitan Area Network
WAN - Wide Area Network
How Do We Make Connections?
What is a Protocol?
Introduction to Addressing
Wired Media - Twisted Pair, Coaxial, and Fiber Optic
What is the Plenum?
Common Connectors
Wiring Standards
LAN Technology Types - Ethernet
Standard Ethernet
Fast Ethernet
Gigabit Ethernet
10 Gigabit Ethernet
Wiring Distriburtion
What Does Topology Mean?
Bus, Star, Ring, Mesh, Hybrid,
WAN Technologies - Circuit and Pocket Switching
POTS, PSTN, T1/E1, and T3/E3
ISDN
SONET/OC-x
Frame Relay and ATM
MPLS - Multiprotocol Label Switching
DSL
Cable Modem, Satellite and Wireless
What is a VPN?
What is a VLAN?
Definition of a Protocol
Standards of Communication
What is the OSI Model?
Defining OSI Model Layers
How Data Travels Through OSI Model
Networking Hardware in OSI Model
TCP/IP Protocol Suite
What is TCP/IP (DARPA) Model?
Transport Layer Protocols
Internet Layer Protocols
Types of TCP/IP Communication
Working with IP Addresses
Planning an IP Addressing Scheme
Rules for IP Addressing
What is Classful IP Addressing?
Private vs. Public IP Addressing
What is NAT?
How Computers Get IP Addresses
Working with Binary Numbers
Converting Binary to Decimal and Vice Versa
Binary IP Addresses
Binary Subnet Masks
Internetworking - What is a Router?
What is a Default Gateway?
What is Subnetting?
Classful vs. Classless Interdomain Routing (CIDR)
Subnetting with CIDR & VLSM
CIDR Notation
FTP - File Transfer Protocol
TFTP - Trivial File Transfer Protocol
HTTP and HTTPS
NTP - Network Time Protocol
POP3 and IMAP4
SMTP - Simple Mail Transfer Protocol
DHCP - Dynamic Host Configuration Protocol
DNS - Domain Naming System
Telnet and SSH
SNMP - Simple Network Management Protocol
SIP and RTP
TLS - Transport Layer Security
Modem and NIC
Repeater and Hub
Bridge and Switch
Router
Different Types of Switches
Advanced Switch Funcionality
Firewall and Proxy Server
Wireless Access Point
Basic DHCP Server and DNS Server
CSU/DSU
Media Converters
Load Balancer and Bandwidth Shaper
Understanding Routing Tables
Adding and Deleting Routes
Static vs. Dynamic Routing
Routing Protocols
Distance Vector Protocols: RIP, RIPv2, and BGP
Link State Protocols: OSPF and IS-IS
Hybrid Routing Protocol: EIGRP
What is Convergence?
IGP vs. EGP
Benefits of Wireless Networking
Components of a Wireless Access Point
Where to Place a WAP
Wireless Networking Standards
RF Channels
How to Secure a Wireless Network
WEP - Wired Equivalency Privacy
WPA - Wi-Fi Protected Access
802.1x
Setting Up a Wireless Access Point
ipconfig/ifconfig/arp Utilities Overview
ping/arp ping Utilities Overview
tracert/traceroute Utilities Overview
mtr Utility Overview
netstat/nbstat/route Utilities Overview
nslookup/dig/host Utilities Overview
ipconfig Command
arp Command
ping Command
tracert Command
netstat Command
nslookup Command
Reasons for Network Performance Optimization
Quality of Service (QoS)
Traffic Shaping
Load Balancing
Fault Tolerance
RAID 0 - Disk Striping
RAID 1 - Disk Mirroring and Duplexing
RAID 5 - Disk Striping with Parity
Other Popular Forms of RAID
Caching Engines
Cable Strippers
Snips and Crimpers
Punch Down Tool
Cable Testers and Certifiers
Time Domain Reflectometer (TDR) and Optical Time Domain Reflectometer (OTDR)
Toner Probe
Voltage Event Recorder
Multimeter
Protocol Analyzer, Temperature Monitor, and Butt Set
Packet Sniffers
Port Scanners
Intrusion Detection Software (IDS) and Intrusion Prevention Software (IPS)
System, Event, and History Logs
Why is Documentation so Important?
What Should I Document?
Wiring Schematics
Physical and Logical Network Diagrams
Baseline
Network Policies
Network Procedures
Network Configuration
Regulations
The Process of Troubleshooting - Gather Information
Who is Affected?
What's Changed?
Why is This Happening?
Can I Handle It?
Process of Finding a Solution
Physical Issues
Logical Issues
Issues to Escalate
Wireless Issues
CMOS Setting
Operating System Troubleshooting
Hardware Troubleshooting
Firewalls
Other Security Devices
Network Access Security
Filtering
Tunneling and Encryption
User Authentication
Device Security
Common Security Threats
Your Instructor
Exam Prep Tips
What is A Network?
The OSI Model
The Data Transmission Process
The TCP/IP Model
Why Use Networking Models?
TCP And UDP - Part 1
TCP And UDP - Part 2
Ports
Sockets
Port Numbers
The Need For And Operation of CSMA/CD
Ethernet Types And Standards
Pins And Transmissions
Crosstalk
Cable Types
Ethernet Addressing
Intro to WAN Cabling and a Cable Type Review
Repeaters, Hubs and Bridges
Building the MAC Table
"Flood, Filter or Forward?"
Frame Processing Methods
Virtual LANs
Cisco Three-Layer Switching Model
Introduction to STP
Basic Switch Security
Port Security Defaults, Options and Configurations
Telnet and SSH
User, Enable and Privilege Modes
Enable Password vs. Enable Secret
"privilege level 15"
Physical Side of Cisco Switches
Assigning an IP Address and Default Gateway To The Switch
Speed, Duplex, and "Interface Range"
Banners, "logging synch", and "exec-timeout"
Keystroke Shortcuts and Manipulating History
IP Addressing and Binary Conversions
IP Address Classes
Private IP Address Ranges
Intro to the Routing Process
Keeping Subnets On One "Side" of the Router
One Destination, Two Destination Addresses
DNS and DHCP Process
The ARP Process
Routers, Broadcasts, and Proxy ARP
Configuring DHCP on a Cisco Router With SDM
ROM, RAM, NVRAM, And Flash
The Boot Process
Setup Mode
Startup And Running Configuration Files
The COPY Command
IOS Upgrading
The Configuration Register
Wireless Network Types
Standards and Ranges
Spread Spectrum
Antenna Types
CA vs. CD
SSIDs and MAC Address Authentication
WEP, WPA, and WPA2
"The Secret" (Of Binary Success, That Is)
Decimal > Binary, Binary > Decimal
Subnetting Basics
Calculating Number of Valid Subnets
Prefix Notification
Calculating Number of Valid Hosts
Calculating Number of Valid IP Addresses in a Given Subnet
Calculating the Subnet Number of a Given IP Address
Meeting Stated Design Requirements
Static Routing Theory and Labs
RIP Routing Theory and Labs
"show ip protocols", "show ip route rip", "debug ip rip", And More!
Physical Side of WANs
Directly Connecting Cisco Routers Via Serial Interfaces
HDLC and
Intro to Frame Relay
RFC 1918 Addresses, NAT and PAT
Intro to ATM
Modems and DSL Variations
Where to Begin
Cisco Discovery Protocol (CDP)
L1 and L2 Troubleshooting
LAN Troubleshooting
WAN Troubleshooting
Telnet and SSH Review and Maintenance Commands
Administrative Distance
Extended Ping and Traceroute
The Real Key to Troubleshooting
Firewalls and Proxy Servers
The Attacker's Arsenal
Intro to PIX, ASA, IDS, and IPS
Viruses, Worms, and Trojan Horses
Preventing Virus Attacks
One Final Cisco "Secret"
Your Instructor
CCNA Exam Paths
STP
Root Bridges, Root Ports, and Designated Ports
STP Timers and Port States
Portfast
VLANs and Trunking
Access and Trunk Port Comparison
VTP
"Router on a Stick"
RSTP and PVST
Etherchannels
HDLC vs. PPP
PPP Features
PAP and CHAP
Frame Relay Introduction
Frame Relay LMI Theory
Frame Relay Configs, DLCIs, Frame Maps, and Inverse ARP
Frame Sub-Interfaces3
Split Horizon
Frame Relay LMI Show, Debug, and Lab
FECN, BECN, DE bits
PVC Status Meanings
Static Routing Theory and Configuration
Distance Vector Protocol Behavior - Split Horizon and Route Poisoning
RIP Theory and Version Differences
The Joy of "show ip protocols"
RIP Limitations
RIP Timers
Floating Static Routes
IPv6 Theory and Introduction
Zero Compression and Leading Zero Compression
IPv6 Reserved Addresses
The Autoconfiguration Process
OSPF v3 Basics
Transition Strategies
NAT Theory and Introduction
Static NAT Configuration
Dynamic NAT Configuration
PAT Configuration
Introduction to EIGRP
Successors and Feasible Successors
EIGRP vs. RIPv2
Basic Configuration
Wildcard Masks
Load Sharing (Equal and Unequal-cost)
EIGRP, RIPv2, and Autosummarization
Passive vs. Active Routes
IPv6 Theory and Introduction
Zero Compression and Leading Zero Compression
IPv6 Reserved Addresses
The Autoconfiguration Process
OSPF v3 Basics
Transition Strategies
NAT Theory and Introduction
Static NAT Configuration
Dynamic NAT Configuration
PAT Configuration
Definitions and Tunneling Protocols
Data Encryption Technologies
Key Encryption Schemes
IPSec, AH and ESP
A VPN in Your Web Browser
ACL Login and the Implicit Deny
Standard ACLs and Remarks
"Host" and "Any"
The Order of the Lines
Extended ACLs
Named ACLs
Telnet Access, Placing ACLs, and Blocking Pings
Dynamic and Time-Based ACLs
Port Number Review
Route Summarization with RIP and EIGRP
About the Instructor
What's Covered in this Course
The Globomantics Scenario
What is Active Directory?
What is a Domain?
What is a Server Role?
What is DNS?
Building the Brain of the Globomantics Network
Hardware Requirements
Server 2008 Editions
Bare Metal Installation Process
Windows Server 2008 Installation
Initial Configuration Task List
Installation of ADDS
Administrator Passwords
Renaming Default-First-Site-Name
Setting Up a Second Domain Controller
Replication Testing
The DC’s Are Up and Running… Now What?
Renaming Vista Client Computer Name
Joining Vista Client to Globomantics Domain
Recording Transactions
Troubleshooting Connection Problem
Troubleshooting RPC Server Error
Why Remote Desktop is Just Great
Setting Up Remote Desktop Shortcut
The DC’s Are Up and Running – Now What? – Part 2
What’s an OU Again?
Creating an Organizational Unit
Deleting on OU
Creating User Accounts
Introducing DSADD
Creating Users Using a Script
Creating Users Using Excel
Creating Computer Accounts
Diff. Between OUs & Groups
Creating Groups in AD
Adding Users and Computers into Groups
Setting Up a Member Server
File Server Partitions
Creating Shared Folders
Share Level Permissions
Using Share and Storage Management MMC
Using Windows Explorer to Create Shared Folders
Testing Shared Folders
Groups and Permissions: Good Idea that Could Go Very Wrong
Making a Group a Member of Another Group
Share Level vs. NTFS
What is Inheritance
Creating NTFS Permissions
Checking NTFS Permissions
Rules for Share Level and NTFS Permissions
Moving Folders
Mapping a Shared Drive
Checking Group Memberships
Creating and Sharing Printers
Adding a Printer
What Globomantics.com Looks Like Now
Group Policy Objects
Group Policy Management Console
Default Domain Policy
Local Vs. Domain Policy
Configuring Domain Level Policy
Linking GPOs
GPO’s Processing Order
Setting Up Coach’s Favorite Four Policies
Desktop Wallpaper Policy
Preventing Users from Installing Software
Removable Storage Policy
Testing Our Policies
A Little Reorganization: Option 1, 2 or 3?
Using a Combination of Techniques
Reorganizing Users & Computers
Running “gpupdate” Command
Checking DCs Replication
Testing Our Reorganized Active Directory
Quick Review of Our Network
Policy Settings to Computer Lockdown
Reorganizing Computer OUs
Creating Computer GPOs
Loopback Processing
Group Policy Intervals
Testing Computer GPOs
Mapping Network Drives with Preferences
Testing Preferences – Mapped Drives
You are Here: a Quick Look at What We’ve Built
Options for Installing Software
What You Need for a Software Installing GPO
Steps for Creating GPO for Software Installation
Creating a Shared Folder for Foxit.msi Package
Creating and Linking a New GPO to the NYComputers OU
Testing Our New GPO Software Installation
Default Domain Policy Settings
The Default Domain Password Policy
Account Lockout Policy
Letting Your Boss Use Whatever Password He/She Wants
Password Management
Server 2008 Functional Level
Giving Someone Else the Ability to Reset Passwords
Additional Built-In Groups in OUs
Delegation of Control Wizard
Additional Built-In Groups Demo
Installing RSAT to a Vista Client for Easy Server Management
Configuring RSAT for Vista
Prevention
WBADMIN – Stronger Tools and More Options
NTDSUTIL – Super-Powered Utility for Lots of Operations
The Globomantics Backup Strategy
Installing Windows Server Backup on DC2
Windows Server Backup Setup and Configuration
Selecting Backup Once Wizard
System State Backup with WBADMIN
Creating Install for Media (IFM) Media
A Little Future Planning to Prevent Major Problems
What Are Operations Masters?
Restructuring the Globomantics DCs a Bit
Moving PDC Emulator and RID to DC2
Building DC3 with IFM Media
Verifying DC3 Configuration
Quick Review of Our Network
Policy Settings to Computer Lockdown
Reorganizing Computer OUs
Creating Computer GPOs
Loopback Processing
Group Policy Intervals
Testing Computer GPOs
Mapping Network Drives with Preferences
Testing Preferences – Mapped Drives
Before We Begin
Creating Chicago Site in AD
Creating Subnet for Chicago Office
Installing Domain Controller for Chicago
Configuring Replication
Time for Some More Users!
Organizing Users into Groups
The Types of Groups
Setting Up Your Groups for Access Between Domains
AGUDLP Setup
Checking Our Settings
Making Sure Your Users Can Log in Anywhere in Your Enterprise
Turning on Universal Group Membership Cashing
Dallas OU and Site Structure
What is a Read-Only Domain Controller?
Building RODC for Dallas
Server Core Installation
Running dcpormo on Server Coreli>
Verifying Our Installation
Configuring RODC
Setting Up Users
What We’ve Built so Far…
The Two Types of Restorations
Authoritative Restore
Checking Our Recovery Files and Objects
How to Put Resurrected Users Back Into Groups Using Backlinks?
Seizing Operations Masters for Quick Restoration of Functionality
Possible Solutions for Restoring Domain Controllers
Hank Just Bought a Company … in Tokyo!
Advantages of the Server 2008 Domain Functional Level
The Upgrade Process
Preparing Tokyo DC for Upgrade
Upgrading Tokyo DC to Windows Server 2008
Our Two Options to Connect Tokyo and New Yorkli>
What You Need for a Trust
Trust Directions
The Globomantics/Verde Petra Solution: Trusts
Creating a Stub Zone
Raising Forest Functional Level
Creating Trusts
Checking and Updating User Permissions
The New Generation of Server 2008 Certifications
The Upgrade Paths for MCSA’s/MCSE’s
How to Sign Up for a Microsoft Exam
70-640 Exam Prep Tips
A Quick Overview of DNS
What are DNS Zones Really?
The Different Kinds of DNS Records
Forward Lookup Zones
Reverse Lookup Zones
Conditional Forwarders
Forwarders and Root Hints
Global Name Zones
Let’s Talk Security
Keys and Certificates
Your Certificate Has Been Revoked
What is AD LDS?
What Might it Look Like on a Network?
What is an Instance of AD LDS?
What is Rights Management?
Some Additional Notes About RMS
About the Instructor
What's Covered in this Course
The Globomantics Scenario
What You Will Need
Introduction to DHCP
How Does DHCP Work
How to Configuring DHCP in Windows Server 2008?
Authorizing DHCP
Creating Scopes
Configuring Scope Options
Address Leases
Reservations
Using DHCP in a Routed Network
How Does DHCP Relay Agent Work?
How to Configuring a DHCP Relay Agent in Windows Server 2008
Add and Remove Bindings
Location of Database
Backup & Restore
DHCP Service
DHCP Management Permissions
Statistics
Scope Reconciliation
Audit Logging
Conflict Detection
Integration with DNS and NAP
Performance Counters
What is a Router?
How to Use Server 2008 as a Router
Routing Table
Adding Static Entry to a Routing Table
Inbound and Outbound Filters
Static vs. Dynamic Routing
Dynamic Routing Protocols: RIP & OSPF
How RIP Works in Server 2008
Introduction to DNS
Installing the DNS Server Role in Windows Server 2008
What is a Domain Namespace?
What is a DNS Query?
How Queries Work
What is a Forwarder?
Setting Up Standard DNS Forwarders in Windows Server 2008
Setting Up Conditional DNS Forwarders in Windows Server 2008
How Caching Works
Clearing the DNS Cache
What is a DNS Zone?
Zone Types
Stub Zones
Active Directory Integrated Zones
Forward and Reverse Lookup
Dynamic Updates
Configuring a DNS Zone
Creating Stub Zones
DNS Records
DNS Zone Transfers
Configuring Resource Records and Zone Transfers
Zone Transfer Issues
What is Time to Live? (TTL)
What is Aging and Scavenging?
Setting the TTL Value and the Aging and Scavenging Parameters
Testing DNS Queries
nslookup
dnscommand
Performance Monitor
DNS Event Logs
DNS Debug Logging
What are Host and NetBIOS Names?
How Are Names Resolved?
Hosts & LMHosts Files / DNS & WINS Servers
DNS & WINS Servers
hostname & nbtstat Commands
Client Configuration
Troubleshooting Name Resolution
DNS Cache and Host File
GlobalNames Zone
WINS Lookup and GlobalNames Zone Demo
NTFS Permissions
Assigning NTFS Permission
Special NTFS Permissions
Inheritable Permissions
Examples - Effective User Permissions
Creating Users & Groups
Demo - Effective User Permissions
Encrypting File System (EFS)
Cryptography
Public Key Encryption
How Does EFS Work?
Enabling EFS
Sharing Folders
Installing File Service Role
Sharing Using Provision a Share Folder Wizard
Accessing Shared Folder
Disk Quotas
Setting Disk Quotas Using Group Policy
Quota Management Utility
Offline Files
Distributed File System (DFS)
Creating Replica on a Different Server
Raising Domain & Forest Functional Level
Installing a Printer
Sharing a Printer
Installing Print Services Role
Using Print Management Snap-In
Configuring Print Permissions
Printer Priorities and Scheduling
Printer Pooling
Setting Up Printer Pooling on Server 2008
Managing Drivers
Troubleshooting Printers
Restarting Printer Spooler Service
What Is WSUS?
Why Use WSUS?
Installing Necessary Services
Downloading and Installing WSUS
Configuring WSUS Server Options
Computer Groups and Server-Side Targeting
Using Group Policy and Client-Side Targeting
How to Approve Updates
How to Configure the Shadow Copy Service
Recovering Data Using Shadow Copy
Installing the Windows Server Backup Feature
Creating a Backup Volume
Scheduling Backups
Recovering Data
Complete System Recovery
Additional Backup Tips
Task Manager
Event Viewer
Performance Monitor
Reliability Monitor
Data Collector Sets
Installing the RRAS Component
Configuring RRAS
How to Configure a Client to Connect
Making a Connection
Manually Controlling Connections
Creating a Network Policy
Network Policy Order
Testing Our New Network Policy
Configuring RRAS - True VPN Setup
What is RADIUS?
Is Wireless Good or Bad?
Wireless Networking Standards
Wireless Security (Maybe)
Connecting to a Wireless Network
Setting Up Security on a Router
Why Do We Need a Firewall?
Windows Firewall in Server 2008
Firewall Profiles
Creating a New Firewall Rule
Creating a Program Outbound Rule
Configuring with Group Policy
What is IPSec?
IPSec Protocols
Tunnel Mode vs. Transport Mode
Authentication Methods
Configuring IPSec in Server 2008
Creating New IPSec Policy
Getting IPSec to Work
Using Connection Security Rules
What is NAP?
NAP Enforcement Types
System Health Agents (SHAs) and System Health Validators (SHVs)
Health Requirement Policies
Installing Necessary Roles: DHCP Role and Network Policy and Access Services Role
Installing and Configuring NAP: DHCP Enforcement
NAP Client Configuration
Testing Our Client for NAP Enforcement
The New Generation of Server 2008 Certifications
The Upgrade Paths for MCSA’s/MCSE’s
How to Sign Up for a Microsoft Exam
70-642 Exam Prep Tips
Windows Server 2008 Versions
Standard Edition
Enterprise Edition
Datacenter Edition
Windows Web Server 2008
Itanium-Based Systems
Installing Windows Server 2008 from Scratch
Initial Configuration Tasks (ICT)
Downloading and Installing Updates
Adding Active Directory Role
Creating Active Directory Domain Controller
Finishing Up ICT List
Server Manager Overview
Globomantics Network Diagram
Upgrading Server 2003 to Server 2008
Getting Ready for WDS
Installing DHCP Role
Installing WDS Role
Configuring WDS
Adding Image to WDS
WDS Properties
Setting Up Multicast Transmission
Deploying Using Multicast Transmission
Finishing Up Deployment Manually
Installing Automated Installation Kit (AIK)
Creating an Answer File with Windows System Image Master (SIM) Tool
Running Unattended Installation
Where to get Windows AIK
What is Server Core?
When Should I Use Server Core?
Globomantics Scenario
Installing Windows Server 2008 Server Core
Installing Core Configurator Utility
Setting Up Windows Server Core with Core Configurator
Remote Management
Downloading and Installing RSAT
Setting Up RSAT
Setting Up Secondary DNS Server on Server Core
Remote Desktop Management
RODC Benefits
Globomantics Network
Installing Read Only Domain Controller (RODC)
Testing Replication Between a DC and RODC
Configuring a Password Replication Policy
Administrative Role Separation
What is Virtualization?
Benefits of Using Virtualization
Virtualization Products
Virtualization Examples
Potential Issues
Active Directory Review
Globomantics Network - Logical Structure
Active Directory Objects
Active Directory – Trusts
What is a GPO?
Globomantics Scenario
Group Policy Management Tool - Create and Link GPOs
Edit “Block Removable Device Installation” GPO Settings
Edit “Disable Add/Remove Programs” GPO Settings
Edit “Create Shortcut” GPO Settings
Starter GPOs
How Do GPOs Get Applied?
Exception to the Rules
Globomantics Scenario
Enforced and Security Filtering
Block Inheritance
Group Policy Modeling and Results Wizards
Password Setting Objects (PSO)
Different Types of Permissions
Configuring Permissions
Globomantics Scenario
Setting Permissions in Active Directory
Delegation of Control Wizard
Creating Custom MMC
Globomantics Scenario
Installing File Services Role
NTFS File and Folder Permissions
What are Inherited Permissions?
Folder Redirection Steps
Setting up Disk Quotas
Using File Server Resource Manager to Setup Disk Quotas
Checking Redirection Settings
Installing Print Services Role
Installing and Sharing a Printer
Printer Permissions
Installing Printer on a Client
Troubleshooting Printers
NTFS Permissions Review – AGDLP
Globomantics Scenario
Creating a Share
Managing Permissions to Share a Folder
Testing Our Share on a Client Machine
Configuring Caching
Accessing a Shared Folder Offline
Installing DFS Role Service and Creating a DFS Namespace
Accessing DFS Share
Configuring DFS Replication
Testing Replication
DFS Management - Configuring Fault Tolerance
Testing Fault Tolerance
What is a VPN?
Supported Authentication Protocols
Choosing a VPN Protocol
Globomantics Scenario
Installing Remote Access Service
Configuring Routing & Remote Access Server to Support VPN Connectivity
DHCP Relay Agent Setupli>
Configuring DHCP Options
Authentication Protocols
Creating VPN Connection for a Client
Managing VPN Users
What is a RADIUS?
Globomantics Scenario
Installing Network Policy Server (NPS) Role
Configuring NPS Server as RADIUS Server
Configuring Remote Access Server as RADIUS Client
Creating a Network Policy
Testing the Network Policy
What is WSUS?
Why us WSUS?
Where Can I Get WSUS?
Single Server
Independent
Autonomous Mode
Replica Mode
Disconnected
Globomantics Scenario
Preparing Server for WSUS Installation
Downloading & Installing WSUS
Configuring WSUS in New York Office
Downloading, Installing & Configuring WSUS in Chicago Office
WSUS Install Problem in Dallas Office
Configuring Computer Groups - Client-Site Targeting
Configuring Clients Using Group Policy
Approving Updates
Configuring WSUS in Tokyo Office in Replica Mode
What is a Certificate?
What is a Certificate Authority (CA)?
What are the Different Types of CAs?
Creating a CA Hierarchy
How Do I Get a Certificate?
What is Credential Roaming?
What is a Certificate Revocation List (CRL)?
What is an Online Responder?
Installing Active Directory Certificate Services Role
Certification Authority Overview
Managing Certification Authority Services
Process of Setting Up Online Responder
Configuring Shadow Copy Service
Picking a Storage Location
Setting Up the Schedule
Manual Shadow Copy
Using Shadow Copy - Restoring Previous Versions
Installing Windows Server Backup Feature
Backup Once Wizard - Creating Backup of a Volume
Setting Up Backup Scheduleli>
Recovering Individual Files
Recovering a Complete Volume
Recovering Operating System
Additional Backup Tips
What is Terminal Services?
Additional Role Services
Globomantics Scenario
Installing TS Role with TS Gateway, TS Web Access, and TS Session
Broker on First Server
Finishing Up Role Installation
Extra Step For TS Role Installation on a Domain Controller
Configuring Session Rules for Terminal Servers on User-By-User Basis
Configuring Session Rules for Terminal Servers with Session Time
Limits in Group Policy
Configuring Session Rules for Terminal Servers in Terminal Services
Configuration Window
Configuring Maximum Connections to Terminal Server
Configuring TS Session Broker
Installing TS Role on a Second Server
Installing Office on First Terminal Server
Adding the Second Terminal Server to the Farm
Installing Office on Second Terminal Server
Connecting to SALES_TS_FARM from Client Computer
Upgrading Remote Desktop Connection Utility on Windows XP Client
Connecting to Terminal Server Using Web Access
Deploying Application Using RemoteAppli>
Testing RemoteApp from a Client Computer
What Does High Availability Mean?
DNS Round Robin
Network Load Balancing (NLB)
Failover Clustering
Using RAID
Working with SANs
Quorum Models
New Alphabet Soup for Everyone!
What You Need to Take for Each Credential
Upgrade Paths for MCSAs/MCSEs
How to Sign Up for a Microsoft Exam
70-646 Exam Prep Tips
Additional Exam Prep Tips
Our Scenario
New Hyper-V Machine Configuration
Creating a New Single Volume
Installing Hyper-V Role
Creating a New Hyper-V Machineli>
Virtual Machine Connection Window Buttons
Installing Virtual Windows 2008
Installing Virtualization Extensions
About Your Instructor
About the Course
How to Use the Course
Scenario Network Configuration
Lab Overview
Globomantics’ Regulatory Compliance, Security and Budgetary Concerns
Globmantics’ Office Structure, Technology Challenges and Needs
Windows 7 Project Plan
User Interface Enhancements
BranchCache
DirectAccess
BitLocker and BitLocker To Go
AppLocker
Windows XP Mode
Improved Power Management
32-bit vs. 64-bit
Editions Comparison Matrix
Identifying Windows 7 Requirements
Running the Windows 7 Upgrade Advisor Tool
Upgrade and Migration Limitations
Windows 7 Installation Options and Types
Performing a Clean Installation of Windows 7
Upgrading Windows Vista to Windows 7
Dual Booting Windows 7
Windows XP to Windows 7 Dual Boot Walkthrough
Migrating User Profiles and Data to Windows 7
Windows 7 Deployment Enhancements
Deployment Types, Thick vs. Thin Images and Deployment Tools and Options
Capture and Deployment Process Overview and Prerequisites
Building and Validating the Answer File
Building and Generalizing the Reference Installation
Creating Bootable Windows PE Media
Capturing the Reference Image and Saving to a Network Share
Deploying to a Target Computer via Network Share
User State Migration Tool and Automated Installation
Using Device Manager
Using the System Information Utility
Understanding Drivers and Installation Methods
Managing Device and Driver Security
Updating and Rolling Back Drivers
The Driver Verifier Utility
Managing Hardware Installation Policies with Group Policy
Adding Device Drivers to the Driver Store
Monitoring USB Devices
Deconstructing Basic Disks
Master Boot Record vs. GUID Partition Table Disks
Understanding Dynamic Disks
Dynamic Disk Volume Types
Managing Storage Volumes
Creating Storage Volumes with the Disk Management Tool
Checking Disks for Errors and Defragmenting Disks
Managing Network Connections
Managing Wireless Networks in Windows 7
TCP/IP Recap
Configuring TCP/IP Settings
IP Addressing
IPv6 Recap
Managing TCP/IP Settings fromn the Command Line
Configuring Network Adapters
Configuring Internet Connection Sharing
Troubleshooting Network Connectivity
Network Profiles / Network Location Awareness
Windows Firewall Purpose and Capabilities
Allowing New Programs Access
Configuring Firewall Notification Settings and Resetting Firewall Defaults
Remote Desktop
Remote Assistance
Windows Remote Management Service (WinRM)
WinRM and PowerShell
Deconstructing Basic Disks
Master Boot Record vs. GUID Partition Table Disks
Understanding Dynamic Disks
Dynamic Disk Volume Types
Managing Storage Volumes
Creating Storage Volumes with the Disk Management Tool
Checking Disks for Errors and Defragmenting Disks
Using Offline Files
Managing File Versions with Sync Center
Transparent Caching
Configuring Local Power Settings and Policies
Creating, Exporting and Importing Power Plans
Location Aware Printing
An Overview of Updates
Configuring Important Update Settings
Reviewing Update History
Deciding Which Updates to Install
Uninstalling Updates
Using the Microsoft Baseline Security Analyzer
Using Group Policy to Configure Updates
WSUS and Windows Updates
Program Compatibility Assistant
Program Compatibility Properties
Application Compatibility Toolkit
Using Windows XP Mode
Installing Windows XP Mode and Running Virtual Applications
Configuring Software Restriction Policies
Creating Rules with Software Restriction Policies
Using AppLocker
Implementing AppLocker Rules
Compatibility Mode
Configuring IE Security Settings
Managing IE Add-ons and Search Providers
Managing IE’s InPrivate Browsing and InPrivate Filtering
About IE’s SmartScreen Filter
IE’s Pop-Up Blocker
Managing IE Certificates
Changing File and Folder Permissions
Understanding NTFS Permissions
Assigning NTFS Permissions
Understanding Effective Permissions
Permissions Impact: Copying and Moving Files
Encrypting Files and Folders Using EFS
BitLocker To Go
Full Disk Encryption Using BitLocker
Configuring and Managing BitLocker Drive Encryption
Using the BitLocker PIN Option
Resource Sharing Overview
Basic vs. Advanced Sharing
Understanding Share vs. NTFS Permissions
Offline Folder Caching
Sharing Folders
Sharing Printers and Managing Print Queues
Windows 7 Libraries
Configuring HomeGroup
DirectAccess Features, Requirements and Connection Methods
Configuring DirectAccess with Group Policy
Configuring DirectAccess from the Command Line
Enabling VPN-Based Remote Access
VPN Authentication Mechanisms
Windows 7 VPN Connections
Understanding BranchCache
BranchCache Operating Modes
Managing BranchCache with Group Policy
Managing BranchCache with Netsh
Monitoring BranchCache
Performing Information and Tools
Configuring Event Logging
Saving and Exporting Log Files
Centralizing Event Logs
Using Performance Monitor
Data Collector Sets
Customizing Built-In Data Collector Sets to Troubleshoot Specific Issues
Creating a New Data Collector Set
Task Manager
Resource Monitor
Reliability Monitor
A Sample WMI Script
Changing Graphics Settings
Configuring Virtual Memory
Understanding Write Caching
Optimizing Processes with Task Manager
Managing Processor Scheduling Settings
Optimizing Services
Using Msconfig to Boost Performance
Windows 7’s Backup and Restore Utility
Configuring Windows Backup
Restoring Files from a Backup
Creating and Restoring System Images
Creating a System Repair Disk
Creating and Using System Restore Points
Understanding Advanced Boot Options
Understanding Last Known Good Configuration
The Candidate Profile
Skills Being Measured
Objective to Lesson Mapping
Study Recommendations and Exam Prep Tips
Credit Toward Certification
Where You Started
What You’ve Accomplished
My Favorite Suporting Resources
We Value Your Opinion
About Your Instructor
What's Covered in this Course
Hardware
A Quick Refresher on Virtualization
Licensing and Versions
Candidates for Virtualization
Your Virtualization Migration Tools
Running sysprep and Capturing Image
Creating New Hyper-V Machine
Windows Setup Wizard
Globomantics Virtualization Plan
How To "Plant" A Forest
Domains and Trees In The Forest
To Upgrade or Not To Upgrade?
Sites: Yet Another Thing to Deal With
Globomantics AD Structure Stateside
What Are Trusts
The Types of Trusts
Rules of Engagement
Verdepetra.com Buyout Plan
Creating Forest Trust
Organizational Units and Groups
AGUDLP
Configuring AGUDLP
Shadow Group
Group Policy
Starter Policies
Group Policy Preferences
Fine Grained Password Policies
Creating Fine Grained Password Policy
NTDSUTIL
Creating Install from Media (IFM) Backup
Tombstone Lifetime
How to Seize Operations Master from a Dead Domain Controller
Seizing a Role
New Features in DNS
To Integrate into AD or Not to Integrate
Conditional Forwarders vs. Stub Zones
Who WINS Nowadays?
Creating GlobalNames Zones
IPv6 Basic Configuration
Introduction to Public Key Infrastructure
The Root Authority
Subordinate Servers
Revocation Lists – the CRL
The Online Responder
Versions and CA Role Services
Globomantics Scenario
Installing Enterprise Root Authority
Managing PKI
Creating Domain Certificate
Requesting Certificates
Remote App vs. Remote Destop
On the Go with Web Access
Implementing TS Server
TS Remote Apps Manager Overview
Getting Out of the Office with TS Gateway
Keeping Your Users Happy with High Availability
Creating a Capture Boot Image
Running sysprep on TS1
Capturing the Image on TS1
Creating a Brand New Server
Deploying Images Using Deployment Services
Installing TS Session Broker
Share Your Stuff Safely with Rights Management
Get Your Stuff Out There with DFS
Installing DFS Role Service
Utilizing DFS – Creating Replication Group
GloboFilesGroup Actions Overview
Testing Replication
Publishing Points
Creating a Namespace
Combining DFS and RMS
Failover Clustering
Quorum Disk
Network Load Balancing
Globomantics Scenario
Installing Network Load Balancing Feature
Creating a New Cluster
Adding DNS Entry for Our Cluster
Adding Machines to a Cluster
Verifying that Network Load Balancing is Working
Creating Single Name Resolution with GlobalNames
Where Would an RODC Go?
How To Install a Full RODC
Drawbacks to RODCs
Installing RODC
Verifying Installation
Taking a Look at Answer File
Full RODC or Server Core?
Branch Office Stuff You Need to Know
Three Update Methods
Windows Server Update Services – WSUS
Managing WSUS
Downloading and Installing WSUS
Configuring WSUS Server
Adding Computers to WSUS Server
Configuring Group Policy
Approving Security Updates on WSUS
Running Updates on Vista Client
WSUS Administrator Group
System Center
BitLocker
Security Configuration Wizard Overview
Running Security Configuration Wizard
Locating the Policy on Hard Drive
Baseline Security Analyzer
Networks that You Have to Plan for
NPS and RADIUS: Not Just for Dial–Up Anymore
Network Access Policy – NAP
Methods for NAP Enforcement