Active Directory Services with Windows Server 2012 Online Training

Active Directory Services with Windows Server 2012 Online Training

0 STUDENTS ENROLLED

    In this Onsite course, you will learn how to better manage and protect data access and information, simplify deployment and management of your identity infrastructure, and provide more secure access to data. You will learn how to configure some of the key features in Active Directory such as Active Directory Domain Services (AD DS), Group Policy, Dynamic Access Control (DAC), Work Folders, Work Place Join, Certificate Services, and Rights Management Services (RMS). This course incorporates materials from the Official Microsoft Learning Product 10969: Active Directory Services with Windows Server.

    Prerequisites

    • Basic understanding of networking
    • Intermediate understanding of network operating systems
    • Basic knowledge of server hardware
    • Experience creating objects in Active Directory
    • Concepts of backup and recovery in a Windows Server environment

    Introduction to Active Directory Domain Services (AD DS)

    • Active Directory, Identity, and Access
    • Active Directory Components and Concepts
    • Install AD DS

    Administering Active Directory Securely and Efficiently

    • Work with Active Directory Administration Tools
    • Custom Consoles and Least Privilege
    • Find Objects in Active Directory
    • Use Windows PowerShell to Administer Active Directory

    Managing Users and Service Accounts

    • Create and Administer User Accounts
    • Configure User Object Attributes
    • Automate User Account Creation
    • Create and Configure Managed Service Accounts

    Managing Groups

    • Administer Groups
    • Best Practices for Group Management

    Managing Computer Accounts

    • Create Computers and Join the Domain
    • Administer Computer Objects and Accounts
    • Perform an Office Domain Join

    Implementing a Group Policy Infrastructure

    • Understand Group Policy
    • Implement Group Policy Objects (GPOs)
    • Manage Group Policy Scope
    • Group Policy Processing
    • Troubleshoot Policy Application

    Managing User Desktop with Group Policy

    • Implement Administrative Templates
    • Configure Group Policy Preferences
    • Manage Software with GPSI

    Managing Enterprise Security and Configuration with Group Policy Settings

    • Manage Group Membership by Using Group Policy Settings
    • Manage Security Settings
    • Auditing
    • Software Restriction Policy and AppLocker

    Securing Administration

    • Delegate Administrative Permissions
    • Audit Active Directory Administration

    Improving the Security of Authentication in an AD DS Domain

    • Configure Password and Lockout Policies
    • Audit Authentication
    • Configure Read-Only Domain Controllers

    Configuring Domain Name System (DNS)

    • Install and Configure DNS Server in an AD DS Domain
    • Integration of AD DS, DNS, and Windows
    • Advanced DNS Configuration and Administration

    Administering AD DS Domain Controllers

    • Domain Controller Installation Options
    • Install a Server Core DC
    • Manage Operations Masters
    • Configure DFS Replication of SYSVOL

    Managing Sites and Active Directory Replication

    • Configure Sites and Subnets
    • Configure Replication

    Directory Service Continuity

    • Monitor Active Directory
    • Manage the Active Directory Database
    • Active Directory Recycle Bin
    • Back Up and Restore AD DS and Domain Controllers

    Managing Multiple Domains and Forests

    • Configure Domain and Forest Functional Levels
    • Manage Multiple Domains and Trust Relationships
    • Move Objects between Domains and Forests

    Install an AD DS DC to Create a Single Domain Forest

    • Perform Post-Installation Configuration Tasks
    • Install a New Windows Server 2008 Forest with the Windows Interface
    • Raise Domain and Forest Functional Levels

    Administer Active Directory Using Administrative Tools

    • Perform Administrative Tasks by Using Administrative Tools
    • Create a Custom Active Directory Administrative Console
    • Perform Administrative Tasks with Least Privilege, Run as Administrator, and User Account Control

    Find Objects in Active Directory

    • Using Saved Queries

    Use PowerShell to Administer Active Directory

    reate and Administer User Accounts

    • Create User Accounts
    • Administer User Accounts

    Configure User Object Attributes

    • Examine User Object Attributes
    • Manage User Object Attributes
    • Create Users from a Template

    Automate User Account Creation

    • Export and Import Users with CSVDE
    • Import Users with LDIFDE
    • Import Users by Using Windows PowerShell

    Create and Administer Managed Service Accounts

    Administer Groups

    • Implement Role-Based Management Using Groups

    Best Practices for Group Management

    • Implement Best Practices for Group Management

    Create Computers and Join the Domain

    • Join a Computer to the Domain with the Windows Interface
    • Securing Computer Joins
    • Managing Computer Account Creation

    Administer Computer Objects and Accounts

    • Administer Computer Objects Throughout Their Lifecycle
    • Administer and Troubleshoot Computer Accounts

    Configure an Offline Domain Join

    Implement Group Policy

    • Create, Edit, and Link GPOs
    • Use Filtering and Commenting

    Manage Group Policy Scope

    • Configure GPO Scope with Links
    • Configure GPO Scope with Filtering
    • Configure Loopback Processing

    Troubleshoot Policy Application

    • Perform RSoP Analysis
    • Using the Group Policy Results Wizard
    • View Policy Events

    Manage Administrative Templates and Central Store

    Manage Group Policy Preferences

    • Configure Group Policy Preferences
    • Verify the Application of the Group Policy Preferences

    Manage Software with GPSI

    • Deploy Software with GPSI
    • Upgrade Applications with GPSI

    Using Group Policy to Manage Group Membership

    • Configure the Membership of Administrators by Using Restricted Group Policies

    Manage Security Settings

    • Manage Local Security Settings
    • Create a Security Template
    • Use the Security Configuration Wizard

    Audit File System Access

    • Configure Permissions and Audit Settings
    • Configure Audit Policy
    • Examine Audit Events

    Configure Application Control Policies

    Delegate Administration

    • Delegate Permission to Create and Support User Accounts
    • View Delegated Permissions
    • Remove and Reset Permissions

    Audit Active Directory Changes

    • Audit Changes to Active Directory using Default Audit Policy
    • Audit Changes to Active Directory using Directory Service Changes Auditing

    Configure Password and Account Lockout Policies

    • Configure the Domain’s Password and Lockout Policies
    • Configure Fine-Grained Password Policy

    Audit Authentication

    Configure Read-Only Domain Controllers (RODCs)

    • Install RODC
    • Configure Password Replication Policy
    • Manage Credential Caching

    Installing the DNS Service

    • Add the DNS Server Role
    • Configure Forward Lookup Zones and Resource Records

    Advanced Configuration of DNS

    • Enable Scavenging of DNS Zones
    • Create Reverse Lookup Zones
    • Explore Domain Controller Location
    • Configure Name Resolution for External Domains

    Install Domain Controllers

    • Create an Additional DC with the AD DS Installation Wizard
    • Add a Domain Controller from the Command Line
    • Remove a Domain Controller
    • Create a Domain Controller from Installation Media

    Install a Server Core DC

    • Perform Post-Installation Configuration on Server Core
    • Create a Domain Controller with Server Core

    Transfer Operations Master Roles

    • Identify Operations Masters
    • Transfer Roles

    Configure the Global Catalog and Universal Membership Caching

    • Configure a Global Catalog
    • Configure Universal Group Membership

    Configure DFS-R Replication of SYSVOL

    • Observe the Replication of SYSVOL
    • Prepare to Migrate to DFS-R
    • Migrate SYSVOL Replication to DFS-R
    • Verify DFS-R Replication of SYSVOL

    Write a Review

    Your email address will not be published. Required fields are marked *

    Our trainers have relevant experience in implementing real-time solutions on different queries related to different topics. keen Technologies also verifies their technical background and expertise.

    We record each LIVE class session you undergo through and we will share the recordings of each session/class.

    If you have any queries you can contact our 24/7 dedicated support to raise a ticket. We provide you email support and solution to your queries. If the query is not resolved by email we can arrange for a one-on-one session with our trainers.

    You will work on real world projects wherein you can apply your knowledge and skills that you acquired through our training. We have multiple projects that thoroughly test your skills and knowledge of various aspect and components making you perfectly industry-ready.

    Our Trainers will provide the Environment/Server Access to the students and we ensure practical real-time experience and training by providing all the utilities required for the in-depth understanding of the course.

    If you are enrolled in classes and/or have paid fees, but want to cancel the registration for certain reason, it can be attained within 48 hours of initial registration. Please make a note that refunds will be processed within 30 days of prior request.

    The Training itself is Real-time Project Oriented.

    Yes. All the training sessions are LIVE Online Streaming using either through WebEx or GoToMeeting, thus promoting one-on-one trainer student Interaction.

    There are some Group discounts available if the participants are more than 2.

    As we are one of the leading providers of Online training, We have customers from USA, UK, Canada, Australia, India and other parts of the world.

    Course Reviews

    N.A

    ratings
    • 5 stars0
    • 4 stars0
    • 3 stars0
    • 2 stars0
    • 1 stars0

    No Reviews found for this course.

    PRIVATE COURSE
    • PRIVATE
    • 5 days
    Contact Us

    +1 475-212-0075

    Drop us a query

    Job Support

    Course Features

    Live Instructor-led Classes

    This isn't canned learning. Its dynamic, its interactive, its effective

    Expert Educators

    Only the best or they're out. We are constantly evaluating our trainers

    24&7 Support

    We never sleep. Need something answered at 3 am? No Problem

    Flexible Schedule

    You don't learn as per our calendar. We work according to yours.

    Customized Training's

    The most part self-managed and adaptable to suit a person's particular adapting technology needs

    Priority Based Training's

    Real-time Scenario based Assignments and Case Studies

    Disclaimer

    This web site or keentechnologies.com team is not associated with SAP AG or any other product. We are providing this service absolutely for Education and Training purpose only. We charge for the support services only, not for the actual SAP System access. Keen Technologies does not provide official SAP training courses or certifications and does not provide any access to SAP software. SAP and its product names, including HANA, S/4HANA, HYBRIS, and LEONARDO are trademarks or registered trademarks of SAP in Germany and other countries.

    Keen Technologies does not provide official SAP training courses or certifications and does not provide any access to SAP software. SAP and its product names, including HANA, S/4HANA, HYBRIS, and LEONARDO are trademarks or registered trademarks of SAP in Germany and other countries.

    IBM® is a registered trademark of IBM in the United States.

    Popular Courses

    Countries

    Keen Technologies offering training in cities: Bangalore, Hyderabad, Chennai, Delhi, Kolkata, UK, London, Texas, Chicago, San Francisco, Dallas, Washington, New York, Houstan, Atlanta, Orlando, Boston, Toronto, Ottawa, Windsor, Australia, Dubai, Leeds.


    ONLINE MEETING PARTNERS

    top
    COPYRIGHT © 2020 KEEN IT TECHNOLOGIES PVT.LTD, ALL RIGHTS RESERVED