O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

70-413: Designing and Implementing a Server Infrastructure

Video Description

The Microsoft’s 70-413: Designing and Implementing a Server Infrastructure certification exam tests the candidates’ abilities to plan, design and deploy a physical or virtual Windows Server infrastructure. This preparatory course will enable the students to pass the exam as well as enhance their skills on the Microsoft Windows Server. The topics covered in this course are comprehensive and teach the students to automate the server installation processes in a physical or virtual environment. In addition to this, other related topics such as DHCP, VPN, DirectAccess and IPAM are also covered in detail. This Microsoft Windows Server course enables the students in designing and implementing a server infrastructure along with establishing a secure remote access solution. The course provides hands-on practice to put the students on the path to become a Server Infrastructure expert and also prepare the -students to undertake the Microsoft’s 70-413 certification exam.

Table of Contents

  1. Course Introduction
    1. Course Introduction 00:04:16
    2. Instructor Intruduction 00:01:00
  2. Module 01 - Server Infrastructure - Upgrade and Migration
    1. Server Infrastructure - Upgrade and Migration 00:01:22
    2. Planning for Deployment 00:03:49
    3. Windows Server Editions 00:09:26
    4. Choice Summary 00:01:35
    5. Choice Summary (Cont.) 00:00:30
    6. Pre-installation Requirements 00:02:27
    7. Windows Server 2012 Upgrades 00:03:01
    8. Upgrade Options 00:03:15
    9. Migration to Windows Server 2012 00:02:07
    10. Roles That Can Be Migrated 00:01:11
    11. Roles That Can Be Combined on a Single Server 00:01:17
    12. MAP Toolkit 00:01:12
    13. Windows Assessment and Deployment Kit (ADK) 00:03:14
    14. Windows Assessment and Deployment Kit (ADK) (Cont.) 00:02:16
    15. Windows Server 2012 Licensing 00:01:45
    16. Activation Strategies 00:04:49
    17. Considerations for Virtualization 00:06:10
    18. Virtualization Planning 00:02:02
    19. Hyper-V Virtual Licensing 00:00:31
    20. Planning Hardware for Hyper-V Hosts 00:03:34
    21. Deployment Considerations for Virtualized Workloads 00:01:20
    22. Tools for Deploying Virtual Machines 00:03:09
    23. Virtual Machines and Domain Controllers 00:02:12
    24. Cloning Domain Controllers 00:01:27
    25. Demo - Cloning Domain Controllers 00:24:10
    26. VHDs 00:01:39
    27. VHDXs 00:00:45
    28. Imaging Strategies 00:02:39
    29. Windows Imaging Format 00:01:34
    30. WIM File Structure 00:02:41
    31. High Touch Retail Media Deployments 00:00:56
    32. High Touch with Retail Media Deployment Steps 00:01:08
    33. High Touch Standard Image Deployment 00:01:07
    34. High Touch with Standard Image Process 00:02:37
    35. Lite Touch 00:00:45
    36. Zero Touch High-Volume Deployments 00:01:35
    37. Designing the ZTI Environment 00:00:28
    38. Automated Deployment Methods 00:01:13
    39. Types of Images 00:02:40
    40. Choosing a Deployment Method 00:01:38
    41. Deployment Scenarios 00:01:10
    42. Tools for Image - Based Installation of Windows 00:00:35
    43. ImageX Tasks 00:00:51
    44. Image Servicing and Management: DISM 00:01:24
    45. Windows AIK 00:01:09
    46. Tools Available in Windows AIK 00:00:43
    47. Demo - Installing Windows AIK 00:06:44
    48. Windows PE 00:01:53
    49. Windows DS 00:00:53
    50. Windows DS Architecture 00:01:37
    51. New Features in Windows DS 00:00:50
    52. MDT 2012 00:01:16
    53. Configuration Manager 00:00:33
    54. Configuration Manager Task Sequence and Packages 00:00:40
    55. Configuration Manager Task Sequence and Packages (cont.) 00:00:33
    56. Module 01 Review 00:01:29
  3. Module 02 - Storage and File Services
    1. Storage and File Services 00:02:21
    2. Direct Attached Storage (DAS) 00:01:34
    3. Network Attached Storage (NAS) 00:01:04
    4. Storage Area Network (SAN) 00:02:20
    5. SAN Components 00:01:38
    6. iSCSI 00:01:34
    7. iSCSI (Cont.) 00:02:53
    8. iSCSI Target Server and iSCSI Initiator 00:03:49
    9. iSCSI Target Server Scenarios 00:00:44
    10. Windows Server 2012 R2 New and Changed Functionality 00:01:22
    11. iSCSI and High -Availability 00:00:56
    12. Defense in Depth 00:02:37
    13. DFS 00:02:38
    14. DFSR Replication 00:03:01
    15. Standalone DFS Namespace 00:04:59
    16. Domain DFS Namespace 00:04:17
    17. DFS Uses 00:00:31
    18. Demo - Deploying and Configuring DFS 00:13:55
    19. BranchCache 00:02:26
    20. BranchCache Modes 00:02:42
    21. Procedure Reference to Install 00:01:09
    22. Demo - Implementing BrancheCache 00:04:44
    23. Discretionary Access Control 00:00:58
    24. Dynamic Access Control 00:03:17
    25. Dynamic Access Control (Cont.) 00:02:11
    26. DAC Scenarios 00:00:35
    27. DAC Requirements 00:01:31
    28. Central Access Policy 00:05:04
    29. Creating Central Access Policies 00:02:43
    30. Implementing Central Access Policy 00:01:10
    31. DAC Claims 00:01:26
    32. Creating Claims 00:00:29
    33. Resource Properties 00:01:04
    34. Accessing Resources with DAC 00:01:16
    35. Enabling Support in AD DS KDC 00:00:59
    36. Creating Resource Properties 00:00:33
    37. Central Access Control Rules 00:00:42
    38. File Access Auditing 00:01:35
    39. Planning for Access Denied Assistance 00:01:19
    40. Dynamic Access Control Prerequisites 00:01:51
    41. Module 02 Review 00:01:52
  4. Module 03 - Network Infrastructure Services
    1. Network Infrastructure Services 00:02:13
    2. Best Practices for Designing an IPv4 Addressing Scheme 00:08:02
    3. Best Practices for Designing an IPv4 Addressing Scheme (Cont.) 00:03:06
    4. How to Plan and Implement the Appropriate Addressing Scheme 00:06:11
    5. Selecting an Address Scheme (eNotes) 00:05:01
    6. DHCP Server Placement Infrastructure 00:03:01
    7. DHCP Redundancy Options 00:02:10
    8. DHCP Failover 00:06:30
    9. DHCP Super Scopes 00:01:15
    10. DHCP Reservations 00:01:17
    11. DHCP Option Classes 00:01:08
    12. IPv6 Autoconfiguration 00:04:03
    13. Autoconfigured Address States 00:00:26
    14. Improved PowerShell Commands for DHCP in Server 2012 R2 00:01:10
    15. New PowerShell Commands for DHCP 00:00:38
    16. New PowerShell Commands for DHCP (Cont.) 00:00:26
    17. DHCP Guidelines 00:03:13
    18. IPAM Definition and Benefits 00:01:42
    19. IPAM 00:03:17
    20. IPAM and DHCP 00:00:41
    21. IPAM Components 00:01:31
    22. Role Based Access Control 00:01:49
    23. Role Based Access Control Roles Provided by Default 00:01:21
    24. IPAM Prerequisites 00:02:20
    25. IPAM Database Support 00:01:22
    26. IPAM Users and Groups 00:01:08
    27. Manual Provisioning for IPAM 00:01:39
    28. Manual Provisioning for IPAM (Cont.) 00:00:58
    29. IPAM Design Considerations 00:02:17
    30. IPAM Views 00:04:36
    31. IPAM Monitoring 00:00:29
    32. DNS Namespace Design 00:07:26
    33. Evaluating a Namespace Design 00:03:46
    34. DNS Namespaces (eNotes) 00:02:23
    35. NetBIOS Name Resolution 00:03:40
    36. GlobalNames 00:00:58
    37. WINS vs. GNZ 00:01:48
    38. DNS and AD DS 00:02:38
    39. DNS Records Needed by AD 00:03:01
    40. Demo - DNS Records Needed by AD 00:08:53
    41. DNS Design Considerations 00:02:44
    42. Integrating Multiple DNS Namespaces 00:03:23
    43. DNS Application Partitions 00:01:52
    44. DNS Server Capacity Planning 00:02:43
    45. Demo - Performance Monitor and DNS 00:08:24
    46. DNS Server Roles 00:01:41
    47. DNS Zone Types 00:02:04
    48. DNS Zone Delegation 00:00:24
    49. Zone Transfers and Replications 00:01:28
    50. DNS BIND Versions 00:01:45
    51. Zone Transfer Security 00:01:18
    52. Root Hints Servers 00:03:10
    53. Optimizing DNS Root Hints 00:01:03
    54. DNS Forwarders | Conditional | Stub Zones 00:00:48
    55. Demo - Configuring Zone Transfers 00:04:46
    56. NetBIOS Name Resolution (Cont.) 00:01:20
    57. Demo - Creating DNS Zones 00:08:02
    58. Optimizing Queries 00:02:28
    59. Optimizing DNS Server 00:01:55
    60. Optimizing Active Directory Integrated Zones 00:01:03
    61. DNS and High-Availability 00:00:38
    62. Common DNS Security Issues 00:01:06
    63. DNS Security Levels 00:00:52
    64. DNS Security Levels (Cont.Part 1 ) 00:01:01
    65. DNS Security Levels (Cont. Part 2) 00:01:05
    66. Additional DNS Security Settings 00:03:37
    67. Module 03 Review 00:01:08
  5. Module 04 - Planning for External User Access
    1. Planning for External User Access 00:02:07
    2. Types of Network Access Services 00:01:57
    3. Types of Users 00:01:41
    4. Considerations of Data to Access 00:02:47
    5. Remote Access Methods 00:03:28
    6. Tunneling Protocols: PPTP 00:01:09
    7. Tunneling Protocols: L2TP 00:01:26
    8. Tunneling Protocols: SSTP 00:02:31
    9. Tunneling Protocols: IKEv2 00:01:15
    10. Authentication Protocols and Methods 00:01:23
    11. Encryption Protocols and Methods Set 00:04:47
    12. Planning for Remote Access 00:02:24
    13. New Features in Remote Access Windows Server 2012 00:02:11
    14. New Features Windows 8.1 00:02:03
    15. Placement of VPN Servers 00:02:03
    16. Network Access Policies 00:01:17
    17. Connection Request Policies 00:01:44
    18. How Policies are Applied 00:06:37
    19. Order of Applying Connections 00:00:46
    20. Demo - Creating a VPN 00:18:26
    21. Perimeter Networks 00:02:04
    22. Common Perimeter Network Applications and Protocols 00:01:31
    23. Types of Firewall Configurations 00:00:46
    24. Windows Firewall with Advanced Security 00:01:25
    25. Secure Outside Access Options 00:01:06
    26. DirectAccess 00:00:52
    27. DirectAccess Server Functions 00:01:01
    28. DirectAccess Infrastructure Prerequisites 00:01:47
    29. DirectAccess Server Prerequisites 00:02:31
    30. DirectAccess Server Prerequisites (Cont.) 00:01:56
    31. DirectAccess Client Prerequisites 00:00:12
    32. Methods of Client Connections 00:01:50
    33. DirectAccess Client Connections 00:01:15
    34. Planning DirectAccess 00:01:31
    35. Configure DirectAccess Server 00:01:11
    36. Getting Ready: DirectAccess 00:00:58
    37. DirectAccess with a Single Network Card 00:00:36
    38. RADIUS Authentication and NPS 00:02:12
    39. NPS RADIUS Server 00:01:35
    40. RADIUS Proxy 00:01:54
    41. RADIUS Client 00:00:37
    42. RADIUS Client Examples 00:00:39
    43. Connection Request Policies Conditions | Settings 00:01:31
    44. Conditions | Settings | Default Connection Policy 00:00:52
    45. Connection Request Processing 00:00:47
    46. Network Security 00:01:32
    47. Defense in Depth 00:02:27
    48. Network Policies 00:00:46
    49. Demo - Network Policies 00:01:26
    50. Points of Failure for Security Policies 00:01:09
    51. Employee Training 00:00:52
    52. Reasons For Network Attacks 00:06:05
    53. Types of Network Attacks 00:01:11
    54. STRIDE Model 00:03:07
    55. Security Measures 00:01:14
    56. Windows Firewall 00:00:31
    57. Connection Security Rules 00:01:58
    58. IPsec 00:01:14
    59. Server and Domain Isolation 00:00:38
    60. Authentication Options 00:00:26
    61. Best Practices 00:01:15
    62. Demo - Connection Security Rules 00:03:03
    63. Module 04 Review 00:01:21
  6. Module 05 - Design and Implement Logical AD Infrastructure
    1. Design and Implement Logical AD Infrastructure 00:02:07
    2. AD DS Forest Designed 00:06:18
    3. Forest Models: Single 00:03:06
    4. Forest Models: Organizational 00:03:22
    5. Forest Models: Resource Forest Model 00:00:33
    6. Forest Models: Restricted Access 00:00:55
    7. Benefits of Multiple Forests 00:01:52
    8. Guidelines for Designing AD DS Forests 00:01:22
    9. Demo - Creating a Forest Root 00:17:38
    10. Demo - Viewing and Editing the Schema 00:10:07
    11. Forest Trusts 00:03:34
    12. Forest Trusts (Cont.) 00:01:34
    13. Security Considerations Forest Trust 00:02:37
    14. Accessing Resources in Another Forest 00:07:52
    15. Forest Trust Guidelines 00:02:00
    16. Demo - Creating a Forest Trust 00:06:07
    17. Demo - Creating a Forest Trust (Cont. Part 1 ) 00:05:48
    18. Forest High Rareky 00:05:19
    19. AD DS Domains 00:01:36
    20. Domain Models 00:04:58
    21. Forest Root Domains 00:01:48
    22. Password Policies 00:00:49
    23. Demo - Install Second Domain Controller to Domain 00:11:44
    24. Items That Affected Domain Design 00:01:43
    25. Replication and WAN Links 00:01:52
    26. Trust Relationships 00:01:56
    27. Trusts within a Domain 00:01:59
    28. Trusts Between Domains 00:00:54
    29. Shortcut Trusts 00:04:22
    30. External Trusts 00:00:49
    31. Realm Trusts 00:00:53
    32. Best Practice for Domain Trusts 00:00:42
    33. AD Delegation Options 00:04:34
    34. Delegation Models 00:03:50
    35. Examples of Delegation 00:01:42
    36. Administrative Models 00:01:21
    37. How to Start Planning Resource Management 00:03:57
    38. Administrative Permissions 00:01:06
    39. Branch Office Management 00:00:43
    40. OU Strategies 00:02:15
    41. OU Strategies (Cont.) 00:01:27
    42. Users and Permissions 00:01:20
    43. OU Security Descriptors 00:00:35
    44. OU Security Descriptors (Cont.) 00:06:13
    45. Demo - Exploring AD Permissions within OU Structure 00:08:45
    46. Delegation Administrative Methods 00:02:09
    47. Where OU Permissions Fall 00:01:01
    48. Examples of Permissions at OU Level (eNotes) 00:01:26
    49. OU Accidental Deletion 00:02:52
    50. Protecting OUs using PowerShell 00:02:04
    51. Demo - Protecting OUs using PowerShell 00:08:22
    52. Active Directory Groups 00:06:56
    53. Group Scope and Nesting 00:07:28
    54. Demo - Creating Groups with Active Directory Administration Center 00:11:32
    55. Demo - Creating Groups with PowerShell 00:04:54
    56. Group Strategy 00:04:53
    57. Default Groups 00:03:22
    58. Protected Users Security Group 00:00:44
    59. Protected Users Security Group User Limitations 00:01:17
    60. Special Identities 00:01:28
    61. Computer Accounts 00:01:42
    62. Best Practices 00:01:39
    63. Module 05 Review 00:01:14
  7. Module 06 - AD GPO
    1. AD GPO 00:01:28
    2. Factors for Group Policy Design 00:02:12
    3. Planning for Desktop Environments with Group Policy 00:03:06
    4. Planning Group Policy for Administrative Models 00:00:39
    5. Group Policy Components 00:00:50
    6. Uses for Group Policy 00:01:45
    7. Demo - Group Policy Categories 00:17:49
    8. Group Policy Templates 00:01:46
    9. Nodes: Computer 00:01:47
    10. Nodes: User 00:01:05
    11. Group Policy Preferences 00:01:49
    12. Configuring Group Policy Preference 00:01:56
    13. GPO Design Considerations 00:00:42
    14. Group Policy Inheritance 00:02:24
    15. Group Policy Filtering 00:01:17
    16. Group Policy Processing 00:02:01
    17. Group Policy, Backup and Restore and Documentation 00:01:09
    18. PowerShell Cmdlets for WDS 00:01:32
    19. Migrating GPOs to a New Domain Set 00:01:23
    20. Migration Table Editor 00:00:34
    21. Administration of Group Policy 00:01:55
    22. Slow Link Detection 00:00:51
    23. Module 06 Review 00:00:55
  8. Module 07 - Designing a Physical AD Infrastructure
    1. Designing a Physical AD Infrastructure 00:00:56
    2. AD DS Sites 00:01:58
    3. Location of AD DS Site Configuration 00:01:40
    4. Replication Traffic 00:00:36
    5. Service Localization 00:00:36
    6. Designing AD DS Sites 00:01:05
    7. Factors that Determine AD DS Site Design 00:01:53
    8. Automatic Site Coverage 00:01:00
    9. AD DS and DNS 00:02:03
    10. AD DS Site Considerations 00:01:01
    11. Domain Controller Placement 00:01:15
    12. AD DS Replication Components: Connection Objects 00:01:02
    13. AD DS Replication Components: Notification and Polling 00:01:12
    14. KCC 00:01:33
    15. ISTG - Intersite Topology Generator 00:01:14
    16. Replication Topologies: Ring 00:00:26
    17. Replication Topologies: Hub and Spoke 00:00:24
    18. Replication Topologies: Full Mesh 00:01:18
    19. Replication Topologies: Hybrid 00:00:53
    20. Replication Protocols 00:01:10
    21. Notes on SMTP 00:01:47
    22. Replication and RODCs 00:00:25
    23. Replication and Global Catalogs 00:00:35
    24. Replication and SYSVOL 00:01:43
    25. Site Links 00:01:42
    26. Bridgehead Servers 00:01:18
    27. Site Link Bridging 00:01:05
    28. Virtualized Domain Controllers 00:01:03
    29. Cloning Virtual Domain Controllers 00:01:49
    30. Process: Cloning Server 2012 VDC 00:00:37
    31. DcCloneConfig.xml Syntax 00:02:10
    32. DcCloneConfig.xml Parameters 00:00:49
    33. Domain Controller Safe Backup and Restore 00:01:17
    34. PowerShell for Hyper-V Snapshot Management 00:00:28
    35. Module 07 Review 00:00:49
  9. Module 08 - Domain Controllers
    1. Domain Controllers 00:00:49
    2. Hardware Requirements for Domain Controllers 00:02:32
    3. Installing Server Core 00:01:09
    4. FSMO Roles 00:01:19
    5. FSMO Locations 00:01:20
    6. RODC Limitations 00:01:00
    7. Tools For Monitoring Domain Controllers 00:01:33
    8. Best Practices Analyzer 00:00:48
    9. Demo - Best Practices Analyzer 00:07:07
    10. Security Best Practices 00:01:28
    11. High-Availability 00:03:22
    12. Defining High-Availability Needs for Active Directory 00:00:49
    13. Active Directory, High-Availability 00:01:34
    14. DNS High-Availability 00:00:33
    15. Backup and Recovery AD DS 00:01:13
    16. Types of Backups 00:00:22
    17. Backing Up Critical Volumes 00:00:32
    18. Active Directory Restores 00:00:23
    19. Active Directory Restores (Cont.) 00:03:48
    20. Restoring Active Directory 00:00:56
    21. Active Directory Recycle Bin 00:01:06
    22. Module 08 Review 00:00:35
    23. Course Closure 00:01:41