Description

Get Hands on instruction and practice administering Active Directory technologies in Windows Server 2012 R2 and Windows Server 2012 in this 5-day Microsoft Official Training program. Professionals will learn the skills required to better manage and maintain the protect data Information and Access, management and simplify deployment of your identity infrastructure, and provide more secure access to data. Professionals will learn way to configure some of the primary characteristics in Active Directory for example Active Directory Domain Services (AD DS), Group Policy, Dynamic Access Control (DAC), Federation Services, Work Place Join, Work Folders, Rights Management Services (RMS), Certificate Services, as well as integrating your on premise environment with cloud based technologies such as Windows Azure Active Directory. As part of the learning experience, professionals will perform hands-on exercises in a virtual lab environment.

 

Radiant Teachlearning offers Active Directory Services with Windows Server Training Program in Classroom and Virtual instructor Led/Online mode.

 

Duration: 5 days

 

Learning Objectives

After accomplishing this training program, professionals will be able to:

  • Acunderstanding available solutions for identity manage and management and be able to address scenarios with suitable solutions.
  • Administer and deploy AD DS in the Windows Server 2012.
  • Secure AD DS deployment.
  • Execute AD DS configure, sites , manage and maintain replication
  • Execute and manage Group Policy
  • Manage user settings with Group Policy
  • Execute certification authority (CA) hierarchy with AD CS and way to manage CAs.
  • Execute, deploy and manage certificates.
  • Execute and manage AD RMS.
  • Execute and administer AD FS.
  • Secure and provision data access using technologies such as Dynamic Access Control, Work Folders and Workplace Join
  • Monitor, troubleshoot and establish business continuity for AD DS services.
  • Execute Windows Azure Active Directory.
  • Execute and administer Active Directory Lightweight Directory Services (AD LDS).

Pre-requisite

Before attending this training program, professionals must have:

  • Experience working with Active Directory Domain Services (AD DS)
  • Experience working in a Windows Server Infrastructure enterprise environment
  • Experience working with and troubleshooting core networking infrastructure technologies such as name resolution, IP Addressing, Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP)
  • Experience working with Hyper-V and Server Virtualization concepts
  • An awareness and acknowledging of general security best practices
  • Experience working hands on with Windows client operating systems such as Windows Vista, Windows 7 or Windows 8

 

Audience Profile

This training program is intended for Information Technology (IT) Professionals who have Active Directory Domain Services (AD DS) experience and are looking to for a single training program that will further develop understanding and skills utilizing Information and Access Protection technologies in Windows Server 2012 R2 and Windows Server 2012. This would typically include:

  • AD DS Administrators who are seeking to further develop skills in the latest Information and access Protection technologies with the Windows Server 2012 R2 and Windows Server 2012.
  • System or Infrastructure administrators with general AD DS experience and understanding who are seeking to build upon that core understanding and cross-train into advanced Active Directory technologies in the Windows Server 2012 R2 and Windows Server 2012.
  • IT Professionals who have taken the 10967A: Fundamentals of a Windows Server Infrastructure training program and are seeking to build upon that Active directory understanding.

Course Content

Lesson 1: Outline of Information and Access Protection

This lesson provides an outline of multiple Information and Access Protection (AIP)  services and technologies what are available with the Windows Server 2012 R2 and Windows Server 2012 from a business perspective as well as maps business problems to technical solutions. It also cover Forefront Identify Manager (FIM).

Lessons

  • Introduction to Information and Access Protection Solutions in Business
  • Outline of AIP Solutions in the Windows Server 2012
  • Outline of FIM 2010 R2

Lab: Choosing the suitable Information and Access Protection Management Solution

After accomplishing this lesson professionals will be able to:

  • Explain Information and Access Protection solutions in business.
  • Explain Information and Access Protection solutions in Windows Server 2012 R2 and Windows Server 2012.
  • Explain Microsoft Forefront Identity Manager (FIM) 2010 R2.

 

Lesson 2: Administration of AD DS as well as Advanced Deployment

This lesson describes way to deploy AD DS remotely and explains the virtualization safeguards, cloning abilities and extending AD DS to the cloud.

Lessons

  • Deploying AD DS
  • Deploying and Cloning Virtual Domain Controllers
  • Deploying Domain Controllers in Windows Azure
  • Administering AD DS

Lab: Deploying and Administering AD DS

After accomplishing this lesson, professionals will be able to:

  • Explain and perform different deployment techniques for AD DS.
  • Explain virtual domain controller deployment considerations.
  • Describe how new technologies in the Windows Server 2012 R2 and Windows Server 2012 support virtual domain controllers.
  • Explain Domain Controller cloning.
  • Execute AD DS utilizing the tools provided in the Windows Server 2012 R2 and Windows Server 2012.

 

Lesson 3: Securing AD DS

This lesson explains the threats to domain controllers and what methods can be used to secure the AD DS and its domain controllers.

Lessons

  • Securing Domain Controllers
  • Executing Account Security
  • Executing Audit Authentication

Lab: Securing AD DS

After accomplishing this lesson, professionals will be able to:

  • Acunderstanding the importance of securing domain controllers.
  • Explain the benefit of read-only domain controllers (RODCs).
  • Describe and execute password and account lockout policies.
  • Execute audit authentication.

 

Lesson 4: Executing and Administering AD DS Sites and Replication

This lesson describes how AD DS replicates information between domain controllers within a single site and throughout multiple sites. This lesson also describes way to create multiple sites and way to monitor replication to help optimize AD DS replication and authentication traffic.

Lessons

  • Outline of AD DS Replication
  • Configuring AD DS Sites
  • Configuring and Monitoring AD DS Replication

Lab: Executing AD DS Sites and Replication

After accomplishing this lesson, professionals will be able to:

  • Explain AD DS replication.
  • Configure AD DS sites.
  • Configure and monitor AD DS replication.

 

Lesson 5: Executing Group Policy

This lesson explains Group Policy, how it works, and how best to execute it within your organization.

Lessons

  • Introducing Group Policy
  • Executing and Administering GPOs
  • Group Policy Scope and Group Policy Processing
  • Troubleshooting the Application of GPOs

Lab: Executing and Troubleshooting a Group Policy Infrastructure

After accomplishing this lesson, professionals will be able to:

  • Explain Group Policy.
  • Execute and administer GPOs.
  • Explain Group Policy scope and Group Policy processing.
  • Troubleshoot the application of GPOs.

 

Lesson 6: Managing User Settings with Group Policy

This lesson explains way to way to use GPO Administrative Templates, Folder Redirection, and Group Policy features to configure users’ computer settings.

Lessons

  • Executing Administrative Templates
  • Configuring Folder Redirection and Scripts
  • Configuring Group Policy Preferences

Lab: Managing User Desktops with Group Policy

After accomplishing this lesson, professionals will be able to:

  • Execute Administrative Templates.
  • Configure Folder Redirection and scripts.
  • Configure Group Policy preferences.

 

Lesson 7: Deploying and Managing AD CS

This lesson describe way to deploy and manage Certificate Authorities (CAs) with Active Directory Certificate Services (AD CS)

Lessons

  • Deploying CAs
  • Administering CAs
  • Troubleshooting, Maintaining, and Monitoring CAs

Lab: Deploying and Configuring a Two-Tier CA Hierarchy

After accomplishing this lesson, professionals will be able to:

  • Deploy Certificate Authorities.
  • Administer Certificate Authorities.
  • Troubleshoot, maintain, and monitor Certificate Authorities.

 

Lesson 8: Deploying and Managing Certificates

This lesson explains certificate usage in business environments and describes way to deploy and manage and maintain certificates, configure certificate templates as well as manage and maintain enrolment process. This lesson also covers the deployment and management of smart cards.

Lessons

  • Using Certificates in a Business Environment
  • Deploying and Managing Certificate Templates
  • Managing Certificates Deployment, Revocation, and Recovery
  • Executing and Managing Smart Cards

Lab: Deploying and Using Certificates

After accomplishing this lesson, professionals will be able to:

  • Use certificates in business environments.
  • Deploy and manage certificate templates.
  • Manage certificates deployment, revocation and recovery.
  • Execute and manage smart cards.

 

Lesson 9: Executing and Administering AD RMS

This lesson introduces Active Directory Rights Management Services (AD RMS). It also explains way to deploy AD RMS, way to configure content protection, and way to make AD RMS–protected documents available to external users.

Lessons

  • Outline of AD RMS
  • Deploying and Managing an AD RMS Infrastructure
  • Configuring AD RMS Content Protection
  • Configuring External Access to AD RMS

Lab: Executing an AD RMS Infrastructure

After accomplishing this lesson, professionals will be able to:

  • Explain AD RMS.
  • Describe way to deploy and manage an AD RMS infrastructure.
  • Describe way to configure AD RMS content protection.
  • Describe way to configure external access to AD RMS.

 

Lesson 10: Executing and Administering AD FS

This lesson describes AD FS, and then provides details on way to configure AD FS in both a single organization scenario and in a partner organization scenario. This lesson also explains the Web Application Proxy feature in Windows Server 2012 R2 that functions as an AD FS proxy and reverse proxy for web-based applications.

Lessons

  • Outline of AD FS
  • Deploying AD FS
  • Executing AD FS for a Single Organization
  • Deploying AD FS in a Business-to-Business Federation Scenario
  • Extending AD FS to External Clients

Lab: Executing AD FS

After accomplishing this lesson, professionals will be able to:

  • Explain AD FS.
  • Describe way to configure the AD FS prerequisites, and deploy AD FS services.
  • Explain way to execute AD FS for a single organization.
  • Deploy AD FS in a business-to-business federation scenario.
  • Deploy the Web Application Proxy.

 

Lesson 11: Executing Secure Shared File Access

This lesson describes way to use Dynamic Access Control (DAC), Work Folders, Work place Join and way to plan and execute these technologies.

Lessons

  • Outline of Dynamic Access Control
  • Executing DAC Components
  • Executing DAC for Access Control
  • Executing Access Denied Assistance
  • Executing and Managing Work Folders
  • Executing Workplace Join

Lab: Executing Secure File Access

After accomplishing this lesson, professionals will be able to:

  • Explain DAC.
  • Execute DAC components.
  • Execute DAC for access control.
  • Execute access-denied assistance.
  • Execute and manage Work Folders.
  • Execute Workplace Join.

 

Lesson 12: Monitoring, Managing, and Recovering AD DS

This lesson describes way to use tools that help monitor performance in real time, and way to record performance over time to spot potential problems by observing performance trends. This lesson also describes way to optimize and protect your directory service and related identity and access solutions so that if a service does fail, professionals can restart it as quickly as possible.

Lessons

  • Monitoring AD DS
  • Managing the AD DS Database
  • AD DS Backup and Recovery Options for AD DS and Other Identity and Access Solutions

Lab: Monitoring AD DS

Lab: Recovering Objects in AD DS

After accomplishing this lesson, professionals will be able to:

  • Monitor AD DS.
  • Manage the AD DS database.
  • Recover objects from the AD DS database.

 

Lesson 13: Executing Windows Azure Active Directory

This lesson describes the concepts and technologies in Windows Azure Active Directory and way to execute and integrate it within your organization

Lessons

  • Outline of Windows Azure AD
  • Managing Windows Azure AD Accounts

Lab: Executing Windows Azure AD

After accomplishing this lesson, professionals will be able to:

  • Explain Windows Azure AD.
  • Administer Azure AD.

 

Lesson 14: Executing and Administering AD LDS

This lesson describes way to deploy and configure Active Directory Lightweight Directory Services (AD LDS)

Lessons

  • Outline of AD LDS
  • Deploying AD LDS
  • Configuring AD LDS Instances and Partitions
  • Configuring AD LDS Replication
  • Integrating AD LDS with AD DS

Lab: Executing and Administering AD LDS

After accomplishing this lesson, professionals will be able to:

  • Explain AD LDS.
  • Describe way to deploy AD LDS.
  • Describe way to configure AD LDS instances and partitions.
  • Describe way to configure AD LDS replication.

FAQs

Q: What are the Active Directory Services?

 

A: Active Directory Domain Services (AD DS) are the core functions in Active Directory that manage users and computers and allow sysadmins to organize the data into logical hierarchies. AD DS generally provides for security certificates, Single Sign-On (SSO), LDAP, as well as rights management.

 

Q: What is the main function of Active Directory?

 

A: Active Directory is Microsoft’s own directory service for use in Windows domain networks. It generally provides authentication and authorization functions, as well as providing a framework for various other such services. The directory itself is an LDAP database which mainly contains networked objects.

 

Q: What is Active Directory for beginners?

 

A: Active Directory is a directory service that centralizes the management of users, computers and other objects within a network. Its fundamental function is to authenticate as well as authorize users and computers in a windows domain.

 

Q: How do I access Active Directory?

 

A: To access Active directory follow the given steps:-

  • Find Your Active Directory Search Base
  • Select Start > Administrative Tools > Active Directory Users and Computers.
  • In the Active Directory Users and Computers tree, find and select your domain name.
  • Expand the tree to find the path through your Active Directory hierarchy.

 

Q: What is the schedule of the training program?

 

A: Radiant Techlearning offers training program on the weekday, weekend and a combination of weekdays and weekends. You can always choose the schedule that best suits to your need. 

 

Q: When the training would be conducted?

 

A: Once we receive your enrollment request, we will share the enrollment details with you to  select and complete the enrollment process. 

You can always email us on the below email address (whichever applicable) to know the upcoming schedule for a specific technology training program. 

Individual:  training@radianttechlearning.com  

Corporate: Corporate@radiantechlearning.com 

 

Q: Will I get course completion certificate?

A: The course completion certification would be awarded to all the professionals, who have completed the training program and the project assignment given by your instructor. 

You can use the certificate in your future job interviews will surely help you to land in your dream job.

 

Q: What is the infrastructure required to attend your training program?

 

A: To attend the training session you should have an operational Desktops or Laptops with required specification along with good internet connection to access the labs. 

 

Unble To Find a Batch..?

Request a Batch