Microsoft Certified Solutions Expert (MCSE) Server 2016 Online Course

Learn how to secure Windows Server 2016 environments

Microsoft Certified Solutions Expert (MCSE) Server 2016 Online Course

NOW ONLY

US$199

Save US$500 (72%)
OFF RRP US$699
Get Info Pack

Learn how to secure Windows Server 2016 environments

To earn your MCSE Windows Server 2016 certification, you must first pass the three MCSA exams and earn your MCSA certification.

This exam focuses on how to secure Windows Server 2016 environments. It covers methods and technologies for hardening server environments and securing virtual machine infrastructures using Shielded and encryption-supported virtual machines and Guarded Fabric.
In addition, the exam covers the protection of Active Directory and identity infrastructure with the Enhanced Security Administrative Environment (ESAE) Administrative Forest design approach and the management of privileged identities using Just-in-Time (JIT) and Just-Enough-Administration (JEA) approaches, along with Privileged Access Workstations (PAWs) and Local Administrator Password Solution (LAPS).
The exam also covers threat detection solutions, such as auditing, implementing Advanced Threat Analytics (ATA), the understanding of Operations Management Suite (OMS) solutions, and workload-specific security including the use of Nano Server for particular server workloads.

Course Fast Facts:

  1. Learn the fundamentals of Microsoft Certified Solutions Expert (MCSE) Server 2016
  2. Comprehensive 4 module Accredited Certificate In Microsoft Certified Solutions Expert (MCSE) Server 2016 Online Course
  3. Study along with simple instructions & demonstrations
  4. Written and developed by leading Microsoft experts
  5. Receive one-on-one online help & support
  6. Unlimited, lifetime access to online course
  7. Certificate of completion
  8. Study at your own pace with no rigid class timetables, 24/7 from any computer or smart device

Course Delivery

Courses are accessed online  by any device including PC, tablet or Smart Phone. Upon purchase an automated welcome email will be sent to you (please check your junk email inbox if not received as this is an automated email), in order for you to access your online course, which is Available 24/7 on any computer or smart mobile device. 

Recognition & Accreditation

All students who complete this course, receive a certificate of completion and will be issued a certificate via email.

Microsoft 70-744: Securing Windows Server 2016

Course Introduction

  • Introduction
  • Course Introduction
  • Instructor Introduction

Chapter 01 - Introduction to Attacks, Breaches, and Detection

  • Chapter 01 Introduction
  • Topic A: Understanding Types of Attacks
  • Assume Breach
  • Methods of Attack
  • Attack Stages
  • Prioritizing Resources
  • Incident Response Strategy
  • Ensuring Compliance
  • Topic B: Detecting Security Breaches
  • Locating Evidence
  • Event Logs
  • Examining Other Configurations
  • Topic C: Using Sysinternals Tools
  • Introducing Sysinternals
  • Demo - Examining Sysinternals Tools
  • System Monitor
  • AccessChk
  • Autoruns
  • LogonSessions
  • Process Explorer
  • Process Monitor
  • Sigcheck
  • Demo - Using Sysinternals Tools
  • Chapter 01 Summary
  • Chapter 01 Review
  • Chapter 01 Quiz

Chapter 02 - Protecting Users and Workstations

  • Chapter 02 Introduction
  • Topic A: User Rights and Privileges
  • Principle of Least Privilege
  • Configuring User Rights
  • Configuring Account Security Options
  • Demo - User Rights and Account Security Options
  • Account Security Controls
  • Complexity Options
  • Password and Lockout Policies
  • Demo - Configuring Account Policies in Group Policy
  • Configuring Fine-Grained Password Policies
  • Understanding PSO Application
  • Protected Users Security Groups
  • Delegating Administrative Control
  • Demo - Delegating Control in AD DS
  • Local Administrator Password Solutions (LAPS)
  • LAPS Requirements
  • LAPS Process
  • Configuring and Managing Passwords
  • Demo - Using LAPS
  • Topic B: Working with Computer and Service Accounts
  • What is a Computer Account?
  • Computer Account Functionality
  • Working with Secure Channel Passwords
  • Service Account Types
  • Group MSAs
  • Demo - Configuring Group MSAs
  • Topic C: Protecting User Credentials
  • Introducing Credential Guard
  • Credential Guard Requirements
  • Configuring Credential Guard
  • Verifying Credential Guard Operation
  • Credential Guard Weaknesses
  • NTLM Blocking
  • Searching AD DS for Problem Accounts
  • Demo - Locating Problem Accounts
  • Topic D: Using Privileged Access Workstations
  • The Need for Privileged Access Workstations
  • Privileged Access Workstations
  • Jump Servers
  • Securing Domain Controllers
  • Chapter 02 Summary
  • Chapter 02 Review
  • Chapter 02 Quiz

Chapter 03 - Managing Administrative Access

  • Chapter 03 Introduction
  • Topic A: Understanding and Deploying JEA
  • Introduction to JEA
  • JEA Components
  • Session Configuration Files
  • Demo - Creating a Session Configuration File
  • Role Capability Files
  • Demo - Create a Role Capability File
  • JEA Endpoints
  • Demo - Creating a JEA Endpoint
  • Connecting to JEA Endpoints
  • Deploying JEA Endpoints
  • Topic B: Using Enhanced Security Administrative Environments (ESAE) Forests
  • ESAE Forests
  • Administrative Tiers
  • ESAE Best Practices
  • The Clean Source Principle
  • Implementing the Clean Source Principle
  • Topic C: Using Microsoft Identity Manager
  • Overview of MIM
  • MIM Requirements
  • MIM Service Accounts
  • Topic D: Using JIT Administration and PAM
  • Overview of JIT Administration
  • Privileged Access Management (PAM)
  • PAM Components
  • Creating an Administrative Forest
  • Configuring Trust Relationships
  • Shadow Principals
  • Configuring the MIM Web Portal
  • Managing and Configuring PAM Roles
  • Chapter 03 Summary
  • Chapter 03 Review
  • Chapter 03 Quiz

Chapter 04 - Configuring Anti-Malware and Patch Management

  • Chapter 04 Introduction
  • Topic A: Configuring and Managing Windows Defender
  • Understanding Malware
  • Malware Sources
  • Mitigation Methods
  • Windows Defender
  • Demo - Using Windows Defender
  • Topic B: Restricting Software
  • Controlling Applications
  • Software Restriction Policies
  • Security Levels
  • AppLocker
  • Support for AppLocker
  • AppLocker Rules
  • Creating Default Rules
  • Demo - Using AppLocker
  • Topic C: Using Device Guard
  • Overview of Device Guard
  • Device Guard Features
  • Configuring Device Guard
  • Device Guard Policies
  • Deploying Code Integrity Policies
  • Control Flow Guard
  • Topic D: Patch Management with WSUS
  • Overview of WSUS
  • Deployment Options
  • Server Requirements
  • Configuring Clients
  • Administering WSUS
  • Approving Updates
  • Demo - Installing and Configuring WSUS
  • Chapter 04 Summary
  • Chapter 04 Review
  • Chapter 04 Quiz

Chapter 05 - Auditing and Advanced Threat Analytics

  • Chapter 05 Introduction
  • Topic A: Configuring Auditing for Windows Server 2016
  • Overview of Auditing
  • The Purpose of Auditing (
  • Types of Events
  • Auditing Goals
  • Auditing File and Object Access
  • Demo - Configuring Auditing
  • Topic B: Advanced Auditing and Management
  • Advanced Auditing
  • Advanced Auditing Subcategories
  • Dynamic Auditing
  • Event Log Subscriptions
  • Audit Collection Services (ACS)
  • Demo - Configuring Event Forwarding (6:59)
  • Start
  • Auditing with Windows PowerShell (1:58)
  • Start
  • Demo - Using PowerShell with Audit Logs
  • Transaction Logging
  • Module Logging
  • Script Block Logging
  • Demo - Configuring PowerShell Logging
  • Topic C: Deploying and Configuring ATA
  • Overview of ATA
  • Usage Scenarios
  • Deployment Requirements
  • ATA Gateways
  • Port Mirroring
  • Configuring ATA Center
  • Topic D: Deploying and Configuring Operations Management Suite
  • Introduction to Operations Management Suite
  • Deployment Overview
  • OMS Solutions
  • Installing OMS
  • OMS Solutions
  • Chapter 05 Summary
  • Chapter 05 Review
  • Chapter 05 Quiz

Chapter 06 - Securing the Infrastructure

  • Chapter 06 Introduction
  • Topic A: Secure the Virtualization Infrastructure
  • Introduction to Guarded Fabric
  • Host Guardian Service
  • Preparing HGS Nodes
  • Installing and Configuring HGS
  • Attestation and Encryption
  • Attestation Methods
  • Initializing HGS
  • Configuring HSG Clients
  • Topic B: Deploying Security Baselines
  • Security Compliance Manager (SCM)
  • SCM Requirements
  • Demo - Installing SCM
  • Demo - Configuring and Deploying Security Baselines
  • Topic C: Deploying Nano Server
  • Planning for Nano Server
  • Understanding Nano Server Roles
  • Installing Nano Server Roles
  • Nano Server Installation
  • Installation Steps
  • Chapter 06 Summary
  • Chapter 06 Review
  • Chapter 06 Quiz

Chapter 07 - Configuring Data Protection

  • Chapter 07 Introduction
  • Topic A: Planning and Implementing File Encryption
  • Introducing Encrypting File System
  • EFS Features
  • Encryption and Decryption
  • Recovering EFS Files
  • Demo - Using EFS
  • Topic B: Planning and Implementing BitLocker
  • Overview of BitLocker
  • BitLocker and TPMs
  • BitLocker Requirements
  • Tools for Configuring and Managing BitLocker
  • Deploying BitLocker
  • Demo - Deploying BitLocker
  • BitLocker on Hyper-V VMs
  • BitLocker and CSVs
  • Enabling BitLocker for CSV
  • Network Unlock
  • Network Unlock Process
  • BitLocker Recovery
  • Microsoft BitLocker Administration and Monitoring (MBAM)
  • Chapter 07 Summary
  • Chapter 07 Review
  • Chapter 07 Quiz

Chapter 08 - Advanced File Server Management

  • Chapter 08 Introduction
  • Topic A: Using File Server Resource Manager
  • Capacity Managemen
  • Storage Management
  • Introduction to FSRM
  • Storage Management with File Server Resource Manager
  • Overview of FSRM
  • Installing and Configuring FSRM
  • Demo - Installing and Configuring FSRM
  • Quota Management
  • Demo - Create and Manage Quotas
  • File Screening
  • Using File Groups
  • Exceptions and Templates
  • Demo - Implementing File Screening
  • Storage Reports
  • Report Tasks
  • Demo - Generating Storage Reports
  • Automatic File Management
  • Topic B: Implementing Classification and File Management Tasks
  • File Classification
  • Classification Rules
  • Demo - Configure File Classification
  • File Management Tasks
  • Topic C: Working with Dynamic Access Control
  • Overview of Dynamic Access Control
  • Dynamic Access Control Scenarios
  • DAC Technologies
  • Understanding Identity
  • Understanding Claims
  • Types of Claims
  • Central Access Policies
  • Policy Components
  • DAC Prerequisites
  • Demo - Implementing DAC
  • Chapter 08 Summary
  • Chapter 08 Review
  • Chapter 08 Quiz

Chapter 09 - Securing the Network Infrastructure

  • Chapter 09 Introduction
  • Topic A: Using the Windows Firewall with Advanced Security
  • Types of Firewalls
  • Well-Known Ports
  • Host-Based Firewall
  • Network Profiles
  • Configuring the Windows Firewall
  • Demo - Working with the Windows Firewall (
  • Topic B: Datacenter Firewall
  • Network Controller
  • Datacenter Firewall
  • Network Security Groups
  • Scenarios for Datacenter Firewall
  • Topic C: Utilizing IP Security
  • Overview of IP Security
  • IPSec Protocols
  • IPSec Usage Scenarios
  • IPSec Configuration Tools
  • Connection Security Rules
  • Understanding Rule Types
  • Rule Endpoints
  • Authentication Settings
  • Authentication Methods
  • Encryption Settings
  • Monitoring Connections
  • Demo - Implementing IPSec
  • Topic D: Configuring Advanced DNS Settings
  • Managing DNS Services
  • Optimizing DNS Name Resolution
  • The GlobalNames Zone
  • Implementing DNS Security
  • DNS Security (DNSSEC)
  • Implementing DNSSEC
  • Demo - Configuring DNSSEC
  • Introducing DNS Policies
  • Implementing DNS Policies
  • RRL Feature
  • Demo - Configuring DNS Policies
  • Topic E: Monitoring Network Traffic
  • Microsoft Message Analyzer
  • Demo - Using Microsoft Message Analyzer
  • Topic F: Securing SMB Traffic
  • SMB 3.1.1 Protocol Security
  • SMB Encryption Requirements
  • Encrypting SMB Shares
  • Disabling Support for SMB 1.0
  • Chapter 09 Summary
  • Chapter 09 Review
  • Chapter 09 Quiz

Microsoft 70-742: Identity in Windows Server 2016

Course Introduction

  • Introduction
  • Course Introduction
  • Instructor Introduction

Chapter 01 - Installing and Configuring Domain Controllers

  • Chapter 01 Introduction
  • Topic A: Overview of Active Directory Domain Services
  • Information Protection Concepts
  • Identity and Access (IDA)
  • Authentication and Authorization
  • AD DS Terms
  • Access Tokens
  • Access Control Lists
  • The Kerberos Logon Process
  • Workgroup vs. Domain
  • Understanding AD DS Domains
  • AD DS Components and Concepts
  • Active Directory Database
  • Physical Data Store
  • Logical Partitions
  • Active Directory Schema
  • Domains
  • Trees and Forests
  • Organizational Units
  • AD DS Sites
  • Controlling Replication
  • Trust Relationships
  • Topic B: Overview of Domain Controllers
  • Introducing Domain Controllers
  • Global Catalog Servers
  • Read-Only Domain Controllers
  • FSMO Role
  • Demo - Working with FSMO Roles
  • Locating Domain Controllers
  • Demo - Viewing SRV Records
  • Topic C: Deploying Domain Controllers
  • Reasons for Multiple Domain Controllers
  • Installing from Server Manager
  • Considerations for Installing Domain Controllers
  • Demo - Installing a Domain Controller
  • Installing on Server Core
  • Demo - Promoting a Server Core DC
  • Upgrading Domain Controllers
  • Additional Installation Options
  • Cloning Domain Controllers
  • Demo - Cloning Domain Controllers
  • Chapter 01 Summary
  • Chapter 01 Review
  • Chapter 01 Quiz

Chapter 02 - Managing Active Directory Objects

  • Chapter 02 Introduction
  • Topic A: Overview of AD DS Object Management
  • Understanding AD DS Objects
  • Names for AD DS Objects
  • Management Tools
  • Demo - Overview of AD DS Management Tools
  • Topic B: Managing User Accounts
  • The Importance of the User Account
  • Naming Considerations
  • Configuring User Passwords
  • Creating User Accounts
  • Demo - Creating AD DS Users
  • Managing User Attributes
  • User Account Management
  • Demo - Managing Users
  • Topic C: Managing Groups
  • Group Types and Scopes
  • Types of Groups
  • Group Scopes
  • Domain Local and Global Groups
  • Universal Groups
  • Group Nesting
  • Group Naming Considerations
  • Creating and Configuring Groups
  • Demo - Creating and Configuring Groups
  • Introduction to Default Groups
  • Identifying Default Groups
  • Administrative Groups
  • Demo - Configuring Default Groups
  • Using Special Identities
  • Strategies for Using Groups
  • Group Nesting Strategies
  • Demo - Group Nesting
  • Topic D: Managing Computer Accounts
  • Introduction to Computer Accounts
  • Creating Computer Accounts
  • Working with Secure Channel Passwords
  • Offline Domain Joins
  • Demo - Working with Computer Accounts
  • Topic E: Managing Organizational Units
  • Planning Organizational Units
  • OU Hierarchy Considerations
  • Creating OUs
  • Demo - Creating an OU Hierarchy
  • Object Security in AD DS
  • AD DS Object Permissions
  • Demo - Viewing Object Permissions in Active Directory
  • Delegating Administrative Control
  • Modifying Delegated Rights
  • Best Practices for Administrative Delegation
  • Demo - Delegating Administrative Control
  • Chapter 02 Summary
  • Chapter 02 Review
  • Chapter 02 Quiz

Chapter 03 - Securing Active Directory Domain Services

  • Chapter 03 Introduction
  • Topic A: Securing Domain Controllers
  • Understanding Security Risks
  • Using Group Policy
  • Group Policy Security Settings
  • Securing the Authentication Process
  • Physical Access Security
  • Branch Office Domain Controllers
  • RODC Features
  • RODC Limitations and Considerations
  • Deploying RODCs
  • Demo - Installing an RODC
  • Password Replication Policies
  • Topic B: Implementing Account Security
  • Account Security in Windows Server 2016
  • Complexity Options
  • Password Policies
  • Account Lockout Policies
  • Configuring Domain Password and Lockout Policies
  • Demo - Configuring Account Policies in Group Policy
  • Configuring Fine -Grained Password Policies
  • Configuring Fine -Grained Password Policies Part 2
  • Configuring Fine -Grained Password Policies Part 3
  • Demo - Configuring Fine -Grained Password Policies
  • Restricted Groups
  • Protected Users Security Groups
  • Authentication Policies
  • Authentication Silos
  • Enhancing Password Authentication
  • Topic C: Auditing AD DS
  • Utilizing Auditing
  • The Purpose of Auditing
  • Types of Events
  • Auditing Goals
  • Auditing File and Object Access
  • Advanced Auditing
  • Demo - Configuring Auditing
  • Topic D: Configuring Managed Service Accounts
  • Overview of Service Accounts
  • Challenges to Managing Service Accounts
  • Managed Service Accounts
  • Group MSAs
  • Demo - Configuring Group MSAs
  • Chapter 03 Summary
  • Chapter 03 Review
  • Chapter 03 Quiz

Chapter 04 - Working with Complex AD DS Infrastructures

  • Chapter 04 Introduction
  • Topic A: Overview of Advanced AD DS Deployments
  • Domain Boundaries
  • Forest Boundaries
  • Reasons for Implementing Multiple Domains
  • Reasons for Implementing Multiple Forests
  • Deploying Domain Controllers in Azure
  • Managing Objects
  • Topic B: Deploying a Distributed AD DS Environment
  • Domain Functional Levels
  • Forest Functional Levels
  • Deploying AD DS Domains
  • DNS Considerations
  • UPN Considerations
  • Demo - Deploying a Child Domain
  • Understanding Trust Relationships
  • Types of Trusts
  • How Trusts Work
  • Forest Trusts
  • Advanced Trust Settings
  • Demo - Configuring a Forest Trust
  • Topic C: Overview of AD DS Replication
  • AD DS Partitions
  • AD DS Replication
  • Types of Replication
  • Resolving Replication Conflicts
  • Topic D: Configuring AD DS Sites
  • Reasons for Sites
  • Planning for Sites
  • Overview of Sites and Subnets
  • Moving Domain Controller Accounts
  • Domain Controller Placement
  • Demo - Creating Sites
  • Controlling Inter -Site Replication
  • Defining Site Links
  • Site Links
  • Site Link Properties
  • Demo - Creating Site Links
  • Bridgehead Servers
  • Bridging Site Links
  • Monitor and Manage Replication
  • Chapter 04 Summary
  • Chapter 04 Review
  • Chapter 04 Quiz

Chapter 05 - Implementing Group Policy

  • Chapter 05 Introduction
  • Topic A: Overview of Group Policy
  • What is Group Policy?
  • Group Policy Settings
  • Local Group Policies
  • Policies vs. Preferences
  • Demo - Examining Policy Settings
  • Domain Policies
  • GPO Storage
  • Linking GPOs
  • GPO Processing Order
  • Controlling Inheritance
  • Determining Inheritance
  • GPO Link Options
  • Security Filtering
  • WMI Filtering
  • Refreshing Policies
  • Other Processing Options
  • Topic B: Creating and Configuring GPOs
  • Creating GPOs
  • Starter GPOs
  • Administrative Templates
  • Group Policy Preferences
  • Demo - Creating and Configuring Policies
  • Group Policy Management
  • Delegation of Control
  • Demo - Managing GPOs
  • Topic C: Monitoring and Troubleshooting Group Policy
  • Troubleshooting Group Policy Application
  • Troubleshooting Group Policy Application
  • Demo - Troubleshooting Group Policy Application
  • Topic D: Security Management Using Group Policy
  • Security Management Using Group Policy
  • Configuring User Rights
  • Managing Security Option s
  • User Account Control
  • Demo - Managing Security Options
  • Controlling Applications
  • Software Restriction Policies
  • Security Levels
  • AppLocker
  • Support for AppLocker
  • AppLocker Rules
  • Creating Default Rules
  • Demo - Controlling Applications Using Group Policy
  • Configuring the Windows Firewall
  • Windows Firewall with Advanced Security
  • Firewall Profiles
  • Creating Firewall Rules
  • Configuring the Windows Firewall
  • Types of Rules
  • Connection Security Rules
  • Demo - Configuring Firewalls using Group Policy
  • Topic E: Managing User Environments
  • Using Scripts in Group Policy
  • What is Folder Redirection?
  • Common Folders for Redirection
  • Redirection Options
  • Demo - Configuring Folder Redirection
  • Deploying Software Using Group Policy
  • How Software Distribution Works
  • Using Windows Installer
  • Software Life Cycle
  • Deploying Software
  • Deployment Options
  • Maintaining Software through Group Policy
  • Removing Software Deployments
  • Chapter 05 Summary
  • Chapter 05 Review
  • Chapter 05 Quiz

Chapter 06 - Understanding Microsoft Azure AD and Directory Synchronization

  • Chapter 06 Introduction
  • Topic A: Planning Directory Synchronization
  • Overview of Azure AD
  • Limitations of AD DS
  • Extending AD DS Authentication
  • Comparing AD DS and Azure AD
  • Authentication Options
  • Planning Directory Synchronization
  • Enabling AD DS Synchronization
  • Topic B: Implementing Azure AD Connect
  • What is Azure AD Connect?
  • Azure AD Connect Requirements
  • Azure AD Connect Express Settings
  • Azure AD Connect Custom Installation
  • Monitoring Azure AD
  • Privileged Identity Management
  • Topic C: Managing Identities with Directory Synchronization
  • Managing Users
  • Managing Groups
  • Filtering Azure AD Connect
  • Monitoring Directory Synchronization
  • Troubleshooting Directory Synchronization
  • Chapter 06 Summary
  • Chapter 06 Review
  • Chapter 06 Quiz

Chapter 07 - Monitoring and Recovering AD DS

  • Chapter 07 Introduction
  • Topic A: Monitoring AD DS
  • Performance Monitoring Benefits
  • Establishing Performance Baselines
  • Introduction to Monitoring Tools
  • Event Viewer
  • Demo - Using Event Viewer
  • Reliability Monitor
  • Real -Time Monitoring
  • Data Collector Sets
  • Data Collection Points
  • Common AD DS Counters
  • Best Practices
  • Topic B: Database Management
  • Physical Data Store
  • Using NTDSUtil
  • AD DS Maintenance
  • Topic C: Backup and Recovery in AD DS
  • Disaster Recovery for Active Directory
  • Backing Up Active Directory
  • Using Backup Tools
  • Backup Requirements
  • Restoring Data
  • Additional Restore Options
  • Demo - Enabling the AD Recycle Bin
  • Best Practices for Backup and Recovery
  • Chapter 07 Summary
  • Chapter 07 Review
  • Chapter 07 Quiz

Chapter 08 - Implementing Active Directory Certificate Services

  • Chapter 08 Introduction
  • Topic A: Overview of Public Key Infrastructure and AD CS
  • What is a PKI?
  • Encryption Types
  • PKI Components
  • PKI Enabled Applications
  • Certificate Authorities
  • CA Types
  • Internal vs. External CAs
  • AD CS in Windows Server 2016
  • Topic B: Deploying Certificate Authority Hierarchy
  • Decision Factors for CA Hierarchy
  • CA Hierarchy Roles
  • Best Practices for CA Hierarchies
  • Installing Root CAs
  • Installing Root CAs Part 2
  • Demo - Installing a Root CA
  • Installing Subordinate CAs
  • Benefits of Using Subordinates
  • Automating Installations
  • Topic C: Administering Certificate Authorities
  • Administration Tools
  • Configuring CA Security
  • Security Roles for CA Administration
  • Policy and Exit Modules
  • Certificate Revocation Lists (CRL)
  • Publishing the CRL
  • Publishing AIAs and CDPs
  • Topic D: Deploying and Managing Certificates
  • Digital Certificates
  • Certificate Templates
  • Template Versions in Windows Server 2016
  • Certificate Template Permissions
  • Updating Templates
  • Demo - Modifying and Enabling a Certificate Template
  • Enrollment Types
  • Manual Enrollment
  • Automating Enrollment
  • Autoenrollment Components
  • Demo - Configuring Autoenrollment
  • Credential Roaming
  • Topic E: Managing Revocation and Distribution
  • Certificate Revocation
  • Online Responder
  • Online Responder Process
  • Comparing CRL and OCSP
  • Configuring an Online Responder
  • Topic F: Configuring Certificate Recovery
  • Importance of Key Archival and Recovery
  • Key Archival
  • Data Recovery vs. Key Recovery
  • Archival Methods
  • Export Methods
  • Automating Archival
  • Recovering Lost Keys
  • Chapter 08 Summary
  • Chapter 08 Review
  • Chapter 08 Quiz

Chapter 09 - Implementing Active Directory Federation Services (AD FS)

  • Chapter 09 Introduction
  • Topic A: Overview of AD FS
  • What is Identity Federation?
  • Federation Benefits
  • AD FS Components
  • Additional AD FS Terms
  • Identity Federation Scenarios
  • Business to Business Scenario
  • Business to Employee Scenario
  • Business to Consumer Scenario
  • New Features in Windows Server 2016
  • Topic B: Planning and Deploying AD FS
  • AD FS Requirements
  • Server Roles
  • Planning High Availability
  • AD FS Claims
  • AD FS Claim Rules
  • Trust Relationships
  • Installing AD FS
  • Demo - Installing AD FS
  • Configuring Partners
  • Home Realm Discovery
  • Managing AD FS
  • Topic C: Overview of Web Application Proxy
  • Introducing the Web Application Proxy
  • Web Application Proxy and AD FS Proxy
  • Authentication Methods
  • Publishing Software
  • Chapter 09 Summary
  • Chapter 09 Review
  • Chapter 09 Quiz

Chapter 10 - Implementing Active Directory Rights Management Services

  • Chapter 10 Intoduction
  • Topic A: Overview of AD RMS
  • Introducing AD RMS
  • The AD RMS Difference
  • AD RMS Components
  • Certificates and Licenses
  • Protecting Content
  • Consuming Content
  • Azure RMS
  • Topic B: Deploying AD RMS
  • Deployment Scenarios
  • Installation Overview
  • AD RMS Configuration
  • Demo - Installing AD RMS Cluster
  • AD RMS Management
  • External Sharing
  • Topic C: Protecting Content with AD RMS
  • Rights Policy Templates
  • Configuring Templates for Offline Usage
  • Demo - Configuring Rights Management Templates
  • Exclusion Policies
  • Chapter 10 Summary
  • Chapter 10 Review
  • Chapter 10 Quiz
  • Course Closure

Microsoft 70-741 – Networking with Windows Server 2016

Course Introduction

  • Introduction
  • Course Introduction
  • Instructor Introduction

Chapter 01 - Plan and Implement IPv4 and IPv6 Networks

  • Chapter 1 Introduction
  • Topic A: Plan and Implement IP Addressing Schemes for IPv4 Networks
  • General Networking Requirements
  • IPv4 Required Settings
  • IPv4 Addresses
  • IPv4 Subnet Masks
  • Default Gateways
  • Demo - Understanding Binary Addressing
  • IPv4 Address Classes
  • What are Subnets?
  • The Subnetting Method
  • Subnet Creation Process
  • Demo - Subnetting a Network
  • IPv4 Address Types
  • IPv4 Network Types
  • Demo - Examining VLSM
  • Topic B: Configuring IPv4 Hosts
  • IPv4 Configuration
  • IPv4 Configuration Tools
  • Demo - Configuring IPv4
  • Topic C: Managing and Troubleshooting IPv4 Connectivity
  • Network Routing
  • Working with Routing Tables
  • Adding Static Routes
  • IPv4 Troubleshooting Methodology
  • Command Line Troubleshooting Tools
  • Graphical Troubleshooting Tools
  • Troubleshooting with Windows PowerShell
  • Demo - Troubleshooting IPv4
  • Microsoft Message Analyzer
  • Topic D: Implementing IPv6 for Network Hosts
  • The Purpose of IPv6
  • Reasons to Use IPv6
  • Comparing IPv4 and IPv6
  • IPv6 Address Structure
  • IPv6 Address Types
  • IPv6 Autoconfiguration
  • Configuring IPv6
  • Tools for Configuring IPv6
  • Topic E: Implementing IPv6 Transitioning and Coexistence
  • Understanding Node Types
  • Options for Coexistence
  • IPv6 over IPv4 Tunneling
  • Understanding ISATAP
  • Understanding 6to4
  • Understanding Teredo
  • Transitioning Process
  • Chapter 01 Summary
  • Chapter 01 Review
  • Chapter 01 Quiz

Chapter 02 - Installing and Configuring DHCP

  • Chapter 2 Introduction
  • Topic A: Overview of the DHCP Server Role
  • Introducing DHCP
  • DHCP Components and Processes
  • Lease Generation Process
  • Lease Renewal Process
  • DHCP Considerations
  • Topic B: Deploying DHCP
  • Install and Configure a DHCP Server
  • DHCP Authorization
  • Demo - Installing DHCP
  • Creating Scopes
  • Configuring DHCP Options
  • Demo - Creating and Configuring Scopes
  • DHCP Relay Agents
  • Topic C: Managing and Troubleshooting DHCP
  • Implementing Security for DHCP
  • DHCP Auditing
  • Demo - Configuring Security and Auditing
  • DHCP Advanced Options
  • Additional Scope Types
  • High Availability for DHCP
  • DHCP Failover
  • Demo - Configuring DHCP Failover
  • DHCP Database
  • Migrating DHCP
  • Troubleshooting DHCP
  • Chapter 02 Summary
  • Chapter 02 Review
  • Chapter 02 Quiz

Chapter 03 - Installing and Configuring DNS

  • Chapter 03 Introduction
  • Topic A: Implementing DNS Servers
  • Name Resolution Basics
  • What is DNS?
  • DNS Namespace
  • Types of Names
  • Internet Name Resolution
  • DNS Components
  • DNS Zones and Resource Records
  • Installing the DNS Server
  • Demo - Installing DNS
  • Topic B: Creating and Configuring DNS Zones
  • Resource Records
  • Zone Types
  • Replicating Zones
  • Demo - Creating and Configuring DNS Zones
  • Standard DNS Name Resolution
  • Modifying DNS Name Resolution
  • Working with DNS Cache
  • Demo - Configuring Cache and Forwarding
  • Understanding Domain Delegation
  • Demo - Domain Delegation
  • Topic C: Understanding Active Directory Integration
  • Overview of AD DS and DNS Integration
  • SRV Records
  • Demo - Examining SRV Records
  • Active Directory Integrated Zones
  • Application Partitions
  • Demo - Configuring Active Directory Integrated Zones
  • Topic D: Configuring Advanced DNS Settings
  • Advanced Name Resolution
  • The GlobalNames Zone
  • Demo - Configuring the GlobalNames Zone
  • Split DNS
  • Introducing DNS Policies
  • DNS Policy Objects
  • Demo - Configuring DNS Policies
  • Implementing DNS Security
  • DNS Security (DNSSEC)
  • Implementing DNSSEC
  • Topic E: Troubleshooting DNS Name Resolution
  • Introduction to DNS Troubleshooting
  • Obtaining DNS Server Statistics
  • Command Line Tools
  • Troubleshooting Process
  • Managing DNS Services
  • Testing DNS Servers
  • Demo - Managing and Troubleshooting DNS
  • Chapter 03 Summary
  • Chapter 03 Review
  • Chapter 03 Quiz

Chapter 04 - Implementing and Managing IP Address Management

  • Chapter 04 Introduction
  • Topic A: Overview of IPAM
  • Introducing IPAM
  • IPAM Benefits
  • New Features in Windows Server 2016
  • IPAM Architecture
  • IPAM Deployment Requirements
  • IPAM Deployment Considerations
  • Topic B: IPAM Deployment
  • Implementing IPAM
  • Demo - Installing and Provisioning the IPAM Role
  • IPAM Administration
  • Default IPAM Groups
  • Demo - Administering IPAM
  • Configuring IPAM Options
  • Demo - Managing DNS and DHCP Servers using IPAM
  • Topic C: Managing IP Address Spaces by using IPAM
  • Managing IP Addressing
  • Viewing and Managing IP Addressing
  • Monitoring DHCP and DNS Servers
  • Adding Address Spaces
  • Finding, Allocating, and Reclaiming
  • Demo - Managing IP Addressing with IPAM
  • Chapter 04 Summary
  • Chapter 04 Review
  • Chapter 04 Quiz

Chapter 05 - Implementing Remote Access

  • Chapter 05 Introduction
  • Topic A: Remote Access Overview
  • What is Remote Access?
  • Remote Access Options
  • Managing Remote Access
  • Demo - Installing the Remote Access Role
  • The Remote Access Management Console
  • Network Policy Server
  • NPS Policies
  • Using a PKI for Remote Access
  • Routing with Windows Server 2016
  • Network Address Translation
  • Topic B: Implementing the Web Application Proxy
  • Overview of Web Application Proxy
  • Authentication Options
  • Configuring the Web Application Proxy
  • Topic C: Planning and Implementing VPNs
  • Remote Access with VPNs
  • VPN Connection Properties
  • Tunneling Protocols
  • Authentication Protocols
  • VPN Reconnect
  • App - triggered VPNs
  • Configuring a VPN Server
  • VPN Configuration Options
  • Demo - Configuring a VPN Server
  • Topic D: Overview of DirectAccess
  • Introducing DirectAccess
  • DirectAccess Components
  • Deployment Options
  • DirectAccess Server Prerequisites (
  • Tunneling Protocol Options
  • DirectAccess Process Internally
  • DirectAccess Process Externally
  • Topic E: Implementing DirectAccess
  • Simple DirectAccess Configuration
  • Configuration Changes
  • Limitations of Simple Configuration
  • Advanced DirectAccess Options
  • High Availability
  • Multisite Deployments
  • Configuring a PKI for DirectAccess
  • Implementing Client Certificates
  • Internal Network Configuration Options
  • Configuring DNS Settings
  • Monitoring DA Connectivity
  • Chapter 05 Summary
  • Chapter 05 Review
  • Chapter 05 Quiz

Chapter 06 - Installing and Configuring Branch Office Networking

  • Chapter 06 Introduction
  • Topic A: Configuring Networking for Branch Offices
  • Branch Office Scenarios
  • Considerations for Branch Offices
  • WAN Connectivity
  • Network Services for Branch Offices
  • Implementing RODCs
  • Demo - Installing an RODC
  • Remote Desktop Services
  • File Services for Branch Offices
  • Print Services for Branch Offices
  • Topic B: Implementing Distributed File Systems
  • Introducing DFS
  • DFS Components
  • Types of DFS Namespaces
  • Deploying DFS Namespaces
  • Creating and Managing a DFS Namespace
  • Demo - Creating a DFS Namespace
  • DFS Replication
  • DFS Scenarios
  • Demo - Configuring Replication
  • Optimizing DFS
  • Managing the DFS Database
  • Monitoring and Troubleshooting DFS
  • Topic C: Implementing BranchCache
  • Introducing BranchCache
  • BranchCache in Windows Server 2016
  • BranchCache Modes
  • Data Retrieval using BranchCache
  • BranchCache Requirements
  • Demo - Configuring and Enabling BranchCache
  • Chapter 06 Summary
  • Chapter 06 Review
  • Chapter 06 Quiz

Chapter 07 - Implementing Advanced Networking Features

  • Chapter 07 Introduction
  • Topic A: Implementing Networking Features for High Performance
  • High Performance Networking Features
  • NIC Teaming
  • Demo - Implementing NIC Teaming
  • SMB 3.1.1 Shared Folders
  • Advanced SMB 3.1.1 Functionality
  • Quality of Service (QoS)
  • Understanding RSS
  • Understanding RSC
  • Topic B: Implementing Hyper-V Advanced Networking Features
  • Virtual Switch Improvements
  • Extensible Virtual Switch
  • Understanding SR-IOV
  • Dynamic VMQ
  • Advanced Features for Network Adapters
  • NIC Teaming in Virtual Machines
  • Topic C: Introduction to Software-Defined Networking
  • SDN Concepts and Tools
  • SDN Benefits
  • Planning for Software-Defined Networking
  • SDN Deployments
  • Topic D: Overview of Network Virtualization
  • Introduction to Network Virtualization
  • Network Virtualization Benefits
  • Generic Route Encapsulation
  • Chapter 07 Summary
  • Chapter 07 Review
  • Course Closure
  • Chapter 07 Quiz

Microsoft 70-740 - Install, Storage & Compute with Windows Server 2016

Course Introduction

  • Introduction
  • Course Introduction
  • Instructor Introduction

Chapter 01 - Installing Windows Servers in Host and Computer Environments

  • Chapter 01 Introduction
  • Topic A: Determining Windows Server 2016 Installation
  • Installing Windows Server 2016
  • Introduction to Windows Server 2016
  • Windows Server Editions
  • Hardware Requirements
  • Hardware Considerations
  • Installation Options
  • Options for Managing Servers
  • Windows Powershell
  • Windows Powershell Basics
  • Demo - Using Windows PowerShell
  • What's New Since 2008?
  • What's New in Windows Server 2016
  • Topic B: Installing Windows Server 2016 Core and Nano Editions
  • Planning For Installation
  • Planning for Nano Server
  • Understanding Nano Server Roles
  • Installing Nano Server Roles
  • Planning for Server Core
  • Server Core vs. Nano Server
  • Nano Server Installation
  • Installation Steps
  • Alternative Steps to Install Nano Server
  • Demo - Performing Nano Server Installation
  • Managing and Configuring Nano
  • Demo - Configuring Nano Server
  • Installing Server Core
  • Demo - Installing Windows Server 2016
  • Demo - Configure the Local Installation
  • Upgrades vs. Migrations
  • Choosing In-Place Upgrades
  • Choosing to Migrate
  • Installation and Migration Tools
  • Choosing an Activation Model
  • Activation Methods
  • Topic C: Managing Windows Installations with Windows PowerShell
  • Post Installation Tasks
  • Topic D: Create, Manage, and Maintain Windows Images to Deploy
  • Creating and Managing Deployment Images
  • File-Based Imaging
  • Windows Image File Format
  • Types of Images
  • Image-Based Installation Tools
  • Creating Install Images
  • Considerations for Image Creation
  • Windows ADK for Windows 10
  • Basic Deployment Process
  • Windows Deployment Services
  • WDS Components
  • Microsoft Deployment Toolkit 2013
  • Chapter 01 Summary
  • Chapter 01 Review
  • Chapter 01 Quiz

Chapter 02 - Implementing Local and Enterprise Storage Solutions

  • Chapter 02 Introduction
  • Topic A: Managing Disks and Volumes in Windows Server 2016
  • Managing Disks and Volumes
  • Partition Table Formats
  • Disk Types
  • Required Disk Volumes
  • File Systems
  • Resilient File System
  • Demo - Working with File Systems
  • Virtual Hard Disks
  • Managing Virtual Hard Disks
  • Selecting Physical Disk Types
  • Working with Disk Volumes
  • Volume Management Tools
  • Demo - Managing Volumes
  • Understanding RAID
  • Hardware vs. Software RAID
  • RAID Types
  • Topic B: Implementing and Managing Storage Spaces
  • Implementing and Managing Storage Spaces
  • Requirements for Storage Spaces
  • Storage Space Features
  • Demo - Configuring Storage Spaces
  • Changes to Storage Spaces
  • Storage Space Usage Scenarios
  • Storage Spaces Direct Deployment Scenarios
  • Managing Storage Spaces
  • Using Windows PowerShell with Storage Spaces
  • Managing Disk Failure with Storage Spaces
  • Monitoring Storage Spaces
  • Topic C: Configuring Data Deduplication
  • Overview of Data Deduplication
  • Enhancements in Windows Server 2016
  • Data Deduplication Requirements
  • Data Deduplication Components
  • Data Deduplication Process
  • Planning Data Deduplication
  • Data Deduplication Usage Scenarios
  • Demo - Installing and Configuring Data Deduplication
  • Monitoring and Maintaining Data Deduplication
  • Topic D: Understanding Various Types of Storage
  • Overview of Storage Solutions
  • Direct Attached Storage
  • Network Attached Storage
  • Storage Area Networks
  • Comparing Storage Solutions
  • Comparing Storage Technology
  • Topic E: Fibre Channel, iSCSI, and Fibre Channel over Ethernet
  • Fibre Channel
  • Fibre Channel Layouts
  • Fibre Channel Considerations
  • iSCSI
  • iSCSI Target Server
  • iSCSI Initiator
  • Considerations for Implementing iSCSI
  • Topic F: Understanding iSNS, DCB, and MPIO
  • iSNS
  • iSNS Functions and Installation
  • Data Center Bridging
  • MPIO
  • Topic G: Configuring File and Folder Sharing in Windows Server 2016
  • Configuring Sharing in Windows Server 2016
  • Server Message Block
  • Configuring SMB Shares
  • Demo - Configuring SMB Shares
  • Network File System
  • Configuring NFS Shares
  • Chapter 02 Summary
  • Chapter 02 Review
  • Chapter 02 Quiz

Chapter 03 - Implementing Hyper-V Virtualization

  • Chapter 03 Introduction
  • Topic A: Installing Hyper-V Virtualization
  • Introducing Hyper-V
  • New Host Features in Windows Server 2016
  • New VM Features in Windows Server 2016
  • Introducing Windows Server Containers
  • Hyper-V Prerequisites
  • Nested Virtualization
  • Demo - Installing the Hyper-V Role
  • Topic B: Configuring Storage and Networking on Hyper-V Hosts
  • Using Virtual Hard Disks in Hyper-V
  • Virtual Hard Formats
  • Virtual Hard Disk Types
  • Considerations for Virtual Hard Disks
  • Fibre Channel in Hyper-V
  • Choosing Storage for Virtual Machines
  • Demo - Managing Storage in Hyper-V
  • Hyper-V Networks
  • Demo - Creating a Virtual Switch
  • Considerations for Hyper-V Networks
  • New Features in Windows Server 2016
  • Topic C: Configuring and Managing Virtual Machines
  • Overview of Virtual Machines
  • Configuration Versions
  • Generation Versions
  • Demo - Creating Virtual Machines
  • Virtual Machine Settings
  • New Options in Windows Server 2016
  • Shielded Virtual Machines
  • Best Practices for Virtual Machines
  • Overview of Virtual Machine Management
  • Managing Virtual Machine States
  • Working with Checkpoints
  • Importing and Exporting VMs
  • Windows PowerShell Direct
  • Chapter 03 Summary
  • Chapter 03 Review
  • Chapter 03 Quiz

Chapter 04 - Implementing Windows Containers

  • Chapter 04 Introduction
  • Topic A: Understanding Windows Server and Hyper-V Containers
  • Overview of Windows Server Containers
  • Concepts and Definitions
  • Windows Server Containers
  • Overview of Hyper-V Containers
  • Benefits of Hyper-V Containers
  • Usage Scenarios
  • Installation Requirements
  • Topic B: Deploying Windows Server and Hyper-V Containers
  • Deploying Windows Server Containers
  • Deploying Hyper-V Containers
  • Managing Containers
  • Demo - Installing the Containers Feature
  • Topic C: Using Docker to Install, Configure, and Manage Containers
  • Overview of Docker
  • Support for Docker in Windows
  • Docker Terminology
  • Docker Toolbox
  • Docker Solutions
  • Management of Docker
  • Overview of Docker Hub
  • Docker with Microsoft Azure
  • Chapter 04 Summary
  • Chapter 04 Review
  • Chapter 04 Quiz

Chapter 05 - Implementing High Availability

  • Chapter 05 Introduction
  • Topic A: Overview of High Availability and Disaster Recovery (
  • Understanding High Availability
  • Continuous Availability
  • Business Continuity
  • Business Continuity Strategies
  • Developing Disaster Recovery Plans
  • Service Level Agreements
  • Highly Available Networking
  • Highly Available Storage
  • High Availability for Virtual Machines
  • Understanding Live Migration
  • Live Migration Process
  • Hyper-V Replica
  • Planning for Hyper-V Replica
  • Implementing Hyper-V Replica
  • Overview of Windows Backup
  • Demo - Installing and Configuring Windows Server Backup
  • Overview of Failover Clustering
  • High Availability through Failover Clustering
  • Failover Clustering Terminology
  • Clustering Types and Categories
  • Topic B: Implementing Network Load Balancing
  • Understanding NLB
  • NLB Operation
  • NLB Features in Windows Server 2016
  • NLB Deployment Requirements
  • Demo - Deploying NLB
  • NLB Configuration Options
  • NLB Host Parameters
  • Network Considerations for NLB
  • Planning NLB Implementation
  • Topic C: Planning and Configuring Failover Clustering
  • The Importance of Planning
  • Application Considerations
  • Storage Considerations
  • Storage Requirements
  • Hardware Requirements
  • Network Requirements
  • Demo - Verifying NIC Capabilities
  • Additional Planning Considerations
  • Introducing Quorum
  • Dynamic Quorum
  • Testing the Configuration
  • Creation Process
  • Demo - Creating a Failover Cluster
  • Cluster Roles
  • Common Cluster Management Tasks
  • Cluster Properties
  • Failover and Failback Configuration
  • Storage Configuration
  • Network Configuration
  • Configuring Quorum Options
  • Demo -Configuring the Quorum
  • Topic D: Maintaining a Failover Cluster
  • Overview of Maintaining Failover Clusters
  • Monitoring Failover Clusters
  • Backup and Restore
  • Troubleshooting Failover Clusters
  • Managing Cluster Communication
  • Cluster Aware Updating (CAU)
  • Topic E: Troubleshooting Failover Clustering
  • Troubleshooting Communication
  • Troubleshooting Cluster Name Objects
  • Quorum Issues
  • Using Event Viewer
  • Using Windows PowerShell
  • Topic F: Integrating Failover Clustering and Hyper-V
  • High Availability Options
  • Host Clustering Overview
  • Failover Clustering for Hyper-V in Windows Server 2016
  • Hyper-V Cluster Components
  • Hyper-V Failover Cluster Prerequisites
  • Implementation Process
  • Cluster Shared Volumes
  • Configuring a Shared Virtual Hard Disk
  • Scale Out File Server (SOFS)
  • SOFS Requirements
  • Topic G: Configuring Site Availability
  • Stretch Clustering
  • Prerequisites for Stretch Clustering
  • Types of Replication
  • Overview of Storage Replica
  • Quorum Modes for Stretch Clusters
  • Chapter 05 Summary
  • Chapter 05 Review
  • Chapter 05 Quiz

Chapter 06 - Maintaining and Monitoring Server Environments

  • Chapter 06 Introduction
  • Topic A: Windows Server Update Services
  • Overview of WSUS
  • Deployment Options
  • Server Requirements
  • Configuring Clients
  • Administering WSUS
  • Approving Updates
  • Demo - Installing and Configuring WSUS
  • Topic B: Windows PowerShell Desired State Configuration (DSC)
  • Overview of PowerShell DSC
  • Requirements for PowerShell DSC
  • Implementing PowerShell DSC
  • Topic C: Windows Server 2016 Monitoring Tools
  • Overview of Monitoring Tools
  • Using Task Manager
  • Demo - Using Task Manager
  • Performance Monitor
  • Demo - Using Performance Monitor
  • Monitoring Resources and Reliability
  • Event Viewer
  • Demo - Using Event Viewer
  • Monitoring with Server Manager
  • Chapter 06 Summary
  • Course Review
  • Course Closure
  • Chapter 6 Quiz

Entry requirements

Students must have basic literacy and numeracy skills.

Minimum education

Open entry. Previous schooling and academic achievements are not required for entry into this course.

Computer requirements

Students will need access to a computer and the internet. 

Minimum specifications for the computer are:

Windows:

  • Microsoft Windows XP, or later
  • Modern and up to date Browser (Internet Explorer 8 or later, Firefox, Chrome, Safari)

MAC/iOS

  • OSX/iOS 6 or later
  • Modern and up to date Browser (Firefox, Chrome, Safari)

All systems

  • Internet bandwidth of 1Mb or faster
  • Flash player or a browser with HTML5 video capabilities(Currently Internet Explorer 9, Firefox, Chrome, Safari)

Students will also need access the following applications:

Adobe Acrobat Reader

1.  Who are Courses For Success?

Courses For Success is a global course platform that started in 2008 with 5 courses, since then we have grown to over 10,000 online courses. As our courses are delivered online via the internet, we sell our courses worldwide.

Our courses span across many categories including Academic, Animal, Beauty, Business, Career, Counseling, Creative & Media, Health & Therapy, Hobbies & Trades, IT, Personal Development, Sports & Fitness.

Some of the companies we work with include Groupon, Living Social, CNN, Entrepreneur, Mashable, Reed UK, Stack Social and many more.

2.  Is there a refund/cancellation policy?

Yes, we have a 7-day money-back refund guarantee. Just send us an email to email/info)(coursesforsuccess.com with the subject Courses For Success Refund so we can accommodate your request.

3.  What is the FREE Personal Success Training Program?

The Personal Success Training Program was developed by Courses For Success to help our customers achieve success. Currently, we are offering this program for FREE with every course or bundle purchase this month. This is a limited time offer! We have received thousands of reviews for this program, please see: Personal Success Training Program Reviews

4.  Are there any requirements to study this course?

No, anyone who has an interest in learning more about this subject matter is encouraged to take our course. There are no entry requirements to take this course.

5.  Do I require to have finished high school to complete this course?

No, you do not require a High School Diploma or to have finished school to study this course, this course is open to anyone who would like to take this course.

6.  What if English is not my first language?

This course is provided in English, however, due to the digital nature of our training, you can take your time studying the material and make use of tools such as google translate and Grammarly.

7.  Is this course online or conducted in person?

All our courses are accessible online on any device. You may complete them at your own pace and at your own time.

8.  How do I receive my course?

After you have completed the payment, you will receive a confirmation email and tax receipt. You will also receive an email containing your course login details (username and password), as well as instructions on how to access and log in to your course via the internet with any device, please check your junk/spam folder in the event that you do not receive the email.

9.  When does this course start?

Providing you have internet access you can start this course whenever you like, just go to the login page and insert your username and password and you can access the online material.

10.  What is online learning like?

Online learning is easy, if not easier than a traditional academic situation. By studying an online course, the usual boundaries caused by location and time constraints are eliminated, meaning you are free to study where and when you want at your own pace. Of course, you will need to be able to self-manage your time and be organized, but with our help, you’ll soon find yourself settling into a comfortable rhythm of study.

11.  What computer skills do I need for my course?

You don't need to be a computer expert to succeed with our online training, but you should be comfortable typing, using the internet and be capable of using common software (such as Microsoft word).

12.  How long will you have access to the online course?

There is no time limit for completing this course, it can be studied in your own time at your own pace. Once you have purchased this course you will have unlimited lifetime access, meaning you can access this course whenever you want.

13.  How long will my course take?

Please see number of Hours to complete on Course Duration, under course summary.

14.  What is included with the course?

The onetime fee includes all training materials, including online content, diagrams, videos if included, interactive instructions and quizzes, plus you will receive a certificate upon completion.

15.  Do I need to buy textbooks?

All the required material for your course is included in the online system, you do not need to buy anything else.

16.  Is the course interactive?

Yes, all our courses are interactive.

17.  Is there an assessment or exam?

Yes, you will be required to complete a multiple-choice test online at the end of your course, you can do this test as many times as you require.

18.  What type of certificate will I receive?

You will receive a Certificate of Completion that is applicable worldwide, which demonstrates your commitment to learning new skills. You can share the certificate with your friends, relatives, co-workers and potential employers. Also, include it in your resume/CV, professional social media profiles and job applications.

Wendy Sue Hunt - 5 STAR REVIEW
"If you are considering taking any “Courses for Success”, I would highly recommend it. I have always been a firm believer it’s important to always sharpen your skills. You are never too old to learn more. I found the courses very helpful, interesting and easy to understand.
The term “Courses for Success” helped me in my current position to succeed. After completing the courses, I gave my manager the completion certificates. Recently I received a promotion too."
Valencia Marie Aviles - 5 STAR REVIEW
"I had a very good experience with my course. It has helped me to get multiple jobs and prepared me for almost everything I would need to know. The course was very informative and easy to understand and broken up perfectly to be done in a short amount of time while still learning a good amount! I would recommend Courses for Success to anyone trying to get abs certifications for job advancements, it is well worth it!"
ELENA GRIFFIN - 5 STAR REVIEW
"I have absolutely enjoyed the materials from Courses for Success. The materials are easy to understand which makes learning enjoyable. Courses for Success have great topics of interest which make you come back for more.
Thank you Courses for Success for being part of my learning journey and making education affordable!"

Our completion certificates are very valuable and will help you progress in your work environment and show employers how committed you are to learn new skills, you might even get a promotion.

19.  Will this course be credited by universities?

No, it is not equivalent to a college or university credit.

20.  Am I guaranteed to get a job with this certificate?

This course will give you the skills you need to help you obtain employment, but it’s up to you if you get the job or not.

21.  How will this course assist me with my career?

Studying and completing this course will show employers that you have the knowledge in this field, additionally you will gain more confidence in this area of expertise.

22.  How long is the certificate valid for?

The Certificates are valid for life and do not need renewing. 

23.  Can I take more than one course at a time?

Courses are studied online at your own pace and you are free to study as many or as few courses as you wish, we also offer online course bundles that allow you to save on additional courses so that you may get all the topics related to your training goals in one go.

24.  What are the Payment Methods available? Is there a payment plan?

We accept payments via PayPal, Credit Card, Bank Transfer and Amazon Pay for the USA. For payment plans, we offer Sezzle for USA & Canada, Afterpay for Australia & New Zealand. *For faster transaction Credit Card payments are preferred. Please purchase online via our website course product page or contact us at email/info)(coursesforsuccess.com, to pay via bank transfer.

25.  Can I purchase for multiple people?

Yes, you can do this by purchasing individually via website or send us a request via email at email/info)(coursesforsuccess.com

26.  Can I request for an invoice before purchase?

Yes, you can request for an invoice via email at email/info)(coursesforsuccess.com

27.  Purchase for a gift?

Yes, you can purchase this course as a gift, simply send an email to email/info)(coursesforsuccess.com, with the course details and we can accommodate this.

28.  Can I create my own course bundle?

Yes, you can customize your own bundle. Please send us the complete list with the exact course link of the courses you'd like to bundle up via email email/info)(coursesforsuccess.com and we will create them for you. *Each course access, time of completion and certification varies depending on the course type.

29.  How will I contact Courses For Success if I have any questions?

You can contact our support team, at any time through live chat on our website, or email at email/info)(coursesforsuccess.com, or by calling one of our phone numbers depending on which country you are in.  

About this Course

Learn how to secure Windows Server 2016 environments

To earn your MCSE Windows Server 2016 certification, you must first pass the three MCSA exams and earn your MCSA certification.

This exam focuses on how to secure Windows Server 2016 environments. It covers methods and technologies for hardening server environments and securing virtual machine infrastructures using Shielded and encryption-supported virtual machines and Guarded Fabric.
In addition, the exam covers the protection of Active Directory and identity infrastructure with the Enhanced Security Administrative Environment (ESAE) Administrative Forest design approach and the management of privileged identities using Just-in-Time (JIT) and Just-Enough-Administration (JEA) approaches, along with Privileged Access Workstations (PAWs) and Local Administrator Password Solution (LAPS).
The exam also covers threat detection solutions, such as auditing, implementing Advanced Threat Analytics (ATA), the understanding of Operations Management Suite (OMS) solutions, and workload-specific security including the use of Nano Server for particular server workloads.

Course Fast Facts:

  1. Learn the fundamentals of Microsoft Certified Solutions Expert (MCSE) Server 2016
  2. Comprehensive 4 module Accredited Certificate In Microsoft Certified Solutions Expert (MCSE) Server 2016 Online Course
  3. Study along with simple instructions & demonstrations
  4. Written and developed by leading Microsoft experts
  5. Receive one-on-one online help & support
  6. Unlimited, lifetime access to online course
  7. Certificate of completion
  8. Study at your own pace with no rigid class timetables, 24/7 from any computer or smart device

Course Delivery

Courses are accessed online  by any device including PC, tablet or Smart Phone. Upon purchase an automated welcome email will be sent to you (please check your junk email inbox if not received as this is an automated email), in order for you to access your online course, which is Available 24/7 on any computer or smart mobile device. 

Recognition & Accreditation

All students who complete this course, receive a certificate of completion and will be issued a certificate via email.

Microsoft 70-744: Securing Windows Server 2016

Course Introduction

  • Introduction
  • Course Introduction
  • Instructor Introduction

Chapter 01 - Introduction to Attacks, Breaches, and Detection

  • Chapter 01 Introduction
  • Topic A: Understanding Types of Attacks
  • Assume Breach
  • Methods of Attack
  • Attack Stages
  • Prioritizing Resources
  • Incident Response Strategy
  • Ensuring Compliance
  • Topic B: Detecting Security Breaches
  • Locating Evidence
  • Event Logs
  • Examining Other Configurations
  • Topic C: Using Sysinternals Tools
  • Introducing Sysinternals
  • Demo - Examining Sysinternals Tools
  • System Monitor
  • AccessChk
  • Autoruns
  • LogonSessions
  • Process Explorer
  • Process Monitor
  • Sigcheck
  • Demo - Using Sysinternals Tools
  • Chapter 01 Summary
  • Chapter 01 Review
  • Chapter 01 Quiz

Chapter 02 - Protecting Users and Workstations

  • Chapter 02 Introduction
  • Topic A: User Rights and Privileges
  • Principle of Least Privilege
  • Configuring User Rights
  • Configuring Account Security Options
  • Demo - User Rights and Account Security Options
  • Account Security Controls
  • Complexity Options
  • Password and Lockout Policies
  • Demo - Configuring Account Policies in Group Policy
  • Configuring Fine-Grained Password Policies
  • Understanding PSO Application
  • Protected Users Security Groups
  • Delegating Administrative Control
  • Demo - Delegating Control in AD DS
  • Local Administrator Password Solutions (LAPS)
  • LAPS Requirements
  • LAPS Process
  • Configuring and Managing Passwords
  • Demo - Using LAPS
  • Topic B: Working with Computer and Service Accounts
  • What is a Computer Account?
  • Computer Account Functionality
  • Working with Secure Channel Passwords
  • Service Account Types
  • Group MSAs
  • Demo - Configuring Group MSAs
  • Topic C: Protecting User Credentials
  • Introducing Credential Guard
  • Credential Guard Requirements
  • Configuring Credential Guard
  • Verifying Credential Guard Operation
  • Credential Guard Weaknesses
  • NTLM Blocking
  • Searching AD DS for Problem Accounts
  • Demo - Locating Problem Accounts
  • Topic D: Using Privileged Access Workstations
  • The Need for Privileged Access Workstations
  • Privileged Access Workstations
  • Jump Servers
  • Securing Domain Controllers
  • Chapter 02 Summary
  • Chapter 02 Review
  • Chapter 02 Quiz

Chapter 03 - Managing Administrative Access

  • Chapter 03 Introduction
  • Topic A: Understanding and Deploying JEA
  • Introduction to JEA
  • JEA Components
  • Session Configuration Files
  • Demo - Creating a Session Configuration File
  • Role Capability Files
  • Demo - Create a Role Capability File
  • JEA Endpoints
  • Demo - Creating a JEA Endpoint
  • Connecting to JEA Endpoints
  • Deploying JEA Endpoints
  • Topic B: Using Enhanced Security Administrative Environments (ESAE) Forests
  • ESAE Forests
  • Administrative Tiers
  • ESAE Best Practices
  • The Clean Source Principle
  • Implementing the Clean Source Principle
  • Topic C: Using Microsoft Identity Manager
  • Overview of MIM
  • MIM Requirements
  • MIM Service Accounts
  • Topic D: Using JIT Administration and PAM
  • Overview of JIT Administration
  • Privileged Access Management (PAM)
  • PAM Components
  • Creating an Administrative Forest
  • Configuring Trust Relationships
  • Shadow Principals
  • Configuring the MIM Web Portal
  • Managing and Configuring PAM Roles
  • Chapter 03 Summary
  • Chapter 03 Review
  • Chapter 03 Quiz

Chapter 04 - Configuring Anti-Malware and Patch Management

  • Chapter 04 Introduction
  • Topic A: Configuring and Managing Windows Defender
  • Understanding Malware
  • Malware Sources
  • Mitigation Methods
  • Windows Defender
  • Demo - Using Windows Defender
  • Topic B: Restricting Software
  • Controlling Applications
  • Software Restriction Policies
  • Security Levels
  • AppLocker
  • Support for AppLocker
  • AppLocker Rules
  • Creating Default Rules
  • Demo - Using AppLocker
  • Topic C: Using Device Guard
  • Overview of Device Guard
  • Device Guard Features
  • Configuring Device Guard
  • Device Guard Policies
  • Deploying Code Integrity Policies
  • Control Flow Guard
  • Topic D: Patch Management with WSUS
  • Overview of WSUS
  • Deployment Options
  • Server Requirements
  • Configuring Clients
  • Administering WSUS
  • Approving Updates
  • Demo - Installing and Configuring WSUS
  • Chapter 04 Summary
  • Chapter 04 Review
  • Chapter 04 Quiz

Chapter 05 - Auditing and Advanced Threat Analytics

  • Chapter 05 Introduction
  • Topic A: Configuring Auditing for Windows Server 2016
  • Overview of Auditing
  • The Purpose of Auditing (
  • Types of Events
  • Auditing Goals
  • Auditing File and Object Access
  • Demo - Configuring Auditing
  • Topic B: Advanced Auditing and Management
  • Advanced Auditing
  • Advanced Auditing Subcategories
  • Dynamic Auditing
  • Event Log Subscriptions
  • Audit Collection Services (ACS)
  • Demo - Configuring Event Forwarding (6:59)
  • Start
  • Auditing with Windows PowerShell (1:58)
  • Start
  • Demo - Using PowerShell with Audit Logs
  • Transaction Logging
  • Module Logging
  • Script Block Logging
  • Demo - Configuring PowerShell Logging
  • Topic C: Deploying and Configuring ATA
  • Overview of ATA
  • Usage Scenarios
  • Deployment Requirements
  • ATA Gateways
  • Port Mirroring
  • Configuring ATA Center
  • Topic D: Deploying and Configuring Operations Management Suite
  • Introduction to Operations Management Suite
  • Deployment Overview
  • OMS Solutions
  • Installing OMS
  • OMS Solutions
  • Chapter 05 Summary
  • Chapter 05 Review
  • Chapter 05 Quiz

Chapter 06 - Securing the Infrastructure

  • Chapter 06 Introduction
  • Topic A: Secure the Virtualization Infrastructure
  • Introduction to Guarded Fabric
  • Host Guardian Service
  • Preparing HGS Nodes
  • Installing and Configuring HGS
  • Attestation and Encryption
  • Attestation Methods
  • Initializing HGS
  • Configuring HSG Clients
  • Topic B: Deploying Security Baselines
  • Security Compliance Manager (SCM)
  • SCM Requirements
  • Demo - Installing SCM
  • Demo - Configuring and Deploying Security Baselines
  • Topic C: Deploying Nano Server
  • Planning for Nano Server
  • Understanding Nano Server Roles
  • Installing Nano Server Roles
  • Nano Server Installation
  • Installation Steps
  • Chapter 06 Summary
  • Chapter 06 Review
  • Chapter 06 Quiz

Chapter 07 - Configuring Data Protection

  • Chapter 07 Introduction
  • Topic A: Planning and Implementing File Encryption
  • Introducing Encrypting File System
  • EFS Features
  • Encryption and Decryption
  • Recovering EFS Files
  • Demo - Using EFS
  • Topic B: Planning and Implementing BitLocker
  • Overview of BitLocker
  • BitLocker and TPMs
  • BitLocker Requirements
  • Tools for Configuring and Managing BitLocker
  • Deploying BitLocker
  • Demo - Deploying BitLocker
  • BitLocker on Hyper-V VMs
  • BitLocker and CSVs
  • Enabling BitLocker for CSV
  • Network Unlock
  • Network Unlock Process
  • BitLocker Recovery
  • Microsoft BitLocker Administration and Monitoring (MBAM)
  • Chapter 07 Summary
  • Chapter 07 Review
  • Chapter 07 Quiz

Chapter 08 - Advanced File Server Management

  • Chapter 08 Introduction
  • Topic A: Using File Server Resource Manager
  • Capacity Managemen
  • Storage Management
  • Introduction to FSRM
  • Storage Management with File Server Resource Manager
  • Overview of FSRM
  • Installing and Configuring FSRM
  • Demo - Installing and Configuring FSRM
  • Quota Management
  • Demo - Create and Manage Quotas
  • File Screening
  • Using File Groups
  • Exceptions and Templates
  • Demo - Implementing File Screening
  • Storage Reports
  • Report Tasks
  • Demo - Generating Storage Reports
  • Automatic File Management
  • Topic B: Implementing Classification and File Management Tasks
  • File Classification
  • Classification Rules
  • Demo - Configure File Classification
  • File Management Tasks
  • Topic C: Working with Dynamic Access Control
  • Overview of Dynamic Access Control
  • Dynamic Access Control Scenarios
  • DAC Technologies
  • Understanding Identity
  • Understanding Claims
  • Types of Claims
  • Central Access Policies
  • Policy Components
  • DAC Prerequisites
  • Demo - Implementing DAC
  • Chapter 08 Summary
  • Chapter 08 Review
  • Chapter 08 Quiz

Chapter 09 - Securing the Network Infrastructure

  • Chapter 09 Introduction
  • Topic A: Using the Windows Firewall with Advanced Security
  • Types of Firewalls
  • Well-Known Ports
  • Host-Based Firewall
  • Network Profiles
  • Configuring the Windows Firewall
  • Demo - Working with the Windows Firewall (
  • Topic B: Datacenter Firewall
  • Network Controller
  • Datacenter Firewall
  • Network Security Groups
  • Scenarios for Datacenter Firewall
  • Topic C: Utilizing IP Security
  • Overview of IP Security
  • IPSec Protocols
  • IPSec Usage Scenarios
  • IPSec Configuration Tools
  • Connection Security Rules
  • Understanding Rule Types
  • Rule Endpoints
  • Authentication Settings
  • Authentication Methods
  • Encryption Settings
  • Monitoring Connections
  • Demo - Implementing IPSec
  • Topic D: Configuring Advanced DNS Settings
  • Managing DNS Services
  • Optimizing DNS Name Resolution
  • The GlobalNames Zone
  • Implementing DNS Security
  • DNS Security (DNSSEC)
  • Implementing DNSSEC
  • Demo - Configuring DNSSEC
  • Introducing DNS Policies
  • Implementing DNS Policies
  • RRL Feature
  • Demo - Configuring DNS Policies
  • Topic E: Monitoring Network Traffic
  • Microsoft Message Analyzer
  • Demo - Using Microsoft Message Analyzer
  • Topic F: Securing SMB Traffic
  • SMB 3.1.1 Protocol Security
  • SMB Encryption Requirements
  • Encrypting SMB Shares
  • Disabling Support for SMB 1.0
  • Chapter 09 Summary
  • Chapter 09 Review
  • Chapter 09 Quiz

Microsoft 70-742: Identity in Windows Server 2016

Course Introduction

  • Introduction
  • Course Introduction
  • Instructor Introduction

Chapter 01 - Installing and Configuring Domain Controllers

  • Chapter 01 Introduction
  • Topic A: Overview of Active Directory Domain Services
  • Information Protection Concepts
  • Identity and Access (IDA)
  • Authentication and Authorization
  • AD DS Terms
  • Access Tokens
  • Access Control Lists
  • The Kerberos Logon Process
  • Workgroup vs. Domain
  • Understanding AD DS Domains
  • AD DS Components and Concepts
  • Active Directory Database
  • Physical Data Store
  • Logical Partitions
  • Active Directory Schema
  • Domains
  • Trees and Forests
  • Organizational Units
  • AD DS Sites
  • Controlling Replication
  • Trust Relationships
  • Topic B: Overview of Domain Controllers
  • Introducing Domain Controllers
  • Global Catalog Servers
  • Read-Only Domain Controllers
  • FSMO Role
  • Demo - Working with FSMO Roles
  • Locating Domain Controllers
  • Demo - Viewing SRV Records
  • Topic C: Deploying Domain Controllers
  • Reasons for Multiple Domain Controllers
  • Installing from Server Manager
  • Considerations for Installing Domain Controllers
  • Demo - Installing a Domain Controller
  • Installing on Server Core
  • Demo - Promoting a Server Core DC
  • Upgrading Domain Controllers
  • Additional Installation Options
  • Cloning Domain Controllers
  • Demo - Cloning Domain Controllers
  • Chapter 01 Summary
  • Chapter 01 Review
  • Chapter 01 Quiz

Chapter 02 - Managing Active Directory Objects

  • Chapter 02 Introduction
  • Topic A: Overview of AD DS Object Management
  • Understanding AD DS Objects
  • Names for AD DS Objects
  • Management Tools
  • Demo - Overview of AD DS Management Tools
  • Topic B: Managing User Accounts
  • The Importance of the User Account
  • Naming Considerations
  • Configuring User Passwords
  • Creating User Accounts
  • Demo - Creating AD DS Users
  • Managing User Attributes
  • User Account Management
  • Demo - Managing Users
  • Topic C: Managing Groups
  • Group Types and Scopes
  • Types of Groups
  • Group Scopes
  • Domain Local and Global Groups
  • Universal Groups
  • Group Nesting
  • Group Naming Considerations
  • Creating and Configuring Groups
  • Demo - Creating and Configuring Groups
  • Introduction to Default Groups
  • Identifying Default Groups
  • Administrative Groups
  • Demo - Configuring Default Groups
  • Using Special Identities
  • Strategies for Using Groups
  • Group Nesting Strategies
  • Demo - Group Nesting
  • Topic D: Managing Computer Accounts
  • Introduction to Computer Accounts
  • Creating Computer Accounts
  • Working with Secure Channel Passwords
  • Offline Domain Joins
  • Demo - Working with Computer Accounts
  • Topic E: Managing Organizational Units
  • Planning Organizational Units
  • OU Hierarchy Considerations
  • Creating OUs
  • Demo - Creating an OU Hierarchy
  • Object Security in AD DS
  • AD DS Object Permissions
  • Demo - Viewing Object Permissions in Active Directory
  • Delegating Administrative Control
  • Modifying Delegated Rights
  • Best Practices for Administrative Delegation
  • Demo - Delegating Administrative Control
  • Chapter 02 Summary
  • Chapter 02 Review
  • Chapter 02 Quiz

Chapter 03 - Securing Active Directory Domain Services

  • Chapter 03 Introduction
  • Topic A: Securing Domain Controllers
  • Understanding Security Risks
  • Using Group Policy
  • Group Policy Security Settings
  • Securing the Authentication Process
  • Physical Access Security
  • Branch Office Domain Controllers
  • RODC Features
  • RODC Limitations and Considerations
  • Deploying RODCs
  • Demo - Installing an RODC
  • Password Replication Policies
  • Topic B: Implementing Account Security
  • Account Security in Windows Server 2016
  • Complexity Options
  • Password Policies
  • Account Lockout Policies
  • Configuring Domain Password and Lockout Policies
  • Demo - Configuring Account Policies in Group Policy
  • Configuring Fine -Grained Password Policies
  • Configuring Fine -Grained Password Policies Part 2
  • Configuring Fine -Grained Password Policies Part 3
  • Demo - Configuring Fine -Grained Password Policies
  • Restricted Groups
  • Protected Users Security Groups
  • Authentication Policies
  • Authentication Silos
  • Enhancing Password Authentication
  • Topic C: Auditing AD DS
  • Utilizing Auditing
  • The Purpose of Auditing
  • Types of Events
  • Auditing Goals
  • Auditing File and Object Access
  • Advanced Auditing
  • Demo - Configuring Auditing
  • Topic D: Configuring Managed Service Accounts
  • Overview of Service Accounts
  • Challenges to Managing Service Accounts
  • Managed Service Accounts
  • Group MSAs
  • Demo - Configuring Group MSAs
  • Chapter 03 Summary
  • Chapter 03 Review
  • Chapter 03 Quiz

Chapter 04 - Working with Complex AD DS Infrastructures

  • Chapter 04 Introduction
  • Topic A: Overview of Advanced AD DS Deployments
  • Domain Boundaries
  • Forest Boundaries
  • Reasons for Implementing Multiple Domains
  • Reasons for Implementing Multiple Forests
  • Deploying Domain Controllers in Azure
  • Managing Objects
  • Topic B: Deploying a Distributed AD DS Environment
  • Domain Functional Levels
  • Forest Functional Levels
  • Deploying AD DS Domains
  • DNS Considerations
  • UPN Considerations
  • Demo - Deploying a Child Domain
  • Understanding Trust Relationships
  • Types of Trusts
  • How Trusts Work
  • Forest Trusts
  • Advanced Trust Settings
  • Demo - Configuring a Forest Trust
  • Topic C: Overview of AD DS Replication
  • AD DS Partitions
  • AD DS Replication
  • Types of Replication
  • Resolving Replication Conflicts
  • Topic D: Configuring AD DS Sites
  • Reasons for Sites
  • Planning for Sites
  • Overview of Sites and Subnets
  • Moving Domain Controller Accounts
  • Domain Controller Placement
  • Demo - Creating Sites
  • Controlling Inter -Site Replication
  • Defining Site Links
  • Site Links
  • Site Link Properties
  • Demo - Creating Site Links
  • Bridgehead Servers
  • Bridging Site Links
  • Monitor and Manage Replication
  • Chapter 04 Summary
  • Chapter 04 Review
  • Chapter 04 Quiz

Chapter 05 - Implementing Group Policy

  • Chapter 05 Introduction
  • Topic A: Overview of Group Policy
  • What is Group Policy?
  • Group Policy Settings
  • Local Group Policies
  • Policies vs. Preferences
  • Demo - Examining Policy Settings
  • Domain Policies
  • GPO Storage
  • Linking GPOs
  • GPO Processing Order
  • Controlling Inheritance
  • Determining Inheritance
  • GPO Link Options
  • Security Filtering
  • WMI Filtering
  • Refreshing Policies
  • Other Processing Options
  • Topic B: Creating and Configuring GPOs
  • Creating GPOs
  • Starter GPOs
  • Administrative Templates
  • Group Policy Preferences
  • Demo - Creating and Configuring Policies
  • Group Policy Management
  • Delegation of Control
  • Demo - Managing GPOs
  • Topic C: Monitoring and Troubleshooting Group Policy
  • Troubleshooting Group Policy Application
  • Troubleshooting Group Policy Application
  • Demo - Troubleshooting Group Policy Application
  • Topic D: Security Management Using Group Policy
  • Security Management Using Group Policy
  • Configuring User Rights
  • Managing Security Option s
  • User Account Control
  • Demo - Managing Security Options
  • Controlling Applications
  • Software Restriction Policies
  • Security Levels
  • AppLocker
  • Support for AppLocker
  • AppLocker Rules
  • Creating Default Rules
  • Demo - Controlling Applications Using Group Policy
  • Configuring the Windows Firewall
  • Windows Firewall with Advanced Security
  • Firewall Profiles
  • Creating Firewall Rules
  • Configuring the Windows Firewall
  • Types of Rules
  • Connection Security Rules
  • Demo - Configuring Firewalls using Group Policy
  • Topic E: Managing User Environments
  • Using Scripts in Group Policy
  • What is Folder Redirection?
  • Common Folders for Redirection
  • Redirection Options
  • Demo - Configuring Folder Redirection
  • Deploying Software Using Group Policy
  • How Software Distribution Works
  • Using Windows Installer
  • Software Life Cycle
  • Deploying Software
  • Deployment Options
  • Maintaining Software through Group Policy
  • Removing Software Deployments
  • Chapter 05 Summary
  • Chapter 05 Review
  • Chapter 05 Quiz

Chapter 06 - Understanding Microsoft Azure AD and Directory Synchronization

  • Chapter 06 Introduction
  • Topic A: Planning Directory Synchronization
  • Overview of Azure AD
  • Limitations of AD DS
  • Extending AD DS Authentication
  • Comparing AD DS and Azure AD
  • Authentication Options
  • Planning Directory Synchronization
  • Enabling AD DS Synchronization
  • Topic B: Implementing Azure AD Connect
  • What is Azure AD Connect?
  • Azure AD Connect Requirements
  • Azure AD Connect Express Settings
  • Azure AD Connect Custom Installation
  • Monitoring Azure AD
  • Privileged Identity Management
  • Topic C: Managing Identities with Directory Synchronization
  • Managing Users
  • Managing Groups
  • Filtering Azure AD Connect
  • Monitoring Directory Synchronization
  • Troubleshooting Directory Synchronization
  • Chapter 06 Summary
  • Chapter 06 Review
  • Chapter 06 Quiz

Chapter 07 - Monitoring and Recovering AD DS

  • Chapter 07 Introduction
  • Topic A: Monitoring AD DS
  • Performance Monitoring Benefits
  • Establishing Performance Baselines
  • Introduction to Monitoring Tools
  • Event Viewer
  • Demo - Using Event Viewer
  • Reliability Monitor
  • Real -Time Monitoring
  • Data Collector Sets
  • Data Collection Points
  • Common AD DS Counters
  • Best Practices
  • Topic B: Database Management
  • Physical Data Store
  • Using NTDSUtil
  • AD DS Maintenance
  • Topic C: Backup and Recovery in AD DS
  • Disaster Recovery for Active Directory
  • Backing Up Active Directory
  • Using Backup Tools
  • Backup Requirements
  • Restoring Data
  • Additional Restore Options
  • Demo - Enabling the AD Recycle Bin
  • Best Practices for Backup and Recovery
  • Chapter 07 Summary
  • Chapter 07 Review
  • Chapter 07 Quiz

Chapter 08 - Implementing Active Directory Certificate Services

  • Chapter 08 Introduction
  • Topic A: Overview of Public Key Infrastructure and AD CS
  • What is a PKI?
  • Encryption Types
  • PKI Components
  • PKI Enabled Applications
  • Certificate Authorities
  • CA Types
  • Internal vs. External CAs
  • AD CS in Windows Server 2016
  • Topic B: Deploying Certificate Authority Hierarchy
  • Decision Factors for CA Hierarchy
  • CA Hierarchy Roles
  • Best Practices for CA Hierarchies
  • Installing Root CAs
  • Installing Root CAs Part 2
  • Demo - Installing a Root CA
  • Installing Subordinate CAs
  • Benefits of Using Subordinates
  • Automating Installations
  • Topic C: Administering Certificate Authorities
  • Administration Tools
  • Configuring CA Security
  • Security Roles for CA Administration
  • Policy and Exit Modules
  • Certificate Revocation Lists (CRL)
  • Publishing the CRL
  • Publishing AIAs and CDPs
  • Topic D: Deploying and Managing Certificates
  • Digital Certificates
  • Certificate Templates
  • Template Versions in Windows Server 2016
  • Certificate Template Permissions
  • Updating Templates
  • Demo - Modifying and Enabling a Certificate Template
  • Enrollment Types
  • Manual Enrollment
  • Automating Enrollment
  • Autoenrollment Components
  • Demo - Configuring Autoenrollment
  • Credential Roaming
  • Topic E: Managing Revocation and Distribution
  • Certificate Revocation
  • Online Responder
  • Online Responder Process
  • Comparing CRL and OCSP
  • Configuring an Online Responder
  • Topic F: Configuring Certificate Recovery
  • Importance of Key Archival and Recovery
  • Key Archival
  • Data Recovery vs. Key Recovery
  • Archival Methods
  • Export Methods
  • Automating Archival
  • Recovering Lost Keys
  • Chapter 08 Summary
  • Chapter 08 Review
  • Chapter 08 Quiz

Chapter 09 - Implementing Active Directory Federation Services (AD FS)

  • Chapter 09 Introduction
  • Topic A: Overview of AD FS
  • What is Identity Federation?
  • Federation Benefits
  • AD FS Components
  • Additional AD FS Terms
  • Identity Federation Scenarios
  • Business to Business Scenario
  • Business to Employee Scenario
  • Business to Consumer Scenario
  • New Features in Windows Server 2016
  • Topic B: Planning and Deploying AD FS
  • AD FS Requirements
  • Server Roles
  • Planning High Availability
  • AD FS Claims
  • AD FS Claim Rules
  • Trust Relationships
  • Installing AD FS
  • Demo - Installing AD FS
  • Configuring Partners
  • Home Realm Discovery
  • Managing AD FS
  • Topic C: Overview of Web Application Proxy
  • Introducing the Web Application Proxy
  • Web Application Proxy and AD FS Proxy
  • Authentication Methods
  • Publishing Software
  • Chapter 09 Summary
  • Chapter 09 Review
  • Chapter 09 Quiz

Chapter 10 - Implementing Active Directory Rights Management Services

  • Chapter 10 Intoduction
  • Topic A: Overview of AD RMS
  • Introducing AD RMS
  • The AD RMS Difference
  • AD RMS Components
  • Certificates and Licenses
  • Protecting Content
  • Consuming Content
  • Azure RMS
  • Topic B: Deploying AD RMS
  • Deployment Scenarios
  • Installation Overview
  • AD RMS Configuration
  • Demo - Installing AD RMS Cluster
  • AD RMS Management
  • External Sharing
  • Topic C: Protecting Content with AD RMS
  • Rights Policy Templates
  • Configuring Templates for Offline Usage
  • Demo - Configuring Rights Management Templates
  • Exclusion Policies
  • Chapter 10 Summary
  • Chapter 10 Review
  • Chapter 10 Quiz
  • Course Closure

Microsoft 70-741 – Networking with Windows Server 2016

Course Introduction

  • Introduction
  • Course Introduction
  • Instructor Introduction

Chapter 01 - Plan and Implement IPv4 and IPv6 Networks

  • Chapter 1 Introduction
  • Topic A: Plan and Implement IP Addressing Schemes for IPv4 Networks
  • General Networking Requirements
  • IPv4 Required Settings
  • IPv4 Addresses
  • IPv4 Subnet Masks
  • Default Gateways
  • Demo - Understanding Binary Addressing
  • IPv4 Address Classes
  • What are Subnets?
  • The Subnetting Method
  • Subnet Creation Process
  • Demo - Subnetting a Network
  • IPv4 Address Types
  • IPv4 Network Types
  • Demo - Examining VLSM
  • Topic B: Configuring IPv4 Hosts
  • IPv4 Configuration
  • IPv4 Configuration Tools
  • Demo - Configuring IPv4
  • Topic C: Managing and Troubleshooting IPv4 Connectivity
  • Network Routing
  • Working with Routing Tables
  • Adding Static Routes
  • IPv4 Troubleshooting Methodology
  • Command Line Troubleshooting Tools
  • Graphical Troubleshooting Tools
  • Troubleshooting with Windows PowerShell
  • Demo - Troubleshooting IPv4
  • Microsoft Message Analyzer
  • Topic D: Implementing IPv6 for Network Hosts
  • The Purpose of IPv6
  • Reasons to Use IPv6
  • Comparing IPv4 and IPv6
  • IPv6 Address Structure
  • IPv6 Address Types
  • IPv6 Autoconfiguration
  • Configuring IPv6
  • Tools for Configuring IPv6
  • Topic E: Implementing IPv6 Transitioning and Coexistence
  • Understanding Node Types
  • Options for Coexistence
  • IPv6 over IPv4 Tunneling
  • Understanding ISATAP
  • Understanding 6to4
  • Understanding Teredo
  • Transitioning Process
  • Chapter 01 Summary
  • Chapter 01 Review
  • Chapter 01 Quiz

Chapter 02 - Installing and Configuring DHCP

  • Chapter 2 Introduction
  • Topic A: Overview of the DHCP Server Role
  • Introducing DHCP
  • DHCP Components and Processes
  • Lease Generation Process
  • Lease Renewal Process
  • DHCP Considerations
  • Topic B: Deploying DHCP
  • Install and Configure a DHCP Server
  • DHCP Authorization
  • Demo - Installing DHCP
  • Creating Scopes
  • Configuring DHCP Options
  • Demo - Creating and Configuring Scopes
  • DHCP Relay Agents
  • Topic C: Managing and Troubleshooting DHCP
  • Implementing Security for DHCP
  • DHCP Auditing
  • Demo - Configuring Security and Auditing
  • DHCP Advanced Options
  • Additional Scope Types
  • High Availability for DHCP
  • DHCP Failover
  • Demo - Configuring DHCP Failover
  • DHCP Database
  • Migrating DHCP
  • Troubleshooting DHCP
  • Chapter 02 Summary
  • Chapter 02 Review
  • Chapter 02 Quiz

Chapter 03 - Installing and Configuring DNS

  • Chapter 03 Introduction
  • Topic A: Implementing DNS Servers
  • Name Resolution Basics
  • What is DNS?
  • DNS Namespace
  • Types of Names
  • Internet Name Resolution
  • DNS Components
  • DNS Zones and Resource Records
  • Installing the DNS Server
  • Demo - Installing DNS
  • Topic B: Creating and Configuring DNS Zones
  • Resource Records
  • Zone Types
  • Replicating Zones
  • Demo - Creating and Configuring DNS Zones
  • Standard DNS Name Resolution
  • Modifying DNS Name Resolution
  • Working with DNS Cache
  • Demo - Configuring Cache and Forwarding
  • Understanding Domain Delegation
  • Demo - Domain Delegation
  • Topic C: Understanding Active Directory Integration
  • Overview of AD DS and DNS Integration
  • SRV Records
  • Demo - Examining SRV Records
  • Active Directory Integrated Zones
  • Application Partitions
  • Demo - Configuring Active Directory Integrated Zones
  • Topic D: Configuring Advanced DNS Settings
  • Advanced Name Resolution
  • The GlobalNames Zone
  • Demo - Configuring the GlobalNames Zone
  • Split DNS
  • Introducing DNS Policies
  • DNS Policy Objects
  • Demo - Configuring DNS Policies
  • Implementing DNS Security
  • DNS Security (DNSSEC)
  • Implementing DNSSEC
  • Topic E: Troubleshooting DNS Name Resolution
  • Introduction to DNS Troubleshooting
  • Obtaining DNS Server Statistics
  • Command Line Tools
  • Troubleshooting Process
  • Managing DNS Services
  • Testing DNS Servers
  • Demo - Managing and Troubleshooting DNS
  • Chapter 03 Summary
  • Chapter 03 Review
  • Chapter 03 Quiz

Chapter 04 - Implementing and Managing IP Address Management

  • Chapter 04 Introduction
  • Topic A: Overview of IPAM
  • Introducing IPAM
  • IPAM Benefits
  • New Features in Windows Server 2016
  • IPAM Architecture
  • IPAM Deployment Requirements
  • IPAM Deployment Considerations
  • Topic B: IPAM Deployment
  • Implementing IPAM
  • Demo - Installing and Provisioning the IPAM Role
  • IPAM Administration
  • Default IPAM Groups
  • Demo - Administering IPAM
  • Configuring IPAM Options
  • Demo - Managing DNS and DHCP Servers using IPAM
  • Topic C: Managing IP Address Spaces by using IPAM
  • Managing IP Addressing
  • Viewing and Managing IP Addressing
  • Monitoring DHCP and DNS Servers
  • Adding Address Spaces
  • Finding, Allocating, and Reclaiming
  • Demo - Managing IP Addressing with IPAM
  • Chapter 04 Summary
  • Chapter 04 Review
  • Chapter 04 Quiz

Chapter 05 - Implementing Remote Access

  • Chapter 05 Introduction
  • Topic A: Remote Access Overview
  • What is Remote Access?
  • Remote Access Options
  • Managing Remote Access
  • Demo - Installing the Remote Access Role
  • The Remote Access Management Console
  • Network Policy Server
  • NPS Policies
  • Using a PKI for Remote Access
  • Routing with Windows Server 2016
  • Network Address Translation
  • Topic B: Implementing the Web Application Proxy
  • Overview of Web Application Proxy
  • Authentication Options
  • Configuring the Web Application Proxy
  • Topic C: Planning and Implementing VPNs
  • Remote Access with VPNs
  • VPN Connection Properties
  • Tunneling Protocols
  • Authentication Protocols
  • VPN Reconnect
  • App - triggered VPNs
  • Configuring a VPN Server
  • VPN Configuration Options
  • Demo - Configuring a VPN Server
  • Topic D: Overview of DirectAccess
  • Introducing DirectAccess
  • DirectAccess Components
  • Deployment Options
  • DirectAccess Server Prerequisites (
  • Tunneling Protocol Options
  • DirectAccess Process Internally
  • DirectAccess Process Externally
  • Topic E: Implementing DirectAccess
  • Simple DirectAccess Configuration
  • Configuration Changes
  • Limitations of Simple Configuration
  • Advanced DirectAccess Options
  • High Availability
  • Multisite Deployments
  • Configuring a PKI for DirectAccess
  • Implementing Client Certificates
  • Internal Network Configuration Options
  • Configuring DNS Settings
  • Monitoring DA Connectivity
  • Chapter 05 Summary
  • Chapter 05 Review
  • Chapter 05 Quiz

Chapter 06 - Installing and Configuring Branch Office Networking

  • Chapter 06 Introduction
  • Topic A: Configuring Networking for Branch Offices
  • Branch Office Scenarios
  • Considerations for Branch Offices
  • WAN Connectivity
  • Network Services for Branch Offices
  • Implementing RODCs
  • Demo - Installing an RODC
  • Remote Desktop Services
  • File Services for Branch Offices
  • Print Services for Branch Offices
  • Topic B: Implementing Distributed File Systems
  • Introducing DFS
  • DFS Components
  • Types of DFS Namespaces
  • Deploying DFS Namespaces
  • Creating and Managing a DFS Namespace
  • Demo - Creating a DFS Namespace
  • DFS Replication
  • DFS Scenarios
  • Demo - Configuring Replication
  • Optimizing DFS
  • Managing the DFS Database
  • Monitoring and Troubleshooting DFS
  • Topic C: Implementing BranchCache
  • Introducing BranchCache
  • BranchCache in Windows Server 2016
  • BranchCache Modes
  • Data Retrieval using BranchCache
  • BranchCache Requirements
  • Demo - Configuring and Enabling BranchCache
  • Chapter 06 Summary
  • Chapter 06 Review
  • Chapter 06 Quiz

Chapter 07 - Implementing Advanced Networking Features

  • Chapter 07 Introduction
  • Topic A: Implementing Networking Features for High Performance
  • High Performance Networking Features
  • NIC Teaming
  • Demo - Implementing NIC Teaming
  • SMB 3.1.1 Shared Folders
  • Advanced SMB 3.1.1 Functionality
  • Quality of Service (QoS)
  • Understanding RSS
  • Understanding RSC
  • Topic B: Implementing Hyper-V Advanced Networking Features
  • Virtual Switch Improvements
  • Extensible Virtual Switch
  • Understanding SR-IOV
  • Dynamic VMQ
  • Advanced Features for Network Adapters
  • NIC Teaming in Virtual Machines
  • Topic C: Introduction to Software-Defined Networking
  • SDN Concepts and Tools
  • SDN Benefits
  • Planning for Software-Defined Networking
  • SDN Deployments
  • Topic D: Overview of Network Virtualization
  • Introduction to Network Virtualization
  • Network Virtualization Benefits
  • Generic Route Encapsulation
  • Chapter 07 Summary
  • Chapter 07 Review
  • Course Closure
  • Chapter 07 Quiz

Microsoft 70-740 - Install, Storage & Compute with Windows Server 2016

Course Introduction

  • Introduction
  • Course Introduction
  • Instructor Introduction

Chapter 01 - Installing Windows Servers in Host and Computer Environments

  • Chapter 01 Introduction
  • Topic A: Determining Windows Server 2016 Installation
  • Installing Windows Server 2016
  • Introduction to Windows Server 2016
  • Windows Server Editions
  • Hardware Requirements
  • Hardware Considerations
  • Installation Options
  • Options for Managing Servers
  • Windows Powershell
  • Windows Powershell Basics
  • Demo - Using Windows PowerShell
  • What's New Since 2008?
  • What's New in Windows Server 2016
  • Topic B: Installing Windows Server 2016 Core and Nano Editions
  • Planning For Installation
  • Planning for Nano Server
  • Understanding Nano Server Roles
  • Installing Nano Server Roles
  • Planning for Server Core
  • Server Core vs. Nano Server
  • Nano Server Installation
  • Installation Steps
  • Alternative Steps to Install Nano Server
  • Demo - Performing Nano Server Installation
  • Managing and Configuring Nano
  • Demo - Configuring Nano Server
  • Installing Server Core
  • Demo - Installing Windows Server 2016
  • Demo - Configure the Local Installation
  • Upgrades vs. Migrations
  • Choosing In-Place Upgrades
  • Choosing to Migrate
  • Installation and Migration Tools
  • Choosing an Activation Model
  • Activation Methods
  • Topic C: Managing Windows Installations with Windows PowerShell
  • Post Installation Tasks
  • Topic D: Create, Manage, and Maintain Windows Images to Deploy
  • Creating and Managing Deployment Images
  • File-Based Imaging
  • Windows Image File Format
  • Types of Images
  • Image-Based Installation Tools
  • Creating Install Images
  • Considerations for Image Creation
  • Windows ADK for Windows 10
  • Basic Deployment Process
  • Windows Deployment Services
  • WDS Components
  • Microsoft Deployment Toolkit 2013
  • Chapter 01 Summary
  • Chapter 01 Review
  • Chapter 01 Quiz

Chapter 02 - Implementing Local and Enterprise Storage Solutions

  • Chapter 02 Introduction
  • Topic A: Managing Disks and Volumes in Windows Server 2016
  • Managing Disks and Volumes
  • Partition Table Formats
  • Disk Types
  • Required Disk Volumes
  • File Systems
  • Resilient File System
  • Demo - Working with File Systems
  • Virtual Hard Disks
  • Managing Virtual Hard Disks
  • Selecting Physical Disk Types
  • Working with Disk Volumes
  • Volume Management Tools
  • Demo - Managing Volumes
  • Understanding RAID
  • Hardware vs. Software RAID
  • RAID Types
  • Topic B: Implementing and Managing Storage Spaces
  • Implementing and Managing Storage Spaces
  • Requirements for Storage Spaces
  • Storage Space Features
  • Demo - Configuring Storage Spaces
  • Changes to Storage Spaces
  • Storage Space Usage Scenarios
  • Storage Spaces Direct Deployment Scenarios
  • Managing Storage Spaces
  • Using Windows PowerShell with Storage Spaces
  • Managing Disk Failure with Storage Spaces
  • Monitoring Storage Spaces
  • Topic C: Configuring Data Deduplication
  • Overview of Data Deduplication
  • Enhancements in Windows Server 2016
  • Data Deduplication Requirements
  • Data Deduplication Components
  • Data Deduplication Process
  • Planning Data Deduplication
  • Data Deduplication Usage Scenarios
  • Demo - Installing and Configuring Data Deduplication
  • Monitoring and Maintaining Data Deduplication
  • Topic D: Understanding Various Types of Storage
  • Overview of Storage Solutions
  • Direct Attached Storage
  • Network Attached Storage
  • Storage Area Networks
  • Comparing Storage Solutions
  • Comparing Storage Technology
  • Topic E: Fibre Channel, iSCSI, and Fibre Channel over Ethernet
  • Fibre Channel
  • Fibre Channel Layouts
  • Fibre Channel Considerations
  • iSCSI
  • iSCSI Target Server
  • iSCSI Initiator
  • Considerations for Implementing iSCSI
  • Topic F: Understanding iSNS, DCB, and MPIO
  • iSNS
  • iSNS Functions and Installation
  • Data Center Bridging
  • MPIO
  • Topic G: Configuring File and Folder Sharing in Windows Server 2016
  • Configuring Sharing in Windows Server 2016
  • Server Message Block
  • Configuring SMB Shares
  • Demo - Configuring SMB Shares
  • Network File System
  • Configuring NFS Shares
  • Chapter 02 Summary
  • Chapter 02 Review
  • Chapter 02 Quiz

Chapter 03 - Implementing Hyper-V Virtualization

  • Chapter 03 Introduction
  • Topic A: Installing Hyper-V Virtualization
  • Introducing Hyper-V
  • New Host Features in Windows Server 2016
  • New VM Features in Windows Server 2016
  • Introducing Windows Server Containers
  • Hyper-V Prerequisites
  • Nested Virtualization
  • Demo - Installing the Hyper-V Role
  • Topic B: Configuring Storage and Networking on Hyper-V Hosts
  • Using Virtual Hard Disks in Hyper-V
  • Virtual Hard Formats
  • Virtual Hard Disk Types
  • Considerations for Virtual Hard Disks
  • Fibre Channel in Hyper-V
  • Choosing Storage for Virtual Machines
  • Demo - Managing Storage in Hyper-V
  • Hyper-V Networks
  • Demo - Creating a Virtual Switch
  • Considerations for Hyper-V Networks
  • New Features in Windows Server 2016
  • Topic C: Configuring and Managing Virtual Machines
  • Overview of Virtual Machines
  • Configuration Versions
  • Generation Versions
  • Demo - Creating Virtual Machines
  • Virtual Machine Settings
  • New Options in Windows Server 2016
  • Shielded Virtual Machines
  • Best Practices for Virtual Machines
  • Overview of Virtual Machine Management
  • Managing Virtual Machine States
  • Working with Checkpoints
  • Importing and Exporting VMs
  • Windows PowerShell Direct
  • Chapter 03 Summary
  • Chapter 03 Review
  • Chapter 03 Quiz

Chapter 04 - Implementing Windows Containers

  • Chapter 04 Introduction
  • Topic A: Understanding Windows Server and Hyper-V Containers
  • Overview of Windows Server Containers
  • Concepts and Definitions
  • Windows Server Containers
  • Overview of Hyper-V Containers
  • Benefits of Hyper-V Containers
  • Usage Scenarios
  • Installation Requirements
  • Topic B: Deploying Windows Server and Hyper-V Containers
  • Deploying Windows Server Containers
  • Deploying Hyper-V Containers
  • Managing Containers
  • Demo - Installing the Containers Feature
  • Topic C: Using Docker to Install, Configure, and Manage Containers
  • Overview of Docker
  • Support for Docker in Windows
  • Docker Terminology
  • Docker Toolbox
  • Docker Solutions
  • Management of Docker
  • Overview of Docker Hub
  • Docker with Microsoft Azure
  • Chapter 04 Summary
  • Chapter 04 Review
  • Chapter 04 Quiz

Chapter 05 - Implementing High Availability

  • Chapter 05 Introduction
  • Topic A: Overview of High Availability and Disaster Recovery (
  • Understanding High Availability
  • Continuous Availability
  • Business Continuity
  • Business Continuity Strategies
  • Developing Disaster Recovery Plans
  • Service Level Agreements
  • Highly Available Networking
  • Highly Available Storage
  • High Availability for Virtual Machines
  • Understanding Live Migration
  • Live Migration Process
  • Hyper-V Replica
  • Planning for Hyper-V Replica
  • Implementing Hyper-V Replica
  • Overview of Windows Backup
  • Demo - Installing and Configuring Windows Server Backup
  • Overview of Failover Clustering
  • High Availability through Failover Clustering
  • Failover Clustering Terminology
  • Clustering Types and Categories
  • Topic B: Implementing Network Load Balancing
  • Understanding NLB
  • NLB Operation
  • NLB Features in Windows Server 2016
  • NLB Deployment Requirements
  • Demo - Deploying NLB
  • NLB Configuration Options
  • NLB Host Parameters
  • Network Considerations for NLB
  • Planning NLB Implementation
  • Topic C: Planning and Configuring Failover Clustering
  • The Importance of Planning
  • Application Considerations
  • Storage Considerations
  • Storage Requirements
  • Hardware Requirements
  • Network Requirements
  • Demo - Verifying NIC Capabilities
  • Additional Planning Considerations
  • Introducing Quorum
  • Dynamic Quorum
  • Testing the Configuration
  • Creation Process
  • Demo - Creating a Failover Cluster
  • Cluster Roles
  • Common Cluster Management Tasks
  • Cluster Properties
  • Failover and Failback Configuration
  • Storage Configuration
  • Network Configuration
  • Configuring Quorum Options
  • Demo -Configuring the Quorum
  • Topic D: Maintaining a Failover Cluster
  • Overview of Maintaining Failover Clusters
  • Monitoring Failover Clusters
  • Backup and Restore
  • Troubleshooting Failover Clusters
  • Managing Cluster Communication
  • Cluster Aware Updating (CAU)
  • Topic E: Troubleshooting Failover Clustering
  • Troubleshooting Communication
  • Troubleshooting Cluster Name Objects
  • Quorum Issues
  • Using Event Viewer
  • Using Windows PowerShell
  • Topic F: Integrating Failover Clustering and Hyper-V
  • High Availability Options
  • Host Clustering Overview
  • Failover Clustering for Hyper-V in Windows Server 2016
  • Hyper-V Cluster Components
  • Hyper-V Failover Cluster Prerequisites
  • Implementation Process
  • Cluster Shared Volumes
  • Configuring a Shared Virtual Hard Disk
  • Scale Out File Server (SOFS)
  • SOFS Requirements
  • Topic G: Configuring Site Availability
  • Stretch Clustering
  • Prerequisites for Stretch Clustering
  • Types of Replication
  • Overview of Storage Replica
  • Quorum Modes for Stretch Clusters
  • Chapter 05 Summary
  • Chapter 05 Review
  • Chapter 05 Quiz

Chapter 06 - Maintaining and Monitoring Server Environments

  • Chapter 06 Introduction
  • Topic A: Windows Server Update Services
  • Overview of WSUS
  • Deployment Options
  • Server Requirements
  • Configuring Clients
  • Administering WSUS
  • Approving Updates
  • Demo - Installing and Configuring WSUS
  • Topic B: Windows PowerShell Desired State Configuration (DSC)
  • Overview of PowerShell DSC
  • Requirements for PowerShell DSC
  • Implementing PowerShell DSC
  • Topic C: Windows Server 2016 Monitoring Tools
  • Overview of Monitoring Tools
  • Using Task Manager
  • Demo - Using Task Manager
  • Performance Monitor
  • Demo - Using Performance Monitor
  • Monitoring Resources and Reliability
  • Event Viewer
  • Demo - Using Event Viewer
  • Monitoring with Server Manager
  • Chapter 06 Summary
  • Course Review
  • Course Closure
  • Chapter 6 Quiz

Entry requirements

Students must have basic literacy and numeracy skills.

Minimum education

Open entry. Previous schooling and academic achievements are not required for entry into this course.

Computer requirements

Students will need access to a computer and the internet. 

Minimum specifications for the computer are:

Windows:

  • Microsoft Windows XP, or later
  • Modern and up to date Browser (Internet Explorer 8 or later, Firefox, Chrome, Safari)

MAC/iOS

  • OSX/iOS 6 or later
  • Modern and up to date Browser (Firefox, Chrome, Safari)

All systems

  • Internet bandwidth of 1Mb or faster
  • Flash player or a browser with HTML5 video capabilities(Currently Internet Explorer 9, Firefox, Chrome, Safari)

Students will also need access the following applications:

Adobe Acrobat Reader

1.  Who are Courses For Success?

Courses For Success is a global course platform that started in 2008 with 5 courses, since then we have grown to over 10,000 online courses. As our courses are delivered online via the internet, we sell our courses worldwide.

Our courses span across many categories including Academic, Animal, Beauty, Business, Career, Counseling, Creative & Media, Health & Therapy, Hobbies & Trades, IT, Personal Development, Sports & Fitness.

Some of the companies we work with include Groupon, Living Social, CNN, Entrepreneur, Mashable, Reed UK, Stack Social and many more.

2.  Is there a refund/cancellation policy?

Yes, we have a 7-day money-back refund guarantee. Just send us an email to email/info)(coursesforsuccess.com with the subject Courses For Success Refund so we can accommodate your request.

3.  What is the FREE Personal Success Training Program?

The Personal Success Training Program was developed by Courses For Success to help our customers achieve success. Currently, we are offering this program for FREE with every course or bundle purchase this month. This is a limited time offer! We have received thousands of reviews for this program, please see: Personal Success Training Program Reviews

4.  Are there any requirements to study this course?

No, anyone who has an interest in learning more about this subject matter is encouraged to take our course. There are no entry requirements to take this course.

5.  Do I require to have finished high school to complete this course?

No, you do not require a High School Diploma or to have finished school to study this course, this course is open to anyone who would like to take this course.

6.  What if English is not my first language?

This course is provided in English, however, due to the digital nature of our training, you can take your time studying the material and make use of tools such as google translate and Grammarly.

7.  Is this course online or conducted in person?

All our courses are accessible online on any device. You may complete them at your own pace and at your own time.

8.  How do I receive my course?

After you have completed the payment, you will receive a confirmation email and tax receipt. You will also receive an email containing your course login details (username and password), as well as instructions on how to access and log in to your course via the internet with any device, please check your junk/spam folder in the event that you do not receive the email.

9.  When does this course start?

Providing you have internet access you can start this course whenever you like, just go to the login page and insert your username and password and you can access the online material.

10.  What is online learning like?

Online learning is easy, if not easier than a traditional academic situation. By studying an online course, the usual boundaries caused by location and time constraints are eliminated, meaning you are free to study where and when you want at your own pace. Of course, you will need to be able to self-manage your time and be organized, but with our help, you’ll soon find yourself settling into a comfortable rhythm of study.

11.  What computer skills do I need for my course?

You don't need to be a computer expert to succeed with our online training, but you should be comfortable typing, using the internet and be capable of using common software (such as Microsoft word).

12.  How long will you have access to the online course?

There is no time limit for completing this course, it can be studied in your own time at your own pace. Once you have purchased this course you will have unlimited lifetime access, meaning you can access this course whenever you want.

13.  How long will my course take?

Please see number of Hours to complete on Course Duration, under course summary.

14.  What is included with the course?

The onetime fee includes all training materials, including online content, diagrams, videos if included, interactive instructions and quizzes, plus you will receive a certificate upon completion.

15.  Do I need to buy textbooks?

All the required material for your course is included in the online system, you do not need to buy anything else.

16.  Is the course interactive?

Yes, all our courses are interactive.

17.  Is there an assessment or exam?

Yes, you will be required to complete a multiple-choice test online at the end of your course, you can do this test as many times as you require.

18.  What type of certificate will I receive?

You will receive a Certificate of Completion that is applicable worldwide, which demonstrates your commitment to learning new skills. You can share the certificate with your friends, relatives, co-workers and potential employers. Also, include it in your resume/CV, professional social media profiles and job applications.

Wendy Sue Hunt - 5 STAR REVIEW
"If you are considering taking any “Courses for Success”, I would highly recommend it. I have always been a firm believer it’s important to always sharpen your skills. You are never too old to learn more. I found the courses very helpful, interesting and easy to understand.
The term “Courses for Success” helped me in my current position to succeed. After completing the courses, I gave my manager the completion certificates. Recently I received a promotion too."
Valencia Marie Aviles - 5 STAR REVIEW
"I had a very good experience with my course. It has helped me to get multiple jobs and prepared me for almost everything I would need to know. The course was very informative and easy to understand and broken up perfectly to be done in a short amount of time while still learning a good amount! I would recommend Courses for Success to anyone trying to get abs certifications for job advancements, it is well worth it!"
ELENA GRIFFIN - 5 STAR REVIEW
"I have absolutely enjoyed the materials from Courses for Success. The materials are easy to understand which makes learning enjoyable. Courses for Success have great topics of interest which make you come back for more.
Thank you Courses for Success for being part of my learning journey and making education affordable!"

Our completion certificates are very valuable and will help you progress in your work environment and show employers how committed you are to learn new skills, you might even get a promotion.

19.  Will this course be credited by universities?

No, it is not equivalent to a college or university credit.

20.  Am I guaranteed to get a job with this certificate?

This course will give you the skills you need to help you obtain employment, but it’s up to you if you get the job or not.

21.  How will this course assist me with my career?

Studying and completing this course will show employers that you have the knowledge in this field, additionally you will gain more confidence in this area of expertise.

22.  How long is the certificate valid for?

The Certificates are valid for life and do not need renewing. 

23.  Can I take more than one course at a time?

Courses are studied online at your own pace and you are free to study as many or as few courses as you wish, we also offer online course bundles that allow you to save on additional courses so that you may get all the topics related to your training goals in one go.

24.  What are the Payment Methods available? Is there a payment plan?

We accept payments via PayPal, Credit Card, Bank Transfer and Amazon Pay for the USA. For payment plans, we offer Sezzle for USA & Canada, Afterpay for Australia & New Zealand. *For faster transaction Credit Card payments are preferred. Please purchase online via our website course product page or contact us at email/info)(coursesforsuccess.com, to pay via bank transfer.

25.  Can I purchase for multiple people?

Yes, you can do this by purchasing individually via website or send us a request via email at email/info)(coursesforsuccess.com

26.  Can I request for an invoice before purchase?

Yes, you can request for an invoice via email at email/info)(coursesforsuccess.com

27.  Purchase for a gift?

Yes, you can purchase this course as a gift, simply send an email to email/info)(coursesforsuccess.com, with the course details and we can accommodate this.

28.  Can I create my own course bundle?

Yes, you can customize your own bundle. Please send us the complete list with the exact course link of the courses you'd like to bundle up via email email/info)(coursesforsuccess.com and we will create them for you. *Each course access, time of completion and certification varies depending on the course type.

29.  How will I contact Courses For Success if I have any questions?

You can contact our support team, at any time through live chat on our website, or email at email/info)(coursesforsuccess.com, or by calling one of our phone numbers depending on which country you are in.  

We provide a 7 Day Money Back Refund on all Courses

Special Offer

 

Receive The Personal Success Training Program FREE, When You Purchase This Course - Limited Time Remaining!  (Value $600)

 

The Personal Success Training Program Helps You Stay Focused To Achieve Your Goals!
Benefits:
  • How to layout a Success Plan.
  • Get where you want to be in life.
  • How to unclutter your mind to succeed.
  • Achieve your dreams using your imagination.
  • How to have faith in yourself.
Features:
  • 12 month online access,  24/7 anywhere.
  • Complement your individual course purchase.
  • Thousands of positive reviews.
  • Limited Time Offer - Ends Soon.
 

Training 2 Or More People?


Empower your business with access to 500+ job & soft skills online training courses.

SUCCESS PRO - For Business

Course Summary

Course ID: 009SRMCSES
Delivery Mode: Online
Access: Unlimited Lifetime
Tutor Support: Yes
Time: Study at your own pace
Duration: 61 Hours
Assessments: Yes
Qualification: Certificate

Popular Courses and Bundles

Get a FREE Career Planner