BACK TO MCITP : EDST WINDOWS AND SERVERS TRAINING COURSES
ECITP : EDST DATABASE ADMIN. | Level 1-3 | Course Info...
Course Duration: 1 Day | Class Time: 9am - 4:30pm | Class Size: 6 Students Max
Training Room Location: Level 1, Opp. Reg. Hosp. Barracks Street Sunyani
Course Materials: As part of the course you will receive many useful resources and learning links to compliment your training and help you stay on track after your course.
Certificates: All students receive a certificate of achievement on completion of their course.
After Course Support: On completion of your course you will be eligible for free email and phone support*, to aid you in the development of your new skills.
FREE Course Resit: We offer you the chance to come back in the future and resit your course for FREE*, so if you want to polish your skills further or just recap on a few things this is a great option.
What you need to bring: Nothing. We supply a PC computer for you to use with all software already installed and have note pads, pens etc in the training room. If you think it would be beneficial to bring some samples of your work that would be great but not essential.
Cost: GH¢ ?? +GST
About Our ECITP : EDST DataBase Admin Level 1 Course
Aims of the course
This course aims to introduce people with little or no understanding of the MCITP: Enterprise Desktop Support Technician on Windows 7.
Course Objectives
On completion of the course students should understand and be able to accomplish basic operations associated with Installing, upgrading, and migrating to Windows Database Admin, Configuring hardware and applications and learn to identify and fix problems, Configuring network connectivity and mobile computing, and How to monitor and maintain systems that run on Windows Database Admin. They should also be able to use some of the more advanced MCITP: Enterprise Desktop Support Technician Database Admin:
-
Monitoring and Maintaining Systems that Run Windows Database Admin
-
Configuring Backup and Recovery Options
-
Configuring Access to Resources
-
Deploying Windows Database Admin
Configuring Hardware and Applications
Configuring Mobile Computing
Monitoring and Maintaining Systems that Run Windows Database Admin
Managing and Maintaining Systems that Run Windows Database Admin Client
Supporting Mobile Users
Identifying Cause of and Resolving Security Issues
-
Configuring Network Connectivity .
How the course is run
This instructor-led course has a hands-on approach, with plenty of opportunity for students to practise the new skills they learn at the computer.
Pre-requisites
Students attending the course should preferably have a basic understanding of the Windows environment and use of the keyboard and mouse.
COURSE DATES - SYD |
MAY |
JUN |
JUL |
AUG |
SEP |
OCT |
|---|---|---|---|---|---|---|
DataBase Admin Level 1 |
call |
call |
call |
call |
call |
call |
DataBase Admin Level 2 |
call |
call |
call |
call |
call |
call |
DataBase Admin Level 3 |
call |
call |
call |
call |
call |
call |
Course Outline
MCITP : SERVER ADMINISTRATOR
Active Directory Configuration on Server 2008
Configuring Domain Name System (DNS) for Active Directory
-
Configuring Zone:
May include but not limited to: Dynamic DNS (DDNS), Non-Dynamic DNS (NDDNS), and Secure Dynamic DNS (SDDND), Time to Live (TTL), Global Names, Primary, Secondary, Active Directory Integrated, Stub, SOA, Zone scavenging, forward lookup, reverse lookup -
Configure DNS server setting:
May include but not limited to: forward, root hints, configure zone delegation, round robin, disable recusion, debug logging, server scavenging -
Configuring zone transfers and replication
May include but not limited to: configure replication score (forest DNS zone, domainDNS), incremental zone transfers, DNS Notify, secure zone transfers, configure name severs, application directory partitions
Configuring the Active Directory infracstructure
-
Configure a forest or a domain
May include but not limited to: remove a domain, perform an unattended installation, Active Directory Migration Tool (ADMT) v3 (pruning and grafting), raise forest and domain fuctional levels, interoperability with previous versions of Active Directory, alternate principal name (UPN) suffix, forestprep, domainprep -
Configure trust
May include but not limited to: forest trust, selective authentication verses forest-wide authentication, transitive trust, external trust, shortcut trust, SID filtering -
Configure sites
May include but not limited to: create Active Directory subnets, configure site links, configure site link costing, configure sites infrastructure -
Configure Active Directory replication
May include but is not limited to: Distributed File System, one-way replication, bridge head server, replication scheduling, configure replication protocol, force intersite replication -
Configure the global catalog
May include but is not limited to:Universal Group Membership Caching (UGMC), partial attribute set, promote to global catalog -
Configure operations masters
May include but is not limited to: seize and transfer, backup operations master, operations master placement, Schema Master, extending the schema, time service
Configure additional Active Directory Server Roles
-
Configure Active Directory Lightweight Directory Services (AD LDS)
May include but is not limited to: Migration to AD LDS, configure data within AD LDS, configure and authentication server, server core, Windows Server 2008 Hyper-V -
Configure Active Directory Rights Management Service (AD RMS)
May include but is not limited to: certificate request and installation, self-enrollments, delegation, Active Directory Metadirectory Services (AD MDS), Windows Server virtualization -
Configure the read-only domian conroller (RODC)
May include but is not limited to: unidirectional replication, Administrator role separation, read-only DNS, Bitlocker, credential caching, password replication, syskey, WIndows Server virtualization -
Configure Active Directory Federation Services )AD FS)
May include but is not limited to: install AD FD server role, exchange certificate with AD FS agent, configure trust policies, configure user and group claim mapping, Windows Server virtualization
Creating and maintaining Active Directory Objects
-
Automate creation of Active Dirctory accounts
May include but is not limited to: bulk import, configure the UPN, create computer, user, and group accounts (scripts, import, migration), template accoints, contacts, distribution lists -
Maintain Active Directory accouts
May include but is not limited to: configure group membership, accont resets, delegation, AGDLP/AGGUDLP, deny domain local group, local verses domian, Protected Admin, disabling accounts verses deleting accouts, deprovisioning, contacts, creating organisational units (OUs), delegation of control -
Create and apply Group Policy Objects (GPOs)
May include but is not limited to: enforce, OU hierarchy, block inheritance, and enabling user objects, Group Policy processing priority, WMI, Group Policy filtering, Group Policy loopback -
Configure GPO template
May include but is not limited to: user rights, ADMX Central Store, administrative templates,
security templates, restricted groups, security options, starter GPOs, shell access policies -
Configure software deployment GPOs
May include but is not limited to: publishing to users, assigning software to users, ssigning to computers, software removal -
Configure account policies
May include but is not limited to: domain password policy, account lockout policy, fine-grain
password policies -
Configure audit policy by using GPOs
May include but is not limited to: audit logon events, audit account logon events, audit policy change, audit access privilege use, audit directory service access, audit object access.
Maintaining the Active Directory Environment
-
Configure backup and recovery
May include but is not limited to: using Windows Server Backup, backup files and system state data to media, backup and restore by using removable media, perform an authoritative or non- authoritative Active Directory restore, linked value replication, Directory Services Recovery Mode (DSRM) (reset admin password), backup and restore GPOs -
Perform offline maintenance
May include but is not limited to: offline defragmentation and compaction, Restartable Active Directory, Active Directory database storage allocation -
Monitor Active Directory
May include but is not limited to: Network Monitor, Task Manager, Event Viewer, ReplMon,
RepAdmin, Windows System Resource Manager, Reliability and Performance Monitor, Server
Performance Advisor, RSOP
Configuring Active Directory Certificate Services
-
Install Active Directory Certificate Services
May include but is not limited to: standalone versus enterprise, CA hierarchies—root versus
subordinate, certificate requests, certificate practice statement -
Configure CA server settings
May include but is not to: key archival, certificate database backup and restore,
assigning administration roles -
Manager Certificate Templates
May include is not to: certificate template types, securing template permissions,
managing different certificate template versions, key recovery agent -
Manage certificate revocations
May include but is not limited to: configure Online Responders, Certificate Revocation List
(CRL), CRL Distribution Point (CDP), Authority Information Access (AIA)
Network Infrastructure Configuration on Server 2008
Configuring IP Addressing and Services
-
Configure IPv4 and IPv6 addressing, May include but is not to: configure IP
options, subnetting, supernetting, alternative configuration -
Configure Dynamic Host Configuration Protocol (DHCP). May include but is not limited to:
DHCP options, creating new options, PXE boot, default user profiles, DHCP relay agents,
exclusions, authorize server in Active Directory, scopes, server core, Windows Server Hyper-V -
Configure routing. May include but is not limited to: static routing, persistent routing, persistent routing, Routing Internet Protocol (RIP), Open Shortest Path (OSPF)
-
Configure IPsec. May include but is not limited to: create IPsec policy, IPsec
Authentication Header (AD), IPsec Encapsulating Security Payload (ESP)
Configuring Name Resolution
-
Configure a Domain Name System (DNS) server. May include but is not limited to:
conditional forwarding, external forwarders, root hints, cache-only, server core, WINS and DNS integration, Windows Server virtualization -
Configure DNS zones. May include but is not limited to: DNS Refresh no-refresh, intervals,
DNS listserv address (NSLOOKUP), primary / secondary zones, Active Directory integration,
Dynamic Domain Name System (DDNS), GlobalNames, SOA refresh -
Configure DNS records. May include but is not limited to: record types, host, pointer, MX,
SRV, NS, dynamic updates, Time to Live (TTL) -
Configure DNS replication. May include but is not limited to: DNS secondary zones, DNS
stub zones, DNS scavenging interval, replication scope -
Configure name resolution for client computers. Ma include but is not limited to: DNS
and WINS integration, configuring HOSTS file, LMHOSTS, node type, Link-Local Multicast Name
Resolution (LLMNR), broadcasting, resolver cache, DNS Server list, Suffix Search order,
manage client settings by using group policy
Configuring Network Access
-
Configure remote access. May include but is not limited to: dial-up, Remote Access Policy,
Network Address Translation (NAT), Internet Connection Sharing (ICS), VPN, Routing and
Remote Access Service (RRAS), inbound/outbound filters, configure Remote Authentication
Dial-In User Service (RASDIUS) server, configure RADIUS proxy, remote access protocols,
Connection Manager -
Configure Network Access Protection (NAP). May include but is not limited to: network
layer protection, DHCP enforcement, VPN enforcement, configure NAP health Policies, IPsec
enforcement, 802.1x enforcement, flexible host isolation -
Configure network authentication. May include but is not limited to: LAN authentication
by using NTLMv2 and Kerberos, WLAN authentication by using 802.1x, RAS authentication by using MS-CHAP, MS-CHAP v2 and EAP -
Configure wireless access. May include but is not limited to: Set Service identifier (SSID),
Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), Wi-Fi Protected Access 2
(WPA2), ad hoc versus infrastructure mode, group policy for wireless -
Configure firewall settings. May include but is not limited to: incoming and outgoing
traffic filtering, Active Directory account integration, identify ports and protocols, Microsoft
Windows Firewall versus windows Firewall with Advanced Security, configure firewall by
using group policy, Isolation policy
Configuring File and Print Services
-
Configure a file server. May include but is not limited to: file share publishing, Offline
Files, share permissions, NTFS permissions, encrypting file system (EFS) -
Configure Distributed File System (DFS). May include but is not limited to: DFS
namespace, DFS configuration and application , creating and configuring targets, DGS
replication -
Configure shadow copy services. Ma include but is not limited to: recover previous
versions, set schedule, set storage locations -
Configure backup and restore. May include but is not limited to: backup types, backup
schedules, managing remotely, restoring data -
Manage disk quotas. May include but is not limited to: quota by volume or quota by user,
quota entries, quota templates -
Configure and monitor print services. May include but is not limited to: printer share,
publish printers to Active Directory, printer permissions, deploy printer connections, install
printer drivers, export and import print queues and printer settings, add counters to
Reliability and Performance Monitor to monitor print servers, print pooling, print priority
Monitoring and Managing a Network Infrastructure
-
Configure Windows Server Update Services (WSUS) server settings. May include but is not limited to: update type selection, client settings, Group Policy object (GPO), client targeting,
software updates, test and approval, disconnected networks -
Capture performance data. May include but is not limited to: Data Collector Sets,
Performance Monitor, Reliability Monitor, monitoring System Stability Index -
Monitor event logs. May include but is not limited to: custom views, application and
services logs, subscriptions, DNS log -
Gather network data. May include but is not: Simple Network Management
Protocol (SNMP), Baseline Security Analyzer Network Monitor
Server 2008 Administration
Planning for Server Deployment
-
Plan server installations and upgrades. May include but is not limited to: Windows Server
2008 edition selection, rollback planning, Bitlocker implementation requirements -
Plan for automated server deployment. May include but is not limited to: standard server
image, automation and scheduling of server deployments -
Plan infrastructure services sever roles. May include but is not limited to: address
assignment, name resolution network access control, directory services, application services, certificate services -
Plan application servers and services. May include but is not limited to: virtualization
server planning, availability, resilience, and accessibility -
Plan file and print server and services. May include is not limited to: access permissions,
storage quotas, replication, indexing, file storage policy, availability, printer publishing
Planning for Server Management
-
Plan server management strategies. May include but it not limited to: remote
administration, remote desktop, server management technologies, Server Manager and
ServerManagerCMD, delegation policies and procedures -
Plan for delegated administration. May include but is not limited to: delegate authority,
delegate Active Directory objects, application management -
Plan and implement group policy strategy. May include but is not limited to: GPO
management, GPO backup and recovery, group policy troubleshooting, group policy planning
Monitoring and Maintaining Servers
-
Implement patch management strategy. May include but is not limited to: operating system patch level maintenance, Windows Server Update Services (WSUS), application patch
level maintenance -
Monitor servers for performance evaluation and optimization. May include but is not limited to: server and service monitoring, optimization, event management, trending and baseline analysis
-
Monitor and maintain security and policies. May include but is not limited to: remote
access, monitor and maintain NPAS, network access, server security, firewall rules and policies
authentication and authorization, data security, auditing
Planning Application and Data Provisioning
-
Provision applications. May include but is not limited to: presentation virtualization,
terminal server infrastructure, resource allocation, application virtualization alternatives,
application deployment, System Center Configuration Manager -
Provision data. May include but is not limited to: shard resources, offline data access
Planning for Business Continuity and High Availability
-
Plan storage. May include but is not limited to: storage solutions, storage management
-
Plan high availability. May include but is not limited to: service redundancy , service
availability -
Plan for backup and recovery, May include but is not limited to: data recovery strategy,
Server recovery strategy, service recovery, object level recovery
MCITP : ENTERPRISE ADMINISTRATOR
Application Infrastructure, Configuring on Server 2008
Deploying Servers
-
Deploy images by using Windows Deployment Services
May include but is not limited to: Install from media (IFM), configure Windows Deployment
Services, capture Widows Deployment Services images, deploy Widows Deployment
Services images, server core -
Configure Microsoft Widows activation
May include but is not limited to: install a KMS server, create a DNS SRV record, replicate
volume license data -
Configure Windows Server Hyper-V and virtual machines
May include but is not limited to: virtual networking ,virtualization hardware requirements,
Virtual Hard Disks, migrate from physical to virtual, VM additions, backup, optimization, server core -
Configure high availability
May include but is not limited to: failover clustering, Network Load Balancing, hardware
redundancy -
Configure storage
May include but is not limited to: RAID types, Virtual Disk Specification (VDS) API, Network Attached Storage, iSCSI and Fibre Channel storage area networks, mount points
Configuring Terminal Services
-
Configure Windows Server 2008 Terminal Services Web Access, configuring RemoteApp (TS Remote App)
May include but is not limited to: configuring Terminal Services Web Access, configuring
Terminal Services Remote Desktop Web Connection -
Configure Terminal Services Gateway
May include but is not limited to: certificate configuration, Terminal Services Gateway Manager
(TS Gateway Manager), specifying resources that users can access through TS Gateway by
Using Terminal Services resources authorization policy (TS RAP) and Terminal Services
connection authorization policy (TS CAP), Terminal Services group policy -
Configure Terminal Services load balancing
May include but is not limited to: Terminal Services Session Broker redirection modes , DNS
registration, setting through group policy -
Configure and monitor Terminal Services resources
May include but is not limited to: allocate resources by using Windows Server Resource
Manager, configure application logging -
Configure Terminal Services licensing
-
May include but is not limited to: deploy licensing server, connectivity between terminal
servers and Terminal Services licensing server, recovering Terminal Services licensing server, managing Terminal Services client access licenses (TS CALS) -
Configure Terminal Services client connections
May include but is not limited to: connecting local devices and resources to a session, Terminal Services profiles, Terminal services home folders, Remote Desktop Connection (RDC), single sign-on, Remote Desktop Snap – In, MSTSC.exe -
Configure Terminal Services server options
May include but is not limited to: logoff, disconnect, reset, remote control, monitor, Remote
Desktop Protocol (RDP) permissions, connection limits, session time limits, managing by using GPOs, viewing processes, session permissions, display data prioritization
Configuring a Web Services Infrastructure
-
Configure Web applications
May include but is not limited to: directory – dependent, publishing, URL – specified
configuration, Microsoft .NET components, for example, .NET and .aspx, configure application pools -
Mange Web sites
May include but is not limited to: migrate sites and Web applications, publish HS Web sites,
configure virtual directories -
Configure a File Transfer Protocol (FTP) server
May include but is not limited: configure for extranet user, configure permissions -
Configure Simple Protocol (SMTP).
May include but is not limited to: setting up smart hosts, configuring size limitations, setting up security and authentication to the delivering server, creating proper service accounts,
authentication, SMTP relay -
Manage Internet Information Services (HS)
May include but is not limited to: Web site content backup and restore, HS configuration
backup, monitor HS, configure logging, delegation of administrative rights
-
Configure SSL security.
May include but is not limited to: configure certificates, requesting SSL certificate, renewing
SSL certificate, exporting and importing certificate -
Configure Web site authentication and permissions
May include but is not limited to: configure site permissions and authentication, configure
application permissions, client certificate mappings
Configuring Network Application Services
-
Configure Windows Media server
May include but is not limited to: on-demand replication, configure time-sensitive content,
caching and proxy -
Configure Digital Rights Management (DRM)
May include but is not limited to: encryption, sharing business rules, configuring license
delivery, configuring policy templates -
Configure Microsoft Windows SharePoint Services server options
May include but is not limited to: site permissions, backup, antivirus, configuring Windows
SharePoint Services service accounts -
Configure Windows SharePoint Services e-mail integration
May include but is not limited to: configuring a document library to receive e-mail, configuring incoming versus outgoing e-mail
Server 2008 Enterprise Administrator
Planning network and application services
-
Plan for name resolution and IP addressing
May include but is not limited to: internal and external naming strategy, naming resolution support for legacy clients, naming resolution for directory services, IP addressing scheme,
TCP/IP version coexistence -
Design for network access
May include but is not limited to: network access policies, remote access strategy, perimeter networks, server and domain isolation -
Plan for application delivery
May include but is not limited to: application virtualization, presentation virtualization, locally installed software, Web-based applications -
Plan for Terminal Services
May include but is not limited to: Terminal Services licensing, Terminal Services infrastructure
Designing identity and access management component (25 percent)
-
Design Active Directory forests and domains
May include but is not limited to: forest structure, forest and domain functional levels, intra-organizational authorization and authentication, modifications -
Design the Active Directory physical topology
May include but is not limited to: placement of servers, site and replication topology, printer location polices -
Design the Active Directory administrative model
May include but is not limited to: delegation, group strategy, compliance auditing, group administration, organizational structure -
Design the enterprise-level group policy strategy
May include but is not limited to: group policy hierarchy and scope filtering, control device installation, authentication and authorization
Designing support identity and access management component
-
Plan for domain or forest migration, upgrade, and restructuring
May include but is not limited to: cross-forest authentication, backward compatibility, object migration, migration planning, implementation planning, environment preparation -
Design the branch office deployment
May include but is not limited to: authentication strategy, server security -
Design and implement public key infrastructure
May include but is not limited to: certificate services, PKI operations and maintenance, certificate life cycle management -
Plan for interoperability. May include but is not limited to: inter-organizational
authorization and authentication, application authentication interoperability, cross – platform interoperability
Designing for business continuity and data availability
-
Plan for business continuity
May include but is not limited to: service availability, directory service recovery
-
Design for software updates and compliance, management
May include but is not limited to: patch management and patch management compliance, Microsoft Update and Widows Update , security baselines, system health models
-
Design the operating system virtualization strategy
May include but is not limited to: server consolidation, application compatibility, virtualization management, placement of servers -
Design for data management and data access
May include but is not limited to: data security, data accessibility and redundancy, data collaboration
Configuring Microsoft Windows Vista Client
Installing and upgrading Windows Vista
-
Identify hardware requirements
-
Perform a clean installation.
-
Upgrade to Windows Vista from previous versions of Windows.
-
Upgrade from one edition of Windows Vista to another edition.
-
Troubleshoot Windows Vista installation issues.
-
Install and configure Windows Vista drivers.
Configuring and troubleshooting Post-installation system setting
-
Troubleshoot post-installation configuration issues.
-
Configure and troubleshoot Windows Aero.
-
Configure and troubleshoot parental controls.
-
Configure Microsoft Internet Explorer.
Configuring Windows security features
-
Configure and troubleshoot User Account Control
-
Configure Windows Defender.
-
Configure Dynamic Security for Microsoft Internet Explorer 7.
-
Configure Security settings in Windows Firewall.
Configuring network connectivity
-
Configuring networking by using the Networking and Sharing Center.
-
Troubleshoot connectivity issues
-
Configure remote access
Configuring applications included with Windows Vista
-
Configure and troubleshoot media applications.
-
Configure Windows Mail.
-
Configure Windows Meeting Space.
-
Configure Windows Calendar.
-
Configure windows Fax and Scan.
-
Configure Windows Sidebar.
Maintaining and optimizing systems that run Windows Vista
-
Troubleshoot performance issues.
-
Troubleshoot reliability issues by using built-in diagnostic tools.
-
Configure Windows Update.
-
Configure data protection.
Configuring and troubleshooting mobile computing
-
Configure mobile display settings.
-
Configure devices.
-
Configure Tablet PC software.
-
Configure options.
Our ECITP : EDST DataBase Admin training is perfect for anyone
who needs skills to easily proves competency in computing environ
ments that use microsoft Database Admin as a desktop operating system in an enterprise environmentto. Our ECITP : EDST WINDOWS Database Admin courses Installing, Upgrading, and Migrating to Windows Database Admin etc and all
types of ECITP : EDST environment at basic, intermediate and advanced levels.






