backBACK TO MCITP : EDST WINDOWS AND SERVERS TRAINING COURSES

 

ECITP : EDST DATABASE ADMIN. | Level 1-3 | Course Info...

Course Duration: 1 Day | Class Time: 9am - 4:30pm | Class Size: 6 Students Max

Training Room Location: Level 1, Opp. Reg. Hosp. Barracks Street Sunyani

Course Materials: As part of the course you will receive many useful resources and learning links to compliment your training and help you stay on track after your course.

Certificates: All students receive a certificate of achievement on completion of their course.

After Course Support: On completion of your course you will be eligible for free email and phone support*, to aid you in the development of your new skills.

FREE Course Resit: We offer you the chance to come back in the future and resit your course for FREE*, so if you want to polish your skills further or just recap on a few things this is a great option.

What you need to bring: Nothing. We supply a PC computer for you to use with all software already installed and have note pads, pens etc in the training room. If you think it would be beneficial to bring some samples of your work that would be great but not essential.

 

Cost: GH¢ ?? +GST

 

 

 

 

 


 

About Our ECITP : EDST DataBase Admin Level 1 Course

Aims of the course

This course aims to introduce people with little or no understanding of the MCITP: Enterprise Desktop Support Technician on Windows 7.

Course Objectives

On completion of the course students should understand and be able to accomplish basic operations associated with Installing, upgrading, and migrating to Windows Database Admin, Configuring hardware and applications and learn to identify and fix problems, Configuring network connectivity and mobile computing, and How to monitor and maintain systems that run on Windows Database Admin. They should also be able to use some of the more advanced MCITP: Enterprise Desktop Support Technician Database Admin:

  • Monitoring and Maintaining Systems that Run Windows Database Admin

  • Configuring Backup and Recovery Options

  • Configuring Access to Resources

  • Deploying Windows Database Admin

  • Configuring Hardware and Applications

  • Configuring Mobile Computing

  • Monitoring and Maintaining Systems that Run Windows Database Admin

  • Managing and Maintaining Systems that Run Windows Database Admin Client

  • Supporting Mobile Users

  • Identifying Cause of and Resolving Security Issues

  • Configuring Network Connectivity .

How the course is run

This instructor-led course has a hands-on approach, with plenty of opportunity for students to practise the new skills they learn at the computer.

Pre-requisites

Students attending the course should preferably have a basic understanding of the Windows environment and use of the keyboard and mouse.

 

 

 

COURSE DATES - SYD

MAY

JUN

JUL

AUG

SEP

OCT

DataBase Admin Level 1

call

call

call

call

call

call

DataBase Admin Level 2

call

call

call

call

call

call

DataBase Admin Level 3

call

call

call

call

call

call

 

 

Course Outline

MCITP : SERVER ADMINISTRATOR

Active Directory Configuration on Server 2008


Configuring Domain Name System (DNS) for Active Directory

  • Configuring Zone:
    May include but not limited to: Dynamic DNS (DDNS), Non-Dynamic DNS (NDDNS), and Secure Dynamic DNS (SDDND), Time to Live (TTL), Global Names, Primary, Secondary, Active Directory Integrated, Stub, SOA, Zone scavenging, forward lookup, reverse lookup

  • Configure DNS server setting:
    May include but not limited to: forward, root hints, configure zone delegation, round robin, disable recusion, debug logging, server scavenging

  • Configuring zone transfers and replication
    May include but not limited to: configure replication score (forest DNS zone, domainDNS), incremental zone transfers, DNS Notify, secure zone transfers, configure name severs, application directory partitions

Configuring the Active Directory infracstructure

  • Configure a forest or a domain
    May include but not limited to: remove a domain, perform an unattended installation, Active Directory Migration Tool (ADMT) v3 (pruning and grafting), raise forest and domain fuctional levels, interoperability with previous versions of Active Directory, alternate principal name (UPN) suffix, forestprep, domainprep

  • Configure trust
    May include but not limited to: forest trust, selective authentication verses forest-wide authentication, transitive trust, external trust, shortcut trust, SID filtering

  • Configure sites
    May include but not limited to: create Active Directory subnets, configure site links, configure site link costing, configure sites infrastructure

  • Configure Active Directory replication
    May include but is not limited to: Distributed File System, one-way replication, bridge head server, replication scheduling, configure replication protocol, force intersite replication

  • Configure the global catalog
    May include but is not limited to:Universal Group Membership Caching (UGMC), partial attribute set, promote to global catalog

  • Configure operations masters
    May include but is not limited to: seize and transfer, backup operations master, operations master placement, Schema Master, extending the schema, time service


Configure additional Active Directory Server Roles

  • Configure Active Directory Lightweight Directory Services (AD LDS)
    May include but is not limited to: Migration to AD LDS, configure data within AD LDS, configure and authentication server, server core, Windows Server 2008 Hyper-V

  • Configure Active Directory Rights Management Service (AD RMS)
    May include but is not limited to: certificate request and installation, self-enrollments, delegation, Active Directory Metadirectory Services (AD MDS), Windows Server virtualization

  • Configure the read-only domian conroller (RODC)
    May include but is not limited to: unidirectional replication, Administrator role separation, read-only DNS, Bitlocker, credential caching, password replication, syskey, WIndows Server virtualization

  • Configure Active Directory Federation Services )AD FS)
    May include but is not limited to: install AD FD server role, exchange certificate with AD FS agent, configure trust policies, configure user and group claim mapping, Windows Server virtualization

Creating and maintaining Active Directory Objects

  • Automate creation of Active Dirctory accounts
    May include but is not limited to: bulk import, configure the UPN, create computer, user, and group accounts (scripts, import, migration), template accoints, contacts, distribution lists

  • Maintain Active Directory accouts
    May include but is not limited to: configure group membership, accont resets, delegation, AGDLP/AGGUDLP, deny domain local group, local verses domian, Protected Admin, disabling accounts verses deleting accouts, deprovisioning, contacts, creating organisational units (OUs), delegation of control

  • Create and apply Group Policy Objects (GPOs)
    May include but is not limited to: enforce, OU hierarchy, block inheritance, and enabling user objects, Group Policy processing priority, WMI, Group Policy filtering, Group Policy loopback

  • Configure GPO template
    May include but is not limited to: user rights, ADMX Central Store, administrative templates,
    security templates, restricted groups, security options, starter GPOs, shell access policies

  • Configure software deployment GPOs
    May include but is not limited to: publishing to users, assigning software to users, ssigning to computers, software removal

  • Configure account policies
    May include but is not limited to: domain password policy, account lockout policy, fine-grain
    password policies

  • Configure audit policy by using GPOs
    May include but is not limited to: audit logon events, audit account logon events, audit policy change, audit access privilege use, audit directory service access, audit object access.

Maintaining the Active Directory Environment

  • Configure backup and recovery
    May include but is not limited to: using Windows Server Backup, backup files and system state data to media, backup and restore by using removable media, perform an authoritative or non- authoritative Active Directory restore, linked value replication, Directory Services Recovery Mode (DSRM) (reset admin password), backup and restore GPOs

  • Perform offline maintenance
    May include but is not limited to: offline defragmentation and compaction, Restartable Active Directory, Active Directory database storage allocation

  • Monitor Active Directory
    May include but is not limited to: Network Monitor, Task Manager, Event Viewer, ReplMon,
    RepAdmin, Windows System Resource Manager, Reliability and Performance Monitor, Server
    Performance Advisor, RSOP

Configuring Active Directory Certificate Services

  • Install Active Directory Certificate Services
    May include but is not limited to: standalone versus enterprise, CA hierarchies—root versus
    subordinate, certificate requests, certificate practice statement

  • Configure CA server settings
    May include but is not to: key archival, certificate database backup and restore,
    assigning administration roles

  • Manager Certificate Templates
    May include is not to: certificate template types, securing template permissions,
    managing different certificate template versions, key recovery agent

  • Manage certificate revocations
    May include but is not limited to: configure Online Responders, Certificate Revocation List
    (CRL), CRL Distribution Point (CDP), Authority Information Access (AIA)

Network Infrastructure Configuration on Server 2008

Configuring IP Addressing and Services

  • Configure IPv4 and IPv6 addressing, May include but is not to: configure IP
    options, subnetting, supernetting, alternative configuration

  • Configure Dynamic Host Configuration Protocol (DHCP). May include but is not limited to:
    DHCP options, creating new options, PXE boot, default user profiles, DHCP relay agents,
    exclusions, authorize server in Active Directory, scopes, server core, Windows Server Hyper-V

  • Configure routing. May include but is not limited to: static routing, persistent routing, persistent routing, Routing Internet Protocol (RIP), Open Shortest Path (OSPF)

  • Configure IPsec. May include but is not limited to: create IPsec policy, IPsec
    Authentication Header (AD), IPsec Encapsulating Security Payload (ESP)

Configuring Name Resolution

  • Configure a Domain Name System (DNS) server. May include but is not limited to:
    conditional forwarding, external forwarders, root hints, cache-only, server core, WINS and DNS integration, Windows Server virtualization

  • Configure DNS zones. May include but is not limited to: DNS Refresh no-refresh, intervals,
    DNS listserv address (NSLOOKUP), primary / secondary zones, Active Directory integration,
    Dynamic Domain Name System (DDNS), GlobalNames, SOA refresh

  • Configure DNS records. May include but is not limited to: record types, host, pointer, MX,
    SRV, NS, dynamic updates, Time to Live (TTL)

  • Configure DNS replication. May  include but is not limited to: DNS secondary zones, DNS
    stub zones, DNS scavenging interval, replication scope

  • Configure name resolution for client computers. Ma include but is not limited to: DNS
    and WINS integration, configuring HOSTS file, LMHOSTS, node type, Link-Local Multicast Name
    Resolution (LLMNR), broadcasting, resolver cache, DNS Server list, Suffix Search order,
    manage client settings by using group policy

Configuring Network Access

  • Configure remote access. May include but is not limited to: dial-up, Remote Access Policy,
    Network Address Translation (NAT), Internet Connection Sharing (ICS), VPN, Routing and
    Remote Access Service (RRAS), inbound/outbound filters, configure Remote Authentication
    Dial-In User Service (RASDIUS) server, configure RADIUS proxy, remote access protocols,
    Connection Manager

  • Configure Network Access Protection (NAP). May include but is not limited to: network
    layer protection, DHCP enforcement, VPN enforcement, configure NAP health Policies, IPsec
    enforcement, 802.1x enforcement, flexible host isolation

  • Configure network authentication. May include but is not limited to: LAN authentication
    by using NTLMv2 and Kerberos, WLAN authentication by using 802.1x, RAS authentication by using MS-CHAP, MS-CHAP v2 and EAP

  • Configure wireless access. May include but is not limited to: Set Service identifier (SSID),
    Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), Wi-Fi Protected Access 2
    (WPA2), ad hoc versus infrastructure mode, group policy for wireless

  • Configure firewall settings. May include but is not limited to: incoming and outgoing
    traffic filtering, Active Directory account integration, identify ports and protocols, Microsoft
    Windows Firewall versus windows Firewall with Advanced Security, configure firewall by
    using group policy, Isolation policy

Configuring File and Print Services

  • Configure a file server. May include but is not limited to: file share publishing, Offline
    Files, share permissions, NTFS permissions, encrypting file system (EFS)

  • Configure Distributed File System (DFS). May include but is not limited to: DFS
    namespace, DFS configuration and application , creating and configuring targets, DGS
    replication

  • Configure shadow copy services. Ma include but is not limited to: recover previous
    versions, set schedule, set storage locations

  • Configure backup and restore. May include but is not limited to: backup types, backup
    schedules, managing remotely, restoring data

  • Manage disk quotas. May include but is not limited to: quota by volume or quota by user,
    quota entries, quota templates

  • Configure and monitor print services. May include but is not limited to: printer share,
    publish printers to Active Directory, printer permissions, deploy printer connections, install
    printer drivers, export and import print queues and printer settings, add counters to
    Reliability and Performance Monitor to monitor print servers, print pooling, print priority

Monitoring and Managing a Network Infrastructure

  • Configure Windows Server Update Services (WSUS) server settings. May include but is not limited to: update type selection, client settings, Group Policy object (GPO), client targeting,
    software updates, test and approval, disconnected networks

  • Capture performance data. May include but is not limited to: Data Collector Sets,
    Performance Monitor, Reliability Monitor, monitoring System Stability Index

  • Monitor event logs. May include but is not limited to: custom views, application and
    services logs, subscriptions, DNS log

  • Gather network data. May include but is not: Simple Network Management
    Protocol (SNMP), Baseline Security Analyzer Network Monitor

Server 2008 Administration

Planning for Server Deployment

  • Plan server installations and upgrades. May include but is not limited to: Windows Server
    2008 edition selection, rollback planning, Bitlocker implementation requirements

  • Plan for automated server deployment. May include but is not limited to: standard server
    image, automation and scheduling of server deployments

  • Plan infrastructure services sever roles. May include but is not limited to: address
    assignment, name resolution network access control, directory services, application services, certificate services

  • Plan application servers and services. May include but is not limited to: virtualization
    server planning, availability, resilience, and accessibility

  • Plan file and print server and services. May include is not limited to: access permissions,
    storage quotas, replication, indexing, file storage policy, availability, printer publishing

Planning for Server Management

  • Plan server management strategies. May include but it not limited to: remote
    administration, remote desktop, server management technologies, Server Manager and
    ServerManagerCMD, delegation policies and procedures

  • Plan for delegated administration. May include but is not limited to: delegate authority,
    delegate Active Directory objects, application management

  • Plan and implement group policy strategy. May include but is not limited to: GPO
    management, GPO backup and recovery, group policy troubleshooting, group policy planning

Monitoring and Maintaining Servers

  • Implement patch management strategy. May include but is not limited to: operating system patch level maintenance, Windows Server Update Services (WSUS), application patch
    level maintenance

  • Monitor servers for performance evaluation and optimization. May include but is not limited to: server and service monitoring, optimization, event management, trending and baseline analysis

  • Monitor and maintain security and policies. May include but is not limited to: remote
    access, monitor and maintain NPAS, network access, server security, firewall rules and policies
    authentication and authorization, data security, auditing

Planning Application and Data Provisioning

  • Provision applications. May include but is not limited to: presentation virtualization,
    terminal server infrastructure, resource allocation, application virtualization alternatives,
    application deployment, System Center Configuration Manager

  • Provision data. May include but is not limited to: shard resources, offline data access

Planning for Business Continuity and High Availability

  • Plan storage. May include but is not limited to: storage solutions, storage management

  • Plan high availability. May include but is not limited to: service redundancy , service
    availability

  • Plan for backup and recovery, May include but is not limited to: data recovery strategy,
    Server recovery strategy, service recovery, object level recovery

MCITP : ENTERPRISE ADMINISTRATOR

Application Infrastructure, Configuring on Server 2008

Deploying Servers

  • Deploy images by using Windows Deployment Services
    May include but is not limited to: Install from media (IFM), configure Windows Deployment
    Services, capture Widows Deployment Services images, deploy Widows Deployment
    Services images, server core

  • Configure Microsoft Widows activation
    May include but is not limited to: install a KMS server, create a DNS SRV record, replicate
    volume license data

  • Configure Windows Server Hyper-V and virtual machines
    May include but is not limited to: virtual networking ,virtualization hardware requirements,
    Virtual Hard Disks, migrate from physical to virtual, VM additions, backup, optimization, server core

  • Configure high availability
    May include but is not limited to: failover clustering, Network Load Balancing, hardware
    redundancy

  • Configure storage
    May include but is not limited to: RAID types, Virtual Disk Specification (VDS) API, Network Attached Storage, iSCSI and Fibre Channel storage area networks, mount points

Configuring Terminal Services

  • Configure Windows Server 2008 Terminal Services Web Access, configuring RemoteApp (TS Remote App)
    May include but is not limited to: configuring Terminal Services  Web Access, configuring
    Terminal Services Remote Desktop Web Connection

  • Configure Terminal Services Gateway
    May include but is not limited to: certificate configuration, Terminal Services Gateway Manager
    (TS Gateway Manager), specifying resources that users can access through TS Gateway by
    Using Terminal Services resources authorization policy (TS RAP) and Terminal Services
    connection authorization policy (TS CAP), Terminal Services group policy

  • Configure Terminal Services load balancing
    May   include but is not limited to: Terminal Services Session Broker redirection modes , DNS
    registration, setting through group policy

  • Configure and monitor Terminal Services resources
    May include but is not limited to: allocate resources by using Windows Server Resource
    Manager, configure application logging

  • Configure Terminal Services licensing

  • May include but is not limited to: deploy licensing server, connectivity between terminal
    servers and Terminal Services licensing server, recovering Terminal Services licensing server, managing Terminal Services client access licenses (TS CALS)

  • Configure Terminal Services client connections
    May include but is not limited to: connecting local devices and resources to a session, Terminal Services profiles, Terminal services home folders, Remote Desktop Connection (RDC), single sign-on, Remote Desktop Snap – In, MSTSC.exe

  • Configure Terminal Services server options
    May include but is not limited to: logoff, disconnect, reset, remote control, monitor, Remote
    Desktop Protocol (RDP) permissions, connection limits, session time limits, managing by using GPOs, viewing processes, session permissions, display data prioritization

Configuring a Web Services Infrastructure

  • Configure Web applications
    May include but is not limited to: directory – dependent, publishing, URL – specified
    configuration, Microsoft .NET components, for example, .NET and .aspx, configure application pools

  • Mange Web sites
    May include but is not limited to: migrate sites and Web applications, publish HS Web sites,
    configure virtual directories

  • Configure a File Transfer Protocol (FTP) server
    May include but is not limited: configure for extranet user, configure permissions

  • Configure Simple Protocol (SMTP).
    May include but is not limited to: setting up smart hosts, configuring size limitations, setting up security and authentication to the delivering server, creating proper service accounts,
    authentication, SMTP relay

  • Manage Internet Information Services (HS)
    May include but is not limited to: Web site content backup and restore, HS configuration
    backup, monitor HS, configure logging, delegation of administrative rights

  • Configure SSL security.
    May include but is not limited to: configure certificates, requesting SSL certificate, renewing
    SSL certificate, exporting and importing certificate

  • Configure Web site authentication and permissions
    May include but is not limited to: configure site permissions and authentication, configure
    application permissions, client certificate mappings

Configuring Network Application Services

  • Configure Windows Media server
    May  include but is not limited to: on-demand replication, configure time-sensitive content,
    caching and proxy

  • Configure Digital Rights Management (DRM)
    May include but is not limited to: encryption, sharing business rules, configuring license
    delivery, configuring policy templates

  • Configure Microsoft Windows SharePoint Services server options
    May include but is not limited to: site permissions, backup, antivirus, configuring  Windows
    SharePoint Services service accounts

  • Configure Windows SharePoint Services e-mail integration
    May include but is not limited to: configuring a document library to receive e-mail, configuring incoming versus outgoing e-mail

Server 2008 Enterprise Administrator

Planning network and application services

  • Plan for name resolution and IP addressing
    May include but is not limited to: internal and external naming strategy, naming resolution support for legacy clients, naming resolution for directory services, IP addressing scheme,
    TCP/IP version coexistence

  • Design for network access
    May include but is not limited to: network access policies, remote access strategy, perimeter networks, server and domain isolation

  • Plan for application delivery
    May include but is not limited to: application virtualization, presentation virtualization, locally installed software, Web-based applications

  • Plan for Terminal Services
    May include but is not limited to: Terminal Services licensing, Terminal Services infrastructure

Designing identity and access management component (25 percent)

  • Design Active Directory forests and domains
    May include but is not limited to: forest structure, forest and domain functional levels, intra-organizational authorization and authentication, modifications

  • Design the Active Directory physical topology
    May include but is not limited to: placement of servers, site and replication topology, printer location polices

  • Design the Active Directory administrative model
    May include but is not limited to: delegation, group strategy, compliance auditing, group administration, organizational structure

  • Design the enterprise-level group policy strategy
    May include but is not limited to: group policy hierarchy and scope filtering, control device installation, authentication and authorization

Designing support identity and access management component

  • Plan for domain or forest migration, upgrade, and restructuring
    May include but is not limited to: cross-forest authentication, backward compatibility, object migration, migration planning, implementation planning, environment preparation

  • Design the branch office deployment
    May include but is not limited to: authentication strategy, server security

  • Design and implement public key infrastructure
    May include but is not limited to: certificate services, PKI operations and maintenance, certificate life cycle management

  • Plan for interoperability. May include but is not limited to: inter-organizational
    authorization and authentication, application authentication interoperability, cross – platform interoperability

Designing for business continuity and data availability

  • Plan for business continuity
    May include but is not limited to: service availability, directory service recovery

  • Design for software updates and compliance, management
    May include but is not limited to: patch management and patch management compliance, Microsoft Update and Widows Update , security baselines, system health models

  • Design the operating system virtualization strategy
    May include but is not limited to: server consolidation, application compatibility, virtualization management, placement of servers

  • Design for data management and data access
    May include but is not limited to: data security, data accessibility and redundancy, data collaboration

Configuring Microsoft Windows Vista Client

Installing and upgrading Windows Vista

  • Identify hardware requirements

  • Perform a clean installation.

  • Upgrade to Windows Vista from previous versions of Windows.

  • Upgrade from one edition of Windows Vista to another edition.

  • Troubleshoot Windows Vista installation issues.

  • Install and configure Windows Vista drivers.

     

Configuring and troubleshooting Post-installation system setting

  • Troubleshoot post-installation configuration issues.

  • Configure and troubleshoot Windows Aero.

  • Configure and troubleshoot parental controls.

  • Configure Microsoft Internet Explorer.

Configuring Windows security features

  • Configure and troubleshoot User Account Control

  • Configure Windows Defender.

  • Configure Dynamic Security for Microsoft Internet Explorer 7.

  • Configure Security settings in Windows Firewall.

Configuring network connectivity

  • Configuring networking by using the Networking and Sharing Center.

  • Troubleshoot connectivity issues

  • Configure remote access

Configuring applications included with Windows Vista

  • Configure and troubleshoot media applications.

  • Configure Windows Mail.

  • Configure Windows Meeting Space.

  • Configure Windows Calendar.

  • Configure windows Fax and Scan.

  • Configure Windows Sidebar.

Maintaining and optimizing systems that run Windows Vista

  • Troubleshoot performance issues.

  • Troubleshoot reliability issues by using built-in diagnostic tools.

  • Configure Windows Update.

  • Configure data protection.

Configuring and troubleshooting mobile computing

  • Configure mobile display settings.

  • Configure devices.

  • Configure Tablet PC software.

  • Configure options.

indesign training

 

Our ECITP : EDST DataBase Admin training is perfect for anyone who needs skills to easily proves competency in computing environ
ments that use microsoft Database Admin as a desktop operating system in an enterprise environmentto. Our ECITP : EDST WINDOWS Database Admin courses Installing, Upgrading, and Migrating to Windows Database Admin etc and all types of ECITP : EDST environment at basic, intermediate and advanced levels.

CALL +233-208119650

microsoft excel training

Microsoft Excel Training

Microsoft Excel Courses perfect for spreadsheet creation and staying on top of the game. Take your skills to the next level with tables, formulas, formatting and more.

microsoft publisher training

Microsoft Publisher Training

Microsoft Publisher Courses giving you the power to create, print, and share professional quality marketing materials and dynamic publications.

microsoft powerpoint training

Microsoft PowerPoint Training

Our Microsoft PowerPoint Courses are perfect for creating engaging presentations and demos to help you share your dynamic content with your audience.

microsoft outlook training

Microsoft Outlook Training

Our Microsoft Outlook Courses offer you premium e-mail management. Time is important, don't you wish you could spend less time managing e-mails?

Related Courses...