Call Us: +32 2 466 00 16
Email: info@u2u.be
Follow Us:

Active Directory Services with Windows Server 2012 R2

5days
Training code
ms10969
Book this course

Module 1: Overview of Access and Information Protection

Lessons

  • Introduction to Access and Information Protection Solutions in Business
  • Overview of AIP Solutions in Windows Server 2012
  • Overview of Forefront Identity Manager 2010 R2

Lab : Choosing an Appropriate Access and Information Protection Management Solution

  • Analyze the Lab Scenario and Identify Business Requirements
  • Propose a Solution

After completing this module, students will be able to:


  • Describe Access and Information Protection solutions in business.
  • Describe Access and Information Protection solutions in Windows Server 2012.
  • Describe Microsoft Forefront Identity Manager (FIM) 2010 R2.

Module 2: Advanced Deployment and Administration of AD DS

Lessons

  • Deploying AD DS
  • Deploying and Cloning Virtual Domain Controllers
  • Deploying Domain Controllers in Windows Azure
  • Administering AD DS

Lab : Deploying and Administering AD DS

  • Deploying AD DS
  • Deploying Domain Controller by Performing Domain Controller Cloning
  • Administering AD DS

After completing this module, students will be able to:


  • Describe and perform various deployment techniques for AD DS.
  • Describe virtual domain controller deployment considerations.
  • Explain how new technologies in Windows Server 2012 support virtual domain controllers.
  • Describe Domain Controller cloning.
  • Implement AD DS using the tools provided in Windows Server 2012.

Module 3: Securing Active Directory Domain Services

Lessons

  • Securing Domain Controllers
  • Implementing Password and Lockout Policies
  • Audit Authentication

Lab : Securing Active Directory Domain Services

  • Implementing Security Policies for Accounts and Passwords and Administrative Groups
  • Deploying and Configuring a RODC

After completing this module, students will be able to:


  • Understand the importance of securing domain controllers.
  • Describe the benefit of read-only domain controllers (RODCs).
  • Explain and implement password and account lockout policies.
  • Implement audit authentication.

Module 4: Monitoring, Managing, and Recovering AD DS

Lessons

  • Monitoring AD DS
  • Managing the AD DS Database
  • AD DS Backup and Recovery Options for AD°DS and Other Identity and Access Solutions

Lab : Monitoring AD DS

  • Monitoring AD DS with Performance Monitor

Lab : Recovering Objects in AD DS

  • Backing up and Restoring AD DS
  • Recovering Objects in AD DS

After completing this module, students will be able to:


  • Monitor AD DS.
  • Manage the AD DS database.
  • Recover objects from the AD DS database.

Module 5: Implementing and Administering AD DS Sites and Replication

Lessons

  • Overview of AD DS Replication
  • Configuring AD DS Sites
  • Configuring and Monitoring AD DS Replication

Lab : Implementing AD DS Sites and Replication

  • Creating Subnets and Sites
  • Deploying an Additional Domain Controller
  • Configuring AD DS Replication
  • Troubleshooting AD DS Replication

After completing this module, students will be able to:


  • Describe AD DS replication.
  • Configure AD DS sites.
  • Configure and monitor AD DS replication.

Module 6: Implementing Group Policy

This module describes Group Policy, how it works, and how best to implement it in your organization.

Lessons

  • Introducing Group Policy
  • Implementing and Administering GPOs
  • Group Policy Scope and Group Policy Processing
  • Troubleshooting the Application of GPOs

Lab : Implementing and Troubleshooting a Group Policy Infrastructure

  • Creating and Configuring GPOs
  • Managing GPO Scope
  • Verifying GPO Application
  • Managing GPOs
  • Troubleshooting GPOs

After completing this module, students will be able to:


  • Describe Group Policy.
  • Implement and administer GPOs.
  • Describe Group Policy scope and Group Policy processing.
  • Troubleshoot the application of GPOs.

Module 7: Managing User Settings with Group Policy

Lessons

  • Implementing Administrative Templates
  • Configuring Folder Redirection and Scripts
  • Configuring Group Policy Preferences

Lab : Managing User Desktops with Group Policy

  • Implementing Settings by Using Group Policy Preferences
  • Configuring Folder Redirection

After completing this module, students will be able to:


  • Implement Administrative Templates.
  • Configure Folder Redirection and scripts.
  • Configure Group Policy preferences.

Module 8: Implementing Secure Shared File Access

This module explains how to use Dynamic Access Control (DAC) and Work Folders and how to plan and implement these technologies.

Lessons

  • Overview of DAC
  • Implementing DAC Components
  • Implementing DAC for Access Control
  • Implementing Access Denied Assistance
  • Implementing and Managing Work Folders
  • Implementing Workplace Join

Lab : Implementing Secure File Access

  • Preparing for DAC Deployment
  • Implementing DAC
  • Validating and Remediating DAC
  • Implementing Work Folders

After completing this module, students will be able to:


  • Describe DAC.
  • Implement DAC components.
  • Implement DAC for access control.
  • Implement access-denied assistance.
  • Implement and manage Work Folders.
  • Implement Workplace Join.

Module 9: Deploying and Managing Active Directory Certificate Services

This module explain how to deploy and manage CAs.

Lessons

  • Deploying CAs
  • Administering CAs
  • Troubleshooting, Maintaining, and Monitoring CAs

Lab : Deploying and Configuring a Two-Tier CA Hierarchy

  • Deploying an Offline Root CA
  • Deploying an Enterprise Subordinate CA

After completing this module, students will be able to:


  • Deploy CAs.
  • Administer CAs.
  • Troubleshoot, maintain, and monitor CAs.

Module 10: Deploying and Managing Certificates

Lessons

  • Deploying and Managing Certificate Templates
  • Managing Certificates Deployment, Revocation and Recovery
  • Using Certificates in a Business Environment
  • Implementing and Managing Smart Cards

Lab : Deploying and Using Certificates

  • Configuring Certificate Templates
  • Enrolling and Using Certificates
  • Configuring and Implementing Key Recovery

After completing this module, students will be able to:


  • Deploy and manage certificate templates.
  • Manage certificates deployment, revocation and recovery.
  • Use certificates in business environments.
  • Implement and manage smart cards.

Module 11: Implementing and Administering Active Directory Rights Management Services

Lessons

  • Overview of AD RMS
  • Deploying and Managing an AD RMS Infrastructure
  • Configuring AD RMS Content Protection
  • Configuring External Access to AD RMS

Lab : Implementing AD RMS Infrastructure

  • Installing and Configure AD RMS
  • Configuring  AD RMS Templates
  • Using ADRMS on Clients
  • Configuring AD RMS Monitoring and Reporting

After completing this module, students will be able to:


  • Describe AD RMS.
  • Explain how to deploy and manage an AD RMS infrastructure.
  • Explain how to configure AD RMS content protection.
  • Explain how to configure external access to AD RMS.

Module 12: Implementing and Administering AD FS

Lessons

  • Overview of AD FS
  • Deploying AD FS
  • Implementing AD FS for a Single Organization
  • Deploying AD FS in a Business to Business Federation Scenario
  • Extending AD FS to External Clients

Lab : Implementing AD FS

  • Installing and Configuring AD FS
  • Configuring an Internal Application for AD FS
  • Configuring AD FS for a Federated Business Partner
  • Configuring a Web Application Proxy

After completing this module, students will be able to:


  • Describe AD FS.
  • Explain how to configure the AD FS prerequisites, and deploy AD FS
  • Describe how to implement AD FS for a single organization.
  • Deploy AD FS in a business-to-business federation scenario.
  • Deploy the Web Application Proxy.

Module 13: Implementing Windows Azure Active Directory

Lessons

  • Overview of Windows Azure Active Directory
  • Administering Windows Azure Active Directory

Lab : Implementing Azure AD

  • Planning to Implement Azure AD
  • Administering Azure AD

After completing this module, students will be able to:


  • Describe Windows Azure AD.
  • Administer Azure AD.

Module 14: Implementing and Administering AD LDS

Lessons

  • Overview of AD LDS
  • Deploying AD LDS
  • Configuring AD LDS Instances and Partitions
  • Configuring AD LDS Replication

Lab : Implementing and Administering AD LDS

  • Configuring AD LDS Instances and Partitions
  • Configuring AD LDS Replication

After completing this module, students will be able to:


  • Describe AD LDS.
  • Explain how to deploy AD LDS.
  • Explain how to configure AD LDS instances and partitions.
  • Explain how to configure AD LDS replication.

Get hands-on instruction and practice administering Active Directory technologies in Windows Server 2012 and Windows Server 2012 R2 in this 5-day Microsoft Official Course. You will learn the skills you need to better manage and protect data access and information, simplify deployment and management of your identity infrastructure, and provide more secure access to data from virtually anywhere. You will learn how to configure some of the key features in Active Directory such as Active Directory Domain Services, Group Policy, Dynamic Access Control, Work Folders, Workplace Join, Certificate Services, Rights Management Services and Federation Services, as well as integrating your on premise environment with cloud based technologies such as Windows Azure Active Directory. As part of the learning experience, you will perform hands-on exercises in a virtual lab environment. NOTE: This course is based on Windows Server 2012 and Windows Server 2012 R2. This course is designed for IT professionals who need the knowledge and experience to administer Active Directory.


This course is intended for Information Technology (IT) professionals with little or no Active Directory Domain Services (AD DS) experience who are looking for a single course that will develop knowledge and skills using Access and lnformation Protection technologies in Windows Server 2012 and Windows Server 2012 R2.

© 2018 U2U All rights reserved.