MOC 6232A: Implementing a Microsoft SQL Server 2008 Database

Similar documents
70-742: Identity in Windows Server Course Overview

At Course Completion: Course Outline: Course 20742: Identity with Windows Server Learning Method: Instructor-led Classroom Learning

M20742-Identity with Windows Server 2016

6232B: Implementing a Microsoft SQL Server 2008 R2 Database

Identity with Windows Server 2016

Identity with Windows Server 2016

70-647: Windows Server Enterprise Administration. Course Overview. Course Outline

Active Directory Services with Windows Server

2779 : Implementing a Microsoft SQL Server 2005 Database

METHODOLOGY This program will be conducted with interactive lectures, PowerPoint presentations, discussions and practical exercises.

Active Directory Services with Windows Server

20413B: Designing and Implementing a Server Infrastructure

20742: Identity with Windows Server 2016

Implementing a Microsoft SQL Server 2005 Database Course 2779: Three days; Instructor-Led

MCSE Server Infrastructure. This Training Program prepares and enables learners to Pass Microsoft MCSE: Server Infrastructure exams

Course Outline 20742B

Active Directory Services with Windows Server

Identity with Microsoft Windows Server 2016 (MS-20742)

Identity with Windows Server 2016 (742)

COURSE OUTLINE. COURSE OBJECTIVES After completing this course, students will be able to: 1 - INSTALLING & CONFIGURING DCS

ACTIVE DIRECTORY SERVICES WITH WINDOWS SERVER

COURSE OUTLINE MOC 10969: ACTIVE DIRECTORY SERVICES WITH WINDOWS SERVER MODULE 1: OVERVIEW OF ACCESS AND INFORMATION PROTECTION

10969: Active Directory Services with Windows Server

"Charting the Course... MOC B Active Directory Services with Windows Server Course Summary

Identity with Windows Server 2016 (20742)

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services (Course 6425A)

Updating Your Windows Server 2003 Technology Skills to Windows Server 2008

NET EXPERT SOLUTIONS PVT LTD

MOC 20411B: Administering Windows Server Course Overview

10969B: Active Directory Services with Windows Server

This module provides an overview of multiple Access and Information Protection (AIP) technologies

Course 10969: Active Directory services with Windows Server

COURSE OUTLINE: OD10969B Active Directory Services with Windows Server

Microsoft Active Directory Services with Windows Server

Course : Planning and Administering SharePoint 2016

Course Content of MCSA ( Microsoft Certified Solutions Associate )

Course. Overview. 5 Day(s) Length: Published: English. IT Professionals. Level: Type: Enroll now (CAL) Database. database files. Createe databases and

This course provides students with the knowledge and skills to administer Windows Server 2012.

Microsoft Certified Solutions Expert (MCSE)

MCSA Windows Server 2012

SEVENMENTOR TRAINING PVT.LTD

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Microsoft Updating Your Windows Server 2003 Technology Skills to Windows Server 2008

MOC 6419B: Configuring, Managing and Maintaining Windows Server based Servers

Configuring Advanced Windows Server 2012 Services

Exam : Implementing a Cloud Based Infrastructure

Windows Server : Configuring Advanced Windows Server 2012 Services R2. Upcoming Dates. Course Description.

[MS20464]: Developing Microsoft SQL Server 2014 Databases

A: PLANNING AND ADMINISTERING SHAREPOINT 2016

Configuring Advanced Windows Server 2012 Services

MOC Configuring Advanced Windows Server 2012 Services

Course Prerequisites: This course requires that you meet the following prerequisites:

MCITP CURRICULUM Windows 7

Best MCSA Training in PUNE & Best MCSA Training Institute in MAHARASHTRA

Fundamentals of Windows Server 2008 Active Directory

Developing Microsoft SQL Server Databases

MOC 20417B: Upgrading Your Skills to MCSA Windows Server 2012

MCSA Windows Server 2012 Configuring Advanced Services

Planning and Administering SharePoint 2016

Microsoft Implementing an Advanced Server Infrastructure

Microsoft Certified Solution Associate Windows Server 2016 Training

Designing Windows Server 2008 Network and Applications Infrastructure

20762B: DEVELOPING SQL DATABASES

Microsoft Certified Solutions Associate (MCSA)

Designing and Implementing a Server Infrastructure

What s in Installing and Configuring Windows Server 2012 (70-410):

This course prepares the student for Exam : Configuring Advanced Windows Server 2012 Services.

MCSA Windows Server 2012

Windows Server 2016 MCSA Bootcamp

70-647: Windows Server Enterprise Administration Course 01 Planning for Active Directory

20412D: Configuring Advanced Windows Server 2012 Services

MOC 20417C: Upgrading Your Skills to MCSA Windows Server 2012

20464 Developing Microsoft SQL Server Databases

"Charting the Course... MOC A Developing Microsoft SQL Server 2012 Databases. Course Summary

Developing Microsoft SQL Server 2012 Databases

Lessons Server Manager Roles Windows Server 2008 Features Active Directory Improvements

Planning and Administering SharePoint 2016

6232B: Implementing a Microsoft SQL Server 2008 R2 Database

Microsoft Configuring Advanced Windows Server 2012 Services

Course No. MCSA Days Instructor-led, Hands-on

Microsoft - Configuring Windows Server 2008 Active Directory Domain Services (M6425)

MCSA Windows Server A Success Guide to Prepare- Microsoft Configuring Advanced Windows Server 2012 Services. edusum.

Configuring Advanced Windows Server 2012 Services (412)

A: Planning and Administering SharePoint 2016

Planning and Administering SharePoint 2016 ( A)

Microsoft. [MS20762]: Developing SQL Databases

Course Outline. Pearson: MCSA Cert Guide: Identity with Windows Server 2016 (Course & Lab)

Server : Advanced Services 3 1 x

Developing SQL Databases

Configuring, Managing and Maintaining Windows Server 2008-based Servers (Course 6419)

Implementing an Advanced Server Infrastructure

(Installation, Storage, and Compute with Windows Server 2016)

Developing Microsoft SQL Server 2012 Databases 36 Contact Hours

Microsoft Planning and Implementing Windows Server 2008

Course 6231A: Maintaining a Microsoft SQL Server 2008 Database

Configuring, Managing, and Maintaining Windows Server 2008 R2 Servers

Designing and Implementing a Server 2012 Infrastructure

Planning and Administering SharePoint 2016

Microsoft Certified System Engineer

SQL Server Development 20762: Developing SQL Databases in Microsoft SQL Server Upcoming Dates. Course Description.

Transcription:

MOC 6232A: Implementing a Microsoft SQL Server 2008 Database Course Number: 6232A Course Length: 5 Days Course Overview This course provides students with the knowledge and skills to implement a Microsoft SQL Server 2008 database. It focuses on teaching individuals how to use SQL Server 2008 product features and tools related to implementing a database. Prerequisites Before attending this course, students must have: Basic knowledge of the Microsoft Windows operating system and its core functionality Working knowledge of Transact-SQL. Working knowledge of relational databases. Some experience with database design. Audience This course is intended for IT Professionals who administer and maintain SQL Server databases. Course Outline Course Introduction Course Introduction 4 min. Module 01 - Creating Databases and Database Files Creating Databases and Database Files Lesson 1: Creating Databases Considerations for Creating a Database Transaction Logging Database Options Data Compression Demo - Creating Databases Lesson 2: Creating Filegroups What are Filegroups? Improving Database Performance by Using Filegroups Demo - Creating Filegroups Lesson 3: Creating Schemas What are Schemas? How Object Name Resolution Works Demo - Creating a Schema 1 hr. 19 min.

Lesson 4: Creating Database Snapshots How Database Snapshots Work When to Use Database Snapshots Demo - Creating Database Snapshots Lab: Creating Databases and Database Files Module 01 Review Module 02 - Creating Data Types and Tables Creating Data Types and Tables Lesson 1: Creating Data Types What Are System-Supplied Data Types? Using System-Supplied Data Types What Are Alias Data Types? Demo - Creating Data Types Lesson 2: Creating Tables How SQL Server Organizes Data in Rows How SQL Server Organizes Large Data Values Types of Tables Considerations for Creating Tables Generating Transact-SQL Scripts Demo - Creating Tables Lesson 3: Creating Partitioned Tables What Are Partitioned Tables? What Are Partition Functions? What Is a Partition Scheme? What Operations Can Be Performed on Partitioned Data? Demo - Creating a Partitioned Table Lab: Creating Data Types and Tables Module 02 Review 1 hr. 14 min. Module 03 - Creating and Tuning Indexes Creating and Tuning Indexes Lesson 1: Planning Indexes How SQL Server Accesses Data What Is a Heap? What Is a Clustered Index? What Is a Nonclustered Index? SQL Server Storage Allocation Simple B-Tree Index Structure (Balanced) Complex B-Tree Index Structure (Balanced) Lesson 2: Creating Indexes Overview of Creating Indexes What Are Unique Indexes? Considerations for Creating Indexes with Multiple Columns When to Create Indexes on Computed Columns What Are Partitioned Indexes? Options for Incorporating Free Space in Indexes Methods for Obtaining Index Information 1 hr. 9 min.

Demo - Creating Indexes Lesson 3: Optimizing Indexes What Is the Database Engine Tuning Advisor? Demo - Using the Database Engine Tuning Advisor Index Fragmentation Options for Defragmenting Indexes Demo - Defragmenting Indexes Lab: Creating and Optimizing Indexes Module 03 Review Module 04 - Implementing Data Integrity by Using Constraints and Triggers Implementing Data Integrity by Using Constraints and Triggers Lesson 1: Data Integrity Overview Types of Data Integrity Options for Enforcing Data Integrity Lesson 2: Implementing Constraints What Are Constraints? Key Constraints Other Constraints Cascading Referential Integrity Considerations for Constraint Checking Demo - Creating Constraints Lesson 3: Implementing Triggers What Are Triggers? How an INSERT Trigger Works How a DELETE Trigger Works How an UPDATE Trigger Works How an INSTEAD OF Trigger Works How Nested Triggers Work Considerations for Recursive Triggers Demo - Creating Triggers Lab: Implementing Data Integrity by Using Constraints and Triggers Module 04 Review 1 hr. 10 min. Module 05 - Using XML Using XML Lesson 1: Using the XML Data Type What Is XML? What Is the XML Data Type? The Query, Value, and Exist Methods The Modify Method The Nodes Method Demo - Using the XML Data Type Lesson 2: Retrieving XML by Using FOR XML Introduction to the FOR XML Clause What Are RAW Mode Queries? 3 hr. 19 min.

What Are AUTO Mode Queries? What Are EXPLICIT Mode Queries? What Are PATH Mode Queries? Syntax for Retrieving Nested XML Demo - Using FOR XML Lesson 3: Shredding XML by Using OPENXML Overview of Shredding XML Data Stored Procedures for Managing In-Memory Node Trees OPENXML Syntax Syntax for Working with XML Namespaces Demo - Using OPENXML to Shred XML Lesson 4: Introducing XQuery What Is XQuery? XQuery Basics XQuery Expressions Demo - Using XQuery Expressions Lesson 5: Creating XML Indexes What Are XML Indexes? What Are the Benefits of XML Indexes? Types of XML Indexes Demo - Creating XML Indexes Lesson 6: Implementing XML Schemas What Are XML Schemas? XML Schema Validation What Is an XML Schema Collection? What Is Typed and Untyped XML Demo - Using Typed XML Lab: Using XML Module 05 Review Module 06 - Implementing Views Implementing Views Lesson 1: Introduction to Views What Is a View? Types of Views Advantages of Views Lesson 2: Creating and Managing Views Syntax for Creating Views Demo - Creating a View Syntax for Altering and Dropping Views View Encryption How Ownership Chains Affect Views Sources of Information About Views Considerations for Modifying Data in a View Demo - Creating Views with Transact SQL Demo - Creating a View with Schema Binding Lesson 3: Optimizing Performance by Using Views Performance Considerations for Views Performance Considerations for Indexed Views What Is a Partitioned View? 1 hr. 5 min.

Lab: Implementing Views Module 06 Review Module 07 - Implementing Stored Procedures Implementing Stored Procedures Lesson 1: Using Stored Procedures Discussion: What Is a Stored Procedure Syntax for Creating Stored Procedures Guidelines for Creating Stored Procedures Demo - Creating Stored Procedures Syntax for Altering Stored Procedures Syntax for Dropping Stored Procedures Demo - Altering and Dropping Stored Procedures Demo - Switching Execution Context Lesson 2: Creating Parameterized Stored Procedures Stored Procedure Parameters Demo - Creating a Parameterized Stored Procedure Table-valued Parameters Demo - Using Table Value Parameters Lesson 3: Working With Execution Plans What Is an Execution Plan? Viewing an Execution Plan Execution Plan Caching Query Compilation Forced Stored Procedure Recompilation Demo - Using Execution Plans Lesson 4: Handling Exceptions Syntax for Structured Exception Handling Guidelines for Handling Exceptions Demo - Handling Exceptions Lab: Implementing Stored Procedures Module 07 Review 1 hr. 55 min. Module 08 - Implementing Functions Implementing Functions Lesson 1: Introducing Functions Types of Functions What Is a Scalar Function? Scalar Function Example What Is an Inline Table-Valued Function? Inline Table-Valued Function Example What Is a Multi-Statement Table-Valued Function? Multi-Statement Table-Valued Function Example Demo - Creating Functions Demo - Creating Inline Table-Valued Functions Demo - Creating Multi-Statement Table-Valued Functions Lesson 2: Working with Functions Deterministic and Nondeterministic Functions Guidelines for Creating Functions Rewriting Stored Procedures as Functions 1 hr. 11 min.

Lesson 3: Controlling Execution Context What Is Execution Context? The EXECUTE AS Clause Extending Impersonation Context Lab: Implementing Functions Module 08 Review Module 09 - Implementing Managed Code in a Database Implementing Managed Code in a Database Lesson 1: Introduction to the SQL Server Common Language Runtime Introduction to the.net Framework What Is the.net Common Language Runtime? Advantages of Managed Code CLR Managed Code Database Objects Managed Code vs. Transact SQL Lesson 2: Importing and Configuring Assemblies What Is an Assembly? Assembly Trust Levels Syntax for Importing an Assembly Demo - Importing and Configuring an Assembly Lesson 3: Creating Managed Database Objects Overview of Managed Database Objects Managed Stored Procedures, Triggers and Functions Managed Aggregates and User-Defined Types Demo - Creating Managed Database Objects Lab: Implementing Managed Code in a Database Module 09 Review 1 hr. 10 min. Module 10 - Managing Transactions and Locks Managing Transactions and Locks Lesson 1: Overview of Transactions and Locks What Are Transactions? What Are Locks? What Is Concurrency Control? Demo - Introducing Transactions Lesson 2: Managing Transactions Autocommit Transactions Explicit Transactions Implicit Transactions Transaction Recovery Considerations for Using Transactions Restricted Statements Lesson 3: Understanding SQL Server Locking Architecture What Concurrency Problems Are Prevented by Locking? Lockable Resources Types of Locks Lock Compatibility Locking Compatibility Matrix Lesson 4: Managing Locks Session-Level Locking Options 2 hr. 2 min.

Locking Isolation Level Options Setting ISOLATION for Session Lock Escalation Dynamic Locking What Are Deadlocks? Avoiding Deadlocks Methods to View Locking Information Demo - Viewing Locking Information Lab: Managing Transactions and Locks Module 10 Review Module 11 - Using Service Broker Using Service Broker Lesson 1: Service Broker Overview What Is Service Broker? Service Broker System Architecture Service Broker Conversation Architecture Service Broker Conversation Process Service Broker Conversation Priority Syntax for Creating Conversation Broker Priority Service Broker Security Architecture Management Studio Enhancements Lesson 2: Creating Service Broker Objects Enabling Service Broker External Activation Support Syntax for Creating Message Types Syntax for Creating Contracts Syntax for Creating Queues Syntax for Creating Services Demo - Creating Service Broker Objects Lesson 3: Sending and Receiving Messages Syntax for Sending Messages Syntax for Receiving Messages Demo - Sending and Receiving Messages Diagnostic Tools for Sending\Receiving Messages Lab: Using Service Broker Module 11 Review Course Closure 1 hr. 20 min. Course Introduction 8m Module 1 - Designing an AD Forest Infrastructure Designing an Active Directory Forest Infrastructure in Windows Server 2008 Overview of AD DS Forest Design Requirements Design Requirements AD DS Forest Business Requirements for an AD DS Forest Design AD Forest Design Administrative and Security Requirements Technical Requirements for an AD DS Forest Design Types of AD DS Forests 1h7m

Benefits of a Single Forest Model Disadvantages of Single Forest Model Reasons for Implementing Multiple Forests Benefits of Implementing Forest Root Domains Types of Forest Functional Levels Forest Functional Levels Windows Server 2003 Forest Functional Level Guidelines for Designing an AD DS Forest Types of Trusts What Is UPN Suffix Routing? Guidelines for Designing Forest Trusts Demo: Implementing an AD Forest Trust Design Modifications to AD DS Schema Guidelines for AD DS Schema Modifications Demo: Schema Changes How Does Windows Time Service Work? Considerations for Configuring Windows Time Service Member Servers and Workstations Domain Controllers Considerations Module 1 Review Module 2 - Designing an AD Domain Infrastructure Designing an Active Directory Domain Infrastructure in Windows Server 2008 AD DS Domain Design Models AD DS Domain Models Factors to Consider When Accessing Domain Models Reasons for Deploying Multiple AD DS Domains AD DS Domain Functional Levels Supported Domain Controller Operating Systems Considerations for Configuring and Placing the Domain Controllers Considerations for Deploying Domain Controllers in Branch Offices Read Only Domain Controller (RODC) Guidelines for Designing AD DS Domains Choosing an AD DS Namespace Strategy Guidelines for Integrating the Public and Private DNS Namespaces Guidelines for Integrating Multiple Internal DNS Namespaces Guidelines for Implementing DNS Servers Demo: Configuring Forwarders and Delegation Records Windows 2008 Domain Controllers Domain Controller on a Server Core Deploying Domain Controllers in Windows Server 2008 Deploying Domain Controllers in Windows Server 2008 - RODC Why Deploy RODC? Considerations When Deploying Domain Controllers Demo: Configuring an RODC Replication Policy Types of AD DS Domain Trusts Security Considerations for Trusts Demo: Trust Design Module 02 Review 1h11m

Module 03 - Designing AD Sites and Replication Designing Active Directory Sites and Replication in Windows Server 2008 Things to Document Before the AD Site Design Network Information for an AD DS Site Design Location Data for an AD DS Site Design AD DS Site Models Guidelines for Creating Additional AD DS Sites Demo: Implementing AD DS Site Design Locations How Does Automatic Site Coverage Work? Types of Replication Topologies Considerations for Choosing a Replication Protocol Levels of Connectivity Choosing Replication Protocols Demo: Implementing AD DS Replication Replication of Global Catalog, RODC, and SYSVOL Knowledge Consistency Checker Inter Site Topology Generator Using Site Links to Manage Replication Considerations for Designing Site Links and Bridgehead Servers Considerations for Designing Site-Link Bridging Considerations for Site Link Bridging Options for Configuring AD DS Replication Guidelines for Configuring AD DS Replication Guidelines for Placing Domain Controllers Guidelines for Placing RODCs Guidelines for Placing Global Catalog Servers Guidelines for Placing Operations Master Servers Module 03 Review 56m Module 04 - Designing AD Domain Administrative Structures Designing Active Directory Domain Administrative Structures in Windows Server 2008 Types of IT Administrative Models Guidelines for Gathering Information on the Current Administrative Structures Business Requirements for Existing Structure Legal Requirements Guidelines for Gathering Information on Organizational Resources Guidelines for Gathering Information on Administrative Processes Strategies for Designing Organizational Units Strategies for Delegating Administrative Control Strategies for Designing Group Policy Structures Considerations for Designing Organizational Unit Hierarchies Guidelines for Designing an Organizational Unit Structure Demo: Creating an AD OU Design AD DS Groups in Windows Server 2008 Group Scope Guidelines for Developing a Group Naming Strategy Considerations for Group Nesting Group Nesting 1h20m

Strategies for Using Groups to Access Resources Strategies for Placing Group Objects Guidelines for Designing an AD DS Group Strategy Guidelines for Designing a User Account Strategy Guidelines for Designing a Computer Account Strategy Naming Strategies for Computer Accounts Guidelines for Securing User and Computer Account Management Demo: Automating User Account Management Tools for Automating User and Computer Account Management Module 04 Review Module 05 - Designing AD Group Policy Designing Active Directory Group Policy in Windows Server 2008 Gathering Organizational Information Gathering Information on Security Requirements Gathering Information on Desktop Management Requirements Gathering Information on Desktop Management Gathering Information on Administrative Processes Configuring Group Policy Settings Demo: Designing AD Group Policy Applying Group Policy Settings Demo: Implementing AD Group Policy Group Policy Storage Locations ADMX Format for Administrative Template Guidelines for Designing Administrative Templates Slow Link Detection Best Practices for Group Policy Model Design Guidelines for Designing Group Policy Inheritance Guidelines for Designing Group Policy Filtering Guidelines for Designing Group Policy Application GPO Backup and Recovery Strategy GPO Migration Strategy Delegating GPO Administration GPO Administration Module 05 Review 1h21m Module 06 - Designing AD Security Designing Active Directory Security in Windows Server 2008 Gathering Information for Designing Account Security Policies Key Components for Designing Account Security Policies Guidelines for Designing Account and Password Policy Guidelines for Designing Secure Account Management Fine-Grained Password Policies What Are Fine-Grained Password Policies? Storing Fine-Grained Password Policies Demo: Designing AD DS Security Password Setting Object Attributes How PSOs Are Processed and Applied Guidelines for Designing Fine-Grained Key Components that Affect Domain Controller Security 1h52m

Why Modify the Default Domain Controller Security Policy? Server Core Server Roles Server Core as a Solution for Domain Controller Deployment What is the Security Configuration Wizard? Scenarios for Using the Security Configuration Wizard What Are Read-Only Domain Controllers? Prerequisites for Deploying RODCs Administrator Role Separation on RODCs Demo: Domain Controller/RODC Security Policies Administrator Responsibilities Service Administrator and Service Management Data Administrators and Data Management What Are Administrative Autonomy Delegation of Administrative Permission Attributes of a Good Delegation Model Guidelines for Creating a Delegation Model Guidelines for Using and Securing Administrator Accounts Demo: Restricted Groups Auditing Administrative Access Module 06 Review Module 07 - Designing AD High Availability Designing Active Directory High Availability in Windows Server 2008 What is High Availability? Components of an Active Directory High Availability Design Active Directory High Availability Business Requirements for AD DS High Availability Infrastructure Requirements for AD DS High Availability High Availability Options for Network Infrastructure Process of Planning for High Availability Guidelines for Designing Highly Available Domain Controllers Global Catalog Placement and High Availability Demo: Designing AD DS Availability High Availability of DNS Guidelines for Designing Highly Available Network Infrastructure Module 07 Review 27m Module 08 - Designing AD Disaster Recovery Designing Active Directory Disaster Recovery in Windows Server 2008 Overview of Database Maintenance NTDSUtil.exe Benefits of Restartable AD DS in Windows Server 2008 Considerations for Using Restartable AD DS Overview of AD DS Backup and Recovery Windows Server Backup AD DS Backup and Recovery in Windows Server 2008 Active Directory Domain Services Backup System Components System State Data Critical Volumes Review Options for Restoring AD DS 57m

Considerations for Restoring AD DS Guidelines for Designing Backup and Recovery in AD DS Why Monitor AD DS? Tools for Monitoring AD DS Reliability and Performance Monitor Demo: Disaster Recovery and Monitoring Guidelines for Monitoring Active Directory Domain Controllers NTDS Counters Monitoring AD Module 08 Review Module 09 - Designing Public Key Infrastructure Designing Public Key Infrastructure in Windows Server 2008 What is a PKI? Key Components of a PKI PKI Solution Requirements Applications That Use PKI Certification Authorities and PKI Comparison of Enterprise and Standalone Internal and Public Certification Authorities Using Both Internal and External Public CA s Active Directory Certificate Services in Windows Server 2008 Features in AD CS Gathering Information for Designing Certification Authority Hierarchy Certification Authority Hierarchy Roles Common Roles in a CA Hierarchy Demo: Designing PKI for Windows Server Options for Designing Certification Authority Hierarchy Types of CA Hierarchies Guidelines for Designing a Certification Authority Hierarchy What Are Certificate Templates? Certificate Templates in Windows Server 2008 Managing Certificate Templates Superseding Templates Feature Designing Certificate Templates Designing Certificate Templates with Customized Add-ons Demo: Updating Templates Guidelines for Designing Certificate Templates Certificate Distribution and Enrollment Choosing Enrollment Method Certificate Autoenrollment Demo: Implementing Autoenrollment What is Certificate Revocation? Guidelines for Designing Certificate Revocation Module 09 Review 1h29m Module 10 - Designing an AD RMS Infrastructure Designing an Active Directory RMS Infrastructure in Windows Server 2008 What is AD RMS? Key Components of AD RMS Scalability Requirements for AD RMS Design 45m

Considerations for External Client AD RMS Access What are AD RMS Rights Policy Templates? Options for Configuring AD RMS Clusters Guidelines for Designing AD RMS Clusters Options for Granting External Users Access to AD RMS Guidelines for Designing AD RMS Access AD RMS Backup Components Options for Restoring AD RMS Troubleshooting AD RMS Restores Different Processes Restoring a Cluster Member Restoring a Non-Cluster Server Demo: Exploring RMS RMS Root Server Guidelines for Implementing an AD RMS Backup and Recovery Strategy Module 10 Review Module 11 - Designing an AD Federation Services Implementation 54m Designing an Active Directory Federation Services Implementation in Windows Server 2008 What is Active Directory Federation Services? Key Components of AD FS Deployment Scenarios for AD FS AD FS Server Roles AD FS Server Placement AD FS User Account Stores Components of a B2B Federation Trust B2B Federation Trust Demo: Adding the Federation Service Role Demo: Exporting Certificates Demo: Importing Certificates Key Components of B2B Federation Trust Guidelines for Configuring Certificates and Applications Guidelines for Designing the Account and Resource Partner Components Guidelines for Deploying and Securing AD FS Servers Deploy Federation Server Proxy In Perimeter Network When Additional Guidelines for Deploying and Securing ADFS Servers Options for Configuring AD FS Claims AD FS Group Claims Guidelines for Usage of AD FS Claims Understanding AD FS Applications Guidelines for Usage of Token-based and Claims-aware Applications Module 11 Review Module 12 - Designing an AD LDS Implementation Designing an Active Directory LDS Implementation What is AD LDS? AD LDS Usage LDAP-Compliant Application Directories Definitions - LDAP Application Directories LDAP Compliant Applications - Defined Extranet Authentication Scenarios 1h

Using AD LDS for Developing Schema Modifications Key Sizing Factors for AD LDS Servers AD LDS Replication Scenarios Integration of AD LDS with AD DS Guidelines for Designing AD LDS Instances and Application Partitions Schema Changes and AD LDS Replication of AD LDS Data Planning AD LDS Replication Traffic across WAN Links AD LDS Sites and Site Links Guidelines for Designing AD LDS Schema and Replication User Proxies in AD LDS Authentication and Authorization in AD LDS Implementing Synchronization between AD DS and AD LDS Demo: Working with AD LDS Module 12 Review Module 13 - Designing AD Migrations Designing Active Directory Migrations in Windows Server 2008 AD DS Migration Strategies Domain Upgrade Strategy Domain Restructure Strategy Domain Upgrade and Restructure Criteria for Choosing a Migration Strategy Guidelines for Choosing the Domain Upgrade Strategy Guidelines for Choosing the Domain Restructure Strategy Guidelines for Choosing the Domain Upgrade and Restructure Strategy Documenting the Current Environment Active Directory Structure Current Network Services Current Domain Controller Hardware and Software Cleaning Up the Current Active Directory Environment Hardware and Application Compatibility Preparing a Domain and Forest for Upgrade Upgrade Guidelines Domain Functional Levels in Windows Server 2008 Windows 2000 Native Functional Level Windows Server 2003 Functional Level Windows Server 2008 Functional Mode SID History Active Directory Migration Tool ADMT Scenarios Preparing a Domain to Run ADMT Demo: Installing ADMT Intraforest and Interforest Restructuring Demo: Using ADMT Trusts 59m

Guidelines for Restructuring Domains Module 13 Review Course Closure Course Introduction 8m Module 1 - Designing an AD Forest Infrastructure Designing an Active Directory Forest Infrastructure in Windows Server 2008 Overview of AD DS Forest Design Requirements Design Requirements AD DS Forest Business Requirements for an AD DS Forest Design AD Forest Design Administrative and Security Requirements Technical Requirements for an AD DS Forest Design Types of AD DS Forests Benefits of a Single Forest Model Disadvantages of Single Forest Model Reasons for Implementing Multiple Forests Benefits of Implementing Forest Root Domains Types of Forest Functional Levels Forest Functional Levels Windows Server 2003 Forest Functional Level Guidelines for Designing an AD DS Forest Types of Trusts What Is UPN Suffix Routing? Guidelines for Designing Forest Trusts Demo: Implementing an AD Forest Trust Design Modifications to AD DS Schema Guidelines for AD DS Schema Modifications Demo: Schema Changes How Does Windows Time Service Work? Considerations for Configuring Windows Time Service Member Servers and Workstations Domain Controllers Considerations Module 1 Review 1h7m Module 2 - Designing an AD Domain Infrastructure Designing an Active Directory Domain Infrastructure in Windows Server 2008 AD DS Domain Design Models AD DS Domain Models Factors to Consider When Accessing Domain Models Reasons for Deploying Multiple AD DS Domains AD DS Domain Functional Levels Supported Domain Controller Operating Systems Considerations for Configuring and Placing the Domain Controllers Considerations for Deploying Domain Controllers in Branch Offices Read Only Domain Controller (RODC) Guidelines for Designing AD DS Domains Choosing an AD DS Namespace Strategy Guidelines for Integrating the Public and Private DNS Namespaces 1h11m

Guidelines for Integrating Multiple Internal DNS Namespaces Guidelines for Implementing DNS Servers Demo: Configuring Forwarders and Delegation Records Windows 2008 Domain Controllers Domain Controller on a Server Core Deploying Domain Controllers in Windows Server 2008 Deploying Domain Controllers in Windows Server 2008 - RODC Why Deploy RODC? Considerations When Deploying Domain Controllers Demo: Configuring an RODC Replication Policy Types of AD DS Domain Trusts Security Considerations for Trusts Demo: Trust Design Module 02 Review Module 03 - Designing AD Sites and Replication Designing Active Directory Sites and Replication in Windows Server 2008 Things to Document Before the AD Site Design Network Information for an AD DS Site Design Location Data for an AD DS Site Design AD DS Site Models Guidelines for Creating Additional AD DS Sites Demo: Implementing AD DS Site Design Locations How Does Automatic Site Coverage Work? Types of Replication Topologies Considerations for Choosing a Replication Protocol Levels of Connectivity Choosing Replication Protocols Demo: Implementing AD DS Replication Replication of Global Catalog, RODC, and SYSVOL Knowledge Consistency Checker Inter Site Topology Generator Using Site Links to Manage Replication Considerations for Designing Site Links and Bridgehead Servers Considerations for Designing Site-Link Bridging Considerations for Site Link Bridging Options for Configuring AD DS Replication Guidelines for Configuring AD DS Replication Guidelines for Placing Domain Controllers Guidelines for Placing RODCs Guidelines for Placing Global Catalog Servers Guidelines for Placing Operations Master Servers Module 03 Review 56m Module 04 - Designing AD Domain Administrative Structures Designing Active Directory Domain Administrative Structures in Windows Server 2008 Types of IT Administrative Models Guidelines for Gathering Information on the Current Administrative Structures Business Requirements for Existing Structure 1h20m

Legal Requirements Guidelines for Gathering Information on Organizational Resources Guidelines for Gathering Information on Administrative Processes Strategies for Designing Organizational Units Strategies for Delegating Administrative Control Strategies for Designing Group Policy Structures Considerations for Designing Organizational Unit Hierarchies Guidelines for Designing an Organizational Unit Structure Demo: Creating an AD OU Design AD DS Groups in Windows Server 2008 Group Scope Guidelines for Developing a Group Naming Strategy Considerations for Group Nesting Group Nesting Strategies for Using Groups to Access Resources Strategies for Placing Group Objects Guidelines for Designing an AD DS Group Strategy Guidelines for Designing a User Account Strategy Guidelines for Designing a Computer Account Strategy Naming Strategies for Computer Accounts Guidelines for Securing User and Computer Account Management Demo: Automating User Account Management Tools for Automating User and Computer Account Management Module 04 Review Module 05 - Designing AD Group Policy Designing Active Directory Group Policy in Windows Server 2008 Gathering Organizational Information Gathering Information on Security Requirements Gathering Information on Desktop Management Requirements Gathering Information on Desktop Management Gathering Information on Administrative Processes Configuring Group Policy Settings Demo: Designing AD Group Policy Applying Group Policy Settings Demo: Implementing AD Group Policy Group Policy Storage Locations ADMX Format for Administrative Template Guidelines for Designing Administrative Templates Slow Link Detection Best Practices for Group Policy Model Design Guidelines for Designing Group Policy Inheritance Guidelines for Designing Group Policy Filtering Guidelines for Designing Group Policy Application GPO Backup and Recovery Strategy GPO Migration Strategy Delegating GPO Administration GPO Administration Module 05 Review 1h21m

Module 06 - Designing AD Security Designing Active Directory Security in Windows Server 2008 Gathering Information for Designing Account Security Policies Key Components for Designing Account Security Policies Guidelines for Designing Account and Password Policy Guidelines for Designing Secure Account Management Fine-Grained Password Policies What Are Fine-Grained Password Policies? Storing Fine-Grained Password Policies Demo: Designing AD DS Security Password Setting Object Attributes How PSOs Are Processed and Applied Guidelines for Designing Fine-Grained Key Components that Affect Domain Controller Security Why Modify the Default Domain Controller Security Policy? Server Core Server Roles Server Core as a Solution for Domain Controller Deployment What is the Security Configuration Wizard? Scenarios for Using the Security Configuration Wizard What Are Read-Only Domain Controllers? Prerequisites for Deploying RODCs Administrator Role Separation on RODCs Demo: Domain Controller/RODC Security Policies Administrator Responsibilities Service Administrator and Service Management Data Administrators and Data Management What Are Administrative Autonomy Delegation of Administrative Permission Attributes of a Good Delegation Model Guidelines for Creating a Delegation Model Guidelines for Using and Securing Administrator Accounts Demo: Restricted Groups Auditing Administrative Access Module 06 Review 1h52m Module 07 - Designing AD High Availability Designing Active Directory High Availability in Windows Server 2008 What is High Availability? Components of an Active Directory High Availability Design Active Directory High Availability Business Requirements for AD DS High Availability Infrastructure Requirements for AD DS High Availability High Availability Options for Network Infrastructure Process of Planning for High Availability Guidelines for Designing Highly Available Domain Controllers Global Catalog Placement and High Availability Demo: Designing AD DS Availability High Availability of DNS Guidelines for Designing Highly Available Network Infrastructure Module 07 Review 27m

Module 08 - Designing AD Disaster Recovery Designing Active Directory Disaster Recovery in Windows Server 2008 Overview of Database Maintenance NTDSUtil.exe Benefits of Restartable AD DS in Windows Server 2008 Considerations for Using Restartable AD DS Overview of AD DS Backup and Recovery Windows Server Backup AD DS Backup and Recovery in Windows Server 2008 Active Directory Domain Services Backup System Components System State Data Critical Volumes Review Options for Restoring AD DS Considerations for Restoring AD DS Guidelines for Designing Backup and Recovery in AD DS Why Monitor AD DS? Tools for Monitoring AD DS Reliability and Performance Monitor Demo: Disaster Recovery and Monitoring Guidelines for Monitoring Active Directory Domain Controllers NTDS Counters Monitoring AD Module 08 Review 57m Module 09 - Designing Public Key Infrastructure Designing Public Key Infrastructure in Windows Server 2008 What is a PKI? Key Components of a PKI PKI Solution Requirements Applications That Use PKI Certification Authorities and PKI Comparison of Enterprise and Standalone Internal and Public Certification Authorities Using Both Internal and External Public CA s Active Directory Certificate Services in Windows Server 2008 Features in AD CS Gathering Information for Designing Certification Authority Hierarchy Certification Authority Hierarchy Roles Common Roles in a CA Hierarchy Demo: Designing PKI for Windows Server Options for Designing Certification Authority Hierarchy Types of CA Hierarchies Guidelines for Designing a Certification Authority Hierarchy What Are Certificate Templates? Certificate Templates in Windows Server 2008 Managing Certificate Templates Superseding Templates Feature Designing Certificate Templates Designing Certificate Templates with Customized Add-ons Demo: Updating Templates 1h29m

Guidelines for Designing Certificate Templates Certificate Distribution and Enrollment Choosing Enrollment Method Certificate Autoenrollment Demo: Implementing Autoenrollment What is Certificate Revocation? Guidelines for Designing Certificate Revocation Module 09 Review Module 10 - Designing an AD RMS Infrastructure Designing an Active Directory RMS Infrastructure in Windows Server 2008 What is AD RMS? Key Components of AD RMS Scalability Requirements for AD RMS Design Considerations for External Client AD RMS Access What are AD RMS Rights Policy Templates? Options for Configuring AD RMS Clusters Guidelines for Designing AD RMS Clusters Options for Granting External Users Access to AD RMS Guidelines for Designing AD RMS Access AD RMS Backup Components Options for Restoring AD RMS Troubleshooting AD RMS Restores Different Processes Restoring a Cluster Member Restoring a Non-Cluster Server Demo: Exploring RMS RMS Root Server Guidelines for Implementing an AD RMS Backup and Recovery Strategy Module 10 Review 45m Module 11 - Designing an AD Federation Services Implementation Designing an Active Directory Federation Services Implementation in Windows Server 2008 54m What is Active Directory Federation Services? Key Components of AD FS Deployment Scenarios for AD FS AD FS Server Roles AD FS Server Placement AD FS User Account Stores Components of a B2B Federation Trust B2B Federation Trust Demo: Adding the Federation Service Role Demo: Exporting Certificates Demo: Importing Certificates Key Components of B2B Federation Trust Guidelines for Configuring Certificates and Applications Guidelines for Designing the Account and Resource Partner Components Guidelines for Deploying and Securing AD FS Servers Deploy Federation Server Proxy In Perimeter Network When Additional Guidelines for Deploying and Securing ADFS Servers Options for Configuring AD FS Claims

AD FS Group Claims Guidelines for Usage of AD FS Claims Understanding AD FS Applications Guidelines for Usage of Token-based and Claims-aware Applications Module 11 Review Module 12 - Designing an AD LDS Implementation Designing an Active Directory LDS Implementation What is AD LDS? AD LDS Usage LDAP-Compliant Application Directories Definitions - LDAP Application Directories LDAP Compliant Applications - Defined Extranet Authentication Scenarios Using AD LDS for Developing Schema Modifications Key Sizing Factors for AD LDS Servers AD LDS Replication Scenarios Integration of AD LDS with AD DS Guidelines for Designing AD LDS Instances and Application Partitions Schema Changes and AD LDS Replication of AD LDS Data Planning AD LDS Replication Traffic across WAN Links AD LDS Sites and Site Links Guidelines for Designing AD LDS Schema and Replication User Proxies in AD LDS Authentication and Authorization in AD LDS Implementing Synchronization between AD DS and AD LDS Demo: Working with AD LDS Module 12 Review 1h Module 13 - Designing AD Migrations Designing Active Directory Migrations in Windows Server 2008 AD DS Migration Strategies Domain Upgrade Strategy Domain Restructure Strategy Domain Upgrade and Restructure Criteria for Choosing a Migration Strategy Guidelines for Choosing the Domain Upgrade Strategy Guidelines for Choosing the Domain Restructure Strategy Guidelines for Choosing the Domain Upgrade and Restructure Strategy Documenting the Current Environment Active Directory Structure Current Network Services Current Domain Controller Hardware and Software Cleaning Up the Current Active Directory Environment 59m

Hardware and Application Compatibility Preparing a Domain and Forest for Upgrade Upgrade Guidelines Domain Functional Levels in Windows Server 2008 Windows 2000 Native Functional Level Windows Server 2003 Functional Level Windows Server 2008 Functional Mode SID History Active Directory Migration Tool ADMT Scenarios Preparing a Domain to Run ADMT Demo: Installing ADMT Intraforest and Interforest Restructuring Demo: Using ADMT Trusts Guidelines for Restructuring Domains Module 13 Review Course Closure Total Duration: 16 hrs 57 min