You are on page 1of 14

MCITP Syllabus

Course Details:

• Duration: 35 Days (3 Hours Daily).


• Certificates: MCITP.
• Exams: 70-646, 70-643, 70-647.

The MCSA Certification

• MCITP (Server Administrator).

• MCITP (Enterprise Administrator).

02-7101462 ‫ ﻓﺎﻛﺲ‬,02- 7101461‫ ﻫﺎﺗﻒ‬, ‫ ﺇﺭﺑﺪ – ﺍﻷﺭﺩﻥ‬-1‫ﺇﺷﺎﺭﺓ ﺍﻟﻨﺴﻴﻢ – ﳎﻤﻊ ﺍﳊﻤﺎﻳﺪﻩ ﺍﻟﺘﺠﺎﺭﻱ – ﻁ‬
Planning and Maintaining a Microsoft® Windows® Server
2008 Network Infrastructure

Implementing and Configuring a Windows Deployment Infrastructure

• Deploying Windows in a Windows Server 2008 Environment


• Windows Deployment Fundamentals
• Windows Deployment Methods
• Introducing Windows Deployment Services
• Understanding WDS Infrastructure Components
• Installing WDS
• Configuring WDS
• Capturing Images with WDS
• Deploying Images with WDS
• What Are Virtual Machines?
• Virtual PC 2007
• Virtual Server 2005 R2 SP1

Configuring Server Storage and Clusters

• Understanding Server Storage Technologies


• Managing Disks, Volumes, and Partitions in Windows Server 2008
• Working with Disk Sets
• Server Cluster Fundamentals
• Configuring an NLB Cluster
• Creating a Failover Cluster
• Configure Storage
• Configure High Availability

02-7101462 ‫ ﻓﺎﻛﺲ‬,02- 7101461‫ ﻫﺎﺗﻒ‬, ‫ ﺇﺭﺑﺪ – ﺍﻷﺭﺩﻥ‬-1‫ﺇﺷﺎﺭﺓ ﺍﻟﻨﺴﻴﻢ – ﳎﻤﻊ ﺍﳊﻤﺎﻳﺪﻩ ﺍﻟﺘﺠﺎﺭﻱ – ﻁ‬
Installing and Configuring Terminal Services

• Deploying a Terminal Server


• Understanding Terminal Services
• Enabling Remote Desktop
• Installing Terminal Services
• Staging the Terminal Server
• Introducing the Terminal Services Configuration Console
• Configuring Connection (RDP-Tcp) Properties
• Configuring Terminal Services Server Properties
• Configuring Terminal Services Printer Redirection
• Deploy a Terminal Server Farm

Configuring and Managing a Terminal Services Infrastructure.

• Configuring and Managing Terminal Services Clients


• Configuring Terminal Services Client Settings
• Configuring User Profiles for Terminal Services
• Managing Terminal Services User Connections
• Managing Resources in Client Sessions
• Deploying Terminal Services Gateway
• Overview of Terminal Services Gateway
• Installing and Configuring a TS Gateway Server
• Publishing Applications with TS RemoteApp
• Configuring a Server to Host RemoteApp Programs
• Adding Programs for Publication in TS RemoteApp Manager
• Deploying a RemoteApp Program through TS Web Access
• Creating an RDP File of a RemoteApp Program for Distribution
• Creating a Windows Installer Package of a RemoteApp Program for
Distribution
• Deploy a Terminal Services Infrastructure

02-7101462 ‫ ﻓﺎﻛﺲ‬,02- 7101461‫ ﻫﺎﺗﻒ‬, ‫ ﺇﺭﺑﺪ – ﺍﻷﺭﺩﻥ‬-1‫ﺇﺷﺎﺭﺓ ﺍﻟﻨﺴﻴﻢ – ﳎﻤﻊ ﺍﳊﻤﺎﻳﺪﻩ ﺍﻟﺘﺠﺎﺭﻱ – ﻁ‬
Installing and Configuring Web Applications

• Installing the Web Server (IIS) Role


• Understanding Web Server Security
• Understanding IIS Components and Options
• Understanding the Application Server Role
• Understanding IIS 7.0 Role Services
• Installing the Web Server (IIS) Role
• Using Windows System Resource Manager
• Configuring Internet Information Services
• Working with IIS Management Tools
• Creating and Configuring Web Sites
• Understanding Web Applications
• Working with Application Pools
• Working with Virtual Directories
• Using Command-Line Management
• Managing Web Server Configuration Files
• Migrating From IIS 6.0

Managing Web Server Security

• Understanding IIS 7 Security Accounts


• Managing File System Permissions
• Configuring IIS Administration Features
• Managing Request Handlers
• Managing IIS Security Settings
• Managing IIS Authentication
• Managing URL Authorization Rules
• Configuring Server Certificates
• Configuring IP Address and Domain Restrictions
• Configuring .NET Trust Levels
• Implementing Web Server Security

02-7101462 ‫ ﻓﺎﻛﺲ‬,02- 7101461‫ ﻫﺎﺗﻒ‬, ‫ ﺇﺭﺑﺪ – ﺍﻷﺭﺩﻥ‬-1‫ﺇﺷﺎﺭﺓ ﺍﻟﻨﺴﻴﻢ – ﳎﻤﻊ ﺍﳊﻤﺎﻳﺪﻩ ﺍﻟﺘﺠﺎﺭﻱ – ﻁ‬
Configuring FTP and SMTP Services

• Configuring FTP
• Installing the FTP Publishing Service
• Configuring FTP Sites by Using IIS 6.0 Manager
• Installing and Managing FTP 7
• Managing FTP Sites
• Managing FTP User Security
• Configuring FTP Network Security
• Managing FTP Site Settings
• Using FTP Client Software
• Configuring and Testing FTP
• Configuring SMTP
• Installing the SMTP Server Feature
• Configuring SMTP Services
• Monitoring SMTP Virtual Servers
• Using an SMTP Virtual Server

Configuring Windows Media Services

• Configuring Windows Media Services


• Understanding Media Services
• Installing Streaming Media Services
• Using Windows Media Services Management Tools
• Managing Publishing Points
• Configuring Source Settings
• Creating Announcements
• Configuring Publishing Point Properties
• Managing Advertising Settings
• Configuring Security for Windows Media Services
• Enabling Cache/Proxy Features
• Protecting Media by Using DRM

02-7101462 ‫ ﻓﺎﻛﺲ‬,02- 7101461‫ ﻫﺎﺗﻒ‬, ‫ ﺇﺭﺑﺪ – ﺍﻷﺭﺩﻥ‬-1‫ﺇﺷﺎﺭﺓ ﺍﻟﻨﺴﻴﻢ – ﳎﻤﻊ ﺍﳊﻤﺎﻳﺪﻩ ﺍﻟﺘﺠﺎﺭﻱ – ﻁ‬
Configuring Windows SharePoint Services

• Configuring and Managing Windows SharePoint Services


• Understanding Windows SharePoint Services
• Understanding WSS Deployment Options
• Verifying the WSS Installation
• Using the SharePoint Central Administration Web Site
• Managing SharePoint Operations Settings
• Understanding Backup and Recovery for WSS
• Deploying and Configuring SharePoint Sites
• Managing Web Applications
• Installing Application Templates

02-7101462 ‫ ﻓﺎﻛﺲ‬,02- 7101461‫ ﻫﺎﺗﻒ‬, ‫ ﺇﺭﺑﺪ – ﺍﻷﺭﺩﻥ‬-1‫ﺇﺷﺎﺭﺓ ﺍﻟﻨﺴﻴﻢ – ﳎﻤﻊ ﺍﳊﻤﺎﻳﺪﻩ ﺍﻟﺘﺠﺎﺭﻱ – ﻁ‬
Planning, Implementing, and Maintaining a Microsoft
Windows Server 2008 Active Directory Infrastructure

Installing, Upgrading, and Deploying Windows Server 2008

• Planning Windows Server 2008 Installation and Upgrade


• Selecting the Right Edition of Windows Server 2008
• Windows Server 2008 Server Core
• Installing Windows Server 2008
• Upgrading from Windows Server 2003
• Windows Server 2008 Answer Files
• Windows Deployment Services
• Multicast, Scheduled, and Automatic Deployment
• Rollback Preparation
• Deployment Services Role

Configuring Network Connectivity

• Using IPv6 in Windows Server 2008


• Addressing Problems Caused by IPv4 Limitations
• Analyzing the IPv6 Address Structure
• Planning an IPv4 to IPv6 Transition Strategy
• Implementing IPv4-to-IPv6 Compatibility
• Using IPv6 Tools
• Configuring Clients Through DHCPv6
• Planning an IPv6 Network
• Configuring DNS
• Using Windows Server 2008 DNS
• Examining New DNS Features and Enhancements
• Planning a DNS Infrastructure

02-7101462 ‫ ﻓﺎﻛﺲ‬,02- 7101461‫ ﻫﺎﺗﻒ‬, ‫ ﺇﺭﺑﺪ – ﺍﻷﺭﺩﻥ‬-1‫ﺇﺷﺎﺭﺓ ﺍﻟﻨﺴﻴﻢ – ﳎﻤﻊ ﺍﳊﻤﺎﻳﺪﻩ ﺍﻟﺘﺠﺎﺭﻱ – ﻁ‬
Active Directory and Group Policy

• Windows Server 2008 Active Directory


• Introducing the Windows Server 2008 Directory Server Role
• Planning Domain and Forest Functionality
• Planning Forest-Level Trusts
• Raising Domain and Forest Functional Levels and Configuring Fine-
Grained Password Policy
• Group Policy in Windows Server 2008
• Understanding Group Policy
• Planning and Managing Group Policy
• Troubleshooting Group Policy

Application Servers and Services

• Application Servers
• Planning Application Availability
• Ensuring Application Availability
• Implementing Application Accessibility
• Planning Application Resilience
• Application Deployment
• Deploying Applications Using System Center Essentials
• Using System Center Configuration Manager 2007

02-7101462 ‫ ﻓﺎﻛﺲ‬,02- 7101461‫ ﻫﺎﺗﻒ‬, ‫ ﺇﺭﺑﺪ – ﺍﻷﺭﺩﻥ‬-1‫ﺇﺷﺎﺭﺓ ﺍﻟﻨﺴﻴﻢ – ﳎﻤﻊ ﺍﳊﻤﺎﻳﺪﻩ ﺍﻟﺘﺠﺎﺭﻱ – ﻁ‬
Terminal Services and Application and Server Virtualization

• Terminal Services
• Planning Terminal Server Infrastructure
• Terminal Services Licensing
• Configuring Terminal Servers
• Terminal Services Web Access
• Terminal Server Session Broker
• Monitoring Terminal Services
• Terminal Services Gateway
• Server and Application Virtualization
• Managing Virtualized Servers
• Terminal Services RemoteApp
• Microsoft Application Virtualization

File and Print Servers

• Managing File and Print Servers


• Planning the File Services Server Role
• Managing Access Control
• Using FSRM to Configure Quotas and File Screen Policy
• Planning the Print Services Server Role
• Using DFS Namespace to Plan and Implement a Shared Folder
• Structure and Enhance Data Availability
• Configuring a DFSR Structure
• Configuring Offline Data Access
• Configuring Indexing in the Windows Search Service

02-7101462 ‫ ﻓﺎﻛﺲ‬,02- 7101461‫ ﻫﺎﺗﻒ‬, ‫ ﺇﺭﺑﺪ – ﺍﻷﺭﺩﻥ‬-1‫ﺇﺷﺎﺭﺓ ﺍﻟﻨﺴﻴﻢ – ﳎﻤﻊ ﺍﳊﻤﺎﻳﺪﻩ ﺍﻟﺘﺠﺎﺭﻱ – ﻁ‬
Windows Server 2008 Management, Monitoring, and Delegation

• Server Management Strategies


• Tools for the Administration of Windows Server 2008
• Remote Administration Technologies
• Managing Windows Server 2008 Event Logs
• Remotely Managing Windows Server 2008
• Monitoring and Optimizing Performance
• Reliability and Performance
• Optimizing Windows Server 2008 Performance
• Windows System Resource Manager
• Data Collector Sets, Reports, and WSRM Policies
• Delegating Authority
• Delegation Policies
• Delegation Procedures
• Credential Delegation
• Delegating the Management of Applications
• Delegating Administrative Permissions

Patch Management and Security

• Windows Server 2008 Patch Management Strategies


• Deploying Updates with WSUS
• Replica Mode and Autonomous Mode
• Using Computer Groups
• WSUS Client Configuration
• Updates and Synchronization Strategies
• Update Management and Compliance
• Other Patch Management Tools
• Monitoring Server Security
• Encrypting File System
• Windows Firewall with Advanced Security

02-7101462 ‫ ﻓﺎﻛﺲ‬,02- 7101461‫ ﻫﺎﺗﻒ‬, ‫ ﺇﺭﺑﺪ – ﺍﻷﺭﺩﻥ‬-1‫ﺇﺷﺎﺭﺓ ﺍﻟﻨﺴﻴﻢ – ﳎﻤﻊ ﺍﳊﻤﺎﻳﺪﻩ ﺍﻟﺘﺠﺎﺭﻱ – ﻁ‬
Remote Access and Network Access Protection

• Managing Remote Access


• VPN Protocols and Authentication
• Network Policy Server
• Remote Access Accounting
• Terminal Services Gateway Servers
• Network Access Protection
• System Health Agents and Validators
• NAP Enforcement Methods
• Remediation Servers

Certificate Services and Storage Area Networks

• Configuring Active Directory Certificate Services


• Types of Certificate Authority
• Certificate Services Role-Based Administration
• Configuring Credential Roaming
• Configuring Auto enrollment
• Configuring Web Enrollment Support
• Configuring Certificate Revocation Lists
• Configuring an Online Responder for Certificate Services
• Network Device Enrollment Service
• Using Enterprise PKI to monitor CA Health
• Planning the Deployment of Storage Area Networks
• Logical Unit Numbers
• VDS
• Storage Manager For SANs
• Multipath I/O
• Storage Explorer

02-7101462 ‫ ﻓﺎﻛﺲ‬,02- 7101461‫ ﻫﺎﺗﻒ‬, ‫ ﺇﺭﺑﺪ – ﺍﻷﺭﺩﻥ‬-1‫ﺇﺷﺎﺭﺓ ﺍﻟﻨﺴﻴﻢ – ﳎﻤﻊ ﺍﳊﻤﺎﻳﺪﻩ ﺍﻟﺘﺠﺎﺭﻱ – ﻁ‬
Clustering and High Availability

• Understanding DNS Round Robin and Load Balancing


• Plan Availability Strategies
• DNS Round Robin
• Configuring Windows Network Load Balancing
• Windows Server 2008 Cluster Tools
• Selecting Redundancy Strategies
• Understanding Cluster Concepts
• Configuring Failover Clustering

Backup and Recovery

• Backing Up Data
• Shadow Copies of Shared Folders
• Windows Server Backup
• The wbadmin Command-Line Tool
• Backing Up Server Roles and Applications
• Remotely Backing Up Computers
• Further Considerations for Planning Backups
• System Center Data Protection Manager
• Backing Up Windows Server 2008
• Disaster Recovery
• Windows Server Backup Recovery Modes
• Recovering Active Directory
• Hyper-V and Disaster Recovery

02-7101462 ‫ ﻓﺎﻛﺲ‬,02- 7101461‫ ﻫﺎﺗﻒ‬, ‫ ﺇﺭﺑﺪ – ﺍﻷﺭﺩﻥ‬-1‫ﺇﺷﺎﺭﺓ ﺍﻟﻨﺴﻴﻢ – ﳎﻤﻊ ﺍﳊﻤﺎﻳﺪﻩ ﺍﻟﺘﺠﺎﺭﻱ – ﻁ‬
Designing Security for Microsoft® Networks

Introduction to Designing Security

• Introduction to Designing Security for Microsoft Networks


• Contoso Pharmaceuticals: A Case Study

Creating a Plan for Network Security

• Introduction to Security Policies


• Defining a Process for Designing Security
• Creating a Security Design Team
• Planning a Security Framework

Identifying Threats to Network Security

• Introduction to Security Threats


• Predicting Threats to Security

Analyzing Security Risks

• Introduction to Risk Management


• Creating a Risk Management Plan

Creating a Security Design for Physical Resources

• Determining Threats and Analyzing Risks to Physical Resources


• Designing Security for Physical Resources

Creating a Security Design for Computers

• Determining Threats and Analyzing Risks to Computers


• Designing Security for Computers

02-7101462 ‫ ﻓﺎﻛﺲ‬,02- 7101461‫ ﻫﺎﺗﻒ‬, ‫ ﺇﺭﺑﺪ – ﺍﻷﺭﺩﻥ‬-1‫ﺇﺷﺎﺭﺓ ﺍﻟﻨﺴﻴﻢ – ﳎﻤﻊ ﺍﳊﻤﺎﻳﺪﻩ ﺍﻟﺘﺠﺎﺭﻱ – ﻁ‬
Creating a Security Design for Accounts

• Determining Threats and Analyzing Risks to Accounts


• Designing Security for Accounts

Creating a Security Design for Authentication

• Determining Threats and Analyzing Risks to Authentication


• Designing Security for Authentication

Creating a Security Design for Data

• Determining Threats and Analyzing Risks to Data


• Designing Security for Data

Creating a Security Design for Data Transmission

• Determining Threats and Analyzing Risks to Data Transmission


• Designing Security for Data Transmission

Creating a Security Design for Network Perimeters

• Determining Threats and Analyzing Risks to Network Perimeters


• Designing Security for Network Perimeters

Designing Responses to Security Incidents

• Introduction to Auditing and Incident Response


• Designing an Audit Policy
• Designing an Incident Response Procedure

02-7101462 ‫ ﻓﺎﻛﺲ‬,02- 7101461‫ ﻫﺎﺗﻒ‬, ‫ ﺇﺭﺑﺪ – ﺍﻷﺭﺩﻥ‬-1‫ﺇﺷﺎﺭﺓ ﺍﻟﻨﺴﻴﻢ – ﳎﻤﻊ ﺍﳊﻤﺎﻳﺪﻩ ﺍﻟﺘﺠﺎﺭﻱ – ﻁ‬

You might also like