Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Microsoft 70-413: Designing and Implementing a Server Infrastructure
Module 1
Designing and Implementing a Server Infrastructure (3:28)
Instructor Introduction (2:59)
Course Overview Part1 (3:20)
Course Overview Part2 (4:38)
Prerequisites (2:47)
Domainwise (1:34)
Networkwise (1:09)
Windows Server (2:23)
Certification Overview (1:11)
Microsoft Learning Quote (1:11)
Chapter Review (1:16)
Module 2
Windows Server 2012 Topology (0:59)
Course Tips (4:16)
Lab Setup (0:35)
Build Environment (1:09)
Presentation Types (2:21)
What Microsoft is Showing Us Part1 (0:06)
What Microsoft is Showing Us Part2 (3:50)
Chapter Review (1:54)
Module 3
Plan: Installs/Images/Deployment (0:28)
Course Overview (1:26)
Topology (3:45)
Flavors (2:04)
Requirements (1:13)
Fresh Install (1:21)
Image (0:57)
Deployment Tools (2:14)
Installation Deployment Part1 (4:09)
Installation Deployment Part2 (3:34)
Windows Server 2012 Image (3:49)
System Center Manager (1:15)
Prepare for Deployment Part1 (0:27)
Prepare for Deployment Part2 (5:24)
Prepare for Deployment Part3 (5:22)
Prepare for Deployment Part4 (7:25)
Prepare for Deployment Part5 (5:41)
Prepare for Deployment Part6 (7:00)
Prepare for Deployment Part7 (5:01)
Prepare for Deployment Part8 (3:03)
Best Practices (1:05)
Chapter Review (1:33)
Module 4
Plan: Migration/Upgrades/Capacity Part1 (0:41)
Plan: Migration/Upgrades/Capacity Part2 (1:09)
Whiteboard Part1 (3:25)
Whiteboard Part2 (3:05)
Upgrade Plans (2:43)
Migration Plans (2:29)
Identifying Requirements (0:30)
Licensing (2:40)
Activating Windows Server (1:07)
Considerations (1:50)
Private Cloud (2:47)
Virtualization (2:14)
Microsoft Assessment and Planning Toolkit Part1 (0:20)
Microsoft Assessment and Planning Toolkit Part2 (4:47)
Microsoft Assessment and Planning Toolkit Part3 (5:51)
Microsoft Assessment and Planning Toolkit Part4 (5:17)
Chapter Review (1:23)
Module 5
Plan: Storage/Virtual Machine Part1 (0:37)
Plan: Storage/Virtual Machine Part2 (0:28)
Storage Basics (1:14)
Redundant Array of Independent Disks (RAID) (1:05)
Storage Options (0:39)
Direct-Attached Storage (DAS) (2:02)
Network-Attached Storage (NAS) (2:26)
Storage Area Network (SAN) (3:59)
Internet Small Computer System Interface (iSCSI) (1:18)
iSCSI Target Server (1:09)
High Availability (1:39)
iSCSI Virtual Disks Part1 (0:10)
iSCSI Virtual Disks Part2 (3:13)
iSCSI Virtual Disks Part3 (4:43)
iSCSI Virtual Disks Part4 (4:02)
iSCSI Virtual Disks Part5 (1:59)
Chapter Review (0:32)
Module 6
Networking: Domain Name System (DNS) Part1 (0:53)
Networking: Domain Name System (DNS) Part2 (1:09)
Basics (2:43)
Planning (4:35)
Design (1:59)
Exchange (2:05)
Zone Types Part1 (2:45)
Zone Types Part2 (0:30)
Zone Types Part3 (1:35)
Zone Types Part4 (0:20)
Zone Types Part5 (1:04)
Query (1:48)
Optimize (1:06)
Security (1:28)
DNS Security Extensions (DNSSEC) Part1 (0:20)
DNS Security Extensions (DNSSEC) Part2 (0:56)
Common Attacks Part1 (0:44)
Common Attacks Part2 (0:57)
DNS Basics Part1 (0:12)
DNS Basics Part2 (3:43)
DNS Basics Part3 (5:03)
DNS Basics Part4 (4:39)
Chapter Review (0:59)
Module 7
Networking: Dynamic Host Configuration Protocol (DHCP) Part1 (0:35)
Networking: Dynamic Host Configuration Protocol (DHCP) Part2 (0:32)
Basics (1:15)
Planning Part1 (2:56)
Planning Part2 (3:13)
Process Review (2:17)
Play Nice (0:50)
Availability (4:07)
Scope (0:42)
Internet Protocol version 6 (IPv6) (1:09)
Name Protection (1:17)
Configure DHCP Failover Part1 (0:10)
Configure DHCP Failover Part2 (4:41)
Configure DHCP Failover Part3 (4:33)
Chapter Review (1:31)
Module 8
Networking: Internet Protocol address management (IPAM) Part1 (0:22)
Networking: Internet Protocol address management (IPAM) Part2 (1:54)
Network Topology Part1 (0:09)
Network Topology Part2 (4:16)
IPAM Basics (2:21)
Reasons To Use (2:41)
Components (0:57)
Requirements (1:21)
Security (5:17)
Install and Configure IPAM Part1 (0:31)
Install and Configure IPAM Part2 (4:51)
Install and Configure IPAM Part3 (6:42)
Chapter Review (0:43)
Module 9
Logical: Domains/Forest/Trusts Part1 (0:30)
Logical: Domains/Forest/Trusts Part2 (1:04)
Forest (3:31)
Domain Tree (3:30)
Models (2:26)
Single (1:56)
Multi (2:26)
Functional (3:33)
Upgrade/Migrate (1:29)
Trusts (2:26)
Planning (1:51)
Implement Forest Trusts Part1 (0:10)
Implement Forest Trusts Part2 (7:13)
Implement Forest Trusts Part3 (5:05)
Implement Forest Trusts Part4 (6:59)
Implement Forest Trusts Part5 (3:18)
Chapter Review (0:34)
Module 10
Logical: Advanced Group Policy Management (AGPM) Part1 (0:57)
Logical: Advanced Group Policy Management (AGPM) Part2 (1:01)
Group Policy Object (GPO) (1:35)
Organizational Control (2:05)
Windows OS (2:45)
Practical Application (2:29)
GPO Types (4:36)
GPO Storage (0:44)
Central Store (2:45)
Planning Part1 (2:24)
Planning Part2 (4:18)
Links (2:58)
Templates (1:37)
Export/Import (1:23)
Delegate (1:22)
Design a GPO Part1 (0:19)
Design a GPO Part2 (5:29)
Design a GPO Part3 (6:30)
Design a GPO Part4 (6:08)
Design a GPO Part5 (5:05)
Chapter Review (0:56)
Module 11
AD DS Physical: Sites/DC Part1 (0:34)
AD DS Physical: Sites/DC Part2 (1:16)
Domain Controller (DC) (2:32)
Locating Local DC (2:13)
Virtual Domain Controller Part1 (4:03)
Virtual Domain Controller Part2 (3:30)
Monitor (1:45)
AD Sites (3:57)
Site to Site Replication (1:22)
Planning and Implementing Part1 (3:28)
Planning and Implementing Part2 (3:15)
Inter-Site Topology Generator (ISTG) (1:32)
Knowledge Consistency Checker (KCC) (1:17)
Replication Topology and Protocol (1:26)
Build a Domain Controller Part1 (0:35)
Build a Domain Controller Part2 (5:44)
Build a Domain Controller Part3 (6:48)
Chapter Review (2:18)
Module 12
AD DS Physical: Roles/Branches Part1 (0:54)
AD DS Physical: Roles/Branches Part2 (1:01)
Files (2:31)
Distributed File System (DFS) (1:57)
DFS Namespace (2:39)
DFS Replication (3:20)
What Is Branch Cache? (2:01)
Branch Cache Objectives (1:43)
Branch Cache Modes (2:30)
Managing and Monitoring (1:21)
Dynamic Access Control Basics (3:08)
New vs. Old (1:35)
Central Access Policy (1:17)
Implementing (3:28)
Deploy (3:04)
Controlling Access Part1 (0:15)
Controlling Access Part2 (6:29)
Controlling Access Part3 (7:42)
Controlling Access Part4 (7:59)
Controlling Access Part5 (7:26)
Controlling Access Part6 (8:58)
Controlling Access Part7 (7:23)
Controlling Access Part8 (7:36)
Chapter Review (0:55)
Module 13
Access: VPN/Certificates Part1 (0:26)
Access: VPN/Certificates Part2 (0:48)
Virtual Private Network (VPN) Part1 (2:55)
Virtual Private Network (VPN) Part2 (2:57)
Methods or Protocols (3:10)
Authentication Methods (2:13)
Connection Manager Administration Kit (CMAK) (1:16)
Planning VPN (2:53)
PKI and Certificate Basics (2:17)
Components (1:18)
Certificate Authority Part1 (1:19)
Certificate Authority Part2 (0:36)
Certificate Authority Part3 (0:42)
Certificate Revocation List (CRL) (1:20)
New Features (1:12)
Recovery (1:01)
Perimeter Network (DMZ) (5:14)
Firewalls (4:21)
Networks (3:05)
Chapter Review (1:01)
Module 14
Access: Direct Access Part1 (0:32)
Access: Direct Access Part2 (0:48)
What is Direct Access? (3:18)
Components (2:01)
Features (1:44)
Name Resolution Policy Table (NRPT) (0:58)
Connecting Internally (0:35)
Connecting Externally (2:34)
Direct Access vs. VPN (3:15)
Planning (2:32)
Build and Design Part1 (0:17)
Build and Design Part2 (1:30)
Build and Design Part3 (6:27)
Build and Design Part4 (7:49)
Build and Design Part5 (5:44)
Configure Direct Access Part1 (9:51)
Configure Direct Access Part2 (9:50)
Configure Direct Access Part3 (6:25)
Configure Direct Access Part4 (8:31)
Configure Direct Access Part5 (9:24)
Chapter Review (1:07)
Module 15
Access: NAP/Network Policy Server (NPS) Part1 (0:45)
Access: NAP/Network Policy Server (NPS) Part2 (1:13)
Components (0:30)
Authentication vs. Authorization (4:01)
Network Policy and Access Roles Part1 (0:45)
Network Policy and Access Roles Part2 (0:33)
Network Policy and Access Roles Part3 (5:03)
Policy Processing Part1 (3:05)
Policy Processing Part2 (2:46)
Policy Processing Part3 (1:27)
Remote Authentication Dial In User Service (RADIUS) Part1 (1:12)
Remote Authentication Dial In User Service (RADIUS) Part2 (1:13)
Network Access Protection (NAP) Part1 (0:23)
Network Access Protection (NAP) Part2 (0:28)
Network Access Protection (NAP) Part3 (0:34)
Network Access Protection (NAP) Part4 (0:27)
Network Access Protection (NAP) Part5 (1:20)
Remediation Part1 (3:00)
Remediation Part2 (1:51)
Components (1:49)
Police-Regulate-Enforce (0:27)
Security Demonstration Part1 (0:19)
Security Demonstration Part2 (7:35)
Security Demonstration Part3 (7:24)
Security Demonstration Part4 (7:22)
Security Demonstration Part5 (7:00)
Security Demonstration Part6 (6:24)
Security Demonstration Part7 (7:13)
Chapter Review (1:10)
Module 16
Course Review Part1 (3:59)
Course Review Part2 (2:29)
Audience Profiles (0:58)
Certification Overview (0:53)
Instant Expert (1:24)
Study Recommendations (2:03)
Exam Preparation Part1 (1:30)
Exam Preparation Part1 (0:22)
Design a GPO Part5
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock