MCSE Core Infrastructure (Security) w/ MCSA Windows Server 2016 Training & Certification Boot Camp – 13 Days
What's Included
Airfare - Your Location To Tampa, FL*
4 Microsoft Test Vouchers
4 Microsoft Official Courses
13 Nights of Lodging
1 Retake Voucher (per exam, if needed)
Microsoft Study Labs & Simulations
Ground Transportation
Onsite Pearson Vue Test Center
Instructor Led Classroom Training
PLEASE NOTE - We will continue to offer this camp WITHOUT testing / certification for dates beyond Jan 31st, 2021 (date Microsoft retires exams)
The MCSE: Core Infrastructure (Security) w/ MCSA Windows Server 2016 Training & Certification Boot Camp covers Windows Server 2016 Admin & Security in one combined 13 day course. Student will learn Windows Server 2016 topics such as installing, configuring, administering plus learn how to enhance the security of the IT infrastructure that they administer.
This Windows Server 2016 boot camp incorporates Microsoft Official Courseware
20740 Installation, Storage, and Compute with Windows Server 2016
20741 Networking with Windows Server 2016
20742 Identity with Windows Server 2016
20744 Securing Windows Server 2016
While attending this training program - you take four exams to test and certify for the Microsoft Certified Solutions Expert MCSE Core Infrastructure plus MCSA Windows Server 2016 official certifications. If your goal is to learn how to implement, administer and secure Azure and Windows Server 2016 services plus pass the certification exams (70-740, 70-741, 70-742 & 70-744) - you've found the right place. This course is a hybrid of actual hands on learning combined with focused materials mapped to exam objectives.
Skills Gained:
Prepare and install Nano Server, a Server Core installation, and plan a server upgrade and migration strategy.
Describe enterprise storage solutions, and select the appropriate solution for a given situation.
Implement and manage Storage Spaces and Data Deduplication.
Install and configure Microsoft Hyper-V.
Deploy, configure, and manage Windows and Hyper-V containers.
Describe the high availability and disaster recovery technologies in Windows Server 2016.
Plan, create, and manage a failover cluster.
Implement failover clustering for Hyper-V virtual machines.
Configure a Network Load Balancing (NLB) cluster, and plan for an NLB implementation.
Create and manage deployment images.
Manage, monitor, and maintain virtual machine installations.
Plan and implement an IPv4 network.
Implement Dynamic Host Configuration Protocol (DHCP).
Implement IPv6.
Implement Domain Name System (DNS).
Implement and manage IP address management (IPAM).
Plan for remote access.
Implement DirectAccess.
Implement virtual private networks (VPNs).
Implement networking for branch offices.
Configure advanced networking features.
Implement software defined networking
Install and configure domain controllers.
Manage objects in AD DS by using graphical tools and Windows PowerShell.
Implement AD DS in complex environments.
Implement AD DS sites, and configure and manage replication.
Implement and manage Group Policy Objects (GPOs).
Manage user settings by using GPOs.
Secure AD DS and user accounts.
Implement and manage a certificate authority (CA) hierarchy with AD CS.
Deploy and manage certificates.
Implement and administer AD FS.
Implement and administer Active Directory Rights Management Services (AD RMS).
Implement synchronization between AD DS and Azure AD.
Monitor, troubleshoot, and establish business continuity for AD DS services.
Secure Windows Server.
Secure application development and a server workload infrastructure.
Manage security baselines.
Configure and manage just enough and just-in-time (JIT) administration.
Manage data security.
Configure Windows Firewall and a software-defined distributed firewall.
Secure network traffic.
Secure your virtualization infrastructure.
Manage malware and threats.
Configure advanced auditing.
Manage software updates.
Manage threats by using Advanced Threat Analytics (ATA) and Microsoft Operations Management Suite (OMS).
Topics Covered in this Official Boot Camp
Installing, upgrading, and migrating servers and workloads
This module describes the new features of Windows Server 2016, and explains how to prepare for and install Nano Server and Server Core. This module also describes how to plan a server upgrade and migration strategy, and explains how to perform a migration of server roles and workloads within and across domains. Finally, this module explains how to choose an activation model based on your environment characteristics.
Lessons
- Introducing Windows Server 2016
- Preparing and installing Server Core
- Preparing for upgrades and migrations
- Migrating server roles and workloads
- Windows Server activation models
Lab : Installing and configuring Server Core
- Installing Server Core
- Completing post-installation tasks on Windows Server 2016 Core
- Performing remote management
After completing this module, students will be able to:
- Describe the new features of Windows Server 2016.
- Prepare for and install Server Core.
- Plan a server upgrade and migration strategy.
- Perform a migration of server roles and workloads within a domain and across domains.
- Choose an appropriate activation model.
Configuring local storage
This module explains how to manage disks and volumes in Windows Server 2016.
Lessons
- Managing disks in Windows Server
- Managing volumes in Windows Server
Lab : Configuring local storage
- Creating and managing volumes
- Resizing volumes
- Managing virtual hard disks
After completing this module, students will be able to:
- Manage disks in Windows Server.
- Manage volumes in Windows Server.
Implementing enterprise storage solutions
This module discusses direct-attached storage (DAS), network-attached storage (NAS), and storage area networks (SANs). It also explains the purpose of Microsoft Internet Storage Name Service (iSNS) Server, data center bridging (DCB), and Multipath I/O (MPIO). Additionally, this module compares Fibre Channel, Internet Small Computer System Interface (iSCSI), and Fibre Channel over Ethernet (FCoE), and describes how to configure sharing in Windows Server 2016.
Lessons
- Overview of DAS, NAS, and SANs
- Comparing Fibre Channel, iSCSI, and Fibre Channel over Ethernet
- Understanding iSNS, DCB, and MPIO
- Configuring sharing in Windows Server 2016
Lab : Planning and configuring storage technologies and components
- Planning storage requirements
- Configuring iSCSI storage
- Configuring and managing the share infrastructure
After completing this module, students will be able to:
- Describe DAS, NAS, and SANs.
- Compare Fibre Channel, iSCSI, and FCoE.
- Explain the use of iSNS, DCB, and MPIO.
- Configure sharing in Windows Server.
Implementing Storage Spaces and Data Deduplication
This module explains how to implement and manage Storage Spaces. This module also explains how to implement Data Deduplication.
Lessons
- Implementing Storage Spaces
- Managing Storage Spaces
- Implementing Data Deduplication
Lab : Implementing Storage Spaces
- Creating a Storage Space
Lab : Implementing Data Deduplication
- Installing Data Deduplication
- Configuring Data Deduplication
After completing this module, students will be able to:
- Describe and implement the Storage Spaces feature in the context of enterprise storage needs.
- Manage and maintain Storage Spaces.
- Describe and implement Data Deduplication.
Installing and configuring Hyper-V and virtual machines
This module provides an overview of Hyper-V and virtualization. It explains how to install Hyper-V, and how to configure storage and networking on Hyper-V host servers. Additionally, it explains how to configure and manage Hyper-V virtual machines.
Lessons
- Overview of Hyper-V
- Installing Hyper-V
- Configuring storage on Hyper-V host servers
- Configuring networking on Hyper-V host servers
- Configuring Hyper-V virtual machines
- Managing virtual machines
Lab : Installing and configuring Hyper-V
- Verify installation of the Hyper-V server role
- Configuring Hyper-V networks
- Creating and configuring virtual machines
- Enable nested virtualization for a virtual machine
After completing this module, students will be able to:
- Describe Hyper-V and virtualization.
- Install Hyper-V.
- Configure storage on Hyper-V host servers.
- Configure networking on Hyper-V host servers.
- Configure Hyper-V virtual machines.
- Manage Hyper-V virtual machines.
Deploying and managing Windows and Hyper-V containers
This module provides an overview of containers in Windows Server 2016. Additionally, this module explains how to deploy Windows Server and Hyper-V containers. It also explains how to install, configure, and manage containers by using Docker.
Lessons
- Overview of containers in Windows Server 2016
- Deploying Windows Server and Hyper-V containers
- Installing, configuring, and managing containers by using Docker
Lab : Installing and configuring containers
- Installing and configuring Windows Server containers by using Windows PowerShell
- Installing and configuring Windows Server containers by using Docker
After completing this module, students will be able to:
- Describe containers in Windows Server 2016.
- Explain how to deploy containers.
- Explain how to install, configure, and manage containers using Docker.
Overview of high availability and disaster recovery
This module provides an overview of high availability and high availability with failover clustering in Windows Server 2016. It further explains how to plan high availability and disaster recovery solutions with Hyper-V virtual machines. Additionally, this module explains how to back up and restore the Windows Server 2016 operating system and data by using Windows Server Backup.
Lessons
- Defining levels of availability
- Planning high availability and disaster recovery solutions with Hyper-V virtual machines
- Backing up and restoring by using Windows Server Backup
- High availability with failover clustering in Windows Server 2016
Lab : Planning and implementing a high availability and disaster recovery solution
- Determining the appropriate high availability and disaster recovery solution
- Implementing storage migration
- Configuring Hyper-V replicas
After completing this module, students will be able to:
- Define levels of availability.
- Plan high availability and disaster recovery solutions with Hyper-V virtual machines.
- Back up and restore data by using Windows Server Backup.
- Describe high availability with failover clustering in Windows Server 2016.
Implementing failover clustering
This module explains how to plan for failover clustering. It also explains how to create, manage, and troubleshoot a failover cluster.
Lessons
- Planning a failover cluster
- Creating and configuring a new failover cluster
- Maintaining a failover cluster
- Troubleshooting a failover cluster
- Implementing site high availability with stretch clustering
Lab : Implementing failover clustering
- Creating a failover cluster
- Verifying quorum settings and adding a node
Lab : Managing a failover cluster
- Evicting a node and verifying quorum settings
- Changing the quorum from disk witness to file-share witness, and defining node voting
- Verifying high availability
After completing this module, students will be able to:
- Plan for a failover-clustering implementation.
- Create and configure a failover cluster.
- Maintain a failover cluster.
- Troubleshoot a failover cluster.
- Implement high availability and stretch clustering for a site.
Implementing failover clustering with Windows Server 2016 Hyper-V
This module describes how Hyper-V integrates with failover clustering. It also explains how to implement Hyper-V virtual machines (VMs) in failover clusters.
Lessons
- Overview of the integration of Hyper-V Server 2016 with failover clustering
- Implementing Hyper-V VMs on failover clusters
- Key features for VMs in a clustered environment
Lab : Implementing failover clustering with Windows Server 2016 Hyper-V
- Configure iSCSI storage
- Configuring a failover cluster for Hyper-V
- Configuring a highly available VM
After completing this module, students will be able to:
- Describe how Hyper-V integrates with failover clustering.
- Implement Hyper-V VMs on failover clusters.
- Describe the key features for VMs in a clustered environment.
Implementing Network Load Balancing
This module provides an overview of NLB clusters. It also explains how to plan and configure an NLB cluster implementation.
Lessons
- Overview of NLB
- Configuring an NLB cluster
- Planning an NLB implementation
Lab : Implementing NLB
- Implementing a Network Load Balancing (NLB) cluster
- Configuring and managing the NLB cluster
- Validating high availability for the NLB cluster
After completing this module, students will be able to:
- Describe NLB.
- Configure an NLB cluster.
- Explain how to plan an NLB implementation.
Creating and managing deployment images
This module provides an overview of the Windows Server 2016 image deployment process. It also explains how to create and manage deployment images by using the Microsoft Deployment Toolkit (MDT). Additionally, it describes different workloads in the virtual machine environment.
Lessons
- Introduction to deployment images
- Creating and managing deployment images by using MDT
- Virtual machine environments for different workloads
Lab : Using MDT to deploy Windows Server 2016
- Configuring MDT
- Creating and deploying an image
After completing this module, students will be able to:
- Describe the Windows Server 2016 image deployment process.
- Create and manage deployment images by using MDT.
- Describe the different workloads in the virtual machine environment.
Managing, monitoring, and maintaining virtual machine installations
This module provides an overview on Windows Server Update Services (WSUS) and the requirements to implement WSUS. It explains how to manage the update process with WSUS. Additionally, this module provides an overview of Windows PowerShell Desired State Configuration (DSC) and Windows Server 2016 monitoring tools. Finally, this module describes how to use Performance Monitor, and how to manage event logs.
Lessons
- WSUS overview and deployment options
- Update management process with WSUS
- Overview of Windows PowerShell DSC
- Overview of Windows Server 2016 monitoring tools
- Using Performance Monitor
- Monitoring event logs
Lab : Implementing WSUS and deploying updates
- Implementing WSUS
- Configuring update settings
- Approving and deploying an update by using WSUS
Lab : Monitoring and troubleshooting Windows Server 2016
- Establishing a performance baseline
- Identifying the source of a performance problem
- Viewing and configuring centralized event logs
After completing this module, students will be able to:
- Describe the purpose of WSUS and the requirements to implement WSUS.
- Manage the update process with WSUS.
- Describe the purpose and benefits of Windows PowerShell DSC.
- Describe the monitoring tools available in Windows Server 2016.
- Use Performance Monitor.
- Manage event logs.
Planning and implementing an IPv4 network
This module also explains how to use fundamental networking tools and techniques to configure and troubleshoot IPv4-based networks.
Lessons
- Planning IPv4 addressing
- Configuring an IPv4 host
- Managing and troubleshooting IPv4 network connectivity
Lab : Planning an IPv4 network
- Planning the IPv4 address assignments
Lab : Implementing and troubleshooting an IPv4 network
- Verifying IPv4
- Troubleshooting IPv4
After completing this module, students will be able to:
- Plan IPv4 addressing.
- Configure an IPv4 host.
- Manage and troubleshoot IPv4 network connectivity
Implementing DHCP
This module explains how to plan and implement DHCP to support the IPv4 infrastructure.
Lessons
- Overview of the DHCP server role
- Deploying DHCP
- Managing and troubleshooting DHCP
Lab : Implementing DHCP
- Planning a DHCP server implementation
- Implementing the DHCP configuration
- Validating the DHCP implementation
After completing this module, students will be able to:
- Explain the DHCP server role.
- Deploy DHCP.
- Manage and troubleshoot DHCP.
Implementing IPv6
This module explains how to implement IPv6, and how to integrate IPv6 and IPv4 networks.
Lessons
- Overview of IPv6 addressing
- Configuring an IPv6 host
- Implementing IPv6 and IPv4 coexistence
- Transitioning from IPv4 to IPv6
Lab : Configuring and evaluating IPv6 transition technologies
- Reviewing the default IPv6 configuration
- Implementing DHCPv6
- Configuring network integration by using ISATAP
- Configuring native IPv6 connectivity
- Configuring 6to4 connectivity
After completing this module, students will be able to:
- Describe the features and benefits of IPv6.
- Configure an IPv6 host.
- Implement the coexistence between IPv4 and IPv6 networks.
- Transition from an IPv4 network to an IPv6 network.
Implementing DNS
This module explains how to install, configure, and troubleshoot DNS within the organization’s network.
Lessons
- Implementing DNS servers
- Configuring zones in DNS
- Configuring name resolution between DNS zones
- Configuring DNS integration with Active Directory Domain Services (AD DS)
- Configuring advanced DNS settings
Lab : Planning and implementing name resolution by using DNS
- Planning DNS name resolution
- Implementing DNS servers and zones
Lab : Integrating DNS with Active Directory
- Integrating DNS with Active Directory
Lab : Configuring advanced DNS settings
- Configuring DNS policies
- Validating the DNS implementation
- Troubleshooting DNS
After completing this module, students will be able to:
- Implement DNS servers.
- Configure zones in DNS.
- Configure name resolution between DNS zones.
- Configure DNS integration with AD DS.
- Configure advanced DNS settings
Implementing and managing IPAM
This module explains how to implement and manage the IPAM feature in Windows Server 2016. This module also explains how to use IPAM to manage services such as DHCP and DNS.
Lessons
- Overview of IPAM
- Deploying IPAM
- Managing IP address spaces by using IPAM
Lab : Implementing IPAM
- Installing the IPAM Server feature
- Provisioning the IPAM Server
- Managing IP address spaces by using IPAM
After completing this module, students will be able to:
- Describe the IPAM functionality and components.
- Deploy IPAM.
- Manage IP address spaces by using IPAM.
Remote access in Windows Server 2016
This module explains how to plan for remote access in Windows Server 2016 and how to implement Web Application Proxy.
Lessons
- Overview of remote access
- Implementing the Web Application Proxy
Lab : Implementing Web Application Proxy
- Implementing Web Application Proxy
- Validating the Web Application Proxy deployment
After completing this module, students will be able to:
- Describe remote access.
- Implement Web Application Proxy.
Implementing DirectAccess
This module explains how to implement and manage DirectAccess in Windows Server 2016.
Lessons
- Overview of DirectAccess
- Implementing DirectAccess by using the Getting Started Wizard
- Implementing and managing an advanced DirectAccess infrastructure
Lab : Implementing DirectAccess by using the Getting Started Wizard
- Verifying readiness for a DirectAccess deployment
- Configuring DirectAccess
- Validating the DirectAccess deployment
Lab : Deploying an advanced DirectAccess solution
- Preparing the environment for DirectAccess
- Implementing the advanced DirectAccess infrastructure
- Validating the DirectAccess deployment
After completing this module, students will be able to:
- Explain DirectAccess and how it works.
- Implement DirectAccess by using the Getting Started Wizard.
- Implement and manage an advanced DirectAccess infrastructure.
Implementing VPNs
This module explains how to implement and manage remote access in Windows Server 2016 by using VPNs.
Lessons
- Planning VPNs
- Implementing VPNs
Lab : Implementing VPN
- Implementing VPN
- Validating the VPN deployment
- Troubleshooting VPN access
After completing this module, students will be able to:
- Plan a VPN solution.
- Implement VPNs.
Implementing networking for branch offices
This module explains how to implement network services for branch offices.
Lessons
- Networking features and considerations for branch offices
- Implementing Distributed File System (DFS) for branch offices
- Implementing BranchCache for branch offices
Lab : Implementing DFS for branch offices
- Implementing DFS
- Validating the deployment
Lab : Implementing BranchCache
- Implementing BranchCache
- Validating the deployment
After completing this module, students will be able to:
- Describe the networking features and considerations for branch offices.
- Implement DFS for branch offices.
- Implement BranchCache for branch offices.
Configuring advanced networking features
This module explains how to implement an advanced networking infrastructure.
Lessons
- Overview of high performance networking features
- Configuring advanced Microsoft Hyper-V networking features
Lab : Configuring advanced Hyper-V networking features
- Creating and using Hyper-V virtual switches
- Configuring and using the advanced features of a virtual switch
After completing this module, students will be able to:
- Describe the high performance networking enhancements in Windows Server 2016.
- Configure the advanced Microsoft Hyper-V networking features.
Implementing Software Defined Networking
This module explains how to implement SDN.
Lessons
- Overview of SDN.
- Implementing network virtualization
- Implementing Network Controller
Lab : Deploying Network Controller
- Preparing to deploy Network Controller
- Deploying Network Controller
After completing this module, students will be able to:
- Describe SDN.
- Implement network virtualization.
- Implement Network Controller.
Installing and configuring domain controllers
This module describes the features of AD DS and how to install domain controllers (DCs). It also covers the considerations for deploying DCs.
Lessons
- Overview of AD DS
- Overview of AD DS domain controllers
- Deploying a domain controller
Lab : Deploying and administering AD DS
- Deploying AD DS
- Deploying domain controllers by performing domain controller cloning
- Administering AD DS
After completing this module, students will be able to:
- Describe AD DS and its main components.
- Describe the purpose and roles of domain controllers.
- Describe the considerations for deploying domain controllers.
Managing objects in AD DS
This module describes how to use various techniques to manage objects in AD DS. This includes creating and configuring user, group, and computer objects.
Lessons
- Managing user accounts
- Managing groups in AD DS
- Managing computer objects in AD DS
- Using Windows PowerShell for AD DS administration
- Implementing and managing OUs
Lab : Managing AD DS objects
- Creating and managing groups in AD DS
- Creating and configuring user accounts in AD DS
- Managing computer objects in AD DS
Lab : Administering AD DS
- Delegate administration for OUs
- Creating and modifying AD DS objects with Windows PowerShell
After completing this module, students will be able to:
- Manage user accounts in AD DS.
- Manage groups in AD DS.
- Manage computer objects in AD DS.
- Use Windows PowerShell for AD DS administration.
- Implement and manage OUs.
- Administer AD DS.
Advanced AD DS infrastructure management
This module describes how to plan and implement an AD DS deployment that includes multiple domains and forests. The module provides an overview of the components in an advanced AD DS deployment, the process of implementing a distributed AD DS environment, and the procedure for configuring AD DS trusts.
Lessons
- Overview of advanced AD DS deployments
- Deploying a distributed AD DS environment
- Configuring AD DS trusts
Lab : Domain and trust management in AD DS
- Implementing forest trusts
- Implementing child domains in AD DS
After completing this module, students will be able to:
- Describe the components of an advanced AD DS deployment.
- Deploy a distributed AD DS environment.
- Configure AD DS trusts.
Implementing and administering AD DS sites and replication
This module describes how to plan and implement an AD DS deployment that includes multiple locations. The module explains how replication works in a Windows Server 2016 AD DS environment.
Lessons
- Overview of AD DS replication
- Configuring AD DS sites
- Configuring and monitoring AD DS replication
Lab : Implementing AD DS sites and replication
- Modifying the default site
- Creating additional sites and subnets
- Configuring AD DS replication
- Monitoring and troubleshooting AD DS replication
After completing this module, students will be able to:
- Describe how AD DS replication works.
- Configure AD DS sites to help optimize authentication and replication traffic.
- Configure and monitor AD DS replication.
Implementing Group Policy
This module describes how to implement a GPO infrastructure. The module provides an overview of the components and technologies that compose the Group Policy framework.
Lessons
- Introducing Group Policy
- Implementing and administering GPOs
- Group Policy scope and Group Policy processing
- Troubleshooting the application of GPOs
Lab : Implementing a Group Policy infrastructure
- Creating and configuring GPOs
- Managing GPO scope
Lab : Troubleshooting Group Policy infrastructure
- Verify GPO application
- Troubleshooting GPOs
After completing this module, students will be able to:
- Explain what Group Policy is.
- Implement and administer GPOs.
- Describe Group Policy scope and Group Policy processing.
- Troubleshoot GPO application.
Managing user settings with Group Policy
This module describes how to configure Group Policy settings and Group Policy preferences. This includes implementing administrative templates, configuring folder redirection and scripts, and configuring Group Policy preferences.
Lessons
- Implementing administrative templates
- Configuring Folder Redirection, software installation, and scripts
- Configuring Group Policy preferences
Lab : Managing user settings with GPOs
- Using administrative templates to manage user settings
- Implement settings by using Group Policy preferences
- Configuring Folder Redirection
- Planning Group Policy (optional)
After completing this module, students will be able to:
- Implement administrative templates.
- Configure Folder Redirection, software installation, and scripts.
- Configure Group Policy preferences.
Securing Active Directory Domain Services
This module describes how to configure domain controller security, account security, password security, and Group Managed Service Accounts (gMSA).
Lessons
- Securing domain controllers
- Implementing account security
- Implementing audit authentication
- Configuring managed service accounts
Lab : Securing AD DS
- Implementing security policies for accounts, passwords, and administrative groups
- Deploying and configuring an RODC
- Creating and associating a group MSA
After completing this module, students will be able to:
- Secure domain controllers.
- Implement account security.
- Implement audit authentication.
- Configure managed service accounts (MSAs).
Deploying and managing AD CS
This module describes how to implement an AD CS deployment. This includes deploying, administering, and troubleshooting CAs.
Lessons
- Deploying CAs
- Administering CAs
- Troubleshooting and maintaining CAs
Lab : Deploying and configuring a two-tier CA hierarchy
- Deploying an offline root CA
- Deploying an enterprise subordinate CA
After completing this module, students will be able to:
- Deploy CAs.
- Administer CAs.
- Troubleshoot and maintain CAs.
Deploying and managing certificates
This module describes how to deploy and manage certificates in an AD DS environment. This involves deploying and managing certificate templates, managing certificate revocation and recovery, using certificates in a business environment, and implementing smart cards.
Lessons
- Deploying and managing certificate templates
- Managing certificate deployment, revocation, and recovery
- Using certificates in a business environment
- Implementing and managing smart cards
Lab : Deploying and using certificates
- Configuring certificate templates
- Enrolling and using certificates
- Configuring and implementing key recovery
After completing this module, students will be able to:
- Deploy and manage certificate templates.
- Manage certificates deployment, revocation, and recovery.
- Use certificates in a business environment.
- Implement and manage smart cards
Implementing and administering AD FS
This module describes AD FS and how to configure AD FS in a single-organization scenario and in a partner-organization scenario.
Lessons
- Overview of AD FS
- AD FS requirements and planning
- Deploying and configuring AD FS
- Web Application Proxy Overview
Lab : Implementing AD FS
- Configuring AD FS prerequisites
- Installing and configuring AD FS
- Configuring an internal application for AD
- Configuring AD FS for federated business partners
After completing this module, students will be able to:
- Describe AD FS.
- Explain how to deploy AD FS.
- Explain how to implement AD FS for a single organization.
- Explain how to extend AD FS to external clients.
- Implement single sign-on (SSO) to support online services.
Implementing and administering AD RMS
This module describes how to implement an AD RMS deployment. The module provides an overview of AD RMS, explains how to deploy and manage an AD RMS infrastructure, and explains how to configure AD RMS content protection.
Lessons
- Overview of AD RMS
- Deploying and managing an AD RMS infrastructure
- Configuring AD RMS content protection
Lab : Implementing an AD RMS infrastructure
- Installing and configuring AD RMS
- Configuring AD RMS templates
- Using AD RMS on clients
After completing this module, students will be able to:
- Describe AD RMS.
- Deploy and manage an AD RMS infrastructure.
- Configure AD RMS content protection.
Implementing AD DS synchronization with Microsoft Azure AD
This module describes how to plan and configure directory syncing between Microsoft Azure Active Directory (Azure AD) and on-premises AD DS. The modules describes various sync scenarios, such as Azure AD sync, AD FS and Azure AD, and Azure AD Connect.
Lessons
- Planning and preparing for directory synchronization
- Implementing directory synchronization by using Azure AD Connect
- Managing identities with directory synchronization
Lab : Configuring directory synchronization
- Preparing for directory synchronization
- Configuring directory synchronization
- Managing Active Directory users and groups and monitoring directory synchronization
After completing this module, students will be able to:
- Plan and prepare for directory synchronization.
- Implement directory synchronization by using Microsoft Azure Active Directory Connect (Azure AD Connect).
- Manage identities with directory synchronization.
Monitoring, managing, and recovering AD DS
This module describes how to monitor, manage, and maintain AD DS to help achieve high availability of AD DS.
Lessons
- Monitoring AD DS
- Managing the Active Directory database
- Active Directory backup and recovery options for AD DS and other identity and access solutions
Lab : Recovering objects in AD DS
- Backing up and restoring AD DS
- Recovering objects in AD DS
After completing this module, students will be able to:
- Monitor AD DS.
- Manage the Active Directory database.
- Describe the backup and recovery options for AD DS and other identity access solutions.
Attacks, breach detection, and Sysinternals tools
This module frames the course so that students are thinking about security in environments where the infrastructure’s basis is predominantly Microsoft products. The module begins with teaching students about the “assume breach” philosophy and getting them to understand the different types of attacks that can occur, including attack timelines and vectors. Additionally, it gets students thinking about key resources, how they respond when they detect an incident, and how an organization’s direct needs and legislative requirements dictate its security policy.
Lessons
- Understanding attacks
- Detecting security breaches
- Examining activity with the Sysinternals tools
Lab : Basic breach detection and incident response strategies
- Identifying attack types
- Exploring Sysinternals tools
After completing this module, students will be able to:
- Describe the types of attacks that can occur.
- Explain how to detect security breaches.
- Explain how to examine activity by using the Sysinternals suite of tools.
Protecting credentials and privileged access
This module covers user accounts and rights, computer and service accounts, credentials, Privileged Access Workstations, and the Local Administrator Password Solution. In this module, students will learn about configuring user rights and security options, protecting credentials by using Credential Guard, implementing Privileged Access Workstations, and managing and deploying Local Administrator Password Solution to manage local administrator account passwords.
Lessons
- Understanding user rights
- Computer and service accounts
- Protecting credentials
- Privileged Access Workstations and jump servers
- Local administrator password solution
Lab : Implementing user rights, security options, and group managed service accounts
- Configuring user rights and account-security options
- Delegating privileges
- Creating group Managed Service Accounts
- Locating problematic accounts
Lab : Configuring and deploying LAPs
- Installing and configuring LAPs
- Deploying and testing LAPs
After completing this module, students will be able to:
- Configure user rights.
- Implement computer and service accounts.
- Protect credentials.
- Describe how to configure Privileged Access Workstations and jump servers.
- Configure the Local Administrator Password Solution (LAPS).
Limiting administrator rights with Just Enough Administration
This module explains how to deploy and configure Just Enough Administration (JEA), which is an administrative technology that allows students to apply role-based access control (RBAC) principles through Windows PowerShell remote sessions.
Lessons
- Understanding JEA
- Verifying and deploying JEA
Lab : Limiting administrator privileges with JEA
- Creating a role-capability file
- Creating a session-configuration file
- Creating a JEA endpoint
- Connecting and testing a JEA endpoint
- Deploying a JEA configuration to another computer
After completing this module, students will be able to:
- Understand JEA.
- Verify and deploy JEA.
Privileged access management and administrative forests
This module explains the concepts of Enhanced Security Administrative Environment (ESAE) forests, Microsoft Identity Manager (MIM), and Just In Time (JIT) Administration, or Privileged Access Management (PAM).
Lessons
- ESAE forests
- Overview of Microsoft Identity Manager
- Overview of JIT administration and PAM
Lab : Limiting administrator privileges with PAM
- Layered approach to security
- Configuring trust relationships and shadow principals
- Requesting privileged access
- Managing PAM roles
After completing this module, students will be able to:
- Describe ESAE forests.
- Describe MIM.
- Understand JIT administration and PAM.
Mitigating malware and threats
This module explains how to use tools such as Windows Defender, Windows AppLocker, Microsoft Device Guard, Windows Defender Application Guard, and Windows Defender Exploit Guard.
Lessons
- Configuring and managing Windows Defender
- Restricting software
- Configuring and using the Device Guard feature
Lab : Securing applications with Windows Defender, AppLocker, and Device Guard Rules
- Configuring Windows Defender
- Configuring AppLocker
- Configuring Device Guard
After completing this module, students will be able to:
- Configure and manage Windows Defender.
- Use software restriction policies and AppLocker.
- Configure and use the Device Guard feature.
Analyzing activity with advanced auditing and log analytics
This module provides an overview of auditing, and then goes into detail about how to configure advanced auditing and Windows PowerShell auditing and logging.
Lessons
- Overview of auditing
- Advanced auditing
- Windows PowerShell auditing and logging
Lab : Configuring advanced auditing
- Configuring the auditing of file system access
- Auditing domain sign-ins
- Managing advanced audit policy configuration
- Windows PowerShell logging and auditing
After completing this module, students will be able to:
- Describe auditing.
- Understand advanced auditing.
- Configure Windows PowerShell auditing and logging.
Deploying and configuring Advanced Threat Analytics and Microsoft Operations Management Suite
This module explains the Microsoft Advanced Threat Analytics tool and the Microsoft Operations Management suite (OMS). It also explains how you can use them to monitor and analyse the security of a Windows Server deployment. You will also learn about Microsoft Azure Security Center, which allows you to manage and monitor the security configuration of workloads both on-premises and in the cloud.
Lessons
- Deploying and configuring ATA
- Deploying and configuring Microsoft Operations Management Suite
- Deploying and configuring Azure Security Center
Lab : Deploying ATA, Microsoft Operations Management Suite, and Azure Security Center
- Preparing and deploying ATA
- Preparing and deploying Microsoft Operations Management Suite
- Deploying and configuring Azure Security Center
After completing this module, students will be able to:
- Deploy and configure ATA.
- Deploy and configure Microsoft Operations Management Suite.
- Deploy and configure Azure Security Center.
Secure Virtualization Infrastructure
This module explains how to configure Guarded Fabric VMs, including the requirements for shielded and encryption-supported VMs.
Lessons
- Guarded fabric
- Shielded and encryption-supported virtual machines
Lab : Guarded fabric with Admin-trusted attestation and shielded VMs
- Deploying a guarded fabric with admin-trusted attestation
- Deploying a shielded VM
After completing this module, students will be able to:
- Configure the guarded fabric.
- Describe shielded and encryption-supported VMs.
Securing application development and server-workload infrastructure
This module describes the SCT, which is a free, downloadable set of tools that you can use to create and apply security settings. You will also learn about improving platform security by reducing the size and scope of application and compute resources by containerizing workloads.
Lessons
- Using SCT
- Understanding containers
Lab : Using SCT
- Configuring a security baseline for Windows Server 2016
- Deploying the security baseline for Windows Server 2016
Lab : Deploying and configuring containers
- Deploying and managing a Windows container
After completing this module, students will be able to:
- Install SCT, and create and deploy security baselines.
- Configure Windows and Hyper-V containers in Windows Server 2016.
Planning and protecting data
This module explains how to configure Encrypting File System (EFS) and BitLocker drive encryption to protect data at rest. You will also learn about extending protection into the cloud by using Azure Information Protection.
Lessons
- Planning and implementing encryption
- Planning and implementing BitLocker
- Protecting data by using Azure Information Protection
Lab : Protecting data by using encryption and BitLocker
- Encrypting and recovering access to encrypted files
- Using BitLocker to protect data
After completing this module, students will be able to:
- Plan and implement encryption.
- Plan and implement BitLocker.
- Plan and implement Azure Information Protection.
Optimizing and securing file services
This module explains how to optimize file services by configuring File Server Resource Manager (FSRM) and Distributed File System (DFS). Students also will learn how to manage access to shared files by configuring Dynamic Access Control (DAC).
Lessons
- File Server Resource Manager
- Implementing classification and file management tasks
- Dynamic Access Control
Lab : Quotas and file screening
- Configuring File Server Resource Manager quotas
- Configuring file screening and storage reports
Lab : Implementing Dynamic Access Control
- Preparing for implementing Dynamic Access Control
- Implementing Dynamic Access Control
- Validating and remediating Dynamic Access Control
After completing this module, students will be able to:
- Describe File Server Resource Manager.
- Implement classification and file management tasks.
- Implement Dynamic Access Control.
Securing network traffic with firewalls and encryption
This module explains how you can use Windows Firewall as an important part of an organization’s protection strategy. It explains the use of Internet Protocol security (IPsec) to encrypt network traffic and to establish security zones on your network. You will also learn about the Datacenter Firewall feature that you can use to help protect your on-premises virtual environments.
Lessons
- Understanding network-related security threats
- Understanding Windows Firewall with Advanced Security
- Configuring IPsec
- Datacenter Firewall
Lab : Configuring Windows Firewall with Advanced Security
- Creating and testing inbound rules
- Creating and testing outbound rules
- Creating and testing connection security rules
After completing this module, students will be able to:
- Describe network-related security threats and how to mitigate them.
- Configure Windows Firewall with Advanced Security.
- Configure IPsec.
- Describe Datacenter Firewall.
Securing network traffic
This module explores some of the Windows Server 2016 technologies that you can use to help mitigate network-security threats. It explains how you can configure DNSSEC to help protect network traffic, and use Microsoft Message Analyzer to monitor network traffic. The module also describes how to secure Server Message Block (SMB) traffic.
Lessons
- Configuring advanced DNS settings
- Examining network traffic with Message Analyzer
- Securing and analyzing SMB traffic
Lab : Securing DNS
- Configuring and testing DNSSEC
- Configuring DNS policies and RRL
Lab : Microsoft Message Analyzer and SMB encryption
- Installing and using the Message Analyzer
- Configuring and verifying SMB encryption on SMB shares
After completing this module, students will be able to:
- Configure advanced DNS settings.
- Use the Message Analyzer.
- Secure SMB traffic.
Certification Camps has developed a comprehensive training / delivery format which focuses on learning beyond the core content accessible to any Microsoft training provider. Our program incorporates interactive demonstrations with explanations which go beyond the content of the book. Additional content, videos, labs & demonstrations are provided to expand on advanced topics - providing additional insight and perspective. Certification Camps training is NOT your typical book & PowerPoint presentation found at any local training center.
As a Microsoft Certified Partner with Gold Learning Competency - we adhere to the strict guidelines, standards and requirements to use Microsoft's exclusive curriculum. More over - our standards go beyond the "minimum requirements" set forth by Microsoft Learning.
We leverage our partnership benefits of courseware customization to build end to end technology training solutions. Students gain practical skills which can be implemented immediately.
At most training centers - learning starts on the first day of class and ends on the last day. Our boot camp training program is designed to offer resources before, during and after.
During Camp - While attending camp - you will work hands on with an industry leading "real world experienced" Microsoft Certified Trainer.
CERTIFICATION CAMPS CAMPUS
CAMPUS - Certification Camps invested $150,000 into a complete training center construction build out. Larger classrooms, no sound transference between training rooms, new desk / executive leather chairs & great common areas.
CLASSROOM SERVERS - Students work on a dedicated Dell 8500 / 8700 with an Intel i7 (4th generation), minimum of 16GB memory (Most with 32 GB) and most with 512GB SSD drives.
CAMPUS INTERNET - The campus is connected with a 300Mbs Verizon Fios Business Connection which provides complete internet (including VPN) access for students.
COMMON AREA - Unlike any training facility ever - break room with Mame Arcade, high end "kitchen" with snacks, drinks (Starbucks Coffee, 100% juices, sodas, etc) and breathtaking terrace.
LODGING - We use the Marriott Fairfield Inn & Suites Lakewood Ranch. This "upgraded" hotel offers extremely comfortable beds, great breakfast and very fast (Verizon) internet access.
NEAR BY AMENITIES - Many shops, restaurants and grocery options are available within walking distance. Additionally - the hotel provided scheduled shuttle services. Restaurants like Bone Fish Grill, Ruby Tuesday's, Five Guys, Chipotle, Quiznos, Chili's and over 20 additional choices in the immediate area. All of these options are offered in a pedestrian walking village.
CERTIFICATION CAMPS DIFFERENCE
Certification Camps provides an in-depth hands on learning environment. Our instructors teach using demonstrations and explain concepts beyond the scope of the courseware. The best instructors are contracted from all across the US. These professionals are real world consultants who actually implement these technologies. Certification Camps knows our clients work in the "real world" and it only makes sense to have an instructor with the experience in the real world.
Facilities - Many of our competitors over-crowd classrooms by placing 2 to 3 students per desk and 20+ students per instructor. Often these companies "extend" the life of very old equipment with slow performance on the software used today. Our average class size is 8 students. Our facilities have the best equipment with the most comfortable, focused environment for learning.
Instructors - Our CEO, Chester Flake holds one of the rarest Microsoft Certifications - the Microsoft Certified Learning Consultant (MCLC) Certification. This certification reflects a commitment to make sure our instructors are also actively engaged in real world consulting projects. Students expect a professional who can answer questions and demonstrate the technology.
Face to Face Training - We believe the best way to interact and learn is face to face training. Many of our competitors which offer local training are simply providing students with headphones/mic to attend class with an instructor at a remote location.
Test Pass - We offer a free retake voucher (if needed) for each of the exams required for certification. Any training center offering a "100% pass guarantee" would have to use unethical practices or unlimited test vouchers (which is not likely or practical).
Distractions - Students often look for a "local" training center so they can be close to home and work. Boot camp requires a tremendous time commitment during the program. Long class hours combined with self study each evening. The goal of boot camp is to achieve certification in a fraction of the time. We strongly recommend students attend camp away from home and work in a focused, distraction free environment.
Boot Camp - Boot camp is an accelerated training focused on teaching technology and testing students on the official exams. Most training providers "added" boot camps to the existing standard training classes they offer. These training centers think a boot camp is just a regular class where you send the student home with a voucher on the last day. Certification Camps administers exams throughout the camp. Equally important - not every trainer can teach a boot camp and not all courseware is designed for boot camp format. Our trainers know the boot camp format and our courseware is designed for accelerated learning.
Florida - Certification Camps has one of the most scenic locations boasting some of the best weather in US. We believe students should have a comfortable and inviting atmosphere while attending these otherwise intense programs. We place our location, facilities and amenities up against that any competitor.