Online And On-Site IT Certification Training Across The USA. CISM CISSP CASP Security+ A+ MCDBA MCST MCSE CCNA CCNP CCVP CCSP PMP ITIL Web Design Certification Courses

Exam 70-640 Training: Configuring Windows Server 2008 Active Directory - OnDemand Learning
+ Optional REAL Practice Lab and Exam Practice

Have you told someone about RTEK 2000 today?

Online, Home and Office Study at Affordable Price for Exam 70-640 Training.
Product ID: RTK-MS-70-640

Configuring Windows Server 2008 Active Directory

The Best Alternative to In-Class Training:

I bought it @RTEK 200!
best online 70-246 training
  • The instructor is dedicated to you! Repeat as many times as you want;
  • Full Audio, Video, and Demonstration components;
  • Interactive Hands-on-lab Simulations;
  • Mobile Access via any mobile device!
  • Learn at your place
  • Schedule at your own pace and time!

Shortcuts to:

  Save hundred of dollars with RTEK 2000!
Order Now! for only USD$435.00! (Orig: $495.00)

Exam 70-640 Training: Configuring Windows Server 2008 Active DirectoryThe MCTS credential enables professionals to target specific technologies and distinguish themselves by demonstrating in-depth knowledge and expertise in their subject area technologies.

Exam 70-640 Training: Configuring Windows Server 2008 Active Directory for certification examThis course will prepare the student for Exam 70-640 TS: Windows Server 2008 Active Directory, Configuring. Topics covered include configuring and maintaining Active Directory infrastructure, server roles, objects, environment, and Certificate Services.

Package Includes:
  • 12 months online on-demand access featuring live instructor-led classroom sessions with full audio, video and demonstration components
  • Printable courseware
  • Self-Assessment Module Review Quizzes
  • Mobile Access (all devices)
  • Free 1 Year Upgrade Policy
  • Certificate of Completion

  • RECOMMENDED: Optional REAL Practice Lab in virtual environment and Transcender Exam Practice that complement your training and enhances knowledge making you comfortable to take exam

The Expert Trainers:
Exam 70-640 Trainer Kenneth Mayer, CCSI, MCT, CCNT, CCNP, CCDA

Ken started his career in computer technology in 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies across the United States and Western Europe. He has achieved the Certified Cisco Systems Instructor certification. The CCSI certification involved a two-day lab and observation event held on Cisco in Paris, France Facility. This gave Ken the accreditation to be able to deliver Cisco Authorized Courses as a CCSI. He has taught the full line of Cisco CCNA, CCDA, CCNP, CCDP and CCIP course curriculums, including Cisco's security appliances such as PIX and IDS. Ken is also a Microsoft Certified Trainer and a Certified Ethical Hacker (EC Council) certified trainer and consultant.

CompTIA A+ training CompTIA A+ Online training on-demand If you have any questions regarding Microsoft Training we encourage you contacting RTEK 2000!

Need an "On-Site" training at your facility?
Please fill out the form!
share on facebook  follow us on twitter  share with Linkedin users

70-640 Online Training Course Outline
click on chapter name!
Chapter 01 - Installing the Active Directory Role
  • Lesson 1: What is IDA?
  • What is Active Directory Identity and Access (IDA)
  • Five Components of the IDA Platform
  • What Windows 2008 Server Offers Beyond the IDA
  • Lesson 2: How to Install the AD DS Role
  • What are the Different Components?
  • Preparation Checklist for Creating a Windows Server 2008 Forest
  • How to Add the Directory Service Role
  • Demo - Creating a Windows Server 2008 Forest
  • Lesson 3: The New Windows 2008 Server Core
  • Understanding Server Core
  • Lesson 4: Installing AD DS Server Core
  • Installing Server Core
  • Demo - Installing a Server Core Domain Controller
  • Chapter 01 Review
Chapter 02 - Working With Active Directory Objects
  • Lesson 1: Working with the MMC
  • Understanding the MMC
  • How to Use the Microsoft Management Console (MMC)
  • Customize the MMC with Snap-ins
  • Learn How to Use the Alternate Login Credentials
  • Demo - Custom MMC
  • Lesson 2: Working with Objects in Active Directory
  • Creating an OU
  • Creating a User Object
  • Creating a Group Object
  • Lesson 3: How to Search Through Active Directory
  • How to Find Objects in Active Directory
  • Introducing LDAP
  • Demo - Using Active Directory
  • Lesson 4: Securing and Delegating AD Objects
  • Understanding Delegation
  • What are User Rights?
  • Using the Delegation of Control Wizard
  • Demo - Delegation
  • Lesson 5: Adding Computer Accounts to AD
  • Understanding Workgroups, Domains, and Trusts
  • Identifying Requirements for Joining a Computer to the Domain
  • Offline Domain Join
  • Lesson 6: Organizing AD with Container Objects
  • Understanding Containers
  • Creating OUs for Computers
  • Adding a Computer to the Domain
  • Restricting the Ability of Users to Create Computers
  • Demo - Joining the Domain
  • Lesson 7: Working With Computer Objects and Accounts
  • Configuring Computer Properties
  • Moving a Computer
  • Managing a Computer with the AD Users and Computers
  • Recognizing a Computer Account Problem
  • How to Reset a Computer Account
  • How to Rename a Computer
  • Ways to Disable/Enable Computer Accounts
  • How to Delete a Computer Account
  • Recycling the Computer Account
  • Demo - Recycling the Computer Account
  • Lesson 8: Automating Computer Account Creation
  • Importing Computers with CSVDE
  • Importing Computers with LDIFDE
  • Creating Computers with DSadd
  • Creating Computers with Netdom
  • Windows PowerShell
  • Creating Computers with VBScript
  • Demo - Automating Computer Creation
  • Chapter 02 Review
Chapter 03 - Understanding GPOs
  • Lesson 1: Using Group Policy
  • Review of Group Policy
  • Lesson 2: What Are Group Policy Objects
  • Group Policy Objects
  • Scope
  • Policy Settings
  • Filtering Administrative Template Policy Settings
  • Demo - Group Policy
  • Lesson 3: Restricted Group Policies
  • Understanding Restricted Groups Policies
  • Demo - Restricted Groups
  • Lesson 4: Analyzing Security Settings
  • How to Configure the Local Security Policy
  • Using Security Templates and Deploying the GPOs
  • Analyzing the Security Configuration of a Computer
  • Creating Security Templates from the Results
  • Lesson 5: Using The Security Configuration Wizard
  • The Security Configuration Wizard
  • Security Policy
  • Demo - SCW
  • Lesson 6: Deploying Software with Group Policy
  • Understanding GP Software Installation
  • Windows Installer Programs
  • Preparing an SDP
  • Creating a Software Deployment GPO
  • Managing the Scope of Software Deployment GPO
  • Demo - Software Deployment
  • Lesson 7: Understanding Group Policy Scope
  • GPO Links
  • What is Inheritance and Precedence?
  • Security Filtering to Modify GPO Scope
  • WMI Filters
  • Enabling or Disabling GPOs and GPO Nodes
  • Lesson 8: How Group Policy Settings are Processed
  • Group Policy Processing
  • Group Policy Options
  • Demo - Group Policy Scope
  • Lesson 9: Verifying Group Policy Settings
  • Resultant Set of Policy
  • GP Results Wizard
  • GPresult.exe
  • Group Policy Modeling Wizard
  • Demo - Verifying Group Policy
  • Lesson 10: Enabling Auditing
  • Audit Policy
  • How to Audit Access to Files and Folders
  • Global Access Auditing
  • “Reason for Access” Reporting
  • Enabling the Audit Policy
  • Demo - Auditing
  • Chapter 03 Review
Chapter 04 - Managing Users and Groups with AD
  • Lesson 1: Automating User Account Creation
  • Automating the Creation of User Accounts with Templates
  • Introduction to the Active Directory Command-Line Tools
  • Demo - Automating User Accounts
  • Lesson 2: Working with User Attributes
  • How to Manage User Attributes
  • Understanding the Name and Other User Attributes
  • Account Properties
  • Managing User Attributes without the GUI
  • Lesson 3: User Account Administrative Tasks
  • Administrative Tasks
  • Protected Admin
  • Demo - Supporting User Accounts
  • Lesson 4: Using PowerShell to Create User Accounts
  • What is Windows PowerShell?
  • Key Elements of PowerShell
  • User Creation with PowerShell
  • PowerShell Scripting
  • Demo - Creating Users with PowerShell
  • Lesson 5: Group Creation and Management
  • Managing Your Enterprise with Groups
  • Defining Group Naming Conventions
  • Lesson 6: The Basics of Groups
  • Understanding Groups
  • What’s a Group Scope?
  • Allowed Group Scope Conversions
  • Managing Group Membership
  • Using Groups for Permissions
  • AGDLP and AGGUDLP Illustrated
  • Local vs. Domain
  • Demo - Managing Groups
  • Lesson 7: Best Practices for Using AD Groups
  • Best Practices for Group Attributes
  • Default Windows Groups
  • Lesson 8: Automating Group Creation
  • Creating and Managing Groups
  • Managing Group Membership with Windows PowerShell and VBScript
  • Demo - Automating Creation of Groups
  • Lesson 9: Advanced Group Options
  • Protecting Groups from Accidental Deletion
  • Delegating the Management of Group Membership
  • What are Shadow Groups?
  • Special Groups
  • Demo - Administering Groups
  • Chapter 04 Review
Chapter 05 - Working With Domain Controllers
  • Lesson 1: Installation Options
  • Creating a New Forest
  • Creating a New Tree
  • Migrating a Domain
  • Deleting a Domain
  • Lesson 2: How to Install a Domain Controller
  • Installing a DC with the Windows GUI
  • Using Unattended Installation and Answer Files
  • Installation Options
  • Lesson 3: Introducing the Operations Masters
  • Single Master Operations
  • Forest Wide Roles
  • Domain-Wide Roles
  • Lesson 4: Designing Where to Deploy the Operation Masters
  • Where to Place These Operations Masters
  • Identifying the Operations Masters
  • Transferring Operations Master Roles
  • Seizing Operations Masters
  • How to Seize or Transfer Operation Master Roles
  • Extending the Schema
  • Demo - FSMO
  • Lesson 5: SYSVOL Replication with DFS
  • How to Raise the Domain Functional Level
  • Understanding the Migration Steps
  • Chapter 05 Review
Chapter 06 - Adding DNS
  • Lesson 1: DNS Basics
  • Overview
  • DNS and IPv6
  • Peer Name Resolution Protocol
  • Types of DNS Servers
  • Dynamic DNS
  • Secure Dynamic DNS (SDDNS)
  • The Split Brain Option
  • Lesson 2: DNS Definitions and Terms
  • Understanding DNS
  • DNS Terms
  • Types of Records
  • Windows Server DNS Features
  • Demo - DNS
  • Lesson 3: Setting up DNS for the Enterprise
  • Configuring DNS
  • Considerations for Security
  • Working with DNS Server Settings
  • Application Directory Partitions
  • Administering DNS Servers
  • Demo - Global Names
  • Chapter 06 Review
Chapter 07 - Securing the Authentication Process
  • Lesson 1: Password Security Policies
  • Understanding Password Policies
  • Understanding Password Settings Object
  • Demo - Passwords
  • Lesson 2: Introducing the Read-Only Domain Controller
  • Why RODC
  • RODC Options
  • Lesson 3: Installing the RODC
  • Deploying an RODC
  • Password Replication Policy
  • Lesson 4: Auditing Authentication Events
  • Account Logon Events
  • Configuring Authentication-Related Audit Polices
  • Demo - Account Logging
  • Chapter 07 Review
Chapter 08 - Monitoring and Supporting AD
  • Lesson 1: Preparing for Recovery
  • Important Concepts
  • Twelve Categories of AD DS Administration
  • Lesson 2: Active Directory Tools
  • Tools
  • Performing Online/Offline Maintenance
  • Offline Maintenance
  • Built-in Directory Protection Measures
  • Backups
  • Proactive Restores
  • Restarting in DSRM
  • Identifying the Backup Set
  • Other Options
  • Backup/Restore GPOs
  • Using the AD Recycle Bin
  • Lesson 3: Monitoring Active Directory Performance
  • Managing System Resources
  • Task Manager
  • Event Viewer
  • WRPM
  • WSRM
  • Server Manager
  • PowerShell
  • Baselines
  • Demo - Performance Monitor
  • Chapter 08 Review
Chapter 09 - Planning Active Directory Deployment
  • Lesson 1: What Are Sites?
  • Understanding What a Site Is
  • Site Traffic
  • Planning Sites
  • Controlling Replication
  • Site Links
  • Bridgehead Server
  • Replication Scheduling
  • Replication Protocols
  • Forcing Intersite Replication
  • Summarizing Site Planning
  • Lesson 2: Deciding on Site Boundaries
  • Defining Sites
  • Managing Domain Controllers in Sites
  • SRVs
  • Site Coverage
  • Demo - Sites and Subnets
  • Lesson 3: Working with Global Catalog Placement with AD Partitions
  • Reviewing AD Partitions
  • Understanding the Global Catalog
  • Placing GC Servers
  • What’s Found in the Global Catalog
  • Universal Group Membership Caching (UGMC)
  • Partial Attribute Set
  • Promoting a Domain Controller to a Global Catalog
  • Lesson 4: Controlling Replication Between Sites
  • Understanding AD Replication
  • Replication
  • Intersite Replication
  • Monitoring Replication
  • Lesson 5: Managing the Global Catalog
  • Configuring a Global Catalog
  • Understanding Application Directory Partitions
  • Lesson 6: Configuring AD Trust Relationships
  • Defining the Forest Infrastructure
  • Moving Objects
  • Migration Issues
  • Trust Relationships
  • Securing Trust Relationships
  • Demo - Trusts
  • Lesson 7: Choosing the Domain and Forest Functional Levels
  • Functional Levels
  • Domain Functional Levels
  • Forest Functional Levels
  • Chapter 09 Review
Chapter 10 - IDA Solutions
  • Lesson 1: Understanding AD FS
  • Understanding AD FS
  • B2B
  • Support of AD FS
  • The AD FS Process
  • Working with FS Designs
  • AD FS Components
  • Lesson 2: Installing AD FS
  • Installing AD FS
  • Lesson 3: Configuring and Using AD FS
  • Finalizing the Configuration of AD FS
  • Using and Managing AD FS
  • Lesson 4: Understanding AD RMS
  • Understanding AD RMS
  • New AD RMS Features
  • Basic Concepts
  • AD RMS Installation Scenarios
  • Preparing AD RMS Installation Prerequisites
  • Lesson 5: Installing AD RMS
  • AD RMS Considerations
  • Understanding AD RMS Certificates
  • Lesson 6: Configuring and Using AD RMS
  • Configuring AD RMS
  • Lesson 7: Understanding AD LDS
  • What is AD LDS?
  • Comparing LDS with DS
  • AD LDS Scenarios
  • Lesson 8: Installing AD LDS
  • Installing AD LDS
  • Demo - Installing AD LDS
  • Lesson 9: Configuring and Using AD LDS
  • Working with AD LDS Tools
  • Creating an LDS Instance
  • Other Options
  • Lesson 10: Security Review
  • Review
  • Chapter 10 Review
Chapter 11 - Active Directory Certificate Services
  • Lesson 1: Understanding AD CS
  • Understanding AD CS
  • CA Options
  • Creating the CA Hierarchy
  • Some Best Practices
  • Additional Planning Requirements
  • Certificate Enrollment Types
  • Network Device Enrollment Service (NDES)
  • AutoEnrollment
  • Configuring AutoEnrollment
  • Web Enrollment
  • Authentication Mechanism Assurance
  • Enrollment Agents
  • Deploying Multi-Forest Certificates
  • X.509 Certificate Mapping
  • AD CS Illustration
  • Lesson 2: Installing AD CS
  • Installing AD CS
  • Supported Deployments
  • Standalone Root & Subordinate
  • Enterprise Root & Subordinate
  • Lesson 3: Configuring and Using AD CS
  • Finalizing the Configuration of an Issuing CA
  • More about the CRL
  • Considerations for the Use and Management of AD CS
  • More on Certificate Templates
  • Types of Templates
  • Chapter 11 Review
  • Course Closure

Course Features:

  • Video Lectures and Expert Instruction
    Practical knowledge is essential for success in a real world environment and we have chosen our instructors with this in mind - many of our instructors are business owners and have been employed in their respective fields for decades!
  • PowerPoint
    Utilizing PowerPoint presentations enhances the delivery by displaying a variety of visual information to the user. This type of representation allows the user to better interpret the material through charts, definitions, graphs, and more...
  • Easy Navigation
    Move forward, back, and repeat entire topics or just a section. A progress bar illuminates as you advance through exercises.
  • Printable Study Guides
    Printable study guides for the entire course are available. This allows all material to be viewed, reviewed, and printed for viewing at a later date.
  • Review Exercises
    Each section has a review quiz to aid in the learning process by validating the comprehension of the material covered before moving on to a new section.
  • Resume Option
    All courses are resumed to where you left off last session allowing you to learn when it is convenient for you without the hassle of remembering where you where.
  • Full Motion Video
    All courses feature full-motion videos of instructors teaching the information as if they are speaking directly to you. Our unique delivery simulates a one-on-one classroom environment creating a more personal lesson and learning experience.
  • Certificate of Completion
    Upon completion of your training course, you will receive a Certificate of completion displaying your full name, course completed as well as the date of completion. You can print this out or save it digitally to showcase your accomplishment.
  • Live, Hands-On Demonstrations
    Demonstrations are a way for the instructor to show and tell the user how to perform a task by actually doing it on screen in front of them.
  • Mobile Access: All our training courses are now available across all mobile devices.