Online And On-Site Computer Training Across The USA. CISSP CASP Security+ A+ MCDBA MCST MCSE CCNA CCNP CCVP CCSP PMP ITIL Web Design Certification Courses


Exam 70-647 Training: Windows Server Enterprise Administration - OnDemand Learning

YOUR TRUSTED, ON-SITE, ONLINE, AND HOME-STUDY TRAINING PARTNER
Have you told someone about RTEK 2000 today?

Online, Home and Office Study at Affordable Price for Exam 70-647 Training.
Product ID: RTK-MS-70-647

Windows Server Enterprise Administration

The Best Alternative to In-Class Training:

I bought it @RTEK 2000!

best online 70-647 training
  • Repeat as many times as you want;
  • Full Audio, Video, and Demonstration components;
  • Interactive Hands-on-lab Simulations;
  • Learn at your place (home or office;)
  • Access with any mobile device;
  • Schedule at your own pace and time: 24x7!

Shortcuts to:

  Save hundred of dollars with RTEK 2000!
Order Now! for only USD$435.00!
(Orig: $495.00). $60.00 instant discount!

Exam 70-647 Training: Windows Server Enterprise AdministrationSchedule our instructor led classroom training at your convenience and never miss another lecture or fall behind. You are in complete control. We have invited the Best Microsoft Trainers in the industry to help us develop the ultimate training and certification program which includes everything you will need to fully prepare for the Microsoft certification exams.

Exam 70-647 Training: Windows Server Enterprise Administration for certification examWindows Server Enterprise Administration teaches the student how to maintain the Windows Server 2008 R2 environment. Students will learn about such topics as planning for active directory, network infrastructure, active directory issues, active directory administration, deploying windows 2008 to the small and medium sized offices, using remote desktop services and application setup. Students will then learn about securing the network, how to support PKI, discuss various virtualization solutions, windows updates and how to protect the environment by making data secure yet still available to the user.

Package Includes:
  • 12 months online on-demand access featuring live instructor-led classroom sessions with full audio, video and demonstration components Network+ software
  • Printable courseware
  • Self-Assessment Module Review Quizzes
  • Mobile Access (all models)
  • Free 1 Year Upgrade Policy
  • Certificate of Completion

The Expert Trainers:
Exam 70-647 Trainer Kenneth Mayer, CCSI, MCT, CCNT, CCNP, CCDA

Ken started his career in computer technology in 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies across the United States and Western Europe. He has achieved the Certified Cisco Systems Instructor certification. The CCSI certification involved a two-day lab and observation event held on Cisco in Paris, France Facility. This gave Ken the accreditation to be able to deliver Cisco Authorized Courses as a CCSI. He has taught the full line of Cisco CCNA, CCDA, CCNP, CCDP and CCIP course curriculums, including Cisco's security appliances such as PIX and IDS. Ken is also a Microsoft Certified Trainer and a Certified Ethical Hacker (EC Council) certified trainer and consultant.



CompTIA A+ training CompTIA A+ Online training on-demand If you have any questions regarding Microsoft Training we encourage you contacting RTEK 2000!

Need an "On-Site" training at your facility?
Please fill out the form!
share on facebook  follow us on twitter  share with Linkedin users
70-647 Online Training Course Outline
click on chapter name!
Chapter 01 - Planning for Active Directory
  • Lesson 1: Logical Design
  • The Forest
  • How Will AD DS be Used?
  • Requirements
  • How Many Forests are Needed?
  • Forest Model
  • Domains
  • Requirements (Cont.)
  • The Domain Model
  • How Many Domains?
  • Upgrade or Create New Domains
  • The First Domain
  • Functional Levels
  • Domain Functional Level Features
  • Functional Levels (Cont.)
  • Forest Functional Level Features
  • Schema
  • Working with Trusts
  • Demo - Creating a New Forest
  • Demo - Creating a New Tree
  • Lesson 2: Physical Topology
  • Physical Networks
  • Review of Domain Controller Replication
  • Site Design Options
  • Site Replication Design
  • Site Links
  • Site Link Bridging
  • Site Replication Example
  • Domain Controller Placement
  • Printer Location Policies
  • Demo - Creating Sites and IP Subnets
  • Demo - Creating Site Link Bridges
  • Chapter 01 Review
Chapter 02 - Network Infrastructure
  • Lesson 1: DNS
  • DNS Considerations
  • DNS Record Types
  • Using DNS with Windows 2008 Server
  • The Stub Zone
  • DNS Options
  • Managing DNS
  • New DNS Features with Windows 2008 Server
  • Replacing WINS
  • IPv6 Support
  • Background Zone Loading
  • RODC
  • Designing the DNS Infrastructure
  • Choosing a Zone Type
  • Miscellaneous DNS Options
  • Demo - Exploring DNS
  • Demo - Creating GlobalNames Zone
  • Lesson 2: Planning IP Distribution
  • Introducing IPv6
  • Examples of IPv6 Abbreviation
  • Introducing IPv6 (Cont.)
  • The IPv6 Multicast
  • Advantages of IPv6
  • IPv4 to IPv6 Compatibility
  • Transitioning to IPv6
  • IPv6 Tools
  • Configure IPv6
  • Verifying IPv6
  • Troubleshooting
  • Designing an IPv6 Network
  • Demo - Configuring IPv6
  • Demo - Testing IPv6
  • Chapter 02 Review
Chapter 03 - Advanced Active Directory Issues
  • Lesson 1: Migration Strategies
  • Planning and Preparing to Move to Windows 2008 Server
  • Domain Upgrade
  • Preparing for the Upgrade
  • Domain Restructure
  • Upgrade then Restructure
  • Cross Forest Trust
  • Demo - Raising Domain Functional Level
  • Lesson 2: Working with Other Forests
  • One Solution: AD FS
  • What is AD FS?
  • AD FS Roles
  • AD FS Example
  • MS Identity Lifecycle Manager 2007 FP1
  • Working with UNIX
  • Imitating UNIX
  • Migration of UNIX NIS to Windows NIS
  • Imitating UNIX Continued
  • Working with NFS
  • Chapter 03 Review
Chapter 04 - Active Directory Administration
  • Lesson 1: Active Directory Administration
  • Delegation of Control
  • Delegating Active Directory
  • Data Management
  • Service Management
  • Scope of Delegated Administration
  • Administration Models
  • Using Groups for Delegation
  • Management Roles
  • Service Management (Cont.)
  • Data Roles
  • Types of Trusts
  • Delegation of Data Management
  • Starter GPOs
  • Group Policy Modeling
  • Auditing AD DS
  • AD Auditing
  • Looking at the Organizational Structure
  • Demo - Delegation of Control
  • Demo - AD Auditing
  • Lesson 2: Using Group Policies
  • Understanding the Group Policy Infrastructure
  • Guidelines for Planning GPOs
  • GPOs and Active Directory
  • Understanding Domains
  • Domain Services Store
  • Controlling Hardware Installation with GPOs
  • Which GPO Settings Control Hardware Installation?
  • AAA
  • Stronger Authentication
  • Fine-Grained Password Policies
  • How to Use PSOs
  • Demo - Creating PSO
  • Chapter 04 Review
Chapter 05 - Deploying Windows 2008 to the Small/Medium Office
  • Lesson 1: Small/Medium Office
  • Services Needed in the Small/Medium Office
  • The DSMGMT Service
  • Components Often Needed in the ROBO
  • Optional Components Used for the ROBO
  • More on the Server Core
  • Should You Install a Domain Controller?
  • Other DC Options
  • Services to Consider at the ROBO
  • Communication Options
  • WAN Connections
  • Securing Traffic
  • Tunnel Diagram Example
  • Lesson 2: Small/Medium Server Security
  • Overview of Security
  • Security Training
  • Security at the Branch
  • Server Hardening
  • Secure Options for the ROBO
  • RODC
  • RODC Password Replication Policy
  • RODC Operation
  • Securing Data
  • EFS
  • BitLocker
  • NAP
  • Demo - Creating an RODC
  • Demo - Using SCW
  • Chapter 05 Review
Chapter 06 - Using Remote Desktop Services and Application Setup
  • Lesson 1: Planning for Remote Desktop Services
  • Planning and Deploying Remote Desktop Services
  • RDS Components
  • Demo - Installing Remote Desktop Services
  • Lesson 2: License Server
  • Licensing
  • Types of Licenses
  • Maintaining the License Server
  • License Server Deployment
  • Lesson 3: Deploying Applications
  • RDS Web Access
  • RemoteApp
  • RemoteApp Deployment
  • RDS Load Balancing
  • Planning RDS Gateway Servers
  • RDS Gateway Server Connection
  • Using GPO to Deploy Applications
  • Publishing Software
  • Assigning Software with GPOs
  • Installing Software by GPO
  • Deploying Software with SC Essentials
  • SCCM 2007
  • SCCM 2007 Architecture
  • SCCM 2007 Client
  • SCCM 2007 Application Deployment
  • Demo - Accessing RDS Web Access
  • Chapter 06 Review
Chapter 07 - Securing the Network
  • Lesson 1: Designing a Secure Perimeter
  • Designing the Perimeter
  • The Border Network
  • Perimeter Network
  • Internal Network
  • Perimeter Firewall
  • Firewall Options
  • ISA Server
  • ISA Server Deployment
  • What Else Can Be Found in the Perimeter?
  • Web Servers in the Perimeter
  • Setting Up Remote Access
  • VPN Tunneling Protocols
  • PPTP
  • L2TP
  • SSTP
  • Authenticating Connections
  • Securing VPN Servers
  • Authentication using RADIUS
  • Microsoft RADIUS
  • RADIUS Security
  • RADIUS Proxy Options
  • Lesson 2: Introducing NAP
  • Network Access Protection
  • Where Do You Find NAP?
  • NAP Considerations
  • NAP Provides Another Layer of Security With IPSec
  • Disadvantages of NAP
  • NAP IPSec Enforcement
  • More NAP Component Needs
  • NAP VPN Enforcement
  • 802.1X NAP Enforcement
  • 802.1X Enforcement
  • NAP and DHCP
  • DHCP/NAP Considerations
  • NAP Illustrated
  • Lesson 3: Domain and Server Isolation
  • Isolation
  • Domain Isolation
  • Comparing Server and Domain Isolation
  • Chapter 07 Review
Chapter 08 - Supporting PKI
  • Lesson 1: What is PKI?
  • Concepts
  • Applications Use of PKI
  • Certificate Use Illustration
  • Who is Issued a Certificate
  • PKI Security
  • Security Policies
  • Business Requirements
  • External Needs
  • AD Needs
  • Lesson 2: The CA Hierarchy
  • The CA Infrastructure
  • CA Hierarchy Illustration
  • When to Use an Internal CA
  • When to Use an External CA
  • MS ADCS
  • Enterprise vs. Standalone
  • How Many CAs are Needed
  • Demo - Installing CA
  • Lesson 3: Managing Certificates
  • Enrollment Methods
  • Enrollment Policies
  • Improving Control over Certificate Issuance
  • Automatic vs. Manual Certificate Approval
  • How to Do Enrollment
  • Certificate Renewal Strategies
  • Certificate Revocation Policy
  • Issues with CRLs
  • Publication Points
  • Demo - Working with Certificates
  • Chapter 08 Review
Chapter 09 - Virtualization Solutions
  • Lesson 1: Using Virtualization
  • Benefits to Virtualization
  • Virtualization Solutions
  • Choosing What to Virtualize
  • Managing Virtualized Servers
  • What Can Be Virtualized
  • Migrating P2V
  • The Power of SCVMM
  • SCVMM Components
  • SCVMM Illustrated
  • Managing VMs at the Branch Office
  • Demo - Working With Hyper-V
  • Demo - Creating a Virtual Windows 2008 Server
  • Lesson 2: Planning Virtualization for Applications
  • Microsoft SoftGrid
  • When Should You Use SoftGrid
  • Designing Application Virtualization
  • Branch Office Deployments
  • Chapter 09 Review
Chapter 10 - Windows Updates
  • Lesson 1: WSUS
  • The Windows Server Update Services Infrastructure
  • Consider WSUS
  • Managing WSUS
  • WSUS Design
  • WSUS Administration
  • Update Deployment
  • WSUS Hierarchy Illustrated
  • Policies for Updates
  • Planning Automatic Approvals
  • SC Essentials
  • SCCM 2007
  • Demo - Installing WSUS
  • Demo - Exploring WSUS
  • Lesson 2: Software Update Compliance
  • MBSA
  • WSUS Reports
  • SCCM 2007 Compliance and Reporting
  • SCW
  • SCWCMD
  • Best Practices of Role Based Security Policies
  • Demo - Using MBSA
  • Chapter 10 Review
Chapter 11 - Making Data Secure and Available
  • Lesson 1: Sharing and Collaborating Your Data
  • DFS
  • Advanced DFS
  • DFS Replication, Settings, and Features
  • DFS Design Checklist
  • Collaboration
  • WSS Feature Set
  • WSS Deployment
  • MOSS 2007
  • Demo - Installing WSS
  • Demo - Exploring WSS
  • Lesson 2: Protecting Data at Rest
  • BitLocker
  • BitLocker Authentication
  • BitLocker Design Thoughts
  • EFS
  • EFS Best Practices
  • AD RMS
  • Using RMS
  • RMS Policy Elements
  • RMS Illustrated
  • Demo - Using EFS
  • Lesson 3: System Recoverability and Availability
  • AD DS Backup
  • AD DS Backup Utilities
  • AD DS Recovery
  • Authoritative Restore
  • Authoritative Restore Illustrated
  • AD DS Service
  • Working with FSMOs
  • Scalability
  • NLB
  • NLB Illustrated
  • Failover Clustering
  • Cluster Prerequisites
  • Demo - AD DS Backup
  • Chapter 11 Review
  • Course Closure

Course Features:

  • Video Lectures and Expert Instruction
    Practical knowledge is essential for success in a real world environment and we have chosen our instructors with this in mind - many of our instructors are business owners and have been employed in their respective fields for decades!
  • PowerPoint
    Utilizing PowerPoint presentations enhances the delivery by displaying a variety of visual information to the user. This type of representation allows the user to better interpret the material through charts, definitions, graphs, and more...
  • Easy Navigation
    Move forward, back, and repeat entire topics or just a section. A progress bar illuminates as you advance through exercises.
  • Printable Study Guides
    Printable study guides for the entire course are available. This allows all material to be viewed, reviewed, and printed for viewing at a later date.
  • Review Exercises
    Each section has a review quiz to aid in the learning process by validating the comprehension of the material covered before moving on to a new section.
  • Resume Option
    All courses are resumed to where you left off last session allowing you to learn when it is convenient for you without the hassle of remembering where you where.
  • Full Motion Video
    All courses feature full-motion videos of instructors teaching the information as if they are speaking directly to you. Our unique delivery simulates a one-on-one classroom environment creating a more personal lesson and learning experience.
  • Certificate of Completion
    Upon completion of your training course, you will receive a Certificate of completion displaying your full name, course completed as well as the date of completion. You can print this out or save it digitally to showcase your accomplishment.
  • Live, Hands-On Demonstrations
    Demonstrations are a way for the instructor to show and tell the user how to perform a task by actually doing it on screen in front of them.
  • Mobile Access: All our training courses are now available across all mobile devices.