MOC 6435A Designing a Windows Server 2008 Network Infrastructure Course Number: 6435A Course Length: 5 Days Certification Exam This course will help you prepare for the following Microsoft exam: Exam 70647: Pro: Windows Server 2008, Enterprise Administrator Course Overview This course will provide students with an understanding of how to design a Windows Server 2008 Network Infrastructure that meets business and technical requirements for network services. Prerequisites Before attending this course, students must have: Active Directory Technology Specialist level knowledge and concepts. Network Infrastructure Technology Specialist level knowledge and experience. Applications Infrastructure Technology Specialist level knowledge and experience. Windows Vista TS level of knowledge and experience. Intermediate understanding of networking concepts such as TCP/IP, name resolution, and connection methods. Intermediate understanding of security best practices for authentication and file permissions. Intermediate understanding of server and network hardware. Audience The primary audience for this course is IT professionals, including Windows 2000 Server and Windows Server 2003 enterprise administrators interested in becoming a Windows Server 2008 Enterprise Administrator who focuses on network solutions. Course Outline Course Introduction Course Introduction 11m Module 01: Overview of Network Infrastructure 1hr 4m
Overview of Network Infrastructure Overview of the Network Life Cycle The MSF Network Design Team Description of the MSF Network Design Team Components of a Network Infrastructure Design Guidelines for Designing a Network Infrastructure Strategies for Connectivity Within a Location Bandwidth Requirements Demo - AD Sizer Network Data Collection Tools Network Infrastructure Considerations for Virtualization Virtual Machines Connectivity Requirements Throughput Requirements Network Reliability Requirements MAC Addressing for Virtual Machines Components of a Change Management Design Monitoring Network Usage Guidelines for Designing a Change Management Structure Module 01 Review Module 02 - Designing Network Security Designing Network Security Reasons for Investing in Network Security Key Principles of Network Security Security Design and Implementation Components of Network Security Network Security Design Process Security Policies and Procedures Security Policies Demo - Designing a Network Security Plan Guidelines for Creating Policies and Procedures Roles for a Security Design Team Additional Roles for a Security Design Team Security Guidelines Reasons for Network Attacks Stages of Network Attacks Types of Network Attacks Common Network Vulnerabilities STRIDE Threat Model Overview Guidelines for Modeling Network Threats Countering Network Threats Risk Assessment Network Assets at Risk Calculating Risk Impact Microsoft Operations Framework (MOF) Risk Management Process Guidelines for Creating a Risk Management Plan Layers of the Defense-in-Depth Model Using Defense-in-Depth to Identify Risks Module 02 Review 1hr 48m
Module 03 - Designing IP Addressing Designing IP Addressing Considerations for Determining Hosts per Subnet 2 n -2 Example - hosts Considerations for Determining Number of Subnets 2 n -2 Example - Subnets Public Addressing vs. Private Addressing Guidelines for Designing IPv4 Addressing Classless IP addressing Options for Automatic IPv4 Address Assignment DHCP Communication Process Design Options for DHCP Server Methods for Improving DHCP Server Availability Securing DHCP Servers Guidelines for Designing DHCP Infrastructure Options for Determining a Lease Length Superscopes in DHCP Infrastructure Using Reservations in DHCP Infrastructure DHCP Class-Level Options DHCP User-Level Options Benefits of IPv6 IPv6 Address Types Global Unicast Unique / local IPv6 Unicast Address Structure - Review IPv6 Address Auto Configuration Options IPv6 Address Auto Configuration Process Guidelines for Designing an IPv6 Addressing Scheme What Is Dual Layer IPv4 and IPv6? What Is ISATAP? What Is 6to4? What Is Teredo? Process for Transitioning to IPv6 Guidelines for Designing an IPv6 Transition Module 03 Review 49m Module 04 - Designing Routing and Switching Requirements Designing Routing and Switching Requirements Connectivity Requirements Local Connections Security Requirements OSI Model - Reminder Types of Network Devices Reasons for Using Routers Types of Network Domains Benefits of Layer 3 Switches Virtual LANs Internet Connectivity Requirements Network Address Translation for Internet Connectivity Internet Security and Acceleration for Internet Connectivity 1hr 31m
ISA Server Strategies for Designing Firewalls Bastion Host Multi-homed Firewall Back to Back Firewall Strategies for Designing Extranet Determining Connection Methods Selecting a Routing Protocol OPSF Open Shortest Path First Using Packet Filters to Create Security Zones Selecting a Site-to-Site VPN Tunnel VPN with PPTP Tunnel Selecting a Site-to-Site VPN Tunnel VPN with L2TP / IPSec Selecting a Site-to-Site VPN Tunnel VPN with IP-Sec in Tunnel mode Guidelines for Planning Router Connectivity Demo - Routing Factors Affecting Network Performance Factors that affect Network Performance Tools for Evaluating Network Performance Network Upgrade Considerations Recommended Ethernet Utilization Guidelines Best Practices for Optimizing Network Throughput Calculating Actual Data Throughput QoS - Two methods DSCP Value / Bandwidth Throttling is Based on What Is Quality of Service? What Is a QOS Policy? Demo - QoS Module 04 Review Module 05 - Designing Security for Internal Networks Designing Security for Internal Networks Reasons for Implementing Windows Firewall Methods for Configuring Windows Firewall Benefits of IPSec Connection Security Rules Types of Connection Security Rules IPSec Authentication Deployment Methods for Connection Security Rules Demo - Security Determining the Authentication Method Co-existence with IPSec Policies Integration with Windows Firewall Rules Guidelines for Designing IPSec Implementation Demo - Connection Security Module 05 Review 52m Module 06 - Designing Name Resolution Designing Name Resolution Reasons for Name Resolution Considerations for Configuring Name Resolution 48m
Physical Location Considerations for a Name Resolution Design Host Requirements for a Name Resolution Design NetBIOS Resources How Clients Resolve Host Names Determining DNS Server Requirements Considerations for Placing DNS Servers DNS Server Roles Securing DNS Servers DNS Namespace Options Hosting Options for DNS Demo - DNS Guidelines for Designing DNS Namespaces Selecting Zone Types Selecting Zone Data Location Zone Security Considerations Reasons for Designing Secondary Zones Zone Replication Zone Transfers Zone Delegation Module 06 Review Module 07 - Designing Advanced Name Resolution Designing Advanced Name Resolution Disabling Recursion Deleting and Modifying Root Hints Optimizing DNS Server Response Optimizing DNS Server Functionality AD Integrated Zones DNS Troubleshooting Tools Guidelines for Designing DNS Availability Using Load Balancing for DNS Servers DNS Security Risks DNS Security Policies Options for NetBIOS Name Resolution Scenarios Requiring Multiple WINS Servers DNS GlobalNames Zone Demo - Adv DNS WINS Fault Tolerance Selecting a WINS Replication Type Selecting a Partner Replication Method Selecting a WINS Replication Topology Guidelines for Interoperability with DNS Module 07 Review 36m Module 08 - Designing Network Access Solutions Designing Network Access Solutions Business Requirements User Requirements Security Requirements Guidelines for Gathering Data for a Network Access Design 1hr 58m
Demo - NAS Authentication Methods Authentication protocol Encryption Methods Network Policies Network Policy Processing Demo - Configure NP Remote Access Monitoring Remote Access Methods VPN Tunnelling Protocols Hardware Considerations Strategies for Placing VPN Servers User Environnent Configuration What Is RADIUS? RADIUS Roles How RADIUS Works for Remote Access Connection Request Policies Demo - Configuring Connection Wireless Networking Standards Wireless Security Threats Strategies for Wireless Security How RADIUS Works for 802.1X Connections Hardware Considerations for Wireless Networks Module Review 08 Module 09 - Designing Network Access Protection Designing Network Access Protection What Is NAP? Scenarios for Implementing NAP Considerations for Designing NAP Network Components and Concepts for NAP HRA NAP Components NAP Architecture Overview Host Layer Protection with NAP NAP Process for Enforcement of Host Layer Protection NAP Process - continued NAP and Certificate Services NAP Enforcement Methods EAP for IEEE 802.1X Connections NAP Enforcement Methods IPSec Communications NAP Enforcement Methods Demo - NAP Network Boundaries IPsec Enforcement VPN Enforcement DHCP Enforcement System Health Agents and Validators Status Monitored by Windows Security Health Validator NAP Integration with Other Products Considerations for Antivirus Software 1hr 16m
Considerations for Windows Updates Considerations for Firewall Protection Considerations for Spyware Protection Unsupported Platforms Considerations for Designing DHCP Enforcement Considerations for Designing VPN Enforcement Considerations for Designing 802.1X Enforcement Considerations for Designing IPsec Enforcement Module 09 Review Module 10 - Designing Operating System Deployment and Maintenance Designing Operating System Deployment and Maintenance Reasons for Planning the Operating System Deployment Design Options for Deploying Operating Systems Deployment Methods Determining Storage Requirements Security Considerations for Operating System Deployment Tools for Operating System Deployment Enhanced Features in WDS Demo - OS Deployment Network Infrastructure Requirements to Support WDS Comparing Transport Server and Deployment Server Considerations for Upgrading from RIS to WDS Considerations for Designing WDS Features of WDS Images Image Capture Utilities Considerations for Maintaining Boot and Install Images Scenarios for Using Multicasting Types of Multicast Transmissions Considerations for Designing Multicast Transmissions Overview of Update Management Tools How WSUS Works WSUS Deployment Scenarios Guidelines for Planning a WSUS Infrastructure Module 10 Review 55m Module 11: Designing Files Services and DFS in Windows Server 2008 Designing Files Services and DFS in Windows Server 2008 Business Requirements for File Services Components of a File Services Design SMB Enhancements in Windows Server 2008 What Is Distributed File System? Components of DFS Comparing Failover Clustering and DFS for High Availability New DFS Features in Windows Server 2008 Interoperability with Previous Versions of DFS Guidelines for Designing DFS Namespace Availability Referral Options Target Priority Options Considerations for Configuring Referrals 1hr 3 min
Guidelines for Optimizing DFS Namespaces Best Practices for Deploying DFS Namespaces Demo - DFS Guidelines for Designing DFS Replication Sizing Folders Uses for FSRM FSRM Quotas FSRM File Screening Module 11 Review Module 12 - Designing High Availability in Windows Server 2008 Designing High Availability in Windows Server 2008 High Availability Requirements Service Level Agreements Components of a High Availability Design Infrastructure Requirements for High Availability High Availability Options in Windows Server 2008 Overview of Network Load Balancing Considerations for Storing Application Data for NLB Host Priority Affinity Selecting a Network Communication Method for NLB Demo - NLB Overview of Failover Clustering Failover Clustering Scenarios Shared Storage for Failover Clustering Guidelines for Designing Hardware for Failover Clustering Guidelines for Failover Clustering Capacity Planning Quorum Configuration for Failover Clustering Quorum Configurations Overview of Geographically Dispersed Clusters Data Replication for Geographically Dispersed Clusters Quorum Configuration for Geographically Dispersed Clusters Module 12 Review 47m Module 13 - Designing Print Services in Windows Server 2008 Designing Print Services in Windows Server 2008 Considerations for a Print Services Design Local Printing Direct IP Printing Server-based Printing Considerations for Selecting Printers Demo - Printing Printer Pools XPS-based Printing Interoperability of XPS and GDI-based Printing Print Management Console Printer Driver Store Internet Printing Protocol Failover Clustering for Print Services 58m
Recommendations for Simplifying User Access to Printers Recommendations for Simplifying Print Services Administration Monitoring Print Services Considerations for Branch Office Printing Module 13 Review Course Closure Total Duration: 15h 23m