MCSA Windows Server 20122019-01-21T10:34:43+00:00


Microsoft logo

MCSA Windows Server 2012

Ensuring servers are fully optimised across a business is essential for smooth running of operations; for those businesses using Windows Server 2012, having employees certified in the MCSA qualification will make sure networks are effectively installed and maintained.

Study time: Full time – 2 weeks | Part time – 3 months
Vendor: Microsoft
Business support: Our customer success team measures and ensures engagement
Prerequisites: Ideally one year of experience implementing and administering Windows Server 2012
Assessment: Exam based – MCSA 70-410, 70-411 + 70-412
Ideal for: Computer support specialists, network systems administrator or computer systems administrator

 Human attack surface to reach 6 billion people by 2022.

CSO, Online

Content overview

410: Installing and configuring Windows Server 2012

  • Storage management
  • Shares and permissions
  • Storage and printing
  • Hyper v
  • Virtualisation
  • IPV4
  • CIDR
  • Ans IPV6
  • DHCP configuration
  • DNS configuration
  • Active directory
  • Installing and configuring: ad configuration
  • Installing and configuring: ad accounts and groups
  • Installing and configuring: group policies
  • Installing and configuring: security

411: Administering Windows Server 2012

  • Administering: Wds and monitoring
  • Function of the WDS role
  • PXE booting
  • Working with images
  • WDSUTIL and driver packages
  • Transmission strategies and unattended installations in Windows Server 2012
  • The use of performance monitor
  • Data collector sets
  • Reliability monitor
  • Event viewer
  • Creating custom views and subscriptions in Windows Server 2012
  • Administering: WSUS
  • Windows server update services in Windows Server 2012
  • How to configure the WSUS role
  • Automatic updates with group policies
  • Client side targeting
  • Deploying WSUS updates
  • Reviewing updates using WSUS reports
  • Using PowerShell to configure WSUS
  • Migrating WSUS 3.0 SP2 to Windows Server 2012 WSUS
  • Using MBSA to verify WSUS Updates
  • Administering: Dfs and Fsrm
  • Distributed file system – DFS
  • The components that comprise DFS
  • installation methods for DFS
  • DFS Namespaces
  • DFS schedules and staging
  • Remote differential compression
  • File server resource manager – FSRM – installation
  • FSRM quotas and FSRM File Screen policies
  • FSRM file classification
  • FSRM storage report management
  • FSRM file management tasks
  • Administering: Bitlocker, Efs and auditing
  • BitLocker
  • BitLocker installation options
  • BitLocker to encrypt volumes
  • Managing BitLocker from the command line
  • BitLocker network unlock
  • Configuring network unlock
  • BitLocker group policy implementations
  • BitLocker recovery options
  • EFS group policies managing EFS keys
  • EFS best practices
  • Audit policies
  • Audit policy options
  • Auditpol
  • Expression based auditing
  • Removable device policies will also be covered
  • DNS
  • Examines DNS configurations in Windows Server 2012 including
  • Zone transfers
  • Stub zones
  • AD integrated zones
  • Zone replication
  • Zone delegation
  • Zone transfers
  • Zone forwarders
  • DNS record types
  • Update types
  • Aging and scavenging
  • Round robin
  • NAT
  • Remote access
  • Remote access in the Enterprise
  • VPN settings
  • Remote dial in
  • Deploying remote access in the cloud
  • DirectAcess configurations
  • Examines configuring RADIUS
  • RADIUS server groups
  • Remote RADIUS
  • RADIUS proxy
  • RADIUS accounting
  • Examines the Network Policy Server
  • NPS configurations
  • Importing and exporting NPS server configurations
  • Network access protection
  • NAP configurations
  • Components of a network access solution
  • Service accounts
  • Examines service accounts
  • Service account management
  • Creating and deploying service accounts
  • Examines creating and installing, managing and removing managed service accounts
  • Examines creating, deploying, modifying and removing group managed service Accounts along with Kerberos delegation
  • WDC, FSMO + virtual DC cloning
  • Examines writable domain controllers
  • Domain based services
  • Universal group membership
  • Flexible single master operations
  • Schema administration
  • Schema configuration
  • Domain naming master
  • FSMO roles
  • FSMO role placement and seizing
  • Examines active directory partitions
  • Forest active directory partitions
  • Virtualised domain controller cloning
  • Configuring and deploying a virtualised domain controller clone
  • RODC and password policies
  • Examines password replication polices
  • Prepopulating account password
  • Configuring password policies
  • Local group policies on Windows 8
  • Local group policy precedence
  • Examines minimum password age settings
  • Automatic and manual password permission configurations
  • Account lockout policies
  • Password settings objects
  • Creating, editing and deploying a PSO
  • Backup and recovery
  • Examines methods to protect active directory
  • Backup Windows server
  • The AD
  • System state
  • Examines the wbadmin
  • Recovering AD
  • AD recycle bin
  • Active directory offline maintenance
  • Active directory services
  • Active directory mounting tool
  • Snapshots
  • Policies and templates
  • Examines the group policy management editor
  • Software installation policies
  • Configuring script policies
  • Folder redirection policies
  • Examines administrative templates
  • Migrating .ADM files to .ADMX format
  • Administrative template filtering
  • Creating and importing a security template
  • GPO manipulation and processing
  • Examines group policy objects
  • GPO inheritance and precedence
  • Enforcing GPO settings
  • GPO security
  • WMI filtering
  • GPO management delegation
  • Examines group processing
  • Deploying GPO loopback processing
  • Overriding GPO policy operations
  • Client-side extension behavior
  • Resultant set of policy
  • Gpresullt.exe
  • GPO backup and restore features
  • Creating migration tables
  • Powershell group policy modules
  • Item level targeting

412: Configuring advanced Windows Server 2012 services

  • NLB + clustering
  • Recognise how to configure NLB for a given scenario
  • Recognise how to configure an NLB cluster in a given scenario
  • Describe how to manage host traffic and operations in a given scenario
  • Create and configure an NLB cluster
  • VM clusters + DR
  • Identify the key considerations for using clustering in a virtual environment
  • Recognise how a highly available VM is created
  • Describe the migration options for virtual machines
  • Describe the options available for virtual machine management
  • Storage
  • Describe high availability features of iSCSI
  • Recognise how to install and configure iSCSI
  • Describe iSNS architecture components
  • Describe how BranchCache is used
  • Recognise the options available for optimising storage
  • File management and DAC
  • Describe the key considerations involved in implementing file classification
  • Recognise how to manage files using FCI
  • Sequence the steps to implement dynamic access control
  • Recognise how to configure dynamic access control in a given scenario
  • Recognise how to configure advanced DHCP features
  • Identify how to ensure DHCP high availability
  • Describe how to configure advanced DNS settings
  • Choose the most appropriate security feature in a given scenario
  • Forests and domains
  • Identify the difference between domains and forests
  • Identify the guidelines for raising functional levels
  • Match the trust relationship types to their descriptions
  • Describe advanced trust relationship configuration functions
  • Configure trust relationships
  • Site replication
  • Describe the characteristics of AD DS replication
  • Identify the advantages of using active directory sites in a given scenario
  • Sequence the steps in the AD site configuration process
  • Manage RODC password replication policy
  • PKI
  • Recognise the functions of PKI components
  • Distinguish between different types of CA installations
  • Recognise the processes involved in certificate validation and revocation
  • RMS + federation
  • Describe the functionality and components of AD RMS
  • Describe the options for configuring AD RMS
  • Identify the characteristics of AD RMS templates
  • Recognise RMS trust policy options
  • Create an AD RMS template

Our Promise

Contact Us

Trusted by…

Back to networks, operating systems and servers

Request a Callback

First Name*
Last name*
Company Email*
Company name*
Your role

Contact Information

Phone: 01273 907 919