MCSA Windows Server 2012
Overview

MCSA Windows Server 2012
Ensuring servers are fully optimised across a business is essential for smooth running of operations; for those businesses using Windows Server 2012, having employees certified in the MCSA qualification will make sure networks are effectively installed and maintained.
Study time: Full time – 2 weeks | Part time – 3 months
Vendor: Microsoft
Business support: Our customer success team measures and ensures engagement
Prerequisites: Ideally one year of experience implementing and administering Windows Server 2012
Assessment: Exam based – MCSA 70-410, 70-411 + 70-412
Ideal for: Computer support specialists, network systems administrator or computer systems administrator
“ Human attack surface to reach 6 billion people by 2022.“
Content overview
410: Installing and configuring Windows Server 2012
- Storage management
- Shares and permissions
- Storage and printing
- Hyper v
- Virtualisation
- IPV4
- CIDR
- Ans IPV6
- DHCP configuration
- DNS configuration
- Active directory
- Installing and configuring: ad configuration
- Installing and configuring: ad accounts and groups
- Installing and configuring: group policies
- Installing and configuring: security
411: Administering Windows Server 2012
- Administering: Wds and monitoring
- Function of the WDS role
- PXE booting
- Working with images
- WDSUTIL and driver packages
- Transmission strategies and unattended installations in Windows Server 2012
- The use of performance monitor
- Data collector sets
- Reliability monitor
- Event viewer
- Creating custom views and subscriptions in Windows Server 2012
- Administering: WSUS
- Windows server update services in Windows Server 2012
- How to configure the WSUS role
- Automatic updates with group policies
- Client side targeting
- Deploying WSUS updates
- Reviewing updates using WSUS reports
- Using PowerShell to configure WSUS
- Migrating WSUS 3.0 SP2 to Windows Server 2012 WSUS
- Using MBSA to verify WSUS Updates
- Administering: Dfs and Fsrm
- Distributed file system – DFS
- The components that comprise DFS
- installation methods for DFS
- DFS Namespaces
- DFS schedules and staging
- Remote differential compression
- File server resource manager – FSRM – installation
- FSRM quotas and FSRM File Screen policies
- FSRM file classification
- FSRM storage report management
- FSRM file management tasks
- Administering: Bitlocker, Efs and auditing
- BitLocker
- BitLocker installation options
- BitLocker to encrypt volumes
- Managing BitLocker from the command line
- BitLocker network unlock
- Configuring network unlock
- BitLocker group policy implementations
- BitLocker recovery options
- EFS group policies managing EFS keys
- EFS best practices
- Audit policies
- Audit policy options
- Auditpol
- Expression based auditing
- Removable device policies will also be covered
- DNS
- Examines DNS configurations in Windows Server 2012 including
- Zone transfers
- Stub zones
- AD integrated zones
- Zone replication
- Zone delegation
- Zone transfers
- Zone forwarders
- DNS record types
- Update types
- Aging and scavenging
- Round robin
- DNSSEC
- NAT
- Remote access
- Remote access in the Enterprise
- VPN settings
- Remote dial in
- Deploying remote access in the cloud
- DirectAcess configurations
- RADIUS, NPS and NAP
- Examines configuring RADIUS
- RADIUS server groups
- Remote RADIUS
- RADIUS proxy
- RADIUS accounting
- Examines the Network Policy Server
- NPS configurations
- Importing and exporting NPS server configurations
- Network access protection
- NAP configurations
- Components of a network access solution
- Service accounts
- Examines service accounts
- Service account management
- Creating and deploying service accounts
- Examines creating and installing, managing and removing managed service accounts
- Examines creating, deploying, modifying and removing group managed service Accounts along with Kerberos delegation
- WDC, FSMO + virtual DC cloning
- Examines writable domain controllers
- Domain based services
- Universal group membership
- Flexible single master operations
- Schema administration
- Schema configuration
- Domain naming master
- FSMO roles
- FSMO role placement and seizing
- Examines active directory partitions
- Forest active directory partitions
- Virtualised domain controller cloning
- Configuring and deploying a virtualised domain controller clone
- RODC and password policies
- Examines password replication polices
- Prepopulating account password
- Configuring password policies
- Local group policies on Windows 8
- Local group policy precedence
- Examines minimum password age settings
- Automatic and manual password permission configurations
- Account lockout policies
- Password settings objects
- Creating, editing and deploying a PSO
- Backup and recovery
- Examines methods to protect active directory
- Backup Windows server
- The AD
- System state
- Examines the wbadmin
- Recovering AD
- AD recycle bin
- Active directory offline maintenance
- Active directory services
- Active directory mounting tool
- Snapshots
- Policies and templates
- Examines the group policy management editor
- Software installation policies
- Configuring script policies
- Folder redirection policies
- Examines administrative templates
- Migrating .ADM files to .ADMX format
- Administrative template filtering
- Creating and importing a security template
- GPO manipulation and processing
- Examines group policy objects
- GPO inheritance and precedence
- Enforcing GPO settings
- GPO security
- WMI filtering
- GPO management delegation
- Examines group processing
- Deploying GPO loopback processing
- Overriding GPO policy operations
- Client-side extension behavior
- Resultant set of policy
- Gpresullt.exe
- GPO backup and restore features
- Creating migration tables
- Powershell group policy modules
- Item level targeting
412: Configuring advanced Windows Server 2012 services
- NLB + clustering
- Recognise how to configure NLB for a given scenario
- Recognise how to configure an NLB cluster in a given scenario
- Describe how to manage host traffic and operations in a given scenario
- Create and configure an NLB cluster
- VM clusters + DR
- Identify the key considerations for using clustering in a virtual environment
- Recognise how a highly available VM is created
- Describe the migration options for virtual machines
- Describe the options available for virtual machine management
- Storage
- Describe high availability features of iSCSI
- Recognise how to install and configure iSCSI
- Describe iSNS architecture components
- Describe how BranchCache is used
- Recognise the options available for optimising storage
- File management and DAC
- Describe the key considerations involved in implementing file classification
- Recognise how to manage files using FCI
- Sequence the steps to implement dynamic access control
- Recognise how to configure dynamic access control in a given scenario
- DHCP, DNS + IPAM
- Recognise how to configure advanced DHCP features
- Identify how to ensure DHCP high availability
- Describe how to configure advanced DNS settings
- Choose the most appropriate security feature in a given scenario
- Forests and domains
- Identify the difference between domains and forests
- Identify the guidelines for raising functional levels
- Match the trust relationship types to their descriptions
- Describe advanced trust relationship configuration functions
- Configure trust relationships
- Site replication
- Describe the characteristics of AD DS replication
- Identify the advantages of using active directory sites in a given scenario
- Sequence the steps in the AD site configuration process
- Manage RODC password replication policy
- PKI
- Recognise the functions of PKI components
- Distinguish between different types of CA installations
- Recognise the processes involved in certificate validation and revocation
- RMS + federation
- Describe the functionality and components of AD RMS
- Describe the options for configuring AD RMS
- Identify the characteristics of AD RMS templates
- Recognise RMS trust policy options
- Create an AD RMS template
Our Promise
Trusted by…