This course is preparation for the 70-640 exam. This exam covers the following topics: Configuring Domain Name System (DNS) for Active Directory, Configuring the Active Directory infrastructure, Configuring Active Directory roles and services, Creating and maintaining Active Directory objects, Maintaining the Active Directory environment, Configuring Active Directory Certificate Services.
1.1 Introduction
1.2 Understanding The Purpose Of Identity And Access Control
1.3 Active Directory Server Roles For I D A Management – Part 1
1.4 Active Directory Server Roles For I D A Management – Part 2
1.5 Active Directory Server Roles That Support I D A Solutions
1.6 Active Directory Summary
2.1 Overview Of Active Directory Identity And Access – Part 1
2.2 Overview Of Active Directory Identity And Access – Part 2
2.3 Overview Of Active Directory Identity And Access – Part 3
2.4 Active Directory Components And Concepts – Part 1
2.5 Active Directory Components And Concepts – Part 2
2.6 Active Directory Components And Concepts – Part 3
2.7 Active Directory Components And Concepts – Part 4
2.8 Active Directory Components And Concepts – Part 5
2.9 Implementing Active Directory – Part 1
2.10 Implementing Active Directory – Part 2
2.11 Implementing Active Directory – Part 3
2.12 Implementing Active Directory – Part 4
2.13 Implementing Active Directory – Part 5
2.14 Implementing Active Directory – Part 6
2.15 Implementing Active Directory – Part 7
2.16 Implementing Active Directory – Part 8
2.17 Overview Of Active Directory – Part 1
2.18 Overview Of Active Directory – Part 2
2.19 Overview Of Active Directory – Part 3
2.20 Summary
3.1 Overview Of Active Directory And D N S Integration – Part 1
3.2 Overview Of Active Directory And D N S Integration – Part 2
3.3 Configure Active Directory Integrated Zones – Part 1
3.4 Configure Active Directory Integrated Zones – Part 2
3.5 Configure Dynamic Updates
3.6 Configure Read- Only Zones
4.1 Overview Of Active Directory Objects
4.2 Configuring User And Computer Accounts – Part 1
4.3 Configuring User And Computer Accounts – Part 2
4.4 Configuring User And Computer Accounts – Part 3
4.5 Configuring Groups – Part 1
4.6 Configuring Groups – Part 2
4.7 Configuring Groups – Part 3
4.8 Configuring Groups – Part 4
4.9 Configuring Groups – Part 5
4.10 Automating Object Management – Part 1
4.11 Automating Object Management – Part 2
4.12 Automating Object Management – Part 3
4.13 Automating Object Management – Part 4
4.14 Automating Object Management – Part 5
4.15 Delegation Of Administrative Control – Part 1
4.16 Delegation Of Administrative Control – Part 2
4.17 Summary
5.1 Configuring Sites And Subnets – Part 1
5.2 Configuring Sites And Subnets – Part 2
5.3 Configuring Replication – Part 1
5.4 Configuring Replication – Part 2
5.5 Configuring Replication – Part 3
5.6 Configuring Replication – Part 4
5.7 Summary
6.1 Understanding Group Policy – Part 1
6.2 Understanding Group Policy – Part 2
6.3 Understanding Group Policy – Part 3
6.4 Understanding Group Policy – Part 4
6.5 Understanding Group Policy – Part 5
6.6 Understanding Group Policy – Part 6
6.7 Working With G P Os – Part 1
6.8 Working With G P Os – Part 2
6.9 Working With G P Os – Part 3
6.10 Working With G P Os – Part 4
6.11 Troubleshooting Application Of GPO
6.12 Delegating Administrative Control Of Group Policy
6.13 Summary
7.1 Configure Scripts And Folder Redirection – Part 1
7.2 Configure Scripts And Folder Redirection – Part 2
7.3 Deploying Software – Part 1
7.4 Deploying Software – Part 2
7.5 Deploying Software – Part 3
7.6 Delegating Computer Support
7.7 Managing Security Settings – Part 1
7.8 Managing Security Settings – Part 2
7.9 Managing Security Settings – Part 3
7.10 Managing Security Settings – Part 4
7.11 Managing Security Settings – Part 5
7.12 Utilizing Auditing – Part 1
7.13 Utilizing Auditing – Part 2
7.14 Summary
8.1 Monitoring Active Directory – Part 1
8.2 Monitoring Active Directory – Part 2
8.3 Monitoring Active Directory – Part 3
8.4 Monitoring Active Directory – Part 4
8.5 Managing The Active Directory Database
8.6 Disaster Recovery For Active Directory – Part 1
8.7 Disaster Recovery For Active Directory – Part 2
8.8 Disaster Recovery For Active Directory – Part 3
8.9 Disaster Recovery For Active Directory – Part 4
8.10 Maintaining Active Directory Domain Services Summary
9.1 Overvie W Of Public Key Infrastructure And A D C S – Part 1
9.2 Overvie W Of Public Key Infrastructure And A D C S – Part 2
9.3 Overvie W Of Public Key Infrastructure And A D C S – Part 3
9.4 Deploying A Certificate Authority Hierarchy
9.5 Installing A D C S – Part 1
9.6 Installing A D C S – Part 2
9.7 Installing A D C S – Part 3
9.8 Installing A D C S – Part 4
9.9 Deploying And Managing Certificates – Part 1
9.10 Deploying And Managing Certificates – Part 2
9.11 Deploying And Managing Certificates – Part 3
9.12 Deploying And Managing Certificates – Part 4
9.13 Managing Revocation And Distribution – Part 1
9.14 Managing Revocation And Distribution – Part 2
9.15 Configuring Certificate Recovery – Part 1
9.16 Configuring Certificate Recovery – Part 2
9.17 Deploy And Manage A Public Key Infrastructure Summary
10.1 A D L D S Overvie W – Part 1
10.2 A D L D S Overvie W – Part 2
10.3 Configuring A D L D S Instances
10.4 Configuring Replication
10.5 Understanding Integration With A D L D S
10.6 Supporting Applications With A D L D S Summary
11.1 A D F S Overvie W
11.2 A D F S Deployment Scenarios
11.3 Deploying A D F S – Part 1
11.4 Deploying A D F S – Part 2
11.5 Deploying A D F S – Part 3
11.6 Deploying Active Directory Federated Services Summary
12.1 A D R M S Overvie W
12.2 Understanding A D R M S
12.3 Managing ADRMS – Part 1
12.4 Managing ADRMS – Part 2
12.5 Managing ADRMS – Part 3
12.6 Managing ADRMS – Part 4
12.7 Deployment Active Directory Rights Management Services Summary
12.8 Active Directory Outro
Reviews
There are no reviews yet.