v

您的位置:VeryCD教育计算机


《Windows Server 2008企业管理员考试培训视频教程》(CBT Nuggets : Microsoft 70-647: Windows Server 2008, Enterprise Administrator PRO)[光盘镜像]

  • 状态: 精华资源
  • 摘要:
    发行日期2010年
    对白语言英语
    文字语言英文
  • 时间: 2010/12/23 16:20:55 发布 | 2010/12/23 20:38:34 更新
  • 分类: 教育  计算机 

xiaochenjia

精华资源: 673

全部资源: 675

相关: 分享到新浪微博   转播到腾讯微博   分享到开心网   分享到人人   分享到QQ空间   订阅本资源RSS更新   美味书签  subtitle
该内容尚未提供权利证明,无法提供下载。
中文名Windows Server 2008企业管理员考试培训视频教程
英文名CBT Nuggets : Microsoft 70-647: Windows Server 2008, Enterprise Administrator PRO
资源格式光盘镜像
发行日期2010年
地区美国
对白语言英语
文字语言英文
简介

IPB Image

资源简介

CBT NUGGETS出品的考试教学课程:Microsoft 70-647 Windows Server 2008 EA认证考试 (Windows Server 2008 Enterprise Administrator)

主讲:James I. Conrad | 时长:16 小时

课程提供了最全面的一站式培训解决方案,帮助读者准备通过Microsoft 70-647 考试。学习安装、配置、监控Exchange Server 2007。

MCITP: Enterprise Administrator (EA) Certification 认证你的Windows基础设施设计技能,以及在Windows Server 2008中的工作能力。70-647是获得这一资格必需的认证考试。

简介翻译摘自 gaodeji71@TLF

教程名称:Microsoft 70-647: Windows Server 2008, Enterprise Administrator PRO

主讲人:James I. Conrad 视频课时:共24个小节教学.


官网链接:http://www.cbtnuggets.com/series?id=459

Passing Microsoft''s 70-647 Enterprise Administrator exam is your final step towards earning Microsoft''s premiere Server 2008 MCITP certification.

It says you''re ready to implement new capabilities and higher security in a medium-to-large enterprise using the latest advances in Windows Server 2008 technologies. And once you''ve completed this terrific video training series from Microsoft expert James Conrad, you will be ready.

By the time you''ve finished watching James''s fantastic series you''ll have your servers running reliably and secure, and you''ll be ready for the 70-647 exam.

IPB Image



目录

What You'll Learn

Series 1:
*
Video 1: Intro|07:30

*
Video 2: Design Active Directory Forests and Domains|35:22

Designing Core Identity and Access Management Components; Design Active Directory Forests and Domains; purpose of active directory; enterprise directory; internet directory; network operating system; reasons for single and multiple forests; reasons for single and multiple domains; administrative autonomy; administrative isolation; custom schema modifications; enterprise admins; domain admins; forest root; dedicated forest root; empty forest root.
*
Video 3: Forest and Domain Functional Levels|36:21

Designing Core Identity and Access Management Components; Design Active Directory Forests and Domains; Plan for Interoperability; inter-organizational authorization and authentication; forest and domain functional levels; Domain functional level; forest functional level; fine-grained password policy; forest trust; domain rename; linked value replication; rodc; knowledge consistency checker; KCC; intersite topology generator; ISTG; inetorgperson, DFS-R Sysvol replication; domain controller rename; LastLogonTimestamp; redirusr; redircmp; selective authentication; constrained delegation; authorization manager.D6
*
Video 4: UPN and ADPREP|16:56

Designing Core Identity and Access Management Components, design active directory forests and domains, user principal name (UPN), adprep, /forestprep, /domainprep, /gpprep, /rodcprep.
*
Video 5: Trust Relationships|28:05

Designing Core Identity and Access Management Components, design active directory forests and domains, intra-organizational authorization and authentication, Cross-forest authentication, manual trust, external trust, realm trust, UNIX kerberos v5 trust, forest trust, shortcut trust.
*
Video 6: Active Directory Physical Topology|38:28

Designing Core Identity and Access Management Components, Placement of servers, site and replication topology, repadmin /bridgeheads, intrasite replication, intersite replication, sites, connection objects, site links, bridgehead servers, site link cost, replication interval, replication schedule, subnets.
*
Video 7: Global Catalog, Universal Group Membership Caching, Printer Location Policy|25:28

Designing Core Identity and Access Management Components, Placement of servers, site and replication topology, global catalog, universal group membership caching, printer location tracking.
*
Video 8: Read Only Domain Controllers (RODC)|39:08

Design the Branch Office Deployment, Authentication Strategy, Server Security. Configure the Read-Only Domain Controller (RODC), dcpromo, advanced options, answer files, Universal Group Membership Caching (UGMC), global catalog, adprep /rodcprep, credential caching, cached passwords; administrator role separation, decommissioning domain controllers.
*
Video 9: The Active Directory Administrative Model|41:12

Design the Active Directory Administrative Model, delegation, group strategy, compliance auditing, group administration, organizational structure, auditpol.exe.
*
Video 10: Enterprise-Level Group Policy Strategy|01:11:17

Design the enterprise-level group policy strategy. group policy hierarchy and scope filtering, control device installation, authentication and authorization, organizational structure, organizational unity design, scope of management, order of inheritance, modify group policy scope, WMI filters, windows management instrumentation, software deployment using GPO, template files, adm files, admx files, central store.
*
Video 11: Upgrade and Migrate Domains, Interoperability|33:43

Plan for interoperability. inter-organizational authorization and authentication, application authentication interoperability, cross-platform interoperability, Designing support identity and access management components, cross-forest authentication, backward compatibility, object migration, active directory migration tool 3.1, ADMT, active directory federation services, AD FS, domain upgrade, domain restructure, domain upgrade-then-restructure, identity lifecycle manager feature pack 1, ILM FP1, metaverse, identity management for unix, password synchronization, subsystem for UNIX-based applications, SUA, server for NIS, services for NFS.
*
Video 12: IP Addressing|55:43

Planning network and application services, Plan for name resolution and IP addressing, IP addressing scheme, TCP/IP version coexistence, 128-bit addresses, 8 groups of hex characters, IPv4, IPv6, Link-local address, FE80, Unique-local, site-local address, global scope address, internet 2, anycast, transitioning to IPv6, transition richness, dual-stack routers, tunneling 6to4, tunneling 4to6, NAT Protocol Translation, NAT-PT, teredo.
*
Video 13: DNS|01:01:09

Plan for name resolution, internal and external naming strategy, naming resolution support for legacy clients, naming resolution for directory services. background zone loading, IPv6 support, primary read-only zone, global names zone, GNZ, WINS, dynamic update, netbios name, fully qualified domain name, fqdn, authoritative dns server, dnscmd, split dns, overlapping namespace, cname, isa server, primary zone, primary active directory-integrated zone, secondary zone, DomainDNSzones, ForestDNSzones, child domains, delegation, stub zone, nslookup, glue records, reverse lookup, forwarders, internet root, top level domain servers, TLD servers, caching only dns servers, conditional forwards, dynamic update, secure dynamic update, insecure dynamic update.
*
Video 14: Network Access|46:51

Design for Network Access, network access policies, remote access strategy, perimeter networks, server and domain isolation. Virtual private network, vpn, layer two tunneling protocol, l2tp, point-to-point tunneling protocol, pptp, secure socket tunneling protocol, sstp, eap, eap-tls, peap, ms-chap v2, network access protection, health policy, health registration authority, hra, health requirement server, NAP health policy servers, system health agent, remediation servers, antivirus definitions, restricted network, malware.
*
Video 15: Terminal Services|52:50

Plan for Terminal Services. Terminal Services Licensing, Terminal Services Infrastructure, Terminal Server Fram, terminal services license servers, terminal services gateway servers (TS Gateway), per user client access license, per device client access license, CAL, terminal services web access, terminal services connection authorization policies (TS CAP), terminal services resource authorization policies (TS RAP), terminal services session broker, windows system resource manager (WSRM).
*
Video 16: Application Delivery|47:10

Plan for Application Delivery, Application virtualization, presentation virtualization, locally installed software, softgrid, Microsoft system center application virtualization, management server, app-v, application virtualization client, application virtualization sequencer, port 554, firewall rules.
*
Video 17: Business Continuity|54:41

Plan for business continuity, service availability, directory service recovery. Network load balancing, NLB, clustering, quorum, witness, terminal server farm, web farm, isa server farm, flexible single master operation, operation master, pdc emulator, rid master, schema master, infrastructure master, domain naming master.
*
Video 18: Software Updates|52:15

Design for software updates and compliance management, patch management, patch management compliance, Microsoft update and windows update, windows server update services, WSUS, System center essentials 2007, SCE, system center configuration manager 2007, SCCM, system center operations manager 2007, SCOM.
*
Video 19: Compliance Management|23:16

Design for software updates and compliance management, security baselines, Microsoft baseline security analyzer, MBSA, security configuration wizard, SCW, SCCM baseline, auditing, WSUS.
*
Video 20: Virtualization Strategy|25:03

Design the operating system virtualization strategy, server consolidation, application compatibility, virtualization management, placement of servers, server consolidation, application virtualization, hyper-v, hyper-v clustering, system center virtual machine manager, iSCSI, fibre-channel san, FC-SAN, sandboxing, serial attached scsi, SAS.
*
Video 21: Data Management and Access|01:02:03

Data Design for data management and data access. Data security, data accessibility, data redundancy, data collaboration, Windows Sharepoint Services, WSS, Microsoft Office Sharepoint Services, MOSS, Distributed File System, DFS, Rights management services, RMS, BitLocker, Windows Server Backup, system state, authoritative restore, wbadmin, complete PC restore.
*
Video 22: Designing a PKI Part 1|37:49

Design and Implement Public Key Infrastructure, Certificate lifecycle management, encryption, signing, hash value, sha-1, certificate templates V1, V2, V3, security requirements, business requirements, active directory, code signing, encrypting file system, EFS, message digest, signature function, private key, public key, S/MIME, clear signed, opaque signed, network device enrollment service, NDES, simple certificate enrollment protocol, SCEP, key length, key lifetime, algorithm.
*
Video 23: Designing a PKI Part 2|28:28

Design and Implement Public Key Infrastructure, enterprise certificate authority CA, standalone certificate authority, root ca, subordinate ca, policy ca, issuing ca, internal ca, external ca, certificate template versions, V1, V2, V3.
*
Video 24: Designing a PKI Part 3|52:20

Design and Implement Public Key Infrastructure, certificate revocation, certificate revocation list, CRL, authority information access AIA, CRL distribution point CDP, smart card enrollment, enrollment agents, certificate templates, autoenrollment, web server certificates.

代码


.do-"""""'-o.. *
.o"" "".. ***
,,'' ``b. *
d' ``b
d`d: `b. ***
,,dP `Y. ***
d`88 `8. **
8`88' `8 **
Y:d8P 8, **
P,88b ,`8 **
::d888, ,8:8. **
dY88888 `' :: **
8:8888 `b *** *
Pd88P',... ,d888o.8 ***
:88'dd888888o. d8888`88:
,:Y:d8888888888b ,d88888:88:
:::b88d888888888b. ,d888888bY8b ***** * **
b:P8;888888888888. ,88888888888P ****** ** **** *
8:b88888888888888: 888888888888' ** * * ** ****
8:8.8888888888888: Y8888888888P * * * ** * *
YP88d8888888888P' ""888888"Y * * ** *
:bY8888P"""""'' : ** ** ** *
8'8888' d ** ** ** *
:bY888, ,P ** ** ** *
Y,8888 d. ,- ,8' ** ** ** *
`8)888: ' ,P' ** ** ** *
`88888. ,... ,P * ** ***
`Y8888, ,888888o ,P * ***
Y888b ,88888888 ,P' **** **
`888b ,888888888 ,,' * *****
`Y88b dPY888888OP :' * **
:88.,'. `'` p *
)8P, ,b ' . **
:p d,'d`b, ,8
. dP' d8': ,
'8P" d8P' 8 - p *****
d,' ,d8' '' : ******
iNK H0RN Presents .. d' 8P' d' '; ** * * **
,: `' d p. * * * **** *
,dooood88: , ,d `` `b. * * ****
.o8"'""""""Y8.b 8 `"'' .o' ` """ob. ** ** * **
dP' `8: K dP'' "`Yo. ** ** *
dP 88 8b. ,d' ``b ** *****
8. 8P 8""' `" :. ** ** ***
:8: :8' ,: :: ** ** ***
:8: d: d' :: * ** ***
:8: dP ,,' :: * ***
`8: :b dP ,, :: **** ***
,8b :8 dP ,, d * ***** *** *
:8P :8dP d' d 8 * *** ***
:8: d8P d' d88 :P *
d8' ,88' ,P ,d888 d' **
88 dP' ,P d8888b 8
,8: ,dP' 8. d8''88' :8
:8 d8P' d88b d"' 88 :8
d: ,d8P' ,8P""". 88 :P
8 ,88P' d' 88 :8
,8 d8P 8 Rls Date : 22/12/10 88 :8
d: 8P ,: Type : Tech Bookware :88 :8
8',8:,d d' Supplier : iNK H0RN :8: :8
,8,8P'8' ,8 Disks : 1 DVD 8' :8
:8`' d' d' Archive : i-cbteap70647 8: p:
`8 ,P :8 # Files : 13 x 50 MB :8: p:
8, ` d8. :8: 8:
:8 d88: d8: 8
`8, d8888 88b 8
88 ,d::888 888 Y:
YK,oo8P :888 888. `b
`8888P :888: ,888: Y,
``'" `888b :888: `b
8888 888: ::
8888: 888b Y.
8888b :888 `b
88888. `888, Y

dPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPd

CBT Nuggets - Microsoft 70-647: Windows Server 2008, Enterprise
Administrator PRO

PdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdP

: DESCRIPTION

Passing Microsoft''s 70-647 Enterprise Administrator exam is your final
step towards earning Microsoft''s premiere Server 2008 MCITP certification.

It says you''re ready to implement new capabilities and higher security in
a medium-to-large enterprise using the latest advances in Windows Server
2008 technologies. And once you''ve completed this terrific video training
series from Microsoft expert James Conrad, you will be ready.

By the time you''ve finished watching James''s fantastic series you''ll
have your servers running reliably and secure, and you''ll be ready for the
70-647 exam.

http://www.cbtnuggets.com/series?id=459

PdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdP

Interested in joining iNK ? We're currently looking to expand.

: Suppliers - Bookware / Training / Apps
: Suppliers - Online Subscription Accounts
: Suppliers - MCT / MCSE Access
: Other - Cracking / Scripting / Coding Skills

dPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPd
8 8
8 8
8 : INSTALLATION 8
8 8
8 a. Extract 8
8 b. Mount/Burn 8
8 c. Play & Learn 8
8 8
8 8
PdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdPdP

: RESPECT DUE

DDUiSO .. JGTiSO .. AG .. CFE


引用

引用
VeryCD教育区发布、交流官方QQ群:127798268 欢迎大家加入

引用
希望更多的网友加入到国外名校开放课程整理、发布的队伍中来. :

引用
资源来自网络收集 未经过一一的质量 安全等检测
只是把收集的资源和各位驴友分享 仅作网络学习交流使用 请勿用于商业用途 !
希望各位下载的驴友能多多参与分流保源 happy.gif

正在读取……

这里是其它用户补充的资源(我也要补充):

暂无补充资源
正在加载,请稍等...

点击查看所有28网友评论

 

(?) [公告]留口水、评论相关规则 | [活动]每日签到 轻松领取电驴经验

    小贴士:
  1. 类似“顶”、“沙发”之类没有营养的文字,对勤劳贡献的楼主来说是令人沮丧的反馈信息。
  2. 提问之前请再仔细看一遍楼主的说明,或许是您遗漏了。
  3. 勿催片。请相信驴友们对分享是富有激情的,如果确有更新版本,您一定能搜索到。
  4. 请勿到处挖坑绊人、招贴广告。既占空间让人厌烦,又没人会搭理,于人于己都无利。
  5. 如果您发现自己的评论不见了,请参考以上4条。