TheEngineeringTrainingCenter.com provides CE (continuing education), professional development, and designation study courses for engineering professionals

Format: Available Self-Study Courses


The following provides course information, as well as pricing, author, and educational credit information for the course you selected.

To order this course, click on one of the "Order" options at the bottom of the page.

Course/Product Description

Title:

Designing a Windows Server 2008 Network Infrastructure

Order:Qty:
Description: Taking our Designing a Windows Server 2008 Network Infrastructure training course is a great way to prepare if you are taking the Windows Server 2008 MCITP Enterprise Administrator certification since our subject matter experts will teach you the ropes so that you do not have to spend tons of hours trying to learn the information on your own.

The primary audience for this course is IT professionals, including Windows 2000 Server and Windows Server 2003 enterprise administrators interested in becoming a Windows Server 2008 Enterprise Administrator who focuses on network solutions.

Once done with the course, you will know how to describe key components of network infrastructure design; describe how to design a secure network; design a plan for allocating IP addresses to workstations and servers; and design a network topology.

Training Outline:

Total Course Duration: 17 hours 2 minutes

1.0 Overview of Network Infrastructure Design Process

1.1 Introduction
1.2 Preparing for a Network Infrastructure Design
1.3 Designing the Network Topology
1.4 Designing for Virtualization
1.5 Virtual Machine Connectivity Requirements
1.6 MAC Addressing for Virtual Machines
1.7 Summary

2.0 Designing Network Security

2.1 Introduction
2.2 The Importance and Principals of Network Security
2.3 Security Design and Implementation
2.4 Security Policies and Procedures
2.5 Identify Network Security Threats
2.6 Common Network Vulnerabilities
2.7 STRIDE Threat Model Overview
2.8 Identifying and Analyzing Risks to Network Security
2.9 Defense-in-Depth Model Overview
2.10 Summary

3.0 Designing IP Addressing

3.1 Introduction
3.2 Public vs. Private IP Addresses
3.3 Determining the Number of Subnets and Hosts
3.4 Designing an IPv6 Addressing Scheme
3.5 Designing and IPv6 Transition
3.6 Process and Guidelines for an IPv6 Transition
3.7 Designing the DHCP Infrastructure
3.8 DHCP Communication Process
3.9 Design Options for DHCP Servers
3.10 Guidelines for Designing the DHCP Infrastructure
3.11 Determining DHCP Lease Lengths
3.12 Using Superscopes
3.13 DHCP Class-Level Options
3.14 Summary

4.0 Designing Routing and Switching Requirements

4.1 Introduction
4.2 Connectivity Requirements
4.3 Selecting Network Devices
4.4 Designing the Use of Routers
4.5 Designing the Use of Switches
4.6 Designing Internet Connectivity Perimeter Networks
4.7 NAT for Internet Security
4.8 Strategies for Firewall Design
4.9 Designing Routing Communications
4.10 Choosing a Routing Protocol
4.11 Understanding and Designing Packet Filters
4.12 Evaluating Site-To-Site Connectivity Options
4.13 Evaluating Network Performance
4.14 Quality of Service
4.15 Summary

5.0 Designing Name Resolution

5.1 Introduction
5.2 Name Resolution Requirements and Considerations
5.3 Identifying Locations and Application Requirements
5.4 Designing a DNS Server Strategy
5.5 Determining DNS Server Hardware Requirements and Placement
5.6 Planning DNS Server Roles
5.7 Securing DNS Servers
5.8 Designing DNS Zone Implementations
5.9 Standard vs. Active Directory DNS Zones
5.10 Zone Security Considerations
5.11 Designing Zone Transfers
5.12 Designing Delegation of DNS Zones
5.13 DNS Zones Demo
5.14 Summary

6.0 Designing Advanced Name Resolution

6.1 Introduction
6.2 Modifications that Optimize DNS Servers
6.3 DNS Troubleshooting Tools
6.4 Designing DNS for High Availability and Security
6.5 Designing a WINS Name Resolution Strategy
6.6 Designing WINS Replication
6.7 Transitioning from WINS
6.8 DNS Optimization Demo
6.9 Summary

7.0 Designing Security for Internal Networks

7.1 Introduction
7.2 Designing Windows Firewall Implementations
7.3 Overview of IPSec
7.4 Connection Security Rules
7.5 IPSec Authentication Types
7.6 Designing an IPSec Implementation
7.7 Summary

8.0 Designing Networks Access Solutions

8.1 Introduction
8.2 Determining Network Access Requirements
8.3 Securing and Controlling Network Access
8.4 Authentication Methods
8.5 Encryption Methods
8.6 Network Policies
8.7 Creating and Configuring Network Policies Demo
8.8 Remote Access Monitoring
8.9 Designing Remote Access Services
8.10 VPN Tunneling Protocols
8.11 Hardware Considerations and Server Placement
8.12 User Environment Configuration
8.13 Designing RADIUS Authentication and Network Policy Services
8.14 Connection Request Policies
8.15 Designing Wireless Access
8.16 Wireless Security
8.17 Using RADIUS for Wireless Authentication
8.18 Hardware Considerations
8.19 Summary

9.0 Designing Networks Access Protection

9.1 Introduction
9.2 NAP Architecture
9.3 Network Layer Protection
9.4 Host Layer Protection
9.5 NAP Enforcement
9.6 DHCP Enforcement
9.7 VPN Enforcement
9.8 IPSec Enforcement
9.9 Designing NAP Policies
9.10 Designing Considerations for NAP
9.11 Configuring NAP for DHCP Clients Demo
9.12 Introduction

10.0 Designing File Services and DFS

10.1 Introduction
10.2 Evaluating Windows File Services
10.3 Understanding Distributed File System
10.4 Analyzing High Availability for File Services
10.5 Designing a Distributed File System
10.6 Designing DFS Namespaces
10.7 Designing DFS Replication
10.8 Designing File Server Resource Manager Configuration
10.9 FSRM Quotas
10.10 Deploying FSRM Utility Demo
10.11 Introduction

11.0 Designing Print Services

11.1 Introduction
11.2 Considerations for Print Services
11.3 Windows Server 2008 Printing Features
11.4 XPS-Based Printing
11.5 Print Management Console
11.6 Print Management Console Demo
11.7 Printer Driver Store
11.8 Internet Printing Protocol
11.9 Designing Print Services
11.10 Summary

12.0 Designing High Availability

12.1 Introduction
12.2 Defining and Documenting High Availability Requirements
12.3 Infrastructure Requirements for High Availability
12.4 High Availability Options in Windows Server 2008
12.5 Overview of Network Load Balancing
12.6 Sharing Application Data for NLB
12.7 Designing Host Affinity and Priority
12.8 Selecting Network Communication Methods for NLB
12.9 Designing Failover Clustering
12.10 Overview of Failover Clustering
12.11 Shared Storage for Failover Clustering
12.12 Quorum Configuration for Failover Clustering
12.13 Guidelines for Designing Failover Clusters
12.14 Designing Geographically Dispersed Clusters
12.15 Summary

Training On DVD

The self-study Designing a Windows Server 2008 Network Infrastructure CBT course is a great way to learn if you have a busy schedule since it provides you with the convenience of learning whenever you can.

You can go back to past sections or even skip ahead to different presentations since you are the boss in the computer based training course! You will also learn from discussions and presentations in our self-paced Designing a Windows Server 2008 Network Infrastructure CBT videos program.

Note: All over night orders must be placed by 2pm Eastern time or they will be processed the following business day.

About The Provider: K Alliance provides computer based training (CBT) and online computer training videos.

We offer a complete e-learning solution in the form of either dvd, CD, intranet, or online training video courseware.

Our self-paced computer training videos include hundreds of choices in topics such as IT Training, Certification Training, Desktop Office and Soft Skills. No matter which method you prefer, K Alliance has courses to help you achieve your elearning goals.
Price: $499.00
More Info: Contact Us For More Information




Order:Qty:



Feature Items
Six Sigma Certifications
Six Sigma Certifications
Bud To Boss Management Training Seminar
Bud To Boss Management Training Seminar
Auditing Business Application Systems
Auditing Business Application Systems
ISO &QMS Certifications
ISO &QMS Certifications
The Intern Toolkit
The Intern Toolkit
Training On Medical Devices
Training On Medical Devices
Advanced Auditing For In-Charge Auditors
Advanced Auditing For In-Charge Auditors
Basic Project Management
Basic Project Management
MicroSoft Word Training
MicroSoft Word Training
Excel Training
Excel Training
QuickBooks: Live &On-Demand Webinars
QuickBooks: Live &On-Demand Webinars
CAD &AutoCAD Training
CAD &AutoCAD Training