課程名稱:Microsoft Certified Windows Server Hybrid Administrator Associate (2科 Windows Server 2022) 國際認可證書課程 (Fast Track) - 簡稱:Windows Server 2022 Training Course (Fast Track) |
AZ-800 Administering Windows Server Hybrid Core Infrastructure (42 hrs)
1. Configuring DHCP Server Role
1.1 DHCP Client and Server interaction
1.2 Installing DHCP Server Role
1.3 DHCP Scope
1.4 DHCP Address Exclusion Range
1.5 DHCP Reservation
1.6 Conflict Address Detection
1.7 DHCP Policy Based Assignment (PBA) with User Classes
1.8 DHCP Server Network Binding
2. Configuring a Windows Server Router
2.1 Two Router Forms
2.2 Routing in Windows Server 2022
2.3 DHCP Relay Agent
2.4 New Client-Side features
3. Roaming VPN to On-Premises Network
3.1 Configuring VPN
3.2 Deploying VPN Connections using CMAK
3.3 PPTP and L2TP
4. Basic Concept of Storage Virtualization
4.1 Concepts of Storage Pool, Virtual Disk, and Storage Virtualization in Windows Server 2022
4.2 Configuring a Storage Pool
4.3 Configuring a Virtual Disk
4.4 Redundancy of Virtual Disks
4.5 Maintaining Storage Pool
4.6 Repairing a Storage Pool automatically using Hot Spare disks
5. Advanced Concepts of Storage Virtualization
5.1 Introduction to Tiered Storage Pool
5.2 Configuring a Tiered Storage Pool
5.3 Pinning files to specific storage tier
5.4 Storage Tiers Optimization Task
5.5 Dual Parity Non-Tiered Virtual Disks
6. Basic Concepts of Internet SCSI
6.1 Introduction to SCSI and Internet SCSI
6.2 Configuring iSCSI Portal
6.3 Configuring iSCSI Targets
6.4 Configuring iSCSI Initiator
7. NTFS Permissions
7.1 Standard NTFS Permissions on Folders and Files
7.2 Taking Ownership of Folders and Files
7.3 Giving Users the Ability to Take Ownership
7.4 To Take Ownership
7.5 More About Taking Ownership
8. Share Permissions
8.1 Configuring Share Permissions
8.2 Access-Based Enumeration (ABE)
8.3 Combining Share Permissions and NTFS Permissions
8.4 Access-Denied Assistance
9. File Server Resource Manager
9.1 Introduction to FSRM
9.2 File Server Resource Manager in Quota Management
9.3 File Screening
9.4 File Management Tasks
10. Storage in Azure Cloud
10.1 Creating a Free Azure account
10.2 Storage Account Endpoints
10.3 Creating a GPv2 Storage Account
10.4 Introduction to Azure Files
10.5 Data Access Method of Azure Files
10.6 Creating Azure File Share
10.7 Mounting Azure Files
10.8 Azure File Sync
10.9 Cloud Tiering
11. Windows Server Role
11.1 Domain Controller
11.2 Member Server
11.3 The Kerberos Authentication Protocol
12. Creating and Managing User Accounts
12.1 To Create Domain User Accounts
12.2 Deleting and Renaming User Accounts
13. Concept of Groups
13.1 Global Groups
13.2 Local Groups
13.3 General Usage of a Global Group and a Local Group
13.4 Some Built-in Global Groups
13.5 Some Built-in Local Groups
13.6 Domain Local Groups
13.7 Local User Accounts
13.8 Domain User Accounts
13.9 Built-in Local User Accounts
13.10 Some Built-in Domain User Accounts
14. Concept of Active Directory
14.1 Logical Structure
14.2 Physical Structure
15. Concepts of Windows Policy
15.1 Local Computer Policy
15.2 Site, Domain or OU Policy
15.3 Priority of Windows Policies:
15.4 Important Facts and Rules of Group Policy
15.5 Refresh Interval for Group Policy
15.6 Group Policy Security Filter
15.7 Group Policy Administrative Templates
15.8 ADMX Central Store
15.9 Group Policy Startup Script
15.10 Group Policy Slow-link detection
16. Domain Functional Level (DFL)
16.1 Understanding AD DS Domain Function Levels
16.2 Supported Domain Functional Level and Features bv Windows Server 2022
16.3 Group Types of Active Directory
16.4 Scopes of Security Group
16.5 Common Usage of Global Group, Universal Group and Local Group
16.6 Creation of a Group
16.7 Raise Domain Functional Level
16.8 Rollback Options of Domain Functional Level
16.9 Using Fine-Grained Password and Lockout Policy
16.10 Preparation
16.11 Creating Password Setting Objects by using ADSI Editor and ADAC
16.12 Apply PSOs to Users or Global Groups
17. Forest Functional Level
17.1 Forest Functional Levels available in Windows Server
17.2 Guidelines for raising Forest Functional Level
18. Active Directory Recycle Bin
18.1 About deleted Active Directory Objects
18.2 Overview of Restoring Active Directory objects by Recycle Bin
18.3 Enabling the Active Directory Recycle Bin
18.4 LDAP Names
18.5 Restoring Active Directory Objects
18.6 More about restoring multiple Active Directory Objects
19. Additional Domain Controllers
19.1 Installing Additional Domain Controllers by Network
19.2 LDAP Names
19.3 Effects on Active Directory with additional domain controllers
20. DHCP High Availability
20.1 Multiple DHCP Servers on the Same Network
20.2 DHCP Failover
20.3 About DHCP Load Sharing mode
21. Global Catalog and FSMO Roles
21.1 Introduction to Global Catalog and FSMO Roles
21.2 Global Catalog
21.3 Compacting Active Directory Database
21.4 Schema Master – Per Forest
21.5 Domain Naming Master – Per forest
21.6 PDC Emulator– Per Domain
21.7 Relative ID Master – Per Domain
21.8 Infrastructure Master – Per Domain
21.9 Active Directory Replication Status Tool
22. Azure Active Directory (AAD)
22.1 Azure AD Administrator Roles
22.2 Users and Licenses of Azure Active Directory
22.3 Terminology of Azure Active Directory
22.4 Azure Active Directory Custom Domain names
22.5 Creating Azure AD User account
22.6 Managing User Profile Information
22.7 Resetting Azure Active Directory User Password
22.8 Configure Access with Azure Active Directory Groups
22.9 Dynamic Group
22.10 Differences between Azure RBAC roles and Azure AD administrator roles
22.11 Set up directory synchronization
22.12 Monitoring AD Connect Synchronization Health
23. Windows Admin Center
23.1 Overview of Windows Admin Center
23.2 Deploying Windows Admin Center
23.3 Configuring Windows Admin Center
23.4 Enabling Windows Admin Center Single-Sign On (SSO)
23.5 Deploying Extensions to Windows Admin Center
24. NIC Teaming
24.1 Introduction to NIC Teaming
24.2 Introduction to NIC Teaming
24.3 Configuring NIC Teaming
24.4 Configuring LACP
25. Windows Containers
25.1 Introduction to Windows Containers
25.2 Fundamental Concepts of Windows Containers
25.3 Windows Container Types
25.4 Introduction to Docker
25.5 Containers for Developers
25.6 Containers for IT Professionals
25.7 Configuring Windows Container Host
25.8 Deploying a container
25.9 Building Container Images
25.10 Hyper-V Containers
25.11 A Special Reminder on Hyper-V Container Host
25.12 More about Hyper-V isolation
25.13 Container Networking Concepts
26. Azure Container Instances (ACI)
26.1 Introduction to ACI
26.2 Creating Azure Container Instance
26.3 Viewing Container Logs
26.4 Quota and Limits of Azure Container Instances
27. Azure Container Registry (ACR)
27.1 Introduction to Azure Container Registry, Repository and Images
27.2 Use cases and Key features of Azure Container Registry
27.3 Creating a Private Container Registry
27.4 Pull, Build, Push, Run a container image using Azure Container Registry Tasks
27.5 Azure Container Registry Roles and Permissions
28. High Availability Features
28.1 Failover Clusters
28.2 Scale-Out File Server for Application Data
28.3 Configuring Hyper-V to use Scale-Out File Server (Optional Knowledge)
28.4 The SMB Witness protocol (Optional knowledge)
28.5 Managing a Failover Cluster with Windows Admin Center
29. Configuring ADDS Forest
29.1 Additional Domains in existing Forest
29.2 Configuring a new domain tree to join existing forest
29.3 Conditional DNS Forwarding
29.4 Enabling Global Catalog (GC) for xyz.com
29.5 An Example of Domain-Wide authentication and Resource assessment
29.6 Assigning Permissions in a multi-domain environment
29.7 Active Directory Migration Tool
29.8 Deploying Child Domain
30. Managing ADDS Trusts
30.1 Types of Trust within a Forest (Intra-Forest)
30.2 Types of Inter-Forest Trust (Inter-Forest)
30.3 Creating Forest Trust
30.4 Updating UPN Suffixes for Forest Trust
30.5 Selective Authentication
31. On-Premise and Internet DNS
31.1 The Domain Name Space
31.2 Types of Windows DNS Zones
31.3 Active Directory Integrated Zone
31.4 Standard Primary Zone
31.5 Standard Secondary Zone
31.6 Three Methods to Implement a DNS Zone
31.7 Forward Lookup Zone and Host (A) Records
31.8 Reverse Lookup Zone and Pointer (PTR) Records
31.9 Forward Lookup Zone and Mail Exchanger (MX) Records
31.10 Name Server (NS) Record and the Name Servers Tab
31.11 More about Zone Transfer from Primary to Standard Secondary
AZ-801 Configuring Windows Server Hybrid Advanced Services (24 hrs)
1. Advanced DNS Server configuration
1.1 DNS Sub-domains
1.2 Three Tiers of Caching
1.3 Forwarders
1.4 Root Zone, Root Hints
1.5 Dynamic Update
2. DNS Client side configuration
2.1 Configuring DNS client by NRPT policy
3. DNS Security Extensions
3.1 Overview of DNSSEC
3.2 Threats of DNS Protocol
3.3 Principal of DNS Security Extension
3.4 A DNSSEC Test Lab scenario
3.5 Configuring and testing DNSSEC
3.6 More about using DNSSEC for Public Internet Domains
4. Windows Server Compute and Virtualization services
4.1 Microsoft Hyper-V Server and Windows Server Hyper-V role
4.2 Hyper-V General Requirements
4.3 Installing Hyper-V Role Service on Windows Server 2022
4.4 Creating a Virtual Machine and Installing a Guest OS
4.5 Installing and Configuring Windows Hyper-V Server
4.6 Configuring Hyper-V Server to accept Remote Management
4.7 Managing Hyper-V Server from a remote location
5. Configure Hyper-V Settings and Virtual Networks
5.1 Configuring VHD Storage location
5.2 Upgrading Virtual Machine Configuration Version
5.3 Checkpoint (Snapshot) Location
5.4 Hot add and Hot removal of Virtual hardware
5.5 Nested Virtualization
5.6 Host Resource Protection
5.7 Windows PowerShell Direct
5.8 Configuring the Virtual Network
5.9 Guest Network Load Balancing
5.10 Single Root I/O Virtualization
6. Shared Nothing Live Migration
6.1 Concepts of Live Migration
6.2 Configuring Live Migration in a Shared Nothing/Non-Clustered environment
6.3 Performing Live Migration of virtual machine in a Shared Nothing environment
6.4 More about Processor Compatibility Mode
7. Hyper-V Replica Server
7.1 Introduction to Hyper-V Replica
7.2 Configuring Hyper-V Replica
7.3 Testing Failover
7.4 Performing a Planned Failover
7.5 Performing a Un-planned Failover
8. Generation 2 Virtual Machines
8.1 Generation 2 Virtual Machine in Hyper-V
8.2 Enhanced Session Mode
8.3 Virtual Disk Online Resizing
8.4 Resource Metering
8.5 Hyper-V Port Mirroring
8.6 Using ReFS version 2 with Hyper-V
9. Hyper-V Failover Clustering
9.1 Deploying a Hyper-V Failover Cluster
9.2 Cluster Shared Volume
9.3 Cluster Shared Volumes (CSV) Cache
9.4 Deploying a Highly Available Virtual Machine in Hyper-V Cluster
9.5 Testing a Planned Failover by Live Migration
9.6 Virtual Machine Drain on Shutdown
9.7 Live Migration Settings and RDMA
9.8 Virtual Machine Network Health Protection
9.9 Virtual Machine Monitoring
9.10 Hyper-V Replica Broker
9.11 Hyper-V Virtual Machine Load Balancing
9.12 Configuring RDMA Adapter and Converged Ethernet
9.13 Hyper-V Switch Embedded Teaming (SET)
10. Creating and Managing Azure Virtual Machines
10.1 Benefits and Challenges using N-Tier Architecture
10.2 N-Tier architecture with Azure Compute Virtual Machines
10.3 Enabling Auto-shutdown for VM
10.4 Configuring and Managing additional data disk for Azure Virtual Machines
10.5 Configure Azure Disk Encryption
10.6 Resizing Virtual Machines
10.7 Hot Patching
10.8 SMB over QUIC
10.9 SMB over QUIC with Automanage
11. Cross Premises and Hybrid Connectivity
11.1 Introduction to VNet Peering
11.2 Configuring Global VNet Peering
11.3 Options for connecting additional virtual networks
11.4 Point-to-Site VPN and Certification based authentication
11.5 Configuring Azure Site to Site (S2S) VPN
11.6 Azure Virtual Network Adapter
11.7 Microsoft Defender for Cloud
12. Microsoft Defender for Identity
12.1 Introduction to MDI/Azure ATP
12.2 Microsoft Defender for Identity architecture
12.3 Creating a Defender for Identity Instance
12.4 Connect to your On-Premises AD Forest
12.5 Downloading and Installing the Sensor setup package
12.6 Configure Data Steering in MDI Sensor
12.7 About Microsoft Advanced Threat Analytics (ATA)
12.8 Security Posture Assessments with Microsoft Defender for Identity
13. Data Deduplication
13.1 Introduction to Data Deduplication in Windows Server 2022
13.2 Installing and Configuring Data Deduplication
13.3 Data Deduplication enhancements in Window Server
13.4 Additional Interoperability considerations of using Data Deduplication
14. On-Premises Performance Monitoring
14.1 Reliability Analysis Component (RAC)
14.2 Data Collector Set
14.3 Performance Counter Alert
14.4 Event Trace Sessions
15. Azure Recovery Services Vault
15.1 Introduction to Recovery Services Vault
15.2 Creating a Recovery Services Vault
15.3 Back up Windows to Azure
15.4 Back up an Azure Virtual Machine
15.5 Upgrading Azure VM Backup stack V2 (Optional knowledge)
15.6 More about Site-to-Site recovery by using Azure Site Recovery
16. Azure Migrate Appliance
16.1 Introduction to Azure Migrate
16.2 Creating a Migration Project
16.3 Deploying Azure Migrate appliance with VHD template for Hyper-V
16.4 Assess Hyper-V VMs for migration to Azure
16.5 Migrate Hyper-V VMs to Azure
16.6 Running a Test Migration
16.7 Migrating to Azure Virtual Machines
16.8 Completing the migration
16.9 Post-migration best practices
17. Protecting and Securing Windows Credentials
17.1 Attacks to Windows Credential Store
17.2 Requirements of Credential Guard
17.3 Configuring Credential Guard
17.4 Preventing NTLM authentication protocol
18. Just Enough Administration (JEA)
18.1 Overview of Just Enough Administration
18.2 Creating a JEA Role Capability File
18.3 Convert Role Capability File as PowerShell Module
18.4 Creating a JEA Session Configuration File
18.5 Creating a JEA Endpoint
18.6 Connecting to JEA Endpoint
19. Azure ARC
19.1 Introduction to Hybrid Infrastructure Management with Azure ARC
19.2 Azure ARC Enabled Servers
19.3 Onboarding Azure ARC Enabled Servers
19.4 Onboarding ARC Enabled Servers at Scale
19.5 Onboarding ARC Enabled Servers to Microsoft Sentinel
19.6 Detect threats using Microsoft Sentinel
19.7 Moreover Automated Response to Threats
|