課程名稱:Microsoft Certified Windows Server Hybrid Administrator Associate (2科 Windows Server 2022) 國際認可證書課程 (Full Track) - 簡稱:Windows Server 2022 Training Course (Full Track) |
AZ-800 Administering Windows Server Hybrid Core Infrastructure (60 hrs)
1. Installing Windows Server 2022 Interactively
1.1 Minimum System Requirement of Windows Server 2022
1.2 Upgrade or Migrate with Extended Security Updates for legacy Windows Servers
1.3 Creating a Virtual Machine suitable for installing Windows Server 2022
1.4 Desktop Experience installation
2. Common Management Task using Metro UI
2.1 To shutdown or restart the server computer
2.2 To Logoff the current user
2.3 Shortcut keys
3. Server Core
3.1 Purpose of “Server Core”
3.2 Installing Server Core from clean installation
3.3 Configuring a Server Core mode server with PowerShell
3.4 Configuring a Server Core mode server SCONFIG.cmd
3.5 Summary of Server Core and Server with Desktop Experience
4. Implementing On-Premises Active Directory Domain Services (ADDS)
4.1 Requirements of installing and running On-Premises Active Directory Domain Services (ADDS)
4.2 Assigning Static IP Address for a Domain Controller
4.3 Installing ADDS by using ADDS Configuration Wizard
4.4 Verifying ADDS domain configuration
4.5 Configuring a Windows client to join domain
5. IP Address - Internet Protocol version 4 (IPv4)
5.1 Structure of IP Address
5.2 Concept of Binary Number
5.3 Network ID and Host ID
5.4 Identifying the Network ID
5.5 重要事實
5.6 更改IP Address的步驟
5.7 Use of Subnet Mask
5.8 Subnetting
5.9 Gateway
6. Configuring DHCP Server Role
6.1 DHCP Client and Server interaction
6.2 Installing DHCP Server Role
6.3 DHCP Scope
6.4 DHCP Address Exclusion Range
6.5 DHCP Reservation
6.6 Conflict Address Detection
6.7 DHCP Policy Based Assignment (PBA) with User Classes
6.8 DHCP Server Network Binding
7. Configuring a Windows Server Router
7.1 Two Router Forms
7.2 Routing in Windows Server 2022
7.3 DHCP Relay Agent
7.4 New Client-Side features
8. Roaming VPN to On-Premises Network
8.1 Configuring VPN
8.2 Deploying VPN Connections using CMAK
8.3 PPTP and L2TP
9. Basic Concept of Storage Virtualization
9.1 Concepts of Storage Pool, Virtual Disk, and Storage Virtualization in Windows Server 2022
9.2 Configuring a Storage Pool
9.3 Configuring a Virtual Disk
9.4 Redundancy of Virtual Disks
9.5 Maintaining Storage Pool
9.6 Repairing a Storage Pool automatically using Hot Spare disks
10. Advanced Concepts of Storage Virtualization
10.1 Introduction to Tiered Storage Pool
10.2 Configuring a Tiered Storage Pool
10.3 Pinning files to specific storage tier
10.4 Storage Tiers Optimization Task
10.5 Dual Parity Non-Tiered Virtual Disks
11. Basic Concepts of Internet SCSI
11.1 Introduction to SCSI and Internet SCSI
11.2 Configuring iSCSI Portal
11.3 Configuring iSCSI Targets
11.4 Configuring iSCSI Initiator
12. Internet Storage Name Service (iSNS)
12.1 Introduction to iSNS
12.2 Installing and Configuring an iSNS Server
12.3 Registering iSCSI Targets
12.4 Configuring iSCSI Initiators to query an iSNS Server
13. NTFS Permissions
13.1 Standard NTFS Permissions on Folders and Files
13.2 Taking Ownership of Folders and Files
13.3 Giving Users the Ability to Take Ownership
13.4 To Take Ownership
13.5 More About Taking Ownership
14. Share Permissions
14.1 Configuring Share Permissions
14.2 Access-Based Enumeration (ABE)
14.3 Combining Share Permissions and NTFS Permissions
14.4 Access-Denied Assistance
15. Storage in Azure Cloud
15.1 Creating a Free Azure account
15.2 Storage Account Endpoints
15.3 Creating a GPv2 Storage Account
15.4 Introduction to Azure Files
15.5 Data Access Method of Azure Files
15.6 Creating Azure File Share
15.7 Mounting Azure Files
15.8 Azure File Sync
15.9 Cloud Tiering
16. Windows Server Role
16.1 Domain Controller (DC)
16.2 Member Server
16.3 The Kerberos Authentication Protocol
17. Creating and Managing User Accounts
17.1 To Create Domain User Accounts
17.2 Deleting and Renaming User Accounts
18. Concept of Groups
18.1 Global Groups
18.2 Local Groups
18.3 General Usage of a Global Group and a Local Group
18.4 Some Built-in Global Groups
18.5 Some Built-in Local Groups
18.6 Domain Local Groups
18.7 Local User Accounts
18.8 Domain User Accounts
18.9 Built-in Local User Accounts
18.10 Some Built-in Domain User Accounts
19. Concept of Active Directory
19.1 Logical Structure
19.2 Physical Structure
20. Concepts of Windows Policy
20.1 Local Computer Policy
20.2 Site, Domain or OU Policy
20.3 Priority of Windows Policies:
20.4 Important Facts and Rules of Group Policy
20.5 More about Group Policy
20.6 Refresh Interval for Group Policy
20.7 Group Policy Security Filter
20.8 Group Policy Inheritance
20.9 Using WMI Filters in GPO
20.10 Example WMI filters
20.11 Group Policy Restricted Groups
20.12 Group Policy Administrative Templates
20.13 ADMX Central Store
20.14 Administering Group Policy Objects by using PowerShell
20.15 Software Deployment with Group Policy Object
20.16 Group Policy Startup Script
20.17 Group Policy Scripts Processing
20.18 Group Policy Slow-link detection
21. Domain Functional Level (DFL)
21.1 Understanding AD DS Domain Function Levels
21.2 Supported Domain Functional Level and Features bv Windows Server 2022
21.3 Group Types of Active Directory
21.4 Scopes of Security Group
21.5 Common Usage of Global Group, Universal Group and Local Group
21.6 Creation of a Group
21.7 Raise Domain Functional Level
21.8 Rollback Options of Domain Functional Level (Optional Knowledge)
21.9 Using Fine-Grained Password and Lockout Policy
21.10 Preparation
21.11 Creating Password Setting Objects by using ADSI Editor and ADAC
21.12 Apply PSOs to Users or Global Groups
22. Forest Functional Level
22.1 Forest Functional Levels available in Windows Server
22.2 Guidelines for raising Forest Functional Level
23. Active Directory Recycle Bin
23.1 About deleted Active Directory Objects
23.2 Overview of Restoring Active Directory objects by Recycle Bin
23.3 Enabling the Active Directory Recycle Bin
23.4 LDAP Names
23.5 Restoring Active Directory Objects
23.6 More about restoring multiple Active Directory Objects
24. Azure Active Directory (AAD)
24.1 Azure AD Administrator Roles
24.2 Users and Licenses of Azure Active Directory
24.3 Terminology of Azure Active Directory
24.4 Azure Active Directory Custom Domain names
24.5 Creating Azure AD User account
24.6 Managing User Profile Information
24.7 Resetting Azure Active Directory User Password
24.8 Configure Access with Azure Active Directory Groups
24.9 Dynamic Group
24.10 Differences between Azure RBAC roles and Azure AD administrator roles
24.11 Set up directory synchronization
24.12 Monitoring AD Connect Synchronization Health
25. Windows Admin Center
25.1 Overview of Windows Admin Center
25.2 Deploying Windows Admin Center
25.3 Configuring Windows Admin Center
25.4 Enabling Windows Admin Center Single-Sign On (SSO)
25.5 Deploying Extensions to Windows Admin Center
26. NIC Teaming
26.1 Introduction to NIC Teaming
26.2 Introduction to NIC Teaming
26.3 Configuring NIC Teaming
26.4 Configuring LACP
27. Windows Containers
27.1 Introduction to Windows Containers
27.2 Fundamental Concepts of Windows Containers
27.3 Windows Container Types
27.4 Introduction to Docker
27.5 Containers for Developers
27.6 Containers for IT Professionals
27.7 Configuring Windows Container Host
27.8 Deploying a container
27.9 Building Container Images
27.10 Hyper-V Containers
27.11 A Special Reminder on Hyper-V Container Host
27.12 More about Hyper-V isolation
27.13 Container Networking Concepts
28. Azure Container Instances (ACI)
28.1 Introduction to ACI
28.2 Creating Azure Container Instance
28.3 Viewing Container Logs
28.4 Quota and Limits of Azure Container Instances
29. Azure Container Registry (ACR)
29.1 Introduction to Azure Container Registry, Repository and Images
29.2 Use cases and Key features of Azure Container Registry
29.3 Creating a Private Container Registry
29.4 Pull, Build, Push, Run a container image using Azure Container Registry Tasks
29.5 Azure Container Registry Roles and Permissions
30. On-Premise and Internet DNS
30.1 The Domain Name Space
30.2 Types of Windows DNS Zones
30.3 Active Directory Integrated Zone
30.4 Standard Primary Zone
30.5 Standard Secondary Zone
30.6 Three Methods to Implement a DNS Zone
30.7 Forward Lookup Zone and Host (A) Records
30.8 Reverse Lookup Zone and Pointer (PTR) Records
30.9 Forward Lookup Zone and Mail Exchanger (MX) Records
30.10 Name Server (NS) Record and the Name Servers Tab
30.11 More about Zone Transfer from Primary to Standard Secondary
30.12 DNS Sub-domains
30.13 Background zone loading
30.14 Global Names Zone
30.15 Three Tiers of Caching
30.16 Forwarders
30.17 Root Zone, Root Hints
AZ-801 Configuring Windows Server Hybrid Advanced Services (36 hrs)
1. Advanced DNS Server configuration
1.1 Round Robin Mechanism
1.2 Enable Netmask Ordering
1.3 More about Zone Transfer: AXFR and IXFR
1.4 BIND Secondaries
1.5 DNS Debug Logging
1.6 Removing out-dated DNS records
1.7 Exporting Zone Files
1.8 Securing DNS resource records
1.9 Dynamic Update
1.10 Restricting DNS Server interface binding
1.11 Internet Domain Name Registration
2. DNS Client side configuration
2.1 Configuring DNS client statically
2.2 Configuring DNS client dynamically
2.3 Configuring DNS client by NRPT policy
3. DNS Security Extensions
3.1 Overview of DNSSEC
3.2 Threats of DNS Protocol
3.3 Principal of DNS Security Extension
3.4 A DNSSEC Test Lab scenario
3.5 Configuring and testing DNSSEC
3.6 More about using DNSSEC for Public Internet Domains
4. Windows Server Compute and Virtualization services
4.1 Microsoft Hyper-V Server and Windows Server Hyper-V role
4.2 Hyper-V General Requirements
4.3 Installing Hyper-V Role Service on Windows Server 2022
4.4 Creating a Virtual Machine and Installing a Guest OS
4.5 Installing and Configuring Windows Hyper-V Server
4.6 Configuring Hyper-V Server to accept Remote Management
4.7 Managing Hyper-V Server from a remote location
5. Configure Hyper-V Settings and Virtual Networks
5.1 Configuring VHD Storage location
5.2 Upgrading Virtual Machine Configuration Version
5.3 Checkpoint (Snapshot) Location
5.4 Hot add and Hot removal of Virtual hardware
5.5 Nested Virtualization
5.6 Host Resource Protection
5.7 Windows PowerShell Direct
5.8 Managing Multiple Virtual Machines
5.9 Configuring the Virtual Network
5.10 Guest Network Load Balancing
5.11 Single Root I/O Virtualization
6. Shared Nothing Live Migration
6.1 Concepts of Live Migration
6.2 Configuring Live Migration in a Shared Nothing/Non-Clustered environment
6.3 Performing Live Migration of virtual machine in a Shared Nothing environment
6.4 More about Processor Compatibility Mode
7. Hyper-V Replica Server
7.1 Introduction to Hyper-V Replica
7.2 Configuring Hyper-V Replica
7.3 Testing Failover
7.4 Performing a Planned Failover
7.5 Performing a Un-planned Failover
8. Generation 2 Virtual Machines
8.1 Generation 2 Virtual Machine in Hyper-V
8.2 Storage QoS of Hyper-V
8.3 Enhanced Session Mode
8.4 Automatic Virtual Machine Activation
8.5 Virtual Disk Online Resizing
8.6 Non-Uniform Memory Architecture (NUMA)
8.7 Resource Metering (計量)
8.8 Hyper-V Port Mirroring
8.9 Using ReFS version 2 with Hyper-V
9. Creating and Managing Azure Virtual Machines
9.1 Benefits and Challenges using N-Tier Architecture
9.2 N-Tier architecture with Azure Compute Virtual Machines
9.3 Enabling Auto-shutdown for VM
9.4 Configuring and Managing additional data disk for Azure Virtual Machines
9.5 Configure Azure Disk Encryption
9.6 Resizing Virtual Machines
9.7 Hot Patching
9.8 SMB over QUIC
9.9 SMB over QUIC with Automanage
10. Cross Premises and Hybrid Connectivity
10.1 Introduction to VNet Peering
10.2 Configuring Global VNet Peering
10.3 Options for connecting additional virtual networks
10.4 Point-to-Site VPN and Certification based authentication
10.5 Configuring Azure Site to Site (S2S) VPN
10.6 Azure Virtual Network Adapter
10.7 Microsoft Defender for Cloud
11. Microsoft Defender for Identity
11.1 Introduction to MDI/Azure ATP
11.2 Microsoft Defender for Identity architecture
11.3 Creating a Defender for Identity Instance
11.4 Connect to your On-Premises AD Forest
11.5 Downloading and Installing the Sensor setup package
11.6 Configure Data Steering in MDI Sensor
11.7 About Microsoft Advanced Threat Analytics (ATA)
11.8 Security Posture Assessments with Microsoft Defender for Identity
12. Data Deduplication
12.1 Introduction to Data Deduplication in Windows Server 2022
12.2 Installing and Configuring Data Deduplication
12.3 Data Deduplication enhancements in Window Server
12.4 Additional Interoperability considerations of using Data Deduplication
13. On-Premises Performance Monitoring
13.1 Reliability Analysis Component (RAC)
13.2 Data Collector Set
13.3 Performance Counter Alert
13.4 Event Trace Sessions
14. Azure Recovery Services Vault
14.1 Introduction to Recovery Services Vault
14.2 Creating a Recovery Services Vault
14.3 Back up Windows to Azure
14.4 Back up an Azure Virtual Machine
14.5 Upgrading Azure VM Backup stack V2 (Optional knowledge)
14.6 More about Site-to-Site recovery by using Azure Site Recovery
15. Azure Migrate Appliance
15.1 Introduction to Azure Migrate
15.2 Creating a Migration Project
15.3 Deploying Azure Migrate appliance with VHD template for Hyper-V
15.4 Assess Hyper-V VMs for migration to Azure
15.5 Migrate Hyper-V VMs to Azure
15.6 Running a Test Migration
15.7 Migrating to Azure Virtual Machines
15.8 Completing the migration
15.9 Post-migration best practices
16. Protecting and Securing Windows Credentials
16.1 Attacks to Windows Credential Store
16.2 Requirements of Credential Guard
16.3 Configuring Credential Guard
16.4 Preventing NTLM authentication protocol
17. Just Enough Administration (JEA)
17.1 Overview of Just Enough Administration
17.2 Creating a JEA Role Capability File
17.3 Convert Role Capability File as PowerShell Module
17.4 Creating a JEA Session Configuration File
17.5 Creating a JEA Endpoint
17.6 Connecting to JEA Endpoint
18. Azure ARC
18.1 Introduction to Hybrid Infrastructure Management with Azure ARC
18.2 Azure ARC Enabled Servers
18.3 Onboarding Azure ARC Enabled Servers
18.4 Onboarding ARC Enabled Servers at Scale
18.5 Onboarding ARC Enabled Servers to Microsoft Sentinel
18.6 Detect threats using Microsoft Sentinel
18.7 Moreover Automated Response to Threats
|