AtHand Logo


AtHand Learning System
Total E-Learning Solution

Built-In LMS
Learning Management
Testing Solutions that address the issues you face now.

Windows Server 2008 (Exam 70-647) Enterprise Administrator

Print Version

Learn from AtHand Learning's experts and prepare to certify your knowledge of the Microsoft exam 70-647. This course will prepare you to plan network and application servers, design identity components, design support identity and access managment components and much more (see a full outline at the bottom).

If you are looking to become certified, the ExamPack set will provide all the tools you'll need to accomplish your goal...guaranteed.

If you or your department are looking for reference and learning materials to prepare for a deployment or configure and maintain an existing installation, the Single User and Multi-User sets are for you.

10 levels - 331 modules - 30 learning hours


Available Options

EXAMPACK: Windows Server 2008 (70-647) Enterprise Administrator (10 levels + ExamPrep)
Makau Course Cover - Box Shot  
DVD-ROMs, Practice Exams$899.00Add To Cart
1 YR ONLINE, Practice Exams$899.00Add To Cart
SINGLE USER: Windows Server 2008 (70-647) Enterprise Administrator (10 levels)
Makau Course Cover - Box Shot  
DVD-ROMs$799.00Add To Cart
1 YR ONLINE$799.00Add To Cart
MULTI USER: Windows Server 2008 (70-647) Enterprise Administrator (10 levels)
Makau Course Cover - Box Shot  
DVD-ROMs$1,598.00Add To Cart

Course Instructor: Patrick Loner

Patrick is a network administration trainer for Entré Computer Solutions. He has years of field experience and is certified as a MCT, MCITP, MCSA/MCSE on Windows NT, 2000 and 2003. In addition, he also the following certifications Cisco's CCNA, CompTIA's A+, Network+ and Security+.

Course Outline

Level 1

Designing a Windows Server 2008 Network Infrastructure
Chapter 1: Overview of Network Infrastructure Design Process
  • Introduction
  • Preparing for a Network Infrastructure Design
  • Designing the Network Topology
  • Designing for Virtualization
  • Virtual Machine Connectivity Requirements
  • MAC Addressing for Virtual Machines
  • Summary
Chapter 2: Designing Network Security
  • Introduction
  • The Importance and Principals of Network Security
  • Security Design and Implementation
  • Security Policies and Procedures
  • Identify Network Security Threats
  • Common Network Vulnerabilities
  • STRIDE Threat Model Overview
  • Identifying and Analyzing Risks to Network Security
  • Defense-in-Depth Model Overview
  • Summary
Chapter 3: Designing IP Addressing
  • Introduction
  • Public vs. Private IP Addresses
  • Determining the Number of Subnets and Hosts
  • Designing an IPv6 Addressing Scheme
  • Designing and IPv6 Transition
  • Process and Guidelines for an IPv6 Transition
  • Designing the DHCP Infrastructure
  • DHCP Communication Process
  • Design Options for DHCP Servers
  • Guidelines for Designing the DHCP Infrastructure
  • Determining DHCP Lease Lengths
  • Using Superscopes
  • DHCP Class-Level Options
  • Summary
Level 2

Chapter 4: Designing Routing and Switching Requirements
  • Introduction
  • Security Requirements
  • Selecting Network Devices
  • Designing the Use of Routers
  • Designing the Use of Switches
  • Designing Internet Connectivity Perimeter Networks
  • NAT for Internet Security
  • Strategies for Firewall Design
  • Designing Routing Communications
  • Choosing a Routing Protocol
  • Understanding and Designing Packet Filters
  • Evaluating Site-To-Site Connectivity Options
  • Evaluating Network Performance
  • Quality of Service
  • Summary
Chapter 5: Designing Name Resolution
  • Introduction
  • Name Resolution Requirements and Considerations
  • Identifying Locations and Application Requirements
  • Designing a DNS Server Strategy
  • Determining DNS Server Hardware Requirements and Placement
  • Planning DNS Server Roles
  • Securing DNS Servers
  • Designing DNS Zone Implementations
  • Standard vs. Active Directory DNS Zones
  • Zone Security Considerations
  • Designing Zone Transfers
  • Designing Delegation of DNS Zones
  • DNS Zones Demo
  • Summary
Chapter 6: Designing Advanced Name Resolution
  • Introduction
  • Modifications that Optimize DNS Servers
  • DNS Troubleshooting Tools
  • Designing DNS for High Availability and Security
  • Designing a WINS Name Resolution Strategy
  • Designing WINS Replication
  • Transitioning from WINS
  • DNS Optimization Demo
  • Summary
Level 3

Chapter 7: Designing Security for Internal Networks
  • Introduction
  • Designing Windows Firewall Implementations
  • Overview of IPSec
  • Connection Security Rules
  • IPSec Authentication Types
  • Designing an IPSec Implementation
  • Summary
Chapter 8: Designing Networks Access Solutions
  • Introduction
  • Determining Network Access Requirements
  • Securing and Controlling Network Access
  • Authentication Methods
  • Encryption Methods
  • Network Policies
  • Creating and Configuring Network Policies Demo
  • Remote Access Monitoring
  • Designing Remote Access Services
  • VPN Tunneling Protocols
  • Hardware Considerations and Server Placement
  • User Environment Configuration
  • Designing RADIUS Authentication and Network POlicy Services
  • Connection Request Policies
  • Designing Wireless Access
  • Wireless Security
  • Using RADIUS for Wireless Authentication
  • Hardware Considerations
  • Summary
Chapter 9: Designing Networks Access Protection
  • Introduction
  • NAP Architecture
  • Network Layer Protection
  • Host Layer Protection
  • NAP Enforcement
  • DHCP Enforcement
  • VPN Enforcement
  • IPSec Enforcement
  • Designing NAP Policies
  • Designing Considerations for NAP
  • Configuring NAP for DHCP Clients Demo
  • Summary
Level 4

Chapter 10: Designing File Services and DFS
  • Introduction
  • Evaluating Windows File Services
  • Understanding Distributed File System
  • Analyzing High Availability for File Services
  • Designing a Distributed File System
  • Designing DFS Namespaces
  • Designing DFS Replication
  • Designing File Server Resource Manager Configuration
  • FSRM Quotas
  • Deploying FSRM Utility Demo
  • Summary
Chapter 11: Designing Print Services
  • Introduction
  • Considerations for Print Services
  • Windows Server 2008 Printing Features
  • XPS-Based Printing
  • Print Management Console
  • Print Management Console Demo
  • Printer Driver Store
  • Internet Printing Protocol
  • Designing Print Services
  • Summary
Chapter 12: Designing High Availability
  • Introduction
  • Defining and Documenting High Availability Requirements
  • Infrastructure Requirements for High Availability
  • High Availability Options in Windows Server 2008
  • Overview of Network Load Balancing
  • Sharing Application Data for NLB
  • Designing Host Affinity and Priority
  • Selecting Network Communication Methods for NLB
  • Designing Failover Clustering
  • Overview of Failover Clustering
  • Shared Storage for Failover Clustering
  • Quorum Configuration for Failover Clustering
  • Guidelines for Designing Failover Clusters
  • Designing Geographically Dispersed Clusters
  • Summary
Level 5

Designing a Windows Server 2008 Active Directory Infrastructure and Services
Chapter 1: Designing the Logical Structure within Active Directory
  • Introduction
  • Determining Directory Service Requirements
  • Overview of Active Directory DS Design Requirements
  • Business and Technical Requirements
  • Administrative and Security Requirements
  • Documenting Active Directory Design
  • Designing the Active Directory Forest and Forest Trusts
  • Choosing the AD Forest Model
  • Forest Functional Levels
  • Types of Active Directory Trust Relationships
  • Design Methodology and Best Practices
  • Active Directory Domains and Domain Trusts
  • AD DS Functional Levels
  • AD DS Domain Trusts
  • Integration of DNS Namespaces
  • Designing Active Directory Integrated DNS
  • Integration with Current DNS Infrastructure
  • Domain Controller Deployment
  • Summary
Chapter 2: Designing the Physical Structure of Active Directory
  • Introduction
  • Collecting Information for AD Site Design
  • Evaluating AD DS Site Models
  • Understanding Automatic Site Coverage
  • Designing Active Directory Replication
  • Types of Replication Typologies
  • Understanding and Implementing a Replication Design
  • Site Links and Bridgehead Servers
  • Server Locations
  • Summary
Chapter 3: Designing Administrative Structures for Active Directory
  • Introduction
  • Types of Administrative Models
  • Information Gathering for Designing Administrative Structures
  • Designing Organizational Unit Structures
  • Delegation of Control Strategies
  • Group Policy Structures
  • Designing Group Strategies
  • Guidelines for Developing a Group Naming Strategy
  • Strategies for Using Groups to Access Resources
  • Strategies for Placing Groups Objects
  • Designing User and Computer Accounts
  • Summary
Level 6

Chapter 4: Designing Group Policy
  • Introduction
  • Gathering Organizational Information
  • Desktop Management and Security Requirements
  • Administrative Processes Information
  • Settings
  • Defining and Configuring Group Policy Settings
  • Demo Group Policy Management
  • Designing Administrative Templates
  • Deployment
  • Inheritance
  • Filtering
  • Administration
  • Summary
Chapter 5: Designing Security for Active Directory
  • Introduction
  • Gathering Information for Designing Account Security Policies
  • Fundamentals of Active Directory Security
  • Fine-Grained Password Policies in Windows Server 2008
  • Demo Setting Fine-Grained Password Policies
  • Designing Domain Controller Security
  • Server core Domain Controllers
  • Deploying Read Only Domain Controllers
  • Designing the Delegation of Administrative Control
  • Creating a Delegation Model
  • Auditing of Administrative Access
  • Summary
Level 7

Chapter 6: Designing High Availability and Disaster Recovery for Active Directory
  • Introduction
  • High Availability Fundamentals
  • Designing a High Availability Strategy
  • High Availability for DNS
  • Database Maintenance Strategies
  • Designing an AD Backup and Recovery Stategy
  • Planning and Implementing Restore Procedures
  • Best Practices for Backup and Recovery
  • Designing an Active Directory Monitoring Strategy
  • Tools for Monitoring Active Directory
  • Summary
Chapter 7: Designing a Public Key Infrastructure with AD Certificate Services(AD CS)
  • Introduction
  • Overview of Public Key Infrastructure and AD CS
  • Certificate Authorities
  • Active Directory Certificate Services(AD CS)
  • Certifiate Authority (CA) Hierarchy
  • CA Hierarchy Roles
  • Creating and Managing Certificates
  • Certificate Distribution and Revocation
  • Certificate Revocation Processes
  • Summary
Level 8

Chapter 8: Designing Rights Management Services
  • Introduction
  • What is Active Dircetory Right Managment Services(AD RMS)
  • Key Components of an AD RMS Solution
  • Designing Access to AD RMS
  • RMS Clusters
  • RMS Disater Recovery
  • Summary
Chapter 9: Designing an Acitve Directory Federation Services Implementation
  • Introduction
  • Understing Active Directory Federation Services (AD FS)
  • Deployment Scenarios
  • AD FS Server Roles and Placement
  • Business-to-Business Federation Trust
  • AD FS Claims and Applications
  • Summary
Level 9

Chapter 10: Designing an Active Directory Light Weight Services Implementation
  • Introduction
  • Understanding AD Light Weight Directory Services(LDS)
  • AD LDS Deployment Scenarios
  • Overview of an AD LDS Implementation Design
  • AD LDS Replication Scenarios
  • Integrating AD LDS with AD DS
  • Designing AD LDS Schema and Replication
  • Summary
Chapter 11: Designing AD Migrations to Windows Server 2008
  • Introduction
  • AD DS Upgrade Strategies
  • Criteria and Guidelines for Choosing a Migration Strategy
  • Designing the Active Directory Upgrade
  • Designing the Active Directory Restructure
  • Summary
Level 10

Designing a Windows Server 2008 Applications Infrastructure
Chapter 1: Working with Web Farms
  • Introduction
  • Design Considerations for IIS 7.0 Web Farms
  • OS and IIS Configuration Options
  • Planning the Hardware for a Web Farm
  • Overview of Web Farms
  • Working with Load Balancing
  • DFS Enabled Share
  • Managing Content for Web Farms
  • Summary
Chapter 2: Optimization
  • Introduction
  • Hosting Application Pools
  • Basic Properties of an Application Pool
  • Script Mapping
  • Managing Bandwidth
  • Bandwidth Allocation
  • WSRM Demo
  • Logging Web Traffic
  • Guidelines for Auditing Logs
  • Web Site and Web Application Logs
  • Internet Information Services (IIS) 7.0 Demo
  • Summary
Chapter 3: Planning for Security
  • Introduction
  • Transport Security
  • Configuring a Secure Web Server
  • Importing Certificates
  • Installing a Certificate to a Web Site
  • Authentication and Authorization
  • Designing Delegation Administration
  • Delegating Administration
  • Setting Permissions in IIS 7.0 Demo
  • Summary
Chapter 4: Designing IIS Maintenance and UDDI
  • Introduction
  • IIS Backup and Recovery
  • Centralized Configuration
  • Monitoring with IIS 7.0
  • IIS 7.0 Logging Modules
  • Configuring Tracing in IIS 7.0 Demo
  • Deploying UDDI Services
  • Requirements for UDDI
  • Application Pool Management Demo
  • Summary
Chapter 5: Planning and Designing Terminal Services Infrastructure
  • Introduction
  • Licensing with Terminal Services
  • Checklist for TS Licensing
  • Adding the TS Licensing Role Demo
  • Connection Properties
  • Remote Desktop Connection Display (cont.)
  • Designing Device Redirection
  • Designing a TS Gateway
  • Prerequisites for TS Gateway Functionality
  • Installing the TS Gateway Role Demo
  • Exploring the TS Session Broker
  • Overview of TS RemoteApp Programs
  • Designing TS Web Access
  • Summary
Chapter 6: Designing Virtualization Infrastructure
  • Introduction
  • Application Resource Management
  • Group Policy Settings and Terminal Servers
  • Designing for High Availability
  • Specifying Maintenance and Recovery
  • Summary
Chapter 7: Designing Virtualization Provisioning
  • Introduction
  • Virtualization in a Lab Environment
  • Designing Virtual Server Hosting
  • Virtualization and Migration of Legacy Applications
  • Design Considerations for Virtualization
  • The Virtualized Development Environment
  • Customization to Standard Configuration
  • Virtual Server Provisioning Workflow Model
  • Suitability for Virtualization
  • Customization to Standard Configuration
  • Deployment of Virtualization
  • Summary