找回密码
 注册
搜索
热搜: 超星 读书 找书
查看: 6081|回复: 0

[[资料]] [5.13][转帖][EM][视频教程]《Windows Server 2008企业管理员考试培训视频教程》[I

[复制链接]
发表于 2011-5-13 19:28:00 | 显示全部楼层 |阅读模式
中文名: Windows Server 2008企业管理员考试培训视频教程
英文名: CBT Nuggets : Microsoft 70-647: Windows Server 2008, Enterprise Administrator PRO
资源格式: 光盘镜像
发行日期: 2010年
地区: 美国
对白语言: 英语
文字语言: 英文

简介:


资源简介

CBT NUGGETS出品的考试教学课程:Microsoft 70-647 Windows Server 2008 EA认证考试 (Windows Server 2008 Enterprise Administrator)

主讲:James I. Conrad | 时长:16 小时

课程提供了最全面的一站式培训解决方案,帮助读者准备通过Microsoft 70-647 考试。学习安装、配置、监控Exchange Server 2007。

MCITP: Enterprise Administrator (EA) Certification 认证你的Windows基础设施设计技能,以及在Windows Server 2008中的工作能力。70-647是获得这一资格必需的认证考试。

简介翻译摘自 gaodeji71@TLF

教程名称:Microsoft 70-647: Windows Server 2008, Enterprise Administrator PRO

主讲人:James I. Conrad 视频课时:共24个小节教学.


官网链接:http://www.cbtnuggets.com/series?id=459

Passing Microsoft''s 70-647 Enterprise Administrator exam is your final step towards earning Microsoft''s premiere Server 2008 MCITP certification.

It says you''re ready to implement new capabilities and higher security in a medium-to-large enterprise using the latest advances in Windows Server 2008 technologies. And once you''ve completed this terrific video training series from Microsoft expert James Conrad, you will be ready.

By the time you''ve finished watching James''s fantastic series you''ll have your servers running reliably and secure, and you''ll be ready for the 70-647 exam.




目录:

What You'll Learn

Series 1:
*
Video 1: Intro|07:30

*
Video 2: Design Active Directory Forests and Domains|35:22

Designing Core Identity and Access Management Components; Design Active Directory Forests and Domains; purpose of active directory; enterprise directory; internet directory; network operating system; reasons for single and multiple forests; reasons for single and multiple domains; administrative autonomy; administrative isolation; custom schema modifications; enterprise admins; domain admins; forest root; dedicated forest root; empty forest root.
*
Video 3: Forest and Domain Functional Levels|36:21

Designing Core Identity and Access Management Components; Design Active Directory Forests and Domains; Plan for Interoperability; inter-organizational authorization and authentication; forest and domain functional levels; Domain functional level; forest functional level; fine-grained password policy; forest trust; domain rename; linked value replication; rodc; knowledge consistency checker; KCC; intersite topology generator; ISTG; inetorgperson, DFS-R Sysvol replication; domain controller rename; LastLogonTimestamp; redirusr; redircmp; selective authentication; constrained delegation; authorization manager.D6
*
Video 4: UPN and ADPREP|16:56

Designing Core Identity and Access Management Components, design active directory forests and domains, user principal name (UPN), adprep, /forestprep, /domainprep, /gpprep, /rodcprep.
*
Video 5: Trust Relationships|28:05

Designing Core Identity and Access Management Components, design active directory forests and domains, intra-organizational authorization and authentication, Cross-forest authentication, manual trust, external trust, realm trust, UNIX kerberos v5 trust, forest trust, shortcut trust.
*
Video 6: Active Directory Physical Topology|38:28

Designing Core Identity and Access Management Components, Placement of servers, site and replication topology, repadmin /bridgeheads, intrasite replication, intersite replication, sites, connection objects, site links, bridgehead servers, site link cost, replication interval, replication schedule, subnets.
*
Video 7: Global Catalog, Universal Group Membership Caching, Printer Location Policy|25:28

Designing Core Identity and Access Management Components, Placement of servers, site and replication topology, global catalog, universal group membership caching, printer location tracking.
*
Video 8: Read Only Domain Controllers (RODC)|39:08

Design the Branch Office Deployment, Authentication Strategy, Server Security. Configure the Read-Only Domain Controller (RODC), dcpromo, advanced options, answer files, Universal Group Membership Caching (UGMC), global catalog, adprep /rodcprep, credential caching, cached passwords; administrator role separation, decommissioning domain controllers.
*
Video 9: The Active Directory Administrative Model|41:12

Design the Active Directory Administrative Model, delegation, group strategy, compliance auditing, group administration, organizational structure, auditpol.exe.
*
Video 10: Enterprise-Level Group Policy Strategy|01:11:17

Design the enterprise-level group policy strategy. group policy hierarchy and scope filtering, control device installation, authentication and authorization, organizational structure, organizational unity design, scope of management, order of inheritance, modify group policy scope, WMI filters, windows management instrumentation, software deployment using GPO, template files, adm files, admx files, central store.
*
Video 11: Upgrade and Migrate Domains, Interoperability|33:43

Plan for interoperability. inter-organizational authorization and authentication, application authentication interoperability, cross-platform interoperability, Designing support identity and access management components, cross-forest authentication, backward compatibility, object migration, active directory migration tool 3.1, ADMT, active directory federation services, AD FS, domain upgrade, domain restructure, domain upgrade-then-restructure, identity lifecycle manager feature pack 1, ILM FP1, metaverse, identity management for unix, password synchronization, subsystem for UNIX-based applications, SUA, server for NIS, services for NFS.
*
Video 12: IP Addressing|55:43

Planning network and application services, Plan for name resolution and IP addressing, IP addressing scheme, TCP/IP version coexistence, 128-bit addresses, 8 groups of hex characters, IPv4, IPv6, Link-local address, FE80, Unique-local, site-local address, global scope address, internet 2, anycast, transitioning to IPv6, transition richness, dual-stack routers, tunneling 6to4, tunneling 4to6, NAT Protocol Translation, NAT-PT, teredo.
*
Video 13: DNS|01:01:09

Plan for name resolution, internal and external naming strategy, naming resolution support for legacy clients, naming resolution for directory services. background zone loading, IPv6 support, primary read-only zone, global names zone, GNZ, WINS, dynamic update, netbios name, fully qualified domain name, fqdn, authoritative dns server, dnscmd, split dns, overlapping namespace, cname, isa server, primary zone, primary active directory-integrated zone, secondary zone, DomainDNSzones, ForestDNSzones, child domains, delegation, stub zone, nslookup, glue records, reverse lookup, forwarders, internet root, top level domain servers, TLD servers, caching only dns servers, conditional forwards, dynamic update, secure dynamic update, insecure dynamic update.
*
Video 14: Network Access|46:51

Design for Network Access, network access policies, remote access strategy, perimeter networks, server and domain isolation. Virtual private network, vpn, layer two tunneling protocol, l2tp, point-to-point tunneling protocol, pptp, secure socket tunneling protocol, sstp, eap, eap-tls, peap, ms-chap v2, network access protection, health policy, health registration authority, hra, health requirement server, NAP health policy servers, system health agent, remediation servers, antivirus definitions, restricted network, malware.
*
Video 15: Terminal Services|52:50

Plan for Terminal Services. Terminal Services Licensing, Terminal Services Infrastructure, Terminal Server Fram, terminal services license servers, terminal services gateway servers (TS Gateway), per user client access license, per device client access license, CAL, terminal services web access, terminal services connection authorization policies (TS CAP), terminal services resource authorization policies (TS RAP), terminal services session broker, windows system resource manager (WSRM).
*
Video 16: Application Delivery|47:10

Plan for Application Delivery, Application virtualization, presentation virtualization, locally installed software, softgrid, Microsoft system center application virtualization, management server, app-v, application virtualization client, application virtualization sequencer, port 554, firewall rules.
*
Video 17: Business Continuity|54:41

Plan for business continuity, service availability, directory service recovery. Network load balancing, NLB, clustering, quorum, witness, terminal server farm, web farm, isa server farm, flexible single master operation, operation master, pdc emulator, rid master, schema master, infrastructure master, domain naming master.
*
Video 18: Software Updates|52:15

Design for software updates and compliance management, patch management, patch management compliance, Microsoft update and windows update, windows server update services, WSUS, System center essentials 2007, SCE, system center configuration manager 2007, SCCM, system center operations manager 2007, SCOM.
*
Video 19: Compliance Management|23:16

Design for software updates and compliance management, security baselines, Microsoft baseline security analyzer, MBSA, security configuration wizard, SCW, SCCM baseline, auditing, WSUS.
*
Video 20: Virtualization Strategy|25:03

Design the operating system virtualization strategy, server consolidation, application compatibility, virtualization management, placement of servers, server consolidation, application virtualization, hyper-v, hyper-v clustering, system center virtual machine manager, iSCSI, fibre-channel san, FC-SAN, sandboxing, serial attached scsi, SAS.
*
Video 21: Data Management and Access|01:02:03

Data Design for data management and data access. Data security, data accessibility, data redundancy, data collaboration, Windows Sharepoint Services, WSS, Microsoft Office Sharepoint Services, MOSS, Distributed File System, DFS, Rights management services, RMS, BitLocker, Windows Server Backup, system state, authoritative restore, wbadmin, complete PC restore.
*
Video 22: Designing a PKI Part 1|37:49

Design and Implement Public Key Infrastructure, Certificate lifecycle management, encryption, signing, hash value, sha-1, certificate templates V1, V2, V3, security requirements, business requirements, active directory, code signing, encrypting file system, EFS, message digest, signature function, private key, public key, S/MIME, clear signed, opaque signed, network device enrollment service, NDES, simple certificate enrollment protocol, SCEP, key length, key lifetime, algorithm.
*
Video 23: Designing a PKI Part 2|28:28

Design and Implement Public Key Infrastructure, enterprise certificate authority CA, standalone certificate authority, root ca, subordinate ca, policy ca, issuing ca, internal ca, external ca, certificate template versions, V1, V2, V3.
*
Video 24: Designing a PKI Part 3|52:20

Design and Implement Public Key Infrastructure, certificate revocation, certificate revocation list, CRL, authority information access AIA, CRL distribution point CDP, smart card enrollment, enrollment agents, certificate templates, autoenrollment, web server certificates.


下载地址:
[Windows.Server.2008企业管理员考试培训视频教程].CBT.Nuggets.Microsoft.70-647.Windows.Server.2008.Enterprise.Administrator.PRO.DVD-iNKiSO.iso (1.14 GB)color]

ed2k://|file|%5BWindows.Server.2008%E4%BC%81%E4%B8%9A%E7%AE%A1%E7%90%86%E5%91%98%E8%80%83%E8%AF%95%E5%9F%B9%E8%AE%AD%E8%A7%86%E9%A2%91%E6%95%99%E7%A8%8B%5D.CBT.Nuggets.Microsoft.70-647.Windows.Server.2008.Enterprise.Administrator.PRO.DVD-iNKiSO.nfo|8040|70285f4757d5d25f45e54fd30a67a2e8|h=4op57j4q74zsocdt7e4l4v477flhvjao|

转帖地址:http://www.verycd.com/topics/2872004/

发布者ID:xiaochenjia

完成情况(健康度):完成下载

资源的杀毒情况:无毒

测试软件:迅雷

测试截图:







本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有账号?注册

×
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 注册

本版积分规则

Archiver|手机版|小黑屋|网上读书园地

GMT+8, 2024-11-21 16:36 , Processed in 0.178746 second(s), 20 queries .

Powered by Discuz! X3.5

© 2001-2024 Discuz! Team.

快速回复 返回顶部 返回列表