Learn: in:
» back to Search Results

Course rating of 0 Vendor rating of 4

This course covers the core skills required by anyone working with Windows Server 2008 Servers.

Course Outline

Module 1: Introduction to Managing Microsoft Windows Server 2008 Environment
The module explains server roles, Active Directory, the Windows Server 2008 Administrative Tools and Remote Desktop.
  • Server Roles
  • Overview of Active Directory
  • Using Windows Server 2008 Administrative Tools
  • Using Remote Desktop for Administration
Lab : Administering Windows Server 2008
  • Install the DNS Server Role
  • Configuring Remote Desktop for Administration
After completing this module, students will be able to:
  • Describe server roles and how they are categorized.
  • Describe the characteristics of Active Directory components.
  • Describe common Windows Server 2008 Administrative Tools.
  • Describe how to use Remote Desktop for Administration

Module 2: Creating Active Directory Domain Services User and Computer Objects
This module explains how to manage user accounts, create computer accounts and manage AD DS objects.
  • Managing User Accounts
  • Creating Computer Accounts
  • Automating AD DS Object Management
  • Using Queries to Locate Objects in AD DS
Lab : Creating AD DS User and Computer Accounts
  • Creating and Configuring User Accounts
  • Creating and Configuring Computer Accounts
  • Automating the Management of AD DS Objects
After completing this module, students will be able to:
  • Configure AD DS user accounts.
  • Configure AD DS computer accounts.
  • Automate AD DS Object Management.
  • Use queries to search AD DS.

Module 3: Creating Groups and Organizational Units
This module introduces groups and how to manage them.
  • Introduction to AD DS Groups
  • Managing Group Accounts
  • Creating Organizational UnitsLab : Creating an OU Infrastructure
  • Creating AD DS Groups
  • Planning an OU Hierarchy (Discussion)
  • Creating an OU Hierarchy
After completing this module, students will be able to:
  • Describe the options for creating groups.
  • Configure groups in AD DS.
  • Configure OUs in AD DS.

Module 4: Managing Access to Resources in Active Directory Domain Services
The module explains how to manage access and assign and manage permissions.
  • Managing Access Overview
  • Managing NTFS File and Folder Permissions
  • Assigning Permissions to Shared Resources
  • Determining Effective Permission
Lab : Managing Access to Resources
  • Planning a Shared Folder Implementation (Discussion)
  • Implementing a Shared Folder Implementation
  • Evaluating the Shared Folder Implementation
After completing this module, students will be able to:
  • Describe how access management works in AD DS.
  • Assign permissions to shared folders.
  • Configure permissions using NTFS.
  • Determine effective permissions.

Module 5: Configuring Active Directory Objects and Trusts
This module explains how to delegate administrative access to AD DS objects and how to configure AD DS Trusts.
  • Delegating Administrative Access to AD DS Objects
  • Configuring AD DS Trusts
Lab : Configuring Active Directory Delegation
  • Delegating Control of AD DS Objects
Lab : Configuring Active Directory Trusts
  • Configuring AD DS Trusts
After completing this module, students will be able to:
  • Delegate administrative access to Active Directory objects.
  • Configure Active Directory trusts.

Module 6: Creating and Configuring Group Policy
This module explains how to configure and manage Group Policy Objects.
  • Overview of Group Policy
  • Configuring the Scope of Group Policy Objects
  • Evaluating the Application of Group Policy Objects
  • Managing Group Policy Objects
  • Delegating Administrative Control of Group Policy
Lab : Creating and Configuring GPOs
  • Creating and Configuring Group Policy Objects
  • Managing the Scope of GPO Application
Lab : Verifying and Managing GPOs
  • Verifying GPO Application
  • Managing GPOs
  • Delegating Administrative Control of GPOs
After completing this module, students will be able to:
  • Describe Group Policy.
  • Configure the application scope for Group Policy Objects.
  • Evaluate the application of Group Policy Objects.
  • Manage Group Policy Objects.
  • Delegate administrative control of Group Policy Objects.

Module 7: Configuring User and Computer Environments Using Group Policy
This module explains how to configure user environments using group policy.
  • Configuring Group Policy Settings
  • Configuring Scripts and Folder Redirection Using Group Policy
  • Configuring Administrative Templates
  • Deploying Software Using Group Policy
  • Configuring Group Policy Preferences
  • Introduction to Group Policy Troubleshooting
  • Troubleshooting Group Policy Application
  • Troubleshooting Group Policy Settings
Lab : Configuring Scripts and Folder Redirection Using Group Policy
  • Configuring Logon Scripts and Folder Redirection
Lab : Configuring Administrative Templates
  • Configure Administrative Templates
Lab : Deploying Software with Group Policy
  • Deploy a Software Package with Group Policy
  • Verify Software Installation
Lab : Configuring Group Policy Preferences
  • Configure Group Policy Preferences
  • Verify Group Policy Preferences Application
Lab : Troubleshooting Group Policy Issues
  • Troubleshoot Group Policy Scripts
  • Troubleshoot GPO Lab-7B
  • Troubleshoot GPO Lab-7C
  • Troubleshoot GPO Lab-7D
After completing this module, students will be able to:
  • Configure Group Policy settings.
  • Configure scripts and folder redirection by using Group Policy.
  • Configure administrative templates.
  • Configure Group Policy Preferences.
  • Deploy software by using Group Policy.
  • Troubleshoot Group Policy Application.
  • Troubleshoot Group Policy Settings.

Module 8: Implementing Security Using Group Policy
This module explains how to configure security policies, implement password policies, restrict access to software and user security templates.
  • Configuring Security Policies
  • Implementing Fine-Grained Password Policies
  • Restricting Group Membership and Access to Software
  • Managing Security Using Security Templates
Lab : Implementing Security Using Group Policies
  • Configuring Account and Security Policy Settings
  • Implementing Fine-Grained Password Policies
Lab : Configuring and Verifying Security Policies
  • Configuring Restricted Groups and Software Restriction Policies
  • Configuring Security Templates
  • Verifying the Security Configuration
After completing this module, students will be able to:
  • Configure security policies.
  • Implement fine-grained password policies.
  • Restrict group membership and access to applications by using security policies.
  • Apply security policies by using security templates.

Module 9: Configuring Server Security Compliance
This module explains how to secure a windows infrastructure, configure an audit policy, manage WSUS and plan for a security update.
  • Securing a Windows Infrastructure
  • Configuring an Audit Policy
  • Overview of Windows Server Update Services (WSUS)
  • Managing WSUS
Lab : Manage Server Security
  • Configuring Windows Software Update Services
  • Configure Auditing
After completing this module, students will be able to:
  • Secure a server role within a windows infrastructure.
  • Configure an audit policy.
  • •Describe the use of Windows Server Update Services.
  • •Manage updates using WSUS.
  • •Plan for security update management by using Windows Server Update Services (WSUS).

Module 10: Configuring and Managing Storage Technologies
This module explains how to manage storage using File Server Resource Manager, configure quota management, implement file screening and manage storage reports.
•Windows Server 2008 Storage Management Overview
•Managing Storage Using File Server Resource Manager
•Configuring Quota Management
•Implementing File Screening
•Managing Storage Reports
•Understanding Storage Area Networks
Lab : Installing the FSRM Role Service
•Installing the FSRM Role Service
Lab : Configuring Storage Quotas
•Configuring Storage Quotas
Lab : Configuring File Screening
•Configuring File Screening
Lab : Generating Storage Reports
•Generating Storage Reports
After completing this module, students will be able to:
•Describe storage management solutions included in Windows Server 2008.
•Manage storage using FSRM.
•Configure quota management using FSRM.
•Implement file screening using FSRM.
•Manage storage reports.
•Troubleshoot storage issues.

Module 11: Configuring and Managing Distributed File System
This module explains how to configure DFS namespaces and replication.
•Distributed Files System (DFS) Overview
•Configuring DFS Namespaces
•Configuring DFS Replication
Lab : Installing the Distributed File System Role Service and Creating a DFS Namespace
•Installing the Distributed File System Role Service
•Creating a DFS Namespace
Lab : Configuring Folder Targets and Viewing Diagnostic Reports
•Configuring Folder Targets and Folder Replication
•Viewing Diagnostic Reports for Replicated Folders
After completing this module, students will be able to:
•Describe the distributed file system.
•Manage DFS namespaces.
•Configure DFS replication.

Module 12: Configuring Network Access Protection
This module explains how to configure, monitor and troubleshoot NAP.
•Overview of Network Access Protection
•How NAP Works
•Configuring NAP
•Monitoring and Troubleshooting NAP
Lab : Configuring NAP for DHCP and VPN
•Configuring NAP for DHCP Clients
•Configuring NAP for VPN Clients
After completing this module, students will be able to:
•Describe the benefits and uses of NAP.
•Describe how NAP works in various access scenarios.
•Configure NAP.
•Monitor and troubleshoot NAP.

Module 13: Configuring Availability of Network Resources
This module explains how to configure shadow copies and provide server and service availability.
•Configuring Shadow Copies
•Providing Server and Service Availability
Lab : Configuring Shadow Copying
•Configuring Shadow Copying
Lab : Configuring and Testing Network Load Balancing
•Configuring and Testing Network Load Balancing
After completing this module, students will be able to:
•Configure shadow copies.
•Provide server and service availability.

Module 14: Monitoring and Maintaining Windows Server 2008 Servers
This module explains how to monitor and maintain Windows Server 2008 servers.
•Planning Monitoring Tasks•Calculating a Server Baseline
•Measuring Performance Objects
•Selecting Appropriate Monitoring Tools
•Planning Notification Methods
•Overview of Windows Server 2008 Maintenance Tasks•Automating Windows Server 2008 Maintenance
Lab : Identifying Windows Server 2008 Monitoring Requirements
•Evaluating Performance Metrics
•Monitoring Performance Metrics
Lab : Configuring Windows Server 2008 Monitoring
•Configuring Data Collector Sets
•Monitoring Extension Exercise
•Automating Maintenance Tasks
After completing this module, students will be able to:
•Plan monitoring tasks.
•Determine an appropriate server baseline.
•Determine objects and counters to monitor based on server role.
•Analyze key performance counters.
•Select appropriate monitoring tools.
•Identify appropriate notification methods.
•Create a server management task schedule for Windows Server 2008.
•List automated maintenance tools for Windows Server 2008.

Module 15: Managing Windows Server 2008 Backup and Restore
This module explains how to back up and restore Windows Server 2008 servers.
•Planning Backups with Windows Server 2008
•Planning Backup Policy on Windows Server 2008
•Planning a Server Restore Policy
•Planning an EFS Restore Policy
•Troubleshooting Windows Server 2008 Startup
Lab : Planning Windows Server 2008 Backup Policy
•Evaluating the Existing Backup Plan
•Updating the Backup Policy
•Reviewing Backup Policy and Plans
•Implementing the Backup Policy
Lab : Planning Windows Server 2008 Restore
•Evaluating Backup Data
•Planning a Restore
•Investigating a Failed Restore
•Restoring System State Data
After completing this module, students will be able to:
•Create a backup and recovery plan by using Windows Server Backup.
•Develop a backup policy for Windows Server Backup.
•Create a server restore plan.
•Create a plan for restoring Encrypting File System (EFS) files.
•Verify the restore procedure.
Prerequisites & Certificates

Before attending this course, students must have: •At least one year experience operating Windows Servers in the area of account management, server maintenance, server monitoring, or server security. •A+, Server+, hardware portion of Net+, and familiarity with Windows (client side). •Working knowledge of networking technologies. •Intermediate understanding of network operating systems. •Working experience with Windows Server 2003 and Windows Server 2008. •Basic knowledge of Active Directory. •An understanding of security concepts and methodologies (for example, corporate policies). •Basic knowledge of TCP/IP. •Basic knowledge of scripting tools such as Powershell and WMI.

Certificates offered

Cancellation Policy
Cancellations or postponements received more than ten business days prior to the first day of the course, will be subject to a 15% administration fee, and course ware fees where applicable. The cost of the course is payable, in full, for any cancellations or postponements received within ten business days, or less, prior to the first day of the course.

Map & Reviews
TekSource Corporate Learning
[ View Provider's Profile ]


This course has not yet been rated by one of our members.

If you have taken a course through this vendor please log into your account and leave feedback for this vendor. You will be helping ensure our members get directed to the best training facilities.

Here are some reviews of the training vendor.
A quick note to say thanks very much for the information I garnered at the course. The training was very informative and practical; the handout material contains a lot of information that will be helpful in future.
Reviewed by 2014
I found the course to be useful and easy to follow. Would use their service again.
Reviewed by 2014
I really enjoyed this training session, I found it incredible helpful for our needs of customizing our CRM. The instructor was good
Reviewed by 2013
By choice, and as I didn't want to disturb the man next to me, I didn't ask to many questions of the instructor. I realize that taking the same course at the same time would have been ideal, but I understand why we were put in the same space. I had a few computer glitches which shuffled the course material around a bit which I eventually found a work around for. A lot of material for one day and I did find myself paying attention to the clock to make sure I finished at a reasonable time.
Reviewed by 2012
very well organized and flexible. Helped me with my specific needs. Steve was very helpful.
Reviewed by 2012
I thought that the course content was excellent, it covered a wide variety of new features in 2010 at a sufficeint level of detail. The video instructor was also very diliegent about highlighting the various ribbon features and showing alternate methods of completing a task. This teaching method may not be for everyone, but I enjoyed the ability to learn at my own pace, without being slowed down by questions that were not relevant to me. It would be nice to have better control over the video streaming in order to skip over/ahead on topics that are familiar to the user.
Reviewed by 2012
the instructor was very knowledgeable, and most importantly patient.
Reviewed by 2012
Found that the advance training was where my level was at already on most items (wishing there was a super advanced training). Found the ‘instructor’ not to be conversant on the program I was being trained on (probably the same level as I was) which was frustrating. He did ask other personnel which did have more knowledge but did not give me a clear answer (said it was part of the limits of the program and what I was looking for was very customized, duh this is why I took the advanced) He was willing to go over the ideas of tables and relationships with me which was not covered in the course, which I was thankful for. The course did delivered though what it had said it would and it was good to get reinforcement on what I had learned on my own, that I was on the right track.
Reviewed by 2012
The course was really useful for me.
Reviewed by 2012
over all it is a good experience and I learnt something out of it.
Reviewed by 2012
Course content was not as comprehensive as I'd hoped. Would have liked more indepth lessons about macros.
Reviewed by 2012
It would be great to separate two different session for the topic. It was usufull and meantime it was too much information.
Reviewed by 2012
Hi, There was one problem with the flow. I'm not completely sure as to how best to describe it but basically, it didn't flow from one module to the next. Specifically, if I was in a particular module (say the introduction or first sub-module) and it completed, I was not automatically taken to the next sub-module within the overall module (a module being a section of the course). Feel free to give me a call to discuss at 416-686-3141.
Reviewed by 2012
The first hour of the course was difficult due to the noisy environment. There were 3 separate software platforms being mentored by 2 instructors simultaneously. As each required unique start up instructions, it was very difficult to concentrate on the video teaching for my session in spite of the headphones as there was a significant amount of background noise. I suggest that future sessions that are mentored rather than led be done as dedicated sessions (i.e. only 1 software platform being taught at a time) to minimize the impact of this situation. Additionally, the 2 instructors had side conversations that had nothing to do with teaching the sessions and needed to be asked not to do this as I found it was hindering my ability to listen to the video lesson. Unwilling to crank the volume on the headset, I could hear them clearly over the top of the lesson I was listening to.
Reviewed by 2012
Everyone was extremely laid back, kind and courteous. I felt very comfortable and no matter who you were in contact with, all employees were approachable.
Reviewed by 2012
While the instructor had a basic understanding of Project 2010, he did not have "advanced" knowledge which was the level of the course. He had not really used the software in "real life" so didn't have any context. Whenever I had questions, he looked for answers from microsoft.com (I could have done the same). I was hoping the instructor would provided added knowledge to what I was learning from the videos.
Reviewed by 2012
Fantastic and very relevant. The instructor was very pleasant and helpful.
Reviewed by 2012
Too many mistakes made in the videos, this made it confusing about what to follow and what to avoid. Seminar presenter got off-topic too much which made me pressed for time.
Reviewed by 2011
There really is not enough time in one day to do all the exersizes in the training manual, watch all the videos, take the quizzes, and discuss specifc issues with the instructor. I would suggest improving the video intruction to actual take you through some of the exersizes rather than leaving you to do it on your own, because you really only learn by doing.
Reviewed by 2011
Thought the directions in the book exercises exercises could be written a little clearer.
Reviewed by 2011
My second course with TekSource and it's always an enjoyable experience. It's a nice clean office environment close to the subway. And the staff is excellent and helpful.
Reviewed by 2011
Not instructor led hence one star rating
Reviewed by 2011
The only somewhat critical comment I have is that it can be difficult to concentrate when the mentor is explaining to another student. In a small classroom setting, I guess that is just a reality of mentor-assisted training.
Reviewed by 2011
Steve Meggenson understand French. He helped me a lot with my documents from work. Now I know how to use Access for my work. I should take this course 5 years ago! But, it's not too late! I want to take the monitored or coach course with Steve again because he can read and understand french!
Reviewed by 2011
I wish that there had been more examples and more exercises for pivot tables and vlook up. They are very valuable tools.
Reviewed by 2011
Very positive experience.
Reviewed by 2011

This course currently does not have any dates scheduled. Please call 1-877-313-8881 to enquire about future dates or scheduling a private, in house course for your team.

This page has been viewed 270 times.