MCTS Windows Server 2008 Network Infrastructure, Configuring Certification

MCTS 2008 Certification Training in Classroom by MCTS Certified engineers

15 %
Discount

when you buy 3 or more courses

The discount will be automatically
applied at the checkout
Looking for a
2-12 months
training?
Choose Network Engineer
Career Programme

Looking for a 2-12 months training?

Choose

Network Engineer career programme

Upcoming dates

There are no open public schedule dates for MCTS Windows Server 2008 Network Infrastructure, Configuring Certification course. We can offer you a private training or arrange a public course for you. Contact us here and we can make arrangements for your course.

Delivery Formats

This course can be attended face to face in an open classrooms, live online virtual classroom remotely from home or office, private one-to-one and on-site for your team at your office.


Course Outline

MCTS Windows Server 2008 Network Infrastructure, Configuring Certification course overview

This Microsoft Certified Technology Specialist (MCTS) Windows Server 2008 Network Infrastructure, Configuring Certification course is designed to provide delegates with the necessary knowledge to pursue MCTS 2008. Network Infrastructure certification validates your ability to build comprehensive network infrastructure solutions. Show that you have the skills needed to run a highly efficient and modern data center, with expertise in identity management, systems management, virtualization, storage, and networking.

This course can be taken as fast track in five days by network engineers. The normal track course is recommended for beginners and last for 5 weeks (one class on weekend or two classes in weekday evenings)

This short MCTS fast track course is hands-on, instructor led and classroom based. This training can be taken as a part-time evening course or even on the weekends.


Who is MCTS Windows Server 2008 Network Infrastructure, Configuring Certification training for?

This training course is for you if you are interested in becoming Microsoft Certified Technology Specialist.


Prerequisites for MCTS Windows Server 2008 Network Infrastructure, Configuring Certification course

  • Microsoft MCTS 2008 candidate should have at least one year of networking experience supporting a Windows network.


What will I get?

  • Training from professional MCTS certified trainers:

    Training Dragon consultants have been implementing professional Microsoft networking solutions across a range of companies for many years. Those consultants write and teach our MCTS training courses, so their experience directly informs course content.

  • Practical Projects:

    This MCTS training is designed to prepare you not only for MCTS certification, but also to train you for your next job. To do this, next to certification you will also work on real-world practical MCTS related exercises in this MCTS course. This will ensure that you can apply the knowledge gained from this course to your work environment.

  • Course Material and Practice exams:

    MCTS electronic notes are included in this course. You will also take practice exams as part of the course.

  • Course Completion Certificate:

    After completing this training you will receive MCTS course completion certificate.

  • Support and Careers Advice:

    After the course if you have any problems or questions regarding MCTS, do not hesitate to contact us. Training Dragon’s trainers and career consultants are expert in their fields and if you need any help with you career choice, please speak to one of our career consultants.

  • Pass Guarantee and Train again for Free:

    We are sure that you will pass your MCTS certification exam at first attempt. However, if you don’t, you can come back within a year and take the complete course for free.

  • Official Course Curriculum:

    This MCTS certification course is based on the official Microsoft recommended course syllabus.


MCTS Windows Server 2008 Network Infrastructure, Configuring Certification Course Contents

This MCTS certification course prepares you for following exams.

In order to become an MCTS 2008 you will need to pass total threeexams.

Following three are MCTS Windows Server 2008 exams:

  • Exam 70-642: Windows Server 2008 Network Infrastructure, Configuring

After completing MCTS 2008 Windows Server Certification then you can take two additional exams to become MCSE 2008. More details about MCSE 2008 here

Module 1: Planning and Configuring IPv4This module explains how to deploy and configure networking services in your organization. This module explains how to implement an IPv4 addressing scheme, determine which name services to deploy, and troubleshoot network-related problems.Lessons

  • Implementing an IPv4 Network Infrastructure
  • Overview of Name Resolution Services in an IPv4 Network Infrastructure
  • Configuring and Troubleshooting IPv4

Lab : Planning and Configuring IPv4

  • Selecting an IPv4 Addressing scheme for branch offices
  • Implementing and Verifying IPv4 in the branch office

After completing this module, students will be able to:

  • Plan an IPv4 addressing scheme.
  • Determine which name services you must deploy.

  • Configure and troubleshoot an IPv4 network.

Module 2: Configuring and Troubleshooting DHCPThis module introduces you to Dynamic Host Configuration Protocol (DHCP), which plays an important role in the Windows Server 2008 R2 infrastructure. It is the primary means of distributing important network configuration information to network clients, and it provides configuration information to other network-enabled services, including Windows Deployment Services (WDS) and Network Access Protection (NAP). To support and troubleshoot a Windows Server-based network infrastructure, it is important that you understand how to deploy, configure, and troubleshoot the DHCP Server Role.Lessons

  • Overview of the DHCP Server Role
  • Configuring DHCP Scopes
  • Configuring DHCP Options
  • Managing a DHCP Database
  • Monitoring and Troubleshooting DHCP
  • Configuring DHCP Security

Lab : Configuring and Troubleshooting the DHCP Server Role

  • Selecting a Suitable DHCP Configuration
  • Implementing DHCP
  • Reconfiguring DHCP in the Head Office
  • Testing the Configuration
  • Troubleshooting DHCP Issues

After completing this module, students will be able to:

  • Describe the function of the DHCP Server Role.
  • Configure DHCP scopes.
  • Configure DHCP options.
  • Manage a DHCP database.
  • Monitor and troubleshoot the DHCP Server Role.
  • Configure security the DHCP Server Role.

Module 3: Configuring and Troubleshooting DNSThis module introduces you to Domain Name System (DNS), which is the foundation name service in Windows Server 2008 R2. It is vital that you understand how to deploy, configure, manage, and troubleshoot this critical service.Lessons

  • Installing the DNS Server Role
  • Configuring the DNS Server Role
  • Configuring DNS Zones
  • Configuring DNS Zone Transfers
  • Managing and Troubleshooting DNS

Lab : Configuring and Troubleshooting DNS

  • Selecting a DNS Configuration
  • Deploying and Configuring DNS
  • Troubleshooting DNS

After completing this module, students will be able to:

  • Install the DNS server role.
  • Configure the DNS server role.
  • Create and configure DNS zones.
  • Configure zone transfers.
  • Manage and troubleshoot DNS.

Module 4: Configuring and Troubleshooting IPv6 TCP/IPThis module introduces you to IPv6, a technology that will help ensure that the Internet can support a growing user base and the increasingly large number of IP-enabled devices. The current Internet Protocol Version 4 (IPv4) has served as the underlying Internet protocol for almost thirty years. Its robustness, scalability, and limited feature set is now challenged by the growing need for new IP addresses, due in large part to the rapid growth of new network-aware devices.Lessons

  • Overview of IPv6
  • IPv6 Addressing
  • Coexistence with IPv6
  • IPv6 Transition Technologies
  • Transitioning from IPv4 to IPv6

Lab : Configuring an ISATAP Router

  • Configuring a New IPv6 Network and Client
  • Configuring an ISATAP Router to Enable Communication Between an IPv4 Network and an IPv6 Network

Lab : Converting the Network to Native IPv6

  • Transitioning to a Native IPv6 Network

After completing this module, students will be able to:

  • Describe the features and benefits of IPv6.
  • Implement IPv6 addressing.
  • Implement an IPv6 coexistence strategy.
  • Describe and select a suitable IPv6 transition solution.
  • Transition from IPv4 to IPv6.
  • Troubleshoot an IPv6-based network.

Module 5: Configuring and Troubleshooting Routing and Remote AccessTo support your organization’s distributed workforce, you must become familiar with technologies that enable remote users to connect to your organization’s network infrastructure. These technologies include virtual private networks (VPNs) and DirectAccess. It is important that you understand how to configure and secure your remote access clients by using network policies. This module explores these remote access technologies.Lessons

  • Configuring Network Access
  • Configuring VPN Access
  • Overview of Network Policies
  • Overview of the Connection Manager Administration Kit
  • Troubleshooting Routing and Remote Access
  • Configuring DirectAccess

Lab : Configuring and Managing Network Access

  • Configuring Routing and Remote Access as a VPN Remote Access Solution
  • Configuring a Custom Network Policy
  • Create and distribute a CMAK Profile

Lab : Configuring and Managing DirectAccess

  • Configure the AD DS Domain Controller and DNS
  • Configure the PKI Environment
  • Configure the DirectAccess Clients and Test Intranet Access
  • Configure the DirectAccess Server
  • Verify DirectAccess Functionality

After completing this module, students will be able to:

  • Configure network access.
  • Create and configure a VPN solution.
  • Describe the role of network policies.
  • Use the Connection Manager Administration Kit to create and configure client connection profiles.
  • Troubleshoot routing and remote access.
  • Implement DirectAccess.

Module 6: Installing, Configuring, and Troubleshooting the Network Policy Server Role ServiceNPS provides support for the Remote Authentication Dial-In User Service (RADIUS) protocol, and can be configured as a RADIUS server or proxy. Additionally, NPS provides functionality that is essential for the implementation of Network Access Protection (NAP). This module explains how to install, configure, and troubleshoot NPS.Lessons

  • Installing and Configuring a Network Policy Server
  • Configuring RADIUS Clients and Servers
  • NPS Authentication Methods
  • Monitoring and Troubleshooting a Network Policy Server

Lab : Configuring and Managing Network Policy Server

  • Installing and Configuring the Network Policy Server Role Service
  • Configuring a RADIUS Client
  • Configuring Certificate Auto-Enrollment
  • Configuring and Testing the VPN

After completing this module, students will be able to:

  • Install and configure NPS.
  • Configure RADIUS clients and servers.
  • Describe NPS authentication methods.
  • Monitor and troubleshoot NPS.

Module 7: Implementing Network Access ProtectionIn this module, you will learn about Network Access Protection (NAP). NAP enables you to create customized health-requirement policies to validate computer health before allowing access or communication. NAP also automatically updates compliant computers to ensure on-going compliance and can limit the access of noncompliant computers to a restricted network until they become compliant.Lessons

  • Overview of Network Access Protection
  • How NAP Works
  • Configuring NAP
  • Monitoring and Troubleshooting NAP

Lab : Implementing NAP into a VPN Remote Access Solution

  • Configuring NAP Components
  • Configuring Client Settings to Support NAP

After completing this module, students will be able to:

  • Describe how NAP can help protect your network.
  • Describe the various NAP enforcement processes.
  • Configure NAP.
  • Monitor and troubleshoot NAP.

Module 8: Increasing Security for Windows ServersSecurity is an essential consideration for networking with Windows Server 2008. In this module, you will learn how to implement various methods to increase security. Windows Firewall with Advanced Security is one of the features in Windows Server 2008 that is used to increase security. You can also use Windows Server Update Services to ensure that approved security updates are applied to servers in a timely way.Lessons

  • Windows Security Overview
  • Configuring Windows Firewall with Advanced Security
  • Deploying Updates with Windows Server Update Services

Lab : Increasing Security for Windows Servers

  • Deploying a Windows Firewall Rule
  • Implementing WSUS

After completing this module, students will be able to:

  • Describe a process for increasing the security of Windows Server 2008.
  • Configure Windows Firewall with Advanced Security.
  • Describe Windows Server Update Services and how to use it.

Module 9: Increasing Security for Network CommunicationInternet Protocol security (IPsec) is a framework of open standards for protecting communications over IP networks through cryptographic security services. IPsec supports network-level peer authentication, data-origin authentication, data integrity, data confidentiality (encryption), and replay protection. The Microsoft IPsec implementation is based on standards that the Internet Engineering Task Force (IETF) IPsec working group developed. In this module, you will learn how to implement, configure, and troubleshoot IPsec.Lessons

  • Overview of IPsec
  • Configuring Connection Security Rules
  • Configuring NAP with IPsec Enforcement
  • Monitoring and Troubleshooting IPsec

Lab : Increasing Security for Network Communication

  • Selecting a Network Security Configuration
  • Configuring IPsec to Authenticate Computers
  • Testing IPsec Authentication

After completing this module, students will be able to:

  • Describe when and how to use IPsec.
  • Configure Connection Security rules.
  • Configure IPsec with NAP Enforcement.
  • Describe how to monitor and troubleshoot IPsec.

Module 10: Configuring and Troubleshooting Network File and Print ServicesFile and print services are some of the most commonly implemented network services for end users. Unlike infrastructure services like DNS, file and print services are highly visible to the end users. In this module, you will learn how to configure and troubleshoot file and print services to provide high quality service to end users. In addition, you will see how both EFS and BitLocker can be used to increase the security of files that are located in file shares.Lessons

  • Configuring and Troubleshooting File Shares
  • Encrypting Network Files with EFS
  • Encrypting Partitions with BitLocker
  • Configuring and Troubleshooting Network Printing

Lab : Configuring and Troubleshooting Network File and Print Services

  • Creating and Configuring a File Share
  • Encrypting and Recovering Files
  • Creating and Configuring a Printer Pool

After completing this module, students will be able to:

  • Describe how to manage file share security.
  • Explain how to encrypt network files with EFS.
  • Describe how to encrypt partitions with BitLocker.
  • Discuss how to configure and troubleshoot network printing.

Module 11: Optimizing Data Access for Branch Offices

Many organizations maintain a large number of file resources that need to be organized and made highly available to users. These file resources are often stored on servers and provided to users who are distributed geographically in widespread locations. In this module, you will learn how to provide efficient access to network resources with minimal traffic over a WAN link.

Lessons

  • Branch Office Data Access
  • DFS Overview
  • Overview of DFS Namespaces
  • Configuring DFS Replication
  • Configuring BranchCache

Lab : Implementing DFS

  • Installing the DFS Role Service
  • Configuring the Required Namespace
  • Configuring DFS Replication

Lab : Implementing BranchCache

  • Performing Initial Configuration Tasks for BranchCache
  • Configuring BranchCache Clients
  • Configuring BranchCache on the Branch Server
  • Monitoring BranchCache

After completing this module, students will be able to:

  • Describe the challenges experienced when providing data access to branch offices.
  • Identify the basic components of DFS.
  • Describe DFS namespaces.
  • Explain how to configure DFS replication.
  • Discuss how to configure BranchCache.

Module 12: Controlling and Monitoring Network StorageNetwork storage for users is a finite resource that must be managed appropriately to ensure that it remains available for all users. If network storage is not monitored and managed, it can become filled with irrelevant data, such as personal music or movies. Irrelevant data increases network storage costs and in some cases can prevent useful data from placement on the network storage. In this module, you will learn how to monitor and manage network storage.Lessons

  • Monitoring Network Storage
  • Controlling Network Storage Utilization
  • Managing File Types on Network Storage

Lab : Controlling and Monitoring Network Storage

  • Configuring FSRM Quotas
  • Configuring File Screening
  • Configuring File Classification and File Management

After completing this module, students will be able to:

  • Describe how to monitor network storage by using FSRM.
  • Explain how to manage quotas by using FSRM.
  • Describe how to implement file screening, classification management, and file management tasks by using FSRM.

Module 13: Recovering Network Data and ServersThis module explains how to recover network data and servers. There are a variety of scenarios where a network data or a server that provides networks services can be lost. Volume shadow copies can be used to restore previous versions of files when a file is accidentally deleted or modified on a computer that is running Windows Server 2008. Windows Server Backup can be used to back up and restore data files or an entire server.Lessons

  • Recovering Network Data with Volume Shadow Copies
  • Recovering Network Data and Servers with Windows Server Backup

Lab : Recovering Network Data and Servers

  • Configuring Shadow Copies
  • Configuring a Scheduled Backup

After completing this module, students will be able to:

  • Describe how to configure and use volume shadow copies.
  • Describe how to configure and use Windows Server Backup.

Module 14: Monitoring Windows Server 2008 Network Infrastructure Servers

When a system failure or an event that affects system performance occurs, you need to be able to repair the problem or resolve the issue quickly and efficiently. With so many variables and possibilities in the modern network environment, the ability to determine the root cause quickly often depends on having an effective performance monitoring methodology and toolset. In this module, you will learn to use performance-monitoring tools to identify components that require additional tuning and troubleshooting. By identifying components that require additional tuning, you can improve the efficiency of your servers.

Lessons

  • Monitoring Tools
  • Using Performance Monitor
  • Monitoring Event Logs

Lab : Monitoring Windows Server 2008 Network Infrastructure Servers

  • Establishing a Performance Baseline
  • Identifying the Source of a Performance Problem
  • Centralizing Events Logs

After completing this module, students will be able to:

  • Describe monitoring tools for Windows Server 2008 R2.
  • Describe how to use performance monitor.
  • Describe how to monitor event logs.

View Complete Course outline

Daily schedule

The scheme below shows what a typical day at Training Dragon looks like.

10:00 11:30 11:45 13:00 14:00 15:30 15:45
Classroom Activity
This course explains how to create web pages from scratch using different techniques, such as
Tea
Break
Classroom Activity
This course explains how to create web pages from scratch using different techniques, such as
Lunch
Break
Classroom Activity
This course explains how to create web pages from scratch using different techniques, such as
Tea
Break
Classroom Activity
This course explains how to create web pages from scratch using different techniques, such as
Video Placeholder

Looking for a
2-12 months
training?

Choose

Network Engineer career programme

Our Trainers

Emiliano
Emiliano
Leads our teaching team with many years of experience in teaching web development.
Ross
Ross
Brings many years of Python and Java software development experience to classrooms.
Olu
Olu
Microsoft and Oracle certified developer with years teaching experience in Android, .NET and databases.

Latest Reviews

Frequently Asked Questions

How many maximum people are on my course? 

?
To make sure that personal attention is provided to everyone in the class, we keep our classroom size very small. There are maximum 8 delegates in all our classrooms.
More questions?
We are here to answer them