Home :: Software :: Business & Office :: Training & Tutorials  

Business Accounting
Communication
Database
Document Management
e-Commerce
Networking
Office Suites
Personal Finance
Presentation
Project Management
Reports & Forms
Schedule & Contact Management
Spreadsheet
Tax Preparation
Training & Tutorials

Word Processing
Microsoft Windows 2000: Planning and Implementing Active Directory - Part 3 CBT Training CD

Microsoft Windows 2000: Planning and Implementing Active Directory - Part 3 CBT Training CD

List Price:
Your Price:
Product Info Reviews

<< 1 >>

Rating: 5 stars
Summary: Microsoft Windows 2000: Planning and Implementing Active Dir
Review: Course Overview
This course provides students with the knowledge and skills necessary to deploy Active Directory services. It details the requirements for planning for Active Directory data recovery and maintenance and introduces the learner to the concepts of group policies and certificates as well as how to delegate administrative control.

Learn To

Deploy Active Directory Services.
Identify the Features of Data Recovery and Maintenance.
Group Policies and Certificates.
Delegate Administrative Authority.

Audience
This course is intended for experienced end users with novice to moderate level of experience in the design and evaluation of information systems.

Deployment Options
e-Learning

Accreditation
NASBA credits: 4 CPE Credits
ITCAP credits: Not Applicable CEU credits: 0.70 CEUs

Language Options
US English

Total Learning Time
6 to 8 hours

Objectives
Unit 1: Deploying Active Directory Services 1 - 2 hours

Identify the role and responsibility of a central planning team.
Identify the most appropriate Active Directory design for an organization's administrative model.
Identify physical location factors that influence implementation planning.
Identify security considerations in your present implementation.
Identify the growth and reorganization factors that influence implementation planning.
Identify the bandwidth information required for implementation planning.
Identify the guidelines for developing a profile of users in an organization.
Identify design considerations for Active Directory naming.
Identify design considerations that influence the domain hierarchy.
Select an OU and delegation design to simplify Active Directory implementation.
Identify the guidelines for designing a site topology in Active Directory.
Identify design considerations based on replication topology.
Identify design considerations that influence the placement of servers for performance improvement.

Unit 2: Data Recovery and Maintenance 1 - 2 hours

Identify the way files are processed in the Active Directory data store model.
Identify the Active Directory store files.
Identify the features of the Active Directory database file.
Identify the features and functions of transaction log files.
Identify the features and functions of checkpoint and reserved log files.
Identify the features and functions of patch files.
Identify the features of automatic database cleanup.
Identify the features of manual database cleanup.
Sequence the steps in a non-authoritative restore of the Active Directory database.
Sequence the steps in an authoritative restore of parts of the Active Directory database.
Identify the guidelines for estimating the size of Active Directory.
Identify the guidelines for creating a backup strategy.

Unit 3: Group Policies and Certificates 2 hours

Identify the features and functions of group policies.
Identify the ways group policies are applied.
Identify the characteristics of layered and monolithic design for the application of group policy.
Identify the characteristics of single and multiple group policy types.
Identify the guidelines for using functional roles or team design in relation to group policy.
Select between central and distributed control models for the application of group policy.
Create a group policy object.
Identify the default domain policies and their features and functions.
Identify the features of public key encryption.
Identify the features and uses of digital certificates.
Select appropriate certificate mapping techniques.
Identify the procedure for mapping certificates to user accounts.

Unit 4: Delegation of Administrative Authority 2 hours

Identify the features and functions of security components in Active Directory.
Identify the components of security descriptors in Active Directory.
Identify the functions of access control entries (ACEs) and their components in Active Directory.
Identify the features of object ownership in Active Directory.
Identify the features of delegation.
Identify the features of inheritance that influence permissions to objects.
Identify the guidelines for delegation planning.
Identify the methods of delegating the administration of objects and attributes.
Delegate control using the delegation tools.



<< 1 >>

© 2004, ReviewFocus or its affiliates