Windows Server 2008 Administrator (70-646) (Microsoft Official Academic Course) (PCK PAP/CD)

  • ポイントキャンペーン

Windows Server 2008 Administrator (70-646) (Microsoft Official Academic Course) (PCK PAP/CD)

  • ただいまウェブストアではご注文を受け付けておりません。 ⇒古書を探す
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 532 p.
  • 言語 ENG,ENG
  • 商品コード 9780470875063
  • DDC分類 004

Table of Contents

Lesson 1 Planning Server Deployments           1  (45)
Objective Domain Matrix 1 (1)
Key Terms 1 (1)
Selecting a Windows Server 2008 Edition 2 (5)
Introducing Windows Server 2008 2 (3)
Features and Capabilities
Using Server Core 5 (1)
Introducing Server Core 5 (1)
Administering Server Core 6 (1)
Justifying Server Core 6 (1)
Using Server Core for Application 7 (1)
Servers
Inventorying Hardware 7 (10)
Installing Microsoft Assessment and 8 (1)
Planning Solution Accelerator
Using Microsoft Assessment and Planning 9 (1)
Solution Accelerator
Assessing Windows Server 2008 Readiness 10 (4)
Viewing Assessment Results 14 (3)
Automating Server Deployments 17 (26)
Using Windows Deployment Services 17 (1)
Installing Windows Deployment Services 17 (1)
Configuring the WDS Server 18 (3)
Adding Image Files 21 (2)
Configuring a Custom DHCP Option 23 (3)
Performing a WDS Client Installation 26 (1)
Customizing WDS Client Installations 26 (1)
Creating Image Files with WDS 26 (1)
Creating a Capture Boot Image 27 (1)
Using Answer Files 28 (2)
Using the Windows Automated 30 (1)
Installation Kit
Understanding the Deployment Process 30 (1)
Installing the Windows AIK 31 (1)
Creating an Answer File 32 (4)
Understanding Configuration Passes 36 (1)
Selecting Answer File Settings 37 (3)
Creating a Master Installation 40 (1)
Capturing an Image File 41 (1)
Deploying an Image File 42 (1)
Summary Skill Matrix 43 (1)
Knowledge Assessment 44 (1)
Case Scenarios 45 (1)
Lesson 2 Planning Infrastructure Services 46 (45)
Objective Domain Matrix 46 (1)
Key Terms 46 (1)
Deploying DHCP Servers 47 (19)
Understanding DHCP Communications 48 (2)
Designing a DHCP Infrastructure 50 (1)
Using a Distributed DHCP Infrastructure 51 (1)
Using a Centralized DHCP Infrastructure 51 (2)
Using a Hybrid DHCP Infrastructure 53 (1)
Regulating DHCP Network Traffic 53 (1)
Planning for Fault Tolerance 54 (2)
Assigning Static IP Addresses 56 (1)
Assigning IPv6 Addresses 57 (1)
Deploying a DHCP Server 58 (4)
Deploying a DHCP Relay Agent 62 (4)
Deploying DNS Servers 66 (21)
Understanding the DNS Architecture 66 (1)
Understanding DNS Naming 67 (2)
Understanding the DNS Domain Hierarchy 69 (1)
Understanding DNS Communications 70 (2)
Understanding DNS Referrals and Queries 72 (1)
Understanding Reverse Name Resolution 72 (1)
Designing a DNS Deployment 73 (1)
Resolving Internet Names 74 (1)
Hosting Internet Domains 75 (1)
Hosting Active Directory Domains 75 (1)
Integrating DHCP and DNS 76 (1)
Separating DNS Services 76 (1)
Creating Internet Domains 77 (1)
Creating Internal Domains 78 (1)
Creating Subdomains 79 (1)
Combining Internal and External Domains 79 (1)
Creating Host Names 80 (1)
Deploying a DNS Server 81 (1)
Creating Zones 81 (4)
Replicating Zone Data 85 (1)
Using Active Directory---Integrated 86 (1)
Zones
Summary Skill Matrix 87 (1)
Knowledge Assessment 88 (2)
Case Scenarios 90 (1)
Lesson 3 Planning an Active Directory 91 (33)
Deployment
Objective Domain Matrix 91 (1)
Key Terms 91 (1)
Introducing Active Directory 92 (10)
Understanding Active Directory Functions 92 (1)
Understanding the Active Directory 93 (1)
Architecture
Understanding Objects and Attributes 93 (1)
Understanding Domains 94 (1)
Zooming In: Organizational Units 95 (1)
Zooming In: Groups 95 (2)
Zooming Out: Domain Trees 97 (1)
Zooming Out: Forests 98 (1)
Introducing the Global Catalog 98 (1)
Understanding Functional levels 98 (1)
Understanding Active Directory 99 (1)
Communications
Introducing LDAP 99 (1)
Understanding Replication 100(1)
Using Read-Only Domain Controllers 101(1)
Expanding Outward: Sites 101(1)
Designing an Active Directory 102(6)
Infrastructure
Designing the Domain Name Space 102(1)
Creating Additional Domains 102(1)
Choosing a Design Paradigm 103(1)
Designing a Tree Structure 104(1)
Naming Domains 104(1)
Creating Additional Trees 105(1)
Creating Additional Forests 105(1)
Designing an Internal Domain Structure 105(1)
Understanding Inheritance 106(1)
Creating Organizational Units 106(1)
Creating Group Objects 107(1)
Creating Users and Computers 107(1)
Designing a Group Policy Strategy 108(1)
Deploying Active Directory Domain Services 108(12)
Installing the Active Directory Domain 109(1)
Services Role
Creating a New Forest 109(6)
Creating a New Child Domain in a Forest 115(3)
Adding a Domain Controller to an 118(2)
Existing Domain
Summary Skill Matrix 120(1)
Knowledge Assessment 121(2)
Case Scenarios 123(1)
Lesson 4 Planning Application Services 124(36)
Objective Domain Matrix 124(1)
Key Terms 124(1)
Deploying Application Servers 124(11)
Introducing Application Service Roles 126(1)
Assigning Multiple Roles 126(2)
Selecting Application Service Roles 128(1)
Using the File Services Role 129(1)
Using the Terminal Services Role 129(1)
Using the Hyper-V Role 130(1)
Using the Web Server (IIS) Role 131(2)
Using the UDDI Services Role 133(1)
Using the Application Server Role 133(1)
Using the Print Services Role 134(1)
Using the Fax Server Role 135(1)
Using the Streaming Media Services Role 135(1)
Deploying Applications 135(6)
Deploying Applications Using Group 135(1)
Policy
Understanding the Limitations 136(4)
Creating a Software Installation GPO 137
Deploying Applications Using System 140(1)
Center Tools
Using System Center Essentials 2007 140(1)
Using System Center Configuration 140(1)
Manager 2007
Using Terminal Services 141(10)
Understanding the Terminal Services 141(1)
Architecture
Introducing Terminal Server 142(1)
Introducing Remote Desktop Connection 143(1)
(RDC)
Introducing Remote Desktop Protocol 144(1)
(RDP)
Planning a Terminal Services Deployment 145(1)
Identifying the Advantages of Terminal 145(1)
Services
Using Terminal Services in Various 146(1)
Scenarios
Deploying Terminal Services 147(1)
Selecting Server Hardware 148(1)
Installing Terminal Services 148(1)
Installing Applications 149(1)
Understanding Terminal Services 149(2)
Licensing
Using Visualization 151(5)
Understanding Virtualization 152(1)
Architectures
Introducing Hyper-V 153(2)
Virtualizing Applications 155(1)
Summary Skill Matrix 156(1)
Knowledge Assessment 157(2)
Case Scenarios 159(1)
Lesson 5 Planning File and Print Services 160(51)
Objective Domain Matrix 160(1)
Key Terms 160(1)
Deploying File Servers 160(35)
Designing a File-Sharing Strategy 161(1)
Arranging Shares 161(1)
Controlling Access 162(1)
Mapping Drives 163(1)
Creating Folder Shares 163(8)
Using the Distributed File System 171(1)
Understanding Namespaces 172(1)
Replicating Shares 172(1)
Configuring DFS 173(12)
Using File Server Resource Manager 185(1)
Working with Quotas 185(6)
Creating a File Screen 191(1)
Generating Storage Reports 192(3)
Deploying Print and Fax Servers 195(12)
Understanding the Windows Print 195(1)
Architecture
Understanding Windows Printing 196(1)
Understanding the Flexibility of 196(3)
Windows Printing
Using the Print Services Role 199(1)
Using the Print Management Console 200(1)
Sharing a Printer 201(2)
Deploying Printers with Group Policy 203(1)
Deploying a Fax Server 204(1)
Using the Fax Services Role 205(1)
Adding the Desktop Experience Feature 205(1)
Sharing the Fax Printer 206(1)
Configuring a Fax Device 206(1)
Configuring Incoming Fax Routing 206(1)
Policies
Configuring Outgoing Fax Routing 206(1)
Policies
Selecting Fax Users 207(1)
Summary Skill Matrix 207(1)
Knowledge Assessment 208(2)
Case Scenarios 210(1)
Lesson 6 Planning Storage Solutions 211(40)
Objective Domain Matrix 211(1)
Key Terms 211(1)
Planning Server Storage 211(8)
How Many Servers Do I Need? 212(1)
Estimating Storage Requirements 213(1)
Selecting a Storage Technology 213(1)
Selecting a Disk Technology 214(1)
Using External Drive Arrays 215(1)
Planning for Storage Fault Tolerance 216(1)
Using Disk Mirroring 217(1)
Using RAID 217(2)
Understanding Windows Disk Settings 219(4)
Selecting a Partition Style 220(1)
Understanding Disk Types 221(1)
Understanding Volume Types 222(1)
Choosing a Volume Size 222(1)
Understanding File Systems 223(1)
Working with Disks 223(11)
Adding a New Disk 225(2)
Converting a Basic Disk to a Dynamic 227(2)
Disk
Creating a Simple Volume 229(3)
Creating a Striped, Spanned, Mirrored, 232(1)
or RAID-5 Volume
Extending and Shrinking Volumes 233(1)
Deploying a Storage Area Network 234(14)
Understanding SAN Technologies 236(1)
Using Fibre Channel 236(1)
Fibre Channel Media 237(1)
Fibre Channel Speeds 237(1)
Fibre Channel Topologies 237(1)
Fibre Channel Protocols 237(1)
Using iSCSI 238(1)
Initiators and Targets 238(1)
Using iSNS 239(1)
Using Windows Server 2008 with SANs 239(1)
Installing iSNS Server 239(1)
Using iSCSI Initiator 240(4)
Using Storage Manager for SANs 244(3)
Using Storage Explorer 247(1)
Summary Skill Matrix 248(1)
Knowledge Assessment 248(2)
Case Scenarios 250(1)
Lesson 7 Planning for High Availability 251(34)
Objective Domain Matrix 251(1)
Key Terms 251(1)
Planning For Data Availability 251(7)
Backing Up Data 252(1)
Using Shadow Copies 252(3)
Using Offline Files 255(1)
Using Disk Redundancy 256(2)
Planning for Application Availability 258(2)
Increasing Applications Availability 258(1)
Planning for Application Resilience 259(1)
Enhancing Application Availability 259(1)
Using Group Policy
Enhancing Application Availability 259(1)
Using Windows Installer
Planning for Server Availability 260(21)
Using Hardware Redundancy 260(1)
Using Failover Clustering 261(1)
Understanding Failover Cluster 261(1)
Requirements
Validating a Failover Cluster 262(4)
Configuration
Creating a Failover Cluster 266(3)
Using Network Load Balancing 269(1)
Creating an NLB Cluster 269(6)
Load Balancing Terminal Servers 275(3)
Using DNS Round Robin 278(3)
Summary Skill Matrix 281(1)
Knowledge Assessment 282(2)
Case Scenarios 284(1)
Lesson 8 Planning Server and Network 285(49)
Security
Objective Domain Matrix 285(1)
Key Terms 285(1)
Securing Servers 286(19)
Physically Securing Servers 286(1)
Controlling Access 286(1)
Using Physical Barriers 287(1)
Using Biometrics 287(1)
Social Engineering 288(1)
Controlling the Environment 289(1)
Wireless Networking 289(1)
Building a Firewall 290(1)
Understanding Windows Firewall Settings 290(1)
Working with Windows Firewall 291(3)
Using the Windows Firewall Control Panel 294(3)
Using the Windows Firewall with 297(4)
Advanced Security Console
Using BitLocker 301(1)
Understanding BitLocker Requirements 302(1)
Installing BitLocker 303(2)
Securing Network Access 305(25)
Understanding Authentication 305(1)
Storing User Credentials 306(1)
Understanding Encryption 307(1)
Network Planning and Authentication 308(1)
Enhancing Authentication Security with 309(3)
Strong Passwords
Understanding Kerberos Authentication 312(3)
Controlling Kerberos Authentication 315(2)
Using Group Policies
Understanding Authorization 317(1)
Understanding the Windows Permission 318(1)
Architecture
Understanding Standard and Special 318(1)
Permissions
Allowing and Denying Permissions 319(1)
Inheriting Permissions 319(2)
Understanding Effective Permissions 321(1)
Assigning Standard NTFS Permissions 322(2)
Assigning Special NTFS Permissions 324(5)
Understanding Resource Ownership 329(1)
Summary Skill Matrix 330(1)
Knowledge Assessment 331(1)
Case Scenarios 332(2)
Lesson 9 Securing Infrastructure Services 334(46)
Objective Domain Matrix 334(1)
Key Terms 334(1)
Securing Remote Access 335(11)
Understanding Remote Access Connectivity 335(1)
Understanding Virtual Private Networking 335(2)
Choosing a Remote Access Solution 337(1)
Authenticating Remote Users 338(1)
Installing Remote Access 339(2)
Configuring Routing and Remote Access 341(4)
Configuring Remote Access Authentication 345(1)
Using Certificates 346(30)
Understanding Certificates 346(1)
Understanding Certificate Functions 347(1)
Understanding Certificate Components 348(2)
Planning a CA Deployment 350(1)
Determining the Certificate Life Cycle 351(1)
Planning CA Validity Periods 352(1)
Understanding Certificate Revocation 352(1)
Installing Certification Authorities 353(1)
Installing an Enterprise Root CA 353(5)
Installing an Enterprise Subordinate CA 358(1)
Creating a CA Hierarchy 358(2)
Managing Certificate Templates 360(1)
Working with Certificate Templates 361(1)
Managing Certificate Template 362(1)
Permissions
Understanding Certificate Template 363(3)
Versions
Working with Certificate Templates 366(2)
Enrolling and Revoking Certificates 368(1)
Understanding Certificate Enrollment 369(3)
Methods
Issuing Certificates Manually 372(1)
Revoking Certificates 373(1)
Publishing CRLs 374(2)
Summary Skill Matrix 376(1)
Knowledge Assessment 377(2)
Case Scenarios 379(1)
Lesson 10 Managing Servers 380(47)
Objective Domain Matrix 380(1)
Key Terms 380(1)
Using Remote Administration 380(24)
Using Server Manager 381(4)
Installing Role Administration Tools 385(2)
Using MMC Consoles 387(1)
Using the MMC Interface 388(1)
Creating Customized MMC Consoles 389(4)
Using Multiple Windows 393(1)
Connecting to Remote Computers 394(1)
Using Remote Desktop 395(1)
Enabling Remote Desktop 395(2)
Configuring Remote Desktop Connection 397(5)
Connecting to a Remote Desktop Server 402(2)
Using RDC
Delegating Administration Tasks 404(7)
Delegating File System Permissions 404(1)
Assigning Group Managers 405(1)
Delegating Active Directory 406(2)
Administrative Privileges
Assigning Active Directory Permissions 408(1)
Using the Delegation of Control Wizard 409(2)
Updating Servers 411(12)
Understanding WSUS Architectures 411(1)
Using a Single WSUS Server 411(1)
Using Multiple Independent WSUS Servers 412(1)
Using Multiple Synchronized WSUS Servers 413(1)
Using Multiple Disconnected WSUS Servers 413(1)
Deploying WSUS 413(1)
Installing WSUS 414(2)
Configuring WSUS 416(6)
Configuring WSUS Clients 422(1)
Summary Skill Matrix 423(1)
Knowledge Assessment 424(2)
Case Scenarios 426(1)
Lesson 11 Monitoring Servers 427(32)
Objective Domain Matrix 427(1)
Key Terms 427(1)
Using the Event Viewer Console 428(8)
Introducing the Windows Server 2008 428(2)
Event Viewer
Viewing Windows Logs 430(2)
Viewing Applications and Services Logs 432(2)
Viewing Additional Logs 434(1)
Creating Custom Views 434(2)
Using the Reliability and Performance 436(19)
Console
Using Resource Overview 436(2)
Using Performance Monitor 438(1)
Modifying the Graph View 439(1)
Using Other Views 440(2)
Adding Counters 442(1)
Creating an Effective Display 443(1)
Saving a System Monitor Console 443(1)
Using Reliability Monitor 443(2)
Locating Bottlenecks 445(1)
Monitoring Processor Performance 445(1)
Monitoring Memory Performance 446(1)
Monitoring Disk Performance 447(1)
Monitoring Network Performance 447(1)
Establishing a Baseline 448(4)
Using Auditing 452(3)
Summary Skill Matrix 455(1)
Knowledge Assessment 456(2)
Case Scenarios 458(1)
Lesson 12 Backing Up 459(32)
Objective Domain Matrix 459(1)
Key Terms 459(1)
Planning a Backup Strategy 459(12)
Selecting Backup Hardware 460(1)
Using Optical Disks 461(1)
Using Hard Disk Drives 461(1)
Using Magnetic Tape 462(1)
Using Tape Libraries 463(1)
Selecting a Drive Interface 463(1)
Selecting Backup Software 464(1)
Selecting Targets 464(1)
Using Filters 465(1)
Understanding Backup Job Types 466(2)
Using Differential Backups 468(1)
Scheduling Jobs 469(1)
Logging Backup Activity 469(1)
Cataloging Files 469(1)
Rotating Media 470(1)
Performing Restores 470(1)
Using Windows Server Backup 471(17)
Creating a Single Backup Job 473(4)
Performing a Scheduled Backup 477(2)
Configuring Incremental Backups 479(1)
Performing a Restore 480(3)
Restoring an Entire Server 483(2)
Backing Up and Recovering Active 485(1)
Directory
Understanding Authoritative and 486(1)
Non-Authoritative Restores
Backing Up and Restoring Group Policy 487(1)
Objects
Summary Skill Matrix 488(1)
Knowledge Assessment 488(2)
Case Scenarios 490(1)
Appendix A 70-646 Microsoft Certified IT 491(1)
Professional (MCITP) Skills
Appendix B Lab Setup Guide 492(13)
Glossary 505(8)
Index 513