Certification Course – Microsoft 70-742: Identity in Windows Server 2016
Salepage : Certification Course – Microsoft 70-742: Identity in Windows Server 2016
Arichive : Certification Course – Microsoft 70-742: Identity in Windows Server 2016
Description
This training series focuses on the identity functionality in Windows Server 2016. It covers the installation and configuration of Active Directory Domain Services (AD DS), in addition to Group Policy implementation for non-Nano Server environments. It also covers functionality such as Active Directory Certificate Services (AD CS), Active Directory Federations Services (AD FS), and Web Application proxy implementations.
This series, along – the 70-740 and 70-741 series, will prepare you to take the MCSA: Windows Server 2016 exams. Taking the 70-744 series will then prepare you to take the MCSE: Cloud Platform and Infrastructure exams.
Course Curriculum
Course Introduction
Start
Course Introduction (3:08)
Start
Instructor Introduction (1:24)
Chapter 01 – Installing and Configuring Domain Controllers
Start
Chapter 01 Introduction (1:10)
Start
Topic A: Overview of Active Directory Domain Services (0:50)
Start
Information Protection Concepts (3:28)
Start
Identity and Access (IDA) (1:37)
Start
Authentication and Authorization (5:20)
Start
AD DS Terms (2:50)
Start
Access Tokens (2:10)
Start
Access Control Lists (2:07)
Start
The Kerberos Logon Process (6:04)
Start
Workgroup vs. Domain (2:29)
Start
Understanding AD DS Domains (2:11)
Start
AD DS Components and Concepts (1:03)
Start
Active Directory Database (2:21)
Start
Physical Data Store (1:33)
Start
Logical Partitions (4:23)
Start
Active Directory Schema (4:18)
Start
Domains (3:09)
Start
Trees and Forests (3:00)
Start
Organizational Units (2:28)
Start
AD DS Sites (2:26)
Start
Controlling Replication (0:51)
Start
Trust Relationships (3:40)
Start
Topic B: Overview of Domain Controllers (0:18)
Start
Introducing Domain Controllers (1:59)
Start
Global Catalog Servers (4:01)
Start
Read-Only Domain Controllers (1:40)
Start
FSMO Roles (7:06)
Start
Demo – Working – FSMO Roles (6:48)
Start
Locating Domain Controllers (3:25)
Start
Demo – Viewing SRV Records (4:25)
Start
Topic C: Deploying Domain Controllers (0:12)
Start
Reasons for Multiple Domain Controllers (2:46)
Start
Installing from Server Manager (2:53)
Start
Considerations for Installing Domain Controllers (3:09)
Start
Demo – Installing a Domain Controller (9:12)
Start
Installing on Server Core (2:30)
Start
Demo – Promoting a Server Core DC (14:41)
Start
Upgrading Domain Controllers (2:00)
Start
Additional Installation Options (1:34)
Start
Cloning Domain Controllers (2:37)
Start
Demo – Cloning Domain Controllers (17:31)
Start
Chapter 01 Summary (1:39)
Start
Chapter 01 Review (0:10)
Start
Chapter 01 Quiz
Chapter 02 – Managing Active Directory Objects
Start
Chapter 02 Introduction (1:01)
Start
Topic A: Overview of AD DS Object Management (0:18)
Start
Understanding AD DS Objects (2:00)
Start
Names for AD DS Objects (2:50)
Start
Management Tools (4:06)
Start
Demo – Overview of AD DS Management Tools (13:34)
Start
Topic B: Managing User Accounts (0:18)
Start
The Importance of the User Account (1:49)
Start
Naming Considerations (3:04)
Start
Configuring User Passwords (3:28)
Start
Creating User Accounts (2:06)
Start
Demo – Creating AD DS Users (32:38)
Start
Managing User Attributes (1:55)
Start
User Account Management (1:47)
Start
Demo – Managing Users (20:28)
Start
Topic C: Managing Groups (0:16)
Start
Group Types and Scopes (3:12)
Start
Types of Groups (2:00)
Start
Group Scopes (1:45)
Start
Domain Local and Global Groups (1:41)
Start
Universal Groups (0:36)
Start
Group Nesting (0:58)
Start
Group Naming Considerations (1:25)
Start
Creating and Configuring Groups (1:14)
Start
Demo – Creating and Configuring Groups (14:38)
Start
Introduction to Default Groups (1:39)
Start
Identifying Default Groups (2:32)
Start
Administrative Groups (0:46)
Start
Demo – Configuring Default Groups (3:56)
Start
Using Special Identities (2:27)
Start
Strategies for Using Groups (4:42)
Start
Group Nesting Strategies (6:18)
Start
Demo – Group Nesting (15:59)
Start
Topic D: Managing Computer Accounts (0:20)
Start
Introduction to Computer Accounts (2:10)
Start
Creating Computer Accounts (2:01)
Start
Working – Secure Channel Passwords (3:20)
Start
Offline Domain Joins (2:03)
Start
Demo – Working – Computer Accounts (9:57)
Start
Topic E: Managing Organizational Units (0:42)
Start
Planning Organizational Units (5:04)
Start
OU Hierarchy Considerations (0:52)
Start
Creating OUs (1:46)
Start
Demo – Creating an OU Hierarchy (10:37)
Start
Object Security in AD DS (1:21)
Start
AD DS Object Permissions (1:34)
Start
Demo – Viewing Object Permissions in Active Directory (5:40)
Start
Delegating Administrative Control (1:52)
Start
Modifying Delegated Rights (1:32)
Start
Best Practices for Administrative Delegation (1:25)
Start
Demo – Delegating Administrative Control (8:34)
Start
Chapter 02 Summary (1:29)
Start
Chapter 02 Review (0:10)
Start
Chapter 02 Quiz
Chapter 03 – Securing Active Directory Domain Services
Start
Chapter 03 Introduction (1:25)
Start
Topic A: Securing Domain Controllers (0:13)
Start
Understanding Security Risks (4:13)
Start
Using Group Policy (1:46)
Start
Group Policy Security Settings (2:14)
Start
Securing the Authentication Process (3:48)
Start
Physical Access Security (3:05)
Start
Branch Office Domain Controllers (2:06)
Start
RODC Features (3:28)
Start
RODC Limitations and Considerations (1:56)
Start
Deploying RODCs (2:17)
Start
Demo – Installing an RODC (8:13)
Start
Password Replication Policies (2:03)
Start
Topic B: Implementing Account Security (0:16)
Start
Account Security in Windows Server 2016 (2:04)
Start
Complexity Options (1:35)
Start
Password Policies (2:39)
Start
Account Lockout Policies (3:17)
Start
Configuring Domain Password and Lockout Policies (1:23)
Start
Demo – Configuring Account Policies in Group Policy (5:45)
Start
Configuring Fine -Grained Password Policies (1:35)
Start
Configuring Fine -Grained Password Policies Part 2 (2:31)
Start
Configuring Fine -Grained Password Policies Part 3 (1:31)
Start
Demo – Configuring Fine -Grained Password Policies (12:01)
Start
Restricted Groups (2:03)
Start
Protected Users Security Groups (2:03)
Start
Authentication Policies (2:58)
Start
Authentication Silos (1:12)
Start
Enhancing Password Authentication (4:13)
Start
Topic C: Auditing AD DS (0:12)
Start
Utilizing Auditing (1:41)
Start
The Purpose of Auditing (1:35)
Start
Types of Events (4:04)
Start
Auditing Goals (1:05)
Start
Auditing File and Object Access (2:26)
Start
Advanced Auditing (2:07)
Start
Demo – Configuring Auditing (12:59)
Start
Topic D: Configuring Managed Service Accounts (0:14)
Start
Overview of Service Accounts (2:36)
Start
Challenges to Managing Service Accounts (1:40)
Start
Managed Service Accounts (1:08)
Start
Group MSAs (1:01)
Start
Demo – Configuring Group MSAs (7:08)
Start
Chapter 03 Summary (1:49)
Start
Chapter 03 Review (0:10)
Start
Chapter 03 Quiz
Chapter 04 – Working – Complex AD DS Infrastructures
Start
Chapter 04 Introduction (1:52)
Start
Topic A: Overview of Advanced AD DS Deployments (0:13)
Start
Domain Boundaries (3:28)
Start
Forest Boundaries (1:32)
Start
Reasons for Implementing Multiple Domains (3:21)
Start
Reasons for Implementing Multiple Forests (2:39)
Start
Deploying Domain Controllers in Azure (6:26)
Start
Managing Objects (2:47)
Start
Topic B: Deploying a Distributed AD DS Environment (0:13)
Start
Domain Functional Levels (2:35)
Start
Forest Functional Levels (1:08)
Start
Deploying AD DS Domains (1:40)
Start
DNS Considerations (4:52)
Start
UPN Considerations (1:59)
Start
Demo – Deploying a Child Domain (5:55)
Start
Understanding Trust Relationships (3:05)
Start
Types of Trusts (3:23)
Start
How Trusts Work (2:43)
Start
Forest Trusts (1:52)
Start
Advanced Trust Settings (3:49)
Start
Demo – Configuring a Forest Trust (11:20)
Start
Topic C: Overview of AD DS Replication (0:20)
Start
AD DS Partitions (1:34)
Start
AD DS Replication (3:31)
Start
Types of Replication (2:46)
Start
Resolving Replication Conflicts (3:34)
Start
Topic D: Configuring AD DS Sites (0:23)
Start
Reasons for Sites (2:46)
Start
Planning for Sites (2:01)
Start
Overview of Sites and Subnets (1:49)
Start
Moving Domain Controller Accounts (0:49)
Start
Domain Controller Placement (3:43)
Start
Demo – Creating Sites (7:59)
Start
Controlling Inter -Site Replication (1:46)
Start
Defining Site Links (1:15)
Start
Site Links (1:29)
Start
Site Link Properties (2:13)
Start
Demo – Creating Site Links (6:46)
Start
Bridgehead Servers (1:25)
Start
Bridging Site Links (1:47)
Start
Monitor and Manage Replication (1:34)
Start
Chapter 04 Summary (1:08)
Start
Chapter 04 Review (0:10)
Start
Chapter 04 Quiz
Chapter 05 – Implementing Group Policy
Start
Chapter 05 Introduction (1:12)
Start
Topic A: Overview of Group Policy (0:11)
Start
What is Group Policy? (2:22)
Start
Group Policy Settings (1:39)
Start
Local Group Policies (1:47)
Start
Policies vs. Preferences (2:16)
Start
Demo – Examining Policy Settings (6:23)
Start
Domain Policies (2:43)
Start
GPO Storage (1:37)
Start
Linking GPOs (1:28)
Start
GPO Processing Order (2:03)
Start
Controlling Inheritance (1:38)
Start
Determining Inheritance (0:45)
Start
GPO Link Options (2:18)
Start
Security Filtering (3:50)
Start
WMI Filtering (2:20)
Start
Refreshing Policies (2:12)
Start
Other Processing Options (3:28)
Start
Topic B: Creating and Configuring GPOs (0:12)
Start
Creating GPOs (1:17)
Start
Starter GPOs (1:58)
Start
Administrative Templates (3:37)
Start
Group Policy Preferences (1:12)
Start
Demo – Creating and Configuring Policies (37:40)
Start
Group Policy Management (0:42)
Start
Delegation of Control (2:05)
Start
Demo – Managing GPOs (7:54)
Start
Topic C: Monitoring and Troubleshooting Group Policy (0:23)
Start
Troubleshooting Group Policy Application (3:05)
Start
Troubleshooting Group Policy Application (2:48)
Start
Demo – Troubleshooting Group Policy Application (11:40)
Start
Topic D: Security Management Using Group Policy (1:03)
Preview
Security Management Using Group Policy (0:50)
Start
Configuring User Rights (1:24)
Start
Managing Security Option s (1:52)
Start
User Account Control (2:09)
Start
Demo – Managing Security Options (5:43)
Start
Controlling Applications (1:09)
Start
Software Restriction Policies (3:23)
Start
Security Levels (1:09)
Start
AppLocker (1:41)
Start
Support for AppLocker (0:58)
Start
AppLocker Rules (1:55)
Start
Creating Default Rules (3:00)
Start
Demo – Controlling Applications Using Group Policy (11:35)
Start
Configuring the Windows Firewall (1:58)
Start
Windows Firewall – Advanced Security (1:31)
Start
Firewall Profiles (1:03)
Start
Creating Firewall Rules (0:24)
Start
Configuring the Windows Firewall (0:52)
Start
Types of Rules (1:31)
Start
Connection Security Rules (1:43)
Start
Demo – Configuring Firewalls using Group Policy (7:30)
Start
Topic E: Managing User Environments (0:24)
Start
Using Scripts in Group Policy (1:18)
Start
What is Folder Redirection? (1:53)
Start
Common Folders for Redirection (1:06)
Start
Redirection Options (1:38)
Start
Demo – Configuring Folder Redirection (5:38)
Start
Deploying Software Using Group Policy (2:09)
Start
How Software Distribution Works (0:44)
Start
Using Windows Installer (1:35)
Start
Software Life Cycle (0:58)
Start
Deploying Software (1:05)
Start
Deployment Options (2:04)
Start
Maintaining Software through Group Policy (0:56)
Start
Removing Software Deployments (0:44)
Start
Chapter 05 Summary (1:42)
Start
Chapter 05 Review (0:10)
Start
Chapter 05 Quiz
Chapter 06 – Understanding Microsoft Azure AD and Directory Synchronization
Start
Chapter 06 Introduction (1:19)
Start
Topic A: Planning Directory Synchronization (0:19)
Start
Overview of Azure AD (5:38)
Start
Limitations of AD DS (2:37)
Start
Extending AD DS Authentication (3:35)
Start
Comparing AD DS and Azure AD (1:58)
Start
Authentication Options (4:54)
Start
Planning Directory Synchronization (2:57)
Start
Enabling AD DS Synchronization (2:03)
Start
Topic B: Implementing Azure AD Connect (0:10)
Start
What is Azure AD Connect? (1:50)
Start
Azure AD Connect Requirements (4:01)
Start
Azure AD Connect Express Settings (1:06)
Start
Azure AD Connect Custom Installation (2:06)
Start
Monitoring Azure AD (1:06)
Start
Privileged Identity Management (1:23)
Start
Topic C: Managing Identities – Directory Synchronization (0:06)
Start
Managing Users (8:01)
Start
Managing Groups (0:55)
Start
Filtering Azure AD Connect (2:03)
Start
Monitoring Directory Synchronization (1:46)
Start
Troubleshooting Directory Synchronization (1:24)
Start
Chapter 06 Summary (1:29)
Start
Chapter 06 Review (0:10)
Start
Chapter 06 Quiz
Chapter 07 – Monitoring and Recovering AD DS
Start
Chapter 07 Introduction (1:25)
Start
Topic A: Monitoring AD DS (0:15)
Start
Performance Monitoring Benefits (2:05)
Start
Establishing Performance Baselines (2:13)
Start
Introduction to Monitoring Tools (0:51)
Start
Event Viewer (2:34)
Start
Demo – Using Event Viewer (5:12)
Start
Reliability Monitor (1:52)
Start
Real -Time Monitoring (2:42)
Start
Data Collector Sets (1:26)
Start
Data Collection Points (0:49)
Start
Common AD DS Counters (4:34)
Start
Best Practices (2:48)
Start
Topic B: Database Management (0:07)
Start
Physical Data Store (2:59)
Start
Using NTDSUtil (2:35)
Start
AD DS Maintenance (1:27)
Start
Topic C: Backup and Recovery in AD DS (0:11)
Start
Disaster Recovery for Active Directory (1:26)
Start
Backing Up Active Directory (4:17)
Start
Using Backup Tools (0:40)
Start
Backup Requirements (1:44)
Start
Restoring Data (4:27)
Start
Additional Restore Options (3:53)
Start
Demo – Enabling the AD Recycle Bin (3:23)
Start
Best Practices for Backup and Recovery (1:27)
Start
Chapter 07 Summary (1:58)
Start
Chapter 07 Review (0:10)
Start
Chapter 07 Quiz
Chapter 08 – Implementing Active Directory Certificate Services
Start
Chapter 08 Introduction (1:26)
Start
Topic A: Overview of Public Key Infrastructure and AD CS (0:08)
Start
What is a PKI? (1:38)
Start
Encryption Types (2:05)
Start
PKI Components (1:56)
Start
PKI Enabled Applications (1:49)
Start
Certificate Authorities (1:45)
Start
CA Types (0:49)
Start
Internal vs. External CAs (3:24)
Start
AD CS in Windows Server 2016 (3:15)
Start
Topic B: Deploying Certificate Authority Hierarchy (0:13)
Start
Decision Factors for CA Hierarchy (0:39)
Start
CA Hierarchy Roles (1:40)
Start
Best Practices for CA Hierarchies (1:22)
Start
Installing Root CAs (1:18)
Start
Installing Root CAs Part 2 (1:16)
Start
Demo – Installing a Root CA (8:01)
Start
Installing Subordinate CAs (0:50)
Start
Benefits of Using Subordinates (1:36)
Start
Automating Installations (1:58)
Start
Topic C: Administering Certificate Authorities (0:25)
Start
Administration Tools (3:09)
Start
Configuring CA Security (1:22)
Start
Security Roles for CA Administration (1:58)
Start
Policy and Exit Modules (1:29)
Start
Certificate Revocation Lists (CRL) (2:37)
Start
Publishing the CRL (0:57)
Start
Publishing AIAs and CDPs (1:14)
Start
Topic D: Deploying and Managing Certificates (0:08)
Start
Digital Certificates (1:54)
Start
Certificate Templates (1:08)
Start
Template Versions in Windows Server 2016 (2:11)
Start
Certificate Template Permissions (1:13)
Start
Updating Templates (1:21)
Start
Demo – Modifying and Enabling a Certificate Template (5:44)
Start
Enrollment Types (2:02)
Start
Manual Enrollment (0:58)
Start
Automating Enrollment (0:36)
Start
Autoenrollment Components (0:56)
Start
Demo – Configuring Autoenrollment (7:22)
Start
Credential Roaming (0:48)
Start
Topic E: Managing Revocation and Distribution (0:22)
Start
Certificate Revocation (1:24)
Start
Online Responder (1:41)
Start
Online Responder Process (0:50)
Start
Comparing CRL and OCSP (1:32)
Start
Configuring an Online Responder (1:01)
Start
Topic F: Configuring Certificate Recovery (0:16)
Start
Importance of Key Archival and Recovery (1:03)
Start
Key Archival (1:27)
Start
Data Recovery vs. Key Recovery (1:24)
Start
Archival Methods (0:44)
Start
Export Methods (0:46)
Start
Automating Archival (1:01)
Start
Recovering Lost Keys (1:11)
Start
Chapter 08 Summary (1:57)
Start
Chapter 08 Review (0:10)
Start
Chapter 08 Quiz
Chapter 09 – Implementing Active Directory Federation Services (AD FS)
Start
Chapter 09 Introduction (1:17)
Start
Topic A: Overview of AD FS (0:10)
Start
What is Identity Federation? (3:09)
Start
Federation Benefits (1:35)
Start
AD FS Components (2:13)
Start
Additional AD FS Terms (4:03)
Start
Identity Federation Scenarios (1:49)
Start
Business to Business Scenario (1:54)
Start
Business to Employee Scenario (0:46)
Start
Business to Consumer Scenario (0:32)
Start
New Features in Windows Server 2016 (1:30)
Start
Topic B: Planning and Deploying AD FS (0:06)
Start
AD FS Requirements (2:10)
Start
Server Roles (2:03)
Start
Planning High Availability (3:04)
Start
AD FS Claims (2:34)
Start
AD FS Claim Rules (3:38)
Start
Trust Relationships (2:32)
Start
Installing AD FS (2:59)
Start
Demo – Installing AD FS (8:39)
Start
Configuring Partners (3:35)
Start
Home Realm Discovery (2:06)
Start
Managing AD FS (1:53)
Start
Topic C: Overview of Web Application Proxy (0:17)
Start
Introducing the Web Application Proxy (2:49)
Start
Web Application Proxy and AD FS Proxy (1:47)
Start
Authentication Methods (2:02)
Start
Publishing Software (1:26)
Start
Chapter 09 Summary (1:05)
Start
Chapter 09 Review (0:10)
Start
Chapter 09 Quiz
Chapter 10 – Implementing Active Directory Rights Management Services
Start
Chapter 10 Intoduction (0:44)
Start
Topic A: Overview of AD RMS (0:12)
Start
Introducing AD RMS (2:56)
Start
The AD RMS Difference (2:57)
Start
AD RMS Components (2:06)
Start
Certificates and Licenses (2:36)
Start
Protecting Content (0:59)
Start
Consuming Content (1:32)
Start
Azure RMS (0:57)
Start
Topic B: Deploying AD RMS (0:09)
Start
Deployment Scenarios (2:03)
Start
Installation Overview (1:15)
Start
AD RMS Configuration (1:08)
Start
Demo – Installing AD RMS Cluster (5:59)
Start
AD RMS Management (2:02)
Start
External Sharing (1:43)
Start
Topic C: Protecting Content – AD RMS (0:08)
Start
Rights Policy Templates (1:13)
Start
Configuring Templates for Offline Usage (0:49)
Start
Demo – Configuring Rights Management Templates (5:37)
Start
Exclusion Policies (1:24)
Start
Chapter 10 Summary (0:44)
Start
Chapter 10 Review (0:10)
Start
Chapter 10 Quiz
Start
Course Closure (2:29)
Reviews
There are no reviews yet.