Windows Server 2008 Network Infrastructure, Part 5 of 5
Interactive

Windows Server 2008 Network Infrastructure, Part 5 of 5

LearnNow Online
Updated Oct 26, 2018

Course description

When adding Windows Server 2008 to a network environment there are many networking items to be considered. This course will start with the installation of the Windows Server 2008. The OSI model or stack is explained and then how it relates to the TCP/IP stack. You will then see how name resolution used with a Fully Qualified Domain Name (FQDN) and how it relates to MAC or IP addresses. Next is Dynamic Host Configuration Protocol (DHCP) and how it relates to MAC and IP addresses. Security is always a prime concern and the course will discuss how Internet Protocol Security (IPsec) is used to secure a network from intrusions. You will learn about managing resources, configuring services, and remote access. Then again back to security on how to secure network access with Microsoft Server 2008.

Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.


Prerequisites

The users must have an understanding of computers and computer networks. Previous experience with Microsoft Server is helpful.


Meet the expert

Robert O'Neill

Robert O'Neill has been a consultant and a Microsoft Certified Trainer for Quality Training Services since 1996. He has worked with Fortune 1000 companies and training companies throughout the United States and the Caribbean. Robert holds numerous certifications including MCT, MCAD, MCTS, MCITP, EA, and MCPD. His expertise focuses on Windows Server 2008, Windows 7, Windows SharePoint, Visual Studio .NET, and CompTIA.

Video Runtime

135 Minutes

Time to complete

175 Minutes

Course Outline

Module 9

Routing and Remote Access (42:21)

  • Introduction (00:42)
  • Routing TCP/IP (04:19)
  • Routing Updates (00:48)
  • Routing Tables (01:56)
  • Internet Connection Sharing (03:05)
  • Install and Config ICS (02:02)
  • Network Address Translation (01:58)
  • NAT Services (04:49)
  • Routing and Remote Access (00:42)
  • Features for 2008 RRAS (01:21)
  • Requirements (00:49)
  • Install and Config RRAS NAT (00:26)
  • Allows for DHCP server (00:46)
  • Client Configuration (00:55)
  • Remote Networks (00:20)
  • Virtual Private Networks - VPN (01:25)
  • VPN Protocols (01:28)
  • Direct Access (01:08)
  • Demo: Certificate Export (10:07)
  • Demo: Install Remote Access (01:27)
  • Demo: Register Policy Server (01:14)
  • Summary (00:23)

Network Policy Server (26:27)

  • Introduction (00:42)
  • Overview (00:39)
  • RADIUS (00:53)
  • Network Policy Server Proxy (00:33)
  • Network Policy Server (01:11)
  • Network Access Policy server (01:17)
  • Server Connection Config (00:43)
  • Components needed (00:41)
  • NPS as RADIUS Server (00:42)
  • NPS as RADIUS Proxy (01:24)
  • NPS Role (00:31)
  • NPS Client (00:48)
  • Connection Path (02:48)
  • Certificate Authentication (02:03)
  • Password Authentication (01:22)
  • Managing and Monitoring (01:55)
  • Demo: Config RADIUS (07:41)
  • Summary (00:26)

Wireless Networking (08:31)

  • Introduction (00:45)
  • Standards (01:02)
  • Wireless Modes (00:31)
  • Wireless Security (02:04)
  • Certificate Services (00:45)
  • Authentication Modes (00:54)
  • WPA_EAP Deployment (00:39)
  • Best Practices (01:16)
  • Summary (00:31)
Module 10

Network Access Protection (26:41)

  • Introduction (00:46)
  • What is NAP (01:18)
  • When do you use NAP (01:05)
  • DHCP Enforcement (00:49)
  • VPN Enforcement (00:34)
  • 802.1x access points (01:20)
  • IPsec (01:28)
  • Enforcement Process (00:50)
  • Network Access Devices (00:36)
  • Network Policy Server (00:47)
  • Implementation (02:02)
  • Health Validation Overview (00:39)
  • Health Policy (00:31)
  • Remediation Server Group (01:06)
  • IPsec Process Components (01:18)
  • Health Registration Authority (00:36)
  • IPsec Enforcement Process (01:09)
  • Client Configuration (00:57)
  • Terminal Services Gateway (01:54)
  • Demo: NAP (06:07)
  • Summary (00:37)

Security Review (31:12)

  • Introduction (00:41)
  • Overview (00:43)
  • Defense in Depth (01:50)
  • Best Practices (02:03)
  • Managing Security Settings (00:55)
  • Account and Local Policy (01:29)
  • Restricted Groups (01:48)
  • Configuration and Analysis (00:56)
  • Configuration Wizard (01:34)
  • Events to Audit (02:19)
  • Apply Audit Policy (00:43)
  • Demo:Config and Analysis (06:32)
  • Demo: Config Wizard (05:35)
  • Demo: Audit Policy (03:13)
  • Summary (00:43)
;