LearnKey Training

Windows Server 2003 Planning Network Infrastructure Course

Windows Server 2003 Planning Network Infrastructure Course

Back to Product Page


Windows Server 2003 Planning Network Infrastructure Course

5 Sessions -
13 Hours of Interactive Training

The Windows Server 2003 Planning Network Infrastructure course from LearnKey prepares you with the knowledge and skills needed to plan and maintain a Windows Server 2003 network. Expert instructor Michael Storm demonstrates critical skills like how to plan for server and network security, routing and remote access, and server availability. At the conclusion of the course, you will understand the skills required to plan a Windows Server 2003 network, and be prepared to pass MCP exam 70-293.

Benefits
  • This course meets MCP exam 70-293 objectives.
  • Develop your abilities and IT credibility.
  • Increase your career opportunities and earning potential.

About The Author
For the past 16 years, Michael Storm has managed the design, security and implementation of enterprise networks for Fortune 100 companies around the globe. As the founder of Brainstorm International, Inc., Storm specializes in InfoSec Security and Internetwork Solutions Architectures. He is currently the Director of Network Engineering and Security Officer for Interface Technical Training of Phoenix, AZ and creator of the Immersion Learning System™, used by countless Cisco® and Microsoft Professionals for achieving technical mastery. Storm holds many IT certifications, including the Cisco® CCIE® Security, CCNP®/CCSP™/CCDP®, NSA/CNSS CISSP, MCSE and MCT.

Session 1

Section A: Introduction

  • Connectivity
  • RRAS
  • Availability/Planning
  • Security
  • Components

Section B: TCP/IP Networking

  • Overview
  • Network Planning
  • IP Addressing
  • IP Address Classes
  • Subnet Mask
  • Addressing Scheme

Section C: Network Availability

  • Subnetting Requirements
  • Planning Example
  • Availability
  • Redundancy

Section D: Network Performance

  • Affecting Factors
  • Physical Subnets
  • Logical Subnets
  • Ethernet Usage - 10 Mbps
  • 100/1000 Mbps

Section E: Planning for Growth

  • Requirements
  • Traffic Flow
  • How to Plan

Section F: DHCP Planning

  • Config Methodologies
  • DHCP Features
  • Integration Benefits
  • LAN
  • Routed Networks
  • Planning
  • Non-Microsoft Clients

Section G: TCP/IP Addressing

  • DHCP Performance
  • Lease Duration
  • DHCP Security
  • DHCP Issues
  • Troubleshooting Tools
  • Traffic Monitoring

Session 2

Section A: Internet Connectivity

  • Overview
  • Connectivity Solutions
  • Connection Components
  • Using NAT
  • Secure Perimeter

Section B: Network Address Translation

  • Define Translation
  • NAT Solution
  • NAT Server Options
  • IP Filters
  • Address Pools/Ports
  • VPN Tunnels
  • Availability/Performance

Section C: Security and Acceleration

  • Planning Decisions
  • Filtering Features
  • Security Features
  • Additional Features
  • Design Options
  • Design Requirements
  • Active Directory
  • Perimeter Design

Section D: Enhancing ISA Server

  • Enhance Availability
  • Clustering Types
  • Caching Method
  • Organize Hierarchy
  • Distribute IP Traffic

Section E: Clustering Technologies

  • NLBS
  • CLB
  • Server Clusters
  • X Node Clustering
  • Clustering Components
  • Failover/Failback
  • Cluster Management

Section F: Planning RRAS

  • Planning Decisions
  • Isolation
  • Integration
  • Protocol Support
  • Routing Solution
  • Solution Integration

Section G: Routing Types

  • Overview
  • Static Routing
  • RIP Routing
  • OSPF Routing
  • Multicast Routing
  • DHCP Relay Agent

Session 3

Section A: RRAS Advanced Features

  • RRAS Filtering
  • Wireless Standards
  • Wireless Enhancements
  • 802.1x Authentication
  • Wireless Security
  • Enhancing Performance

Section B: IP Troubleshooting

  • Local Clients
  • Reachability Issues
  • NAT Issues
  • Routing Issues
  • Strategy for Routing
  • Outside-In
  • Inside-Out
  • Divide-by-Half

Section C: Secure Remote Access

  • IPSec
  • Connect with IPSec
  • IPSec Modes
  • VPN Tunnels
  • Tunneling Protocol
  • VPN Compulsory Tunnel
  • VPN Voluntary Tunnel
  • Tunneling Comparisons

Section D: RAS Authentication

  • Planning Decisions
  • Authentication Methods
  • Kerberos
  • Certificate-based
  • Smart Cards
  • NTLM/Clear-text
  • Digest/SSL/RADIUS
  • RAS Policy

Section E: Planning IPSec Policy

  • IPSec Policy
  • Requirements
  • Components
  • Identify Needs
  • IPSec Phases
  • Negotiation Policies
  • Policy Filters

Section F: Planning IPSec Deployment

  • Overview
  • Authentication Types
  • Digital Certificates
  • Certificate Use
  • Deployment Options
  • GPO Deployment
  • Processing Order
  • Effective Policy

Session 4

Section A: IPSec Troubleshooting

  • IPSec Monitor
  • IP Security Management
  • Users and Computers
  • RSoP
  • Event Viewer
  • Troubleshooting Process

Section B: DNS

  • Design Process
  • DNS Features
  • AD Integrated Zone
  • Traditional Zone
  • Choosing Zone Type
  • Connecting to Internet

Section C: Integrating DNS

  • Options
  • Namespace
  • First DNS Server
  • Secure DNS
  • Secure Zone Replication
  • DNS Availability
  • DNS Performance
  • DNS Troubleshooting

Section D: Planning WINS

  • WINS Solution
  • Routed Network
  • Client Considerations
  • Multiple Servers
  • Secure WINS
  • WINS Availability
  • WINS Performance

Section E: Security Design Process

  • Server Roles
  • Security Categories
  • Identify Risks
  • Identify Threats
  • Business Requirements
  • System Requirements

Section F: Security Baseline

  • Baseline Strategy
  • Baseline Server Roles
  • Physical Security
  • Passwords
  • Hardware
  • Security Templates
  • Verify and Analyze
  • Deploy and Update

Session 5

Section A: Perimeter Security

  • Router Security
  • External Attacks
  • DoS/Port Scanning
  • Firewalls
  • DMZ Subnets
  • Three-Interface Firewall
  • Three-Prong Approach
  • Midground Screen

Section B: Securing Public Servers

  • Vulnerabilities
  • Public Server Roles
  • HTTP/FTP Server
  • DNS Server
  • Messenger Server
  • Application Server
  • VPN Server
  • Terminal Server

Section C: Authentication/Encryption

  • Transmission Options
  • VPN Connection
  • Design Decisions

Section D: Certificates

  • PKI
  • Reliability
  • Requirements
  • CA Distribution
  • Issuing CAs
  • Commercial CAs
  • Private CAs

Section E: CA Design

  • Guidelines
  • Planning CA Hierarchy
  • User Accounts
  • Mapping

Section F: Planning for Administration

  • Planning Aspects
  • Remote Administration
  • Terminal Services
  • Monitoring Performance
  • Monitoring Services
  • Backup/Recovery
  • Media Handling
  • Data/System Protection