MS-Expert by sandeepkumarp

VIEWS: 16 PAGES: 32

									IIHT Certified Expert



Implementing and Managing Windows Server 2008 Clustering

Course Outline

Module 1: Introduction to Clusters

This module describes cluster concepts and functionality.

Lessons

•Overview of Clusters
•Benefits of Using Clusters
•Overview of the Windows Server 2008 High-Availability Solutions

Lab : Identifying Windows Server 2008 High-Availability Solutions

•Exercise 1: Identifying solutions for Web servers
•Exercise 2: Identifying solutions for database servers
•Exercise 3: Identifying complex solutions

After completing this module, students will be able to:

•Describe clusters.
•Describe the benefits of deploying a clustered solution.
•Outline the Windows Server 2008 high-availability solutions.

Module 2: Introduction to Windows Server 2008 Failover Clusters

This module describes key features and functionality of the Windows Server 2008 failover
clusters.

Lessons

•Overview of Windows Server 2008 Failover Clusters
•Key Windows Server 2008 Failover Cluster Features
•Overview of the Windows Server 2008 Quorum Models

Lab : Identifying Windows Server 2008 Clustering Solutions

•Exercise 1: Identifying clustered scenarios
After completing this module, students will be able to:

•Describe the Windows Server 2008 failover cluster terminology and concepts.
•Briefly describe key features in Windows Server 2008 failover clusters.
•Identify Windows Server 2008 failover cluster quorum modes.

Module 3: Preparing to Install a Failover Cluster

This module describes the prerequisites to install a Windows failover cluster.

Lessons

•Overview of Requirements for Installing a Failover Cluster
•Planning the Failover Cluster Implementation
•Installing the Failover Clustering Feature and Validating the Cluster Configuration
•Installing the Failover Cluster on Windows Server 2008 Server Core

Lab: Preparing for a Cluster Installation

•Exercise 1: Installing the Failover Clustering feature
•Exercise 2: Validating the failover cluster

After completing this module, students will be able to:

•Outline failover cluster requirements.
•Describe the planning required to deploy a Windows failover cluster.
•Install the Failover Clustering feature and verify requirements.
•Install the Failover Cluster on Windows Server 2008 Server Core.

Module 4: Overview of Failover Cluster Storage Requirements

This module describes storage fundamentals, and how to plan and implement storage solutions
for failover clusters.

Lessons

•Overview of Storage Technologies
•Introduction to Storage Area Networks
•Planning a Storage Solution for Failover Clusters
•Configuring an iSCSI Storage Connection

Lab: Identifying SAN Components

•Exercise 1: Identifying Fibre Channel SAN components
•Exercise 2: Configuring iSCSI storage connections

After completing this module, students will be able to:

•Describe storage technologies.
•Define Storage Area Networks.
•Plan a storage solution for failover clusters.
•Describe the process to configure an Internet SCSI (iSCSI) storage connection.

Module 5: Configuring a Failover Cluster

This module describes how to install and manage a failover cluster.

Lessons

•Creating a New Failover Cluster
•Managing a Failover Cluster
•Verifying Failover Functionality

Lab: Creating and Administering a Cluster

•Exercise 1: Creating a cluster
•Exercise 2: Managing a failover cluster

After completing this module, students will be able to:

•Create a new failover cluster.
•Manage a failover cluster.
•Test failover functionality.

Module 6: Configuring Cluster Resources and Server Roles

This module describes how to configure cluster resources and cluster common Windows Server
roles and applications.

Lessons

•Configuring Cluster Resources
•Implementing Failover Clusters for Server Roles Using Failover Cluster Management
•Clustering Server Roles Using Windows Server Core

Lab: Clustering Server Roles and Features

•Exercise 1: Clustering the print services role using Failover Cluster Management
•Exercise 2: Configuring cluster resources
•Exercise 3: Clustering the file services role on Windows Server Core

After completing this module, students will be able to:

•Configure cluster resources.
•Implement failover clusters for server roles using Failover Cluster Management.
•Describe how to cluster common server roles using Windows Server Core.

Module 7: Maintaining Microsoft Failover Clusters

This module describes how to maintain and troubleshoot failover clusters.

Lessons

•Monitoring Failover Clusters
•Backing Up and Restoring Failover Clusters
•Troubleshooting Failover Clusters

Lab: Maintaining Failover Clusters

•Exercise 1: Monitoring failover clusters
•Exercise 2: Performing backups on a failover cluster
•Exercise 3: Performing an authoritative restore on a failover cluster

After completing this module, students will be able to:

•Monitor failover clusters.
•Back up and restore failover clusters.
•Troubleshoot failover clusters.

Module 8: Implementing Multi-Site Clusters

This module describes multi-site clusters and the challenges that they present. In addition, this
module describes how to implement a multi-site cluster using Windows Server 2008.

Lessons

• Overview of Multi-Site Clusters
• Implementing Multi-Site Clusters Using Windows Server 2008


Module 9: Implementing Network Load Balancing Clusters
This module describes how to install and maintain Network Load Balancing (NLB) clusters.

Lessons

•Overview of Network Load Balancing Clusters
•Configuring a Network Load Balancing Cluster
•Maintaining a Network Load Balancing Cluster

Lab: Implementing an NLB cluster

•Exercise 1: Preparing the NLB cluster nodes
•Exercise 2: Configuring an NLB failover cluster

After completing this module, students will be able to:

•Describe how NLB clusters works.
•Configure an NLB cluster.
•Maintain an NLB cluster.


Managing Messaging Security using Microsoft Exchange Server 2007


Course Outline
Module 1: Maintaining Antivirus and Anti-spam Systems
After completing this module, students will be able to maintain antivirus and anti-spam
systems.
Lessons
• Introduction to Antivirus and Anti-Spam Management
• Implementing Anti-spam Features
• Implementing Antivirus Features
Lab: Maintaining Antivirus and Anti-Spam Systems
• Reviewing the Contents of the Spam Quarantine
• Discussion: Modifying Spam and Antivirus Settings
• Modifying Spam and Antivirus Settings
After completing this module, students will be able to:
• Describe antivirus and anti-spam management.
• Implement anti-spam features
• Implement antivirus features.
Module 2: Configuring Edge Transport Servers
After completing this module, students will be able to configure edge transport servers.
Lessons
• Deploying Edge Transport Servers
• Configuring Internet Message Delivery
• Configuring Security for Internet E-Mail
Lab: Configuring Edge Transport Servers
• Configuring SMTP Connectors to Secure SMTP E-Mail
• Implementing Secure/Multipurpose Internet Mail Extensions (S/MIME)
After completing this module, students will be able to:
• Deploy edge transport servers.
• Configure Internet message delivery.
• Configure security for Internet e-mail.
Module 3: Implementing Messaging Policies
After completing this module, students will be able to implement transport rules.
Lessons
• Introducing Messaging Policy and Compliance
• Implementing Messaging Records Management
• Implementing Transport Rules
Lab: Implementing Messaging Policies
• Configuring Managed E-Mail Folders
• Managing Transport Rules
After completing this module, students will be able to:
• Describe messaging policy and compliance.
• Implement messaging records management.
• Implement transport rules.


Windows Server 2008
Module 01: Windows Server 2008 Installation
Lesson 1: Windows Server 2008 Setup Improvements and Requirements
Lesson 2: Windows Server 2008 Server Core Installation
Lesson 3: Implementing Volume Licensing Strategy using KMS and MAK
Lab 1: Windows Server 2008 Installation
Module 2: Server Core Configuration
Lesson 1: Server Core Basic Configuration
Lesson 2: Configuring Server Core Roles
LAB 1: Perform Server Core Configuration Task

Module 3: Windows Server 2008 RODC Installation
Lesson 1: Domain Controller Installation
Lab 1: Deploy an RODC in a Branch Office Using an Unattended File

Module 04: Using Windows Deployment Services
Lesson 1: Windows Deployment Services
Lesson 2: Working with the WIM Format
Lab 1: Working with Windows Deployment Services

Module 5: Windows Server Deployment Solution Accelerator
Lesson 1: Introduction to the WSD Solution Accelerator

Module 6: Upgrading and Migrating Active Directory
Lesson 1: Windows Server 2008 Upgrade Overview
Lesson 1: Windows Server 2008 Upgrade Overview Lesson 2: Upgrading Windows Server 2003
Domain Controllers to Windows Server 2008
Lesson 3: Active Directory Upgrade Sequence
Lab 1: Preparing the Active Directory Environment for Windows Server 2008
Lab 2: Installing an Additional Windows Server 2008 Domain Controller


Module 07: Upgrading File and Print Servers

Lesson 1: Changes to File Services for Windows Server 2008
Lesson 2: Changes to Print Services for Windows Server 2008
Lesson 3: File and Print on Virtual Machines and Server Core
Lab 1: Upgrading a Windows Server 2003 File and Print Server    Error! Bookmark not
defined.

Module 08: Upgrading Application and Web Servers
Lesson 1: Upgrading Application and Web Servers
Lesson 2: Best Practices for Upgrading an Application and Web Server
Lab 1: Upgrading a Windows Server 2003 Web Server to Windows Server 2008 and IIS7

Module 09: Upgrading Branch Office Servers
Lesson 1: Migrating or Upgrading a Windows Server 2003 Branch Office Server to Windows
Server 2008
Lesson 2: Low-Touch Branch Office Server Deployment
Lab 1: Prepare a Windows Server 2008 Server Core Installation for use as a Branch Office Server



ISA 2006

           1. Overview of Microsoft ISA Server 2006

           2. Installing and Maintaining ISA Server

           3. Enabling Access to Internet Resources

           4. Configuring ISA Server as a Firewall

           5. Configuring Access to Internal Resources

           6. Configuring Virtual Private Network Access for Remote Clients and Networks

           7. Web Filtering and Implementing Caching

           8. Monitoring ISA Server 2006




SCCM – System Centre Configuration Manager

1.0 Getting Started with Configuration Manager 2007
1.1 Fundamentals of Configuration Manager 2007
1.2 Configuration Manager Planning and Deployment Overview
1.3 Configuration Manager Supported Configurations
1.4 Configuration Manager 2007 Features
1.5 Security and Privacy for Configuration Manager 2007
2.0 Planning and Deploying the Server Infrastructure for Configuration Manager 2007
2.1 Configuration Manager Single Site Planning and Deployment
2.2 Configuration Manager Multiple Site Planning and Deployment
2.3 Configuring Configuration Manager Sites for Best Performance
2.4 Configuration Manager Upgrade and Interoperability Planning and Deployment
2.5 Deploying Configuration Manager Sites to Support Internet-Based Clients
2.6 Deploying Configuration Manager Sites in International and Multi-Language Environments
2.7 Configuration Manager Tasks for Decommissioning Sites and Hierarchies
3.0 Planning and Deploying Clients for Configuration Manager 2007
3.1 Overview of Configuration Manager Client Deployment
3.2 Prerequisites for Configuration Manager Client Deployment
3.3 Planning for Configuration Manager Client Deployment
3.4 Configuring Configuration Manager Client Deployment
3.5 Tasks for Configuration Manager Client Deployment
3.6 Troubleshooting Configuration Manager Client Deployment
3.7 Best Practices for Securing Clients
4.0 How to Configure Configuration Manager 2007
4.1 Configuration Manager Tasks for Configuring a Single Site
4.2 Configuration Manager Tasks for Configuring Multiple Sites
4.3 Checklist for Required Post Setup Configuration Tasks
4.4 How to Configure Configuration Manager Clients
4.5 How to Configure Configuration Manager Features
5.0 Configuration Manager 2007 Features
5.1 Using the Configuration Manager Console
5.2 Collections in Configuration Manager
5.3 Discovery in Configuration Manager
5.4 Inventory in Configuration Manager
5.5 Queries in Configuration Manager
5.6 Reporting in Configuration Manager
5.7 Software Distribution in Configuration Manager
5.8 Software Updates in Configuration Manager
5.9 Software Metering in Configuration Manager
5.10 Mobile Device Management in Configuration Manager
5.11 Operating System Deployment in Configuration Manager
5.12 Desired Configuration Management in Configuration Manager
5.13 Network Access Protection in Configuration Manager
5.14 Wake On LAN in Configuration Manager
5.15 Remote Tools in Configuration Manager
6.0 Maintaining Configuration Manager 2007
6.1 Planning for Site Maintenance
6.2 Overview of Site Maintenance
6.3 Configuring Site Maintenance
6.4 Tasks For Maintaining Sites
6.5 Planning for Backup and Recovery
6.6 Overview of Backup and Recovery
6.7 Tasks for Backing Up a Site
6.8 Tasks for Recovering a Site
6.9 Troubleshooting Site Maintenance
6.10 Troubleshooting Backup and Recovery Issues
7.0 Troubleshooting Configuration Manager 2007
7.1 Troubleshooting Tools
7.4 Troubleshooting Configuration Manager Client Deployment
7.5 Troubleshooting the Configuration Manager Console
7.15 Troubleshooting Remote Tools Using Custom Error Codes




SCOM


MOM 2005
     Introduction to MOM 2005
What’s new in SCOM 2007
      New and advanced features of SCOM 2007
Implementing and administering SCOM 2007
      Introduction to SCOM 2007
      Designing architecture and Implementation methodology in SCOM 2007
      Installing SCOM 2007
      Configuring a SCOM Management Group
      Monitoring Managed Services
      Administering Managed Computers
       Planning a SCOM 2007 Infrastructure
Operations Manager Fundamentals
      Agent Setup and Deployment
      Administration of SCOM 2007
      Monitoring managed agents using SCOM 2007
      Authoring
      Data warehousing for SCOM 2007
      Reporting features in SCOM 2007
Operations Manager RC0 Scenarios
      Configuring Advanced Deployment Features
      Administration using console
      Scenario based Monitoring
      Monitoring MS Exchange and Domain controllers (Management Packs)
      Reporting features of SCOM 2007
      Management Pack Scenarios
      Designing custom management packs and deploying the same
Operations Manager RC1 Scenarios
      Command Notification
      Diagnostic and Recovery Tasks

The above content will showcase
       Constraints and Limitations of MOM 2005




Configuring Windows Server 2008 Active Directory Domain Services

Course Outline
Module 1: Installing Active Directory Domain Services
This module explains how to install and configure Active Directory Domain Services and install
and configure a read-only domain controller.
Lessons
• Installing Active Directory Domain Services
• Deploying Read-Only Domain Controllers
• Configuring AD DS Domain Controller Roles
Lab: Implementing Read-Only Domain Controllers
• Exercise 1: Evaluating Forest and Server Readiness for Installing an RODC
• Exercise 2: Installing and Configuring an RODC
• Exercise 3: Configuring AD DS Domain Controller Roles
After completing this module, students will be able to:
• Install Active Directory Domain Services.
• Deploy Read-Only Domain Controllers.
• Configure AD DS Domain Controller Roles.
Module 2: Configuring DNS for AD DS
This module explains how to configure Domain Name Services (DNS) for Active Directory
Domain Services.
Lessons
• Overview of Active Directory Domain Services and DNS Integration
• Configuring Active Directory Integrated Zones
• Configuring Read Only DNS
Lab: Configuring AD DS and DNS Integration
• Exercise 1: Configuring Active Directory Integrated Zones
• Exercise 2: Configuring Read-Only DNS Zones
After completing this module, students will be able to:
• Describe Active Directory Domain Services and DNS Integration.
• Configure Active Directory Integrated Zones.
• Configure Read Only DNS.
Module 3: Configuring Active Directory Objects and Trusts
This module explains how to configure Active Directory Objects and Trusts.
Lessons
• Configuring Active Directory Objects
• Automating AD DS Object Management
• Delegating Administrative Access to AD DS Objects
• Configuring AD DS Trusts
Lab: Configuring Active Directory Objects and Trusts
• Exercise 1: Configuring AD DS Objects
• Exercise 2: Automating the Management of AD DS Objects
• Exercise 3: Delegating Control of AD DS Objects
• Exercise 4: Configuring AD DS Trusts
After completing this module, students will be able to:
• Configure Active Directory Objects.
• Automate AD DS object management.
• Delegate Administrative access to AD DS objects.
• Configure AD DS trusts.
Module 4: Configuring Active Directory Sites and Replication
This module explains how to configure Active Directory Objects and Trusts.
Lessons
• Overview of AD DS Replication
• Configuring Active Directory Domain Services Sites
• Configuring and Monitoring AD DS Replication
Lab: Configuring Active Directory Sites and Replication
• Exercise 1: Configuring AD DS Sites and Subnets
• Exercise 2: Configuring AD DS Replication
• Exercise 3: Monitoring AD DS Replication
After completing this module, students will be able to:
• Describe AD DS replication.
• Configure Active Directory Domain Services sites.
• Configure and monitor AD DS replication.
Module 5: Creating and Configuring Group Policies
This module explains how to create and configure group policies.
Lessons
• Overview of Group Policies
• Configuring the Scope of Group Policy Objects
• Evaluating the Application of Group Policy Objects
• Managing Group Policy Objects
• Delegating Administrative Control of Group Policies
Lab: Creating and Configuring GPOs
• Exercise 1: Creating Group Policy Objects
• Exercise 2: Managing the Scope of GPO Application
• Exercise 3: Verifying GPO Application
• Exercise 4: Managing GPOs
• Exercise 5: Delegating Administrative Control of GPOs
After completing this module, students will be able to:
• Describe Group Policies.
• Configure the scope of Group Policy objects.
• Evaluate the application of Group Policy objects.
• Manage Group Policy objects.
• Delegate administrative control of Group Policies.
Module 6: Configuring User Environments Using Group Policies
This module explains how to configure user environments using Group Policies.
Lessons
• Configuring Group Policy Settings
• Configuring Scripts and Folder Redirection Using Group Policies
• Configuring Administrative Templates
• Deploying Software Using Group Policy
Lab Configuring User Environments Using Group Policies
• Exercise 1: Configuring Scripts and Folder Redirection
• Exercise 2: Configuring Administrative Templates
• Exercise 3: Distributing Software Using Group Policies
• Exercise 4: Verifying GPO Application
After completing this module, students will be able to:
• Configure Group Policy settings.
• Configure scripts and folder redirection Using Group Policies.
• Configure administrative templates.
• Deploy software using Group Policy.
Module 7: Implementing Security Using Group Policies
This module explains how to implement security using Group Policies.
Lessons
• Configuring Security Policies
• Implementing Fine-Grained Password Policies
• Restricting Group Membership and Access to Software
• Managing Security Using Security Templates
Lab: Implementing Security by Using Group Policies
• Exercise 1: Configuring Domain Security Settings
• Exercise 2: Implementing Fine-Grained Password Policies
• Exercise 3: Configuring Restricted Groups and Software Restriction Policies
• Exercise 4: Configuring Security Templates
• Exercise 5: Verifying the Security Configuration
After completing this module, students will be able to:
• Configure security settings.
• Implement fine-grained password policies.
• Restrict group membership and access to software.
• Manage security using security templates.
Module 8: Implementing an Active Directory Domain Services Monitoring Plan
This module explains how to implement Active Directory Domain Services monitoring plan.
Lessons
• Monitoring Active Directory Domain Services Using Event Viewer
• Monitoring Active Directory Domain Servers by Using Reliability and Performance Monitor
• Configuring Active Directory Domain Services Auditing
Lab: Monitoring Active Directory Domain Services
• Exercise 1: Monitor AD DS by Using Event Viewer
• Exercise 2: Monitor AD DS by Using Performance and Reliability Monitor
• Exercise 3: Configure AD DS Auditing
After completing this module, students will be able to:
• Monitor Active Directory Domain Services using Event Viewer.
• Monitor Active Directory Domain servers using reliability and performance monitor.
• Configure Active Directory Domain Services Auditing.
Module 9: Implementing an Active Directory Domain Services Maintenance Plan
This module explains how to implement an Active Directory Domain Services maintenance plan.
Lessons
• Maintaining the AD DS Domain Controllers
• Backing Up Active Directory Domain Services
• Restoring Active Directory Domain Services
Lab: Implementing an Active Directory Domain Services Maintenance Plan
• Exercise 1: Maintaining AD DS Domain Controllers
• Exercise 2: Backing Up AD DS
• Exercise 3: Performing a Non-Authoritative Restore of the AD DS Database
• Exercise 4: Performing an Authoritative Restore of the AD DS Database
• Exercise 5: Restoring Data By Using the AD DS Snapshot Viewer
After completing this module, students will be able to:
• Maintain the AD DS Domain Controllers.
• Back up the Active Directory Domain Services.
• Restore the Active Directory Domain Services.
Module 10: Troubleshooting
This module explains how to troubleshoot Active Directory Domain Services, Domain Name
Service, and Active Directory replication.
Lessons
• Troubleshooting Active Directory Domain Services
• Troubleshooting DNS Integration with AD DS
• Troubleshooting AD DS Replication
Lab: Troubleshooting Active Directory, DNS, and Replication Issues
• Exercise 1: Troubleshooting Authentication and Authorization Errors
• Exercise 2: Troubleshooting the Integration of DNS and AD DS
• Exercise 3: Troubleshooting AD DS Replication
After completing this module, students will be able to:
• Troubleshoot Active Directory Domain Services.
• Troubleshoot DNS integration with AD DS.
• Troubleshoot AD DS replication.
Module 11: Troubleshooting Group Policy Issues
This module explains how to troubleshoot the application of group policy objects.
Lessons
• Introduction to Group Policy Troubleshooting
• Troubleshooting Group Policy Application
• Troubleshooting Group Policy Settings
Lab: Troubleshooting Group Policy Issues
• Exercise 1: Troubleshooting Group Policy Applications
• Exercise 2: Troubleshooting Group Policy Settings
After completing this module, students will be able to:
• Describe Group Policy troubleshooting.
• Troubleshoot Group Policy application.
• Troubleshoot Group Policy Settings.
Module 12: Implementing an Active Directory Domain Services Infrastructure
This module explains how to implement an Active Directory Domain Services Infrastructure.
Lessons
• Overview of the AD DS Deployment
Lab: Deploying Active Directory Domain Services
• Exercise 1: Deploying Active Directory Domain Services
• Exercise 2: Deploying AD DS Sites
• Exercise 3: Implementing Group Policies
• Exercise 4: Verifying the AD DS Deployment
• Exercise 5: Testing the AD DS Disaster Recovery Plan

After completing this module, students will be able to:
• Deploying Active Directory Domain Services
• Deploying AD DS Sites
• Implementing Group Policies
• Verifying the AD DS Deployment
• Testing the AD DS Disaster Recovery Plan




Installing and Managing Office Communications Server (OCS) 2007
        Determine the differences between the Standard Edition and the Enterprise Edition.
       Prepare the environment for OCS 2007
       Request and configure certificates.
       Configure address book service.
       Manage coexistence between Microsoft Office Live Communications Server 2005 and
       OCS 2007.
       Configure security features.
       Deploying and Configuring OCS 2007 Clients
       Deploy and configure Office Communicator 2007 clients.125
       Deploy and configure Communicator Web Access 2007.
       Deploy and configure the Microsoft Office Live Meeting 2007 client.
       Manage Office Communicator client migration.
Configuring Conferencing
       Configure the A/V Conferencing Server.
       Configure the Web Conferencing Server.
       Configure the Conferencing Server policy settings.
       Configure external conferencing access.
Configuring Enterprise Voice Functionality
       Configure outbound routing.
       Configure location profiles.
       Configure phone number normalization.
       Configure the Mediation Server.
       Configure PC-based audio peripherals.
Configuring External Connectivity
       Configure the Edge Server.
       Configure Public IM Connectivity (PIC).
       Configure federation.
       Configure remote user access.
Monitoring and Maintaining OCS 2007
      Monitor server resource utilization.
       Isolate issues related to OCS 2007.
       Back up and restore OCS 2007.
       Configure event logging.
       Install and configure IM archiving.
       Install and configure Meeting Compliance.
ITIL Foundation


Course Contents
1. Module 1- Introduction
2. Module 2- Service Lifecycle
3. Module 3- Service Management as a Practice
4. Module 4 – Key Principles, Models and Concepts
5. Module 5- Lifecycle Phases
       a. Service Strategy
       b. Service Design
       c. Service Transition
       d. Service Operation
       e. Continual Service Improvement
       f. Integration of the 5 Crore Process
6. Module 6 –Service Capabilities
       a. Service offerings and Agreements
       b. Planning, Protection and Optimazation
       c. Release, Control and Validation
       d. Operational Support and Analysis
7. Module 7- Service Management Technology




Veritas Volume Manager
   1. Introduction to RAID concepts
   2. Virtual Objects
   3. Installing VERITAS Volume Manager
   4. VERITAS Volume Manager Interfaces
   5. Managing Disks
   6. Managing Disk Groups
   7. Creating Volumes
   8. Configuring Volumes
   9. Volume Maintenance
   10. Offline and Off-Host Processing
   11. Encapsulation and Boot Disk Mirroring
   12. Architecture
   13. Introduction to Recovery




Implementing System Center Data Protection Manager 2007



Module 1: Introducing Data Protection and Disaster Recovery


This module discuses disaster recovery basics, describes the System Center Data Protection
Manager 2007 architecture, and discusses the planning process required to implement DPM-
based disaster recovery and data protection in an enterprise environment.
During group discussion exercises that accompany this module, you will analyze a typical
enterprise environment and develop a plan to implement comprehensive data protection.

Lessons
Overview
What is DPM?
What Can DPM Protect?
Examining Backup Solutions
What You Will Learn
DPM Backup Types
Tape-Based Backup and Archive
Disk-Based Protection and Recovery
Combining Disk and Tape Backup Methods
Determining Which Storage Method to Use
Protecting Multiple Data Types
Protecting Clustered Servers
Managing Data Protection
DPM Administrator Console
DPM Reports and Notifications
DPM Management Packs
End-User Recovery
Windows PowerShell Integration
How Does DPM Work?
Examining Disk-Based Protection
Deploying Protection Agents
Defining Protection Groups
Creating Replicas
Tracking Changes
Examining Synchronization
Synchronizing Replicas
Performing Consistency Checks
Initiating Consistency Checks
How Consistency Checks Affect Network Performance
Examining Recovery Points
Creating Recovery Points
Recovery Point Limitations
Recovering Data
Examining Tape-Based Protection
Seamless Disk- and Tape-Based Recovery
Recovery Goals for Protection on Tape
Tape Data Consistency
Managing Tape Catalog Retention
Inventorying Tape Libraries
Adding and Removing Tapes
Optimizing DPM Server Performance
Optimizing DPM Process Utilization
Optimizing Synchronization
Reducing Synchronization Impact on Network Performance
Planning for Disaster Recovery
Preparing for DPM Server Recovery
No Preparation?
Effective Preparation
Selecting Enterprise Data to Protect
Types of Data that Can Be Protected
Protecting File Data on Servers and Workstations
Protecting Exchange Server Storage Groups
Protecting SQL Server Databases
Protecting Windows SharePoint Services Data
Protecting Virtual Server and Virtual Machines
Protecting Clustered Resources
Protecting Server System State
Planning Protection Configurations
Planning Protection Groups
Selecting Protection Group Members
Guidelines for Protection Groups
Special Considerations for Protecting Data on Workstations
Special Considerations for Protecting Data Over a WAN
Importance of Protection Group Membership Decisions
Selecting a Data Protection Method
Defining Recovery Goals
Allocating Space for Protection Groups
Specifying Tape Library Details
Compressing Data
Encrypting data
Choosing a Replica Creation Method
Calculating Time Required for Replica Creation
Automatic Replica Creation
Manual Replica Creation
Planning for DPM Deployment
Planning DPM Server Configurations
Selecting the Number of DPM Servers
Locating DPM Servers
Selecting the Instance of SQL Server
Using a Remote SQL Server
Recommendations for Remote SQL Server Security
Planning the Storage Pool
Calculating Capacity Requirements
Estimating Daily Recovery Point Size
Determining Retention Range Objectives
Choosing Sources for Storage Capacity
Planning the Disk Configuration
Planning the Tape Library Configuration
       Planning for Security
       Security Considerations
       Configuring Antivirus Software
       Configuring Firewalls
       Configuring Security Permissions
       Using Domain Security Groups
       Granting Appropriate User Privileges
       Planning for End-User Recovery
       Configuring Active Directory Domain Services
       Installing DPM Recovery Point Client Software
       Planning for Notifications and E-mail Reports
       Review

Lab 1: Planning for DPM Implementation

Lab 2: Planning for Data Recovery Resources

After completing this module, students will be able to:

       Select a backup solution
       Define protection groups, protection agents, synchronization, consistency checks,
       recovery points with relation to DPM
       Prepare a protection and recovery plan for the enterprise
       Select a data protection method
       Define recovery goals
       Allocate space for protection groups
       Select replica creation method
       Set compression and encryption levels

Module 2: Installing and Configuring DPM 2007
This module discusses system requirements for the DPM 2007 server, explains how to specify
non-default settings when installing the operating system before installing DPM, provides step-
by-step instructions for installing DPM servers and protection agents on enterprise systems,
and discusses troubleshooting techniques for resolving issues you may encounter.
During lab exercises that accompany this module, you will install DPM prerequisite software,
install a DPM server, perform initial required configuration tasks, and perform selected tasks to
enable optional DPM features and functions.

Lessons

       Overview
       Examining System Requirements
       Hardware Requirements
       Server Hardware Requirements
Storage Requirements
Software Requirements
DPM Server Operating System Requirements
DPM Server Software Requirements
Protected Server Requirements
Installing DPM 2007 on a Server
Installation Considerations
Step by Step Guide to Installing DPM 2007
Step-by-Step Guide to Upgrading from DPM 2007 Pre-Release to RTM
Troubleshooting DPM 2007 Setup Issues
Installation Issues
Upgrade Issues
Uninstallation Issues
Completing Configuration Tasks
Opening the DPM Administrator Console
Navigation Bar
Menu Bar
Console Panes
Information Icon
Performing Required Configuration Tasks
Adding Disks to the Storage Pool
Configuring Tape Libraries
Installing Protection Agents
What is a Protection Agent?
Cross-Domain and Cross-Forest Support
Configuring Windows Firewall on the DPM Server
Installing Protection Agents
Installing Protection Agents behind a Firewall
Installing Protection Agents using Server Images
Installing Protection Agents Using Systems Management Server
Installing Protection Agents with a PowerShell Script
Troubleshooting Protection Agent Installation
Potential Issues
Creating Protection Groups
Protecting Data with Protection Groups
Data Sources and Protection Levels
Protection Group Considerations
Creating Custom Volumes for Protection Groups
Potential Issues with Standard Volumes
Optimizing Performance with Custom Volumes
Creating Custom Volumes
Additional Considerations for Using Custom Volumes
Step-by-Step Guide to Creating Protection Groups
Starting the Wizard
       Selecting Protection Group Members
       Selecting Protection Methods
       Specifying Short-Term Protection Goals
       Allocating Space for Protection Groups
       Selecting Long-Term Protection Goals
       Selecting Library and Tape Details
       Choosing a Replica Creation Method
       Completing Protection Group Creation
       Completing Custom Volume Preparation
       Creating a Protection Group in DPM Management Shell
       Performing Optional Configuration Tasks
       Optimizing Performance
       Enabling On-the-Wire Compression
       Enabling Server Throttling
       Staggering Synchronization Jobs
       Scheduling Consistency Checks
       Modifying the Express Full Backup Schedule
       Enabling End-User Recovery
       Extending the Active Directory Schema for End User Recovery
       Step-by Step Guide to Extending Active Directory for End User Recovery
       Installing Shadow Copy Client Software
       Subscribing to Alerts and Notifications
       Configuring SMTP Servers
       Publishing DPM Alerts
       Installing the DPM Management Shell
       Review

Lab 1: Installing and Configuring DPM 2007

Lab 2: Configuring DPM 2007

Lab 3: Working with End-User Recovery

Lab 4: Subscribing to Alerts and Notifications

After completing this module, students will be able to:

       List out the hardware and software requirements for DPM 2007
       Install DPM 2007 on a server
       Use the DPM console
       Install the protection agent on a protected computer
       Create protection groups
       Configure the protection group
Module 3: Extending DPM Protection to Enterprise Applications


This module explains how to extend data protection to Exchange Servers, SQL Servers,
SharePoint and Clustered servers, and Virtual Server Hosts and Virtual Machines by installing
protection agents and configuring protection groups.
During lab exercises that accompany this module, you will install protection agents on an
Exchange Server, a SQL Server, a SharePoint server, and a Virtual Server Host, create protection
groups on the DPM server, and monitor data collection.

Lessons

       Overview
       General Requirements
       Planning Protection Groups
       Designing Protection Groups for Exchange and SQL Servers
       Managing Protected Servers
       Performing General Server Maintenance
       Using Windows Maintenance Tools
       Applying Operating System Updates
       Running Antivirus Software
       End User Recovery Only Supported for File Servers
       Considerations for Protecting File Servers
       Changing the Path of an Encrypted Data Source
       Renaming a File Server
       Changing the Time Zone of File Servers
       Protecting Exchange Servers
       Considerations for Protecting Exchange Servers
       Understanding Exchange Storage Groups
       Installing Protection Agents on Exchange Servers
       Creating Exchange Server Protection Groups
       Starting the Create New Protection Group Wizard
       Selecting Protection Group Members
       Selecting Protection Methods
       Specifying Short-Term Protection Goals
       Specifying Exchange Protection Options
       Allocating Disk Space
       Selecting Long-Term Protection Goals
       Choosing a Replica Creation Method
       Completing Protection Group Creation
       Protecting SQL Servers
       Considerations for Protecting SQL Servers
       Adding Databases
       Changing Database File Paths
Renaming Databases
Co-existing with Other Backup Applications
Performance Optimizations for Slow Networks
End-user Recovery is Not Supported
Installing Protection Agents on SQL Servers
Creating SQL Server Protection Groups
Starting the Create New Protection Group Wizard
Selecting Data to Protect
Selecting Protection Methods
Specifying Short-Term Protection Goals
Allocating Disk Space
Specifying Long-Term Protection Policies
Protecting SharePoint Server Farms
DPM 2007 Support for SharePoint Versions
Considerations for Protecting SharePoint Servers
SharePoint Writer Must be Registered and Started
Upgrading Windows SharePoint Services
Adding Databases to a Windows SharePoint Services Farm
Recovering SharePoint Databases
SharePoint System Architecture
Web Servers
Content Database Servers
Configuration Database
Web Server Topology
SharePoint Farm Layout
Installing Protection Agents on Windows SharePoint Farms
Registering and Starting the WSS Writer Service
Installing the Protection Agent
Providing SharePoint Credentials to the Protection Agent
Creating SharePoint Protection Groups
Protecting Virtual Machines
DPM 2007 Support for Virtual Hosts and Virtual Machines
Typical Protection for Virtual Machines
Better Protection for Virtual Machines with DPM
Application Awareness
Ease of Use and Management
Using DPM 2007 to Protect Virtual Server Hosts and Virtual Machines
Considerations for Virtual Machine Protection
Adding Virtual Machines
Changing Virtual Machine File Paths
Protecting Application Data on Virtual Machines
Performance Optimizations for Slow Networks
Installing DPM Protection Agents on Virtual Servers
Creating Virtual Machine Protection Groups
       Review

Lab 1: Protecting Exchange Data

Lab 2: Protecting a SQL Database

Lab 3: Protecting a SharePoint Database (Optional)

After completing this module, students will be able to:

       Perform maintenance jobs on the DPM servers
       Protect file servers
       Protect Exchange servers
       Protect SQL servers
       Protect SharePoint farms
       Protect virtual machines

Module 4: Examining Protected Data Backup and Recovery
This module provides step-by-step instructions to prepare for recovery of DPM servers, backup
protected computer system states, and recover and restore system states and protected data
for the DPM Server, Exchange Servers, SQL Servers, and Virtual Server Machines. Topics also
explain how to synchronize the DPM Server with data protected data in the storage pool.

Lessons

       Overview
       Preparing for Disaster Recovery
       Disaster Recovery Review
       Backing Up Protected Computer System States
       DPM Server Components that Require Backup
       DPM Database and Report Database
       Replicas
       DPM Config folder
       ScriptingConfig.xml and Other Scripts
       Backing up the DPM Server
       Backing Up DPM from a Secondary DPM Server
       Backing up DPM Databases to Tape from the Primary DPM Server
       Backing up with Third-Party Software
       Recovering Protected Computers
       Recovering System State to Protected Computers
       Recovering System State Files
       Restoring System State Files
       Recovering Protected Computers to New Hardware
       Recovering Protected Computers from a Secondary DPM Server
       Recovering DPM Servers
       Recovering DPM Databases
       Recovering DPM Replicas
       Performing a Bare Metal Recovery of a DPM Server
       Synchronizing DPM Databases with DpmSync
       Using Pre-backup and Post-backup Scripts
       Recovering Protected Exchange Data
       Choosing Exchange Data Recovery Methods
       Recovering Storage Groups
       Recovering a Storage Group to its Original Location
       Recovering a Storage Group to a Network Folder
       Recovering Mailboxes
       Recovering a Protected Mailbox
       Recovering Protected SQL Data
       Choosing SQL Server Recovery Methods
       Recover Database to Original Location
       Recover Databases to Alternate Locations on the Same Server
       Recover Databases to an Alternate Server
       Recover Database Files to Tape
       Recovering a SQL Database to its Original Location
       Recovering a Renamed Copy of a SQL Database
       Recovering a SQL Database to a Network Folder
       Recovering a Copy of the SQL Database to Tape
       Recovering Protected Virtual Machines
       Choosing a Virtual Machine Recovery Method
       Recovering Virtual Machines to Original Locations
       Recovering Virtual Machines to Alternate Locations
       Recovering a Virtual Machine to its Original Location
       Recovering a Virtual Machine to a Network Folder
       Review

Lab 1: Protecting and Restoring a DPM Server

Lab 2: Restoring Exchange Data

Lab 3: Restoring a SQL Database

Lab 4: Restoring a SharePoint Database (Optional)

After completing this module, students will be able to:

       Backup a DPM server
       Recover protected computers
       Recover protected Exchange data
       Recover protected SQL data
       Recover protected virtual machines

Module 5: Troubleshooting DPM 2007
This module provides an overview of techniques for troubleshooting DPM environments to
resolve DPM Server and protection agent installation issues. Topics also explain how to use the
Windows Power Shell-based DPM Management Shell to manage and maintain DPM
environments.
During lab exercises that accompany this module, you will use DPM tools and utilities to
perform typical maintenance and repair tasks.

Lessons

       Overview
       Troubleshooting DPM Installation and Upgrade
       Analyzing Issues
       Reviewing Error Details in DPM Setup
       Reviewing Installation Logs
       Resolving DPM Installation Issues
       An Installation of a Prerequisite Failed
       Non-DPM Applications are Interrupted by DPM Installation
       Disks are Missing
       Errors Occur When Running from a UNC Path
       Tape Libraries Malfunction or Display Incorrectly
       End-user Recovery Permissions Update Failed
       Resolving DPM 2007 Pre-release to RTM Upgrade Issues
       DMP V2 Beta 2 to DPM 2007 Upgrade Failure
       Protection Agent Upgrade Failure
       Resolving DPM 2007 Uninstallation Issues
       Uninstalling DPM 2007
       Removing or Retaining Recovery Points
       Uninstalling Prerequisite Software
       Uninstalling Protection Agents
       Uninstalling DPM-Specific User Settings
       Watson Errors during DPM Uninstallation
       Repairing DPM 2007
       Troubleshooting Protection Agent Installation
       Analyzing and Resolving Protection Agent Installation Failures
       DPM Protection Agent Will Not Install on a Computer
       Resolving Issues Indicated by Error Messages
       Using Alerts to Maintain and Monitor DPM
       Understanding Alerts
       Alert Severity
       Alert Status
       Dynamic Nature of Alerts
       Relationship Between Alerts and Jobs
       Resolving Alerts
       Using DPM Help to Obtain Information about Alerts
       Monitoring Alerts
       Troubleshooting with the DPM Management Shell
       Review

After completing this module, students will be able to:

       Review installation logs
       Resolve installation issues
       Resolve upgrade issues
       Resolve uninstallation issues
       Resolve protection agent installation issues
       Use alerts to monitor DPM servers
       Use DPM Management Shell for troubleshooting




PMP

Outline of the course:

       Knowledge Area
       Introduction
       Project Integration Managenment
       Project Scope Management
       Project Time Management
       Project Cost Management
       Project Quality Management
       Project Human Resources Management
       Professional Responsibility
       Project Communications Management
       Project Risk Management
       Project Procurement Management



CHECKPOINT SECURITY ADMINISTRATION I NGX
Installing and Configuring the SmartCenter Server
Installing SecurePlatform Pro on the Security gateway
Configuring the Security Gateway using the WebUI
Configure an interface as your management connection using the sysconfig utility
Backing up a current configuration from the command line
Create network objects
Establish trust between a Gateway and SmartCenter Server
Develop a Network Model using SmartMap
Create a Policy Package to configure a Rule Base
Enable static NAT on a network
Simulate a malicious network intrusion, and blocking the attack
Enforce the suspicious Activity Rule with SmartView monitor
Create User Templates and define users
Test Client Authentication
Configure SmartDirectory using Microsoft Active Directory to authenticate users
Configure QoS rules to support traffic – priority requirements
Configure SmartDefense to detect port scans and successive multiple- connection
attempts
Configure Web Intelligence to detect a simple worm signature

								
To top