CISS 131 Server Technologies I*
This course provides the student with the skills to plan, install, and manage Microsoft network operating systems.
CISS 131Server Technologies I*
Please note: This is not a course syllabus. A course syllabus is unique to a particular section of a course by instructor. This curriculum guide provides general information about a course.
I. General Information
Department
Information Technology
II. Course Specification
Course Type
Program Requirement
Credit Hours Narrative
3 Credits
Semester Contact Hours Lecture
15
Semester Contact Hours Lab
45
Prerequisite Narrative
CISS 107
Grading Method
Letter grade
III. Catalog Course Description
This course provides the student with the skills to plan, install, and manage Microsoft network operating systems.
IV. Student Learning Outcomes
Upon completion of this course, a student will be able to:
- Students will comprehend the role and purpose of a network administrator for Windows Server 2012.
- Successful completion of assignments and lab activities.
- To develop skills with the terminology, design, implementation and troubleshooting of computer networks.
- Demonstrating mastery of terminology, design, and troubleshooting simple local area networks (LANs) by completing assigned activities to a passing level.
- Outcome: To manipulate and customize the Microsoft Server 2012 operating system.
- Given a lab or written scenario, the students will complete the hands on labs to the satisfaction of the instructor.
V. Topical Outline (Course Content)
Install and configure servers (15–20%)
Install servers
Plan for a server installation; plan for server roles; plan for a server upgrade; install Server Core; optimize resource utilization by using Features on Demand; migrate roles from previous versions of Windows Server
Configure servers
Configure Server Core; delegate administration; add and remove features in offline images; deploy roles on remote servers; convert Server Core to/from full GUI; configure services; configure NIC teaming
Configure local storage
Design storage spaces; configure basic and dynamic disks; configure MBR and GPT disks; manage volumes; create and mount virtual hard disks (VHDs); configure storage pools and disk pools
Configure server roles and features (15–20%)
Configure file and share access
Create and configure shares; configure share permissions; configure offline files; configure NTFS permissions; configure access-based enumeration (ABE); configure Volume Shadow Copy Service (VSS); configure NTFS quotas
Configure print and document services
Configure the Easy Print print driver; configure Enterprise Print Management; configure drivers; configure printer pooling; configure print priorities; configure printer permissions
Configure servers for remote management
Configure WinRM; configure down-level server management; configure servers for day-to-day management tasks; configure multi-server management; configure Server Core; configure Windows Firewall
Configure Hyper-V (15–20%)
Create and configure virtual machine settings
Configure dynamic memory; configure smart paging; configure Resource Metering; configure guest integration services
Create and configure virtual machine storage
Create VHDs and VHDX; configure differencing drives; modify VHDs; configure pass-through disks; manage snapshots; implement a virtual Fibre Channel adapter
Create and configure virtual networks
Implement Hyper-V Network Virtualization; configure Hyper-V virtual switches; optimize network performance; configure MAC addresses; configure network isolation; configure synthetic and legacy virtual network adapters
Deploy and configure core network services (15–20%)
Configure IPv4 and IPv6 addressing
Configure IP address options; configure subnetting; configure supernetting; configure interoperability between IPv4 and IPv6; configure ISATAP; configure Teredo
Deploy and configure Dynamic Host Configuration Protocol (DHCP) service
Create and configure scopes; configure a DHCP reservation; configure DHCP options; configure client and server for PXE boot; configure DHCP relay agent; authorize DHCP server
Deploy and configure DNS service
Configure Active Directory integration of primary zones; configure forwarders; configure Root Hints; manage DNS cache; create A and PTR resource records
Install and administer Active Directory (15–20%)
Install domain controllers
Add or remove a domain controller from a domain; upgrade a domain controller; install Active Directory Domain Services (AD DS) on a Server Core installation; install a domain controller from Install from Media (IFM); resolve DNS SRV record registration issues; configure a global catalog server
Create and manage Active Directory users and computers
Automate the creation of Active Directory accounts; create, copy, configure, and delete users and computers; configure templates; perform bulk Active Directory operations; configure user rights; offline domain join; manage inactive and disabled accounts
Create and manage Active Directory groups and organizational units (OUs)
Configure group nesting; convert groups including security, distribution, universal, domain local, and domain global; manage group membership using Group Policy; enumerate group membership; delegate the creation and management of Active Directory objects; manage default Active Directory containers; create, copy, configure, and delete groups and OUs
Create and manage Group Policy (15–20%)
Create Group Policy objects (GPOs)
Configure a Central Store; manage starter GPOs; configure GPO links; configure multiple local group policies; configure security filtering
Configure security policies
Configure User Rights Assignment; configure Security Options settings; configure Security templates; configure Audit Policy; configure Local Users and Groups; configure User Account Control (UAC)
Configure application restriction policies
Configure rule enforcement; configure Applocker rules; configure Software Restriction Policies
Configure Windows Firewall
Configure rules for multiple profiles using Group Policy; configure connection security rules; configure Windows Firewall to allow or deny applications, scopes, ports, and users; configure authenticated firewall exceptions; import and export settings
VI. Delivery Methodologies