CISS 233 Server Technologies 2*

Focusing on Windows Server 2016, this course covers managing user and service accounts, maintaining active directory domain services, configuring and troubleshooting DNS, configuring and troubleshooting remote access, installing and configuring the network policy server role, optimizing file services, increasing file system security and implementing update management. This course maps to the Microsoft Certified Solutions Associate (MCSA) examination 70-741.

Credits

3 Credits

Semester Contact Hours Lecture

3

Semester Contact Hours Lab

45

Prerequisite

CISS 131

CISS 233Server Technologies 2*

Please note: This is not a course syllabus. A course syllabus is unique to a particular section of a course by instructor. This curriculum guide provides general information about a course.

I. General Information

Department

Information Technology

II. Course Specification

Course Type

Program Requirement

Credit Hours Narrative

3 Credits

Semester Contact Hours Lecture

3

Semester Contact Hours Lab

45

Prerequisite Narrative

CISS 131

Grading Method

Letter grade

Repeatable

N

III. Catalog Course Description

Focusing on Windows Server 2016, this course covers managing user and service accounts, maintaining active directory domain services, configuring and troubleshooting DNS, configuring and troubleshooting remote access, installing and configuring the network policy server role, optimizing file services, increasing file system security and implementing update management. This course maps to the Microsoft Certified Solutions Associate (MCSA) examination 70-741.

IV. Student Learning Outcomes

Upon completion of this course, a student will be able to:

  • To master course content as defined by course objectives and presented in lectures and demonstrations to the student.
  • Students will attain a passing grade on assignments, quizzes, labs, and comprehensive written and production final exam.
  • Students will comprehend the role and purpose of a network administrator for Windows Server 2016.
  • Successful completion of assignments and lab activities.
  • To develop skills with the terminology, design, implementation and troubleshooting of computer networks.
  • Demonstrating mastery of terminology, design, and troubleshooting simple local area networks (LANs) by completing assigned activities to a passing level.
  • The instructor will actively involve the students in a continual evaluation of the class.
  • Classroom evaluations given to the students will be utilized to determine the effectiveness of the delivery method.
  • To manipulate and customize the Microsoft Server 2016 operating system.
  • Given a lab or written scenario, the students will complete the hands on labs to the satisfaction of the instructor.

V. Topical Outline (Course Content)

Deploy, manage, and maintain servers (15–20%) Deploy and manage server images Install the Windows Deployment Services (WDS) role; configure and manage boot, install, and discover images; update images with patches, hotfixes, and drivers; install features for offline images Implement patch management Install and configure the Windows Server Update Services (WSUS) role; configure group policies for updates; configure client-side targeting; configure WSUS synchronization; configure WSUS groups Monitor servers Configure Data Collector Sets (DCS); configure alerts; monitor real-time performance; monitor virtual machines (VMs); monitor events; configure event subscriptions; configure network monitoring Configure file and print services (15–20%) Configure Distributed File System (DFS) Install and configure DFS namespaces; configure DFS Replication Targets; configure Replication Scheduling; configure Remote Differential Compression settings; configure staging; configure fault tolerance Configure File Server Resource Manager (FSRM) Install the FSRM role; configure quotas; configure file screens; configure reports Configure file and disk encryption Configure Bitlocker encryption; configure the Network Unlock feature; configure Bitlocker policies; configure the EFS recovery agent; manage EFS and Bitlocker certificates including backup and restore Configure advanced audit policies Implement auditing using Group Policy and AuditPol.exe; create expression-based audit policies; create removable device audit policies Configure network services and access (15–20%) Configure DNS zones Configure primary and secondary zones; configure stub zones; configure conditional forwards; configure zone and conditional forward storage in Active Directory; configure zone delegation; configure zone transfer settings; configure notify settings Configure DNS records Create and configure DNS Resource Records (RR) including A, AAAA, PTR, SOA, NS, SRV, CNAME, and MX records; configure zone scavenging; configure record options including Time To Live (TTL) and weight; configure round robin; configure secure dynamic updates Configure VPN and routing Install and configure the Remote Access role; implement Network Address Translation (NAT); configure VPN settings; configure remote dial-in settings for users; configure routing Configure DirectAccess Implement server requirements; implement client configuration; configure DNS for Direct Access; configure certificates for Direct Access Configure a Network Policy Server infrastructure (10–15%) Configure Network Policy Server (NPS) Configure multiple RADIUS server infrastructures; configure RADIUS clients; manage RADIUS templates; configure RADIUS accounting; configure certificates Configure NPS policies Configure connection request policies; configure network policies for VPN clients (multilink and bandwidth allocation, IP filters, encryption, IP addressing); manage NPS templates; import and export NPS policies Configure Network Access Protection (NAP) Configure System Health Validators (SHVs); configure health policies; configure NAP enforcement using DHCP and VPN; configure isolation and remediation of non-compliant computers using DHCP and VPN; configure NAP client settings Configure and manage Active Directory (15–20%) Configure service authentication Create and configure Service Accounts; create and configure Group Managed Service Accounts; create and configure Managed Service Accounts; configure Kerberos delegation; manage Service Principal Names (SPNs) Configure Domain Controllers Configure Universal Group Membership Caching (UGMC); transfer and seize operations masters; install and configure a read-only domain controller (RODC); configure Domain Controller cloning Maintain Active Directory Back up Active Directory and SYSVOL; manage Active Directory offline; optimize an Active Directory database; clean up metadata; configure Active Directory snapshots; perform object- and container-level recovery; perform Active Directory restore Configure account policies Configure domain user password policy; configure and apply Password Settings Objects (PSOs); delegate password settings management; configure local user password policy; configure account lockout settings Configure and manage Group Policy (15–20%) Configure Group Policy processing Configure processing order and precedence; configure blocking of inheritance; configure enforced policies; configure security filtering and WMI filtering; configure loopback processing; configure and manage slow-link processing; configure client-side extension (CSE) behavior Configure Group Policy settings Configure settings including software installation, folder redirection, scripts, and administrative template settings; import security templates; import custom administrative template file; convert administrative templates using ADMX Migrator; configure property filters for administrative templates Manage Group Policy objects (GPOs) Back up, import, copy, and restore GPOs; create and configure Migration Table; reset default GPOs; delegate Group Policy management Configure Group Policy preferences Configure Group Policy Preferences (GPP) settings including printers, network drive mappings, power options, custom registry settings, Control Panel settings, Internet Explorer settings, file and folder deployment, and shortcut deployment; configure item-level targeting

VI. Delivery Methodologies