ITDVDS.COM Online Training!
  Home  |  Training List  |  Pricing  |  Become a Member  |  Coming Soon  |  FAQ  |  About Us  |  Contact Us
     

ITDVDS.COMMCTS Exam 70-642 - Configuring a Windows Server 2008 Network Infrastructure Training
(Completely Updated With Windows Server 2008 R2)

Click on the links next to the red icons Free Movies From ITDVDS.COM below to view the free movies.
Click here to setup a login account and view all of the movies.


** These Movies Have Sound
** The Flash Plug-in is Required

Introduction
Introduction and Prerequisites

Configuring Addressing and Services
Basic Network Concepts
IP Address Classes
Reserved IP Addresses and Private IP Addresses
Binary Numbers, Decimal, and Hexadecimal Numbers
Converting a Nibble to Decimal and Hexadecimal
Converting a Byte to Decimal
Converting a Byte to Hexadecimal
Converting Decimal Numbers to Byte Part 1
Converting Decimal Numbers to Byte Part 2
Converting Hexadecimal Numbers to a Byte
Converting Hexadecimal to Decimal
What is a Subnet Mask
Classless Inter-Domain Routing (CIDR) Part 1
Classless Inter-Domain Routing (CIDR) Part 2
Classless Inter-Domain Routing (CIDR) Part 3
Powers of 2
Default Subnets
Subnetting Class C Addresses Part 1
Subnetting Class C Addresses Part 2
Subnetting Class C Addresses Part 3
More Subnetting Class C Addresses Part 1
More Subnetting Class C Addresses Part 2
More Subnetting Class C Addresses Part 3
Subnetting Class B Addresses Part 1
Subnetting Class B Addresses Part 2
Variable Length Subnet Masks
Variable Length Subnets Example 1
Practicing Subnetting
IPv6 Introduction and Writing IPv6 Addresses
IPv6 Address Types, Ranges and Reserved Addresses Part 1
IPv6 Address Types, Ranges and Reserved Addresses Part 2
IPv6 and NAT
IPv6 Address Types Examples
IPv6 Zone IDs
Subnetting IPv6 Addresses
Assigning IPv6 Addresses to Hosts
IPv6 Migration Technologies
Dynamic Host Configuration Protocol (DHCP)
Installing and Authorizing a DHCP Server
Configuring IPv4 DHCP Scopes and Creating an Exclusion Range
Configuring IPv6 DHCP Scopes and Creating an Exclusion Range
Configuring DHCP Scope Options
DHCP and IPv6 DCHP Clients
Configuring a Windows 2008 R2 Server to Send Router Advertisements Part 1
Configuring a Windows 2008 R2 Server to Send Router Advertisements Part 2
Creating a DHCP Address Reservation
Configuring DHCP Vendor Class Options
Creating DHCP User Classes and Options, and Configuring the Client User Class
Configuring DHCP Server Properties
Configuring DHCP Server Advanced Options
Troubleshooting DHCP with the Audit Log
DHCP Server Redundancy and Split Scopes
Configuring DHCP Filters
Configuring a DHCP Relay Agent
Reducing the Size of the DHCP Database
Backing Up and Restoring the DHCP Configuration
Releasing, Renewing IP Addresses, and Using the Alternate Configuration on DHCP Clients
IP Routing Basics Part 1
IP Routing Basics Part 2
Configuring Windows Router Interfaces
Installing Routing and Remote Access and Enabling Routing
Viewing the Routing Table
Testing and Troubleshooting Routing Part 1
Testing and Troubleshooting Routing Part 2
How Routes Get Added to a Routing Table
Configuring Static Routing on a Windows 2008 R2 Server
Enabling and Configuring RIP
Viewing a Host's Routing Table
Configuring Static Routes on a Host
Seeing Static Route on Host in Action
Using Multiple Default Gateways on a Host
Windows Firewall Overview
Using Windows Firewall to Allow or Deny Specific Applications
Windows Firewall Rules Part 1
Windows Firewall Rules Part 2
Windows Firewall Properties
Adding Firewall Rules with Windows Firewall with Advanced Security
Configuring Windows Firewall with Netsh
Logging Network Connection Attempts with Windows Firewall
Exporting and Importing Windows Firewall Policies Using Windows Firewall
Exporting and Importing Windows Firewall Policies Using Netsh
Configuring Windows Firewall with Group Policy
Important Protocols and Port Numbers
Understanding IPSec Part 1
Understanding IPSec Part 2
Creating a New IPSec Policy with the Local Security Policy Part 1
Managing IPSec Filter Lists and Filter Actions
IPSec and Domain Controllers
IPSec and Group Policy
Seeing IPSec in Action and Assigning a Predefined IPSec Policy with Group Policy Part 1
Seeing IPSec in Action and Assigning a Predefined IPSec Policy with Group Policy Part 2
Creating and Configuring a Connection Security Rule
Deploying Connection Security Rules with Group Policy

Configuring Names Resolution
Understanding DNS, LLMNR, and NETBIOS Name Resolution Part 1
Understanding DNS, LLMNR, and NETBIOS Name Resolution Part 2
Understanding DNS, LLMNR, and NETBIOS Name Resolution Part 3
Configuring Client Settings and DNS Suffixes for Name Resolution Part 1
Configuring Client Settings and DNS Suffixes for Name Resolution Part 2
Configuring the DNS Client Settings with Group Policy
Using netsh to Configure Primary and Secondary DNS Servers
Installing WINS
Configuring WINS Replication and View WINS Records
Configuring a DNS Server to Use WINS
DNS Diagram
DNS Zones
DNS Records
Email DNS Records
SOA Records
SRV Records
The msdcs Zone
Creating an Active Directory Integrated Zone
Creating a Primary Zone
Creating a Secondary Zone
Creating a New Zone with DNSCmd
Adding DNS Records with DNSCmd
Deleting DNS Records with DNSCmd
Other DNSCmd Commands
Setting Permissions on Zones
Using the GlobalNames Zone
Split Brain DNS
DNS Delegation
Root Hints, DNS Forwarding, and Conditional Forwarders
Understanding the Effects of a Root Zone
Configuring DNS with Multiple Domains and Trees in a Forest
Dynamic DNS (DDNS), Non-dynamic DNS (NDDNS), and Secure Dynamic DNS (SDDNS)
Configuring Aging and Scavenging
Configuring Time to Live (TTL)
Round Robin DNS
Changing the Zone Type
Configuring DNS Replication for Active Directory Integrated Zones
Reloading Zones
Forcing DNS Replication
Creating a New Active Directory Partition and Configuring Replication Scope
Allowing Zone Transfers to Unix DNS Servers
DNS Logging
Using DNSlint
DNSSEC

Configuring Network Access
Network Address Translation (NAT)
Configuring NAT with Routing and Remote Access
Creating a Static NAT Part 1
Creating a Static NAT Part 2
Notes on Creating NAT
Internet Connection Sharing
Remote Access Methods
Configuring RRAS for Dial-up Connections
VPN Tunneling Protocols
Configuring RRAS for VPN Connections
Configuring VPN Packet Filters
VPN and Dial-up Authentication Methods
Creating a Network Policy and Configuring VPN Connection Restrictions
Configuring a VPN Server for SSTP
Connecting to a VPN with a Windows 7 Client
Notes on Auto Reconnect on a VPN Connection
Troubleshooting VPN Login Issues
Wireless Intro and 802.11 Wireless Standards
Wireless Security and Encryption
How Network Access Protection Works Part 1
How Network Access Protection Works Part 2
Network Access Protection, RADIUS Authentication and Certificate Authorities
Important 802.1X EAP Authentication Protocols
Installing a Certificate Authority
Install CA Web Enrollment
Configure CA Web Enrollment Web Site for SSL
Creating the Computer Certificate Template for NAP, EAP-TLS, and PEAP-TLS
Creating the User Certificate Template for NAP, EAP-TLS, and PEAP-TLS
Using Group Policy for Auto Enrollment of Certificates
Verifying Auto Enrollment
Manually Issuing Certificates
Installing the Server Certificate on the Network Policy Server
Installing a Network Policy and Access Services Server
Configuring a RADIUS Server for Wireless Access Point PEAP-TLS Authentication Part 1
Configuring a RADIUS Server for Wireless Access Point PEAP-TLS Authentication Part 2
Configuring a Cisco Aironet Wireless Access Point to Use a NPS RADIUS Server
Configuring a Client to Connect to a Wireless Access Point Using PEAP-TLS Part 1
Configuring a Client to Connect to a Wireless Access Point Using PEAP-TLS Part 2
Configuring a Client to Connect to a Wireless Access Point Using PEAP-TLS Part 3
Configuring a Client to Connect to a Wireless Access Point Using PEAP-MSCHAP v2
Troubleshooting RADIUS for Wireless Access Points
Configuring a RADIUS and Network Policy Server for VPN Authentication
Configuring the VPN Server to Use the RADIUS Server for Authentication
Connecting to a VPN Server that Uses a RADIUS Server with PEAP-MSCHAP v2
Connecting to a VPN Server that Uses a RADIUS Server with PEAP-TLS
Troubleshooting VPN Connections and RADIUS Authentication
Configuring RADIUS Attributes for a Network Policy Server
Configuring a RADIUS Proxy
RAS and IAS Server Group
RAS and NPS Account Lockout and Unlocking Accounts that are Locked
Types of Network Access Protection Enforcement and Policy Processing Order
Configuring the NAP Client for Policy Enforcement and IPSec Policy Enforcement
Configuring a Network Access Protection IPSec Enforcement Policy and HRA Part 1
Configuring a Network Access Protection IPSec Enforcement Policy and HRA Part 2
Configuring a Connection Security Rule to Enforce Health Certificates
Configuring System Health Validators and SHV Error Codes
Configuring a Network Access Protection System Health Policy
Configuring Remediation Server Groups
Exporting and Importing Network Policy Server Settings
DirectAccess
DirectAccess Diagram and How DirectAccess Works
DirectAccess Diagram Initial Configuration Part 1
DirectAccess Diagram Initial Configuration Part 2
Configure CRL Distribution Point and External DNS for DirectAccess Part 1
Configure CRL Distribution Point and External DNS for DirectAccess Part 2
Configure the Network Location Server Web Site, SSL, and Internal DNS for DirectAccess
Configure Internal DNS GlobalQueryBlockList for DirectAccess
Configure Firewalls for DirectAccess with Group Policy
Issue SSL Certificate for DirectAccess IP-HTTPS Tunnel and Configure External DNS
Configure DirectAccess Server Part 1
Configure DirectAccess Server Part 2
Configure DirectAccess Server Part 3
Confirming DirectAccess Group Policy Has Applied
Configuring Name Mapping for DirectAccess IP-HTTPS
Seeing DirectAccess in Action and Verifying DirectAccess Connection
Connecting to the IP-HTTPS Interface
Troubleshooting DirectAccess Part 1
Troubleshooting DirectAccess Part 2
Troubleshooting DirectAccess Part 3
DirectAccess Connectivity Assistant
Securing Remote Desktop

Configuring File and Print Services
Enabling File Screening, Resource Manager Quotas, and Storage Reporting
What is File Screening?
Configuring File Groups for File Screening
File Screening Templates
Configuring File Screens
Configuring the SMTP Server for File Screening, Quotas, and Storage Reports
NTFS Disk Quotas vs Resource Manager Disk Quotas
Resource Manager Disk Quota Templates Part 1
Resource Manager Disk Quota Templates Part 2
Configuring Resource Manager Disk Quotas
Configuring Resource Manager Quotas From the Command Line
Configure Global Storage Reporting Properties
On-Demand Storage Reports Part 1
On-Demand Storage Reports Part 2
Scheduling Storage Reporting
Creating a File Management Task
File and Folder Compression
File and Folder Encryption
Backing Up Encrypting File System Certificates
Restoring Encrypting File System Certificates
Recovering Encrypted Files with a Recovery Agent
Configuring EFS with Group Policy
How DFS Works
Installing DFS and Creating and Configuring a DFS Namespace
Adding Folders to a DFS Namespace
DFS Modes and Migrating to Windows 2008 DFS Mode
DFS Permissions and Access Based Enumeration
Configuring DFS Redundancy and Creating Replication Groups
Monitoring DFS Replication
Generating Printer Notifications
Publishing Printers to Active Directory with pubprn.vbs
Troubleshooting a Print Server
Other Print Server Role Services
Configuring Hosted Mode Branch Cache
Viewing the Status of BranchCache and Managing the Cache
Full Server and WBAdmin Backup Notes

Monitoring and Managing a Network Infrastructure
Resource Monitor
Performance Monitor Data Collector Sets
Configuring and Sending Emails with Performance Monitor Alerts
Performance Monitor Reports
Making Reliability Monitor Work on Windows 2008 R2
Using Network Monitor to Capture and Analyze Network Communication
Using Nmcap from the Command Line
Using the Event Viewer to Troubleshoot Application Issues
Configuring Event Forwarding and Creating Even Subscriptions Part 1
Configuring Event Forwarding and Creating Even Subscriptions Part 2
Using wecutil to Configure Event Forwarding
Sending Email for Events and Managing Event Viewer From the Commandline
Installing and Configuring SNMP
What is WSUS and Installing the WSUS Role
WSUS - Adding Computers with the Local GPO
WSUS - Adding Computers with Group Policy
WSUS - Windows Update Group Policy Settings Part 1
WSUS - Windows Update Group Policy Settings Part 2
WSUS - Creating Computer Groups
WSUS - Manually Adding Computers to Computer Groups
WSUS - Adding Computers to Groups with Group Policy
WSUS - Approving Updates
WSUS - Automatically Approving Updates
WSUS - Applying Updates Immediately
WSUS - Searching for Updates
WSUS - Configuring Clients for Updates that Require Reboots
WSUS - Configuring the Update Source
WSUS - Configuring a Proxy Server
WSUS - Changing Products and Classifications
WSUS - Changing Update Storage Options
WSUS - Configuring the Languages that Updates are Downloaded In
WSUS - Scheduling Update Synchronization
WSUS - Centralized vs Decentralized WSUS Management
WSUS - Creating a WSUS DownStream Replica for Centralized Management
WSUS - WSUS Autonomous DownStream Installation for Decentralized Management
WSUS - Configuring Clients to use a Downstream WSUS Server
WSUS - DetectNow
WSUS - ResetAuthorization
Membership Checklist
Get at Apple AppStore

Get it on Google Play

Get it on Amazon App Store





© 2018 - ITDVDS.com LLC