Filter Keyword to...

Category: Information Technology Project Managers

Results Per Page :
The planning, strategic design, and implementation and maintenance of key Active Directory infrastructural services include network services such as an IP address management solution and a virtual private...
[READ MORE]
The planning, strategic design, and implementation and maintenance of key Active Directory infrastructural services include network services such as an IP address management solution and a virtual private network. This course outlines the design and planning considerations for the new Server 2012 IP Address Management feature known as IPAM. Areas covered include the IPAM feature, Group Policy based and manual provisioning of IPAM, IPAM deployment design such as distributed, centralized and hybrid topologies. The configuration of role-based access control, IPAM auditing, IP address migration, multiple DHCP and DNS service management, and how to configure data collection for IPAM are also covered. The second lesson covers the deployment of remote access capabilities by using VPN connections to the private corporate network, and site-to-site VPN connection between partner networks across the public Internet. In addition, the lesson outlines the deployment of an internal Certificate Authority, the autoenrollment feature, and the publication of Certificate Revocation Lists to a Web service.
The planning, strategic design, and implementation and maintenance of key Active Directory infrastructural services include network services such as an IP address management solution and a virtual private network. This course outlines the design and planning considerations for the new Server 2012 IP Address Management feature known as IPAM. Areas covered include the IPAM feature, Group Policy based and manual provisioning of IPAM, IPAM deployment design such as distributed, centralized and hybrid topologies. The configuration of role-based access control, IPAM auditing, IP address migration, multiple DHCP and DNS service management, and how to configure data collection for IPAM are also covered. The second lesson covers the deployment of remote access capabilities by using VPN connections to the private corporate network, and site-to-site VPN connection between partner networks across the public Internet. In addition, the lesson outlines the deployment of an internal Certificate Authority, the autoenrollment feature, and the publication of Certificate Revocation Lists to a Web service.
[READ LESS]
Produced by: SkillSoft
The Server 2012 Network Policy and Access Services (NPAS) server role is deployed to support network security, and optionally to examine and maintain the health of the client computer that request access to...
[READ MORE]
The Server 2012 Network Policy and Access Services (NPAS) server role is deployed to support network security, and optionally to examine and maintain the health of the client computer that request access to the network and its protected resources. This course focuses on network protection, and in particular how the Server 2012 Network Protection and Access System role operates when configured to serve as a Network Access Protection (NAP) client health service monitor. The course also covers NAP; a complex and extensive mechanism that is deployed to protect internal private network resources, and requires careful planning, and appropriate design and testing before being introduced to the production environment. NAP works in conjunction with several other components in an Active Directory-controlled environment and understanding how NAP and NPS interoperates with network a hardware and software system is a prerequisite when approaching the design of a enterprise network protection solution.
The Server 2012 Network Policy and Access Services (NPAS) server role is deployed to support network security, and optionally to examine and maintain the health of the client computer that request access to the network and its protected resources. This course focuses on network protection, and in particular how the Server 2012 Network Protection and Access System role operates when configured to serve as a Network Access Protection (NAP) client health service monitor. The course also covers NAP; a complex and extensive mechanism that is deployed to protect internal private network resources, and requires careful planning, and appropriate design and testing before being introduced to the production environment. NAP works in conjunction with several other components in an Active Directory-controlled environment and understanding how NAP and NPS interoperates with network a hardware and software system is a prerequisite when approaching the design of a enterprise network protection solution.
[READ LESS]
Produced by: SkillSoft
Planning and design of the Organization Unit structure within each forest domain is a primary task in support of a operationally optimized Active Directory infrastructure --" this course discusses...
[READ MORE]
Planning and design of the Organization Unit structure within each forest domain is a primary task in support of a operationally optimized Active Directory infrastructure --" this course discusses Organizational Unit design and some of the primary architectural components of an Active Directory-controlled environment. The Active Directory security model is designed to support focused, selective and targeted delegated administration of the system objects and resources. Being familiar with the Active Directory security model and developing a proactive maintenance approach is a key goal in providing an optimized Active Directory-based service to end users. This course covers Active Directory object security, protection, the general Active Directory security model, and the delegation of access to Active Directory objects by security principles. The design and implementation of a well constructed, configured, and appropriated targeted Group Policy system is fundamental to the end-user experience, system security, and the optimized operation of an Active Directory-controlled environment. Allied closely to the deployed OU structure, Group Policy application must be thoroughly tested prior to deployment to a production system --" sloppy configuration and untested application can lead to catastrophic problems in a production system. This course covers the methodological approach to designing, creating, testing, deploying and maintaining a Group Policy infrastructural solution within an Active Directory controlled forest environment. Although Active Directory is designed an extensible system is does have operational limits. Knowing the design limitation Active Directory and the important configurable limits is a key aspect of Active Directory management; designed and configurable limits are discussed in ending this course.
Planning and design of the Organization Unit structure within each forest domain is a primary task in support of a operationally optimized Active Directory infrastructure --" this course discusses Organizational Unit design and some of the primary architectural components of an Active Directory-controlled environment. The Active Directory security model is designed to support focused, selective and targeted delegated administration of the system objects and resources. Being familiar with the Active Directory security model and developing a proactive maintenance approach is a key goal in providing an optimized Active Directory-based service to end users. This course covers Active Directory object security, protection, the general Active Directory security model, and the delegation of access to Active Directory objects by security principles. The design and implementation of a well constructed, configured, and appropriated targeted Group Policy system is fundamental to the end-user experience, system security, and the optimized operation of an Active Directory-controlled environment. Allied closely to the deployed OU structure, Group Policy application must be thoroughly tested prior to deployment to a production system --" sloppy configuration and untested application can lead to catastrophic problems in a production system. This course covers the methodological approach to designing, creating, testing, deploying and maintaining a Group Policy infrastructural solution within an Active Directory controlled forest environment. Although Active Directory is designed an extensible system is does have operational limits. Knowing the design limitation Active Directory and the important configurable limits is a key aspect of Active Directory management; designed and configurable limits are discussed in ending this course.
[READ LESS]
Produced by: SkillSoft
The strategic design and implementation of an operating system (OS) solution deployment requires a comprehensive understanding of all of the available tools involved in the OS design, customization,...
[READ MORE]
The strategic design and implementation of an operating system (OS) solution deployment requires a comprehensive understanding of all of the available tools involved in the OS design, customization, encapsulation, distribution and deployment process. Each new release of a Windows operating system brings new and newly named utilities, and it requires a forensic investigation to keep up with the new and deprecated OS servicing and deployment tools and utilities. This course discusses server deployment design, operating system deployment tools and techniques; including the use of the Windows Assessment and Deployment Kit, the operating system deployment design process, and operating system deployment strategy using the Server 2012 R2 Windows Deployment Service server role. The course also includes consideration of server operating system upgrade, as well as cross-domain and cross-forest role server migration, server consolidation and system capacity and resource planning. Finally the System Center Virtual Machine Manager component, including service templates, operating system, hardware and compatibility profiles, image and template libraries, and logical network management are covered.
The strategic design and implementation of an operating system (OS) solution deployment requires a comprehensive understanding of all of the available tools involved in the OS design, customization, encapsulation, distribution and deployment process. Each new release of a Windows operating system brings new and newly named utilities, and it requires a forensic investigation to keep up with the new and deprecated OS servicing and deployment tools and utilities. This course discusses server deployment design, operating system deployment tools and techniques; including the use of the Windows Assessment and Deployment Kit, the operating system deployment design process, and operating system deployment strategy using the Server 2012 R2 Windows Deployment Service server role. The course also includes consideration of server operating system upgrade, as well as cross-domain and cross-forest role server migration, server consolidation and system capacity and resource planning. Finally the System Center Virtual Machine Manager component, including service templates, operating system, hardware and compatibility profiles, image and template libraries, and logical network management are covered.
[READ LESS]
Produced by: SkillSoft
This course covers monitoring Office 365 availability and usage. It is one in a series of courses that will prepare you for exam 70-346: Managing Office 365 Identities and Requirements.
This course covers monitoring Office 365 availability and usage. It is one in a series of courses that will prepare you for exam 70-346: Managing Office 365 Identities and Requirements.
[READ LESS]
Produced by: SkillSoft
This course covers the preparation to connect Azure AD Connect with Office 365. It is one in a series of courses that prepares learners for exam 70-346: Managing Office 365 Identities and Requirements
This course covers the preparation to connect Azure AD Connect with Office 365. It is one in a series of courses that prepares learners for exam 70-346: Managing Office 365 Identities and Requirements
[READ LESS]
Produced by: SkillSoft
This course covers the basic tasks required to create and configure domains in Office 365. It is one in a series of courses that prepares learners for exam 70-346: Managing Office 365 Identities and...
[READ MORE]
This course covers the basic tasks required to create and configure domains in Office 365. It is one in a series of courses that prepares learners for exam 70-346: Managing Office 365 Identities and Requirements.
This course covers the basic tasks required to create and configure domains in Office 365. It is one in a series of courses that prepares learners for exam 70-346: Managing Office 365 Identities and Requirements.
[READ LESS]
Produced by: SkillSoft
This course covers how to add and configure required DNS records and enable client connectivity. It is one in a series of courses that perpares learners for exam 70-346: Managing Office 365 Identities and...
[READ MORE]
This course covers how to add and configure required DNS records and enable client connectivity. It is one in a series of courses that perpares learners for exam 70-346: Managing Office 365 Identities and Requirements.
This course covers how to add and configure required DNS records and enable client connectivity. It is one in a series of courses that perpares learners for exam 70-346: Managing Office 365 Identities and Requirements.
[READ LESS]
Produced by: SkillSoft
This course covers the implementation and management of federated identities in Office 365. This is one in a series of courses that prepares learners for exam 70-346: Managing Office 365 Identities and...
[READ MORE]
This course covers the implementation and management of federated identities in Office 365. This is one in a series of courses that prepares learners for exam 70-346: Managing Office 365 Identities and Requirements.
This course covers the implementation and management of federated identities in Office 365. This is one in a series of courses that prepares learners for exam 70-346: Managing Office 365 Identities and Requirements.
[READ LESS]
Produced by: SkillSoft
This course covers the installation and management of AD FS and Web Application Proxy (WAP) servers. It is one in a series of courses that prepares learners for exam 70-346: Managing Office 365 Identities and...
[READ MORE]
This course covers the installation and management of AD FS and Web Application Proxy (WAP) servers. It is one in a series of courses that prepares learners for exam 70-346: Managing Office 365 Identities and Requirements.
This course covers the installation and management of AD FS and Web Application Proxy (WAP) servers. It is one in a series of courses that prepares learners for exam 70-346: Managing Office 365 Identities and Requirements.
[READ LESS]
Produced by: SkillSoft
This course covers the planning required to complete an Office 365 pilot deployment. It is one in a series of courses that prepares learners for exam 70-346: Managing Office 365 Identities and Requirements.
This course covers the planning required to complete an Office 365 pilot deployment. It is one in a series of courses that prepares learners for exam 70-346: Managing Office 365 Identities and Requirements.
[READ LESS]
Produced by: SkillSoft
This course covers the basic tasks required to create and configure tenants in Office 365. It is one in a series of courses that prepares learners for exam 70-346: Managing Office 365 Identities and...
[READ MORE]
This course covers the basic tasks required to create and configure tenants in Office 365. It is one in a series of courses that prepares learners for exam 70-346: Managing Office 365 Identities and Requirements.
This course covers the basic tasks required to create and configure tenants in Office 365. It is one in a series of courses that prepares learners for exam 70-346: Managing Office 365 Identities and Requirements.
[READ LESS]
Produced by: SkillSoft
Operations Manager is used as a monitoring service for your datacenter and cloud infrastructures. In this course, you will learn about Operations Manager and plan a deployment strategy.
Operations Manager is used as a monitoring service for your datacenter and cloud infrastructures. In this course, you will learn about Operations Manager and plan a deployment strategy.
[READ LESS]
Produced by: SkillSoft
Orchestrator allows you to combine tasks and procedures to improve operational efficiencies. In this course, you will learn about Orchestrator and the requirements for installing it in your environment.
Orchestrator allows you to combine tasks and procedures to improve operational efficiencies. In this course, you will learn about Orchestrator and the requirements for installing it in your environment.
[READ LESS]
Produced by: SkillSoft
Microsoft offers some very powerful tools and features for managing user rights and access policies, including PAWS and LAPS. Exam 70-744
Microsoft offers some very powerful tools and features for managing user rights and access policies, including PAWS and LAPS. Exam 70-744
[READ LESS]
Produced by: SkillSoft
The IBM Application Performance Analyzer helps identify system constraints and improve application performance. In this course, you will learn the key features and functionality of the Application Performance...
[READ MORE]
The IBM Application Performance Analyzer helps identify system constraints and improve application performance. In this course, you will learn the key features and functionality of the Application Performance Analyzer.
The IBM Application Performance Analyzer helps identify system constraints and improve application performance. In this course, you will learn the key features and functionality of the Application Performance Analyzer.
[READ LESS]
Produced by: SkillSoft
Data Protection Manager is a backup and recovery system that will help with your business continuity and disaster recovery strategy. In this course, you will learn what Data Protection Manager is and how it...
[READ MORE]
Data Protection Manager is a backup and recovery system that will help with your business continuity and disaster recovery strategy. In this course, you will learn what Data Protection Manager is and how it works.
Data Protection Manager is a backup and recovery system that will help with your business continuity and disaster recovery strategy. In this course, you will learn what Data Protection Manager is and how it works.
[READ LESS]
Produced by: SkillSoft
Every time you work in PowerShell, you are working in the context of a provider. Aliases in PowerShell are a kind of shorthand for a cmdlet. This course covers aliases and providers, and also covers the...
[READ MORE]
Every time you work in PowerShell, you are working in the context of a provider. Aliases in PowerShell are a kind of shorthand for a cmdlet. This course covers aliases and providers, and also covers the pipeline and working with objects.
Every time you work in PowerShell, you are working in the context of a provider. Aliases in PowerShell are a kind of shorthand for a cmdlet. This course covers aliases and providers, and also covers the pipeline and working with objects.
[READ LESS]
Produced by: SkillSoft
PowerShell 5.0 has several options for configuration and customization, and its help system is not only expansive, but it's necessary to understand in order to fully leverage PowerShell. This course covers...
[READ MORE]
PowerShell 5.0 has several options for configuration and customization, and its help system is not only expansive, but it's necessary to understand in order to fully leverage PowerShell. This course covers PowerShell configuration and customization, advanced help, queries, and dot sourcing.
PowerShell 5.0 has several options for configuration and customization, and its help system is not only expansive, but it's necessary to understand in order to fully leverage PowerShell. This course covers PowerShell configuration and customization, advanced help, queries, and dot sourcing.
[READ LESS]
Produced by: SkillSoft
PowerShell 5.0 Desired State Configuration (DSC) can be used to significantly improve the way an organization defines, reports on, and manages node configuration states. In this course, you will examine DSC,...
[READ MORE]
PowerShell 5.0 Desired State Configuration (DSC) can be used to significantly improve the way an organization defines, reports on, and manages node configuration states. In this course, you will examine DSC, resources, and pull servers.
PowerShell 5.0 Desired State Configuration (DSC) can be used to significantly improve the way an organization defines, reports on, and manages node configuration states. In this course, you will examine DSC, resources, and pull servers.
[READ LESS]
Produced by: SkillSoft
PowerShell 5.0 DSC can be used to configure many important elements of your datacenter on premises, in the cloud, and across platforms. In this course, you'll learn how to configure Hyper-V and Azure VMs...
[READ MORE]
PowerShell 5.0 DSC can be used to configure many important elements of your datacenter on premises, in the cloud, and across platforms. In this course, you'll learn how to configure Hyper-V and Azure VMs using DSC and Windows PowerShell.
PowerShell 5.0 DSC can be used to configure many important elements of your datacenter on premises, in the cloud, and across platforms. In this course, you'll learn how to configure Hyper-V and Azure VMs using DSC and Windows PowerShell.
[READ LESS]
Produced by: SkillSoft
Windows PowerShell 5.0 Desired State Configuration (DSC) can significantly improve the way organizations manage server and client configuration states. In this course, you will learn how to work with and...
[READ MORE]
Windows PowerShell 5.0 Desired State Configuration (DSC) can significantly improve the way organizations manage server and client configuration states. In this course, you will learn how to work with and deploy DSC resources.
Windows PowerShell 5.0 Desired State Configuration (DSC) can significantly improve the way organizations manage server and client configuration states. In this course, you will learn how to work with and deploy DSC resources.
[READ LESS]
Produced by: SkillSoft
PowerShell DSC can be used to configure important datacenter elements, whether on premises or in the cloud. In this course, you'll learn how to configure Linux environments using DSC as well work with Just...
[READ MORE]
PowerShell DSC can be used to configure important datacenter elements, whether on premises or in the cloud. In this course, you'll learn how to configure Linux environments using DSC as well work with Just Enough Administration (JEA).
PowerShell DSC can be used to configure important datacenter elements, whether on premises or in the cloud. In this course, you'll learn how to configure Linux environments using DSC as well work with Just Enough Administration (JEA).
[READ LESS]
Produced by: SkillSoft
Desired State Configuration (DSC) can significantly improve the way organizations manage server and client configuration states. In this course, you will learn how to create a DSC pull server, and work with...
[READ MORE]
Desired State Configuration (DSC) can significantly improve the way organizations manage server and client configuration states. In this course, you will learn how to create a DSC pull server, and work with configurations and repositories.
Desired State Configuration (DSC) can significantly improve the way organizations manage server and client configuration states. In this course, you will learn how to create a DSC pull server, and work with configurations and repositories.
[READ LESS]
Produced by: SkillSoft
PowerShell 5.0 Local Configuration Manager (LCM) is the backbone of Desired State Configuration (DSC). It is responsible for a number of DSC aspects, including determining push or pull refresh modes. In this...
[READ MORE]
PowerShell 5.0 Local Configuration Manager (LCM) is the backbone of Desired State Configuration (DSC). It is responsible for a number of DSC aspects, including determining push or pull refresh modes. In this course, you will work with the LCM.
PowerShell 5.0 Local Configuration Manager (LCM) is the backbone of Desired State Configuration (DSC). It is responsible for a number of DSC aspects, including determining push or pull refresh modes. In this course, you will work with the LCM.
[READ LESS]
Produced by: SkillSoft