Do you want to be taken seriously as an IT professional, who has the knowledge and expertise not only to design but also implement the technical infrastructure for solutions for business that are based on the Microsoft Windows and .NET Enterprise platform? If yes, then the Microsoft Certifications for IT Professionals(MCITP)certification is a must.
Enrol in our MCITP certification course that is hands-on for 10 weeks and includes a free mock-exam. You also get unlimited practice hours.
Once you have the MCITP certification, it also indicates that you have spent time and dedication towards this field and that you have what it takes to get the job done. That is the number one reason why employers stress on MCITP certification training. Employees who work for consulting organizations also know that their customers recognize the value of MCITP certification training. They look for and ask MCITP certified individuals. MCITP certification will also improve your productivity and confidence needed, which will help you to grow in your career.
Microsoft Certifications for IT Professionals(MCITP)
MCITP: Enterprise Administrator Windows 2008 Server and Windows 7
Tutor Led, Practical Oriented and Hands-on Vocational Training
Certifications CCNA Duration : 190 hrs
Microsoft Certifications for IT Professionals (MCITP) Windows 2008 Exams:
■ MCIPT Exam 70-640 Windows Server 2008 Active Directory Configuration
■ MCIPT Exam 70-642 Windows Server 2008 Network Infrastructure Configuration
■ MCIPT Exam 70-643 Windows Server 2008 Applications Infrastructure Configuration
■ MCIPT Exam 70-680 Windows 7 Configuration
■ MCIPT Exam 70-647: PRO: Windows Server 2008, Enterprise Administrator
MCITP Enterprise Administrator
Does your job profile include working with the Windows Server 2008 OS? If finding your way around the maze of WS 2008 architecture is child’s play for you, then going for the MCITP exam as an Enterprise Administrator would prove to be a valuable asset on your resume. The exam will make you credible for the in-demand job roles of Enterprise system/security administrator, network administrator, systems architect etc.
The MCITP certificate for EA is about infrastructure design. The core level business planning capabilities of students will be tested here. They will be required to offer suggestions, policies and plans for new technology practices and co-ordinate with the other business levels of an organization. They will also formulate security solutions and design key components that will affect an organization at multiple levels across the hierarchy. They will take an active part in an enterprise’s decision-making policies and devise key strategies that conform to the industry standards.
The applicants can make the best use of our state-of-the-art teaching technology as the students of London College, to gain maximum practical exposure to the industry standards in demand for this course.
MCITP certification Exam 70-640
Configuring Domain Name System (DNS) for Active Directory
■ Configure zones.
■ Dynamic DNS (DENS), Non-dynamic DNS (NIDD'S), and Secure Dynamic DNS (SADDENS).
■ Time to Live (TITLE), Global Names, Primary, Secondary, Active Directory Integrated, Stub, SOAK, zone scavenging, forward lookup, reverse lookup
DNS server settings, zone transfers and replication
■ Configure DNS, Forwarding, root hints, configure zone delegation, round robin, disable recursion, debug logging, server scavenging
■ Configure replication scope (forestDNSzone, domainDNSzone), incremental zone transfers, DNS Notify, secure zone transfers
■ Configure name servers, application directory partitions.
Configuring the Active Directory Infrastructure
■ Configure a forest or a domain, Remove a domain, perform an unattended installation, Active Directory Migration Tool (ADMIT) 3M (pruning and grafting), raise forest and domain functional levels, interoperability with previous versions of Active Directory, alternate user principal name (PUN) suffix, forest prep, domain prep
Configure trusts, Sites, global catalog, operations masters and Active Directory replication
■ Forest trust, selective authentication versus forest-wide authentication, Transitive trust, external trust, shortcut trust, SID filtering, Create Active Directory subnets, configure site links, Configure site link costing, configure sites infrastructure, Distributed File System, one-way replication, Bridgehead server, Replication scheduling, configure replication protocols, force interstice replication, Universal Group Membership Caching (GUM), Partial attribute set, promote to global catalog, Seize and transfer, backup operations master, operations master placement, Schema Master, extending the schema, time service
Configuring Additional Active Directory Server Roles
■ Configure Active Directory Lightweight Directory Service (AD LDS).
■ Migration to AD LDS, configure data within AD LDS,
■ Configure an authentication server, server core, Windows Server 2008 Hyper-VS.
Configure Active Directory Rights Management Service (AD RAMS).
■ Certificate request and installation, self-enrollments, delegation, Active Directory Met directory Services (AD MDS), Windows Server virtualization
Configure the read-only domain controller (ROD).
■ Unidirectional replication, Administrator role separation, read-only DNS, Bit Locker, credential caching, password replication, system, Windows Server virtualization
Configure Active Directory Federation Services (AD FS).
■ Install AD FS server role, exchange certificate with AD FS agents, configure trust policies, configure user and group claim mapping, Windows Server virtualization
Creating and Maintaining Active Directory Objects
■ Automate creation of Active Directory accounts.
■ Bulk import, configure the PUN, create computer, user, and group accounts (scripts, import, migration), template accounts, contacts, distribution lists
Maintain Active Directory accounts.
■ Configure group membership, account resets, delegation, AGEDLY/AGEDLY, deny domain local group, local versus domain, Protected Admin, disabling accounts versus deleting accounts, deprovisioning, contacts, creating organizational units (Oust), delegation of control
Create and apply Group Policy objects (Goes)
■ GPO templates and software deployment Goes Enforce, OUR hierarchy, block inheritance, and enabling user objects, group policy processing priority, WIMP, group policy filtering, group policy loopback User rights, ADMIX Central Store, administrative templates, security templates, restricted groups, security options, starter Goes, shell access policies Publishing to users, assigning software to users, assigning to computers, software removal
Configure account policies and audit policy by using Goes
■ Domain password policy, account lockout policy, Fine-grain password policies
Audit logon events, audit account logon events, Audit policy change, audit access privilege use, Audit directory service access, audit object access.
Configure backup and recovery.
■ Using Windows Server Backup, back up files and system state data to media
■ Back up and restore by using removable media
■ Perform an authoritative or non-authoritative Active Directory restore
■ Linked value replication, Directory Services Recovery Mode (DORM) (reset admin password),
■ Back up and restore Goes
Perform offline maintenance
■ Offline defragmentation and compaction, Restart able Active Directory,
■ Active Directory database storage allocation
Monitor Active Directory
■ Network Monitor, Task Manager, Event Viewer
■ Revlon, Readmit, Windows System Resource Manager,
■ Reliability and Performance Monitor, Server Performance Advisor, SOP
Install Active Directory Certificate Services.
■ Standalone versus enterprise, CA hierarchies—root versus subordinate
■ Certificate requests, certificate practice statement
Configure CA server settings.
■ Key archival, certificate database backup and restore,
■ Assigning administration roles
Manage certificate templates, enrollments and certificate revocations
■ Certificate template types, securing template permissions, managing different certificate template versions, key recovery agent
■ Network device enrollment service (NODES), Auto enrollment,
■ Web enrollment, smart card enrollment, creating enrollment agents
■ Configure Online Responders, Certificate Revocation List (CURL),
■ CURL Distribution Point (CAP), Authority Information Access (ARIA)
MCITP certification Exam 70-642
Configuring IP Addressing and Services
■ Configure Ivy and Ivy addressing.
■ Configure IP options, subletting, super netting, alternative configuration
Configure Dynamic Host Configuration Protocol (DUCK)
■ DUCK options, creating new options, PIE boot, default user profiles, DUCK relay agents, exclusions, authorize server in Active Directory, scopes, server core, Windows Server Hyper-VS.
Configure routing IPSec, Name Resolution
■ Static routing, persistent routing, Routing Internet Protocol (RIP), Open Shortest Path First (SOP)
■ Create IPSec policy, IPSec Authentication Header (AH), IPSec Encapsulating Security Payload (ESP)
Configure a Domain Name System (DNS) server, DNS zones, DNS records and DNS replication
■ Conditional forwarding, external forwarders, root hints, cache-only, server core, WINS and DNS integration, Windows Server virtualization
■ DNS Refresh no-refresh, intervals, DNS listserv address (NSLOOKUP), primary/secondary zones, Active Directory integration, Dynamic Domain Name System (DENS), Global Names, SOAK refresh.
■ Record types, host, pointer, MIX, SERVE, NS, dynamic updates, Time to Live (TITLE).
■ DNS secondary zones, DNS stub zones, DNS scavenging interval, replication scope.
Configure name resolution for client computers
■ DNS and WINS integration, configuring HOSTS file, IMPOSTS, node type, Link-Local Multicast Name Resolution (LIMNER), broadcasting, resolver cache, DNS Server list, Suffix Search order, manage client settings by using group policy
Configuring Network Access, remote access, Network Access Protection (NAP) and network authentication.
■ Dial-up, Remote Access Policy, Network Address Translation (NAT), Internet Connection Sharing (ICS), VAN, Routing and Remote Access Services (ARRAS), inbound/outbound filters, configure Remote Authentication Dial-In User Service (RADIUS) server, configure RADIUS proxy, remote access protocols, Connection Manager
Network layer protection, DUCK enforcement, VAN enforcement, configure NAP health policies, IPSec enforcement, 802.ax enforcement, flexible host isolation.
■ LAN authentication by using NTLMv2 and Kerberos, WAN authentication by using 802.ax, RAS authentication by using MS-CHAP, MS-CHAP eve, and EARP.
Configure wireless access, firewall settings
■ Set Service Identifier (SAID), Wired Equivalent Privacy (WEEP), We-If Protected Access (SPA), We-If Protected Access 2 (WAR), ad hoc versus infrastructure mode, group policy for wireless.
■ Incoming and outgoing traffic filtering, Active Directory account integration, identify ports and protocols, Microsoft Windows Firewall versus Windows Firewall with Advanced Security, configure firewall by using group policy, isolation policy.
Configuring File and Print Services
■ Configure a file server.
■ File share publishing, Offline Files, share permissions, NETS permissions, encrypting file system (EVES)
Configure Distributed File System (DOFFS)
■ DOFFS namespace, DOFFS configuration and application, creating and configuring targets, DOFFS replication
Configure shadow copy services and backup and restore
■ Recover previous versions, set schedule, set storage locations
■ Backup types, backup schedules, managing remotely, restoring data
■ Manage disk quotas.
■ Quota by volume or quota by user, quota entries, quota templates
Configure and monitor print services
■ Printer share, publish printers to Active Directory, printer permissions, deploy printer connections, install printer drivers, export and import print queues and printer settings, add counters to Reliability and Performance Monitor to monitor print servers, print pooling, print priority
Monitoring and Managing a Network Infrastructure
■ Configure Windows Server Update Services (WISES) server settings.
update type selection, client settings, Group Policy object (GPO), client targeting, software updates, test and approval, disconnected networks
Capture performance data
■ Data Collector Sets, Performance Monitor, Reliability Monitor, monitoring System Stability Index
Monitor event logs
■ Custom views, application and services logs, subscriptions, DNS log
■ Gather network data.
■ Simple Network Management Protocol (SNMP), Baseline Security Analyzer, Network Monitor
MCITP certification Exam 70-643
Windows Server 2008 Applications Infrastructure Configuration
Deploy images by using Windows Deployment Services.
■ Install from media (IF), configure Windows Deployment Services, capture Windows Deployment Services images, deploy Windows Deployment Services images, server core
Configure Microsoft Windows activation
■ Install a KAMES server, create a DNS SERVE record, replicate volume license data
Configure Windows Server Hyper-VS. and virtual machines
■ Virtual networking, virtualization hardware requirements, Virtual Hard Disks, migrate from physical to virtual, VIM additions, backup, optimization, server core
Configure high availability, storage
■ Fail over clustering, Network Load Balancing, hardware redundancy, RAID types, Virtual Disk Specification (VS.) API, Network Attached Storage, discs and Fiber Channel storage area networks, mount points
Configure Windows Server 2008 Terminal Services RemoteApp (TS RemoteApp)
■ Configuring Terminal Services Web Access, configuring Terminal Services Remote Desktop Web Connection
Configure Terminal Services Gateway, Terminal Services load balancing
■ Certificate configuration, Terminal Services Gateway Manager (TS Gateway Manager), specifying resources that users can access through TS Gateway by using Terminal Services resource authorization policy (TS RAP) and Terminal Services connection authorization policy (TS CAP), Terminal Services group policy
■ Terminal Services Session Broker redirection modes, DNS registration, setting through group policy.
Configure and monitor Terminal Services resources
■ Allocate resources by using Windows Server Resource Manager, configure application logging
Configure Terminal Services licensing, server options and Services client connections
■ Deploy licensing server, connectivity between terminal servers and Terminal Services licensing server, recovering Terminal Services licensing server, managing Terminal Services client access licenses (TS Calls)
■ Connecting local devices and resources to a session, Terminal Services profiles, Terminal Services home folders, Remote Desktop Connection (RED), single sign-on, Remote Desktop Snap-In, MASTS.exe
■ Logoff, disconnect, reset, remote control, monitor, Remote Desktop Protocol (RAP) permissions, connection limits, session time limits, managing by using Goes, viewing processes, session permissions, display data prioritization
Configure Web applications, Web sites, File Transfer Protocol (FTP) server and Simple Mail Transfer Protocol (SMTP)
■ Directory-dependent, publishing, URL-specified configuration, Microsoft .NET components, for example, .NET and asp, configure application pools.
■ Migrate sites and Web applications, publish IBIS Web sites, configure virtual directories
■ Configure for extranet users, configure permissions
■ Setting up smart hosts, configuring size limitations, setting up security and authentication to the delivering server, creating proper service accounts, authentication, SMTP relay
Manage Internet Information Services (IBIS), SAL security
■ Web site content backup and restore, IBIS configuration backup, monitor IBIS, configure logging, delegation of administrative rights
■ Configure certificates, requesting SAL certificate, renewing SAL certificate, exporting and importing certificates
Configure Web site authentication and permissions
■ Configure site permissions and authentication, configure application permissions, client certificate mappings
Configuring Network Application Services
■ Configure Windows Media server.
■ On-demand replication, configure time-sensitive content, caching and proxy
■ Configure Digital Rights Management (DRAM)
■ Encryption, sharing business rules, configuring license delivery, configuring policy templates
■ Configure Microsoft Windows SharePoint Services server options
■ Site permissions, backup, antivirus, configuring Windows SharePoint Services service accounts
■ Configure Windows SharePoint Services a-mail integration
■ Configuring a document library to receive a-mail, configuring incoming versus outgoing a-mail
MCITP certification Exam 70-680
Installing Windows 7
■ Introduction, Installing Windows 7 Using Image-Based Installation, Migrating User Settings, simper, image for deployment, Capture the image and copy to a network share, Image Using Image, disk and image the new computer, Migrate User Settings
Configure Hardware and Software
■ Capture a system image, preparing system for capture; creating a WIMP file; automated capture; manual capture
■ Prepare a system image for deployment., inserting an application into a system image; inserting a driver into a system image; inserting an update into a system image; configuring tasks to run after deployment
■ Deploy a system image, automated deployment methods; manually deploying a customized image
■ Configure a PHD, creating, deploying, booting, mounting, and updating PhDs; offline updates; offline servicing
Configure the Network
■ Configure Ivy network settings, setting up a network connection, network locations, resolving issues, APIA.
■ Configure Ivy network settings, Configuring name resolution; connecting to a network; setting up a connection for a network; network locations; resolving connectivity issues; link local multicast name resolution
■ Configure networking settings, physically connected(wired), wireless devices connecting to wireless network, configuring security, set preferred wireless.
■ Configure Windows Firewall., configuring authenticated exceptions, remote management, configuring remote management tools, executing PowerSheell Commands.
Configure TCP/IP Settings
■ Configure Static Ivy Settings, Configure Ivy for Dynamic IP Addressing, Configure Ivy Addressing, Configure TCP/IP settings using IVY and Ivy, Using PING, ipconfig, tracer, nslookup, Configure Windows Firewall, Configure Remote Management, Configure Remote Desktop
Sharing and Securing Resources
■ Configure Shared Resources, Home Group Settings, User Account Control (AUK), Branch Cache, Shared Folders in Computer Management, Share a printer, AUK Group Policy Settings, Account Policies, Configure NETS Permissions and View Effective Permissions, Credential Manager Vault
Windows 7 and Mobile Computing
■ Configure Bit Locker and Bit Locker Togo, Direct Access, Mobility Options, Configure Offline Files, Manage Offline File Settings, Configure Remote Connections, Bit Locker
Monitoring and Maintaining Windows 7
■ Configure Updates, Manage Disks, Monitor Systems, Configure Performance Settings, Windows Updates, Automatic Updates, Configure Windows Update using Group Policy,
■ Create Disk Volumes, Extend a Volume, Shrink, and Delete Volumes, Extend Partitions Across Disks (Spanned Volumes), Convert a Disk to Dynamic, Create a PHD, disk part, Defragment a Drive
Monitor Systems and Configure Performance Settings
■ Configure the Event Log Settings, Clear and Archive Logs, Filter Event Logs and Create Custom Views, Configure Page File settings, Configure Drive Caching, Configure Power Settings, Adjust Performance Settings
Configuring Backup and Recovery Options
■ Configure backup, Creating a system recovery disk; backing up files, folders, or full system; scheduling backups, configuring file restore points; restoring previous versions of files and folders; restoring damaged or deleted files by using shadow copies; restore user profiles
MCITP certification Exam 70-647
PRO: Windows Server 2008, Enterprise Administrator
Plan for name resolution and IP addressing.
■ Internal and external naming strategy, naming resolution support for legacy clients, Naming resolution for directory services, IP addressing scheme, TCP/IP version coexistence
Design for network access
■ Network access policies, remote access strategy, Perimeter networks, server and domain isolation
Plan for application delivery
■ Application virtualization, presentation virtualization, Locally installed software, Web-based applications
Plan for Terminal Services
■ Terminal Services licensing, Terminal Services infrastructure
Design Active Directory forests and domains
■ Forest structure
■ Forest and domain functional levels
■ Intra-organizational authorization and authentication
■ Schema modifications
Design the Active Directory physical topology
■ Placement of servers
■ Site and replication topology
■ Printer location policies
Design the Active Directory administrative model
■ Group strategy
■ Compliance auditing
■ Group administration
■ Organizational structure
Design the enterprise-level group policy strategy
■ Group policy hierarchy and scope filtering
■ Control device installation
■ Authentication and authorization
Plan for domain or forest migration, upgrade, and restructuring.
■ Cross-forest authentication, backward compatibility, object migration,
■ Migration planning, implementation planning, environment preparation
Design the branch office deployment
■ Authentication strategy
■ server security
Design and implement public key infrastructure
■ Certificate services
■ POI operations and maintenance
■ Certificate life cycle management
Plan for interoperability
■ Inter-organizational authorization and authentication
■ Application authentication interoperability, cross-platform interoperability
Designing for Business Continuity and Data Availability
■ Plan for business continuity
■ Service availability
■ Directory service recovery
Design for software updates and compliance management
■ Patch management and patch management compliance
■ Microsoft Update and Windows Update,
■ Security baselines
■ System health models
Design the operating system virtualization strategy
■ Server consolidation
■ Application compatibility,
■ Virtualization management
■ Placement of servers
Design for data management and data access
■ Data security
■ Data accessibility and redundancy
■ Data collaboration.