Nossa especialidade é fornecer serviço especializado para preencher suas necessidades on-line.
Saber Mais
Trabalhamos você para trazer as ideias certas para você e seus clientes.
Saber Mais
Sua satisfação é nossa prioridade número 1. Faremos todo o necessário para encontrar a melhor solução.
Recebemos diversos prêmios do setor, incluindo o de mais inovador e mais ágil.
Saber Mais
Estamos aqui para ajudá-lo a adequar a sua empresa
Visão Global
A segurança da informação é a proteção das informações de uma grande variedade de ameaças com o objetivo de assegurar a continuidade do negócio, minimizar o risco do negócio e maximizar o retorno sobre os investimentos e as oportunidades de negócios.
A segurança das informações vem ganhando importância no mundo da Tecnologia da Informação (TI). A globalização da economia está gerando uma troca cada vez maior de informações entre as organizações (seus funcionários, clientes e fornecedores) bem como uma explosão no uso de computadores em rede e dispositivos de informática.
A norma internacional para Gerenciamento de Segurança da Informação ISO/IEC 27001, é uma norma amplamente respeitada e consultada e fornece uma estrutura para a organização e o gerenciamento de um programa de segurança das informações. A implementação de um programa com base nesta norma será muito útil para o objetivo de uma organização de atender a muitas das necessidades apresentadas no complexo ambiente operacional da atualidade. Uma compreensão categórica desta norma é importante para o desenvolvimento pessoal de todos os profissionais de segurança das informações.
Nos módulos de Segurança da Informação do EXIN, utiliza-se a seguinte definição: A Segurança da Informação lida com a definição, a implementação, a manutenção, a conformidade e a avaliação de um conjunto coerente de controles (medidas) que garantam a disponibilidade, a integridade e a confidencialidade da fonte de informações (manual e automática).
No EXIN Information Security Foundation baseado na ISO/IEC 27001 são testados os conceitos básicos de segurança da informação e suas relações. Um dos objetivos desse módulo é aumentar a conscientização de que as informações são valiosas e vulneráveis e aprender quais medidas são necessárias para protegê-las.
Público Alvo
Qualquer pessoa na organização que manuseia informações. É também aplicável a proprietários de pequenas empresas a quem alguns conceitos básicos de Segurança da Informação são necessários. Este módulo pode ser um excelente ponto de partida para novos profissionais de segurança da informação.
Carga:
16h
Conteúdo
1. Informação e segurança
1.1 O conceito de informação
1.2 Valor da informação
1.3 Aspectos de confiabilidade
2. Ameaças e riscos
2.1 Ameaças e riscos
2.2 Relacionamento entre ameaças, riscos e confiabilidade da informação
3. Abordagem e organização
3.1 Política de segurança e organização de segurança
3.2 Componentes da organização da segurança
3.3 Gerenciamento de incidentes
4. Medidas
4.1 Importância de medidas de segurança
4.2 Medidas físicas
4.3 Medidas técnicas
4.4 Medidas organizacionais
5. Legislação e regulamentação
5.1 Legislação e regulamentação
Visão Global
Onde quer que os dados pessoais sejam coletados, armazenados, usados e, finalmente, excluídos ou destruídos, surgem preocupações de privacidade. Com o Regulamento Geral de Proteção de Dados da UE (GDPR), o Conselho da União Europeia tenta reforçar e unificar a proteção de dados para todos os indivíduos da União Europeia (UE). Este regulamento afeta todas as organizações que processam os dados pessoais de cidadãos da EU e tem efeitos além destas fronteiras. O PDPF abrange os principais assuntos relacionados ao GDPR e tem sido usado como um guia para diversos países fora da UE em fase de elaboração das suas próprias leis.
Público Alvo
Todos os colaboradores precisam ter uma compreensão da proteção de dados e dos requisitos legais, conforme definido no GDPR. As seguintes funções mais específicas podem se interessar:
DPO (Diretor de Proteção de Dados), Privacy Officer (Diretor de Privacidade), Legal Officer / Compliance Officer (Diretor Jurídico / Diretor de Conformidade), Security Officer (Diretor de Segurança), Business Continuity Manager (Gerente de Continuidade de Negócios).
Carga
16h
Conteúdo
1. Fundamentos e regulamentação de Privacidade e Proteção de Dados
1.1 Definições
1.2 Dados Pessoais
1.3 Fundamentos legítimos e limitação de propósito
1.4 Requisitos adicionais para processamento legítimo de dados pessoais
1.5 Direitos do titular dos dados
1.6 Violação de dados e procedimentos relacionados
2. Organizando a proteção de dados
2.1 Importância da proteção de dados para a organização
2.2 Autoridade Fiscalizadora
2.3 Transferência de dados pessoais para outros países
2.4 Regras Corporativas compulsórias e proteção de dados em contratos
3. Práticas de Proteção de Dados
3.1 Proteção de Dados by design e por padrão
3.2 Avaliação de Impacto sobre a Proteção de Dados
(DPIA)
3.3 Aplicações práticas relacionadas ao uso de dados, marketing e mídias sociais
Visão Global
Com a explosão cada vez maior de informações que inundam a internet, todas as empresas devem planejar como gerenciar e proteger a privacidade das pessoas e seus dados. Não é à toa que muitas novas leis - na UE, assim como nos EUA e em muitas outras regiões - estão sendo formuladas para a sua regulação.
Recentemente, a Comissão Europeia publicou o General Data Protection Regulation (GDPR) na UE, o que significa que todas as organizações envolvidas devem cumprir regras específicas. Esta certificação de nível Practitioner é baseada nos temas abordados pelo exame Foundation, enfocando o desenvolvimento e a implementação de políticas e procedimentos para o cumprimento da legislação nova e da já existente, aplicação de diretrizes e melhores práticas para privacidade e proteção de dados e estabelecimento de um Sistema de Gestão de Proteção de Dados e Privacidade.
Público Alvo
Esta certificação em nível Practitioner será particularmente útil para Data Protection Officers (DPOs) ou “Encarregados pelo Tratamento de Dados Pessoais” em uma organização / Privacy Officers, Legal/Compliance Officers, Security Officers, Gerentes de Continuidade de Negócios, Controladores dos Dados, Auditores de Proteção de Dados (internos e externos), Analistas de Privacidade e gerentes de RH.
Uma vez que esta é uma certificação de nível avançado, a aprovação prévia no EXIN Data & Protection Foundation é altamente recomendada.
Carga
24h
Conteúdo
1. Políticas de proteção de dados
1.1 Objetivo das políticas de proteção de dados/privacidade em uma organização.
1.2 Conceitos de proteção de dados desde a concepção (by design) e por padrão (by default).
2. Gerenciando e organizando a proteção de dados
2.1 Aplicar as fases do Sistema de Gestão de Proteção de Dados (DPMS).
2.2 Aplicar a teoria de um plano de ação para conscientização sobre a proteção de dados.
3. Papéis do Controlador, Processador e Data Protection Officer (DPO)
3.1 Implementar os papéis do controlador e processador de dados.
3.2 Estabelecer o papel e as responsabilidades de um DPO.
4. Avaliação de Impacto sobre a Proteção de Dados (AIPD)
4.1 Aplicar os critérios para uma AIPD.
4.2 Aplicar as etapas de uma AIPD.
5. Violação de dados, notificação e resposta a incidentes.
5.1 Aplicar os requisitos do GDPR em relação a violações de dados pessoais.
5.2 Aplicar os requisitos para notificação.
Visão Global
Onde quer que os dados pessoais sejam coletados, armazenados, usados e, finalmente, excluídos ou destruídos, surgem preocupações de privacidade. Com a Lei Geral de Proteção de Dados (LGPD), o Congresso Brasileiro tenta reforçar e unificar a proteção de dados para todos os indivíduos dentro do Brasil. Este regulamento afeta todas as organizações que processam os dados pessoais de cidadãos do Brasil e tem efeitos além destas fronteiras. O exame EXIN Privacy & Data Protection Essentials abrange os principais assuntos relacionados à LGPD.
Público Alvo
Todos os colaboradores que precisam ter uma compreensão da proteção de dados e dos requisitos legais brasileiros, conforme definido na LGPD. O exame Essentials é extremamente recomendável para todos que precisam conhecer ou estar atualizados quanto à privacidade e proteção de dados de acordo com a lei local.
Carga
8h
Conteúdo
1. Fundamentos e regulamentação de privacidade e proteção de dados
1.1 Definições
1.2 Dados pessoais
1.3 Fundamentos legítimos e limitação de propósito
1.4 Requisitos adicionais para processamento legítimo de dados pessoais
1.5 Direitos do titular dos dados
1.6 Violação de dados e procedimentos relacionados
2. Organizando a proteção de dados
2.1 Importância da proteção de dados para a organização
2.2 Autoridade Nacional de Proteção de Dados (ANPD)
2.3 Transferência de dados pessoais para outros países
2.4 Normas Corporativas Globais e proteção de dados em contratos
3. Práticas de proteção de dados
3.1 Proteção de dados desde a concepção (by design) e por padrão
3.2 Relatório de impacto sobre a proteção de dados (RIPD)
3.3 Aplicações práticas relacionadas ao uso de dados, marketing e mídias sociais
Overview
Audience(s): IT Pros
Technology: System Center
Level: Advanced
This Revision: B
Delivery method: Classroom
Length: 2 days
Language(s): English
About this course
This is a two-day instructor-led training (ILT) course that describes the integration of various online cloud services with Microsoft System Center Configuration Manager. This course covers integration with online services such as Microsoft Store for Business, Microsoft Office 365, and Microsoft Azure. It also describes how to manage mobile devices by using methods such as on-premises mobile device management and Exchange Server integration.
Audience profile
This course is intended for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses or intends to use the latest branch of Configuration Manager to manage and deploy PCs, devices, and applications.
The secondary audience for this course are individuals who are interested in taking Exam 70-703: “Administering System Center Configuration Manager and Cloud Services Integration.”
At course completion
After completing this course, students will be able to:
• Describe the challenges in managing a mobile and internet-based workforce and how Configuration Manager integrated with mobile device management and cloud services solutions can address these challenges.
• Describe and configure methods used to manage client devices that are located outside of the corporate network and connected to the internet.
• Deploy and manage Microsoft Store for Business apps by using Configuration Manager.
• Deploy and manage Office 365 apps by using Configuration Manager.
• Manage mobile devices by using Configuration Manager.
• Describe and configure on-premises mobile device management using Configuration Manager.
Course Outline
Module 1: Extending the Configuration Manager infrastructure to support internet-based and mobile devices
This module describes the challenges in managing a mobile and internet-based workforce. It also describes how Configuration Manager integrates with mobile device management and cloud services solutions to address these challenges.
Lessons
• Managing a mobile and distributed workforce
• Integrating Configuration Manager with cloud services and internet-based management solutions
• PKI requirements to support internet-based management
• Expanding content availability by using cloud-based distribution points
Lab : Preparing for cloud integration
• Activating an Azure trial subscription
• Configuring and enabling directory syncing
Lab : Implementing PKI for Configuration Manager site systems and clients
• Creating certificate templates for Configuration Manager services
• Deploying certificates for Configuration Manager
Lab : Configuring cloud-based distribution points
• Creating and exporting an Azure management certificate for cloud-based distribution points
• Setting up Azure and creating a cloud-based distribution point
After completing this module, students will be able to:
• Understand the challenges in managing a mobile and distributed workforce.
• Understand the considerations for integrating Configuration Manager with cloud services and internet-based management solutions.
• Describe the public key infrastructure (PKI) requirements to support the internet and mobile device management.
• Explain how to expand content availability by using cloud-based distribution points.
Module 2: Managing clients on the internet
This module explains how to manage client devices that are located outside of the corporate network and connected to the internet.
Lessons
• Methods for managing internet-based clients
• Planning and implementing IBCM
• Planning and implementing the Cloud Management Gateway
Lab : Configuring IBCM
• Configuring the Configuration Manager site systems to support IBCM
• Verifying the client settings for IBCM
Lab : Configuring the Cloud Management Gateway for managing clients on the internet
• Enabling the Cloud Management Gateway feature
• Creating and exporting the Azure management certificate for cloud-based distribution points
• Setting up the Cloud Management Gateway
After completing this module, students will be able to:
• Identify the methods for managing client devices that are connected to the internet, but located outside the corporate network.
• Describe the considerations and tasks for enabling Configuration Manager to support internet-based client management (IBCM).
• Describe the considerations and procedures for implementing the Cloud Management Gateway to support internet-based clients.
Module 3: Managing Microsoft Store for Business apps by using Configuration Manager
This module explains how to use Microsoft Store for Business, how to set it up, and how to manage it. It also describes how to deploy and manage Microsoft Store for Business apps by using Configuration Manager.
Lessons
• Overview of Microsoft Store for Business
• Managing Microsoft Store for Business apps by using Configuration Manager
Lab : Setting up and managing Microsoft Store for Business
• Signing up for Microsoft Store for Business
• Managing Microsoft Store for Business
Lab : Deploying Microsoft Store for Business apps by using Configuration Manager
• Setting up syncing with Microsoft Store for Business
• Deploying and managing Microsoft Store for Business apps
After completing this module, students will be able to:
• Explain how to manage Microsoft Store for Business and describe its features.
• Deploy apps from Microsoft Store for Business by using Configuration Manager.
Module 4: Managing Office 365 apps by using Configuration Manager
This module explains how to implement Office 365 client management to help support an Office 365 cloud-based solution. It also describes how to deploy and manage Office 365 apps by using Configuration Manager.
Lessons
• Overview of Office 365 ProPlus
• Deploying Office 365 client applications by using Configuration Manager
• Managing and updating an Office 365 client deployment
Lab : Preparing Office 365 for application deployment
• Signing up for an Office 365 trial subscription
• Assigning Office 365 ProPlus licenses to users
• Modifying Office 365 ProPlus options for manual downloads
Lab : Deploying and managing Office 365 client applications by using Configuration Manager
• Configuring infrastructure requirements to support Office 365 client management
• Deploying the Office 365 client application
• Configuring software updates to support Office 365
After completing this module, students will be able to:
• Describe Microsoft Office 365 ProPlus features.
• Use Configuration Manager to deploy Office 365 applications.
• Manage and update an Office 365 client deployment.
Module 5: Mobile device management by using Configuration Manager
This module describes the methods and technologies to manage mobile devices by using Configuration Manager.
Lessons
• Overview of mobile device management
• Configuring the Exchange Server connector for mobile device management
Lab : Managing mobile devices by using the Exchange Server connector
• Configuring permissions for Exchange integration
• Configuring the Exchange Server connector
• Managing mobile devices by using Configuration Manager
After completing this module, students will be able to:
• Provide an overview of Microsoft mobile device management technologies and how they integrate with Configuration Manager.
• Explain how to deploy the Microsoft Exchange Server connector for Configuration Manager.
Module 6: On-premises mobile device management using Configuration Manager
This module explains on-premises mobile device management, its requirements, and the types of devices it can manage. It also explains how to implement on-premises mobile device management in an existing Configuration Manager environment and the different ways to enroll Windows 10 devices.
Lessons
• Overview of on-premises mobile device management
• Configuring on-premises mobile device management using Configuration Manager
Lab : Managing mobile devices with an on-premises infrastructure
• Configuring PKI for on-premises mobile device management
• Preparing Configuration Manager for on-premises mobile device management
• Enrolling Windows 10 devices for on-premises mobile device management
After completing this module, students will be able to:
• Explain what on-premises mobile device management is and compare it with other management options.
• Plan for and implement the requirements for on-premises mobile device management.
• Enroll a modern Windows 10 device in on-premises mobile device management
Additional Reading
To help you prepare for this class, attend the following course:
• Course 20703-1A: Administering System Center Configuration Manager
Prerequisites
Before attending this course, students must have system administrator–level working knowledge of:
• Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching, and addressing.
• Active Directory Domain Services (AD DS) principles and fundamentals of AD DS management.
• Installation, configuration, and troubleshooting for Windows-based personal computers.
• Basic concepts of PKI security.
• Basic understanding of scripting and Windows PowerShell syntax.
• Basic understanding of Windows Server roles and services.
• Basic understanding of the configuration options for iOS, Android, and Windows Mobile device platforms.
• Basic understanding of management tasks using Configuration Manager.
Este treinamento é composto pelos seguintes cursos:
1. AZ-101T01: Migrate Servers to Azure (Carga: 8h)
2. AZ-101T02: Implement and Manage Application Services (Carga: 8h)
3. AZ-101T03: Implement Advanced Virtual Networking (Carga: 8h)
4. AZ-101T04: Secure Identities (Carga: 8h)
____________________________________
Segue abaixo a descrição dos cursos:
1.Course AZ-101T01-A: Migrate Servers to Azure
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
This course teaches IT professionals how to discover, assess, plan and implement a migration of on-premises resources and infrastructure to Azure. Students will learn how to use Azure Migrate to perform the discovery and assessment phase that is critical to a successful migration. Students will also learn how to use Azure Site Recovery for performing the actual migration of workloads to Azure. The course focuses primarily on using ASR on a Hyper-V infrastructure to prepare and complete the migration process. Students will learn about using Azure Backup and Azure to Azure replication to ensure adequate disaster recovery mechanisms are in place. Finally, students will learn about using Azure Database Migration Service and the Azure Import/Export service for data migration scenarios.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Use Azure Migrate to discover and assess on-premises virtual machine migration to Azure.
• Use Azure Site Recovery to migrate Hyper-V infrastructures to Azure.
• Use Azure Database Migration service and Azure Import/Export service for data migration scenarios.
Course Outline
Module 1: Azure Migrate
In this module, you will be introduced to Azure migration projects and specifically Azure Migrate. Azure Migrate will be your tool of choice for automated server discovery and workload sizing. You will step through the process of using Azure Migrate to create a project, create a collector, assess machine readiness, and estimate cost.
Lessons
• Overview of Cloud Migration
• Azure Migrate: The Process
After completing this module, students will be able to:
• Use Azure Migrate to discover and assess on-premises virtual machine migration to Azure.
Module 2: Azure Site Recovery
In this module, you will be introduced to Azure Site Recovery (ASR). ASR will be your primary tool for migrating workloads to Azure. You will learn which scenarios are most appropriate for ASR and the features that the product provides. You will also learn how to use the ASR deployment planner to ensure your infrastructure is ready for migration. Lastly, you will walk through the process of implementing ASR on a Hyper-V infrastructure.
Lessons
• Overview of ASR
• Preparing the Infrastructure
• Completing the Migration Process
After completing this module, students will be able to:
• Use Azure Site Recovery to migrate Hyper-V infrastructures to Azure.
Module 3: Disaster Recovery
In this module, you will introduced to Azure Backup. Azure Backup can be used to backup and restore your virtual machines. You will also learn about Azure to Azure replication. This will enable you to replicate virtual machines from one Azure region to another Azure region. This will protect against regional outages.
Lessons
• Backup and Restore
• Azure to Azure Disaster Recovery
After completing this module, students will be able to:
• Use Azure Backup for virtual machines, and migrate virtual machines from one Azure region to another.
Module 4: Migrating Data
In this module, you will learn about using the Azure Database Migration service to perform seamless migrations at scale from multiple database sources to Azure Data platforms. You’ll also learn how to transfer large amount of data to and from the cloud using the Azure Import/Export service.
Lessons
• Database Migration
• Import and Export Service
After completing this module, students will be able to:
• Use Azure Database Migration service and Azure Import/Export service for data migration scenarios.
Module 5: Lab-Implement Azure Site Recovery Between Azure Regions
This module is provided to give you hands-on experience with the information provided in the course.
Lab : Implement Azure Site Recovery Between Azure Regions
• Implement prerequisites for migration of Azure VMs by using Azure Site Recovery
• Migrate an Azure VM between Azure regions by using Azure Site Recovery
After completing this module, students will be able to:
• Implement Azure Site Recovery Vault.
• Configure replication of Azure VMs between Azure regions by using Azure Site Recovery.
Prerequisites
Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
2.Course AZ-101T02-A: Implement and Manage Application Services
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
This course teaches IT Professionals how to manage and maintain the infrastructure for the core web apps and services that developers build and deploy. Students will learn how Azure App Service is used as a Platform as a Service (PaaS) offering for deploying cloud apps for web and mobile environments. Students will learn how to use App Service Environments (ASE) to host a dedicated environment for securing and running App Service apps at scale. Students will also learn how to use deployment slots as staging environments for web apps, that can then be swapped into production when needed. This course also teaches students how to scale up and scale out to meet and adjust for demand, and how bandwidth for web traffic can be optimized using Application Gateways and Content Delivery Networks (CDN). Lastly, the course provides students with an overview of serverless computing solutions, including Azure Functions, Event Grid, Service Bus, and Logic Apps.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Implement use cases and configuration options for Azure App Services and App Service Environments.
• Manage and secure web apps with backup, restore, snapshot, and cloning.
• Optimize your web app performance with Scale Up, Scale Out, Autoscale, and Grow out strategies.
• Deploy serverless computing features like Azure Functions, Event Grid, and Service Bus.
Course Outline
Module 1: Introducing the Azure App Service Platform
In this module, you will be introduced to the Azure App Services Platform. You will learn about app service plans, web app hosting options, app service scenarios and how to monitor apps. You will also learn about how to isolate apps with App Service Environments.
Lessons
• Introducing Azure App Service
• App Service Environments
After completing this module, students will be able to:
• Implement use cases and configuration options for Azure App Services and App Service Environments.
Module 2: Managing and Securing Web Apps
In this module, you will learn how to deploy your app with minimal downtime. You will also learn how to backup, restore, snapshot, and clone your app. Lastly, you will implement security features like authentication options and authentication providers.
Lessons
• Deploying Web Apps
• Managing Web Apps
• App Service Security
After completing this module, students will be able to:
• Manage and secure web apps with backup, restore, snapshot, and cloning.
Module 3: Scaling and Performance
In this module, you will learn how to ensure your app performs under various workloads. You will learn how to scale up and scale out your app. You will learn how to automatically scale your app and to grow out the app through geo-distribution. Lastly you will learn how CDN provides a way to optimize bandwidth and web traffic.
Lessons
• Scale Up and Scale Out
• Autoscale and Grow out
• Optimizing Bandwidth and Web Traffic
After completing this module, students will be able to:
• Optimize your web app performance with Scale Up, Scale Out, Autoscale, and Grow out strategies.
Module 4: Deploying Serverless Computing Solutions
In the module, you will learn what serverless computing is and what it provides. You will implement three serverless computing solutions: Azure Functions, Event Grid, and Service Bus. Azure Functions provide small pieces of code, or "functions," that run in the cloud. Event Grid is a service for managing routing of all events from any source to any destination. Service Bus multi-tenant cloud messaging service that sends information between applications and services.
Lessons
• Serverless Computing Concepts
• Managing Azure Functions
• Managing Event Grid
• Managing Service Bus
• Managing Logic App
After completing this module, students will be able to:
• Deploy serverless computing features like Azure Functions, Event Grid, and Service Bus.
Module 5: Lab-Implement and Manage Application Services
This module is provided to give you hands-on experience with the information provided in the course.
Lab : Implement and Manage Application Services
• Implement Azure web apps.
• Manage scalability and performance of Azure web apps.
After completing this module, students will be able to:
• Implement Azure web apps.
• Manage scalability and performance of Azure web apps.
Prerequisites
Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
3.Course AZ-101T03-A: Implement Advanced Virtual Networking
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
This course teaches IT Professionals how to implement and configure different Azure networking traffic distribution mechanisms, including Azure Load Balancer, Azure Traffic Manager, and Azure Application Gateway. Students will also learn how to implement site connectivity for multiple scenarios including cross-premises and hybrid configurations, as well as extending on-premises networks into the Microsoft cloud over a dedicated private connection, using Azure ExpressRoute. Lastly, students will learn how to use Network Watcher to monitor and troubleshoot Azure virtual networks. They will also learn how to troubleshoot and remediate common errors in Azure Application Gateway and Azure Load Balancer.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Cloud Administrators use the Azure Portal and as they become more proficient they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Implement and configure Azure Load Balancer, Azure Traffic Manager, and Azure Application Gateway.
• Implement and configure Site-to-Site VPN connections and ExpressRoute.
• Implement and configure Network Watcher and troubleshooting common network issues.
Course Outline
Module 1: Distributing Network Traffic
In this module, you will learn about three ways to distribute network traffic: Azure Load Balancer, Azure Traffic Manager, and Azure Application Gateway. The Azure Load Balancer delivers high availability and network performance to your applications. The Azure Traffic Manager allows you to control the distribution of user traffic to your service endpoints. The Azure Application Gateway is a web traffic load balancer that enables you to manage traffic to your web applications.
Lessons
• Overview of Network Traffic Distribution Options
• Azure Load Balancer
• Azure Traffic Manager
• Azure Application Gateway
After completing this module, students will be able to:
• Implement and configure Azure Load Balancer, Azure Traffic Manager, and Azure Application Gateway.
Module 2: Site Connectivity
In this module, you will learn and implement two ways to connect your virtual networks: Site-to-Site VPN Connections and ExpressRoute. Site-to-Site VPN connections provide secure tunneling for cross-premises and hybrid configurations. ExpressRoute extends your on-premises networks into the Microsoft cloud over a dedicated private connection facilitated by a connectivity provider.
Lessons
• Site-to-Site VPN Connections
• ExpressRoute
After completing this module, students will be able to:
• Implement and configure Site-to-Site VPN connections and ExpressRoute.
Module 3: Monitoring and Troubleshooting Network Connectivity
In this module, you will learn important skills around troubleshooting virtual network connectivity. The primary tool discussed is Azure Network Watcher. Azure Network Watcher provides IP flow verification, VPN diagnostics, NSG views and flows, and next hop analysis.
Lessons
• Introducing Network Watcher
• Implementing Network Watcher
• Network Troubleshooting Examples
After completing this module, students will be able to:
• Implement and configure Network Watcher and troubleshooting common network issues.
Module 4: Lab-Implement Advanced Virtual Networking
This module is provided to give you hands-on experience with the information provided in the course.
Lab : Implement Advanced Virtual Networking
• Deploy Azure VMs by using Azure Resource Manager templates.
• Implement Azure Load Balancing.
• Implement Azure Traffic Manager load balancing.
After completing this module, students will be able to:
• Deploy Azure VMs by using Azure Resource Manager templates.
• Implement Azure Load Balancing.
• Implement Azure Traffic Manager load balancing.
Prerequisites
Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
4.Course AZ-101T04-A: Secure Identities
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
This course teaches IT Professionals to understand the challenges that organizations face in keeping modern IT environments secure, as the more distributed environments that are part of a cloud-first or hybrid world have rapidly created new security challenges for IT. The course focuses on three key areas in the defense against attackers who target security vulnerabilities, resulting particularly from credential theft and compromised identities: Role-Based Access Control (RBAC), Multi-Factor Authentication (MFA), and Azure Active Directory Privileged Identity Management (PIM). Students learn to implement two-step verification to secure the sign-in process, as well has how to use advanced features like trusted IPs and Fraud Alerts with MFA to customize their identity access strategy. Using Privileged Identity Management, students learn how to apply just the right amount of access rights for just the right amount of time to the various administrative roles as well as to resources.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Use Azure RBAC to grant a granular level of access based on an administrator’s assigned tasks.
• Use Azure Multi-Factor Authentication to configure a strong authentication for users at sign-in.
• User Azure AD Privileged Identity Management to configure access rights based on just-in-time administration.
Course Outline
Module 1: Introduction to Identity Protection in Azure
In this module, you’ll learn about Role-Based Access Control as the foundation to organizing and managing an organization’s administrative access based on the principle of least privilege. You will also review Azure Active Directory concepts, as well as gaining insight into the threat landscape and security risks that are exposed to IT organizations through breach of privileged access.
Lessons
• Role-Based Access Control
• Azure Active Directory (Refresher)
• Protecting Privileged Access in the Environment
After completing this module, students will be able to:
• Use Azure RBAC to grant a granular level of access based on an administrator’s assigned tasks.
Module 2: Using Multi-Factor Authentication for Secure Access
In this module, you’ll learn about securing the sign-in process through Multi-Factor Authentication (MFA). You’ll learn how MFA works and the differences in implementation between on-premises and cloud scenarios. You’ll also learn about using conditional access policies to provide more fine-grained control over apps and resources in your environment.
Lessons
• Introducing Multi-Factor Authentication
• Implementing MFA
After completing this module, students will be able to:
• Use Azure Multi-Factor Authentication to configure a strong authentication for users at sign-in.
Module 3: Azure AD Privileged Identity Management
In this module, you’ll learn how to use Azure Privileged Identity Management (PIM) to enable just-in-time administration and control the number of users who can perform privileged operations. You’ll also learn about the different directory roles available as well as newer functionality that includes PIM being expanded to role assignments at the resource level.
Lessons
• Getting Started with PIM
• PIM Security Wizard
• PIM for Directory Roles
• PIM for Role Resources
After completing this module, students will be able to:
• User Azure AD Privileged Identity Management to configure access rights based on just-in-time administration.
Module 4: Lab-Secure Identities
This module is provided to give you hands-on experience with the information provided in the course.
Lab : Secure Identities
• Deploy an Azure VM by using an Azure Resource Manager template.
• Create Azure AD users and groups.
• Delegate management of Azure resources by using custom Role-Based Access Control (RBAC) roles.
• Delegate management of Azure AD by using Privileged Identity Management directory roles.
• Delegate management of Azure resources by using Privileged Identity Management resource roles.
After completing this module, students will be able to:
• Deploy an Azure VM by using an Azure Resource Manager template.
• Create Azure AD users and groups.
• Delegate management of Azure resources by using custom Role-Based Access Control (RBAC) roles.
• Delegate management of Azure AD by using Privileged Identity Management directory roles.
• Delegate management of Azure resources by using Privileged Identity Management resource roles.
Prerequisites
Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
Overview
Audience(s): IT Professionals
Technology: SQL Server
Level: Advanced
This Revision: C
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This five-day instructor-led course provides students who administer and maintain SQL Server databases with the knowledge and skills to administer a SQL server database infrastructure. Additionally, it will be of use to individuals who develop applications that deliver content from SQL Server databases.
Audience profile
The primary audience for this course is individuals who administer and maintain SQL Server databases. These individuals perform database administration and maintenance as their primary area of responsibility, or work in environments where databases play a key role in their primary job.
The secondary audiences for this course are individuals who develop applications that deliver content from SQL Server databases.
At course completion
After completing this course, students will be able to:
• Authenticate and authorize users
• Assign server and database roles
• Authorize users to access resources
• Protect data with encryption and auditing
• Describe recovery models and backup strategies
• Backup SQL Server databases
• Restore SQL Server databases
• Automate database management
• Configure security for the SQL Server agent
• Manage alerts and notifications
• Managing SQL Server using PowerShell
• Trace access to SQL Server
• Monitor a SQL Server infrastructure
• Troubleshoot a SQL Server infrastructure
• Import and export data
Course Outline
Module 1: SQL Server Security
Protection of data within your Microsoft SQL Server databases is essential and requires a working knowledge of the issues and SQL Server security features. This module describes SQL Server security models, logins, users, partially contained databases, and cross-server authorization.
Lessons
• Authenticating Connections to SQL Server
• Authorizing Logins to Connect to databases
• Authorization Across Servers
• Partially Contained Databases
Lab : Authenticating Users
• Create Logins
• Create Database Users
• Correct Application Login Issues
• Configure Security for Restored Databases
After completing this module, you will be able to:
• SQL Server basic concepts.
• SQL Server connection authentication.
• User login authorization to databases.
• Partially contained databases.
• Authorization across servers.
Module 2: Assigning Server and Database Roles
Using roles simplifies the management of user permissions. With roles, you can control authenticated users’ access to system resources based on each user’s job function—rather than assigning permissions user-by-user, you can grant permissions to a role, then make users members of roles. Microsoft SQL Server includes support for security roles defined at server level and at database level.
Lessons
• Working with server roles
• Working with Fixed Database Roles
• Assigning User-Defined Database Roles
Lab : Assigning server and database roles
• Assigning Server Roles
• Assigning Fixed Database Roles
• Assigning User-Defined Database Roles
• Verifying Security
After completing this module, you will be able to:
• Describe and use server roles to manage server-level security.
• Describe and use fixed database roles.
• Use custom database roles and application roles to manage database-level security.
Module 3: Authorizing Users to Access Resources
In the previous modules, you have seen how Microsoft SQL Server security is organized and how sets of permissions can be assigned at the server and database level by using fixed server roles, user-defined server roles, fixed database roles, and application roles. The final step in authorizing users to access SQL Server resources is the authorization of users and roles to access server and database objects. In this module, you will see how these object permissions are managed. In addition to access permissions on database objects, SQL Server provides the ability to determine which users are allowed to execute code, such as stored procedures and functions. In many cases, these permissions and the permissions on the database objects are best configured at the schema level rather than at the level of the individual object. Schema-based permission grants can simplify your security architecture. You will explore the granting of permissions at the schema level in the final lesson of this module.
Lessons
• Authorizing User Access to Objects
• Authorizing Users to Execute Code
• Configuring Permissions at the Schema Level
Lab : Authorizing users to access resources
• Granting, Denying, and Revoking Permissions on Objects
• Granting EXECUTE Permissions on Code
• Granting Permissions at the Schema Level
After completing this module, you will be able to:
• Authorize user access to objects.
• Authorize users to execute code.
• Configure permissions at the schema level.
Module 4: Protecting Data with Encryption and Auditing
When configuring security for your Microsoft SQL Server systems, you should ensure that you meet any of your organization’s compliance requirements for data protection. Organizations often need to adhere to industry-specific compliance policies, which mandate auditing of all data access. To address this requirement, SQL Server provides a range of options for implementing auditing. Another common compliance requirement is the encryption of data to protect against unauthorized access in the event that access to the database files is compromised. SQL Server supports this requirement by providing transparent data encryption (TDE). To reduce the risk of information leakage by users with administrative access to a database, columns containing sensitive data—such as credit card numbers or national identity numbers—can be encrypted using the Always Encrypted feature. This module describes the available options for auditing in SQL Server, how to use and manage the SQL Server Audit feature, and how to implement encryption.
Lessons
• Options for auditing data access in SQL Server
• Implementing SQL Server Audit
• Managing SQL Server Audit
• Protecting Data with Encryption
Lab : Using Auditing and Encryption
• Working with SQL Server Audit
• Encrypt a Column as Always Encrypted
• Encrypt a Database using TDE
After completing this module, you will be able to:
• Describe the options for auditing data access.
• Implement SQL Server Audit.
• Manage SQL Server Audit.
• Describe and implement methods of encrypting data in SQL Server.
• Implement encryption
Module 5: Recovery Models and Backup Strategies
One of the most important aspects of a database administrator's role is ensuring that organizational data is reliably backed up so that, if a failure occurs, you can recover the data. Even though the computing industry has known about the need for reliable backup strategies for decades—and discussed this at great length—unfortunate stories regarding data loss are still commonplace. A further problem is that, even when the strategies in place work as they were designed, the outcomes still regularly fail to meet an organization’s operational requirements. In this module, you will consider how to create a strategy that is aligned with organizational needs, based on the available backup models, and the role of the transaction logs in maintaining database consistency.
Lessons
• Understanding Backup Strategies
• SQL Server Transaction Logs
• Planning Backup Strategies
Lab : Understanding SQL Server recovery models
• Plan a Backup Strategy
• Configure Database Recovery Models
After completing this module, you will be able to:
• Describe various backup strategies.
• Describe how database transaction logs function.
• Plan SQL Server backup strategies.
Module 6: Backing Up SQL Server Databases
In the previous module, you learned how to plan a backup strategy for a SQL Server system. You can now learn how to perform SQL Server backups, including full and differential database backups, transaction log backups, and partial backups. In this module, you will learn how to apply various backup strategies.
Lessons
• Backing Up Databases and Transaction Logs
• Managing Database Backups
• Advanced Database Options
Lab : Backing Up Databases
• Backing Up Databases
• Performing Database, Differential, and Transaction Log Backups
• Performing a Partial Backup
After completing this module, you will be able to:
• Perform backups of SQL Server databases and transaction logs.
• Manage database backups.
• Describe advanced backup options.
Module 7: Restoring SQL Server 2016 Databases
In the previous module, you learned how to create backups of Microsoft SQL Server 2016 databases. A backup strategy might involve many different types of backup, so it is essential that you can effectively restore them. You will often be restoring a database in an urgent situation. You must, however, ensure that you have a clear plan of how to proceed and successfully recover the database to the required state. A good plan and understanding of the restore process can help avoid making the situation worse. Some database restores are related to system failure. In these cases, you will want to return the system as close as possible to the state it was in before the failure. Some failures, though, are related to human error and you might wish to recover the system to a point before that error. The point-in-time recovery features of SQL Server 2016 can help you to achieve this. Because they are typically much larger, user databases are more likely to be affected by system failures than system databases. However, system databases can be affected by failures, and special care should be taken when recovering them. In particular, you need to understand how to recover each system database because you cannot use the same process for all system databases. In this module, you will see how to restore user and system databases and how to implement point-in-time recovery.
Lessons
• Understanding the Restore Process
• Restoring Databases
• Advanced Restore Scenarios
• Point-in-Time Recovery
Lab : Restoring SQL Server Databases
• Restoring a Database Backup
• Restring Database, Differential, and Transaction Log Backups
• Performing a Piecemeal Restore
After completing this module, you will be able to:
• Explain the restore process.
• Restore databases.
• Perform advanced restore operations.
• Perform a point-in-time recovery.
Module 8: Automating SQL Server Management
The tools provided by Microsoft SQL Server make administration easy when compared to some other database engines. However, even when tasks are easy to perform, it is common to have to repeat a task many times. Efficient database administrators learn to automate repetitive tasks. This can help to avoid situations where an administrator forgets to execute a task at the required time. Perhaps more importantly, the automation of tasks helps to ensure that they are performed consistently, each time they are executed. This module describes how to use SQL Server Agent to automate jobs, how to configure security contexts for jobs, and how to implement multiserver jobs.
Lessons
• Automating SQL Server management
• Working with SQL Server Agent
• Managing SQL Server Agent Jobs
• Multi-server Management
Lab : Automating SQL Server Management
• Create a SQL Server Agent Job
• Test a Job
• Schedule a Job
• Configure Master and Target Servers
After completing this module, you will be able to:
• Describe methods for automating SQL Server Management.
• Configure jobs, job step types, and schedules.
• Manage SQL Server Agent jobs.
• Configure master and target servers.
Module 9: Configuring Security for SQL Server Agent
Other modules in this course have demonstrated the need to minimize the permissions that are granted to users, following the principle of “least privilege.” This means that users have only the permissions that they need to perform their tasks. The same logic applies to the granting of permissions to SQL Server Agent. Although it is easy to execute all jobs in the context of the SQL Server Agent service account, and to configure that account as an administrative account, a poor security environment would result from doing this. It is important to understand how to create a minimal privilege security environment for jobs that run in SQL Server Agent.
Lessons
• Understanding SQL Server Agent Security
• Configuring Credentials
• Configuring Proxy Accounts
Lab : Configuring Security for SQL Server Agent
• Analyzing Problems in SQL Server Agent
• Configuring a Credential
• Configuring a Proxy Account
• Configuring and testing the Security Context of a Job
After completing this module, you will be able to:
• Explain SQL Server Agent security.
• Configure credentials.
• Configure proxy accounts.
Module 10: Monitoring SQL Server with Alerts and Notifications
One key aspect of managing Microsoft SQL Server in a proactive manner is to make sure you are aware of problems and events that occur in the server, as they happen. SQL Server logs a wealth of information about issues. You can configure it to advise you automatically when these issues occur, by using alerts and notifications. The most common way that SQL Server database administrators receive details of events of interest is by email message. This module covers the configuration of Database Mail, alerts, and notifications for a SQL Server instance, and the configuration of alerts for Microsoft Azure SQL Database.
Lessons
• Monitoring SQL Server Errors
• Configuring Database Mail
• Operators, Alerts, and Notifications
• Alerts in Azure SQL Database
Lab : Monitoring SQL Server with Alerts and Notifications
• Configuring Database Mail
• Configuring Operators
• Configuring Alerts and Notifications
• Testing Alerts and Notifications
After completing this module, you will be able to:
• Monitor SQL Server errors.
• Configure database mail.
• Configure operators, alerts, and notifications.
• Work with alerts in Azure SQL Database.
Module 11: Introduction to Managing SQL Server by using PowerShell
This module looks at how to use Windows PowerShell with Microsoft SQL Server. Businesses are constantly having to increase the efficiency and reliability of maintaining their IT infrastructure; with PowerShell, you can improve this efficiency and reliability by creating scripts to carry out tasks. PowerShell scripts can be tested and applied multiple times to multiple servers, saving your organization both time and money.
Lessons
• Getting Started with Windows PowerShell
• Configure SQL Server using PowerShell
• Administer and Maintain SQL Server with PowerShell
• Managing Azure SQL Databases using PowerShell
Lab : Using PowerShell to Manage SQL Server
• Getting Started with PowerShell
• Using PowerShell to Change SQL Server settings
After completing this module, you will be able to:
• Describe the benefits of PowerShell and its fundamental concepts.
• Configure SQL Server by using PowerShell.
• Administer and maintain SQL Server by using PowerShell.
• Manage an Azure SQL Database by using PowerShell.
Module 12: Tracing Access to SQL Server with Extended events
Monitoring performance metrics provides a great way to assess the overall performance of a database solution. However, there are occasions when you need to perform more detailed analysis of the activity occurring within a Microsoft SQL Server instance—to troubleshoot problems and identify ways to optimize workload performance. SQL Server Extended Events is a flexible, lightweight event-handling system built into the Microsoft SQL Server Database Engine. This module focuses on the architectural concepts, troubleshooting strategies and usage scenarios of Extended Events.
Lessons
• Extended Events Core Concepts
• Working with Extended Events
Lab : Extended Events
• Using the System_Health Extended Events Session
• Tracking Page Splits Using Extended Events
After completing this module, you will be able to:
• Describe Extended Events core concepts.
• Create and query Extended Events sessions.
Module 13: Monitoring SQL Server
The Microsoft SQL Server Database Engine can run for long periods without the need for administrative attention. However, if you regularly monitor the activity that occurs on the database server, you can deal with potential issues before they arise. SQL Server provides a number of tools that you can use to monitor current activity and record details of previous activity. You need to become familiar with what each of the tools does and how to use them. It is easy to become overwhelmed by the volume of output that monitoring tools can provide, so you also need to learn techniques for analyzing their output.
Lessons
• Monitoring activity
• Capturing and Managing Performance Data
• Analyzing Collected Performance Data
• SQL Server Utility
Lab : Monitoring SQL Server
After completing this module, you will be able to:
• Monitor current activity.
• Capture and manage performance data.
• Analyze collected performance data.
• Configure SQL Server Utility.
Module 14: Troubleshooting SQL Server
Database administrators working with Microsoft SQL Server need to adopt the important role of troubleshooter when issues arise—particularly if users of business-critical applications that rely on SQL Server databases are being prevented from working. It is important to have a solid methodology for resolving issues in general, and to be familiar with the most common issues that can arise when working with SQL Server systems.
Lessons
• A Trouble Shooting Methodology for SQL Server
• Resolving Service Related Issues
• Resolving Connectivity and Log-in issues
Lab : Troubleshooting Common Issues
• Troubleshoot and Resolve a SQL Login Issue
• Troubleshoot and Resolve a Service Issue
• Troubleshoot and Resolve a Windows Login Issue
• Troubleshoot and Resolve a Job Execution Issue
• Troubleshoot and Resolve a Performance Issue
After completing this module, you will be able to:
• Describe a troubleshooting methodology for SQL Server.
• Resolve service-related issues.
• Resolve login and connectivity issues.
Module 15: Importing and Exporting Data
While a great deal of data residing in a Microsoft SQL Server system is entered directly by users who are running application programs, there is often a need to move data in other locations, to and from SQL Server. SQL Server provides a set of tools you can use to transfer data in and out. Some of these tools, such as the bcp (Bulk Copy Program) utility and SQL Server Integration Services, are external to the database engine. Other tools, such as the BULK INSERT statement and the OPENROWSET function, are implemented in the database engine. With SQL Server, you can also create data-tier applications that package all the tables, views, and instance objects associated with a user database into a single unit of deployment. In this module, you will explore these tools and techniques so that you can import and export data to and from SQL Server.
Lessons
• Transferring Data to and from SQL Server
• Importing and Exporting Table Data
• Using bcp and BULK INSERT to Import Data
• Deploying and Upgrading Data-Tier Application
Lab : Importing and Exporting Data
• Import and Excel Data Using the Import Wizard
• Import a Delimited Text File Using bcp
• Import a Delimited Text File using BULK INSERT
• Create and Test an SSIS Package to Extract Data
• Deploy a Data-Tier Application
After completing this module, you will be able to:
• Describe tools and techniques for transferring data.
• Import and export table data.
• Use bcp and BULK INSERT to import data.
• Use data-tier applications to import and export database applications.
Prerequisites
In addition to their professional experience, students who attend this training should already have the following technical knowledge:
· Basic knowledge of the Microsoft Windows operating system and its core functionality.
· Working knowledge of Transact-SQL.
· Working knowledge of relational databases.
· Some experience with database design.
Overview
Technology: Windows Server
Level: Intermediate
This Revision: B
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This five-day instructor-led course teaches IT professionals how to deploy and configure Active Directory Domain Services (AD DS) in a distributed environment, how to implement Group Policy, how to perform backup and restore, and how to monitor and troubleshoot Active Directory–related issues with Windows Server 2016. Additionally, this course teaches students how to deploy other Active Directory server roles, such as Active Directory Federation Services (AD FS) and Active Directory Certificate Services (AD CS).
Audience profile
This course is primarily intended for existing IT professionals who have some AD DS knowledge and experience and who aim to develop knowledge about identity and access technologies in Windows Server 2016. This would typically include:
AD DS administrators who are looking to train in identity and access technologies with Windows Server 2012 or Windows Server 2016.
System or infrastructure administrators with general AD DS experience and knowledge who are looking to cross-train in core and advanced identity and access technologies in Windows Server 2012 or Windows Server 2016.
The secondary audience for this course includes IT professionals who are looking to consolidate their knowledge about AD DS and related technologies, in addition to IT professionals who want to prepare for the 70-742 exam.
At course completion
After completing this course, students will be able to:
• Install and configure domain controllers.
• Manage objects in AD DS by using graphical tools and Windows PowerShell.
• Implement AD DS in complex environments.
• Implement AD DS sites, and configure and manage replication.
• Implement and manage Group Policy Objects (GPOs).
• Manage user settings by using GPOs.
• Secure AD DS and user accounts.
• Implement and manage a certificate authority (CA) hierarchy with AD CS.
• Deploy and manage certificates.
• Implement and administer AD FS.
• Implement and administer Active Directory Rights Management Services (AD RMS).
• Implement synchronization between AD DS and Azure AD.
• Monitor, troubleshoot, and establish business continuity for AD DS services.
Course Outline
Module 1: Installing and configuring domain controllers
This module describes the features of AD DS and how to install domain controllers (DCs). It also covers the considerations for deploying DCs.
Lessons
• Overview of AD DS
• Overview of AD DS domain controllers
• Deploying a domain controller
Lab : Deploying and administering AD DS
• Deploying AD DS
• Deploying domain controllers by performing domain controller cloning
• Administering AD DS
After completing this module, students will be able to:
• Describe AD DS and its main components.
• Describe the purpose and roles of domain controllers.
• Describe the considerations for deploying domain controllers.
Module 2: Managing objects in AD DS
This module describes how to use various techniques to manage objects in AD DS. This includes creating and configuring user, group, and computer objects.
Lessons
• Managing user accounts
• Managing groups in AD DS
• Managing computer objects in AD DS
• Using Windows PowerShell for AD DS administration
• Implementing and managing OUs
Lab : Managing AD DS objects
• Creating and managing groups in AD DS
• Creating and configuring user accounts in AD DS
• Managing computer objects in AD DS
Lab : Administering AD DS
• Delegate administration for OUs
• Creating and modifying AD DS objects with Windows PowerShell
After completing this module, students will be able to:
• Manage user accounts in AD DS.
• Manage groups in AD DS.
• Manage computer objects in AD DS.
• Use Windows PowerShell for AD DS administration.
• Implement and manage OUs.
• Administer AD DS.
Module 3: Advanced AD DS infrastructure management
This module describes how to plan and implement an AD DS deployment that includes multiple domains and forests. The module provides an overview of the components in an advanced AD DS deployment, the process of implementing a distributed AD DS environment, and the procedure for configuring AD DS trusts.
Lessons
• Overview of advanced AD DS deployments
• Deploying a distributed AD DS environment
• Configuring AD DS trusts
Lab : Domain and trust management in AD DS
• Implementing forest trusts
• Implementing child domains in AD DS
After completing this module, students will be able to:
• Describe the components of an advanced AD DS deployment.
• Deploy a distributed AD DS environment..
• Configure AD DS trusts.
Module 4: Implementing and administering AD DS sites and replication
This module describes how to plan and implement an AD DS deployment that includes multiple locations. The module explains how replication works in a Windows Server 2016 AD DS environment.
Lessons
• Overview of AD DS replication
• Configuring AD DS sites
• Configuring and monitoring AD DS replication
Lab : Implementing AD DS sites and replication
• Modifying the default site
• Creating additional sites and subnets
• Configuring AD DS replication
• Monitoring and troubleshooting AD DS replication
After completing this module, students will be able to:
• Describe how AD DS replication works.
• Configure AD DS sites to help optimize authentication and replication traffic.
• Configure and monitor AD DS replication.
Module 5: Implementing Group Policy
This module describes how to implement a GPO infrastructure. The module provides an overview of the components and technologies that compose the Group Policy framework.
Lessons
• Introducing Group Policy
• Implementing and administering GPOs
• Group Policy scope and Group Policy processing
• Troubleshooting the application of GPOs
Lab : Implementing a Group Policy infrastructure
• Creating and configuring GPOs
• Managing GPO scope
Lab : Troubleshooting Group Policy infrastructure
• Verify GPO application
• Troubleshooting GPOs
After completing this module, students will be able to:
• Explain what Group Policy is.
• Implement and administer GPOs.
• Describe Group Policy scope and Group Policy processing.
• Troubleshoot GPO application.
Module 6: Managing user settings with Group Policy
This module describes how to configure Group Policy settings and Group Policy preferences. This includes implementing administrative templates, configuring folder redirection and scripts, and configuring Group Policy preferences.
Lessons
• Implementing administrative templates
• Configuring Folder Redirection, software installation, and scripts
• Configuring Group Policy preferences
Lab : Managing user settings with GPOs
• Using administrative templates to manage user settings
• Implement settings by using Group Policy preferences
• Configuring Folder Redirection
• Planning Group Policy (optional)
After completing this module, students will be able to:
• Implement administrative templates.
• Configure Folder Redirection, software installation, and scripts.
• Configure Group Policy preferences.
Module 7: Securing Active Directory Domain Services
This module describes how to configure domain controller security, account security, password security, and Group Managed Service Accounts (gMSA).
Lessons
• Securing domain controllers
• Implementing account security
• Implementing audit authentication
• Configuring managed service accounts
Lab : Securing AD DS
• Implementing security policies for accounts, passwords, and administrative groups
• Deploying and configuring an RODC
• Creating and associating a group MSA
After completing this module, students will be able to:
• Secure domain controllers.
• Implement account security.
• Implement audit authentication.
• Configure managed service accounts (MSAs).
Module 8: Deploying and managing AD CS
This module describes how to implement an AD CS deployment. This includes deploying, administering, and troubleshooting CAs.
Lessons
• Deploying CAs
• Administering CAs
• Troubleshooting and maintaining CAs
Lab : Deploying and configuring a two-tier CA hierarchy
• Deploying an offline root CA
• Deploying an enterprise subordinate CA
After completing this module, students will be able to:
• Deploy CAs.
• Administer CAs.
• Troubleshoot and maintain CAs.
Module 9: Deploying and managing certificates
This module describes how to deploy and manage certificates in an AD DS environment. This involves deploying and managing certificate templates, managing certificate revocation and recovery, using certificates in a business environment, and implementing smart cards.
Lessons
• Deploying and managing certificate templates
• Managing certificate deployment, revocation, and recovery
• Using certificates in a business environment
• Implementing and managing smart cards
Lab : Deploying and using certificates
• Configuring certificate templates
• Enrolling and using certificates
• Configuring and implementing key recovery
After completing this module, students will be able to:
• Deploy and manage certificate templates.
• Manage certificates deployment, revocation, and recovery.
• Use certificates in a business environment.
• Implement and manage smart cards
Module 10: Implementing and administering AD FS
This module describes AD FS and how to configure AD FS in a single-organization scenario and in a partner-organization scenario.
Lessons
• Overview of AD FS
• AD FS requirements and planning
• Deploying and configuring AD FS
• Web Application Proxy Overview
Lab : Implementing AD FS
• Configuring AD FS prerequisites
• Installing and configuring AD FS
• Configuring an internal application for AD
• Configuring AD FS for federated business partners
After completing this module, students will be able to:
• Describe AD FS.
• Explain how to deploy AD FS.
• Explain how to implement AD FS for a single organization.
• Explain how to extend AD FS to external clients.
• Implement single sign-on (SSO) to support online services.
Module 11: Implementing and administering AD RMS
This module describes how to implement an AD RMS deployment. The module provides an overview of AD RMS, explains how to deploy and manage an AD RMS infrastructure, and explains how to configure AD RMS content protection.
Lessons
• Overview of AD RMS
• Deploying and managing an AD RMS infrastructure
• Configuring AD RMS content protection
Lab : Implementing an AD RMS infrastructure
• Installing and configuring AD RMS
• Configuring AD RMS templates
• Using AD RMS on clients
After completing this module, students will be able to:
• Describe AD RMS.
• Deploy and manage an AD RMS infrastructure. .
• Configure AD RMS content protection.
Module 12: Implementing AD DS synchronization with Microsoft Azure AD
This module describes how to plan and configure directory syncing between Microsoft Azure Active Directory (Azure AD) and on-premises AD DS. The modules describes various sync scenarios, such as Azure AD sync, AD FS and Azure AD, and Azure AD Connect.
Lessons
• Planning and preparing for directory synchronization
• Implementing directory synchronization by using Azure AD Connect
• Managing identities with directory synchronization
Lab : Configuring directory synchronization
• Preparing for directory synchronization
• Configuring directory synchronization
• Managing Active Directory users and groups and monitoring directory synchronization
After completing this module, students will be able to:
• Plan and prepare for directory synchronization.
• Implement directory synchronization by using Microsoft Azure Active Directory Connect (Azure AD Connect).
• Manage identities with directory synchronization.
Module 13: Monitoring, managing, and recovering AD DS
This module describes how to monitor, manage, and maintain AD DS to help achieve high availability of AD DS.
Lessons
• Monitoring AD DS
• Managing the Active Directory database
• Active Directory backup and recovery options for AD DS and other identity and access solutions
Lab : Recovering objects in AD DS
• Backing up and restoring AD DS
• Recovering objects in AD DS
After completing this module, students will be able to:
• Monitor AD DS.
• Manage the Active Directory database.
• Describe the backup and recovery options for AD DS and other identity access solutions.
Prerequisites
Before attending this course, students must have:
• Some exposure to and experience with AD DS concepts and technologies in Windows Server 2012 or Windows Server 2016.
• Experience working with and configuring Windows Server 2012 or Windows Server 2016
• Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP).
• Experience working with and an understanding of Microsoft Hyper-V and basic server virtualization concepts.
• An awareness of basic security best practices.
• Hands-on working experience with Windows client operating systems such as Windows 7, Windows 8, Windows 8.1, or Windows 10.
• Basic experience with the Windows PowerShell command-line interface.
Overview
Audience(s): Data Professional
Technology: SQL Server
Level: Advanced
This Revision: A
Length: 5 days
Language(s): English
About this course
The main purpose of the course is to give students the ability to analyze and present data by using Azure Machine Learning, and to provide an introduction to the use of machine learning with big data tools such as HDInsight and R Services.
Audience profile
The primary audience for this course is people who wish to analyze and present data by using Azure Machine Learning.
The secondary audience is IT professionals, Developers and information workers who need to support solutions based on Azure machine learning.
At course completion
After completing this course, students will be able to:
• Explain machine learning, and how algorithms and languages are used
• Describe the purpose of Azure Machine Learning, and list the main features of Azure Machine Learning Studio
• Upload and explore various types of data to Azure Machine Learning
• Explore and use techniques to prepare datasets ready for use with Azure Machine Learning
• Explore and use feature engineering and selection techniques on datasets that are to be used with Azure Machine Learning
• Explore and use regression algorithms and neural networks with Azure Machine Learning
• Explore and use classification and clustering algorithms with Azure Machine Learning
• Use R and Python with Azure Machine Learning, and choose when to use a particular language
• Explore and use hyperparameters and multiple algorithms and models, and be able to score and evaluate models
• Explore how to provide end-users with Azure Machine Learning services, and how to share data generated from Azure Machine Learning models
• Explore and use the Cognitive Services APIs for text and image processing, to create a recommendation application, and describe the use of neural networks with Azure Machine Learning
• Explore and use HDInsight with Azure Machine Learning
• Explore and use R and R Server with Azure Machine Learning, and explain how to deploy and configure SQL Server to support R services
Course Outline
Module 1: Introduction to Machine Learning
This module introduces machine learning and discussed how algorithms and languages are used.
Lessons
• What is machine learning?
• Introduction to machine learning algorithms
• Introduction to machine learning languages
Lab : Introduction to machine Learning
• Sign up for Azure machine learning studio account
• View a simple experiment from gallery
• Evaluate an experiment
After completing this module, students will be able to:
• Describe machine learning
• Describe machine learning algorithms
• Describe machine learning languages
Module 2: Introduction to Azure Machine Learning
Describe the purpose of Azure Machine Learning, and list the main features of Azure Machine Learning Studio.
Lessons
• Azure machine learning overview
• Introduction to Azure machine learning studio
• Developing and hosting Azure machine learning applications
Lab : Introduction to Azure machine learning
• Explore the Azure machine learning studio workspace
• Clone and run a simple experiment
• Clone an experiment, make some simple changes, and run the experiment
After completing this module, students will be able to:
• Describe Azure machine learning.
• Use the Azure machine learning studio.
• Describe the Azure machine learning platforms and environments.
Module 3: Managing Datasets
At the end of this module the student will be able to upload and explore various types of data in Azure machine learning.
Lessons
• Categorizing your data
• Importing data to Azure machine learning
• Exploring and transforming data in Azure machine learning
Lab : Managing Datasets
• Prepare Azure SQL database
• Import data
• Visualize data
• Summarize data
After completing this module, students will be able to:
• Understand the types of data they have.
• Upload data from a number of different sources.
• Explore the data that has been uploaded.
Module 4: Preparing Data for use with Azure Machine Learning
This module provides techniques to prepare datasets for use with Azure machine learning.
Lessons
• Data pre-processing
• Handling incomplete datasets
Lab : Preparing data for use with Azure machine learning
• Explore some data using Power BI
• Clean the data
After completing this module, students will be able to:
• Pre-process data to clean and normalize it.
• Handle incomplete datasets.
Module 5: Using Feature Engineering and Selection
This module describes how to explore and use feature engineering and selection techniques on datasets that are to be used with Azure machine learning.
Lessons
• Using feature engineering
• Using feature selection
Lab : Using feature engineering and selection
• Prepare datasets
• Use Join to Merge data
After completing this module, students will be able to:
• Use feature engineering to manipulate data.
• Use feature selection.
Module 6: Building Azure Machine Learning Models
This module describes how to use regression algorithms and neural networks with Azure machine learning.
Lessons
• Azure machine learning workflows
• Scoring and evaluating models
• Using regression algorithms
• Using neural networks
Lab : Building Azure machine learning models
• Using Azure machine learning studio modules for regression
• Create and run a neural-network based application
After completing this module, students will be able to:
• Describe machine learning workflows.
• Explain scoring and evaluating models.
• Describe regression algorithms.
• Use a neural-network.
Module 7: Using Classification and Clustering with Azure machine learning models
This module describes how to use classification and clustering algorithms with Azure machine learning.
Lessons
• Using classification algorithms
• Clustering techniques
• Selecting algorithms
Lab : Using classification and clustering with Azure machine learning models
• Using Azure machine learning studio modules for classification.
• Add k-means section to an experiment
• Add PCA for anomaly detection.
• Evaluate the models
After completing this module, students will be able to:
• Use classification algorithms.
• Describe clustering techniques.
• Select appropriate algorithms.
Module 8: Using R and Python with Azure Machine Learning
This module describes how to use R and Python with azure machine learning and choose when to use a particular language.
Lessons
• Using R
• Using Python
• Incorporating R and Python into Machine Learning experiments
Lab : Using R and Python with Azure machine learning
• Exploring data using R
• Analyzing data using Python
After completing this module, students will be able to:
• Explain the key features and benefits of R.
• Explain the key features and benefits of Python.
• Use Jupyter notebooks.
• Support R and Python.
Module 9: Initializing and Optimizing Machine Learning Models
This module describes how to use hyper-parameters and multiple algorithms and models, and be able to score and evaluate models.
Lessons
• Using hyper-parameters
• Using multiple algorithms and models
• Scoring and evaluating Models
Lab : Initializing and optimizing machine learning models
• Using hyper-parameters
After completing this module, students will be able to:
• Use hyper-parameters.
• Use multiple algorithms and models to create ensembles.
• Score and evaluate ensembles.
Module 10: Using Azure Machine Learning Models
This module explores how to provide end users with Azure machine learning services, and how to share data generated from Azure machine learning models.
Lessons
• Deploying and publishing models
• Consuming Experiments
Lab : Using Azure machine learning models
• Deploy machine learning models
• Consume a published model
After completing this module, students will be able to:
• Deploy and publish models.
• Export data to a variety of targets.
Module 11: Using Cognitive Services
This module introduces the cognitive services APIs for text and image processing to create a recommendation application, and describes the use of neural networks with Azure machine learning.
Lessons
• Cognitive services overview
• Processing language
• Processing images and video
• Recommending products
Lab : Using Cognitive Services
• Build a language application
• Build a face detection application
• Build a recommendation application
After completing this module, students will be able to:
• Describe cognitive services.
• Process text through an application.
• Process images through an application.
• Create a recommendation application.
Module 12: Using Machine Learning with HDInsight
This module describes how use HDInsight with Azure machine learning.
Lessons
• Introduction to HDInsight
• HDInsight cluster types
• HDInsight and machine learning models
Lab : Machine Learning with HDInsight
• Provision an HDInsight cluster
• Use the HDInsight cluster with MapReduce and Spark
After completing this module, students will be able to:
• Describe the features and benefits of HDInsight.
• Describe the different HDInsight cluster types.
• Use HDInsight with machine learning models.
Module 13: Using R Services with Machine Learning
This module describes how to use R and R server with Azure machine learning, and explain how to deploy and configure SQL Server and support R services.
Lessons
• R and R server overview
• Using R server with machine learning
• Using R with SQL Server
Lab : Using R services with machine learning
• Deploy DSVM
• Prepare a sample SQL Server database and configure SQL Server and R
• Use a remote R session
• Execute R scripts inside T-SQL statements
After completing this module, students will be able to:
• Implement interactive queries.
• Perform exploratory data analysis.
Prerequisites
In addition to their professional experience, students who attend this course should have:
• Programming experience using R, and familiarity with common R packages
• Knowledge of common statistical methods and data analysis best practices.
• Basic knowledge of the Microsoft Windows operating system and its core functionality.
• Working knowledge of relational databases.
Overview
Audience(s): Developers
Technology: SQL Server
Level: Intermediate
This Revision: C
Delivery method: Classroom
Length: 3 days
Language(s): English
About this course
The focus of this 3-day instructor-led course is on creating managed enterprise BI solutions. It describes how to implement both multidimensional and tabular data models and how to create cubes, dimensions, measures, and measure groups. This course helps you prepare for the Exam 70-768.
Audience profile
The primary audience for this course are database professionals who need to fulfil BI Developer role to create enterprise BI solutions.
Primary responsibilities will include:
• Implementing multidimensional databases by using SQL Server Analysis Services
• Creating tabular semantic data models for analysis by using SQL Server Analysis Services
At course completion
After completing this course, students will be able to:
• Describe the components, architecture, and nature of a BI solution
• Create a multidimensional database with Analysis Services
• Implement dimensions in a cube
• Implement measures and measure groups in a cube
• Use MDX syntax
• Customize a cube
• Implement a tabular database
• Use DAX to query a tabular model
• Use data mining for predictive analysis
Course Outline
Module 1: Introduction to Business Intelligence and Data Modeling
This module introduces key BI concepts and the Microsoft BI product suite.
Lessons
• Introduction to Business Intelligence
• The Microsoft business intelligence platform
Lab: Exploring a BI Solution
• Exploring a Data Warehouse
• Exploring a data model
After completing this module, students will be able to:
• Describe BI scenarios, trends, and project roles.
• Describe the products that make up the Microsoft BI platform.
Module 2: Creating Multidimensional Databases
This module describes how to create multidimensional databases using SQL Server Analysis Services.
Lessons
• Introduction to Multidimensional Analysis
• Data Sources and Data Source Views
• Cubes
• Overview of Cube Security
• Configure SSAS
• Monitoring SSAS
Lab: Creating a multidimensional database
• Creating a Data Source
• Creating and Configuring a data Source View
• Creating and Configuring a Cube
• Adding a Dimension to a Cube
After completing this module, you will be able to:
• Describe considerations for a multidimensional database.
• Create data sources and data source views.
• Create a cube
• Implement security in a multidimensional database.
• Configure SSAS to meet requirements including memory limits, NUMA and disk layout.
• Monitor SSAS performance.
Module 3: Working with Cubes and Dimensions
This module describes how to implement dimensions in a cube.
Lessons
• Configuring Dimensions
• Defining Attribute Hierarchies
• Implementing Sorting and Grouping Attributes
• Slowly Changing Dimensions
Lab: Working with Cubes and Dimensions
• Configuring Dimensions
• Defining Relationships and Hierarchies
• Sorting and Grouping Dimension Attributes
After completing this module, you will be able to:
• Configure dimensions.
• Define attribute hierarchies.
• Implement sorting and grouping for attributes.
• Implement slowly changing dimensions.
Module 4: Working with Measures and Measure Groups
This module describes how to implement measures and measure groups in a cube.
Lessons
• Working with Measures
• Working with Measure Groups
Lab: Configuring Measures and Measure Groups
• Configuring Measures
• Defining Regular Relationships
• Configuring Measure Group Storage
After completing this module, you will be able to:
• Configure measures.
• Configure measure groups.
Module 5: Introduction to MDX
This module describes the MDX syntax and how to use MDX.
Lessons
• MDX fundamentals
• Adding Calculations to a Cube
• Using MDX to Query a Cube
Lab: Using MDX
• Querying a cube using MDX
• Adding a Calculated Member
After completing this module, you will be able to:
• Use basic MDX functions.
• Use MDX to add calculations to a cube.
• Use MDX to query a cube.
Module 6: Customizing Cube Functionality
This module describes how to customize a cube.
Lessons
• Implementing Key Performance Indicators
• Implementing Actions
• Implementing Perspectives
• Implementing Translations
Lab: Customizing a Cube
• Implementing an action
• Implementing a perspective
• Implementing a translation
After completing this module, you will be able to:
• Implement KPIs in a Multidimensional database
• Implement Actions in a Multidimensional database
• Implement perspectives in a Multidimensional database
• Implement translations in a Multidimensional database
Module 7: Implementing a Tabular Data Model by Using Analysis Services
This module describes how to implement a tabular data model in Power Pivot.
Lessons
• Introduction to Tabular Data Models
• Creating a Tabular Data Model
• Using an Analysis Services Tabular Data Model in an Enterprise BI Solution
Lab: Working with an Analysis Services Tabular Data Model
• Creating an Analysis Services Tabular Data Model
• Configure Relationships and Attributes
• Configuring Data Model for an Enterprise BI Solution.
After completing this module, students will be able to:
• Describe tabular data models
• Describe how to create a tabular data model
• Use an Analysis Services Tabular Model in an enterprise BI solution
Module 8: Introduction to Data Analysis Expression (DAX)
This module describes how to use DAX to create measures and calculated columns in a tabular data model.
Lessons
• DAX Fundamentals
• Using DAX to Create Calculated Columns and Measures in a Tabular Data Model
Lab: Creating Calculated Columns and Measures by using DAX
• Creating Calculated Columns
• Creating Measures
• Creating a KPI
• Creating a Parent – Child Hierarchy
After completing this module, students will be able to:
• Describe the key features of DAX
• Create calculated columns and measures by using DAX
Module 9: Performing Predictive Analysis with Data Mining
This module describes how to use data mining for predictive analysis.
Lessons
• Overview of Data Mining
• Creating a Custom Data Mining Solution
• Validating a Data Mining Model
• Connecting to and Consuming a Data-Mining Model
• Using the Data Mining add-in for Excel
Lab: Using Data Mining
• Creating a Data Mining Structure and Model
• Exploring Data Mining Models
• Validating Data Mining Models
• Consuming a Data Mining Model
• Using the Excel Data Mining add-in
After completing this module, students will be able to:
• Describe considerations for data mining
• Create a data mining model
• Validate a data mining model
• Connect to a data-mining model
• Use the data mining add-in for Excel
Prerequisites
Before attending this course, students must have:
• Experience of querying data using Transact-SQL
Overview
Technology: Windows Server
Level: Advanced
This Revision: C
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This five-day, instructor-led course teaches IT professionals how they can enhance the security of the IT infrastructure that they administer. This course begins by emphasizing the importance of assuming that network breaches have occurred already, and then teaches you how to protect administrative credentials and rights to help ensure that administrators can perform only the tasks that they need to, when they need to.
This course explains how you can use auditing and the Advanced Threat Analysis feature in Windows Server 2016 to identify security issues. You will also learn how to mitigate malware threats, secure your virtualization platform, and use deployment options such as Nano server and containers to enhance security. The course also explains how you can help protect access to files by using encryption and dynamic access control, and how you can enhance your network’s security.
Audience profile
This course is for IT professionals who need to securely administer Windows Server 2016 networks. These professionals typically work with networks that are configured as Windows Server domain-based environments, with managed access to the internet and cloud services.
Students who seek certification in the 70-744 Securing Windows server exam also will benefit from this course.
At course completion
After completing this course, students will be able to:
• Secure Windows Server.
• Protect credentials and implement privileged access workstations.
• Limit administrator rights with Just Enough Administration.
• Manage privileged access.
• Mitigate malware and threats.
• Analyze activity with advanced auditing and log analytics.
• Deploy and configure Advanced Threat Analytics and Microsoft Operations Management Suite.
• Configure Guarded Fabric virtual machines (VMs).
• Use the Security Compliance Toolkit (SCT) and containers to improve security.
• Plan and protect data.
• Optimize and secure file services.
• Secure network traffic with firewalls and encryption.
• Secure network traffic by using DNSSEC and Message Analyzer.
Course Outline
Module 1: Attacks, breach detection, and Sysinternals tools
This module frames the course so that students are thinking about security in environments where the infrastructure’s basis is predominantly Microsoft products. The module begins with teaching students about the “assume breach” philosophy and getting them to understand the different types of attacks that can occur, including attack timelines and vectors. Additionally, it gets students thinking about key resources, how they respond when they detect an incident, and how an organization’s direct needs and legislative requirements dictate its security policy.
Lessons
• Understanding attacks
• Detecting security breaches
• Examining activity with the Sysinternals tools
Lab : Basic breach detection and incident response strategies
• Identifying attack types
• Exploring Sysinternals tools
After completing this module, students will be able to:
• Describe the types of attacks that can occur.
• Explain how to detect security breaches.
• Explain how to examine activity by using the Sysinternals suite of tools.
Module 2: Protecting credentials and privileged access
This module covers user accounts and rights, computer and service accounts, credentials, Privileged Access Workstations, and the Local Administrator Password Solution. In this module, students will learn about configuring user rights and security options, protecting credentials by using Credential Guard, implementing Privileged Access Workstations, and managing and deploying Local Administrator Password Solution to manage local administrator account passwords.
Lessons
• Understanding user rights
• Computer and service accounts
• Protecting credentials
• Privileged Access Workstations and jump servers
• Local administrator password solution
Lab : Implementing user rights, security options, and group managed service accounts
• Configuring user rights and account-security options
• Delegating privileges
• Creating group Managed Service Accounts
• Locating problematic accounts
Lab : Configuring and deploying LAPs
• Installing and configuring LAPs
• Deploying and testing LAPs
After completing this module, students will be able to:
• Configure user rights.
• Implement computer and service accounts.
• Protect credentials.
• Describe how to configure Privileged Access Workstations and jump servers.
• Configure the Local Administrator Password Solution (LAPS).
Module 3: Limiting administrator rights with Just Enough Administration
This module explains how to deploy and configure Just Enough Administration (JEA), which is an administrative technology that allows students to apply role-based access control (RBAC) principles through Windows PowerShell remote sessions.
Lessons
• Understanding JEA
• Verifying and deploying JEA
Lab : Limiting administrator privileges with JEA
• Creating a role-capability file
• Creating a session-configuration file
• Creating a JEA endpoint
• Connecting and testing a JEA endpoint
• Deploying a JEA configuration to another computer
After completing this module, students will be able to:
• Understand JEA.
• Verify and deploy JEA.
Module 4: Privileged access management and administrative forests
This module explains the concepts of Enhanced Security Administrative Environment (ESAE) forests, Microsoft Identity Manager (MIM), and Just In Time (JIT) Administration, or Privileged Access Management (PAM).
Lessons
• ESAE forests
• Overview of Microsoft Identity Manager
• Overview of JIT administration and PAM
Lab : Limiting administrator privileges with PAM
• Layered approach to security
• Configuring trust relationships and shadow principals
• Requesting privileged access
• Managing PAM roles
After completing this module, students will be able to:
• Describe ESAE forests.
• Describe MIM.
• Understand JIT administration and PAM.
Module 5: Mitigating malware and threats
This module explains how to use tools such as Windows Defender, Windows AppLocker, Microsoft Device Guard, Windows Defender Application Guard, and Windows Defender Exploit Guard.
Lessons
• Configuring and managing Windows Defender
• Restricting software
• Configuring and using the Device Guard feature
Lab : Securing applications with Windows Defender, AppLocker, and Device Guard Rules
• Configuring Windows Defender
• Configuring AppLocker
• Configuring Device Guard
After completing this module, students will be able to:
• Configure and manage Windows Defender.
• Use software restriction policies and AppLocker.
• Configure and use the Device Guard feature.
Module 6: Analyzing activity with advanced auditing and log analytics
This module provides an overview of auditing, and then goes into detail about how to configure advanced auditing and Windows PowerShell auditing and logging.
Lessons
• Overview of auditing
• Advanced auditing
• Windows PowerShell auditing and logging
Lab : Configuring advanced auditing
• Configuring the auditing of file system access
• Auditing domain sign-ins
• Managing advanced audit policy configuration
• Windows PowerShell logging and auditing
After completing this module, students will be able to:
• Describe auditing.
• Understand advanced auditing.
• Configure Windows PowerShell auditing and logging.
Module 7: Deploying and configuring Advanced Threat Analytics and Microsoft Operations Management Suite
This module explains the Microsoft Advanced Threat Analytics tool and the Microsoft Operations Management suite (OMS). It also explains how you can use them to monitor and analyse the security of a Windows Server deployment. You will also learn about Microsoft Azure Security Center, which allows you to manage and monitor the security configuration of workloads both on-premises and in the cloud.
Lessons
• Deploying and configuring ATA
• Deploying and configuring Microsoft Operations Management Suite
• Deploying and configuring Azure Security Center
Lab : Deploying ATA, Microsoft Operations Management Suite, and Azure Security Center
• Preparing and deploying ATA
• Preparing and deploying Microsoft Operations Management Suite
• Deploying and configuring Azure Security Center
After completing this module, students will be able to:
• Deploy and configure ATA.
• Deploy and configure Microsoft Operations Management Suite.
• Deploy and configure Azure Security Center.
Module 8: Secure Virtualization Infrastructure
This module explains how to configure Guarded Fabric VMs, including the requirements for shielded and encryption-supported VMs.
Lessons
• Guarded fabric
• Shielded and encryption-supported virtual machines
Lab : Guarded fabric with Admin-trusted attestation and shielded VMs
• Deploying a guarded fabric with admin-trusted attestation
• Deploying a shielded VM
After completing this module, students will be able to:
• Configure the guarded fabric.
• Describe shielded and encryption-supported VMs.
Module 9: Securing application development and server-workload infrastructure
This module describes the SCT, which is a free, downloadable set of tools that you can use to create and apply security settings. You will also learn about improving platform security by reducing the size and scope of application and compute resources by containerizing workloads.
Lessons
• Using SCT
• Understanding containers
Lab : Using SCT
• Configuring a security baseline for Windows Server 2016
• Deploying the security baseline for Windows Server 2016
Lab : Deploying and configuring containers
• Deploying and managing a Windows container
After completing this module, students will be able to:
• Install SCT, and create and deploy security baselines.
• Configure Windows and Hyper-V containers in Windows Server 2016.
Module 10: Planning and protecting data
This module explains how to configure Encrypting File System (EFS) and BitLocker drive encryption to protect data at rest. You will also learn about extending protection into the cloud by using Azure Information Protection.
Lessons
• Planning and implementing encryption
• Planning and implementing BitLocker
• Protecting data by using Azure Information Protection
Lab : Protecting data by using encryption and BitLocker
• Encrypting and recovering access to encrypted files
• Using BitLocker to protect data
After completing this module, students will be able to:
• Plan and implement encryption.
• Plan and implement BitLocker.
• Plan and implement Azure Information Protection.
Module 11: Optimizing and securing file services
This module explains how to optimize file services by configuring File Server Resource Manager (FSRM) and Distributed File System (DFS). Students also will learn how to manage access to shared files by configuring Dynamic Access Control (DAC).
Lessons
• File Server Resource Manager
• Implementing classification and file management tasks
• Dynamic Access Control
Lab : Quotas and file screening
• Configuring File Server Resource Manager quotas
• Configuring file screening and storage reports
Lab : Implementing Dynamic Access Control
• Preparing for implementing Dynamic Access Control
• Implementing Dynamic Access Control
• Validating and remediating Dynamic Access Control
After completing this module, students will be able to:
• Describe File Server Resource Manager.
• Implement classification and file management tasks.
• Implement Dynamic Access Control.
Module 12: Securing network traffic with firewalls and encryption
This module explains how you can use Windows Firewall as an important part of an organization’s protection strategy. It explains the use of Internet Protocol security (IPsec) to encrypt network traffic and to establish security zones on your network. You will also learn about the Datacenter Firewall feature that you can use to help protect your on-premises virtual environments.
Lessons
• Understanding network-related security threats
• Understanding Windows Firewall with Advanced Security
• Configuring IPsec
• Datacenter Firewall
Lab : Configuring Windows Firewall with Advanced Security
• Creating and testing inbound rules
• Creating and testing outbound rules
• Creating and testing connection security rules
After completing this module, students will be able to:
• Describe network-related security threats and how to mitigate them.
• Configure Windows Firewall with Advanced Security.
• Configure IPsec.
• Describe Datacenter Firewall.
Module 13: Securing network traffic
This module explores some of the Windows Server 2016 technologies that you can use to help mitigate network-security threats. It explains how you can configure DNSSEC to help protect network traffic, and use Microsoft Message Analyzer to monitor network traffic. The module also describes how to secure Server Message Block (SMB) traffic.
Lessons
• Configuring advanced DNS settings
• Examining network traffic with Message Analyzer
• Securing and analyzing SMB traffic
Lab : Securing DNS
• Configuring and testing DNSSEC
• Configuring DNS policies and RRL
Lab : Microsoft Message Analyzer and SMB encryption
• Installing and using the Message Analyzer
• Configuring and verifying SMB encryption on SMB shares
After completing this module, students will be able to:
• Configure advanced DNS settings.
• Use the Message Analyzer.
• Secure SMB traffic.
Prerequisites
Students should have at least two years of experience in the IT field and should have:
• Completed courses 740, 741, and 742, or the equivalent.
• A solid, practical understanding of networking fundamentals, including TCP/IP, User Datagram Protocol (UDP), and Domain Name System (DNS).
• A solid, practical understanding of Active Directory Domain Services (AD DS) principles.
• A solid, practical understanding of Microsoft Hyper-V virtualization fundamentals.
• An understanding of Windows Server security principles.
Visão Global
A segurança da informação é a proteção das informações de uma grande variedade de ameaças com o objetivo de assegurar a continuidade do negócio, minimizar o risco do negócio e maximizar o retorno sobre os investimentos e as oportunidades de negócios.
A segurança das informações vem ganhando importância no mundo da Tecnologia da Informação (TI). A globalização da economia está gerando uma troca cada vez maior de informações entre as organizações (seus funcionários, clientes e fornecedores) bem como uma explosão no uso de computadores em rede e dispositivos de informática.
A norma internacional para Gerenciamento de Segurança da Informação ISO/IEC 27001, é uma norma amplamente respeitada e consultada e fornece uma estrutura para a organização e o gerenciamento de um programa de segurança das informações. A implementação de um programa com base nesta norma será muito útil para o objetivo de uma organização de atender a muitas das necessidades apresentadas no complexo ambiente operacional da atualidade. Uma compreensão categórica desta norma é importante para o desenvolvimento pessoal de todos os profissionais de segurança das informações.
Nos módulos de Segurança da Informação do EXIN, utiliza-se a seguinte definição: A Segurança da Informação lida com a definição, a implementação, a manutenção, a conformidade e a avaliação de um conjunto coerente de controles (medidas) que garantam a disponibilidade, a integridade e a confidencialidade da fonte de informações (manual e automática).
No EXIN Information Security Foundation baseado na ISO/IEC 27001 são testados os conceitos básicos de segurança da informação e suas relações. Um dos objetivos desse módulo é aumentar a conscientização de que as informações são valiosas e vulneráveis e aprender quais medidas são necessárias para protegê-las.
Público Alvo
Qualquer pessoa na organização que manuseia informações. É também aplicável a proprietários de pequenas empresas a quem alguns conceitos básicos de Segurança da Informação são necessários. Este módulo pode ser um excelente ponto de partida para novos profissionais de segurança da informação.
Carga:
16h
Conteúdo
1. Informação e segurança
1.1 O conceito de informação
1.2 Valor da informação
1.3 Aspectos de confiabilidade
2. Ameaças e riscos
2.1 Ameaças e riscos
2.2 Relacionamento entre ameaças, riscos e confiabilidade da informação
3. Abordagem e organização
3.1 Política de segurança e organização de segurança
3.2 Componentes da organização da segurança
3.3 Gerenciamento de incidentes
4. Medidas
4.1 Importância de medidas de segurança
4.2 Medidas físicas
4.3 Medidas técnicas
4.4 Medidas organizacionais
5. Legislação e regulamentação
5.1 Legislação e regulamentação
Visão Global
Onde quer que os dados pessoais sejam coletados, armazenados, usados e, finalmente, excluídos ou destruídos, surgem preocupações de privacidade. Com o Regulamento Geral de Proteção de Dados da UE (GDPR), o Conselho da União Europeia tenta reforçar e unificar a proteção de dados para todos os indivíduos da União Europeia (UE). Este regulamento afeta todas as organizações que processam os dados pessoais de cidadãos da EU e tem efeitos além destas fronteiras. O PDPF abrange os principais assuntos relacionados ao GDPR e tem sido usado como um guia para diversos países fora da UE em fase de elaboração das suas próprias leis.
Público Alvo
Todos os colaboradores precisam ter uma compreensão da proteção de dados e dos requisitos legais, conforme definido no GDPR. As seguintes funções mais específicas podem se interessar:
DPO (Diretor de Proteção de Dados), Privacy Officer (Diretor de Privacidade), Legal Officer / Compliance Officer (Diretor Jurídico / Diretor de Conformidade), Security Officer (Diretor de Segurança), Business Continuity Manager (Gerente de Continuidade de Negócios).
Carga
16h
Conteúdo
1. Fundamentos e regulamentação de Privacidade e Proteção de Dados
1.1 Definições
1.2 Dados Pessoais
1.3 Fundamentos legítimos e limitação de propósito
1.4 Requisitos adicionais para processamento legítimo de dados pessoais
1.5 Direitos do titular dos dados
1.6 Violação de dados e procedimentos relacionados
2. Organizando a proteção de dados
2.1 Importância da proteção de dados para a organização
2.2 Autoridade Fiscalizadora
2.3 Transferência de dados pessoais para outros países
2.4 Regras Corporativas compulsórias e proteção de dados em contratos
3. Práticas de Proteção de Dados
3.1 Proteção de Dados by design e por padrão
3.2 Avaliação de Impacto sobre a Proteção de Dados
(DPIA)
3.3 Aplicações práticas relacionadas ao uso de dados, marketing e mídias sociais
Visão Global
Com a explosão cada vez maior de informações que inundam a internet, todas as empresas devem planejar como gerenciar e proteger a privacidade das pessoas e seus dados. Não é à toa que muitas novas leis - na UE, assim como nos EUA e em muitas outras regiões - estão sendo formuladas para a sua regulação.
Recentemente, a Comissão Europeia publicou o General Data Protection Regulation (GDPR) na UE, o que significa que todas as organizações envolvidas devem cumprir regras específicas. Esta certificação de nível Practitioner é baseada nos temas abordados pelo exame Foundation, enfocando o desenvolvimento e a implementação de políticas e procedimentos para o cumprimento da legislação nova e da já existente, aplicação de diretrizes e melhores práticas para privacidade e proteção de dados e estabelecimento de um Sistema de Gestão de Proteção de Dados e Privacidade.
Público Alvo
Esta certificação em nível Practitioner será particularmente útil para Data Protection Officers (DPOs) ou “Encarregados pelo Tratamento de Dados Pessoais” em uma organização / Privacy Officers, Legal/Compliance Officers, Security Officers, Gerentes de Continuidade de Negócios, Controladores dos Dados, Auditores de Proteção de Dados (internos e externos), Analistas de Privacidade e gerentes de RH.
Uma vez que esta é uma certificação de nível avançado, a aprovação prévia no EXIN Data & Protection Foundation é altamente recomendada.
Carga
24h
Conteúdo
1. Políticas de proteção de dados
1.1 Objetivo das políticas de proteção de dados/privacidade em uma organização.
1.2 Conceitos de proteção de dados desde a concepção (by design) e por padrão (by default).
2. Gerenciando e organizando a proteção de dados
2.1 Aplicar as fases do Sistema de Gestão de Proteção de Dados (DPMS).
2.2 Aplicar a teoria de um plano de ação para conscientização sobre a proteção de dados.
3. Papéis do Controlador, Processador e Data Protection Officer (DPO)
3.1 Implementar os papéis do controlador e processador de dados.
3.2 Estabelecer o papel e as responsabilidades de um DPO.
4. Avaliação de Impacto sobre a Proteção de Dados (AIPD)
4.1 Aplicar os critérios para uma AIPD.
4.2 Aplicar as etapas de uma AIPD.
5. Violação de dados, notificação e resposta a incidentes.
5.1 Aplicar os requisitos do GDPR em relação a violações de dados pessoais.
5.2 Aplicar os requisitos para notificação.
Visão Global
Onde quer que os dados pessoais sejam coletados, armazenados, usados e, finalmente, excluídos ou destruídos, surgem preocupações de privacidade. Com a Lei Geral de Proteção de Dados (LGPD), o Congresso Brasileiro tenta reforçar e unificar a proteção de dados para todos os indivíduos dentro do Brasil. Este regulamento afeta todas as organizações que processam os dados pessoais de cidadãos do Brasil e tem efeitos além destas fronteiras. O exame EXIN Privacy & Data Protection Essentials abrange os principais assuntos relacionados à LGPD.
Público Alvo
Todos os colaboradores que precisam ter uma compreensão da proteção de dados e dos requisitos legais brasileiros, conforme definido na LGPD. O exame Essentials é extremamente recomendável para todos que precisam conhecer ou estar atualizados quanto à privacidade e proteção de dados de acordo com a lei local.
Carga
8h
Conteúdo
1. Fundamentos e regulamentação de privacidade e proteção de dados
1.1 Definições
1.2 Dados pessoais
1.3 Fundamentos legítimos e limitação de propósito
1.4 Requisitos adicionais para processamento legítimo de dados pessoais
1.5 Direitos do titular dos dados
1.6 Violação de dados e procedimentos relacionados
2. Organizando a proteção de dados
2.1 Importância da proteção de dados para a organização
2.2 Autoridade Nacional de Proteção de Dados (ANPD)
2.3 Transferência de dados pessoais para outros países
2.4 Normas Corporativas Globais e proteção de dados em contratos
3. Práticas de proteção de dados
3.1 Proteção de dados desde a concepção (by design) e por padrão
3.2 Relatório de impacto sobre a proteção de dados (RIPD)
3.3 Aplicações práticas relacionadas ao uso de dados, marketing e mídias sociais
Overview
Audience(s): IT Professionals
Technology: Windows Server
Level: Advanced
This Revision: C
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This course provides students with the fundamental knowledge and skills to use Windows PowerShell for administering and automating administration of Windows servers. This course provides students the skills to identify and build the command they require to perform a specific task. In addition, students learn how to build scripts to accomplish advanced tasks such as automating repetitive tasks and generating reports. This course provides prerequisite skills supporting a broad range of Microsoft products, including Windows Server, Windows Client, Microsoft Exchange Server, Microsoft SharePoint Server, Microsoft SQL Server, System Center, and more. In keeping with that goal, this course will not focus on any one of those products, although Windows Server, which is the common platform for all of those products, will serve as the example for the techniques this course teaches.
Audience profile
This course is intended for IT Professionals who are already experienced in general Windows Server and Windows Client administration, and who want to learn more about using Windows PowerShell for administration. No prior experience with any version of Windows PowerShell, or any scripting language, is assumed. This course is also suitable for IT Professionals already experienced in server administration, including Exchange Server, SharePoint Server, SQL Server, System Center, and others.
At course completion
After completing this course, students will be able to:
• Describe the functionality of Windows PowerShell and use it to run and find basic commands.
• Identify and run cmdlets for server administration.
• Work with Windows PowerShell pipeline.
• Describe the techniques Windows PowerShell pipeline uses.
• Use PSProviders and PSDrives to work with other forms of storage.
• Query system information by using WMI and CIM.
• Work with variables, arrays, and hash tables.
• Write basic scripts in Windows PowerShell.
• Write advanced scripts in Windows PowerShell.
• Administer remote computers.
• Use background jobs and scheduled jobs.
• Use advanced Windows PowerShell techniques.
Course Outline
Module 1: Getting started with Windows PowerShell
This module will introduce you to Windows PowerShell and provide an overview of the product’s functionality. The module shows you how to open and configure the shell for use and how to run commands within the shell. The module also introduces the built-in Help system in Windows PowerShell.
Lessons
• Overview and background of Windows PowerShell
• Understanding command syntax
• Finding commands
Lab : Configuring Windows PowerShell
• Configuring the Windows PowerShell console
• Configuring the Windows PowerShell ISE application
Lab : Finding and running basic commands
• Finding commands
• Running commands
• Using the About files
After completing this module, students will be able to:
• Open and configure Windows PowerShell.
• Find and run Windows PowerShell commands.
• Run commands by using the correct command and parameter syntax.
Module 2: Cmdlets for administration
This module introduces you to the cmdlets commonly used for administration. While you can search for cmdlets each time you need to accomplish a task, it is more efficient to have at least a basic understanding of the cmdlets available for system administration.
Lessons
• Active Directory administration cmdlets
• Network configuration cmdlets
• Other server administration cmdlets
Lab : Windows Administration
• Creating and managing Active Directory objects
• Configuring network settings on Windows Server
• Creating a web site
After completing this module, students will be able to:
• Identify and use cmdlets for Active Directory administration.
• Identify and use cmdlets for network configuration.
• Identify and use cmdlets for other server administration tasks.
Module 3: Working with the Windows PowerShell pipeline
This module introduces the pipeline feature of Windows PowerShell. Although the pipeline feature is included in several command-line shells such as the command prompt in the Windows operating system, the pipeline feature in Windows PowerShell provides more complex, more flexible, and more capable functionalities compared to other shells. This module provides you with the skills and knowledge that will help you use the shell more effectively and efficiently.
Lessons
• Understanding the pipeline
• Selecting, sorting, and measuring objects
• Filtering objects out of the pipeline
• Enumerating objects in the pipeline
• Sending pipeline data as output
Lab : Using the pipeline
• Selecting, sorting, and displaying data
Lab : Filtering objects
• Filtering objects
Lab : Enumerating objects
• Enumerating objects
Lab : Sending output to a file
• Exporting user information to a file
After completing this module, students will be able to:
• Describe the purpose of the Windows PowerShell pipeline.
• Select, sort, and measure objects in the pipeline.
• Filter objects out of the pipeline.
• Enumerate objects in the pipeline.
• Send output consisting of pipeline data.
Module 4: Understanding how the pipeline works
This module shows you how Windows PowerShell passes objects from one command to another in the pipeline. The shell provides two techniques that you can use. Knowing how these techniques work, and which one will be used in a given scenario, lets you construct more useful and complex command lines.
Lessons
• Passing the pipeline data
• Advanced considerations for pipeline data
Lab : Working with pipeline parameter binding
• Predicting pipeline behaviour
After completing this module, students will be able to:
• Pass data by using the ByValue technique.
• Describe the advanced techniques for passing pipeline data.
Module 5: Using PSProviders and PSDrives
This module introduces the PSProviders and PSDrives adapters. A PSProvider is basically a Windows PowerShell adapter that makes some form of storage resemble a disk drive. A PSDrive is an actual connection to a form of storage. You can use these two adapters to work with various forms of storage by using the same commands and techniques that you use to manage the file system.
Lessons
• Using PSProviders
• Using PSDrives
Lab : Using PSProviders and PSDrives
• Creating files and folders on a remote computer
• Creating a registry key for your future scripts
• Create a new Active Directory group
After completing this module, students will be able to:
• Use PSProviders.
• Use PSDrives.
Module 6: Querying system information by using WMI and CIM
This module introduces you to two parallel technologies: Windows Management Instrumentation (WMI) and Common Information Model (CIM). Both these technologies provide local and remote access to a repository of management information including access to robust information available from the operating system, computer hardware, and installed software.
Lessons
• Understanding WMI and CIM
• Querying data by using WMI and CIM
• Making changes with WMI/CIM
Lab : Working with WMI and CIM
• Querying information by using WMI
• Querying information by using CIM
• Invoking methods
After completing this module, students will be able to:
• Explain the differences between Common Information Model (CIM) and Windows Management Instrumentation (WMI).
• Query management information by using CIM and WMI.
• Invoke methods by using CIM and WMI.
Module 7: Working with variables, arrays, and hash tables
This module provides you the skills and knowledge required to use variables, arrays, and hash tables in Windows PowerShell.
Lessons
• Using variables.
• Manipulating variables.
• Manipulating arrays and hash tables.
Lab : Working with variables
• Working with variable types
• Using arrays
• Using hash tables
After completing this module, students will be able to:
• Assign a value to variables.
• Describe how to manipulate variables.
• Describe how to manipulate arrays and hash tables.
Module 8: Basic scripting
This module shows you how to package a Windows PowerShell command in a script. Scripts allow you to perform repetitive tasks and more complex tasks than cannot be accomplished in a single command.
Lessons
• Introduction to scripting
• Scripting constructs
• Importing data from files
Lab : Basic scripting
• Setting a script
• Processing an array with a ForEach loop
• Processing items by using If statements
• Creating a random password
• Creating users based on a CSV file
After completing this module, students will be able to:
• Run a Windows PowerShell script.
• Use Windows PowerShell scripting constructs.
• Import data from a file.
Module 9: Advanced scripting
This module introduces you to more advanced techniques that you can use in scripts. These techniques includes gathering user input, reading input from files, documenting scripts with help information and error handling.
Lessons
• Accepting user input
• Overview of script documentation
• Troubleshooting and error handling
• Functions and modules
Lab : Accepting data from users
• Querying disk information from remote computers
• Updating the script to use alternate credentials
• Documenting a script
Lab : Implementing functions and modules
• Creating a logging function
• Adding error handling to a script
• Converting a function to a module
After completing this module, students will be able to:
• Accept user input for a script.
• Explain script documentation.
• Implement error handling for a script.
• Explain functions and modules.
Module 10: Administering Remote Computers
This module introduces you to the Windows PowerShell remoting technology that enables you to connect to one or more remote computers and instruct them to run commands on your behalf.
Lessons
• Using basic Windows PowerShell remoting
• Using advanced Windows PowerShell remoting techniques
• Using PSSessions
Lab : Using basic remoting
• Enabling remoting on the local computer
• Performing one-to-one remoting
• Performing one-to-many remoting
Lab : Using PSSessions
• Using implicit remoting
• Managing multiple computers
After completing this module, students will be able to:
• Describe remoting architecture and security.
• Use advanced remoting techniques.
• Create and manage persistent remoting sessions.
Module 11: Using background jobs and scheduled jobs
This module provides information about the job features of Windows PowerShell. Jobs are an extension point in Windows PowerShell, and there are many different kinds of jobs. Each kind of job can work slightly differently, and has different capabilities.
Lessons
• Using background jobs
• Using scheduled jobs
Lab : Using background jobs and scheduled jobs
• Starting and managing jobs
• Creating a scheduled job
After completing this module, students will be able to:
• Create and manage background jobs.
• Create and manage scheduled jobs.
Module 12: Using advanced Windows PowerShell techniques
This module covers several advanced Windows PowerShell techniques and features. Many of these techniques and features extend functionality that you have learned about in previous modules. Some of these techniques are new and provide additional capabilities.
Lessons
• Creating profile scripts
• Using advanced techniques
Lab : Practicing advanced techniques
• Creating a profile script
• Verifying the validity of an IP address
• Reporting disk information
• Configuring NTFS permissions
• Creating user accounts with passwords from a CSV file
Lab : Practicing script development (optional)
• TBA
• TBA
• TBA
After completing this module, students will be able to:
• Create and manage profile scripts.
• Use advanced techniques to work with data.
Prerequisites
• Experience with Windows networking technologies and implementation.
• Experience with Windows Server administration, maintenance, and troubleshooting.
• Experience with Windows Client administration, maintenance, and troubleshooting
• Students who attend this training can meet the prerequisites by obtaining equivalent knowledge and skills through practical experience as a Windows system administrator. No prerequisite courses are required.
Overview
Technology: SharePoint Server
Level: Intermediate
This Revision: A
Delivery method: Classroom
Length: 5 days
Language(s): English
Tecnologia: SharePoint Server
Nível: Intermediário
Esta revisão: UMA
Método de Entrega: Sala de aula
Carga: 5 dias
Língua(s): Inglês
About this course
This five-day course will provide you with the knowledge and skills to plan and administer a Microsoft SharePoint 2016 environment. The course teaches you how to deploy, administer, and troubleshoot your SharePoint environment. This course also provides guidelines, best practices, and considerations that help you optimize your SharePoint deployment.
This is the first in a sequence of two courses for IT professionals and is aligned with the SharePoint 2016 IT Pro certification.
Audience profile
The course is targeted at experienced IT professionals who are interested in learning how to install, configure, deploy, and manage SharePoint 2016 installations either in a data center or in the cloud.
Students typically have more than one year of hands-on experience* with planning and maintaining SharePoint and two years’ experience with other core technologies on which SharePoint depends, including Windows Server 2012 R2 or later, Internet Information Services (IIS), Microsoft SQL Server 2014 or later, Active Directory Domain Services (AD DS), and networking infrastructure services.
The minimally qualified candidate typically:
• Is an IT professional who plans, implements, and maintains a multi-server deployment of SharePoint 2016.
• Has a working knowledge of, and preferably hands-on experience, with SharePoint Online.
• Has broad familiarity with SharePoint workloads.
• Has experience with business continuity management, including data backup, restoration, and high availability.
• Has experience with authentication and security technologies.
• Has experience with Windows PowerShell.
* The hands-on experience or job experience should be from a solutions-based role where the candidate has worked on multiple solutions in the SharePoint space that includes document management, content management, and search.
At course completion
After completing this course, students will be able to:
• Describe the key features of SharePoint 2016.
• Design an information architecture for a SharePoint 2016 deployment.
• Design a logical architecture for a SharePoint 2016 deployment.
• Design the physical architecture for a SharePoint 2016 deployment.
• Install and configure SharePoint 2016.
• Create and configure web applications and site collections.
• Plan and configure service applications for a SharePoint 2016 deployment.
• Manage users and permissions, and secure content in a SharePoint 2016 deployment.
• Configure authentication in a SharePoint 2016 deployment.
• Configure platform and farm-level security in a SharePoint 2016 deployment.
• Manage information taxonomy in SharePoint web applications and site collections.
• Configure and manage user profiles and audiences.
• Configure and manage the search experience in SharePoint 2016.
• Monitor, maintain, and troubleshoot a SharePoint 2016 deployment.
Course Outline
Module 1: Introducing SharePoint 2016
This module describes the structure and capabilities of a SharePoint environment, and the major changes for IT professionals in SharePoint 2016. This module also describes the options available for deploying SharePoint 2016.
Lessons
• Key components of a SharePoint deployment
• New features in SharePoint 2016
• SharePoint 2016 deployment options
After completing this module, students will be able to:
• Identify the architecture and capabilities of SharePoint 2016.
• Identify new and deprecated features in SharePoint 2016.
• Identify deployment options for SharePoint 2016.
Module 2: Designing an information architecture
This module describes how to gather business requirements, and the key elements of a successful information architecture project. This module also explains how to structure information within a SharePoint 2016 deployment and make it easy to find and retrieve.
Lessons
• Identifying business requirements
• Understanding business requirements
• Organizing information in SharePoint 2016
• Planning for discoverability
Lab : Designing an information architecture - Part one
• Identifying site columns and content types
Lab : Creating an information architecture - Part two
• Designing a business taxonomy
After completing this module, students will be able to:
• Explain how understanding business requirements drives the design of an organizational information architecture.
• Describe the key components available in SharePoint 2016 to deploy an information architecture.
• Plan for discoverability as part of an information architecture deployment.
Module 3: Designing a logical architecture
This module explains how to approach a logical architecture design and how to document it.
Lessons
• Overview of the SharePoint 2016 logical architecture
• Documenting your logical architecture
Lab : Designing a logical architecture
• Planning a logical architecture
• Producing a logical architecture diagram
After completing this module, students will be able to:
• Map business requirements to SharePoint 2016 architecture components.
• Explain the importance of documentation and describe the options for documenting the logical architecture.
Module 4: Designing a physical architecture
This module describes the physical design requirements for SharePoint 2016, and the physical components necessary to fulfill the physical architecture design. It also explains the SharePoint farm topologies, and describes how to map a logical architecture design to a physical architecture design.
Lessons
• Designing physical components for SharePoint deployments
• Designing supporting components for SharePoint deployments
• SharePoint farm topologies
• Mapping a logical architecture design to a physical architecture design
Lab : Designing a physical architecture
• Designing a physical architecture
• Developing a physical architecture design diagram
After completing this module, students will be able to:
• Describe the requirements for the physical components that are needed for a SharePoint 2016 deployment.
• Describe the requirements for the supporting components that are needed for a successful SharePoint 2016 deployment.
• Identify SharePoint farm topologies.
• Map a logical architecture design to a physical architecture design.
Module 5: Installing and configuring SharePoint 2016
This module explains how to install SharePoint 2016 in different topologies, script the installation, and configure a SharePoint 2016 environment. This module also explains how to configure the core farm-level settings in a SharePoint 2016 deployment.
Lessons
• Installing SharePoint 2016
• Scripting installation and configuration of SharePoint
• Configuring SharePoint 2016 farm settings
Lab : Deploying and configuring SharePoint 2016 – Part one
• Provisioning a SharePoint 2016 farm
Lab : Deploying and configuring SharePoint 2016 – Part two
• Configuring incoming email
• Configuring outgoing email
• Configuring integration with Office Online Server
After completing this module, students will be able to:
• Install SharePoint 2016.
• Deploy and configure SharePoint 2016.
• Script the installation and configuration of SharePoint 2016.
• Configure SharePoint 2016 farm settings.
Module 6: Creating web applications and site collections
This module explains how to create web applications in SharePoint 2016 and how to configure these applications. It also explains how to create and configure site collections in SharePoint 2016 and SharePoint Online.
Lessons
• Creating web applications
• Configuring web applications
• Creating and configuring site collections
Lab : Creating and configuring web applications
• Creating a web application
• Configuring a web application
Lab : Creating and configuring site collections
• Creating and configuring site collections
• Creating a site collection in a new content database
• Using Fast Site Collection Creation
After completing this module, students will be able to:
• Create web applications.
• Configure web applications.
• Create and configure site collections.
Module 7: Planning and configuring service applications
This module describes the service application architecture in SharePoint 2016, and how to provision and manage service applications.
Lessons
• Introduction to the service application architecture
• Creating and configuring service applications
Lab : Planning and configuring service applications
• Provisioning a Managed Metadata Service application with Central Administration
• Provisioning a Managed Metadata Service application with Windows PowerShell
• Configuring the Word Automation Services service application for document conversion
• Configuring service application proxy groups
After completing this module, students will be able to:
• Explain the key components and topologies for a SharePoint 2016 service application architecture.
• Plan for service accounts and service application dependencies.
• Understand the purpose of mapping service applications to business requirements.
• Describe how to provision and manage SharePoint 2016 service applications
Module 8: Managing users and permissions, and securing content
This module explains how to configure authorization in SharePoint 2016. It also explains how to configure site collection security in SharePoint 2016.
Lessons
• Configuring authorization in SharePoint 2016
• Managing access to content
Lab : Managing users and groups
• Creating a web-application policy
• Creating and managing SharePoint groups
• Creating custom permission levels
Lab : Securing content in SharePoint sites
• Managing permissions and inheritance
• Managing site-collection security
• Enabling anonymous access to a site
After completing this module, students will be able to:
• Manage users and permissions in SharePoint 2016.
• Manage access to content in SharePoint 2016.
Module 9: Configuring authentication for SharePoint 2016
This module explains about the SharePoint 2016 authentication infrastructure, and how to configure claims, providers, and identity federation for SharePoint 2016. It also explains how to configure server-to-server authentication for SharePoint 2016.
Lessons
• Overview of authentication
• Configuring federated authentication
• Configuring server-to-server authentication
Lab : Extend your SharePoint 2016 to support Secure Sockets Layer (SSL)
• Configuring Microsoft SharePoint 2016 to use federated identities
• Configuring Active Directory Federation Services (AD FS) to enable a web application a relying party
• Configuring SharePoint to trust AD FS as an identity provider
• Configuring a web application to use the AD FS identity provider
After completing this module, students will be able to:
• Explain the authentication infrastructure of SharePoint 2016.
• Configure claims providers and identity federation for SharePoint 2016.
• Configure server-to-server authentication for SharePoint 2016.
Module 10: Securing a SharePoint 2016 deployment
This module explains how to secure a SharePoint 2016 deployment at the platform level, and how to configure farm-level security settings for a SharePoint 2016 deployment.
Lessons
• Securing the platform
• Configuring farm-level security
Lab : Securing a SharePoint 2016 deployment
• Configuring SharePoint Server communication security
• Hardening a SharePoint server farm
• Configuring blocked file types
• Configuring Web Part security
• Implementing security auditing
After completing this module, students will be able to:
• Secure a SharePoint 2016 deployment at the platform level.
• Configure farm-level security settings for a SharePoint 2016 deployment.
Module 11: Managing taxonomy
This module explains how to create and manage content types and content-type propagation. Additionally, it explains how to implement managed metadata in SharePoint web applications and site collections. It also explains how to configure the managed metadata service application in SharePoint 2016.
Lessons
• Managing content types
• Understanding managed metadata
• Configuring the managed metadata service
Lab : Configuring content-type propagation
• Creating content types for propagation
• Publishing content types across site collections
Lab : Configuring and using the managed metadata service
• Configuring the managed metadata service
• Creating term sets and terms
• Consuming term sets
After completing this module, students will be able to:
• Create and manage content types and content-type propagation.
• Explain how to implement managed metadata in SharePoint web applications and site collections.
• Configure the managed metadata service application in SharePoint 2016.
Module 12: Configuring user profiles
This module explains how to configure the User Profile service application, and how to manage user profiles and audiences
.Lessons
• Configuring the User Profile Service Application
• Managing user profiles and audiences
Lab : Configuring user profiles
• Configuring the User Profile Service Application
• Configuring directory import and synchronization
Lab : Configuring My Sites and audiences
• Configuring My Sites
• Configuring audiences
After completing this module, students will be able to:
• Configure the User Profile service application.
• Manage user profiles and audiences.
Module 13: Configuring Enterprise Search
This module describes the Search Service Application and explains how to configure the Search service in SharePoint 2016. It also explains how to manage the search experience in SharePoint 2016.
Lessons
• Understanding the Search Service Application architecture
• Configuring Enterprise Search
• Managing Enterprise Search
Lab : Configuring Enterprise Search
• Configuring the Search Service Application
• Configuring a file share content source
• Configuring a local SharePoint content source
• Creating a search center
Lab : Optimizing the search experience
• Configuring a result source and a query rule
• Customizing the search experience
• Creating and deploying a thesaurus
• Configuring entity extractors and refiners
• Managing query spelling correction
After completing this module, students will be able to:
• Describe the Search service architecture in SharePoint 2016.
• Configure the Search service in SharePoint 2016.
• Manage the search experience in SharePoint 2016.
Module 14: Monitoring and maintaining a SharePoint 2016 environment
This module explains how to implement a monitoring plan for SharePoint 2016, and how to optimize the performance of a SharePoint 2016 deployment. It also explains how to plan for and configure SharePoint caching. Further, it explains how to identify and resolve problems in a SharePoint 2016 environment.
Lessons
• Monitoring a SharePoint 2016 environment
• Tuning and optimizing a SharePoint 2016 environment
• Planning and configuring caching
• Troubleshooting a SharePoint 2016 environment
Lab : Monitoring a SharePoint 2016 deployment
• Configuring usage and health data collection
• Configuring Sharepoint diagnostic logging
• Configuring Health Analyzer rules
• Reviewing usage and health data
Lab : Investigating page load times
• Analyzing network traffic
• Analyzing SharePoint page performance
After completing this module, students will be able to:
Develop and implement a monitoring plan for a SharePoint 2016 environment.
Tune and optimize a SharePoint 2016 server farm on an ongoing basis.
Plan and configure caching to improve the performance of a SharePoint 2016 deployment.
Troubleshoot errors and other issues in a SharePoint 2016 deployment
Prerequisites
Before attending this course, students must have knowledge of:
• Software management in a Windows Server 2012 or Windows Server 2012 R2 enterprise server environment.
• Deploying and managing applications natively, virtually, and in the cloud.
• Administering IIS.
• Configuring AD DS for use in authentication, authorization, and as a user store.
• Managing an application remotely by using Windows PowerShell 4.0.
• Managing databases and server roles in SQL Server.
• Connecting applications to SQL Server.
• Implementing claims-based security.
• Using Microsoft Hyper-V virtual machines.
An ideal candidate for this course must have at least one year of experience with deploying and administering multiple SharePoint 2013 farms across a large enterprise. Because many customers have not upgraded from SharePoint 2010, a candidate can also have at least two years of experience with SharePoint 2010. However, they also must understand the differences between SharePoint 2010 and SharePoint 2013, particularly in terms of hybridization.
Overview
Audience(s): IT Professionals
Technology: SQL Server
Level: Advanced
This Revision: C
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This five-day instructor-led course provides students with the knowledge and skills to develop a Microsoft SQL Server database. The course focuses on teaching individuals how to use SQL Server product features and tools related to developing a database.
Audience profile
The primary audience for this course is IT Professionals who want to become skilled on SQL Server product features and technologies for implementing a database.
The secondary audiences for this course are individuals who are developers from other product platforms looking to become skilled in the implementation of a SQL Server database.
At course completion
After completing this course, students will be able to:
• Design and Implement Tables.
• Describe advanced table designs
• Ensure Data Integrity through Constraints.
• Describe indexes, including Optimized and Columnstore indexes
• Design and Implement Views.
• Design and Implement Stored Procedures.
• Design and Implement User Defined Functions.
• Respond to data manipulation using triggers.
• Design and Implement In-Memory Tables.
• Implement Managed Code in SQL Server.
• Store and Query XML Data.
• Work with Spatial Data.
• Store and Query Blobs and Text Documents.
Course Outline
Module 1: Introduction to Database Development
Before beginning to work with Microsoft SQL Server in either a development or an administration role, it is important to understand the scope of the SQL Server platform. In particular, it is useful to understand that SQL Server is not just a database engine—it is a complete platform for managing enterprise data. SQL Server provides a strong data platform for all sizes of organizations, in addition to a comprehensive set of tools to make development easier, and more robust.
Lessons
• Introduction to the SQL Server Platform
• SQL Server Database Development Tasks
After completing this module, you will be able to:
• Describe the SQL Server platform.
• Use SQL Server administration tools.
Module 2: Designing and Implementing Tables
In a relational database management system (RDBMS), user and system data is stored in tables. Each table consists of a set of rows that describe entities and a set of columns that hold the attributes of an entity. For example, a Customer table might have columns such as CustomerName and CreditLimit, and a row for each customer. In Microsoft SQL Server data management software tables are contained within schemas that are very similar in concept to folders that contain files in the operating system. Designing tables is one of the most important tasks that a database developer undertakes, because incorrect table design leads to the inability to query the data efficiently. After an appropriate design has been created, it is important to know how to correctly implement the design.
Lessons
• Designing Tables
• Data Types
• Working with Schemas
• Creating and Altering Tables
Lab: Designing and Implementing Tables
• Designing Tables
• Creating Schemas
• Creating Tables
After completing this module, you will be able to:
• Design tables using normalization, primary and foreign keys.
• Work with identity columns.
• Understand built-in and user data types.
• Use schemas in your database designs to organize data, and manage object security.
• Work with computed columns and temporary tables.
Module 3: Advanced Table Designs
The physical design of a database can have a significant impact on the ability of the database to meet the storage and performance requirements set out by the stakeholders. Designing a physical database implementation includes planning the filegroups, how to use partitioning to manage large tables, and using compression to improve storage and performance. Temporal tables are a new feature in SQL Server and offer a straightforward solution to collecting changes to your data.
Lessons
• Partitioning Data
• Compressing Data
• Temporal Tables
Lab: Using Advanced Table Designs
• Partitioning Data
• Compressing Data
After completing this module, you will be able to:
• Describe the considerations for using partitioned tables in a SQL Server database.
• Plan for using data compression in a SQL Server database.
• Use temporal tables to store and query changes to your data.
Module 4: Ensuring Data Integrity through Constraints
The quality of data in your database largely determines the usefulness and effectiveness of applications that rely on it—the success or failure of an organization or a business venture could depend on it. Ensuring data integrity is a critical step in maintaining high-quality data. You should enforce data integrity at all levels of an application from first entry or collection through storage. Microsoft SQL Server data management software provides a range of features to simplify the job.
Lessons
• Enforcing Data Integrity
• Implementing Data Domain Integrity
• Implementing Entity and Referential Integrity
Lab: Using Data Integrity Through Constraints
• Add Constraints
• Test the Constraints
After completing this module, you will be able to:
• Describe the options for enforcing data integrity, and the levels at which they should be applied.
• Implement domain integrity through options such as check, unique, and default constraints.
• Implement referential integrity through primary and foreign key constraints.
Module 5: Introduction to Indexes
An index is a collection of pages associated with a table. Indexes are used to improve the performance of queries or enforce uniqueness. Before learning to implement indexes, it is helpful to understand how they work, how effective different data types are when used within indexes, and how indexes can be constructed from multiple columns. This module discusses table structures that do not have indexes, and the different index types available in Microsoft SQL Server.
Lessons
• Core Indexing Concepts
• Data Types and Indexes
• Heaps, Clustered, and Nonclustered Indexes
• Single Column and Composite Indexes
Lab: Implementing Indexes
• Creating a Heap
• Creating a Clustered Index
• Creating a Covered Index
After completing this module, you will be able to:
• Explain core indexing concepts.
• Evaluate which index to use for different data types.
• Describe the difference between single and composite column indexes.
Module 6: Designing Optimized Index Strategies
Indexes play an important role in enabling SQL Server to retrieve data from a database quickly and efficiently. This module discusses advanced index topics including covering indexes, the INCLUDE clause, query hints, padding and fill factor, statistics, using DMOs, the Database Tuning Advisor, and Query Store.
Lessons
• Index Strategies
• Managing Indexes
• Execution Plans
• The Database Engine Tuning Advisor
• Query Store
Lab: Optimizing Indexes
• Using Query Store
• Heaps and Clustered Indexes
• Creating a Covered Index
After completing this module, you will be able to:
• What a covering index is, and when to use one.
• The issues involved in managing indexes.
• Actual and estimated execution plans.
• How to use Database Tuning Advisor to improve the performance of queries.
• How to use Query Store to improve query performance.
Module 7: Columnstore Indexes
Introduced in Microsoft SQL Server 2012, columnstore indexes are used in large data warehouse solutions by many organizations. This module highlights the benefits of using these indexes on large datasets; the improvements made to columnstore indexes in SQL Server 2016; and the considerations needed to use columnstore indexes effectively in your solutions.
Lessons
• Introduction to Columnstore Indexes
• Creating Columnstore Indexes
• Working with Columnstore Indexes
Lab: Using Columnstore Indexes
• Creating a Columnstore Index
• Create a Memory Optimized Columnstore Table
After completing this module, you will be able to:
• Describe columnstore indexes and identify suitable scenarios for their use.
• Create clustered and nonclustered columnstore indexes.
• Describe considerations for using columnstore indexes.
Module 8: Designing and Implementing Views
This module describes the design and implementation of views. A view is a special type of query—one that is stored and can be used in other queries—just like a table. With a view, only the query definition is stored on disk; not the result set. The only exception to this is indexed views, when the result set is also stored on disk, just like a table. Views simplify the design of a database by providing a layer of abstraction, and hiding the complexity of table joins. Views are also a way of securing your data by giving users permissions to use a view, without giving them permissions to the underlying objects. This means data can be kept private, and can only be viewed by appropriate users.
Lessons
• Introduction to Views
• Creating and Managing Views
• Performance Considerations for Views
Lab: Designing and Implementing Views
• Creating Standard Views
• Creating an Updateable view
After completing this module, you will be able to:
• Understand the role of views in database design.
• Create and manage views.
• Understand the performance considerations with views.
Module 9: Designing and Implementing Stored Procedures
This module describes the design and implementation of stored procedures.
Lessons
• Introduction to Stored Procedures
• Working with Stored Procedures
• Implementing Parameterized Stored Procedures
• Controlling Execution Context
Lab: Designing and Implementing Stored Procedures
• Create Stored procedures
• Create Parameterized Stored procedures
• Changes Stored Procedure Execution Context
After completing this module, you will be able to:
• Understand what stored procedures are, and what benefits they have.
• Design, create, and alter stored procedures.
• Control the execution context of stored procedures.
• Implement stored procedures that use parameters.
Module 10: Designing and Implementing User-Defined Functions
Functions are routines that you use to encapsulate frequently performed logic. Rather than having to repeat the function logic in many places, code can call the function. This makes code more maintainable, and easier to debug. In this module, you will learn to design and implement user-defined functions (UDFs) that enforce business rules or data consistency. You will also learn how to modify and maintain existing functions.
Lessons
• Overview of Functions
• Designing and Implementing Scalar Functions
• Designing and Implementing Table-Valued Functions
• Considerations for Implementing Functions
• Alternatives to Functions
Lab: Designing and Implementing User-Defined Functions
• Format Phone numbers
• Modify an Existing Function
•
After completing this module, you will be able to:
• Describe different types of functions.
• Design and implement scalar functions.
• Design and implement table-valued functions (TVFs).
• Describe considerations for implementing functions.
• Describe alternatives to functions.
Module 11: Responding to Data Manipulation via Triggers
Data Manipulation Language (DML) triggers are powerful tools that you can use to enforce domain, entity, referential data integrity and business logic. The enforcement of integrity helps you to build reliable applications. In this module, you will learn what DML triggers are, how they enforce data integrity, the different types of trigger that are available to you, and how to define them in your database.
Lessons
• Designing DML Triggers
• Implementing DML Triggers
• Advanced Trigger Concepts
Lab: Responding to Data Manipulation by Using Triggers
• Create and Test the Audit Trigger
• Improve the Audit Trigger
After completing this module, you will be able to:
• Design DML triggers
• Implement DML triggers
• Explain advanced DML trigger concepts, such as nesting and recursion.
Module 12: Using In-Memory Tables
Microsoft SQL Server 2014 data management software introduced in-memory online transaction processing (OLTP) functionality features to improve the performance of OLTP workloads. SQL Server adds several enhancements, such as the ability to alter a memory-optimized table without recreating it. Memory-optimized tables are primarily stored in memory, which provides the improved performance by reducing hard disk access. Natively compiled stored procedures further improve performance over traditional interpreted Transact-SQL.
Lessons
• Memory-Optimized Tables
• Natively Compiled Stored Procedures
Lab: Using In-Memory Database Capabilities
• Using Memory-Optimized Tables
• Using Natively Compiled Stored procedures
After completing this module, you will be able to:
• Use memory-optimized tables to improve performance for latch-bound workloads.
• Use natively compiled stored procedures.
Module 13: Implementing Managed Code in SQL Server
As a SQL Server professional, you are likely to be asked to create databases that meet business needs. Most requirements can be met using Transact-SQL. However, occasionally you may need additional capabilities that can only be met by using common language runtime (CLR) code. As functionality is added to SQL Server with each new release, the necessity to use managed code decreases. However, there are times when you might need to create aggregates, stored procedures, triggers, user-defined functions, or user-defined types. You can use any .NET Framework language to develop these objects. In this module, you will learn how to use CLR managed code to create user-defined database objects for SQL Server.
Lessons
• Introduction to CLR Integration in SQL Server
• Implementing and Publishing CLR Assemblies
Lab: Implementing Managed Code in SQL Server
• Assessing Proposed CLR Code
• Creating a Scalar-Valued CLR Function
• Creating a Table Valued CLR Function
After completing this module, you will be able to:
• Explain the importance of CLR integration in SQL Server.
• Implement and publish CLR assemblies using SQL Server Data Tools (SSDT).
Module 14: Storing and Querying XML Data in SQL Server
XML provides rules for encoding documents in a machine-readable form. It has become a widely adopted standard for representing data structures, rather than sending unstructured documents. Servers that are running Microsoft SQL Server data management software often need to use XML to interchange data with other systems; many SQL Server tools provide an XML-based interface. SQL Server offers extensive handling of XML, both for storage and querying. This module introduces XML, shows how to store XML data within SQL Server, and shows how to query the XML data. The ability to query XML data directly avoids the need to extract data into a relational format before executing Structured Query Language (SQL) queries. To effectively process XML, you need to be able to query XML data in several ways: returning existing relational data as XML, and querying data that is already XML.
Lessons
• Introduction to XML and XML Schemas
• Storing XML Data and Schemas in SQL Server
• Implementing the XML Data Type
• Using the Transact-SQL FOR XML Statement
• Getting Started with XQuery
• Shredding XML
Lab: Storing and Querying XML Data in SQL Server
• Determining when to use XML
• Testing XML Data Storage in Variables
• Using XML Schemas
• Using FOR XML Queries
• Creating a Stored Procedure to Return XML
After completing this module, you will be able to:
• Describe XML and XML schemas.
• Store XML data and associated XML schemas in SQL Server.
• Implement XML indexes within SQL Server.
• Use the Transact-SQL FOR XML statement.
• Work with basic XQuery queries.
Module 15: Storing and Querying Spatial Data in SQL Server
This module describes spatial data and how this data can be implemented within SQL Server.
Lessons
• Introduction to Spatial Data
• Working with SQL Server Spatial Data Types
• Using Spatial Data in Applications
Lab: Working with SQL Server Spatial Data
• Become Familiar with the Geometry Data Type
• Add Spatial Data to an Existing Table
• Find Nearby Locations
After completing this module, you will be able to:
• Describe how spatial data can be stored in SQL Server
• Use basic methods of the GEOMETRY and GEOGRAPHY data types
• Query databases containing spatial data
Module 16: Storing and Querying BLOBs and Text Documents in SQL Server
Traditionally, databases have been used to store information in the form of simple values—such as integers, dates, and strings—that contrast with more complex data formats, such as documents, spreadsheets, image files, and video files. As the systems that databases support have become more complex, administrators have found it necessary to integrate this more complex file data with the structured data in database tables. For example, in a product database, it can be helpful to associate a product record with the service manual or instructional videos for that product. SQL Server provides several ways to integrate these files—that are often known as Binary Large Objects (BLOBs)—and enable their content to be indexed and included in search results. In this module, you will learn how to design and optimize a database that includes BLOBs.
Lessons
• Considerations for BLOB Data
• Working with FILESTREAM
• Using Full-Text Search
Lab: Storing and Querying BLOBs and Text Documents in SQL Server
• Enabling and Using FILESTREAM Columns
• Enabling and Using File Tables
• Using a Full-Text Index
After completing this module, you will be able to:
• Describe the considerations for designing databases that incorporate BLOB data.
• Describe the benefits and design considerations for using FILESTREAM to store BLOB data on a Windows file system.
• Describe the benefits of using full-text indexing and Semantic Search, and explain how to use these features to search SQL Server data, including unstructured data
Module 17: SQL Server Concurrency
This module explains how to name, declare, assign values to, and use variables. It also describes how to store data in an array. Concurrency control is a critical feature of multiuser database systems; it allows data to remain consistent when many users are modifying data at the same time. This module covers the implementation of concurrency in Microsoft SQL Server. You will learn about how SQL Server implements concurrency controls, and the different ways you can configure and work with concurrency settings.
Lessons
• Concurrency and Transactions
• Locking Internals
Lab: SQL Server Concurrency
• Implement Snapshot Isolation
• Implement Partition Level Locking
After completing this module, you will be able to:
• Describe concurrency and transactions in SQL Server.
• Describe SQL Server locking.
Module 18: Performance and Monitoring
This module explains how to name, declare, assign values to, and use variables. It also describes how to store data in an array. This module looks at how to measure and monitor the performance of your SQL Server databases. The first two lessons look at SQL Server Extended Events, a flexible, lightweight event-handling system built into the Microsoft SQL Server Database Engine. These lessons focus on the architectural concepts, troubleshooting strategies and usage scenarios.
Lessons
• Extended Events
• Working with extended Events
• Live Query Statistics
• Optimize Database File Configuration
• Metrics
Lab: Monitoring, Tracing, and Baselining
• Collecting and Analyzing Data Using Extended Events
• Implementing Baseline Methodology
After completing this module, you will be able to:
• Understand Extended Events and how to use them.
• Work with Extended Events.
• Understand Live Query Statistics.
• Optimize the file configuration of your databases.
• Use DMVs and Performance Monitor to create baselines and gather performance metrics.
Prerequisites
• Basic knowledge of the Microsoft Windows operating system and its core functionality.
• Working knowledge of Transact-SQL.
• Working knowledge of relational databases.
Overview
Audience(s): IT Pros
Technology: Office 365
Level: Intermediate
This Revision: B
Delivery method:
Classroom
Length: 3 days
Language(s): English
About this course
This is a three-day Instructor Led Training (ILT) course that targets the needs of information technology (IT) professionals who take part in administering, configuring, troubleshooting, and operating Office 365 services, including its identities, dependencies, requirements, and supporting technologies. This course focuses on skills required to administer and troubleshoot Office 365 tenant and key services of Office 365, such as Exchange Online, SharePoint Online and Skype for Business. It also covers security and compliance features of Office 365.
Audience profile
This course is intended for IT professionals and system administrators who want to learn about administration and troubleshooting techniques in Office 365. These professionals should have at least three years of experience working in their respective fields: ideally in the areas of system administration, network administration, and messaging.
At course completion
After completing this course, students will be able to:
• Describe Office 365 services.
• Administer Office 365 by using the graphical environment and Windows PowerShell.
• Administer and troubleshoot directory synchronization and directory objects.
• Administer and troubleshoot Exchange Online.
• Administer and troubleshoot Skype for Business Online and Microsoft Teams.
• Administer and troubleshoot SharePoint Online.
• Plan and deploy Microsoft Office 365 ProPlus.
• Administer and troubleshoot compliance and security in Office 365
Course Outline
Module 1: Office 365 services overview
This module describes the features of Office 365 and identifies recent improvements to the service. It also identifies licensing options, describes the process of Office 365 tenant configuration, and lists appropriate Office 365 client options.
Lessons
• Overview of Office 365 services
• Office 365 licensing overview
• Office 365 tenant configuration
• Office 365 clients
Lab : Office 365 services overview
• Setting up Office 365 lab environment
• Configuring Office 365 Services
After completing this module, students will be able to:
• Describe Office 365 services.
• Explain Office 365 licensing options.
• Describe Office 365 tenant configuration.
• Describe the available Office 365 clients.
Module 2: Office 365 administration, tools, and techniques
This module describes how to manage Office 365 by using the administrative portals and Windows PowerShell. It also explains how to manage administrative access and troubleshoot administration in Office 365.
Lessons
• Managing Office 365 with the administrative portals
• Managing Office 365 with Windows PowerShell
• Managing administrative access in Office 365
• Troubleshooting administration in Office 365
Lab : Administering Office 365
• Using administrative portal
• Administering Office 365 with Windows PowerShell
• Configuring role-based administration
• Troubleshooting administrative access in Office 365
After completing this module, students will be able to:
• Manage Office 365 by using the administrative portals.
• Manage Office 365 by using Windows PowerShell.
• Manage administrative access in Office 365.
• Troubleshoot administration in Office 365.
Module 3: Administering and troubleshooting directory synchronization and directory objects
This module describes directory synchronization and federation. The module explains how to manage Microsoft Azure Active Directory Connect (Azure AD Connect) and user and group objects in Office 365. Additionally, it describes how to troubleshoot objects and directory synchronization in Office 365.
Lessons
• Overview of directory synchronization and federation overview
• Azure AD Connect management
• Managing users and groups objects in Office 365
• Troubleshooting objects and directory synchronization in Office 365
Lab : Administering directory synchronization, users, and groups in Office 365
• Configuring Azure AD Connect
• Managing Office 365 users and groups by using the Office 365 admin center
• Managing Office 365 password policies
• Troubleshooting synchronization issues with user objects in Office 365
After completing this module, students will be able to:
• Describe directory synchronization and federation.
• Manage Azure AD Connect.
• Manage user and group objects in Officce 365.
• Troubleshoot objects and directory synchronization in Office 365
Module 4: Administering and troubleshooting Exchange Online
This module describes the subscription options and roles in Exchange Online. It explains how to administer Exchange Online recipients and client access policies in Exchange Online and how to troubleshoot Exchange Online.
Lessons
• Exchange Online management overview
• Administering Exchange Online recipients
• Administering client access policies in Exchange Online
• Troubleshooting Exchange Online
Lab : Administering and troubleshooting Exchange Online
• Configuring and administering Exchange Online recipients
• Configuring delegated administration
• Configuring client access policies
• Troubleshoot Exchange Online
After completing this module, students will be able to:
• Describe the subscription options and roles in Exchange Online.
• Administer Exchange Online recipients.
• Administer client access policies in Exchange Online.
• Troubleshoot Exchange Online
Module 5: Administering and troubleshooting Skype for Business Online and Teams
This module describes Skype for Business Online and Teams. It explains how to administer, manage, and troubleshoot Skype for Business Online and Teams.
Lessons
• Skype for Business Online and Teams overview
• Administering and managing Skype for Business Online and Teams
• Troubleshooting Skype for Business Online and Teams
Lab : Administering Skype for Business Online and Teams
• Configuring Skype for Business Online and Teams organization settings
• Configuring Skype for Business Online and Teams user settings
• Troubleshooting Skype for Business Online
After completing this module, students will be able to:
• Describe Skype for Business Online and Teams.
• Administer and manager Skype for Business Online and Teams.
• Troubleshoot Skype for Business Online and Teams.
Module 6: Administering and troubleshooting SharePoint Online
This module describes how to configure SharePoint Online settings and site collections and external user access to SharePoint Online. It also explains how to manage Microsoft OneDrive for Business synchronization and how to troubleshoot SharePoint Online.
Lessons
• SharePoint Online management overview
• Administering SharePoint Online site collections
• Administering external users in SharePoint Online
• Configuring OneDrive for Business
• Troubleshooting SharePoint Online
Lab : Configuring and administering SharePoint Online
• Configuring SharePoint Online settings
• Creating and configuring a SharePoint site collection
• Configuring and verifying external user sharing
• Configuring OneDrive for Business
• Troubleshooting SharePoint Online
After completing this module, students will be able to:
• Configure SharePoint Online settings.
• Configure SharePoint Online site collections.
• Configure external user access to SharePoint Online.
• Manage Microsoft OneDrive for Business synchronization.
• Troubleshoot SharePoint Online.
Module 7: Planning and deploying Office 365 ProPlus
This module describes Office 365 ProPlus. It also explains how to plan and manage user-driven Office 365 ProPlus deployments and how to troubleshoot the deployments.
Lessons
• Overview of Office 365 ProPlus
• Managing user-driven Office 365 ProPlus deployments
• Troubleshooting Office 365 ProPlus deployments
Lab : Managing Office 365 ProPlus installations
• Preparing Office 365 ProPlus installations
• Managing user-driven Office 365 ProPlus installations
• Managing centralized Office 365 ProPlus installations
• Troubleshooting Office 365 ProPlus deployments
After completing this module, students will be able to:
• Describe Office 365 ProPlus.
• Plan and manage user-driven Office 365 ProPlus deployments.
• Troubleshoot Office 365 ProPlus deployments.
Module 8: Administering and troubleshooting compliance and security in Office 365
This module describes the compliance features in Office 365. It explains how to administer Azure Information Protection and the compliance features in Office 365, how to configure and administer email security in Office 365, and how to troubleshoot Office 365 compliance and protection.
Lessons
• Overview of compliance features in Office 365
• Administering information protection in Office 365
• Administering compliance features in Office 365
• Configuring and administering email security in Office 365
• Troubleshooting Office 365 compliance and protection
Lab : Configuring and troubleshooting compliance and security
• Configuring rights management in Office 365
• Configuring compliance features
• Configuring email protection
• Troubleshooting security and compliance
After completing this module, students will be able to:
• Describe the compliance features in Office 365.
• Administer Azure Information Protection in Office 365.
• Administer the compliance features in Office 365.
• Configure and administer email security in Office 365.
• Troubleshoot Office 365 compliance and protection.
Prerequisites
Before attending this course, students must have:
• A minimum of two years of experience administering the Windows Server operating system, including Windows Server 2012 or newer.
• A minimum of one year of experience working with Active Directory Domain Services (AD DS).
• A minimum of one year experience working with name resolution, including DNS.
• Experience working with certificates, including public key infrastructure (PKI) certificates
• Experience working with certificates, including public key infrastructure (PKI) certificates.Experience working with Windows Powershell.
• Experience working with Microsoft Exchange Server 2013 or newer, Microsoft Lync 2013 Server or Skype for Business 2015 Server, and Microsoft SharePoint Server 2013 or newer is beneficial but not required.
Overview
Audience(s): IT Professionals
Technology: Skype
Level: Advanced
This Revision: B
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This course provides students with the knowledge and skills that are required to plan, deploy, configure, and administer a Skype for Business 2015 solution. Students will learn how to deploy a multi-site and highly available Skype for Business infrastructure that supports instant messaging, conferencing, Persistent Chat, archiving, and monitoring. Students will also learn how to manage and maintain the infrastructure and how to troubleshoot issues that might arise. This course focuses primarily on an on-premises Skype for Business deployment, but it does include information on how to integrate an on-premises deployment with Skype for Business Online and how to migrate from previous versions of Lync Server. This course helps students prepare for Exam 70-334.
Audience profile
The primary audience for this course is information technology (IT) professionals who are responsible for the Skype for Business 2015 deployment in their organizations. Experience with previous versions of Lync Server is beneficial but not required to take this course. Students should be proficient with Active Directory Domain Services (AD DS), data networks, and telecommunications standards and components that support the configuration of Skype for Business. Students should also be familiar with Microsoft Exchange Server and Microsoft Office 365.
The secondary audience for this course includes IT professionals who are planning to take the exam 70-334: Core Solutions of Skype for Business 2015 as a stand-alone exam or as part of the requirement for the Microsoft Certified Solutions Expert (MCSE): Communications certification exam.
At course completion
After completing this course, students will be able to:
Describe the Skype for Business 2015 architecture and design a Skype for Business 2015 topology.
Install and implement Skype for Business Server 2015.
Administer Skype for Business Server 2015 by using various tools.
Configure users and clients in Skype for Business 2015.
Configure and implement conferencing in Skype for Business 2015.
Implement additional conferencing options, such as dial-in conferencing, Microsoft Skype Room System (SRS), and Skype Meeting Broadcast.
Design and implement monitoring and archiving in Skype for Business 2015.
Deploy Skype for Business 2015 external access.
Implement Persistent Chat in Skype for Business 2015.
Implement high availability in Skype for Business 2015.
Implement disaster recovery in Skype for Business 2015.
Design and deploy a hybrid Skype for Business environment.
Plan and implement an upgrade from Lync Server to Skype for Business Server 2015.
Course Outline
Module 1: Design and Architecture of Skype for Business Server 2015
This module describes the high-level components and features of Skype for Business 2015. It also describes how to work with Skype for Business administrative tools, the main components of Skype for Business Online, and coexistence with on-premises Skype for Business Server 2015 servers.
Lessons
• Overview of Skype for Business Components and Features
• Introduction to the Skype for Business Administrative Tools
Lab : Designing and Publishing a Skype for Business Server Topology
• Designing and Creating the Topology
• Updating the Topology for the New York Site
After completing this module, students will be able to:
Describe the high-level components and features of Skype for Business 2015.
Work with Skype for Business administrative tools.
Module 2: Installing and Implementing Skype for Business Server 2015
This module explains the external dependencies for Skype for Business Server. It describes the Session Initiation Protocol (SIP) domain requirements to ensure a successful implementation. This module also explains how to install Skype for Business Server, and it describes how Skype for Business Server integrates with Exchange Server and Microsoft SharePoint Server.
Lessons
• Server and Service Dependencies
• Planning SIP Domains
• Installing Skype for Business Server
• Integrating Skype for Business Server with Exchange Server and SharePoint Server
Lab : Configuring DNS and Simple URLs for Skype for Business Server
• Configuring the Required DNS Records and Simple URLs for Skype for Business Server
Lab : Deploying Skype for Business Server
• Installing and Configuring Skype for Business Server
• Installing Skype for Business Server Certificates
After completing this module, students will be able to:
Identify the external dependencies for Skype for Business Server 2015.
Identify the SIP domain requirements to ensure a successful implementation.
Install Skype for Business Server.
Describe how Skype for Business Server integrates with Exchange Server and SharePoint Server.
Module 3: Administering Skype for Business Server 2015
This module explains how to administer and manage Skype for Business Server by using Skype for Business Server Control Panel and the Skype for Business Server Management Shell. It also describes how to create useful Skype for Business scripts to automate processes. Additionally, it explains how to implement role-based access control (RBAC) in Skype for Business and how to use important Test cmdlets and tools to troubleshoot Skype for Business.
Lessons
• Using Skype for Business Server Control Panel
• Using the Skype for Business Server Management Shell
• Implementing Role-Based Access Control
• Using Test Cmdlets
• Tools for Troubleshooting Skype for Business
Lab : Using the Administrative Tools to Manage Skype for Business Server
• Installing the Skype for Business Administrative Tools on a Windows 10 Client
• Using Skype for Business Server Control Panel
• Using the Skype for Business Server Management Shell
Lab : Using the Skype for Business Troubleshooting Tools
• Using Skype for Business Server Management Shell Cmdlets to Create an RBAC Structure
• Using the Centralized Logging Service
• Performing a Network Capture by Using Message Analyzer
After completing this module, students will be able to:
Use Skype for Business Server Control Panel.
Use the Skype for Business Server Management Shell.
Implement RBAC in Skype for Business 2015.
Use important test cmdlets.
Use various tools to troubleshoot Skype for Business.
Module 4: Configuring Users and Clients in Skype for Business 2015
This module explains how to configure users by using Skype for Business Server Control Panel and the Skype for Business Server Management Shell. It then describes how to deploy Skype for Business clients and explains the sign-in, registration, and authentication process for Skype for Business clients. It also explains how to configure in-band policies and group policies. Finally, it explains how to manage the Skype for Business Address Book.
Lessons
• Configuring Users
• Deploying the Skype for Business Client
• Registration, Sign-In, and Authentication
• Configuring Skype for Business Client Policies
• Managing the Skype for Business Address Book
Lab : Configuring Users and Clients in Skype for Business 2015
• Enabling Users for Skype for Business by Using the Management Shell
• Troubleshooting a User Sign-In Issue
Lab : Configuring Policies and the Address Book in Skype for Business Server
• Configuring Client Policies
• Configuring the Address Book
After completing this module, students will be able to:
• Configure users by using Skype for Business Server Control Panel and the Skype for Business Server Management Shell.
• Deploy Skype for Business clients.
• Explain the registration, sign-in, and authentication process for Skype for Business clients.
• Configure in-band policies and Group Policies.
• Describe how to manage the Skype for Business Address Book.
Module 5: Configuring and Implementing Conferencing in Skype for Business 2015
This modules describes Skype for Business conferencing features and modalities. It explains how to integrate Skype for Business Server 2015 with Office Online Server. It also explains how to plan for conferencing bandwidth utilization. Finally, it explains how to configure conferencing settings and policies.
Lessons
• Introduction to Conferencing in Skype for Business 2015
• Integrating Skype for Business Server and Office Online Server
• Bandwidth Planning
• Configuring Conferencing Settings
Lab : Installing and Configuring Office Online Server
• Installing Office Online Server
Lab : Configuring Conferencing in Skype for Business Server
• Configuring, Assigning, and Validating Conferencing Policies
After completing this module, students will be able to:
• Describe Skype for Business conferencing features and modalities.
• Integrate Skype for Business Server 2015 with Office Web Apps Server.
• Plan for conferencing bandwidth utilization.
• Configure conferencing settings and policies.
Module 6: Implementing Additional Conferencing Options in Skype for Business Server 2015
This module describes the conferencing lifecycle and explains how to administer it. It then explains how to use conferencing and meeting policies. It also explains how to deploy dial-in conferencing and configure the infrastructure for SRS. Finally, it explains how to configure large meetings and Skype Meeting Broadcast.
Lessons
• Overview of the Conferencing Lifecycle
• Designing and Configuring Audio/Video and Web Conferencing Policies
• Deploying Dial-In Conferencing
• Configuring an SRS
• Configuring Large Meetings and Skype Meeting Broadcasts
Lab : Implementing and Troubleshooting Conferencing Policy
• Creating and Editing Conferencing Policies
• Troubleshooting Conferencing Policies
Lab : Configuring Additional Conferencing Modalities
• Deploying Dial-In Conferencing
• Preparing for LRS Deployment
After completing this module, students will be able to:
• Administer the conferencing lifecycle.
• Configure conferencing and meeting policies.
• Deploy dial-in conferencing.
• Configure the infrastructure for Lync Room System (LRS).
• Configure large meetings and Skype Meeting Broadcast.
Module 7: Designing and Implementing Monitoring and Archiving in Skype for Business 2015
This module describes the Monitoring Service components in Skype for Business Server. It then describes archiving and explains how to design an archiving policy. Finally, it explains how to implement archiving.
Lessons
• Components of the Monitoring Service
• Overview of Archiving
• Designing an Archiving Policy
• Implementing Archiving
Lab : Implementing Monitoring
• Enabling Monitoring Reports
Lab : Implementing Archiving
• Enabling Skype for Business Server Archiving to Microsoft Exchange Server 2013
After completing this module, students will be able to:
• Describe Monitoring Service components in Skype for Business Server.
• Implement monitoring.
• Design an archiving policy.
• Implement archiving.
Module 8: Deploying Skype for Business 2015 External Access
This module describes the components for external access. It then explains how to configure external access policies and security, how to configure certificates, and how to configure reverse proxy. Additionally, this module describes how to configure Skype for Business Server 2015 for mobile clients. Finally, it explains how to design and configure federation in Skype for Business Server.
Lessons
• Overview of External Access
• Configuring External Access Policies and Security
• Configuring External Access Network and Certificates
• Configuring Reverse Proxy
• Designing Mobility in Skype for Business Server
• Designing Federation in Skype for Business Server
Lab : Designing and Implementing External User Access
• Defining the Edge Server in the Topology
• Installing and Configuring the Edge Server
Lab : Installing the Components for External Users
• Installing and Configuring Reverse Proxy
• Validate External Messaging
After completing this module, students will be able to:
• Identify the components for external access.
• Configure external access policies and security.
• Configure external access network and certificates.
• Configure reverse proxy.
• Configure Skype for Business Server 2015 for mobile clients.
• Design and configure federation in Skype for Business Server.
Module 9: Implementing Persistent Chat in Skype for Business 2015
This module explains how to design a Skype for Business 2015 topology that includes Persistent Chat. It then explains how to deploy Persistent Chat in Skype for Business. Finally, it explains how to configure and manage Persistent Chat.
Lessons
• Designing a Persistent Chat Server Topology
• Deploying Persistent Chat Server
• Configuring and Managing Persistent Chat
Lab : Designing and Deploying Persistent Chat Server
• Configuring the Topology for Persistent Chat Server
• Installing Persistent Chat Server
• Registering a New Add-In
Lab : Configuring and Using Persistent Chat
• Configuring Chat Rooms and Policies
• Validating a Persistent Chat Deployment
• Troubleshooting Persistent Chat
After completing this module, students will be able to:
• Design a Skype for Business topology that includes Persistent Chat.
• Deploy Persistent Chat in Skype for Business.
• Configure and manage Persistent Chat in Skype for Business.
Module 10: Implementing High Availability in Skype for Business 2015
This module describes how to design and implement a high-availability solution for Front End Servers and Back End Servers in a Skype for Business Server environment. It also explains how to design and implement a high-availability solution for file stores, Edge Servers, Mediation Servers, Office Online server farms, and reverse proxy servers in a Skype for Business Server environment.
Lessons
• Planning for Front End Pool High Availability
• Planning for Back End Server High Availability
• High Availability for Other Component Servers
Lab : Pre-Lab Configuration
• Preparing for the Lab
Lab : Implementing High Availability
• Managing Front End Pools
• Configuring Hardware Load Balancing
After completing this module, students will be able to:
• Design and implement a high-availability solution for Front End Servers in a Skype for Business Server environment.
• Design and implement a high-availability solution for Back End Servers in a Skype for Business Server environment.
• Design and implement a high-availability solution for file stores, Edge Servers, Mediation Servers, Office Online Server farms, and reverse proxy servers in a Skype for Business Server environment.
Module 11: Implementing Disaster Recovery in Skype for Business 2015
This module describes the disaster recovery options in Skype for Business Server, such as Front End pool pairing and Persistent Chat Server stretched pools. It then explains how to implement disaster recovery in Skype for Business Server. Additionally, it describes the disaster recovery options for Persistent Chat, the Central Management store, the Location Information Service (LIS) database, and user data.
Lessons
• Disaster Recovery Options in Skype for Business Server
• Implementing Disaster Recovery in Skype for Business Server
• Additional Disaster Recovery Options in Skype for Business Server
Lab : Implementing and Performing Disaster Recovery
• Configuring Pool Pairing
• Perform Pool Failover and Failback
After completing this module, students will be able to:
• Describe disaster recovery options in Skype for Business Server.
• Implement disaster recovery in Skype for Business Server.
• Describe the disaster recovery options for Persistent Chat, the Central Management store, the Location Information Service (LIS) database, and user data.
Module 12: Integrating with Skype for Business Online
This module describes Skype for Business Online features. It then explains how to prepare an on-premises environment for a hybrid Skype for Business deployment. It also explains how to configure a hybrid Skype for Business deployment.
Lessons
• Overview of Skype for Business Online
• Preparing for a Hybrid Skype for Business Deployment
• Configuring a Hybrid Skype for Business Environment
Lab : Designing a Hybrid Skype for Business Deployment
• Designing the Hybrid Skype for Business Environment
After completing this module, students will be able to:
• Describe Skype for Business Online features.
• Prepare an on-premises environment for a hybrid Skype for Business deployment.
• Configure a hybrid Skype for Business deployment.
Module 13: Planning and Implementing an Upgrade to Skype for Business Server 2015
This module describe how to plan a side-by-side migration from Lync Server 2010 and Lync Server 2013 to Skype for Business Server 2015. It also explains how to perform an in-place upgrade from Lync Server 2013 to Skype for Business Server.
Lessons
• Overview of Upgrade and Migration Paths
• Migrating to Skype for Business 2015
• In-Place Upgrade to Skype for Business Server 2015
Lab : Performing an In-Place Upgrade of Lync Server 2013 to Skype for Business Server 2015
• Install Skype for Business Administrative Tools
• Performing In-Place Upgrade from Lync Server 2013 to Skype for Business Server 2015
After completing this module, students will be able to:
• Describe the supported migration and upgrade paths for Skype for Business Server.
• Perform an in-place upgrade of Lync Server 2013 to Skype for Business Server.
• Describe how to manage the user experience during an upgrade.
Prerequisites
In addition to their professional experience, students who attend this training should already have:
A minimum of two years of experience administering Windows Server 2012 or Windows Server 2008 R2.
A minimum of two years of experience working with AD DS.
A minimum of two years of experience working with name resolution, including Domain Name System (DNS).
Experience working with certificates, including public key infrastructure (PKI) certificates.
Experience working with the Windows PowerShell command-line interface.
An understanding of data networks and telecommunications standards and components.
Overview
Audience(s): Data Professional
Technology: Microsoft SQL Server
Level: Intermediate
This Revision: C
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This course is designed to introduce students to Transact-SQL. It is designed in such a way that the first three days can be taught as a course to students requiring the knowledge for other courses in the SQL Server curriculum. Days 4 & 5 teach the remaining skills required to take exam 70-761.
Audience profile
The main purpose of the course is to give students a good understanding of the Transact-SQL language which is used by all SQL Server-related disciplines; namely, Database Administration, Database Development and Business Intelligence. As such, the primary target audience for this course is: Database Administrators, Database Developers and BI professionals.
At course completion
After completing this course, students will be able to:
• Describe key capabilities and components of SQL Server.
• Describe T-SQL, sets, and predicate logic.
• Write a single table SELECT statement.
• Write a multi-table SELECT statement.
• Write SELECT statements with filtering and sorting.
• Describe how SQL Server uses data types.
• Write DML statements.
• Write queries that use built-in functions.
• Write queries that aggregate data.
• Write subqueries.
• Create and implement views and table-valued functions.
• Use set operators to combine query results.
• Write queries that use window ranking, offset, and aggregate functions.
• Transform data by implementing pivot, unpivot, rollup and cube.
• Create and implement stored procedures.
• Add programming constructs such as variables, conditions, and loops to T-SQL code.
Course Outline
Module 1: Introduction to Microsoft SQL Server
This module introduces SQL Server, the versions of SQL Server, including cloud versions, and how to connect to SQL Server using SQL Server Management Studio.
Lessons
• The Basic Architecture of SQL Server
• SQL Server Editions and Versions
• Getting Started with SQL Server Management Studio
Lab: Working with SQL Server Tools
• Working with SQL Server Management Studio
• Creating and Organizing T-SQL Scripts
• Using Books Online
After completing this module, you will be able to:
• Describe relational databases and Transact-SQL queries.
• Describe the on-premise and cloud-based editions and versions of SQL Server.
• Describe how to use SQL Server Management Studio (SSMS) to connect to an instance of SQL Server, explore the databases contained in the instance, and work with script files that contain T-SQL queries.
Module 2: Introduction to T-SQL Querying
This module describes the elements of T-SQL and their role in writing queries. Describe the use of sets in SQL Server. Describe the use of predicate logic in SQL Server. Describe the logical order of operations in SELECT statements.
Lessons
• Introducing T-SQL
• Understanding Sets
• Understanding Predicate Logic
• Understanding the Logical Order of Operations in SELECT statements
Lab: Introduction to T-SQL Querying
• Executing Basic SELECT Statements
• Executing Queries that Filter Data using Predicates
• Executing Queries That Sort Data Using ORDER BY
After completing this module, you will be able to:
• Describe the role of T-SQL in writing SELECT statements.
• Describe the elements of the T-SQL language and which elements will be useful in writing queries.
• Describe the concepts of the set theory, one of the mathematical underpinnings of relational databases, and to help you apply it to how you think about querying SQL Server
• Describe predicate logic and examine its application to querying SQL Server.
• Explain the elements of a SELECT statement, delineate the order in which the elements are evaluated, and then apply this understanding to a practical approach to writing queries.
Module 3: Writing SELECT Queries
This module introduces the fundamentals of the SELECT statement, focusing on queries against a single table.
Lessons
• Writing Simple SELECT Statements
• Eliminating Duplicates with DISTINCT
• Using Column and Table Aliases
• Writing Simple CASE Expressions
Lab: Writing Basic SELECT Statements
• Writing Simple SELECT Statements
• Eliminating Duplicates Using DISTINCT
• Using Column and Table Aliases
• Using a Simple CASE Expression
After completing this module, you will be able to:
• Describe the structure and format of the SELECT statement, as well as enhancements that will add functionality and readability to your queries
• Describe how to eliminate duplicates using the DISTINCT clause
• Describe the use of column and table aliases
• Understand and use CASE expressions
Module 4: Querying Multiple Tables
This module describes how to write queries that combine data from multiple sources in Microsoft SQL Server.
Lessons
• Understanding Joins
• Querying with Inner Joins
• Querying with Outer Joins
• Querying with Cross Joins and Self Joins
Lab: Querying Multiple Tables
• Writing Queries that use Inner Joins
• Writing Queries that use Multiple-Table Inner Joins
• Writing Queries that use Self-Joins
• Writing Queries that use Outer Joins
• Writing Queries that use Cross Joins
After completing this module, you will be able to:
• Explain the fundamentals of joins in SQL Server
• Write inner join queries
• Write queries that use outer joins
• Use additional join types
Module 5: Sorting and Filtering Data
This module describes how to implement sorting and filtering.
Lessons
• Sorting Data
• Filtering Data with Predicates
• Filtering Data with TOP and OFFSET-FETCH
• Working with Unknown Values
Lab: Sorting and Filtering Data
• Writing Queries that Filter Data using a WHERE Clause
• Writing Queries that Sort Data Using an ORDER BY Clause
• Writing Queries that Filter Data Using the TOP Option
• Write Queries that filter data using the OFFSET-FETCH clause
.
After completing this module, you will be able to:
• Explain how to add an ORDER BY clause to your queries to control the order of rows displayed in your query's output
• Explain how to construct WHERE clauses to filter out rows that do not match the predicate.
• Explain how to limit ranges of rows in the SELECT clause using a TOP option.
• Explain how to limit ranges of rows using the OFFSET-FETCH option of an ORDER BY clause.
• Explain how three-valued logic accounts for unknown and missing values, how SQL Server uses NULL to mark missing values, and how to test for NULL in your queries.
Module 6: Working with SQL Server Data Types
This module introduces the data types SQL Server uses to store data.
Lessons
• Introducing SQL Server Data Types
• Working with Character Data
• Working with Date and Time Data
Lab: Working with SQL Server Data Types
• Writing Queries that Return Date and Time Data
• Writing Queries that use Date and Time Functions
• Writing Queries That Return Character Data
• Writing Queries That Return Character Functions
After completing this module, you will be able to:
• Explore many of the data types SQL Server uses to store data and how data types are converted between types
• Explain the SQL Server character-based data types, how character comparisons work, and some common functions you may find useful in your queries
• Describe data types that are used to store temporal data, how to enter dates and times so they will be properly parsed by SQL Server, and how to manipulate dates and times with built-in functions.
Module 7: Using DML to Modify Data
This module describes how to create DML queries, and why you would want to.
Lessons
• Adding Data to Tables
• Modifying and Removing Data
• Generating automatic column values
Lab: Using DML to Modify Data
• Inserting Records with DML
• Updating and Deleting Records Using DML
After completing this module, you will be able to:
• Use INSERT and SELECT INTO statements
• Use UPDATE, MERGE, DELETE, and TRUNCATE.
Module 8: Using Built-In Functions
This module introduces some of the many built in functions in SQL Server.
Lessons
• Writing Queries with Built-In Functions
• Using Conversion Functions
• Using Logical Functions
• Using Functions to Work with NULL
Lab: Using Built-In Functions
• Writing Queries That Use Conversion Functions
• Writing Queries that use Logical Functions
• Writing Queries that Test for Nullability
After completing this module, you will be able to:
• Describe the types of functions provided by SQL Server, and then focus on working with scalar functions
• Explain how to explicitly convert data between types using several SQL Server functions
• Describe how to use logical functions that evaluate an expression and return a scalar result.
• Describe additional functions for working with NULL
Module 9: Grouping and Aggregating Data
This module describes how to use aggregate functions.
Lessons
• Using Aggregate Functions
• Using the GROUP BY Clause
• Filtering Groups with HAVING
Lab: Grouping and Aggregating Data
• Writing Queries That Use the GROUP BY Clause
• Writing Queries that Use Aggregate Functions
• Writing Queries that Use Distinct Aggregate Functions
• Writing Queries that Filter Groups with the HAVING Clause
After completing this module, you will be able to:
• Describe the built-in aggregate function in SQL Server and write queries using it.
• Write queries that separate rows using the GROUP BY clause.
• Write queries that use the HAVING clause to filter groups.
Module 10: Using Subqueries
This module describes several types of subquery and how and when to use them.
Lessons
• Writing Self-Contained Subqueries
• Writing Correlated Subqueries
• Using the EXISTS Predicate with Subqueries
Lab: Using Subqueries
• Writing Queries That Use Self-Contained Subqueries
• Writing Queries That Use Scalar and Multi-Result Subqueries
• Writing Queries That Use Correlated Subqueries and an EXISTS Clause
After completing this module, you will be able to:
• Describe where subqueries may be used in a SELECT statement.
• Write queries that use correlated subqueries in a SELECT statement
• Write queries that use EXISTS predicates in a WHERE clause to test for the existence of qualifying rows
• Use the EXISTS predicate to efficiently check for the existence of rows in a subquery.
Module 11: Using Table Expressions
Previously in this course, you learned about using subqueries as an expression that returned results to an outer calling query. Like subqueries, table expressions are query expressions, but table expressions extend this idea by allowing you to name them and to work with their results as you would work with data in any valid relational table. Microsoft SQL Server supports four types of table expressions: derived tables, common table expression (CTEs), views, and inline table-valued functions (TVFs). In this module, you will learn to work with these forms of table expressions and learn how to use them to help create a modular approach to writing queries.
Lessons
• Using Views
• Using Inline Table-Valued Functions
• Using Derived Tables
• Using Common Table Expressions
Lab: Using Table Expressions
• Writing Queries That Use Views
• Writing Queries That Use Derived Tables
• Writing Queries That Use Common Table Expressions (CTEs)
• Writing Queries That Use Inline Table-Valued Expressions (TVFs)
After completing this module, you will be able to:
• Write queries that return results from views.
• Use the CREATE FUNCTION statement to create simple inline TVFs.
• Write queries that create and retrieve results from derived tables.
• Write queries that create CTEs and return results from the table expression.
Module 12: Using Set Operators
This module introduces how to use the set operators UNION, INTERSECT, and EXCEPT to compare rows between two input sets.
Lessons
• Writing Queries with the UNION operator
• Using EXCEPT and INTERSECT
• Using APPLY
Lab: Using Set Operators
• Writing Queries That Use UNION Set Operators and UNION ALL
• Writing Queries That Use CROSS APPLY and OUTER APPLY Operators
• Writing Queries That Use the EXCEPT and INTERSECT Operators
After completing this module, students will be able to:
• Write queries that use UNION to combine input sets.
• Write queries that use UNION ALL to combine input sets
• Write queries that use the EXCEPT operator to return only rows in one set but not another.
• Write queries that use the INTERSECT operator to return only rows that are present in both sets
• Write queries using the CROSS APPLY operator.
• Write queries using the OUTER APPLY operator
Module 13: Using Windows Ranking, Offset, and Aggregate Functions
This module describes the benefits to using window functions. Restrict window functions to rows defined in an OVER clause, including partitions and frames. Write queries that use window functions to operate on a window of rows and return ranking, aggregation, and offset comparison results.
Lessons
• Creating Windows with OVER
• Exploring Window Functions
Lab: Using Windows Ranking, Offset, and Aggregate Functions
• Writing Queries that use Ranking Functions
• Writing Queries that use Offset Functions
• Writing Queries that use Window Aggregate Functions
After completing this module, students will be able to:
• Describe the T-SQL components used to define windows, and the relationships between them.
• Write queries that use the OVER clause, with partitioning, ordering, and framing to define windows
• Write queries that use window aggregate functions.
• Write queries that use window ranking functions.
• Write queries that use window offset functions
Module 14: Pivoting and Grouping Sets
This module describes write queries that pivot and unpivot result sets. Write queries that specify multiple groupings with grouping sets
Lessons
• Writing Queries with PIVOT and UNPIVOT
• Working with Grouping Sets
Lab: Pivoting and Grouping Sets
• Writing Queries that use the PIVOT Operator
• Writing Queries that use the UNPIVOT Operator
• Writing Queries that use the GROUPING SETS CUBE and ROLLUP Subclauses
After completing this module, students will be able to:
• Describe how pivoting data can be used in T-SQL queries.
• Write queries that pivot data from rows to columns using the PIVOT operator.
• Write queries that unpivot data from columns back to rows using the UNPIVOT operator.
• Write queries using the GROUPING SETS subclause.
• Write queries that use ROLLUP AND CUBE.
• Write queries that use the GROUPING_ID function.
Module 15: Executing Stored Procedures
This module describes how to return results by executing stored procedures. Pass parameters to procedures. Create simple stored procedures that encapsulate a SELECT statement. Construct and execute dynamic SQL with EXEC and sp_executesql.
Lessons
• Querying Data with Stored Procedures
• Passing Parameters to Stored procedures
• Creating Simple Stored Procedures
• Working with Dynamic SQL
Lab: Executing Stored Procedures
• Using the EXECUTE statement to Invoke Stored Procedures
• Passing Parameters to Stored procedures
• Executing System Stored Procedures
After completing this module, students will be able to:
• Describe stored procedures and their use.
• Write T-SQL statements that execute stored procedures to return data.
• Write EXECUTE statements that pass input parameters to stored procedures.
• Write T-SQL batches that prepare output parameters and execute stored procedures.
• Use the CREATE PROCEDURE statement to write a stored procedure.
• Create a stored procedure that accepts input parameters.
• Describe how T-SQL can be dynamically constructed.
• Write queries that use dynamic SQL.
Module 16: Programming with T-SQL
This module describes how to enhance your T-SQL code with programming elements.
Lessons
• T-SQL Programming Elements
• Controlling Program Flow
Lab: Programming with T-SQL
• Declaring Variables and Delimiting Batches
• Using Control-Of-Flow Elements
• Using Variables in a Dynamic SQL Statement
• Using Synonyms
After completing this module, students will be able to:
• Describe how Microsoft SQL Server treats collections of statements as batches.
• Create and submit batches of T-SQL code for execution by SQL Server.
• Describe how SQL Server stores temporary objects as variables.
• Write code that declares and assigns variables.
• Create and invoke synonyms
• Describe the control-of-flow elements in T-SQL.
• Write T-SQL code using IF...ELSE blocks.
• Write T-SQL code that uses WHILE.
Module 17: Implementing Error Handling
This module introduces error handling for T-SQL.
Lessons
• Implementing T-SQL error handling
• Implementing structured exception handling
Lab: Implementing Error Handling
• Redirecting errors with TRY/CATCH
• Using THROW to pass an error message back to a client
After completing this module, students will be able to:
• Implement T-SQL error handling.
• Implement structured exception handling.
Module 18: Implementing Transactions
This module describes how to implement transactions.
Lessons
• Transactions and the database engines
• Controlling transactions
Lab: Implementing Transactions
• Controlling transactions with BEGIN, COMMIT, and ROLLBACK
• Adding error handling to a CATCH block
After completing this module, students will be able to:
• Describe transactions and the differences between batches and transactions.
• Describe batches and how they are handled by SQL Server.
• Create and manage transactions with transaction control language (TCL) statements.
• Use SET XACT_ABORT to define SQL Servers handling of transactions outside TRY/CATCH blocks.
Prerequisites
• Basic knowledge of the Microsoft Windows operating system and its core functionality.
• Working knowledge of relational databases.
Este treinamento é composto pelos seguintes cursos:
1. Course AZ-100T01-A: Managing Subscriptions and Resources (Carga: 8h)
2. Course AZ-100T02-A: Implementing and Managing Storage (Carga: 8h)
3. Course AZ-100T03-A: Deploying and Managing Virtual Machines (Carga: 8h)
4. Course AZ-100T04-A: Configure and Manage Virtual Networks (Carga: 8h)
5. Course AZ-100T05-A: Manage Identities (Carga: 8h)
_____________________________________
Segue abaixo a descrição dos cursos:
1. Course AZ-100T01-A: Managing Subscriptions and Resources
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
This course teaches IT Professionals how to manage their Azure subscriptions, including access, policies, and compliance, as well as how to track and estimate service usage and related costs. Students also learn how cloud resources are managed in Azure through user and group accounts. Students learn how to grant appropriate access to Azure AD users, groups, and services through Role-based access control (RBAC). Students also discover the core monitoring tools and capabilities provided by Azure, including Azure Alerts and Activity Log. Students are then introduced to Log Analytics as a broad data analytics solution and use this service to query and analyze operational data. Students then learn about the Azure Resource Manager deployment model, and how to work with resources, resource groups and ARM templates.
Because this course is the first course in the series for the Azure Administrator exams, there is a considerable amount of foundational content that is covered here in order to prepare students for the remaining courses in the curriculum. So students are provided with a lesson that covers tips and tricks for working in the Azure portal, as well as an introduction to key tools used in the Azure environment, such as the Cloud Shell and Resource Explorer. Emphasis is laid on PowerShell and the command line interface (CLI) as important skills to acquire not only in preparation for the exam but for the job role itself.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient, they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Manage Azure subscriptions and billing and implement Azure policies.
• Implement access management with Azure users, groups, and role-based access control.
• Use Azure Monitor to configure Azure alerts and review the Azure Activity Log.
• Query and analyze Log Analytics data.
• Deploy resources with ARM templates and organize Azure resources.
• Optimize your use of Azure tools like the Azure portal, Azure PowerShell, Cloud Shell and the Azure CLI.
Course Outline
Module 1: Managing Azure Subscriptions
In this module, you’ll learn about the components that make up an Azure subscription and how management groups are used to organize subscriptions into containers to allow you to control organizational governance and policy management across subscriptions. As well as learning about the different available types of subscription, you’ll see how to apply tags to your Azure resources to logically organize them by categories.
Lessons
• Overview of Azure Subscriptions
• Billing
• Azure Policy
After completing this module, students will be able:
• Manage Azure subscriptions and billing and implement Azure policies.
Module 2: Access Management for Cloud Resources
In this module you will learn the basics of role-based access control as it applies to users and groups. Focus on the administrator role and how it used in Azure.
Lessons
• Azure Users and Groups
• Role-based Access Control
After completing this module, students will be able:
• Implement access management with Azure users, groups, and role-based access control.
Module 3: Monitoring and Diagnostics
In this module, you learn about the Azure Monitor and the many capabilities to ensure your Azure architecture is working correctly. Monitoring skills are explained in this first course and then demonstrated in the following courses. The two main elements explained in this module are Azure Alerts and Azure Activity Log.
Lessons
• Exploring Monitoring Capabilities in Azure
• Azure Alerts
• Azure Activity Log
After completing this module, students will be able:
• Use Azure Monitor to configure Azure alerts and review the Azure Activity Log.
Module 4: Log Analytics
In this module, you will focus on Log Analytics. Log Analytics provides a way for you to collect, analyze, and query all types of connected data. It is a very powerful tool.
Lessons
• Introduction to Log Analytics
• Querying and Analyzing Log Analytics Data
After completing this module, students will be able:
• Query and analyze Log Analytics data.
Module 5: Azure Resource Manager
In this module, you will learn about how resources are organized into resource groups and how ARM templates are used to deploy those resources. This module introduces the concepts and then they are applied in the other courses.
Lessons
• ARM templates
• Resource Groups
After completing this module, students will be able:
• Deploy resources with ARM templates and organize Azure resources.
Module 6: Azure Tips, Tricks, and Tools
This module is provided to help you get the most from your administrative tools. This include the Azure Portal, Cloud Shell, Azure CLI, Azure PowerShell, and Resource Explorer.
Lessons
• Azure Portal
• Azure Tools and Environment
After completing this module, students will be able:
• Optimize your use of Azure tools like the Azure portal, Azure PowerShell, Cloud Shell and the Azure CLI.
Module 7: Lab-Manage Azure Subscriptions and Resources
• This module is provided to give you hands-on experience with the information provided in the course.
Lab : Manage Azure Subscriptions and Resources
• Configure delegation of provisioning and management of Azure resources.
• Verify delegation by provisioning Azure resources.
After completing this module, students will be able to:
•
• Configure delegation of provisioning and management of Azure resources by using built-in Role-Based (RBAC) roles and built-in Azure policies.
• Verify delegation by provisioning Azure resources as a delegated admin and auditing provisioning events.
Prerequisites
Successful Cloud Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
2. Course AZ-100T02-A: Implementing and Managing Storage
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
Thiscourse teaches IT Professionals how to implement Azure storage solutions for a variety of scenarios. Students learn aboutthe different storage accounts and services as well as basic data replication concepts and available replication schemes. Students are also introduced to Storage Explorer as a convenient way to work with Azure storage data. Students also learn the types of storage and how to work with managed and custom disks.
Azure blob storage is how Azure stores unstructured data in the cloud, and students learn how to work with blobs and blob containers. They also learn how to use Azure Files to work with file shares that are accessed via the Server Message Block (SMB) protocol. In addition to blob storage, the course covers Table and Queue storage as storage options for structured data.
Students then learn how to secure and manage storage using Shared Access Signatures (SAS) and Azure Backup, using Recovery ServicesVault. Next, students learn how to use Azure File Sync to centralize an organization’s file Shares in Azure Files. Content Delivery Network (CDN) is used to store cached content on a distributed network of servers that are close to end users. Studentslearn how to optimize content delivery with Azure CDN, as wellas how to transfer large amounts of data using the Azure Import/Export service.
Lastly, students learn how to monitor Azure storage by configuring metrics and alerts and using the Activity Log. Students learn how to analyze usage trends, trace requests, and diagnose issues with a storage account.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient, they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Create Azure storage accounts for different data replication, pricing, and content scenarios.
• Implement virtual machine storage, blob storage, Azure files, and structured storage.
• Secure and manage storage with shared access keys, Azure backup, and Azure File Sync.
• Store and access data using Azure Content Delivery Network, and the Import and Export service.
• Monitor Azure storage with metrics and alerts, and the Activity Log.
Course Outline
Module 1: Overview of Azure Storage
In this module, you’ll learn about storage accounts – Standard and Premium – as well as storage endpoints and how to configure custom domain accounts. You’ll have an opportunity to practice creating and managing storage accounts. The module also covers data replication and provides a comparison of the different available replication schemes. You’ll be introduced to Azure Storage Explorer, a utility that lets you easily work with and manipulate Azure Storage data.
Lessons
• Azure storage accounts
• Data replication
• Azure Storage Explorer
After completing this module, students will be able to:
• Create Azure storage accounts for different data replication, pricing, and content scenarios.
Module 2: Storage Services
In this module, you’ll learn about the disks component of Azure Storage as it relates to virtual machines. Disks are how virtual machines store their VHD files. You will learn about the types of disks and storage and how Azure simplifies IaaS disk management by creating and managing the storage accounts associated with the virtual machine disks. You will also learn about how Azure blob storage stores unstructured data in the cloud as objects, or blobs (BLOB = binary large object). And you’ll explore Azure Files, which offers fully managed file shares in the cloud that are accessible via the Server Message Block (SMB) protocol. The other file storage options covered in the module are Tables and Queues for structured storage.
Lessons
• Virtual machine storage
• Blob storage
• Azure files
• Structured storage
After completing this module, students will be able to:
• Implement virtual machine storage, blob storage, Azure files, and structured storage.
Module 3: Securing and Managing Storage
In this module, discover how a shared access signature (SAS) can be used to provide delegated access to resources in storage accounts, allowing clients access to those resources with sharing the storage account keys. You’ll also learn how to use Azure backup as a cloud-based solution for an existing on-premises or off-site backup and data protection solution. This module also covers Azure File Sync as a way to centralize an organization’s file shares in Azure Files and using Windows Server to cache the Azure file share locally, thus enabling scenarios such as “lift and shift,” backup and disaster recovery, and file archiving.
Lessons
• Shared access keys
• Azure backup
• Azure File Sync
After completing this module, students will be able to:
•
• Secure and manage storage with shared access keys, Azure backup, and Azure File Sync.
Module 4: Storing and Accessing Data
In this module, you’ll learn about using a content delivery network (CDN) to deliver cached content that is stored on a distributed network of edge servers closer to end-users. You’ll also learn how to transfer large amount of data to and from the cloud using the Azure Import/Export service and Azure Data Box.
Lessons
• Azure Content Delivery Network
• Import and Export service
• Data Box
After completing this module, students will be able to:
• Store and access data using Azure Content Delivery Network, the Import and Export service, and Data Box.
Module 5: Monitoring Storage
In this module, you will learn techniques for monitoring the health of Azure storage. With metrics and alerts you can check a variety of performance metrics and send notifications to your system administrator team. With the Activity Log you can search and query for specific events, even across subscriptions.
Lessons
• Metrics and Alerts
• Activity Log
After completing this module, students will be able to:
• Monitor Azure storage with metrics and alerts, and the Activity Log.
Module 6: Lab-Implement and Manage Storage
This module is provided to give you hands-on experience with the information provided in the course.
Lab : Implement and Manage Storage
• Prepare the lab environment.
• Implement and use Azure Blob storage.
• Implement and use Azure File storage.
After completing this module, you will be able to:
• Implement and use Blob storage.
• Implement and use File storage.
Prerequisites
Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
3. Course AZ-100T03-A: Deploying and Managing Virtual Machines
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
This course teaches IT Professionals how to create and manage virtual machines as part of an Infrastructure as a Service (IaaS) computing infrastructure. Students learn how to assess their on-premises environment for virtual machine readiness in preparation for moving resources to the cloud, including sizing, pricing, and design considerations.
Students also learn how to create and deploy virtual machines in Azure, using the Azure portal, PowerShell, and ARM templates. The course includes instruction on deploying custom images and Linux virtual machines. Students also learn how to configure the networking and storage components of virtual machines. Deploying highly available virtual machines is critical in the light of planned and unplanned events, and students learn how to use availability sets to ensure that virtual machine resources are available during downtime. Students also learn how to use extensions and Desired State Configuration (DSC) for post deployment automation and configuration tasks.
Finally, students learn how to perform virtual machine backups, and to use Azure’s monitoring capabilities to collect, view, and analyze virtual machine diagnostic and log data.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient, they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Explain virtual machine usage cases, storage options, pricing, operating systems, networking capabilities, and general planning considerations.
• Create Windows virtual machines in the Azure Portal, with Azure PowerShell, or using ARM Templates.
• Deploy custom server images and Linux virtual machines.
• Configure virtual machine networking and storage options.
• Implement virtual machine high availability, scalability, and custom scripts extensions.
• Backup, restore, and monitor virtual machines.
Course Outline
Module 1: Overview of Azure Machines
In this module, you’ll will be introduced to Azure virtual machines. What are virtual machines and what operating systems are supported? How can you determine if your existing virtual machines can be supported in Azure? What pricing and sizing options are available?
Lessons
• Azure Virtual Machines Overview
• Planning Considerations
After completing this module, students will be able to:
• Explain virtual machine usage cases, storage options, pricing, operating systems, networking capabilities, and general planning considerations.
Module 2: Creating Virtual Machines
In this module, you will learn how to create and configure Windows virtual machines. You will practice in the Azure portal, in Azure PowerShell, and with ARM templates.
Lessons
• Overview of the Virtual Machine Creation Overview
• Creating Virtual Machines in the Azure Portal
• Creating Virtual Machines (PowerShell)
• Creating Virtual Machines using ARM Templates
After completing this module, students will be able to:
• Create Windows virtual machines in the Azure Portal, with Azure PowerShell, or using ARM Templates.
Module 3: Deploying Virtual Machine Images
In this module, you will learn how to create custom virtual machines in Azure. For example, deploying a server image that is in your on-premises datacenter. You will also learn how to create and connect to Linux virtual machines.
Lessons
• Deploying Custom Images
• Deploying Linux Virtual Machines
After completing this module, students will be able to:
• Deploy custom server images and Linux virtual machines.
Module 4: Configuring Virtual Machines
In this module, you will learn about the two main configuration areas for virtual machines: networking and storage. In the networking lesson, we will cover IP addressing, network interfaces, and network security groups. In the storage lesson, we will cover virtual machine disks, managed disks, attaching/detaching disks, and uploading disks.
Lessons
• Overview of Virtual Machine Configuration
• Virtual Machine Networking
• Virtual Machine Storage
After completing this module, students will be able to:
• Configure virtual machine networking and storage options.
Module 5: Configuring Availability and Extensibility
In this module, you will learn how to keep your virtual machines highly available with update and fault domains, and availability sets. You will also learn how to use scale sets to increase and decrease the number of the virtual machines as the workload changes. Lastly, virtual machines can be extended through custom scripts and Desired State Configuration.
Lessons
• Virtual Machine Availability
• Virtual Machine Scalability
• Applying Virtual Machine Extensions
After completing this module, students will be able to:
• Implement virtual machine high availability, scalability, and custom scripts extensions.
Module 6: Managing and Monitoring Virtual Machines
In this module, you will learn the very important tasks of backing up your virtual machines and monitoring their overall health. You will practice backing up and restoring virtual machines. You will learn about monitoring, diagnostics, and Azure Advisor.
Lessons
• Backup and Restore
• Monitoring Virtual Machines
After completing this module, students will be able to:
• Backup, restore, and monitor virtual machines.
Module 7: Lab - Deploy and Manage Virtual Machines
This module is provided to give you hands-on experience with the information provided in the course.
Lab : Deploy and Manage Virtual Machines
• Deploy virtual machines.
• Configure networking setting for virtual machines.
• Configure Azure virtual machine scale sets.
After completing this module, you will be able to:
• Deploy Azure VMs by using the Azure portal, Azure PowerShell, and Azure Resource Manager templates.
• Configure networking settings of Azure VMs running Windows and Linux operating systems.
• Deploy and configure Azure VM scale sets.
Prerequisites
Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
4. Course AZ-100T04-A: Configure and Manage Virtual Networks
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
This course teaches IT Professional how to configure and manage Azure virtual networks (VNets). The benefits of moving an infrastructure to the cloud, removing the need to maintain expensive datacenters are an appealing proposition for many small and medium-sized companies. Regardless, once resources are moved to Azure, they require the same networking functionality as an on-premises deployment, and this course deals with the basic network configuration tasks.
Students review the basis of IP addressing, with specific emphasis on how public and private IP addressing works in the cloud. Students learn how to configure network routing and how to implement Azure DNS.
Securing the network infrastructure is of key importance and students learn how to use Network Security Groups (NSGs) to limit network traffic to resources in a virtual network, by creating security rules that allow or deny inbound or outbound traffic. Students also learn how to use NSG logging to diagnose and troubleshoot network connectivity problems.
The course also covers different connectivity scenarios for Azure virtual networks and students learn how to connect virtual networks with VNet-to-VNet VPN gateways and virtual network peering.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient, they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Understand virtual networking components, IP addressing, and network routing options.
• Implement Azure DNS domains, zones, record types, and resolution methods.
• Configure network security groups, service endpoints, logging, and network troubleshooting.
• Implement site connectivity schemas including VNet-to-VNet connections and virtual network peering.
Course Outline
Module 1: Azure Virtual Networks
In this module, you’ll will be introduced to Azure virtual networks. What are virtual networks and how are they organized? How do you create and configure virtual networks with templates, PowerShell, CLI, or the Azure portal? What is the difference between public, private, static, and dynamic IP addressing? How are system routes, routing tables, and routing algorithms used?
Lessons
• Introducing Virtual Networks
• Creating Azure Virtual Networks
• Review of IP Addressing
• Network Routing
After completing this module, students will be able to:
• Understand virtual networking components, IP addressing, and network routing options.
Module 2: Azure DNS
In this module, you will learn about DNS basics and specifically implementing Azure DNS. In the DNS Basics lesson you will review DNS domains, zones, record types, and resolution methods. In the Azure DNS lesson, we will cover delegation, metrics, alerts, and DNS hosting schemes.
Lessons
• Azure DNS Basics
• Implementing Azure DNS
After completing this module, students will be able to:
• Implement Azure DNS domains, zones, record types, and resolution methods.
Module 3: Securing Virtual Network Resources
In this module, you will learn primarily about Network Security Groups (NSGs) including NSG rules and NSG scenarios. You will also learn how to implement NSGs considering service endpoints, logging, troubleshooting, and other network traffic.
Lessons
• Introduction to Network Security Groups
• Implementing Network Security Groups and Service Endpoints
After completing this module, students will be able to:
• Configure network security groups, service endpoints, logging, and network troubleshooting.
Module 4: Connecting Virtual Networks
In this module, you will learn about two specific types of intersite connectivity: VNet-to-VNet connections and VNet Peering. In both cases, you will learn when to choose which connectivity method, and how to implement and configure the method.
Lessons
• Intersite Connectivity (VNet-to-VNet Connections)
• Virtual Network Peering
After completing this module, students will be able to:
• Implement site connectivity schemas including VNet-to-VNet connections and virtual network peering.
Module 5: Lab - Configure and Manage Virtual Networks
This module is provided to give you hands-on experience with the information provided in the course.
Lab : Configure and Manage Virtual Networks
• Prepare the lab environment.
• Configure VNet peering.
• Implement custom routing.
• Validating service chaining.
After completing this module, you will be able to:
• Configure VNet peering.
• Implement custom routing.
• Validate service chaining.
Prerequisites
Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
5. Course AZ-100T05-A: Manage Identities
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
This course teaches IT Professional how to use Azure Active Directory (AD) to provide employees and customers with a multi-tenant cloud-based directory and identity management system. Students will learn the differences between Azure AD and Active Directory Domain Services (AD DS), as well the differences in functionality offered by the different editions of Azure AD. Students also learn how to configure self-service password reset, or to use the option of password writeback to reset user passwords regardless of their location. Students are then introduced to Azure AD Identity Protection and learn how they can use it to protect their organizations from compromised accounts, identity attacks, and configuration issues. Students also learn how to integrate Azure AD with the many Software as a Service (SaaS) applications that are used, in order to secure user access to those applications.
Next, the concepts of Azure domains and tenants, and users and groups are explained and students learn how to work with the various Azure AD objects. Students are introduced to Azure role-based access control to be able to provide a more granular access based on the principle of least privilege. An administrator, or user, can do exactly the task they need to accomplish; no more, no less. Students also learn how to work with Azure joined devices and Hybrid AD joined devices, enabling their users to be productive wherever and whenever – but ensuring that corporate assets are protected and that devices meet security and compliance standards.
Students learn how to use Azure AD Connect to integrate their on-premises directories with Azure AD, providing a common identity for their users of Office 365, Azure, and SaaS applications integrated with Azure AD. Lastly, students also learn how to use Azure AD Application Proxy to be able to provide their users with remote access to web application that are published on-premises, such as SharePoint sites, Outlook Web Access, or any other line of business (LOB) applications the organization has.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Implement Azure Active Directory, Self-Service Password Reset, Azure AD Identity Protection, and integrated SaaS applications.
• Configure domains and tenants, users and groups, roles, and devices.
• Implement and manage Azure Active Directory integration options and Azure AD Application Proxy.
Course Outline
Module 1: Managing Azure Active Directory
In this module, you’ll will be introduced to Azure Active Directory. What is Azure Active Directory and how is it different from Active Directory Domain Services? What is Self-Service Password Reset and how is it configured? How can Azure AD Identity protection improve your security posture. How do you integrate SaaS applications with Azure AD?
Lessons
• Azure Active Directory Overview
• Self-Service Password Reset
• Azure AD Identity Protection
• Integrating SaaS Applications with Azure AD
After completing this module, students will be able to:
• Implement Azure Active Directory, Self-Service Password Reset, Azure AD Identity Protection, and integrated SaaS applications.
Module 2: Managing Azure Active Directory Objects
In this module, you will learn the basics of implementing Azure AD objects. These objects include domains and tenants, users and groups, roles, and devices. In each lesson you will practice how to configure these objects through the portal and with Azure PowerShell. The Azure roles lesson will be your introduction to role-based access control.
Lessons
• Azure Domains and Tenants
• Azure Users and Groups
• Azure Roles
• Managing Devices
After completing this module, students will be able to:
• Configure domains and tenants, users and groups, roles, and devices.
Module 3: Implementing and Managing Hybrid Identities
In this module, you will learn how to integrate Active Directory with your existing infrastructure. You will learn about different authentication options like AD Connect, Single Sign On, and Pass-through authentication. You will also learn how to configure Azure AD Application Proxy and how it is used.
Lessons
• Azure Active Directory Integration Options
• Azure AD Application Proxy
After completing this module, students will be able to:
• Implement and manage Azure Active Directory integration options and Azure AD Application Proxy.
Module 4: Lab - Implement and Manage Hybrid Identities
This module is provided to give you hands-on experience with the information provided in the course.
Lab : Implement and Manage Hybrid Identities
• Deploy a VM with an AD domain controller
• Create and configure an Azure AD tenant
• Synchronize an AD forest with an Azure AD tenant
After completing this module, you will be able to:
• Deploy an Azure VM hosting an Active Directory domain controller.
• Create and configure an Azure Active Directory tenant.
• Synchronize Active Directory forest with an Azure Active Directory tenant.
Prerequisites
Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
Overview
Type: Course
Audience(s): Developer
Technology: Cross-Platform Development
Level: Advanced
This Revision: D
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
In this course, students will learn how to design and develop services that access local and remote data from various sources. Students will also learn how to develop and deploy services to hybrid environments, including on-premises servers and Microsoft Azure.
Audience profile
Primary: .NET developers who want to learn how to develop services and deploy them to hybrid environments.
Secondary: .NET developers with Web application development experience who are exploring developing new applications or porting existing applications to Microsoft Azure.
At course completion
After completing this course, students will be able to:
• Describe the basic concepts of service development and data access strategies using the .NET platform.
• Describe the Microsoft Azure cloud platform and its compute, data, and application hosting offerings.
• Design and develop a data-centric application using Visual Studio 2017 and Entity Framework Core.
• Design, implement, and consume HTTP services using ASP.NET Core.
• Extend HTTP services using ASP.NET Core.
• Host services on-premises and in Microsoft Azure.
• Deploy services to both on-premises and cloud environments and manage the interface and policy for their services.
• Choose a data storage solution, cache, distribute, and synchronize data.
• Monitor, log, and troubleshoot services.
• Describe claim-based identity concepts and standards, and implement authentication and authorization with Azure Active Directory.
• Create scalable service applications.
Course Outline
Module 1: Overview of service and cloud technologies
This module provides an overview of service and cloud technologies using the Microsoft .NET Core and the Azure. The first lesson, “Key Components of Distributed Applications,” discusses characteristics that are common to distributed systems, regardless of the technologies they use. Lesson 2, “Data and Data Access Technologies” describes how data is used in distributed applications. Lesson 3, “Service Technologies,” discusses two of the most common protocols in distributed system and the .NET Core technologies used to develop services based on those protocols. Lesson 4, “Cloud Computing,” describes cloud computing and how it is implemented in Azure.
Lessons
• Key Components of Distributed Applications
• Data and Data Access Technologies
• Service Technologies
• Cloud Computing
• Manipulating Data
Lab : Exploring the Work Environment
• Creating an ASP.NET Core project
• Create a simple Entity Framework model
• Create a web API class
• Deploy the web application to Azure
After completing this module, students will be able to:
• Explain services architecture and hosting environments
• Explain cloud computing and the Microsoft Azure cloud platform
• Explain data access strategies
Module 2: Querying and Manipulating Data Using Entity Framework
In this module, you will learn about the Entity Framework data model, and about how to create, read, update, and delete data. Entity Framework is a rich object-relational mapper, which provides a convenient and powerful application programming interface (API) to manipulate data. This module focuses on the Code First approach with Entity Framework.
Lessons
• ADO.NET Overview
• Creating an Entity Data Model
• Querying Data
Lab : Creating a Data Access Layer using Entity Framework
• Creating a data model
• Query the Database
Lab : Manipulating Data
• Create repository methods
• Test the model using SQL Server and SQLite
After completing this module, students will be able to:
• Describe basic objects in ADO.NET and explain how asynchronous operations work.
• Create an Entity Framework Core data model.
• Query data by using Entity Framework Core.
• Insert, delete, and update entities by using Entity Framework Core.
Module 3: Creating and Consuming ASP.NET Core Web APIs
ASP.NET Core Web API provides a robust and modern framework for creating Hypertext Transfer Protocol (HTTP)-based services. In this module, you will be introduced to the HTTP-based services. You will learn how HTTP works and become familiar with HTTP messages, HTTP methods, status codes, and headers. You will also be introduced to the Representational State Transfer (REST) architectural style and hypermedia. You will learn how to create HTTP-based services by using ASP.NET Core Web API. You will also learn how to consume them from various clients. After Lesson 3, in the lab "Creating an ASP.NET Core Web APIs", you will create a web API and consume it from a client.
Lessons
• HTTP Services
• Creating an ASP.NET Core Web API
• Consuming ASP.NET Core Web APIs
• Handling HTTP Requests and Responses
• Automatically Generating HTTP Requests and Responses
Lab : Creating an ASP.NET Core Web API
• Create a controller class
• Use the API from a browser
• Create a client
After completing this module, students will be able to:
• Design services by using the HTTP protocol.
• Create services by using ASP.NET Core Web API.
• Use the HttpRequest/IActionResult classes to control HTTP messages.
• Consume ASP.NET Web API services.
Module 4: Extending ASP.NET Core HTTP Services
ASP.NET Core Web API provides a complete solution for building HTTP services, but services often have various needs and dependencies. In many cases, you will need to extend or customize the way ASP.NET Core Web API executes your service. Handling needs such as applying error handling and logging integrate with other components of your application and supporting other standards that are available in the HTTP world. Understanding the way ASP.NET Core Web API works is important when you extend ASP.NET Core Web API. The division of responsibilities between components and the order of execution are important when intervening with the way ASP.NET Core Web API executes. Finally, with ASP.NET Core Web API, you can also extend the way you interact with other parts of your system. With the dependency resolver mechanism, you can control how instances of your service are created, giving you complete control on managing dependencies of the services.
Lessons
• The ASP.NET Core Request Pipeline
• Customizing Controllers and Actions
• Injecting Dependencies into Controllers
Lab : Customizing the ASP.NET Core Pipeline
• Use Dependency Injection to Get a Repository Object
• Create a Cache Filter
• Create a Debugging Middleware
After completing this module, students will be able to:
• Extend the ASP.NET Web API request and response pipeline.
• Customize Controllers and Actions.
• Inject dependencies into ASP.NET Web API controllers.
Module 5: Hosting Services On-Premises and in Azure
In this module you will learn how to host your application on-premises and on Azure. You will also learn about Docker containers, and writing serverless applications with Azure functions.
Lessons
• Hosting Services on-premises
• Hosting Services in Azure App Service
• Packaging Services in Containers
• Implementing Serverless Services
Lab : Host an ASP.NET Core service in a Windows Service
• Creating a new ASP.NET Core Application
• Registering the Windows Service
Lab : Host an ASP.NET Core Web API in an Azure Web App
• Create a Web App in the Azure portal
• Deploy an ASP.NET Core Web API to the Web App
Lab : Host an ASP.NET Core service in Azure Container Instances
• Publish the service to a Docker container
• Host the service in Azure Container Instances
Lab : Implement an Azure Function
• Develop the service locally
• Deploy the service to Azure Functions
After completing this module, students will be able:
• Host services on-premises by using Windows services and Microsoft Internet Information Services (IIS).
• Host services in the Azure cloud environment by using Web Apps, Docker containers, and Azure Functions.
• Package services in containers.
• Implement serverless services.
Module 6: Deploying and Managing Services
In this module, you will learn about Web Deploy and how to deploy web applications by using Web Deploy in Visual Studio. You will also learn how to define continuous integration and continuous delivery pipelines and how to use Azure API Management and OpenAPI to provide robust, secure, and reliable APIs to your customers.
Lessons
• Web Deployment with Visual Studio 2017
• Continuous Delivery with Visual Studio Team Services
• Deploying Applications to Staging and Production Environments
• Defining Service Interfaces with Azure API Management
Lab : Deploying an ASP.NET Core web service on Linux
• Publish the ASP.NET Core web service for Linux
• Configure Nginx as a reverse proxy
Lab : Deploying to Staging and Production
• Deploy the application to production
• Create a staging slot
• Swap the Environments
Lab : Publishing a Web API with Azure API Management
• Creating an Azure API Management instance
• Testing and managing the API
After completing this module, students will be able to:
• Explain Microsoft Internet Information Services (IIS) Web Deploy.
• Explain Azure Web Apps deployment by using a Microsoft Visual Studio Team Services build pipeline.
• Explain how to deploy web services to Azure Container Instances.
• Explain how to define service interfaces by using API Management and Swagger.
• Explain how to define policies by using API Management.
• Explain defining service interfaces using Azure API Management and Swagger
Module 7: Implementing Data Storage in Azure
This module explains how to store and access data stored in Azure Storage. It also explains how to configure storage access rights for storage containers and content.
Lessons
• Choosing a Data Storage Mechanism
• Accessing Data in Azure Storage
• Working with Structured Data in Azure
• Geographically Distributing Data with Azure CDN
• Scaling with Out-of-Process Cache
Lab : Storing Files in Azure Storage
• Store publicly accessible files in Azure Blobs
• Generate and store private files in Azure Blobs
Lab : Querying Graph Data with CosmosDB
• Create the CosmosDB graph database
• Query the CosmosDB database
Lab : Caching out-of-process with Azure Redis cache
• Create the Azure Redis Cache service
• Access the cache service from code
• Test the application
After completing this module, students will be able to:
• Describe the architecture of Storage.
• Control access to your Storage items.
• Cache data using Azure Cache for Redis.
• Distribute data by using Microsoft Azure Content Delivery Network.
Module 8: Diagnostics and Monitoring
This module explains how to monitor and log services, both on-premises and in Azure.
Lessons
• Logging in ASP.NET Core
• Diagnostic Tools
• Application Insights
Lab : Monitoring ASP.NET Core with ETW and LTTng
• Collect and view ETW events
• Collect and view LTTng events
Lab : Monitoring Azure Web Apps with Application Insights
• Add the Application Insights SDK
• Load test the web service
• Analyze the performance results
After completing this module, students will be able to:
• Explain trace listeners
• Explain performance counters
• Explain ETW and LTTng events
• Demonstrate using App Insights to monitor services
Module 9: Securing services on-premises and in Microsoft Azure
This module describes claim-based identity concepts and standards, and how to implement authentication and authorization by using Azure Active Directory to secure an ASP.NET Core Web API service.
Lessons
• Explaining Security Terminology
• Securing Services with ASP.NET Core Identity
• Securing Services with Azure Active Directory
Lab : Using ASP.NET Core Identity
• Add ASP.NET Core Identity middleware
• Add authorization code
• Run a client application to test the server
Lab : Using Azure Active Directory with ASP.NET Core
• Authenticate a client application using AAD B2C and MSAL.js
Module 10: Scaling Services
This module explains how to create scalable services and applications and scale them automatically using Web Apps load balancers, Azure Application Gateway and Azure Traffic Manager.
Lessons
• Introduction to Scalability
• Automatic Scaling
• Azure Application Gateway and Traffic Manager
Lab : Load Balancing Azure Web Apps
• Prepare the application for load-balancing
• Test the load balancing with instance affinity
• Test the load balancing without affinity
Lab : Load Balancing with Azure Traffic Manager
• Deploy an Azure Web App to multiple regions
• Create an Azure Traffic Manager profile
After completing this module, students will be able to:
• Explain the need for scalability.
• Describe how to use load balancing for scaling services.
• Explain Azure Load Balancer, Azure Application Gateway, and Azure Traffic Manager.
Prerequisites
Before attending this course, students must have:
• Experience with C# programming, and concepts such as lambda expressions, LINQ, and anonymous types
• Understanding the concepts of n-tier applications
• Experience with querying and manipulating data with ADO.NET
Overview
Audience(s): Information Workers
Technology: SQL Server
Level: Advanced
This Revision: B
Delivery method: Classroom
Length: 3 days
Language(s): English
About this course
The main purpose of the course is to give students a good understanding of data analysis with Power BI. The course includes creating visualizations, the Power BI Service, and the Power BI Mobile App.
Audience profile
The course will likely be attended by SQL Server report creators who are interested in alternative methods of presenting data.
At course completion
After completing this course, students will be able to:
• Perform Power BI desktop data transformation.
• Describe Power BI desktop modelling.
• Create a Power BI desktop visualization.
• Implement the Power BI service.
• Describe how to connect to Excel data.
• Describe how to collaborate with Power BI data.
• Connect directly to data stores.
• Describe the Power BI developer API.
• Describe the Power BI mobile app.
Course Outline
Module 1: Introduction to Self-Service BI Solutions
Introduces business intelligence (BI) and how to self-serve with BI.
Lessons
• Introduction to business intelligence
• Introduction to data analysis
• Introduction to data visualization
• Overview of self-service BI
• Considerations for self-service BI
• Microsoft tools for self-service BI
Lab: Exploring an Enterprise BI solution
• Viewing reports
• Creating a Power BI report
• Creating a Power BI dashboard
After completing this module, students will be able to:
• Describe the trends in BI
• Describe the process of data analysis in Power BI.
• Use the key visualizations in Power BI.
• Describe the rationale for self-service BI.
• Describe considerations for self-service BI.
• Understand how you can use Microsoft products to implement a BI solution.
Module 2: Introducing Power BI
This module introduces Power BI desktop, and explores the features that enable the rapid creation and publication of sophisticated data visualizations.
Lessons
• Power BI
• The Power BI service
Lab: Creating a Power BI dashboard
• Connecting to Power BI data
• Create a Power BI dashboard
After completing this module, students will be able to:
• Develop reports using the Power BI Desktop app.
• Use report items to create dashboards on the Power BI portal.
• Understand the components of the Power BI service including licensing and tenant management.
Module 3: Power BI
At the end of this module students will be able to explain the rationale and advantages of using Power BI.
Lessons
• Using Excel as a data source for Power BI
• The Power BI data model
• Using databases as a data source for Power BI
• The Power BI service
Lab: Importing data into Power BI
• Importing Excel files into Power BI
• Viewing reports from Excel files
After completing this module, students will be able to:
• Describe the data model and know how to optimize data within the model.
• Connect to Excel files and import data
• Use on-premises and cloud Microsoft SQL Server databases as a data source, along with the R script data connector
• Take advantage of the features of the Power BI service by using Q&A to ask questions in natural query language, and create content packs and groups.
Module 4: Shaping and Combining Data
With Power BI desktop you can shape and combine data with powerful, buil-in tools. This module introduces the tools that are available for preparing your data, and transforming it into a form ready for reporting.
Lessons
• Power BI desktop queries
• Shaping data
• Combining data
Lab: Shaping and combining data
• Shape power BI data
• Combine Power BI data
After completing this module, students will be able to:
• Perform a range of query editing skills in Power BI
• Shape data, using formatting and transformations.
• Combine data together from tables in your dataset.
Module 5: Modeling data
This module describes how to shape and enhance data.
Lessons
• Relationships
• DAX queries
• Calculations and measures
Lab: Modeling Data
• Create relationships
• Calculations
After completing this module, students will be able to:
• Describe relationships between data tables.
• Understand the DAX syntax, and use DAX functions to enhance your dataset.
• Create calculated columns, calculated tables and measures.
Module 6: Interactive Data Visualizations
This module describes how to create and manage interactive data visualizations.
Lessons
• Creating Power BI reports
• Managing a Power BI solution
Lab: Creating a Power BI report
• Connecting to Power BI data
• Building Power BI reports
• Creating a Power BI dashboard
After completing this module, students will be able to:
• Use Power Bi desktop to create interactive data visualizations.
• Manage a power BI solution.
Module 7: Direct Connectivity
This module describes various connectivity options using Power BI.
Lessons
• Cloud data
• Connecting to analysis services
Lab: Direct Connectivity
• Direct connectivity from Power BI desktop
• Direct connectivity from the Power BI service
After completing this module, students will be able to:
• Use Power BI direct connectivity to access data in Azure SQL data warehouse, in addition to big data sources such as Hadoop
• Use Power BI with SQL Server Analysis Services data, including Analysis services modles running in multidimentional mode.
Module 8: The Developer API
This module describes the developer API within Power BI.
Lessons
• The developer API
• Custom visuals
Lab: Using the developer API
• Using custom visuals
After completing this module, students will be able to:
• Describe the developer API.
• Use the developer API to create custom visuals.
Module 9: Power BI mobile app
This module describes the Power BI mobile app.
Lessons
• Power BI mobile apps
• Using the Power BI mobile app
• Power BI embedded
After completing this module, students will be able to:
• Describe the Power BI mobile app.
• Download and use the Power BI mobile app.
• Describe Power BI embedded and when you would want to use it.
Prerequisites
Before attending this course, students must have:
• Excellent knowledge of relational databases and reporting.
• Some basic knowledge of data warehouse schema topology (including star and snowflake schemas).
• Some exposure to basic programming constructs (such as looping and branching).
• An awareness of key business priorities such as revenue, profitability, and financial accounting is desirable.
• Familiarity with Microsoft Office applications – particularly Excel.
Overview
Audience(s): IT Professionals
Technology: Windows Server
Level: Intermediate
This Revision: C
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This five-day course is designed primarily for IT professionals who have some experience with Windows Server. It is designed for professionals who will be responsible for managing storage and compute by using Windows Server 2016, and who need to understand the scenarios, requirements, and storage and compute options that are available and applicable to Windows Server 2016.
Audience profile
This course is intended for IT professionals who have some experience working with Windows Server, and who are looking for a single five-day course that covers storage and compute technologies in Windows Server 2016. This course will help them update their knowledge and skills related to storage and compute for Windows Server 2016.
Candidates suitable for this course would be:
•Windows Server administrators who are relatively new to Windows Server administration and related technologies, and who want to learn more about the storage and compute features in Windows Server 2016.
•IT professionals with general IT knowledge who are looking to gain knowledge about Windows Server especially around storage and compute technologies in Windows Server 2016.
The secondary audience for this course are IT professionals looking to take the Microsoft 70-740 certification exam, Installation, Storage and Compute with Windows Server 2016.
At course completion
After completing this course, students will be able to:
• Prepare and install Nano Server, a Server Core installation, and plan a server upgrade and migration strategy.
• Describe the various storage options, including partition table formats, basic and dynamic disks, file systems, virtual hard disks, and drive hardware, and explain how to manage disks and volumes.
• Describe enterprise storage solutions, and select the appropriate solution for a given situation.
• Implement and manage Storage Spaces and Data Deduplication.
• Install and configure Microsoft Hyper-V, and configure virtual machines.
• Deploy, configure, and manage Windows and Hyper-V containers.
• Describe the high availability and disaster recovery technologies in Windows Server 2016.
• Plan, create, and manage a failover cluster.
• Implement failover clustering for Hyper-V virtual machines.
• Configure a Network Load Balancing (NLB) cluster, and plan for an NLB implementation.
• Create and manage deployment images.
• Manage, monitor, and maintain virtual machine installations.
Course Outline
Module 1: Installing, upgrading, and migrating servers and workloads
This module describes the new features of Windows Server 2016, and explains how to prepare for and install Nano Server and Server Core. This module also describes how to plan a server upgrade and migration strategy, and explains how to perform a migration of server roles and workloads within and across domains. Finally, this module explains how to choose an activation model based on your environment characteristics.
Lessons
• Introducing Windows Server 2016
• Preparing and installing Server Core
• Preparing for upgrades and migrations
• Migrating server roles and workloads
• Windows Server activation models
Lab : Installing and configuring Server Core
• Installing Server Core
• Completing post-installation tasks on Windows Server 2016 Core
• Performing remote management
After completing this module, students will be able to:
• Describe the new features of Windows Server 2016.
• Prepare for and install Server Core.
• Plan a server upgrade and migration strategy.
• Perform a migration of server roles and workloads within a domain and across domains.
• Choose an appropriate activation model.
Module 2: Configuring local storage
This module explains how to manage disks and volumes in Windows Server 2016.
Lessons
• Managing disks in Windows Server
• Managing volumes in Windows Server
Lab : Configuring local storage
• Creating and managing volumes
• Resizing volumes
• Managing virtual hard disks
After completing this module, students will be able to:
• Manage disks in Windows Server.
• Manage volumes in Windows Server.
Module 3: Implementing enterprise storage solutions
This module discusses direct-attached storage (DAS), network-attached storage (NAS), and storage area networks (SANs). It also explains the purpose of Microsoft Internet Storage Name Service (iSNS) Server, data center bridging (DCB), and Multipath I/O (MPIO). Additionally, this module compares Fibre Channel, Internet Small Computer System Interface (iSCSI), and Fibre Channel over Ethernet (FCoE), and describes how to configure sharing in Windows Server 2016.
Lessons
• Overview of DAS, NAS, and SANs
• Comparing Fibre Channel, iSCSI, and Fibre Channel over Ethernet
• Understanding iSNS, DCB, and MPIO
• Configuring sharing in Windows Server 2016
Lab : Planning and configuring storage technologies and components
• Planning storage requirements
• Configuring iSCSI storage
• Configuring and managing the share infrastructure
After completing this module, students will be able to:
• Describe DAS, NAS, and SANs.
• Compare Fibre Channel, iSCSI, and FCoE.
• Explain the use of iSNS, DCB, and MPIO.
• Configure sharing in Windows Server.
Module 4: Implementing Storage Spaces and Data Deduplication
This module explains how to implement and manage Storage Spaces. This module also explains how to implement Data Deduplication.
Lessons
• Implementing Storage Spaces
• Managing Storage Spaces
• Implementing Data Deduplication
Lab : Implementing Storage Spaces
• Creating a Storage Space
Lab : Implementing Data Deduplication
• Installing Data Deduplication
• Configuring Data Deduplication
After completing this module, students will be able to:
• Describe and implement the Storage Spaces feature in the context of enterprise storage needs.
• Manage and maintain Storage Spaces.
• Describe and implement Data Deduplication.
Module 5: Installing and configuring Hyper-V and virtual machines
This module provides an overview of Hyper-V and virtualization. It explains how to install Hyper-V, and how to configure storage and networking on Hyper-V host servers. Additionally, it explains how to configure and manage Hyper-V virtual machines.
Lessons
• Overview of Hyper-V
• Installing Hyper-V
• Configuring storage on Hyper-V host servers
• Configuring networking on Hyper-V host servers
• Configuring Hyper-V virtual machines
• Managing virtual machines
Lab : Installing and configuring Hyper-V
• Verify installation of the Hyper-V server role
• Configuring Hyper-V networks
• Creating and configuring virtual machines
• Enable nested virtualization for a virtual machine
After completing this module, students will be able to:
• Describe Hyper-V and virtualization.
• Install Hyper-V.
• Configure storage on Hyper-V host servers.
• Configure networking on Hyper-V host servers.
• Configure Hyper-V virtual machines.
• Manage Hyper-V virtual machines.
Module 6: Deploying and managing Windows and Hyper-V containers
This module provides an overview of containers in Windows Server 2016. Additionally, this module explains how to deploy Windows Server and Hyper-V containers. It also explains how to install, configure, and manage containers by using Docker.
Lessons
• Overview of containers in Windows Server 2016
• Deploying Windows Server and Hyper-V containers
• Installing, configuring, and managing containers by using Docker
Lab : Installing and configuring containers
• Installing and configuring Windows Server containers by using Windows PowerShell
• Installing and configuring Windows Server containers by using Docker
After completing this module, students will be able to:
• Describe containers in Windows Server 2016.
• Explain how to deploy containers.
• Explain how to install, configure, and manage containers using Docker.
Module 7: Overview of high availability and disaster recovery
This module provides an overview of high availability and high availability with failover clustering in Windows Server 2016. It further explains how to plan high availability and disaster recovery solutions with Hyper-V virtual machines. Additionally, this module explains how to back up and restore the Windows Server 2016 operating system and data by using Windows Server Backup.
Lessons
• Defining levels of availability
• Planning high availability and disaster recovery solutions with Hyper-V virtual machines
• Backing up and restoring by using Windows Server Backup
• High availability with failover clustering in Windows Server 2016
Lab : Planning and implementing a high availability and disaster recovery solution
• Determining the appropriate high availability and disaster recovery solution
• Implementing storage migration
• Configuring Hyper-V replicas
After completing this module, students will be able to:
• Define levels of availability.
• Plan high availability and disaster recovery solutions with Hyper-V virtual machines.
• Back up and restore data by using Windows Server Backup.
• Describe high availability with failover clustering in Windows Server 2016.
Module 8: Implementing failover clustering
This module explains how to plan for failover clustering. It also explains how to create, manage, and troubleshoot a failover cluster.
Lessons
• Planning a failover cluster
• Creating and configuring a new failover cluster
• Maintaining a failover cluster
• Troubleshooting a failover cluster
• Implementing site high availability with stretch clustering
Lab : Implementing failover clustering
• Creating a failover cluster
• Verifying quorum settings and adding a node
Lab : Managing a failover cluster
• Evicting a node and verifying quorum settings
• Changing the quorum from disk witness to file-share witness, and defining node voting
• Verifying high availability
After completing this module, students will be able to:
• Plan for a failover-clustering implementation.
• Create and configure a failover cluster.
• Maintain a failover cluster.
• Troubleshoot a failover cluster.
• Implement high availability and stretch clustering for a site.
Module 9: Implementing failover clustering with Windows Server 2016 Hyper-V
This module describes how Hyper-V integrates with failover clustering. It also explains how to implement Hyper-V virtual machines (VMs) in failover clusters.
Lessons
• Overview of the integration of Hyper-V Server 2016 with failover clustering
• Implementing Hyper-V VMs on failover clusters
• Key features for VMs in a clustered environment
Lab : Implementing failover clustering with Windows Server 2016 Hyper-V
• Configure iSCSI storage
• Configuring a failover cluster for Hyper-V
• Configuring a highly available VM
After completing this module, students will be able to:
• Describe how Hyper-V integrates with failover clustering.
• Implement Hyper-V VMs on failover clusters.
• Describe the key features for VMs in a clustered environment.
Module 10: Implementing Network Load Balancing
This module provides an overview of NLB clusters. It also explains how to plan and configure an NLB cluster implementation.
Lessons
• Overview of NLB
• Configuring an NLB cluster
• Planning an NLB implementation
Lab : Implementing NLB
• Implementing a Network Load Balancing (NLB) cluster
• Configuring and managing the NLB cluster
• Validating high availability for the NLB cluster
After completing this module, students will be able to:
• Describe NLB.
• Configure an NLB cluster.
• Explain how to plan an NLB implementation.
Module 11: Creating and managing deployment images
This module provides an overview of the Windows Server 2016 image deployment process. It also explains how to create and manage deployment images by using the Microsoft Deployment Toolkit (MDT). Additionally, it describes different workloads in the virtual machine environment.
Lessons
• Introduction to deployment images
• Creating and managing deployment images by using MDT
• Virtual machine environments for different workloads
Lab : Using MDT to deploy Windows Server 2016
• Configuring MDT
• Creating and deploying an image
After completing this module, students will be able to:
• Describe the Windows Server 2016 image deployment process.
• Create and manage deployment images by using MDT.
• Describe the different workloads in the virtual machine environment.
Module 12: Managing, monitoring, and maintaining virtual machine installations
This module provides an overview on Windows Server Update Services (WSUS) and the requirements to implement WSUS. It explains how to manage the update process with WSUS. Additionally, this module provides an overview of Windows PowerShell Desired State Configuration (DSC) and Windows Server 2016 monitoring tools. Finally, this module describes how to use Performance Monitor, and how to manage event logs.
Lessons
• WSUS overview and deployment options
• Update management process with WSUS
• Overview of Windows PowerShell DSC
• Overview of Windows Server 2016 monitoring tools
• Using Performance Monitor
• Monitoring event logs
Lab : Implementing WSUS and deploying updates
• Implementing WSUS
• Configuring update settings
• Approving and deploying an update by using WSUS
Lab : Monitoring and troubleshooting Windows Server 2016
• Establishing a performance baseline
• Identifying the source of a performance problem
• Viewing and configuring centralized event logs
After completing this module, students will be able to:
• Describe the purpose of WSUS and the requirements to implement WSUS.
• Manage the update process with WSUS.
• Describe the purpose and benefits of Windows PowerShell DSC.
• Describe the monitoring tools available in Windows Server 2016.
• Use Performance Monitor.
• Manage event logs.
Prerequisites
Before attending this course, students must have:
• A basic understanding of networking fundamentals.
• An awareness and understanding of security best practices.
• An understanding of basic AD DS concepts.
• Basic knowledge of server hardware.
• Experience supporting and configuring Windows client operating systems such as Windows 8 or Windows 10.
Additionally, students would benefit from having some previous Windows Server operating system experience, such as experience as a Windows Server systems administrator.
Overview
Audience(s): IT Professionals
Technology: Microsoft System Center Configuration Manager
Level: Advanced
This Revision: A
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This five-day course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize System Center Endpoint Protection, manage compliance, and create management queries and reports. Additionally, this course, in conjunction with Microsoft Official Course 20703-2A, helps certification candidates prepare for Exam 70-703: Administering System Center Configuration Manager and Cloud Services Integration.
Audience profile
This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications.
This course also is for individuals who are interested in taking Exam 70-703: Administering System Center Configuration Manager and Cloud Services Integration. Courses 20703-1A and 20703-2A, or equivalent knowledge and skills, are necessary to prepare for this exam.
At course completion
After completing this course, students will be able to:
• Describe the features Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment.
• Analyze data by using queries and reports.
• Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Microsoft Exchange Server.
• Deploy and manage the Configuration Manager client.
• Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering.
• Identify and configure the most appropriate method to distribute and manage content used for deployments.
• Distribute, deploy, and monitor applications for managed users and systems.
• Maintain software updates for PCs that Configuration Manager manages.
• Implement Endpoint Protection for managed PCs.
• Manage configuration items, baselines, and profiles to assess and configure compliance settings and data access for users and devices.
• Configure an operating-system deployment strategy by using Configuration Manager.
• Manage and maintain a Configuration Manager site.
Course Outline
Module 1: Managing computers and mobile devices in the enterprise
This module describes the features of Configuration Manager that you can use to perform complex management tasks, including the following tasks: • Hardware and software inventory. • Application management. • Operating system deployment. • Settings management. • Software update management. • Remote client troubleshooting. • Protection from malware.
Lessons
• Overview of systems management by using enterprise management solutions
• Overview of the Configuration Manager architecture
• Overview of the Configuration Manager administrative tools
• Tools for monitoring and troubleshooting a Configuration Manager site
Lab : Exploring the Configuration Manager tools
• Searching in the Configuration Manager console
• Using Windows PowerShell with Configuration Manager
• Using Configuration Manager Service Manager to manage components
• Monitoring site and component status
• Reviewing log files by using the Configuration Manager Trace tool
• Explain how to use Configuration Manager to address the challenges of managing systems and users in today’s enterprise.
• Describe the Configuration Manager architecture.
• Describe the management tools that you use to perform administrative functions for Configuration Manager.
• Describe the tools that you use to monitor and troubleshoot a Configuration Manager site.
Module 2: Analyzing data using queries and reports
The Microsoft System Center Configuration Manager database stores a large amount of data about the resources in your environment. You might not always want to perform all management tasks on all resources simultaneously. Therefore, to help you locate devices or user objects in your environment that meet specific criteria, you can create queries. You then can use these queries to create collections or to find additional information about specific resources. This module describes queries and methods of creating and running them. In addition to queries, you can run reports to view various types of information related to your Configuration Manager environment. To run Configuration Manager reports, you must install and configure a reporting services point, which this module details.
Lessons
• Introduction to queries
• Configuring Microsoft SQL Server Reporting Services (SSRS)
Lab : Creating and running queriesConfiguring boundaries and resource discovery
• Creating data queries
• Creating subselect queries
• Creating status message queries
Lab : Configuring SSRS
• Configuring a reporting services point
• Creating a report by using Report Builder
• Create and configure data and status message queries.
• Configure and manage SSRS and the reporting services point.
Module 3: Preparing the management infrastructure to support PCs and mobile devices
This module explains how to prepare the management infrastructure, including configuring boundaries, boundary groups, and resource discovery. Additionally, it describes how Configuration Manager interacts with the Microsoft Exchange Server environment to discover and manage mobile devices.
Lessons
• Configuring site boundaries and boundary groups
• Configuring resource discovery
• Configuring the Exchange Server Connector for mobile device management
• Configuring user and device collections
Lab : Configuring boundaries and resource discovery
• Configuring boundaries, boundary groups, and fallback relationships
• Configuring Active Directory discovery methods
Lab : Configuring user and device collections
• Creating a device collection
• Creating a user collection
• Configuring a maintenance window
• Configure boundaries and boundary groups.
• Configure resource discovery.
• Configure the Exchange Server connector mobile device management.
• Organize resources using device and user collections.
Module 4: Deploying and managing clients
This module explains the supported operating systems and devices, the software requirements, and the different methods for installing the Configuration Manager client. This module also describes some of the default and custom client settings that you can configure. After installing the client software, you can configure the client settings to perform routine management tasks
.Lessons
• Overview of the Configuration Manager client
• Deploying the Configuration Manager client
• Configuring and monitoring client status
• Managing client settings in Configuration Manager
Lab : Deploying the Microsoft System Center Configuration Manager client software
• Preparing the site for client installation
• Deploying the Configuration Manager client software by using client push installation
Lab : Configuring and monitoring client status
• Configuring and monitoring client health status
Lab : Managing client settings
• Configuring client settings
• Describe the requirements and considerations for installing the Configuration Manager client software.
• Deploy the Configuration Manager client software.
• Configure and monitor client status.
• Manage Configuration Manager client settings.
Module 5: Managing inventory for PCs and applications
This module provides an overview of inventory collection, and explains how you can manage the information collected. You also will learn about the process of collecting hardware and software inventory, initiating inventory cycles, and initiating and securing inventory collection. This module also covers the use of software metering to monitor program usage, and the configuration and management of Asset Intelligence.
Lessons
• Overview of inventory collection
• Configuring hardware and software inventory
• Managing inventory collection
• Configuring software metering
• Configuring and managing Asset Intelligence
Lab : Configuring and managing inventory collection
• Configuring and managing hardware inventory
Lab : Configuring software metering
• Configuring software metering
Lab : Configuring and managing Asset Intelligence
• Preparing the site for Asset Intelligence
• Configuring Asset Intelligence
• Monitoring license agreements by using Asset Intelligence
• Viewing Asset Intelligence reports
• Describe inventory collection.
• Configure and collect hardware and software inventory.
• Manage inventory collection.
• Configure software metering.
• Configure Asset Intelligence.
Module 6: Distributing and managing content used for deployments
Configuration Manager clients obtain content, such as packages, applications, software updates, and even operating system images, from distribution points. Configuration Manager relies on the distribution point infrastructure to provide content management functionality. In this module, you will review the content management features, configure distribution points, and learn how to distribute and monitor content. You also will perform content validation and content prestaging.
Lessons
• Preparing the infrastructure for content management
• Distributing and managing content on distribution points
Lab : Distributing and managing content for deployments
• Installing a new distribution point
• Managing content distribution
• Prepare the infrastructure for content management.
• Distribute and manage content on distribution points.
Module 7: Deploying and managing applications
In this module, you will learn about the methods for creating, deploying, and managing applications with Configuration Manager. You also will learn to use the Software Center and the Application Catalog to install available applications. You will learn about managing deployments on unconventional applications. In addition, you will learn to install Windows 10 apps and virtualized applications.
Lessons
• Overview of application management
• Creating applications
• Deploying applications
• Managing applications
• Deploying virtual applications by using System Center Configuration Manager (Optional)
• Deploying and managing Windows Store apps
Lab : Creating and deploying applications
• Installing and configuring the Application Catalog roles
• Creating applications with requirements
• Deploying applications
Lab : Managing application supersedence and removal
• Managing application supersedence
• Uninstalling the Excel Viewer application
Lab : Deploying virtual applications by using Configuration Manager (Optional)
• Configuring support for App-V
• Deploying virtual applications
Lab : Using Configuration Manager to deploy Windows Store apps
• Configuring support for sideloading Windows Store apps
• Configuring a Windows Store app
• Deploying Windows 10 apps to users
• Describe the application management features of Configuration Manager.
• Create applications.
• Deploy applications.
• Manage applications.
• Configure and deploy virtual applications.
• Configure and deploy Windows Store apps.
Module 8: Maintaining software updates for managed PCs
This module explains how to use the software updates feature in Configuration Manager to implement an end-to-end management process for the complex task of identifying, deploying, and monitoring software updates to your Configuration Manager clients.
Lessons
• The software updates process
• Preparing a Configuration Manager site for software updates
• Managing software updates
• Configuring automatic deployment rules
• Monitoring and troubleshooting software updates
Lab : Configuring the site for software updates
• Configuring and synchronizing the software update point
Lab : Deploying and managing software updates
• Determining software update compliance
• Deploying software updates to clients
• Configuring automatic deployment rules
• Describe how the software updates feature integrates with Configuration Manager.
• Prepare the Configuration Manager site for software updates.
• Manage the evaluation and deployment of software updates.
• Configure automatic deployment rules.
• Monitor and troubleshoot software updates.
Module 9: Implementing Endpoint Protection for managed PCs
Configuration Manager provides a number of security-related features that you can use to help protect client computers from malware threats, and to configure specific Windows Firewall settings for clients. Based on System Center Endpoint Protection (Endpoint Protection) functionality, Endpoint Protection in Configuration Manager supports the deployment, management, and monitoring of antimalware policies and Windows Firewall settings on client computers. This module explains how to use configure Endpoint Protection Configuration Manager to implement Endpoint Protectionand deploy and monitor Endpoint Protection policies.
Lessons
• Overview of Endpoint Protection in Configuration Manager
• Configuring, deploying, and monitoring Endpoint Protection policies
Lab : Implementing Microsoft System Center Endpoint Protection
• Configuring the System Center Endpoint Protection point and client settings
• Configuring and deploying Endpoint Protection policies
• Monitoring Endpoint Protection
• Configure Endpoint Protection to detect and remediate malware and security vulnerabilities.
• Configure, deploy, and manage Endpoint Protection policies.
Module 10: Managing compliance and secure data access
Many enterprise organizations require systems, such as servers, laptops, desktop computers, and mobile devices, to meet specific configuration and compliance requirements. Compliance settings in Configuration Manager can play a key role in identifying existing configurations, discovering systems that have adverse configuration changes, and remediating these settings automatically when necessary. Compliance settings also can help control how users manage and access data in the enterprise network environment. For computers that run Windows 8 and newer operating systems, you can manage data using folder redirection, offline files, and roaming profiles. You also can control access to data using remote connection profiles, virtual private network (VPN) profiles, Wi-Fi profiles, and certificate profiles. This module describes the compliance settings that you can manage using Configuration Manager. You will learn to use these settings to maintain configuration requirements and to provide secure data access to enterprise resources.
Lessons
• Overview of Compliance Settings
• Configuring compliance settings
• Viewing compliance results
• Managing resource and data access
Lab : Managing compliance settings
• Managing configuration items and baselines
• Viewing compliance settings and reports
• Configuring remediation in compliance settings
• Using compliance information to create collections
• Describe compliance settings features.
• Configure compliance settings.
• View compliance results.
• Manage resource and data access.
Module 11: Managing operating system deployment
You can use the operating system deployment feature in Configuration Manager to create operating system images that you can deploy to unmanaged computers and those managed by Configuration Manager. There are several scenarios in which you can deploy operating systems by using Configuration Manager, including when you are working with new systems or when you are upgrading existing ones. Operating system deployment uses both Configuration Manager and Windows components to manage and deliver operating system images. You can configure settings on a reference computer prior to capturing an image of its operating system or by using task sequences that Configuration Manager creates after you deploy the image to a target system. This module explains how to use Configuration Manager to create a strategy for operating-system deployments. And also, it explains how to manage Windows as a service.
Lessons
• An overview of operating system deployment
• Preparing a site for operating system deployment
• Deploying an operating system
• Managing Windows as a service
Lab : Preparing thea site for operating -system deployment
• Managing the site system roles used to support operating system deployment
• Managing packages to support operating system deployment
Lab : Deploying operating -system images for bare-metal installations
• Preparing the operating system image
• Creating a task sequence to deploy an image
• Deploying an image
• Describe the terminology, components, and scenarios used to deploy operating systems by using Configuration Manager.
• Describe how to prepare a site for operating system deployment.
• Describe the process used to deploy an operating system image.
Module 12: Managing and maintaining a Configuration Manager site
This module explains how to use manage and maintain a Configuration Manager site. It describes role-based administration, Remote Tools, and the site maintenance tasks that you can manage by using Configuration Manager. Additionally, it explains how to back up and recover a Configuration Manager site system.
Lessons
• Configuring role-based administration
• Configuring Remote Tools
• Overview of Configuration Manager site maintenance
• Backing up and recovering a Configuration Manager site
Lab : Configuring role-based administration
• Configuring a new scope for Toronto administrators
• Configuring a new administrative user
Lab : Configuring Remote Tools
• Configuring the Remote Tools client settings and permissions
• Managing desktops by using Remote Control
Lab : Maintaining a Configuration Manager site
• Configuring maintenance tasks in Configuration Manager
• Configuring the Backup Site Server task
• Recovering a site from a backup
• Configure role-based administration.
• Configure Remote Tools to support client activity.
• Identify Configuration Manager site Maintenance tasks.
• Back up and recover a Configuration Manager site.
Prerequisites
Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching, and addressing.
Active Directory Domain Services (AD DS) principles and fundamentals of AD DS management.
Installation, configuration, and troubleshooting for Windows-based personal computers.
Basic concepts of public key infrastructure (PKI) security.
Basic understanding of scripting and Windows PowerShell syntax.
Basic understanding of Windows Server roles and services.
Basic understanding of the configuration options for iOS, Android, and Windows Mobile device platforms.
Students who attend this training can meet the prerequisites by attending the following courses or by obtaining equivalent knowledge and skills through hands-on activities:
• Course 20697-1: Installing and Configuring Windows 10
• Course 20697-2: Deploying and Managing Windows 10 Using Enterprise Services
• Course 20411: Administering Windows Server 2012
Overview
Technology: SharePoint Server
Level: Intermediate
This Revision: A
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This five-day course will teach you how to plan, configure, and manage the advanced features in a SharePoint 2016 environment. The special areas of focus for this course include implementing high availability, disaster recovery, service application architecture, and Microsoft Business Connectivity Services. This course also focuses on social computing features, productivity, and collaboration platforms and features. Students also will learn about business intelligence solutions, Enterprise Content Management, web content management infrastructure, solutions, and apps. This course also covers how to develop and implement a governance plan, and how to perform an upgrade or a migration to SharePoint 2016.
This is the second in a sequence of two courses for IT Professionals and is aligned with the SharePoint 2016 IT Pro certification.
Audience profile
The course is targeted at experienced IT Professionals who are interested in learning how to install, configure, deploy, and manage SharePoint 2016 installations either in a data center or in the cloud.
Students typically should have more than four years of hands-on experience* planning and maintaining SharePoint Server and other core technologies upon which SharePoint depends, including Windows Server 2012 R2 or later, Internet Information Services (IIS), Microsoft SQL Server 2014 R2 or later, Active Directory Domain Services (AD DS), and networking infrastructure services.
Students should have completed Course 20339-1A: Planning and Administering Microsoft SharePoint 2016, or have gained equivalent knowledge and experience before taking this course.
The minimally qualified candidate typically:
• Has a working knowledge of, and preferably hands-on experience, with Microsoft SharePoint Online.
• Has broad familiarity with SharePoint Server workloads.
• Has experience with business continuity management, including data backup, restoration, and high availability.
• Has experience with authentication and security technologies.
• Has experience with Windows PowerShell.
* The hands-on experience or job experience should be from a solutions-based role where the candidate has worked on multiple solutions in the SharePoint Server space that includes document management, content management, and search.
At course completion
After completing this course, students will be able to:
• Describe the core SharePoint 2016 architecture and its new and improved features.
• Describe the key hybrid features in SharePoint 2016.
• Plan and design a SharePoint 2016 environment to meet requirements for high availability and disaster recovery.
• Plan and implement Business Connectivity Services and Secure Store Service.
• Configure and manage productivity services for a SharePoint 2016 deployment.
• Manage solutions in a SharePoint 2016 deployment.
• Plan and configure social computing features.
• Plan and configure web content management for an Internet-facing environment.
• Plan and configure Enterprise Content Management in a SharePoint 2016 deployment.
• Plan and configure business intelligence solutions.
• Plan and configure work management, productivity, and collaboration platforms and features.
• Perform an upgrade or migration to SharePoint 2016.
Course Outline
Module 1: Introduction to SharePoint 2016
This module describes the core architectural components of a SharePoint Server environment, and also helps to identify the new depreciated and removed features in SharePoint 2016.
Lessons
• Core components of the SharePoint 2016 architecture
• New, deprecated, and removed features in SharePoint 2016
• SharePoint 2016 and SharePoint Online editions
Lab : Reviewing the core Microsoft SharePoint 2016 concepts
• Configuring SharePoint 2016 farms
• Creating and configuring site collections and sites
• Provisioning service applications by using the SharePoint 2016 Management Shell
After completing this module, students will be able to:
• Describe the architectural features of a Microsoft-SharePoint 2016.
• Identify the new, deprecated, and removed features in SharePoint 2016.
• Describe the editions for SharePoint 2016 on-premises and Microsoft SharePoint Online.
Module 2: Introduction to hybrid scenarios for SharePoint 2016
This module describes the key hybrid features in SharePoint 2016, and helps you to prepare for a hybrid SharePoint 2016 deployment.
Lessons
• Exploring the hybrid features in SharePoint 2016
• Preparing for a hybrid SharePoint 2016 deployment
Lab : Configuring an Office 365 tenant
• Creating an Office 365 tenant
Lab : Creating hybrid team sites
• Preparing the SharePoint environment
• Running the SharePoint Hybrid picker
After completing this module, students will be able to:
• Describe the key hybrid features in SharePoint Server 2016.
• Prepare for a hybrid SharePoint 2016 deployment.
Module 3: Designing business continuity management strategies
This module explains how to select an appropriate database server configuration to meet availability requirements. It also describes how to design a physical architecture and infrastructure to meet high-availability requirements. Finally, this module explains how to develop and implement a backup and restore strategy.
Lessons
• Designing database topologies for high availability and disaster recovery
• Designing a SharePoint infrastructure for high availability
• Planning for disaster recovery
Lab : Planning and performing backup and restore
• Create a backup and restore plan
• Test the backup and restore process
After completing this module, students will be able to:
• Select an appropriate database server configuration to meet availability requirements.
• Design a physical architecture and infrastructure to meet high-availability requirements.
• Develop and implement a backup and restore strategy.
Module 4: Planning and implementing Business Connectivity Services and Secure Store Service
This module explains how to configure Business Connectivity Services (BCS), and describes how to configure and manage the Secure Store Service application. It also explains how you can configure and manage BCS models.
Lessons
• Planning and configuring BCS
• Configuring the Secure Store Service
• Managing BCS models
Lab : Configuring BCS and the Secure Store Service
• Configuring the BDC Service Application
• Configuring the Secure Store Service
Lab : Managing BDC models
• Configuring a Secure Store Service target application
• Importing and configuring BDC models
After completing this module, students will be able to:
• Plan and Configure Business Connectivity service application.
• Plan and configure the Secure Store Service application.
• Manage the Business Data Connectivity models.
Module 5: Configuring productivity services for a SharePoint 2016 deployment
This module describes SharePoint Add-in architecture. This module also explains how to provision and manage SharePoint apps and App Catalogs. Additionally, this module describes how to provision Microsoft Access Services, Visio Services, Word Automation Services, PowerPoint Automation Services, and SharePoint Translation Services.
Lessons
• Understanding the SharePoint Add-in architecture
• Provisioning and managing apps and App Catalogs
• Provisioning productivity services
Lab : Configuring and managing SharePoint Add-ins
• Configuring a SharePoint farm to support apps
• Creating and configuring a corporate App Catalog
• Deploying and monitoring apps
After completing this module, students will be able to:
• Describe Microsoft SharePoint Add-ins and the supporting SharePoint infrastructure.
• Provision and configure SharePoint Add-ins and App Catalogs.
• Manage how apps are used within a SharePoint 2016 deployment.
Module 6: Managing solutions in Microsoft SharePoint 2016
This module describes the purpose and structure of SharePoint 2016 features and solutions. In addition, it explains how to manage sandbox solutions in Microsoft SharePoint 2016.
Lessons
• Understanding the SharePoint 2016 solution architecture
• Managing sandboxed solutions
Lab : Managing solutions
• Configuring a SharePoint farm to support sandboxed solutions
• Configuring a SharePoint site to support sandboxed solutions
• Deploying farm solutions
After completing this module, students will be able to:
• Manage features and solutions in Microsoft SharePoint 2016..
• Manage sandboxed solutions in a SharePoint 2016 deployment.
Module 7: Connecting people
This module explains how to manage user profiles and how to plan and configure My Site and social features. This module also describes how to configure community sites.
Lessons
• Managing user profiles
• Enabling social interaction
• Building communities
Lab : Configuring profile synchronization and My Sites
• Configuring profile synchronization
• Configuring My Sites
Lab : Configuring community sites
• Creating a community site infrastructure
• Configuring Community Site participation
After completing this module, students will be able to:
• Manage user profiles in Microsoft SharePoint 2016 and configure user profile synchronization by using Microsoft Identity Manager (MIM) 2016.
• Enable social interaction in SharePoint 2016.
• Build communities and community sites in SharePoint 2016.
Module 8: Planning and configuring web content management
This module explains how to plan and configure a web content management infrastructure to meet business requirements. This module also describes how to configure managed navigation and product catalog sites, and how to configure support for multilingual sites. Additionally, it explains and how to plan and manage design and customization for publishing sites, and how to plan and configure support for mobile users.
Lessons
• Planning and implementing a web content management infrastructure
• Configuring managed navigation and catalog sites
• Supporting multiple languages and locales
• Enabling design and customization
• Supporting mobile users
Lab : Configuring managed navigation and catalog sites
• Configuring a product catalog site
• Configuring Cross-Site Publishing
• Configuring publishing sites
Lab : Configuring device channels
• Configuring device channels
After completing this module, students will be able to:
• Plan and configure a web content management infrastructure.
• Configure managed navigation and product catalog sites.
• Plan and Configure support for multilingual sites and locales.
• Manage design and customization for publishing sites.
• Plan and configure support for mobile users.
Module 9: Planning and configuring Enterprise Content Management
This module explains how to plan for management of content and documents, and how to plan for and configure eDiscovery. Additionally, it describes how to plan for records management and compliance.
Lessons
• Planning Enterprise Content Management
• Planning and configuring eDiscovery
• Planning records management
Lab : Configuring eDiscovery in SharePoint 2016
• Creating and configuring an eDiscovery Center
• Discovering and preserving content
• Querying and exporting content
Lab : Configuring records management in SharePoint Server 2016
• Configuring in-place records management
After completing this module, students will be able to:
• Plan how to manage content and documents.
• Plan and configure eDiscovery.
• Plan records management and compliance.
Module 10: Planning and configuring business intelligence solutions
This module explains how to plan business intelligence (BI) architecture for SharePoint 2016, and how to deploy and manage BI services. Additionally, this module explains how to plan and configure advanced analysis tools.
Lessons
• Planning BI architecture
• Planning, deploying, and managing BI services
• Planning and configuring advanced analysis tools
Lab : Installing Office Online Server
• Deploy Office Online Server
Lab : Configuring PowerPivot and Power View for SharePoint 2016
• Configuring PowerPivot for SharePoint 2016
• Configuring Power View for SharePoint
After completing this module, students will be able to:
• Explain the Microsoft SharePoint business intelligence (BI) architecture, its components, and plan for business intelligence.
• Plan, deploy, and manage the core Microsoft SharePoint 2016 BI services.
• Configure the advanced BI options available in SharePoint 2016 and Microsoft SQL Server 2014.
Module 11: Planning and configuring productivity and collaboration
This module explains how to plan and configure productivity and collaboration features. This module also explains how to plan and configure composite solutions in SharePoint 2016.
Lessons
• Planning and configuring collaboration features
• Planning and configuring composites
Lab : Configuring and working with project sites
• Creating an Office Online Server farm and configuring integration in SharePoint 2016
• Creating project sites
• Configuring project sites
• Engaging project teams
• Configuring Project Server integration
Lab : Configuring a workflow
• Configuring Microsoft Azure Workflow and Microsoft SharePoint Workflow Services
• Creating and testing a workflow
After completing this module, students will be able to:
• Describe how to plan and configure SharePoint collaborative and coauthoring options.
• Configure project sites and engage teams.
• Plan and configure composites.
• Configure workflows in SharePoint 2016.
Module 12: Upgrading and migrating to SharePoint 2016
This module explains how to prepare for upgrade or migration to SharePoint 2016. In addition, it explains how to manage site collections are how to upgrade them to SharePoint 2016. Finally, the module describes how to upgrade advanced content from SharePoint Server 2013 to SharePoint 2016.
Lessons
• Preparing for an upgrade or migration
• Upgrade to SharePoint 2016
• Planning and managing a site-collection upgrade
Lab : Performing a content database migration and upgrade from Microsoft SharePoint Server 2013
• Migrating SharePoint Server 2013 Managed Metadata Service
• Upgrading a SharePoint Server 2013 content database
Lab : Managing site-collection upgrades
• Preparing site collections for upgrade
• Upgrading site collections
After completing this module, students will be able to:
• Plan and prepare for an upgrade.
• Perform upgrades to data and service applications.
• Upgrade site collections.
• Upgrade advanced content from SharePoint Server 2013 to SharePoint 2016.
Prerequisites
An ideal candidate for this course must have at least one year experience with deploying and administering multiple SharePoint Server 2013 farms across a large enterprise. The candidate should have completed Course 20339-1A: Planning and Administering Microsoft SharePoint 2016, or should demonstrate equivalent skills
Before attending this course, students must demonstrate the following skills:
• At least a one-year experience of mapping business requirements to both logical and physical technical designs.
• Working knowledge of network design, including network security.
• Software management experience in a Windows Server 2012 R2 enterprise server or Windows Server 2016 environment.
• Deploying and managing applications natively, virtually, and in the cloud.
• Administering IIS.
• Configuring AD DS for use in authentication and authorization, and as a user store.
• Managing an application remotely by using Windows PowerShell 2.0 or later.
• Connecting applications to SQL Server.
• Implementing claims-based security.
Visão Global
A segurança da informação é a proteção das informações de uma grande variedade de ameaças com o objetivo de assegurar a continuidade do negócio, minimizar o risco do negócio e maximizar o retorno sobre os investimentos e as oportunidades de negócios.
A segurança das informações vem ganhando importância no mundo da Tecnologia da Informação (TI). A globalização da economia está gerando uma troca cada vez maior de informações entre as organizações (seus funcionários, clientes e fornecedores) bem como uma explosão no uso de computadores em rede e dispositivos de informática.
A norma internacional para Gerenciamento de Segurança da Informação ISO/IEC 27001, é uma norma amplamente respeitada e consultada e fornece uma estrutura para a organização e o gerenciamento de um programa de segurança das informações. A implementação de um programa com base nesta norma será muito útil para o objetivo de uma organização de atender a muitas das necessidades apresentadas no complexo ambiente operacional da atualidade. Uma compreensão categórica desta norma é importante para o desenvolvimento pessoal de todos os profissionais de segurança das informações.
Nos módulos de Segurança da Informação do EXIN, utiliza-se a seguinte definição: A Segurança da Informação lida com a definição, a implementação, a manutenção, a conformidade e a avaliação de um conjunto coerente de controles (medidas) que garantam a disponibilidade, a integridade e a confidencialidade da fonte de informações (manual e automática).
No EXIN Information Security Foundation baseado na ISO/IEC 27001 são testados os conceitos básicos de segurança da informação e suas relações. Um dos objetivos desse módulo é aumentar a conscientização de que as informações são valiosas e vulneráveis e aprender quais medidas são necessárias para protegê-las.
Público Alvo
Qualquer pessoa na organização que manuseia informações. É também aplicável a proprietários de pequenas empresas a quem alguns conceitos básicos de Segurança da Informação são necessários. Este módulo pode ser um excelente ponto de partida para novos profissionais de segurança da informação.
Carga:
16h
Conteúdo
1. Informação e segurança
1.1 O conceito de informação
1.2 Valor da informação
1.3 Aspectos de confiabilidade
2. Ameaças e riscos
2.1 Ameaças e riscos
2.2 Relacionamento entre ameaças, riscos e confiabilidade da informação
3. Abordagem e organização
3.1 Política de segurança e organização de segurança
3.2 Componentes da organização da segurança
3.3 Gerenciamento de incidentes
4. Medidas
4.1 Importância de medidas de segurança
4.2 Medidas físicas
4.3 Medidas técnicas
4.4 Medidas organizacionais
5. Legislação e regulamentação
5.1 Legislação e regulamentação
Visão Global
Onde quer que os dados pessoais sejam coletados, armazenados, usados e, finalmente, excluídos ou destruídos, surgem preocupações de privacidade. Com o Regulamento Geral de Proteção de Dados da UE (GDPR), o Conselho da União Europeia tenta reforçar e unificar a proteção de dados para todos os indivíduos da União Europeia (UE). Este regulamento afeta todas as organizações que processam os dados pessoais de cidadãos da EU e tem efeitos além destas fronteiras. O PDPF abrange os principais assuntos relacionados ao GDPR e tem sido usado como um guia para diversos países fora da UE em fase de elaboração das suas próprias leis.
Público Alvo
Todos os colaboradores precisam ter uma compreensão da proteção de dados e dos requisitos legais, conforme definido no GDPR. As seguintes funções mais específicas podem se interessar:
DPO (Diretor de Proteção de Dados), Privacy Officer (Diretor de Privacidade), Legal Officer / Compliance Officer (Diretor Jurídico / Diretor de Conformidade), Security Officer (Diretor de Segurança), Business Continuity Manager (Gerente de Continuidade de Negócios).
Carga
16h
Conteúdo
1. Fundamentos e regulamentação de Privacidade e Proteção de Dados
1.1 Definições
1.2 Dados Pessoais
1.3 Fundamentos legítimos e limitação de propósito
1.4 Requisitos adicionais para processamento legítimo de dados pessoais
1.5 Direitos do titular dos dados
1.6 Violação de dados e procedimentos relacionados
2. Organizando a proteção de dados
2.1 Importância da proteção de dados para a organização
2.2 Autoridade Fiscalizadora
2.3 Transferência de dados pessoais para outros países
2.4 Regras Corporativas compulsórias e proteção de dados em contratos
3. Práticas de Proteção de Dados
3.1 Proteção de Dados by design e por padrão
3.2 Avaliação de Impacto sobre a Proteção de Dados
(DPIA)
3.3 Aplicações práticas relacionadas ao uso de dados, marketing e mídias sociais
Visão Global
Com a explosão cada vez maior de informações que inundam a internet, todas as empresas devem planejar como gerenciar e proteger a privacidade das pessoas e seus dados. Não é à toa que muitas novas leis - na UE, assim como nos EUA e em muitas outras regiões - estão sendo formuladas para a sua regulação.
Recentemente, a Comissão Europeia publicou o General Data Protection Regulation (GDPR) na UE, o que significa que todas as organizações envolvidas devem cumprir regras específicas. Esta certificação de nível Practitioner é baseada nos temas abordados pelo exame Foundation, enfocando o desenvolvimento e a implementação de políticas e procedimentos para o cumprimento da legislação nova e da já existente, aplicação de diretrizes e melhores práticas para privacidade e proteção de dados e estabelecimento de um Sistema de Gestão de Proteção de Dados e Privacidade.
Público Alvo
Esta certificação em nível Practitioner será particularmente útil para Data Protection Officers (DPOs) ou “Encarregados pelo Tratamento de Dados Pessoais” em uma organização / Privacy Officers, Legal/Compliance Officers, Security Officers, Gerentes de Continuidade de Negócios, Controladores dos Dados, Auditores de Proteção de Dados (internos e externos), Analistas de Privacidade e gerentes de RH.
Uma vez que esta é uma certificação de nível avançado, a aprovação prévia no EXIN Data & Protection Foundation é altamente recomendada.
Carga
24h
Conteúdo
1. Políticas de proteção de dados
1.1 Objetivo das políticas de proteção de dados/privacidade em uma organização.
1.2 Conceitos de proteção de dados desde a concepção (by design) e por padrão (by default).
2. Gerenciando e organizando a proteção de dados
2.1 Aplicar as fases do Sistema de Gestão de Proteção de Dados (DPMS).
2.2 Aplicar a teoria de um plano de ação para conscientização sobre a proteção de dados.
3. Papéis do Controlador, Processador e Data Protection Officer (DPO)
3.1 Implementar os papéis do controlador e processador de dados.
3.2 Estabelecer o papel e as responsabilidades de um DPO.
4. Avaliação de Impacto sobre a Proteção de Dados (AIPD)
4.1 Aplicar os critérios para uma AIPD.
4.2 Aplicar as etapas de uma AIPD.
5. Violação de dados, notificação e resposta a incidentes.
5.1 Aplicar os requisitos do GDPR em relação a violações de dados pessoais.
5.2 Aplicar os requisitos para notificação.
Visão Global
Onde quer que os dados pessoais sejam coletados, armazenados, usados e, finalmente, excluídos ou destruídos, surgem preocupações de privacidade. Com a Lei Geral de Proteção de Dados (LGPD), o Congresso Brasileiro tenta reforçar e unificar a proteção de dados para todos os indivíduos dentro do Brasil. Este regulamento afeta todas as organizações que processam os dados pessoais de cidadãos do Brasil e tem efeitos além destas fronteiras. O exame EXIN Privacy & Data Protection Essentials abrange os principais assuntos relacionados à LGPD.
Público Alvo
Todos os colaboradores que precisam ter uma compreensão da proteção de dados e dos requisitos legais brasileiros, conforme definido na LGPD. O exame Essentials é extremamente recomendável para todos que precisam conhecer ou estar atualizados quanto à privacidade e proteção de dados de acordo com a lei local.
Carga
8h
Conteúdo
1. Fundamentos e regulamentação de privacidade e proteção de dados
1.1 Definições
1.2 Dados pessoais
1.3 Fundamentos legítimos e limitação de propósito
1.4 Requisitos adicionais para processamento legítimo de dados pessoais
1.5 Direitos do titular dos dados
1.6 Violação de dados e procedimentos relacionados
2. Organizando a proteção de dados
2.1 Importância da proteção de dados para a organização
2.2 Autoridade Nacional de Proteção de Dados (ANPD)
2.3 Transferência de dados pessoais para outros países
2.4 Normas Corporativas Globais e proteção de dados em contratos
3. Práticas de proteção de dados
3.1 Proteção de dados desde a concepção (by design) e por padrão
3.2 Relatório de impacto sobre a proteção de dados (RIPD)
3.3 Aplicações práticas relacionadas ao uso de dados, marketing e mídias sociais
Overview
Audience(s): IT Pros
Technology: System Center
Level: Advanced
This Revision: B
Delivery method: Classroom
Length: 2 days
Language(s): English
About this course
This is a two-day instructor-led training (ILT) course that describes the integration of various online cloud services with Microsoft System Center Configuration Manager. This course covers integration with online services such as Microsoft Store for Business, Microsoft Office 365, and Microsoft Azure. It also describes how to manage mobile devices by using methods such as on-premises mobile device management and Exchange Server integration.
Audience profile
This course is intended for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses or intends to use the latest branch of Configuration Manager to manage and deploy PCs, devices, and applications.
The secondary audience for this course are individuals who are interested in taking Exam 70-703: “Administering System Center Configuration Manager and Cloud Services Integration.”
At course completion
After completing this course, students will be able to:
• Describe the challenges in managing a mobile and internet-based workforce and how Configuration Manager integrated with mobile device management and cloud services solutions can address these challenges.
• Describe and configure methods used to manage client devices that are located outside of the corporate network and connected to the internet.
• Deploy and manage Microsoft Store for Business apps by using Configuration Manager.
• Deploy and manage Office 365 apps by using Configuration Manager.
• Manage mobile devices by using Configuration Manager.
• Describe and configure on-premises mobile device management using Configuration Manager.
Course Outline
Module 1: Extending the Configuration Manager infrastructure to support internet-based and mobile devices
This module describes the challenges in managing a mobile and internet-based workforce. It also describes how Configuration Manager integrates with mobile device management and cloud services solutions to address these challenges.
Lessons
• Managing a mobile and distributed workforce
• Integrating Configuration Manager with cloud services and internet-based management solutions
• PKI requirements to support internet-based management
• Expanding content availability by using cloud-based distribution points
Lab : Preparing for cloud integration
• Activating an Azure trial subscription
• Configuring and enabling directory syncing
Lab : Implementing PKI for Configuration Manager site systems and clients
• Creating certificate templates for Configuration Manager services
• Deploying certificates for Configuration Manager
Lab : Configuring cloud-based distribution points
• Creating and exporting an Azure management certificate for cloud-based distribution points
• Setting up Azure and creating a cloud-based distribution point
After completing this module, students will be able to:
• Understand the challenges in managing a mobile and distributed workforce.
• Understand the considerations for integrating Configuration Manager with cloud services and internet-based management solutions.
• Describe the public key infrastructure (PKI) requirements to support the internet and mobile device management.
• Explain how to expand content availability by using cloud-based distribution points.
Module 2: Managing clients on the internet
This module explains how to manage client devices that are located outside of the corporate network and connected to the internet.
Lessons
• Methods for managing internet-based clients
• Planning and implementing IBCM
• Planning and implementing the Cloud Management Gateway
Lab : Configuring IBCM
• Configuring the Configuration Manager site systems to support IBCM
• Verifying the client settings for IBCM
Lab : Configuring the Cloud Management Gateway for managing clients on the internet
• Enabling the Cloud Management Gateway feature
• Creating and exporting the Azure management certificate for cloud-based distribution points
• Setting up the Cloud Management Gateway
After completing this module, students will be able to:
• Identify the methods for managing client devices that are connected to the internet, but located outside the corporate network.
• Describe the considerations and tasks for enabling Configuration Manager to support internet-based client management (IBCM).
• Describe the considerations and procedures for implementing the Cloud Management Gateway to support internet-based clients.
Module 3: Managing Microsoft Store for Business apps by using Configuration Manager
This module explains how to use Microsoft Store for Business, how to set it up, and how to manage it. It also describes how to deploy and manage Microsoft Store for Business apps by using Configuration Manager.
Lessons
• Overview of Microsoft Store for Business
• Managing Microsoft Store for Business apps by using Configuration Manager
Lab : Setting up and managing Microsoft Store for Business
• Signing up for Microsoft Store for Business
• Managing Microsoft Store for Business
Lab : Deploying Microsoft Store for Business apps by using Configuration Manager
• Setting up syncing with Microsoft Store for Business
• Deploying and managing Microsoft Store for Business apps
After completing this module, students will be able to:
• Explain how to manage Microsoft Store for Business and describe its features.
• Deploy apps from Microsoft Store for Business by using Configuration Manager.
Module 4: Managing Office 365 apps by using Configuration Manager
This module explains how to implement Office 365 client management to help support an Office 365 cloud-based solution. It also describes how to deploy and manage Office 365 apps by using Configuration Manager.
Lessons
• Overview of Office 365 ProPlus
• Deploying Office 365 client applications by using Configuration Manager
• Managing and updating an Office 365 client deployment
Lab : Preparing Office 365 for application deployment
• Signing up for an Office 365 trial subscription
• Assigning Office 365 ProPlus licenses to users
• Modifying Office 365 ProPlus options for manual downloads
Lab : Deploying and managing Office 365 client applications by using Configuration Manager
• Configuring infrastructure requirements to support Office 365 client management
• Deploying the Office 365 client application
• Configuring software updates to support Office 365
After completing this module, students will be able to:
• Describe Microsoft Office 365 ProPlus features.
• Use Configuration Manager to deploy Office 365 applications.
• Manage and update an Office 365 client deployment.
Module 5: Mobile device management by using Configuration Manager
This module describes the methods and technologies to manage mobile devices by using Configuration Manager.
Lessons
• Overview of mobile device management
• Configuring the Exchange Server connector for mobile device management
Lab : Managing mobile devices by using the Exchange Server connector
• Configuring permissions for Exchange integration
• Configuring the Exchange Server connector
• Managing mobile devices by using Configuration Manager
After completing this module, students will be able to:
• Provide an overview of Microsoft mobile device management technologies and how they integrate with Configuration Manager.
• Explain how to deploy the Microsoft Exchange Server connector for Configuration Manager.
Module 6: On-premises mobile device management using Configuration Manager
This module explains on-premises mobile device management, its requirements, and the types of devices it can manage. It also explains how to implement on-premises mobile device management in an existing Configuration Manager environment and the different ways to enroll Windows 10 devices.
Lessons
• Overview of on-premises mobile device management
• Configuring on-premises mobile device management using Configuration Manager
Lab : Managing mobile devices with an on-premises infrastructure
• Configuring PKI for on-premises mobile device management
• Preparing Configuration Manager for on-premises mobile device management
• Enrolling Windows 10 devices for on-premises mobile device management
After completing this module, students will be able to:
• Explain what on-premises mobile device management is and compare it with other management options.
• Plan for and implement the requirements for on-premises mobile device management.
• Enroll a modern Windows 10 device in on-premises mobile device management
Additional Reading
To help you prepare for this class, attend the following course:
• Course 20703-1A: Administering System Center Configuration Manager
Prerequisites
Before attending this course, students must have system administrator–level working knowledge of:
• Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching, and addressing.
• Active Directory Domain Services (AD DS) principles and fundamentals of AD DS management.
• Installation, configuration, and troubleshooting for Windows-based personal computers.
• Basic concepts of PKI security.
• Basic understanding of scripting and Windows PowerShell syntax.
• Basic understanding of Windows Server roles and services.
• Basic understanding of the configuration options for iOS, Android, and Windows Mobile device platforms.
• Basic understanding of management tasks using Configuration Manager.
Este treinamento é composto pelos seguintes cursos:
1. AZ-101T01: Migrate Servers to Azure (Carga: 8h)
2. AZ-101T02: Implement and Manage Application Services (Carga: 8h)
3. AZ-101T03: Implement Advanced Virtual Networking (Carga: 8h)
4. AZ-101T04: Secure Identities (Carga: 8h)
____________________________________
Segue abaixo a descrição dos cursos:
1.Course AZ-101T01-A: Migrate Servers to Azure
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
This course teaches IT professionals how to discover, assess, plan and implement a migration of on-premises resources and infrastructure to Azure. Students will learn how to use Azure Migrate to perform the discovery and assessment phase that is critical to a successful migration. Students will also learn how to use Azure Site Recovery for performing the actual migration of workloads to Azure. The course focuses primarily on using ASR on a Hyper-V infrastructure to prepare and complete the migration process. Students will learn about using Azure Backup and Azure to Azure replication to ensure adequate disaster recovery mechanisms are in place. Finally, students will learn about using Azure Database Migration Service and the Azure Import/Export service for data migration scenarios.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Use Azure Migrate to discover and assess on-premises virtual machine migration to Azure.
• Use Azure Site Recovery to migrate Hyper-V infrastructures to Azure.
• Use Azure Database Migration service and Azure Import/Export service for data migration scenarios.
Course Outline
Module 1: Azure Migrate
In this module, you will be introduced to Azure migration projects and specifically Azure Migrate. Azure Migrate will be your tool of choice for automated server discovery and workload sizing. You will step through the process of using Azure Migrate to create a project, create a collector, assess machine readiness, and estimate cost.
Lessons
• Overview of Cloud Migration
• Azure Migrate: The Process
After completing this module, students will be able to:
• Use Azure Migrate to discover and assess on-premises virtual machine migration to Azure.
Module 2: Azure Site Recovery
In this module, you will be introduced to Azure Site Recovery (ASR). ASR will be your primary tool for migrating workloads to Azure. You will learn which scenarios are most appropriate for ASR and the features that the product provides. You will also learn how to use the ASR deployment planner to ensure your infrastructure is ready for migration. Lastly, you will walk through the process of implementing ASR on a Hyper-V infrastructure.
Lessons
• Overview of ASR
• Preparing the Infrastructure
• Completing the Migration Process
After completing this module, students will be able to:
• Use Azure Site Recovery to migrate Hyper-V infrastructures to Azure.
Module 3: Disaster Recovery
In this module, you will introduced to Azure Backup. Azure Backup can be used to backup and restore your virtual machines. You will also learn about Azure to Azure replication. This will enable you to replicate virtual machines from one Azure region to another Azure region. This will protect against regional outages.
Lessons
• Backup and Restore
• Azure to Azure Disaster Recovery
After completing this module, students will be able to:
• Use Azure Backup for virtual machines, and migrate virtual machines from one Azure region to another.
Module 4: Migrating Data
In this module, you will learn about using the Azure Database Migration service to perform seamless migrations at scale from multiple database sources to Azure Data platforms. You’ll also learn how to transfer large amount of data to and from the cloud using the Azure Import/Export service.
Lessons
• Database Migration
• Import and Export Service
After completing this module, students will be able to:
• Use Azure Database Migration service and Azure Import/Export service for data migration scenarios.
Module 5: Lab-Implement Azure Site Recovery Between Azure Regions
This module is provided to give you hands-on experience with the information provided in the course.
Lab : Implement Azure Site Recovery Between Azure Regions
• Implement prerequisites for migration of Azure VMs by using Azure Site Recovery
• Migrate an Azure VM between Azure regions by using Azure Site Recovery
After completing this module, students will be able to:
• Implement Azure Site Recovery Vault.
• Configure replication of Azure VMs between Azure regions by using Azure Site Recovery.
Prerequisites
Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
2.Course AZ-101T02-A: Implement and Manage Application Services
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
This course teaches IT Professionals how to manage and maintain the infrastructure for the core web apps and services that developers build and deploy. Students will learn how Azure App Service is used as a Platform as a Service (PaaS) offering for deploying cloud apps for web and mobile environments. Students will learn how to use App Service Environments (ASE) to host a dedicated environment for securing and running App Service apps at scale. Students will also learn how to use deployment slots as staging environments for web apps, that can then be swapped into production when needed. This course also teaches students how to scale up and scale out to meet and adjust for demand, and how bandwidth for web traffic can be optimized using Application Gateways and Content Delivery Networks (CDN). Lastly, the course provides students with an overview of serverless computing solutions, including Azure Functions, Event Grid, Service Bus, and Logic Apps.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Implement use cases and configuration options for Azure App Services and App Service Environments.
• Manage and secure web apps with backup, restore, snapshot, and cloning.
• Optimize your web app performance with Scale Up, Scale Out, Autoscale, and Grow out strategies.
• Deploy serverless computing features like Azure Functions, Event Grid, and Service Bus.
Course Outline
Module 1: Introducing the Azure App Service Platform
In this module, you will be introduced to the Azure App Services Platform. You will learn about app service plans, web app hosting options, app service scenarios and how to monitor apps. You will also learn about how to isolate apps with App Service Environments.
Lessons
• Introducing Azure App Service
• App Service Environments
After completing this module, students will be able to:
• Implement use cases and configuration options for Azure App Services and App Service Environments.
Module 2: Managing and Securing Web Apps
In this module, you will learn how to deploy your app with minimal downtime. You will also learn how to backup, restore, snapshot, and clone your app. Lastly, you will implement security features like authentication options and authentication providers.
Lessons
• Deploying Web Apps
• Managing Web Apps
• App Service Security
After completing this module, students will be able to:
• Manage and secure web apps with backup, restore, snapshot, and cloning.
Module 3: Scaling and Performance
In this module, you will learn how to ensure your app performs under various workloads. You will learn how to scale up and scale out your app. You will learn how to automatically scale your app and to grow out the app through geo-distribution. Lastly you will learn how CDN provides a way to optimize bandwidth and web traffic.
Lessons
• Scale Up and Scale Out
• Autoscale and Grow out
• Optimizing Bandwidth and Web Traffic
After completing this module, students will be able to:
• Optimize your web app performance with Scale Up, Scale Out, Autoscale, and Grow out strategies.
Module 4: Deploying Serverless Computing Solutions
In the module, you will learn what serverless computing is and what it provides. You will implement three serverless computing solutions: Azure Functions, Event Grid, and Service Bus. Azure Functions provide small pieces of code, or "functions," that run in the cloud. Event Grid is a service for managing routing of all events from any source to any destination. Service Bus multi-tenant cloud messaging service that sends information between applications and services.
Lessons
• Serverless Computing Concepts
• Managing Azure Functions
• Managing Event Grid
• Managing Service Bus
• Managing Logic App
After completing this module, students will be able to:
• Deploy serverless computing features like Azure Functions, Event Grid, and Service Bus.
Module 5: Lab-Implement and Manage Application Services
This module is provided to give you hands-on experience with the information provided in the course.
Lab : Implement and Manage Application Services
• Implement Azure web apps.
• Manage scalability and performance of Azure web apps.
After completing this module, students will be able to:
• Implement Azure web apps.
• Manage scalability and performance of Azure web apps.
Prerequisites
Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
3.Course AZ-101T03-A: Implement Advanced Virtual Networking
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
This course teaches IT Professionals how to implement and configure different Azure networking traffic distribution mechanisms, including Azure Load Balancer, Azure Traffic Manager, and Azure Application Gateway. Students will also learn how to implement site connectivity for multiple scenarios including cross-premises and hybrid configurations, as well as extending on-premises networks into the Microsoft cloud over a dedicated private connection, using Azure ExpressRoute. Lastly, students will learn how to use Network Watcher to monitor and troubleshoot Azure virtual networks. They will also learn how to troubleshoot and remediate common errors in Azure Application Gateway and Azure Load Balancer.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Cloud Administrators use the Azure Portal and as they become more proficient they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Implement and configure Azure Load Balancer, Azure Traffic Manager, and Azure Application Gateway.
• Implement and configure Site-to-Site VPN connections and ExpressRoute.
• Implement and configure Network Watcher and troubleshooting common network issues.
Course Outline
Module 1: Distributing Network Traffic
In this module, you will learn about three ways to distribute network traffic: Azure Load Balancer, Azure Traffic Manager, and Azure Application Gateway. The Azure Load Balancer delivers high availability and network performance to your applications. The Azure Traffic Manager allows you to control the distribution of user traffic to your service endpoints. The Azure Application Gateway is a web traffic load balancer that enables you to manage traffic to your web applications.
Lessons
• Overview of Network Traffic Distribution Options
• Azure Load Balancer
• Azure Traffic Manager
• Azure Application Gateway
After completing this module, students will be able to:
• Implement and configure Azure Load Balancer, Azure Traffic Manager, and Azure Application Gateway.
Module 2: Site Connectivity
In this module, you will learn and implement two ways to connect your virtual networks: Site-to-Site VPN Connections and ExpressRoute. Site-to-Site VPN connections provide secure tunneling for cross-premises and hybrid configurations. ExpressRoute extends your on-premises networks into the Microsoft cloud over a dedicated private connection facilitated by a connectivity provider.
Lessons
• Site-to-Site VPN Connections
• ExpressRoute
After completing this module, students will be able to:
• Implement and configure Site-to-Site VPN connections and ExpressRoute.
Module 3: Monitoring and Troubleshooting Network Connectivity
In this module, you will learn important skills around troubleshooting virtual network connectivity. The primary tool discussed is Azure Network Watcher. Azure Network Watcher provides IP flow verification, VPN diagnostics, NSG views and flows, and next hop analysis.
Lessons
• Introducing Network Watcher
• Implementing Network Watcher
• Network Troubleshooting Examples
After completing this module, students will be able to:
• Implement and configure Network Watcher and troubleshooting common network issues.
Module 4: Lab-Implement Advanced Virtual Networking
This module is provided to give you hands-on experience with the information provided in the course.
Lab : Implement Advanced Virtual Networking
• Deploy Azure VMs by using Azure Resource Manager templates.
• Implement Azure Load Balancing.
• Implement Azure Traffic Manager load balancing.
After completing this module, students will be able to:
• Deploy Azure VMs by using Azure Resource Manager templates.
• Implement Azure Load Balancing.
• Implement Azure Traffic Manager load balancing.
Prerequisites
Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
4.Course AZ-101T04-A: Secure Identities
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
This course teaches IT Professionals to understand the challenges that organizations face in keeping modern IT environments secure, as the more distributed environments that are part of a cloud-first or hybrid world have rapidly created new security challenges for IT. The course focuses on three key areas in the defense against attackers who target security vulnerabilities, resulting particularly from credential theft and compromised identities: Role-Based Access Control (RBAC), Multi-Factor Authentication (MFA), and Azure Active Directory Privileged Identity Management (PIM). Students learn to implement two-step verification to secure the sign-in process, as well has how to use advanced features like trusted IPs and Fraud Alerts with MFA to customize their identity access strategy. Using Privileged Identity Management, students learn how to apply just the right amount of access rights for just the right amount of time to the various administrative roles as well as to resources.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Use Azure RBAC to grant a granular level of access based on an administrator’s assigned tasks.
• Use Azure Multi-Factor Authentication to configure a strong authentication for users at sign-in.
• User Azure AD Privileged Identity Management to configure access rights based on just-in-time administration.
Course Outline
Module 1: Introduction to Identity Protection in Azure
In this module, you’ll learn about Role-Based Access Control as the foundation to organizing and managing an organization’s administrative access based on the principle of least privilege. You will also review Azure Active Directory concepts, as well as gaining insight into the threat landscape and security risks that are exposed to IT organizations through breach of privileged access.
Lessons
• Role-Based Access Control
• Azure Active Directory (Refresher)
• Protecting Privileged Access in the Environment
After completing this module, students will be able to:
• Use Azure RBAC to grant a granular level of access based on an administrator’s assigned tasks.
Module 2: Using Multi-Factor Authentication for Secure Access
In this module, you’ll learn about securing the sign-in process through Multi-Factor Authentication (MFA). You’ll learn how MFA works and the differences in implementation between on-premises and cloud scenarios. You’ll also learn about using conditional access policies to provide more fine-grained control over apps and resources in your environment.
Lessons
• Introducing Multi-Factor Authentication
• Implementing MFA
After completing this module, students will be able to:
• Use Azure Multi-Factor Authentication to configure a strong authentication for users at sign-in.
Module 3: Azure AD Privileged Identity Management
In this module, you’ll learn how to use Azure Privileged Identity Management (PIM) to enable just-in-time administration and control the number of users who can perform privileged operations. You’ll also learn about the different directory roles available as well as newer functionality that includes PIM being expanded to role assignments at the resource level.
Lessons
• Getting Started with PIM
• PIM Security Wizard
• PIM for Directory Roles
• PIM for Role Resources
After completing this module, students will be able to:
• User Azure AD Privileged Identity Management to configure access rights based on just-in-time administration.
Module 4: Lab-Secure Identities
This module is provided to give you hands-on experience with the information provided in the course.
Lab : Secure Identities
• Deploy an Azure VM by using an Azure Resource Manager template.
• Create Azure AD users and groups.
• Delegate management of Azure resources by using custom Role-Based Access Control (RBAC) roles.
• Delegate management of Azure AD by using Privileged Identity Management directory roles.
• Delegate management of Azure resources by using Privileged Identity Management resource roles.
After completing this module, students will be able to:
• Deploy an Azure VM by using an Azure Resource Manager template.
• Create Azure AD users and groups.
• Delegate management of Azure resources by using custom Role-Based Access Control (RBAC) roles.
• Delegate management of Azure AD by using Privileged Identity Management directory roles.
• Delegate management of Azure resources by using Privileged Identity Management resource roles.
Prerequisites
Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
Overview
Audience(s): IT Professionals
Technology: SQL Server
Level: Advanced
This Revision: C
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This five-day instructor-led course provides students who administer and maintain SQL Server databases with the knowledge and skills to administer a SQL server database infrastructure. Additionally, it will be of use to individuals who develop applications that deliver content from SQL Server databases.
Audience profile
The primary audience for this course is individuals who administer and maintain SQL Server databases. These individuals perform database administration and maintenance as their primary area of responsibility, or work in environments where databases play a key role in their primary job.
The secondary audiences for this course are individuals who develop applications that deliver content from SQL Server databases.
At course completion
After completing this course, students will be able to:
• Authenticate and authorize users
• Assign server and database roles
• Authorize users to access resources
• Protect data with encryption and auditing
• Describe recovery models and backup strategies
• Backup SQL Server databases
• Restore SQL Server databases
• Automate database management
• Configure security for the SQL Server agent
• Manage alerts and notifications
• Managing SQL Server using PowerShell
• Trace access to SQL Server
• Monitor a SQL Server infrastructure
• Troubleshoot a SQL Server infrastructure
• Import and export data
Course Outline
Module 1: SQL Server Security
Protection of data within your Microsoft SQL Server databases is essential and requires a working knowledge of the issues and SQL Server security features. This module describes SQL Server security models, logins, users, partially contained databases, and cross-server authorization.
Lessons
• Authenticating Connections to SQL Server
• Authorizing Logins to Connect to databases
• Authorization Across Servers
• Partially Contained Databases
Lab : Authenticating Users
• Create Logins
• Create Database Users
• Correct Application Login Issues
• Configure Security for Restored Databases
After completing this module, you will be able to:
• SQL Server basic concepts.
• SQL Server connection authentication.
• User login authorization to databases.
• Partially contained databases.
• Authorization across servers.
Module 2: Assigning Server and Database Roles
Using roles simplifies the management of user permissions. With roles, you can control authenticated users’ access to system resources based on each user’s job function—rather than assigning permissions user-by-user, you can grant permissions to a role, then make users members of roles. Microsoft SQL Server includes support for security roles defined at server level and at database level.
Lessons
• Working with server roles
• Working with Fixed Database Roles
• Assigning User-Defined Database Roles
Lab : Assigning server and database roles
• Assigning Server Roles
• Assigning Fixed Database Roles
• Assigning User-Defined Database Roles
• Verifying Security
After completing this module, you will be able to:
• Describe and use server roles to manage server-level security.
• Describe and use fixed database roles.
• Use custom database roles and application roles to manage database-level security.
Module 3: Authorizing Users to Access Resources
In the previous modules, you have seen how Microsoft SQL Server security is organized and how sets of permissions can be assigned at the server and database level by using fixed server roles, user-defined server roles, fixed database roles, and application roles. The final step in authorizing users to access SQL Server resources is the authorization of users and roles to access server and database objects. In this module, you will see how these object permissions are managed. In addition to access permissions on database objects, SQL Server provides the ability to determine which users are allowed to execute code, such as stored procedures and functions. In many cases, these permissions and the permissions on the database objects are best configured at the schema level rather than at the level of the individual object. Schema-based permission grants can simplify your security architecture. You will explore the granting of permissions at the schema level in the final lesson of this module.
Lessons
• Authorizing User Access to Objects
• Authorizing Users to Execute Code
• Configuring Permissions at the Schema Level
Lab : Authorizing users to access resources
• Granting, Denying, and Revoking Permissions on Objects
• Granting EXECUTE Permissions on Code
• Granting Permissions at the Schema Level
After completing this module, you will be able to:
• Authorize user access to objects.
• Authorize users to execute code.
• Configure permissions at the schema level.
Module 4: Protecting Data with Encryption and Auditing
When configuring security for your Microsoft SQL Server systems, you should ensure that you meet any of your organization’s compliance requirements for data protection. Organizations often need to adhere to industry-specific compliance policies, which mandate auditing of all data access. To address this requirement, SQL Server provides a range of options for implementing auditing. Another common compliance requirement is the encryption of data to protect against unauthorized access in the event that access to the database files is compromised. SQL Server supports this requirement by providing transparent data encryption (TDE). To reduce the risk of information leakage by users with administrative access to a database, columns containing sensitive data—such as credit card numbers or national identity numbers—can be encrypted using the Always Encrypted feature. This module describes the available options for auditing in SQL Server, how to use and manage the SQL Server Audit feature, and how to implement encryption.
Lessons
• Options for auditing data access in SQL Server
• Implementing SQL Server Audit
• Managing SQL Server Audit
• Protecting Data with Encryption
Lab : Using Auditing and Encryption
• Working with SQL Server Audit
• Encrypt a Column as Always Encrypted
• Encrypt a Database using TDE
After completing this module, you will be able to:
• Describe the options for auditing data access.
• Implement SQL Server Audit.
• Manage SQL Server Audit.
• Describe and implement methods of encrypting data in SQL Server.
• Implement encryption
Module 5: Recovery Models and Backup Strategies
One of the most important aspects of a database administrator's role is ensuring that organizational data is reliably backed up so that, if a failure occurs, you can recover the data. Even though the computing industry has known about the need for reliable backup strategies for decades—and discussed this at great length—unfortunate stories regarding data loss are still commonplace. A further problem is that, even when the strategies in place work as they were designed, the outcomes still regularly fail to meet an organization’s operational requirements. In this module, you will consider how to create a strategy that is aligned with organizational needs, based on the available backup models, and the role of the transaction logs in maintaining database consistency.
Lessons
• Understanding Backup Strategies
• SQL Server Transaction Logs
• Planning Backup Strategies
Lab : Understanding SQL Server recovery models
• Plan a Backup Strategy
• Configure Database Recovery Models
After completing this module, you will be able to:
• Describe various backup strategies.
• Describe how database transaction logs function.
• Plan SQL Server backup strategies.
Module 6: Backing Up SQL Server Databases
In the previous module, you learned how to plan a backup strategy for a SQL Server system. You can now learn how to perform SQL Server backups, including full and differential database backups, transaction log backups, and partial backups. In this module, you will learn how to apply various backup strategies.
Lessons
• Backing Up Databases and Transaction Logs
• Managing Database Backups
• Advanced Database Options
Lab : Backing Up Databases
• Backing Up Databases
• Performing Database, Differential, and Transaction Log Backups
• Performing a Partial Backup
After completing this module, you will be able to:
• Perform backups of SQL Server databases and transaction logs.
• Manage database backups.
• Describe advanced backup options.
Module 7: Restoring SQL Server 2016 Databases
In the previous module, you learned how to create backups of Microsoft SQL Server 2016 databases. A backup strategy might involve many different types of backup, so it is essential that you can effectively restore them. You will often be restoring a database in an urgent situation. You must, however, ensure that you have a clear plan of how to proceed and successfully recover the database to the required state. A good plan and understanding of the restore process can help avoid making the situation worse. Some database restores are related to system failure. In these cases, you will want to return the system as close as possible to the state it was in before the failure. Some failures, though, are related to human error and you might wish to recover the system to a point before that error. The point-in-time recovery features of SQL Server 2016 can help you to achieve this. Because they are typically much larger, user databases are more likely to be affected by system failures than system databases. However, system databases can be affected by failures, and special care should be taken when recovering them. In particular, you need to understand how to recover each system database because you cannot use the same process for all system databases. In this module, you will see how to restore user and system databases and how to implement point-in-time recovery.
Lessons
• Understanding the Restore Process
• Restoring Databases
• Advanced Restore Scenarios
• Point-in-Time Recovery
Lab : Restoring SQL Server Databases
• Restoring a Database Backup
• Restring Database, Differential, and Transaction Log Backups
• Performing a Piecemeal Restore
After completing this module, you will be able to:
• Explain the restore process.
• Restore databases.
• Perform advanced restore operations.
• Perform a point-in-time recovery.
Module 8: Automating SQL Server Management
The tools provided by Microsoft SQL Server make administration easy when compared to some other database engines. However, even when tasks are easy to perform, it is common to have to repeat a task many times. Efficient database administrators learn to automate repetitive tasks. This can help to avoid situations where an administrator forgets to execute a task at the required time. Perhaps more importantly, the automation of tasks helps to ensure that they are performed consistently, each time they are executed. This module describes how to use SQL Server Agent to automate jobs, how to configure security contexts for jobs, and how to implement multiserver jobs.
Lessons
• Automating SQL Server management
• Working with SQL Server Agent
• Managing SQL Server Agent Jobs
• Multi-server Management
Lab : Automating SQL Server Management
• Create a SQL Server Agent Job
• Test a Job
• Schedule a Job
• Configure Master and Target Servers
After completing this module, you will be able to:
• Describe methods for automating SQL Server Management.
• Configure jobs, job step types, and schedules.
• Manage SQL Server Agent jobs.
• Configure master and target servers.
Module 9: Configuring Security for SQL Server Agent
Other modules in this course have demonstrated the need to minimize the permissions that are granted to users, following the principle of “least privilege.” This means that users have only the permissions that they need to perform their tasks. The same logic applies to the granting of permissions to SQL Server Agent. Although it is easy to execute all jobs in the context of the SQL Server Agent service account, and to configure that account as an administrative account, a poor security environment would result from doing this. It is important to understand how to create a minimal privilege security environment for jobs that run in SQL Server Agent.
Lessons
• Understanding SQL Server Agent Security
• Configuring Credentials
• Configuring Proxy Accounts
Lab : Configuring Security for SQL Server Agent
• Analyzing Problems in SQL Server Agent
• Configuring a Credential
• Configuring a Proxy Account
• Configuring and testing the Security Context of a Job
After completing this module, you will be able to:
• Explain SQL Server Agent security.
• Configure credentials.
• Configure proxy accounts.
Module 10: Monitoring SQL Server with Alerts and Notifications
One key aspect of managing Microsoft SQL Server in a proactive manner is to make sure you are aware of problems and events that occur in the server, as they happen. SQL Server logs a wealth of information about issues. You can configure it to advise you automatically when these issues occur, by using alerts and notifications. The most common way that SQL Server database administrators receive details of events of interest is by email message. This module covers the configuration of Database Mail, alerts, and notifications for a SQL Server instance, and the configuration of alerts for Microsoft Azure SQL Database.
Lessons
• Monitoring SQL Server Errors
• Configuring Database Mail
• Operators, Alerts, and Notifications
• Alerts in Azure SQL Database
Lab : Monitoring SQL Server with Alerts and Notifications
• Configuring Database Mail
• Configuring Operators
• Configuring Alerts and Notifications
• Testing Alerts and Notifications
After completing this module, you will be able to:
• Monitor SQL Server errors.
• Configure database mail.
• Configure operators, alerts, and notifications.
• Work with alerts in Azure SQL Database.
Module 11: Introduction to Managing SQL Server by using PowerShell
This module looks at how to use Windows PowerShell with Microsoft SQL Server. Businesses are constantly having to increase the efficiency and reliability of maintaining their IT infrastructure; with PowerShell, you can improve this efficiency and reliability by creating scripts to carry out tasks. PowerShell scripts can be tested and applied multiple times to multiple servers, saving your organization both time and money.
Lessons
• Getting Started with Windows PowerShell
• Configure SQL Server using PowerShell
• Administer and Maintain SQL Server with PowerShell
• Managing Azure SQL Databases using PowerShell
Lab : Using PowerShell to Manage SQL Server
• Getting Started with PowerShell
• Using PowerShell to Change SQL Server settings
After completing this module, you will be able to:
• Describe the benefits of PowerShell and its fundamental concepts.
• Configure SQL Server by using PowerShell.
• Administer and maintain SQL Server by using PowerShell.
• Manage an Azure SQL Database by using PowerShell.
Module 12: Tracing Access to SQL Server with Extended events
Monitoring performance metrics provides a great way to assess the overall performance of a database solution. However, there are occasions when you need to perform more detailed analysis of the activity occurring within a Microsoft SQL Server instance—to troubleshoot problems and identify ways to optimize workload performance. SQL Server Extended Events is a flexible, lightweight event-handling system built into the Microsoft SQL Server Database Engine. This module focuses on the architectural concepts, troubleshooting strategies and usage scenarios of Extended Events.
Lessons
• Extended Events Core Concepts
• Working with Extended Events
Lab : Extended Events
• Using the System_Health Extended Events Session
• Tracking Page Splits Using Extended Events
After completing this module, you will be able to:
• Describe Extended Events core concepts.
• Create and query Extended Events sessions.
Module 13: Monitoring SQL Server
The Microsoft SQL Server Database Engine can run for long periods without the need for administrative attention. However, if you regularly monitor the activity that occurs on the database server, you can deal with potential issues before they arise. SQL Server provides a number of tools that you can use to monitor current activity and record details of previous activity. You need to become familiar with what each of the tools does and how to use them. It is easy to become overwhelmed by the volume of output that monitoring tools can provide, so you also need to learn techniques for analyzing their output.
Lessons
• Monitoring activity
• Capturing and Managing Performance Data
• Analyzing Collected Performance Data
• SQL Server Utility
Lab : Monitoring SQL Server
After completing this module, you will be able to:
• Monitor current activity.
• Capture and manage performance data.
• Analyze collected performance data.
• Configure SQL Server Utility.
Module 14: Troubleshooting SQL Server
Database administrators working with Microsoft SQL Server need to adopt the important role of troubleshooter when issues arise—particularly if users of business-critical applications that rely on SQL Server databases are being prevented from working. It is important to have a solid methodology for resolving issues in general, and to be familiar with the most common issues that can arise when working with SQL Server systems.
Lessons
• A Trouble Shooting Methodology for SQL Server
• Resolving Service Related Issues
• Resolving Connectivity and Log-in issues
Lab : Troubleshooting Common Issues
• Troubleshoot and Resolve a SQL Login Issue
• Troubleshoot and Resolve a Service Issue
• Troubleshoot and Resolve a Windows Login Issue
• Troubleshoot and Resolve a Job Execution Issue
• Troubleshoot and Resolve a Performance Issue
After completing this module, you will be able to:
• Describe a troubleshooting methodology for SQL Server.
• Resolve service-related issues.
• Resolve login and connectivity issues.
Module 15: Importing and Exporting Data
While a great deal of data residing in a Microsoft SQL Server system is entered directly by users who are running application programs, there is often a need to move data in other locations, to and from SQL Server. SQL Server provides a set of tools you can use to transfer data in and out. Some of these tools, such as the bcp (Bulk Copy Program) utility and SQL Server Integration Services, are external to the database engine. Other tools, such as the BULK INSERT statement and the OPENROWSET function, are implemented in the database engine. With SQL Server, you can also create data-tier applications that package all the tables, views, and instance objects associated with a user database into a single unit of deployment. In this module, you will explore these tools and techniques so that you can import and export data to and from SQL Server.
Lessons
• Transferring Data to and from SQL Server
• Importing and Exporting Table Data
• Using bcp and BULK INSERT to Import Data
• Deploying and Upgrading Data-Tier Application
Lab : Importing and Exporting Data
• Import and Excel Data Using the Import Wizard
• Import a Delimited Text File Using bcp
• Import a Delimited Text File using BULK INSERT
• Create and Test an SSIS Package to Extract Data
• Deploy a Data-Tier Application
After completing this module, you will be able to:
• Describe tools and techniques for transferring data.
• Import and export table data.
• Use bcp and BULK INSERT to import data.
• Use data-tier applications to import and export database applications.
Prerequisites
In addition to their professional experience, students who attend this training should already have the following technical knowledge:
· Basic knowledge of the Microsoft Windows operating system and its core functionality.
· Working knowledge of Transact-SQL.
· Working knowledge of relational databases.
· Some experience with database design.
Overview
Technology: Windows Server
Level: Intermediate
This Revision: B
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This five-day instructor-led course teaches IT professionals how to deploy and configure Active Directory Domain Services (AD DS) in a distributed environment, how to implement Group Policy, how to perform backup and restore, and how to monitor and troubleshoot Active Directory–related issues with Windows Server 2016. Additionally, this course teaches students how to deploy other Active Directory server roles, such as Active Directory Federation Services (AD FS) and Active Directory Certificate Services (AD CS).
Audience profile
This course is primarily intended for existing IT professionals who have some AD DS knowledge and experience and who aim to develop knowledge about identity and access technologies in Windows Server 2016. This would typically include:
AD DS administrators who are looking to train in identity and access technologies with Windows Server 2012 or Windows Server 2016.
System or infrastructure administrators with general AD DS experience and knowledge who are looking to cross-train in core and advanced identity and access technologies in Windows Server 2012 or Windows Server 2016.
The secondary audience for this course includes IT professionals who are looking to consolidate their knowledge about AD DS and related technologies, in addition to IT professionals who want to prepare for the 70-742 exam.
At course completion
After completing this course, students will be able to:
• Install and configure domain controllers.
• Manage objects in AD DS by using graphical tools and Windows PowerShell.
• Implement AD DS in complex environments.
• Implement AD DS sites, and configure and manage replication.
• Implement and manage Group Policy Objects (GPOs).
• Manage user settings by using GPOs.
• Secure AD DS and user accounts.
• Implement and manage a certificate authority (CA) hierarchy with AD CS.
• Deploy and manage certificates.
• Implement and administer AD FS.
• Implement and administer Active Directory Rights Management Services (AD RMS).
• Implement synchronization between AD DS and Azure AD.
• Monitor, troubleshoot, and establish business continuity for AD DS services.
Course Outline
Module 1: Installing and configuring domain controllers
This module describes the features of AD DS and how to install domain controllers (DCs). It also covers the considerations for deploying DCs.
Lessons
• Overview of AD DS
• Overview of AD DS domain controllers
• Deploying a domain controller
Lab : Deploying and administering AD DS
• Deploying AD DS
• Deploying domain controllers by performing domain controller cloning
• Administering AD DS
After completing this module, students will be able to:
• Describe AD DS and its main components.
• Describe the purpose and roles of domain controllers.
• Describe the considerations for deploying domain controllers.
Module 2: Managing objects in AD DS
This module describes how to use various techniques to manage objects in AD DS. This includes creating and configuring user, group, and computer objects.
Lessons
• Managing user accounts
• Managing groups in AD DS
• Managing computer objects in AD DS
• Using Windows PowerShell for AD DS administration
• Implementing and managing OUs
Lab : Managing AD DS objects
• Creating and managing groups in AD DS
• Creating and configuring user accounts in AD DS
• Managing computer objects in AD DS
Lab : Administering AD DS
• Delegate administration for OUs
• Creating and modifying AD DS objects with Windows PowerShell
After completing this module, students will be able to:
• Manage user accounts in AD DS.
• Manage groups in AD DS.
• Manage computer objects in AD DS.
• Use Windows PowerShell for AD DS administration.
• Implement and manage OUs.
• Administer AD DS.
Module 3: Advanced AD DS infrastructure management
This module describes how to plan and implement an AD DS deployment that includes multiple domains and forests. The module provides an overview of the components in an advanced AD DS deployment, the process of implementing a distributed AD DS environment, and the procedure for configuring AD DS trusts.
Lessons
• Overview of advanced AD DS deployments
• Deploying a distributed AD DS environment
• Configuring AD DS trusts
Lab : Domain and trust management in AD DS
• Implementing forest trusts
• Implementing child domains in AD DS
After completing this module, students will be able to:
• Describe the components of an advanced AD DS deployment.
• Deploy a distributed AD DS environment..
• Configure AD DS trusts.
Module 4: Implementing and administering AD DS sites and replication
This module describes how to plan and implement an AD DS deployment that includes multiple locations. The module explains how replication works in a Windows Server 2016 AD DS environment.
Lessons
• Overview of AD DS replication
• Configuring AD DS sites
• Configuring and monitoring AD DS replication
Lab : Implementing AD DS sites and replication
• Modifying the default site
• Creating additional sites and subnets
• Configuring AD DS replication
• Monitoring and troubleshooting AD DS replication
After completing this module, students will be able to:
• Describe how AD DS replication works.
• Configure AD DS sites to help optimize authentication and replication traffic.
• Configure and monitor AD DS replication.
Module 5: Implementing Group Policy
This module describes how to implement a GPO infrastructure. The module provides an overview of the components and technologies that compose the Group Policy framework.
Lessons
• Introducing Group Policy
• Implementing and administering GPOs
• Group Policy scope and Group Policy processing
• Troubleshooting the application of GPOs
Lab : Implementing a Group Policy infrastructure
• Creating and configuring GPOs
• Managing GPO scope
Lab : Troubleshooting Group Policy infrastructure
• Verify GPO application
• Troubleshooting GPOs
After completing this module, students will be able to:
• Explain what Group Policy is.
• Implement and administer GPOs.
• Describe Group Policy scope and Group Policy processing.
• Troubleshoot GPO application.
Module 6: Managing user settings with Group Policy
This module describes how to configure Group Policy settings and Group Policy preferences. This includes implementing administrative templates, configuring folder redirection and scripts, and configuring Group Policy preferences.
Lessons
• Implementing administrative templates
• Configuring Folder Redirection, software installation, and scripts
• Configuring Group Policy preferences
Lab : Managing user settings with GPOs
• Using administrative templates to manage user settings
• Implement settings by using Group Policy preferences
• Configuring Folder Redirection
• Planning Group Policy (optional)
After completing this module, students will be able to:
• Implement administrative templates.
• Configure Folder Redirection, software installation, and scripts.
• Configure Group Policy preferences.
Module 7: Securing Active Directory Domain Services
This module describes how to configure domain controller security, account security, password security, and Group Managed Service Accounts (gMSA).
Lessons
• Securing domain controllers
• Implementing account security
• Implementing audit authentication
• Configuring managed service accounts
Lab : Securing AD DS
• Implementing security policies for accounts, passwords, and administrative groups
• Deploying and configuring an RODC
• Creating and associating a group MSA
After completing this module, students will be able to:
• Secure domain controllers.
• Implement account security.
• Implement audit authentication.
• Configure managed service accounts (MSAs).
Module 8: Deploying and managing AD CS
This module describes how to implement an AD CS deployment. This includes deploying, administering, and troubleshooting CAs.
Lessons
• Deploying CAs
• Administering CAs
• Troubleshooting and maintaining CAs
Lab : Deploying and configuring a two-tier CA hierarchy
• Deploying an offline root CA
• Deploying an enterprise subordinate CA
After completing this module, students will be able to:
• Deploy CAs.
• Administer CAs.
• Troubleshoot and maintain CAs.
Module 9: Deploying and managing certificates
This module describes how to deploy and manage certificates in an AD DS environment. This involves deploying and managing certificate templates, managing certificate revocation and recovery, using certificates in a business environment, and implementing smart cards.
Lessons
• Deploying and managing certificate templates
• Managing certificate deployment, revocation, and recovery
• Using certificates in a business environment
• Implementing and managing smart cards
Lab : Deploying and using certificates
• Configuring certificate templates
• Enrolling and using certificates
• Configuring and implementing key recovery
After completing this module, students will be able to:
• Deploy and manage certificate templates.
• Manage certificates deployment, revocation, and recovery.
• Use certificates in a business environment.
• Implement and manage smart cards
Module 10: Implementing and administering AD FS
This module describes AD FS and how to configure AD FS in a single-organization scenario and in a partner-organization scenario.
Lessons
• Overview of AD FS
• AD FS requirements and planning
• Deploying and configuring AD FS
• Web Application Proxy Overview
Lab : Implementing AD FS
• Configuring AD FS prerequisites
• Installing and configuring AD FS
• Configuring an internal application for AD
• Configuring AD FS for federated business partners
After completing this module, students will be able to:
• Describe AD FS.
• Explain how to deploy AD FS.
• Explain how to implement AD FS for a single organization.
• Explain how to extend AD FS to external clients.
• Implement single sign-on (SSO) to support online services.
Module 11: Implementing and administering AD RMS
This module describes how to implement an AD RMS deployment. The module provides an overview of AD RMS, explains how to deploy and manage an AD RMS infrastructure, and explains how to configure AD RMS content protection.
Lessons
• Overview of AD RMS
• Deploying and managing an AD RMS infrastructure
• Configuring AD RMS content protection
Lab : Implementing an AD RMS infrastructure
• Installing and configuring AD RMS
• Configuring AD RMS templates
• Using AD RMS on clients
After completing this module, students will be able to:
• Describe AD RMS.
• Deploy and manage an AD RMS infrastructure. .
• Configure AD RMS content protection.
Module 12: Implementing AD DS synchronization with Microsoft Azure AD
This module describes how to plan and configure directory syncing between Microsoft Azure Active Directory (Azure AD) and on-premises AD DS. The modules describes various sync scenarios, such as Azure AD sync, AD FS and Azure AD, and Azure AD Connect.
Lessons
• Planning and preparing for directory synchronization
• Implementing directory synchronization by using Azure AD Connect
• Managing identities with directory synchronization
Lab : Configuring directory synchronization
• Preparing for directory synchronization
• Configuring directory synchronization
• Managing Active Directory users and groups and monitoring directory synchronization
After completing this module, students will be able to:
• Plan and prepare for directory synchronization.
• Implement directory synchronization by using Microsoft Azure Active Directory Connect (Azure AD Connect).
• Manage identities with directory synchronization.
Module 13: Monitoring, managing, and recovering AD DS
This module describes how to monitor, manage, and maintain AD DS to help achieve high availability of AD DS.
Lessons
• Monitoring AD DS
• Managing the Active Directory database
• Active Directory backup and recovery options for AD DS and other identity and access solutions
Lab : Recovering objects in AD DS
• Backing up and restoring AD DS
• Recovering objects in AD DS
After completing this module, students will be able to:
• Monitor AD DS.
• Manage the Active Directory database.
• Describe the backup and recovery options for AD DS and other identity access solutions.
Prerequisites
Before attending this course, students must have:
• Some exposure to and experience with AD DS concepts and technologies in Windows Server 2012 or Windows Server 2016.
• Experience working with and configuring Windows Server 2012 or Windows Server 2016
• Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP).
• Experience working with and an understanding of Microsoft Hyper-V and basic server virtualization concepts.
• An awareness of basic security best practices.
• Hands-on working experience with Windows client operating systems such as Windows 7, Windows 8, Windows 8.1, or Windows 10.
• Basic experience with the Windows PowerShell command-line interface.
Overview
Audience(s): Data Professional
Technology: SQL Server
Level: Advanced
This Revision: A
Length: 5 days
Language(s): English
About this course
The main purpose of the course is to give students the ability to analyze and present data by using Azure Machine Learning, and to provide an introduction to the use of machine learning with big data tools such as HDInsight and R Services.
Audience profile
The primary audience for this course is people who wish to analyze and present data by using Azure Machine Learning.
The secondary audience is IT professionals, Developers and information workers who need to support solutions based on Azure machine learning.
At course completion
After completing this course, students will be able to:
• Explain machine learning, and how algorithms and languages are used
• Describe the purpose of Azure Machine Learning, and list the main features of Azure Machine Learning Studio
• Upload and explore various types of data to Azure Machine Learning
• Explore and use techniques to prepare datasets ready for use with Azure Machine Learning
• Explore and use feature engineering and selection techniques on datasets that are to be used with Azure Machine Learning
• Explore and use regression algorithms and neural networks with Azure Machine Learning
• Explore and use classification and clustering algorithms with Azure Machine Learning
• Use R and Python with Azure Machine Learning, and choose when to use a particular language
• Explore and use hyperparameters and multiple algorithms and models, and be able to score and evaluate models
• Explore how to provide end-users with Azure Machine Learning services, and how to share data generated from Azure Machine Learning models
• Explore and use the Cognitive Services APIs for text and image processing, to create a recommendation application, and describe the use of neural networks with Azure Machine Learning
• Explore and use HDInsight with Azure Machine Learning
• Explore and use R and R Server with Azure Machine Learning, and explain how to deploy and configure SQL Server to support R services
Course Outline
Module 1: Introduction to Machine Learning
This module introduces machine learning and discussed how algorithms and languages are used.
Lessons
• What is machine learning?
• Introduction to machine learning algorithms
• Introduction to machine learning languages
Lab : Introduction to machine Learning
• Sign up for Azure machine learning studio account
• View a simple experiment from gallery
• Evaluate an experiment
After completing this module, students will be able to:
• Describe machine learning
• Describe machine learning algorithms
• Describe machine learning languages
Module 2: Introduction to Azure Machine Learning
Describe the purpose of Azure Machine Learning, and list the main features of Azure Machine Learning Studio.
Lessons
• Azure machine learning overview
• Introduction to Azure machine learning studio
• Developing and hosting Azure machine learning applications
Lab : Introduction to Azure machine learning
• Explore the Azure machine learning studio workspace
• Clone and run a simple experiment
• Clone an experiment, make some simple changes, and run the experiment
After completing this module, students will be able to:
• Describe Azure machine learning.
• Use the Azure machine learning studio.
• Describe the Azure machine learning platforms and environments.
Module 3: Managing Datasets
At the end of this module the student will be able to upload and explore various types of data in Azure machine learning.
Lessons
• Categorizing your data
• Importing data to Azure machine learning
• Exploring and transforming data in Azure machine learning
Lab : Managing Datasets
• Prepare Azure SQL database
• Import data
• Visualize data
• Summarize data
After completing this module, students will be able to:
• Understand the types of data they have.
• Upload data from a number of different sources.
• Explore the data that has been uploaded.
Module 4: Preparing Data for use with Azure Machine Learning
This module provides techniques to prepare datasets for use with Azure machine learning.
Lessons
• Data pre-processing
• Handling incomplete datasets
Lab : Preparing data for use with Azure machine learning
• Explore some data using Power BI
• Clean the data
After completing this module, students will be able to:
• Pre-process data to clean and normalize it.
• Handle incomplete datasets.
Module 5: Using Feature Engineering and Selection
This module describes how to explore and use feature engineering and selection techniques on datasets that are to be used with Azure machine learning.
Lessons
• Using feature engineering
• Using feature selection
Lab : Using feature engineering and selection
• Prepare datasets
• Use Join to Merge data
After completing this module, students will be able to:
• Use feature engineering to manipulate data.
• Use feature selection.
Module 6: Building Azure Machine Learning Models
This module describes how to use regression algorithms and neural networks with Azure machine learning.
Lessons
• Azure machine learning workflows
• Scoring and evaluating models
• Using regression algorithms
• Using neural networks
Lab : Building Azure machine learning models
• Using Azure machine learning studio modules for regression
• Create and run a neural-network based application
After completing this module, students will be able to:
• Describe machine learning workflows.
• Explain scoring and evaluating models.
• Describe regression algorithms.
• Use a neural-network.
Module 7: Using Classification and Clustering with Azure machine learning models
This module describes how to use classification and clustering algorithms with Azure machine learning.
Lessons
• Using classification algorithms
• Clustering techniques
• Selecting algorithms
Lab : Using classification and clustering with Azure machine learning models
• Using Azure machine learning studio modules for classification.
• Add k-means section to an experiment
• Add PCA for anomaly detection.
• Evaluate the models
After completing this module, students will be able to:
• Use classification algorithms.
• Describe clustering techniques.
• Select appropriate algorithms.
Module 8: Using R and Python with Azure Machine Learning
This module describes how to use R and Python with azure machine learning and choose when to use a particular language.
Lessons
• Using R
• Using Python
• Incorporating R and Python into Machine Learning experiments
Lab : Using R and Python with Azure machine learning
• Exploring data using R
• Analyzing data using Python
After completing this module, students will be able to:
• Explain the key features and benefits of R.
• Explain the key features and benefits of Python.
• Use Jupyter notebooks.
• Support R and Python.
Module 9: Initializing and Optimizing Machine Learning Models
This module describes how to use hyper-parameters and multiple algorithms and models, and be able to score and evaluate models.
Lessons
• Using hyper-parameters
• Using multiple algorithms and models
• Scoring and evaluating Models
Lab : Initializing and optimizing machine learning models
• Using hyper-parameters
After completing this module, students will be able to:
• Use hyper-parameters.
• Use multiple algorithms and models to create ensembles.
• Score and evaluate ensembles.
Module 10: Using Azure Machine Learning Models
This module explores how to provide end users with Azure machine learning services, and how to share data generated from Azure machine learning models.
Lessons
• Deploying and publishing models
• Consuming Experiments
Lab : Using Azure machine learning models
• Deploy machine learning models
• Consume a published model
After completing this module, students will be able to:
• Deploy and publish models.
• Export data to a variety of targets.
Module 11: Using Cognitive Services
This module introduces the cognitive services APIs for text and image processing to create a recommendation application, and describes the use of neural networks with Azure machine learning.
Lessons
• Cognitive services overview
• Processing language
• Processing images and video
• Recommending products
Lab : Using Cognitive Services
• Build a language application
• Build a face detection application
• Build a recommendation application
After completing this module, students will be able to:
• Describe cognitive services.
• Process text through an application.
• Process images through an application.
• Create a recommendation application.
Module 12: Using Machine Learning with HDInsight
This module describes how use HDInsight with Azure machine learning.
Lessons
• Introduction to HDInsight
• HDInsight cluster types
• HDInsight and machine learning models
Lab : Machine Learning with HDInsight
• Provision an HDInsight cluster
• Use the HDInsight cluster with MapReduce and Spark
After completing this module, students will be able to:
• Describe the features and benefits of HDInsight.
• Describe the different HDInsight cluster types.
• Use HDInsight with machine learning models.
Module 13: Using R Services with Machine Learning
This module describes how to use R and R server with Azure machine learning, and explain how to deploy and configure SQL Server and support R services.
Lessons
• R and R server overview
• Using R server with machine learning
• Using R with SQL Server
Lab : Using R services with machine learning
• Deploy DSVM
• Prepare a sample SQL Server database and configure SQL Server and R
• Use a remote R session
• Execute R scripts inside T-SQL statements
After completing this module, students will be able to:
• Implement interactive queries.
• Perform exploratory data analysis.
Prerequisites
In addition to their professional experience, students who attend this course should have:
• Programming experience using R, and familiarity with common R packages
• Knowledge of common statistical methods and data analysis best practices.
• Basic knowledge of the Microsoft Windows operating system and its core functionality.
• Working knowledge of relational databases.
Overview
Audience(s): Developers
Technology: SQL Server
Level: Intermediate
This Revision: C
Delivery method: Classroom
Length: 3 days
Language(s): English
About this course
The focus of this 3-day instructor-led course is on creating managed enterprise BI solutions. It describes how to implement both multidimensional and tabular data models and how to create cubes, dimensions, measures, and measure groups. This course helps you prepare for the Exam 70-768.
Audience profile
The primary audience for this course are database professionals who need to fulfil BI Developer role to create enterprise BI solutions.
Primary responsibilities will include:
• Implementing multidimensional databases by using SQL Server Analysis Services
• Creating tabular semantic data models for analysis by using SQL Server Analysis Services
At course completion
After completing this course, students will be able to:
• Describe the components, architecture, and nature of a BI solution
• Create a multidimensional database with Analysis Services
• Implement dimensions in a cube
• Implement measures and measure groups in a cube
• Use MDX syntax
• Customize a cube
• Implement a tabular database
• Use DAX to query a tabular model
• Use data mining for predictive analysis
Course Outline
Module 1: Introduction to Business Intelligence and Data Modeling
This module introduces key BI concepts and the Microsoft BI product suite.
Lessons
• Introduction to Business Intelligence
• The Microsoft business intelligence platform
Lab: Exploring a BI Solution
• Exploring a Data Warehouse
• Exploring a data model
After completing this module, students will be able to:
• Describe BI scenarios, trends, and project roles.
• Describe the products that make up the Microsoft BI platform.
Module 2: Creating Multidimensional Databases
This module describes how to create multidimensional databases using SQL Server Analysis Services.
Lessons
• Introduction to Multidimensional Analysis
• Data Sources and Data Source Views
• Cubes
• Overview of Cube Security
• Configure SSAS
• Monitoring SSAS
Lab: Creating a multidimensional database
• Creating a Data Source
• Creating and Configuring a data Source View
• Creating and Configuring a Cube
• Adding a Dimension to a Cube
After completing this module, you will be able to:
• Describe considerations for a multidimensional database.
• Create data sources and data source views.
• Create a cube
• Implement security in a multidimensional database.
• Configure SSAS to meet requirements including memory limits, NUMA and disk layout.
• Monitor SSAS performance.
Module 3: Working with Cubes and Dimensions
This module describes how to implement dimensions in a cube.
Lessons
• Configuring Dimensions
• Defining Attribute Hierarchies
• Implementing Sorting and Grouping Attributes
• Slowly Changing Dimensions
Lab: Working with Cubes and Dimensions
• Configuring Dimensions
• Defining Relationships and Hierarchies
• Sorting and Grouping Dimension Attributes
After completing this module, you will be able to:
• Configure dimensions.
• Define attribute hierarchies.
• Implement sorting and grouping for attributes.
• Implement slowly changing dimensions.
Module 4: Working with Measures and Measure Groups
This module describes how to implement measures and measure groups in a cube.
Lessons
• Working with Measures
• Working with Measure Groups
Lab: Configuring Measures and Measure Groups
• Configuring Measures
• Defining Regular Relationships
• Configuring Measure Group Storage
After completing this module, you will be able to:
• Configure measures.
• Configure measure groups.
Module 5: Introduction to MDX
This module describes the MDX syntax and how to use MDX.
Lessons
• MDX fundamentals
• Adding Calculations to a Cube
• Using MDX to Query a Cube
Lab: Using MDX
• Querying a cube using MDX
• Adding a Calculated Member
After completing this module, you will be able to:
• Use basic MDX functions.
• Use MDX to add calculations to a cube.
• Use MDX to query a cube.
Module 6: Customizing Cube Functionality
This module describes how to customize a cube.
Lessons
• Implementing Key Performance Indicators
• Implementing Actions
• Implementing Perspectives
• Implementing Translations
Lab: Customizing a Cube
• Implementing an action
• Implementing a perspective
• Implementing a translation
After completing this module, you will be able to:
• Implement KPIs in a Multidimensional database
• Implement Actions in a Multidimensional database
• Implement perspectives in a Multidimensional database
• Implement translations in a Multidimensional database
Module 7: Implementing a Tabular Data Model by Using Analysis Services
This module describes how to implement a tabular data model in Power Pivot.
Lessons
• Introduction to Tabular Data Models
• Creating a Tabular Data Model
• Using an Analysis Services Tabular Data Model in an Enterprise BI Solution
Lab: Working with an Analysis Services Tabular Data Model
• Creating an Analysis Services Tabular Data Model
• Configure Relationships and Attributes
• Configuring Data Model for an Enterprise BI Solution.
After completing this module, students will be able to:
• Describe tabular data models
• Describe how to create a tabular data model
• Use an Analysis Services Tabular Model in an enterprise BI solution
Module 8: Introduction to Data Analysis Expression (DAX)
This module describes how to use DAX to create measures and calculated columns in a tabular data model.
Lessons
• DAX Fundamentals
• Using DAX to Create Calculated Columns and Measures in a Tabular Data Model
Lab: Creating Calculated Columns and Measures by using DAX
• Creating Calculated Columns
• Creating Measures
• Creating a KPI
• Creating a Parent – Child Hierarchy
After completing this module, students will be able to:
• Describe the key features of DAX
• Create calculated columns and measures by using DAX
Module 9: Performing Predictive Analysis with Data Mining
This module describes how to use data mining for predictive analysis.
Lessons
• Overview of Data Mining
• Creating a Custom Data Mining Solution
• Validating a Data Mining Model
• Connecting to and Consuming a Data-Mining Model
• Using the Data Mining add-in for Excel
Lab: Using Data Mining
• Creating a Data Mining Structure and Model
• Exploring Data Mining Models
• Validating Data Mining Models
• Consuming a Data Mining Model
• Using the Excel Data Mining add-in
After completing this module, students will be able to:
• Describe considerations for data mining
• Create a data mining model
• Validate a data mining model
• Connect to a data-mining model
• Use the data mining add-in for Excel
Prerequisites
Before attending this course, students must have:
• Experience of querying data using Transact-SQL
Overview
Technology: Windows Server
Level: Advanced
This Revision: C
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This five-day, instructor-led course teaches IT professionals how they can enhance the security of the IT infrastructure that they administer. This course begins by emphasizing the importance of assuming that network breaches have occurred already, and then teaches you how to protect administrative credentials and rights to help ensure that administrators can perform only the tasks that they need to, when they need to.
This course explains how you can use auditing and the Advanced Threat Analysis feature in Windows Server 2016 to identify security issues. You will also learn how to mitigate malware threats, secure your virtualization platform, and use deployment options such as Nano server and containers to enhance security. The course also explains how you can help protect access to files by using encryption and dynamic access control, and how you can enhance your network’s security.
Audience profile
This course is for IT professionals who need to securely administer Windows Server 2016 networks. These professionals typically work with networks that are configured as Windows Server domain-based environments, with managed access to the internet and cloud services.
Students who seek certification in the 70-744 Securing Windows server exam also will benefit from this course.
At course completion
After completing this course, students will be able to:
• Secure Windows Server.
• Protect credentials and implement privileged access workstations.
• Limit administrator rights with Just Enough Administration.
• Manage privileged access.
• Mitigate malware and threats.
• Analyze activity with advanced auditing and log analytics.
• Deploy and configure Advanced Threat Analytics and Microsoft Operations Management Suite.
• Configure Guarded Fabric virtual machines (VMs).
• Use the Security Compliance Toolkit (SCT) and containers to improve security.
• Plan and protect data.
• Optimize and secure file services.
• Secure network traffic with firewalls and encryption.
• Secure network traffic by using DNSSEC and Message Analyzer.
Course Outline
Module 1: Attacks, breach detection, and Sysinternals tools
This module frames the course so that students are thinking about security in environments where the infrastructure’s basis is predominantly Microsoft products. The module begins with teaching students about the “assume breach” philosophy and getting them to understand the different types of attacks that can occur, including attack timelines and vectors. Additionally, it gets students thinking about key resources, how they respond when they detect an incident, and how an organization’s direct needs and legislative requirements dictate its security policy.
Lessons
• Understanding attacks
• Detecting security breaches
• Examining activity with the Sysinternals tools
Lab : Basic breach detection and incident response strategies
• Identifying attack types
• Exploring Sysinternals tools
After completing this module, students will be able to:
• Describe the types of attacks that can occur.
• Explain how to detect security breaches.
• Explain how to examine activity by using the Sysinternals suite of tools.
Module 2: Protecting credentials and privileged access
This module covers user accounts and rights, computer and service accounts, credentials, Privileged Access Workstations, and the Local Administrator Password Solution. In this module, students will learn about configuring user rights and security options, protecting credentials by using Credential Guard, implementing Privileged Access Workstations, and managing and deploying Local Administrator Password Solution to manage local administrator account passwords.
Lessons
• Understanding user rights
• Computer and service accounts
• Protecting credentials
• Privileged Access Workstations and jump servers
• Local administrator password solution
Lab : Implementing user rights, security options, and group managed service accounts
• Configuring user rights and account-security options
• Delegating privileges
• Creating group Managed Service Accounts
• Locating problematic accounts
Lab : Configuring and deploying LAPs
• Installing and configuring LAPs
• Deploying and testing LAPs
After completing this module, students will be able to:
• Configure user rights.
• Implement computer and service accounts.
• Protect credentials.
• Describe how to configure Privileged Access Workstations and jump servers.
• Configure the Local Administrator Password Solution (LAPS).
Module 3: Limiting administrator rights with Just Enough Administration
This module explains how to deploy and configure Just Enough Administration (JEA), which is an administrative technology that allows students to apply role-based access control (RBAC) principles through Windows PowerShell remote sessions.
Lessons
• Understanding JEA
• Verifying and deploying JEA
Lab : Limiting administrator privileges with JEA
• Creating a role-capability file
• Creating a session-configuration file
• Creating a JEA endpoint
• Connecting and testing a JEA endpoint
• Deploying a JEA configuration to another computer
After completing this module, students will be able to:
• Understand JEA.
• Verify and deploy JEA.
Module 4: Privileged access management and administrative forests
This module explains the concepts of Enhanced Security Administrative Environment (ESAE) forests, Microsoft Identity Manager (MIM), and Just In Time (JIT) Administration, or Privileged Access Management (PAM).
Lessons
• ESAE forests
• Overview of Microsoft Identity Manager
• Overview of JIT administration and PAM
Lab : Limiting administrator privileges with PAM
• Layered approach to security
• Configuring trust relationships and shadow principals
• Requesting privileged access
• Managing PAM roles
After completing this module, students will be able to:
• Describe ESAE forests.
• Describe MIM.
• Understand JIT administration and PAM.
Module 5: Mitigating malware and threats
This module explains how to use tools such as Windows Defender, Windows AppLocker, Microsoft Device Guard, Windows Defender Application Guard, and Windows Defender Exploit Guard.
Lessons
• Configuring and managing Windows Defender
• Restricting software
• Configuring and using the Device Guard feature
Lab : Securing applications with Windows Defender, AppLocker, and Device Guard Rules
• Configuring Windows Defender
• Configuring AppLocker
• Configuring Device Guard
After completing this module, students will be able to:
• Configure and manage Windows Defender.
• Use software restriction policies and AppLocker.
• Configure and use the Device Guard feature.
Module 6: Analyzing activity with advanced auditing and log analytics
This module provides an overview of auditing, and then goes into detail about how to configure advanced auditing and Windows PowerShell auditing and logging.
Lessons
• Overview of auditing
• Advanced auditing
• Windows PowerShell auditing and logging
Lab : Configuring advanced auditing
• Configuring the auditing of file system access
• Auditing domain sign-ins
• Managing advanced audit policy configuration
• Windows PowerShell logging and auditing
After completing this module, students will be able to:
• Describe auditing.
• Understand advanced auditing.
• Configure Windows PowerShell auditing and logging.
Module 7: Deploying and configuring Advanced Threat Analytics and Microsoft Operations Management Suite
This module explains the Microsoft Advanced Threat Analytics tool and the Microsoft Operations Management suite (OMS). It also explains how you can use them to monitor and analyse the security of a Windows Server deployment. You will also learn about Microsoft Azure Security Center, which allows you to manage and monitor the security configuration of workloads both on-premises and in the cloud.
Lessons
• Deploying and configuring ATA
• Deploying and configuring Microsoft Operations Management Suite
• Deploying and configuring Azure Security Center
Lab : Deploying ATA, Microsoft Operations Management Suite, and Azure Security Center
• Preparing and deploying ATA
• Preparing and deploying Microsoft Operations Management Suite
• Deploying and configuring Azure Security Center
After completing this module, students will be able to:
• Deploy and configure ATA.
• Deploy and configure Microsoft Operations Management Suite.
• Deploy and configure Azure Security Center.
Module 8: Secure Virtualization Infrastructure
This module explains how to configure Guarded Fabric VMs, including the requirements for shielded and encryption-supported VMs.
Lessons
• Guarded fabric
• Shielded and encryption-supported virtual machines
Lab : Guarded fabric with Admin-trusted attestation and shielded VMs
• Deploying a guarded fabric with admin-trusted attestation
• Deploying a shielded VM
After completing this module, students will be able to:
• Configure the guarded fabric.
• Describe shielded and encryption-supported VMs.
Module 9: Securing application development and server-workload infrastructure
This module describes the SCT, which is a free, downloadable set of tools that you can use to create and apply security settings. You will also learn about improving platform security by reducing the size and scope of application and compute resources by containerizing workloads.
Lessons
• Using SCT
• Understanding containers
Lab : Using SCT
• Configuring a security baseline for Windows Server 2016
• Deploying the security baseline for Windows Server 2016
Lab : Deploying and configuring containers
• Deploying and managing a Windows container
After completing this module, students will be able to:
• Install SCT, and create and deploy security baselines.
• Configure Windows and Hyper-V containers in Windows Server 2016.
Module 10: Planning and protecting data
This module explains how to configure Encrypting File System (EFS) and BitLocker drive encryption to protect data at rest. You will also learn about extending protection into the cloud by using Azure Information Protection.
Lessons
• Planning and implementing encryption
• Planning and implementing BitLocker
• Protecting data by using Azure Information Protection
Lab : Protecting data by using encryption and BitLocker
• Encrypting and recovering access to encrypted files
• Using BitLocker to protect data
After completing this module, students will be able to:
• Plan and implement encryption.
• Plan and implement BitLocker.
• Plan and implement Azure Information Protection.
Module 11: Optimizing and securing file services
This module explains how to optimize file services by configuring File Server Resource Manager (FSRM) and Distributed File System (DFS). Students also will learn how to manage access to shared files by configuring Dynamic Access Control (DAC).
Lessons
• File Server Resource Manager
• Implementing classification and file management tasks
• Dynamic Access Control
Lab : Quotas and file screening
• Configuring File Server Resource Manager quotas
• Configuring file screening and storage reports
Lab : Implementing Dynamic Access Control
• Preparing for implementing Dynamic Access Control
• Implementing Dynamic Access Control
• Validating and remediating Dynamic Access Control
After completing this module, students will be able to:
• Describe File Server Resource Manager.
• Implement classification and file management tasks.
• Implement Dynamic Access Control.
Module 12: Securing network traffic with firewalls and encryption
This module explains how you can use Windows Firewall as an important part of an organization’s protection strategy. It explains the use of Internet Protocol security (IPsec) to encrypt network traffic and to establish security zones on your network. You will also learn about the Datacenter Firewall feature that you can use to help protect your on-premises virtual environments.
Lessons
• Understanding network-related security threats
• Understanding Windows Firewall with Advanced Security
• Configuring IPsec
• Datacenter Firewall
Lab : Configuring Windows Firewall with Advanced Security
• Creating and testing inbound rules
• Creating and testing outbound rules
• Creating and testing connection security rules
After completing this module, students will be able to:
• Describe network-related security threats and how to mitigate them.
• Configure Windows Firewall with Advanced Security.
• Configure IPsec.
• Describe Datacenter Firewall.
Module 13: Securing network traffic
This module explores some of the Windows Server 2016 technologies that you can use to help mitigate network-security threats. It explains how you can configure DNSSEC to help protect network traffic, and use Microsoft Message Analyzer to monitor network traffic. The module also describes how to secure Server Message Block (SMB) traffic.
Lessons
• Configuring advanced DNS settings
• Examining network traffic with Message Analyzer
• Securing and analyzing SMB traffic
Lab : Securing DNS
• Configuring and testing DNSSEC
• Configuring DNS policies and RRL
Lab : Microsoft Message Analyzer and SMB encryption
• Installing and using the Message Analyzer
• Configuring and verifying SMB encryption on SMB shares
After completing this module, students will be able to:
• Configure advanced DNS settings.
• Use the Message Analyzer.
• Secure SMB traffic.
Prerequisites
Students should have at least two years of experience in the IT field and should have:
• Completed courses 740, 741, and 742, or the equivalent.
• A solid, practical understanding of networking fundamentals, including TCP/IP, User Datagram Protocol (UDP), and Domain Name System (DNS).
• A solid, practical understanding of Active Directory Domain Services (AD DS) principles.
• A solid, practical understanding of Microsoft Hyper-V virtualization fundamentals.
• An understanding of Windows Server security principles.
Visão Global
A segurança da informação é a proteção das informações de uma grande variedade de ameaças com o objetivo de assegurar a continuidade do negócio, minimizar o risco do negócio e maximizar o retorno sobre os investimentos e as oportunidades de negócios.
A segurança das informações vem ganhando importância no mundo da Tecnologia da Informação (TI). A globalização da economia está gerando uma troca cada vez maior de informações entre as organizações (seus funcionários, clientes e fornecedores) bem como uma explosão no uso de computadores em rede e dispositivos de informática.
A norma internacional para Gerenciamento de Segurança da Informação ISO/IEC 27001, é uma norma amplamente respeitada e consultada e fornece uma estrutura para a organização e o gerenciamento de um programa de segurança das informações. A implementação de um programa com base nesta norma será muito útil para o objetivo de uma organização de atender a muitas das necessidades apresentadas no complexo ambiente operacional da atualidade. Uma compreensão categórica desta norma é importante para o desenvolvimento pessoal de todos os profissionais de segurança das informações.
Nos módulos de Segurança da Informação do EXIN, utiliza-se a seguinte definição: A Segurança da Informação lida com a definição, a implementação, a manutenção, a conformidade e a avaliação de um conjunto coerente de controles (medidas) que garantam a disponibilidade, a integridade e a confidencialidade da fonte de informações (manual e automática).
No EXIN Information Security Foundation baseado na ISO/IEC 27001 são testados os conceitos básicos de segurança da informação e suas relações. Um dos objetivos desse módulo é aumentar a conscientização de que as informações são valiosas e vulneráveis e aprender quais medidas são necessárias para protegê-las.
Público Alvo
Qualquer pessoa na organização que manuseia informações. É também aplicável a proprietários de pequenas empresas a quem alguns conceitos básicos de Segurança da Informação são necessários. Este módulo pode ser um excelente ponto de partida para novos profissionais de segurança da informação.
Carga:
16h
Conteúdo
1. Informação e segurança
1.1 O conceito de informação
1.2 Valor da informação
1.3 Aspectos de confiabilidade
2. Ameaças e riscos
2.1 Ameaças e riscos
2.2 Relacionamento entre ameaças, riscos e confiabilidade da informação
3. Abordagem e organização
3.1 Política de segurança e organização de segurança
3.2 Componentes da organização da segurança
3.3 Gerenciamento de incidentes
4. Medidas
4.1 Importância de medidas de segurança
4.2 Medidas físicas
4.3 Medidas técnicas
4.4 Medidas organizacionais
5. Legislação e regulamentação
5.1 Legislação e regulamentação
Visão Global
Onde quer que os dados pessoais sejam coletados, armazenados, usados e, finalmente, excluídos ou destruídos, surgem preocupações de privacidade. Com o Regulamento Geral de Proteção de Dados da UE (GDPR), o Conselho da União Europeia tenta reforçar e unificar a proteção de dados para todos os indivíduos da União Europeia (UE). Este regulamento afeta todas as organizações que processam os dados pessoais de cidadãos da EU e tem efeitos além destas fronteiras. O PDPF abrange os principais assuntos relacionados ao GDPR e tem sido usado como um guia para diversos países fora da UE em fase de elaboração das suas próprias leis.
Público Alvo
Todos os colaboradores precisam ter uma compreensão da proteção de dados e dos requisitos legais, conforme definido no GDPR. As seguintes funções mais específicas podem se interessar:
DPO (Diretor de Proteção de Dados), Privacy Officer (Diretor de Privacidade), Legal Officer / Compliance Officer (Diretor Jurídico / Diretor de Conformidade), Security Officer (Diretor de Segurança), Business Continuity Manager (Gerente de Continuidade de Negócios).
Carga
16h
Conteúdo
1. Fundamentos e regulamentação de Privacidade e Proteção de Dados
1.1 Definições
1.2 Dados Pessoais
1.3 Fundamentos legítimos e limitação de propósito
1.4 Requisitos adicionais para processamento legítimo de dados pessoais
1.5 Direitos do titular dos dados
1.6 Violação de dados e procedimentos relacionados
2. Organizando a proteção de dados
2.1 Importância da proteção de dados para a organização
2.2 Autoridade Fiscalizadora
2.3 Transferência de dados pessoais para outros países
2.4 Regras Corporativas compulsórias e proteção de dados em contratos
3. Práticas de Proteção de Dados
3.1 Proteção de Dados by design e por padrão
3.2 Avaliação de Impacto sobre a Proteção de Dados
(DPIA)
3.3 Aplicações práticas relacionadas ao uso de dados, marketing e mídias sociais
Visão Global
Com a explosão cada vez maior de informações que inundam a internet, todas as empresas devem planejar como gerenciar e proteger a privacidade das pessoas e seus dados. Não é à toa que muitas novas leis - na UE, assim como nos EUA e em muitas outras regiões - estão sendo formuladas para a sua regulação.
Recentemente, a Comissão Europeia publicou o General Data Protection Regulation (GDPR) na UE, o que significa que todas as organizações envolvidas devem cumprir regras específicas. Esta certificação de nível Practitioner é baseada nos temas abordados pelo exame Foundation, enfocando o desenvolvimento e a implementação de políticas e procedimentos para o cumprimento da legislação nova e da já existente, aplicação de diretrizes e melhores práticas para privacidade e proteção de dados e estabelecimento de um Sistema de Gestão de Proteção de Dados e Privacidade.
Público Alvo
Esta certificação em nível Practitioner será particularmente útil para Data Protection Officers (DPOs) ou “Encarregados pelo Tratamento de Dados Pessoais” em uma organização / Privacy Officers, Legal/Compliance Officers, Security Officers, Gerentes de Continuidade de Negócios, Controladores dos Dados, Auditores de Proteção de Dados (internos e externos), Analistas de Privacidade e gerentes de RH.
Uma vez que esta é uma certificação de nível avançado, a aprovação prévia no EXIN Data & Protection Foundation é altamente recomendada.
Carga
24h
Conteúdo
1. Políticas de proteção de dados
1.1 Objetivo das políticas de proteção de dados/privacidade em uma organização.
1.2 Conceitos de proteção de dados desde a concepção (by design) e por padrão (by default).
2. Gerenciando e organizando a proteção de dados
2.1 Aplicar as fases do Sistema de Gestão de Proteção de Dados (DPMS).
2.2 Aplicar a teoria de um plano de ação para conscientização sobre a proteção de dados.
3. Papéis do Controlador, Processador e Data Protection Officer (DPO)
3.1 Implementar os papéis do controlador e processador de dados.
3.2 Estabelecer o papel e as responsabilidades de um DPO.
4. Avaliação de Impacto sobre a Proteção de Dados (AIPD)
4.1 Aplicar os critérios para uma AIPD.
4.2 Aplicar as etapas de uma AIPD.
5. Violação de dados, notificação e resposta a incidentes.
5.1 Aplicar os requisitos do GDPR em relação a violações de dados pessoais.
5.2 Aplicar os requisitos para notificação.
Visão Global
Onde quer que os dados pessoais sejam coletados, armazenados, usados e, finalmente, excluídos ou destruídos, surgem preocupações de privacidade. Com a Lei Geral de Proteção de Dados (LGPD), o Congresso Brasileiro tenta reforçar e unificar a proteção de dados para todos os indivíduos dentro do Brasil. Este regulamento afeta todas as organizações que processam os dados pessoais de cidadãos do Brasil e tem efeitos além destas fronteiras. O exame EXIN Privacy & Data Protection Essentials abrange os principais assuntos relacionados à LGPD.
Público Alvo
Todos os colaboradores que precisam ter uma compreensão da proteção de dados e dos requisitos legais brasileiros, conforme definido na LGPD. O exame Essentials é extremamente recomendável para todos que precisam conhecer ou estar atualizados quanto à privacidade e proteção de dados de acordo com a lei local.
Carga
8h
Conteúdo
1. Fundamentos e regulamentação de privacidade e proteção de dados
1.1 Definições
1.2 Dados pessoais
1.3 Fundamentos legítimos e limitação de propósito
1.4 Requisitos adicionais para processamento legítimo de dados pessoais
1.5 Direitos do titular dos dados
1.6 Violação de dados e procedimentos relacionados
2. Organizando a proteção de dados
2.1 Importância da proteção de dados para a organização
2.2 Autoridade Nacional de Proteção de Dados (ANPD)
2.3 Transferência de dados pessoais para outros países
2.4 Normas Corporativas Globais e proteção de dados em contratos
3. Práticas de proteção de dados
3.1 Proteção de dados desde a concepção (by design) e por padrão
3.2 Relatório de impacto sobre a proteção de dados (RIPD)
3.3 Aplicações práticas relacionadas ao uso de dados, marketing e mídias sociais
Overview
Audience(s): IT Professionals
Technology: Windows Server
Level: Advanced
This Revision: C
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This course provides students with the fundamental knowledge and skills to use Windows PowerShell for administering and automating administration of Windows servers. This course provides students the skills to identify and build the command they require to perform a specific task. In addition, students learn how to build scripts to accomplish advanced tasks such as automating repetitive tasks and generating reports. This course provides prerequisite skills supporting a broad range of Microsoft products, including Windows Server, Windows Client, Microsoft Exchange Server, Microsoft SharePoint Server, Microsoft SQL Server, System Center, and more. In keeping with that goal, this course will not focus on any one of those products, although Windows Server, which is the common platform for all of those products, will serve as the example for the techniques this course teaches.
Audience profile
This course is intended for IT Professionals who are already experienced in general Windows Server and Windows Client administration, and who want to learn more about using Windows PowerShell for administration. No prior experience with any version of Windows PowerShell, or any scripting language, is assumed. This course is also suitable for IT Professionals already experienced in server administration, including Exchange Server, SharePoint Server, SQL Server, System Center, and others.
At course completion
After completing this course, students will be able to:
• Describe the functionality of Windows PowerShell and use it to run and find basic commands.
• Identify and run cmdlets for server administration.
• Work with Windows PowerShell pipeline.
• Describe the techniques Windows PowerShell pipeline uses.
• Use PSProviders and PSDrives to work with other forms of storage.
• Query system information by using WMI and CIM.
• Work with variables, arrays, and hash tables.
• Write basic scripts in Windows PowerShell.
• Write advanced scripts in Windows PowerShell.
• Administer remote computers.
• Use background jobs and scheduled jobs.
• Use advanced Windows PowerShell techniques.
Course Outline
Module 1: Getting started with Windows PowerShell
This module will introduce you to Windows PowerShell and provide an overview of the product’s functionality. The module shows you how to open and configure the shell for use and how to run commands within the shell. The module also introduces the built-in Help system in Windows PowerShell.
Lessons
• Overview and background of Windows PowerShell
• Understanding command syntax
• Finding commands
Lab : Configuring Windows PowerShell
• Configuring the Windows PowerShell console
• Configuring the Windows PowerShell ISE application
Lab : Finding and running basic commands
• Finding commands
• Running commands
• Using the About files
After completing this module, students will be able to:
• Open and configure Windows PowerShell.
• Find and run Windows PowerShell commands.
• Run commands by using the correct command and parameter syntax.
Module 2: Cmdlets for administration
This module introduces you to the cmdlets commonly used for administration. While you can search for cmdlets each time you need to accomplish a task, it is more efficient to have at least a basic understanding of the cmdlets available for system administration.
Lessons
• Active Directory administration cmdlets
• Network configuration cmdlets
• Other server administration cmdlets
Lab : Windows Administration
• Creating and managing Active Directory objects
• Configuring network settings on Windows Server
• Creating a web site
After completing this module, students will be able to:
• Identify and use cmdlets for Active Directory administration.
• Identify and use cmdlets for network configuration.
• Identify and use cmdlets for other server administration tasks.
Module 3: Working with the Windows PowerShell pipeline
This module introduces the pipeline feature of Windows PowerShell. Although the pipeline feature is included in several command-line shells such as the command prompt in the Windows operating system, the pipeline feature in Windows PowerShell provides more complex, more flexible, and more capable functionalities compared to other shells. This module provides you with the skills and knowledge that will help you use the shell more effectively and efficiently.
Lessons
• Understanding the pipeline
• Selecting, sorting, and measuring objects
• Filtering objects out of the pipeline
• Enumerating objects in the pipeline
• Sending pipeline data as output
Lab : Using the pipeline
• Selecting, sorting, and displaying data
Lab : Filtering objects
• Filtering objects
Lab : Enumerating objects
• Enumerating objects
Lab : Sending output to a file
• Exporting user information to a file
After completing this module, students will be able to:
• Describe the purpose of the Windows PowerShell pipeline.
• Select, sort, and measure objects in the pipeline.
• Filter objects out of the pipeline.
• Enumerate objects in the pipeline.
• Send output consisting of pipeline data.
Module 4: Understanding how the pipeline works
This module shows you how Windows PowerShell passes objects from one command to another in the pipeline. The shell provides two techniques that you can use. Knowing how these techniques work, and which one will be used in a given scenario, lets you construct more useful and complex command lines.
Lessons
• Passing the pipeline data
• Advanced considerations for pipeline data
Lab : Working with pipeline parameter binding
• Predicting pipeline behaviour
After completing this module, students will be able to:
• Pass data by using the ByValue technique.
• Describe the advanced techniques for passing pipeline data.
Module 5: Using PSProviders and PSDrives
This module introduces the PSProviders and PSDrives adapters. A PSProvider is basically a Windows PowerShell adapter that makes some form of storage resemble a disk drive. A PSDrive is an actual connection to a form of storage. You can use these two adapters to work with various forms of storage by using the same commands and techniques that you use to manage the file system.
Lessons
• Using PSProviders
• Using PSDrives
Lab : Using PSProviders and PSDrives
• Creating files and folders on a remote computer
• Creating a registry key for your future scripts
• Create a new Active Directory group
After completing this module, students will be able to:
• Use PSProviders.
• Use PSDrives.
Module 6: Querying system information by using WMI and CIM
This module introduces you to two parallel technologies: Windows Management Instrumentation (WMI) and Common Information Model (CIM). Both these technologies provide local and remote access to a repository of management information including access to robust information available from the operating system, computer hardware, and installed software.
Lessons
• Understanding WMI and CIM
• Querying data by using WMI and CIM
• Making changes with WMI/CIM
Lab : Working with WMI and CIM
• Querying information by using WMI
• Querying information by using CIM
• Invoking methods
After completing this module, students will be able to:
• Explain the differences between Common Information Model (CIM) and Windows Management Instrumentation (WMI).
• Query management information by using CIM and WMI.
• Invoke methods by using CIM and WMI.
Module 7: Working with variables, arrays, and hash tables
This module provides you the skills and knowledge required to use variables, arrays, and hash tables in Windows PowerShell.
Lessons
• Using variables.
• Manipulating variables.
• Manipulating arrays and hash tables.
Lab : Working with variables
• Working with variable types
• Using arrays
• Using hash tables
After completing this module, students will be able to:
• Assign a value to variables.
• Describe how to manipulate variables.
• Describe how to manipulate arrays and hash tables.
Module 8: Basic scripting
This module shows you how to package a Windows PowerShell command in a script. Scripts allow you to perform repetitive tasks and more complex tasks than cannot be accomplished in a single command.
Lessons
• Introduction to scripting
• Scripting constructs
• Importing data from files
Lab : Basic scripting
• Setting a script
• Processing an array with a ForEach loop
• Processing items by using If statements
• Creating a random password
• Creating users based on a CSV file
After completing this module, students will be able to:
• Run a Windows PowerShell script.
• Use Windows PowerShell scripting constructs.
• Import data from a file.
Module 9: Advanced scripting
This module introduces you to more advanced techniques that you can use in scripts. These techniques includes gathering user input, reading input from files, documenting scripts with help information and error handling.
Lessons
• Accepting user input
• Overview of script documentation
• Troubleshooting and error handling
• Functions and modules
Lab : Accepting data from users
• Querying disk information from remote computers
• Updating the script to use alternate credentials
• Documenting a script
Lab : Implementing functions and modules
• Creating a logging function
• Adding error handling to a script
• Converting a function to a module
After completing this module, students will be able to:
• Accept user input for a script.
• Explain script documentation.
• Implement error handling for a script.
• Explain functions and modules.
Module 10: Administering Remote Computers
This module introduces you to the Windows PowerShell remoting technology that enables you to connect to one or more remote computers and instruct them to run commands on your behalf.
Lessons
• Using basic Windows PowerShell remoting
• Using advanced Windows PowerShell remoting techniques
• Using PSSessions
Lab : Using basic remoting
• Enabling remoting on the local computer
• Performing one-to-one remoting
• Performing one-to-many remoting
Lab : Using PSSessions
• Using implicit remoting
• Managing multiple computers
After completing this module, students will be able to:
• Describe remoting architecture and security.
• Use advanced remoting techniques.
• Create and manage persistent remoting sessions.
Module 11: Using background jobs and scheduled jobs
This module provides information about the job features of Windows PowerShell. Jobs are an extension point in Windows PowerShell, and there are many different kinds of jobs. Each kind of job can work slightly differently, and has different capabilities.
Lessons
• Using background jobs
• Using scheduled jobs
Lab : Using background jobs and scheduled jobs
• Starting and managing jobs
• Creating a scheduled job
After completing this module, students will be able to:
• Create and manage background jobs.
• Create and manage scheduled jobs.
Module 12: Using advanced Windows PowerShell techniques
This module covers several advanced Windows PowerShell techniques and features. Many of these techniques and features extend functionality that you have learned about in previous modules. Some of these techniques are new and provide additional capabilities.
Lessons
• Creating profile scripts
• Using advanced techniques
Lab : Practicing advanced techniques
• Creating a profile script
• Verifying the validity of an IP address
• Reporting disk information
• Configuring NTFS permissions
• Creating user accounts with passwords from a CSV file
Lab : Practicing script development (optional)
• TBA
• TBA
• TBA
After completing this module, students will be able to:
• Create and manage profile scripts.
• Use advanced techniques to work with data.
Prerequisites
• Experience with Windows networking technologies and implementation.
• Experience with Windows Server administration, maintenance, and troubleshooting.
• Experience with Windows Client administration, maintenance, and troubleshooting
• Students who attend this training can meet the prerequisites by obtaining equivalent knowledge and skills through practical experience as a Windows system administrator. No prerequisite courses are required.
Overview
Technology: SharePoint Server
Level: Intermediate
This Revision: A
Delivery method: Classroom
Length: 5 days
Language(s): English
Tecnologia: SharePoint Server
Nível: Intermediário
Esta revisão: UMA
Método de Entrega: Sala de aula
Carga: 5 dias
Língua(s): Inglês
About this course
This five-day course will provide you with the knowledge and skills to plan and administer a Microsoft SharePoint 2016 environment. The course teaches you how to deploy, administer, and troubleshoot your SharePoint environment. This course also provides guidelines, best practices, and considerations that help you optimize your SharePoint deployment.
This is the first in a sequence of two courses for IT professionals and is aligned with the SharePoint 2016 IT Pro certification.
Audience profile
The course is targeted at experienced IT professionals who are interested in learning how to install, configure, deploy, and manage SharePoint 2016 installations either in a data center or in the cloud.
Students typically have more than one year of hands-on experience* with planning and maintaining SharePoint and two years’ experience with other core technologies on which SharePoint depends, including Windows Server 2012 R2 or later, Internet Information Services (IIS), Microsoft SQL Server 2014 or later, Active Directory Domain Services (AD DS), and networking infrastructure services.
The minimally qualified candidate typically:
• Is an IT professional who plans, implements, and maintains a multi-server deployment of SharePoint 2016.
• Has a working knowledge of, and preferably hands-on experience, with SharePoint Online.
• Has broad familiarity with SharePoint workloads.
• Has experience with business continuity management, including data backup, restoration, and high availability.
• Has experience with authentication and security technologies.
• Has experience with Windows PowerShell.
* The hands-on experience or job experience should be from a solutions-based role where the candidate has worked on multiple solutions in the SharePoint space that includes document management, content management, and search.
At course completion
After completing this course, students will be able to:
• Describe the key features of SharePoint 2016.
• Design an information architecture for a SharePoint 2016 deployment.
• Design a logical architecture for a SharePoint 2016 deployment.
• Design the physical architecture for a SharePoint 2016 deployment.
• Install and configure SharePoint 2016.
• Create and configure web applications and site collections.
• Plan and configure service applications for a SharePoint 2016 deployment.
• Manage users and permissions, and secure content in a SharePoint 2016 deployment.
• Configure authentication in a SharePoint 2016 deployment.
• Configure platform and farm-level security in a SharePoint 2016 deployment.
• Manage information taxonomy in SharePoint web applications and site collections.
• Configure and manage user profiles and audiences.
• Configure and manage the search experience in SharePoint 2016.
• Monitor, maintain, and troubleshoot a SharePoint 2016 deployment.
Course Outline
Module 1: Introducing SharePoint 2016
This module describes the structure and capabilities of a SharePoint environment, and the major changes for IT professionals in SharePoint 2016. This module also describes the options available for deploying SharePoint 2016.
Lessons
• Key components of a SharePoint deployment
• New features in SharePoint 2016
• SharePoint 2016 deployment options
After completing this module, students will be able to:
• Identify the architecture and capabilities of SharePoint 2016.
• Identify new and deprecated features in SharePoint 2016.
• Identify deployment options for SharePoint 2016.
Module 2: Designing an information architecture
This module describes how to gather business requirements, and the key elements of a successful information architecture project. This module also explains how to structure information within a SharePoint 2016 deployment and make it easy to find and retrieve.
Lessons
• Identifying business requirements
• Understanding business requirements
• Organizing information in SharePoint 2016
• Planning for discoverability
Lab : Designing an information architecture - Part one
• Identifying site columns and content types
Lab : Creating an information architecture - Part two
• Designing a business taxonomy
After completing this module, students will be able to:
• Explain how understanding business requirements drives the design of an organizational information architecture.
• Describe the key components available in SharePoint 2016 to deploy an information architecture.
• Plan for discoverability as part of an information architecture deployment.
Module 3: Designing a logical architecture
This module explains how to approach a logical architecture design and how to document it.
Lessons
• Overview of the SharePoint 2016 logical architecture
• Documenting your logical architecture
Lab : Designing a logical architecture
• Planning a logical architecture
• Producing a logical architecture diagram
After completing this module, students will be able to:
• Map business requirements to SharePoint 2016 architecture components.
• Explain the importance of documentation and describe the options for documenting the logical architecture.
Module 4: Designing a physical architecture
This module describes the physical design requirements for SharePoint 2016, and the physical components necessary to fulfill the physical architecture design. It also explains the SharePoint farm topologies, and describes how to map a logical architecture design to a physical architecture design.
Lessons
• Designing physical components for SharePoint deployments
• Designing supporting components for SharePoint deployments
• SharePoint farm topologies
• Mapping a logical architecture design to a physical architecture design
Lab : Designing a physical architecture
• Designing a physical architecture
• Developing a physical architecture design diagram
After completing this module, students will be able to:
• Describe the requirements for the physical components that are needed for a SharePoint 2016 deployment.
• Describe the requirements for the supporting components that are needed for a successful SharePoint 2016 deployment.
• Identify SharePoint farm topologies.
• Map a logical architecture design to a physical architecture design.
Module 5: Installing and configuring SharePoint 2016
This module explains how to install SharePoint 2016 in different topologies, script the installation, and configure a SharePoint 2016 environment. This module also explains how to configure the core farm-level settings in a SharePoint 2016 deployment.
Lessons
• Installing SharePoint 2016
• Scripting installation and configuration of SharePoint
• Configuring SharePoint 2016 farm settings
Lab : Deploying and configuring SharePoint 2016 – Part one
• Provisioning a SharePoint 2016 farm
Lab : Deploying and configuring SharePoint 2016 – Part two
• Configuring incoming email
• Configuring outgoing email
• Configuring integration with Office Online Server
After completing this module, students will be able to:
• Install SharePoint 2016.
• Deploy and configure SharePoint 2016.
• Script the installation and configuration of SharePoint 2016.
• Configure SharePoint 2016 farm settings.
Module 6: Creating web applications and site collections
This module explains how to create web applications in SharePoint 2016 and how to configure these applications. It also explains how to create and configure site collections in SharePoint 2016 and SharePoint Online.
Lessons
• Creating web applications
• Configuring web applications
• Creating and configuring site collections
Lab : Creating and configuring web applications
• Creating a web application
• Configuring a web application
Lab : Creating and configuring site collections
• Creating and configuring site collections
• Creating a site collection in a new content database
• Using Fast Site Collection Creation
After completing this module, students will be able to:
• Create web applications.
• Configure web applications.
• Create and configure site collections.
Module 7: Planning and configuring service applications
This module describes the service application architecture in SharePoint 2016, and how to provision and manage service applications.
Lessons
• Introduction to the service application architecture
• Creating and configuring service applications
Lab : Planning and configuring service applications
• Provisioning a Managed Metadata Service application with Central Administration
• Provisioning a Managed Metadata Service application with Windows PowerShell
• Configuring the Word Automation Services service application for document conversion
• Configuring service application proxy groups
After completing this module, students will be able to:
• Explain the key components and topologies for a SharePoint 2016 service application architecture.
• Plan for service accounts and service application dependencies.
• Understand the purpose of mapping service applications to business requirements.
• Describe how to provision and manage SharePoint 2016 service applications
Module 8: Managing users and permissions, and securing content
This module explains how to configure authorization in SharePoint 2016. It also explains how to configure site collection security in SharePoint 2016.
Lessons
• Configuring authorization in SharePoint 2016
• Managing access to content
Lab : Managing users and groups
• Creating a web-application policy
• Creating and managing SharePoint groups
• Creating custom permission levels
Lab : Securing content in SharePoint sites
• Managing permissions and inheritance
• Managing site-collection security
• Enabling anonymous access to a site
After completing this module, students will be able to:
• Manage users and permissions in SharePoint 2016.
• Manage access to content in SharePoint 2016.
Module 9: Configuring authentication for SharePoint 2016
This module explains about the SharePoint 2016 authentication infrastructure, and how to configure claims, providers, and identity federation for SharePoint 2016. It also explains how to configure server-to-server authentication for SharePoint 2016.
Lessons
• Overview of authentication
• Configuring federated authentication
• Configuring server-to-server authentication
Lab : Extend your SharePoint 2016 to support Secure Sockets Layer (SSL)
• Configuring Microsoft SharePoint 2016 to use federated identities
• Configuring Active Directory Federation Services (AD FS) to enable a web application a relying party
• Configuring SharePoint to trust AD FS as an identity provider
• Configuring a web application to use the AD FS identity provider
After completing this module, students will be able to:
• Explain the authentication infrastructure of SharePoint 2016.
• Configure claims providers and identity federation for SharePoint 2016.
• Configure server-to-server authentication for SharePoint 2016.
Module 10: Securing a SharePoint 2016 deployment
This module explains how to secure a SharePoint 2016 deployment at the platform level, and how to configure farm-level security settings for a SharePoint 2016 deployment.
Lessons
• Securing the platform
• Configuring farm-level security
Lab : Securing a SharePoint 2016 deployment
• Configuring SharePoint Server communication security
• Hardening a SharePoint server farm
• Configuring blocked file types
• Configuring Web Part security
• Implementing security auditing
After completing this module, students will be able to:
• Secure a SharePoint 2016 deployment at the platform level.
• Configure farm-level security settings for a SharePoint 2016 deployment.
Module 11: Managing taxonomy
This module explains how to create and manage content types and content-type propagation. Additionally, it explains how to implement managed metadata in SharePoint web applications and site collections. It also explains how to configure the managed metadata service application in SharePoint 2016.
Lessons
• Managing content types
• Understanding managed metadata
• Configuring the managed metadata service
Lab : Configuring content-type propagation
• Creating content types for propagation
• Publishing content types across site collections
Lab : Configuring and using the managed metadata service
• Configuring the managed metadata service
• Creating term sets and terms
• Consuming term sets
After completing this module, students will be able to:
• Create and manage content types and content-type propagation.
• Explain how to implement managed metadata in SharePoint web applications and site collections.
• Configure the managed metadata service application in SharePoint 2016.
Module 12: Configuring user profiles
This module explains how to configure the User Profile service application, and how to manage user profiles and audiences
.Lessons
• Configuring the User Profile Service Application
• Managing user profiles and audiences
Lab : Configuring user profiles
• Configuring the User Profile Service Application
• Configuring directory import and synchronization
Lab : Configuring My Sites and audiences
• Configuring My Sites
• Configuring audiences
After completing this module, students will be able to:
• Configure the User Profile service application.
• Manage user profiles and audiences.
Module 13: Configuring Enterprise Search
This module describes the Search Service Application and explains how to configure the Search service in SharePoint 2016. It also explains how to manage the search experience in SharePoint 2016.
Lessons
• Understanding the Search Service Application architecture
• Configuring Enterprise Search
• Managing Enterprise Search
Lab : Configuring Enterprise Search
• Configuring the Search Service Application
• Configuring a file share content source
• Configuring a local SharePoint content source
• Creating a search center
Lab : Optimizing the search experience
• Configuring a result source and a query rule
• Customizing the search experience
• Creating and deploying a thesaurus
• Configuring entity extractors and refiners
• Managing query spelling correction
After completing this module, students will be able to:
• Describe the Search service architecture in SharePoint 2016.
• Configure the Search service in SharePoint 2016.
• Manage the search experience in SharePoint 2016.
Module 14: Monitoring and maintaining a SharePoint 2016 environment
This module explains how to implement a monitoring plan for SharePoint 2016, and how to optimize the performance of a SharePoint 2016 deployment. It also explains how to plan for and configure SharePoint caching. Further, it explains how to identify and resolve problems in a SharePoint 2016 environment.
Lessons
• Monitoring a SharePoint 2016 environment
• Tuning and optimizing a SharePoint 2016 environment
• Planning and configuring caching
• Troubleshooting a SharePoint 2016 environment
Lab : Monitoring a SharePoint 2016 deployment
• Configuring usage and health data collection
• Configuring Sharepoint diagnostic logging
• Configuring Health Analyzer rules
• Reviewing usage and health data
Lab : Investigating page load times
• Analyzing network traffic
• Analyzing SharePoint page performance
After completing this module, students will be able to:
Develop and implement a monitoring plan for a SharePoint 2016 environment.
Tune and optimize a SharePoint 2016 server farm on an ongoing basis.
Plan and configure caching to improve the performance of a SharePoint 2016 deployment.
Troubleshoot errors and other issues in a SharePoint 2016 deployment
Prerequisites
Before attending this course, students must have knowledge of:
• Software management in a Windows Server 2012 or Windows Server 2012 R2 enterprise server environment.
• Deploying and managing applications natively, virtually, and in the cloud.
• Administering IIS.
• Configuring AD DS for use in authentication, authorization, and as a user store.
• Managing an application remotely by using Windows PowerShell 4.0.
• Managing databases and server roles in SQL Server.
• Connecting applications to SQL Server.
• Implementing claims-based security.
• Using Microsoft Hyper-V virtual machines.
An ideal candidate for this course must have at least one year of experience with deploying and administering multiple SharePoint 2013 farms across a large enterprise. Because many customers have not upgraded from SharePoint 2010, a candidate can also have at least two years of experience with SharePoint 2010. However, they also must understand the differences between SharePoint 2010 and SharePoint 2013, particularly in terms of hybridization.
Overview
Audience(s): IT Professionals
Technology: SQL Server
Level: Advanced
This Revision: C
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This five-day instructor-led course provides students with the knowledge and skills to develop a Microsoft SQL Server database. The course focuses on teaching individuals how to use SQL Server product features and tools related to developing a database.
Audience profile
The primary audience for this course is IT Professionals who want to become skilled on SQL Server product features and technologies for implementing a database.
The secondary audiences for this course are individuals who are developers from other product platforms looking to become skilled in the implementation of a SQL Server database.
At course completion
After completing this course, students will be able to:
• Design and Implement Tables.
• Describe advanced table designs
• Ensure Data Integrity through Constraints.
• Describe indexes, including Optimized and Columnstore indexes
• Design and Implement Views.
• Design and Implement Stored Procedures.
• Design and Implement User Defined Functions.
• Respond to data manipulation using triggers.
• Design and Implement In-Memory Tables.
• Implement Managed Code in SQL Server.
• Store and Query XML Data.
• Work with Spatial Data.
• Store and Query Blobs and Text Documents.
Course Outline
Module 1: Introduction to Database Development
Before beginning to work with Microsoft SQL Server in either a development or an administration role, it is important to understand the scope of the SQL Server platform. In particular, it is useful to understand that SQL Server is not just a database engine—it is a complete platform for managing enterprise data. SQL Server provides a strong data platform for all sizes of organizations, in addition to a comprehensive set of tools to make development easier, and more robust.
Lessons
• Introduction to the SQL Server Platform
• SQL Server Database Development Tasks
After completing this module, you will be able to:
• Describe the SQL Server platform.
• Use SQL Server administration tools.
Module 2: Designing and Implementing Tables
In a relational database management system (RDBMS), user and system data is stored in tables. Each table consists of a set of rows that describe entities and a set of columns that hold the attributes of an entity. For example, a Customer table might have columns such as CustomerName and CreditLimit, and a row for each customer. In Microsoft SQL Server data management software tables are contained within schemas that are very similar in concept to folders that contain files in the operating system. Designing tables is one of the most important tasks that a database developer undertakes, because incorrect table design leads to the inability to query the data efficiently. After an appropriate design has been created, it is important to know how to correctly implement the design.
Lessons
• Designing Tables
• Data Types
• Working with Schemas
• Creating and Altering Tables
Lab: Designing and Implementing Tables
• Designing Tables
• Creating Schemas
• Creating Tables
After completing this module, you will be able to:
• Design tables using normalization, primary and foreign keys.
• Work with identity columns.
• Understand built-in and user data types.
• Use schemas in your database designs to organize data, and manage object security.
• Work with computed columns and temporary tables.
Module 3: Advanced Table Designs
The physical design of a database can have a significant impact on the ability of the database to meet the storage and performance requirements set out by the stakeholders. Designing a physical database implementation includes planning the filegroups, how to use partitioning to manage large tables, and using compression to improve storage and performance. Temporal tables are a new feature in SQL Server and offer a straightforward solution to collecting changes to your data.
Lessons
• Partitioning Data
• Compressing Data
• Temporal Tables
Lab: Using Advanced Table Designs
• Partitioning Data
• Compressing Data
After completing this module, you will be able to:
• Describe the considerations for using partitioned tables in a SQL Server database.
• Plan for using data compression in a SQL Server database.
• Use temporal tables to store and query changes to your data.
Module 4: Ensuring Data Integrity through Constraints
The quality of data in your database largely determines the usefulness and effectiveness of applications that rely on it—the success or failure of an organization or a business venture could depend on it. Ensuring data integrity is a critical step in maintaining high-quality data. You should enforce data integrity at all levels of an application from first entry or collection through storage. Microsoft SQL Server data management software provides a range of features to simplify the job.
Lessons
• Enforcing Data Integrity
• Implementing Data Domain Integrity
• Implementing Entity and Referential Integrity
Lab: Using Data Integrity Through Constraints
• Add Constraints
• Test the Constraints
After completing this module, you will be able to:
• Describe the options for enforcing data integrity, and the levels at which they should be applied.
• Implement domain integrity through options such as check, unique, and default constraints.
• Implement referential integrity through primary and foreign key constraints.
Module 5: Introduction to Indexes
An index is a collection of pages associated with a table. Indexes are used to improve the performance of queries or enforce uniqueness. Before learning to implement indexes, it is helpful to understand how they work, how effective different data types are when used within indexes, and how indexes can be constructed from multiple columns. This module discusses table structures that do not have indexes, and the different index types available in Microsoft SQL Server.
Lessons
• Core Indexing Concepts
• Data Types and Indexes
• Heaps, Clustered, and Nonclustered Indexes
• Single Column and Composite Indexes
Lab: Implementing Indexes
• Creating a Heap
• Creating a Clustered Index
• Creating a Covered Index
After completing this module, you will be able to:
• Explain core indexing concepts.
• Evaluate which index to use for different data types.
• Describe the difference between single and composite column indexes.
Module 6: Designing Optimized Index Strategies
Indexes play an important role in enabling SQL Server to retrieve data from a database quickly and efficiently. This module discusses advanced index topics including covering indexes, the INCLUDE clause, query hints, padding and fill factor, statistics, using DMOs, the Database Tuning Advisor, and Query Store.
Lessons
• Index Strategies
• Managing Indexes
• Execution Plans
• The Database Engine Tuning Advisor
• Query Store
Lab: Optimizing Indexes
• Using Query Store
• Heaps and Clustered Indexes
• Creating a Covered Index
After completing this module, you will be able to:
• What a covering index is, and when to use one.
• The issues involved in managing indexes.
• Actual and estimated execution plans.
• How to use Database Tuning Advisor to improve the performance of queries.
• How to use Query Store to improve query performance.
Module 7: Columnstore Indexes
Introduced in Microsoft SQL Server 2012, columnstore indexes are used in large data warehouse solutions by many organizations. This module highlights the benefits of using these indexes on large datasets; the improvements made to columnstore indexes in SQL Server 2016; and the considerations needed to use columnstore indexes effectively in your solutions.
Lessons
• Introduction to Columnstore Indexes
• Creating Columnstore Indexes
• Working with Columnstore Indexes
Lab: Using Columnstore Indexes
• Creating a Columnstore Index
• Create a Memory Optimized Columnstore Table
After completing this module, you will be able to:
• Describe columnstore indexes and identify suitable scenarios for their use.
• Create clustered and nonclustered columnstore indexes.
• Describe considerations for using columnstore indexes.
Module 8: Designing and Implementing Views
This module describes the design and implementation of views. A view is a special type of query—one that is stored and can be used in other queries—just like a table. With a view, only the query definition is stored on disk; not the result set. The only exception to this is indexed views, when the result set is also stored on disk, just like a table. Views simplify the design of a database by providing a layer of abstraction, and hiding the complexity of table joins. Views are also a way of securing your data by giving users permissions to use a view, without giving them permissions to the underlying objects. This means data can be kept private, and can only be viewed by appropriate users.
Lessons
• Introduction to Views
• Creating and Managing Views
• Performance Considerations for Views
Lab: Designing and Implementing Views
• Creating Standard Views
• Creating an Updateable view
After completing this module, you will be able to:
• Understand the role of views in database design.
• Create and manage views.
• Understand the performance considerations with views.
Module 9: Designing and Implementing Stored Procedures
This module describes the design and implementation of stored procedures.
Lessons
• Introduction to Stored Procedures
• Working with Stored Procedures
• Implementing Parameterized Stored Procedures
• Controlling Execution Context
Lab: Designing and Implementing Stored Procedures
• Create Stored procedures
• Create Parameterized Stored procedures
• Changes Stored Procedure Execution Context
After completing this module, you will be able to:
• Understand what stored procedures are, and what benefits they have.
• Design, create, and alter stored procedures.
• Control the execution context of stored procedures.
• Implement stored procedures that use parameters.
Module 10: Designing and Implementing User-Defined Functions
Functions are routines that you use to encapsulate frequently performed logic. Rather than having to repeat the function logic in many places, code can call the function. This makes code more maintainable, and easier to debug. In this module, you will learn to design and implement user-defined functions (UDFs) that enforce business rules or data consistency. You will also learn how to modify and maintain existing functions.
Lessons
• Overview of Functions
• Designing and Implementing Scalar Functions
• Designing and Implementing Table-Valued Functions
• Considerations for Implementing Functions
• Alternatives to Functions
Lab: Designing and Implementing User-Defined Functions
• Format Phone numbers
• Modify an Existing Function
•
After completing this module, you will be able to:
• Describe different types of functions.
• Design and implement scalar functions.
• Design and implement table-valued functions (TVFs).
• Describe considerations for implementing functions.
• Describe alternatives to functions.
Module 11: Responding to Data Manipulation via Triggers
Data Manipulation Language (DML) triggers are powerful tools that you can use to enforce domain, entity, referential data integrity and business logic. The enforcement of integrity helps you to build reliable applications. In this module, you will learn what DML triggers are, how they enforce data integrity, the different types of trigger that are available to you, and how to define them in your database.
Lessons
• Designing DML Triggers
• Implementing DML Triggers
• Advanced Trigger Concepts
Lab: Responding to Data Manipulation by Using Triggers
• Create and Test the Audit Trigger
• Improve the Audit Trigger
After completing this module, you will be able to:
• Design DML triggers
• Implement DML triggers
• Explain advanced DML trigger concepts, such as nesting and recursion.
Module 12: Using In-Memory Tables
Microsoft SQL Server 2014 data management software introduced in-memory online transaction processing (OLTP) functionality features to improve the performance of OLTP workloads. SQL Server adds several enhancements, such as the ability to alter a memory-optimized table without recreating it. Memory-optimized tables are primarily stored in memory, which provides the improved performance by reducing hard disk access. Natively compiled stored procedures further improve performance over traditional interpreted Transact-SQL.
Lessons
• Memory-Optimized Tables
• Natively Compiled Stored Procedures
Lab: Using In-Memory Database Capabilities
• Using Memory-Optimized Tables
• Using Natively Compiled Stored procedures
After completing this module, you will be able to:
• Use memory-optimized tables to improve performance for latch-bound workloads.
• Use natively compiled stored procedures.
Module 13: Implementing Managed Code in SQL Server
As a SQL Server professional, you are likely to be asked to create databases that meet business needs. Most requirements can be met using Transact-SQL. However, occasionally you may need additional capabilities that can only be met by using common language runtime (CLR) code. As functionality is added to SQL Server with each new release, the necessity to use managed code decreases. However, there are times when you might need to create aggregates, stored procedures, triggers, user-defined functions, or user-defined types. You can use any .NET Framework language to develop these objects. In this module, you will learn how to use CLR managed code to create user-defined database objects for SQL Server.
Lessons
• Introduction to CLR Integration in SQL Server
• Implementing and Publishing CLR Assemblies
Lab: Implementing Managed Code in SQL Server
• Assessing Proposed CLR Code
• Creating a Scalar-Valued CLR Function
• Creating a Table Valued CLR Function
After completing this module, you will be able to:
• Explain the importance of CLR integration in SQL Server.
• Implement and publish CLR assemblies using SQL Server Data Tools (SSDT).
Module 14: Storing and Querying XML Data in SQL Server
XML provides rules for encoding documents in a machine-readable form. It has become a widely adopted standard for representing data structures, rather than sending unstructured documents. Servers that are running Microsoft SQL Server data management software often need to use XML to interchange data with other systems; many SQL Server tools provide an XML-based interface. SQL Server offers extensive handling of XML, both for storage and querying. This module introduces XML, shows how to store XML data within SQL Server, and shows how to query the XML data. The ability to query XML data directly avoids the need to extract data into a relational format before executing Structured Query Language (SQL) queries. To effectively process XML, you need to be able to query XML data in several ways: returning existing relational data as XML, and querying data that is already XML.
Lessons
• Introduction to XML and XML Schemas
• Storing XML Data and Schemas in SQL Server
• Implementing the XML Data Type
• Using the Transact-SQL FOR XML Statement
• Getting Started with XQuery
• Shredding XML
Lab: Storing and Querying XML Data in SQL Server
• Determining when to use XML
• Testing XML Data Storage in Variables
• Using XML Schemas
• Using FOR XML Queries
• Creating a Stored Procedure to Return XML
After completing this module, you will be able to:
• Describe XML and XML schemas.
• Store XML data and associated XML schemas in SQL Server.
• Implement XML indexes within SQL Server.
• Use the Transact-SQL FOR XML statement.
• Work with basic XQuery queries.
Module 15: Storing and Querying Spatial Data in SQL Server
This module describes spatial data and how this data can be implemented within SQL Server.
Lessons
• Introduction to Spatial Data
• Working with SQL Server Spatial Data Types
• Using Spatial Data in Applications
Lab: Working with SQL Server Spatial Data
• Become Familiar with the Geometry Data Type
• Add Spatial Data to an Existing Table
• Find Nearby Locations
After completing this module, you will be able to:
• Describe how spatial data can be stored in SQL Server
• Use basic methods of the GEOMETRY and GEOGRAPHY data types
• Query databases containing spatial data
Module 16: Storing and Querying BLOBs and Text Documents in SQL Server
Traditionally, databases have been used to store information in the form of simple values—such as integers, dates, and strings—that contrast with more complex data formats, such as documents, spreadsheets, image files, and video files. As the systems that databases support have become more complex, administrators have found it necessary to integrate this more complex file data with the structured data in database tables. For example, in a product database, it can be helpful to associate a product record with the service manual or instructional videos for that product. SQL Server provides several ways to integrate these files—that are often known as Binary Large Objects (BLOBs)—and enable their content to be indexed and included in search results. In this module, you will learn how to design and optimize a database that includes BLOBs.
Lessons
• Considerations for BLOB Data
• Working with FILESTREAM
• Using Full-Text Search
Lab: Storing and Querying BLOBs and Text Documents in SQL Server
• Enabling and Using FILESTREAM Columns
• Enabling and Using File Tables
• Using a Full-Text Index
After completing this module, you will be able to:
• Describe the considerations for designing databases that incorporate BLOB data.
• Describe the benefits and design considerations for using FILESTREAM to store BLOB data on a Windows file system.
• Describe the benefits of using full-text indexing and Semantic Search, and explain how to use these features to search SQL Server data, including unstructured data
Module 17: SQL Server Concurrency
This module explains how to name, declare, assign values to, and use variables. It also describes how to store data in an array. Concurrency control is a critical feature of multiuser database systems; it allows data to remain consistent when many users are modifying data at the same time. This module covers the implementation of concurrency in Microsoft SQL Server. You will learn about how SQL Server implements concurrency controls, and the different ways you can configure and work with concurrency settings.
Lessons
• Concurrency and Transactions
• Locking Internals
Lab: SQL Server Concurrency
• Implement Snapshot Isolation
• Implement Partition Level Locking
After completing this module, you will be able to:
• Describe concurrency and transactions in SQL Server.
• Describe SQL Server locking.
Module 18: Performance and Monitoring
This module explains how to name, declare, assign values to, and use variables. It also describes how to store data in an array. This module looks at how to measure and monitor the performance of your SQL Server databases. The first two lessons look at SQL Server Extended Events, a flexible, lightweight event-handling system built into the Microsoft SQL Server Database Engine. These lessons focus on the architectural concepts, troubleshooting strategies and usage scenarios.
Lessons
• Extended Events
• Working with extended Events
• Live Query Statistics
• Optimize Database File Configuration
• Metrics
Lab: Monitoring, Tracing, and Baselining
• Collecting and Analyzing Data Using Extended Events
• Implementing Baseline Methodology
After completing this module, you will be able to:
• Understand Extended Events and how to use them.
• Work with Extended Events.
• Understand Live Query Statistics.
• Optimize the file configuration of your databases.
• Use DMVs and Performance Monitor to create baselines and gather performance metrics.
Prerequisites
• Basic knowledge of the Microsoft Windows operating system and its core functionality.
• Working knowledge of Transact-SQL.
• Working knowledge of relational databases.
Overview
Audience(s): IT Pros
Technology: Office 365
Level: Intermediate
This Revision: B
Delivery method:
Classroom
Length: 3 days
Language(s): English
About this course
This is a three-day Instructor Led Training (ILT) course that targets the needs of information technology (IT) professionals who take part in administering, configuring, troubleshooting, and operating Office 365 services, including its identities, dependencies, requirements, and supporting technologies. This course focuses on skills required to administer and troubleshoot Office 365 tenant and key services of Office 365, such as Exchange Online, SharePoint Online and Skype for Business. It also covers security and compliance features of Office 365.
Audience profile
This course is intended for IT professionals and system administrators who want to learn about administration and troubleshooting techniques in Office 365. These professionals should have at least three years of experience working in their respective fields: ideally in the areas of system administration, network administration, and messaging.
At course completion
After completing this course, students will be able to:
• Describe Office 365 services.
• Administer Office 365 by using the graphical environment and Windows PowerShell.
• Administer and troubleshoot directory synchronization and directory objects.
• Administer and troubleshoot Exchange Online.
• Administer and troubleshoot Skype for Business Online and Microsoft Teams.
• Administer and troubleshoot SharePoint Online.
• Plan and deploy Microsoft Office 365 ProPlus.
• Administer and troubleshoot compliance and security in Office 365
Course Outline
Module 1: Office 365 services overview
This module describes the features of Office 365 and identifies recent improvements to the service. It also identifies licensing options, describes the process of Office 365 tenant configuration, and lists appropriate Office 365 client options.
Lessons
• Overview of Office 365 services
• Office 365 licensing overview
• Office 365 tenant configuration
• Office 365 clients
Lab : Office 365 services overview
• Setting up Office 365 lab environment
• Configuring Office 365 Services
After completing this module, students will be able to:
• Describe Office 365 services.
• Explain Office 365 licensing options.
• Describe Office 365 tenant configuration.
• Describe the available Office 365 clients.
Module 2: Office 365 administration, tools, and techniques
This module describes how to manage Office 365 by using the administrative portals and Windows PowerShell. It also explains how to manage administrative access and troubleshoot administration in Office 365.
Lessons
• Managing Office 365 with the administrative portals
• Managing Office 365 with Windows PowerShell
• Managing administrative access in Office 365
• Troubleshooting administration in Office 365
Lab : Administering Office 365
• Using administrative portal
• Administering Office 365 with Windows PowerShell
• Configuring role-based administration
• Troubleshooting administrative access in Office 365
After completing this module, students will be able to:
• Manage Office 365 by using the administrative portals.
• Manage Office 365 by using Windows PowerShell.
• Manage administrative access in Office 365.
• Troubleshoot administration in Office 365.
Module 3: Administering and troubleshooting directory synchronization and directory objects
This module describes directory synchronization and federation. The module explains how to manage Microsoft Azure Active Directory Connect (Azure AD Connect) and user and group objects in Office 365. Additionally, it describes how to troubleshoot objects and directory synchronization in Office 365.
Lessons
• Overview of directory synchronization and federation overview
• Azure AD Connect management
• Managing users and groups objects in Office 365
• Troubleshooting objects and directory synchronization in Office 365
Lab : Administering directory synchronization, users, and groups in Office 365
• Configuring Azure AD Connect
• Managing Office 365 users and groups by using the Office 365 admin center
• Managing Office 365 password policies
• Troubleshooting synchronization issues with user objects in Office 365
After completing this module, students will be able to:
• Describe directory synchronization and federation.
• Manage Azure AD Connect.
• Manage user and group objects in Officce 365.
• Troubleshoot objects and directory synchronization in Office 365
Module 4: Administering and troubleshooting Exchange Online
This module describes the subscription options and roles in Exchange Online. It explains how to administer Exchange Online recipients and client access policies in Exchange Online and how to troubleshoot Exchange Online.
Lessons
• Exchange Online management overview
• Administering Exchange Online recipients
• Administering client access policies in Exchange Online
• Troubleshooting Exchange Online
Lab : Administering and troubleshooting Exchange Online
• Configuring and administering Exchange Online recipients
• Configuring delegated administration
• Configuring client access policies
• Troubleshoot Exchange Online
After completing this module, students will be able to:
• Describe the subscription options and roles in Exchange Online.
• Administer Exchange Online recipients.
• Administer client access policies in Exchange Online.
• Troubleshoot Exchange Online
Module 5: Administering and troubleshooting Skype for Business Online and Teams
This module describes Skype for Business Online and Teams. It explains how to administer, manage, and troubleshoot Skype for Business Online and Teams.
Lessons
• Skype for Business Online and Teams overview
• Administering and managing Skype for Business Online and Teams
• Troubleshooting Skype for Business Online and Teams
Lab : Administering Skype for Business Online and Teams
• Configuring Skype for Business Online and Teams organization settings
• Configuring Skype for Business Online and Teams user settings
• Troubleshooting Skype for Business Online
After completing this module, students will be able to:
• Describe Skype for Business Online and Teams.
• Administer and manager Skype for Business Online and Teams.
• Troubleshoot Skype for Business Online and Teams.
Module 6: Administering and troubleshooting SharePoint Online
This module describes how to configure SharePoint Online settings and site collections and external user access to SharePoint Online. It also explains how to manage Microsoft OneDrive for Business synchronization and how to troubleshoot SharePoint Online.
Lessons
• SharePoint Online management overview
• Administering SharePoint Online site collections
• Administering external users in SharePoint Online
• Configuring OneDrive for Business
• Troubleshooting SharePoint Online
Lab : Configuring and administering SharePoint Online
• Configuring SharePoint Online settings
• Creating and configuring a SharePoint site collection
• Configuring and verifying external user sharing
• Configuring OneDrive for Business
• Troubleshooting SharePoint Online
After completing this module, students will be able to:
• Configure SharePoint Online settings.
• Configure SharePoint Online site collections.
• Configure external user access to SharePoint Online.
• Manage Microsoft OneDrive for Business synchronization.
• Troubleshoot SharePoint Online.
Module 7: Planning and deploying Office 365 ProPlus
This module describes Office 365 ProPlus. It also explains how to plan and manage user-driven Office 365 ProPlus deployments and how to troubleshoot the deployments.
Lessons
• Overview of Office 365 ProPlus
• Managing user-driven Office 365 ProPlus deployments
• Troubleshooting Office 365 ProPlus deployments
Lab : Managing Office 365 ProPlus installations
• Preparing Office 365 ProPlus installations
• Managing user-driven Office 365 ProPlus installations
• Managing centralized Office 365 ProPlus installations
• Troubleshooting Office 365 ProPlus deployments
After completing this module, students will be able to:
• Describe Office 365 ProPlus.
• Plan and manage user-driven Office 365 ProPlus deployments.
• Troubleshoot Office 365 ProPlus deployments.
Module 8: Administering and troubleshooting compliance and security in Office 365
This module describes the compliance features in Office 365. It explains how to administer Azure Information Protection and the compliance features in Office 365, how to configure and administer email security in Office 365, and how to troubleshoot Office 365 compliance and protection.
Lessons
• Overview of compliance features in Office 365
• Administering information protection in Office 365
• Administering compliance features in Office 365
• Configuring and administering email security in Office 365
• Troubleshooting Office 365 compliance and protection
Lab : Configuring and troubleshooting compliance and security
• Configuring rights management in Office 365
• Configuring compliance features
• Configuring email protection
• Troubleshooting security and compliance
After completing this module, students will be able to:
• Describe the compliance features in Office 365.
• Administer Azure Information Protection in Office 365.
• Administer the compliance features in Office 365.
• Configure and administer email security in Office 365.
• Troubleshoot Office 365 compliance and protection.
Prerequisites
Before attending this course, students must have:
• A minimum of two years of experience administering the Windows Server operating system, including Windows Server 2012 or newer.
• A minimum of one year of experience working with Active Directory Domain Services (AD DS).
• A minimum of one year experience working with name resolution, including DNS.
• Experience working with certificates, including public key infrastructure (PKI) certificates
• Experience working with certificates, including public key infrastructure (PKI) certificates.Experience working with Windows Powershell.
• Experience working with Microsoft Exchange Server 2013 or newer, Microsoft Lync 2013 Server or Skype for Business 2015 Server, and Microsoft SharePoint Server 2013 or newer is beneficial but not required.
Overview
Audience(s): IT Professionals
Technology: Skype
Level: Advanced
This Revision: B
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This course provides students with the knowledge and skills that are required to plan, deploy, configure, and administer a Skype for Business 2015 solution. Students will learn how to deploy a multi-site and highly available Skype for Business infrastructure that supports instant messaging, conferencing, Persistent Chat, archiving, and monitoring. Students will also learn how to manage and maintain the infrastructure and how to troubleshoot issues that might arise. This course focuses primarily on an on-premises Skype for Business deployment, but it does include information on how to integrate an on-premises deployment with Skype for Business Online and how to migrate from previous versions of Lync Server. This course helps students prepare for Exam 70-334.
Audience profile
The primary audience for this course is information technology (IT) professionals who are responsible for the Skype for Business 2015 deployment in their organizations. Experience with previous versions of Lync Server is beneficial but not required to take this course. Students should be proficient with Active Directory Domain Services (AD DS), data networks, and telecommunications standards and components that support the configuration of Skype for Business. Students should also be familiar with Microsoft Exchange Server and Microsoft Office 365.
The secondary audience for this course includes IT professionals who are planning to take the exam 70-334: Core Solutions of Skype for Business 2015 as a stand-alone exam or as part of the requirement for the Microsoft Certified Solutions Expert (MCSE): Communications certification exam.
At course completion
After completing this course, students will be able to:
Describe the Skype for Business 2015 architecture and design a Skype for Business 2015 topology.
Install and implement Skype for Business Server 2015.
Administer Skype for Business Server 2015 by using various tools.
Configure users and clients in Skype for Business 2015.
Configure and implement conferencing in Skype for Business 2015.
Implement additional conferencing options, such as dial-in conferencing, Microsoft Skype Room System (SRS), and Skype Meeting Broadcast.
Design and implement monitoring and archiving in Skype for Business 2015.
Deploy Skype for Business 2015 external access.
Implement Persistent Chat in Skype for Business 2015.
Implement high availability in Skype for Business 2015.
Implement disaster recovery in Skype for Business 2015.
Design and deploy a hybrid Skype for Business environment.
Plan and implement an upgrade from Lync Server to Skype for Business Server 2015.
Course Outline
Module 1: Design and Architecture of Skype for Business Server 2015
This module describes the high-level components and features of Skype for Business 2015. It also describes how to work with Skype for Business administrative tools, the main components of Skype for Business Online, and coexistence with on-premises Skype for Business Server 2015 servers.
Lessons
• Overview of Skype for Business Components and Features
• Introduction to the Skype for Business Administrative Tools
Lab : Designing and Publishing a Skype for Business Server Topology
• Designing and Creating the Topology
• Updating the Topology for the New York Site
After completing this module, students will be able to:
Describe the high-level components and features of Skype for Business 2015.
Work with Skype for Business administrative tools.
Module 2: Installing and Implementing Skype for Business Server 2015
This module explains the external dependencies for Skype for Business Server. It describes the Session Initiation Protocol (SIP) domain requirements to ensure a successful implementation. This module also explains how to install Skype for Business Server, and it describes how Skype for Business Server integrates with Exchange Server and Microsoft SharePoint Server.
Lessons
• Server and Service Dependencies
• Planning SIP Domains
• Installing Skype for Business Server
• Integrating Skype for Business Server with Exchange Server and SharePoint Server
Lab : Configuring DNS and Simple URLs for Skype for Business Server
• Configuring the Required DNS Records and Simple URLs for Skype for Business Server
Lab : Deploying Skype for Business Server
• Installing and Configuring Skype for Business Server
• Installing Skype for Business Server Certificates
After completing this module, students will be able to:
Identify the external dependencies for Skype for Business Server 2015.
Identify the SIP domain requirements to ensure a successful implementation.
Install Skype for Business Server.
Describe how Skype for Business Server integrates with Exchange Server and SharePoint Server.
Module 3: Administering Skype for Business Server 2015
This module explains how to administer and manage Skype for Business Server by using Skype for Business Server Control Panel and the Skype for Business Server Management Shell. It also describes how to create useful Skype for Business scripts to automate processes. Additionally, it explains how to implement role-based access control (RBAC) in Skype for Business and how to use important Test cmdlets and tools to troubleshoot Skype for Business.
Lessons
• Using Skype for Business Server Control Panel
• Using the Skype for Business Server Management Shell
• Implementing Role-Based Access Control
• Using Test Cmdlets
• Tools for Troubleshooting Skype for Business
Lab : Using the Administrative Tools to Manage Skype for Business Server
• Installing the Skype for Business Administrative Tools on a Windows 10 Client
• Using Skype for Business Server Control Panel
• Using the Skype for Business Server Management Shell
Lab : Using the Skype for Business Troubleshooting Tools
• Using Skype for Business Server Management Shell Cmdlets to Create an RBAC Structure
• Using the Centralized Logging Service
• Performing a Network Capture by Using Message Analyzer
After completing this module, students will be able to:
Use Skype for Business Server Control Panel.
Use the Skype for Business Server Management Shell.
Implement RBAC in Skype for Business 2015.
Use important test cmdlets.
Use various tools to troubleshoot Skype for Business.
Module 4: Configuring Users and Clients in Skype for Business 2015
This module explains how to configure users by using Skype for Business Server Control Panel and the Skype for Business Server Management Shell. It then describes how to deploy Skype for Business clients and explains the sign-in, registration, and authentication process for Skype for Business clients. It also explains how to configure in-band policies and group policies. Finally, it explains how to manage the Skype for Business Address Book.
Lessons
• Configuring Users
• Deploying the Skype for Business Client
• Registration, Sign-In, and Authentication
• Configuring Skype for Business Client Policies
• Managing the Skype for Business Address Book
Lab : Configuring Users and Clients in Skype for Business 2015
• Enabling Users for Skype for Business by Using the Management Shell
• Troubleshooting a User Sign-In Issue
Lab : Configuring Policies and the Address Book in Skype for Business Server
• Configuring Client Policies
• Configuring the Address Book
After completing this module, students will be able to:
• Configure users by using Skype for Business Server Control Panel and the Skype for Business Server Management Shell.
• Deploy Skype for Business clients.
• Explain the registration, sign-in, and authentication process for Skype for Business clients.
• Configure in-band policies and Group Policies.
• Describe how to manage the Skype for Business Address Book.
Module 5: Configuring and Implementing Conferencing in Skype for Business 2015
This modules describes Skype for Business conferencing features and modalities. It explains how to integrate Skype for Business Server 2015 with Office Online Server. It also explains how to plan for conferencing bandwidth utilization. Finally, it explains how to configure conferencing settings and policies.
Lessons
• Introduction to Conferencing in Skype for Business 2015
• Integrating Skype for Business Server and Office Online Server
• Bandwidth Planning
• Configuring Conferencing Settings
Lab : Installing and Configuring Office Online Server
• Installing Office Online Server
Lab : Configuring Conferencing in Skype for Business Server
• Configuring, Assigning, and Validating Conferencing Policies
After completing this module, students will be able to:
• Describe Skype for Business conferencing features and modalities.
• Integrate Skype for Business Server 2015 with Office Web Apps Server.
• Plan for conferencing bandwidth utilization.
• Configure conferencing settings and policies.
Module 6: Implementing Additional Conferencing Options in Skype for Business Server 2015
This module describes the conferencing lifecycle and explains how to administer it. It then explains how to use conferencing and meeting policies. It also explains how to deploy dial-in conferencing and configure the infrastructure for SRS. Finally, it explains how to configure large meetings and Skype Meeting Broadcast.
Lessons
• Overview of the Conferencing Lifecycle
• Designing and Configuring Audio/Video and Web Conferencing Policies
• Deploying Dial-In Conferencing
• Configuring an SRS
• Configuring Large Meetings and Skype Meeting Broadcasts
Lab : Implementing and Troubleshooting Conferencing Policy
• Creating and Editing Conferencing Policies
• Troubleshooting Conferencing Policies
Lab : Configuring Additional Conferencing Modalities
• Deploying Dial-In Conferencing
• Preparing for LRS Deployment
After completing this module, students will be able to:
• Administer the conferencing lifecycle.
• Configure conferencing and meeting policies.
• Deploy dial-in conferencing.
• Configure the infrastructure for Lync Room System (LRS).
• Configure large meetings and Skype Meeting Broadcast.
Module 7: Designing and Implementing Monitoring and Archiving in Skype for Business 2015
This module describes the Monitoring Service components in Skype for Business Server. It then describes archiving and explains how to design an archiving policy. Finally, it explains how to implement archiving.
Lessons
• Components of the Monitoring Service
• Overview of Archiving
• Designing an Archiving Policy
• Implementing Archiving
Lab : Implementing Monitoring
• Enabling Monitoring Reports
Lab : Implementing Archiving
• Enabling Skype for Business Server Archiving to Microsoft Exchange Server 2013
After completing this module, students will be able to:
• Describe Monitoring Service components in Skype for Business Server.
• Implement monitoring.
• Design an archiving policy.
• Implement archiving.
Module 8: Deploying Skype for Business 2015 External Access
This module describes the components for external access. It then explains how to configure external access policies and security, how to configure certificates, and how to configure reverse proxy. Additionally, this module describes how to configure Skype for Business Server 2015 for mobile clients. Finally, it explains how to design and configure federation in Skype for Business Server.
Lessons
• Overview of External Access
• Configuring External Access Policies and Security
• Configuring External Access Network and Certificates
• Configuring Reverse Proxy
• Designing Mobility in Skype for Business Server
• Designing Federation in Skype for Business Server
Lab : Designing and Implementing External User Access
• Defining the Edge Server in the Topology
• Installing and Configuring the Edge Server
Lab : Installing the Components for External Users
• Installing and Configuring Reverse Proxy
• Validate External Messaging
After completing this module, students will be able to:
• Identify the components for external access.
• Configure external access policies and security.
• Configure external access network and certificates.
• Configure reverse proxy.
• Configure Skype for Business Server 2015 for mobile clients.
• Design and configure federation in Skype for Business Server.
Module 9: Implementing Persistent Chat in Skype for Business 2015
This module explains how to design a Skype for Business 2015 topology that includes Persistent Chat. It then explains how to deploy Persistent Chat in Skype for Business. Finally, it explains how to configure and manage Persistent Chat.
Lessons
• Designing a Persistent Chat Server Topology
• Deploying Persistent Chat Server
• Configuring and Managing Persistent Chat
Lab : Designing and Deploying Persistent Chat Server
• Configuring the Topology for Persistent Chat Server
• Installing Persistent Chat Server
• Registering a New Add-In
Lab : Configuring and Using Persistent Chat
• Configuring Chat Rooms and Policies
• Validating a Persistent Chat Deployment
• Troubleshooting Persistent Chat
After completing this module, students will be able to:
• Design a Skype for Business topology that includes Persistent Chat.
• Deploy Persistent Chat in Skype for Business.
• Configure and manage Persistent Chat in Skype for Business.
Module 10: Implementing High Availability in Skype for Business 2015
This module describes how to design and implement a high-availability solution for Front End Servers and Back End Servers in a Skype for Business Server environment. It also explains how to design and implement a high-availability solution for file stores, Edge Servers, Mediation Servers, Office Online server farms, and reverse proxy servers in a Skype for Business Server environment.
Lessons
• Planning for Front End Pool High Availability
• Planning for Back End Server High Availability
• High Availability for Other Component Servers
Lab : Pre-Lab Configuration
• Preparing for the Lab
Lab : Implementing High Availability
• Managing Front End Pools
• Configuring Hardware Load Balancing
After completing this module, students will be able to:
• Design and implement a high-availability solution for Front End Servers in a Skype for Business Server environment.
• Design and implement a high-availability solution for Back End Servers in a Skype for Business Server environment.
• Design and implement a high-availability solution for file stores, Edge Servers, Mediation Servers, Office Online Server farms, and reverse proxy servers in a Skype for Business Server environment.
Module 11: Implementing Disaster Recovery in Skype for Business 2015
This module describes the disaster recovery options in Skype for Business Server, such as Front End pool pairing and Persistent Chat Server stretched pools. It then explains how to implement disaster recovery in Skype for Business Server. Additionally, it describes the disaster recovery options for Persistent Chat, the Central Management store, the Location Information Service (LIS) database, and user data.
Lessons
• Disaster Recovery Options in Skype for Business Server
• Implementing Disaster Recovery in Skype for Business Server
• Additional Disaster Recovery Options in Skype for Business Server
Lab : Implementing and Performing Disaster Recovery
• Configuring Pool Pairing
• Perform Pool Failover and Failback
After completing this module, students will be able to:
• Describe disaster recovery options in Skype for Business Server.
• Implement disaster recovery in Skype for Business Server.
• Describe the disaster recovery options for Persistent Chat, the Central Management store, the Location Information Service (LIS) database, and user data.
Module 12: Integrating with Skype for Business Online
This module describes Skype for Business Online features. It then explains how to prepare an on-premises environment for a hybrid Skype for Business deployment. It also explains how to configure a hybrid Skype for Business deployment.
Lessons
• Overview of Skype for Business Online
• Preparing for a Hybrid Skype for Business Deployment
• Configuring a Hybrid Skype for Business Environment
Lab : Designing a Hybrid Skype for Business Deployment
• Designing the Hybrid Skype for Business Environment
After completing this module, students will be able to:
• Describe Skype for Business Online features.
• Prepare an on-premises environment for a hybrid Skype for Business deployment.
• Configure a hybrid Skype for Business deployment.
Module 13: Planning and Implementing an Upgrade to Skype for Business Server 2015
This module describe how to plan a side-by-side migration from Lync Server 2010 and Lync Server 2013 to Skype for Business Server 2015. It also explains how to perform an in-place upgrade from Lync Server 2013 to Skype for Business Server.
Lessons
• Overview of Upgrade and Migration Paths
• Migrating to Skype for Business 2015
• In-Place Upgrade to Skype for Business Server 2015
Lab : Performing an In-Place Upgrade of Lync Server 2013 to Skype for Business Server 2015
• Install Skype for Business Administrative Tools
• Performing In-Place Upgrade from Lync Server 2013 to Skype for Business Server 2015
After completing this module, students will be able to:
• Describe the supported migration and upgrade paths for Skype for Business Server.
• Perform an in-place upgrade of Lync Server 2013 to Skype for Business Server.
• Describe how to manage the user experience during an upgrade.
Prerequisites
In addition to their professional experience, students who attend this training should already have:
A minimum of two years of experience administering Windows Server 2012 or Windows Server 2008 R2.
A minimum of two years of experience working with AD DS.
A minimum of two years of experience working with name resolution, including Domain Name System (DNS).
Experience working with certificates, including public key infrastructure (PKI) certificates.
Experience working with the Windows PowerShell command-line interface.
An understanding of data networks and telecommunications standards and components.
Overview
Audience(s): Data Professional
Technology: Microsoft SQL Server
Level: Intermediate
This Revision: C
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This course is designed to introduce students to Transact-SQL. It is designed in such a way that the first three days can be taught as a course to students requiring the knowledge for other courses in the SQL Server curriculum. Days 4 & 5 teach the remaining skills required to take exam 70-761.
Audience profile
The main purpose of the course is to give students a good understanding of the Transact-SQL language which is used by all SQL Server-related disciplines; namely, Database Administration, Database Development and Business Intelligence. As such, the primary target audience for this course is: Database Administrators, Database Developers and BI professionals.
At course completion
After completing this course, students will be able to:
• Describe key capabilities and components of SQL Server.
• Describe T-SQL, sets, and predicate logic.
• Write a single table SELECT statement.
• Write a multi-table SELECT statement.
• Write SELECT statements with filtering and sorting.
• Describe how SQL Server uses data types.
• Write DML statements.
• Write queries that use built-in functions.
• Write queries that aggregate data.
• Write subqueries.
• Create and implement views and table-valued functions.
• Use set operators to combine query results.
• Write queries that use window ranking, offset, and aggregate functions.
• Transform data by implementing pivot, unpivot, rollup and cube.
• Create and implement stored procedures.
• Add programming constructs such as variables, conditions, and loops to T-SQL code.
Course Outline
Module 1: Introduction to Microsoft SQL Server
This module introduces SQL Server, the versions of SQL Server, including cloud versions, and how to connect to SQL Server using SQL Server Management Studio.
Lessons
• The Basic Architecture of SQL Server
• SQL Server Editions and Versions
• Getting Started with SQL Server Management Studio
Lab: Working with SQL Server Tools
• Working with SQL Server Management Studio
• Creating and Organizing T-SQL Scripts
• Using Books Online
After completing this module, you will be able to:
• Describe relational databases and Transact-SQL queries.
• Describe the on-premise and cloud-based editions and versions of SQL Server.
• Describe how to use SQL Server Management Studio (SSMS) to connect to an instance of SQL Server, explore the databases contained in the instance, and work with script files that contain T-SQL queries.
Module 2: Introduction to T-SQL Querying
This module describes the elements of T-SQL and their role in writing queries. Describe the use of sets in SQL Server. Describe the use of predicate logic in SQL Server. Describe the logical order of operations in SELECT statements.
Lessons
• Introducing T-SQL
• Understanding Sets
• Understanding Predicate Logic
• Understanding the Logical Order of Operations in SELECT statements
Lab: Introduction to T-SQL Querying
• Executing Basic SELECT Statements
• Executing Queries that Filter Data using Predicates
• Executing Queries That Sort Data Using ORDER BY
After completing this module, you will be able to:
• Describe the role of T-SQL in writing SELECT statements.
• Describe the elements of the T-SQL language and which elements will be useful in writing queries.
• Describe the concepts of the set theory, one of the mathematical underpinnings of relational databases, and to help you apply it to how you think about querying SQL Server
• Describe predicate logic and examine its application to querying SQL Server.
• Explain the elements of a SELECT statement, delineate the order in which the elements are evaluated, and then apply this understanding to a practical approach to writing queries.
Module 3: Writing SELECT Queries
This module introduces the fundamentals of the SELECT statement, focusing on queries against a single table.
Lessons
• Writing Simple SELECT Statements
• Eliminating Duplicates with DISTINCT
• Using Column and Table Aliases
• Writing Simple CASE Expressions
Lab: Writing Basic SELECT Statements
• Writing Simple SELECT Statements
• Eliminating Duplicates Using DISTINCT
• Using Column and Table Aliases
• Using a Simple CASE Expression
After completing this module, you will be able to:
• Describe the structure and format of the SELECT statement, as well as enhancements that will add functionality and readability to your queries
• Describe how to eliminate duplicates using the DISTINCT clause
• Describe the use of column and table aliases
• Understand and use CASE expressions
Module 4: Querying Multiple Tables
This module describes how to write queries that combine data from multiple sources in Microsoft SQL Server.
Lessons
• Understanding Joins
• Querying with Inner Joins
• Querying with Outer Joins
• Querying with Cross Joins and Self Joins
Lab: Querying Multiple Tables
• Writing Queries that use Inner Joins
• Writing Queries that use Multiple-Table Inner Joins
• Writing Queries that use Self-Joins
• Writing Queries that use Outer Joins
• Writing Queries that use Cross Joins
After completing this module, you will be able to:
• Explain the fundamentals of joins in SQL Server
• Write inner join queries
• Write queries that use outer joins
• Use additional join types
Module 5: Sorting and Filtering Data
This module describes how to implement sorting and filtering.
Lessons
• Sorting Data
• Filtering Data with Predicates
• Filtering Data with TOP and OFFSET-FETCH
• Working with Unknown Values
Lab: Sorting and Filtering Data
• Writing Queries that Filter Data using a WHERE Clause
• Writing Queries that Sort Data Using an ORDER BY Clause
• Writing Queries that Filter Data Using the TOP Option
• Write Queries that filter data using the OFFSET-FETCH clause
.
After completing this module, you will be able to:
• Explain how to add an ORDER BY clause to your queries to control the order of rows displayed in your query's output
• Explain how to construct WHERE clauses to filter out rows that do not match the predicate.
• Explain how to limit ranges of rows in the SELECT clause using a TOP option.
• Explain how to limit ranges of rows using the OFFSET-FETCH option of an ORDER BY clause.
• Explain how three-valued logic accounts for unknown and missing values, how SQL Server uses NULL to mark missing values, and how to test for NULL in your queries.
Module 6: Working with SQL Server Data Types
This module introduces the data types SQL Server uses to store data.
Lessons
• Introducing SQL Server Data Types
• Working with Character Data
• Working with Date and Time Data
Lab: Working with SQL Server Data Types
• Writing Queries that Return Date and Time Data
• Writing Queries that use Date and Time Functions
• Writing Queries That Return Character Data
• Writing Queries That Return Character Functions
After completing this module, you will be able to:
• Explore many of the data types SQL Server uses to store data and how data types are converted between types
• Explain the SQL Server character-based data types, how character comparisons work, and some common functions you may find useful in your queries
• Describe data types that are used to store temporal data, how to enter dates and times so they will be properly parsed by SQL Server, and how to manipulate dates and times with built-in functions.
Module 7: Using DML to Modify Data
This module describes how to create DML queries, and why you would want to.
Lessons
• Adding Data to Tables
• Modifying and Removing Data
• Generating automatic column values
Lab: Using DML to Modify Data
• Inserting Records with DML
• Updating and Deleting Records Using DML
After completing this module, you will be able to:
• Use INSERT and SELECT INTO statements
• Use UPDATE, MERGE, DELETE, and TRUNCATE.
Module 8: Using Built-In Functions
This module introduces some of the many built in functions in SQL Server.
Lessons
• Writing Queries with Built-In Functions
• Using Conversion Functions
• Using Logical Functions
• Using Functions to Work with NULL
Lab: Using Built-In Functions
• Writing Queries That Use Conversion Functions
• Writing Queries that use Logical Functions
• Writing Queries that Test for Nullability
After completing this module, you will be able to:
• Describe the types of functions provided by SQL Server, and then focus on working with scalar functions
• Explain how to explicitly convert data between types using several SQL Server functions
• Describe how to use logical functions that evaluate an expression and return a scalar result.
• Describe additional functions for working with NULL
Module 9: Grouping and Aggregating Data
This module describes how to use aggregate functions.
Lessons
• Using Aggregate Functions
• Using the GROUP BY Clause
• Filtering Groups with HAVING
Lab: Grouping and Aggregating Data
• Writing Queries That Use the GROUP BY Clause
• Writing Queries that Use Aggregate Functions
• Writing Queries that Use Distinct Aggregate Functions
• Writing Queries that Filter Groups with the HAVING Clause
After completing this module, you will be able to:
• Describe the built-in aggregate function in SQL Server and write queries using it.
• Write queries that separate rows using the GROUP BY clause.
• Write queries that use the HAVING clause to filter groups.
Module 10: Using Subqueries
This module describes several types of subquery and how and when to use them.
Lessons
• Writing Self-Contained Subqueries
• Writing Correlated Subqueries
• Using the EXISTS Predicate with Subqueries
Lab: Using Subqueries
• Writing Queries That Use Self-Contained Subqueries
• Writing Queries That Use Scalar and Multi-Result Subqueries
• Writing Queries That Use Correlated Subqueries and an EXISTS Clause
After completing this module, you will be able to:
• Describe where subqueries may be used in a SELECT statement.
• Write queries that use correlated subqueries in a SELECT statement
• Write queries that use EXISTS predicates in a WHERE clause to test for the existence of qualifying rows
• Use the EXISTS predicate to efficiently check for the existence of rows in a subquery.
Module 11: Using Table Expressions
Previously in this course, you learned about using subqueries as an expression that returned results to an outer calling query. Like subqueries, table expressions are query expressions, but table expressions extend this idea by allowing you to name them and to work with their results as you would work with data in any valid relational table. Microsoft SQL Server supports four types of table expressions: derived tables, common table expression (CTEs), views, and inline table-valued functions (TVFs). In this module, you will learn to work with these forms of table expressions and learn how to use them to help create a modular approach to writing queries.
Lessons
• Using Views
• Using Inline Table-Valued Functions
• Using Derived Tables
• Using Common Table Expressions
Lab: Using Table Expressions
• Writing Queries That Use Views
• Writing Queries That Use Derived Tables
• Writing Queries That Use Common Table Expressions (CTEs)
• Writing Queries That Use Inline Table-Valued Expressions (TVFs)
After completing this module, you will be able to:
• Write queries that return results from views.
• Use the CREATE FUNCTION statement to create simple inline TVFs.
• Write queries that create and retrieve results from derived tables.
• Write queries that create CTEs and return results from the table expression.
Module 12: Using Set Operators
This module introduces how to use the set operators UNION, INTERSECT, and EXCEPT to compare rows between two input sets.
Lessons
• Writing Queries with the UNION operator
• Using EXCEPT and INTERSECT
• Using APPLY
Lab: Using Set Operators
• Writing Queries That Use UNION Set Operators and UNION ALL
• Writing Queries That Use CROSS APPLY and OUTER APPLY Operators
• Writing Queries That Use the EXCEPT and INTERSECT Operators
After completing this module, students will be able to:
• Write queries that use UNION to combine input sets.
• Write queries that use UNION ALL to combine input sets
• Write queries that use the EXCEPT operator to return only rows in one set but not another.
• Write queries that use the INTERSECT operator to return only rows that are present in both sets
• Write queries using the CROSS APPLY operator.
• Write queries using the OUTER APPLY operator
Module 13: Using Windows Ranking, Offset, and Aggregate Functions
This module describes the benefits to using window functions. Restrict window functions to rows defined in an OVER clause, including partitions and frames. Write queries that use window functions to operate on a window of rows and return ranking, aggregation, and offset comparison results.
Lessons
• Creating Windows with OVER
• Exploring Window Functions
Lab: Using Windows Ranking, Offset, and Aggregate Functions
• Writing Queries that use Ranking Functions
• Writing Queries that use Offset Functions
• Writing Queries that use Window Aggregate Functions
After completing this module, students will be able to:
• Describe the T-SQL components used to define windows, and the relationships between them.
• Write queries that use the OVER clause, with partitioning, ordering, and framing to define windows
• Write queries that use window aggregate functions.
• Write queries that use window ranking functions.
• Write queries that use window offset functions
Module 14: Pivoting and Grouping Sets
This module describes write queries that pivot and unpivot result sets. Write queries that specify multiple groupings with grouping sets
Lessons
• Writing Queries with PIVOT and UNPIVOT
• Working with Grouping Sets
Lab: Pivoting and Grouping Sets
• Writing Queries that use the PIVOT Operator
• Writing Queries that use the UNPIVOT Operator
• Writing Queries that use the GROUPING SETS CUBE and ROLLUP Subclauses
After completing this module, students will be able to:
• Describe how pivoting data can be used in T-SQL queries.
• Write queries that pivot data from rows to columns using the PIVOT operator.
• Write queries that unpivot data from columns back to rows using the UNPIVOT operator.
• Write queries using the GROUPING SETS subclause.
• Write queries that use ROLLUP AND CUBE.
• Write queries that use the GROUPING_ID function.
Module 15: Executing Stored Procedures
This module describes how to return results by executing stored procedures. Pass parameters to procedures. Create simple stored procedures that encapsulate a SELECT statement. Construct and execute dynamic SQL with EXEC and sp_executesql.
Lessons
• Querying Data with Stored Procedures
• Passing Parameters to Stored procedures
• Creating Simple Stored Procedures
• Working with Dynamic SQL
Lab: Executing Stored Procedures
• Using the EXECUTE statement to Invoke Stored Procedures
• Passing Parameters to Stored procedures
• Executing System Stored Procedures
After completing this module, students will be able to:
• Describe stored procedures and their use.
• Write T-SQL statements that execute stored procedures to return data.
• Write EXECUTE statements that pass input parameters to stored procedures.
• Write T-SQL batches that prepare output parameters and execute stored procedures.
• Use the CREATE PROCEDURE statement to write a stored procedure.
• Create a stored procedure that accepts input parameters.
• Describe how T-SQL can be dynamically constructed.
• Write queries that use dynamic SQL.
Module 16: Programming with T-SQL
This module describes how to enhance your T-SQL code with programming elements.
Lessons
• T-SQL Programming Elements
• Controlling Program Flow
Lab: Programming with T-SQL
• Declaring Variables and Delimiting Batches
• Using Control-Of-Flow Elements
• Using Variables in a Dynamic SQL Statement
• Using Synonyms
After completing this module, students will be able to:
• Describe how Microsoft SQL Server treats collections of statements as batches.
• Create and submit batches of T-SQL code for execution by SQL Server.
• Describe how SQL Server stores temporary objects as variables.
• Write code that declares and assigns variables.
• Create and invoke synonyms
• Describe the control-of-flow elements in T-SQL.
• Write T-SQL code using IF...ELSE blocks.
• Write T-SQL code that uses WHILE.
Module 17: Implementing Error Handling
This module introduces error handling for T-SQL.
Lessons
• Implementing T-SQL error handling
• Implementing structured exception handling
Lab: Implementing Error Handling
• Redirecting errors with TRY/CATCH
• Using THROW to pass an error message back to a client
After completing this module, students will be able to:
• Implement T-SQL error handling.
• Implement structured exception handling.
Module 18: Implementing Transactions
This module describes how to implement transactions.
Lessons
• Transactions and the database engines
• Controlling transactions
Lab: Implementing Transactions
• Controlling transactions with BEGIN, COMMIT, and ROLLBACK
• Adding error handling to a CATCH block
After completing this module, students will be able to:
• Describe transactions and the differences between batches and transactions.
• Describe batches and how they are handled by SQL Server.
• Create and manage transactions with transaction control language (TCL) statements.
• Use SET XACT_ABORT to define SQL Servers handling of transactions outside TRY/CATCH blocks.
Prerequisites
• Basic knowledge of the Microsoft Windows operating system and its core functionality.
• Working knowledge of relational databases.
Este treinamento é composto pelos seguintes cursos:
1. Course AZ-100T01-A: Managing Subscriptions and Resources (Carga: 8h)
2. Course AZ-100T02-A: Implementing and Managing Storage (Carga: 8h)
3. Course AZ-100T03-A: Deploying and Managing Virtual Machines (Carga: 8h)
4. Course AZ-100T04-A: Configure and Manage Virtual Networks (Carga: 8h)
5. Course AZ-100T05-A: Manage Identities (Carga: 8h)
_____________________________________
Segue abaixo a descrição dos cursos:
1. Course AZ-100T01-A: Managing Subscriptions and Resources
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
This course teaches IT Professionals how to manage their Azure subscriptions, including access, policies, and compliance, as well as how to track and estimate service usage and related costs. Students also learn how cloud resources are managed in Azure through user and group accounts. Students learn how to grant appropriate access to Azure AD users, groups, and services through Role-based access control (RBAC). Students also discover the core monitoring tools and capabilities provided by Azure, including Azure Alerts and Activity Log. Students are then introduced to Log Analytics as a broad data analytics solution and use this service to query and analyze operational data. Students then learn about the Azure Resource Manager deployment model, and how to work with resources, resource groups and ARM templates.
Because this course is the first course in the series for the Azure Administrator exams, there is a considerable amount of foundational content that is covered here in order to prepare students for the remaining courses in the curriculum. So students are provided with a lesson that covers tips and tricks for working in the Azure portal, as well as an introduction to key tools used in the Azure environment, such as the Cloud Shell and Resource Explorer. Emphasis is laid on PowerShell and the command line interface (CLI) as important skills to acquire not only in preparation for the exam but for the job role itself.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient, they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Manage Azure subscriptions and billing and implement Azure policies.
• Implement access management with Azure users, groups, and role-based access control.
• Use Azure Monitor to configure Azure alerts and review the Azure Activity Log.
• Query and analyze Log Analytics data.
• Deploy resources with ARM templates and organize Azure resources.
• Optimize your use of Azure tools like the Azure portal, Azure PowerShell, Cloud Shell and the Azure CLI.
Course Outline
Module 1: Managing Azure Subscriptions
In this module, you’ll learn about the components that make up an Azure subscription and how management groups are used to organize subscriptions into containers to allow you to control organizational governance and policy management across subscriptions. As well as learning about the different available types of subscription, you’ll see how to apply tags to your Azure resources to logically organize them by categories.
Lessons
• Overview of Azure Subscriptions
• Billing
• Azure Policy
After completing this module, students will be able:
• Manage Azure subscriptions and billing and implement Azure policies.
Module 2: Access Management for Cloud Resources
In this module you will learn the basics of role-based access control as it applies to users and groups. Focus on the administrator role and how it used in Azure.
Lessons
• Azure Users and Groups
• Role-based Access Control
After completing this module, students will be able:
• Implement access management with Azure users, groups, and role-based access control.
Module 3: Monitoring and Diagnostics
In this module, you learn about the Azure Monitor and the many capabilities to ensure your Azure architecture is working correctly. Monitoring skills are explained in this first course and then demonstrated in the following courses. The two main elements explained in this module are Azure Alerts and Azure Activity Log.
Lessons
• Exploring Monitoring Capabilities in Azure
• Azure Alerts
• Azure Activity Log
After completing this module, students will be able:
• Use Azure Monitor to configure Azure alerts and review the Azure Activity Log.
Module 4: Log Analytics
In this module, you will focus on Log Analytics. Log Analytics provides a way for you to collect, analyze, and query all types of connected data. It is a very powerful tool.
Lessons
• Introduction to Log Analytics
• Querying and Analyzing Log Analytics Data
After completing this module, students will be able:
• Query and analyze Log Analytics data.
Module 5: Azure Resource Manager
In this module, you will learn about how resources are organized into resource groups and how ARM templates are used to deploy those resources. This module introduces the concepts and then they are applied in the other courses.
Lessons
• ARM templates
• Resource Groups
After completing this module, students will be able:
• Deploy resources with ARM templates and organize Azure resources.
Module 6: Azure Tips, Tricks, and Tools
This module is provided to help you get the most from your administrative tools. This include the Azure Portal, Cloud Shell, Azure CLI, Azure PowerShell, and Resource Explorer.
Lessons
• Azure Portal
• Azure Tools and Environment
After completing this module, students will be able:
• Optimize your use of Azure tools like the Azure portal, Azure PowerShell, Cloud Shell and the Azure CLI.
Module 7: Lab-Manage Azure Subscriptions and Resources
• This module is provided to give you hands-on experience with the information provided in the course.
Lab : Manage Azure Subscriptions and Resources
• Configure delegation of provisioning and management of Azure resources.
• Verify delegation by provisioning Azure resources.
After completing this module, students will be able to:
•
• Configure delegation of provisioning and management of Azure resources by using built-in Role-Based (RBAC) roles and built-in Azure policies.
• Verify delegation by provisioning Azure resources as a delegated admin and auditing provisioning events.
Prerequisites
Successful Cloud Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
2. Course AZ-100T02-A: Implementing and Managing Storage
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
Thiscourse teaches IT Professionals how to implement Azure storage solutions for a variety of scenarios. Students learn aboutthe different storage accounts and services as well as basic data replication concepts and available replication schemes. Students are also introduced to Storage Explorer as a convenient way to work with Azure storage data. Students also learn the types of storage and how to work with managed and custom disks.
Azure blob storage is how Azure stores unstructured data in the cloud, and students learn how to work with blobs and blob containers. They also learn how to use Azure Files to work with file shares that are accessed via the Server Message Block (SMB) protocol. In addition to blob storage, the course covers Table and Queue storage as storage options for structured data.
Students then learn how to secure and manage storage using Shared Access Signatures (SAS) and Azure Backup, using Recovery ServicesVault. Next, students learn how to use Azure File Sync to centralize an organization’s file Shares in Azure Files. Content Delivery Network (CDN) is used to store cached content on a distributed network of servers that are close to end users. Studentslearn how to optimize content delivery with Azure CDN, as wellas how to transfer large amounts of data using the Azure Import/Export service.
Lastly, students learn how to monitor Azure storage by configuring metrics and alerts and using the Activity Log. Students learn how to analyze usage trends, trace requests, and diagnose issues with a storage account.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient, they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Create Azure storage accounts for different data replication, pricing, and content scenarios.
• Implement virtual machine storage, blob storage, Azure files, and structured storage.
• Secure and manage storage with shared access keys, Azure backup, and Azure File Sync.
• Store and access data using Azure Content Delivery Network, and the Import and Export service.
• Monitor Azure storage with metrics and alerts, and the Activity Log.
Course Outline
Module 1: Overview of Azure Storage
In this module, you’ll learn about storage accounts – Standard and Premium – as well as storage endpoints and how to configure custom domain accounts. You’ll have an opportunity to practice creating and managing storage accounts. The module also covers data replication and provides a comparison of the different available replication schemes. You’ll be introduced to Azure Storage Explorer, a utility that lets you easily work with and manipulate Azure Storage data.
Lessons
• Azure storage accounts
• Data replication
• Azure Storage Explorer
After completing this module, students will be able to:
• Create Azure storage accounts for different data replication, pricing, and content scenarios.
Module 2: Storage Services
In this module, you’ll learn about the disks component of Azure Storage as it relates to virtual machines. Disks are how virtual machines store their VHD files. You will learn about the types of disks and storage and how Azure simplifies IaaS disk management by creating and managing the storage accounts associated with the virtual machine disks. You will also learn about how Azure blob storage stores unstructured data in the cloud as objects, or blobs (BLOB = binary large object). And you’ll explore Azure Files, which offers fully managed file shares in the cloud that are accessible via the Server Message Block (SMB) protocol. The other file storage options covered in the module are Tables and Queues for structured storage.
Lessons
• Virtual machine storage
• Blob storage
• Azure files
• Structured storage
After completing this module, students will be able to:
• Implement virtual machine storage, blob storage, Azure files, and structured storage.
Module 3: Securing and Managing Storage
In this module, discover how a shared access signature (SAS) can be used to provide delegated access to resources in storage accounts, allowing clients access to those resources with sharing the storage account keys. You’ll also learn how to use Azure backup as a cloud-based solution for an existing on-premises or off-site backup and data protection solution. This module also covers Azure File Sync as a way to centralize an organization’s file shares in Azure Files and using Windows Server to cache the Azure file share locally, thus enabling scenarios such as “lift and shift,” backup and disaster recovery, and file archiving.
Lessons
• Shared access keys
• Azure backup
• Azure File Sync
After completing this module, students will be able to:
•
• Secure and manage storage with shared access keys, Azure backup, and Azure File Sync.
Module 4: Storing and Accessing Data
In this module, you’ll learn about using a content delivery network (CDN) to deliver cached content that is stored on a distributed network of edge servers closer to end-users. You’ll also learn how to transfer large amount of data to and from the cloud using the Azure Import/Export service and Azure Data Box.
Lessons
• Azure Content Delivery Network
• Import and Export service
• Data Box
After completing this module, students will be able to:
• Store and access data using Azure Content Delivery Network, the Import and Export service, and Data Box.
Module 5: Monitoring Storage
In this module, you will learn techniques for monitoring the health of Azure storage. With metrics and alerts you can check a variety of performance metrics and send notifications to your system administrator team. With the Activity Log you can search and query for specific events, even across subscriptions.
Lessons
• Metrics and Alerts
• Activity Log
After completing this module, students will be able to:
• Monitor Azure storage with metrics and alerts, and the Activity Log.
Module 6: Lab-Implement and Manage Storage
This module is provided to give you hands-on experience with the information provided in the course.
Lab : Implement and Manage Storage
• Prepare the lab environment.
• Implement and use Azure Blob storage.
• Implement and use Azure File storage.
After completing this module, you will be able to:
• Implement and use Blob storage.
• Implement and use File storage.
Prerequisites
Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
3. Course AZ-100T03-A: Deploying and Managing Virtual Machines
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
This course teaches IT Professionals how to create and manage virtual machines as part of an Infrastructure as a Service (IaaS) computing infrastructure. Students learn how to assess their on-premises environment for virtual machine readiness in preparation for moving resources to the cloud, including sizing, pricing, and design considerations.
Students also learn how to create and deploy virtual machines in Azure, using the Azure portal, PowerShell, and ARM templates. The course includes instruction on deploying custom images and Linux virtual machines. Students also learn how to configure the networking and storage components of virtual machines. Deploying highly available virtual machines is critical in the light of planned and unplanned events, and students learn how to use availability sets to ensure that virtual machine resources are available during downtime. Students also learn how to use extensions and Desired State Configuration (DSC) for post deployment automation and configuration tasks.
Finally, students learn how to perform virtual machine backups, and to use Azure’s monitoring capabilities to collect, view, and analyze virtual machine diagnostic and log data.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient, they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Explain virtual machine usage cases, storage options, pricing, operating systems, networking capabilities, and general planning considerations.
• Create Windows virtual machines in the Azure Portal, with Azure PowerShell, or using ARM Templates.
• Deploy custom server images and Linux virtual machines.
• Configure virtual machine networking and storage options.
• Implement virtual machine high availability, scalability, and custom scripts extensions.
• Backup, restore, and monitor virtual machines.
Course Outline
Module 1: Overview of Azure Machines
In this module, you’ll will be introduced to Azure virtual machines. What are virtual machines and what operating systems are supported? How can you determine if your existing virtual machines can be supported in Azure? What pricing and sizing options are available?
Lessons
• Azure Virtual Machines Overview
• Planning Considerations
After completing this module, students will be able to:
• Explain virtual machine usage cases, storage options, pricing, operating systems, networking capabilities, and general planning considerations.
Module 2: Creating Virtual Machines
In this module, you will learn how to create and configure Windows virtual machines. You will practice in the Azure portal, in Azure PowerShell, and with ARM templates.
Lessons
• Overview of the Virtual Machine Creation Overview
• Creating Virtual Machines in the Azure Portal
• Creating Virtual Machines (PowerShell)
• Creating Virtual Machines using ARM Templates
After completing this module, students will be able to:
• Create Windows virtual machines in the Azure Portal, with Azure PowerShell, or using ARM Templates.
Module 3: Deploying Virtual Machine Images
In this module, you will learn how to create custom virtual machines in Azure. For example, deploying a server image that is in your on-premises datacenter. You will also learn how to create and connect to Linux virtual machines.
Lessons
• Deploying Custom Images
• Deploying Linux Virtual Machines
After completing this module, students will be able to:
• Deploy custom server images and Linux virtual machines.
Module 4: Configuring Virtual Machines
In this module, you will learn about the two main configuration areas for virtual machines: networking and storage. In the networking lesson, we will cover IP addressing, network interfaces, and network security groups. In the storage lesson, we will cover virtual machine disks, managed disks, attaching/detaching disks, and uploading disks.
Lessons
• Overview of Virtual Machine Configuration
• Virtual Machine Networking
• Virtual Machine Storage
After completing this module, students will be able to:
• Configure virtual machine networking and storage options.
Module 5: Configuring Availability and Extensibility
In this module, you will learn how to keep your virtual machines highly available with update and fault domains, and availability sets. You will also learn how to use scale sets to increase and decrease the number of the virtual machines as the workload changes. Lastly, virtual machines can be extended through custom scripts and Desired State Configuration.
Lessons
• Virtual Machine Availability
• Virtual Machine Scalability
• Applying Virtual Machine Extensions
After completing this module, students will be able to:
• Implement virtual machine high availability, scalability, and custom scripts extensions.
Module 6: Managing and Monitoring Virtual Machines
In this module, you will learn the very important tasks of backing up your virtual machines and monitoring their overall health. You will practice backing up and restoring virtual machines. You will learn about monitoring, diagnostics, and Azure Advisor.
Lessons
• Backup and Restore
• Monitoring Virtual Machines
After completing this module, students will be able to:
• Backup, restore, and monitor virtual machines.
Module 7: Lab - Deploy and Manage Virtual Machines
This module is provided to give you hands-on experience with the information provided in the course.
Lab : Deploy and Manage Virtual Machines
• Deploy virtual machines.
• Configure networking setting for virtual machines.
• Configure Azure virtual machine scale sets.
After completing this module, you will be able to:
• Deploy Azure VMs by using the Azure portal, Azure PowerShell, and Azure Resource Manager templates.
• Configure networking settings of Azure VMs running Windows and Linux operating systems.
• Deploy and configure Azure VM scale sets.
Prerequisites
Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
4. Course AZ-100T04-A: Configure and Manage Virtual Networks
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
This course teaches IT Professional how to configure and manage Azure virtual networks (VNets). The benefits of moving an infrastructure to the cloud, removing the need to maintain expensive datacenters are an appealing proposition for many small and medium-sized companies. Regardless, once resources are moved to Azure, they require the same networking functionality as an on-premises deployment, and this course deals with the basic network configuration tasks.
Students review the basis of IP addressing, with specific emphasis on how public and private IP addressing works in the cloud. Students learn how to configure network routing and how to implement Azure DNS.
Securing the network infrastructure is of key importance and students learn how to use Network Security Groups (NSGs) to limit network traffic to resources in a virtual network, by creating security rules that allow or deny inbound or outbound traffic. Students also learn how to use NSG logging to diagnose and troubleshoot network connectivity problems.
The course also covers different connectivity scenarios for Azure virtual networks and students learn how to connect virtual networks with VNet-to-VNet VPN gateways and virtual network peering.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient, they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Understand virtual networking components, IP addressing, and network routing options.
• Implement Azure DNS domains, zones, record types, and resolution methods.
• Configure network security groups, service endpoints, logging, and network troubleshooting.
• Implement site connectivity schemas including VNet-to-VNet connections and virtual network peering.
Course Outline
Module 1: Azure Virtual Networks
In this module, you’ll will be introduced to Azure virtual networks. What are virtual networks and how are they organized? How do you create and configure virtual networks with templates, PowerShell, CLI, or the Azure portal? What is the difference between public, private, static, and dynamic IP addressing? How are system routes, routing tables, and routing algorithms used?
Lessons
• Introducing Virtual Networks
• Creating Azure Virtual Networks
• Review of IP Addressing
• Network Routing
After completing this module, students will be able to:
• Understand virtual networking components, IP addressing, and network routing options.
Module 2: Azure DNS
In this module, you will learn about DNS basics and specifically implementing Azure DNS. In the DNS Basics lesson you will review DNS domains, zones, record types, and resolution methods. In the Azure DNS lesson, we will cover delegation, metrics, alerts, and DNS hosting schemes.
Lessons
• Azure DNS Basics
• Implementing Azure DNS
After completing this module, students will be able to:
• Implement Azure DNS domains, zones, record types, and resolution methods.
Module 3: Securing Virtual Network Resources
In this module, you will learn primarily about Network Security Groups (NSGs) including NSG rules and NSG scenarios. You will also learn how to implement NSGs considering service endpoints, logging, troubleshooting, and other network traffic.
Lessons
• Introduction to Network Security Groups
• Implementing Network Security Groups and Service Endpoints
After completing this module, students will be able to:
• Configure network security groups, service endpoints, logging, and network troubleshooting.
Module 4: Connecting Virtual Networks
In this module, you will learn about two specific types of intersite connectivity: VNet-to-VNet connections and VNet Peering. In both cases, you will learn when to choose which connectivity method, and how to implement and configure the method.
Lessons
• Intersite Connectivity (VNet-to-VNet Connections)
• Virtual Network Peering
After completing this module, students will be able to:
• Implement site connectivity schemas including VNet-to-VNet connections and virtual network peering.
Module 5: Lab - Configure and Manage Virtual Networks
This module is provided to give you hands-on experience with the information provided in the course.
Lab : Configure and Manage Virtual Networks
• Prepare the lab environment.
• Configure VNet peering.
• Implement custom routing.
• Validating service chaining.
After completing this module, you will be able to:
• Configure VNet peering.
• Implement custom routing.
• Validate service chaining.
Prerequisites
Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
5. Course AZ-100T05-A: Manage Identities
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
This course teaches IT Professional how to use Azure Active Directory (AD) to provide employees and customers with a multi-tenant cloud-based directory and identity management system. Students will learn the differences between Azure AD and Active Directory Domain Services (AD DS), as well the differences in functionality offered by the different editions of Azure AD. Students also learn how to configure self-service password reset, or to use the option of password writeback to reset user passwords regardless of their location. Students are then introduced to Azure AD Identity Protection and learn how they can use it to protect their organizations from compromised accounts, identity attacks, and configuration issues. Students also learn how to integrate Azure AD with the many Software as a Service (SaaS) applications that are used, in order to secure user access to those applications.
Next, the concepts of Azure domains and tenants, and users and groups are explained and students learn how to work with the various Azure AD objects. Students are introduced to Azure role-based access control to be able to provide a more granular access based on the principle of least privilege. An administrator, or user, can do exactly the task they need to accomplish; no more, no less. Students also learn how to work with Azure joined devices and Hybrid AD joined devices, enabling their users to be productive wherever and whenever – but ensuring that corporate assets are protected and that devices meet security and compliance standards.
Students learn how to use Azure AD Connect to integrate their on-premises directories with Azure AD, providing a common identity for their users of Office 365, Azure, and SaaS applications integrated with Azure AD. Lastly, students also learn how to use Azure AD Application Proxy to be able to provide their users with remote access to web application that are published on-premises, such as SharePoint sites, Outlook Web Access, or any other line of business (LOB) applications the organization has.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Implement Azure Active Directory, Self-Service Password Reset, Azure AD Identity Protection, and integrated SaaS applications.
• Configure domains and tenants, users and groups, roles, and devices.
• Implement and manage Azure Active Directory integration options and Azure AD Application Proxy.
Course Outline
Module 1: Managing Azure Active Directory
In this module, you’ll will be introduced to Azure Active Directory. What is Azure Active Directory and how is it different from Active Directory Domain Services? What is Self-Service Password Reset and how is it configured? How can Azure AD Identity protection improve your security posture. How do you integrate SaaS applications with Azure AD?
Lessons
• Azure Active Directory Overview
• Self-Service Password Reset
• Azure AD Identity Protection
• Integrating SaaS Applications with Azure AD
After completing this module, students will be able to:
• Implement Azure Active Directory, Self-Service Password Reset, Azure AD Identity Protection, and integrated SaaS applications.
Module 2: Managing Azure Active Directory Objects
In this module, you will learn the basics of implementing Azure AD objects. These objects include domains and tenants, users and groups, roles, and devices. In each lesson you will practice how to configure these objects through the portal and with Azure PowerShell. The Azure roles lesson will be your introduction to role-based access control.
Lessons
• Azure Domains and Tenants
• Azure Users and Groups
• Azure Roles
• Managing Devices
After completing this module, students will be able to:
• Configure domains and tenants, users and groups, roles, and devices.
Module 3: Implementing and Managing Hybrid Identities
In this module, you will learn how to integrate Active Directory with your existing infrastructure. You will learn about different authentication options like AD Connect, Single Sign On, and Pass-through authentication. You will also learn how to configure Azure AD Application Proxy and how it is used.
Lessons
• Azure Active Directory Integration Options
• Azure AD Application Proxy
After completing this module, students will be able to:
• Implement and manage Azure Active Directory integration options and Azure AD Application Proxy.
Module 4: Lab - Implement and Manage Hybrid Identities
This module is provided to give you hands-on experience with the information provided in the course.
Lab : Implement and Manage Hybrid Identities
• Deploy a VM with an AD domain controller
• Create and configure an Azure AD tenant
• Synchronize an AD forest with an Azure AD tenant
After completing this module, you will be able to:
• Deploy an Azure VM hosting an Active Directory domain controller.
• Create and configure an Azure Active Directory tenant.
• Synchronize Active Directory forest with an Azure Active Directory tenant.
Prerequisites
Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
Overview
Type: Course
Audience(s): Developer
Technology: Cross-Platform Development
Level: Advanced
This Revision: D
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
In this course, students will learn how to design and develop services that access local and remote data from various sources. Students will also learn how to develop and deploy services to hybrid environments, including on-premises servers and Microsoft Azure.
Audience profile
Primary: .NET developers who want to learn how to develop services and deploy them to hybrid environments.
Secondary: .NET developers with Web application development experience who are exploring developing new applications or porting existing applications to Microsoft Azure.
At course completion
After completing this course, students will be able to:
• Describe the basic concepts of service development and data access strategies using the .NET platform.
• Describe the Microsoft Azure cloud platform and its compute, data, and application hosting offerings.
• Design and develop a data-centric application using Visual Studio 2017 and Entity Framework Core.
• Design, implement, and consume HTTP services using ASP.NET Core.
• Extend HTTP services using ASP.NET Core.
• Host services on-premises and in Microsoft Azure.
• Deploy services to both on-premises and cloud environments and manage the interface and policy for their services.
• Choose a data storage solution, cache, distribute, and synchronize data.
• Monitor, log, and troubleshoot services.
• Describe claim-based identity concepts and standards, and implement authentication and authorization with Azure Active Directory.
• Create scalable service applications.
Course Outline
Module 1: Overview of service and cloud technologies
This module provides an overview of service and cloud technologies using the Microsoft .NET Core and the Azure. The first lesson, “Key Components of Distributed Applications,” discusses characteristics that are common to distributed systems, regardless of the technologies they use. Lesson 2, “Data and Data Access Technologies” describes how data is used in distributed applications. Lesson 3, “Service Technologies,” discusses two of the most common protocols in distributed system and the .NET Core technologies used to develop services based on those protocols. Lesson 4, “Cloud Computing,” describes cloud computing and how it is implemented in Azure.
Lessons
• Key Components of Distributed Applications
• Data and Data Access Technologies
• Service Technologies
• Cloud Computing
• Manipulating Data
Lab : Exploring the Work Environment
• Creating an ASP.NET Core project
• Create a simple Entity Framework model
• Create a web API class
• Deploy the web application to Azure
After completing this module, students will be able to:
• Explain services architecture and hosting environments
• Explain cloud computing and the Microsoft Azure cloud platform
• Explain data access strategies
Module 2: Querying and Manipulating Data Using Entity Framework
In this module, you will learn about the Entity Framework data model, and about how to create, read, update, and delete data. Entity Framework is a rich object-relational mapper, which provides a convenient and powerful application programming interface (API) to manipulate data. This module focuses on the Code First approach with Entity Framework.
Lessons
• ADO.NET Overview
• Creating an Entity Data Model
• Querying Data
Lab : Creating a Data Access Layer using Entity Framework
• Creating a data model
• Query the Database
Lab : Manipulating Data
• Create repository methods
• Test the model using SQL Server and SQLite
After completing this module, students will be able to:
• Describe basic objects in ADO.NET and explain how asynchronous operations work.
• Create an Entity Framework Core data model.
• Query data by using Entity Framework Core.
• Insert, delete, and update entities by using Entity Framework Core.
Module 3: Creating and Consuming ASP.NET Core Web APIs
ASP.NET Core Web API provides a robust and modern framework for creating Hypertext Transfer Protocol (HTTP)-based services. In this module, you will be introduced to the HTTP-based services. You will learn how HTTP works and become familiar with HTTP messages, HTTP methods, status codes, and headers. You will also be introduced to the Representational State Transfer (REST) architectural style and hypermedia. You will learn how to create HTTP-based services by using ASP.NET Core Web API. You will also learn how to consume them from various clients. After Lesson 3, in the lab "Creating an ASP.NET Core Web APIs", you will create a web API and consume it from a client.
Lessons
• HTTP Services
• Creating an ASP.NET Core Web API
• Consuming ASP.NET Core Web APIs
• Handling HTTP Requests and Responses
• Automatically Generating HTTP Requests and Responses
Lab : Creating an ASP.NET Core Web API
• Create a controller class
• Use the API from a browser
• Create a client
After completing this module, students will be able to:
• Design services by using the HTTP protocol.
• Create services by using ASP.NET Core Web API.
• Use the HttpRequest/IActionResult classes to control HTTP messages.
• Consume ASP.NET Web API services.
Module 4: Extending ASP.NET Core HTTP Services
ASP.NET Core Web API provides a complete solution for building HTTP services, but services often have various needs and dependencies. In many cases, you will need to extend or customize the way ASP.NET Core Web API executes your service. Handling needs such as applying error handling and logging integrate with other components of your application and supporting other standards that are available in the HTTP world. Understanding the way ASP.NET Core Web API works is important when you extend ASP.NET Core Web API. The division of responsibilities between components and the order of execution are important when intervening with the way ASP.NET Core Web API executes. Finally, with ASP.NET Core Web API, you can also extend the way you interact with other parts of your system. With the dependency resolver mechanism, you can control how instances of your service are created, giving you complete control on managing dependencies of the services.
Lessons
• The ASP.NET Core Request Pipeline
• Customizing Controllers and Actions
• Injecting Dependencies into Controllers
Lab : Customizing the ASP.NET Core Pipeline
• Use Dependency Injection to Get a Repository Object
• Create a Cache Filter
• Create a Debugging Middleware
After completing this module, students will be able to:
• Extend the ASP.NET Web API request and response pipeline.
• Customize Controllers and Actions.
• Inject dependencies into ASP.NET Web API controllers.
Module 5: Hosting Services On-Premises and in Azure
In this module you will learn how to host your application on-premises and on Azure. You will also learn about Docker containers, and writing serverless applications with Azure functions.
Lessons
• Hosting Services on-premises
• Hosting Services in Azure App Service
• Packaging Services in Containers
• Implementing Serverless Services
Lab : Host an ASP.NET Core service in a Windows Service
• Creating a new ASP.NET Core Application
• Registering the Windows Service
Lab : Host an ASP.NET Core Web API in an Azure Web App
• Create a Web App in the Azure portal
• Deploy an ASP.NET Core Web API to the Web App
Lab : Host an ASP.NET Core service in Azure Container Instances
• Publish the service to a Docker container
• Host the service in Azure Container Instances
Lab : Implement an Azure Function
• Develop the service locally
• Deploy the service to Azure Functions
After completing this module, students will be able:
• Host services on-premises by using Windows services and Microsoft Internet Information Services (IIS).
• Host services in the Azure cloud environment by using Web Apps, Docker containers, and Azure Functions.
• Package services in containers.
• Implement serverless services.
Module 6: Deploying and Managing Services
In this module, you will learn about Web Deploy and how to deploy web applications by using Web Deploy in Visual Studio. You will also learn how to define continuous integration and continuous delivery pipelines and how to use Azure API Management and OpenAPI to provide robust, secure, and reliable APIs to your customers.
Lessons
• Web Deployment with Visual Studio 2017
• Continuous Delivery with Visual Studio Team Services
• Deploying Applications to Staging and Production Environments
• Defining Service Interfaces with Azure API Management
Lab : Deploying an ASP.NET Core web service on Linux
• Publish the ASP.NET Core web service for Linux
• Configure Nginx as a reverse proxy
Lab : Deploying to Staging and Production
• Deploy the application to production
• Create a staging slot
• Swap the Environments
Lab : Publishing a Web API with Azure API Management
• Creating an Azure API Management instance
• Testing and managing the API
After completing this module, students will be able to:
• Explain Microsoft Internet Information Services (IIS) Web Deploy.
• Explain Azure Web Apps deployment by using a Microsoft Visual Studio Team Services build pipeline.
• Explain how to deploy web services to Azure Container Instances.
• Explain how to define service interfaces by using API Management and Swagger.
• Explain how to define policies by using API Management.
• Explain defining service interfaces using Azure API Management and Swagger
Module 7: Implementing Data Storage in Azure
This module explains how to store and access data stored in Azure Storage. It also explains how to configure storage access rights for storage containers and content.
Lessons
• Choosing a Data Storage Mechanism
• Accessing Data in Azure Storage
• Working with Structured Data in Azure
• Geographically Distributing Data with Azure CDN
• Scaling with Out-of-Process Cache
Lab : Storing Files in Azure Storage
• Store publicly accessible files in Azure Blobs
• Generate and store private files in Azure Blobs
Lab : Querying Graph Data with CosmosDB
• Create the CosmosDB graph database
• Query the CosmosDB database
Lab : Caching out-of-process with Azure Redis cache
• Create the Azure Redis Cache service
• Access the cache service from code
• Test the application
After completing this module, students will be able to:
• Describe the architecture of Storage.
• Control access to your Storage items.
• Cache data using Azure Cache for Redis.
• Distribute data by using Microsoft Azure Content Delivery Network.
Module 8: Diagnostics and Monitoring
This module explains how to monitor and log services, both on-premises and in Azure.
Lessons
• Logging in ASP.NET Core
• Diagnostic Tools
• Application Insights
Lab : Monitoring ASP.NET Core with ETW and LTTng
• Collect and view ETW events
• Collect and view LTTng events
Lab : Monitoring Azure Web Apps with Application Insights
• Add the Application Insights SDK
• Load test the web service
• Analyze the performance results
After completing this module, students will be able to:
• Explain trace listeners
• Explain performance counters
• Explain ETW and LTTng events
• Demonstrate using App Insights to monitor services
Module 9: Securing services on-premises and in Microsoft Azure
This module describes claim-based identity concepts and standards, and how to implement authentication and authorization by using Azure Active Directory to secure an ASP.NET Core Web API service.
Lessons
• Explaining Security Terminology
• Securing Services with ASP.NET Core Identity
• Securing Services with Azure Active Directory
Lab : Using ASP.NET Core Identity
• Add ASP.NET Core Identity middleware
• Add authorization code
• Run a client application to test the server
Lab : Using Azure Active Directory with ASP.NET Core
• Authenticate a client application using AAD B2C and MSAL.js
Module 10: Scaling Services
This module explains how to create scalable services and applications and scale them automatically using Web Apps load balancers, Azure Application Gateway and Azure Traffic Manager.
Lessons
• Introduction to Scalability
• Automatic Scaling
• Azure Application Gateway and Traffic Manager
Lab : Load Balancing Azure Web Apps
• Prepare the application for load-balancing
• Test the load balancing with instance affinity
• Test the load balancing without affinity
Lab : Load Balancing with Azure Traffic Manager
• Deploy an Azure Web App to multiple regions
• Create an Azure Traffic Manager profile
After completing this module, students will be able to:
• Explain the need for scalability.
• Describe how to use load balancing for scaling services.
• Explain Azure Load Balancer, Azure Application Gateway, and Azure Traffic Manager.
Prerequisites
Before attending this course, students must have:
• Experience with C# programming, and concepts such as lambda expressions, LINQ, and anonymous types
• Understanding the concepts of n-tier applications
• Experience with querying and manipulating data with ADO.NET
Overview
Audience(s): Information Workers
Technology: SQL Server
Level: Advanced
This Revision: B
Delivery method: Classroom
Length: 3 days
Language(s): English
About this course
The main purpose of the course is to give students a good understanding of data analysis with Power BI. The course includes creating visualizations, the Power BI Service, and the Power BI Mobile App.
Audience profile
The course will likely be attended by SQL Server report creators who are interested in alternative methods of presenting data.
At course completion
After completing this course, students will be able to:
• Perform Power BI desktop data transformation.
• Describe Power BI desktop modelling.
• Create a Power BI desktop visualization.
• Implement the Power BI service.
• Describe how to connect to Excel data.
• Describe how to collaborate with Power BI data.
• Connect directly to data stores.
• Describe the Power BI developer API.
• Describe the Power BI mobile app.
Course Outline
Module 1: Introduction to Self-Service BI Solutions
Introduces business intelligence (BI) and how to self-serve with BI.
Lessons
• Introduction to business intelligence
• Introduction to data analysis
• Introduction to data visualization
• Overview of self-service BI
• Considerations for self-service BI
• Microsoft tools for self-service BI
Lab: Exploring an Enterprise BI solution
• Viewing reports
• Creating a Power BI report
• Creating a Power BI dashboard
After completing this module, students will be able to:
• Describe the trends in BI
• Describe the process of data analysis in Power BI.
• Use the key visualizations in Power BI.
• Describe the rationale for self-service BI.
• Describe considerations for self-service BI.
• Understand how you can use Microsoft products to implement a BI solution.
Module 2: Introducing Power BI
This module introduces Power BI desktop, and explores the features that enable the rapid creation and publication of sophisticated data visualizations.
Lessons
• Power BI
• The Power BI service
Lab: Creating a Power BI dashboard
• Connecting to Power BI data
• Create a Power BI dashboard
After completing this module, students will be able to:
• Develop reports using the Power BI Desktop app.
• Use report items to create dashboards on the Power BI portal.
• Understand the components of the Power BI service including licensing and tenant management.
Module 3: Power BI
At the end of this module students will be able to explain the rationale and advantages of using Power BI.
Lessons
• Using Excel as a data source for Power BI
• The Power BI data model
• Using databases as a data source for Power BI
• The Power BI service
Lab: Importing data into Power BI
• Importing Excel files into Power BI
• Viewing reports from Excel files
After completing this module, students will be able to:
• Describe the data model and know how to optimize data within the model.
• Connect to Excel files and import data
• Use on-premises and cloud Microsoft SQL Server databases as a data source, along with the R script data connector
• Take advantage of the features of the Power BI service by using Q&A to ask questions in natural query language, and create content packs and groups.
Module 4: Shaping and Combining Data
With Power BI desktop you can shape and combine data with powerful, buil-in tools. This module introduces the tools that are available for preparing your data, and transforming it into a form ready for reporting.
Lessons
• Power BI desktop queries
• Shaping data
• Combining data
Lab: Shaping and combining data
• Shape power BI data
• Combine Power BI data
After completing this module, students will be able to:
• Perform a range of query editing skills in Power BI
• Shape data, using formatting and transformations.
• Combine data together from tables in your dataset.
Module 5: Modeling data
This module describes how to shape and enhance data.
Lessons
• Relationships
• DAX queries
• Calculations and measures
Lab: Modeling Data
• Create relationships
• Calculations
After completing this module, students will be able to:
• Describe relationships between data tables.
• Understand the DAX syntax, and use DAX functions to enhance your dataset.
• Create calculated columns, calculated tables and measures.
Module 6: Interactive Data Visualizations
This module describes how to create and manage interactive data visualizations.
Lessons
• Creating Power BI reports
• Managing a Power BI solution
Lab: Creating a Power BI report
• Connecting to Power BI data
• Building Power BI reports
• Creating a Power BI dashboard
After completing this module, students will be able to:
• Use Power Bi desktop to create interactive data visualizations.
• Manage a power BI solution.
Module 7: Direct Connectivity
This module describes various connectivity options using Power BI.
Lessons
• Cloud data
• Connecting to analysis services
Lab: Direct Connectivity
• Direct connectivity from Power BI desktop
• Direct connectivity from the Power BI service
After completing this module, students will be able to:
• Use Power BI direct connectivity to access data in Azure SQL data warehouse, in addition to big data sources such as Hadoop
• Use Power BI with SQL Server Analysis Services data, including Analysis services modles running in multidimentional mode.
Module 8: The Developer API
This module describes the developer API within Power BI.
Lessons
• The developer API
• Custom visuals
Lab: Using the developer API
• Using custom visuals
After completing this module, students will be able to:
• Describe the developer API.
• Use the developer API to create custom visuals.
Module 9: Power BI mobile app
This module describes the Power BI mobile app.
Lessons
• Power BI mobile apps
• Using the Power BI mobile app
• Power BI embedded
After completing this module, students will be able to:
• Describe the Power BI mobile app.
• Download and use the Power BI mobile app.
• Describe Power BI embedded and when you would want to use it.
Prerequisites
Before attending this course, students must have:
• Excellent knowledge of relational databases and reporting.
• Some basic knowledge of data warehouse schema topology (including star and snowflake schemas).
• Some exposure to basic programming constructs (such as looping and branching).
• An awareness of key business priorities such as revenue, profitability, and financial accounting is desirable.
• Familiarity with Microsoft Office applications – particularly Excel.
Overview
Audience(s): IT Professionals
Technology: Windows Server
Level: Intermediate
This Revision: C
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This five-day course is designed primarily for IT professionals who have some experience with Windows Server. It is designed for professionals who will be responsible for managing storage and compute by using Windows Server 2016, and who need to understand the scenarios, requirements, and storage and compute options that are available and applicable to Windows Server 2016.
Audience profile
This course is intended for IT professionals who have some experience working with Windows Server, and who are looking for a single five-day course that covers storage and compute technologies in Windows Server 2016. This course will help them update their knowledge and skills related to storage and compute for Windows Server 2016.
Candidates suitable for this course would be:
•Windows Server administrators who are relatively new to Windows Server administration and related technologies, and who want to learn more about the storage and compute features in Windows Server 2016.
•IT professionals with general IT knowledge who are looking to gain knowledge about Windows Server especially around storage and compute technologies in Windows Server 2016.
The secondary audience for this course are IT professionals looking to take the Microsoft 70-740 certification exam, Installation, Storage and Compute with Windows Server 2016.
At course completion
After completing this course, students will be able to:
• Prepare and install Nano Server, a Server Core installation, and plan a server upgrade and migration strategy.
• Describe the various storage options, including partition table formats, basic and dynamic disks, file systems, virtual hard disks, and drive hardware, and explain how to manage disks and volumes.
• Describe enterprise storage solutions, and select the appropriate solution for a given situation.
• Implement and manage Storage Spaces and Data Deduplication.
• Install and configure Microsoft Hyper-V, and configure virtual machines.
• Deploy, configure, and manage Windows and Hyper-V containers.
• Describe the high availability and disaster recovery technologies in Windows Server 2016.
• Plan, create, and manage a failover cluster.
• Implement failover clustering for Hyper-V virtual machines.
• Configure a Network Load Balancing (NLB) cluster, and plan for an NLB implementation.
• Create and manage deployment images.
• Manage, monitor, and maintain virtual machine installations.
Course Outline
Module 1: Installing, upgrading, and migrating servers and workloads
This module describes the new features of Windows Server 2016, and explains how to prepare for and install Nano Server and Server Core. This module also describes how to plan a server upgrade and migration strategy, and explains how to perform a migration of server roles and workloads within and across domains. Finally, this module explains how to choose an activation model based on your environment characteristics.
Lessons
• Introducing Windows Server 2016
• Preparing and installing Server Core
• Preparing for upgrades and migrations
• Migrating server roles and workloads
• Windows Server activation models
Lab : Installing and configuring Server Core
• Installing Server Core
• Completing post-installation tasks on Windows Server 2016 Core
• Performing remote management
After completing this module, students will be able to:
• Describe the new features of Windows Server 2016.
• Prepare for and install Server Core.
• Plan a server upgrade and migration strategy.
• Perform a migration of server roles and workloads within a domain and across domains.
• Choose an appropriate activation model.
Module 2: Configuring local storage
This module explains how to manage disks and volumes in Windows Server 2016.
Lessons
• Managing disks in Windows Server
• Managing volumes in Windows Server
Lab : Configuring local storage
• Creating and managing volumes
• Resizing volumes
• Managing virtual hard disks
After completing this module, students will be able to:
• Manage disks in Windows Server.
• Manage volumes in Windows Server.
Module 3: Implementing enterprise storage solutions
This module discusses direct-attached storage (DAS), network-attached storage (NAS), and storage area networks (SANs). It also explains the purpose of Microsoft Internet Storage Name Service (iSNS) Server, data center bridging (DCB), and Multipath I/O (MPIO). Additionally, this module compares Fibre Channel, Internet Small Computer System Interface (iSCSI), and Fibre Channel over Ethernet (FCoE), and describes how to configure sharing in Windows Server 2016.
Lessons
• Overview of DAS, NAS, and SANs
• Comparing Fibre Channel, iSCSI, and Fibre Channel over Ethernet
• Understanding iSNS, DCB, and MPIO
• Configuring sharing in Windows Server 2016
Lab : Planning and configuring storage technologies and components
• Planning storage requirements
• Configuring iSCSI storage
• Configuring and managing the share infrastructure
After completing this module, students will be able to:
• Describe DAS, NAS, and SANs.
• Compare Fibre Channel, iSCSI, and FCoE.
• Explain the use of iSNS, DCB, and MPIO.
• Configure sharing in Windows Server.
Module 4: Implementing Storage Spaces and Data Deduplication
This module explains how to implement and manage Storage Spaces. This module also explains how to implement Data Deduplication.
Lessons
• Implementing Storage Spaces
• Managing Storage Spaces
• Implementing Data Deduplication
Lab : Implementing Storage Spaces
• Creating a Storage Space
Lab : Implementing Data Deduplication
• Installing Data Deduplication
• Configuring Data Deduplication
After completing this module, students will be able to:
• Describe and implement the Storage Spaces feature in the context of enterprise storage needs.
• Manage and maintain Storage Spaces.
• Describe and implement Data Deduplication.
Module 5: Installing and configuring Hyper-V and virtual machines
This module provides an overview of Hyper-V and virtualization. It explains how to install Hyper-V, and how to configure storage and networking on Hyper-V host servers. Additionally, it explains how to configure and manage Hyper-V virtual machines.
Lessons
• Overview of Hyper-V
• Installing Hyper-V
• Configuring storage on Hyper-V host servers
• Configuring networking on Hyper-V host servers
• Configuring Hyper-V virtual machines
• Managing virtual machines
Lab : Installing and configuring Hyper-V
• Verify installation of the Hyper-V server role
• Configuring Hyper-V networks
• Creating and configuring virtual machines
• Enable nested virtualization for a virtual machine
After completing this module, students will be able to:
• Describe Hyper-V and virtualization.
• Install Hyper-V.
• Configure storage on Hyper-V host servers.
• Configure networking on Hyper-V host servers.
• Configure Hyper-V virtual machines.
• Manage Hyper-V virtual machines.
Module 6: Deploying and managing Windows and Hyper-V containers
This module provides an overview of containers in Windows Server 2016. Additionally, this module explains how to deploy Windows Server and Hyper-V containers. It also explains how to install, configure, and manage containers by using Docker.
Lessons
• Overview of containers in Windows Server 2016
• Deploying Windows Server and Hyper-V containers
• Installing, configuring, and managing containers by using Docker
Lab : Installing and configuring containers
• Installing and configuring Windows Server containers by using Windows PowerShell
• Installing and configuring Windows Server containers by using Docker
After completing this module, students will be able to:
• Describe containers in Windows Server 2016.
• Explain how to deploy containers.
• Explain how to install, configure, and manage containers using Docker.
Module 7: Overview of high availability and disaster recovery
This module provides an overview of high availability and high availability with failover clustering in Windows Server 2016. It further explains how to plan high availability and disaster recovery solutions with Hyper-V virtual machines. Additionally, this module explains how to back up and restore the Windows Server 2016 operating system and data by using Windows Server Backup.
Lessons
• Defining levels of availability
• Planning high availability and disaster recovery solutions with Hyper-V virtual machines
• Backing up and restoring by using Windows Server Backup
• High availability with failover clustering in Windows Server 2016
Lab : Planning and implementing a high availability and disaster recovery solution
• Determining the appropriate high availability and disaster recovery solution
• Implementing storage migration
• Configuring Hyper-V replicas
After completing this module, students will be able to:
• Define levels of availability.
• Plan high availability and disaster recovery solutions with Hyper-V virtual machines.
• Back up and restore data by using Windows Server Backup.
• Describe high availability with failover clustering in Windows Server 2016.
Module 8: Implementing failover clustering
This module explains how to plan for failover clustering. It also explains how to create, manage, and troubleshoot a failover cluster.
Lessons
• Planning a failover cluster
• Creating and configuring a new failover cluster
• Maintaining a failover cluster
• Troubleshooting a failover cluster
• Implementing site high availability with stretch clustering
Lab : Implementing failover clustering
• Creating a failover cluster
• Verifying quorum settings and adding a node
Lab : Managing a failover cluster
• Evicting a node and verifying quorum settings
• Changing the quorum from disk witness to file-share witness, and defining node voting
• Verifying high availability
After completing this module, students will be able to:
• Plan for a failover-clustering implementation.
• Create and configure a failover cluster.
• Maintain a failover cluster.
• Troubleshoot a failover cluster.
• Implement high availability and stretch clustering for a site.
Module 9: Implementing failover clustering with Windows Server 2016 Hyper-V
This module describes how Hyper-V integrates with failover clustering. It also explains how to implement Hyper-V virtual machines (VMs) in failover clusters.
Lessons
• Overview of the integration of Hyper-V Server 2016 with failover clustering
• Implementing Hyper-V VMs on failover clusters
• Key features for VMs in a clustered environment
Lab : Implementing failover clustering with Windows Server 2016 Hyper-V
• Configure iSCSI storage
• Configuring a failover cluster for Hyper-V
• Configuring a highly available VM
After completing this module, students will be able to:
• Describe how Hyper-V integrates with failover clustering.
• Implement Hyper-V VMs on failover clusters.
• Describe the key features for VMs in a clustered environment.
Module 10: Implementing Network Load Balancing
This module provides an overview of NLB clusters. It also explains how to plan and configure an NLB cluster implementation.
Lessons
• Overview of NLB
• Configuring an NLB cluster
• Planning an NLB implementation
Lab : Implementing NLB
• Implementing a Network Load Balancing (NLB) cluster
• Configuring and managing the NLB cluster
• Validating high availability for the NLB cluster
After completing this module, students will be able to:
• Describe NLB.
• Configure an NLB cluster.
• Explain how to plan an NLB implementation.
Module 11: Creating and managing deployment images
This module provides an overview of the Windows Server 2016 image deployment process. It also explains how to create and manage deployment images by using the Microsoft Deployment Toolkit (MDT). Additionally, it describes different workloads in the virtual machine environment.
Lessons
• Introduction to deployment images
• Creating and managing deployment images by using MDT
• Virtual machine environments for different workloads
Lab : Using MDT to deploy Windows Server 2016
• Configuring MDT
• Creating and deploying an image
After completing this module, students will be able to:
• Describe the Windows Server 2016 image deployment process.
• Create and manage deployment images by using MDT.
• Describe the different workloads in the virtual machine environment.
Module 12: Managing, monitoring, and maintaining virtual machine installations
This module provides an overview on Windows Server Update Services (WSUS) and the requirements to implement WSUS. It explains how to manage the update process with WSUS. Additionally, this module provides an overview of Windows PowerShell Desired State Configuration (DSC) and Windows Server 2016 monitoring tools. Finally, this module describes how to use Performance Monitor, and how to manage event logs.
Lessons
• WSUS overview and deployment options
• Update management process with WSUS
• Overview of Windows PowerShell DSC
• Overview of Windows Server 2016 monitoring tools
• Using Performance Monitor
• Monitoring event logs
Lab : Implementing WSUS and deploying updates
• Implementing WSUS
• Configuring update settings
• Approving and deploying an update by using WSUS
Lab : Monitoring and troubleshooting Windows Server 2016
• Establishing a performance baseline
• Identifying the source of a performance problem
• Viewing and configuring centralized event logs
After completing this module, students will be able to:
• Describe the purpose of WSUS and the requirements to implement WSUS.
• Manage the update process with WSUS.
• Describe the purpose and benefits of Windows PowerShell DSC.
• Describe the monitoring tools available in Windows Server 2016.
• Use Performance Monitor.
• Manage event logs.
Prerequisites
Before attending this course, students must have:
• A basic understanding of networking fundamentals.
• An awareness and understanding of security best practices.
• An understanding of basic AD DS concepts.
• Basic knowledge of server hardware.
• Experience supporting and configuring Windows client operating systems such as Windows 8 or Windows 10.
Additionally, students would benefit from having some previous Windows Server operating system experience, such as experience as a Windows Server systems administrator.
Overview
Audience(s): IT Professionals
Technology: Microsoft System Center Configuration Manager
Level: Advanced
This Revision: A
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This five-day course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize System Center Endpoint Protection, manage compliance, and create management queries and reports. Additionally, this course, in conjunction with Microsoft Official Course 20703-2A, helps certification candidates prepare for Exam 70-703: Administering System Center Configuration Manager and Cloud Services Integration.
Audience profile
This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications.
This course also is for individuals who are interested in taking Exam 70-703: Administering System Center Configuration Manager and Cloud Services Integration. Courses 20703-1A and 20703-2A, or equivalent knowledge and skills, are necessary to prepare for this exam.
At course completion
After completing this course, students will be able to:
• Describe the features Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment.
• Analyze data by using queries and reports.
• Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Microsoft Exchange Server.
• Deploy and manage the Configuration Manager client.
• Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering.
• Identify and configure the most appropriate method to distribute and manage content used for deployments.
• Distribute, deploy, and monitor applications for managed users and systems.
• Maintain software updates for PCs that Configuration Manager manages.
• Implement Endpoint Protection for managed PCs.
• Manage configuration items, baselines, and profiles to assess and configure compliance settings and data access for users and devices.
• Configure an operating-system deployment strategy by using Configuration Manager.
• Manage and maintain a Configuration Manager site.
Course Outline
Module 1: Managing computers and mobile devices in the enterprise
This module describes the features of Configuration Manager that you can use to perform complex management tasks, including the following tasks: • Hardware and software inventory. • Application management. • Operating system deployment. • Settings management. • Software update management. • Remote client troubleshooting. • Protection from malware.
Lessons
• Overview of systems management by using enterprise management solutions
• Overview of the Configuration Manager architecture
• Overview of the Configuration Manager administrative tools
• Tools for monitoring and troubleshooting a Configuration Manager site
Lab : Exploring the Configuration Manager tools
• Searching in the Configuration Manager console
• Using Windows PowerShell with Configuration Manager
• Using Configuration Manager Service Manager to manage components
• Monitoring site and component status
• Reviewing log files by using the Configuration Manager Trace tool
• Explain how to use Configuration Manager to address the challenges of managing systems and users in today’s enterprise.
• Describe the Configuration Manager architecture.
• Describe the management tools that you use to perform administrative functions for Configuration Manager.
• Describe the tools that you use to monitor and troubleshoot a Configuration Manager site.
Module 2: Analyzing data using queries and reports
The Microsoft System Center Configuration Manager database stores a large amount of data about the resources in your environment. You might not always want to perform all management tasks on all resources simultaneously. Therefore, to help you locate devices or user objects in your environment that meet specific criteria, you can create queries. You then can use these queries to create collections or to find additional information about specific resources. This module describes queries and methods of creating and running them. In addition to queries, you can run reports to view various types of information related to your Configuration Manager environment. To run Configuration Manager reports, you must install and configure a reporting services point, which this module details.
Lessons
• Introduction to queries
• Configuring Microsoft SQL Server Reporting Services (SSRS)
Lab : Creating and running queriesConfiguring boundaries and resource discovery
• Creating data queries
• Creating subselect queries
• Creating status message queries
Lab : Configuring SSRS
• Configuring a reporting services point
• Creating a report by using Report Builder
• Create and configure data and status message queries.
• Configure and manage SSRS and the reporting services point.
Module 3: Preparing the management infrastructure to support PCs and mobile devices
This module explains how to prepare the management infrastructure, including configuring boundaries, boundary groups, and resource discovery. Additionally, it describes how Configuration Manager interacts with the Microsoft Exchange Server environment to discover and manage mobile devices.
Lessons
• Configuring site boundaries and boundary groups
• Configuring resource discovery
• Configuring the Exchange Server Connector for mobile device management
• Configuring user and device collections
Lab : Configuring boundaries and resource discovery
• Configuring boundaries, boundary groups, and fallback relationships
• Configuring Active Directory discovery methods
Lab : Configuring user and device collections
• Creating a device collection
• Creating a user collection
• Configuring a maintenance window
• Configure boundaries and boundary groups.
• Configure resource discovery.
• Configure the Exchange Server connector mobile device management.
• Organize resources using device and user collections.
Module 4: Deploying and managing clients
This module explains the supported operating systems and devices, the software requirements, and the different methods for installing the Configuration Manager client. This module also describes some of the default and custom client settings that you can configure. After installing the client software, you can configure the client settings to perform routine management tasks
.Lessons
• Overview of the Configuration Manager client
• Deploying the Configuration Manager client
• Configuring and monitoring client status
• Managing client settings in Configuration Manager
Lab : Deploying the Microsoft System Center Configuration Manager client software
• Preparing the site for client installation
• Deploying the Configuration Manager client software by using client push installation
Lab : Configuring and monitoring client status
• Configuring and monitoring client health status
Lab : Managing client settings
• Configuring client settings
• Describe the requirements and considerations for installing the Configuration Manager client software.
• Deploy the Configuration Manager client software.
• Configure and monitor client status.
• Manage Configuration Manager client settings.
Module 5: Managing inventory for PCs and applications
This module provides an overview of inventory collection, and explains how you can manage the information collected. You also will learn about the process of collecting hardware and software inventory, initiating inventory cycles, and initiating and securing inventory collection. This module also covers the use of software metering to monitor program usage, and the configuration and management of Asset Intelligence.
Lessons
• Overview of inventory collection
• Configuring hardware and software inventory
• Managing inventory collection
• Configuring software metering
• Configuring and managing Asset Intelligence
Lab : Configuring and managing inventory collection
• Configuring and managing hardware inventory
Lab : Configuring software metering
• Configuring software metering
Lab : Configuring and managing Asset Intelligence
• Preparing the site for Asset Intelligence
• Configuring Asset Intelligence
• Monitoring license agreements by using Asset Intelligence
• Viewing Asset Intelligence reports
• Describe inventory collection.
• Configure and collect hardware and software inventory.
• Manage inventory collection.
• Configure software metering.
• Configure Asset Intelligence.
Module 6: Distributing and managing content used for deployments
Configuration Manager clients obtain content, such as packages, applications, software updates, and even operating system images, from distribution points. Configuration Manager relies on the distribution point infrastructure to provide content management functionality. In this module, you will review the content management features, configure distribution points, and learn how to distribute and monitor content. You also will perform content validation and content prestaging.
Lessons
• Preparing the infrastructure for content management
• Distributing and managing content on distribution points
Lab : Distributing and managing content for deployments
• Installing a new distribution point
• Managing content distribution
• Prepare the infrastructure for content management.
• Distribute and manage content on distribution points.
Module 7: Deploying and managing applications
In this module, you will learn about the methods for creating, deploying, and managing applications with Configuration Manager. You also will learn to use the Software Center and the Application Catalog to install available applications. You will learn about managing deployments on unconventional applications. In addition, you will learn to install Windows 10 apps and virtualized applications.
Lessons
• Overview of application management
• Creating applications
• Deploying applications
• Managing applications
• Deploying virtual applications by using System Center Configuration Manager (Optional)
• Deploying and managing Windows Store apps
Lab : Creating and deploying applications
• Installing and configuring the Application Catalog roles
• Creating applications with requirements
• Deploying applications
Lab : Managing application supersedence and removal
• Managing application supersedence
• Uninstalling the Excel Viewer application
Lab : Deploying virtual applications by using Configuration Manager (Optional)
• Configuring support for App-V
• Deploying virtual applications
Lab : Using Configuration Manager to deploy Windows Store apps
• Configuring support for sideloading Windows Store apps
• Configuring a Windows Store app
• Deploying Windows 10 apps to users
• Describe the application management features of Configuration Manager.
• Create applications.
• Deploy applications.
• Manage applications.
• Configure and deploy virtual applications.
• Configure and deploy Windows Store apps.
Module 8: Maintaining software updates for managed PCs
This module explains how to use the software updates feature in Configuration Manager to implement an end-to-end management process for the complex task of identifying, deploying, and monitoring software updates to your Configuration Manager clients.
Lessons
• The software updates process
• Preparing a Configuration Manager site for software updates
• Managing software updates
• Configuring automatic deployment rules
• Monitoring and troubleshooting software updates
Lab : Configuring the site for software updates
• Configuring and synchronizing the software update point
Lab : Deploying and managing software updates
• Determining software update compliance
• Deploying software updates to clients
• Configuring automatic deployment rules
• Describe how the software updates feature integrates with Configuration Manager.
• Prepare the Configuration Manager site for software updates.
• Manage the evaluation and deployment of software updates.
• Configure automatic deployment rules.
• Monitor and troubleshoot software updates.
Module 9: Implementing Endpoint Protection for managed PCs
Configuration Manager provides a number of security-related features that you can use to help protect client computers from malware threats, and to configure specific Windows Firewall settings for clients. Based on System Center Endpoint Protection (Endpoint Protection) functionality, Endpoint Protection in Configuration Manager supports the deployment, management, and monitoring of antimalware policies and Windows Firewall settings on client computers. This module explains how to use configure Endpoint Protection Configuration Manager to implement Endpoint Protectionand deploy and monitor Endpoint Protection policies.
Lessons
• Overview of Endpoint Protection in Configuration Manager
• Configuring, deploying, and monitoring Endpoint Protection policies
Lab : Implementing Microsoft System Center Endpoint Protection
• Configuring the System Center Endpoint Protection point and client settings
• Configuring and deploying Endpoint Protection policies
• Monitoring Endpoint Protection
• Configure Endpoint Protection to detect and remediate malware and security vulnerabilities.
• Configure, deploy, and manage Endpoint Protection policies.
Module 10: Managing compliance and secure data access
Many enterprise organizations require systems, such as servers, laptops, desktop computers, and mobile devices, to meet specific configuration and compliance requirements. Compliance settings in Configuration Manager can play a key role in identifying existing configurations, discovering systems that have adverse configuration changes, and remediating these settings automatically when necessary. Compliance settings also can help control how users manage and access data in the enterprise network environment. For computers that run Windows 8 and newer operating systems, you can manage data using folder redirection, offline files, and roaming profiles. You also can control access to data using remote connection profiles, virtual private network (VPN) profiles, Wi-Fi profiles, and certificate profiles. This module describes the compliance settings that you can manage using Configuration Manager. You will learn to use these settings to maintain configuration requirements and to provide secure data access to enterprise resources.
Lessons
• Overview of Compliance Settings
• Configuring compliance settings
• Viewing compliance results
• Managing resource and data access
Lab : Managing compliance settings
• Managing configuration items and baselines
• Viewing compliance settings and reports
• Configuring remediation in compliance settings
• Using compliance information to create collections
• Describe compliance settings features.
• Configure compliance settings.
• View compliance results.
• Manage resource and data access.
Module 11: Managing operating system deployment
You can use the operating system deployment feature in Configuration Manager to create operating system images that you can deploy to unmanaged computers and those managed by Configuration Manager. There are several scenarios in which you can deploy operating systems by using Configuration Manager, including when you are working with new systems or when you are upgrading existing ones. Operating system deployment uses both Configuration Manager and Windows components to manage and deliver operating system images. You can configure settings on a reference computer prior to capturing an image of its operating system or by using task sequences that Configuration Manager creates after you deploy the image to a target system. This module explains how to use Configuration Manager to create a strategy for operating-system deployments. And also, it explains how to manage Windows as a service.
Lessons
• An overview of operating system deployment
• Preparing a site for operating system deployment
• Deploying an operating system
• Managing Windows as a service
Lab : Preparing thea site for operating -system deployment
• Managing the site system roles used to support operating system deployment
• Managing packages to support operating system deployment
Lab : Deploying operating -system images for bare-metal installations
• Preparing the operating system image
• Creating a task sequence to deploy an image
• Deploying an image
• Describe the terminology, components, and scenarios used to deploy operating systems by using Configuration Manager.
• Describe how to prepare a site for operating system deployment.
• Describe the process used to deploy an operating system image.
Module 12: Managing and maintaining a Configuration Manager site
This module explains how to use manage and maintain a Configuration Manager site. It describes role-based administration, Remote Tools, and the site maintenance tasks that you can manage by using Configuration Manager. Additionally, it explains how to back up and recover a Configuration Manager site system.
Lessons
• Configuring role-based administration
• Configuring Remote Tools
• Overview of Configuration Manager site maintenance
• Backing up and recovering a Configuration Manager site
Lab : Configuring role-based administration
• Configuring a new scope for Toronto administrators
• Configuring a new administrative user
Lab : Configuring Remote Tools
• Configuring the Remote Tools client settings and permissions
• Managing desktops by using Remote Control
Lab : Maintaining a Configuration Manager site
• Configuring maintenance tasks in Configuration Manager
• Configuring the Backup Site Server task
• Recovering a site from a backup
• Configure role-based administration.
• Configure Remote Tools to support client activity.
• Identify Configuration Manager site Maintenance tasks.
• Back up and recover a Configuration Manager site.
Prerequisites
Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching, and addressing.
Active Directory Domain Services (AD DS) principles and fundamentals of AD DS management.
Installation, configuration, and troubleshooting for Windows-based personal computers.
Basic concepts of public key infrastructure (PKI) security.
Basic understanding of scripting and Windows PowerShell syntax.
Basic understanding of Windows Server roles and services.
Basic understanding of the configuration options for iOS, Android, and Windows Mobile device platforms.
Students who attend this training can meet the prerequisites by attending the following courses or by obtaining equivalent knowledge and skills through hands-on activities:
• Course 20697-1: Installing and Configuring Windows 10
• Course 20697-2: Deploying and Managing Windows 10 Using Enterprise Services
• Course 20411: Administering Windows Server 2012
Overview
Technology: SharePoint Server
Level: Intermediate
This Revision: A
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This five-day course will teach you how to plan, configure, and manage the advanced features in a SharePoint 2016 environment. The special areas of focus for this course include implementing high availability, disaster recovery, service application architecture, and Microsoft Business Connectivity Services. This course also focuses on social computing features, productivity, and collaboration platforms and features. Students also will learn about business intelligence solutions, Enterprise Content Management, web content management infrastructure, solutions, and apps. This course also covers how to develop and implement a governance plan, and how to perform an upgrade or a migration to SharePoint 2016.
This is the second in a sequence of two courses for IT Professionals and is aligned with the SharePoint 2016 IT Pro certification.
Audience profile
The course is targeted at experienced IT Professionals who are interested in learning how to install, configure, deploy, and manage SharePoint 2016 installations either in a data center or in the cloud.
Students typically should have more than four years of hands-on experience* planning and maintaining SharePoint Server and other core technologies upon which SharePoint depends, including Windows Server 2012 R2 or later, Internet Information Services (IIS), Microsoft SQL Server 2014 R2 or later, Active Directory Domain Services (AD DS), and networking infrastructure services.
Students should have completed Course 20339-1A: Planning and Administering Microsoft SharePoint 2016, or have gained equivalent knowledge and experience before taking this course.
The minimally qualified candidate typically:
• Has a working knowledge of, and preferably hands-on experience, with Microsoft SharePoint Online.
• Has broad familiarity with SharePoint Server workloads.
• Has experience with business continuity management, including data backup, restoration, and high availability.
• Has experience with authentication and security technologies.
• Has experience with Windows PowerShell.
* The hands-on experience or job experience should be from a solutions-based role where the candidate has worked on multiple solutions in the SharePoint Server space that includes document management, content management, and search.
At course completion
After completing this course, students will be able to:
• Describe the core SharePoint 2016 architecture and its new and improved features.
• Describe the key hybrid features in SharePoint 2016.
• Plan and design a SharePoint 2016 environment to meet requirements for high availability and disaster recovery.
• Plan and implement Business Connectivity Services and Secure Store Service.
• Configure and manage productivity services for a SharePoint 2016 deployment.
• Manage solutions in a SharePoint 2016 deployment.
• Plan and configure social computing features.
• Plan and configure web content management for an Internet-facing environment.
• Plan and configure Enterprise Content Management in a SharePoint 2016 deployment.
• Plan and configure business intelligence solutions.
• Plan and configure work management, productivity, and collaboration platforms and features.
• Perform an upgrade or migration to SharePoint 2016.
Course Outline
Module 1: Introduction to SharePoint 2016
This module describes the core architectural components of a SharePoint Server environment, and also helps to identify the new depreciated and removed features in SharePoint 2016.
Lessons
• Core components of the SharePoint 2016 architecture
• New, deprecated, and removed features in SharePoint 2016
• SharePoint 2016 and SharePoint Online editions
Lab : Reviewing the core Microsoft SharePoint 2016 concepts
• Configuring SharePoint 2016 farms
• Creating and configuring site collections and sites
• Provisioning service applications by using the SharePoint 2016 Management Shell
After completing this module, students will be able to:
• Describe the architectural features of a Microsoft-SharePoint 2016.
• Identify the new, deprecated, and removed features in SharePoint 2016.
• Describe the editions for SharePoint 2016 on-premises and Microsoft SharePoint Online.
Module 2: Introduction to hybrid scenarios for SharePoint 2016
This module describes the key hybrid features in SharePoint 2016, and helps you to prepare for a hybrid SharePoint 2016 deployment.
Lessons
• Exploring the hybrid features in SharePoint 2016
• Preparing for a hybrid SharePoint 2016 deployment
Lab : Configuring an Office 365 tenant
• Creating an Office 365 tenant
Lab : Creating hybrid team sites
• Preparing the SharePoint environment
• Running the SharePoint Hybrid picker
After completing this module, students will be able to:
• Describe the key hybrid features in SharePoint Server 2016.
• Prepare for a hybrid SharePoint 2016 deployment.
Module 3: Designing business continuity management strategies
This module explains how to select an appropriate database server configuration to meet availability requirements. It also describes how to design a physical architecture and infrastructure to meet high-availability requirements. Finally, this module explains how to develop and implement a backup and restore strategy.
Lessons
• Designing database topologies for high availability and disaster recovery
• Designing a SharePoint infrastructure for high availability
• Planning for disaster recovery
Lab : Planning and performing backup and restore
• Create a backup and restore plan
• Test the backup and restore process
After completing this module, students will be able to:
• Select an appropriate database server configuration to meet availability requirements.
• Design a physical architecture and infrastructure to meet high-availability requirements.
• Develop and implement a backup and restore strategy.
Module 4: Planning and implementing Business Connectivity Services and Secure Store Service
This module explains how to configure Business Connectivity Services (BCS), and describes how to configure and manage the Secure Store Service application. It also explains how you can configure and manage BCS models.
Lessons
• Planning and configuring BCS
• Configuring the Secure Store Service
• Managing BCS models
Lab : Configuring BCS and the Secure Store Service
• Configuring the BDC Service Application
• Configuring the Secure Store Service
Lab : Managing BDC models
• Configuring a Secure Store Service target application
• Importing and configuring BDC models
After completing this module, students will be able to:
• Plan and Configure Business Connectivity service application.
• Plan and configure the Secure Store Service application.
• Manage the Business Data Connectivity models.
Module 5: Configuring productivity services for a SharePoint 2016 deployment
This module describes SharePoint Add-in architecture. This module also explains how to provision and manage SharePoint apps and App Catalogs. Additionally, this module describes how to provision Microsoft Access Services, Visio Services, Word Automation Services, PowerPoint Automation Services, and SharePoint Translation Services.
Lessons
• Understanding the SharePoint Add-in architecture
• Provisioning and managing apps and App Catalogs
• Provisioning productivity services
Lab : Configuring and managing SharePoint Add-ins
• Configuring a SharePoint farm to support apps
• Creating and configuring a corporate App Catalog
• Deploying and monitoring apps
After completing this module, students will be able to:
• Describe Microsoft SharePoint Add-ins and the supporting SharePoint infrastructure.
• Provision and configure SharePoint Add-ins and App Catalogs.
• Manage how apps are used within a SharePoint 2016 deployment.
Module 6: Managing solutions in Microsoft SharePoint 2016
This module describes the purpose and structure of SharePoint 2016 features and solutions. In addition, it explains how to manage sandbox solutions in Microsoft SharePoint 2016.
Lessons
• Understanding the SharePoint 2016 solution architecture
• Managing sandboxed solutions
Lab : Managing solutions
• Configuring a SharePoint farm to support sandboxed solutions
• Configuring a SharePoint site to support sandboxed solutions
• Deploying farm solutions
After completing this module, students will be able to:
• Manage features and solutions in Microsoft SharePoint 2016..
• Manage sandboxed solutions in a SharePoint 2016 deployment.
Module 7: Connecting people
This module explains how to manage user profiles and how to plan and configure My Site and social features. This module also describes how to configure community sites.
Lessons
• Managing user profiles
• Enabling social interaction
• Building communities
Lab : Configuring profile synchronization and My Sites
• Configuring profile synchronization
• Configuring My Sites
Lab : Configuring community sites
• Creating a community site infrastructure
• Configuring Community Site participation
After completing this module, students will be able to:
• Manage user profiles in Microsoft SharePoint 2016 and configure user profile synchronization by using Microsoft Identity Manager (MIM) 2016.
• Enable social interaction in SharePoint 2016.
• Build communities and community sites in SharePoint 2016.
Module 8: Planning and configuring web content management
This module explains how to plan and configure a web content management infrastructure to meet business requirements. This module also describes how to configure managed navigation and product catalog sites, and how to configure support for multilingual sites. Additionally, it explains and how to plan and manage design and customization for publishing sites, and how to plan and configure support for mobile users.
Lessons
• Planning and implementing a web content management infrastructure
• Configuring managed navigation and catalog sites
• Supporting multiple languages and locales
• Enabling design and customization
• Supporting mobile users
Lab : Configuring managed navigation and catalog sites
• Configuring a product catalog site
• Configuring Cross-Site Publishing
• Configuring publishing sites
Lab : Configuring device channels
• Configuring device channels
After completing this module, students will be able to:
• Plan and configure a web content management infrastructure.
• Configure managed navigation and product catalog sites.
• Plan and Configure support for multilingual sites and locales.
• Manage design and customization for publishing sites.
• Plan and configure support for mobile users.
Module 9: Planning and configuring Enterprise Content Management
This module explains how to plan for management of content and documents, and how to plan for and configure eDiscovery. Additionally, it describes how to plan for records management and compliance.
Lessons
• Planning Enterprise Content Management
• Planning and configuring eDiscovery
• Planning records management
Lab : Configuring eDiscovery in SharePoint 2016
• Creating and configuring an eDiscovery Center
• Discovering and preserving content
• Querying and exporting content
Lab : Configuring records management in SharePoint Server 2016
• Configuring in-place records management
After completing this module, students will be able to:
• Plan how to manage content and documents.
• Plan and configure eDiscovery.
• Plan records management and compliance.
Module 10: Planning and configuring business intelligence solutions
This module explains how to plan business intelligence (BI) architecture for SharePoint 2016, and how to deploy and manage BI services. Additionally, this module explains how to plan and configure advanced analysis tools.
Lessons
• Planning BI architecture
• Planning, deploying, and managing BI services
• Planning and configuring advanced analysis tools
Lab : Installing Office Online Server
• Deploy Office Online Server
Lab : Configuring PowerPivot and Power View for SharePoint 2016
• Configuring PowerPivot for SharePoint 2016
• Configuring Power View for SharePoint
After completing this module, students will be able to:
• Explain the Microsoft SharePoint business intelligence (BI) architecture, its components, and plan for business intelligence.
• Plan, deploy, and manage the core Microsoft SharePoint 2016 BI services.
• Configure the advanced BI options available in SharePoint 2016 and Microsoft SQL Server 2014.
Module 11: Planning and configuring productivity and collaboration
This module explains how to plan and configure productivity and collaboration features. This module also explains how to plan and configure composite solutions in SharePoint 2016.
Lessons
• Planning and configuring collaboration features
• Planning and configuring composites
Lab : Configuring and working with project sites
• Creating an Office Online Server farm and configuring integration in SharePoint 2016
• Creating project sites
• Configuring project sites
• Engaging project teams
• Configuring Project Server integration
Lab : Configuring a workflow
• Configuring Microsoft Azure Workflow and Microsoft SharePoint Workflow Services
• Creating and testing a workflow
After completing this module, students will be able to:
• Describe how to plan and configure SharePoint collaborative and coauthoring options.
• Configure project sites and engage teams.
• Plan and configure composites.
• Configure workflows in SharePoint 2016.
Module 12: Upgrading and migrating to SharePoint 2016
This module explains how to prepare for upgrade or migration to SharePoint 2016. In addition, it explains how to manage site collections are how to upgrade them to SharePoint 2016. Finally, the module describes how to upgrade advanced content from SharePoint Server 2013 to SharePoint 2016.
Lessons
• Preparing for an upgrade or migration
• Upgrade to SharePoint 2016
• Planning and managing a site-collection upgrade
Lab : Performing a content database migration and upgrade from Microsoft SharePoint Server 2013
• Migrating SharePoint Server 2013 Managed Metadata Service
• Upgrading a SharePoint Server 2013 content database
Lab : Managing site-collection upgrades
• Preparing site collections for upgrade
• Upgrading site collections
After completing this module, students will be able to:
• Plan and prepare for an upgrade.
• Perform upgrades to data and service applications.
• Upgrade site collections.
• Upgrade advanced content from SharePoint Server 2013 to SharePoint 2016.
Prerequisites
An ideal candidate for this course must have at least one year experience with deploying and administering multiple SharePoint Server 2013 farms across a large enterprise. The candidate should have completed Course 20339-1A: Planning and Administering Microsoft SharePoint 2016, or should demonstrate equivalent skills
Before attending this course, students must demonstrate the following skills:
• At least a one-year experience of mapping business requirements to both logical and physical technical designs.
• Working knowledge of network design, including network security.
• Software management experience in a Windows Server 2012 R2 enterprise server or Windows Server 2016 environment.
• Deploying and managing applications natively, virtually, and in the cloud.
• Administering IIS.
• Configuring AD DS for use in authentication and authorization, and as a user store.
• Managing an application remotely by using Windows PowerShell 2.0 or later.
• Connecting applications to SQL Server.
• Implementing claims-based security.
Visão Global
Onde quer que os dados pessoais sejam coletados, armazenados, usados e, finalmente, excluídos ou destruídos, surgem preocupações de privacidade. Com o Regulamento Geral de Proteção de Dados da UE (GDPR), o Conselho da União Europeia tenta reforçar e unificar a proteção de dados para todos os indivíduos da União Europeia (UE). Este regulamento afeta todas as organizações que processam os dados pessoais de cidadãos da EU e tem efeitos além destas fronteiras. O PDPF abrange os principais assuntos relacionados ao GDPR e tem sido usado como um guia para diversos países fora da UE em fase de elaboração das suas próprias leis.
Público Alvo
Todos os colaboradores precisam ter uma compreensão da proteção de dados e dos requisitos legais, conforme definido no GDPR. As seguintes funções mais específicas podem se interessar:
DPO (Diretor de Proteção de Dados), Privacy Officer (Diretor de Privacidade), Legal Officer / Compliance Officer (Diretor Jurídico / Diretor de Conformidade), Security Officer (Diretor de Segurança), Business Continuity Manager (Gerente de Continuidade de Negócios).
Carga
16h
Conteúdo
1. Fundamentos e regulamentação de Privacidade e Proteção de Dados
1.1 Definições
1.2 Dados Pessoais
1.3 Fundamentos legítimos e limitação de propósito
1.4 Requisitos adicionais para processamento legítimo de dados pessoais
1.5 Direitos do titular dos dados
1.6 Violação de dados e procedimentos relacionados
2. Organizando a proteção de dados
2.1 Importância da proteção de dados para a organização
2.2 Autoridade Fiscalizadora
2.3 Transferência de dados pessoais para outros países
2.4 Regras Corporativas compulsórias e proteção de dados em contratos
3. Práticas de Proteção de Dados
3.1 Proteção de Dados by design e por padrão
3.2 Avaliação de Impacto sobre a Proteção de Dados
(DPIA)
3.3 Aplicações práticas relacionadas ao uso de dados, marketing e mídias sociais
Overview
Audience(s): IT Professionals
Technology: Skype
Level: Advanced
This Revision: B
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This course provides students with the knowledge and skills that are required to plan, deploy, configure, and administer a Skype for Business 2015 solution. Students will learn how to deploy a multi-site and highly available Skype for Business infrastructure that supports instant messaging, conferencing, Persistent Chat, archiving, and monitoring. Students will also learn how to manage and maintain the infrastructure and how to troubleshoot issues that might arise. This course focuses primarily on an on-premises Skype for Business deployment, but it does include information on how to integrate an on-premises deployment with Skype for Business Online and how to migrate from previous versions of Lync Server. This course helps students prepare for Exam 70-334.
Audience profile
The primary audience for this course is information technology (IT) professionals who are responsible for the Skype for Business 2015 deployment in their organizations. Experience with previous versions of Lync Server is beneficial but not required to take this course. Students should be proficient with Active Directory Domain Services (AD DS), data networks, and telecommunications standards and components that support the configuration of Skype for Business. Students should also be familiar with Microsoft Exchange Server and Microsoft Office 365.
The secondary audience for this course includes IT professionals who are planning to take the exam 70-334: Core Solutions of Skype for Business 2015 as a stand-alone exam or as part of the requirement for the Microsoft Certified Solutions Expert (MCSE): Communications certification exam.
At course completion
After completing this course, students will be able to:
Describe the Skype for Business 2015 architecture and design a Skype for Business 2015 topology.
Install and implement Skype for Business Server 2015.
Administer Skype for Business Server 2015 by using various tools.
Configure users and clients in Skype for Business 2015.
Configure and implement conferencing in Skype for Business 2015.
Implement additional conferencing options, such as dial-in conferencing, Microsoft Skype Room System (SRS), and Skype Meeting Broadcast.
Design and implement monitoring and archiving in Skype for Business 2015.
Deploy Skype for Business 2015 external access.
Implement Persistent Chat in Skype for Business 2015.
Implement high availability in Skype for Business 2015.
Implement disaster recovery in Skype for Business 2015.
Design and deploy a hybrid Skype for Business environment.
Plan and implement an upgrade from Lync Server to Skype for Business Server 2015.
Course Outline
Module 1: Design and Architecture of Skype for Business Server 2015
This module describes the high-level components and features of Skype for Business 2015. It also describes how to work with Skype for Business administrative tools, the main components of Skype for Business Online, and coexistence with on-premises Skype for Business Server 2015 servers.
Lessons
• Overview of Skype for Business Components and Features
• Introduction to the Skype for Business Administrative Tools
Lab : Designing and Publishing a Skype for Business Server Topology
• Designing and Creating the Topology
• Updating the Topology for the New York Site
After completing this module, students will be able to:
Describe the high-level components and features of Skype for Business 2015.
Work with Skype for Business administrative tools.
Module 2: Installing and Implementing Skype for Business Server 2015
This module explains the external dependencies for Skype for Business Server. It describes the Session Initiation Protocol (SIP) domain requirements to ensure a successful implementation. This module also explains how to install Skype for Business Server, and it describes how Skype for Business Server integrates with Exchange Server and Microsoft SharePoint Server.
Lessons
• Server and Service Dependencies
• Planning SIP Domains
• Installing Skype for Business Server
• Integrating Skype for Business Server with Exchange Server and SharePoint Server
Lab : Configuring DNS and Simple URLs for Skype for Business Server
• Configuring the Required DNS Records and Simple URLs for Skype for Business Server
Lab : Deploying Skype for Business Server
• Installing and Configuring Skype for Business Server
• Installing Skype for Business Server Certificates
After completing this module, students will be able to:
Identify the external dependencies for Skype for Business Server 2015.
Identify the SIP domain requirements to ensure a successful implementation.
Install Skype for Business Server.
Describe how Skype for Business Server integrates with Exchange Server and SharePoint Server.
Module 3: Administering Skype for Business Server 2015
This module explains how to administer and manage Skype for Business Server by using Skype for Business Server Control Panel and the Skype for Business Server Management Shell. It also describes how to create useful Skype for Business scripts to automate processes. Additionally, it explains how to implement role-based access control (RBAC) in Skype for Business and how to use important Test cmdlets and tools to troubleshoot Skype for Business.
Lessons
• Using Skype for Business Server Control Panel
• Using the Skype for Business Server Management Shell
• Implementing Role-Based Access Control
• Using Test Cmdlets
• Tools for Troubleshooting Skype for Business
Lab : Using the Administrative Tools to Manage Skype for Business Server
• Installing the Skype for Business Administrative Tools on a Windows 10 Client
• Using Skype for Business Server Control Panel
• Using the Skype for Business Server Management Shell
Lab : Using the Skype for Business Troubleshooting Tools
• Using Skype for Business Server Management Shell Cmdlets to Create an RBAC Structure
• Using the Centralized Logging Service
• Performing a Network Capture by Using Message Analyzer
After completing this module, students will be able to:
Use Skype for Business Server Control Panel.
Use the Skype for Business Server Management Shell.
Implement RBAC in Skype for Business 2015.
Use important test cmdlets.
Use various tools to troubleshoot Skype for Business.
Module 4: Configuring Users and Clients in Skype for Business 2015
This module explains how to configure users by using Skype for Business Server Control Panel and the Skype for Business Server Management Shell. It then describes how to deploy Skype for Business clients and explains the sign-in, registration, and authentication process for Skype for Business clients. It also explains how to configure in-band policies and group policies. Finally, it explains how to manage the Skype for Business Address Book.
Lessons
• Configuring Users
• Deploying the Skype for Business Client
• Registration, Sign-In, and Authentication
• Configuring Skype for Business Client Policies
• Managing the Skype for Business Address Book
Lab : Configuring Users and Clients in Skype for Business 2015
• Enabling Users for Skype for Business by Using the Management Shell
• Troubleshooting a User Sign-In Issue
Lab : Configuring Policies and the Address Book in Skype for Business Server
• Configuring Client Policies
• Configuring the Address Book
After completing this module, students will be able to:
• Configure users by using Skype for Business Server Control Panel and the Skype for Business Server Management Shell.
• Deploy Skype for Business clients.
• Explain the registration, sign-in, and authentication process for Skype for Business clients.
• Configure in-band policies and Group Policies.
• Describe how to manage the Skype for Business Address Book.
Module 5: Configuring and Implementing Conferencing in Skype for Business 2015
This modules describes Skype for Business conferencing features and modalities. It explains how to integrate Skype for Business Server 2015 with Office Online Server. It also explains how to plan for conferencing bandwidth utilization. Finally, it explains how to configure conferencing settings and policies.
Lessons
• Introduction to Conferencing in Skype for Business 2015
• Integrating Skype for Business Server and Office Online Server
• Bandwidth Planning
• Configuring Conferencing Settings
Lab : Installing and Configuring Office Online Server
• Installing Office Online Server
Lab : Configuring Conferencing in Skype for Business Server
• Configuring, Assigning, and Validating Conferencing Policies
After completing this module, students will be able to:
• Describe Skype for Business conferencing features and modalities.
• Integrate Skype for Business Server 2015 with Office Web Apps Server.
• Plan for conferencing bandwidth utilization.
• Configure conferencing settings and policies.
Module 6: Implementing Additional Conferencing Options in Skype for Business Server 2015
This module describes the conferencing lifecycle and explains how to administer it. It then explains how to use conferencing and meeting policies. It also explains how to deploy dial-in conferencing and configure the infrastructure for SRS. Finally, it explains how to configure large meetings and Skype Meeting Broadcast.
Lessons
• Overview of the Conferencing Lifecycle
• Designing and Configuring Audio/Video and Web Conferencing Policies
• Deploying Dial-In Conferencing
• Configuring an SRS
• Configuring Large Meetings and Skype Meeting Broadcasts
Lab : Implementing and Troubleshooting Conferencing Policy
• Creating and Editing Conferencing Policies
• Troubleshooting Conferencing Policies
Lab : Configuring Additional Conferencing Modalities
• Deploying Dial-In Conferencing
• Preparing for LRS Deployment
After completing this module, students will be able to:
• Administer the conferencing lifecycle.
• Configure conferencing and meeting policies.
• Deploy dial-in conferencing.
• Configure the infrastructure for Lync Room System (LRS).
• Configure large meetings and Skype Meeting Broadcast.
Module 7: Designing and Implementing Monitoring and Archiving in Skype for Business 2015
This module describes the Monitoring Service components in Skype for Business Server. It then describes archiving and explains how to design an archiving policy. Finally, it explains how to implement archiving.
Lessons
• Components of the Monitoring Service
• Overview of Archiving
• Designing an Archiving Policy
• Implementing Archiving
Lab : Implementing Monitoring
• Enabling Monitoring Reports
Lab : Implementing Archiving
• Enabling Skype for Business Server Archiving to Microsoft Exchange Server 2013
After completing this module, students will be able to:
• Describe Monitoring Service components in Skype for Business Server.
• Implement monitoring.
• Design an archiving policy.
• Implement archiving.
Module 8: Deploying Skype for Business 2015 External Access
This module describes the components for external access. It then explains how to configure external access policies and security, how to configure certificates, and how to configure reverse proxy. Additionally, this module describes how to configure Skype for Business Server 2015 for mobile clients. Finally, it explains how to design and configure federation in Skype for Business Server.
Lessons
• Overview of External Access
• Configuring External Access Policies and Security
• Configuring External Access Network and Certificates
• Configuring Reverse Proxy
• Designing Mobility in Skype for Business Server
• Designing Federation in Skype for Business Server
Lab : Designing and Implementing External User Access
• Defining the Edge Server in the Topology
• Installing and Configuring the Edge Server
Lab : Installing the Components for External Users
• Installing and Configuring Reverse Proxy
• Validate External Messaging
After completing this module, students will be able to:
• Identify the components for external access.
• Configure external access policies and security.
• Configure external access network and certificates.
• Configure reverse proxy.
• Configure Skype for Business Server 2015 for mobile clients.
• Design and configure federation in Skype for Business Server.
Module 9: Implementing Persistent Chat in Skype for Business 2015
This module explains how to design a Skype for Business 2015 topology that includes Persistent Chat. It then explains how to deploy Persistent Chat in Skype for Business. Finally, it explains how to configure and manage Persistent Chat.
Lessons
• Designing a Persistent Chat Server Topology
• Deploying Persistent Chat Server
• Configuring and Managing Persistent Chat
Lab : Designing and Deploying Persistent Chat Server
• Configuring the Topology for Persistent Chat Server
• Installing Persistent Chat Server
• Registering a New Add-In
Lab : Configuring and Using Persistent Chat
• Configuring Chat Rooms and Policies
• Validating a Persistent Chat Deployment
• Troubleshooting Persistent Chat
After completing this module, students will be able to:
• Design a Skype for Business topology that includes Persistent Chat.
• Deploy Persistent Chat in Skype for Business.
• Configure and manage Persistent Chat in Skype for Business.
Module 10: Implementing High Availability in Skype for Business 2015
This module describes how to design and implement a high-availability solution for Front End Servers and Back End Servers in a Skype for Business Server environment. It also explains how to design and implement a high-availability solution for file stores, Edge Servers, Mediation Servers, Office Online server farms, and reverse proxy servers in a Skype for Business Server environment.
Lessons
• Planning for Front End Pool High Availability
• Planning for Back End Server High Availability
• High Availability for Other Component Servers
Lab : Pre-Lab Configuration
• Preparing for the Lab
Lab : Implementing High Availability
• Managing Front End Pools
• Configuring Hardware Load Balancing
After completing this module, students will be able to:
• Design and implement a high-availability solution for Front End Servers in a Skype for Business Server environment.
• Design and implement a high-availability solution for Back End Servers in a Skype for Business Server environment.
• Design and implement a high-availability solution for file stores, Edge Servers, Mediation Servers, Office Online Server farms, and reverse proxy servers in a Skype for Business Server environment.
Module 11: Implementing Disaster Recovery in Skype for Business 2015
This module describes the disaster recovery options in Skype for Business Server, such as Front End pool pairing and Persistent Chat Server stretched pools. It then explains how to implement disaster recovery in Skype for Business Server. Additionally, it describes the disaster recovery options for Persistent Chat, the Central Management store, the Location Information Service (LIS) database, and user data.
Lessons
• Disaster Recovery Options in Skype for Business Server
• Implementing Disaster Recovery in Skype for Business Server
• Additional Disaster Recovery Options in Skype for Business Server
Lab : Implementing and Performing Disaster Recovery
• Configuring Pool Pairing
• Perform Pool Failover and Failback
After completing this module, students will be able to:
• Describe disaster recovery options in Skype for Business Server.
• Implement disaster recovery in Skype for Business Server.
• Describe the disaster recovery options for Persistent Chat, the Central Management store, the Location Information Service (LIS) database, and user data.
Module 12: Integrating with Skype for Business Online
This module describes Skype for Business Online features. It then explains how to prepare an on-premises environment for a hybrid Skype for Business deployment. It also explains how to configure a hybrid Skype for Business deployment.
Lessons
• Overview of Skype for Business Online
• Preparing for a Hybrid Skype for Business Deployment
• Configuring a Hybrid Skype for Business Environment
Lab : Designing a Hybrid Skype for Business Deployment
• Designing the Hybrid Skype for Business Environment
After completing this module, students will be able to:
• Describe Skype for Business Online features.
• Prepare an on-premises environment for a hybrid Skype for Business deployment.
• Configure a hybrid Skype for Business deployment.
Module 13: Planning and Implementing an Upgrade to Skype for Business Server 2015
This module describe how to plan a side-by-side migration from Lync Server 2010 and Lync Server 2013 to Skype for Business Server 2015. It also explains how to perform an in-place upgrade from Lync Server 2013 to Skype for Business Server.
Lessons
• Overview of Upgrade and Migration Paths
• Migrating to Skype for Business 2015
• In-Place Upgrade to Skype for Business Server 2015
Lab : Performing an In-Place Upgrade of Lync Server 2013 to Skype for Business Server 2015
• Install Skype for Business Administrative Tools
• Performing In-Place Upgrade from Lync Server 2013 to Skype for Business Server 2015
After completing this module, students will be able to:
• Describe the supported migration and upgrade paths for Skype for Business Server.
• Perform an in-place upgrade of Lync Server 2013 to Skype for Business Server.
• Describe how to manage the user experience during an upgrade.
Prerequisites
In addition to their professional experience, students who attend this training should already have:
A minimum of two years of experience administering Windows Server 2012 or Windows Server 2008 R2.
A minimum of two years of experience working with AD DS.
A minimum of two years of experience working with name resolution, including Domain Name System (DNS).
Experience working with certificates, including public key infrastructure (PKI) certificates.
Experience working with the Windows PowerShell command-line interface.
An understanding of data networks and telecommunications standards and components.
Overview
Audience(s): Data Professional
Technology: Microsoft SQL Server
Level: Intermediate
This Revision: C
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This course is designed to introduce students to Transact-SQL. It is designed in such a way that the first three days can be taught as a course to students requiring the knowledge for other courses in the SQL Server curriculum. Days 4 & 5 teach the remaining skills required to take exam 70-761.
Audience profile
The main purpose of the course is to give students a good understanding of the Transact-SQL language which is used by all SQL Server-related disciplines; namely, Database Administration, Database Development and Business Intelligence. As such, the primary target audience for this course is: Database Administrators, Database Developers and BI professionals.
At course completion
After completing this course, students will be able to:
• Describe key capabilities and components of SQL Server.
• Describe T-SQL, sets, and predicate logic.
• Write a single table SELECT statement.
• Write a multi-table SELECT statement.
• Write SELECT statements with filtering and sorting.
• Describe how SQL Server uses data types.
• Write DML statements.
• Write queries that use built-in functions.
• Write queries that aggregate data.
• Write subqueries.
• Create and implement views and table-valued functions.
• Use set operators to combine query results.
• Write queries that use window ranking, offset, and aggregate functions.
• Transform data by implementing pivot, unpivot, rollup and cube.
• Create and implement stored procedures.
• Add programming constructs such as variables, conditions, and loops to T-SQL code.
Course Outline
Module 1: Introduction to Microsoft SQL Server
This module introduces SQL Server, the versions of SQL Server, including cloud versions, and how to connect to SQL Server using SQL Server Management Studio.
Lessons
• The Basic Architecture of SQL Server
• SQL Server Editions and Versions
• Getting Started with SQL Server Management Studio
Lab: Working with SQL Server Tools
• Working with SQL Server Management Studio
• Creating and Organizing T-SQL Scripts
• Using Books Online
After completing this module, you will be able to:
• Describe relational databases and Transact-SQL queries.
• Describe the on-premise and cloud-based editions and versions of SQL Server.
• Describe how to use SQL Server Management Studio (SSMS) to connect to an instance of SQL Server, explore the databases contained in the instance, and work with script files that contain T-SQL queries.
Module 2: Introduction to T-SQL Querying
This module describes the elements of T-SQL and their role in writing queries. Describe the use of sets in SQL Server. Describe the use of predicate logic in SQL Server. Describe the logical order of operations in SELECT statements.
Lessons
• Introducing T-SQL
• Understanding Sets
• Understanding Predicate Logic
• Understanding the Logical Order of Operations in SELECT statements
Lab: Introduction to T-SQL Querying
• Executing Basic SELECT Statements
• Executing Queries that Filter Data using Predicates
• Executing Queries That Sort Data Using ORDER BY
After completing this module, you will be able to:
• Describe the role of T-SQL in writing SELECT statements.
• Describe the elements of the T-SQL language and which elements will be useful in writing queries.
• Describe the concepts of the set theory, one of the mathematical underpinnings of relational databases, and to help you apply it to how you think about querying SQL Server
• Describe predicate logic and examine its application to querying SQL Server.
• Explain the elements of a SELECT statement, delineate the order in which the elements are evaluated, and then apply this understanding to a practical approach to writing queries.
Module 3: Writing SELECT Queries
This module introduces the fundamentals of the SELECT statement, focusing on queries against a single table.
Lessons
• Writing Simple SELECT Statements
• Eliminating Duplicates with DISTINCT
• Using Column and Table Aliases
• Writing Simple CASE Expressions
Lab: Writing Basic SELECT Statements
• Writing Simple SELECT Statements
• Eliminating Duplicates Using DISTINCT
• Using Column and Table Aliases
• Using a Simple CASE Expression
After completing this module, you will be able to:
• Describe the structure and format of the SELECT statement, as well as enhancements that will add functionality and readability to your queries
• Describe how to eliminate duplicates using the DISTINCT clause
• Describe the use of column and table aliases
• Understand and use CASE expressions
Module 4: Querying Multiple Tables
This module describes how to write queries that combine data from multiple sources in Microsoft SQL Server.
Lessons
• Understanding Joins
• Querying with Inner Joins
• Querying with Outer Joins
• Querying with Cross Joins and Self Joins
Lab: Querying Multiple Tables
• Writing Queries that use Inner Joins
• Writing Queries that use Multiple-Table Inner Joins
• Writing Queries that use Self-Joins
• Writing Queries that use Outer Joins
• Writing Queries that use Cross Joins
After completing this module, you will be able to:
• Explain the fundamentals of joins in SQL Server
• Write inner join queries
• Write queries that use outer joins
• Use additional join types
Module 5: Sorting and Filtering Data
This module describes how to implement sorting and filtering.
Lessons
• Sorting Data
• Filtering Data with Predicates
• Filtering Data with TOP and OFFSET-FETCH
• Working with Unknown Values
Lab: Sorting and Filtering Data
• Writing Queries that Filter Data using a WHERE Clause
• Writing Queries that Sort Data Using an ORDER BY Clause
• Writing Queries that Filter Data Using the TOP Option
• Write Queries that filter data using the OFFSET-FETCH clause
.
After completing this module, you will be able to:
• Explain how to add an ORDER BY clause to your queries to control the order of rows displayed in your query's output
• Explain how to construct WHERE clauses to filter out rows that do not match the predicate.
• Explain how to limit ranges of rows in the SELECT clause using a TOP option.
• Explain how to limit ranges of rows using the OFFSET-FETCH option of an ORDER BY clause.
• Explain how three-valued logic accounts for unknown and missing values, how SQL Server uses NULL to mark missing values, and how to test for NULL in your queries.
Module 6: Working with SQL Server Data Types
This module introduces the data types SQL Server uses to store data.
Lessons
• Introducing SQL Server Data Types
• Working with Character Data
• Working with Date and Time Data
Lab: Working with SQL Server Data Types
• Writing Queries that Return Date and Time Data
• Writing Queries that use Date and Time Functions
• Writing Queries That Return Character Data
• Writing Queries That Return Character Functions
After completing this module, you will be able to:
• Explore many of the data types SQL Server uses to store data and how data types are converted between types
• Explain the SQL Server character-based data types, how character comparisons work, and some common functions you may find useful in your queries
• Describe data types that are used to store temporal data, how to enter dates and times so they will be properly parsed by SQL Server, and how to manipulate dates and times with built-in functions.
Module 7: Using DML to Modify Data
This module describes how to create DML queries, and why you would want to.
Lessons
• Adding Data to Tables
• Modifying and Removing Data
• Generating automatic column values
Lab: Using DML to Modify Data
• Inserting Records with DML
• Updating and Deleting Records Using DML
After completing this module, you will be able to:
• Use INSERT and SELECT INTO statements
• Use UPDATE, MERGE, DELETE, and TRUNCATE.
Module 8: Using Built-In Functions
This module introduces some of the many built in functions in SQL Server.
Lessons
• Writing Queries with Built-In Functions
• Using Conversion Functions
• Using Logical Functions
• Using Functions to Work with NULL
Lab: Using Built-In Functions
• Writing Queries That Use Conversion Functions
• Writing Queries that use Logical Functions
• Writing Queries that Test for Nullability
After completing this module, you will be able to:
• Describe the types of functions provided by SQL Server, and then focus on working with scalar functions
• Explain how to explicitly convert data between types using several SQL Server functions
• Describe how to use logical functions that evaluate an expression and return a scalar result.
• Describe additional functions for working with NULL
Module 9: Grouping and Aggregating Data
This module describes how to use aggregate functions.
Lessons
• Using Aggregate Functions
• Using the GROUP BY Clause
• Filtering Groups with HAVING
Lab: Grouping and Aggregating Data
• Writing Queries That Use the GROUP BY Clause
• Writing Queries that Use Aggregate Functions
• Writing Queries that Use Distinct Aggregate Functions
• Writing Queries that Filter Groups with the HAVING Clause
After completing this module, you will be able to:
• Describe the built-in aggregate function in SQL Server and write queries using it.
• Write queries that separate rows using the GROUP BY clause.
• Write queries that use the HAVING clause to filter groups.
Module 10: Using Subqueries
This module describes several types of subquery and how and when to use them.
Lessons
• Writing Self-Contained Subqueries
• Writing Correlated Subqueries
• Using the EXISTS Predicate with Subqueries
Lab: Using Subqueries
• Writing Queries That Use Self-Contained Subqueries
• Writing Queries That Use Scalar and Multi-Result Subqueries
• Writing Queries That Use Correlated Subqueries and an EXISTS Clause
After completing this module, you will be able to:
• Describe where subqueries may be used in a SELECT statement.
• Write queries that use correlated subqueries in a SELECT statement
• Write queries that use EXISTS predicates in a WHERE clause to test for the existence of qualifying rows
• Use the EXISTS predicate to efficiently check for the existence of rows in a subquery.
Module 11: Using Table Expressions
Previously in this course, you learned about using subqueries as an expression that returned results to an outer calling query. Like subqueries, table expressions are query expressions, but table expressions extend this idea by allowing you to name them and to work with their results as you would work with data in any valid relational table. Microsoft SQL Server supports four types of table expressions: derived tables, common table expression (CTEs), views, and inline table-valued functions (TVFs). In this module, you will learn to work with these forms of table expressions and learn how to use them to help create a modular approach to writing queries.
Lessons
• Using Views
• Using Inline Table-Valued Functions
• Using Derived Tables
• Using Common Table Expressions
Lab: Using Table Expressions
• Writing Queries That Use Views
• Writing Queries That Use Derived Tables
• Writing Queries That Use Common Table Expressions (CTEs)
• Writing Queries That Use Inline Table-Valued Expressions (TVFs)
After completing this module, you will be able to:
• Write queries that return results from views.
• Use the CREATE FUNCTION statement to create simple inline TVFs.
• Write queries that create and retrieve results from derived tables.
• Write queries that create CTEs and return results from the table expression.
Module 12: Using Set Operators
This module introduces how to use the set operators UNION, INTERSECT, and EXCEPT to compare rows between two input sets.
Lessons
• Writing Queries with the UNION operator
• Using EXCEPT and INTERSECT
• Using APPLY
Lab: Using Set Operators
• Writing Queries That Use UNION Set Operators and UNION ALL
• Writing Queries That Use CROSS APPLY and OUTER APPLY Operators
• Writing Queries That Use the EXCEPT and INTERSECT Operators
After completing this module, students will be able to:
• Write queries that use UNION to combine input sets.
• Write queries that use UNION ALL to combine input sets
• Write queries that use the EXCEPT operator to return only rows in one set but not another.
• Write queries that use the INTERSECT operator to return only rows that are present in both sets
• Write queries using the CROSS APPLY operator.
• Write queries using the OUTER APPLY operator
Module 13: Using Windows Ranking, Offset, and Aggregate Functions
This module describes the benefits to using window functions. Restrict window functions to rows defined in an OVER clause, including partitions and frames. Write queries that use window functions to operate on a window of rows and return ranking, aggregation, and offset comparison results.
Lessons
• Creating Windows with OVER
• Exploring Window Functions
Lab: Using Windows Ranking, Offset, and Aggregate Functions
• Writing Queries that use Ranking Functions
• Writing Queries that use Offset Functions
• Writing Queries that use Window Aggregate Functions
After completing this module, students will be able to:
• Describe the T-SQL components used to define windows, and the relationships between them.
• Write queries that use the OVER clause, with partitioning, ordering, and framing to define windows
• Write queries that use window aggregate functions.
• Write queries that use window ranking functions.
• Write queries that use window offset functions
Module 14: Pivoting and Grouping Sets
This module describes write queries that pivot and unpivot result sets. Write queries that specify multiple groupings with grouping sets
Lessons
• Writing Queries with PIVOT and UNPIVOT
• Working with Grouping Sets
Lab: Pivoting and Grouping Sets
• Writing Queries that use the PIVOT Operator
• Writing Queries that use the UNPIVOT Operator
• Writing Queries that use the GROUPING SETS CUBE and ROLLUP Subclauses
After completing this module, students will be able to:
• Describe how pivoting data can be used in T-SQL queries.
• Write queries that pivot data from rows to columns using the PIVOT operator.
• Write queries that unpivot data from columns back to rows using the UNPIVOT operator.
• Write queries using the GROUPING SETS subclause.
• Write queries that use ROLLUP AND CUBE.
• Write queries that use the GROUPING_ID function.
Module 15: Executing Stored Procedures
This module describes how to return results by executing stored procedures. Pass parameters to procedures. Create simple stored procedures that encapsulate a SELECT statement. Construct and execute dynamic SQL with EXEC and sp_executesql.
Lessons
• Querying Data with Stored Procedures
• Passing Parameters to Stored procedures
• Creating Simple Stored Procedures
• Working with Dynamic SQL
Lab: Executing Stored Procedures
• Using the EXECUTE statement to Invoke Stored Procedures
• Passing Parameters to Stored procedures
• Executing System Stored Procedures
After completing this module, students will be able to:
• Describe stored procedures and their use.
• Write T-SQL statements that execute stored procedures to return data.
• Write EXECUTE statements that pass input parameters to stored procedures.
• Write T-SQL batches that prepare output parameters and execute stored procedures.
• Use the CREATE PROCEDURE statement to write a stored procedure.
• Create a stored procedure that accepts input parameters.
• Describe how T-SQL can be dynamically constructed.
• Write queries that use dynamic SQL.
Module 16: Programming with T-SQL
This module describes how to enhance your T-SQL code with programming elements.
Lessons
• T-SQL Programming Elements
• Controlling Program Flow
Lab: Programming with T-SQL
• Declaring Variables and Delimiting Batches
• Using Control-Of-Flow Elements
• Using Variables in a Dynamic SQL Statement
• Using Synonyms
After completing this module, students will be able to:
• Describe how Microsoft SQL Server treats collections of statements as batches.
• Create and submit batches of T-SQL code for execution by SQL Server.
• Describe how SQL Server stores temporary objects as variables.
• Write code that declares and assigns variables.
• Create and invoke synonyms
• Describe the control-of-flow elements in T-SQL.
• Write T-SQL code using IF...ELSE blocks.
• Write T-SQL code that uses WHILE.
Module 17: Implementing Error Handling
This module introduces error handling for T-SQL.
Lessons
• Implementing T-SQL error handling
• Implementing structured exception handling
Lab: Implementing Error Handling
• Redirecting errors with TRY/CATCH
• Using THROW to pass an error message back to a client
After completing this module, students will be able to:
• Implement T-SQL error handling.
• Implement structured exception handling.
Module 18: Implementing Transactions
This module describes how to implement transactions.
Lessons
• Transactions and the database engines
• Controlling transactions
Lab: Implementing Transactions
• Controlling transactions with BEGIN, COMMIT, and ROLLBACK
• Adding error handling to a CATCH block
After completing this module, students will be able to:
• Describe transactions and the differences between batches and transactions.
• Describe batches and how they are handled by SQL Server.
• Create and manage transactions with transaction control language (TCL) statements.
• Use SET XACT_ABORT to define SQL Servers handling of transactions outside TRY/CATCH blocks.
Prerequisites
• Basic knowledge of the Microsoft Windows operating system and its core functionality.
• Working knowledge of relational databases.
Este treinamento é composto pelos seguintes cursos:
1. Course AZ-100T01-A: Managing Subscriptions and Resources (Carga: 8h)
2. Course AZ-100T02-A: Implementing and Managing Storage (Carga: 8h)
3. Course AZ-100T03-A: Deploying and Managing Virtual Machines (Carga: 8h)
4. Course AZ-100T04-A: Configure and Manage Virtual Networks (Carga: 8h)
5. Course AZ-100T05-A: Manage Identities (Carga: 8h)
_____________________________________
Segue abaixo a descrição dos cursos:
1. Course AZ-100T01-A: Managing Subscriptions and Resources
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
This course teaches IT Professionals how to manage their Azure subscriptions, including access, policies, and compliance, as well as how to track and estimate service usage and related costs. Students also learn how cloud resources are managed in Azure through user and group accounts. Students learn how to grant appropriate access to Azure AD users, groups, and services through Role-based access control (RBAC). Students also discover the core monitoring tools and capabilities provided by Azure, including Azure Alerts and Activity Log. Students are then introduced to Log Analytics as a broad data analytics solution and use this service to query and analyze operational data. Students then learn about the Azure Resource Manager deployment model, and how to work with resources, resource groups and ARM templates.
Because this course is the first course in the series for the Azure Administrator exams, there is a considerable amount of foundational content that is covered here in order to prepare students for the remaining courses in the curriculum. So students are provided with a lesson that covers tips and tricks for working in the Azure portal, as well as an introduction to key tools used in the Azure environment, such as the Cloud Shell and Resource Explorer. Emphasis is laid on PowerShell and the command line interface (CLI) as important skills to acquire not only in preparation for the exam but for the job role itself.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient, they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Manage Azure subscriptions and billing and implement Azure policies.
• Implement access management with Azure users, groups, and role-based access control.
• Use Azure Monitor to configure Azure alerts and review the Azure Activity Log.
• Query and analyze Log Analytics data.
• Deploy resources with ARM templates and organize Azure resources.
• Optimize your use of Azure tools like the Azure portal, Azure PowerShell, Cloud Shell and the Azure CLI.
Course Outline
Module 1: Managing Azure Subscriptions
In this module, you’ll learn about the components that make up an Azure subscription and how management groups are used to organize subscriptions into containers to allow you to control organizational governance and policy management across subscriptions. As well as learning about the different available types of subscription, you’ll see how to apply tags to your Azure resources to logically organize them by categories.
Lessons
• Overview of Azure Subscriptions
• Billing
• Azure Policy
After completing this module, students will be able:
• Manage Azure subscriptions and billing and implement Azure policies.
Module 2: Access Management for Cloud Resources
In this module you will learn the basics of role-based access control as it applies to users and groups. Focus on the administrator role and how it used in Azure.
Lessons
• Azure Users and Groups
• Role-based Access Control
After completing this module, students will be able:
• Implement access management with Azure users, groups, and role-based access control.
Module 3: Monitoring and Diagnostics
In this module, you learn about the Azure Monitor and the many capabilities to ensure your Azure architecture is working correctly. Monitoring skills are explained in this first course and then demonstrated in the following courses. The two main elements explained in this module are Azure Alerts and Azure Activity Log.
Lessons
• Exploring Monitoring Capabilities in Azure
• Azure Alerts
• Azure Activity Log
After completing this module, students will be able:
• Use Azure Monitor to configure Azure alerts and review the Azure Activity Log.
Module 4: Log Analytics
In this module, you will focus on Log Analytics. Log Analytics provides a way for you to collect, analyze, and query all types of connected data. It is a very powerful tool.
Lessons
• Introduction to Log Analytics
• Querying and Analyzing Log Analytics Data
After completing this module, students will be able:
• Query and analyze Log Analytics data.
Module 5: Azure Resource Manager
In this module, you will learn about how resources are organized into resource groups and how ARM templates are used to deploy those resources. This module introduces the concepts and then they are applied in the other courses.
Lessons
• ARM templates
• Resource Groups
After completing this module, students will be able:
• Deploy resources with ARM templates and organize Azure resources.
Module 6: Azure Tips, Tricks, and Tools
This module is provided to help you get the most from your administrative tools. This include the Azure Portal, Cloud Shell, Azure CLI, Azure PowerShell, and Resource Explorer.
Lessons
• Azure Portal
• Azure Tools and Environment
After completing this module, students will be able:
• Optimize your use of Azure tools like the Azure portal, Azure PowerShell, Cloud Shell and the Azure CLI.
Module 7: Lab-Manage Azure Subscriptions and Resources
• This module is provided to give you hands-on experience with the information provided in the course.
Lab : Manage Azure Subscriptions and Resources
• Configure delegation of provisioning and management of Azure resources.
• Verify delegation by provisioning Azure resources.
After completing this module, students will be able to:
•
• Configure delegation of provisioning and management of Azure resources by using built-in Role-Based (RBAC) roles and built-in Azure policies.
• Verify delegation by provisioning Azure resources as a delegated admin and auditing provisioning events.
Prerequisites
Successful Cloud Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
2. Course AZ-100T02-A: Implementing and Managing Storage
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
Thiscourse teaches IT Professionals how to implement Azure storage solutions for a variety of scenarios. Students learn aboutthe different storage accounts and services as well as basic data replication concepts and available replication schemes. Students are also introduced to Storage Explorer as a convenient way to work with Azure storage data. Students also learn the types of storage and how to work with managed and custom disks.
Azure blob storage is how Azure stores unstructured data in the cloud, and students learn how to work with blobs and blob containers. They also learn how to use Azure Files to work with file shares that are accessed via the Server Message Block (SMB) protocol. In addition to blob storage, the course covers Table and Queue storage as storage options for structured data.
Students then learn how to secure and manage storage using Shared Access Signatures (SAS) and Azure Backup, using Recovery ServicesVault. Next, students learn how to use Azure File Sync to centralize an organization’s file Shares in Azure Files. Content Delivery Network (CDN) is used to store cached content on a distributed network of servers that are close to end users. Studentslearn how to optimize content delivery with Azure CDN, as wellas how to transfer large amounts of data using the Azure Import/Export service.
Lastly, students learn how to monitor Azure storage by configuring metrics and alerts and using the Activity Log. Students learn how to analyze usage trends, trace requests, and diagnose issues with a storage account.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient, they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Create Azure storage accounts for different data replication, pricing, and content scenarios.
• Implement virtual machine storage, blob storage, Azure files, and structured storage.
• Secure and manage storage with shared access keys, Azure backup, and Azure File Sync.
• Store and access data using Azure Content Delivery Network, and the Import and Export service.
• Monitor Azure storage with metrics and alerts, and the Activity Log.
Course Outline
Module 1: Overview of Azure Storage
In this module, you’ll learn about storage accounts – Standard and Premium – as well as storage endpoints and how to configure custom domain accounts. You’ll have an opportunity to practice creating and managing storage accounts. The module also covers data replication and provides a comparison of the different available replication schemes. You’ll be introduced to Azure Storage Explorer, a utility that lets you easily work with and manipulate Azure Storage data.
Lessons
• Azure storage accounts
• Data replication
• Azure Storage Explorer
After completing this module, students will be able to:
• Create Azure storage accounts for different data replication, pricing, and content scenarios.
Module 2: Storage Services
In this module, you’ll learn about the disks component of Azure Storage as it relates to virtual machines. Disks are how virtual machines store their VHD files. You will learn about the types of disks and storage and how Azure simplifies IaaS disk management by creating and managing the storage accounts associated with the virtual machine disks. You will also learn about how Azure blob storage stores unstructured data in the cloud as objects, or blobs (BLOB = binary large object). And you’ll explore Azure Files, which offers fully managed file shares in the cloud that are accessible via the Server Message Block (SMB) protocol. The other file storage options covered in the module are Tables and Queues for structured storage.
Lessons
• Virtual machine storage
• Blob storage
• Azure files
• Structured storage
After completing this module, students will be able to:
• Implement virtual machine storage, blob storage, Azure files, and structured storage.
Module 3: Securing and Managing Storage
In this module, discover how a shared access signature (SAS) can be used to provide delegated access to resources in storage accounts, allowing clients access to those resources with sharing the storage account keys. You’ll also learn how to use Azure backup as a cloud-based solution for an existing on-premises or off-site backup and data protection solution. This module also covers Azure File Sync as a way to centralize an organization’s file shares in Azure Files and using Windows Server to cache the Azure file share locally, thus enabling scenarios such as “lift and shift,” backup and disaster recovery, and file archiving.
Lessons
• Shared access keys
• Azure backup
• Azure File Sync
After completing this module, students will be able to:
•
• Secure and manage storage with shared access keys, Azure backup, and Azure File Sync.
Module 4: Storing and Accessing Data
In this module, you’ll learn about using a content delivery network (CDN) to deliver cached content that is stored on a distributed network of edge servers closer to end-users. You’ll also learn how to transfer large amount of data to and from the cloud using the Azure Import/Export service and Azure Data Box.
Lessons
• Azure Content Delivery Network
• Import and Export service
• Data Box
After completing this module, students will be able to:
• Store and access data using Azure Content Delivery Network, the Import and Export service, and Data Box.
Module 5: Monitoring Storage
In this module, you will learn techniques for monitoring the health of Azure storage. With metrics and alerts you can check a variety of performance metrics and send notifications to your system administrator team. With the Activity Log you can search and query for specific events, even across subscriptions.
Lessons
• Metrics and Alerts
• Activity Log
After completing this module, students will be able to:
• Monitor Azure storage with metrics and alerts, and the Activity Log.
Module 6: Lab-Implement and Manage Storage
This module is provided to give you hands-on experience with the information provided in the course.
Lab : Implement and Manage Storage
• Prepare the lab environment.
• Implement and use Azure Blob storage.
• Implement and use Azure File storage.
After completing this module, you will be able to:
• Implement and use Blob storage.
• Implement and use File storage.
Prerequisites
Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
3. Course AZ-100T03-A: Deploying and Managing Virtual Machines
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
This course teaches IT Professionals how to create and manage virtual machines as part of an Infrastructure as a Service (IaaS) computing infrastructure. Students learn how to assess their on-premises environment for virtual machine readiness in preparation for moving resources to the cloud, including sizing, pricing, and design considerations.
Students also learn how to create and deploy virtual machines in Azure, using the Azure portal, PowerShell, and ARM templates. The course includes instruction on deploying custom images and Linux virtual machines. Students also learn how to configure the networking and storage components of virtual machines. Deploying highly available virtual machines is critical in the light of planned and unplanned events, and students learn how to use availability sets to ensure that virtual machine resources are available during downtime. Students also learn how to use extensions and Desired State Configuration (DSC) for post deployment automation and configuration tasks.
Finally, students learn how to perform virtual machine backups, and to use Azure’s monitoring capabilities to collect, view, and analyze virtual machine diagnostic and log data.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient, they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Explain virtual machine usage cases, storage options, pricing, operating systems, networking capabilities, and general planning considerations.
• Create Windows virtual machines in the Azure Portal, with Azure PowerShell, or using ARM Templates.
• Deploy custom server images and Linux virtual machines.
• Configure virtual machine networking and storage options.
• Implement virtual machine high availability, scalability, and custom scripts extensions.
• Backup, restore, and monitor virtual machines.
Course Outline
Module 1: Overview of Azure Machines
In this module, you’ll will be introduced to Azure virtual machines. What are virtual machines and what operating systems are supported? How can you determine if your existing virtual machines can be supported in Azure? What pricing and sizing options are available?
Lessons
• Azure Virtual Machines Overview
• Planning Considerations
After completing this module, students will be able to:
• Explain virtual machine usage cases, storage options, pricing, operating systems, networking capabilities, and general planning considerations.
Module 2: Creating Virtual Machines
In this module, you will learn how to create and configure Windows virtual machines. You will practice in the Azure portal, in Azure PowerShell, and with ARM templates.
Lessons
• Overview of the Virtual Machine Creation Overview
• Creating Virtual Machines in the Azure Portal
• Creating Virtual Machines (PowerShell)
• Creating Virtual Machines using ARM Templates
After completing this module, students will be able to:
• Create Windows virtual machines in the Azure Portal, with Azure PowerShell, or using ARM Templates.
Module 3: Deploying Virtual Machine Images
In this module, you will learn how to create custom virtual machines in Azure. For example, deploying a server image that is in your on-premises datacenter. You will also learn how to create and connect to Linux virtual machines.
Lessons
• Deploying Custom Images
• Deploying Linux Virtual Machines
After completing this module, students will be able to:
• Deploy custom server images and Linux virtual machines.
Module 4: Configuring Virtual Machines
In this module, you will learn about the two main configuration areas for virtual machines: networking and storage. In the networking lesson, we will cover IP addressing, network interfaces, and network security groups. In the storage lesson, we will cover virtual machine disks, managed disks, attaching/detaching disks, and uploading disks.
Lessons
• Overview of Virtual Machine Configuration
• Virtual Machine Networking
• Virtual Machine Storage
After completing this module, students will be able to:
• Configure virtual machine networking and storage options.
Module 5: Configuring Availability and Extensibility
In this module, you will learn how to keep your virtual machines highly available with update and fault domains, and availability sets. You will also learn how to use scale sets to increase and decrease the number of the virtual machines as the workload changes. Lastly, virtual machines can be extended through custom scripts and Desired State Configuration.
Lessons
• Virtual Machine Availability
• Virtual Machine Scalability
• Applying Virtual Machine Extensions
After completing this module, students will be able to:
• Implement virtual machine high availability, scalability, and custom scripts extensions.
Module 6: Managing and Monitoring Virtual Machines
In this module, you will learn the very important tasks of backing up your virtual machines and monitoring their overall health. You will practice backing up and restoring virtual machines. You will learn about monitoring, diagnostics, and Azure Advisor.
Lessons
• Backup and Restore
• Monitoring Virtual Machines
After completing this module, students will be able to:
• Backup, restore, and monitor virtual machines.
Module 7: Lab - Deploy and Manage Virtual Machines
This module is provided to give you hands-on experience with the information provided in the course.
Lab : Deploy and Manage Virtual Machines
• Deploy virtual machines.
• Configure networking setting for virtual machines.
• Configure Azure virtual machine scale sets.
After completing this module, you will be able to:
• Deploy Azure VMs by using the Azure portal, Azure PowerShell, and Azure Resource Manager templates.
• Configure networking settings of Azure VMs running Windows and Linux operating systems.
• Deploy and configure Azure VM scale sets.
Prerequisites
Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
4. Course AZ-100T04-A: Configure and Manage Virtual Networks
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
This course teaches IT Professional how to configure and manage Azure virtual networks (VNets). The benefits of moving an infrastructure to the cloud, removing the need to maintain expensive datacenters are an appealing proposition for many small and medium-sized companies. Regardless, once resources are moved to Azure, they require the same networking functionality as an on-premises deployment, and this course deals with the basic network configuration tasks.
Students review the basis of IP addressing, with specific emphasis on how public and private IP addressing works in the cloud. Students learn how to configure network routing and how to implement Azure DNS.
Securing the network infrastructure is of key importance and students learn how to use Network Security Groups (NSGs) to limit network traffic to resources in a virtual network, by creating security rules that allow or deny inbound or outbound traffic. Students also learn how to use NSG logging to diagnose and troubleshoot network connectivity problems.
The course also covers different connectivity scenarios for Azure virtual networks and students learn how to connect virtual networks with VNet-to-VNet VPN gateways and virtual network peering.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient, they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Understand virtual networking components, IP addressing, and network routing options.
• Implement Azure DNS domains, zones, record types, and resolution methods.
• Configure network security groups, service endpoints, logging, and network troubleshooting.
• Implement site connectivity schemas including VNet-to-VNet connections and virtual network peering.
Course Outline
Module 1: Azure Virtual Networks
In this module, you’ll will be introduced to Azure virtual networks. What are virtual networks and how are they organized? How do you create and configure virtual networks with templates, PowerShell, CLI, or the Azure portal? What is the difference between public, private, static, and dynamic IP addressing? How are system routes, routing tables, and routing algorithms used?
Lessons
• Introducing Virtual Networks
• Creating Azure Virtual Networks
• Review of IP Addressing
• Network Routing
After completing this module, students will be able to:
• Understand virtual networking components, IP addressing, and network routing options.
Module 2: Azure DNS
In this module, you will learn about DNS basics and specifically implementing Azure DNS. In the DNS Basics lesson you will review DNS domains, zones, record types, and resolution methods. In the Azure DNS lesson, we will cover delegation, metrics, alerts, and DNS hosting schemes.
Lessons
• Azure DNS Basics
• Implementing Azure DNS
After completing this module, students will be able to:
• Implement Azure DNS domains, zones, record types, and resolution methods.
Module 3: Securing Virtual Network Resources
In this module, you will learn primarily about Network Security Groups (NSGs) including NSG rules and NSG scenarios. You will also learn how to implement NSGs considering service endpoints, logging, troubleshooting, and other network traffic.
Lessons
• Introduction to Network Security Groups
• Implementing Network Security Groups and Service Endpoints
After completing this module, students will be able to:
• Configure network security groups, service endpoints, logging, and network troubleshooting.
Module 4: Connecting Virtual Networks
In this module, you will learn about two specific types of intersite connectivity: VNet-to-VNet connections and VNet Peering. In both cases, you will learn when to choose which connectivity method, and how to implement and configure the method.
Lessons
• Intersite Connectivity (VNet-to-VNet Connections)
• Virtual Network Peering
After completing this module, students will be able to:
• Implement site connectivity schemas including VNet-to-VNet connections and virtual network peering.
Module 5: Lab - Configure and Manage Virtual Networks
This module is provided to give you hands-on experience with the information provided in the course.
Lab : Configure and Manage Virtual Networks
• Prepare the lab environment.
• Configure VNet peering.
• Implement custom routing.
• Validating service chaining.
After completing this module, you will be able to:
• Configure VNet peering.
• Implement custom routing.
• Validate service chaining.
Prerequisites
Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
5. Course AZ-100T05-A: Manage Identities
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
This course teaches IT Professional how to use Azure Active Directory (AD) to provide employees and customers with a multi-tenant cloud-based directory and identity management system. Students will learn the differences between Azure AD and Active Directory Domain Services (AD DS), as well the differences in functionality offered by the different editions of Azure AD. Students also learn how to configure self-service password reset, or to use the option of password writeback to reset user passwords regardless of their location. Students are then introduced to Azure AD Identity Protection and learn how they can use it to protect their organizations from compromised accounts, identity attacks, and configuration issues. Students also learn how to integrate Azure AD with the many Software as a Service (SaaS) applications that are used, in order to secure user access to those applications.
Next, the concepts of Azure domains and tenants, and users and groups are explained and students learn how to work with the various Azure AD objects. Students are introduced to Azure role-based access control to be able to provide a more granular access based on the principle of least privilege. An administrator, or user, can do exactly the task they need to accomplish; no more, no less. Students also learn how to work with Azure joined devices and Hybrid AD joined devices, enabling their users to be productive wherever and whenever – but ensuring that corporate assets are protected and that devices meet security and compliance standards.
Students learn how to use Azure AD Connect to integrate their on-premises directories with Azure AD, providing a common identity for their users of Office 365, Azure, and SaaS applications integrated with Azure AD. Lastly, students also learn how to use Azure AD Application Proxy to be able to provide their users with remote access to web application that are published on-premises, such as SharePoint sites, Outlook Web Access, or any other line of business (LOB) applications the organization has.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Implement Azure Active Directory, Self-Service Password Reset, Azure AD Identity Protection, and integrated SaaS applications.
• Configure domains and tenants, users and groups, roles, and devices.
• Implement and manage Azure Active Directory integration options and Azure AD Application Proxy.
Course Outline
Module 1: Managing Azure Active Directory
In this module, you’ll will be introduced to Azure Active Directory. What is Azure Active Directory and how is it different from Active Directory Domain Services? What is Self-Service Password Reset and how is it configured? How can Azure AD Identity protection improve your security posture. How do you integrate SaaS applications with Azure AD?
Lessons
• Azure Active Directory Overview
• Self-Service Password Reset
• Azure AD Identity Protection
• Integrating SaaS Applications with Azure AD
After completing this module, students will be able to:
• Implement Azure Active Directory, Self-Service Password Reset, Azure AD Identity Protection, and integrated SaaS applications.
Module 2: Managing Azure Active Directory Objects
In this module, you will learn the basics of implementing Azure AD objects. These objects include domains and tenants, users and groups, roles, and devices. In each lesson you will practice how to configure these objects through the portal and with Azure PowerShell. The Azure roles lesson will be your introduction to role-based access control.
Lessons
• Azure Domains and Tenants
• Azure Users and Groups
• Azure Roles
• Managing Devices
After completing this module, students will be able to:
• Configure domains and tenants, users and groups, roles, and devices.
Module 3: Implementing and Managing Hybrid Identities
In this module, you will learn how to integrate Active Directory with your existing infrastructure. You will learn about different authentication options like AD Connect, Single Sign On, and Pass-through authentication. You will also learn how to configure Azure AD Application Proxy and how it is used.
Lessons
• Azure Active Directory Integration Options
• Azure AD Application Proxy
After completing this module, students will be able to:
• Implement and manage Azure Active Directory integration options and Azure AD Application Proxy.
Module 4: Lab - Implement and Manage Hybrid Identities
This module is provided to give you hands-on experience with the information provided in the course.
Lab : Implement and Manage Hybrid Identities
• Deploy a VM with an AD domain controller
• Create and configure an Azure AD tenant
• Synchronize an AD forest with an Azure AD tenant
After completing this module, you will be able to:
• Deploy an Azure VM hosting an Active Directory domain controller.
• Create and configure an Azure Active Directory tenant.
• Synchronize Active Directory forest with an Azure Active Directory tenant.
Prerequisites
Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
Overview
Type: Course
Audience(s): Developer
Technology: Cross-Platform Development
Level: Advanced
This Revision: D
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
In this course, students will learn how to design and develop services that access local and remote data from various sources. Students will also learn how to develop and deploy services to hybrid environments, including on-premises servers and Microsoft Azure.
Audience profile
Primary: .NET developers who want to learn how to develop services and deploy them to hybrid environments.
Secondary: .NET developers with Web application development experience who are exploring developing new applications or porting existing applications to Microsoft Azure.
At course completion
After completing this course, students will be able to:
• Describe the basic concepts of service development and data access strategies using the .NET platform.
• Describe the Microsoft Azure cloud platform and its compute, data, and application hosting offerings.
• Design and develop a data-centric application using Visual Studio 2017 and Entity Framework Core.
• Design, implement, and consume HTTP services using ASP.NET Core.
• Extend HTTP services using ASP.NET Core.
• Host services on-premises and in Microsoft Azure.
• Deploy services to both on-premises and cloud environments and manage the interface and policy for their services.
• Choose a data storage solution, cache, distribute, and synchronize data.
• Monitor, log, and troubleshoot services.
• Describe claim-based identity concepts and standards, and implement authentication and authorization with Azure Active Directory.
• Create scalable service applications.
Course Outline
Module 1: Overview of service and cloud technologies
This module provides an overview of service and cloud technologies using the Microsoft .NET Core and the Azure. The first lesson, “Key Components of Distributed Applications,” discusses characteristics that are common to distributed systems, regardless of the technologies they use. Lesson 2, “Data and Data Access Technologies” describes how data is used in distributed applications. Lesson 3, “Service Technologies,” discusses two of the most common protocols in distributed system and the .NET Core technologies used to develop services based on those protocols. Lesson 4, “Cloud Computing,” describes cloud computing and how it is implemented in Azure.
Lessons
• Key Components of Distributed Applications
• Data and Data Access Technologies
• Service Technologies
• Cloud Computing
• Manipulating Data
Lab : Exploring the Work Environment
• Creating an ASP.NET Core project
• Create a simple Entity Framework model
• Create a web API class
• Deploy the web application to Azure
After completing this module, students will be able to:
• Explain services architecture and hosting environments
• Explain cloud computing and the Microsoft Azure cloud platform
• Explain data access strategies
Module 2: Querying and Manipulating Data Using Entity Framework
In this module, you will learn about the Entity Framework data model, and about how to create, read, update, and delete data. Entity Framework is a rich object-relational mapper, which provides a convenient and powerful application programming interface (API) to manipulate data. This module focuses on the Code First approach with Entity Framework.
Lessons
• ADO.NET Overview
• Creating an Entity Data Model
• Querying Data
Lab : Creating a Data Access Layer using Entity Framework
• Creating a data model
• Query the Database
Lab : Manipulating Data
• Create repository methods
• Test the model using SQL Server and SQLite
After completing this module, students will be able to:
• Describe basic objects in ADO.NET and explain how asynchronous operations work.
• Create an Entity Framework Core data model.
• Query data by using Entity Framework Core.
• Insert, delete, and update entities by using Entity Framework Core.
Module 3: Creating and Consuming ASP.NET Core Web APIs
ASP.NET Core Web API provides a robust and modern framework for creating Hypertext Transfer Protocol (HTTP)-based services. In this module, you will be introduced to the HTTP-based services. You will learn how HTTP works and become familiar with HTTP messages, HTTP methods, status codes, and headers. You will also be introduced to the Representational State Transfer (REST) architectural style and hypermedia. You will learn how to create HTTP-based services by using ASP.NET Core Web API. You will also learn how to consume them from various clients. After Lesson 3, in the lab "Creating an ASP.NET Core Web APIs", you will create a web API and consume it from a client.
Lessons
• HTTP Services
• Creating an ASP.NET Core Web API
• Consuming ASP.NET Core Web APIs
• Handling HTTP Requests and Responses
• Automatically Generating HTTP Requests and Responses
Lab : Creating an ASP.NET Core Web API
• Create a controller class
• Use the API from a browser
• Create a client
After completing this module, students will be able to:
• Design services by using the HTTP protocol.
• Create services by using ASP.NET Core Web API.
• Use the HttpRequest/IActionResult classes to control HTTP messages.
• Consume ASP.NET Web API services.
Module 4: Extending ASP.NET Core HTTP Services
ASP.NET Core Web API provides a complete solution for building HTTP services, but services often have various needs and dependencies. In many cases, you will need to extend or customize the way ASP.NET Core Web API executes your service. Handling needs such as applying error handling and logging integrate with other components of your application and supporting other standards that are available in the HTTP world. Understanding the way ASP.NET Core Web API works is important when you extend ASP.NET Core Web API. The division of responsibilities between components and the order of execution are important when intervening with the way ASP.NET Core Web API executes. Finally, with ASP.NET Core Web API, you can also extend the way you interact with other parts of your system. With the dependency resolver mechanism, you can control how instances of your service are created, giving you complete control on managing dependencies of the services.
Lessons
• The ASP.NET Core Request Pipeline
• Customizing Controllers and Actions
• Injecting Dependencies into Controllers
Lab : Customizing the ASP.NET Core Pipeline
• Use Dependency Injection to Get a Repository Object
• Create a Cache Filter
• Create a Debugging Middleware
After completing this module, students will be able to:
• Extend the ASP.NET Web API request and response pipeline.
• Customize Controllers and Actions.
• Inject dependencies into ASP.NET Web API controllers.
Module 5: Hosting Services On-Premises and in Azure
In this module you will learn how to host your application on-premises and on Azure. You will also learn about Docker containers, and writing serverless applications with Azure functions.
Lessons
• Hosting Services on-premises
• Hosting Services in Azure App Service
• Packaging Services in Containers
• Implementing Serverless Services
Lab : Host an ASP.NET Core service in a Windows Service
• Creating a new ASP.NET Core Application
• Registering the Windows Service
Lab : Host an ASP.NET Core Web API in an Azure Web App
• Create a Web App in the Azure portal
• Deploy an ASP.NET Core Web API to the Web App
Lab : Host an ASP.NET Core service in Azure Container Instances
• Publish the service to a Docker container
• Host the service in Azure Container Instances
Lab : Implement an Azure Function
• Develop the service locally
• Deploy the service to Azure Functions
After completing this module, students will be able:
• Host services on-premises by using Windows services and Microsoft Internet Information Services (IIS).
• Host services in the Azure cloud environment by using Web Apps, Docker containers, and Azure Functions.
• Package services in containers.
• Implement serverless services.
Module 6: Deploying and Managing Services
In this module, you will learn about Web Deploy and how to deploy web applications by using Web Deploy in Visual Studio. You will also learn how to define continuous integration and continuous delivery pipelines and how to use Azure API Management and OpenAPI to provide robust, secure, and reliable APIs to your customers.
Lessons
• Web Deployment with Visual Studio 2017
• Continuous Delivery with Visual Studio Team Services
• Deploying Applications to Staging and Production Environments
• Defining Service Interfaces with Azure API Management
Lab : Deploying an ASP.NET Core web service on Linux
• Publish the ASP.NET Core web service for Linux
• Configure Nginx as a reverse proxy
Lab : Deploying to Staging and Production
• Deploy the application to production
• Create a staging slot
• Swap the Environments
Lab : Publishing a Web API with Azure API Management
• Creating an Azure API Management instance
• Testing and managing the API
After completing this module, students will be able to:
• Explain Microsoft Internet Information Services (IIS) Web Deploy.
• Explain Azure Web Apps deployment by using a Microsoft Visual Studio Team Services build pipeline.
• Explain how to deploy web services to Azure Container Instances.
• Explain how to define service interfaces by using API Management and Swagger.
• Explain how to define policies by using API Management.
• Explain defining service interfaces using Azure API Management and Swagger
Module 7: Implementing Data Storage in Azure
This module explains how to store and access data stored in Azure Storage. It also explains how to configure storage access rights for storage containers and content.
Lessons
• Choosing a Data Storage Mechanism
• Accessing Data in Azure Storage
• Working with Structured Data in Azure
• Geographically Distributing Data with Azure CDN
• Scaling with Out-of-Process Cache
Lab : Storing Files in Azure Storage
• Store publicly accessible files in Azure Blobs
• Generate and store private files in Azure Blobs
Lab : Querying Graph Data with CosmosDB
• Create the CosmosDB graph database
• Query the CosmosDB database
Lab : Caching out-of-process with Azure Redis cache
• Create the Azure Redis Cache service
• Access the cache service from code
• Test the application
After completing this module, students will be able to:
• Describe the architecture of Storage.
• Control access to your Storage items.
• Cache data using Azure Cache for Redis.
• Distribute data by using Microsoft Azure Content Delivery Network.
Module 8: Diagnostics and Monitoring
This module explains how to monitor and log services, both on-premises and in Azure.
Lessons
• Logging in ASP.NET Core
• Diagnostic Tools
• Application Insights
Lab : Monitoring ASP.NET Core with ETW and LTTng
• Collect and view ETW events
• Collect and view LTTng events
Lab : Monitoring Azure Web Apps with Application Insights
• Add the Application Insights SDK
• Load test the web service
• Analyze the performance results
After completing this module, students will be able to:
• Explain trace listeners
• Explain performance counters
• Explain ETW and LTTng events
• Demonstrate using App Insights to monitor services
Module 9: Securing services on-premises and in Microsoft Azure
This module describes claim-based identity concepts and standards, and how to implement authentication and authorization by using Azure Active Directory to secure an ASP.NET Core Web API service.
Lessons
• Explaining Security Terminology
• Securing Services with ASP.NET Core Identity
• Securing Services with Azure Active Directory
Lab : Using ASP.NET Core Identity
• Add ASP.NET Core Identity middleware
• Add authorization code
• Run a client application to test the server
Lab : Using Azure Active Directory with ASP.NET Core
• Authenticate a client application using AAD B2C and MSAL.js
Module 10: Scaling Services
This module explains how to create scalable services and applications and scale them automatically using Web Apps load balancers, Azure Application Gateway and Azure Traffic Manager.
Lessons
• Introduction to Scalability
• Automatic Scaling
• Azure Application Gateway and Traffic Manager
Lab : Load Balancing Azure Web Apps
• Prepare the application for load-balancing
• Test the load balancing with instance affinity
• Test the load balancing without affinity
Lab : Load Balancing with Azure Traffic Manager
• Deploy an Azure Web App to multiple regions
• Create an Azure Traffic Manager profile
After completing this module, students will be able to:
• Explain the need for scalability.
• Describe how to use load balancing for scaling services.
• Explain Azure Load Balancer, Azure Application Gateway, and Azure Traffic Manager.
Prerequisites
Before attending this course, students must have:
• Experience with C# programming, and concepts such as lambda expressions, LINQ, and anonymous types
• Understanding the concepts of n-tier applications
• Experience with querying and manipulating data with ADO.NET
Overview
Audience(s): Information Workers
Technology: SQL Server
Level: Advanced
This Revision: B
Delivery method: Classroom
Length: 3 days
Language(s): English
About this course
The main purpose of the course is to give students a good understanding of data analysis with Power BI. The course includes creating visualizations, the Power BI Service, and the Power BI Mobile App.
Audience profile
The course will likely be attended by SQL Server report creators who are interested in alternative methods of presenting data.
At course completion
After completing this course, students will be able to:
• Perform Power BI desktop data transformation.
• Describe Power BI desktop modelling.
• Create a Power BI desktop visualization.
• Implement the Power BI service.
• Describe how to connect to Excel data.
• Describe how to collaborate with Power BI data.
• Connect directly to data stores.
• Describe the Power BI developer API.
• Describe the Power BI mobile app.
Course Outline
Module 1: Introduction to Self-Service BI Solutions
Introduces business intelligence (BI) and how to self-serve with BI.
Lessons
• Introduction to business intelligence
• Introduction to data analysis
• Introduction to data visualization
• Overview of self-service BI
• Considerations for self-service BI
• Microsoft tools for self-service BI
Lab: Exploring an Enterprise BI solution
• Viewing reports
• Creating a Power BI report
• Creating a Power BI dashboard
After completing this module, students will be able to:
• Describe the trends in BI
• Describe the process of data analysis in Power BI.
• Use the key visualizations in Power BI.
• Describe the rationale for self-service BI.
• Describe considerations for self-service BI.
• Understand how you can use Microsoft products to implement a BI solution.
Module 2: Introducing Power BI
This module introduces Power BI desktop, and explores the features that enable the rapid creation and publication of sophisticated data visualizations.
Lessons
• Power BI
• The Power BI service
Lab: Creating a Power BI dashboard
• Connecting to Power BI data
• Create a Power BI dashboard
After completing this module, students will be able to:
• Develop reports using the Power BI Desktop app.
• Use report items to create dashboards on the Power BI portal.
• Understand the components of the Power BI service including licensing and tenant management.
Module 3: Power BI
At the end of this module students will be able to explain the rationale and advantages of using Power BI.
Lessons
• Using Excel as a data source for Power BI
• The Power BI data model
• Using databases as a data source for Power BI
• The Power BI service
Lab: Importing data into Power BI
• Importing Excel files into Power BI
• Viewing reports from Excel files
After completing this module, students will be able to:
• Describe the data model and know how to optimize data within the model.
• Connect to Excel files and import data
• Use on-premises and cloud Microsoft SQL Server databases as a data source, along with the R script data connector
• Take advantage of the features of the Power BI service by using Q&A to ask questions in natural query language, and create content packs and groups.
Module 4: Shaping and Combining Data
With Power BI desktop you can shape and combine data with powerful, buil-in tools. This module introduces the tools that are available for preparing your data, and transforming it into a form ready for reporting.
Lessons
• Power BI desktop queries
• Shaping data
• Combining data
Lab: Shaping and combining data
• Shape power BI data
• Combine Power BI data
After completing this module, students will be able to:
• Perform a range of query editing skills in Power BI
• Shape data, using formatting and transformations.
• Combine data together from tables in your dataset.
Module 5: Modeling data
This module describes how to shape and enhance data.
Lessons
• Relationships
• DAX queries
• Calculations and measures
Lab: Modeling Data
• Create relationships
• Calculations
After completing this module, students will be able to:
• Describe relationships between data tables.
• Understand the DAX syntax, and use DAX functions to enhance your dataset.
• Create calculated columns, calculated tables and measures.
Module 6: Interactive Data Visualizations
This module describes how to create and manage interactive data visualizations.
Lessons
• Creating Power BI reports
• Managing a Power BI solution
Lab: Creating a Power BI report
• Connecting to Power BI data
• Building Power BI reports
• Creating a Power BI dashboard
After completing this module, students will be able to:
• Use Power Bi desktop to create interactive data visualizations.
• Manage a power BI solution.
Module 7: Direct Connectivity
This module describes various connectivity options using Power BI.
Lessons
• Cloud data
• Connecting to analysis services
Lab: Direct Connectivity
• Direct connectivity from Power BI desktop
• Direct connectivity from the Power BI service
After completing this module, students will be able to:
• Use Power BI direct connectivity to access data in Azure SQL data warehouse, in addition to big data sources such as Hadoop
• Use Power BI with SQL Server Analysis Services data, including Analysis services modles running in multidimentional mode.
Module 8: The Developer API
This module describes the developer API within Power BI.
Lessons
• The developer API
• Custom visuals
Lab: Using the developer API
• Using custom visuals
After completing this module, students will be able to:
• Describe the developer API.
• Use the developer API to create custom visuals.
Module 9: Power BI mobile app
This module describes the Power BI mobile app.
Lessons
• Power BI mobile apps
• Using the Power BI mobile app
• Power BI embedded
After completing this module, students will be able to:
• Describe the Power BI mobile app.
• Download and use the Power BI mobile app.
• Describe Power BI embedded and when you would want to use it.
Prerequisites
Before attending this course, students must have:
• Excellent knowledge of relational databases and reporting.
• Some basic knowledge of data warehouse schema topology (including star and snowflake schemas).
• Some exposure to basic programming constructs (such as looping and branching).
• An awareness of key business priorities such as revenue, profitability, and financial accounting is desirable.
• Familiarity with Microsoft Office applications – particularly Excel.
Visão Global
A LGPD - Lei Geral de Proteção de Dados (Lei nº. 13.709/2018), sancionada no Brasil em 14 de agosto de 2018, protege os direitos de pessoas físicas, quanto ao uso dos seus dados pelas empresas.
Essa Lei dispõe sobre o tratamento de dados individuais, inclusive nos meios digitais, por pessoa de direito público ou privado.
O curso abrange os principais assuntos relacionados à LGPD, bem como a forma de implementar ações na prática para estar adequado a ela.
Público alvo
Todos os colaboradores precisam ter uma compreensão da proteção de dados e dos requisitos legais, conforme definido na LGPD. Portanto, esse curso é indicado para todos os profissionais que atuam de alguma forma, dentro do ciclo de vida dos dados, ou seja, da coleta, processamento, análise, publicação, armazenamento até a reutilização.
Carga Horária
40 horas
Conteúdo
1. Privacidade e Proteção de Dados: Fundamentos & Regulamentação
1.1 Definições
1.2 Dados Pessoais
1.3 Fundamentos & Princípios
1.4 Bases Legais para o Tratamento de Dados
1.5 Direitos do Titular dos Dados Pessoais
1.6 Violação de Dados Pessoais & Procedimentos Relacionados
1.7 Questões para fixação de entendimento
2. Organizando a Proteção de Dados
2.1 A Importância da Proteção de Dados
2.2 Tipos de Tratamento de Dados
2.3 Autoridade Supervisora
2.4 Transferência de Dados Pessoais para Outros Países
2.5 Transferência de Dados Pessoais entre Controladores e Operadores
2.6 Revogação do Consentimento
2.7 Término do Tratamento de Dados
2.8 Exceções de Inaplicabilidade da Lei
2.9 Papéis e Responsabilidades do DPO
2.10 Papéis e Responsabilidades do Processador e Operador
2.11 Questões para fixação de entendimento
3. Práticas de Proteção de Dados
3.1 Proteção de Dados by Design por Padrão
3.2 Avaliação de Impacto sobre a Proteção de Dados
3.3 Aplicações Práticas Relacionadas ao Uso de Dados
3.4 Questões para fixação de entendimento
4. Análise de Riscos e Implantação da LGPD
4.1 Avaliação e Classificação dos Tipos de Dados Coletados
4.2 Elaboração de Assessment para Diagnóstico de Tratamento de Dados
4.3 Estudo sobre Adequação às Bases Legais de Tratamento de Dados
4.4 Adequação: Pessoas, Processos, Sistemas e Documentações
4.5 Exercícios e Laboratórios
5. Programa de Privacidade & Proteção de Dados
5.1 Entendendo a carreira de DPO
5.2 Orientações sobre as certificações
Pré-requisitos
Nenhum
Overview
Audience(s): IT Professionals
Technology: Windows Server
Level: Intermediate
This Revision: C
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This five-day course is designed primarily for IT professionals who have some experience with Windows Server. It is designed for professionals who will be responsible for managing storage and compute by using Windows Server 2016, and who need to understand the scenarios, requirements, and storage and compute options that are available and applicable to Windows Server 2016.
Audience profile
This course is intended for IT professionals who have some experience working with Windows Server, and who are looking for a single five-day course that covers storage and compute technologies in Windows Server 2016. This course will help them update their knowledge and skills related to storage and compute for Windows Server 2016.
Candidates suitable for this course would be:
•Windows Server administrators who are relatively new to Windows Server administration and related technologies, and who want to learn more about the storage and compute features in Windows Server 2016.
•IT professionals with general IT knowledge who are looking to gain knowledge about Windows Server especially around storage and compute technologies in Windows Server 2016.
The secondary audience for this course are IT professionals looking to take the Microsoft 70-740 certification exam, Installation, Storage and Compute with Windows Server 2016.
At course completion
After completing this course, students will be able to:
• Prepare and install Nano Server, a Server Core installation, and plan a server upgrade and migration strategy.
• Describe the various storage options, including partition table formats, basic and dynamic disks, file systems, virtual hard disks, and drive hardware, and explain how to manage disks and volumes.
• Describe enterprise storage solutions, and select the appropriate solution for a given situation.
• Implement and manage Storage Spaces and Data Deduplication.
• Install and configure Microsoft Hyper-V, and configure virtual machines.
• Deploy, configure, and manage Windows and Hyper-V containers.
• Describe the high availability and disaster recovery technologies in Windows Server 2016.
• Plan, create, and manage a failover cluster.
• Implement failover clustering for Hyper-V virtual machines.
• Configure a Network Load Balancing (NLB) cluster, and plan for an NLB implementation.
• Create and manage deployment images.
• Manage, monitor, and maintain virtual machine installations.
Course Outline
Module 1: Installing, upgrading, and migrating servers and workloads
This module describes the new features of Windows Server 2016, and explains how to prepare for and install Nano Server and Server Core. This module also describes how to plan a server upgrade and migration strategy, and explains how to perform a migration of server roles and workloads within and across domains. Finally, this module explains how to choose an activation model based on your environment characteristics.
Lessons
• Introducing Windows Server 2016
• Preparing and installing Server Core
• Preparing for upgrades and migrations
• Migrating server roles and workloads
• Windows Server activation models
Lab : Installing and configuring Server Core
• Installing Server Core
• Completing post-installation tasks on Windows Server 2016 Core
• Performing remote management
After completing this module, students will be able to:
• Describe the new features of Windows Server 2016.
• Prepare for and install Server Core.
• Plan a server upgrade and migration strategy.
• Perform a migration of server roles and workloads within a domain and across domains.
• Choose an appropriate activation model.
Module 2: Configuring local storage
This module explains how to manage disks and volumes in Windows Server 2016.
Lessons
• Managing disks in Windows Server
• Managing volumes in Windows Server
Lab : Configuring local storage
• Creating and managing volumes
• Resizing volumes
• Managing virtual hard disks
After completing this module, students will be able to:
• Manage disks in Windows Server.
• Manage volumes in Windows Server.
Module 3: Implementing enterprise storage solutions
This module discusses direct-attached storage (DAS), network-attached storage (NAS), and storage area networks (SANs). It also explains the purpose of Microsoft Internet Storage Name Service (iSNS) Server, data center bridging (DCB), and Multipath I/O (MPIO). Additionally, this module compares Fibre Channel, Internet Small Computer System Interface (iSCSI), and Fibre Channel over Ethernet (FCoE), and describes how to configure sharing in Windows Server 2016.
Lessons
• Overview of DAS, NAS, and SANs
• Comparing Fibre Channel, iSCSI, and Fibre Channel over Ethernet
• Understanding iSNS, DCB, and MPIO
• Configuring sharing in Windows Server 2016
Lab : Planning and configuring storage technologies and components
• Planning storage requirements
• Configuring iSCSI storage
• Configuring and managing the share infrastructure
After completing this module, students will be able to:
• Describe DAS, NAS, and SANs.
• Compare Fibre Channel, iSCSI, and FCoE.
• Explain the use of iSNS, DCB, and MPIO.
• Configure sharing in Windows Server.
Module 4: Implementing Storage Spaces and Data Deduplication
This module explains how to implement and manage Storage Spaces. This module also explains how to implement Data Deduplication.
Lessons
• Implementing Storage Spaces
• Managing Storage Spaces
• Implementing Data Deduplication
Lab : Implementing Storage Spaces
• Creating a Storage Space
Lab : Implementing Data Deduplication
• Installing Data Deduplication
• Configuring Data Deduplication
After completing this module, students will be able to:
• Describe and implement the Storage Spaces feature in the context of enterprise storage needs.
• Manage and maintain Storage Spaces.
• Describe and implement Data Deduplication.
Module 5: Installing and configuring Hyper-V and virtual machines
This module provides an overview of Hyper-V and virtualization. It explains how to install Hyper-V, and how to configure storage and networking on Hyper-V host servers. Additionally, it explains how to configure and manage Hyper-V virtual machines.
Lessons
• Overview of Hyper-V
• Installing Hyper-V
• Configuring storage on Hyper-V host servers
• Configuring networking on Hyper-V host servers
• Configuring Hyper-V virtual machines
• Managing virtual machines
Lab : Installing and configuring Hyper-V
• Verify installation of the Hyper-V server role
• Configuring Hyper-V networks
• Creating and configuring virtual machines
• Enable nested virtualization for a virtual machine
After completing this module, students will be able to:
• Describe Hyper-V and virtualization.
• Install Hyper-V.
• Configure storage on Hyper-V host servers.
• Configure networking on Hyper-V host servers.
• Configure Hyper-V virtual machines.
• Manage Hyper-V virtual machines.
Module 6: Deploying and managing Windows and Hyper-V containers
This module provides an overview of containers in Windows Server 2016. Additionally, this module explains how to deploy Windows Server and Hyper-V containers. It also explains how to install, configure, and manage containers by using Docker.
Lessons
• Overview of containers in Windows Server 2016
• Deploying Windows Server and Hyper-V containers
• Installing, configuring, and managing containers by using Docker
Lab : Installing and configuring containers
• Installing and configuring Windows Server containers by using Windows PowerShell
• Installing and configuring Windows Server containers by using Docker
After completing this module, students will be able to:
• Describe containers in Windows Server 2016.
• Explain how to deploy containers.
• Explain how to install, configure, and manage containers using Docker.
Module 7: Overview of high availability and disaster recovery
This module provides an overview of high availability and high availability with failover clustering in Windows Server 2016. It further explains how to plan high availability and disaster recovery solutions with Hyper-V virtual machines. Additionally, this module explains how to back up and restore the Windows Server 2016 operating system and data by using Windows Server Backup.
Lessons
• Defining levels of availability
• Planning high availability and disaster recovery solutions with Hyper-V virtual machines
• Backing up and restoring by using Windows Server Backup
• High availability with failover clustering in Windows Server 2016
Lab : Planning and implementing a high availability and disaster recovery solution
• Determining the appropriate high availability and disaster recovery solution
• Implementing storage migration
• Configuring Hyper-V replicas
After completing this module, students will be able to:
• Define levels of availability.
• Plan high availability and disaster recovery solutions with Hyper-V virtual machines.
• Back up and restore data by using Windows Server Backup.
• Describe high availability with failover clustering in Windows Server 2016.
Module 8: Implementing failover clustering
This module explains how to plan for failover clustering. It also explains how to create, manage, and troubleshoot a failover cluster.
Lessons
• Planning a failover cluster
• Creating and configuring a new failover cluster
• Maintaining a failover cluster
• Troubleshooting a failover cluster
• Implementing site high availability with stretch clustering
Lab : Implementing failover clustering
• Creating a failover cluster
• Verifying quorum settings and adding a node
Lab : Managing a failover cluster
• Evicting a node and verifying quorum settings
• Changing the quorum from disk witness to file-share witness, and defining node voting
• Verifying high availability
After completing this module, students will be able to:
• Plan for a failover-clustering implementation.
• Create and configure a failover cluster.
• Maintain a failover cluster.
• Troubleshoot a failover cluster.
• Implement high availability and stretch clustering for a site.
Module 9: Implementing failover clustering with Windows Server 2016 Hyper-V
This module describes how Hyper-V integrates with failover clustering. It also explains how to implement Hyper-V virtual machines (VMs) in failover clusters.
Lessons
• Overview of the integration of Hyper-V Server 2016 with failover clustering
• Implementing Hyper-V VMs on failover clusters
• Key features for VMs in a clustered environment
Lab : Implementing failover clustering with Windows Server 2016 Hyper-V
• Configure iSCSI storage
• Configuring a failover cluster for Hyper-V
• Configuring a highly available VM
After completing this module, students will be able to:
• Describe how Hyper-V integrates with failover clustering.
• Implement Hyper-V VMs on failover clusters.
• Describe the key features for VMs in a clustered environment.
Module 10: Implementing Network Load Balancing
This module provides an overview of NLB clusters. It also explains how to plan and configure an NLB cluster implementation.
Lessons
• Overview of NLB
• Configuring an NLB cluster
• Planning an NLB implementation
Lab : Implementing NLB
• Implementing a Network Load Balancing (NLB) cluster
• Configuring and managing the NLB cluster
• Validating high availability for the NLB cluster
After completing this module, students will be able to:
• Describe NLB.
• Configure an NLB cluster.
• Explain how to plan an NLB implementation.
Module 11: Creating and managing deployment images
This module provides an overview of the Windows Server 2016 image deployment process. It also explains how to create and manage deployment images by using the Microsoft Deployment Toolkit (MDT). Additionally, it describes different workloads in the virtual machine environment.
Lessons
• Introduction to deployment images
• Creating and managing deployment images by using MDT
• Virtual machine environments for different workloads
Lab : Using MDT to deploy Windows Server 2016
• Configuring MDT
• Creating and deploying an image
After completing this module, students will be able to:
• Describe the Windows Server 2016 image deployment process.
• Create and manage deployment images by using MDT.
• Describe the different workloads in the virtual machine environment.
Module 12: Managing, monitoring, and maintaining virtual machine installations
This module provides an overview on Windows Server Update Services (WSUS) and the requirements to implement WSUS. It explains how to manage the update process with WSUS. Additionally, this module provides an overview of Windows PowerShell Desired State Configuration (DSC) and Windows Server 2016 monitoring tools. Finally, this module describes how to use Performance Monitor, and how to manage event logs.
Lessons
• WSUS overview and deployment options
• Update management process with WSUS
• Overview of Windows PowerShell DSC
• Overview of Windows Server 2016 monitoring tools
• Using Performance Monitor
• Monitoring event logs
Lab : Implementing WSUS and deploying updates
• Implementing WSUS
• Configuring update settings
• Approving and deploying an update by using WSUS
Lab : Monitoring and troubleshooting Windows Server 2016
• Establishing a performance baseline
• Identifying the source of a performance problem
• Viewing and configuring centralized event logs
After completing this module, students will be able to:
• Describe the purpose of WSUS and the requirements to implement WSUS.
• Manage the update process with WSUS.
• Describe the purpose and benefits of Windows PowerShell DSC.
• Describe the monitoring tools available in Windows Server 2016.
• Use Performance Monitor.
• Manage event logs.
Prerequisites
Before attending this course, students must have:
• A basic understanding of networking fundamentals.
• An awareness and understanding of security best practices.
• An understanding of basic AD DS concepts.
• Basic knowledge of server hardware.
• Experience supporting and configuring Windows client operating systems such as Windows 8 or Windows 10.
Additionally, students would benefit from having some previous Windows Server operating system experience, such as experience as a Windows Server systems administrator.
Overview
Audience(s): IT Professionals
Technology: Microsoft System Center Configuration Manager
Level: Advanced
This Revision: A
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This five-day course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize System Center Endpoint Protection, manage compliance, and create management queries and reports. Additionally, this course, in conjunction with Microsoft Official Course 20703-2A, helps certification candidates prepare for Exam 70-703: Administering System Center Configuration Manager and Cloud Services Integration.
Audience profile
This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications.
This course also is for individuals who are interested in taking Exam 70-703: Administering System Center Configuration Manager and Cloud Services Integration. Courses 20703-1A and 20703-2A, or equivalent knowledge and skills, are necessary to prepare for this exam.
At course completion
After completing this course, students will be able to:
• Describe the features Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment.
• Analyze data by using queries and reports.
• Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Microsoft Exchange Server.
• Deploy and manage the Configuration Manager client.
• Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering.
• Identify and configure the most appropriate method to distribute and manage content used for deployments.
• Distribute, deploy, and monitor applications for managed users and systems.
• Maintain software updates for PCs that Configuration Manager manages.
• Implement Endpoint Protection for managed PCs.
• Manage configuration items, baselines, and profiles to assess and configure compliance settings and data access for users and devices.
• Configure an operating-system deployment strategy by using Configuration Manager.
• Manage and maintain a Configuration Manager site.
Course Outline
Module 1: Managing computers and mobile devices in the enterprise
This module describes the features of Configuration Manager that you can use to perform complex management tasks, including the following tasks: • Hardware and software inventory. • Application management. • Operating system deployment. • Settings management. • Software update management. • Remote client troubleshooting. • Protection from malware.
Lessons
• Overview of systems management by using enterprise management solutions
• Overview of the Configuration Manager architecture
• Overview of the Configuration Manager administrative tools
• Tools for monitoring and troubleshooting a Configuration Manager site
Lab : Exploring the Configuration Manager tools
• Searching in the Configuration Manager console
• Using Windows PowerShell with Configuration Manager
• Using Configuration Manager Service Manager to manage components
• Monitoring site and component status
• Reviewing log files by using the Configuration Manager Trace tool
• Explain how to use Configuration Manager to address the challenges of managing systems and users in today’s enterprise.
• Describe the Configuration Manager architecture.
• Describe the management tools that you use to perform administrative functions for Configuration Manager.
• Describe the tools that you use to monitor and troubleshoot a Configuration Manager site.
Module 2: Analyzing data using queries and reports
The Microsoft System Center Configuration Manager database stores a large amount of data about the resources in your environment. You might not always want to perform all management tasks on all resources simultaneously. Therefore, to help you locate devices or user objects in your environment that meet specific criteria, you can create queries. You then can use these queries to create collections or to find additional information about specific resources. This module describes queries and methods of creating and running them. In addition to queries, you can run reports to view various types of information related to your Configuration Manager environment. To run Configuration Manager reports, you must install and configure a reporting services point, which this module details.
Lessons
• Introduction to queries
• Configuring Microsoft SQL Server Reporting Services (SSRS)
Lab : Creating and running queriesConfiguring boundaries and resource discovery
• Creating data queries
• Creating subselect queries
• Creating status message queries
Lab : Configuring SSRS
• Configuring a reporting services point
• Creating a report by using Report Builder
• Create and configure data and status message queries.
• Configure and manage SSRS and the reporting services point.
Module 3: Preparing the management infrastructure to support PCs and mobile devices
This module explains how to prepare the management infrastructure, including configuring boundaries, boundary groups, and resource discovery. Additionally, it describes how Configuration Manager interacts with the Microsoft Exchange Server environment to discover and manage mobile devices.
Lessons
• Configuring site boundaries and boundary groups
• Configuring resource discovery
• Configuring the Exchange Server Connector for mobile device management
• Configuring user and device collections
Lab : Configuring boundaries and resource discovery
• Configuring boundaries, boundary groups, and fallback relationships
• Configuring Active Directory discovery methods
Lab : Configuring user and device collections
• Creating a device collection
• Creating a user collection
• Configuring a maintenance window
• Configure boundaries and boundary groups.
• Configure resource discovery.
• Configure the Exchange Server connector mobile device management.
• Organize resources using device and user collections.
Module 4: Deploying and managing clients
This module explains the supported operating systems and devices, the software requirements, and the different methods for installing the Configuration Manager client. This module also describes some of the default and custom client settings that you can configure. After installing the client software, you can configure the client settings to perform routine management tasks
.Lessons
• Overview of the Configuration Manager client
• Deploying the Configuration Manager client
• Configuring and monitoring client status
• Managing client settings in Configuration Manager
Lab : Deploying the Microsoft System Center Configuration Manager client software
• Preparing the site for client installation
• Deploying the Configuration Manager client software by using client push installation
Lab : Configuring and monitoring client status
• Configuring and monitoring client health status
Lab : Managing client settings
• Configuring client settings
• Describe the requirements and considerations for installing the Configuration Manager client software.
• Deploy the Configuration Manager client software.
• Configure and monitor client status.
• Manage Configuration Manager client settings.
Module 5: Managing inventory for PCs and applications
This module provides an overview of inventory collection, and explains how you can manage the information collected. You also will learn about the process of collecting hardware and software inventory, initiating inventory cycles, and initiating and securing inventory collection. This module also covers the use of software metering to monitor program usage, and the configuration and management of Asset Intelligence.
Lessons
• Overview of inventory collection
• Configuring hardware and software inventory
• Managing inventory collection
• Configuring software metering
• Configuring and managing Asset Intelligence
Lab : Configuring and managing inventory collection
• Configuring and managing hardware inventory
Lab : Configuring software metering
• Configuring software metering
Lab : Configuring and managing Asset Intelligence
• Preparing the site for Asset Intelligence
• Configuring Asset Intelligence
• Monitoring license agreements by using Asset Intelligence
• Viewing Asset Intelligence reports
• Describe inventory collection.
• Configure and collect hardware and software inventory.
• Manage inventory collection.
• Configure software metering.
• Configure Asset Intelligence.
Module 6: Distributing and managing content used for deployments
Configuration Manager clients obtain content, such as packages, applications, software updates, and even operating system images, from distribution points. Configuration Manager relies on the distribution point infrastructure to provide content management functionality. In this module, you will review the content management features, configure distribution points, and learn how to distribute and monitor content. You also will perform content validation and content prestaging.
Lessons
• Preparing the infrastructure for content management
• Distributing and managing content on distribution points
Lab : Distributing and managing content for deployments
• Installing a new distribution point
• Managing content distribution
• Prepare the infrastructure for content management.
• Distribute and manage content on distribution points.
Module 7: Deploying and managing applications
In this module, you will learn about the methods for creating, deploying, and managing applications with Configuration Manager. You also will learn to use the Software Center and the Application Catalog to install available applications. You will learn about managing deployments on unconventional applications. In addition, you will learn to install Windows 10 apps and virtualized applications.
Lessons
• Overview of application management
• Creating applications
• Deploying applications
• Managing applications
• Deploying virtual applications by using System Center Configuration Manager (Optional)
• Deploying and managing Windows Store apps
Lab : Creating and deploying applications
• Installing and configuring the Application Catalog roles
• Creating applications with requirements
• Deploying applications
Lab : Managing application supersedence and removal
• Managing application supersedence
• Uninstalling the Excel Viewer application
Lab : Deploying virtual applications by using Configuration Manager (Optional)
• Configuring support for App-V
• Deploying virtual applications
Lab : Using Configuration Manager to deploy Windows Store apps
• Configuring support for sideloading Windows Store apps
• Configuring a Windows Store app
• Deploying Windows 10 apps to users
• Describe the application management features of Configuration Manager.
• Create applications.
• Deploy applications.
• Manage applications.
• Configure and deploy virtual applications.
• Configure and deploy Windows Store apps.
Module 8: Maintaining software updates for managed PCs
This module explains how to use the software updates feature in Configuration Manager to implement an end-to-end management process for the complex task of identifying, deploying, and monitoring software updates to your Configuration Manager clients.
Lessons
• The software updates process
• Preparing a Configuration Manager site for software updates
• Managing software updates
• Configuring automatic deployment rules
• Monitoring and troubleshooting software updates
Lab : Configuring the site for software updates
• Configuring and synchronizing the software update point
Lab : Deploying and managing software updates
• Determining software update compliance
• Deploying software updates to clients
• Configuring automatic deployment rules
• Describe how the software updates feature integrates with Configuration Manager.
• Prepare the Configuration Manager site for software updates.
• Manage the evaluation and deployment of software updates.
• Configure automatic deployment rules.
• Monitor and troubleshoot software updates.
Module 9: Implementing Endpoint Protection for managed PCs
Configuration Manager provides a number of security-related features that you can use to help protect client computers from malware threats, and to configure specific Windows Firewall settings for clients. Based on System Center Endpoint Protection (Endpoint Protection) functionality, Endpoint Protection in Configuration Manager supports the deployment, management, and monitoring of antimalware policies and Windows Firewall settings on client computers. This module explains how to use configure Endpoint Protection Configuration Manager to implement Endpoint Protectionand deploy and monitor Endpoint Protection policies.
Lessons
• Overview of Endpoint Protection in Configuration Manager
• Configuring, deploying, and monitoring Endpoint Protection policies
Lab : Implementing Microsoft System Center Endpoint Protection
• Configuring the System Center Endpoint Protection point and client settings
• Configuring and deploying Endpoint Protection policies
• Monitoring Endpoint Protection
• Configure Endpoint Protection to detect and remediate malware and security vulnerabilities.
• Configure, deploy, and manage Endpoint Protection policies.
Module 10: Managing compliance and secure data access
Many enterprise organizations require systems, such as servers, laptops, desktop computers, and mobile devices, to meet specific configuration and compliance requirements. Compliance settings in Configuration Manager can play a key role in identifying existing configurations, discovering systems that have adverse configuration changes, and remediating these settings automatically when necessary. Compliance settings also can help control how users manage and access data in the enterprise network environment. For computers that run Windows 8 and newer operating systems, you can manage data using folder redirection, offline files, and roaming profiles. You also can control access to data using remote connection profiles, virtual private network (VPN) profiles, Wi-Fi profiles, and certificate profiles. This module describes the compliance settings that you can manage using Configuration Manager. You will learn to use these settings to maintain configuration requirements and to provide secure data access to enterprise resources.
Lessons
• Overview of Compliance Settings
• Configuring compliance settings
• Viewing compliance results
• Managing resource and data access
Lab : Managing compliance settings
• Managing configuration items and baselines
• Viewing compliance settings and reports
• Configuring remediation in compliance settings
• Using compliance information to create collections
• Describe compliance settings features.
• Configure compliance settings.
• View compliance results.
• Manage resource and data access.
Module 11: Managing operating system deployment
You can use the operating system deployment feature in Configuration Manager to create operating system images that you can deploy to unmanaged computers and those managed by Configuration Manager. There are several scenarios in which you can deploy operating systems by using Configuration Manager, including when you are working with new systems or when you are upgrading existing ones. Operating system deployment uses both Configuration Manager and Windows components to manage and deliver operating system images. You can configure settings on a reference computer prior to capturing an image of its operating system or by using task sequences that Configuration Manager creates after you deploy the image to a target system. This module explains how to use Configuration Manager to create a strategy for operating-system deployments. And also, it explains how to manage Windows as a service.
Lessons
• An overview of operating system deployment
• Preparing a site for operating system deployment
• Deploying an operating system
• Managing Windows as a service
Lab : Preparing thea site for operating -system deployment
• Managing the site system roles used to support operating system deployment
• Managing packages to support operating system deployment
Lab : Deploying operating -system images for bare-metal installations
• Preparing the operating system image
• Creating a task sequence to deploy an image
• Deploying an image
• Describe the terminology, components, and scenarios used to deploy operating systems by using Configuration Manager.
• Describe how to prepare a site for operating system deployment.
• Describe the process used to deploy an operating system image.
Module 12: Managing and maintaining a Configuration Manager site
This module explains how to use manage and maintain a Configuration Manager site. It describes role-based administration, Remote Tools, and the site maintenance tasks that you can manage by using Configuration Manager. Additionally, it explains how to back up and recover a Configuration Manager site system.
Lessons
• Configuring role-based administration
• Configuring Remote Tools
• Overview of Configuration Manager site maintenance
• Backing up and recovering a Configuration Manager site
Lab : Configuring role-based administration
• Configuring a new scope for Toronto administrators
• Configuring a new administrative user
Lab : Configuring Remote Tools
• Configuring the Remote Tools client settings and permissions
• Managing desktops by using Remote Control
Lab : Maintaining a Configuration Manager site
• Configuring maintenance tasks in Configuration Manager
• Configuring the Backup Site Server task
• Recovering a site from a backup
• Configure role-based administration.
• Configure Remote Tools to support client activity.
• Identify Configuration Manager site Maintenance tasks.
• Back up and recover a Configuration Manager site.
Prerequisites
Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching, and addressing.
Active Directory Domain Services (AD DS) principles and fundamentals of AD DS management.
Installation, configuration, and troubleshooting for Windows-based personal computers.
Basic concepts of public key infrastructure (PKI) security.
Basic understanding of scripting and Windows PowerShell syntax.
Basic understanding of Windows Server roles and services.
Basic understanding of the configuration options for iOS, Android, and Windows Mobile device platforms.
Students who attend this training can meet the prerequisites by attending the following courses or by obtaining equivalent knowledge and skills through hands-on activities:
• Course 20697-1: Installing and Configuring Windows 10
• Course 20697-2: Deploying and Managing Windows 10 Using Enterprise Services
• Course 20411: Administering Windows Server 2012
Overview
Technology: SharePoint Server
Level: Intermediate
This Revision: A
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This five-day course will teach you how to plan, configure, and manage the advanced features in a SharePoint 2016 environment. The special areas of focus for this course include implementing high availability, disaster recovery, service application architecture, and Microsoft Business Connectivity Services. This course also focuses on social computing features, productivity, and collaboration platforms and features. Students also will learn about business intelligence solutions, Enterprise Content Management, web content management infrastructure, solutions, and apps. This course also covers how to develop and implement a governance plan, and how to perform an upgrade or a migration to SharePoint 2016.
This is the second in a sequence of two courses for IT Professionals and is aligned with the SharePoint 2016 IT Pro certification.
Audience profile
The course is targeted at experienced IT Professionals who are interested in learning how to install, configure, deploy, and manage SharePoint 2016 installations either in a data center or in the cloud.
Students typically should have more than four years of hands-on experience* planning and maintaining SharePoint Server and other core technologies upon which SharePoint depends, including Windows Server 2012 R2 or later, Internet Information Services (IIS), Microsoft SQL Server 2014 R2 or later, Active Directory Domain Services (AD DS), and networking infrastructure services.
Students should have completed Course 20339-1A: Planning and Administering Microsoft SharePoint 2016, or have gained equivalent knowledge and experience before taking this course.
The minimally qualified candidate typically:
• Has a working knowledge of, and preferably hands-on experience, with Microsoft SharePoint Online.
• Has broad familiarity with SharePoint Server workloads.
• Has experience with business continuity management, including data backup, restoration, and high availability.
• Has experience with authentication and security technologies.
• Has experience with Windows PowerShell.
* The hands-on experience or job experience should be from a solutions-based role where the candidate has worked on multiple solutions in the SharePoint Server space that includes document management, content management, and search.
At course completion
After completing this course, students will be able to:
• Describe the core SharePoint 2016 architecture and its new and improved features.
• Describe the key hybrid features in SharePoint 2016.
• Plan and design a SharePoint 2016 environment to meet requirements for high availability and disaster recovery.
• Plan and implement Business Connectivity Services and Secure Store Service.
• Configure and manage productivity services for a SharePoint 2016 deployment.
• Manage solutions in a SharePoint 2016 deployment.
• Plan and configure social computing features.
• Plan and configure web content management for an Internet-facing environment.
• Plan and configure Enterprise Content Management in a SharePoint 2016 deployment.
• Plan and configure business intelligence solutions.
• Plan and configure work management, productivity, and collaboration platforms and features.
• Perform an upgrade or migration to SharePoint 2016.
Course Outline
Module 1: Introduction to SharePoint 2016
This module describes the core architectural components of a SharePoint Server environment, and also helps to identify the new depreciated and removed features in SharePoint 2016.
Lessons
• Core components of the SharePoint 2016 architecture
• New, deprecated, and removed features in SharePoint 2016
• SharePoint 2016 and SharePoint Online editions
Lab : Reviewing the core Microsoft SharePoint 2016 concepts
• Configuring SharePoint 2016 farms
• Creating and configuring site collections and sites
• Provisioning service applications by using the SharePoint 2016 Management Shell
After completing this module, students will be able to:
• Describe the architectural features of a Microsoft-SharePoint 2016.
• Identify the new, deprecated, and removed features in SharePoint 2016.
• Describe the editions for SharePoint 2016 on-premises and Microsoft SharePoint Online.
Module 2: Introduction to hybrid scenarios for SharePoint 2016
This module describes the key hybrid features in SharePoint 2016, and helps you to prepare for a hybrid SharePoint 2016 deployment.
Lessons
• Exploring the hybrid features in SharePoint 2016
• Preparing for a hybrid SharePoint 2016 deployment
Lab : Configuring an Office 365 tenant
• Creating an Office 365 tenant
Lab : Creating hybrid team sites
• Preparing the SharePoint environment
• Running the SharePoint Hybrid picker
After completing this module, students will be able to:
• Describe the key hybrid features in SharePoint Server 2016.
• Prepare for a hybrid SharePoint 2016 deployment.
Module 3: Designing business continuity management strategies
This module explains how to select an appropriate database server configuration to meet availability requirements. It also describes how to design a physical architecture and infrastructure to meet high-availability requirements. Finally, this module explains how to develop and implement a backup and restore strategy.
Lessons
• Designing database topologies for high availability and disaster recovery
• Designing a SharePoint infrastructure for high availability
• Planning for disaster recovery
Lab : Planning and performing backup and restore
• Create a backup and restore plan
• Test the backup and restore process
After completing this module, students will be able to:
• Select an appropriate database server configuration to meet availability requirements.
• Design a physical architecture and infrastructure to meet high-availability requirements.
• Develop and implement a backup and restore strategy.
Module 4: Planning and implementing Business Connectivity Services and Secure Store Service
This module explains how to configure Business Connectivity Services (BCS), and describes how to configure and manage the Secure Store Service application. It also explains how you can configure and manage BCS models.
Lessons
• Planning and configuring BCS
• Configuring the Secure Store Service
• Managing BCS models
Lab : Configuring BCS and the Secure Store Service
• Configuring the BDC Service Application
• Configuring the Secure Store Service
Lab : Managing BDC models
• Configuring a Secure Store Service target application
• Importing and configuring BDC models
After completing this module, students will be able to:
• Plan and Configure Business Connectivity service application.
• Plan and configure the Secure Store Service application.
• Manage the Business Data Connectivity models.
Module 5: Configuring productivity services for a SharePoint 2016 deployment
This module describes SharePoint Add-in architecture. This module also explains how to provision and manage SharePoint apps and App Catalogs. Additionally, this module describes how to provision Microsoft Access Services, Visio Services, Word Automation Services, PowerPoint Automation Services, and SharePoint Translation Services.
Lessons
• Understanding the SharePoint Add-in architecture
• Provisioning and managing apps and App Catalogs
• Provisioning productivity services
Lab : Configuring and managing SharePoint Add-ins
• Configuring a SharePoint farm to support apps
• Creating and configuring a corporate App Catalog
• Deploying and monitoring apps
After completing this module, students will be able to:
• Describe Microsoft SharePoint Add-ins and the supporting SharePoint infrastructure.
• Provision and configure SharePoint Add-ins and App Catalogs.
• Manage how apps are used within a SharePoint 2016 deployment.
Module 6: Managing solutions in Microsoft SharePoint 2016
This module describes the purpose and structure of SharePoint 2016 features and solutions. In addition, it explains how to manage sandbox solutions in Microsoft SharePoint 2016.
Lessons
• Understanding the SharePoint 2016 solution architecture
• Managing sandboxed solutions
Lab : Managing solutions
• Configuring a SharePoint farm to support sandboxed solutions
• Configuring a SharePoint site to support sandboxed solutions
• Deploying farm solutions
After completing this module, students will be able to:
• Manage features and solutions in Microsoft SharePoint 2016..
• Manage sandboxed solutions in a SharePoint 2016 deployment.
Module 7: Connecting people
This module explains how to manage user profiles and how to plan and configure My Site and social features. This module also describes how to configure community sites.
Lessons
• Managing user profiles
• Enabling social interaction
• Building communities
Lab : Configuring profile synchronization and My Sites
• Configuring profile synchronization
• Configuring My Sites
Lab : Configuring community sites
• Creating a community site infrastructure
• Configuring Community Site participation
After completing this module, students will be able to:
• Manage user profiles in Microsoft SharePoint 2016 and configure user profile synchronization by using Microsoft Identity Manager (MIM) 2016.
• Enable social interaction in SharePoint 2016.
• Build communities and community sites in SharePoint 2016.
Module 8: Planning and configuring web content management
This module explains how to plan and configure a web content management infrastructure to meet business requirements. This module also describes how to configure managed navigation and product catalog sites, and how to configure support for multilingual sites. Additionally, it explains and how to plan and manage design and customization for publishing sites, and how to plan and configure support for mobile users.
Lessons
• Planning and implementing a web content management infrastructure
• Configuring managed navigation and catalog sites
• Supporting multiple languages and locales
• Enabling design and customization
• Supporting mobile users
Lab : Configuring managed navigation and catalog sites
• Configuring a product catalog site
• Configuring Cross-Site Publishing
• Configuring publishing sites
Lab : Configuring device channels
• Configuring device channels
After completing this module, students will be able to:
• Plan and configure a web content management infrastructure.
• Configure managed navigation and product catalog sites.
• Plan and Configure support for multilingual sites and locales.
• Manage design and customization for publishing sites.
• Plan and configure support for mobile users.
Module 9: Planning and configuring Enterprise Content Management
This module explains how to plan for management of content and documents, and how to plan for and configure eDiscovery. Additionally, it describes how to plan for records management and compliance.
Lessons
• Planning Enterprise Content Management
• Planning and configuring eDiscovery
• Planning records management
Lab : Configuring eDiscovery in SharePoint 2016
• Creating and configuring an eDiscovery Center
• Discovering and preserving content
• Querying and exporting content
Lab : Configuring records management in SharePoint Server 2016
• Configuring in-place records management
After completing this module, students will be able to:
• Plan how to manage content and documents.
• Plan and configure eDiscovery.
• Plan records management and compliance.
Module 10: Planning and configuring business intelligence solutions
This module explains how to plan business intelligence (BI) architecture for SharePoint 2016, and how to deploy and manage BI services. Additionally, this module explains how to plan and configure advanced analysis tools.
Lessons
• Planning BI architecture
• Planning, deploying, and managing BI services
• Planning and configuring advanced analysis tools
Lab : Installing Office Online Server
• Deploy Office Online Server
Lab : Configuring PowerPivot and Power View for SharePoint 2016
• Configuring PowerPivot for SharePoint 2016
• Configuring Power View for SharePoint
After completing this module, students will be able to:
• Explain the Microsoft SharePoint business intelligence (BI) architecture, its components, and plan for business intelligence.
• Plan, deploy, and manage the core Microsoft SharePoint 2016 BI services.
• Configure the advanced BI options available in SharePoint 2016 and Microsoft SQL Server 2014.
Module 11: Planning and configuring productivity and collaboration
This module explains how to plan and configure productivity and collaboration features. This module also explains how to plan and configure composite solutions in SharePoint 2016.
Lessons
• Planning and configuring collaboration features
• Planning and configuring composites
Lab : Configuring and working with project sites
• Creating an Office Online Server farm and configuring integration in SharePoint 2016
• Creating project sites
• Configuring project sites
• Engaging project teams
• Configuring Project Server integration
Lab : Configuring a workflow
• Configuring Microsoft Azure Workflow and Microsoft SharePoint Workflow Services
• Creating and testing a workflow
After completing this module, students will be able to:
• Describe how to plan and configure SharePoint collaborative and coauthoring options.
• Configure project sites and engage teams.
• Plan and configure composites.
• Configure workflows in SharePoint 2016.
Module 12: Upgrading and migrating to SharePoint 2016
This module explains how to prepare for upgrade or migration to SharePoint 2016. In addition, it explains how to manage site collections are how to upgrade them to SharePoint 2016. Finally, the module describes how to upgrade advanced content from SharePoint Server 2013 to SharePoint 2016.
Lessons
• Preparing for an upgrade or migration
• Upgrade to SharePoint 2016
• Planning and managing a site-collection upgrade
Lab : Performing a content database migration and upgrade from Microsoft SharePoint Server 2013
• Migrating SharePoint Server 2013 Managed Metadata Service
• Upgrading a SharePoint Server 2013 content database
Lab : Managing site-collection upgrades
• Preparing site collections for upgrade
• Upgrading site collections
After completing this module, students will be able to:
• Plan and prepare for an upgrade.
• Perform upgrades to data and service applications.
• Upgrade site collections.
• Upgrade advanced content from SharePoint Server 2013 to SharePoint 2016.
Prerequisites
An ideal candidate for this course must have at least one year experience with deploying and administering multiple SharePoint Server 2013 farms across a large enterprise. The candidate should have completed Course 20339-1A: Planning and Administering Microsoft SharePoint 2016, or should demonstrate equivalent skills
Before attending this course, students must demonstrate the following skills:
• At least a one-year experience of mapping business requirements to both logical and physical technical designs.
• Working knowledge of network design, including network security.
• Software management experience in a Windows Server 2012 R2 enterprise server or Windows Server 2016 environment.
• Deploying and managing applications natively, virtually, and in the cloud.
• Administering IIS.
• Configuring AD DS for use in authentication and authorization, and as a user store.
• Managing an application remotely by using Windows PowerShell 2.0 or later.
• Connecting applications to SQL Server.
• Implementing claims-based security.
Visão Global
Compliance é um tema que está ganhando bastante destaque na pauta de práticas que devem ser adotadas pelas empresas e profissionais comprometidos com a conformidade em relação a normas e legislações, como a LGPD - Lei Geral de Proteção de Dados.
O curso contribuirá para o adequado esclarecimento sobre quais requisitos são necessários para as práticas de compliance nas empresas, com relação a proteção de dados.
Público alvo
Todos os profissionais responsáveis, direta ou indiretamente, pela proteção de dados e dos requisitos legais, conforme definido na LGPD. Portanto, esse curso é indicado para todos que atuam na definição e no desenvolvimento de políticas, procedimentos, monitoramento, auditorias e melhorias no ciclo de vida dos dados.
Carga Horária
40 horas
Conteúdo
1. Compliance
1.1 Abordagem conceitual e histórica
2. Etapas da implementação de um Programa de Compliance
2.1 Suporte da Alta Administração
2.2 Gestão de Riscos
2.3 Código de Conduta, Políticas e Procedimentos
2.4 Comunicação e Treinamento
2.5 Canais de Denúncia
2.6 Due Diligence de Terceiros
2.7 Monitoramento e Auditoria
2.8 Investigação e Tratamento de Não-Conformidades
2.9 Melhoria Contínua
3. Programa de Compliance em LGPD
3.1 LGPD- Lei Geral de Proteção de Dados
3.2 Pilares do Compliance em LGPD
3.2.1 Gestão de Riscos
3.2.2 Código de Conduta, Políticas e Procedimentos
3.2.3 Comunicação e Treinamento
3.2.4 Canais de Denúncia
3.2.5 Due Diligence de Terceiros
3.2.6 Monitoramento e Auditoria
3.2.7 Investigação e Tratamento de Não-Conformidades
3.2.8 Melhoria Contínua
4. Benefícios da implementação de um Programa de Compliance
4.1 Oportunidade de Negócios e Vantagem Competitiva
4.2 Atração de Investimentos
4.3 Identificação de Riscos e Antecipação de Problemas
4.4 Correção Efetiva de Não-Conformidades
4.5 Awarness para os Colaboradores
4.6 Limitação de Responsabilidade
4.7 Sustentabilidade do Negócio
Pré-requisitos
Nenhum
Overview
Audience(s): IT Professionals
Technology: SQL Server
Level: Advanced
This Revision: C
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This five-day instructor-led course provides students with the knowledge and skills to develop a Microsoft SQL Server database. The course focuses on teaching individuals how to use SQL Server product features and tools related to developing a database.
Audience profile
The primary audience for this course is IT Professionals who want to become skilled on SQL Server product features and technologies for implementing a database.
The secondary audiences for this course are individuals who are developers from other product platforms looking to become skilled in the implementation of a SQL Server database.
At course completion
After completing this course, students will be able to:
• Design and Implement Tables.
• Describe advanced table designs
• Ensure Data Integrity through Constraints.
• Describe indexes, including Optimized and Columnstore indexes
• Design and Implement Views.
• Design and Implement Stored Procedures.
• Design and Implement User Defined Functions.
• Respond to data manipulation using triggers.
• Design and Implement In-Memory Tables.
• Implement Managed Code in SQL Server.
• Store and Query XML Data.
• Work with Spatial Data.
• Store and Query Blobs and Text Documents.
Course Outline
Module 1: Introduction to Database Development
Before beginning to work with Microsoft SQL Server in either a development or an administration role, it is important to understand the scope of the SQL Server platform. In particular, it is useful to understand that SQL Server is not just a database engine—it is a complete platform for managing enterprise data. SQL Server provides a strong data platform for all sizes of organizations, in addition to a comprehensive set of tools to make development easier, and more robust.
Lessons
• Introduction to the SQL Server Platform
• SQL Server Database Development Tasks
After completing this module, you will be able to:
• Describe the SQL Server platform.
• Use SQL Server administration tools.
Module 2: Designing and Implementing Tables
In a relational database management system (RDBMS), user and system data is stored in tables. Each table consists of a set of rows that describe entities and a set of columns that hold the attributes of an entity. For example, a Customer table might have columns such as CustomerName and CreditLimit, and a row for each customer. In Microsoft SQL Server data management software tables are contained within schemas that are very similar in concept to folders that contain files in the operating system. Designing tables is one of the most important tasks that a database developer undertakes, because incorrect table design leads to the inability to query the data efficiently. After an appropriate design has been created, it is important to know how to correctly implement the design.
Lessons
• Designing Tables
• Data Types
• Working with Schemas
• Creating and Altering Tables
Lab: Designing and Implementing Tables
• Designing Tables
• Creating Schemas
• Creating Tables
After completing this module, you will be able to:
• Design tables using normalization, primary and foreign keys.
• Work with identity columns.
• Understand built-in and user data types.
• Use schemas in your database designs to organize data, and manage object security.
• Work with computed columns and temporary tables.
Module 3: Advanced Table Designs
The physical design of a database can have a significant impact on the ability of the database to meet the storage and performance requirements set out by the stakeholders. Designing a physical database implementation includes planning the filegroups, how to use partitioning to manage large tables, and using compression to improve storage and performance. Temporal tables are a new feature in SQL Server and offer a straightforward solution to collecting changes to your data.
Lessons
• Partitioning Data
• Compressing Data
• Temporal Tables
Lab: Using Advanced Table Designs
• Partitioning Data
• Compressing Data
After completing this module, you will be able to:
• Describe the considerations for using partitioned tables in a SQL Server database.
• Plan for using data compression in a SQL Server database.
• Use temporal tables to store and query changes to your data.
Module 4: Ensuring Data Integrity through Constraints
The quality of data in your database largely determines the usefulness and effectiveness of applications that rely on it—the success or failure of an organization or a business venture could depend on it. Ensuring data integrity is a critical step in maintaining high-quality data. You should enforce data integrity at all levels of an application from first entry or collection through storage. Microsoft SQL Server data management software provides a range of features to simplify the job.
Lessons
• Enforcing Data Integrity
• Implementing Data Domain Integrity
• Implementing Entity and Referential Integrity
Lab: Using Data Integrity Through Constraints
• Add Constraints
• Test the Constraints
After completing this module, you will be able to:
• Describe the options for enforcing data integrity, and the levels at which they should be applied.
• Implement domain integrity through options such as check, unique, and default constraints.
• Implement referential integrity through primary and foreign key constraints.
Module 5: Introduction to Indexes
An index is a collection of pages associated with a table. Indexes are used to improve the performance of queries or enforce uniqueness. Before learning to implement indexes, it is helpful to understand how they work, how effective different data types are when used within indexes, and how indexes can be constructed from multiple columns. This module discusses table structures that do not have indexes, and the different index types available in Microsoft SQL Server.
Lessons
• Core Indexing Concepts
• Data Types and Indexes
• Heaps, Clustered, and Nonclustered Indexes
• Single Column and Composite Indexes
Lab: Implementing Indexes
• Creating a Heap
• Creating a Clustered Index
• Creating a Covered Index
After completing this module, you will be able to:
• Explain core indexing concepts.
• Evaluate which index to use for different data types.
• Describe the difference between single and composite column indexes.
Module 6: Designing Optimized Index Strategies
Indexes play an important role in enabling SQL Server to retrieve data from a database quickly and efficiently. This module discusses advanced index topics including covering indexes, the INCLUDE clause, query hints, padding and fill factor, statistics, using DMOs, the Database Tuning Advisor, and Query Store.
Lessons
• Index Strategies
• Managing Indexes
• Execution Plans
• The Database Engine Tuning Advisor
• Query Store
Lab: Optimizing Indexes
• Using Query Store
• Heaps and Clustered Indexes
• Creating a Covered Index
After completing this module, you will be able to:
• What a covering index is, and when to use one.
• The issues involved in managing indexes.
• Actual and estimated execution plans.
• How to use Database Tuning Advisor to improve the performance of queries.
• How to use Query Store to improve query performance.
Module 7: Columnstore Indexes
Introduced in Microsoft SQL Server 2012, columnstore indexes are used in large data warehouse solutions by many organizations. This module highlights the benefits of using these indexes on large datasets; the improvements made to columnstore indexes in SQL Server 2016; and the considerations needed to use columnstore indexes effectively in your solutions.
Lessons
• Introduction to Columnstore Indexes
• Creating Columnstore Indexes
• Working with Columnstore Indexes
Lab: Using Columnstore Indexes
• Creating a Columnstore Index
• Create a Memory Optimized Columnstore Table
After completing this module, you will be able to:
• Describe columnstore indexes and identify suitable scenarios for their use.
• Create clustered and nonclustered columnstore indexes.
• Describe considerations for using columnstore indexes.
Module 8: Designing and Implementing Views
This module describes the design and implementation of views. A view is a special type of query—one that is stored and can be used in other queries—just like a table. With a view, only the query definition is stored on disk; not the result set. The only exception to this is indexed views, when the result set is also stored on disk, just like a table. Views simplify the design of a database by providing a layer of abstraction, and hiding the complexity of table joins. Views are also a way of securing your data by giving users permissions to use a view, without giving them permissions to the underlying objects. This means data can be kept private, and can only be viewed by appropriate users.
Lessons
• Introduction to Views
• Creating and Managing Views
• Performance Considerations for Views
Lab: Designing and Implementing Views
• Creating Standard Views
• Creating an Updateable view
After completing this module, you will be able to:
• Understand the role of views in database design.
• Create and manage views.
• Understand the performance considerations with views.
Module 9: Designing and Implementing Stored Procedures
This module describes the design and implementation of stored procedures.
Lessons
• Introduction to Stored Procedures
• Working with Stored Procedures
• Implementing Parameterized Stored Procedures
• Controlling Execution Context
Lab: Designing and Implementing Stored Procedures
• Create Stored procedures
• Create Parameterized Stored procedures
• Changes Stored Procedure Execution Context
After completing this module, you will be able to:
• Understand what stored procedures are, and what benefits they have.
• Design, create, and alter stored procedures.
• Control the execution context of stored procedures.
• Implement stored procedures that use parameters.
Module 10: Designing and Implementing User-Defined Functions
Functions are routines that you use to encapsulate frequently performed logic. Rather than having to repeat the function logic in many places, code can call the function. This makes code more maintainable, and easier to debug. In this module, you will learn to design and implement user-defined functions (UDFs) that enforce business rules or data consistency. You will also learn how to modify and maintain existing functions.
Lessons
• Overview of Functions
• Designing and Implementing Scalar Functions
• Designing and Implementing Table-Valued Functions
• Considerations for Implementing Functions
• Alternatives to Functions
Lab: Designing and Implementing User-Defined Functions
• Format Phone numbers
• Modify an Existing Function
•
After completing this module, you will be able to:
• Describe different types of functions.
• Design and implement scalar functions.
• Design and implement table-valued functions (TVFs).
• Describe considerations for implementing functions.
• Describe alternatives to functions.
Module 11: Responding to Data Manipulation via Triggers
Data Manipulation Language (DML) triggers are powerful tools that you can use to enforce domain, entity, referential data integrity and business logic. The enforcement of integrity helps you to build reliable applications. In this module, you will learn what DML triggers are, how they enforce data integrity, the different types of trigger that are available to you, and how to define them in your database.
Lessons
• Designing DML Triggers
• Implementing DML Triggers
• Advanced Trigger Concepts
Lab: Responding to Data Manipulation by Using Triggers
• Create and Test the Audit Trigger
• Improve the Audit Trigger
After completing this module, you will be able to:
• Design DML triggers
• Implement DML triggers
• Explain advanced DML trigger concepts, such as nesting and recursion.
Module 12: Using In-Memory Tables
Microsoft SQL Server 2014 data management software introduced in-memory online transaction processing (OLTP) functionality features to improve the performance of OLTP workloads. SQL Server adds several enhancements, such as the ability to alter a memory-optimized table without recreating it. Memory-optimized tables are primarily stored in memory, which provides the improved performance by reducing hard disk access. Natively compiled stored procedures further improve performance over traditional interpreted Transact-SQL.
Lessons
• Memory-Optimized Tables
• Natively Compiled Stored Procedures
Lab: Using In-Memory Database Capabilities
• Using Memory-Optimized Tables
• Using Natively Compiled Stored procedures
After completing this module, you will be able to:
• Use memory-optimized tables to improve performance for latch-bound workloads.
• Use natively compiled stored procedures.
Module 13: Implementing Managed Code in SQL Server
As a SQL Server professional, you are likely to be asked to create databases that meet business needs. Most requirements can be met using Transact-SQL. However, occasionally you may need additional capabilities that can only be met by using common language runtime (CLR) code. As functionality is added to SQL Server with each new release, the necessity to use managed code decreases. However, there are times when you might need to create aggregates, stored procedures, triggers, user-defined functions, or user-defined types. You can use any .NET Framework language to develop these objects. In this module, you will learn how to use CLR managed code to create user-defined database objects for SQL Server.
Lessons
• Introduction to CLR Integration in SQL Server
• Implementing and Publishing CLR Assemblies
Lab: Implementing Managed Code in SQL Server
• Assessing Proposed CLR Code
• Creating a Scalar-Valued CLR Function
• Creating a Table Valued CLR Function
After completing this module, you will be able to:
• Explain the importance of CLR integration in SQL Server.
• Implement and publish CLR assemblies using SQL Server Data Tools (SSDT).
Module 14: Storing and Querying XML Data in SQL Server
XML provides rules for encoding documents in a machine-readable form. It has become a widely adopted standard for representing data structures, rather than sending unstructured documents. Servers that are running Microsoft SQL Server data management software often need to use XML to interchange data with other systems; many SQL Server tools provide an XML-based interface. SQL Server offers extensive handling of XML, both for storage and querying. This module introduces XML, shows how to store XML data within SQL Server, and shows how to query the XML data. The ability to query XML data directly avoids the need to extract data into a relational format before executing Structured Query Language (SQL) queries. To effectively process XML, you need to be able to query XML data in several ways: returning existing relational data as XML, and querying data that is already XML.
Lessons
• Introduction to XML and XML Schemas
• Storing XML Data and Schemas in SQL Server
• Implementing the XML Data Type
• Using the Transact-SQL FOR XML Statement
• Getting Started with XQuery
• Shredding XML
Lab: Storing and Querying XML Data in SQL Server
• Determining when to use XML
• Testing XML Data Storage in Variables
• Using XML Schemas
• Using FOR XML Queries
• Creating a Stored Procedure to Return XML
After completing this module, you will be able to:
• Describe XML and XML schemas.
• Store XML data and associated XML schemas in SQL Server.
• Implement XML indexes within SQL Server.
• Use the Transact-SQL FOR XML statement.
• Work with basic XQuery queries.
Module 15: Storing and Querying Spatial Data in SQL Server
This module describes spatial data and how this data can be implemented within SQL Server.
Lessons
• Introduction to Spatial Data
• Working with SQL Server Spatial Data Types
• Using Spatial Data in Applications
Lab: Working with SQL Server Spatial Data
• Become Familiar with the Geometry Data Type
• Add Spatial Data to an Existing Table
• Find Nearby Locations
After completing this module, you will be able to:
• Describe how spatial data can be stored in SQL Server
• Use basic methods of the GEOMETRY and GEOGRAPHY data types
• Query databases containing spatial data
Module 16: Storing and Querying BLOBs and Text Documents in SQL Server
Traditionally, databases have been used to store information in the form of simple values—such as integers, dates, and strings—that contrast with more complex data formats, such as documents, spreadsheets, image files, and video files. As the systems that databases support have become more complex, administrators have found it necessary to integrate this more complex file data with the structured data in database tables. For example, in a product database, it can be helpful to associate a product record with the service manual or instructional videos for that product. SQL Server provides several ways to integrate these files—that are often known as Binary Large Objects (BLOBs)—and enable their content to be indexed and included in search results. In this module, you will learn how to design and optimize a database that includes BLOBs.
Lessons
• Considerations for BLOB Data
• Working with FILESTREAM
• Using Full-Text Search
Lab: Storing and Querying BLOBs and Text Documents in SQL Server
• Enabling and Using FILESTREAM Columns
• Enabling and Using File Tables
• Using a Full-Text Index
After completing this module, you will be able to:
• Describe the considerations for designing databases that incorporate BLOB data.
• Describe the benefits and design considerations for using FILESTREAM to store BLOB data on a Windows file system.
• Describe the benefits of using full-text indexing and Semantic Search, and explain how to use these features to search SQL Server data, including unstructured data
Module 17: SQL Server Concurrency
This module explains how to name, declare, assign values to, and use variables. It also describes how to store data in an array. Concurrency control is a critical feature of multiuser database systems; it allows data to remain consistent when many users are modifying data at the same time. This module covers the implementation of concurrency in Microsoft SQL Server. You will learn about how SQL Server implements concurrency controls, and the different ways you can configure and work with concurrency settings.
Lessons
• Concurrency and Transactions
• Locking Internals
Lab: SQL Server Concurrency
• Implement Snapshot Isolation
• Implement Partition Level Locking
After completing this module, you will be able to:
• Describe concurrency and transactions in SQL Server.
• Describe SQL Server locking.
Module 18: Performance and Monitoring
This module explains how to name, declare, assign values to, and use variables. It also describes how to store data in an array. This module looks at how to measure and monitor the performance of your SQL Server databases. The first two lessons look at SQL Server Extended Events, a flexible, lightweight event-handling system built into the Microsoft SQL Server Database Engine. These lessons focus on the architectural concepts, troubleshooting strategies and usage scenarios.
Lessons
• Extended Events
• Working with extended Events
• Live Query Statistics
• Optimize Database File Configuration
• Metrics
Lab: Monitoring, Tracing, and Baselining
• Collecting and Analyzing Data Using Extended Events
• Implementing Baseline Methodology
After completing this module, you will be able to:
• Understand Extended Events and how to use them.
• Work with Extended Events.
• Understand Live Query Statistics.
• Optimize the file configuration of your databases.
• Use DMVs and Performance Monitor to create baselines and gather performance metrics.
Prerequisites
• Basic knowledge of the Microsoft Windows operating system and its core functionality.
• Working knowledge of Transact-SQL.
• Working knowledge of relational databases.
Overview
Technology: Windows Server
Level: Intermediate
This Revision: B
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This 5-day classroom-based course provides the fundamental networking skills required to deploy and support Windows Server 2016 in most organizations. It covers IP fundamentals, remote access technologies, and more advanced content including Software Defined Networking.
Audience profile
This course is intended for existing IT professionals who have some networking knowledge and experience and are looking for a single course that provides insight into core and advanced networking technologies in Windows Server 2016. This audience would typically include:
• Network administrators who are looking to reinforce existing skills and learn about new networking technology changes and functionality in Windows Server 2016.
• System or Infrastructure Administrators with general networking knowledge who are looking to gain core and advanced networking knowledge and skills on Windows Server 2016.
The secondary audience for this course is those IT professionals who are looking to take the MCSA 70-741: Networking with Windows Server 2016 exam.
At course completion
After completing this course, students will be able to:
• Plan and implement an IPv4 network.
• Implement Dynamic Host Configuration Protocol (DHCP).
Implement IPv6.
• Implement Domain Name System (DNS).
• Implement and manage IP address management (IPAM).
• Plan for remote access.
• Implement DirectAccess.
• Implement virtual private networks (VPNs).
• Implement networking for branch offices.
• Configure advanced networking features.
• Implement Software Defined Networking.
Course Outline
Module 1: Planning and implementing an IPv4 network
This module also explains how to use fundamental networking tools and techniques to configure and troubleshoot IPv4-based networks.
Lessons
• Planning IPv4 addressing
• Configuring an IPv4 host
• Managing and troubleshooting IPv4 network connectivity
Lab : Planning an IPv4 network
• Planning the IPv4 address assignments
Lab : Implementing and troubleshooting an IPv4 network
• Verifying IPv4
• Troubleshooting IPv4
After completing this module, students will be able to:
• Plan IPv4 addressing.
• Configure an IPv4 host.
• Manage and troubleshoot IPv4 network connectivity
Module 2: Implementing DHCP
This module explains how to plan and implement DHCP to support the IPv4 infrastructure.
Lessons
• Overview of the DHCP server role
• Deploying DHCP
• Managing and troubleshooting DHCP
Lab : Implementing DHCP
• Planning a DHCP server implementation
• Implementing the DHCP configuration
• Validating the DHCP implementation
After completing this module, students will be able to:
• Explain the DHCP server role.
• Deploy DHCP.
• Manage and troubleshoot DHCP.
Module 3: Implementing IPv6
This module explains how to implement IPv6, and how to integrate IPv6 and IPv4 networks.
Lessons
• Overview of IPv6 addressing
• Configuring an IPv6 host
• Implementing IPv6 and IPv4 coexistence
• Transitioning from IPv4 to IPv6
Lab : Configuring and evaluating IPv6 transition technologies
• Reviewing the default IPv6 configuration
• Implementing DHCPv6
• Configuring network integration by using ISATAP
• Configuring native IPv6 connectivity
• Configuring 6to4 connectivity
After completing this module, students will be able to:
• Describe the features and benefits of IPv6.
• Configure an IPv6 host.
• Implement the coexistence between IPv4 and IPv6 networks.
• Transition from an IPv4 network to an IPv6 network.
Module 4: Implementing DNS
This module explains how to install, configure, and troubleshoot DNS within the organization’s network.
Lessons
• Implementing DNS servers
• Configuring zones in DNS
• Configuring name resolution between DNS zones
• Configuring DNS integration with Active Directory Domain Services (AD DS)
• Configuring advanced DNS settings
Lab : Planning and implementing name resolution by using DNS
• Planning DNS name resolution
• Implementing DNS servers and zones
Lab : Integrating DNS with Active Directory
• Integrating DNS with Active Directory
Lab : Configuring advanced DNS settings
• Configuring DNS policies
• Validating the DNS implementation
• Troubleshooting DNS
After completing this module, students will be able to:
• Implement DNS servers.
• Configure zones in DNS.
• Configure name resolution between DNS zones.
• Configure DNS integration with AD DS.
• Configure advanced DNS settings
Module 5: Implementing and managing IPAM
This module explains how to implement and manage the IPAM feature in Windows Server 2016. This module also explains how to use IPAM to manage services such as DHCP and DNS.
Lessons
• Overview of IPAM
• Deploying IPAM
• Managing IP address spaces by using IPAM
Lab : Implementing IPAM
• Installing the IPAM Server feature
• Provisioning the IPAM Server
• Managing IP address spaces by using IPAM
After completing this module, students will be able to:
• Describe the IPAM functionality and components.
• Deploy IPAM.
• Manage IP address spaces by using IPAM.
Module 6: Remote access in Windows Server 2016
This module explains how to plan for remote access in Windows Server 2016 and how to implement Web Application Proxy.
Lessons
• Overview of remote access
• Implementing the Web Application Proxy
Lab : Implementing Web Application Proxy
• Implementing Web Application Proxy
• Validating the Web Application Proxy deployment
After completing this module, students will be able to:
• Describe remote access.
• Implement Web Application Proxy.
Module 7: Implementing DirectAccess
This module explains how to implement and manage DirectAccess in Windows Server 2016.
Lessons
• Overview of DirectAccess
• Implementing DirectAccess by using the Getting Started Wizard
• Implementing and managing an advanced DirectAccess infrastructure
Lab : Implementing DirectAccess by using the Getting Started Wizard
• Verifying readiness for a DirectAccess deployment
• Configuring DirectAccess
• Validating the DirectAccess deployment
Lab : Deploying an advanced DirectAccess solution
• Preparing the environment for DirectAccess
• Implementing the advanced DirectAccess infrastructure
• Validating the DirectAccess deployment
After completing this module, students will be able to:
• Explain DirectAccess and how it works.
• Implement DirectAccess by using the Getting Started Wizard.
• Implement and manage an advanced DirectAccess infrastructure.
Module 8: Implementing VPNs
This module explains how to implement and manage remote access in Windows Server 2016 by using VPNs.
Lessons
• Planning VPNs
• Implementing VPNs
Lab : Implementing VPN
• Implementing VPN
• Validating the VPN deployment
• Troubleshooting VPN access
After completing this module, students will be able to:
• Plan a VPN solution.
• Implement VPNs.
Module 9: Implementing networking for branch offices
This module explains how to implement network services for branch offices.
Lessons
• Networking features and considerations for branch offices
• Implementing Distributed File System (DFS) for branch offices
• Implementing BranchCache for branch offices
Lab : Implementing DFS for branch offices
• Implementing DFS
• Validating the deployment
Lab : Implementing BranchCache
• Implementing BranchCache
• Validating the deployment
After completing this module, students will be able to:
• Describe the networking features and considerations for branch offices.
• Implement DFS for branch offices.
• Implement BranchCache for branch offices.
Module 10: Configuring advanced networking features
This module explains how to implement an advanced networking infrastructure.
Lessons
• Overview of high performance networking features
• Configuring advanced Microsoft Hyper-V networking features
Lab : Configuring advanced Hyper-V networking features
• Creating and using Hyper-V virtual switches
• Configuring and using the advanced features of a virtual switch
After completing this module, students will be able to:
• Describe the high performance networking enhancements in Windows Server 2016.
• Configure the advanced Microsoft Hyper-V networking features.
Module 11: Implementing Software Defined Networking
This module explains how to implement SDN.
Lessons
• Overview of SDN.
• Implementing network virtualization
• Implementing Network Controller
Lab : Deploying Network Controller
• Preparing to deploy Network Controller
• Deploying Network Controller
After completing this module, students will be able to:
• Describe SDN.
• Implement network virtualization.
• Implement Network Controller.
Prerequisites
In addition to professional experience, students who attend this training should already have the following technical knowledge:
• Experience working with Windows Server 2008 or Windows Server 2012
• Experience working in a Windows Server infrastructure enterprise environment
• Knowledge of the Open Systems Interconnection (OSI) model
• Understanding of core networking infrastructure components and technologies such as cabling, routers, hubs, and switches
• Familiarity with networking topologies and architectures such as local area networks (LANs), wide area networks (WANs) and wireless networking
• Some basic knowledge of the TCP/IP protocol stack, addressing and name resolution
• Experience with and knowledge of Hyper-V and virtualization
• Hands-on experience working with the Windows client operating systems such as Windows 8.1 or Windows 10
• Students can meet the prerequisites by attending the following courses, or by having knowledge and skills equivalent to: 10967A: Fundamentals of a Windows Server Infrastructure
Overview
Audience(s): IT Professionals
Technology: Windows Server
Level: Advanced
This Revision: C
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This course provides students with the fundamental knowledge and skills to use Windows PowerShell for administering and automating administration of Windows servers. This course provides students the skills to identify and build the command they require to perform a specific task. In addition, students learn how to build scripts to accomplish advanced tasks such as automating repetitive tasks and generating reports. This course provides prerequisite skills supporting a broad range of Microsoft products, including Windows Server, Windows Client, Microsoft Exchange Server, Microsoft SharePoint Server, Microsoft SQL Server, System Center, and more. In keeping with that goal, this course will not focus on any one of those products, although Windows Server, which is the common platform for all of those products, will serve as the example for the techniques this course teaches.
Audience profile
This course is intended for IT Professionals who are already experienced in general Windows Server and Windows Client administration, and who want to learn more about using Windows PowerShell for administration. No prior experience with any version of Windows PowerShell, or any scripting language, is assumed. This course is also suitable for IT Professionals already experienced in server administration, including Exchange Server, SharePoint Server, SQL Server, System Center, and others.
At course completion
After completing this course, students will be able to:
• Describe the functionality of Windows PowerShell and use it to run and find basic commands.
• Identify and run cmdlets for server administration.
• Work with Windows PowerShell pipeline.
• Describe the techniques Windows PowerShell pipeline uses.
• Use PSProviders and PSDrives to work with other forms of storage.
• Query system information by using WMI and CIM.
• Work with variables, arrays, and hash tables.
• Write basic scripts in Windows PowerShell.
• Write advanced scripts in Windows PowerShell.
• Administer remote computers.
• Use background jobs and scheduled jobs.
• Use advanced Windows PowerShell techniques.
Course Outline
Module 1: Getting started with Windows PowerShell
This module will introduce you to Windows PowerShell and provide an overview of the product’s functionality. The module shows you how to open and configure the shell for use and how to run commands within the shell. The module also introduces the built-in Help system in Windows PowerShell.
Lessons
• Overview and background of Windows PowerShell
• Understanding command syntax
• Finding commands
Lab : Configuring Windows PowerShell
• Configuring the Windows PowerShell console
• Configuring the Windows PowerShell ISE application
Lab : Finding and running basic commands
• Finding commands
• Running commands
• Using the About files
After completing this module, students will be able to:
• Open and configure Windows PowerShell.
• Find and run Windows PowerShell commands.
• Run commands by using the correct command and parameter syntax.
Module 2: Cmdlets for administration
This module introduces you to the cmdlets commonly used for administration. While you can search for cmdlets each time you need to accomplish a task, it is more efficient to have at least a basic understanding of the cmdlets available for system administration.
Lessons
• Active Directory administration cmdlets
• Network configuration cmdlets
• Other server administration cmdlets
Lab : Windows Administration
• Creating and managing Active Directory objects
• Configuring network settings on Windows Server
• Creating a web site
After completing this module, students will be able to:
• Identify and use cmdlets for Active Directory administration.
• Identify and use cmdlets for network configuration.
• Identify and use cmdlets for other server administration tasks.
Module 3: Working with the Windows PowerShell pipeline
This module introduces the pipeline feature of Windows PowerShell. Although the pipeline feature is included in several command-line shells such as the command prompt in the Windows operating system, the pipeline feature in Windows PowerShell provides more complex, more flexible, and more capable functionalities compared to other shells. This module provides you with the skills and knowledge that will help you use the shell more effectively and efficiently.
Lessons
• Understanding the pipeline
• Selecting, sorting, and measuring objects
• Filtering objects out of the pipeline
• Enumerating objects in the pipeline
• Sending pipeline data as output
Lab : Using the pipeline
• Selecting, sorting, and displaying data
Lab : Filtering objects
• Filtering objects
Lab : Enumerating objects
• Enumerating objects
Lab : Sending output to a file
• Exporting user information to a file
After completing this module, students will be able to:
• Describe the purpose of the Windows PowerShell pipeline.
• Select, sort, and measure objects in the pipeline.
• Filter objects out of the pipeline.
• Enumerate objects in the pipeline.
• Send output consisting of pipeline data.
Module 4: Understanding how the pipeline works
This module shows you how Windows PowerShell passes objects from one command to another in the pipeline. The shell provides two techniques that you can use. Knowing how these techniques work, and which one will be used in a given scenario, lets you construct more useful and complex command lines.
Lessons
• Passing the pipeline data
• Advanced considerations for pipeline data
Lab : Working with pipeline parameter binding
• Predicting pipeline behaviour
After completing this module, students will be able to:
• Pass data by using the ByValue technique.
• Describe the advanced techniques for passing pipeline data.
Module 5: Using PSProviders and PSDrives
This module introduces the PSProviders and PSDrives adapters. A PSProvider is basically a Windows PowerShell adapter that makes some form of storage resemble a disk drive. A PSDrive is an actual connection to a form of storage. You can use these two adapters to work with various forms of storage by using the same commands and techniques that you use to manage the file system.
Lessons
• Using PSProviders
• Using PSDrives
Lab : Using PSProviders and PSDrives
• Creating files and folders on a remote computer
• Creating a registry key for your future scripts
• Create a new Active Directory group
After completing this module, students will be able to:
• Use PSProviders.
• Use PSDrives.
Module 6: Querying system information by using WMI and CIM
This module introduces you to two parallel technologies: Windows Management Instrumentation (WMI) and Common Information Model (CIM). Both these technologies provide local and remote access to a repository of management information including access to robust information available from the operating system, computer hardware, and installed software.
Lessons
• Understanding WMI and CIM
• Querying data by using WMI and CIM
• Making changes with WMI/CIM
Lab : Working with WMI and CIM
• Querying information by using WMI
• Querying information by using CIM
• Invoking methods
After completing this module, students will be able to:
• Explain the differences between Common Information Model (CIM) and Windows Management Instrumentation (WMI).
• Query management information by using CIM and WMI.
• Invoke methods by using CIM and WMI.
Module 7: Working with variables, arrays, and hash tables
This module provides you the skills and knowledge required to use variables, arrays, and hash tables in Windows PowerShell.
Lessons
• Using variables.
• Manipulating variables.
• Manipulating arrays and hash tables.
Lab : Working with variables
• Working with variable types
• Using arrays
• Using hash tables
After completing this module, students will be able to:
• Assign a value to variables.
• Describe how to manipulate variables.
• Describe how to manipulate arrays and hash tables.
Module 8: Basic scripting
This module shows you how to package a Windows PowerShell command in a script. Scripts allow you to perform repetitive tasks and more complex tasks than cannot be accomplished in a single command.
Lessons
• Introduction to scripting
• Scripting constructs
• Importing data from files
Lab : Basic scripting
• Setting a script
• Processing an array with a ForEach loop
• Processing items by using If statements
• Creating a random password
• Creating users based on a CSV file
After completing this module, students will be able to:
• Run a Windows PowerShell script.
• Use Windows PowerShell scripting constructs.
• Import data from a file.
Module 9: Advanced scripting
This module introduces you to more advanced techniques that you can use in scripts. These techniques includes gathering user input, reading input from files, documenting scripts with help information and error handling.
Lessons
• Accepting user input
• Overview of script documentation
• Troubleshooting and error handling
• Functions and modules
Lab : Accepting data from users
• Querying disk information from remote computers
• Updating the script to use alternate credentials
• Documenting a script
Lab : Implementing functions and modules
• Creating a logging function
• Adding error handling to a script
• Converting a function to a module
After completing this module, students will be able to:
• Accept user input for a script.
• Explain script documentation.
• Implement error handling for a script.
• Explain functions and modules.
Module 10: Administering Remote Computers
This module introduces you to the Windows PowerShell remoting technology that enables you to connect to one or more remote computers and instruct them to run commands on your behalf.
Lessons
• Using basic Windows PowerShell remoting
• Using advanced Windows PowerShell remoting techniques
• Using PSSessions
Lab : Using basic remoting
• Enabling remoting on the local computer
• Performing one-to-one remoting
• Performing one-to-many remoting
Lab : Using PSSessions
• Using implicit remoting
• Managing multiple computers
After completing this module, students will be able to:
• Describe remoting architecture and security.
• Use advanced remoting techniques.
• Create and manage persistent remoting sessions.
Module 11: Using background jobs and scheduled jobs
This module provides information about the job features of Windows PowerShell. Jobs are an extension point in Windows PowerShell, and there are many different kinds of jobs. Each kind of job can work slightly differently, and has different capabilities.
Lessons
• Using background jobs
• Using scheduled jobs
Lab : Using background jobs and scheduled jobs
• Starting and managing jobs
• Creating a scheduled job
After completing this module, students will be able to:
• Create and manage background jobs.
• Create and manage scheduled jobs.
Module 12: Using advanced Windows PowerShell techniques
This module covers several advanced Windows PowerShell techniques and features. Many of these techniques and features extend functionality that you have learned about in previous modules. Some of these techniques are new and provide additional capabilities.
Lessons
• Creating profile scripts
• Using advanced techniques
Lab : Practicing advanced techniques
• Creating a profile script
• Verifying the validity of an IP address
• Reporting disk information
• Configuring NTFS permissions
• Creating user accounts with passwords from a CSV file
Lab : Practicing script development (optional)
• TBA
• TBA
• TBA
After completing this module, students will be able to:
• Create and manage profile scripts.
• Use advanced techniques to work with data.
Prerequisites
• Experience with Windows networking technologies and implementation.
• Experience with Windows Server administration, maintenance, and troubleshooting.
• Experience with Windows Client administration, maintenance, and troubleshooting
• Students who attend this training can meet the prerequisites by obtaining equivalent knowledge and skills through practical experience as a Windows system administrator. No prerequisite courses are required.
Overview
Technology: SharePoint Server
Level: Intermediate
This Revision: A
Delivery method: Classroom
Length: 5 days
Language(s): English
Tecnologia: SharePoint Server
Nível: Intermediário
Esta revisão: UMA
Método de Entrega: Sala de aula
Carga: 5 dias
Língua(s): Inglês
About this course
This five-day course will provide you with the knowledge and skills to plan and administer a Microsoft SharePoint 2016 environment. The course teaches you how to deploy, administer, and troubleshoot your SharePoint environment. This course also provides guidelines, best practices, and considerations that help you optimize your SharePoint deployment.
This is the first in a sequence of two courses for IT professionals and is aligned with the SharePoint 2016 IT Pro certification.
Audience profile
The course is targeted at experienced IT professionals who are interested in learning how to install, configure, deploy, and manage SharePoint 2016 installations either in a data center or in the cloud.
Students typically have more than one year of hands-on experience* with planning and maintaining SharePoint and two years’ experience with other core technologies on which SharePoint depends, including Windows Server 2012 R2 or later, Internet Information Services (IIS), Microsoft SQL Server 2014 or later, Active Directory Domain Services (AD DS), and networking infrastructure services.
The minimally qualified candidate typically:
• Is an IT professional who plans, implements, and maintains a multi-server deployment of SharePoint 2016.
• Has a working knowledge of, and preferably hands-on experience, with SharePoint Online.
• Has broad familiarity with SharePoint workloads.
• Has experience with business continuity management, including data backup, restoration, and high availability.
• Has experience with authentication and security technologies.
• Has experience with Windows PowerShell.
* The hands-on experience or job experience should be from a solutions-based role where the candidate has worked on multiple solutions in the SharePoint space that includes document management, content management, and search.
At course completion
After completing this course, students will be able to:
• Describe the key features of SharePoint 2016.
• Design an information architecture for a SharePoint 2016 deployment.
• Design a logical architecture for a SharePoint 2016 deployment.
• Design the physical architecture for a SharePoint 2016 deployment.
• Install and configure SharePoint 2016.
• Create and configure web applications and site collections.
• Plan and configure service applications for a SharePoint 2016 deployment.
• Manage users and permissions, and secure content in a SharePoint 2016 deployment.
• Configure authentication in a SharePoint 2016 deployment.
• Configure platform and farm-level security in a SharePoint 2016 deployment.
• Manage information taxonomy in SharePoint web applications and site collections.
• Configure and manage user profiles and audiences.
• Configure and manage the search experience in SharePoint 2016.
• Monitor, maintain, and troubleshoot a SharePoint 2016 deployment.
Course Outline
Module 1: Introducing SharePoint 2016
This module describes the structure and capabilities of a SharePoint environment, and the major changes for IT professionals in SharePoint 2016. This module also describes the options available for deploying SharePoint 2016.
Lessons
• Key components of a SharePoint deployment
• New features in SharePoint 2016
• SharePoint 2016 deployment options
After completing this module, students will be able to:
• Identify the architecture and capabilities of SharePoint 2016.
• Identify new and deprecated features in SharePoint 2016.
• Identify deployment options for SharePoint 2016.
Module 2: Designing an information architecture
This module describes how to gather business requirements, and the key elements of a successful information architecture project. This module also explains how to structure information within a SharePoint 2016 deployment and make it easy to find and retrieve.
Lessons
• Identifying business requirements
• Understanding business requirements
• Organizing information in SharePoint 2016
• Planning for discoverability
Lab : Designing an information architecture - Part one
• Identifying site columns and content types
Lab : Creating an information architecture - Part two
• Designing a business taxonomy
After completing this module, students will be able to:
• Explain how understanding business requirements drives the design of an organizational information architecture.
• Describe the key components available in SharePoint 2016 to deploy an information architecture.
• Plan for discoverability as part of an information architecture deployment.
Module 3: Designing a logical architecture
This module explains how to approach a logical architecture design and how to document it.
Lessons
• Overview of the SharePoint 2016 logical architecture
• Documenting your logical architecture
Lab : Designing a logical architecture
• Planning a logical architecture
• Producing a logical architecture diagram
After completing this module, students will be able to:
• Map business requirements to SharePoint 2016 architecture components.
• Explain the importance of documentation and describe the options for documenting the logical architecture.
Module 4: Designing a physical architecture
This module describes the physical design requirements for SharePoint 2016, and the physical components necessary to fulfill the physical architecture design. It also explains the SharePoint farm topologies, and describes how to map a logical architecture design to a physical architecture design.
Lessons
• Designing physical components for SharePoint deployments
• Designing supporting components for SharePoint deployments
• SharePoint farm topologies
• Mapping a logical architecture design to a physical architecture design
Lab : Designing a physical architecture
• Designing a physical architecture
• Developing a physical architecture design diagram
After completing this module, students will be able to:
• Describe the requirements for the physical components that are needed for a SharePoint 2016 deployment.
• Describe the requirements for the supporting components that are needed for a successful SharePoint 2016 deployment.
• Identify SharePoint farm topologies.
• Map a logical architecture design to a physical architecture design.
Module 5: Installing and configuring SharePoint 2016
This module explains how to install SharePoint 2016 in different topologies, script the installation, and configure a SharePoint 2016 environment. This module also explains how to configure the core farm-level settings in a SharePoint 2016 deployment.
Lessons
• Installing SharePoint 2016
• Scripting installation and configuration of SharePoint
• Configuring SharePoint 2016 farm settings
Lab : Deploying and configuring SharePoint 2016 – Part one
• Provisioning a SharePoint 2016 farm
Lab : Deploying and configuring SharePoint 2016 – Part two
• Configuring incoming email
• Configuring outgoing email
• Configuring integration with Office Online Server
After completing this module, students will be able to:
• Install SharePoint 2016.
• Deploy and configure SharePoint 2016.
• Script the installation and configuration of SharePoint 2016.
• Configure SharePoint 2016 farm settings.
Module 6: Creating web applications and site collections
This module explains how to create web applications in SharePoint 2016 and how to configure these applications. It also explains how to create and configure site collections in SharePoint 2016 and SharePoint Online.
Lessons
• Creating web applications
• Configuring web applications
• Creating and configuring site collections
Lab : Creating and configuring web applications
• Creating a web application
• Configuring a web application
Lab : Creating and configuring site collections
• Creating and configuring site collections
• Creating a site collection in a new content database
• Using Fast Site Collection Creation
After completing this module, students will be able to:
• Create web applications.
• Configure web applications.
• Create and configure site collections.
Module 7: Planning and configuring service applications
This module describes the service application architecture in SharePoint 2016, and how to provision and manage service applications.
Lessons
• Introduction to the service application architecture
• Creating and configuring service applications
Lab : Planning and configuring service applications
• Provisioning a Managed Metadata Service application with Central Administration
• Provisioning a Managed Metadata Service application with Windows PowerShell
• Configuring the Word Automation Services service application for document conversion
• Configuring service application proxy groups
After completing this module, students will be able to:
• Explain the key components and topologies for a SharePoint 2016 service application architecture.
• Plan for service accounts and service application dependencies.
• Understand the purpose of mapping service applications to business requirements.
• Describe how to provision and manage SharePoint 2016 service applications
Module 8: Managing users and permissions, and securing content
This module explains how to configure authorization in SharePoint 2016. It also explains how to configure site collection security in SharePoint 2016.
Lessons
• Configuring authorization in SharePoint 2016
• Managing access to content
Lab : Managing users and groups
• Creating a web-application policy
• Creating and managing SharePoint groups
• Creating custom permission levels
Lab : Securing content in SharePoint sites
• Managing permissions and inheritance
• Managing site-collection security
• Enabling anonymous access to a site
After completing this module, students will be able to:
• Manage users and permissions in SharePoint 2016.
• Manage access to content in SharePoint 2016.
Module 9: Configuring authentication for SharePoint 2016
This module explains about the SharePoint 2016 authentication infrastructure, and how to configure claims, providers, and identity federation for SharePoint 2016. It also explains how to configure server-to-server authentication for SharePoint 2016.
Lessons
• Overview of authentication
• Configuring federated authentication
• Configuring server-to-server authentication
Lab : Extend your SharePoint 2016 to support Secure Sockets Layer (SSL)
• Configuring Microsoft SharePoint 2016 to use federated identities
• Configuring Active Directory Federation Services (AD FS) to enable a web application a relying party
• Configuring SharePoint to trust AD FS as an identity provider
• Configuring a web application to use the AD FS identity provider
After completing this module, students will be able to:
• Explain the authentication infrastructure of SharePoint 2016.
• Configure claims providers and identity federation for SharePoint 2016.
• Configure server-to-server authentication for SharePoint 2016.
Module 10: Securing a SharePoint 2016 deployment
This module explains how to secure a SharePoint 2016 deployment at the platform level, and how to configure farm-level security settings for a SharePoint 2016 deployment.
Lessons
• Securing the platform
• Configuring farm-level security
Lab : Securing a SharePoint 2016 deployment
• Configuring SharePoint Server communication security
• Hardening a SharePoint server farm
• Configuring blocked file types
• Configuring Web Part security
• Implementing security auditing
After completing this module, students will be able to:
• Secure a SharePoint 2016 deployment at the platform level.
• Configure farm-level security settings for a SharePoint 2016 deployment.
Module 11: Managing taxonomy
This module explains how to create and manage content types and content-type propagation. Additionally, it explains how to implement managed metadata in SharePoint web applications and site collections. It also explains how to configure the managed metadata service application in SharePoint 2016.
Lessons
• Managing content types
• Understanding managed metadata
• Configuring the managed metadata service
Lab : Configuring content-type propagation
• Creating content types for propagation
• Publishing content types across site collections
Lab : Configuring and using the managed metadata service
• Configuring the managed metadata service
• Creating term sets and terms
• Consuming term sets
After completing this module, students will be able to:
• Create and manage content types and content-type propagation.
• Explain how to implement managed metadata in SharePoint web applications and site collections.
• Configure the managed metadata service application in SharePoint 2016.
Module 12: Configuring user profiles
This module explains how to configure the User Profile service application, and how to manage user profiles and audiences
.Lessons
• Configuring the User Profile Service Application
• Managing user profiles and audiences
Lab : Configuring user profiles
• Configuring the User Profile Service Application
• Configuring directory import and synchronization
Lab : Configuring My Sites and audiences
• Configuring My Sites
• Configuring audiences
After completing this module, students will be able to:
• Configure the User Profile service application.
• Manage user profiles and audiences.
Module 13: Configuring Enterprise Search
This module describes the Search Service Application and explains how to configure the Search service in SharePoint 2016. It also explains how to manage the search experience in SharePoint 2016.
Lessons
• Understanding the Search Service Application architecture
• Configuring Enterprise Search
• Managing Enterprise Search
Lab : Configuring Enterprise Search
• Configuring the Search Service Application
• Configuring a file share content source
• Configuring a local SharePoint content source
• Creating a search center
Lab : Optimizing the search experience
• Configuring a result source and a query rule
• Customizing the search experience
• Creating and deploying a thesaurus
• Configuring entity extractors and refiners
• Managing query spelling correction
After completing this module, students will be able to:
• Describe the Search service architecture in SharePoint 2016.
• Configure the Search service in SharePoint 2016.
• Manage the search experience in SharePoint 2016.
Module 14: Monitoring and maintaining a SharePoint 2016 environment
This module explains how to implement a monitoring plan for SharePoint 2016, and how to optimize the performance of a SharePoint 2016 deployment. It also explains how to plan for and configure SharePoint caching. Further, it explains how to identify and resolve problems in a SharePoint 2016 environment.
Lessons
• Monitoring a SharePoint 2016 environment
• Tuning and optimizing a SharePoint 2016 environment
• Planning and configuring caching
• Troubleshooting a SharePoint 2016 environment
Lab : Monitoring a SharePoint 2016 deployment
• Configuring usage and health data collection
• Configuring Sharepoint diagnostic logging
• Configuring Health Analyzer rules
• Reviewing usage and health data
Lab : Investigating page load times
• Analyzing network traffic
• Analyzing SharePoint page performance
After completing this module, students will be able to:
Develop and implement a monitoring plan for a SharePoint 2016 environment.
Tune and optimize a SharePoint 2016 server farm on an ongoing basis.
Plan and configure caching to improve the performance of a SharePoint 2016 deployment.
Troubleshoot errors and other issues in a SharePoint 2016 deployment
Prerequisites
Before attending this course, students must have knowledge of:
• Software management in a Windows Server 2012 or Windows Server 2012 R2 enterprise server environment.
• Deploying and managing applications natively, virtually, and in the cloud.
• Administering IIS.
• Configuring AD DS for use in authentication, authorization, and as a user store.
• Managing an application remotely by using Windows PowerShell 4.0.
• Managing databases and server roles in SQL Server.
• Connecting applications to SQL Server.
• Implementing claims-based security.
• Using Microsoft Hyper-V virtual machines.
An ideal candidate for this course must have at least one year of experience with deploying and administering multiple SharePoint 2013 farms across a large enterprise. Because many customers have not upgraded from SharePoint 2010, a candidate can also have at least two years of experience with SharePoint 2010. However, they also must understand the differences between SharePoint 2010 and SharePoint 2013, particularly in terms of hybridization.
Overview
Audience(s): IT Pros
Technology: Office 365
Level: Intermediate
This Revision: B
Delivery method:
Classroom
Length: 3 days
Language(s): English
About this course
This is a three-day Instructor Led Training (ILT) course that targets the needs of information technology (IT) professionals who take part in administering, configuring, troubleshooting, and operating Office 365 services, including its identities, dependencies, requirements, and supporting technologies. This course focuses on skills required to administer and troubleshoot Office 365 tenant and key services of Office 365, such as Exchange Online, SharePoint Online and Skype for Business. It also covers security and compliance features of Office 365.
Audience profile
This course is intended for IT professionals and system administrators who want to learn about administration and troubleshooting techniques in Office 365. These professionals should have at least three years of experience working in their respective fields: ideally in the areas of system administration, network administration, and messaging.
At course completion
After completing this course, students will be able to:
• Describe Office 365 services.
• Administer Office 365 by using the graphical environment and Windows PowerShell.
• Administer and troubleshoot directory synchronization and directory objects.
• Administer and troubleshoot Exchange Online.
• Administer and troubleshoot Skype for Business Online and Microsoft Teams.
• Administer and troubleshoot SharePoint Online.
• Plan and deploy Microsoft Office 365 ProPlus.
• Administer and troubleshoot compliance and security in Office 365
Course Outline
Module 1: Office 365 services overview
This module describes the features of Office 365 and identifies recent improvements to the service. It also identifies licensing options, describes the process of Office 365 tenant configuration, and lists appropriate Office 365 client options.
Lessons
• Overview of Office 365 services
• Office 365 licensing overview
• Office 365 tenant configuration
• Office 365 clients
Lab : Office 365 services overview
• Setting up Office 365 lab environment
• Configuring Office 365 Services
After completing this module, students will be able to:
• Describe Office 365 services.
• Explain Office 365 licensing options.
• Describe Office 365 tenant configuration.
• Describe the available Office 365 clients.
Module 2: Office 365 administration, tools, and techniques
This module describes how to manage Office 365 by using the administrative portals and Windows PowerShell. It also explains how to manage administrative access and troubleshoot administration in Office 365.
Lessons
• Managing Office 365 with the administrative portals
• Managing Office 365 with Windows PowerShell
• Managing administrative access in Office 365
• Troubleshooting administration in Office 365
Lab : Administering Office 365
• Using administrative portal
• Administering Office 365 with Windows PowerShell
• Configuring role-based administration
• Troubleshooting administrative access in Office 365
After completing this module, students will be able to:
• Manage Office 365 by using the administrative portals.
• Manage Office 365 by using Windows PowerShell.
• Manage administrative access in Office 365.
• Troubleshoot administration in Office 365.
Module 3: Administering and troubleshooting directory synchronization and directory objects
This module describes directory synchronization and federation. The module explains how to manage Microsoft Azure Active Directory Connect (Azure AD Connect) and user and group objects in Office 365. Additionally, it describes how to troubleshoot objects and directory synchronization in Office 365.
Lessons
• Overview of directory synchronization and federation overview
• Azure AD Connect management
• Managing users and groups objects in Office 365
• Troubleshooting objects and directory synchronization in Office 365
Lab : Administering directory synchronization, users, and groups in Office 365
• Configuring Azure AD Connect
• Managing Office 365 users and groups by using the Office 365 admin center
• Managing Office 365 password policies
• Troubleshooting synchronization issues with user objects in Office 365
After completing this module, students will be able to:
• Describe directory synchronization and federation.
• Manage Azure AD Connect.
• Manage user and group objects in Officce 365.
• Troubleshoot objects and directory synchronization in Office 365
Module 4: Administering and troubleshooting Exchange Online
This module describes the subscription options and roles in Exchange Online. It explains how to administer Exchange Online recipients and client access policies in Exchange Online and how to troubleshoot Exchange Online.
Lessons
• Exchange Online management overview
• Administering Exchange Online recipients
• Administering client access policies in Exchange Online
• Troubleshooting Exchange Online
Lab : Administering and troubleshooting Exchange Online
• Configuring and administering Exchange Online recipients
• Configuring delegated administration
• Configuring client access policies
• Troubleshoot Exchange Online
After completing this module, students will be able to:
• Describe the subscription options and roles in Exchange Online.
• Administer Exchange Online recipients.
• Administer client access policies in Exchange Online.
• Troubleshoot Exchange Online
Module 5: Administering and troubleshooting Skype for Business Online and Teams
This module describes Skype for Business Online and Teams. It explains how to administer, manage, and troubleshoot Skype for Business Online and Teams.
Lessons
• Skype for Business Online and Teams overview
• Administering and managing Skype for Business Online and Teams
• Troubleshooting Skype for Business Online and Teams
Lab : Administering Skype for Business Online and Teams
• Configuring Skype for Business Online and Teams organization settings
• Configuring Skype for Business Online and Teams user settings
• Troubleshooting Skype for Business Online
After completing this module, students will be able to:
• Describe Skype for Business Online and Teams.
• Administer and manager Skype for Business Online and Teams.
• Troubleshoot Skype for Business Online and Teams.
Module 6: Administering and troubleshooting SharePoint Online
This module describes how to configure SharePoint Online settings and site collections and external user access to SharePoint Online. It also explains how to manage Microsoft OneDrive for Business synchronization and how to troubleshoot SharePoint Online.
Lessons
• SharePoint Online management overview
• Administering SharePoint Online site collections
• Administering external users in SharePoint Online
• Configuring OneDrive for Business
• Troubleshooting SharePoint Online
Lab : Configuring and administering SharePoint Online
• Configuring SharePoint Online settings
• Creating and configuring a SharePoint site collection
• Configuring and verifying external user sharing
• Configuring OneDrive for Business
• Troubleshooting SharePoint Online
After completing this module, students will be able to:
• Configure SharePoint Online settings.
• Configure SharePoint Online site collections.
• Configure external user access to SharePoint Online.
• Manage Microsoft OneDrive for Business synchronization.
• Troubleshoot SharePoint Online.
Module 7: Planning and deploying Office 365 ProPlus
This module describes Office 365 ProPlus. It also explains how to plan and manage user-driven Office 365 ProPlus deployments and how to troubleshoot the deployments.
Lessons
• Overview of Office 365 ProPlus
• Managing user-driven Office 365 ProPlus deployments
• Troubleshooting Office 365 ProPlus deployments
Lab : Managing Office 365 ProPlus installations
• Preparing Office 365 ProPlus installations
• Managing user-driven Office 365 ProPlus installations
• Managing centralized Office 365 ProPlus installations
• Troubleshooting Office 365 ProPlus deployments
After completing this module, students will be able to:
• Describe Office 365 ProPlus.
• Plan and manage user-driven Office 365 ProPlus deployments.
• Troubleshoot Office 365 ProPlus deployments.
Module 8: Administering and troubleshooting compliance and security in Office 365
This module describes the compliance features in Office 365. It explains how to administer Azure Information Protection and the compliance features in Office 365, how to configure and administer email security in Office 365, and how to troubleshoot Office 365 compliance and protection.
Lessons
• Overview of compliance features in Office 365
• Administering information protection in Office 365
• Administering compliance features in Office 365
• Configuring and administering email security in Office 365
• Troubleshooting Office 365 compliance and protection
Lab : Configuring and troubleshooting compliance and security
• Configuring rights management in Office 365
• Configuring compliance features
• Configuring email protection
• Troubleshooting security and compliance
After completing this module, students will be able to:
• Describe the compliance features in Office 365.
• Administer Azure Information Protection in Office 365.
• Administer the compliance features in Office 365.
• Configure and administer email security in Office 365.
• Troubleshoot Office 365 compliance and protection.
Prerequisites
Before attending this course, students must have:
• A minimum of two years of experience administering the Windows Server operating system, including Windows Server 2012 or newer.
• A minimum of one year of experience working with Active Directory Domain Services (AD DS).
• A minimum of one year experience working with name resolution, including DNS.
• Experience working with certificates, including public key infrastructure (PKI) certificates
• Experience working with certificates, including public key infrastructure (PKI) certificates.Experience working with Windows Powershell.
• Experience working with Microsoft Exchange Server 2013 or newer, Microsoft Lync 2013 Server or Skype for Business 2015 Server, and Microsoft SharePoint Server 2013 or newer is beneficial but not required.
Visão Global
A segurança da informação é a proteção das informações de uma grande variedade de ameaças com o objetivo de assegurar a continuidade do negócio, minimizar o risco do negócio e maximizar o retorno sobre os investimentos e as oportunidades de negócios.
A segurança das informações vem ganhando importância no mundo da Tecnologia da Informação (TI). A globalização da economia está gerando uma troca cada vez maior de informações entre as organizações (seus funcionários, clientes e fornecedores) bem como uma explosão no uso de computadores em rede e dispositivos de informática.
A norma internacional para Gerenciamento de Segurança da Informação ISO/IEC 27001, é uma norma amplamente respeitada e consultada e fornece uma estrutura para a organização e o gerenciamento de um programa de segurança das informações. A implementação de um programa com base nesta norma será muito útil para o objetivo de uma organização de atender a muitas das necessidades apresentadas no complexo ambiente operacional da atualidade. Uma compreensão categórica desta norma é importante para o desenvolvimento pessoal de todos os profissionais de segurança das informações.
Nos módulos de Segurança da Informação do EXIN, utiliza-se a seguinte definição: A Segurança da Informação lida com a definição, a implementação, a manutenção, a conformidade e a avaliação de um conjunto coerente de controles (medidas) que garantam a disponibilidade, a integridade e a confidencialidade da fonte de informações (manual e automática).
No EXIN Information Security Foundation baseado na ISO/IEC 27001 são testados os conceitos básicos de segurança da informação e suas relações. Um dos objetivos desse módulo é aumentar a conscientização de que as informações são valiosas e vulneráveis e aprender quais medidas são necessárias para protegê-las.
Público Alvo
Qualquer pessoa na organização que manuseia informações. É também aplicável a proprietários de pequenas empresas a quem alguns conceitos básicos de Segurança da Informação são necessários. Este módulo pode ser um excelente ponto de partida para novos profissionais de segurança da informação.
Carga:
16h
Conteúdo
1. Informação e segurança
1.1 O conceito de informação
1.2 Valor da informação
1.3 Aspectos de confiabilidade
2. Ameaças e riscos
2.1 Ameaças e riscos
2.2 Relacionamento entre ameaças, riscos e confiabilidade da informação
3. Abordagem e organização
3.1 Política de segurança e organização de segurança
3.2 Componentes da organização da segurança
3.3 Gerenciamento de incidentes
4. Medidas
4.1 Importância de medidas de segurança
4.2 Medidas físicas
4.3 Medidas técnicas
4.4 Medidas organizacionais
5. Legislação e regulamentação
5.1 Legislação e regulamentação
Overview
Audience(s): IT Pros
Technology: System Center
Level: Advanced
This Revision: B
Delivery method: Classroom
Length: 2 days
Language(s): English
About this course
This is a two-day instructor-led training (ILT) course that describes the integration of various online cloud services with Microsoft System Center Configuration Manager. This course covers integration with online services such as Microsoft Store for Business, Microsoft Office 365, and Microsoft Azure. It also describes how to manage mobile devices by using methods such as on-premises mobile device management and Exchange Server integration.
Audience profile
This course is intended for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses or intends to use the latest branch of Configuration Manager to manage and deploy PCs, devices, and applications.
The secondary audience for this course are individuals who are interested in taking Exam 70-703: “Administering System Center Configuration Manager and Cloud Services Integration.”
At course completion
After completing this course, students will be able to:
• Describe the challenges in managing a mobile and internet-based workforce and how Configuration Manager integrated with mobile device management and cloud services solutions can address these challenges.
• Describe and configure methods used to manage client devices that are located outside of the corporate network and connected to the internet.
• Deploy and manage Microsoft Store for Business apps by using Configuration Manager.
• Deploy and manage Office 365 apps by using Configuration Manager.
• Manage mobile devices by using Configuration Manager.
• Describe and configure on-premises mobile device management using Configuration Manager.
Course Outline
Module 1: Extending the Configuration Manager infrastructure to support internet-based and mobile devices
This module describes the challenges in managing a mobile and internet-based workforce. It also describes how Configuration Manager integrates with mobile device management and cloud services solutions to address these challenges.
Lessons
• Managing a mobile and distributed workforce
• Integrating Configuration Manager with cloud services and internet-based management solutions
• PKI requirements to support internet-based management
• Expanding content availability by using cloud-based distribution points
Lab : Preparing for cloud integration
• Activating an Azure trial subscription
• Configuring and enabling directory syncing
Lab : Implementing PKI for Configuration Manager site systems and clients
• Creating certificate templates for Configuration Manager services
• Deploying certificates for Configuration Manager
Lab : Configuring cloud-based distribution points
• Creating and exporting an Azure management certificate for cloud-based distribution points
• Setting up Azure and creating a cloud-based distribution point
After completing this module, students will be able to:
• Understand the challenges in managing a mobile and distributed workforce.
• Understand the considerations for integrating Configuration Manager with cloud services and internet-based management solutions.
• Describe the public key infrastructure (PKI) requirements to support the internet and mobile device management.
• Explain how to expand content availability by using cloud-based distribution points.
Module 2: Managing clients on the internet
This module explains how to manage client devices that are located outside of the corporate network and connected to the internet.
Lessons
• Methods for managing internet-based clients
• Planning and implementing IBCM
• Planning and implementing the Cloud Management Gateway
Lab : Configuring IBCM
• Configuring the Configuration Manager site systems to support IBCM
• Verifying the client settings for IBCM
Lab : Configuring the Cloud Management Gateway for managing clients on the internet
• Enabling the Cloud Management Gateway feature
• Creating and exporting the Azure management certificate for cloud-based distribution points
• Setting up the Cloud Management Gateway
After completing this module, students will be able to:
• Identify the methods for managing client devices that are connected to the internet, but located outside the corporate network.
• Describe the considerations and tasks for enabling Configuration Manager to support internet-based client management (IBCM).
• Describe the considerations and procedures for implementing the Cloud Management Gateway to support internet-based clients.
Module 3: Managing Microsoft Store for Business apps by using Configuration Manager
This module explains how to use Microsoft Store for Business, how to set it up, and how to manage it. It also describes how to deploy and manage Microsoft Store for Business apps by using Configuration Manager.
Lessons
• Overview of Microsoft Store for Business
• Managing Microsoft Store for Business apps by using Configuration Manager
Lab : Setting up and managing Microsoft Store for Business
• Signing up for Microsoft Store for Business
• Managing Microsoft Store for Business
Lab : Deploying Microsoft Store for Business apps by using Configuration Manager
• Setting up syncing with Microsoft Store for Business
• Deploying and managing Microsoft Store for Business apps
After completing this module, students will be able to:
• Explain how to manage Microsoft Store for Business and describe its features.
• Deploy apps from Microsoft Store for Business by using Configuration Manager.
Module 4: Managing Office 365 apps by using Configuration Manager
This module explains how to implement Office 365 client management to help support an Office 365 cloud-based solution. It also describes how to deploy and manage Office 365 apps by using Configuration Manager.
Lessons
• Overview of Office 365 ProPlus
• Deploying Office 365 client applications by using Configuration Manager
• Managing and updating an Office 365 client deployment
Lab : Preparing Office 365 for application deployment
• Signing up for an Office 365 trial subscription
• Assigning Office 365 ProPlus licenses to users
• Modifying Office 365 ProPlus options for manual downloads
Lab : Deploying and managing Office 365 client applications by using Configuration Manager
• Configuring infrastructure requirements to support Office 365 client management
• Deploying the Office 365 client application
• Configuring software updates to support Office 365
After completing this module, students will be able to:
• Describe Microsoft Office 365 ProPlus features.
• Use Configuration Manager to deploy Office 365 applications.
• Manage and update an Office 365 client deployment.
Module 5: Mobile device management by using Configuration Manager
This module describes the methods and technologies to manage mobile devices by using Configuration Manager.
Lessons
• Overview of mobile device management
• Configuring the Exchange Server connector for mobile device management
Lab : Managing mobile devices by using the Exchange Server connector
• Configuring permissions for Exchange integration
• Configuring the Exchange Server connector
• Managing mobile devices by using Configuration Manager
After completing this module, students will be able to:
• Provide an overview of Microsoft mobile device management technologies and how they integrate with Configuration Manager.
• Explain how to deploy the Microsoft Exchange Server connector for Configuration Manager.
Module 6: On-premises mobile device management using Configuration Manager
This module explains on-premises mobile device management, its requirements, and the types of devices it can manage. It also explains how to implement on-premises mobile device management in an existing Configuration Manager environment and the different ways to enroll Windows 10 devices.
Lessons
• Overview of on-premises mobile device management
• Configuring on-premises mobile device management using Configuration Manager
Lab : Managing mobile devices with an on-premises infrastructure
• Configuring PKI for on-premises mobile device management
• Preparing Configuration Manager for on-premises mobile device management
• Enrolling Windows 10 devices for on-premises mobile device management
After completing this module, students will be able to:
• Explain what on-premises mobile device management is and compare it with other management options.
• Plan for and implement the requirements for on-premises mobile device management.
• Enroll a modern Windows 10 device in on-premises mobile device management
Additional Reading
To help you prepare for this class, attend the following course:
• Course 20703-1A: Administering System Center Configuration Manager
Prerequisites
Before attending this course, students must have system administrator–level working knowledge of:
• Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching, and addressing.
• Active Directory Domain Services (AD DS) principles and fundamentals of AD DS management.
• Installation, configuration, and troubleshooting for Windows-based personal computers.
• Basic concepts of PKI security.
• Basic understanding of scripting and Windows PowerShell syntax.
• Basic understanding of Windows Server roles and services.
• Basic understanding of the configuration options for iOS, Android, and Windows Mobile device platforms.
• Basic understanding of management tasks using Configuration Manager.
Este treinamento é composto pelos seguintes cursos:
1. AZ-101T01: Migrate Servers to Azure (Carga: 8h)
2. AZ-101T02: Implement and Manage Application Services (Carga: 8h)
3. AZ-101T03: Implement Advanced Virtual Networking (Carga: 8h)
4. AZ-101T04: Secure Identities (Carga: 8h)
____________________________________
Segue abaixo a descrição dos cursos:
1.Course AZ-101T01-A: Migrate Servers to Azure
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
This course teaches IT professionals how to discover, assess, plan and implement a migration of on-premises resources and infrastructure to Azure. Students will learn how to use Azure Migrate to perform the discovery and assessment phase that is critical to a successful migration. Students will also learn how to use Azure Site Recovery for performing the actual migration of workloads to Azure. The course focuses primarily on using ASR on a Hyper-V infrastructure to prepare and complete the migration process. Students will learn about using Azure Backup and Azure to Azure replication to ensure adequate disaster recovery mechanisms are in place. Finally, students will learn about using Azure Database Migration Service and the Azure Import/Export service for data migration scenarios.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Use Azure Migrate to discover and assess on-premises virtual machine migration to Azure.
• Use Azure Site Recovery to migrate Hyper-V infrastructures to Azure.
• Use Azure Database Migration service and Azure Import/Export service for data migration scenarios.
Course Outline
Module 1: Azure Migrate
In this module, you will be introduced to Azure migration projects and specifically Azure Migrate. Azure Migrate will be your tool of choice for automated server discovery and workload sizing. You will step through the process of using Azure Migrate to create a project, create a collector, assess machine readiness, and estimate cost.
Lessons
• Overview of Cloud Migration
• Azure Migrate: The Process
After completing this module, students will be able to:
• Use Azure Migrate to discover and assess on-premises virtual machine migration to Azure.
Module 2: Azure Site Recovery
In this module, you will be introduced to Azure Site Recovery (ASR). ASR will be your primary tool for migrating workloads to Azure. You will learn which scenarios are most appropriate for ASR and the features that the product provides. You will also learn how to use the ASR deployment planner to ensure your infrastructure is ready for migration. Lastly, you will walk through the process of implementing ASR on a Hyper-V infrastructure.
Lessons
• Overview of ASR
• Preparing the Infrastructure
• Completing the Migration Process
After completing this module, students will be able to:
• Use Azure Site Recovery to migrate Hyper-V infrastructures to Azure.
Module 3: Disaster Recovery
In this module, you will introduced to Azure Backup. Azure Backup can be used to backup and restore your virtual machines. You will also learn about Azure to Azure replication. This will enable you to replicate virtual machines from one Azure region to another Azure region. This will protect against regional outages.
Lessons
• Backup and Restore
• Azure to Azure Disaster Recovery
After completing this module, students will be able to:
• Use Azure Backup for virtual machines, and migrate virtual machines from one Azure region to another.
Module 4: Migrating Data
In this module, you will learn about using the Azure Database Migration service to perform seamless migrations at scale from multiple database sources to Azure Data platforms. You’ll also learn how to transfer large amount of data to and from the cloud using the Azure Import/Export service.
Lessons
• Database Migration
• Import and Export Service
After completing this module, students will be able to:
• Use Azure Database Migration service and Azure Import/Export service for data migration scenarios.
Module 5: Lab-Implement Azure Site Recovery Between Azure Regions
This module is provided to give you hands-on experience with the information provided in the course.
Lab : Implement Azure Site Recovery Between Azure Regions
• Implement prerequisites for migration of Azure VMs by using Azure Site Recovery
• Migrate an Azure VM between Azure regions by using Azure Site Recovery
After completing this module, students will be able to:
• Implement Azure Site Recovery Vault.
• Configure replication of Azure VMs between Azure regions by using Azure Site Recovery.
Prerequisites
Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
2.Course AZ-101T02-A: Implement and Manage Application Services
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
This course teaches IT Professionals how to manage and maintain the infrastructure for the core web apps and services that developers build and deploy. Students will learn how Azure App Service is used as a Platform as a Service (PaaS) offering for deploying cloud apps for web and mobile environments. Students will learn how to use App Service Environments (ASE) to host a dedicated environment for securing and running App Service apps at scale. Students will also learn how to use deployment slots as staging environments for web apps, that can then be swapped into production when needed. This course also teaches students how to scale up and scale out to meet and adjust for demand, and how bandwidth for web traffic can be optimized using Application Gateways and Content Delivery Networks (CDN). Lastly, the course provides students with an overview of serverless computing solutions, including Azure Functions, Event Grid, Service Bus, and Logic Apps.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Implement use cases and configuration options for Azure App Services and App Service Environments.
• Manage and secure web apps with backup, restore, snapshot, and cloning.
• Optimize your web app performance with Scale Up, Scale Out, Autoscale, and Grow out strategies.
• Deploy serverless computing features like Azure Functions, Event Grid, and Service Bus.
Course Outline
Module 1: Introducing the Azure App Service Platform
In this module, you will be introduced to the Azure App Services Platform. You will learn about app service plans, web app hosting options, app service scenarios and how to monitor apps. You will also learn about how to isolate apps with App Service Environments.
Lessons
• Introducing Azure App Service
• App Service Environments
After completing this module, students will be able to:
• Implement use cases and configuration options for Azure App Services and App Service Environments.
Module 2: Managing and Securing Web Apps
In this module, you will learn how to deploy your app with minimal downtime. You will also learn how to backup, restore, snapshot, and clone your app. Lastly, you will implement security features like authentication options and authentication providers.
Lessons
• Deploying Web Apps
• Managing Web Apps
• App Service Security
After completing this module, students will be able to:
• Manage and secure web apps with backup, restore, snapshot, and cloning.
Module 3: Scaling and Performance
In this module, you will learn how to ensure your app performs under various workloads. You will learn how to scale up and scale out your app. You will learn how to automatically scale your app and to grow out the app through geo-distribution. Lastly you will learn how CDN provides a way to optimize bandwidth and web traffic.
Lessons
• Scale Up and Scale Out
• Autoscale and Grow out
• Optimizing Bandwidth and Web Traffic
After completing this module, students will be able to:
• Optimize your web app performance with Scale Up, Scale Out, Autoscale, and Grow out strategies.
Module 4: Deploying Serverless Computing Solutions
In the module, you will learn what serverless computing is and what it provides. You will implement three serverless computing solutions: Azure Functions, Event Grid, and Service Bus. Azure Functions provide small pieces of code, or "functions," that run in the cloud. Event Grid is a service for managing routing of all events from any source to any destination. Service Bus multi-tenant cloud messaging service that sends information between applications and services.
Lessons
• Serverless Computing Concepts
• Managing Azure Functions
• Managing Event Grid
• Managing Service Bus
• Managing Logic App
After completing this module, students will be able to:
• Deploy serverless computing features like Azure Functions, Event Grid, and Service Bus.
Module 5: Lab-Implement and Manage Application Services
This module is provided to give you hands-on experience with the information provided in the course.
Lab : Implement and Manage Application Services
• Implement Azure web apps.
• Manage scalability and performance of Azure web apps.
After completing this module, students will be able to:
• Implement Azure web apps.
• Manage scalability and performance of Azure web apps.
Prerequisites
Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
3.Course AZ-101T03-A: Implement Advanced Virtual Networking
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
This course teaches IT Professionals how to implement and configure different Azure networking traffic distribution mechanisms, including Azure Load Balancer, Azure Traffic Manager, and Azure Application Gateway. Students will also learn how to implement site connectivity for multiple scenarios including cross-premises and hybrid configurations, as well as extending on-premises networks into the Microsoft cloud over a dedicated private connection, using Azure ExpressRoute. Lastly, students will learn how to use Network Watcher to monitor and troubleshoot Azure virtual networks. They will also learn how to troubleshoot and remediate common errors in Azure Application Gateway and Azure Load Balancer.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Cloud Administrators use the Azure Portal and as they become more proficient they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Implement and configure Azure Load Balancer, Azure Traffic Manager, and Azure Application Gateway.
• Implement and configure Site-to-Site VPN connections and ExpressRoute.
• Implement and configure Network Watcher and troubleshooting common network issues.
Course Outline
Module 1: Distributing Network Traffic
In this module, you will learn about three ways to distribute network traffic: Azure Load Balancer, Azure Traffic Manager, and Azure Application Gateway. The Azure Load Balancer delivers high availability and network performance to your applications. The Azure Traffic Manager allows you to control the distribution of user traffic to your service endpoints. The Azure Application Gateway is a web traffic load balancer that enables you to manage traffic to your web applications.
Lessons
• Overview of Network Traffic Distribution Options
• Azure Load Balancer
• Azure Traffic Manager
• Azure Application Gateway
After completing this module, students will be able to:
• Implement and configure Azure Load Balancer, Azure Traffic Manager, and Azure Application Gateway.
Module 2: Site Connectivity
In this module, you will learn and implement two ways to connect your virtual networks: Site-to-Site VPN Connections and ExpressRoute. Site-to-Site VPN connections provide secure tunneling for cross-premises and hybrid configurations. ExpressRoute extends your on-premises networks into the Microsoft cloud over a dedicated private connection facilitated by a connectivity provider.
Lessons
• Site-to-Site VPN Connections
• ExpressRoute
After completing this module, students will be able to:
• Implement and configure Site-to-Site VPN connections and ExpressRoute.
Module 3: Monitoring and Troubleshooting Network Connectivity
In this module, you will learn important skills around troubleshooting virtual network connectivity. The primary tool discussed is Azure Network Watcher. Azure Network Watcher provides IP flow verification, VPN diagnostics, NSG views and flows, and next hop analysis.
Lessons
• Introducing Network Watcher
• Implementing Network Watcher
• Network Troubleshooting Examples
After completing this module, students will be able to:
• Implement and configure Network Watcher and troubleshooting common network issues.
Module 4: Lab-Implement Advanced Virtual Networking
This module is provided to give you hands-on experience with the information provided in the course.
Lab : Implement Advanced Virtual Networking
• Deploy Azure VMs by using Azure Resource Manager templates.
• Implement Azure Load Balancing.
• Implement Azure Traffic Manager load balancing.
After completing this module, students will be able to:
• Deploy Azure VMs by using Azure Resource Manager templates.
• Implement Azure Load Balancing.
• Implement Azure Traffic Manager load balancing.
Prerequisites
Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
4.Course AZ-101T04-A: Secure Identities
Overview
Technology: Azure
Level: Intermediate
This Revision: -A
Length: 1 day
Language(s): English
About this course
This course teaches IT Professionals to understand the challenges that organizations face in keeping modern IT environments secure, as the more distributed environments that are part of a cloud-first or hybrid world have rapidly created new security challenges for IT. The course focuses on three key areas in the defense against attackers who target security vulnerabilities, resulting particularly from credential theft and compromised identities: Role-Based Access Control (RBAC), Multi-Factor Authentication (MFA), and Azure Active Directory Privileged Identity Management (PIM). Students learn to implement two-step verification to secure the sign-in process, as well has how to use advanced features like trusted IPs and Fraud Alerts with MFA to customize their identity access strategy. Using Privileged Identity Management, students learn how to apply just the right amount of access rights for just the right amount of time to the various administrative roles as well as to resources.
Audience profile
This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient they use PowerShell and the Command Line Interface.
At course completion
After completing this course, students will be able to:
• Use Azure RBAC to grant a granular level of access based on an administrator’s assigned tasks.
• Use Azure Multi-Factor Authentication to configure a strong authentication for users at sign-in.
• User Azure AD Privileged Identity Management to configure access rights based on just-in-time administration.
Course Outline
Module 1: Introduction to Identity Protection in Azure
In this module, you’ll learn about Role-Based Access Control as the foundation to organizing and managing an organization’s administrative access based on the principle of least privilege. You will also review Azure Active Directory concepts, as well as gaining insight into the threat landscape and security risks that are exposed to IT organizations through breach of privileged access.
Lessons
• Role-Based Access Control
• Azure Active Directory (Refresher)
• Protecting Privileged Access in the Environment
After completing this module, students will be able to:
• Use Azure RBAC to grant a granular level of access based on an administrator’s assigned tasks.
Module 2: Using Multi-Factor Authentication for Secure Access
In this module, you’ll learn about securing the sign-in process through Multi-Factor Authentication (MFA). You’ll learn how MFA works and the differences in implementation between on-premises and cloud scenarios. You’ll also learn about using conditional access policies to provide more fine-grained control over apps and resources in your environment.
Lessons
• Introducing Multi-Factor Authentication
• Implementing MFA
After completing this module, students will be able to:
• Use Azure Multi-Factor Authentication to configure a strong authentication for users at sign-in.
Module 3: Azure AD Privileged Identity Management
In this module, you’ll learn how to use Azure Privileged Identity Management (PIM) to enable just-in-time administration and control the number of users who can perform privileged operations. You’ll also learn about the different directory roles available as well as newer functionality that includes PIM being expanded to role assignments at the resource level.
Lessons
• Getting Started with PIM
• PIM Security Wizard
• PIM for Directory Roles
• PIM for Role Resources
After completing this module, students will be able to:
• User Azure AD Privileged Identity Management to configure access rights based on just-in-time administration.
Module 4: Lab-Secure Identities
This module is provided to give you hands-on experience with the information provided in the course.
Lab : Secure Identities
• Deploy an Azure VM by using an Azure Resource Manager template.
• Create Azure AD users and groups.
• Delegate management of Azure resources by using custom Role-Based Access Control (RBAC) roles.
• Delegate management of Azure AD by using Privileged Identity Management directory roles.
• Delegate management of Azure resources by using Privileged Identity Management resource roles.
After completing this module, students will be able to:
• Deploy an Azure VM by using an Azure Resource Manager template.
• Create Azure AD users and groups.
• Delegate management of Azure resources by using custom Role-Based Access Control (RBAC) roles.
• Delegate management of Azure AD by using Privileged Identity Management directory roles.
• Delegate management of Azure resources by using Privileged Identity Management resource roles.
Prerequisites
Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.
Overview
Audience(s): IT Professionals
Technology: SQL Server
Level: Advanced
This Revision: C
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This five-day instructor-led course provides students who administer and maintain SQL Server databases with the knowledge and skills to administer a SQL server database infrastructure. Additionally, it will be of use to individuals who develop applications that deliver content from SQL Server databases.
Audience profile
The primary audience for this course is individuals who administer and maintain SQL Server databases. These individuals perform database administration and maintenance as their primary area of responsibility, or work in environments where databases play a key role in their primary job.
The secondary audiences for this course are individuals who develop applications that deliver content from SQL Server databases.
At course completion
After completing this course, students will be able to:
• Authenticate and authorize users
• Assign server and database roles
• Authorize users to access resources
• Protect data with encryption and auditing
• Describe recovery models and backup strategies
• Backup SQL Server databases
• Restore SQL Server databases
• Automate database management
• Configure security for the SQL Server agent
• Manage alerts and notifications
• Managing SQL Server using PowerShell
• Trace access to SQL Server
• Monitor a SQL Server infrastructure
• Troubleshoot a SQL Server infrastructure
• Import and export data
Course Outline
Module 1: SQL Server Security
Protection of data within your Microsoft SQL Server databases is essential and requires a working knowledge of the issues and SQL Server security features. This module describes SQL Server security models, logins, users, partially contained databases, and cross-server authorization.
Lessons
• Authenticating Connections to SQL Server
• Authorizing Logins to Connect to databases
• Authorization Across Servers
• Partially Contained Databases
Lab : Authenticating Users
• Create Logins
• Create Database Users
• Correct Application Login Issues
• Configure Security for Restored Databases
After completing this module, you will be able to:
• SQL Server basic concepts.
• SQL Server connection authentication.
• User login authorization to databases.
• Partially contained databases.
• Authorization across servers.
Module 2: Assigning Server and Database Roles
Using roles simplifies the management of user permissions. With roles, you can control authenticated users’ access to system resources based on each user’s job function—rather than assigning permissions user-by-user, you can grant permissions to a role, then make users members of roles. Microsoft SQL Server includes support for security roles defined at server level and at database level.
Lessons
• Working with server roles
• Working with Fixed Database Roles
• Assigning User-Defined Database Roles
Lab : Assigning server and database roles
• Assigning Server Roles
• Assigning Fixed Database Roles
• Assigning User-Defined Database Roles
• Verifying Security
After completing this module, you will be able to:
• Describe and use server roles to manage server-level security.
• Describe and use fixed database roles.
• Use custom database roles and application roles to manage database-level security.
Module 3: Authorizing Users to Access Resources
In the previous modules, you have seen how Microsoft SQL Server security is organized and how sets of permissions can be assigned at the server and database level by using fixed server roles, user-defined server roles, fixed database roles, and application roles. The final step in authorizing users to access SQL Server resources is the authorization of users and roles to access server and database objects. In this module, you will see how these object permissions are managed. In addition to access permissions on database objects, SQL Server provides the ability to determine which users are allowed to execute code, such as stored procedures and functions. In many cases, these permissions and the permissions on the database objects are best configured at the schema level rather than at the level of the individual object. Schema-based permission grants can simplify your security architecture. You will explore the granting of permissions at the schema level in the final lesson of this module.
Lessons
• Authorizing User Access to Objects
• Authorizing Users to Execute Code
• Configuring Permissions at the Schema Level
Lab : Authorizing users to access resources
• Granting, Denying, and Revoking Permissions on Objects
• Granting EXECUTE Permissions on Code
• Granting Permissions at the Schema Level
After completing this module, you will be able to:
• Authorize user access to objects.
• Authorize users to execute code.
• Configure permissions at the schema level.
Module 4: Protecting Data with Encryption and Auditing
When configuring security for your Microsoft SQL Server systems, you should ensure that you meet any of your organization’s compliance requirements for data protection. Organizations often need to adhere to industry-specific compliance policies, which mandate auditing of all data access. To address this requirement, SQL Server provides a range of options for implementing auditing. Another common compliance requirement is the encryption of data to protect against unauthorized access in the event that access to the database files is compromised. SQL Server supports this requirement by providing transparent data encryption (TDE). To reduce the risk of information leakage by users with administrative access to a database, columns containing sensitive data—such as credit card numbers or national identity numbers—can be encrypted using the Always Encrypted feature. This module describes the available options for auditing in SQL Server, how to use and manage the SQL Server Audit feature, and how to implement encryption.
Lessons
• Options for auditing data access in SQL Server
• Implementing SQL Server Audit
• Managing SQL Server Audit
• Protecting Data with Encryption
Lab : Using Auditing and Encryption
• Working with SQL Server Audit
• Encrypt a Column as Always Encrypted
• Encrypt a Database using TDE
After completing this module, you will be able to:
• Describe the options for auditing data access.
• Implement SQL Server Audit.
• Manage SQL Server Audit.
• Describe and implement methods of encrypting data in SQL Server.
• Implement encryption
Module 5: Recovery Models and Backup Strategies
One of the most important aspects of a database administrator's role is ensuring that organizational data is reliably backed up so that, if a failure occurs, you can recover the data. Even though the computing industry has known about the need for reliable backup strategies for decades—and discussed this at great length—unfortunate stories regarding data loss are still commonplace. A further problem is that, even when the strategies in place work as they were designed, the outcomes still regularly fail to meet an organization’s operational requirements. In this module, you will consider how to create a strategy that is aligned with organizational needs, based on the available backup models, and the role of the transaction logs in maintaining database consistency.
Lessons
• Understanding Backup Strategies
• SQL Server Transaction Logs
• Planning Backup Strategies
Lab : Understanding SQL Server recovery models
• Plan a Backup Strategy
• Configure Database Recovery Models
After completing this module, you will be able to:
• Describe various backup strategies.
• Describe how database transaction logs function.
• Plan SQL Server backup strategies.
Module 6: Backing Up SQL Server Databases
In the previous module, you learned how to plan a backup strategy for a SQL Server system. You can now learn how to perform SQL Server backups, including full and differential database backups, transaction log backups, and partial backups. In this module, you will learn how to apply various backup strategies.
Lessons
• Backing Up Databases and Transaction Logs
• Managing Database Backups
• Advanced Database Options
Lab : Backing Up Databases
• Backing Up Databases
• Performing Database, Differential, and Transaction Log Backups
• Performing a Partial Backup
After completing this module, you will be able to:
• Perform backups of SQL Server databases and transaction logs.
• Manage database backups.
• Describe advanced backup options.
Module 7: Restoring SQL Server 2016 Databases
In the previous module, you learned how to create backups of Microsoft SQL Server 2016 databases. A backup strategy might involve many different types of backup, so it is essential that you can effectively restore them. You will often be restoring a database in an urgent situation. You must, however, ensure that you have a clear plan of how to proceed and successfully recover the database to the required state. A good plan and understanding of the restore process can help avoid making the situation worse. Some database restores are related to system failure. In these cases, you will want to return the system as close as possible to the state it was in before the failure. Some failures, though, are related to human error and you might wish to recover the system to a point before that error. The point-in-time recovery features of SQL Server 2016 can help you to achieve this. Because they are typically much larger, user databases are more likely to be affected by system failures than system databases. However, system databases can be affected by failures, and special care should be taken when recovering them. In particular, you need to understand how to recover each system database because you cannot use the same process for all system databases. In this module, you will see how to restore user and system databases and how to implement point-in-time recovery.
Lessons
• Understanding the Restore Process
• Restoring Databases
• Advanced Restore Scenarios
• Point-in-Time Recovery
Lab : Restoring SQL Server Databases
• Restoring a Database Backup
• Restring Database, Differential, and Transaction Log Backups
• Performing a Piecemeal Restore
After completing this module, you will be able to:
• Explain the restore process.
• Restore databases.
• Perform advanced restore operations.
• Perform a point-in-time recovery.
Module 8: Automating SQL Server Management
The tools provided by Microsoft SQL Server make administration easy when compared to some other database engines. However, even when tasks are easy to perform, it is common to have to repeat a task many times. Efficient database administrators learn to automate repetitive tasks. This can help to avoid situations where an administrator forgets to execute a task at the required time. Perhaps more importantly, the automation of tasks helps to ensure that they are performed consistently, each time they are executed. This module describes how to use SQL Server Agent to automate jobs, how to configure security contexts for jobs, and how to implement multiserver jobs.
Lessons
• Automating SQL Server management
• Working with SQL Server Agent
• Managing SQL Server Agent Jobs
• Multi-server Management
Lab : Automating SQL Server Management
• Create a SQL Server Agent Job
• Test a Job
• Schedule a Job
• Configure Master and Target Servers
After completing this module, you will be able to:
• Describe methods for automating SQL Server Management.
• Configure jobs, job step types, and schedules.
• Manage SQL Server Agent jobs.
• Configure master and target servers.
Module 9: Configuring Security for SQL Server Agent
Other modules in this course have demonstrated the need to minimize the permissions that are granted to users, following the principle of “least privilege.” This means that users have only the permissions that they need to perform their tasks. The same logic applies to the granting of permissions to SQL Server Agent. Although it is easy to execute all jobs in the context of the SQL Server Agent service account, and to configure that account as an administrative account, a poor security environment would result from doing this. It is important to understand how to create a minimal privilege security environment for jobs that run in SQL Server Agent.
Lessons
• Understanding SQL Server Agent Security
• Configuring Credentials
• Configuring Proxy Accounts
Lab : Configuring Security for SQL Server Agent
• Analyzing Problems in SQL Server Agent
• Configuring a Credential
• Configuring a Proxy Account
• Configuring and testing the Security Context of a Job
After completing this module, you will be able to:
• Explain SQL Server Agent security.
• Configure credentials.
• Configure proxy accounts.
Module 10: Monitoring SQL Server with Alerts and Notifications
One key aspect of managing Microsoft SQL Server in a proactive manner is to make sure you are aware of problems and events that occur in the server, as they happen. SQL Server logs a wealth of information about issues. You can configure it to advise you automatically when these issues occur, by using alerts and notifications. The most common way that SQL Server database administrators receive details of events of interest is by email message. This module covers the configuration of Database Mail, alerts, and notifications for a SQL Server instance, and the configuration of alerts for Microsoft Azure SQL Database.
Lessons
• Monitoring SQL Server Errors
• Configuring Database Mail
• Operators, Alerts, and Notifications
• Alerts in Azure SQL Database
Lab : Monitoring SQL Server with Alerts and Notifications
• Configuring Database Mail
• Configuring Operators
• Configuring Alerts and Notifications
• Testing Alerts and Notifications
After completing this module, you will be able to:
• Monitor SQL Server errors.
• Configure database mail.
• Configure operators, alerts, and notifications.
• Work with alerts in Azure SQL Database.
Module 11: Introduction to Managing SQL Server by using PowerShell
This module looks at how to use Windows PowerShell with Microsoft SQL Server. Businesses are constantly having to increase the efficiency and reliability of maintaining their IT infrastructure; with PowerShell, you can improve this efficiency and reliability by creating scripts to carry out tasks. PowerShell scripts can be tested and applied multiple times to multiple servers, saving your organization both time and money.
Lessons
• Getting Started with Windows PowerShell
• Configure SQL Server using PowerShell
• Administer and Maintain SQL Server with PowerShell
• Managing Azure SQL Databases using PowerShell
Lab : Using PowerShell to Manage SQL Server
• Getting Started with PowerShell
• Using PowerShell to Change SQL Server settings
After completing this module, you will be able to:
• Describe the benefits of PowerShell and its fundamental concepts.
• Configure SQL Server by using PowerShell.
• Administer and maintain SQL Server by using PowerShell.
• Manage an Azure SQL Database by using PowerShell.
Module 12: Tracing Access to SQL Server with Extended events
Monitoring performance metrics provides a great way to assess the overall performance of a database solution. However, there are occasions when you need to perform more detailed analysis of the activity occurring within a Microsoft SQL Server instance—to troubleshoot problems and identify ways to optimize workload performance. SQL Server Extended Events is a flexible, lightweight event-handling system built into the Microsoft SQL Server Database Engine. This module focuses on the architectural concepts, troubleshooting strategies and usage scenarios of Extended Events.
Lessons
• Extended Events Core Concepts
• Working with Extended Events
Lab : Extended Events
• Using the System_Health Extended Events Session
• Tracking Page Splits Using Extended Events
After completing this module, you will be able to:
• Describe Extended Events core concepts.
• Create and query Extended Events sessions.
Module 13: Monitoring SQL Server
The Microsoft SQL Server Database Engine can run for long periods without the need for administrative attention. However, if you regularly monitor the activity that occurs on the database server, you can deal with potential issues before they arise. SQL Server provides a number of tools that you can use to monitor current activity and record details of previous activity. You need to become familiar with what each of the tools does and how to use them. It is easy to become overwhelmed by the volume of output that monitoring tools can provide, so you also need to learn techniques for analyzing their output.
Lessons
• Monitoring activity
• Capturing and Managing Performance Data
• Analyzing Collected Performance Data
• SQL Server Utility
Lab : Monitoring SQL Server
After completing this module, you will be able to:
• Monitor current activity.
• Capture and manage performance data.
• Analyze collected performance data.
• Configure SQL Server Utility.
Module 14: Troubleshooting SQL Server
Database administrators working with Microsoft SQL Server need to adopt the important role of troubleshooter when issues arise—particularly if users of business-critical applications that rely on SQL Server databases are being prevented from working. It is important to have a solid methodology for resolving issues in general, and to be familiar with the most common issues that can arise when working with SQL Server systems.
Lessons
• A Trouble Shooting Methodology for SQL Server
• Resolving Service Related Issues
• Resolving Connectivity and Log-in issues
Lab : Troubleshooting Common Issues
• Troubleshoot and Resolve a SQL Login Issue
• Troubleshoot and Resolve a Service Issue
• Troubleshoot and Resolve a Windows Login Issue
• Troubleshoot and Resolve a Job Execution Issue
• Troubleshoot and Resolve a Performance Issue
After completing this module, you will be able to:
• Describe a troubleshooting methodology for SQL Server.
• Resolve service-related issues.
• Resolve login and connectivity issues.
Module 15: Importing and Exporting Data
While a great deal of data residing in a Microsoft SQL Server system is entered directly by users who are running application programs, there is often a need to move data in other locations, to and from SQL Server. SQL Server provides a set of tools you can use to transfer data in and out. Some of these tools, such as the bcp (Bulk Copy Program) utility and SQL Server Integration Services, are external to the database engine. Other tools, such as the BULK INSERT statement and the OPENROWSET function, are implemented in the database engine. With SQL Server, you can also create data-tier applications that package all the tables, views, and instance objects associated with a user database into a single unit of deployment. In this module, you will explore these tools and techniques so that you can import and export data to and from SQL Server.
Lessons
• Transferring Data to and from SQL Server
• Importing and Exporting Table Data
• Using bcp and BULK INSERT to Import Data
• Deploying and Upgrading Data-Tier Application
Lab : Importing and Exporting Data
• Import and Excel Data Using the Import Wizard
• Import a Delimited Text File Using bcp
• Import a Delimited Text File using BULK INSERT
• Create and Test an SSIS Package to Extract Data
• Deploy a Data-Tier Application
After completing this module, you will be able to:
• Describe tools and techniques for transferring data.
• Import and export table data.
• Use bcp and BULK INSERT to import data.
• Use data-tier applications to import and export database applications.
Prerequisites
In addition to their professional experience, students who attend this training should already have the following technical knowledge:
· Basic knowledge of the Microsoft Windows operating system and its core functionality.
· Working knowledge of Transact-SQL.
· Working knowledge of relational databases.
· Some experience with database design.
Overview
Technology: Windows Server
Level: Intermediate
This Revision: B
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This five-day instructor-led course teaches IT professionals how to deploy and configure Active Directory Domain Services (AD DS) in a distributed environment, how to implement Group Policy, how to perform backup and restore, and how to monitor and troubleshoot Active Directory–related issues with Windows Server 2016. Additionally, this course teaches students how to deploy other Active Directory server roles, such as Active Directory Federation Services (AD FS) and Active Directory Certificate Services (AD CS).
Audience profile
This course is primarily intended for existing IT professionals who have some AD DS knowledge and experience and who aim to develop knowledge about identity and access technologies in Windows Server 2016. This would typically include:
AD DS administrators who are looking to train in identity and access technologies with Windows Server 2012 or Windows Server 2016.
System or infrastructure administrators with general AD DS experience and knowledge who are looking to cross-train in core and advanced identity and access technologies in Windows Server 2012 or Windows Server 2016.
The secondary audience for this course includes IT professionals who are looking to consolidate their knowledge about AD DS and related technologies, in addition to IT professionals who want to prepare for the 70-742 exam.
At course completion
After completing this course, students will be able to:
• Install and configure domain controllers.
• Manage objects in AD DS by using graphical tools and Windows PowerShell.
• Implement AD DS in complex environments.
• Implement AD DS sites, and configure and manage replication.
• Implement and manage Group Policy Objects (GPOs).
• Manage user settings by using GPOs.
• Secure AD DS and user accounts.
• Implement and manage a certificate authority (CA) hierarchy with AD CS.
• Deploy and manage certificates.
• Implement and administer AD FS.
• Implement and administer Active Directory Rights Management Services (AD RMS).
• Implement synchronization between AD DS and Azure AD.
• Monitor, troubleshoot, and establish business continuity for AD DS services.
Course Outline
Module 1: Installing and configuring domain controllers
This module describes the features of AD DS and how to install domain controllers (DCs). It also covers the considerations for deploying DCs.
Lessons
• Overview of AD DS
• Overview of AD DS domain controllers
• Deploying a domain controller
Lab : Deploying and administering AD DS
• Deploying AD DS
• Deploying domain controllers by performing domain controller cloning
• Administering AD DS
After completing this module, students will be able to:
• Describe AD DS and its main components.
• Describe the purpose and roles of domain controllers.
• Describe the considerations for deploying domain controllers.
Module 2: Managing objects in AD DS
This module describes how to use various techniques to manage objects in AD DS. This includes creating and configuring user, group, and computer objects.
Lessons
• Managing user accounts
• Managing groups in AD DS
• Managing computer objects in AD DS
• Using Windows PowerShell for AD DS administration
• Implementing and managing OUs
Lab : Managing AD DS objects
• Creating and managing groups in AD DS
• Creating and configuring user accounts in AD DS
• Managing computer objects in AD DS
Lab : Administering AD DS
• Delegate administration for OUs
• Creating and modifying AD DS objects with Windows PowerShell
After completing this module, students will be able to:
• Manage user accounts in AD DS.
• Manage groups in AD DS.
• Manage computer objects in AD DS.
• Use Windows PowerShell for AD DS administration.
• Implement and manage OUs.
• Administer AD DS.
Module 3: Advanced AD DS infrastructure management
This module describes how to plan and implement an AD DS deployment that includes multiple domains and forests. The module provides an overview of the components in an advanced AD DS deployment, the process of implementing a distributed AD DS environment, and the procedure for configuring AD DS trusts.
Lessons
• Overview of advanced AD DS deployments
• Deploying a distributed AD DS environment
• Configuring AD DS trusts
Lab : Domain and trust management in AD DS
• Implementing forest trusts
• Implementing child domains in AD DS
After completing this module, students will be able to:
• Describe the components of an advanced AD DS deployment.
• Deploy a distributed AD DS environment..
• Configure AD DS trusts.
Module 4: Implementing and administering AD DS sites and replication
This module describes how to plan and implement an AD DS deployment that includes multiple locations. The module explains how replication works in a Windows Server 2016 AD DS environment.
Lessons
• Overview of AD DS replication
• Configuring AD DS sites
• Configuring and monitoring AD DS replication
Lab : Implementing AD DS sites and replication
• Modifying the default site
• Creating additional sites and subnets
• Configuring AD DS replication
• Monitoring and troubleshooting AD DS replication
After completing this module, students will be able to:
• Describe how AD DS replication works.
• Configure AD DS sites to help optimize authentication and replication traffic.
• Configure and monitor AD DS replication.
Module 5: Implementing Group Policy
This module describes how to implement a GPO infrastructure. The module provides an overview of the components and technologies that compose the Group Policy framework.
Lessons
• Introducing Group Policy
• Implementing and administering GPOs
• Group Policy scope and Group Policy processing
• Troubleshooting the application of GPOs
Lab : Implementing a Group Policy infrastructure
• Creating and configuring GPOs
• Managing GPO scope
Lab : Troubleshooting Group Policy infrastructure
• Verify GPO application
• Troubleshooting GPOs
After completing this module, students will be able to:
• Explain what Group Policy is.
• Implement and administer GPOs.
• Describe Group Policy scope and Group Policy processing.
• Troubleshoot GPO application.
Module 6: Managing user settings with Group Policy
This module describes how to configure Group Policy settings and Group Policy preferences. This includes implementing administrative templates, configuring folder redirection and scripts, and configuring Group Policy preferences.
Lessons
• Implementing administrative templates
• Configuring Folder Redirection, software installation, and scripts
• Configuring Group Policy preferences
Lab : Managing user settings with GPOs
• Using administrative templates to manage user settings
• Implement settings by using Group Policy preferences
• Configuring Folder Redirection
• Planning Group Policy (optional)
After completing this module, students will be able to:
• Implement administrative templates.
• Configure Folder Redirection, software installation, and scripts.
• Configure Group Policy preferences.
Module 7: Securing Active Directory Domain Services
This module describes how to configure domain controller security, account security, password security, and Group Managed Service Accounts (gMSA).
Lessons
• Securing domain controllers
• Implementing account security
• Implementing audit authentication
• Configuring managed service accounts
Lab : Securing AD DS
• Implementing security policies for accounts, passwords, and administrative groups
• Deploying and configuring an RODC
• Creating and associating a group MSA
After completing this module, students will be able to:
• Secure domain controllers.
• Implement account security.
• Implement audit authentication.
• Configure managed service accounts (MSAs).
Module 8: Deploying and managing AD CS
This module describes how to implement an AD CS deployment. This includes deploying, administering, and troubleshooting CAs.
Lessons
• Deploying CAs
• Administering CAs
• Troubleshooting and maintaining CAs
Lab : Deploying and configuring a two-tier CA hierarchy
• Deploying an offline root CA
• Deploying an enterprise subordinate CA
After completing this module, students will be able to:
• Deploy CAs.
• Administer CAs.
• Troubleshoot and maintain CAs.
Module 9: Deploying and managing certificates
This module describes how to deploy and manage certificates in an AD DS environment. This involves deploying and managing certificate templates, managing certificate revocation and recovery, using certificates in a business environment, and implementing smart cards.
Lessons
• Deploying and managing certificate templates
• Managing certificate deployment, revocation, and recovery
• Using certificates in a business environment
• Implementing and managing smart cards
Lab : Deploying and using certificates
• Configuring certificate templates
• Enrolling and using certificates
• Configuring and implementing key recovery
After completing this module, students will be able to:
• Deploy and manage certificate templates.
• Manage certificates deployment, revocation, and recovery.
• Use certificates in a business environment.
• Implement and manage smart cards
Module 10: Implementing and administering AD FS
This module describes AD FS and how to configure AD FS in a single-organization scenario and in a partner-organization scenario.
Lessons
• Overview of AD FS
• AD FS requirements and planning
• Deploying and configuring AD FS
• Web Application Proxy Overview
Lab : Implementing AD FS
• Configuring AD FS prerequisites
• Installing and configuring AD FS
• Configuring an internal application for AD
• Configuring AD FS for federated business partners
After completing this module, students will be able to:
• Describe AD FS.
• Explain how to deploy AD FS.
• Explain how to implement AD FS for a single organization.
• Explain how to extend AD FS to external clients.
• Implement single sign-on (SSO) to support online services.
Module 11: Implementing and administering AD RMS
This module describes how to implement an AD RMS deployment. The module provides an overview of AD RMS, explains how to deploy and manage an AD RMS infrastructure, and explains how to configure AD RMS content protection.
Lessons
• Overview of AD RMS
• Deploying and managing an AD RMS infrastructure
• Configuring AD RMS content protection
Lab : Implementing an AD RMS infrastructure
• Installing and configuring AD RMS
• Configuring AD RMS templates
• Using AD RMS on clients
After completing this module, students will be able to:
• Describe AD RMS.
• Deploy and manage an AD RMS infrastructure. .
• Configure AD RMS content protection.
Module 12: Implementing AD DS synchronization with Microsoft Azure AD
This module describes how to plan and configure directory syncing between Microsoft Azure Active Directory (Azure AD) and on-premises AD DS. The modules describes various sync scenarios, such as Azure AD sync, AD FS and Azure AD, and Azure AD Connect.
Lessons
• Planning and preparing for directory synchronization
• Implementing directory synchronization by using Azure AD Connect
• Managing identities with directory synchronization
Lab : Configuring directory synchronization
• Preparing for directory synchronization
• Configuring directory synchronization
• Managing Active Directory users and groups and monitoring directory synchronization
After completing this module, students will be able to:
• Plan and prepare for directory synchronization.
• Implement directory synchronization by using Microsoft Azure Active Directory Connect (Azure AD Connect).
• Manage identities with directory synchronization.
Module 13: Monitoring, managing, and recovering AD DS
This module describes how to monitor, manage, and maintain AD DS to help achieve high availability of AD DS.
Lessons
• Monitoring AD DS
• Managing the Active Directory database
• Active Directory backup and recovery options for AD DS and other identity and access solutions
Lab : Recovering objects in AD DS
• Backing up and restoring AD DS
• Recovering objects in AD DS
After completing this module, students will be able to:
• Monitor AD DS.
• Manage the Active Directory database.
• Describe the backup and recovery options for AD DS and other identity access solutions.
Prerequisites
Before attending this course, students must have:
• Some exposure to and experience with AD DS concepts and technologies in Windows Server 2012 or Windows Server 2016.
• Experience working with and configuring Windows Server 2012 or Windows Server 2016
• Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP).
• Experience working with and an understanding of Microsoft Hyper-V and basic server virtualization concepts.
• An awareness of basic security best practices.
• Hands-on working experience with Windows client operating systems such as Windows 7, Windows 8, Windows 8.1, or Windows 10.
• Basic experience with the Windows PowerShell command-line interface.
Overview
Audience(s): Data Professional
Technology: SQL Server
Level: Advanced
This Revision: A
Length: 5 days
Language(s): English
About this course
The main purpose of the course is to give students the ability to analyze and present data by using Azure Machine Learning, and to provide an introduction to the use of machine learning with big data tools such as HDInsight and R Services.
Audience profile
The primary audience for this course is people who wish to analyze and present data by using Azure Machine Learning.
The secondary audience is IT professionals, Developers and information workers who need to support solutions based on Azure machine learning.
At course completion
After completing this course, students will be able to:
• Explain machine learning, and how algorithms and languages are used
• Describe the purpose of Azure Machine Learning, and list the main features of Azure Machine Learning Studio
• Upload and explore various types of data to Azure Machine Learning
• Explore and use techniques to prepare datasets ready for use with Azure Machine Learning
• Explore and use feature engineering and selection techniques on datasets that are to be used with Azure Machine Learning
• Explore and use regression algorithms and neural networks with Azure Machine Learning
• Explore and use classification and clustering algorithms with Azure Machine Learning
• Use R and Python with Azure Machine Learning, and choose when to use a particular language
• Explore and use hyperparameters and multiple algorithms and models, and be able to score and evaluate models
• Explore how to provide end-users with Azure Machine Learning services, and how to share data generated from Azure Machine Learning models
• Explore and use the Cognitive Services APIs for text and image processing, to create a recommendation application, and describe the use of neural networks with Azure Machine Learning
• Explore and use HDInsight with Azure Machine Learning
• Explore and use R and R Server with Azure Machine Learning, and explain how to deploy and configure SQL Server to support R services
Course Outline
Module 1: Introduction to Machine Learning
This module introduces machine learning and discussed how algorithms and languages are used.
Lessons
• What is machine learning?
• Introduction to machine learning algorithms
• Introduction to machine learning languages
Lab : Introduction to machine Learning
• Sign up for Azure machine learning studio account
• View a simple experiment from gallery
• Evaluate an experiment
After completing this module, students will be able to:
• Describe machine learning
• Describe machine learning algorithms
• Describe machine learning languages
Module 2: Introduction to Azure Machine Learning
Describe the purpose of Azure Machine Learning, and list the main features of Azure Machine Learning Studio.
Lessons
• Azure machine learning overview
• Introduction to Azure machine learning studio
• Developing and hosting Azure machine learning applications
Lab : Introduction to Azure machine learning
• Explore the Azure machine learning studio workspace
• Clone and run a simple experiment
• Clone an experiment, make some simple changes, and run the experiment
After completing this module, students will be able to:
• Describe Azure machine learning.
• Use the Azure machine learning studio.
• Describe the Azure machine learning platforms and environments.
Module 3: Managing Datasets
At the end of this module the student will be able to upload and explore various types of data in Azure machine learning.
Lessons
• Categorizing your data
• Importing data to Azure machine learning
• Exploring and transforming data in Azure machine learning
Lab : Managing Datasets
• Prepare Azure SQL database
• Import data
• Visualize data
• Summarize data
After completing this module, students will be able to:
• Understand the types of data they have.
• Upload data from a number of different sources.
• Explore the data that has been uploaded.
Module 4: Preparing Data for use with Azure Machine Learning
This module provides techniques to prepare datasets for use with Azure machine learning.
Lessons
• Data pre-processing
• Handling incomplete datasets
Lab : Preparing data for use with Azure machine learning
• Explore some data using Power BI
• Clean the data
After completing this module, students will be able to:
• Pre-process data to clean and normalize it.
• Handle incomplete datasets.
Module 5: Using Feature Engineering and Selection
This module describes how to explore and use feature engineering and selection techniques on datasets that are to be used with Azure machine learning.
Lessons
• Using feature engineering
• Using feature selection
Lab : Using feature engineering and selection
• Prepare datasets
• Use Join to Merge data
After completing this module, students will be able to:
• Use feature engineering to manipulate data.
• Use feature selection.
Module 6: Building Azure Machine Learning Models
This module describes how to use regression algorithms and neural networks with Azure machine learning.
Lessons
• Azure machine learning workflows
• Scoring and evaluating models
• Using regression algorithms
• Using neural networks
Lab : Building Azure machine learning models
• Using Azure machine learning studio modules for regression
• Create and run a neural-network based application
After completing this module, students will be able to:
• Describe machine learning workflows.
• Explain scoring and evaluating models.
• Describe regression algorithms.
• Use a neural-network.
Module 7: Using Classification and Clustering with Azure machine learning models
This module describes how to use classification and clustering algorithms with Azure machine learning.
Lessons
• Using classification algorithms
• Clustering techniques
• Selecting algorithms
Lab : Using classification and clustering with Azure machine learning models
• Using Azure machine learning studio modules for classification.
• Add k-means section to an experiment
• Add PCA for anomaly detection.
• Evaluate the models
After completing this module, students will be able to:
• Use classification algorithms.
• Describe clustering techniques.
• Select appropriate algorithms.
Module 8: Using R and Python with Azure Machine Learning
This module describes how to use R and Python with azure machine learning and choose when to use a particular language.
Lessons
• Using R
• Using Python
• Incorporating R and Python into Machine Learning experiments
Lab : Using R and Python with Azure machine learning
• Exploring data using R
• Analyzing data using Python
After completing this module, students will be able to:
• Explain the key features and benefits of R.
• Explain the key features and benefits of Python.
• Use Jupyter notebooks.
• Support R and Python.
Module 9: Initializing and Optimizing Machine Learning Models
This module describes how to use hyper-parameters and multiple algorithms and models, and be able to score and evaluate models.
Lessons
• Using hyper-parameters
• Using multiple algorithms and models
• Scoring and evaluating Models
Lab : Initializing and optimizing machine learning models
• Using hyper-parameters
After completing this module, students will be able to:
• Use hyper-parameters.
• Use multiple algorithms and models to create ensembles.
• Score and evaluate ensembles.
Module 10: Using Azure Machine Learning Models
This module explores how to provide end users with Azure machine learning services, and how to share data generated from Azure machine learning models.
Lessons
• Deploying and publishing models
• Consuming Experiments
Lab : Using Azure machine learning models
• Deploy machine learning models
• Consume a published model
After completing this module, students will be able to:
• Deploy and publish models.
• Export data to a variety of targets.
Module 11: Using Cognitive Services
This module introduces the cognitive services APIs for text and image processing to create a recommendation application, and describes the use of neural networks with Azure machine learning.
Lessons
• Cognitive services overview
• Processing language
• Processing images and video
• Recommending products
Lab : Using Cognitive Services
• Build a language application
• Build a face detection application
• Build a recommendation application
After completing this module, students will be able to:
• Describe cognitive services.
• Process text through an application.
• Process images through an application.
• Create a recommendation application.
Module 12: Using Machine Learning with HDInsight
This module describes how use HDInsight with Azure machine learning.
Lessons
• Introduction to HDInsight
• HDInsight cluster types
• HDInsight and machine learning models
Lab : Machine Learning with HDInsight
• Provision an HDInsight cluster
• Use the HDInsight cluster with MapReduce and Spark
After completing this module, students will be able to:
• Describe the features and benefits of HDInsight.
• Describe the different HDInsight cluster types.
• Use HDInsight with machine learning models.
Module 13: Using R Services with Machine Learning
This module describes how to use R and R server with Azure machine learning, and explain how to deploy and configure SQL Server and support R services.
Lessons
• R and R server overview
• Using R server with machine learning
• Using R with SQL Server
Lab : Using R services with machine learning
• Deploy DSVM
• Prepare a sample SQL Server database and configure SQL Server and R
• Use a remote R session
• Execute R scripts inside T-SQL statements
After completing this module, students will be able to:
• Implement interactive queries.
• Perform exploratory data analysis.
Prerequisites
In addition to their professional experience, students who attend this course should have:
• Programming experience using R, and familiarity with common R packages
• Knowledge of common statistical methods and data analysis best practices.
• Basic knowledge of the Microsoft Windows operating system and its core functionality.
• Working knowledge of relational databases.
Overview
Audience(s): Developers
Technology: SQL Server
Level: Intermediate
This Revision: C
Delivery method: Classroom
Length: 3 days
Language(s): English
About this course
The focus of this 3-day instructor-led course is on creating managed enterprise BI solutions. It describes how to implement both multidimensional and tabular data models and how to create cubes, dimensions, measures, and measure groups. This course helps you prepare for the Exam 70-768.
Audience profile
The primary audience for this course are database professionals who need to fulfil BI Developer role to create enterprise BI solutions.
Primary responsibilities will include:
• Implementing multidimensional databases by using SQL Server Analysis Services
• Creating tabular semantic data models for analysis by using SQL Server Analysis Services
At course completion
After completing this course, students will be able to:
• Describe the components, architecture, and nature of a BI solution
• Create a multidimensional database with Analysis Services
• Implement dimensions in a cube
• Implement measures and measure groups in a cube
• Use MDX syntax
• Customize a cube
• Implement a tabular database
• Use DAX to query a tabular model
• Use data mining for predictive analysis
Course Outline
Module 1: Introduction to Business Intelligence and Data Modeling
This module introduces key BI concepts and the Microsoft BI product suite.
Lessons
• Introduction to Business Intelligence
• The Microsoft business intelligence platform
Lab: Exploring a BI Solution
• Exploring a Data Warehouse
• Exploring a data model
After completing this module, students will be able to:
• Describe BI scenarios, trends, and project roles.
• Describe the products that make up the Microsoft BI platform.
Module 2: Creating Multidimensional Databases
This module describes how to create multidimensional databases using SQL Server Analysis Services.
Lessons
• Introduction to Multidimensional Analysis
• Data Sources and Data Source Views
• Cubes
• Overview of Cube Security
• Configure SSAS
• Monitoring SSAS
Lab: Creating a multidimensional database
• Creating a Data Source
• Creating and Configuring a data Source View
• Creating and Configuring a Cube
• Adding a Dimension to a Cube
After completing this module, you will be able to:
• Describe considerations for a multidimensional database.
• Create data sources and data source views.
• Create a cube
• Implement security in a multidimensional database.
• Configure SSAS to meet requirements including memory limits, NUMA and disk layout.
• Monitor SSAS performance.
Module 3: Working with Cubes and Dimensions
This module describes how to implement dimensions in a cube.
Lessons
• Configuring Dimensions
• Defining Attribute Hierarchies
• Implementing Sorting and Grouping Attributes
• Slowly Changing Dimensions
Lab: Working with Cubes and Dimensions
• Configuring Dimensions
• Defining Relationships and Hierarchies
• Sorting and Grouping Dimension Attributes
After completing this module, you will be able to:
• Configure dimensions.
• Define attribute hierarchies.
• Implement sorting and grouping for attributes.
• Implement slowly changing dimensions.
Module 4: Working with Measures and Measure Groups
This module describes how to implement measures and measure groups in a cube.
Lessons
• Working with Measures
• Working with Measure Groups
Lab: Configuring Measures and Measure Groups
• Configuring Measures
• Defining Regular Relationships
• Configuring Measure Group Storage
After completing this module, you will be able to:
• Configure measures.
• Configure measure groups.
Module 5: Introduction to MDX
This module describes the MDX syntax and how to use MDX.
Lessons
• MDX fundamentals
• Adding Calculations to a Cube
• Using MDX to Query a Cube
Lab: Using MDX
• Querying a cube using MDX
• Adding a Calculated Member
After completing this module, you will be able to:
• Use basic MDX functions.
• Use MDX to add calculations to a cube.
• Use MDX to query a cube.
Module 6: Customizing Cube Functionality
This module describes how to customize a cube.
Lessons
• Implementing Key Performance Indicators
• Implementing Actions
• Implementing Perspectives
• Implementing Translations
Lab: Customizing a Cube
• Implementing an action
• Implementing a perspective
• Implementing a translation
After completing this module, you will be able to:
• Implement KPIs in a Multidimensional database
• Implement Actions in a Multidimensional database
• Implement perspectives in a Multidimensional database
• Implement translations in a Multidimensional database
Module 7: Implementing a Tabular Data Model by Using Analysis Services
This module describes how to implement a tabular data model in Power Pivot.
Lessons
• Introduction to Tabular Data Models
• Creating a Tabular Data Model
• Using an Analysis Services Tabular Data Model in an Enterprise BI Solution
Lab: Working with an Analysis Services Tabular Data Model
• Creating an Analysis Services Tabular Data Model
• Configure Relationships and Attributes
• Configuring Data Model for an Enterprise BI Solution.
After completing this module, students will be able to:
• Describe tabular data models
• Describe how to create a tabular data model
• Use an Analysis Services Tabular Model in an enterprise BI solution
Module 8: Introduction to Data Analysis Expression (DAX)
This module describes how to use DAX to create measures and calculated columns in a tabular data model.
Lessons
• DAX Fundamentals
• Using DAX to Create Calculated Columns and Measures in a Tabular Data Model
Lab: Creating Calculated Columns and Measures by using DAX
• Creating Calculated Columns
• Creating Measures
• Creating a KPI
• Creating a Parent – Child Hierarchy
After completing this module, students will be able to:
• Describe the key features of DAX
• Create calculated columns and measures by using DAX
Module 9: Performing Predictive Analysis with Data Mining
This module describes how to use data mining for predictive analysis.
Lessons
• Overview of Data Mining
• Creating a Custom Data Mining Solution
• Validating a Data Mining Model
• Connecting to and Consuming a Data-Mining Model
• Using the Data Mining add-in for Excel
Lab: Using Data Mining
• Creating a Data Mining Structure and Model
• Exploring Data Mining Models
• Validating Data Mining Models
• Consuming a Data Mining Model
• Using the Excel Data Mining add-in
After completing this module, students will be able to:
• Describe considerations for data mining
• Create a data mining model
• Validate a data mining model
• Connect to a data-mining model
• Use the data mining add-in for Excel
Prerequisites
Before attending this course, students must have:
• Experience of querying data using Transact-SQL
Overview
Technology: Windows Server
Level: Advanced
This Revision: C
Delivery method: Classroom
Length: 5 days
Language(s): English
About this course
This five-day, instructor-led course teaches IT professionals how they can enhance the security of the IT infrastructure that they administer. This course begins by emphasizing the importance of assuming that network breaches have occurred already, and then teaches you how to protect administrative credentials and rights to help ensure that administrators can perform only the tasks that they need to, when they need to.
This course explains how you can use auditing and the Advanced Threat Analysis feature in Windows Server 2016 to identify security issues. You will also learn how to mitigate malware threats, secure your virtualization platform, and use deployment options such as Nano server and containers to enhance security. The course also explains how you can help protect access to files by using encryption and dynamic access control, and how you can enhance your network’s security.
Audience profile
This course is for IT professionals who need to securely administer Windows Server 2016 networks. These professionals typically work with networks that are configured as Windows Server domain-based environments, with managed access to the internet and cloud services.
Students who seek certification in the 70-744 Securing Windows server exam also will benefit from this course.
At course completion
After completing this course, students will be able to:
• Secure Windows Server.
• Protect credentials and implement privileged access workstations.
• Limit administrator rights with Just Enough Administration.
• Manage privileged access.
• Mitigate malware and threats.
• Analyze activity with advanced auditing and log analytics.
• Deploy and configure Advanced Threat Analytics and Microsoft Operations Management Suite.
• Configure Guarded Fabric virtual machines (VMs).
• Use the Security Compliance Toolkit (SCT) and containers to improve security.
• Plan and protect data.
• Optimize and secure file services.
• Secure network traffic with firewalls and encryption.
• Secure network traffic by using DNSSEC and Message Analyzer.
Course Outline
Module 1: Attacks, breach detection, and Sysinternals tools
This module frames the course so that students are thinking about security in environments where the infrastructure’s basis is predominantly Microsoft products. The module begins with teaching students about the “assume breach” philosophy and getting them to understand the different types of attacks that can occur, including attack timelines and vectors. Additionally, it gets students thinking about key resources, how they respond when they detect an incident, and how an organization’s direct needs and legislative requirements dictate its security policy.
Lessons
• Understanding attacks
• Detecting security breaches
• Examining activity with the Sysinternals tools
Lab : Basic breach detection and incident response strategies
• Identifying attack types
• Exploring Sysinternals tools
After completing this module, students will be able to:
• Describe the types of attacks that can occur.
• Explain how to detect security breaches.
• Explain how to examine activity by using the Sysinternals suite of tools.
Module 2: Protecting credentials and privileged access
This module covers user accounts and rights, computer and service accounts, credentials, Privileged Access Workstations, and the Local Administrator Password Solution. In this module, students will learn about configuring user rights and security options, protecting credentials by using Credential Guard, implementing Privileged Access Workstations, and managing and deploying Local Administrator Password Solution to manage local administrator account passwords.
Lessons
• Understanding user rights
• Computer and service accounts
• Protecting credentials
• Privileged Access Workstations and jump servers
• Local administrator password solution
Lab : Implementing user rights, security options, and group managed service accounts
• Configuring user rights and account-security options
• Delegating privileges
• Creating group Managed Service Accounts
• Locating problematic accounts
Lab : Configuring and deploying LAPs
• Installing and configuring LAPs
• Deploying and testing LAPs
After completing this module, students will be able to:
• Configure user rights.
• Implement computer and service accounts.
• Protect credentials.
• Describe how to configure Privileged Access Workstations and jump servers.
• Configure the Local Administrator Password Solution (LAPS).
Module 3: Limiting administrator rights with Just Enough Administration
This module explains how to deploy and configure Just Enough Administration (JEA), which is an administrative technology that allows students to apply role-based access control (RBAC) principles through Windows PowerShell remote sessions.
Lessons
• Understanding JEA
• Verifying and deploying JEA
Lab : Limiting administrator privileges with JEA
• Creating a role-capability file
• Creating a session-configuration file
• Creating a JEA endpoint
• Connecting and testing a JEA endpoint
• Deploying a JEA configuration to another computer
After completing this module, students will be able to:
• Understand JEA.
• Verify and deploy JEA.
Module 4: Privileged access management and administrative forests
This module explains the concepts of Enhanced Security Administrative Environment (ESAE) forests, Microsoft Identity Manager (MIM), and Just In Time (JIT) Administration, or Privileged Access Management (PAM).
Lessons
• ESAE forests
• Overview of Microsoft Identity Manager
• Overview of JIT administration and PAM
Lab : Limiting administrator privileges with PAM
• Layered approach to security
• Configuring trust relationships and shadow principals
• Requesting privileged access
• Managing PAM roles
After completing this module, students will be able to:
• Describe ESAE forests.
• Describe MIM.
• Understand JIT administration and PAM.
Module 5: Mitigating malware and threats
This module explains how to use tools such as Windows Defender, Windows AppLocker, Microsoft Device Guard, Windows Defender Application Guard, and Windows Defender Exploit Guard.
Lessons
• Configuring and managing Windows Defender
• Restricting software
• Configuring and using the Device Guard feature
Lab : Securing applications with Windows Defender, AppLocker, and Device Guard Rules
• Configuring Windows Defender
• Configuring AppLocker
• Configuring Device Guard
After completing this module, students will be able to:
• Configure and manage Windows Defender.
• Use software restriction policies and AppLocker.
• Configure and use the Device Guard feature.
Module 6: Analyzing activity with advanced auditing and log analytics
This module provides an overview of auditing, and then goes into detail about how to configure advanced auditing and Windows PowerShell auditing and logging.
Lessons
• Overview of auditing
• Advanced auditing
• Windows PowerShell auditing and logging
Lab : Configuring advanced auditing
• Configuring the auditing of file system access
• Auditing domain sign-ins
• Managing advanced audit policy configuration
• Windows PowerShell logging and auditing
After completing this module, students will be able to:
• Describe auditing.
• Understand advanced auditing.
• Configure Windows PowerShell auditing and logging.
Module 7: Deploying and configuring Advanced Threat Analytics and Microsoft Operations Management Suite
This module explains the Microsoft Advanced Threat Analytics tool and the Microsoft Operations Management suite (OMS). It also explains how you can use them to monitor and analyse the security of a Windows Server deployment. You will also learn about Microsoft Azure Security Center, which allows you to manage and monitor the security configuration of workloads both on-premises and in the cloud.
Lessons
• Deploying and configuring ATA
• Deploying and configuring Microsoft Operations Management Suite
• Deploying and configuring Azure Security Center
Lab : Deploying ATA, Microsoft Operations Management Suite, and Azure Security Center
• Preparing and deploying ATA
• Preparing and deploying Microsoft Operations Management Suite
• Deploying and configuring Azure Security Center
After completing this module, students will be able to:
• Deploy and configure ATA.
• Deploy and configure Microsoft Operations Management Suite.
• Deploy and configure Azure Security Center.
Module 8: Secure Virtualization Infrastructure
This module explains how to configure Guarded Fabric VMs, including the requirements for shielded and encryption-supported VMs.
Lessons
• Guarded fabric
• Shielded and encryption-supported virtual machines
Lab : Guarded fabric with Admin-trusted attestation and shielded VMs
• Deploying a guarded fabric with admin-trusted attestation
• Deploying a shielded VM
After completing this module, students will be able to:
• Configure the guarded fabric.
• Describe shielded and encryption-supported VMs.
Module 9: Securing application development and server-workload infrastructure
This module describes the SCT, which is a free, downloadable set of tools that you can use to create and apply security settings. You will also learn about improving platform security by reducing the size and scope of application and compute resources by containerizing workloads.
Lessons
• Using SCT
• Understanding containers
Lab : Using SCT
• Configuring a security baseline for Windows Server 2016
• Deploying the security baseline for Windows Server 2016
Lab : Deploying and configuring containers
• Deploying and managing a Windows container
After completing this module, students will be able to:
• Install SCT, and create and deploy security baselines.
• Configure Windows and Hyper-V containers in Windows Server 2016.
Module 10: Planning and protecting data
This module explains how to configure Encrypting File System (EFS) and BitLocker drive encryption to protect data at rest. You will also learn about extending protection into the cloud by using Azure Information Protection.
Lessons
• Planning and implementing encryption
• Planning and implementing BitLocker
• Protecting data by using Azure Information Protection
Lab : Protecting data by using encryption and BitLocker
• Encrypting and recovering access to encrypted files
• Using BitLocker to protect data
After completing this module, students will be able to:
• Plan and implement encryption.
• Plan and implement BitLocker.
• Plan and implement Azure Information Protection.
Module 11: Optimizing and securing file services
This module explains how to optimize file services by configuring File Server Resource Manager (FSRM) and Distributed File System (DFS). Students also will learn how to manage access to shared files by configuring Dynamic Access Control (DAC).
Lessons
• File Server Resource Manager
• Implementing classification and file management tasks
• Dynamic Access Control
Lab : Quotas and file screening
• Configuring File Server Resource Manager quotas
• Configuring file screening and storage reports
Lab : Implementing Dynamic Access Control
• Preparing for implementing Dynamic Access Control
• Implementing Dynamic Access Control
• Validating and remediating Dynamic Access Control
After completing this module, students will be able to:
• Describe File Server Resource Manager.
• Implement classification and file management tasks.
• Implement Dynamic Access Control.
Module 12: Securing network traffic with firewalls and encryption
This module explains how you can use Windows Firewall as an important part of an organization’s protection strategy. It explains the use of Internet Protocol security (IPsec) to encrypt network traffic and to establish security zones on your network. You will also learn about the Datacenter Firewall feature that you can use to help protect your on-premises virtual environments.
Lessons
• Understanding network-related security threats
• Understanding Windows Firewall with Advanced Security
• Configuring IPsec
• Datacenter Firewall
Lab : Configuring Windows Firewall with Advanced Security
• Creating and testing inbound rules
• Creating and testing outbound rules
• Creating and testing connection security rules
After completing this module, students will be able to:
• Describe network-related security threats and how to mitigate them.
• Configure Windows Firewall with Advanced Security.
• Configure IPsec.
• Describe Datacenter Firewall.
Module 13: Securing network traffic
This module explores some of the Windows Server 2016 technologies that you can use to help mitigate network-security threats. It explains how you can configure DNSSEC to help protect network traffic, and use Microsoft Message Analyzer to monitor network traffic. The module also describes how to secure Server Message Block (SMB) traffic.
Lessons
• Configuring advanced DNS settings
• Examining network traffic with Message Analyzer
• Securing and analyzing SMB traffic
Lab : Securing DNS
• Configuring and testing DNSSEC
• Configuring DNS policies and RRL
Lab : Microsoft Message Analyzer and SMB encryption
• Installing and using the Message Analyzer
• Configuring and verifying SMB encryption on SMB shares
After completing this module, students will be able to:
• Configure advanced DNS settings.
• Use the Message Analyzer.
• Secure SMB traffic.
Prerequisites
Students should have at least two years of experience in the IT field and should have:
• Completed courses 740, 741, and 742, or the equivalent.
• A solid, practical understanding of networking fundamentals, including TCP/IP, User Datagram Protocol (UDP), and Domain Name System (DNS).
• A solid, practical understanding of Active Directory Domain Services (AD DS) principles.
• A solid, practical understanding of Microsoft Hyper-V virtualization fundamentals.
• An understanding of Windows Server security principles.
Obrigado pela sua inscrição!
Em breve você receberá o link de acesso no seu e-mail.
Desculpe, houve um erro ao enviar a mensagem.
Tente novamente mais tarde.
Obrigado por entrar em contato. Retornaremos assim que possível!
Desculpe, houve um erro ao enviar a mensagem. Por favor, tente novamente mais tarde...
Ao submeter os seus dados, você manifesta o seu consentimento em fornecer os dados pessoais acima solicitados, que serão utilizados com a finalidade de entrarmos em contato para o fornecimento de informações sobre os produtos e/ou serviços escolhidos por você.
Os seus dados não serão utilizados para nenhum outro tipo de tratamento, a não ser que já exista alguma obrigação legal.
Você poderá solicitar a revogação do seu consentimento a qualquer momento, através do e-mail: privacidade@xpositum.com.br.
Prestamos serviços de consultoria em governança corporativa, programas de compliance, segurança da informação e tecnologia para clientes de todos os segmentos.
Rua Aristides França, 646 - Cidade Jardim
São José dos Pinhais – PR
83035-170
Fone: (41) 2102-0700
Copyright © 2025 Xpositum – Todos os direitos reservados.