This five-day instructor-led is intended for IT professionals who wants to learn about administering, configuring, troubleshooting, and operating identity services in the Active Directory Domain Services and Azure AD.
Course Price : $2495 Per Participant
This five-day instructor-led is intended for IT professionals who wants to learn about administering, configuring, troubleshooting, and operating identity services in the Active Directory Domain Services and Azure AD.
Course covers core AD DS identity services such as GPOs, AD CS, AD FS and also hybrid solutions with Azure AD.
Courses
Years of Experience
Global Learners
This course is intended for IT professionals who work on administering, configuring, troubleshooting, and operating identity services in the Active Directory Domain Services and Azure AD.
It is also useful for system or infrastructure administrators with general AD DS experience and knowledge who want to cross-train in core and advanced identity and access technologies in Windows Server and Azure AD.
Microtek Learning is a Microsoft Certified Partner for Learning Solutions. This class uses official Microsoft courseware and will be delivered by a Microsoft Certified Trainer (MCT).
Oops! For this course, there are currently no public schedules available. Clicking on "Notify Me" will allow you to express your interest.
For dates, times, and location customization of this course, get in touch with us.
You can also speak with a learning consultant by calling 800-961-0337.
Active Directory Domain Services (AD DS) is the cornerstone of on-premises networks for many organizations worldwide. AD DS delivers authentication and authorization by using domain controllers (DCs) for on-premises apps and services. In this module, you’ll learn how to configure DCs to suit your specific organizational needs and integrate AD DS with Microsoft Azure Active Directory (Azure AD) to provide single sign-on (SSO) for users that access both on-premises and cloud-based apps.
Lessons
Lab 1: Deploy and administer AD DS
After completing this module, students will be able to:
Active Directory, at its heart, is a hierarchical database. Unlike a traditional database, however, you can create many different types of records within Active Directory. These records are referred to as objects, which you can create to represent almost anything in your network, from users and groups to printers, shared folders, and computers.
Each object can have many different properties, referred to as attributes. For example, the user object type has attributes in which you can store the user’s sign-in name, and street and email addresses.
Not only does Active Directory allow you to store information about objects, but it also enables you to manage those objects. After you create objects, you can use AD DS to manage and control these objects, which you can group together in containers to easily apply policies to them.
Active Directory is a powerful tool to centrally manage your network. Large organizations might want to distribute management to different teams of administrators. Active Directory enables this by allowing a domain administrator to provide lower-level administrators access to specific objects and containers.
Lessons
Lab 1: Manage AD DS Objects
Lab 2: Administer AD
After completing this module, students will be able to:
This module describes key technologies that serve as the building blocks of more advanced AD DS environments and provides guidance about implementing and managing such environments.
Lessons
Lab 1: Domain and trust management in AD DS
After completing this module, students will be able to:
In this module, you’ll learn about the technical details of AD DS replication and how you can leverage that knowledge to optimize the design and implementation of AD DS environments that consist of multiple geographically distributed DCs.
Lessons
Lab 1: Implement AD DS sites and replication
After completing this module, students will be able to:
For organizations operating in an on-premises AD DS environment, Group Policy offers centralized management of both user and computer settings. This enables administrators to configure, enforce, and maintain their organization’s on-premises configuration. GPOs are linked to container objects such as sites, domains, and OUs. Users and computers placed in those containers inherit the applicable container’s settings. However, GPOs can be blocked, unlinked, or enforced to override the default application behavior. GPOs can also be filtered based on security-group membership and Windows Management Instrumentation (WMI) filters. When settings don’t apply as you expect, it’s important that you know how to investigate and resolve the issues.
Lessons
Lab 1: Implement a Group Policy Infrastructure
Lab 2: Troubleshoot Group Policy infrastructure
After completing this module, students will be able to:
You can use GPOs to create a standard desktop for the entire organization or on a departmental basis. You construct this standard desktop by using features such as administrative templates, Folder Redirection, and Group Policy preferences.
Lessons
Lab 1: Manage user settings with Group Policy
After completing this module, students will be able to:
AD DS contains sensitive information about many parts of your IT infrastructure, such as users and their passwords. An issue with your AD DS security can result in data loss, data leakage, parts of your IT infrastructure being disabled, or even your entire IT infrastructure being compromised. As an AD DS administrator, you need to understand the potential threats to AD DS and how to mitigate them.
Lessons
Lab 1: Secure AD DS
After completing this module, students will be able to:
Public key infrastructure (PKI) is the tools and processes that allow you to issue digital certificates, which are commonly used for authentication and to help secure network communication. You can configurate Windows Server as a CA that issues digital certificates by installing the AD CS role.
Lessons
Lab 1: Deploy and configure a two-tier CA hierarchy
After completing this module, students will be able to:
Planning a CA hierarchy is just the first part of implementing PKI for your organization. You also need to understand how to manage certificate templates to ensure that users and computers get certificates with the correct configuration. Additionally, you need to know how to manage certificates, including certificate revocation, and how you can use certificates for purposes such as securing network communication.
Lessons
Lab 1: Deploy and use certificates
After completing this module, students will be able to:
Windows Server provides AD FS, an SSO solution. AD FS enables organizations to provide users with the ability to sign in and authenticate to services and apps locally, in partner companies, and online. AD FS service provides SSO functionality for many services in various organizations. In this module, you’ll learn how AD FS works and how to implement it in different scenarios.
Lessons
Lab 1: Implement AD FS
After completing this module, students will be able to:
In this module, you’ll learn how to plan, prepare, and implement directory synchronization between local AD DS and Azure AD.
Lessons
Lab 1: Configure Directory Synchronization.
After completing this module, students will be able to:
At the heart of AD DS is the Active Directory database. A major responsibility for administrators is to monitor AD DS and its associated services, which ensures you’re managing issues proactively. In a worst-case scenario, administrators might have to restore the Active Directory database from a backup, which requires a methodical approach to creating, testing, and performing regular backups. Microsoft provides several tools for monitoring AD DS in real time, and for storing data to recognize trends over time. There are also specific tools to help you backup and restore an Active Directory database.
Lessons
Lab 1: Recover Objects in AD DS
After completing this module, students will be able to:
©2023 Microtek Learning – All Rights Reserved