Lab Manual for GMCITP Guide to Microsoft Windows Server 2008, Enterprise Administration (Exam # 70-647)

Paperback (Print)
Buy Used
Buy Used from BN.com
$36.00
(Save 33%)
Item is in good condition but packaging may have signs of shelf wear/aging or torn packaging.
Condition: Used – Good details
Used and New from Other Sellers
Used and New from Other Sellers
from $25.43
Usually ships in 1-2 business days
(Save 52%)
Other sellers (Paperback)
  • All (12) from $25.43   
  • New (4) from $48.16   
  • Used (8) from $25.43   

Overview

The Lab Manual for MCITP Guide to Microsoft Windows Server 2008 Enterprise Administration prepares the reader with the hands-on instruction necessary to configure networks using the Microsoft Windows Server 2008 operating system. Focusing on updates to the software and in-depth coverage of the network aspects of Windows Server 2008, this book includes hands-on labs to install, configure, and maintain Windows Server 2008. These labs offer a hands-on approach to learning that is a key component of the Microsoft Windows Server 2008 MCITP exams.

Read More Show Less

Product Details

  • ISBN-13: 9781423902867
  • Publisher: Cengage Learning
  • Publication date: 5/4/2010
  • Series: Test Preparation Series
  • Edition description: New Edition
  • Pages: 324
  • Product dimensions: 8.40 (w) x 10.70 (h) x 0.90 (d)

Meet the Author

Richard Robb has been a respected Technical Trainer on Microsoft technologies for the past twelve-years after changing careers. In his "second career", Mr. Robb has earned quite a number of technical certifications including Microsoft Certified Trainer (MCT), Microsoft Certified Systems Engineer (MCSE) on windows Server 2003, 2000, and NT 4.0, Microsoft Certified Systems Administrator (MCSA) on Windows Server 2003 and 200, Microsoft Certified Desktop Support Technician (MCDSY), as well as Microsoft Certified Information Technology Professional (MCITP). He also holds Certified Novell Engineer (CNE) and A+ certifications and has delivered classes for many top Fortune 500 Companies as well as many governmental agencies in the United States and Canada. Mr. Robb currently works as an independent contractor providing training throughout the United States and Canada. He has also been part owner of a computer consulting company and part owner of a Microsoft and IBM Lotus training company with a six room training center. A former restaurant General Manager of a four hundred seat full service seafood restaurant, Mr. Robb was at the forefront of the move from simple point-of-sale cash registers to network operation systems in the food service industry and spearheaded the move to using computers in the restaurant for everything from cash registers to databases for managing inventory. Richard Robb, an accomplished computer hobbyist in the early 1980's, united his keen interest of computers with a methodical research into the exploding IT industry and made the move from food service to information technology full time. He worked as a consultant for some time after leaving the restaurant, but when the opportunity arose to instruct, it coupled two things that he loves to do, work with computers and teach. Mr. Robb is a graduate of Gettysburg College in Gettysburg, PA, with a dual major in Psychology and Economics and holds a Bachelor of Arts Degree.

: Darril Gibson is the CEO of Security Consulting and Training, LLC and is an accomplished author and professional trainer. He currently teaches Air Force clients on an Air Force base in Hampton, Virginia and has been an adjunct professor at ECPI College in Newport News and Virginia Beach. Mr. Gibson has authored six books and coauthored two and holds many current IT certifications including: CompTIA's A+, Network+, and Security+; ISC2's CISSP; and ITIL Foundations v3. His Microsoft certifications include: Microsoft Certified Trainer (MCT since 1999), MCSE (NT 4.0, 2000, 2003), MCSA Messaging (2000, 2003), MCITP (Vista, Server 2008, SQL 2005), MCTS (Server 2008, SQL Server 2008) and MCSD (6.0, .NET). Darril Gibson has an Associate Degree in Microcomputer Technology from Central Texas College, a Bachelor of Science Degree from Troy State University and a Master's Degree in Human Relations from the University of Oklahoma. Mr.Gibson teaches, writes and consults on a wide variety of security and IT topics to both private and government clients.

Read More Show Less

Table of Contents

Lab 1.1. Creating a Microsoft Virtual PC Environment. Lab 1.2. Promoting DC1 to a Domain Controller. Lab 1.3. Promoting DC2 to a Domain Controller. Lab 1.4. Building the Windows Server 2003 Virtual PC. Lab 1.5. Promoting DC2003 to a Domain Controller. Lab 1.6. Configuring DNS to Support the Forest Trust. Lab 1.7. Building an External Trust Relationship. Lab 1.8. Installing the ADMT (Active Directory Migration Tool). Lab 1.9. Preparing the Target and Source Domains for a Test Migration. Lab 1.10. Running a Test Migration with ADMT. Lab 1.11. Viewing SID History (optional lab.) Lab 1.12. Preparing Your 2003 Active Directory Forest and Domain with ADPrep. Alternate Lab 1.1. Creating a Virtual PC Environment on a Windows 7 Host Using Windows Virtual PC. Lab 2-1. Creating West Coast Sites and Subnets. Lab 2-2. Creating West Coast Site Links. Lab 2-3. Disabling Site Link Bridging and Configuring a Hub and Spoke Topology. Lab 2-4. Creating Installation Media. Lab 2-5. Installing from Installation Media. Lab 2-6. Adding an Attribute to a Filtered Attribute Set. Lab 2-7. Prestaging an RODC. Lab 3-1. Host Names and the Name Resolution Process. Lab 3-2. Inspecting and Creating the DNS Zone Files. Lab 3-3. Inspecting and Creating the DNS Records. Lab 3-4. Attempting a Secure Dynamic Update. Lab 3-5. Inspecting and Configuring Zone Transfers. Lab 3-6. Conditional Forwarding vs. Stub Zones. Lab 3-7. Replacing WINS with the GlobalNames Zone. Lab 4-1. Creating an OU Structure and Delegating Control over an OU. Lab 4-2. Redirecting the Placement of New Computer Accounts. Lab 4-3. Restricting the Use of USB Devices Using a Group Policy Object (GPO). Lab 4-4. Implementing Printer Locations with Group Policy. Lab 4-5. Testing Advanced GPO Options (Block Inheritance, Enforced, and GPO Filtering). Lab 4-6. Testing a WMI Filter to Control How a GPO is Applied. Lab 5-1. Preparing the Virtual Environment for Network Access. Lab 5-2. Installing and Configuring the Remote Access Service. Lab 5-3. Configuring a Client VPN Connection. Lab 5-4. Configuring a Network Access Policy. Lab 5-5. Configuring and Testing a RADIUS Server. Lab 5-6. Configuring a Network Access Policy with 802.1X Enforcement. Lab 5-7. Configuring a Terminal Server to Host a TS RemoteApp Program. Lab 5-8. Deploying RemoteApp Programs. Lab 5-9. Configuring TS Session Broker. Lab 6-1. Examining a Public CA's Certificate. Lab 6-2. Installing Certificate Services on an Enterprise Subordinate CA. Lab 6-3. Backing Up the Enterprise Subordinate CA. Lab 6-4. Installing Certificate Services on a Stand-Alone Root CA. Lab 6-5. Installing Certificate Services on an Enterprise Subordinate CA with a Stand-Alone Root CA. Lab 6-6. Deploying a Trusted Root Certificate with Group Policy. Lab 6-7. Configuring a Certificate for an Exchange User Using a Certificate Template and Autoenrollment. Lab 7-1. Creating a Security Policy with SCW. Lab 7-2. Using Scwcmd to Analyze Multiple Systems. Lab 7-3. Applying a Security Policy to Multiple Systems with Scwcmd. Lab 7-4. Registering XML Extensions to SCW with Scwcmd. Lab 7-5. Scheduling Scwcmd to Perform Regular Compliance Audits. Lab 7-6. Installing WSUS Prerequisites on the Upstream Server. Lab 7-7. Installing WSUS on the Upstream Server. Lab 7-8. Configuring Synchronization from the Microsoft Update Site. Lab 7-9. Synchronizing with the Upstream WSUS Server. Lab 8-1. Configuring the Web Site to be Hosted on the Network Load Balanced Cluster. Lab 8-2. Adding the Network Load Balancing Feature. Lab 8-3. Creating the NLB Cluster That Will Host the Web Site. Lab 8-4. Adding a Host to the NLB Cluster. Lab 8-5. Testing the NLB Cluster. Lab 8-6. Removing the NLB Cluster and the NLB Cluster Feature. Lab 8-7. Adding a Replica Domain Controller and Confirming Replication. Lab 8-8. Adding a Disk to Virtual PC. Lab 8-9. Backing Up with Wbadmin. Lab 8-10. Preparing for an Active Directory Restore. Lab 8-11. Performing a Non-Authoritative Restore. Lab 9-1. Adding the DFS Role Services to Configure Replication. Lab 9-2. Creating Shared Folders and Configuring the DFS Namespace. Lab 9-3. Designing and Configuring DFS Replication. Lab 9-4. Creating a Diagnostic Report for DFS Replication. Lab 9-5. Configuring Services on the WSS 3.0 Server. Lab 9-6. Creating a Web Application. Lab 9-7. Creating a Site Collection. Lab 9-8. Testing the Site and Starting the WSS Search Service. Lab 9-9. Providing Alternative Access to the Web Application. Lab 10-1. Installing the Windows XP Mode Applications. Lab 10-2. Publishing the Installed XP Mode Applications to Windows 7. Lab 10-3. Creating a New Virtual Network. Lab 10-4. Creating a New Virtual Linux Server. Lab 10-5. Beginning the SUSE Linux Enterprise Server 11 Installation to the New Virtual Machine. Lab 10-6. Completing the SUSE Linux Enterprise Server 11 Installation.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)