Microsoft Courses - Microsoft Certification Courses

The Knowledge Academy
In Cardiff (Wales)

Want to speak to an Advisor about this course?

Important information

Typology Course
Location Cardiff (Wales)
Duration 3 Days
Start Different dates available
  • Course
  • Cardiff (Wales)
  • Duration:
    3 Days
  • Start:
    Different dates available

Delegate pack consisting of course notes and exercises Manual Experienced Instructor Refreshments


Where and when

Starts Location
Different dates available
Castle Street, CF10 1SZ, Cardiff, Wales
See map
Starts Different dates available
Castle Street, CF10 1SZ, Cardiff, Wales
See map


There are no opinions on this course yet

What you'll learn on the course

Windows Server
Active Directory
IT Security
Network Training
IT Management

Course programme

The Knowledge Academy Windows Server 2008 Active Directory, Configuring 3 day course covers the following topics:


  • This Windows Server 2008 Active Directory, Configuring course is designed for those working in the IT industry, looking to learn about Active Directory infrastructures and Active Directory roles and services.


  • Delegates must have at least one year’s experience in implementing and administering Windows Server 2008 R2.

Who should attend?

  • This course is suited for IT professionals working in complex computing environments of medium to large companies

Course Structure

  • Perform a clean installation
    • Identifying hardware requirements; setting up as the sole operating system; setting up as dual boot; installation methods; boot from the source of installation, preparing the installation source: USB, CD, network share, WDS
  • Upgrade to Windows 7 from previous versions of Windows
    • Upgrading from Windows Vista; migrating from Windows XP; upgrading from one edition of Windows 7 to another edition of Windows 7
  • Migrate user profiles
    • Migrating from one machine to another; migrating from previous versions of Windows; side-by-side vs. wipe and load
  • Capture a system image
    • Preparing system for capture; creating a WIM file; automated capture; manual capture
  • Prepare a system image for deployment
    • Inserting an application into a system image; inserting a driver into a system image; inserting an update into a system image; configuring tasks to run after deployment
  • Deploy a system image
    • Automated deployment methods; manually deploying a customised image
  • Configure a VHD
    • Creating, deploying, booting, mounting and updating VHDs; offline updates; offline servicing
  • Configure devices
    • Updating, disabling and uninstalling drivers; signed drivers; conflicts between drivers; configuring driver settings; resolving problem device driver
  • Configure application compatibility
    • Setting compatibility mode; implementing shims; compatibility issues with Internet Explorer
  • Configure application restrictions
    • Setting software restriction policies; setting application control policies; setting through group policy or local security policy
  • Configure Internet Explorer
    • Configuring compatibility view; configuring security settings; configuring providers; managing add-ons; controlling InPrivate mode; certificates for secure websites
  • Configure IPv4 network settings
    • Connecting to a network; configuring name resolution; setting up a connection for a network; network locations; resolving connectivity issues; APIPA
  • Configure IPv6 network settings
    • Configuring name resolution; connecting to a network; setting up a connection for a network; network locations; resolving connectivity issues; link local multicast name resolution
  • Configure networking settings
    • Adding a physically connected (wired) or wireless device; connecting to a wireless network; configuring security settings on the client; set preferred wireless networks; configuring network adapters; configuring location-aware printing
  • Configure Windows Firewall
    • Configuring rules for multiple profiles; allowing or denying an application; network-profile-specific rules; configuring notifications; configuring authenticated exceptions
  • Configure remote management
    • Remote management methods; configuring remote management tools; executing PowerShell commands
  • Configure shared resources
    • Folder virtualisation; shared folder permissions; printers and queues; configuring HomeGroup settings
  • Configure file and folder access
    • Encrypting files and folders by using EFS; configuring NTFS permissions; resolving effective permissions issues; copying files vs. moving files
  • Configure user account control (UAC)
    • Configuring local security policy; configuring admin vs. standard UAC prompt behaviours; configuring Secure Desktop
  • Configure authentication and authorisation
    • Resolving authentication issues; configuring rights; managing credentials; managing certificates; smart cards with PIV; elevating user privileges; multifactor authentication
  • Configure BranchCache
    • Distributed cache mode vs. hosted mode; network infrastructure requirements; configuring settings; certificate management
  • Configure BitLocker and BitLocker To Go
    • Configuring BitLocker and BitLocker To Go policies; managing Trusted Platform Module (TPM) PINs; configuring startup key storage; data recovery agent support
  • Configure DirectAccess
    • Configuring client side; configuring authentication; network infrastructure requirements
  • Configure mobility options
    • Configuring offline file policies; transparent caching; creating and migrating power policy
  • Configure remote connections
    • Establishing VPN connections and authentication; enabling a VPN reconnect; advanced security auditing; NAP quarantine remediation; dial-up connections; remote desktop; published apps
  • Configure updates to Windows 7
    • Configuring update settings; determining source of updates; configuring Windows Update policies; reviewing update history; checking for new updates; rolling back updates
  • Manage disks
    • Managing disk volumes; managing file system fragmentation; RAID; removable device policies
  • Monitor systems
    • Configuring event logging; filtering event logs; event subscriptions; data collector sets; generating a system diagnostics report
  • Configure performance settings
    • Configuring page files; configuring hard drive cache; updated drivers; configuring networking performance; configuring power plans; configuring processor scheduling; configuring desktop environment; configuring services and programs to resolve performance issues; mobile computing performance issues; configuring power
  • Configure backup
    • Creating a system recovery disk; backing up files, folders or full system; scheduling backups
  • Configure system recovery options
    • Configuring system restore points; restoring system settings; last known good configuration; complete restore; driver rollback
  • Configure file recovery options
    • Configuring file restore points; restoring previous versions of files and folders; restoring damaged or deleted files by using shadow copies; restore user profiles

Achievements for this centre


Additional information

Students that were interested in this course also looked at...
See all