Processing your application. Please be patient while we make sure we receive every piece of it.
Windows Server 2008
6426 C: Configuring and Troubleshooting Identity and Access Solutions with Windows Server 2008 Active Directory
3 Day(s)
REQUEST
PRIVATE SESSION
COURSE DESCRIPTION
OVER
VIEW
+
OBJEC
TIVES
+
AUD
IENCE
+
PRERE
QUISI
TES
+
OUT
LINE
+
This three-day course provides the knowledge and skills that IT Professionals need to configure identity and access solutions with Windows Server 2008 Active Directory.
Price: $1,740
To find out more available information
about this course, please contact us:

416-929-1599
info@acend.com
To find out more available information
about this course, please contact us:

416-929-1599
info@acend.com
To find out more available information
about this course, please contact us:

416-929-1599
info@acend.com

Course Introduction
Course Introduction
Module 01 - Exploring IDA Solutions
Lesson 1: Overview of IDA Management
Discussion: Need for IDA Management Solutions
What is IDA Management?
Directory Management by Using IDA Solutions
Enhancing Security by Using IDA Management
IDA Management Technologies
Lesson 2: Active Directory Server Roles in IDA Management
What is a Server Role?
Demo - Add Roles
Directory Service Roles for IDA Management
Strong Authentication Roles for IDA Management
Federated Identity Roles for IDA Management

Information Protection Roles for IDA Management

Lesson 3: Overview of ILM 2007

Components of ILM 2007

Infrastructure Requirements for ILM 2007

Identity Integration by Using MIIS

Identity Management Process by Using MIIS

Components of CLM 2007

Smart Card and Certificate Life Cycle

Module 01 - Review

Module 02 - Configuring AD CS Overview

Lesson 1: What is PKI?

What is PKI?

Discussion: Managing IDA and Enhancing Security by Using PKI

Components of a PKI Solution

Validating Certificates by Using PKI Solutions

How AD CS Supports PKI

Demo - Install ADCS

Lesson 2: Deploying a CA Hierarchy

Overview of CA
Discussion: Options for Implementing CA
Types of CAs
Stand-Alone vs. Enterprise CAs
Usage Scenarios in CA Hierarchy
What is a Cross-Certification Hierarchy?
Lesson 3: Installing AD CS
Considerations for Installing Root CA
Considerations for Installing a Subordinate CA
How CAPolicy.inf File Is Used for Installation
Demo - CA Console
Lesson 4: Managing a CA
What Are CRLs?
How CRLs Are Published
Where to Publish AIAs and CDPs
Demo - ADCS
Module 02 - Review

Module 03 - Deploying and Managing Certificates
Lesson 1: Deploying Certificates by Using AD CS
What is a Digital Certificate?
Overview of Certificate Life Cycle
Certificate Enrollment Methods
Obtaining Certificates by Using Web Enrollment
Obtaining Certificates by Using Manual Enrollment
Demo - Web Enrollment
What is NDES?
Lesson 2: Deploying Certificates by Using Autoenrollment
Discussion: Benefits and Uses of Autoenrollment
Functioning of Autoenrollment
Lesson 3: Revoking Certificates
Reason Codes for Revoking a Certificate
Demo - Revoke Certificate
What is an Online Responder?
How Online Responders Work
Steps to Configure an Online Responder
Demo - Online Responder
Lesson 4: Configuring Certificate Templates
What Are Certificate Templates?
Certificate Template Versions
Certificate Template Categories and Purposes
Configuring Certificate Template Permissions
Methods for Updating a Certificate Template
Demo - Templates
Lesson 5: Configuring Certificate Recovery
Importance of Key Archival and Recovery
Manually Exporting Certificates and Private Keys
Configuring Automatic Key Archival
Recovering a Lost Key
Demo - Managing CS
Demo - Auto Enroll
Demo - OCSP
Demo - Key Recovery
Module 03 - Review

Module 04 - Configuring AD LDS
Lesson 1: Installing and Configuring AD LDS
What is AD LDS?
AD LDS Deployment Scenarios
AD LDS Components
Demo - Install LDS
AD LDS Administration Tools
How Clients Connect to AD LDS
Lesson 2: Configuring AD LDS Instances
What is an AD LDS Instance?
What is an AD LDS Schema?
What is an Application Partition?
AD LDS Users and Groups
How Access Control Works in AD LDS
Lesson 3: Configuring AD LDS Replication
Why Implement AD LDS Replication?
How AD LDS Replication Works
What is a Configuration Set?
AD LDS Replication Topology
Lesson 4: Configuring AD LDS Integration with AD DS
Options for Integrating AD LDS and AD DS
Synchronizing AD DS Accounts to AD LDS
Demo - Creating Instances
Demo - LDS User
Demo - Replica
Module 04 - Review

Module 05 - Configuring AD FS
Lesson 1: Overview of AD FS
What is Identity Federation?
Identity Federation Scenarios
Discussion: Identity Federation Business Requirements
What is a Federation Trust?
AD FS Components
Lesson 2: AD FS Deployment Scenarios
AD FS Deployment Options
How AD FS Traffic Flows in a B2B Federation Scenario
How AD FS Traffic Flows in a B2E Federation Scenario
How AD FS Traffic Flows in a B2C Federation Scenario
AD FS Deployment Considerations
Lesson 3: Deploying AD FS
AD FS System Requirements
AD FS Prerequisites
AD FS Certificate Requirements
Federation Service Configuration Tasks
What is an AD FS Trust Policy?
Configuring AD FS Web Agent
Lesson 4: Implementing AD FS Claims
What Are AD FS Claims?
What Are Group and Custom Claims?
What is Incoming Claim Mapping?
What is Outgoing Claim Mapping?
Demo - Install FS
Demo - Certificates
Demo - SSL Settings
Demo - Web Agents
Demo - Forrest Trust
Module 05 – Review

Module 06 - Configuring AD RMS
Lesson 1: Overview of AD RMS
How Access Management is Enforced by Using AD RMS
Usage Scenarios for AD RMS
Comparing Technologies Used to Protect Information
Identifying AD RMS Components
AD RMS Certificates and Licenses
Overview of AD RMS Workflow
How Files Are Protected by Using AD RMS
Lesson 2: Installing and Configuring AD RMS Server Components
AD RMS Deployment Scenarios
Pre-installation Considerations
AD RMS System Requirements
What is a Service Connection Point?
Implementing an AD RMS Client
Configuring Client Service Discovery
Lesson 3: Administering AD RMS
AD RMS Administration Tasks
What is a Rights Policy Template?
Providing Rights Policy Templates for Offline Use
What Are Exclusion Policies?
Lesson 4: Implementing AD RMS Trust Policies
Methods of Defining Trust Policies
Overview of Trusted User Domain Interaction
Overview of Trusted Publishing Domain Interaction
Deploying AD RMS with AD FS
Demo - Install RMS
Demo - Rights Template
Demo - Trust Certificates
Module 06 - Review

Module 07 - Maintaining Access Management Solutions
Lesson 1: Supporting AD CS
Common AD CS Maintenance Tasks
Configuration of Role-Based Administration for Managing and Maintaining AD CS
Tools Used to Maintain AD CS
Configuration of CA Event Auditing
Methods of Backing Up and Restoring a CA
Lesson 2: Maintaining AD LDS
AD LDS Maintenance Tasks
Backing Up AD LDS
Restoration of Data to an AD LDS Instance
Performing an Authoritative Restore of Data on an AD LDS Instance
Lesson 3: Maintaining AD FS
AD FS Maintenance Tasks
Monitoring AD FS Events
Backing Up AD FS Components
Lesson 4: Maintaining AD RMS
AD RMS Maintenance Tasks
Viewing AD RMS Reports
Decommissioning AD RMS
Demo - Auditing IDA
Demo - CA Security Roles
Module 07 - Review

Module 08 - Troubleshooting IDA Solutions
Lesson 1: Troubleshooting AD CS
Tools Used to Troubleshoot AD CS
What is Enterprise PKI?
Common AD CS Issues
Troubleshooting Web Enrollment Errors
Troubleshooting Client Autoenrollment
Troubleshooting Certificate Validation Errors
Lesson 2: Troubleshooting AD LDS
Common Issues of AD LDS
Installation Issues of AD LDS Instances
Application Connection Issues of AD LDS
Initiating Issues of Instances
Lesson 3: Resolving AD FS Issues
Common Issues of AD FS
Setup Issues of AD FS
Configuration Issues of AD FS
Enabling Debug Logging with AD FS
Lesson 4: Solving AD RMS Issues
Common Issues of AD RMS
Troubleshooting AD RMS Cluster Installation
Troubleshooting AD RMS Cluster URL Availability
Troubleshooting Service Connection Point Registration
SITE MAP