Learn your way! Get started

Maintaining Win2K3 Network Infrastructure

with expert Rafiq Wayani


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 8/31/2007
Level Intermediate
Runtime 8h 38m
Closed captioning N/A
Transcript N/A
eBooks / courseware N/A
Hands-on labs N/A
Sample code N/A
Exams Included
Platform Internet Explorer Only


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

Planning and Maintaining a Windows Server 2003 Network Infrastructure course will give you the knowledge and skills necessary to prepare to pass Microsoft exam 70-293. This course is intended for individuals pursuing the MCSE on Windows Server 2003 certification.

Meet the expert

Rafiq Wayani has extensive experience including more than 20 years in IT as Systems Architect, Software Engineer, DBA, and Project Manager. Wayani has instructed in a variety of technical areas, has designed and implemented network and information systems, and is certified across a wide range of platforms and systems including Microsoft Solutions Developer, Systems Engineer, Application Developer, Database Administrator, Trainer; Novell Netware Administrator and Engineer; Master Certified Netware Engineer; and A Certified.

Course outline



Module 1

Introduction (24:27)
  • Introduction (00:54)
  • Network Design (01:24)
  • Process (02:23)
  • Views (01:51)
  • Goals - Availability (01:05)
  • Goals - Development/Deploy (01:39)
  • Goals - Reusability (01:11)
  • Goals - Integration (00:57)
  • Goals - Manageability (00:56)
  • Goals - Performance (01:33)
  • Assessing Risks (00:34)
  • Risks - Agree on Goals (01:51)
  • Risk Management (02:12)
  • Risks - Prioritization (01:31)
  • Risks - Changes to Design (01:16)
  • Effects on Scheduling/Planning (00:54)
  • Implementation (01:41)
  • Summary (00:26)
Physical Network Design (19:23)
  • Introduction (00:37)
  • Diagrams: Physical (02:17)
  • Diagrams: Logical (01:32)
  • Documentation Needed (02:19)
  • Physical Diagram (00:00)
  • DCs (01:10)
  • DHCP / DNS / WINS (02:19)
  • Printers / Print Servers (00:52)
  • Routers (00:33)
  • Application / File / DB / Web (02:32)
  • Locations of Hardware (01:54)
  • WAN Links / Bandwidth (00:45)
  • Other Documentation (02:05)
  • Summary (00:23)
Network Planning (26:46)
  • Introduction (00:39)
  • Create a Schedule (03:41)
  • Key Resources (03:40)
  • Scope of Project (02:15)
  • Planning Components (07:57)
  • Scope Management (04:25)
  • Effective Scheduling (03:41)
  • Summary (00:23)

Module 2

Planning IP (25:02)
  • Introduction (00:49)
  • NAT Server (04:31)
  • TCP/IP (01:41)
  • DHCP (00:45)
  • WINS (00:47)
  • DNS (01:07)
  • TCP/IP Subnetting (02:58)
  • Classful IP Addresses (00:32)
  • Classless IP Addresses (01:00)
  • RFCs (01:02)
  • Addressing Scheme Diagram (02:39)
  • Steps to an IP Network (02:20)
  • Hosts per Subnet (04:17)
  • Summary (00:28)
IP Subnets (17:39)
  • Introduction (00:41)
  • IP Subnets (03:10)
  • DHCP (01:42)
  • APIPA (00:36)
  • Manual (01:31)
  • DHCP Server Console (00:00)
  • Assign DHCP Addresses (01:31)
  • Create a DHCP Reservation (02:20)
  • View the Address Leases (01:06)
  • Registry Key To Disable APIPA (01:23)
  • Best Practices (03:00)
  • Summary (00:33)
Network Performance (46:53)
  • Introduction (00:43)
  • Performance (16:11)
  • Utilization (04:38)
  • Evaluation (06:09)
  • Upgrade (07:33)
  • Actual Data Throughput (01:58)
  • Efficiency Rating (00:55)
  • Figuring Efficiency Examples (02:31)
  • Growth (03:12)
  • Best Practices (02:15)
  • Summary (00:42)

Module 3

Routing and Switching (32:36)
  • Introduction (00:39)
  • Data Transfer Devices (03:29)
  • Routers (02:55)
  • Subnets and Routers (01:28)
  • Using Routers - Reasons (03:12)
  • Broadcast Domain (00:52)
  • Collision Domain (00:29)
  • Broadcast Domain Diagram (01:13)
  • Switches (01:20)
  • Benefits of Switches (01:58)
  • Virtual LANs (03:35)
  • Virtual LANs - Benefits (02:54)
  • Virtual LANs - Memberships (03:33)
  • Increasing Bandwidth (02:12)
  • Best Practices (02:02)
  • Summary (00:36)
Internet Connectivity (29:27)
  • Introduction (00:38)
  • Overview (01:19)
  • Public IP Address (01:26)
  • Private IP Address (02:00)
  • Network Address Translation (02:22)
  • Internet Connectivity (01:07)
  • Requirements (06:38)
  • Firewall Solutions (01:01)
  • NAT / Basic Firewall (02:23)
  • Use RRAS Setup NAT (02:09)
  • ISA Server (02:26)
  • NAT vs ISA (05:24)
  • Summary (00:26)
DHCP - Part 1 (30:56)
  • Introduction (01:26)
  • DHCP Overview (00:56)
  • Config IP Address Manually (01:22)
  • Config IP Address Dynamically (01:17)
  • Central Admin of IP Addresses (02:10)
  • Lease Generation Process (01:32)
  • Lease Renewal Process (01:50)
  • Create DHCP Role on Server (03:25)
  • Configure DHCP on Client (01:53)
  • Configure DHCP Scope (03:07)
  • Create a DHCP Server Scope (04:00)
  • Authorize the DHCP Server (00:43)
  • How Client Receives an IP (02:45)
  • Create a DHCP Reservation (04:08)
  • Summary (00:15)

Module 4

DHCP - Part 2 (47:16)
  • Introduction (00:30)
  • Class-Level Options (02:23)
  • Config Vendor/User Classes (02:38)
  • Relay Agent (00:57)
  • Ways to Implement DHCP (01:51)
  • Fault Tolerance (01:20)
  • Relay Agent Process (02:54)
  • Install/Setup a Relay Agent (02:12)
  • Configure Relay Agent (02:31)
  • Manage / Monitor (01:45)
  • Reasons to Monitor (06:23)
  • DHCP Database (03:48)
  • Database Files (03:32)
  • Backup / Restore (01:29)
  • Maintenance Guidelines (02:36)
  • Location of Database Files (02:36)
  • Backup/Restore Demo (05:55)
  • Select Backup Location (01:31)
  • Summary (00:16)
DHCP - Part 3 (44:14)
  • Introduction (00:26)
  • Reconciliation (02:23)
  • Reconcile the Scope (01:13)
  • DHCP Registry Keys (00:34)
  • Rename dhcp.mdb (02:54)
  • Backup Registry Configuration (02:01)
  • Cautions with Registry Keys (03:06)
  • Create a Performance Baseline (02:36)
  • Reasons to Monitor (01:22)
  • How to Monitor (00:46)
  • View DHCP Server Statistics (02:28)
  • View DHCP Server Log File (05:30)
  • Auditing (01:43)
  • Auditing Data Collection (04:56)
  • Performance (01:26)
  • Performance Counter Demo (01:25)
  • Create an Alert (01:51)
  • Examine the Event Viewer (01:52)
  • Monitoring Guidelines (05:16)
  • Summary (00:16)

Module 5

DNS (48:50)
  • Introduction (00:44)
  • Introduction to DNS (06:18)
  • Resolve Names with DNS (01:58)
  • Local DNS Resolver Cache (03:25)
  • Resolve Name with WINS (01:55)
  • Resolve Names with LMHosts (02:08)
  • Enable LMHosts Lookup (03:18)
  • Name Resolution (04:36)
  • Configuration Information (01:58)
  • Query Types (02:47)
  • Reverse Lookup (01:01)
  • Create a Reverse Lookup Zone (01:45)
  • Server Roles (01:52)
  • Security (03:22)
  • DNS Server Considerations (01:39)
  • Namespace Selection (04:36)
  • Namespace Considerations (01:00)
  • Zones (01:32)
  • Security Considerations (02:21)
  • Summary (00:25)
IP Security (33:16)
  • Introduction (00:38)
  • IPSec Overview (01:48)
  • Securing Network Environment (00:50)
  • IPSec Policy on Client (02:32)
  • IPSec Policy on Server (04:12)
  • Manage Filter Lists/Actions (01:47)
  • Default IPSec Policies (01:03)
  • NETSH Tool (02:57)
  • IP Security Monitor (01:15)
  • IPSec Mon - Main/Quick Mode (03:52)
  • Inet Conn Sharing / Firewall (00:51)
  • Prohibit ICS / Firewall (02:04)
  • Routing and Remote Access (00:52)
  • Config Routing/Remote Access (04:29)
  • Routing/Remote Enhancement (02:10)
  • Common IPSec Config Errors (01:25)
  • Summary (00:25)

Module 6

Network Access - Part 1 (23:51)
  • Introduction (00:31)
  • Components (04:26)
  • Server (00:11)
  • Requirements (01:12)
  • Types of Clients (03:08)
  • Security (02:29)
  • Setup Remote Access (01:16)
  • Manage Users Permissions (02:10)
  • Config Routing/Remote Access (03:47)
  • Connect through VPN (02:05)
  • Connect as a Client (00:46)
  • Failed Connect Attempt (01:31)
  • Summary (00:13)
Network Access - Part 2 (29:10)
  • Introduction (00:27)
  • VPN Connection (00:35)
  • Connection Process (01:28)
  • Components (01:39)
  • Encryption Protocols (00:18)
  • Encryption Requirements (03:23)
  • Wireless (00:54)
  • Two Modes for Wireless (01:13)
  • Wireless Components (01:27)
  • Wireless Standards (02:21)
  • 802.1x Authentication (01:01)
  • Win XP Client Config Types (01:01)
  • Determine Auth Methods (01:23)
  • Dial-In Permissions (01:05)
  • Permissions (00:32)
  • Remote Access Policy (00:36)
  • Specify RAP (03:12)
  • Remote Access Logging (01:02)
  • Dial-In Permissions/Properties (02:44)
  • Raise Domain / Forest Levels (02:20)
  • Summary (00:19)
Securing Win 2K3 Servers (38:11)
  • Introduction (00:24)
  • Server Roles (02:06)
  • Examples of Security Threats (03:17)
  • Types of Data on the Server (03:04)
  • Methods of Securing a Server (02:22)
  • Assessing Implemented Sec. (00:32)
  • Disposing Server Hardware (02:12)
  • Availability of Win Server 2003 (01:04)
  • Server Clusters (02:26)
  • Benefits of Clusters (01:53)
  • Network Security (03:04)
  • Net Security - Best Practices (02:27)
  • Wireless Network Security (04:35)
  • Certificates (03:48)
  • Enable Certificate Services (02:31)
  • MMC Certificate Snap-Ins (02:06)
  • Summary (00:13)