Learn your way! Get started

Designing Win2K3 Active Directory and Network Infrastructure

with expert Rafiq Wayani


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 3/12/2006
Level Intermediate
Runtime 7h 1m
Closed captioning N/A
Transcript N/A
eBooks / courseware N/A
Hands-on labs N/A
Sample code N/A
Exams Included
Platform Internet Explorer Only


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

Designing a Windows Server 2003 Active Directory and Network Infrastructure course will give you the knowledge and skills necessary to prepare to pass Microsoft exam 70-297. This course is intended for individuals pursuing the MCSE on Windows Server 2003 certification.

Meet the expert

Rafiq Wayani has extensive experience including more than 20 years in IT as Systems Architect, Software Engineer, DBA, and Project Manager. Wayani has instructed in a variety of technical areas, has designed and implemented network and information systems, and is certified across a wide range of platforms and systems including Microsoft Solutions Developer, Systems Engineer, Application Developer, Database Administrator, Trainer; Novell Netware Administrator and Engineer; Master Certified Netware Engineer; and A Certified.

Course outline



Module 1

Introduction to Active Directory (21:16)
  • Introduction (00:42)
  • Overview (02:11)
  • Provides Means for Control (01:16)
  • Stores Objects Securely (01:20)
  • Optimizes Network Traffic (00:41)
  • Additional Features (02:16)
  • Global Catalog (GC) (00:51)
  • Distinguished/Relative Names (02:28)
  • Where to Assign a GC Server (01:23)
  • View Site Names with ntdsutil (02:19)
  • Single Sign-On (02:03)
  • Authentication Process (01:43)
  • Authorization Process (01:45)
  • Summary (00:13)
Design Active Directory (18:24)
  • Introduction (00:28)
  • Design Components (07:18)
  • Design Team (02:55)
  • Design Tasks (03:30)
  • Guidelines (03:57)
  • Summary (00:12)
Design Principles (18:28)
  • Introduction (00:24)
  • Meet Business Needs (01:25)
  • Plan to Meet Those Needs (06:42)
  • Microsoft Solutions Framework (09:46)
  • Summary (00:09)

Module 2

Design Team (22:05)
  • Introduction (00:26)
  • MSF Design Team Roles (00:59)
  • Product Management Role (01:25)
  • Program Management Role (02:22)
  • Development Role (02:18)
  • Test Role (01:48)
  • Release Management Role (01:13)
  • User Experience Role (01:00)
  • Effective Design Team (02:10)
  • Know the Skill Sets Needed (02:11)
  • Determine Roles (01:43)
  • Duties/Responsibilities (00:59)
  • Determine if Team Is Ready (03:06)
  • Summary (00:20)
Admin Req Design (15:48)
  • Introduction (00:25)
  • Levels of Admin Access (01:18)
  • Distributed or Collaborative (02:51)
  • Autonomous (01:32)
  • Exclusive or Isolated (01:37)
  • Organizational Priorities (00:12)
  • Cost (01:19)
  • Availability (02:06)
  • Reliability (01:29)
  • Responsibility (00:28)
  • Compromise (00:35)
  • Document and Review (01:33)
  • Summary (00:15)
Forest / Domain / Trust Design (35:55)
  • Introduction (00:29)
  • Forest: Models (04:35)
  • Forest: Autonomy (00:45)
  • Forest: Isolation (01:04)
  • Forest: Guidelines (01:18)
  • Domain: Single Domain (01:59)
  • Domain: Multiple Domains (02:33)
  • AD Security (00:24)
  • Security Implemented/Enforced (02:38)
  • Security Attacks (05:29)
  • Trust Relationships (01:23)
  • Trust Categories (01:29)
  • Trust Directions (01:01)
  • Trust Types (02:09)
  • Migration (04:14)
  • AD Schema (04:02)
  • Summary (00:15)

Module 3

Active Directory Administration (20:02)
  • Introduction (00:22)
  • Support (06:43)
  • Security Models (04:06)
  • OU Models (01:20)
  • OU Delegation (00:36)
  • OU Permissions (00:48)
  • Account Policies (01:29)
  • Password Policies (01:40)
  • Group Policies (01:07)
  • Security Groups (01:36)
  • Summary (00:11)
AD Logical Structure (49:48)
  • Introduction (00:28)
  • Objects (01:29)
  • Object Classes (01:33)
  • Object Class Demo (01:55)
  • Object Attributes (01:23)
  • AD Schema Explained (02:41)
  • Ways to Open AD Console (01:02)
  • Create a User Object (04:22)
  • Organizational Units (OU) (02:54)
  • Create an OU (00:35)
  • Add Users to an OU (02:06)
  • Add Security to OU (03:07)
  • Domains (06:03)
  • Set Up a Domain Controller (08:11)
  • Domain Trees (02:58)
  • Forests (01:44)
  • Create a Subdomain (06:48)
  • Summary (00:22)
AD Physical Structure (09:46)
  • Introduction (00:31)
  • Overview (01:09)
  • Two Components (00:11)
  • Domain Controllers (01:49)
  • Partitions (01:41)
  • Sites (02:14)
  • Default First Site Demo (01:47)
  • Summary (00:22)

Module 4

Operations Masters (08:07)
  • Introduction (00:31)
  • Overview (00:55)
  • Multimaster Replication (00:54)
  • Single Master Replication (00:21)
  • Operation Master (OM) Roles (00:47)
  • Forest-Wide OM Roles (00:29)
  • Domain-Wide OM Roles (01:42)
  • Operation Master Roles Demo (00:57)
  • Transfer OM Roles (01:10)
  • Summary (00:16)
Operations Masters (cont.) (19:21)
  • Introduction (00:32)
  • Schema Master (02:08)
  • Domain Naming Master (00:47)
  • PDC Emulator (00:48)
  • Relative ID (RID) Master (00:57)
  • Infrastructure Master (02:00)
  • Transferring Master Roles (00:55)
  • Seize Master Role (01:13)
  • Locate/View the Master Roles (01:18)
  • Register schmgmt.dll (01:37)
  • How to Transfer Roles (02:59)
  • How to Seize Roles (03:46)
  • Summary (00:15)
Sites (22:30)
  • Introduction (00:34)
  • Examine Network Structure (04:02)
  • When Thinking About Sites (02:56)
  • Create a New Site (01:20)
  • Add Servers to a Site (00:31)
  • Create a New Subnet (01:21)
  • Inter-Site Transport Properties (01:10)
  • Delegate Control of Transport (01:22)
  • Create a Site Link Bridge (02:57)
  • Global Catalogs (02:17)
  • Reason to Create a Bridge (00:52)
  • Preferred Bridgehead Server (02:50)
  • Summary (00:13)
Name Res. / WINS / NetBIOS (33:55)
  • Introduction (00:27)
  • Name Resolution (02:47)
  • Characteristics (03:06)
  • Host Names (01:35)
  • Host Name Characteristics (03:12)
  • Resolve IP Address with Hosts File (09:14)
  • NetBIOS Names (00:45)
  • NetBIOS Characteristics (00:53)
  • WINS Server (03:56)
  • WINS Server Console (00:59)
  • LMHosts File (02:18)
  • Name Resolution Precedence (03:15)
  • NetBIOS Utility (00:36)
  • NetBIOS Local Broadcasts (00:32)
  • Summary (00:12)

Module 5

Client Resolver Cache/ipconfig (12:17)
  • Introduction (00:21)
  • Client Resolver Cache (01:40)
  • ipconfig / displaydns (03:12)
  • ipconfig / flushdns (00:25)
  • Resolver Cache Issues (06:23)
  • Summary (00:13)
Network Access (23:39)
  • Introduction (00:23)
  • Components (04:26)
  • Server (00:11)
  • Requirements (01:12)
  • Types of Clients (03:08)
  • Security (02:29)
  • Set Up Remote Access (01:16)
  • Manage Users Permissions (02:10)
  • Configure Routing/Remote (03:47)
  • Connect through VPN (02:05)
  • Connect as a Client (00:46)
  • Failed Connect Attempt (01:31)
  • Summary (00:09)
VPN / Wireless / Remote (29:05)
  • Introduction (00:25)
  • VPN Connection (00:35)
  • Connection Process (01:28)
  • Components (01:39)
  • Encryption Protocols (00:18)
  • Encryption Requirements (03:23)
  • Wireless (00:54)
  • Two Modes for Wireless (01:13)
  • Wireless Components (01:27)
  • Wireless Standards (02:21)
  • 802.1x Authentication (01:01)
  • Win XP Client Config Types (01:01)
  • Determine Auth Methods (01:23)
  • Dial-In Permissions (01:05)
  • Permissions (00:32)
  • Remote Access Policy (00:36)
  • Specify RA Policies (03:12)
  • Configure RA Logging (01:02)
  • Dial-In Permissions/Properties (02:44)
  • Raise Domain/Forest Levels (02:20)
  • Summary (00:15)

Module 6

Risk Management (16:16)
  • Introduction (00:27)
  • Assume Risk (02:59)
  • Risk as Positive Activity (01:00)
  • Identify Risks (01:56)
  • Continuously Assess Risks (00:45)
  • Be Proactive Not Reactive (00:47)
  • Determine Project Value (02:20)
  • MSF Risk Mgmt. Process (05:44)
  • Summary (00:15)
Requirements Documentation (12:25)
  • Introduction (00:29)
  • Documents Created/Used (01:40)
  • Vision (01:24)
  • Structure (01:30)
  • Risk Assessment (00:47)
  • Design (02:22)
  • Functional Specification (00:48)
  • Plan (01:33)
  • Schedule (01:35)
  • Summary (00:13)
Network Connectivity (32:37)
  • Introduction (00:22)
  • Connection Requirements (00:26)
  • Connection Methods: Local (04:07)
  • Connection Methods: Remote (01:44)
  • Connection Methods: Internet (02:48)
  • Security Concerns (04:59)
  • Types of Connections (05:13)
  • Global Network Connectivity (05:44)
  • Business Needs (06:51)
  • Summary (00:18)