Travis Tremblay completed the course NSAP-186: Administering Windows Server 2012 on 8/6/2015 as presented by New Horizons Computer Learning Centers. The certificate was signed by Keith Glass, the Director of Training for New Horizons.
Tim McAuliffe has successfully completed the LaserJet Hardware Basics course on 04-NOV-2015, as evidenced by this certificate of course completion. The certificate recognizes that Tim McAuliffe participated in a training program and gained knowledge related to basic hardware components and functions of LaserJet printers.
This document provides an overview of Module 4 which covers managing client access in Exchange Server. It discusses configuring the Client Access server role, Outlook Web App, and mobile messaging. Key topics include setting up the Client Access server, configuring Outlook Anywhere and Autodiscover, securing connections with certificates, and enabling Exchange ActiveSync on mobile devices. Hands-on demonstrations and labs are included to help administrators configure these client access services.
Travis Tremblay%2c 20410 Certificate of CompletionTravis Tremblay
Travis Tremblay completed a night class on Installing and Configuring Windows Server 2012 at New Horizons Computer Learning Centers on July 9, 2015. The course covered installing and configuring Windows Server 2012. Travis received a certificate of completion signed by the Director of Training, Keith Glass.
This document provides an overview of implementing failover clustering with Hyper-V in Windows Server 2012 and 2012 R2. It discusses options for making virtual machines highly available including host clustering and guest clustering. It also describes how failover clustering works with Hyper-V nodes, new features in Windows Server 2012 and 2012 R2, and best practices. The document outlines lessons on implementing virtual machines on failover clusters, virtual machine movement options like live migration and Hyper-V Replica, and managing virtual environments using VMM.
The document provides an overview of modules for implementing advanced network services, with a focus on lessons for configuring advanced DHCP and DNS features, and implementing IP Address Management (IPAM). The lessons cover topics such as DHCP components and failover, advanced DNS settings including DNSSEC, and using IPAM to manage IP addressing, address spaces, and monitor network resources.
This module discusses securing Windows servers using Group Policy Objects. It covers configuring security settings like templates, user rights, options and auditing. It also discusses restricting software using AppLocker and configuring the Windows Firewall. The lessons include demonstrations and labs on implementing these security configurations and restrictions.
This document provides an overview of implementing Group Policy in Microsoft's official course on the topic. It covers:
- Creating and managing Group Policy Objects (GPOs) to define configuration settings for users and computers. This includes creating a central store for administrative templates.
- How Group Policy processing works, including the order policies are applied and default GPOs.
- Tools for diagnosing Group Policy like Gpresult and the Group Policy Modeling Wizard.
- Concepts like GPO links, security filtering, Group Policy preferences, and delegating GPO management.
The lessons include demonstrations of creating and managing GPOs using the Group Policy Management Console and Windows PowerShell.
This document provides an overview of Module 10 which covers implementing file and print services in Microsoft Official Course. It includes lessons on securing files and folders with NTFS permissions, protecting shared files using shadow copies, configuring work folders, and configuring network printing. The module aims to help students secure files and folders, enable offline access to work files, and simplify printer management. It contains demonstrations and a lab exercise for hands-on practice of these topics.
Tim McAuliffe has successfully completed the LaserJet Hardware Basics course on 04-NOV-2015, as evidenced by this certificate of course completion. The certificate recognizes that Tim McAuliffe participated in a training program and gained knowledge related to basic hardware components and functions of LaserJet printers.
This document provides an overview of Module 4 which covers managing client access in Exchange Server. It discusses configuring the Client Access server role, Outlook Web App, and mobile messaging. Key topics include setting up the Client Access server, configuring Outlook Anywhere and Autodiscover, securing connections with certificates, and enabling Exchange ActiveSync on mobile devices. Hands-on demonstrations and labs are included to help administrators configure these client access services.
Travis Tremblay%2c 20410 Certificate of CompletionTravis Tremblay
Travis Tremblay completed a night class on Installing and Configuring Windows Server 2012 at New Horizons Computer Learning Centers on July 9, 2015. The course covered installing and configuring Windows Server 2012. Travis received a certificate of completion signed by the Director of Training, Keith Glass.
This document provides an overview of implementing failover clustering with Hyper-V in Windows Server 2012 and 2012 R2. It discusses options for making virtual machines highly available including host clustering and guest clustering. It also describes how failover clustering works with Hyper-V nodes, new features in Windows Server 2012 and 2012 R2, and best practices. The document outlines lessons on implementing virtual machines on failover clusters, virtual machine movement options like live migration and Hyper-V Replica, and managing virtual environments using VMM.
The document provides an overview of modules for implementing advanced network services, with a focus on lessons for configuring advanced DHCP and DNS features, and implementing IP Address Management (IPAM). The lessons cover topics such as DHCP components and failover, advanced DNS settings including DNSSEC, and using IPAM to manage IP addressing, address spaces, and monitor network resources.
This module discusses securing Windows servers using Group Policy Objects. It covers configuring security settings like templates, user rights, options and auditing. It also discusses restricting software using AppLocker and configuring the Windows Firewall. The lessons include demonstrations and labs on implementing these security configurations and restrictions.
This document provides an overview of implementing Group Policy in Microsoft's official course on the topic. It covers:
- Creating and managing Group Policy Objects (GPOs) to define configuration settings for users and computers. This includes creating a central store for administrative templates.
- How Group Policy processing works, including the order policies are applied and default GPOs.
- Tools for diagnosing Group Policy like Gpresult and the Group Policy Modeling Wizard.
- Concepts like GPO links, security filtering, Group Policy preferences, and delegating GPO management.
The lessons include demonstrations of creating and managing GPOs using the Group Policy Management Console and Windows PowerShell.
This document provides an overview of Module 10 which covers implementing file and print services in Microsoft Official Course. It includes lessons on securing files and folders with NTFS permissions, protecting shared files using shadow copies, configuring work folders, and configuring network printing. The module aims to help students secure files and folders, enable offline access to work files, and simplify printer management. It contains demonstrations and a lab exercise for hands-on practice of these topics.
This document is a module from a Microsoft course on implementing DNS. It covers name resolution, installing a DNS server, and managing DNS zones. The key topics discussed include:
- How clients and servers resolve names using DNS, including the roles of DNS servers, zones, and records.
- Installing the DNS server role, including creating zones and configuring forwarding.
- Managing DNS zones, including the types of zones, dynamic updates, and Active Directory-integrated zones.
- Troubleshooting name resolution issues using tools like DNSCmd and Windows PowerShell cmdlets.
- A lab scenario instructing students to configure a domain controller as a DNS server, create host records, and set
This module provides an overview of implementing local storage in Microsoft. It covers disk types and performance, direct attached storage (DAS), network attached storage (NAS), storage area networks (SANs), and RAID levels. It also discusses storage features in Windows Server 2012/2012 R2 like Storage Spaces, data deduplication, and iSCSI Target Server. The module demonstrates creating storage pools and virtual disks with Storage Spaces. It compares Storage Spaces to other solutions and has exercises for installing disks, resizing volumes, and configuring redundant storage.
This document provides an overview of a Microsoft course on automating Active Directory Domain Services (AD DS) administration. It discusses using command-line tools like CSVDE, LDIFDE, and DS commands to perform bulk AD DS operations. It also covers using Windows PowerShell cmdlets to manage AD DS objects like users, groups, computers, and organizational units. The document demonstrates querying objects, modifying objects in bulk, and using CSV files with PowerShell for bulk AD DS administration.
This document provides an overview of a Microsoft course module on implementing Dynamic Host Configuration Protocol (DHCP). It discusses topics such as installing the DHCP server role, configuring DHCP scopes and options, managing the DHCP database, securing DHCP, and monitoring DHCP. The module includes demonstrations and exercises for configuring a basic DHCP server infrastructure, including creating DHCP scopes, reservations, and using a DHCP relay agent. It aims to teach students how to implement, manage, secure, and troubleshoot a DHCP server to automate client IP configuration on a network.
The document outlines details of three Microsoft courses taken by James SampleNameHere on updating skills from older Exchange Server versions to Exchange Server 2010. The courses included Installing and Configuring Windows Server 2012 with Wes Anderson on June 5, 2015, Administering Windows Server 2012 with Wes Anderson on June 12, 2015, and Configuring Advanced Windows Server 2012 Services with Jim Garrett on June 19, 2015.
This document provides an overview of Module 7 which covers implementing Active Directory Rights Management Services (AD RMS). It discusses key components of an AD RMS infrastructure including the AD RMS server, client, and enabled applications. The document outlines deployment scenarios and how to configure an AD RMS cluster. It also covers creating rights policy templates, exclusion policies, and external access options like trusted user domains and Windows Live ID. Finally, it describes a lab scenario to implement AD RMS across the A. Datum and Trey Research networks to protect confidential research documents.
This document provides an overview of implementing IPv4, including:
- Lessons on TCP/IP protocols, IPv4 addressing, subnetting, and configuration/troubleshooting of IPv4
- Formatting IPv4 addresses using dotted decimal notation and relating this to binary numbers
- Classifying IPv4 addresses as private or public and examples of simple/complex IPv4 implementations
- Benefits of subnetting like segmenting traffic and techniques for calculating subnet/host addresses
- Tools for configuring and troubleshooting IPv4 like Windows PowerShell, Ping, Tracert, and Message Analyzer
This document provides an overview of the objectives covered in the Microsoft 70-411 exam for administering Windows Server 2012. It outlines 6 major topics that are evaluated, including deploying, managing and maintaining servers, configuring file and print services, configuring network services and access, configuring a Network Policy Server infrastructure, configuring and managing Active Directory, and configuring and managing Group Policy. Each topic is then broken down into specific objectives that candidates are expected to understand and demonstrate skills in to pass the exam.
This document provides an overview and outline of a Microsoft course on installing and configuring Windows Server 2012. It introduces the instructor and facilities, describes the audience and prerequisites for the course, outlines the course modules, and discusses Microsoft certification opportunities. The course will use virtual machines to guide students through hands-on labs configuring a Windows Server 2012 infrastructure for a fictitious company.
This document provides an overview of Module 2 which covers implementing advanced file services in Windows Server 2012. It includes lessons on configuring iSCSI storage, BranchCache, and optimizing storage usage. The first lesson explains what iSCSI is and how to configure an iSCSI target and initiator. It also covers implementing high availability, security, and demonstrations of configuring an iSCSI target and connecting to iSCSI storage. The second lesson covers how BranchCache works and requirements for the different modes. It includes demonstrations of configuring BranchCache server and client settings. The third lesson explains features for optimizing storage like File Server Resource Manager (FSRM), file classification, data deduplication, and tiered storage.
This document provides an overview of implementing IPv6 and includes the following key points:
- IPv6 was developed to address the shortage of IPv4 addresses and includes improvements like larger address space, better support for mobility and security.
- IPv6 addresses are 128-bit and are written in hexadecimal separated by colons. They can be autoconfigured or assigned through DHCPv6.
- Transition technologies like ISATAP, 6to4 and Teredo allow IPv6 to communicate over IPv4 networks during the transition period.
- DNS records need to be updated to support name resolution for both IPv4 and IPv6 addresses during coexistence.
This document provides an overview of implementing business continuity and disaster recovery through data protection strategies. It discusses identifying recovery requirements, service level agreements, enterprise data protection strategies, mitigation strategies, and best practices. It also covers implementing Windows Server Backup, including backup types, technologies, capacity and security planning, configuration, and restoration of files and servers. Considerations for enterprise backup solutions and Data Protection Manager are also reviewed.
1. The document discusses implementing Active Directory Domain Services (AD DS) sites and replication, including configuring AD DS sites, site links, and intersite replication.
2. It describes tools for monitoring AD DS replication such as Repadmin and Dcdiag and best practices for deploying read-only domain controllers.
3. The lab scenario involves optimizing AD DS replication between a London HQ site and branch office sites in Toronto and a test site to address slow sign-ins and resource access.
This document provides an overview of implementing failover clustering in Windows Server 2012. It discusses key concepts of failover clustering including high availability, cluster components, quorum, and storage. It also describes how to validate and configure a failover cluster, including hardware, software, and network requirements. Finally, it discusses configuring applications and services on a failover cluster through clustering roles and managing cluster resources.
This document provides an overview of server virtualization using Hyper-V. It discusses the benefits of server virtualization and describes Hyper-V's key features. The document is divided into lessons that cover virtualization technologies, implementing Hyper-V, managing virtual machine storage and networks. It provides details on configuring and managing virtual switches, storage, and other Hyper-V components. The document concludes with a lab scenario to practice virtualization skills learned.
This document provides an overview of a Microsoft course module on managing Active Directory Domain Services objects. The module includes lessons on managing user accounts, groups, computer accounts, and delegating administration. It demonstrates how to perform tasks like creating users and groups, managing computer objects, and delegating administrative permissions to organizational units. The goal is to prepare students to configure Active Directory infrastructure for a new branch office by creating and managing required objects and delegating permissions.
This module provides an overview of implementing and administering Active Directory Federation Services (AD FS) in Windows Server 2012. It covers deploying AD FS in a single organization for single sign-on as well as in business-to-business federation scenarios. It also discusses extending AD FS to external clients using Web Application Proxy and Workplace Join. The lessons demonstrate configuring AD FS trusts, claims, and rules. Labs provide hands-on practice deploying and configuring AD FS for internal and external access to applications.
This document is a module from a Microsoft course on implementing DNS. It covers name resolution, installing a DNS server, and managing DNS zones. The key topics discussed include:
- How clients and servers resolve names using DNS, including the roles of DNS servers, zones, and records.
- Installing the DNS server role, including creating zones and configuring forwarding.
- Managing DNS zones, including the types of zones, dynamic updates, and Active Directory-integrated zones.
- Troubleshooting name resolution issues using tools like DNSCmd and Windows PowerShell cmdlets.
- A lab scenario instructing students to configure a domain controller as a DNS server, create host records, and set
This module provides an overview of implementing local storage in Microsoft. It covers disk types and performance, direct attached storage (DAS), network attached storage (NAS), storage area networks (SANs), and RAID levels. It also discusses storage features in Windows Server 2012/2012 R2 like Storage Spaces, data deduplication, and iSCSI Target Server. The module demonstrates creating storage pools and virtual disks with Storage Spaces. It compares Storage Spaces to other solutions and has exercises for installing disks, resizing volumes, and configuring redundant storage.
This document provides an overview of a Microsoft course on automating Active Directory Domain Services (AD DS) administration. It discusses using command-line tools like CSVDE, LDIFDE, and DS commands to perform bulk AD DS operations. It also covers using Windows PowerShell cmdlets to manage AD DS objects like users, groups, computers, and organizational units. The document demonstrates querying objects, modifying objects in bulk, and using CSV files with PowerShell for bulk AD DS administration.
This document provides an overview of a Microsoft course module on implementing Dynamic Host Configuration Protocol (DHCP). It discusses topics such as installing the DHCP server role, configuring DHCP scopes and options, managing the DHCP database, securing DHCP, and monitoring DHCP. The module includes demonstrations and exercises for configuring a basic DHCP server infrastructure, including creating DHCP scopes, reservations, and using a DHCP relay agent. It aims to teach students how to implement, manage, secure, and troubleshoot a DHCP server to automate client IP configuration on a network.
The document outlines details of three Microsoft courses taken by James SampleNameHere on updating skills from older Exchange Server versions to Exchange Server 2010. The courses included Installing and Configuring Windows Server 2012 with Wes Anderson on June 5, 2015, Administering Windows Server 2012 with Wes Anderson on June 12, 2015, and Configuring Advanced Windows Server 2012 Services with Jim Garrett on June 19, 2015.
This document provides an overview of Module 7 which covers implementing Active Directory Rights Management Services (AD RMS). It discusses key components of an AD RMS infrastructure including the AD RMS server, client, and enabled applications. The document outlines deployment scenarios and how to configure an AD RMS cluster. It also covers creating rights policy templates, exclusion policies, and external access options like trusted user domains and Windows Live ID. Finally, it describes a lab scenario to implement AD RMS across the A. Datum and Trey Research networks to protect confidential research documents.
This document provides an overview of implementing IPv4, including:
- Lessons on TCP/IP protocols, IPv4 addressing, subnetting, and configuration/troubleshooting of IPv4
- Formatting IPv4 addresses using dotted decimal notation and relating this to binary numbers
- Classifying IPv4 addresses as private or public and examples of simple/complex IPv4 implementations
- Benefits of subnetting like segmenting traffic and techniques for calculating subnet/host addresses
- Tools for configuring and troubleshooting IPv4 like Windows PowerShell, Ping, Tracert, and Message Analyzer
This document provides an overview of the objectives covered in the Microsoft 70-411 exam for administering Windows Server 2012. It outlines 6 major topics that are evaluated, including deploying, managing and maintaining servers, configuring file and print services, configuring network services and access, configuring a Network Policy Server infrastructure, configuring and managing Active Directory, and configuring and managing Group Policy. Each topic is then broken down into specific objectives that candidates are expected to understand and demonstrate skills in to pass the exam.
This document provides an overview and outline of a Microsoft course on installing and configuring Windows Server 2012. It introduces the instructor and facilities, describes the audience and prerequisites for the course, outlines the course modules, and discusses Microsoft certification opportunities. The course will use virtual machines to guide students through hands-on labs configuring a Windows Server 2012 infrastructure for a fictitious company.
This document provides an overview of Module 2 which covers implementing advanced file services in Windows Server 2012. It includes lessons on configuring iSCSI storage, BranchCache, and optimizing storage usage. The first lesson explains what iSCSI is and how to configure an iSCSI target and initiator. It also covers implementing high availability, security, and demonstrations of configuring an iSCSI target and connecting to iSCSI storage. The second lesson covers how BranchCache works and requirements for the different modes. It includes demonstrations of configuring BranchCache server and client settings. The third lesson explains features for optimizing storage like File Server Resource Manager (FSRM), file classification, data deduplication, and tiered storage.
This document provides an overview of implementing IPv6 and includes the following key points:
- IPv6 was developed to address the shortage of IPv4 addresses and includes improvements like larger address space, better support for mobility and security.
- IPv6 addresses are 128-bit and are written in hexadecimal separated by colons. They can be autoconfigured or assigned through DHCPv6.
- Transition technologies like ISATAP, 6to4 and Teredo allow IPv6 to communicate over IPv4 networks during the transition period.
- DNS records need to be updated to support name resolution for both IPv4 and IPv6 addresses during coexistence.
This document provides an overview of implementing business continuity and disaster recovery through data protection strategies. It discusses identifying recovery requirements, service level agreements, enterprise data protection strategies, mitigation strategies, and best practices. It also covers implementing Windows Server Backup, including backup types, technologies, capacity and security planning, configuration, and restoration of files and servers. Considerations for enterprise backup solutions and Data Protection Manager are also reviewed.
1. The document discusses implementing Active Directory Domain Services (AD DS) sites and replication, including configuring AD DS sites, site links, and intersite replication.
2. It describes tools for monitoring AD DS replication such as Repadmin and Dcdiag and best practices for deploying read-only domain controllers.
3. The lab scenario involves optimizing AD DS replication between a London HQ site and branch office sites in Toronto and a test site to address slow sign-ins and resource access.
This document provides an overview of implementing failover clustering in Windows Server 2012. It discusses key concepts of failover clustering including high availability, cluster components, quorum, and storage. It also describes how to validate and configure a failover cluster, including hardware, software, and network requirements. Finally, it discusses configuring applications and services on a failover cluster through clustering roles and managing cluster resources.
This document provides an overview of server virtualization using Hyper-V. It discusses the benefits of server virtualization and describes Hyper-V's key features. The document is divided into lessons that cover virtualization technologies, implementing Hyper-V, managing virtual machine storage and networks. It provides details on configuring and managing virtual switches, storage, and other Hyper-V components. The document concludes with a lab scenario to practice virtualization skills learned.
This document provides an overview of a Microsoft course module on managing Active Directory Domain Services objects. The module includes lessons on managing user accounts, groups, computer accounts, and delegating administration. It demonstrates how to perform tasks like creating users and groups, managing computer objects, and delegating administrative permissions to organizational units. The goal is to prepare students to configure Active Directory infrastructure for a new branch office by creating and managing required objects and delegating permissions.
This module provides an overview of implementing and administering Active Directory Federation Services (AD FS) in Windows Server 2012. It covers deploying AD FS in a single organization for single sign-on as well as in business-to-business federation scenarios. It also discusses extending AD FS to external clients using Web Application Proxy and Workplace Join. The lessons demonstrate configuring AD FS trusts, claims, and rules. Labs provide hands-on practice deploying and configuring AD FS for internal and external access to applications.
1. Travis Tremblay
NSAP-186: 20411 Administering Windows Server 2012
8/6/2015
Has successfully completed the course
Presented by
New Horizons Computer Learning Centers
Date Director of Training: Keith Glass