Foothill CollegeApproved Course Outlines

Physical Sciences, Mathematics & Engineering Division
C S 60AINSTALLING & CONFIGURING WINDOWS SERVER 2012Winter 2014
4 hours lecture, 3 hours laboratory.5 Units

Total Quarter Learning Hours: 84 (Total of All Lecture, Lecture/Lab, and Lab hours X 12)
 
 Lecture Hours: 4 Lab Hours: 3 Lecture/Lab:
 Note: If Lab hours are specified, see item 10. Lab Content below.

Repeatability -
Statement: Not Repeatable.

Status -
 Course Status: ActiveGrading: Letter Grade with P/NP option
 Degree Status: ApplicableCredit Status: Credit
 Degree or Certificate Requirement: AS Degree
 GE Status: Non-GE

Articulation Office Information -
 Transferability: CSUValidation: 12/3/12

1. Description -
Introduction to installing, configuring and troubleshooting Windows Server 2012 in an enterprise. It provides both lecture and laboratory exercises to enable the student to (1) plan and build a scalable Active Directory infrastructure, (2) Configure folder security, file filtering and disaster recovery backups, (3) Administer and maintain servers with graphical and PowerShell tools, (4) Set up servers with Group Policies and delegate administrative tasks, and (5)Virtualize servers with Hyper-V and build fault tolerant replica servers.
Prerequisite: None
Co-requisite: None
Advisory: C S 50A.

2. Course Objectives -
The student will be able to:
  1. Install and configure Windows Server 2012
  2. Describe Active Directory Domain Services
  3. Manage Active Directory Domain Services objects
  4. Automate Active Directory Domain Services administration
  5. Discuss IPv4
  6. Use DHCP to manage IPv4 address
  7. Use DNS to establish a name resolution infrastructure
  8. Compare IPv4 and IPv6
  9. Implement local storage
  10. Compare file and printer sharing
  11. Implement Group Policy
  12. Use Group Policy objects to secure Windows servers
  13. Deploy server virtualization with Hyper-V
3. Special Facilities and/or Equipment -
Computer laboratory with Servers to support Microsoft Virtual Machines
Website or course management system with an assignment posting component (through which all lab assignments are to be submitted) and a forum component (where students can discuss course material and receive help from the instructor). This applies to all sections, including on-campus (i.e., face-to-face) offerings.
When taught via Foothill Global Access, a fully functional and maintained course management system through which the instructor and students can interact.
When taught via Foothill Global Access, students must have currently existing e-mail accounts and ongoing access to computers with internet capabilities.

4. Course Content (Body of knowledge) -
  1. Deploying and Managing Windows Server 2012
    1. Windows Server 2012 Overview
      1. On Premises Servers
      2. What Is Cloud Computing?
      3. Options for Windows Server 2012
      4. What Is Server Core?
      5. Windows Server 2012 Roles
    2. What Are the Features of Windows Server 2012?
      1. installation Methods
      2. Installation Types
      3. Hardware Requirements for Windows Server 2012
      4. Installing Windows Server 2012
    3. Overview of Windows Server 2012 Management
      1. Overview of Post-Installation Configuration
      2. Configuring Server Network Settings
      3. How to Join the Domain
      4. Performing Offline Domain Join
      5. Activating Windows Server 2012
      6. Configuring a Server Core Installation
    4. Installing Windows Server 2012
      1. What Is Windows PowerShell?
      2. Windows PowerShell Cmdlet Syntax
      3. Common Cmdlets for Server Administration
      4. What Is Windows PowerShell ISE?
      5. Demonstration: Using Windows PowerShell ISE
      6. Demonstration: Using Windows PowerShell
      7. Post-Installation Configuration of Windows Server 2012
    5. Introduction to Windows PowerShell
      1. What Is Windows PowerShell?
      2. Windows PowerShell Cmdlet Syntax
      3. Common Cmdlets for Server Administration
      4. What Is Windows PowerShell ISE?
      5. Demonstration: Using Windows PowerShell ISE
      6. Demonstration: Using Windows PowerShell
  2. Introduction to Active Directory Domain Services
    1. Overview of Active Directory Domain Services (AD DS)
      1. Overview of AD DS
      2. AD DS Domains
      3. What are OUs?
      4. What Is an AD DS Forest?
      5. What Is the AD DS Schema?
    2. Overview of Domain Controllers
      1. What Is a Domain Controller?
      2. What Is the Global Catalog?
      3. The AD DS Logon Process
      4. Demonstration: Viewing the SRV Records in DNS
      5. What Are Operations Masters?
    3. Installing a Domain Controller
      1. Installing a Domain Controller by Using a GUI
      2. Installing a Domain Controller on a Server Core Installation of Windows Server 2012
      3. Upgrading a Domain Controller
      4. Installing a Domain Controller by Using IFM
  3. Managing Active Directory Domain Services Objects
    1. Managing User Accounts
      1. AD DS Administration Tools
      2. Creating User Accounts
      3. Configuring User Account Attributes
      4. Creating User Profiles
      5. Creating User Accounts with User Account Templates
      6. Demonstration: Managing User Accounts by Using Active Directory Users and Computers
    2. Managing Group Account
      1. Group Types
      2. Group Scopes
      3. Implementing Group Management
      4. Default Groups and Special Identities
      5. Demonstration: Managing Groups
    3. Managing Computer Accounts
      1. What Is the Computers Container?
      2. Specifying the Location of Computer Accounts
      3. Controlling Permissions to Create Computer Accounts
      4. Computer Accounts and Secure Channels
      5. Resetting the Secure Channel
    4. elegating Administration
      1. AD DS Permissions
      2. Effective AD DS Permissions
      3. Demonstration: Delegating Administrative Control
  4. Automating Active Directory Domain Services Administration
    1. Using Command-line Tools for Administration
      1. Benefits of Using Command-Line Tools for Administration
      2. What Is Csvde?
      3. What Is Ldifde?
      4. What Are DS Commands?
    2. Using Windows PowerShell for Administration
      1. Using Windows PowerShell Cmdlets to Manage Users
      2. Using Windows PowerShell Cmdlets to Manage Groups
      3. Using Windows PowerShell Cmdlets to Manage Computer Accounts
      4. Using Windows PowerShell Cmdlets to Manage OUs
    3. Performing Bulk Operations with Windows PowerShell
      1. What Are Bulk Operations?
      2. Demonstration: Using Graphical Tools to Perform Bulk Operations
      3. Querying Objects with Windows PowerShell
      4. Modifying Objects with Windows PowerShell
      5. Working with CSV Files
      6. Demonstration: Performing Bulk Operations with Windows PowerShell
  5. Implementing IPv4
    1. Overview of TCP/IP
      1. The TCP/IP Protocol Suite
      2. Protocols in the TCP/IP Suite
      3. TCP/IP Applications
      4. What Is a Socket?
    2. Understanding IPv4 Addressing
      1. The TCP/IP Protocol Suite
      2. Protocols in the TCP/IP Suite
      3. TCP/IP Applications
      4. What Is a Socket?
    3. Subnetting and Supernetting
      1. How Bits Are Used in a Subnet Mask
      2. The Benefits of Using Subnetting
      3. Calculating Subnet Addresses
      4. Calculating Host Addresses
      5. Discussion: Creating a Subnetting Scheme for a New Office
      6. What Is Supernetting?
    4. Configuring and Troubleshooting IPv4
      1. Configuring IPv4 Manually
      2. Configuring IPv4 Automatically
      3. IPv4 Troubleshooting Tools
      4. The Troubleshooting Process
      5. What Is Network Monitor?
      6. Demonstration: How to Capture and Analyze Network Traffic by Using Network Monitor
  6. Implementing DHCP
    1. Installing a DHCP Server Role
      1. Benefits of Using DHCP
      2. How DHCP Allocates IP Addresses
      3. How DHCP Lease Generation Works
      4. How DHCP Lease Renewal Works
      5. What Is a DHCP Relay Agent
      6. DHCP Server Authorization
      7. Demonstration: Adding the DHCP Server Role
    2. Configuring DHCP Scopes
      1. What Are DHCP Scopes?
      2. What Is a DHCP Reservation?
      3. What Are DHCP Options?
      4. How Are DHCP Options Applied?
      5. Demonstration: Creating and Configuring a DHCP Scope
    3. Managing a DHCP Database
      1. Preventing an Unauthorized Computer from Obtaining a Lease
      2. Restricting Unauthorized, Non–Microsoft DHCP Servers from Leasing IP Addresses
      3. Delegating DHCP Administration
      4. What Are DHCP Statistics?
      5. What Is DHCP Audit Logging?
      6. Discussion: Common DHCP Issues
    4. Securing and Monitoring DHCP
  7. Implementing DNS
    1. Name Resolution for Windows Clients and Servers
      1. What Are Computer Names?
      2. What Is DNS?
      3. DNS Zones and Records
      4. How Internet DNS Names Are Resolved
      5. What Is Link-Local Multicast Name Resolution?
      6. How a Client Resolves a Name
      7. Troubleshooting Name Resolution
    2. Installing and Managing a DNS Server
      1. What Are the Components of a DNS Solution?
      2. What Are Root Hints?
      3. What Are DNS Queries?
      4. What Is Forwarding?
      5. How DNS Server Caching Works
      6. How to Install the DNS Server Role
      7. Demonstration: Installing the DNS Server Role
    3. Managing DNS Zones
      1. What Are DNS Zone Types?
      2. What Are Dynamic Updates?
      3. What Are Active Directory-Integrated Zones?
      4. Demonstration: Creating an Active Directory–Integrated Zone
  8. Implementing IPv6
    1. Overview of IPv6
      1. Benefits of IPv6
      2. Differences Between IPv4 and IPv6
      3. IPv6 Address Space
    2. IPv6 Addressing
      1. IPv6 Prefixes
      2. Unicast IPv6 Address Types
      3. Zone IDs
      4. Address Autoconfiguration for IPv6
      5. Demonstration: Configuring IPv6 Client Settings
    3. Coexistence with IPv4
      1. What Are Node Types?
      2. IPv4 and IPv6 Coexistence
      3. Demonstration: Configuring DNS to Support IPv6
      4. What Is IPv6 Over IPv4 Tunneling?
    4. IPv6 Transition Technologies
      1. What Is ISATAP?
      2. What Is 6to4?
      3. What Is Teredo?
      4. What Is PortProxy?
      5. Process for Transitioning to IPv6–Only
  9. Implementing Local Storage
    1. Overview of Storage
      1. Disk Types and Performance
      2. What Is Direct Attached Storage?
      3. What Is Network Attached Storage?
      4. What Is a SAN?
      5. What Is RAID?
      6. RAID Levels
    2. Managing Disks and Volumes
      1. Selecting a Partition Table Format
      2. Selecting a Disk Type
      3. Selecting a File System
      4. What Is a Resilient File System?
      5. What Are Mount Points and Links?
      6. Demonstration: Creating Mount Points and Links
      7. Extending and Shrinking Volumes
    3. Implementing Storage Spaces
      1. What Is the Storage Spaces Feature?
      2. Virtual Disk Configuration Options
      3. Advanced Management Options for Storage Spaces
      4. Demonstration: Configuring Storage Spaces
  10. Implementing File and Print Services
    1. Securing Files and Folders
      1. What Are NTFS Permissions?
      2. What Are Shared Folders?
      3. Permissions Inheritance
      4. Effective Permissions
      5. What Is Access-Based Enumeration?
      6. What Are Offline Files?
      7. Demonstration: Creating and Configuring a Shared Folder
    2. Protecting Shared Files and Folders using Shadow Copies
      1. What Are Shadow Copies?
      2. Considerations for Scheduling Shadow Copies
      3. Restoring Data from a Shadow Copy
      4. Demonstration: Restoring Data from a Shadow Copy
    3. Configuring Network Printing
      1. Benefits of Network Printing
      2. What Is Enhanced Point and Print?
      3. Security Options for Network Printing
      4. Demonstration: Creating Multiple Configurations for a Print Device
      5. What Is Printer Pooling?
      6. What Is Branch Office Direct Printing?
      7. Deploying Printers to Clients
  11. Implementing Group Policy
    1. Overview of Group Policy
      1. Components of Group Policy
      2. What Are Multiple Local GPOs?
      3. Storage of Domain GPOs
      4. What Are Group Policies and Preferences?
      5. What Are Starter GPOs?
      6. Delegating Management of GPOs
      7. Demonstration: Creating and Managing GPOs
    2. Group Policy Processing
      1. GPO Links
      2. Applying GPOs
      3. Group Policy Processing Order
      4. What Are the Default GPOs?
      5. GPO Security Filtering
      6. Discussion: Identifying Group Policy Application
      7. Demonstration: Using Group Policy Diagnostic Tools
    3. Implementing a Central Store for Administrative Templates
      1. What Is the Central Store?
      2. What Are Administrative Templates?
      3. How Administrative Templates Work
      4. Managed and Unmanaged Policy Settings
  12. Securing Windows Servers Using Group Policy Objects
    1. Windows Security Overview
      1. Discussion: Identifying Security Risks and Costs
      2. Applying Defense-In-Depth to Increase Security
      3. Best Practices for Increasing Security
    2. Configuring Security Settings
      1. Configuring Security Templates
      2. Configuring User Rights
      3. Configuring Security Options
      4. Configuring User Account Control
      5. Configuring Auditing
      6. Configuring Restricted Groups
      7. Configuring Account Policy Settings
    3. Restricting Software
      1. What Are Software Restriction Policies?
      2. What Is AppLocker?
      3. AppLocker Rules
      4. Demonstration: Creating AppLocker Rules
    4. Configuring Windows Firewall with Advanced Security
      1. What Is Windows Firewall with Advanced Security?
      2. Discussion: Why Is a Host-Based Firewall Important?
      3. Firewall Profiles
      4. Connection Security Rules
      5. Deploying Firewall Rules
  13. Implementing Server Virtualization with Hyper-V
    1. Overview of Virtualization Technologies
      1. Server Virtualization with Hyper-V
      2. What Is Windows Azure?
      3. Desktop Virtualization
      4. Presentation Virtualization
      5. Application Virtualization
    2. Implementing Hyper-V
      1. About Hyper-V
      2. Hardware Requirements for Hyper-V
      3. Virtual Machine Hardware
      4. Configuring Dynamic Memory
      5. Configuring Virtual Machine Integration Services
      6. Configuring Virtual Machine Start and Stop Actions
      7. Hyper-V Resource Metering
    3. Managing Virtual Machine Storage
      1. About Hyper-V
      2. Hardware Requirements for Hyper-V
      3. Virtual Machine Hardware
      4. Configuring Dynamic Memory
      5. Configuring Virtual Machine Integration Services
      6. Configuring Virtual Machine Start and Stop Actions
      7. Hyper-V Resource Metering
    4. Managing Virtual Networks
      1. What Is a Virtual Switch?
      2. Hyper-V Network Virtualization
      3. Managing Virtual Machine MAC Addresses
      4. Configuring Virtual Network Adapters
5. Repeatability - Moved to header area.
 
6. Methods of Evaluation -
  1. Tests and quizzes
  2. Written laboratory assignments which include configuration specifications, sample runs and documentation.
  3. Final examination
7. Representative Text(s) -
Reimer, Stan. Microsoft Official Curriculum 20410A Installing and Configuring Windows Server® 2012. Redmond, WA: Microsoft Corporation, 2012

8. Disciplines -
Computer Science
 
9. Method of Instruction -
  1. Lectures which include motivation for the architecture Desktop Virtualization platforms
  2. On-line labs (for all sections, including those meeting face-to-face/on campus) consisting of
    1. A programming assignment web-page located on a college-hosted course management system or other department-approved Internet environment. Here, the students will review the specification of each lab assignment and submit their completed lab work.
    2. A discussion web-page located on a college hosted course management system or other department-approved Internet environment. Here, students can request assistance from the instructor and interact publically with other class members.
  3. In person or on-line discussion which engages students and instructor in an ongoing dialog pertaining to all aspects of designing, implementing and analyzing programs.
  4. When course is taught fully on-line:
    1. Instructor-authored lecture materials, handouts, syllabus, assignments, tests, and other relevant course material will be delivered through a college hosted course management system or other department-approved Internet environment.
    2. Additional instructional guidelines for this course are listed in the attached addendum of CS department on-line practices.
 
10. Lab Content -
  1. Deploying and Managing Windows Server 2012
    1. Deploying Windows Server 2012
    2. Configuring Windows Server 2012 Server Core
    3. Managing Servers
    4. Using Windows PowerShell to Manage Servers
  2. Installing Active Directory Domain Controllers
    1. Installing a Domain Controller
    2. Installing a domain controller by using IFM
  3. Managing Active Directory Domain Services Object
    1. Delegating Administration for a Branch Office
    2. Creating and Configuring User Accounts in AD DS
    3. Managing Computer Objects in AD DS
  4. Automating AD DS Administration by Using Windows PowerShell
    1. Creating User Accounts and Groups by Using Windows PowerShell
    2. Using Windows PowerShell to Create User Accounts in Bulk
    3. Using Windows PowerShell to Modify User Accounts in Bulk
  5. Implementing IPv4
    1. Identifying Appropriate Subnets
    2. Troubleshooting IPv4
  6. Implementing DHCP
    1. Identifying Appropriate Subnets
    2. Troubleshooting IPv4
  7. Implementing DNS
    1. Implementing DHCP with a single broadcast domain
    2. Implementing a DHCP Relay (Optional Exercise)
  8. Implementing IPv6
    1. Installing and Configuring DNS
    2. Creating Host Records in DNS
    3. Managing the DNS Server Cache
  9. Implementing Local Storage
    1. Configuring an IPv6 Network
    2. Configuring an ISATAP Router
  10. Implementing File and Print Services
    1. Creating and Configuring a File Share
    2. Configuring Shadow Copies
    3. Creating and Configuring a Printer Pool
  11. Implementing Group Policy
    1. Configuring a Central Store
    2. Creating GPOs
  12. Configuring AppLocker and Windows Firewall
    1. Configuring AppLocker® Policies
    2. Configuring Windows Firewall
  13. Implementing Server Virtualization with Hyper-V
    1. Installing the Hyper-V Server Role
    2. Configuring Virtual Networking
    3. Creating and Configuring a Virtual Machine
    4. Using Virtual Machine Snapshots
 
11. Honors Description - No longer used. Integrated into main description section.
 
12. Types and/or Examples of Required Reading, Writing and Outside of Class Assignments -
  1. Reading
    1. Textbook assigned reading averaging 50 pages per week.
    2. On-line resources as directed by instructor though links pertinent to networking.
    3. Library and reference material directed by instructor through course handouts.
  2. Writing
    1. Technical prose documentation that supports and describes the laboratory exercises that are submitted for a grade.
13. Need/Justification -
This course is a restricted support course for the A.S. degree in Enterprise Networking.


Course status: Active
Last updated: 2014-03-11 14:25:18


Foothill CollegeApproved Course Outlines