College of Information and Communication Technologies

College of ICT

University of Dar Es Salaam


Microsoft Server 2012R2 Installing and Configuring Featured

Event Details:

  • Date: - -
  • Venue: Kijitonyama Campus
  • Cost: TZS 750,000/=
  • Register

The Installing and Configuring Windows Server 2012 R2 training course that provide the skills and knowledge necessary to implement a core Windows Server 2012 infrastructure in an existing enterprise environment include implementing, managing, maintaining, and provisioning services and infrastructure in a Windows Server 2012 environment also this course primarily covers the initial implementation and configuration of those core services, such as Active Directory Domain Services (AD DS), networking services, and Hyper-V configuration.

Install and Deploying Windows Server 2012

  • Introduction
  • Installing Windows Server 2012
  • Post-Installation Configuration of Windows Server 2012
  • Windows PowerShell

Configure and Manage Active Directory

  • Introduction
  • Installing a Domain Controllers
  • Managing User Accounts
  • Managing Groups Accounts
  • Managing Computer Accounts
  • Managing Organizational Groups
  • Delegating Administration
  • Using Command-Line Tools for Administration
  • Using Windows PowerShell for Administration
  • Performing Bulk Operations with Windows PowerShell

Implementing IPv4 and IPv6

  • TCP/IP
  • IPv4 Addressing
  • Subnettingand Supernetting
  • Configuring and Troubleshooting IPv4
  • IPv6 Addressing
  • Coexistence with IPv4
  • IPv6 Transition Technologies

Introduction DHCP

  • Installing a DHCP Server Role
  • Configuring DHCP Scopes
  • Managing a DHCP Database
  • Securing and Monitoring DHCP

Introduction DNS

  • Name Resolution for Windows Client and Servers
  • Installing and Managinga DNS Server
  • ManagingDNS Zones

File and Storage Solutions

  • Introduction
  • Configure and Optimize Storage
  • Configure Advanced File Services
  • Implement Dynamic Access Control

Implementing File and Print Services

  • Securing Files and Folders
  • Protecting File Shares with Shadow Copies
  • Configuring Network Printing
  • Securing Files and Folders
  • Protecting File Shares with Shadow Copies
  • Configuring Network Printing