World’s #1 Online Bootcamp

Course Overview

Training Options

Corporate Training

Customized to your team's needs

  • Blended learning delivery model (self-paced eLearning and/or instructor-led options)
  • Flexible pricing options
  • Enterprise grade Learning Management System (LMS)
  • Enterprise dashboards for individuals and teams
  • 24x7 learner assistance and support

Course Curriculum

Course Content

  • Designing and Implementing a Server Infrastructure - 70-413

    Preview
    • Lesson 00 - Course Overview

      04:24Preview
      • 0.1 Course Overview
        00:21
      • 0.2 Before you start
        00:08
      • 0.3 Objectives
        00:38
      • 0.4 About the Course
        00:43
      • 0.5 About the Course (contd.)
        00:22
      • 0.6 Value of this course
        00:26
      • 0.7 Lessons covered
        00:15
      • 0.8 Exam Question Types
        00:21
      • 0.9 Designing and Implementing a Server Infrastructure Certification
        00:51
      • 0.010 Sources of Information
        00:14
      • 0.011 Conclusion
        00:05
    • Lesson 01 - Server Infrastructure Setup, Migration, and Upgrades

      25:32Preview
      • 1.1 Server Infrastructure Setup, Migration, and Upgrades
        00:28
      • 1.2 Objectives
        00:42
      • 1.3 Introducing Windows Server 2012 R2
        00:09
      • 1.4 Windows Server 2012
        00:41
      • 1.5 Windows Server 2012 R2
        00:48
      • 1.6 Windows Server 2012 R2 Editions
        01:42
      • 1.7 New Features of Windows Server 2012
      • 1.8 New Features of Windows Server 2012 (Contd.)
        00:19
      • 1.9 New Features of Windows Server 2012 R2 (Contd.)
      • 1.10 Physical and Logical Infrastructure
        00:12
      • 1.11 Physical Server Infrastructure
        01:33
      • 1.12 Logical Server Infrastructure
        01:34
      • 1.13 Scaling Up vs. Scaling Out
        01:39
      • 1.14 Upgrade vs. Migration
        00:12
      • 1.15 Upgrade vs. Migration
        01:54
      • 1.16 Planning an Upgrade
        01:08
      • 1.17 Planning a Migration
        01:10
      • 1.18 Using the MAP Toolkit
        00:10
      • 1.19 Introducing the MAP Toolkit
        00:40
      • 1.20 Installing MAP Toolkit
        00:12
      • 1.21 Installing MAP Toolkit Demo 01
        01:00
      • 1.22 Running the Map Analysis
        01:02
      • 1.23 Running an Analysis using the MAP Toolkit
        00:10
      • 1.24 Running an Analysis using the MAP Toolkit. Demo 02
        02:45
      • 1.25 Analysis Results
        01:22
      • 1.26 Excel Report Sample
        01:07
      • 1.27 Viewing the results
        00:11
      • 1.28 Viewing the results Demo 03
        01:55
      • 1.29 Quiz
      • 1.30 Summary
        00:39
      • 1.31 Conclusion
        00:08
    • Lesson 02 - Deployment Strategies for Operating Systems

      25:54Preview
      • 2.1 Deployment Strategies for Operating Systems
        00:19
      • 2.2 Objectives
        00:32
      • 2.3 Planning Deployment Strategies
        00:16
      • 2.4 Deployment Planning
        01:11
      • 2.5 Methods of Deployment
        01:51
      • 2.6 Architecture
        01:19
      • 2.7 Deployment Files WIM Vs. VHDX
        00:06
      • 2.8 OS Imaging
        00:51
      • 2.9 Image Formats
        01:30
      • 2.10 WIM Images
        01:16
      • 2.11 Introduction to WDS
        00:12
      • 2.12 Windows Deployment Service
        00:38
      • 2.13 WDS Components
        01:07
      • 2.14 Planning a WDS-Based Deployment
        00:11
      • 2.15 Getting WDS Ready
        01:14
      • 2.16 Installing and Configuring WDS
        00:11
      • 2.17 Installing and Configuring WDS Demo 01
        03:57
      • 2.18 Unicast Vs. Multicast
        00:52
      • 2.19 Capturing the Image for Deployment
        00:07
      • 2.20 Capturing the Image for Deployment Demo 02
        03:31
      • 2.21 Implementing WDS
        00:09
      • 2.22 Processing the Deployment
        01:16
      • 2.23 Deploying the image on target
        00:13
      • 2.24 Deploying the image on target Demo 03
        02:05
      • 2.25 Quiz
      • 2.26 Summary
        00:51
      • 2.27 Conclusion
        00:09
    • Lesson 03 - DHCP

      31:07Preview
      • 3.1 DHCP
        00:23
      • 3.2 Objectives
        00:32
      • 3.3 Introducing DHCP and Advanced Features
        00:12
      • 3.4 Dynamic Host Control Protocol
        01:29
      • 3.5 Advanced Features of DHCP
        01:13
      • 3.6 DHCP Scopes and Types
        00:13
      • 3.7 DHCP Scope
        01:28
      • 3.8 DHCP Scope Advanced
        01:44
      • 3.9 Demo 01-Adding a DHCP Role
        00:12
      • 3.10 Demo 01 Adding a DHCP Role
        03:16
      • 3.11 Demo 02-Using Split and Super Scopes
        00:08
      • 3.12 Demo 02-Using Split and Super Scopes
        03:24
      • 3.13 DHCP Name Protection
        00:10
      • 3.14 Use of Name Protection in DHCP
        01:33
      • 3.15 How Name Protection Works
        01:43
      • 3.16 Demo 03-Configuring Name Protection
        00:11
      • 3.17 Demo 03-Configuring Name Protection
        00:42
      • 3.18 DHCP Failover
        00:10
      • 3.19 Understanding Failover
        01:18
      • 3.20 Types of DHCP Failover
        01:31
      • 3.21 Demo 04-Configuring DHCP Failover
        00:08
      • 3.22 Demo 04-Configuring DHCP Failover.mp4
        01:33
      • 3.23 Policy-Based Leases
        00:12
      • 3.24 Introducing PBL for DHCP
        00:50
      • 3.25 Demo 05 Adding Policy Based Leases
        00:06
      • 3.26 Demo 05 Adding Policy Based Leases
        01:51
      • 3.27 DHCPv6
        00:09
      • 3.28 Using DHCPv6 for IPv6 Addressing
        00:58
      • 3.29 DHCPv6 Modes
        01:44
      • 3.30 Demo 06-Implementing DHCPv6
        00:07
      • 3.31 Demo 06-Implementing DHCPv6
        00:58
      • 3.32 Quiz
      • 3.33 Summary
        00:51
      • 3.34 Conclusion
        00:08
    • Lesson 04 - DNS

      29:04Preview
      • 4.1 DNS
        00:19
      • 4.2 Objectives
        00:43
      • 4.3 Implement a Basic DNS Infrastructure
        00:07
      • 4.4 DNS Overview
        01:19
      • 4.5 Demo 01-Implement a DNS role
        00:09
      • 4.6 Demo 01-Implement a DNS role
        03:00
      • 4.7 Secure the DNS Infrastructure with DNSSEC
        00:09
      • 4.8 Introducing DNSSEC
        00:57
      • 4.9 DNSSEC Process
        01:18
      • 4.10 DNSSEC Security Features
      • 4.11 Demo 02-Secure DNS Zone with DNSSEC
        00:08
      • 4.12 Demo 02-Secure DNS Zone with DNSSEC
        02:04
      • 4.13 Socket Pools and Cache Locking
        00:11
      • 4.14 Securing DNS with Socket Pools
        01:04
      • 4.15 DNS Socket Pool Configuration
      • 4.16 Cache Locking
        01:13
      • 4.17 Demo 03-Configure and View Socket Pool and Cache Locking settings
        00:06
      • 4.18 Demo 03-Configure and View Socket Pool and Cache Locking settings
        01:54
      • 4.19 Advanced DNS Features
        00:06
      • 4.20 Advanced DNS Features
        00:40
      • 4.21 Forwarders
        01:24
      • 4.22 Reverse Lookup Zone
        01:04
      • 4.23 CNAME Records
        01:09
      • 4.24 GlobalNames Zone
        01:15
      • 4.25 NetMask Ordering
        01:24
      • 4.26 Delegated Administration
        00:33
      • 4.27 Demo 04-Using Advanced Features of DNS
        00:11
      • 4.28 Demo 04-Using Advanced Features of DNS
        05:44
      • 4.29 Quiz
      • 4.30 Summary
        00:48
      • 4.31 Conclusion
        00:05
    • Lesson 05 - IPAM

      23:24Preview
      • 5.1 IPAM
        00:18
      • 5.2 Objectives
        00:26
      • 5.3 IPAM Overview
        00:06
      • 5.4 IP Address Management Overview
        00:38
      • 5.5 Requirements for IPAM
        01:29
      • 5.6 Demo 01-Installing the IPAM Feature
        00:05
      • 5.7 Demo 01-Installing the IPAM Feature
        00:51
      • 5.8 IPAM Working Process
        00:09
      • 5.9 IPAM Process Flow
        02:10
      • 5.10 IPAM Discovery
        00:36
      • 5.11 Query And Monitoring
        00:52
      • 5.12 IPAM Configuration
        00:06
      • 5.13 IPAM Blocks and Ranges
        00:44
      • 5.14 IPAM Auditing
        00:49
      • 5.15 IPAM Administration
        00:53
      • 5.16 Demo 02-Setup GPO for Configuring IPAM
        00:08
      • 5.17 Demo 02-Setup GPO for Configuring IPAM
        04:46
      • 5.18 Demo 03-Administer IP Block
        00:05
      • 5.19 Demo 03-Administer IP Block
        03:53
      • 5.20 Demo 04-View IP Address Utilization
        00:05
      • 5.21 Demo 04-View IP Address Utilization
        03:33
      • 5.22 Quiz
      • 5.23 Summary
        00:35
      • 5.24 Conclusion
        00:07
    • Lesson 06 - File and Storage Services

      34:55Preview
      • 6.1 File and Storage Services
        00:19
      • 6.2 Objectives
        00:40
      • 6.3 The Distributed File System
        00:14
      • 6.4 DFS Overview
        01:26
      • 6.5 DFS Terminology
        02:08
      • 6.6 Demo 01-Setting up and implementing DFS
        00:07
      • 6.7 Demo 01-Setting up and implementing DFS
        04:04
      • 6.8 Using Encryption for Files
        00:08
      • 6.9 File Encryption
        00:37
      • 6.10 Encrypting File System(EFS)
        00:58
      • 6.11 EFS Process
        01:07
      • 6.12 Demo 02-Using EFS to encrypt a file
        00:07
      • 6.13 Demo 02-Using EFS to encrypt a file
        02:27
      • 6.14 Advanced File Manipulation and Services
        00:09
      • 6.15 Network File System (NFS)
        00:53
      • 6.16 File Server Resource Manager(FSRM)
        01:38
      • 6.17 File Classification Infrastructure(FCI)
        01:31
      • 6.18 File Classification Infrastructure(FCI)
        01:31
      • 6.19 Demo 03-Setting up and Configuring NFS
        00:07
      • 6.20 Demo 03-Setting up and Configuring NFS
        01:48
      • 6.21 Storage Spaces
        00:11
      • 6.22 Storage Spaces
        01:16
      • 6.23 Storage Space Process
        00:58
      • 6.24 Demo 04-Implement Storage Spaces
        00:15
      • 6.25 Demo 04-Implement Storage Spaces
        04:05
      • 6.26 Understand iSCSI and iSNS
        00:12
      • 6.27 iSCSI Overview
        00:35
      • 6.28 iSNS
        00:41
      • 6.29 Demo 05-Configure iSCSI storage on network
        00:05
      • 6.30 Demo 05-Configure iSCSI storage on network
        03:44
      • 6.31 Quiz
      • 6.32 Summary
        00:47
      • 6.33 Conclusion
        00:07
    • Lesson 07 - Active Directory Domain Services

      23:26Preview
      • 7.1 Active Directory Domain Services
        00:20
      • 7.2 Objectives
        00:29
      • 7.3 AD DS Overview
        00:07
      • 7.4 Introduction to Active Directory Domain Services
        00:52
      • 7.5 Uses of AD DS
        01:18
      • 7.6 AD DS Components
      • 7.7 AD DS Infrastructure
        00:09
      • 7.8 Requirements for AD DS infrastructure
        01:26
      • 7.9 AD DS Implementation
        00:57
      • 7.10 Demo 01-Installing a domain controller for a new forest
        00:08
      • 7.11 Demo 01-Installing a domain controller for a new forest
        03:03
      • 7.12 Exploring AD DS Tools and Objects
        00:12
      • 7.13 AD DS Tools
        01:29
      • 7.14 Active Directory Object Architecture
        01:54
      • 7.15 Object Naming Convention
        01:06
      • 7.16 Demo 02-Explore AD DS Tools and Structures
        00:10
      • 7.17 Demo 02-Explore AD DS Tools and Structures
        01:51
      • 7.18 AD DS Schema Extensions
        00:08
      • 7.19 AD DS Schema
        01:59
      • 7.20 Demo 03-Extend the Active Directory Schema
        00:07
      • 7.21 Demo 03-Extend the Active Directory Schema
        04:45
      • 7.22 Quiz
      • 7.23 Summary
        00:48
      • 7.24 Conclusion
        00:08
    • Lesson 08 - Multi-domain Sites And Trusts

      23:23Preview
      • 8.1 Multi-domain Sites And Trusts
        00:17
      • 8.2 Objectives
        00:32
      • 8.3 Multi-domain AD Setup
        00:05
      • 8.4 Need for Multi-Domain Architecture
        01:09
      • 8.5 Domain Tree
        00:47
      • 8.6 Multi-Forest Architectures
        01:09
      • 8.7 Backward Compatibility of AD DS
        01:41
      • 8.8 UPN Suffixes
        01:38
      • 8.9 Demo 01-Adding a child domain to create a Domain Tree
        00:07
      • 8.10 Demo 01-Adding a child domain to create a Domain Tree
        01:47
      • 8.11 Demo 02-Set the UPN Suffix for users
        00:05
      • 8.12 Demo 02-Set the UPN Suffix for users
        02:01
      • 8.13 Sites and Subnets
        00:07
      • 8.14 Subnets in AD DS
        00:42
      • 8.15 Site
        01:25
      • 8.16 Site Links
        01:22
      • 8.17 Demo 03-Adding Sites Subnets and Site Links
        00:05
      • 8.18 Demo 03-Adding Sites Subnets and Site Links
        01:46
      • 8.19 Trust Relationships
        00:09
      • 8.20 Trust Relationships
        00:55
      • 8.21 Trust Modes
        00:52
      • 8.22 Trust Types
        01:24
      • 8.23 Default Trusts
        01:41
      • 8.24 Demo 04-View and configure Trusts
        00:05
      • 8.25 Demo 04-View and configure Trusts
        00:51
      • 8.26 Quiz
      • 8.27 Summary
        00:32
      • 8.28 Conclusion
        00:09
    • Lesson 09 - Organizational Units and Group Policies

      34:09Preview
      • 9.1 Organizational Units and Group Policies
        00:14
      • 9.2 Objectives
        00:29
      • 9.3 Organizational Units
        00:08
      • 9.4 Organizational Units
        01:21
      • 9.5 Need for Organizational Units
        00:22
      • 9.6 Structure of OUs
        00:54
      • 9.7 Demo 01-Creating OUs in Active Directory
        00:06
      • 9.8 Demo 01-Creating OUs in Active Directory
        01:52
      • 9.9 Group Policies
        00:08
      • 9.10 Group Policies
        01:45
      • 9.11 Group Policy Components
        01:00
      • 9.12 Group Policy Components(Contd.)
        01:00
      • 9.13 Group Policy Components(Contd.)
        00:48
      • 9.14 Group Policy Structure
        04:01
      • 9.15 Special Items
        01:56
      • 9.16 How Group Policies Work?
        00:18
      • 9.17 Group Policy Processing
        02:30
      • 9.18 Group Policy Processing(Contd.)
        02:30
      • 9.19 GPO Linking
        01:25
      • 9.20 Working with Group Policy
        00:16
      • 9.21 Using GPOs
      • 9.22 Demo 02-Creating a simple GPO
        00:05
      • 9.23 Demo 02-Creating a simple GPO
        04:13
      • 9.24 Central Store
        00:15
      • 9.25 Why Central Store?
        01:43
      • 9.26 Central Store Implementation
        02:00
      • 9.27 Demo 03-Create an Administrative Central Store
        00:06
      • 9.28 Demo 03-Create an Administrative Central Store
        01:32
      • 9.29 User Account Policies
      • 9.30 Computer Group Policies
        00:31
      • 9.31 Configure Computer Group Policies
      • 9.32 Quiz
      • 9.33 Summary
        00:34
      • 9.34 Conclusion
        00:07
    • Lesson 10 - Network Access and Security Design

      23:45Preview
      • 10.1 Network Access and Security Design
        00:15
      • 10.2 Objectives
        00:22
      • 10.3 External Access to Organization Network
        00:08
      • 10.4 Need for External Network Access
        01:00
      • 10.5 Virtual Private Networks
        00:48
      • 10.6 VPN Protocols
        01:24
      • 10.7 Connection Manager Administration Kit
        01:11
      • 10.8 Demo 01-Installing and setting up CMAK
        00:07
      • 10.9 Demo 01-Installing and setting up CMAK
        03:36
      • 10.10 Working with DirectAccess
        00:09
      • 10.11 Introduction to DirectAccess
        01:20
      • 10.12 DirectAccess Process
        00:40
      • 10.13 DirectAccess in Windows Server 2012 R2
        01:38
      • 10.14 Demo 02-Setting up DirectAccess
        00:05
      • 10.15 Demo 02-Setting up DirectAccess
        03:21
      • 10.16 Using Network Access Protection
        00:09
      • 10.17 Network Protection
      • 10.18 Network Access Protection
        02:10
      • 10.19 Demo 03-Configuring a NAP
        00:06
      • 10.20 Demo 03-Configuring a NAP
        04:32
      • 10.21 Quiz
      • 10.22 Summary
        00:38
      • 10.23 Conclusion
        00:06
    • Lesson 11 - Working with Virtual Machines

      20:48Preview
      • 11.1 Working with Virtual Machines
        00:23
      • 11.2 Objectives
        00:26
      • 11.3 Overview of Virtual Machines
        00:08
      • 11.4 Virtual Machines
        01:26
      • 11.5 Enterprise Virtual Machines
      • 11.6 Introduction to SCVMM
        00:12
      • 11.7 Introducing System Center
      • 11.8 Virtual Machine Manager
        00:55
      • 11.9 VM Library
        00:56
      • 11.10 Components of SCVMM
      • 11.11 SCVMM Architecture
        00:50
      • 11.12 Non-Domain Joined Hosts
        00:37
      • 11.13 SCVMM Capabilities
        00:09
      • 11.14 Network Capabilities
        00:38
      • 11.15 Service Templates
        00:55
      • 11.16 Service Templates (Contd.)
        00:54
      • 11.17 Demo 01-Setting up SCVMM
        00:09
      • 11.18 Demo 01-Setting up SCVMM
        02:42
      • 11.19 Demo 02-Explore SCVMM Console
        00:07
      • 11.20 Demo 02-Explore SCVMM Console
        02:50
      • 11.21 Demo 03-Setup a VM
        00:07
      • 11.22 Demo 03-Setup a VM
        05:44
      • 11.23 Quiz
      • 11.24 Summary
        00:35
      • 11.25 Conclusion
        00:05

Exam & Certification

  • How do I become certified in Microsoft® 70-413: Designing and Implementing a Server Infrastructure?

    Aspirants can become certified professionals in Microsoft® 70-413: Designing and Implementing a Server Infrastructure, by following the below processes:
    • Step 1: Visit Microsoft official website after completing the training
    • Step 2: Register for Exam 70-413, and schedule it with Pearson VUE
    • Step 3: Take the exam and get certified

  • What are the prerequisites for the certification?

    The course requires the following prerequisites:
    • Basic knowledge of Windows Server Systems
    • Knowledge of implementing basic services such as DNS or DHCP

Why Online Bootcamp

  • Develop skills for real career growthCutting-edge curriculum designed in guidance with industry and academia to develop job-ready skills
  • Learn from experts active in their field, not out-of-touch trainersLeading practitioners who bring current best practices and case studies to sessions that fit into your work schedule.
  • Learn by working on real-world problemsCapstone projects involving real world data sets with virtual labs for hands-on learning
  • Structured guidance ensuring learning never stops24x7 Learning support from mentors and a community of like-minded peers to resolve any conceptual doubts

FAQs

  • How do I enroll for the Online training?

    You can enroll for the online training through our website. You can make online payment using any of the following options:
    • Visa debit/credit card
    • American Express and Diners Club cards
    • Master Card
    • PayPal
    Once the online payment is done, you will automatically receive payment receipt, via email.

  • What will I get along with this training?

    In this training, you will have access to online e-learning and practice tests.

  • Do you provide money back guarantee for the training programs?

    Yes. We do offer a money-back guarantee for many of our training programs. You can refer to the Refund Policy and raise refund requests via our Help and Support portal.

  • Can I cancel my enrollment? Do I get a refund?

    Yes! You can cancel your enrollment. We provide you complete refund after deducting the administration fee. To know more, please go through our Refund Policy.

  • Where and how can I access the e-learning content? Are there any limitations?

    Once you register with us for a course by paying the course fee, you can have 24/7 access to the e-learning content on our website. An automated course purchase confirmation mail from our side will guide you through the process.

  • I am not able to access the online course. Whom should I contact for a solution?

    Please raise a request via our Help and Support portal to have your issue resolved.

  • How do I track the hours already spent on the course?

    You can track the number of hours spent on the course by accessing your LMS home.

  • Can I extend the access period?

    Yes, you can extend the access period by paying an additional fee. Please raise a request via our Help and Support portal.

  • Do you provide any group discounts for online training programs?

    Yes, we offer group discounts for our online training programs. Get in touch with us over the Drop us a Query/Request a Callback/Live Chat channels to find out more about our group discount packages.

  • How does Simplilearn assure that the material and the training delivered are effective?

    Simplilearn follows a Global Learning Framework which has been proven to deliver results and has been perfected by our training experience.

  • Do you provide any course completion certificate?

    Yes, we offer course completion certificate after you successfully complete the training program with the following criteria:
    • Complete 85% of the course.
    • Complete 1 simulation test with a minimum score of 60%.

  • Is exam fee included in the course fee?

    No! Exam fee is not included in this course. Participants can pay the exam fee while applying for the exam.

  • I want to know more about the training program. Whom do I contact?

    Please join our Live Chat for instant support, call us, or Request a Call Back to have your query resolved.

  • Disclaimer
  • PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, and OPM3 are registered marks of the Project Management Institute, Inc.