Microsoft Certified Solution Expert


Signellent's Microsoft Certified Solutions Expert (MCSE) Server Infrastructure certification inculcates the skills necessary to build comprehensive server infrastructure solutions, and demonstrates your ability to efficiently run a modern and adept datacenter, with expertise in identity management, systems management, virtualization, storage, and networking. Signellent has a comprehensive training program to help you crack the MSCE exam in the 1st attempt.

This program is designed specifically to help the candidates get the sort of employment they want and excel in the same. This course focuses on developing your ability to design and build technology solutions in the cloud and on premises, which may include integrating multiple technology products.

The Microsoft Certified Solutions Expert certification has to be taken again after the completion of three years.

Course Highlights

Signellent's expert instructor led course is designed to either be for 30 days (Weekdays – 2.5 hrs.) OR 12-week (Sunday/Saturday) to cater to both working and upcoming professionals. This course provides extensive server knowledge to excel in your organization. We pride ourselves in providing our students with a high success rate by highlighting the goals from day one. Our major course highlights are as below,

  • Course contents are based on MICROSOFT guidelines
  • Dedicated attention by instructors to Monitoring and evaluate candidates' progress on a daily basis
  • Daily lab exercises to give extensive familiarity with the equipment
  • Regular evaluation
  • Industry experienced Certified instructors
  • The MCSE module is designed to meet the objective of the MCSE program.
  • The course is customized keeping in mind the ultimate aim of achieving technology expertise and MCSE certification.  
  • Assigned project manager will manage this program and drive the program from its registration stage to monitoring and tracking of the candidates' performance.
  • Curriculum is based on MCSE course outlines
  • Dedicated Professional to manage, track and evaluate the candidate's performance from registration to completion.
  • This course is especially beneficial for candidates who aim at building academic knowledge that is supplemented by applied lab exercises.
  • 12 week or 30 days, of intensive training+ rigorous lab exercises.
  • Course kits contains reference material and add ons to enable students prepare better.
  • Apt balance of theoretical and practical application
  • Customized tests at the end of course to ensure best results.
  • Stern passing standards with progress report of each candidate.
  • Facility of Lab on cloud for students who want to practice remotely
  • Students can attend the same lecture numerous times till they feel comfortable with the topic.
Course Objectives

After completing this Course, students will be able to:

  • Implement server upgrade and migration.
  • Design an automated server installation strategy.
  • Plan and implement file, storage services and  server deployment infrastructure.
  • Design and implement a Dynamic Host Configuration Protocol (DHCP) solution.
  • Design a name resolution solution strategy.
  • Design and manage an IP address management solution.
  • Design a VPN solution and a Direct Access solution.
  • Implement a scalable remote access solution.
  • Design and implement a network protection solution.
  • Design and implement a forest and domain infrastructure.
  • Design a Group Policy strategy.
  • Design an Active Directory permission model and  sites topology.
  • Design a domain controller strategy.
  • Design and implement a branch office infrastructure
  • Plan and implement server virtualization strategy.
  • Plan and implement networks and storage for virtualization.
  • Plan and deploy virtual machines and manage virtual machine deployment.
  • Plan and implement a server monitoring strategy.
  • Plan and implement high availability for file services and applications.
  • Plan and implement a highly available infrastructure using failover clustering.
  • Plan and implement an server updates infrastructure.
  • Plan and implement a business continuity strategy.
  • Plan and implement a public key infrastructure (PKI).
  • Plan and implement an identity federation infrastructure.
  • Plan and Implement an information rights management infrastructure.
Course Topics

Following Topics will be covered in MCSE Course


Deploying and Managing Windows Server 2012.This module introduces students to the editions of Windows Server 2012 and the new Windows Server 2012 management tools. It also covers how to install Windows Server 2012, how to perform post-deployment tasks, and how to perform basic administrative tasks.


  • Windows Server 2012 Overview
  • Installing Windows Server 2012
  • Post-Installation Configuration of Windows Server 2012
  • Overview of Windows Server 2012 Management
  • Introduction to Windows PowerShell


  • Deploying and Managing Windows Server 2012Deploying Windows Server 2012
  • Configuring Windows Server 2012 Server Core
  • Managing Servers
  • Using Windows PowerShell to Manage Servers
  • After completing this module, students will be able to:
  • Describe Windows Server 2012.
  • Install Windows Server 2012.
  • Perform postinstallation configuration of Windows Server 2012.
  • Describe the management tools available in Windows Server 2012.
  • Perform basic administrative tasks using Windows PowerShell


Introduction to Active Directory Domain Services This module covers the structure of Active Directory Domain Services (AD DS) and its various components, such as forest, domain, and organizational units (OUs). It also gives an overview of domain controllers, in addition to choices that are available with Windows Server 2012 for installing AD DS on a server.


  • Overview of AD DS
  • Overview of Domain Controllers
  • Installing a Domain Controller


  • Installing a Domain Controller
  • Installing a Domain Controller by Using IFM


Managing Active Directory Domain Services Objects, This module describes how to manage user accounts and computer accounts, including how to manage various consumer devices that employees use. The module also covers how to manage an enterprise network by managing groups, and how to delegate administrative tasks to designated users or groups.


  • Managing User Accounts
  • Managing Groups
  • Managing Computer Accounts
  • Delegating Administration


  • Managing Active Directory Domain Services Objects
  • Delegating Administration for a Branch Office
  • Creating and Configuring User Accounts in AD DS
  • Managing Computer Objects in AD DS


Automating Active Directory Domain Services Administration. This module describes how to use commandline tools and Windows PowerShell to automate AD DS administration. It discusses various command-line tools and Windows PowerShell commands, and then describes how to use these tools and commands to modify objects individually and in bulk operations.


  • Using Command-line Tools for AD DS Administration
  • Using Windows PowerShell for AD DS Administration
  • Performing Bulk Operations with Windows PowerShell


  • Automating AD DS Administration by Using Windows PowerShell
  • Creating User Accounts and Groups by Using Windows PowerShell
  • Using Windows PowerShell to Create User Accounts in Bulk
  • Using Windows PowerShell to Modify User Accounts in Bulk


Implementing IPv4  This module discusses using IPv4, which is the network protocol used on the Internet and on local area networks. In this module, students learn how to implement an IPv4 addressing scheme and how to troubleshoot network communication. This module also covers how to determine and troubleshoot network-related problems.


  • Overview of TCP/IP
  • Understanding IPv4 Addressing
  • Subnetting and Supernetting
  • Configuring and Troubleshooting IPv4


  • Identifying Appropriate Subnets
  • Troubleshooting IPv4


Implementing Dynamic Host Configuration Protocol, This module covers supporting and troubleshooting a Windows Server–based network infrastructure by deploying, configuring, and troubleshooting the Dynamic Host Configuration Protocol (DHCP) server role.


  • Overview of the DHCP Server Role
  • Configuring DHCP Scopes
  • Managing a DHCP Database
  • Securing and Monitoring DHCP


  • Implementing DHCP
  • Implementing a DHCP Relay Agent (Optional Exercise)


This module describes name resolution for Windows operating system clients and Windows Server servers. It also covers installing and configuring a DNS Server service and its components.


  • Name Resolution for Windows Clients and Servers
  • Installing a DNS Server
  • Managing DNS Zones


  • Installing and Configuring DNS
  • Creating Host Records in DNS
  • Managing the DNS Server Cache


Implementing IPv6, This module discusses the features and benefits of IPv6, how IPv6 affects IPv4 networks, and how to integrate IPv6 into IPv4 networks by using various transition technologies.


  • Overview of IPv6
  • IPv6 Addressing
  • Coexistence with IPv4
  • IPv6 Transition Technologies


  • Configuring an IPv6 Network
  • Configuring an ISATAP Router


Implementing Local Storage
This module introduces several different storage technologies. It discusses how to implement the storage solutions in Windows Server 2012, and how to use the new Storage Spaces feature, which enables you to combine disks into pools that you can configure for automatic management


  • Overview of Storage
  • Managing Disks and Volumes
  • Implementing Storage Spaces


  • Installing and Configuring a New Disk
  • Resizing Volumes
  • Configuring a Redundant Storage Space


Implementing File and Print Services, This module discusses how to provide file and print resources with Windows Server 2012. It describes how to secure files and folders, how to protect previous versions of files and folders by using shadow copies, and how to give workers remote access to corporate files by implementing the new Work Folders role service. It also describes new network printing features that help manage the network printing environment


  • Securing Files and Folders
  • Protecting Shared Files and Folders by Using Shadow Copies
  • Configuring Work Folders
  • Configuring Network Printing


  • Creating and Configuring a File Share
  • Configuring Shadow Copies
  • Enabling and Configuring Work Folders
  • Creating and Configuring a Printer Poo


This module provides an overview of Group Policy and provides details about how to implement Group Policy.


  • Overview of Group Policy
  • Group Policy Processing
  • Implementing a Central Store for Administrative Templates


  • Configuring a central store
  • Creating GPOs


Securing Windows Servers Using Group Policy Objects, This module describes Windows Server 2012 operating system security. It covers how to identify security threats, plan your strategy to mitigate security threats, and secure your Windows Server 2012 infrastructure.


  • Security Overview for Windows Operating Systems
  • Configuring Security Settings and Restricting Software
  • Configuring Windows Firewall with Advanced Security


  • Using Group Policy to Secure Member Servers
  • Auditing File System Access and Domain Logons
  • Configuring AppLocker Policies and Configuring Windows Firewall


Implementing Server Virtualization with Hyper-V, This module describes virtualization technologies available on Windows, specifically focusing on the Hyper-V role in Windows Server 2012 and Windows Server 2012 R2. It covers the components of the Hyper-V role, configuring and deploying the role, in addition to and how to configure and manage key components of a Hyper-V implementation, such as Storage and Networking.


  • Overview of Virtualization Technologies
  • Implementing Hyper-V
  • Managing Virtual Machine Storage and Managing Virtual Networks


  • Installing the Hyper-V Role onto a Server
  • Configuring Virtual Networking
  • Creating and Configuring a Virtual Machine
  • Using Virtual Machine Checkpoints


Deploy and manage server images

  • Install the Windows Deployment Services (WDS) role
  • Configure and manage boot, install, and discover images
  • Update images with patches, hotfixes, and drivers
  • Install features for offline images
  • Configure driver groups and packages *(New Topic)
  • Implement patch management
  • Install and configure the Windows Server Update Services (WSUS) role
  • Configure group policies for updates
  • Configure client-side targeting
  • Configure WSUS synchronization
  • Configure WSUS groups
  • Manage patch management in mixed environments *(New Topic)
  • Monitor servers
  • Configure Data Collector Sets (DCS)
  • Configure alerts; monitor real-time performance
  • Monitor virtual machines (VMs)
  • Monitor events
  • Configure event subscriptions
  • Configure network monitoring
  • Schedule performance monitoring *(New Topic)

Configure file and print services

  • Configure Distributed File System (DFS)
  • Install and configure DFS namespaces
  • Configure DFS Replication Targets
  • Configure Replication Scheduling
  • Configure Remote Differential Compression settings
  • Configure staging; configure fault tolerance
  • Clone a DFS database *(New Topic)
  • Recover DFS databases *(New Topic)
  • Optimize DFS replication *(New Topic)
  • Configure File Server Resource Manager (FSRM)
  • Install the FSRM roles
  • Configure quotas
  • Configure file screens
  • Configure reports
  • Configure file management tasks *(New Topic)
  • Configure file and disk encryption
  • Configure Bitlocker encryption
  • Configure the Network Unlock feature
  • Configure Bitlocker policies
  • Configure the EFS recovery agent
  • Manage EFS and Bitlocker certificates including backup and restore
  • Configure advanced audit policies
  • Implement auditing using Group Policy and AuditPol.exe
  • Create expression-based audit policies
  • Create removable device audit policies

Configure DNS zones

  • Configure primary and secondary zones
  • Configure stub zones
  • Configure conditional forwards
  • Configure zone and conditional forward storage in Active Directory
  • Configure zone delegation and zone transfer settings
  • Configure DNS records
  • Create and configure DNS (RR) including A, AAAA, PTR, SOA, CNAME, and MX records
  • Configure zone scavenging
  • Configure record options including Time To Live (TTL) and weight
  • Configure round robin
  • Configure secure dynamic updates

Configure VPN and routing

  • Install and configure the Remote Access role
  • Implement Network Address Translation (NAT)
  • Configure VPN settings
  • Configure remote dial-in settings for users
  • Configure routing
  • Configure Web Application proxy in passthrough mode *(New Topic)

Configure DirectAccess

  • Implement server requirements
  • Implement client configuration
  • Configure DNS for Direct Access
  • Configure certificates for Direct Access

Configure Network Policy Server

  • Configure a RADIUS server, including RADIUS proxy
  • Configure RADIUS clients
  • Configure NPS templates *(New Topic)
  • Configure RADIUS accounting
  • Configure certificates

Configure NPS policies

  • Configure connection request policies
  • Configure network policies for VPN clients
    • Multilink and bandwidth allocation
    • IP filters
    • Encryption
    • IP addressing
  • Manage NPS templates
  • Import and export NPS policies

Configure Network Access Protection (NAP)

  • Configure System Health Validators (SHVs)
  • Configure health policies
  • Configure NAP enforcement using DHCP and VPN
  • Configure isolation and remediation of non-compliant computers using DHCP
  • Configure NAP client settings


  • Configure service authentication
  • Create and configure Service Accounts,
  • Create and configure Group Managed Service Accounts,
  • Configure Kerberos delegation,
  • Manage Service Principal Names (SPNs),
  • Configure virtual accounts
  • Configure domain controllers
  • Transfer and seize operations master roles,
  • Install and configure a read-only domain controller (RODC),
  • Configure domain controller cloning
  • Maintain Active Directory
  • Back up Active Directory and SYSVOL,
  • Manage Active Directory offline, optimise an Active Directory database, metadata
  • Configure Active Directory snapshots.
  • Configure account policies
  • Configure domain and local user password policy settings,
  • Configure and apply Password Settings Objects (PSOs),
  • Delegate password settings management, configure account lockout policy
  • Configure Kerberos policy settings

Configure Group Policy processing

  • Configure processing order and precedence
  • Configure blocking of inheritance
  • Configure enforced policies
  • Configure security filtering and WMI filtering
  • Configure loopback processing
  • Configure and manage slow-link processing
  • Configure client-side extension (CSE) behavior
  • Force Group Policy update *(New Topic)
  • Configure and manage slow-link process and Group Policy caching *(New Topic)

Configure Group Policy settings

  • Configure settings for software installation, folder redirection, scripts, and administrative template setting
  • Import security templates and custom administrative template file
  • Convert administrative templates using ADMX Migrator
  • Configure property filters for administrative templates

Manage Group Policy objects (GPOs)

  • Back up, import, copy, and restore GPOs
  • Create and configure Migration Table
  • Reset default GPOs
  • Delegate Group Policy management

Configure Group Policy preferences

  • Configure Group Policy Preferences (GPP) settings
    • Printer, Network drive mappings, Power options, Custom registry settings, Control Panel settings, Internet Explorer settings, File and folder deployment and Shortcut deployment


Configure Network Load Balancing (NLB)

  • Install NLB nodes and configure NLB prerequisites
  • Configure affinity
  • Configure port rules
  • Configure cluster operation mode and upgrade an NLB cluster

MConfigure failover clustering

  • Configure quorum
  • Configure cluster networking
  • Restore single node or cluster configuration
  • Configure cluster storage and implement Cluster-Aware Updating
  • Upgrade a cluster
  • Configure and optimize clustered shared volumes* (New Topic)
  • Configure clusters without network names* (New Topic)
  • Configure storage spaces* (New Topic)

Manage failover clustering roles

  • Configure role-specific settings
  • Including continuously available shares
  • Configure virtual machine (VM) monitoring
  • Configure failover and preference settings
  • Configure guest clustering* (New Topic)

Manage VM movement

  • Perform live and quick migration
  • Perform storage migration
  • Import, export, and copy VMs
  • Configure VM network health protection* (New Topic)
  • Configure drain on shutdown* (New Topic)

Configure advanced file services  

  • Configure Network File System (NFS) data store
  • Configure Branch Cache
  • Configure File Classification Infrastructure (FCI) using File Server Resource
  • Configure file access auditing

Implement Dynamic Access Control (DAC)

  • Configure user and device claim types
  • Implement policy changes and staging
  • Perform access-denied remediation
  • Configure file classification
  • Create and configure Central Access rules and policies*(New Topic)
  • Create and configure resource properties and lists* (New Topic)
  • Configure and optimize storage
  • Configure iSCSI target and initiator
  • Configure Internet Storage Name server (iSNS)
  • Implement thin provisioning and trim
  • Manage server free space using Features on Demand
  • Configure tiered storage* (New Topic)

Configure and manage backups   

  • Configure Windows Server backups
  • Configure Microsoft Azure backups and role-specific backups
  • Manage VSS settings using VSSAdmin

Recover servers

  • Restore from backups
  • Perform a Bare Metal Restore (BMR)
  • Recover servers using Windows Recovery Environment (Win RE) and safe mode
  • Configure the Boot Configuration Data (BCD) store

Configure site-level fault tolerance

  • Hyper-V Replica including Hyper-V Replica Broker and VMs
  • Configure multi-site clustering, including network settings, Quorum, failover configure Hyper-V Replica extended replication* (New Topic)
  • Configure Global Update Manager* (New Topic)
  • Recover a multi-site failover cluster* (New Topic)

Configure Group Policy preferences

  • Configure Group Policy Preferences (GPP) settings
  • Printer, Network drive mappings, Power options, Custom registry settings, Control Panel settings, Internet Explorer settings, File and folder deployment and Shortcut deployment

Implement an advanced Dynamic Host Configuration Protocol (DHCP) solution

  • Create and configure superscopes and multicast scopes
  • Implement DHCPv6
  • Configure high availability for DHCP, including DHCP failover, split scopes
  • Configure DHCP Name Protection
  • Configure DNS registration*

Implement an advanced DNS solution

  • Configure security for DNS, including Domain Name System Security Extensions (DNSSEC), DNS Socket Pool, cache locking
  • Configure DNS logging
  • Configure delegated administration
  • Configure recursion
  • Configure netmask ordering
  • Configure a GlobalNames zone
  • Analyze zone level statistics* (New Topic)

Deploy and manage IP Address Management (IPAM)

  • Provision IPAM manually or by using Group Policy
  • Configure server discovery
  • Create and manage IP blocks and ranges
  • Monitor utilization of IP address space
  • Migrate to IPAM
  • Delegate IPAM administration
  • Manage IPAM collections

Configure a forest or a domain

  • Implement multi-domain and multi-forest Active Directory environments interoperability with previous versions of Active Directory
  • upgrade existing domains and forests, including, environment preparation and l levels
  • configure multiple user principal name (UPN) suffixes

Configure trusts

  • Configure external, forest, shortcut, and realm trusts
  • Configure trust authentication
  • Configure SID filtering
  • Configure name suffix routing

Configure sites

  • Configure sites and subnets
  • Create and configure site links
  • Manage site coverage
  • Manage registration of SRV records
  • Move domain controllers between sites

Manage Active Directory and SYSVOL replication

  • Configure replication to Read-Only Domain Controllers (RODCs)
  • Configure Password Replication Policy (PRP) for RODC
  • Monitor and manage replication
  • Upgrade SYSVOL replication to Distributed File System Replication (DFSR)

Implement Active Directory Federation Services (AD FS)

  • Install AD FS* (New Topic)
  • Implement claims-based authentication, including, Relying Party Trusts
  • Configure authentication policies* (New Topic)
  • Configure Workplace Join* (New Topic)
  • Configure multi-factor authentication*(New Topic)

Install and configure Active Directory Certificate Services (AD CS)

  • Install an Enterprise Certificate Authority (CA)
  • Configure certificate revocation lists (CRL) distribution points
  • Install and configure Online Responder
  • Implement administrative role separation
  • Configure CA backup and recovery

Manage certificates

  • Manage certificate templates
  • Implement and manage certificate deployment, validation, and revocation
  • Manage certificate enrolment renewal to computers and user
  • Configure and manage key archival and recovery

Install and configure Active Directory Rights Management Services (AD RMS)

  • Install a licensing or certificate AD RMS server
  • Manage AD RMS Service Connection Point (SCP)
  • Manage RMS templates
  • Configure Exclusion Policies
  • Backup and restore AD RMS* (New Topic)



Planning Server Upgrade and Migration, This module explains how to plan a server upgrade and migration strategy Configure failover clustering


  • Considerations for Upgrades and Migrations
  • Creating a Server Upgrade and Migration Plan
  • Planning for Virtualization


  • Planning a Server Upgrade and Migration
  • Planning a Strategy for Server Upgrade and Migration
  • Evaluating Candidates for Server Virtualization


Planning and Implementing a Server Deployment Strategy This module explains how to design an automated server installation strategy and plan and implement a server deployment infrastructure.


  • Selecting an Appropriate Server Deployment Strategy
  • Implementing an Automated Deployment Strategy


  • Planning and Implementing a Server Deployment Infrastructure Planning an Automated Server
  • Installation and Deployment Strategy
  • Preparing the Windows Server 2012 R2 Image
  • Deploying Windows Server 2012 R2


Planning and Deploying Servers Using Virtual Machine Manager, This module explains how to plan and deploy a Virtual Machine Manager (VMM) infrastructure for deploying servers.


  • System Center 2012 R2 Virtual Machine Manager Overview
  • Implementing a Virtual Machine Manager Library and Profiles
  • Planning and Deploying Virtual Machine Manager Services


  • Planning and Deploying Virtual Machines by Using Virtual Machine Manager
  • Planning Microsoft System Center 2012 R2 Virtual Machine Manager Components
  • Planning Virtual Machine and Service Templates
  • Implementing Virtual Machine Manager Components


Designing and Maintaining an IP Configuration and Address Management Solution, This module explains how to design and maintain IP address management (IPAM) and a Dynamic Host Configuration Protocol (DHCP) solution.


  • Designing DHCP Servers
  • Planning DHCP Scopes
  • Designing an IPAM Provisioning Strategy
  • Managing Servers and Address Spaces by Using IPAM


  • Designing and Maintaining an IP Configuration and IP Address Management Solution
  • Planning DHCP to Support Your Proposal
  • Planning an IPAM Deployment
  • Implementing DHCP and IPAM


Designing and Implementing Name Resolution, This module explains how to design a name resolution strategy.


  • Designing a DNS Server Implementation Strategy
  • Designing the DNS Namespace and DNS Zones
  • Designing DNS Zone Replication and Delegation and Optimizing DNS Servers
  • Designing DNS for High Availability and Security


  • Designing and Implementing Name Resolution
  • Designing a Strategy for DNS Name Resolution and DNS Server Placement
  • Designing DNS Zones and DNS Zone Replication
  • Implementing DNS


Designing and Implementing an Active Directory Domain Services Forest and Domain Infrastructure, This module explains how to design and implement an AD DS forest and domain infrastructure.


  • Designing an Active Directory Forest
  • Designing and Implementing Active Directory Forest Trusts and Domains
  • Designing Active Directory Integration with Windows Azure Active Directory
  • Designing DNS Namespaces in Active Directory Environments
  • Designing Active Directory Domain Trusts


  • Designing and Implementing an Active Directory Domain Services Forest Infrastructure
  • Designing an Active Directory Forest and Domain Infrastructure
  • Implementing Active Directory Forest and Domain Trusts


Designing and Implementing an AD DS Organizational Unit Infrastructure, This module explains how to design and implement an OU infrastructure and an AD DS permissions model.


  • Planning the Active Directory Administrative Tasks Delegation Model
  • Designing an OU Structure
  • Designing and Implementing an AD DS Group Strategy


  • Designing and Implementing an Active Directory OU Infrastructure and Delegation Model
  • Designing an Organizational Unit Infrastructure
  • Implementing the OU Design
  • Designing and Implementing an Active Directory Permissions Model


Designing and Implementing a Group Policy Object Strategy, This module explains how to design and implement a Group Policy Object (GPO) strategy.


  • Collecting the Information Required for a GPO Design
  • Designing and Implementing GPOs
  • Designing GPO Processing
  • Planning Group Policy Management


  • Designing a GPO Strategy
  • Implementing the GPO Design


Designing and Implementing an AD DS Physical Topology, This module explains how to design an AD DS sites topology and a domain controller placement strategy.


  • Designing and Implementing Active Directory Sites
  • Designing Active Directory Replication
  • Designing the Placement of Domain Controllers
  • Virtualization Considerations for Domain Controllers
  • Designing Highly Available Domain Controllers


  • Designing and Implementing an Active Directory Domain Services Physical Topology
  • Designing Active Directory Sites and Replication
  • Planning the Placement of Domain Controllers and Active Directory Replication
  • Implementing Active Directory Sites and Domain Controllers


Planning and Implementing Storage and File Services, This module explains how to plan and implement storage and file services.


  • Planning and Implementing iSCSI SANs
  • Planning and Implementing Storage Spaces
  • Optimizing File Services for Branch Offices


  • Planning and Implementing Storage
  • Planning a Storage Solution
  • Implementing iSCSI Storage
  • Configuring a Redundant Storage Space


Designing and Implementing Network Protection This module explains how to design and implement network protection.


  • Overview of Network Security Design
  • Designing and Implementing a Windows Firewall Strategy
  • Designing and Implementing a NAP Infrastructure


  • Designing and Implementing Network Protection
  • Designing a Windows Firewall Solution
  • Implementing a Windows Firewall Solution
  • Designing a NAP Solution
  • Implementing NAP with IPsec Enforcement


Designing and Implementing Remote Access Services, This module explains how to design and implement remote access services.


  • Planning and Implementing DirectAccess
  • Planning and Implementing VPN
  • Planning and Implementing Web Application Proxy
  • Planning a Complex Remote Access Infrastructure


  • Designing and Implementing Network Access Services
  • Designing a Remote Access Strategy
  • Planning and Implementing a DirectAccess Solution
  • Planning and Implementing a VPN Solution
  • Implementing Web Application Proxy


Design an administrative model

  • Design considerations, including user rights and built-in groups;
  • Design a delegation of administration structure for Microsoft System Centre
  • Design self-service portals by using System Centre Service Manager;
  • Delegate rights for managing private cloud by using AppController and System
  • Virtual Machine Manager

Design a monitoring strategy

  • Design considerations including monitoring servers using Audit Collection and System Centre Global Service Monitor,
  • Performance monitoring, application monitoring,
  • Centralized monitoring, and centralized reporting;
  • Implement and optimize System Centre 2012 – Operations Manager plan for
  • Managing Active Directory

Plan and implement automated remediation

  • Create an Update Baseline in Virtual Machine Manager;
  • Implement a Desired Configuration Management (DCM) Baseline;
  • Implement Virtual Machine Manager integration with Operations Manager;
  • Configure Virtual Machine Manager to move a VM dynamically based on policy
  • Integrate System Centre 2012 for automatic remediation into your existing infrastructure

Plan and implement failover clustering

  • Plan for and implement multi-node and multi-site clustering including the use of networking storage, name resolution, and Global Update Manager (GUM);
  • Design considerations including redundant networks, network priority settings, failover and failback, heartbeat and DNS settings, Quorum configuration, storage
  • Placement and replication, and cluster aware updates

Plan and implement highly available network services

  • Plan for and configure Network Load Balancing (NLB);
  • Design considerations including fault-tolerant networking, multicast vs. unicast configuration, state management, and automated deployment of NLB using Virtual Machine Manager service templates

Plan and implement highly available storage solutions

  • Plan for and configure storage spaces and storage pools; design highly available, replica DFS namespaces;
  • Plan for and configure multi-path I/O (MPIO);
  • Configure highly available iSCSI Target and iSNS Server;
  • Plan for and implement storage using SMB multi-channel

Plan and implement highly available roles

  • Plan for a highly available Dynamic Host Configuration Protocol (DHCP) Server, clustering, Continuously Available File Shares, and a DFS Namespace Server;
  • Plan for and implement highly available applications, services and scripts using  Application, Generic Script and Generic Service clustering roles 

Plan and implement a business continuity and disaster recovery solution

  • Plan a backup and recovery strategy;
  • Planning considerations including Active Directory domain and forest recovery, replica including using Microsoft Azure Hyper-V Recovery Manager, restore and cloning, and Active Directory object and container restore using authoritative restore and Recycle Bin;
  • Plan for and implement backup and recovery by using System Centre Data Protection Manager 

Plan and implement virtualization hosts

  • Plan for and implement delegation of virtualization environment (hosts, services and VMs), including self-service capabilities;
  • Plan and implement multi-host libraries including equivalent objects; plan for and implement host resource; optimization;
  • Integrate third-party virtualization platforms; deploying Hyper-V hosts to bare metal
  • Plan and implement virtual machines
  • Plan for and implement highly available VMs; plan for and implement guest resource optimization including shared VHDx; configure placement rules;
  • Create Virtual Machine Manager templates

Plan and implement virtualization networking

  • Plan for and configure Virtual Machine Manager logical networks, including virtual switch extensions and logical switches;
  • Plan for and configure IP address and MAC address settings across multiple Hyper-V hosts, including network virtualization; and configure virtual network optimization;
  • Plan and implement Windows Serer Gateway;
  • Plan and implement VLANs and pVLANs;
  • Plan and implement Virtual Machine(VM) networks;
  • Plan and implement converged networks

Plan and implement virtualization storage

  • Plan for and configure Hyper-V host clustered storage;
  • Plan for and configure Hyper-V virtual machine storage including virtual Fiber Channel, iSCSI and shared VHDx;storage optimization;
  • Plan and implement storage using SMB 3.0 file

Plan and implement virtual machine movement

  • Plan for and configure live and storage migration between Hyper-V hosts;
  • Plan for and manage P2V and V2V;
  • Plan and implement virtual machine migration between clouds 

Manage and maintain a server virtualization infrastructure

  • Manage dynamic optimization and resource optimization;
  • Integrate Operations Manager with System Centre Virtual Machine Manager and System Centre Service Manager
  • Update virtual machine images in libraries;
  • Plan for and implement recovery of virtualization infrastructure by using System Centre Data Protection Manager (DPM)

Design a Certificate Services infrastructure

  • Design a multi-tier Certificate Authority (CA) hierarchy with offline root CA;
  • Plan for multi-forest CA deployment; plan for Certificate Enrolment Web Services and Certificate Enrolment Policy Web services;
  • Plan for Network Device Enrolment Services;
  • Plan for certificate validation and revocation; plan for disaster recovery;
  • Plan for trust between organizations including Certificate Trust Lists (CTL), cross certifications and bridge CAs

Implement and manage a Certificate Services infrastructure

  • Configure and manage offline root CA;
  • Configure and manage Certificate Enrolment Web Services and  Certificate Enrolment Policy Web Services;
  • Configure and manage Network Device Enrolment Services;
  • Configure Online Certificates Status Protocol (OSPF) responders;
  • Migrate CA; implement administrator  role separation;
  • Implement and manage trust between organizations including Certificate Trust Lists (CTL), cross certifications and bridge CAs;
  • Monitor CA health

Implement and manage certificates

  • Manage certificate templates;
  • Implement and manage certificate deployment, validation, renewal,  revocation and publishing including Internet-based clients, CAs and network devices;
  • Configure and  manage key archival and recovery

Design and implement a federated identity solution

  • Plan for and implement claims-based authentication including planning and implementing Relying Party  Trusts;
  • Plan for and configure Claims Provider and Relying Party Trust claim rules; plan for and configure attribute stores including Active Directory Lightweight Directory Services (AD LDS);
  • Plan  for and manage Active Directory Federation Services (AD FS) certificates;
  • Plan for and implement  Identity Integration with cloud services;
  • Integrate Web ApplicationProxy with AD FS

Design and implement Active Directory Rights Management Services (AD RMS)

  • Plan for highly available AD RMS deployment; plan for AD RMS client deployment;
  • Manage Trusted User Domains;manage Trusted Publishing Domains;
  • Manage Federated Identity support; upgrade or migrate  ADRMS;
  • Decommission ADRMS

Enroll for this course now and get ahead in your career.

Enroll Now

Microsoft Certified Solution Expert