Course Outline
Module 1: Principles of Active Directory for Government
This module establishes the foundational knowledge necessary to understand all major principles of Active Directory, including management, design, and integration with other forests and cloud environments. It clearly defines and explains the key terminology and standards used in Active Directory.
Lessons
- Development of Active Directory for Government Use
- Understanding X.500 Standards
- Lightweight Directory Access Protocol (LDAP)
- Active Directory Architecture Overview
- NTLM and Kerberos Authentication Protocols
- Managing Operating Systems with Group Policy Objects (GPOs), Workplace Join, and InTune
- Types of Active Directory Groups: Domain Local, Global, and Universal
- Using and Managing Active Directory Domain Controllers for Government
- Forest and Domain Functional Levels in a Government Context
- Introduction to Active Directory Partitions and the Global Catalog for Government
- Basic Forest Structure and Design for Government
- Basic Domain Structure and Design for Government
- Basic Organizational Unit (OU) Structure and Design for Government
- Describing Key Features and Editions of Active Directory for Government
- Understanding the Principle Components of Active Directory, Including Sites, Domains, OUs, and Their Usage in a Government Setting
- Explaining the Authentication Mechanisms Used by Active Directory and How They Are Implemented in a Government Environment
- Understanding Common Design Scenarios for Implementing Active Directory in Government Settings
- Describing Techniques Used by Active Directory to Manage Computers and Network Resources in a Government Context
Module 2: Fundamentals of WAN Management with Active Directory for Government
This module explains how to use the wide area networking features of Active Directory, such as Active Directory Sites and Site Link Objects, to control and manage replication, login traffic, and site-aware applications in a government setting.
Lessons
- Understanding AD Sites and WAN Traffic Management for Government
- Basic AD Sites and Logon Traffic Management for Government
- Introduction to AD Sites and Replication Traffic for Government
- Bridgehead Servers and Site Link Objects in a Government Context
- Site-Aware Applications for Government Use
- Describing Key Features in Active Directory Used to Manage WAN Logon and Replication Traffic for Government
- Understanding the Function of the Knowledge Consistency Checker and the Inter-Site Topology Generator for Government
- Fundamentals of WAN Design with Active Directory for Government
- Resolving Common WAN Traffic Issues in a Government Environment
Module 3: Introduction to Active Directory Group Policy Object for Government
This module explains Active Directory Group Policy, its functionality, usage, and fundamental features and limitations. Students will understand all major features of GPOs and how they can be effectively implemented in a government setting to avoid common issues.
Lessons
- Introduction to Group Policy for Government
- Administrative Templates for Government Use
- Fundamental Concepts of GPO Scripts for Government
- Creating and Using GPOs in a Government Context
- Principles of Managing Multiple GPOs in a Government Setting
- Block, Enforce, and Inheritance in a Government Environment
- GPOs and Active Directory Versions for Government
- Introduction to Controlling and Installing Software with GPOs, SRP, and App Locker for Government
- Describing Key Features, Editions, and Hardware Requirements of Active Directory Group Policy for Government
- Principles of Managing Multiple GPOs and Inheritance in a Government Setting
- Upgrading and Migrating to New Administrative Templates for Government
- Understanding Block, Enforce, GPO Scripts, and Container Linking for Government
- Introduction to Software Installation with GPOs and Application Control in a Government Context
- Resolving Common Issues in a Government Environment
Module 4: Principles of Active Directory Integration for Government
This module explains how Active Directory can be integrated and used with other Active Directory Forests, X.500 Realms, LDAP services, and Cloud services in a government setting.
Lessons
- Active Directory and Cloud Services for Government
- User Principal Names (UPNs), Authentication, and Active Directory Federated Services for Government
- Active Directory and Cloud Integration for Government
Lab: Determining Your Version of Active Directory for Government
- Determine the Server Operating System Version of a Domain Controller in a Government Setting
- Determine Domain Functional Level in a Government Context
- Determine Forest Functional Level in a Government Context
- Raise Domain and Forest Functional Levels for Government Use
- Create a Logical Active Directory Diagram for Government
Lab: Authenticating with a UPN Logon for Government
- Authenticate and Login Using Both Pre-Windows 2000 and User Principal Name (UPN) Methods in a Government Setting
- Understand the Use and Limitations of Active Directory Authentication Methods in a Government Context
Lab: Exploring Active Directory Objects and Utilities for Government
- Explore and Use the Active Directory Users and Computers Utility in a Government Setting
- Create OU Containers, Users, and Delegate Rights and Permissions in a Government Environment
- Explore the Active Directory Administrative Center for Government
- Understand Common Issues in a Government Context
Lab: Exploring the Default GPO Configuration for Government
- Explore and Use the Group Policy Management Editor in a Government Setting
- Explore and Understand the Settings in the Default Active Directory GPOs for Government
Lab: Creating Your Own GPO for Government
- Create a New Group Policy Object Using the Group Policy Management Editor for Government
- Apply and Test the Application of the New GPO in a Government Setting
- Describe Key Features of Active Directory that Can Be Used for Enhanced WAN Resource Sharing in a Government Context
- Understand the Term Cloud and the Advantages of Cloud Services for Government
- Understand the Principles of Authentication Outside of an Active Directory Forest for Government
- Describe the Role of Kerberos, Single Sign-On (SSO), and User Principal Names (UPNs) in a Government Setting
- Experience and Use the Principal Active Directory Management Tools Described in the Course for Government
- Create, Edit, and Apply a Group Policy Object for Government Use
Requirements
- Fundamental knowledge of networking principles for government.
- Basic familiarity with the Windows operating system.
- Elementary understanding of security concepts, including authentication and authorization.