• No products in the basket.

70 413 Video for Designing and Implementing a Server Infrastructure

0( 0 REVIEWS )
70 413 Video for Designing and Implementing a Server Infrastructure


Successfully completing Microsoft’s range of exams is undeniable proof that you are an expert. Are you ready to rise in the ranks and firmly establish yourself at making significant job role decisions around implementing server infrastructure?

The  70-413 Designing and Implementing a Server Infrastructure  is part one of a series of two exams to test the skills and knowledge necessary to design, implement, and maintain a Windows Server 2012 infrastructure in an enterprise environment. Successfully completing this exam along with the other exam will validate that learners have the skills and knowledge necessary for designing, deploying, and maintaining infrastructure services in a Windows Server 2012 environment.

The course will enhance your IT skills and improve your knowledge. It will provide you with the best opportunity to get hands-on experience and be able to use your skills in a highly virtualised environment.

Course Content

The course content covers a broad range of topics on how to design and plan an automated server installation strategy, plan and implement server infrastructure upgrade, storage, migration and file services, planning for external user access and designing a physical AD infrastructure to list down just a few.

We offer hundreds of practice questions, simulated certification exams and extensive study material. Our latest practice exam online can be your first step to gain Microsoft certification and help you pass the exam 100%.

We recommend that learners review the exam preparation tutorial and become familiar with the resources before scheduling the exam. In addition, extra time will be given, so that you can enjoy the flexibility of training and studying at your own pace.

The course is internationally recognised and accredited to a training organisation and you will be issued an internationally recognised qualification following full completion of 70-413 Designing and Implementing a Server Infrastructure.

Why consider 1Training?

As improvements and advancements are made in technology, online courses are no longer just conventional means of studying at affordable costs. In many aspects online training offers superiority to traditional learning. There is an effectiveness and convenience that traditional learning cannot provide. The overall convenience and flexibility makes it a superior learning method.

1Training offers the most convenient path to gain an internationally recognised qualification that will give you the opportunity to put into practice your skill and expertise in an enterprise or corporate environment. You can study at your own pace at 1Training and you will be provided with all the necessary material, tutorials, qualified course instructor and multiple free resources which include Free CV writing pack, Nus Discounted Card, Free career support and course demo to make your learning experience more rewarding.

What are the entry requirements?

Learners should have the basic skills and knowledge necessary to design, implement, and maintain a Windows Server 2012 infrastructure in an enterprise scaled environment.

Key points of the course

  • Learners can enjoy in-depth training by a Microsoft qualified instructor
  • Repeat or rewind all your lectures
  • This gives you all the benefit of hands-on training with the flexibility of doing it at your convenience 24/7

This Course is intended for?

  • IT assistants with previous experience of Windows server operating systems
  • IT professionals who want to qualify in the exam
  • Learners with basic AD DS and networking experience
  • Technical assistants looking to implement server infrastructure services
  • Anyone aspiring to expand their knowledge in Microsoft Certified Solutions

Learning Outcomes?

  • Plan and deploy a server infrastructure
  • Design and implement network infrastructure services
  • Design and implement network access services
  • Design and implement an active directory infrastructure

Course Curriculum

  • Module 01: Server Infrastructure – Upgrade and Migration
  • Module 02: Storage and File Services
  • Module 03: Network Infrastructure Services
  • Module 04: Planning for External User Access
  • Module 05: Design and Implement Logical AD Infrastructure
  • Module 07: Designing a Physical AD Infrastructure
  • Module 08: Domain Controllers

Access Duration

The course will be directly delivered to you, and you will have unlimited access 24/7. You have 12 months access to the online learning platform from the date you joined the course, and you can do it from anywhere, anytime.


This exam measures your ability to accomplish the technical tasks listed under Learning Outcomes. Microsoft has written out these categories and assigned a percentage to each one. The percentage represents the weight they carry within the exam.

At the end of the course learners will be assessed by an official exam. Please note that we do not provide the official exam, which you will need to purchase separately. You can purchase the exam here:


Those who successfully complete the exam will be awarded a certificate in 70-413 Designing and Implementing a Server Infrastructure.

Awarding Body

The certificate will be awarded by Microsoft. You can make your CV standout with an internationally recognised qualification and employers will be encouraged to see how you have expanded your skills in your chosen field.

Career Path and Salary

Once you successfully complete the exam you will be qualified to become a Database Administrator, Computer Support Specialist and Information Security Analyst and can work for a number of IT enterprises. The qualification will also put you in line to demand a higher salary or job promotion. The average UK salary for a Computer Support Specialist is £25,413 per year according to

Key Features

Gain an accredited UK qualification

Access to excellent quality study materials

Learners will be eligible for TOTUM Discount Card

Personalized learning experience

One year’s access to the course

Support by phone, live chat, and email

Course Curriculum Total Units : 345
➤ Module 01: Server Infrastructure - Upgrade and Migration
1.1 Planning for Deployment
1.2 Windows Server Editions
1.3 Choice Summary
1.4 Pre-installation Requirements
1.5 Windows Server 2012 Upgrades
1.6 Upgrade Options
1.7 Migration to Windows Server 2012
1.8 Roles That Can Be Migrated
1.9 Roles That Can Be Combined on a Single Server
1.10 MAP Toolkit
1.11 Windows Assessment and Deployment Kit (ADK)
1.12 Windows Server 2012 Licensing
1.13 Activation Strategies
1.14 Considerations for Virtualization
1.15 Virtualization Planning
1.16 Hyper-V Virtual Licensing
1.17 Planning Hardware for Hyper-V Hosts
1.18 Deployment Considerations for Virtualized Workloads
1.19 Tools for Deploying Virtual Machines
1.19 Tools for Deploying Virtual Machines
1.21 Cloning Domain Controllers
1.22 Demo – Cloning Domain Controllers
1.23 VHDs
1.24 VHDXs
1.25 Imaging Strategies
1.26 Windows Imaging Format
1.27 WIM File Structure
1.28 High Touch Retail Media Deployments
1.29 High Touch with Retail Media Deployment Steps
1.30 High Touch Standard Image Deployment
1.31 High Touch with Standard Image Process
1.32 Lite Touch
1.33 Zero Touch High-Volume Deployments
1.34 Designing the ZTI Environment
1.35 Automated Deployment Methods
1.36 Types of Images
1.37 Choosing a Deployment Method
1.38 Deployment Scenarios
1.39 Tools for Image-Based Installation of Windows
1.40 ImageX Tasks
1.41 Image Servicing and Management: DISM
1.42 Windows AIK
1.43 Tools Available in Windows AIK
1.44 Demo – Installing Windows AIK
1.45 Windows PE
1.46 Windows DS
1.47 Windows DS Architecture
1.48 New Features in Windows DS
1.49 MDT 2012
1.50 Configuration Manager
1.51 Configuration Manager Task Sequence and Packages
1.52 Module 01 Review
➤ Module 02: Storage and File Services
2.1 Direct Attached Storage (DAS)
2.2 Network Attached Storage (NAS)
2.3 Storage Area Network (SAN)
2.4 SAN Components
2.5 iSCSI
2.6 iSCSI Target Server and iSCSI Initiator
2.7 iSCSI Target Server Scenarios
2.8 Windows Server 2012 R2 New and Changed Functionality
2.9 iSCSI and High-Availability
2.10 Defense in Depth
2.11 DFS
2.12 DFSR Replication
2.13 Standalone DFS Namespace
2.14 Domain DFS Namespace
2.15 DFS Uses
2.16 Demo – Deploying and Configuring DFS
2.17 BranchCache
2.18 BranchCache Modes
2.19 Procedure Reference to Install
2.20 Demo – Implementing BranchCache
2.21 Discretionary Access Control
2.22 Dynamic Access Control
2.23 DAC Scenarios
2.24 DAC Requirements
2.25 Central Access Policy
2.26 Creating Central Access Policies
2.27 Implementing Central Access Policy
2.28 DAC Claims
2.29 Creating Claims
2.30 Resource Properties
2.31 Accessing Resources with DAC
2.32 Enabling Support in AD DS KDC
2.33 Creating Resource Properties
2.34 Central Access Control Rules
2.35 File Access Auditing
2.36 Plan for Access Denied Assistance
2.37 Access Control Prerequisites
2.38 Module 02 Review
➤ Module 03: Network Infrastructure Services
3.1 Best Practices for Designing an IPv4 Addressing Scheme
3.2 How to Plan and Implement the Appropriate Addressing Scheme
3.3 Selecting an Address Scheme (eNotes)
3.4 DHCP Server Placement Infrastructure
3.5 DHCP Redundancy Options
3.6 DHCP Failover
3.7 DHCP Super Scopes
3.8 DHCP Reservations
3.9 DHCP Option Classes
3.10 IPv6 Autoconfiguration
3.11 Autoconfigured Address States
3.12 Improved PowerShell Commands for DHCP in Server 2012 R2
3.13 New PowerShell Commands for DHCP
3.14 DHCP Guidelines
3.15 IPAM Definition and Benefits
3.16 IPAM
3.17 IPAM and DHCP
3.18 IPAM Components
3.19 Role Based Access Control
3.20 Role Based Access Control Roles Provided by Default
3.21 IPAM Prerequisites
3.22 IPAM Database Support
3.23 IPAM Users and Groups
3.24 Manual Provisioning for IPAM
3.25 IPAM Design Considerations
3.26 IPAM Views
3.27 IPAM Monitoring
3.28 DNS Namespace Design
3.29 Evaluating a Namespace Design
3.30 DNS Namespaces (eNotes)
3.31 NetBIOS Name Resolution
3.32 GlobalNames
3.33 WINS vs. GNZ
3.34 DNS and AD DS
3.35 DNS Records Needed by AD
3.36 Demo – DNS Records Needed by AD
3.37 DNS Design Considerations
3.38 Integrating Multiple DNS Namespaces
3.39 DNS Application Partitions
3.40 DNS Server Capacity Planning
3.41 Demo – Performance Monitor and DNS
3.42 DNS Server Roles
3.43 DNS Zone Types
3.44 DNS Zone Delegation
3.45 Zone Transfers and Replications
3.46 DNS BIND Versions
3.47 Zone Transfer Security
3.48 Root Hints Servers
3.49 Optimizing DNS Root Hints
3.50 DNS Forwarders | Conditional | Stub Zones
3.51 Demo – Configuring Zone Transfers
3.52 NetBIOS Name Resolution (Cont.)
3.53 Demo – Creating DNS Zones
3.54 Optimizing Queries
3.55 Optimizing DNS Server
3.56 Optimizing Active Directory Integrated Zones
3.57 DNS and High-Availability
3.58 Common DNS Security Issues
3.59 DNS Security Levels
3.60 Additional DNS Security Settings
3.61 Module 03 Review
➤ Module 04: Planning for External User Access
4.1 Types of Network Access Services
4.2 Types of Users
4.3 Considerations of Data to Access
4.4 Remote Access Methods
4.5 Tunneling Protocols: PPTP
4.6 Tunneling Protocols: L2TP
4.7 Tunneling Protocols: SSTP
4.8 Tunneling Protocols: IKEv2
4.9 Authentication Protocols and Methods
4.10 Encryption Protocols and Methods Set
4.11 Planning for Remote Access
4.12 New Features in Remote Access Windows Server 2012
4.13 New Features Windows 8.1
4.14 Placement of VPN Servers
4.15 Network Access Policies
4.16 Connection Request Policies
4.17 How Policies are Applied
4.18 Order of Applying Connections
4.19 Demo – Creating a VPN
4.20 Perimeter Networks
4.21 Common Perimeter Network Applications and Protocols
4.22 Types of Firewall Configurations
4.23 Windows Firewall with Advanced Security
4.24 Secure Outside Access Options
4.25 DirectAccess
4.26 DirectAccess Server Functions
4.27 DirectAccess Infrastructure Prerequisites
4.28 DirectAccess Server Prerequisites
4.29 DirectAccess Client Prerequisites
4.30 Methods of Client Connections
4.31 DirectAccess Client Connections
4.32 Planning DirectAccess
4.33 Getting Ready: DirectAccess
4.34 Configure DirectAccess Server
4.35 DirectAccess with a Single Network Card
4.36 RADIUS Authentication and NPS
4.37 NPS RADIUS Server
4.38 RADIUS Proxy
4.39 RADIUS Client
4.40 RADIUS Client Examples
4.41 Connection Request Policies Conditions | Settings
4.42 Conditions | Settings | Default Connection Policy
4.43 Connection Request Processing
4.44 Network Security
4.45 Defense in Depth
4.46 Network Policies
4.47 Points of Failure for Security Policies
4.48 Employee Training
4.49 Reasons For Network Attacks
4.50 Types of Network Attacks
4.51 STRIDE Model
4.52 Security Measures
4.53 Windows Firewall
4.54 Connection Security Rules
4.55 IPsec
4.56 Server and Domain Isolation
4.57 Authentication Options
4.58 Best Practices
4.59 Demo – Connection Security Rules
4.60 Module 04 Review
➤ Module 05: Design and Implement Logical AD Infrastructure
5.1 AD DS Forest Designed
5.2 Forest Models: Single
5.3 Forest Models: Organizational
5.4 Forest Models: Resource Forest Model
5.5 Forest Models: Restricted Access
5.6 Benefits of Multiple Forests
5.7 Guidelines for Designing AD DS Forests
5.8 Demo – Creating a Forest Root
5.9 Demo – Viewing and Editing the Schema
5.10 Forest Trusts
5.11 Security Considerations Forest Trust
5.12 Accessing Resources in Another Forest
5.13 Forest Trust Guidelines
5.14 Demo – Creating a Forest Trust
5.15 AD DS Domains
5.16 Domain Models
5.17 Forest Root Domains
5.18 Password Policies
5.19 Demo – Install Second Domain Controller to Domain
5.20 Items That Affected Domain Design
5.21 Replication and WAN Links
5.22 Trust Relationships
5.23 Trusts within a Domain
5.24 Trusts Between Domains
5.25 Shortcut Trusts
5.26 External Trusts
5.27 Realm Trusts
5.28 Best Practice for Domain Trusts
5.29 AD Delegation Options
5.30 Delegation Models
5.31 Examples of Delegation
5.32 Administrative Models
5.33 How to Start Planning Resource Management
5.34 Administrative Permissions
5.35 Branch Office Management
5.36 OU Strategies
5.37 Users and Permissions
5.38 OU Security Descriptors
5.39 Demo – Exploring AD Permissions within OU Structure
5.40 Delegation Administrative Methods
5.41 Where OU Permissions Fall
5.42 Examples of Permissions at OU Level (eNotes)
5.43 OU Accidental Deletion
5.44 Protecting OUs using PowerShell
5.45 Demo – Protecting OUs using PowerShell
5.46 Active Directory Groups
5.47 Group Scope and Nesting
5.48 Demo – Creating Groups with Active Directory Administration Center
5.49 Demo – Creating Groups with PowerShell
5.50 Group Strategy
5.51 Default Groups
5.52 Protected Users Security Group
5.53 Protected Users Security Group User Limitations
5.54 Special Identities
5.55 Computer Accounts
5.56 Best Practices
5.57 Module 05 Review
➤ Module 06: AD GPO
6.1 Factors for Group Policy Design
6.2 Planning for Desktop Environments with Group Policy
6.3 Planning Group Policy for Administrative Models
6.4 Group Policy Components
6.5 Uses for Group Policy
6.6 Demo – Group Policy Categories
6.7 Group Policy Templates
6.8 Nodes: Computer
6.9 Nodes: User
6.10 Group Policy Preferences
6.11 Configuring Group Policy Preference
6.12 GPO Design Considerations
6.13 Group Policy Inheritance
6.14 Group Policy Filtering
6.15 Group Policy Processing
6.16 Group Policy, Backup and Restore, and Documentation
6.17 PowerShell Cmdlets
6.18 Migrating GPOs to a New Domain Set
6.19 Migration Table Editor
6.20 Administration of Group Policy
6.21 Slow Link Detection
6.22 Module 06 Review
➤ Module 07: Designing a Physical AD Infrastructure
7.1 AD DS Sites
7.2 Location of AD DS Site Configuration
7.3 Replication Traffic
7.4 Service Localization
7.5 Designing AD DS Sites
7.6 Factors that Determine AD DS Site Design
7.7 Automatic Site Coverage
7.8 AD DS and DNS
7.9 AD DS Site Considerations
7.10 Domain Controller Placement
7.11 AD DS Replication Components: Connection Objects
7.12 AD DS Replication Components: Notification and Polling
7.13 KCC
7.14 ISTG – Intersite Topology Generator
7.15 Replication Topologies: Ring
7.16 Replication Topologies: Hub and Spoke
7.17 Replication Topologies: Full Mesh
7.18 Replication Topologies: Hybrid
7.19 Replication Protocols
7.20 Notes on SMTP
7.21 Replication and RODCs
7.22 Replication and Global Catalogs
7.23 Replication and SYSVOL
7.24 Site Links
7.25 Bridgehead Servers
7.26 Site Link Bridging
7.27 Virtualized Domain Controllers
7.28 Cloning Virtual Domain Controllers
7.29 Process: Cloning Server 2012 VDC
7.30 DcCloneConfig.xml Syntax
7.31 DcCloneConfig.xml Parameters
7.32 Domain Controller Safe Backup and Restore
7.33 PowerShell for Hyper-V Snapshot Management
7.34 Module 07 Review
➤ Module 08: Domain Controllers
8.1 Hardware Requirements for Domain Controllers
8.2 Installing Server Core
8.3 FSMO Roles
8.4 FSMO Locations
8.5 RODC Limitations
8.6 Tools For Monitoring Domain Controllers
8.7 Best Practices Analyzer
8.8 Demo – Best Practices Analyzer
8.9 Security Best Practices
8.10 High-Availability
8.11 Defining High-Availability Needs for Active Directory
8.12 Active Directory, High-Availability
8.13 DNS High-Availability
8.14 Backup and Recovery AD DS
8.15 Types of Backups
8.16 Backing Up Critical Volumes
8.17 Active Directory Restores
18.18 Restoring Active Directory
18.19 Active Directory Recycle Bin
8.20 Module 08 Review
8.21 Course Closure
WhatsApp chat