Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4

Train Signal Microsoft Exchange Server 2010 Design And Deployment Training-HELL

Posted By: EnKteam
Train Signal Microsoft Exchange Server 2010 Design And Deployment Training-HELL

Train Signal Microsoft Exchange Server 2010 Design And Deployment Training-HELL
English | Release Date: 27 Sep 2010 | 1DVD | ISO | 2.48GB | 5% Recovery

Our Comprehensive Exchange Server 2010 Training Teaches You How to Design and Deploy Exchange 2010 Infrastructure, Security for Your Exchange Organization, Exchange 2010 Availability and Recovery, Message Compliance, System Monitoring, Reporting, and Much More! Plus, get Complete 70-663 Exam Coverage!

Screensshots (Click on to enlarge):

Train Signal Microsoft Exchange Server 2010 Design And Deployment Training-HELL

Train Signal Microsoft Exchange Server 2010 Design And Deployment Training-HELL


Course Outline
Video 1 - Getting Started with Exchange 2010 Design and Deployment Training
In this video you will meet your instructor and gain an inside view on his passion for Exchange and his experience in working with it for over a decade. In addition, you will begin your shift in thinking from that of an Exchange Administrator to that of an Exchange Design and Deployment expert.
* About Your Instructor
* The Course Building Blocks
* Questions Before Getting Started
* Additional Resources

Video 2 - The Course Scenario
This video begins with an explanation of the value of scenario-based training, which is a key to all Train Signal video series. We then begin to lay out our scenario for this course which has us working as Exchange design consultants with several interesting and unique clients. The purpose of the scenario is to help you to apply your Exchange 2010 design knowledge in the “real world”.
* The Value of Scenario-Based Training
* Our Scenario: An Exchange Design Consulting Firm
* Our Client Base
* Our Methodology and Way of Operating

Video 3 - Lab Setup
In this video you will learn about the hardware and software you will need to have in your environment to enable you to better follow along with the course. Also, you will learn how to use physical or virtual machines to build out a lab similar to the lab used in the course or a "shoe-string budget lab" that will allow you to work through the course scenarios without "breaking the bank".
* Ways to Set Up Your Lab
* The Ultimate Lab Setup
* Inner Details of Setup
* Configuring Servers
* The Shoe-String Budget Lab

Video 4 - Analyzing Deployment Needs
In this video we will review a cornucopia of different design considerations and boil those down into ‘needs’ of our clients. We will review server roles, email address policies, accepted domains (authoritative, internal and external) and remote domains. Then we will begin looking at both the logical and physical aspects of Active Directory for pre-deployment considerations. We will create a list of questions for our clients and review their responses to those questions before offering our initial design plan.
* A Review of Server Roles
* Email Address Policies
* Accepted Domains
* Remote Domains
* Active Directory
* Network and Directory Server Requirements
* Questions to Determining Client Needs
* A Review of Client Responses
* An Initial Design Plan

Video 5 - Mailbox and Client Access Server Design Concerns
In this video we will consider the important design considerations for our Mailbox and Client Access Server roles. The mailbox role is all about storage (performance, size, type) whereas the Client Access Server (CAS) role is all about options and what the client needs to deploy. We will review the different hardware requirements for your Exchange servers, processor core ratios, disk and capacity planning and CAS role features. We will create a list of questions for our clients and review their responses to those questions before offering our hardware recommendations.
* Hardware Requirements (Overall, Processor and Memory)
* Disk and Capacity Planning
* Mailbox Storage Design Process and Testing
* Storage Architecture
* The CAS Role and Features
* Questions to Determine Client Needs
* A Review of Client Responses
* Design Solutions
* CAS Solutions Including (OWA, ActiveSync, Outlook Anywhere, IMAP/POP)

Video 6 - Transitioning and Coexistence Strategies
In this video we discuss the upgrade terminology and necessary requirements for transitioning to Exchange 2010. The transition process occurs in stages and during that process, from the moment your first Exchange 2010 server is installed, your organization is in a state of coexistence. We will review the necessary steps to prepare your environment for that first server. Then we will discuss what is needed to move beyond coexistence into a pure Exchange 2010 environment.
* Upgrade Terminology
* Key Minimum Requirements
* The Basic Breakdown in Steps
* Legacy Host Names and Certificates for CAS
* Meet the Deployment Assistant
* Online Mailbox Moves
* Pre-Removal Tasks
* Questions to Determine Client Needs
* A Review of Client Responses
* Design Solutions

Video 7 - Active Directory Preparation
In this video we review the process and permissions necessary to upgrade the Schema for our Active Directory as well as our AD as a whole, including permissions, configuration changes, domain adjustments and more. These changes are necessary to install Exchange 2010 into an existing AD environment. In addition, we will discuss DNS configuration needs and the benefits of a federation trust.
* Updating Your Schema and Preparing the Domain
* Permission Requirements
* DNS Configuration
* Understanding Federation
* Creating a Federation Trust
* Organization Relationships vs. Sharing Policies
* Questions to Determine Client Needs
* A Review of Client Responses
* Design Solutions

Video 8 - Deploying the Mailbox Server Role
In this video we are going to take a look at more than the literal installation of a Mailbox server role but the actual configuration possibilities that you can deploy within your organization. We will focus in on database and mailbox design limitations, the use of address lists, Public Folder management and the creation of various recipient types within your organization.
* Database and Mailbox Limitations
* The Key Focus Points of Public Folders
* The Difference Between Public Folder Replication and Referral
* A Description of Address Lists and the OAB
* A Review of Recipient Types
* Questions to Determine Client Needs
* A Review of Client Responses
* Design Solutions

Video 9 - Deploying Non-Mailbox Server Roles
In this video we review the four non-mailbox server roles and look at what follow-through deployment is necessary to ensure they function as planned once installed. In many cases we will be looking at ports that need to be opened depending on the role and/or the feature(s) that role must provide. We need to consider various services and features we want to enable and, in the case of Transport servers, the direction and configuration of Send/Receive connectors.
* Client Access Server Configuration
* Hub Transport Server Configuration
* Transport Server Ports and Encryption
* Edge Transport Configuration
* Unified Messaging Configuration
* Questions to Determine Client Needs
* A Review of Client Responses
* Design Solutions

Video 10 - Designing and Deploying Message Security
In this video we consider the traditional methods for providing message security, as well as modern options that Microsoft feels are viable. This will include a discussion of Transport Layer Security and S/MIME to start. And then we will discuss the value of modern Information Rights Management (IRM) through Active Directory Rights Management Services (AD RMS). We will consider the ability users have to manually apply message security, as well as the value of Outlook protection rules and transport protection rules. We will also review mobile device protection as provided within ActiveSync policies.
* Transport Layer Security (TLS)
* S/MIME Encryption
* Information Rights Management (IRM)
* IRM Strengths and Weaknesses
* AD Rights Management Services (AD RMS)
* Applying IRM
* Mobile Security
* Questions to Determine Client Needs
* A Review of Client Responses
* Design Solutions

Video 11 - Designing and Deploying the Exchange Permissions Model
In this video we review Role Based Access Control (RBAC) starting with built-in role groups and roles and moving toward the flexibility we have to create our own role groups and roles. We will demonstrate some new tools to assist us in knowing the various entries that exist for each built-in role so that we can make wise configuration decisions when using these for parent roles that we base our customized roles off of. We will also take a look at Public Folder permission settings and methods for applying these within our organization.
* A Brief History of Permissions in Exchange
* The New Permissions Model
* Using Predefined Role Groups and Roles
* Predefined Role Groups
* Built-in Role Group Definitions
* The Triangle of Power
* Understanding RBAC
* Creating a Custom Role Group and/or Role
* Getting a Better Handle on RBAC
* Public Folder Permissions: Rights vs. Roles
* Questions to Determine Client Needs
* A Review of Client Responses
* Design Solutions

Video 12 - Design and Deploy Message Hygiene
In this video we review the various forms of message hygiene that are built into Exchange 2010. We will talk about some Microsoft offerings for anti-virus solutions, along with a few third party offerings. We will review the nine anti-spam agents that are built-into the Edge Transport role and can also be enabled on the Hub Transport roles. We will discuss a few tips and tricks to keep your organization safe and clean and explain the value of safelist aggregation as well.
* A Review of the Tools
* Anti-Virus and/or Anti-Spam Solutions
* Anti-Spam Agents
* Safelist Aggregation
* Turn On Hub Transport Anti-Spam Agent
* Questions to Determine Client Needs
* A Review of Client Responses
* Design Solutions

Video 13 - Designing High Availability for Mailbox Servers
In this video we will review the overall benefit of High Availability and Exchange 2010. We will discuss how Database Availability Groups (DAG) work and what basic requirements need to be met to implement this form of HA within your organization. We will also review Disaster Recovery solutions available with Exchange 2010. Toward the end of this lesson we will discuss the first phase of our scenario design, where we will establish prerequisites for Mailbox server HA.
* What is High Availability
* Continuous Replication
* Database Availability Group (DAG) Features
* How DAG Works
* Steps to Create a Database Availability Group
* Backup Technology Support
* Windows Server Backup
* Data Protection Manager (DPM) 2010 and Beyond
* Server Recovery
* Recovery Database (RDB)
* Database and Dial Tone Portability
* Questions to Determine Client Needs
* A Review of Client Responses
* Design Solutions (Phase 1)

Video 14 - Designing High Availability for Non-Mailbox Servers
In this video we will review the High Availability features that are built into Exchange 2010 to provide redundancy and resiliency of non-Mailbox server roles. We will discuss the various design elements involved in deploying these server roles with load balancing and HA in mind. We will talk about some important prerequisites that have to be met if you are going to ensure true redundancy as well. Toward the end of the lesson we will design Phase 2 of our scenario design and even discuss some of the Microsoft design decisions for their personal deployment of Exchange 2010 with HA.
* Two By Two
* Shadow Redundancy
* Hub Transport HA
* Edge Transport HA
* Client Access HA
* CAS Array in Exchange 2010
* Unified Messaging HA
* Load Balancing
* Questions to Determine Client Needs
* A Review of Client Responses
* Design Solutions (Phase 2)

Video 15 - Designing and Deploying Message Compliance
In this video discuss the tools provided within Exchange to allow us to achieve compliance with regulatory messaging laws. We will review the concepts of Messaging Records Management (MRM), Transport Rules and Message Classifications, and Multi-Mailbox Search for Discovery. Our primary focus will be Transport Rules, which assist with ethical wall regulations and can allow us to do everything from the placement of a disclaimer on all outgoing email to preventing one group in your organization from emailing another in the same organization.
* Message Compliance Begins With Legislation
* Built-in Technology for Exchange 2010
* Messaging Records Management (MRM)
* Transport Rules and Message Classifications
* Multi-Mailbox Search
* Transport Architecture
* Practical Transport Rules
* Message Classifications
* MailTips
* Questions to Determine Client Needs
* A Review of Client Responses
* Design Solutions

Video 16 - Designing and Deploying Auditing and Discovery
In this video we will review some auditing features of Exchange 2010. For example, we will look at how to view changes to the Exchange Server through Administrator Audit Logging. We will look at mobile connectivity logging through IIS. We will examine mail flow concerns through protocol logging on Send/Receive connectors as well. Then we will focus time on Discovery through Multi-Mailbox Search and review the differences between placing a mailbox on retention hold as opposed to legal hold.
* Administrator Audit Logging
* Auditing ActiveSync Mobile Connectivity
* Protocol Logging
* Multi-Mailbox Search for eDiscovery
* Retention Hold vs. Legal Hold
* Questions to Determine Client Needs
* A Review of Client Responses
* Design Solutions

Video 17 - Designing and Deploying Journaling, Archiving and Messaging Records Management (MRM)
In this video we will continue to focus on message compliance by discussing the value of Journaling, Archiving and Messaging Records Management (MRM). MRM comes in two different flavors in Exchange 2010, MRM 1.0 which is through Managed Folders and MRM 2.0 through Retention Policies. We will discuss the differences between the two and when you might use one or the other depending on the environment.
* Journaling: Standard and Premium
* The PST Nightmare
* Understanding Personal Archive
* Enable Personal Archive
* Archive Enhancements in SP1
* Messaging Records Management
* Managed Folders and Retention Policies
* Retention Tags and Retention Policies
* MRM Revised in Exchange 2010 SP1
* Questions to Determine Client Needs
* A Review of Client Responses
* Design Solutions

Video 18 - Designing and Deploying Monitoring and Reporting
In this video we will consider some of the tools that we have in our Exchange Toolbox that can assist us with monitoring and reporting. We will also consider Test cmdlets from the Exchange Management Shell for connectivity confirmation and a variety of other command-line tests. We will look at tools that we are familiar with (like the Performance Monitor) along with tools designed specifically to work with Exchange like the Best Practices Analyzer. Finally, we will review some third-party solutions that will take our monitoring to the next level depending upon our needs.
* Dedicated and Independent Tools
* Test Cmdlets
* Performance Monitor and Troubleshooter
* Exchange Best Practices Analyzer (ExBPA)
* Diagnostic Logging
* Third-Party Monitoring Tools
* Questions to Determine Client Needs
* A Review of Client Responses
* Design Solutions

Video 19 - Preparing for the Pro: Designing and Deploying Messaging Solutions (70-663) Certification Exam
In this video you will gain some insight into the structure of the certification exam for Designing and Deploying Messaging Solutions with Exchange 2010. We will review some tips and pointers that you should consider before taking the exam.
* About the Exam
* Mapping Exam Objectives to the Course Topics Covered
* Preparing for Exam Day
* Credit Toward Certification

Video 20 - Next Steps
Reaching the end of the course does not mean the learning has to end! In this video you will discover the "next steps" for continuing your growth with Exchange Server 2010.
* Looking Back
* The Road Ahead
* We Value Your Opinion


Homepage
Download from FileServe:
http://www.fileserve.com/file/a9pfXHZ/tses10dadt-HELL.part01.rar
http://www.fileserve.com/file/JVJqMEU/tses10dadt-HELL.part02.rar
http://www.fileserve.com/file/Hm9ZH7F/tses10dadt-HELL.part03.rar
http://www.fileserve.com/file/DCtQNTc/tses10dadt-HELL.part04.rar
http://www.fileserve.com/file/AKT52km/tses10dadt-HELL.part05.rar
http://www.fileserve.com/file/VAjvY6d/tses10dadt-HELL.part06.rar
http://www.fileserve.com/file/FyZK7nA/tses10dadt-HELL.part07.rar
http://www.fileserve.com/file/nsenVbb/tses10dadt-HELL.part08.rar
http://www.fileserve.com/file/j5mxYgD/tses10dadt-HELL.part09.rar
http://www.fileserve.com/file/rwMRSh8/tses10dadt-HELL.part10.rar
http://www.fileserve.com/file/42wEQ7k/tses10dadt-HELL.part11.rar
http://www.fileserve.com/file/deVspe9/tses10dadt-HELL.part12.rar
http://www.fileserve.com/file/D7Nbjvt/tses10dadt-HELL.part13.rar

Download from Hotfile:
http://hotfile.com/dl/72500491/b2fb6cd/tses10dadt-HELL.part01.rar.html
http://hotfile.com/dl/72500495/0e05e11/tses10dadt-HELL.part02.rar.html
http://hotfile.com/dl/72500494/2e32e00/tses10dadt-HELL.part03.rar.html
http://hotfile.com/dl/72500496/88ed4ad/tses10dadt-HELL.part04.rar.html
http://hotfile.com/dl/72500498/0c49c00/tses10dadt-HELL.part05.rar.html
http://hotfile.com/dl/72500492/fab6423/tses10dadt-HELL.part06.rar.html
http://hotfile.com/dl/72500493/b687750/tses10dadt-HELL.part07.rar.html
http://hotfile.com/dl/72500497/a059f70/tses10dadt-HELL.part08.rar.html
http://hotfile.com/dl/72501241/4da89b1/tses10dadt-HELL.part09.rar.html
http://hotfile.com/dl/72501266/b412cfb/tses10dadt-HELL.part10.rar.html
http://hotfile.com/dl/72501279/e111c14/tses10dadt-HELL.part11.rar.html
http://hotfile.com/dl/72501280/0b9b10a/tses10dadt-HELL.part12.rar.html
http://hotfile.com/dl/72501286/894bc03/tses10dadt-HELL.part13.rar.html

No Password. No Mirrors Please.