A. Windows Server 2008 R2, Server Virtualization 659 B. Windows Server 2008 R2, Desktop Virtualization 669 A. Windows Server 2008 R2, Server Virtualization 659 Installing and Configuring Host and Parent Settings (18%) Add the Hyper-V role on Windows Server 2008 R2. This objective may include but is not limited to: installing and configuring Hyper-V on Server Core, verifying BIOS settings (i.e. DEP), adding the Hyper-V role using Virtual Machine Manager, configuring Hyper-V Server R2, identifying hardware requirements Enable remote management. This objective may include but is not limited to: deploying Virtual Machine Manager Agent, configuring firewall rules, configuring Virtual Network Manager settings Configure virtual networks and VLAN security. This objective may include but is not limited to: configuring Media Access Control (MAC) address pools, configuring network locations, configuring VLAN tags, configuring VLAN security, configuring virtual networks Configure storage. This objective may include but is not limited to: configuring Multi Path Input Output (MPIO), executing the mpiocpl.exe command, dynamic I/O redirection, iSCSI initiator, executing the iscsicli.exe command Configuring Child Settings (18%) Configure child resources. This objective may include but is not limited to: configuring disks, networks, CPU, and memory Configure child storage. This objective may include but is not limited to: configuring Dynamic VM storage, creating differencing disks, configuring pass-through disks, taking snapshots, managing GUIDs, managing logical unit numbers (LUNs), editing VHDs, copying physical disks to VHDs Configure child network adapters. This objective may include but is not limited to: creating synthetic and emulated network adapters, configuring MAC spoofing, configuring VLAN ID, configuring Jumbo frame, configuring TCP Offloading Engine (TOE) Create and deploy virtual machines. This objective may include but is not limited to: creating, cloning, deploying, and saving virtual machines using Virtual Machine Manager; creating virtual machines using Hyper-V Manager, configuring Self-Service Portal, scripting and deploying virtual machines using Windows PowerShell Managing and Monitoring Virtual Environments (18%) Solve performance and resource issues. This objective may include but is not limited to: configuring Performance and Resource Optimization (PRO), monitoring the environment by using System Center Operations Manager 2007 R2, configuring event triggers, allocating resources by using Virtual Machine Manager, monitoring performance and diagnosing issues by using Performance Monitor or Resource Monitor Configure delegation of rights. This objective may include but is not limited to: creating user policies for Self Service Portal, creating and managing templates, managing and replicating libraries in Virtual Machine Manager Create roles and configure authorization rights. This objective may include but is not limited to: creating roles and delegating rights using Authorization Manager (AzMan), delegating rights manually Manage non-Hyper-V-aware virtualization hosts. This objective may include but is not limited to: managing ESX/VI3 VMware hosts by using Virtual Machine Manager, managing Virtual Server 2005 R2 hosts using Virtual Machine Manager Ensuring High Availability and Recoverability (19%) Manage snapshots. This objective may include but is not limited to: taking, reverting, merging, deleting, and applying snapshots; configuring storage locations Manage backups. This objective may include but is not limited to: managing online and offline backups by using DPM, Windows Server Backup, or Volume Shadow Copy Service (VSS) Perform non-clustered migrations. This objective may include but is not limited to: performing a SAN migration of child partitions, performing a network migration of child partitions Configure quick and live migrations. This objective may include but is not limited to: configuring network and storage for clustered Hyper-V setup, enabling Cluster Shared Volumes (CSV), configuring dynamic I/0 redirection Performing Migration (15%) Perform physical-to-virtual (P2V) migration. This objective may include but is not limited to: configuring Virtual Machine Manager Intelligent Placement, performing online and offline migrations Perform virtual-to-virtual (V2V) migration. This objective may include but is not limited to: configuring Virtual Machine Manager Intelligent Placement, performing online and offline migrations Perform import/export migration. This objective may include but is not limited to: migrating virtual machines between Hyper-V hosts using the Export/Import feature in Hyper-V Configuring Remote Desktop (RD) Role Services Infrastructure (13%) Configure RD session host. This objective may include but is not limited to: configuring session host settings, network-level authentication settings, license settings; restricting users to single remote session; allowing time zone redirection; configuring resource redirection, configuring encryption, configuring multi-monitor support Configure RD licensing. This objective may include but is not limited to: activating and deactivating Remote Desktop License Service, installing and revoking client access licenses (CALs), reporting on CAL usage Configure RD Connection Broker. This objective may include but is not limited to: installing the RD Connection Broker, configuring DNS for Connection Broker, configuring Connection Broker farms, integrating with RD Virtualization Host role service Configure RD Gateway. This objective may include but is not limited to: configuring RD Gateway, integrating RD Gateway with network access protection (NAP), configuring authentication authorization Configure RD Web Access. This objective may include but is not limited to: configuring RD Web Access, configuring authentication options (forms, single sign-on), configuring per-user RemoteApp program filtering, configuring public and private computer options B. Windows Server 2008 R2, Desktop Virtualization 669 Deploying and Managing an Enterprise Desktop Virtualization Environment Install and configure Windows Virtual PC. This objective may include but it is not limited to: installing Windows Virtual PC on various platforms (32-bit, 64-bit), creating and managing virtual hard disks, configuring virtual machine resources including network resources, preparing host machines Enable and manage Windows XP Mode. This objective may include but it is not limited to: enable Windows XP Mode for Windows 7; publish applications to a host OS through Windows XP Mode; configure the BIOS to support hardware virtualization; create, deploy, and maintain Windows XP Mode images Create a MED-V infrastructure. This objective may include but it is not limited to: installing and managing server components (Image Repository, MED-V Instances), installing the MED-V client, configuring server settings Administer a MED-V environment. This objective may include but it is not limited to: managing workspaces, creating policies, publishing applications and menus, configuring reporting, customizing user and device settings in a virtual machine Create and deploy virtual desktop images. This objective may include but it is not limited to: using various tools to create or prepare images for deployment, deploying a workspace image by using a Web page, pre-staging images Deploying and Managing a Presentation Virtualization Environment Prepare and manage remote applications. This objective may include but it is not limited to: configuring application sharing, package applications for deployment by using RemoteApp, installing and configuring the RD Session
MCSA Windows Server 2016 MCSA Windows Server 2012 MCSA Windows Server 2008 MCSA SQL Server 2012 MCSA Web Applications MCSA Windows 10 MCSA SQL 2016 Database Administrator MCSA SQL 2016 Database Development MCSA SQL 2016 Business Intelligence Development
70-767 Implementing a SQL Data Warehouse Module 1: Introduction to Data Warehousing This module describes data warehouse concepts and architecture consideration.Lessons Overview of Data Warehousing Considerations for a Data Warehouse Solution Module 2: Planning Data Warehouse Infrastructure This module describes the main hardware considerations for building a data warehouse.Lessons Considerations for data warehouse infrastructure. Planning data warehouse hardware. Module 3: Designing and Implementing a Data Warehouse This module describes how you go about designing and implementing a schema for a data warehouse.Lessons Designing dimension tables Designing fact tables Physical Design for a Data Warehouse Module 4: Columnstore Indexes This module introduces Columnstore Indexes.Lessons Introduction to Columnstore Indexes Creating Columnstore Indexes Working with Columnstore Indexes Module 5: Implementing an Azure SQL Data Warehouse This module describes Azure SQL Data Warehouses and how to implement them.Lessons Advantages of Azure SQL Data Warehouse Implementing an Azure SQL Data Warehouse Developing an Azure SQL Data Warehouse Migrating to an Azure SQ Data Warehouse Copying data with the Azure data factory Module 6: Creating an ETL Solution At the end of this module you will be able to implement data flow in a SSIS package.Lessons Introduction to ETL with SSIS Exploring Source Data Implementing Data Flow Module 7: Implementing Control Flow in an SSIS Package This module describes implementing control flow in an SSIS package.Lessons Introduction to Control Flow Creating Dynamic Packages Using Containers Managing consistency. Module 8: Debugging and Troubleshooting SSIS Packages This module describes how to debug and troubleshoot SSIS packages.Lessons Debugging an SSIS Package Logging SSIS Package Events Handling Errors in an SSIS Package Module 9: Implementing a Data Extraction Solution This module describes how to implement an SSIS solution that supports incremental DW loads and changing data.Lessons Introduction to Incremental ETL Extracting Modified Data Loading modified data Temporal Tables Module 10: Enforcing Data Quality This module describes how to implement data cleansing by using Microsoft Data Quality services.Lessons Introduction to Data Quality Using Data Quality Services to Cleanse Data Using Data Quality Services to Match Data Module 11: Using Master Data Services This module describes how to implement master data services to enforce data integrity at source.Lessons Introduction to Master Data Services Implementing a Master Data Services Model Hierarchies and collections Creating a Master Data Hub Module 12: Extending SQL Server Integration Services (SSIS)This module describes how to extend SSIS with custom scripts and components.Lessons Using scripting in SSIS Using custom components in SSIS Module 13: Deploying and Configuring SSIS Packages This module describes how to deploy and configure SSIS packages.Lessons Overview of SSIS Deployment Deploying SSIS Projects Planning SSIS Package Execution Module 14: Consuming Data in a Data Warehouse This module describes how to debug and troubleshoot SSIS packages.Lessons Introduction to Business Intelligence An Introduction to Data Analysis Introduction to reporting Analyzing Data with Azure SQL Data Warehouse 70-768 Developing SQL Data Models Module 1: Introduction to Business Intelligence and Data Modeling This module introduces key BI concepts and the Microsoft BI product suite.Lessons Introduction to Business Intelligence The Microsoft business intelligence platform Module 2: Creating Multidimensional Databases This module describes how to create multidimensional databases using SQL Server Analysis Services.Lessons Introduction to Multidimensional Analysis Creating Data Sources and Data Source Views Creating a Cube Overview of Cube Security Configure SSAS Monitoring SSAS Module 3: Working with Cubes and Dimensions This module describes how to implement dimensions in a cube.Lessons Configuring Dimensions Defining Attribute Hierarchies Sorting and Grouping Attributes Slowly Changing Dimensions Module 4: Working with Measures and Measure Groups This module describes how to implement measures and measure groups in a cube.Lessons Working with Measures Working with Measure Groups Module 5: Introduction to MDX This module describes the MDX syntax and how to use MDX.Lessons MDX fundamentals Adding Calculations to a Cube Using MDX to Query a Cube Module 6: Customizing Cube Functionality This module describes how to customize a cube.Lessons Introduction to Business Intelligence The Implementing Key Performance Indicators Implementing Actions Implementing Perspectives Implementing Translations Module 7: Implementing a Tabular Data Model by Using Analysis Services This module describes how to implement a tabular data model in Power Pivot.Lessons Introduction to Tabular Data Models Creating a Tabular Data Model Using an Analysis Services Tabular Data Model in an Enterprise BI Solution Module 8: Introduction to Data Analysis Expression (DAX) This module describes how to use DAX to create measures and calculated columns in a tabular data model.Lessons DAX Fundamentals Using DAX to Create Calculated Columns and Measures in a Tabular Data Model Module 9: Performing Predictive Analysis with Data Mining This module describes how to use data mining for predictive analysis.Lessons Overview of Data Mining Creating a Custom Data Mining Solution Validating a Data Mining Model Connecting to and Consuming a Data-Mining Model Using the Data Mining add-in for Excel
70-764. Administering a SQL Database Infrastructure Module 1: SQL Server Security Protection of data within your Microsoft SQL Server databases is essential and requires a working knowledge of the issues and SQL Server security features. This module describes SQL Server security models, logins, users, partially contained databases, and cross-server authorization. Lessons Authenticating Connections to SQL Server Authorizing Logins to Connect to databases Authorization Across Servers Partially Contained Databases Module 2: Assigning Server and Database Roles Using roles simplifies the management of user permissions. With roles, you can control authenticated users’ access to system resources based on each user’s job function—rather than assigning permissions user-by-user, you can grant permissions to a role, then make users members of roles. Microsoft SQL Server includes support for security roles defined at server level and at database level. Lessons Working with server roles Working with Fixed Database Roles Assigning User-Defined Database Roles Module 3: Authorizing Users to Access Resources In the previous modules, you have seen how Microsoft SQL Server security is organized and how sets of permissions can be assigned at the server and database level by using fixed server roles, user-defined server roles, fixed database roles, and application roles. The final step in authorizing users to access SQL Server resources is the authorization of users and roles to access server and database objects. In this module, you will see how these object permissions are managed. In addition to access permissions on database objects, SQL Server provides the ability to determine which users are allowed to execute code, such as stored procedures and functions. In many cases, these permissions and the permissions on the database objects are best configured at the schema level rather than at the level of the individual object. Schema-based permission grants can simplify your security architecture. You will explore the granting of permissions at the schema level in the final lesson of this module.Lessons Authorizing User Access to Objects Authorizing Users to Execute Code Configuring Permissions at the Schema Level Module 4: Protecting Data with Encryption and Auditing When configuring security for your Microsoft SQL Server systems, you should ensure that you meet any of your organization’s compliance requirements for data protection. Organizations often need to adhere to industry-specific compliance policies, which mandate auditing of all data access. To address this requirement, SQL Server provides a range of options for implementing auditing. Another common compliance requirement is the encryption of data to protect against unauthorized access in the event that access to the database files is compromised. SQL Server supports this requirement by providing transparent data encryption (TDE). To reduce the risk of information leakage by users with administrative access to a database, columns containing sensitive data—such as credit card numbers or national identity numbers—can be encrypted using the Always Encrypted feature. This module describes the available options for auditing in SQL Server, how to use and manage the SQL Server Audit feature, and how to implement encryption.Lessons Options for auditing data access in SQL Server Implementing SQL Server Audit Managing SQL Server Audit Protecting Data with Encryption Module 5: Recovery Models and Backup Strategies One of the most important aspects of a database administrator’s role is ensuring that organizational data is reliably backed up so that, if a failure occurs, you can recover the data. Even though the computing industry has known about the need for reliable backup strategies for decades—and discussed this at great length—unfortunate stories regarding data loss are still commonplace. A further problem is that, even when the strategies in place work as they were designed, the outcomes still regularly fail to meet an organization’s operational requirements. In this module, you will consider how to create a strategy that is aligned with organizational needs, based on the available backup models, and the role of the transaction logs in maintaining database consistency.Lessons Understanding Backup Strategies SQL Server Transaction Logs Planning Backup Strategies Module 6: Backing Up SQL Server Databases In the previous module, you learned how to plan a backup strategy for a SQL Server system. You can now learn how to perform SQL Server backups, including full and differential database backups, transaction log backups, and partial backups. In this module, you will learn how to apply various backup strategies.Lessons Backing Up Databases and Transaction Logs Managing Database Backups Advanced Database Options Module 7: Restoring SQL Server 2016 Databases In the previous module, you learned how to create backups of Microsoft SQL Server 2016 databases. A backup strategy might involve many different types of backup, so it is essential that you can effectively restore them. You will often be restoring a database in an urgent situation. You must, however, ensure that you have a clear plan of how to proceed and successfully recover the database to the required state. A good plan and understanding of the restore process can help avoid making the situation worse. Some database restores are related to system failure. In these cases, you will want to return the system as close as possible to the state it was in before the failure. Some failures, though, are related to human error and you might wish to recover the system to a point before that error. The point-in-time recovery features of SQL Server 2016 can help you to achieve this. Because they are typically much larger, user databases are more likely to be affected by system failures than system databases. However, system databases can be affected by failures, and special care should be taken when recovering them. In particular, you need to understand how to recover each system database because you cannot use the same process for all system databases. In this module, you will see how to restore user and system databases and how to implement point-in-time recovery. Lessons Understanding the Restore Process Restoring Databases Advanced Restore Scenarios Point-in-Time Recovery Module 8: Automating SQL Server Management The tools provided by Microsoft SQL Server make administration easy when compared to some other database engines. However, even when tasks are easy to perform, it is
70 -761 Querying Data with Transact-SQL Exam 70-761. Querying Data with Transact-SQL Module 1: Introduction to Microsoft SQL Server 2016 This module introduces SQL Server, the versions of SQL Server, including cloud versions, and how to connect to SQL Server using SQL Server Management Studio.Lessons The Basic Architecture of SQL Server SQL Server Editions and Versions Getting Started with SQL Server Management Studio Module 2: Introduction to T-SQL Querying This module describes the elements of T-SQL and their role in writing queries. Describe the use of sets in SQL Server. Describe the use of predicate logic in SQL Server. Describe the logical order of operations in SELECT statements. Lessons Introducing T-SQL Understanding Sets Understanding Predicate Logic Understanding the Logical Order of Operations in SELECT statements Module 3: Writing SELECT Queries This module introduces the fundamentals of the SELECT statement, focusing on queries against a single table.Lessons Writing Simple SELECT Statements Eliminating Duplicates with DISTINCT Using Column and Table Aliases Writing Simple CASE Expressions Module 4: Querying Multiple Tables This module describes how to write queries that combine data from multiple sources in Microsoft SQL Server 2016. Lessons Understanding Joins Querying with Inner Joins Querying with Outer Joins Querying with Cross Joins and Self Joins Module 5: Sorting and Filtering Data This module describes how to implement sorting and filtering.Lessons Sorting Data Filtering Data with Predicates Filtering Data with TOP and OFFSET-FETCH Working with Unknown Values Module 6: Working with SQL Server 2016 Data Types This module introduces the data types SQL Server uses to store data.Lessons Introducing SQL Server 2016 Data Types Working with Character Data Working with Date and Time Data Module 7: Using DML to Modify Data This module describes how to create DML queries, and why you would want to.Lessons Inserting Data Modifying and Deleting Data Module 8: Using Built-In Functions This module introduces some of the many built in functions in SQL Server 2016.Lessons Writing Queries with Built-In Functions Using Conversion Functions Using Logical Functions Using Functions to Work with NULL Module 9: Grouping and Aggregating Data This module describes how to use aggregate functions.Lessons Using Aggregate Functions Using the GROUP BY Clause Filtering Groups with HAVING Module 10: Using Subqueries This module describes several types of subquery and how and when to use them.Lessons Writing Self-Contained Subqueries Writing Correlated Subqueries Using the EXISTS Predicate with Subqueries Module 11: Using Table ExpressionsPreviously in this course, you learned about using subqueries as an expression that returned results to an outer calling query. Like subqueries, table expressions are query expressions, but table expressions extend this idea by allowing you to name them and to work with their results as you would work with data in any valid relational table. Microsoft SQL Server 2016 supports four types of table expressions: derived tables, common table expression (CTEs), views, and inline table-valued functions (TVFs). In this module, you will learn to work with these forms of table expressions and learn how to use them to help create a modular approach to writing queries.Lessons Using Views Using Inline Table-Valued Functions Using Derived Tables Using Common Table Expressions Module 12: Using Set Operators This module introduces how to use the set operators UNION, INTERSECT, and EXCEPT to compare rows between two input sets.Lessons Writing Queries with the UNION operator Using EXCEPT and INTERSECT Using APPLY Module 13: Using Windows Ranking, Offset, and Aggregate FunctionsThis module describes the benefits to using window functions. Restrict window functions to rows defined in an OVER clause, including partitions and frames. Write queries that use window functions to operate on a window of rows and return ranking, aggregation, and offset comparison results.Lessons Creating Windows with OVER Exploring Window Functions Module 14: Pivoting and Grouping Sets This module describes write queries that pivot and unpivot result sets. Write queries that specify multiple groupings with grouping sets Lessons Writing Queries with PIVOT and UNPIVOT Working with Grouping Sets Module 15: Executing Stored Procedures This module describes how to return results by executing stored procedures. Pass parameters to procedures. Create simple stored procedures that encapsulate a SELECT statement. Construct and execute dynamic SQL with EXEC and sp_executesql.Lessons Querying Data with Stored Procedures Passing Parameters to Stored procedures Creating Simple Stored Procedures Working with Dynamic SQL Module 16: Programming with T-SQL This module describes how to enhance your T-SQL code with programming elements.Lessons T-SQL Programming Elements Controlling Program Flow Module 17: Implementing Error Handling This module introduces error handling for T-SQL.Lessons Implementing T-SQL error handling Implementing structured exception handling Module 18: Implementing Transactions This module describes how to implement transactions.Lessons Transactions and the database engines Controlling transactions Use SET XACT_ABORT to define SQL Servers handling of transactions outside TRY/CATCH blocks. 70-762 Developing SQL Databases Developing SQL Databases Module 1: Introduction to Database Development Before beginning to work with Microsoft SQL Server in either a development or an administration role, it is important to understand the scope of the SQL Server platform. In particular, it is useful to understand that SQL Server is not just a database engine—it is a complete platform for managing enterprise data. SQL Server provides a strong data platform for all sizes of organizations, in addition to a comprehensive set of tools to make development easier, and more robust.Lessons Introduction to the SQL Server Platform SQL Server Database Development Tasks Module 2: Designing and Implementing Tables In a relational database management system (RDBMS), user and system data is stored in tables. Each table consists of a set of rows that describe entities and a set of columns that hold the attributes of an entity. For example, a Customer table might have columns such as CustomerName and CreditLimit, and a row for each customer. In Microsoft SQL Server data management software tables are contained within schemas that are very similar in concept to folders that contain files in the operating system. Designing tables is one of the most important tasks that a database developer undertakes, because incorrect table design leads to the inability to query the
Exam 70- 480 -Programming in HTML 5 With Java Script and CCS3 Programming in HTML5 with JavaScript and CSS3. Web Applications certification qualifies you for a position as a web developer or web administrator. Implement and manipulate document structures and objects Create the document structure Structure the UI by using semantic markup, including for search engines and screen readers (Section, Article, Nav, Header, Footer, and Aside); create a layout container in HTML Write code that interacts with UI controls Programmatically add and modify HTML elements; implement media controls; implement HTML5 canvas and SVG graphics Apply styling to HTML elements programmatically Change the location of an element; apply a transform; show and hide elements Implement HTML5 APIs Implement storage APIs, AppCache API, and Geolocation API Establish the scope of objects and variables Define the lifetime of variables; keep objects out of the global namespace; use the “this” keyword to reference an object that fired an event; scope variables locally and globally Create and implement objects and methods Implement native objects; create custom objects and custom properties for native objects using prototypes and functions; inherit from an object; implement native methods and create custom methods Implement program flow Implement program flow Iterate across collections and array items; manage program decisions by using switch statements, if/then, and operators; evaluate expressions Raise and handle an event Handle common events exposed by DOM (OnBlur, OnFocus, OnClick); declare and handle bubbled events; handle an event by using an anonymous function Implement exception handling Set and respond to error codes; throw an exception; request for null checks; implement try-catch-finally blocks Implement a callback Receive messages from the HTML5 WebSocket API; use jQuery to make an AJAX call; wire up an event; implement a callback by using anonymous functions; handle the “this” pointer Create a web worker process Start and stop a web worker; pass data to a web worker; configure timeouts and intervals on the web worker; register an event listener for the web worker; limitations of a web worker Access and Secure Data Validate user input by using HTML5 elements Choose the appropriate controls based on requirements; implement HTML input types and content attributes (for example, required) to collect user input Validate user input by using JavaScript Evaluate a regular expression to validate the input format; validate that you are getting the right kind of data type by using built-in functions; prevent code injection Consume data Consume JSON and XML data; retrieve data by using web services; load data or get data from other sources by using XMLHTTPRequest Serialize, deserialize, and transmit data Binary data; text data (JSON, XML); implement the jQuery serialize method; Form.Submit; parse data; send data by using XMLHTTPRequest; sanitize input by using URI/form encoding Use CSS in applications Style HTML text properties Apply styles to text appearance (color, bold, italics); apply styles to text font (WOFF and @font-face, size); apply styles to text alignment, spacing, and indentation; apply styles to text hyphenation; apply styles for a text drop shadow Style HTML box properties Apply styles to alter appearance attributes (size, border and rounding border corners, outline, padding, margin); apply styles to alter graphic effects (transparency, opacity, background image, gradients, shadow, clipping); apply styles to establish and change an element’s position (static, relative, absolute, fixed) Create a flexible content layout Implement a layout using a flexible box model; implement a layout using multi-column; implement a layout using position floating and exclusions; implement a layout using grid alignment; implement a layout using regions, grouping, and nesting Create an animated and adaptive UI Animate objects by applying CSS transitions; apply 3-D and 2-D transformations; adjust UI based on media queries (device adaptations for output formats, displays, and representations); hide or disable controls Find elements by using CSS selectors and jQuery Choose the correct selector to reference an element; define element, style, and attribute selectors; find elements by using pseudo-elements and pseudo-classes (for example, :before, :first-line, :first-letter, :target, :lang, :checked, :first-child) Structure a CSS file by using CSS selectors Reference elements correctly; implement inheritance; override inheritance by using !important; style an element based on pseudo-elements and pseudo-classes (for example, :before, :first-line, :first-letter, :target, :lang, :checked, :first-child) Exam 70-486 - Developing Microsoft Azure and web Services Developing ASP.NET MVC Web Applications Design the application Architecture Plan the application layers Plan data access; plan for separation of concerns; appropriate use of models, views, and controllers; choose between client-side and server side processing; design for scalability Design a distributed application Design a hybrid application (on-premises versus off-premises, including Azure), plan for session management in a distributed environment, plan web farms Design and implement the Azure role life cycle Identify and implement Start, Run, and Stop events; identify startup tasks (IIS configuration [app pool], registry configuration, third-party tools) Configure state management Choose a state management mechanism (in-process and out of process state management), plan for scalability, use cookies or local storage to maintain state, apply configuration settings in web.config file, implement sessionless state (for example, QueryString) Design a caching strategy Implement page output caching (performance oriented), implement data caching, implement HTTP caching, implement Azure caching Design and implement a WebSocket strategy Read and write string and binary data asynchronously (long-running data transfers), choose a connection loss strategy, decide a strategy for when to use WebSockets, implement SignalR Design HTTP modules and handlers Implement synchronous and asynchronous modules and handlers, choose between modules and handlers in IIS Design the user experience Apply the user interface design for a web application Create and apply styles by using CSS, structure and lay out the user interface by using HTML, implement dynamic page content based on a design Design and implement UI behavior Implement client validation, use JavaScript and the DOM to control application behavior, extend objects by using prototypal inheritance, use AJAX to make partial page updates, implement the UI by using JQuery Compose the UI layout of an application Implement partials for reuse in different areas of the application, design and implement pages by using Razor templates (Razor view engine), design
70-697 Configuring Windows Devices Manage Identity Support Windows Store and cloud apps Install and manage software by using Microsoft Office 365 and Windows Store apps, sideload apps by using Microsoft Intune, sideload apps into online and offline images, deeplink apps by using Microsoft Intune, integrate Microsoft account including personalization settings Support authentication and authorization Identifying and resolving issues related to the following: Multi-factor authentication including certificates, Microsoft Passport, virtual smart cards, picture passwords, and biometrics; workgroup vs. domain, Homegroup, computer and user authentication including secure channel, account policies, credential caching, and Credential Manager; local account vs. Microsoft account; Workplace Join; Configuring Windows Hello Plan desktop and device deployment Migrate and configure user data Migrate user profiles; configure folder location; configure profiles including profile version, local, roaming, and mandatory Configure Hyper-V Create and configure virtual machines including integration services, create and manage checkpoints, create and configure virtual switches, create and configure virtual disks, move a virtual machine’s storage Configure mobility options Configure offline file policies, configure power policies, configure Windows To Go, configure sync options, configure Wi-Fi direct, files, powercfg, Sync Center Configure security for mobile devices Configure BitLocker, configure startup key storage Plan and implement a Microsoft Intune device management solution Support mobile devices Support mobile device policies including security policies, remote access, and remote wipe; support mobile access and data synchronization including Work Folders and Sync Center; support broadband connectivity including broadband tethering and metered networks; support Mobile Device Management by using Microsoft Intune, including Windows Phone, iOS, and Android Deploy software updates by using Microsoft Intune Use reports and In-Console Monitoring to identify required updates, approve or decline updates, configure automatic approval settings, configure deadlines for update installations, deploy third-party updates Manage devices with Microsoft Intune Provision user accounts, enroll devices, view and manage all managed devices, configure the Microsoft Intune subscriptions, configure the Microsoft Intune connector site system role, manage user and computer groups, configure monitoring and alerts, manage policies, manage remote computers Configure Networking Configure IP settings Configure name resolution, connect to a network, configure network locations Configure networking settings Connect to a wireless network, manage preferred wireless networks, configure network adapters, configure location-aware printing Configure and maintain network security Configure Windows Firewall, configure Windows Firewall with Advanced Security, configure connection security rules (IPsec), configure authenticated exceptions, configure network discovery Configure Storage Support data storage Identifying and resolving issues related to the following: DFS client including caching settings, storage spaces including capacity and fault tolerance, OneDrive Support data security Identifying and resolving issues related to the following: Permissions including share, NTFS, and Dynamic Access Control (DAC); Encrypting File System (EFS) including Data Recovery Agent; access to removable media; BitLocker and BitLocker To Go including Data Recovery Agent and Microsoft BitLocker Administration and Monitoring (MBAM) Manage data access and protection Configure shared resources Configure shared folder permissions, configure HomeGroup settings, configure libraries, configure shared printers, configure OneDrive Configure file and folder access Encrypt files and folders by using EFS, configure NTFS permissions, configure disk quotas, configure file access auditing Configure authentication and authorization Manage remote access Configure remote connections Configure remote authentication, configure Remote Desktop settings, configure VPN connections and authentication, enable VPN reconnect, configure broadband tethering Configure mobility options Configure offline file policies, configure power policies, configure Windows To Go, configure sync options, configure Wi-Fi direct Manage apps Deploy and manage Azure RemoteApp Configure RemoteApp and Desktop Connections settings, configure Group Policy Objects (GPOs) for signed packages, subscribe to the Azure RemoteApp and Desktop Connections feeds, export and import Azure RemoteApp configurations, support iOS and Android, configure remote desktop web access for Azure RemoteApp distribution Support desktop apps The following support considerations including: Desktop app compatibility using Application Compatibility Toolkit (ACT) including shims and compatibility database; desktop application co-existence using Hyper-V, Azure RemoteApp, and App-V; installation and configuration of User Experience Virtualization (UE-V); deploy desktop apps by using Microsoft Intune Manage updates and recovery Configure system recovery Configure a recovery drive, configure system restore, perform a refresh or recycle, perform a driver rollback, configure restore points Configure file recovery Restore previous versions of files and folders, configure File History, recover files from OneDrive Configure and manage updates Configure update settings, configure Windows Update policies, manage update history, roll back updates, update Windows Store apps 70-698/Course 20698A. Installing and Configuring Windows 10 Implement Windows Prepare for installation requirements Determine hardware requirements and compatibility; choose between an upgrade and a clean installation; determine appropriate editions according to device type; determine requirements for particular features, such as Hyper-V, Cortana, Miracast, Virtual Smart Cards, and Secure Boot; determine and create appropriate installation media Install Windows Perform clean installations, upgrade using Windows Update, upgrade using installation media, configure native boot scenarios, migrate from previous versions of Windows, install to virtual hard disk (VHD), boot from VHD, install on bootable USB, install additional Windows features, configure Windows for additional regional and language support Configure devices and device drivers Install, update, disable, and roll back drivers; resolve driver issues; configure driver settings, including signed and unsigned drivers; manage driver packages; download and import driver packages; use the Deployment Image Servicing and Management (DISM) tool to add packages Perform post-installation configuration Configure and customize start menu, desktop, taskbar, and notification settings, according to device type; configure accessibility options; configure Cortana; configure Microsoft Edge; configure Internet Explorer; configure Hyper-V; configure power settings Implement Windows in an enterprise environment Provision with the Windows Imaging and Configuration Designer (ICD) tool; implement Active Directory–based activation; implement volume activation using a Key Management Service (KMS); query and configure activation states using the command line; configure Active Directory, including Group Policies; configure and optimize user account control (UAC) Configure and support core services Configure networking Configure and support IPv4 and IPv6 network settings; configure name resolution; connect to a network; configure network locations; configure Windows Firewall; configure Windows Firewall with Advanced Security; configure network discovery; configure Wi-Fi settings; configure Wi-Fi Direct; troubleshoot network issues; configure VPN, such as app-triggered VPN, traffic filters, and lockdown VPN; configure IPsec; configure Direct
70-640 / Windows Server 2008 AD Configuration Maintaining the Active Directory environment (18 percent) Configure backup and recovery. May include but is not limited to: using Windows Server Backup; back up files and system state data to media; backup and restore by using removable media; perform an authoritative or non-authoritative restores; linked value replication; Directory Services Recovery Mode (DSRM); backup and restore GPOs; configure AD recycle bin Perform offline maintenance. May include but is not limited to: offline defragmentation and compaction; Restartable Active Directory; Active Directory database mounting tool Monitor Active Directory. May include but is not limited to: event viewer subscriptions; data collector sets; real-time monitoring; analyzing logs; WMI queries; PowerShell Creating and maintaining Active Directory objects (18 percent) Automate creation of Active Directory accounts. May include but is not limited to: bulk import; configure the UPN; create computer, user, and group accounts (scripts, import, migration); template accounts; contacts; distribution lists; offline domain join Maintain Active Directory accounts. May include but is not limited to: manage computer accounts; configure group membership; account resets; delegation; AGDLP/AGGUDLP; deny domain local group; local vs. domain; Protected Admin; disabling accounts vs. deleting accounts; deprovisioning; contacts; creating organizational units (OUs); delegation of control; protecting AD objects from deletion; managed service accounts Create and apply Group Policy objects (GPOs). May include but is not limited to: enforce, OU hierarchy, block inheritance, and enabling user objects; group policy processing priority; WMI; group policy filtering; group policy loopback; Group Policy Preferences (GPP) Configure GPO templates. May include but is not limited to: user rights; ADMX Central Store; administrative templates; security templates; restricted groups; security options; starter GPOs; shell access policies Deploy and manage software by using GPOs. May include but is not limited to: publishing to users; assigning software to users; assigning to computers; software removal; software restriction policies; AppLocker Configure account policies. May include but is not limited to: domain password policy; account lockout policy; fine-grain password policies Configure audit policy by using GPOs. May include but is not limited to: audit logon events; audit account logon events; audit policy change; audit access privilege use; audit directory service access; audit object access; advanced audit policies; global object access auditing; “Reason for Access” reporting Configuring Domain Name System (DNS) for Active Directory (18%) Configuring Active Directory Roles and Services (14 percent) Configure Active Directory Lightweight Directory Service (AD LDS). May include but is not limited to: migration to AD LDS; configure data within AD LDS; configure an authentication server; Server Core Installation Configure Active Directory Rights Management Service (AD RMS). May include but is not limited to: certificate request and installation; self-enrollments; delegation; create RMS templates; RMS administrative roles; RM Add-on for IE Configure the read-only domain controller (RODC). May include but is not limited to: replication; Administrator role separation; read-only DNS; BitLocker; credential caching; password replication; syskey; read-only SYSVOL; staged install Configure Active Directory Federation Services (AD FSv2). May include but is not limited to: install AD FS server role; exchange certificate with AD FS agents; configure trust policies; configure user and group claim mapping; import and export trust policies Configure zones. May include but is not limited to: Dynamic DNS (DDNS), Non-dynamic DNS (NDDNS), and Secure Dynamic DNS (SDDNS); Time to Live (TTL); GlobalNames; Primary, Secondary, Active Directory Integrated, Stub; SOA; zone scavenging; forward lookup; reverse lookup Configure DNS server settings. May include but is not limited to: forwarding; root hints; configure zone delegation; round robin; disable recursion; debug logging; server scavenging Configure zone transfers and replication. May include but is not limited to: configure replication scope (forestDNSzone; domainDNSzone); incremental zone transfers; DNS Notify; secure zone transfers; configure name servers; application directory partitions Configuring the Active Directory infrastructure (17 percent) Configure a forest or a domain. May include but is not limited to: remove a domain; perform an unattended installation; Active Directory Migration Tool (ADMT) ; change forest and domain functional levels; interoperability with previous versions of Active Directory; multiple user principal name (UPN) suffixes; forestprep; domainprep Configure trusts. May include but is not limited to: forest trust; selective authentication vs. forest-wide authentication; transitive trust; external trust; shortcut trust; SID filtering Configure sites. May include but is not limited to: create Active Directory subnets; configure site links; configure site link costing; configure sites infrastructure Configure Active Directory replication. May include but is not limited to: DFSR; one-way replication; Bridgehead server; replication scheduling; configure replication protocols; force intersite replication Configure the global catalog. May include but is not limited to: Universal Group Membership Caching (UGMC); partial attribute set; promote to global catalog Configure operations masters. May include but is not limited to: seize and transfer; backup operations master; operations master placement; Schema Master; extending the schema; time service Configuring Active Directory Certificate Services (15 percent) Install Active Directory Certificate Services. May include but is not limited to: certificate authority (CA) types, including standalone, enterprise, root, and subordinate; role services; prepare for multiple-forest deployments Configure CA server settings. May include but is not limited to: key archival; certificate database backup and restore; assigning administration roles; high-volume CAs; auditing Manage certificate templates. May include but is not limited to: certificate template types; securing template permissions; managing different certificate template versions; key recovery agent Manage enrollments. May include but is not limited to: network device enrollment service (NDES); auto enrollment; Web enrollment; extranet enrollment; smart card enrollment; authentication mechanism assurance; creating enrollment agents; deploying multiple-forest certificates; x.509 certificate mapping Manage certificate revocations. May include but is not limited to: configure Online Responders; Certificate Revocation List (CRL); CRL Distribution Point (CDP); Authority Information Access (AIA) 70-642 / Windows Server 2008 Network Infrastructure Configuring File and Print Services (20 percent) Configure a file server. May include but is not limited to: file share publishing; Offline Files; share permissions; NTFS permissions; encrypting file system (EFS); BitLocker; Access-Based Enumeration (ABE); branch cache; Share and Storage Management console Configure Distributed File System (DFS). May include but is not limited to: DFS namespace; DFS configuration and application; creating and configuring targets; DFS replication; read-only replicated folder;
Exam 70-740-Installation, Storage, and Compute with Windows Server 2016 MCSA: Windows Server 2016 70-740-Installation, Storage, and Compute with Windows Server 2016 Install windows servers in host and compute environment Install, upgrade, and migrate servers and workloads Determine Windows Server 2016 installation requirements; determine appropriate Windows Server 2016 editions per workloads; install Windows Server 2016; install Windows Server 2016 features and roles; install and configure Windows Server Core; manage Windows Server Core installations using Windows PowerShell, command line, and remote management capabilities; implement Windows PowerShell Desired State Configuration (DSC) to install and maintain integrity of installed environments; perform upgrades and migrations of servers and core workloads from Windows Server 2008 and Windows Server 2012 to Windows Server 2016; determine the appropriate activation model for server installation, such as Automatic Virtual Machine Activation (AVMA), Key Management Service (KMS), and Active Directory-based Activation Install and configure Nano Server Determine appropriate usage scenarios and requirements for Nano Server, install Nano Server, implement Roles and Features on Nano Server, manage and configure Nano Server, manage Nano Server remotely using Windows PowerShell Create, manage, and maintain images for deployment Plan for Windows Server virtualization; plan for Linux and FreeBSD deployments; assess virtualization workloads using the Microsoft Assessment and Planning (MAP) Toolkit; determine considerations for deploying workloads into virtualized environments; update images with patches, hotfixes, and drivers; install roles and features in offline images; manage and maintain Windows Server Core, Nano Server images, and VHDs using Windows PowerShell Implement storage solutions Configure disks and volumes Configure sector sizes appropriate for various workloads, configure GUID partition table (GPT) disks, create VHD and VHDX files using Server Manager or Windows PowerShell, mount virtual hard disks, determine when to use NTFS and ReFS file systems, configure NFS and SMB shares using Server Manager, configure SMB share and session settings using Windows PowerShell, configure SMB server and SMB client configuration settings using Windows PowerShell, configure file and folder permissions Implement server storage Configure storage pools; implement simple, mirror, and parity storage layout options for disks or enclosures; expand storage pools; configure Tiered Storage; configure iSCSI target and initiator; configure iSNS; configure Datacenter Bridging (DCB); configure Multi-Path IO (MPIO); determine usage scenarios for Storage Replica; implement Storage Replica for server-to-server, cluster-to-cluster, and stretch cluster scenarios Implement data deduplication Implement and configure deduplication, determine appropriate usage scenarios for deduplication, monitor deduplication, implement a backup and restore solution with deduplication Implement Hyper-V Install and configure Hyper-V Determine hardware and compatibility requirements for installing Hyper-V, install Hyper-V, install management tools, upgrade from existing versions of Hyper-V, delegate virtual machine management, perform remote management of Hyper-V hosts, configure virtual machines using Windows PowerShell Direct, implement nested virtualization Configure virtual machine (VM) settings Add or remove memory in running a VM, configure dynamic memory, configure Non-Uniform Memory Access (NUMA) support, configure smart paging, configure Resource Metering, manage Integration Services, create and configure Generation 1 and 2 VMs and determine appropriate usage scenarios, implement enhanced session mode, create Linux and FreeBSD VMs, install and configure Linux Integration Services (LIS), install and configure FreeBSD Integration Services (BIS), implement Secure Boot for Windows and Linux environments, move and convert VMs from previous versions of Hyper-V to Windows Server 2016 Hyper-V, export and import VMs, implement Discrete Device Assignment (DDA) Configure Hyper-V storage Create VHDs and VHDX files using Hyper-V Manager, create shared VHDX files, configure differencing disks, modify virtual hard disks, configure pass-through disks, resize a virtual hard disk, manage checkpoints, implement production checkpoints, implement a virtual Fibre Channel adapter, configure storage Quality of Service (QoS) Configure Hyper-V networking Add and remove virtual network interface cards (vNICs), configure Hyper-V virtual switches, optimize network performance, configure MAC addresses, configure network isolation, configure synthetic and legacy virtual network adapters, configure NIC teaming in VMs, configure virtual machine queue (VMQ), enable Remote Direct Memory Access (RDMA) on network adapters bound to a Hyper-V virtual switch using Switch Embedded Teaming (SET), configure Bandwidth Management Implement Windows Containers Deploy Windows containers Determine installation requirements and appropriate scenarios for Windows containers, install and configure Windows Server container host in physical or virtualized environments, install and configure Windows Server container host to Windows Server Core or Nano Server in a physical or virtualized environment, install Docker on Windows Server and Nano Server, configure Docker daemon start-up options, configure Windows PowerShell for use with containers, install a base operating system, tag an image, uninstall an operating system image, create Windows Server containers, create Hyper-V containers Manage Windows containers Manage Windows containers using the Docker daemon, manage Windows containers using Windows PowerShell, manage container networking, manage container data volumes, manage Resource Control, create new container images using Dockerfile, manage container images using DockerHub repository for public and private scenarios, manage container images using Microsoft Azure Implement high availability Implement high availability and disaster recovery options in Hyper-V Implement Hyper-V Replica, implement Live Migration, implement Shared Nothing Live Migration, configure CredSSP or Kerberos authentication protocol for Live Migration, implement storage migration Implement failover clustering Implement Workgroup, Single, and Multi Domain clusters; configure quorum; configure cluster networking; restore single node or cluster configuration; configure cluster storage; implement Cluster-Aware Updating; implement Cluster Operating System Rolling Upgrade; configure and optimize clustered shared volumes (CSVs); configure clusters without network names; implement Scale-Out File Server (SoFS); determine different scenarios for the use of SoFS versus clustered File Server; determine usage scenarios for implementing guest clustering; implement a Clustered Storage Spaces solution using Shared SAS storage enclosures; implement Storage Replica; implement Cloud Witness; implement VM resiliency; implement shared VHDX as a storage solution for guest clusters Implement Storage Spaces Direct Determine scenario requirements for implementing Storage Spaces Direct, enable Storage Spaces direct using Windows PowerShell, implement a disaggregated Storage Spaces Direct scenario in a cluster, implement a hyper-converged Storage Spaces Direct scenario in a cluster Manage failover clustering Configure role-specific settings, including continuously available shares; configure VM monitoring; configure failover and preference settings; implement stretch and site-aware failover clusters; enable and configure node fairness Manage VM movement in clustered nodes Perform a live migration; perform