Volume / Track

PowerPoint  slide numbers

Subject

Disc 1

 

Track 1

none

Volume introduction 

2

1-4

Class overview: what we'll cover in this seminar

3

5-7

Server 2008 R2 overview; hardware issues; SKUs

4

8-10

Upgrades; Hyper-V R2

5

11

Server management tools

6

12-15

Server management tools cont.; DISM

7

16-17

Powershell

8

18-19

Powershell cont.

9 20-22 Powershell Add-windows feature

10

23-27

Remote server management

Disc 2

 

Track 1

none

Volume introduction

2

28-30

Server core changes and setup

3

31-38

Server Core cont.; sconfig.exe; power management; core parking

4

39-42

Printing support;

5

43-50

Printer driver model; driver isolation

6

51-61

Shared and isolated driver models

7

62-68

DHCP; MAC filering and blocking

8

69-73

Blocking MAC addresses

9

74-80

Entering MACs; the MAC input tool

10

81-84

Creating a MAC whitelist; CLI support

11

85-90

Split scopes; other DHCP improvements

Disc 3 

 

Track 1

none

Volume introduction

2

91-95

DNSSEC overview

3

96-98

DNSSEC threats and weaknesses

4

99-104

DNS spoofing

5

105-108

DNS authentication and attacks

6

109-112

Transacttion IDs and ports on DNS

7

113-116

Sophisticated DNS attacks

8

117-120

Digital signatures and resource records
9 121-122 Signing - a review
10 123-125 Making and checking a signature
11 126-133 Signing a zone; verified lookups

12

134-135 DNSKEY; delegation signers

Disc 4 

 

Track 1

none

Volume introduction

2

136-144

RRSIG - securing resource records

3

145-148

NSEC3

4

149-153

Implementing DNSSEC

5

154-157

Real-world DNSSEC; signing changes

6

158-160

Trust anchors disappear; R2 DNSSEC based on RFC 4033-4035

7

161-165

DNSSEC overview and tasks

8

166-170

The key-signing key; signing your zone
9 171-177 Signing your zone cont.
10 178-180 The NSEC3 problem
11 181-182 Which zones need to be verified; the Name Resolution Policy Table

12

183-186

Name Resolution Policy Table cont.

Disc 5

 

Track 1

none

Volume introduction

2

187-191

BCD/BCDEDIT

3

192

The boot partition

4

192-197

The boot partition cont.; CompletePC Backup - what's new

5

198

System state backups

6

199-201

Securing R2 logons

7

201

Using kerberos over all other protocols

8

201-202

NTLM weaknesses

9

202

NTLM weaknesses cont.
10 202-203 When NOT to use kerberos
11 203 When NOT to use kerberos cont.

12

204-210

Eradicating LM and NTLM; Restricting client behavior

Disc 6

 

Track 1

none

Volume introduction

2

211-217

Restricting server and DC behavior;

3

218-222

Auditing and logs

4

223-227

The Global SACL

5

228-229

DirectAccess

6

229

DirectAccess cont.
7 230-233 DirectAccess cont.
8 233-236 IPsec; IPv6
9 237 Optional security additions
10 238-242 The Name Resolution Policy Table

11

242-244

Assembling a DA server

Disk 7

IPv6 cont.

Track 1

none

Volume introduction

2

245-247

What's new in NAP; What's new in R2 Active Directory

3

248-250

Overview of the R2 Active Directory

4

251-252

Prepping for Your First R2 DC

5

253-256

2008 R2 AD Setup; AD gets Powershell

6

256-257

AD Powershell cont.

7

258-259

AD Powershell examples

8

260-261

Changing passwords with Powershell
9 262-263 Changing passwords with Powershell cont.

10

264-268

Commandlets; more examples

Disc 8

 

Track 1

none

Volume introduction

2

269-271

The AD Web Service

3

272-276

The AD Web Service - more details

4

277-282

ADAC - Powershell goes GUI

5

283-286

The AD Recycle Bin

6

287-292

The history of deleted objects
7 293-294 Seeing deleted objects in Powershell
8 295-297 Tombstones
9 298-302 Tombstone periods; Pre-ADRB undeleting

10

303-308

How R2's AD Recycle Bin works

Disc 9

 

Track 1

none

Volume introduction

2

309-314

Enabling ADRB; Undeleting objects with Powershell

3

315-325

Undeleting objects with Powershell - examples and warnings; Using the GUI

4

326-332

Offline domain joins

5

333-338

Offline domain joins cont.

6

339-344

Managed service accounts

7

345-351

Managed service accounts cont.; AD Best Practices Analyzer

8

352-353

AD Best Practices Analyzer cont.

9

354-357

Authentication Mechanism Assurance