PCC/ CCOG / CIS

Course Content and Outcome Guide for CIS 289M

Course Number:
CIS 289M
Course Title:
Microsoft Active Directory Administration
Credit Hours:
4
Lecture Hours:
30
Lecture/Lab Hours:
0
Lab Hours:
30
Special Fee:
$12.00

Course Description

Third of a three-term sequence designed to prepare students for an entry-level position as a system administrator of a network utilizing Microsoft's network operating system. Focuses on the knowledge and skills necessary to design, install, configure, and administer an enterprise network using Microsoft Windows Active Directory. Also focuses on implementing Group Policies and understanding Group Policy tasks required to centrally manage users and computers. Recommended: CIS 240M, or instructor permission. CIS 288M may be taken concurrently. Audit available.

Addendum to Course Description

The student working at home will need the capability to setup a virtual environment running at least 3 virtual machines.

Intended Outcomes for the course

On completion of this course the student should be able to design, install, and administer an enterprise network using Microsoft Windows Active Directory including implementation of Group Policies required to centrally manage users and computers in a large enterprise.

Course Activities and Design

The course consists of lectures, group discussion, and lab assignments. Lab assignments include both individual lab assignments and group lab assignments.

Outcome Assessment Strategies

Through exams and lab assignments students will be assessed to determine if they can:
 

  • Describe Active Directory services roles and architecture.
  • Describe and create an efficient and effective Active Directory logical design for various scenarios.
  • Describe and create an efficient and effective Active Directory physical design for various scenarios.
  • Describe Active Directory replication.
  • Describe the role of Active Directory Operations Masters.
  • Implement an Active Directory sub domain.
  • Describe and implement Group Policies to centralize management of user desktop and computer configuration.
  • Describe and implement Group Policies to centralize deployment of application software.
  • Describe and implement Active Directory authentication and security.

Course Content (Themes, Concepts, Issues and Skills)

  • Describe Active Directory services roles and architecture.,
    • Compare and contrast the workgroup model with the domain model.
    • Describe the roles of Active Directory services.
    • Describe the core components of Active Directory.
    • Describe the underlying Active Directory partitions and their functions.
    • Describe the functions and architecture of the Active Directory schema.
    • Describe the Active Directory
  • Describe and create an efficient and effective Active Directory logical design for various scenarios.
,
  • Describe the role of DNS in Active Directory processing.
  • Compare and contrast alternative DNS implementations to support Active Directory.
  • Compare and contrast alternative forest design decisions.
  • Compare and contrast alternative domain design decisions.
  • Compare and contrast alternative Organizational Unit design decisions.
  • Describe Active Directory functional levels.
  • Describe and create an efficient and effective Active Directory physical design for various scenarios.,
    • Describe the objects and components of Active Directory that relate to the physical structure.
    • Compare and contrast alternative Active Directory physical structures.
  • Describe Active Directory replication.,
    • Describe how the Active Directory partition replication topology is generated.
    • Describe how data is selected for replication.
    • Describe the intra-site replication process.
    • Describe the inter-site replication process.
    • Implement a replication topology.
  • Describe the role of Active Directory Operations Masters.,
    • Describe the forest-wide operations master roles and where they should be placed.
    • Describe the domain-wide operations master roles and where they should be placed.
  • Implement an Active Directory sub-domain.,
    • Implement an Active Directory sub-domain.
    • Implement an Organizational Unit substructure.
  • Describe and implement Group Policies to centralize management of user desktop and computer configuration.,
    • Describe the purpose of Group Policies.
    • Describe how Group Policies are applied.
    • Modify Group Policy inheritance.
    • Delegate administrative control of Group Policies.
    • Install and use the Group Policy Management Console.
    • Implement Group Policies to manage user and computer settings.
  • Describe and implement Group Policies to centralize deployment of application software.,
    • Describe Active Directory software deployment functionality.
    • Prepare software for distribution using Group Policies.
    • Deploy software using Group Policies.
    • Manage software deployed with Group Policies.
    • Remove software deployed with Group Policies.
  • Describe and implement Active Directory authentication and security.,
    • Describe Active Directory security principals and how they are applied.
    • Describe the user NTLM and Kerberos authentication process in an Active Directory domain.
    • Describe how network resources can be protected using Active Directory security.