CCOG for CIS 289M Fall 2024


Course Number:
CIS 289M
Course Title:
Microsoft Active Directory Administration
Credit Hours:
4
Lecture Hours:
30
Lecture/Lab Hours:
0
Lab Hours:
30

Course Description

Covers preparation for an entry-level systems administrator position utilizing Microsoft server operating systems. Focuses on the knowledge and skills necessary to design, install, configure, and administer an enterprise network using Microsoft Active Directory, including implementing Group Policies to centrally manage users and computers. Prerequisites: CIS 240M or instructor permission. Audit available.

Addendum to Course Description

The student working at home will need the capability to setup a virtual environment running at least 3 virtual machines.

Intended Outcomes for the course

On completion of this course the student should be able to:

  • Design, install, and administer Microsoft Windows Active Directory
  • Implement Group Policies to centrally manage users and computers
  • Manage Replication in a multi-master domain controller environment
  • Troubleshoot Windows Server and Active Directory issues

Course Activities and Design

This course is presented by means of lecture/discussion sessions, assignments, exams, and lab projects. 

Outcome Assessment Strategies

Through exams and lab assignments students will be assessed to determine if they can:
 

  • Describe Active Directory services roles and architecture.
  • Describe and create an efficient and effective Active Directory logical design for various scenarios.
  • Describe and create an efficient and effective Active Directory physical design for various scenarios.
  • Describe Active Directory replication.
  • Describe the role of Active Directory Operations Masters.
  • Implement an Active Directory sub domain.
  • Describe and implement Group Policies to centralize management of user desktop and computer configuration.
  • Describe and implement Group Policies to centralize deployment of application software.
  • Describe and implement Active Directory authentication and security.

Course Content (Themes, Concepts, Issues and Skills)

  • Describe Active Directory services roles and architecture.
    • Compare and contrast the workgroup model with the domain model.
    • Describe the roles of Active Directory services.
    • Describe the core components of Active Directory.
    • Describe the underlying Active Directory partitions and their functions.
    • Describe the functions and architecture of the Active Directory schema.
    • Describe the Active Directory
  • Describe and create an efficient and effective Active Directory logical design for various scenarios.
  • Describe the role of DNS in Active Directory processing.
  • Compare and contrast alternative DNS implementations to support Active Directory.
  • Compare and contrast alternative forest design decisions.
  • Compare and contrast alternative domain design decisions.
  • Compare and contrast alternative Organizational Unit design decisions.
  • Describe Active Directory functional levels.
  • Describe and create an efficient and effective Active Directory physical design for various scenarios.
    • Describe the objects and components of Active Directory that relate to the physical structure.
    • Compare and contrast alternative Active Directory physical structures.
  • Describe Active Directory replication.
    • Describe how the Active Directory partition replication topology is generated.
    • Describe how data is selected for replication.
    • Describe the intra-site replication process.
    • Describe the inter-site replication process.
    • Implement a replication topology.
  • Describe the role of Active Directory Operations Masters.
    • Describe the forest-wide operations master roles and where they should be placed.
    • Describe the domain-wide operations master roles and where they should be placed.
  • Implement an Active Directory sub-domain.
    • Implement an Active Directory sub-domain.
    • Implement an Organizational Unit substructure.
  • Describe and implement Group Policies to centralize management of user desktop and computer configuration.
    • Describe the purpose of Group Policies.
    • Describe how Group Policies are applied.
    • Modify Group Policy inheritance.
    • Delegate administrative control of Group Policies.
    • Install and use the Group Policy Management Console.
    • Implement Group Policies to manage user and computer settings.
  • Describe and implement Group Policies to centralize deployment of application software.
    • Describe Active Directory software deployment functionality.
    • Prepare software for distribution using Group Policies.
    • Deploy software using Group Policies.
    • Manage software deployed with Group Policies.
    • Remove software deployed with Group Policies.
  • Describe and implement Active Directory authentication and security.
    • Describe Active Directory security principals and how they are applied.
    • Describe the user NTLM and Kerberos authentication process in an Active Directory domain.
    • Describe how network resources can be protected using Active Directory security.