Microsoft 70-414: Implementing an Advanced Server Infrastructure
TRY IT FREE FOR 48 HOURS
Access our entire library for 48 hours.
Just fill out the form below.

This course covers the following topics in order to prepare for the exam: how to manage and maintain a server infrastructure, how to plan and implement a highly available enterprise infrastructure, how to plan and implement a server virtualization infrastructure, and how to design and implement identity and access solutions.
Module 1: Manage and Maintain a Server Infrastructure
1.1 Intro
1.2 Manage And Maintain A Server Infrastructure Part 1
1.3 Manage And Maintain A Server Infrastructure Part 2
1.4 Design A Monitoring Strategy Part 1
1.5 Design a Monitoring Strategy Part 2
1.6 Plan And Implement Automated Remediation Part 1
1.7 Plan And Implement Automated Remediation Part 2
1.8 Plan And Implement Automated Remediation Part 3
Module 2: Plan and Implement a Highly Available Enterprise Infrastructure
2.1 Plan And Implement A Highly Available Enterprise Infrastructure Part 1
2.2 Plan And Implement A Highly Available Enterprise Infrastructure Part 2
2.3 Highly Available Network Services Part 1
2.4 Highly Available Network Services Part 2
2.5 Plan And Implement Highly Available Storage Solutions Part 1
2.6 Plan And Implement Highly Available Storage Solutions Part 2
2.7 Plan And Implement Highly Available Roles Part 1
2.8 Plan And Implement Highly Available Roles Part 2
2.9 Business Continuity And Disaster Recovery Solution
Module 3: Plan and Implement a Server Virtualization Infrastructure
3.1 Plan And Implement Virtual Hosts Part 1
3.2 Plan And Implement Virtual Hosts Part 2
3.3 Plan And Implement Virtual Machines
3.4 Plan And Implement Virtualization Networking Part 1
3.5 Plan And Implement Virtualization Networking Part 2
3.6 Plan And Implement Virtualization Storage
3.7 Plan And Implement Virtual Machine Movement
3.8 Manage And Maintain A Server Virtualization Infrastructure
Module 4: Design and Implement Identity and Access Solutions
4.1 Design And Implement Identity And Access Solutions Part 1
4.2 Design And Implement Identity And Access Solutions Part 2
4.3 Implement And Manage Certificates
4.4 Design And Implement A Federated Identity Solution
4.5 Design And Implement AD Rights Management Services
4.6 Conclusion