Level: Advanced

Course 20345-1A: Administering Microsoft Exchange Server 2016

5 Day | Instructor Led

In this course, you will learn how to install, configure, and manage Exchange Server 2016, as well how to manage mail recipients and public folders, including how to perform bulk operations using Exchange Management Shell. You will also learn how to manage client connectivity, message transport and hygiene, implement and manage highly available Exchange Server deployments, as well as implement back up and disaster recovery solutions. The course also teaches students how to maintain and monitor an Exchange Server 2016 deployment. In addition, students will learn how to administer Exchange Online in an Office 365 deployment.

Inquire About:
Course 20345-1A: Administering Microsoft Exchange Server 2016

Ideal Candidates for Course 20345-1A: Administering Microsoft Exchange Server 2016 Class

This course is primarily intended for people aspiring to become enterprise-level messaging administrators for Exchange Server 2016. IT generalists and help-desk professionals who want to learn about Exchange Server 2016 might also take this course. Students taking this course are expected to have at least two years of experience working in the IT field—typically in the areas of Windows Server administration, network administration, help desk, or system administration. They are not expected to have experience with previous Exchange Server versions.

Course 20345-1A: Administering Microsoft Exchange Server 2016 Prerequisites

A minimum two years of experience administering Windows Server, including Windows Servier 2012 R2 or Windows Server 2016.
A minimum two years experience working with active Directory Domain Services (AD DS). A minimum two years of experience working with name resolution including Domain Name System (DNS).
Understanding of TCP/IP and networking concepts.
Understanding of Windows Server 2012 R2 or later, and AD DS, including planning, designing, and deploying.
Understanding of security concepts such as authentication and authorization.
Understanding of Simple Mail Transfer Protocol (SMTP).
Working knowledge of public key infrastructure (PKI) technologies, including Active Directory Certificate Services (AD CS).

What You'll Get in Course 20345-1A: Administering Microsoft Exchange Server 2016

What You'll Learn in Course 20345-1A: Administering Microsoft Exchange Server 2016

Perform deployment and basic management of Exchange Server 2016
Manage Exchange Server 2016
Create and manage various recipient objects in Exchange Server 2016
Use Exchange Management Shell to create and manage various recipient objects in Exchange Server 2016, and perform various tasks to automate Exchange management procedures
Configure client connectivity to Exchange Server 2016, and manage Client Access services
Implement and manage high availability
Implement backup and disaster recovery for Exchange Server 2016
Configure message transport options
Configure message hygiene and security options
Implement and manage Exchange Online deployments
Secure and maintain Exchange Server 2016
Monitor and troubleshoot Exchange Server 2016

Course 20345-1A: Administering Microsoft Exchange Server 2016 Certification

Exam 70-345 Designing and Deploying Microsoft Exchange Server 2016

Course 20345-1A: Administering Microsoft Exchange Server 2016 Outline

1. Deploying Microsoft Exchange Server 2016 Overview of Exchange Server 2016 Requirements and deployment options for Exchange Server 2016 2. Managing Microsoft Exchange Server 2016 servers Exchange Server 2016 management Overview of the Exchange 2016 Mailbox server Configuring Mailbox servers 3. Managing recipient objects Exchange Server 2016 recipients Managing Exchange Server recipients Configuring address lists and policies 4. Managing Microsoft Exchange Server 2016 and recipient objects by using Exchange Management Shell Overview of the Exchange Management Shell Managing Exchange Server 2016 by using Exchange Management Shell Managing Exchange Server 2016 by using Exchange Management Shell scripts 5. Implementing client connectivity Configuring client access services in Exchange Server 2016 Managing client services Client connectivity and publishing of Exchange Server 2016 services Configuring Outlook on the web Configuring mobile messaging on Exchange Server 2016 6. Managing high availability in Exchange Server 2016 High availability on Exchange Server 2016 Configuring highly available mailbox databases Configuring high availability of Client Access services 7. Implementing disaster recovery for Microsoft Exchange Server 2016 Implementing Exchange Server 2016 backup Implementing Exchange Server 2016 recovery 8. Configuring and managing message transport Overview of message transport Configuring message transport Managing transport rules 9. Configuring antivirus, antispam, and malware protection Deploying and managing an Edge Transport server for message security Implementing an antivirus solution for Exchange Server 2016 Implementing an antispam solution for Exchange Server 2016 10. Implementing and managing Microsoft Exchange Online deployments Overview of Exchange Online and Office 365 Managing Exchange Online Implementing the migration to Exchange Online 11. Monitoring and troubleshooting Microsoft Exchange Server 2016 Monitoring Exchange Server 2016 Troubleshooting Exchange Server 2016 12. Securing and maintaining Exchange Server 2016 Securing Exchange Server with role-based access control (RBAC) Configuring audit logging on Exchange Server 2016 Maintaining Exchange Server 2016

Testimonials

A. Erlich

RITSC, N6C

I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin

MicroTech

The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.


Top Related Courses

The Ransomware exercise is a customized, six-hour, live fire Cyber Range training exercise hosted on ACRE. This exercise is led by expert cyber security engineers and can be executed in a classroom as well as remotely. In this exercise, a ransomware-based attack (i.e., “WannaKry”) is launched via a malicious spear phishing originated compromise. This exercise includes a hands-on keyboard interface, which creates realistic technical training and management interaction opportunities. This exercise is not simulated – it is real malware, detonated in representative network enviroment. Participants are encouraged to view the attack as if it were happening to their institutions in real time, and asked to share what they have done or would do based on the facts provided. Such “range-based” exercises help institutions better understand the impact of an attack and prompt them to improve the ways in which their network defenders respond, communicate, request assistance, and recover from real-world cyber attacks. Institutions that have participated in this exercise have benefited directly by building greater interaction with their security community, as well as increasing capability maturity levels and resiliency across their specific customer sector.

The Cloud Leak exercise is a customized, six-hour, Cyber Range exercise hosted on ManTech’s ACRE® cyber range. This exercise is led by technical instructors and expert cybersecurity engineers and can accommodate 10 to 50 participants in a classroom or remotely. In this exercise, an attack on a cloud-hosted storage service is simulated. Participants are given the following scenario: A major media outlet has contacted bank.com media relations asking for a statement about the discovery that thousands of bank.com customer credit card numbers were obtained through a breach of a cloud storage service. Bank.com is unaware of any such breach. The CEO has requested an immediate investigation into the breach. Participants must determine how the cloud storage site was compromised and the extent of the intrusion, including the types of data exposed and any further infiltration of bank.com’s network. This exercise uses a hands-on keyboard approach to create realistic technical training and management interaction opportunities where participants respond to and report events as identified. Participants are encouraged to view the attack as if it were happening to their institutions in real time. Participants are asked to share what they have done or would do based on the facts provided.

CompTIA's Cybersecurity Analyst (CSA+) training from UKI teaches students to apply behavioral analytics to improve the overall state of IT security, providing critical knowledge and skills that are required to prevent, detect and combat cybersecurity threats.

© 2019 Ultimate Knowledge Insitute | All Rights Reserved
GSA# GS-35F-0469W