Browse Library

Active Directory with Windows Server 2016: The Total Course

Identity, Access, and Authentication with Microsoft AD and Identity with Windows Server 2016 (70-742) Exam Prep

Instructed by Total Seminars

12 days left at this price!
$35 $190 82% off
Get single Course Access
It Includes
  • Get access to this course only
  • Lifetime Course Access
  • Play & Pause Videos
  • High Quality Recorded Lectures
  • Learn Online from Mobile/PC/Tablet
  • Download Course for Offline Viewing
  • Inlcudes Real Projects
  • Free Instructor Support
Want to Learn more? Get access to all marketplace courses starting at $19/mo/ month
  • Once you complete the course, you will have the knowledge and confidence to pass the exams AND the skills to be a great network tech. This course is ideal as both a study tool and an on-the-job reference.
  • Your new skills and the CompTIA Network+ Certification will help you land a network tech job or if you are already a network tech, get that raise or advancement you are seeking.

Total Seminars, your source for best-selling cybersecurity courses, brings you this informative course on Active Directory with Barbara Andrews, MCT, MCSE, MCITP, MCSA, MCDBA, and MCP.

Barbara has 20+ years of experience and is proficient with almost all of Microsoft’s products, including Windows Server, SQL Server, System Center, Azure, and Hyper-V. She is also an HPE Certified Trainer (Master HPE ASE) and SalesForce Admin.


If you're a newly-minted Network or Security Admin (or are aspiring to be one), this course is a great option to learn all about managing identities in Active Directory.

Did you know Network Administrators make, on average, $69,000 per year?*

Whether you're looking to pass the Microsoft Identity with Windows Server 2016 (70-742) certification exam or you're just looking to learn some in-depth knowledge about Active Directory, you’re in the right place.



 Main Exam Objectives 70-742  -  % of Exam

1.0 Install and Configure Active Directory Domain Services  -  20%-25%

  • 1.1 Install and configure domain controllers

  • 1.2 Create and manage Active Directory users and computers

  • 1.3 Create and manage Active Directory groups and organizational units (OUs)

2.0 Manage and Maintain AD DS  -  15%-20%

  • 2.1 Configure service authentication and account policies

  • 2.2 Maintain Active Directory

  • 2.3 Configure Active Directory in a complex enterprise environment

3.0 Create and Manage Group Policy  -  25%-30%

  • 3.1 Create and manage Group Policy Objects (GPOs)

  • 3.2 Configure Group Policy processing

  • 3.3 Configure Group Policy settings

  • 3.4 Configure Group Policy preferences

4.0 Implement Active Directory Certificate services  -  10%-15%

  • 4.1 Install and configure AD CS

  • 4.2 Manage certificates

5.0 Implement Identity Federation and Access Solutions  -  15%-20%

  • 5.1 Install and configure Active Directory Federation Services (AD FS)

  • 5.2 Implement Web Application Proxy (WAP)

  • 5.3 Install and configure Active Directory Rights Management Services (AD RMS)



Exam code: 70-742

Number of questions: 40-60

Length of exam: 120 minutes

Passing score: 700 out of 1000

Exam voucher cost: $165

Requirements: There are no stated requirements for this exam, however we recommend familiarity with Windows Server 2016 and basic knowledge of Active Directory




*US Bureau of Labor Statistics

  • Basic familiarity with networks.
  • There are no specific prerequisites as the course covers all the topics in detail. However, it’s a good idea to have an understanding of CompTIA A+ Certification topics or to be A+ Certified. You can learn more about A+ Certification topics from our Mike Meyers – Total Seminars CompTIA A+ Certification course on Udemy.
  • This course is intended for anyone that is preparing for a network technician position or looking to improve their skills and become CompTIA Network+ Certified. However, it goes beyond that and will give you the skills you need to be a better network tech on the job.
  • This is a complete and comprehensive CompTIA Network+ Certification (N10-007) course. It is designed to prepare the student to be able to take and pass the certification exam needed to become CompTIA Network+ Certified.
View More...

Section 1 : Introduction

  • Lecture 1 :

Section 2 : Chapter 1: Install and Configure Active Directory Domain Services

  • Lecture 1 :
  • Installing AD files for a New Forest
  • As you step through Server Manager, learn how to set up a new domain controller using various tools and options.
  • Lecture 2 :
  • Configure New Forest Root Domain
  • In this episode, you’ll learn how to use the configuration wizard to define settings and options to create a new forest.  G11
  • Lecture 3 :
  • Adding Domain Controller to an Existing Forest
  • The next step is to add a DC into a forest, so you’ll review and consider options that will affect how the domain interacts with existing AD security systems.  G12
  • Lecture 4 :
  • DC Installation Options
  • Now it’s time to explore the various methods of installation. You’ll get to see the graphical version, called the configuration wizard, as well as the PowerShell option. You’ll also learn about upgrade options and the effect of each.  G13
  • Lecture 5 :
  • Introduction to AD DS Part 1
  • The beginning of this series starts off by reviewing the various components that you will be managing with Active Directory. In this episode, we discuss AD partitions, schema, domains, and other logical and physical components that interact within the AD environment.  G8
  • Lecture 6 :
  • Introduction to AD DS Part 2
  • We continue looking into the robust interaction of the various components, exploring the global catalog, RODC, and how to work with OUs.
  • Lecture 7 :
  • DC Cloning
  • In this episode, you’ll walk through the cloning operation for DCs, looking at the various clone tools that can be used and the benefits of using clones.
  • Lecture 8 :
  • RODCs
  • Understand the benefits of using RODCs in working environments, and see how to work with off-site management of users, groups, and objects. Learn what security policies can be written and implemented for sites that do not have local management.  G15
  • Lecture 9 :
  • DC Configuration Options
  • In this episode, you’ll explore DC locations, global catalog servers, SRV records, and the DNS manager. Explore the FSMO roles and learn more about role operations and management. G16
  • Lecture 10 :
  • Managing User Accounts
  • User account management is easy when built with a purpose and a plan. In this segment, explore how to set up accounts through Server Manager.
  • Lecture 11 :
  • Intro to Groups
  • Walk through the processes to set up users in groups, and learn about the logical and physical considerations you’ll want to consider. Then you’ll work with groups for security management considerations and maintenance.
  • Lecture 12 :
  • Managing Computer Accounts
  • Examine the placement of computer accounts in the OU structure, and the considerations and steps needed to place these assets within your structure, using both the GUI and PowerShell options.
  • Lecture 13 :
  • Managing OUs
  • Organization is key to a good OU layout. In this episode, explore the creation and management of OUs as well as various strategies used when laying out the structure.
  • Lecture 14 :
  • Using PowerShell
  • Learn where PowerShell excels as a tool for the operation and maintenance of various AD users, groups, and objects.   G22
  • Lecture 15 :
  • Managing Groups
  • This episode teaches you how to manage group creation and maintenance using Active Directory Users and Computers, and the alternative PowerShell commands. You’ll then tour the settings to manage users within a group.
  • Lecture 16 :
  • Chapter 1 Quiz
  • Chapter 1 Quiz

Section 3 : Chapter 2: Managing and Maintaining AD DS

  • Lecture 1 :
  • Configuring Account Security
  • Using Server Manager, walk through the built-in security tools that can create a strong security program. Learn about Password Settings Objects (PSOs) and how they are applied, along with how Kerberos is used by AD domain controllers.
  • Lecture 2 :
  • Configuring PSOs
  • Learn how to work with PSOs to deploy general and security policies using PowerShell commands.
  • Lecture 3 :
  • Configuring Authentication Policies and Silos
  • In this episode, learn how to authenticate users, services, and computers using the Directory Admin Center, and how to work with authentication and silo policies.
  • Lecture 4 :
  • Configuring MSA Service Accounts
  • In this video, learn best practices when it comes to setting up service accounts, explore service account management, and see how to configure and maintain MSA accounts.
  • Lecture 5 :
  • Group MSAs
  • Learn the benefit of using group MSAs and how to configure objects to associate with MSA groups using PowerShell. Work in PowerShell to create a KDS (Key Distribution Services) root key.
  • Lecture 6 :
  • AD DS Recovery
  • In this critical episode, examine the built-in MS utilities, Ntdsutil and Administrative Center, for recovery of the AD databases. Then walk through the restore options using a snapshot, the recycle bin, and an authoritative restore.
  • Lecture 7 :
  • SYSVOL Replication
  • Explore SYSVOL and how it’s handled in AD domains and forests. Learn about protocol options for replication and follow along as PowerShell commands are used for FRS to DFS migration.
  • Lecture 8 :
  • AD Advanced Deployments
  • In this episode, you’ll first examine some of the design considerations and boundaries for setting up AD domains, forests, and OUs. Then you’ll learn about the issues involved with implementing changes or new domains.
  • Lecture 9 :
  • AD Functional Levels
  • Understand the various functional levels and how they affect design and implementation, and learn how to raise functional levels on DCs and forests.
  • Lecture 10 :
  • Deploying New AD Domains
  • Walk through the deployment phase of adding a domain using the configuration wizard, and examine the considerations and processes involved.
  • Lecture 11 :
  • AD Migration
  • In this episode, learn how to use the AD Migration Tool (ADMT) to move users, groups, resources, and assets to different domains and forests, including implementing pre-migration steps and final options.
  • Lecture 12 :
  • AD Trusts
  • This episode tackles the concepts and implementation of trusts. Work through the inheritance properties and transitive trust, including the overall trust flows and implications.
  • Lecture 13 :
  • AD Sites
  • Learn about the best practices for usage of sites, the implications of replications and site design, Barbara discusses the various types of segregation by site and why these might be considerations
  • Lecture 14 :
  • AD Site Links
  • In this episode, learn about the important considerations when creating site links, how to use site links to increase performance, and how to assign site link prioritization.
  • Lecture 15 :
  • Advanced Trust Settings
  • Review the AD security settings for trusts and understand the usage of SID filtering and name suffix routing as a defense-in-depth security policy.
  • Lecture 16 :
  • Chapter 2 Quiz
  • Chapter 2 Quiz

Section 4 : Chapter 3: Create and Manage Group Policy

  • Lecture 1 :
  • Group Policies
  • Security controls and security boundaries are increasingly becoming more stringent. Fortunately, group policy tools are not only efficient but also easy to maintain. It’s through these policies that forests, domains, users, and groups access shared resources.
  • Lecture 2 :
  • Domain, DC, and Local Policies
  • The Group Policy Management Console (GPMC) can be used to apply rights management and is implemented through policies. In this episode, both default domain and configured domains are reviewed.
  • Lecture 3 :
  • Managing GPOs
  • In this episode, learn how to manipulate and manage GPOs using templates, shown both at the console and in PowerShell.
  • Lecture 4 :
  • GPO Linking
  • Learn about implementing GPOs at forest, domain, user, and resource levels. Understand the hierarchy of GPO implementation and the processing order.
  • Lecture 5 :
  • GPO Filtering
  • Learn how to use ACLs in group policy. Explore how to apply group management for access and rights implementation.
  • Lecture 6 :
  • GPO Processing Options
  • Learn the use of group processes, including various implementations of advanced group policy, such as slow-link detection.
  • Lecture 7 :
  • Working with Templates
  • In this episode, you’ll learn admin template management, and walk through the configuration options for the Central Store.
  • Lecture 8 :
  • GPO Client Setting
  • In this episode, discover implementing GPO client settings, and learn how to use GPO settings for redirecting paths, software deployment, and executing security scripts.
  • Lecture 9 :
  • Preferences and Item-Level Targeting
  • Explore group policy preferences to personalize a user account based on the OS permissions set, and learn about item-level targeting as an implementation based on presets.
  • Lecture 10 :
  • Chapter 3 Quiz
  • Chapter 3 Quiz

Section 5 : Chapter 4: Implement AD Certificate Services

  • Lecture 1 :
  • Certificates with Mike
  • A visit from Mike Meyers provides an overview of certificates, certificate authorities, and PKI (Public Key Infrastructure). This segment from Mike’s Security+ series will help fill in any knowledge gaps you might have before moving into AD Certificate Services & CAs.
  • Lecture 2 :
  • AD CS Planning
  • Learn about the Active Directory Certificate Services role, explore the various CA types, and analyze considerations when it comes to installing the CS role.
  • Lecture 3 :
  • Installing Root CAs
  • In this episode, learn how to install Certificate Services using Server Manager and understand the various options presented through the installation process.
  • Lecture 4 :
  • Preparing an Offline Root CA
  • Learn how to prepare for and ensure services are maintained through subordinate CAs when the root CA is offline.
  • Lecture 5 :
  • Installing a Subordinate CA
  • In this episode, walk through the installation and configurations needed to add a subordinate CA.
  • Lecture 6 :
  • Administering CAs
  • Explore the Certificate Management console to manage CAs and learn how to apply permissions and security roles to CAs.
  • Lecture 7 :
  • Enrollment, Renewal, and Revocation
  • Work through the various deployment methods for CAs and learn the process of revoking a CA.
  • Lecture 8 :
  • Chapter 4 Quiz
  • Chapter 4 Quiz

Section 6 : Chapter 5: Implement AD Certificate Services

  • Lecture 1 :
  • Intro to AD FS
  • In this episode, dive into the concepts and usage of AD Federation Services. Learn about the expanded trust relationships, authentication roles, and the claims process.
  • Lecture 2 :
  • Understanding AD FS
  • Explore the various configurations in AD FS. You’ll learn about process steps and trust paths to enable Single Sign-On (SSO) in a variety of use cases.
  • Lecture 3 :
  • Preparing AD FS Installation
  • Walk through the steps to install Active Directory Federation Services, including the list of preinstallation requirements and planning needed to accomplish this installation.
  • Lecture 4 :
  • FS Account and Resource Partners
  • Learn about the components of AD Federation Services, including the partners involved and the various trust options that can be configured based on incoming claims.
  • Lecture 5 :
  • Primary and Multifactor Authentication
  • In this episode, explore the methods of allowing authentication and access with SSO. Learn about the access control policy templates and multifactor authentication with FS.
  • Lecture 6 :
  • Intro to Web App Proxy
  • Understand the benefits, usage, and purpose of Web App Proxy (WAP) with Federation Services and learn about the requirements to implement and authenticate.
  • Lecture 7 :
  • Preparing to Install Web Application Proxy
  • In this episode, examine the requirements and planning needed to install the Web Application Proxy (WAP). Understand the interaction with DNS, load balancing, and the configurations needed for implementation of WAP.
  • Lecture 8 :
  • Intro to AD RMS
  • Right Management Services (RMS) is a cross-application file security management solution that can be executed with AD. RMS implements security on information regardless of location.
  • Lecture 9 :
  • Chapter 5 Quiz
  • Chapter 5 Quiz
  • How do i access the course after purchase?

    Once you purchase a course (Single course or Subscription), you will be able to access the courses instantly online by logging into your account. Use the user name & password that you created while signing up. Once logged in, you can go to the "My Courses" section to access your course.
  • Are these video based online self-learning courses?

    Yes. All of the courses comes with online video based lectures created by certified instructors. Instructors have crafted these courses with a blend of high quality interactive videos, lectures, quizzes & real world projects to give you an indepth knowledge about the topic.
  • Can i play & pause the course as per my convenience?

    Yes absolutely & thats one of the advantage of self-paced courses. You can anytime pause or resume the course & come back & forth from one lecture to another lecture, play the videos mulitple times & so on.
  • How do i contact the instructor for any doubts or questions?

    Most of these courses have general questions & answers already covered within the course lectures. However, if you need any further help from the instructor, you can use the inbuilt Chat with Instructor option to send a message to an instructor & they will reply you within 24 hours. You can ask as many questions as you want.
  • Do i need a pc to access the course or can i do it on mobile & tablet as well?

    Brilliant question? Isn't it? You can access the courses on any device like PC, Mobile, Tablet & even on a smart tv. For mobile & a tablet you can download the Learnfly android or an iOS app. If mobile app is not available in your country, you can access the course directly by visting our website, its fully mobile friendly.
  • Do i get any certification after completing the course?

    Yes. Once you succesfully complete any course on Learnfly marketplace, you get a certiifcate of course completion emailed to you within 24 hours with your name & the Learnfly badge. You can definately brag about it & share it on your social media or with friends as one of your achievement. Click here to view the sample certificate Click Here
  • For how long can i access my course after the purchase?

    If you buy a single course, that course is accessible to you for a lifetime. If you go for a premium subcription, you can access all the courses on Learnfly marketplace till your subscription is Active.
  • Whats the difference between Single Course Purchase & Go Premium option?

    With Single Course Purchase, you only get an access of one single course. Whereas, with premium monhtly or annual subscription, you can access all the existing or new courses on learnfly marketplace. You can decide what option suits you the best and accordingly you can make your purchase.
  • Is there any free trial?

    Currently, we don't have any free trial but it may be available in near future.
  • What is the refund policy?

    We would hate you to leave us. However, if you are not satisfied, you can ask for a full refund within 30 days & we will be happy to assist you further.

Total Seminars,

Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print. Total Seminars has created a number of best-selling video courses by Mike Meyers and the Total Seminars Team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars' web site.
View More...

Learn NxtGen Hacking with Technolog...

By : Gopikrishna C

Lecture 80


TCP/IP: The Complete Course

By : Lazaro (Laz) Diaz

Lecture 17


VoIP Configuration and Attacking (H...

By : Arpit Mittal

Lecture 6


CISSP- Certification Introduction


Lecture 18


Practical Blockchain & Smart Contra...

By : Abhilash Nelson

Lecture 40


Complete Ethical Hacking & Penetrat...

By : Abhilash Nelson

Lecture 30

Sign up and start learning
By signing up, you agree to our Terms of Use and Privacy Policy
Forget Password