MCSA Windows Server 2012


Eager to show that you have a skillset relevant across multiple solution areas in a business environment? Then the MCSA Windows Server 2012 certification is for you.

  • 1

    Get hired

    Get qualified for roles such as a network or computer systems administrator and a computer support specialist.

  • 2

    Practise and prepare

    Allows you to solidify your primary skillset of Windows Server 2012 knowledge in order to reduce IT costs and deliver more business value.

  • 3

    Globally recognised validation of your ability

    Relevant across a diverse range of IT environments in any size business across the globe.

Your quick course guide

Certification: MCSA Windows Server 2012 

Study time: Full time - two weeks | Part time - three months

Vendor: Microsoft

Provider: Skillsoft

Student support: StudentCare™ and expert mentors

Prerequisites: Ideally one year of experience implementing and administering Windows Server 2012

Assessment: Exam based - MCSA 70-410, 70-411 + 70-412 

Resources: Internet access and email

Ideal for: Computer support specialists, network systems adminstrator or computer systems administrator 

Included in your modules

Essential skills for your career

410: Installing and configuring Windows Server 2012

  • Storage management
  • Shares and permissions
  • Storage and printing
  • Hyper v
  • Virtualisation
  • IPV4
  • CIDR
  • Ans IPV6
  • DHCP configuration
  • DNS configuration
  • Active directory
  • Installing and configuring: ad configuration
  • Installing and configuring: ad accounts and groups
  • Installing and configuring: group policies
  • Installing and configuring: security 

411: Administering Windows Server 2012

Administering: Wds and monitoring

  • Function of the WDS role
  • PXE booting
  • Working with images
  • WDSUTIL and driver packages
  • Transmission strategies and unattended installations in Windows Server 2012
  • The use of performance monitor
  • Data collector sets
  • Reliability monitor
  • Event viewer
  • Creating custom views and subscriptions in Windows Server 2012 

Administering: WSUS

  • Windows server update services in Windows Server 2012
  • How to configure the WSUS role
  • Automatic updates with group policies
  • Client side targeting
  • Deploying WSUS updates
  • Reviewing updates using WSUS reports
  • Using PowerShell to configure WSUS
  • Migrating WSUS 3.0 SP2 to Windows Server 2012 WSUS
  • Using MBSA to verify WSUS Updates

Administering: Dfs and Fsrm

  • Distributed file system - DFS 
  • The components that comprise DFS
  • installation methods for DFS
  • DFS Namespaces
  • DFS schedules and staging
  • Remote differential compression
  • File server resource manager - FSRM - installation
  • FSRM quotas and FSRM File Screen policies
  • FSRM file classification
  • FSRM storage report management
  • FSRM file management tasks

Administering: Bitlocker, Efs and auditing

  • BitLocker
  • BitLocker installation options
  • BitLocker to encrypt volumes
  • Managing BitLocker from the command line
  • BitLocker network unlock
  • Configuring network unlock
  • BitLocker group policy implementations
  • BitLocker recovery options
  • EFS group policies managing EFS keys
  • EFS best practices
  • Audit policies
  • Audit policy options
  • Auditpol
  • Expression based auditing
  • Removable device policies will also be covered 


  • Examines DNS configurations in Windows Server 2012 including
  • Zone transfers
  • Stub zones
  • AD integrated zones
  • Zone replication
  • Zone delegation
  • Zone transfers
  • Zone forwarders
  • DNS record types
  • Update types
  • Aging and scavenging
  • Round robin
  • NAT
  • Remote access
  • Remote access in the Enterprise
  • VPN settings
  • Remote dial in
  • Deploying remote access in the cloud
  • DirectAcess configurations


  • Examines configuring RADIUS
  • RADIUS server groups
  • Remote RADIUS
  • RADIUS proxy
  • RADIUS accounting
  • Examines the Network Policy Server
  • NPS configurations
  • Importing and exporting NPS server configurations
  • Network access protection
  • NAP configurations
  • Components of a network access solution

Service accounts

  • Examines service accounts
  • Service account management
  • Creating and deploying service accounts
  • Examines creating and installing, managing and removing managed service accounts
  • Examines creating, deploying, modifying and removing group managed service Accounts along with Kerberos delegation

WDC, FSMO + virtual DC cloning

  • Examines writable domain controllers
  • Domain based services
  • Universal group membership
  • Flexible single master operations
  • Schema administration
  • Schema configuration
  • Domain naming master
  • FSMO roles
  • FSMO role placement and seizing
  • Examines active directory partitions
  • Forest active directory partitions
  • Virtualised domain controller cloning
  • Configuring and deploying a virtualised domain controller clone

RODC and password policies

  • Examines password replication polices
  • Prepopulating account password
  • Configuring password policies
  • Local group policies on Windows 8
  • Local group policy precedence
  • Examines minimum password age settings
  • Automatic and manual password permission configurations
  • Account lockout policies
  • Password settings objects
  • Creating, editing and deploying a PSO

Backup and recovery

  • Examines methods to protect active directory
  • Backup Windows server
  • The AD
  • System state
  • Examines the wbadmin
  • Recovering AD
  • AD recycle bin
  • Active directory offline maintenance
  • Active directory services
  • Active directory mounting tool
  • Snapshots

Policies and templates

  • Examines the group policy management editor
  • Software installation policies
  • Configuring script policies
  • Folder redirection policies
  • Examines administrative templates
  • Migrating .ADM files to .ADMX format
  • Administrative template filtering
  • Creating and importing a security template

GPO manipulation and processing

  • Examines group policy objects
  • GPO inheritance and precedence
  • Enforcing GPO settings
  • GPO security
  • WMI filtering
  • GPO management delegation
  • Examines group processing
  • Deploying GPO loopback processing
  • Overriding GPO policy operations
  • Client side extension behavior
  • Resultant set of policy
  • Gpresullt.exe
  • GPO backup and restore features
  • Creating migration tables
  • Powershell group policy modules
  • Item level targeting

412: Configuring advanced Windows Server 2012 services

NLB + clustering

  • Recognise how to configure NLB for a given scenario
  • Recognise how to configure an NLB cluster in a given scenario
  • Describe how to manage host traffic and operations in a given scenario
  • Create and configure an NLB cluster

VM clusters + DR

  • Identify the key considerations for using clustering in a virtual environment
  • Recognise how a highly available VM is created
  • Describe the migration options for virtual machines
  • Describe the options available for virtual machine management


  • Describe high availability features of iSCSI
  • Recognise how to install and configure iSCSI
  • Describe iSNS architecture components
  • Describe how BranchCache is used
  • Recognise the options available for optimising storage 

File management and DAC

  • Describe the key considerations involved in implementing file classification
  • Recognise how to manage files using FCI
  • Sequence the steps to implement dynamic access control
  • Recognise how to configure dynamic access control in a given scenario


  • Recognise how to configure advanced DHCP features
  • Identify how to ensure DHCP high availability
  • Describe how to configure advanced DNS settings
  • Choose the most appropriate security feature in a given scenario

Forests and domains

  • Identify the difference between domains and forests
  • Identify the guidelines for raising functional levels
  • Match the trust relationship types to their descriptions
  • Describe advanced trust relationship configuration functions
  • Configure trust relationships

Site replication

  • Describe the characteristics of AD DS replication
  • Identify the advantages of using active directory sites in a given scenario
  • Sequence the steps in the AD site configuration process
  • Manage RODC password replication policy


  • Recognise the functions of PKI components
  • Distinguish between different types of CA installations
  • Recognise the processes involved in certificate validation and revocation

RMS + federation

  • Describe the functionality and components of AD RMS
  • Describe the options for configuring AD RMS
  • Identify the characteristics of AD RMS templates
  • Recognise RMS trust policy options
  • Create an AD RMS template

Get certified the Learning People way

Professional development that works around you

  • World's #1 eLearning portal
  • 12 months unlimited access
  • 24x7 support
  • Global community of peers
  • Hands on interactive Practice Labs
  • Test prep
  • Award winning training used globally by leading corporate clients

Average salary

2016 JUL
2017 JUL
2018 JUL
Read more

Why join us?

  • Award winning customer support
  • We know the job market inside out
  • Trusted by the giants
  • Value for money
  • CV detox - exclusive to our students
  • We're with you from start to finish
  • Expert career advice
  • Progress reports
  • Exam booking support
  • All UK students receive an NUS student discount card
  • Your success is our success

CV detox

It's not just about your CV...