O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Microsoft 70-246: Monitoring and Operating a Private Cloud with System Center 2012

Video Description

The new Private Cloud course provides full coverage of the knowledge and skills required to operate a private cloud using System Center 2012. This new course provides you the needed training to administer the private cloud, as well as management, monitoring infrastructure key elements, private cloud applications, and more. This course brings together all the features of Monitoring and Operating a Private Cloud using System Center 2012. Some of the skills you will learn in this class are: Describe the private cloud infrastructure Configure and optimize business unit clouds Deploy cloud services Configure SLAs, dashboards and widgets Configure compliance in the private cloud Protect the resources in the private cloud by using Data Protection Manager Automate Self-Service provisioning Implement problem management Automate incident creation, remediation, and change requests Operate and extend service management Configure application performance monitoring Monitor private cloud services

Table of Contents

  1. Chapter 1
    1. Instructor Introduction 00:01:00
    2. Course Overview 00:01:54
  2. Chapter 2
    1. System Center 2012 Overview Part1 00:06:33
    2. System Center 2012 Overview Part2 00:02:42
    3. Virtual Machine Manager Part1 00:00:23
    4. Virtual Machine Manager Part2 00:05:50
    5. Virtual Machine Manager Part3 00:05:06
    6. Virtual Machine Manager Part4 00:06:29
    7. Virtual Machine Manager Part5 00:02:31
    8. Operations Manager Part1 00:05:54
    9. Operations Manager Part2 00:05:25
    10. Operations Manager Part3 00:03:45
    11. Orchestrator Part1 00:04:39
    12. Orchestrator Part2 00:05:40
    13. Orchestrator Part3 00:07:02
    14. Server Manager Part1 00:05:28
    15. Server Manager Part2 00:06:18
    16. Configuration Manager 00:00:45
    17. Data Protection Manager Part1 00:04:55
    18. Data Protection Manager Part2 00:05:38
    19. Data Protection Manager Part3 00:04:02
    20. Data Protection Manager Part4 00:04:09
    21. Hyper V 00:01:35
    22. System Center 2012 Review 00:01:46
    23. Chapter Review 00:01:06
  3. Chapter 3
    1. Configure Data Center Process Automation 00:01:28
    2. Runbooks 00:01:13
    3. Implementing Workflows 00:00:28
    4. Creating Groups for Incident Templates 00:07:50
    5. Operations Manager Incident Template Creation Part1 00:05:31
    6. Operations Manager Incident Template Creation Part2 00:02:13
    7. Connection Building for Operations Manager Alert 00:04:01
    8. Incident Validation Part1 00:04:55
    9. Incident Validation Part2 00:03:14
    10. Runbook Characteristics 00:02:48
    11. Configuring Network Resources for Runbooks Deployment 00:06:00
    12. Creating the Business Unit 00:07:52
    13. Configuring Business Unit Security Part1 00:05:11
    14. Configuring Business Unit Security Part2 00:05:58
    15. Configuring Business Unit Security Part3 00:05:52
    16. Configuring Business Unit Security Part4 00:05:52
    17. Configuring Business Unit Security Part5 00:03:44
    18. Incident Testing in Orchestrator 00:06:11
    19. Configuring Orchestrator Connections 00:05:30
    20. Adding Activities to Runbooks Part1 00:07:06
    21. Adding Activities to Runbooks Part2 00:05:53
    22. Adding Activities to Runbooks Part3 00:06:21
    23. Adding Activities to Runbooks Part4 00:05:17
    24. Creating a Remediation Runbook Part1 00:06:55
    25. Creating a Remediation Runbook Part2 00:06:25
    26. Creating a Remediation Runbook Part3 00:06:39
    27. Creating a Remediation Runbook Part4 00:03:44
    28. Creating a Remediation Runbook Part5 00:07:11
    29. Creating a Remediation Runbook Part6 00:03:15
    30. Implementing Service Offerings 00:00:33
    31. Creating a Business Unit Group 00:05:08
    32. Creating the Queue Object 00:05:19
    33. Create Business Unit User Roll Part1 00:05:08
    34. Create Business Unit User Roll Part2 00:07:34
    35. Creating Notifications Channel 00:02:52
    36. Configuring Notification Subscriptions 00:06:57
    37. Publishing Incident Service Offering Part1 00:04:01
    38. Publishing Incident Service Offering Part2 00:07:27
    39. Creating a Service Offering 00:06:30
    40. Creating and Submitting an Incident Request Part1 00:02:02
    41. Creating and Submitting an Incident Request Part2 00:05:11
    42. Creating and Submitting an Incident Request Part3 00:02:42
    43. Creating a Minor Change Request Part1 00:03:26
    44. Creating a Minor Change Request Part2 00:04:57
    45. Chapter Review 00:01:20
  4. Chapter 4
    1. Deploying Resource Monitoring 00:02:23
    2. Deploying End to End Monitoring 00:01:20
    3. Configuring End to End Monitoring 00:00:45
    4. Deploying Operations Manager Core Components Part1 00:06:15
    5. Deploying Operations Manager Core Components Part2 00:06:35
    6. Configuring End to End Monitoring Part1 00:06:46
    7. Configuring End to End Monitoring Part2 00:07:02
    8. Configuring End to End Monitoring Part3 00:05:40
    9. Configuring End to End Monitoring Part4 00:05:38
    10. Configuring End to End Monitoring Part5 00:03:57
    11. Configuring End to End Monitoring Part6 00:06:12
    12. Configuring End to End Monitoring Part7 00:03:25
    13. Configuring End to End Monitoring Part8 00:01:45
    14. Create Monitoring Reports and Dashboards Partr1 00:04:56
    15. Create Monitoring Reports and Dashboards Part2 00:03:36
    16. Create Monitoring Reports and Dashboards Part3 00:03:55
    17. Create Monitoring Reports and Dashboards Part4 00:04:03
    18. Chapter Review 00:00:45
  5. Chapter 5
    1. Monitor Resources 00:01:14
    2. Monitor Network Devices Part1 00:01:07
    3. Monitor Network Devices Part2 00:04:02
    4. Monitor Virtualization Layer 00:03:41
    5. Monitor Application Health 00:02:51
    6. Monitoring Distributed Applications Part1 00:05:15
    7. Monitoring Distributed Applications Part2 00:03:58
    8. Chapter Review 00:00:33
  6. Chapter 6
    1. Configure and Maintain Service Management 00:01:19
    2. Implementing Service Level Management 00:01:03
    3. Configuring SLA Management 00:05:41
    4. Creating Service Level Metrics Part1 00:03:20
    5. Creating Service Level Metrics Part2 00:01:24
    6. Monitor and Review Warnings 00:01:19
    7. Manage the Analysis Library Part1 00:01:41
    8. Manage the Analysis Library Part2 00:05:35
    9. Manage the Analysis Library Part3 00:06:23
    10. Manage the Analysis Library Part4 00:02:29
    11. Configuring Performance Point Analytics Part1 00:05:45
    12. Configuring Performance Point Analytics Part2 00:05:53
    13. Configuring Performance Point Analytics Part3 00:02:18
    14. Scorecards and Dashboards Part1 00:05:12
    15. Scorecards and Dashboards Part2 00:04:41
    16. Scorecards and Dashboards Part3 00:02:59
    17. Chapter Review 00:00:41
  7. Chapter 7
    1. Manage Configuration and Protection 00:01:25
    2. Manage Compliance and Protection 00:00:25
    3. Governance Risk Compliance Part1 00:04:26
    4. Governance Risk Compliance Part2 00:05:18
    5. Governance Risk Compliance Part3 00:03:29
    6. Creating Authority Documents, Control Objectives and Activities Part1 00:02:30
    7. Creating Authority Documents, Control Objectives and Activities Part2 00:06:11
    8. Creating Authority Documents, Control Objectives and Activities Part3 00:05:12
    9. Creating Authority Documents, Control Objectives and Activities Part4 00:05:37
    10. Creating Authority Documents, Control Objectives and Activities Part5 00:02:57
    11. Assigning Baselines Part1 00:04:40
    12. Assigning Baselines Part2 00:03:40
    13. Assigning Baselines Part3 00:05:56
    14. Implementing Backup and Recovery 00:01:17
    15. Deploying the DPM Agent 00:04:45
    16. Create a Protection Group 00:06:47
    17. Configure the Manual Recovery of Key Data Part1 00:03:58
    18. Configure the Manual Recovery of Key Data Part2 00:06:33
    19. Configure the Manual Recovery of Key Data Part3 00:01:18
    20. Configure Self-Service Recovery of Key Data Part1 00:06:54
    21. Configure Self-Service Recovery of Key Data Part2 00:05:37
    22. Configuring Automatic Protection of Key Data Part1 00:05:44
    23. Configuring Automatic Protection of Key Data Part2 00:06:32
    24. Configuring Automatic Protection of Key Data Part3 00:04:45
    25. Configuring Automatic Protection of Key Data Part4 00:03:22
    26. Configuring Automatic Protection of Key Data Part5 00:04:18
    27. Manage Updates 00:00:32
    28. Monitoring Protection Status Part1 00:05:45
    29. Monitoring Protection Status Part2 00:02:09
    30. Monitoring Protection Status Part3 00:02:04
    31. Updating Distributed Applications with DPM 00:02:33
    32. Chapter Review 00:01:04
    33. Course Review 00:04:02