: Study how AD relies on DNS for service location (SRV records) and name resolution. Phase 2: Building Your Lab
: Practice performing an Authoritative vs. Non-Authoritative restore of the AD database (NTDS.dit). Phase 5: Security & Modern Identity Secure your infrastructure against common attack vectors.
: Learn the hierarchy of Forests , Domains , Trees , and Organizational Units (OUs) .