Choose the date offerings related to Dynamics Edge Microsoft Official Course 2069712 valuable Windows 7, 8 and 10 training class you can trust in order to get the highest quality training. There are options for a custom class.
This 5-day Windows 10 Boot Camp course provides students with the knowledge and skills required to install and configure Windows 10 desktops and devices in a Windows Server domain corporate environment.
It also provides administrators with the knowledge and skills needed to deploy and manage Windows 10 desktops, devices, and applications in an enterprise environment.
Students learn how to plan and implement Windows 10 deployments in large organizations. These skills include learning how to install and customize Windows 10 operating systems and apps, and configure local and remote network connectivity and storage. Students will also learn how to configure data security, device security, and network security, and maintain, update, and recover Windows 10. Students also learn how to manage the Windows 10 installations after deployment to provide secure identity and data access using technologies related to Group Policy, Remote Access, and Device Registration.
To support a variety of device and data management solutions, Microsoft Azure Active Directory, Microsoft Intune, and Microsoft Azure Rights Management are introduced. These services are part of the Enterprise Mobility Suite which provide identity and access management, cloud-based device, application, and update management, and secure data access to information stored both in the cloud and on any location within your corporate network.
This course is intended for IT professionals who administer and support Windows 10 desktops, devices, users, and associated network and security. Also for those specializing in Windows 10 desktop and application deployments and managing the cloud-based application and data service environments for medium-to-large enterprise organizations.
Students who seek certification in the 70-697 Windows 10 Configuring exam will also benefit from this course. This course is also intended to provide skills for Enterprise Desktop/Device Support Technicians (EDSTs) who provide Tier 2 support to users who run Windows 10 desktops and devices within a Windows domain environment in medium to large enterprise organizations.
These professionals typically work with networks that are configured as Windows Server domain-based environments with managed access to the Internet and cloud services.
After completing this course, students will be able to:
This module introduces the Windows 10 operating system. It describes the new features in Windows 10, and the important changes since Windows 8.1. It describes the use, navigation, and customization of the new, enhanced user interface. This module also mentions the features of Windows 10 that make it beneficial for organizations of different sizes.
This module introduces the different editions of Windows 10, and the differences between them. It describes the requirements and available options for installing Windows 10 on a device. It also provides instructions on installing Windows 10 and upgrading to it. This module discusses points to consider when deciding between an upgrade or migration to Windows 10, and the supported upgrade paths from older versions of the Windows operating system.
This module explains how to configure Windows 10 by using tools such as the Settings app, Control Panel, Windows PowerShell, Remote Server Administration Tools (RSAT) and Group Policy Objects (GPOs). It describes the different types of user accounts, and the benefits of using a Microsoft account. This module also describes Microsoft OneDrive, and how it integrates with Windows 10.
This module explains the use of tools such as the Settings app, Network and Sharing Center, and Windows PowerShell to configure network settings. It describes the differences between IPv4 and IPv6 settings, and the benefits of IPv6. It also describes name resolution and provides an overview of the Domain Name System (DNS) service. This module describes the configuration of wireless connectivity in Windows 10, and explains remote access methods available in Windows 10, such as Virtual Private Networks (VPNs), DirectAccess, and Remote Desktop.
This module provides an overview of storage options, including hard disks, server-based storage, and virtual hard disks. It describes network storage options, including network-attached storage (NAS) and storage area networks (SANs), and cloud-based storage options, such as OneDrive and Microsoft Azure Storage. Additionally, module 5 describes the management and maintenance of disks, partitions, and volumes, and the configuration and use of the Storage Spaces feature.
This module provides an overview of the file systems supported by Windows 10. It explains how to configure file permissions, the effect of file permissions, how explicit and inherited permissions work, and how to include user and device claims in access permissions. This module also explains how to share folders, the tools to use for sharing a folder, and the effective permissions when a user tries to access data in a shared folder that is protected by file permissions. The last lesson in the module describes how to add and share a printer, and how to manage client and server side printing.
This module describes how to install and configure desktop apps and Windows Store apps in Windows 10. It explains how to install apps manually and automatically, and how to use Microsoft System Center Configuration Manager and Microsoft Intune to deploy apps. Additionally, it describes the Windows Store and the way in which you can manage access to it. Lastly, module 7 describes the Internet Explorer 11 and Edge browsers, and explains how to configure and manage both browsers.
This module explains how the technologies available with Windows 10 work together to protect against data-related security threats. It provides an overview of these threats, and discusses possible mitigations and best practices for dealing with them. It describes defense-in-depth and Encrypting File System (EFS), and how you can use those methods to counter security threats. Additionally, module 8 describes how to configure, administer, and monitor BitLocker drive encryption.
This module explains how to mitigate security threats with the use of Security Compliance Manager, Enhanced Mitigation Experience Toolkit, and security settings in GPOs. It also describes User Account Control (UAC), and how to configure it. This module also explains the use of AppLocker to configure application usage and restrictions.
This module describes common network-related security threats, and describes options to mitigate them. It describes Windows Firewall, IPsec connection security rules, and Windows Defender, and how to configure these tools to manage network security.
This module describes device drivers, and how to use the Device Manager to view, configure, update, and roll back device drivers. It explains file-recovery methods in Windows 10, such as Backup and Restore, File History, and Previous Versions. This module also explains features such as System Restore, Startup Recovery, and System Image Recovery, and describes how to use restore points to roll back device configuration.
This module describes device drivers, and how to use the Device Manager to view, configure, update, and roll back device drivers. It explains file recovery methods in Windows 10, such as Backup and Restore, File History, and Previous Versions. This module also explains features such as System Restore, Startup Recovery, and System Image Recovery, and describes how to use restore points to roll back device configuration.
This module explains the most current trends and information related to desktop and device management in the enterprise. It also provides an overview on how to extend device management to the cloud.
This module explains the various deployment scenarios of Windows 10 and the considerations to keep in mind while performing these deployments. This module also explains how to deploy Windows 10 by using the Windows Assessment and Deployment Kit (WADK) and the Microsoft Deployment Toolkit (MDT). This module also explains how to maintain Windows 10 by using DISM and Windows Imaging and Configuration Designer (ICD).
This module explains user states and user state virtualization and explains how to deploy and maintain user experience virtualization (UE-V). This module also explains how to use tools such as ScanState and LoadState to migrate user states (USMT).
This module explains how to manage Group Policy inheritance, administrative templates, and common enterprise desktop settings. This module also explains how to apply Group Policy Preferences using targeting and filtering
This module explains the concept of identity and the methods to enhance identity security. This module also explains cloud identities and the use of Azure Active Directory Premium in enterprise organizations
This module explains how to provide secure access to company data. Solutions discussed include Device Registration (previous known as Workplace Join) and Work Folders. This module also explains how to configure and share data stored in Microsoft OneDrive. .
This module explains how to configure a virtual private network (VPN) and DirectAccess in Windows 10. This module also explains how to publish applications in Microsoft Azure RemoteApp..
This module provides an overview of the Enterprise Mobility Suite and its components, Microsoft Azure Active Directory Premium, Azure Rights Management (Azure RMS), and Microsoft Intune.
This module explains how to install the Microsoft Intune client software and configure and assign Intune policies. This module also explains how to create Mobile Device Management (MDM) policies and enroll mobile devices to Intune.
This module explains how to configure updates and Endpoint Protection settings and reports using Microsoft Intune.
This module explains how to use the Microsoft Intune Software Publisher to deploy applications to managed clients. This module also explains the use of certificate profiles, Wi-Fi profiles, and VPN profiles to control access to company resources.
This module explains how to create virtual switches, virtual hard disks, and virtual machines using Client Hyper-V.
*NOTE: if an average rating and rating count are shown on this page, they are based on all reviews associated with Dynamics Edge that are shown on the review page, and are not restricted to reviews only for the particular courses offered on this page.