Microsoft Certification Training - Microsoft Training
Course
In Cardiff
Description
-
Type
Course
-
Location
Cardiff (Wales)
-
Duration
3 Days
-
Start date
Different dates available
Delegate pack consisting of course notes and exercises Manual Experienced Instructor Refreshments
Facilities
Location
Start date
Start date
Reviews
This centre's achievements
All courses are up to date
The average rating is higher than 3.7
More than 50 reviews in the last 12 months
This centre has featured on Emagister for 8 years
Subjects
- Security
- Compliance
- Auditing
- Testing
- Windows
- Server
- IT
- Network
- IT Auditing
- Performance
- Design
- Image
- Systems
- IT Security
- Network Training
Course programme
Pre-requisites
- Candidates for this exam should have a minimum of three years of experience installing, configuring and administering clients in a Windows networked environment and also have experience deploying operating systems and applications. Candidates should be familiar with the client administration capabilities of Windows Server and with management tools such as the System Center suite of products.
Who should attend?
- This course is suited to those working in the IT industry working in a Windows networked environment.
Course Structure
Plan and manage client licensing and activation
- Applications and operating systems; activation method; KMS vs. MAK; prerequisites; choosing a SKU; licensing infrastructure; licensing compliance audits; inventory audits; virtualisation licensing considerations; making recommendations for licensing strategy and compliance
Plan and manage software updates
- Application updates and operating system updates; evaluating and approving software updates; enterprise applications; designing an update strategy; choosing an update tool; planning and deploying a service pack; schedule considerations; network considerations; test updates; auditing for security compliance
Plan and manage a physical hardware and virtualisation strategy
- Analysing existing hardware environment; determining which systems meet minimum requirements; tradeoffs of physical vs. VDI environment; network load considerations; disk space; direct connection vs. brokered connection; determining a VHD strategy; choosing 32 bit vs. 64-bit
Design an image creation strategy
- Identifying operating system and enterprise applications that will be included with the standard image; thick, thin, or hybrid; role-based or geographic-based images vs. single core image; image localisation
Design a custom image
- Identifying applications to be installed; identifying features and components to be enabled or disabled; testing the customised image
Define an image update strategy
- Performance optimisation; security considerations; efficiency; offline servicing vs. online or post-image updates; re-creating; recapturing
Design standard system settings
- Choosing methods, including logon scripts, startup scripts and Group Policy; designing profiles; designing error reporting; designing audit policy
Define client security standards
- Application control policies; encryption; stopping unnecessary services; designing firewall rules; defining anti-malware settings; changes to Kerberos and NTLM; configuring user rights; defining UAC policy; designing a security template for system lockdown; defining account policies; designing security standards for removable storage
Define Windows Internet Explorer settings
- Defining security zones; cache location; branding; in-private mode; restricting or allowing plug-ins; add-ons; privacy policy; browser protected mode
Analyse the environment and choose appropriate deployment methods
- Building the infrastructure; advantages of lite-touch vs. zero-touch vs. local install; capacity and scale considerations; determining required changes to the infrastructure
Design a lite-touch deployment strategy
- Unicast vs. multicast; auto-cast vs. scheduled-cast; staggered deployment; scheduling considerations; network load considerations; choosing a client boot method for deployment; unattended answer files; restricting who can receive images; choosing a delivery mechanism
Design a zero-touch deployment strategy
- Designing and configuring task sequencing; unattended answer files; scheduling considerations; staggered deployment; network load considerations; restricting who can receive images
Design a user state migration strategy
- Determining which user data and settings to preserve; local vs. remote storage considerations; determining mitigation plan for non-migrated applications; securing migrated data; testing designed strategy; wipe-and-load migration vs. side-by-side migration
Design a delivery or deployment strategy
- Auditing for prerequisites and minimum requirements; choosing a deployment method such as virtualised, Remote Desktop Services, Group Policy or software distribution; server-based or client-based install; scheduling considerations; staggered deployment; network considerations; package creation standards
Manage application compatibility
- Testing incompatibility; choosing a method for resolving incompatibility, such as upgrading, Remote Desktop Services, shim or VDI; auditing incompatible software
Identify and resolve Internet Explorer issues
- Security zones; Web applications; advanced settings; Group Policy restrictions; certificates
Identify and resolve Group Policy issues
- Delegation; inheritance; policies are not effective; blocking; permissions; loopback processing; user vs. computer settings; filtering; performance
Identify and resolve networking issues
- Wireless; remote access; VPN; certificates; performance; IP communication; Windows Firewall
Identify and resolve authentication and authorisation issues
- User rights; distinguishing between client-based and server-based issues; time synchronisation (Kerberos)
Additional information
Microsoft Certification Training - Microsoft Training