Microsoft Certification Training - Microsoft Training

Course

In Cardiff

£ 1,495 + VAT

Description

  • Type

    Course

  • Location

    Cardiff (Wales)

  • Duration

    3 Days

  • Start date

    Different dates available

Delegate pack consisting of course notes and exercises Manual Experienced Instructor Refreshments

Facilities

Location

Start date

Cardiff
See map
Castle Street, CF10 1SZ

Start date

Different dates availableEnrolment now open

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

This centre's achievements

2016

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 8 years

Subjects

  • Security
  • Compliance
  • Auditing
  • Testing
  • Windows
  • Server
  • IT
  • Network
  • IT Auditing
  • Performance
  • Design
  • Image
  • Systems
  • IT Security
  • Network Training

Course programme

The Knowledge Academy Windows 7, Enterprise Desktop Administrator (6294A) 3 day course covers the following topics:

Pre-requisites

  • Candidates for this exam should have a minimum of three years of experience installing, configuring and administering clients in a Windows networked environment and also have experience deploying operating systems and applications. Candidates should be familiar with the client administration capabilities of Windows Server and with management tools such as the System Center suite of products.

Who should attend?

  • This course is suited to those working in the IT industry working in a Windows networked environment.

Course Structure

Plan and manage client licensing and activation

  • Applications and operating systems; activation method; KMS vs. MAK; prerequisites; choosing a SKU; licensing infrastructure; licensing compliance audits; inventory audits; virtualisation licensing considerations; making recommendations for licensing strategy and compliance

Plan and manage software updates

  • Application updates and operating system updates; evaluating and approving software updates; enterprise applications; designing an update strategy; choosing an update tool; planning and deploying a service pack; schedule considerations; network considerations; test updates; auditing for security compliance

Plan and manage a physical hardware and virtualisation strategy

  • Analysing existing hardware environment; determining which systems meet minimum requirements; tradeoffs of physical vs. VDI environment; network load considerations; disk space; direct connection vs. brokered connection; determining a VHD strategy; choosing 32 bit vs. 64-bit

Design an image creation strategy

  • Identifying operating system and enterprise applications that will be included with the standard image; thick, thin, or hybrid; role-based or geographic-based images vs. single core image; image localisation

Design a custom image

  • Identifying applications to be installed; identifying features and components to be enabled or disabled; testing the customised image

Define an image update strategy

  • Performance optimisation; security considerations; efficiency; offline servicing vs. online or post-image updates; re-creating; recapturing

Design standard system settings

  • Choosing methods, including logon scripts, startup scripts and Group Policy; designing profiles; designing error reporting; designing audit policy

Define client security standards

  • Application control policies; encryption; stopping unnecessary services; designing firewall rules; defining anti-malware settings; changes to Kerberos and NTLM; configuring user rights; defining UAC policy; designing a security template for system lockdown; defining account policies; designing security standards for removable storage

Define Windows Internet Explorer settings

  • Defining security zones; cache location; branding; in-private mode; restricting or allowing plug-ins; add-ons; privacy policy; browser protected mode

Analyse the environment and choose appropriate deployment methods

  • Building the infrastructure; advantages of lite-touch vs. zero-touch vs. local install; capacity and scale considerations; determining required changes to the infrastructure

Design a lite-touch deployment strategy

  • Unicast vs. multicast; auto-cast vs. scheduled-cast; staggered deployment; scheduling considerations; network load considerations; choosing a client boot method for deployment; unattended answer files; restricting who can receive images; choosing a delivery mechanism

Design a zero-touch deployment strategy

  • Designing and configuring task sequencing; unattended answer files; scheduling considerations; staggered deployment; network load considerations; restricting who can receive images

Design a user state migration strategy

  • Determining which user data and settings to preserve; local vs. remote storage considerations; determining mitigation plan for non-migrated applications; securing migrated data; testing designed strategy; wipe-and-load migration vs. side-by-side migration

Design a delivery or deployment strategy

  • Auditing for prerequisites and minimum requirements; choosing a deployment method such as virtualised, Remote Desktop Services, Group Policy or software distribution; server-based or client-based install; scheduling considerations; staggered deployment; network considerations; package creation standards

Manage application compatibility

  • Testing incompatibility; choosing a method for resolving incompatibility, such as upgrading, Remote Desktop Services, shim or VDI; auditing incompatible software

Identify and resolve Internet Explorer issues

  • Security zones; Web applications; advanced settings; Group Policy restrictions; certificates

Identify and resolve Group Policy issues

  • Delegation; inheritance; policies are not effective; blocking; permissions; loopback processing; user vs. computer settings; filtering; performance

Identify and resolve networking issues

  • Wireless; remote access; VPN; certificates; performance; IP communication; Windows Firewall

Identify and resolve authentication and authorisation issues

  • User rights; distinguishing between client-based and server-based issues; time synchronisation (Kerberos)

Additional information

Microsoft Certification Training - Microsoft Training

£ 1,495 + VAT