Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Course Tittle:: Implementing A Desktop & Infrastructure

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

________________________________________________________________________

COURSE TITTLE : Implementing a Desktop & Infrastructure

1. OBJECTIVES
After completing this course, students will be able to:
 Assess and determine desktop employment options
 Plan an image mamnagemnet strategy
 Implement desktop security
 Capture and manage a desktop operating system image
 Plan and implement User State Migration
 Plan and deploy desktops by using the Microsoft Deployment Toolkit
 Plan and deploying desktops by using System Center 2012 Configuration
Manager
 Plan and implement a Remote Desktop Service infrastructure
 Manage user state virtualization for enterprise desktops
 Plan and implement an updates infrastructure to support enterprise desktops.
 Protect enterprise desktops from malware and data loss
 Monitoring the performance and health of the desktop infrastructure

2. OTHER PRE-REQUISITES
Before attending this course, students must have:
 Solid understanding of TCP/IP and networking concepts
 Solid knowledge of Windows and Active Directory Domain Services (AD
DS)—for example, domain user accounts, domain vs. local user accounts,
user profiles, and group membership
 Good understanding of scripts and batch files
 Solid understanding of security concepts such as authentication and
authorization Familiarity with the client administration capabilities of
Windows Server
 General knowledge of management tools such as System Center 2012
Configuration Manager, System Center 2012 Operations Manager, and
System Center 2012 Data Protection Manager.
 Familiarity with imaging, packaging, and operating system deployment
concepts
 Familiarity with certificates and Certification Authority (CA)
implementation and configuration
 Knowledge equivalent to Windows 2012 MCSA
 Experience administering Windows Server in an environment that typically
has the following characteristics: 2,500 to 50,000 or more users ?Multiple
physical locations and multiple domain controllers ?Network services and
resources such as messaging, databases, file and print, firewalls, Internet
access, an intranet, and client computer management ?Support for
Windows 8 client desktops ?Deployment and management of both physical
and virtual applications

COURSE CONTENTS
1 - Assessing and Determining Desktop Deployment Options
 Overview of the Enterprise Desktop Life Cycle
 Assessing Hardware and Infrastructure Readiness for a Desktop
Deployment
 Overview of Enterprise Desktop Deployment Methods
 Volume Activation Technologies for Enterprise Desktops
 Lab : Assessing and Determining Desktop Deployment Options
2 - Planning an Image Management Strategy
 Overview of Windows Image Formats
 Overview of Image Management
 Lab : Planning an Image Management Strategy
3 - Implementing Desktop Security
 Implementing a Centralized Desktop Security Solution
 Planning and Implementing BitLocker
 Planning and Implementing Encrypted File System
 Lab : Configuring Desktop Security
 Lab : Configuring File Encryption Using EFS
4 - Capturing and Managing a Desktop Operating System Image
 Overview of Windows ADK
 Managing the Windows Pre-installation Environment
 Building a Reference Image Using Windows SIM and Sysprep
 Capturing and Servicing a Reference Image
 Configuring and Managing Windows Deployment Services
 Lab : Preparing the Imaging and Pre-installation Environment
 Lab : Building a Reference Image Using Windows SIM and Sysprep
 Lab : Capturing and Servicing a Reference Image
 Lab : Configuring and Managing Windows Deployment Services

5 - Planning and Implementing User State Migration


 Overview of User State Migration
 Planning User State Migration by Using USMT
 Migrating User State by Using USMT
 Lab : Planning and Implementing User State Migration
 Lab : Migrating User State Using Hard-Link Migration
6 - Planning and Deploying Desktops Using the Microsoft Deployment Toolkit
 Planning for the Lite Touch Installation Environment
 Implementing MDT 2012 for Lite Touch Installation
 Integrating Windows Deployment Services with MDT
 Lab : Planning and Deploying Desktops Using the Microsoft Deployment
Toolkit
7 - Planning and Deploying Desktops by Using System Center 2012
Configuration Manager
 Planning the Zero Touch Installation Environment
 Preparing the Site for Operating System Deployment
 Building a Reference Image Using a Configuration Manager Task Sequence
 Using MDT Task Sequences to Deploy Client Images
 Lab : Preparing the Environment for Operating System Deployment
 Lab : Using MDT and Configuration Manager to Perform a Zero-Touch
Installation
8 - Planning and Implementing a Remote Desktop Services Infrastructure
 Overview of Remote Desktop Services
 Planning the Remote Desktop Services Environment
 Configuring a Virtual Desktop Infrastructure Deployment
 Configuring a Session-Based Desktop Deployment
 Extending the Remote Desktop Services Environment to the Internet
 Lab : Planning and Implementing a Remote Desktop Services
Infrastructure
 Lab : Extending Internet Access to the RDS Infrastructure
9 - Managing User State Virtualization for Enterprise Desktops
 Overview of User State Virtualization
 Planning User State Virtualization
 Configuring Roaming Profiles, Folder Redirection, and Offline Files
 Implementing Microsoft User Experience Virtualization
 Lab : Deploying and Managing User State Virtualization
10 - Planning and Implementing an Updates Infrastructure to Support
Enterprise Desktops
 Planning an Updates Infrastructure for the Enterprise
 Implementing Configuration Manager 2012 to Support Software Updates
 Managing Updates for Virtual Machines and Images
 Using Windows Intune for Managing Software Updates
 Lab : Planning and Implementing an Updates Infrastructure
11 - Protecting Enterprise Desktops from Malware and Data Loss
 Overview of System Center 2012 Endpoint Protection
 Configuring Endpoint Protection Client Settings and Monitoring Status
 Using Windows Intune Endpoint Protection
 Protecting Desktops by Using System Center 2012 Data Protection
Manager
 Lab : Implementing Client Endpoint Protection
 Lab : Configuring Data Protection for Client Computer Data
12 - Monitoring the Performance and Health of the Desktop Infrastructure
 Performance and Health Monitoring for the Desktop Infrastructure
 Monitoring the Virtual Desktop Infrastructure
 Lab : Monitoring the Performance and Health of the Desktop Infrastructure

3. WHO SHOULD ATTEND


The course is primarily intended for IT Professionals who manage the desktop
environments for organizations, and want to specialize in Windows 8 desktop
deployments. These IT professionals typically work in complex computing
environments of large to enterprise-sized organizations. In addition. the secondary
audience for this course includes IT professionals who want to take the 70-415:
Implementing an Enterprise Desktop and Device Infrastructure exam as a stand-alone,
or as part of the requirement for the MCSE: Desktop Infrastructure certification.

You might also like