The course is primarily intended for IT Professionals who manage the desktop environments for organizations, and want to specialize in Windows 8 desktop deployments. These IT professionals typically work in complex computing environments of large to enterprise-sized organizations. In addition. the secondary audience for this course includes IT professionals who want to take the 70-415: Implementing an Enterprise Desktop and Device Infrastructure exam as a stand-alone.
Den Inhalt vun dëser Säit ass net op Lëtzebuergesch verfügbar
Before attending this course, students must have:
This module describes the enterprise desktop lifecycle and explains how you can assess hardware and infrastructure readiness. The module then describes how to identify and select the most appropriate deployment option based upon organizational requirements.
After completing this module, students will be able to:
This modules describes Windows image formats and helps you to define an efficient image management strategy based upon business requirements.
This module describes how to deploy and manage a secure desktop by implementing centralized policies, BitLocker settings, and Encrypted File System (EFS) settings.
This module describes how to use the Windows Assessment and Deployment Kit (ADK) and Windows Deployment Services (WDS) to create, capture, and manage a desktop operating system image.
This modules describes how to use the User State Migration Tool (USMT) to migrate appropriate user data and settings to a new desktop operating system.
This module describes how to use the Microsoft Deployment Toolkit (MDT) 2012 to deploy Windows operating systems in lite touch installation scenarios.
This module describes how to plan and implement session virtualization deployment and a virtual desktop infrastructure (VDI) based upon Windows Server 2012 Remote Desktop Services.
This module describes how to plan and configure user state virtualization to provide a consistent desktop client experience.
Students will be able to plan and implement an updates infrastructure to support both physical and virtual enterprise desktops.
This module describes how to use System Center technologies such as Endpoint protection and Data Protection Manager (DPM) to protect enterprise desktops from malware and data loss.
This module describes how to identify and monitor relevant services and components to ensure the health and performance of the enterprise desktop infrastructure.
Attestation de présence remis à l'issu du cours à chaque participant - Préparation de la certification MCSA (Microsoft Certified Solutions Associate)