Facebook Pixel
Microsoft Certification Training
Search classes by keyword:
Search classes by category:
Microsoft Certification and Microsoft Training, Cisco Certification and MCSE Certification
MCSE Enterprise Devices and Apps space



Microsoft MCSE: Enterprise Devices and Apps Certification Course

MCSE: Enterprise Devices and Apps

Course Number: #CED-1149
Course Length: 12 days
Number of Exams: 2
SATV Vouchers: 10
Certifications: MCSE: Enterprise Devices and Apps

Grants (discounts) are available for multiple students for the same or different courses.

Upcoming Dates Class Times Class Format Quote
Call (800) 611-1840 for Class Schedule


The Microsoft Certified Solutions Expert (MCSE): Enterprise Devices and Apps certification validates that you have the skills needed to manage devices in today's bring-your-own-device (BYOD) enterprise. It qualifies you for a career path which can range from traditional desktop support technician to enterprise management of BYOD devices and apps.

Prerequisites

  • MCSA: Windows 10 certification OR
  • MCSA: Windows 8 certification OR
  • MCSA: Windows Server 2012

Microsoft Course 20695

Exam 70-695: This course describes how to assess operating system and application deployment options, determine the most appropriate deployment strategy, and then implement a lite-touch or zero-touch deployment solution for Windows devices and apps. Solutions covered in this course include operating system deployment scenarios using the Microsoft Deployment Toolkit (MDT) and System Center 2012 R2 Configuration Manager.

Audience Profile

This course is intended for IT professionals who deploy, manage, and maintain PCs, devices, and apps across medium/large/enterprise organizations, and for individuals who are interested in taking exam 70-695.

At Course Completion

After completing this course, students will be able to:

  • Assess the network environment for supporting operating system and application deployment.
  • Determine operating system deployment strategies.
  • Assess application compatibility.
  • Plan and implement user state migration.
  • Determine an image management strategy.
  • Prepare for deployments using the Windows Assessment and Deployment Kit (Windows ADK).
  • Support PXE-initiated and multicast operating system deployments.
  • Implement operating system deployment by using the MDT.
  • Implement operating system deployment by using System Center 2012 R2 Configuration Manager.
  • Integrate MDT and Configuration Manager for operating system deployment.
  • Activate clients and manage additional configuration settings.
  • Deploy Office 2013.

Prerequisites

Before attending this course, students must have system administrator-level working knowledge of:

  • Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching and addressing.
  • Active Directory Domain Services (AD DS) principles and fundamentals of AD DS management.
  • Installation, configuration, and troubleshooting for Windows-based personal computers.
  • Basic concepts of Public Key Infrastructure (PKI) security.
  • Basic understanding of scripting and Windows PowerShell syntax.
  • Basic understanding of Windows Server roles and services.
  • Basic understanding of management tasks using System Center 2012 R2 Configuration Manager.

Course Outline

Module 1: Assessing the Network Environment for Supporting Operating System and Application Deployment

This module provides an overview of the enterprise desktop life cycle. It explains how to assess hardware and infrastructure readiness for a desktop deployment, and how to use the Microsoft Assessment and Planning Toolkit (MAP) to assess deployment readiness.

  • Overview of the Enterprise Desktop Life Cycle
  • Assessing Hardware and Infrastructure Readiness for a Desktop Deployment
  • Using MAP to Assess Deployment Readiness

After completing this module, students will be able to:

  • Describe the enterprise desktop life cycle
  • Assess hardware and infrastructure readiness for a desktop deployment
  • Use MAP to assess deployment readiness
Module 2: Determining Operating System Deployment Strategies

This module explains how to identify the most appropriate operating system deployment strategy based upon organizational requirements. It describes tools and deployment strategies, different types of operating system deployments, and alternative deployment strategies for desktop computers.

  • Tools and Deployment Strategies for an Effective Operating System Deployment Strategy
  • Operating System Deployment Using High-Touch with Retail Media
  • Operating System Deployment Using High-Touch with Standard Image
  • Operating System Deployment Using Lite-Touch
  • Operating System Deployment Using Zero-Touch
  • Alternative Deployment Strategies for Windows Desktops

After completing this module, students will be able to:

  • Describe tools and strategies for an effective operating system deployment strategy.
  • Describe operating system deployment using high-touch with retain media.
  • Describe operating system deployment using high-touch with standard image.
  • Describe operating system deployment using lite-touch.
  • Describe operating system deployment using zero-touch.
  • Describe alternative deployment strategies for Windows desktops.
Module 3: Assessing Application Compatibility

This modules explains how to assess application compatibility issues and identify mitigation solutions to ensure that applications function successfully after an operating system deployment. It also describes how to use ACT to address application compatibility issues.

  • Diagnosing Application Compatibility Issues
  • Mitigating Application Compatibility Issues
  • Using ACT to Address Application Compatibility Issues

After completing this module, students will be able to:

  • Diagnose application compatibility issues.
  • Mitigate application compatibility issues.
  • Use ACT to address application compatibility issues.
Module 4: Planning and Implementing User State Migration

This module describes user state migration strategies, and explains how to configure these strategies during operating system deployments.

  • Overview of User State Migration
  • Overview of USMT 5.0
  • Planning User State Migration
  • Migrating User State by Using USMT

After completing this module, students will be able to:

  • Describe user state migration.
  • Identify the features of USMT 5.0.
  • Plan user state migration.
  • Migrate user state by using USMT.
Module 5: Determining an Image Management Strategy

This module describes the Windows image file format, and provides an overview of image management. It also explains how to determine the most appropriate image management strategy to support operating system and application deployments.

  • Overview of the Windows Image File Format
  • Overview of Image Management

After completing this module, students will be able to:

  • Describe the purpose and benefits of the Windows image file format.
  • Describe image management.
Module 6: Preparing For Deployments Using Windows ADK

This module describes the tools provided in Windows ADK, and explains how to use them to prepare for and support automated deployment strategies.

  • Overview of the Windows Setup and Installation Process
  • Preparing Boot Images Using Windows PE
  • Automating and Preparing the Installation of an Image Using Windows SIM and Sysprep
  • Capturing and Servicing a Reference Image

After completing this module, students will be able to:

  • Describe the Windows installation process.
  • Describe how to use and customize Windows PE.
  • Use Windows SIM and Sysprep to automate and prepare images.
  • Capture and service a reference image.
Module 7: Supporting PXE-Initiated and Multicast Operating System Deployments

This module explains how to identify solutions to support PXE-initiated and multicast solutions when performing operating system deployment tasks. It also describes the process of installing and configuring the Windows DS environment.

  • Overview of PXE-Initiated and Multicast Operating System Deployments
  • Installing and Configuring the Windows DS Environment

After completing this module, students will be able to:

  • Describe PXE-initiated and multicast operating system deployments.
  • Explain the process for installing and configuring the Windows DS environment.
Module 8: Implementing Operating System Deployment by Using the Microsoft Deployment Toolkit

This module explains how to configure an operating system deployment strategy using the Microsoft Deployment Toolkit. It describes how to plan for the MDT environment, implement MDT 2013, and integrate Windows DS with MDT.

  • Planning for the MDT Environment
  • Implementing MDT 2013
  • Integrating Windows DS with MDT

After completing this module, students will be able to:

  • Describe the MDT components and process for a lite-touch deployment strategy.
  • Install and configure the MDT environment.
  • Describe how you can configure Windows DS to integrate with MDT 2013.
Module 9: Implementing Operating System Deployment by Using System Center 2012 R2 Configuration Manager

This module describes operating system deployment, and the process of preparing the site for operating system deployment. It also explains how to configure an operating system deployment strategy using System Center 2012 R2 Configuration Manager.

  • Overview of Operating System Deployment
  • Preparing the Site for Operating System Deployment
  • Deploying an Operating System Image

After completing this module, students will be able to:

  • Describe operating system deployment.
  • Prepare the site for operating system deployment.
  • Deploy an operating system image.
Module 10: Integrating MDT and Configuration Manager for Operating System Deployment

This module explains how to integrate MDT with Configuration Manager to support operating system deployment procedures. It also reviews the features provided by integrating MDT and Configuration Manager.

  • Integrating Deployment Tools with Configuration Manager
  • Reviewing the Features Provided by Integrating MDT and Configuration Manager

After completing this module, students will be able to:

  • Describe the integration of deployment tools with Configuration Manager.
  • Describe the features provided by integrating MDT and Configuration Manager.
Module 11: Activating Clients and Managing Additional Configuration Settings

This module explains how to implement volume license activation and determine configuration settings for client computers. It also describes the different volume license activation solutions.

  • Volume License Activation Solutions
  • Determining Additional Configuration Client Settings

After completing this module, students will be able to:

  • Describe volume activation solutions.
  • Determine additional configuration client settings.
Module 12: Deploying Office 2013

This module explains how to customize and deploy Microsoft Office 2013 to an enterprise network environment. It describes the methods for deploying Office 2013, customizing Office deployments, and deploying Office 2013 from Office 365.

  • Methods for Deploying Microsoft Office 2013 Editions
  • Customizing Office Deployments
  • Deploying Office 2013 from Office 365
  • Considerations for Deploying Office 2013 Using App-V
  • Managing Office Settings

After completing this module, students will be able to:

  • Describe the methods for deploying Microsoft Office 2013 editions.
  • Customize Office deployments.
  • Deploy Office 2013 from Office 365.
  • Describe considerations for deploying Office 2013 using App-V.
  • Manage Office settings.

[ back to top ]

Microsoft Course 20696

Exam 70-696: Get expert instruction and hands-on practice configuring and managing clients and devices using Microsoft System Center 2012 R2 Configuration Manager, Windows Intune, and its associated site systems. In this course, you will learn day-to-day management tasks including how to manage software client health, hardware and software inventory, applications. and integration with Windows Intune. You will also learn how to optimize Endpoint Protection, manage compliance, and create management queries and reports. This course is also intended for individuals who are interested in taking Exam 70-696.

Audience Profile

This course is intended for experienced IT Professionals, typically described as Enterprise Desktop Administrator (EDA). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium/large/enterprise organizations. A significant portion of this audience uses or intends to use System Center 2012 R2 Configuration Manager and Windows Intune to manage and deploy PCs, devices, and applications. The Enterprise Desktop Administrator also supports either domain joined or non-domain joined Bring Your Own Device (BYOD) scenarios, mobile device management, and secure data access on common platforms, such as Windows 8.x, Windows Phone 8.x, iOS, and Android by using System Center 2012 R2 Configuration Manager with Windows Intune.

At Course Completion

After completing this course, students will be able to:

  • Manage desktops and devices in the enterprise.
  • Prepare the infrastructure to support desktop and device management.
  • Deploy and manage the Configuration Manager client.
  • Manage inventory for PCs and applications.
  • Distribute and manage content used for deployments.
  • Deploy and manage applications.
  • Manage mobile devices by integrating Windows Intune with Configuration Manager.
  • Maintain software updates for managed PCs.
  • Implement Endpoint Protection for managed PCs.
  • Manage compliance and secure data access.
  • Manage client status, power management, and remote administration.
  • Maintain Configuration Manager sites and site systems.

Prerequisites

In addition to their professional experience, students who attend this training should already have system administrator-level working knowledge of:

  • Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching and addressing.
  • Active Directory Domain Services (AD DS) principles and fundamentals of AD DS management.
  • Installation, configuration, and troubleshooting for Windows-based personal computers.
  • Basic concepts of public key infrastructure (PKI) security.
  • Basic understanding of scripting and Windows PowerShell syntax.
  • Basic understanding of Windows Server roles and services.

Course Outline

Module 1: Managing Desktops and Devices in the Enterprise

This module explains the features included in System Center 2012 R2 Configuration Manager and Windows Intune and how you can use these solutions to manage desktops and devices in an enterprise environment.

  • Systems Management Using Configuration Manager and Windows Intune
  • Overview of Configuration Manager and Cloud Services Architecture
  • Overview of the Configuration Manager Administrative Tools
  • Monitoring and Troubleshooting a Configuration Manager Site
  • Introduction to Queries and Reports

After completing this module, students will be able to:

  • Explain how using Configuration Manager and Windows Intune addresses the challenges of managing systems and users in today's enterprise.
  • Describe the Configuration Manager, Windows Intune, and Microsoft Azure cloud services architecture.
  • Describe the management tools that you use to perform administrative functions for Configuration Manager and Windows Intune.
  • Describe the tools that you use to monitor and troubleshoot a Configuration Manager site.
  • Describe the Configuration Manager queries and reports.
Module 2: Preparing the Infrastructure to Support Desktop and Device Management

This module explains how to prepare the management infrastructure including the configuration of boundary groups, resource discovery, role-based administration, and mobile device management integration with Exchange Server.

  • Configuring Boundaries and Boundary Groups
  • Configuring Resource Discovery
  • Configuring the Exchange Server Connector for Mobile Device Management
  • Configuring User and Device Collections
  • Configuring Role-Based Administration

After completing this module, students will be able to:

  • Configure boundaries and boundary groups.
  • Configure resource discovery.
  • Configure the Exchange Server Connector for mobile device management.
  • Configure user and device collections.
  • Configure role-based administration.
Module 3: Deploying and Managing the Configuration Manager Client

This module explains how to deploy and manage the Configuration Manager client.

  • Overview of the Configuration Manager Client
  • Deploying the Configuration Manager Client
  • Managing Client Settings in Configuration Manager

After completing this module, students will be able to:

  • Describe the requirements and considerations for installing the Configuration Manager client.
  • Deploy the Configuration Manager client.
  • Manage client settings.
Module 4: Managing Inventory for PCs and Applications

This module explains the inventory collection process and explains how to configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and Software Metering.

  • Overview of Inventory Collection
  • Configuring Hardware and Software Inventory
  • Managing Inventory Collection
  • Configuring Software Metering
  • Configuring Asset Intelligence

After completing this module, students will be able to:

  • Describe inventory collection and identify differences between managing personal and corporate owned devices.
  • Configure and collect hardware and software inventory.
  • Manage inventory collection.
  • Configure and manage Software Metering.
  • Configure and manageAsset Intelligence.
Module 5: Distributing and Managing Content Used for Deployments

This module explains how to identify and configure the most appropriate method to distribute and manage content used for deployments.

  • Preparing the Infrastructure for Content Management
  • Distributing and Managing Content on Distribution Points

After completing this module, students will be able to:

  • Prepare the infrastructure for content management.
  • Distribute and manage content on distribution points.
Module 6: Deploying and Managing Applications

This module explains how to distribute, deploy, and monitor applications for managed users and systems.

  • Overview of Application Management
  • Creating Applications
  • Deploying Applications
  • Managing Applications
  • Configuring and Deploying Windows Store Apps
  • Deploying Virtual Applications by Using System Center 2012 R2 Configuration Manager

After completing this module, students will be able to:

  • Describe the application management features of Configuration Manager.
  • Create applications.
  • Deploy applications.
  • Manage applications.
  • Configure and deploy Windows Store apps.
  • Configure and deploy virtual applications.
Module 7: Managing Mobile Devices by Integrating Windows Intune with Configuration Manager

This module explains how to integrate Windows Intune and System Center 2012 R2 Configuration Manager to manage mobile devices. There is no lab following this module.

  • Overview of Managing Mobile Devices by Using System Center 2012 R2 Configuration Manager
  • Managing Mobile Devices by Using the Windows Intune Connector
  • Deploying Applications to Mobile Devices

After completing this module, students will be able to:

  • Describe mobile device management by using System Center 2012 R2 Configuration Manager.
  • Configure the Windows Intune connector for Configuration Manager.
  • Deploy applications to mobile devices.
Module 8: Maintaining Software Updates for Managed PCs

This module explains how to maintain software updates for PCs managed by Configuration Manager.

  • Overview of Software Updates
  • Preparing a Configuration Manager Site for Software Updates
  • Managing Software Updates
  • Configuring Automatic Deployment Rules
  • Monitoring and Troubleshooting Software Updates

After completing this module, students will be able to:

  • Describe the software updates process.
  • Prepare a Configuration Manager site for software updates.
  • Manage the evaluation and deployment of software updates.
  • Configure automatic deployment rules.
  • Monitor and troubleshoot software updates.
Module 9: Implementing Endpoint Protection for Managed PCs

This module explains how to use System Center 2012 R2 Configuration Manager to implement Endpoint Protection.

  • Overview of Endpoint Protection in Configuration Manager
  • Configuring and Monitoring Endpoint Protection Policies

After completing this module, students will be able to:

  • Describe how Endpoint Protection is used to detect and remediate malware and security vulnerabilities.
  • Configure, deploy, and manage Endpoint Protection policies.
Module 10: Managing Compliance and Secure Data Access

This module explains how to manage configuration items, baselines, and profiles to assess and configure compliance settings and data access for users and devices.

  • Overview of Compliance Settings
  • Configuring Compliance Settings
  • Viewing Compliance Results
  • Managing Data Access by Using Profiles

After completing this module, students will be able to:

  • Describe compliance settings features.
  • Create and deploy configuration items and baselines.
  • View compliance results by using reports and log files.
  • Manage data access by using connection profiles.
Module 11: Managing Client Status, Power Management, and Remote Administration

This module explains how to use Configuration Manager to manage and monitor client activity and health status.

  • Configuring and Monitoring Client Status
  • Configuring Power Management
  • Configuring Remote Tools

After completing this module, students will be able to:

  • Configure and monitor client status.
  • Configure power management settings by using Configuration Manager.
  • Configure remote tools to support client activity.
Module 12: Maintaining Configuration Manager Sites And Site Systems

This module explains how to configure site maintenance tasks and perform backup and recovery of a site system.

  • Overview of Configuration Manager 2012 Site Maintenance
  • Performing Backup and Recovery of a Configuration Manager Site

After completing this module, students will be able to:

  • Identify Configuration Manager site maintenance tasks.
  • Back up and recover a Configuration Manager site system.

[ back to top ]


CED Solutions is your best choice for MCSE Enterprise Devices and Apps, MCSE Enterprise Devices and Apps training, MCSE Enterprise Devices and Apps certification, MCSE Enterprise Devices and Apps boot camp, MCSE Enterprise Devices and Apps certification training, MCSE Enterprise Devices and Apps certification course, MCSE Enterprise Devices and Apps course, MCSE Enterprise Devices and Apps class.



MCSE Enterprise Devices and Apps space
Search classes by keyword:
Search classes by category:


Copyright © 2017 CED Solutions. CED Solutions Refund Policy. All Rights Reserved.