MCSE: Desktop Infrastructure MCSE
Networking  
Courses In The Certification
 
Code 20410
Duration 40 Hours
Vendor
Installing and Configuring Windows Server 2012
Overview
The course is part one of a series of three courses that provide the skills and knowledge necessary to implement a core Windows Server 2012 infrastructure in an existing enterprise environment. The three courses collectively cover implementing, managing, maintaining, and provisioning services and infrastructure in a Windows Server 2012 environment. While there is some cross-over in skillset and tasks across the courses, this course primarily covers the initial implementation and configuration of those core services, such as Active Directory Domain Services (AD DS), networking services, and Hyper-V configuration.
Prerequisites
After completing this course, students will be able to:
  • Install and Configure Windows Server 2012.
  • Describe AD DS infrastructure, and install and configure domain controllers.
  • Manage AD DS objects.
  • Automate AD DS administration.
  • Describe Internet Protocol Version 4 (IPv4) addressing.
  • Describe installing and configuring Dynamic Host Configuration Protocol (DHCP), in addition to managing a DHCP database.
  • Describe name resolution for Windows operating system clients and Windows Server servers.
  • Describe implementing IPv6 addressing.
  • Describe implementing storage configuration options for Windows Server 2012.
  • Enable and configure file and print services in Windows Server 2012.
  • Describe implementing Group Policy.
  • Increase security in a Windows Server 2012 infrastructure by using Group Policy Objects, AppLocker, and Windows Firewall.
  • Describe Microsoft Virtualization technologies, including Hyper-V.
Objectives
Outlines
Module 1: Deploying and Managing Windows Server 2012
Lessons
  • Windows Server 2012 Overview
  • Overview of Windows Server 2012 Management
  • Installing Windows Server 2012
  • Post-Installation Configuration of Windows Server 2012
  • Introduction to Windows PowerShell
Module 2: Introduction to Active Directory Domain ServicesLessons
  • Overview of AD DS
  • Overview of Domain Controllers  
  • Installing a Domain Controller
Module 3: Managing Active Directory Domain Services ObjectsLessons
  • Managing User Accounts   
  • Managing Group Accounts   
  • Managing Computer Accounts
  • Delegating Administration   
Module 4: Automating Active Directory Domain Services AdministrationLessons
  • Using Command-line Tools for Administration
  • Using Windows PowerShell for Administration
  • Performing Bulk Operations with Windows PowerShell
Module 5: Implementing IPv4Lessons
  • Overview of TCP/IP
  • Understanding IPv4 Addressing
  • Subnetting and Supernetting
  • Configuring and Troubleshooting IPv4
Module 6: Implementing DHCPLessons
  • Installing a DHCP Server Role  
  • Configuring DHCP Scopes
  • Managing a DHCP Database
  • Securing and Monitoring DHCP
Module 7: Implementing DNSLessons
  • Name Resolution for Windows Client and Servers
  • Installing and Managing a DNS Server
  • Managing DNS Zones
Module 8: Implementing IPv6Lessons
  • Overview of IPv6 
  • IPv6 Addressing
  • Coexistence with IPv6
  • IPv6 Transition Technologies
Module 9: Implementing Local StorageLessons
  • Overview of Storage
  • Managing Disks and Volumes
  • Implementing Storage Spaces
Module 10: Implementing File and Print ServicesLessons
  • Securing Files and Folders
  • Protecting Shared Files and Folders Using Shadow Copies
  • Configuring Network Printing
Module 11: Implementing Group PolicyLessons
  • Overview of Group Policy   
  • Group Policy Processing
  • Implementing a Central Store for Administrative Templates
Module 12: Securing Windows Servers Using Group Policy ObjectsLessons
  • Windows Security Overview
  • Configuring Security Settings
  • Restricting Software
  • Configuring Windows Firewall with Advanced Security
Module 13: Implementing Server Virtualization with Hyper-VLessons
  • Overview of Virtualization Technologies   
  • Implementing Hyper-V
  • Managing Virtual Machine Storage
  • Managing Virtual Networks
 
Code 20411
Duration 40 Hours
Vendor
Administering Windows Server 2012
Overview
This 5-day course is part two, of a series of three courses, which provide the skills and knowledge necessary to implement a core Windows Server 2012 Infrastructure in an existing enterprise environment. The three courses in total will collectively cover implementing, managing, maintaining and provisioning services and infrastructure in a Windows Server 2012 environment. While there is some cross-over in skillset and tasks across the courses this course will primarily cover the administration tasks necessary to maintain a Windows Server 2012 infrastructure, such as user and group management, network access and data security
Prerequisites
At Course Completion
After completing this course, students will be able to:
  • Implement a Group Policy infrastructure.
  • Manage user desktops with Group Policy.
  • Manage user and service accounts.
  • Maintain Active Directory Domain Services (AD DS).
  • Configure and troubleshoot Domain Name System (DNS).
  • Configure and troubleshoot Remote Access.
  • Install, configure, and troubleshoot the Network Policy Server (NPS) role.
  • Implement Network Access Protection (NAP).
  • Optimize file services.
  • Configure encryption and advanced auditing.
  • Deploy and maintain server images.
  • Implement Update Management.
  • Monitor Windows Server 2012.
Objectives
Before attending this course, students must have:
  • Knowledge and skills concerning the initial implementation and configuration of core Windows Server services including Active Directory Domain Services (AD DS), Networking Services and Microsoft Hyper-V.
Outlines
Course OutlineModule 1: Configuring and Troubleshooting Domain Name System
This module explains how to configure and troubleshoot DNS, including DNS replication and caching.
Lessons
  • Configuring the DNS Server Role
  • Configuring DNS Zones
  • Configuring DNS Zone Transfers
  • Managing and Troubleshooting DNS
Lab : Configuring and Troubleshooting DNS
  • Configuring DNS Resource Records
  • Configuring DNS Conditional Forwarding
  • Installing and Configuring DNS Zones
  • Troubleshooting DNS
After completing this module, students will be able to:
  • Install and configure the DNS server role.
  • Create and configure DNS zones.
  • Configure DNS zone transfers.
  • Manage and troubleshoot DNS.
Module 2: Maintaining Active Directory Domain Services
This module explains how to implement virtualized domain controllers and read-only domain controller (RODCs). It also explains how to perform common AD DS administrative tasks
and manage the AD DS Database.
Lessons
  • Overview of AD DS
  • Implementing Virtualized Domain Controllers
  • Implementing RODCs
  • Administering AD DS
  • Managing the AD DS Database
Lab : Maintaining AD DS
  • Installing and Configuring a RODC
  • Configuring AD DS Snapshots
  • Configuring the Active Directory Recycle Bin
  • Optional Exercise- Cloning a domain controller
After completing this module, students will be able to:
  • Implement virtualized domain controllers.
  • Implement RODCs.
  • Administer AD DS.
  • Manage the AD DS database
Module 3: Managing User and Service Accounts
This module explains how to create, configure and automate the creation of user accounts. It also explains how to configure account-related properties of user objects. It further explains how to create and administer Managed Service Accounts.
Lessons
  • Configuring Password Policy and User Account Lockout Settings
  • Configuring Managed Service Accounts
Lab : Managing User and Service Accounts
  • Configuring Password Policy and Account Lockout Settings
  • Creating and Associating a Managed Service Account
After completing this module, students will be able to:
  • Configure password policy and user account lockout settings.
  • Configure managed service accounts.
Module 4: Implementing a Group Policy Infrastructure
This module explains how to implement a GPO infrastructure. This also teaches how to perform common GPO management tasks, and manage GPOs by using Windows PowerShell. It also focuses on troubleshooting the application of GPOs.
Lessons
  • Introducing Group Policy
  • Implementing and Administering GPOs
  • Group Policy Scope and Group Policy Processing
  • Troubleshooting the Application of GPOs
Lab : Implementing a Group Policy Infrastructure
  • Creating and Configuring Group Policy Objects
  • Managing GPO Scope
  • Verify GPO Application
  • Managing GPOs
After completing this module, students will be able to:
  • Explain what Group Policy is.
  • Implement and administer Group Policy Objects (GPOs).
  • Manage Group Policy scope and Group Policy processing.
  • Troubleshoot the application of GPOs.
Module 5: Managing User Desktops with Group Policy
This module explains how you can use Group Policy Objects (GPOs) to implement desktop environments across your organization by using Administrative Templates, Folder Redirection, Group Policy preferences, and where applicable, use software deployment to install and update application programs. It is important to know how to use these various GPO features so that you can configure your users’ computer settings properly.
Lessons
  • Implementing Administrative Templates
  • Configuring Folder Redirection and Scripts
  • Configuring Group Policy Preferences
  • Managing Software with Group Policy   
Lab : Managing User Desktops with Group Policy
  • Implement Settings by Using Group Policy Preferences
  • Managing Office 2013 by using Administrative Templates
  • Deploying Software by using Group Policy
  • Configuring Folder Redirection
After completing this module, students will be able to:
  • Configure folder redirection and scripts by using GPOs.
  • Describe and implement Administrative Templates.
  • Configure GPO preferences.
  • Deploy software by using GPOs.
Module 6: Installing, Configuring, and Troubleshooting the Network Policy Server Role
This module explains how to install and configure NPS, RADIUS Clients and servers. It also describes NPS authentication methods. It describe NPS authentication methods and how to
monitor and troubleshoot NPS.
Lessons
  • Installing and Configuring a Network Policy Server
  • Configuring RADIUS Clients and Servers
  • NPS Authentication Methods
  • Monitoring and Troubleshooting a Network Policy Server
Lab : Installing and Configuring a Network Policy Server
  • Installing and Configuring NPS to Support RADIUS
  • Configuring and Testing a RADIUS Client
After completing this module, students will be able to:
  • Install and configure a Network Policy Server (NPS).
  • Configure clients and servers with the Remote Authentication Dial-In User Service (RADIUS) protocol.
  • Explain NPS authentication methods.
  • Monitor and troubleshoot NPS.
Module 7: Implementing Network Access Protection
This module explains how to configure, monitor, and troubleshoot NAP. It also explains how NAP can help to protect your network and the various NAP enforcement processes.
Lessons
  • Overview of Network Access Protection
  • Overview of NAP Enforcement Processes
  • Configuring NAP
  • Configuring IPSec Enforcement for NAP
  • Monitoring and Troubleshooting NAP
Lab : Implementing Network Access Protection
  • Configuring NAP Components
  • Configuring Virtual Private Network Access
  • Configuring the Client Settings to Support NAP
After completing this module, students will be able to:
  • Describe how NAP can help to protect your network.
  • Describe the various NAP enforcement processes.
  • Configure NAP.
  • Monitor and troubleshoot NAP.
Module 8: Implementing Remote Access
In this module, you will learn how to implement and manage remote access in Windows Server 2012. You will also learn how to implement DirectAccess by using the Getting Started wizard, implement and manage an advanced DirectAccess infrastructure, and implement VPN.
Lessons
  • Overview of Remote Access
  • Implementing DirectAccess by Using the Getting Started Wizard
  • Implementing and Managing an Advanced DirectAccess Infrastructure
  • Implementing VPN
  • Implementing Web Application Proxy
Lab : Implementing DirectAccess by Using the Getting Started Wizard
  • Verifying Readiness for a DirectAccess Deployment
  • Configuring DirectAccess
  • Validating the DirectAccess Deployment
Lab : Deploying an Advanced DirectAccess Solution
  • Preparing the Environment for DirectAccess
  • Implementing the Advanced DirectAccess Infrastructure
  • Validating the DirectAccess Deployment
Lab : Implementing VPN
  • Implementing VPN
  • Validating the VPN Deployment
Lab : Implementing Web Application Proxy
  • Implementing Web Application Proxy
  • Validating the Web Application Proxy Deployment
After completing this module, students will be able to:
  • Install and manage the Remote Access role in Windows Server 2012 operating system.
  • Implement DirectAccess by using the Getting Started Wizard.
  • Implement and manage an advanced DirectAccess Infrastructure.
  • Implement VPN access.
  • Implement Web Application Proxy.
Module 9: Optimizing File Services
This module describes FSRM, configure quotas, file screening, and storage reports and implement classification management and file management tasks. It describes the components of the DFS. I also explains how to configure DFS namespaces and DFS replication.
Lessons
  • Overview of FSRM
  • Using FSRM to Manage Quotas, File Screens, and Storage Reports
  • Implementing Classification and File Management Tasks
  • Overview of DFS
  • Configuring DFS Namespaces
  • Configuring and Troubleshooting DFS Replication
Lab : Configuring Quotas and File Screening Using File Server Resource Manager
  • Configuring File Server Resource Manager Quotas
  • Configuring File Screening and Storage Reports
Lab : Implementing Distributed File System
  • Installing the DFS role service
  • Configuring a DFS Namespace
  • Configuring DFS Replication
After completing this module, students will be able to:
  • Describe the File Server Resource Manager (FSRM) in the Windows Server 2012 operating system.
  • Use FSRM to manage quotas, file screens, and storage reports.
  • Implement classification and file management tasks.
  • Describe Distributed File System (DFS).
  • Configure DFS namespaces.
  • Configure and troubleshoot DFS Replication.
Module 10: Configuring Encryption and Advanced Auditing
This module explains how to encrypt files using EFS and configure advanced auditing features.
Lessons
  • Encrypting Drives by Using BitLocker
  • Encrypting Files by Using EFS
  • Configuring Advanced Auditing
Lab : Configuring Encryption and Advanced Auditing
  • Using Windows BitLocker Drive Encryption to Secure Data Drives
  • Encrypting and Recovering Files
  • Configuring Advanced Auditing
After completing this module, students will be able to:
  • Secure data by using BitLocker Drive Encryption.
  • Encrypt files by using Encrypting File System (EFS).
  • Configure advanced auditing.
Module 11: Deploying and Maintaining Server Images
This module explains how to create and manage server images by using Windows Deployment Services
Lessons
  • Overview of Windows Deployment Services
  • Managing Images
  • Implementing Deployment with Windows Deployment Services
  • Administering Windows Deployment Services
Lab : Using Windows Deployment Services to Deploy Windows Server 2012
  • Installing and Configuring Windows Deployment Services
  • Creating Operating System Images with Windows Deployment Services
  • Configuring Custom Computer Naming
  • Deploying Images with Windows Deployment Services
After completing this module, students will be able to:
  • Describe the important features and functionality of Windows Deployment Services (Windows DS).
  • Manage images by using Windows Assessment and Deployment Kit (Windows ADK) Tools.
  • Configure Windows Deployment Services in Windows Server 2012.
  • Perform deployments with Windows Deployment Services.
Module 12: Implementing Update Management
This module explains how to use Windows Server Update Services (WSUS) to deploy updates to Windows servers and clients.
Lessons
  • Overview of WSUS
  • Deploying Updates with WSUS
Lab : Implementing Update Management
  • Implementing the WSUS Server Role
  • Configuring Update Settings
  • Approving and Deploying an Update by using WSUS
After completing this module, students will be able to:
  • Describe the role of WSUS.
  • Describe the WSUS update management process.
  • Deploy updates with WSUS.
Module 13: Monitoring Windows Server 2012
This module explains the monitoring tools available in Windows Server 2012. it also explains how to use Performance Monitor and monitor events.
Lessons
  • Monitoring Tools
  • Using Performance Monitor
  • Monitoring Event Logs
Lab : Monitoring Windows Server 2012
  • Establishing a Performance Baseline
  • Identifying the Source of a Performance Problem
  • Viewing and Configuring Centralized Event Logs
After completing this module, students will be able to:
  • Describe the monitoring tools for the Windows Server 2012 operating system.
  • Use Performance Monitor to view and analyze performance statistics of programs that are running on their servers.
  • Monitor event logs to view and interpret the recorded events.
 
Code 20412
Duration 40 Hours
Vendor
Configuring Advanced Windows Server 2012 Services
Overview
This course is part three, in a series of three courses that provides the skills and knowledge necessary to implement a core Windows Server 2012 infrastructure in an existing enterprise environment. The three courses will collectively cover implementing, managing, maintaining and provisioning services and infrastructure in a Windows Server 2012 environment. Although there is some cross-over of skills and tasks across these three courses, this course primarily covers advanced configuration of services necessary to deploy, manage and maintain a Windows Server 2012 infrastructure, such as advanced networking services, Active Directory Domain Services (AD DS), identity management, rights management, Federated services, network load balancing, failover clustering, business continuity and disaster recovery.
Prerequisites
 
  • Implement advanced network services.
  • Implement advanced file services.
  • Implement Dynamic Access Control.
  • Implement distributed Active Directory Domain Services (AD DS) deployments.
  • Implement AD DS sites and replication.
  • Implement Active Directory Certification Services (AD CS).
  • Implement Active Directory Rights Management Services (AD RMS).
  • Implement Active Directory Federation Services (AD FS). 
  • Implement network load balancing (NLB).
  • Implement failover clustering.
  • Implement failover clustering with Hyper-V.
  • Implement disaster recovery.
Objectives
Before attending this course, students must have:
  • Good hands-on experience working in a Windows Server 2008, Windows server 2008 R2 or Windows Server 2012 enterprise environment.
  • Real-world experience implementing, managing, and configuring AD DS and networking infrastructure in an enterprise environment.
  • Knowledge equivalent to courses: 20410B: Installing and Configuring Windows Server 2012, and 20411B: Administering Windows Server 2012.
Outlines
Course OutlineModule 1: Implementing Advanced Network ServicesThis module describes how to configure advanced features in the Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) with Windows Server 2012, and it covers IP Address Management (IPAM).Lessons
  • Configuring Advanced DHCP Features
  • Configuring Advanced DNS Settings
  • Implementing IPAM
Lab : Implementing Advanced Network Services
  • Configuring Advanced DHCP Settings
  • Configuring Advanced DNS Settings
  • Configuring IPAM
After completing this module, students will be able to:
  • Configure advanced DNS services.
  • Configure advanced DHCP services.
  • Implement IPAM.
Module 2: Implementing Advanced File ServicesThis module describes how to configure and manage iSCSI and BranchCache, and how to implement Windows 2012 features that optimize storage utilization, such as File Server Resource Manager, file classification, and data duplication.Lessons
  • Configuring iSCSI Storage
  • Configuring BranchCache
  • Optimizing Storage Usage   
Lab : Implementing Advanced File Services
  • Configuring iSCSI Storage
  • Configuring the File Classification Infrastructure
Lab : Implementing BranchCache
  • Configuring the Main Office Servers for BranchCache
  • Configuring the Branch Office Servers for BranchCache
  • Configuring Client Computers for BranchCache
  • Monitoring BranchCache
After completing this module, students will be able to:
  • Configure iSCSI storage.
  • Configure BranchCache.
  • Optimize storage usage.
Module 3: Implementing Dynamic Access ControlThis module describes how to plan and implement Dynamic Access Control.Lessons
  • Overview of Dynamic Access Control
  • Planning for Dynamic Access Control
  • Deploying Dynamic Access Control
Lab : Implementing Dynamic Access Control
  • Planning the Dynamic Access Control Implementation
  • Configuring User and Device Claims
  • Configuring Resource Property Definitions
  • Configuring Central Access Rules and Central Access Policies
  • Validating and Remediating Dynamic Access Control
  • Implementing New Resource Policies
After completing this module, students will be able to:
  • Plan for Dynamic Access Control.
  • Deploy Dynamic Access Control.
Module 4: Implementing Distributed Active Directory Domain Services DeploymentsThis module describes the components of a highly complex AD DS deployment, which includes implementing a distributed AD DS deployment and configuring AD DS forest trusts.Lessons
  • Overview of Distributed AD DS Deployments
  • Deploying a Distributed AD DS Environment
  • Configuring AD DS Trusts
Lab : Implementing Complex AD DS Deployments
  • Implementing Child Domains in AD DS
  • Implementing Forest Trusts   
After completing this module, students will be able to:
 
  • Describe and understand distributed AD DS deployments.
  • Implement a distributed AD DS deployment.
  • Configure AD DS trusts.
 
Module 5: Implementing Active Directory Domain Services Sites and ReplicationThis module describes how replication works in a Windows Server 2012 AD DS environment, including how to configure AD DS sites so that you can optimize AD DS network traffic and how to configure and monitor AD DS replication.Lessons
  • Overview of AD DS Replication
  • Configuring AD DS Sites
  • Configuring and Monitoring AD DS Replication
Lab : Implementing AD DS Sites and Replication
  • Modifying the Default Site
  • Creating Additional Sites and Subnets
  • Configuring AD DS Replication
After completing this module, students will be able to:
 
  • Describe AD DS replication.
  • Configure AD DS sites.
  • Configure and monitor AD DS replication.
 
Module 6: Implementing Active Directory Certificate ServicesThis module describes the Public Key Infrastructure (PKI) components and concepts. It covers implementing a certification authority infrastructure, planning and implementing a certificate template deployment using an AD CS certification authority, and planning and implementing certificate distribution and revocation.Lessons
  • PKI Overview
  • Deploying CAs
  • Deploying and Configuring CA Hierarchy
  • Deploying and Managing Certificate Templates
  • Implementing Certificate Distribution and Revocation
  • Managing Certificate Recovery
Lab : Deploying and Managing Certificates
  • Configuring Certificate Templates
  • Configuring Certificate Enrollment
  • Configuring Certificate Revocation
  • Configuring Key Recovery
After completing this module, students will be able to:
 
  • Describe the PKI.
  • Deploy certification authorities.
  • Deploy and configure the CA hierarchy.
  • Deploy and manage certificate templates.
  • Implement certificate distribution and revocation.
  • Manage certificate recovery.
 
Module 7: Implementing Active Directory Rights Management ServicesThis module describes the AD RMS features and functionality. It explains how to use AD RMS to configure content protection, and deploy and manage an AD RMS infrastructure.Lessons
  • AD RMS Overview
  • Deploying and Managing an AD RMS Infrastructure
  • Configuring AD RMS Content Protection
  • Configuring External Access to AD RMS
Lab : Implementing AD RMS
  • Installing and Configuring AD RMS
  • Configuring AD RMS Templates
  • Implementing the AD RMS Trust Policies
  • Verifying the AD RMS Deployment
After completing this module, students will be able to:
 
  • Describe AD RMS.
  • Deploy and manage an AD RMS infrastructure.
  • Configure AD RMS content protection.
  • Configure external access to AD RMS.
 
Module 8: Implementing Active Directory Federation ServicesThis module provides identity federation business scenarios, and it describes how to use AD FS to address such scenarios. It explains how to configure AD FS prerequisites, deploy AD FS services, enable single sign-on (SSO) for an organization, and enable SSO between federated business partners.Lessons
  • Overview of AD FS
  • Deploying AD FS
  • Implementing AD FS for a Single Organization
  • Deploying AD FS in a B2B Federation Scenario
Lab : Implementing AD FS
  • Configuring AD FS Prerequisites
  • Installing and Configuring AD FS
  • Configuring AD FS for a Single Organization
  • Configuring AD FS for Federated Business Partners
After completing this module, students will be able to:
 
  • Describe AD FS.
  • Deploy AD FS.
  • Implement AD FS for a single organization.
  • Deploy AD FS in a business-to-business federation scenario.
 
Module 9: Implementing Network Load BalancingThis module describes how to plan and implement NLB. It will cover managing and configuring an NLB cluster and validating high availability for an NLB cluster.Lessons
  • Overview of NLB
  • Configuring an NLB Cluster
  • Planning an NLB Implementation
Lab : Implementing Network Load Balancing
  • Implementing a Network Load Balancing Cluster
  • Configuring and Managing the NLB Cluster
  • Validating High Availability for the NLB Cluster
After completing this module, students will be able to:
 
  • Configure an NLB cluster.
  • Plan an NLB implementation.
 
Module 10: Implementing Failover Clustering
This module describes the failover clustering features in Windows Server 2012. It explains how to implement a failover cluster, configure highly available applications and services on a failover cluster, maintain a failover cluster, and use new maintenance features such as Cluster Aware Updating (CAU). It will also cover how to implement multi-site failover clustering.
Lessons
  • Overview of Failover Clustering
  • Implementing a Failover Cluster
  • Configuring Highly Available Applications and Services on a Failover Cluster
  • Maintaining a Failover Cluster
  • Implementing a Multi-Site Failover Cluster
Lab : Implementing Failover Clustering
  • Configuring a Failover Cluster
  • Deploying and Configuring a Highly Available File Server
  • Validating the Deployment of the Highly Available File Server
  • Configuring Cluster-Aware Updating on the Failover Cluster
After completing this module, students will be able to:
 
  • Implement a failover cluster.
  • Configure highly available applications and services on a failover cluster.
  • Maintain a failover cluster.
  • Implement a multi-site failover cluster.
 
Module 11: Implementing Failover Clustering with Hyper-V
This module describes the options for making virtual machines highly available. It explains
how to implement virtual machines in a failover cluster that was deployed on a host and how you can move a virtual machine or its storage. In addition, it provides a high-level overview of System Center Virtual Machine Manager (SCVMM) 2012.
Lessons
  • Overview of Integrating Hyper-V with Failover Clustering
  • Implementing Hyper-V Virtual Machines on Failover Clusters
  • Implementing Hyper-V Virtual Machine Movement
  • Managing Hyper-V Virtual Environments by Using VMM
Lab : Implementing Failover Clustering with Hyper-V
  • Configuring Hyper-V Replicas
  • Configuring a Failover Cluster for Hyper-V
  • Configuring a Highly Available Virtual Machine
After completing this module, students will be able to:
 
  • Describe Hyper-V integration with failover clustering.
  • Implement Hyper-V virtual machines on failover clusters.
  • Implement Hyper-V virtual machine movement.
  • Manage Hyper-V virtual environments by using VMM.
 
Module 12: Implementing Disaster RecoveryThis module describes considerations for implementing a disaster recovery solution, and how to plan and implement a backup solution for Windows Server 2012. In addition, it explains how to plan and implement server and data recovery using Windows Server backup and Microsoft Online backup.Lessons
  • Overview of Disaster Recovery
  • Implementing Windows Server Backup
  • Implementing Server and Data Recovery
Lab : Implementing Windows Server Backup and Restore
  • Backing Up Data on a Windows Server 2012 Server
  • Restoring Files Using Windows Server Backup
  • Implementing Microsoft Online Backup and Restore
After completing this module, students will be able to:
 
  • Describe disaster recovery.
  • Implement Windows Server backup using Windows Server backup and Microsoft Online backup.
  • Implement server and data recovery.
 
Code 20415
Duration 40 Hours
Vendor
Implementing a Desktop Infrastructure
Overview
This 5-day instructor-led course provides you with the skills and knowledge needed to plan, design, and implement a Windows 8 desktop infrastructure. The course provides guidance on planning and deploying desktops by using several technologies such as User State Migration Tool (USMT), Microsoft Deployment Toolkit (MDT), Virtual Desktop Infrastructure (VDI), and more. Additionally, the course describes how to protect desktops and monitor their health and performance.
Prerequisites
At Course Completion
After completing this course, students will be able to:
  • Assess and determine desktop deployment options.
  • Plan an image management strategy.
  • Implement desktop security.
  • Capture and manage a desktop operating system image.
  • Plan and implement User State Migration.
  • Plan and deploy desktops by using the Microsoft Deployment Toolkit.
  • Plan and deploying desktops by using System Center 2012 Configuration Manager.
  • Plan and  implement a Remote Desktop Services infrastructure.
  • Manage user state virtualization for enterprise desktops.
  • Plan and implement an updates infrastructure to support enterprise desktops.
  • Protect enterprise desktops from malware and data loss.
  • Monitoring the performance and health of the desktop infrastructure.
Objectives
Before attending this course, students must have:

  • Solid understanding of TCP/IP and networking concepts
  • Solid knowledge of Windows and Active Directory Domain Services (AD DS)—for example, domain user accounts, domain vs. local user accounts, user profiles, and group membership
  • Good understanding of scripts and batch files
  • Solid understanding of security concepts such as authentication and authorization
  • Familiarity with the client administration capabilities of Windows Server
  • General knowledge of management tools such as System Center 2012 Configuration Manager, System Center 2012 Operations Manager, and System Center 2012 Data Protection Manager.
  • Familiarity with imaging, packaging, and operating system deployment concepts
  • Familiarity with certificates and Certification Authority (CA) implementation and configuration
  • Knowledge equivalent to Windows 2012 MCSA
  • Experience administering Windows Server in an environment that typically has the following characteristics:
  • 2,500 to 50,000 or more users
  • Multiple physical locations and multiple domain controllers
  • Network services and resources such as messaging, databases, file and print, firewalls, Internet access, an intranet, and client computer management
  • Support for Windows 8 client desktops
  • Deployment and management of both physical and virtual applications
Outlines
Module 1: Assessing and Determining Desktop Deployment OptionsThis module describes the enterprise desktop lifecycle and explains how you can assess hardware and infrastructure readiness. The module then describes how to identify and select the most appropriate deployment option based upon organizational requirements.Lessons
  • Overview of the Enterprise Desktop Life Cycle
  • Assessing Hardware and Infrastructure Readiness for a Desktop Deployment
  • Using MAP to Assess Deployment Readiness
  • Overview of Enterprise Desktop Deployment Methods
  • Volume Activation Technologies for Enterprise Desktops
Lab : Assessing and Determining Desktop Deployment Options
  • Planning a Desktop Deployment Strategy
  • Collecting Infrastructure Data
  • Implementing a Volume Activation Solution
After completing this module, students will be able to:
  • Describe the enterprise desktop life cycle. 
  • Explain how to assess hardware and infrastructure readiness for a desktop deployment.
  • Describe how to use MAP to assess deployment readiness.
  • Describe the available methods for deploying enterprise desktops. 
  • Describe volume activation technologies for enterprise desktops.
Module 2: Planning An Image Management StrategyThis modules describes Windows image formats and helps you to define an efficient image management strategy based upon business requirements.Lessons
  • Overview of Windows Image Format
  • Overview of Image Management
Lab : Planning an Image Management Strategy
  • Assessing Business Requirements to Support an Image Management Strategy
After completing this module, students will be able to:
  • Describe image formats used for Windows desktop deployments.
  • Determine the type and content of images used in an image management strategy.
Module 3: Implementing Desktop SecurityThis module describes how to deploy and manage a secure desktop by implementing centralized policies, BitLocker settings, and Encrypted File System (EFS) settings.Lessons
  • Implementing a Centralized Desktop Security Solution
  • Planning and Implementing BitLocker
  • Planning and Implementing EFS
Lab : Configuring Desktop Security
  • Configuring Desktop Security by Using Group Policy
  • Configuring Drive Encryption by Using BitLocker and MBAM
Lab : Configuring File Encryption by Using EFS
  • Implementing a Centrally Managed EFS Solution
  • Verifying EFS Document Recovery
After completing this module, students will be able to:
  • Implement a centralized secure desktop solution by using Group Policy settings.
  • Plan and implement device encryption by using BitLocker.
  • Plan and implement a centrally managed EFS solution to secure files and folders on enterprise desktops.
Module 4: Capturing and Managing a Desktop Operating System ImageThis module describes how to use the Windows Assessment and Deployment Kit (ADK) and Windows Deployment Services (WDS) to create, capture, and manage a desktop operating system image.Lessons
  • Overview of Windows ADK
  • Managing Windows PE
  • Building a Reference Image by Using Windows SIM and Sysprep
  • Capturing and Servicing a Reference Image
  • Configuring and Managing Windows DS
Lab : Preparing the Imaging and the Windows PE Environment
  • Installing Windows ADK
  • Configuring a Custom Windows PE Environment
Lab : Building a Reference Image by Using Windows SIM and Sysprep
  • Building a Custom Answer File Using Windows SIM
  • Installing a Reference Computer by Using a Custom Answer File
  • Generalizing a Reference Computer by Using Sysprep
Lab : Capturing and Servicing a Reference Image
  • Capturing a Reference System Image
  • Servicing a Reference System Image
Lab : Configuring and Managing Windows DS
  • Planning the Windows Deployment Services Environment
  • Installing and Configuring the Windows Deployment Services Server Role
  • Capturing a Reference Image by Using Windows DS
  • Deploying an Image by Using Windows DS
After completing this module, students will be able to:
  • Identify the purpose and key features of the Windows ADK.
  • Describe the Windows PE environment and how it can be customized to address specific image and deployment requirements.
  • Describe the Windows Setup and preparation process and how it can be modified using answer files created with Windows SIM and the Sysprep utility.
  • Use DISM to capture and service a reference image.
  • Configure and manage Windows DS to help support an image capture and deployment solution.
Module 5: Planning and Implementing User State MigrationThis modules describes how to use the User State Migration Tool (USMT) to migrate appropriate user data and settings to a new desktop operating system.Lessons
  • Overview of User State Migration
  • Planning User State Migration by Using USMT
  • Migrating User State by Using USMT
Lab : Planning and Implementing User State Migration
  • Planning for User State Migration
  • Creating and Customizing the USMT XML Files
  • Capturing and Restoring User State by Using USMT
Lab : Migrating User State by Using Hard-Link Migration
  • Performing a Hard-Link Migration by Using USMT
After completing this module, students will be able to:
  • Describe user state migration.
  • Plan user state migration.
  • Migrate user state by using the USMT.
Module 6: Planning and Deploying Desktops Using the Microsoft Deployment ToolkitThis module describes how to use the Microsoft Deployment Toolkit (MDT) 2012 to deploy Windows operating systems in lite touch installation scenarios.Lessons
  • Planning for the LTI Environment
  • Implementing MDT 2012 for LTI
  • Integrating Windows DS with MDT
Lab : Planning and Deploying Desktops by Using MDT
  • Planning for the MDT LTI Environment
  • Installing MDT 2012 and Prerequisites
  • Creating and Configuring the MDT 2012 Deployment Share
  • Deploying and Capturing a Reference Operating System Image
  • Integrating Windows DS with MDT 2012 To Provide PXE-Boot Capabilities
After completing this module, students will be able to:
  • Plan for the LTI environment.
  • Implement MDT 2012 for LTI.
  • Integrate Windows Deployment Services (DS) with the MDT 2012.
Module 7: Planning and Deploying Desktops by Using System Center 2012 Configuration ManagerThis describes how to use System Center 2012 Configuration Manager to implement a zero touch installation for deploying enterprise desktops.Lessons
  • Planning the ZTI Environment
  • Preparing the Site for Operating System Deployment
  • Building a Reference Image by Using a Configuration Manager Task Sequence
  • Deploying Client Images by Using MDT Task Sequences
Lab : Preparing the Environment for Operating System Deployment
  • Planning the Operating System Deployment Infrastructure
  • Preparing the ZTI Environment
  • Configuring the Deployment Packages and System Images
Lab : Performing a Zero-Touch Installation by Using MDT and Configuration Manager
  • Performing a ZTI
After completing this module, students will be able to:
  • Plan the ZTI environment.
  • Prepare the site for operating system deployment.
  • Build a reference image by using a Configuration Manager task sequence.
  • Deploy client images by using MDT task sequences.
Module 8: Planning and Implementing a Remote Desktop Services InfrastructureThis module describes how to plan and implement session virtualization deployment and a virtual desktop infrastructure (VDI) based upon Windows Server 2012 Remote Desktop Services.Lessons
  • Overview of Remote Desktop Services
  • Planning the Remote Desktop Services Environment
  • Configuring a Virtual Machine–Based Desktop Infrastructure Deployment
  • Configuring a Session-Based Desktop Deployment
  • Extending the Remote Desktop Services Environment to the Internet
Lab : Planning and Implementing a Remote Desktop Services Infrastructure
  • Planning the Remote Desktop Services Environment
  • Configuring a Virtual Machine-Based Desktop Infrastructure Scenario
  • Configuring a Session-Based Desktop Scenario
  • Configuring the RD Gateway Role Service
After completing this module, students will be able to:
  • Describe Remote Desktop Services.
  • Plan the Remote Desktop Services environment.
  • Configure a virtual machine–based desktop deployment.
  • Configure a session-based desktop deployment.
  • Extend the Remote Desktop Services environment to the Internet.

Module 9: Managing User State Virtualization For Enterprise DesktopsThis module describes how to plan and configure user state virtualization to provide a consistent desktop client experience.Lessons
  • Overview of User State Virtualization
  • Planning User State Virtualization
  • Configuring Roaming Profiles, Folder Redirection, and Offline Files
  • Implementing UE-V
Lab : Managing User State Virtualization for Enterprise Desktops
  • Planning User State Virtualization
  • Implementing User State Virtualization
After completing this module, students will be able to:
  • Describe User State Virtualization.
  • Plan User State Virtualization.
  • Configure roaming profiles, Folder Redirection, and Offline Files.
  • Implement UE-V.
Module 10: Planning and Implementing an Updates Infrastructure to Support Enterprise DesktopsStudents will be able to plan and implement an updates infrastructure to support both physical and virtual enterprise desktops.Lessons
  • Planning an Updates Infrastructure for the Enterprise
  • Supporting Software Updates with System Center 2012 Configuration Manager
  • Managing Updates for Virtual Machines and Images
  • Using Windows Intune for Managing Software Updates
Lab : Planning and Implementing an Updates Infrastructure to Support Enterprise Desktops
  • Planning an Updates Infrastructure
  • Preparing a System Center 2012 Configuration Manager Site to Support Software Updates
  • Determining Software Update Compliance
  • Deploying Software Updates to Clients
After completing this module, students will be able to:
  • Describe considerations and methods for implementing an enterprise-based updates infrastructure.
  • Describe how to use Microsoft System Center 2012 Configuration Manager to deploy and manage software updates.
  • Describe how to manage software updates for virtual machines and images.
  • Describe how to configure Windows Intune to deploy and manage software updates.
Module 11: Protecting Enterprise Desktops from Malware and Data LossThis module describes how to use System Center technologies such as Endpoint protection and Data Protection Manager (DPM) to protect enterprise desktops from malware and data loss.Lessons
  • Overview of System Center 2012 Endpoint Protection
  • Configuring System Center 2012 Endpoint Protection Client Settings and Monitoring Status
  • Using Windows Intune Endpoint Protection
  • Protecting Desktops by Using DPM
Lab : Implementing Client Endpoint Protection
  • Configuring the Endpoint Protection Point
  • Configuring and Deploying Endpoint Protection Polices
  • Configuring Client Settings to Support Endpoint Protection
  • Monitoring Endpoint Protection
Lab : Configuring Data Protection for Client Computer Data
  • Configuring and Verifying Client Data Protection
After completing this module, students will be able to:
  • Describe System Center 2012 Endpoint Protection.
  • Explain how to configure System Center 2012 Endpoint Protection client settings and monitoring status.
  • Describe how to use Windows Intune Endpoint Protection.
  • Describe how to protect desktops by using DPM.
Module 12: Monitoring the Performance and Health of the Desktop InfrastructureThis module describes how to identify and monitor relevant services and components to ensure the health and performance of the enterprise desktop infrastructure.Lessons
  • Performance and Health Monitoring for the Desktop Infrastructure
  • Monitoring VDI
Lab : Monitoring the Performance and Health of the Desktop Infrastructure
  • Configuring Performance and Reliability Monitoring of Desktops
  • Configuring Operations Manager for Monitoring Virtual Environments
After completing this module, students will be able to:
  • Monitor the health and performance of the desktop infrastructure.
  • Monitor the VDI.
 
Code 20416
Duration 40 Hours
Vendor
Implementing Desktop Application Environments
Overview
In this five-day course, build the skills you need to design, deploy, and manage a physical and virtual Windows Server 2012 application management infrastructure, and focus on using Microsoft System Center 2012 Service Pack 1 (SP1). You will also learn to design, deploy, and manage Windows 8 Enterprise applications in a physical and virtual environment and in the cloud. This course is designed for experienced IT professionals who support medium to large enterprises, have previous experience working with operating systems running Windows Server, have their Windows 2012 Server certification (MCSA), and have taken course 20413: Designing and Implementing a Server Infrastructure or have equivalent skills. Note: This course maps to the skills and knowledge measured by Microsoft Exam 70-416: Implementing Desktop Application Environments.
Prerequisites
After completing this course, students will be able to:
  • Design an application distribution strategy that is appropriate for an organizational environment.
  • Diagnose and remediate application compatibility problems for desktop and presentation virtualization-based deployments.
  • Use Group Policy and Windows Intune to deploy applications to client devices.
  • Deploy applications centrally using System Center 2012 Configuration Manager SP1.
  • Configure self-service application deployment using System Center 2012 Configuration Manager SP1, System Center 2012 Service Manager SP1, and Windows Store apps.
  • Design and deploy Windows Server 2012 roles and features to support presentation virtualization.
  • Prepare, deploy and manage applications for Remote Desktop, RemoteApp, and Remote Desktop Web Access.
  • Design and deploy Windows Server 2012 roles and features to support application virtualization.
  • Virtualize and deploy applications by using App-V and System Center 2012 Configuration Manager SP1.
  • Plan and configure the appropriate infrastructure to streamline the deployment of software updates to applications, and plan and configure application security.
  • Plan and implement application upgrades, supersedence, and application coexistence.
  • Monitor the deployment, performance, and utilization of applications and determine whether current application hosting platforms are meeting business needs.
Objectives
This course requires that you meet the following prerequisites:
The attendee should have experience administering Windows Server in an environment that typically has the following characteristics:
  • 2,500 to 50,000 or more users
  • Multiple physical locations and multiple domain controllers
  • Network services and resources such as messaging, databases, file and print, firewalls, Internet access, an intranet, and client computer management
The attendee should have:
  • Experience supporting Windows 8 client desktops and deploying and managing applications, both physical and virtual.
  • An MCSA and 20415B or equivalent knowledge.
In addition to their professional experience, students who attend this training should already have the following technical knowledge, and should:
  • Have solid understanding of TCP/IP and networking concepts.
  • Have a solid understanding of Windows and Active Directory Domain Services (AD DS), for example, domain user accounts, domain vs. local user accounts, user profiles, and group membership.
  • Understand how to use scripts and batch files.
  • Have solid understanding of security concepts such as authentication and authorization.
  • Be able to perform a clean installation of Windows 8, upgrade to Windows 8, and migrate user-related data and settings from Windows XP.
  • Be able to configure disks, partitions, volumes, and device drivers to enable Windows 8 to function as desired.
  • Be able to configure and troubleshoot permissions and other settings to allow access to resources and applications on Windows 8 systems.
  • Be able to configure settings to enable network connectivity.
  • Be able to configure and troubleshoot a wireless network connection.
  • Be able to configure and troubleshoot Windows 8 security.
  • Be able to configure mobile computers and devices.
  • Understand the client administration capabilities of Windows Server and be familiar with management tools such as the Microsoft System Center suite of products.
  • Understand the concepts of deployment, packaging, and imaging.
  • Have a familiarity with SQL Server concepts.
Students who attend this training can meet the prerequisites by attending the following courses, or obtaining equivalent knowledge and skills:
  • 20410B: Installing and Configuring Windows Server 2012
  • 20411B: Administering Windows Server 2012
  • 20412B: Configuring Advanced Windows Server 2012 services
  • 20415B: Implementing a Desktop Infrastructure
Outlines
Module 1: Designing an Application Distribution Strategy
This module discusses the high-level aspects of designing an application distribution strategy. The topics covered can help students identify the aspects in an environment that influence application distribution and identify the most common distribution methods used in the Windows environment.
Lessons
  • Developing an Application Lifecycle Strategy
  • Determining Business Requirements for Application Distribution
  • Overview of Application Distribution Strategies
Lab : Designing an Application Distribution Strategy
  • Choosing an Appropriate Application Deployment Strategy for the Product Catalog App
After completing this module, students will be able to:
  • Describe how to develop an application lifecycle strategy.
  • Describe the important factors to assess prior to application distribution design, including client configuration and deployment infrastructure.
  • Describe application distribution strategies.
  • Design an application distribution strategy.
Module 2: Diagnosing and Remediating Application Compatibility
This module describes the process for addressing common application compatibility issues experienced during a new operating system deployment. The module also explains how to use Microsoft Application Compatibility Toolkit (ACT) to help inventory, analyze, and mitigate application compatibility issues.
Lessons
  • Diagnosing Application Compatibility Issues
  • Evaluating and Implementing Remediation Solutions
  • Resolving Compatibility Issues by Using ACT
Lab : Diagnosing and Remediating Application Compatibility
  • Analyzing Applications for Potential Compatibility Issues
  • Mitigating Application Compatibility Issues
After completing this module, students will be able to:
  • Understand important considerations for diagnosing application compatibility issues.
  • Explain the solutions available for remediating application compatibility issues.
  • Resolve application compatibility issues with ACT.
Module 3: Deploying Software by Using Group Policy and Windows IntuneThis module discusses using Group Policy and Windows Intune to deploy software as part of a software deployment strategy. It also covers sideloading, which is the specialized software deployment method specific to Windows Store apps.Lessons
  • Deploying Software by Using Group Policy
  • Sideloading Windows Store Apps
  • Deploying Software by Using Windows Intune
Lab : Centralizing Software Deployment by Using Group Policy and Windows Intune
  • Deploying Software by Using Group Policy
  • Sideloading a Windows Store App
  • Performing Windows Intune Simulations
After completing this module, students will be able to:
  • Deploy software centrally by using Group Policy.
  • Install Windows Store apps by using sideloading.
  • Deploy software to clients by using Windows Intune.
Module 4: Deploying Applications by Using Microsoft System Center 2012 Configuration Manager SP1
This module describes how to use System Center 2012 Configuration Manager SP1 to manage the software deployment and management lifecycle, including deploying software, targeting a group of user or computers, validating the success of software deployment, and removing software from computers when that software is no longer required.
Lessons
  • Understanding Software Deployment by Using System Center 2012 Configuration Manager SP1
  • Deploying Software by Using System Center 2012 Configuration Manager SP1
Lab : Deploying Applications by Using System Center 2012 Configuration Manager SP1
  • Creating Queries by Using System Center 2012 Configuration Manager SP1
  • Creating User and Device Collections
  • Deploying Applications to Collections
After completing this module, students will be able to:
  • Understand methods of deploying software with Microsoft System Center 2012 Configuration Manager Service Pack 1 (SP1).
  • Use System Center 2012 Configuration Manager SP1 to deploy software.
Module 5: Configuring Self-Service Application Deployment
This module describes planning, configuring and using self‑service application deployment. It describes configuring self‑service application deployment for Windows Intune clients and for Microsoft System Center 2012 Configuration Manager clients, in addition to using Microsoft System Center 2012 - Service Manager and Microsoft System Center 2012 - Orchestrator to improve the self‑service application deployment process.
Lessons
  • Understanding Self-Service Application Deployment
  • Configuring Self-Service with Windows Intune
  • Self-Service Deployment by Using System Center 2012 Configuration Manager SP1
  • Self-Service Deployment with Service Manager and Orchestrator
Lab : Configuring Self-Service Application Deployment
  • Planning Self-Service Application Deployment
  • Deploying Self-Service Software by Using the Configuration Manager Application Catalog
  • Using the Configuration Manager Application Catalog
After completing this module, students will be able to:
  • Plan self‑service application deployment.
  • Configure self‑service application deployment for Windows Intune clients.
  • Configure self‑service application deployment for Microsoft System Center 2012 Configuration Manager clients.
  • Use Microsoft System Center 2012 - Service Manager and Microsoft System Center 2012 - Orchestrator to improve the self‑service application deployment process.
Module 6: Designing and Implementing Presentation Virtualization Infrastructure
This module introduces you to presentation virtualization concepts and to the components that are used for presentation virtualization in computers running Windows so that you can plan the deployment of apps using presentation virtualization in your environment.
 
 
Lessons
  • Assessing Presentation Virtualization Requirements
  • Planning Presentation Virtualization Infrastructure
  • Deploying Presentation Virtualization Infrastructure
  • Extending the Presentation Virtualization Infrastructure
Lab : Deploying and Implementing Presentation Virtualization Infrastructure
  • Assessing Capacity Requirements for Presentation Virtualization
  • Configuring Presentation Virtualization Infrastructure
  • Configuring High Availability for Presentation Virtualization Infrastructure
  • Configuring Remote Access for Presentation Virtualization Infrastructure
After completing this module, students will be able to:
  • Describe how to assess presentation virtualization requirements.
  • Describe how to plan presentation virtualization infrastructure.
  • Describe how to deploy presentation virtualization infrastructure.
  • Describe how to extend presentation virtualization infrastructure.

Module 7: Preparing, Configuring, and Deploying Presentation Virtualization Applications
This module discusses presentation virtualization strategies and which strategy to use in a given situation. It also discusses how to deploy applications to Remote Desktop Session Host servers as traditional, RemoteApp, and Remote Desktop Web Access applications.
 
 
Lessons
  • Determining Presentation Virtualization Application Strategies
  • Planning and Deploying Remote Desktop, RemoteApp, and Remote Desktop Web Access
Lab : Configuring Applications for Presentation Virtualization
  • Configuring Access to RD Session Host Resources
  • Deploying RD Session Host Desktop Applications
  • Configuring and Deploying a RemoteApp Application
  • Verifying Applications by Using RD Web Access
After completing this module, students will be able to:
  • Determine an appropriate presentation virtualization application strategy.
  • Plan how to deploy applications and deploy them to Remote Desktop Session Host (RD Session Host) servers as traditional, RemoteApp, and Remote Desktop Web Access (RD Web Access) applications.
Module 8: Designing and Deploying an Application Virtualization Environment
This module discusses how to determine which application virtualization infrastructure model best suits an organization’s needs. Additionally, this module covers how to determine which Windows Server 2012 roles and features are needed to support the model you have selected, and which Group Policy settings should be configured.
Lessons
  • Overview of Application Virtualization Models
  • Deploying Application Virtualization Infrastructure Components
  • Configuring Application Virtualization Client Support
Lab : Planning and Deploying Application Virtualization Infrastructure
  • Planning the Deployment of App-V Roles and Features
  • Deploying App-V Infrastructure
  • Configuring App-V Client Settings
After completing this module, students will be able to:
  • Choose an appropriate application virtualization model to meet your business requirements.
  • Deploy components to support your chosen application virtualization model.
  • Deploy and configure the Microsoft Application Virtualization (App‑V) 5 client.

Module 9: Preparing, Sequencing, and Deploying Virtual Applications
This module describes sequencing applications by using the Microsoft Application Virtualization (App-V) Sequencer. It also describes how to stream sequenced applications and how to locally install sequenced applications.
Lessons
  • Sequencing Applications with App-V 
  • Deploying App-V Applications
Lab : Preparing, Sequencing, and Deploying Virtual Applications
  • Installing and Configuring the App-V Sequencer
  • Sequencing Applications
  • Preparing App-V Applications by Using System Center 2012 Configuration Manager SP1
  • Deploying Sequenced Applications
After completing this module, students will be able to:
  • Install the App‑V 5.0 Sequencer and sequence applications.
  • Deploy sequenced applications.


Module 10: Planning and Implementing Application Updates and Security
This module discusses how to configure the appropriate infrastructure to streamline the deployment of software updates to applications. It also covers how to plan and configure application security.
Lessons
  • Planning Application Updates
  • Deploying Updates by Using WSUS
  • Deploying Application Updates by Using System Center 2012 Configuration Manager SP1
  • Implementing Application Security
Lab : Preparing and Deploying Application Updates
  • Preparing a System Center 2012 Configuration Manager SP1 Site to Support Software Updates
  • Updating Deployed Applications by Using System Center 2012 Configuration Manager SP1
  • Resequencing an App-V Application
  • Deploying AppLocker Policy
After completing this module, students will be able to:
  • Plan application updates.
  • Deploy application updates by using Microsoft Windows Server Update Services (WSUS).
  • Deploy application updates by using Microsoft System Center 2012 Configuration Manager with Service Pack 1 (SP1).
  • Implement application security.

Module 11: Planning and Implementing Application Upgrades
This module covers planning and implementing application upgrades and supersedence, including how to deploy multiple versions of an application, how to uninstall applications, how to retire applications, and how to manage user settings.  It also covers planning application concurrency and implementing it by using App-V, Client Hyper-V, RemoteApp, VDI, and Remote Desktop Services.
Lessons
  • Overview of Application Upgrades
  • Overview of Application Concurrency
Lab : Upgrading Applications
  • Planning an Application Upgrade Strategy
  • Deploying an Application
  • Replacing a Deployed Application
  • Configuring Application Version Coexistence
After completing this module, students will be able to:
  • Plan and implement application upgrades and supersedence.
  • Plan and implement application concurrency.

Module 12: Monitoring Application Deployment, Use, and Performance
This module describes using application monitoring as an essential part of managing applications in an enterprise environment. It also covers planning software inventory and metering, and monitoring application resource use.
 
 
Lessons
  • Planning Application Monitoring
  • Planning Software Inventory and Metering
  • Monitoring Application Resource Utilization
Lab : Monitoring Application Deployment, Utilization, and Performance
  • Configuring Asset Intelligence
  • Configuring System Center 2012 Operations Manager SP1 for Monitoring a Server
After completing this module, you will be able to:
  • Describe how to plan application monitoring.
  • Describe how to plan software inventory and metering.
  • Describe how to monitor application resource use.

Order Now
Your Name    
Your Job Title    
Phone / Mobile    
Your Mail  
     
Courses