Login / Register

MCSA: Windows 8

Candidates for this exam are IT professionals who configure or support Windows 8 computers, devices, users and associated network and security resources. The networks with which these professionals typically work are con... Show More
Course Prerequisites:
CompTIA A+ or Technical Experience Required
Request a Quote

Virtual Instructor-Led Training (V-ILT)

Virtual instruction environments are designed to simulate the traditional classroom or learning experience. Instructor-led training is still the number one delivery method of choice because it allows you to interact and discuss the training material, either individually or in a group setting, and you gain access to expert knowledge from certified instructors. This form of guided learning is impactful and produces positive learning outcomes. Day, evening and Saturday classes are offered.

10 Days

Course Schedule

Upcoming dates for MCSA: Windows 8

Course Content

Course 20687B:

Exam: 70-687 MCSA: Windows 8 Configuring
5 Days

Module 1: Installing and Deploying Windows 8
This module will introduce the student to some new features of Windows 8, provide guidance on installing Windows 8, and introduce them to the Windows 8 licensing environment.

Introducing Windows 8
Preparing to Install Windows 8
Installing Windows 8
Automating the Installation of Windows 8
Activating Windows 8

Lab : Installing Windows 8
Planning to Install Windows 8
Performing a Clean Installation of Windows 8

Lab : Performing an Unattended Installation of Windows 8
Creating and Configuring an Answer File
Using an Answer File to Install Windows 8

Module 2: Upgrading and Migrating to Windows 8
This module examines the upgrade process, identifies different methods for upgrading and migrating, and introduces you to the tools and processes used to perform an upgrade or migration.

Upgrading to Windows 8
Migrating to Windows 8
Migrating User Data and Settings

Lab : Migrating to Windows 8
Backing Up Important User Data and Settings
Restoring User Data and Settings to a Target Computer
Verifying Successful Migration of User Data and Settings

Module 3: Managing Disks and Device Drivers
This module explains how to manage disk, including simple, spanned, or striped volumes. It also explains how to optimize file-system performance, and how to use disk quotas to manage available disk space on installed volumes.

Managing Disks, Partitions, and Volumes
Maintaining Disks, Partitions, and Volumes
Working with Virtual Hard Disks
Installing and Configuring Device Drivers

Lab : Managing Disks
Creating Volumes
Configuring Quotas
Working with VHDs

Lab : Configuring Device Drivers
Installing Device Drivers
Managing Device Drivers

Module 4: Configuring and Troubleshooting Network Connections
This module explains how to configure and troubleshoot Windows 8 networking features including both TCP/IP version 4 and TCP/IP version 6.

Configuring IPv4 Network Connectivity
Configuring IPv6 Network Connectivity
Implementing Automatic IP
Address Allocation
Implementing Name Resolution
Troubleshooting Network Connectivity

Lab : Configuring Network Connection
Enabling Automatic IPv4 Configuration
Configuring IPv4 Manually

Lab : Troubleshooting Network Connectivity
Creating a Simulated
Network Connectivity Problem
Resolving a Network Connectivity Problem

Module 5: Implementing Wireless Network Connections
This module describe the wireless network technologies available, the procedures for configuring wireless network components, and the Windows 8 elements that are necessary to access wireless networks.

Overview of Wireless Networks
Implementing a Wireless Network

Lab : Planning the Implementation of Wireless Network Connections
Planning a Wireless Network
Determining the Cause of
Wireless Network Problems

Module 6: Implementing Network Security
This module explains how to formulate a strategy to protect your computers by using User policies, anti-virus software, encrypted network traffic, and other protective measures. It also explains how to optimize the appropriate Windows network security features, such as Windows Firewall and Windows Defender.

Overview of Threats to Network Security
Configuring Windows Firewall
Securing Network Traffic
Configuring Windows Defender

Lab : Configuring Inbound and Outbound Firewall Rules
Creating an Inbound Firewall Rule
Creating An Outbound Firewall Rule

Lab : Configuring Connection Security Rules
Creating and Configuring IPsec Rules

Lab : Configuring Host-Based Virus and Malware Protection
Configuring Windows Defender

Module 7: Configuring File Access and Printers on Windows 8 Clients
This module provides the information and tools you need to manage access to shared folders and printers. Specifically, the module describes how to share and protect folders, configure folder compression, and how to install, configure, and manage printers. Additionally, this module introduces the SkyDrive functionality, and describes how to set up NTFS folder permissions.

Managing File Access
Managing Shared Folders
Configuring File Compression
Managing Printers
Overview of SkyDrive

Lab : Configuring File Access
Creating a Shared Folder for All Users
Creating a Shared folder for the Marketing Group

Lab : Configuring Printers
Creating and Sharing a Local Printer

Module 8: Securing Windows 8 Desktops
This module explains the features of Windows 8 that help you maintain a secure computer desktop environment.

Authentication and Authorization in Windows 8
Implementing GPOs
Securing Data with EFS and BitLocker
Configuring User Account Control

Lab : Implementing Local GPOs
Creating Multiple Local GPOs
Testing the Application of the Local GPOs

Lab : Securing Data
Protecting Files with BitLocker

Lab : Configuring and Testing UAC
Modifying UAC Prompts

Module 9: Configuring Applications
This module explains how to install and configure applications, which include both desktop apps and Windows Store apps.

Install and Configure Applications
Managing Apps from the Windows Store
Configuring Internet Explorer Settings
Configuring Application Restrictions in the Enterprise

Lab : Configuring Internet Explorer Security
Configuring Windows Internet Explorer

Lab : Configuring AppLocker
Configuring AppLocker Rules
Testing the AppLocker Rules

Module 10: Optimizing and Maintaining Windows 8 Client Computers
This module explains the tools that you can use to determine the source of performance and reliability issues. It also describes the steps to take to improve system performance and reliability.

Optimizing the Performance of Windows 8
Managing the Reliability of Windows 8
Managing Windows 8 Updates

Lab : Optimizing Windows 8 Performance
Creating a Performance Baseline
Introducing Additional Workload
Measuring System
Responsiveness Under Load

Lab : Maintaining Windows Updates
Configuring Windows Update

Module 11: Configuring Mobile Computing and Remote Access
This module explains how to identify and configure appropriate mobile computer access, specifically DirectAccess and VPN. Additionally, this module describes various power options, and device synchronization capabilities that students can configure.

Configuring Mobile Computers and Device Settings
Configuring VPN Access
Configuring Remote Desktop and
Remote Assistance
Overview of DirectAccess

Lab : Configuring a Power Plan
Creating and Configuring a New Power Plan

Lab : Implementing a VPN Connection
Creating and Testing a VPN Connection

Lab : Implementing Remote Desktop
Configuring a Remote Desktop Connection

Module 12: Implementing Hyper-V
This module introduces the student to Client Hyper-V in Windows 8, and explains the fundamentals of working with virtual machines in the Client Hyper-V environment.

Overview of Hyper-V
Creating Virtual Machines
Managing Virtual Hard Disks
Managing Snapshots

Lab : Implementing Hyper-V
Installing Client Hyper-V
Creating a Virtual Network and Virtual Machine

Module 13: Troubleshooting and Recovering Windows 8
This module explains how to use the included tools to maintain a backup of important data files and additional tools that can help you to recover a computer that will not start, or starts with errors.

Backing Up and Restoring Files in Windows 8
Recovery Options in Windows 8

Lab : Recovering Windows 8
Exploring Windows 8 Recovery Options
Introducing a Simulated Problem
Resolving the Problem

Module 14: Using Windows PowerShell
This module explains how to use Windows PowerShell, its graphical user interface (GUI), and scripting editor to write scripts that automate repetitive tasks, and thereby increase consistency and productivity.

Introduction to Windows PowerShell 3.0
Windows PowerShell Remoting
Using Windows PowerShell Cmdlets

Course 20688B:

MCSA 70-688: Windows 8 Managing and Maintaining Windows 8
5 Days

Module 1: Planning and Implementing Management of Windows 8
This module explains how to plan, select, and implement appropriate methods for managing Windows 8 with graphical tools, policy, and Windows PowerShell

Performing Local and Remote Management of Windows 8
Using Windows PowerShell for Remote Management
Using Group Policy for Management
Additional Tools for Managing Windows 8

Lab : Planning and Implementing Management of Windows 8
Planning the Management of Windows 8
Implementing Remote Management
Implementing Windows PowerShell Remoting

Module 2: Designing and Implementing an Installation Strategy
This module explains how to plan and manage Windows deployments, migrations, and operating system virtualization methods.

Determining a Deployment Strategy for Windows 8
Implementing a Migration Strategy for Windows 8
Planning and Implementing Additional Windows 8 Deployment Methods
Planning for Operating System Virtualization

Lab : Designing and Implementing an Installation Strategy
Design an Installation Strategy for Windows 8
Migrating User State and Data
Creating an Unattended Answer File
Performing Offline Modification of a Windows Image File
Configuring Boot to VHD

Module 3: Planning and Implementing Authentication for Windows 8
This module explains how to plan and implement user authentication and domain-based security for Windows 8.

Planning User Authentication
Planning Domain-Based Security

Lab : Planning and Implementing Authentication for Windows 8
Planning Authentication
Sign in by Using Picture Password
Implementing Authentication with a Microsoft Account
Troubleshooting Domain Authentication

Module 4: Planning and Implementing IP Addressing and Intranet Connectivity
This module explains how to plan and manage IPv4 and IPv6 addressing and wired and wireless networking for Windows 8 clients.

Planning IPv4 Addressing
Planning IPv6 Addressing
Overview of Wired Network Connectivity
Planning Wireless Network Connectivity
Securing Network Connectivity with Windows Firewall

Lab : Planning and Implementing IP Addressing and Intranet Connectivity
Planning Intranet Connectivity
Configuring a DHCP Reservation
Enhancing Security with IPsec
Troubleshooting Network Connectivity

Module 5: Implementing an Application Strategy for Windows 8
This module explains how to manage application installers, deploy applications, planning application compatibility, and manage Windows Store Apps.

Managing Different Types of Application Installers
Designing Application Deployment
Planning an Application Compatibility Strategy
Managing Windows Store Apps

Lab : Implementing an Application Strategy for Windows 8
Planning an Application Strategy
Sideloading a Windows Store App
Mitigating Application
Compatibility Issues

Module 6: Planning and Implementing a Solution for User Settings
This module explains how to manage user profiles and how to synchronize settings between devices using the Microsoft User Experience Virtualization (UE-V) tool.

Managing User Profiles
Overview of UE-V
Deploying and Using UE-V

Lab : Planning and Implementing a Solution for User Settings
Plan a solution for user settings
Implementing Primary Computers
Implementing and Using UE-V

Module 7: Planning for and Configuring Cloud Services
This module explains how to plan and configure cloud services including Microsoft SkyDrive, Windows Store, and Office 365.

Overview of Cloud Services
Overview of Office 365

Lab : Configuring Cloud Services
Planning for Cloud Services
Using SkyDrive in Windows 8

Module 8: Planning and Implementing Windows Intune
This module explains how to plan and deploy Windows Intune and administer Windows clients with Windows Intune.

Planning for Windows Intune
Deploying Windows Intune Clients
Basic Windows Intune Administration

Lab : Planning and Implementing Windows Intune
Deploying Windows Intune Clients and Linking Computers to Users
Verifying Active Directory Synchronization and Creating Windows Intune Users
Delegating Windows Intune Permissions
Bulk Adding Users and Creating Windows Intune Groups Manually

Module 9: Managing Computers by Using Windows Intune
This module explains how to manage Windows Intune policies and deploy software and updates with Windows Intune.

Working with Windows Intune Policies and Updates
Deploying Software with Windows Intune

Lab : Managing Computers by Using Windows Intune
Working with Windows Intune Policies
Working with Updates
Deploying Software by Using Windows Intune

Module 10: Planning and Implementing Access to File and Print Services
This module explains how to plan and manage local storage, access to file shares, file caching, and access to file and print services.

Managing Local Storage
Planning Access to File Shares
Planning File Caching
Planning, Installing, and Configuring Printing

Lab : Planning and Implementing Access to File and Print Resources
Planning Access to File and Print Resources
Implementing File and Print Access in a Domain
Implementing Offline Files

Module 11: Planning and Implementing Encryption for Windows 8
This module explains how to plan and implement encryption with BitLocker and EFS.

Planning and Implementing BitLocker
Planning EFS

Lab : Planning and Implementing Encryption for Windows 8
Planning Encryption for Windows 8
Recovering a BitLocker Encrypted Drive

Module 12: Planning and Implementing Endpoint Security
This module explains how to plan and manage software updates, virus and malware protection, and application access.

Planning an Update Strategy
Implementing Virus and Malware Protection
Implementing AppLocker

Lab : Designing and Implementing Endpoint Security for Windows 8
Planning Endpoint Security
Implementing Centralized Configuration for Windows Updates
Implementing Windows
Intune Endpoint Protection
Restricting Applications by Using AppLocker

Module 13: Planning and Implementing Extranet Connectivity
This module explains how to configure Virtual Private Networking for Windows 8, plan DirectAccess connectivity, and manage mobile devices.

Configuring Virtual Private Networks for Windows 8
Planning DirectAccess for Windows 8
Managing Mobile Devices

Lab : Planning and Implementing Extranet Connectivity
Planning Extranet Connectivity
Configuring and Remote Access Server
Implementing DirectAccess

Module 14: Planning and Implementing a Recovery Solution
This module explains how to manage the Windows 8 boot process, repair stability issues, and plan user data recovery.

Overview of the Windows 8 Boot Process
Repairing Stability Issues in Windows 8
Planning User Data Recovery for Windows 8

Lab : Planning and Implementing a Recovery Solution
Planning a Recovery Solution
Modifying the BCD Store
Using System Restore
Implementing File History

CTU Training Solutions , Updated: July 6th, 2017

Share with friends

Request a Quote

    Your Name
    Your Surname
    Contact Number
    Your Email
    Which campus would you like to study at?
    Your job title
    Will your training be sponsored?
    How did you hear about CTU?
    The course information above is subject to change without notification due to market trends in the industry, legislation and/or programme version updates. Terms and Conditions

    Join the CTU community

    Join the CTU Community Portal and gain access to superior resources.

    Join for Free