Loading...
Login / Register

Course 20416B: Implementing Desktop Application Environments

As employees bring more personal devices into the workplace, IT departments are challenged with how to enable the work styles of today while keeping services secure and available from virtually anywhere. Prove you can en... Show More
Course Prerequisites:
MCSA Windows Server 2012 or MCSA Windows 8
Request a Quote

Instructor-Led Training (ILT)

Attend training in a classroom environment at a campus near you. Instructor-led training is still the number one delivery method of choice because it allows you to interact and discuss the training material, either individually or in a group setting, and you gain access to expert knowledge from certified instructors. This form of guided learning is impactful and produces positive learning outcomes. Day, evening and Saturday classes are offered.

Exam
Included

Duration
5 Days

Course Content

Course 20415:

MCSE: 70-415 Implementing a Desktop Infrastructure
5 Days

Module 1: Assessing and Determining Desktop Deployment Options
This module describes the enterprise desktop lifecycle and explains how you can assess hardware and
infrastructure readiness. The module then describes how to identify and select the most appropriate deployment option based upon organizational requirements.

Lessons
Overview of the Enterprise Desktop Life Cycle
Assessing Hardware and Infrastructure Readiness for a Desktop Deployment
Overview of Enterprise Desktop Deployment Methods
Volume Activation Technologies for Enterprise Desktops

Lab : Assessing and Determining Desktop Deployment Options
Planning a Desktop Deployment Strategy
Collecting Infrastructure Data
Implementing a Volume Activation Solution

Module 2: Planning An Image Management Strategy
This modules describes Windows image formats and helps you to define an efficient image management strategy based upon business requirements.

Lessons
Overview of Windows Image Formats
Overview of Image Management

Lab : Planning an Image Management Strategy
Assessing Business Requirements to Support an Image Management Strategy

Module 3: Implementing Desktop Security
This module describes how to deploy and manage a secure desktop by implementing centralized policies, BitLocker settings, and Encrypted File System (EFS) settings.

Lessons
Implementing a Centralized Desktop Security Solution
Planning and Implementing BitLocker
Planning and Implementing Encrypted File System

Lab : Configuring Desktop Security
Configuring Desktop Security using Group Policy
Configuring Drive Encryption Using BitLocker

Lab : Configuring File Encryption Using EFS
Implementing a Centrally Managed EFS Solution
Implementing an EFS Recovery Solution

Module 4: Capturing and Managing a Desktop Operating System Image
This module describes how to use the Windows Assessment and Deployment Kit (ADK) and Windows Deployment Services (WDS) to create, capture, and manage a desktop operating system image.

Lessons
Overview of Windows ADK
Managing the Windows Preinstallation Environment
Building a Reference Image Using Windows SIM and Sysprep
Capturing and Servicing a Reference Image
Configuring and Managing Windows Deployment Services

Lab : Preparing the Imaging and Preinstallation Environment
Installing Windows ADK
Configuring a Custom Windows PE Environment

Lab : Building a Reference Image Using Windows SIM and Sysprep
Building a Custom Answer File
Using Windows SIM
Installing a Reference Computer Using a Custom Answer File
Generalizing a Reference Computer Using Sysprep

Lab : Capturing and Servicing a Reference Image
Capturing a Reference System Image
Servicing a Reference System Image

Lab : Configuring and Managing Windows Deployment Services
Planning the Windows Deployment Services Environment
Installing and Configuring the Windows Deployment Services Server Role
Capturing a Reference Image Using WDS
Deploying an Image Using WDS

Module 5: Planning and Implementing User State Migration
This modules describes how to use the User State Migration Tool (USMT) to migrate appropriate user data and
settings to a new desktop operating system.

Lessons
Overview of User State Migration
Planning User State Migration by Using USMT
Migrating User State by Using USMT

Lab : Planning and Implementing User State Migration
Planning for User State Migration
Creating and Customizing the USMT XML Files
Capturing and Restoring User State by Using USMT

Lab : Migrating User State Using Hard-Link Migration
Performing a Hard-Link Migration

Module 6: Planning and Deploying Desktops Using the Microsoft Deployment Toolkit
This module describes how to use the Microsoft Deployment Toolkit (MDT) 2012 to deploy Windows operating systems in lite touch installation scenarios.

Lessons
Planning for the Lite Touch Installation Environment
Implementing MDT 2012 for Lite Touch Installation
Integrating Windows Deployment Services with MDT

Lab : Planning and Deploying Desktops Using the Microsoft Deployment Toolkit
Planning for the MDT Lite Touch Installation Environment
Installing MDT 2012 and the Prerequisite Components
Creating and Configuring the MDT 2012 Deployment Share
Deploying and Capturing a Reference Operating System Image
Integrating WDS with MDT 2012 To Provide PXE Boot Capabilities

Module 7: Planning and Deploying Desktops by Using System Center 2012 Configuration Manager
This describes how to use System Center 2012 Configuration Manager to implement a zero touch installation for deploying enterprise desktops.

Lessons
Planning the Zero Touch Installation Environment
Preparing the Site for Operating System Deployment
Building a Reference Image Using a Configuration Manager Task Sequence
Using MDT Task Sequences to Deploy Client Images

Lab : Preparing the Environment for Operating System Deployment
Planning the Operating System Deployment Infrastructure
Preparing the Zero Touch Installation Environment
Configuring the Deployment Packages and System Images

Lab : Using MDT and Configuration Manager to Perform a Zero-Touch Installation
Performing a Zero Touch Installation

Module 8: Planning and Implementing a Remote Desktop Services Infrastructure
This module describes how to plan and implement session virtualization deployment and a virtual desktop
infrastructure (VDI) based upon Windows Server 2012 Remote Desktop Services.

Lessons
Overview of Remote Desktop Services
Planning the Remote Desktop Services Environment
Configuring a Virtual Desktop Infrastructure Deployment
Configuring a Session-Based Desktop Deployment
Extending the Remote Desktop Services Environment to the Internet

Lab : Planning and Implementing a Remote Desktop Services Infrastructure
Planning the Remote Desktop Services Environment
Configuring a Virtual Desktop Infrastructure Scenario
Configuring a Session-Based Desktop Scenario

Lab : Extending Internet Access to the RDS Infrastructure
Planning the RD Gateway Policies
Configuring the RD Gateway

Module 9: Managing User State Virtualization For Enterprise Desktops
This module describes how to plan and configure user state virtualization to provide a consistent desktop client experience.

Lessons
Overview of User State Virtualization
Planning User State Virtualization
Configuring Roaming Profiles, Folder Redirection, and Offline Files
Implementing Microsoft User Experience Virtualization

Lab : Deploying and Managing User State Virtualization
Planning User State Virtualization
Implementing User State Virtualization

Module 10: Planning and Implementing an Updates Infrastructure to Support Enterprise Desktops
Students will be able to plan and implement an updates infrastructure to support both physical and virtual
enterprise desktops.

Lessons
Planning an Updates Infrastructure for the Enterprise
Implementing Configuration Manager 2012 to Support Software Updates
Managing Updates for Virtual Machines and Images
Using Windows Intune for Managing Software Updates

Lab : Planning and Implementing an Updates Infrastructure
Planning an Updates Infrastructure
Implementing Software Updates Using Configuration Manager 2012
Implementing Software Updates for Virtual Machine Libraries

Module 11: Protecting Enterprise Desktops from Malware and Data Loss
This module describes how to use System Center technologies such as Endpoint protection and Data Protection Manager (DPM) to protect enterprise desktops from malware and data loss.

Lessons
Overview of System Center 2012 Endpoint Protection
Configuring Endpoint Protection Client Settings and Monitoring Status
Using Windows Intune Endpoint Protection
Protecting Desktops by Using System Center 2012 Data Protection Manager

Lab : Implementing Client Endpoint Protection
Configuring the Endpoint Protection Point
Configuring and Deploying Endpoint Protection Polices
Configuring Client Settings to Support Endpoint Protection
Monitoring Endpoint Protection

Lab : Configuring Data Protection for Client Computer Data
Configuring and Verifying Client Data Protection

Module 12: Monitoring the Performance and Health of the Desktop Infrastructure
This module describes how to identify and monitor relevant services and components to ensure the health and
performance of the enterprise desktop infrastructure.

Lessons
Performance and Health Monitoring for the Desktop Infrastructure
Monitoring the Virtual Desktop Infrastructure

Lab : Monitoring the Performance and Health of the Desktop Infrastructure
Configuring Performance and Reliability Monitoring for Desktops
Configuring Operations Manager for Monitoring Virtual Environments

CTU Training Solutions , Updated: September 11th, 2017

Share with friends

Request a Quote



Your Name

Your Surname

Contact Number

Your Email

Company

Which campus would you like to study at?

Your job title

Will your training be sponsored?

Message

The course information above is subject to change without notification due to market trends in the industry, legislation and/or programme version updates. Terms and Conditions

Join the CTU community

Join the CTU Community Portal and gain access to superior resources.

Join for Free

Thank you for printing this page.
Logo
0861 100 395
[email protected]
www.ctutraining.ac.za

X

Call me Back

Leave your details and we'll contact you back!

Your Name:

Your Email:


Contact Number:

Choose a campus