MCSE: Desktop Infrastructure Solutions Expert

May 21, 2015 | admin | No Comments | Microsoft, Ongoing Courses, Upcoming Courses

Exam Code: 70-415

Exam Code: 70-416

 

 

Implementing a Desktop Infrastructure (Exam Code: 70-415)

Implementing a Desktop Infrastructure

Exam Code:70-415

Price: 12000 BDT

Duration: 40 hours

Module 1: Assessing and Determining Desktop Deployment Options

This module describes the enterprise desktop life-cycle and explains how you can assess hardware and infrastructure readiness. The module then describes how to identify and select the most appropriate deployment option based upon organizational requirements.

Lessons

  • Overview of the Enterprise Desktop Life Cycle
  • Assessing Hardware and Infrastructure Readiness for a Desktop Deployment
  • Using MAP to Assess Deployment Readiness
  • Overview of Enterprise Desktop Deployment Methods
  • Volume Activation Technologies for Enterprise Desktops

Lab : Assessing and Determining Desktop Deployment Options

  • Planning a Desktop Deployment Strategy
  • Collecting Infrastructure Data
  • Implementing a Volume Activation Solution

After completing this module, students will be able to:

  • Describe the enterprise desktop life cycle.
  • Explain how to assess hardware and infrastructure readiness for a desktop deployment.
  • Describe how to use MAP to assess deployment readiness.
  • Describe the available methods for deploying enterprise desktops.
  • Describe volume activation technologies for enterprise desktops.

Module 2: Planning An Image Management Strategy

This modules describes Windows image formats and helps you to define an efficient image management strategy based upon business requirements.

Lessons

  • Overview of Windows Image Format
  • Overview of Image Management

Lab : Planning an Image Management Strategy

  • Assessing Business Requirements to Support an Image Management Strategy

After completing this module, students will be able to:

  • Describe image formats used for Windows desktop deployments.
  • Determine the type and content of images used in an image management strategy.

Module 3: Implementing Desktop Security

This module describes how to deploy and manage a secure desktop by implementing centralized policies, Bit Locker settings, and Encrypted File System (EFS) settings.

Lessons

  • Implementing a Centralized Desktop Security Solution
  • Planning and Implementing Bit Locker
  • Planning and Implementing EFS

Lab : Configuring Desktop Security

  • Configuring Desktop Security by Using Group Policy
  • Configuring Drive Encryption by Using Bit Locker and MBAM

Lab : Configuring File Encryption by Using EFS

  • Implementing a Centrally Managed EFS Solution
  • Verifying EFS Document Recovery

After completing this module, students will be able to:

  • Implement a centralized secure desktop solution by using Group Policy settings.
  • Plan and implement device encryption by using Bit Locker.
  • Plan and implement a centrally managed EFS solution to secure files and folders on enterprise desktops.

Module 4: Capturing and Managing a Desktop Operating System Image

This module describes how to use the Windows Assessment and Deployment Kit (ADK) and Windows Deployment Services (WDS) to create, capture, and manage a desktop operating system image.

Lessons

  • Overview of Windows ADK
  • ManagingWindows PE
  • Building a Reference Image by Using Windows SIM and Sysprep
  • Capturing and Servicing a Reference Image
  • Configuring and Managing WindowsDS

Lab : Preparing the Imaging and the Windows PE Environment

  • Installing Windows ADK
  • Configuring a Custom Windows PE Environment

Lab : Building a Reference Image by Using Windows SIM and Sysprep

  • Building a Custom Answer File Using Windows SIM
  • Installing a Reference Computer by Using a Custom Answer File
  • Generalizing a Reference Computer by Using Sysprep

Lab : Capturing and Servicing a Reference Image

  • Capturing a Reference System Image
  • Servicing a Reference System Image

Lab : Configuring and Managing Windows DS

  • Planning the Windows Deployment Services Environment
  • Installing and Configuring the Windows Deployment Services Server Role
  • Capturing a Reference Image by Using Windows DS
  • Deploying an Image by Using Windows DS

After completing this module, students will be able to:

  • Identify the purpose and key features of the Windows ADK.
  • Describe the Windows PE environment and how it can be customized to address specific image and deployment requirements.
  • Describe the Windows Setup and preparation process and how it can be modified using answer files created with Windows SIM and the Sysprep utility.
  • Use DISM to capture and service a reference image.
  • Configure and manage Windows DS to help support an image capture and deployment solution.

Module 5: Planning and Implementing User State Migration

This modules describes how to use the User State Migration Tool (USMT) to migrate appropriate user data and settings to a new desktop operating system.

Lessons

  • Overview of User State Migration
  • Planning User State Migration by Using USMT
  • Migrating User State by Using USMT

Lab : Planning and Implementing User State Migration

  • Planning for User State Migration
  • Creating and Customizing the USMT XML Files
  • Capturing and Restoring User State by Using USMT

Lab : Migrating User State by Using Hard-Link Migration

  • Performing a Hard-Link Migration by Using USMT

After completing this module, students will be able to:

  • Describe user state migration.
  • Plan user state migration.
  • Migrate user state by using the USMT.

Module 6: Planning and Deploying Desktops Using the Microsoft Deployment Toolkit

This module describes how to use the Microsoft Deployment Toolkit (MDT) 2012 to deploy Windows operating systems in lite touch installation scenarios.

Lessons

  • Planning for the LTI Environment
  • Implementing MDT 2012 for LTI
  • Integrating Windows DS with MDT

Lab : Planning and Deploying Desktops by Using MDT

  • Planning for the MDT LTI Environment
  • Installing MDT 2012 and Prerequisites
  • Creating and Configuring the MDT 2012 Deployment Share
  • Deploying and Capturing a Reference Operating System Image
  • Integrating Windows DS with MDT 2012 To Provide PXE-Boot Capabilities

After completing this module, students will be able to:

  • Plan for the LTI environment.
  • Implement MDT 2012 for LTI.
  • Integrate Windows Deployment Services (DS) with the MDT 2012.

Module 7: Planning and Deploying Desktops by Using System Center 2012 Configuration Manager

This describes how to use System Center 2012 Configuration Manager to implement a zero touch installation for deploying enterprise desktops.

Lessons

  • Planning the ZTI Environment
  • Preparing the Site for Operating System Deployment
  • Building a Reference Image by Using a Configuration Manager Task Sequence
  • Deploying Client Images by Using MDT Task Sequences

Lab : Preparing the Environment for Operating System Deployment

  • Planning the Operating System Deployment Infrastructure
  • Preparing the ZTI Environment
  • Configuring the Deployment Packages and System Images

Lab : Performing a Zero-Touch Installation by Using MDT and Configuration Manager

  • Performing a ZTI

After completing this module, students will be able to:

  • Plan the ZTI environment.
  • Prepare the site for operating system deployment.
  • Build a reference image by using a Configuration Manager task sequence.
  • Deploy client images by using MDT task sequences.

Module 8: Planning and Implementing a Remote Desktop Services Infrastructure

This module describes how to plan and implement session virtualization deployment and a virtual desktop infrastructure (VDI) based upon Windows Server 2012 Remote Desktop Services.

Lessons

  • Overview of Remote Desktop Services
  • Planning the Remote Desktop Services Environment
  • Configuring a Virtual Machine–Based Desktop Infrastructure Deployment
  • Configuring a Session-Based Desktop Deployment
  • Extending the Remote Desktop Services Environment to the Internet

Lab : Planning and Implementing a Remote Desktop Services Infrastructure

  • Planning the Remote Desktop Services Environment
  • Configuring a Virtual Machine-Based Desktop Infrastructure Scenario
  • Configuring a Session-Based Desktop Scenario
  • Configuring the RD Gateway Role Service

After completing this module, students will be able to:

  • Describe Remote Desktop Services.
  • Plan the Remote Desktop Services environment.
  • Configure a virtual machine–based desktop deployment.
  • Configure a session-based desktop deployment.
  • Extend the Remote Desktop Services environment to the Internet.

Module 9: Managing User State Virtualization For Enterprise Desktops

This module describes how to plan and configure user state virtualization to provide a consistent desktop client experience.

Lessons

  • Overview of User State Virtualization
  • Planning User State Virtualization
  • Configuring Roaming Profiles, Folder Redirection, and Offline Files
  • Implementing UE-V

Lab : Managing User State Virtualization for Enterprise Desktops

  • Planning User State Virtualization
  • Implementing User State Virtualization

After completing this module, students will be able to:

  • Describe User State Virtualization.
  • Plan User State Virtualization.
  • Configure roaming profiles, Folder Redirection, and Offline Files.
  • Implement UE-V.

Module 10: Planning and Implementing an Updates Infrastructure to Support Enterprise Desktops

Students will be able to plan and implement an updates infrastructure to support both physical and virtual enterprise desktops.

Lessons

  • Planning an Updates Infrastructure for the Enterprise
  • Supporting Software Updates with System Center 2012 Configuration Manager
  • Managing Updates for Virtual Machines and Images
  • Using Windows Intune for Managing Software Updates

Lab : Planning and Implementing an Updates Infrastructure to Support Enterprise Desktops

  • Planning an Updates Infrastructure
  • Preparing a System Center 2012 Configuration Manager Site to Support Software Updates
  • Determining Software Update Compliance
  • Deploying Software Updates to Clients

After completing this module, students will be able to:

  • Describe considerations and methods for implementing an enterprise-based updates infrastructure.
  • Describe how to use Microsoft System Center 2012 Configuration Manager to deploy and manage software updates.
  • Describe how to manage software updates for virtual machines and images.
  • Describe how to configure Windows Intune to deploy and manage software updates.

Module 11: Protecting Enterprise Desktops from Malware and Data Loss

This module describes how to use System Center technologies such as Endpoint protection and Data Protection Manager (DPM)to protect enterprise desktops from malware and data loss.

Lessons

  • Overview of System Center 2012 Endpoint Protection
  • Configuring System Center 2012 Endpoint Protection Client Settings and Monitoring Status
  • Using Windows Intune Endpoint Protection
  • Protecting Desktops by Using DPM

Lab : Implementing Client Endpoint Protection

  • Configuring the Endpoint Protection Point
  • Configuring and Deploying Endpoint Protection Polices
  • Configuring Client Settings to Support Endpoint Protection
  • Monitoring Endpoint Protection

Lab : Configuring Data Protection for Client Computer Data

  • Configuring and Verifying Client Data Protection

After completing this module, students will be able to:

  • Describe System Center 2012 Endpoint Protection.
  • Explain how to configure System Center 2012 Endpoint Protection client settings and monitoring status.
  • Describe how to use Windows Intune Endpoint Protection.
  • Describe how to protect desktops by using DPM.

Module 12: Monitoring the Performance and Health of the Desktop Infrastructure

This module describes how to identify and monitor relevant services and components to ensure the health and performance of the enterprise desktop infrastructure.

Lessons

  • Performance and Health Monitoring for the Desktop Infrastructure
  • Monitoring VDI

Lab : Monitoring the Performance and Health of the Desktop Infrastructure

  • Configuring Performance and Reliability Monitoring of Desktops
  • Configuring Operations Manager for Monitoring Virtual Environments

After completing this module, students will be able to:

  • Monitor the health and performance of the desktop infrastructure.
  • Monitor the VDI.
Implementing Desktop Application Environments (Exam Code: 70-416)

Implementing Desktop Application Environments

Exam Code:70-416

Price: 12000 BDT

Duration: 40 hours

Module 1: Designing an Application Distribution Strategy

This module discusses the high-level aspects of designing an application distribution strategy. The topics covered can help students identify the aspects in an environment that influence application distribution and identify the most common distribution methods used in the Windows environment.

Lessons

  • Developing an Application Lifecycle Strategy
  • Determining Business Requirements for Application Distribution
  • Overview of Application Distribution Strategies

Lab: Designing an Application Distribution Strategy

  • Choosing an Appropriate Application Deployment Strategy for the Product Catalog App

After completing this module, students will be able to:

  • Describe how to develop an application lifecycle strategy.
  • Describe the important factors to assess prior to application distribution design, including client configuration and deployment infrastructure.
  • Describe application distribution strategies.
  • Design an application distribution strategy.

Module 2: Diagnosing and Remediating Application Compatibility

This module describes the process for addressing common application compatibility issues experienced during a new operating system deployment. The module also explains how to use Microsoft Application Compatibility Toolkit (ACT) to help inventory, analyze, and mitigate application compatibility issues.

Lessons

  • Diagnosing Application Compatibility Issues
  • Evaluating and Implementing Remediation Solutions
  • Resolving Compatibility Issues by Using ACT

Lab: Diagnosing and Remediating Application Compatibility

  • Analyzing Applications for Potential Compatibility Issues
  • Mitigating Application Compatibility Issues

After completing this module, students will be able to:

  • Understand important considerations for diagnosing application compatibility issues.
  • Explain the solutions available for remediating application compatibility issues.
  • Resolve application compatibility issues with ACT.

Module 3: Deploying Software by Using Group Policy and Windows Intune

This module discusses using Group Policy and Windows Intune to deploy software as part of a software deployment strategy. It also covers sideloading, which is the specialized software deployment method specific to Windows Store apps.

Lessons

  • Deploying Software by Using Group Policy
  • Sideloading Windows Store Apps
  • Deploying Software by Using Windows Intune

Lab: Centralizing Software Deployment by Using Group Policy and Windows Intune

  • Deploying Software by Using Group Policy
  • Sideloading a Windows Store App
  • Performing Windows Intune Simulations

After completing this module, students will be able to:

  • Deploy software centrally by using Group Policy.
  • Install Windows Store apps by using sideloading.
  • Deploy software to clients by using Windows Intune.

Module 4: Deploying Applications by Using Microsoft System Center 2012 Configuration Manager SP1

This module describes how to use System Center 2012 Configuration Manager SP1 to manage the software deployment and management lifecycle, including deploying software, targeting a group of user or computers, validating the success of software deployment, and removing software from computers when that software is no longer required.

Lessons

  • Understanding Software Deployment by Using System Center 2012 Configuration Manager SP1
  • Deploying Software by Using System Center 2012 Configuration Manager SP1

Lab: Deploying Applications by Using System Center 2012 Configuration Manager SP1

  • Creating Queries by Using System Center 2012 Configuration Manager SP1
  • Creating User and Device Collections
  • Deploying Applications to Collections

After completing this module, students will be able to:

  • Understand methods of deploying software with Microsoft System Center 2012 Configuration Manager Service Pack 1 (SP1).v
  • Use System Center 2012 Configuration Manager SP1 to deploy software.

Module 5: Configuring Self-Service Application Deployment

This module describes planning, configuring and using self service application deployment. It describes configuring self service application deployment for Windows Intune clients and for Microsoft System Center 2012 Configuration Manager clients, in addition to using Microsoft System Center 2012 – Service Manager and Microsoft System Center 2012 – Orchestrator to improve the self service application deployment process.

Lessons

  • Understanding Self-Service Application Deployment
  • Configuring Self-Service with Windows Intune
  • Self-Service Deployment by Using System Center 2012 Configuration Manager SP1
  • Self-Service Deployment with Service Manager and Orchestrator

Lab: Configuring Self-Service Application Deployment

  • Planning Self-Service Application Deployment
  • Deploying Self-Service Software by Using the Configuration Manager Application Catalog
  • Using the Configuration Manager Application Catalog

After completing this module, students will be able to:

  • Plan self service application deployment.
  • Configure self service application deployment for Windows Intune clients.
  • Configure self service application deployment for Microsoft System Center 2012 Configuration Manager clients.
  • Use Microsoft System Center 2012 – Service Manager and Microsoft System Center 2012 – Orchestrator to improve the self service application deployment process.

Module 6: Designing and Implementing Presentation Virtualization Infrastructure

This module introduces you to presentation virtualization concepts and to the components that are used for presentation virtualization in computers running Windows so that you can plan the deployment of apps using presentation virtualization in your environment.

Lessons

  • Assessing Presentation Virtualization Requirements
  • Planning Presentation Virtualization Infrastructure
  • Deploying Presentation Virtualization Infrastructure
  • Extending the Presentation Virtualization Infrastructure

Lab: Deploying and Implementing Presentation Virtualization Infrastructure

  • Assessing Capacity Requirements for Presentation Virtualization
  • Configuring Presentation Virtualization Infrastructure
  • Configuring High Availability for Presentation Virtualization Infrastructure
  • Configuring Remote Access for Presentation Virtualization Infrastructure

After completing this module, students will be able to:

  • Describe how to assess presentation virtualization requirements.
  • Describe how to plan presentation virtualization infrastructure.
  • Describe how to deploy presentation virtualization infrastructure.
  • Describe how to extend presentation virtualization infrastructure.

Module 7: Preparing, Configuring, and Deploying Presentation Virtualization Applications

This module discusses presentation virtualization strategies and which strategy to use in a given situation. It also discusses how to deploy applications to Remote Desktop Session Host servers as traditional, RemoteApp, and Remote Desktop Web Access applications.

Lessons

  • Determining Presentation Virtualization Application Strategies
  • Planning and Deploying Remote Desktop, RemoteApp, and Remote Desktop Web Access

Lab: Configuring Applications for Presentation Virtualization

  • Configuring Access to RD Session Host Resources
  • Deploying RD Session Host Desktop Applications
  • Configuring and Deploying a RemoteApp Application
  • Verifying Applications by Using RD Web Access

After completing this module, students will be able to:

  • Determine an appropriate presentation virtualization application strategy.
  • Plan how to deploy applications and deploy them to Remote Desktop Session Host (RD Session Host) servers as traditional, RemoteApp, and Remote Desktop Web Access (RD Web Access) applications.

Module 8: Designing and Deploying an Application Virtualization Environment

This module discusses how to determine which application virtualization infrastructure model best suits an organization’s needs. Additionally, this module covers how to determine which Windows Server 2012 roles and features are needed to support the model you have selected, and which Group Policy settings should be configured.

Lessons

  • Overview of Application Virtualization Models
  • Deploying Application Virtualization Infrastructure Components
  • Configuring Application Virtualization Client Support

Lab: Planning and Deploying Application Virtualization Infrastructure

  • Planning the Deployment of App-V Roles and Features
  • Deploying App-V Infrastructure
  • Configuring App-V Client Settings

After completing this module, students will be able to:

  • Choose an appropriate application virtualization model to meet your business requirements.
  • Deploy components to support your chosen application virtualization model.
  • Deploy and configure the Microsoft Application Virtualization (App V) 5 client.

Module 9: Preparing, Sequencing, and Deploying Virtual Applications

This module describes sequencing applications by using the Microsoft Application Virtualization (App-V) Sequencer. It also describes how to stream sequenced applications and how to locally install sequenced applications.

Lessons

  • Sequencing Applications with App-V
  • Deploying App-V Applications

Lab: Preparing, Sequencing, and Deploying Virtual Applications

  • Installing and Configuring the App-V Sequencer
  • Sequencing Applications
  • Preparing App-V Applications by Using System Center 2012 Configuration Manager SP1
  • Deploying Sequenced Applications

After completing this module, students will be able to:

  • Install the App V 5.0 Sequencer and sequence applications.
  • Deploy sequenced applications.

Module 10: Planning and Implementing Application Updates and Security

This module discusses how to configure the appropriate infrastructure to streamline the deployment of software updates to applications. It also covers how to plan and configure application security.

Lessons

  • Planning Application Updates
  • Deploying Updates by Using WSUS
  • Deploying Application Updates by Using System Center 2012 Configuration Manager SP1
  • Implementing Application Security

Lab: Preparing and Deploying Application Updates

  • Preparing a System Center 2012 Configuration Manager SP1 Site to Support Software Updates
  • Updating Deployed Applications by Using System Center 2012 Configuration Manager SP1
  • Resequencing an App-V Application
  • Deploying AppLocker Policy

After completing this module, students will be able to:

  • Plan application updates.
  • Deploy application updates by using Microsoft Windows Server Update Services (WSUS).
  • Deploy application updates by using Microsoft System Center 2012 Configuration Manager with Service Pack 1 (SP1).
  • Implement application security.

Module 11: Planning and Implementing Application Upgrades

This module covers planning and implementing application upgrades and supersedence, including how to deploy multiple versions of an application, how to uninstall applications, how to retire applications, and how to manage user settings. It also covers planning application concurrency and implementing it by using App-V, Client Hyper-V, RemoteApp, VDI, and Remote Desktop Services.

Lessons

  • Overview of Application Upgrades
  • Overview of Application Concurrency

Lab: Upgrading Applications

  • Planning an Application Upgrade Strategy
  • Deploying an Application
  • Replacing a Deployed Application
  • Configuring Application Version Coexistence

After completing this module, students will be able to:

  • Plan and implement application upgrades and supersedence.
  • Plan and implement application concurrency.

Module 12: Monitoring Application Deployment, Use, and Performance

This module describes using application monitoring as an essential part of managing applications in an enterprise environment. It also covers planning software inventory and metering, and monitoring application resource use.

Lessons

  • Planning Application Monitoring
  • Planning Software Inventory and Metering
  • Monitoring Application Resource Utilization

Lab: Monitoring Application Deployment, Utilization, and Performance

  • Configuring Asset Intelligence
  • Configuring System Center 2012 Operations Manager SP1 for Monitoring a Server

After completing this module, you will be able to:

  • Describe how to plan application monitoring.
  • Describe how to plan software inventory and metering.
  • Describe how to monitor application resource use.

Leave a Reply

Your email address will not be published. Required fields are marked *