MOC20687 Configuring Windows 8.1

Overnet Education
A Segrate

1.600 
+IVA
Vuoi parlare del corso con un consulente?
Confronta questo corso con altri simili
Leggi tutto

Informazione importanti

  • Corso
  • Segrate
  • Durata:
    4 Giorni
Descrizione

A continuazione troverai il programma di questo corso disegnato per migliorare le tue competenze e permetterti di realizzare gli obiettivi stabiliti.
Nel corso della formazione si alterneranno differenti moduli che ti permetteranno di acquisire le conoscenze sulle tematiche proposte. Iscriviti per accedere alle seguenti materie.

Informazione importanti
Sedi

Dove e quando

Inizio Luogo
Consultare
Segrate
Via Cassanese, 224, Palazzo Mantegna, Scala A, 20090, Milano, Italia
Visualizza mappa

Cosa impari in questo corso?

Windows 8
Windows

Programma

Al termine del corso gli allievi saranno in grado di:
  • Descrivere le soluzioni e le caratteristiche relative alla gestione di Windows 8.1 in un ambiente di rete aziendale.
  • Determinare i requisiti ed eseguire le operazioni per l'installazione e la distribuzione di Windows 8.1.
  • Gestire profili e stato utente tra i dispositivi Windows.
  • Determinare gli strumenti di gestione più appropriati per configurare le impostazioni di Windows 8.1.
  • Configurare dischi, partizioni, volumi e driver di periferica in un sistema Windows 8.1.
  • Configurare la connettività di rete.
  • Configurare la connettività sia per i PC e dispositivi uniti al dominio che non di dominio.
  • Implementazione delle tecnologie di Windows 8.1 per garantire le connessioni di rete.
  • File di configurazione, cartelle, e accesso alla stampante.
  • Implementare strumenti e tecnologie che possono aiutare la sicurezza dei PC Windows 8.1 e dei dispositivi.
  • Configurare e controllare applicazioni desktop, applicazioni di Windows Store, e applicazioni virtuali.
  • Ottimizzare e mantenere PC di Windows 8.1 e dispositivi.
  • Configurare le impostazioni dei computer mobili e per consentire l'accesso remoto.
  • Determinare come fare il recover di Windows 8.1.
  • Descrivere e configurare client Hyper-V.
This module describes solutions and features related to managing Windows 8.1 in an enterprise network environment. Students will identify how to use Windows 8.1 features and related solutions to support intranet, Internet, and non-domain joined Windows 8.1 clients. They will also learn how to identify changes to the Windows 8.1 user interface and perform customizations of the desktop and Start screen This module describes how to identify hardware, software, and infrastructure readiness for installing and deploying Windows 8.1, and also describes the different options for installing Windows 8.1 on a computer. It also explains how students can customize a Windows 8.1 image file and deploy it using appropriate installation tools. This module also describes the methods students can use to manage volume activation in Windows 8.1. This module describes how to manage profiles and user state between Windows devices. Students will learn about managing user accounts and profiles in Windows 8.1, configuring User State Virtualization using Microsoft UE-V and Windows 8.1, and migrating user state and settings when migrating to Windows 8.1. This module explains how to determine the most appropriate management tools to configure Windows 8.1 settings. It describes tools used for local and remote management of Windows 8.1, and the use of Group Policy and Windows PowerShell in managing Windows 8.1 settings. This module explains how to configure, partitions, volumes, and device drivers in a Windows 8.1 system. It also explains how to manage virtual hard disks in the Windows 8.1 file system. This module explains how to configure network connectivity using IPv4 and IPv6. It also describes how to implement automatic IP address allocation and name resolution. This module explains how to configure resource connectivity for both domain-joined and non-domain joined devices. It also explains how to configure workplace join for non-domain joined computers, and configure work folders. This module explains how to secure network connections by implementing Windows 8.1 technologies. It explains how to configure Windows firewall, Windows SmartScreen, and Windows Defender. It also explains how to implement connection security rules to secure network traffic. This module explains how to manage secure file and folder access, create and manage shared folders, and configure file and folder compression. It also explains how to enable and configure SkyDrive access, and create and configure shared printers. This module explains how to implement tools and technologies that can help secure Windows 8.1 desktops. It describes methods used for authentication and authorization in Windows 8.1. It also describes how to use local Group Policy objects to configure security and other settings, and explains the use of file encryption methods and User Account Control. This module explains how to configure and control applications in Windows 8.1. It describes application deployment methods, and explains how to install and manage Windows Store apps. It also explains how to configure and secure Internet Explorer, and configure application restrictions with AppLocker. This module explains how to optimize and maintain Windows 8.1 based computers. It also explains how to manage reliability, and configure and manage software updates in Windows 8.1. This module explains how to configure Windows 8.1 settings that are applicable to mobile computing devices. It also describes DirectAccess, and how it can be used to provide remote access. This module also explains how to enable and configure VPN access, Remote Desktop, and Remote Assistance. This module explains how to recover Windows 8.1 from failures. It describes how to provide for file and folder recovery, and identify when and how to recover Windows 8.1, This module describes Hyper-V for Windows 8.1, and explains how to create and configure virtual machines in Hyper-V for Windows 8.1. It also explains the use of virtual hard disks, and the creation and implementation of virtual machine checkpoints.

Dotazione:
Ciascun partecipante avrà a disposizione una postazione allestita con i sistemi operativi ed il software necessario alle esercitazioni.


Confronta questo corso con altri simili
Leggi tutto