Digi Academy

Implementing a Desktop Infrastructure

Digi Academy
A Milano

Chiedi il prezzo
Chiedi informazioni a un consulente Emagister

Informazioni importanti

Tipologia Corso
Luogo Milano
Inizio Scegli data
  • Corso
  • Milano
  • Inizio:
    Scegli data
Descrizione

Overview of the Enterprise Desktop Life Cycle Assessing Hardware and Infrastructure Readiness for a Desktop Deployment Using MAP to Assess Deployment Readiness Overview of Enterprise Desktop Deployment Methods

Strutture (1)
Dove e quando
Inizio Luogo
Scegli data
Milano
Via Valtellina, 63, 20124, Milano, Italia
Visualizza mappa
Inizio Scegli data
Luogo
Milano
Via Valtellina, 63, 20124, Milano, Italia
Visualizza mappa

Cosa impari in questo corso?

Management
Windows

Programma

Volume Activation Technologies for Enterprise Desktops


Planning a Desktop Deployment Strategy


Collecting Infrastructure Data


Implementing a Volume Activation Solution


After completing this module, students will be able to:


Describe the enterprise desktop life cycle.


Explain how to assess hardware and infrastructure readiness for a desktop deployment.


Describe how to use MAP to assess deployment readiness.


Describe the available methods for deploying enterprise desktops.


Describe volume activation technologies for enterprise desktops.


This modules describes Windows image formats and helps you to define an efficient image management strategy based upon business requirements.


Overview of Windows Image Format


Overview of Image Management


Assessing Business Requirements to Support an Image Management Strategy


After completing this module, students will be able to:


Describe image formats used for Windows desktop deployments.


Determine the type and content of images used in an image management strategy.


This module describes how to deploy and manage a secure desktop by implementing centralized policies, BitLocker settings, and Encrypted File System (EFS) settings.


Implementing a Centralized Desktop Security Solution


Planning and Implementing BitLocker


Planning and Implementing EFS


Configuring Desktop Security by Using Group Policy


Configuring Drive Encryption by Using BitLocker and MBAM


Implementing a Centrally Managed EFS Solution


Verifying EFS Document Recovery


After completing this module, students will be able to:


Implement a centralized secure desktop solution by using Group Policy settings.


Plan and implement device encryption by using BitLocker.


Plan and implement a centrally managed EFS solution to secure files and folders on enterprise desktops.


This module describes how to use the Windows Assessment and Deployment Kit (ADK) and Windows Deployment Services (WDS) to create, capture, and manage a desktop operating system image.


Overview of Windows ADK


Managing Windows PE


Building a Reference Image by Using Windows SIM and Sysprep


Capturing and Servicing a Reference Image


Configuring and Managing Windows DS


Installing Windows ADK


Configuring a Custom Windows PE Environment


Building a Custom Answer File Using Windows SIM


Installing a Reference Computer by Using a Custom Answer File


Generalizing a Reference Computer by Using Sysprep


Capturing a Reference System Image


Servicing a Reference System Image


Planning the Windows Deployment Services Environment


Installing and Configuring the Windows Deployment Services Server Role


Capturing a Reference Image by Using Windows DS


Deploying an Image by Using Windows DS


After completing this module, students will be able to:


Identify the purpose and key features of the Windows ADK.


Describe the Windows PE environment and how it can be customized to address specific image and deployment requirements.


Describe the Windows Setup and preparation process and how it can be modified using answer files created with Windows SIM and the Sysprep utility.


Use DISM to capture and service a reference image.


Configure and manage Windows DS to help support an image capture and deployment solution.


This modules describes how to use the User State Migration Tool (USMT) to migrate appropriate user data and settings to a new desktop operating system.


Overview of User State Migration


Planning User State Migration by Using USMT


Migrating User State by Using USMT


Planning for User State Migration


Creating and Customizing the USMT XML Files


Capturing and Restoring User State by Using USMT


Performing a Hard-Link Migration by Using USMT


After completing this module, students will be able to:


Describe user state migration.


Plan user state migration.


Migrate user state by using the USMT.


This module describes how to use the Microsoft Deployment Toolkit (MDT) 2012 to deploy Windows operating systems in lite touch installation scenarios.


Planning for the LTI Environment


Implementing MDT 2012 for LTI


Integrating Windows DS with MDT


Planning for the MDT LTI Environment


Installing MDT 2012 and Prerequisites


Creating and Configuring the MDT 2012 Deployment Share


Deploying and Capturing a Reference Operating System Image


Integrating Windows DS with MDT 2012 To Provide PXE-Boot Capabilities


After completing this module, students will be able to:


Plan for the LTI environment.


Implement MDT 2012 for LTI.


Integrate Windows Deployment Services (DS) with the MDT 2012.


This describes how to use System Center 2012 Configuration Manager to implement a zero touch installation for deploying enterprise desktops.


Planning the ZTI Environment


Preparing the Site for Operating System Deployment


Building a Reference Image by Using a Configuration Manager Task Sequence


Deploying Client Images by Using MDT Task Sequences


Planning the Operating System Deployment Infrastructure


Preparing the ZTI Environment


Configuring the Deployment Packages and System Images


Performing a ZTI


After completing this module, students will be able to:


Plan the ZTI environment.


Prepare the site for operating system deployment.


Build a reference image by using a Configuration Manager task sequence.


Deploy client images by using MDT task sequences.


This module describes how to plan and implement session virtualization deployment and a virtual desktop infrastructure (VDI) based upon Windows Server 2012 Remote Desktop Services.


Overview of Remote Desktop Services


Planning the Remote Desktop Services Environment


Configuring a Virtual Machine–Based Desktop Infrastructure Deployment


Configuring a Session-Based Desktop Deployment


Extending the Remote Desktop Services Environment to the Internet


Planning the Remote Desktop Services Environment


Configuring a Virtual Machine-Based Desktop Infrastructure Scenario


Configuring a Session-Based Desktop Scenario


Configuring the RD Gateway Role Service


After completing this module, students will be able to:


Describe Remote Desktop Services.


Plan the Remote Desktop Services environment.


Configure a virtual machine–based desktop deployment.


Configure a session-based desktop deployment.


Extend the Remote Desktop Services environment to the Internet.


This module describes how to plan and configure user state virtualization to provide a consistent desktop client experience.


Overview of User State Virtualization


Planning User State Virtualization


Configuring Roaming Profiles, Folder Redirection, and Offline Files


Implementing UE-V


Planning User State Virtualization


Implementing User State Virtualization


After completing this module, students will be able to:


Describe User State Virtualization.


Plan User State Virtualization.


Configure roaming profiles, Folder Redirection, and Offline Files.


Implement UE-V.


Students will be able to plan and implement an updates infrastructure to support both physical and virtual enterprise desktops.


Planning an Updates Infrastructure for the Enterprise


Supporting Software Updates with System Center 2012 Configuration Manager


Managing Updates for Virtual Machines and Images


Using Windows Intune for Managing Software Updates


Planning an Updates Infrastructure


Preparing a System Center 2012 Configuration Manager Site to Support Software Updates


Determining Software Update Compliance


Deploying Software Updates to Clients


After completing this module, students will be able to:


Describe considerations and methods for implementing an enterprise-based updates infrastructure.


Describe how to use Microsoft System Center 2012 Configuration Manager to deploy and manage software updates.


Describe how to manage software updates for virtual machines and images.


Describe how to configure Windows Intune to deploy and manage software updates.


This module describes how to use System Center technologies such as Endpoint protection and Data Protection Manager (DPM) to protect enterprise desktops from malware and data loss.


Overview of System Center 2012 Endpoint Protection


Configuring System Center 2012 Endpoint Protection Client Settings and Monitoring Status


Using Windows Intune Endpoint Protection


Protecting Desktops by Using DPM


Configuring the Endpoint Protection Point


Configuring and Deploying Endpoint Protection Polices


Configuring Client Settings to Support Endpoint Protection


Monitoring Endpoint Protection


Configuring and Verifying Client Data Protection


After completing this module, students will be able to:


Describe System Center 2012 Endpoint Protection.


Explain how to configure System Center 2012 Endpoint Protection client settings and monitoring status.


Describe how to use Windows Intune Endpoint Protection.


Describe how to protect desktops by using DPM.


This module describes how to identify and monitor relevant services and components to ensure the health and performance of the enterprise desktop infrastructure.


Performance and Health Monitoring for the Desktop Infrastructure


Monitoring VDI


Configuring Performance and Reliability Monitoring of Desktops


Configuring Operations Manager for Monitoring Virtual Environments


After completing this module, students will be able to:


Monitor the health and performance of the desktop infrastructure.


Monitor the VDI.



Gli utenti che erano interessati a questo corso si sono informati anche su...
Leggi tutto