Windows Server 2012: Concevoir et mettre en oeuvre une infrastructure de client Microsoft (Course 20415)

Formation intra-entreprise

À qui s'adresse la formation?

The course is primarily intended for IT Professionals who manage the desktop environments for organizations, and want to specialize in Windows 8 desktop deployments. These IT professionals typically work in complex computing environments of large to enterprise-sized organizations. In addition. the secondary audience for this course includes IT professionals who want to take the 70-415: Implementing an Enterprise Desktop and Device Infrastructure exam as a stand-alone.

Durée

5,00 jour(s)

Langues(s) de prestation

FR

Prochaine session

Prérequis

Before attending this course, students must have:

  • Solid understanding of TCP/IP and networking concepts
  • Solid knowledge of Windows and Active Directory Domain Services (AD DS) for example, domain user accounts, domain vs. local user accounts, user profiles, and group membership
  • Good understanding of scripts and batch files
  • Solid understanding of security concepts such as authentication and authorization
  • Familiarity with the client administration capabilities of Windows Server

Objectifs

After completing this course, students will be able to:
  • Assess and determine desktop deployment options
  • Plan an image management strategy
  • Implement desktop security
  • Capture and manage a desktop operating system image
  • Plan and implement User State Migration
  • Plan and deploy desktops by using the Microsoft Deployment Toolkit
  • Plan and deploying desktops by using System Center 2012 Configuration Manager
  • Plan and implement a Remote Desktop Services infrastructure
  • Manage user state virtualization for enterprise desktops
  • Plan and implement an updates infrastructure to support enterprise desktops
  • Protect enterprise desktops from malware and data loss
  • Monitoring the performance and health of the desktop infrastructure

Contenu

Module 1: Assessing and Determining Desktop Deployment Options

This module describes the enterprise desktop lifecycle and explains how you can assess hardware and infrastructure readiness. The module then describes how to identify and select the most appropriate deployment option based upon organizational requirements.

After completing this module, students will be able to:

  • Describe the enterprise desktop life cycle
  • Explain how to assess hardware and infrastructure readiness for a desktop deployment
  • Describe how to use MAP to assess deployment readiness
  • Describe the available methods for deploying enterprise desktops
  • Describe volume activation technologies for enterprise desktops
Module 2: Planning An Image Management Strategy

This modules describes Windows image formats and helps you to define an efficient image management strategy based upon business requirements.

After completing this module, students will be able to:

  • Describe image formats used for Windows desktop deployments
  • Determine the type and content of images used in an image management strategy
Module 3: Implementing Desktop Security

This module describes how to deploy and manage a secure desktop by implementing centralized policies, BitLocker settings, and Encrypted File System (EFS) settings.

After completing this module, students will be able to:

  • Implement a centralized secure desktop solution by using Group Policy settings
  • Plan and implement device encryption by using BitLocker
  • Plan and implement a centrally managed EFS solution to secure files and folders on enterprise desktops
Module 4: Capturing and Managing a Desktop Operating System Image

This module describes how to use the Windows Assessment and Deployment Kit (ADK) and Windows Deployment Services (WDS) to create, capture, and manage a desktop operating system image.

After completing this module, students will be able to:

  • Identify the purpose and key features of the Windows ADK
  • Describe the Windows PE environment and how it can be customized to address specific image and deployment requirements
  • Describe the Windows Setup and preparation process and how it can be modified using answer files created with Windows SIM and the Sysprep utility
  • Use DISM to capture and service a reference image
  • Configure and manage Windows DS to help support an image capture and deployment solution
Module 5: Planning and Implementing User State Migration

This modules describes how to use the User State Migration Tool (USMT) to migrate appropriate user data and settings to a new desktop operating system.

After completing this module, students will be able to:

  • Describe user state migration
  • Plan user state migration
  • Migrate user state by using the USMT
Module 6: Planning and Deploying Desktops Using the Microsoft Deployment Toolkit

This module describes how to use the Microsoft Deployment Toolkit (MDT) 2012 to deploy Windows operating systems in lite touch installation scenarios.

After completing this module, students will be able to:

  • Plan for the LTI environment
  • Implement MDT 2012 for LTI
  • Integrate Windows Deployment Services (DS) with the MDT 2012
Module 7: Planning and Deploying Desktops by Using System Center 2012 Configuration Manager

After completing this module, students will be able to:

  • Plan the ZTI environment
  • Prepare the site for operating system deployment
  • Build a reference image by using a Configuration Manager task sequence
  • Deploy client images by using MDT task sequences
Module 8: Planning and Implementing a Remote Desktop Services Infrastructure

This module describes how to plan and implement session virtualization deployment and a virtual desktop infrastructure (VDI) based upon Windows Server 2012 Remote Desktop Services.

After completing this module, students will be able to:

  • Describe Remote Desktop Services
  • Plan the Remote Desktop Services environment
  • Configure a virtual machine based desktop deployment
  • Configure a session-based desktop deployment
  • Extend the Remote Desktop Services environment to the Internet
Module 9: Managing User State Virtualization For Enterprise Desktops

This module describes how to plan and configure user state virtualization to provide a consistent desktop client experience.

After completing this module, students will be able to:

  • Describe User State Virtualization
  • Plan User State Virtualization
  • Configure roaming profiles, Folder Redirection, and Offline Files
  • Implement UE-V
Module 10: Planning and Implementing an Updates Infrastructure to Support Enterprise Desktops

Students will be able to plan and implement an updates infrastructure to support both physical and virtual enterprise desktops.

After completing this module, students will be able to:

  • Describe considerations and methods for implementing an enterprise-based updates infrastructure
  • Describe how to use Microsoft System Center 2012 Configuration Manager to deploy and manage software updates
  • Describe how to manage software updates for virtual machines and images
  • Describe how to configure Windows Intune to deploy and manage software updates
Module 11: Protecting Enterprise Desktops from Malware and Data Loss

This module describes how to use System Center technologies such as Endpoint protection and Data Protection Manager (DPM) to protect enterprise desktops from malware and data loss.

After completing this module, students will be able to:

  • Describe System Center 2012 Endpoint Protection
  • Explain how to configure System Center 2012 Endpoint Protection client settings and monitoring status
  • Describe how to use Windows Intune Endpoint Protection
  • Describe how to protect desktops by using DPM
Module 12: Monitoring the Performance and Health of the Desktop Infrastructure

This module describes how to identify and monitor relevant services and components to ensure the health and performance of the enterprise desktop infrastructure.

After completing this module, students will be able to:

  • Monitor the health and performance of the desktop infrastructure
  • Monitor the VDI

Certificat, diplôme

Attestation de présence remis à l'issu du cours à chaque participant - Préparation de la certification MCSA (Microsoft Certified Solutions Associate)

Ces formations pourraient vous intéresser

FR
Journée
Informatique et systèmes d'information - Système de gestion de base de données - Logiciel SGBD bureautique - Logiciel Access