20415-Implementing a Desktop Infrastructure
Date of Class:
Last Day To Enroll:
- Course Delivery: Virtual Classroom
- Language: English
After completing this course, students will be able to:
- Assess and determine desktop deployment options.
- Plan an image management strategy.
- Implement desktop security.
- Capture and manage a desktop operating system image.
- Plan and implement User State Migration.
- Plan and deploy desktops by using the Microsoft Deployment Toolkit.
- Plan and deploying desktops by using System Center 2012 Configuration Manager.
- Plan and implement a Remote Desktop Services infrastructure.
- Manage user state virtualization for enterprise desktops.
- Plan and implement an updates infrastructure to support enterprise desktops.
- Protect enterprise desktops from malware and data loss.
- Monitoring the performance and health of the desktop infrastructure.
Module 1: Assessing and Determining Desktop Deployment Options
This module describes the enterprise desktop lifecycle and explains how you can assess hardware and infrastructure readiness. The module then describes how to identify and select the most appropriate deployment option based upon organizational requirements.
- Overview of the Enterprise Desktop Life Cycle
- Assessing Hardware and Infrastructure Readiness for a Desktop Deployment
- Overview of Enterprise Desktop Deployment Methods
- Volume Activation Technologies for Enterprise Desktops
- Lab : Assessing and Determining Desktop Deployment Options
- Planning a Desktop Deployment Strategy
- Collecting Infrastructure Data
- Implementing a Volume Activation Solution
This modules describes Windows image formats and helps you to define an efficient image management strategy based upon business requirements.
- Overview of Windows Image Formats
- Overview of Image Management
- Lab : Planning an Image Management Strategy
- Assessing Business Requirements to Support an Image Management Strategy
This module describes how to deploy and manage a secure desktop by implementing centralized policies, BitLocker settings, and Encrypted File System (EFS) settings.
- Implementing a Centralized Desktop Security Solution
- Planning and Implementing BitLocker
- Planning and Implementing Encrypted File System
- Lab : Configuring Desktop Security
- Configuring Desktop Security using Group Policy
- Configuring Drive Encryption Using BitLocker
- Lab : Configuring File Encryption Using EFS
- Implementing a Centrally Managed EFS Solution
- Implementing an EFS Recovery Solution
This module describes how to use the Windows Assessment and Deployment Kit (ADK) and Windows Deployment Services (WDS) to create, capture, and manage a desktop operating system image.
- Overview of Windows ADK
- Managing the Windows Preinstallation Environment
- Building a Reference Image Using Windows SIM and Sysprep
- Capturing and Servicing a Reference Image
- Configuring and Managing Windows Deployment Services
- Lab : Preparing the Imaging and Preinstallation Environment
- Installing Windows ADK
- Configuring a Custom Windows PE Environment
- Lab : Building a Reference Image Using Windows SIM and Sysprep
- Building a Custom Answer File Using Windows SIM
- Installing a Reference Computer Using a Custom Answer File
- Generalizing a Reference Computer Using Sysprep
- Lab : Capturing and Servicing a Reference Image
- Capturing a Reference System Image
- Servicing a Reference System Image
- Lab : Configuring and Managing Windows Deployment Services
- Planning the Windows Deployment Services Environment
- Installing and Configuring the Windows Deployment Services Server Role
- Capturing a Reference Image Using WDS
- Deploying an Image Using WDS
This modules describes how to use the User State Migration Tool (USMT) to migrate appropriate user data and settings to a new desktop operating system.
- Overview of User State Migration
- Planning User State Migration by Using USMT
- Migrating User State by Using USMT
- Lab : Planning and Implementing User State Migration
- Planning for User State Migration
- Creating and Customizing the USMT XML Files
- Capturing and Restoring User State by Using USMT
- Lab : Migrating User State Using Hard-Link Migration
- Performing a Hard-Link Migration
This module describes how to use the Microsoft Deployment Toolkit (MDT) 2012 to deploy Windows operating systems in lite touch installation scenarios.
- Planning for the Lite Touch Installation Environment
- Implementing MDT 2012 for Lite Touch Installation
- Integrating Windows Deployment Services with MDT
- Lab : Planning and Deploying Desktops Using the Microsoft Deployment Toolkit
- Planning for the MDT Lite Touch Installation Environment
- Installing MDT 2012 and the Prerequisite Components
- Creating and Configuring the MDT 2012 Deployment Share
- Deploying and Capturing a Reference Operating System Image
- Integrating WDS with MDT 2012 To Provide PXE Boot Capabilities
This describes how to use System Center 2012 Configuration Manager to implement a zero touch installation for deploying enterprise desktops.
- Planning the Zero Touch Installation Environment
- Preparing the Site for Operating System Deployment
- Building a Reference Image Using a Configuration Manager Task Sequence
- Using MDT Task Sequences to Deploy Client Images
- Lab : Preparing the Environment for Operating System Deployment
- Planning the Operating System Deployment Infrastructure
- Preparing the Zero Touch Installation Environment
- Configuring the Deployment Packages and System Images
- Lab : Using MDT and Configuration Manager to Perform a Zero-Touch Installation
- Performing a Zero Touch Installation
This module describes how to plan and implement session virtualization deployment and a virtual desktop infrastructure (VDI) based upon Windows Server 2012 Remote Desktop Services.
- Overview of Remote Desktop Services
- Planning the Remote Desktop Services Environment
- Configuring a Virtual Desktop Infrastructure Deployment
- Configuring a Session-Based Desktop Deployment
- Extending the Remote Desktop Services Environment to the Internet
- Lab : Planning and Implementing a Remote Desktop Services Infrastructure
- Planning the Remote Desktop Services Environment
- Configuring a Virtual Desktop Infrastructure Scenario
- Configuring a Session-Based Desktop Scenario
- Lab : Extending Internet Access to the RDS Infrastructure
- Planning the RD Gateway Policies
- Configuring the RD Gateway
This module describes how to plan and configure user state virtualization to provide a consistent desktop client experience.
- Overview of User State Virtualization
- Planning User State Virtualization
- Configuring Roaming Profiles, Folder Redirection, and Offline Files
- Implementing Microsoft User Experience Virtualization
- Lab : Deploying and Managing User State Virtualization
- Planning User State Virtualization
- Implementing User State Virtualization
Students will be able to plan and implement an updates infrastructure to support both physical and virtual enterprise desktops.
- Planning an Updates Infrastructure for the Enterprise
- Implementing Configuration Manager 2012 to Support Software Updates
- Managing Updates for Virtual Machines and Images
- Using Windows Intune for Managing Software Updates
- Lab : Planning and Implementing an Updates Infrastructure
- Planning an Updates Infrastructure
- Implementing Software Updates Using Configuration Manager 2012
- Implementing Software Updates for Virtual Machine Libraries
This module describes how to use System Center technologies such as Endpoint protection and Data Protection Manager (DPM) to protect enterprise desktops from malware and data loss.
- Overview of System Center 2012 Endpoint Protection
- Configuring Endpoint Protection Client Settings and Monitoring Status
- Using Windows Intune Endpoint Protection
- Protecting Desktops by Using System Center 2012 Data Protection Manager
- Lab : Implementing Client Endpoint Protection
- Configuring the Endpoint Protection Point
- Configuring and Deploying Endpoint Protection Polices
- Configuring Client Settings to Support Endpoint Protection
- Monitoring Endpoint Protection
- Lab : Configuring Data Protection for Client Computer Data
- Configuring and Verifying Client Data Protection
This module describes how to identify and monitor relevant services and components to ensure the health and performance of the enterprise desktop infrastructure.
- Performance and Health Monitoring for the Desktop Infrastructure
- Monitoring the Virtual Desktop Infrastructure
- Lab : Monitoring the Performance and Health of the Desktop Infrastructure
- Configuring Performance and Reliability Monitoring for Desktops
- Configuring Operations Manager for Monitoring Virtual Environments
Before attending this course, students must have:
- Solid understanding of TCP/IP and networking concepts
- Solid knowledge of Windows and Active Directory Domain Services (AD DS)âfor example, domain user accounts, domain vs. local user accounts, user profiles, and group membership
- Good understanding of scripts and batch files
- Solid understanding of security concepts such as authentication and authorization
- Familiarity with the client administration capabilities of Windows Server
- General knowledge of management tools such as System Center 2012 Configuration Manager, System Center 2012 Operations Manager, and System Center 2012 Data Protection Manager.
- Familiarity with imaging, packaging, and operating system deployment concepts
- Familiarity with certificates and Certification Authority (CA) implementation and configuration
- Knowledge equivalent to Windows 2012 MCSA
Experience administering Windows Server in an environment that typically has the following characteristics:
- 2,500 to 50,000 or more users
- Multiple physical locations and multiple domain controllers
- Network services and resources such as messaging, databases, file and print, firewalls, Internet access, an intranet, and client computer management
- Support for Windows 8 client desktops
- Deployment and management of both physical and virtual applications
Subject Matter Expert
Productivity Point Global, previously ExecuTrain of Florida, began in 2003 and evolved out of a desire to increase our outreach both nationally and internationally. Utilizing the highest standard in customer service combined with our subject matter experts and high-end training venues, PPG has carved a niche by consistently expanding our corporate and government client base, originally hosted in the southeastern region of the US.
By consistently setting quality as the benchmark of our value system, PPG combines strategic partnerships and cutting edge technology with our determined efforts to branch out into other regions. PPG's combination of technology and professional skills training, IT outsourcing, and event hosting enables us to place a focused emphasis on the diversified business needs of our clients.
For more info please visit: http://www.productivitypoint.com/
Got questions? Contact us below or call 877-881-2235
Why Choose 360training.com?
- Fast and easy courses completion
- Get an education faster than at traditional colleges!
- 100% online - No classroom attendance required.
- Unlimited 24x7 online customer support
- Over 500,000+ certified nationwide.