Vendor: Microsoft

Kroz trening će se predstaviti ključni elementi modernog upravljanja, pristupi zajedničkog centraliziranog upravljanja i Microsoft Intune integracija. Trening obuhvaća razvoj aplikacija, upravljanje aplikacijama temeljenim na pregledniku (engl. web-based) te ključne sigurnosne koncepte kao što su provjera autentičnosti, identitet, pristup i politika usklađenosti. Tehnologije kao što su Azure Active Directory, Azure Information Protection i Microsoft Defender for Endpoint prikazane su na razini zaštite uređaja i podataka.

Osnovne informacije

Move Icon

Moduli koji će se izvoditi

This module covers modern endpoint management and enterprise desktop lifecycle concepts. It teaches the stages of the lifecycle (planning, deployment, maintenance) and provides a foundation for future learning. After completing this module, students will be able to:

  • Describe the benefits of Modern Management
  • Explain the enterprise desktop life-cycle model
  • Describe considerations for planning hardware strategies
  • Describe considerations for post-deployment and retirement

This module covers Windows OS editions, features, and installation methods. Learners gain a deeper understanding of the available editions and corresponding installation processes. After completing this module, students will be able to:

  • Explain the differences between the different editions of Windows
  • Select the most suitable Windows device for your needs
  • Describe the minimum recommended hardware requirements for installing Windows 11

This module teaches how to use Azure AD effectively. You’ll learn about RBAC, user roles, creating and managing users and groups, using PowerShell cmdlets, and synchronizing objects from AD DS to Azure AD. After completing this module, students will be able to:

  • Describe RBAC and user roles in Azure AD
  • Create and manage users in Azure AD
  • Create and manage groups in Azure AD
  • Use Windows PowerShell cmdlets to manage Azure AD
  • Describe how you can synchronize objects from AD DS to Azure AD

In this module, you learn about device authentication and management in Azure Active Directory. After completing this module, students will be able to:

  • Describe Azure AD join
  • Describe Azure AD join prerequisites, limitations and benefits
  • Join device to Azure AD
  • Manage devices joined to Azure AD

This module introduces students to client deployment options and some of the high-level management and monitoring options that are available using Configuration Manager. After completing this module, students will be able to:

  • Describe Microsoft Endpoint Manager
  • Understand the advantages of managing a client with Configuration Manager
  • Deploy the Configuration Manager client
  • Monitor the Configuration Manager client
  • Manage Configuration Manager devices

Students will learn how to configure and setup Intune to more easily manage Windows, Android, and iOS devices. After completing this module, students will be able to:

  • Prepare Microsoft Intune for device enrollment
  • Configure Microsoft Intune for automatic enrollment
  • Explain how to enroll Windows, Android and iOS devices in Intune
  • Explain when and how to use Intune Enrollment Manager
  • Understand how to monitor and perform remote actions on enrolled devices

Students learn about the various types of device profiles, and how to create and manage them. After completing this module, students will be able to:

  • Describe the various types of device profiles in Intune
  • Explain the difference between built-in and custom profiles
  • Create and manage profiles

This module introduces students to monitoring profiles to ensure correct assignments and resolving conflicts when multiple profiles are applied. After completing this module, students will be able to:

  • Monitor the assignments of profiles
  • Understand how profiles are synchronized and how to manually force synchronization
  • Use PowerShell to execute and monitor scripts on devices

Students learn about the benefits of various Windows user profiles, how to manage them, and how to facilitate profile data synchronization across multiple devices. After completing this module, students will be able to:

  • Explain the various user profile types that exist in Windows
  • Describe how a user profile works
  • Configure user profiles to conserve space
  • Explain how to deploy and configure Folder Redirection
  • Explain Enterprise State Roaming
  • Configure Enterprise State Roaming for Azure AD devices

This module introduces Mobile Application Management (MAM). Students will learn about considerations for implementing MAM and will be introduced to the management of MAM using Intune and Configuration Manager. After completing this module, students will be able to:

  • Explain Mobile Application Management
  • Understand application considerations in MAM
  • Explain how to use Configuration Manager for MAM
  • Use Intune for MAM
  • Implement and manage MAM policies

In this module, you’ll master deploying applications using Intune, Configuration Manager, Group Policy, and Microsoft Store Apps. After completing this module, students will be able to:

  • Explain how to deploy applications using Intune and Configuration Manager
  • Learn how to deploy applications using Group Policy
  • Understand Microsoft Store Apps
  • Learn how to deploy apps using Microsoft Store Apps
  • Learn how to configure Microsoft Store Apps

In this module, you’re introduced to managing apps on Intune managed devices. The module will then conclude with an overview of how to use IE Mode with Microsoft Edge. After completing this module, students will be able to:

  • Explain how to manage apps in Intune
  • Understand how to manage apps on non-enrolled devices
  • Understand how to deploy Microsoft 365 Apps using Intune
  • Learn how to configure and manage IE mode in Microsoft Edge
  • Learn about app inventory options in Intune

This module introduces students to the various authentication methods used to protect identities. After completing this module, students will be able to:

  • Describe Windows Hello for Business
  • Describe Windows Hello deployment and management
  • Describe Azure AD Identity Protection
  • Describe and manage self-service password reset in Azure AD
  • Describe and manage multi-factor authentication

This module describes how clients can be configured to access organizational resources using a virtual private network (VPN). After completing this module, students will be able to:

  • Describe how you can access corporate resources
  • Describe VPN types and configuration
  • Describe Always On VPN
  • Describe how to configure Always On VPN

This module describes how to use compliance and conditional access policies to help protect access to organizational resources. After completing this module, students will be able to:

  • Describe device compliance policy
  • Deploy a device compliance policy
  • Describe conditional access
  • Create conditional access policies

izational resources using a virtual private network (VPN). After completing this module, students will be able to:

  • Describe how you can access corporate resources
  • Describe VPN types and configuration
  • Describe Always On VPN
  • Describe how to configure Always On VPN

This module describes how to use Microsoft Endpoint Manager and Power BI to create compliance and custom reports. After completing this module, students will be able to:

  • Generate inventory reports and Compliance reports using Microsoft Intune
  • Report and monitor device compliance
  • Create custom reports using the Intune Data Warehouse
  • Use the Microsoft Graph API for building custom reports

This module describes how you can use Intune to create and manage WIP policies that manage this protection. The module also covers implementing BitLocker and Encrypting File System. After completing this module, students will be able to:

  • Describe Windows Information Protection
  • Plan for Windows Information Protection usage
  • Implement and use Windows Information Protection
  • Describe the Encrypting File System (EFS)
  • Describe BitLocker

This module explores using Microsoft Defender for Endpoint to provide additional protection and monitor devices against threats. After completing this module, students will be able to:

  • Describe Microsoft Defender for Endpoint
  • Describe key capabilities of Microsoft Defender for Endpoint
  • Describe Microsoft Defender Application Guard
  • Describe Microsoft Defender Exploit Guard
  • Describe Windows Defender System Guard

This module explains the built-in security features of Windows clients and how to implement them using policies. After completing this module, students will be able to:

  • Describe Windows Security capabilities
  • Describe Windows Defender Credential Guard
  • Manage Microsoft Defender Antivirus
  • Manage Windows Defender Firewall
  • Manage Windows Defender Firewall with Advanced Security

This module covers Microsoft Defender for Cloud Apps, focusing on securing sensitive data, its relevance in dynamic work settings, and effective utilization for improved security posture. After completing this module, students will be able to:

  • Describe Microsoft Defender for Cloud Apps
  • Plan for Microsoft Defender for Cloud Apps usage
  • Implement and use Microsoft Defender for Cloud Apps

Discusses some of the tools that you can use to perform detailed assessments of existing deployments, and describes some of the challenges that you may face. After completing this module, students will be able to:

  • Describe the guidelines for an effective enterprise desktop deployment
  • Explain how to assess the current environment
  • Describe the tools that you can use to assess your current environment
  • Describe the methods of identifying and mitigating application compatibility issues
  • Explain considerations for planning a phased rollout

Discusses the shifts from traditional to modern management and where on-premises solutions best fit in today’s enterprise. After completing this module, students will be able to:

  • Describe the fundamentals of using images in traditional deployment methods
  • Describe the key benefits, limitations, and decisions when planning a deployment of – Windows using Microsoft Deployment Toolkit (MDT)
  • Describe how Configuration Manager builds upon MDT and how both can work in harmony
  • Explain the different options and considerations when choosing the user interaction experience during deployment, and which methods and tools support these experiences

This module explains the common day to day tasks that Administrators would use Configuration Manager to perform. After completing this module, students will be able to:

  • Describe the capabilities of Configuration Manager
  • Describe the key components of Configuration Manager
  • Describe how to troubleshoot Configuration Manager deployments

Use Autopilot to deploy new hardware or refreshing an existing hardware with the organization’s desired configuration, without using the traditional imaging process. After completing this module, students will be able to:

  • Explain the benefits of modern deployment for new devices
  • Describe the process of preparing for an Autopilot deployment
  • Describe the process of registering devices in Autopilot
  • Describe the different methods and scenarios of Autopilot deployments
  • Describe how to troubleshoot common Autopilot issues
  • Describe the process of deployment using traditional methods

Use dynamic provisioning methods such as Subscription Activation, Provisioning packages, and Azure AD join to reconfigure an existing operating system. After completing this module, students will be able to:

  • Describe how Subscription Activation works
  • Describe the benefits of Provisioning Packages
  • Explain how Windows Configuration Designer creates Provisioning Packages
  • Describe the benefits of using MDM enrollment with Azure AD join

Explore considerations and review the planning of transitioning to modern management, focusing on migration and newly provisioned devices. After completing this module, students will be able to:

  • Identify usage scenarios for Azure AD join
  • Identify workloads that you can transition to Intune
  • Identify prerequisites for co-management
  • Identify considerations for transitioning to modern management
  • Plan a transition to modern management using existing technologies
  • Plan a transition to modern management using Microsoft Intune

This module teaches managing Microsoft’s cloud-based PC management solution, Windows 365, offering personalized, secure Windows 11 experience from any device. After completing this module, students will be able to:

  • Describe the key features of Windows 365
  • Describe the Windows 365 management experience
  • Describe the Windows 365 security model
  • Describe the Windows 365 deployment options
  • Describe the Windows 365 licensing model

Learn to manage Azure Virtual Desktop, a cloud-based VDI solution providing personalized, secure Windows 11 experiences. After completing this module, students will be able to:

  • Describe the key features of Azure Virtual Desktop
  • Describe the Azure Virtual Desktop management experience
  • Describe the Azure Virtual Desktop security model
  • Describe the Azure Virtual Desktop deployment options

Brzi upit

Prijavite se

Lokacija 


Trajanje: 32 sati

Brzi upit