Privately train a group of any size at your facility, virtually, or at any of more than 130 Center for
Professional Development @ ITT Tech location. With private sessions, you can address the specific
requirements of your company by delivering content directly to your staff or across multiple groups
within your organization.
If you would like to request a private class, please complete the form below. For more information,
call 888.236.2462 or email us.
This course is intended for IT professionals who configure or support Windows 8 computers, devices, users and associated network and security resources. The networks with which these professionals typically work are configured as a single domain-based or peer-to-peer environment with access to the Internet and cloud services. The IT professional could be a consultant, full-time desktop support technician, or an IT generalist who administers Windows 8-based computers and devices as a portion of their broader technical responsibilities. The course is also intended for students who seek certification in the 70-687 Windows 8 Configuring exam.
Module 1: Windows 8.1 in an Enterprise Environment
Module 2: Installing and Deploying Windows 8.1
Lab : Installing Windows 8.1
Lab : Customizing and Capturing a Windows 8.1 Image
Lab : Deploying a Windows 8.1 Image
Module 3: Tools Used for Configuring and Managing Windows 8.1
Lab : Using Management Tools to Configure Windows 8.1 Settings
Module 4: Managing Profiles and User State in Windows 8.1
User profiles store user settings and data. For users working on a single computer, profiles can be stored locally. However, for users who roam between multiple computers, the user profile, or at least some parts of it, should be available on the network. This module describes the different user profile types. It also describes Microsoft User Experience Virtualization (UE-V), which you can use to synchronize settings between computers without using roaming user profiles. The operating system itself provides user profiles, whereas UE-V is a separate product that is part of the Microsoft Desktop Optimization Pack. In this module, you will learn about UE-V features and how to deploy and configure it on your network. You also will learn how to migrate user state and settings to computers that run Windows 8.1 operating systems.
Lab : Configuring Profiles and User State Virtualization
Lab : Migrating User State by Using USMT
Module 5: Managing Disks and Device Drivers
Although most computers that run Windows 8.1 have a single physical disk that is configured as a single volume, this is not always the case. For example, there might be times when you want to have multiple operating systems on a single computer, or you might want to have virtual memory on a different volume. Therefore, it is important that you understand how to create and manage simple, spanned, and striped volumes. You also might be interested in implementing the Storage Spaces feature. In addition to traditional storage, you can use Windows 8.1 to create and access virtual hard disks from within the operating system installed on a physical computer. To help maintain and optimize file system performance, you must be familiar with file system fragmentation and the tools that you can use to defragment a volume. Additionally, a good understanding of disk quotas is helpful if you are managing available disk space on installed volumes.
Lab : Managing Disks
Lab : Configuring Device Drivers
Module 6: Configuring Network Connectivity
Lab : Configuring a Network Connection
Lab : Resolving Network Connectivity Issues
Module 7: Configuring File Access and Printers on Windows 8.1 Clients
Lab : Configuring File Access
Lab : Configuring Printers
Module 8: Implementing Network Security
When computers are connected to a network, they are exposed to potential security threats. You need to formulate a strategy to protect your computers. User policies, antivirus software, encrypted network traffic, and other protective measures work together to help shield your Windows 8.1 computers from security threats. It also is important to identify possible threats and to optimize appropriate Windows-based network security features, such as Windows Firewall and Windows Defender.
Lab : Configuring Inbound and Outbound Firewall Rules
Lab : Configuring IPsec Rules
Lab : Configuring Malware Protection
Module 9: Configuring Resource Access for Domain-Joined Devices and Devices That Are Not Domain Members
Before you can start working on a computer that is running the Windows 8.1 operating system, you must sign in. Signing in to a computer is a mandatory step, and based on your computer membership, you can sign in with a local account, a domain account, or a Microsoft account. In an Active Directory Domain Services (AD DS) environment, you typically would use a domain account exclusively because it has many benefits. However, in today’s world, users are not restricted to using company-owned computers only. They commonly use their own devices for accessing company data. Windows 8.1 and Windows Server 2012 R2 have several new features such as Workplace Join, Work Folders, and Remote Business Data Removal that are useful in such Bring Your Own Device (BYOD) scenarios. In this module, you will learn about the benefits of domain accounts and Windows 8.1 features that are useful when administrators need to control resource access for devices that are not domain members. You also will learn how to configure and use Workplace Join and Work Folders.
Lab : Configuring Resource Access for Devices That Are Not Domain Members
Module 10: Securing Windows 8.1 Devices
Users are becoming increasingly computer literate, and they expect more from the technology that they use at work. They expect to be able to work from home, from branch offices, and on the road without a decrease in their productivity or a loss of access to the programs and applications that they need most. As the needs of users have changed, the demands on information technology (IT) support professionals have increased. Today, support professionals need to provide more capabilities and to support greater flexibility while continuing to minimize security risks. In this module, you will explore features of the Windows 8.1 operating system that you can use to maintain a secure computer environment for your users, such as Encrypting File System (EFS), BitLocker Drive Encryption, and User Account Control (UAC).
Lab : Implementing Local GPOs
Lab : Securing Data by Using BitLocker
Lab : Configuring and Testing UAC
Module 11: Configuring Applications for Windows 8.1
Computer users require applications for every task they perform, such as editing documents, querying databases, and generating reports. As part of administering the Windows 8.1 operating system, you need a strategy for deploying and managing the applications that users in your organization will run on their new Windows 8.1 computers and devices. Based on the specific needs of your organization, you can choose from a variety of methods to deploy and manage applications—from manual deployment methods to fully automated management technologies. You also need a strategy to handle the application compatibility issues that might arise when you try to run applications that were designed for older versions of Windows operating systems.
Lab : Configuring Internet Explorer Security
Lab : Configuring AppLocker
Module 12: Optimizing and Maintaining Windows 8.1 Computers
Lab : Optimizing Windows 8.1 Performance
Lab : Maintaining Windows Updates
Module 13: Configuring Mobile Computing and Remote Access
Lab : Configuring a Power Plan
Lab : Implementing DirectAccess by Using the Getting Started Wizard
Lab : Implementing Remote Desktop
Module 14: Recovering Windows 8.1
It is important to protect data on your computer from accidental loss or corruption. To recover from a problem, typically it is easier to restore system settings than to reinstall an operating system and apps. The Windows 8.1 operating system provides a number of features that you can use to protect important data files, in addition to tools that you can use to recover a computer that will not start or that starts with errors. You can use features such as File History, System Protection, and synchronization with Microsoft OneDrive (formerly known as SkyDrive) to protect your data. To support your users, it is important that you understand how to use these features and tools.
Lab : Recovering Windows 8.1
Module 15: Configuring Client Hyper-V
Hyper-V is the primary platform for infrastructure virtualization. Hyper V enables multiple operating systems to run in individual virtual machines that share the same physical platform. Virtual machines can be isolated or connected to a network. This module will introduce you to Client Hyper V in Windows 8.1 and explain the fundamentals of working with virtual machines in a Client Hyper V environment.
Lab : Configuring Client Hyper-V
This course provides existing .NET developers with practical information and labs that enables them to build solutions on the Microsoft SharePoint 2010 platform.
After completing this course, students will have been taught information how to:
This course is intended for professional developers who use Microsoft SharePoint 2010 in a team-based, medium-sized to large development environment. Members of the audience are experienced users of Microsoft Visual Studio 2008 SP1. The audience understands how to use the new features of SharePoint 2010 and Visual Studio 2010.
Before attending this course, students must have:
Module 1: Introduction to the SharePoint 2010 Development Platform This module describes the SharePoint 2010 development platform and the benefits and features that it offers to developers. Lessons
Lab: Developing with the SharePoint 2010 Object Hierarchy
After completing this module, students will be able to:
Module 2: Using SharePoint 2010 Developer Tools This module describes how to use development tools that are integrated with the SharePoint 2010 development platform, such as Visual Studio 2010 and SharePoint Designer 2010. Lessons
Lab: Using SharePoint 2010 Developer Tools
Module 3: Developing SharePoint 2010 Web Parts This module describes how to develop Web Parts for SharePoint 2010 solutions. Lessons
Lab: Creating SharePoint 2010 Web Parts by Using Visual Studio 2010
Module 4: Working with SharePoint Objects on the Server This module describes how to develop code that uses the server-side objects provided by the SharePoint 2010 development platform. Lessons
Lab: Creating and Manipulating Server-Side Objects
Module 5: Creating Event Receivers and Application Settings This module describes how to develop event receivers and manipulate application settings for SharePoint 2010 solutions. Lessons
Lab: Creating Event Receivers and Web.Config Modifications
Module 6: Developing Solutions by Using Business Connectivity Services This module describes how to develop solutions that access external data by using Business Connectivity Services. Lessons
Lab: Building Business Connectivity Services Solutions
Module 7: Developing SharePoint 2010 Workflows This module describes how to develop workflows as part of SharePoint 2010 solutions. Lessons
Lab: Creating Workflows for SharePoint 2010
Module 8: Working with Client-Based APIs for SharePoint 2010 This module describes how to develop code that uses the client-side objects provided by the SharePoint 2010 development platform. Lessons
Lab: Developing .NET Applications by Using the SharePoint Client Object Model
Module 9: Developing Interactive User Interfaces This module describes how to develop server ribbon controls and client dialogs for the new user interface platform of SharePoint 2010. Lessons
Lab: Developing User Interface Components for SharePoint 2010 Solutions
Module 10: Developing Silverlight Applications for SharePoint This module describes how to develop Silverlight applications that are integrated with SharePoint 2010 data and solutions. Lessons
Lab: Developing Silverlight Applications by using the SharePoint Client Object Model
Module 11: Developing Sandboxed Solutions This module describes how to develop sandboxed solutions for SharePoint 2010. Lessons
Lab: Creating Sandboxed Solutions for SharePoint 2010
Module 12: Working with SharePoint Server Profiles and Taxonomy APIs This module describes how to develop code that uses the taxonomic and user profile services of the SharePoint 2010 development platform. Lessons
Lab: Working with User Profiles and Taxonomies Programmatically
Module 13: Developing Content Management Solutions This module describes how to develop code that uses the content management services of the SharePoint 2010 development platform. Lessons
Lab: Branding SharePoint Sites
Important Consumer Information