Planning for and Managing Devices in the Enterprise training helps professionals to deploy the Enterprise Mobility Suite in managing devices, users, and data. Not only this, but this course will provide knowledge of various other technologies, such as Group Policy and other Windows Server–based technologies, that can be used to manage devices and secure data.
Through this course, candidates will learn the designing and implementation of cloud-based and on-premises solutions for managing Windows-based, iOS, and Android devices.
Module 1: Use devices in the enterprise environment
Devices in an enterprise Overview
Overview of the EMS
Features of Device management
Module 2: Implementing and administering Azure AD
Overview of AD DS
Overview of Azure AD
Create and manage Azure AD
Manage authentication in Azure AD
Module 3: Connecting AD DS with Azure AD
Prepare AD DS for directory synchronization
Implement Azure AD Connect
Plan and Implement federation
Module 4: Managing devices in Office 365
Overview of Office 365
MDM for Office 365
Configure and test mobile device management in Office 365
Module 5: Plan and Implement Microsoft Intune
Plan for Intune
Deploy Intune clients
Basic Intune administration
Module 6: Managing devices by using Intune
Work with Microsoft Intune policies
Mobile device management
Manage updates and Windows Defender
Module 7: Using Microsoft Intune to manage applications and resource access
Application lifecycle management
Application deployment process
Manage access to company resources
Module 8: Plan and Implement Azure RMS
Overview of Azure RMS.
Implement Azure RMS.
Protect documents with Azure RMS
Use FCI with Azure RMS
Module 9: Plan and Implement app support
Plan and Implement application compatibility options
Publish and Use RemoteApp programs
Publish and Use Azure RemoteApp
Module 10: Plan and Implement remote access
Overview of remote access solutions
Implement remote infrastructure access
Plan and Implement Work Folders
Implement cloud data access
Plan and Implement mobility options
Module 11: Plan and Implement Dynamic Access Control and auditing
Prepare for Dynamic Access Control deployment
Implement Dynamic Access Control
Validate and remediate Dynamic Access Control
Use advanced audit policies
Module 12: Plan and protecting data
Plan and Implement encryption
Plan and Implement BitLocker
Protect data on devices
Module 13: Recovering data and operating systems
Use File History to recover files
Use Previous Versions to recover files
Recovering a device with a restore point
Use the advanced startup options to recover a device
This Exam 70398 validates candidate’s knowledge in planning and designing cloud and hybrid identities and supporting identity infrastructure for managing devices and ideal for:
This course is targeted to IT professionals and consultants who are involved in planning, deploying, and managing devices and applications for medium and large organizations.
There are some people who work in on-premises Active Directory Domain Services (AD DS) environments with both domain joined and non-domain joined devices, for which they are required to provide mobile device management and secure data access.
In addition to their professional experience, candidates who wish to attend this training should possess the following technical knowledge:
TCP/IP networking fundamentals
Acquaintance with Domain Name System (DNS)
Knowledge of Active Directory principles
Basic Understanding of the public key infrastructure (PKI) fundamentals
Basic Understanding of cloud-based service concepts
Understand the fundamentals of Windows Server 2012 R2, including Remote Desktop Services
Experience with Windows 10
What Our Trainees Say
I want to express the extent of my admiration and appreciation for the organization and the effort you had made for the sake to success the training I did particularly and the success to the Institute generally. What I have seen during the past few days will be an opportunity to return again and recommend the Institute among colleagues. Interacting with many tools and share information with the students. Moreover, to that the instructor provides activities and demonstrates the process for running tools in live mode.
I like Mercury Solutions, they provided me with what they promised. All communication with the staff was good. All the tactics used to impart training was good. The trainer was an awesome person. He has a vast knowledge and knows how to train a student, he taught me with all the possibilities in the security field. He knows his subject very well. I highly recommend the trainer for all the security related trainings. The company guest house and the staff was very good. The overall transportation was also good and the drivers are helpful. They also sent me for city tours which were awesome.
I am really delighted about the SQL Training course: Querying Microsoft SQL Server with Mercury Solutions. Every session was great and very valuable. Practical application made the course significantly more valuable. The thing most impressive was the way the entire programme was structured. Instructor is having great experience and diverse knowledge in SQL Server. I am looking for learning Administering Microsoft SQL Server 2014 Databases with same trainer.
I came to make resolution to learn Cisco Security, so I chose Mercury Solutions. I learnt a lot and gained a lot. Presently, I became CCNA certified and EC-Council Penetration Tester. I learnt a lot from good lectures and from trainers, and also I enjoyed a lot and I would advise all to come down and learn."
Fill & Avail
10% OFF / more discount offers
On All Courses
Request For Price
Mercury Solutions Ltd. is rated
4.6 stars by www.facebook.com/mercurysol