
Opleidingen
58.594
resultaten
CompTIA A+ Core 2 - 1 jaar toegang, inclusief examen – eLearning
CompTIA A+ Core 2 - 1 jaar toegang, inclusief examen – eLearning
CompTIA A+ is de industriestandaard voor het lanceren van IT-carrières in de digitale wereld van vandaag. Met deze certificering worden kandidaten gecertificeerd als bewezen probleemoplossers voor de ondersteuning van huidige kerntechnologieën, zoals beveiliging, netwerken, virtualisatie, enz.
De versies van deze certificering zijn CompTIA A+ 220-1101 (Core 1) en 220-1102 (Core 2).
COMPTIA A+ 220-1102 (CORE 2) ONLINE CURSUS DETAILS
12 maanden toegang tot het platform
CompTIA CertMaster Learn (online cursus op eigen tempo)
10 videolessen met prestatiegerichte vragen
90 oefenvragen
CompTIA A+ Core 2 Virtual Labs inbegrepen
Flashcards zorgen ervoor dat u de terminologie en acroniemen kent die nodig zijn voor het examen
Leerplan
90-vragen eindbeoordeling simuleert de test ervaring
Doelstellingen
Kandidaten zullen over de volgende onderwerpen leren:
IT-infrastructuurondersteuningspraktijken, zoals geavanceerde probleemoplossing voor apparaatconnectiviteit, end-point management en basisnetwerken
Hoe hardware voor mobiel, pc en IoT te identificeren, gebruiken, aansluiten, configureren en ondersteunen, inclusief connectoren, randapparatuur en componenten
Best practices voor gegevensopslag, -herstel en -beheer
Hoe essentiële basisbeveiligingsfuncties worden uitgevoerd, zoals het aanpakken van privacyproblemen, het detecteren en verwijderen van malware, het harden van apparaten en het optimaliseren van fysieke beveiliging
de installatie, ondersteuning en configuratie van Windows OS, en inzicht in andere besturingssystemen zoals Linux, Mac, iOS en Android
Beheer van client- en cloud-gebaseerde SaaS-software
Problemen oplossen en oplossen met betrekking tot kernproblemen op het gebied van service en ondersteuning
Best practices voor documentatie, IT-scripting en wijzigingsbeheer
Problemen oplossen met software op pc's en mobiele apparaten voor functies als applicatiebeveiliging
Verschillende soorten netwerken en verbindingen, waaronder WIFI, TCP/IP, en Small Office/Home Office (SOHO)
Probleemoplossing voor apparaat- en netwerkproblemen
Kwetsbaarheden in de beveiliging van netwerkverbindingen en -apparaten opsporen en aanpakken
Installeren en configureren van mobiele apparatuur zoals laptops en mobiele telefoons
Vergelijken, contrasteren en gebruiken van cloud computing en client-side visualisatie
Best practices voor milieubescherming, veiligheid, professionalisme en communicatie volgen en toepassen
Voor wie is het bedoeld?
Help Desk tech
Desktop Ondersteuningsspecialist
Buitendienst Technicus
Help Desk Technicus
Geassocieerd netwerkingenieur
Systeemondersteuningstechnicus
Junior systeembeheerder
Inhoud
Hardware - Identificeren, gebruiken en aansluiten van hardware componenten en apparaten, inclusief de brede kennis over verschillende apparaten die nu nodig is om de remote workforce te ondersteunen
Besturingssystemen - Installeren en ondersteunen van Windows OS inclusief command line & client support. Systeemconfiguratie imaging en troubleshooting voor Mac OS, Chrome OS, Android en Linux OS.
Problemen met software oplossen - Problemen met PC's en mobiele apparaten oplossen, waaronder veelvoorkomende problemen met het besturingssysteem, malware en beveiliging.
Netwerken - Uitleg over soorten netwerken en verbindingen, waaronder TCP/IP, WIFI en SOHO.
Problemen oplossen - Problemen met apparaten en netwerken in de praktijk snel en efficiënt oplossen
Beveiliging - Identificeren van en bescherming bieden tegen kwetsbaarheden in de beveiliging van apparaten en hun netwerkverbindingen
Mobiele apparaten - Installeren en configureren van laptops en andere mobiele apparaten en ondersteunende toepassingen om connectiviteit voor eindgebruikers te garanderen
Virtualisatie en cloud computing - cloud computing-concepten vergelijken en vergelijken en client-side virtualisatie opzetten
Operationele procedures - Best practices volgen voor veiligheid, milieueffecten, communicatie en professionalisme
COMPTIA A+ 220-1102 (CORE 2) ONLINE EXAMEN DETAILS
Meerkeuze, prestatiegerichte vragen (PBQ's): Performance-based questions zijn examenonderdelen die ontworpen zijn om het vermogen van een kandidaat te testen om problemen op te lossen in een real-world omgeving en worden geleverd als simulaties of binnen virtuele omgevingen) en drag and drops
Maximum van 90 vragen per examen
Slagen: 700 (op een schaal van 100-900)
Aanbieder van het examen: Person Vue (examencentrum of online examen).
Voorkennis
Om toegang te krijgen tot de CompTIA A+ cursus en Core 1 en Core 2 examens, wordt kandidaten aangeraden te beschikken over:
Van 9 tot 12 maanden praktijkervaring in een helpdesk support technicus, desktop support technicus, of field service technicus functie

€450
E-Learning
CompTIA A+ Core 1 and Core 2 - 1 jaar toegang, inclusief examen – eLearning
CompTIA A+ Core 1 and Core 2 - 1 jaar toegang, inclusief examen – eLearning
CompTIA A+ is de industriestandaard voor het lanceren van IT-carrières in de digitale wereld van vandaag. Met deze certificering worden kandidaten gecertificeerd als bewezen probleemoplossers voor de ondersteuning van huidige kerntechnologieën, zoals beveiliging, netwerken, virtualisatie, enz.
De versies van deze certificering zijn CompTIA A+ 220-1101 (Core 1) en 220-1102 (Core 2).
COMPTIA A+ 220-1101 (CORE 1) ONLINE CURSUS DETAILS
12 maanden toegang tot het platform
CompTIA CertMaster Learn (online cursus op eigen tempo)
10 videolessen met prestatiegerichte vragen
100 oefenvragen
CompTIA A+ Core 1 Virtual Labs inbegrepen
Flashcards zorgen ervoor dat u de terminologie en acroniemen kent die nodig zijn voor het examen
Leerplan
90-vragen eindbeoordeling simuleert de test ervaring
COMPTIA A+ 220-1102 (CORE 2) ONLINE CURSUS DETAILS
12 maanden toegang tot het platform
CompTIA CertMaster Learn (online cursus op eigen tempo)
10 videolessen met prestatiegerichte vragen
90 oefenvragen
CompTIA A+ Core 2 Virtual Labs inbegrepen
Flashcards zorgen ervoor dat u de terminologie en acroniemen kent die nodig zijn voor het examen
Leerplan
90-vragen eindbeoordeling simuleert de test ervaring
Doelstellingen
Kandidaten zullen over de volgende onderwerpen leren:
IT-infrastructuurondersteuningspraktijken, zoals geavanceerde probleemoplossing voor apparaatconnectiviteit, end-point management en basisnetwerken
Hoe hardware voor mobiel, pc en IoT te identificeren, gebruiken, aansluiten, configureren en ondersteunen, inclusief connectoren, randapparatuur en componenten
Best practices voor gegevensopslag, -herstel en -beheer
Hoe essentiële basisbeveiligingsfuncties worden uitgevoerd, zoals het aanpakken van privacyproblemen, het detecteren en verwijderen van malware, het harden van apparaten en het optimaliseren van fysieke beveiliging
de installatie, ondersteuning en configuratie van Windows OS, en inzicht in andere besturingssystemen zoals Linux, Mac, iOS en Android
Beheer van client- en cloud-gebaseerde SaaS-software
Problemen oplossen en oplossen met betrekking tot kernproblemen op het gebied van service en ondersteuning
Best practices voor documentatie, IT-scripting en wijzigingsbeheer
Problemen oplossen met software op pc's en mobiele apparaten voor functies als applicatiebeveiliging
Verschillende soorten netwerken en verbindingen, waaronder WIFI, TCP/IP, en Small Office/Home Office (SOHO)
Probleemoplossing voor apparaat- en netwerkproblemen
Kwetsbaarheden in de beveiliging van netwerkverbindingen en -apparaten opsporen en aanpakken
Installeren en configureren van mobiele apparatuur zoals laptops en mobiele telefoons
Vergelijken, contrasteren en gebruiken van cloud computing en client-side visualisatie
Best practices voor milieubescherming, veiligheid, professionaliteit en communicatie volgen en inbedden
Voor wie is de cursus bedoeld?
Help Desk Tech
Desktopondersteuningsspecialist
Buitendienst Technicus
Help Desk Technicus
Geassocieerd netwerkingenieur
Systeemondersteuningstechnicus
Junior systeembeheerder
Inhoud
Hardware - Identificeren, gebruiken en aansluiten van hardwarecomponenten en -apparaten, met inbegrip van de brede kennis over verschillende apparaten die nu nodig is om het personeel op afstand te ondersteunen
Besturingssystemen - Installeren en ondersteunen van Windows OS inclusief command line & client support. Systeemconfiguratie imaging en troubleshooting voor Mac OS, Chrome OS, Android en Linux OS.
Problemen met software oplossen - Problemen met PC's en mobiele apparaten oplossen, waaronder veelvoorkomende problemen met het besturingssysteem, malware en beveiliging.
Netwerken - Uitleg over soorten netwerken en verbindingen, waaronder TCP/IP, WIFI en SOHO.
Problemen oplossen - Problemen met apparaten en netwerken in de praktijk snel en efficiënt oplossen
Beveiliging - Identificeren van en bescherming bieden tegen kwetsbaarheden in de beveiliging van apparaten en hun netwerkverbindingen
Mobiele apparaten - Installeren en configureren van laptops en andere mobiele apparaten en ondersteunende toepassingen om connectiviteit voor eindgebruikers te garanderen
Virtualisatie en cloud computing - cloud computing-concepten vergelijken en vergelijken en client-side virtualisatie opzetten
Operationele procedures - Best practices volgen voor veiligheid, milieu-impact, communicatie en professionalisme
COMPTIA A+ 220-1101 (CORE 1) EN 220-1102 (CORE 2) ONLINE EXAMEN DETAILS
Meerkeuze, prestatiegerichte vragen (PBQ's): Performance-based questions zijn examenonderdelen die ontworpen zijn om het vermogen van een kandidaat te testen om problemen op te lossen in een real-world omgeving en worden geleverd als simulaties of binnen virtuele omgevingen) en drag and drops
Maximum van 90 vragen per examen
Score om te slagen:
220-1101: 675 (op een schaal van 900)
220-1102: 700 (op een schaal van 900)
Aanbieder van het examen: Person Vue (Testcentrum of Online Testen).
Voorkennis
Om toegang te krijgen tot de CompTIA A+ cursus en Core 1 en Core 2 examens, wordt kandidaten aangeraden te beschikken over:
Van 9 tot 12 maanden hands-on ervaring in een helpdesk support technician, desktop support technician, of field service technician job rol.

€750
E-Learning
CompTIA Cloud+ - 1 jaar toegang, inclusief examen – eLearning
CompTIA Cloud+ - 1 jaar toegang, inclusief examen – eLearning
CompTIA Cloud+ is een wereldwijd erkende certificering om de vaardigheden aan te tonen die nodig zijn om veilige cloudomgevingen te implementeren en te automatiseren om zo de beschikbaarheid van bedrijfssystemen en -gegevens te ondersteunen.
De versie van deze certificering is CompTIA Cloud+ CV0-003.
COMPTIA CLOUD+ CV0-003 ONLINE CURSUS DETAILS
12 maanden toegang tot het platform
CompTIA CertMaster Learn (online cursus op eigen tempo)
Meer dan 30 uur inhoud
13 videolessen met prestatiegerichte vragen
130 oefenvragen
Flashcards zorgen ervoor dat u de terminologie en acroniemen kent die nodig zijn voor het examen
Leerplan
90-vragen-eindbeoordeling simuleert de testervaring
Doelstellingen
Hoe een cloudomgeving te implementeren, te onderhouden en te optimaliseren
Hoe veelvoorkomende cloud-gerelateerde problemen op te lossen
Basis cloud-gerelateerde technologieën en concepten
Belangrijkste elementen van cloudarchitectuur en -ontwerp
Hoe de beveiliging in de cloud te optimaliseren
Hoe automatisering en virtualisering te stimuleren. Dit omvat methoden zoals continue implementatie en continue integratie
Hoe klaar te zijn voor, te reageren op en te herstellen van rampen
Het belang van, en hoe te garanderen, hoge beschikbaarheid
Voor wie is het bedoeld
Systeembeheerder
Cloud Ingenieur
Systeemingenieur
Netwerkbeheerder
Netwerk ingenieur
Cloud-specialist
Cloud projectmanager
Inhoud
Cloudarchitectuur & -ontwerp - Analyseren van verschillende cloudmodellen om de beste oplossing te ontwerpen ter ondersteuning van de bedrijfsbehoeften.
Cloudbeveiliging - Beheren en onderhouden van servers, inclusief OS-configuraties, toegangscontrole en virtualisatie.
Cloud Deployment - Analyseren van systeemvereisten voor een succesvolle migratie van werklasten naar de cloud.
Operations & Support - Onderhoud en optimalisatie van de cloudomgeving, met inbegrip van de juiste automatiserings- en orkestratiepraktijken, back-up- en herstelactiviteiten, en disaster recovery-taken.
Problemen oplossen - problemen met capaciteit, automatisering, connectiviteit en beveiliging aanpakken die verband houden met cloudimplementaties.
COMPTIA CLOUD+ CV0-003 ONLINE EXAMEN DETAILS
Meerkeuze en prestatiegerichte vragen (PBQ's): Performance-based questions zijn examenonderdelen die zijn ontworpen om het vermogen van een kandidaat te testen om problemen op te lossen in een real-world omgeving en worden geleverd als simulaties of binnen virtuele omgevingen)
90 vragen
Slaagscore 750 (op een schaal van 100-900)
Aanbieder van de tests: Person Vue (examencentrum of online examen).
Voorkennis
Om toegang te krijgen tot de CompTIA Cloud+ cursus en examen, wordt kandidaten aangeraden om te beschikken over:
24 tot 36 maanden werkervaring in networking, storage of IT datacenter administratie
CompTIA Network+ en/of CompTIA Server+ certificaten

€650
E-Learning
CompTIA Server+ - 1 jaar toegang, inclusief examen – eLearning
CompTIA Server+ - 1 jaar toegang, inclusief examen – eLearning
CompTIA Server+ is een wereldwijd erkende certificering die de praktische vaardigheden van IT-professionals aantoont bij het installeren, beheren en oplossen van problemen met servers in datacenters, naast on-premise en hybride omgevingen.
De versie van deze certificering is CompTIA Server+ SK0-005.
COMPTIA SERVER+ SK0-005 ONLINE CURSUS DETAILS
12 maanden toegang tot het platform
CompTIA CertMaster Learn (zelf-aangestuurde online cursus)
Meer dan 30 uur inhoud
12 videolessen met prestatiegerichte vragen
120 oefenvragen
Flashcards zorgen ervoor dat u de terminologie en acroniemen kent die nodig zijn voor het examen
Leerplan
90-question eindbeoordeling simuleert de test ervaring
Doelstellingen
Na het volgen van de CompTIA Server+ cursus en examen, zullen kandidaten leren over:
Installatie, beheer en configuratie van server hardware en server operating systemen
Implementatie van de juiste server hardening en security controls
Het oplossen van veel voorkomende server problemen gevonden door verschillende organisaties
Belangrijke concepten met betrekking tot disaster recovery, hoge beschikbaarheid en back-up
Vereenvoudigd serverbeheer door middel van scripting, virtualisatie en automatisering
Ervoor zorgen dat de serveromgeving voldoet aan de bedrijfsbehoeften, ongeacht factoren zoals de grootte en structuur van de organisatie
Het ter plaatse en op afstand uitvoeren van serverbeheer en probleemoplossingstaken
Bekendheid met "cloud computing" met betrekking tot serveronderhoud en -beheer.
Voor wie is de training bedoeld
Systeembeheerder
Datacenter Technicus
Server Beheerder
Netwerk Beheerder
Buitendiensttechnicus of ingenieur
IT-technicus
Ingenieur datacentrum
Inhoud
Server Hardware Installatie & Beheer - Installeren en onderhouden van fysieke hardware en opslag
Serverbeheer - Servers beheren en onderhouden, met inbegrip van OS-configuratie, toegangscontrole en virtualisatie
Beveiliging en noodherstel - technieken voor fysieke en netwerkgegevensbeveiliging toepassen, noodherstel begrijpen en back-uptechnieken implementeren
Problemen oplossen - Problemen met systeemhardware, software, connectiviteit, opslag en beveiliging diagnosticeren en oplossen
COMPTIA SERVER+ SK0-005 ONLINE EXAMEN DETAILS
Prestatiegerichte en meerkeuzevragen
90 vragen
Slaagscore 750 (op een schaal van 100-900)
Test aanbieder: Person Vue (Testcentrum of Online Testen).
Voorkennis
Om toegang te krijgen tot de CompTIA Server+ cursus en examen, wordt kandidaten aangeraden om te beschikken over:
CompTIA A+ certificaat of gelijkwaardig
Twee jaar ervaring met het werken in een server omgeving

€650
E-Learning
CompTIA Linux+ - 1 jaar toegang, inclusief examen – eLearning
CompTIA Linux+ - 1 jaar toegang, inclusief examen – eLearning
CompTIA Linux+ is een geavanceerde certificering voor diegenen die Linux gaan gebruiken om een breed scala aan elementen te beheren, zoals auto's, smartphones, servers en supercomputers.
De versie van deze certificering is CompTIA Linux+ XK0-005.
COMPTIA LINUX+ XK0-005 ONLINE CURSUS DETAILS
12 maanden toegang tot het platform
CompTIA CertMaster Learn (zelf-aangestuurde online cursus)
15 uur videolessen met prestatiegerichte vragen
150 oefenvragen
Flashcards zorgen ervoor dat u de terminologie en acroniemen kent die nodig zijn voor het examen
Leerplan
90-question eindbeoordeling simuleert de test ervaring
Doelstellingen
Na de CompTIA Linux+ opleiding zal de kandidaat leren om:
Systemen te configureren en hardware te beheren. Dit omvat de Linux boost proces concepten, netwerkverbinding parameters, kernel modellen, het beheren van opslag, lokalisatie opties, en cloud en virtualisatie technologieën
Systemen te bedienen en te onderhouden, inclusief het beheren van gebruikers en groepen, het beheren van services, software operaties, en het werken met bestanden. Kandidaten leren ook Linux-apparaten te gebruiken en te bedienen, serverrollen uit te leggen, taken te plannen en te automatiseren, en Linux grafische gebruikersinterfaces te vergelijken en te contrasteren
beveiligingsoplossingen in praktische situaties toe te passen, waaronder toegangs- en authenticatieberichten, gebruikers-/groepspermissies en eigendom, loggingdiensten, Linux-firewalls, back-up, compressie en herstel van bestanden, en andere best practices
Problemen oplossen en diagnosticeren met betrekking tot Linux op gebieden als systeemeigenschappen, hardware, toepassingen en gebruikers
Belangrijke automatiserings- en scriptingvaardigheden, zoals GIT-versiecontrole, orkestratieprocessen en -concepten, en BASH-scripts
Voor wie is de cursus bedoeld
Linux Beheerder
Netwerk Beheerder
Technisch Ondersteuningspecialist
Web Beheerder
Systeem Beheerder
Inhoud
Hardware & Systeem Configuratie - Configureer kernel modules, netwerk parameters, opslag, cloud en virtualisatie technologieën
Systeembeheer & onderhoud - Software en diensten beheren, en uitleg geven over serverrollen, taakplanning, en het gebruik en de werking van Linux-apparaten
Beveiliging - Begrijp best practices voor machtigingen en authenticatie, firewalls en bestandsbeheer
Linux-problemen oplossen en diagnosticeren - systeemeigenschappen en -processen analyseren en problemen met gebruikers, toepassingen en hardware oplossen
Automatisering en scripting - BASH-scripts uitvoeren, versiebeheer met Git, en orkestratieprocessen
COMPTIA LINUX+ XK0-005 ONLINE EXAMEN DETAILS
Prestatie-gebaseerde, Meerkeuze (Enkel Antwoord), Meerkeuze en Vul-in-de-Blank vragen
Maximum van 90 vragen
Slaagscore 720 (op een schaal van 100-900)
Aanbieder van het examen: Person Vue (Testcentrum of Online Testen).
Voorkennis
Om toegang te krijgen tot CompTIA Linux+ cursus en examen, wordt kandidaten aangeraden om te beschikken over:
CompTIA A + of CompTIA Network + certificaten
9 tot 12 maanden Linux admin ervaring

€650
E-Learning
AgilePgM ® (Agile Programmamanagement) e-learning, inclusief examen
AgilePgM® (Agile Programmamanagement) e-learning, inclusief examen
WAT IS AGILE PROGRAMMAMANAGEMENT (AGILEPGM®)
APMG AgilePgM (Agile Programmamanagement) is een raamwerk dat is ontwikkeld in samenwerking tussen APMG International en het Agile Business Consortium. Het is ontworpen rond het toepassen van de principes van Agile management op programmaniveau.
Het raamwerk biedt best practices en aantoonbaar nauwkeurig inzicht in hoe je de voordelen van Agile ten volle kunt benutten zonder de governance en controle op te offeren die nodig zijn om programma's succesvol te maken. Het kan worden toegepast op programma's en projecten van elke omvang, en de best practices kunnen zelfs voordelen opleveren op gebieden als change management, risicomanagement, enzovoort.
WAAR IS AGILEPGM NUTTIG VOOR?
AgilePgM helpt beoefenaars te profiteren van de voordelen van Agile op programmaniveau. Deze omvatten het hebben van een gedisciplineerde maar flexibele aanpak die kan reageren op bedrijfsveranderingen en toch optimale waarde kan leveren, medewerkers in staat stellen om resultaten te bereiken zonder onnodig toezicht, het aanmoedigen van betrokkenheid van belanghebbenden en samenwerking, en het bereiken van organisatorische verandering sneller en met lagere kosten.
AgilePgM kan door elk bedrijf of organisatie worden gebruikt, ongeacht grootte, industrie, sector, locatie, of iets anders. Het bestuderen van AgilePgM is ook een haalbare en lonende optie voor verschillende functierollen, waaronder projectmanagers, programmamanagers, risicomanagers, senior leiders, verandermanagers, IT-managers, enzovoort.
AgilePgM® Foundation 180d met examen online cursus
AgilePgM® Foundation is bedoeld om kandidaten te helpen erkend te worden als een betrouwbaar lid van een programma-, veranderings- of projectteam.
DETAILS VAN AGILEPGM FOUNDATION ONLINE CURSUS
Cursus duur: 16+ uur
Tutor ondersteuning
Quizzen & oefenexamens
Mobiel compatibel
APMG AgilePgM® Foundation examen
Doelstellingen
Na het volgen van de AgilePgM cursus, zullen de kandidaten geleerd hebben:
Hoe een programma te leiden en te structureren volgens de Agile methodologie
Verschillende governance technieken om programma's volledig in lijn te houden met strategische en stakeholder doelen
Hoe een Agile programma levenscyclus vorm te geven om de succesvolle oplevering van business transformaties te garanderen en tevens het rendement op investeringen te maximaliseren
Management- en controlepraktijken om Agile programma's te beoordelen, evenals individuele projecten, om de juiste niveaus van kwaliteit en afstemming te verzekeren
Alles wat nodig is om met succes het officiële Agile Programma Management Foundation (AgilePgM) examen af te leggen
Voor wie het bedoeld is
Traditionele en Agile bedrijven die willen profiteren van Agile programmamanagement best practices van wereldklasse
Project- en programmamanagers die staan te popelen om aantoonbaar effectieve tools, best practices en inzichten voor Agile management te bestuderen
Iedereen die op zoek is naar lucratieve carrièremogelijkheden in programmamanagement, evenals andere relevante gebieden zoals risicomanagement, verandermanagement, IT-management, enzovoort
AgilePgM teamleden die een introductie in het raamwerk nodig hebben
Inhoud
Overzicht
Filosofie & Principes
Levenscyclus en Producten
Planning
Rollen en verantwoordelijkheden
Governance
Beheer en controle
Kwaliteitsbeheer
ONLINE EXAMENFORMAAT EN KENMERKEN
50 meerkeuzevragen
Slaagscore: 25/50 - 50%
Duur: 40 minuten
Gesloten boek

€750
E-Learning
MS55348 Administering Microsoft Endpoint Configuration Manager (55348) Active Learning
Online
ma 23 jun. 2025
en 9 andere data
Volg de Administering Microsoft Endpoint Configuration Manager training en leer Configuration Manager te gebruiken om netwerkbronnen efficiënt te beheren. In deze vijfdaagse training leer je de dagelijkse beheertaken, waaronder het beheren van toepassingen, clientgezondheid, hardware- en software-inventaris, besturingssysteemimplementatie en software-updates met behulp van Configuration Manager.
Na afronding van deze training kun je onder andere:
De functies gebruiken die Configuration Manager en Intune bevatten om pc's en mobiele apparaten in een bedrijfsomgeving te beheren
De Configuration Manager-client implementeren en beheren
Endpoint Protection optimaliseren, compliance beheren en beheerquery's en -rapporten maken
Deze training bevat Engelstalig lesmateriaal en wordt gegeven door een Nederlandssprekende docent (indien gewenst ook mogelijk in het Engels).
This five-day course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize Endpoint Protection, manage compliance, and create management queries and reports.Although this course and the associated labs are written for Microsoft Endpoint Configuration Manager and Windows 11, the skills taught will also be backwards compatible with previous editions of System Center Configuration Manager and Windows 10.
Describe the features Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment.
Analyze data by using queries and reports.
Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Intune.
Deploy and manage the Configuration Manager client.
Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering.
Identify and configure the most appropriate method to distribute and manage content used for deployments.
Distribute, deploy, and monitor applications for managed users and systems.
Maintain software updates for PCs that Configuration Manager manages.
Implement Endpoint Protection for managed PCs.
Manage configuration items, baselines, and profiles to assess and configure compliance settings and data access for users and devices.
Configure an operating-system deployment strategy by using Configuration Manager.
Manage and maintain a Configuration Manager site.
Lesmethode
Bij Master IT train je met onze unieke lesmethode Active Learning, hiermee leer je aantoonbaar effectiever!
Wij zjn er namelijk van overtuigd dat je slimmer en met meer plezier leert als je actief met je lesstof omgaat. Onze klassen zijn gevuld met maximaal 8 cursisten. Hierbij luister je niet passief naar een trainer, maar ga je interactief en 1-op-1 met de trainer aan de slag om ervoor te zorgen dat jouw leerdoelen behaald worden. De theorie maak je je zoveel mogelijk zelf eigen, de nadruk van de begeleiding ligt op het begrijpen en toepassen van die theorie in de praktijk. Zo leer je alleen datgene wat je echt nodig hebt.
Je bepaalt zelf je leertempo.
De trainer coacht je bij het definiëren van jouw leertraject.
Je onthoudt en begrijpt je nieuwe kennis beter.
Alles draait om toepassing van de stof in jouw praktijk.
Om alle beschikbare trainingsdata in te zien, bekijk dan onze eigen website
Doelgroep
This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications.This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications.
Voorkennis
Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching, and addressing.
Active Directory Domain Services (AD DS) principles and fundamentals of AD DS management.
Installation, configuration, and troubleshooting for Windows-based personal computers.
Basic concepts of public key infrastructure (PKI) security.
Basic understanding of scripting and Windows PowerShell syntax.
Basic understanding of Windows Server roles and services.
Basic understanding of the configuration options for iOS and Android Mobile device platforms.
Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching, and addressing.
Active Directory Domain Services (AD DS) principles and fundamentals of AD DS management.
Installation, configuration, and troubleshooting for Windows-based personal computers.
Basic concepts of public key infrastructure (PKI) security.
Basic understanding of scripting and Windows PowerShell syntax.
Basic understanding of Windows Server roles and services.
Basic understanding of the configuration options for iOS and Android Mobile device platforms.
Onderdelen
Module 1: Managing computers and mobile devices in the enterpriseThis module describes the features of Configuration Manager that you can use to perform complex management tasks, including the following tasks; Hardware and software inventory, Application management, Operating system deployment, Settings management, Software update management, Remote client troubleshooting, and Protection from malware. Microsoft System Center Configuration Manager (Configuration Manager) provides various features that can help you manage devices and users both on-premises and in the cloud. Organizations that use Configuration Manager find that they can provide more effective IT services in relation to software deployment, settings management, and asset management. This module introduces you to the primary features, architecture, and management tools used with Configuration Manager. This module also provides a foundation that relates to all other features and management tasks discussed in the modules that follow this one.Lessons
Overview of systems management by using enterprise management solutions
Overview of the Configuration Manager architecture
Overview of the Configuration Manager administrative tools
Tools for monitoring and troubleshooting a Configuration Manager site
Lab 1: Exploring the Configuration Manager tools
Exploring the Configuration Manager Tools
After completing this module, students will be able to:
Searching in the Configuration Manager console
Using Windows PowerShell with Configuration Manager
Using Configuration Manager Service Manager to manage components
Monitoring site and component status
Reviewing log files by using the Configuration Manager Trace tool
Module 2: Analyzing data using queries, reports, and CMPivotThe Microsoft Endpoint Configuration Manager database stores a large amount of data about the resources in your environment. You might not always want to perform all management tasks on all resources simultaneously. Therefore, to help you locate devices or user objects in your environment that meet specific criteria, you can create queries. You then can use these queries to create collections or to find additional information about specific resources. This module describes queries and methods of creating and running them. In addition to queries, you can run reports to view various types of information related to your Configuration Manager environment. To run Configuration Manager reports, you must install and configure a reporting services point, which this module details. This module also covers CMPivot, which allows you to collect and view real-time data on all the connected devices in your environment. It will enable you to make real-time decisionsLessons
Introduction to queries
Configuring SQL Server Reporting Services
Analyzing the real-time state of a device by using CMPivot
Lab 1: Creating and running queries
Creating data queries
Creating subselect queries
Lab 2: Configuring SSRS
Configuring a reporting services point
Lab 3: Analyzing the real-time state of a device by using CMPivot
Using CMPivot to Analyze the current state of devices
After completing this module, students will be able to:
Analyze data using queries, reports, and CMPivot
Module 3: Preparing the Configuration Manager management infrastructureYou can manage computer and user resources within a Microsoft Endpoint Configuration Manager (Configuration Manager) environment only when Configuration Manager has discovered these resources and assigned them to a site. In this module, you will learn about boundaries and boundary groups that help create logical network locations containing computer devices that you need to manage in your Configuration Manager infrastructure. You can use these boundary configurations for automatic site assignment and to help clients find content and services from associated site systems. You will also learn about the discovery processes that you can use to identify computers, users, and the network infrastructure within your network environment. You will then learn about collections that support logical groupings of resources. You use these groupings for management tasks, such as targeting software updates, managing application deployments, or deploying compliance settings to resources.Lessons
Configuring site boundaries and boundary groups
Configuring resource discovery
Organizing resources using device and user collections
Lab 1: Configuring boundaries and resource discovery
Configuring boundaries, boundary groups, and fallback relationships
Configuring Active Directory discovery methods
Lab 2: Configuring user and device collections
Creating a device collection
Creating a user collection
Configuring a maintenance window
After completing this module, students will be able to:
Prepare a Configuration Manager management infrastructure
Module 4: Deploying and managing the Configuration Manager clientYou can install the Microsoft Endpoint Configuration Manager (Configuration Manager) client software on windows-based devices such as servers, workstations, and laptops. You then can manage these devices and perform operations such as reporting hardware and software inventory information, installing and updating software, and configuring settings required for compliance. Configuration Manager provides several options for installing the client software. This module explains the supported operating systems and devices, software requirements, and different methods for installing the client software. This module also describes some of the default and custom client settings that you can configure. After installing the client software, you can configure client settings and control how the various client components interact between the managed device and the Configuration Manager environment.Lessons
Overview of the Configuration Manager client
Deploying the Configuration Manager client
Configuring and monitoring client status
Managing client settings and performing management operations
Lab 1: Deploying the Microsoft Endpoint Configuration Manager client software
Preparing the site for client installation
Deploying the Configuration Manager client software by using client push installation
Lab 2: Configuring and monitoring client status
Configuring and monitoring client health status
Lab 3: Managing client settings
Configuring client settings
Performing management operations
After completing this module, students will be able to:
Deploy and manage the Configuration Manager client.
Module 5: Managing inventory for PCs and applicationsThis module provides an overview of inventory collection, and explains how you can manage the information collected. You also will learn about the process of collecting hardware and software inventory, initiating inventory cycles, and initiating and securing inventory collection. This module also covers the use of software metering to monitor program usage, and the configuration and management of Asset Intelligence.Lessons
Overview of inventory collection
Configuring hardware and software inventory
Managing inventory collection
Configuring software metering
Configuring and managing Asset Intelligence
Lab 1: Configuring and managing inventory collection
Configuring and managing hardware inventory
Lab 2: Configuring software metering
Configuring software metering
Lab 3: Configuring and managing Asset Intelligence
Preparing the site for Asset Intelligence
Configuring Asset Intelligence
Monitoring license agreements by using Asset Intelligence
Viewing Asset Intelligence reports
After completing this module, students will be able to:
Manage inventory for PCs and applications.
Module 6: Distributing and managing content used for deploymentsMicrosoft Endpoint Configuration Manager (Configuration Manager) clients obtain content, such as packages, applications, software updates, and even operating system images, from a content infrastructure made up of distribution points and peer cache sources. In this module, you will review the content distribution and management features, configure distribution points, and learn how to distribute and monitor content. You also will perform content validation and content prestaging.Lessons
Preparing the infrastructure for content management
Distributing and managing content on distribution points
Lab 1: Distributing and managing content for deployments
Installing a new distribution point
Managing content distribution
After completing this module, students will be able to:
Describe containers in Windows Server.
Explain how to deploy containers.
Explain how to install, configure, and manage containers using Docker.
Module 7: Deploying and managing applicationsIn this module, you will learn about the methods for creating, deploying, and managing applications with Configuration Manager. You also will learn to use the Software Center and the Application Catalog to install available applications. You will learn about managing deployments on unconventional applications.Lessons
Overview of application management
Creating applications
Deploying applications
Managing applications
Deploying and managing Windows apps
Lab 1: Creating and deploying applications
Creating applications with requirements
Deploying applications
Lab 2: Managing application supersedence and removal
Managing application supersedence
Uninstalling the Excel Viewer application
Lab 3: Using Configuration Manager to deploy Windows apps
Configuring support for sideloading Windows apps
Configuring a Windows app
Deploying Windows apps to user
After completing this module, students will be able to:
Deploy and manage applications
Module 8: Maintaining software updates for managed PCsThis module explains how to use the software updates feature in Configuration Manager to implement an end-to-end management process for the complex task of identifying, deploying, and monitoring Microsoft and third-party software updates to your Configuration Manager clients.Lessons
The software updates process
Preparing a Configuration Manager site for software updates
Managing software updates
Configuring automatic deployment rules
Monitoring and troubleshooting software updates
Enabling third-party updates
Lab 1: Configuring the site for software updates
Configuring and synchronizing the software update point
Lab 2: Deploying and managing software updates
Determining software update compliance
Deploying software updates to clients
Configuring automatic deployment rules
After completing this module, students will be able to:
Maintain software updates for managed PCs.
Module 9: Implementing Defender Protection for managed PCsThis module explains how to use the security-related features provided by Configuration Manager to help protect client computers from malware threats, and to configure specific Windows Defender Firewall settings for clients. Based on Endpoint Protection functionality, Endpoint Protection in Configuration Manager supports the deployment, management, and monitoring of antimalware policies, Windows Defender Firewall settings, Windows Defender Application Guard policies, Windows Defender Exploit Guard policies, and Windows Defender Application Control policies on client computers.Lessons
Overview of Endpoint Protection in Configuration Manager
Configuring, deploying, and monitoring Endpoint Protection policies
Configuring and deploying advanced threat policies
Lab 1: Implementing Endpoint Protection
Configuring the Endpoint Protection point and client settings
Configuring and deploying Endpoint Protection policies
Monitoring Endpoint Protection
Lab 2: Implementing advanced threat policies
Creating and deploying advanced threat protection policies
After completing this module, students will be able to:
Implement Defender Protection for managed PCs
Module 10: Managing compliance and secure data accessMany enterprise organizations require systems, such as servers, laptops, desktop computers, and mobile devices, to meet specific configuration and compliance requirements. Compliance settings in Configuration Manager can play a key role in identifying existing configurations, discovering systems that have adverse configuration changes, and remediating these settings automatically when necessary. Compliance settings also can help control how users manage and access data in the enterprise network environment. For computers that run Windows 8 and newer operating systems, you can manage data using folder redirection, offline files, and roaming profiles. You also can control access to data using remote connection profiles, virtual private network (VPN) profiles, Wi-Fi profiles, and certificate profiles. This module describes the compliance settings that you can manage using Configuration Manager. You will learn to use these settings to maintain configuration requirements and to provide secure data access to enterprise resources.Lessons
Overview of Compliance Settings
Configuring compliance settings
Viewing compliance results
Managing resource and data access
Lab 1: Managing compliance settings
Managing configuration items and baselines
Viewing compliance settings and reports
Configuring remediation in compliance settings
Using compliance information to create collections
After completing this module, students will be able to:
Manage compliance and secure data access
Module 11: Managing operating system deploymentThis module explains how to use the operating system deployment feature in Configuration Manager to create operating system images that you can deploy to unmanaged computers and those managed by Configuration Manager. There are several scenarios in which you can deploy operating systems by using Configuration Manager, including when you are working with new systems or when you are upgrading existing ones. Operating system deployment uses both Configuration Manager and Windows components to manage and deliver operating system images. You can configure settings on a reference computer prior to capturing an image of its operating system or by using task sequences that Configuration Manager creates after you deploy the image to a target system. This module also explains how to use Configuration Manager to create a strategy for operating-system deployments . And also, it explains and how to manage Windows as a service. This module explains how to manage Windows as a service.Lessons
An overview of operating system deployment
Preparing a site for operating system deployment
Deploying an operating system
Managing Windows as a service
Lab 1: Preparing the site for operating-system deployment
Managing the site system roles used to support operating system deployment
Managing packages to support operating system deployment
Lab 2: Deploying operating-system images for bare-metal installations
Preparing the operating system image
Creating a task sequence to deploy an image
Deploying an image
After completing this module, students will be able to:
Manage operating system deployments.
Module 12: Managing and maintaining a Configuration Manager siteThis module describes role-based administration, Remote Tools, and the site maintenance tasks that you can manage by using Configuration Manager. This module also describes how to back up and recover a Configuration Manager site system and use the recommendation(s) from Management Insights to simplify administration.Lessons
Configuring role-based administration
Configuring Remote Tools
Overview of Configuration Manager site maintenance and Management Insights
Backing up and recovering a Configuration Manager site
Updating the Configuration Manager infrastructure
Lab 1: Configuring role-based administration
Configuring a new scope for Toronto administrators
Configuring a new administrative user
Lab 2: Configuring Remote Tools
Configuring the Remote Tools client settings and permissions
Managing desktops by using Remote Control
Lab 3: Maintaining a Configuration Manager site
Configuring maintenance tasks in Configuration Manager
Configuring the Backup Site Server task
Recovering a site from a backup
After completing this module, students will be able to:
Manage and maintain a Configuration Manager site.
Module 13: What’s new in Microsoft Endpoint Configuration ManagerThis modules describes the features that have been released since Configuration Manager 2012.Lessons
Whats new in Microsoft Endpoint Manager covering each semi annual release.
After completing this module, students will be able to:
Understand and leverage the new features available in each semi annual release.
Module 1: Managing computers and mobile devices in the enterpriseThis module describes the features of Configuration Manager that you can use to perform complex management tasks, including the following tasks; Hardware and software inventory, Application management, Operating system deployment, Settings management, Software update management, Remote client troubleshooting, and Protection from malware. Microsoft System Center Configuration Manager (Configuration Manager) provides various features that can help you manage devices and users both on-premises and in the cloud. Organizations that use Configuration Manager find that they can provide more effective IT services in relation to software deployment, settings management, and asset management. This module introduces you to the primary features, architecture, and management tools used with Configuration Manager. This module also provides a foundation that relates to all other features and management tasks discussed in the modules that follow this one.Lessons
Overview of systems management by using enterprise management solutions
Overview of the Configuration Manager architecture
Overview of the Configuration Manager administrative tools
Tools for monitoring and troubleshooting a Configuration Manager site
Lab 1: Exploring the Configuration Manager tools
Exploring the Configuration Manager Tools
After completing this module, students will be able to:
Searching in the Configuration Manager console
Using Windows PowerShell with Configuration Manager
Using Configuration Manager Service Manager to manage components
Monitoring site and component status
Reviewing log files by using the Configuration Manager Trace tool
Module 2: Analyzing data using queries, reports, and CMPivotThe Microsoft Endpoint Configuration Manager database stores a large amount of data about the resources in your environment. You might not always want to perform all management tasks on all resources simultaneously. Therefore, to help you locate devices or user objects in your environment that meet specific criteria, you can create queries. You then can use these queries to create collections or to find additional information about specific resources. This module describes queries and methods of creating and running them. In addition to queries, you can run reports to view various types of information related to your Configuration Manager environment. To run Configuration Manager reports, you must install and configure a reporting services point, which this module details. This module also covers CMPivot, which allows you to collect and view real-time data on all the connected devices in your environment. It will enable you to make real-time decisionsLessons
Introduction to queries
Configuring SQL Server Reporting Services
Analyzing the real-time state of a device by using CMPivot
Lab 1: Creating and running queries
Creating data queries
Creating subselect queries
Lab 2: Configuring SSRS
Configuring a reporting services point
Lab 3: Analyzing the real-time state of a device by using CMPivot
Using CMPivot to Analyze the current state of devices
After completing this module, students will be able to:
Analyze data using queries, reports, and CMPivot
Module 3: Preparing the Configuration Manager management infrastructureYou can manage computer and user resources within a Microsoft Endpoint Configuration Manager (Configuration Manager) environment only when Configuration Manager has discovered these resources and assigned them to a site. In this module, you will learn about boundaries and boundary groups that help create logical network locations containing computer devices that you need to manage in your Configuration Manager infrastructure. You can use these boundary configurations for automatic site assignment and to help clients find content and services from associated site systems. You will also learn about the discovery processes that you can use to identify computers, users, and the network infrastructure within your network environment. You will then learn about collections that support logical groupings of resources. You use these groupings for management tasks, such as targeting software updates, managing application deployments, or deploying compliance settings to resources.Lessons
Configuring site boundaries and boundary groups
Configuring resource discovery
Organizing resources using device and user collections
Lab 1: Configuring boundaries and resource discovery
Configuring boundaries, boundary groups, and fallback relationships
Configuring Active Directory discovery methods
Lab 2: Configuring user and device collections
Creating a device collection
Creating a user collection
Configuring a maintenance window
After completing this module, students will be able to:
Prepare a Configuration Manager management infrastructure
Module 4: Deploying and managing the Configuration Manager clientYou can install the Microsoft Endpoint Configuration Manager (Configuration Manager) client software on windows-based devices such as servers, workstations, and laptops. You then can manage these devices and perform operations such as reporting hardware and software inventory information, installing and updating software, and configuring settings required for compliance. Configuration Manager provides several options for installing the client software. This module explains the supported operating systems and devices, software requirements, and different methods for installing the client software. This module also describes some of the default and custom client settings that you can configure. After installing the client software, you can configure client settings and control how the various client components interact between the managed device and the Configuration Manager environment.Lessons
Overview of the Configuration Manager client
Deploying the Configuration Manager client
Configuring and monitoring client status
Managing client settings and performing management operations
Lab 1: Deploying the Microsoft Endpoint Configuration Manager client software
Preparing the site for client installation
Deploying the Configuration Manager client software by using client push installation
Lab 2: Configuring and monitoring client status
Configuring and monitoring client health status
Lab 3: Managing client settings
Configuring client settings
Performing management operations
After completing this module, students will be able to:
Deploy and manage the Configuration Manager client.
Module 5: Managing inventory for PCs and applicationsThis module provides an overview of inventory collection, and explains how you can manage the information collected. You also will learn about the process of collecting hardware and software inventory, initiating inventory cycles, and initiating and securing inventory collection. This module also covers the use of software metering to monitor program usage, and the configuration and management of Asset Intelligence.Lessons
Overview of inventory collection
Configuring hardware and software inventory
Managing inventory collection
Configuring software metering
Configuring and managing Asset Intelligence
Lab 1: Configuring and managing inventory collection
Configuring and managing hardware inventory
Lab 2: Configuring software metering
Configuring software metering
Lab 3: Configuring and managing Asset Intelligence
Preparing the site for Asset Intelligence
Configuring Asset Intelligence
Monitoring license agreements by using Asset Intelligence
Viewing Asset Intelligence reports
After completing this module, students will be able to:
Manage inventory for PCs and applications.
Module 6: Distributing and managing content used for deploymentsMicrosoft Endpoint Configuration Manager (Configuration Manager) clients obtain content, such as packages, applications, software updates, and even operating system images, from a content infrastructure made up of distribution points and peer cache sources. In this module, you will review the content distribution and management features, configure distribution points, and learn how to distribute and monitor content. You also will perform content validation and content prestaging.Lessons
Preparing the infrastructure for content management
Distributing and managing content on distribution points
Lab 1: Distributing and managing content for deployments
Installing a new distribution point
Managing content distribution
After completing this module, students will be able to:
Describe containers in Windows Server.
Explain how to deploy containers.
Explain how to install, configure, and manage containers using Docker.
Module 7: Deploying and managing applicationsIn this module, you will learn about the methods for creating, deploying, and managing applications with Configuration Manager. You also will learn to use the Software Center and the Application Catalog to install available applications. You will learn about managing deployments on unconventional applications.Lessons
Overview of application management
Creating applications
Deploying applications
Managing applications
Deploying and managing Windows apps
Lab 1: Creating and deploying applications
Creating applications with requirements
Deploying applications
Lab 2: Managing application supersedence and removal
Managing application supersedence
Uninstalling the Excel Viewer application
Lab 3: Using Configuration Manager to deploy Windows apps
Configuring support for sideloading Windows apps
Configuring a Windows app
Deploying Windows apps to user
After completing this module, students will be able to:
Deploy and manage applications
Module 8: Maintaining software updates for managed PCsThis module explains how to use the software updates feature in Configuration Manager to implement an end-to-end management process for the complex task of identifying, deploying, and monitoring Microsoft and third-party software updates to your Configuration Manager clients.Lessons
The software updates process
Preparing a Configuration Manager site for software updates
Managing software updates
Configuring automatic deployment rules
Monitoring and troubleshooting software updates
Enabling third-party updates
Lab 1: Configuring the site for software updates
Configuring and synchronizing the software update point
Lab 2: Deploying and managing software updates
Determining software update compliance
Deploying software updates to clients
Configuring automatic deployment rules
After completing this module, students will be able to:
Maintain software updates for managed PCs.
Module 9: Implementing Defender Protection for managed PCsThis module explains how to use the security-related features provided by Configuration Manager to help protect client computers from malware threats, and to configure specific Windows Defender Firewall settings for clients. Based on Endpoint Protection functionality, Endpoint Protection in Configuration Manager supports the deployment, management, and monitoring of antimalware policies, Windows Defender Firewall settings, Windows Defender Application Guard policies, Windows Defender Exploit Guard policies, and Windows Defender Application Control policies on client computers.Lessons
Overview of Endpoint Protection in Configuration Manager
Configuring, deploying, and monitoring Endpoint Protection policies
Configuring and deploying advanced threat policies
Lab 1: Implementing Endpoint Protection
Configuring the Endpoint Protection point and client settings
Configuring and deploying Endpoint Protection policies
Monitoring Endpoint Protection
Lab 2: Implementing advanced threat policies
Creating and deploying advanced threat protection policies
After completing this module, students will be able to:
Implement Defender Protection for managed PCs
Module 10: Managing compliance and secure data accessMany enterprise organizations require systems, such as servers, laptops, desktop computers, and mobile devices, to meet specific configuration and compliance requirements. Compliance settings in Configuration Manager can play a key role in identifying existing configurations, discovering systems that have adverse configuration changes, and remediating these settings automatically when necessary. Compliance settings also can help control how users manage and access data in the enterprise network environment. For computers that run Windows 8 and newer operating systems, you can manage data using folder redirection, offline files, and roaming profiles. You also can control access to data using remote connection profiles, virtual private network (VPN) profiles, Wi-Fi profiles, and certificate profiles. This module describes the compliance settings that you can manage using Configuration Manager. You will learn to use these settings to maintain configuration requirements and to provide secure data access to enterprise resources.Lessons
Overview of Compliance Settings
Configuring compliance settings
Viewing compliance results
Managing resource and data access
Lab 1: Managing compliance settings
Managing configuration items and baselines
Viewing compliance settings and reports
Configuring remediation in compliance settings
Using compliance information to create collections
After completing this module, students will be able to:
Manage compliance and secure data access
Module 11: Managing operating system deploymentThis module explains how to use the operating system deployment feature in Configuration Manager to create operating system images that you can deploy to unmanaged computers and those managed by Configuration Manager. There are several scenarios in which you can deploy operating systems by using Configuration Manager, including when you are working with new systems or when you are upgrading existing ones. Operating system deployment uses both Configuration Manager and Windows components to manage and deliver operating system images. You can configure settings on a reference computer prior to capturing an image of its operating system or by using task sequences that Configuration Manager creates after you deploy the image to a target system. This module also explains how to use Configuration Manager to create a strategy for operating-system deployments . And also, it explains and how to manage Windows as a service. This module explains how to manage Windows as a service.Lessons
An overview of operating system deployment
Preparing a site for operating system deployment
Deploying an operating system
Managing Windows as a service
Lab 1: Preparing the site for operating-system deployment
Managing the site system roles used to support operating system deployment
Managing packages to support operating system deployment
Lab 2: Deploying operating-system images for bare-metal installations
Preparing the operating system image
Creating a task sequence to deploy an image
Deploying an image
After completing this module, students will be able to:
Manage operating system deployments.
Module 12: Managing and maintaining a Configuration Manager siteThis module describes role-based administration, Remote Tools, and the site maintenance tasks that you can manage by using Configuration Manager. This module also describes how to back up and recover a Configuration Manager site system and use the recommendation(s) from Management Insights to simplify administration.Lessons
Configuring role-based administration
Configuring Remote Tools
Overview of Configuration Manager site maintenance and Management Insights
Backing up and recovering a Configuration Manager site
Updating the Configuration Manager infrastructure
Lab 1: Configuring role-based administration
Configuring a new scope for Toronto administrators
Configuring a new administrative user
Lab 2: Configuring Remote Tools
Configuring the Remote Tools client settings and permissions
Managing desktops by using Remote Control
Lab 3: Maintaining a Configuration Manager site
Configuring maintenance tasks in Configuration Manager
Configuring the Backup Site Server task
Recovering a site from a backup
After completing this module, students will be able to:
Manage and maintain a Configuration Manager site.
Module 13: What’s new in Microsoft Endpoint Configuration ManagerThis modules describes the features that have been released since Configuration Manager 2012.Lessons
Whats new in Microsoft Endpoint Manager covering each semi annual release.
After completing this module, students will be able to:
Understand and leverage the new features available in each semi annual release.

€2.495
E-Learning
max 9
5 dagen
MS55348 Administering Microsoft Endpoint Configuration Manager (55348) E-Learning
Volg de Administering Microsoft Endpoint Configuration Manager training en leer Configuration Manager te gebruiken om netwerkbronnen efficiënt te beheren. In deze vijfdaagse training leer je de dagelijkse beheertaken, waaronder het beheren van toepassingen, clientgezondheid, hardware- en software-inventaris, besturingssysteemimplementatie en software-updates met behulp van Configuration Manager.
Na afronding van deze training kun je onder andere:
De functies gebruiken die Configuration Manager en Intune bevatten om pc's en mobiele apparaten in een bedrijfsomgeving te beheren
De Configuration Manager-client implementeren en beheren
Endpoint Protection optimaliseren, compliance beheren en beheerquery's en -rapporten maken
This five-day course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize Endpoint Protection, manage compliance, and create management queries and reports.Although this course and the associated labs are written for Microsoft Endpoint Configuration Manager and Windows 11, the skills taught will also be backwards compatible with previous editions of System Center Configuration Manager and Windows 10.
Describe the features Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment.
Analyze data by using queries and reports.
Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Intune.
Deploy and manage the Configuration Manager client.
Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering.
Identify and configure the most appropriate method to distribute and manage content used for deployments.
Distribute, deploy, and monitor applications for managed users and systems.
Maintain software updates for PCs that Configuration Manager manages.
Implement Endpoint Protection for managed PCs.
Manage configuration items, baselines, and profiles to assess and configure compliance settings and data access for users and devices.
Configure an operating-system deployment strategy by using Configuration Manager.
Manage and maintain a Configuration Manager site.
Lesmethode
Ben je op zoek naar volledige zelfstudie? Wij bieden je de mogelijkheid om deze training volledig in jouw eigen tijd te volgen. Uiteraard met het officiële Engelstalige lesmateriaal waarmee je de juiste kennis opdoet.
Doelgroep
This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications.This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications.
Voorkennis
Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching, and addressing.
Active Directory Domain Services (AD DS) principles and fundamentals of AD DS management.
Installation, configuration, and troubleshooting for Windows-based personal computers.
Basic concepts of public key infrastructure (PKI) security.
Basic understanding of scripting and Windows PowerShell syntax.
Basic understanding of Windows Server roles and services.
Basic understanding of the configuration options for iOS and Android Mobile device platforms.
Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching, and addressing.
Active Directory Domain Services (AD DS) principles and fundamentals of AD DS management.
Installation, configuration, and troubleshooting for Windows-based personal computers.
Basic concepts of public key infrastructure (PKI) security.
Basic understanding of scripting and Windows PowerShell syntax.
Basic understanding of Windows Server roles and services.
Basic understanding of the configuration options for iOS and Android Mobile device platforms.
Onderdelen
Module 1: Managing computers and mobile devices in the enterpriseThis module describes the features of Configuration Manager that you can use to perform complex management tasks, including the following tasks; Hardware and software inventory, Application management, Operating system deployment, Settings management, Software update management, Remote client troubleshooting, and Protection from malware. Microsoft System Center Configuration Manager (Configuration Manager) provides various features that can help you manage devices and users both on-premises and in the cloud. Organizations that use Configuration Manager find that they can provide more effective IT services in relation to software deployment, settings management, and asset management. This module introduces you to the primary features, architecture, and management tools used with Configuration Manager. This module also provides a foundation that relates to all other features and management tasks discussed in the modules that follow this one.Lessons
Overview of systems management by using enterprise management solutions
Overview of the Configuration Manager architecture
Overview of the Configuration Manager administrative tools
Tools for monitoring and troubleshooting a Configuration Manager site
Lab 1: Exploring the Configuration Manager tools
Exploring the Configuration Manager Tools
After completing this module, students will be able to:
Searching in the Configuration Manager console
Using Windows PowerShell with Configuration Manager
Using Configuration Manager Service Manager to manage components
Monitoring site and component status
Reviewing log files by using the Configuration Manager Trace tool
Module 2: Analyzing data using queries, reports, and CMPivotThe Microsoft Endpoint Configuration Manager database stores a large amount of data about the resources in your environment. You might not always want to perform all management tasks on all resources simultaneously. Therefore, to help you locate devices or user objects in your environment that meet specific criteria, you can create queries. You then can use these queries to create collections or to find additional information about specific resources. This module describes queries and methods of creating and running them. In addition to queries, you can run reports to view various types of information related to your Configuration Manager environment. To run Configuration Manager reports, you must install and configure a reporting services point, which this module details. This module also covers CMPivot, which allows you to collect and view real-time data on all the connected devices in your environment. It will enable you to make real-time decisionsLessons
Introduction to queries
Configuring SQL Server Reporting Services
Analyzing the real-time state of a device by using CMPivot
Lab 1: Creating and running queries
Creating data queries
Creating subselect queries
Lab 2: Configuring SSRS
Configuring a reporting services point
Lab 3: Analyzing the real-time state of a device by using CMPivot
Using CMPivot to Analyze the current state of devices
After completing this module, students will be able to:
Analyze data using queries, reports, and CMPivot
Module 3: Preparing the Configuration Manager management infrastructureYou can manage computer and user resources within a Microsoft Endpoint Configuration Manager (Configuration Manager) environment only when Configuration Manager has discovered these resources and assigned them to a site. In this module, you will learn about boundaries and boundary groups that help create logical network locations containing computer devices that you need to manage in your Configuration Manager infrastructure. You can use these boundary configurations for automatic site assignment and to help clients find content and services from associated site systems. You will also learn about the discovery processes that you can use to identify computers, users, and the network infrastructure within your network environment. You will then learn about collections that support logical groupings of resources. You use these groupings for management tasks, such as targeting software updates, managing application deployments, or deploying compliance settings to resources.Lessons
Configuring site boundaries and boundary groups
Configuring resource discovery
Organizing resources using device and user collections
Lab 1: Configuring boundaries and resource discovery
Configuring boundaries, boundary groups, and fallback relationships
Configuring Active Directory discovery methods
Lab 2: Configuring user and device collections
Creating a device collection
Creating a user collection
Configuring a maintenance window
After completing this module, students will be able to:
Prepare a Configuration Manager management infrastructure
Module 4: Deploying and managing the Configuration Manager clientYou can install the Microsoft Endpoint Configuration Manager (Configuration Manager) client software on windows-based devices such as servers, workstations, and laptops. You then can manage these devices and perform operations such as reporting hardware and software inventory information, installing and updating software, and configuring settings required for compliance. Configuration Manager provides several options for installing the client software. This module explains the supported operating systems and devices, software requirements, and different methods for installing the client software. This module also describes some of the default and custom client settings that you can configure. After installing the client software, you can configure client settings and control how the various client components interact between the managed device and the Configuration Manager environment.Lessons
Overview of the Configuration Manager client
Deploying the Configuration Manager client
Configuring and monitoring client status
Managing client settings and performing management operations
Lab 1: Deploying the Microsoft Endpoint Configuration Manager client software
Preparing the site for client installation
Deploying the Configuration Manager client software by using client push installation
Lab 2: Configuring and monitoring client status
Configuring and monitoring client health status
Lab 3: Managing client settings
Configuring client settings
Performing management operations
After completing this module, students will be able to:
Deploy and manage the Configuration Manager client.
Module 5: Managing inventory for PCs and applicationsThis module provides an overview of inventory collection, and explains how you can manage the information collected. You also will learn about the process of collecting hardware and software inventory, initiating inventory cycles, and initiating and securing inventory collection. This module also covers the use of software metering to monitor program usage, and the configuration and management of Asset Intelligence.Lessons
Overview of inventory collection
Configuring hardware and software inventory
Managing inventory collection
Configuring software metering
Configuring and managing Asset Intelligence
Lab 1: Configuring and managing inventory collection
Configuring and managing hardware inventory
Lab 2: Configuring software metering
Configuring software metering
Lab 3: Configuring and managing Asset Intelligence
Preparing the site for Asset Intelligence
Configuring Asset Intelligence
Monitoring license agreements by using Asset Intelligence
Viewing Asset Intelligence reports
After completing this module, students will be able to:
Manage inventory for PCs and applications.
Module 6: Distributing and managing content used for deploymentsMicrosoft Endpoint Configuration Manager (Configuration Manager) clients obtain content, such as packages, applications, software updates, and even operating system images, from a content infrastructure made up of distribution points and peer cache sources. In this module, you will review the content distribution and management features, configure distribution points, and learn how to distribute and monitor content. You also will perform content validation and content prestaging.Lessons
Preparing the infrastructure for content management
Distributing and managing content on distribution points
Lab 1: Distributing and managing content for deployments
Installing a new distribution point
Managing content distribution
After completing this module, students will be able to:
Describe containers in Windows Server.
Explain how to deploy containers.
Explain how to install, configure, and manage containers using Docker.
Module 7: Deploying and managing applicationsIn this module, you will learn about the methods for creating, deploying, and managing applications with Configuration Manager. You also will learn to use the Software Center and the Application Catalog to install available applications. You will learn about managing deployments on unconventional applications.Lessons
Overview of application management
Creating applications
Deploying applications
Managing applications
Deploying and managing Windows apps
Lab 1: Creating and deploying applications
Creating applications with requirements
Deploying applications
Lab 2: Managing application supersedence and removal
Managing application supersedence
Uninstalling the Excel Viewer application
Lab 3: Using Configuration Manager to deploy Windows apps
Configuring support for sideloading Windows apps
Configuring a Windows app
Deploying Windows apps to user
After completing this module, students will be able to:
Deploy and manage applications
Module 8: Maintaining software updates for managed PCsThis module explains how to use the software updates feature in Configuration Manager to implement an end-to-end management process for the complex task of identifying, deploying, and monitoring Microsoft and third-party software updates to your Configuration Manager clients.Lessons
The software updates process
Preparing a Configuration Manager site for software updates
Managing software updates
Configuring automatic deployment rules
Monitoring and troubleshooting software updates
Enabling third-party updates
Lab 1: Configuring the site for software updates
Configuring and synchronizing the software update point
Lab 2: Deploying and managing software updates
Determining software update compliance
Deploying software updates to clients
Configuring automatic deployment rules
After completing this module, students will be able to:
Maintain software updates for managed PCs.
Module 9: Implementing Defender Protection for managed PCsThis module explains how to use the security-related features provided by Configuration Manager to help protect client computers from malware threats, and to configure specific Windows Defender Firewall settings for clients. Based on Endpoint Protection functionality, Endpoint Protection in Configuration Manager supports the deployment, management, and monitoring of antimalware policies, Windows Defender Firewall settings, Windows Defender Application Guard policies, Windows Defender Exploit Guard policies, and Windows Defender Application Control policies on client computers.Lessons
Overview of Endpoint Protection in Configuration Manager
Configuring, deploying, and monitoring Endpoint Protection policies
Configuring and deploying advanced threat policies
Lab 1: Implementing Endpoint Protection
Configuring the Endpoint Protection point and client settings
Configuring and deploying Endpoint Protection policies
Monitoring Endpoint Protection
Lab 2: Implementing advanced threat policies
Creating and deploying advanced threat protection policies
After completing this module, students will be able to:
Implement Defender Protection for managed PCs
Module 10: Managing compliance and secure data accessMany enterprise organizations require systems, such as servers, laptops, desktop computers, and mobile devices, to meet specific configuration and compliance requirements. Compliance settings in Configuration Manager can play a key role in identifying existing configurations, discovering systems that have adverse configuration changes, and remediating these settings automatically when necessary. Compliance settings also can help control how users manage and access data in the enterprise network environment. For computers that run Windows 8 and newer operating systems, you can manage data using folder redirection, offline files, and roaming profiles. You also can control access to data using remote connection profiles, virtual private network (VPN) profiles, Wi-Fi profiles, and certificate profiles. This module describes the compliance settings that you can manage using Configuration Manager. You will learn to use these settings to maintain configuration requirements and to provide secure data access to enterprise resources.Lessons
Overview of Compliance Settings
Configuring compliance settings
Viewing compliance results
Managing resource and data access
Lab 1: Managing compliance settings
Managing configuration items and baselines
Viewing compliance settings and reports
Configuring remediation in compliance settings
Using compliance information to create collections
After completing this module, students will be able to:
Manage compliance and secure data access
Module 11: Managing operating system deploymentThis module explains how to use the operating system deployment feature in Configuration Manager to create operating system images that you can deploy to unmanaged computers and those managed by Configuration Manager. There are several scenarios in which you can deploy operating systems by using Configuration Manager, including when you are working with new systems or when you are upgrading existing ones. Operating system deployment uses both Configuration Manager and Windows components to manage and deliver operating system images. You can configure settings on a reference computer prior to capturing an image of its operating system or by using task sequences that Configuration Manager creates after you deploy the image to a target system. This module also explains how to use Configuration Manager to create a strategy for operating-system deployments . And also, it explains and how to manage Windows as a service. This module explains how to manage Windows as a service.Lessons
An overview of operating system deployment
Preparing a site for operating system deployment
Deploying an operating system
Managing Windows as a service
Lab 1: Preparing the site for operating-system deployment
Managing the site system roles used to support operating system deployment
Managing packages to support operating system deployment
Lab 2: Deploying operating-system images for bare-metal installations
Preparing the operating system image
Creating a task sequence to deploy an image
Deploying an image
After completing this module, students will be able to:
Manage operating system deployments.
Module 12: Managing and maintaining a Configuration Manager siteThis module describes role-based administration, Remote Tools, and the site maintenance tasks that you can manage by using Configuration Manager. This module also describes how to back up and recover a Configuration Manager site system and use the recommendation(s) from Management Insights to simplify administration.Lessons
Configuring role-based administration
Configuring Remote Tools
Overview of Configuration Manager site maintenance and Management Insights
Backing up and recovering a Configuration Manager site
Updating the Configuration Manager infrastructure
Lab 1: Configuring role-based administration
Configuring a new scope for Toronto administrators
Configuring a new administrative user
Lab 2: Configuring Remote Tools
Configuring the Remote Tools client settings and permissions
Managing desktops by using Remote Control
Lab 3: Maintaining a Configuration Manager site
Configuring maintenance tasks in Configuration Manager
Configuring the Backup Site Server task
Recovering a site from a backup
After completing this module, students will be able to:
Manage and maintain a Configuration Manager site.
Module 13: What’s new in Microsoft Endpoint Configuration ManagerThis modules describes the features that have been released since Configuration Manager 2012.Lessons
Whats new in Microsoft Endpoint Manager covering each semi annual release.
After completing this module, students will be able to:
Understand and leverage the new features available in each semi annual release.
Module 1: Managing computers and mobile devices in the enterpriseThis module describes the features of Configuration Manager that you can use to perform complex management tasks, including the following tasks; Hardware and software inventory, Application management, Operating system deployment, Settings management, Software update management, Remote client troubleshooting, and Protection from malware. Microsoft System Center Configuration Manager (Configuration Manager) provides various features that can help you manage devices and users both on-premises and in the cloud. Organizations that use Configuration Manager find that they can provide more effective IT services in relation to software deployment, settings management, and asset management. This module introduces you to the primary features, architecture, and management tools used with Configuration Manager. This module also provides a foundation that relates to all other features and management tasks discussed in the modules that follow this one.Lessons
Overview of systems management by using enterprise management solutions
Overview of the Configuration Manager architecture
Overview of the Configuration Manager administrative tools
Tools for monitoring and troubleshooting a Configuration Manager site
Lab 1: Exploring the Configuration Manager tools
Exploring the Configuration Manager Tools
After completing this module, students will be able to:
Searching in the Configuration Manager console
Using Windows PowerShell with Configuration Manager
Using Configuration Manager Service Manager to manage components
Monitoring site and component status
Reviewing log files by using the Configuration Manager Trace tool
Module 2: Analyzing data using queries, reports, and CMPivotThe Microsoft Endpoint Configuration Manager database stores a large amount of data about the resources in your environment. You might not always want to perform all management tasks on all resources simultaneously. Therefore, to help you locate devices or user objects in your environment that meet specific criteria, you can create queries. You then can use these queries to create collections or to find additional information about specific resources. This module describes queries and methods of creating and running them. In addition to queries, you can run reports to view various types of information related to your Configuration Manager environment. To run Configuration Manager reports, you must install and configure a reporting services point, which this module details. This module also covers CMPivot, which allows you to collect and view real-time data on all the connected devices in your environment. It will enable you to make real-time decisionsLessons
Introduction to queries
Configuring SQL Server Reporting Services
Analyzing the real-time state of a device by using CMPivot
Lab 1: Creating and running queries
Creating data queries
Creating subselect queries
Lab 2: Configuring SSRS
Configuring a reporting services point
Lab 3: Analyzing the real-time state of a device by using CMPivot
Using CMPivot to Analyze the current state of devices
After completing this module, students will be able to:
Analyze data using queries, reports, and CMPivot
Module 3: Preparing the Configuration Manager management infrastructureYou can manage computer and user resources within a Microsoft Endpoint Configuration Manager (Configuration Manager) environment only when Configuration Manager has discovered these resources and assigned them to a site. In this module, you will learn about boundaries and boundary groups that help create logical network locations containing computer devices that you need to manage in your Configuration Manager infrastructure. You can use these boundary configurations for automatic site assignment and to help clients find content and services from associated site systems. You will also learn about the discovery processes that you can use to identify computers, users, and the network infrastructure within your network environment. You will then learn about collections that support logical groupings of resources. You use these groupings for management tasks, such as targeting software updates, managing application deployments, or deploying compliance settings to resources.Lessons
Configuring site boundaries and boundary groups
Configuring resource discovery
Organizing resources using device and user collections
Lab 1: Configuring boundaries and resource discovery
Configuring boundaries, boundary groups, and fallback relationships
Configuring Active Directory discovery methods
Lab 2: Configuring user and device collections
Creating a device collection
Creating a user collection
Configuring a maintenance window
After completing this module, students will be able to:
Prepare a Configuration Manager management infrastructure
Module 4: Deploying and managing the Configuration Manager clientYou can install the Microsoft Endpoint Configuration Manager (Configuration Manager) client software on windows-based devices such as servers, workstations, and laptops. You then can manage these devices and perform operations such as reporting hardware and software inventory information, installing and updating software, and configuring settings required for compliance. Configuration Manager provides several options for installing the client software. This module explains the supported operating systems and devices, software requirements, and different methods for installing the client software. This module also describes some of the default and custom client settings that you can configure. After installing the client software, you can configure client settings and control how the various client components interact between the managed device and the Configuration Manager environment.Lessons
Overview of the Configuration Manager client
Deploying the Configuration Manager client
Configuring and monitoring client status
Managing client settings and performing management operations
Lab 1: Deploying the Microsoft Endpoint Configuration Manager client software
Preparing the site for client installation
Deploying the Configuration Manager client software by using client push installation
Lab 2: Configuring and monitoring client status
Configuring and monitoring client health status
Lab 3: Managing client settings
Configuring client settings
Performing management operations
After completing this module, students will be able to:
Deploy and manage the Configuration Manager client.
Module 5: Managing inventory for PCs and applicationsThis module provides an overview of inventory collection, and explains how you can manage the information collected. You also will learn about the process of collecting hardware and software inventory, initiating inventory cycles, and initiating and securing inventory collection. This module also covers the use of software metering to monitor program usage, and the configuration and management of Asset Intelligence.Lessons
Overview of inventory collection
Configuring hardware and software inventory
Managing inventory collection
Configuring software metering
Configuring and managing Asset Intelligence
Lab 1: Configuring and managing inventory collection
Configuring and managing hardware inventory
Lab 2: Configuring software metering
Configuring software metering
Lab 3: Configuring and managing Asset Intelligence
Preparing the site for Asset Intelligence
Configuring Asset Intelligence
Monitoring license agreements by using Asset Intelligence
Viewing Asset Intelligence reports
After completing this module, students will be able to:
Manage inventory for PCs and applications.
Module 6: Distributing and managing content used for deploymentsMicrosoft Endpoint Configuration Manager (Configuration Manager) clients obtain content, such as packages, applications, software updates, and even operating system images, from a content infrastructure made up of distribution points and peer cache sources. In this module, you will review the content distribution and management features, configure distribution points, and learn how to distribute and monitor content. You also will perform content validation and content prestaging.Lessons
Preparing the infrastructure for content management
Distributing and managing content on distribution points
Lab 1: Distributing and managing content for deployments
Installing a new distribution point
Managing content distribution
After completing this module, students will be able to:
Describe containers in Windows Server.
Explain how to deploy containers.
Explain how to install, configure, and manage containers using Docker.
Module 7: Deploying and managing applicationsIn this module, you will learn about the methods for creating, deploying, and managing applications with Configuration Manager. You also will learn to use the Software Center and the Application Catalog to install available applications. You will learn about managing deployments on unconventional applications.Lessons
Overview of application management
Creating applications
Deploying applications
Managing applications
Deploying and managing Windows apps
Lab 1: Creating and deploying applications
Creating applications with requirements
Deploying applications
Lab 2: Managing application supersedence and removal
Managing application supersedence
Uninstalling the Excel Viewer application
Lab 3: Using Configuration Manager to deploy Windows apps
Configuring support for sideloading Windows apps
Configuring a Windows app
Deploying Windows apps to user
After completing this module, students will be able to:
Deploy and manage applications
Module 8: Maintaining software updates for managed PCsThis module explains how to use the software updates feature in Configuration Manager to implement an end-to-end management process for the complex task of identifying, deploying, and monitoring Microsoft and third-party software updates to your Configuration Manager clients.Lessons
The software updates process
Preparing a Configuration Manager site for software updates
Managing software updates
Configuring automatic deployment rules
Monitoring and troubleshooting software updates
Enabling third-party updates
Lab 1: Configuring the site for software updates
Configuring and synchronizing the software update point
Lab 2: Deploying and managing software updates
Determining software update compliance
Deploying software updates to clients
Configuring automatic deployment rules
After completing this module, students will be able to:
Maintain software updates for managed PCs.
Module 9: Implementing Defender Protection for managed PCsThis module explains how to use the security-related features provided by Configuration Manager to help protect client computers from malware threats, and to configure specific Windows Defender Firewall settings for clients. Based on Endpoint Protection functionality, Endpoint Protection in Configuration Manager supports the deployment, management, and monitoring of antimalware policies, Windows Defender Firewall settings, Windows Defender Application Guard policies, Windows Defender Exploit Guard policies, and Windows Defender Application Control policies on client computers.Lessons
Overview of Endpoint Protection in Configuration Manager
Configuring, deploying, and monitoring Endpoint Protection policies
Configuring and deploying advanced threat policies
Lab 1: Implementing Endpoint Protection
Configuring the Endpoint Protection point and client settings
Configuring and deploying Endpoint Protection policies
Monitoring Endpoint Protection
Lab 2: Implementing advanced threat policies
Creating and deploying advanced threat protection policies
After completing this module, students will be able to:
Implement Defender Protection for managed PCs
Module 10: Managing compliance and secure data accessMany enterprise organizations require systems, such as servers, laptops, desktop computers, and mobile devices, to meet specific configuration and compliance requirements. Compliance settings in Configuration Manager can play a key role in identifying existing configurations, discovering systems that have adverse configuration changes, and remediating these settings automatically when necessary. Compliance settings also can help control how users manage and access data in the enterprise network environment. For computers that run Windows 8 and newer operating systems, you can manage data using folder redirection, offline files, and roaming profiles. You also can control access to data using remote connection profiles, virtual private network (VPN) profiles, Wi-Fi profiles, and certificate profiles. This module describes the compliance settings that you can manage using Configuration Manager. You will learn to use these settings to maintain configuration requirements and to provide secure data access to enterprise resources.Lessons
Overview of Compliance Settings
Configuring compliance settings
Viewing compliance results
Managing resource and data access
Lab 1: Managing compliance settings
Managing configuration items and baselines
Viewing compliance settings and reports
Configuring remediation in compliance settings
Using compliance information to create collections
After completing this module, students will be able to:
Manage compliance and secure data access
Module 11: Managing operating system deploymentThis module explains how to use the operating system deployment feature in Configuration Manager to create operating system images that you can deploy to unmanaged computers and those managed by Configuration Manager. There are several scenarios in which you can deploy operating systems by using Configuration Manager, including when you are working with new systems or when you are upgrading existing ones. Operating system deployment uses both Configuration Manager and Windows components to manage and deliver operating system images. You can configure settings on a reference computer prior to capturing an image of its operating system or by using task sequences that Configuration Manager creates after you deploy the image to a target system. This module also explains how to use Configuration Manager to create a strategy for operating-system deployments . And also, it explains and how to manage Windows as a service. This module explains how to manage Windows as a service.Lessons
An overview of operating system deployment
Preparing a site for operating system deployment
Deploying an operating system
Managing Windows as a service
Lab 1: Preparing the site for operating-system deployment
Managing the site system roles used to support operating system deployment
Managing packages to support operating system deployment
Lab 2: Deploying operating-system images for bare-metal installations
Preparing the operating system image
Creating a task sequence to deploy an image
Deploying an image
After completing this module, students will be able to:
Manage operating system deployments.
Module 12: Managing and maintaining a Configuration Manager siteThis module describes role-based administration, Remote Tools, and the site maintenance tasks that you can manage by using Configuration Manager. This module also describes how to back up and recover a Configuration Manager site system and use the recommendation(s) from Management Insights to simplify administration.Lessons
Configuring role-based administration
Configuring Remote Tools
Overview of Configuration Manager site maintenance and Management Insights
Backing up and recovering a Configuration Manager site
Updating the Configuration Manager infrastructure
Lab 1: Configuring role-based administration
Configuring a new scope for Toronto administrators
Configuring a new administrative user
Lab 2: Configuring Remote Tools
Configuring the Remote Tools client settings and permissions
Managing desktops by using Remote Control
Lab 3: Maintaining a Configuration Manager site
Configuring maintenance tasks in Configuration Manager
Configuring the Backup Site Server task
Recovering a site from a backup
After completing this module, students will be able to:
Manage and maintain a Configuration Manager site.
Module 13: What’s new in Microsoft Endpoint Configuration ManagerThis modules describes the features that have been released since Configuration Manager 2012.Lessons
Whats new in Microsoft Endpoint Manager covering each semi annual release.
After completing this module, students will be able to:
Understand and leverage the new features available in each semi annual release.

€690
E-Learning
max 9
0 dagen
MSP ® 5th edition (programmabeheer) Practitioner eLearning, incl. online examen (nu: Gratis herexamen)
MSP® 5th edition (programmabeheer) Practitioner eLearning, incl. online examen (nu: Gratis herexamen)
MSP® (Managing Successful Programmes) is een methodologie voor het beheer van programma's in de zin van de georganiseerde coördinatie van de totstandbrenging van een portefeuille van projecten en activiteiten die samen een onderneming in staat stellen resultaten en voordelen te behalen die van strategisch belang zijn.
In die zin valt programmabeheer niet samen met of overlapt het niet met projectbeheer. Het is veeleer een aanvullende discipline met specifieke aanwijzingen voor gebruik. Met andere woorden, in die contexten waarin de te behalen resultaten en voordelen van strategische aard zijn, maar waarin nog niet duidelijk is met welke middelen en output die resultaten en voordelen kunnen worden bereikt.
MSP past in de best practice van Axelos voor het management van Portfolio, Programma en Project Management en integreert daarom goed met MoP®, P3O® en PRINCE2®.
MSP 4E EDITIE EN MSP 5E EDITIE: WAT IS ER VERANDERD?
De essentie van wat een programma is, blijft hetzelfde als bij de 4e editie van MSP: het is tijdelijk, het is gericht op resultaten van voordeel, en het houdt zich bezig met het leiden van meerdere projecten en ander werk.
De kernbegrippen (beginselen, thema's en processen) vormen ook nog steeds de algemene structuur van de leidraad. Deze zijn echter herzien met de volgende beginselen in gedachten:
Om ervoor te zorgen dat MSP aanpasbaar en flexibel blijft en kan worden gebruikt in een breed scala van organisaties en omgevingen. Er zijn veel verschillende drijfveren voor verandering, en de aanpak van MSP voor programmabeheer moet ervoor zorgen dat de investering van de organisatie in verandering op verstandige wijze wordt beheerd.
Een leidraad bieden voor een breed scala van investeringen die baat hebben bij programmamanagement, erkennende dat het woord "programma" veel verschillende betekenissen heeft voor organisaties, en dat andere bewoordingen dan "programma's" door die organisaties kunnen worden gebruikt.
Het incrementele karakter van een programma benadrukken en laten zien hoe MSP een cyclische progressie naar de gewenste toekomstige staat mogelijk maakt. Organisaties zijn complex, de externe context is veranderlijk, en de levering van voordelen en de creatie van waarde kunnen gewoonlijk niet door een reeks lineaire stappen worden bereikt.
Om programmateams in staat te stellen de vele manieren te herkennen waarop outputs en veranderingen kunnen worden geleverd, inclusief iteratieve (Agile), lineaire, en hybride benaderingen.
MSP KWALIFICATIETRAJECT
MSP® Foundation certificering
De MSP Foundation cursus gaat in op de basisprincipes van de MSP methodologie, de componenten (thema's genoemd) en de processen.
De MSP-certificering is een voorwaarde voor het volgende niveau MSP Practitioner.
MSP® Practitioner certificering
De MSP Practitioner cursus gaat dieper in op het contextualiseren en toepassen van MSP elementen.
MSP 5th edition Practitioner is voor project-, programma-, en business change managers die willen voortbouwen op hun kennis van MSP, om het MSP raamwerk praktisch toe te passen op real life scenario's, en de vaardigheden te bieden om een programma te leiden en te managen. Het is een must-have certificering voor zowel project- als programmamanagementprofessionals om organisatorische waarde te leveren aan hun werkgevers en hun carrière een boost te geven.
Doelstellingen
Begrijpen hoe de MSP-beginselen in een context kunnen worden toegepast
Begrijpen hoe relevante aspecten van de MRO-thema's in een context kunnen worden toegepast en op maat gemaakt
Voor wie is het bedoeld?
MSP Practitioner is ontworpen voor project-, programma- en business change managers die het MSP raamwerk willen toepassen op real-life scenario's. Practitioner is een onmisbare certificering voor zowel project- als programmamanagementprofessionals die organisatorische waarde moeten leveren voor hun werkgevers en hun carrière een boost moeten geven.
Inhoud
Inleiding tot programmamanagement (met lezing van een voorbeeldscenario)
MSP principes (met test-examenvragen)
Inleiding tot MSP-thema's
Thema Organisatie - Organisatie (met test-examenvragen)
Thema Ontwerp - Ontwerp (met test-examenvragen)
Thema Rechtvaardiging (met test-examenvragen)
Thema structuur (met test-examenvragen)
Thema Kennis - Kennis (met test-examenvragen)
Thema zekerheid (met test-examenvragen)
Thema Beslissingen (met oefenexamenvragen)
Inleiding tot MSP-processen
Identificeer het programma - proces (met test-examenvragen)
Ontwerp de resultaten - proces (met test-examenvragen)
Lever de capaciteiten - proces (met test-examenvragen)
Inbedden van de resultaten - proces (met test-examenvragen)
Evalueer nieuwe informatie - proces (met test-examenvragen)
Sluit het programma af - proces (met test-examenvragen)
Tweede test-examen
Vereisten
Om toegang te krijgen tot de MSP 5th edition Practitioner cursus en het examen moeten deelnemers in het bezit zijn van een MSP® 5th edition Foundation certificaat.
MSP 5E EDITIE PRACTITIONER ONLINE CURSUS DETAILS
18 lessen (3,5 uur video opgenomen door een geaccrediteerde docent)
120 dagen toegang tot het platform
Downloadbare PDF-documenten met gedetailleerde inhoud (dia's, uitleg) voor elke les
2 officiële proefexamens
Oefeningen en oplossingen
Toegang 24/7
Om de cursus af te ronden en een optimale examenvoorbereiding te hebben, raden we je aan om minstens 15 uur aan studie te besteden.
MSP 5E EDITIE PRACTITIONER ONLINE EXAMEN FORMAAT
70 vragen (één punt voor elk juist antwoord)
70 punten beschikbaar in totaal
42 punten vereist om te slagen voor het examen
Duur van twee en een half uur
Open boek examen
De kandidaten mogen de officiële papieren handleiding Managing Successful Programs 5th Edition gebruiken. De handleiding mag van aantekeningen en tabellen worden voorzien, maar plakbriefjes of losse bladen met aanvullende aantekeningen zijn niet toegestaan.

€750
E-Learning
Lean Six Sigma Yellow Belt
Lean Six Sigma Yellow Belt
Tijdens de Lean Six Sigma Yellow Belt training leer je in één dag de grondbeginselen van Lean Management én Six Sigma. Naast deze complete basiskennis zal er dieper ingegaan worden op de wijze waarop een Lean Six Sigma (project)organisatie is gericht en zal er praktisch aan de slag gegaan worden met de geleerde instrumenten.
DOEL
Na het volgende van deze training:
Weet je wat Lean Management en Six Sigma inhoudt
Weet je wat Kaizen, 5S, Kanban en VSM betekenen
Voer je zelfstandig kleine verbeteringen uit in je dagelijkse werkzaamheden
Ben je klaar om deel te nemen aan een Lean Management en/of Six Sigma project
DOELGROEP
Deze training is voor iedereen die klant- én resultaatgerichter wil werken.
VERVOLGOPLEIDINGEN
Lean Six Sigma Orange Belt
BIJZONDERHEDEN
Ervaren Lean Six Sigma Black Belts leiden jou gedegen op. Na afloop van de training ontvang je een officieel Yellow Belt certificaat. Hiermee kun je aantonen dat je de grondbeginselen van Lean Six Sigma eigen gemaakt hebt. Dit is een officiële door de IASSC geaccrediteerde Lean Six Sigma Yellow Belt training.

€395
Klassikaal
max 10