TOIT Training

Intermediate
Placeholder

Microsoft Endpoint Manager

Overview
Curriculum

 

This instructor led, online training course will provide students with the knowledge and skills to manage and protect your organization’s data, devices, and apps. We will also discuss autopilot, mobile device management, mobile application management, operating system deployment, and more.

Curriculum

  • 6 Sections
  • 206 Lessons
  • 9h Duration
Expand All
Microsoft Intune
22 Lessons
  1. What is Intune
  2. Why Intune
  3. Mobile Device Management (MDM)
  4. Mobile Application Management (MAM)
  5. Apps with EMS integration
  6. Managed Apps
  7. Store Apps
  8. Compliance Policies
  9. Tenant-wide policy
  10. Device policy
  11. Conditional Access
  12. Device based
  13. CA based on Network Access Control
  14. CA based on Device Risk
  15. CA based on Windows Devices
  16. Corporate Devices
  17. BYOD
  18. Exchange On Prem
  19. App based
  20. Azure Active Directory Supported Apps
  21. LOB Apps
  22. Microsoft 365 Modern Authentication
Configuration Manager
145 Lessons
  1. Organization
  2. Hierarchy Topology
  3. Stand-alone Primary Site
  4. Central Administration Site (CAS)
  5. Role of Primary Site
  6. Role of Secondary Site
  7. Management Point
  8. Distribution Point
  9. Fallback Status Point
  10. Software Update Point
  11. Reporting Services Point
  12. Enrollment Point and Enrollment Proxy Point
  13. Cloud Management Gateway
  14. CMG Hierarchy Design
  15. CMG Client Authentication
  16. Configurations for CMG
  17. Token Based Authentication for CMG
  18. Cloud-Based Distribution Points
  19. Monitoring and Modifying a CMG
  20. Content Management Options
  21. Windows Delivery Optimization
  22. Configuration Manager peer cache
  23. Windows BranchCache
  24. Distribution Points configured for bandwidth control
  25. Prestaging content on distribution points
  26. SMS Provider
  27. SQL Database
  28. Network Infrastructure Considerations
  29. Ports and Protocols
  30. Internet Access Requirements
  31. Proxy Servers
  32. Active Directory Schema
  33. Planning for Security
  34. Certificates (Self-Signed and PKI)
  35. The Trusted Root Key
  36. Signing and Encryption
  37. Role-based Administration
  38. Azure Active Directory
  39. SMS Provider Authentication
  40. User Management
  41. User Discovery
  42. User Collections
  43. Deploying Applications to Users or User Collections
  44. Device Management
  45. Client Management Overview
  46. Monitoring and Managing Clients
  47. Client Settings
  48. Device Collections
  49. Best Practices for Collections
  50. Collection Evaluation
  51. Creating and Managing Collections
  52. Maintenance Windows
  53. Hardware Inventory
  54. Software Inventory
  55. Asset Intelligence
  56. Configuration Baselines
  57. App Deployment
  58. Roles of Applications, Packages and Programs and Task Sequences
  59. Creating Applications
  60. Windows vs. Mac Applications
  61. Create Global Conditions
  62. Create Application Groups
  63. Creating Packages and Programs
  64. Creating Task Sequences
  65. Distribution of Content
  66. Deploying Content
  67. Managing and Monitoring Deployments
  68. Software Updates
  69. Downloading Software Updates
  70. Software Update Groups (SUG’s)
  71. Deploying Software Updates
  72. Manual
  73. Automatic
  74. Phased Deployments
  75. Software Update Maintenance
  76. Orchestration Groups
  77. Microsoft 365 Apps Updates
  78. Windows Update Delivery Optimization
  79. Third-party Software Updates
  80. Update Catalogs
  81. Operating System Deployment
  82. Infrastructure Requirements
  83. Windows ADK
  84. Windows PE
  85. Boot Images
  86. Internet Information Services (IIS)
  87. PXE Provider Options
  88. Windows Deployment Services (WDS)
  89. ConfigMgr PXE Responder
  90. Dynamic Host Configuration Protocol (DHCP)
  91. Device Drivers
  92. OS Images
  93. Driver Catalog
  94. Management Point Role
  95. Distribution Point Role
  96. PXE-Enabled Distribution Point
  97. Multicast-Enabled Distribution Point
  98. Security Permissions and Security Scopes
  99. OS Task Sequence Overview
  100. OS Task Sequence Deployments
  101. Required vs. Available
  102. All Unknown Computers vs. Query Collections
  103. Phased Deployments
  104. Managing and Monitoring OS Deployments
  105. Task Sequence Media
  106. Queries
  107. Introduction to Queries
  108. Managing Queries
  109. Creating Queries
  110. Security and Privacy for Queries
  111. Reporting
  112. Introduction to Reporting
  113. Integration with Power BI
  114. Configuring of Reporting
  115. Maintenance of Reporting
  116. Administration and Management
  117. Community Hub
  118. CMPivot
  119. Maintenance Tasks
  120. Daily Tasks
  121. Weekly Tasks
  122. Periodic Tasks
  123. Updates of Config Mgr
  124. In-Console Updates and Servicing
  125. Out of Band Hotfixes
  126. Backup and Recovery
  127. Monitoring Infrastructure
  128. Alerts
  129. Compliance Settings
  130. Content
  131. Endpoint Protection
  132. OS Deployment
  133. Monitor Power Management
  134. Monitor Software Metering
  135. Monitor Software Updates
  136. Monitor Site Hierarchy
  137. Troubleshooting
  138. Hierarchy Level
  139. Site Management
  140. Server Management
  141. Device Management
  142. Health Attestation
  143. Client Issues
  144. Security
  145. Network Management
Co-Management
20 Lessons
  1. Why Co-Management
  2. Benefits of Co-Management
  3. On Prem Configuration Manager
  4. Cloud based Intune
  5. Remote Actions
  6. Factory reset
  7. Selective wipe
  8. Delete devices
  9. Restart devices
  10. Fresh start
  11. Cloud based Microsoft 365
  12. Management authority for 7 different workload groups
  13. Compliance policies
  14. Resource access policies
  15. Windows update policies
  16. Endpoint protection
  17. Device configuration
  18. Office Click-to-Run apps
  19. Mobile apps
  20. Conditional Access
Windows Autopilot
6 Lessons
  1. New device set up
  2. Join Devices through Azure Active Directory
  3. Join devices through Hybrid Azure AD Join
  4. Intune Enrollment
  5. Auto-assign devices to configuration groups
  6. Customize OOBE content
 Azure Active Directory (AZ-AD)
6 Lessons
  1. Identity of Devices, users, groups and multi-factor authentication (MFA)
  2. Azure AD Premium
  3. Device, app and data protection
  4. Dynamic Groups
  5. Auto-enrollment
  6. Conditional Access
 Endpoint Manager Admin Center
7 Lessons
  1. Policy creation
  2. Device management
  3. Groups
  4. Security
  5. Conditional access
  6. Reporting
  7. Management of Devices in Configuration Manager and Intune

Deleting Course Review

Are you sure? You can't restore this back

Course Access

This course is password protected. To access it please enter your password below:

Buy for group

Microsoft Endpoint Manager
No groups Found

You don't have any groups yet

Create a group and add group members. Sync Group(s)