Certification at Your Fingertips - Microsoft 70-697: Configuring Windows Devices (Windows 10)


  • Certification at Your Fingertips - Microsoft 70-697: Configuring Windows Devices (Windows 10), Singapore SKillsFuture elarning online course
  • Certification at Your Fingertips - Microsoft 70-697: Configuring Windows Devices (Windows 10), Singapore SKillsFuture elarning online course
  • Certification at Your Fingertips - Microsoft 70-697: Configuring Windows Devices (Windows 10), Singapore SKillsFuture elarning online course
  • Certification at Your Fingertips - Microsoft 70-697: Configuring Windows Devices (Windows 10), Singapore SKillsFuture elarning online course
  • Certification at Your Fingertips - Microsoft 70-697: Configuring Windows Devices (Windows 10), Singapore SKillsFuture elarning online course
  • Certification at Your Fingertips - Microsoft 70-697: Configuring Windows Devices (Windows 10), Singapore SKillsFuture elarning online course

Course Description

Practice Lab
This course comes with a Remote Practice Environment, a virtual remote environment; where you are able to practically apply the skills you have learned on the respective server, systems and networks. With this platform, get one step ahead in your preparation for your certification exams!

Whether it’s Cisco, Microsoft or VMware, our Practice Lab unifies access to all of these vendors through a web browser interface. Pre-configured hardware layouts with accompanying lab guides for fast, convenient access to gain hands on experience. With step-by-step instructions covering thousands of practical tasks across Cisco, Microsoft, VMware and CompTIA exam titles, the Practice Lab makes studying for an exam or learning new technologies an engaging experience.

What this course prepares you for:

This course will prepare you for the Microsoft 70 -697: Configuring Windows Devices (Windows 10) exam. The course will validate a candidate’s fundamental knowledge and skills for building solid identities, protection of content (data loss protection), mobile device management policy, virtualization with Hyper-V, application management using the Company Portal and the Windows Store. This course will cover topics related to the fundamental knowledge needed in order to sit for the examination.

Ace your certification examination with this preparation course!

- Learn of the examination outline before sitting for your certification
- Know and understand the topics that may be covered in your examinations
- Understand both practical and theory aspects of the examination
- Apply the practical skills through the Simulated Practice Environment

This course is SkillsFuture Credit Eligible.


Course Objectives

1. Installing Windows 10
2. Configuring Network Connectivity
3. Managing Device Security
4. Deploying Windows 10 Enterprise Desktops


Related Courses

  • Certified Cyber Threat Intelligence Analyst

    Certified Cyber Threat Intelligence Analyst

    SGD $299.00

    Course Description

    The Cyber Security Threat Intelligence Researcher Certification will help you acquire the skills needed to find out who is behind an attack, what the specific threat group is, the nation from which the attack is being launched, as well as techniques being used to launch this attack. You will know how to take a small piece of malware, find out who is responsible for launching it, the threat actor location and also how to take down that threat actor, with the support of your local law enforcement. In today’s cyber security landscape, it isn't possible to prevent every attacks. Today’s attackers have significant funding, are patient, sophisticated, and target vulnerabilities in people and processes as well as technologies. With organizations increasingly relying on digitized information and sharing vast amounts of data across the globe, they have become easier targets for many different forms of attack. As a result, every company’s day-to-day operations, data and intellectual property are seriously at risk. In a corporate context, a cyber attack can not only damage your brand and reputation, it can also result in loss of competitive advantage, create legal/regulatory noncompliance and cause steep financial damage. Today’s secure environment will have vulnerabilities in it tomorrow, so an organization cannot allow itself to become complacent. There is only so much an organization can do by defending itself against threats that have already occurred. If an organization only reacts to new threats as they come up, are likely acting too late. It is important to understand and prioritize cyber threat intelligence processes, and how they can be integrated into an organization’s security operations in a way that adds value.  Cyber threat intelligence (CTI) is an advanced process enabling organizations to gather valuable insights based on analysis of contextual and situational risks. These processes can be tailored to the organization’s specific threat landscape, industry and market. This intelligence can make a significant difference to organizations' abilities to anticipate breaches before they occur. Giving organizations the ability to respond quickly, decisively and effectively to confirmed breaches allows them to proactively maneuver defense mechanisms into place, prior to and during the attack. In this course, we’ll introduce you to the 8 phases of threat intelligence: Hunting - The goal of hunting is to establish techniques to collect samples from different sources that help to start profiling malicious threat actors. Features Extraction - The goal of Features Extraction is to identify unique Static features in the binaries that help to classify them into a specific malicious group. Behavior Extraction - The goal of Behavior Extraction is to identify unique Dynamic features in the binaries that help to classify them into a specific malicious group. Clustering and Correlation -  The goal of Clustering and Correlation is to classify malware based on Features and Behavior extracted and correlate the information to understand the attack flow. Threat Actor Attribution - The goal of Threat Actors is to locate the threat actors behind the malicious clusters identified. Tracking - The goal of tracking is to anticipate new attacks and identify new variants proactively. Taking Down - The goal of Taking down is to Dismantled Organized Crime Operations

    Read more...

  • CompTIA A+ (220-801)

    CompTIA A+ (220-801)

    SGD $45.00

    Course Description

    The CompTIA A+ certification is the most recognized IT certification in the industry. CompTIA A+ certification validates foundation-level knowledge and skills necessary for a career in IT support. CompTIA A+ certified technicians have a reputation for not only knowing the technical aspects of their jobs but also for exercising excellent communication skills when working with clients. To achieve the CompTIA A+ certification, candidates must pass two exams: 220-801 and 220-802. In this VTC course, A+ certified instructor Mark Long will help you understand the concepts and information you need to know to prepare for the 220-801 exam. Be fully prepared for your certifications exams!- Learn of the examination outline before sitting for your certification - Know and understand the topics that may be covered in your examinations- Learn and understand the chapters for each tailored certification - Go through past questions to have a feel of the examinations

    Read more...

  • Network+ Certification Prep

    Network+ Certification Prep

    SGD $299.00

    Course Description

    The Network+ Certification Prep Course readies students for CompTIA's Network+ Certification exam which is a vendor-neutral certification allowing IT professionals to gain expertise in configuring, managing, installing, troubleshooting and maintaining basic computer networks. With top experts and an interactive, lab-filled environment, students gather essential knowledge of network configuration, technologies and installations as well as topologies and media security and management. The Network+ certification by CompTIA is an internationally recognized and coveted credential providing proof of a student's knowledge, skills and ability to manage, maintain, troubleshoot, install, operate and configure a basic network infrastructure. This course prepares the student for the CompTIA Network+ Certification exam N10-006.

    Read more...


Content

Microsoft 70-697: Configuring Windows Devices (Windows 10)

+
Simulated Practice Environment
Content
  • Module 1: Introducing Windows 10
    • 1.1 Course Introduction
    • 1.2 What Makes Windows 10 Different
    • 1.3 Overview Of Windows 10 Features
    • 1.4 Navigating And Using Windows 10 Part 1
    • 1.5 Navigating And Using Windows 10 Part 2
  • Module 2: Installing Windows 10
    • 2.1 Preparing For Installation
    • 2.2 Installation Options
    • 2.3 Upgrading And Migrating Part 1
    • 2.4 Upgrading And Migrating Part 2
  • Module 3: Configuring Devices
    • 3.1 Overview Of Configuration Tools
    • 3.2 Common Configuration Options
    • 3.3 Managing User Accounts Part 1
    • 3.4 Managing User Accounts Part 2
    • 3.5 Using Control Panel
    • 3.6 Using Windows Administration Tools Part 1
    • 3.7 Using Windows Administration Tools Part 2
    • 3.8 Using Windows Power Shell Part 1
    • 3.9 Using Windows Power Shell Part 2
  • Module 4: Configuring Network Connectivity 
    • 4.1 TCPIP Network Connectivity Part 1
    • 4.2 TCPIP Network Connectivity Part 2
    • 4.3 TCPIP Network Connectivity Part 3
    • 4.4 Name Resolution
    • 4.5 Wireless
    • 4.6 Remote Access Overview Part 1
    • 4.7 Remote Access Overview Part 2
    • 4.8 Troubleshooting Connectivity
  • Module 5: Managing Storage, Data, And Printers
    • 5.1 Managing Hard Disks Part 1
    • 5.2 Managing Hard Disks Part 2
    • 5.3 Managing Hard Disks Part 3
    • 5.4 Creating And Managing Storage Spaces
    • 5.5 Overview Of Data Access
    • 5.6 Configuring And Managing File Access
    • 5.7 Managing Shared Folder
    • 5.8 Understanding Work Folders
    • 5.9 Managing Printers
  • Module 6: Managing Apps
    • 6.1 Installing And Configuring Applications
    • 6.2 Managing Apps From The Windows Store
    • 6.3 Managing Microsoft Edge Web Browser
  • Module 7: Managing Device Security 
    • 7.1 Configuring Network Security Part 1
    • 7.2 Configuring Network Security Part 2
    • 7.3 Configuring Local Security
    • 7.4 Configuring Data Security Part 1
    • 7.5 Configuring Data Security Part 2
    • 7.6 Configuring Device Security
  • Module 8: Maintaining Windows 10
    • 8.1 Updating Windows 10
    • 8.2 Monitoring And Optimizing Windows 10 Part 1
    • 8.3 Monitoring And Optimizing Windows 10 Part 2
  • Module 9: Troubleshooting And Recovery
    • 9.1 Managing Devices And Drives
    • 9.2 Recovery Files
    • 9.3 Recovering Devices
  • Module 10: Deploying Windows 10 Enterprise Desktops
    • 10.1 Overview Of Image Based Deployment
    • 10.2 Automating Installations
    • 10.3 Windows Activation
  • Module 11: Managing User Profiles And User State Virtualization
    • 11.1 Managing User Profiles Part 1
    • 11.2 Managing User Profiles Part 2
    • 11.3 User State Virtualization
    • 11.4 User Profile Migration
  • Module 12: Managing Desktop And Application Settings Using Group policy
    • 12.1 Using Group Policy To Manage Windows 10 Devices Part 1
    • 12.2 Using Group Policy To Manage Windows 10 Devices Part 2
    • 12.3 Using Group Policy To Manage Windows 10 Devices Part 3
    • 12.4 Using Group Policy To Manage Windows 10 Devices Part 4
    • 12.5 Using Group Policy To Manage Applications Part 1
    • 12.6 Using Group Policy To Manage Applications Part 2
    • 12.7 Module 13: Configuring And Managing Client Hyper-V
SkillsFuture Credit Eligible

SGD $589.00
(Price excludes GST)
GET ACCESS NOW
Convince your boss email
This site is best viewed using the latest versions of Google Chrome, Apple Safari, Mozilla FireFox, Microsoft Internet Explorer 11 and Edge which supports HTML5/Webkit technologies.