Certification at Your Fingertips - Microsoft 70 -688: Managing and Maintaining Windows 8


  • Certification at Your Fingertips - Microsoft 70 -688: Managing and Maintaining Windows 8, Singapore SKillsFuture elarning online course
  • Certification at Your Fingertips - Microsoft 70 -688: Managing and Maintaining Windows 8, Singapore SKillsFuture elarning online course
  • Certification at Your Fingertips - Microsoft 70 -688: Managing and Maintaining Windows 8, Singapore SKillsFuture elarning online course
  • Certification at Your Fingertips - Microsoft 70 -688: Managing and Maintaining Windows 8, Singapore SKillsFuture elarning online course
  • Certification at Your Fingertips - Microsoft 70 -688: Managing and Maintaining Windows 8, Singapore SKillsFuture elarning online course
  • Certification at Your Fingertips - Microsoft 70 -688: Managing and Maintaining Windows 8, Singapore SKillsFuture elarning online course

Course Description

Practice Lab
This course comes with a Remote Practice Environment, a virtual remote environment; where you are able to practically apply the skills you have learned on the respective server, systems and networks. With this platform, get one step ahead in your preparation for your certification exams!

Whether it’s Cisco, Microsoft or VMware, our Practice Lab unifies access to all of these vendors through a web browser interface. Pre-configured hardware layouts with accompanying lab guides for fast, convenient access to gain hands on experience. With step-by-step instructions covering thousands of practical tasks across Cisco, Microsoft, VMware and CompTIA exam titles, the Practice Lab makes studying for an exam or learning new technologies an engaging experience.

What this course prepares you for:

This course is preparation for the Microsoft 70-688 Exam which is designed for IT professionals who configure or support Windows 8 computers, devices, users, and associated network and security resources. The networks with which these professionals typically work are configured as domain-based or peer-to-peer environments with access to the Internet and cloud services. The IT professional could be a consultant, a full-time desktop support technician, or an IT generalist who administers Windows 8–based computers and devices as a portion of their broader technical responsibilities.

Ace your certification examination with this preparation course!

- Learn of the examination outline before sitting for your certification
- Know and understand the topics that may be covered in your examinations
- Understand both practical and theory aspects of the examination
- Apply the practical skills through the Remote Practice Environment

This course is SkillsFuture Credit Eligible.


Course Objectives

1. Troubleshooting Start Up Issues
2. Troubleshooting Remote Computers
3. Configuring And Troubleshooting Remote Connectivity
4. Maintaining Windows 8.1


Related Courses

  • Security+ Certification Prep

    Security+ Certification Prep

    SGD $299.00

    Course Description

    Security+ Certification Prep The Security+ Certification Prep Course readies students for CompTIA's S+ certification exam which is globally recognized for validating foundational, vendor-neutral IT security knowledge and skills. With top experts and an interactive, lab-filled enviornment, students gain essential knowledge of the principals for network security and risk management with competency in organizational security, system security, access control and network infrastructure. The S+ certification by CompTIA is an internationally recognized credential ensuring ground-level security proficiency as well as skills for organization and security professionals to provide information, infrastructure, application and operational security. This course prepares the student for the CompTIA S+ Certification Exam SYO-401.

    Read more...

  • Certification at Your Fingertips - Microsoft 70-414: Implementing an Advanced Server Infrastructure

    Certification at Your Fingertips - Microsoft 70-414: Implementing an Advanced Server Infrastructure

    SGD $299.00

    Course Description

    This course covers the following topics in order to prepare students for the Microsoft 70-414: Implementing an Advanced Server Infrastructure certification exam: how to manage and maintain a server infrastructure. plan and implement a highly available enterprise infrastructure, plan and implement a server virtualization infrastructure, and design and implement identity and access solutions. Passing this exam validates a candidate’s ability to the plan, configure and manage the Windows Server 2012 services, such as identity and access, high availability and the server infrastructure. Be fully prepared for your certifications exams! - Learn of the examination outline before sitting for your certification  - Know and understand the topics that may be covered in your examinations - Learn and understand the chapters for each tailored certification  - Go through past questions to have a feel of the examinations

    Read more...

  • Certified Advanced Persistent Threat Analyst

    Certified Advanced Persistent Threat Analyst

    SGD $299.00

    Course Description

    Cyber-attacks have become so sophisticated over the years, that a new term has emerged - Advanced Persistent Threat, which we will refer to as APT. An APT is a group of individuals that have both the means and the intent to launch persistent attacks against specific targets. Understanding these groups and their behavior is important when evaluating threats against any organization.   Hackers have traditionally targeted large corporations, but today small to midsize businesses are being attacked with the same type of highly sophisticated malware. These new strains of advanced malware are often referred to as APTs   Modern malware uses Advanced techniques such as encrypted communication channels, kernel-level rootkits, and sophisticated evasion capabilities to get past a network’s defenses. More importantly, they often leverage zero day vulnerabilities – flaws for which no patch is available yet and no signature has been written.   Modern malware is often Persistent and designed to stick around. It’s stealthy and carefully hides its communications. It lives in a victim’s network for as long as possible, often cleaning up after itself by deleting logs, using strong encryption, and only reporting back to its controller in small, obfuscated bursts of communication.   Many attacks are now blended combinations of different techniques. A common tactic for hackers is to initiate an APT with spear phishing. This involves sending a carefully crafted email that appears to be in the from of a known individual or business with a link to a malicious website or an infected download.    Once the initial breach is successful, attackers can further damage defenses by disabling security protocols, changing security settings or stealing passwords. Groups of highly skilled, motivated, and very well-funded attackers represent significant Threats because they have very specific targets and goals in mind – often financial gain from theft of credit cards and other valuable account information.   Here are the topics that we will be covering in this course. We will begin by going over the APT Lifecycle and teach you a structured approach to analyze and assess inherent vulnerabilities. We will teach you mitigation and countermeasures that may prevent an attacker from gaining a foothold into an organization.   Next, we will get you familiar with APT1 Group and some common ATPs we have seen in the last few years like Stuxnet, and two new ones, Adwind and Poseidon. Lastly, we will get you familiar with the Cyber World War.

    Read more...


Content

Microsoft 70-688: Managing and Maintaining Windows 8

+
Simulated Practice Environment
Content
  • Module 1: Introduction
    • 1.1 Intro To Exam 70-688
    • 1.2 Implementing A Methodology For Troubleshooting - Part 1
    • 1.3 Implementing A Methodology For Troubleshooting - Part 2
    • 1.4 Implementing A Methodology For Troubleshooting - Demo
  • Module 2: Troubleshooting Start Up Issues
    • 2.1 Troubleshooting Start Up Issues - Part 1
    • 2.2 Troubleshooting Start Up Issues - Part 2
    • 2.3 Troubleshooting Start Up Issues - Part 3
    • 2.4 Troubleshooting Start Up Issues - Part 4
    • 2.5 Troubleshooting Start Up Issues - Demo
  • Module 3: ?Managing Drivers And Hardware
    • 3.1 Managing Drivers And Hardware - Part 1
    • 3.2 Managing Drivers And Hardware - Part 2
    • 3.3 Managing Drivers And Hardware - Part 3
    • 3.4 Managing Drivers And Hardware - Demo
  • Module 4: Troubleshooting Remote Computers
    • 4.1 Troubleshooting Remote Computers - Part 1
    • 4.2 Troubleshooting Remote Computers - Part 2
    • 4.3 Troubleshooting Remote Computers - Part 3
  • Module 5: Resolving Problems With Network Connectivity
    • 5.1 Resolving Problems With Network Connectivity - Part 1
    • 5.2 Resolving Problems With Network Connectivity - Part 2
    • 5.3 Resolving Problems With Network Connectivity - Part 3
    • 5.4 Resolving Problems With Network Connectivity - Part 4
    • 5.5 Resolving Problems With Network Connectivity - Part 5
  • Module 6: Troubleshooting Group Policy
    • 6.1 Troubleshooting Group Policy - Part 1
    • 6.2 Troubleshooting Group Policy - Part 2
    • 6.3 Troubleshooting Group Policy - Part 3
    • 6.4 Troubleshooting Group Policy - Part 4
  • Module 7: Troubleshooting User Settings
    • 7.1 Troubleshooting User Settings - Part 1
    • 7.2 Troubleshooting User Settings - Part 2
    • 7.3 Troubleshooting User Settings - Part 3
  • Module 8: Configuring And Troubleshooting Remote Connectivity
    • 8.1 Configuring And Troubleshooting Remote Connectivity - Part 1
    • 8.2 Configuring And Troubleshooting Remote Connectivity - Part 2
    • 8.3 Configuring And Troubleshooting Remote Connectivity - Part 3
    • 8.4 Configuring And Troubleshooting Remote Connectivity _ Demo - Part 1
    • 8.5 Configuring And Troubleshooting Remote Connectivity _ Demo - Part 2
    • 8.6 Configuring And Troubleshooting Remote Connectivity _ Demo - Part 3
  • Module 9: ?Troubleshooting Resource Access In A Domain
    • 9.1 Troubleshooting Resource Access In A Domain - Part 1
    • 9.2 Troubleshooting Resource Access In A Domain - Part 2
    • 9.3 Troubleshooting Resource Access In A Domain - Part 3
    • 9.4 Troubleshooting Resource Access In A Domain - Demo
  • Module 10: Configuring And Troubleshooting Resource Access For Non-Domain Members
    • 10.1 Configuring And Troubleshooting Resource Access For Non-Domain Members - Part 1
    • 10.2 Configuring And Troubleshooting Resource Access For Non-Domain Members - Part 2
    • 10.3 Configuring And Troubleshooting Resource Access For Non-Domain Members - Part 3
    • 10.4 Configuring And Troubleshooting Resource Access For Non-Domain Members - Demo
  • Module 11: Troubleshooting Applications
    • 11.1 Troubleshooting Applications - Part 1
    • 11.2 Troubleshooting Applications - Part 2
    • 11.3 Troubleshooting Applications - Part 3
    • 11.4 Troubleshooting Applications - Part 4
    • 11.5 Troubleshooting Applications - Demo
  • Module 12: Maintaining Windows 8.1
    • 12.1 Maintaining Windows 8.1 - Part 1
    • 12.2 Maintaining Windows 8.1 - Part 2
    • 12.3 Maintaining Windows 8.1 - Part 3
    • 12.4 Maintaining Windows 8.1 - Part 4
    • 12.5 Maintaining Windows 8.1 - Demo
  • Module 13: Recovering Windows 8.1
    • 13.1 Recovering Windows 8.1
    • 13.2 Conclusion

SkillsFuture Credit Eligible

SGD $589.00
(Price excludes GST)
GET ACCESS NOW
Convince your boss email
This site is best viewed using the latest versions of Google Chrome, Apple Safari, Mozilla FireFox, Microsoft Internet Explorer 11 and Edge which supports HTML5/Webkit technologies.