A: Deploying the Modern Desktop
As desktops has evolved, so have methods for deploying and updating them. In this course, you'll learn how to plan and implement an operating system deployment strategy. This course will help you understand the various methods available, the scenarios they're suited for, as well as how to deploy Windows using modern methods. This course will also cover planning and implementing an update strategy for Windows.
B: Managing Modern Desktops and Devices
As demand for organizations to enable workforces to be more mobile, a desktop administrator’s role is really is no longer about just “desktop” management. With BYOD becoming commonplace and the need for employees to access line of business apps on personal devices, the scope of desktop administration must include both desktop and mobile devices, regardless of ownership. During this course, you’ll be introduced to key components of modern management and co-management strategies. You’ll examine what it takes to incorporate Microsoft Intune into your organization and how to use it to manage modern desktops and devices. You’ll also learn about methods for deployment and management of apps and browser-based applications.
C: Protecting Modern Desktops and Devices
Every day, more organizations are asking IT to support mobility in the workforce. Modern environments require the Desktop Administrator be able to manage and support phones, tablets, and computers, whether it be owned by the organization or personally owned by the employee. At the same time, IT must still be able to protect the data that these devices access. In this course, the student will be introduced to the key concepts of security in modern management. This course covers authentication, identities, and access, as well as about how to protect these categories. The student will be introduced to Azure Active Directory and learn how to use Microsoft Intune to protect devices and data with compliance policies. Finally, this course will cover key capabilities of Azure Information Protection and Windows Defender Advanced Threat Protection and how to implement these capabilities