Microsoft MCITP Enterprise Desktop Support Technician on Windows 7 Training - OnDemand Learning

List Price: $1,290.00
Sale Price: $895.00
Item Number: MS-MCITP-ENT-W7
Configuration: -online

* denotes required field

Media Content*
MCTS: .NET Framework 3.5 ASP .NET Applications
Package Includes

MCITP: Enterprise Desktop Support Technician on Windows 7

Exam #
Course Title
Retail Price
Microsoft Windows 7, Configuring check $495.00
Enterprise Desktop Support Technician check $495.00
Complete Training Totals:  
Retail Price
Suite Price
You Save $95
  • 12 Months Online Access, Featuring OnDemand Instructor-Led Classroom Sessions with Full Audio and Video Lectures
  • Software Video Demonstrations
  • Self-Assessment Module Review Quizzes
  • Printable Courseware
  • Certificate of Completion
  • Free 1 Year Upgrade Policy
  • Mobile Access via iPhones and iPads


Kenneth Mayer - Certified CEH Trainer (CCSI, MCT, CCNP, CCDA)
Ken Mayer is a Microsoft Certified Trainer as well as a Certified Ethical Hacker Trainer and Security consultant. He started his career in computer technology in 1980s. He has offered a wide variety of IT training and high Chapter consulting projects for Fortune 500 companies across the United States and Western Europe. He has achieved the Certified Cisco Systems Instructor certification. The CCSI certification involved a two-day lab and observation event held on Cisco in Paris, France Facility. This gave Ken the accreditation to be able to deliver Cisco Authorized Courses as a CCSI. He has taught the full line of Cisco CCNA, CCDA, CCNP, CCDP and CCIP course curriculums, including Cisco's security appliances such as PIX and IDS.

Sandra Batakis - MCT, MCSE, CIW
Sandra is a Senior Microsoft Certified Instructor with over 15 years in the IT certification training and courseware development field. She has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies. She possesses extensive hands-on IT experience including working with building computer networking infrastructure, configuring LAN, WAN and Internet security gateways, Implementing and migrating to Microsoft Exchange 5, 2000, 2003, 2007 and the new Exchange 2010. She has delivered numerous Microsoft, CompTIA and Adobe classroom-based as well as online Boot Camps and Seminars across the United States.

Course Features:

70-680: Microsoft Windows 7,

Chapter 01 - Basic Windows 7 Installation
Lesson: Installation Options
New Features of Windows 7
Minimum Hardware Requirements
Why Use 64-bit Windows 7
Installation Options
Windows 7 Offerings
Lesson: Choosing To Do the Clean Install
Discussion: Considerations for a Clean Installation
Discussion: Common Installation Errors
Ways To Do A Clean Installation
Demo - Configuring the Computer Name and Domain/Workgroup Settings
Chapter 01 Review
Chapter 02 - Advanced Windows 7 Installation
Lesson: Performing an Image Installation
What is Windows Imaging File Format?
Which Tools You Can Use
The Process for Image-Based Installation
Using SysPrep
Capturing and Applying the Installation Image by Using ImageX
Migrating User Data and Settings by Using USMT 4.0
Configuring VHDs
Lesson: Doing an Upgrade or Migration to Windows 7
How to Choose Migration or Upgrade
Upgrade Paths
Determining the Feasibility of an Upgrade Using Windows Upgrade Advisor
Steps to Upgrade to Windows 7
Ways to Migrate User Data and Settings
Steps to Migrate to Windows 7
Migrating User Settings and Data by Using WET
Lesson: Planning for Application Compatibility
Common Compatibility Problems
Common Mitigation Methods
Updating Shims
Chapter 02 Review
Chapter 03 - Understanding Disk Types and File Systems
Lesson: Windows 7 Disk Types and Formats
The MBR Disk
The GPT Disk
Tools for Disk Management
Demo - Converting an MBR Partition to a GPT Partition
Lesson: Managing Hard Drives with Volumes
A Simple Volume
Demo - Creating a Simple Volume
What are Spanned and Striped Volumes?
Demo - Creating Spanned Volumes
Demo - Creating Striped Volumes
Why Would you Resize a Volume?
Demo - Resizing a Volume
Lesson: Hard Drive Maintenance
Disk Fragmentation
How to Defragment a Disk
Disk Quotas
Demo - Configuring Disk Quotas
Chapter 03 Review
Chapter 04 - Network Configuration
Lesson: IP Addressing
Understanding the IPv4 Address
Understanding the Subnet Mask
Public and Private Address Space
Why the Default Gateway
Demo - Configuring an IPv4 Address
Types of Computer Names
Methods for Resolving Computer Names
Why IPv6
Windows 7 Support for IPv6
Understanding the IPv6 Address Space
Types of IPv6 Address Scopes
Demo - Configuring an IPv6 Address
Lesson: Auto IP Configuration
Auto Configuration of IPv4 Settings
Auto Configuration of IPv6 Settings
Demo - Configuring a Computer to Obtain an IPv4 Address Dynamically
Troubleshooting Client-Side DHCP Issues
Lesson: Troubleshooting Networking
Troubleshooting Tools
Troubleshooting Methodology
Demo - How to Troubleshoot Network-Related Problems
Lesson: Introducing Wireless Networks
Describing a Wireless Network
Technologies Used in WiFi
How Do You Secure WiFi?
Lesson: Connecting Windows 7 to the Wireless Network
Configuring the Hardware
Wireless Network Settings
How to Improve WiFi Signal Strength
Troubleshooting WiFi Connections
Chapter 04 Review
Chapter 05 - Sharing Files, Folders, and Printers
Lesson: Planning for Authentication and Authorization
Understanding Authentication and Authorization
The Process of Authentication and Authorization
New Authentication Features
Lesson: Securing File Access
NTFS Permission
Permission Inheritance
Demo - Configuring NTFS Permissions for Files and Folders
How Permissions May Change with File Copy or Moving
What are Effective Permissions?
Discussion: Determining Effective Permissions
Lesson: Compressing Files
What is NTFS File Compression?
How Compression Settings are Affected with File Move or Copy
Zipped Folders
Demo - Compressing Files and Folders
Lesson: Sharing Folders and Printers
What are Shared Folders?
Ways to Share Folders
Discussion: Combining NTFS and Share Permissions
Using the Network and Sharing Center
Managing Printing
Printing Components in Windows 7
Demo - Installing and Sharing a Printer
Location-Aware Printing
Client-Side Printing
Chapter 05 Review

Chapter 06 - Working with Windows 7 Client Performance
Lesson: Installing and Configuring Device Drivers
Overview of Device Drivers
How to Install Devices and Drivers
Tools for Device Driver Management
Methods for Updating Drivers
Managing Signed Drivers
Discussion: Options for Recovering from a Driver Problem
Demo - Managing Drivers by Using Device Manager
Lesson: Windows 7 Performance Monitoring Tools
Discussion: What Are Performance and Reliability Problems?
Tools to Gather Performance Information
Monitoring Performance and Using Data Collector Sets
Demo - Using the Resource Monitor
Demo - Analyzing System Performance by Using Data Collector Sets and Performance Monitor
How Performance Monitor Can Help You
Lesson: Monitoring Reliability of Windows 7
How WDT Can Help You Solve Problems
Windows Network Diagnostics Tools
Windows Startup and Recovery
Introducing the Windows Memory Diagnostics Tool
Looking at the Reliability Monitor and Problems Reports and Solutions Tool
Chapter 06 Review
Chapter 07 - Basic Desktop Security
Lesson: Discussion of Security Management in Windows 7
New Security Features in Windows 7
Introducing the New Action Center
Demo - Configuring Action Center Settings
Lesson: Using Windows Defender
Watch Out for Malware
What is Windows Defender?
How Windows Defender Can Help You
Demo - Configuring Windows Defender Settings
Lesson: How does UAC Work?
Revisiting UAC
Improvements to How UAC Works
Demo - Configuring Group Policy
Getting Your Notifications
Lesson: Using Windows Firewall
Discussion: What is a Firewall?
Basic Firewall Settings
Advanced Security Options
Know Your "Well-Known" Ports
Demo - Configuring Inbound, Outbound, and Connection Security Rules
Chapter 07 Review
Chapter 08 - Advanced Desktop Security
Lesson: Using Local Policies to Secure Windows 7
Introducing Group Policies
How GPOs are Applied
Order of Operations for Multiple Policies
Demo - Creating Multiple Local Group Policies
Demo - Configuring Local Security Policy Settings
Lesson: How EFS and BitLocker Secure Your Data
Demo - Encrypting and Decrypting Files and Folders by Using EFS
Introducing BitLocker
BitLocker Requirements
BitLocker Modes
Setting BitLocker Options with Group Policies
Configuring BitLocker
Configuring BitLocker To Go
Recovering BitLocker Encrypted Drives
Lesson: Security With Application Restrictions
Introducing AppLocker
AppLocker Rules
Demo - Configuring AppLocker
What are Software Restriction Policies?
Lesson: IE Version 8 Privacy Features
Discussion: Compatibility Features in Internet Explorer 8
Internet Explorer 8's Enhanced Privacy Features
Using the SmartScreen Feature in Internet Explorer 8
Other Security Features in Internet Explorer 8
Demo - Configuring Security in Internet Explorer 8
Chapter 08 Review
Chapter 09 - Disaster Recovery & Prevention
Lesson: Backing Up and Restore Options with Windows 7
Discussion: Why Do Backups?
Introducing the Backup and Restore Tool
Demo - Perform a Backup
Lesson: How System Restore Works
Using Previous File Versions
Configuring System Protection Settings
Demo - Restore a System
Lesson: Using the Windows Update
What is Windows Update?
Using Windows Update Settings
Windows Updates with GPOs
Chapter 09 Review
Chapter 10 - Remote Access Options
Lesson: Configuring Windows 7 for Mobility
Discussion: What Devices Would be Considered Mobile?
Settings to Configure on Mobile Computers
What is a Sync Partnerships?
Managing Power Options in Windows 7
Demo - How to Configure a Power Plan
Lesson: Remote Access Solutions
Introducing Remote Desktop and Remote Assistance
Setting Up Remote Desktop
Understanding VPN Connections
How to Make a VPN
What is DirectAccess?
How DirectAccess Works
Requirements for Setting Up DirectAccess
What is BranchCache?
How BranchCache Works
Requirements for Setting Up BranchCache
Demo - Configuring BranchCache on a Windows 7 Client Computer
Chapter 10 Review
Chapter 11 - Introducing Windows PowerShell 2.0
Lesson: What is Windows PowerShell 2.0?
Overview of Windows PowerShell
Improvements in Windows PowerShell 2.0
Using cmdlets in Windows PowerShell 2.0
Understanding Windows PowerShell Eventing
Introducing the Windows PowerShell 2.0 Integrated Scripting Environment (ISE)
Operating the Windows PowerShell ISE Editor
Lesson: Remoting With Windows PowerShell 2.0
Overview of Windows PowerShell Remoting
How to Connect to a Remote Computer
Processing of Remote Commands
Issuing Remote Commands
Lesson: Configuring Group Policy with PowerShell 2.0
PowerShell 2.0 Has New cmdlets for Group Policy Administration
Requirements for Group Policy
Chapter 11 Review
Course Closure

70-685: Enterprise Desktop Support Technician

Chapter 01 - Identifying Cause and Resolving Desktop Application Issues
Identifying Cause and Resolving Desktop Application Issues
Role of Enterprise Technician
Troubleshooting Windows 7
Programs Troubleshooting
Using a Troubleshooter
Demo - Troubleshooter
Problem Steps Recorder
Problem Steps Recorder Output
Demo - Problem Steps Recorder
Software Installation Methods
Installing Applications
Using Group Policy to Install Software
Demo - GPO Driver Installation
Other Group Policy Settings
Group Policy and Software Restrictions
Order of Software Restriction Policies Processing
Enforcement Rules
AppLocker Requirements
Creating AppLocker Rules Procedure Reference
Demo - AppLocker Rules
AppLocker Advantages
AppLocker Disadvantages
Installation Permissions and Compatibility
Mitigation of Compatibility Issues
Application Compatibility Options
Digital Signing Software
Program Compatibility - Control Panel
Application Compatibility Toolkit Features
Application Compatibility Toolkit (ACT)
Running Applications in Compatibility Mode
Demo - Compatibility Toolkit
Other Tools to Know About
User Account Control (UAC)
Demo - User Account Control
Windows Installer
Identifying Cause of and Resolving Desktop Application Issues
Running Legacy Applications
How to Update Applications
Application Updates
Windows Update
Demo - Windows Update
GPO Options - WSUS
WSUS Server Administrator
WSUS Options
Troubleshooting Windows Update
Windows Management Instrumentation (WMI)
WMI Tasks
Sample VB Script Using WMI
Internet Explorer
Internet Explorer Privacy Settings
Internet Explorer Add-Ons
Demo - Internet Explorer Add-Ons
Smart Screen Filter
Demo - Smart Screen Filter
Browsing History
Web Site Certificates
Group Policy Restrictions
Demo - Group Policy Restrictions
Restore Default Settings
Chapter 01 Review
Chapter 02 - Operating System Troubleshooting and Support
Operating System Troubleshooting and Support
Startup Architecture
Windows Startup Recovery: Two Options
Windows Startup Recovery: Advanced Boot Options
Demo - Windows Advanced Startup Options F8
Recovery Tools in Windows RE
Demo - Windows RE
Windows System Restore
Demo - System Restore
Demo - BCDEdit
Demo - Editing BCD
Safe Mode Options
Identifying Software Update Level
Demo - Identifying Software Update Level
Working with Services
Configuring Services
Demo - Configuring Services
Finding Problems with Services
Ways to Disable Services
Demo - SC Query
OS Troubleshooters
Troubleshooting Pack Components
Event Viewer
Demo - Event Viewer
Event Log Configuration
Properties in Event Viewer
Event Viewer and Task Scheduler
Demo - Attach a Task in Event Viewer
Event Forwarding
Creating Event Subscriptions
Enabling Subscriptions for Event Forwarding
System Restore
Windows Experience Index
How Scores Work Together
Demo - Windows Experience Index
Windows 7 and Language Packs
New Features of Language Packs
Language Pack Deployment Options
Multilingual Deployments
Language Deployment
Test Environments
Windows Deployment Services
Unattended Setup - WDS
Microsoft Deployment Toolkit
ImageX Commands
ImageX Commands (Cont.)
Internet Explorer Compatibility
Enabling Compatibility
Demo - Internet Explorer Compatibility
Chapter 02 Review
Chapter 03 - Networking with Windows 7
Networking with Windows 7
Windows 7 Network Access
Demo - Network and Sharing Center
Demo - Connect/Disconnect VPN
Link Layer Topology Discover (LLTD)
Troubleshooting: Wired Networks
Troubleshooting: Wireless
Wireless Signal Strength
Network Protocols
Wireless Security
Encryption Methods
Wireless Profiles - Manual Configuration
Demo - Wireless GPO
Automatic Configuration
Network Hardware
Network Architecture
Network Scope
TCP/IP Configuration
TCP/IP Utilities
Demo - TCP/IP Utilities
Demo - Telnet
Testing Connectivity with IPv4
Demo - Testing Connectivity
Name Resolution
Domain Name System (DNS)
Hosts File
Windows Internet Name Service (WINS)
Order of Name Resolution Methods
Link-local Multicast Name Resolution (LLMNR)
Troubleshooting: Name Resolution
Authentication of Connections
Network Profiles
Network Diagnostics
Remote Access Methods
VPN and Dial-up Authentication
Direct Access Configuration
Direct Access Authentication Methods
Connection Manager Administration Kit
Troubleshooting Remote Access
Branch Cache
Branch Cache - Configuration Options
Chapter 03 Review
Chapter 04 - Configuring Security and Troubleshooting Issues
Configuring Security and Troubleshooting Issues
Certificate Types
Encrypting Files System
EFS Encryption Keys
Process of EFS
Recovery Agents
EFS Configuration
Best Practices for EFS
BitLocker Drive Encryption
BitLocker Recovery
How to Determine If Your Computer Has TPM
Group Policy Settings - BitLocker
BitLocker Best Practices
BitLocker to Go
Internet Explorer
Demo - Configuring Internet Explorer
User Account Control
Demo - Windows Advanced Firewall
Windows Firewall with Advanced Security
Create a New Rule
Conflicting Firewall Rules
Network Security Tools
Windows Defender
Demo - Netsh
Protecting the OS from Attacks
Types of Issues as a Result of Infection
Windows 7 Tools and Features
Demo - Registry Editor
Demo - Action Center
Demo - Windows 7 Action Center
Protecting the PC Proactively
Programs to Assist
Most Effective
Anti-Virus Software
Microsoft Security Essentials
Spyware and Preventative Measures
Internet Explorer Protection
How to Know If Your Infected
How to Respond to Infected PC
Chapter 04 Review
Chapter 05 - Supporting Mobile Users
Supporting Mobile Users
VPN Networking
VPN Protocols
VPN Authentication Methods
Network Policies
Network Policies Flow
Remote Desktop
Demo - Remote Desktop
Configure Remote Desktop through GPO
Demo - GPO - RDP
Remote Assistance
Configuring Remote Assistance with GPO
Network Access Protection
Troubleshooting NAP
Direct Access
DirectAccess Configuration Notes
Branch Cache
Setting Power Management
Demo - Power Management
Chapter 05 Review
Chapter 06 - Maintaining Hardware on Win 7
Maintaining Hardware on Windows 7
Types of Failures
Identifying Hardware Issues
Demo - Hardware Information
Troubleshooting Hardware
Devices Most Likely to Fail
Memory Failures
Hard Drive Failure
Demo - Hard Drives
Working with Hard Drive Issues
Network Card Issues
Power Supply Issues
Hardware Diagnostic Tools Summary
Resource Monitor
Demo - Resource Monitor
Performance Monitor
Demo - Performance Monitor
What Are Data Collector Sets?
Demo - Data Collector Sets
What Is Reliability Monitor?
Demo - Reliability Monitor
Performance Issues
Demo - Process Affinity
Common Components
Device Drivers
Removing Unsigned Drivers
Driver Verifier
Updating Drivers
Safe Mode
Safe Mode Notes
Legacy Programs with Driver Install
Configuring Page File
Demo - Virtual Memory
Power Management
Managing USB Devices
Windows 7 Clients and Printer Installation
Mobile Users and Printing
XPS Based Printing
Printer Driver Issues
Print Spooler
Spooler Options
Configuration Options
Printer Pools
Installing Printers on the Network
Printers and Group Policy
How to Connect to Network Printers
Internet Printers
Printer Permissions
Location Aware Printing
Chapter 06 Review
Chapter 07 - Centralizing Configurations
Centralizing Configurations
What is Group Policy
Group Policy Settings
Demo - Local GPO
Tools to Determine Group Policy Issues
Demo - GPO Server
Administrative Templates
Group Policy Application and Processing Order
Settings That Can Affect Group Policy
GPO Examples
Synchronous GPO Processing
Asynchronous GPO Processing
Loopback Processing
GPO Troubleshooting
GPO Tools
Event Viewer
Event Forwarding
Chapter 07 Review
Chapter 08 - User Login, Profiles and Access to Resources
User Login, Profiles and Access to Resources
Login Process
Types of Authentication
Demo - User Accounts
Multi-factor Authentication
Network Infrastructure
Active Directory
Active Directory Infrastructure
Active Directory Topology
Network Based Services
Types of DNS Zones
Demo - DNS
Time Servers
Trust Relationships
Trust Examples
Machine Accounts
Benefits of Pre-staging Computer Accounts
User Accounts
Cached Credentials
User Profiles
Local Profiles
Roaming User Profiles
Mandatory User Profiles
Troubleshooting: Login Settings
Troubleshooting: Logon Errors
Drive Mappings
Demo - Drive Mappings
Shared Folders
Offline Files
Offline File Settings – Server Side
Demo - Offline Files
Configuring Offline Files – Client Side
Sync Center
Offline Files Options
Troubleshooting: Offline Files
Transparent Caching
NTFS Security
Combining Shared Permissions with NTFS Permissions
NTFS DENY Permission
Using DFS for Access to File Resources
How DFS Works
Notes About DFS
Restoring Files – Local and Network
Chapter 08 Review
Course Closure

Related Products

70-680 Real LIVE Practice-Labs: Windows 7, Configuring
List Price: $295.00
Sale Price: $195.00
70-680 Real LIVE Practice-Labs: Windows 7, Configuring
MCITP Training

Test drive our training for yourself!

Shopping Cart
Your cart is empty.

  • "It was great having an instructor who used to sit on the board of directors for PMI! He definitely knows his stuff and explains it in a detailed way."

  • - Sean W.
    Project Management Certification Training Bundle

  • "...Courses are excellent as exam prep materials..."

  • - Liza B.
    Project Management Certification Training Bundle

  • "...A great resource for the beginner and expert levels..."

  • - Corey S.
    CompTIA IT Certification Training Bundle

  • - Read More Here -