Windows Mobile Administration: Windows 8 Beginner

https://www.skillsoft.com/channel/windows-mobile-administration-3cc8aea1-2e6c-11e7-9bd2-a1518a820467?technologyandversion=37264&expertiselevel=37263 https://www.skillsoft.com/channel/windows-mobile-administration-3cc8aea1-2e6c-11e7-9bd2-a1518a820467?technologyandversion=37265&expertiselevel=37268
  • 6 Courses | 5h 5m 22s
  • 5 Books | 15h 11m
  • 6 Courses | 5h 43m 32s
  • 6 Books | 24h 42m
Likes 8 Likes 8
 
Explore, in-depth, the elements and processes of administration for Windows Mobile OSs.

GETTING STARTED

Device Configuration & Data Access

  • Playable
    1. 
    Microsoft Account
    3m 44s
    NOW PLAYING
  • Playable
    2. 
    Windows Control Panel
    3m 6s
    UP NEXT

GETTING STARTED

Designing for Cloud & Hybrid Identity

  • Playable
    1. 
    Designing Azure AD Identities
    5m 8s
    NOW PLAYING
  • Playable
    2. 
    Integrating Active Directory
    6m 12s
    UP NEXT

COURSES INCLUDED

Device Configuration & Data Access
As an IT professional, you need to be familiar with configuring Windows devices and accessing cloud-based data. Learn about Windows device configuration, including profiles, display settings, file encryption, and app updates.
14 videos | 52m has Assessment available Badge
Device Configuration & Data Storage
Increase your knowledge of Windows device configuration and cloud-based data access by learning about various storage options and file systems.
12 videos | 54m has Assessment available Badge
Implementing Permissions, Shares, & Encryption in Windows
Data security is a key component in managing Windows devices and cloud-based services. Explore security principles required for sharing data, including permissions, certificates, SSL, and public and private keys.
16 videos | 58m available Badge
Data Management & Device Security
When managing Windows devices and cloud-based services, the importance of data security cannot be underestimated. Learn about data security, including firewalls, multifactor authentication, Windows Rights Management, and biometrics.
10 videos | 36m has Assessment available Badge
Using Microsoft Cloud Services
Cloud-based systems provide businesses with increased flexibility, scalability, and productivity. Learn about Microsoft cloud-based services, as well as the essentials of working with Microsoft Azure.
15 videos | 1h 3m has Assessment available Badge
Using Microsoft Identity Management & BYOD Solutions
Increase your knowledge of cloud-based systems by learning about Azure Active Directory, Federation Services, work folders, RemoteApp, as well as BYOD Desktop virtualization, dynamic access control, and Windows Rights Management.
11 videos | 39m has Assessment available Badge
SHOW MORE
FREE ACCESS

COURSES INCLUDED

Designing for Cloud & Hybrid Identity
Integrating, designing, and planning for Azure AD identities are the first steps for designing devices in the Enterprise. Explore design for cloud/hybrid identity, planning for Azure AD identities, and designing for AD synchronization.
16 videos | 1h 17m has Assessment available Badge
Designing for Device Access & Protection
Proper access to and protection for devices  in the Enterprise is probably one of the most important design steps. Discover how to plan for device enrollment and the company portal, and plan protection for data on devices.
15 videos | 1h has Assessment available Badge
Designing for Data Access & Protection
After device protection comes proper access to data, including protection of remote data. Discover how to design for data access and protection, including planning shared resources, advanced audit policies, and file and folder access.
13 videos | 59m has Assessment available Badge
Remote Access & Mobility
After device protection comes proper access to data, including protection of remote data. Discover how to design for remote access, including remote connectivity, remote authentication, and mobility options.
10 videos | 48m has Assessment available Badge
Managing RemoteApp & Planning App Support and Compatibility
Once you’ve finished planning and designing all your devices, it’s time to plan for updates and system recovery. Discover how to manage RemoteApp and plan app support and compatibility.
11 videos | 48m has Assessment available Badge
Planning Updates & Recovery
Once you’ve finished planning and designing all your devices, it’s time to plan for updates and system recovery. Discover how to plan for system recovery, file recovery, and device updates.
12 videos | 49m has Assessment available Badge
SHOW MORE
FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE COURSES

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

BOOKS INCLUDED

Book

Bring Your Own Devices (BYOD) Survival Guide
Examining the business aspects of the Bring Your Own Device (BYOD) psycho-techno phenomenon, this book covers the broad range of technical considerations including selection, connectivity, training, support, and security, and includes an extensive set of best practices.
Book Duration 6h 7m Book Authors By Jessica Keyes

Book

Mobile Device Security for Dummies
Featuring real-world case scenarios and invaluable advice, this essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise.
Book Duration 5h 2m Book Authors By Ashwin Krishnan, Rich Campagna, Subbu Iyer

Book

Securely Enabling Mobility & BYOD in Organizations
Authored by EMC Proven Professionals, Knowledge Sharing articles present ideas, expertise, unique deployments, and best practices. This article highlights the security issues that may arise from Mobility and BYOD, followed by the importance of recognizing the role of Security Governance, Strategy, and Policy, and then applying best practices of technical solutions to successfully enable business user requirements.
Book Duration 24m Book Authors By Sakthivel Rajendran

Book

Bring Your Own Device (BYOD): The Mobile Computing Challenge
The increasing use of personal devices such as smartphones and tablets in the workplace is offering an opportunity as well as a challenge for organisations, particularly the IT department. This book examines ways to embrace the benefits, while offering advice on how to minimise the risks.
Book Duration 52m Book Authors By BCS, The Chartered Institute for IT

Book

Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices
An essential resource for IT and Audit professionals on how to manage, secure and audit smart devices, this book provides an understanding of the technologies related to smart devices and presents a number of different methods available to address the security of them.
Book Duration 2h 46m Book Authors By Philip Chukwuma, Richard Cozart, Sajay Rai
SHOW MORE
FREE ACCESS

BOOKS INCLUDED

Book

Bring Your Own Device (BYOD): The Mobile Computing Challenge
The increasing use of personal devices such as smartphones and tablets in the workplace is offering an opportunity as well as a challenge for organisations, particularly the IT department. This book examines ways to embrace the benefits, while offering advice on how to minimise the risks.
Book Duration 52m Book Authors By BCS, The Chartered Institute for IT

Book

Securely Enabling Mobility & BYOD in Organizations
Authored by EMC Proven Professionals, Knowledge Sharing articles present ideas, expertise, unique deployments, and best practices. This article highlights the security issues that may arise from Mobility and BYOD, followed by the importance of recognizing the role of Security Governance, Strategy, and Policy, and then applying best practices of technical solutions to successfully enable business user requirements.
Book Duration 24m Book Authors By Sakthivel Rajendran

Book

Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices
An essential resource for IT and Audit professionals on how to manage, secure and audit smart devices, this book provides an understanding of the technologies related to smart devices and presents a number of different methods available to address the security of them.
Book Duration 2h 46m Book Authors By Philip Chukwuma, Richard Cozart, Sajay Rai

Book

Bring Your Own Devices (BYOD) Survival Guide
Examining the business aspects of the Bring Your Own Device (BYOD) psycho-techno phenomenon, this book covers the broad range of technical considerations including selection, connectivity, training, support, and security, and includes an extensive set of best practices.
Book Duration 6h 7m Book Authors By Jessica Keyes

Book

Mobile Device Security for Dummies
Featuring real-world case scenarios and invaluable advice, this essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise.
Book Duration 5h 2m Book Authors By Ashwin Krishnan, Rich Campagna, Subbu Iyer

Book

MCSA: Microsoft Windows 10 Study Guide - Exam 70-697
Digging deeper into the intricacies of the Windows OS to provide the most up-to-date information on new Windows 10 technologies, this authoritative resource walks you through device planning, deployment, and management; network and storage configuration; access, data, app, and recovery management, and much more to help you master the exam material.
Book Duration 9h 31m Book Authors By William Panek
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Likes 415 Likes 415  
CHANNEL Asana
Likes 30 Likes 30  
Likes 106 Likes 106