Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Business Process Owners/Team Leads/Power Users, Industry Specialists, and Program/Project Managers. Overview Explain Maintenance and Repair business processesExecute maintenance tasksDefine relevant organizational elements used in Plant Maintenance In this course, students learn how to describe the maintenance and repair business processes within SAP ERP. This foundation knowledge is mandatory in order for students to have the confidence to complete the subsequent configuration courses. Plant Maintenance Organization Outlining EAM Processes and SAP Solution Portfolio Outlining the SAP User Interfaces and Roles Executing Maintenance Tasks with NetWeaver Business Client (NWBC) Checking Organizational Levels in Plant Maintenance Technical Objects Checking Functional Locations Managing Equipment Checking Linear Asset Management (LAM) Assigning Bills of Material (BOMs) to Technical Objects Breakdown Maintenance Planning Breakdown Maintenance Processing a Breakdown Maintenance Order Corrective Maintenance Outlining Corrective Maintenance Processing External Services Creating Notifications of Maintenance Requirements Creating Maintenance Orders Planning of Maintenance Orders Planning of Maintenance Orders for Operation Account Assignment (OAA) Selecting Maintenance Orders Planning for Maintenance Orders Scheduling Maintenance Executing Maintenance Tasks with SAP GUI Completing Notifications and Orders Confirm and Technically Complete an Order Creating a Shift Report Refurbishment of Spare Parts Checking Prerequisites in Materials Management (MM) Refurbishing Spare Parts Internally Refurbishing Spare Parts Externally Preventive Maintenance Outlining Preventive Maintenance Checking the Maintenance Task List Creating Maintenance Plans Scheduling Maintenance Plans Project-Oriented Maintenance Outlining Project-Oriented Maintenance Supplementary Processes for SAP Enterprise Asset Management Outlining Mobile Applications for SAP Enterprise Asset Management (SAP EAM) Using Visual Enterprise Documents Describing Basic Maintenance Processing Outlining Pool Asset Management (PAM) Outlining SAP Work Clearance Management (WCM) Applying Worker Safety Report and Analysis of Information for SAP Enterprise Asset Management (EAM) Analyzing Maintenance History with the Logistic Information System (LIS) Evaluating Plant Maintenance with SAP Business Warehouse (SAP BW) Outlining Rapid Deployment Solution EAM Analytics SAP Enterprise Asset Management Customizing Implementation Outlining SAP Enterprise Asset Management Customizing Implementation
Duration 2 Days 12 CPD hours This course is intended for This course is ideal for beginners and intermediate frontend developers who want to become full-stack developers. You will need some prior working knowledge of JavaScript and MongoDB as we skim over its basics and get straight to work. Overview At the end of this day, students should be able to: Understand the MEAN architecture Create RESTful APIs to complete CRUD tasks Build a blogging application with basic features Describe best practices to secure node applications Implement authentication and authorization Create simple animations using Angular Perform unit testing on Angular applications MongoDB, Express, Angular and Node.js Fundamentals begins by demystifying the MEAN architecture. You will review the features of the JavaScript technologies, frameworks, or libraries that make up a MEAN stack. You will also understand how to develop a RESTful API using Node.js, Express.js, and MongoDB Atlas. This course will enable you to discover how to build a blogging application using the MEAN stack. Next, you will learn about authentication using MEAN, and explore the features of Angular, such as pipes, reactive forms, modules and optimizing apps, animations and unit testing, and much more. By the end of the course, you will have all of the knowledge you need to become a pro at developing efficient web applications using JavaScript technologies. Introduction to the MEAN stack MEAN Architecture Demystification Getting Started with Node Activity 1: Creating an HTTP Server for a Blogging Application Understanding Callbacks, Event loop and EventEmitters in Node Understanding Buffers, Streams and Filesystem in Node Activity 2: Streaming Data to a File Developing RESTful APIs to perform CRUD operations Getting Started with RESTful APIs Getting started with MongoDB Atlas Activity 3: Connecting the Node Application with MongoDB Atlas Getting Started with Express Activity 4: Creating Express API Route and Controller Activity 5: Testing Fully Functional RESTful API Beginning Frontend Development with Angular CLI Getting Started with Angular CLI Using Components, Directives, Services, and Making HTTP Requests in Angular Activity 6: Designing the Frontend and Components for the Blogging Application Activity 7: Writing Services and Making HTTP Request Calls to an API Understanding Angular Forms and Routing Activity 8: Creating a Form Application Using the Reactive/Model-Driven Method Activity 9: Creating and Validating Different Forms Using the Template and Reactive Driven Method Activity 10: Implementing a Router for the Blogging Application Understanding MEAN Stack Security Node Security and Best Practices Node Application Authentication with JSON Web Token (JWT) Activity 11: Securing the RESTful API Node Application Authentication with Passport Activity 12: Creating a Login Page to Allow Authentication with Twitter Using Passport Strategies Angular Declarables, Bootstrapping, and Modularity Using Inbuilt Pipes, Custom Pipes, Custom Directives, and Observables Activity 13: Communicating Between Two Components Using Observable Angular Bootstrapping and Modularity Activity 14: Creating a Lazy Loaded Application Testing and Optimizing Angular Applications Angular Animations and Latest Angular Features Activity 15: Animating the Route Transition Between the Blog Post Page and View Post Page of the Blogging Application Optimizing Angular Applications Testing Angular Applications Activity 16: Performing Unit Testing on the App Root Component and Blog-Post Component Overview on the new features in Angular
Duration 1 Days 6 CPD hours This course is intended for This course is intended for customer service professionals with any level of experience who want to expand their knowledge, improve their skill set, and increase the understanding of customer benefits. Overview In this course, you will develop the skills to coach for results. You will: Describe the benefits of customer service, identify internal customers, identify the benefits to you of giving good customer service, and identify how you can help your company to excel. Identify the major trends in customer service today and the combination of criteria required for customer satisfaction. Identify the benefits of bringing respect, emotional support, and a personal touch to customer interactions, and apply the personal touch to customer interactions. Identify the six categories of face-to-face communication, the critical success factors in face-to-face communication, and the benefits of actively listening to your customers. Identify remote customer service communication channels and apply remote customer service best practices. Identify guidelines for handling unreasonable customers, explore ways to handle angry customers, and identify guidelines for handling unhelpful colleagues. Take action to increase the loyalty of the customers you serve. You will also identify guidelines for dealing with moments of truth, identify the benefits of customer complaints, identify the steps in the service recovery process, and analyze the moments of truth in a real-life situation. As a customer service representative, you are expected to handle customer interactions in the best way possible. The expectations of both your company and your customers hinge on your ability to provide the right service in the right way. In this course, you will explore the background and techniques of customer interactions.Providing quality customer care ensures that every single contact with your company is a positive experience. Customers can range from external consumers to internal employees in other departments. Knowing how to provide the same level of service to all customers will enrich your time spent at work by establishing positive business relationships. Recognizing crucial points throughout customer interactions increases your ability to solve problems and offer affirmative solutions. Applying this knowledge to trends in service and consumer desires allows you to contribute to the company?s bottom line and make a customer?s life a little easier. Understanding Customer Service Describe Customer Service Benefits Recognize the Importance of Internal Customer Service Identify How Customer Service Benefits You Excel with Customer Service Identifying How Customers Define the Success of Your Company Recognize Trends in Customer Service Identify Criteria for Customer Satisfaction Increasing Customer Satisfaction Identify Characteristics of the Personal Touch Create Lasting Positive Impressions on Your Customers Providing Face-to-Face Customer Service Identify Categories of Face-to-Face Contact Understand the Critical Success Factors in Face-to-Face Customer Service Identify the Characteristics of Active Listening Providing Remote Customer Service Identify Remote Customer Service Communication Channels Apply Remote Customer Service Best Practices Engaging Difficult Customers Serve Difficult Customers Manage Angry Customers Deal with Difficult or Unhelpful Colleagues Increasing Customer Loyalty Optimize Moments of Truth Recognize the Value of Customer Complaints Identify the Stages of the Service Recovery Process
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Cisco Unified Communications system channel partners and resellers. System and technical support engineers. Customers who are deploying and maintaining Cisco Unified CCE solution products. Overview Upon completing this course, the learner will be able to meet these overall objectives: Understand CCE solutions, architecture, solution options, deployment models, integrated features and call flow options. Understand underlying Cisco Unified CCE processes, messaging and fault tolerance schemes. Install, upgrade and make basic configurations in Cisco Unified Communications Manager. Install, create databases, integrate, and upgrade all ICM components to include the ICM Router, Logger, Administration & Data Server, Peripheral Gateways, CTI Gateway and Cisco Finesse. Install, integrate, configure, and upgrade Cisco Unified CVP components to include the CVP Call Server, Voice XML Server, Media Server, Reporting Server and Cisco VVB. Install, upgrade, and make configurations for Cisco Unified Intelligence Center and Cisco Outbound Option Agent- and IVR-based campaigns. This course will provide the student with the underlying knowledge to understand deployment design solutions, requirements for deployment, and how to install and configure all major Cisco Unified CCE components. As a part of deployment activities, the student will understand how to install and integrate Intelligent Contact Manager (ICM) with Active Directory, how to install and integrate Cisco Unified CVP components using an IOS-based voice browser and Cisco Virtualized Voice Browser (Cisco VVB), how to install and integrate Cisco Finesse, how to install and integrate Cisco Unified Intelligence Center with Active Directory and associated Data Sources for reporting purposes, and how to install and configure Agent- and IVR-based Outbound Option dialing campaigns. And finally, the student will learn how to setup and use troubleshooting tools including RTMT, System CLI, Diagnostic Framework, and ICM command-line utilities to find status information and log files, and to track a call from the point of entry to the agent desktop. Cisco Unified Contact Center Enterprise Overview Lesson 1: Presenting Cisco Unified Contact Center Enterprise Lesson 2: Cisco Unified CCE Core Components Lesson 3: Cisco Unified CCE Options Lesson 4: Basic Call Flow Models Cisco Unified CCE Protocols, Processes and Services Lesson 1: Cisco Unified CM Lesson 2: Cisco Unified CCE/Intelligent Contact Manager Lesson 3: Cisco Unified CVP Installing Cisco Unified Communications Manager Lesson 1: Installation Prerequisites Lesson 2: Cisco Unified CM Installation Lesson 3: Post-installation Configurations Lesson 4: Creating Basic Infrastructure Lesson 5: Upgrading Cisco Unified CM Installing Intelligent Contact Manager Lesson 1: Installation Requirements Lesson 2: Pre-installation Tasks Lesson 3: Install the Main Installer Lesson 4: Install the Central Controller ?Lesson 5: Install the Administration and Data Server Lesson 6: Install the Peripheral Gateway Lesson 7: Install CTI Services Installing Cisco Unified CVP Lesson 1: Installation Prerequisites Lesson 2: Install the CVP Server Lesson 3: Configure Cisco Unified CVP Components Lesson 4: Upgrading Cisco Unified CVP Upgrade Path Installing and Configuring Cisco Unified CCE Options Lesson 1: Cisco Outbound Option Lesson 2: Cisco Unified Intelligence Center Supporting Cisco Unified CCE Lesson 1: Maintenance Activities Lesson 2: UCCE Troubleshooting Tools
This course is specifically for Sunbelt Rentals team members. This module covers the requirements for TExT and how to carry out the Thorough Examination and Test process for on-tool dust extraction machines. To complete the training you will need a working knowledge of machinery and have operated or completed Combined Inspections and Tests (PAT) on machines.
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: • Cisco Unified Communications system channel partners and resellers who are responsible for sales, implementation or administration of a Cisco Unified Contact Center. • System and technical support engineers. • Day 1 and Day 2 support personnel. • Administrative and reporting personnel. Overview Upon completing this course, the learner will be able to meet these overall objectives: • Understand the Cisco Unified CCE solution, architecture, solution options, integrated features, and call flow options. • Understand basic principles and configuration requirements for ACD activity in Cisco Unified CM, Cisco Unified CVP, ICM, and how to access and use the Cisco Finesse Agent Desktop. • Understand requirements and configurations to implement IVR activity in Cisco Unified CVP. • Understand and use administrative features and functions of ICM and implement more complex routing to include Precision Routing, routing from Cisco Unified Communications Manager and routing in a ring-no-answer condition. • Understand basic concepts and terms to access, view, modify reports and use other reporting functions provided by Cisco Unified Intelligence Center. Helps prepare learners to administer the Cisco Unified CCE v11.5 solution. Cisco Unified Contact Center Enterprise Overview Lesson 1: Presenting Cisco Unified Contact Center Enterprise Lesson 2: Cisco Unified CCE Core Components Lesson 3: Cisco Unified CCE Options Lesson 4: Basic Call Flow Models Basic ACD Configurations Lesson 1: Configuring Cisco Unified Communications Manager Lesson 2: Configuring Cisco Unified CVP Lesson 3: Configuring Cisco Unified CCE Lesson 4: Using Cisco Finesse Lesson 5: Using Cisco Unified CCE Script Editor Configuring Cisco Unified CVP for IVR Functionality Lesson 1: Basic IVR Configurations Lesson 2: Basic IVR Scripting using CVP Micro-Applications Extended Functions Lesson 1: ICM User Accounts and Feature Control Sets Lesson 2: Using ICM Utilities Lesson 3: Understanding ICM Variables Lesson 4: Precision Routing Lesson 5: Routing Calls from Cisco Unified CM Lesson 6: Ring-No-Answer Routing Cisco Unified CCE Reporting Lesson 1: Introducing Cisco Unified Intelligence Center Lesson 2: Running and Modifying CUIC Reports Lesson 3: Creating CUIC Reports and Dashboards
Duration 3 Days 18 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Overview Describe the value of MPLS VPNs. Describe the differences between provider-provisioned VPNs and customer-provisioned VPNs. Describe the differences between Layer 2 VPNs and Layer 3 VPNs. List the provider-provisioned MPLS VPN features supported by the JUNOS software. Describe the roles of a CE device, PE router, and P router in a BGP Layer 3 VPN. Describe the format of the BGP routing information, including VPN-IPv4 addresses and route distinguishers. Describe the propagation of VPN routing information within an AS. List the BGP design constraints to enable Layer 3 VPNs within a provider network. Explain the operation of the Layer 3 VPN data plane within a provider network. Create a routing instance, assign interfaces to a routing instance, create routes in a routing instance, and import/export routes from a routing instance using route distinguishers/route targets. Describe the purpose of BGP extended communities, configure extended BGP extended communities, and use BGP extended communities. List the steps necessary for proper operation of a PE-CE dynamic routing protocol. List the troubleshooting and monitoring techniques for routing instances. Explain the difference between the bgp.l3vpn table and the inet.0 table of a routing instance. Monitor the operation of a CE-PE dynamic routing protocol. Explain the operation of a PE mulit-access interface in a Layer 3 VPN and list commands to modify that behavior. Describe ways to support communication between sites attached to a common PE router. Provision and troubleshoot hub-and-spoke Layer 3 VPNs, Describe the flow of control traffic and data traffic in a hub-and-spoke Layer 3 VPN. Describe QoS mechanisms available in L3VPNs. Configure L3VPN over GRE tunnels. Describe the RFC 4364 VPN options. Describe the carrier-of-carriers model. Configure the carrier-of-carriers and ''Option C'' configuration. Describe the flow of control and data traffic in a draft-rosen multicast VPN. Describe the configuration steps for establishing a draft-rosen multicast VPN. Monitor and verify the operation of draft-rosen multicast VPNs. Describe the flow of control traffic and data traffic in a next-generation multicast VPN. Describe the configuration steps for establishing a next-generation multicast VPN. Describe the configuration steps for establishing a next-generation multicast VPN. Monitor and verify the operation of next-generation multicast VPNs. This three-day course is designed to provide students with MPLS-based Layer 3 virtual private network (VPN) knowledge and configuration examples. Chapter 1: Course Introduction Course Introduction Chapter 2: MPLS VPNs MPLS VPNs Provider-Provisioned VPNs Chapter 3: Layer 3 VPNs Layer 3 VPN Terminology VPN-IPv4 Address Structure Operational Characteristics Chapter 4: Basic Layer 3 VPN Configuration Preliminary Steps PE Router Configuration Lab: Layer 3 VPN with Static and BGP Routing Chapter 5: Layer 3 VPN Scaling and Internet Access Scaling Layer 3 VPNs Public Internet Access Options Lab: LDP over RSVP Tunnels and Public Internet Access Chapter 6: Layer 3 VPNs ? Advanced Topics Exchanging Routes between Routing Instances Hub-and-Spoke Topologies Layer 3 VPN CoS Options Layer 3 VPN and GRE Tunneling Integration Layer 3 VPN and IPSec Integration Layer 3 VPN Egress Protection BGP prefix-independent convergence (PIC) edge for MPLS VPNs VRF Localization Provider Edge Link Protection Support for configuring more than 3 million L3VPN Labels Lab: GRE Tunneling Chapter 7: Interprovider Backbones for Layer 3 VPNs Hierarchical VPN Models Carrier-of-Carriers Model Option C Configuration Lab: Carrier of Carrier Layer 3 VPNs Chapter 8: Troubleshooting Layer 3 VPNs Working with Multiple Layers Troubleshooting Commands on a PE Device Multiaccess Interfaces in Layer 3 VPNs PE and CE-based Traceroutes Layer 3 VPN Monitoring Commands Lab: Troubleshooting Layer 3 VPNs Chapter 9: Draft Rosen Multicast VPNs Multicast Overview Draft Rosen MVPN Overvie Draft Rosen MVPN Operation Configuration Monitoring Chapter 10: Next Generation Multicast VPNs Multicast VPN Overview Next-Generation MVPN Operation Configuration Monitoring Internet Multicast Ingress Replication Internet Multicast Signaling and Data Plane Configuring MVPN Internet Multicast Monitoring MVPN Internet Multicast Lab: MVPN Internet Multicast
Duration 3.5 Days 21 CPD hours This course is intended for This course is aimed at students new to the language who may or may not have experience with other programming languages. Overview Learn how Python works and what it's good for. Understand Python's place in the world of programming languages Learn to work with and manipulate strings in Python. Learn to perform math operations with Python. Learn to work with Python sequences: lists, arrays, dictionaries, and sets. Learn to collect user input and output results. Learn flow control processing in Python. Learn to write to and read from files using Python. Learn to write functions in Python. Learn to handle exceptions in Python. Learn to work with dates and times in Python. In this Python training course by Webucator, Inc, students learn to program in Python. Python Basics Running Python Hello, World! Literals Python Comments Data Types Variables Writing a Python Module print() Function Named Arguments Collecting User Input Getting Help Functions and Modules Defining Functions Variable Scope Global Variables Function Parameters Returning Values Importing Modules Math Arithmetic Operators Modulus and Floor Division Assignment Operators Built-in Math Functions The math Module The random Module Seeding Python Strings Quotation Marks and Special Characters String Indexing Slicing Strings Concatenation and Repetition Common String Methods String Formatting Built-in String Functions Iterables: Sequences, Dictionaries, and Sets Definitions Sequences Unpacking Sequences Dictionaries The len() Function Sets *args and **kwargs Flow Control Conditional Statements The is and is not Operators Python's Ternary Operator Loops in Python The enumerate() Function Generators List Comprehensions File Processing Opening Files The os and os.path Modules Exception Handling Wildcard except Clauses Getting Information on Exceptions The else Clause The finally Clause Using Exceptions for Flow Control Exception Hierarchy Dates and Times Understanding Time The time Module The datetime Module Running Python Scripts from the Command Line The sys Module sys.argv
Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications.This course also is for individuals who are interested in taking Exam 70-703: Administering System Center Configuration Manager and Cloud Services Integration. Courses 20703-1A and 20703-2A, or equivalent knowledge and skills, are necessary to prepare for this exam. Overview After completing this course, students will be able to:Describe the features Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment.Analyze data by using queries and reports.Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Microsoft Exchange Server.Deploy and manage the Configuration Manager client.Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering.Identify and configure the most appropriate method to distribute and manage content used for deployments.Distribute, deploy, and monitor applications for managed users and systems.Maintain software updates for PCs that Configuration Manager manages.Implement Endpoint Protection for managed PCs.Manage configuration items, baselines, and profiles to assess and configure compliance settings and data access for users and devices.Configure an operating-system deployment strategy by using Configuration Manager.Manage and maintain a Configuration Manager site. This course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize System Center Endpoint Protection, manage compliance, and create management queries and reports. Additionally, this course, in conjunction with Microsoft Official Course 20703-2A, helps certification candidates prepare for Exam 70-703: Administering System Center Configuration Manager and Cloud Services Integration. Managing computers and mobile devices in the enterprise Overview of systems management by using enterprise management solutions Overview of the Configuration Manager architecture Overview of the Configuration Manager administrative tools Tools for monitoring and troubleshooting a Configuration Manager site Lab : Exploring the Configuration Manager tools Searching in the Configuration Manager console Using Windows PowerShell with Configuration Manager Using Configuration Manager Service Manager to manage components Monitoring site and component status Reviewing log files by using the Configuration Manager Trace tool Explain how to use Configuration Manager to address the challenges of managing systems and users in today?s enterprise. Describe the Configuration Manager architecture. Describe the management tools that you use to perform administrative functions for Configuration Manager. Describe the tools that you use to monitor and troubleshoot a Configuration Manager site. Analyzing data using queries and reports Introduction to queries Configuring Microsoft SQL Server Reporting Services (SSRS) Lab : Creating and running queriesConfiguring boundaries and resource discovery Creating data queries Creating subselect queries Creating status message queries Lab : Configuring SSRS Configuring a reporting services point Creating a report by using Report Builder Create and configure data and status message queries. Configure and manage SSRS and the reporting services point. Preparing the management infrastructure to support PCs and mobile devices Configuring site boundaries and boundary groups Configuring resource discovery Configuring the Exchange Server Connector for mobile device management Configuring user and device collections Lab : Configuring boundaries and resource discovery Configuring boundaries, boundary groups, and fallback relationships Configuring Active Directory discovery methods Lab : Configuring user and device collections Creating a device collection Creating a user collection Configuring a maintenance window Configure boundaries and boundary groups. Configure resource discovery. Configure the Exchange Server connector mobile device management. Organize resources using device and user collections. Deploying and managing clients Overview of the Configuration Manager client Deploying the Configuration Manager client Configuring and monitoring client status Managing client settings in Configuration Manager Lab : Deploying the Microsoft System Center Configuration Manager client software Preparing the site for client installation Deploying the Configuration Manager client software by using client push installation Lab : Configuring and monitoring client status Configuring and monitoring client health status Lab : Managing client settings Configuring client settings Describe the requirements and considerations for installing the Configuration Manager client software. Deploy the Configuration Manager client software. Configure and monitor client status. Manage Configuration Manager client settings. Managing inventory for PCs and applications Overview of inventory collection Configuring hardware and software inventory Managing inventory collection Configuring software metering Configuring and managing Asset Intelligence Lab : Configuring and managing inventory collection Configuring and managing hardware inventory Lab : Configuring software metering Configuring software metering Lab : Configuring and managing Asset Intelligence Preparing the site for Asset Intelligence Configuring Asset Intelligence Monitoring license agreements by using Asset Intelligence Viewing Asset Intelligence reports Describe inventory collection. Configure and collect hardware and software inventory. Manage inventory collection. Configure software metering. Configure Asset Intelligence. Distributing and managing content used for deployments Preparing the infrastructure for content management Distributing and managing content on distribution points Lab : Distributing and managing content for deployments Installing a new distribution point Managing content distribution Prepare the infrastructure for content management. Distribute and manage content on distribution points. Deploying and managing applications Overview of application management Creating applications Deploying applications Managing applications Deploying virtual applications by using System Center Configuration Manager (Optional) Deploying and managing Windows Store apps Lab : Creating and deploying applications Installing and configuring the Application Catalog roles Creating applications with requirements Deploying applications Lab : Managing application supersedence and removal Managing application supersedence Uninstalling the Excel Viewer application Lab : Deploying virtual applications by using Configuration Manager (Optional) Configuring support for App-V Deploying virtual applications Lab : Using Configuration Manager to deploy Windows Store apps Configuring support for sideloading Windows Store apps Configuring a Windows Store app Deploying Windows 10 apps to users Describe the application management features of Configuration Manager. Create applications. Deploy applications. Manage applications. Configure and deploy virtual applications. Configure and deploy Windows Store apps. Maintaining software updates for managed PCs The software updates process Preparing a Configuration Manager site for software updates Managing software updates Configuring automatic deployment rules Monitoring and troubleshooting software updates Lab : Configuring the site for software updates Configuring and synchronizing the software update point Lab : Deploying and managing software updates Determining software update compliance Deploying software updates to clients Configuring automatic deployment rules Describe how the software updates feature integrates with Configuration Manager. Prepare the Configuration Manager site for software updates. Manage the evaluation and deployment of software updates. Configure automatic deployment rules. Monitor and troubleshoot software updates. Implementing Endpoint Protection for managed PCs Overview of Endpoint Protection in Configuration Manager Configuring, deploying, and monitoring Endpoint Protection policies Lab : Implementing Microsoft System Center Endpoint Protection Configuring the System Center Endpoint Protection point and client settings Configuring and deploying Endpoint Protection policies Monitoring Endpoint Protection Configure Endpoint Protection to detect and remediate malware and security vulnerabilities. Configure, deploy, and manage Endpoint Protection policies. Managing compliance and secure data access Overview of Compliance Settings Configuring compliance sett
Duration 3 Days 18 CPD hours This course is intended for This course is most suited for IT professionals who have a need to understand the current requirements and core competences for managing IT in mission-critical environments. Overview After completion of the course the participant will be able to: 1. Provide guidance and implementation for IT strategy as set by senior IT and business management 2. Select and manage staff, implement training programs, career plan development and job rotation programs 3. Select, evaluate and negotiate vendors using RFI, RFP and selection criteria 4. Provide guidance for developing, testing and implementing business applications 5. Manage and/or assist in IT project management 6. Design and implement service management processes for incident, problem and change management 7. Understand the need for business continuity and design the business continuity plan 8. Review and implement information security practices and controls 9. Assist and initiate risk management practices 10. Understand and select new technologies such as cloud computing, big data, Internet of Things and social media to support business change demands 11. Select strategies for information management 12. Measure and improve quality of IT services CITS is designed to teach the skills, knowledge and competencies required of the modern IT specialist working at the senior professional, team-leader, supervisor or management level in IT management. IT Strategy The need for Information Technology Enterprise architecture Service catalogue Service level management Sustainable development IT Organisation Personnel need Roles and responsibilities Sourcing Selection process Hiring staff Managing staff Career planning Training / job rotation Performance appraisal Staff departures Vendor Selection / Management The importance of vendors Vendor selection Request For Information (RFI) Request For Proposal (RFP) Proposal evaluation Vendor reference checks Contract negotiation Contract management Vendor management Re-compete vendors Project Management Methodologies Project organisation Starting up / initiating Planning / initiation a project Risk Quality Scope Work / Product Breakdown Structure PERT diagram / Gantt chart Cost Communication Application Management Software Development Life Cycle (SDLC) Software Quality Assurance (SQA) Requirements Development Testing Adoption (implementation) Maintenance Service Management Incident management Problem management Change management Business Continuity Management Standards and guidelines Objectives Context Interested parties Scope Roles and responsibilities Resources and competences Awareness and communication Documentation Business Impact Analysis Risk Management Guidelines Context establishment Identification Analysis Evaluation Treatment Communication Monitoring and control Information Security Management Standards Confidentiality Integrity Availability Controls types Guideline for controls selection Control categories Information security awareness Security incident response Information and Knowledge Management Information management Data management Information management - technologies Business intelligence Data management - technologies Best practices in data governance Pitfalls in data governance Business Change Management Business change Frameworks, models and techniques Needs identification Cloud computing Social media / digital marketing Big data Internet of Things (IoT) Quality Management Standards, guidelines and frameworks Objectives Activities Services review Customer feedback Customer survey Key Performance Indicators (KPI) Metrics Scorecards and reports Quality register Exam Actual course outline may vary depending on offering center. Contact your sales representative for more information.