Training is not a commodity – all training centres are not the same. Iverson Associates Sdn Bhd is the most established, the most reputable, and the top professional IT training provider in Malaysia. With a large pool of experienced and certified trainers, state-of-the-art facilities, and well-designed courseware, Iverson offers superior training, a more impactful learning experience and highly effective results.
At Iverson, our focus is on providing high-quality IT training to corporate customers, meeting their learning needs and helping them to achieve their training objectives. Iverson has the flexibility to provide training solutions whether for a single individual or the largest corporation in a well-paced or accelerated training programme.
Our courses continue to evolve along with the fast-changing technological advances. Our instructor-led training services are available on a public and a private (in-company) basis. Some of our courses are also available as online, on demand, and hybrid training.
* Price excludes Exam
This five-day course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize System Center Endpoint Protection, manage compliance, and create management queries and reports. Additionally, this course, in conjunction with Microsoft Official Course 20703-2A, helps certification candidates prepare for Exam70-703: Administering System Center Configuration Manager and Cloud Services Integration.
This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications.
This course also is for individuals who are interested in taking Exam 70-703: Administering System Center Configuration Manager and Cloud Services Integration. Courses 20703-1A and 20703-2A, or equivalent knowledge and skills, are necessary to prepare for this exam.
Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching, and addressing.
Active Directory Domain Services (AD DS) principles and fundamentals of AD DS management.
Installation, configuration, and troubleshooting for Windows-based personal computers.
Basic concepts of public key infrastructure (PKI) security.
Basic understanding of scripting and Windows PowerShell syntax.
Basic understanding of Windows Server roles and services.
Basic understanding of the configuration options for iOS, Android, and Windows Mobile device platforms.
Students who attend this training can meet the prerequisites by attending the following courses or by obtaining equivalent knowledge and skills through hands-on activities:
After completing this course, students will be able to:
This module describes the features of Configuration Manager that you can use to perform complex management tasks, including the following tasks: • Hardware and software inventory. • Application management. • Operating system deployment. • Settings management. • Software update management. • Remote client troubleshooting. • Protection from malware.
Lab : Exploring the Configuration Manager tools
The Microsoft System Center Configuration Manager database stores a large amount of data about the resources in your environment. You might not always want to perform all management tasks on all resources simultaneously. Therefore, to help you locate devices or user objects in your environment that meet specific criteria, you can create queries. You then can use these queries to create collections or to find additional information about specific resources. This module describes queries and methods of creating and running them. In addition to queries, you can run reports to view various types of information related to your Configuration Manager environment. To run Configuration Manager reports, you must install and configure a reporting services point, which this module details.
Lab : Creating and running queriesConfiguring boundaries and resource discovery
Lab : Configuring SSRS
This module explains how to prepare the management infrastructure, including configuring boundaries, boundary groups, and resource discovery. Additionally, it describes how Configuration Manager interacts with the Microsoft Exchange Server environment to discover and manage mobile devices.
Lab : Configuring boundaries and resource discovery
Lab : Configuring user and device collections
This module explains the supported operating systems and devices, the software requirements, and the different methods for installing the Configuration Manager client. This module also describes some of the default and custom client settings that you can configure. After installing the client software, you can configure the client settings to perform routine management tasks.
Lab : Deploying the Microsoft System Center Configuration Manager client software
Lab : Configuring and monitoring client status
Lab : Managing client settings
This module provides an overview of inventory collection, and explains how you can manage the information collected. You also will learn about the process of collecting hardware and software inventory, initiating inventory cycles, and initiating and securing inventory collection. This module also covers the use of software metering to monitor program usage, and the configuration and management of Asset Intelligence.
Lab : Configuring and managing inventory collection
Lab : Configuring software metering
Lab : Configuring and managing Asset Intelligence
Configuration Manager clients obtain content, such as packages, applications, software updates, and even operating system images, from distribution points. Configuration Manager relies on the distribution point infrastructure to provide content management functionality. In this module, you will review the content management features, configure distribution points, and learn how to distribute and monitor content. You also will perform content validation and content prestaging.
Lab : Distributing and managing content for deployments
In this module, you will learn about the methods for creating, deploying, and managing applications with Configuration Manager. You also will learn to use the Software Center and the Application Catalog to install available applications. You will learn about managing deployments on unconventional applications. In addition, you will learn to install Windows 10 apps and virtualized applications.
Lab : Creating and deploying applications
Lab : Managing application supersedence and removal
Lab : Deploying virtual applications by using Configuration Manager (Optional)
Lab : Using Configuration Manager to deploy Windows Store apps
This module explains how to use the software updates feature in Configuration Manager to implement an end-to-end management process for the complex task of identifying, deploying, and monitoring software updates to your Configuration Manager clients.
Lab : Configuring the site for software updates
Lab : Deploying and managing software updates
Configuration Manager provides a number of security-related features that you can use to help protect client computers from malware threats, and to configure specific Windows Firewall settings for clients. Based on System Center Endpoint Protection (Endpoint Protection) functionality, Endpoint Protection in Configuration Manager supports the deployment, management, and monitoring of antimalware policies and Windows Firewall settings on client computers. This module explains how to use configure Endpoint Protection Configuration Manager to implement Endpoint Protectionand deploy and monitor Endpoint Protection policies.
Lab : Implementing Microsoft System Center Endpoint Protection
Many enterprise organizations require systems, such as servers, laptops, desktop computers, and mobile devices, to meet specific configuration and compliance requirements. Compliance settings in Configuration Manager can play a key role in identifying existing configurations, discovering systems that have adverse configuration changes, and remediating these settings automatically when necessary. Compliance settings also can help control how users manage and access data in the enterprise network environment. For computers that run Windows 8 and newer operating systems, you can manage data using folder redirection, offline files, and roaming profiles. You also can control access to data using remote connection profiles, virtual private network (VPN) profiles, Wi-Fi profiles, and certificate profiles. This module describes the compliance settings that you can manage using Configuration Manager. You will learn to use these settings to maintain configuration requirements and to provide secure data access to enterprise resources.
Lab : Managing compliance settings
You can use the operating system deployment feature in Configuration Manager to create operating system images that you can deploy to unmanaged computers and those managed by Configuration Manager. There are several scenarios in which you can deploy operating systems by using Configuration Manager, including when you are working with new systems or when you are upgrading existing ones. Operating system deployment uses both Configuration Manager and Windows components to manage and deliver operating system images. You can configure settings on a reference computer prior to capturing an image of its operating system or by using task sequences that Configuration Manager creates after you deploy the image to a target system. This module explains how to use Configuration Manager to create a strategy for operating-system deployments. And also, it explains how to manage Windows as a service.
Lab : Preparing thea site for operating -system deployment
Lab : Deploying operating -system images for bare-metal installations
4-8 Mar 2019
15-19 Apr 2019 (Penang)
10-14 Jun 2019
22-26 Jul 2019 (Penang)
30 Sept - 4 Oct 2019
2-6 Dec 2019
PMP, Project Management Professional (PMP), CAPM, Certified Associate in Project Management (CAPM) are registered marks of the Project Management Institute, Inc.