This course runs for a duration of 2 Days.
The class will run daily from 9:00am to 5:00pm.
Class Location: Knowledge Transfer - Eagan, MN.
NOTE: This course is only available by customer request. If you are interested in taking this course, please call 651-905-3729 or submit a request for a date.
About this course
This two-day instructor-led course is intended for IT professionals who are responsible for developing a management strategy for mobile devices in the enterprise. Devices running Windows, iOS and Android operating systems will be covered. Utilizing various Microsoft technologies students will create a mobile device plan, configure mobile device management and master both connectivity and data security on these devices. With the shift to BYOD (bring your own device) it is necessary that enterprises allow users to access information from a variety of devices with a minimum of risk to the loss of that information. The new tools implemented as a part of Windows Server 2012 and Windows Server 2012 R2 as well as System Center will allow for a complete set of BYOD enterprise policies.
Audience profile
This course is intended for IT professionals who have experience with mobile devices and some version of Windows client and server operating systems. Previous experience with management tools such as Microsoft System Center Configuration Manager would also be valuable but is not required.
At course completion
After completing this course, students will be able to:
Module 1: Overview of Mobile Device Manageme
In the past organizations either provided laptops or smart phones approved by the IT department and or allowed users to connect from their Windows based computers using options such as VPNs or Remote Desktop Gateways. These options still exist and remain common. However, the incredible growth of mobile devices from various vendors creates a need for managing access to data and applications from these devices. Organizations must determine the best methods for doing so in a secure manner.
Module 2: Mobile Device Management Strategy and Infrastructure
Every organization has unique needs for connecting mobile devices to the corporate network to increase user productivity. Based on the principle of People-centric IT (PCIT) a mobile device strategy can be created to meet those needs. Once the strategy has been determined then it’s time to created the infrastructure.
Module 3: Workplace Join and Work Folders
Allowing device connectivity is important, but more important is managing that connectivity. Workplace Join allows a way to track and control which devices can connect. Once connected users will need access to data, no matter the device. That data must be current and consistent without users manually copying files. Work Folders creates this ability.
Module 4: Web Application Proxy
In the previous module we learned how to connect non-domain devices to Active Directory for management and policies with Workplace Join. In addition we showed how to synchronize data between multiple devices using Work Folders. However almost always data will be used in some type of application, therefore a part of our MDM (Mobile Device Management) strategy must include accessing those applications from devices. This is the responsibility of Web Application Proxy.
Module 5: Mobile Device Management Security
One of the primary responsibilities of any IT professional is security. Physical security, network security and data security are critical. In this module we will look at how mobile devices affect security plans not just for BYOD, but also for the entire network infrastructure.
Module 6: Mobile Device Lifecycle and Application Management
In this module we will discover the process of managing mobile devices throughout their lifecycles. Technologies including the Microsoft Exchange Connector, System Center Configuration Manager and Windows InTune can be used for these purposes. We will also see how applications can be managed for mobile devices.
Before attending this course, students must have: