Windows Mobile Administration: Windows 8 beginner
Technology:
Expertise:
- 6 Courses | 4h 31m 22s
- 4 Books | 14h 47m
- 6 Courses | 5h 9m 32s
- 5 Books | 24h 18m
Explore, in-depth, the elements and processes of administration for Windows Mobile OSs.
COURSES INCLUDED
Device Configuration & Data Access
As an IT professional, you need to be familiar with configuring Windows devices and accessing cloud-based data. Learn about Windows device configuration, including profiles, display settings, file encryption, and app updates.
14 videos |
46m
Assessment
Badge
Device Configuration & Data Storage
Increase your knowledge of Windows device configuration and cloud-based data access by learning about various storage options and file systems.
12 videos |
49m
Assessment
Badge
Implementing Permissions, Shares, & Encryption in Windows
Data security is a key component in managing Windows devices and cloud-based services. Explore security principles required for sharing data, including permissions, certificates, SSL, and public and private keys.
16 videos |
52m
Badge
Data Management & Device Security
When managing Windows devices and cloud-based services, the importance of data security cannot be underestimated. Learn about data security, including firewalls, multifactor authentication, Windows Rights Management, and biometrics.
10 videos |
31m
Assessment
Badge
Using Microsoft Cloud Services
Cloud-based systems provide businesses with increased flexibility, scalability, and productivity. Learn about Microsoft cloud-based services, as well as the essentials of working with Microsoft Azure.
15 videos |
56m
Assessment
Badge
Using Microsoft Identity Management & BYOD Solutions
Increase your knowledge of cloud-based systems by learning about Azure Active Directory, Federation Services, work folders, RemoteApp, as well as BYOD Desktop virtualization, dynamic access control, and Windows Rights Management.
11 videos |
33m
Assessment
Badge
SHOW MORE
FREE ACCESS
COURSES INCLUDED
Designing for Cloud & Hybrid Identity
Integrating, designing, and planning for Azure AD identities are the first steps for designing devices in the Enterprise. Explore design for cloud/hybrid identity, planning for Azure AD identities, and designing for AD synchronization.
16 videos |
1h 10m
Assessment
Badge
Designing for Device Access & Protection
Proper access to and protection for devices in the Enterprise is probably one of the most important design steps. Discover how to plan for device enrollment and the company portal, and plan protection for data on devices.
15 videos |
53m
Assessment
Badge
Designing for Data Access & Protection
After device protection comes proper access to data, including protection of remote data. Discover how to design for data access and protection, including planning shared resources, advanced audit policies, and file and folder access.
13 videos |
52m
Assessment
Badge
Remote Access & Mobility
After device protection comes proper access to data, including protection of remote data. Discover how to design for remote access, including remote connectivity, remote authentication, and mobility options.
10 videos |
43m
Assessment
Badge
Managing RemoteApp & Planning App Support and Compatibility
Once you've finished planning and designing all your devices, it's time to plan for updates and system recovery. Discover how to manage RemoteApp and plan app support and compatibility.
11 videos |
44m
Assessment
Badge
Planning Updates & Recovery
Once you've finished planning and designing all your devices, it's time to plan for updates and system recovery. Discover how to plan for system recovery, file recovery, and device updates.
12 videos |
45m
Assessment
Badge
SHOW MORE
FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE COURSES
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.BOOKS INCLUDED
Book
Bring Your Own Devices (BYOD) Survival GuideExamining the business aspects of the Bring Your Own Device (BYOD) psycho-techno phenomenon, this book covers the broad range of technical considerations including selection, connectivity, training, support, and security, and includes an extensive set of best practices.
6h 7m
By Jessica Keyes
Book
Mobile Device Security for DummiesFeaturing real-world case scenarios and invaluable advice, this essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise.
5h 2m
By Ashwin Krishnan, Rich Campagna, Subbu Iyer
Book
Bring Your Own Device (BYOD): The Mobile Computing ChallengeThe increasing use of personal devices such as smartphones and tablets in the workplace is offering an opportunity as well as a challenge for organisations, particularly the IT department. This book examines ways to embrace the benefits, while offering advice on how to minimise the risks.
52m
By BCS, The Chartered Institute for IT
Book
Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD DevicesAn essential resource for IT and Audit professionals on how to manage, secure and audit smart devices, this book provides an understanding of the technologies related to smart devices and presents a number of different methods available to address the security of them.
2h 46m
By Philip Chukwuma, Richard Cozart, Sajay Rai
SHOW MORE
FREE ACCESS
BOOKS INCLUDED
Book
Bring Your Own Device (BYOD): The Mobile Computing ChallengeThe increasing use of personal devices such as smartphones and tablets in the workplace is offering an opportunity as well as a challenge for organisations, particularly the IT department. This book examines ways to embrace the benefits, while offering advice on how to minimise the risks.
52m
By BCS, The Chartered Institute for IT
Book
Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD DevicesAn essential resource for IT and Audit professionals on how to manage, secure and audit smart devices, this book provides an understanding of the technologies related to smart devices and presents a number of different methods available to address the security of them.
2h 46m
By Philip Chukwuma, Richard Cozart, Sajay Rai
Book
Bring Your Own Devices (BYOD) Survival GuideExamining the business aspects of the Bring Your Own Device (BYOD) psycho-techno phenomenon, this book covers the broad range of technical considerations including selection, connectivity, training, support, and security, and includes an extensive set of best practices.
6h 7m
By Jessica Keyes
Book
Mobile Device Security for DummiesFeaturing real-world case scenarios and invaluable advice, this essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise.
5h 2m
By Ashwin Krishnan, Rich Campagna, Subbu Iyer
Book
MCSA: Microsoft Windows 10 Study Guide - Exam 70-697Digging deeper into the intricacies of the Windows OS to provide the most up-to-date information on new Windows 10 technologies, this authoritative resource walks you through device planning, deployment, and management; network and storage configuration; access, data, app, and recovery management, and much more to help you master the exam material.
9h 31m
By William Panek
SHOW MORE
FREE ACCESS