972-377-0074 ext 3256
- IT CERTIFICATION
- DESKTOP & OFFICE
- WEB & GRAPHICS
- SECURITY & NETWORKING
- PROJECT MANAGEMENT
- TRAINING LIBRARIES
Exam 70-680 Training: Microsoft Windows 7, Configuring
Candidates for this exam operate in computing environments that use Microsoft Windows 7 as a desktop operating system in an enterprise environment. Candidates should have at least one year of experience in the IT field, as well as experience implementing and administering any Windows client operating system in a networked environment.
- 12 Months Online Access, Featuring OnDemand Instructor-Led Classroom Sessions with Full Audio and Video Lectures
- Software Video Demonstrations
- Self-Assessment Module Review Quizzes
- Printable Courseware
- Certificate of Completion
- Free 1 Year Upgrade Policy
- Mobile Access via iPhones and iPads
Kenneth Mayer - Certified CEH Trainer (CCSI, MCT, CCNP, CCDA) Ken Mayer is a Microsoft Certified Trainer as well as a Certified Ethical Hacker Trainer and Security consultant. He started his career in computer technology in 1980s. He has offered a wide variety of IT training and high Chapter consulting projects for Fortune 500 companies across the United States and Western Europe. He has achieved the Certified Cisco Systems Instructor certification. The CCSI certification involved a two-day lab and observation event held on Cisco in Paris, France Facility. This gave Ken the accreditation to be able to deliver Cisco Authorized Courses as a CCSI. He has taught the full line of Cisco CCNA, CCDA, CCNP, CCDP and CCIP course curriculums, including Cisco's security appliances such as PIX and IDS.
The organized and effective structure enables users to browse through hours of comprehensive content rapidly and with ease.
Move ahead, review, or repeat previous topics and sections. A progress bar monitors progress as you complete exercises.
Every course resumes where you finished during the previous session in case you forget where you stopped.
Instructors provide live and "hands on" demonstrations to explain and show users how to complete tasks. This enables users to witness professionals perform everyday tasks in real world settings as often as they like.
PowerPoint presentations improve instruction by displaying all types of information for users. They can better comprehend material by viewing graphs, definitions, charts, etc.
Every section contains a review quiz to assist and enhance learning by testing whether students comprehend course concepts before moving forward.
Users can print entire course study guides, permitting them to view and review course material at their convenience.
Certificate of Completion
We are internationally recognized for our technology-centered IT training programs. Once you finish a program, you'll receive a Certificate of Completion.
New Features of Windows 7
Minimum Hardware Requirements
Why Use 64-bit Windows 7
Windows 7 Offerings
Lesson: Choosing To Do the Clean Install
Discussion: Considerations for a Clean Installation
Discussion: Common Installation Errors
Ways To Do A Clean Installation
Demo - Configuring the Computer Name and Domain/Workgroup Settings
Chapter 01 Review
What is Windows Imaging File Format?
Which Tools You Can Use
The Process for Image-Based Installation
Capturing and Applying the Installation Image by Using ImageX
Migrating User Data and Settings by Using USMT 4.0
Lesson: Doing an Upgrade or Migration to Windows 7
How to Choose Migration or Upgrade
Determining the Feasibility of an Upgrade Using Windows Upgrade Advisor
Steps to Upgrade to Windows 7
Ways to Migrate User Data and Settings
Steps to Migrate to Windows 7
Migrating User Settings and Data by Using WET
Lesson: Planning for Application Compatibility
Common Compatibility Problems
Common Mitigation Methods
Chapter 02 Review
The MBR Disk
The GPT Disk
Tools for Disk Management
Demo - Converting an MBR Partition to a GPT Partition
Lesson: Managing Hard Drives with Volumes
A Simple Volume
Demo - Creating a Simple Volume
What are Spanned and Striped Volumes?
Demo - Creating Spanned Volumes
Demo - Creating Striped Volumes
Why Would you Resize a Volume?
Demo - Resizing a Volume
Lesson: Hard Drive Maintenance
How to Defragment a Disk
Demo - Configuring Disk Quotas
Chapter 03 Review
Understanding the IPv4 Address
Understanding the Subnet Mask
Public and Private Address Space
Why the Default Gateway
Demo - Configuring an IPv4 Address
Types of Computer Names
Methods for Resolving Computer Names
Windows 7 Support for IPv6
Understanding the IPv6 Address Space
Types of IPv6 Address Scopes
Demo - Configuring an IPv6 Address
Lesson: Auto IP Configuration
Auto Configuration of IPv4 Settings
Auto Configuration of IPv6 Settings
Demo - Configuring a Computer to Obtain an IPv4 Address Dynamically
Troubleshooting Client-Side DHCP Issues
Lesson: Troubleshooting Networking
Demo - How to Troubleshoot Network-Related Problems
Lesson: Introducing Wireless Networks
Describing a Wireless Network
Technologies Used in WiFi
How Do You Secure WiFi?
Lesson: Connecting Windows 7 to the Wireless Network
Configuring the Hardware
Wireless Network Settings
How to Improve WiFi Signal Strength
Troubleshooting WiFi Connections
Chapter 04 Review
Understanding Authentication and Authorization
The Process of Authentication and Authorization
New Authentication Features
Lesson: Securing File Access
Demo - Configuring NTFS Permissions for Files and Folders
How Permissions May Change with File Copy or Moving
What are Effective Permissions?
Discussion: Determining Effective Permissions
Lesson: Compressing Files
What is NTFS File Compression?
How Compression Settings are Affected with File Move or Copy
Demo - Compressing Files and Folders
Lesson: Sharing Folders and Printers
What are Shared Folders?
Ways to Share Folders
Discussion: Combining NTFS and Share Permissions
Using the Network and Sharing Center
Printing Components in Windows 7
Demo - Installing and Sharing a Printer
Chapter 05 Review
Overview of Device Drivers
How to Install Devices and Drivers
Tools for Device Driver Management
Methods for Updating Drivers
Managing Signed Drivers
Discussion: Options for Recovering from a Driver Problem
Demo - Managing Drivers by Using Device Manager
Lesson: Windows 7 Performance Monitoring Tools
Discussion: What Are Performance and Reliability Problems?
Tools to Gather Performance Information
Monitoring Performance and Using Data Collector Sets
Demo - Using the Resource Monitor
Demo - Analyzing System Performance by Using Data Collector Sets and Performance Monitor
How Performance Monitor Can Help You
Lesson: Monitoring Reliability of Windows 7
How WDT Can Help You Solve Problems
Windows Network Diagnostics Tools
Windows Startup and Recovery
Introducing the Windows Memory Diagnostics Tool
Looking at the Reliability Monitor and Problems Reports and Solutions Tool
Chapter 06 Review
New Security Features in Windows 7
Introducing the New Action Center
Demo - Configuring Action Center Settings
Lesson: Using Windows Defender
Watch Out for Malware
What is Windows Defender?
How Windows Defender Can Help You
Demo - Configuring Windows Defender Settings
Lesson: How does UAC Work?
Improvements to How UAC Works
Demo - Configuring Group Policy
Getting Your Notifications
Lesson: Using Windows Firewall
Discussion: What is a Firewall?
Basic Firewall Settings
Advanced Security Options
Know Your "Well-Known" Ports
Demo - Configuring Inbound, Outbound, and Connection Security Rules
Chapter 07 Review
Introducing Group Policies
How GPOs are Applied
Order of Operations for Multiple Policies
Demo - Creating Multiple Local Group Policies
Demo - Configuring Local Security Policy Settings
Lesson: How EFS and BitLocker Secure Your Data
Demo - Encrypting and Decrypting Files and Folders by Using EFS
Setting BitLocker Options with Group Policies
Configuring BitLocker To Go
Recovering BitLocker Encrypted Drives
Lesson: Security With Application Restrictions
Demo - Configuring AppLocker
What are Software Restriction Policies?
Lesson: IE Version 8 Privacy Features
Discussion: Compatibility Features in Internet Explorer 8
Internet Explorer 8's Enhanced Privacy Features
Using the SmartScreen Feature in Internet Explorer 8
Other Security Features in Internet Explorer 8
Demo - Configuring Security in Internet Explorer 8
Chapter 08 Review
Discussion: Why Do Backups?
Introducing the Backup and Restore Tool
Demo - Perform a Backup
Lesson: How System Restore Works
Using Previous File Versions
Configuring System Protection Settings
Demo - Restore a System
Lesson: Using the Windows Update
What is Windows Update?
Using Windows Update Settings
Windows Updates with GPOs
Chapter 09 Review
Discussion: What Devices Would be Considered Mobile?
Settings to Configure on Mobile Computers
What is a Sync Partnerships?
Managing Power Options in Windows 7
Demo - How to Configure a Power Plan
Lesson: Remote Access Solutions
Introducing Remote Desktop and Remote Assistance
Setting Up Remote Desktop
Understanding VPN Connections
How to Make a VPN
What is DirectAccess?
How DirectAccess Works
Requirements for Setting Up DirectAccess
What is BranchCache?
How BranchCache Works
Requirements for Setting Up BranchCache
Demo - Configuring BranchCache on a Windows 7 Client Computer
Chapter 10 Review
Overview of Windows PowerShell
Improvements in Windows PowerShell 2.0
Using cmdlets in Windows PowerShell 2.0
Understanding Windows PowerShell Eventing
Introducing the Windows PowerShell 2.0 Integrated Scripting Environment (ISE)
Operating the Windows PowerShell ISE Editor
Lesson: Remoting With Windows PowerShell 2.0
Overview of Windows PowerShell Remoting
How to Connect to a Remote Computer
Processing of Remote Commands
Issuing Remote Commands
Lesson: Configuring Group Policy with PowerShell 2.0
PowerShell 2.0 Has New cmdlets for Group Policy Administration
Requirements for Group Policy
Chapter 11 Review
Product Code: 466