• Classroom
Course Description

This course describes how to configure and manage a System Center 2012 R2 Configuration Manager site and its associated site systems. The course focuses on day-to-day management tasks for System Center 2012 R2 Configuration Manager.

Learning Objectives

  • Describe the System Center 2012 R2 Configuration Manager feature set and manage and troubleshoot sites by using the Configuration Manager Console and associated toolset
  • Configure boundaries and boundary groups, configure discovery methods, manage user and device collections, and implement role-based administration
  • Describe the client deployment process, configure client deployment methods, configure the client agent settings, and monitor client status
  • Describe the inventory collection process, configure and manage hardware and software inventory, monitor inventory data flow, and use Asset Intelligence and Software Metering
  • Analyze data by creating queries and running reports
  • Create, deploy, and manage software packages and programs
  • Create and deploy applications by using the System Center 2012 R2 Configuration Manager application model
  • Configure multiple deployment types
  • Deploy and manage software updates
  • Integrate and implement Endpoint Protection by using System Center 2012 R2 Configuration Manager
  • Deploy operating systems by using the Configuration Manager infrastructure
  • Manage configuration items, baselines, and profiles to assess and configure settings for devices
  • Manage mobile devices by using System Center 2012 R2 Configuration Manager
  • Configure Wake On LAN, Power Management policies, and Remote Control

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Systems Requirements Planning

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.