• Online, Self-Paced
Course Description

After device protection comes proper access to data. This includes protection of remote data access. In this course, you'll learn how to design for data access and protection, including planning shared resources, advanced audit policies, and file and folder access.You'll also learn how to design for remote access including remote connectivity, remote authentication, and mobility options. This course is one of a series in the Skillsoft learning path that covers the objectives for the Microsoft certification exam 70-398: Planning for and Managing Devices in the Enterprise.

Learning Objectives

Planning Shared Resources

  • start the course
  • design for file and disk encryption
  • design for BitLocker encryption
  • design for the Network Unlock Feature
  • configure BitLocker Policies
  • design for the Encrypting File System recovery agent
  • manage Encrypting File System
  • manage BitLocker certificates including backup and restores

Planning Advanced Audit Policies

  • design for auditing using Group Policy and AuditPol.ext
  • create expression-based audit policies
  • design for removable device audit policies

Planning for File and Folder Access

  • design for Windows Server Dynamic Access Control
  • use Web Application Proxy
  • use Azure Rights Management Service (RMS)

Planning for Remote Connectivity

  • plan and design remote authentication
  • configure Remote Desktop setting
  • design VPN connections and authentication
  • enable VPN reconnect
  • configure broadband tethering

Planning Mobility Options

  • design for offline file policies
  • design for power policies
  • design Windows to Go and sync options
  • design Wi-Fi direct plan

Practice: Remote Connectivity

  • configure remote desktop settings

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Systems Administration
  • Systems Development
  • Vulnerability Assessment and Management