Learn how Microsoft can help you responsibly enable this vision to “Consumerize the IT” inside your company, by safely enabling employees to work and communicate anywhere, anytime, on a device of their choice. The first overview module is designed to paint the entire picture at a 200 level and then the remaining modules are designed to give you 300 level knowledge for specific scenarios across the various products which relate to Consumerization of IT (i.e. how to configure MDM in SCCM 2012). This course is NOT designed to make you an expert in each product all-up after the base is installed (i.e. you won't know how to architect, design, or deploy "Product X").
Instructors | Introducing Bill Anderson a Principle Program Manager at Microsoft with over 20 years of experience in the system management space, and David Tesar a Technical Evangelist at Microsoft with 10 years of experience in the field with a focus on security products.
Associated Certification(s) | MCSA: Windows Server 2012Associated Course(s) | Course 20410B: Installing and Configuring Windows Server 2012; Course 10324: Implementing and Managing Microsoft Desktop Virtualization
Bill Anderson and David Tesar kick off the course with the keynote session. This session starts sets the stage on what consumerization of IT is all about. We then do a walk through of a day in the life of a typical user and IT Admin circa Windows XP timeframe (~10 years ago) and then we "consumerize the IT" in this company, showing you what is possible today to enable people to be productive and protected anywhere on a variety of devices. At the end, we cover what an updated IT business policy and strategy might look like in a organization embracing consumerization.
In this module, Bill Anderson leads the discussion with David Tesar about the all-important subject of providing access to devices using approaches that are secure end-to-end. Topics include DirectAccess, Server and Domain Isolation (SDI) & Network Access Protection (NAP), Updates to System Center Configuration Manager (SCCM), and System Center Endpoint Protection (SCEP). Essentially, this module answers two questions: 1) How are you going to make sure your trusted end devices are best managed, secured, and can work from anywhere? 2) How are you going to control access from untrusted devices on your corporate network?
Bill Anderson and David Tesar cover user-centric application delivery in this module. Focusing on the end-user first versus devices is an important fundamental change in the way IT thinks about and does client management in light of consumerization. Discussion and demonstrations focus on Changes in User-Centric from System Center Configuration Manager (SCCM) 2007 to 2012, how the application delivery model works, Self Service and on-demand install, and Application Virtualization architecture.
During this session, Bill Anderson and David Tesar focus on managing mobile devices, obviously a key concern when attempting to enable the consumerization of IT. After providing a great overview of Device Management using System Center Configuration Manager (SCCM) 2012, Bill dives into "light versus depth" management, the Light Management EAS Architecture, Depth Management (SCCM & Windows Intune) as well as EAS Policy support and considerations.
Andy O'Donald joins David Tesar during this session to illustrate how IT can make users within the organization more productive using Office 365. After a brief overview of this cloud-based platform, Andy demonstrates features designed for users then transitions to the administrative tools built to empower IT to customize and control the experience using User Profiles. Finally, Andy describes the processes for Service Updates with Office 365.
In this module, Josh Heller leads David Tesar through a high-energy, demo-rich discussion about information protection--obviously a key topic when considering to embrace the consumerization of IT. After describing Data Management Challenges, Josh leverages lots of live demos to walk us through Encrypting Information with AD RMS, the new Windows 8 File Server solution and several other protection-related topics.
Craig Marl joins David Tesar to illustrate how Windows Intune enables IT departments to secure and manage users, devices and data. After a brief Windows Intune overview, Craig focuses on User centric management, User centric software distribution, and modern device management in Windows Intune. Learn how you can deploy applications to iOS and Android devices and have a self-service application portal using your existing on-premise active directory credentials.
Adam ("Bomb") Carter joins David Tesar through the extremely rich topic of Desktop Virtualization. Adam leverages a scenario-rich approach to illustrate the new Microsoft User Experience Virtualization (UE-V) then spends some great time on Microsoft Application Virtualization (App-V) and Microsoft Virtual Desktop Infrastructure (VDI). Additionally, Adam discusses Microsoft Enterprise Desktop Virtualization (MED-V) and Managing virtualization with System Center and various User Scenarios.