Course Overview

In this two-day course, you learn how to apply the fundamental techniques for integrating VMware Workspace ONE® Access™ with VMware Workspace ONE® UEM to securely distribute business-critical applications from any device and configure access management controls. Through a combination of hands-on labs, simulations, and interactive lectures, you configure system and productivity integrations for Workspace ONE Access and Workspace ONE UEM. The course provides the principles of identity and access management. You will leave with a foundational understanding of how Workspace ONE uses various authentication methods and protocols to determine user access permissions and enable single sign-on.

Course Objectives

By the end of the course, you should be able to meet the following objectives:

  • Explain the general features and functionality that Workspace ONE Access enables
  • Demonstrate how to integrate Workspace ONE UEM with Workspace ONE Access 
  • Summarize and implement Workspace ONE productivity services into the digital workspace environment
  • Explain the methods of enabling mobile single sign-on for mobile endpoints managed in the digital workspace
  • Configure Workspace ONE Access to support SAML 2.0 for federated authentication across the workforce

Course Content

1  Course Introduction

  • Introductions and course logistics
  • Course objectives

2  Workspace ONE Access

  • Summarize the benefits of Workspace ONE Access
  • Outline the core features and functions enabled by Workspace ONE Access
  • Navigate the Workspace ONE Access console
  • Explain the functions of directory integration with Workspace ONE Access
  • Explain the various types of authentication protocols enabled by Workspace ONE Access

3  Integrating Workspace ONE UEM and Workspace ONE Access

  • Explain the rationale for integrating Workspace ONE UEM and Workspace ONE Access
  • Outline the process of connecting Workspace ONE UEM and Workspace ONE Access
  • Examine the workflow of integrations
  • Summarize the key features of an integrated solution

4  Productivity Integrations

  • Identify the functions enabled by VMware Unified Access Gateway™
  • Outline the purpose of the VMware AirWatch® Secure Email Gateway™ edge service
  • Explain the features enabled by the VMware Workspace ONE® Tunnel™ edge service
  • Summarize the capabilities enabled by the Content Gateway edge service

5  SAML 2.0 Authentication

  • Outline authentication methods supported by Workspace ONE Access
  • Summarize the main properties of the SAML protocol
  • Summarize the SAML authentication workflow
  • Explain the application single sign-on authentication workflow with SAML

6  Mobile Single Sign-On

  • Describe the concept of mobile single sign-on
  • Outline mobile single sign-on workflows

7  Intelligence and Automation

  • Summarize the features of Workspace ONE® Intelligence™
  • Outline the benefits of using Workspace ONE Intelligence


Course Overview

In this extended five-day course, you learn how to apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform endpoint management solution with VMware Workspace ONE® UEM. Through a combination of hands-on labs, simulations, and interactive lectures, you will configure and manage the endpoint life cycle. After the course, you will have the foundational knowledge necessary to implement Workspace ONE UEM effectively.

In addition, you learn how to apply the fundamental techniques for integrating VMware Workspace ONE® Access™ with Workspace ONE UEM to distribute business-critical applications securely from any device and configure access management controls. You will learn how Workspace ONE uses various authentication methods and protocols to determine user access permissions and enable single sign-on, and you will leave with an understanding of the fundamental principles of identity and access management.

Finally, you learn to investigate, analyze, and determine issues that might occur with the different components of Workspace ONE UEM. Troubleshooting is the backbone of service maintenance and management. By understanding how to effectively troubleshoot product issues, administrators can understand how product services communicate and function, in turn optimizing service and software health management.

Virtual Learning

This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.

Course Objectives

By the end of the course, you should be able to meet the following objectives:

  • Explain and apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform endpoint management solution with Workspace ONE UEM
  • Outline the components of Workspace ONE UEM
  • Explain the general features and functionality enabled with Workspace ONE UEM
  • Summarize basic Workspace ONE administrative functions
  • Explain and deploy common Workspace ONE integrations
  • Securely deploy configurations to Workspace ONE UEM managed devices
  • Onboard device endpoints into Workspace ONE UEM
  • Summarize alternative management methodologies for rugged devices
  • Discuss strategies to maintain environment and device fleet health
  • Configure and deploy applications to Workspace ONE UEM managed devices
  • Analyze Workspace ONE UEM deployments
  • Enable email access on devices
  • Integrate Workspace ONE UEM with content repositories and corporate file shares
  • Explain the general features and functionality that Workspace ONE Access enables
  • Demonstrate how to integrate Workspace ONE UEM with Workspace ONE Access
  • Summarize and implement Workspace ONE productivity services into the digital workspace environment
  • Explain the methods of enabling mobile single sign-on for endpoints managed in the digital workspace
  • Configure Workspace ONE Access to support SAML 2.0 for federated authentication across the workforce
  • Summarize basic troubleshooting methodologies
  • Outline common troubleshooting techniques in the Workspace ONE UEM console
  • Outline common troubleshooting techniques when integrating enterprise solutions in the Workspace ONE UEM console
  • Summarize common troubleshooting strategies for Workspace ONE UEM managed devices
  • Outline common application management troubleshooting techniques in the Workspace ONE UEM console
  • Summarize common troubleshooting techniques for email management in the Workspace ONE UEM console
  • Explain common troubleshooting approaches for the VMware Unified Access Gateway™ platform and individual edge services
  • Outline useful troubleshooting tools, such as the Self-Service Portal and VMware Workspace ONE® Assist™

Course Content

1 Course Introduction

  • Introductions and course logistics
  • Course objectives
  • Online resources and references

2 Platform Architecture

  • Summarize the features and functionality of Workspace ONE UEM
  • Outline the benefits of leveraging Workspace ONE UEM
  • Recognize the core and productivity components that make up the Workspace ONE UEM platform
  • Summarize high availability and disaster recovery for Workspace ONE Solution

3 Administration

  • Navigate and customize the Workspace ONE UEM console
  • Summarize the hierarchical management structure
  • Explain the features and functions of Workspace ONE Hub Services
  • Outline account options and permissions

4 Enterprise Integrations

  • Outline the process and needs to integrate with directory services
  • Explain certificate authentication and practical implementation with Workspace ONE
  • Explain the benefits of integrating an email SMTP service into the Workspace ONE UEM console
  • Describe VMware Dynamic Environment Manager™ and its architecture

5 Onboarding

  • Outline the prerequisite configurations in the Workspace ONE UEM environment for onboarding devices for management
  • Outline the steps for setting up autodiscovery in the Workspace ONE UEM console
  • Enroll an endpoint through the VMware Workspace ONE® Intelligent Hub app
  • Summarize platform onboarding options

6 Managing Endpoints

  • Explain the differences between device and user profiles
  • Describe policy management options for Windows and macOS
  • Describe the functions and benefits of using compliance policies
  • Explain the use cases for Freestyle Orchestrator
  • Describe the capabilities that sensors and scripts enable

7 Alternative Management Methods

  • Describe the function and benefits of device staging
  • Configure product provisioning in the Workspace ONE UEM console
  • Understand the benefits of deploying a VMware Workspace ONE® Launcher™ configuration to Android devices
  • List the system and device requirements for Linux device management in Workspace ONE UEM

8 Applications

  • Describe the features, benefits, and capabilities of application management in Workspace ONE UEM
  • Understand and configure deployment settings for public, internal, and paid applications in the Workspace ONE UEM console
  • Describe the benefits of using Apple Business Manager content integration
  • Describe the benefits of using server-to-client software distribution
  • List the functions and benefits of VMware Workspace ONE® SDK

9 Device Email

  • List the email clients supported by Workspace ONE UEM
  • Configure an Exchange Active Sync profile in the Workspace ONE UEM console
  • Configure VMware Workspace ONE® Boxer settings
  • Summarize the available email infrastructure integration models and describe their workflows
  • Configure email compliance policies and notifications services

10 Content Sharing

  • Describe the benefits of using Content Gateway and the Content Gateway workflows
  • Describe the benefits of integrating content repositories with Workspace ONE UEM
  • Configure a repository in the Workspace ONE UEM console

11 Maintenance

  • Manage endpoints from the Device List View and the Device Details View pages
  • Analyze endpoint deployment and compliance data from the Monitor Overview page

12 Workspace ONE Access

  • Summarize the benefits of Workspace ONE Access
  • Outline the core features and functions that Workspace ONE Access enables
  • Navigate the Workspace ONE Access console
  • Explain the functions of directory integration with Workspace ONE Access
  • Explain the various types of authentication protocols enabled by Workspace ONE Access

13 Integrating Workspace ONE UEM and Workspace ONE Access

  • Explain the rationale for integrating Workspace ONE UEM and Workspace ONE Access
  • Outline the process of connecting Workspace ONE UEM and Workspace ONE Access
  • Explain the integrations workflow
  • Summarize the key features of an integrated solution

14 Productivity Integrations

  • Identify the functions enabled by Unified Access Gateway
  • Outline the purpose of the VMware AirWatch® Secure Email Gateway™ edge service
  • Explain the features enabled by the VMware Workspace ONE® Tunnel™ edge service
  • Summarize the capabilities enabled by the Content Gateway edge service

15 SAML 2.0 Authentication

  • Outline authentication methods supported by Workspace ONE Access
  • Summarize the main properties of the SAML protocol
  • Summarize the SAML authentication workflow
  • Explain the application single sign-on authentication workflow with SAML

16 Mobile Single Sign-On

  • Describe the concept of mobile single sign-on
  • Outline mobile single sign-on workflows

17 Intelligence and Automation

  • Summarize the features of VMware Workspace ONE® Intelligence™
  • Outline the benefits of using Workspace ONE Intelligence

18 Fundamentals of Troubleshooting Workspace ONE UEM

  • Outline software troubleshooting logic and support methods
  • Summarize the main process flows for the Workspace ONE UEM components
  • Explain the importance of Workspace ONE UEM process flows for troubleshooting
  • Identify different Workspace ONE UEM log files

19 Workspace ONE UEM Console Troubleshooting

  • Outline the best practices for troubleshooting Workspace ONE UEM console issues
  • Identify common issues related to group management and assignment
  • Outline common issues related to Workspace ONE UEM console roles and system settings
  • Understand how analytic events can be used to identity platform errors
  • Summarize the steps for collecting and analyzing Workspace ONE UEM console logs

20 Integration Troubleshooting

  • Outline the common enterprise integrations in Workspace ONE UEM
  • Outline common troubleshooting techniques for the VMware AirWatch® Cloud Connector™
  • Troubleshoot issues related to Directory Services integration
  • Identify directory user and groups synchronization issues
  • Troubleshoot issues related to certificate authority integration
  • Explain Workspace ONE Access integration and Workspace ONE Intelligent Hub troubleshooting techniques

21 Endpoint Troubleshooting

  • Compare the endpoint connection topologies in Workspace ONE UEM
  • Outline useful tools and resources for endpoint troubleshooting
  • Summarize the best practices for device enrollment troubleshooting
  • Explain device connectivity troubleshooting techniques
  • Understand how to identify and resolve profile-related issues
  • Identify common compliance policy issues and potential root causes

22 Application Troubleshooting

  • Explain the different scoping questions for troubleshooting applications
  • Review application management configurations
  • Summarize the general tools and resources for application troubleshooting
  • Describe the general logic of troubleshooting public applications
  • Understand internal application issues and potential causes
  • Explain purchased application troubleshooting techniques

23 Unified Access Gateway And Edge Services Troubleshooting

  • Review Unified Access Gateway architecture and edge service workflows
  • Understand Unified Access Gateway general configurations
  • Explain how to utilize Unified Access Gateway related troubleshooting tools and resources
  • Identify and resolve common issues for Content Gateway on Unified Access Gateway
  • Summarize troubleshooting techniques for VMware Workspace ONE® Tunnel™ on Unified Access Gateway

24 Email Troubleshooting

  • Review different email architecture and workflows
  • Summarize common errors associated with email profiles
  • Identify tools and resources for email troubleshooting
  • Discuss troubleshooting techniques for AirWatch Secure Email Gateway on Unified Access Gateway
  • Outline PowerShell integration issues and techniques to address them

25 Additional Troubleshooting Tools

  • Describe how the Self-Service Portal helps administrators and empowers end-users to resolve issues
  • Explain how Workspace ONE Assist can help with troubleshooting endpoints

Course Overview

In this five-day VMware Workspace One course, you learn how to apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform, endpoint management solution with VMware Workspace ONE® UEM. Through a combination of hands-on labs, simulations, and interactive lectures, you will configure and manage the endpoint life cycle. After the course, you will have the foundational knowledge for effectively implementing Workspace ONE UEM.

Also, you learn how to apply the fundamental techniques for integrating VMware Workspace ONE® Access™ with Workspace ONE UEM to securely distribute business-critical applications from any device and to configure access management controls. Through a combination of hands-on labs, simulations, and interactive lectures, you configure Workspace ONE Access and Workspace ONE UEM system and productivity integrations.

You will leave with a foundational understanding of how Workspace ONE uses various authentication methods and protocols to determine user access permissions and enable single sign-on. Overall, the course lays out the foundational principles of identity and access management.

Please note – This course is a combination of the VMware Workspace ONE: Skills for UEM (AWWS1S) and the VMware Workspace ONE: Integrations VMWS1I) course.

Course Objectives

By the end of the course, you should be able to meet the following objectives:

  • Explain and apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform endpoint management solution with Workspace ONE UEM
  • Outline the components of Workspace ONE UEM
  • Explain the general features and functionality enabled with Workspace ONE UEM
  • Summarize the basic Workspace ONE administrative functions
  • Explain and deploy common Workspace ONE integrations
  • Securely deploy configurations to Workspace ONE UEM managed devices
  • Onboard device endpoints into Workspace ONE UEM
  • Summarize the alternative management methodologies for rugged devices
  • Discuss strategies to maintain environment and device fleet health
  • Configure and deploy applications to Workspace ONE UEM managed devices
  • Analyze a Workspace ONE UEM deployment
  • Enable email access on devices • Integrate Workspace ONE UEM with content repositories and corporate file shares
  • Explain the general features and functionalities that Workspace ONE Access enables
  • Demonstrate how to integrate Workspace ONE UEM with Workspace ONE Access
  • Summarize and implement Workspace ONE productivity services into the digital workspace environment
  • Explain the methods of enabling mobile single sign-on for mobile endpoints managed in the digital workspace
  • Configure Workspace ONE Access to support SAML 2.0 for federated authentication across the workforce

Course Content

1 Course Introduction

• Introductions and course logistics • Course objectives

2 Platform Architecture

• Summarize the features and functionality of Workspace ONE UEM

• Outline the benefits of leveraging Workspace ONE UEM

• Recognize the core and productivity components that make up the Workspace ONE UEM platform

• Summarize high availability and disaster recovery for the Workspace ONE solution

3 Administration

• Navigate and customize the Workspace ONE UEM console

• Summarize the hierarchical management structure

• Explain the features and functions of Workspace ONE Hub Services

• Outline account options and permissions

4 Enterprise Integrations

• Outline the process of integrating with directory services

• Explain certificate authentication and practical implementation with Workspace ONE

• Explain the benefits of integrating an email SMTP service into the Workspace ONE UEM console

• Describe VMware Dynamic Environment Manager and its architecture

5 Onboarding

• Outline the prerequisite configurations in the Workspace ONE UEM environment for onboarding devices for management

• Outline the steps for setting up autodiscovery in the Workspace ONE UEM console

• Enroll an endpoint through the VMware Workspace ONE® Intelligent Hub app

• Summarize the platform onboarding options

6 Managing Endpoints

• Explain the differences between device and user profiles

• Describe policy management options for Windows and macOS

• Describe the functions and benefits of using compliance policies

• Explain the use case for Freestyle Orchestrator

• Describe the capabilities that sensors and scripts enable.

7 Alternative Management Methods

• Describe the function and benefits of device staging

• Configure product provisioning in the Workspace ONE UEM console

• Understand the benefits of deploying a VMware Workspace ONE® Launcher™ configuration to Android devices

• List the system and device requirements for Linux device management in Workspace ONE UEM

8 Applications

• Describe the features, benefits, and capabilities of application management in Workspace ONE UEM

• Understand and configure deployment settings for public, internal, and paid applications in the Workspace ONE UEM console

• Describe the benefits of using Apple Business Manager content integration

• Describe the benefits of using server-to-client software distribution

• List the functions and benefits of VMware Workspace ONE® SDK

9 Device Email

• List the email clients supported by Workspace ONE UEM

• Configure an Exchange Active Sync profile in the Workspace ONE UEM console

• Configure VMware Workspace ONE® Boxer settings

• Summarize the available email infrastructure integration models and describe their workflows

• Configure email compliance policies and notifications services

10 Content Sharing

• Describe the benefits of using Content Gateway

• Describe the Content Gateway workflows

• Describe the benefits of integrating content repositories with Workspace ONE UEM

• Configure a repository in the Workspace ONE UEM console

11 Maintenance

• Manage endpoints from the Device List view and the Details view.

• Analyze endpoint deployment and compliance data from the Workspace ONE UEM Monitor page.

12 Workspace ONE Access

• Summarize the benefits of Workspace ONE Access

• Outline the core features and functions enabled by Workspace ONE Access

• Navigate the Workspace ONE Access console

• Explain the functions of directory integration with Workspace ONE Access

• Explain the various types of authentication protocols enabled by Workspace ONE Access

13 Integrating Workspace ONE UEM and Workspace ONE Access

• Explain the rationale for integrating Workspace ONE UEM and Workspace ONE Access

• Outline the process of connecting Workspace ONE UEM and Workspace ONE Access

• Examine the workflow of integrations

• Summarize the key features of an integrated solution

14 Productivity Integrations

• Identify the functions enabled by VMware Unified Access Gateway™

• Outline the purpose of the VMware AirWatch® Secure Email Gateway™ edge service

• Explain the features enabled by the VMware Workspace ONE® Tunnel™ edge service

• Summarize the capabilities enabled by the Content Gateway edge service

15 SAML 2.0 Authentication • Outline the authentication methods supported by Workspace ONE Access

• Summarize the main properties of the SAML protocol

• Summarize the SAML authentication workflow

• Explain the application SSO authentication workflow with SAML 16 Mobile Single Sign-On

• Describe the concept of mobile SSO • Outline the mobile SSO workflows 17 Intelligence and Automation

• Summarize the features of Workspace ONE® Intelligence™

• Outline the benefits of using Workspace ONE Intelligence

Course Overview

In this course, students will learn to plan and execute an endpoint deployment strategy using contemporary deployment techniques and implementing update strategies. The course introduces essential elements of modern management, co-management approaches, and Microsoft Intune integration. It covers app deployment, management of browser-based applications, and key security concepts such as authentication, identities, access, and compliance policies. Technologies like Azure Active Directory, Azure Information Protection, and Microsoft Defender for Endpoint are explored to protect devices and data.

Course Objectives

  • MD-102 Explore endpoint management
  • MD-102 Execute device enrollment
  • MD-102 Configure profiles for user and devices
  • MD-102 Examine application management
  • MD-102 Manage authentication and compliance
  • MD-102 Manage endpoint security
  • MD-102 Deploy using on-premises based tools
  • MD-102 Deploy using cloud based tools

Course Content

MD-102 Explore endpoint management

  • Explore the Enterprise Desktop
  • Explore Windows Editions
  • Understand Microsoft Entra ID
  • Manage Microsoft Entra identities

MD-102 Execute device enrollment

  • Manage device authentication
  • Enroll devices using Microsoft Configuration Manager
  • Enroll devices using Microsoft Intune

MD-102 Configure profiles for user and devices

  • Execute device profiles
  • Oversee device profiles
  • Maintain user profiles

MD-102 Examine application management

  • Execute mobile application management
  • Deploy and update applications
  • Administer endpoint applications

MD-102 Manage authentication and compliance

  • Protect identities in Microsoft Entra ID
  • Enable organizational access
  • Implement device compliance
  • Generate inventory and compliance reports

MD-102 Manage endpoint security

  • Deploy device data protection
  • Manage Microsoft Defender for Endpoint
  • Manage Microsoft Defender in Windows client
  • Manage Microsoft Defender for Cloud Apps

MD-102 Deploy using on-premises based tools

  • Assess deployment readiness
  • Deploy using the Microsoft Deployment Toolkit
  • Deploy using Microsoft Configuration Manager

MD-102 Deploy using cloud based tools

  • Deploy Devices using Windows Autopilot
  • Implement dynamic deployment methods
  • Plan a transition to modern endpoint management
  • Manage Windows 365
  • Manage Azure Virtual Desktop

Course Overview

Swift greatly simplifies the process of developing applications for Apple devices. This course provides you with the essential skills to help you get started with developing applications using Swift.

After completing this course, you will be able to:

– Explore the fundamental Swift programming concepts, language structure, and the Swift programming syntax

– Transform your thinking to leverage new concepts, such as optionals and protocols

– Use key language elements, such as strings and collections in Swift

– Grasp how Swift supports modern application development using advanced features, such as built-in Unicode support and higher-order functions.

Course Objectives

This course is aimed at developers seeking fundamental Swift programming skills in preparation for learning how to develop native applications for iOS and macOS.

Course Content

Lesson 1: Swift Basics

  • Swift Program Structure
  • Swift Variables and Constants
  • Swift Data Types
  • Enums

Lesson 2: Swift Operators and Control Flow

  • Swift Operators
  • Branching
  • Loops

Lesson 3: Functions, Classes, and Structs

  • Functions
  • Error Handling
  • Object-Oriented Features

Lesson 4: Collections

  • Arrays
  • Sets
  • Dictionaries

Lesson 5: Strings

  • String Fundamentals
  • Using Strings
  • Substring

Lesson 6: Functional Programming and Lazy Operations

  • Functional Methods
  • Lazy Operations
  • Swifty Code

Course Overview

This five-day course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize Endpoint Protection, manage compliance, and create management queries and reports.

Although this course and the associated labs are written for Microsoft Endpoint Configuration Manager and Windows 11, the skills taught will also be backwards compatible with previous editions of System Center Configuration Manager and Windows 10.

Course Objectives

  • Describe the features Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment.
  • Analyze data by using queries and reports.
  • Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Intune.
  • Deploy and manage the Configuration Manager client.
  • Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering.
  • Identify and configure the most appropriate method to distribute and manage content used for deployments.
  • Distribute, deploy, and monitor applications for managed users and systems.
  • Maintain software updates for PCs that Configuration Manager manages.
  • Implement Endpoint Protection for managed PCs.
  • Manage configuration items, baselines, and profiles to assess and configure compliance settings and data access for users and devices.
  • Configure an operating-system deployment strategy by using Configuration Manager.
  • Manage and maintain a Configuration Manager site..

Course Content

Module 1: Managing computers and mobile devices in the enterprise

This module describes the features of Configuration Manager that you can use to perform complex management tasks, including the following tasks; Hardware and software inventory, Application management, Operating system deployment, Settings management, Software update management, Remote client troubleshooting, and Protection from malware. Microsoft System Center Configuration Manager (Configuration Manager) provides various features that can help you manage devices and users both on-premises and in the cloud. Organizations that use Configuration Manager find that they can provide more effective IT services in relation to software deployment, settings management, and asset management. This module introduces you to the primary features, architecture, and management tools used with Configuration Manager. This module also provides a foundation that relates to all other features and management tasks discussed in the modules that follow this one.

Lessons M1

  • Overview of systems management by using enterprise management solutions
  • Overview of the Configuration Manager architecture
  • Overview of the Configuration Manager administrative tools
  • Tools for monitoring and troubleshooting a Configuration Manager site

Lab 1: Exploring the Configuration Manager tools

  • Exploring the Configuration Manager Tools

After completing module 1, students will be able to:

  • Searching in the Configuration Manager console
  • Using Windows PowerShell with Configuration Manager
  • Using Configuration Manager Service Manager to manage components
  • Monitoring site and component status
  • Reviewing log files by using the Configuration Manager Trace tool

Module 2: Analyzing data using queries, reports, and CMPivot

The Microsoft Endpoint Configuration Manager database stores a large amount of data about the resources in your environment. You might not always want to perform all management tasks on all resources simultaneously. Therefore, to help you locate devices or user objects in your environment that meet specific criteria, you can create queries. You then can use these queries to create collections or to find additional information about specific resources. This module describes queries and methods of creating and running them. In addition to queries, you can run reports to view various types of information related to your Configuration Manager environment. To run Configuration Manager reports, you must install and configure a reporting services point, which this module details. This module also covers CMPivot, which allows you to collect and view real-time data on all the connected devices in your environment. It will enable you to make real-time decisions

Lessons M2

  • Introduction to queries
  • Configuring SQL Server Reporting Services
  • Analyzing the real-time state of a device by using CMPivot

Lab 1: Creating and running queries

  • Creating data queries
  • Creating subselect queries

Lab 2: Configuring SSRS

  • Configuring a reporting services point

Lab 3: Analyzing the real-time state of a device by using CMPivot

  • Using CMPivot to Analyze the current state of devices

After completing module 2, students will be able to:

  • Analyze data using queries, reports, and CMPivot

Module 3: Preparing the Configuration Manager management infrastructure

You can manage computer and user resources within a Microsoft Endpoint Configuration Manager (Configuration Manager) environment only when Configuration Manager has discovered these resources and assigned them to a site. In this module, you will learn about boundaries and boundary groups that help create logical network locations containing computer devices that you need to manage in your Configuration Manager infrastructure. You can use these boundary configurations for automatic site assignment and to help clients find content and services from associated site systems. You will also learn about the discovery processes that you can use to identify computers, users, and the network infrastructure within your network environment. You will then learn about collections that support logical groupings of resources. You use these groupings for management tasks, such as targeting software updates, managing application deployments, or deploying compliance settings to resources.

Lessons M3

  • Configuring site boundaries and boundary groups
  • Configuring resource discovery
  • Organizing resources using device and user collections

Lab 1: Configuring boundaries and resource discovery

  • Configuring boundaries, boundary groups, and fallback relationships
  • Configuring Active Directory discovery methods

Lab 2: Configuring user and device collections

  • Creating a device collection
  • Creating a user collection
  • Configuring a maintenance window

After completing module 3, students will be able to:

  • Prepare a Configuration Manager management infrastructure

Module 4: Deploying and managing the Configuration Manager client

You can install the Microsoft Endpoint Configuration Manager (Configuration Manager) client software on windows-based devices such as servers, workstations, and laptops. You then can manage these devices and perform operations such as reporting hardware and software inventory information, installing and updating software, and configuring settings required for compliance. Configuration Manager provides several options for installing the client software. This module explains the supported operating systems and devices, software requirements, and different methods for installing the client software. This module also describes some of the default and custom client settings that you can configure. After installing the client software, you can configure client settings and control how the various client components interact between the managed device and the Configuration Manager environment..

Lessons M4

  • Overview of the Configuration Manager client
  • Deploying the Configuration Manager client
  • Configuring and monitoring client status
  • Managing client settings and performing management operations

Lab 1: Deploying the Microsoft Endpoint Configuration Manager client software

  • Preparing the site for client installation
  • Deploying the Configuration Manager client software by using client push installation

Lab 2: Configuring and monitoring client status

  • Configuring and monitoring client health status

Lab 3: Managing client settings

  • Configuring client settings
  • Performing management operations

After completing module 4, students will be able to:

  • Deploy and manage the Configuration Manager client.

Module 5: Managing inventory for PCs and applications

This module provides an overview of inventory collection, and explains how you can manage the information collected. You also will learn about the process of collecting hardware and software inventory, initiating inventory cycles, and initiating and securing inventory collection. This module also covers the use of software metering to monitor program usage, and the configuration and management of Asset Intelligence.

Lessons M5

  • Overview of inventory collection
  • Configuring hardware and software inventory
  • Managing inventory collection
  • Configuring software metering
  • Configuring and managing Asset Intelligence

Lab 1: Configuring and managing inventory collection

  • Configuring and managing hardware inventory

Lab 2: Configuring software metering

  • Configuring software metering

Lab 3: Configuring and managing Asset Intelligence

  • Preparing the site for Asset Intelligence
  • Configuring Asset Intelligence
  • Monitoring license agreements by using Asset Intelligence
  • Viewing Asset Intelligence reports

After completing module 5, students will be able to:

  • Manage inventory for PCs and applications.

Module 6: Distributing and managing content used for deployments

Microsoft Endpoint Configuration Manager (Configuration Manager) clients obtain content, such as packages, applications, software updates, and even operating system images, from a content infrastructure made up of distribution points and peer cache sources. In this module, you will review the content distribution and management features, configure distribution points, and learn how to distribute and monitor content. You also will perform content validation and content prestaging.

Lessons M6

  • Preparing the infrastructure for content management
  • Distributing and managing content on distribution points

Lab 1: Distributing and managing content for deployments

  • Installing a new distribution point
  • Managing content distribution

After completing module 6, students will be able to:

  • Describe containers in Windows Server.
  • Explain how to deploy containers.
  • Explain how to install, configure, and manage containers using Docker.

Module 7: Deploying and managing applications

In this module, you will learn about the methods for creating, deploying, and managing applications with Configuration Manager. You also will learn to use the Software Center and the Application Catalog to install available applications. You will learn about managing deployments on unconventional applications.

Lessons M7

  • Overview of application management
  • Creating applications
  • Deploying applications
  • Managing applications
  • Deploying and managing Windows apps

Lab 1: Creating and deploying applications

  • Creating applications with requirements
  • Deploying applications

Lab 2: Managing application supersedence and removal

  • Managing application supersedence
  • Uninstalling the Excel Viewer application

Lab 3: Using Configuration Manager to deploy Windows apps

  • Configuring support for sideloading Windows apps
  • Configuring a Windows app
  • Deploying Windows apps to user

After completing module 7, students will be able to:

  • Deploy and manage applications

Module 8: Maintaining software updates for managed PCs

This module explains how to use the software updates feature in Configuration Manager to implement an end-to-end management process for the complex task of identifying, deploying, and monitoring Microsoft and third-party software updates to your Configuration Manager clients.

Lessons M8

  • The software updates process
  • Preparing a Configuration Manager site for software updates
  • Managing software updates
  • Configuring automatic deployment rules
  • Monitoring and troubleshooting software updates
  • Enabling third-party updates

Lab 1: Configuring the site for software updates

  • Configuring and synchronizing the software update point

Lab 2: Deploying and managing software updates

  • Determining software update compliance
  • Deploying software updates to clients
  • Configuring automatic deployment rules
  • After completing module 8, students will be able to:
  • Maintain software updates for managed PCs.

Module 9: Implementing Defender Protection for managed PCs

This module explains how to use the security-related features provided by Configuration Manager to help protect client computers from malware threats, and to configure specific Windows Defender Firewall settings for clients. Based on Endpoint Protection functionality, Endpoint Protection in Configuration Manager supports the deployment, management, and monitoring of antimalware policies, Windows Defender Firewall settings, Windows Defender Application Guard policies, Windows Defender Exploit Guard policies, and Windows Defender Application Control policies on client computers.

Lessons M9

  • Overview of Endpoint Protection in Configuration Manager
  • Configuring, deploying, and monitoring Endpoint Protection policies
  • Configuring and deploying advanced threat policies

Lab 1: Implementing Endpoint Protection

  • Configuring the Endpoint Protection point and client settings
  • Configuring and deploying Endpoint Protection policies
  • Monitoring Endpoint Protection

Lab 2: Implementing advanced threat policies

  • Creating and deploying advanced threat protection policies

After completing module 9, students will be able to:

  • Implement Defender Protection for managed PCs

Module 10: Managing compliance and secure data access

Many enterprise organizations require systems, such as servers, laptops, desktop computers, and mobile devices, to meet specific configuration and compliance requirements. Compliance settings in Configuration Manager can play a key role in identifying existing configurations, discovering systems that have adverse configuration changes, and remediating these settings automatically when necessary. Compliance settings also can help control how users manage and access data in the enterprise network environment. For computers that run Windows 8 and newer operating systems, you can manage data using folder redirection, offline files, and roaming profiles. You also can control access to data using remote connection profiles, virtual private network (VPN) profiles, Wi-Fi profiles, and certificate profiles. This module describes the compliance settings that you can manage using Configuration Manager. You will learn to use these settings to maintain configuration requirements and to provide secure data access to enter rise resources.

Lessons M10

  • Overview of Compliance Settings
  • Configuring compliance settings
  • Viewing compliance results
  • Managing resource and data access

Lab 1: Managing compliance settings

  • Managing configuration items and baselines
  • Viewing compliance settings and reports
  • Configuring remediation in compliance settings
  • Using compliance information to create collections

After completing module 10, students will be able to:

  • Manage compliance and secure data access

Module 11: Managing operating system deployment

This module explains how to use the operating system deployment feature in Configuration Manager to create operating system images that you can deploy to unmanaged computers and those managed by Configuration Manager. There are several scenarios in which you can deploy operating systems by using Configuration Manager, including when you are working with new systems or when you are upgrading existing ones. Operating system deployment uses both Configuration Manager and Windows components to manage and deliver operating system images. You can configure settings on a reference computer prior to capturing an image of its operating system or by using task sequences that Configuration Manager creates after you deploy the image to a target system. This module also explains how to use Configuration Manager to create a strategy for operating-system deployments . And also, it explains and how to manage Windows as a service. This module explains how to manage Windows as a service.

Lessons M11

  • An overview of operating system deployment
  • Preparing a site for operating system deployment
  • Deploying an operating system
  • Managing Windows as a service

Lab 1: Preparing the site for operating-system deployment

  • Managing the site system roles used to support operating system deployment
  • Managing packages to support operating system deployment

Lab 2: Deploying operating-system images for bare-metal installations

  • Preparing the operating system image
  • Creating a task sequence to deploy an image
  • Deploying an image

After completing module 11, students will be able to:

  • Manage operating system deployments.

Module 12: Managing and maintaining a Configuration Manager site

This module describes role-based administration, Remote Tools, and the site maintenance tasks that you can manage by using Configuration Manager. This module also describes how to back up and recover a Configuration Manager site system and use the recommendation(s) from Management Insights to simplify administration.

Lessons M12

  • Configuring role-based administration
  • Configuring Remote Tools
  • Overview of Configuration Manager site maintenance and Management Insights
  • Backing up and recovering a Configuration Manager site
  • Updating the Configuration Manager infrastructure

Lab 1: Configuring role-based administration

  • Configuring a new scope for Toronto administrators
  • Configuring a new administrative user

Lab 2: Configuring Remote Tools

  • Configuring the Remote Tools client settings and permissions
  • Managing desktops by using Remote Control

Lab 3: Maintaining a Configuration Manager site

  • Configuring maintenance tasks in Configuration Manager
  • Configuring the Backup Site Server task
  • Recovering a site from a backup

After completing module 12, students will be able to:

  • Manage and maintain a Configuration Manager site.

Module 13: What’s new in Microsoft Endpoint Configuration Manager

This modules describes the features that have been released since Configuration Manager 2012.

Lessons M13

  • Whats new in Microsoft Endpoint Manager covering each semi annual release.

Lab 1: None

  • None

After completing module 13, students will be able to:

  • Understand and leverage the new features available in each semi annual release.

Course Overview

Owning knowledge is one thing, transferring knowledge is something else. In successful organizations, however, sharing knowledge is crucial. That is why Global Knowledge has developed a training that helps (IT) professionals to share knowledge in a didactically sound way and facilitate an interactive training. The “Train the Trainer” course is a comprehensive 3-day instructor-led workshop designed to equip participants with essential skills and knowledge to effectively deliver training.

Course Objectives

Upon completion, participants will be able to:

  • Apply Learning Principles: Utilize key principles of adult learning to create effective training sessions.
  • Manage Classrooms Effectively: Set up and manage both physical and virtual classrooms, including handling difficult participant situations.
  • Deliver Engaging Training: Use facilitation techniques to deliver engaging and memorable training sessions.
  • Implement Feedback and Coaching: Receive and apply facilitator and peer feedback to improve training delivery skills.
  • Develop Training Content: Integrate and apply their own content into training programs for practical application.
  • Utilize Technology for Training: Incorporate video recordings and other technological tools to assess and enhance communication and presentation skills.

Course Content

Topics during this training include:

  • Important didactic models for IT training
  • Communication during training
  • Attitude and skills of the trainer
  • How does new material stick with participants?
  • How to make your story stick?
  • Preparing and developing a training course
  • The balance between material and exercises
  • Which functions do you show and which not?
  • Different types of work formats
  • The role and possibilities of technology during training
  • Delivering training
  • Dealing with resistance
  • Evaluating and monitoring training
  • Methodologies for teaching

During the training, you will experience various work forms firsthand, with the trainer explaining each exercise as they demonstrate it. Additionally, video recordings are used, allowing you to review and observe your own performance. This enables you to see the impact of your communication, receive constructive feedback, and gain tips and tricks to enhance your training sessions. By the end of the course, you will leave with a wealth of new strategies and techniques, empowering you to deliver even more effective training to your participants.

Course Overview

Cultivate effectiveness, lead with excellence, and transform your team for breakthrough results.

Course Objectives

  • Become a resourceful, innovative manager who quickly accomplishes goals and motivates team members to get things done (Habit 1: Be Proactive)
  • Have a clear vision of what you want your contribution as a manager to be and shape your own future (Habit 2: Begin with the End in Mind)
  • Focus on top priorities and be regarded for follow-through and organizational skills; eliminate the unimportant (Habit 3: Put First Things First)
  • Cultivate enthusiasm with performance measurements that satisfy both employee and employer goals; share recognition and success (Habit 4: Think Win-Win)
  • Give honest, accurate feedback that develops trust, and understand the physical components of communication and how they impact the message (Habit 5: Seek First to Understand, Then Be Understood)
  • Understand how differences can contribute to innovative solutions; maximize opinions, perspectives, and backgrounds (Habit 6: Synergize)
  • Maintain and increase effectiveness by renewing yourself mentally and physically (Habit 7: Sharpen the Saw)

Course Content

Habit 1: Be Proactive®

  • Define your values
  • Emotional Intelligence

Habit 2: Begin with the End in Mind®

  • Value and Mission Statements?
  • SMART Goals
  • Building Effective Teams and Team Formation

Habit 3: Put First Things First®

  • Time Management & Prioritising
  • Personaility Styles – communicate with confidence
  • Personality Questionnaire
  • Stakeholder Management and communication mapping

Habit 4: Think Win-Win®

  • The Johari Window
  • Giving and receiving Effective Feedback
  • Understanding Different Perspectives
  • Effective Negotiation

Habit 5: Seek First to Understand, Then to Be Understood®

  • Effective Interpersonal Communication
  • Being Assertive
  • Listening SKills
  • Transactional Analysis
  • Coaching Skills

Habit 6: Synergize®

  • Motivation
  • Equality and Diversity
  • Effective Problem Solving
  • Critical Thinking
  • Decision Making

Habit 7: Sharpen the Saw®

  • Management vs Leadership
  • Leading CHange
  • Powerful Presentations

Course Overview

The SAP Blended Learning Academy is a guided modular training program that combines virtual live classroom learning units with instructors (SAP Learning Class, virtual option) with self-study learning via the SAP Learning Hub as well as access to the training systems ( SAP Learning System Access) and ends in the SAP Consultant Certification (SAP Certification). The learning experience is surrounded by a dedicated Learning Room for continuous exchange with instructors also during the self-study phase as well as peer learning.

Active SAP Learning Hub subscription is mandatory but not part of a booking to WS4HSD. It must be bought separately.

Course Objectives

This course will prepare you to:

  • Gain a detailed knowledge of using the functions and customizing settings in sales: Pricing, Billing and Cross-Functional Topics in S4HANA Sales

Course Content

  • The complete training program is based on the contents of the SAP Consultant trainings TS460 and TS462
  • Kick Off Event: One-day, virtual SAP Learning Class introduction event moderated by an SAP instructor introducing the approach and the content.
  • 4 Q&A Events with Guided Exercises: virtual SAP Learning Class events (1 day each) moderated by an SAP instructor reviewing the open questions out of the respective self-study parts in a monthly cadence.
  • Access to the dedicated SAP Blended Learning Academy Learning Room for continuous exchange with instructors also during the self-study phase as well as peer learning.
  • The above-described training material and learning system access for Self-study online is accessible via the SAP Learning Hub. An active license is mandatory but not part of a booking to WS4HSD. It must be bought separately. Read more – FAQ
  • Certification examination C_TS462 SAP Certified Application Associate – SAP S/4HANA Sales online via the Certification Hub must be bought as well separately.

Course Overview

Avoid project catastrophe by developing expertise in risk management.

This course is designed for project managers who want to proactively reduce the probability of project failure. In this course, you will learn to use proven approaches and techniques specific to risk management. You will learn to plan and analyze projects so as to minimize risk in a formal environment. You will identify, analyze, and address uncertainty throughout the project lifecycle and incorporate lessons learned and industry best practices related to risk management. You will apply PMI risk management processes in a practical way to eliminate, mitigate, and minimize threats while maximizing and optimizing opportunities.

Students pursuing a university-recognized and/or accredited certificate in Canada or continuing education units in the US must attend at least 90% of class time, participate in class exercises and section-knowledge checks, and score at least 70% on an end-of-class, multiple-choice assessment.

Course Objectives

  • Assess overall project riskiness
  • Manage uncertainty in terms of both opportunities and threats
  • Role of a risk management plan
  • Risk within an execution strategy
  • Conduct qualitative risk assessments in order to rank risks
  • Conduct quantitative risk assessments in order to adequately budget for uncertainty
  • Develop risk response plans for significant risks
  • Monitor and control uncertainty during execution
  • Ensure success by understanding the role of a risk management plan and lessons learned

Course Content

  • Risk Management Foundations:
  • Definition of a plan
  • Definition of risk and risk management
  • Risk management and project success
  • Project management life cycle
  • Strategic Risk Reduction:
  • Project success factors
  • Stakeholder analysis
  • Balancing constraints within a plan
  • Assessing project riskiness
  • Importance of formal planning
  • Execution Risk Reduction:
  • Risk management plan
  • Risk identification techniques
  • Qualitative risk analysis
  • Quantitative risk analysis
  • Risk response planning
  • Monitoring and Controlling Risk:
  • Protecting the plan
  • Change controls
  • Responding to risks
  • Value of Lessons Learned:
  • Capturing and employing lessons learned
  • Current methods of managing uncertainty based on lessons learned
  • Hands-On Activities:
  • Determine sources of project risk by category
  • Assess overall project risk
  • Identify and categorize risk
  • Perform qualitative risk analysis
  • Perform quantitative risk analysis
  • Plan risk responses
  • Involve stakeholders