Every registration supports local education. TrainUp Gives Back

Your Career Training Marketplace

Questions? Call Toll-Free: 1-866-540-9677

  • Instant Access ImageInstant Access
    From Anywhere
  • Unlimited Viewing ImageUnlimited
  • calendar Image 6-12 Months
    To Complete


Microsoft Windows 8.1 and Office applications need to be activated before they can be used by users within a network. Organizations are required to purchase volume licenses which can be deployed to devices automatically using various methods, including Key Management Service, Multiple Activation Keys, and Active Directory-based activation. Office 2013 and Office 365 are to applications that are commonly used throughout organizations. These can also have their deployments automated to make deployment to hundreds of computers an easier administrative task. This course will describe the various volume activation methods and how they are each used. It will also discuss and demonstrate how to deploy Office 2013 using MSI and deploy Office 365 using C2R. This course is one in a series of Skillsoft courses to help prepare for the 70-695 Deploying Windows Devices and Enterprise Apps certification exam.

Learning Objectives
  • Start the course
  • Describe product activation and the three main activation methods: Retail, OEM, volume activation
  • Describe the three activation models: Active Directory-based, KMS, MAK
  • Describe the Active Directory-based activation process and planning considerations
  • Describe the process and planning considerations for using KMS and MAK for volume activation, including how to choose a KMS host
  • Describe VAMT and Volume Activation Services, including the benefits and features
  • Identify the type of activate that may be required depending on the type of infrastructure implemented: core, isolated, disconnected, development labs
  • Install the Volume Activation Services role, add a KMS host, and activate the KMS key
  • Install, configure, and verify Active Directory-Based activation
  • Describe how computers get activated using KMS
  • Describe two ways MAK can activate computers: independent activation and proxy activation
  • Describe how to use VAMT to manage activation and licensing status of computers and products, as well as key usage
  • Describe the two Office 2013 versions available for installation: MSI and C2R
  • Describe the six deployment methods for Office 2013 installations: local, network, group policy, software distribution, virtualization and standard image
  • Describe the advantages, disadvantages, and compatibility issues of Office 2013 64-bit versus 32-bit
  • Explain how Office 2013 can be activated using the various methods
  • Explain what re-arming is and how to complete it
  • Describe how the Office Customization Tool, OCT can be used to customize Office 2013 for deployment
  • Use OCT to customize the setup before installing Office 2013, this includes customizing the installation and creating the network installation point
  • Create a silent installation of Office 2013 using the Config.xml file or OCT
  • Slipstream updates in the Office 2013 deployment
  • Add Office to an image for deployment through MDT for a LTI
  • Use the C2R Administration tool to prepare for a C2R installation of Office 365
  • Deploy C2R for Office 365 products using the Office Deployment Tool
  • Identify the ways Office 365 can be updated
  • Apply an update to Office 365 using the Office Deployment Tool
  • Monitor the usage for Office 365 using the Telemetry Dashboard
  • Activate Windows deployments using various methods and deploy Office 2013 and Office 365 using MSI and C2R
  • Audience

Get the latest industry news, recommended courses, & promotions from TrainUp.com sent straight to your inbox.