-
Agile Games
After watching this video; you will be able to describe how games can be used to foster collaboration; communication and innovation in agile teams.
-
Causes of Problems in an Agile Team
After watching this video; you will be able to describe the causes for problems within an agile team.
-
Characteristics of an Agile Team
After watching this video; you will be able to describe the characteristics of an agile teams.
-
Coaching
After watching this video; you will be able to describe the role of coaching in an agile project.
-
Communication and Knowledge Sharing
After watching this video; you will be able to describe how to support good communication and knowledge sharing with customers and within agile teams.
-
Improving Team Performance
After watching this video; you will be able to describe the steps that can be taken to improve the performance of an agile team.
-
Overcoming Challenges of Distributed Teams
After watching this video; you will be able to describe how challenges of distributed agile teams can be overcome.
-
Scaling Scrum
After watching this video; you will be able to describe how Scrum can be scaled.
-
Scaling Teams
After watching this video; you will be able to describe how Agile teams can be scaled.
-
Shu-Ha-Ri Developmental Mastery Model
After watching this video; you will be able to describe the use of the developmental mastery model; Shu-Ha-Ri with an Agile team.
-
Applying the NEW Adapters - SFTP
In Microsoft BizTalk Server; you can use the Secure File Transfer Protocol Adapters to ensure secure data transfer in and out of BizTalk. In this video; Clive Herman demonstrates how to create and configure an SFTP environment.
-
Broadband Router - DMZ
After watching this video; you will be able to describe DMZ in broadband routers.
-
Configuration Management
After watching this video; you will be able to compare traditional configuration tasks with DevOps and recognize DevOps configuration tools such as Chef and Puppet.
-
Multifactor Authentication
In this video; Glen E. Clarke describes the multifactor authentication methods for physically protecting data.
-
eDiscovery
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran discusses the eDiscovery Site in SharePoint 2013.
-
Multi-Factor Authentication
After watching this video; you will be able to use Multi-Factor authentication in Azure.
-
Performance Monitoring
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the performance monitoring techniques used for server maintenance.
-
Creating Virtual Machines
After watching this video; you will be able to use Vagrant to create virtual machines.
-
APP-V
After watching this video; you will be able to describe iSCSI node names.
-
System Requirements
After watching this video; you will be able to identify system requirements and supported environments for LoadRunner 12.5.
-
Cloud Components
Microsoft System Center 2012 R2 offers numerous cloud components that allow you to provide a flexible and unified solution across a cloud-based enterprise environment. In this video; Rafiq Wayani demonstrates how the seven components that are included with System Center 2012 R2 are beneficial to cloud computing administration.
-
Service Manager Components
The Microsoft System Center 2012 R2 Service Manager is comprised of the management server and the Service Manager database; from which you can manage your organization's services. In this video; Rafiq Wayani demonstrates how the components of the Service Manager are integrated and applied in the management of services.
-
Virtual Machine Manager Libraries
In Microsoft System Center 2012 R2; the Virtual Machine Manager (VMM) requires Library Servers to host resources. In this video; Rafiq Wayani adds a Library Server to the VMM infrastructure and imports resources into it from an existing Library Server.
-
Installing the MAP Toolkit
After watching this video; you will be able to install the MAP toolkit.
-
CPU
After watching this video; you will be able to describe CPU replacement.
-
Switch
After watching this video; you will be able to describe switch.
-
Obtain Instance Information on Multiple Instances
When using Microsoft PowerShell and SQL Server; you can return instance information on multiple instances. In this video; David Dye demonstrates how to use cmdlets to return information on multiple instances of a server.
-
Expressions
After watching this video; you will be able to identify the different expressions used in Puppet.
-
Security
After watching this video; you will be able to describe the security concerns of a Vagrant installation.
-
Create a Site Page
SharePoint 2013 enables you to easily create a site page using a template of your choice. You do this through the Sites and workspaces feature located on the Site Settings page. In this video; David Santana demonstrates how to name and configure a new site page; as well as select the appropriate site template.
-
Create an Asset Library
Creating an asset library in Microsoft SharePoint 2013 allows users to upload specific images and video files. In this video; David Santana shows you how to create and add files to an asset library.
-
Explore a Publishing Site
The publishing site in Microsoft SharePoint 2013 is user friendly. In this video; David Santana discusses how this feature creates a friendlier and more inviting and intuitive site for content authors.
-
Recycle Bin
SharePoint 2013 enables you to configure the Recycle Bin so that you can both delete and restore items to your document libraries. In this video; David Santana activates the Recycle Bin; which offers restore and delete options.
-
Enable Users
Microsoft Lync Server 2013 allows you to add and enable users by assigning them to specific pools. In this video; David Santana uses the Control Panel's User section to add; enable; and configure communications permissions for a Lync Server user account.
-
Connectors
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the different types of connectors used with fiber-optic cabling and twisted-pair cabling.
-
Apps
SharePoint 2013 organizes search items into categories; enabling you to easily access and add Noteworthy and other apps you can add to your site; arranged by name or time of listing. In this video; David Santana uses the new SharePoint search feature on the TeamSite page to access Your Apps in Site Contents.
-
Reminders
Reminders in Mac OS X Mountain Lion are like to-do lists that incorporate with your calendar. In this video; Josh Penzell shows how to create lists that can be synchronized across different devices.
-
Conferencing
Microsoft Lync Server 2013 allows you to confer with multiple participants. Lync provides three different types of conferencing that we can use – Web Conferencing; AV Conferencing and Dial-In Conferencing; all governed by Conferencing Policies. In this video; Telmo Sampaio uses Lync to create and assign these conferencing policies.
-
DHCP
In this video; Jamie Campbell describes the Dynamic Host Configuration Protocol (DHCP).
-
DNS
The CompTIA Server+ SK0-004 certification covers server architecture and administration; storage; security; networking; disaster recovery; and troubleshooting. Domain name system; or DNS; is a service that's responsible for translating fully qualified domain names to IP addresses. In this video; Glen Clarke describes DNS.
-
Port Security
Port-based Network Access Control; or PNAC; is part of the 802.1x IEEE standard designed to provide enhanced security prior to authentication and authorization. In this video; Glen E. Clarke demonstrates the use of port-based network access control.
-
VPN Components
After watching this video; you will be able to describe VPN components.
-
Message Tracking
In Microsoft Exchange Server 2013; you can enable message tracking to provide a record or log file of all messages sent and received. Message tracking can be configured on the mailbox or Edge Transport server using the Set-TransportService and Set-MailboxServer cmdlets. In this video; Michael Murphy demonstrates the importance of message tracking and how to configure it in Exchange.
-
DSL
After watching this video; you will be able to describe DSL.
-
Applications
Microsoft Internet Information Services (IIS) allows you to use applications from a pool. In this video; Pierre Devereux demonstrates how to create an application and then assign it to an application pool to be used with different settings on other websites.
-
Bluetooth
After watching this video; you will be able to describe Bluetooth.
-
Well-Known Ports and Protocols
The CompTIA Server+ SK0-004 certification covers server architecture and administration; storage; security; networking; disaster recovery; and troubleshooting. In this video; Glen Clarke describes two common standards that define how data is transmitted over a network: transmission control protocol (TCP) and user datagram protocol (UDP).
-
User Accounts
After watching this video; you will be able to describe user accounts.
-
IPv4 Addressing
After watching this video; you will be able to describe IPv4 addressing.
-
The Dock
The Dock in Mac OS X Mountain Lion gives you quick access to all of your favourite resources. In this video; Josh Penzell shows you how to customize the Dock and keep it clutter-free.
-
Setting Up Family Sharing
After watching this video; you will be able to share content and media using Family Sharing in Mac OS X Yosemite.
-
Setting Up Screen Sharing
After watching this video; you will be able to connect to and share computer screens using Mac OS X Yosemite.
-
Sharing Printers
After watching this video; you will be able to configure printer sharing in Mac OS X Yosemite.
-
App Store
Apple has simplified the installation and updating of applications through the App Store; which eliminates the need to find and install applications through an iPhone or iPad. In this video; Josh Penzell demonstrates how you can search; install; and update new applications through the App Store and even update your operating system.
-
Managing and Configuring
After watching this video; you will be able to set up Time Machine; configure a VPN connection; and configure file sharing and share a folder.
-
Creating a Computer-to-Computer Network
After watching this video; you will be able to create a computer-to-computer network using Mac OS X Yosemite.
-
Enhance the User Experience
After watching this video; you will be able to change Search Preferences in Spotlight; set up social feeds in Safari; and configure a new e-mail account.
-
Extensions
Microsoft Internet Information Services (IIS) include a number of extensions and features to choose from. In this video; Pierre Devereux demonstrates how to select and apply IIS extensions for specific needs.
-
Finder
After watching this video; you will be able to describe the finder.
-
Install/Uninstall
Installing and uninstalling an application in Mac OS X Mountain Lion is as simple as drag and drop. In this video; Josh Penzell shows how to install; uninstall; and empty the trash.
-
Automator
In Mac OS X; Automator is a cool built-in app that can really save you a lot of time by enabling repetition of tasks; which otherwise needs manual intervention. In this video; Josh Penzell demonstrates how you can use Automator to create and select a service and run it across a wide variety of programs.
-
Boot Camp
After watching this video; you will be able to describe Boot Camp.
-
Calendar Overview
The Calendar App in Mac OS X Mountain Lion allows you to create multiple calendars; add events; and receive alerts. In this video; Josh Penzell shows how to manage the application and stay on schedule.
-
Calendar Preferences
The Calendar App in Mac OS X Mountain Lion allows you to set preferences. In this video; Josh Penzell demonstrates how to set; show; and hide the various components of the calendar.
-
Configuring Mail
Mac OS X provides you the option to configure the settings for your mail. In this video; Josh Penzell demonstrates how Mac OS X allows automatic configuration of your mail settings using a service such as Gmail or Yahoo and also how to manually configure the settings for your e-mails and signatures.
-
Dictation
Dictation in Mac OS X Mountain Lion takes the tedium out of everyday writing needs; such as mails. In this video; Josh Penzell shows you how to use this feature to dictate text with commands and save time.
-
Energy Saver
Energy Saver in Mac OS X Mountain Lion allows you to calibrate your computer for power saving. In this video; Josh Penzell demonstrates how to adjust battery and power adapter settings and get your computer to sleep and wake up on a schedule.
-
Sharing Options
The Sharing feature in Mac OS X provides you many ways to share out information from your computer to others. In this video; Josh Penzell demonstrates how you can determine the services you want to share and choose for whom and what types of files you want to share using the different Mac OS X Sharing options.
-
Syncing Devices
Apple has made it easy to synchronize your iPhone or iPad with your computer through iTunes. In this video; Josh Penzell demonstrates how you can enjoy all of your favorite music; video podcasts; and movies on your computer by synchronizing your iPhone; iPod touch; Apple TV; or iPad using iTunes.
-
Taking Screenshots
There're a couple of different ways to take screenshots in the Macintosh Operating System. In this video; Josh Penzell demonstrates how to take screenshots in Mac OS X using Command+Shift+3 and Command+Shift+4 and save them as files on the desktop or insert directly on to a document.
-
The Finder
The Finder is a powerful tool built into Mac OS X Mountain Lion to find documents; folders; and applications. In this video; Josh Penzell shows you how to use this tool find files and display them in various views.
-
Wireless
The wireless Internet in Mac OS X Mountain Lion is important if your Apple computer does not have a physical Ethernet. In this video; Josh Penzell shows how to set network preferences and troubleshoot.
-
Mail Overview
Mail App is a very useful e-mail program included in Mac OS X that allows you to configure the settings and modify the look and feel as you wish. In this video; Josh Penzell demonstrates how you can customize the settings so that you view icons only; text only; or both and even hide toolbar completely.
-
Mission Control
After watching this video; you will be able to describe mission control.
-
Notification Pane
Notification Pane; a new feature in Mac OS X Mountain Lion; allows you to customize how notifications from your built-in Apple applications are displayed. In this video; Josh Penzell shows you how to open and order the pane and get it working for you.
-
Projectors and Airplay
MacBook Pro or MacBook Air allows you to connect with a projector or TV so that you can share your presentations with larger audiences. In this video; Josh Penzell demonstrates some of the ways that you can hook up a projector with your MacBook Pro or MacBook Air and mirror your desktop wirelessly on the projector.
-
Quickly Find and View Files
Mac OS X allows you to locate and view files easily and quickly using the Spotlight feature. In this video; Josh Penzell demonstrates how you can use Spotlight to search for the exact documents you’re looking for and view them quicker with the left and right arrows.
-
Safari Features
Using the features of Mac OS X Safari; you can turn your experience on Mac into an amazing one. In this video; Josh Penzell demonstrates how you can add pages for offline viewing and view your pages in nice clean versions without any advertisements or buttons for social networking sites.
-
Safari Preferences
Safari for Mac OS X allows you to customize according to your requirements by simply changing the preferences. In this video; Josh Penzell demonstrates how you can choose your default browser and search engine; set your homepage and download location; and manage your history and cookies using the preferences settings in Safari.
-
People
Microsoft Windows 8.1's People application links you to your Outlook and social media contacts; and notifies you of and gives you access to their posts and status updates. In this video; Jay Ferron demonstrates how to access social media updates and explains how the People app accommodates and integrates feeds from popular social media platforms.
-
Personalization
After watching this video; you will be able to implement personalization.
-
Bluetooth Devices
You can connect Bluetooth devices to a Microsoft Windows 8 computer in order to share information among them. In this video; Jay Ferron demonstrates how to connect a Bluetooth device to a Windows 8 computer; as well as how to remove it.
-
Introducing the new Command Prompt
After watching this video; you will be able to identify the new command prompt menus in Microsoft Windows 10.
-
Task Manager
After watching this video; you will be able to describe task manager.
-
Conditional Execution
In this video; Jamie Campbell describes the conditional command execution in UNIX.
-
A History of Unix
Unix is one of the most widely used operating systems in the world and is preferred by individuals; companies; and organizations for a variety of applications. It has gained huge success in personal use markets; such as desktop PCs; smart phones; and tablets. In this video; Jamie Campbell discusses the history of Unix.
-
Anonymous Shutdowns
In this video; Jamie Campbell explains how to restrict shutdown access in Unix.
-
Archiving Directories
In this video; Jamie Campbell explains how to archive files with Unix.
-
Automatic Network Configuration
In this video; Jamie Campbell describes automatic network configuration in Unix.
-
Basic Principles of Unix
In this video; Jamie Campbell discusses the basic principles of Unix.
-
Bourne Shells
A shell is a program that lets you interact with the operating system by issuing text-based commands. The Bourne shell is used for writing shell scripts. In this video; Jamie Campbell discusses about the Bourne shells.
-
Built-in User Accounts
In this video; Jamie Campbell explains Unix user accounts.
-
C Shells
In this video; Jamie Campbell describes the various types of C shells on Unix.
-
Conditional Execution Using Grouping
In this video; Jamie Campbell discusses conditional execution using grouping on Unix.
-
Configuring a Network Interface
In this video; Jamie Campbell explains how to access network interface information and configure interfaces in Unix.
-
Configuring Apache
In this video; Jamie Campbell demonstrates how to configure Apache in Unix.
-
Configuring Samba
In this video; Jamie Campbell describes how to configure Samba in an Ubuntu system.
-
Copying and Moving Directories
In this video; Jamie Campbell explains how to copy and move directories in Unix.
-
Creating a Basic Shell Script
In this video; Jamie Campbell describes how to create a basic shell script on Unix.
-
Creating Directories
In this video; Jamie Campbell explains how to create directories in Unix.
-
Creating Files
You can create files in Unix directories by using the touch command; redirection; an application; or a GUI interface. In this video; Jamie Campbell explains how to create files.
-
Creating Network Routes
In this video; Jamie Campbell describes how to create network routes in Unix.
-
Creating Samba Shares
In this video; Jamie Campbell demonstrates how to create Samba shares in Ubuntu Linux.
-
Cron Scheduling
Cron is a Unix scheduling daemon. A crontab file states which jobs are scheduled; when they are scheduled; and under which conditions they are scheduled. In this video; Jamie Campbell discusses cron scheduling.
-
Current Development Status of Unix
In this video; Jamie Campbell discusses the current development status of Unix.
-
Deleting Directories
In this video; Jamie Campbell demonstrates how to remove directories in Unix.
-
Deleting Files
In this video; Jamie Campbell explains how to delete files.
-
Directories in Unix
In this video; Jamie Campbell describes the directories in Unix.
-
Encrypted Passwords
In this video; Jamie Campbell describes encrypted passwords in Unix systems.
-
Escape Characters
The Unix shell uses certain characters for special purposes; and to display them as literal characters; you have to escape them with a slash. Escape characters themselves can be displayed as literal characters in the same way. In this video; Jamie Campbell discusses escape characters.
-
Executing a Shell Script
In this video; Jamie Campbell demonstrates how to execute a shell script on Unix.
-
Features of NFS
Network file system (NFS) is an important networking system used by Unix. In this video; Jamie Campbell outlines the features and benefits of NFS.
-
File Descriptors
In this video; Jamie Campbell describes file descriptors in a Unix shell.
-
File Permissions Overview
In this video; Jamie Campbell explains file permissions.
-
Groups in Unix
In this video; Jamie Campbell describes how to manage groups in Unix.
-
Hardening Against Network Attacks
In this video; Jamie Campbell describes hardening techniques against network attacks in Unix.
-
Here Documents
In this video; Jamie Campbell describes here documents in a Unix shell.
-
Installing Apache
In this video; Jamie Campbell demonstrates how to install Apache in Unix.
-
Installing BIND and DNS
In this video; Jamie Campbell describes how to install Berkeley Internet name domain (BIND) in Unix.
-
Installing Samba
Samba is a Unix component; which provides a connection between Unix and Windows. In this video; Jamie Campbell demonstrates how to install Samba.
-
Korn Shells
In this video; Jamie Campbell describes Korn shells on Unix.
-
Linux and Unix
In this video; Jamie Campbell discusses the similarities and differences between Linux and Unix and explains the appeal of these two operating systems.
-
Listing Files
In this video; Jamie Campbell describes how to list files in a Unix shell.
-
Mounting Filesystems
Unix mounts each filesystem and device as an object that can be found in the dev directory. In this video; Jamie Campbell discusses mounting filesystems.
-
Naming and Saving a Shell Script
In this video; Jamie Campbell demonstrates how to execute a shell script on Unix.
-
Navigating Between Directories
In this video; Jamie Campbell describes how to navigate between directories in a Unix shell.
-
NFS Client
Network File System (NFS) is a network service comprising of a client-server application. In this video; Jamie Campbell demonstrates how to configure NFS client.
-
NFS Components
In this video; Jamie Campbell describes the components of network file system (NFS) in Unix.
-
NFS Server
In this video; Jamie Campbell demonstrates how to configure a network file system (NFS) server in Unix.
-
NFS Share
Network File System (NFS) is a network service comprising of a client-server application. In this video; Jamie Campbell demonstrates how to mount a NFS share.
-
Password Administration
Unix systems employ various password security techniques. However; not all Unix systems allow implementation of every technique; and password administration tools vary from system to system. In this video; Jamie Campbell discusses password administration.
-
Passwords in Unix Systems
Unix makes use of passwords to protect user accounts; and passwords in Unix are very strong and secure. In this video; Jamie Campbell discusses passwords in Unix systems.
-
Performing Name Resolutions
In this video; Jamie Campbell describes how to perform name resolution in Unix.
-
Running Apache
In this video; Jamie Campbell demonstrates how to run Apache in Unix.
-
SAMBA overview
Samba is a Unix component; which provides a connection between Unix and Windows. In this video; Jamie Campbell describes Samba and its components.
-
Security in the Unix Kernel
Unix is kernel-based because it has a powerful core that acts as the bridge between the hardware and the applications that use it. In this video; Jamie Campbell describes the Unix kernel and some ways of configuring the kernel on Unix systems.
-
Setting File Permissions
In this video; Jamie Campbell explains how to set file permissions.
-
Setting Permissions for Directories
Every directory in Unix has permissions associated with it; and those permissions restrict who has the rights to use the directory. In this video; Jamie Campbell describes how to set permissions for directories.
-
Setting Permissions for Files
In this video; Jamie Campbell demonstrates how to set permissions for files in Unix.
-
Sharing Network Resources between Windows and Unix Using Samba
In this video; Jamie Campbell describes how to share network resources between Windows and Unix by using Samba.
-
TCP/IP and Routing
In this video; Jamie Campbell describes TCP/IP and routing in Unix systems.
-
Text Editors for Shell Scripts
Unix has the ability to create complex shell scripts. In this video; Jamie Campbell outlines the various editors supported by Unix for creating shell scripts.
-
The Apache Web Server
In this video; Jamie Campbell describes the Apache web server and its role in Unix computing.
-
The Unix Directory Structure
In this video; Jamie Campbell describes the Unix directory structure.
-
The Unix Partition Structure
In this video; Jamie Campbell describes the Unix partition structure.
-
Unix and the Open Source Model
In this video; Jamie Campbell discusses Unix and the open source model.
-
Unix Daemons
In this video; Jamie Campbell describes the Unix daemons.
-
Unix File Types
In this video; Jamie Campbell describes the Unix file types.
-
Unix Files
The Unix filesystem is different from the Windows system. In this video; Jamie Campbell describes the Unix filesystem.
-
Unix Portability
In this video; Jamie Campbell discusses Unix portability.
-
Unix Standards
In this video; Jamie Campbell discusses Unix standards.
-
Users in Unix
In this video; Jamie Campbell outlines the steps to manage users in Unix.
-
Using Find to Search for Files
In this video; Aaron Sampson outlines the steps to perform data and index defragmentation.
-
Using grep to Search File Contents
In this video; Jamie Campbell describes how to use grep to search file contents on Unix.
-
Using Wildcards to Locate Files
In this video; Jamie Campbell describes how to use wildcards to locate files in Unix.
-
Viewing File Contents
In this video; Jamie Campbell describes how to view file contents in a Unix shell.
-
Wildcard Characters
In this video; Jamie Campbell describes wildcard characters in Unix.
-
Clobbering
In this video; Jamie Campbell describes the clobbering file protection feature in Unix.
-
Docker Hub
After watching this video; you will be able to describe the process of accessing Docker hub.
-
Understanding Docker Registry
After watching this video; you will be able to differentiate between public and private registries in Docker.
-
User Settings
OS X Server for Mountain Lion is a powerful server management app that makes it easy to configure user settings. In this video; Jamie Campbell explains user settings in OS X Server.
-
Adding Users and Groups
Implementing a server on your network involves working with users and groups. In this video; Jamie Campbell explains how to add users and groups in Mac OS X Server for Mountain Lion.
-
Changing Your Host Name
OS X Server for Mountain Lion is a powerful server management app that includes tools that enable you to manage and configure network services; including file sharing; mail services; and DNS services. In this video; Jamie Campbell explains how to change your host name in OS X Server.
-
Establishing Groups
In Mac OS X Server for Mountain Lion; you can create groups to handle how different people interact with the network. In this video; Jamie Campbell discusses Users and Groups and how to create groups In Mac OS X Server.
-
Installing OS X Server
Mac OS X Server for Mountain Lion is an add-on application to OS X. In this video; Jamie Campbell explains how to purchase and install the OS X Server application.
-
Setting Access Permissions
OS X Server for Mountain Lion is a powerful server management app. Access Permissions are a critical aspect of any network and OS X Server makes it easy to establish permissions for users and groups. In this video; Jamie Campbell explains how to set access permissions in OS X Server.
-
Setting Up Calendar Server
Mac OS X Server for Mountain Lion is a powerful server management application. In this video; Jamie Campbell introduces you to Calendar Server and explains how to set it up.
-
Setting Up FTP Access
OS X Server for Mountain Lion is a powerful server management app that includes tools to manage and configure network services; including file sharing; mail services; DNS services; and many other important network management features. In this video; Jamie Campbell explains how to set up FTP Access in OS X Server.
-
Setting Up Mail Server
Mac OS X Server for Mountain Lion is a powerful server management application that includes tools to manage and configure network services; and set up Mail Server. In this video; Jamie Campbell discusses how to set up Mail Server.
-
Setting up Virtual Private Networks (VPNs)
Mac OS X Server for Mountain Lion is a powerful server management application. In this video; Jamie Campbell discusses virtual private networks (VPNs) and how you can set up a VPN in OS X Server.
-
Setting Up Wikis
In Mac OS X Server; you have the Wiki server where users can share their information and even create blogs. In this video; Jamie Campbell discusses how to set up the Wiki server and begin creating the Wikis.
-
Using Alerts
OS X Server for Mountain Lion provides alerts on certain activities and that’s a useful tool for administrators. In this video; Jamie Campbell explains how to set up and configure alerts in OS X Server.
-
Using Open Directory
Mac OS X Server for Mountain Lion is a powerful server management application that includes tools to manage and configure network services. In this video; Jamie Campbell discusses using Open Directory in OS X Server.
-
Using the Profile Manager to Configure iOS Devices
In Mac OS X Server; you can use the Profile Manager to set iOS devices. In this video; Jamie Campbell discusses how to work with the Profile Manager for iOS device settings.
-
Using the Profile Manager to Configure User Settings
In Mac OS X Server; you can use the Profile Manager to manage the user; groups and device settings. In this video; Jamie Campbell discusses how to work with the Profile Manager for Group settings.
-
Working with Certificates
OS X Server for Mountain Lion makes it easy to manage and configure network services; including file sharing; mail services; DNS services; and many other important network management features. In this video; Jamie Campbell discusses certificates and OS X Server.
-
Activating Profile Manager
Mac OS X Server for Mountain Lion is a powerful server management application that that can be used to activate the Profile Manager to manage network devices. In this video; Jamie Campbell introduces you to Profile Manager.
-
Benefits of Using OS X Server
Mac OS X Server for Mountain Lion is a powerful all-around server application to manage your Mac and iOS devices. In this video; Jamie Campbell explains some of the benefits of using OS X Server in your network.
-
Introducing OS X Server
Mac OS X Server for Mountain Lion is a powerful server management application that includes tools to manage and configure network services. In this video; Jamie Campbell introduces you to Mac OS X Server.
-
Next Steps with OS X Server
After you install Mac OS X Server for Mountain Lion; the Server interface will suggest the next steps for setting up your network. In this video; Jamie Campbell explains the importance of these next steps in network management.
-
Adding Audit Triggering Rules
After watching this video; you will be able to define audit triggering rules and describe what happens when an audit fails.
-
Applying Recipes to a Test Kitchen Instance
After watching this video; you will be able to create and apply recipes to a Test Kitchen instance.
-
Authenticating Chef Servers
After watching this video; you will be able to describe how the Chef server is authenticated using the Chef server API.
-
Best Practices for Preparing Cookbooks
After watching this video; you will be able to prepare and evaluate Cookbooks using best practices.
-
Best Practices for Writing Chef DSL
After watching this video; you will be able to describe the rules and best practices for writing Chef DSL.
-
Chef Conferences and User Groups
After watching this video; you will be able to list the places where major Chef training events and conferences are held.
-
Configuring the Chef Server to Use Chef Analytics
After watching this video; you will be able to list the post-installation steps of Chef Analytics that need to be performed on the Enterprise Chef server.
-
Configuring the Workstation
After watching this video; you will be able to use Chef Tools such as VirtualBox; Vagrant; and Test Kitchen.
-
Cookbook Version Control
After watching this video; you will be able to describe how to handle multiple versions cookbooks.
-
Creating a Chef Client Instance
After watching this video; you will be able to create a Chef client instance by starting Chef client on a managed node.
-
Creating a Cookbook for Server Auditing
After watching this video; you will be able to recognize how to create a cookbook for server auditing.
-
Creating a Hostname
After watching this video; you will be able to describe how host names are used in Chef Server/Chef Analytics architecture.
-
Creating a Mail Server
After watching this video; you will be able to create an SMTP mail server to send Chef Analytics notifications.
-
Creating a Notification
After watching this video; you will be able to create simple notifications.
-
Creating a Rule
After watching this video; you will be able to create simple rules.
-
Creating and Using a Cookbook
After watching this video; you will be able to create and use a web server cookbook for auditing.
-
Creating Complex Recipes
After watching this video; you will be able to create complex Chef recipes and cookbooks.
-
Deleting Nodes
After watching this video; you will be able to list the various ways to delete nodes from a Chef server.
-
Exercise: Create a Recipe and a Cookbook
After watching this video; you will be able to create a recipe and a cookbook that will enforce compliance on a server and send a notification if the server is not compliant.
-
Exercise: Create an Alert and Notification
After watching this video; you will be able to create an alert and notification process in a control.
-
Extending Chef Functionality into Other DevOps Tools
After watching this video; you will be able to describe how Chef functionality can be extended into other DevOps tools.
-
Freezing Cookbooks
After watching this video; you will be able to freeze and unfreeze a cookbook; and describe the benefits of doing so.
-
Grouping into Environments
After watching this video; you will be able to use roles to group nodes with the same function into environments.
-
Implementing High Availability
After watching this video; you will be able to implement high availability within the Chef architecture to provide server failover support.
-
Inspecting Cookbooks
After watching this video; you will be able to inspect cookbooks and manage cookbook dependencies.
-
Installing Chef Analytics
After watching this video; you will be able to list the steps to install Chef Analytics.
-
Logging in to the Analytics Server
After watching this video; you will be able to log into the Chef Analytics server and perform simple navigation.
-
Managing Applications
After watching this video; you will be able to use an environment cookbook to manage application configuration.
-
Managing VMs with Vagrant
After watching this video; you will be able to use Chef and Vagrant together for virtualization and automated provisioning.
-
Performing Audit and Enforcing Compliance
After watching this video; you will be able to describe how to make updates to a web server to enforce compliance.
-
Preparing the Enterprise Chef Server
After watching this video; you will be able to prepare the Enterprise Chef Server to communicate with Chef Analytics.
-
Prerequisites for Installing Chef Analytics
After watching this video; you will be able to describe the network and system prerequisites for installing Chef Analytics.
-
Running Chef Client as a Daemon
After watching this video; you will be able to describe how a Chef client can automatically be started as a daemon.
-
Running the Audit Cookbook
After watching this video; you will be able to recognize how audit rules are enforced in an auditing cookbook.
-
Setting Runtime Breakpoints within Recipes
After watching this video; you will be able to use Chef shell to set runtime breakpoints within recipes.
-
The Features of Chef Analytics
After watching this video; you will be able to describe the purpose; architecture; components; and network topology of Chef Analytics.
-
The Rules for Chef Analytics
After watching this video; you will be able to distinguish between noteworthy Chef Analytics actions and events.
-
Triggering Rules
After watching this video; you will be able to create a simple trigger.
-
Understanding Notifications and Action Logs
After watching this video; you will be able to describe how action logs are generated and recognize the Chef pipeline architecture.
-
Uploading and Applying Cookbooks to the Chef Server
After watching this video; you will be able to create an audit alert when auditing a server for compliance fails.
-
Using Audit-mode
After watching this video; you will be able to recognize how audit-mode can be used to enforce server compliance.
-
Using BitBucket
After watching this video; you will be able to describe how Bitbucket can be used as a private code repository for Chef cookbooks.
-
Using Chef Provisioning
After watching this video; you will be able to list the individual steps that occur when the nodes managed by Chef server are provisioned.
-
Using ChefSpec
After watching this video; you will be able to use ChefSpec to test resources and recipes in a simulated Chef Client run.
-
Using Foodcritic
After watching this video; you will be able to use Foodcritic to find common syntax and best practices' problems in your cookbooks.
-
Using GitHub
After watching this video; you will be able to recognize how the Chef community uses GitHub to share code and collaborate on projects.
-
Using LDAP
After watching this video; you will be able to recognize how Chef will allow users to login with their network credentials (LDAP).
-
Using Test Kitchen for Workflow
After watching this video; you will be able to use Test Kitchen as a test harness tool for your workflow.
-
Verifying Installation with Command Line Utilities
After watching this video; you will be able to verify successful installation of Chef Analytics by using command line utilities.
-
Working with Configuration Files
After watching this video; you will be able to use and deploy configuration files on the Chef Analytics server.
-
Working with Configuration Files/Packages
After watching this video; you will be able to use configuration files and packages in a Chef installation.
-
Aligning Teams Using Confluence
After watching this video; you will be able to use Confluence for parallel team management.
-
Application Deployment using DevOps
After watching this video; you will be able to perform application builds and deployments using the DevOps methodology.
-
Brief History of the Traditional SDLC
After watching this video; you will be able to recognize the patterns and evolution of a traditional SDLC; and how DevOps grew out of it.
-
Creating Storage and Databases
After watching this video; you will be able to use DevOps to create backends for your applications.
-
DevOps Acceptance and Usage
After watching this video; you will be able to list the major users of DevOps and describe reasons for its acceptance and adoption.
-
Factors Driving DevOps Acceptance
After watching this video; you will be able to identify the factors involved in the widespread acceptance of the DevOps methodology.
-
Hardware Provisioning
After watching this video; you will be able to describe how DevOps is used to replace traditional hardware provisioning tasks.
-
Introduction to the DevOps Workflow
After watching this video; you will be able to describe the DevOps workflow.
-
Managing Cross-Platform Development with DevOps
After watching this video; you will be able to describe how DevOps is used to manage cross-platform development issues.
-
New Challenges of the DevOps Methodology
After watching this video; you will be able to name the challenges created by the adoption of the DevOps methodology.
-
Operations
After watching this video; you will be able to compare traditional operations tasks with DevOps.
-
Problems Solved by Using DevOps
After watching this video; you will be able to compare the traditional SDLC with DevOps and recognize how DevOps is used to solve software development problems.
-
Providing Security
After watching this video; you will be able to configure application security through DevOps.
-
QA and User Acceptance Testing
After watching this video; you will be able to distinguish between the DevOps stages of quality assurance and user acceptance.
-
Requirement Gathering with DevOps
After watching this video; you will be able to identify how DevOps is used when gathering software requirements.
-
Rethinking the SDLC with DevOps
After watching this video; you will be able to describe how DevOps can be used to replace the traditional SDLC.
-
Set up DevOps processes and tools
After watching this video; you will be able to describe the software development life cycle within an organization and be able to recommend DevOps processes and tools.
-
Sharing Code with Bitbucket
After watching this video; you will be able to use Bitbucket for code sharing and versioning.
-
Sharing Software Issues with JIRA
After watching this video; you will be able to describe how JIRA is used to log and share software issues.
-
The DevOps Development Cycle
After watching this video; you will be able to recognize how DevOps changes the way software is developed.
-
The First Step in the DevOps Methodology
After watching this video; you will be able to describe the DevOps structure and methodology.
-
Using DevOps for Maintenance and Release Scheduling
After watching this video; you will be able to define the steps for DevOps software releases and maintenance scheduling and recognize DevOps release tools such as Jenkins.
-
Using GitHub for Collaboration
After watching this video; you will be able to specify how collaboration occurs with GitHub.
-
Using HipChat for Distributed Team Management
After watching this video; you will be able to describe how HipChat is used to manage geographically separated teams.
-
Building an Apache Image
After watching this video; you will be able to install the fedora-dockerfiles package to get the Dockerfiles .
-
Accessing Firefox from a Container
After watching this video; you will be able to create a Docker container that just runs Firefox.
-
Allowing Rights to Host Mounted Volumes
After watching this video; you will be able to describe how to allow a nonprivileged volume access to host files from a container.
-
Basic Concepts of Docker Machine
After watching this video; you will be able to describe how the Docker machine creates Docker hosts on your computer or data center.
-
Binding Docker Container Ports to the Host
After watching this video; you will be able to describe how to configure containers to accept incoming connections.
-
Building a Container Interactively
After watching this video; you will be able to use Docker commands to run an interactive shell.
-
Building a Container Using a Dockerfile
After watching this video; you will be able to create a Dockerfile that layers on the server and the site content in a single build.
-
Building from Basic Volumes
After watching this video; you will be able to run Docker inspect to examine volume configuration.
-
Building Images Using a Dockerfile
After watching this video; you will be able to create Docker images using a Dockerfile.
-
Command Line Options in Docker
After watching this video; you will be able to list the Docker network-related command line options.
-
Communication Between Containers and Outside World
After watching this video; you will be able to recognize whether a container can communicate to the outside world.
-
Communication Between Two Containers
After watching this video; you will be able to describe how the communication between two containers is governed at the operating system level.
-
Configuring PaaS with OpenShift Origin
After watching this video; you will be able to use Docker with OpenShift Origin to configure Platform as a Service.
-
Creating an Account on Docker Hub
After watching this video; you will be able to describe the various steps to create an account on Docker Hub.
-
Creating an Image from a Container
After watching this video; you will be able to define the process of creating a Docker image from an existing container.
-
Dockerizing a Riak Service
After watching this video; you will be able to create a docker image with a preinstalled Riak.
-
Dockerizing an SSH Service
After watching this video; you will be able to create an SSH service in a docker container.
-
Examining Image History
After watching this video; you will be able to use the docker history command to find all the intermediate image layers.
-
Gaining Access to Volumes
After watching this video; you will be able to describe the methods and the attributes to gain access to volumes.
-
Handling IPv4 and IPv6 Addressing
After watching this video; you will be able to describe how Docker handles IPv4 and IPv6 addressing.
-
Importing; Deleting; and Exporting Images
After watching this video; you will be able to distinguish between the Docker commands when performing image maintenance.
-
Installing a Docker Machine using VirtualBox
After watching this video; you will be able to use the Docker machine to create; use; and manage a Docker host inside of VirtualBox.
-
Installing Multiple Machines on your Cloud Provider
After watching this video; you will be able to use the Docker machine to use the same interface to create hosts in local; virtual; or cloud platforms.
-
Methodologies of Image Layering
After watching this video; you will be able to summarize the different approaches to building Docker images.
-
Publishing an Image to the Registry
After watching this video; you will be able to apply the docker push command to push the image to the registry.
-
Removing Capabilities Inside Containers
After watching this video; you will be able to describe how Linux divides the privileges of the root user.
-
Running the Container Server
After watching this video; you will be able to list the steps to run the container server.
-
Sharing Namespaces Between the Container and Host
After watching this video; you will be able to share a namespace between two or more containers.
-
Using the Organization Owned Repository Access API
After watching this video; you will be able to use the Docker organization owned repository Access API.
-
Using the Organization Owned Repository Namespace
After watching this video; you will be able to use the Docker Organization Owned Repository Namespace API.
-
Using the User Owned Repository Access API
After watching this video; you will be able to use the Docker User Owned Repository Access API.
-
Containers; Layers; and Images
After watching this video; you will be able to recall the components and the steps in building Docker images.
-
Using Drone
After watching this video; you will be able to use drone to configure projects to automatically build; test; and deploy.
-
Using MongoDB and Docker
After watching this video; you will be able to create a Docker container for MongoDB.
-
Using NDP Proxying
After watching this video; you will be able to use NDP proxying to connect Docker containers to the Internet via IPv6.
-
Using SELinux to Configure Mandatory Access Control
After watching this video; you will be able to set up SELinux on CentOS/RHEL/Fedora systems.
-
Using Shippable and OpenShift
After watching this video; you will be able to use Shippable to perform CI/CD and then deploy it on Red Hat's OpenShift.
-
Using Switched/Routed Network Environment
After watching this video; you will be able to describe how Docker uses switched and routed network environments.
-
Using the DTR Accounts API
After watching this video; you will be able to use the Docker Trusted Registry Accounts API.
-
Using the DTR Repositories API
After watching this video; you will be able to use the Docker Trusted Registry Accounts Repositories API.
-
Using the DTR Teams API
After watching this video; you will be able to use the Docker Trusted Registry Teams API.
-
Using the Map Generator
After watching this video; you will be able to describe where to get files to create and write the map.
-
Using Pipework
After watching this video; you will be able to describe how to use Pipework for Docker container network configuration.
-
Creating a Stack with Volumes
After watching this video; you will be able to use the worker to bridge multiple servers together with volumes.
-
Using Different Drivers on your Docker Machine
After watching this video; you will be able to distinguish between the different drivers on the Docker machine and describe the tasks they perform.
-
Using Docker Machine Commands
After watching this video; you will be able to describe the Docker machine commands and how they are used.
-
Configuring the Web Server
After watching this video; you will be able to analyze how a deployed web server is configured and built.
-
Building a WordPress Image
After watching this video; you will be able to run an application that requires running multiple services simultaneously.
-
Building and Deploying an Application on OpenShift
After watching this video; you will be able to describe how OpenShift triggers the Docker build and how to supply to the Docker context to build images.
-
Create an Advanced Docker Deployment
After watching this video; you will be able to use Docker to create a complex deployment using IP addressing; security; and DTR APIs.
-
Create and Layer an Image
After watching this video; you will be able to use Docker to create and layer an image.
-
.NET Source Code Cloning
After watching this video; you will be able to define build parameters and clone .NET source code from GIT.
-
.NET Source Control
After watching this video; you will be able to configure .NET to work with Git.
-
Advanced Build Triggers
After watching this video; you will be able to apply Build Triggers in Jenkins to automate the build process.
-
Advanced Parameterized Builds
After watching this video; you will be able to use advanced parameter scripts and advanced parameter types in your Jenkins builds.
-
Advanced Version Control Techniques
After watching this video; you will be able to configure Git and Jenkins to automate builds and source code integration.
-
Android Builds with Jenkins
After watching this video; you will be able to use Jenkins to run an Android build.
-
Automating and Scheduling
After watching this video; you will be able to describe how testing can be scheduled and automated.
-
Automating Code Backups
After watching this video; you will be able to describe how to make code backups more lightweight through backup automation.
-
Bug Tracker Integration
After watching this video; you will be able to identify how Jenkins integrates with issue/bug trackers such as Bugzilla and Jira.
-
Build Pipelines and Promotions
After watching this video; you will be able to describe the build pipeline and how software is promoted.
-
Build Tool Configuration
After watching this video; you will be able to use Jenkins to configure Ant and Maven.
-
Build Triggers and .NET
After watching this video; you will be able to add a GIT trigger to initiate a build on Jenkins upon every code push.
-
Building a .NET Project
After watching this video; you will be able to create Jenkins build jobs and build a .NET project.
-
Building Advanced Jenkins Freestyle Jobs
After watching this video; you will be able to recall the steps required for creating and executing Jenkins freestyle jobs with advanced project options.
-
Building Android Projects
After watching this video; you will be able to identify the prerequisites when creating an Android Jenkins build job.
-
Continuous Integration vs. Continuous Delivery
After watching this video; you will be able to distinguish between the DevOps processes of continuous integration and continuous delivery.
-
Coordinating Builds
After watching this video; you will be able to identify how Jenkins coordinates builds when build order is important.
-
Create a .NET project managed by Jenkins
After watching this video; you will be able to use .NET plugins to continuously integrate code through Jenkins.
-
Create and Automate a Jenkins Job
After watching this video; you will be able to use Ant in collaboration with Jenkins to build and integrate a Java application.
-
Creating Ant Jobs
After watching this video; you will be able to write Jenkins jobs using Apache Ant script.
-
Creating Maven Jobs
After watching this video; you will be able to write Jenkins jobs using the Maven build automation tool.
-
DevOps Testing Types
After watching this video; you will be able to review testing steps and write unit; integration; and user acceptance tests.
-
Disk Space Management
After watching this video; you will be able to use the Jenkins disk usage plugin to monitor disk space.
-
E-mail Notifications
After watching this video; you will be able to configure Jenkins to send e-mail notifications.
-
Installing and Configuring Selenium
After watching this video; you will be able to configure Selenium within Jenkins.
-
Instant Messaging
After watching this video; you will be able to configure Jenkins to send instant messages with Jabber.
-
Jenkins Alternatives
After watching this video; you will be able to review the features of other continuous integration tools such as TeamCity; TFS; and Bamboo.
-
Jenkins Builds and the Cloud
After watching this video; you will be able to describe how Jenkins can be integrated into cloud applications.
-
Jenkins Configuration for .NET
After watching this video; you will be able to configure Jenkins to build .NET projects.
-
Jenkins Fingerprinting
After watching this video; you will be able to use fingerprinting to create an audit trail for your artifacts.
-
Jenkins Installation Options
After watching this video; you will be able to summarize the installation and configuration steps and describe different platform considerations.
-
Jenkins Integration
After watching this video; you will be able to use Jenkins support for Windows; Java; and continuous deployment tools.
-
Jenkins Plugins for Android
After watching this video; you will be able to use Jenkins plugins for the configuration of Android projects.
-
Jenkins Web Packages
After watching this video; you will be able to work with Jenkins to build web packages and deploy them on an IIS Server.
-
Monitoring the Server Load
After watching this video; you will be able to identify techniques used to monitor CPU and memory usage on the server.
-
Multiconfiguration Builds
After watching this video; you will be able to identify how Jenkins handles builds with complicated configurations.
-
Pipeline Visualization
After watching this video; you will be able to use the pipeline visualization to visualize how Jenkins will verify your change.
-
Plugin Management
After watching this video; you will be able to identify how Jenkins plugins are maintained and updated.
-
Running a .NET Application
After watching this video; you will be able to run a deployed .NET application for product verification.
-
Setting Up Master and Slave Machines
After watching this video; you will be able to create a Jenkins continuous integration topology with Jenkins master and slave machines.
-
SMS Notifications
After watching this video; you will be able to configure Jenkins to send text message notifications.
-
Testing Tool Integration
After watching this video; you will be able to discuss how to integrate external build/test tools in Jenkins.
-
The Android SDK
After watching this video; you will be able to list the steps for installing the Android SDK.
-
The Validated Merge Feature
After watching this video; you will be able to use validated merging to make a Jenkins build unbreakable.
-
Third-party Plugins for Android
After watching this video; you will be able to list other useful third-party Jenkins plugins for Android builds.
-
Unit Testing .NET Code
After watching this video; you will be able to identify unit testing techniques when working with .NET code.
-
Using Jenkins and Selenium
After watching this video; you will be able to identify how Selenium can be used to test code within Jenkins.
-
Writing Build Scripts
After watching this video; you will be able to use Jenkins to execute command line and shell scripts.
-
Creating a Business Process Report
After watching this video; you will be able to convert a Vuser script to a business process report.
-
Creating a Parameter
After watching this video; you will be able to describe the purpose of parameters and parameter types; and create a parameter for a value in a Vuser script.
-
Creating a Vuser Script
After watching this video; you will be able to create a Vuser script.
-
Debugging a Vuser Script
After watching this video; you will be able to troubleshoot replay problems for a Vuser script.
-
Exploring VuGen
After watching this video; you will be able to describe the purpose of VuGen and the VuGen interface.
-
Including Rendezvous Points
After watching this video; you will be able to describe the purpose of rendezvous points and include them in Vuser scripts.
-
Inserting Steps in a Vuser Script
After watching this video; you will be able to describe the purpose and types of steps and insert steps into a Vuser script.
-
Inserting Transactions
After watching this video; you will be able to describe; insert; and display transactions in a Vuser script.
-
Installing LoadRunner
After watching this video; you will be able to install LoadRunner components.
-
Overview of LoadRunner
After watching this video; you will be able to describe the features of LoadRunner.
-
Overview of Performance Testing
After watching this video; you will be able to describe performance testing.
-
Planning for a Load Test
After watching this video; you will be able to plan for a load test.
-
Recording a Vuser Script
After watching this video; you will be able to record a Vuser script.
-
Replaying a Vuser Script
After watching this video; you will be able to replay a Vuser script.
-
Using the Protocol Advisor
After watching this video; you will be able to use the Protocol Advisor to find the most suitable protocol for a Vuser script.
-
Viewing and Saving Vuser Scripts
After watching this video; you will be able to view Vuser scripts in VuGen.
-
Viewing Test Results
After watching this video; you will be able to view; filter; and print test results.
-
Vuser Types; Protocols; and Script Development
After watching this video; you will be able to describe Vuser types; protocols; and steps in Vuser script development.
-
Working with Snapshots
After watching this video; you will be able to work with snapshots and add a text check for a Vuser script from a snapshot.
-
Accessing Facts by Using Puppet Code
After watching this video; you will be able to use Puppet code to access facts.
-
Applying Control Branching Statements
After watching this video; you will be able to apply control branching statements of Puppet.
-
Basics of Hiera
After watching this video; you will be able to recognize the problems and issues that can be fixed by Hiera.
-
Communicating Over the Network
After watching this video; you will be able to describe how Puppet Apply communicates over the network and uses local collections of modules.
-
Comparing the Functionality of Puppet and Vagrant
After watching this video; you will be able to distinguish the functionality of Puppet from Vagrant.
-
Configure and Schedule a Puppet Agent
After watching this video; you will be able to create a cron job that will execute a Puppet agent.
-
Configuring External SSL Termination
After watching this video; you will be able to describe the steps needed to configure external SSL termination on the Puppet server.
-
Configuring Hiera
After watching this video; you will be able to describe the Hiera global configuration settings and how configuration files are resolved at runtime.
-
Create Vagrant VMs Provisioned with Puppet
After watching this video; you will be able to create Vagrant virtual machines that will be provisioned by a Puppet manifest.
-
Creating a Puppet Manifest
After watching this video; you will be able to prepare a Puppet manifest to be deployed on Vagrant-created virtual machines.
-
Creating a Puppet Module Extrapolated by Hiera
After watching this video; you will be able to create a Puppet module that will be extrapolated by Hiera.
-
Creating Custom Reports in Ruby
After watching this video; you will be able to create a custom report in Ruby and include it in a Puppet module.
-
Developing a Module and Deploying it on Puppet Forge
After watching this video; you will be able to develop a module and deploy it on Puppet Forge.
-
Diving Deep into the Agent/Master Communication
After watching this video; you will be able to describe the communication between Puppet master and Puppet agent in detail.
-
Executing Main Manifest
After watching this video; you will be able to describe how the Puppet agent executes its main manifest.
-
Executing Puppet Agent as a Scheduled cron Job
After watching this video; you will be able to execute Puppet Agent on Linux machines as a scheduled cron job.
-
Executing Puppet Agent as a Service
After watching this video; you will be able to execute Puppet agent as a service.
-
External CA Support
After watching this video; you will be able to compare the different options when configuring an external CA.
-
Functionality and Features of Puppet Apply
After watching this video; you will be able to describe the functionality of Puppet apply and its features.
-
Generating Reports and Analyzing YAML
After watching this video; you will be able to use the internal report handlers to generate reports; and analyze YAML.
-
Handling Reporting and Logging
After watching this video; you will be able to discuss how Puppet Apply handles logging and report handling.
-
Identifying Configuration Issues While Logging
After watching this video; you will be able to describe how Puppet agent performs logging; and identify logging configuration issues.
-
Installing and Removing RubyGems
After watching this video; you will be able to recall the role of Ruby; and install and remove RubyGems.
-
Installing and Uninstalling Modules
After watching this video; you will be able to use the Puppet module installation tool to install and uninstall modules.
-
Installing Hiera
After watching this video; you will be able to install Hiera from a package or a gem; and install Puppet functions.
-
Installing Puppet Server
After watching this video; you will be able to install Puppet Server.
-
Managing File Resources
After watching this video; you will be able to use Puppet's file resource type to manage folders and files.
-
Managing Package Resources
After watching this video; you will be able to use Puppet’s package resource type to manage software packages.
-
Managing Service Resources
After watching this video; you will be able to use Puppet to manage operating system services.
-
Managing User Resources
After watching this video; you will be able to use Puppet's group and user resource types to manage group and user accounts.
-
Puppet Scaling Issues
After watching this video; you will be able to describe how Puppet scales as the number of nodes grow.
-
Reviewing Best Practices and Writing Modules
After watching this video; you will be able to review the best practices in module design and write modules using the module generator.
-
Reviewing the Configuration Steps
After watching this video; you will be able to review the configuration steps and describe the contents of each major configuration file.
-
Reviewing the Puppet Topology
After watching this video; you will be able to distinguish between the roles of Puppet Server; Puppet master; Puppet agent; and Puppet apply.
-
Runtime Environment of the Puppet Server
After watching this video; you will be able to summarize the role of the Puppet Server and describe its relationship with Puppet master.
-
Setting Up Names and Certificates
After watching this video; you will be able to set up initial certificate and domain name for a Puppet Server installation.
-
Starting Puppet Agent by Using the CLI
After watching this video; you will be able to use the command line to start Puppet agent and interpret command line messages.
-
The Agent/Master Certificate Process
After watching this video; you will be able to describe the certificate signing process between Puppet master and Puppet agent in detail.
-
Types of Variables
After watching this video; you will be able to describe the types of variables used within Puppet.
-
Understanding Node Definitions
After watching this video; you will be able to write Puppet code to apply specific configurations to specific nodes.
-
Understanding the Run Environment of Puppet Apply
After watching this video; you will be able to describe Puppet apply's run environment and execute the main manifest.
-
Understanding the Start Options for Puppet Agent
After watching this video; you will be able to list the start options for Puppet agent and describe their functionality.
-
Using Certificates from an Existing External CA
After watching this video; you will be able to describe how Puppet Server can be configured to use certificates from an existing external CA.
-
Using Modules and Plugins
After watching this video; you will be able to use modules and plugins to enhance and extend the functionality of Puppet.
-
Using Puppet and Hiera Together
After watching this video; you will be able to use Hiera and Puppet together.
-
Using Puppet Apply to Manage Systems
After watching this video; you will be able to execute the Puppet resource command to set up a Puppet apply cron job.
-
Using Puppet for Provisioning
After watching this video; you will be able to modify Vagrant configuration to use Puppet for provisioning.
-
Using the New Report Format
After watching this video; you will be able to distinguish between older report formats and the new report format.
-
Virtualization and Provisioning
After watching this video; you will be able to run Vagrant to create virtual machines provisioned by Puppet.
-
Working on Scheduled Tasks
After watching this video; you will be able to use Puppet to edit; create; and delete a scheduled task.
-
Writing and Calling Built-in and Custom Functions
After watching this video; you will be able to write and call built-in and custom functions.
-
Accessing a Docker Daemon
After watching this video; you will be able to list the steps and commands to access a Docker daemon.
-
Adding Labels to Image
After watching this video; you will be able to describe steps to add labels to an image.
-
Adjust Memory
After watching this video; you will be able to configure memory for Docker.
-
Affinity Filters
After watching this video; you will be able to list the steps to configure an affinity filter.
-
Backup and Restore Data
After watching this video; you will be able to identify the steps to back up and restore data.
-
Basic Docker Architecture
After watching this video; you will be able to describe Docker architecture.
-
Basic Docker Commands
After watching this video; you will be able to identify the syntax and version of a Docker command.
-
BinPack Strategy
After watching this video; you will be able to use BinPack strategy to choose a Docker node in a cluster.
-
Building and Running an App in Docker Compose
After watching this video; you will be able to build and run an application in Docker Compose.
-
Configure Data Volumes
After watching this video; you will be able to identify the steps to configure data volumes.
-
Connecting Containers through Naming
After watching this video; you will be able to identify the steps to link containers by referencing through names.
-
Constraint Filters
After watching this video; you will be able to list the steps to configure a constraint filter.
-
Control Groups
After watching this video; you will be able to identify the use of control groups in Docker.
-
Create a Data Label
After watching this video; you will be able to implement steps to create a data label.
-
Creating a Docker Group
After watching this video; you will be able to create a docker group.
-
Daemonizing a Docker Container
After watching this video; you will be able to list the steps to daemonize a Docker container.
-
Data Volume Containers
After watching this video; you will be able to list the steps to create a data volume container to share data between containers.
-
Data Volumes
After watching this video; you will be able to identify the step to list available Docker images.
-
Define Services in Docker Compose
After watching this video; you will be able to build a .yml file for defining Docker services.
-
Dependency and Health Filters
After watching this video; you will be able to list the steps to configure a dependency and health filter.
-
Discovery Service
After watching this video; you will be able to work with discovery services and list the different approaches.
-
DNS Server
After watching this video; you will be able to configure DNS for Docker.
-
Docker Client Commands
After watching this video; you will be able to identify Docker client commands and usage.
-
Docker Image in Compose
After watching this video; you will be able to describe how to build a Dockerfile for defining images.
-
Docker Internals
After watching this video; you will be able to identify internal components on which Docker is based.
-
Docker versus Virtual Machines
After watching this video; you will be able to compare Docker with virtual machine deployments.
-
Enable UFW Forwarding
After watching this video; you will be able to configure UFW forwarding in Docker.
-
Environmental Variables
After watching this video; you will be able to use environmental variables to link containers.
-
Features of Dockerization
After watching this video; you will be able to identify the features of a Dockerized application.
-
Filters and Types
After watching this video; you will be able to describe the need for filters and its various types.
-
Finding Docker Images
After watching this video; you will be able to list the steps to search for Docker images.
-
Installing Compose
After watching this video; you will be able to describe the steps to install Compose in Docker.
-
Installing Docker on CentOS
After watching this video; you will be able to install a Docker package on CentOS 6.5.
-
Installing Docker on Ubuntu
After watching this video; you will be able to install Docker on Ubuntu.
-
Introduction to Docker
After watching this video; you will be able to describe Docker and the problem it solves.
-
Listing Docker Images
After watching this video; you will be able to identify the step to list available Docker images.
-
Listing Environment Variables
After watching this video; you will be able to list available environment variables and its impact on etc/hosts file.
-
Namespaces
After watching this video; you will be able to identify the use of namespaces in Docker.
-
Naming and Inspecting the Container
After watching this video; you will be able to use commands to name and inspect config details in JSON.
-
Need for Custom Metadata
After watching this video; you will be able to identify the need for custom metadata in Docker.
-
Need for Docker
After watching this video; you will be able to describe the uses of Docker.
-
Network Port Mapping
After watching this video; you will be able to identify the use of the -p and -d flags to control port access.
-
Port Filters
After watching this video; you will be able to list the steps to configure a port filter.
-
Prerequisites to Install Docker on CentOS
After watching this video; you will be able to describe CentOS version and kernel support.
-
Prerequisites to Install Docker on Ubuntu
After watching this video; you will be able to verify minimum requirements for Ubuntu.
-
Pulling a Docker Image
After watching this video; you will be able to list the steps to pull a Docker image.
-
Pushing and Removing Images from Host
After watching this video; you will be able to list the steps to push and remove an image from the host or registry.
-
Query Labels
After watching this video; you will be able to describe steps to filter images by label.
-
Reviewing the Application Container
After watching this video; you will be able to describe container and port details.
-
Running a Sample Docker Container
After watching this video; you will be able to use the run command to spawn a Docker container.
-
Running an Application in Docker
After watching this video; you will be able to describe the command to execute an application in Docker.
-
Running an Interactive Docker Container
After watching this video; you will be able to list the steps to spawn an interactive Docker container.
-
Setting up Swarm Nodes
After watching this video; you will be able to list the steps to set up swarm nodes for clustering.
-
Spread Strategy
After watching this video; you will be able to use spread strategy to choose a Docker node in a cluster.
-
Steps to Access and Work with an Ubuntu Image
After watching this video; you will be able to list the steps to access; interact; and see results from a command executed on an image from a local or remote registry.
-
Storing Structured Data in Labels
After watching this video; you will be able to describe how different types of data can be stored in labels.
-
Templating of Docker Images
After watching this video; you will be able to describe the process of templating an image.
-
Understanding Clustering Basics and Prerequisites
After watching this video; you will be able to identify the need for clustering Docker hosts and prerequisites for Swarm.
-
Understanding Docker Compose
After watching this video; you will be able to identity the need for Docker Compose tool for defining and running applications.
-
Understanding Swarm Strategies
After watching this video; you will be able to identify the need for swarm strategies and list different types of strategies.
-
Understanding the Docker Container
After watching this video; you will be able to run and interact with a Docker container.
-
Union Systems
After watching this video; you will be able to identify the use of union systems in Docker.
-
Update; Create; and Commit Docker Images
After watching this video; you will be able to list the steps to update; create; and commit a Docker image.
-
CLI to Manage Nodes
After watching this video; you will be able to use commands to access and list nodes.
-
Verifying Docker Daemon
After watching this video; you will be able to start and verify Docker daemon in CentOS.
-
Implement a Strategy to Update a Docker Image
After watching this video; you will be able to define steps to edit an Ubuntu image for adding a command to it.
-
A Comprehensive Example
After watching this video; you will be able to work with an end-to-end example of a Puppet task.
-
Basic Puppet Architecture
After watching this video; you will be able to identify the different components of the Puppet architecture.
-
Catalog(s)
After watching this video; you will be able to describe how Puppet uses catalogs.
-
Classes
After watching this video; you will be able to describe what a Puppet class is; and how it is used.
-
Common Puppet Runtime Failures
After watching this video; you will be able to describe common runtime failures.
-
Configuring SSH
After watching this video; you will be able to identify how Puppet uses SSH.
-
Define a Puppet Implementation Strategy
After watching this video; you will be able to define prerequirements for a Puppet installation on a local machine.
-
Deploying Directory Trees
After watching this video; you will be able to recognize and deploy file tree structures.
-
Distributing SSH keys
After watching this video; you will be able to describe how SSH keys are distributed in a Puppet installation.
-
Executing Puppet Commands
After watching this video; you will be able to identify the major Puppet commands and how to execute them.
-
Expression Substitution
After watching this video; you will be able to recognize how to substitute expressions .
-
Flow of Control Statements
After watching this video; you will be able to describe the syntax of flow of control statements.
-
General Installation Requirements and Considerations
After watching this video; you will be able to list the general installation requirements of Puppet.
-
Grouping Resources Together in a Manifesto
After watching this video; you will be able to identify the different methods in grouping resources within a manifest.
-
Handling Puppet Resource Dependencies
After watching this video; you will be able to identify Puppet resources and handing their dependencies.
-
Introduction to Puppet
After watching this video; you will be able to describe Puppet and the problems it solves.
-
Linux Installation (Master/Agent)
After watching this video; you will be able to install Puppet on a Linux system.
-
Managing Puppet Configuration Files
After watching this video; you will be able to identify the contents of a Puppet configuration file and how to manage it.
-
Manifest Concepts
After watching this video; you will be able to describe from a conceptual level how Puppet uses manifests.
-
Market Acceptance of Puppet and Industry Applications
After watching this video; you will be able to identify organizations who use Puppet and how Puppet is integrated into their DevOps methodology.
-
Network vs. Cloud Puppet Implementations
After watching this video; you will be able to distinguish between cloud and network installations.
-
Node Configuration
After watching this video; you will be able to work with configuring nodes to add hosts to a Puppet setup.
-
Open Source
After watching this video; you will be able to describe the features of open source Puppet.
-
Operators
After watching this video; you will be able to use program operators in Puppet.
-
Overview of Predefined Resources
After watching this video; you will be able to describe the predefined Puppet resources and how they are used.
-
Package Coding and Management
After watching this video; you will be able to describe how coding is performed in Puppet and how it is managed.
-
Plan a Puppet Implementation
After watching this video; you will be able to establish a configuration management solution using Puppet.
-
Printing Messages
After watching this video; you will be able to identify how to print messages.
-
Puppet Enterprise (PE)
After watching this video; you will be able to identify the uses and features of Puppet Enterprise (PE).
-
Puppet Forge
After watching this video; you will be able to recognize how to use Puppet Forge to create and share Puppet modules.
-
Puppet Modes
After watching this video; you will be able to describe the different Puppet modes.
-
Puppet Monitoring
After watching this video; you will be able to work with different methods of monitoring Puppet.
-
Puppet Versions
After watching this video; you will be able to recognize the different versions of Puppet and their features.
-
Puppet vs. Other DevOps Configuration Management Tools
After watching this video; you will be able to compare Puppet with other DevOps configuration management tools.
-
Service Management
After watching this video; you will be able to describe the basic core concepts of Puppet service management and the related vocabulary.
-
Starting and Stopping Puppet
After watching this video; you will be able to list the steps needed to start and stop Puppet.
-
The Package-File-Service Pattern
After watching this video; you will be able to identify the Package-File-Service pattern and how it is used in Puppet development.
-
Types of Puppet Reports and Summaries
After watching this video; you will be able to work with different kinds of Puppet Reports.
-
Understanding Core Concepts of Puppet
After watching this video; you will be able to describe the basic core functional concepts of Puppet and the related vocabulary.
-
Understanding Puppet Nodes
After watching this video; you will be able to describe the basic functionality of Puppet nodes and recognize how they are used.
-
User Account Management
After watching this video; you will be able to distinguish between and manage user account.
-
Using cron Resources to Run Scheduled Jobs
After watching this video; you will be able to work with cron resources to run scheduled jobs.
-
Using Declarative and Readable Puppet DSL
After watching this video; you will be able to use declarative; readable Puppet DSL (Domain Specific Language) to describe system resources and state.
-
Using exec Resources to Run Commands
After watching this video; you will be able to work with exec resources to run commands.
-
to Make Configuration Changes
After watching this video; you will be able to work with Puppet to make configuration changes on a machine.
-
Windows Installation Considerations
After watching this video; you will be able to describe how to install Puppet on the Windows operating system.
-
A Basic Plugin Example
After watching this video; you will be able to work with a basic Vagrant plugin.
-
Allowing SSH Access through SSH Sharing
After watching this video; you will be able to describe how Vagrant share allows remote SSH access to your Vagrant environment.
-
Automated Provisioner Basics
After watching this video; you will be able to describe the basics of automated provisioning.
-
Autostart Machines
After watching this video; you will be able to describe how machines are started and how to configure Vagrant to not start specific machines.
-
Basic Networking Usage
After watching this video; you will be able to describe basic networking usage in a Vagrant installation.
-
Basic Usage
After watching this video; you will be able to describe how Vagrant allows you to sync a folder on the host machine to the guest machine.
-
Basics of Plugin Development
After watching this video; you will be able to describe the basic skills and steps of Vagrant plugin development.
-
Basics of Plugins
After watching this video; you will be able to describe how to change and augment the behavior and functionality of Vagrant.
-
Benefits to Developers; Administrators; and Designers
After watching this video; you will be able to describe the core concepts of Vagrant and its benefits to developers; administrators; and designers.
-
Box Format
After watching this video; you will be able to describe how providers have a custom box format that affects how base boxes are made.
-
Box Management
After watching this video; you will be able to describe how Vagrant boxes are maintained.
-
Bridged Networking
After watching this video; you will be able to describe how a bridged network makes the machine appear as another physical device.
-
Configuring the Vagrant Environment
After watching this video; you will be able to configure the Vagrant environment.
-
Controlling Multiple Machines
After watching this video; you will be able to identify environments which contain multiple virtual machines and how Vagrant controls them.
-
Creating Boxes
After watching this video; you will be able to create a Vagrant Base box.
-
Custom Provider
After watching this video; you will be able to identify the steps needed to make your own custom providers.
-
Defining Multiple Machines
After watching this video; you will be able to describe how Vagrant uses Vagrantfile to define and control multiple guest machines.
-
Designating a Primary Machine
After watching this video; you will be able to recognize the different machine types and how to designate a primary machine.
-
Development Commands
After watching this video; you will be able to work with commands to manage Vagrant plugins.
-
Forwarded Ports
After watching this video; you will be able to describe how Vagrant allow you to access a port on your host machine and have all data forwarded.
-
Getting All the Components Up and Running
After watching this video; you will be able to describe how to get all Vagrant components up and running.
-
Host-only Networking
After watching this video; you will be able to describe how host-only networking is private to the virtual machines involved and the host machine.
-
HTTP Sharing
After watching this video; you will be able to describe how Vagrant uses HTTP sharing to create a URL that can be used by anyone.
-
Identify the Steps for Vagrant Install/Config
After watching this video; you will be able to list the steps in a Vagrant installation.
-
Installing and Using a Box
After watching this video; you will be able to install and use a box in an existing Vagrant installation.
-
NFS Support
After watching this video; you will be able to identify performance penalties and how NFS can speed up Vagrant operations.
-
Platform-specific Provisioning Issues
After watching this video; you will be able to describe platform-specific (Windows vs. Linux) provisioning issues.
-
Plugin Configuration Issues
After watching this video; you will be able to describe how to install and configure a Vagrant plugin.
-
Private Network
After watching this video; you will be able to identify the process in which Vagrant allows access to your guest machine by an address that is not publicly accessible from the internet.
-
Public Network
After watching this video; you will be able to describe how Vagrant allows public access to your machine.
-
Push Feature
After watching this video; you will be able to describe how the Vagrant Push feature allows you to deploy any application.
-
The box Command
After watching this video; you will be able to use the box command to manage; add; and remove boxes.
-
The connect Command
After watching this video; you will be able to use the connect command to access a static IP that can be used to communicate to the shared Vagrant environment.
-
The destroy Command
After watching this video; you will be able to use the destroy command to stop the running machine.
-
The global-status Command
After watching this video; you will be able to use the global-status command to retrieve the state of all active Vagrant environments on the system.
-
Usage of Boxes
After watching this video; you will be able to describe the different categories of Vagrant boxes and how they are used.
-
Uses of Vagrant
After watching this video; you will be able to describe Vagrant and its functionality.
-
Using Multiple Provisioners or No Provisioners
After watching this video; you will be able to work with multiple or no provisioners.
-
Using rsync on a Guest Machine
After watching this video; you will be able to describe how Vagrant can use rsync to synchronize a folder to the guest machine.
-
Using the SMB Synced Folder Type
After watching this video; you will be able to describe how Vagrant can use SMB to create a bi-directional synced folder between the Vagrant machine and the host machine.
-
Using the Vagrant Configuration File
After watching this video; you will be able to identify the different portions of the Vagrant configuration file (VagrantFile).
-
Using the Vagrant VirtualBox Provider
After watching this video; you will be able to identify the use of the Vagrant VirtualBox provider.
-
Connect
After watching this video; you will be able to describe how Vagrant can share every port in your Vagrant environment; not just SSH and HTTP.
-
Vagrant Alternatives
After watching this video; you will be able to compare Vagrant with other DevOps virtualization tools.
-
Vagrant Boxes
After watching this video; you will be able to describe the concepts behind Vagrant boxes.
-
Vagrant Environment Variables
After watching this video; you will be able to describe the Vagrant environment variables and how they are used in a Vagrant installation.
-
Vagrant Up
After watching this video; you will be able to describe the startup process of Vagrant.
-
Vagrant without VirtualBox
After watching this video; you will be able to identify how Vagrant is implemented in virtualization and how Vagrant works without VirtualBox.
-
Concepts and Setup
After watching this video; you will be able to describe the setup process and the supported provisioners.
-
Sharing Folders
After watching this video; you will be able to distinguish between the types of shared folders and VirtualBox shared folders.
-
Adding Components to a Plugin
After watching this video; you will be able to use Ruby to develop a custom Vagrant plugin.
-
Adding MySQL for Database Persistence
After watching this video; you will be able to list and apply the steps to add MySQL for database persistence.
-
Adding PHP to a LAMP Stack
After watching this video; you will be able to complete a LAMP stack by adding PHP.
-
Building and Running a Docker Container
After watching this video; you will be able to create and run a Docker container.
-
Configuring a Vagrant Ansible Provisioner
After watching this video; you will be able to configure a Vagrant Ansible provisioner to provision a virtual machine using Ansible playbooks.
-
Configuring a Vagrant Box Management Pipeline
After watching this video; you will be able to describe how to use Atlas to configure a Vagrant box management pipeline.
-
Configuring and Running the Push Process
After watching this video; you will be able to apply Vagrant Push and identify what steps are taking place in the Push process.
-
Create a VM and Use DigitalOcean
After watching this video; you will be able to create a VM and use DigitalOcean as the cloud provider.
-
Create and Deploy an Environment with Push
After watching this video; you will be able to create a virtual environment in Vagrant and use Vagrant Push.
-
Creating a Custom Box from an Existing Box
After watching this video; you will be able to create a custom Vagrant box from an existing one.
-
Creating a Custom Box from Scratch
After watching this video; you will be able to create a Vagrant custom box from scratch.
-
Creating a LAMP
After watching this video; you will be able to create a preconfigured LAMP stack to be deployed by Vagrant Push.
-
Creating and Uploading AWS AMIs
After watching this video; you will be able to describe how AWS AMI images are persisted within Atlas.
-
Creating Multimachine Environments
After watching this video; you will be able to use Vagrant to create multiple virtual machines with different providers.
-
Creating Vagrant Boxes with Packer
After watching this video; you will be able to use Packer to create Vagrant boxes.
-
Creating Virtual Linux Environments
After watching this video; you will be able to create Linux virtual environments with Vagrant.
-
Creating Virtual Machines on AWS EC2
After watching this video; you will be able to configure Vagrant to create virtual machines on Amazon Web Services EC2 and build out VMs in the cloud.
-
Defining Custom Vagrant Plugins
After watching this video; you will be able to define the role of custom Vagrant plugins and how they are developed and deployed.
-
Defining the Fundamentals of Packer
After watching this video; you will be able to define how Packer can be used to create images for platforms such as Amazon AWS and OpenStack.
-
Describing Custom Plugin Package and Deployment
After watching this video; you will be able to describe and apply the steps to correctly package and deploy a custom Vagrant plugin.
-
Describing Push Strategies
After watching this video; you will be able to define the role of Vagrant Push and list the four current types of push strategies.
-
Describing the Atlas Workflow for Enterprise
After watching this video; you will be able to describe how to use Atlas to rapidly deploy with a policy enforced and automated workflow.
-
Dynamically Allocating Memory
After watching this video; you will be able to recognize how Vagrant uses memory and configure the Vagrantfile to allocate memory dynamically.
-
Finding Vagrant Boxes
After watching this video; you will be able to describe how to find and use existing community Vagrant boxes.
-
Identifying Arguments and Environment Variables
After watching this video; you will be able to identify how environment variables and command line arguments can be used in the Vagrantfile.
-
Navigating through Multiple Machines
After watching this video; you will be able to identify the commands used when navigating through multiple virtual environments.
-
Provisioning a Docker Container
After watching this video; you will be able to describe how Vagrant can provision a Docker container.
-
Provisioning Nginx
After watching this video; you will be able to apply nginx to the LAMP stack for use with Vagrant shell provisioner.
-
Running a Docker Container
After watching this video; you will be able to run Vagrant and provision and run a Docker container.
-
Running Packer Builds
After watching this video; you will be able to describe Packer builds and how they are run within Atlas.
-
Sharing Boxes with Atlas
After watching this video; you will be able to describe the steps needed to configure a sharable Vagrant box.
-
Spinning Up Virtual Machine Clusters with Vagrant
After watching this video; you will be able to configure and run a Vagrant cluster along with VirtualBox.
-
Testing a Custom Plugin
After watching this video; you will be able to apply the steps to successfully test a custom Vagrant plugin.
-
Testing Custom Boxes
After watching this video; you will be able to describe the steps needed to test Vagrant custom boxes.
-
Uploading Vagrant Boxes
After watching this video; you will be able to describe the steps needed to upload both private and public Vagrant boxes.
-
Using Ansible to Configure Nodes
After watching this video; you will be able to use Ansible to configure nodes with Vagrant.
-
Using Chef Client and Server
After watching this video; you will be able to apply Vagrant configuration to nodes managed by Chef.
-
Using DigitalOcean as a Provider
After watching this video; you will be able to configure Vagrant to use DigitalOcean as a provider to use DigitalOcean droplets as development machines to deploy from Vagrant.
-
Using Puppet to Automate Configuration
After watching this video; you will be able to use Vagrant with Puppet to automate configuration tasks with recipes.
-
Using the Masterless Salt States
After watching this video; you will be able to use the Vagrant Salt provisioner to provision the guest virtual machine using masterless Salt states.
-
Using the Puppet Provisioner
After watching this video; you will be able to use the Vagrant Puppet apply provisioner to provision the guest machine using Puppet.
-
Using the Vagrant Azure Provider
After watching this video; you will be able to use the Vagrant Azure provider to create and deploy virtual machines to Microsoft Azure.
-
Using the Vagrant CFEngine Provisioner
After watching this video; you will be able to use the Vagrant CFEngine provisioner and provision the guest using CFEngine.
-
Using Unconfigured NICs
After watching this video; you will be able to identify unconfigured NICs and configure Vagrant to handle them.
-
Using Vagrant with the iOS
After watching this video; you will be able to configure and use Vagrant to provision on the Mac OS X.
-
Working with Multiple CPUs
After watching this video; you will be able to configure the Vagrant file to handle more than one CPU.
-
Working with the Vagrant Chef Provisioner
After watching this video; you will be able to use the Vagrant Chef Client provisioner to provision the guest machine using Chef.
-
Working with the Vagrant File Provisioner
After watching this video; you will be able to use the Vagrant file provisioner to upload a file or directory from a host computer to a guest machine.
-
Working with Vagrant and Rackspace Open Cloud
After watching this video; you will be able to use Vagrant to create virtual development machines on Rackspace open cloud.
-
Chef Analytics
After watching this video; you will be able to use Chef analytics to provide real-time visibility into what is occurring on the Chef server.
-
Chef Node
After watching this video; you will be able to describe the different kinds of Chef nodes.
-
Chef Node Attributes
After watching this video; you will be able to identify and retrieve Chef node attributes.
-
Chef Roles
After watching this video; you will be able to create and upload Chef roles.
-
Choosing the Correct Platform
After watching this video; you will be able to compare the different Chef platforms and decide on which one to use.
-
Cloud Based
After watching this video; you will be able to compare Chef's cloud-based functionality to traditional operating systems.
-
Creating a Node
After watching this video; you will be able to create a node to be managed by Chef.
-
Creating Cookbooks Using Knife
After watching this video; you will be able to identify how Chef uses Knife to create cookbooks.
-
Enforcing Policies
After watching this video; you will be able to identify how Chef determines in a configuration is out of policy; and how Chef reapplies policy to the desired state.
-
Hosted Enterprise Chef
After watching this video; you will be able to describe the features of hosted enterprise Chef.
-
Installation Steps
After watching this video; you will be able to recognize the different methods in installing Hosted Enterprise Chef.
-
Introduction to Chef Delivery
After watching this video; you will be able to use Chef Delivery to continuously deliver applications and infrastructure.
-
Open Source Chef
After watching this video; you will be able to distinguish between open source Chef and other Chef installations.
-
Other DevOps Configuration Tools
After watching this video; you will be able to identify other popular DevOps tools used for automated configuration management.
-
Overview of Chef
After watching this video; you will be able to describe Chef and how it is used for configuration management.
-
Set Up a Configuration Plan Using Chef
After watching this video; you will be able to work with Chef and create a per-environment runlist.
-
Specifying Runlists
After watching this video; you will be able to describe how Chef uses per-environment run-lists.
-
The Chef Development Kit
After watching this video; you will be able to use the Chef Development Kit and tools such as Test Kitchen; ChefSpec; and Foodcritic.
-
The Chef Vocabulary
After watching this video; you will be able to describe the terms used by Chef for performing automated configuration management.
-
Traditional Operating Systems
After watching this video; you will be able to describe how Chef functions and how it is supported in operating systems such as Linux and Windows.
-
Understanding Imperative Languages
After watching this video; you will be able to recognize that Chef uses an imperative language and distinguish between imperative and declarative languages.
-
Understanding Recipes and Cookbooks
After watching this video; you will be able to describe the contents of recipes and cookbook and how Chef used them when performing configuration.
-
Using Chef Solo
After watching this video; you will be able to describe how chef-solo works.
-
Using Enterprise Chef
After watching this video; you will be able to identify how Enterprise Chef runs and how it is used.
-
Using the Management Console
After watching this video; you will be able to use the Chef management console for the management of nodes; roles; data bags; environments; and cookbooks .
-
Verifying Client Installation
After watching this video; you will be able to work with the Chef Administrator's Workstation.
-
Rendering a Breadcrumb Trail Using MVC SiteMap Provider
In this video; Wesley Miller demonstrates how to use the MvcSiteMapProvider NuGet Package to render a breadcrumb trail in an ASP.NET MVC 4 Web Application view.
-
Set the Default Runlevel
In this video; Dan LaChance demonstrates how to configure the runlevel for a Linux system.
-
Adding and Managing AT Jobs
In Linux; AT jobs are used to schedule one time background tasks. In this video; Dan LaChance demonstrates how to add and manage AT jobs.
-
Adding and Removing Jobs from Configured Printer Queues
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to add and remove jobs from configured print queues in Linux.
-
Adding Cron Jobs
In Linux; cron jobs are background scheduled tasks that run on a recurrent basis. In this video; Dan LaChance demonstrates how to add cron jobs.
-
Adding; Modifying; and Removing Groups
In this video; Dan LaChance outlines the steps to add; modify; and delete groups from the Linux command line.
-
Adding; Modifying; and Removing Users
The administrator can manage user and group accounts and keep track of the user access to ensure data protection. In this video; Dan LaChance demonstrates how to add; modify; and remove user accounts in Linux.
-
Advanced Grouping of SQL select Results
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to group return results from the SQL select command.
-
Alert Users before Major System Events
In this video; Dan LaChance demonstrates how Linux command line tools can be used to send alert messages about system maintenance.
-
Allocating Filesystems and Swap Space
Linux installation and configuration is a multistep process; allowing customization based on requirements at every stage. In this video; Dan LaChance describes how to allocate filesystems to separate partitions or disks.
-
Alternative Message Transfer Agents
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance describes the alternative message transfer agent options in Linux.
-
Alternatives to Syslog
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance describes the Syslog daemons in Linux.
-
Auditing a System to Find SUID/SGID Files
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to find the special permission bits assigned to a file in Linux.
-
Change between Runlevels Including Single-User Mode
In this video; Dan LaChance explains how to configure a Linux system to boot in single-user mode.
-
Change Boot Targets
In this video; Dan LaChance demonstrates how to modify the Linux boot process to set a boot target.
-
Changing the Display Manager Greeting
In this video; Dan LaChance describes how to control the behavior and appearance of the LightDM; or lightweight Display Manager; greeter.
-
Changing the Priority of a Running Process
In this video; Dan LaChance outlines changing the priority of a running process in Linux.
-
Check Boot Events in the Log File
In this video; Dan LaChance outlines how to check Linux boot logs for events that occurred during the boot process using the dmesg command.
-
Conceptual Understanding of sysfs; udev; dbus
In this video; Dan LaChance explains the purpose and basic usage of sys; udev; and dbus virtual file systems.
-
Configuration of Basic TCP/IP Host Settings
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to configure the Transmission Control Protocol/Internet Protocol (TCP/IP) settings in Linux.
-
Configure Systems with Peripherals such as Keyboards
In this video; Dan LaChance demonstrates how to configure a Linux system using locally connected peripherals; such as a keyboard and mouse.
-
Configure Systems without External Peripherals
In this video; Dan LaChance explains how to configure a Linux system that is running headless or without an accessible keyboard or mouse.
-
Configuring Alternative Boot Locations
The Linux Boot Manager provides alternative boot locations and backup boot options. In this video; Dan LaChance describes how to configure the bootloader and use its features.
-
Configuring Anacron
Anacron scheduled jobs are designed to run daily; weekly; or monthly even if the system is turned off. In this video; Dan LaChance describes Anacron scheduled jobs in Linux.
-
Configuring and Using Sudo
After watching this video; you will be able to configure and use sudo.
-
Configuring and Using the GnuPG
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance discusses how to configure and use GnuPG.
-
Configuring and Using Visual Settings and Themes
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In an X Window System; you have many options to control how things appear on the screen. In this video; Dan LaChance demonstrates how to configure visual settings in Linux.
-
Configuring Automatic Mounting of Filesystems
In this video; Dan LaChance demonstrates how to configure automatic mounting of filesystems.
-
Configuring Basic Assistive Technologies
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. Assistive technologies refer to anything that makes an operating system easier to use. In this video; Dan LaChance discusses basic assistive technologies.
-
Configuring Basic NTP Settings
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to configure basic Network Time Protocol (NTP) settings in Linux.
-
Configuring CUPS for Local and Remote Printers
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to configure Common Unix Printing System (CUPS) for local and remote printers.
-
Configuring Disk Quotas
Linux allows a system administrator to limit the resources allocated to a user or group. In this video; Dan LaChance outlines the steps to configure disk quotas in Linux.
-
Configuring GRUB 2
In this video; Dan LaChance discusses the basic GRUB 2 boot loader configuration.
-
Configuring Keyboard Accessibility Settings
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. You can adjust the keyboard accessibility settings to make the keyboard faster and easier to use. In this video; Dan LaChance discusses some Linux keyboard accessibility options.
-
Configuring LightDM
Light Display Manager; or LightDM; is a configurable cross-desktop X display manager. In this video; Dan LaChance describes how to configure LightDM.
-
Configuring Local Name Resolution and Remote DNS
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to configure local name resolution and remote DNS name resolution.
-
Configuring Locale Settings and Environment Variables
Linux provides the ability set local time zone; date; and zone information. In this video; Dan LaChance demonstrates how to set localization settings and environment variables.
-
Configuring Network Interfaces
The CompTIA Linux + certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to work with network interfaces from the Linux command line.
-
Configuring the File Creation Mask
In this video; Dan LaChance demonstrates how to work with the Linux file creation mask.
-
Configuring the Routing Table
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to configure the Linux routing table.
-
Configuring the Syslog Daemon
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance describes how to configure the syslog daemon.
-
Configuring Timezone Settings and Environment Variables
In this video; Dan LaChance outlines the steps to configure timezone settings and environment variables.
-
Configuring Timezones
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to configure time zones in Linux.
-
Configuring User Access to Cron and AT Services
In this video; Dan LaChance outlines the steps to configure user access to Cron and AT services.
-
Configuring User Mountable Removable Filesystems
In this video; Dan LaChance provides an overview of how to configure user mountable removable filesystems.
-
Copying Multiple Files and Directories Recursively
In this video; Dan LaChance demonstrates how to copy multiple files and directories recursively from the command line.
-
Copying versus Linking files
In this video; Dan LaChance shows how to copy versus link files in Linux.
-
Copying; Moving; and Removing Directories Individually
In this video; Dan LaChance demonstrates how to copy; move; and remove directories in a Linux file system.
-
Copying; Moving; and Removing Files Individually
In this video; Dan LaChance demonstrates how to use shell commands to copy; move; and remove individual files in Linux.
-
Creating and Managing Special Purpose and Limited Accounts
Some Linux distributions have built-in user and group accounts that can be used by background services or daemons that need specialized permissions. In this video; Dan LaChance demonstrates how to create and manage special purpose and limited accounts in Linux.
-
Creating E-Mail Aliases
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to create e-mail aliases in Linux.
-
Creating File and Directory Links
The Linux filesystem supports both hard and soft directory links. In this video; Dan LaChance describes how to create file and directory links in Linux.
-
Creating Filesystems with mkfs
In this video; Dan LaChance outlines the steps to create filesystems by using the mkfs Linux command.
-
Creating Simple Regular Expressions
A regular expression; or regex; is a special text string for describing a desired search pattern. In this video; Dan LaChance explains how regular expressions are created and used in Linux.
-
Customizing the Partition Layout
In this video; Dan LaChance outlines the steps to configure disk partitions based on the intended use of the Linux system.
-
Decoding Syslog Messages
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to decode syslog messages in Linux.
-
Demonstrate Knowledge of the Boot Sequence
In this video; Dan LaChance describes the Linux boot sequence from the BIOS to boot completion.
-
Determine Hardware Resources for Devices
In this video; Dan LaChance demonstrates how to use Linux command line tools to display the hardware resources used by devices.
-
Determining Package Contents
In this video; Dan LaChance demonstrates how to get specific package information.
-
Determining Which Users Have Logged In to the System or Are Currently Logged In
The CompTIA Linux+ certifications;LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance describes how to determine which users have logged in to the system and which users are currently logged in.
-
Determining Which Users or Processes Have Opened Files
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance describes how to identify which users or processes have files opened in Linux.
-
Differences between Private and Public “Dotted Quad” IP Addresses
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance differentiates between public and private IP addresses in Linux.
-
Differentiate between Cold and Hot Plug Devices
In this video; Dan LaChance explains how Linux differentiates between cold and hot plug devices.
-
Differentiate between the Types of Mass Storage Devices
In this video; Dan LaChance explains the different types of mass storage devices Linux can access and how they appear in Linux.
-
Disabling Unused Network Services
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to disable unnecessary network services in Linux.
-
Discovering Open Ports on a System Using netstat
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to find open ports on a system using the netstat command in Linux.
-
Distinguishing between IPv4 and IPv6
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dal LaChance describes how to distinguish between Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6).
-
Enable and Disable Integrated Peripherals
In this video; Dan LaChance demonstrates how to use Linux commands to enable and disable integrated peripherals.
-
Exporting Shell Environment Variables
In this video; Dan LaChance explains how to work with Linux shell variables.
-
Features of IPv6
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance describes the features of Internet Protocol version 6 (IPv6) in Linux.
-
File Locations in the FHS
The Filesystem Hierarchy Standard; or FHS; is a standard for directory naming and use in the Linux operating system. In this video; Dan LaChance describes the correct locations for files under the FHS.
-
Finding Files
In this video; Dan LaChance demonstrates three different ways to find files in a Linux system.
-
Finding Packages
In this video; Dan LaChance describes how to find packages containing specific file names in Linux.
-
Finding Text in a Document with VI
In this video; Dan LaChance demonstrates how to find text in a document with the vi editor.
-
Fixing Simple Filesystem Problems
In this video; Dan LaChance describes how to fix simple filesystem problems.
-
How to Manage User and Group Information in Password and Group Databases
In this video; Dan LaChance demonstrates how to manage user and group information in password and group databases.
-
Identifying Hard and Soft Links
In this video; Dan LaChance demonstrates how to identify hard and soft links in the Linux file system.
-
Identifying Shared Libraries
Linux shared libraries are code files that can be used by multiple applications. In this video; Dan LaChance describes how to identify shared libraries.
-
Installing; Upgrading; and Uninstalling Packages Using YUM
In this video; Dan LaChance outlines the steps to install; upgrade; and uninstall packages by using YUM.
-
Inserting; Updating; and Deleting Data with SQL
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to insert; update; and delete data by using SQL.
-
Install and Configure the GRUB Legacy Boot Loader
In this video; Dan LaChance describes how to install and configure the GRUB legacy boot loader.
-
Installing; Upgrading; and Uninstalling Packages Using Aptitude
Aptitude is a package manager for Debian and Debian-based systems. In this video; Dan LaChance demonstrates how to manage software packages by using aptitude in Linux.
-
Installing; Upgrading; and Uninstalling Packages Using dpkg
In this video; Dan LaChance demonstrates how to use the debian package manager command to install; upgrade; and uninstall packages in Linux.
-
Installing; Upgrading; and Uninstalling Packages Using RPM
Red Hat Package Manager; or RPM; is a command line tool used to manage software in some Linux distributions. In this video; Dan LaChance demonstrates how to use RPM to install; reinstall; upgrade; and remove packages.
-
Introducing Job Priorities and the Default Priority
Process priorities are used by the system to determine when and for how long processes should run. In this video; Dan LaChance explains process priorities and how to view the priority of a running process.
-
Introducing Shadow Passwords
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance describes shadow passwords in Linux.
-
Introducing SQL and the select Statement
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance introduces SQL and demonstrates how to use the select statement to list records.
-
Introducing the Common TCP and UDP Ports
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance outlines the common Transfer Control Protocol (TCP) and User Datagram Protocol (UDP) ports.
-
Introducing the Major Features of UDP; TCP; and ICMP
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance describes the Transfer Control Protocol (TCP); User Datagram Protocol (UDP); and Internet Control Message Protocol (ICMP).
-
Introduction to Cron Jobs
Cron is a time-based job scheduler that has been available for a long time in UNIX and Linux. In this video; Dan LaChance discusses the files and basic configuration related to cron.
-
Introduction to LVM
The Linux Logical Volume Manager or LVM enables the Linux administrators to manage disks using logical volumes. In this video; Dan LaChance describes the use of LVM.
-
Introduction to Reiserfs and Btrfs
In this video; Dan LaChance discusses the reiser filesystem and the b-tree filesystem.
-
Introduction to the X Font Server
The Linux X font server allows an X server to use a separate machine over the network to render fonts. In this video; Dan LaChance discusses the Linux X font server.
-
Introduction to Upstart
In this video; Dan LaChance describes the Upstart boot process.
-
Introduction to XDM; KDM; and GDM
In this video; Dan LaChance describes Linux display managers.
-
Invoking Commands Inside and Outside the Defined Path
In this video; Dan LaChance demonstrates how to invoke commands inside and outside the defined path in a Linux file system.
-
List Various Hardware Information
In this video; Dan LaChance demonstrates how to perform commands in Linux to view various hardware information.
-
Loading Shared Libraries
In this video; Dan LaChance describes how to load shared library files.
-
Maintaining Skeleton Directories for New User Accounts
In this video Dan LaChance demonstrates how to maintain skeleton directories for new user accounts.
-
Managing File and Directory Permissions
In this video; Dan LaChance demonstrates how to manage file and directory permissions in Linux.
-
Managing Log Files with logrotate
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to manage log files with the logrotate command in Linux.
-
Managing MBR Partition Tables
A partition table is a map of all the drive partitions and where they are located on the drive. In this video; Dan LaChance demonstrates how to work with Master Boot Record (MBR) and GUID (GPT) partition disks from the command line and in the GUI.
-
Managing the Permissions and SUID Rights of Scripts
In this video; Dan LaChance describes how to manage permissions and SUID rights of scripts.
-
Managing the System Journal
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to manage the system journal in Linux.
-
Managing User Print Queues
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to manage the user print queues in Linux.
-
Manipulate USB Devices
In this video; Dan LaChance explains how to use Linux commands to view and manipulate USB devices.
-
Modifying Name Resolution Search order
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to modify the name resolution search order in Linux.
-
Monitoring Active Processes
In this video; Dan LaChance describes how to monitor active processes in Linux.
-
Monitoring Free Space and Inodes
In this video; Dan LaChance outlines the steps to monitor free space and inodes in Linux.
-
Mounting and Unmounting Filesystems
Filesystems must be mounted; or attached to the file hierarchy; to be used. In this video; Dan LaChance outlines the steps to perform mount and unmount operations on a Linux filesystem.
-
Network Masks and CIDR Notation
The CompTIA Linux + certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance describes subnetting and Classless Inter-Domain Routing (CIDR) notation.
-
Obtaining Package Information
In this video; Dan LaChance describes how to use tools to obtain information about installed software packages.
-
Obtaining RPM Package Information
In this video; Dan LaChance demonstrates how to obtain the package information for the installed RPM packages.
-
Opening and Navigating a Document
The vi text editor is used to create and edit plain text documents or configuration files in Linux. In this video; Dan LaChance demonstrates how use the vi text editor to open; and navigate through a document without using a GUI interface.
-
OpenSSH2 Server Host Keys
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance describes the meaning of SSH server host key files.
-
Performing Basic OpenSSH2 Configuration and Usage
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance discusses how to configure a secure shell (SSH) for secure remote access on a Linux system.
-
Performing Basic Text Transformations Using sed
In this video; Dan LaChance describes how to use the sed command to edit the contents of a text file in Linux.
-
Performing Conditional Mailing to the Superuser
In this video; Dan LaChance demonstrates how to perform conditional mailing to the superuser by using a Linux shell script.
-
Permissions Overview
Linux allows system administrators to protect data by managing permissions to specific files and directories. In this video; Dan LaChance discusses the file and directory permissions system in Linux.
-
Properly Terminate Processes
In this video; Dan LaChance demonstrates how to terminate running processes safely in the Linux command line.
-
Provide Common Commands to the Boot Loader
In this video; Dan LaChance describes how to pass commands to the boot loader to affect the boot process in Linux.
-
Provide Options to the Kernel at Boot Time
In this video; Dan LaChance explains how to set parameters for the Linux kernel to manipulate its behavior at boot time.
-
Querying Remote DNS Servers
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to query remote DNS servers by using the dig and host commands.
-
Reconfiguring Network Interfaces
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to manage network interfaces in Linux.
-
Redirecting Standard Input; Output; and Error
Streams; pipes; and redirects are used for redirecting standard I/O streams. In this video; Dan LaChance demonstrates how to use standard input; output; and error to redirect output from a shell command in the Linux shell.
-
Running Jobs in the Foreground and Background
In this video; Dan LaChance demonstrates how to perform commands that will run in the foreground or background in Linux.
-
Selecting and Sorting Processes for Display
In this video; Dan LaChance describes how to use the sort command to select and sort processes for display in Linux.
-
Selecting Data by Joining Two or More Tables
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to select data by joining two or more tables and display information from those tables.
-
Selecting the Correct Script Interpreter
In this video; Dan LaChance outlines the steps to select the correct script interpreter when working from the Linux command line and also from within a shell script.
-
Sending Signals to Processes
This video provides an overview on how to send signals to Linux processes.
-
Set the Default Boot Target
In this video; Dan LaChance demonstrates how to specify a boot target for a Linux system.
-
Setting a Default Route
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to set the default route in Linux.
-
Setting Environment Variables
In this video; Dan LaChance demostrates how to configure environment variables in Linux.
-
Setting Limits on User Logins; Processes; and Resources
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to set limits on user logins; processes; and resources in Linux.
-
Setting or Changing Passwords and Aging Information
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to set and change passwords and aging information in Linux.
-
Setting the Command Search Path
In this video; Dan LaChance demonstrates how to set the command search path.
-
Setting the Hardware Clock
In this video; Dan LaChance demonstrates how to set the hardware clock in Linux.
-
Setting the System Date and Time
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance describes how to set the date and time on a Linux system.
-
Shared Library Locations
In this video; Dan LaChance describes shared library locations.
-
Shell Script Return Values
In this video; Dan LaChance demonstrates how to work with shell script return values.
-
Shutdown and Reboot from the Command Line
In this video; Dan LaChance describes ways to shut down and restart a Linux computer from the command line.
-
Signaling a Program to Continue Running After Logout
In this video; Dan LaChance describes how to keep a program running in the background even after logging out of Linux.
-
Sorting Data Returned from a select Statement
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to sort data returned from a select statement.
-
Special Permissions
In this video; Dan LaChance outlines how to set special permissions in the Linux file system.
-
Starting a Program with a Different Priority
In this video; Dan LaChance demonstrates how to start a Linux process with a different priority value.
-
The /boot Partition
In this video; Dan LaChance describes BIOS and UEFI firmware standards.
-
Troubleshooting General Printing Problems
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance describes the general troubleshooting tips related to printing in Linux.
-
Troubleshooting Network Configuration Problems
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to troubleshoot network configuration problems in Linux.
-
Troubleshooting Network Connectivity Problems
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to troubleshoot the network connectivity problems in Linux.
-
Turning the Display Manager On or Off
In this video; Dan LaChance describes how to turn the LightDM Display Manager on and off in Linux.
-
Understanding systemd
In this video; Dan LaChance describes the systemd approach for booting a Linux system.
-
Understanding SysVinit
In this video; Dan LaChance explains the SysVinit process for booting a Linux system.
-
Understanding the X Window Configuration File
In this video; Dan LaChance describes the X Window configuration file.
-
User Disk Quota Reports
In this video; Dan LaChance discusses how to work with user and group disk quotas.
-
Using and Editing the Shell Command History
In this video; Dan LaChance demonstrates how to work with the history tool in the bash shell.
-
Using and Modifying the Shell Environment
In this video; Dan LaChance describes how to use and modify the Linux shell environment.
-
Using Commands to See Alternate Views of File Contents
In this video; Dan LaChance demonstrates the different ways to view the file contents and how to convert text files into a printable format.
-
Using DISPLAY to Redirect Windows
In this video; Dan LaChance describes how to redirect X Windows graphical environments between Linux hosts across the network.
-
Using gdisk and Parted with GPT
In this video; Dan LaChance demonstrates how to use the parted Linux command to work with gpt discs.
-
Using Links for Administration Tasks
In this video; Dan LaChance uses Linux file system commands to create hard links and sym links from a root file system to a subdirectory.
-
Using Linux Commands to Modify File Contents
In this video; Dan LaChance outlines the steps to modify file contents by using Linux commands.
-
Using Linux Commands to Parse File Contents
In this video; Dan LaChance describes how to use Linux commands to parse file contents.
-
Using Linux Commands to Sort or Format File Contents
In this video; Dan LaChance demonstrates how to use Linux commands to sort and format file contents.
-
Using Linux Commands to View File Contents
In this video; Dan LaChance demonstrates how to use commands to view all; beginning; and end contents of a file.
-
Using Mail and Configuring E-Mail Forwarding
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to use the mail feature and how to configure e-mail forwarding in Linux.
-
Using nmap to Discover Open Ports on a System
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to use the nmap command to discover open ports in a Linux system.
-
Using Regular Expression Tools on a File
In this video; Dan LaChance demonstrates how to use regular expression tools to find files in the filesystem and to find content within text files.
-
Using Regular Expression Tools on a Filesystem
In this video; Dan LaChance demonstrates how to use regular expression tools on a filesystem.
-
Using Regular Expression Tools to Replace File Contents
In this video; Dan LaChance demonstrates how to use regular expression tools to replace file contents.
-
Using Single Shell One Line Command Sequences
In this video; Dan LaChance describes how to use single line shell commands and command sequences in Linux.
-
Using SSH Port Tunnels
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to use secure shell (SSH) port tunnels.
-
Using TCP Wrappers to Grant or Deny Access to Services
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to use TCP wrappers to grant or deny access to a network service in Linux.
-
Using the Group Field
In this video; Dan LaChance describes how to use the group field to grant file access to group members.
-
Using the pool.ntp.org Service
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to use the pool.ntp.org service in Linux.
-
Using the Standard NTP Query Program
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to use the standard Network Time Protocol (NTP) query; or ntpq; in Linux.
-
Using Unix Commands to Count Data in Files
In this video; Dan LaChance outlines the steps to count data in a file by using Linux commands.
-
Verifying Filesystem Integrity
A filesystem is used to organize and control how data is stored and retrieved. In this video; Dan LaChance describes how to use commands to verify the integrity of a filesystem.
-
Verifying Hardware for X Server
The GUI interface X server is a key component within the Linux installation. In this video; Dan LaChance describes how to verify if hardware is supported by an X server.
-
Working with the Boot Loader
In this video; Dan LaChance describes how to use the GRUB tools to interact with the Linux GRUB boot loader.
-
Writing BASH Functions for Frequently Used Commands
In this video; Dan LaChance describes how to write bourne-again shell (BASH) functions for frequently used commands in Linux.
-
Writing Shell Scripts Using Command Substitution
In this video; Dan LaChance demonstrates how to write shell scripts by using command substitution in Linux.
-
Writing Shell Scripts Using for Loop
In this video; Dan LaChance demonstrates how to create shell scripts that can repeat a set of actions using the for statement in Linux.
-
Writing Shell Scripts Using if Statement
In this video; Dan LaChance demonstrates how to write shell scripts using if statements.
-
Writing Shell Scripts Using while Loop
In this video; Dan LaChance demonstrates how to write shell scripts using the while looping construct in Linux.
-
Resource Allocation
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes resource allocation with virtual machines.
-
Adding and Modifying Users
After watching this video; you will be able to add and modify users in Ubuntu using the available graphical tools.
-
APT Software Package Manager
After watching this video; you will be able to use APT to install; update; remove; and search for software packages in Ubuntu.
-
Configuring PHP
After watching this video; you will be able to install and configure php5-fpm.
-
Configuring VirtualBox to Install Ubuntu
After watching this video; you will be able to configure a virtual machine using a DVD image of Ubuntu.
-
Connecting to a Windows Share
After watching this video; you will be able to connect to files shared by a Microsoft Windows computer.
-
Creating Aliases in .bashrc
After watching this video; you will be able to modify the .bashrc file to create command line aliases.
-
Desktop Search with Unity Dash
After watching this video; you will be able to search with the Unity Dash feature in Ubuntu and change its privacy setting.
-
Installing a Basic SSL/TLS Certificate in nginx
After watching this video; you will be able to create a certificate signing request and self-sign it with openssl.
-
Installing Ubuntu 14.04
After watching this video; you will be able to install Ubuntu in a virtual machine.
-
Introduction to avconv
After watching this video; you will be able to use avconv to format shift video formats and extract audio from a video file.
-
Introduction to awk
After watching this video; you will be able to manipulate and parse text using awk.
-
Introduction to Backups
After watching this video; you will be able to enable backups using the built-in backup tool.
-
Introduction to chgrp; chmod; and chown
After watching this video; you will be able to change and modify user and group ownership of files and directories.
-
Introduction to cp; mv; and mkdir
After watching this video; you will be able to create; copy; and move files and directories on the command line.
-
Introduction to curl
After watching this video; you will be able to use curl to make http requests from the command line.
-
Introduction to df and du
After watching this video; you will be able to use the df and du utils to query how storage space is being used.
-
Introduction to diff
After watching this video; you will be able to compare files for differences using the GNU Diffutils.
-
Introduction to Emacs
After watching this video; you will be able to get up and running with Emacs.
-
Introduction to Environment Variables
After watching this video; you will be able to set local and global environment variables.
-
Introduction to File Permissions
After watching this video; you will be able to display and modify file permissions from the File Manager.
-
Introduction to find
After watching this video; you will be able to perform a find on the command line.
-
Introduction to grep
After watching this video; you will be able to use grep to search text with regular expressions.
-
Introduction to head; tail; more; and less
After watching this video; you will be able to explore the head; tail; more; and less utilities.
-
Introduction to kill
After watching this video; you will be able to use kill to terminate a running process.
-
Introduction to Kubuntu; Lubuntu; and Xubuntu
After watching this video; you will be able to choose a variant of Ubuntu with emphasis on Kubuntu; Lubuntu; and Xubuntu.
-
Introduction to MariaDB
After watching this video; you will be able to install MariaDB as a drop-in replacement for MySQL.
-
Introduction to nginx
After watching this video; you will be able to install and configure a simple nginx webserver.
-
Introduction to openssl Digest Functions
After watching this video; you will be able to use openssl to create a message digest on the command line.
-
Introduction to Security & Privacy
After watching this video; you will be able to configure the security and privacy-related settings from the System Settings.
-
Introduction to sed
After watching this video; you will be able to process text using sed.
-
Introduction to Software & Updates
After watching this video; you will be able to configure software sources and additional drivers.
-
Introduction to ssh and scp
After watching this video; you will be able to connect to remote computers using ssh and scp.
-
Introduction to System Monitoring
After watching this video; you will be able to monitor system performance using the System Monitor.
-
Introduction to the Basic LEMP Stack
After watching this video; you will be able to configure a basic LEMP (Linux; nginx; MariaDB; PHP) stack.
-
Introduction to the File Manager
After watching this video; you will be able to navigate and configure the Ubuntu File Manager.
-
Introduction to the Ubuntu Software Centre
After watching this video; you will be able to install; remove; and navigate software packages using the Ubuntu Software Centre.
-
Introduction to Vi/Vim
After watching this video; you will be able to get up and running with vi/vim.
-
Introduction to wc
After watching this video; you will be able to use wc to count the characters; words; and lines in a given file on the command line.
-
Modifying Locale Settings
After watching this video; you will be able to modify locale settings.
-
Setting Appearance and Brightness & Lock
After watching this video; you will be able to configure the background appearance; brightness & lock settings; and the unity-tweak-tool in Ubuntu.
-
Sharing Files with Samba
After watching this video; you will be able to share files with Microsoft Windows using samba.
-
The Dangers of 'rm -rf'
After watching this video; you will be able to mitigate the dangers of 'rm -rf'.
-
Ubuntu with VirtualBox Guest Additions
After watching this video; you will be able to configure Ubuntu 14.04 with Virtual Guest Additions.
-
Using ssh keys
After watching this video; you will be able to configure an authentication key for ssh.
-
Using tar; gzip; and bzip2
After watching this video; you will be able to create an archive with tar; gzip; and bzip2.
-
Creating a Symbolic Link
After watching this video; you will be able to create a symbolic link using ln.
-
Accessing a Virtual Machines Console
After watching this video; you will be able to access a virtual machine's console from the host.
-
Add Users; Groups; and Install Packages
After watching this video; you will be able to add and edit users; groups; and packages as well as configure user permissions on files.
-
Adding a Rule to a Policy
After watching this video; you will be able to add a new policy rule to be enforced.
-
Adding Limits to Network Traffic
After watching this video; you will be able to add a limit to the firewall for certain types of traffic.
-
Adding or Deleting an iptable Rule
After watching this video; you will be able to add and delete rules to an iptable configured firewall.
-
Adding Partitions Non-destructively
After watching this video; you will be able to add new partitions or additional swap space nondestructively.
-
Adding Shares to a Samba Server
After watching this video; you will be able to use Samba to share a directory with Windows clients.
-
Adding Users to Groups
After watching this video; you will be able to add a user to a group or groups.
-
Advanced Grep Parameters
After watching this video; you will be able to use advanced grep features like recursively finding matching files and ignoring case sensitivity .
-
Analyzing and Reviewing Logs
After watching this video; you will be able to view and analyse log files and interpret basic values from other journal sources.
-
Backing up and Restoring Volumes
After watching this video; you will be able to back up and restore volumes.
-
Blacklisting Kernel Modules
After watching this video; you will be able to use modprobe to blacklist modules.
-
Booting from MBR or GPT
After watching this video; you will be able to identify; configure; and boot from GPT or MBR.
-
Change a Process Priority and Check the Logs
After watching this video; you will be able to use renice to change a processes priority; change a network adaptors IP Address; and check the logs for any unauthorized access attempts.
-
Changing a File System Label
After watching this video; you will be able to change the label of a partition.
-
Changing Logs and Log Settings
After watching this video; you will be able to modify the system log settings and retention policies.
-
Changing the Boot Target
After watching this video; you will be able to change the boot target with systems using systemd.
-
Changing Your Password
After watching this video; you will be able to change your password through the Gnome interface or from the Shell.
-
Configuring a Basic DHCP Server
After watching this video; you will be able to configure a basic DHCP Server.
-
Configuring a Basic DNS Server
After watching this video; you will be able to configure a basic bind service.
-
Configuring a Basic FTP Server
After watching this video; you will be able to configure a basic ftp service.
-
Configuring a Basic HTTPD Server
After watching this video; you will be able to configure a basic web service.
-
Configuring a Basic Logging Server
After watching this video; you will be able to configure the logging server to store logs sent from external servers.
-
Configuring a Basic MAIL Server
After watching this video; you will be able to configure a basic mail server .
-
Configuring a Basic NTPD Server
After watching this video; you will be able to configure a basic ntpd service.
-
Configuring a Basic Samba Server
After watching this video; you will be able to configure a basic Samba server.
-
Configuring a Basic SSH Server
After watching this video; you will be able to configure a basic sshd service .
-
Configuring a Basic TELNET Server
After watching this video; you will be able to configure a basic telnet service.
-
Configuring a Guest for Running on a Host
After watching this video; you will be able to modify the running RHEL 7 guest to perform well under a host.
-
Configuring a System to use LDAP
After watching this video; you will be able to configure a system to use an LDAP based directory service.
-
Configuring a System to use MS Active Directory
After watching this video; you will be able to configure a system to use MS Active Directory.
-
Configuring a System to Use Network Time
After watching this video; you will be able to configure the system to use a network time source.
-
Configuring an SELinux Policy
After watching this video; you will be able to configure and control SELinux policies.
-
Configuring Automatic Updates in Gnome
After watching this video; you will be able to choose appropriate update times; schedules; and mode to update the RHEL 7 system.
-
Configuring Common Networking Situations
After watching this video; you will be able to configure Linux systems with common network scenarios.
-
Configuring E-mail Clients
After watching this video; you will be able to use the two default Gnome mail clients and configure basic settings to send and receive e-mail.
-
Configuring Kernel Services
After watching this video; you will be able to configure kernel setting and limits.
-
Configuring Kernel Settings
After watching this video; you will be able to alter kernel settings to solve common system issues.
-
Configuring Network Devices using Gnome
After watching this video; you will be able to use the Gnome network manager to configure a network device.
-
Configuring Network Parameters for a Host
After watching this video; you will be able to change the hostname; DNS; and other network settings for the host; including deactivating and activing a network device.
-
Configuring Networking from the Shell
After watching this video; you will be able to configure a network device entirely from the shell.
-
Configuring Permissions for an LDAP User
After watching this video; you will be able to configure and use permissions and settings for the LDAP user on the server.
-
Configuring Permissions for an MS Active Directory User
After watching this video; you will be able to configure MS AD permissions for the user on the server.
-
Configuring Red Hat Virtualization Tools
After watching this video; you will be able to distinguish between the different virtualization tools used to run guests on RHEL 7.
-
Configuring Host Settings
After watching this video; you will be able to configure settings for hosting guests.
-
Configuring SELinux Settings
After watching this video; you will be able to configure SELinux settings.
-
Configuring System Settings from Gnome
After watching this video; you will be able to configure system and security settings from the Gnome interface.
-
Configuring the Boot Loader
After watching this video; you will be able to configure the boot loader.
-
Configuring the built-in Firewall
After watching this video; you will be able to use the Security Level Configuration Tool to manage a basic firewall.
-
Configuring the Gnome Environment
After watching this video; you will be able to configure Gnome menus; panels; desktop icons; themes; and colors for a better user experience.
-
Configuring the SELinux Mode
After watching this video; you will be able to configure and choose the applicable SELinux mode.
-
Configuring the Software Repositories
After watching this video; you will be able to add; remove; or set the software repositories for yum and the Gnome package manager.
-
Controlling what is Logged
After watching this video; you will be able to configure what is logged to system logs.
-
Convert a cron Job to a SystemD Timer Unit Task
After watching this video; you will be able to convert a cron job to a systemd timer task.
-
Correcting Missing Mount Points on Boot
After watching this video; you will be able to fix mount points that no longer exist.
-
Create a LVM Filesystem and Mount It
After watching this video; you will be able to create an XFS LVM Filesystem and then mount the partition so it will be available even after rebooting.
-
Create a Script and Schedule it to Run
After watching this video; you will be able to create a script that will use grep to find files with certain contents and schedule this job to run each day at 2:05 am.
-
Creating a Basic RAID Volume
After watching this video; you will be able to create and configure a basic RAID 0; 1; and 5 volume.
-
Creating a Simple BASH Script
After watching this video; you will be able to create a simple BASH script that can chain multiple commands together to perform an action.
-
Creating Aliases and Links
After watching this video; you will be able to create aliases for commands and make links to files or directories.
-
Creating and Editing Files
After watching this video; you will be able to create and edit text files from the desktop environment using the Gnome editor.
-
Creating and Editing Files in the Shell
After watching this video; you will be able to use the Shell tools echo; cat; > to create and edit text files.
-
Creating and Editing Files with Emacs
After watching this video; you will be able to perform basic file operations and editing using the emacs text editor.
-
Creating and Managing Virtual Machines
After watching this video; you will be able to create and manage virtual machines.
-
Creating Filesystems
After watching this video; you will be able to create a filesystem on a physical disk.
-
Creating Hybrid Volumes
After watching this video; you will be able to use LVM tiered storage to use faster SSDs with HDDs to create fast "hybrid" storage.
-
Customizing the Bourne Again Shell
After watching this video; you will be able to manipulate the bash prompt and describe how the env and export features can be used.
-
Dealing with a SELinux Policy Violation
After watching this video; you will be able to identify and troubleshoot a reported policy violation.
-
Dealing with Failed Drives
After watching this video; you will be able to troubleshoot a drive that has failed in either a hot-swap or raid configuration.
-
Debugging a Filesystem Issue
After watching this video; you will be able to debug the XFS file system.
-
Describe File Permissions and Ownership
After watching this video; you will be able to describe the basic file permissions for users and groups and how they relate to file ownership.
-
Describe Users and Groups
After watching this video; you will be able to describe how users and groups work and how they are connected.
-
Describing and Comparing Shells
After watching this video; you will be able to describe a Shell; the purpose for Shells; and list some of the Shells available.
-
Describing Basic Network Terminology
After watching this video; you will be able to describe basic networking terminology and interfaces on Linux.
-
Describing How cron Schedules Jobs
After watching this video; you will be able to describe the configuration of a crontab file and the different sections for a cron job.
-
Describing iptable Rules and Configuration
After watching this video; you will be able to describe the sections of the firewall and the basics of how the firewall rules are configured.
-
Describing Parallel Network File System (pNFS)
After watching this video; you will be able to enable and support pNFS on the server.
-
Describing Regular Expressions
After watching this video; you will be able to identify and understand the basic syntax of a regular expression.
-
Describing the Boot Process
After watching this video; you will be able to describe the basic boot process and system components involved.
-
Describing the NFS
After watching this video; you will be able to describe the components of the Network File System.
-
Description of Linux Filesystems
After watching this video; you will be able to describe the various supported file systems.
-
Detecting Problems in a Guest
After watching this video; you will be able to use tools to detect problems in guests and report them to the host.
-
Executing and Controlling Scripts
After watching this video; you will be able to execute; pause; and run a script in the background and then bring it to the foreground.
-
Executing GUI Application from the Shell
After watching this video; you will be able to execute GUI applications from the command line; run them in the background; and see diagnostic or debug information in the Shell.
-
Exploring with the File Manager
After watching this video; you will be able to explore the file system using the Gnome file manager .
-
Exporting an NFS Share
After watching this video; you will be able to configure an exported share to work on reboot.
-
Fixing a Boot Partition
After watching this video; you will be able to fix boot partition issues .
-
Generating Bug Reports and Crash Notifications
After watching this video; you will be able to use built-in tools to generate bug and crash reports for diagnosis or to send to Red Hat.
-
Getting Built-in and Online Help
After watching this video; you will be able to access online help with a web browser or built-in help through Gnome.
-
Getting Help while in the Shell
After watching this video; you will be able to use man and info to get help; and identify or locate help in /usr/share/doc.
-
Growing a RAID Volume
After watching this video; you will be able to resize a RAID volume.
-
Identifying File Permission Security Issues
After watching this video; you will be able to troubleshoot common file permission security issues.
-
Identifying Linux Filesystems
After watching this video; you will be able to identify the file systems of mounted and external drives.
-
Identifying Network Devices
After watching this video; you will be able to identify network devices and their configuration.
-
Identifying Red Hat Enterprise 7 Hardware Requirements
After watching this video; you will be able to describe Red Hat Enterprise Linux (RHEL) 7 hardware requirements.
-
Identifying Red Hat Virtualization Tools
After watching this video; you will be able to describe the built-in virtualization tools and programs in RHEL 7.
-
Identifying Remote Access Technologies
After watching this video; you will be able to describe the various remote access technologies that are available on Linux.
-
Identifying SystemD Startup Services
After watching this video; you will be able to use SystemD to start services.
-
Identifying the Components to SELinux
After watching this video; you will be able to identify and recognize the components and purpose of SELinux.
-
Install and Boot
After watching this video; you will be able to install RHEL 7 on a physical computer and identify the different stages of the boot process.
-
Install as a VM Guest
After watching this video; you will be able to use RHEL 7 as a host for VMs and as a client running on a VM.
-
Installing and Starting NFS
After watching this video; you will be able to install; setup; and configure NFS.
-
Installing on Systems using UEFI
After watching this video; you will be able to recognize issues that can occur with UEFI and some settings that may help get RHEL 7 to install.
-
Installing as a Guest
After watching this video; you will be able to install RHEL 7 as a guest.
-
Installing with a Kickstart Script
After watching this video; you will be able to use a kickstart script to do an installation.
-
Installing Software Using the Gnome Package Manager
After watching this video; you will be able to install software from the package manager.
-
Interrupting the Boot Process to Gain Access
After watching this video; you will be able to alter the boot process to gain access to fix problems or diagnose issues.
-
Launching Guests at Boot on the Host
After watching this video; you will be able to configure the system to start virtual machines on boot.
-
Launching as a Guest
After watching this video; you will be able to launch a RHEL 7 guest from the host.
-
Listing and Identifying Processes
After watching this video; you will be able to list and identify running processes.
-
Locating Content within a Text File
After watching this video; you will be able to use grep to locate content within a text file.
-
Logging in with an Active Directory User Account
After watching this video; you will be able to log in to the server using a MS Active Directory user account.
-
Logging in with an LDAP User Account
After watching this video; you will be able to login to the server using a user account from the LDAP directory service.
-
Making a Volume Snapshot
After watching this video; you will be able to create a snapshot of a volume.
-
Manage an NFS Mount on a Remote Server
After watching this video; you will be able to Use a Directory Service configured client to mount a remote NFS share that you configure on a remote host.
-
Manage and Archive Files within Scripts
After watching this video; you will be able to use scripts to automate the management and archiving of files and directories.
-
Managing and Configuring Swap Space
After watching this video; you will be able to describe swap space requirements and how to manage swap space during installation.
-
Managing cron Jobs
After watching this video; you will be able to edit and pause cron jobs as well as set jobs for users and root.
-
Managing Groups
After watching this video; you will be able to add; modify; and delete groups.
-
Managing Permissions on Directories
After watching this video; you will be able to change a directory's owner; group; and permissions.
-
Managing Permissions on Files
After watching this video; you will be able to change a file's owner and group and set file and group permissions.
-
Managing Process Priorities
After watching this video; you will be able to set or change the priority for a process.
-
Managing SystemD in the Boot Process
After watching this video; you will be able to create boot targets; boot states; and control parallel daemon instantiation with SystemD.
-
Managing Users from the Shell
After watching this video; you will be able to add; delete; and edit a user from a Shell including how to set the user properties; Shell; and home directory.
-
Managing Users within Gnome
After watching this video; you will be able to add; edit; modify; and delete a user using the Gnome User Manager application.
-
Managing Volumes from the Shell
After watching this video; you will be able to use Shell commands to manage LVM storage.
-
Manipulating an at Job
After watching this video; you will be able to alter; delete; and view at jobs.
-
Manipulating an LVM Volume
After watching this video; you will be able to use basic LVM commands to create and remove volumes.
-
Manipulating Directories
After watching this video; you will be able to list; create; move; change; and delete directories and use shortcuts to move around the file system.
-
Manipulating Files
After watching this video; you will be able to list; copy; move; and delete files.
-
Manipulating Files and Directories
After watching this video; you will be able to copy; move; delete; and rename files and directories using the Gnome file manager.
-
Modifying a User's Default Group
After watching this video; you will be able to modify a user's default group.
-
Monitoring Processes
After watching this video; you will be able to monitor processes and their resource utilization.
-
Mounting a Filesystem at Boot
After watching this video; you will be able to configure the system to mount a filesystem at boot.
-
Mounting an Encrypted Filesystem at Boot
After watching this video; you will be able to mount an encrypted filesystem at boot and use a fully encrypted filesystem.
-
Mounting an External NFS Share
After watching this video; you will be able to mount an external shared NFS partition to the local system.
-
Mounting and Unmounting a Filesystem
After watching this video; you will be able to mount and unmount various file systems.
-
Mounting and Unmounting of Filesystems or Devices
After watching this video; you will be able to control the automatic mounting of filesystems when devices are plugged in and safely unmount filesystems.
-
Mounting and Using iSCSI Devices
After watching this video; you will be able to mount and unmount iSCSI Network Area Storage.
-
Mounting and Using SMB Shares
After watching this video; you will be able to mount and unmount remote SMB; or Samba; shares.
-
Navigating in the Shell
After watching this video; you will be able to using autocomplete; and using history with the hist command and arrow keys.
-
Navigating the Gnome Desktop Environment
After watching this video; you will be able to use Gnome to run applications; manage virtual workspaces; and use window control buttons.
-
Obtaining Information about a Guest
After watching this video; you will be able to obtain information about a guest.
-
Opening a Port through the Firewall
After watching this video; you will be able to add a rule to allow a network service port through the firewall.
-
Patching the Kernel
After watching this video; you will be able to use kpatch to do dynamic patches to the kernel.
-
Performing Actions on Files that are Found
After watching this video; you will be able to perform actions on files that are returned from a find command.
-
Performing Login; Logoff; and Power Operations
After watching this video; you will be able to log in; log off; lock; and unlock a Gnome session as well as power up and down a system .
-
Performing Searches for Files
After watching this video; you will be able to use the find command to locate files based on their name or other properties.
-
Recognize an LVM Configuration
After watching this video; you will be able to identify and describe LVM configuration for volumes.
-
Recognizing and Identifying SELinux Policies
After watching this video; you will be able to identify and choose SELinux policies.
-
Recognizing Archived and Compressed Files
After watching this video; you will be able to recognize an archived file and the tools necessary to retrieve the contents.
-
Recognizing BASH Scripts
After watching this video; you will be able to identify a BASH script file and the header specifying the interpreter used for the script.
-
Recognizing Common Processes
After watching this video; you will be able to recognize common running processes.
-
Recognizing POSIX File Security
After watching this video; you will be able to identify POSIX file and ownership permissions on files and directories.
-
Recognizing the Relationship between Xwindows and Gnome
After watching this video; you will be able to describe the roles and differences between Xwindows and the Gnome desktop environment.
-
Reinstalling or Replacing a Software Package Using yum
After watching this video; you will be able to remove; reinstall; or replace a software package.
-
Resetting a User's Password
After watching this video; you will be able to change any user's password including the root user.
-
Resizing a Filesystem
After watching this video; you will be able to resize an MBR-based partition.
-
Restoring SELinux Contexts
After watching this video; you will be able to use restorecon to restore file security contexts.
-
Reviewing SystemD System Logs
After watching this video; you will be able to review SystemD journal logs.
-
Running Network Services
After watching this video; you will be able to work with network services through SystemD Services.
-
Saving and Restoring iptable Rulesets
After watching this video; you will be able to save and restore iptable rulesets.
-
Scheduling a cron Job
After watching this video; you will be able to create a cron job.
-
Scheduling a SystemD Timer Unit Task
After watching this video; you will be able to schedule a SystemD Timer task.
-
Scheduling an at job
After watching this video; you will be able to schedule a job using at.
-
Selecting an Installation Method
After watching this video; you will be able to describe and be able to select the appropriate installation method.
-
Setting and Configuring NFS Exports
After watching this video; you will be able to add and configure a local NFS share.
-
Setting the RunLevel
After watching this video; you will be able to alter the RunLevel of the system.
-
Setting up a SQUID Server
After watching this video; you will be able to configure a basic squid proxy service.
-
Setting Up Shared Directories for Users
After watching this video; you will be able to create a directory that can be shared by multiple users in a common group.
-
Setting User Properties in /etc/passwd
After watching this video; you will be able to modify user properties directly in the /etc/passwd file to fix user problems.
-
Start a Network Service and Allow Access
After watching this video; you will be able to start a network service add a rule to the firewall to allow external access to the service.
-
Starting and Stopping a Guest
After watching this video; you will be able to start; stop; and control guests.
-
Starting and Stopping a Service
After watching this video; you will be able to start and stop a network service.
-
Starting and Stopping Processes
After watching this video; you will be able to start and stop processes.
-
Starting Services at Boot
After watching this video; you will be able to configure a service to start or not start at boot.
-
Storing and Archiving Logs
After watching this video; you will be able to store and archive logs.
-
Supporting International Keyboards
After watching this video; you will be able to configure keyboard support.
-
Switching and Using TTY Consoles
After watching this video; you will be able to switch to; and back from; TTY consoles in order to execute Shell commands.
-
Switching Shells and Users
After watching this video; you will be able to switch users and Shells within a terminal window; in particular to become the root user to perform administrative tasks.
-
Switching Users and/or Desktops
After watching this video; you will be able to switch users on a multiuser system and run multiple desktops for different users.
-
Throttling Guest I/O and Managing Performance
After watching this video; you will be able to throttle I/O for a guest and manage guest resource allocations.
-
Transferring Files to a Host Securely
After watching this video; you will be able to use SCP to transfer a file to and from a host.
-
Troubleshoot and Secure a Linux System
After watching this video; you will be able to use SELinux to protect a network service and find the processes using the most memory or CPU resources.
-
Troubleshooting a Process
After watching this video; you will be able to troubleshoot or identify problem processes.
-
Troubleshooting and Repairing File Systems Part2
After watching this video; you will be able to describe the basic tools for repairing a variety of file systems.
-
Troubleshooting Boot Failures
After watching this video; you will be able to troubleshoot basic boot failures after an installation.
-
Troubleshooting CPU/Memory Intensive Processes
After watching this video; you will be able to troubleshoot CPU or memory intensive processes.
-
Troubleshooting File Permission Issues
After watching this video; you will be able to identify and diagnose file permission issues.
-
Troubleshooting GRUB
After watching this video; you will be able to troubleshoot and configure the GRUB boot loader.
-
Troubleshooting Locked Files
After watching this video; you will be able to identify locked files or files used by a process.
-
Troubleshooting Memory Issues
After watching this video; you will be able to troubleshoot common memory issues.
-
Troubleshooting Network Issues
After watching this video; you will be able to troubleshoot common network issues.
-
Tunneling insecure connections over SSH
After watching this video; you will be able to work with ssh tunneling to secure vnc or xdmcp.
-
Updating the Kernel
After watching this video; you will be able to update or modify a kernel to ensure a bootable system.
-
Updating the System Using Gnome
After watching this video; you will be able to update the current software manually or automatically using the package manager.
-
Updating the System Using yum
After watching this video; you will be able to update the system software from the Shell.
-
Use Gnome and the BASH Shell
After watching this video; you will be able to explore the Gnome User Interface and run commands from the BASH Shell.
-
Using a Firewall Manager
After watching this video; you will be able to use the advanced features of the firewall manager.
-
Using a Firewall Ruleset at Boot
After watching this video; you will be able to configure the system to use a set of firewall rules on boot from the shell.
-
Using ACLs; DACs; and MACs
After watching this video; you will be able to get and set discretionary and mandatory Access Control Lists.
-
Using AD Enrollment with Kickstart
After watching this video; you will be able to configure kickstart to automatically connect to a directory service.
-
Using Advanced Vim Editor Commands
After watching this video; you will be able to use features of vim to search text; replace text; and add; remove; or delete lines.
-
Using an Encrypted Filesystem
After watching this video; you will be able to use an encrypted filesystem.
-
Using and Compressing Swap Partitions
After watching this video; you will be able to using and compressing swap partitions or files.
-
Using autofs with SMB Shares
After watching this video; you will be able to use autofs to mount shares automatically.
-
Using bzip2 to Compress and Decompress Files
After watching this video; you will be able to use bzip2 to compress or decompress a file.
-
Using Compression with the Tape Archiver
After watching this video; you will be able to use gzip and bzip2 with tar directory to compress and decompress in a stream.
-
Using dracut for Installation
After watching this video; you will be able to investigate booting or installation issues using dracut.
-
Using Expansion in Scripts
After watching this video; you will be able to describe the order of expansion when used in a script.
-
Using Filename Globbing
After watching this video; you will be able to use globbing to select files based on matching filename patterns.
-
Using GPT Disks
After watching this video; you will be able to use tools to create; delete; and list GPT-based partitions.
-
Using Grep
After watching this video; you will be able to use grep to find patterns in a file based on simple patterns or regular expressions.
-
Using Grep with Redirection
After watching this video; you will be able to use grep with I/O redirection and pipes to create lists.
-
Using gzip and gunzip to Compress and Decompress Files
After watching this video; you will be able to use the gzip and gunzip commands to compress or decompress a file.
-
Using Input and Output Redirection
After watching this video; you will be able to use input and output redirection to stdin and stdout to manage output from Shell commands.
-
Using Kernel Modules
After watching this video; you will be able to list; add; remove; and configure kernel modules.
-
Using Keys with SSH to Automate Connections
After watching this video; you will be able to use ssh keys to authenticate rather than user name and password.
-
Using Kickstart to Automate Installations
After watching this video; you will be able to use kickstart to create an automation script for automated installs.
-
Using Kickstart to Install a Guest VM
After watching this video; you will be able to use a kickstart script to install RHEL 7 as a guest.
-
Using Local Repositories for Package Management
After watching this video; you will be able to configure a local repository and only allow software packages and updates that have been approved.
-
Using Logic Statements Part 1
After watching this video; you will be able to use the if statement and the for basic looping construct.
-
Using Logic Statements Part 2
After watching this video; you will be able to use the while and until looping constructs.
-
Using MBR Disks
After watching this video; you will be able to use tools to create; delete; list; and manage MBR-based partitions.
-
Using Network tools
After watching this video; you will be able to work with the network manager to check the network configuration and explore networks from the File Manager.
-
Using NFSv4 Securely
After watching this video; you will be able to recognize the differences in the configuration for running NFS securely.
-
Using Other Compression and Decompression Tools
After watching this video; you will be able to use additional; but not as often used in Linux; compression and decompression tools.
-
Using Password Policies
After watching this video; you will be able to apply user password ageing and other policies to user accounts.
-
Using Pipes
After watching this video; you will be able to use pipes to chain one command to another to alter the output .
-
Using PTP for Network Time
After watching this video; you will be able to configure a system to use Precision Time Protocol.
-
Using Quotas
After watching this video; you will be able to add; edit; and view quotas.
-
Using read in a Script
After watching this video; you will be able to use read to get input from the user in a BASH script.
-
Using Relative and Absolute Paths
After watching this video; you will be able to describe how relative and absolute paths are used and how shortcuts like ../ and ~/ make directory traversal easier.
-
Using as a Guest
After watching this video; you will be able to describe and use RHEL 7 as a guest running on a host.
-
Using as a Host
After watching this video; you will be able to configure and optimize RHEL 7 to be a host for guests.
-
Using SELinux Process Contexts
After watching this video; you will be able to use and apply an SELinux process context.
-
Using SELinux Roles
After watching this video; you will be able to identify role-based access controls (RBAC) in SELinux.
-
Using SELinux to Secure a Network Service
After watching this video; you will be able to use SELinux to secure a network service.
-
Using SELinux User Contexts
After watching this video; you will be able to identify and recognize the components and purpose of SELinux user contexts.
-
Using Shell Text Editors to Create and Edit Files
After watching this video; you will be able to use a Shell text editor to create or edit a text file.
-
Using Shell Variables and the Shell Environment
After watching this video; you will be able to view the Shell environment variables and be able to set a Shell variable within a script.
-
Using SSH to Connect to a Host
After watching this video; you will be able to use SSH to connect to a remote host.
-
Using sVirt to Protect Guests
After watching this video; you will be able to use sVirt to protect guests.
-
Using SystemD JournalD with Syslog
After watching this video; you will be able to configure systemd journals to forward system messages to traditional system logging tools.
-
Using SystemD Process Management
After watching this video; you will be able to use SystemD to manage the system.
-
Using SystemD Timer Units
After watching this video; you will be able to describe a systemd timer unit and the options.
-
Using SystemD to Manage Services
After watching this video; you will be able to work with SystemD to manage running services.
-
Using SystemTap for Diagnostics
After watching this video; you will be able to use SystemTap to investigate and monitor the activities of the operating system kernel.
-
Using Telnet to Connect to a Host
After watching this video; you will be able to use Telnet to connect to remote hosts.
-
Using Test Operators
After watching this video; you will be able to use bash test operators to check for conditions.
-
Using the Bourne Again Shell
After watching this video; you will be able to open; close; set fonts; set colors; resize; and run a command from the Bourne Again Shell (BASH).
-
Using the Exit Status
After watching this video; you will be able to set an exit status and use it from the shell.
-
Using the Extended Tape Archiver (star) Command
After watching this video; you will be able to use the star command to create; extract; compress; or list the contents of an archive that supports extended ACLs.
-
Using the Gnome Package Manager
After watching this video; you will be able to run the Gnome package manager to view installed sofrware or find software.
-
Using the Red Hat Rescue Environment
After watching this video; you will be able to troubleshoot using the Red Hat Rescue Environment.
-
Using the Stream Editor to Edit Files
After watching this video; you will be able to work with sed to alter the contents of a text file.
-
Using the Tape Archiver (tar) Command
After watching this video; you will be able to use the tar command to create; extract; compress; or list the contents of an archive.
-
Using Thin Provisioning
After watching this video; you will be able to manage free space in a storage pool and allocate space as required.
-
Using Vim to Create and Edit Files
After watching this video; you will be able to work with vim to open; do basic edits; and save a text file.
-
Using VNC to Connect to a Host or to Host a Connection
After watching this video; you will be able to use VNC to connect; or be the host of; a remote connection.
-
Using Volume Groups
After watching this video; you will be able to assign logical and physical volumes to a volume group.
-
Using Which and Locate
After watching this video; you will be able to identify the path and filename for a command or locate files that have been indexed.
-
Using yum
After watching this video; you will be able to use yum to list; find; and install software packages from the Shell.
-
Viewing and Comparing File Contents from a Shell
After watching this video; you will be able to use common commands like less; cat; more; and diff to view and compare file contents.
-
Working with /etc/passwd and /etc/shadow
After watching this video; you will be able to describe the components of the /etc/passwd file and the purpose of the /etc/shadow file.
-
Working with at to Schedule Jobs
After watching this video; you will be able to identify the at parameters and commands used for managing jobs.
-
Working with Directory Services
After watching this video; you will be able to identify the files and setting that must be changed to support an external directory service.
-
Working with Scheduled Jobs
After watching this video; you will be able to describe the different job schedulers and how they differ.
-
Part I
After watching this video; you will be able to perform the initial install of RHEL 7 onto a physical system using the graphical installer.
-
Part II
After watching this video; you will be able to complete the install of RHEL 7 onto a physical system using the graphical installer.
-
Part 1
After watching this video; you will be able to troubleshoot and repair the XFS file system.
-
Applying an Azure VM DSC Configuration
After watching this video; you will be able to apply a DSC configuration to an Azure VM.
-
Bootstrapping LCM Configuration of HyperV VMs
After watching this video; you will be able to bootstrap a DSC LCM configuration into a new HyperV VM.
-
Configure a Server Farm in Azure
After watching this video; you will be able to create; publish; and configure a server farm in Azure using DSC.
-
Configuring a Linux Environment for DSC
After watching this video; you will be able to configure a Linux node to receive a PowerShell DSC configuration.
-
Configuring HyperV VMs using DSC
After watching this video; you will be able to define a configuration for a HyperV guest VM using DSC.
-
Configuring the HyperV Role using DSC
After watching this video; you will be able to use DSC to configure a HyperV host.
-
Connecting to an Internal PowerShellGet Repository
After watching this video; you will be able to connect an authoring environment to a local DSC module repository.
-
Create a JEA Endpoint
After watching this video; you will be able to configure a node to be managed with Just Enough Administration in DSC.
-
Create and Publish a Custom Resource
After watching this video; you will be able to create a custom resource using the DSC Resource Designer and then document; test; and deploy it.
-
Creating a DSC Configuration for a Linux Node
After watching this video; you will be able to create a Linux DSC configuration.
-
Creating a Simple Composite Resource
After watching this video; you will be able to create a composite-style resource that strings together existing out-of-the-box DSC resources.
-
Creating an Azure VM DSC Configuration
After watching this video; you will be able to create a DSC configuration for an Azure VM.
-
Creating an Internal PowerShellGet Repository
After watching this video; you will be able to configure an internal repository for DSC modules.
-
Debugging Techniques in Consuming DSC Resources
After watching this video; you will be able to recognize how the DSC LCM loads and caches resources.
-
Debugging Techniques in Writing DSC Resources
After watching this video; you will be able to identify techniques to writing DSC resources that can assist in debugging internal resource problems.
-
Deploying Custom Resources in Push Mode
After watching this video; you will be able to recognize how to deploy your custom resources when using Push mode configurations.
-
Deploying Custom Resources via an HTTP Pull Server
After watching this video; you will be able to recognize how to deploy your custom resources when using Pull mode configurations with an HTTP Pull Server.
-
Deploying Custom Resources via an SMB Pull Server
After watching this video; you will be able to recognize how to deploy your custom resources when using Pull mode configurations with an SMB Pull Server.
-
Documenting DSC Resources
After watching this video; you will be able to document custom DSC resources so that they can be better consumed by others.
-
DSC Resource Parameters
After watching this video; you will be able to identify the various types of DSC resource parameters.
-
Examining a Custom Resource
After watching this video; you will be able to recognize how DSC modules and resources are structured in preparation for writing custom resources.
-
Examining a Linux Machine's Config and Metaconfig
After watching this video; you will be able to explore how DSC sets the LCM and configuration itself on a Linux node.
-
Examining the DSC Resource Get Command
After watching this video; you will be able to recognize the Get DSC resource command that retrieves the node's current state.
-
Examining the DSC Resource Set Command
After watching this video; you will be able to recognize the Set DSC Resource command that performs the main resource activity.
-
Examining the DSC Resource Test Command
After watching this video; you will be able to recognize the Test DSC resource command that identifies the node's current state.
-
Exploring Partial Configurations
After watching this video; you will be able to configure a node using multiple DSC configurations from various sources.
-
Handling Machine Reboots
After watching this video; you will be able to recognize how to instruct a node that it requires a reboot without forcing it to do so.
-
Nesting DSC Configurations
After watching this video; you will be able to nest a DSC configuration inside of another.
-
Overview of Azure Automation DSC
After watching this video; you will be able to recognize the Azure automation capability for DSC.
-
Overview of Just Enough Administration
After watching this video; you will be able to outline PowerShell DSC's Just Enough Administration (JEA) principles and concepts.
-
Overview of PowerShell DSC for Linux
After watching this video; you will be able to explore how DSC can be used to configure a Linux node.
-
Publishing a Linux DSC Config
After watching this video; you will be able to publish a DSC configuration to a Linux node.
-
Publishing an Azure VM DSC Configuration
After watching this video; you will be able to publish a DSC configuration to Azure storage for an Azure VM.
-
Reading Azure DSC Logs
After watching this video; you will be able to identify the DSC logs created for an Azure VM node.
-
Resetting a JEA Endpoint
After watching this video; you will be able to reset a JEA endpoint's configuration in DSC.
-
Testing a JEA Endpoint
After watching this video; you will be able to test a JEA node's configuration to ensure it is successfully applied in DSC.
-
Understanding DSC Resource Types and Structures
After watching this video; you will be able to describe how DSC modules and resources work and the different types that can be created.
-
Understanding DSC's Default Repositories
After watching this video; you will be able to use PowerShellGet and the PSGallery for DSC.
-
Understanding Resource Idempotency
After watching this video; you will be able to identify the key aspect of Set commands in DSC resources.
-
Unit Testing DSC Resources
After watching this video; you will be able to test resources while writing them to ensure they work as expected.
-
Updating an Existing DSC Resource
After watching this video; you will be able to update an existing DSC resource.
-
Using the DSC Resource Designer
After watching this video; you will be able to create a custom resource using the DSC Resource Designer.
-
Using the JEA Toolkit Helper
After watching this video; you will be able to use the JEA Toolkit Helper to generate JEA Toolkits.
-
Writing DSC Resources Using C#
After watching this video; you will be able to write custom DSC resources using C#.
-
Writing DSC Resources Using PowerShell Classes
After watching this video; you will be able to write custom DSC resources using PowerShell 5's new classes.
-
Configuring a MDT Production Deployment Share
After watching this video; you will be able to create a MDT production deployment share and add a custom image to it.
-
Configuring Key Management Service
After watching this video; you will be able to install the Volume Activation Services role; add a KMS host; and activate the KMS key.
-
Creating an Answer File Using Windows SIM
After watching this video; you will be able to create an answer file using Windows SIM.
-
Creating and Configuring the Deployment Share Part 1
After watching this video; you will be able to create a deployment share and configure permissions.
-
Identifying Challenges for OS Deployment
After watching this video; you will be able to identify the challenges for operating system deployment to new and existing devices.
-
Identifying Common Application Compatibility Issues
After watching this video; you will be able to identify common application compatibility issues.
-
Identifying the Windows Setup Phases
After watching this video; you will be able to describe installation types for Windows Setup and the Windows setup phases.
-
Managing the Boot Images in SCCM
After watching this video; you will be able to manage the default boot images in SCCM; including how to customize them and configure optional settings and distribute it.
-
Office 2013 Versions Available for Installation
After watching this video; you will be able to describe the two Office 2013 versions available for installation: MSI and C2R.
-
Preparing to Capture an Image Using DISM
After watching this video; you will be able to determine which partitions to capture and prepare to capture an image using DISM.
-
Preparing to Deploy C2R for Office 365
After watching this video; you will be able to use the C2R Administration tool to prepare for a C2R installation of Office 365.
-
The Office Customization Tool to Customize Office
After watching this video; you will be able to describe how the Office Customization Tool; OCT; can be used to customize Office 2013 for deployment.
-
Understanding High-Touch Installs with Retail Media
After watching this video; you will be able to explain the requirements and the deployment process for a high-touch with retail media strategy; including the benefits and limitations.
-
Understanding How WDS Enhances an MDT Environment
After watching this video; you will be able to describe how WDS enhances an MDT environment for LTIs.
-
Understanding License Activation for Windows
After watching this video; you will be able to describe product activation and the three main activation methods: retail; OEM; volume activation.
-
Understanding OS Deployment Using SCCM
After watching this video; you will be able to describe operating systems deployment using SCCM and the terminology.
-
Understanding PXE-Initiated OS Deployments
After watching this video; you will be able to describe PXE-initiated OS deployments; including the benefits; requirements; and how it works.
-
Understanding the ACT Architecture
After watching this video; you will be able to describe the ACT architecture and how the components work together; including what data collection packages and compatibility ratings are.
-
Understanding the Benefits of Integrating MDT With SCCM
After watching this video; you will be able to describe the benefits of integrating MDT with SCCM for deployments.
-
Understanding the Different Solutions for Application Compatibility
After watching this video; you will be able to identify available application compatibility solutions.
-
Understanding the Enterprise Desktop Life Cycle
After watching this video; you will be able to describe the enterprise desktop life cycle model; including the planning and purchasing decisions.
-
Understanding the Guidelines for Desktop Deployment
After watching this video; you will be able to describe the guidelines for an effective enterprise desktop deployment.
-
Understanding the Types of Images Used for Windows
After watching this video; you will be able to identify the different types of images that current Windows environments use and their benefits.
-
Understanding User State Migration
After watching this video; you will be able to describe what user state is and how user state migration works; including the tools.
-
Using WDS Multicasting with MDT LTI Deployments
After watching this video; you will be able to describe how WDS multicasting can be used with an MDT LTI deployment and enable it.
-
Assigning Policies to User EAC Steps
After grouping retention tags within a retention policy in Microsoft Exchange Server 2013; you should apply the retention policies to mailbox users and effect message retention settings. In this video; Michael Murphy demonstrates how to use the Exchange admin center (EAC) and Exchange Management Shell (EMS) to assign policies to mailboxes; and how to configure the Managed Folder Assistant.
-
AD RMS Accounts
When using Microsoft Exchange Server 2013; you are able to use Active Directory Rights Management Services (AD RMS). This feature allows you to protect content in your organization and prevent it from being extended to external parties. In this video; Michael Murphy provides an overview of AD RMS.
-
Assign a Dial Plan
In Microsoft Exchange Server 2013; a user enabled for Unified Messaging (UM) can be assigned an extension number and linked to a dial plan via the UM mailbox policy. In this video; Michael Murphy demonstrates how a user can be assigned a dial plan in the Exchange Management Shell (EMS) and Exchange Administrative Center (EAC).
-
Call Answering Rules
In Microsoft Exchange Server 2013; you can create and configure Unified Messaging (UM) call answering rules with specified conditions and corresponding actions. In this video; Michael Murphy demonstrates how call answering rules can be created by the user in Outlook or by the administrator in the Exchange Management Shell (EMS) and Exchange Administrative Center (EAC).
-
CAS Proxies Requests I
Microsoft Exchange Server 2013 supports CAS 2013. This has a great impact if you are migrating from an earlier version of Exchange and have existing namespaces and published URLs. In this video; Michael Murphy demonstrates CAS 2013 and how it functions in relation to Exchange 2007 and 2010.
-
CAS Proxies Requests II
In Microsoft Exchange Server 2013; you can use Exchange 2013 CAS to migrate from legacy systems. Configuring your system to work with CAS 2013 involves a range of different settings. In this video; Michael Murphy continues his discussion on CAS 2013.
-
Certificate and Firewall Requirements
In Microsoft Exchange Server 2013; you need to use certificates and firewalls for secure cross-forest communication. The type of certificate you use depends on whether the trust is Windows-based or Exchange Federation based. In this video; Michael Murphy discusses the considerations for certificates and firewalls to secure cross-forest communication.
-
Changes in Exchange 2013 Affecting Availability
There are several enhancements in Microsoft Exchange Server 2013 that provide a greater level of high availability and site resilience over previous versions. In this video; Michael Murphy discusses the enhanced feature for system recovery; lagged copies; and maintaining service availability.
-
Changes in Exchange 2013 Affecting Availability – Enhancement High Availability
Microsoft Exchange Server 2013 supports changes to its architecture that improve its availability and site resilience. The improved best copy and server select (BCSS) algorithm and new Set-ServerComponentState cmdlet are examples of these enhancements. In this video; Michael Murphy provides an overview of the changes to the Exchange 2013 platform that result in increased availability.
-
Changes in Exchange 2013 Affecting Availability – Enhancement Storage I
Microsoft Exchange Server 2013 contains architectural improvements that impact the availability; robustness; and resilience of the platform. One improvement is enhancement to the storage; including reduced I/O operations per second (IOPS) and multiple databases per volume. In this video; Michael Murphy discusses storage enhancements.
-
Coexistence
Microsoft Exchange Server 2013 supports Exchange 2013 CAS; however legacy systems such as Exchange 2007 still host clients and need to be supported. In this video; Michael Murphy discusses the coexistence of legacy systems with Exchange 2013 CAS.
-
Coexistence Strategies
The migration from Microsoft Exchange Server 2007 or 2010 to 2013 requires a coexistence strategy that includes plans for the installation of client access servers (CAS) and mailbox servers. In this video; Michael Murphy discusses the best practices in deploying certificates as part of the coexistence strategy for a server migration.
-
Common Certificate Validation Errors
Microsoft Exchange Server 2013 requires the use of certificates for authentication. When you use a certificate; there are various concerns relating to its validity and authenticity; for example certificates could expire or a signature could be revoked. In this video; Michael Murphy provides an overview on common certificate validation errors.
-
Configure a UM Call Router
In Microsoft Exchange Server 2013; the Unified Messaging (UM) Call Router Service enables a CAS server to process incoming calls. Configuring the Call Router service includes steps such as switching to startup mode; assigning listening ports; and configuring dial plan settings. In this video; Michael Murphy explains how to configure the Call Router service.
-
Configure an IP Gateway
Microsoft Exchange Server 2013 accepts incoming SIP requests only from a Unified Messaging (UM) IP gateway that it's associated with. You can create this gateway using either the Exchange Management Shell (EMS) or Exchange Administrative Center (EAC). In this video; Michael Murphy provides an overview on configuring a UM IP gateway.
-
Configure MailTips
Microsoft Exchange Server 2013 supports MailTips; which allow you to view informative messages when composing messages in Outlook. MailTips are available when a recipient or attachment is added. In this video; Michael Murphy demonstrates how to create MailTips using the Exchange Administrative Center (EAC) or Exchange Management Shell (EMS).
-
Configure UM Service
In Microsoft Exchange Server 2013; the Unified Messaging (UM) service runs on Mailbox servers. You can configure this service using both the Exchange Administrative Center (EAC) and Exchange Management Shell (EMS). Configurable options include the startup mode; SIP Access Service; and dial plan settings. In this video; Michael Murphy discusses the configuration of UM.
-
Configuring a Shared Namespace
Microsoft Exchange Server 2013 supports instances where organizations merge and users are migrated into an existing Active Directory. Partner connectors are used to support this process. In these instances; existing options are simply edited to support post migration. In this video; Michael Murphy demonstrates how to configure shared namespaces.
-
Configuring Custom Policies
Microsoft Exchange Server 2013 allows you to configure custom data loss prevention (DLP) policies and define rules that help to protect sensitive data specific to your organization. In this video; Michael Murphy demonstrates how to create a new custom DLP policy and define rules using the Exchange admin center (EAC); before describing the rule authoring process and basic rule structure.
-
Configuring DAG Networks – DAG Network Encryption and Compression
Encryption and compression in database availability group (DAG) networks helps to maintain the integrity and optimization of data as part of the replication process in Microsoft Exchange Server 2013. In this video; Michael Murphy describes how to configure DAG network encryption and compression properties using the Set-DatabaseAvailabilityGroup cmdlet in the Exchange Management Shell.
-
Configuring DAG Networks – Example Configurations
In Microsoft Exchange Server 2013; there are two types of Database availability group (DAG) configurations – single-subnet and multi-subnet. In this video; Michael Murphy describes the MAPI and replication traffic associated with network adapter and enumerated DAG network settings in both single and multi-subnet DAG configurations.
-
Configuring DAG Networks – iSCSI Networks
There are several best practice recommendations for Internet SCSI (iSCSI) storage with database availability group (DAG) configuration in Microsoft Exchange Server 2013. In this video; Michael Murphy discusses these best practices and demonstrates how to disable iSCSI networks from being detected and used as DAG networks.
-
Configuring DAG Networks I
In Microsoft Exchange Server 2013; you can configure database availability group (DAG) networks that form a collection of subnets for either replication traffic or MAPI traffic. In this video; Michael Murphy describes how a DAG network is configured for a DAG network using separate subnets and network interface cards (NIC) for MAPI and replication traffic.
-
Configuring DAG Networks II
In Microsoft Exchange Server 2013; database availability group (DAG) networks can be configured automatically; or manually using the Exchange Management Shell. In this video; Michael Murphy describes the configuration of the underlying network adapters that enable a successful DAG network auto-configuration; and the cmdlets used to create and configure new DAG networks manually.
-
Configuring Mailbox Access Logging
Microsoft Exchange Server 2013 enables you to audit mailbox access. It is important to review the audit logs associated with the audits so that you are warned of potential problems beforehand. You can search the mailbox audit log using the Search-MailboxAuditLog cmdlet. In this video; Michael Murphy discusses how to perform mailbox access logging.
-
Configuring Mailbox Audit Logging
Microsoft Exchange Server 2013 enables you to configure non-owner access auditing on mailboxes so that you can track access of mailboxes in an organization. Enabling mailbox auditing can be performed in the Exchange Management Shell (EMS). In this video; Michael Murphy provides an overview on how to enable mailbox audit logging.
-
Configuring Mailbox Policies
In Microsoft Exchange Server 2013; Unified Messaging (UM) mailbox policies provide a wide range of settings that can be applied against a user's mailbox. In this video; Michael Murphy demonstrates how mailbox policies can be configured to enable or disable specified UM features for different end users in the Exchange Management Shell (EMS) and Exchange Administrative Center (EAC).
-
Configuring MX Records for Failover Scenarios I
The transport pipeline; which is any service that provides the secure flow of e-mails between servers and clients; is very different for Microsoft Exchange Server 2013 than in earlier releases. In this video; Michael Murphy discusses how the services that make up the transport pipeline provide secure communication for Exchange Server 2013.
-
Configuring MX Records for Failover Scenarios II
A single mail exchange (MX) record or multiple MX records may be specified for a single domain when directing inbound e-mail in Microsoft Exchange Server 2013. In this video; Michael Murphy demonstrates how to configure MX records to regulate the flow of incoming e-mail with Exchange Server 2013.
-
Configuring MX Records for Failover Scenarios III
You can configure Mail Exchange (MX) records to deal with different disaster recovery scenarios for Microsoft Exchange Server 2013. In this video; Michael Murphy demonstrates how to configure MX records for different failover scenarios.
-
Configuring Protected Voice Mail
In Microsoft Exchange Server 2013; you can apply Information Rights Management (IRM) protection with Active Directory Rights Management Services (AD RMS) templates to prevent unauthorized access of Unified Messaging (UM) voicemails. In this video; Michael Murphy demonstrates how to use AD RMS templates to protect voicemail messages in the Exchange Management Shell (EMS) and the Exchange Administration Center (EAC).
-
Configuring Site-Resilient Namespace URLs I
In Microsoft Exchange Server 2013; you can configure site-resilient namespace URLs when designing an infrastructure solution. In this video; Michael Murphy discusses how to configure Exchange web service URLs and how to implement split-brain DNS solutions.
-
Configuring Site-Resilient Namespace URLs II
In Microsoft Exchange Server 2013; you can design a resilient site in which the same namespace URL is used in more than one datacenter. In this video; Michael Murphy discusses how to configure site-resilient namespace URLs for connections between Exchange and Outlook.
-
Configuring Site-Resilient Namespace URLs III
In Microsoft Exchange Server 2013; you can configure your site design to use the same resilient namespace URL in more than one datacenter. In this video; Michael Murphy discusses how to configure site-resilient namespace URLs via cmdlets to use ActiveSync and modify virtual directory services.
-
Configuring Site-Resilient Namespace URLs IV
In Microsoft Exchange Server 2013; you can configure a site from the command prompt to use a resilient namespace URL in more than one of its datacenters. In this video; Michael Murphy demonstrates how to use cmdlets to configure a site-resilient URL for the Autodiscover service.
-
Configuring Site-Resilient Namespace URLs V
In Microsoft Exchange Server 2013; you can design a site in which a resilient namespace URL is used across multiple sites. In this video; Michael Murphy demonstrates how to configure a site-resilient namespace for a layer 4 load-balancing solution.
-
Configuring Transport Decryption and IRM
Microsoft Exchange Server 2013 supports transport decryption; which enables Exchange servers to inspect packets while in transit. The Set-IRMConfiguration cmdlet in EMS can be used to configure this setting. In this video; Michael Murphy discusses how to perform depacket decryption as part of Information Rights Management (IRM).
-
Create a Dial Plan
Microsoft Exchange Server 2013 supports the Unified Messaging (UM) service. If a user is UM-enabled; they are added to a dial plan. There are three types of plans and three possible levels of security. You can configure a dial plan using the Exchange Administrative Server (EAC) or Exchange Management Shell (EMS). In this video; Michael Murphy discusses creating dial plans.
-
Create and Configure an Auto Attendant
In Microsoft Exchange Server 2013; the Unified Messaging (UM) auto attendant feature can answer incoming calls and transfer callers to the appropriate user or department. In this video; Michael Murphy demonstrates how auto attendants can be created in the Exchange Management Shell (EMS) and Exchange Administration Center (EAC).
-
Create Send and Receive Connectors
Microsoft Exchange Server 2013 allows you to perform cross-forest collaboration. This is useful in situations where two organizations merge and require a secure communication pipeline between them. In this video; Michael Murphy demonstrates how to create Send and Receive connectors to do this.
-
Create; Configure; and Deploy Message Classifications
Microsoft Exchange Server 2013 contains a built-in feature that allows you to apply message classifications to e-mail messages so that users are provided with certain information about the message. To define classifications; you can use the Exchange Management Shell (EMS). In this video; Michael Murphy demonstrates how to work with these classifications.
-
Creating an AD RMS Template I
In Microsoft Exchange Server 2013; you can use Active Directory Rights Management Services (AD RMS) to prevent content from being shared without authorization. AD RMS templates allow you to create certificates that encrypt and authenticate mail. The templates can be created using Windows Server GUI or Windows PowerShell. In this video; Michael Murphy discusses how to create these templates.
-
Creating an AD RMS Template II
In Microsoft Exchange Server 2013; you can create Active Directory Rights Management Services (AD RMS) templates and then distribute them to users; internally or externally. You can also specify the location of the templates to AD RMS; and archive older templates. In this video; Michael Murphy provides an overview on distributing AD RMS templates.
-
Creating an AD RMS Template with PowerShell
In Microsoft Exchange Server 2013; you are able to use Windows PowerShell to create Active Directory Rights Management Services (AD RMS) templates. PowerShell has to be prepared for AD RMS before the specified cmdlets can be run. In this video; Michael Murphy discusses how to create AD RMS templates using PowerShell.
-
BitLocker Considerations
BitLocker provides encryption of data in Microsoft Exchange Server 2013. In this video; Michael Murphy discusses the concerns when using BitLocker to secure Exchange data.
-
Creating and Configuring Custom Tags
Microsoft Exchange Server 2013 allows you to create customized retention tags that define how long messages remain in mailboxes and the actions that are applied when items reach their age limit. In this video; Michael Murphy demonstrates how to create retention policy tags and modify their configurable parameters using the Exchange admin center (EAC) and the Exchange Management Shell (EMS).
-
Creating Archive Policies
Messaging records management (MRM) in Microsoft Exchange Server 2013 uses retention tags and retention policies to specify how mailbox data is managed in an archiving solution. In this video; Michael Murphy demonstrates how retention tags and policies are created using the Exchange Management Shell; Exchange management center; or Outlook Web App and how to plan for an archiving solution.
-
Creating Journal Rules EAC
With a journaling mailbox in place; Microsoft Exchange Server 2013 provides features that allow you to easily create and manage rules specific to an organization's journaling needs. In this video; Michael Murphy demonstrates how to create; modify; enable or disable; and remove a journal rule using the Exchange Admin Console (EAS) and the Exchange Management Shell (EMS).
-
Creating New Sharing Policy
Microsoft Exchange Server 2013 supports sharing policies so you are able to share calendar information externally. Policies can be created on a per-mailbox basis or applied to a subset of mailboxes. In this video; Michael Murphy demonstrates how to create sharing policies in bulk using the Exchange Administrative Center (EAC) or Exchange Management Shell (EMS).
-
Creating Sharing Policies with EMS
Microsoft Exchange Server 2013 allows you to create sharing policies using the Exchange Management Shell (EMS) to share calendar information with external users. In this video; Michael Murphy demonstrates how to create these policies using the command shell and the New-SharingPolicy cmdlet.
-
Creating Transport Protection Rules
With Microsoft Exchange Server 2013; you can use transport rules to automatically apply Active Directory Rights Management Services (AD RMS) templates to e-mail messages in transit. Transport rules can be created using the Exchange Administrative Center (EAC) or Exchange Management Shell (EMS). In this video; Michael Murphy discusses how to create transport protection rules.
-
Cross Forest Move Using the EMS
The Exchange Management Shell (EMS) in Microsoft Exchange Server 2013 allows you to migrate mailboxes between the different Exchange forests in a cross-forest topology. In this video; Michael Murphy demonstrates how to use cmdlets in the EMS to create mail-enabled users in the target forest and move mailboxes from one forest to another.
-
Cross-Forest Availability
In Microsoft Exchange Server 2013; you can share availability and calendar information across two Exchange forests. In this video; Michael Murphy demonstrates how to share free/busy information between users of different forests in both trust and no trust scenarios.
-
Cross-Forest Coexistence
Microsoft Exchange Server 2013 supports cross-forest coexistence; which is useful if two Exchange organizations merge and their technology needs to be managed together or separately. There are various considerations when working with a merge scenario; such as using a single namespace or separate namespaces; and rewriting addresses. In this video; Michael Murphy demonstrates how to manage this coexistence.
-
Cross-Forest Send Connector
In Microsoft Exchange Server 2013; connectors are software interfaces for processing mail between organizations in a trust relationship. When configuring a cross-forest Send connector; you need to decide on the type of connector; authentication method; and address space you are routing to. In this video; Michael Murphy demonstrates how to configure cross-forest Send connectors in the Exchange admin center (EAC).
-
Database Availability Groups (DAG) – Operational Overview I
The database availability group (DAG) is used to address database-level redundancy and is central to any high availability; site resilient solution in Microsoft Exchange Server 2013. In this video; Michael Murphy discusses the benefits and features of DAGs and how they are used to provide continuous replication between Mailbox servers; and optimization features in Exchange 2013.
-
Database Availability Groups (DAG) – Operational Overview II
You can create and manage database availability groups (DAG) in Microsoft Exchange Server 2013. In this video; Michael Murphy discusses the process of creating a DAG and a mailbox database copy using either the Exchange Administration Center or the Exchange Management Shell; and how to manage a DAG using Active Manager roles.
-
Delivery Reports
In Microsoft Exchange Server 2013; delivery reports allow you to track whether mail was delivered to the intended destination. Users can generate their own delivery reports in Outlook Web App (OWA); and administrators can search more broadly using the Exchange admin center. In this video; Michael Murphy demonstrates how to generate delivery reports in the Exchange admin center.
-
Deploying Hybrid Configuration
When deploying a Hybrid Configuration in Microsoft Exchange Server 2013; there are several steps to follow. These include preparing the organization; examining the Exchange servers; and running the Hybrid Configuration wizard. In this video; Michael Murphy demonstrates the process involved in deploying a Hybrid Configuration.
-
Deployment Issues
In Microsoft Exchange Server 2013; the Hybrid Configuration Wizard (HCW) is used to perform hybrid deployments. There are areas that are outside the scope of the HCW – these include certificates and errors specific to the HCW. In this video; Michael Murphy discusses deployment issues when integrating an Exchange on-premise solution with an online solution.
-
Design and Configure Active Directory Federation Services (AD FS)
Microsoft Exchange Server 2013 supports Active Directory Federation Services (AD FS); which allow you to communicate with a third party over a relying party trust. AD FS supports the single sign-on process; which is helpful if you're deploying an online-hosted service. In this video; Michael Murphy demonstrates how to design and configure AD FS.
-
Design UM for High Availability
In Microsoft Exchange Server 2013; Unified Messaging (UM) can be designed for high availability (HA) by using load balancing solutions. In this video; Michael Murphy demonstrates load balancing options that allow UM to distribute the load across Client Access servers (CASs) for high availability.
-
Designing and Configuring Journaling
Journaling is a Microsoft Exchange Server 2013 feature that helps organizations meet regulatory requirements or internal policy mandates by maintaining targeted communication records in designated mailboxes. In this video; Michael Murphy demonstrates the Journaling agent; the journaling options provided by Exchange 2013; and the key aspects of journal rules; journal rule replication; and journal reports.
-
DLP Template Overview
Microsoft Exchange Server 2013 allows you to protect sensitive data by creating data loss prevention (DLP) policies from pre-existing DLP policy templates. In this video; Michael Murphy demonstrates how DLP policies examine messages; how DLP templates define policy rules; and how to configure prebuilt rules inside DLP policies from the Exchange admin center (EAC) and the Exchange Management Shell (EMS).
-
EAC
Microsoft Exchange Server 2013 allows you to define and manage retention policies and their associated retention tags using either the Exchange Admin Center (EAC) web interface management console; or Exchange Management Shell (EMS) command-line interface. In this video; Michael Murphy demonstrates how to create; configure; and remove retention tags and policies using the EAC interface; as well as EMS cmdlets.
-
Ethical Walls
Microsoft Exchange Server 2013 allows you to restrict communication between employees in an organization. To do this; you can leverage the power of transport rules in Exchange by creating ethical firewalls. In this video; Michael Murphy demonstrates how to create firewalls using the Exchange Administrative Center (EAC) or Exchange Management Shell (EMS).
-
Exchange 2013 UM Features
Microsoft Exchange Server 2013 supports the same Unified Messaging (UM) feature set as previous versions but also provides various function and administrative improvements. In this video; Michael Murphy provides an overview of the UM features in Exchange 2013.
-
Exchange 2013 UM Improvements
Microsoft Exchange Server 2013 offers an improved Unified Messaging (UM) service. Examples of improvements include voicemail preview and multi-language support for voicemail. In this video; Michael Murphy provides an overview of various UM improvements.
-
Exchange Hosted Encryption (EHE) and TLS
Microsoft Exchange Server 2013 supports both Exchange Hosted Encryption (EHE) and Transport Layer Security (TLS). EHS is used to establish wire encryption between clients and cloud-hosted services and TLS is used to establish wire encryption between Exchange and other SMTP servers. In this video; Michael Murphy discusses the use of EHS and TLS in Exchange.
-
Exchange Migration
Every major upgrade since Microsoft Exchange Server 2003 has involved deployment to new servers and the migration of data; such as mailboxes; from legacy systems to the new servers. In this video; Michael Murphy demonstrates the steps to be followed when migrating from Microsoft Exchange Server 2007 to 2013.
-
Get-ManagementRoleAssignment
In Microsoft Exchange Server 2013; you can assign administrative rights to users; granting them control over a subset of objects. You can user role-based access control (RBAC) to regulate this control. To troubleshoot RBAC; you can use the Get-ManagementRoleAssignment. In this video; Michael Murphy provides an overview on using the Get-ManagementRoleAssignment cmdlet to troubleshoot RBAC.
-
High Availability Cmdlets
Microsoft Exchange Server 2013 cmdlets enable administrators to configure and manage a high availability solution from within the Exchange Management Shell. In this video; Michael Murphy discusses the database availability group (DAG); DAG network; mailbox database copy; and health and status cmdlets.
-
Hunt Groups
Hunt groups can be created in Microsoft Exchange Server 2013 to route incoming calls from a single telephone number to multiple extensions so that callers can still connect if the primary contact is unavailable. In this video; Michael Murphy demonstrates how hunt groups can be defined and created in the Exchange Management Shell (EMS) and Exchange Administrative Center (EAC).
-
Hybrid Configuration Wizard
Microsoft Exchange Server 2013 supports the Hybrid Configuration wizard (HCW) which helps you configure hybrid deployments. The HCW allows all hybrid deployment features by default; such as domains; secure mail certificates; and mail flow. In this video; Michael Murphy demonstrates the uses of the HCW.
-
Hybrid Deployments
Microsoft Exchange Server 2013 allows you to deploy mailboxes to the cloud to make Online Hosted Exchange accessible to users anywhere through the use of an on-premises solution. To harness this hybrid solution; several pre-requisites have to be met. In this video; Michael Murphy demonstrates how to create this hybrid deployment.
-
Information Rights Management
Information Rights Management (IRM) helps to ensure the confidentiality of e-mail messages in Microsoft Exchange Server 2013. In this video; Michael Murphy provides an overview of IRM's capabilities and restrictions; as well as its deployment features.
-
Integrating In-Place Federated Searches with SharePoint
Microsoft Exchange Server 2013 allows authorized SharePoint personnel to perform In-Place Federated searches on Exchange mailbox content from within the eDiscovery architecture. In this video; Michael Murphy demonstrates how to configure Exchange for SharePoint eDiscovery Center; and configure eDiscovery in SharePoint to allow In-Place Federated searches.
-
Mailbox Archiving
Microsoft Exchange Server 2013 In-Place Archiving allows you to store messages in an archive mailbox and eliminate the need for personal store (.pst) files. In this video; Michael Murphy demonstrates how mailbox archiving addresses the drawbacks associated with .pst files; and how to enable an In-Place Archive using the Exchange Admin Center (EAC) or the Exchange Management Shell (EMS).
-
Manage Resubmission and Reroute Queues II
With Microsoft Exchange Server 2013; you can resubmit messages to the message categorizer for processing or you can manually resubmit them by using Queue Viewer or the command shell. In this video; Michael Murphy considers resubmission options in Exchange Server 2013 for messages in the delivery; unreachable; and poison queues.
-
Manage Sharing Policies
In Microsoft Exchange Server 2013; you are able to define sharing policies that let you share calendar information with external users. In this video; Michael Murphy demonstrates how to create sharing policies using the Exchange Administrative Center (EAC) or Exchange Management Shell (EMS).
-
Management Role Assignment Policies
In Microsoft Exchange Server 2013; individuals are granted rights though management role assignment policies; using specific role-based access control cmdlets. In this video; Michael Murphy provides an overview of management role policies and demonstrates how to manage role groups and permissions.
-
Management Role Groups
In Microsoft Exchange Server 2013; Role-Based Access Control involves associating rights and permission sets with the correct role group. In this video; Michael Murphy provides an overview of the management role groups.
-
Managing Organization Relationships
Microsoft Exchange Server 2013 allows you to create or modify organization sharing relationships. In this video; Michael Murphy demonstrates how to manage these organization relationships in the on-premises organization.
-
Managing Resubmission and Reroute Queues I
In Microsoft Exchange Server 2013; queues are used to hold messages before; during; and after delivery. In this video; Michael Murphy explains how the resubmission and rerouting of messages is managed with queues in Exchange Server 2013.
-
Managing UM Language Packs
In Microsoft Exchange Server 2013; Unified Messaging (UM) language packs allow callers to select the language of the auto attendant that they speak to. In this video; Michael Murphy demonstrates how to manage language packs in the Exchange Management Shell (EMS) and the Exchange Administration Center (EAC).
-
Messaging Records Management (MRM)
When upgrading to Microsoft Exchange Server 2013; the messaging records management (MRM) technology employed by legacy servers implementing a managed mailbox policy need to be migrated to use a retention policy. In this video; Michael Murphy compares retention tags to managed folders; and demonstrates how to migrate mailbox users from managed folders using the Exchange Management Shell (EMS).
-
Microsoft Federation Gateways
Microsoft Exchange Server 2013 supports the Microsoft Federation Gateway service; which allows secure communication between an organization and any external service it wishes to use. In this video; Michael Murphy demonstrates how a federated trust can be created using the Exchange Administrative Center (EAC) or Exchange Management Shell (EMS).
-
Migrating a UM
In Microsoft Exchange Server 2013; migrating from a legacy messaging system to Unified Messaging (UM) in Microsoft Exchange Server 2013 involves several steps. In this video; Michael Murphy demonstrates the steps involved when migrating to UM from Microsoft Exchange Server 2010 to 2013.
-
Migrating Mailboxes
Microsoft Exchange Server 2013 provides enhanced management features that allow you to easily move mailboxes from a legacy source mailbox database to target mailboxes on an updated Exchange server. In this video; Michael Murphy demonstrates batch moves; migration endpoints; the different types of moves; and how to move mailboxes using the Exchange Management Shell (EMS) and Exchange Admin Center (EAS).
-
Migrating Public Folders I
When upgrading to Microsoft Exchange Server 2013; you have the option of migrating the public folders that provide data sharing and collaboration on the legacy server onto Exchange Server 2013. In this video; Michael Murphy demonstrates the limits of public folders; how to download migration scripts; and prepare for the migration of public folders.
-
Migrating Public Folders II
After acquiring migration scripts and preparing the servers; migrating legacy public folders to Microsoft Exchange Server 2013 is a multi-stage process that requires a careful and methodical approach. In this video; Michael Murphy demonstrates how to generate CSV files; create public folder mailboxes; and migrate public folders using the Exchange Management Shell (EMS).
-
Monitoring Calls and Call Statistics
Microsoft Exchange Server 2013 provides built-in functionality that enables you to obtain reports on services; including Unified Messaging (UM). The UM Call Statistics report provides information such as number of calls and quality of service. The reports help you identify deterioration in service; so you can resolve issues quickly. In this video; Michael Murphy discusses call monitoring and call statistics.
-
Move Users Between Dial Plans
In Microsoft Exchange Server 2013; Unified Messaging (UM) users can be assigned to a new dial plan after having previously being assigned a different dial plan. In this video; Michael Murphy demonstrates how a UM user can be moved between dial plans in the Exchange Management Shell (EMS) and Exchange Administrative Center (EAC).
-
Moving the Exchange System Mailbox Using the EAC
When upgrading to Microsoft Exchange Server 2013; moving the Microsoft Exchange system (arbitration) mailbox allows you to continue accessing organization-wide data and perform tasks such as eDiscovery searches. In this video; Michael Murphy demonstrates how to move the Microsoft Exchange system mailbox from Exchange 2012 to Exchange 2013 using the Exchange Admin Center (EAC) and the Exchange Management Shell (EMS).
-
Moving UM Mailboxes Between Sites
In Microsoft Exchange Server 2013; Unified Messaging (UM) mailboxes may be moved between or within organizations. In this video; Michael Murphy demonstrates how to execute a local batch in the Exchange Management Shell (EMS) and the Exchange Administration Center (EAC) to move mailboxes.
-
Moving UM Mailboxes Cross Forest Example
In Microsoft Exchange Server 2013; you need the remote credentials when you move Unified Messaging (UM) mailboxes between forests. In this video; Michael Murphy demonstrates how a cross-forest move can be executed in the Exchange Management Shell (EMS).
-
Online Archiving
Microsoft Exchange Online Archiving (EOA) provides an archiving solution that helps simplify Exchange Server 2013 on-premises infrastructures by allowing users to store their historical e-mail content in cloud-based mailboxes. In this video; Michael Murphy demonstrates how to enable Exchange 2013 features by configuring OAuth authentication; before enabling EOA for an Exchange 2013 hybrid deployment.
-
Overview High Availability and Site Resilience
A highly available and site-resilient solution is required to protect your Exchange Server 2013 mailbox database and the data that resides in them. In this video; Michael Murphy discusses the interdependent services and how to address areas of critical failure in achieving an available and resilient site in Exchange.
-
Performing a Query-Based InPlace Hold
Microsoft Exchange Server 2013 allows you to preserve mailbox items based on a determined set of query parameters using the In-Place Hold eDiscovery feature. In this video; Michael Murphy demonstrates how to place a user's mailbox on Hold using either the In-Place eDiscovery and Hold wizard or the Exchange Management Shell (EMS).
-
Performing Steps for Site Rollover
In certain disaster recovery scenarios for Microsoft Exchange Server 2013; it may be necessary to perform datacenter switchovers. In this video; Michael Murphy demonstrates the actions that the administrator can take to restore client connectivity to the secondary site if the primary datacenter fails or goes offline.
-
Performing Steps for Transport Rollover
In Microsoft Exchange Server 2013; every message that comes into the transport pipeline is copied and sent to a Safety Net on another server. In this video; Michael Murphy demonstrates what happens in two transport failover scenarios.
-
Pipeline Tracing
Microsoft Exchange Server 2013 enables you to configure pipeline tracing; which is useful if a user is consistently having trouble delivering a message. Pipeline tracing captures the message; as well as the path it traverses through the transport pipeline. In this video; Michael Murphy explains how pipeline tracing enables you to trace why a message fails to deliver.
-
Planning and Configuring Send/Receive Connectors for Site Resilience
Simple Mail Transfer Protocol (SMTP) connectors are software interfaces that direct the routing of e-mails in Microsoft Exchange Server 2013. In this video; Michael Murphy demonstrates how send; receive; partner; and foreign SMTP connectors are configured to process outgoing and incoming emails for site resilience in Exchange Server 2013.
-
Planning and Delegating RBAC Roles for eDiscovery
Microsoft Exchange Server 2013 Role Based Access Control (RBAC) allows you to provide the Discovery Management role to non-technical users; so they can perform In-Place eDiscovery searches. In this video; Michael Murphy demonstrates the Discovery Management role group and management roles; and how to create a custom management scope for eDiscovery.
-
Planning and Implementing Datacenter Activation Coordination (DAC) I
Datacenter Activation Coordination (DAC) mode is a property of a database availability group (DAG). It is used to prevent split brain syndrome in Microsoft Exchange Server 2013. In this video; Michael Murphy describes how split brain can happen after a catastrophic failure and how the Datacenter Activation Coordination Protocol (DACP) works to prevent it from occurring.
-
Planning and Implementing Datacenter Activation Coordination (DAC) II
With Microsoft Exchange Server 2013; you are able to implement Datacenter Activation Coordination (DAC) protocol. There are various limitations and advantages to doing so. In this video; Michael Murphy discusses the limitations in DAG; how to perform datacenters switchovers and manual switchovers; and how to enable DAC mode.
-
Planning Certificate Requirements for Site Failovers
Microsoft applications and services that integrate with Microsoft Exchange Server 2013 have different certificate requirements for datacenter switchovers. In this video; Michael Murphy discusses the certificate requirements that enable Microsoft applications and services to connect to Exchange Server 2013 after a switchover.
-
Planning Cross-Site DAG Configuration – Secondary Datacenters
You can extend a database availability group (DAG) across multiple datacenters when planning resilient cross-site configurations in Microsoft Exchange Server 2013. In this video; Michael Murphy discusses the key considerations when planning a cross-site DAG configuration and extending single and multiple DAGs across two datacenters.
-
Planning Cross-Site DAG Configuration – Single DAG; Three AD Sites
In the optimized site resilient solution; a single database availability group (DAG) is configured with three Active Directory (AD) sites in Microsoft Exchange Server 2013. In this video; discusses the effectiveness of a single DAG; three AD site configuration; its drawbacks; and how it compares to a multiple DAG; two AD site configuration.
-
Planning Cross-Site DAG Configuration - SLA
Service level agreements (SLAs) define the resilience and availability expectations of an organization when planning cross-site DAG configurations in Microsoft Exchange Server 2013. In this video; Michael Murphy describes a site resilient solution and the key aspects of an effective SLA that includes a recovery time objective (RTO) and recovery point objective (RPO).
-
Planning Site-Resilient Namespaces – Cross-Forest Namespaces
In Microsoft Exchange Server 2013; there are best practices for managing cross-forest namespaces. In this video; Michael Murphy discusses how to manage cross-forest namespaces in Exchange 2013.
-
Planning Site-Resilient Namespaces – Internal and External Namespaces
There are best practices for managing internal and external namespaces in Microsoft Exchange 2013 to eliminate a disjoin between the Active Directory name and the Internet presence of the namespace. In this video; Michael Murphy discusses how to manage internal and external namespaces; within Exchange 2013.
-
Planning Site-Resilient Namespaces – Load Balancing I
In Microsoft Exchange Server 2013; load balancing is more flexible due to changes in the Client Access Server (CAS) architecture. In this video; Michael Murphy discusses the application of Client Access Server (CAS) namespace load balancing in Exchange 2013.
-
Planning Site-Resilient Namespaces – Load Balancing II
In Microsoft Exchange Server 2013; DNS round robin is the key method for load balancing Client Access Server (CAS). In this video; Michael Murphy discusses the DNS round robin method of load balancing in Exchange 2013.
-
Planning Site-Resilient Namespaces – Load Balancing Scenarios I
In Microsoft Exchange Server 2013; there are several load balancing scenarios that can be implemented; depending on your requirements. In this video; Michael Murphy discusses the implementation of single and multiple namespace load balancing within different functional scenarios.
-
Planning Site-Resilient Namespaces – Load Balancing Scenarios II
In Microsoft Exchange Server 2013; load balancing can be implemented at Layer 4 or 7 of the OSI model. In this video; Michael Murphy compares single and multiple namespace load balancing at different layers of the OSI model.
-
Planning Site-Resilient Namespaces – Namespace Design
In Microsoft Exchange Server 2013; there are several best practices for designing and developing site-resilient namespaces. In this video; Michael Murphy discusses how to design site-resilient namespaces in Exchange 2013.
-
Planning Site-Resilient Namespaces – Namespace Models
In Microsoft Exchange Server 2013; several best practices should be followed for designing and developing site resilient namespaces. In this video; Michael Murphy discusses how to use and manage unbound namespaces; in an Exchange environment.
-
Planning Site-Resilient Namespaces – Namespace Models Bound Model
In Microsoft Exchange Server 2013; several best practices should be followed for designing and developing site resilient namespaces. In this video; Michael Murphy discusses how to use and manage bound; and combined bound and unbound namespaces; in an Exchange environment.
-
Planning Site-Resilient Namespaces – Other Namespaces
In Microsoft Exchange Server 2013; there are several best practices for managing required namespaces; such as Autodiscover and legacy namespaces. In this video; Michael Murphy discusses how to manage the required namespaces of Exchange 2013.
-
Predicting Client Behavior during a Rollover
Microsoft Exchange Server 2013 leverages the inherent namespace tolerance by using multiple Internet Protocol (IP) addresses; datacenters; and Active Directory (AD) sites with load balancers for automatic failover. In this video; Michael Murphy discusses how automatic adjustments on the client side will compensate for the loss of a single hardware load balancer without the need for administrative intervention.
-
Private Key Availability
Microsoft Exchange Server 2013 enables you to archive the private key of a certificate so that if the key or certificate is ever lost; the private key can be retrieved. In this video; Michael Murphy provides an overview of private key archival.
-
Problems with SSO/AD FS
Microsoft Exchange Server 2013 enables you to create objects in Active Directory and then clone those objects in the cloud using directory synchronization. When configuring Active Directory Federated Services (AD FS); there are various issues that can arise. These issues can lead to authentication issues surrounding single sign-on (SSO). In this video; Michael Murphy provides an overview of these problems.
-
Proxy Redirection Issues
In Microsoft Exchange Server 2013; the Internet-facing 2013 Client Access Server (CAS) is able to proxy all incoming client requests. The process differs according to whether the user's mailbox is on Exchange 2007 or Exchange 2013. In this video; Michael Murphy provides an overview of proxy redirection issues.
-
Queue Viewer
The Queue Viewer in Microsoft Exchange Server 2013 allows you to view the contents and status of mail delivery queues. You can also perform various actions on the queue; such as deleting messages or suspending the queue. In this video; Michael Murphy discusses the information provided by the Queue Viewer and the various tasks you can perform on queues.
-
Quorum Options – Quorum Concept
Quorum is employed by Windows failover clusters to allow the majority of a DAG's nodes to be online and functional in Exchange Server 2013. In this video; Michael Murphy defines quorum and how it ensures consistency and acts as a tie-breaker; before discussing DAG quorum models and the dynamic quorum feature in Windows Server 2012.
-
RBAC
Role-based access control (RBAC) is an approach to assigning end-user and administrative permissions in Microsoft Exchange Server 2013. In this video; Michael Murphy describes how the RBAC method has been refined and perfected.
-
RCA Overview
Microsoft Exchange Server 2013 supports the Remote Connectivity Analyzer (RCA); which enables you to identify remote connectivity issues for clients and provides you with guidance and pointers on how to correct those issues. In this video; Michael Murphy discusses how RCA can be used effectively.
-
Restore-DatabaseAvailabilityGroup
Microsoft Exchange Server 2013 enables you to perform easy manual switchovers between datacenters; using Datacenter Activation Coordination (DAC) mode. In DAC mode; the Stop-; Start; and Restore-Database AvailabilityGroup cmdlets can be used to perform this switchover. In this video; Michael Murphy provides an overview on how to use these cmdlets.
-
Retention Tags
Organizing mail with message retention management (MRM) in Microsoft Exchange Server 2013 depends on the retention tags used to apply specific actions to mailbox items through a retention policy. In this video; Michael Murphy demonstrates how MRM is achieved using retention tags; and the process; and different types of retention tags that can be applied to a retention policy.
-
S/MIME
Microsoft Exchange Server 2013 supports the use of Secure Multipurpose Internet Mail Extensions (S/MIME). This standard for public encryption is used to provide digital signing of messages and end-to-end encryption of mail content. In this video; Michael Murphy discusses S/MIME; as well as its advantages and drawbacks.
-
Securing Exchange 2013 Messaging Solution
Microsoft Exchange Server 2013 comes with enhanced security capabilities to safeguard against threats like malware; phishing and hackers. In this video; Michael Murphy discusses some of the security features that secure the messaging infrastructure of Exchange Server 2013.
-
Set-MailboxDatabase
Microsoft Exchange Server 2013 allows you to enable or disable per-mailbox database journaling which captures all the messages sent to and from addresses on a mailbox database. In this video; Michael Murphy demonstrates how to use the Set-MailboxDatabase cmdlet in the Exchange Management Shell (EMS) to enable per-mailbox database journaling.
-
Single and Multi-Phase Upgrades
When upgrading to Microsoft Exchange Server 2013 from a legacy Exchange version; you can implement a migration strategy in single or multiple phases depending on organizational needs. In this video; Michael Murphy demonstrates the advantages of a single-phase and a multi-phase coexistent migration; and the process of transitioning from Exchange 2003 to Exchange 2013 and Exchange Online.
-
Smartcard Overview
In Microsoft Exchange Server 2013; smart cards; serve as a means of certificate-based authentication. In this video Michael Murphy provides an overview of these tamper-resistant authentication cards.
-
Startup Mode
When using Unified Messaging (UM) in Microsoft Exchange Server 2013; you can choose to encrypt voicemail messages. To ensure encryption; you need to change the startup mode from TCP to either Dual or TLS. Microsoft recommends setting it to Dual. In this video; Michael Murphy provides an overview on how to change the startup mode.
-
Steps to Remove 2010
When upgrading to Microsoft Exchange Server 2013; after the desired period of coexistence mode and with the necessary checks in place; removing a legacy Exchange server can be accomplished relatively easily in a few decommissioning steps. In this video; Michael Murphy demonstrates the steps remove Exchange 2010 and Exchange 2007.
-
Test Connectivity Cmdlets
Microsoft Exchange Server 2013 enables you to use the Exchange Management Shell (EMS) to perform testing. For instance; you can test the health of bad replication or client-side connectivity. In this video; Michael Murphy provides an overview of some of the connectivity cmdlets and parameters used to perform testing.
-
Testing IRMConfiguration
Microsoft Exchange Server 2013 can be integrated with Active Directory Rights Management Services (AD RMS). You can test AD RMS integration with Exchange using the Test-IRMConfiguration cmdlet to verify IRM functionality. In this video; Michael Murphy provides an overview of the Test-IRMConfiguration cmdlet.
-
Testing SMTP with Telnet
In Microsoft Exchange Server 2013; Telnet allows you to test the SMTP connection between messaging servers. It's not installed on Windows servers by default and needs to be added manually. In this video; Michael Murphy demonstrates the process of using Telnet to test SMTP and the various troubleshooting scenarios that should be considered.
-
Testing UMConnectivity and ExchangeUMCallFlow
Microsoft Exchange Server 2013 supports Unified Messaging (UM); which enables various types of messaging over a single interface. To test the UM service; you can use the Test-UMConnectivity cmdlet. The Test- ExchangeUMCallFlow cmdlet enables you to test the whole pipeline. In this video; Michael Murphy provides an overview on how to test UM connectivity.
-
The Set-AdminAuditLogConfig Command
Administrator audit logging is enabled by default in Microsoft Exchange Server 2013. This logging records the actions performed by administrators and users who have administrative privileges. In this video; Michael Murphy provides an overview of the Set-AdminAuditLogConfig command and its parameters.
-
The Set-MailboxAuditBypassAssociation Command
Microsoft Exchange Server 2013 enables you to perform mailbox auditing. Often third-party applications are downloaded and integrated into e-mail applications. These applications often generate too many unnecessary audit log entries. To avoid this; you can create a BypassAssociation. In this video; Michael Murphy explains the purpose of the Set-MailboxAuditBypassAssociation command.
-
Transport Rules
In Microsoft Exchange Server 2013; you are able to create transport rules that let you specify conditions under which mail is transmitted. A transport rule has three components – conditions; exceptions; and actions. In this video; Michael Murphy demonstrates how to create these rules in Exchange Administrative Center (EAC) or Exchange Management Shell (EMS).
-
Troubleshoot Cross-Forest Availability
Microsoft Exchange Server 2013 enables you to share free/busy calendar information between separate organizations. This form of sharing can occur when no trust relationship exists between the organizations and when a trust does exist. However; the level of information shared will differ for each one. In this video; Michael Murphy provides an overview on troubleshooting cross-forest availability.
-
Troubleshoot DAG Issues
In Microsoft Exchange Server 2013; you can test the health of the Database Availability Group (DAG) using the Test-ReplicationHealth cmdlet. The cmdlet can be used to perform various tests; including testing the cluster service and QuorumGroup. In this video; Michael Murphy discusses troubleshooting DAG.
-
Troubleshoot Quality for a Specific User
With Microsoft Exchange Server 2013; you can troubleshoot problems in Unified Messaging (UM) on a per-user basis or organizational basis. To troubleshoot problems on a per-user basis; you can use the user's call log. Or you can use the Call Statistics report if the problem is across an organization. In this video; Michael Murphy discusses troubleshooting quality in UM.
-
Troubleshoot with Get-ExchangeCertificate
Microsoft Exchange Server 2013 enables you to troubleshoot issues relating to certificates. For example; you can validate if a certificate is published correctly or ensure that a certificate is configured with the location of a certificate revocation list (CRL). In this video; Michael Murphy reviews how to troubleshoot certificates.
-
Troubleshooting and Configuring Mutual Transport Layer Security (MTLS)
Microsoft Exchange Server 2013 supports Unified Messaging (UM). UM ports differ depending on whether the Client Access Server (CAS) or the Mailbox server is used. If port conflicts occur; ports can be reassigned using the Exchange Administrative Center (EAC) or Exchange Management Shell (EMS). In this video; Michael Murphy discusses how to use Mutual Transport Layer Security (MTLS) with UM.
-
Troubleshooting DirSync
In Microsoft Exchange Server 2013; you can use the Active Directory Synchronization tool to synchronize content between an on-premise solution and an online deployment. Sometimes objects may not sync because they fail to update; or changes made to the on-premise solution may not reflect in the cloud. In this video; Michael Murphy discusses how to troubleshoot DirSync.
-
Troubleshooting Exchange Federation Trust and Organization Relationships
Microsoft Exchange Server 2013 enables you to configure federated sharing; which involves configuring a federation trust; an organization relationship; and a sharing policy. To troubleshoot federation sharing; you can test the federation trust certificate or even test OAuth connectivity. In this video; Michael Murphy provides an overview on troubleshooting federation trust and organization relationships.
-
Troubleshooting Mail Flow
In Microsoft Exchange Server 2013; there can be numerous causes of mail flow disruptions; including DNS and site link failures. Troubleshooting should start with determining the scope of the problem. In this video; Michael Murphy demonstrates how to troubleshoot mail flow in Exchange using the Test-Mailflow cmdlet.
-
Troubleshooting the Autodiscover Service
Microsoft Exchange Server 2013 supports the Autodiscover service; which enables users to access their Inbox. If this service fails; you can use Outlook's built-in Test E-mail AutoConfiguration tool to validate Autodiscover and identify errors. In this video; Michael Murphy discusses how to troubleshoot the Autodiscover service.
-
UM Architecture Flow
Microsoft Exchange Server 2013 makes provision for unanswered calls to a UM client. The call flow consists of various steps; which result in a message waiting indicator; voicemail; or an e-mail message that contains the voicemail as an attachment. In this video; Michael Murphy describes the UM call architecture flow.
-
UM Architecture Ports
In Microsoft Exchange Server 2013; the Unified Messaging (UM) process consists of three steps that involve receiving incoming calls; redirecting traffic to a TCP port; and establishing a media channel between the mailbox server and the source. In this video; Michael Murphy describes the UM process and its port architecture.
-
UM Deployment
Microsoft Exchange Server 2013 supports Unified Messaging (UM). The UM deployment process consists of a series of steps. These are configuring the telephony components; installing mailbox and cache servers; and then configuring UM. In this video; Michael Murphy discusses the UM deployment process.
-
UM Overview
Microsoft Exchange Server 2013 supports Unified Messaging (UM); which enables you to communicate via e-mail; fax; or voicemail from a single communication channel. A UM deployment has various components and relies on various protocols to function. In this video; Michael Murphy provides an overview of UM.
-
UM Voice Architecture Services
Microsoft Exchange Server 2013 supports various processes for Unified Messaging (UM). Services used for UM in Exchange 2013 include the Client Access Server (CAS) and Mailbox servers. In this video; Michael Murphy provides an overview of these voice architecture services.
-
Upgrade Prereqs
The migration from one version of Microsoft Exchange Server to another has prerequisites that must be fulfilled. In this video; Michael Murphy demonstrates the prerequisites to migrate from Microsoft Exchange Server 2007 and 2010 to 2013.
-
Voice Architecture I
In Microsoft Exchange Server 2013; there are different Unified Messaging (UM) services. For example; the Call Router service on the CAS server and the UM service components on the Mailbox server. Each service is responsible for different functions and runs on a different port. In this video; Michael Murphy provides an overview of UM voice architecture.
-
Voice Architecture II
Microsoft Exchange Server 2013 supports Unified Messaging (UM). This service runs on a specific set of ports and protocols. In Exchange 2013; UM has been enhanced to provide greater support and functionality; but like with all services; there are various issues to consider when deploying UM. In this video; Michael Murphy describes UM voice architecture.
-
Exploring Enhanced Data Loss Prevention Capabilities
After watching this video; you will be able to recognize the new DLP sensitive information types.
-
Exploring How to Find Mail and People
After watching this video; you will be able to recognize the improved search functionality including the search suggestions and refiners and the ability to find people quickly when creating an e-mail message.
-
Exploring Hybrid Improvements
After watching this video; you will be able to recognize the improvements made to Hybrid Configuration including the cloud-based Hybrid Configuration Wizard.
-
Exploring Single-Line View and Undo Features
After watching this video; you will be able to recognize the new single-line inbox view and the undo button features.
-
Exploring the Archiving and Emojis Features
After watching this video; you will be able to recognize where to locate and use the archiving and emojis features.
-
Exploring the Birthday Calendar and Calendar Search
After watching this video; you will be able to recognize and use the new birthday calendar and calendar search features.
-
Exploring the Charms Calendar Feature
After watching this video; you will be able to recognize and configure charms in calendar events.
-
Exploring the E-mail Reminder Calendar Feature
After watching this video; you will be able to recognize and use the new e-mail reminder feature for calendar events.
-
Exploring the Inline Image and Inline Reply Features
After watching this video; you will be able to recognize the new inline image and inline reply features; and how to use them.
-
Exploring the New Action Toolbar and Message Options
After watching this video; you will be able to identify the new action toolbar and its options; the available message controls; and subject line and message visibility.
-
Exploring the New Sweep Feature and Themes
After watching this video; you will be able to identify and use the new sweep feature; and the new available themes.
-
Exploring the Outlook Web Experience
After watching this video; you will be able to recognize the improved Outlook web experience including supported browsers; cleaner user interface look and feel; and accessing options using AppLauncher.
-
Exploring the Pins and Flags Features
After watching this video; you will be able to identify the new pin and flag features; and how to use them.
-
Exploring the Propose New Time Calendar Feature
After watching this video; you will be able to identify and configure the Propose New Time feature in calendar events.
-
Exploring the Simplified Architecture
After watching this video; you will be able to recognize the improved simplified architecture including server roles.
-
Identifying Updated Compliance Features
After watching this video; you will be able to identify the improved compliance features including auditing and the in-place eDiscovery and hold features.
-
Exploring Performance and Reliability Features
After watching this video; you will be able to recognize the performance and reliability improvements; including faster recovery; simple deployments; and automated repair.
-
Adding a Microsoft Account
After watching this video; you will be able to add a Microsoft account.
-
Bitlocker without TPM
After watching this video; you will be able to implement Bitlocker with TPM.
-
Edge Homepage
After watching this video; you will be able to make use of the Edge homepage.
-
Enabling Sideloading
After watching this video; you will be able to enable sideloading.
-
Exclude Process in Windows Defender
After watching this video; you will be able to use the exclude process in Windows Defender.
-
Hyper-V Virtual Switch
After watching this video; you will be able to use the Hyper-V virtual switch.
-
Remote Desktop Connection Settings
After watching this video; you will be able to implement remote desktop connection settings.
-
Start Sync Settings
After watching this video; you will be able to implement sync settings.
-
Storage Spaces
After watching this video; you will be able to implement storage spaces.
-
Updating Settings
After watching this video; you will be able to update settings.
-
Command Prompt
Windows 10 has a number of features that have been enhanced; inclusing the Command Prompt. To fully understand these changes you need to review how it behaved in previous versions of Windows. In this video; Jason Yates demonstrates the new features and enhancements that have been made to the Command Prompt.
-
File Explorer
Windows 10 has made some enhancements to File Explorer leading to additional convenience for users. In this video; Jason yates demonstrates some of the features that have been made to File Explorer; such as the Home location and its groups.
-
Modern Apps
Using applications in Windows 8 was not as user friendly to desktop users compared to touch screen users. This has been addressed in Windows 10. In this video; Jason Yates demonstrates how to use the Modern Apps feature in Windows 10.
-
Overview of Windows 10 and the Technical Preview
Windows 10 is the latest operating system from Microsoft. In this video; Jason Yates demonstrates the new Windows 10 Technical Preview and what you can learn from it.
-
Start Menu for Desktop Users
Windows 10 has incorporated the functionality of Windows 7 with the look and feel of Windows 8. In this video; Jason Yates demonstrates the desktop start up menu in the new Windows 10 environment.
-
Start Screen for Tablet Users
Windows 10 has functionality that allows you to change the Start Screen for tablet users; and looks a lot like Windows 8. In this video; Jason Yates demonstrates how to change the appearance of the Start Screen.
-
Task View
Windows 10 has a Task View which allows you to switch between multiple windows in a more flexible way than in Windows 8. In this video; Jason Yates demonstrates how Task View makes it easier to switch between multiple windows.
-
Virtual Desktops
Windows 10 has a number of new features; including Virtual Desktops which give users another option to group and manage multiple windows. In this video; Jason Yates demonstrates how to use Virtual Desktops and highlights some of their features.
-
Windows Snap
Windows 10 has a few features that have been enhanced; including Windows Snap which allows you to manage multiple open windows on a desktop. In this video; Jason Yates demonstrates some of the enhancements that have been made to Windows Snap.
-
Preparing a Host for Remote Management
After watching this video; you will be able to prepare a Mac OS X Yosemite host for remote management.
-
Configuring Disks
With elevated administrative credentials; you'll be able to utilize the simple interface in the Disk Management section of the Computer Management tool in Windows 7 to easily configure disks. In this video; Jonathan Summers uses Disk Management in Windows 7 to create and format a partition on a basic disk.
-
Application Creation
In Microsoft BizTalk Server; you can use the Microsoft Installer (MSI) to create or import applications; such as modules; in your systems via the BizTalk Server Group. In this video; Clive Herman demonstrates how to create; import; and install applications using the Microsoft Installer in the BizTalk 2010 Server.
-
Application Deployment
Microsoft BizTalk Server allows you to save; publish; and deploy applications across a server farm. In this video; Clive Herman demonstrates how to sign a document and set up application requirements during the creation of an MSI object.
-
Application Removal
In Microsoft BizTalk Server you can remove components; such as applications; files; and modules; contained in the Microsoft Installer (MSI). In this video; Clive Herman demonstrates how to uninstall modules from the MSI.
-
Application Starting and Testing
Microsoft BizTalk Server allows you to test deployed applications. In this video; Clive Herman demonstrates how to check that the processes executed during a test have worked correctly.
-
Application Version Control and Synchronization
Microsoft BizTalk Server allows you to organize your applications in BizTalk 2010 and synchronize and maintain control of all your application versions on various systems. In this video; Clive Herman demonstrates how to utilize BizTalk 2010 to edit and update applications over various system versions.
-
Applying the NEW Adapters – LOB
In Microsoft BizTalk Server; there is a new Adapter in the Line of Business (LOB) environment which allows you to integrate various applications easily. In this video; Clive Herman demonstrates the TwoWayBridge capability in the Cloud that can be used to connect a number of LOB applications; such as SharePoint and SQL Server.
-
Applying the NEW Adapters - SharePoint
Microsoft BizTalk Server uses the Windows SharePoint Services Adapter Web Service component to process inbound and outbound documents on multiple sites through SharePoint Services. In this video; Clive Herman demonstrates how to create a receive port and location; and then configure Windows SharePoint Services and Source Library URLs.
-
Azure
In Microsoft BizTalk Server Azure; you can use Azure to create virtual machines and expand your computing power. In this video; Clive Herman uses Azure to demonstrate how to add additional computing power.
-
Backing Up and Restoring Data
You can use Microsoft BizTalk 2013 to backup and restore server data. In this video; Clive Herman demonstrates how to administer application backups using the BizTalk Server Administration tool. He also explains the various backup levels in the Message Box.
-
BAM Activities and Monitoring
Microsoft BizTalk Server 2013's Business Activity Monitoring (BAM) capabilities offer business analysts multiple dynamic and archived views of BizTalk data and business processes. In this video; Clive Herman demonstrates how to incorporate BAM Add-Ins into Excel; create new activities; define and promote items of different types; and initiate the processing of a view.
-
BAM Activity Workbook
Microsoft BizTalk Server 2013's Business Activity Monitoring (BAM) capabilities allow the creation of activity workbooks as Excel views. In this video; Clive Herman demonstrates how to process an Excel activity workbook view; create a Pivot Table containing selected fields and data; and prepare to view it from the Business activity portal.
-
BAM Interceptor
Microsoft BizTalk Server 2013's BAM Interceptor allows the interception of Business Activity Monitoring processes and the introduction of custom .NET code for alerts; display; or information purposes. In this video; Clive Herman demonstrates how to use the BAM Interceptor to introduce information derived from outside the Business Activity Monitoring message flow through the Tracking Profile Editor.
-
BAM Observation Model Creation
In Microsoft BizTalk; you can use Excel to create a Business Activity Monitor (BAM) Observation Model for users and stakeholders. In this video; Clive Herman demonstrates how to create a new BAM view and configure its elements with specific information.
-
BAM Observation Model Deployment
You can use Microsoft BizTalk to deploy a Business Activity Monitoring (BAM) Observation Model. In this video; Clive Herman demonstrates how to use the file used for BAM deployment.
-
BAM Portal Access
Microsoft BizTalk Server 2013's Business Activity Monitoring (BAM) views; offer business analysts query criteria that allows them to extract and filter results from dynamic datasets or view them in aggregation Pivot Tables and charts. In this video; Clive Herman uses a Business visibility portal and the Tracking Profile Editor to demonstrate how dynamic data is accessed; manipulated; and viewed.
-
BAM Process Definition
In Microsoft BizTalk; you can use Business Activity Monitoring (BAM) to capture and monitor a business activity. In this video; Clive Herman demonstrates how to use Microsoft Excel to define a process which can be monitored; and how to make configuration changes in Excel which will allow certain processes to be monitored.
-
BAM Tracking Profiles
Microsoft BizTalk Server 2013's Tracking Profile Editor allows the creation of tracking profiles to view documents flowing step by step through BizTalk. In this video; Clive Herman uses BizTalk's Profile Tracking Editor to tie event source items to a selected BAM Activity Definition and create a tracking profile.
-
Binding the Orchestration
In Microsoft BizTalk; after you have built the send and receive logical and physical ports; you need to combine them to the orchestration. In this video; Clive Herman demonstrates how to combine your send and receive ports to the orchestration based on the input ports; outbound logical ports; and bindings; and create sndError and SendShip Notice messages.
-
Building Messages and Promoting Elements
In Microsoft BizTalk; elements get promoted when you build messages and want to have access to BAM. In this video; Clive Herman demonstrates the new schemas in BizTalk; how to build a message; promote elements; use EDI requests; and configure ports.
-
Business Activity Monitoring (BAM)
Microsoft BizTalk Server 2013's Business Activity Monitoring (BAM) capabilities offer business analysts dynamic and archived views of BizTalk data and business processes. In this video; Clive Herman uses a Business visibility portal's aggregation viewer and search functionality to demonstrate the dynamic processing and querying of purchase orders.
-
Configuring a Server in the Cloud
In the last three years; Microsoft has put a lot of effort into putting all of their products into the cloud environment; and this is particularly true for Microsoft BizTalk 2013. In this video; Clive Herman demonstrates how to configure a server in the cloud.
-
Configuring New MAPPER
Microsoft BizTalk Server 2013's Mapper allows easy Electronic Data Interchange (EDI) across organizations through the BizTalk Administration Console and Visual Studio. In this video; Clive Herman uses Microsoft Visual Studio to demonstrate the integration of BizTalk Toolbox EDI and XML components needed to build predefined BizTalk items.
-
Creating Basic Business Rules
Microsoft BizTalk Server allows you to create and add basic rules to documents. In this video; Clive Herman demonstrates how to create and add basic vocabulary definitions to a document by creating a Constant Value.
-
Creating Complex Business Rules
In Microsoft BizTalk Server; you have many options available you can use to create complex business rules. In this video; Clive Herman demonstrates how to use the Vocabularies option to develop complex business rules with Functions and Predicates.
-
Creating Envelopes
Microsoft BizTalk Server allows for the definition of envelopes to wrap child schemas; the defined subrecords of which are processed as distinct messages. In this video; Clive Herman demonstrates the selection of child-item containers in a schema and their configuration as envelopes containing subrecords.
-
Creating MAPS XML Document Formats
Microsoft BizTalk Server 2013's Mapper allows the dynamic mapping and calculation of document fields in Visual Studio. In this video; Clive Herman demonstrates how to add a named BizTalk map to a project and map or link field items by structure from a source schema to its equivalent items in a destination schema.
-
Deploying Business Policies
Microsoft BizTalk Server allows you to deploy business policies in a business environment. In this video; Clive Herman demonstrates how to deploy a discount policy by configuring a SharePoint service on a Receive Location.
-
Development Production
You can use Microsoft BizTalk in the cloud as a schema in order to make the Development environment as similar as possible to the Production environment. In this video; Clive Herman demonstrates the components of the BizTalk Production environment.
-
Enhancing Business Rules
In Microsoft BizTalk Server; you can add sophistication and elegance to business rules to fit unique environments. In this video; Clive Herman demonstrates how to use the BizTalk Server Samples Folder to examine enhanced business rules.
-
Enterprise Service Bus Toolkit
The Enterprise Service Bus is a new feature of both BizTalk 2013 and a number of cloud services. With BizTalk 2013; there is an Enterprise Service Bus Toolkit to make life easier for you. In this video; Clive Herman demonstrates how to download the Enterprise Service Bus Toolkit.
-
Exploring Business Processes
Microsoft BizTalk performs a variety of business processes; such as invoicing and order entry. In this video; Clive Herman uses the AdventureWorks example company to explore some of these processes; including the Business Rule Composer; policies; scalability; and consistency in BizTalk.
-
Functoids
In Microsoft BizTalk Server; you can use functoids to provide a range of functions for manipulating data. In this video; Clive Herman demonstrates the concatenate; string; and database functoids; as well as the functoid inputs and categories that are available in BizTalk.
-
Hosting a Server in the Cloud
Microsoft BizTalk Server has made hosting a server in the cloud easier and safer than ever. In this video; Clive Herman demonstrates new BizTalk Server features including gallery standards and the VM agent.
-
Hosting Rapid Development in the Cloud
In Microsoft BizTalk Server; you can create a development environment in the Cloud to use for Rapid Development. In this video; Clive Herman demonstrates how to create virtual machines to use as a development environment that mimics the production environment.
-
Hybrid On-Premise and the Cloud
You can use Microsoft BizTalk Server to create a Hybrid environment both On-Premise and in the Cloud. In this video; Clive Herman demonstrates how to use the Enterprise Service Bus to set up the components for a complete Hybrid environment.
-
Importing Schemas
Microsoft BizTalk Server 2013 allows the import of XML documents; or documents that have been converted to XML; allowing for the import of schemas into existing business solutions. In this video; Clive Herman uses Visual Studio to import; in XSD format; an existing Oracle item into a BizTalk solution.
-
Management Pack
You can use the BizTalk Server 2013 Monitoring Management Pack to monitor capabilities for artifacts and BizTalk related Platform Components. In this video; Clive Herman demonstrates how to download and install the Management Pack; and explains the basic contents of the folder downloaded from the Microsoft Download Center.
-
Mapping
Microsoft BizTalk Server allows you to use document mapping to integrate data from one server to another. In this video; Clive Herman demonstrates using document mapping in BizTalk to create an XML Stylesheet Translation (XSLT) table.
-
Message Processing
Microsoft BizTalk Server handles all documents as messages. In this video; Clive Herman demonstrates how these messages are processed in a Service-Oriented Architecture system.
-
Orchestration
In Microsoft BizTalk Server; you can use orchestration to integrate one application with another application. In this video; Clive Herman demonstrate how to create an orchestration and specify its operations in BizTalk.
-
Promoting Properties
Microsoft BizTalk Server 2013 allows the promotion; in Visual Studio; of a document's instance-specific or general data-field properties. In this video; Clive Herman demonstrates how to promote a message's field to metadata in Visual Studio to allow routing decisions and Business Activity Monitoring (BAM).
-
Publishing and Subscribing
In Microsoft BizTalk Server; Publishing and Subscribing provide a great measure of reliability; availability; and scalability. In this video; Clive Herman demonstrates the basics of operating in the BizTalk publishing environment.
-
Receive Ports and Locations
In Microsoft BizTalk; Receive Ports are the connection between the virtual and physical location; and can be either static or dynamic. In this video; Clive Herman demonstrates how to set up a Receive Port; and explains how they work.
-
Receiving Services
In BizTalk; one of the first components you come across is Receive Services. In this video; Clive Herman demonstrates the automatic processing that occurs in the basic environment when an order is received.
-
Secure File Transfer
In Microsoft BizTalk Server; you can use Secure File Transfer Protocol (SFTP) to transmit data from one location to another. In this video; Clive Herman uses BizTalk 2013 to set up a ReceivePort.
-
Send Ports and Locations
In Microsoft BizTalk; much like Receive Ports and locations; Send Ports and locations can also be both physical and virtual. In this video; Clive Herman demonstrates how to create Send Ports and guides you through their various requirements and components.
-
SharePoint Workflows
In Microsoft BizTalk Server; collaboration is the key to business organization workflow methods. You can use SharePoint to control that collaboration. In this video; Clive Herman demonstrates how to use the Use Client OM option to communicate with a SharePoint Server.
-
Simple Document Schemas
In Microsoft BizTalk Server; you can easily create and use Simple Document Schemas for individual business solutions. In this video; Clive Herman demonstrates how to create and customize a Simple Document Schema by adding components to an existing record.
-
SOAP Header Schemas
Microsoft BizTalk Server has a range of standardized document formats; one of the most common being the Simple Open Application Protocol (SOAP). In this video; Clive Herman demonstrates how to use SOAP header schemas; as well as the impact of HTML5 and JSON on this protocol.
-
SWIFT; X12 EDI; EDIFACT and HIPAA 5010
Microsoft BizTalk Server has added a number of new features especially in the HIPAA environment. In this video; Clive Herman demonstrates some of the new features added to BizTalk; where to find them; and how to use them.
-
Testing Application Business Rules
In Microsoft BizTalk; when business rules change it's important to have a method capable of checking if they have been applied correctly. In this video; Clive Herman demonstrates how to test new bindings and application business rules.
-
Tracking Message Flows
In Microsoft BizTalk; when something goes wrong; you are able to follow the track that a message flowed through. In this video; Clive Herman demonstrates the section of BizTalk that deals with the tracking of queries; explores data tracking; and views a message flow.
-
Using BTSTASK to Export Applications
In Microsoft BizTalk; it can be easier to use a scripting environment than a graphic user interface. In this video; Clive Herman demonstrates how to export an application using BTSTASK.
-
Using BTSTASK to Import Applications
You can use Microsoft BizTalk to import working applications from other systems. In this video; Clive Herman demonstrates how to import an application from the Module4-BAM.msi location.
-
Using Functoids in the BizTalk Mapper Module
There are a variety of new functoids contained in Microsoft BizTalk Server. In this video; Clive Herman demonstrates how to add; map; and link a functoid; and examines the different functoids available for use.
-
Validating Regular Expressions
Microsoft BizTalk Server 2013 uses pattern matching to validate regular expressions and restrict inbound field-element data. In this video; Clive Herman demonstrates how to restrict the properties of BizTalk element fields and uses Visual Studio's Pattern Editor to define a regular expression to which inbound data should conform.
-
XML Document Processing
In Microsoft BizTalk Server; you can convert documents into XML documents. In this video; Clive Herman demonstrates the various XML document schemas available in BizTalk 2013 and how to access the preloaded standard file structures in the BizTalk EDI folder.
-
XML Document Schemas
You can use Microsoft BizTalk Server to create a document schema in XSD from well-formed XML. In this video; Clive Herman demonstrates how to generate a well-formed XML Document Schemas.
-
Add Remove Tags from Retention Policy
Adding and removing tags from a retention policy in Microsoft Exchange Server 2013 is easy. In this video; David Santana demonstrates how to add and remove retention tags.
-
Adding Users to Administration Roles
Microsoft Exchange Server 2013 allows you to add users to administration roles. In this video; David Santana demonstrates how to assign an administration role to a user.
-
Apply Retention Policy to Mailbox User
Applying a retention policy to a specific user in Microsoft Exchange Server 2013 is possible for members of the records management role group. In this video; David Santana demonstrates how to apply a retention policy to a mailbox user.
-
Apply Retention Tags to Multiple Mailboxes via PowerShell
Applying retention tags to multiple mailboxes via PowerShell in Microsoft Exchange Server 2013 is simple. In this video; David Santana demonstrates how to choose multiple mailboxes to apply retention tags.
-
Block Version of Outlook
Configuring Outlook client blocking in Microsoft Exchange Server 2013 allows you to block users who are running older versions of Outlook from accessing your Exchange mailboxes. In this video; David Santana demonstrates how to block a specific MAPI client version.
-
Configure Manage System
The Manage Folders Assistant in Microsoft Exchange Server 2013 allows users to change the work cycles. In this video; David Santana demonstrates how to configure the Manage Folders Assistant.
-
Create an Email Address Policy
Creating email address policies in Microsoft Exchange Server 2013 allows users to generate primary and secondary email address. In this video; David Santana demonstrates how to create and apply an email address policy.
-
Create Retention Policies
Creating retention policies in Microsoft Exchange Server 2013 allows users to incorporate retention tags to be applied to a specific mailbox. In this video; David Santana demonstrates how to create a retention policy.
-
Create Retention Tag
Creating retention tags in Microsoft Exchange Server 2013 allows users to retain mail items and mailboxes for specific periods of time. In this video; David Santana reviews some of the new technologies; features; and services in the new Exchange Admin Center and demonstrates how to create retention tags.
-
Creating a Distribution Group
Microsoft Exchange Server 2013 allows users to create distribution groups to list the mailbox users in a specific group. In this video; David Santana demonstrates how to create a distribution group.
-
Creating a Dynamic Distribution Group
Creating a dynamic distribution group in Microsoft Exchange Server 2013 allows users to send an email to specific group that resides in a specific location; such as New York or Rochester. In this video; David Santana demonstrates how to create a dynamic distribution group.
-
Creating a Journal Rule
Creating Journal Rules in Microsoft Exchange Server 2013 allows users to forward specific messages to specific email accounts with the original messages attached in an attachment. In this video; David Santana demonstrates how to create a journal rule.
-
Creating a Mailbox
Microsoft Exchange Server 2013 allows you to create a mailbox for an existing user that has a user account but not a corresponding mailbox. In this video; David Santana demonstrates how to create a specific user mailbox.
-
Creating a New Role Assignment Policy
Creating a new role assignment policy in Microsoft Exchange Server 2013 allows you to grant a group of end-users the permission to set their Outlook Web App options and perform self-administrative tasks in their Outlook Web App. In this video; David Santana demonstrates how to create a new role assignment policy and customize permissions.
-
Creating a Room Mailbox
Creating a room mailbox in Microsoft Exchange Server 2013 allows users to appoint specific meeting dates and times by specifying a room. In this video; David Santana demonstrates how to create a room mailbox.
-
Creating an Equipment Mailbox
Microsoft Exchange Server 2013 allows users to create an equipment mailbox to book and track a specific equipment type; such as a projector. In this video; David Santana demonstrates how to create an equipment mailbox.
-
Creating Default Policy Tag
Creating a default policy tag in Microsoft Exchange Server 2013 allows users to delete all messages. In this video; David Santana demonstrates how to create a default policy tag by using the PowerShell.
-
Creating Public Folders
Creating public folders in Microsoft Exchange Server 2013 allows you to share access and provides an easy way to collect; organize; and share information with other users. In this video; David Santana demonstrates how to create a public folder.
-
Deleting Voicemail Messages
Microsoft Exchange Server 2013 allows users to delete voicemail messages. In this video; David Santana demonstrates how to delete a voicemail message by creating a specific default policy tag.
-
Granting Full Access
Microsoft Exchange Server 2013 allows you to grant other users full access to your mailbox. In this video; David Santana demonstrates how to grant full access rights to a mailbox user.
-
Granting Send on Behalf
Granting send on behalf in Microsoft Exchange Server 2013 allows a specific user to be able to send mail on behalf of the mailbox user that they have been assigned to. In this video; David Santana demonstrates how to apply send on behalf.
-
Managing Permissions on Public Folders
Microsoft Exchange Server 2013 simplifies managing permissions on public folders. In this video; David Santana demonstrates how to manage permissions on a public folder.
-
Outlook Web App Policies
Outlook Web App policies in Microsoft Exchange Server 2013 can be configured to control the features available to users. In this video; David Santana demonstrates how to create and apply an Outlook Web App policy.
-
Place a Mailbox on Retention Hold
Placing a mailbox on retention hold in Microsoft Exchange Server 2013 allows users on vacation to logon to their mailbox and change or delete items. In this video; David Santana demonstrates how to place a mailbox on retention hold.
-
Remove Retention Hold on Mailbox
Removing retention hold on a mailbox in Microsoft Exchange Server 2013 is essential when a user again becomes available. In this video; David Santana demonstrates how to remove a retention hold on a mailbox.
-
Restoring Access to a Blocked Outlook Client Version
Restoring access to a blocked Outlook client version in Microsoft Exchange Server 2013 allows a blocked user to access your Exchange mailboxes. In this video; David Santana demonstrates how to restore access for a specific mailbox user.
-
Send Messages to Moderator
Sending messages to the moderator in Microsoft Exchange Server 2013 allows users to have the message approved before it is sent to the intended recipient. In this video; David Santana demonstrates how to send messages to the moderator.
-
Setting Up an Undeliverable Report
Setting up an undeliverable report in Microsoft Exchange Server 2013 allows users to report all mails that failed to reach the intended email address. In this video; David Santana demonstrates how to set up an undeliverable report.
-
Start MRM Assistant
Starting the MRM assistant in Microsoft Exchange Server 2013 allows you to move or delete messages based on the settings. In this video; David Santana demonstrates how to use the Exchange Management Shell for 2013 and manually start the process.
-
Access and Security
Microsoft Internet Information Services (IIS) can be configured to require certificates or to use website authentication for security. In this video; Pierre Devereux demonstrates how you can add security to your websites by either using or setting up certificates; the self-signed certificate; or simple Windows Authentication.
-
Application Pools
Microsoft Internet Information Services (IIS) makes use of application pools; which let you manage your sites and applications at a more granular level. In this video; Pierre Devereux provides an overview on working with application pools; where; for example; you can isolate sites and services from each other or prevent one application from using resources from another application pool.
-
Certificates
After watching this video; you will be able to configure certificates on a Windows 10 device.
-
Communication Ports
Microsoft Internet Information Services (IIS) when installed; by default; creates an initial website and assigns port 80 to it. In this video; Pierre Devereux demonstrates how to change your default ports for use from another program or another application.
-
Completing a Certificate Request
In Microsoft Internet Information Services (IIS); as the administrator of the Certificate Authority; you are allowed to either approve and issue; or deny Certificate Requests that are sent to the Certificate Authority. In this video; Pierre Devereux demonstrates how to complete and issue Certificate Requests sent to the Certificate Authority through the IIS.
-
Configuring and Importing Certificates
Microsoft Internet Information Services (IIS) allow you to create certificate requests from within Windows. In this video; Pierre Devereux demonstrates how to create and import a certificate request from your Windows OS and then import this request into the IIS Manager.
-
Creating a Certificate Request
In Microsoft Internet Information Services (IIS); you can create your own Certificate Requests and send them to your network Certificate Authority for approval. In this video; Pierre Devereux demonstrates how to create and send a Certificate Request from your Server Manager.
-
Event Logs
After watching this video; you will be able to describe event logs.
-
Exporting and Importing Certificates
In Microsoft Internet Information Services (IIS); the Microsoft Management Console Snap-in allows you to easily export and import certificates. In this video; Pierre Devereux demonstrates how to access and use the MMC Snap-in.
-
IIS Server Services
While Microsoft Internet Information Services (IIS) is running and presenting websites to clients; there are services running in the background that make this possible. If you are having problems with IIS; you can troubleshoot these services by accessing information; such as the service's status and startup type. In this video; Pierre Devereux provides an overview of IIS services.
-
Installing Extensions Using PowerShell
In Microsoft Internet Information Service (IIS); extensions can be downloaded and installed onto your server through the graphic user interface or PowerShell. In this video; Pierre Devereux demonstrates how to install extensions for IIS using PowerShell.
-
Installing Extensions Using the GUI
Microsoft Internet Information Services (IIS) extensions can either be downloaded using the Microsoft Web Platform Installer or by downloading it manually. In this video; Pierre Devereux demonstrates how to access and install extensions using the graphic user interface.
-
Installing IIS Features with GUI
Microsoft Internet Information Services (IIS) allows you to easily install a range of features with the GUI. In this video; Pierre Devereux demonstrates how to install basic features for IIS and discusses the roles and features button.
-
Installing IIS Features with PowerShell
Microsoft Internet Information Services (IIS) allows you to install IIS features with Microsoft PowerShell. In this video; Pierre Devereux demonstrates how to install features for IIS using PowerShell; and how you can also run a PowerShell command to check if a feature is already installed.
-
Installing IIS in the Windows 2012 Security Model
Microsoft Internet Information Services (IIS) allow you to install services in the Windows 2012 Security Model. In this video; Pierre Devereux demonstrates how to install IIS Windows 2012 Security Model; ensuring that the configuration is done correctly to avoid potential security vulnerabilities.
-
Installing IIS via GUI
Microsoft Internet Information Services (IIS) allows you to install services via the graphic user interface (GUI) of the Server Manager; or by using PowerShell commands. In this video; Pierre Devereux demonstrates how to install IIS via the GUI.
-
Installing IIS via PowerShell
Microsoft Internet Information Services (IIS) allows you to install the service via PowerShell. This can be done for remote and multiple installations. In this video; Pierre Devereux demonstrates how to install IIS via PowerShell; and also install a series of management tools.
-
Managing Extensions
In Microsoft Internet Information Services (IIS); you can install extensions that provide additional features to your services and manage these extensions. In this video; Pierre Devereux demonstrates how to manage extensions through the Server Manager.
-
Removing Extensions
When you work with Microsoft Internet Information Services; you can add and remove extensions as you require. In this video; Pierre Devereux demonstrates how to remove an installed server extension by using the Control Panel.
-
Restarting IIS Services
One of the ways to troubleshoot in Microsoft Internet Information Services (IIS) is by restarting its services. This is especially the case when you have connection issues. In this video; Pierre Devereux demonstrates how to restart IIS from the Services Manager.
-
Service Health
Microsoft Internet Information Services (IIS) allows you to host web-based applications and services on a system. In this video; Pierre Devereux demonstrates how to administer IIS health to ensure optimum functionality; using tools such as the Microsoft Baseline Security Analyzer and Best Practices Analyzer.
-
Sites and Host Headers
Microsoft Internet Information Services (IIS) allows for multiple sites to be assigned to one IP address. In this video; Pierre Devereux demonstrates how to add multiple websites using the same IP address and the same port numbers on one server.
-
Virtual Directories
When dealing with Microsoft Internet Information Services; you should be aware that content for a website may not always be stored in the same location as the site itself. In this video; Pierre Devereux demonstrates how to use the Service Manager to add virtual directories to direct a website to the content's location.
-
Manage RGS Delegated Administration
Microsoft Lync Server 2013 provides two roles for managing response groups when an organization deploys the Lync Server Response Group application to handle calls in a customer service or internal help desk scenario. In this video; Telmo Sampaio demonstrates the capabilities of the Response Group Administrator and Response Group Manager roles using Lync Server 2013 resources.
-
Migration Sequence
As with other Microsoft products; Microsoft Lync Server 2013 supports a migration process that allows you to successfully move your production deployment from a previous version of Lync Server. In this video; Telmo Sampaio demonstrates the eight phases of a migration process from Lync Server 2010 to Lync Server 2013.
-
Recover CMS
The CMS (central management server) is a database that contains the settings and topology for Microsoft Lync Server 2013. In this video; Telmo Sampaio uses the Install-CsDatabase commandlet to install the CMS database on a new server.
-
Recover LIS
In Microsoft Lync Server 2013; Location Information Services (LIS) associates IP addresses; switches; and subnets with actual physical locations. In this video; Telmo Sampaio uses the Export-CsLisConfiguration commandlet to export the subnet location information.
-
Configure Meetings
In Microsoft Lync Server 2013; you can specify a meeting policy for your organization. In this video; Telmo Sampaio uses Outlook to create a new meeting after creating and applying the meeting policy to all users.
-
Enable Ocslogger Tracing
In Microsoft Lync Server 2013; the Ocslogger; normally referred to as the Lync Logging Tool; and the Snooper Tool can be used to assist with troubleshooting. In this video; Telmo Sampaio demonstrates how to set up and run the Ocslogger and Snooper tools; and extract data from them to troubleshoot possible problems with your Lync deployment on a network.
-
Add Edge Server to Existing Topology
Microsoft Lync Server 2013 allows you to deploy an Edge server to your existing topology; thereby making it possible for external users to communicate with users in your organization using Lync Server. In this video; David Santana uses the Lync Server Topology Builder to define the topology for an Edge server.
-
Analyze Event Viewer
In Microsoft Lync Server 2013; trace logging information can also be accessed on the client level; and these events can be viewed. In this video; Telmo Sampaio demonstrates how to enable logging information in the client level and access this trace information in EventViewer.
-
Approve Device Updates
As an administrator in Microsoft Lync Server 2013; you can use the Lync Server Control Panel to easily approve updates made to specific devices before rolling the updates out to your organization. In this video; David Santana uses the Lync Server Control Panel to approve a device update.
-
Archiving Policies
In Microsoft Lync Server 2013; you can archive conversations so that you can review them at any time. In this video; Telmo Sampaio uses the Archiving Policy tab to create a policy for archiving.
-
Archiving With Exchange
In Microsoft Lync Server 2013; you can archive data with Exchange Server. In this video; Telmo Sampaio uses PowerShell to enable archiving for Exchange and instant messages.
-
Associated PSTN Usages
Microsoft Lync Server 2013 enables administrators to create and associate Public Switch Telephone Network (PSTN) usage records with existing voice policies. In this video; David Santana uses Microsoft Lync Server 2013 to associate a new PSTN usage record with a voice policy.
-
Backup Application Service Data
In Microsoft Lync Server 2013; you can backup application service data to ensure a recovery from a failure if anything happens to your server infrastructure. In this video; Telmo Sampaio uses export commandlets to backup application service data.
-
Configure an Announcement Service
Microsoft Lync Server 2013 allows administrators to use the Lync Server Management Shell and the New -CsAnnouncement command to create custom; site-specific announcement services. In this video; David Santana creates an announcement service; configuring its attributes; parameters; and values.
-
Configure Call Park
Microsoft Lync Server 2013 allows administrators to use the Lync Server Management Shell to create a call park orbit; which allocates a range of retrievable numbers to callers placed on hold. In this video; David Santana uses the New-CsCallParkOrbit command to create a named call park service on an application-server pool.
-
Configure CDR And Quality Of Experience
In Microsoft Lync Server 2013; you can configure the Call Detail Recording (CDR) and Quality of Experience (QoE) settings that relate to your monitoring reports. In this video; Telmo Sampaio uses the Set-CsCdrConfiguration command to change the CDR configuration for the global setting and disable data purging.
-
Configure Client Policies
In Microsoft Lync Server 2013; you can create; add; and remove client policies. In this video; Telmo Sampaio demonstrates how to use the New-CsClientPolicy command to create a user or site policy.
-
Configure Client Security Options
In Microsoft Lync Server 2013; you can set security options and policies for clients. In this video; Telmo Sampaio demonstrates how to configure security settings for users connecting to Lync and also how Lync handles authentication.
-
Configure Client-Coexistence
Microsoft Lync Server 2013 supports client-coexistence; which is useful in a phased migration scenario; allowing Lync Server 2013 to coexist with components of an earlier deployment version. In this video; Telmo Sampaio uses the Lync Server 2013 Control Panel to edit a client version policy; permitting users of a specified previous version to connect to a Lync Server 2013 infrastructure.
-
Configure Clients Features
Microsoft Lync Server 2013 allows you to customize Lync settings from a central location. In this video; Telmo Sampaio demonstrates how to specify client feature settings by using a group policy object in Lync 2013.
-
Configure Common Area Phone Hotdesking
Microsoft Lync Server 2013 allows you to configure common area phones that are not associated with individual users as hot-desk phones that allow users to log on to their own user accounts. In this video; Telmo Sampaio demonstrates how to run Windows PowerShell cmdlets to create a new common area phone; before modifying a global client policy to enable hotdesking.
-
Configure Conference Policies
In Microsoft Lync Server 2013; you can configure conference policies. In this video; Telmo Sampaio uses the Users tab to assign a conferencing policy to a particular user.
-
Configure Edge Server
In Microsoft Lync Server 2013; you can configure access to the Edge Server for different users. In this video; Telmo Sampaio uses the Access Edge Configuration tab to grant access to the Edge Server for remote and anonymous users.
-
Configure External Access
In Microsoft Lync Server 2013; you can create access policies for external users. In this video; Telmo Sampaio uses the Federation and External Access tab to create an external access policy for a user; and enable communication with federated users.
-
Configure Federation
Microsoft Lync Server 2013 allows you to configure access policies that control whether external users of federated domains can collaborate with Lync Server 2013 users. In this video; Telmo Sampaio demonstrates how to enable communication with federated users using the configuration options in the Lync Server 2013 Control Panel.
-
Configure Mobile Push Notification
The mobile push notification feature allows Microsoft Lync Server 2013 to send alerts; show icons; and display badges on mobile devices. In this video; Telmo Sampaio demonstrates how to set the Microsoft Push Notification service and Apple Push Notification service to true.
-
Configure Music On Hold
Microsoft Lync Server 2013 allows you to change the default Call Park service music on hold file; specifying your own audio file that is played to parked callers who are on hold. In this video; Telmo Sampaio demonstrates how to enable music on hold and to assign an audio file in Windows PowerShell.
-
Configure Persistent Chat
Microsoft Lync Server 2013 allows you to use Persistent Chat; which is a feature that allows users to create a discussion room that persists forever and is available at any point in time. In this video; Telmo Sampaio demonstrates how to configure and create chat rooms with Persistent Chat in Lync.
-
Configure Pin Policies
In Microsoft Lync Server 2013; you can configure PIN policies. In this video; Telmo Sampaio uses the PIN Policy tab to specify how many digits to use for a PIN and how many attempts can be made before locking out the user.
-
Configure Public IM Connectivity
Microsoft Lync Server 2013 provides support for users of public instant messaging (IM) providers; such as Skype and Lync Online; who wish to collaborate with Lync clients within an organization via an external access policy. In this video; Telmo Sampaio uses both the Lync Server Control Panel and Windows PowerShell ISE to enable communication for public IM users.
-
Configure RBAC
Microsoft Lync Server 2013 provides role-based access control (RBAC) that allows you to delegate administrative tasks by assigning users within your organization to predefined and custom RBAC roles. In this video; Telmo Sampaio demonstrates the capabilities of the built-in administrative roles that ship with Lync Server; and how to create a scoped role in Microsoft PowerShell.
-
Configure Regions And Dial-In Numbers
In Microsoft Lync Server 2013; you can create a dial-in access number that users can dial to call into a site. In this video; Telmo Sampaio uses the Conferencing option to create a dial-in access number to the Miami site.
-
Configure Remote User Access
Microsoft Lync Server 2013 allows you to grant remote user access for employees within your organization who sign in to Lync Server from outside your network; whether working from home or on the road. In this video; Telmo Sampaio demonstrates how to enable communication with remote users either through the Lync Server Control Panel or with Windows PowerShell ISE.
-
Configure Synthetic Transactions
Microsoft Lync Server 2013 allows you to manage applications by working with synthetic transactions and watcher nodes. In this video; Telmo Sampaio demonstrates how to configure the watcher nodes that run synthetic transactions in Lync.
-
Configure The Address Book
Microsoft Lync Server 2013 allows you to synchronize data maintained in the Lync server with data that comes with from the Active Directory. In this video; Telmo Sampaio demonstrates how to manage the Lync Address Book with the Address Book service.
-
Configure Users for Enterprise Voice
Microsoft Lync Server 2013 enables administrators to configure users for Enterprise Voice. In this video; David Santana demonstrates how to configure a user account for Enterprise Voice.
-
Control Client Version
Microsoft Lync Server 2013 helps you manage client applications and control client access by specifying the version of clients that are supported within your Lync environment. In this video; Telmo Sampaio uses the Lync Server 2013 Control Panel to edit version configuration settings; and create a new client version policy.
-
Create a Device Policy
Microsoft Lync Server 2013 allows administrators to use the Lync Server Management Shell to create device policies on target sites. In this video; David Santana uses the New-CsUCPhoneConfiguration commandlet to create a device policy on a target site.
-
Create a New PSTN Gateway
Microsoft Lync Server 2013 allows administrators to define new public switched telephone network (PSTN) gateways. In this video; David Santana uses Topology Builder to set up a PSTN gateway in Lync Server 2013.
-
Create a New Unified Messaging Dial Plan
Microsoft Lync Server 2013 enables administrators; on creating a Unified Messaging (UM) dial plan in Exchange Admin Center (EAC); to integrate Exchange UM into Lync Server. In this video; David Santana configures a new SIP URI dial plan and incorporates a dialing rule into the default UM mailbox policy.
-
Create a Test Device Policy
Using Microsoft Lync Server 2013; you can create test device policies that allow you to verify the functionality of a specific policy before deploying it globally; or within a single site. In this video; David Santana uses the Lync Server Control Panel to create a test device policy.
-
Create a Trunk Configuration
Microsoft Lync Server 2013 allows administrators to create custom; site-specific trunk configurations using the PSTN usage records for several associated routes. In this video; David Santana uses Lync Server 2013 to create and configure a trunk configuration associated with existing PSTN usages.
-
Create an Unassigned Number
Microsoft Lync Server 2013 enables administrators to allocate a range of unassigned numbers to one or more internal phone numbers; thereby diverting outside callers to an announcement service. In this video; David Santana uses Lync Server to create and configure a new unassigned number range and its accompanying announcement service.
-
Create Normalization Rules
Using Microsoft Lync Server 2013; you can create a normalization rule when setting up a dial plan for external access with an Edge server. In this video; David Santana uses the Lync Server Control Panel to create a normalization rule.
-
Create Routes
Microsoft Lync Server 2013 enables administrators to use voice routing to create specific routes for selected call traffic. In this video; David Santana demonstrates how to create and configure a new route.
-
Create Voice Policies
Microsoft Lync Server 2013 allows administrators creating external access policies to create and configure a Voice Policy at the site or user level. In this video; David Santana uses Lync Server 2013 to create a new site-level voice policy on a selected site and configure its calling features.
-
Decommission Old Servers
When migrating to Microsoft Lync Server 2013; you need to decommission servers and pools from a legacy deployment of Lync Server 2010. In this video; Telmo Sampaio demonstrates how to update DNS SRV records using the DNS Manager; before moving the Central Manager Server and conference directories from Lync Server 2010 to Lync Server 2013 using cmdlets in Microsoft PowerShell.
-
Deploy A Mediation Server
You can add a Mediation Server to your Microsoft Lync Server 2013 infrastructure to integrate the Lync infrastructure with the PSTN. In this video; Telmo Sampaio demonstrates how to add a single computer pool for the Mediation Server.
-
Deploy An Edge Server
You can use an Edge Server to allow external users to access your Microsoft Lync Server 2013 infrastructure and use it for voice conferencing; audio; and video. In this video; Telmo Sampaio demonstrates how to add an Edge Server to Lync Server.
-
Deploy Clients and Devices
Microsoft Lync Server 2013 allows you to use the Office Customization Tool (OCT). In this video; Telmo Sampaio demonstrates how to use the OCT to deploy a Lync client to Windows.
-
Deploy Monitoring Reports
Microsoft Lync Server 2013 allows you to create monitoring reports. In this video; Telmo Sampaio demonstrates how to deploy these reports using the Lync Server Deployment tools.
-
Deploy Trunks And Gateways
In Microsoft Lync Server 2013; you can deploy SIP trunks and PSTN gateways. In this video; Telmo Sampaio demonstrates how to create a PSTN gateway and specify its domain name or IP address.
-
Download Address Book
With the necessary credentials; Microsoft Lync Server 2013 allows you to update an address book and force the Lync client to download the new up-to-date address book file. In this video; Telmo Sampaio demonstrates how to use a PowerShell cmdlet to update an address book; before generating a registry key on the client computer and forcing an address book refresh.
-
Edit a Device Policy
Microsoft Lync Server 2013 enables administrators to alter and edit device policies using the Lync Server Management Shell. In this video; David Santana uses the Lync Server Management Shell and the Set command to edit or change the values or attributes of the CsUCPhoneConfiguration device policy’s features.
-
Enable Or Move Lync Users
Microsoft Lync Server 2013 requires users to be enabled within the Lync infrastructure to have access to all the resources available to them. Users are assigned to one of many Lync server pools. In this video; Telmo Sampaio demonstrates hwo to enable users; and moves users from one pool to another in both the Control Panel for Lync and PowerShell.
-
Enable Users for Lync Server Shell
Microsoft Lync Server 2013 allows you to use the Lync Server Management Shell to configure and enable users in an Active Directory Users and Computers (ADUC) container. In this video; David Santana details best practices and explains key variables as he uses the Lync Server Management Shell to configure a container and enable its users.
-
Enterprise Voice
Microsoft Lync Server 2013 allows you to use Lync in Telephony. The Enterprise Voice Feature is one of the main features of Lync; and through the Lync client; you can dial out to phone numbers. In this video; Telmo Sampaio demonstrates how to enable Enterprise Voice for Lync Users and uses Lync to assign voice policies and dial plans.
-
Filestore Data And Contacts
In Microsoft Lync Server 2013; you can backup and restore filestore data. In this video; Telmo Sampaio uses the Topology Builder tool to find out which shared folder has filestore data.
-
Grant Rights to Specific Users
Microsoft Lync Server 2013 enables you to grant rights to users added to specific security groups in the Active Directory Users and Computers (ADUC) console. In this video; David Santana uses the ADUC to add two members to a security group.
-
Import a Device Update
Microsoft Lync Server 2013 allows administrators using the Lync Server Management Shell to perform the regular updates to devices that an organization requires. In this video; David Santana uses commands in the Management Shell to import a device update and verify that it will work.
-
Interpret Monitoring Reports
In Microsoft Lync Server 2013; you can create event reports. In this video; Telmo Sampaio uses PowerShell and Internet Explorer to access and interpret these logged reports.
-
Manage Contact List
Microsoft Lync Server 2013 allows you to search for contacts and add them to the listed contacts in Lync and group those contacts together in contact lists or groups. In this video; Telmo Sampaio demonstrates how to manage contacts from the client side by creating groups and adding contacts and how to view contact information from the server side.
-
Recover RTC
In Microsoft Lync Server 2013; you can recover the RTC database instance; which contains front-end pool information stored in a SQL Server set of databases. In this video; Telmo Sampaio uses SQL Server Management Studio to connect to the RTC instance and view a series of databases with different information.
-
Restore Application Service Data
In Microsoft Lync Server 2013; you can easily restore backed up application service data. In this video; Telmo Sampaio uses import commandlets to restore application service data.
-
Retrieve a CsClientPolicy
Microsoft Lync Server 2013 allows administrators to use the Lync Server Management Shell to retrieve a site's client policies - excluding their attributes and properties. In this video; David Santana uses the Get-CsClientPolicy piped to the Identity commandlet; to retrieve a simple rather than a verbose list of a site's client policies.
-
Retrieve Common Area Phones in Your Organization
Microsoft Lync Server 2013 provides administrators with the ability to retrieve common area phones and their configuration settings within an organization. In this video; David Santana uses the Lync Server Management Shell to retrieve information for a common area phone as well as information and examples for the Get-CsCommonAreaPhone cmdlet itself.
-
Run Lync BPA
In Microsoft Lync Server 2013; you can install the Best Practices Analyser (BPA) and first scan instructions to troubleshoot a Lync deployment. In this video; Telmo Sampaio demonstrates how to install the BPA and configure the software to run a first time scan.
-
Support Access by Users of Federated Domains
Microsoft Lync Server 2013 allows you to set up a Federation Trust with another organization; giving outside users access to your domain. In this video; David Santana demonstrates how to access and edit your Global External Access Policy so that its users can communicate with federated; remote; and public users.
-
Test Connectivity With Powershell
Microsoft Lync Server 2013 allows you to test network connections using commandlets. In this video; Telmo Sampaio demonstrates how to use PowerShell to implement a number of function tasks to test Lync credentials and network connections.
-
Validate Group Membership
Microsoft Lync Server 2013 allows you to validate the group membership of a specific Organizational Unit (OU). In this video; David Santana uses the Active Directory Users and Computers console to verify the existence of an OU and its members.
-
Validate the Configuration
Microsoft Lync Server 2013 enables you to validate a user account by using the Lync Server Management Shell to update the user database and Address Book. In this video; David Santana uses commands in Management Shell to update the user database and Address Book.
-
Verify Device Policy Creation
Microsoft Lync Server 2013 enables you to verify any device policies that might have been created. In this video; David Santana uses the Lync Server 2013 Control Panel to verify a device policy that was previously created with PowerShell.
-
Verify Service Health And Cms Replication Status
In Microsoft Lync Server 2013; you can configure Lync and pass connectivity from Lync using predefined test user accounts. In this video; Telmo Sampaio demonstrates how to check for CMS Replication and Health Monitoring in Lync.
-
Adding Folders to the Index
In Microsoft PowerShell; you can use components from a .NET compiled DLL to get features that aren’t natively provided with commandlets. In this video; Byron Hynes demonstrates how to examine the existing collection of search paths; and how to add a new search path to be catalogued.
-
Adding Text to Word with PowerShell
Microsoft PowerShell allows you to edit documents once you have created an instance of; or are connected to; the Word COM application. In this video; Byron Hynes demonstrates how to add text to a Word document using Office COM automation objects.
-
An Introduction to Hash Tables
In Microsoft PowerShell; you can create a hash table; which is something like a two-dimensional array. In this video; Byron Hynes demonstrates how to create a hash table; and how to access and change information in the hash table using the set_item; get_item; Sort-Order; and GetEnumerator methods.
-
Binding to Existing Applications
Microsoft PowerShell allows you to connect to existing applications and control them through COM automation. In this video; Byron Hynes uses the New-Object command to create multiple instances of COM objects at the application level; explains the errors that arise; connects to an instantiated app when needed; and shows you how to use a try...catch block to handle exception errors.
-
Cleaning Up After Your Office Scripts
When using COM automation with Microsoft PowerShell; it is important to clean up appropriately after scripting to avoid running issues at a later date. In this video; Byron Hynes demonstrates some of the ways you can clean up and release objects fully once scripting is complete.
-
Cmdlets and Modules
In Microsoft PowerShell; you can use commandlets to perform tasks. These commandlets are sometimes organized into modules of different types and with different functions. In this video; Byron Hynes demonstrates the fundamental commandlets and modules including WhatIf; Get-Command; and Get-Help; and explains how to create a module.
-
Creating a Module
Creating your own modules in PowerShell allows you to have greater control when it comes to managing your PowerShell session. In this video; Byron Hynes demonstrates how to create a custom module based on a function.
-
Creating a New Application
Microsoft PowerShell allows you to instantiate instances of applications belonging to the Microsoft Office Common Object Model (COM). In this video; Byron Hynes demonstrates how to use the New-Object command to instantiate instances of top-level COM object applications and background processes in the Microsoft Office Suite; access enumerations by adding required Interop assemblies; and use third-party scripts to instantiate applications.
-
Enabling Remote Desktop
Using Microsoft PowerShell scripts; you can enable Remote desktop on local and remote computers allowing system administrators to easily and efficiently connect to; and manage; servers. In this video; Byron Hynes demonstrates how to access a WMI object and use the SetAllowTSConnection() method within a process block to enable Remote Desktop access both locally and remotely.
-
Error Handling
In Microsoft PowerShell; it's good practice to understand errors and know how to handle them in your script. In this video; Byron Hynes demonstrates the error types that can occur during execution; how they are logged and handled in PowerShell; and how Try; Catch; and Finally statements allow you to control script flow when you encounter errors.
-
Exploring Commands
In Microsoft PowerShell; you can gain access to the lists of various commands available in each instance of PowerShell. In this video; Byron Hynes demonstrates how to access lists which contain different kinds of command information using the Get-Command cmdlet. He also explains how to use Get-Command to lead a command.
-
Finding Empty Folders
Microsoft PowerShell can automatically find empty folders on your system. In this video; Byron Hynes uses the where-object command to filter through your computer to find empty folders.
-
Implicit Modules
Microsoft PowerShell provides developers with the ability to load modules implicitly into a PowerShell session. In this video; Byron Hynes demonstrates how default modules are automatically loaded depending on which commands are issued; particularly as this relates to implicit remoting and running remote sessions.
-
Introducing Out-GridView
Microsoft PowerShell provides developers with the Out-GridView to view and work with return values in a live environment. In this video; Byron Hynes demonstrates the difference between the plain output of commands; such as Format-List and Get-Process; and what that output looks like when piped to Out-Grid View.
-
Listing File Extensions
With Microsoft PowerShell; you can analyze the types of files you have in your file system. In this video; Byron Hynes uses the Get-ChildItem command to list the groups of files and the file extensions on your system.
-
Listing Software
Microsoft PowerShell allows you to expose; list; and format your network's software installations. In this video; Byron Hynes demonstrates how the MSI Installer writes an Uninstall key for each application to the relevant registry path; enabling you to use the Get-ChildItem cmdlet to swiftly extract the necessary data directly from the registry.
-
Opening a File Using Its Default Handler
Microsoft PowerShell provides developers with the ability to open files; directories; and URLs using their default handlers. In this video; Byron Hynes demonstrates several ways to invoke programs and open items; such as using the Invoke-Item command for files and applications; and the Start-Process command for URLs.
-
Profiles
In Microsoft PowerShell; you can create Profiles to control and automate your own PowerShell environment. In this video; Byron Hynes demonstrates how to set profiles up the way you want; and create modules; variables; and custom functions that are available for each session you start in a specific shell.
-
Removing Folders From the Index
In Microsoft PowerShell; you can use components from a .NET compiled DLL to get features that aren’t natively provided with commandlets. In this video; Byron Hynes demonstrates how to collect search management tools into functions; put those functions into a module; and remove folders to be catalogued.
-
Removing Software Using Windows Registry
Microsoft PowerShell allows you to bypass WMI and uninstall software from your system using information contained in the Windows registry. In this video; Byron Hynes demonstrates how to use the Get-ChildItem command and /X uninstallString to locate; combine; and uninstall 32 and 64-bit programs from the registry; before exploring issues raised by the /I uninstallString and ClickOnce deployment tool.
-
Removing Software Using WMI
Microsoft PowerShell allows you to use the Get-WmiObject command; Uninstall() method; and product key to speedily uninstall software from your computer or network. In this video; Byron Hynes demonstrates how to use the gwmi alias to search for Win32_Product class program objects he then stores as variables including the product key; before using the Uninstall() method to remove multiple applications.
-
Smooth Operators
In Microsoft PowerShell; you can use specialized operators which work with strings and allow you turn a string into an array and vice versa. In this video; Byron Hynes demonstrates the use of splits; joins; contains; and match specialized operators by showing what the function of each is before giving an example of how it can be used.
-
Snap-Ins
In Microsoft PowerShell; a snap-in is a dynamic link library (.dll) compiled in .NET that once installed allows you to extend PowerShell by adding cmdlets and providers to your PowerShell session. In this video; Byron Hynes demonstrates how to add; remove; and manage snap-ins through PowerShell commands while discussing the reasons for snap-ins being deprecated in favour of modules.
-
Splatting
In Microsoft PowerShell; Splatting refers to the passing of parameters to a cmdlet using a pre-defined block which has a Hash Table. In this video; Byron Hynes demonstrates how Splatting can be used to bundle parameters to send to a command.
-
Start-Job Cmdlet
In Microsoft PowerShell; you can use job management tools to manage long running tasks and avoid being held up by blocking calls. In this video; Byron Hynes demonstrates how to use job management tools in remoting and for automated job scheduling.
-
Using Eventing
Microsoft PowerShell provides developers with the ability to work with events; because PowerShell is an object-oriented language not just a scripting language. In this video; Byron Hynes uses a timer to demonstrate the difference between listening for an event; polling for an event; and waiting for an event.
-
Using the Windows Registry – Adding/Updating Values
In Microsoft PowerShell; you can not only read the registry; but add and update values. In this video; Byron Hynes demonstrates how you can manipulate registry values on a local and a remote machine.
-
Adding and Removing E-Mail Addresses
In Microsoft PowerShell and Exchange; you can add and remove e-mail addresses of individuals or multiple recipients from your organisation. In this video; Patrick Loner demonstrates how to use the Set-Mailbox command to add and remove an e-mail address of an individual.
-
Adding; Modifying and Removing Server Side Inbox Rules
Exchange Management Shell can be used by administrators to create rules for a particular mailbox or across multiple user mailboxes. In this video; Patrick Loner demonstrates how to create a rule for one mailbox; how to give yourself full access rights as an administrator; and how to create a rule for users in a segment of an organization.
-
Adding; Modifying; Removing Mailboxes
Microsoft Exchange allows you to add; modify; and remove user mailboxes using the Exchange Management Shell. In this video; Patrick Loner uses Exchange Management Shell cmdlets and parameters to add; modify; disable; and remove Exchange user mailboxes.
-
Allowing Managers to Modify Group Membership
Microsoft PowerShell allows administrators using the Exchange Management Shell to provide managers and users with the necessary rights in Exchange to modify the membership of distribution groups. In this video; Patrick Loner uses cmdlets in the Shell to add a role and assign it to a user; allowing the user to modify group membership.
-
Blocking Outlook Clients From Connecting to Exchange
Microsoft PowerShell and Exchange allow administrators to control the versions of Outlook that can connect to the Exchange server. In this video; Patrick Loner demonstrates how to use PowerShell to control connectivity methods; such as MAPI and POP; and restrict Outlook versions earlier than Outlook 2007 from connecting to the server.
-
Configuring Administrator Audit Logging
Microsoft PowerShell allows Exchange Server administrators to configure administrator audit logging settings that let you record administrator changes in your organisation using Exchange Management Shell cmdlets. In this video; Patrick Loner uses the Get-AdminAuditLogConfig cmdlet to return the default audit logging settings; before demonstrating how to configure specific cmdlets you can audit using the Set-AdminAuditLogConfig cmdlet.
-
Configuring Mailbox Database Limits
You can configure storage quotas with Microsoft PowerShell and Exchange on an individual level or across multiple databases. In this video; Patrick Loner demonstrates how to modify mailbox database settings using Exchange Management Shell cmdlets.
-
Configuring Message Delivery Restrictions
In Microsoft PowerShell and Exchange; you can implement various message delivery configurations. In this video; Patrick Loner demonstrates how to use the Exchange Management Shell to configure message delivery restrictions.
-
Configuring Recipient Moderation
In Microsoft PowerShell and Exchange; you can reserve the right to send messages through a particular group to only certain individuals. In this video; Patrick Loner demonstrates how to use the SendModerationNotifications parameter to send a notification through a distribution group to a particular individual.
-
Controlling ActiveSync Device Access
Microsoft PowerShell and Exchange allow administrators to control access by ActiveSync devices. In this video; Patrick Loner demonstrates how to review the default ActiveSync settings for an organisation; and how to set ActiveSync settings for individual devices at the server level; as well as globally; across an organization.
-
Converting and Upgrading Distribution Groups
Microsoft PowerShell lets you convert and upgrade distribution groups within the Exchange Management Shell; allowing the groups to be fully functional and utilize any new features when migrating from earlier versions of Exchange to Exchange 2007 and beyond. In this video; Patrick Loner demonstrates how to convert non-universal distribution groups to universal; before upgrading them using the -ForceUpgrade parameter.
-
Creating Address Lists
Microsoft Exchange Management Shell cmdlets allow administrators to subdivide the global address list; allowing mailbox users to locate other recipients. In this video; Patrick Loner demonstrates the creation; filtering; and management of address lists and their recipients within organizational units.
-
Creating Recipients in Bulk Using a CSV File
In Microsoft PowerShell and Exchange; you can import data in bulk from an external file to create new objects. In this video; Patrick Loner demonstrates how to use the import-Csv command to pull entries from an external text file and create a list of users.
-
Deleting Messages From Mailboxes
Microsoft Exchange's eDiscovery capability allows administrators to search across multiple mailboxes and delete selected e-mails. In this video; Patrick Loner uses Exchange Management Shell cmdlets to define; run; filter; and output search queries on single and multiple mailboxes from which e-mails have been deleted.
-
Detecting and Fixing Corrupt Mailboxes
In Microsoft PowerShell and Exchange; the Exchange Management Shell can be used to detect and fix corruption at a database level; as well as at a mailbox level. In this video; Patrick Loner demonstrates how to detect potential types of corruption; and explains how to go about repairing them.
-
Determining the Average Mailbox Size per Database
In Microsoft PowerShell and Exchange; you can use the native options within the Management Shell to determine the average size of the mailboxes in a particular database. In this video; Patrick Loner demonstrates how to determine the average mailbox size for a particular database in megabytes; and exclude disconnected and archived mailboxes.
-
Enabling Mailbox Audit Logging
In Microsoft PowerShell and Exchange; you can use the mailbox audit logging feature to monitor activity in mailboxes. In this video; Patrick Loner demonstrates how to enable and modify mailbox audit logging using the Exchange Management Shell.
-
Excluding Hidden Recipients From a Dynamic Distribution Group
Microsoft PowerShell allows you to perform advanced filtering through cmdlets in the Exchange Management Shell; so you can configure recipient filters that exclude hidden recipients from Exchange dynamic distribution groups. In this video; Patrick Loner uses the Set-DynamicDistributionGroup cmdlet with the HiddenFromAddressListsEnabled property of the recipient to create a recipient filter and exclude a recipient from an address list.
-
Exporting Address List Membership to a CSV File
In Microsoft PowerShell and Exchange; you can use the Exchange Management Shell to export content as a CSV file. In this video; Patrick Loner demonstrates how to create and export an address list as a CSV file.
-
Exporting Reports to Text and CSV Files
In Microsoft PowerShell and Exchange; you can export outputs from the management shell into easily readable text and CSV files. In this video; Patrick Loner demonstrates how to export and format output data from the management shell into a text file and modify data to display in a CSV file.
-
Finding Inactive Mailboxes
In Microsoft PowerShell and Exchange; you can use the Exchange Management Shell to identify the mailboxes that are not being used; but are still active on the server. In this video; Patrick Loner demonstrates how to identify these mailboxes and then remove them.
-
Finding the Total Number of Mailboxes in a Database
Microsoft PowerShell and Exchange allow you to determine the number of mailboxes within a database. This number relates directly to the size of the database itself. In this video; Patrick Loner demonstrates how to determine the number of mailboxes in a database; using two different methods.
-
Finding Users with Full Access to Mailboxes
Microsoft PowerShell and Exchange allow you to identify the users in your organization that have full access permissions to one or more mailboxes. In this video; Patrick Loner demonstrates how to filter permissions to identify users that have complete access to a mailbox; and display them in a table.
-
Generating Mailbox Folder Reports
In Microsoft PowerShell and Exchange; you can use the Exchange Management Shell to generate mailbox folder reports. In this video; Patrick Loner demonstrates how to enumerate folders and examine their individual sizes by generating mailbox folder reports.
-
Grant Users Full Access Permission to Mailbox
In Microsoft PowerShell and Exchange; you can grant personnel full access to user mailboxes by using Exchange Management Shell commandlets. In this video; Patrick Loner demonstrates how to grant a user full access permission to other user's mailboxes.
-
Hiding Recipients From Address Lists
In Microsoft PowerShell and Exchange; you can easily hide recipients from the global address list. In this video; Patrick Loner demonstrates how to use the HiddenFromAddressListEnabled parameter to hide the administrator account from the address list.
-
Importing and Exporting Mailboxes
Microsoft Exchange allows administrators to use Exchange Management Shell cmdlets to import or export user and archive mailboxes to or from PST files. In this video; Patrick Loner demonstrates how to assign the Mailbox Import Export role; shows how to export users' and archive mailboxes to a PST file; and reviews the MailboxExportRequest status.
-
Importing User Photos in Active Directory
Microsoft Exchange's Management Shell allows the import of Outlook user thumbnail photos into the Global Address List. In this video; Patrick Loner demonstrates the required attributes of user thumbnails; uses PowerShell cmdlets to import single and bulk user photos; and enables and disables the indicator attribute pointing Cached Mode Outlook clients to the thumbnails in Active Directory.
-
Logging Shell Sessions to a Transcript
In Microsoft PowerShell and Exchange; you can save a lot of time and effort when you log Shell sessions to a transcript. In this video; Patrick Loner demonstrates how to use a transcript to save commands; and the output that you have seen; in the Exchange Management Shell.
-
Managing ActiveSync; OWA; POP3; IMAP4 Mailbox Settings
In Microsoft PowerShell and Exchange; you can configure Client Access options in order to manage how individual users connect to mailboxes hosted on the Exchange server. In this video; Patrick Loner demonstrates how to enable and disable mail client options; such as POP; OWA; ActiveSync; IMAP; and MAPI.
-
Managing Archive Mailboxes
Microsoft Exchange allows the creation and management of In-place Archive mailboxes and their size quotas using cmdlets in the Exchange Management Shell. In this video; Patrick Loner uses the Enable-Mailbox and Set-Mailbox commands along with Archive and other parameters to archive and set the size quotas of single and multiple existing mailboxes in identified databases.
-
Managing Auto Replies and Out of Office Settings for a User
The Microsoft Exchange Management Shell allows you to configure out of office messages and auto replies on behalf of a user. In this video; Patrick Loner demonstrates how to configure the out of office and auto reply settings for a particular user. He then explains how to create a scheduled auto reply.
-
Managing Disconnected Mailboxes
Microsoft Exchange keeps disconnected mailboxes in the database for a certain period of time. In this video; Patrick Loner demonstrates how to reconnect disconnected mailboxes; or connect them to a new user account using the Exchange Management Shell.
-
Managing Distribution Groups
In Microsoft PowerShell and Exchange; you can use distribution groups to send e-mail messages to multiple users and contacts; both inside and outside your organization. In this video; Patrick Loner demonstrates how to use the New-DistributionGroup commandlet to create a distribution group.
-
Managing Domains or Forests Using Recipient Scope
In Microsoft PowerShell and Exchange; the recipient scope parameter allows you to control what areas the management shell focuses on within the active directory. In this video; Patrick Loner demonstrates how to configure the management shell view to only look at a particular section of the active directory.
-
Managing Mailbox Folder Permissions
You can use Exchange Management Shell to configure permissions. In this video; Patrick Loner demonstrates how to configure permissions at mailbox and at individual folder level.
-
Managing Outlook Anywhere Settings
Microsoft PowerShell and Exchange allow administrators to configure client access servers to accept RPC over HTTPS using Outlook Anywhere. In this video; Patrick Loner demonstrates how to use the Exchange Management Shell to review and configure Outlook Anywhere settings on an Exchange server.
-
Managing Public Folder Mailboxes
In Microsoft PowerShell and Exchange; the Exchange Management Shell allows you to create and manage Public Folder Mailboxes. In this video; Patrick Loner demonstrates the latest changes that affect Public Folder Mailboxes; as well as how to create and manage Public Folders and Public Folder Mailboxes.
-
Managing Resource Mailboxes
In Microsoft PowerShell and Exchange; a resource mailbox represents a conference room and equipment mailboxes; and is used to schedule resources. In this video; Patrick Loner demonstrates how to use the –Room parameter to create a conference room mailbox.
-
Managing the Mailbox Databases
In Microsoft PowerShell and Exchange; you can use the Exchange Management Shell to create; configure; and manage mailbox databases. In this video; Patrick Loner demonstrates how to create a database; mount it; and then configure it so that it is excluded as a default location for new mailboxes.
-
Managing Transport Rules and Settings
Microsoft PowerShell and Exchange allow administrators to scan and control traffic flowing through the transport components in a mail server. In this video; Patrick Loner demonstrates how to create a transport rule to perform specific actions when the conditions of the rule are met.
-
Managing User Access to Public Folders
In Microsoft PowerShell and Exchange; you can use Outlook roles in the Exchange Management Shell to change default Public Folder client permissions. In this video; Patrick Loner demonstrates how to change Public Folder permissions for a group. He also demonstrates how to add a group; and give that group a certain permission role.
-
Manually Configure Remote PowerShell
Remote PowerShell allows you to connect to the Exchange Management shell remotely and run commands on it without the Exchange Management tools being installed locally. In this video; Patrick Loner demonstrates how to manually configure Remote PowerShell.
-
Moving Databases and Logs to Another Location
When working with Microsoft PowerShell and Exchange; you might need to move databases and logs to another location. In this video; Patrick Loner demonstrates how to use Exchange Management Shell cmdlets to modify the location of databases and logs.
-
Placing Mailboxes on In-Place Hold
Microsoft Exchange 2013 allows you to search mailboxes and then place the results on hold. In this video; Patrick Loner demonstrates how to use the Exchange Management Shell cmdlets to place mailboxes on an in-place hold; and discover the uses of retention hold messages.
-
Previewing Dynamic Distribution Group Membership
Microsoft PowerShell allows you to create code utilizing the Exchange Management Shell to preview members of a dynamic distribution group in Exchange Server whose membership is based on specific recipient filters. In this video; Patrick Loner uses the Get-Recipient cmdlet and RecipientFilter parameter to create a variable; before creating a reusable function to preview dynamic distribution group membership.
-
Removing Disabled User Accounts From Distribution Groups
Microsoft PowerShell allows Exchange administrators using the Exchange Management Shell to identify and remove disabled user accounts from distribution groups in organizations; thereby avoiding unnecessary database overhead. In this video; Patrick Loner demonstrates how to iterate through distribution groups; filter out and remove disabled users from the group; and how to generate a report based on disabled accounts.
-
Reporting on Database Status
Microsoft PowerShell and Exchange allow you to access the backup statuses of databases throughout the server environment. In this video; Patrick Loner demonstrates how to display the last full backup of a mailbox; and locate mailboxes that have not been recently backed up.
-
Reporting on Distribution Group Membership
Microsoft PowerShell allows administrators using cmdlets in Exchange Management Shell to report on distribution group membership in Exchange Server with minimal coding effort. In this video; Patrick Loner uses a foreach loop with Get-DistributionGroup and Get-DistributionGroupMember cmdlets to return a list of group members and the distribution group they're in; before exporting the data as a comma-separated values (CSV) file.
-
Reporting on Mailbox Creation Time
In Microsoft PowerShell and Exchange; the Exchange Management Shell allows you to report on the creation of various mailboxes. In this video; Patrick Loner demonstrates how you can view all recently created mailboxes using the Exchange Management Shell.
-
Reporting on Mailbox Database Size
In Microsoft PowerShell and Exchange; you can easily determine the size of the mailbox database. In this video; Patrick Loner demonstrates how to use the Exchange Management Shell cmdlets to find the size of a mailbox database.
-
Reporting on Mailbox Size
Microsoft Exchange Management Shell cmdlets allow administrators to produce; format; filter; and output reports on the size and attributes of mailboxes. In this video; Patrick Loner uses the Get-MailboxStatistics cmdlet to generate reports; pipes the data into a Format List; filters attributes; and outputs reports.
-
Reporting on Public Folder Statistics
In Microsoft PowerShell and Exchange; the Exchange Management Shell allows you to create various kinds of reports on Public Folders and their use throughout your organization. In this video; Patrick Loner demonstrates the commands used to create reports for mailbox sizes; and reports for sizes and settings for individual folders.
-
Restoring Deleted Items From Mailboxes
In Microsoft PowerShell and Exchange; you can use the Exchange Management Shell to restore items deleted or purged from user accounts. In this video; Patrick Loner demonstrates how the restoration process works and how to go about restoring deleted or purged messages.
-
Scheduling Scripts to Run at a Later Time
In Microsoft PowerShell and Exchange; you can automate the running of scripts from the scheduled task area outside of PowerShell and from within the management shell. In this video; Patrick Loner demonstrates how to schedule jobs to run by defining a task to launch PowerShell and run a script; and by registering a scheduled job cmdlet in the management shell.
-
Scripting an Exchange Server Installation
Microsoft Exchange allows the scripted; unattended installations of single and multiple instances of Exchange Server in organizational and remote-office environments. In this video; Patrick Loner demonstrates both the unattended installation and scripted unattended installation of Exchange Server; using PowerShell ISE.
-
Searching the Administrator Audit Logs
In Microsoft PowerShell and Exchange; you can use the Exchange Management Shell to track administrative actions; as well as the users who performed those actions. In this video; Patrick Loner demonstrates how to access the Administrative Audit Log and search it for the information you need.
-
Sending SMTP E-mails Through PowerShell
In Microsoft PowerShell and Exchange; you can easily send SMTP e-mails from within the management shell. In this video; Patrick Loner demonstrates how to send a report via e-mail by using the send mail message commandlet; defining the To; From; Subject; Body; and attachments sections of the mail; and formatting the report as a .csv file.
-
Setting Internal and External CAS URLs
In Microsoft PowerShell and Exchange; it's necessary to set Internal and External URLs on the Client Access servers; especially in multi-site environments. In this video; Patrick Loner demonstrates how to configure the External URLs for various virtual directories from within the Exchange Management Shell.
-
Setting Storage Quotas for Mailboxes
In Microsoft PowerShell and Exchange; it's important to set limits on the amount of space that can be used by mailboxes. In this video; Patrick Loner demonstrates how to set storage quotas at the database level; as well as for for individual mailboxes.
-
Using Explicit Credentials with PowerShell Cmdlets
In Microsoft PowerShell; you can explicitly save credentials by using commandlets; allowing for a more efficient execution of the script. In this video; Patrick Loner demonstrates how to save credentials explicitly with PowerShell.
-
Working with Distribution Group Membership Approval
Microsoft Exchange Management Shell cmdlets allow administrators to manage distribution group membership restrictions and settings. In this video; Patrick Loner demonstrates distribution group membership join and depart restrictions; and adds a manager to a distribution group for which membership approval is required.
-
Working with Distribution Group Naming Policies
Microsoft Exchange Management Shell cmdlets allow administrators to manage the policies and naming conventions of user-created distribution groups. In this video; Patrick Loner uses Exchange Management Shell cmdlets and attributes to create and modify the group policies and naming conventions of new and existing user-created distribution groups.
-
Working with Move Requests and Performing Mailbox Moves
Microsoft Exchange's online move requests allow users continued mailbox access while mailboxes are moved between databases from the Exchange Management Shell. In this video; Patrick Loner uses the New-MoveRequest to move single and batched mailboxes to target databases and generates statistical and status reports on the queued and completed requests.
-
Working with Recipient Filters
In Microsoft PowerShell and Exchange; you can control which recipient objects you want to view or change. In this video; Patrick Loner demonstrates how to use the filter command to get a select group of objects based on specified criteria.
-
Working with Role-Based Access Control
In Microsoft PowerShell and Exchange; you can use role-based access control to create roles and ensure that administrators have the appropriate permissions throughout the Exchange organization. In this video; Patrick Loner demonstrates how to use the Add-RoleGroupMember commandlet to add a user to a particular group and grant them permissions.
-
Timer Job and Log Information
Microsoft PowerShell allows the retrieval and management of SharePoint log information as well as the status of timer jobs. In this video; David Dye uses PowerShell cmndlets to Get an identified timer job and call and format parameterized data from it; before using the Get-SPLogEvent cmndlet to filter and list category-level log data.
-
Upgrade Content Database
Microsoft PowerShell and SharePoint allow administrators to use PowerShell to upgrade content databases across a site. In this video; David Dye demonstrates how to test whether content databases can be upgraded; list the content databases on a site; and upgrade the content databases once all issues have been cleared.
-
Upgrade Status
Microsoft PowerShell cmdlets allow you to verify the upgrade status of the different objects within a SharePoint farm by providing details about the status of each upgrade session. In this video; David Dye uses the Get-SPFarm cmdlet to return a SharePoint local farm; before demonstrating how to extract the upgrade information and pipe it to an external file.
-
Working with Services
In Microsoft PowerShell and SharePoint; a number of services are exposed in the Windows Operating System allowing you to interact with them. In this video; David Dye demonstrates how to query the status of the service; stop; start; and change the service start-up mode.
-
Site Features
Microsoft PowerShell and SharePoint allow administrators to view; activate; and deactivate site features using PowerShell. In this video; David Dye demonstrates how to create a script using the Get-SPFeature cmdlet to view the features of a particular site; and filter and sort results. He then activates and deactivates a feature using Enable and Disable.
-
SP Health Analysis Rule
Microsoft PowerShell provides health monitoring cmdlets that allow you to manage health analyzer rules that are used by SharePoint Health Analyzer to monitor the farm. In this video; David Dye uses the Get-SPHealthAnalysisRule cmdlet to retrieve a specific health analysis rule before using cmdlets to disable and then re-enable the rule.
-
SPSecurityTokenServiceConfig
In Microsoft PowerShell and SharePoint; you can query and configure Security Tokens. In this video; David Dye demonstrates which commandlets to use when querying a Security Token and how to configure a Security Token.
-
SPShellAdmin
You can use PowerShell to add and remove Shell administrators for any SharePoint database. In this video; David Dye demonstrates how to add; remove; and query the Shell Administrators.
-
SPSite Information
Microsoft SharePoint's SPSite object allows the farm administrator to extract; configure; and manage site collection data. In this video; David Dye uses the SPSite cmndlet to demonstrate multiple ways to manage site collection and SPWeb data by piping information between cmndlets.
-
SPSiteAdministration
Microsoft SharePoint allows farm administrators to view information about site collections using the Get-SPSiteAdministration cmdlet in PowerShell and return different information based on specified parameters. In this video; David Dye demonstrates how to return information about all site collections; write the information to a text file; refine the query; and determine disk space usage; in each case utilizing Get-SPSiteAdministration.
-
SPUser
Microsoft SharePoint's SPUser object allows the configuration of SPWeb security within site collections. In this video; David Dye uses PowerShell cmndlets to demonstrate how to create and add users to existing roles within a site collection subsite or SPWeb.
-
SPWeb Information
Microsoft SharePoint's SPWeb object allows the creation and configuration of subsites and the querying of their data. In this video; David Dye uses the SharePoint interface and PowerShell cmndlets; parameters; and methods to create; query; and edit SPWebs.
-
Start and Stop SP Service
The service application cmdlets in Microsoft PowerShell allow you to start; stop; and manage service applications across farms in SharePoint. In this video; David Dye uses the Get-ServiceInstance cmdlet to return the status of a specific service instance on a particular server; before demonstrating how to start and stop the service instance from within PowerShell.
-
Save Site as a Site Template
Microsoft PowerShell and SharePoint allow administrators to specify and save a web as a template. In this video; David Dye demonstrates how to create a PowerShell script to create; name; describe; and save a web as a template; which can be used repeatedly throughout a SharePoint farm.
-
Search Service Crawl Content Source
Microsoft PowerShell provides administrators with the ability to create; configure; and remove content sources within a SharePoint farm. In this video; David Dye demonstrates how to retrieve Search Service information to find available content sources; and ensure that content sources will be crawled to make search results available to the Search Service.
-
Search Service Crawl Rules
Microsoft PowerShell and SharePoint provide administrators with the ability to work with crawl rules in a Search Service application. In this video; David Dye demonstrates how to use PowerShell to create a script that uses cmdlets to configure; create; and remove crawl rules consistently across multiple SharePoint farms. This avoids potential errors when using Central Administration to configure each farm.
-
Search Service File Types
Microsoft PowerShell and SharePoint provide farm administrators with the ability to enable or disable various file types within the Search Service provider application in a SharePoint farm. In this video; David Dye demonstrates how to retrieve information on available file types; disable a file type; and then enable that file type using PowerShell cmdlets.
-
SharePoint Designer Settings
Microsoft PowerShell provides cmdlets that allow you to configure Microsoft SharePoint Designer settings within a SharePoint farm. In this video; David Dye demonstrates how to use the allowDesigner property in PowerShell to enable and disable the use of SharePoint Designer in a web application; as well as how to configure the site collection administrators SharePoint Designer capabilities.
-
SharePoint Product Info
Microsoft SharePoint allows you to easily return information about your SharePoint-related product components using cmdlets in PowerShell. In this video; David Dye demonstrates how to use the Get-SPProduct cmdlet and its Local parameter to display SharePoint products installed on a local server; as well as how to retrieve additional detailed information and pipe the information to a text file.
-
Access Service App
Microsoft PowerShell provides cmdlets that allow you to easily manage Access Service applications that run in a SharePoint site collection. In this video; David Dye uses the Get-AccessServiceApplication cmdlet to return an Access Service application; before demonstrating how to specify the maximum duration to perform an operation; and how to create a new instance of an Access Service application.
-
Add a Site Column
Microsoft PowerShell and SharePoint provide farm administrators with the ability to add a custom site column across multiple sites in multiple SharePoint farms using PowerShell. In this video; David Dye demonstrates how to create and configure a site column at the root of the site collection using variables to maintain the identical configuration across multiple site collections and farms.
-
Add Sandbox Solution
You can use Microsoft PowerShell to deploy; configure; and manage Sandbox Solutions for SharePoint’s site collection. In this video; David Dye demonstrates how to utilize PowerShell to work with Sandbox Solutions.
-
Add Server Solution
You can add a server solution to SharePoint using Microsoft PowerShell. In this video; David Dye demonstrates how to add; deploy; remove; and disable the server solution using PowerShell cmdlets.
-
Alternate Access Map
Microsoft SharePoints allows the use of PowerShell cmndlets to create; configure; and remove Alternate Access Mapping within a SharePoint farm. In this video; David Dye demonstrates a list of all available Alternate Access Maps; filters URLs for specific Web Applications; and creates and removes a new alternate URL.
-
Antivirus
In Microsoft PowerShell; you can use cmdlets to create scripts that allow you to configure antivirus settings consistently across your SharePoint environment. In this video; David Dye demonstrates how to assign antivirus settings to a service using the AllowDownload property; and uses the DownloadScanEnabled and UploadScanEnabled properties to determine whether files are scanned when they are transferred.
-
Backing Up
You can use Microsoft PowerShell to backup SharePoint. In this video; David Dye demonstrates how to use PowerShell along with the Task Scheduler to schedule and automate the backing up of SharePoint files; as well as view the history of the backups.
-
Blocked File Extensions
Microsoft PowerShell allows you to create commands that let you query; configure; and remove blocked file extensions consistently across multiple SharePoint servers. In this video; David Dye uses the BlockedFileExtensions property to retrieve a list of file extensions that are blocked from sites in a web application; before demonstrating how to add and remove blocked file extensions.
-
Configuration Database
You can use Microsoft PowerShell to create and execute various actions associated with Configuration Databases. In this video; David Dye demonstrates how to create a Configuration Database; work with it; and also how to remove a Configuration Database.
-
Configure Outgoing E-mail
Microsoft SharePoint allows the use of PowerShell cmndlets to programmatically configure a SharePoint farm's Outgoing E-Mail Settings. In this video; David Dye demonstrates how to create a variable object containing SharePoint's global administration settings; and uses the PowerShell UpdateMailSettings parameter and arguments to change the farm's Outgoing E-Mail Settings.
-
Configure Usage and Data Collection
Microsoft SharePoint allows the configuration; management; and maintenance of Usage and Data collection by PowerShell cmndlets. In this video; David Dye uses PowerShell cmndlets to removes the current SharePoint SPUsageApplication; creates a new one to collect usage information from the server; defines a database; and configures and confirms the new SPUsageApplication's identity.
-
Configuring Sharepoint
You can use Microsoft PowerShell to configure SharePoint after the initial installation. In this video; David Dye demonstrates how to configure SharePoint along with the different server roles and service applications.
-
Content Database
You can use Microsoft SharePoint to create a new Content Database; but you can do the same thing programmatically using the Microsoft PowerShell Management Shell. In this video; David Dye demonstrates how to create and remove a Content database in Microsoft PowerShell.
-
Content Types
Microsoft PowerShell and SharePoint provide farm administrators with the ability to manage; query; and create custom content types using PowerShell. In this video; David Dye demonstrates how to retrieve a list of content types within a site collection and programmatically create a custom content type using PowerShell.
-
Copying a Site
Microsoft PowerShell allows you to use existing site collections as templates for creating new site collections within SharePoint. In this video; David Dye demonstrates how to create a new site collection based on an existing one by using a PowerShell commandlet.
-
Create New Site Collection with Explicit Content Database
Microsoft PowerShell allows you to programatically create a SharePoint 2013 content database capable of holding a site collection. In this video; David Dye uses PowerShell cmndlets to create and configure a new site collection and explicitly define a new SPContentDatabase associated with the default Web App.
-
Create Web Application
In Microsoft PowerShell; you can create and configure a web application for SharePoint. In this video; David Dye demonstrates how to use various cmdlets to configure and query the configuration of a SharePoint application.
-
Deleted Sites
Once a site collection has been deleted; Microsoft SharePoint allows you to use site management cmdlets within PowerShell to display a list of deleted site collections and either restore them or permanently delete them from the farm. In this video; David Dye demonstrates how to use the Get-DeletedSite; Restore-DeletedSite; and Remove-DeletedSite cmdlets to query; restore; and remove deleted site collections.
-
Developer Dashboard
The Developer Dashboard within Microsoft SharePoint provides information you can use to locate the cause of any of the running problems with your application. In this video; David Dye demonstrates how to turn on; run; and turn off Developer Dashboard.
-
Diagnostic Logging
The logging cmdlets in Microsoft PowerShell allow you to configure diagnostic settings consistently across the entire SharePoint farm. In this video; David Dye demonstrates how to specify where the log files will reside and restrict disk space usage for log files using the Set-SPDiagnosticConfig cmdlet and its parameters; before using the Set-SPLogLevel cmdlet to set the trace logging level.
-
Enable Remoting
Microsoft SharePoint allows you to configure servers from within PowerShell to receive remote commands that affect the SharePoint farm. In this video; David Dye demonstrates how to enable remoting using the Enable-PSRemoting cmdlet and enable the Credential Security Support Provider (CredSSP) from within a PowerShell session before remoting in from a different server and adding a SharePoint snap-in.
-
Export Lists
Microsoft PowerShell and SharePoint enable administrators to use a PowerShell script to export a site collection list to a flat file. In this video; David Dye demonstrates how to set variables for the URL; list name; and path; and how to use the TryGetList and Export-Csv methods to export a comma-delimited file.
-
Farm Admins
Microsoft PowerShell allows you to have multiple Farm Administrators with varying administrative permissions. In this video; David Dye demonstrates how to add and configure Farm Administrators within a SharePoint Farm; using the farmAdministrators variable.
-
General Commands
In Microsoft SharePoint; the general commands available from within PowerShell allow you to perform a variety of tasks that include the assignment of variables and the configuration of settings within the SharePoint farm. In this video; David Dye uses general commands in PowerShell to enable the Customer Experience Improvement Program; configure Bing Maps; and assign variables.
-
Import and Export Sites
Microsoft PowerShell can be used to import and export site collections. In this video; David Dye demonstrates how to export site collections into a CMP file and how to import a site collection using PowerShell.
-
InfoPath Forms Service
Microsoft PowerShell and SharePoint provide administrators with the ability to query the InfoPath Forms Service configuration within a SharePoint farm. In this video; David Dye demonstrates how to use PowerShell to configure all SharePoint environments identically. He then retrieves information on form templates; using the PowerShell Get cmdlet; and enables and disables specific templates.
-
Managed Accounts
Microsoft PowerShell allows you to easily manage your existing Managed Accounts. In this video; David Dye demonstrates how to query and add Managed Accounts; as well as how to remove and configure existing Managed Accounts.
-
Managed Paths
Microsoft PowerShell allows you to add and configure Managed Paths for applications. In this video; David Dye demonstrates how to add; configure; and remove a Managed Path in SharePoint. He also demonstrates how to query a managed path and Host Header Information using PowerShell.
-
Managing User Licenses
Microsoft PowerShell provides cmdlets that allow you to manage supported SharePoint user licenses in the SharePoint farm. In this video; David Dye uses the Get-SPUserLicense cmdlet to return a list of SharePoint licenses; before demonstrating how to create a new license mapping object and enable user-license enforcement from within PowerShell.
-
Piping
In Microsoft PowerShell and SQL Server; you can use piping to pass values; variables; and results; from one commandlet to another. In this video; David Dye demonstrates how to effectively use the PowerShell Piping feature.
-
PowerShell Variables
You can create and utilize variables within the different cmdlets in Microsoft PowerShell within SharePoint. In this video; David Dye demonstrates how to declare and initialize PowerShell variables.
-
Querying
Microsoft PowerShell and SharePoint allow administrators to retrieve property information from an object using PowerShell. In this video; David Dye demonstrates how to query properties using a Select statement within a PowerShell cmdlet; pipe variables; objects or Get statements to a Select statement; and pipe the results to a Sort.
-
Recovering Data From an Unattached Content Database
Microsoft PowerShell provides database cmdlets that allow you to easily recover content from an unattached content database in a SharePoint farm. In this video; David Dye uses the Dismount-SPContentDatabase cmdlet to detach a content database from its web application; before demonstrating how to use the ConnectAsUnattachedDatabase parameter with the Get-SPContentDatabase cmdlet to return a specific unattached database in the farm.
-
Resource Measures
In Microsoft PowerShell; you can configure your SharePoint resource measures to reduce the resources used in a solution; limiting any weakening of the farm. In this video; David Dye demonstrates how to configure your resource measures; using spcode variables and resource measures.
-
Restore
You can use Microsoft PowerShell to restore all or some parts of the SharePoint farm. In this video; David Dye demonstrates the various levels of granularity at which SharePoint can be restored using PowerShell’s backup history.
-
Retrieve Information About Content Database
In Microsoft PowerShell and SharePoint; the SharePoint Management Shell can be used to retrieve various kinds of Content Database information. In this video; David Dye demonstrates how to retrieve information on a Content Database using PowerShell and pipe the information results.
-
Create Alert
Microsoft PowerShell integrates directly with SQL Server; allowing you to perform administrative tasks through the use of its commandline interface and corresponding set of cmdlets. In this video; David Dye demonstrates how to use cmdlets to create error alerts in SQL Server Agent.
-
Create SQL Audit
PowerShell allows you to create and configure SQL audits. In this video; David Dye demonstrates how to create an audit in PowerShell; how to create and set the destination for the audit; and finally enable the audit.
-
Displaying Results in Grid View
In PowerShell; you can display results using a grid view. In this video; David Dye demonstrates how to install and enable grid view in Windows PowerShell; and explains the process of showing results in grid view in SQL PowerShell.
-
Enable PS Remoting on SQL Instance
When using Microsoft PowerShell and SQL Server; you can enable PS remoting on SQL instances. In this video; David Dye demonstrates how to remote PowerShell commands to a network instance of SQL Server.
-
Execute SQL Agent Job
In Microsoft PowerShell; you can execute SQL Server Agent Jobs that have already been created. In this video; David Dye demonstrates how to use PowerShell to execute the previously created GetToday SQL Server Agent Job to supply the current date.
-
Find Disk Space for SQL Files
PowerShell has a number of commandlets available so you can analyze disk space on a disk or in a file group. In this video; David Dye demonstrates the process used to analyze the disk space available for SQL Server files.
-
Loading the SMO Assemblies into PowerShell
When using Microsoft PowerShell and SQL Server; loading SQL Server Management Objects (SMO) assemblies provides access to .NET objects within PowerShell that are designed to allow easy programmatic management of SQL Server. In this video; David Dye demonstrates how to load an SMO assembly into PowerShell and highlights the difference between doing so in PowerShell and SQL PowerShell.
-
Managing Client Network Protocols with WMI
When working with Microsoft SQL Server; the PowerShell cmdlets used with Windows Management Instrumentation (WMI) allow you to carry out system administration tasks such as managing client network protocols. In this video; David Dye uses the Microsoft.SqlServer.Management.Smo.Wmi namespace's ManagedComputer class to access and configure client protocols using WMI on an instance of Microsoft SQL Server.
-
Managing SQL Server Services
Managing SQL Server services using Microsoft's Windows PowerShell cmdlets allows you to easily and efficiently perform administrative tasks that include retrieving information; running; and stopping services. In this video; David Dye demonstrates how to use PowerShell cmdlets to retrieve information about a service; filter the information; modify the properties of a service; and start and stop a service.
-
PowerShell and the SQLConnection .NET Class
When using Microsoft PowerShell and SQL Server; the SqlConnection class allows you to work with SQL Server connections using .NET directly within PowerShell. In this video; David Dye uses a SqlConnection to establish a connection with a SQL Server database before passing a query; filling a DataAdapter with a table; and displaying the information; all from within PowerShell.
-
PowerShell from SSMS
Microsoft PowerShell allows you to run cmdlets directly within a Microsoft SQL Server Management Studio query using SQLCMD mode. In this video; David Dye demonstrates how to enable Microsoft SQL Server Management Studio's SQLCMD mode before creating a table he populates using PowerShell cmdlets.
-
PowerShell Job Step
In Microsoft PowerShell and SQL Server; you can use a SQL Server Agent Job within a PowerShell Job Step. In this video; David Dye demonstrates how to create an Agent Job by using a GETDATE script to send output to a file.
-
Restore All Databases from Most Recent Backup
In Microsoft PowerShell you can use commandlets to restore all databases in a SQL instance. In this video; David Dye demonstrates how to iterate through each one of the most recent backups to restore all databases.
-
Retrieve SQL Agent Job History
In Microsoft PowerShell; the SQL Server Agent Job History can provide a range of useful information. In this video; David Dye demonstrates how to use PowerShell to retrieve a SQL Server Agent Job History; how to review that history; and filter it using PowerShell commandlets.
-
Send Query Results Email
Microsoft PowerShell integrates directly with SQL Server; letting you perform administrative tasks through the use of its commandline interface and corresponding set of cmdlets. In this video; David Dye demonstrates how to use the cmdlets to send an email containing a result set gathered from a SQL Server Query.
-
sqlps Utility
Microsoft PowerShell allows you to manually input assemblies in Windows PowerShell; or have certain assemblies already available in SQL PowerShell. In this Video; David Dye demonstrates the differences between Windows PowerShell and SQL PowerShell.
-
Use PowerShell Utility to Create Stored Procedure
In Microsoft PowerShell; you can use the PowerShell Utility to create a Stored Procedure. In this video; David Dye demonstrates how to utilize a PowerShell utility in order to be able to create a SQL Server Stored Procedure within an instance of SQL.
-
Working with Databases Using SMO
When using SQL Server PowerShell from within Microsoft SQL Server Management Studio; SQL Server Management Objects (SMO) provides the .NET namespace that allows you to easily work with SQL Server databases using preloaded cmdlets. In this video; David Dye uses SMO to access SQL Server object information using PowerShell cmdlets.
-
Working with SQL Server Using SMO
SQL Server PowerShell is a Windows PowerShell module that ensures that SQL Server Management Objects (SMO) is preloaded; allowing you to work directly with SQL Server. In this video; David Dye demonstrates how to view all of the properties; methods; and objects associated with a SQL Server instance using SQL PowerShell from within Windows Microsoft SQL Server Management Studio.
-
Working with Tables Using SMO
When using Microsoft PowerShell and SQL Server; SQL Server Management Objects (SMO) allows you to easily and efficiently work with tables by utilizing the .NET namespace. In this video; David Dye uses a Script object to script out the tables within a database and generates the DDL script into another instance using SMO in SQL PowerShell.
-
Crawl a Content Source
Microsoft SharePoint 2013 allows users to crawl content sources. In this video; David Santana demonstrates how to start an incremental crawl on a specific content source.
-
Activate Cross-Site Collection Publishing Feature
Microsoft SharePoint 2013's publishing and authoring site templates enable administrators to publish specific lists; libraries; and term sets to different site collections using the Cross-Site Collection Publishing feature. In this video; David Santana demonstrates how to access and enable Cross-Site Collection Publishing on specific templates.
-
Activating the Cross Site Publication Feature
Microsoft SharePoint 2013 allows for cross-site publishing with multiple functionalities built into authoring and publishing sites using templates designed for collaboration. In this video; David Santana demonstrates how to create an authoring site collection using the Developer's template.
-
Add a Managed Account
Microsoft SharePoint 2013 allows the administrator to register managed service accounts created in Active Directory. In this video; David Santana demonstrates how to register and configure a managed service account for a specific service application.
-
Add a Server Name Mapping
Microsoft SharePoint 2013 provides users with the ability to add mappings for specific sites to override how server names appear in search results. In this video; David Santana demonstrates how to create a new server name mapping.
-
Adding Documents with Windows Explorer
SharePoint 2013 in conjunction with Windows Explorer allows you to easily add documents to your documents library. In this video; David Santana demonstrates how Windows Explorer is used in combination with SharePoint to upload a file to a shared documents library.
-
Adding Enterprise Key Word
Microsoft SharePoint 2013 allows you to group enterprise keywords in keyword sets; columns; or 'folksonomies' that display to and are shared by users and applications; enabling and filtering searches while providing you; the administrator; with metadata consistency. In this video; David Santana accesses SharePoint 2013’s Enterprise Metadata and Keywords Settings page to enable an Enterprise Keywords column and Keyword synchronization.
-
Assign Badges
Microsoft SharePoint 2013 allows users to assign the badges you have created. In this video; David Santana shows you how to assign a badge to a specific member.
-
Assign Office Web Apps Service Application Connections
Microsoft SharePoint 2013 enables administrators to assign Office Web App Service Application connections or associations. In this video; David Santana edits a group of services; disabling a service associated with a service application.
-
Change a Managed Account Password
Microsoft SharePoint 2013 allows you to change managed account passwords from the Central Administration page. In this video; David Santana demonstrates how to set; confirm; and configure a new password value for a managed service account.
-
Change Site Collection Administrators
SharePoint 2013 provides administrators with the ability to change the primary and secondary site collection administrators by using the Site Collection Administrators settings in Central Management. In this video; David Santana demonstrates how to change site collection administrators.
-
Change the SharePoint Farm Account
Microsoft SharePoint 2013 allows the administrator to change the farm account from the Central Administration page. In this video; David Santana demonstrates how to change and verify a farm account.
-
Checking Out and In a Publishing Site
SharePoint 2013 uses a versioning control that enables site administrators to check out site pages; edit them; check them back in with comments for fellow administrators; and publish them. In this video; David Santana demonstrates how to check out and edit pages; save and check them back in; and publish them.
-
Community Settings
Community Settings in Microsoft SharePoint 2013 allows you to manage how visitors contribute to your site discussions. In this video; David Santana demonstrates how to manage the community by changing the properties.
-
Configure a Document Set
Configuring a document set in Microsoft SharePoint 2013 allows users to link specific documents in a set. In this video; David Santana shows you how to create a content type and add to an existing group.
-
Configure a Result Source Rule
Microsoft SharePoint 2013 allows you to create and configure query rules for result sources. In this video; David Santana demonstrates how to add a new query rule and to configure it for a specific result source.
-
Configure Alternate Access Mappings
SharePoint 2013 allows administrators to configure alternate access mapping; thereby ensuring that URLs are suitably presented to users accessing a particular site. In this video; David Santana provides a detailed overview of how administrators are able to configure alternate access mappings from within the Central Administration store.
-
Configure and Start Document Conversion
Microsoft SharePoint 2013 allows administrators to configure document conversion in Central Administration; thereby providing users with the opportunity to convert documents from one format to another. In this video; David Santana starts the services needed to enable document conversion in SharePoint 2013.
-
Configure and Start SharePoint Services
In Microsoft SharePoint 2013; administrators have the ability to start and stop services through the SharePoint Central Administration web site that are to be deployed as service applications across sites throughout a farm. In this video; David Santana demonstrates how use the Central Administration web site to start and stop services.
-
Configure Crawler Impact Rules
Microsoft SharePoint 2013 allows users to configure crawler impact rules. In this video; David Santana demonstrates how to add a new rule to adjust the load that the crawler applies to a specific content source.
-
Configure Custom Application Proxy Group
Microsoft SharePoint 2013 allows administrators to easily create custom Application Proxy Groups. In this video; David Santana demonstrates how to create a custom Application Proxy Group comprising several Application Proxies on a selected Web Application.
-
Configure Diagnostic and Logging
SharePoint 2013's Diagnostic Logging page allows administrators to configure diagnostic and logging reports; using event throttling to determine the data captured by Windows and trace logs. In this video; David Santana reviews logging options by category; event; and service before configuring and creating a set of administration event log files.
-
Configure Diagnostic Logging
In Microsoft SharePoint 2013; administrators can use diagnostic logging to determine the severity of issues; prevent event log flooding; and allocate time and storage resources to event and trace logs. In this video; David Santana demonstrates how to configure diagnostic logging.
-
Configure File Types
Microsoft SharePoint 2013 provides you with the ability to add specific file types and configure them to a crawling database. In this video; David Santana demonstrates how to delete and add a file type to include in your search.
-
Configure Health Analyzer Timer Jobs
The functionality of SharePoint 2013's Health Analyzer depends on the configuration of the timer jobs collecting and logging its data. In this video; David Santana enables Health Data Collection; explains the functions of the timer jobs listed in the Job Definitions page; and shows you how to edit them.
-
Configure Incoming E-mail Settings in Central Administration
Microsoft SharePoint 2013 enables you to set up and configure incoming e-mail; directory management services; and incoming e-mail server settings. In this video; David Santana demonstrates how to configure and verify the optimal SMTP settings for incoming e-mail.
-
Configure Microblogging
Microsoft SharePoint 2013 allows administrators who have logged into the Central Administration web site to configure the new My Sites microblogging feature; which lets users follow people; sites; and documents. In this video; David Santana demonstrates how to configure microblogs from the SharePoint Central Administration web site.
-
Configure Outgoing E-mail Address for Web Apps
As an administrator; Microsoft SharePoint 2013 enables you to specify your SMTP server settings and configure outgoing e-mail on your SharePoint installation. In this video; David Santana configures an SMTP server with the appropriate domains; addresses; and character set.
-
Configure Outgoing E-mail Settings in Central Administration
Microsoft SharePoint 2013 allows you to configure the outgoing e-mail settings in central administration. In this video; David Santana demonstrates how to access the system settings to configure the outgoing e-mail settings.
-
Configure Password Change Settings
Microsoft SharePoint 2013 allows you to configure password change settings from the Central Administration page. For example; you can be notified of password expiry statuses and automatic password changes. In this video; David Santana configures password change e-mail notification; account monitoring process; and automatic password change settings.
-
Configure Quotas and Locks
As an administrator; SharePoint 2013 allows you to configure the quotas and locks for a specific quota template through the Site Collection Quotas and Locks page. In this video; David Santana demonstrates how to use the Site Collection Quotas and Locks page to configure a quota template.
-
Configure Ratings
SharePoint 2013 allows you to activate and configure two types of Rating settings that enable users to rate documents in a document library. In this video; David Santana uses the Library Ribbon to enable Rating settings before applying Star Ratings to documents in a library.
-
Configure RSS Feeds
RSS feeds in Microsoft SharePoint 2013 allow administrators or users to follow a discussion or a site page. In this video; David Santana shows you how to choose the RSS feature and synchronize it to a site page.
-
Configure Self-Service Site Creation
Microsoft SharePoint 2013 allows users to create a specific site collection within their My Sites. In this video; David Santana demonstrates how to configure self-service site creation.
-
Configure SharePoint Health Analyzer Rules
SharePoint 2013's Health Analyzer enables you to configure rules set on specific timer jobs. In this video; David Santana uses the Health Analyzer Rule Definitions settings to configure a new rule.
-
Configure SharePoint Server Farm to Use Office Web Apps
Microsoft SharePoint 2013 allows you to configure SharePoint Server Farm to use Microsoft Office Web Apps. In this video; David Santana demonstrates how to set up SharePoint Server Farm to use Microsoft Office Web Apps.
-
Configure SMPT on SharePoint Server
Microsoft's Internet Information Services (IIS) Manager and New SMTP Domain Wizard enable you to configure Simple Mail Transfer Protocol (SMTP) on your SharePoint Server. In this video; David Santana uses the IIS Manager to set authentication and relay restriction configurations and allocate a server IP address; before specifying an SMTP domain name and restarting the SMTP service.
-
Configure SSL for Central Administration
Microsoft SharePoint 2013 provides you with the ability to configure SSL for Central Administration. In this video; David Santana demonstrates how to access the SharePoint Central Administration site and assign a specific port for SSL.
-
Configure the Default Content Access Account
Microsoft SharePoint 2013 allows users to configure the default content access account. In this video; David Santana demonstrates how to specify the account to use as the default account when crawling content.
-
Configure Usage and Health Data Collection
SharePoint 2013's Health Analyzer's Log Collection Schedule enables you to configure data collection. In this video; David Santana configures the Log Collection Schedule and specifies a default Windows authentication server to import collected data.
-
Configuring Managed Properties
Microsoft SharePoint 2013 provides users with the ability to configure managed properties. In this video; David Santana demonstrates how to create a new managed property; configure its settings; and then search for the property just created.
-
Confirm Site Use and Deletion
SharePoint 2013 facilitates the freeing up of resources from unused sites by enabling administrators to send confirmation requests to site owners and automate the deletion of site collections if use is not confirmed. In this video; David Santana demonstrates how to use the Site Use Confirmation and Deletion page in SharePoint 2013.
-
Connect a Publishing Site to a Catalog
In SharePoint 2013; you can connect a publishing site to another site collection's lists or libraries so they can be used as a catalog of available files. In this video; David Santana demonstrates how to select and connect to a catalog; and integrate the catalog into a site.
-
Connecting a SharePoint 2013 List with Outlook
Microsoft SharePoint 2013 lets site users collaborate more efficiently by connecting and synchronizing SharePoint contact lists with Microsoft Outlook; enabling the data to be viewed and edited in the Outlook interface and when not connected to SharePoint. In this video; David Santana uses the Connect to Outlook option in SharePoint 2013 to connect a SharePoint contact list with Outlook.
-
Connecting SharePoint 2013 Calendars with Outlook
Microsoft SharePoint 2013 allows you to connect a SharePoint calendar to Microsoft Outlook that can be viewed and edited alongside your main Outlook calendar using the Outlook interface; even when you're offline. In this video; David Santana uses the Connect to Outlook option in SharePoint 2013 to connect a SharePoint calendar with Outlook.
-
Create a Best Bet
SharePoint 2013's SearchCenter interface allows administrators to create query rules or best bets by configuring query conditions and actions. In this video; David Santana demonstrates how to name and configure a search query rule or best bet.
-
Create a Content Source
Microsoft SharePoint 2013 allows users to create content sources for specific crawl servers. In this video; David Santana demonstrates how to add and configure a new content source that will perform a crawl on a server other than local SharePoint sites.
-
Create a Crawl Rule
Microsoft SharePoint 2013 allows users to create rules for crawling their content sources. In this video; David Santana demonstrates how to create and configure a crawl rule for a specific site.
-
Create a Crawl Schedule
Microsoft SharePoint 2013 allows users to create and edit a crawl schedule for their content sources. In this video; David Santana demonstrates how to edit and reschedule a specific crawl schedule.
-
Create a Document Workspace
In Microsoft SharePoint 2013; the Team Site; which has taken the place of the Document Workspace; allows you to create a custom Document Workspace where you and your colleagues can share tools and work together. In this video; David Santana describes some of the available apps in SharePoint 2013 before creating a custom Document Workspace.
-
Create a Managed Metadata Column
Microsoft SharePoint 2013 enables administrators with the required managed lists permissions to append term sets to lists and columns once they've been created. In this video; David Santana demonstrates how to create; manage; and customize; a column for managed metadata using the Term Set Manager.
-
Create a My Site Collection
Microsoft SharePoint 2013 enables administrators who have logged into the Central Administration web site to create My Site host site collections. In this video; David Santana uses the Enterprise site template; My Site Host; to create a My Site host site collection.
-
Create a New Web App
SharePoint 2013 allows administrators; using the Create New Web Application screen; to build claims or forms-based IIS web applications using Windows authentication to support site collections. In this video; David Santana uses SharePoint Web Services and the Create New Web Application screen to create a new IIS web site application and content database; before returning to the Site Collection page.
-
Create a Publishing Page
SharePoint 2013 enables you to easily create a site page; which; when checked out to you; is not editable by anyone else in your organization. Nor will it be visible to site visitors before publication. In this video; David Santana uses the Add a page dialog box to create an editable site page checked out to you.
-
Create a Result Source
Microsoft SharePoint 2013 provides you with the ability to create a result source to limit the scope of your search results. In this video; David Santana demonstrates how to add and configure a new result source; or search scope.
-
Create a Service Account for Web Apps
Microsoft SharePoint 2013 allows you to create a service account for web apps. In this video; David Santana demonstrates how to configure a service account for web apps in the Active Directory administrative center.
-
Create a Service Account to Run Managed Metadata
Microsoft SharePoint 2013's managed metadata service application enables the use of managed metadata and allows you to share content types across site collections and web applications. In this video; David Santana demonstrates how to create and configure a new managed metadata service account.
-
Create a Service Account to Run Word Automation Services
You can; after defining Word Automation Services as a user in Windows PowerShell; create a user account enabling its use by Microsoft SharePoint 2013. In this video; David Santana uses Windows PowerShell to register Word Automation Services as an Active Directory user before he creates and configures a Word Automation Services account.
-
Create a Service Application
Microsoft SharePoint 2013 uses service applications such as those for Access; Excel; and InfoPath that require service applications to be created by the administrator for them to work. In this video; David Santana demonstrates how to create a service application in SharePoint 2103 Central Administration.
-
Create a Wiki Page
Microsoft SharePoint 2013 lets you create wiki sites that allows groups of people in an organization to quickly capture and share ideas. In this video; David Santana creates and edits a wiki site in SharePoint.
-
Create Active Directory Security Groups
Microsoft SharePoint 2013 enables you to manage site users by assigning permission levels to security groups instead of to individual users or Active Directory Domain Services. In this video; David Santana creates; names; and configures a security group from the Active Directory Administrative Center and then adds a user to the group.
-
Create an E-mail Enabled Announcement List
Microsoft SharePoint 2013 allows you to create an e-mail enabled announcement list. In this video; David Santana demonstrates how to set up and name an announcement list and then configure incoming e-mail settings.
-
Create Badges
Creating a badge in Microsoft SharePoint 2013 allows users to apply it to specific members for their achievements and any additional contributions. In this video; David Santana shows you how to create and apply a badge.
-
Create Categories
Microsoft SharePoint 2013 allows users to create categories to locate specific post and discussions. In this video; David Santana shows you how to create a category.
-
Create Categories in Blogs
Creating categories in blogs in Microsoft SharePoint 2013 helps users navigate to the correct blog. In this video; David Santana shows you how to create a category.
-
Create DNS Record for Domain and SharePoint Site
Microsoft's Domain Name Server (DNS) Manager enables you to create a DNS record for your SMTP server role. In this video; David Santana uses the DNS Manager to create a new Host (A) record for the SMTP server role configured on the SharePoint server at the same IP address.
-
Create Server Farm Account
You can create a Microsoft SharePoint 2013 server farm account through your Active Directory Administrative Center. In this video; David Santana logs into the Active Directory Administrative Center and provides the details needed to set up a new; password-protected user account.
-
Create Site Collections
By using the Central Administration store in SharePoint 2013; administrators can create site collections; which are a grouping of sites under a top-level site sharing common administrative pages and site settings. In this video; David Santana demonstrates how to create a site collection in SharePoint 2013.
-
Create SQL Server Alias
You can use Microsoft SQL Server's SQL Server Client Network Utility to create a SQL Server alias for a database created for use by SharePoint 2013. In this video; David Santana launches the SQL Server Client Network Utility from both the Windows 32-bit and 64-bit system folders in File Explorer; and enters a SQL Server alias in each instance.
-
Delete Lists Using View
Deleting items from lists in Microsoft SharePoint 2013 is possible using View Item. In this video; David Santana shows you how to remove an item to the Recycle Bin.
-
Delete Site Collections
SharePoint 2013 allows the site owner to permanently delete a site collection. In this video; David Santana demonstrates how to delete a site collection through the Central Administration store.
-
Detach a Content Database
SharePoint 2013 allows administrators to detach and perform maintenance on ? or move ? a content database through the Manage Content Database Settings page. In this video; David Santana demonstrates how to use the Manage Content Database Settings page to detach a database from the server.
-
Disable Loop Back Checking
You can enable access to IIS-hosted domains; site collections; and applications on your Microsoft SharePoint 2013 Server by disabling the default loop back check in your system registry. In this video; David Santana uses Microsoft's Registry Editor to access and edit the BackConnectionHostNames entry before resetting IIS from Windows PowerShell.
-
Edit a Publishing Page
Editing a publishing site page in Microsoft SharePoint 2013 is simple and easy. In this video; David Santana shows you how to show the Ribbon interface and edit a publishing site page.
-
Edit a Thesaurus File
In Microsoft SharePoint 2013; the Thesaurus in not editable; like it was in SharePoint 2010. Instead; you need to use Managed Properties to create specific searches and properties. In this video; David Santana introduces the Managed Properties page; where administrators can view; create; or modify managed properties.
-
Editing in Office Web Apps
SharePoint 2013; when used in conjunction with Office Web Apps; allows you to view and edit Word; Excel; PowerPoint; and OneNote documents in your web browser. In this video; David Santana demonstrates how to open and edit a document using an Office Web App.
-
Editing Properties in Manage Group
Editing properties in Microsoft SharePoint 2013 is easy using the Manage group. In this video; David Santana shows you how to perform this task.
-
Enable a Record Declaration
By configuring record declaration; Microsoft SharePoint 2013 allows you to create and store records within specific lists or libraries on a site. In this video; David Santana uses the Record Declaration Settings in SharePoint to enable the manual declaration of records at the site level.
-
Enable Document Conversion
Before users can convert documents from one format to another using the document conversion in Microsoft SharePoint 2013; the feature first needs to be enabled by the Site administrator. In this video; David Santana demonstrates how to enable and configure document conversion in SharePoint.
-
Enable SMPT on SharePoint Server
Microsoft SharePoint 2013's Add Roles and Features Wizard allows you to set up your e-mail server on the same server on which SharePoint is deployed. In this video; David Santana uses the Add Roles and Features Wizard to install the SMTP server feature.
-
Enable TCP IP Connectivity in SQL Server
You can use Microsoft's SQL Server Configuration Manager to enable TCP/IP connectivity; thereby enabling your SharePoint 2013 server farm to communicate with your SQL Server databases. In this video; David Santana enables TCP/IP connectivity through the SQL Server Configuration Manager; reviews SQL Server's TCP/IP properties; and restarts the MSSSQLSERVER Service.
-
Explore Document Libraries
Document libraries in Microsoft SharePoint 2013 offer you enhanced user experience. In this video; David Santana shows you how use the callouts to do inline editing and how to drag and drop files to the library.
-
Explore Query Crawl Logs
Microsoft SharePoint 2013 allows users to search and review the query crawl logs. In this video; David Santana demonstrates how to view the crawl logs and to search for the crawl history on specific sites.
-
Extending Web Application to Another IIS Website
Microsoft SharePoint 2013 allows administrators to extend or isolate web applications to other Internet Information Services (IIS) sites; or zones sharing content with users. In this video; David Santana uses SharePoint 2013's Extend option to extend and configure the port; authentication; and sign-in page of a web application to a zone.
-
Hidden Ribbon Interface
SharePoint 2013 enables you to access the Ribbon interface; which remains hidden from the end user; on your TeamSite and NewDocumentLibrary pages. In this video; David Santana shows you how to use tabs to access the SharePoint 2013 Ribbon interface from your TeamSite and NewDocumentLibrary pages; and introduces additional options that have been added to the Ribbon.
-
Install Active Directory Certification Services
With Microsoft SharePoint 2013; you can install Active Directory Certificate Services (ADCS) and its related services; in order to acquire certificates from a certification authority. In this video; David Santana uses the Server Manager to install ADCS.
-
Installing Workflow Manager
Microsoft SharePoint 2013's Workflow Manager 1.0 Wizard and SharePoint Management Shell enable administrators to use Workflow Manager on the SharePoint Server to manage HTTP and HTTPS requests. In this video; David Santana installs Workflow Manager and uses the Register-SPWorkflowService command and WorkflowHostURI to register the service on his host site.
-
Interactive Options Hover Panel
SharePoint 2013's hover panel offers previews; informational data; and interactive sharing and editing functionalities without having to log in to a site or document. In this video; David Santana activates the hover panel and explores its features.
-
Join a Community
Joining a community in Microsoft SharePoint 2013 is vital. In this video; David Santana shows you how to navigate to a community site and join as a member.
-
Leave a Community
Leaving a community in Microsoft SharePoint 2013 is important. In this video; David Santana shows you how to navigate to a community page and leave the community.
-
Logging In and Logging Out
Logging in and logging out of a Microsoft SharePoint 2013 team site is important when you leave your desk or if you are logged in remotely. In this video; David Santana shows you how to use the familiar user interface of SharePoint 2013.
-
Make Term Set Available for Tagging
Microsoft SharePoint 2013's Term Store Management Tool enables site collection administrators to manage term sets and make them available for tagging for consumption by other sites. In this video; David Santana demonstrates how to use the Term Store Management Tool to select a term set to ensure it's available for tagging.
-
Make Term Set Available to Offsite Collections
Once you have created a term set on the site collection; with the necessary credentials; Microsoft SharePoint 2013 allows you to make the term collection globally available to all publishing site collections. In this video; David Santana uses the Term Store management tool to create a global term set and make it available to all site collections.
-
Manage Categories
Managing categories in Microsoft SharePoint 2013 allows end users to choose actual communities; discussions; or conversations. In this video; David Santana shows you how to manage items in categories and assign workflows and specify alerts.
-
Manage Comments
Microsoft SharePoint 2013 allows you to manage comments after creating a specific conversation in your Newsfeed. In this video; David Santana shows you how to manage comments.
-
Manage Content Database
SharePoint 2013's Manage Content Database Settings page allows administrators to manage multiple database features and functionalities including failover; capacity; and database removal; as well as select servers for timer jobs. In this video; David Santana accesses the Manage Content Database Settings page to give an overview of the settings available to administrators.
-
Manage Discussion
Microsoft SharePoint 2013 allows you to manage discussions if you have elevated privileges. In this video; David Santana shows you how to manage discussions.
-
Manage Posts
Managing posts in a Microsoft SharePoint 2013 blog site is easy. In this video; David Santana shows you how to navigate to manage your posts.
-
Manage Web Apps
SharePoint 2013 provides the administrator with numerous options when managing web apps; for site content databases; through the Central Administration store. In this video; David Santana provides a detailed overview of the features and settings available to the SharePoint Administrator.
-
Map Proxy Groups to Web Apps
Microsoft SharePoint 2013 enables you to create specific associations between proxy groups of service apps and their web applications. In this video; David Santana give a comprehensive introduction to mapping proxy groups to web apps; thereby configuring service application associations.
-
Modify a Search Center
Microsoft SharePoint 2013 allows users to modify the look and feel of the Search Center. In this video; David Santana demonstrates how to choose and preview a theme for your site.
-
Move Multiple Site Collections
SharePoint 2013 enables you to use the SharePoint Management Shell to move multiple site collections between content databases. In this video; David Santana uses the get-spsite command in conjunction with the move-spsite command to retrieve the site collections in a content database and move them to a destination database ? verifying the command using the WhatIf commandlet.
-
Move Site Collections Between Databases
SharePoint 2013 enables you to use the SharePoint Management Shell to move site collections between content databases on different servers. In this video; David Santana activates tab-complete and Quick Edit Mode in SharePoint Management Shell; before using the get-help and WhatIf commandlets to obtain information on and test the validity of the move-spsite command.
-
My Site Social Computing Features
Microsoft SharePoint 2013 includes new features and a redesigned user interface for My Site; a dedicated personal site that allows you to connect with others and share expertise within an organization. In this video; David Santana demonstrates features new to My Sites in SharePoint 2013; including Newsfeed and blogging functionality.
-
Newsfeed Settings
Microsoft SharePoint 2013 allows administrators and content authors with elevated privileges to alter your Newsfeed settings. In this video; David Santana demonstrates how to set for privacy; email notifications; people I follow; and activities I want to share in my newsfeed.
-
Overview of Office Web Apps
SharePoint 2013 is well integrated with the Office Suite products; and when combined with the Office Web Apps; provides you with the ability to easily view; edit; and create Office documents directly in a SharePoint document library. In this video; David Santana provides an overview of how SharePoint 2013 uses Office Suite products and Office Web Apps.
-
Provision a New Office Web Apps Server Farm
Microsoft SharePoint 2013 allows you to configure a new Office Web Apps Server Farm. In this video; David Santana demonstrates how to provision a new Office Web Apps Server Farm for PowerPoint; OneNote; Excel; and Word.
-
Publish Service Application
Microsoft SharePoint 2013 allows you to publish Service Applications to server farms with which you enjoy a trust relationship. In this video; David Santana demonstrates how to publish and configure a Service Application to be of use to administrators and users of trusted server farms linked by a federation trust.
-
Publishing a Library
Microsoft SharePoint 2013 enables administrators to publish site libraries; their columns; and metadata term sets as catalogs that allow other sites to search or navigate them. In this video; David Santana demonstrates how to access a site library's catalog settings; check the last crawl time of its indexed items; and configure the library as a catalog.
-
Publishing a List
Microsoft SharePoint 2013 enables authoring-site administrators with the required permissions to publish and share library lists across sites. In this video; David Santana demonstrates how to create a list; add and configure a managed metadata column; anchor it to a term set; and share it for consumption by other sites.
-
Query Rules
Microsoft SharePoint 2013's query rules enable you; as an administrator; to conditionally enhance searches by defining query rules that order rankings; promote relevant results; and display additional blocks of results. In this video; David Santana details the variables defining the time-sensitive context in which query results are generated or fired and adds a query rule; specifying its conditions and actions.
-
Rate an Item
Rating a discussion item in Microsoft SharePoint 2013 is useful for users who depend on reviews and ratings to follow discussions. In this video; David Santana shows you how to rate an item.
-
Refiners in Enterprise Search Center
SharePoint 2013's Enterprise Search Center search page features refiners that allow you to narrow your search results by categorizing them; thereby providing detailed search results that enable you to easily locate specific information. In this video; David Santana performs a search and describes the results page refiner options.
-
Reindex a Catalog
One of the new features in Microsoft SharePoint 2013 is the ability to easily force the content of a list or library to be reindexed during the next scheduled crawl of the search service. In this video; David Santana demonstrates how to navigate to and use the Reindex List feature in SharePoint 2013.
-
Reindex a Library
In Microsoft SharePoint 2013; you can quickly and easily reindex a list or library to make finding newly added content more efficient. In this video; David Santana demonstrates how to reindex a SharePoint document library.
-
Reply to Existing Discussion
Replying to an existing discussion in Microsoft SharePoint 2013 is simple. In this video; David Santana shows you how to reply to a discussion.
-
Team Site Overview
SharePoint 2013's TeamSite template allows you to create sites you can configure to facilitate user collaboration. In this video; David Santana introduces the functions of live tiles on a TeamSite page; explains the drag-and-drop capabilities of the file list; and points out features that allow you to invite people to your site or start conversations on your Newsfeed.
-
Unpublish a Page and Delete a Page
SharePoint 2013's Ribbon allows you to unpublish site pages; enabling you to move these pages to the Recycle Bin. In this video; David Santana activates the Unpublish function before deleting the page.
-
Using Central Admininstration to Backup a Content Database
Microsoft SharePoint 2013's Backup and Restore feature advises you of backups and restores under way; and enables you to select components; including Web Application databases; to back up. In this video; David Santana demonstrates how to choose a backup type and specify a backup location for a Web Application database.
-
Using Excel Web App to Edit SharePoint Files
When used together with Microsoft SharePoint 2013; Excel Web App allows you to open an Excel workbook from within a document library on your SharePoint site in order to edit data and perform other basic spreadsheet operations directly in the browser. In this video; David Santana uses the Excel Web App in SharePoint to change spreadsheet data in the browser.
-
Using PowerShell to Create a Host Named Site Collection with Multiple URLs
Microsoft SharePoint 2013 enables you to use Windows PowerShell to map multiple URLs to an existing host-named site collection. In this video; David Santana uses the set-spsiteurl commandlet and -Zone parameter to configure multiple URLs for an existing SharePoint 2013 host-named site collection.
-
View All Site Collections
SharePoint 2013 assists administrators by listing all the site collections for a web application; and by providing easy access to information about a particular site collection in the Site Collection List page. In this video; David Santana demonstrates how to view all the site collections for a web application from within the Central Management store.
-
View Most Popular Items in SharePoint 2013
Microsoft SharePoint 2013 combines analytics and search results; providing you with the ability to determine which content is most popular by viewing usage statistics for all items in a library or list. In this video; David Santana demonstrates how to use the Most Popular Items page to view popularity trends reports for specific files in a SharePoint document library.
-
Viewing Popularity Trends
Microsoft SharePoint 2013 lets you generate Popularity Trends reports via Excel; which allows you to view historical data on hits and unique users for a site collection; site; or even for a specific document. In this video; David Santana uses the Popularity Trends option in SharePoint 2013 to generate a usage report.
-
Working with Site Pages
Working with site pages in Microsoft SharePoint 2013 is simple. In this video; David Santana shows you how to add sub-sites and do site searches on the Followed Sites page.
-
Reputation Settings
Reputation settings in Microsoft SharePoint 2013; such as stars or I like it; allows users to specify reputation settings on specific items or members. In this video; David Santana demonstrates how to customize rating settings; member achievements; point system; and achievement level points.
-
Request Manager
Microsoft SharePoint 2013's IIS (Internet Information Services) Request Manager enables administrators to deploy hardware load balancers (HLBs) to balance; prioritize; and route HTTP requests through to their front-end servers or site collections. In this video; David Santana uses the SharePoint 2013 Management Shell and SPServiceInstance to enable and configure Request Manager and its services on SharePoint Server.
-
Restart the Search Service
SharePoint 2013 allows administrators to stop and restart the search service from the command-line utility. In this video; David Santana demonstrates how to stop and restart the SharePoint search service.
-
Retrieving Members with People Search
Using SharePoint 2013; you can view specific profile information; such as department and skill set; when performing a people search. In this video; David Santana demonstrates how to perform a people search using both the Enterprise Search Center and the regular search functionality of SharePoint 2013.
-
Retrieving Search Results
SharePoint 2013's Central Administration Store allows you to create and configure an Enterprise Search Center search page. You can access its results using options defining broad or refined categories. The hover panel offer further refinement. In this video; David Santana performs a search and introduces the results page refiner options; including the hover panel.
-
Review a Log File
Microsoft SharePoint 2013 provides you with the opportunity to monitor and troubleshoot SharePoint issues by reviewing log files. In this video; David Santana describes the information contained in a SharePoint log file.
-
Review Farm Account Settings
Microsoft SharePoint 2013 allows administrators to manage and configure the farm group account settings from Server 2012's Administrative Tools and through Internet Information Services (IIS). In this video; David Santana uses the Administrative Tools Services feature to explore the SharePoint Timer Service properties before accessing and reviewing basic and advanced farm account settings from within IIS.
-
Review Health Analyzer
SharePoint 2013's Health Analyzer offers explanations; warnings; and remedies that enable you to monitor and review problems by category and service in your server farm infrastructure; thereby ensuring its health and ability to achieve optimal service performance. In this video; David Santana identifies a service problem and introduces the explanations; remedies; and viewable rule settings populated by Health Analyzer.
-
Review the Encryption of Central Administration
Microsoft SharePoint 2013 allows the encryption of the Central Administration page using Secure Socket Layer (SSL); thereby safeguarding your managed accounts’ user names and passwords. In this video; David Santana demonstrates how to use the security settings to check whether the page is encrypted for secure communication.
-
Ribbon Interface
SharePoint 2013's hidden Ribbon interface; which enables you to access options and editing features; can be accessed from a NewDocumentLibrary page. In this video; David Santana shows you how to use access the Ribbon from the Library tab of a NewDocumentLibrary.
-
Run Products Configuration Wizard
Microsoft SharePoint 2013's Products Configuration Wizard enables you to connect your SharePoint Server to its farm; create content databases and site collections; and install and configure application services. In this video; David Santana introduces the Products Configuration Wizard.
-
Search Using Windows Explorer
SharePoint 2013 enables you to perform searches in a split screen; displaying both your site's document library and a fully functional Windows Explorer that allows you to drag and drop files; and delete multiple files at once. In this video; David Santana searches on a site file and opens it in its default application from Windows Explorer.
-
Set Up a Community Portal
Microsoft SharePoint 2013 allows administrators to create Community Portals that provide a directory of Community Sites; enabling users to search for communities of interest. In this video; David Santana demonstrates how to create a Community Portal from the SharePoint Central Administration web page in SharePoint 2013.
-
Set Up a Community Site
Microsoft SharePoint 2013 allows administrators to create Community Sites. This helps to encourage collaboration among organizational communities by providing places where members can discuss and explore common topics. In this video; David Santana demonstrates how to create a Community Site from the SharePoint 2013 Central Administration web page.
-
Sharing Documents
SharePoint 2013 allows you to share documents with other members through the Open Menu callout and Share dialog box. It also enables you to see who already has access to documents. In this video; David Santana shows you how to share a SharePoint document through the Share option in the Open Menu dialog box.
-
Site Settings
SharePoint 2013 replaces Site Actions with Site Settings; a page listing the many features and settings available to you. In this video; David Santana shows you how to access the Site settings page from the Settings callout on your TeamSite page; and offers a brief introduction to each of its nine sections.
-
Specify Default Database Server
SharePoint 2013 enables you to specify a default database server to hold your content databases and site collections. In this video; David Santana demonstrates how to use the Default Database Server page to select a default SQL server database server and Windows authentication.
-
Specify Quota Templates
SharePoint 2013 allows the administrator to specify quota templates; enabling storage limit values and warning limit values on a site collection to be set; so that when the maximum storage level is reached the site collection is locked to read-only. In this video; David Santana demonstrates how to specify a quota template from the Quota Templates page.
-
Start the Timer Service
As an administrator in Microsoft SharePoint 2013; it may be necessary to start the SharePoint Timer service; which is the service that runs other services by schedule. This is easily accomplished through the Services console. In this video; David Santana uses the Windows Services console to start the SharePoint Timer service.
-
Stop the Timer Service
Administrators sometimes need to prevent some of the functionality in Microsoft SharePoint 2013 by stopping the SharePoint Service Timer service – the service that runs other services according to schedule. In this video; David Santana uses the Windows Command Prompt to stop the Timer service in SharePoint 2013.
-
Schema and Content
In Microsoft SharePoint Server 2013; you can use SharePoint to sort content. In this video; Joe Barrett uses SharePoint to demonstrate the three ways content is classified.
-
Access Data Using a Custom WCF service
Microsoft SharePoint Server 2013 supports the creation of Windows Communication Foundation (WCF) custom web services that provide an interface between SharePoint and applications. In this video; Telmo Sampaio demonstrates hosing a WCF service in IIS and SharePoint and how to create and deploy a custom WCF service hosted in SharePoint.
-
Access Data Using REST API
Microsoft SharePoint Server 2013 provides the Representational State Transfer (REST) API that allows you to remotely interact with SharePoint sites using the REST and OData web protocol standards. In this video; Telmo Sampaio demonstrates how to make REST calls to SharePoint hosted data from a browser using HTTP requests and OData operators.
-
Accessing Data Outside of Sandbox Scope
In Microsoft SharePoint Server 2013; a sandbox solution can’t access anything outside the solution; such as a file system or network; on its own. In this video; Telmo Sampaio demonstrates how to use a full-trust proxy to access data on behalf of a sandbox solution.
-
App Permission Request Scopes
In Microsoft SharePoint Server 2013; you can use permission scopes and rights to grant user authorization or restrict user actions. In this video; Joe Barrett explains the permissions which can be granted to certain scopes of action; including the permission anomalies for certain scopes.
-
App Permissions
In Microsoft SharePoint Server 2013; you can use apps to build custom solutions which run outside the SharePoint Server for a lighter footprint. In this video; Joe Barrett explains how to build an app; set permissions; where to install an app; and how to configure a remote app to call into the SharePoint Server data.
-
Applying Chrome Control for Apps
In Microsoft SharePoint Server 2013; Chrome Control allows you to give a provider-hosted app the look and feel of a regular SharePoint page. In this video; Telmo Sampaio demonstrates how you can apply Chrome Control to a provider-hosted app; and modifies the js and appManifest files to implement ShowChrome.
-
Assembly Binding Redirection
Microsoft SharePoint Server 2013's Assemblies element specifies binding redirects for DLLs installed with a solution upgrade. In this video; Telmo Sampaio demonstrates how to change the assembly version number; before updating the solution manifest by creating an Assemblies element in the Package.Template.xml file.
-
Authenticating a User from a Client Application
Microsoft SharePoint Server 2013 allows you to authenticate users for SharePoint web applications. In this video; Joe Barrett demonstrates the Claims Based Authentication method and the Windows Authentication package; and then determines which authentication is configured in SharePoint Central Administration for different zones.
-
Building a CAML Query
Microsoft SharePoint Server 2013 allows you to use Collaborative Application Markup Language (CAML) to build queries against SharePoint lists and views. In this video; Telmo Sampaio demonstrates how to customize a Content Query Web Part and use CAML queries in your code.
-
Choosing Appropriate APIs
Microsoft SharePoint Server 2013 provides several sets of APIs that you can choose from when accessing SharePoint data. In this video; Telmo Sampaio demonstrates the different APIs and the factors that determine which API to use; before providing examples that illustrate how to choose the right API in a given scenario.
-
Client-side Object Model
Microsoft SharePoint Server 2013 provides the SharePoint .NET Framework client object model (CSOM) that allows you to access SharePoint objects from a client machine. In this video; Telmo Sampaio demonstrates the main CSOM classes and how to use CSOM operations to complete list-related tasks programmatically.
-
Code to Provisioning
Microsoft SharePoint Server 2013 allows you to provision a new SharePoint site and make it available to the end user. In this video; Joe Barrett demonstrates how to use code to provision a SharePoint site by inheriting from an existing class and overriding the provisioning method to create a custom site definition.
-
Configure and Troubleshoot a Sandbox Solution
In Microsoft SharePoint Server 2013; you can publish and deploy a sandbox solution. In this video; Telmo Sampaio demonstrates the different ways that farm administrators and site collection administrators can deploy a sandbox solution.
-
Configure Feature Dependencies
Microsoft SharePoint Server 2013 allows Feature dependencies to be set by name or by GUID. In this video; Telmo Sampaio demonstrates how to establish and configure a SharePoint Feature's dependency settings in Visual Studio.
-
Configure Feature Upgrades and Versioning
Microsoft SharePoint Server 2013 allows the programmatic upgrades of a Feature's manifest file in Visual Studio and PowerShell. In this video; Telmo Sampaio demonstrates how to use the UpgradeActions element and the Upgrade() method to programatically upgrade a Feature.
-
Configure No-code Customizations
Microsoft SharePoint Server 2013 allows you to export and reuse a no-code solution you’ve created. In this video; Telmo Sampaio demonstrates how to save a no-code solution as a template and how to activate and reuse the template.
-
Configure Solution Dependencies
Microsoft SharePoint Server 2013 allows solution dependencies to be established by inserting an ActivationDependencies element in the dependent solution's manifest file. In this video; Telmo Sampaio demonstrates how to locate the SolutionID required by the dependent SharePoint solution.
-
Configure Solution Upgrades and Versioning
Microsoft SharePoint Server 2013 allows solutions upgrades through PowerShell. In this video; Telmo Sampaio demonstrates how to upgrade a SharePoint solution by programming an Uninstall; a Remove; and an Install; before discussing programming an update over the older version.
-
Configuring Global and Current Navigation
In Microsoft SharePoint Server 2013; a website can have global; current; breadcrumb; and metadata navigation. In this video; Telmo Sampaio; demonstrates how to use the Navigation option to configure global and current navigation.
-
Configuring Workflows
Microsoft SharePoint Server 2013 allows you to configure workflows to automate business processes; either for specific features or on site-level for administrative tasks. In this video Joe Barrett demonstrates how to add and configure workflows using Visual Studio.
-
Content Inheritance
Microsoft SharePoint Server 2013 allows you to create content types that can be replicated when creating new content types. In this video; Joe Barrett demonstrates how to configure content type IDs and inheritance in Microsoft SharePoint Server 2013.
-
Content Policies
In Microsoft SharePoint Server 2013; policies can be associated with content types. When creating a policy; you can set features such as retention; auditing; labels; and barcodes. In this video; Joe Barrett demonstrates how to create a policy at Site Collection level and then associate it with a particular site content type.
-
Content Subscription
Microsoft SharePoint Server 2013 allows you to manage content subscription and ensure that subscriber jobs are configured and running correctly. In this video; Joe Barrett demonstrates how to subscribe a site to published content types using three different windows.
-
Create a Custom Membership Provider
In Microsoft SharePoint Server 2013; you can create custom membership providers similar to those in ASP.NET. In this video; Joe Barrett demonstrates how to create a membership provider class that can be deployed and referenced from the config files in your SharePoint installation.
-
Create a Custom Role Provider
Microsoft Visual Studio allows you to create and deploy a custom role provider which can be used in Microsoft SharePoint Server 2013 an external tool. In this video; Joe Barrett demonstrates the components of a custom role provider within Visual Studio and how to deploy it to SharePoint as an external tool.
-
Create a Custom Sign-in Page
In Microsoft SharePoint Server 2013; you can create a custom login page for your web application. In this video; Joe Barrett demonstrates how to create a custom login page with its own background infrastructure and how to deploy the ASPX to SharePoint so that users can interact with the custom login page instead of the default login page.
-
Create a Site
In Microsoft SharePoint Server 2013 you can create site definitions using Microsoft Visual Studio. In this video; Joe Barrett demonstrates how to create site definitions; modify the XML and ASPX page files; and then map the test site configuration.
-
Create a Web Template
Microsoft SharePoint Server 2013 allows you to create web templates by saving an existing site as a web template; either programmatically or from SharePoint Central Administration. In this video; Joe Barrett demonstrates how to define a subsite in Visual Studio and then create a web template using the SharePoint developer site.
-
Create and Apply Custom Themes
Microsoft SharePoint Server 2013 allows you to create a composed look for your site. A composed look adds a theme to a background image and a master page. In this video; Telmo Sampaio demonstrates how to use the Composed looks gallery to create a composed look with a name; title; master page URL; and theme URL.
-
Create Content Types
In Microsoft SharePoint Server 2013; you can use content types to standardize how data is expressed for a document. In this video; Joe Barrett demonstrates how to create content types using the developer site or Visual Studio; and how to add fields to content types in Visual Studio.
-
Create Custom Permissions
In Microsoft SharePoint Server 2013; you can assign permission levels to groups. In this video; Joe Barrett demonstrates how to use Visual Studio to create custom permission levels.
-
Create Role Definitions
In Microsoft SharePoint Server 2013; you can use role definitions and permission levels to define the rights for a user or a group. In this video; Joe Barrett demonstrates how to use C# Visual Studio to create custom role definitions and permission levels.
-
Creating a Channel
In Microsoft SharePoint Server 2013; a Device Channel links a type of user device to a specific set of master pages. In this video; Telmo Sampaio demonstrates how to use the Device Inclusion Rules option to link a Windows phone device to use a specific master page.
-
Creating a Custom Navigation Provider
Microsoft SharePoint Server 2013 allows you to add a custom map provider to your SharePoint site. In this video; Telmo Sampaio demonstrates how to use the Design Manager to change a master page to include the SiteMapProvider and controller for navigation.
-
Creating a Custom Workflow Action Project
Microsoft SharePoint Server 2013 workflows offer very limited available actions as they are; so it's best to build custom workflows in Visual Studio to suit your particular needs. In this video; Telmo Sampaio demonstrates how to create a custom workflow action project; add activities to it; and create sequences; attributes; parameters; and logic for the activities.
-
Creating a Master Page
In Microsoft SharePoint Server 2013; a master page is an HTML file that you can create in any text editor. In this video; Telmo Sampaio demonstrates how to use the Design Manager to convert an existing HTML file to a master page.
-
Creating a Remote Event Receiver
Microsoft SharePoint Server 2013 allows you to create remote event receivers using SharePoint's integrated common technical infrastructure. In this video; Telmo Sampaio demonstrates how to create server-side and remote remote event receivers; in both sand-box and farm solutions.
-
Creating a Work Item Timer Job
Microsoft SharePoint Server 2013 allows you to create work item timer jobs using SharePoint's integrated common technical infrastructure. In this video; Telmo Sampaio demonstrates how to use timer jobs in SharePoint to schedule tasks; and discusses some of the commands associated with timer jobs.
-
Creating and Installing Solution Validators
In Microsoft SharePoint Server 2013; you can use solution validators to determine whether to deploy solutions; based on their properties. In this video; Telmo Sampaio demonstrates how to create a solution validator.
-
Creating and Uploading JavaScript Files
In Microsoft SharePoint 2013; you can use JavaScript; as well as XLST; to alter the appearance and behavior of lists. In this video; Telmo Sampaio demonstrates how to create a JavaScript file and use it with XLST to determine the behavior of a SharePoint list.
-
Creating Auto-Hosted Apps
In Microsoft SharePoint Server 2013; aside from hosted apps; you used to be able to create auto-hosted apps. However; the support for this type of app was removed at the end of June 2014. In this video; Telmo Sampaio briefly runs through how to create an auto-hosted app in the event these are still asked about in subsequent examinations.
-
Creating Display Templates
In Microsoft SharePoint Server 2013; you can use display templates written in JavaScript to modify solutions you’ve created. In this video; Telmo Sampaio demonstrates how to create a display template in JavaScript and use it to modify a web part on a SharePoint site.
-
Creating Indexed Columns
Indexed lists in Microsoft SharePoint Server 2013 allow you to manage large lists of items and improve the performance when users access data. In this video; Telmo Sampaio demonstrates how to index a column; reference an indexed column; and highlight an indexed column used in a query.
-
Creating No-code Solutions
In Microsoft SharePoint Server 2013; you can create no-code solutions; which don’t require that you use Visual Studio or write any code. In this video; Telmo Sampaio demonstrates how to create a no-code solution consisting of two linked custom lists.
-
Creating Provider-Hosted Apps
Microsoft SharePoint Server 2013 allows you to create provider-hosted apps using SharePoint's integrated common technical infrastructure. In this video; Telmo Sampaio demonstrates how to create provider-hosted apps; web forms; and certificate authentication.
-
Creating Reusable Workflows
You can use Microsoft SharePoint Server 2013 to create and configure a Reusable workflow. In this video; Telmo Sampaio demonstrates some of the advantages of Reusable workflows; as well as how to use SharePoint Designer to create a Reusable workflow and associate the workflow to a content type or list.
-
Creating SharePoint-hosted Applications
SharePoint apps use the new Microsoft SharePoint Server 2013 model; which runs in its own open process. In this video; Telmo Sampaio demonstrates the various ways SharePoint apps are hosted and created in this model using Visual Studio.
-
Creating Site Columns
In Microsoft SharePoint Server 2013; you can use site columns to classify information. In this video; Joe Barrett demonstrates different ways to create site columns in both SharePoint and Visual Studio.
-
Creating the Logic and Deploying the Workflow
Microsoft SharePoint Server 2013 allows you to deploy a custom workflow activity from Visual Studio. In this video; Telmo Sampaio demonstrates how to create the logic and deploy the workflow from Visual Studio to SharePoint; and then deploy a workflow feature to a website.
-
Creating Trust Relationships for Apps
In Microsoft SharePoint Server 2013; provider-hosted apps require a trust relationship to exist between SharePoint Server and the server on which the application is running. In this video; Telmo Sampaio demonstrates how to create an authentication certificate; make SharePoint Server a Trusted Security Token Issuer; and register an app principal for a specific app.
-
Creating XSLT for Web Parts
In Microsoft SharePoint Server 2013; you can customize the items in a no-code solution. In this video; Telmo Sampaio demonstrates how to use XSLT to customize the way that data is presented through web parts in a no-code solution.
-
Custom Claim Providers
In Microsoft SharePoint Server 2013; you can create a custom claims provider to add your claims to either a Windows login or a forms-based login. In this video; Joe Barrett demonstrates how to use the Visual Studio SPClaimProvider command to create a custom claims provider.
-
Customizing Modal Dialog Boxes
In Microsoft SharePoint Server 2013; you can use several methods to configure dialog boxes to display information to end users within an application. In this video; Telmo Sampaio demonstrates how to customize and apply modal dialog boxes within an application to display information to end users.
-
Customizing the Edit Control Block
In Microsoft SharePoint Server 2013; you can add elements to the Edit Control Block of the list item. In this video; Telmo Sampaio demonstrates how to use the Menu Item Custom Action option to add a new item to the Edit Control Block for the Products list.
-
Customizing the Status Bar and Notifications
In Microsoft SharePoint Server 2013; you can customize the built-in Status Message Bar; which conveys information to the end user on every page in an app. In this video; Telmo Sampaio demonstrates how to customize the status bar and status message.
-
Customizing Upgrade Notifications
In Microsoft SharePoint Server 2013; you can create unobtrusive custom notifications; which are displayed for a short time and in this way communicate non-urgent information to end users. In this video; Telmo Sampaio demonstrates how to create and use notifications within an app with SharePoint Server 2013.
-
Delete Collections
Microsoft SharePoint Server 2013 allows you to dispose of inactive site collections using Central Administration; Visual Studio; or PowerShell. In this video; Joe Barrett demonstrates how to remove old material and inactive site collections using Visual Studio.
-
Deploying Site Definitions
Microsoft SharePoint Server 2013 allows you to deploy a site definition from Visual Studio and choose to activate its features manually through SharePoint or Visual Studio. In this video; Joe Barrett demonstrates how to deploy a test site definition to SharePoint; with the option to activate the features later on.
-
Design Manager
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran discusses how Design Manager can be used to brand your site in SharePoint 2013.
-
Document Templates
In Microsoft SharePoint Server 2013 you create document templates that can easily be re-used. In this video Joe Barrett demonstrates how to create a document content type and then uses it as a template in the document library.
-
Enabling Anonymous Access
In Microsoft SharePoint Server 2013; you can allow anonymous access to websites. In this video; Joe Barrett demonstrates how to use the Central Administration site to allow anonymous access for users to a particular website.
-
Event Receivers
In Microsoft SharePoint Server 2013 you can attach event receivers to a wide variety of site level; collection level; and list level events. In this video Joe Barrett demonstrates how to configure event receivers to attach types of workflows to List Item Events; Web Events; and Email Events using Visual Studio.
-
Exporting a Workflow to a SharePoint Solution
You can use Microsoft SharePoint Server 2013 to make reusable List and Site workflows. In this video; Telmo Sampaio demonstrates how to package a workflow as a .wsp file; export it; and then deploy it as a solution to any other existing web application and site.
-
Expose the Hierarchy
Microsoft SharePoint Server 2013 allows you to examine the site hierarchy using the Server-Side Object Model and the Client-Side Object Model (CSOM). In this video; Joe Barrett uses the Server-Side Object Model to examine a SharePoint site from within Visual Studio.
-
Feature Scope and Visibility
Microsoft SharePoint Server 2013 requires the configuration of a Feature's scope and visibility. In this video; Telmo Sampaio demonstrates how to configure and edit the settings of SharePoint Features scoped to a solution's site collection and Web site.
-
Feature Stapling
In Microsoft SharePoint Server 2013 you can use feature stapling to extend an existing site definition. In this video; Joe Barrett demonstrates how to create a stapled feature and add it to an existing site definition in SharePoint Central Administration.
-
Implement a Hierarchical Data Store
Microsoft SharePoint Server 2013 allows you to store custom configuration data at either the farm or web application level using the hierarchical object store. In this video; Telmo Sampaio demonstrates how a custom application page is used to update data in the SharePoint configuration database by referencing a class inheriting from the SPPersistedObject class utilizing the hierarchical data store mechanism.
-
Implement a Property Bag
The property bag feature in Microsoft SharePoint Server 2013 is a hash table of key-value pairs that allows you to add and retrieve object properties within a SharePoint site. In this video; Telmo Sampaio demonstrates how to create an application page utilizing property bags to read properties and store data as a key-value pair within a content database.
-
Implement Credential Storage
In Microsoft SharePoint Server 2013; the Secure Store Service allows you to store credentials required for connecting to external systems in a secure database within SharePoint Server. In this video; Telmo Sampaio demonstrates how to create a Secure Store Target Application and associate it with an external data source utilizing the Secure Store Service from Central Administration.
-
Implement Impersonation
In Microsoft SharePoint Server 2013; before implementing impersonation; you must login as someone who has been granted the permission to impersonate. In this video; Joe Barrett demonstrates how to use the console to list and select users to impersonate.
-
Implement SharePoint List
When developing custom applications in Microsoft SharePoint Server 2013; SharePoint lists provide the easiest way of storing configuration data as they allow you to utilize the built-in interface. In this video; Telmo Sampaio demonstrates how to store a key-value pair in a SharePoint list; index the key column; and build a CAML query to retrieve stored data.
-
Implement web.config
Microsoft SharePoint Server 2013 provides the web.config file as mechanism for storing application configuration data. In this video; Telmo Sampaio demonstrates how to use the SPWebConfigModification class to make updates to the web.config file programmatically; and how to read data from the web.config file into an application page using the ConfigurationManager class.
-
Import and Export Design Packages
In Microsoft SharePoint Server 2013; you can add a design package as a solution to the SharePoint site collection. In this video; Telmo Sampaio demonstrates how to use the Design Manager to create a design package.
-
Importing and Exporting Microsoft Visio Workflows
In Microsoft SharePoint Server 2013; you can import flow charts created in Microsoft Visio. In this video; Telmo Sampaio demonstrates how to create a flowchart in Visio; import it into SharePoint; and use the SharePoint Text-Based Designer to convert the flowchart into a usable workflow which can be applied to lists.
-
Incorporating Designer Outputs
Microsoft SharePoint Server 2013 allows you to change the look and feel of your search results. In this video; Telmo Sampaio demonstrates how to use the Display Templates to change the display of search results.
-
List Definitions
Microsoft SharePoint Server 2013 allows you to create list definitions using SharePoint Central Administration. In this video; Joe Barrett demonstrates navigating to a subsite as well as modifying default list settings and list elements.
-
List Designer
Microsoft SharePoint Server 2013 allows you to create lists in Visual Studio List Designer and then work with them within SharePoint. In this video; Joe Barrett demonstrates how to use Visual Studio List Designer to add; customize; and edit lists and then deploy them to SharePoint 2013.
-
Maintain Permissions
In Microsoft SharePoint Server 2013; permissions are either unique or they are inherited. In this video; Joe Barrett demonstrates how to use Visual Studio's BreakRoleInheritance command to stop inheriting permissions.
-
Manage Collections
Microsoft SharePoint Server 2013 enables you to configure the backup and restore settings for site collections. In this video; Joe Barrett demonstrates how to manually configure the backup and restore settings using SharePoint Central Administration; SharePoint Management Shell; and Visual Studio.
-
Manage Content Types
Microsoft SharePoint Server 2013 allows you to manage content types programmatically. In this video; Joe Barrett demonstrates site content type management and three methods for adding fields using Visual Studio
-
Manage the Life Cycle of SPSite and SPWeb Objects
Microsoft SharePoint Server 2013 allows the instantiation; in memory; of SPSite and SPWeb class objects. In this video; Telmo Sampaio demonstrates how the instantiation of SharePoint site and site collections and their properties in memory facilitates data processing.
-
Managing App Usage Tracking
Microsoft SharePoint Server 2013 allows you to manage apps using tracking provided by SharePoint's integrated common technical infrastructure. In this video; Telmo Sampaio demonstrates how to track app users; monitor links; check errors; and manage licences.
-
Object Disposal
Microsoft SharePoint Server 2013's Dispose() method allows the disposal of persistent class objects created in memory. In this video; Telmo Sampaio demonstrates how the Dispose() method and C# using construction ensure the disposal of such objects.
-
Object Life Cycle Management for SPContext
Microsoft SharePoint Server 2013's SPContext class accesses the HTTP context in which an application is running. In this video; Telmo Sampaio uses the SPContext class's GetContext() method to retrieve the current context of a site collection's multiple properties.
-
Object Life Cycle Management with Windows PowerShell
Microsoft SharePoint Server 2013 object life cycle management can be effected by PowerShell and multiple SharePoint cmdlets. In this video; Telmo Sampaio demonstrates how PowerShell cmdlets instantiate class objects and dispose of them when they are no longer required.
-
Object Model Overrides
In Microsoft SharePoint Server 2013; you can use Query throttling to restrict the number of items that can be accessed when you execute a query. Query throttling also allows you to specify whether a developer can override the list view threshold programmatically. In this video; Telmo Sampaio demonstrates how to configure resource throttling in Central Administration; before overriding thresholds.
-
Organizing SharePoint Project Items
Microsoft SharePoint Server 2013 solutions are easily managed by the drag-and-drop functionality of Visual Studio's Solution Explorer. In this video; Telmo Sampaio demonstrates how to organize project files and folders in Solution Explorer; to ease navigation.
-
Package and Deploy a Custom Claims Provider
In Microsoft SharePoint Server 2013; you can use the event receiver feature to package and deploy claims providers. In this video; Joe Barrett demonstrates how to identify and use an event receiver package to deploy a custom claim provider; and what potential issues may occur.
-
Package and Deploy a Custom Membership Provider
In Microsoft SharePoint Server 2013; you can customize the way users log in to the site and provide users with group names. You do this by customizing the Custom Membership Provider and Role Provider using Visual Studio. In this video; Joe Barrett demonstrates how to customise and deploy the Custom Membership Provider and Role Provider packages for use in SharePoint.
-
Packaging an App
You can use Visual Studio to package a Microsoft SharePoint-hosted app which has already been developed. In this video; Telmo Sampaio demonstrates what an app package typically includes and how to use Visual Studio to package an app.
-
Plan the Type of Workflow and Associated Forms
In Microsoft SharePoint Server 2013; you need to associate forms to workflows so that parameter information can be tracked from the end user. In this video; Telmo Sampaio demonstrates how to create an Initiation Form for a SharePoint workflow that allows you to do this.
-
Provisioning Lists
In Microsoft SharePoint Server 2013 you can create a custom solution for a SharePoint site. In this video; Joe Barrett demonstrates provisioning a list instance for a SharePoint site using Visual Studio.
-
Publishing an App to a Corporate Catalog
In Microsoft SharePoint Server 2013; app catalog sites can be created to publish and deploy packaged apps. In this video; Telmo Sampaio demonstrates how to create an app catalog site via SharePoint central administration; how to publish a packaged app to an existing corporate catalog; and how to deploy a published app for a specific user.
-
Publishing an App to the SharePoint Store
In Microsoft SharePoint Server 2013; apps can be submitted for listing to the globally accessible Office Store. In this video; Telmo Sampaio demonstrates the approval process for submitting an app for listing to the Office Store; saves a draft of an app via the Seller Dashboard; and visits the Office Store to download an approved app.
-
Publishing an App to Windows Azure
In Microsoft SharePoint Server 2013; provider-hosted apps can be published to Windows Azure from within Microsoft Visual Studio. In this video; Telmo Sampaio demonstrates how to create a website and publishing profile in Azure using a Microsoft account; import a publishing profile in Visual Studio; and package and publish a provider-hosted app from within Visual Studio.
-
Querying Lists
Microsoft SharePoint Server 2013 provides classes that allow you to query data from a specific list in a list view; or from within multiple lists in a site collection. In this video; Telmo Sampaio demonstrates how to use the SPQuery class; before demonstrating how to build a query returning results from lists in multiple sites using the SPSiteDataQuery class.
-
Removing an App
Microsoft SharePoint Server 2013 allows you to remove apps using SharePoint's integrated common technical infrastructure. In this video; Telmo Sampaio demonstrates how to uninstall auto-hosted and provider-hosted apps from the app catalog.
-
Sandbox Components and Constraints
Microsoft SharePoint Server 2013 sandboxed solutions are deployed to the site collection with their contents stored in the content database. In this video; Telmo Sampaio demonstrates a sandboxed solution's components and constraints; and introduces a simple sandboxed solution.
-
Search-driven Navigation
In Microsoft SharePoint Server 2013; you can use search-driven navigation where you only create a single page for all locations. In this video; Telmo Sampaio demonstrates how to use the Term store management section and associate a single page with your navigation.
-
Selecting a User Experience for Apps
As with Microsoft SharePoint Server 2013 apps; Office apps also use HTML; JavaScript; and AppManifest. In this video; Telmo Sampaio demonstrates the key features of Office apps; as well as how to create one.
-
Server-side Object Model
In Microsoft SharePoint Server 2013; the Server Object Model is the most extensive API; providing a rich set of classes for representing and operating on objects in SharePoint. In this video; Telmo Sampaio demonstrates the important Server Object Model classes; before demonstrating how to use them to create a list and add items through code in a console application.
-
SharePoint App TokenHelper Class
The TokenHelper Class helps simplify the use of code in Microsoft SharePoint Server 2013 applications. In this video; Joe Barrett demonstrates how to use the OAuth protocol for applications related to the TokenHelper Class in SharePoint.
-
Site Collection
Microsoft SharePoint Server 2013 allows you to create a site collection and select the template you want to use after you've created the site collection. In this video; Joe Barrett demonstrates how to create a delayed site collection in SharePoint Central Administration.
-
Site Definition
Microsoft SharePoint Server 2013 allows you to use Visual Studio to create a site definition that will determine the look and behaviour of your SharePoint site. In this video; Joe Barrett examines the components of a site definition.
-
Site Hierarchies
In Microsoft SharePoint Server 2013 you can easily navigate the SharePoint installation from either Central Administration or Visual Studio. In this video; Joe Barrett demonstrates navigating the SharePoint site hierarchy from within Central Administration and explores the relationship between the hierarchy and Internet Information Services (IIS).
-
Sites and Web Templates
Microsoft SharePoint Server 2013 allows you to use site and web templates to customize a SharePoint site. In this video; Joe Barrett demonstrates the key features of web and site templates; how to modify web and site templates; and create custom templates.
-
Specifying a Licensing Model for Apps
You can use Microsoft SharePoint Server 2013 to generate a licensing model for an app; and Microsoft Visual Studio to verify the app license. In this video; Telmo Sampaio demonstrates the various components of a typical app licence file.
-
Specifying a Starting Location for Apps
In Microsoft SharePoint Server 2013; all web-based applications and sites need a URL that starts the application. In this video; Telmo Sampaio demonstrates the function of tokens and what the standard token is composed of; how to access a list showing SharePoint tokens; as well as when and where to use them.
-
Specifying Permissions for Apps
When using Visual Studio to create apps for use in Microsoft SharePoint Server 2013; you can use an app's manifest to specify app permission requests. In this video; Telmo Sampaio demonstrates how app permission requests include scopes and rights; how to use Visual Studio to specify permission requests; and how to enable app permissions from SharePoint.
-
Specifying Permissions for Corporate Catalog Apps
In Microsoft SharePoint Server 2013; you can configure user permissions for Corporate Catalog applications. In this video; Joe Barrett demonstrates creating an app catalog and configures read permissions and access for users.
-
Specifying Permissions for Office Store Apps
Office Store applications for use in Microsoft SharePoint Server 2013 are primarily accessible from the Corporate Catalog or the Office Store. In this video Joe Barett; demonstrates how to specify permissions for Office Store applications you want to publish.
-
Specifying Permissions for Remote Apps
When configuring permissions for remote apps in in Microsoft SharePoint Server 2013; some configuration has to first be done in Visual Studio. In this video; Joe Barrett demonstrates how to specify permissions for remote applications in SharePoint.
-
Structuring App Packages
Microsoft SharePoint Server 2013 solution elements are easily packaged in Microsoft Visual Studio. In this video; Telmo Sampaio demonstrates how to edit the content of a solution package; as well as how they might be augmented.
-
Taxonomy-based Navigation
In Microsoft SharePoint Server 2013; taxonomy navigation uses a different site map provider to retrieve data and build links. In this video; Telmo Sampaio demonstrates how to use the Managed Metadata Service to create a URL for each term in a term set and then navigate by using those terms.
-
Understanding Features and Solutions
Microsoft SharePoint Server 2013 Features are collections of declarative statements deployed; with assemblies and manifests; by SharePoint solutions in a WSP file. In this video; Telmo Sampaio demonstrates the structure; attributes; and functions of Features contained in a SharePoint solution.
-
Update Properties of SPSite and SPWeb Objects
Microsoft SharePoint Server 2013 class methods allow site and site collection data to be updated in memory. In this video; Telmo Sampaio demonstrates how to download a SharePoint site and site collection; update their properties; and then communicate the changes to SharePoint.
-
Upgrade Sandbox Solutions
In Microsoft SharePoint Server 2013; you need to perform specific steps when upgrading a sandbox solution. In this video; Telmo Sampaio demonstrates how to deploy a new version of a sandbox solution.
-
Upgrading a Workflow
Microsoft SharePoint Server 2013 allows you to upgrade a workflow using SharePoint's integrated common technical infrastructure. In this video; Telmo Sampaio demonstrates how to update multiple workflow instances and prevent earlier versions of a workflow from being used concurrently with an updated version.
-
Upgrading an App
Microsoft SharePoint Server 2013 allows you to upgrade apps using SharePoint's integrated common technical infrastructure. In this video; Telmo Sampaio uses the AppManifest to show you how to create; upgrade; and apply new versions of project and provider-hosted apps in SharePoint.
-
Using a Custom Workflow in SharePoint Designer
Microsoft SharePoint Server 2013 allows you to create and deploy custom activities through SharePoint Designer. In this video; Telmo Sampaio demonstrates how to use an existing workflow to create a new workflow in SharePoint Designer; modify workflow tasks and activities; and add descriptions to them.
-
Using Content Iterator
Indexed lists in Microsoft SharePoint Server 2013 allow you to regulate the amount of data being transferred; thereby reducing the load when querying large lists. In this video; Telmo Sampaio demonstrates how to use the ContentIterator class and its ProcessItems method to iterate over all the items in a collection.
-
Using Focus on Content
With Microsoft SharePoint Server 2013; you can disable the Focus on Content feature to ensure that Master Page data always display for end users. In this video; Telmo Sampaio demonstrates how to disable the Focus on Content button.
-
Workflow Planning
You can use Workflows in Microsoft SharePoint Server 2013 to create business processes based on the data obtained from within the SharePoint environment. In this video; Telmo Sampaio demonstrates the three types of workflows and the Windows Azure Service Bus; as well as how a workflow is developed within SharePoint.
-
Adding a Web Deploy Package to an Application Profile on Windows Server 2012 R2
With Microsoft System Center 2012 R2 and Web Deploy; adding deployment packages to application profiles allows you to easily deploy the package to a virtual machine. In this video; Rafiq Wayani demonstrates how to add a deployment package to an application profile for use on a library server.
-
Administering an IT GRC Control Management Program with System Center Process Pack for IT GRC
Microsoft System Center 2012 R2 allows implementations of IT GRC to be administered and processed from within the Service Manager Console. In this video; Rafiq Wayani demonstrates the Service Manager Console's Work Items interface and explains the role of IT GRC policies.
-
Approve an Agent with the System Center 2012 R2 Operations Manager Operations Console
The Microsoft System Center 2012 R2 Operations Manager operations console allows you to monitor machines as agent and agentless managed. In this video; Rafiq Wayani demonstrates how to approve an agent with the operations console to monitor a machine and supply you with a range of information.
-
Assessing the Private Cloud with System Center Advisor
Microsoft System Center 2012 R2 Advisor; connected to Microsoft's Web site and added to managed groups of machines; provides Operations Manager with up-to-date patches and security information. In this video; Rafiq Wayani demonstrates how to monitor System Center Advisor error messages; warnings; and informational alerts.
-
Business Unit Clouds Overview
In Microsoft System Center 2012 R2; a business unit can have its own cloud structure with virtual machines; hosts; storage; library resources; and a network. In this video; Rafiq Wayani demonstrates the business unit cloud structure.
-
Compliance Management Overview
You can use Microsoft System Center 2012 R2 to help with Compliance Management across an organization. In this video; Rafiq Wayani uses examples to explain Compliance Management; which includes Governance; Compliance; and Risk Management.
-
Components of a System Center 2012 R2 Service Manager Cube
In Microsoft System Center 2012 R2; a cube allows quick analysis of data. In this video; Rafiq Wayani uses cubes to discuss dimensions; drill down; drill through; key performance indicators (KPIs); measures; and partitions.
-
Configuring a Network Device Discovery Rule in System Center 2012 R2 Operations Manager
In Microsoft System Center 2012 R2; the Operations Manager allows you to use network device discovery rules in order to find network devices. In this video; Rafiq Wayani demonstrates how to set up and configure network device discovery rules using the included wizard.
-
Configuring a Service Template in System Center 2012 R2 Service Template Designer
In Microsoft System Center 2012 R2; you can use service templates to build an infrastructure that allows you to deploy single-tier or multi-tier applications. In this video; Rafiq Wayani demonstrates how to use the Service Template Designer to construct a service template.
-
Configuring a Software Update Baseline in System Center 2012 R2 Virtual Machine Manager
Microsoft System Center 2012 R2's Virtual Machine Manager allows the creation of software update baselines that specify required software updates or update components. In this video; Rafiq Wayani demonstrates how to create and configure a software update baseline using the Update Baseline Wizard.
-
Configuring and Publishing Dashboards in System Center 2012 R2 Operations Manager
In Microsoft System Center 2012 R2; you can configure and publish dashboards in Operations Manager. In this video; Rafiq Wayani demonstrates how to use the Dashboard View option to create dashboards.
-
Configuring Automated Data Recovery in System Center 2012 R2 Data Protection Manager
Data Protection Manager (DPM) in Microsoft System Center 2012 R2 offers an automated item-based automated recovery solution; providing you with the assurance that your data is protected in the event of a catastrophic failure. In this video; Rafiq Wayani demonstrates how to create a group member; configure a backup replica; and verify recovery points specific to the protected data.
-
Configuring Automated Problem Record Creation in System Center 2012 R2 Service Manager
Microsoft System Center 2012 R2 allows you to create automated problem records when configuring incident management from within the Service Manager console. In this video; Rafiq Wayani demonstrates how to create an e-mail-related incident template in Service Manager; before describing how to automatically record specific incidents using an alert connector in Operations Manager.
-
Configuring Basic APM in System Center 2012 R2 Operations Manager
In Microsoft System Center 2012 R2; you are able to configure application monitoring performance inside of the Operations Manager. In this video; Rafiq Wayani demonstrates how to perform some basic application monitoring for System Center.
-
Configuring Service Level Tracking in System Center 2012 R2 Operations Manager
Microsoft System Center 2012 R2 allows you to configure Service Level Tracking in Operations Manager. In this video; Rafiq Wayani demonstrates authoring options in the Operations Manager; and how to configure and modify service level tracking.
-
Creating a System Center 2012 R2 Business Unit Cloud
In Microsoft System Center 2012 R2; it is easy to construct a business unit cloud. In this video; Rafiq Wayani demonstrates how to use the VMs and Services option to create a business unit cloud containing hosts; logical networks; load balancers; and virtual IP templates.
-
Creating a System Center 2012 R2 Data Protection Manager Protection Group
To protect data with Data Protection Manager (DPM) in Microsoft System Center 2012 R2; you first need to create protection groups representing collections of data sources with the same protection configuration. In this video; Rafiq Wayani uses the Create New Protection Group wizard in the Protection task area within the DPM Administrator console to configure and generate a protection group.
-
Creating a Web Deploy Package on Windows Server 2012 R2
With Microsoft System Center 2012 R2 and Web Deploy; you can create deployment packages containing all the configuration and content of your applications for storage or redeployment. In this video; Rafiq Wayani demonstrates how to create a deployment package and details some of the available options you can set.
-
Creating an IT GRC Control Management Program with System Center Process Pack for IT GRC
Microsoft System Center Service Manager 2012's IT Governance; Risk Management; and Compliance (GRC) Process Pack allows the creation of a GRC Control Management Program. In this video; Rafiq Wayani demonstrates how to develop a working IT GRC Control Management Program for System Center 2012.
-
Creating Network Resources in System Center 2012 R2 for a Business Unit Cloud
In Microsoft System Center 2012 R2; you can create networking resources for your business unit cloud. In this video; Rafiq Wayani demonstrates how to use the Fabric option to construct a logical network.
-
Custom Rules
Operations Manager in Microsoft System Center 2012 R2 uses rules to collect data and determine what to do with the information after it collects it. In this video; Rafiq Wayani demonstrates the rules used to create alerts; collect events and performance data; and run scripts or commands according to a schedule.
-
Customizing Performance Thresholds in System Center 2012 R2 Operations Manager
In Microsoft System Center 2012 R2; it's possible to set up performance thresholds on the components you are monitoring. In this video; Rafiq Wayani demonstrates how to configure performance thresholds for a .NET application.
-
Data Protection Manager Deploying an Agent
Microsoft System Center 2012 R2 allows you to deploy protection agents for identifying data that the Data Protection Manager (DPM) can protect and recover on a specified computer. In this video; Rafiq Wayani demonstrates how to install a protection agent manually; before attaching the agent using the Protection Agent Installation Wizard in the DPM Administrator console to enable protection.
-
Data Protection Manager Features
You can use Microsoft System Center 2012 R2's Data Protection Manager (DPM) to assign users roles which give them permission to execute tasks. In this video; Rafiq Wayani demonstrates the DPM; including the certification and authentication components; and the reports generated to track activity on your cloud environment.
-
Data Protection Manager Overview
You can use the Microsoft System Center 2012 R2's Data Protection Manager (DPM) to reduce the number and severity of risks that the VMs in your cloud face. In this video; Rafiq Wayani demonstrates how DPM works; what it includes; and how its various components protect and back up data in your cloud environment.
-
Deploy a System Center 2012 R2 Operations Manager Agent Manually
In Microsoft System Center 2012 R2; you will need to install an Operations Manager agent manually in order to keep track of off-site machines. In this video; Rafiq Wayani demonstrates how to manually install; access; and run an agent.
-
Deploy an Agent with the System Center 2012 R2 Operations Manager Discovery Wizard
The Microsoft System Center 2012 R2 Operations Manager Discovery Wizard allows you to find and manage clients and servers once they're deployed. In this video; Rafiq Wayani demonstrates how to use the wizard to deploy an agent; discover different machines based on a range of criteria; and the different discovery options available to you.
-
Deploy SLT to SharePoint in System Center 2012 R2 Operations Manager
Microsoft System Center 2012 R2 allows you to deploy Service Level Tracking (SLT) to SharePoint from Operations Manager. In this video; Rafiq Wayani demonstrates how to deploy SLT to SharePoint; and configure and customize the reporting service.
-
Deploying a Data Tier Application (DAC) Package with System Center 2012 R2 Virtual Machine Manager
Deploying a Data Tier Application in Microsoft System Center 2012 R2 is a fairly straightforward process. In this video; Rafiq Wayani demonstrates how to deploy a Data Tier Application using System Center 2012 R2 Virtual Machine Manager.
-
Deploying a Service Template in System Center 2012 R2
Microsoft System Center 2012 R2 allows you to deploy service templates to the cloud or to host platforms quite easily. In this video; Rafiq Wayani demonstrates how to construct; customize; and deploy a service template.
-
Deploying a Single Tier Service Using System Center 2012 R2 Virtual Machine Manager
In Microsoft System Center 2012 R2; it's a simple process to deploy a Single Tier Service. In this video; Rafiq Wayani demonstrates how you can configure and deploy a Single Tier Service using the Service Template in the System Center Virtual Machine Manager.
-
Deploying a VM Using System Center Cloud Services Process Pack
By creating a Virtual Machine Manager (VMM) connector; administrators in Microsoft System Center 2012 R2 are able to easily deploy virtual machines leveraging the System Center Cloud Services Pack (CSPP). In this video; Rafiq Wayani demonstrates how to create a VMM connector in the Service Manager console; before highlighting the available VMs in Virtual Machine Manager.
-
Designing Visio Diagrams with System Center 2012 R2 Operations Manager Visio Connector
In Microsoft System Center 2012 R2; you can build network diagrams for different kinds of audiences. In this video; Rafiq Wayani uses Visio network diagrams to explore the required network information for internal and external audiences.
-
Elements of a Data Tier Application (DAC) Package
In Microsoft System Center 2012 R2; you can create data tier application (DAC) packages to manage and deploy database schema. In this video; Rafiq Wayani demonstrates how the DAC package is authored and applied.
-
Generating Alerts in System Center 2012 R2 Operations Manager
Microsoft System Center 2012 R2 Operations Manager allows you to create and customize alert views that only display alerts that are generated according to specific conditions. In this video; Rafiq Wayani demonstrates how to create a new alert view and configure its properties within the Monitoring workspace in Operations Manager.
-
Identifying Services for the Windows Server 2012 R2 Private Cloud
When developing a Windows Server 2012 R2 private cloud strategy within an organization utilizing Microsoft System Center 2012 R2; you should carefully plan the appropriate services and security requirements to be associated with the infrastructure. In this video; Rafiq Wayani demonstrates the service identification considerations and the process of onboarding services to a private cloud.
-
Implementing Custom Monitoring in System Center 2012 R2 Operations Manager Using a Process Monitoring Template
In Microsoft System Center 2012 R2; the Operation Manager process monitoring template helps you keep track of how processes run and whether they are running unnecessarily. In this video; Rafiq Wayani demonstrates how to implement custom monitoring by creating and customizing a process monitoring template.
-
Implementing Custom Monitoring in System Center 2012 R2 Operations Manager Using Web Application Transaction Monitoring Template
In Microsoft System Center 2012 R2; you can implement custom web application monitoring using the templates provided in System Center Operations Manager. In this video; Rafiq Wayani demonstrates how to monitor web application availability and transactions within Operations Manager.
-
Installing System Center Advisor
Microsoft System Center 2012 R2 Advisor; when added to managed groups of machines; provides Operations Manager with current and historical configuration reports and alerts. In this video; Rafiq Wayani demonstrates how to establish an Advisor Connection; add machines to it; and configure their alert rules.
-
Installing System Center Cloud Services Process Pack
Microsoft System Center 2012 R2 allows Service Manager administrators to install the System Center Cloud Services Process Pack (CSPP); providing an Infrastructure as a Service solution. In this video; Rafiq Wayani demonstrates how to import the required management packs; before using the System Center Cloud Services Process Pack Setup Wizard to install the CSPP.
-
Installing System Center Process Pack for IT GRC Prerequisites
Microsoft System Center Service Manager (SCCM) 2012's IT Governance; Risk Management; and Compliance (GRC) Process Pack carries infrastructural prerequisites. In this video; Rafiq Wayani uses the SCCM Console to demonstrate how the integration of System Center component applications streamlines GRC.
-
Installing the System Center Process Pack for IT GRC
In Microsoft System Center 2012 R2; Service Manager allows the download and installation of the Process Pack for Cloud Services and IT GRC. In this video; Rafiq Wayani demonstrates how to install the Cloud services process pack and Cloud services runbooks onto Service Manager and Orchestrator machines.
-
Installing Web Deploy on Windows Server 2012 R2
In Microsoft System Center 2012 R2; you can deploy an entire website to another location. In this video; Rafiq Wayani demonstrates how to use the Web Deploy component to create an option for deploying a website.
-
Integrating System Center 2012 R2 Operations Manager and Orchestrator with Other System Center Components
In Microsoft System Center 2012 R2; the Operations Manager (Ops Manager) and Orchestrator combine to provide cross-product; environment-wide infrastructural integration and automation. In this video; Rafiq Wayani discusses how System Center components' Performance and Resource Optimization (PRO) management packs ensure environmental performance and health.
-
Integrating System Center 2012 R2 Orchestrator with System Center 2012 R2 Operations Manager
Once you have registered and deployed an integration pack within Microsoft System Center 2012 R2; you can then connect it to the Operations Manager. In this video; Rafiq Wayani demonstrates how to connect to the Operations Manager using the System Center Orchestrator.
-
Integrating System Center 2012 R2 Orchestrator with System Center 2012 R2 Service Manager
Microsoft System Center 2012 R2 Orchestrator allows you to easily integrate with a range of platforms in order to increase Orchestrator’s functionality. In this video; Rafiq Wayani demonstrates how to integrate Service Manager with System Center Orchestrator.
-
Integrating System Center 2012 R2 Service Manager with Other System Center Components
Microsoft System Center 2012 R2's Service Manager uses connectors to import; process; and act on Operations Manager's configuration and alert data. In this video; Rafiq Wayani discusses how Service Manager uses connectors to initiate or perform tasks on other Service Center products.
-
IT GRC Compliance Program Key Concepts
In Microsoft System Center 2012 R2; you can use the IT GRC Compliance Program Key Concepts to help you develop an accountable IT environment which uses compliance to mitigate risks coming from inside and outside of the environment. In this video; Rafiq Wayani uses examples to explain the use of an Authority Document and what it might typically contain.
-
Configuring System Center 2012 R2 Orchestrator Runbooks
In Microsoft System Center 2012 R2; you can easily configure Orchestrator Runbooks to suit your requirements. In this video; Rafiq Wayani demonstrates how to configure Orchestrator Runbooks elements; such as automatic check out; check in comments; and design phase link labels.
-
Configuring System Center 2012 R2 Service Manager Change Requests
Microsoft System Center 2012 R2 Service Manager supports Change Management which allows you to provide reliable and efficient services to clients; because all changes are carefully planned and executed. In this video; Rafiq Wayani demonstrates how to use Service Manager to configure a Change Request.
-
Configuring System Center 2012 R2 Service Manager Incidents
Microsoft System Center 2012 R2 Service Manager allows you to manage incidents quickly and efficiently in order to restore normal services to your system as quickly as possible. In this video; Rafiq Wayani demonstrates how to record an incident using Service Manager.
-
Configuring System Center 2012 R2 Service Manager PowerShell Security
Microsoft System Center 2012 R2 allows you to configure Service Manager PowerShell Security within its virtual machine manager. In this video; Rafiq Wayani demonstrates how to work with the Service Manager PowerShell client and the types of security it deals with.
-
Configuring System Center 2012 R2 Service Manager Problems
Microsoft System Center 2012 R2 Service Manager allows you to record problems that occur on your system to track issues that affect services and performance. In this video; Rafiq Wayani demonstrates how to manage single or multiple problems using Service Manager.
-
Configuring System Center 2012 R2 Service Manager Release Records
Microsoft System Center 2012 R2 Service Manager is a complete management system; allowing you to record and manage releases to ensure that your system environment remains secure and protected against unnecessary or unapproved changes. In this video; Rafiq Wayani demonstrates how to use Service Manager to create a release record.
-
Configuring System Center 2012 R2 Service Manager Request Offerings
In Microsoft System Center 2012 R2 Service Manager; you can configure the Service Manager request offerings to reflect what’s being offered in a particular situation. In this video; Rafiq Wayani demonstrates how to construct service request offerings.
-
Configuring System Center 2012 R2 Service Manager Run As Accounts
Microsoft System Center 2012 R2 allows you to configure Service Manager Run as Accounts within its virtual machine manager. In this video; Rafiq Wayani demonstrates how to create and customize Run As accounts.
-
Configuring System Center 2012 R2 Service Manager Service Offerings
In Microsoft System Center 2012 R2; you can group related request offerings within Service Manager service offerings. In this video; Rafiq Wayani demonstrates how to construct Service Manager service offerings and add service requests to them.
-
Configuring System Center Cloud Services Process Pack
In Microsoft System Center 2012 R2; after installing the System Center Cloud Services Process Pack (CSPP); the Service Manager administrator needs to perform certain configuration tasks before an enterprise can realize the benefits of Infrastructure as a Service. In this video; Rafiq Wayani demonstrates how to define user roles and configure the general properties of the Cloud Services solution.
-
Configuring Views in System Center 2012 R2 Operations Manager
Microsoft System Center 2012 R2 allows you to configure views in the Operations Manager. In this video; Rafiq Wayani demonstrates how to create and configure an Event View and create a Windows View to work with it.
-
Creating a Custom Event Rule in System Center 2012 R2 Operations Manager
Microsoft System Center 2012 R2 Operations Manager allows you to effortlessly create alert-generating rules from an event-based data source customized to your organizational needs. In this video; Rafiq Wayani demonstrates how to configure the Create Rule Wizard within Operation Manager's Authoring workspace to create an event-based rule.
-
Creating a Distributed Application Model in System Center 2012 R2 Operations Manager
In Microsoft System Center 2012 R2; distributed applications rely on a number of distributed components which work together. If any single component fails the entire application will also fail. In this video; Rafiq Wayani creates a distributed application model for a messaging application.
-
Creating a Problem in System Center 2012 R2 Service Manager
Microsoft System Center 2012 R2 Service Manager allows you to easily create problem records to help prevent future problems and incidents from occurring. In this video; Rafiq Wayani demonstrates how to create a new problem record from the Service Manager console.
-
Orchestrator Workflow Controls
Workflow controls allow you to build logic into complex automated tasks when creating runbooks in Microsoft System Center 2012 R2 Orchestrator. In this video; Rafiq Wayani demonstrates the concept of workflow controls; before highlighting starting points; smart links; and embedded loops.
-
Planning a Service Template in System Center 2012 R2
In Microsoft System Center 2012 R2; you can use Service templates to reduce errors and increase productivity. In this video; Rafiq Wayani demonstrates how to use Service templates to execute application installation files with automatically.
-
Problem Management Overview
Allowing incident and problem investigation and diagnosis within Microsoft System Center 2012 R2 enhances the functionality of Orchestrator automated incident remediation. In this video; Rafiq Wayani demonstrates the steps involved in incident and problem investigation and diagnosis.
-
Provisioning a Windows Server 2012 R2 Private Cloud with System Center 2012 R2 Virtual Machine Manager
Once the fabric resources have been defined; the Virtual Machine Manager (VMM) component in Microsoft System Center 2012 R2 enables you to quickly and easily provision private clouds in an organization. In this video; Rafiq Wayani demonstrates how to create a new private cloud using the VMM Create Cloud Wizard.
-
Publishing System Center 2012 R2 Operations Manager Visio Diagrams to SharePoint
In Microsoft System Center 2012 R2; distributed application diagrams provide information about problems; warnings; errors; and informational messages associated with your networking environment. In this video; Rafiq Wayani uses Visio to customize the distributed application diagram and publish it to SharePoint.
-
Running Reports from SLT in System Center 2012 R2 Operations Manager
Microsoft System Center 2012 R2 allows you to run reports from Service Level Tracking (SLT) in Operations Manager. In this video; Rafiq Wayani demonstrates how to run reports from SLT; as well as create custom tracking.
-
Sequencing an Application with Server App-V on Windows Server 2012 R2
In Microsoft System Center 2012 R2; you can use the App-V sequencer to package applications in preparation for application virtualization. In this video; Rafiq Wayani demonstrates how to sequence an application with server App-V.
-
Service Level Tracking Overview
In Microsoft System Center 2012 R2; you have the ability to keep track of the service and operation levels of your organization. In this video; Rafiq Wayani uses Service Level Tracking (SLT) to discuss Service Level Agreements (SLAs) and Operating Level Agreements (OLAs).
-
Service Manager Activities
Microsoft System Center 2012 R2 Service Manager allows you to perform a series of electronic and information technology activities known as workflows. In this video; Rafiq Wayani discusses workflows in Service Manager and how they help you streamline activities and optimize system performance.
-
Service Manager and Orchestrator
The Service Manager (SCSM) and Orchestrator components of Microsoft System Center 2012 R2 allow you to deploy; automate; update; and manage services within your private cloud infrastructure. In this video; Rafiq Wayani demonstrates the attributes of SCSM and Orchestrator and discusses the benefits both these components bring to a cloud-based enterprise.
-
Service Manager Concepts
Microsoft System Center 2012 R2 includes a Service Manager that helps you manage services; applications; and processes; allowing you to optimize services and meet the expectations of clients. In this video; Rafiq Wayani discusses some of the uses of Service Manager and its benefits.
-
Service Manager Configuring an Incident Queue
In Microsoft System Center 2012 R2; you can use Service Manager to configure Incident Queues. In this video; Rafiq Wayani demonstrates how to configure and manipulate an incident queue to allow you to determine how incidents and problems are handled.
-
Service Manager Cubes
In Microsoft System Center 2012 R2; you can build; populate; and process cubes. In this video; Rafiq Wayani uses the data warehouse process to explain the relationship between the Service Manager Database; Staging Database; Data Mart Database; and the OLAP Cube.
-
Service Manager Data Warehouse
In Microsoft System Center 2012 R2; you can gather system and operations information to find out what is going on with a given resource. In this video; Rafiq Wayani uses the Service Manager data warehouse to discuss System Center analytics; data warehousing; data warehouse goals; and data warehouse databases.
-
Service Manager Incident Queue Overview
Service Manager in Microsoft System Center 2012 R2 supports different queues that allow you to manage incidents such as escalation and prioritization. In this video; Rafiq Wayani discusses Incident Queues; Service Manager Queues; and Dynamic Queues and their importance within Service Manager.
-
Service Manager Integration
The components of the Microsoft System Center 2012 R2 suite can be integrated in order to facilitate self-service and automation. In this video; Rafiq Wayani demonstrates how connectors are applied in the integration of Service Manager with Service Center.
-
Service Manager Overview
Microsoft System Center 2012 R2 Service Manager provides a means of automating; integrating; and centralizing the management of your organization's end-to-end IT processes. In this video; Rafiq Wayani demonstrates how Service Manager operates within System Center.
-
Service Manager Reports
In Microsoft System Center 2012 R2; you can use Service Manager reports to determine if problems are reported; escalated; or resolved. In this video; Rafiq Wayani demonstrates how to use the Service Manger Console to turn problems in your incidence into Service Manger reports.
-
Service Manager Self-Service Portal Overview
Microsoft System Center 2012 R2 supports a System Center Service Manager Self-Service portal; which can be created and installed using the Service Manager web portal. In this video; Rafiq Wayani demonstrates how to install the portal to provide web-based access to System Center 2012.
-
Service Manager User Roles
In Microsoft System Center 2012 R2; the Service Manager is widely accessible via a web interface and a thick client; and integrates deeply with System Center. As a result; having proper security controls in place is vital. In this video; Rafiq Wayani discusses the importance of these security controls.
-
SharePoint 2013 PerformancePoint Architecture
In Microsoft System Center 2012 R2; you can use business intelligence tools to analyze and monitor key performance indicators of your environment. In this video; Rafiq Wayani uses PerformancePoint architecture to discuss business intelligence; Dashboard Designer; SQL Server Reporting Services; SharePoint application servers; and SharePoint Web Front End servers.
-
SharePoint 2013 PerformancePoint DashBoard Designer
In Microsoft System Center 2012 R2; you can create the PerformancePoint Dashboard after you've set up your site. In this video; Rafiq Wayani demonstrates how to use SharePoint 2013 to create a Business Intelligence Center site and add a dashboard to it.
-
Software Update Compliance
Microsoft System Center 2012 R2's deployment requires software and security updates to remain compliant. In this video; Rafiq Wayani demonstrates how to install; configure; and synchronize Windows Server Update Services (WSUS) for System Center components; using the WSUS Server Configuration Wizard.
-
System Center Cloud Services Process Pack Configuration Items
The System Center Cloud Services Process Pack in Microsoft System Center 2012 R2 requires certain tasks relating to the configuration items that must be understood by the System Manager administrator in order to successfully configure the Cloud Services Pack. In this video; Rafiq Wayani demonstrates the different configuration items and how they function when provisioning resources within a cloud infrastructure.
-
System Center Cloud Services Process Pack Cloud Resource Request Items
The System Center Cloud Services Pack in Microsoft System Center 2012 R2 supports service request items that allow you to manage the availability of cloud resources within an organization. In this video; Rafiq Wayani demonstrates the request items used to subscribe to cloud resources; and update and cancel cloud resource subscriptions.
-
System Center Cloud Services Process Pack Overview
System Center Cloud Services Process Pack provides an Infrastructure as a Service (IaaS) solution built on the Microsoft System Center 2012 R2 suite of products. In this video; Rafiq Wayani demonstrates the benefits of utilizing the System Center Cloud Services Process Pack and how it is integrated within a System Center private cloud infrastructure.
-
System Center Cloud Services Process Pack Prerequisites
Before installing and configuring the System Center Cloud Services Process Pack in Microsoft System Center 2012 R2; you need to ensure that all of the necessary prerequisites have been met. In this video; Rafiq Wayani demonstrates the software; security; configuration; and Orchestrator prerequisites that need to be met before deploying the integration pack file.
-
System Center Cloud Services Process Pack Tenant Request Items
The System Center Cloud Services Pack in Microsoft System Center 2012 R2 supports service request items that allow you to manage the tenants who consume the cloud computing resources in your organization. In this video; Rafiq Wayani demonstrates the tenant request items that are used to register; update; and cancel tenants.
-
System Center Cloud Services Process Pack Terminology and Users
In order to utilize the Service Manager Console or Self-Service Portal as efficiently as possible when creating service requests in Microsoft System Center 2012 R2; it is necessary to understand the terminology describing the concepts and actions related to Cloud Services. In this video; Rafiq Wayani describes the terminology and user roles used when consuming cloud resources in System Center.
-
System Center Cloud Services Process Pack VM and Service Request Items
Microsoft Service Center 2012 R2 can be used to manage the processes involved in requesting Virtual Machine (VM) creation and configuration. In this video; Rafiq Wayani demonstrates the importance of monitoring VM creation; changes made in a VM using Runbooks within the System Center Orchestrator; and permissions processes related to change requests and their importance.
-
System Center Cloud Services Process Pack VMM Configuration Items
Configuring Virtual Machine Manager (VMM) resources is a required task that the Service Manager administrator in Microsoft System Center 2012 R2 needs to perform when configuring the Cloud Services Process Pack. In this video; Rafiq Wayani demonstrates the VMM configuration items and their capabilities; and their use in a scenario where resources are requested through the Self-Service Portal.
-
System Center Process Pack for IT GRC
You can use Microsoft System Center 2012 R2's Process Pack for IT GRC to group controls; policies; and risks associated with an authority document. In this video; Rafiq Wayani uses examples to give an overview of Process Pack for IT GRC and the environment in which it could be effective.
-
System Center Process Pack for IT GRC Configuring System Center Components
Microsoft System Center 2012 R2 IT Governance; Risk Management; and Compliance (GRC) require the configuration of Active Directory (AD) management and computer-related group policies. In this video; Rafiq Wayani demonstrates how to configure System Center 2012's AD component for IT GRC.
-
Targeting Rules in System Center
When creating a monitor or rule in Microsoft System Center 2012 R2 Operations Manager; you need to select the appropriate target that will determine where the monitor or rule will run. In this video; Rafiq Wayani demonstrates how classes; objects; and groups form the basis of monitoring components in an infrastructure with Operations Manager.
-
Update Remediation and Exemption
Microsoft System Center 2012 R2 allows you to update the Virtual Machine Manager virtual machines (VMs); their operating systems; and software components. In this video; Rafiq Wayani discusses the practical and scheduling implications of updating selected VMs and their software components.
-
User Recovery of Data in System Center 2012 R2 Data Protection Manager
Microsoft System Center 2012 R2 Data Protection Manager (DPM) allows end users to create their own recovery points. In this video; Rafiq Wayani demonstrates how to deploy registry keys required by Active Directory and enables end-user recovery through the DPM Self Service Recovery tool.
-
Validating APM in System Center 2012 R2 Operations Manager
The Microsoft System Center 2012 R2 Operations Manager allows you to validate Application Performance Monitoring (APM). In this video; Rafiq Wayani demonstrates how to validate APM in the Operations Manager virtual machine manager.
-
Verify Compliance Status with System Center Process Pack for IT GRC Reports
The Microsoft System Center 2012 R2 Service Manager Console Administration pane allows for verification of compliance with the System Center Process Pack for IT GRC. In this video; Rafiq Wayani uses the Management Packs Import function to import Management Packs relevant to specific IT GRC installations.
-
Verifying a Software Update Baseline in System Center 2012 R2 Virtual Machine Manager
Microsoft System Center 2012 R2's Virtual Machine Manager allows the creation of verifiable software update baselines. In this video; Rafiq Wayani demonstrates how to add updates to an existing software update baseline; and scan the assigned hosts for compliance.
-
Verifying System Center 2012 R2 Data Protection Manager Protection
After setting up data protection in Microsoft System Center 2012 R2; Data Protection Manager (DPM) provides numerous features that allow you to monitor protection activity and verify that everything is working faultlessly. In this video; Rafiq Wayani demonstrates how to identify the status of a new protection group from within the DPM Administrator console's Protection and Monitoring work areas.
-
Verifying System Center 2012 R2 Health and Performance
In Microsoft System Center 2012 R2; the Operations Manager (Ops Manager) provides integrated infrastructural monitoring across the data center and cloud – public and private. In this video; Rafiq Wayani demonstrates how the Ops Manager monitoring packs and integration ensure environment-wide health and performance.
-
Verifying the System Center 2012 R2 Infrastructure
Microsoft System Center 2012 R2's infrastructure needs to be verified for accessibility and functionality. In this video; Rafiq Wayani demonstrates how to use the Virtual Machine Manager (VMM) to create; configure; verify; and review System Center infrastructure components.
-
Verifying the System Center 2012 R2 Private Cloud Infrastructure
Microsoft System Center 2012 R2's private cloud infrastructure requires verification for accessibility and functionality. In this video; Rafiq Wayani demonstrates how to use the Virtual Machine Manager (VMM) to create; configure; verify; and review System Center private cloud infrastructure components.
-
Viewing System Center 2012 R2 Service Manager Reports in Excel
In Microsoft System Center 2012 R2; it's easy to export a Service Manager report and view it in Excel. In this video; Rafiq Wayani demonstrates how to use the Export feature to export and view the report in the Excel format.
-
Virtual Machine Manager Application Profiles
In Microsoft System Center 2012 R2; you can create application profiles for your virtual machines. In this video; Rafiq Wayani demonstrates how to use Virtual Machine Manager to create a virtual machine application profile.
-
Virtual Machine Manager Fabric Resources
In Microsoft System Center 2012 R2; the Virtual Machine Manager (VMM) allows you to add storage; networking; and server resources to the VMM infrastructure. In this video; Rafiq Wayani introduces VMM Server resources; before adding a file server; and installing and connecting to an iSCSI server.
-
Virtual Machine Manager Guest OS Profiles
In Microsoft System Center 2012 R2; profiles make it possible to automate the provisioning of a virtual machine. In this video; Rafiq Wayani uses guest OS profiles to deploy virtual machines.
-
Virtual Machine Manager Hardware Profiles
In Microsoft System Center 2012 R2; there is an easy way to have consistently configured systems across the network. In this video; Rafiq Wayani demonstrates how to use the hardware profile option to configure settings automatically for new virtual machines.
-
Virtual Machine Manager Overview and Features
Microsoft System Center 2012 R2's Virtual Machine Manager (SCVMM) allows you to centralize the configuration and management of virtualization resources used to create and deploy the components of a private cloud. In this video; Rafiq Wayani discusses how SCVMM provides centralized management and control of all components in a virtualized environment.
-
Virtual Machine Manager Security
In Microsoft System Center 2012 R2; the Virtual Machine Manager (VMM) uses Run As accounts and User Roles assigned permissions to enforce VMM security. In this video; Rafiq Wayani demonstrates user and self-service user roles and privileges restricting access to VMM resources.
-
Virtual Machine Manager SQL Server Profiles
In Microsoft System Center 2012 R2; you can create deployment profiles for SQL Server. In this video; Rafiq Wayani demonstrates how to use the Virtual Machine Manager to create a SQL Server deployment profile.
-
Virtual Machine Manager Virtual Machines
Microsoft System Center 2012 R2's Virtual Machine Manager (VMM) allows you to create virtual machines. In this video; Rafiq Wayani uses the New Virtual Machine Wizard to create and configure a virtual machine; on which he installs Microsoft Windows Server 2012 R2.
-
Windows Server 2012 R2 Cloud Service Models
By provisioning Microsoft System Center 2012 R2 cloud service models; you can maximize the benefits and capabilities of a cloud computing infrastructure according to your needs. In this video; Rafiq Wayani demonstrates the characteristics of the three cloud service models: Software as a Service (SaaS); Platform as a Service (PaaS); and Infrastructure as a Service (IaaS).
-
Windows Server 2012 R2 Private Cloud Business Requirements
When using Microsoft System Center 2012 R2; you need to consider the various business requirements that make choosing a private cloud over a traditional IT approach a viable option. In this video; Rafiq Wayani demonstrates the issues that you need to consider when implementing an IT solution and the benefits provided by a private cloud.
-
Windows Server 2012 R2 Private Cloud Health and Performance Monitoring
Once a private cloud has been provisioned; the Microsoft System Center 2012 R2 suite helps you to monitor the health and performance of the private cloud components; enabling the identification and prevention of failures before they occur. In this video; Rafiq Wayani demonstrates the resources that require continuous monitoring within a private cloud infrastructure.
-
Windows Server 2012 R2 Private Cloud Management Roles
When migrating to a cloud-based infrastructure within an organization using Microsoft System Center 2012 R2; you should understand the scope of the different private cloud management roles and how to differentiate between them. In this video; Rafiq Wayani compares the Business Unit IT Admin and Datacenter Admin roles in the context of a private cloud environment.
-
Windows Server 2012 R2 Private Cloud Overview
Microsoft System Center 2012 R2 is a flexible solution that allows you to manage private clouds and maximize the utilization of shared resources in an enterprise environment. In this video; Rafiq Wayani demonstrates the advantages of cloud computing; before defining the characteristics of a private cloud and how it can benefit an organization.
-
Windows Server 2012 R2 Public vs Private Cloud
When developing a strategy for implementing cloud computing with Microsoft System Center 2012 R2; you need to consider the benefits and management considerations of both public and private clouds. In this video; Rafiq Wayani compares public clouds with private clouds in terms of manageability; cost; and customization.
-
Windows Server 2012 R2 Server App-V Overview
In Microsoft System Center 2012 R2; Windows Application Virtualization (App-V); allows you to install applications on one platform; which can then be accessed and used by any user with the required privileges; without the user having to install the application on their individual machine. In this video; Rafiq Wayani demonstrates how App-V is applied for use with System Center.
-
Windows Server 2012 R2 Web Deploy Overview
In Microsoft System Center 2012 R2; you can deploy websites; web servers; and web applications that you have already constructed and tested. In this video; Rafiq Wayani uses Web Deploy to discuss deploying packages of existing applications onto different web servers.
-
Key Indicators for Windows Server 2012 R2 Private Cloud Health and Performance
In Microsoft System Center 2012 R2; key performance indicators (KPIs) allow you to confirm that a private cloud infrastructure is meeting health and performance expectations. In this video; Rafiq Wayani demonstrates the main KPIs and how they are used to define and measure progress toward organizational goals.
-
Linking Problems and Incidents in System Center 2012 R2 Service Manager
Microsoft System Center 2012 R2 Service Manager allows you to quickly link an individual incident to an existing problem record; thereby creating an association that helps to resolve the issue more efficiently. In this video; Rafiq Wayani demonstrates how to link an incident to a problem record from within the Service Manager console.
-
Managing Clouds with System Center 2012 R2 App Controller
Microsoft System Center 2012 R2 App Controller allows you to manage applications and services that are deployed in both private and Azure-based public cloud infrastructures. In this video; Rafiq Wayani demonstrates the capabilities of App Controller and its self-service portal and how App Controller integrates with Virtual Machine Manager (VMM) and Windows Azure.
-
Manually Recovering Data in System Center 2012 R2 Data Protection Manager
Microsoft System Center 2012 R2 Data Protection Manager (DPM) allows the recovery of protection groups through the DPM Administrator Console. In this video; Rafiq Wayani demonstrates how to recover data to a network destination using the DPM Administrator Console's Recovery Wizard.
-
Monitoring Distributed Applications
In Microsoft System Center 2012 R2; the Distributed Application Designer (DAD) improves the monitoring of distributed applications by defining the relationships within the applications. In this video; Rafiq Wayani demonstrates how the DAD is applied to improve the monitoring of distributed applications.
-
Monitoring the Health of a Distributed Application in System Center 2012 R2 Operations Manager
In Microsoft System Center 2012 R2; once a distributed application is created it's important to monitor its health. In this video; Rafiq Wayani demonstrates how to monitor an already created distributed application.
-
Operations Manager Administration
In Microsoft System Center 2012 R2; the Operations Manager has various components and features that assist developers with administration. In this video; Rafiq Wayani demonstrates how to use the Operations Manager to deal with administration functions such as authoring; monitoring; group and device management; subscriber notifications; resource pools; and security roles.
-
Operations Manager APM Capabilities
In Microsoft System Center 2012 R2; the Operations Manager monitors both server side and client side capabilities in order to monitor application performance. In this video; Rafiq Wayani demonstrates how Operations Manager is applied in order to monitor the performance of your applications.
-
Operations Manager Application Performance Monitoring
In Microsoft System Center 2012 R2; application performance monitoring (APM) can help to ensure that your applications are working at optimum efficiency. In this video; Rafiq Wayani demonstrates how the key components of application performance monitoring are applied.
-
Operations Manager Distributed Application Overview
In Microsoft System Center 2012 R2; the Operations Manager allows you to monitor distributed applications. In this video; Rafiq Wayani demonstrates how to monitor distributed applications and discusses the benefits of distributing applications in the first place.
-
Operations Manager Health Monitoring
In Microsoft System Center 2012 R2; a range of monitors provide information about the environment. In this video; Rafiq Wayani demonstrates a number of useful monitors; the types of monitor states that are available; what these states mean; and the type of information monitors store.
-
Operations Manager Management Pack Templates
In Microsoft System Center 2012 R2; you can use Management Pack Templates to create custom monitoring solutions. In this video; Rafiq Wayani demonstrates the templates and the different things you can use them to monitor.
-
Operations Manager Monitoring Overview
In Microsoft System Center 2012 R2; the Operations Manager allows you to create custom monitoring solutions. In this video; Rafiq Wayani demonstrates Management Pack Templates and their use in monitoring servers; connections; and processes.
-
Operations Manager Network Device Monitoring
In Microsoft System Center 2012 R2; the Operations Manager allows you to monitor network devices. In this video; Rafiq Wayani demonstrates the various types of monitoring that the Operations Manager can perform on a network.
-
Operations Manager Network Monitoring Using the Operations Console
In Microsoft System Center 2012 R2; the Operations Manager allows you to use the operations console to monitor your network. In this video; Rafiq Wayani demonstrates how to access Network Monitoring; and discusses the information that is found there.
-
Operations Manager Overview
In Microsoft System Center 2012 R2; the System Center Operations Manager (SCOM); allows you to monitor multiple environments throughout your entire system center structure. In this video; Rafiq Wayani demonstrates how SCOM operates within the system center infrastructure.
-
Operations Manager Security
In Microsoft System Center 2012 R2; the Operations Manager uses roles to segregate administrative permissions and enforce security. In this video; Rafiq Wayani demonstrates how roles are used to distribute different responsibilities among multiple administrators.
-
Operations Manager Visio Connector
In Microsoft System Center 2012 R2; you can display your network information in a diagram. In this video; Rafiq Wayani uses the Visio Connector framework diagram to discuss the Operations Manager; SDK; Visio Connector; polling interval; SharePoint; and network diagrams.
-
Orchestrator Automated Incident Remediation
In Microsoft System Center 2012 R2; you can create automated remediation for different incidents and problems. In this video; Rafiq Wayani demonstrates how to create an automated incident remediation using Orchestrator.
-
Orchestrator Overview
Microsoft System Center 2012 R2 is comprised of a suite of products that includes the Orchestrator. In this video; Rafiq Wayani demonstrates how the Orchestrator allows you to manage the cloud environment – your servers; your applications; your storage; your network; and your resources in general – easily and efficiently.
-
Orchestrator Runbook Overview
Runbooks in Microsoft System Center 2012 R2 Orchestrator provide the instructions; or workflows; that allow you to automate tasks and processes within an IT infrastructure. In this video; Rafiq Wayani demonstrates the different runbook components; the types of activities available in Orchestrator; and their common behaviors.
-
Configure Active Directory Discovery
Microsoft System Center Configuration Manager (MSCCM) 2012's Active Directory (AD) discovery methods allow you to poll for AD Forest; Group; System and User resources. In this video; Albert Kirkpatrick demonstrates how to enable a group discovery method in the Administration workspace; use an existing administrator account to sets its scope and polling frequency; and run discovery immediately.
-
Configure and Monitor Component Status
In Microsoft System Center Configuration Manager 2012; you use the site status interface to access the various system messages and component messages for those systems. In this video; Albert Kirkpatrick demonstrates the use of the site status interface to manage and configure systems and component messages.
-
Configure Boundaries and Boundary Groups
Microsoft System Center Configuration Manager (MSCCM) 2012 boundaries and boundary groups allow you to define the Configuration Manager site. In this video; Albert Kirkpatrick demonstrates using the IP subnet; AD site; IPv6 prefix; and IP address range boundary types; configures a boundary; adds it to a boundary group; and details the implications of using a boundary group for site assignment.
-
Configure Compliance Baselines
Microsoft System Center Configuration Manager 2012 allows administrators to implement compliance using configuration baselines. In this video; Albert Kirkpatrick demonstrates how to create or import configuration items; categorize the items; specify the settings that should be checked; set automatic remediation of noncompliant rules; then add the configuration item to the baselines and run a report.
-
Configure Endpoint Protection
In Microsoft System Center Configuration Manager 2012; you can configure the endpoint protection policies directly. In this video; Albert Kirkpatrick demonstrates the steps for configuring and managing endpoint protection.
-
Configure Hardware Inventory
In Microsoft System Center Configuration Manager 2012; you use the Hardware inventory service to collect local data queried from the WMI on a managed system. In this video Albert Kirkpatrick demonstrates the uses of running a hardware inventory; as well as the steps taken to configure an inventory for specific needs.
-
Configure Remote Tools
Microsoft System Center Configuration Manager 2012 allows administrators to configure and implement Remote Control; Remote Assistance; and Remote Desktop from the Configuration Manager console. In this video; Albert Kirkpatrick demonstrates how to enable remote tools as a client policy and configure various settings; such as access permissions granted by the user along with notifications of remote access.
-
Configure Reporting Services
In Microsoft System Center Configuration Manager 2012; reporting is done using SQL Server Reporting Services. In this video; Albert Kirkpatrick demonstrates how to deploy reporting services using the SQL Services Configuration tool and the Site System Roles Wizard.
-
Configure Site Backup
In Microsoft System Center Configuration Manager 2012; you need to set up site backup as part of your disaster recovery plan. In this video; Albert Kirkpatrick demonstrates how to use the Administration option to configure site backup.
-
Configure Software Distribution
Microsoft System Center Configuration Manager 2012 allows administrators to configure software distribution to clients in a site. In this video; Albert Kirkpatrick demonstrates how to configure the default client policy; computer agent; servers and site system roles; distribution point; and boundary groups to configure a site client as a distribution point.
-
Configure Software Inventory
Microsoft System Center Configuration Manager 2012 allows administrators to configure a software inventory to retrieve software information from Configuration Manager clients. In this video; Albert Kirkpatrick demonstrates how to enable software inventory and then schedule; set types; collect pattern metadata and physical data; as well as create consistent naming patterns for software inventories.
-
Configure Software Metering
Microsoft System Center Configuration Manager 2012 allows you to track the usage of software on your local system. In this video; Albert Kirkpatrick demonstrates how to use the Software Metering feature to create tracking rules for software utilization.
-
Configure Software Updates
Microsoft System Center Configuration Manager 2012 allows you to easily manage software updates. In this video; Albert Kirkpatrick demonstrates the process of enabling and configuring the Windows Server Update Service using the Configuration Manager.
-
Creating and Deploying Apps
Microsoft System Center Configuration Manager 2012 allows administrators to create and deploy applications using the new Application Model. In this video; Albert Kirkpatrick demonstrates how to create an application; choose from a number of natively supported file types; import the application into the Configuration Manager client; and distribute the content.
-
Creating and Deploying Packages
In Microsoft System Center Configuration Manager 2012 there are two ways to distribute software. In this video; Albert Kirkpatrick demonstrates the packages method of distributing software by specifying source files; specifying the command line; and determining conditions under which the software should be distributed.
-
Creating and Deploying Virtual Apps
Microsoft System Center Configuration Manager 2012 allows administrators to create and deploy virtual applications. In this video; Albert Kirkpatrick demonstrates that the procedure for creating and deploying virtual applications is the same as is followed for standard applications. However; the application type differs; as does the file type; and with App-V; Configuration Manager supports both streaming distribution and local cache.
-
Creating App Requirements and Dependencies
In Microsoft System Configuration Manager 2012; you can use requirements and dependencies when deploying applications. In this video; Albert Kirkpatrick demonstrates how to create application requirements and dependencies to minimise the number of collections you need to create for a deployment.
-
Creating Custom Security Rules
Microsoft System Center Configuration Manager (MSCCM) 2012's role-based administrative model allows you to define the scope of rights delegated to users or groups. In this video; Albert Kirkpatrick demonstrates how to create a user; assign it one of 14 default roles; allocate it a collection to which it has access; and create a scope restricting its access to specific applications.
-
Creating Data Queries
In Microsoft System Center Configuration Manager 2012; you can create data queries to extract system information. In this video; Albert Kirkpatrick demonstrates how to use the Monitoring workspace to create data queries.
-
Creating Device Collections
Microsoft System Center Configuration Manager 2012 allows you to organize your information into logical groups called collections. In this video; Albert Kirkpatrick demonstrates how to use the Device Collections option to create a device collection; specify its criteria; and schedule how often it should be updated.
-
Creating Global Conditions for App Deployment
Microsoft System Center Configuration Manager 2012 allows you to deploy applications effectively by allowing you to set global conditions for requirements and dependencies. In this video; Albert Kirkpatrick uses the Create Global Condition dialog box to show you how to define and configure a global condition determining criteria for an application's deployment.
-
Creating Site Systems
Microsoft System Center Configuration Manager uses Site Systems to provide functionality within a site. In this video; Albert Kirkpatrick demonstrates how to create Site Systems by using the Create Site System Server Wizard in the SCCM Administration workspace.
-
Creating Status Message Queries
Microsoft System Center Configuration Manager 2012 allows administrators to create custom status message queries to retrieve specific information on a site. In this video; Albert Kirkpatrick demonstrates how to select one of the pre-generated status message queries or create a custom query by selecting specific criteria to retrieve values from the Configuration Manager database.
-
Deploying Software Updates
In Microsoft System Center Configuration Manager 2012; an already existing infrastructure can be leveraged for applications to deploy updates. In this video; Albert Kirkpatrick demonstrates the process of arranging for Configuration Manager to leverage infrastructure to deploy updates based on what updates are required; and which deployments are either mandatory or optional.
-
Deploying the SCCM Client Through Client Push
In Microsoft System Center Configuration Manager 2012; there are two ways to deploy the configuration manager client. In this Video; Albert Kirkpatrick demonstrates how to deploy the configuration manager client through the Client Push configuration method.
-
Exploring the SCCM 2012 Console
Microsoft System Center Configuration Manager (MSCCM) 2012's environment and layout differ greatly from the 2007 MMC-based version. In this video; Albert Kirkpatrick demonstrates how MSCCM 2012's Assets and Compliance; Software Library; Monitoring; and Administration workspaces and their constituent folders; Cloud-based components; and multiple other features contribute to more effective configuration management administration.
-
Install and Configure App Catalog
Microsoft System Center Configuration Manager 2012 allows administrators to deploy software using a web-based interface linked to the Application Catalog. In this video; Albert Kirkpatrick demonstrates how to configure the Application Catalog website and web service point so that Configuration Manager can build a custom web front end to show the user only the software that's available to them.
-
Monitoring Client Health
You can effectively monitor client health in Microsoft System Center Configuration Manager 2012. In this video; Albert Kirkpatrick demonstrates how to use the Monitoring workspace to monitor client health based on activity information; and views graphs and reports that provide a range of useful information.
-
Testing Security Roles
Microsoft System Center Configuration Manager (MSCCM) 2012 allows you to verify that assigned roles are correct. In this video; Albert Kirkpatrick demonstrates the contents of his Software Library and Device and User Collections from within MSCCM's Administration workspace; initiates a session as a user to whom specific rights have been delegated; and confirms the user's access to an assigned collection.
-
Viewing Inventory Information
Microsoft System Center Configuration Manager 2012 allows you to view hardware and software inventory information from an individual client or your enterprise. In this video; Albert Kirkpatrick demonstrates how to use the Resource Explorer to view inventory information in the Hardware; Hardware History; Software; and Workstation Status objects; and also view individual client information.
-
Access to Removable Media
After watching this video; you will be able to configure access to removable media on a Windows 10 device.
-
Account Policies
After watching this video; you will be able to configure account policies on a Windows 10 device.
-
Biometrics
After watching this video; you will be able to use biometrics for authentication.
-
BitLocker
Microsoft Windows 8.1's BitLocker drive encryption tool allows you to manage the security of your computer's internal and external drives. In this video; Jay Ferron demonstrates how to use the Trusted Platform Module (TPM) copied to SkyDrive to store your BitLocker recovery key; before configuring and managing BitLocker on a hard drive.
-
Broadband Tethering and Metered Networks
After watching this video; you will be able to configure broadband tethering and metered networks on a Windows 10 device.
-
Creating and Managing Desktop Images
After watching this video; you will be able to create and manage Windows 10 device images.
-
Creating and Supporting a Windows To Go Installation
After watching this video; you will be able to to create and support running Windows 10 from a USB device.
-
Credential Manager
After watching this video; you will be able to configure Credential Manager on a Windows 10 device.
-
Customizing an Installation with Windows PE
After watching this video; you will be able to use Windows Preinstallation Environment (PE) to prepare a device for Windows 10.
-
Data Recovery Agent
After watching this video; you will be able to configure the Data Recovery Agent on a Windows 10 device.
-
Deep Link Apps with Microsoft Intune
After watching this video; you will be able to deep link apps by using Microsoft Intune.
-
Deploying Desktop Apps with Microsoft Intune
After watching this video; you will be able to use Intune to deploy desktop applications in Windows 10.
-
Desktop Application Co-existence Using App-V
After watching this video; you will be able to configure and use App-V to run applications on a Windows 10 device.
-
Desktop Application Co-existence Using Hyper-V
After watching this video; you will be able to configure and use Hyper-V to run applications on a Windows 10 device.
-
Desktop Application Co-existence Using RemoteApp
After watching this video; you will be able to configure and use RemoteApp to run applications on a Windows 10 device.
-
Distributed File System Client
After watching this video; you will be able to install and configure Distributed File System (DFS) on a Windows 10 device.
-
Dynamic Access Control
After watching this video; you will be able to configure Dynamic Access Control (DAC) on a Windows 10 device.
-
Encrypting File System
After watching this video; you will be able to configure Encrypting File System (EFS) on a Windows 10 device.
-
Group Policy Application
After watching this video; you will be able to support Group Policy application on a Windows 10 device.
-
Group Policy Caching
After watching this video; you will be able to configure Group Policy caching on a Windows 10 device.
-
Homegroup
After watching this video; you will be able to describe HomeGroup.
-
Install and Manage Apps
After watching this video; you will be able to install and manage apps in Windows 10.
-
Integrating a Microsoft Account
After watching this video; you will be able to integrate a Microsoft account on a Windows 10 device.
-
Integrating a Trusted PC
After watching this video; you will be able to set up a trusted PC for ease of account password resets in Windows 10.
-
Integrating Personalization Settings
After watching this video; you will be able to configure personalization settings across Windows 10 devices.
-
Local Account Versus Microsoft Account
After watching this video; you will be able to identify the difference between a local and a Microsoft account.
-
Manage Updates and Security
After watching this video; you will be able to configure updates; security; and Group Policy in Windows 10.
-
Managing a Native Virtual Hard Disk
After watching this video; you will be able to create and use a Windows 10 native virtual hard disk (VHD).
-
Managing Boot Settings
After watching this video; you will be able to manage the different Windows 10 boot settings.
-
Managing Non-Microsoft Updates
After watching this video; you will be able to manage third-party updates on a Windows 10 device.
-
Managing Policies
After watching this video; you will be able to manage policies using Intune on a Windows 10 device.
-
Managing Remote Computers
After watching this video; you will be able to manage remote computers using Intune using a Windows 10 device.
-
Managing Software with Windows Store Apps
After watching this video; you will be able to use Windows Store apps to install and manage software.
-
Managing Updates by using Windows Update
After watching this video; you will be able to configure Windows updates on a Windows 10 device.
-
Managing Updates with Microsoft Intune
After watching this video; you will be able to use Windows Intune to manage device updates on a Windows 10 device.
-
Managing User and Computer Groups
After watching this video; you will be able to manage user and computer groups using Intune on a Windows 10 device.
-
Managing Windows 10 Multiboot
After watching this video; you will be able to manage Windows 10 on a multiboot device.
-
Microsoft BitLocker Administration and Monitoring
After watching this video; you will be able to configure and use Microsoft BitLocker Administration and Monitoring (MBAM) on a Windows 10 device.
-
Microsoft Edge Security
After watching this video; you will be able to configure and manage Microsoft Edge security features.
-
Microsoft System Center 2012 Endpoint Protection
After watching this video; you will be able to configure SCCM endpoint protection on a Windows 10 device.
-
Monitor and Manage Printers
After watching this video; you will be able to monitor and manage printers on a Windows 10 device.
-
Monitor Performance with Data Collector Sets
After watching this video; you will be able to configure and use data collector sets on a Windows 10 device.
-
Monitoring
After watching this video; you will be able to configure monitoring using Intune on a Windows 10 device.
-
NFC Tap-to-Pair and Printer Sharing
After watching this video; you will be able to configure Tap-to-Pair on a Windows 10 device.
-
NTFS
After watching this video; you will be able to describe the NTFS file system.
-
OneDrive
After watching this video; you will be able to configure and use OneDrive on a Windows 10 device.
-
Optimizing Data Access Using BranchCache
After watching this video; you will be able to configure BranchCache on a Windows 10 device.
-
Picture Passwords
After watching this video; you will be able to configure and use picture passwords on a Windows 10 device.
-
Policy Processing
After watching this video; you will be able to identify the policy processing on a Windows 10 device.
-
Resolve STOP Errors
After watching this video; you will be able to resolve STOP errors on a Windows 10 device.
-
Resolving Hardware and Device Issues
After watching this video; you will be able to troubleshoot Windows 10 hardware and device issues.
-
Resultant Set of Policy (RSoP)
After watching this video; you will be able to use Resultant Set of Policy (RSoP) to determine the policies applied to a Windows 10 device.
-
Secure Channel
After watching this video; you will be able to configure a secure channel on a Windows 10 device.
-
Sideload Apps into Online and Offline Images
After watching this video; you will be able to sideload apps into online and offline images.
-
Sideload Apps with Microsoft Intune
After watching this video; you will be able to sideload apps by using Microsoft Intune in Windows 10.
-
Storage Capacity and Fault Tolerance
After watching this video; you will be able to configure storage capacity for fault tolerance on a Windows 10 device.
-
Support Authentication and Data Security
After watching this video; you will be able to configure certificates and EFS on a Windows 10 device.
-
Support Hardware and Mobile Devices
After watching this video; you will be able to troubleshoot Windows 10 hardware and configure remote access on a mobile device.
-
Support Remote Access
After watching this video; you will be able to configure a VPN connection and NAP protection on a Windows 10 device.
-
Supporting Connection Manager Administration Kit
After watching this video; you will be able to use Connection Manager Administration Kit (CMAK) on a Windows 10 device.
-
Supporting DirectAccess
After watching this video; you will be able to configure direct access to a Windows 10 device.
-
Supporting IP Security
After watching this video; you will be able to configure IP security for a Windows 10 device.
-
Supporting IPv4 and IPv6
After watching this video; you will be able to configure both IPv4 and IPv6 network connections on a Windows 10 device.
-
Supporting Name Resolution
After watching this video; you will be able to configure DNS settings on a Windows 10 device.
-
Supporting PNRP and DNSSEC
After watching this video; you will be able to configure PNRP and DNSSEC on a Windows 10 device.
-
Supporting Remote Administration
After watching this video; you will be able to configure remote administration settings for Windows 10 device.
-
Supporting Remote Desktop Protocol
After watching this video; you will be able to configure a Remote Desktop Protocol (RDP) connection to and from a Windows 10 device.
-
Supporting Remote Desktop Services Gateway Access
After watching this video; you will be able to configure a Remote Desktop Service Gateway on a Windows 10 device.
-
Supporting Transition Technologies
After watching this video; you will be able to configure IPv6 transition technologies on a Windows 10 device.
-
Supporting VPN Connections
After watching this video; you will be able to configure a VPN connection on a Windows 10 device.
-
Supporting Windows Firewall
After watching this video; you will be able to configure the Windows Firewall on a Windows 10 device.
-
Supporting Wireless Networks
After watching this video; you will be able to configure and support a wireless network from a windows 10 device.
-
Sync Center
After watching this video; you will be able to access and sync data on a Windows 10 device.
-
User Experience Virtualization
After watching this video; you will be able to install and configure User Experience Virtualization (UE-V) in Windows 10.
-
Using Application Compatibility Toolkit
After watching this video; you will be able to use the Application Compatibility Toolkit (ACT) to determine application compatibility in Windows 10.
-
Using Resource Monitor
After watching this video; you will be able to access and use the Resource Monitor on a Windows 10 device.
-
Using Task Manager
After watching this video; you will be able to use Windows Task Manager for basic real-time performance monitoring.
-
Using the Diagnostics and Recovery Toolset
After watching this video; you will be able to remediate start-up issues by using the Diagnostics and Recovery Toolset (DaRT).
-
Using Windows Performance Analyzer
After watching this video; you will be able to use Windows Performance Analyzer (WPA) on a Windows 10 device.
-
Using Windows Performance Recorder
After watching this video; you will be able to use Windows Performance Recorder (WPR) on a Windows 10 device.
-
Virtual Smart Cards
After watching this video; you will be able to configure virtual smart cards on a Windows 10 device.
-
Windows Defender
After watching this video; you will be able to configure security by using Windows Defender on a Windows 10 device.
-
Windows Intune Endpoint Protection
After watching this video; you will be able to configure Windows Intune Endpoint Protection on a Windows 10 device.
-
Windows Performance Toolkit (WPT)
After watching this video; you will be able to use Windows Performance Toolkit (WPT) on a Windows 10 device.
-
Work Folders
After watching this video; you will be able to describe the need for Work Folders.
-
Workgroup Versus Domain
After watching this video; you will be able to identify the difference between a workgroup and a domain; and the different options they provide to a Windows 10 device.
-
Workplace Join
After watching this video; you will be able to configure and join a workplace.
-
Computer and User Authentication
After watching this video; you will be able to configure authentication for a Windows 10 user and computer device.
-
Configuring ACT Settings
As an administrator in a Microsoft Windows 7 environment; the Application Compatibility Toolkit (ACT) provides you with a number of settings that you can use to configure the ACT to your preferred requirements when evaluating compatibility issues. In this video; Jonathan Summers demonstrates how to configure and specify settings for the ACT in Windows 7.
-
Configuring AppLocker
In Microsoft Windows 7; AppLocker allows administrators to create rules that control access to applications. In this video; Jonathan Summers demonstrates how to configure an executable rule in AppLocker from a Windows 7 system.
-
Configuring Desktop Personalization
Microsoft Windows 7's personalization features enable you to personalize virtually every aspect of your Windows interface experience; from themes to window colors to system sounds and screen savers. In this video; Jonathan Summers gives a detailed breakdown of the personalization features.
-
Configuring Offline Files and Folders Sync
The offline files feature in Microsoft Windows 7 allows you to configure and synchronize shared files and folders on your network; making them available when you are away from the network and improving efficiency when there are network outages or a slow connection. In this video; Jonathan Summers demonstrates how to configure and synchronize offline files and folders in Windows 7.
-
Configuring Search Properties
You can configure the properties of the new Microsoft Windows 7 search features to make searching for files; applications; and any other indexed item located on your computer faster and more thorough than before. In this video; Jonathan Summers demonstrates how to configure the indexing options in Windows 7 and take full advantage of its search functionality.
-
Configuring Shadow Copy
Shadow Copy is a method of file restore; featured in Microsoft Windows 7; which allows administrators and users to create snapshots of previous documents. In this video; Jonathan Summers demonstrates how to configure Shadow Copy and use previous versions of documents.
-
Configuring Shared Access to Files for Specific Users
Microsoft Windows 7 allows you to configure shared access for files and folders that haven't been automatically shared as part of a homegroup or workgroup with specific users who you choose to share resources with. In this video; Jonathan Summers uses the File Sharing wizard in Windows 7 to grant a user permissions to a shared folder.
-
Configuring UAC
Additional User Account Control (UAC) settings have been introduced in Microsoft Windows 7 for configuring how UAC notifies you when programs attempt to make changes to your computer. In this video; Jonathan Summers describes the UAC settings and how the different levels impact the security of your computer.
-
Configuring Windows Update
After watching this video; you will be able to configure Windows Update.
-
Configuring Workgroups
Microsoft Windows 7 allows you to share files and printers in small organizations without a domain by creating a workgroup or joining an existing workgroup. In this video; Jonathan Summers demonstrates how to configure a workgroup before creating documents to be shared throughout the workgroup.
-
Create a Custom Event Filter
Event logs give users and administrators a view of all events occurring in a Microsoft Windows 7 system. They can also be filtered so that only the events the user needs to see are shown. In this video; Jonathan Summers demonstrates how to create an event filter using the Event Viewer in Windows 7.
-
Create a Startup Repair Disk
By creating a system repair disc in Microsoft Windows 7; you'll have access to a powerful set of Microsoft-created diagnostic and repair utilities that can help you repair Windows if a serious error occurs. In this video; Jonathan Summers demonstrates how to easily create a system repair disc from the Backup and Restore utility in Windows 7.
-
Create and Configure a Public Shared Folder for All Users
In Microsoft Windows 7; a public shared folder allows everyone with rights to it to share the files it contains. Access rights can be either Read or Read/Write. In this video; Jonathan Summers demonstrates how to create a public shared folder on a Windows Server 2000 R2 server that is available to others in the domain or workgroup.
-
Create and Share a Printer
Microsoft Windows 7 enables users who have a connected printer or access to a network printer to share printer usage. They can also access an installed printer's sharing properties to customise the installation; by specifying vendor print jobs on client computers or adding drivers; for instance. In this video; Jonathan Summers demonstrates how to install and share a local printer.
-
Creating an Incoming VPN Connection
The Network and Sharing Center in Microsoft Windows 7 can be used to create secure VPN connections between two computers; either over an internal or public network. In this video; Jonathan Summers demonstrates how to create an incoming VPN connection to a local Windows 7 computer to safeguard it from unauthorized public access over the Internet.
-
Customizing the Desktop Environment
In Microsoft Windows 7; you can customize a wide range of desktop features to suit a user's specific needs. In this video; Jonathan Summers demonstrates how to modify the taskbar; Start menu; and toolbars in the desktop environment.
-
Ease of Access Center
The Ease of Access Center is the central location in Microsoft Windows 7 for finding tools that can be configured to make your computer easier to use and improve accessibility. In this video; Jonathan Summers explores the Ease of Access Center in Windows 7 and highlights some of the accessibility setting options that are available.
-
Enable and Configure Windows Remote Desktop
In Microsoft Windows 7; the remote desktop feature allows administrators and other users to log on to a computer at a different location and use it as if it were their own. In this video; Jonathan Summers demonstrates how to set up a remote desktop connection from a Windows 7 system.
-
Enabling and Configuring BranchCache
You can use the new BranchCache feature in Microsoft Windows 7 to allow resources to be cached at a remote location to better utilize wide area network bandwidth. In this video; Jonathan Summers demonstrates how to configure branch caching.
-
Exploring System Properties
In Microsoft Windows 7; system properties allow you to manage the configuration of logical and physical options on Windows 7 computers. In this video; Jonathan Summers demonstrates how to access and make changes to various system properties.
-
Exploring Windows Aero
Microsoft Windows 7 has added a number of new capabilities to the Aero interface that you can use to enhance the way your desktop is managed and improve navigation between applications. In this video; Jonathan Summers demonstrates how to use the new features in the revised version of Windows Aero.
-
Forwarded Events
Microsoft Windows 7 provides administrators with an easy means of forwarding detailed information about significant events on a computer to a central Windows 7 computer; making troubleshooting problems and errors more efficient. In this video; Jonathan Summers demonstrates how to create a subscription in the Event Viewer before enabling the Windows Event Collector service in order to forward events.
-
Installing the ACT
Microsoft Windows 7 Application Compatibility Toolkit (ACT) allows you to determine if different applications are compatible with new software versions and updates; and is especially valuable to administrators when deploying Windows 7 within an organization with pre-existing software installations. In this video; Jonathan Summers demonstrates how to install the ACT in Windows 7.
-
Migrating Settings Using Windows Easy Transfer
Windows Easy Transfer allows you to easily migrate files and settings from an old Windows-based computer to a new Microsoft Windows 7 computer seamlessly and without losing information from your old computer. In this video; Jonathan Summers uses the Windows Easy Transfer wizard to transfer profiles and shared items from an old computer onto a new Windows 7 computer.
-
Problem Steps Recorder
The Problem Steps Recorder in Microsoft Windows 7 allows you to automatically capture screenshots and text descriptions of steps performed on your computer; providing a useful resource for administrators wanting to document processes in an organization or assist with computer issues. In this video; Jonathan Summers uses the Problem Steps Recorder to record a process.
-
Recovering a BitLocker Encrypted Drive
You can use Microsoft Windows 7's Local Group Policy Editor to configure; manage; and ensure the recovery of data from BitLocker-encrypted fixed drives. In this video; Jonathan Summers uses Windows 7's Local Group Policy Editor to guide you through the configuration resources; tools; and options that enable you to secure BitLocker-protected drives; data; and users' passwords and keys.
-
Recovering a Removable Data Drive
As an administrator; you have the ability to define policy settings in Microsoft Windows 7 that will allow you to control how BitLocker-protected removable data drives can be recovered in the event of the required credentials being lost. In this video; Jonathan Summers demonstrates how to configure the policy that allows you to choose how BitLocker-protected removable drives are recovered.
-
Reliability History
Microsoft Windows 7's Reliability Monitor gives you detailed; graphic information and troubleshooting support; enabling you to monitor and maintain the health of your computer. In this video; Jonathan Summers demonstrates how to use the Reliability Monitor to read; analyze; and act on the substantial technical data revealed by your machine's stability index.
-
Resolve a Remote Connectivity Problem
Your ability to configure Microsoft Windows 7's Remote Desktop Connection utility correctly will enable you to overcome authentication; addressing; firewall; and other issues that might arise when initiating remote connectivity sessions. In this video; Jonathan Summers details the connectivity capabilities and requirements of Windows 7's Remote Desktop utility; comprehensively covering potential problems and their solutions.
-
Resolve a Startup Problem
Microsoft Windows 7's Startup Repair and System Recovery and Restore features enable you to overcome startup issues caused by Windows 7 not loading. In this video; Jonathan Summers demonstrates how to perform a system repair and a system restore; and then create a system image or VHD capable of performing a system recovery.
-
Resolve Hardware Issues
Microsoft Windows 7's Device Manager enables you to access your hardware devices and update outdated drivers or scan your system for changes. Alternatively; Microsoft's Fix it site offers executable solutions resolving specific issues. In this video; Jonathan Summers explains the benefits and purposes of each method – showing you how to keep your hardware fully functional and up to date.
-
Restoring Data with Windows Backup
Microsoft Windows 7's new Backup Wizard and Restore options enable you to quickly and easily restore deleted files or save them in a location of your choosing. In this video; Jonathan Summers demonstrates how to use the Restore feature to retrieve deleted files from the administrator's backup and saves them in another location.
-
Troubleshoot Application Startup
Microsoft Windows 7's Compatibility Wizard harnesses a host of remediation tools and troubleshooters to ensure that you can use programs compatible with earlier versions of the Windows operating system. In this video; Jonathan Summers demonstrates how to use the Compatibility Wizard to scan programs on a machine.
-
Troubleshoot IE Security Issues
In Microsoft Windows 7; Internet Explorer has many options available for configuring Internet settings. In this video; Jonathan Summers; demonstrates how to troubleshoot and configure the Internet security settings.
-
Troubleshoot Missing Files in My Documents
Microsoft Windows 7 enables you to easily track down documents that have been misplaced; either through being saved to the incorrect folder or by having their shortcuts broken. In this video; Jonathan Summers demonstrates to search for; amend the properties of; and save your previously missing files to their intended folders.
-
Troubleshooting File Access
Microsoft Windows 7 enables you to easily restore access to users who find they no longer have the necessary permissions to access certain documents or files. In this video; Jonathan Summers demonstrates how the administrator can quickly grant users access by editing their permissions.
-
Troubleshooting Windows Updates
In Microsoft Windows 7; the Windows updates do not always install successfully. You can therefore use the Microsoft Fix it center and the Windows Update program to troubleshoot; install; hide; and restore updates. In this video; Jonathan Summers; demonstrates how to work with updates.
-
Updating a Device Driver
The Device Manager in Microsoft Windows 7 provides new methods to help update and troubleshoot the driver software in use on the computer. This includes drivers for pointing devices; display adapters; and portable devices. In this video; Jonathan Summers demonstrates how to update a mouse driver; and then roll back the driver to the previous version.
-
Using EFS to Secure Data
The Encryption File System (EFS) feature in Microsoft Windows 7 allows you to easily secure sensitive information on your computer in an encrypted format. In this video; Jonathan Summers demonstrates how to encrypt a folder in Windows 7 using EFS.
-
Using System Restore
Microsoft Windows 7 System Restore is a valuable and potentially time-saving utility that uses restore points to quickly return a computer's systems files and programs to a time when everything was functioning properly. In this video; Jonathan Summers demonstrates how to create a restore point before using System Restore to restore a computer to a previous state.
-
Using the Action Center
Action Center in Microsoft Windows 7 provides you with a central location where you can find maintenance and security information about your computer as well as being able to control system notifications and resolve problems. In this video; Jonathan Summers demonstrates how to use the configuration settings in Action Center to keep Windows running smoothly.
-
Using Windows 7 Libraries
The new Libraries feature in Microsoft Windows 7 provides a central location where you can conveniently work with and manage files that are distributed across your computer or network. In this video; Jonathan Summers uses Windows 7 Libraries to create a new library for sharing documents within a homegroup.
-
View and Edit the BCD Store
The Boot Configuration Data (BDC) store in Microsoft Windows 7 contains configuration data that you can view and edit in order to influence the boot process. In this video; Jonathan Summers demonstrates how to configure the BCD store using Command Prompt as well as the Startup and Recovery dialog box from the computer's properties.
-
Administering the Domain
In Microsoft Windows 7; you can connect directly to any Active Directory consoles if you have the appropriate permissions. In this video; Jonathan Summers; demonstrates how to use the Active Directory to administer and install tools; and create a new user.
-
Backing Up Data Using Windows Backup
In Microsoft Windows 7; you can back up your data using the Backup and Restore tool. In this video; Jonathan Summers demonstrates how to use Backup and Restore to create a backup; system image; system repair disc; and specify which data must be backed up.
-
Calculating Effective Permissions
In Microsoft Windows 7; you can assign NTFS permissions to users and groups using the Effective Permissions tool. In this video; Jonathan Summers; demonstrates how to use Effective Permissions to select users and assign appropriate permissions to access files and folders.
-
Collecting Application Inventory in the ACT
In Microsoft Windows 7; you can use the Application Compatibility Toolkit to see which applications are in use and if they are compatible with Windows 7. In this video; Jonathan Summers; demonstrates how to use the Application Compatibility Toolkit to create a data collection package file; monitor application usage; and verify application compatibility.
-
Configure Disk Quotas
Quotas are rules that enable administrators to control how much space can be utilized on a hard disk. You can easily configure quotas in Microsoft Windows 7. In this video; Jonathan Summers demonstrates how to create a quota on a volume; as well as how to log an event when the user exceeds their quota limit or warning level.
-
Configure Firewall with Advanced Security
The Windows Firewall with Advanced Security feature in Microsoft Windows 7 provides all the options available in the original Windows Firewall; as well as new connection security features. Users assign a domain; private; or public profile to a network connection. Jonathan Summers demonstrates how to customize a profile by creating inbound and outbound rules.
-
Configure Group Policy to Control Device Installation
Windows 7 administrative features enable you to control device installation on your client computers by configuring Group Policy for device installation in an Active Directory domain. In this video; Jonathan Summers uses the Group Policy Object Editor to configure device installation restriction policies.
-
Configure Homegroups
HomeGroup is a new feature in Microsoft Windows 7 that you can easily configure on a home network in order to share pictures; music; documents; and printers with others in your homegroup. In this video; Jonathan Summers demonstrates how to use the homegroup troubleshooter before creating a homegroup and adding a computer to the homegroup.
-
Configure IP Remotely
As a Microsoft Windows 7 administrator; you might often need to configure network settings; such as IP addresses; remotely. In this video; Jonathan Summers; demonstrates how to use Microsoft Windows 7 tools and command-line instructions to create and change IP settings from a remote computer.
-
Configure IPv4
When DHCP is not used to allocate IPv4 addresses automatically in a Microsoft Windows 7 environment; you need to configure IPv4 addresses manually in the Network and Sharing Center. In this video; Jonathan Summers demonstrates how to modify IPv4 addresses manually in Windows 7.
-
Configure Local Security Policies
Local security policies can be configured in Microsoft Windows 7 when group policies cannot be implemented at the active domain level; providing security features and restrictions at the computer level. In this video; Jonathan Summers highlights the password and lockout security policies available at the local level through the Local Group Policy Editor.
-
Configure Power Management Options
In Microsoft Windows 7; you can configure power management options. In this video; Jonathan Summers demonstrates how to change power plan settings; enable sleep mode; and modify advanced power settings in Windows 7.
-
Configure Windows Security Essentials
In Microsoft Windows 7; you can use Security Essentials to scan and remove potential malware threats from your system. In this video; Jonathan Summers demonstrates how to configure Security Essentials to perform automatic maintenance on your system.
-
Configuring a BitLocker Encrypted Drive
BitLocker To Go is a new feature in Microsoft Windows 7 that uses BitLocker Drive Encryption to help you protect data on portable storage devices in the event of loss or theft. In this video; Jonathan Summers uses the BitLocker Drive Encryption wizard in Windows 7 to configure a BitLocker encrypted flash drive.
-
Configuring a Reference Image
In Microsoft Window 7; you can configure a reference image that allows you to reinstall or repair Windows installations. In this video; Jonathan Summers demonstrates how to configure a VHD image to use as a reference.
-
Advanced System Settings
The Advanced System Settings in Microsoft Windows 8 allows network administrators to configure the computer and change settings. In this video; Jay Ferron demonstrates how to use the Advanced System properties.
-
Charms
Charms in Microsoft Windows 8 allow you to manage your computer; find programs; do settings; do search; and configure extra monitors. In this video; Jay Ferron demonstrates how to use the Charms function.
-
Control Panel
The Control Panels in Microsoft Windows 8 allow users to manage settings. In this video; Jay Ferron demonstrates how to access and use the detailed as well as the classic Control Panels.
-
Encrypting Your Hard Drive
Encrypting your hard drive in Microsoft Windows 8 is possible using BitLocker. In this video; Jay Ferron demonstrates how to encrypt the hard drive that the computer boots from.
-
Home Network
Home network in Microsoft Windows 8 allows users to share files and printers. In this video; Jay Ferron demonstrates how to set up a home network.
-
Installing a Camera
Installing a camera in Microsoft Windows 8 is easy. In this video; Jay Ferron demonstrates the steps involved in plugging in a camera to the computer.
-
Jumplist
Jump lists in Microsoft Windows 8 allow users to easily locate the last ten files that they have worked on. In this video; Jay Ferron demonstrates how to work with jump lists.
-
Libraries
Libraries in Microsoft Windows 8 allow users to manage data across the computer. In this video; Jay Ferron demonstrates how to include folders from different locations in a library to access them from one convenient place and how to remove folders from a library.
-
Local Printer
Installing a local printer in Microsoft Windows 8 is simple. In this video; Jay Ferron demonstrates how to install and configure a local printer.
-
Network Printer
A network printer in Microsoft Windows 8 fundamentally uses TCP/IP; either wired or wireless; to talk. In this video; Jay Ferron demonstrates how to install a network printer in Windows 8.
-
Performance and Network Manager
The performance and network manager in Microsoft Windows 8 allows users to monitor the real-time usage of computer resources. In this video; Jay Ferron discusses the improved performance of Windows 8 and demonstrates how to monitor the real-time usage of the CPU; hard disk; network; and memory.
-
Problem Step Recorder
Problem Steps Recorder in Microsoft Windows 8 is a troubleshooting and assistance tool used to record actions taken by a user on a computer. It allows users to capture a sequence of steps for training and developers to track an application problem. In this video; Jay Ferron demonstrates how to use the Steps Recorder.
-
The New Interface
The new Microsoft Windows 8 interface is drastically different. It displays a customizable array of tiles linking to various apps and desktop programs that display constantly updated information and content through live tiles. In this video; Jay Ferron demonstrates how to work faster and easier with the new interface.
-
The Taskbar
The taskbar in Microsoft Windows 8 is basically a toolbar for the desktop. It that contains quick access to your most popular applications and also displays status for the programs that are installed. In this video; Jay Ferron demonstrates how to customize the taskbar; add extra features and options; and make it more personable for you.
-
The Video Application
In Microsoft Windows 8; the Video application allows you to add; download; open; preview; and view videos. In this video; Jay Ferron explores the Video application and introduces some of the features of Xbox Video.
-
The Weather Application
The Weather application in Microsoft Windows 8 allows you to access information about the weather for any location in the world. In this video; Jay Ferron demonstrates the types of weather information provided by the Weather application; how to add new weather places; and how to access weather information via the desktop.
-
USB to Go
Working with a USB stick that has Microsoft Windows 8 allows users to avoid security risks that could occur from inserting the stick inside other devices; such as an employee’s home computer. In this video; Jay Ferron demonstrates how to boot and run a computer from a USB stick.
-
User Access Controls
User access controls in Microsoft Windows 8 is a technology and security infrastructure that is aimed at improve the security by limiting application software to standard user privileges until an administrator authorizes an increase or elevation. In this video; Jay Ferron discusses the access controls in Windows 8.
-
What are Devices
Devices in Microsoft Windows 8 include multimedia; notebooks; and tablets. In this video; Jay Ferron demonstrates how to install and configure devices.
-
Wi-Fi Advanced Features
The advanced features in Wi-Fi in Microsoft Windows 8 allow users to connect easily and make their computer a hotspot for other users. In this video; Jay Ferron demonstrates how to share and secure your Wi-Fi.
-
Wi-Fi Connect
Connecting to a Wi-Fi access point in Microsoft Windows 8 allows users to be connected and work; play games; listen to music; or catch up with friends. In this video; Jay Ferron demonstrates how to configure your Wi-Fi connection.
-
Windows Remote Assistance
Remote Assistance in Microsoft Windows 8 is a feature that allows users to temporarily control a remote Windows computer over a network to resolve issues. In this video; Jay Ferron demonstrates how to use Remote Assistance.
-
Adding Administrator Tiles
Microsoft Windows 8 administrators can easily group all the administrative functions; features; and tools of previous versions of Windows on their Start screen. In this video; Jay Ferron demonstrates how to locate the tiles making up the administrative tools group; before positioning them on your Start screen.
-
Building Windows To Go from Command Prompt
In Microsoft Windows 8; you can create a Windows To Go bootable device. In this video; Jay Ferron demonstrates how to use the administrator's command prompt to create a bootable Windows To Go USB stick containing your Windows image.
-
Building Windows To Go from Wizard
In Microsoft Windows 8; you can create a Windows To Go bootable device. In this video; Jay Ferron demonstrates how to use the Windows built-in wizard to create a Windows To Go USB drive stick.
-
Changing Settings in Virtual Hyper-V Computers
Microsoft Windows 8's Hyper-V Manager enables you to set up and configure all aspects of your virtual machine (VM). In this video; Jay Ferron demonstrates how to use the Hyper-V Manager to configure memory; processors and virtual devices; alter network settings; add COM ports; and enable Integration Services.
-
Computer Management
Microsoft Windows 8's Computer Management snap-in enables you to monitor; manage; and configure local or remote computers; system events; and hardware by providing access to Task Scheduler; Event Viewer; Performance Monitor; Services; and other tools. In this video; Jay Ferron uses the Computer Management's Shared Folders to monitor and manage active shares; sessions; and open folders.
-
Configure IP Address
In Microsoft Windows 8; IP addresses can be configured dynamically using Dynamic Host Control Protocol (DHCP) or configured manually as a static IP address. In this video; Jay Ferron demonstrates how to configure an IP address as either static or dynamic before using Command Prompt to identify whether static or dynamic IP addresses are configured.
-
Configuring a New Windows 8 Computer
Microsoft Windows 8 enables you to register and personalize your Windows 8 installation quickly and easily before initiating Setup. It leads you through naming; personalizing; and registering your computer and allows you to choose your account integration options; before introducing its usability features. In this video; Jay Ferron explains the Windows 8 registration; account; and usability options available to you.
-
Customizing the Taskbar
In Microsoft Windows 8; users can customize the Taskbar by choosing to show or hide some of the Taskbar icons. In this video; Jay Ferron demonstrates how to hide or display the Network system icon; and how to hide the Action Center and Power system icons on the Windows 8 Taskbar.
-
Deleting Search Histories
Microsoft Windows 8 enables users to remove their Search histories so that the history of what has been done on the computer is deleted. In this video; Jay Ferron demonstrates how to delete your Search history from a Windows 8 computer.
-
Disc Management
Microsoft Windows 8's Computer Management Console's Disk Management feature allows you to configure; manage; format; add; or delete your computer's dynamic; GPT; and basic disk drives. In this video; Jay Ferron uses the New Simple Volume Wizard to format a drive.
-
Disc Optimizer
Microsoft Windows 8's Defragment and Optimize Drives tool automatically defragments and optimizes your computer's drives. In this video; Jay Ferron demonstrates how to analyze and defragment select drives immediately and schedule Windows to defragment drives.
-
Edit and Managing Discs in Hyper-V
Microsoft Windows 8 Hyper-V's Edit Virtual Hark Disk Wizard enables you to locate and configure your virtual machine's (VM) virtual disks. In this video; Jay Ferron uses the Edit Virtual Hark Disk Wizard to locate and compact a VM's virtual hard disk.
-
Event Viewer
Microsoft Windows 8's Event Viewer enables you to see what’s happening on your computer. It allows you to view current and logged events; investigate warnings and errors; and configure your log file properties. In this video; Jay Ferron locates issues; assesses warnings and errors; reviews events; and configures and attaches a task to a log.
-
Exporting a Hyper-V Machine
Microsoft Windows 8's Hyper-V Manager enables you to package and export a virtual machine (VM) from a workstation to a server or vice versa. In this video; Jay Ferron uses the Windows 8 Hyper-V Manager to shut down; package; and export a virtual machine (VM) and its settings to another machine; before deleting the VM's files from the local machine.
-
Group Policies
Microsoft Windows 8.1 provides users with the ability to configure group policies at the domain level or at OU level; to push the policies to other computers in the organization. In this video; Jay Ferron demonstrates how to configure computer and user policies; and use administrative templates.
-
Hyper-V Global Settings
Microsoft Windows 8 Hyper-V incorporates Windows Server 2012 capabilities; enabling you to build and host a virtual machine (VM). In this video; Jay Ferron uses the Windows 8 Hyper-V Manager to save and set up a VM’s virtual hard disks and configuration files; enable NUMA spanning and Storage Migrations; and configure keyboard and mouse functions and options.
-
Hyper-V Virtual SAN
In addition to iSCSI and storage area connections; Microsoft Windows 8 Hyper-V's Virtual Storage Area Network (SAN) Manager enables you to create a Virtual SAN fiber connection on your client's virtual machine (VM). In this video; Jay Ferron uses Windows 8 Hyper-V's Virtual SAN Manager to create a Virtual SAN fiber channel connection on a VM.
-
IE and Touch
Microsoft Windows 8 provides users with various modes of input; including pointer devices; a keyboard; and touch. In this video; Jay Ferron demonstrates how to use touch to interact with Internet Explorer.
-
Importing a Virtual Machine into Hyper-V
The Windows 8 Hyper-V Manager's Import Virtual Machine Wizard enables you to import a virtual machine (VM) from an external machine or storage media. In this video; Jay Ferron uses the Windows 8 Hyper-V Manager import a VM into a local machine.
-
Ink
Microsoft Windows 8 provides users with various modes of input; including pointer devices; a keyboard; touch; and Ink. In this video; Jay Ferron demonstrates how to access and use the Ink feature.
-
Installing a Virtual Computer
The Windows 8 Hyper-V Manager's New Virtual Machine Wizard enables you to create a virtual machine (VM) running Windows 8 on your client. In this video; Jay Ferron uses the New Virtual Machine Wizard to assign memory to a VM; configure its network and virtual drive settings; and then install Windows 8.
-
Internet Browser Security
Microsoft Windows 8 allows users to configure security settings in a browser. In this video; Jay Ferron demonstrates how to configure browser history settings; prevent location awareness information from being communicated; configure custom security levels; and disable third-party cookies.
-
Join to Domain
To ensure that your Microsoft Windows 8 computer forms part of a centrally administered unit sharing a common security policy and set of rules; it is necessary to join the computer to a domain. In this video; Jay Ferron uses the System Properties dialog box in Windows 8 to change the membership of a computer from workgroup to domain.
-
Managing the Start Menu
Microsoft Windows 8's Start menu uses customized and grouped live tiles; updated in real time; to display your favorite applications; be they for work; entertainment; computer maintenance or social networking; right on your Desktop. In this video; Jay Ferron organizes his Start menu into named groups containing his most-used applications and introduces useful shortcut keys and Start screen functionalities.
-
Messaging
Microsoft Windows 8's built-in Messaging application allows you to chat with contacts – listed through Facebook; Microsoft Skype; or by invitation – in real-time through the Microsoft Windows Live system. In this video; Jay Ferron logs on to the Windows Live system and imports friends from his Facebook account into the Windows 8 People application.
-
Multiple Monitors
Microsoft Windows 8 has made it easier to work with multiple monitors by introducing the Second screen menu that you invoke through the charms. In this video; Jay Ferron discusses the four different options available in the Second screen menu.
-
New Internet Browser Modern Interface
The new Modern Internet Explorer in Microsoft Windows 8 includes the chromeless interface and new navigation and menu features that are designed to optimize screen space. In this video; Jay Ferron introduces the new Modern browser interface and demonstrates how to use some of the new features.
-
Print Management
Microsoft Windows 8's Print Management console enables you to configure; optimize; manage; and monitor your local or server-based printing subsystem. In this video; Jay Ferron uses the Print Management console to review a network's printers and drivers; and add and configure a TCP/IP printer port for a printer.
-
Removing Applications
Microsoft Windows 8 allows you to uninstall programs you no longer need by selecting and uninstalling them from the Control Panel. More easily; you can unpin or uninstall them by selecting their tiles on the Start menu or following a Search. In this video; Jay Ferron removes a Store app directly from the Start menu using the Uninstall feature.
-
Removing Passwords
Microsoft Windows 8 allows you to protect your computer using a password; but this password can easily be removed to allow other users access to a local machine using a local account. In this video; Jay Ferron demonstrates how to remove password protection on a Windows 8 computer; as long as the account isn't linked to Microsoft Online Services.
-
Services
Microsoft Windows 8's Services snap-in allows you to monitor and manage local; network; and system services essential to your system's operation. In this video; Jay Ferron demonstrates how to manage a local service by accessing its properties and disabling it.
-
Snapshots in Hyper-V
Hyper-V in Microsoft Windows 8 allows you to take snapshots of a virtual machine that can be used after making changes in a test or development environment to revert back to a previous state of the virtual machine. In this video; Jay Ferron demonstrates how snapshots are created and applied using Hyper-V Manager in a Windows 8 virtual machine environment.
-
Split Screen or Two Apps at Once
Microsoft Windows 8 includes the new split screen feature that allows you to create a dual workspace whereby two apps can be seen at the same time by snapping them into view. In this video; Jay Ferron demonstrates how to use the split-screening capabilities in Windows 8 to show two applications running at the same time.
-
Switching and Closing Apps Using Windows Modern Interface
Microsoft Windows 8 provides a Modern interface that users can navigate with a keyboard and mouse as easily as they can navigate the classic Windows interface. In this video; Jay Ferron demonstrates how to open; switch between; and close applications in the Windows 8 Modern; tile-based interface.
-
Task Scheduler
Microsoft Windows 8's Task Scheduler console enables you to schedule predefined tasks in the Task Scheduler Library; as well as configure basic tasks using the Create Basic Task Wizard. In this video; Jay Ferron details the content of the Task Scheduler Library; and creates; configures; and tests a basic task.
-
The Finance Application
Microsoft Windows 8's built-in Finance application offers a single-source repository of financial industry news; videos; and interactive charts to inform you of real-time global market indicators; stocks; bills; bonds; currency and commodity prices; as well as savings; credit card and other rates. In this video; Jay Ferron introduces the Finance application's financial news indicators as well as its personalization bar.
-
The Microsoft Store
Microsoft Windows 8's Store offers multiple built-in and countless free or inexpensive instantly-downloadable; constantly-updated; easily-configured; searchable applications from games through tools and health to social; in myriad ranked categories. In this video; Jay Ferron updates existing built-in applications and downloads; and installs and activates the Microsoft Solitaire Collection.
-
The Music Application
Microsoft Windows 8's built-in Music application allows you to play your current music collection; choose streaming songs and albums from countless artists on Xbox music; and add to your music library. In this video; Jay Ferron creates an Xbox profile and demonstrates how to set up a free playlist of your favorite artist.
-
The News Application
Microsoft Windows 8's News application offers multiple international; national; and regional news categories enhanced by search capabilities; select sources; personalized topics; and top videos; delivered to your Desktop for instant access. In this video; Jay Ferron customizes the News application's live tile and browses news categories and sources.
-
The Sports Application
Microsoft Windows 8's in-built; customizable Sports app enhanced by high-resolution multimedia allows you to browse top headlines; scores; schedules; standings; and statistics across all major sports; locally and internationally – letting you track your chosen leagues; teams; and players. In this video; Jay Ferron browses stories; videos; and slide shows; adds his favorite team; and views team standings and player averages.
-
The System Information Tool
Microsoft Windows 8's System Information Tool provides a comprehensive summary and allows you to gather; from its Hardware Resources; Components; and Software Environment sub-categories; all the information you need to troubleshoot your computer without opening it up. In this video; Jay Ferron demonstrates how to use the System Information Tool to gather information about your computer.
-
Touch
Microsoft Windows 8 provides users with various modes of input; including pointer devices; a keyboard; and touch. In this video; Jay Ferron demonstrates how to resize tiles; scroll through tiles; view running applications; and manage the computer using touch.
-
Updating Store Applications
Store Update feature alerts you to pending updates on your Start menu's Store tile and allows you to consider; select; and download updates from its main page. In this video; Jay Ferron demonstrates how to selects multiple updates and downloads; and install an application update.
-
Virtual Switch Config Hyper-V
The Hyper-V Virtual Switch feature in Microsoft Windows 8 allows you to configure security and isolation options that provide you with network control when connecting virtual machines to a physical network. In this video; Jay Ferron demonstrates how to use the Hyper-V Virtual Switch Manager to create external; internal; and private virtual switches.
-
Working with Password Policies
Microsoft Windows 8's Security Settings snap-in enables you to control Account Policies; the most important of which are Local Password Policies. Passwords need to be enabled for users and; thereafter; configured to ensure system integrity. In this video; Jay Ferron demonstrates how to configure a password that needs to be changed periodically.
-
Working with the Map Application
Microsoft Windows 8's built-in Maps application pinpoints your location; shows real-time; color-coded traffic flows; allows you to pan; rotate; and zoom; and lets you Search for directions to places and people you can pin in Aerial; Road; and Bird's Eye view. In this video; Jay Ferron explores New York City traffic flows before exploring Colorado Springs in Aerial view.
-
Working with Users and Groups
Microsoft Windows 8 allows you to use both the Control Panel and Computer Management console to manage user accounts and configure their properties; including password requirements; group memberships; account names; and profiles. In this video; uses the Computer Management console to configure user and group accounts.
-
Configuring System Center 2012 R2 Configuration Manager Remote Tools Security
After watching this video; you will be able to secure remote control in System Center 2012 R2 Configuration Manager.
-
Configuring System Center 2012 R2 Configuration Manager Site Backup
After watching this video; you will be able to back up a System Center 2012 R2 Configuration Manager site.
-
Configuring System Center Configuration Manager Client Default Settings
After watching this video; you will be able to configure System Center 2012 R2 Configuration Manager client default settings.
-
Configuring System Center Configuration Manager Client Status Settings
After watching this video; you will be able to configure client status settings in System Center 2012 R2 Configuration Manager.
-
Configuring System Center Configuration Manager Content Distribution
After watching this video; you will be able to distribute content using content distribution point in System Center 2012 R2 Configuration Manager.
-
Configuring System Center Configuration Manager Content Prestaging
After watching this video; you will be able to prestage content on a System Center 2012 R2 Configuration Manager distribution point.
-
Configuring System Center Configuration Manager Distribution Point Groups
After watching this video; you will be able to Configure System Center 2012 R2 Configuration Manager distribution point groups.
-
Configuring System Center Configuration Manager Power Management Plans
After watching this video; you will be able to configure System Center 2012 R2 Configuration Manager power management plan settings.
-
Configuring the Client for Application Management
After watching this video; you will be able to configure the System Center 2012 R2 Configuration Manager client for application management.
-
Configuring the SCCM Endpoint Protection Point Role
After watching this video; you will be able to configure the Endpoint Protection site system role in System Center 2012 R2 Configuration Manager.
-
Configuring the System Center Configuration Manager Exchange Server Connector
After watching this video; you will be able to configure the System Center 2012 R2 Configuration Manager Exchange Connector.
-
Configuring Windows Intune and SCCM Integration
After watching this video; you will be able to configure System Center 2012 R2 Configuration Manager integration with Windows Intune.
-
Controlling and Automating the Setup Process
After watching this video; you will be able to describe how to control and automate the Windows setup process using answer files and the configuration process.
-
Creating a Configuration Item in System Center 2012 R2 Configuration Manager
After watching this video; you will be able to create a configuration item in System Center 2012 R2 Configuration Manager.
-
Creating a DCP for Deployment to Windows 8.1
After watching this video; you will be able to create and deploy a DCP to Windows 8.1 clients to collect inventory.
-
Creating a Deployment Task Sequence
After watching this video; you will be able to create a task sequence that will deploy Windows 8.1 to production computers and edit the task sequence to specific custom settings.
-
Creating a Mobile App in System Center 2012 R2 Configuration Manager
After watching this video; you will be able to create a mobile app for deployment in System Center 2012 R2 Configuration Manager.
-
Creating a SCCM Task Sequence to Deploy an Image
After watching this video; you will be able to create a task sequence that will be used to deploy an existing image using the Create Task Sequence Wizard.
-
Creating a System Center 2012 R2 Configuration Manager Application
After watching this video; you will be able to create an application for management in System Center 2012 R2 Configuration Manager.
-
Creating a System Center 2012 R2 Configuration Manager Application Deployment Type
After watching this video; you will be able to contrast the System Center 2012 R2 Configuration Manager application deployment types.
-
Creating a System Center Configuration Manager Collection Maintenance Window
After watching this video; you will be able to create a collection maintenance window in System Center 2012 R2 Configuration Manager.
-
Creating a System Center Configuration Manager Device Collection
After watching this video; you will be able to create a device collection in System Center 2012 R2 Configuration Manager.
-
Creating a System Center Configuration Manager Security Scope
After watching this video; you will be able to configure a System Center 2012 R2 Configuration Manager role-based administration scope.
-
Creating a System Center Configuration Manager User Collection
After watching this video; you will be able to create a user collection in System Center 2012 R2 Configuration Manager.
-
Creating a Task Sequence to Capture an Image Part 1
After watching this video; you will be able to create a task sequence to build a Windows 8.1 reference computer.
-
Creating a Task Sequence to Capture an Image Part 2
After watching this video; you will be able to create a task sequence to build a Windows 8.1 reference computer.
-
Creating a User Data and Profiles Configuration Item in SCCM
After watching this video; you will be able to create a User Data and Profiles configuration item in System Center 2012 R2 Configuration Manager.
-
Creating an MDT Task Sequence in SCCM Part 1
After watching this video; you will be able to create an MDT task sequence in SCCM.
-
Creating an MDT Task Sequence in SCCM Part 2
After watching this video; you will be able to create an MDT task sequence in SCCM; including deploying it.
-
Creating an SCCM Application Management Condition and Requirement
After watching this video; you will be able to create a global condition and use it to create a requirement in System Center 2012 R2 Configuration Manager.
-
Creating and Importing an MDT LTI Boot Image into WDS
After watching this video; you will be able to create and import an MDT LTI boot image into WDS.
-
Creating Automatic Deployment Rules in System Center Configuration Manager
After watching this video; you will be able to create rules for automatic deployment in System Center 2012 R2 Configuration Manager.
-
Creating Custom System Center Configuration Manager Client Settings
After watching this video; you will be able to create System Center 2012 R2 Configuration Manager Client custom settings.
-
Creating Custom.xml and Config.xml Files
After watching this video; you will be able to create custom.xml files and config.xml files for user state migration.
-
Creating SCCM Endpoint Protection Antimalware Policies
After watching this video; you will be able to create antimalware policies in System Center 2012 R2 Configuration Manager Endpoint Protection.
-
Creating SCCM Windows Firewall Policies
After watching this video; you will be able to create Windows firewall policies in System Center 2012 R2 Configuration Manager.
-
Creating Software Update Groups in System Center Configuration Manager
After watching this video; you will be able to create software update groups in System Center 2012 R2 Configuration Manager.
-
Customizing an Image Using Sysprep
After watching this video; you will be able to place a reference computer in audit mode using Sysprep; make configuration changes; and capture the settings and preserve the image.
-
Customizing the Asset Intelligence Catalog
After watching this video; you will be able to customize the System Center 2012 R2 Configuration Manager Asset Intelligence catalog.
-
Deploy C2R for Office 365 Using the Office Deployment Tool
After watching this video; you will be able to deploy C2R for Office 365 products using the Office Deployment Tool.
-
Deploying a Configuration Baseline in System Center Configuration Manager
After watching this video; you will be able to deploy a configuration baseline in System Center 2012 R2 Configuration Manager.
-
Deploying a Mobile App in System Center 2012 R2 Configuration Manager
After watching this video; you will be able to deploy a mobile app in System Center 2012 R2 Configuration Manager.
-
Deploying a SCCM Task Sequence for OS Deployment
After watching this video; you will be able to deploy an image task sequence to a collection using the Deploy Software Wizard using PXE.
-
Deploying a System Center 2012 R2 Configuration Manager Application
After watching this video; you will be able to deploy a System Center 2012 R2 Configuration Manager application.
-
Deploying a Windows Store App in System Center 2012 R2 Configuration Manager
After watching this video; you will be able to sideload a Windows Store app in System Center 2012 R2 Configuration Manager.
-
Deploying an App-V App in System Center 2012 R2 Configuration Manager
After watching this video; you will be able to deploy an App-V app in System Center 2012 R2 Configuration Manager.
-
Deploying Office 2013 using MDT with a LTI
After watching this video; you will be able to add Office to an image for deployment through MDT for a LTI.
-
Deploying Software Updates in System Center 2012 R2 Configuration Manager
After watching this video; you will be able to deploy software updates in System Center 2012 R2 Configuration Manager.
-
Deploying the Windows 8.1 Client Image
After watching this video; you will be able to deploy Windows 8.1 to production clients using MDT LTI.
-
Deploying VHDs Using WDS
After watching this video; you will be able to explain how to deploy VHD using WDS.
-
Deployment Methods for Office 2013
After watching this video; you will be able to describe the six deployment methods for Office 2013 installations: local; network; Group Policy; software distribution; virtualization and standard image.
-
Determining Software Update Compliance in System Center 2012 R2 Configuration Manager
After watching this video; you will be able to determine software update compliance in System Center 2012 R2 Configuration Manager.
-
Determining What User State to Migrate
After watching this video; you will be able to identify what user state should be migrated; including what cannot be migrated.
-
Device Management in System Center 2012 R2 Configuration Manager
After watching this video; you will be able to describe device management in System Center 2012 R2 Configuration Manager and list the requirements.
-
Device Management Tasks in System Center 2012 R2 Configuration Manager
After watching this video; you will be able to list the tasks associated with device management in System Center 2012 R2 Configuration Manager.
-
Diagnosing Compatibility Issues With ACT
After watching this video; you will be able to describe the process for diagnosing application compatibility issues with ACT.
-
Distributing an OS Image
After watching this video; you will be able to configure the OS image for distribution using the Distribute Content Wizard.
-
Enabling PXE and Multicast on a Distribution Point
After watching this video; you will be able to enable PXE and multicast on a distribution point in SCCM.
-
Enabling SCCM Integration With MDT Part 1
After watching this video; you will be able to run the ConfigMgr Integration after MDT is installed and set up the Deployment Workbench for monitoring.
-
Enabling SCCM Integration with MDT Part 2
After watching this video; you will be able to configure a new database in MDT and verify the integrated in SCCM.
-
Evaluating the Infrastructure for Volume Activations
After watching this video; you will be able to identify the type of activate that maybe required depending on the type of infrastructure implemented: core; isolated; disconnected; development labs.
-
Exploring the System Center Configuration Manager Console
After watching this video; you will be able to use the System Center 2012 R2 Configuration Manager console and recognize the use of each of the panes.
-
Identifying Additional Deployments Tools after MDT Integration
After watching this video; you will be able to describe the additional deployments tools available when MDT is integrated with SCCM.
-
Identifying an Effective Deployment Strategy
After watching this video; you will be able to identify the guidelines for creating an effective OS deployment strategy.
-
Identifying Deployment Strategies for an Enterprise
After watching this video; you will be able to describe the different types of deployment strategies that are typically used in an enterprise environment.
-
Identifying How Drivers are Managed in an Image
After watching this video; you will be able to describe how drivers can be added and managed in an image.
-
Identifying Image Management Strategies
After watching this video; you will be able to describe the three primary strategies used for image creation: thick; thin; hybrid.
-
Identifying the Considerations for Managing OS Images
After watching this video; you will be able to identify the considerations required for managing operating system images.
-
Identifying the Migration Stores for User State
After watching this video; you will be able to identify the different migration stores and how to choose between them.
-
Identifying the OS Deployment Scenarios Used in SCCM
After watching this video; you will be able to explain the three deployment scenarios; the various methods used to initiate deployment; and the server roles used.
-
Identifying the Prerequisites for an MDT LTI Deployment
After watching this video; you will be able to identify the prerequisites for using MDT for an LTI and what deployments share and task sequence are.
-
Identifying the Prerequisites for OS Deployment
After watching this video; you will be able to explain the prerequisites for deploying OS using SCCM.
-
Identifying the Tools for Assessing the Environment
After watching this video; you will be able to describe the different tools available to assess the environment.
-
Identifying the Tools Used for Managing Activation
After watching this video; you will be able to describe VAMT and Volume Activation Services; including the benefits and features.
-
Initiating a System Center 2012 R2 Configuration Manager Inventory Cycle
After watching this video; you will be able to initiate a System Center 2012 R2 Configuration Manager inventory cycle.
-
Installing a Reference Computer Using an Answer File
After watching this video; you will be able to install a reference computer using a custom answer file and verify the settings were applied.
-
Installing a System Center Configuration Manager Content Distribution Point
After watching this video; you will be able to install a System Center 2012 R2 Configuration Manager content distribution point.
-
Installing and Configuring WDS
After watching this video; you will be able to install and configure the WDS environment.
-
Installing and Configuring WDS Part 2
After watching this video; you will be able to install and configure the WDS environment.
-
Installing the Software Update Point in System Center Configuration Manager
After watching this video; you will be able to install the software update point in System Center 2012 R2 Configuration Manager.
-
Installing Windows Assessment and Deployment Toolkit
After watching this video; you will be able to install Windows Assessment and Deployment Toolkit to access ACT.
-
Integrate MAP with SCCM
After watching this video; you will be able to integrate MAP with SCCM to gather inventory information.
-
Integrating Language Packs into the Deployment Process
After watching this video; you will be able to describe how language packs are used and how to add language packs.
-
Integrating MDT into a Deployment Process
After watching this video; you will be able to explain strategies for integrating MDT into a deployment process for LTI.
-
Maintaining a System Center 2012 R2 Configuration Manager Site
After watching this video; you will be able to perform System Center 2012 R2 Configuration Manager site maintenance.
-
Maintaining and Servicing Image Strategies
After watching this video; you will be able to describe online and offline servicing.
-
Maintaining Updates for System Images
After watching this video; you will be able to apply updates to images in SCCM and identify the process the site server executes to update the image.
-
Managing Application in System Center 2012 R2 Configuration Manager
After watching this video; you will be able to revise; retire; and uninstall an application in System Center 2012 R2 Configuration Manager.
-
Managing App-V Apps in System Center 2012 R2 Configuration Manager
After watching this video; you will be able to manage an App-V app in System Center 2012 R2 Configuration Manager.
-
Managing Components with System Center Configuration Manager Service Manager
After watching this video; you will be able to manage components with System Center 2012 R2 Configuration Manager Service Manager.
-
Managing Desktops with System Center Configuration Manager Remote Control
After watching this video; you will be able to manage desktops remotely using remote control in System Center 2012 R2 Configuration Manager.
-
Minimizing Impact of User State During OS Deployment
After watching this video; you will be able to describe how to minimize the impact to the user state during OS deployment using various methods.
-
Mobile App Support in System Center 2012 R2 Configuration Manager
After watching this video; you will be able to describe mobile app support in System Center 2012 R2 Configuration Manager.
-
Monitoring a System Center Configuration Manager Collection
After watching this video; you will be able to monitor a collection in System Center 2012 R2 Configuration Manager.
-
Monitoring App-V Apps in System Center 2012 R2 Configuration Manager
After watching this video; you will be able to monitor an App-V app in System Center 2012 R2 Configuration Manager.
-
Monitoring SCCM Clients with the Client Health Evaluator
After watching this video; you will be able to monitor clients in the System Center 2012 R2 Configuration Manager client health evaluator.
-
Monitoring System Center 2012 R2 Configuration Manager Application Deployment
After watching this video; you will be able to monitor application deployment in System Center 2012 R2 Configuration Manager.
-
Monitoring System Center Configuration Manager Client Health Using Reports
After watching this video; you will be able to monitor System Center 2012 R2 Configuration Manager client health using reports.
-
Monitoring System Center Configuration Manager Content Distribution
After watching this video; you will be able to monitor content distribution content status in System Center 2012 R2 Configuration Manager.
-
Monitoring System Center Configuration Manager Distribution Points
After watching this video; you will be able to monitor a System Center 2012 R2 Configuration Manager distribution point.
-
Monitoring System Center Configuration Manager Endpoint Protection Status
After watching this video; you will be able to monitor the status of System Center 2012 R2 Configuration Manager Endpoint Protection.
-
Monitoring Usage Using the Telemetry Dashboard
After watching this video; you will be able to monitor the usage for Office 365 using the Telemetry Dashboard.
-
Office 2013 64 Bit Versus 32 Bit
After watching this video; you will be able to describe the advantages; disadvantages; and compatibility issues of Office 2013 64 bit versus 32 bit.
-
Operations; Support; and Upgrade Phases
After watching this video; you will be able to describe the operation; support; upgrade; and retirement phases.
-
Organizing Objects in the System Center Configuration Manager Console
After watching this video; you will be able to create and organize objects in the System Center 2012 R2 Configuration Manager console.
-
Overview of App-V in System Center 2012 R2 Configuration Manager
After watching this video; you will be able to describe virtual application deployment in System Center 2012 R2 Configuration Manager.
-
Performing an Offline Migration
After watching this video; you will be able to perform an offline user state migrations.
-
Planning an MDT Image Strategy
After watching this video; you will be able to identify the consideration factors for planning the MDT imaging strategy.
-
Planning Office Volume Activation
After watching this video; you will be able to explain how Office 2013 can be activated using the various methods.
-
Prepare for Asset Intelligence
After watching this video; you will be able to prepare for System Center 2012 R2 Configuration Manager Asset Intelligence.
-
Preparing a Windows Store App for Sideloading in SCCM
After watching this video; you will be able to prepare a sideload Windows Store app in System Center 2012 R2 Configuration Manager.
-
Preparing an Installation Using Sysprep
After watching this video; you will be able to describe how Sysprep is used to prepare for a Windows installation including its benefits; scenarios; and its process.
-
Preparing the Environment to Use MAP
After watching this video; you will be able to configure the clients and servers for MAP to connect and collect inventory information.
-
Providing Access to Company Resources From Mobile Using SCCM
After watching this video; you will be able to provide access to company resources from mobile devices in System Center 2012 R2 Configuration Manager.
-
Querying Objects and Attributes in System Center Configuration Manager
After watching this video; you will be able to construct queries by object type in System Center 2012 R2 Configuration Manager.
-
Re-Arming Office 2013
After watching this video; you will be able to explain what rearming is and how to complete it.
-
Recovering a System Center 2012 R2 Configuration Manager Primary Site
After watching this video; you will be able to describe the System Center 2012 R2 Configuration Manager primary site recovery process.
-
Resolving Compatibility Issues with ACT
After watching this video; you will be able to describe using ACT to resolve application compatibility issues.
-
Resolving Compatibility Issues with Client Hyper-V
After watching this video; you will be able to describe using Client Hyper-V to resolve application compatibility issues.
-
Resolving Compatibility Issues with RDS and VDI
After watching this video; you will be able to describe using RDS and VDI to resolve application compatibility issues.
-
Retrieving System Center Configuration Manager Information with PowerShell
After watching this video; you will be able to use PowerShell to retrieve information about a System Center 2012 R2 Configuration Manager deployment.
-
Reviewing the MAP Reports
After watching this video; you will be able to open and view the MAP reports to view readiness information.
-
Role-Based Security in System Center Configuration Manager
After watching this video; you will be able to describe role-based security in System Center 2012 R2 Configuration Manager.
-
Scanning System Center 2012 R2 Configuration Manager Clients for Compliance
After watching this video; you will be able to describe the process for scanning System Center 2012 R2 Configuration Manager clients for compliance.
-
SCCM Application Management Detection Method and Dependencies
After watching this video; you will be able to describe how to create detection methods and dependencies in System Center 2012 R2 Configuration Manager.
-
SCCM Application Management Device Affinity
After watching this video; you will be able to describe user device affinity in System Center 2012 R2 Configuration Manager.
-
SCCM Endpoint Protection Implementation Process
After watching this video; you will be able to describe the prerequisites and process for implementing Endpoint Protection in System Center 2012 R2 Configuration Manager.
-
SCCM Hardware Inventory Collection Process
After watching this video; you will be able to describe the hardware inventory collection process using System Center 2012 R2 Configuration Manager.
-
SCCM Inventory Collection Security Considerations
After watching this video; you will be able to describe security considerations for System Center 2012 R2 Configuration Manager inventory collection.
-
SCCM Power Management Benefits and Prerequisites
After watching this video; you will be able to describe the benefits of power management configuration in System Center 2012 R2 Configuration Manager and the prerequisites for implementing this feature.
-
SCCM Software Inventory Collection Process
After watching this video; you will be able to describe the System Center 2012 R2 Configuration Manager software inventory collection process.
-
SCCM Software Metering Maintenance Tasks
After watching this video; you will be able to describe System Center 2012 R2 Configuration Manager software metering maintenance tasks.
-
Searching Objects in the System Center Configuration Manager Console
After watching this video; you will be able to search for objects in the System Center 2012 R2 Configuration Manager console.
-
Sequencing an App-V App in System Center 2012 R2 Configuration Manager
After watching this video; you will be able to sequence an App-V app in System Center 2012 R2 Configuration Manager.
-
Servicing an Image using DISM Part 1
After watching this video; you will be able to service an image using DISM including checking patches and adding packages; enabling features; and adding drivers.
-
Servicing an Image using DISM Part 2
After watching this video; you will be able to service an image using DISM including checking patches and adding packages; enabling features; and adding drivers.
-
Slipstreaming Updates into the Office 2013 Deployment
After watching this video; you will be able to slipstream updates in the Office 2013 deployment.
-
Software Update Point in System Center 2012 R2 Configuration Manager
After watching this video; you will be able to describe the software update point site system role in System Center 2012 R2 Configuration Manager.
-
Software Updates Deployment Process in System Center Configuration Manager
After watching this video; you will be able to describe the deployment process for software updates in System Center 2012 R2 Configuration Manager.
-
Software Updates in System Center 2012 R2 Configuration Manager
After watching this video; you will be able to describe the software updates feature in System Center 2012 R2 Configuration Manager.
-
Software Updates Prerequisites in System Center 2012 R2 Configuration Manager
After watching this video; you will be able to describe prerequisites for using software updates in System Center 2012 R2 Configuration Manager.
-
Supporting System Center Configuration Manager Linux Clients
After watching this video; you will be able to configure System Center 2012 R2 Configuration Manager to support Linux clients.
-
Supporting System Center Configuration Manager Mac OS X Clients
After watching this video; you will be able to configure System Center 2012 R2 Configuration Manager to support Apple Mac OS X clients.
-
Supporting System Center Configuration Manager Workgroup and Internet Clients
After watching this video; you will be able to describe the requirements for supporting System Center 2012 R2 Configuration Manager Clients not on the Active Directory Domain Services.
-
Synchronizing Catalog Metadata in System Center 2012 R2 Configuration Manager
After watching this video; you will be able to describe how software update catalog metadata is synchronized in System Center 2012 R2 Configuration Manager.
-
System Center 2012 R2 Configuration Manager Application Catalog Installation
After watching this video; you will be able to install the System Center 2012 R2 Configuration Manager Application Catalog.
-
System Center 2012 R2 Configuration Manager Application Management Features
After watching this video; you will be able to describe application management features in System Center 2012 R2 Configuration Manager.
-
System Center 2012 R2 Configuration Manager App-V Delivery Methods
After watching this video; you will be able to describe App-V delivery methods in System Center 2012 R2 Configuration Manager.
-
System Center 2012 R2 Configuration Manager Backup and Recovery Overview
After watching this video; you will be able to describe the backup and recovery processes in System Center 2012 R2 Configuration Manager.
-
System Center 2012 R2 Configuration Manager Client Status Overview
After watching this video; you will be able to describe the client status feature of System Center 2012 R2 Configuration Manager.
-
System Center 2012 R2 Configuration Manager Collecting Hardware Inventory
After watching this video; you will be able to collect hardware inventory with System Center 2012 R2 Configuration Manager.
-
System Center 2012 R2 Configuration Manager Compliance Settings Process
After watching this video; you will be able to list the steps in configuring compliance settings in System Center 2012 R2 Configuration Manager.
-
System Center 2012 R2 Configuration Manager Endpoint Protection Overview
After watching this video; you will be able to describe Endpoint Protection in System Center 2012 R2 Configuration Manager.
-
System Center 2012 R2 Configuration Manager Inventory Collection Overview
After watching this video; you will be able to describe inventory collection with System Center 2012 R2 Configuration Manager and Windows Intune; and recognize considerations for managing corporate devices and personal-owned devices.
-
System Center 2012 R2 Configuration Manager Inventory Collection Process
After watching this video; you will be able to identify the management tasks that use inventory data; and describe the inventory collection process with System Center 2012 R2 Configuration Manager.
-
System Center 2012 R2 Configuration Manager Remote Administration Options
After watching this video; you will be able to describe options for remote administration of client machines using System Center 2012 R2 Configuration Manager.
-
System Center 2012 R2 Configuration Manager Site Maintenance Plans
After watching this video; you will be able to describe the purpose of a System Center 2012 R2 Configuration Manager site maintenance plan.
-
System Center 2012 R2 Configuration Manager Site Maintenance Tasks
After watching this video; you will be able to describe System Center 2012 R2 Configuration Manager site maintenance tasks.
-
System Center 2012 R2 Configuration Manager Site Recovery Overview
After watching this video; you will be able to perform site recovery in System Center 2012 R2 Configuration Manager.
-
System Center 2012 R2 Configuration Manager Software Inventory File Types
After watching this video; you will be able to configure software inventory file types in System Center 2012 R2 Configuration Manager.
-
System Center 2012 R2 Configuration Manager Software Metering Overview
After watching this video; you will be able to describe software metering in System Center 2012 R2 Configuration Manager.
-
System Center Configuration Manager AD Forest Discovery
After watching this video; you will be able to describe the methods of subnet and site discovery using AD available in System Center 2012 R2 Configuration Manager.
-
System Center Configuration Manager Application Management Global Conditions
After watching this video; you will be able to describe global conditions in System Center 2012 R2 Configuration Manager.
-
System Center Configuration Manager Application Management Requirements
After watching this video; you will be able to describe System Center Configuration Manager application management requirements.
-
System Center Configuration Manager Application Management Server Roles
After watching this video; you will be able to describe the server roles used for application management in System Center 2012 R2 Configuration Manager.
-
System Center Configuration Manager Application Management User Experience
After watching this video; you will be able to describe user experience in System Center 2012 R2 Configuration Manager.
-
System Center Configuration Manager Boundaries and Boundary Groups
After watching this video; you will be able to describe boundaries and boundary groups used in site assignment in System Center 2012 R2 Configuration Manager.
-
System Center Configuration Manager Client Deployment AD Process
After watching this video; you will be able to describe System Center 2012 R2 Configuration Manager client deployment with and without AD.
-
System Center Configuration Manager Client Deployment Site Systems
After watching this video; you will be able to list the site systems used in System Center 2012 R2 Configuration Manager client deployment.
-
System Center Configuration Manager Client Installation on Mac and Linux
After watching this video; you will be able to install the System Center 2012 R2 client on Mac OS X and Linux client PCs.
-
System Center Configuration Manager Client Installation on Windows
After watching this video; you will be able to install the System Center 2012 R2 Configuration Manager client on Windows client PCs and verify installation.
-
System Center Configuration Manager Client Overview
After watching this video; you will be able to navigate the System Center 2012 R2 Configuration Manager Client configuration settings.
-
System Center Configuration Manager Client Policy
After watching this video; you will be able to describe the client policy retrieval process for System Center 2012 R2 Configuration Manager client policies.
-
System Center Configuration Manager Client Push Installation
After watching this video; you will be able to perform a push installation of the System Center 2012 R2 Configuration Manager client.
-
System Center Configuration Manager Client Requirements
After watching this video; you will be able to describe the system requirements for the System Center 2012 R2 Configuration Manager Client.
-
System Center Configuration Manager Configuring AD Discovery
After watching this video; you will be able to configure System Center 2012 R2 Configuration Manager resource discovery using AD methods.
-
System Center Configuration Manager Configuring Heartbeat Discovery
After watching this video; you will be able to configure System Center 2012 R2 Configuration Manager resource discovery using heartbeat methods.
-
System Center Configuration Manager Configuring Network Discovery
After watching this video; you will be able to configure System Center 2012 R2 Configuration Manager resource discovery using network methods.
-
System Center Configuration Manager Considerations for Global Environment Deployments
After watching this video; you will be able to recognize characteristics of a global SCCM environment deployments.
-
System Center Configuration Manager Considerations for Intune and Cloud Services Integration
After watching this video; you will be able to recognize characteristics of SCCM integration with cloud services.
-
System Center Configuration Manager Content Library
After watching this video; you will be able to describe the content library used in content distribution in System Center 2012 R2 Configuration Manager.
-
System Center Configuration Manager Content Management Overview
After watching this video; you will be able to describe content management features in System Center 2012 R2 Configuration Manager.
-
System Center Configuration Manager Content Management Tasks
After watching this video; you will be able to update; redistribute; validate and remove content from a System Center 2012 R2 Configuration Manager distribution point.
-
System Center Configuration Manager Discovery Methods
After watching this video; you will be able to describe the methods used in System Center 2012 R2 Configuration Manager for resource discovery.
-
System Center Configuration Manager Distribution Points
After watching this video; you will be able to describe distribution points used for content distribution in System Center 2012 R2 Configuration Manager.
-
System Center Configuration Manager Exchange Server Connector Overview
After watching this video; you will be able to describe the Exchange Server connector for System Center 2012 R2 Configuration Manager.
-
System Center Configuration Manager Exchange Server Connector Requirements
After watching this video; you will be able to list the requirements for Exchange Server connector for System Center 2012 R2 Configuration Manager.
-
System Center Configuration Manager Feature Comparison
After watching this video; you will be able to describe the differences between System Center 2012 Configuration Manager; and the SP1 and R2 versions.
-
System Center Configuration Manager for Medium to Large Deployments
After watching this video; you will be able to recognize characteristics of medium to large SCCM organizational deployments.
-
System Center Configuration Manager for Small-to-Medium Deployments
After watching this video; you will be able to recognize characteristics of small-to-medium SCCM organizational deployments.
-
System Center Configuration Manager Network Bandwidth
After watching this video; you will be able to identify considerations for network bandwidth when implementing content distribution in System Center 2012 R2 Configuration Manager.
-
System Center Configuration Manager Power Management Implementation Process
After watching this video; you will be able to list the steps for implementing power management in System Center 2012 R2 Configuration Manager.
-
System Center Configuration Manager PowerShell Administration Commands
After watching this video; you will be able to describe the main System Center 2012 R2 Configuration Manager PowerShell commands.
-
System Center Configuration Manager Pull and Cloud Distribution Points
After watching this video; you will be able to describe pull and cloud distribution points used for content distribution in System Center 2012 R2 Configuration Manager.
-
System Center Configuration Manager Resource Discovery Overview
After watching this video; you will be able to describe resource discovery using System Center 2012 R2 Configuration Manager.
-
System Center Configuration Manager Role-Based Admin Default Security Roles
After watching this video; you will be able to describe the default security roles in System Center 2012 R2 Configuration Manager.
-
System Center Configuration Manager Role-Based Administration Security Scopes
After watching this video; you will be able to describe System Center 2012 R2 Configuration Manager role-based administration security scopes.
-
System Center Configuration Manager Site Assignment
After watching this video; you will be able to describe site assignment in System Center 2012 R2 Configuration Manager.
-
System Center Configuration Manager Toolkit Client Tools
After watching this video; you will be able to use the client tools in the System Center 2012 R2 Configuration Manager Toolkit.
-
System Center Configuration Manager Toolkit Server Tools
After watching this video; you will be able to use the server tools in the System Center 2012 R2 Configuration Manager Toolkit.
-
System Center Configuration Manager User and Device Collections Overview
After watching this video; you will be able to describe user and device collections in System Center 2012 R2 Configuration Manager.
-
Systems Management with System Center Configuration Manager; Intune; and Cloud
After watching this video; you will be able to describe systems management on- and off-premises with SCCM; Intune; and Azure.
-
The Active Directory-Based Activation Process
After watching this video; you will be able to describe the Active Directory-based Activation process and planning considerations .
-
The Asset Intelligence Catalog
After watching this video; you will be able to describe the function of the System Center 2012 R2 Configuration Manager Asset Intelligence catalog.
-
The Company Portal App in System Center 2012 R2 Configuration Manager
After watching this video; you will be able to manage apps using the company portal app in System Center 2012 R2 Configuration Manager.
-
The Key Management Service Process
After watching this video; you will be able to describe the process and planning considerations for using KMS and MAK for volume activation; including how to choose a KMS host.
-
The System Center Configuration Manager Exchange Server Connector Process
After watching this video; you will be able to describe the process using the System Center 2012 R2 Configuration Manager Exchange Connector.
-
Troubleshooting SCCM Inventory Collection
After watching this video; you will be able to troubleshoot System Center 2012 R2 Configuration Manager inventory collection.
-
Troubleshooting System Center Configuration Manager with Log Files
After watching this video; you will be able to view log files and use the Configuration Manager Trace Log Tool to troubleshoot System Center 2012 R2 Configuration Manager.
-
Troubleshooting the OS Deployment
After watching this video; you will be able to identify how to use log and report files to troubleshoot an OS deployment.
-
UAC Issues and MAP and ACT for App Compatibility
After watching this video; you will be able to describe how MAP and ACT can be used to identify common application compatibility issues.
-
Understanding Application Management Phases
After watching this video; you will be able to describe the application management phase.
-
Understanding Boot and Install Images
After watching this video; you will be able to describe what boot and install images are and when to use each.
-
Understanding Deployments Using VHD and Windows To Go
After watching this video; you will be able to explain the requirements and the deployment process for using the VHD with native boot.
-
Understanding Deployments Using Windows To Go
After watching this video; you will be able to explain the requirements and the deployment process for using Windows To Go and how to create a Windows To Go image.
-
Understanding Desktop Deployment Phases
After watching this video; you will be able to describe the enterprise desktop life cycle model.
-
Understanding High-Touch Installs with Standard Images
After watching this video; you will be able to explain the requirements and the deployment process for a high-touch with a standard image strategy; including the benefits and limitations.
-
Understanding How KMS Activates Computers
After watching this video; you will be able to describe how computers get activated using KMS.
-
Understanding Lite-Touch Installation Deployment
After watching this video; you will be able to explain the requirements and the deployment process for a LTI; including the benefits and limitations.
-
Understanding Multicast OS Deployments
After watching this video; you will be able to describe how to use multicast for operating system deployments; including its components and considerations.
-
Understanding System Center Configuration Manager Site System Roles
After watching this video; you will be able to describe SCCM site system roles.
-
Understanding Task Sequences in SCCM
After watching this video; you will be able to describe a task sequence and their components; including task sequence variables.
-
Understanding the Benefits and Features of Windows Intune
After watching this video; you will be able to describe the benefits and features of Windows Intune.
-
Understanding the Common USMT Scenarios
After watching this video; you will be able to describe the common user state migration scenarios including the considerations.
-
Understanding the MAP Phases for Assessments
After watching this video; you will be able to describe MAP and the six phases to use it for the deployment strategy.
-
Understanding the System Center Configuration Manager Hierarchy
After watching this video; you will be able to describe the SCCM hierarchy.
-
Understanding the Technologies for Volume Activation
After watching this video; you will be able to describe the three activation models: Active Directory-based; KMS; MAK.
-
Understanding the USMT Toolset
After watching this video; you will be able to identify the USMT toolset; including the CLI tools and XML files.
-
Understanding the WDS Environment
After watching this video; you will be able to describe the installation options; images type support; and the considerations.
-
Understanding the Windows ADK Features for Deployment
After watching this video; you will be able to describe the features of Windows ADK for deployment.
-
Understanding the ZTI Deployment Process Using SCCM
After watching this video; you will be able to describe the process for deploying an operating system image and the two ways it can be deployed: unknown computer and imported computer objects.
-
Understanding USMT Best Practices
After watching this video; you will be able to describe the best practices for using USMT; including the security.
-
Understanding Windows PE Benefits and Limitations
After watching this video; you will be able to describe Windows PE and its benefits and limitations.
-
Understanding Zero-Touch Installation Deployment
After watching this video; you will be able to explain the requirements and the deployment process for a ZTI including the benefits and limitations.
-
Using Asset Intelligence in SCCM
After watching this video; you will be able to configure and use Asset Intelligence in SCCM to retrieve inventory data and software license usage information.
-
Using DISM to Mount and Modify Images
After watching this video; you will be able to use DISM to mount and modify an image.
-
Using LoadState.exe to Restore User State
After watching this video; you will be able to use loadstate.exe to restore user state data.
-
Using MAK to Activate Computers
After watching this video; you will be able to describe two ways MAK can activate computers: independent activation and proxy activation.
-
Using OCT to Customize Office
After watching this video; you will be able to use OCT to customize the setup before installing Office 2013. This includes customizing the installation and creating the network installation point.
-
Using ScanState.exe to Capture User State
After watching this video; you will be able to use scanstate.exe to capture user state data for migration.
-
Using SCCM for Assessment
After watching this video; you will be able to use System Center Configuration Manager to assess the infrastructure.
-
Using SCCM to Assess Hardware Inventory
After watching this video; you will be able to use System Center Configuration Manager to run a hardware inventory and view reports.
-
Using the Inventory and Assessment Wizard in MAP
After watching this video; you will be able to use the Inventory and Assessment Wizard to collect data; including selecting the inventory scenario and discovery method.
-
Using the Performance Metrics Wizard in MAP
After watching this video; you will be able to use the Performance Metrics Wizard to collect performance related information on servers and clients.
-
Using the Standard User Analyzer in ACT
After watching this video; you will be able to identify an application issue using the Standard User Analyzer on a Windows 8.1 computer and view the issues.
-
Using VAMT to Manage Activation; Licensing; and Keys
After watching this video; you will be able to describe how to use VAMT to manage activation and licensing status of computers and products; as well as key usage.
-
View Asset Intelligence Reports
After watching this video; you will be able to view System Center 2012 R2 Configuration Manager Asset Intelligence reports.
-
View System Center Configuration Manager Site Information Reports
After watching this video; you will be able to use reports to view site information in System Center 2012 R2 Configuration Manager.
-
Viewing SCCM Compliance Results in the Console
After watching this video; you will be able to view compliance results in the System Center 2012 R2 Configuration Manager administration console.
-
Viewing SCCM Compliance Results on the Client
After watching this video; you will be able to view compliance results on the System Center 2012 R2 Configuration Manager client.
-
Viewing Software Update Logs in System Center 2012 R2 Configuration Manager
After watching this video; you will be able to view software update logs in System Center 2012 R2 Configuration Manager.
-
Viewing Software Update Reports in System Center Configuration Manager
After watching this video; you will be able to view software update reports in System Center 2012 R2 Configuration Manager.
-
Viewing System Center 2012 R2 Configuration Manager Inventory Results
After watching this video; you will be able to view System Center 2012 R2 Configuration Manager inventory results.
-
Viewing System Center Configuration Manager Site and Component Status
After watching this video; you will be able to get Site and Component status data from System Center 2012 R2 Configuration Manager.
-
Windows Intune Integration with System Center 2012 R2 Configuration Manager
After watching this video; you will be able to describe Windows Intune integration with System Center 2012 R2 Configuration Manager.
-
Windows Intune System Center Configuration Manager Integration Preparation
After watching this video; you will be able to prepare System Center 2012 R2 Configuration Manager for Windows Intune integration.
-
Windows Store Apps Deployment in System Center 2012 R2 Configuration Manager
After watching this video; you will be able to deploy Windows Store apps in System Center 2012 R2 Configuration Manager.
-
Windows Version Compatibility Issues
After watching this video; you will be able to identify common application compatibility issues.
-
Working with System Center 2012 R2 Configuration Manager Software Center
After watching this video; you will be able to use Software Center in System Center 2012 R2 Configuration Manager to manage software installs.
-
Updating Methods for Office 365
After watching this video; you will be able to identify the ways Office 365 can be updated.
-
Adding an OS Image to SCCM
After watching this video; you will be able to add an OS image to SCCM using the Add Operating System Image Wizard.
-
Adding Applications to Deploy with Windows in SCCM
After watching this video; you will be able to add applications to SCCM to deploy with the Windows OS.
-
Adding Applications to the MDT Deployment Share
After watching this video; you will be able to add applications for deployment using the Deployment Workbench.
-
Adding Computers to the SCCM Database for Deployment
After watching this video; you will be able to add a new computer managed by SCCM to the SCCM database for deployment.
-
Adding DaRT to the Boot Images
After watching this video; you will be able to install DaRT; copy the tools; and add DaRT to the deployment share.
-
Adding Drivers and Components to the Windows PE Image
After watching this video; you will be able to add drivers and optional components to a Windows PE image.
-
Adding Drivers for the Boot Images and OS
After watching this video; you will be able to add drivers for the boot images and operating system specifically for certain hardware models.
-
Adding Drivers to a Windows Deployment in SCCM
After watching this video; you will be able to add drivers for Windows PE and 8.1 to the deployment.
-
Adding Drivers to the Deployment Share in MDT for LTI
After watching this video; you will be able to add out-of-box drivers to the deployment share for the OS deployment.
-
Adding the Setup Files to the Deployment Share
After watching this video; you will be able to add the Windows 8.1 installation files to the deployment share.
-
Altering the MDT Deployment Share Rules
After watching this video; you will be able to alter the CustomSettings.ini and BootStrap.ini rule files and then update the deployment share to create the boot images.
-
Altering the Task Sequence to Update a Reference Computer
After watching this video; you will be able to alter the task sequence to edit actions required to update the reference image.
-
Analyzing Application Inventory
After watching this video; you will be able to organize and analyze the application inventory.
-
Application Compatibility Tools
After watching this video; you will be able to understand what tools can be used to view application compatibility issues.
-
Application Management with System Center 2012 R2 Configuration Manager
After watching this video; you will be able to describe application management with System Center 2012 R2 Configuration Manager.
-
Applications vs Packages in System Center 2012 R2 Configuration Manager
After watching this video; you will be able to contrast applications and packages in System Center 2012 R2 Configuration Manager.
-
Applying Updates to Office 365 Using the ODT
After watching this video; you will be able to apply an update to Office 365 using the Office Deployment Tool.
-
Asset Intelligence Overview
After watching this video; you will be able to describe Asset Intelligence in System Center 2012 R2 Configuration Manager.
-
Auditing System Center 2012 R2 Configuration Manager Remote Control Usage
After watching this video; you will be able to audit the use of remote control in System Center 2012 R2 Configuration Manager.
-
Basic Queries in System Center Configuration Manager
After watching this video; you will be able to perform basic queries in System Center 2012 R2 Configuration Manager.
-
Blocking and Unblocking System Center Configuration Manager Clients
After watching this video; you will be able to describe blocking and unblocking System Center 2012 R2 Configuration Manager clients; the difference between blocking and revocation; and how to manage multiple device settings.
-
Building the Reference Windows 8.1 Computer
After watching this video; you will be able to deploy Windows 8.1 using the Deployment Wizard for a LTI deployment strategy to build a reference computer.
-
BYOD and the Device Life Cycle in System Center 2012 R2 Configuration Manager
After watching this video; you will be able to describe considerations for enrolling company-owned and personal-owned devices and managing device life cycle.
-
Capturing an Image using DISM
After watching this video; you will be able to create an image using DISM.
-
Components of Asset Intelligence
After watching this video; you will be able to list the components of Asset Intelligence in System Center 2012 R2 Configuration Manager.
-
Configuration Baselines in System Center 2012 R2 Configuration Manager
After watching this video; you will be able to describe configuration baselines in System Center 2012 R2 Configuration Manager.
-
Configuration Items in System Center 2012 R2 Configuration Manager
After watching this video; you will be able to describe configuration items in System Center 2012 R2 Configuration Manager.
-
Configure SCCM Software Metering Rule Autocreation and View a Metering Report
After watching this video; you will be able to configure software metering rule autocreation and view a metering report in System Center 2012 R2 Configuration Manager.
-
Configuring a Silent Installation of Office 2013
After watching this video; you will be able to create a silent installation of Office 2013 using the Config.xml file or OCT.
-
Configuring a System Center Configuration Manager Role-Based Administrative User
After watching this video; you will be able to configure a System Center 2012 R2 Configuration Manager role-based administrative user.
-
Configuring ACT
After watching this video; you will be able to configure ACT using the ACT Configuration Wizard and Microsoft Application Compatibility Settings.
-
Configuring Active Directory-Based Activation
After watching this video; you will be able to install; configure; and verify Active Directory-based Activation.
-
Configuring Application Supersedence in System Center Configuration Manager
After watching this video; you will be able to configure application supersedence in System Center 2012 R2 Configuration Manager.
-
Configuring Asset Intelligence Data Collection
After watching this video; you will be able to configure System Center 2012 R2 Configuration Manager Asset Intelligence data collection.
-
Configuring Boot-Disk Options after MDT Integration
After watching this video; you will be able to create a boot image for Configuration Manager using MDT.
-
Configuring Client Settings in System Center 2012 R2 Configuration Manager
After watching this video; you will be able to configure software update client settings in System Center 2012 R2 Configuration Manager.
-
Configuring Remediation in System Center 2012 R2 Configuration Manager
After watching this video; you will be able to configure remediation in System Center 2012 R2 Configuration Manager.
-
Configuring SCCM Client Health Alerts and Autoremediation
After watching this video; you will be able to configure System Center 2012 R2 Configuration Manager client health alerts and autoremediation.
-
Configuring SCCM Endpoint Protection Antimalware Alerts
After watching this video; you will be able to configure anti-malware alerts in System Center 2012 R2 Configuration Manager endpoint protection.
-
Configuring SCCM Endpoint Protection Client Settings
After watching this video; you will be able to configure Endpoint Protection client settings in System Center 2012 R2 Configuration Manager.
-
Configuring SCCM Hardware Inventory Client Settings
After watching this video; you will be able to configure hardware inventory client settings in System Center 2012 R2 Configuration Manager.
-
Configuring SCCM Settings and Components
After watching this video; you will be able to explain and configure the Computer Agent settings; Network Access Account.
-
Configuring Software Metering Agent
After watching this video; you will be able to configure a System Center 2012 R2 Configuration Manager Software Metering Agent.
-
Configuring Software Metering Rules
After watching this video; you will be able to configure System Center 2012 R2 Configuration Manager software metering rules.
-
Configuring SQL for Querying System Center Configuration Manager
After watching this video; you will be able to configure SQL Server and Reporting Services for System Center 2012 R2 Configuration Manager.
-
Configuring System Center 2012 R2 Configuration Manager File Collection
After watching this video; you will be able to configure software inventory file collection in System Center 2012 R2 Configuration Manager.
-
Configuring System Center 2012 R2 Configuration Manager Profiles
After watching this video; you will be able to configure profiles in System Center 2012 R2 Configuration Manager.
-
Activating Windows 8.1
Microsoft Windows 8.1 allows users to activate the Enterprise edition using a MAC key or a product key instead of a Key Management Service. In this video; Jay Ferron demonstrates how to use the command prompt to activate Windows 8.1 Enterprise edition.
-
Adding an Account to Outlook Calendar
Microsoft Windows 8.1 allows you to use your People app to add the e-mail accounts of contacts to your in-built Outlook application. In this video; Jay Ferron explains why you might wish to incorporate another user's account into Outlook; before showing you how to do so.
-
Alarm Stopwatch Counter
In Microsoft Windows 8.1; the Alarms app facilitates time and data management by including an Alarm; a Timer; and a Stopwatch. In this video; Jay Ferron demonstrates how to configure multiple customized alarms; a task-based timer; and a stopwatch from which data can be drawn into an Excel spreadsheet.
-
Calculator
The new Calculator in Microsoft Windows 8.1 allows you to do much more than just standard calculations. In this video; Jay Ferron demonstrates how to use the Calculator to do both standard and scientific calculations; as well as conversions.
-
Configuring Start Screen Groups
Microsoft Windows 8.1 allows you to configure; customize; and cluster select groups of live tiles to customize your Start screen to meet your computing needs. In this video; Jay Ferron shows you how to select and deselect Start screen applications; turn live tiles on and off; group them; and arrange their groups.
-
Controls
In Windows 8.1; there are a variety of new controls available. In this video; Jay Ferron demonstrates the controls that are built into Windows 8.1 that help you navigate and manage the operating system more efficiently.
-
Cooking App
Microsoft Windows 8.1 features the Food & Drink cooking app that includes a hands-free mode that utilizes the computers camera so you can navigate without touching the device by using gestures. In this video; Jay Ferron demonstrates the main features of the Food & Drink recipe app and how to use the hands-free control.
-
Customizing Start Page
In Microsoft Windows 8.1; you can customize the Start screen to manage and create easy access to the apps; desktop programs; and other relevant information that you interact with the most. In this video; Jay Ferron demonstrates how to customize live tiles; change the default screen after signing in; and access programs easily from the Start screen.
-
Enhanced Photo Editing
Microsoft Windows 8.1 provides users with an enhanced photo-editing feature with a range of tools such as Retouch and Effects. In this video; Jay Ferron demonstrates how to use the photo enhancement tools in conjunction with Microsoft Paint to create effects that previously required a third-party application.
-
External Screen
Microsoft Windows 8.1 allows you to connect an external monitor to your computer and provides various screen options that you can choose from when setting up your screens. In this video; Jay Ferron demonstrates the options available from the Devices charm that you can use to project your apps and extend your display to a second monitor.
-
Fingerprint Scanning
New to Microsoft Windows 8.1 is its biometric support that allows you to configure and manage fingerprint authentication using the integrated fingerprint registration application. In this video; Jay Ferron uses the fingerprint registration application and a fingerprint reader to enroll fingerprint recognition as a sign-in option when logging into a user account.
-
Fitness App
Microsoft Windows 8.1 features a new application where you can monitor your health and fitness on a daily basis. In this video; Jay Ferron demonstrates how to use the built-in fitness application to monitor your diet; exercise; any symptoms you may be experiencing; and your medication intake.
-
Help and Tips
Microsoft Windows 8.1 now shows you what the new features are and how to work in the new interface. In this video; Jay Ferron demonstrates how to use the Help and Tips application to explore the tools that assist users in using the new interface.
-
Hyper V
In Windows 8.1; Hyper V allows you to use virtual machines. In this video; Jay Ferron demonstrates the changes that have been made to Hyper V in Windows 8.1; and how to create and use virtual machines.
-
Installing and Uninstalling an App
Microsoft Windows 8.1 provides users with a simple way to install and uninstall applications. In this video; Jay Ferron demonstrates how to install an application from the Windows Store and uninstall an application from the Start menu. He also contrasts this quick and simple uninstall process with the Control Panel method used in previous versions of Windows.
-
Installing Remote Admin Tools
Microsoft Windows 8.1 provides users with a set of tools to work on Active Directory servers from a remote workstation. In this video; Jay Ferron demonstrates how to install Remote Access Tools and manage a server remotely by adding a DHCP server; using the Event Viewer; and enabling DNS.
-
Internet Explorer 11 Desktop
The new Internet Explorer 11 for Microsoft Windows 8.1 can be viewed in the desktop mode and includes features that allow you to customize the browser settings for faster and easier developing and debugging. In this video; Jay Ferron demonstrates how to create multiple home page tabs before highlighting the features of the F12 developer tools in IE11.
-
Internet Explorer 11 Modern Interface
Internet Explorer 11 for Microsoft Windows 8.1 features the Modern UI that provides you with maximum screen area and enhanced functionality and features to improve your browsing experience. In this video; Jay Ferron demonstrates how to access and use the controls that let you navigate and change settings from within IE11's Modern UI.
-
Joining to a Domain
Microsoft Windows 8.1 allows users to join an Active Directory domain from a local workgroup machine. In this video; Jay Ferron demonstrates how to access and change the properties of a local machine and join an existing domain using administrator credentials.
-
Navigate Opening and Closing Apps and Side by Side
In Windows 8.1; there are a range of new tools for opening and closing applications. In this video; Jay Ferron demonstrates how to open and close applications using some of these new tools in Windows 8.1.
-
Performance Monitor
Microsoft Windows 8.1 has the Task Manager; Resource Monitor; and Performance Monitor tools that monitor the processes and amount of system utilization of your computer. In this video; Jay Ferron demonstrates how to use the Task Manager to view running applications; background processes; and CPU utilization.
-
Personalizing Windows 8.1 Machine
In Windows 8.1; you can personalize various settings. In this video; Jay Ferron demonstrates how to change the colors and themes of your desktop in Windows 8.1.
-
Rotate Display
Microsoft Windows 8.1 allows you to rotate your tablet's display automatically so you can view content horizontally or vertically depending on your preferences. In this video; Jay Ferron demonstrates the advantages of being able to change the display axis when viewing apps on a tablet using Windows 8.1.
-
Sharing Reading Lists
In Microsoft Windows 8.1; the Reading List application allows you to store and bookmark local or remote documents for later access and sharing across devices. In this video; Jay Ferron demonstrates how to populate your Reading List and access and share its documents across devices.
-
SkyDrive Settings and Backup
Microsoft Windows 8.1's integration with SkyDrive allows you to use its SkyDrive settings page to back up your files; settings; and programs to the cloud. In this video; Jay Ferron demonstrates how to personalize SkyDrive's appearance; synchronize applications; user; and device settings; and configure metered connections settings.
-
Skype
In Microsoft Windows 8.1; you can have a teleconference with another party and quickly and easily share files with them. In this video; Jay Ferron demonstrates how to use Skype to do an echo test; video call; phone call; and share files with other users.
-
Start Screen Personalization
Microsoft Windows 8.1 provides users with the ability to customize their Start screen to meet specific requirements. In this video; Jay Ferron demonstrates how to move; resize; and group tiles; as well as pin and unpin programs to and from the Start menu and the taskbar.
-
Sync with Cloud
Microsoft Windows 8.1 provides cloud integration that allows you to synchronize information between the computers you use that are running Windows 8.1 when you sign in with a Microsoft account. In this video; Jay Ferron demonstrates how files and personal settings are synchronized between two cloud connected computers that are signed into a Microsoft account with Windows 8.1.
-
Windows Phone and Cloud
In Windows 8.1; you can use a Windows Phone and the Cloud to share information with a PC. In this video; Jay Ferron demonstrates how to first take a picture; and then use the cloud to make it appear on a computer.
-
Windows Phone and Windows 8.1
You can integrate Microsoft Windows 8.1 with your Microsoft phone using the Windows Phone app. In this video; Jay Ferron demonstrates how activating the Windows Phone app and confirming the connection allows you to upload data to and download data from your phone; charge it; monitor its status; and locate it.
-
Windows Store
Microsoft Windows 8.1 provides users with Windows Store; which can be installed on up to five machines. Windows then synchronizes operations on all installations. In this video; Jay Ferron demonstrates new options and features of Store; and how to download a new application and install it.
-
Working in Outlook
Microsoft Windows 8.1's new Outlook client allows you to customize multiple aspects of your private and shared e-mail accounts. In this video; Jay Ferron demonstrates how to navigate the Outlook interface; how to Flag and Favorite contacts; create and manage folders; add SkyDrive attachments to e-mails; and use the Sweep function.
-
Configuring a Cluster
After watching this video; you will be able to configure a cluster of Nano Server VMs.
-
Configuring Scale-Out File Server
After watching this video; you will be able to configure Scale-Out File Server on a Nano Server cluster.
-
Connecting to a Domain
After watching this video; you will be able to connect Nano Server to a domain.
-
Emergency Management Services and Kernel Debugging
After watching this video; you will be able to describe emergency management services and kernel debugging in Nano Server.
-
Managing Nano Server with PowerShell DSC
After watching this video; you will be able to remotely manage Nano Server with PowerShell Desired State Configuration.
-
Managing Nano Server with Remote Core PowerShell
After watching this video; you will be able to remotely manage Nano Server with Remote Core PowerShell.
-
Managing Nano Server with Server Manager
After watching this video; you will be able to remotely manage Nano Server with Server Manager.
-
Nano Server Live Migration
After watching this video; you will be able to perform live migration of a Nano Server.
-
Nano Server Overview
After watching this video; you will be able to describe the main features of Nano Server.
-
Nano Server Roles
After watching this video; you will be able to list the roles available for Nano Server.
-
Reasons for Nano Server
After watching this video; you will be able to describe the motivation for creating Nano Server.
-
Remote Management Options
After watching this video; you will be able to describe options for remotely managing Nano Server.
-
Remote Server Management Tools for Azure
After watching this video; you will be able to describe Remote Server Management Tools for Azure.
-
Remote Server Management Tools for Nano Server
After watching this video; you will be able to describe Remote Server Management Tools for Nano Server.
-
Server Application Development
After watching this video; you will be able to describe the server application development model for new versions of Windows Server.
-
Server Core and Nano Server
After watching this video; you will be able to compare Nano Server and Server Core.
-
Setting Up a Nano Server on Hyper-V
After watching this video; you will be able to set up Nano Server from the Windows Server Technical Preview media on a Hyper-V host.
-
Accessing Performance Monitoring Tools
After watching this video; you will be able to use different methods to access and explore Windows Performance Monitor; Task Manager; and Resource Monitor in Windows 7; Windows 8.1; and Windows 10.
-
Adjusting Windows 10 Performance Options
After watching this video; you will be able to recognize how to adjust performance options in Windows 8.1 to improve system performance.
-
Adjusting Windows 10 Startup Options
After watching this video; you will be able to use Msconfig to adjust settings and improve performance from startup.
-
Adjusting Windows 7 Performance Options
After watching this video; you will be able to recognize how to adjust performance options in Windows 7 to improve system performance.
-
Adjusting Windows 7 Startup Options
After watching this video; you will be able to use Msconfig to adjust settings and improve performance from startup.
-
Adjusting Windows 8.1 Performance Options
After watching this video; you will be able to recognize how to adjust performance options in Windows 8.1 to improve system performance.
-
Adjusting Windows 8.1 Startup Options
After watching this video; you will be able to use Msconfig to adjust settings and improve performance from startup.
-
Analyzing Data with Windows Performance Analyzer
After watching this video; you will be able to analyze low-level system metrics in Windows systems using the Windows Performance Analyzer.
-
Analyzing Historical Data with Relog
After watching this video; you will be able to use Relog to analyze historical data in a Windows system.
-
Analyzing Historical Perfmon Data
After watching this video; you will be able to analyze data captured with perfmon in a Windows system.
-
Analyzing Performance Data Over Time
After watching this video; you will be able to examine performance data from a number of sources; over time; to diagnose issues in Windows systems.
-
Automated Analysis of Performance Data
After watching this video; you will be able to describe reasons for automating the analysis of performance data in a Windows system.
-
Collecting Data with Windows Performance Recorder
After watching this video; you will be able to collect low-level system metrics in Windows systems using the Windows Performance Recorder.
-
Collecting Historical Data with Logman
After watching this video; you will be able to use Logman to collect historical data in a Windows system.
-
Collecting Historical Data with Perfmon
After watching this video; you will be able to use perfmon to collect historical data in a Windows system.
-
Creating Graphs with Perfmon
After watching this video; you will be able to create graphs to visualize performance characteristics in Windows Performance Monitor.
-
Creating Reports in the PAL Tool
After watching this video; you will be able to create reports in the Performance Analysis of Logs tool.
-
Disk Monitoring Best Practice
After watching this video; you will be able to describe key Disk I/O metrics and thresholds.
-
Drilling Deeper into Windows Performance Analyzer
After watching this video; you will be able to uncover deeper issues by analyzing low-level system metrics in Windows systems using the Windows Performance Analyzer.
-
Event Viewer Low Performance Alerts in Windows 10
After watching this video; you will be able to recognize how Event Viewer can e-mail and display messages of low system resources in Windows 10.
-
Event Viewer Low Performance Alerts in Windows 7
After watching this video; you will be able to recognize how Event Viewer can e-mail and display messages of low system resources in Windows 7.
-
Event Viewer Low Performance Alerts in Windows 8.1
After watching this video; you will be able to recognize how Event Viewer can e-mail and display messages of low system resources in Windows 8.1.
-
Exploring Performance Monitor in Windows 10
After watching this video; you will be able to recognize some of the key features of Windows Performance Monitor and the methods used to access the tool in Windows 10.
-
Exploring Performance Monitor in Windows 7
After watching this video; you will be able to recognize some of the key features of Windows Performance Monitor and methods used to access the tool in Windows 7.
-
Exploring Performance Monitor in Windows 8.1
After watching this video; you will be able to recognize some of the key features of Windows Performance Monitor and the methods used to access the tool in Windows 8.1.
-
Exploring Reliability Monitor in Windows 10
After watching this video; you will be able to recognize some of the key features of Windows Reliability Monitor and methods used to access the tool in Windows 10.
-
Exploring Reliability Monitor in Windows 7
After watching this video; you will be able to recognize some of the key features of Windows Reliability Monitor and methods used to access the tool in Windows 7.
-
Exploring Reliability Monitor in Windows 8.1
After watching this video; you will be able to recognize some of the key features of Windows Reliability Monitor and methods used to access the tool in Windows 8.1.
-
Exploring Resource Monitor in Windows 10
After watching this video; you will be able to identify some of the key features of Windows Resource Monitor and the methods used to access the tool in Windows 10.
-
Exploring Resource Monitor in Windows 7
After watching this video; you will be able to identify some of the key features of Windows Resource Monitor and methods used to access the tool in Windows 7.
-
Exploring Resource Monitor in Windows 8.1
After watching this video; you will be able to identify some of the key features of Windows Resource Monitor and methods used to access the tool in Windows 8.1.
-
Exploring Task Manager in Windows 10
After watching this video; you will be able to recognize some of the key features of Windows Task Manager and the methods used to access the tool in Windows 10.
-
Exploring Task Manager in Windows 7
After watching this video; you will be able to recognize the key features of Windows Task Manager and methods used to access the tool in Windows 7.
-
Exploring Task Manager in Windows 8.1
After watching this video; you will be able to recognize some of the key features of Windows Task Manager and the methods used to access the tool in Windows 8.1.
-
Exploring the PAL Tool in Windows 10
After watching this video; you will be able to identify some of the key features of the Performance Analysis of Logs tool and the method used to access the tool in Windows 10.
-
Exploring the PAL Tool in Windows 7
After watching this video; you will be able to recognize some of the key features of the Performance Analysis of Logs tool and the method used to access the tool in Windows 7.
-
Exploring the PAL Tool in Windows 8.1
After watching this video; you will be able to recognize some of the key features of the Performance Analysis of Logs tool and the method used to access the tool in Windows 8.1.
-
Exploring the WinSAT Tool in Windows 10
After watching this video; you will be able to recognize the key features of the Windows Experience index and how to access it in Windows 10.
-
Exploring the WinSAT Tool in Windows 7
After watching this video; you will be able to recognize the key features of the Windows Experience index and how to access it in Windows 7.
-
Exploring the WinSAT Tool in Windows 8.1
After watching this video; you will be able to recognize the key features of the Windows Experience index and how to access it in Windows 8.1.
-
Finding Low Resources with Windows 10 Event Viewer
After watching this video; you will be able to use Event Viewer logs to look for resource issues in Windows 10.
-
Finding Low Resources with Windows 7 Event Viewer
After watching this video; you will be able to use Event Viewer logs to look for resource issues in Windows 7.
-
Finding Low Resources with Windows 8.1 Event Viewer
After watching this video; you will be able to use Event Viewer logs to look for resource issues in Windows 8.1.
-
Getting a Performance Baseline
After watching this video; you will be able to run Windows Experience Index in Windows 7 and WinSAT in Windows 8.1 and Windows 10 to gather baseline information on your system.
-
Graphs in the PAL Tool
After watching this video; you will be able to describe the use of graphs in the Performance Analysis of Logs tool.
-
Importing Data into the PAL Tool
After watching this video; you will be able to import data into the Performance Analysis of Logs tool.
-
Improving Application Performance in Windows 10
After watching this video; you will be able to recognize how to adjust processor affinity and set application priority settings in Windows 10 to improve application performance.
-
Improving Application Performance in Windows 7
After watching this video; you will be able to recognize how to adjust processor affinity and set application priority settings in Windows 7 to improve application performance.
-
Improving Application Performance in Windows 8.1
After watching this video; you will be able to recognize how to adjust processor affinity and set application priority settings in Windows 8.1 to improve application performance.
-
Improving Hard Disk Performance in Windows 10
After watching this video; you will be able to clean and tweak the hard disk to improve the overall performance in Windows 10.
-
Improving Hard Disk Performance in Windows 7
After watching this video; you will be able to clean and tweak the hard disk to improve the overall performance in Windows 7.
-
Improving Hard Disk Performance in Windows 8.1
After watching this video; you will be able to clean and tweak the hard disk to improve the overall performance in Windows 8.1.
-
Installing the Performance Analysis of Logs Tool
After watching this video; you will be able to install the Performance Analysis of Logs tool.
-
Key System Performance Metrics
After watching this video; you will be able to describe the key system performance metrics in a computer system; including CPU; memory; disk I/O; and network I/O.
-
Low-level Graphs with Windows Performance Analyzer
After watching this video; you will be able to graph low-level system metrics in Windows systems using the Windows Performance Analyzer.
-
Low-level Metrics Overview
After watching this video; you will be able to describe low-level system metrics in Windows systems.
-
Measuring Performance
After watching this video; you will be able to describe the elements of performance measurement; including time; data; and throughput measurements.
-
Memory Monitoring Best Practice
After watching this video; you will be able to describe key Memory metrics and thresholds.
-
Monitoring Performance in Windows
After watching this video; you will be able to use Task Manager; Performance Monitor; and Resource Monitor to monitor real-time performance statistics in Windows.
-
Perfmon Counters
After watching this video; you will be able to list key Windows Performance Monitor counters and use them for system performance monitoring.
-
Perfmon Objects
After watching this video; you will be able to list key Windows Performance Monitor objects and use them for system performance monitoring.
-
Perfmon Overview
After watching this video; you will be able to describe the elements and features of Windows Performance Monitor or perfmon.
-
Performance Analysis of Logs Tool
After watching this video; you will be able to describe the features and functions of Performance Analysis of Logs tool.
-
Process CPU Monitoring
After watching this video; you will be able to monitor process CPU usage in Windows Resource Monitor.
-
Process Disk I/O Monitoring
After watching this video; you will be able to monitor disk I/O in Windows Resource Monitor.
-
Process Memory Monitoring
After watching this video; you will be able to monitor process memory usage in Windows Resource Monitor.
-
Process Metrics
After watching this video; you will be able to list the main performance metrics related to processes in Windows; including process count; thread count; and handle count.
-
Process Network I/O Monitoring
After watching this video; you will be able to monitor network I/O usage in Windows Resource Monitor.
-
Reading Reports from the PAL Tool
After watching this video; you will be able to read reports from the Performance Analysis of Logs tool.
-
Windows Performance Analyzer in Windows 10
After watching this video; you will be able to recognize some of the key features of Windows Performance Analyzer and the method used to access the tool in Windows 10.
-
Windows Performance Analyzer in Windows 7
After watching this video; you will be able to recognize some of the key features of Windows Performance Analyzer and the method used to access the tool in Windows 7.
-
Windows Performance Analyzer in Windows 8.1
After watching this video; you will be able to recognize some of the key features of Windows Performance Analyzer and the method used to access the tool in Windows 8.1.
-
Windows Performance Recorder in Windows 10
After watching this video; you will be able to recognize some of the key features of Windows Performance Recorder and the method used to access the tool in Windows 10.
-
Windows Performance Recorder in Windows 7
After watching this video; you will be able to recognize some of the key features of Windows Performance Recorder and the method used to access the tool in Windows 7.
-
Windows Performance Recorder in Windows 8.1
After watching this video; you will be able to recognize some of the key features of Windows Performance Recorder and the method used to access the tool in Windows 8.1.
-
Windows Performance Toolkit Overview
After watching this video; you will be able to describe the Windows Performance Toolkit for analyzing low-level system metrics in Windows systems.
-
Account GPO Configure Account
Microsoft Windows Server 2012 R2 allows administrators to counter password attacks by setting an account lockout policy. In this video; Michael Murphy demonstrates the three account lockout settings: account lockout threshold; account lockout duration; and account lockout reset counter.
-
Account GPO Passwords Settings Policies
Microsoft Windows Server 2012 R2's Group Policy Management Editor allows you to edit your Default Domain Policy's Password Policy settings. In this video; Michael Murphy explains the use and implications of each password policy setting; before retaining or revising the setting.
-
Active Directory Certificate – Configure Computer Enrollment Policies
As the administrator of a certification authority in Microsoft Windows Server 2012 R2; you can configure auto-enrollment policies for client certificates in a domain environment. In this video; Michael Murphy uses the Group Policy Management Editor to automatically configure the enrollment of user and computer certificates.
-
Active Directory Certificate – Configure User Enrollment Policies
Once a certificate services infrastructure is in place in Microsoft Windows Server 2012 R2; you need to configure users to enroll for those certificates. In this video; Michael Murphy demonstrates how to configure user enrollment policies.
-
Active Directory Certificate Services – Install Subordinate Root CA
In Microsoft Windows Server 2012 R2; certificates that are generated across a PKI are assigned out by the Enterprise Subordinate CA. In this video; Michael Murphy demonstrates how to install and configure a Subordinate CA.
-
Active Directory Certificate Services – Install the Root Certificate Authority
In Microsoft Windows Server 2012 R2; you can install a standalone Root Certification Authority to issue server certificates for use on your internal network. In this video; Michael Murphy demonstrates how to install and configure a Root Certification Authority; and suggests ways to secure the access keys.
-
Active Directory Sites – Check Replication Topology
In Microsoft Windows Server 2012 R2; replication connection action objects are created automatically between domain controllers; and with the appropriate credentials; Active Directory Sites and Services allows you to easily check the replication topology. In this video; Michael Murphy uses the Check Replication Topology option to determine the flow of replication between domain controllers in an Active Directory domain.
-
Active Directory Sites – Create Active Directory Subnet Objects
With the necessary credentials in Microsoft Windows Server 2012 R2; the Active Directory Sites and Services snap-in allows you to create subnet objects that define network IP addresses and lay the groundwork for the configuration of Active Directory Sites. In this video; Michael Murphy uses the New Object – Subnet dialog box to create subnet objects.
-
Active Directory Sites – Create and Configure Active Directory Site
With the necessary credentials in Microsoft Windows Server 2012 R2; you can create and manage the sites that represent the physical structure of your network in Active Directory Domain Services. In this video; Michael Murphy demonstrates how to define a site; associate it with subnet objects; and add a domain controller to the site using Active Directory Sites and Services.
-
Active Directory Sites – Create and Configure Site Links
With the appropriate authority in Microsoft Windows Server 2012 R2; you can create and configure site links that enable replication to occur between sites at a scheduled time. In this video; Michael Murphy uses Active Directory Sites and Services to create site links implementing IP intersite transport protocol; before demonstrating how to change the replication schedule and site link cost.
-
Add a Replica Domain Controller
Microsoft Windows Server 2012 R2 allows administrators to add a replica domain controller to an existing Active Directory domain. In this video; Michael Murphy demonstrates how to promote the domain controller; configure it as a Global Catalog server with DNS capability; and specify its AD site and installation media. He also covers when to use adprep or the new Wizard.
-
Azure AD
Microsoft Windows Server 2012 R2's Infrastructure as a Service (IaaS) solution; Azure; allows you to extend your Active Directory to cloud services. In this video; Michael Murphy demonstrates how to access the Azure portal; install Active Directory Domain Services to a virtual machine; details its potential as a domain controller; and explains how IaaS protects data against damage or loss.
-
Backup – Configure Previous Versions
Microsoft Windows Server 2012 R2 allows you to access previous versions of files; or shadow copies as they existed at a point in time; so you can easily recover files that were accidentally deleted or overwritten. In this video; Michael Murphy demonstrates how to configure shadow copies and restore previous versions from the Properties dialog box in Windows Server.
-
Backup – Optimize Backup Performance
With the appropriate authority; Microsoft Windows Server 2012 R2 provides features that allow you to improve server performance by optimizing the backup performance for full volumes. In this video; Michael Murphy demonstrates different performance setting options for a Windows Server Backup that are available within the Optimize Backup Performance dialog box.
-
Backup – Run a System State Backup
With the appropriate credentials; Microsoft Windows Server 2012 R2 allows you to protect your system state data by configuring scheduled backups to a remote shared folder. In this video; Michael Murphy demonstrates how to configure settings in the Backup Schedule Wizard that will enable automatic daily backups of the system state data to occur at a specified location.
-
Branch Cache Group Policy Configure
When using BranchCache in Microsoft Windows Server 2012 R2; you need to configure the BranchCache content servers; as well as configure the clients to use the BranchCache solution. In this video; Michael Murphy demonstrates how to configure client settings for BranchCache; select a mode; and configure the maximum round trip network latency.
-
Branch Cache Install and Configure
BranchCache in Microsoft Windows Server 2012 R2 helps you save bandwidth and money. In this video; Michael Murphy demonstrates how to install and configure BranchCache for network files; and manage the BranchCache role service.
-
Configure DFS
Microsoft Windows Server 2012 R2 allows administrators to create a central file repository use the Distributed File System to replicate the repository to other servers. In this video; Michael Murphy demonstrates how to create a public folder on a new namespace for use as a repository for unchanging; shared files; such as driver packages; image files; and application packages.
-
Configure Group Policy Client Processing
Microsoft Windows Server 2012 R2 allows administrators to configure how Group Policy works. In this video; Michael Murphy demonstrates how to configure Group Policy settings for client-side processing using three examples: Configure Group Policy slow link detection; Configure Group Policy Caching; and Configure user Group Policy loopback processing.
-
Configure Group Policy Processing Order
Microsoft Windows Server 2012 R2 allows administrators to configure the Group Policy processing order by blocking inheritance or enforcing specific Group Policies. In this video; Michael Murphy demonstrates the normal order of Group Policy processing using the example of kiosk machines to illustrate the difference between blocking inheritance or enforcing a higher-level Group Policy when there is a conflict.
-
Configure NIC Teaming for Virtual Machines
In Microsoft Windows Server 2012 R2; NIC Teaming for virtual machines is still a brand new feature. In this video; Michael Murphy demonstrates how to use the Server Manager to access the NIC Teaming option and configure it for virtual machines.
-
Configure NTFS Permissions
In Microsoft Windows Server 2012 R2; you need NTFS permissions to access any resources on the network. In this video; Michael Murphy demonstrates how to use the Security option to add domain local groups and assign them NTFS permissions.
-
Configure Quotas with FSRM
Microsoft Windows Server 2012 R2's File Server Resource Manager (FSRM) allows you to configure file quota options; as well as connect to an SMTP server. In this video; Michael Murphy uses the FSRM to define and save a quota as a template before creating and associating a quota with an SMTP server; facilitating e-mail notifications at warning and exceeded thresholds.
-
Configure RODC Replication Password Policies
Microsoft Windows Server 2012 R2 allows administrators to configure Password Replication policies to support read-only domain controllers. In this video; Michael Murphy demonstrates how to create a local group for the RODC site and configure a Password Replication policy for that group. He also prepopulates passwords for IT staff who may need local access should there be no Internet access.
-
Configure RRAS
Microsoft Windows Server 2012 R2 allows administrators to configure the Routing and Remote Access Service once it is installed. In this video; Michael Murphy demonstrates the options in the Getting Started Wizard for deploying DirectAccess and VPN on an edge and/or VPN server. For more advanced details; such as client configuration and server-side support; he recommends attending a 411 class.
-
Configure Share Permissions and Offline Files
In Microsoft Windows Server 2012 R2; you can make your resources available across the network by sharing folders on your file servers and providing offline file support. In this video; Michael Murphy demonstrates how to use the Advanced Sharing feature to specify your Caching options and give the Everyone group full control permissions.
-
Create a One Way Incoming Trust
As an administrator; Microsoft Windows Server 2012 R2 allows you to create one-way; incoming; trusts that allow users in your Windows Server domain to access resources in another Windows Server domain. In this video; Michael Murphy demonstrates how to configure a one-way; incoming; trust using the New Trust Wizard in the Active Domains and Trusts snap-in.
-
Create a One Way Outgoing Trust
As an administrator; Microsoft Windows Server 2012 R2 allows you to create one-way; outgoing; trusts that allow resources in your Windows Server domain to be accessed by users in another Windows Server domain. In this video; Michael Murphy demonstrates how to create a one-way; outgoing; trust using the New Trust Wizard in the Active Domains and Trusts snap-in.
-
Create a VHD_VHDX File
In addition to the legacy VHD files; you can now also create VHDX files in Microsoft Windows Server 2012 R2. In this video; Michael Murphy demonstrates how to use the New Virtual Hard Disk Wizard to create a VHDX file.
-
Create Active Directory Objects
Microsoft Windows Server 2012 R2's Active Directory Users and Computers (ADUC) console allows you to create user objects streamlining management. In this video; Michael Murphy demonstrates how to use the ADUC to build out and protect the components of your Active Directory (AD) Organizational Unit (OU) structure; as well as create and configure user objects with which to populate them.
-
Create Active Directory Objects Additional
Microsoft Windows Server 2012 R2's Active Directory Users and Computers (ADUC) console allows you to create user and computer objects. In this video; Michael Murphy demonstrates the similarities between the two objects; explores the Account properties of a user object which he places into a global group; and creates a computer object.
-
Create App Locker Policies
Microsoft Windows Server 2012 R2's AppLocker tool allows Volume License holders running Enterprise editions to specify and manage the applications that run on their networks. In this video; Michael Murphy uses Windows Server 2012 R2's Local Security Policy Manager to show you how to configure audits against application whitelists; generate default AppLocker rules; and create publisher rules.
-
Create Checkpoints
With the introduction of Microsoft Windows Server 2012 R2; Hyper-V snapshots have become checkpoints. In this video; Michael Murphy uses the Revert option to revert a virtual machine to its previous checkpoint.
-
Create PSO
Microsoft Windows Server 2012 R2 allows administrators to create multiple password policies within the same Active Directory domain. In this video; Michael Murphy demonstrates how to create a Password Settings object that applies to a subset of group members; and covers settings such as enforced password length; precedence value; and account lockout policy.
-
DHCP Management
Microsoft Windows Server 2012 R2 allows you to assign router addresses; WIN server addresses; and DNS server addresses by leveraging DHCP. In this video; Michael Murphy uses the DHCP Microsoft Management Console New Scope Wizard to create a new scope and configure additional options for DHCP clients.
-
DHCP Server Management
In Microsoft Windows Server 2012 R2; you can automate IP address assignments using DHCP. In this video; Michael Murphy demonstrates how to use the DHCP management console to specify the IPv4 scope; client addresses; subnet mask; excluded IP addresses; and lease durations.
-
DNS Add Forwarders and Conditional Forwarders
Microsoft Windows Server 2012 R2 allows administrators to add forwarders and conditional forwarders to integrate internal DNS with a public or partner organization's DNS. In this video; Michael Murphy demonstrates how to specify a forwarder to Google DNS for public name resolution; and a conditional forwarder to a partner organization to resolve.
-
DNS Create a Forward Lookup Zone
In Microsoft Windows Server 2012 R2; you use the DNS Manager console to accomplish many tasks. In this video; Michael Murphy uses the DNS Manager console to create a Forward Lookup Zone which provides computer names to IP address mapping within DNS servers.
-
DNS Create a Forward Lookup Zone Additional
Microsoft Windows Server 2012 R2 allows you to create and use Active Directory-integrated Forward Lookup Zones. In this video; Michael Murphy uses the DNS Manager's New Zone Wizard to create an Active Directory-integrated Forward Lookup Zone; explaining the available configuration options.
-
DNS Create a Reverse Lookup Zone
In Microsoft Windows Server 2012 R2; the Active Directory Promotion Wizard only adds the Forward Lookup Zone when creating a domain; requiring you to add a Reverse Lookup Zone manually. In this video; Michael Murphy demonstrates how to create a Reverse Lookup Zone on your domain controllers acting as DNS servers.
-
DNS Global Name Zones
Microsoft Windows Server 2012 R2 provides configuration options to allow for single-label lookups across multi-domain infrastructures. In this video; Michael Murphy demonstrates how to configure a global name zone for this purpose.
-
DNS Record Types
Microsoft Windows Server 2012 R2 uses multiple types of DNS record to map computers names to their IP addresses and vice versa. In this video; Michael Murphy uses the DNS Manager to provide a comprehensive and detailed overview of multiple types of DNS record and their components; explaining the role of each.
-
Domain Controller Promotion at Forest Root Domain Controller
Microsoft Windows Server 2012 R2 allows you to create a Forest Root Domain Controller. In this video; Michael Murphy demonstrates how to create a new Active directory forest and configure a Forest Root Domain Controller for the first time.
-
Examine Advanced DNS Server Configuration Options
Microsoft Windows Server 2012 R2 provides administrators with a number of advanced configuration settings for DNS servers. In this video; Michael Murphy discusses BIND secondaries; round robin; netmask ordering; DNSSEC validation for remote responses; secure caching against pollution; and automatic scavenging of stale records.
-
Examine DNS Records
Microsoft Windows Server 2012 R2 provides configuration options to examine DNS records. In this video; Michael Murphy demonstrates how to configure the properties for a Start of Authority DNS record.
-
Examine Win Deployment Services and Configure Server Properties
In Microsoft Windows Server 2012 R2; you can add images and configure the Windows Deployment Services (WDS) server. In this video; Michael Murphy demonstrates how to use the WDS management console to access the properties and configuration of WDS.
-
Grant Resource Access to the Trusted Domain
As an administrator; Microsoft Windows Server 2012 R2 allows you to easily grant resource access to users from a trusted remote domain once the necessary trusts have been configured. In this video; Michael Murphy uses the Security tab in the Properties dialog box to locate a trusted domain and assign share permissions to the domain users.
-
Group Policy Preferences
Microsoft Windows Server 2012 R2 allows administrators to use Group Policy Preferences as a replacement for manual or script-based configuration of client-side settings on each machine. Preferences can be changed by the user; whereas policies cannot. In this video; Michael Murphy demonstrates how to configure preferences for ordinary users and for IT staff.
-
Install a Read Only Domain Controller
Microsoft Windows Server 2012 R2 allows administrators to install a read-only domain controller (RODC) in low-security environments; which provides authentication and authorization but doesn't maintain user passwords. In this video; Michael Murphy demonstrates how to configure an RODC so that the only passwords it maintains belong to onsite users and IT personnel; not the entire domain.
-
Install and Configure SMTP Service
In Microsoft Windows Server 2012 R2; you must run a virtual SMTP server on your servers to enable alert notifications. In this video; Michael Murphy demonstrates how to use the Add Roles and Features Wizard to install and configure the SMTP service.
-
Install and Configure WDS
In Microsoft Windows Server 2012 R2; you can automate the process of operating system deployments to clients using Windows Deployment Services (WDS). In this video; Michael Murphy demonstrates how to use the Add Roles and Features Wizard to install and configure WDS.
-
Install FSRM
Microsoft Windows Server 2012 R2 helps you to manage your storage with the File Server Resource Manager. In this video; Michael Murphy demonstrates how to use File Server Resource Manager to define storage capacities; file expirations; notifications; and reports.
-
Install Server 2012 R2 in the GUI
Microsoft Windows Server 2012 R2 also has a Datacenter edition. In this video; Michael Murphy demonstrates how to use the traditional setup utilities to install a Windows Server 2012 R2 Datacenter edition in the GUI.
-
Install Server for NFS
If you're supporting Linux clients using Microsoft Windows Server 2012 R2; you need to support their connections to your Windows file servers using the Network File System. In this video; Michael Murphy demonstrates how to install Server for NFS and looks at the various settings available.
-
Install the RRAS Role
Microsoft Windows Server 2012 R2 allows administrators to install the Remote Access role; which has three role services: DirectAccess and VPN (RRAS); Routing; and Web Application Proxy. In this video; Michael Murphy demonstrates how to install the Remote Access role; which is no longer included in Network Policy Services; and has an interface similar to RRAS in Windows Server 2003.
-
Install the Web App Proxy
Brand new in Microsoft Windows Server 2012 R2 is the Web Application Proxy; which is an integrated component of Active Directory Federation Services. In this video; Michael Murphy demonstrates how to use the Add Roles and Features Wizard to install the Web Application Proxy.
-
Install Windows Server Backup Feature
When using Microsoft Windows Server 2012 R2; you can use the Microsoft Backup Solution for performing backups. In this video; Michael Murphy demonstrates how to install the Windows Server Backup feature; run the utility; and schedule a Full server backup.
-
Intro to Group Policy
Microsoft Windows Server 2012 R2 provides the Group Policy feature to save administrators time when configuring user and computer environments. In this video; Michael Murphy introduces the Group Policy Management Console that administrators use to work with all user and computer configurations from a central location; as well as the Group Policy Editor used to enable and disable individual policies.
-
Kerberos Policy Settings
Microsoft Windows Server 2012 R2 allows administrators to configure Kerberos policy settings in Group Policy. In this video; Michael Murphy demonstrates how to change the maximum tolerance for computer clock synchronization and briefly discusses the other settings. He warns that these settings should; in fact; never be changed.
-
Monitor Servers Data Collector Sets
In Microsoft Windows Server 2012 R2; you have pre-defined counters that you can use as baselines to understand how your servers are performing. In this video; Michael Murphy demonstrates how to use Data Collector Sets to identify bottlenecks on your servers.
-
Monitor Servers Performance Monitor
In Microsoft Windows Server 2012 R2; you can monitor your servers and clients in real-time. In this video; Michael Murphy demonstrates how to use the Performance Monitor to set a baseline and monitor the percentage processor and user time.
-
Monitoring Servers and Configuration Alerts
In Microsoft Windows Server 2012 R2; you can monitor your server's performance and be alerted should performance levels exceed a certain threshold. In this video; Michael Murphy demonstrates how to configure performance alerts for different subsystems in a New User Defined Data Collector Set created to collect Performance counter data.
-
NTFS File Permissions
Microsoft Windows Server 2012 R2 facilitates Microsoft role-based access control best practices; summarized as "Accounts go into Global; Global go into Domain Local; Domain Local get Permissions" (AGDLP). In this video; Michael Murphy uses File Explorer ADUC console to illustrate how permissions - assigned to Domain Local groups in which Global groups containing Accounts are nested - are inherited.
-
Recover from the Loss of a RODC
In Microsoft Windows Server 2012 R2; read-only domain controllers (RODC) can be used where security is a concern; providing options to easily recover from the forced removal of an RODC. In this video; Michael Murphy demonstrates how to use the Deleting Domain Controller dialog box to clean up metadata in the event of an RODC being stolen or compromised.
-
Storage Quality of Service
In Microsoft Windows Server 2012 R2; you can use the Storage Quality of Service feature to optimize and maximize the IOPS of your virtual hard disk. In this video; Michael Murphy uses the Advanced Features option to define the minimum and maximum number of IOPS.
-
Use FSRM to Configure File Management Tasks
In Microsoft Windows Server 2012 R2; you can automate the cleaning out of files from directories with File Management Tasks. In this video; Michael Murphy demonstrates how to use the File Server Resource Manager to create and configure a file management task.
-
Use FSRM to Configure Quotas
In Microsoft Windows Server 2012 R2; you can define storage quotas for your users. In this video; Michael Murphy demonstrates how to use the File Server Resource Manager console to configure storage quotas and to e-mail users when they exceed their quotas.
-
User Account Control
After watching this video; you will be able to describe UAC.
-
Using TSRM to Configure File Screens
In Microsoft Windows Server 2012 R2; you can use file screens to ensure that users save files that are allowed on your network. In this video; Michael Murphy uses the File Screening Management option to explore file groups and file screen templates; as well as create a file screen.
-
Validate Domain Controller Promotion
Microsoft Windows Server 2012 R2's DNS Manager and NetLogon service allows you to validate and promote the installation of domain controllers. In this video; Michael Murphy uses the DNS Manager to show you how to review your domain controllers; access their service locator records in the File System; and use the NetLogon service to reregister their service records in DNS.
-
Virtual Switch Manager
In Microsoft Windows Server 2012 R2; you can create different types of virtual switches. In this video; Michael Murphy uses the Virtual Switch Manager option to explore external; internal; and private virtual switches.
-
WDS Configure Multicast Transmissions
In Microsoft Windows Server 2012 R2; you can use multicast transmissions to minimize your network bandwidth. In this video; Michael Murphy demonstrates how to use the Windows Deployment Services console to configure a multicast transmission.
-
Work Folders Server Configuration
Microsoft Windows Server 2012 R2 provides a more secure and flexible remote access solution incorporating a brand new technology called Work Folders. In this video; Michael Murphy demonstrates how to use the New Sync Share Wizard to configure Work Folders.
-
Work with Certificate Templates
In Microsoft Windows Server 2012 R2; the certificates deployed to users and computers are based on certificate templates provided by the Microsoft Corporation. In this video; Michael Murphy demonstrates how to work with certificate templates as well as how to create and define custom templates.
-
WSUS Client Configuration
In Microsoft Windows Server 2012 R2; you need to configure the settings for WSUS servers and clients separately. In this video; Michael Murphy demonstrates how to use the Group Policy Management Editor to configure the WSUS client-side settings.
-
WSUS Server Configuration
By using Windows Software Update Services (WSUS) server; you can schedule and download updates for your Microsoft Windows Server 2012 R2 machine. In this video; Michael Murphy demonstrates how to use the Windows Server Update Services Configuration Wizard to configure the (WSUS) server.
-
Active Directory Domain Services (AD DS) New Features
After watching this video; you will be able to describe the new features of Active Directory Domain Services (AD DS) available in Windows Server 2016 Technical Preview.
-
Active Directory Federation Services New Features
After watching this video; you will be able to describe the new features of Active Directory Federation Services (AD FS) available in Windows Server 2016 Technical Preview.
-
Antimalware
After watching this video; you will be able to use Microsoft Windows Server Technical Preview Antimalware in Windows Server 2016 Technical Preview.
-
DHCP and DNS
After watching this video; you will be able to recall new or changed functionality of Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) in Windows Server 2016 Technical Preview.
-
IP Address Management (IPAM)
After watching this video; you will be able to describe pending new or changed functionality of IP Address Management (IPAM) in Windows Server 2016 Technical Preview.
-
Known Issues in Windows Server 2016 Technical Preview
After watching this video; you will be able to identify known issues and workarounds in Windows Server 2016 Technical Preview.
-
Nano Server
After watching this video; you will be able to recall the functionality and advantages of Nano Server and GUI-less Server Core installation options in Windows Server 2016 Technical Preview.
-
Other Hyper-V New Features and Improvements
After watching this video; you will be able to identify new features and functionality of Integration Services for Windows Update; hot add and remove for network adapters and memory; Linux secure boot; and compatibility with Connected Standby in Windows Server 2016 Technical Preview.
-
Overview of Windows Server 2016 Technical Preview
After watching this video; you will be able to recognize new and enhanced features of Windows Server 2016 Technical Preview.
-
Production Checkpoints and Hyper-V Manager Improvements
After watching this video; you will be able to describe the functionality of Production Checkpoints and identify Hyper-V Manager improvements in Windows Server 2016 Technical Preview.
-
Remote Desktop Services
After watching this video; you will be able to describe the improved experience provided by updates to Remote Desktop Services in Windows Server 2016 Technical Preview.
-
Removed or Deprecated Features and Functionality
After watching this video; you will be able to list features and functionality that have been removed or deprecated in Windows Server 2016 Technical Preview.
-
Storage Spaces Direct
After watching this video; you will be able to identify capabilities of Storage Spaces Direct in Windows Server 2016 Technical Preview.
-
System and Installation Requirements
After watching this video; you will be able to identify the appropriate system and installation requirements for Windows Server 2016 Technical Preview.
-
Virtual Machine Configuration Version and File Format
After watching this video; you will be able to recall new features of Hyper-V Virtual Machine Configuration Version and File Format in Windows Server 2016 Technical Preview.
-
Accessing Your PowerShell Command History
Windows PowerShell keeps track of executed commands in its history. In this video; Tim Warner demonstrates how to use PowerShell history cmdlets to view; run; add; and clear commands from the PowerShell session history.
-
Cmdlet Structure
Windows PowerShell cmdlets are task-oriented; parameterized commands. In this video; Tim Warner explores the standardized structure used by PowerShell cmdlets.
-
Creating Your Own Aliases I
In this video; Tim Warner demonstrates how to access and decipher Windows PowerShell aliases for PS101.
-
Creating Your Own Aliases II
In this video; Tim Warner demonstrates how to retrieve and sort aliases in Windows PowerShell for PS101.
-
Creating Your Own Aliases III
In this video; Tim Warner demonstrates how to create custom aliases in Windows PowerShell for PS101.
-
Determining Your PowerShell Version I
Each version of Windows requires a specific version of PowerShell. In this video; Tim Warner explains how to determine and access the correct version of Windows PowerShell.
-
Determining Your PowerShell Version II
Windows PowerShell allows administrators to enable automation within the Windows operating system. In this video; Tim Warner explains how to access Windows PowerShell information.
-
Differentiating Snap-in and Modules
In this video; Tim Warner discusses snap-ins and modules in Windows PowerShell.
-
Discovering and Accessing Providers I
In this video; Tim Warner discusses discovering and accessing providers in Windows PowerShell for PS101.
-
Discovering and Accessing Providers II
In this video; Tim Warner demonstrates discovering and accessing Windows PowerShell providers for PS101.
-
Discovering and Accessing Providers III
In this video; Tim Warner demonstrates discovering and accessing Windows PowerShell providers for PS101.
-
Discovering and Accessing Providers IV
In this video; Tim Warner demonstrates discovering and accessing Windows PowerShell providers for PS101.
-
Discovering and Accessing Providers V
In this video; Tim Warner demonstrates discovering and accessing Windows PowerShell providers for PS101.
-
Discovering New Commands
Windows PowerShell contains many customized task automation and configuration management commands. In this video; Tim Warner explores these new PowerShell commands.
-
Discovering Object Members I
In this video; Tim Warner demonstrates discovering object members in PowerShell for PS101.
-
Discovering Object Members II
In this video; Tim Warner demonstrates discovering object members in Windows PowerShell for PS101.
-
Discovering Object Members III
In this video; Tim Warner demonstrates discovering object members in Windows PowerShell for PS101.
-
Discovering Object Members IV
In this video; Tim Warner demonstrates discovering object members in Windows PowerShell for PS101.
-
Discovering Object Members V
In this video; Tim Warner demonstrates discovering object members in Windows PowerShell for PS101.
-
Discovering Windows PowerShell Commands I
Windows PowerShell offers a number of options for managing the environment in which services run. In this video; Tim Warner reviews PowerShell configuration and update commands.
-
Discovering Windows PowerShell Commands II
In Windows PowerShell; the Tab key can be used to automatically complete entries for cmdlets; file paths; parameters; and other values. In this video; Tim Warner demonstrates using tab completion.
-
Enabling Windows PowerShell Remoting
In this video; Tim Warner discusses how to enable Windows PowerShell remoting.
-
Familiar Commands in Windows PowerShell
Windows PowerShell uses a model that supports many standard shell commands. In this video; Tim Warner explores the use of familiar commands in Windows PowerShell.
-
For Further Learning
There are many resources available to help programmers and administrators master Windows PowerShell. In this video; Tim Warner reveals how to find and access useful PowerShell resources.
-
Formatting Windows PowerShell Output I
In this video; Tim Warner discusses formatting output in Windows PowerShell for PS101.
-
Formatting Windows PowerShell Output II
In this video; Tim Warner discusses formatting output in Windows PowerShell for PS101.
-
Formatting Windows PowerShell Output III
In this video; Tim Warner discusses formatting Windows PowerShell output. This is part three of a three-part series titled "PS101 Formatting Windows PowerShell Output."
-
Modules and Customization I
In this video; Tim Warner discusses modules and how to customize the Windows PowerShell console. This is part one of an eight-part series.
-
Modules and Customization II
In this video; Tim Warner discusses modules and how to customize the Windows PowerShell console. This is part two of an eight-part series.
-
Modules and Customization III
In this video; Tim Warner discusses modules and how to customize the Windows PowerShell console. This is part three of an eight-part series.
-
Modules and Customization IV
In this video; Tim Warner discusses modules and how to customize the Windows PowerShell console. This is part four of an eight-part series.
-
Modules and Customization V
In this video; Tim Warner discusses modules and how to customize the Windows PowerShell console. This is part five of an eight-part series.
-
Modules and Customization VI
Modules are a way of packaging Windows PowerShell scripts and cmdlets. In this video; Tim Warner discusses modules and how to customize line breaks and other properties. This is part six of an eight-part series.
-
Modules and Customization VII
A operator is one or more characters in a command or expression that Windows PowerShell interprets in a specific way. In this video; Tim Warner discusses modules and how to use Windows PowerShell comparison; -like; and other operators. This is part seven of an eight-part series.
-
Modules and Customization VIII
Windows PowerShell regular expressions are used to look inside files and to find matches. In this video; Tim Warner discusses modules and how to use \ (backslash) and other regular expressions. This is part eight of an eight-part series.
-
One-to-Many Remoting I
In this video; Tim Warner discusses one-to-many remoting in Windows PowerShell. This is part one of a four-part series.
-
One-to-Many Remoting II
In this video; Tim Warner discusses one-to-many remoting in Windows PowerShell. This is part two of a four-part series.
-
One-to-Many Remoting III
In this video; Tim Warner discusses one-to-many remoting in Windows PowerShell. This is part three of a four-part series.
-
One-to-Many Remoting IV
In this video; Tim Warner discusses one-to-many remoting in Windows PowerShell. This is part four of a four-part series.
-
One-to-One Remoting I
In this video; Tim Warner discusses one-to-one remoting in Windows PowerShell. This is part one of a two-part series.
-
One-to-One Remoting II
In this video; Tim Warner discusses one-to-one remoting in Windows PowerShell. This is part two of a two-part series.
-
Other Windows PowerShell Host Applications
The Windows PowerShell engine can be hosted by a number of tools. In this video; Tim Warner explores various host applications for Windows PowerShell.
-
Playing with Snap-ins and Modules
In this video; Tim Warner discusses how to use snap-ins and modules in Windows PowerShell.
-
Saving Your Custom Aliases
In this video; Tim Warner demonstrates how to save custom aliases in Windows PowerShell for PS101.
-
Sorting Pipeline Output
In this video; Tim Warner discusses sorting pipeline output in Windows PowerShell for PS101.
-
Taking Action on Objects
In this video; Tim Warner demonstrates taking action on objects in Windows PowerShell for PS101.
-
The Windows PowerShell ISE I
The Windows PowerShell Integrated Scripting Environment (ISE) is a development and learning environment for Windows PowerShell. In this video; Tim Warner introduces and explains the purpose of PowerShell ISE.
-
The Windows PowerShell ISE II
The Windows PowerShell Integrated Scripting Environment (ISE) is a graphic-based user interface for Windows PowerShell. In this video; Tim Warner demonstrates the use of PowerShell ISE.
-
Understanding PowerShell Help File Syntax I
Windows PowerShell has an extensive console-based help system. In this video; Tim Warner explores the syntax used in PowerShell help files.
-
Understanding PowerShell Help File Syntax II
Windows PowerShell Help organizes Help functions into a simple graphical layout. In this video; Tim Warner examines the command syntax used in the PowerShell Help function.
-
Understanding PowerShell Help File Syntax III
PowerShell Help can be customized using a defined syntax. In this video; Tim Warner will explore the standardized structure used by Windows PowerShell elements.
-
Understanding the Help System
In this video; Tim Warner explains how to understand the Windows PowerShell help system for PS101.
-
Updating Help
The Windows PowerShell Update-Help cmdlet downloads and updates help files for PowerShell modules. In this video; Tim Warner demonstrates how to update help files on online and offline systems.
-
What are Providers?
In this video; Tim Warner explains what providers are in Windows PowerShell for PS101.
-
What are Windows PowerShell Commands?
Cmdlets are specialized commands used to call and execute commands in Windows PowerShell. In this video; Tim Warner explores the use of cmdlets in the Windows PowerShell environment.
-
What is an Alias?
In this video; Tim Warner describes the function of Windows PowerShell aliases for PS101.
-
What is the Pipeline?
In this video; Tim Warner describes the concept and function of the pipeline in Windows PowerShell for PS101.
-
What is Windows PowerShell?
Windows PowerShell is a Microsoft task automation and configuration management framework. In this video; Tim Warner provides an introduction to using and configuring Windows PowerShell.
-
Why Learning Windows PowerShell is Crucial
Windows PowerShell is a strategic task automation and configuration management framework. In this video; Tim Warner outlines the importance of learning Windows PowerShell.
-
Windows Management Framework (WMF)
Windows Management Framework (WMF) can be used to update Windows PowerShell. In this video; Tim Warner demonstrates how to download and install WMF from the Microsoft Download Center.
-
Windows PowerShell Global Suggestions
Windows PowerShell uses a scripting language designed especially for system administration. In this video; Tim Warner relates PowerShell tips and tricks for controlling and automating administrative commands.
-
Windows PowerShell Gotchas and Points to Ponder
In this video; Tim Warner discusses pitfalls common to working with remote PowerShell sessions and offers advice for avoiding them.
-
Windows PowerShell Remoting Architecture I
In this video; Tim Warner discusses Windows PowerShell Remoting Architecture. This is part one of a two-part series.
-
Windows PowerShell Remoting Architecture II
In this video; Tim Warner discusses Windows PowerShell remoting architecture. This is part two of a two-part series.
-
Windows PowerShell Scripting Best Practices
Windows PowerShell is a capable and robust professional scripting environment. In this video; Tim Warner outlines best practices for scripting in PowerShell.
-
Windows PowerShell Version History
Windows PowerShell was first releases for the Windows operating system in 2006. In this video; Tim Warner relates the history and development of Window PowerShell along with other Windows components.
-
Windows PowerShell vs. cmd.exe
Newer Windows operating systems contain both cmd.exe and Windows PowerShell. In this video; Tim Warner compares the uses of Windows PowerShell and cmd.exe as command shells.
-
Adding Apps from the SharePoint Store (Part 1)
After watching this video; you will be able to describe the distribution of apps via stores.
-
Adding Apps from the SharePoint Store (Part 2)
After watching this video; you will be able to add an app from the SharePoint Store.
-
Adding Columns
After watching this video; you will be able to add a column to a custom list.
-
Adding Logic
After watching this video; you will be able to describe the process of adding logic to a workflow.
-
Adding Publishing Pages
After watching this video; you will be able to add a Publishing page to a SharePoint 2013 site.
-
Adding Subsites (Part 1)
After watching this video; you will be able to identify the considerations when adding a SharePoint 2013 site.
-
Adding Subsites (Part 2)
After watching this video; you will be able to create a new SharePoint 2013 subsite.
-
Adding Web Part Pages
After watching this video; you will be able to add a Web Part to a page to a SharePoint 2013 site.
-
Adding Wiki Pages
After watching this video; you will be able to add a Wiki page to a SharePoint 2013 site.
-
Appreciating Social Computing
After watching this video; you will be able to recognize how social computing benefits the business environment.
-
Becoming a Site Owner
After watching this video; you will be able to describe considerations when setting up a new SharePoint 2013 site.
-
Branding the Look and Feel
After watching this video; you will be able to change the look of a SharePoint 2013 site.
-
Breaking and Inheriting Permissions (Part 1)
After watching this video; you will be able to describe the considerations when setting up permissions.
-
Breaking and Inheriting Permissions (Part 2)
After watching this video; you will be able to set up unique permissions on a document.
-
Building SharePoint Infrastructure in SharePoint Designer
After watching this video; you will be able to use SharePoint Designer to build a SharePoint infrastructure.
-
Checking Files Out and In
After watching this video; you will be able to check out a SharePoint 2013 file.
-
Common Homepage Attributes
After watching this video; you will be able to recognize the key homepage editing features.
-
Comparing Site Columns and List Columns (Part 1)
After watching this video; you will be able to compare site columns and list columns.
-
Comparing Site Columns and List Columns (Part 2)
After watching this video; you will be able to edit a site column at the global level.
-
Comparing Team Sites and Publishing Portals (Part 1)
After watching this video; you will be able to describe the purpose of team sites and Publishing Portals.
-
Comparing Team Sites and Publishing Portals (Part 2)
After watching this video; you will be able to describe the team site default home page.
-
Comparing Team Sites and Publishing Portals (Part 3)
After watching this video; you will be able to compare team sites and publishing portals features.
-
Completing the Process
After watching this video; you will be able to describe the tasks involved when completing a workflow process.
-
Configuring List Searches
After watching this video; you will be able to configure a list search.
-
Configuring Query Rules
After watching this video; you will be able to configure a query rule.
-
Configuring Searchable Columns
After watching this video; you will be able to describe how search options can be used to change search visibility.
-
Configuring the Content Organizer (Part 1)
After watching this video; you will be able to describe the benefits of configuring the Content Organizer.
-
Configuring the Content Organizer (Part 2)
After watching this video; you will be able to describe Content Organizer settings.
-
Connect Other SharePoint Lists to Outlook
After watching this video; you will be able to connect SharePoint 2013 Contacts to Outlook.
-
Connecting and Exporting SharePoint to Microsoft Office (Part 1)
After watching this video; you will be able to describe the integration of SharePoint with Microsoft Office.
-
Connecting and Exporting SharePoint to Microsoft Office (Part 2)
After watching this video; you will be able to export a SharePoint 2013 site to Microsoft Office.
-
Connecting SharePoint to Outlook
After watching this video; you will be able to connect SharePoint 2013 to Outlook.
-
Contributing to Document Libraries
After watching this video; you will be able to contribute to a SharePoint 2013 document library.
-
Creating and Managing Alerts
After watching this video; you will be able to create a SharePoint 2013 alert.
-
Creating and Managing Announcements
After watching this video; you will be able to create a SharePoint 2013 announcement.
-
Creating and Managing Calendar Events and Contacts
After watching this video; you will be able to create a SharePoint 2013 calendar event.
-
Creating and Managing Discussions Boards and Threads
After watching this video; you will be able to create a SharePoint 2013 discussion board.
-
Creating and Managing Links
After watching this video; you will be able to create a SharePoint 2013 link.
-
Creating and Managing Tasks
After watching this video; you will be able to create a SharePoint 2013 task.
-
Creating and Modifying Views (Part 1)
After watching this video; you will be able to compare SharePoint 2013 Public and Personal views.
-
Creating and Modifying Views (Part 2)
After watching this video; you will be able to create a SharePoint 2013 view.
-
Creating and Modifying Views (Part 3)
After watching this video; you will be able to change a SharePoint 2013 view format setting.
-
Creating Document Workspaces
After watching this video; you will be able to create a Document Workspace.
-
Creating Lists and Libraries (Part 1)
After watching this video; you will be able to describe the available SharePoint 2013 list and library templates.
-
Creating Lists and Libraries (Part 2)
After watching this video; you will be able to create a custom SharePoint 2013 list.
-
Deleting and Recovering Lists and Libraries
After watching this video; you will be able to recover a SharePoint 2013 list in a given scenario.
-
Deleting Items
After watching this video; you will be able to delete a SharePoint 2013 item.
-
Deleting Subsites
After watching this video; you will be able to delete a SharePoint 2013 subsite.
-
Developing KQL Queries for SharePoint Searches
After watching this video; you will be able to describe the features of KQL queries in SharePoint 2013.
-
Developing Reusable Workflows (Part 1)
After watching this video; you will be able to develop a reusable workflow.
-
Developing Reusable Workflows (Part 2)
After watching this video; you will be able to describe the use of site workflows.
-
Developing Site Workflows
After watching this video; you will be able to identify the main purpose of a reusable workflow.
-
Developing Workflows
After watching this video; you will be able to describe the process of defining the workflow when developing a new workflow.
-
Editing Workflows
After watching this video; you will be able to edit a workflow process in a given scenario.
-
Embedding Code Snippets of Banners
After watching this video; you will be able to embed a snippet into a SharePoint 2013 page.
-
Enhancing Mobile Device Access
After watching this video; you will be able to enhance mobile device access in SharePoint 2013.
-
Enhancing Site Navigation
After watching this video; you will be able to recognize best practices and considerations for enhancing site navigation.
-
Explaining Types of SharePoint Apps
After watching this video; you will be able to describe the ways in which SharePoint apps can be implemented.
-
Exploring Enterprise Site Templates
After watching this video; you will be able to identify SharePoint 2013 enterprise site template types.
-
Exploring SharePoint 2010 OTB Workflows
After watching this video; you will be able to match the workflow type to its description.
-
Exploring SharePoint Editions
After watching this video; you will be able to describe the SharePoint editions available.
-
Exploring SharePoint Page Types (Part 1)
After watching this video; you will be able to match the SharePoint 2013 page templates with their descriptions.
-
Exploring SharePoint Page Types (Part 2)
After watching this video; you will be able to describe characteristics of the master page type.
-
Exploring SharePoint Site Templates
After watching this video; you will be able to identify SharePoint 2013 site template types.
-
Exploring Site Settings Options
After watching this video; you will be able to describe SharePoint 2013 Site Settings options.
-
Exploring the Newsfeed Page
After watching this video; you will be able to describe characteristics of a Newsfeed Page.
-
Exporting and Importing Web Parts
After watching this video; you will be able to import a SharePoint 2013 Web Part.
-
Following Content and People
After watching this video; you will be able to describe the types of content that can be followed.
-
Getting Started with SharePoint Designer
After watching this video; you will be able to describe the reasons for using SharePoint Designer 2013.
-
Granting Site Access
After watching this video; you will be able to grant site access to a user.
-
Implementing Advanced Searches
After watching this video; you will be able to identify options for implementing advanced searches.
-
Implementing Approval and Feedback Workflows (Part 1)
After watching this video; you will be able to identify the options available when implementing an Approval workflow or Collect Feedback workflow.
-
Implementing Approval and Feedback Workflows (Part 2)
After watching this video; you will be able to implement a workflow in a given scenario.
-
Implementing Search Site Templates
After watching this video; you will be able to implement a search site template.
-
Importing and Using 2010 Chart Web Parts
After watching this video; you will be able to import a SharePoint 2010 Chart Web Part.
-
Incorporating Additional Approval Settings
After watching this video; you will be able to describe the incorporation of additional work flow approval settings.
-
Introducing the New App Model
After watching this video; you will be able to describe key features of the new SharePoint 2013 app model.
-
Managing App Licenses and Removing Apps
After watching this video; you will be able to remove an app license.
-
Managing Apps in Site Contents (Part 1)
After watching this video; you will be able to describe the management of SharePoint 2013 apps.
-
Managing Apps in Site Contents (Part 2)
After watching this video; you will be able to remove an app from a site.
-
Managing Column Properties
After watching this video; you will be able to manage column properties in a given scenario.
-
Managing List and Library Settings
After watching this video; you will be able to recognize the common SharePoint list and library settings that can be changed.
-
Managing Pages
After watching this video; you will be able to identify ways in which SharePoint 2013 pages are managed.
-
Managing User Alerts
After watching this video; you will be able to configure an alert for a site user.
-
New and Improved in 2013
After watching this video; you will be able to identify the improvements in SharePoint 2013.
-
Opening and Editing Documents
After watching this video; you will be able to edit a SharePoint 2013 document.
-
Organizing Library Contents
After watching this video; you will be able to describe content organization approaches.
-
Overview of Common Permission Levels
After watching this video; you will be able to match common permission levels with their descriptions.
-
Overview of Permissions and Roles
After watching this video; you will be able to describe permission and role functions.
-
Overview of Roles (Part 1)
After watching this video; you will be able to describe the SharePoint governance team.
-
Overview of Roles (Part 2)
After watching this video; you will be able to describe the SharePoint administrator roles.
-
Overview of SharePoint Lists
After watching this video; you will be able to navigate SharePoint 2013 lists.
-
Overview of Users and Groups
After watching this video; you will be able to describe characteristics of users and groups.
-
Overview of Workflow Components (Part 1)
After watching this video; you will be able to describe the purpose of workflows.
-
Overview of Workflow Components (Part 2)
After watching this video; you will be able to describe the reasons why SharePoint Designer is the preferred authoring application for working with workflows.
-
Performing Search Administration
After watching this video; you will be able to identify how the search feature can be optimized.
-
Planning for SharePoint Workflows (Part 1)
After watching this video; you will be able to describe the use of business drivers and flowcharts when planning a SharePoint workflow.
-
Planning for SharePoint Workflows (Part 2)
After watching this video; you will be able to describe the use of the SharePoint infrastructure; workflows; and testing when planning a SharePoint workflow.
-
Recap Developing Workflows
After watching this video; you will be able to sequence the process steps of developing a workflow into the correct order.
-
Recognizing Common Administrative URLs
After watching this video; you will be able to recognize the common administrative SharePoint 2013 URLs.
-
Removing Content Types
After watching this video; you will be able to remove a content type from all lists.
-
Respecting the Object Hierarchy
After watching this video; you will be able to describe SharePoint 2013 object hierarchy.
-
Reviewing Permissions
After watching this video; you will be able to check user permissions.
-
Reviewing Search Results (Part 1)
After watching this video; you will be able to identify key search options available in SharePoint 2013.
-
Reviewing Search Results (Part 2)
After watching this video; you will be able to complete a site search in SharePoint 2013.
-
Reviewing Site Settings
After watching this video; you will be able to describe site actions and administrative settings available to site owners.
-
Reviewing the Hierarchy
After watching this video; you will be able to describe the hierarchy of SharePoint 2013 sites.
-
Routing Documents and Pages
After watching this video; you will be able to identify options for routing documents and pages.
-
Setting Up Common Navigation
After watching this video; you will be able to edit Quick Launch navigation for a site.
-
Setting Up the My Site Blog
After watching this video; you will be able to describe the use of the My Site blog.
-
SharePoint's Social Computing Features
After watching this video; you will be able to describe SharePoint's social computing features.
-
Sharing and Tracking Documents
After watching this video; you will be able to describe tracking tools in SharePoint 2013.
-
Touring the Interface (Part 1)
After watching this video; you will be able to navigate the SharePoint 2013 interface.
-
Touring the Interface (Part 2)
After watching this video; you will be able to describe the Quick Launch tool.
-
Understanding Content Structures and Template Types
After watching this video; you will be able to match the content structure and template types to their descriptions.
-
Understanding SharePoint
After watching this video; you will be able to identify the features of SharePoint.
-
Understanding SharePoint Permissions
After watching this video; you will be able to compare inherited and unique permissions.
-
Understanding the Hierarchy
After watching this video; you will be able to describe the SharePoint site hierarchy.
-
Updating Approval and Feedback Workflows
After watching this video; you will be able to modify an Approval workflow.
-
Updating the Team Site Home Page
After watching this video; you will be able to update a team site home page in a given scenario.
-
Updating User Profiles
After watching this video; you will be able to update a user profile.
-
Using Content Query Web Parts (Part 1)
After watching this video; you will be able to identify the characteristics of Content Query Web Parts.
-
Using Content Query Web Parts (Part 2)
After watching this video; you will be able to edit a Content Query Web Part in a given scenario.
-
Using Microblogging Features
After watching this video; you will be able to describe the benefits of microblogging features.
-
Using More SharePoint Libraries
After watching this video; you will be able to match the document library to a description of its use.
-
Using More View Features (Part 1)
After watching this video; you will be able to configure a SharePoint 2013 Web Part view.
-
Using More View Features (Part 2)
After watching this video; you will be able to create a link to a view.
-
Using My Site Tasks
After watching this video; you will be able to describe characteristics of My Site tasks.
-
Using Operators in Searches (Part 1)
After watching this video; you will be able to identify the different query operators that can be used with KQL elements.
-
Using Operators in Searches (Part 2)
After watching this video; you will be able to use an operator to complete a search in SharePoint 2013.
-
Using Property Restrictions in Searches
After watching this video; you will be able to describe how property restrictions are used to improve searches.
-
Using Quick Views and Default Views
After watching this video; you will be able to compare SharePoint 2013 Quick and Default views.
-
Using Social Collaboration Web Parts
After watching this video; you will be able to describe the Site Feed feature in the Social Collaboration Web Part.
-
Using the Design Manager
After watching this video; you will be able to describe how Design Manager is used in managing a site.
-
Using Three-State Workflows
After watching this video; you will be able to describe the function of the three-state workflow.
-
Using Web Parts (Part 1)
After watching this video; you will be able to identify characteristics of Web Parts pages.
-
Using Web Parts (Part 2)
After watching this video; you will be able to edit a SharePoint 2013 Web Part in a given scenario.
-
Utilizing OneDrive for Business
After watching this video; you will be able to describe the use of OneDrive for Business.
-
Utilizing the SharePoint Site Mailbox App
After watching this video; you will be able to describe benefits of the new SharePoint 2013 Site Mailbox app.
-
Viewing Popularity Trends; Usage Reports; and Most Popular Items (Part 1)
After watching this video; you will be able to describe SharePoint 2013 Popularity Trends and Most Popular Items new features.
-
Viewing Popularity Trends; Usage Reports; and Most Popular Items (Part 2)
After watching this video; you will be able to review usage reports in Excel for a specific item.
-
Working with Columns
After watching this video; you will be able to describe characteristics of SharePoint 2013 column settings.
-
Working with Content Types (Part 1)
After watching this video; you will be able to add a content type in a given scenario.
-
Working with Content Types (Part 2)
After watching this video; you will be able to modify a content type in SharePoint 2013.
-
Working with Document Sets
After watching this video; you will be able to compare SharePoint folders and Document Sets.
-
Working with Documents
After watching this video; you will be able to describe options for co-authoring a document.
-
Working with Excel Web Access Web Parts
After watching this video; you will be able to describe Excel Web Part features.
-
Working with Groups
After watching this video; you will be able to describe how groups work in SharePoint 2013.
-
Working with My Site Documents
After watching this video; you will be able to share a SharePoint 2013 document.
-
Working with Personal Web Sites
After watching this video; you will be able to add a library to a SharePoint 2013 My Site.
-
Working with Picture and Asset Libraries
After watching this video; you will be able to describe the use of the Picture and Asset libraries.
-
Working with Publishing Pages
After watching this video; you will be able to edit a publishing page in a given scenario.
-
Working with Wiki Page Libraries
After watching this video; you will be able to describe the use of the Wiki Page Library.
-
Excel Web Services
Microsoft SharePoint provides enterprise-level Web technologies for Intranet; document; and file management. In this video; Tim Warner discusses Excel Web Services in SharePoint.
-
About Certificate Exchange and Server-to-Server Trust
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Tim Warner discusses about certificate exchange and server-to-server trust on SharePoint 70-332.
-
About Farm Solutions
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Tim Warner describes farm solutions in SharePoint.
-
About SharePoint Integrations
Microsoft SharePoint provides enterprise-level Web technologies for Intranet; document; and file management. In this video; Tim Warner discusses SharePoint's integration with Microsoft Office 365; Exchange Online; and Lync Online.
-
About the Business Connectivity Service (BCS) Service Application
Business Connectivity Services provides the infrastructure that enables SharePoint 2013 to bring external data into a central system. In this video; Tim Warner will explain how Business Connectivity Services is used to bring that external data into SharePoint.
-
Authentication Providers
In Microsoft SharePoint Server 2013; claims authentication is the default mode. When migrating from SharePoint 2010 to 2013; it is best practice to covert web apps to claims beforehand. Or you can use Windows PowerShell to create a classic mode web app in 2013; perform migration; and then convert to claims. In this video; Tim Warner demonstrates the authentication process.
-
Backing up the Content Database
Microsoft SharePoint Server 2013 allows the migration of SharePoint 2010 content database backups using the SharePoint 2010 Management Shell. In this video; Tim Warner demonstrates how to change a SharePoint 2010 content database's authentication and back it up to the SharePoint 2013 farm server.
-
BCS Models
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran explains the relationship between Business Connectivity Services (BCS) and external content types in SharePoint.
-
BCS Permissions
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran demonstrates how to assign Metadata Store permissions in SharePoint.
-
BI Relationships
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran explains how business intelligence tools in SharePoint aggregate raw data into usable chunks.
-
BI Security
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran describes how to address security issues for business intelligence in SharePoint.
-
Certificate Exchange and Server-to-Server Trusts Examined
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Tim Warner provides a demonstration of certificate exchange and server-to-server trusts on SharePoint 70-332.
-
Common Service Applications and Their Functions
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Tim Warner summarizes common service applications and their functions in SharePoint Server 2013.
-
Configuring a BI Infrastructure
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran discusses configuring a BI infrastructure on SharePoint 70-332.
-
Configuring BCS for Search
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran explains how to configure SharePoint search for external content types.
-
Configuring BCS Model Security
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran demonstrates how to configure permissions for an external content type in SharePoint.
-
Configuring Office Web Apps 2013 I
In this video; Tim Warner begins a demonstration of deploying Office Web App (OWA) Server 2013.
-
Configuring Office Web Apps 2013 II
In this video; Tim Warner completes a demonstration of configuring Office Web App (OWA) server 2013.
-
Configuring the SharePoint-Exchange Server Integration
Microsoft SharePoint provides enterprise-level Web technologies for Intranet; document; and file management. In this video; Tim Warner discusses how to configure the integration between SharePoint Server 2013 and Exchange Server 2013.
-
Content Deployment
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran explains Content Deployment.
-
Content Deployment Examined
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran explains the options available for Content Deployment.
-
Content Recovery Strategies
In Microsoft SharePoint Server 2013; there are granular restore options available with attached SQL content databases that are unattached to SharePoint. You can choose to recover only an entire site collection or only a list in a subsite. In this video; Jacob Moran demonstrates how to create a database snapshot and recover content data from an unattached database.
-
Creating a SharePoint Farm Inventory
Microsoft SharePoint Server 2013's upgrade process is facilitated by the creation of SharePoint 2010 farm inventories. In this video; Tim Warner demonstrates how to use PowerShell cmdlets to create a farm inventory; before reviewing the source farm's content and service applications from within SharePoint 2010.
-
Creating Secure Store Target Applications
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran demonstrates how to configure a Secure Store Target Application in SharePoint.
-
Creating the App Catalog
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies on which SharePoint depends. In this video; Tim Warner explains the purpose of an App Catalog.
-
Deploying Apps in SharePoint Server 2013 on Premises I
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies on which SharePoint depends. In this video; Tim Warner demonstrates key steps in deploying apps in SharePoint.
-
Deploying Apps in SharePoint Server 2013 on Premises II
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies on which SharePoint depends. In this video; Tim Warner demonstrates key steps in deploying apps in SharePoint.
-
Deploying Apps in SharePoint Server 2013 on Premises III
In this video; Tim Warner demonstrates how to add an app from the SharePoint app store.
-
Deploying Apps in SharePoint Server 2013 on Premises IV
In this video; Tim Warner explains how a SharePoint app developed in Visual Studio can be deployed.
-
Deploying Apps in SharePoint Server 2013 on Premises V
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies on which SharePoint depends. In this video; Tim Warner demonstrates key steps in deploying apps in SharePoint.
-
Deploying Farm Solutions
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Tim Warner explains how to deploy farm solutions in SharePoint.
-
Deploying SharePoint Features
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Tim Warner explores how to deploy a SharePoint feature.
-
Deploying the Secure Store Service
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Tim Warner explains how to deploy the Secure Store service application in SharePoint Server 2013.
-
Distributed Cache Management
Microsoft SharePoint Server 2013 allows administrators to manage the Distributed Cache service; enabled by default; to provide caching functionality for key SharePoint features. In this video; Jacob Moran demonstrates how to prevent registering a server as a distributed cache host; and how to stop; remove; and add an instance of a Distributed Cache service using PowerShell cmdlets.
-
eDiscovery Center
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. eDiscovery is the process of searching for and exporting electronic information that can be used as evidence. In this video; Jacob Moran discusses the eDiscovery Center in SharePoint 2013.
-
Evaluation Site Collection Upgrades
Microsoft SharePoint Server 2013 allows site collection administrators (SCAs) to create evaluation site collections to let users become familiar with the new interface. These site collections are destroyed after the trial period and any data is lost. You can restrict SCAs from creating evaluation sites by leveraging PowerShell. In this video; Tim Warner discusses site collection upgrades.
-
External Content Types
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran demonstrates how to create external content types that enable users to work with external data from inside SharePoint sites.
-
Federating SharePoint Service Applications Examined
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Tim Warner provides a demonstration of federating SharePoint service applications on SharePoint 70-332.
-
File Backups
File-based backups need to be included in your Microsoft SharePoint Server 2013 disaster and recovery plan to allow files outside of the back-end databases; such as certificates and customization packages; to be accounted for in your backup. In this video; Jacob Moran demonstrates the need for file-based backups.
-
Getting Sandboxed Solutions Running
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Tim Warner describes the process to get sandbox solutions running and explains sandbox quotas.
-
High Availability in SharePoint 2013
In Microsoft SharePoint Server 2013; you can ensure that sites are functioning correctly and have adequate availability or uptime. In this video; Jacob Moran demonstrates how to ensure high availability by managing network uptime; minimizing failures; and understanding the importance of network infrastructure.
-
How SharePoint Federation Works
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Tim Warner will explain how federation works in a SharePoint service application.
-
Implementing Farm Solutions
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Tim Warner deploys a farm solution in SharePoint 2013.
-
Implementing Sandboxed Solutions
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Tim Warner shows how sandboxed code works in SharePoint Server 2013.
-
Implementing SharePoint Service Application Federation
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends.In this video; Tim Warner will explain how to implement SharePoint service application federation.
-
Index Freshness
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran discusses how to achieve index freshness on SharePoint.
-
Investigating Project Server 2013
Microsoft SharePoint provides enterprise-level Web technologies for Intranet; document; and file management. In this video; Tim Warner demonstrates how to install Project Server 2013 to a SharePoint farm.
-
Large Document Repositories
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran discusses large document repositories in SharePoint 2013.
-
Live Migration
Microsoft SharePoint Server 2013 supports the Hyper-V live migration feature that allows administrators to move virtual machines (VMs) between clustered and non-clustered servers without noticeable service interruption. In this video; Jacob Moran demonstrates how virtualization and live migration provide high availability in the SharePoint 2013 environment.
-
Managing and Monitoring SharePoint Apps
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies on which SharePoint depends. In this video; Tim Warner describes the day-to-day administration of SharePoint apps.
-
Managing Farm Solutions
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Tim Warner highlights management tasks performed over the lifecycle of a farm solution in SharePoint.
-
Microsoft Best Practices for SharePoint Upgrade
Microsoft SharePoint Server 2013 allows for the implementation of Microsoft best practices when upgrading from SharePoint 2010. In this video; Tim Warner demonstrates Microsoft best practices and how they ensure a virtually flawless upgrade process across the enterprise.
-
My Sites
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran demonstrates aspects of managing the My Sites and user profile environments.
-
New Service Applications in SharePoint Server 2013
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Tim Warner discusses new server applications in SharePoint Server 2013.
-
Non-Production Environment Content Refresh
In Microsoft SharePoint Server 2013; you can perform a development refresh in a non-production environment. Other scenarios include restoring only configuration or service application data; or restoring content from a SQL back up. In this video; Jacob Moran describes several restore scenarios in SharePoint.
-
Office Web Apps 2013
Microsoft SharePoint provides enterprise-level Web technologies for Intranet; document; and file management. In this video; Tim Warner discusses Microsoft Office Online Web Apps.
-
Office Web Apps 2013 Deployment Overview
Microsoft SharePoint provides enterprise-level Web technologies for Intranet; document; and file management. In this video; Tim Warner discusses installing Office Web Apps 2013 for SharePoint.
-
PerformancePoint
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran describes the SharePoint business intelligence tool PerformancePoint.
-
PerformancePoint Examined
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran demonstrates how to configure the PerformancePoint Service Application in SharePoint.
-
Plan for Network Redundancy
As part of a high-availability plan for Microsoft SharePoint Server 2013; network redundancy allows the SharePoint farm to remain up and running even if a particular link goes down. In this video; Jacob Moran discusses the components that safeguard the primary system from potential failure in a redundant network.
-
Plan for Search Service Instance Distribution
Microsoft SharePoint Server 2013 allows you to configure search service applications across multiple servers; improving the ability to crawl and index content and return search results to users efficiently in a highly available environment. In this video; Jacob Moran demonstrates the main search service components and how they can be distributed across multiple servers as part of a high-availability plan.
-
Plan for Server Load Balancing I
Microsoft SharePoint Server 2013 supports load balancing as part of a high-availability plan to direct traffic across multiple front-end servers and improve performance and resilience for users connecting to the SharePoint farm. In this video; Jacob Moran discusses the concept of Network Load Balancing (NLB); Hardware Load Balancers; and software load balancing with DNS round robin.
-
Plan for Server Load Balancing II
Window Server Network Load Balancing (NLB) enhances server reliability in a Microsoft SharePoint Server 2013 environment through NLB clusters. In this video; Jacob Moran discusses the advantages of NLB over DNS round robin and how to achieve optimal software load balancing capabilities using NLB clusters.
-
Planning SQL Log Shipping for SharePoint III
In Microsoft SharePoint Server 2013; you can use log shipping to create a duplicate of a SQL database. During sog shipping; a database backup is initialized on a primary server and restored on a secondary server. In this video; Jacob Moran demonstrates how to initialize a primary server and define the backup settings to keep the secondary server's copy updated.
-
Plan for Server Load Balancing III
When planning for high availability; the Microsoft SharePoint Server 2013 Request Manager provides load balancing features that route incoming requests and improve performance. In this video; Jacob Moran demonstrates the tasks performed by the Request Manager; and how to manage routing and throttling using the Windows PowerShell ISE.
-
Plan for Service Distribution
Microsoft SharePoint Server 2013 provides service roles that can be configured and distributed across several servers for a robust and highly available solution. In this video; Jacob Moran demonstrates how Web Front End (WFE); search; and application servers can be distributed across a SharePoint 2013 enterprise farm in a high-availability farm.
-
Plan for Service Instance Configuration
Microsoft SharePoint Server 2013 allows you to configure services and deploy service applications across multiple SharePoint farm servers when preparing a highly available and resilient solution. In this video; Jacob Moran demonstrates how to configure a service; enabling it across multiple SharePoint servers; and using application pools; as well as manage services in Central Administration.
-
Planning a Service Application Architecture I
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Tim Warner discusses and demonstrates the Farm Configuration Wizard.
-
Planning a Service Application Architecture II
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Tim Warner reviews options available when managing service applications.
-
Planning a Service Application Architecture III
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Tim Warner explores using Windows PowerShell to create service applications.
-
Planning a Service Application Topology
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Tim Warner sums up some best practices for planning and deploying service applications.
-
Planning a SQL AlwaysOn Availability Groups for SharePoint
In SQL Server 2012; AlwaysOn Availability Groups define a set of databases that failover together as a single object from a primary replica to a secondary replica. In this video; Jacob Moran discusses the principles; application; and configuration options of AlwaysOn Availability Groups in SQL Server 2012.
-
Planning Activity Feeds
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran demonstrates the use of activity feeds on SharePoint.
-
Planning Communities I
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran discusses Community Sites on SharePoint and demonstrates some of its features.
-
Planning Communities II
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran demonstrates features of community sites environments in SharePoint.
-
Planning My Sites
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran discusses managing personalized space within a SharePoint environment.
-
Planning Result Sources
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran planning result sources in SharePoint.
-
Planning SQL Clustering for SharePoint 2013
In Microsoft SharePoint Server 2013; Windows Server Failover Clustering (WSFC) is used to ensure high availability. In a SQL cluster; when the active node in the cluster goes down; the next node in the cluster becomes active; ensuring availability for clients. In this video; Jacob Moran demonstrates how SQL clustering works.
-
Planning SQL Log Shipping for SharePoint I
In Microsoft SharePoint Server 2013; the log shipping feature provides SQL server backup functionality for use in database recovery. In this video; Jacob Moran demonstrates the principles and application of log shipping.
-
Planning SQL Log Shipping for SharePoint II
In Microsoft SharePoint Server 2013; the Log Shipping feature provides SQL server backup functionality for use in database recovery. In this video; Jacob Moran demonstrates how to manage Log Shipping configuration using Microsoft SQL Server Management Studio.
-
Preparing DNS for Apps
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies on which SharePoint depends. In this video; Tim Warner explains how to prepare DNS for SharePoint apps.
-
Preparing the Farm for Apps
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies on which SharePoint depends. In this video; Tim Warner describes how to prepare a farm for SharePoint apps.
-
Pre-Upgrade Tasks
Microsoft SharePoint Server 2013's upgrade process requires the back up of SharePoint 2010 content and service application databases. In this video; Tim Warner uses SQL Server Management Studio and PowerShell to back up SharePoint Server 2010 databases to a new SharePoint 2013 SQL Server instance.
-
Product Catalog and Topic Pages
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran explains cross-site publishing.
-
Product Catalog and Topic Pages Examined
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. Planning and configuring product catalogs and topic pages SharePoint allows for a library or list to be designated as a catalog. In this video; Jacob Moran introduces product catalog and topic pages in SharePoint 2013.
-
Profiles I
In Microsoft SharePoint Server 2013; when enabling Active Directory profile synchronization; you start by granting permissions to the Profile service account and then creating a synchronization connection. In this video; Jacob Moran demonstrates how to set up synchronization for the User Profile service.
-
Profiles II
In Microsoft SharePoint Server 2013; you can configure synchronization settings for the User Profile Service application. You can set one-way or two-way synchronization; schedule the synchronization; and edit the user properties. In this video; Jacob Moran demonstrates how to configure the synchronization settings for the Profile Service.
-
Project Server 2013 Deployment Notes
Microsoft SharePoint provides enterprise-level Web technologies for Intranet; document; and file management. In this video; Tim Warner discusses deploying Project Server 2013 for SharePoint.
-
Publishing a Service Application
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Tim Warner discusses publishing a service application on SharePoint 70-332.
-
Record Disposition and Retention
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran discusses record definition and retention in SharePoint 2013.
-
Recovery Strategies
There are several recovery strategies available in Microsoft SharePoint Server 2013. The strategy you use depends on the scope of the backup – ranging from restoring a document for an end user or an entire site collection. In this video; Jacob Moran demonstrates various restore strategies in SharePoint Server.
-
Relevancy via Dictionaries
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran explains how administrators can manage search relevance in SharePoint.
-
Relevancy via Promotion
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran explains how to improve search relavancy through promotion of content in SharePoint.
-
Reporting Services
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran explains the reporting services available through SharePoint.
-
Restoring Databases into SQL Server
In Microsoft SharePoint Server 2013; you are able to restore databases into SQL Server using SQL Server Management Studio. This is the main GUI administrative tool for the SQL Server Relational Database tool. You can also perform the restore using PowerShell or Transact-SQL. In this video; Tim Warner demonstrates how to restore a database into SQL Server.
-
Routing Examined
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. The Records Center is a central repository in which an organization can store and manage all of its records. In this video; Jacob Moran provides an overview of the of the functioning Records Center in SharePoint 2013.
-
Search Analytics
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran explains how Search Analytics can be used by administrators.
-
Search Analytics Reports
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran explains how analytics impact search ranking.
-
Search Relevancy
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran explains how to use company name values and custom entity extractors in SharePoint to return content in a search.
-
Search Result Sources
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran demonstrates how searching can be optimized using result sources in SharePoint.
-
Search Schemas
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran discusses how search schema can be managed at the search application or site collection level.
-
Search Support
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran explores how the search function works in the SharePoint Business Connectivity Services (BCS) environment.
-
Search UI and Display Templates
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran uses the Basic and Enterprise search centers and explains display templates in SharePoint.
-
Service Application Communications
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Tim Warner discusses how service application communicates.
-
Service Application Components
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Tim Warner discusses elements of a service application.
-
Service Applications
In Microsoft SharePoint Server 2013; you can use PowerShell to create service applications. This is a type of plugin that provides additional functionality that can be used throughout your farm. In this video; Tim Warner demonstrates how to create a service application using SPWebApplication.
-
Service Applications Deprecated in SharePoint Server 2013
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Tim Warner discusses deprecated service applications in SharePoint Server 2013.
-
Service Applications That Can Be Migrated
Microsoft SharePoint Server 2013's database attach method allows the upgrade of multiple core SharePoint 2010 service applications. In this video; Tim Warner demonstrates the core SharePoint 2010 service applications that can be upgraded to SharePoint 2013 using the database attach method.
-
Setting Credentials of a Target Application
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran sets the credentials for a Secure Store Target Application in Secure Store in SharePoint.
-
SharePoint and SQL Backups
You can back up and restore data for disaster and recovery using Microsoft SharePoint Server 2013 and SQL backups. In this video; Jacob Moran discusses how SharePoint backups display the SharePoint boundaries; namely site collections; Web applications; and libraries; whereas SQL log file backups enable recovery up to the last good transaction.
-
SharePoint Backups
You need to be familiar with best practices for performing backups in Microsoft SharePoint Server 2013. In this video; Jacob Moran demonstrates how you can back up at the farm level or the granular level – for example; backing up only a site collection – and can also use PowerShell cmdlets to perform backups.
-
SharePoint Disaster Recovery Planning
You need to have a disaster and recovery plan in place for Microsoft SharePoint Server 2013. Your plan needs to take into consideration the effects of loss of data and service on your organization and how soon you need to have the system back up and running. In this video; Jacob Moran discusses considerations for disaster and recovery in SharePoint.
-
SharePoint Features
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Tim Warner explores the use of features to personalize SharePoint.
-
SharePoint Integration
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies on which SharePoint depends. In this video; Tim Warner explains the advantages of Office 365.
-
SharePoint Server 2013 Integration with Exchange Server 2013
Microsoft SharePoint provides enterprise-level Web technologies for Intranet; document; and file management. In this video; Tim Warner discusses SharePoint Server 2013's integration with Exchange Server 2013.
-
Site Collection Evaluation and Pre-Upgrade Checks
Microsoft SharePoint Server 2013 allows you to upgrade site collections from 2010 to 2013. In this video; Tim Warner demonstrates how to upgrade a site collection and perform health checks to determine if there are any problems; as well as review the status of the upgrade process.
-
Site Collection Pre-Upgrade Checks
Microsoft SharePoint Server 2013 supports the ability to locate site collection upgrade problems when migrating from 2010 to 2013; including missing site templates and missing language pack references. In this video; Tim Warner demonstrates how to run the upgrade check via the Site Settings page or Windows PowerShell.
-
Site Collection Upgrade Queueing
Microsoft SharePoint Server 2013 allows you to queue site collections for upgrade to avoid multiple simultaneous upgrades. This helps you avoid issues such as reduced performance and bottlenecks. In this video; Tim Warner uses PowerShell to create upgrade queues; review the progress of the queue; or remove an object from the queue.
-
Site Collection Upgrade Throttling
In Microsoft SharePoint Server 2013; you can control how upgrades are performed for your site collection or farm. In this video; Tim Warner demonstrates how to manage site collection upgrade throttling for web apps and sites.
-
Social Permissions
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran demonstrates changing user permissions in the User Profile service application.
-
SQL Login Consistency
In Microsoft SharePoint Server 2013; duplicate copies of the database are housed on multiple servers. To enable failover to a duplicate or mirrored copy of a database; user logins and permissions need to be consistently defined on all mirrored copies of the server. In this video; Jacob Moran discusses the need for consistent logins across SQL databases.
-
Storage Redundancy
In Microsoft SharePoint Server 2013; you can increase the availability of your data by making your data storage solution more redundant. In this video; Jacob Moran demonstrates how to configure and implement storage redundancy in SharePoint Server; and examines different versions of RAID.
-
Supported Upgrade Paths
Microsoft SharePoint Server 2013 supports parallel database-attach upgrades only from versions of SharePoint Server 2010. In this video; Tim Warner demonstrates the two-step upgrade required by users of Microsoft Office SharePoint Server (MOSS) 2007 and Windows SharePoint Service (WSS) 3.0.
-
The Secure Store
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran explains how to set up the Secure Store Service in SharePoint.
-
The Secure Store Application
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Tim Warner will explain how to access the Secure Store service application.
-
The Secure Store Service Application
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. Secure Store is a SharePoint Server 2013 feature that maps user credentials to stored external credentials to allow a user secure access to external data. In this video; Tim Warner explains the uses of the Secure Store service application.
-
The Service Application Model in SharePoint Server 2013
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Tim Warner discusses the advantages of the Service Application Model in SharePoint Server 2013.
-
The Shared Services Provider in SharePoint 2007
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Tim Warner explains the disadvantages of MOSS (Microsoft Office SharePoint Server) 2007 Shared Service Provider (SSP).
-
The Upgrade Process
Microsoft SharePoint Server 2013 allows for a five-step; best-practice process when upgrading from SharePoint 2010. In this video; Tim Warner demonstrates the four-step upgrade process performed by server farm administrators; as well as the fifth; carried out by site collection administrators and site owners.
-
Troubleshooting Upgrade
When migrating a farm to Microsoft SharePoint Server 2013; you may experience problems. For instance; a certain customization has caused an unexpected error. One solution would be to roll back the environment to 2010; or you can resolve the problem by accessing error log files and identifying the problem. In this video; Tim Warner demonstrates troubleshooting an upgrade.
-
Types of SharePoint Apps
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies on which SharePoint depends. In this video; Tim Warner distinguishes between different types of SharePoint apps.
-
Understanding the SharePoint App Architecture
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Tim Warner discusses SharePoint apps.
-
Understanding the Site Collection Upgrade Process
By default; Microsoft SharePoint Server 2013 includes the full SharePoint 2010 user experience to help users adjust to the migration. You need to determine the amount of time you want to run SharePoint 2010 before upgrading to 2013. To assist with the changeover; you can deploy evaluation site collections. In this video; Tim Warner discusses the site collection upgrade process.
-
Upgrade Shock?
The launch of Microsoft SharePoint Server 2013 led to what is referred to as upgrade shock for users migrating from SharePoint 2010. This simply refers to the change users experience when moving to the 2013 interface. In this video; Tim Warner discusses upgrade shock and some of the similarities between SharePoint 2010 and SharePoint 2013.
-
Upgrading Content Databases
Microsoft SharePoint Server 2013 allows migrated SharePoint Server 2010 content databases to be upgraded. In this video; Tim Warner demonstrates how to recreate a migrated content database's managed paths; quotas; and web application policies to match its 2010 farm environment.
-
Using BCS I
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. SharePoint Designer 2013 provides tools to customize Windows SharePoint Services sites. In this video; Tim Warner will explain how to leverage Business Connectivity Services by using SharePoint Designer.
-
Using BCS II
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Tim Warner explains how to use SharePoint Designer to set permissions and properties for Business Connectivity Services.
-
Using SQL Aliases
In Microsoft SharePoint Server 2013; the use of aliases allows for simplified server connections which include the connection string components. In this video; Jacob Moran demonstrates the principles and application of aliases.
-
Using Windows PowerShell to Upgrade the Content Databases
Microsoft SharePoint Server 2013 allows a SharePoint Server 2010 content database to be upgraded using Windows PowerShell cmdlets. In this video; Tim Warner uses two Windows PowerShell cmdlets to isolate database migration issues before attaching it to the SharePoint Server 2013 Web application.
-
Verifying Site Collection Upgrades
In Microsoft SharePoint Server 2013; you can manage how site collection upgrades are performed and verify that sites are functioning correctly once changes have been made. In this video; Tim Warner demonstrates how to manage site collection upgrades using the GUI and PowerShell.
-
Verifying the Upgrade
In Microsoft SharePoint Server 2013; you can view the upgrade status of all farm databases using PowerShell or Central Administration. Once a database has been successfully created; it can be mounted on a web application using the Mount-SPContentDatabase cmdlet. In this video; Tim Warner demonstrates how to verify database upgrades.
-
Viewing the Log Files
Microsoft SharePoint Server 2013 supports various upgrade and migration options; such as managing database settings and reviewing the upgrade status. You can also access the log files for an installation. In this video; Tim Warner demonstrates how to perform simple troubleshooting by viewing these logs using the ULS Viewer tool.
-
What are Sandbox Solutions?
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Tim Warner discusses the advantages of sandbox solutions and how they differ from farm solutions.
-
What Does "Database Attach Upgrade" Mean?
Microsoft SharePoint Server 2013's database-attach method allows you to upgrade SharePoint 2010 content and service application databases to a new SharePoint 2013 SQL Server farm environment. In this video; Tim Warner demonstrates the step-by-step backup-restore process used by SharePoint 2013's database-attach method.
-
What is ECM?
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. Microsoft has enhanced enterprise content management (ECM) in a number of key areas. In this video; Jacob Moran explains what ECM is and why it's so important in SharePoint 2013.
-
What is New in Upgrade for SharePoint Server 2013?
Microsoft SharePoint Server 2013's upgrade features include a database-attach method for SharePoint 2010 content and service application databases; allowing independent site upgrades by site collection owners. In this video; Tim Warner discusses the migration of SharePoint 2010 databases to a new SharePoint 2013 farm.
-
What is Project Server 2013?
Microsoft SharePoint provides enterprise-level Web technologies for Intranet; document; and file management. In this video; Tim Warner discusses Project Server 2013 for SharePoint.
-
What is WCM?
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran explains what Web content management is.
-
Why Federate?
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Tim Warner reviews the advantages of using Federation to make service applications available across farm boundaries.
-
Planning SQL Mirroring for SharePoint
Microsoft SharePoint Server 2013 allows you to use SQL mirroring to create and maintain a duplicate SQL database in case of database failure. In this video; Jacob Moran demonstrates how to mirror a content database to another server.
-
Planning Touch Points in the SharePoint Upgrade Process
Microsoft SharePoint Server 2013 allows for the high-level communication of all aspects of the SharePoint 2013 upgrade process; across the enterprise. In this video; Tim Warner demonstrates a six-step; business-language communication plan that maps to the SharePoint 2013 upgrade process's technical implementation.
-
Planning User Profiles
In Microsoft SharePoint Server 2013; the User Profile service allows you to define attributes for users or to import the attributes from a data source; such as Active Directory. In addition; users can update their user profiles in SharePoint. In this video; Jacob Moran discusses the considerations for planning SharePoint user profiles and connections.
-
PowerPivot
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran explores the SharePoint business intelligence tool – PowerPivot.
-
Exploring Document Library Accessibilities
After watching this video; you will be able to recognize the new document library accessibility improvments in SharePoint Server 2016.
-
Exploring Enhanced Controls in Document Libraries
After watching this video; you will be able to recognize enhanced controls in document libraries.
-
Exploring Limits and Boundaries
After watching this video; you will be able to identify the new limits and boundaries in SharePoint Server 2016.
-
Exploring List Column Indices and Site Creation
After watching this video; you will be able to identify the automatic list column indices and the quick site creation features.
-
Exploring New Compliance Features
After watching this video; you will be able to recognize the new compliance features including the document deletion policy and the in-place hold policy.
-
Exploring New Key Features of
After watching this video; you will be able to identify new features including durable links; mobile user interface; and hybrid configuration wizard.
-
Exploring Special Character and ODF Support
After watching this video; you will be able to recognize the new special character supported and the available open document format available in document libraries.
-
Exploring Synchronization Settings and PWA
After watching this video; you will be able to recognize the improvement with bidirectional sync with active directory and that Project Server 2016 is now included in the SharePoint install.
-
Exploring the Hybrid Sites Feature
After watching this video; you will be able to recognize what the hybrid sites features is and its functionality.
-
Exploring the Preview and Site Folder View Features
After watching this video; you will be able to identify the image; video preview; and folder view features in SharePoint Server 2016.
-
Exploring the Recycle Bin and Zero Downtime Features
After watching this video; you will be able to identify the recycle bin feature in team sites and OneDrive and the zero downtime patching capabilities.
-
Exploring the Interface
After watching this video; you will be able to recognize the SharePoint Server 2016 interface options.
-
Exploring the Sharing Feature
After watching this video; you will be able to recognize the improved sharing feature and view information on who has access to the site that has been shared.
-
Identifying Document Library Features
After watching this video; you will be able to recognize new document library features including the file plan report documents and the ability to change enterprise metadata and keywords settings.
-
Identifying Installation and Configuration Options
After watching this video; you will be able to recognize the new installation and configuration enhancements including the new role-based configuration wizard and the ability to determine if servers or services are compliant.
-
Identifying the Hybrid Options
After watching this video; you will be able to recognize the new hybrid configuration wizard; the configure hybrid OneDrive; and the site features option in SharePoint Server 2016.
-
Version Control with Git
After watching this video; you will be able to implement version control for Universal Windows apps with Git as part of an application lifecycle management (ALM) strategy.
-
Version Control with TFVC
After watching this video; you will be able to implement version control for Universal Windows apps with Microsoft Team Foundation Version Control (TFVC) as part of an application lifecycle management (ALM) strategy.
-
Visual Studio Features
After watching this video; you will be able to navigate and describe the features in Visual Studio 2015 available for developing Universal Windows apps.
-
Writing Adaptive Code
After watching this video; you will be able to reference required APIs and use the ApiInformation class to write adaptive code for Universal Windows apps.
-
Implementing Image Controls
After watching this video; you will be able to implement XAML Image controls in Universal Windows apps.
-
Implementing Lists
After watching this video; you will be able to implement phased rendering of lists using XAML controls in Universal Windows apps.
-
Animated Transformations
After watching this video; you will be able to configure an animated transform to an element in a Windows Store app.
-
Animating Fades
After watching this video; you will be able to use the animations library to apply fade animations in a Windows Store app.
-
Animating for Repositioning
After watching this video; you will be able to use the animations library to animate for repositioning within Universal Windows apps.
-
Animating Pointers
After watching this video; you will be able to use the animations library to animate pointers within Universal Windows apps.
-
Animating Pop-ins
After watching this video; you will be able to use the animations library to apply animated pop-ins within Universal Windows apps.
-
Animating Swipes
After watching this video; you will be able to use the animations library to apply animated swipes within Universal Windows apps.
-
Animations for Visual States
After watching this video; you will be able to use Storyboarded animations to configure visual states that are triggered by changes to a control's state.
-
Applying Content Transitions
After watching this video; you will be able to apply transitions to elements in Universal Windows apps.
-
Applying Page Transitions
After watching this video; you will be able to apply page transitions in Universal Windows apps.
-
Automated Team Builds
After watching this video; you will be able to implement automated team builds using Microsoft TFS for Universal Windows LOB apps.
-
Automated Testing
After watching this video; you will be able to implement automated tests for Universal Windows LOB apps using Microsoft Test Manager.
-
Code Reviews and Peer Feedback
After watching this video; you will be able to implement team collaboration for the development of Universal Windows apps by implementing code reviews and peer feedback.
-
Consuming a WinRT Component
After watching this video; you will be able to consume a WinRT component in a universal Windows app.
-
Displaying Collections
After watching this video; you will be able to implement controls such as ListView; GridView; and ItemsControls to display groups of items in a Universal Windows app.
-
Edge UI Animations
After watching this video; you will be able to use edge UI animations to display or hide UI starting at the edge in Universal Windows apps.
-
Exercise: Creating a Navigation Structure
After watching this video; you will be able to practice creating a hierarchical navigation structure for a universal Windows app.
-
Exercise: Working with Controls
After watching this video; you will be able to practice implementing controls including a WinRT control in a universal Windows apps.
-
Exploratory Testing
After watching this video; you will be able to implement exploratory tests for Universal Windows LOB apps using Microsoft Test Manager.
-
Getting Familiar with Data Controls
After watching this video; you will be able to use some of the WinRT controls.
-
Identifying Tools and Technologies
After watching this video; you will be able to specify the tools and technologies including the source control method as part of the design specification for a Universal Windows Mobile line-of-business app.
-
Implementing a Custom Control
After watching this video; you will be able to use a base control to create a custom control template in a Windows Store app.
-
Using the Slider Control
After watching this video; you will be able to implement the Slider control in Universal Windows apps.
-
Implementing Themes
After watching this video; you will be able to implement themes in Universal Windows apps.
-
Implementing XAML Controls
After watching this video; you will be able to implement XAML controls for displaying and editing text within a Universal Windows app.
-
Introducing Universal Windows Apps
After watching this video; you will be able to describe the principles and features of Microsoft Universal Windows apps.
-
Introduction to Animations
After watching this video; you will be able to learn about animations and their use in Universal Windows apps.
-
Key-frame Animations
After watching this video; you will be able to apply key-frame animations in Universal Windows apps.
-
Localization; Testing Requirements
After watching this video; you will be able to specify performance; security; concurrency; and testing requirements; as well as use cases.
-
Product Backlog Management
After watching this video; you will be able to implement team collaboration by implementing product backlog management for the development of Universal Windows apps.
-
Requirements and Architecture
After watching this video; you will be able to specify quality attributes and related apps and ecosystems as part of the design specification for a Universal Windows universal app.
-
Responding to Windowing Modes
After watching this video; you will be able to configure control template to respond to changing windowing modes in a Windows Store app.
-
Responsive Design
After watching this video; you will be able to identify responsive design techniques for Universal Windows apps.
-
Sprint Planning
After watching this video; you will be able to implement team collaboration by implementing sprint completion; storyboarding; code reviews; peer review feedback; backlog management; and automated team builds.
-
Storyboarded Animations
After watching this video; you will be able to create Storyboarded animations in Universal Windows apps.
-
Styling a Custom Control
After watching this video; you will be able to style a custom control using the control template in a Windows Store app.
-
Styling Controls
After watching this video; you will be able to implement styling XAML controls within an Universal Windows app.
-
Supporting Win32 APIs
After watching this video; you will be able to link a universal Windows app to Windowsapp.lib to support access to Win32 APIs from WinRT components written in C.
-
Tracking Progress
After watching this video; you will be able to track development progress of Universal Windows LOB apps against milestones.
-
UI Design
After watching this video; you will be able to design UI for a mobile Universal Windows LOB app based on UI patterns.
-
Using Data Templates
After watching this video; you will be able to use data templates in Universal Windows apps.
-
Using Drag and Drop
After watching this video; you will be able to use Drag animations to drag and drop items in Universal Windows apps.
-
Using List Animations
After watching this video; you will be able to use list animations to add and delete items in Universal Windows apps.
-
Using Progress Controls
After watching this video; you will be able to implement progress controls including ProgressBar and ProgressRing in Universal Windows apps.
-
Using the HyperlinkButton Control
After watching this video; you will be able to use the HyperlinkButton control in Universal Windows apps.
-
Implementing Date/Time Controls
After watching this video; you will be able to implement XAML date/time controls such as CalendarView and CalendarDatePicker in universal Windows apps.
-
Implementing Flyouts
After watching this video; you will be able to implement flyouts in a Universal Windows app.
-
Using the Pivot Control
After watching this video; you will be able to use the Pivot control to navigate elements in a Universal Windows app.
-
Using Toggle Switch Controls
After watching this video; you will be able to implement XAML toggle switch controls in Universal Windows apps.
-
Using Tooltips
After watching this video; you will be able to use tooltips in Universal Windows apps.
-
Implementing Basic XAML Controls
After watching this video; you will be able to introduce XAML controls and implement basic XAML selection controls within a Universal Windows app.
-
Implementing Command Buttons
After watching this video; you will be able to implement command buttons in a Universal Windows app.
-
Implementing Context Menus
After watching this video; you will be able to implement context menus in a Universal Windows app.
-
Implementing Custom App Bars
After watching this video; you will be able to implement custom app bars in a Universal Windows app.
-
Implementing Message Dialogs
After watching this video; you will be able to implement message dialogs in a Universal Windows app.
-
Implementing the AppBar Control
After watching this video; you will be able to use the AppBar control in a Universal Windows app.
-
Enhancing Presentation
After watching this video; you will be able to practice adding styles; themes; and animations to a universal Windows app.
-
Additional Windows Protections
After watching this video; you will be able to describe additional Windows protections.
-
Advanced Permissions
After watching this video; you will be able to describe advanced permissions.
-
AppCompat
After watching this video; you will be able to describe AppCompat.
-
Application Delivery Options
After watching this video; you will be able to describe IEEE standards for enabling FCoE.
-
Application Delivery Options Overview
After watching this video; you will be able to describe FCoE protocol transporting options.
-
AppLocker Policies
After watching this video; you will be able to configure AppLocker policies.
-
Are You Secure?
After watching this video; you will be able to describe how to know if a device is secure.
-
Basic or Dynamic
After watching this video; you will be able to compare basic or dynamic disks.
-
BitLocker and Device Encryption
After watching this video; you will be able to compare BitLocker and device encryption.
-
BitLocker Overview
After watching this video; you will be able to describe BitLocker.
-
Boot Time Threats
After watching this video; you will be able to describe boot time threats.
-
Built-in Management Features
After watching this video; you will be able to describe the built-in management features.
-
Certificate-based Authentication
After watching this video; you will be able to describe certificate-based authentication.
-
Characteristics of Universal Apps
After watching this video; you will be able to describe the characteristics of universal apps.
-
Combining NTFS and Share Permissions
After watching this video; you will be able to describe combine NTFS and share permissions.
-
Common Fixes in AppCompat
After watching this video; you will be able to describe the common fixes in AppCompat.
-
Compress an IPv6 Address
After watching this video; you will be able to describe how to compress an IPv6 address.
-
Conditional Access
After watching this video; you will be able to describe conditional access.
-
Configuration Stages for Windows Hello
After watching this video; you will be able to describe the configuration stages for Windows Hello.
-
Configure Cloud Accounts
After watching this video; you will be able to configure cloud accounts.
-
Configure Connection Security Rules
After watching this video; you will be able to configure connection security rules.
-
Configure Device Settings
After watching this video; you will be able to configure device settings.
-
Configure Domain Accounts
After watching this video; you will be able to configure domain accounts.
-
Configure Ethernet Adapter
After watching this video; you will be able to configure Ethernet adapter.
-
Configure Homegroup
After watching this video; you will be able to configure HomeGroup.
-
Configure Local User and Microsoft Accounts
After watching this video; you will be able to configure local user and Microsoft accounts.
-
Configure Mobile Broadband
After watching this video; you will be able to configure mobile broadband.
-
Configure Name Resolution
After watching this video; you will be able to configure name resolution.
-
Configure Network Isolation Rules
After watching this video; you will be able to configure network isolation rules.
-
Configure Remote Desktop Connections
After watching this video; you will be able to configure Remote Desktop Connections.
-
Configure Shared Folders
After watching this video; you will be able to configure Shared Folders.
-
Configure Sign-in Options
After watching this video; you will be able to configure sign-in options.
-
Configure UAC
After watching this video; you will be able to describe how to configure UAC.
-
Configure Virtual Networking
After watching this video; you will be able to configure virtual networking.
-
Configure Virtual SmartCards
After watching this video; you will be able to configure virtual SmartCards.
-
Configure Virtual Storage
After watching this video; you will be able to configure virtual storage.
-
Configure VPN Settings
After watching this video; you will be able to configure VPN settings.
-
Configure WiFi
After watching this video; you will be able to configure WiFi.
-
Configure Windows Hello
After watching this video; you will be able to configure Windows hello.
-
Configuring BitLocker
After watching this video; you will be able to configure BitLocker.
-
Configuring EFS
After watching this video; you will be able to describe how to configure EFS.
-
Configuring Microsoft Intune
After watching this video; you will be able to configure Microsoft Intune.
-
Continuum
After watching this video; you will be able to implement Continuum.
-
Cortana
After watching this video; you will be able to implement Cortana.
-
Countermeasures
After watching this video; you will be able to describe countermeasures.
-
Create an Answer File
After watching this video; you will be able to implement creating an answer file.
-
Create and Apply Provisioning Packages
After watching this video; you will be able to describe how to create and apply provisioning packages.
-
Create Custom Image
After watching this video; you will be able to implement creating a custom image.
-
Create Reference Computer
After watching this video; you will be able to implement creating a reference computer.
-
Create Virtual Machine
After watching this video; you will be able to implement creating a virtual machine.
-
Create WinPE
After watching this video; you will be able to implement creating WinPE.
-
Data Protection in
After watching this video; you will be able to describe data protection in Windows 10.
-
Deploy Custom Image
After watching this video; you will be able to describe how to deploy a custom image.
-
Deployment Considerations
After watching this video; you will be able to describe deployment considerations.
-
Deployment Options
After watching this video; you will be able to describe deployment options.
-
Desktop Apps
After watching this video; you will be able to describe iSCSI protocol.
-
Determine Readiness
After watching this video; you will be able to describe how to determine readiness.
-
Device Guard
After watching this video; you will be able to describe device guard.
-
DirectAccess Overview
After watching this video; you will be able to describe DirectAccess.
-
Disk Overview
After watching this video; you will be able to describe disk overview and storage options.
-
Display Technologies
After watching this video; you will be able to describe display technologies.
-
Driver Signing
After watching this video; you will be able to describe driver signing.
-
Enable Hyper-V
After watching this video; you will be able to configure Hyper-V.
-
Enable Workplace Join
After watching this video; you will be able to implement Workplace Join.
-
Example of an Attack
After watching this video; you will be able to describe the examples of an attack.
-
Explaining EFS
After watching this video; you will be able to describe encrypted file system.
-
Features of WAF
After watching this video; you will be able to describe the features of WAF.
-
File History & Backup
After watching this video; you will be able to describe file history and backup.
-
File History and Backup
After watching this video; you will be able to describe File History and backup.
-
Folder Redirection
After watching this video; you will be able to describe folder redirection.
-
Form Factors
After watching this video; you will be able to describe form factors.
-
Hardware Technologies
After watching this video; you will be able to describe hardware technologies.
-
How Access Tokens Work
After watching this video; you will be able to describe how access tokens work.
-
How App-V Works
After watching this video; you will be able to describe how App-V works.
-
How Azure RemoteApp Works
After watching this video; you will be able to describe how Azure RemoteApp works.
-
How Business Store Works
After watching this video; you will be able to describe how the business store works.
-
How Certificate-based Authentication Works
After watching this video; you will be able to describe how certificate-based authentication works.
-
How Device Guard Works
After watching this video; you will be able to describe how device guard works.
-
How DNS Works
After watching this video; you will be able to describe how DNS works.
-
How Do I Manage ?
After watching this video; you will be able to describe how to manage Windows 10.
-
How Do I Personalize ?
After watching this video; you will be able to describe how to personalize Windows 10.
-
How Intune Works
After watching this video; you will be able to describe how Intune works.
-
How IPv4 Addresses Are Assigned
After watching this video; you will be able to describe how IPv4 addresses are assigned.
-
How Kerberos Works
After watching this video; you will be able to describe how Kerberos works.
-
How Login Works
After watching this video; you will be able to describe how login works.
-
How Microsoft Passport Works
After watching this video; you will be able to describe how Microsoft Passport works.
-
How Policies Are Applied
After watching this video; you will be able to describe how policies are applied.
-
How Servicing Branches Work
After watching this video; you will be able to describe how servicing branches work.
-
How Sharing Works
After watching this video; you will be able to describe how sharing works.
-
How UAC Works
After watching this video; you will be able to describe how UAC works.
-
How Upgrade Works – Concerns
After watching this video; you will be able to describe the concern for upgrading.
-
How Upgrade Works – Methods
After watching this video; you will be able to describe the methods for upgrading.
-
How Provisioning Works
After watching this video; you will be able to describe how Windows 10 provisioning works.
-
How Windows Stays Up to Date
After watching this video; you will be able to describe how Windows stays up to date.
-
Hyper-V Explained
After watching this video; you will be able to describe Hyper-V.
-
IE 11 Compatibility
After watching this video; you will be able to describe IE 11 compatibility.
-
Install Components
After watching this video; you will be able to implement installing components.
-
Install Device Drivers
After watching this video; you will be able to implement installing device drivers.
-
Installing Windows Apps
After watching this video; you will be able to implement installing Windows apps.
-
Line-of-Business Apps
After watching this video; you will be able to describe line-of-business apps.
-
Manage Virtual Machine
After watching this video; you will be able to describe how to manage a virtual machine.
-
Management Models Compared
After watching this video; you will be able to compare management models.
-
Managing Apps Locally and in the Enterprise
After watching this video; you will be able to describe how to manage apps locally and in the enterprise.
-
Managing Windows Apps
After watching this video; you will be able to manage Windows apps.
-
MBAM
After watching this video; you will be able to describe Microsoft BitLocker administration and monitoring.
-
MBR or GPT
After watching this video; you will be able to compare MBR or GPT.
-
MDT Overview
After watching this video; you will be able to describe MDT.
-
Microsoft Passport and VSM
After watching this video; you will be able to describe Microsoft Passport and VSM.
-
Microsoft Passport Considerations
After watching this video; you will be able to describe Microsoft Passport considerations.
-
Mobile Data Access
After watching this video; you will be able to describe mobile data access.
-
Monitor Connection Security Rules
After watching this video; you will be able to describe monitor connection security rules.
-
Monitoring Tools
After watching this video; you will be able to describe monitoring tools.
-
More Personal Computing
After watching this video; you will be able to describe more personal computing.
-
Multiple Local Group Policies
After watching this video; you will be able to describe Multiple Local Group Policies.
-
Multiple Store Surfaces
After watching this video; you will be able to compare store surfaces.
-
Multitasking and Windows Explorer
After watching this video; you will be able to describe multitasking and Windows Explorer.
-
Name Resolution Explained
After watching this video; you will be able to describe name resolution.
-
Native VHD Boot
After watching this video; you will be able to describe native VHD boot.
-
Network Overview
After watching this video; you will be able to describe the network.
-
Network Packets and Addresses
After watching this video; you will be able to describe network packets and addresses.
-
New Connections
After watching this video; you will be able to describe new connections.
-
New Features in Windows Defender
After watching this video; you will be able to describe the new features in Windows defender.
-
New Form Factors
After watching this video; you will be able to describe new form factors.
-
New Universal Windows Application Platform
After watching this video; you will be able to describe the new universal Windows application platform.
-
Office 365 and Intune
After watching this video; you will be able to describe Office 365 and Intune.
-
Offline Files
After watching this video; you will be able to describe offline files.
-
One Windows
After watching this video; you will be able to describe one Windows.
-
OneDrive and Shared Folders
After watching this video; you will be able to compare OneDrive and shared folders.
-
OneGet
After watching this video; you will be able to describe the iSCSI concept.
-
Optimize
After watching this video; you will be able to describe how to optimize Windows 10.
-
Optimizing Best Practices
After watching this video; you will be able to describe optimizing best practices.
-
Optimizing Tools
After watching this video; you will be able to describe optimizing tools.
-
Other Data Techs
After watching this video; you will be able to compare other data techs.
-
Overview of EDP
After watching this video; you will be able to describe EDP.
-
Overview of IP
After watching this video; you will be able to describe IP.
-
Overview of Management Products
After watching this video; you will be able to describe management products.
-
Overview of Microsoft Intune
After watching this video; you will be able to describe Microsoft Intune.
-
Overview of Remote Connections
After watching this video; you will be able to describe remote connections.
-
Overview of Windows Data Protections
After watching this video; you will be able to describe Windows data protections.
-
Permission Precedence
After watching this video; you will be able to describe permission precedence.
-
Policy Overview
After watching this video; you will be able to describe policies in Windows 10.
-
Power Management Features
After watching this video; you will be able to describe the features of power management.
-
Power Management Overview
After watching this video; you will be able to describe power management.
-
Print Devices
After watching this video; you will be able to describe print devices.
-
Recovery and Maintenance
After watching this video; you will be able to describe recovery and maintenance.
-
Repair Tools
After watching this video; you will be able to compare the repair tools.
-
Repair Tools Overview
After watching this video; you will be able to describe the repair tools.
-
RootKit Countermeasures in Action
After watching this video; you will be able to describe RootKit countermeasures in action.
-
Service an Image
After watching this video; you will be able to describe how to service an image.
-
SideLoading
After watching this video; you will be able to describe SideLoading.
-
Space Considerations
After watching this video; you will be able to describe space considerations.
-
Standard Permissions
After watching this video; you will be able to describe standard permissions.
-
Start Menu and Personalization
After watching this video; you will be able to describe start menu and personalization.
-
Sync Your Settings
After watching this video; you will be able to implement syncing settings.
-
Troubleshooting Permissions
After watching this video; you will be able to describe how to troubleshoot permissions.
-
Types of Devices
After watching this video; you will be able to compare types of devices.
-
Types of IPv4 Addresses
After watching this video; you will be able to compare types of IPv4 addresses.
-
Types of IPv6 Addresses
After watching this video; you will be able to describe types of IPv6 addresses.
-
UE-V
After watching this video; you will be able to describeb UE-V.
-
Universal Drivers
After watching this video; you will be able to describe universal drivers.
-
User Accounts and Devices
After watching this video; you will be able to describe user accounts and devices.
-
User Profiles
After watching this video; you will be able to describeb user profiles.
-
User Profiles and Libraries
After watching this video; you will be able to describe user profiles and libraries.
-
Using BitLocker
After watching this video; you will be able to describe how to use BitLocker.
-
What Can I Do Now To Get Ready?
After watching this video; you will be able to describe what to do to get ready.
-
What Is AppLocker?
After watching this video; you will be able to describe AppLocker.
-
What Is Azure AD?
After watching this video; you will be able to describe what Azure AD is.
-
What Is Azure RemoteApp?
After watching this video; you will be able to describe Azure RemoteApp.
-
What Is DirectAccess?
After watching this video; you will be able to describe what DirectAccess is.
-
What Is DNS?
After watching this video; you will be able to describe DNS.
-
What is Hyper-V
After watching this video; you will be able to identify the purpose of Hyper-V.
-
What is New in for Securing Identities?
After watching this video; you will be able to descibe what is new in Windows 10 for securing identities.
-
What Is RSAT?
After watching this video; you will be able to describe RSAT.
-
What Is the BCD?
After watching this video; you will be able to describe the BCD.
-
What Is the WIM File Format?
After watching this video; you will be able to describe the WIM file format.
-
What Is UAC?
After watching this video; you will be able to describe what UAC is.
-
What Is Virtual Secure Mode?
After watching this video; you will be able to describe virtual secure mode.
-
What Is Provisioning?
After watching this video; you will be able to describe Windows 10 provisioning.
-
What Is Windows Defender?
After watching this video; you will be able to describe Windows defender.
-
What Is WinRM?
After watching this video; you will be able to describe WinRM.
-
What Is WMI?
After watching this video; you will be able to describe Windows Management Instrumentation.
-
What is Wrong with Classic Apps?
After watching this video; you will be able to describe what is wrong with classic apps.
-
What's New in Windows Explorer?
After watching this video; you will be able to describe what's new in Windows Explorer.
-
When to Wipe N Load
After watching this video; you will be able to describe when to Wipe N Load.
-
Where Certificates Come From
After watching this video; you will be able to describe where certificates come from.
-
Why a New Browser
After watching this video; you will be able to describe why a new browser is needed.
-
API Story
After watching this video; you will be able to describe the Windows 10 API story.
-
App Model Overview
After watching this video; you will be able to describe the Windows 10 app model.
-
Application Model
After watching this video; you will be able to describe Windows 10 application model.
-
Editions
After watching this video; you will be able to compare Windows 10 editions.
-
Windows ADK Overview
After watching this video; you will be able to describe Windows ADK.
-
Windows as a Service
After watching this video; you will be able to describe Windows as a service.
-
Windows Boot Environment
After watching this video; you will be able to describe Windows boot environment.
-
Windows Device Driver Overview
After watching this video; you will be able to describe Windows device driver.
-
Windows Store Features
After watching this video; you will be able to describe Windows Store features.
-
Windows To Go
After watching this video; you will be able to describe Windows To Go.
-
Work Folder Components
After watching this video; you will be able to describe Work Folders components.
-
Workplace Join Explained
After watching this video; you will be able to describe Workplace Join.
-
WSUS for
After watching this video; you will be able to describe WSUS for Windows 10.
-
Advanced Shares
After watching this video; you will be able to create advanced shares in Windows.
-
App Updates
After watching this video; you will be able to describe app updates in Windows.
-
Azure Active Directory
After watching this video; you will be able to manage Azure Active Directory.
-
Azure RemoteApp
After watching this video; you will be able to describe the remote desktop services offered by Azure RemoteApp.
-
Basic Shares
After watching this video; you will be able to create basic shares in Windows.
-
Clouds
After watching this video; you will be able to describe cloud-based services.
-
Communications Services
After watching this video; you will be able to describe cloud-based communications services.
-
Company Portal
After watching this video; you will be able to recognize the uses of a company portal.
-
Configure Windows Settings
After watching this video; you will be able to configure display settings and shortcuts; explore Windows profiles; customize the Start menu; and create a storage space and pool.
-
Configuring the Start Menu
After watching this video; you will be able to configure the Start menu options.
-
Configuring the Windows Shortcut
After watching this video; you will be able to create and configure the Windows shortcut.
-
Configuring Windows Display Settings
After watching this video; you will be able to configure Windows display settings.
-
Configuring Windows Group Capabilities
After watching this video; you will be able to configure Windows HomeGroup capabilities.
-
Configuring Windows Groups
After watching this video; you will be able to configure Windows home groups.
-
Configuring Windows Profiles
After watching this video; you will be able to display and manage Windows profiles.
-
Create a Storage Account and Virtual Machine
After watching this video; you will be able to create and configure storage account and virtual machine in Azure.
-
Desktop Virtualization in BYOD
After watching this video; you will be able to recognize the role of desktop virtualization in a BYOD strategy.
-
Device System Updates
After watching this video; you will be able to describe device system updates.
-
Device-Centric and People-Centric IT
After watching this video; you will be able to compare device-centric and people-centric IT.
-
Disaster Recovery Options and Microsoft Azure
After watching this video; you will be able to describe disaster recovery as a service offered by Microsoft Azure.
-
Dynamic Access Control Policies in BYOD
After watching this video; you will be able to recognize the role of Dynamic Access Control Policies in a BYOD strategy.
-
Effective Permissions
After watching this video; you will be able to view effective permissions on files and folders.
-
EFS Protected Data
After watching this video; you will be able to move or copy data that is secured using Windows EFS.
-
Encrypting File System (EFS)
After watching this video; you will be able to enable and use EFS.
-
FAT
After watching this video; you will be able to describe the FAT file system.
-
FAT32
After watching this video; you will be able to describe the FAT32 file system.
-
Fault Tolerance and Microsoft Azure
After watching this video; you will be able to define fault tolerance offered by Microsoft Azure.
-
Federation Services
After watching this video; you will be able to describe federation services as part of a cloud user's Single Sign On.
-
File and Share Permissions
After watching this video; you will be able to configure file and share permissions.
-
Firewalls
After watching this video; you will be able to describe the Windows Firewall.
-
High Availability Options and Microsoft Azure
After watching this video; you will be able to define high availability as a service offered by Microsoft Azure.
-
Homegroup Sharing
After watching this video; you will be able to share files using Windows Homegroups.
-
Location Settings in Microsoft Intune
After watching this video; you will be able to recognize how location affects services in Intune.
-
Malware
After watching this video; you will be able to recognize Intune AV and malware options.
-
Microsoft Account Used in Azure
After watching this video; you will be able to manage the Windows account used as part of Azure Identity.
-
Microsoft Azure Services
After watching this video; you will be able to describe the set of services offered by Microsoft Azure.
-
Microsoft Azure Storage
After watching this video; you will be able to configure Microsoft Azure as a cloud storage service.
-
Microsoft Azure Virtual Machines
After watching this video; you will be able to describe virtual machines as a service offered by Microsoft Azure.
-
Microsoft Intune
After watching this video; you will be able to describe Microsoft Intune capabilities.
-
Microsoft Intune Selective Wipe Capabilities
After watching this video; you will be able to use Intune selective wipe capabilities.
-
Microsoft Office 365
After watching this video; you will be able to consume available cloud storage services in Microsoft Office 365.
-
Microsoft OneNote
After watching this video; you will be able to use Microsoft OneNote as a cloud storage service.
-
Microsoft Outlook
After watching this video; you will be able to use Microsoft Outlook as a cloud storage service.
-
NTFS Permissions
After watching this video; you will be able to configure NTFS permissions.
-
OneDrive for Consumers
After watching this video; you will be able to describe OneDrive for consumers as a cloud storage service.
-
Password Procedures
After watching this video; you will be able to use password procedures for authentication.
-
Preparing for File Encryption
After watching this video; you will be able to enable Windows file encryption.
-
Print Drivers
After watching this video; you will be able to install and manage printers.
-
Private Networks
After watching this video; you will be able to describe private networks.
-
Productivity Services
After watching this video; you will be able to describe Office 365 and consumer cloud services in the Microsoft cloud ecosystem.
-
Public and Private Keys
After watching this video; you will be able to use public and private keys during cryptography.
-
Public Networks
After watching this video; you will be able to describe public networks.
-
Public Shares
After watching this video; you will be able to create public shares in Windows.
-
Redundancy and Microsoft Azure
After watching this video; you will be able to define redundancy offered by Microsoft Azure.
-
ReFS
After watching this video; you will be able to describe the ReFS file system.
-
Search Services
After watching this video; you will be able to describe cloud-based search services.
-
Set Share Permissions
After watching this video; you will be able to create and share a folder; set folder permissions; and encrypt a file.
-
Smart Cards
After watching this video; you will be able to use smart cards for authentication.
-
SSL
After watching this video; you will be able to describe the role of SSL in data encryption.
-
Storage Pools
After watching this video; you will be able to manage Microsoft storage pools.
-
Storage Services
After watching this video; you will be able to describe cloud-based storage systems.
-
VPN
After watching this video; you will be able to configure a client VPN connection.
-
Windows Control Panel
After watching this video; you will be able to use the Control Panel to configure Windows.
-
Windows Rights Management
After watching this video; you will be able to describe Windows Rights Management.
-
Windows Rights Management in BYOD
After watching this video; you will be able to recognize the role of Windows Rights Management in a BYOD strategy.
-
Windows Server Active Directory
After watching this video; you will be able to manage Windows Server Active Directory.
-
Windows System Options
After watching this video; you will be able to access the Windows System Options.
-
Connecting to Remote Systems
In Windows PowerShell; it is possible to configure and control the network systems remotely. In this video; Jamie Campbell discusses how to connect to and monitor remote systems.
-
Launching PowerShell
Windows PowerShell is a powerful command line and task automation application that can be used to perform multiple tasks in Windows. In this video; Jamie Campbell discusses how to launch PowerShell.
-
Managing Features Using PowerShell
In Windows PowerShell; you can manage and install features both locally and remotely using the command-line and scripting environment. In this video; Jamie Campbell discusses how to install an available feature and remove it using PowerShell ISE.
-
PowerShell Configuration and Customization
Windows PowerShell is a powerful command line and task automation application that is highly customizable. In this video; Jamie Campbell discusses how to configure and customize PowerShell.
-
The PowerShell Command History
Windows PowerShell has a powerful Command History feature that stores the command information for future use. In this video; Jamie Campbell introduces you to the PowerShell command history.
-
The PowerShell Format cmdlet
In Windows PowerShell; you can display the results in different ways depending on the requirement using the format cmdlet. In this video; Jamie Campbell discusses how to use the format cmdlet in PowerShell.
-
What is PowerShell?
Windows PowerShell is a powerful command line and task automation application for configuring and controlling local and remote servers. In this video; Jamie Campbell discusses how Windows PowerShell works.
-
Why Use PowerShell?
Windows PowerShell is a powerful command line and task automation application that can be used to complete various tasks in Windows. In this video; Jamie Campbell discusses the features and uses of Windows PowerShell.
-
Configure a Pull Server and 2 Nodes
After watching this video; you will be able to use DSC to configure an HTTPS Pull and Compliance Server; connect 2 nodes; update their configuration and query their status.
-
Configuring Clients to Connect to a Pull Server
After watching this video; you will be able to configure clients to connect to a DSC Pull server.
-
Configuring Multiple Servers and Role Types
After watching this video; you will be able to configure multiple server node and role types via DSC.
-
Configuring Similar Sets of Servers
After watching this video; you will be able to configure similar sets of servers for replicated environments such as Development; Test; and Production via DSC.
-
Configuring the LCM in Pull Mode
After watching this video; you will be able to configure the DSC Local Configuration Manager using Pull mode.
-
Configuring the LCM in Push Mode
After watching this video; you will be able to configure the DSC Local Configuration Manager using Push mode.
-
Creating a MOF Using a DSC Script
After watching this video; you will be able to create a MOF file using DSC.
-
Creating an HTTP Pull Server
After watching this video; you will be able to create an HTTP-based DSC Pull server.
-
Creating an SMB Pull Server
After watching this video; you will be able to create an SMB-based DSC Pull server.
-
Dealing with Credentials
After watching this video; you will be able to work with and appropriately secure credentials when using DSC.
-
Dealing with Parameters
After watching this video; you will be able to improve DSC configurations using parameters.
-
Deploying Resources to Clients on an SMB Pull Server
After watching this video; you will be able to deploy new DSC Resources to clients nodes when using an SMB-based Pull server.
-
Deploying Resources to Clients via an HTTP Pull Server
After watching this video; you will be able to deploy new DSC Resources to clients nodes when using an HTTP-based Pull server.
-
Examining and Deploying a MOF File
After watching this video; you will be able to configure servers and workstations using the core DSC MOF file.
-
Examining DSC Resources
After watching this video; you will be able to describe the default resources available with DSC.
-
Examining System Configuration Prior to DSC
After watching this video; you will be able to configure and maintain system state in the GUI or via PowerShell; without using DSC; and recognize the problems it entails with regard to maintaining configuration state over time.
-
Finding; Retrieving; and Using New Resources
After watching this video; you will be able to find; retrieve; and make use of new DSC Resources.
-
Local Configuration Manager
After watching this video; you will be able to describe what the Local Configuration Manager is and how it works in DSC.
-
Logging with DSC
After watching this video; you will be able to add log entries to the DSC logs.
-
Preparing your Environment for DSC
After watching this video; you will be able to recognize the operating system versions and PowerShell versions required for DSC; as well as some additional useful resources.
-
Pull and Push Configuration Modes
After watching this video; you will be able to define the Pull and Push configuration modes in DSC.
-
Querying Node Status
After watching this video; you will be able to query the status of a particular machine in an DSC environment.
-
Querying Node Status with an HTTP Pull Server
After watching this video; you will be able to create an HTTP Compliance server to report on node status.
-
Securing an HTTP Pull Server
After watching this video; you will be able to secure an HTTP DSC Pull server to introduce HTTPS security.
-
Using Standard Resources
After watching this video; you will be able to describe how to use some of the out-of-the-box DSC resources.
-
What is Desired State Configuration
After watching this video; you will be able to provide an overview of DSC; its history; and the problems it aims to solve.
-
Working with Distributed Dependencies
After watching this video; you will be able to define the concept of DSC resource dependencies across machines in an environment.
-
66 and 110 Wiring Blocks
After watching this video; you will be able to compare 66 and 110 wiring blocks.
-
802.11 Standards
After watching this video; you will be able to describe 802.11 standards.
-
802.11a
After watching this video; you will be able to describe 802.11a.
-
Ad Hoc Mode
After watching this video; you will be able to describe ad hoc mode.
-
Advantages of an Inkjet Printer
After watching this video; you will be able to describe the advantages of an inkjet printer.
-
Align & Clean Ink Cartridges
After watching this video; you will be able to describe how to align and clean ink cartridges.
-
Analog vs. Digital
After watching this video; you will be able to compare analog and digital.
-
APIPA
After watching this video; you will be able to describe APIPA.
-
Aspect Ratio
After watching this video; you will be able to describe an aspect ratio.
-
Aspect Ratios
After watching this video; you will be able to describe aspect ratios .
-
Audible POST Error Codes
After watching this video; you will be able to describe audible POST error codes.
-
Audio
After watching this video; you will be able to describe audio.
-
Bar Code Readers
After watching this video; you will be able to describe bar code readers.
-
Battery Types
After watching this video; you will be able to describe battery types.
-
Biometric Devices
After watching this video; you will be able to describe biometric devices.
-
BIOS
After watching this video; you will be able to describe BIOS.
-
BIOS General & Temperature
After watching this video; you will be able to describe BIOS general and temperature.
-
BIOS Performance
After watching this video; you will be able to describe BIOS performance.
-
BIOS Security
After watching this video; you will be able to describe BIOS security.
-
BIOS TPM and LoJack
After watching this video; you will be able to describe BIOS TPM and LoJack.
-
BIOS UEFI
After watching this video; you will be able to describe BIOS UEFI.
-
Blank Screen
After watching this video; you will be able to describe blank screen.
-
Booting
After watching this video; you will be able to describe booting.
-
Bridge
After watching this video; you will be able to describe bridge.
-
Brightness Lumens
After watching this video; you will be able to describe brightness lumens.
-
Broadband Router - Configuration
After watching this video; you will be able to describe configuration in broadband routers.
-
Broadband Router - Firewall Settings
After watching this video; you will be able to describe firewall settings in broadband routers.
-
Broadband Router - Initial Installation
After watching this video; you will be able to describe initial installation in broadband routers.
-
Broadband Router - Management
After watching this video; you will be able to describe management in broadband routers.
-
Broadband Router - Port Forwarding
After watching this video; you will be able to describe port forwarding in broadband routers.
-
Broadband Router - QoS
After watching this video; you will be able to describe QoS in broadband routers.
-
Broadband Router - Security Settings
After watching this video; you will be able to describe security settings in broadband routers.
-
Broadband Router - Storage Settings
After watching this video; you will be able to describe storage settings in broadband routers.
-
Broadband Router - VLAN Setup
After watching this video; you will be able to describe VLAN setup in broadband routers.
-
Broadband Router - WIFI - Beam Form
After watching this video; you will be able to describe WiFi beam form in broadband routers.
-
Broadband Router - WIFI Security
After watching this video; you will be able to describe WiFi security in broadband routers.
-
Broadband Router - WPS
After watching this video; you will be able to describe WPS in broadband routers.
-
Cable
After watching this video; you will be able to describe cable.
-
Cable Management
After watching this video; you will be able to describe proper cable management.
-
Cable Ratings
After watching this video; you will be able to describe cable ratings.
-
Cable Tools
After watching this video; you will be able to describe cable tools.
-
Cables and Connectors – Coaxial Cable
After watching this video; you will be able to describe coaxial cable.
-
Cables and Connectors – Twisted Pair Cable
After watching this video; you will be able to describe twisted pair cable.
-
Cables and Connectors – Wiring Standards 568A & 568B
After watching this video; you will be able to describe wiring standards 568A and 568B.
-
CAD Workstation Components
After watching this video; you will be able to describe CAD workstation components.
-
Calibrating and Cleaning
After watching this video; you will be able to describe calibrating and cleaning.
-
Cellular
After watching this video; you will be able to describe cellular.
-
Chipsets; Northbridge; and Southbridge
After watching this video; you will be able to describe chipsets; Northbridge; and Southbridge.
-
Clean Inkjet Printer Heads
After watching this video; you will be able to describe how to clean inkjet printer heads.
-
Clean Print Devices
After watching this video; you will be able to describe how to clean print devices.
-
Clear the Print Spooler
After watching this video; you will be able to clear the print spooler.
-
Clock Speeds
After watching this video; you will be able to describe clock speeds.
-
CMOS
After watching this video; you will be able to describe CMOS.
-
CMOS Battery
After watching this video; you will be able to describe CMOS battery.
-
Coaxial RG Cables
After watching this video; you will be able to describe coaxial RG cables.
-
Color and Font for Laser Printers
After watching this video; you will be able to describe the color and font for laser printers.
-
Common Flavors of Mobile Devices
After watching this video; you will be able to describe common flavors of mobile devices.
-
Common Modification Options
After watching this video; you will be able to describe the common modification options.
-
Common Protocols
After watching this video; you will be able to describe common protocols.
-
Components and Configuration
After watching this video; you will be able to describe the components and configuration.
-
Compressed Air
After watching this video; you will be able to describe the need for compressed air.
-
Configure a WLAN
After watching this video; you will be able to configure a WLAN.
-
Configure Port Forwarding
After watching this video; you will be able to configure port forwarding.
-
Controlling the Boot Sequence
After watching this video; you will be able to describe controlling the boot sequence.
-
CPU – Central Processing Unit
After watching this video; you will be able to describe central processing unit.
-
CPU & Memory
After watching this video; you will be able to describe CPU and memory.
-
CPU Basics – Multicore
After watching this video; you will be able to describe multicore.
-
CPU Basics – Overclocking
After watching this video; you will be able to describe overclocking.
-
CPU Basics – Virtualization
After watching this video; you will be able to describe virtualization.
-
CPU Heat Pipes
After watching this video; you will be able to describe CPU heat pipes.
-
CPU Socket Types
After watching this video; you will be able to describe CPU socket types.
-
CPU Sockets
After watching this video; you will be able to describe CPU sockets.
-
Credit Card Readers
After watching this video; you will be able to describe credit card readers.
-
Cycle on/off
After watching this video; you will be able to describe cycle on/off.
-
DC Jacks
After watching this video; you will be able to describe DC jack replacement.
-
DDNS
After watching this video; you will be able to describe DDNS in broadband routers.
-
DDR3 DIMM
After watching this video; you will be able to describe DDR3 DIMM.
-
Demo an MSDS
After watching this video; you will be able to describe an MSDS.
-
Diagnostics
After watching this video; you will be able to describe the need for diagnostics.
-
Dial-up
After watching this video; you will be able to describe dial-up.
-
Digital Cameras and Webcams
After watching this video; you will be able to describe digital cameras and webcams.
-
Digitizer
After watching this video; you will be able to describe a digitizer.
-
Direct Thermal Printers
After watching this video; you will be able to describe direct thermal printers.
-
Disk Defragmenting
After watching this video; you will be able to describe disk defragmenting.
-
DiskPart
After watching this video; you will be able to describe DiskPart.
-
Display Connectors
After watching this video; you will be able to describe the display connectors.
-
Display Resolutions
After watching this video; you will be able to describe display resolutions.
-
Display Types
After watching this video; you will be able to compare the display types.
-
Display vs. Output
After watching this video; you will be able to compare display and output.
-
Docking Stations vs. Port Replicators
After watching this video; you will be able to compare docking stations and port replicators.
-
Don't Service CRT Monitors
After watching this video; you will be able to describe why you should not service CRT monitors.
-
Don't Service Inverters
After watching this video; you will be able to describe why you should not service inverters.
-
Don't Service Power Supplies
After watching this video; you will be able to describe why you should not service power supplies.
-
Driver Compatibility
After watching this video; you will be able to describe driver compatibility.
-
Drivers
After watching this video; you will be able to describe drivers.
-
Dual Display
After watching this video; you will be able to describe dual display.
-
Dual Voltage
After watching this video; you will be able to describe dual voltage.
-
Duplicate IP Addressing
After watching this video; you will be able to describe how to duplicate IP addressing.
-
DVI
After watching this video; you will be able to describe DVI.
-
DVI - Digital Visual Interface
After watching this video; you will be able to describe digital visual interface.
-
ECC RAM
After watching this video; you will be able to describe ECC RAM.
-
EIA TIA 568-A 568-B
After watching this video; you will be able to describe EIA TIA 568-A 568-B.
-
Error Codes
After watching this video; you will be able to describe error codes.
-
eSATA
After watching this video; you will be able to describe eSATA.
-
Ethernet-connected Printers
After watching this video; you will be able to describe Ethernet-connected printers.
-
Expansion Slots
After watching this video; you will be able to describe expansion slots.
-
External Component Connections
After watching this video; you will be able to describe external component connections.
-
External Storage Connections
After watching this video; you will be able to describe external storage connections.
-
Fiber Optic Cables
After watching this video; you will be able to describe fiber optic cables.
-
Fibre
After watching this video; you will be able to describe fiber.
-
Fire Extinguisher Classes
After watching this video; you will be able to compare fire extinguisher classes.
-
Fire Extinguisher Summary
After watching this video; you will be able to describe fire extinguishers.
-
Firmware Updates
After watching this video; you will be able to describe firmware updates.
-
Flash
After watching this video; you will be able to describe flash.
-
Flash the BIOS
After watching this video; you will be able to describe how to flash the BIOS.
-
Form Factors and Power Connectors (Part 1)
After watching this video; you will be able to describe form factors and power connectors.
-
Form Factors and Power Connectors (Part 2)
After watching this video; you will be able to compare form factors and power connectors.
-
Fundamentals of Networking
After watching this video; you will be able to describe the fundamentals of networking.
-
Game Pads and Joysticks
After watching this video; you will be able to describe game pads and joysticks.
-
General BIOS Settings
After watching this video; you will be able to describe general BIOS settings.
-
Hard Disk Drive Connections
After watching this video; you will be able to describe hard disk drive connections.
-
Hard Drive
After watching this video; you will be able to describe a hard drive replacement.
-
Hard Drive Symptoms
After watching this video; you will be able to describe hard drive symptoms.
-
Hard Drive Tools
After watching this video; you will be able to describe hard drive tools.
-
HDD Components and Characteristics
After watching this video; you will be able to describe HDD components and characteristics.
-
HDMI
After watching this video; you will be able to describe HDMI.
-
Heat Noise
After watching this video; you will be able to describe heat noise.
-
Heavy Equipment
After watching this video; you will be able to describe precautions of heavy equipment.
-
High-end Gaming PC
After watching this video; you will be able to describe high-end gaming PC.
-
Home Theater PC
After watching this video; you will be able to describe home theater PC.
-
Hot Components
After watching this video; you will be able to describe hot components.
-
Hot Swappable Drives
After watching this video; you will be able to describe hot swappable drives.
-
Hub
After watching this video; you will be able to describe hub.
-
Identify Appropriate PC Components
After watching this video; you will be able to identify appropriate PC components.
-
Identify BIOS Features
After watching this video; you will be able to identify BIOS features.
-
Identify Computer Peripherals
After watching this video; you will be able to identify computer peripherals.
-
Identify Expansion Slots
After watching this video; you will be able to identify expansion slots.
-
Identify Fiber Optic Connectors
After watching this video; you will be able to identify fiber optic connectors.
-
Identify Laptop Expansion Components
After watching this video; you will be able to identify laptop expansion components.
-
Identify Laser Printer Components
After watching this video; you will be able to identify laser printer components.
-
Identify Locations for Laptop Servicing
After watching this video; you will be able to identify general locations for laptop servicing.
-
Identify Networking Device Functions
After watching this video; you will be able to identify networking device functions.
-
Identify PC Connections
After watching this video; you will be able to identify PC connections.
-
Identify Power Connectors
After watching this video; you will be able to identify power connectors.
-
Identify Protocols and Ports
After watching this video; you will be able to identify protocols and ports.
-
Identify RAID Levels
After watching this video; you will be able to identify RAID levels.
-
Identify RAM Types
After watching this video; you will be able to identify RAM types.
-
Identify the Network Tools
After watching this video; you will be able to identify the network tools.
-
Identify Video Connectors
After watching this video; you will be able to identify video connectors.
-
Impact Paper Replacement
After watching this video; you will be able to describe impact paper replacement.
-
Impact Print Head Replacement
After watching this video; you will be able to describe impact print head replacement.
-
Impact Printer Ribbon Replacement
After watching this video; you will be able to describe the process of impact printer ribbon replacement.
-
Infrared
After watching this video; you will be able to describe Infrared.
-
Ink Cartridge Installation
After watching this video; you will be able to describe ink cartridge installation.
-
Inkjet Printer Functionality
After watching this video; you will be able to describe inkjet printer functionality.
-
Install on an Expansion
After watching this video; you will be able to describe how to install on an expansion.
-
Installing the CPU and Cooling
After watching this video; you will be able to describe installing the CPU and cooling.
-
Integrated Peripherals
After watching this video; you will be able to describe integrated peripherals.
-
Internal Storage Connections
After watching this video; you will be able to describe internal storage connections.
-
Introduction to IPv4 Addresses
After watching this video; you will be able to describe IPv4 addresses.
-
Introduction to Motherboards
After watching this video; you will be able to describe motherboards.
-
Inverter
After watching this video; you will be able to describe an inverter.
-
IPv6
After watching this video; you will be able to describe why to choose IPv6.
-
IRQs & Plug-and-Play
After watching this video; you will be able to describe IRQs & plug-and-play.
-
ISA (Industry Standard Architecture)
After watching this video; you will be able to describe Industry Standard Architecture.
-
KVM Switch
After watching this video; you will be able to describe KVM switch.
-
LANs
After watching this video; you will be able to describe LANs.
-
Laptop Batteries and Replacement
After watching this video; you will be able to describe laptop batteries and replacement.
-
Laptop Controls
After watching this video; you will be able to describe laptop controls.
-
Laptop Function Keys
After watching this video; you will be able to describe laptop function keys.
-
Laptop Hardware Replacement
After watching this video; you will be able to describe laptop hardware replacement.
-
Laptop Power Supplies
After watching this video; you will be able to describe laptop power supplies.
-
Laptop Processors
After watching this video; you will be able to describe laptop processors.
-
Laser Printer
After watching this video; you will be able to describe a laser printer.
-
Laser Printer Maintenance
After watching this video; you will be able to describe laser printer maintenance.
-
LCD
After watching this video; you will be able to describe LCD replacement.
-
LCD Screen Overlays
After watching this video; you will be able to describe LCD screen overlays.
-
LED – Light Emitting Diode
After watching this video; you will be able to describe light emitting diode.
-
Limited-Local Connectivity
After watching this video; you will be able to describe limited local connectivity.
-
Liquid Cooling
After watching this video; you will be able to describe liquid cooling.
-
Local vs. Network Printing
After watching this video; you will be able to compare local and network printing.
-
Loopback Plug
After watching this video; you will be able to describe loopback plug.
-
MANs
After watching this video; you will be able to describe MANs.
-
Memory Cards and Solid State
After watching this video; you will be able to compare memory cards and solid state.
-
Memory Installation
After watching this video; you will be able to describe the process of memory installation.
-
Microphone
After watching this video; you will be able to describe a microphone.
-
mini HDMI
After watching this video; you will be able to describe miniHDMI.
-
Mini PCIe
After watching this video; you will be able to describe mini PCIe.
-
Mini-ITX; BTX; and NLX
After watching this video; you will be able to compare mini ITX; BTX; and NLX.
-
Mini-PCI
After watching this video; you will be able to describe Mini-PCI.
-
miniPCI and miniPCIe
After watching this video; you will be able to describe miniPCI and miniPCIe.
-
Mobile Computing
After watching this video; you will be able to describe mobile computing.
-
Mobile Computing Advantages
After watching this video; you will be able to descrie the mobile computing advantages.
-
Mobile Computing Disadvantages
After watching this video; you will be able to describe mobile computing disadvantages.
-
Mobile Interfaces
After watching this video; you will be able to describe mobile interfaces.
-
Mobile Printing
After watching this video; you will be able to describe mobile printing.
-
Modern PC Repair
After watching this video; you will be able to describe modern PC repair.
-
Monitor Temperature and Fan Speeds
After watching this video; you will be able to describe how to monitor temperature and fan speeds.
-
Monitor Voltage Clock and Bus Speeds
After watching this video; you will be able to describe how to monitor voltage clock and bus speeds.
-
Motherboard Form Factors
After watching this video; you will be able to describe motherboard form factors.
-
Motherboard Power Connectors
After watching this video; you will be able to describe motherboard power connectors.
-
Motherboard Support for Memory Modules
After watching this video; you will be able to describe motherboard support for memory modules.
-
Motion Sensors
After watching this video; you will be able to describe motion sensors.
-
Mouse and Keyboard
After watching this video; you will be able to describe the mouse and keyboard.
-
Multichannel Memory
After watching this video; you will be able to describe multichannel memory.
-
Multilayer Switch
After watching this video; you will be able to describe multilayer switch.
-
Musical Instrument Digital Interface
After watching this video; you will be able to describe a musical instrument digital interface.
-
Native Resolution
After watching this video; you will be able to describe native resolution.
-
Network Devices – Access Points
After watching this video; you will be able to describe hubs.
-
Network Devices – Firewalls
After watching this video; you will be able to describe firewalls.
-
Network Devices – Hubs
After watching this video; you will be able to describe network fundamentals network topologies.
-
Network Devices – Modems
After watching this video; you will be able to describe modems.
-
Network Devices – NAS
After watching this video; you will be able to describe NAS.
-
Network Devices – Routers
After watching this video; you will be able to describe Ethernet.
-
Network Devices – Switches
After watching this video; you will be able to describe OSI.
-
Network Devices – VOP Phones
After watching this video; you will be able to describe VOP phones.
-
Network Fundamentals – Ethernet Overview
After watching this video; you will be able to describe Ethernet.
-
Network Fundamentals – OSI Overview
After watching this video; you will be able to describe OSI.
-
Network Fundamentals Network Topologies
After watching this video; you will be able to describe network fundamentals network topologies.
-
Network Roles – DHCP
After watching this video; you will be able to describe DHCP.
-
Network Roles – NAT
After watching this video; you will be able to describe NAT.
-
Network Roles – QoS
After watching this video; you will be able to describe QoS.
-
Network Roles – WPS
After watching this video; you will be able to describe WPS.
-
No Connectivity
After watching this video; you will be able to describe no connectivity.
-
OLED
After watching this video; you will be able to describe OLED.
-
OLED – Organic LED
After watching this video; you will be able to describe organic LED.
-
OLED Examples
After watching this video; you will be able to describe the OLED examples.
-
Optical Drives
After watching this video; you will be able to describe an optical drive replacement.
-
Optical Drives – Blu-Ray
After watching this video; you will be able to describe Blu-Ray.
-
Optical Drives – CD
After watching this video; you will be able to describe a CD.
-
Optical Drives – DVD
After watching this video; you will be able to describe a DVD.
-
OSI Layers 1-3
After watching this video; you will be able to describe OSI layers 1-3.
-
OSI Layers 4-7
After watching this video; you will be able to describe OSI layers 4-7.
-
OSI Model and Protocol Overview
After watching this video; you will be able to describe OSI model and protocol.
-
Other Printing Options
After watching this video; you will be able to describe other printing options.
-
Other Wireless Printing
After watching this video; you will be able to describe other methods of wireless printing.
-
Overview of Exterior and Interior Components
After watching this video; you will be able to describe the exterior and interior components.
-
PANs
After watching this video; you will be able to describe PANs.
-
Paper Jam
After watching this video; you will be able to describe a paper jam.
-
Parallel
After watching this video; you will be able to describe parallel.
-
Parity RAM
After watching this video; you will be able to describe parity RAM.
-
PATA
After watching this video; you will be able to describe PATA.
-
PATA Configurations and Speeds
After watching this video; you will be able to describe PATA configurations and speeds.
-
PC Card Evolution
After watching this video; you will be able to describe PC card evolution.
-
PC Cards
After watching this video; you will be able to describe PC cards.
-
PCI (Peripheral Component Interconnect)
After watching this video; you will be able to describe Peripheral Component Interconnect.
-
PCI-E (Peripheral Component Interconnect Express)
After watching this video; you will be able to describe Peripheral Component Interconnect Express.
-
PCI-X (Peripheral Component Interconnect Extended)
After watching this video; you will be able to describe Peripheral Component Interconnect Extended.
-
PCMCIA Types
After watching this video; you will be able to describe PCMCIA types.
-
PDLs for Laser Printers
After watching this video; you will be able to describe PDLs for laser printers.
-
Physical and Cable Locks
After watching this video; you will be able to describe physical and cable locks.
-
Plasma
After watching this video; you will be able to describe plasma.
-
Plastics
After watching this video; you will be able to describe plastics replacement.
-
PoE
After watching this video; you will be able to describe PoE.
-
Port Adapters
After watching this video; you will be able to describe port adapters.
-
Portable Devices
After watching this video; you will be able to describe portable devices.
-
POST
After watching this video; you will be able to describe POST.
-
POST Card
After watching this video; you will be able to describe POST card.
-
Power Strips and Surge Protectors
After watching this video; you will be able to compare power strips and surge protectors.
-
Power Surges
After watching this video; you will be able to describe power surges.
-
Prefix Notation
After watching this video; you will be able to describe prefix notation.
-
Primary Computing Functions
After watching this video; you will be able to describe primary computing functions.
-
Print a Test Page
After watching this video; you will be able to describe why to print a test page.
-
Print Quality Problem
After watching this video; you will be able to describe how to combat a print quality problem.
-
Print Server
After watching this video; you will be able to describe a print server.
-
Print Sharing
After watching this video; you will be able to describe print sharing.
-
Print Spooler
After watching this video; you will be able to describe a print spooler.
-
Printer Configuration
After watching this video; you will be able to describe printer configuration.
-
Printer Drivers
After watching this video; you will be able to describe printer drivers.
-
Printer Installation
After watching this video; you will be able to describe printer installation.
-
Printer Maintenance Kits
After watching this video; you will be able to describe printer maintenance kits.
-
Printer Preferences
After watching this video; you will be able to describe printer preferences.
-
Printer Servicing Safety
After watching this video; you will be able to describe printer servicing safety.
-
Privacy Anti-Glare Solutions
After watching this video; you will be able to describe privacy anti-glare solutions.
-
PS 2
After watching this video; you will be able to describe PATA.
-
Public & Private
After watching this video; you will be able to compare public and private.
-
PVC vs Plenum
After watching this video; you will be able to compare PVC and plenum.
-
RAM Chart
After watching this video; you will be able to describe the RAM chart.
-
RAM Overview
After watching this video; you will be able to describe RAM.
-
RAM Types DDR
After watching this video; you will be able to describe DDR.
-
RAM Types DDR2; 3; and 4
After watching this video; you will be able to compare DDR2; 3 and 4.
-
Random Access Memory
After watching this video; you will be able to describe random access memory.
-
RDRAM
After watching this video; you will be able to describe RDRAM.
-
Refresh Rates
After watching this video; you will be able to describe refresh rates.
-
Replace a Fuser
After watching this video; you will be able to describe how to replace a fuser.
-
Replace Paper
After watching this video; you will be able to describe how to replace paper.
-
Replacing a Toner Cartridge and an Image Drum
After watching this video; you will be able to describe the process of replacing a toner cartridge and an image drum.
-
RJ 45 and RJ 11
After watching this video; you will be able to compare RJ 45 and RJ 11.
-
RJ-11 Jacks
After watching this video; you will be able to describe RJ-11 jacks.
-
Rotatable and Removable Screens
After watching this video; you will be able to describe rotatable and removable screens.
-
Router
After watching this video; you will be able to describe router.
-
Safety Copyrights
After watching this video; you will be able to describe safety copyrights.
-
Safety Data Sheets
After watching this video; you will be able to describe safety data sheets.
-
Safety Disposal
After watching this video; you will be able to describe safety disposal.
-
Safety Electrostatic Discharge
After watching this video; you will be able to describe safety electrostatic discharge.
-
Safety ESD Precautions
After watching this video; you will be able to describe safety ESD precautions.
-
SATA
After watching this video; you will be able to describe SATA.
-
SATA Configurations
After watching this video; you will be able to describe SATA configurations.
-
SATA Operation
After watching this video; you will be able to describe SATA operation.
-
Scanners and Barcode Readers
After watching this video; you will be able to describe scanners and barcode readers.
-
SCSI
After watching this video; you will be able to describe SCSI.
-
SCSI Configurations
After watching this video; you will be able to describe SCSI configurations.
-
Serial Parallel
After watching this video; you will be able to describe serial parallel.
-
Setting Date and Time
After watching this video; you will be able to describe setting date and time.
-
Single-sided vs. Double-sided
After watching this video; you will be able to compare single sided versus double sided.
-
Site Survey
After watching this video; you will be able to describe site survey.
-
Smart Card Reader and Digital Cameras
After watching this video; you will be able to describe smart card readers and digital cameras.
-
Smoking
After watching this video; you will be able to describe smoking.
-
SoDIMM Memory
After watching this video; you will be able to describe SoDIMM memory replacement.
-
Solve Printing Issues
After watching this video; you will be able to solve printing issues.
-
Speakers
After watching this video; you will be able to describe the replacement of speakers.
-
Standard Common Software
After watching this video; you will be able to describe standard common software.
-
Standard Thick Client
After watching this video; you will be able to describe a standard thick client.
-
Storage – Other RAID Options
After watching this video; you will be able to describe other RAID options.
-
Storage – RAID 0; 1; and 5
After watching this video; you will be able to describe RAID 0; 1; and 5.
-
Storage – RAID 10
After watching this video; you will be able to describe RAID 10.
-
Storage Concepts and Devices
After watching this video; you will be able to describe storage concepts and devices.
-
Subnet Mask
After watching this video; you will be able to describe subnet mask.
-
System Board
After watching this video; you will be able to describe system board replacement.
-
TCP IP UDP & Ports_Ports and Protocols List
After watching this video; you will be able to describe TCP; IP; and UDP and ports and protocols list.
-
TCP vs. UDP
After watching this video; you will be able to compare TCP and UDP.
-
TCP/IP UDP and Ports – Gateways
After watching this video; you will be able to describe TCP/IP UDP and ports – gateways.
-
TCP/IP UDP and Ports – Subnetting
After watching this video; you will be able to describe TCP/IP UDP and ports – subnetting.
-
Testing AC Power
After watching this video; you will be able to describe how to test AC power.
-
Tethering
After watching this video; you will be able to describe tethering.
-
The Chkdsk Utility
After watching this video; you will be able to describe the Chkdsk utility.
-
The FORMAT Utility
After watching this video; you will be able to describe the FORMAT utility.
-
Thermal Wax Transfer
After watching this video; you will be able to describe thermal wax transfer.
-
Thin Client
After watching this video; you will be able to describe a thin client.
-
Thunderbolt
After watching this video; you will be able to describe Thunderbolt.
-
Tips on Troubleshooting for Printers
After watching this video; you will be able to describe the tips for troubleshooting for printers.
-
TN vs IPS vs PLS
After watching this video; you will be able to compare TN; IPS; and PLS.
-
Toner Prober
After watching this video; you will be able to describe toner prober.
-
Touch Screen
After watching this video; you will be able to describe touch screen.
-
Touchpads
After watching this video; you will be able to describe touch pad replacement.
-
Troubleshoot Memory
After watching this video; you will be able to describe how to troubleshoot memory.
-
Troubleshooting and Replacing Power Supplies
After watching this video; you will be able to describe troubleshooting and replacing power supplies.
-
Troubleshooting Printing Quality (Part 1)
After watching this video; you will be able to describe troubleshooting printing quality.
-
Troubleshooting Printing Quality (Part 2)
After watching this video; you will be able to implement troubleshooting printing quality.
-
Troubleshooting Printing Quality (Part 3)
After watching this video; you will be able to compare printing quality issues.
-
Troubleshooting Printing Quality (Part 4)
After watching this video; you will be able to describe printing quality issues.
-
Troubleshooting Projectors
After watching this video; you will be able to describe troubleshooting projectors.
-
Troubleshooting Resolution
After watching this video; you will be able to describe troubleshooting resolution.
-
TV Tuner Cards
After watching this video; you will be able to describe TV tuner cards.
-
Under the Hood
After watching this video; you will be able to describe the basic under the hood components of a computer.
-
Understanding Power and Electricity
After watching this video; you will be able to describe power and electricity.
-
Universal Plug and Play
After watching this video; you will be able to describe universal plug and play.
-
Unshielded and Shielded Cables
After watching this video; you will be able to describe unshielded and shielded cables.
-
USB
After watching this video; you will be able to describe USB.
-
USB Configuration
After watching this video; you will be able to describe USB configuration.
-
USB Printers
After watching this video; you will be able to describe USB printers.
-
VGA
After watching this video; you will be able to describe VGA.
-
Video Workstation Components
After watching this video; you will be able to describe video workstation components.
-
Virtual Printing
After watching this video; you will be able to describe virtual printing.
-
Virtualization Workstation Server
After watching this video; you will be able to describe virtualization workstation servers.
-
Voltage and Rails
After watching this video; you will be able to describe voltage and rails.
-
VPNs
After watching this video; you will be able to describe VPNs.
-
WANs
After watching this video; you will be able to describe WANs.
-
Wi-Fi Antenna Replacement
After watching this video; you will be able to describe the WiFi antenna replacement process.
-
Wi-Fi Printing
After watching this video; you will be able to describe Wi-Fi printing.
-
Wireless Cards
After watching this video; you will be able to describe wireless card replacement.
-
Wireless LAN Troubleshooting
After watching this video; you will be able to describe wireless LAN troubleshooting.
-
WLAN
After watching this video; you will be able to describe WLAN.
-
WLAN – 802.11 Standards
After watching this video; you will be able to describe WLAN – 802.11 standards.
-
WLAN – Implementing a SOHO Network
After watching this video; you will be able to implement a SOHO network.
-
WLAN – Wireless Encryption
After watching this video; you will be able to describe wireless encryption.
-
WLAN – Wireless LAN Security
After watching this video; you will be able to describe wireless LAN security.
-
Access Windows Remotely
After watching this video; you will be able to describe how to access Windows remotely.
-
Accessing OneDrive
After watching this video; you will be able to implement accessing OneDrive.
-
Accessing OneDrive Windows 8 and 8.1
After watching this video; you will be able to implement accessing onedrive Windows 8 and 8.1.
-
Account Management
After watching this video; you will be able to describe account management.
-
Addressing Prohibited Content and Activities
After watching this video; you will be able to describe addressing prohibited content and activities.
-
Adjusting the Display Settings
After watching this video; you will be able to implement adjusting the display settings.
-
Adjusting UAC
After watching this video; you will be able to implement adjusting UAC.
-
Anatomy of an IP Address
After watching this video; you will be able to describe the anatomy of an IP address.
-
Answer Files
After watching this video; you will be able to describe answer files.
-
Apple Products
After watching this video; you will be able to describe Apple products.
-
Apply Proper Controls (Part 1)
After watching this video; you will be able to describe applying proper controls.
-
Apply Proper Controls (Part 2)
After watching this video; you will be able to implement applying proper controls.
-
Apps Services
After watching this video; you will be able to describe apps services.
-
apt-get
After watching this video; you will be able to describe apt-get.
-
Auto Start Programs Windows 7 and 8
After watching this video; you will be able to describe auto start programs Windows 7 and 8.
-
Basic Cloud Concepts (Part 1)
After watching this video; you will be able to describe basic cloud concepts.
-
Basic Cloud Concepts (Part 2)
After watching this video; you will be able to implement basic cloud concepts.
-
BitLocker and EFS Compared
After watching this video; you will be able to compare BitLocker and EFS.
-
BitLocker Key Protectors
After watching this video; you will be able to describe BitLocker key protectors.
-
Blue Screen Errors
After watching this video; you will be able to describe computer management console.
-
Bluetooth Demo
After watching this video; you will be able to describe Bluetooth.
-
Boot Errors
After watching this video; you will be able to describe boot errors.
-
Brute Force and Dictionary Attacks
After watching this video; you will be able to describe brute force and dictionary attacks.
-
cd
After watching this video; you will be able to describe cd.
-
Check for Common Issues
After watching this video; you will be able to describe how to check for common issues.
-
chmod
After watching this video; you will be able to describe chmod.
-
Choosing the Correct Disk Format
After watching this video; you will be able to implement choosing the correct disk format.
-
chown
After watching this video; you will be able to describe chown.
-
Client Side Virtualization
After watching this video; you will be able to describe client side virtualization.
-
Cloud
After watching this video; you will be able to describe cloud.
-
Command Line Privileges
After watching this video; you will be able to describe command line privileges.
-
Command Line Tools
After watching this video; you will be able to describe command line tools.
-
Command Lines
After watching this video; you will be able to describe command lines.
-
Command Tools
After watching this video; you will be able to describe command tools.
-
Common Compatibility Issues
After watching this video; you will be able to describe common compatibility issues.
-
Common Mobile Elements (Part 1)
After watching this video; you will be able to describe emergency notifications.
-
Common Mobile Elements (Part 2)
After watching this video; you will be able to describe mobile elements.
-
Common Security Principles
After watching this video; you will be able to describe common security principles.
-
Communication Best Practices
After watching this video; you will be able to describe communication best practices.
-
Comparing Mobile OS
After watching this video; you will be able to describe comparing Mobile OS.
-
Computer Management Console
After watching this video; you will be able to describe computer management console.
-
Configure Adapters
After watching this video; you will be able to describe how to configure adapters.
-
Configure IPv4 or IPv6 Addresses
After watching this video; you will be able to configure IPv4 or IPv6 addresses.
-
Configure Power Options
After watching this video; you will be able to configure power options.
-
Configure to Boot to VHDX
After watching this video; you will be able to describe how to configure to boot to VHDX.
-
Configure Wireless Networking
After watching this video; you will be able to describe how to configure wireless networking.
-
Configuring Windows Networking
After watching this video; you will be able to configure Windows networking.
-
Control Panel Utilities (Part 1)
After watching this video; you will be able to describe control panel utilities.
-
Control Panel Utilities (Part 2)
After watching this video; you will be able to implement control panel utilities.
-
Control Panel Utilities (Part 3)
After watching this video; you will be able to describe the importance of control panel utilities.
-
Copy and Move
After watching this video; you will be able to compare copy and move.
-
cp
After watching this video; you will be able to describe cp.
-
Creating a Virtual Hard Drive in Windows 8
After watching this video; you will be able to describe creating a virtual hard drive in Windows 8.
-
Data Destruction and Disposal Method
After watching this video; you will be able to describe data destruction and disposal method.
-
Data Protection
After watching this video; you will be able to describe data protection.
-
dd
After watching this video; you will be able to describe dd.
-
Dealing with Customers
After watching this video; you will be able to describe dealing with customers.
-
Device Failure
After watching this video; you will be able to describe device failure.
-
Device Manager
After watching this video; you will be able to describe device manager.
-
DHCP vs. APPA vs. Static
After watching this video; you will be able to compare DHCP; APPA; and Static.
-
Digital Security
After watching this video; you will be able to describe digital security.
-
Display Settings
After watching this video; you will be able to describe display settings.
-
Dock
After watching this video; you will be able to describe how to use the finder.
-
Document Findings; Actions; and Outcomes
After watching this video; you will be able to describe documenting findings; actions; and outcomes.
-
Driver Installation Is Easy
After watching this video; you will be able to describe why driver installation is easy.
-
DXDiag
After watching this video; you will be able to describe DXDiag.
-
Electrical Power Issues
After watching this video; you will be able to describe electrical power issues.
-
E-mail Demo
After watching this video; you will be able to describe e-mail.
-
Emergency Notifications
After watching this video; you will be able to describe emergency notifications.
-
Encrypted File System
After watching this video; you will be able to describe the encrypted file system.
-
Establish a Theory of Probable Cause
After watching this video; you will be able to describe establishing a theory of probable cause.
-
Exploring the Control Panel of Windows 7 and 8
After watching this video; you will be able to implement exploring the control panel of Windows 7 and 8.
-
Features and Tools (Part 1)
After watching this video; you will be able to describe features and tools.
-
Features and Tools (Part 2)
After watching this video; you will be able to implement system features and tools.
-
File System Types and Formatting
After watching this video; you will be able to describe file system types and formatting.
-
Find Programs & Files
After watching this video; you will be able to describe how to find programs and files.
-
Force Quit
After watching this video; you will be able to describe Force Quit.
-
Frozen Application in Mac OS X
After watching this video; you will be able to troubleshoot a frozen application in Mac OSX.
-
grep
After watching this video; you will be able to describe grep.
-
Hardware Support in Windows
After watching this video; you will be able to describe hardware support in Windows.
-
Home vs Work vs Public Network Settings
After watching this video; you will be able to describe Home vs. Work vs. Public network settings.
-
How are IP addresses Assigned?
After watching this video; you will be able to describe how IP addresses are assigned.
-
How Do I Back Up?
After watching this video; you will be able to describe backup.
-
How Do I Configure Devices In Windows?
After watching this video; you will be able to describe how to configure devices in Windows.
-
How Do I Install Windows Drivers?
After watching this video; you will be able to describe installing Windows drivers.
-
How EFS Works
After watching this video; you will be able to describe how EFS works.
-
How Subnet Mask Works
After watching this video; you will be able to describe how a subnet mask works.
-
How to Force Quit
After watching this video; you will be able to describe how to Force Quit.
-
How to Use a Dock
After watching this video; you will be able to describe how to use a dock.
-
How to Use Spotlight
After watching this video; you will be able to describe how to use Spotlight.
-
How to use the Finder
After watching this video; you will be able to describe how to use the finder.
-
How to use Windows Recovery Tools
After watching this video; you will be able to describe how to use Windows recovery tools.
-
How Win32 Applications are Installed
After watching this video; you will be able to describe how Win32 applications are installed.
-
Identify the Problem
After watching this video; you will be able to describe identifying the problem.
-
Identifying the Hypervisor
After watching this video; you will be able to identify the hypervisor.
-
ifconfig
After watching this video; you will be able to describe ifconfig.
-
Install and Configure Bluetooth
After watching this video; you will be able to describe how to install and configure Bluetooth.
-
Install and Configure Wireless Data Network
After watching this video; you will be able to describe installing and configuring wireless data networks.
-
Install Considerations
After watching this video; you will be able to describe the install considerations.
-
Install Scenarios
After watching this video; you will be able to describe the install scenarios.
-
Install Service Packs
After watching this video; you will be able to describe how to install service packs.
-
Install Sources
After watching this video; you will be able to describe install sources.
-
Install Targets
After watching this video; you will be able to describe install targets.
-
Internal Disk Boot Methods
After watching this video; you will be able to describe internal disk boot methods.
-
Internet Options
After watching this video; you will be able to describe Internet options.
-
Keychain
After watching this video; you will be able to describe Keychain.
-
Licensing Issues
After watching this video; you will be able to describe licensing issues.
-
Linux Distributions
After watching this video; you will be able to describe Linux distributions.
-
Linux GUI
After watching this video; you will be able to describe the Linux GUI.
-
Local Security Policy in Windows 7
After watching this video; you will be able to describe local security policy in Windows 7.
-
Low Number Viruses Per OS
After watching this video; you will be able to describe low number viruses per OS.
-
lS
After watching this video; you will be able to describe lS.
-
MAC OSX
After watching this video; you will be able to describe MAC OSX.
-
Mac Tools
After watching this video; you will be able to describe Mac tools.
-
Malware (Part 1)
After watching this video; you will be able to describe malware.
-
Malware (Part 2)
After watching this video; you will be able to describe how to prevent malware.
-
man
After watching this video; you will be able to describe man.
-
Managing Device Drivers in Windows 7
After watching this video; you will be able to describe managing device drivers in Windows 7.
-
Managing Device Drivers in Windows 8
After watching this video; you will be able to describe managing device drivers in Windows 8.
-
MBR and GPT
After watching this video; you will be able to compare MBR and GPT.
-
Mirroring And Parity in Storage
After watching this video; you will be able to describe mirroring and parity in storage.
-
MMC in Windows 7
After watching this video; you will be able to describe MMC in Windows 7.
-
Mobile E-mails
After watching this video; you will be able to describe mobile e-mails.
-
Mobile OS Wireless Configuration
After watching this video; you will be able to configure mobile OS wireless.
-
Mobile Synchronization
After watching this video; you will be able to describe mobile synchronization.
-
Mobile Synchronization Methods
After watching this video; you will be able to describe mobile synchronization methods.
-
MSI EXEC
After watching this video; you will be able to describe MSI EXEC.
-
Multiple Ways to Interact
After watching this video; you will be able to describe the multiple ways to interact.
-
mv
After watching this video; you will be able to describe mv.
-
Network Access Technologies
After watching this video; you will be able to describe network access technologies.
-
Network Installation
After watching this video; you will be able to describe network installation.
-
Network Requirements
After watching this video; you will be able to describe the network requirements.
-
Network Security Appliances
After watching this video; you will be able to describe network security appliances.
-
NTFS Auditing
After watching this video; you will be able to describe NTFS auditing.
-
NTFS Inheritance
After watching this video; you will be able to describe how NTFS inheritance works.
-
Optimize Performance
After watching this video; you will be able to describe how to optimize performance.
-
OS Best Practices
After watching this video; you will be able to describe OS best practices.
-
OSX Intel California Landmarks
After watching this video; you will be able to describe OSX Intel California landmarks.
-
Other Command Line Tools
After watching this video; you will be able to describe addition command line tools.
-
Other Operating Systems
After watching this video; you will be able to describe the other operating systems.
-
passwd
After watching this video; you will be able to describe passwd.
-
Password Best Practices
After watching this video; you will be able to describe password best practices.
-
Performing a Migration with WET
After watching this video; you will be able to describe performing a migration with WET.
-
Personal Safety
After watching this video; you will be able to describe personal safety.
-
Personalize Windows
After watching this video; you will be able to describe how to personalize Windows.
-
Physical Or Virtual
After watching this video; you will be able to compare physical and virtual.
-
Physical Security
After watching this video; you will be able to describe physical security.
-
Physical Security (Parts 2)
After watching this video; you will be able to describe the importance of physical security.
-
Physically Secure Computers
After watching this video; you will be able to describe how to physically secure computers.
-
Plug N Play
After watching this video; you will be able to describe plug n play.
-
POSIX
After watching this video; you will be able to describe POSIX.
-
Power Options in Windows 7
After watching this video; you will be able to describe the power options in Windows 7.
-
Private Public and Hybrid
After watching this video; you will be able to compare private; public; and hybrid.
-
Professional Communication
After watching this video; you will be able to describe professional communication.
-
ps
After watching this video; you will be able to describe ps.
-
Purposes of Virtual Machines
After watching this video; you will be able to describe the purposes of virtual machines.
-
pwd
After watching this video; you will be able to describe pwd.
-
Quarantine Infected Systems
After watching this video; you will be able to describe how to quarantine infected systems.
-
Rapid Elasticity
After watching this video; you will be able to describe rapid elasticity.
-
ReadyBoost
After watching this video; you will be able to describe ReadyBoost.
-
Remote Disc
After watching this video; you will be able to describe remote disc.
-
Remote Management Firewall Rules
After watching this video; you will be able to describe remote management firewall rules.
-
Repair and Recovery Partition Installations
After watching this video; you will be able to describe repair and recovery partitions.
-
Resource Pooling
After watching this video; you will be able to describe resource pooling.
-
Resource Requirements
After watching this video; you will be able to describe resource requirements.
-
rm
After watching this video; you will be able to describe rm.
-
Screen Sharing
After watching this video; you will be able to describe screen sharing.
-
Secure and Trusted Boot
After watching this video; you will be able to describe secure and trusted boot.
-
Securing Mobile Devices
After watching this video; you will be able to describe securing mobile devices.
-
Securing SOHO Wireless Network
After watching this video; you will be able to describe securing SOHO wireless network.
-
Security Log
After watching this video; you will be able to describe security log.
-
Security Requirements
After watching this video; you will be able to describe the security requirements.
-
Setting up VPN Connection in Windows
After watching this video; you will be able to describe how to set up a VPN connection in Windows.
-
SFC
After watching this video; you will be able to describe SFC.
-
Sharing in Windows
After watching this video; you will be able to describe sharing in Windows.
-
Shell and Terminal
After watching this video; you will be able to describe Shell and Terminal.
-
shutdown
After watching this video; you will be able to describe shutdown.
-
Similar File Systems
After watching this video; you will be able to describe similar file systems.
-
Snapshot
After watching this video; you will be able to describe Snapshot.
-
SOHO Setup
After watching this video; you will be able to describe SOHO setup.
-
Sound
After watching this video; you will be able to describe sound.
-
Spotlight
After watching this video; you will be able to describe Spotlight.
-
SSD or Platter or SAN
After watching this video; you will be able to compare SSD; Platter; and SAN.
-
Storage Optimization
After watching this video; you will be able to describe storage optimization.
-
Storage Options In Windows
After watching this video; you will be able to describe storage options In Windows.
-
sudo
After watching this video; you will be able to describe sudo.
-
System Checklist
After watching this video; you will be able to describe system checklist.
-
System Features and Tools
After watching this video; you will be able to describe system features and tools.
-
System Properties
After watching this video; you will be able to describe system properties.
-
Task Manager in Windows 7 and 8
After watching this video; you will be able to describe the task manager in Windows 7 and 8.
-
TCP/IP Stack in Windows
After watching this video; you will be able to describe TCP/IP stack in Windows.
-
Terminal
After watching this video; you will be able to describe Terminal.
-
Test the Theory to Determine Cause
After watching this video; you will be able to describe testing the theory to determine cause.
-
The Customization Options of Windows 7
After watching this video; you will be able to describe the customization options of Windows 7.
-
The Future of Windows
After watching this video; you will be able to describe the future of Windows.
-
Thin Provisioning
After watching this video; you will be able to describe thin provisioning.
-
Threat Resistance in Windows
After watching this video; you will be able to describe threat resistance in Windows.
-
Threat Resistance Technologies
After watching this video; you will be able to describe threat resistance technologies.
-
Three Important Questions
After watching this video; you will be able to describe the three important questions.
-
Troubleshoot Common Mobile OS & App Tools (Pt 1)
After watching this video; you will be able to describe troubleshooting dim display; intermittent wireless; no wireless connectivity; and no Bluetooth connectivity.
-
Troubleshoot Common Mobile OS & App Tools (Pt 2)
After watching this video; you will be able to describe how to troubleshoot when you cannot broadcast to external monitor; touch screen is non-responsive; and apps are not loading.
-
Troubleshoot Common Mobile OS & App Tools (Pt 3)
After watching this video; you will be able to describe troubleshooting slow performance; inability to decrypt e-mail; and short battery life.
-
Troubleshoot Common Mobile OS & App Tools (Pt 4)
After watching this video; you will be able to describe troubleshooting overheating; frozen system; no sound from speakers; inaccurate touch screen response; and system lock out.
-
Troubleshoot Common Mobile OS & App Tools (Pt 5)
After watching this video; you will be able to describe troubleshooting signal drop; weak signal; power drain; and slow data speeds.
-
Troubleshoot Common Mobile OS & App Tools (Pt 6)
After watching this video; you will be able to describe troubleshooting unintended Wi-Fi connection; unintended Bluetooth pairing; and leaked personal files and data.
-
Troubleshoot Common Mobile OS & App Tools (Pt 7)
After watching this video; you will be able to describe troubleshooting data transmission over limit and unauthorized account access.
-
Troubleshoot Common Mobile OS & App Tools (Pt 8)
After watching this video; you will be able to describe troubleshooting unauthorized root access; location tracking; and camera and microphone activation; and high-resource utilization.
-
Troubleshoot PC OS Problems (Part 1)
After watching this video; you will be able to describe troubleshooting PC OS problems.
-
Troubleshoot PC OS Problems (Part 2)
After watching this video; you will be able to describe the importance of troubleshooting PC OS problems.
-
Troubleshoot PC OS Problems (Part 3)
After watching this video; you will be able to implement troubleshooting PC OS problems.
-
Troubleshoot PC OS Problems (Part 4)
After watching this video; you will be able to describe the symptoms and tools for troubleshooting.
-
Troubleshoot PC OS Problems (Part 5)
After watching this video; you will be able to configure troubleshooting PC OS problems.
-
Troubleshoot PC OS Problems (Part 6)
After watching this video; you will be able to describe troubleshooting tools for PC OS problems.
-
Troubleshoot PC Security Issues (Part 1)
After watching this video; you will be able to describe troubleshooting PC OS security issues.
-
Troubleshoot PC Security Issues (Part 2)
After watching this video; you will be able to implement troubleshooting PC OS security issues.
-
Troubleshoot PC Security Issues (Part 3)
After watching this video; you will be able to describe the importance of troubleshooting PC OS security issues.
-
Troubleshoot PC Security Issues (Part 4)
After watching this video; you will be able to describe the importance of recognizing PC security issues.
-
Troubleshooting a PC OS
After watching this video; you will be able to implement troubleshooting a PC OS.
-
Troubleshooting Applications
After watching this video; you will be able to describe troubleshooting applications.
-
Troubleshooting IPv4 Addresses
After watching this video; you will be able to describe troubleshooting IPv4 addresses.
-
Troubleshooting Scenario
After watching this video; you will be able to describe troubleshooting.
-
Types of User Profiles
After watching this video; you will be able to compare the types of user profiles.
-
Ubuntu Launcher
After watching this video; you will be able to describe Ubuntu launcher.
-
Use ADK to Create Custom WinPE
After watching this video; you will be able to implement ADK to create custom WinPE.
-
Use Malware Prevention
After watching this video; you will be able to describe why to use malware prevention.
-
User Awareness and Education
After watching this video; you will be able to describe user awareness and education.
-
User Profile Components
After watching this video; you will be able to describe the user profile components.
-
User Rights And Permissions
After watching this video; you will be able to describe user rights and permissions.
-
Using apt-get
After watching this video; you will be able to implement use of apt-get.
-
Using chmod
After watching this video; you will be able to describe using chmod.
-
Using chown
After watching this video; you will be able to describe using chown.
-
Using Command Line Tools
After watching this video; you will be able to implement command line tools.
-
Using Device Manager
After watching this video; you will be able to implement device manager.
-
Using sudo
After watching this video; you will be able to describe using sudo.
-
Using Terminal/Shell Commands
After watching this video; you will be able to implement using terminal/shell commands.
-
vi
After watching this video; you will be able to describe vi.
-
Violation of Security Best Practices
After watching this video; you will be able to describe violation of security best practices.
-
Virtual Private Networking in Windows
After watching this video; you will be able to describe virtual private networking in Windows.
-
What About Printers?
After watching this video; you will be able to describe printers.
-
What are CMD and Powershell?
After watching this video; you will be able to describe CMD and Powershell.
-
What Are Group Policies
After watching this video; you will be able to describe group policies.
-
What Are Windows Features?
After watching this video; you will be able to describe Windows features.
-
What Is A File System
After watching this video; you will be able to describe a file system.
-
What is a Modern App?
After watching this video; you will be able to describe a modern app.
-
What Is A Partition
After watching this video; you will be able to describe a partition.
-
What Is a Windows Application?
After watching this video; you will be able to describe a Windows application.
-
What Is a Windows Driver?
After watching this video; you will be able to describe a Windows driver.
-
What is an Operating System?
After watching this video; you will be able to describe an operating system.
-
What Is Automatic Maintenance?
After watching this video; you will be able to describe automatic maintenance.
-
What is BitLocker
After watching this video; you will be able to describe BitLocker.
-
What is Control Panel?
After watching this video; you will be able to describe the control panel.
-
What Is Driver Signing?
After watching this video; you will be able to describe driver signing.
-
What Is File History?
After watching this video; you will be able to describe file history.
-
What Is Internet Explorer?
After watching this video; you will be able to describe Internet Explorer.
-
What is Native VHD Boot
After watching this video; you will be able to describe native VHD boot.
-
What Is New in Windows 10 UI
After watching this video; you will be able to describe what is new In Windows 10 UI.
-
What is New in Windows 8 UI?
After watching this video; you will be able to describe what is new In Windows 8 UI.
-
What Is OneDrive?
After watching this video; you will be able to describe OneDrive.
-
What is Power Management?
After watching this video; you will be able to describe power management.
-
What is Remote Assistance?
After watching this video; you will be able to describe remote assistance.
-
What is Setup.exe
After watching this video; you will be able to describe Setup.exe.
-
What is the Local Security Policy?
After watching this video; you will be able to describe the local security policy.
-
What is the MMC?
After watching this video; you will be able to describe the MMC.
-
What is the Registry?
After watching this video; you will be able to describe the Registry.
-
What is the WIM File Format
After watching this video; you will be able to describe WIM file format.
-
What Is the Windows Store?
After watching this video; you will be able to describe the Windows Store.
-
What is USMT?
After watching this video; you will be able to describe USMT.
-
What is WDS
After watching this video; you will be able to describe WDS.
-
What is Windows Explorer
After watching this video; you will be able to describe Windows Explorer.
-
What is Windows To Go?
After watching this video; you will be able to describe Windows to Go.
-
Where Windows Drivers Live
After watching this video; you will be able to describe where Windows drivers live.
-
Why Monitor Windows?
After watching this video; you will be able to describe why to monitor Windows.
-
Windows 10 Security
After watching this video; you will be able to describe Windows 10 security.
-
Windows 7 Overview
After watching this video; you will be able to describe Windows 7.
-
Windows 7 Upgrade Paths
After watching this video; you will be able to describe Windows 7 Upgrade Paths.
-
Windows 8 and 8.1 Overview
After watching this video; you will be able to describe Windows 8 and 8.1.
-
Windows 8 Store Interface
After watching this video; you will be able to describe the Windows 8 Store interface.
-
Windows 8 Upgrade Paths
After watching this video; you will be able to describe Windows 8 upgrade paths.
-
Windows as a Networking OS
After watching this video; you will be able to describe Windows as a networking OS.
-
Windows Components
After watching this video; you will be able to describe Windows components.
-
Windows Device Membership
After watching this video; you will be able to describe Windows device membership.
-
Windows Logon
After watching this video; you will be able to describe Windows logon.
-
Windows Network Components
After watching this video; you will be able to describe Windows network components.
-
Windows Recovery Tools
After watching this video; you will be able to describe Windows recovery tools.
-
Windows Requires User Accounts
After watching this video; you will be able to describe why Windows requires user accounts.
-
Windows Special Folders
After watching this video; you will be able to describe Windows special folders.
-
Windows Timeline
After watching this video; you will be able to describe the Windows timeline.
-
Windows Vista Overview
After watching this video; you will be able to describe Windows Vista.
-
Windows XP Overview
After watching this video; you will be able to describe Windows XP.
-
WinPE
After watching this video; you will be able to describe WinPE.
-
Wireless Data Demo
After watching this video; you will be able to describe wireless data.
-
WorkGroup vs Domain Setup
After watching this video; you will be able to compare workgroup and domain setup.
-
1-Phase versus 3-Phase Power
In this video; Aaron Sampson describes the concept of single phase and 3-phase power supply.
-
Array Controller
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the array controllers also known as the RAID controllers.
-
Asset Management
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the asset management techniques such as licensing; labeling; and warranty.
-
Authentication Protocols
Authentication protocols are used in security systems to prove the identity of communicating entities. In this video; Glen E. Clarke demonstrates the use of different authentication protocols used on networks.
-
Backup Media
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the different backup media types.
-
Backup Techniques Methodology
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the methodologies associated with backup techniques.
-
Base10 versus Base2 Disk Size Calculation
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke compares base10 disk size with base2 disk size calculation.
-
Blade Technology
In this video; Aaron Sampson describes how blade servers work.
-
Bus Types; Bus Channels; and Expansion Slots
In this video; Aaron Sampson describes considerations for extending the capabilities of servers.
-
Business Continuity Plan
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the importance of a business continuity plan.
-
Business Impact Analysis
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the importance of business impact analysis; or BIA.
-
Cable Placement and Routing
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes about cable placement and routing.
-
Capacity Planning
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes capacity planning in relation to power supply.
-
Capacity Planning Considerations I
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the capacity planning considerations that should be made for managing storage space on a server.
-
Capacity Planning Considerations II
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes capacity planning considerations.
-
Causes of Common Hardware Problems
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the common causes of hardware problems.
-
Causes of Common Security Problems I
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Aaron Sampson highlights the causes of common security issues.
-
Causes of Common Security Problems II
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Aaron Sampson describes the causes for common security issues.
-
Causes of Common Software Problems
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Aaron Sampson describes the causes of common software problems and provides some troubleshooting options.
-
Causes of Common Storage Problems I
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Aaron Sampson describes the causes of common storage problems.
-
Causes of Common Storage Problems II
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Aaron Sampson describes the causes of common storage problems in CompTIA Server.
-
CIDR Notation and Subnetting
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes Classless Inter-Domain Routing (CIDR) notation and subnetting.
-
Common Hardware Problems I
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes how to troubleshoot some common hardware problems.
-
Common Hardware Problems II
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes common hardware problems that may arise while working with servers.
-
Common Network Problems I
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. Diagnosing network problems helps to determine the severity of the problem and ensures that the correct steps are taken to fix it. In this video; Aaron Sampson describes how to troubleshoot some common network problems.
-
Common Network Problems II
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Aaron Sampson describes how to troubleshoot some common network problems.
-
Common Security Issues
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Aaron Sampson describes how to troubleshoot some common security issues associated with storage solutions.
-
Common Software Problems I
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Aaron Sampson describes how to troubleshoot the common software problems.
-
Common Software Problems II
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Aaron Sampson describes how to troubleshoot the common software problems.
-
Common Storage Problems I
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Aaron Sampson describes how to identify and troubleshoot common storage problems.
-
Common Storage Problems II
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; In this video; Aaron Sampson describes some common storage problems.
-
Components of a CPU
In this video; Aaron Sampson describes the components of a CPU.
-
Configuration Specifications
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the configuration specifications and considerations that should be made when configuring a RAID array.
-
Configuring BIOS and UEFI
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E.Clarke describes how to configure and modify BIOS and Unified Extensible Firmware Interface (UEFI) settings.
-
Cooling Components
In this video; Aaron Sampson describes the various types of cooling components and their benefits.
-
Copper Cables
The CompTIA Server+ SK0-004 certification covers server architecture and administration; storage; security; networking; disaster recovery; and troubleshooting. In this video; Glen Clarke describes network cables and copper cables used in servers.
-
Disaster Recovery Plan
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the importance of a disaster recovery plan.
-
Disk Preparation I
In this video; Aaron Sampson demonstrates how to install Windows Server 2012 on a system and configure RAID on it.
-
Disk Preparation II
In this video; Glen E. Clarke explains how to configure partitions on a Windows Server.
-
Disk Preparation III
In this video; Glen E. Clarke demonstrates how to apply a file system to a partition.
-
Disk Quotas and Disk Compression
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes disk quotas and disk compression.
-
Disk Specifications
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E.Clarke describes the disk specifications for deploying primary storage devices.
-
Documentation I
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the importance of documentation related to asset management.
-
Documentation II
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the documentation types that aid in asset management.
-
Documenting Findings; Actions; and Outcomes
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the importance of documenting the findings; actions; and outcomes while implementing troubleshooting methodologies.
-
Environmental Issues
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes environmental issues that could affect servers.
-
Establishing a Theory of Probable Cause
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes how to establish a theory of probable cause of the problem.
-
Fault Tolerance and High Availability Techniques
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E.Clarke outlines the fault tolerance and high availability features in Linux.
-
Fiber Cables
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes fiber-optic cabling.
-
File; Print; Messaging; and Mail Servers
In this video; Glen E. Clarke describes characteristics of file; print; messaging; and mail servers.
-
Firewall
In this video; Glen E. Clarke describes and compares the features of host-based and network-based firewalls.
-
Flash; Compact Flash; and USB Drive
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes flash drives.
-
Hard Drive versus SSD
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke differentiates between conventional hard drives and Solid State Drives (SSD).
-
Hardware Compatibility List
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the hardware compatibility with virtualization environments.
-
Hardware Hardening
In this video; Glen E. Clarke describes hardware hardening techniques.
-
Hardware Maintenance I
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes hardware maintenance techniques.
-
Hardware Maintenance II
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes hardware maintenance techniques such as preventative maintenance and proper shut down procedures.
-
Hardware Tools
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E.Clarke describes some hardware tools that are used to troubleshoot hardware problems.
-
Heating; Ventilation; and Air Conditioning (HVAC)
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes heating; ventilation; and air conditioning of data centers.
-
Hosts and Guests
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the architecture of a virtualized environment with host and guest operating systems.
-
Hot Spare versus Cold Spare
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the hot spare and cold spare hard drives for RAID systems.
-
Hot-swap Support and Ramifications
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the benefits of hot-swap systems.
-
Identifying Problems and Determining the Scope
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke outlines how to troubleshoot server problems and determine the scope of the issue.
-
Implementing a Troubleshooting Solution
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes how to implement a troubleshooting solution.
-
Implementing Preventative Measures
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes some preventative measures that can be implemented on servers to avoid potential problems.
-
Installing Features; Roles; Applications; and Drivers
In this video; Glen E. Clarke demonstrates how to install features; applications; and device drivers on a Windows Server.
-
IPv4 versus IPv6
The CompTIA Server+ SK0-004 certification covers server architecture and administration; storage; security; networking; disaster recovery; and troubleshooting. In this video; Glen Clarke describes the structure and usage of the IPv4 and IPv6 address formats.
-
Just a Bunch of Disks
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes "just a bunch of disks" (JBOD) solutions.
-
Labeling; Bend Radius; and Cable Ties
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes cable management procedures such as labeling cables; bend radius; and cable ties.
-
Local Hardware Administration
In this video; Glen E. Clarke describes how to use access and control methods to administer local hardware such as Keyboard; Video; Mouse Switch; also known as a KVM switch.
-
Management Interface for Virtual Machines
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes management interfaces for virtual machines.
-
Media and Restore Best Practices
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the best practices for performing restore operations while working with backup media.
-
Media Storage Location
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes media storage location.
-
Multiple Circuits
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the importance of multiple circuits.
-
NAT and PAT
The CompTIA Server+ SK0-004 certification covers server architecture and administration; storage; security; networking; disaster recovery; and troubleshooting. Network Address Translation (NAT) and Port Address Translation (PAT) are methods used to change the address information of data packets while they are in transit. In this video; Glen Clarke describes NAT and PAT.
-
NetBIOS
The CompTIA Server+ SK0-004 certification covers server architecture and administration; storage; security; networking; disaster recovery; and troubleshooting. Network Basic Input/Output System (NetBIOS) is a protocol that helps applications present on different computers to communicate. In this video; Glen Clarke describes the NetBIOS.
-
Network Intrusion Detection System (NIDS)
A Network Intrusion Detection System; or NDIS; is designed to monitor and analyze network traffic and generate alerts in response to suspicious activity. In this video; Glen E. Clarke demonstrates the use of Network Intrusion Detection Systems.
-
Network Services Server
In this video; Glen E. Clarke describes the roles and requirements of network services servers.
-
Network-Attached Storage; iSCSI; and FCoE Storage Technologies
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the network-attached storage (NAS); Internet Small Computer System Interface (iSCSI); and Fiber Channel over Ethernet (FCoE) storage technologies.
-
Network-Based Hardware Administration
In this video; Glen E. Clarke describes network-based hardware administration tools.
-
Network-based Operating System Administration
In this video; Glen E. Clarke describes different techniques that can be used to remotely administer a server.
-
Networking Tools
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Aaron Sampson describes some tools provided by the operating system for basic network testing within a Windows or Linux environment.
-
Optical Drive
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes optical drives.
-
OS Hardening
In this video; Glen E. Clarke describes operating system (OS) hardening techniques.
-
Outages and Service-Level Agreements
In this video; Glen E. Clarke describes the outages and service-level agreements.
-
Patch Management I
In this video; Glen E. Clarke describes patch management techniques to ensure server maintenance.
-
Patch Management II
In this video; Glen E. Clarke describes how to perform proper patch management techniques in device driver updates.
-
Performance Baseline
In this video; Glen E. Clarke discusses some server optimization steps for Windows Server.
-
Plug Types
In this video; Aaron Sampson describes the various power connectors used in computing components.
-
Power Distribution Unit (PDU)
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the Power Distribution Unit; or PDU; device.
-
Power Voltage Components
In this video; Aaron Sampson compares the components of a power supply.
-
Power Wattage; Consumption; and Redundancy
In this video; Aaron Sampson describes the concepts of power wattage; consumption; and redundancy.
-
Public and Private IP addressing
The CompTIA Server+ SK0-004 certification covers server architecture and administration; storage; security; networking; disaster recovery; and troubleshooting. In this video; Glen Clarke compares public and private IP addresses.
-
Public Key Infrastructure (PKI)
PKI is an asymmetric encryption environment that uses a key pair to provide security services. In this video; Glen E. Clarke describes Public Key Infrastructure (PKI).
-
Rack Mounts and Towers
In this video; Aaron Sampson outlines the purpose and function of rack mount servers versus tower form factors.
-
RAID Levels and Performance Considerations
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the RAID levels and their performance considerations.
-
Remediate Security Issues
In this video; Glen E. Clarke describes the importance of performing a security scan in order to remediate security issues in a system.
-
Replication Methods
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the replication methods used within a disaster recovery situation.
-
Resources
In this video; Glen E. Clarke describes the resources that can be configured for access control list.
-
Router Access List
Access Control Lists; or ACLs; are used to check that a user is authorized to connect to a given remote site and to control which users can access a file within a filesystem. In this video; Glen E. Clarke demonstrates the use of router access lists.
-
Routing and Remote Access Server
In this video; Glen E. Clarke describes the roles and requirements of routing and remote access servers.
-
Safety Procedures I
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes electro static discharge (ESD) safety procedures.
-
Safety Procedures II
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the additional safety controls and techniques that should be used in the data center environment.
-
Securing Storage of Sensitive Documentation
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes how to securely store sensitive documentation.
-
Security Concepts I
In this video; Glen E. Clarke describes physical security mechanisms that can be used to create a secure environment.
-
Security Concepts II
In this video; Glen E. Clarke describes security controls that can aid in physical security.
-
Security Tools
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Aaron Sampson describes how security tools can be used to protect an environment.
-
Server Inventory
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke will describe the importance of asset management and documentation.
-
Server Role Overview
In this video; Glen E. Clarke outlines the role and purpose of a server.
-
Setting up a Local Account
In this video; Glen E. Clarke demonstrates how to create a local user account on a Windows Server.
-
Site Types
The CompTIA Server+ SK0-004 certification covers server architecture and administration; storage; security; networking; disaster recovery; and troubleshooting. In this video; Glen Clarke describes three types of disaster recovery sites.
-
Software Tools
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Aaron Sampson discusses the software tools used for reconfiguring applications.
-
Software versus Hardware RAID
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the difference between hardware RAID and software RAID.
-
Static Assignment vs. DHCP
The CompTIA Server+ SK0-004 certification covers server architecture and administration; storage; security; networking; disaster recovery; and troubleshooting. Dynamic Host Configuration Protocol; or DHCP; is a protocol used by networks to assign configuration parameters dynamically. In this video; Glen Clarke describes statically assigning IP addresses versus deploying those addresses through DHCP.
-
Storage Media
The CompTIA Server+ 2014 certification covers server hardware and software technology. In this video; Glen E. Clarke describes the storage encryption techniques used to help protect sensitive data.
-
Storage Tools
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Aaron Sampson describes the storage tools available for operating systems.
-
Tape Storage Technologies
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes tape storage technologies.
-
TCP versus UDP
The CompTIA Server+ SK0-004 certification covers server architecture and administration; storage; security; networking; disaster recovery; and troubleshooting. Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are standards that define how data is transmitted over a network. In this video; Glen Clarke describes the TCP and UDP network services.
-
Testing the Theory to Determine Cause
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E Clarke describes the probable theory-testing phase in the context of troubleshooting server issues.
-
Unattended and Remote Installations
In this video; Glen E. Clarke outlines the steps to automate the server installation by using the imaging technology.
-
Uninterruptible Power Supplies (UPS)
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the features of the uninterruptible power supply (UPS) device.
-
Updating Firmware
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E.Clarke describes the importance of updating the firmware for servers.
-
Users; Groups; and Roles
Data can be protected by implementing logical access control methods. In this video; Glen E. Clarke demonstrates how to implement access control lists for users; groups; and roles.
-
Verifying Full System Functionality
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the importance of verifying the full system functionality after implementing a troubleshooting solution.
-
VPNs; IPSec; and VLANs
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the features of virtual private networks (VPNs); Internet Protocol Security (IPSec); and virtual LANs (VLANs).
-
Web; Application; Directory; and Database Servers
In this video; Glen E. Clarke describes the roles and requirements for web; application; directory; and database servers.
-
WINS
The CompTIA Server+ SK0-004 certification covers server architecture and administration; storage; security; networking; disaster recovery; and troubleshooting. Windows Internet Naming Service; or WINS; is a service introduced by Microsoft to resolve Network Basic Input/Output System (NetBIOS) names. In this video; Glen Clarke describes the WINS.
-
Adding Retention Tags to Existing Retention Policy via PowerShell
Adding retention tags to existing retention policies in Microsoft Exchange Server 2013 is possible via the Exchange Management Shell. In this video; David Santana demonstrates how to add retention tags to existing policies.
-
Alter a Client Policy by Using PowerShell
Microsoft Lync Server 2013 enables administrators to alter client policies on sites using a PowerShell script in the Lync Server Management Shell. In this video; David Santana demonstrates how to use the Set-CsClientPolicy and associated commands; parameters; and variables to enable or disable client policy features on a target site.
-
Create Client Policies by Using a PowerShell Script
Microsoft Lync Server 2013 allows administrators to create client policies on sites using a PowerShell script in the Lync Server Management Shell. In this video; David Santana demonstrates how to use the New-CsClientPolicy as well as associated commands and parameters to create and configure a client policy on a target site.
-
A Simple Script
You can use scripts in Microsoft PowerShell to automate tasks. In this video; Byron Hynes demonstrates the format a PowerShell script will be saved in for automation; and explains the three major hurdles that may be encountered before running a PowerShell script; which are: detailing a specific path to the script; spaces in the file name; and PowerShell's security features.
-
Adding Firewall Rules
Microsoft PowerShell's NetSecurity module allows you to add rules to your domain's Windows Firewall installation. In this video; Byron Hynes uses the Set-NetFireWallRule command in PowerShell to enable or disable selected Display Names; Groups and Profiles; and creates a New-NetFirewallRule.
-
An Introduction to Modules
You can extend PowerShell to manage various other products with the use of modules. In this video; Byron Hynes demonstrates how a PowerShell module can be used to extend PowerShell to control other applications.
-
Changing the Security Settings on Files and Folders
Microsoft PowerShell provides permission management capabilities that allow administrators to configure the security settings on files and folders during the provisioning of new users and services. In this video; Byron Hynes uses PowerShell to create a new folder; before retrieving the access control list (ACL); applying a new rule to it; and writing the new ACL back to the resource.
-
Checking Firewall Status
Microsoft PowerShell can determine the status of the Windows Firewall. In this video; Byron Hynes demonstrates how PowerShell can be used to determine which profile is in use; what the state of the firewall is; and enable or disable the firewall.
-
Checking the Status of Remote Desktop
Microsoft PowerShell lets you determine whether a remote desktop is enabled on a Windows computer. In this video; Byron Hynes demonstrates how to check the status of a remote desktop using WMI with Windows PowerShell.
-
Cmdlet Binding
In Microsoft PowerShell; you can use cmdletbinding to turn on cmdlet type parameter binding abilities for scripts or functions. In this video; Byron Hynes demonstrates various capabilities of cmdletbinding; including the ability to control the output of the Write-Verbose and Write-Debug functions.
-
Conditional Execution – If and Switch
Microsoft PowerShell supports conditional execution that allows you to create decision-making scripts that control the flow of execution based on data supplied by using if and switch statements. In this video; Byron Hynes demonstrates comparison operators and how to control the flow of a script based on user responses using the if…else…elseif; and switch conditional statements.
-
Conditional Execution – Iteration
In Microsoft PowerShell; the foreach statement provides an aspect of conditional execution that allows you to iterate through the elements in a collection. In this video; Byron Hynes demonstrates the limitations of the for loop; how to use the foreach statement to iterate through a hash table; and how to retrieve system information with the Get-ChildItem cmdlet.
-
Conditional Execution – Looping
In Microsoft PowerShell; looping is an aspect of conditional execution that allows you to repeat a command until a specified condition (or conditions) is met. In this video; Byron Hynes demonstrates how to control script block flow using for; while; do while; and do until loops in PowerShell.
-
Count All Files in Folder/Drive
In Microsoft PowerShell; you can easily count the number of files in a folder or a drive. In this video; Byron Hynes demonstrates how to count in PowerShell.
-
Creating or Opening a Document with Microsoft Word
Microsoft PowerShell allows you to work with documents once you have created an instance of; or are connected to; the Word COM application. In this video; Byron Hynes demonstrates how to create a new document; and how to open an existing document using COM automation.
-
Examining the Security Settings on Files and Folders
Microsoft PowerShell provides security cmdlets so you can retrieve and view information about NTFS permissions that users and groups have to access files and folders in a file system. In this video; Byron Hynes demonstrates how to retrieve the access control list for a resource using the Get-Acl cmdlet; and how to display information through the Format-List cmdlet.
-
Getting Help with Get-Help
In Microsoft PowerShell; you can use the Get-Help command to get help about the various other PowerShell commandlets. In this video; Byron Hynes demonstrates how to use the Get-Help command to access basic and detailed information about PowerShell commandlets; and accesses instructions on using the Get-Help command.
-
Implicit Remoting
Microsoft PowerShell combines remoting and importing modules into a third-party machine to allow implicit remoting. In this video; Byron Hynes demonstrates how to initiate a session on your Domain Controller (DC) and load the Active Directory (AD) module so that it is referenced locally; before starting a new session and executing AD cmdlets remotely.
-
Introducing the Office COM Objects
Microsoft PowerShell allows you to expose Component Object Model (COM) objects or applications through COM automation. In this video; Byron Hynes demonstrates how programs supporting COM expose APIs through constituent DLLs; how to use the Reflection feature and Interop assemblies to perform tasks through PowerShell; and explains how the Outlook application object differs from other Office Suite applications.
-
Listing Indexed Folders
In Microsoft PowerShell; you can use components from a .NET compiled DLL to get features that aren’t natively provided with commandlets. In this video; Byron Hynes demonstrates how to manage the Windows search system with PowerShell; using the Search Software Development kit.
-
Manifest Modules
Microsoft PowerShell provides developers with the ability to create manifest modules that are used to represent metadata for a custom; script-based module. In this video; Byron Hynes demonstrates how to create a new module manifest for an existing script-based module; and how to specify metadata; such as author; company name; and copyright.
-
Manipulating the Firewall Status
Microsoft PowerShell allows you to check the status of Windows Firewall; and also easily turn it on and off. In this video; Byron Hynes takes a look at the cmdlets necessary to check the status of the firewall; how to use them to enable or disable different firewall profiles; and edit its settings.
-
Modifying Share Permissions
The Server Message Block (SMB) Share-specific cmdlets in Microsoft PowerShell provide system administration assistance automating tasks and simplifying the management of file share permissions. In this video; Byron Hynes demonstrates how to create a shared folder and assign share permissions from within PowerShell utilizing SMB Share cmdlets.
-
Output Formats
In Microsoft PowerShell; you can format the output from commandlets in a way that is most convenient for your purposes. In this video; Byron Hynes demonstrates how to use different commands to format outputs.
-
Re-Indexing the Search Catalog
In Microsoft PowerShell; you can use components from a .NET compiled DLL to get features that aren’t natively provided with commandlets. In this video; Byron Hynes demonstrates how to kick off a re-index to make sure everything is included in a search.
-
Remoting Architecture
You can invoke Remote Commands in Microsoft PowerShell to run commands on remote systems. In this video; Byron Hynes demonstrates how to use Windows Remote Management to run commands to single or multiple computers across a network.
-
Retrieving Current Share Permissions
Microsoft PowerShell provides Server Message block (SMB) cmdlets that let you easily retrieve file shares and their current share-level permissions. In this video; Byron Hynes demonstrates how to retrieve shares on a computer with the Get-SmbShare cmdlet; and how to get the access control list (ACL) of the shares using the Get-SmbShareAccess cmdlet.
-
Setting Windows 8 Search Options
Microsoft PowerShell provides developers with the ability to set search options directly from PowerShell. In this video; Byron Hynes demonstrates how to work with Windows Search settings to limit search results such as enabling web results; metered web results; safe search settings; and experience settings.
-
Timing a Command
Microsoft PowerShell offers you more than one way to measure the duration of the execution of a command on your computer. In this video; Byron Hynes uses the Stopwatch command to measure the time it takes to execute a piece of code.
-
Tips and Tricks to Get Started
Microsoft PowerShell allows you to make configuration changes in order to personalize the use and experience of an application. In this video; Byron Hynes demonstrates a number of basic modifications which can potentially shorten scripting processes in Microsoft PowerShell.
-
Use Custom Objects
You can build and use custom objects with your own Microsoft PowerShell scripts. In this video; Byron Hynes uses existing scripts to build and use custom objects.
-
Using Restore Points
Managing restore points is another great opportunity to automate behaviours using Microsoft PowerShell. In this video; Byron Hynes uses the Enable-ComputerRestore help file to assist in creating and managing restore points on your system.
-
Using the Windows Registry – Accessing Values
You can read information contained within the Windows registry using PowerShell. In this video; Byron Hynes demonstrates what the PowerShell architecture is comprised of and how it allows you to access many elements as if they were presented on a drive; including the registry.
-
Using the Windows Registry – Modifying Registry Permissions
In Microsoft PowerShell; you are able to manipulate the permissions on registry entries. In this video; Byron Hynes demonstrates how to change the permissions status on registry entries using SetAccessRule and RemoveAccessRule methods.
-
Using the Windows Registry – Retrieving Current Registry Permissions
In Microsoft PowerShell; you can set up Access Control Lists (ACLs) which control which users can manipulate registry entries. In this video; Byron Hynes demonstrates setting up an Access Control List and discusses the different permissions you can assign.
-
Using WMI
Microsoft PowerShell allows you to programatically access the Windows Management Interface (WMI) provider namespace which; at runtime; exposes your network's application information. In this video; Byron Hynes demonstrates the Windows Management Framework; details PowerShell's abilities as a WMI API; explains how the WMI provider loads WMI objects into its namespace; and uses various cmdlets to access class objects.
-
DBCC Using PowerShell
You can use your PowerShell cmdlets to pass your Database Consistancy Control (DBCC) to each database within an instance of SQL. In this Video; David Dye demonstrates how to pass DBCC commands with PowerShell; using a loop.
-
Drop Objects
Microsoft PowerShell integrates directly with SQL Server; allowing you to perform administrative tasks through the use of its commandline interface and corresponding set of cmdlets. In this video; David Dye demonstrates how to use the cmdlets to drop objects within an instance of SQL Server.
-
Evaluating the SQL Policy
In Microsoft PowerShell and SQL Server; you can evaluate the SQL policy using cmdlets. In this video; David Dye demonstrates how to use script to evaluate policy based management policies and output them to XML.
-
Executing SQL Scripts from File
In Microsoft PowerShell; you can execute a number of different SQL Server scripts that are contained in a single location. In this video; David Dye demonstrates how to invoke PowerShell to execute SQL Server scripts from a file location.
-
Managing SQL Server Client Aliases with WMI
Microsoft PowerShell and SQL Server allow you to manage client access with WMI. In this video; David Dye uses WMI to view and manage client aliases in PowerShell.
-
Monitoring Errors from the SQL Server Error Log
When working within Microsoft PowerShell and SQL Server; you can monitor errors from the SQL Server Error Log. In this video; David Dye demonstrates how to monitor errors by using PowerShell to read the SQL Server Error Log.
-
Policies
In Microsoft PowerShell and SQL Server; you can create and configure policies using cmdlets. In this video; David Dye demonstrates how to create and configure policy based management options.
-
SQLSERVER Drive and Invoke Sqlcmd cmdlets
When using Microsoft PowerShell and SQL Server; you can use the Invoke Sqlcmd cmdlet to run your sqlcmd script files. In this video; David Dye demonstrates how to add various parameters to configure the command.
-
Advanced Monitoring Errors from the SQL Server Error Log
When using Microsoft PowerShell and SQL Server; you can do advanced error monitoring from the SQL Server Error Log. In this video; David Dye demonstrates how to define advanced error monitoring within PowerShell using cmdlets.
-
Backup and Restore with SMO
The backup and restore of SQL databases can be scripted effectively from Microsoft PowerShell via SQL Server Management Objects (SMO) and SQL PowerShell using the cmdlets available in SQL Server. In this video; David Dye demonstrates how to use the Backup-SqlDatabase cmdlet and its parameters to create a SQL Server backup; before restoring a database using the Restore-SqlDatabase cmdlet.
-
Change Database User
Microsoft SQL Server PowerShell; opened within Microsoft SQL Server Management Studio (SSMS); allows you to use cmdlets to change a SQL database's ownership. In this video; David Dye demonstrates how to define server and database variables for his localhost SQL Server instance and database; identify the current owner in database Properties; and change ownership using the SetOwner and Alter variables.
-
Change Server to Mixed Mode Authentication
Microsoft PowerShell integrates directly with SQL Server; so you can perform administrative tasks through the use of its commandline interface and corresponding set of cmdlets. In this video; David Dye demonstrates how to use the cmdlets to change an instance of SQL Server from Integrated Mode Authentication to Mixed Mode Authentication.
-
Changing FILESTREAM Settings with WMI
When using Microsoft PowerShell and SQL Server; you can change FILESTREAM settings with WMI. In this video; David Dye demonstrates how to configure FILESTREAM within a SQL Server instance using WMI.
-
Configure Database Mail
You can use Microsoft PowerShell and SQL Server to configure database mail. In this video; David Dye demonstrates how to configure database mail within an instance of SQL Server.
-
Connect to SQL Using SQL Authentication
You can use Microsoft PowerShell and SQL Server to connect to SQL using SQL authentication. In this video; David Dye demonstrates the cmdlets required to connect to an instance of SQL server using SQL server authentication.
-
Create Database
In Microsoft PowerShell; you can use the PowerShell Utility to create entire new databases. In this video; David Dye demonstrates how to utilize SQL Server PowerShell in order to create a database within an instance of SQL; using Data Definition Language.
-
Create Login
Microsoft PowerShell; opened within Microsoft SQL Server Management Studio (SSMS); allows you to use cmdlets to create a Microsoft SQL Server login. In this video; David Dye uses PowerShell within SSMS to show you how to define and configure the SqlLogin type; use the Create method to determine password policies; and connect to the localhost database engine using SQL Authentication.
-
Create Operator
Microsoft PowerShell integrates directly with SQL Server; allowing you to perform administrative tasks through the use of its commandline interface and corresponding set of cmdlets. In this video; David Dye demonstrates how to use the cmdlets to create an operator within SQL Server Agent.
-
Create Schema
You can use PowerShell cmdlets and the SQL Server PowerShell utility to create a schema within a database. In this video; David Dye demonstrates how to create a schema in a database using SQL Server and the PowerShell utility.
-
Create SQL Agent Job
In Microsoft PowerShell; you can easily create SQL Server Agent Jobs. In this video; David Dye demonstrates how to use PowerShell to create a SQL Server Agent Job; and how to create that job within an instance of SQL.
-
Create Stored Procedure
When working with PowerShell and SQL Server; there are various cmdlets you can use to work with a stored procedure. In this video; David Dye demonstrates how to create; alter; and drop a stored procedure using the PowerShell utility.
-
Create XML Schema Collection
You can utilize your SQL PowerShell utility to create an XML schema collection within the PowerShell cmdlets. In this video; David Dye demonstrates how to create a schema collection using PowerShell.
-
Backup a Content Database Using Windows PowerShell
Microsoft SharePoint 2013's Management Shell enables administrators to quickly back up databases using the Backup-SPFarm command; the storage location of the backup; its type; and the database's unique identifier – located through SharePoint’s Central Administration web page. In this video; David Santana details the process; best practices; commands; and syntax used to successfully back up a SharePoint database.
-
Using PowerShell to Create a Host Named Site Collection
Microsoft SharePoint 2013 enables you to create host-named site collections; which allow you to assign unique DNS names using Windows PowerShell. In this video; David Santana uses the New-SPSite commandlet with the -HostHeaderWebApplication parameter to create an empty SharePoint 2013 site collection.
-
Using PowerShell to Create a New Content Based Database
Microsoft SharePoint 2013 enables you to use Windows PowerShell to create web application content databases for your intranet with the New-SPContentDatabase commandlet. In this video; David Santana demonstrates how to create a content database for an intranet using Windows PowerShell and the New-SPContentDatabase commandlet.
-
PowerShell Aliases
In Windows PowerShell; you can use aliases instead of frequently used cmdlets and also create customized aliases. In this video; Jamie Campbell discusses how to use aliases and create new ones.
-
PowerShell cmdlets
Windows PowerShell is a powerful command line and task automation application. Using PowerShell; administrators can configure and control both local and remote systems. In this video; Jamie Campbell discusses PowerShell cmdlets.
-
PowerShell Variable Operations
In Windows PowerShell; variety of variables and operators in the script make it easy to perform an operation. In this video; Jamie Campbell discusses how to use variables and operators in PowerShell scripts.
-
Scripting and PowerShell ISE
In Windows Power Shell; you can create and run scripts in the PowerShell Integrated Scripting Environment ISE. In this video; Jamie Campbell discusses how to use scripting in PowerShell ISE.
-
Using For Loops in PowerShell
In Windows PowerShell; you can use looping structures in scripts. In this video; Jamie Campbell discusses how to use the For loop in a PowerShell script.
-
Using Parameters with PowerShell
In Windows PowerShell; you can pass parameters to the cmdlets to get the desired information. In this video; Jamie Campbell discusses how to use parameters in PowerShell.
-
Using Variables in PowerShell
In Windows Powershell; you can use variables to determine the values in the script. In this video; Jamie Campbell discusses how to set values to variables and the various methods to display it.
-
Consume Data Services
Once you've created a Windows Communication Foundation (WCF) Data Service; you can create a client application that consumes the data service. In this video; Rafiq Wayani demonstrates how to create a client that utilizes a WCF Data Service in order to retrieve information from a SQL Server Database.
-
Schema Numerical Data Types
An understanding of the XML Schema numerical data types is important when defining numerical values for the elements and attributes in your XML document. In this video; Brigitte Birze demonstrates how the three atomic built-in primitive numeric data types are used to define numerical values; before highlighting some of the commonly used data types derived from the three base types.
-
Privacy Settings
In Microsoft Windows 8.1; the Privacy settings allow you to determine the information and data types you share; protect; or accept. In this video; Jay Ferron demonstrates how you can customize the Privacy settings for your apps; data; location; and devices.
-
Notes
Notes app is a very useful feature in Macintosh OS X that helps you to make a note of different things constantly. In this video; Josh Penzell demonstrates how you can use Notes app to remember important tasks and synchronize your other devices either through a service like Gmail or iCloud.
-
Calendar
In Microsoft Windows 8.1; you can synchronize your calendar with your SkyDrive and share it online with other users. In this video; Jay Ferron demonstrates how to use the Calendar feature to schedule tasks and reminders; access weather forecasts; and also demonstrates synchronization for online access.
-
Application Hardening
To create a secure system; we need to perform application hardening techniques. In this video; Glen E. Clarke describes application hardening techniques.
-
Account Management
After watching this video; you will be able to describe account management.
-
Action Center
After watching this video; you will be able to describe Action Center.
-
Auto Start Programs Windows 7 and 8
After watching this video; you will be able to describe auto start programs for Windows 7 and 8.
-
Change Management
In this video; Glen E. Clarke describes the different change management techniques to keep the server up-to-date.
-
BitLocker
After watching this video; you will be able to configure and use BitLocker on a Windows 10 device.
-
BitLocker To Go
After watching this video; you will be able to describe BitLocker To Go.
-
Cable Management
After watching this video; you will be able to describe cable management.
-
Compress an IPv6 Address
After watching this video; you will be able to describe how to compress an IPv6 address.
-
Contacts
Contacts in Mac OS X Mountain Lion is simple and useful. In this video; Josh Penzell demonstrates how to add; customize; and sync your contacts.
-
Customizing Logins
Customizing logins in Microsoft Windows 8 prevents unauthorized access. In this video; Jay Ferron discusses how to create and use a password; picture password; and PIN.
-
Data Binding a Custom Data Source
After watching this video; you will be able to create a custom class that can be used for data binding and implement the INotifyPropertyChanged interface.
-
Endpoint Security
To create a more secured network environment; you need to implement endpoint security. There should be real-time protection enabled within the software. In this video; Glen E. Clarke outlines the need for endpoint security.
-
File Sharing
Mac OS X Server for Mountain Lion is a powerful server management application that includes File Sharing features. In this video; Jamie Campbell discusses OS X Server File Sharing.
-
Interfaces
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E.Clarke describes the various storage interfaces.
-
Installing
After watching this video; you will be able to install MDT.
-
IPV6
After watching this video; you will be able to describe IPV6 in broadband routers.
-
Part I
After watching this video; you will be able to perform a minimal install using the text mode installer.
-
Part II
After watching this video; you will be able to complete a minimal install using the text mode installer.
-
Configure Music on Hold
Microsoft Lync Server 2013 allows administrators to use the Lync Server Management Shell to enable music on hold for specific callers or sites. In this video; David Santana retrieves the site's call park service configuration and changes its EnableMusicOnHold attribute.
-
Authentication
After watching this video; you will be able to describe authentication.
-
Backup Strategies
Microsoft SharePoint Server 2013 provides several tools for backing up a SharePoint environment. In this video; Jacob Moran discusses how farm backups should be performed regularly; but out-of-band backups can be performed as the need arises.
-
Alerts
Microsoft PowerShell and SharePoint allow administrators to retrieve information on; create; and remove alerts associated with a site collection list. In this video; David Dye demonstrates how to set variables and use a foreach loop to iterate through alerts on a specific list; and how to change the properties of an existing alert.
-
Buffer Overflow Attacks
In this video; Jamie Campbell describes the techniques to prevent buffer overflow attacks in Unix.
-
BitLocker To Go
After watching this video; you will be able to implement BitLocker To Go.
-
Biometrics
After watching this video; you will be able to configure and use biometrics on a Windows 10 device.
-
Certificates
After watching this video; you will be able to manage certificates in Windows.
-
Adding Roles
After watching this video; you will be able to add roles in Nano Server.
-
Boot Camp
Boot Camp in Mac OS X Mountain Lion allows you to install Microsoft Windows 7 and 8 alongside your Macintosh Operating System and boot up into either of the two. In this video; Josh Penzell discusses the three ways in which Boot Camp helps you install the dual boot and get it working fast and well.
-
Communication Tools
After watching this video; you will be able to describe agile communication tools.
-
Action Center
The Action Center in Microsoft Windows 8 is a proactive security and monitoring tool to keep your computer in the best condition. It lists important messages about security and maintenance settings that need your attention. In this video; Jay Ferron demonstrates how to view alerts and take actions that can help keep Windows running smoothly.
-
Configure UAC
After watching this video; you will be able to configure UAC.
-
Configuring DNS
After watching this video; you will be able to describe how Docker configures DNS with containers and virtual files.
-
Customizing the Ribbon
Microsoft SharePoint Server 2013 allows you to add elements to a ribbon. In this video; Telmo Sampaio demonstrates how to use the Ribbon Custom Action option to create a new item on a ribbon.
-
Data Binding with Collections
After watching this video; you will be able to bind a GridView to a collection.
-
Embedded Systems
After watching this video; you will be able to describe embedded systems.
-
Hardware Requirements
After watching this video; you will be able to describe the hardware requirements.
-
MAC Addresses
The CompTIA Server+ SK0-004 certification covers server architecture and administration; storage; security; networking; disaster recovery; and troubleshooting. A Media Access Control (MAC) address is a unique ID assigned to a network interface. In this video; Glen Clarke describes MAC addresses.
-
NTFS
After watching this video; you will be able to configure NTFS settings on a Windows 10 device.
-
Operations Manager Architecture
The architecture of System Center Operations Manager (SCOM) for Microsoft System Center 2012 R2 allows you to monitor the entire virtual and physical infrastructure of your network. In this video; Rafiq Wayani demonstrates how the components of SCOM contribute to the monitoring of the system center.
-
Orchestrator Integration Packs
Microsoft System Center 2012 R2 Orchestrator integration packs allow you to extend Orchestrator's functionality and its ability to integrate with other products. In this video; Rafiq Wayani demonstrates the benefits of integration packs; the process of implementing an integration pack activity; and authoring an activity through an API.
-
SkyDrive
Microsoft Windows 8.1 provides users with the SkyDrive application for use in the Cloud; which is fully integrated with the operating system. In this video; Jay Ferron demonstrates how to access SkyDrive; upload files; work in Office Web applications; use e-mail and the calendar; and set up sharing with other users.
-
Storage Spaces
After watching this video; you will be able to describe storage spaces.
-
Using Regular Expressions
In this video; Jamie Campbell describes how to use regular expressions in Unix.
-
What Is OneDrive?
After watching this video; you will be able to describe OneDrive.
-
Windows Update
After watching this video; you will be able to configure Windows Update settings.
-
Wireless Bridge
After watching this video; you will be able to describe wireless bridges.
-
Time Machine
After watching this video; you will be able to describe time machine.
-
Time Machine
Time Machine in Mac OS X Mountain Lion takes backups of your computer at regular intervals so that you can literally go back in time. In this video; Josh Penzell shows how by turning on the Time Machine; you can go back in time and undo something.
-
Virtual Machine Manager Jobs
Every time you do something in Microsoft System Center 2012 R2; it is stored in the Jobs list. In this video; Rafiq Wayani demonstrates how to use the Jobs list to view details on running; past; cancelled; and failed jobs.
-
Installing Apache
After watching this video; you will be able to configure Apache Tomcat.
-
Modules
After watching this video; you will be able to recognize how Puppet uses modules.
-
Phishing and Pharming
After watching this video; you will be able to describe phishing and pharming.
-
Piping
You can pipe your results within a PowerShell cmdlet specifically for a SharePoint object. In this video; David Dye demonstrates how to take the results from one cmdlet and pass it to another cmdlet; and then work with the result; or result set; within different cmdlets in a single query.
-
PowerShell Variables
In Microsoft PowerShell and SQL Server; variables play an important role. In this video; David Dye demonstrates how to utilize variables within commandlets; and explains the proper syntax for these variables.
-
SkyDrive
SkyDrive in Microsoft Windows 8 gives users free space; free storage; and a way to synchronize data. In this video; Jay Ferron demonstrates how to download and use SkyDrive.
-
Using the WebView Control
After watching this video; you will be able to use the WebView control in Universal Windows apps.
-
Create a Common Area Phone
Microsoft Lync Server 2013 allows you to create common area phones – IP phones deployed in common areas that are not associated with an individual user. In this video; David Santana uses the Lync Server Management Shell to create and configure a common area phone.
-
Create a Virtual Machine
In Microsoft Windows Server 2012 R2; you can create virtual machines. The basis of your virtualization solution is the VHDX. In this video; Michael Murphy demonstrates how to use the Hyper-V Manager console to create a virtual machine.
-
Defense in Depth
After watching this video; you will be able to describe defense in depth.
-
Deployment Requirements
After watching this video; you will be able to specify deployment; code maintenance; globalization and localization requirements; as part of the design specification for a Universal Windows app.
-
Design Manager
In Microsoft SharePoint Server 2013; you can change the look and feel of your web site with the Design Manager. In this video; Telmo Sampaio demonstrates how to use the Design Manager to pick a pre-installed look and apply it to an existing web site.
-
Features
In Microsoft SharePoint and PowerShell; you can create custom Features on the SharePoint site. In this video; David Dye demonstrates where to find the Features folder in the Microsoft SharePoint backend; and how to install; remove; enable; and disable a single Feature; as well as how to enable multiple features in a subsite.
-
Installing OS X Server
Mac OS X Server for Mountain Lion offers easy-to-use network management features. In this video; Jamie Campbell explains the OS X Server interface.
-
ISDN
After watching this video; you will be able to describe ISDN.
-
Search
Search in Microsoft Windows 8 allows users to use the same search to search applications; files; settings; and online stores. In this video; Jay Ferron demonstrates how to search using multiple filters.
-
Speakers
After watching this video; you will be able to describe speakers.
-
User Account Control
Microsoft Windows Server 2012 R2 allows you to activate its User Account Control (UAC) feature on administrator and user accounts; ensuring elevation prompts meet security requirements. In this video; Michael Murphy uses the Group Policy Management Editor to show you how best to configure the elevation prompt for different users and executables; ensuring maximum security and efficiency.
-
Using RSS Feeds
After watching this video; you will be able to configure Jenkins to send message to RSS feeds.
-
User Accounts
Microsoft Windows 7 enables administrators to grant different levels of security to user accounts; such as standard or administrator; and the users can belong to a custom or predefined group. These include backup operators; event log readers and remote desktop users. In this video; Jonathan Summers demonstrates how to add a new user and assign the user to a custom group.
-
Collections
After watching this video; you will be able to describe the different kinds of collections.
-
Configuring EFS
After watching this video; you will be able to configure encrypted file system.
-
Error Handling
Microsoft PowerShell allows you to handle errors in various ways. In this video; David Dye demonstrates various methods for coding procedures to undertake when errors are encountered.
-
File Sharing
Provided that you have the correct permissions; you can easily share files on a different machine using the settings in Microsoft Windows 8. In this video; Jay Ferron uses the Map Network Drive dialog box in Windows 8 to specify a connection with a shared network folder.
-
Plasma
After watching this video; you will be able to describe plasma.
-
Registered Ports and Protocols
The CompTIA Server+ SK0-004 certification covers server architecture and administration; storage; security; networking; disaster recovery; and troubleshooting. In this video; Glen Clarke describes registered ports and protocols.
-
User Accounts
Mac OS X supports the creation of separate user accounts for each person who uses the computer. In this video; Josh Penzell demonstrates how you can give each user a unique workspace in an environment where many people are sharing the same computer using System Preferences in Mac OS X.
-
Creating Users
After watching this video; you will be able to create Chef users.
-
Describing the Atlas Workflow for Enterprise
After watching this video; you will be able to describe how to use Terraform to manage infrastructure resources on cloud providers; such as Amazon Web Services and Google Cloud.
-
Line of Sight
After watching this video; you will be able to describe line of sight.
-
Multi-factor Authentication
After watching this video; you will be able to configure multi-factor authentication on a Windows 10 device.
-
Multitasking
After watching this video; you will be able to implement multitasking.
-
Performance Testing
After watching this video; you will be able to use JMeter to test code performance.
-
Performing Root Cause Analysis
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the importance of performing a Root Cause Analysis (RCA).
-
Storage Spaces
After watching this video; you will be able to manage Microsoft storage spaces.
-
Copying and Moving Files
In this video; Jamie Campbell explains how to copy and move files.
-
Direct-Attached Storage
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the features of direct-attached storage (DAS).
-
Gestures
After watching this video; you will be able to describe gestures.
-
Gestures
Gestures in Mac OS X Mountain Lion allow you to tap and swipe rather than click on the mouse or bother with the Menu bar. In this video; Josh Penzell shows you the different ways to work with gestures and have fun.
-
Rolling Hyper-V Cluster Upgrade
After watching this video; you will be able to describe the functionality of Rolling Hyper-V Cluster Upgrade in Windows Server 2016 Technical Preview.
-
Setting up a Local Account
In this video; Glen E. Clarke demonstrates how to join a local server to a domain.
-
Storage Spaces
After watching this video; you will be able to configure the different storage spaces on a Windows 10 device.
-
Types of IPv6 Addresses
After watching this video; you will be able to describe the types of IPv6 addresses.
-
Biometric Devices
After watching this video; you will be able to describe biometric devices.
-
Customizing Logins
Microsoft Windows 8.1 allows you to customize different ways for logging into your computer; providing for a personalized and more secure environment. In this video; Jay Ferron demonstrates how to configure a picture password and add a PIN from the Sign-in options screen in Windows 8.1.
-
Determining Application Compatibility
After watching this video; you will be able to describe the process to determine application compatibility.
-
Mission Control
Mission Control in Mac OS X Mountain Lion gives you an overview of everything going on in your computer. In this video; Josh Penzell shows how using Mission Control well can really save descent time and be fun.
-
Multiple Displays
After watching this video; you will be able to describe multiple displays.
-
Routing
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. In this video; Jacob Moran discusses routing in SharePoint 2013.
-
Storage Area Network
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes storage area networks (SANs).
-
Types of IPv4 Addresses
After watching this video; you will be able to describe the types of IPv4 addresses.
-
Create a Dial Plan
Microsoft Lync Server 2013 requires a dial plan to be defined when deploying an Egde server. In this video; David Santana uses the Lync Server Control Panel to create a dial plan for a specific site.
-
Hypervisor
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the Hypervisor as a component of the virtualization environment.
-
Introduction
When dealing with database administration; SQL Server can be integrated with PowerShell using PowerShell’s command line interface and SQL Server Management Studio. This preloads modules and assemblies representing SQL Server within SQL PowerShell. In this video; David Dye introduces the PowerShell and SQL Server interfaces and shows how SQL can integrate into PowerShell.
-
Linux
After watching this video; you will be able to describe Linux.
-
Share Permissions
After watching this video; you will be able to configure Share permissions.
-
Working with Services
In Microsoft PowerShell; you can use a wide range of SQL Server services with PowerShell. In this video; David Dye demonstrates how to identify and sort services using PowerShell.
-
Configuring and Using Sudo
The CompTIA Linux+ certifications; LX0-103 and LX0-104; powered by Linux Professional Institute (LPI); cover the fundamental knowledge and skills required for Linux administration. In this video; Dan LaChance demonstrates how to configure and use sudo to give users administrative rights to some commands without giving them the root password.
-
Creating alerts
After watching this video; you will be able to create a performance alert in Windows Performance Monitor.
-
Configuring Alerts
After watching this video; you will be able to configure alerts using Intune on a Windows 10 device.
-
Configuring Windows Update
Microsoft Windows 7 allows you to configure Windows Update and choose how the latest security and feature updates from Microsoft are downloaded and installed on your computer in order to improve security and reliability. In this video; Jonathan Summers highlights the different options when changing how Windows installs or notifies you about updates in the Windows Update settings.
-
Creating User Accounts
After watching this video; you will be able to create and set up a user account.
-
Desktop
The desktop is your main workspace in Mac OS X Mountain Lion. In this video; Josh Penzell orients you with the desktop by drawing on the similarities and the differences between the Mountain Lion operating system and the Windows operating system.
-
DHCP
In this video; Jamie Campbell describes domain name service (DNS) and Berkeley Internet Name Domain (BIND).
-
DNS
After watching this video; you will be able to describe DNS.
-
Document Set Settings
Document Set Settings in Microsoft SharePoint 2013 allows users to customize a document set. In this video; David Santana demonstrates how to configure your document set.
-
Formatting
After watching this video; you will be able to describe formatting.
-
IPv6 Addressing
After watching this video; you will be able to describe IPv6 addressing.
-
Lists
Microsoft PowerShell and SharePoint provide SharePoint farm administrators with the ability to work with lists and list items directly within PowerShell. In this video; David Dye demonstrates how to set variables to retrieve lists and list items from a specific site collection by title and id and format them as a table.
-
Notifications
Notifications in Microsoft Windows 8 keep you informed about new email; messages; calendar events; and status updates. In this video; Jay Ferron shows you how to customize how you are notified.
-
Privacy
The privacy settings in Microsoft Windows 8 allow users to decide what can and cannot be tracked about their computer use. In this video; Jay Ferron demonstrates how to protect your privacy.
-
SaaS
After watching this video; you will be able to describe SaaS.
-
Search
Microsoft Windows 8.1 provides an enhanced Search feature that allows users to specify where and what kind of item to search for. In this video; Jay Ferron demonstrates how to access; specify; and filter searches.
-
Storage Media
The CompTIA Server+ 2014 certification covers server hardware and software technology. In this video; Glen E. Clarke outlines the techniques used to implement secure storage disposal.
-
Variables
After watching this video; you will be able to use variables in Puppet.
-
Default Gateway
The CompTIA Server+ SK0-004 certification covers server architecture and administration; storage; security; networking; disaster recovery; and troubleshooting. In this video; Glen Clarke describes the default gateway and how to view its IP address.
-
Event Logs
Microsoft Internet Information Services (IIS) allows you to use the Microsoft IIS Event Logs for troubleshooting issues. In this video; Pierre Devereux demonstrates how to use Microsoft IIS Event Logs when searching for possible reasons behind suspect service behaviour; such as when a Microsoft IIS Service behaves outside of the expected parameters.
-
Backup
After watching this video; you will be able to describe backup.
-
BitLocker to Go
BitLocker in Microsoft Windows 8 allows you to encrypt your hard drives in multiple ways. In this video; Jay Ferron demonstrates how to secure your data using BitLocker.
-
Certificate and Firewall Requirements
When using Microsoft Exchange Server 2013; Microsoft recommends the use of self-signed certificates for external communication. You can choose to purchase a third-party certificate; but you need to take various considerations into account when doing so; including various firewall considerations when using federated sharing. In this video; Michael Murphy demonstrates certificate and firewall requirements.
-
Configuring Common Networking Situations
After watching this video; you will be able to list the location of log files and the purpose of the common logs.
-
File History
File history in Microsoft Windows 8 allows users to protect their libraries and data. In this video; Jay Ferron demonstrates how to work with file history.
-
Homegroup
After watching this video; you will be able to configure and join a homegroup on a Windows 10 device.
-
How DNS Works
After watching this video; you will be able to describe how DNS works.
-
IaaS
After watching this video; you will be able to describe IaaS.
-
Web Hosting
In Mac OS X Server; you can host websites. In this video; Jamie Campbell discusses how to host websites.
-
Life Cycle Management
The CompTIA Server+ certification covers the methodology required to maintain; support; and troubleshoot server hardware and software. In this video; Glen E. Clarke describes the importance of asset management lifecycle.
-
Microsoft Account
After watching this video; you will be able to explain what a Microsoft Account is and its uses.
-
Navigating Workspaces
After watching this video; you will be able to enable and navigate with virtual workspaces in Ubuntu.
-
Operations Manager Management Packs
In Microsoft System Center 2012 R2; management packs provide item specific information for the user monitoring the system center which include monitoring; data interpretation; and actions to take in case of failures. In this video; Rafiq Wayani demonstrates how management packs are utilized in system center monitoring.
-
Share Permissions
After watching this video; you will be able to configure sharing permissions on a Windows 10 device.
-
Social Engineering
After watching this video; you will be able to describe social engineering.
-
Templates
After watching this video; you will be able to use different kinds of Puppet templates to create configuration files.
-
Types Of User Accounts
After watching this video; you will be able to compare types of user accounts.
-
Using Task Manager
After watching this video; you will be able to implement using task manager.
-
Windows Explorer
After watching this video; you will be able to implement Windows Explorer.
-
Working with PowerShell
Microsoft Windows PowerShell; compatible with SharePoint's syntax and object model; lacks the SharePoint objects; namespaces and assemblies loaded into the SharePoint Management Shell. In this video; David Dye demonstrates how to work with SharePoint directly from within Windows PowerShell after loading the required SharePoint assemblies.
-
Certificates
In Microsoft Internet Information Services (IIS); there are three types of certificates that allow you to use the IIS Security services; each best suited for use in specific environments. In this video; Pierre Devereux demonstrates the application of these certificates through the Server Manager.
-
Configure Firewall Rules
After watching this video; you will be able to configure firewall rules.
-
Configuring BitLocker
After watching this video; you will be able to configure BitLocker with and without the use of a TPM chip.
-
Fiber Connector Types
After watching this video; you will be able to describe fiber connector types.
-
File History
After watching this video; you will be able to use file history.
-
iCloud
iCloud allows you to synchronize and back up all of your devices to one unified Cloud provided by Apple. Apple provides 5 gigabytes free storage for just signing up. In this video; Josh Penzell demonstrates how you can sync your data with all your devices automatically and wirelessly by saving them in iCloud.
-
Overview
Microsoft BizTalk Server 2013's Messaging engine allows the creation and implementation of logical business processes spanning multiple applications. In this video; Clive Herman uses BizTalk 2013's Administration Console to demonstrate the workflow of inbound XML documents and messages through BizTalk's Service-oriented Architecture (SOE).
-
Repeaters
After watching this video; you will be able to describe repeaters.
-
Virtualization
After watching this video; you will be able to provision virtual servers through DevOps and recognize DevOps virtualization tools such as Vagrant.
-
Wearable Technology
After watching this video; you will be able to describe wearable technology.
-
Windows Boot Environment
After watching this video; you will be able to describe Windows boot environment.
-
Work Folders
After watching this video; you will be able to recognize the uses of work folders.
-
Work Folders
After watching this video; you will be able to configure work folders on a Windows 10 device.
-
Co-authoring
The MCSE SharePoint certification covers planning and maintaining SharePoint and the core Windows Server technologies upon which SharePoint depends. The co-authoring feature enables multiple users to work on a document without interfering with each other's changes. In this video; Jacob Moran discusses co-authoring in SharePoint 2013.
-
Data Binding Using Type Conversions
After watching this video; you will be able to create a converter that can be used with data binding by implementing the IValueConverter interface and use a converter when data binding in XAML.
-
Group Policies
Microsoft Windows 8's Group Policy Object snap-in allows you to configure and control your Windows 8 local and network machines through myriad Computer and User Configuration policies and settings. In this video; Jay Ferron gives an introduction to the purposes; functions; and capabilities of Windows 8's many computer and user group policies and their roles in optimizing user behavior.
-
Hypervisor
After watching this video; you will be able to describe hypervisor.
-
Permissions
The CompTIA Server+ 2014 certification covers server hardware and software technology. In this video; Glen E. Clarke outlines the types of permissions that can be used when configuring access control lists.
-
Print Spooler
After watching this video; you will be able to describe print spooler.
-
Using Task Manager
After watching this video; you will be able to access and use Task Manager on a Windows 10 device.
-
Data Binding Basics
After watching this video; you will be able to bind properties of elements to other elements and object instances.
-
Mail
In Microsoft Windows 8.1; you can connect to multiple mail accounts. In this video; Jay Ferron demonstrates how to use the built-in Mail application to configure a mail account.
-
New Features
After watching this video; you will be able to describe new features.
-
PATA
After watching this video; you will be able to describe PATA.
-
Security Zones
A security zone is a place where network administrators can physically separate different parts of the network to help create a more secure network infrastructure environment. In this video; Glen E. Clarke describes the security zones.
-
Windows Update
The Windows Update technology in Microsoft Windows 8; if configured; saves you the hassle of searching for updates online or worrying that critical fixes for Windows might be missing from your computer. In this video; Jay Ferron demonstrates how to configure Windows Update and keeps your computer up to date.
-
Working with Contacts
In Microsoft PowerShell and Exchange; you can create mail-enabled users and mail-enabled contacts. In this video; Patrick Loner demonstrates how to use the New-MailContact commandlet to create a mail contact with the individual's first and last name; as well as their e-mail address.
-
Microsoft Windows Server 2016: Adjusting Memory Allocation in a Running VM
After watching this video, you will be able to add or remove memory in running a virtual machine.
-
Windows Server 2016 - Install, Store, and Compute: Requirements for Installing Hyper-V
After watching this video, you will be able to determine hardware and compatibility requirements for installing Hyper-V.
-
Windows Server 2016 - Install, Store, and Compute: Installing Hyper-V
After watching this video, you will be able to install Hyper-V on Windows Server 2016.
-
Windows Server 2016 - Install, Store, and Compute: Installing Hyper-V Management Tools
After watching this video, you will be able to install management tools on Windows Server 2016 Hyper-V.
-
Windows Server 2016 - Install, Store, and Compute: Upgrading from Existing Versions of Hyper-V
After watching this video, you will be able to upgrade from existing versions of Hyper-V.
-
Windows Server 2016 - Install, Store, and Compute: Delegate Virtual Machine Management
After watching this video, you will be able to delegate virtual machine management.
-
Windows Server 2016 - Install, Store, and Compute: Performing Remote Management of Hyper-V Hosts
After watching this video, you will be able to perform remote management of Hyper-V hosts.
-
Windows Server 2016 - Install, Store, and Compute: Configure VMs Using Windows PowerShell Direct
After watching this video, you will be able to configure virtual machines using Windows PowerShell Direct.
-
Windows Server 2016 - Install, Store, and Compute: Implement Nested Virtualization
After watching this video, you will be able to implement nested virtualization.
-
Microsoft Windows Server 2016: Configuring Dynamic Memory
After watching this video, you will be able to configure dynamic memory for a virtual machine.
-
Microsoft Windows Server 2016: Non-uniform Memory Access (NUMA) Support
After watching this video, you will be able to understand non-uniform memory access (NUMA) support.
-
Windows Server 2016 - Install, Store, and Compute: Backup and Restore Data Deduplication
After watching this video, you will be able to implement a backup and restore solution with data deduplication.
-
Windows Server 2016 - Install, Store, and Compute: Tagging an Image
After watching this video, you will be able to add tags to an image.
-
Windows Server 2016 - Install, Store, and Compute: Uninstalling an Operating System Image
After watching this video, you will be able to uninstall an operating system image.
-
Windows Server 2016 - Install, Store, and Compute: Creating Windows Server Containers
After watching this video, you will be able to create Windows Server containers.
-
Windows Server 2016 - Install, Store, and Compute: Creating Hyper-V Containers
After watching this video, you will be able to create Hyper-V containers.
-
Windows Server 2016 - Install, Store, and Compute: Managing Containers Using Windows PowerShell
After watching this video, you will be able to manage Windows containers using Windows PowerShell.
-
Windows Server 2016 - Install, Store, and Compute: Managing Container Networking
After watching this video, you will be able to manage Windows container networking.
-
Windows Server 2016 - Install, Store, and Compute: Managing Container Data Volumes
After watching this video, you will be able to manage Windows container data volumes.
-
Windows Server 2016 - Install, Store, and Compute: Managing Resource Control
After watching this video, you will be able to manage Resource Control for containers.
-
Windows Server 2016 - Install, Store, and Compute: Creating New Container Images Using Dockerfile
After watching this video, you will be able to create new container images using Dockerfile.
-
Windows Server 2016 - Install, Store, and Compute: Managing Container Images Using DockerHub
After watching this video, you will be able to manage container images using DockerHub repository.
-
Windows Server 2016 - Install, Store, and Compute: Managing Container Images
After watching this video, you will be able to manage container images.
-
Windows Server 2016 - Install, Store, and Compute: Configuring NIC Teaming
After watching this video, you will be able to configure NIC teaming for Hyper-V VMs.
-
Windows Server 2016 - Install, Store, and Compute: Virtual Machine Queue (VMQ)
After watching this video, you will be able to configure Virtual Machine Queue (VMQ).
-
Windows Server 2016 - Install, Store, and Compute: RDMA Using Switch Embedded Teaming (SET)
After watching this video, you will be able to enable Remote Direct Memory Access (RDMA) on network adapters bound to a Hyper-V virtual switch using Switch Embedded Teaming (SET).
-
Windows Server 2016 - Install, Store, and Compute: Bandwidth Management
After watching this video, you will be able to configure Bandwidth Management.
-
Windows Server 2016 - Install, Store, and Compute: Requirements and Scenarios for Containers
After watching this video, you will be able to identify installation requirements and implementation scenarios for Windows containers.
-
Windows Server 2016 - Install, Store, and Compute: Windows Server Container Host
After watching this video, you will be able to implement a Windows Server container host in physical or virtualized environments.
-
Windows Server 2016 - Install, Store, and Compute: Windows Server Container Host on Core or Nano
After watching this video, you will be able to implement a Windows Server container host on Windows Server Core or Nano Server in a physical or virtualized environment.
-
Windows Server 2016 - Install, Store, and Compute: Docker on Windows Server and Nano Server
After watching this video, you will be able to install Docker on Windows Server and Nano Server.
-
Windows Server 2016 - Install, Store, and Compute: Docker Daemon Start-up Options
After watching this video, you will be able to configure Docker daemon start-up options.
-
Windows Server 2016 - Install, Store, and Compute: Windows PowerShell for Containers
After watching this video, you will be able to configure Windows PowerShell for use with containers.
-
Windows Server 2016 - Install, Store, and Compute: Install a Base Operating System
After watching this video, you will be able to install a base operating system container image.
-
Windows Server 2016 - Install, Store, and Compute: Discrete Device Assignment (DDA)
After watching this video, you will be able to implement Discrete Device Assignment (DDA).
-
Windows Server 2016 - Install, Store, and Compute: VHD, VHDX, and Shared VHDX Files
After watching this video, you will be able to create VHD and VHDX files using Hyper-V Manager and implement shared VHDX files.
-
Windows Server 2016 - Install, Store, and Compute: Differencing and Pass-through Disks
After watching this video, you will be able to configure differencing disks, modify virtual hard disks, configure pass-through disks.
-
Windows Server 2016 - Install, Store, and Compute: Managing VHDs and Checkpoints
After watching this video, you will be able to resize a virtual hard disk, manage checkpoints, and implement checkpoints.
-
Windows Server 2016 - Install, Store, and Compute: VFC Adapters and Storage QoS
After watching this video, you will be able to implement a virtual Fibre Channel adapter and configure storage Quality of Service (QoS).
-
Windows Server 2016 - Install, Store, and Compute: Virtual Network Interface Cards (vNICs)
After watching this video, you will be able to add and remove virtual network interface cards (vNICs).
-
Windows Server 2016 - Install, Store, and Compute: Hyper-V Virtual Switches
After watching this video, you will be able to configure Hyper-V virtual switches.
-
Windows Server 2016 - Install, Store, and Compute: Optimize Network Performance
After watching this video, you will be able to optimize network performance.
-
Windows Server 2016 - Install, Store, and Compute: Configuring MAC Addresses
After watching this video, you will be able to configure MAC addresses.
-
Windows Server 2016 - Install, Store, and Compute: Implementing Network Isolation
After watching this video, you will be able to implement network isolation.
-
Windows Server 2016 - Install, Store, and Compute: Synthetic and Legacy Virtual Network Adapters
After watching this video, you will be able to configure synthetic and legacy virtual network adapters.
-
Microsoft Windows Server 2016: Smart Paging
After watching this video, you will be able to configure smart paging for a virtual machine.
-
Microsoft Windows Server 2016: Resource Metering
After watching this video, you will be able to configure Resource Metering using Windows Server 2016 Hyper-V.
-
Windows Server 2016 - Install, Store, and Compute: Integration Services
After watching this video, you will be able to manage Windows Server 2016 Hyper-V Integration Services.
-
Windows Server 2016 - Install, Store, and Compute: Generation 1 vs Generation 2 VMs
After watching this video, you will be able to determine when to create and configure generation 1 and 2 VMs.
-
Windows Server 2016 - Install, Store, and Compute: Enhanced Session Mode
After watching this video, you will be able to implement enhanced session mode.
-
Windows Server 2016 - Install, Store, and Compute: Linux and FreeBSD VMs
After watching this video, you will be able to implement Linux and FreeBSD VMs in Windows Server 2016 Hyper-V.
-
Windows Server 2016 - Install, Store, and Compute: Linux Integration Services (LIS)
After watching this video, you will be able to install and configure Linux Integration Services (LIS).
-
Windows Server 2016 - Install, Store, and Compute: FreeBSD Integration Services (BIS)
After watching this video, you will be able to install and configure FreeBSD Integration Services (BIS).
-
Windows Server 2016 - Install, Store, and Compute: Implementing Secure Boot for Windows and Linux
After watching this video, you will be able to implement Secure Boot for Windows and Linux environments.
-
Windows Server 2016 - Install, Store, and Compute: Converting VMs from Previous Versions of Hyper-V
After watching this video, you will be able to identify the process of moving and converting VMs from a previous version of Hyper-V to Windows Server 2016 Hyper-V.
-
Windows Server 2016 - Install, Store, and Compute: Exporting and Importing VMs
After watching this video, you will be able to export and import VMs to Windows Server 2016 Hyper-V.
-
Windows Server 2016 - Install, Store, and Compute: Node Fairness
After watching this video, you will be able to enable and configure node fairness.
-
Windows Server 2016 - Install, Store, and Compute: Migrating Storage
After watching this video, you will be able to perform a storage migration.
-
Windows Server 2016 - Install, Store, and Compute: Importing, Exporting, and Copying VMs
After watching this video, you will be able to import or export, and copy VMs.
-
Windows Server 2016 - Install, Store, and Compute: VM Network Health Protection
After watching this video, you will be able to configure VM network health protection.
-
Windows Server 2016 - Install, Store, and Compute: Drain On Shutdown
After watching this video, you will be able to configure drain on shutdown.
-
Windows Server 2016 - Install, Store, and Compute: NLB Prerequisites
After watching this video, you will be able to identify deployment prerequisites for network.
-
Windows Server 2016 - Install, Store, and Compute: Install NLB Nodes
After watching this video, you will be able to install NLB cluster nodes.
-
Windows Server 2016 - Install, Store, and Compute: Configuring NLB Affinity
After watching this video, you will be able to configure Network Load Balancing cluster node affinity.
-
Windows Server 2016 - Install, Store, and Compute: Configuring Port Rules
After watching this video, you will be able to configure port rules for the Network Load Balancing cluster.
-
Windows Server 2016 - Install, Store, and Compute: Live VM Migration
After watching this video, you will be able to perform a live migration.
-
Windows Server 2016 - Install, Store, and Compute: Performing Quick Migrations
After watching this video, you will be able to perform a quick migration.
-
Windows Server 2016 - Install, Store, and Compute: Cloud Witness
After watching this video, you will be able to implement cloud witness feature for a failover cluster.
-
Windows Server 2016 - Install, Store, and Compute: Requirements for Storage Spaces Direct
After watching this video, you will be able to identify requirements for implementing Storage Spaces Direct.
-
Windows Server 2016 - Install, Store, and Compute: Windows PowerShell for Storage Spaces Direct
After watching this video, you will be able to configure Storage Spaces Direct using Windows PowerShell.
-
Windows Server 2016 - Install, Store, and Compute: Disaggregated Storage Spaces Direct
After watching this video, you will be able to implement a cluster using a disaggregated Storage Spaces Direct configuration.
-
Windows Server 2016 - Install, Store, and Compute: Hyper-converged Storage Spaces Direct
After watching this video, you will be able to implement a cluster using a hyper-converged Storage Spaces Direct configuration.
-
Windows Server 2016 - Install, Store, and Compute: Role-specific Settings
After watching this video, you will be able to configure role-specific settings, including continuously available shares.
-
Windows Server 2016 - Install, Store, and Compute: VM Monitoring
After watching this video, you will be able to configure VM monitoring options.
-
Windows Server 2016 - Install, Store, and Compute: Failover and Preference Settings
After watching this video, you will be able to configure failover and preference settings.
-
Windows Server 2016 - Install, Store, and Compute: Stretch and Site-aware Failover Clusters
After watching this video, you will be able to implement stretch and site-aware failover clusters.
-
Windows Server 2016 - Install, Store, and Compute: Configuring Guest Clusters with Shared VHDX
After watching this video, you will be able to using shared VHDX as a storage solution for guest clusters.
-
Windows Server 2016 - Install, Store, and Compute: Restoring a Cluster Configuration
After watching this video, you will be able to restore a cluster configuration.
-
Windows Server 2016 - Install, Store, and Compute: Cluster Storage
After watching this video, you will be able to configure cluster storage.
-
Windows Server 2016 - Install, Store, and Compute: Cluster-Aware Updating
After watching this video, you will be able to implement Cluster-Aware Updating (CAU).
-
Windows Server 2016 - Install, Store, and Compute: Cluster Operating System Rolling Upgrade
After watching this video, you will be able to identify the steps to perform a cluster operating system rolling upgrade.
-
Windows Server 2016 - Install, Store, and Compute: Clustered Shared Volumes (CSVs)
After watching this video, you will be able to configure and optimize Clustered Shared Volumes (CSVs).
-
Windows Server 2016 - Install, Store, and Compute: Deploying Failover Cluster without Network Name
After watching this video, you will be able to configure a new cluster without a network name.
-
Windows Server 2016 - Install, Store, and Compute: Scale-Out File Server (SoFS)
After watching this video, you will be able to implement a Scale-Out File Server (SoFS) on Windows Server 2016.
-
Windows Server 2016 - Install, Store, and Compute: SoFS Versus Clustered File Server
After watching this video, you will be able to determine when to use a SoFS versus a clustered File Server.
-
Windows Server 2016 - Install, Store, and Compute: Guest Clustering
After watching this video, you will be able to determine implementation scenarios for guest clustering.
-
Windows Server 2016 - Install, Store, and Compute: Clustered Storage Spaces
After watching this video, you will be able to implement a clustered storage spaces solution.
-
Windows Server 2016 - Install, Store, and Compute: Storage Replica
After watching this video, you will be able to implement storage replica.
-
Windows Server 2016 - Install, Store, and Compute: Hyper-V Replica
After watching this video, you will be able to implement a Hyper-V replica.
-
Windows Server 2016 - Install, Store, and Compute: Live Migration
After watching this video, you will be able to implement Hyper-V live migration.
-
Windows Server 2016 - Install, Store, and Compute: Shared Nothing Live Migration
After watching this video, you will be able to implement Hyper-V 'shared nothing' live migration.
-
Windows Server 2016 - Install, Store, and Compute: Configuring Authentication for Live Migration
After watching this video, you will be able to configure CredSSP or Kerberos authentication protocol for Live Migration.
-
Windows Server 2016 - Install, Store, and Compute: Storage Migration
After watching this video, you will be able to implement storage migration.
-
Windows Server 2016 - Install, Store, and Compute: Workgroup and Multi-domain Clusters
After watching this video, you will be able to identify implementation requirements for workgroup, single, and multi-domain clusters.
-
Windows Server 2016 - Install, Store, and Compute: Deploying a Workgroup Cluster
After watching this video, you will be able to deploy a workgroup cluster.
-
Windows Server 2016 - Install, Store, and Compute: Deploying a Single-domain Cluster
After watching this video, you will be able to deploy a single domain cluster.
-
Windows Server 2016 - Install, Store, and Compute: Quorum Configuration
After watching this video, you will be able to identify cluster quorum configuration options.
-
Windows Server 2016 - Install, Store, and Compute: Cluster Networking
After watching this video, you will be able to configure cluster networking.
-
Windows Server 2016 - Install, Store, and Compute: Restoring a Single Node
After watching this video, you will be able to restore single node configuration.
-
Windows Server 2016 - Install, Store, and Compute: Configuring Multipath IO (MPIO)
After watching this video, you will be able to configure Multipath IO (MPIO).
-
Windows Server 2016 - Install, Store, and Compute: Using Storage Replicas
After watching this video, you will be able to determine appropriate usage scenarios for Storage Replicas.
-
Windows Server 2016 - Install, Store, and Compute: What Is Data Deduplication?
After watching this video, you will be able to identify the characteristics and functionality of data deduplication.
-
Windows Server 2016 - Install, Store, and Compute: Implementing and Configuring Deduplication
After watching this video, you will be able to implement and configure data deduplication.
-
Windows Server 2016 - Install, Store, and Compute: Usage Scenarios for Deduplication
After watching this video, you will be able to determine appropriate usage scenarios for deduplication.
-
Windows Server 2016 - Install, Store, and Compute: Monitoring Deduplication
After watching this video, you will be able to monitor a configuration that has been set up for data deduplication.
-
Windows Server 2016 - Install, Store, and Compute: iSCSI Target and Initiator
After watching this video, you will be able to implement an iSCSI target and initiator.
-
Windows Server 2016 - Install, Store, and Compute: Exploring the Internet Storage Name Service
After watching this video, you will be able to understand the use of the Internet Storage Name Service (iSNS).
-
Windows Server 2016 - Install, Store, and Compute: Understanding Datacenter Bridging (DCB)
After watching this video, you will be able to identify best practices for Datacenter Bridging (DCB).
-
Windows Server 2016 - Install, Store, and Compute: Comparing NTFS and ReFS File Systems
After watching this video, you will be able to determine when to use NTFS and ReFS file systems.
-
Windows Server 2016 - Install, Store, and Compute: Configuring SMB Shares Using Windows PowerShell
After watching this video, you will be able to configure SMB server and SMB client configuration settings using Windows PowerShell.
-
Windows Server 2016 - Install, Store, and Compute: Configuring Share and NTFS Permissions
After watching this video, you will be able to configure Share and NTFS Permissions.
-
Windows Server 2016 - Install, Store, and Compute: Combining NTFS and Share Permissions
After watching this video, you will be able to verifying combined NTFS and Share permissions.
-
Windows Server 2016 - Install, Store, and Compute: Exploring Storage Pools
After watching this video, you will be able to describe the features and configuration considerations of storage pools.
-
Windows Server 2016 - Install, Store, and Compute: Storage Options For Disks or JBODs
After watching this video, you will be able to implement simple, mirror, and parity storage layout options for disks or enclosures.
-
Windows Server 2016 - Install, Store, and Compute: Expanding Storage Pools
After watching this video, you will be able to identify the steps to expand storage pools.
-
Windows Server 2016 - Install, Store, and Compute: Defining Tiered Storage
After watching this video, you will be able to describe the features of Tiered Storage.
-
Windows Server 2016 - Install, Store, and Compute: Configuring NFS and SMB Shares
After watching this video, you will be able to configure NFS and SMB shares using Server Manager.
-
Microsoft Windows 10 - Installing and Configuring: Configuring the MMC
After watching this video, you will be able to configure and use the MMC.
-
Microsoft Windows 10 - Installing and Configuring: Managing and Maintaining Windows
After watching this video, you will be able to review and manage a Windows maintenance plan.
-
Windows Server 2016 - Install, Store, and Compute: Windows Server 2016 Requirements
After watching this video, you will be able to define Windows Server 2016 requirements.
-
Windows Server 2016 - Install, Store, and Compute: Windows Server 2016 Editions and Workloads
After watching this video, you will be able to differentiate between Windows Server 2016 editions.
-
Windows Server 2016 - Install, Store, and Compute: Installing Server 2016
After watching this video, you will be able to install Windows Server 2016.
-
Windows Server 2016 - Install, Store, and Compute: Installing Server 2016 Roles and Features
After watching this video, you will be able to install Windows Server 2016 roles and features.
-
Windows Server 2016 - Install, Store, and Compute: What is Nano Server?
After watching this video, you will be able to describe Nano Server features and characteristics.
-
Windows Server 2016 - Install, Store, and Compute: Installing Nano Server
After watching this video, you will be able to identify installation considerations for Nano server.
-
Windows Server 2016 - Install, Store, and Compute: Installing Roles and Features on Nano Server
After watching this video, you will be able to describe role and feature installation on Nano Server.
-
Windows Server 2016 - Install, Store, and Compute: Installing Nano Server Roles and Features
After watching this video, you will be able to install Nano Server roles and features.
-
Microsoft Windows 10 - Installing and Configuring: Managing Client Security and System Stability
After watching this video, you will be able to manage client security by using Windows Defender, and evaluating system stability using Reliability Monitor.
-
Microsoft Windows 10 - Installing and Configuring: Configuring Backup Options
After watching this video, you will be able to configure a recovery drive, a system restore, and restore points.
-
Microsoft Windows 10 - Installing and Configuring: Recovering from a Windows Error
After watching this video, you will be able to perform a refresh, recycle, or driver rollback.
-
Microsoft Windows 10 - Installing and Configuring: Resolving a Hardware Error
After watching this video, you will be able to resolve hardware and device issues, and interpret data from Device Manager.
-
Microsoft Windows 10 - Installing and Configuring: Restoring Lost Files
After watching this video, you will be able to restore previous versions of files and folders, configure File History, and recover files from OneDrive.
-
Microsoft Windows 10 - Installing and Configuring: Restoring Lost Files, Part 2
After watching this video, you will be able to use Windows Backup and Restore, perform a backup and restore with WBAdmin, and perform recovery operations using Windows Recovery.
-
Microsoft Windows 10 - Installing and Configuring: Configuring Authentication
After watching this video, you will be able to configure Microsoft Passport, Windows Hello, picture passwords, and biometrics.
-
Microsoft Windows 10 - Installing and Configuring: Configuring Authorization
After watching this video, you will be able to configure workgroups, domain settings, and HomeGroup settings.
-
Microsoft Windows 10 - Installing and Configuring: Configuring Accounts
After watching this video, you will be able to configure local account, Microsoft accounts, Credential Manager, and UAC.
-
Microsoft Windows 10 - Installing and Configuring: Configuring Device Security
After watching this video, you will be able to configure Device Registration, Device Guard, Device Health Attestation.
-
Microsoft Windows 10 - Installing and Configuring: Configuring Tasks and Services
After watching this video, you will be able to configure Task Scheduler and services.
-
Microsoft Windows 10 - Installing and Configuring: Configuring and Using Windows Store
After watching this video, you will be able to configure Windows Store, and implement Windows Store Apps and Windows Store for Business.
-
Microsoft Windows 10 - Installing and Configuring: Configuring Remote Management
After watching this video, you will be able to choose and implement remote management tools and settings.
-
Microsoft Windows 10 - Installing and Configuring: Configuring Remote Applications
After watching this video, you will be able to configure Remote Assistance, Remote Desktop, and remote PowerShell.
-
Microsoft Windows 10 - Installing and Configuring: Configuring Core Services
After watching this video, you will be able to configure a new installation of Windows.
-
Microsoft Windows 10 - Installing and Configuring: Configuring Windows Update Options
After watching this video, you will be able to configure and implement Windows Update options, including Insider Preview, Current Branch, Current Branch for Business, and Long Term Servicing Branch.
-
Microsoft Windows 10 - Installing and Configuring: Managing Updates
After watching this video, you will be able to manage update history, roll back updates, and update Windows Store apps.
-
Microsoft Windows 10 - Installing and Configuring: Configuring Events
After watching this video, you will be able to configure and analyze Event Viewer logs and event subscriptions.
-
Microsoft Windows 10 - Installing and Configuring: Monitoring Performance
After watching this video, you will be able to monitor performance using Task Manager, Resource Monitor, Performance Monitor, and Data Collector Sets.
-
Microsoft Windows 10 - Installing and Configuring: Monitoring System Resources
After watching this video, you will be able to monitor system resources, printers, and indexing options.
-
Microsoft Windows 10 - Installing and Configuring: Configuring Desktop Apps
After watching this video, you will be able to configure desktop apps and startup options.
-
Microsoft Windows 10 - Installing and Configuring: Configuring Windows Features
After watching this video, you will be able to configure Windows features.
-
Windows Server 2016 - Install, Store, and Compute: Monitoring Using PerfMon and Resource Monitor
After watching this video, you will be able to monitoring Windows Server 2016 workloads using PerfMon and Resource Monitor.
-
Windows Server 2016 - Install, Store, and Compute: Appropriate Thresholds for Windows Workloads
After watching this video, you will be able to describe appropriate thresholds for Windows Server 2016 workloads.
-
Windows Server 2016 - Install, Store, and Compute: Windows Event Logs
After watching this video, you will be able to describe how to manage Windows Event Logs.
-
Windows Server 2016 - Install, Store, and Compute: Managing and Monitoring Server 2016
After watching this video, you will be able to demonstrate upgrade and migration tasks, implement activation strategy, and monitor server performance.
-
Windows Server 2016 - Install, Store, and Compute: Configuring Sector Sizes
After watching this video, you will be able to understand the implications of and configure sector sizes.
-
Windows Server 2016 - Install, Store, and Compute: Configuring GUID Partition Table (GPT) Disks
After watching this video, you will be able to understand and configure GUID partition table (GPT) disks.
-
Windows Server 2016 - Install, Store, and Compute: Creating VHD and VHDX Files Using Server Manager
After watching this video, you will be able to create VHD and VHDX files using Server Manager.
-
Windows Server 2016 - Install, Store, and Compute: Creating VHD and VHDX Files Using PowerShell
After watching this video, you will be able to create VHD and VHDX files using Windows PowerShell Storage module cmdlets.
-
Windows Server 2016 - Install, Store, and Compute: Mounting Virtual Hard Disks
After watching this video, you will be able to mount virtual hard disks using MOUNT-VHD.
-
Windows Server 2016 - Install, Store, and Compute: Configure Data Collector Sets
After watching this video, you will be able to configure Data Collector Sets.
-
Windows Server 2016 - Install, Store, and Compute: What is WSUS?
After watching this video, you will be able to describe the purpose of Windows Server Update Services (WSUS) and the requirements to implement WSUS.
-
Windows Server 2016 - Install, Store, and Compute: Configuring Update Settings
After watching this video, you will be able to manage the update process with WSUS.
-
Windows Server 2016 - Install, Store, and Compute: Configure WSUS Groups
After watching this video, you will be able to configure WSUS groups.
-
Windows Server 2016 - Install, Store, and Compute: Manage Patch Management in Mixed Environments
After watching this video, you will be able to manage patch management in mixed environments.
-
Windows Server 2016 - Install, Store, and Compute: Windows Defender
After watching this video, you will be able to understand Windows Defender.
-
Windows Server 2016 - Install, Store, and Compute: Integrate Windows Defender with WSUS
After watching this video, you will be able to integrate Windows Defender with WSUS.
-
Windows Server 2016 - Install, Store, and Compute: Windows Server Backup
After watching this video, you will be able to identify the capabilities of Windows Backup.
-
Windows Server 2016 - Install, Store, and Compute: Hyper-V Hosts
After watching this video, you will be able to determine backup strategies for Hyper-V hosts.
-
Windows Server 2016 - Install, Store, and Compute: Hyper-V Guests
After watching this video, you will be able to determine backup strategies for Hyper-V guests.
-
Windows Server 2016 - Install, Store, and Compute: Active Directory
After watching this video, you will be able to determine backup strategies for Active Directory.
-
Windows Server 2016 - Install, Store, and Compute: File Servers and Web Servers
After watching this video, you will be able to determine backup strategies for file servers.
-
Windows Server 2016 - Install, Store, and Compute: Plan for Windows Server Virtualization
After watching this video, you will be able to plan for Windows Server virtualization.
-
Windows Server 2016 - Install, Store, and Compute: Plan for Linux and FreeBSD Deployments
After watching this video, you will be able to plan for Linux and FreeBSD deployments.
-
Windows Server 2016 - Install, Store, and Compute: Windows Images and Supported Image Types
After watching this video, you will be able to describe Windows images and supported image types.
-
Windows Server 2016 - Install, Store, and Compute: Installing and Configuring MAP
After watching this video, you will be able to understand the Microsoft Assessment and Planning toolkit (MAP).
-
Windows Server 2016 - Install, Store, and Compute: Installing and Configuring MDT
After watching this video, you will be able to explain the purpose of deployment images and the Microsoft Deployment Toolkit (MDT) used to deploy and maintain them.
-
Windows Server 2016 - Install, Store, and Compute: The Windows ADK
After watching this video, you will be able to understand the use of the Windows Assessment and Deployment Kit (ADK).
-
Windows Server 2016 - Install, Store, and Compute: Creating and Deploying an Image
After watching this video, you will be able to implement and manage deployment images by using the Microsoft Deployment Toolkit (MDT).
-
Windows Server 2016 - Install, Store, and Compute: Considerations for Workloads in Virtual Machines
After watching this video, you will be able to determine considerations for deploying workloads into virtualized environments.
-
Windows Server 2016 - Install, Store, and Compute: Updating Images
After watching this video, you will be able to update images.
-
Windows Server 2016 - Install, Store, and Compute: Add Roles and Features to Offline Images
After watching this video, you will be able to install roles and features in offline images.
-
Windows Server 2016 - Install, Store, and Compute: Use PowerShell to Manage Windows Image Files
After watching this video, you will be able to manage and maintain Windows Server Core images, Nano Server images, and VHDs using Windows PowerShell.
-
Windows Server 2016 - Install, Store, and Compute: Configuring Nano Server
After watching this video, you will be able to configure Nano Server.
-
Windows Server 2016 - Install, Store, and Compute: Managing Server Core
After watching this video, you will be able to manage Server Core.
-
Windows Server 2016 - Install, Store, and Compute: Windows PowerShell Desired State Configuration
After watching this video, you will be able to implement Windows PowerShell desired state configuration.
-
Windows Server 2016 - Install, Store, and Compute: Supported Upgrade Paths
After watching this video, you will be able to identify the supported Windows Server 2016 upgrade paths.
-
Windows Server 2016 - Install, Store, and Compute: Upgrade Considerations
After watching this video, you will be able to identify Windows Server 2016 upgrade considerations.
-
Windows Server 2016 - Install, Store, and Compute: Deployment Options
After watching this video, you will be able to describe the Windows Server 2016 deployment options and upgrade process.
-
Windows Server 2016 - Install, Store, and Compute: Windows Server Migration Tools
After watching this video, you will be able to describe Windows Server migration tools.
-
Windows Server 2016 - Install, Store, and Compute: Migrating Server Roles and Workloads
After watching this video, you will be able to migrate server roles and workloads within a domain.
-
Windows Server 2016 - Install, Store, and Compute: Considering Cross-domain and Forest Migration
After watching this video, you will be able to describe considerations for cross-domain and forest migrations.
-
Windows Server 2016 - Install, Store, and Compute: Choosing a Windows Server Activation Model
After watching this video, you will be able to choose the appropriate Windows Server activation model.
-
Windows Server 2016 - Install, Store, and Compute: Implement a Windows Server Activation Model
After watching this video, you will be able to implement a Windows Server activation model.
-
Microsoft Windows 10 - Installing and Configuring: Configuring Virtual Storage
After watching this video, you will be able to configure VHDs.
-
Microsoft Windows 10 - Installing and Configuring: Configuring Special Storage Options
After watching this video, you will be able to configure and troubleshoot removable devices and storage spaces.
-
Microsoft Windows 10 - Installing and Configuring: Configuring Local Resource Sharing
After watching this video, you will be able to configure file and printer sharing and HomeGroup connections.
-
Microsoft Windows 10 - Installing and Configuring: Configuring Enterprise Resource Sharing
After watching this video, you will be able to configure folder shares, public folders, and file system permissions.
-
Microsoft Windows 10 - Installing and Configuring: Configuring OneDrive
After watching this video, you will be able to configure OneDrive and OneDrive usage.
-
Microsoft Windows 10 - Installing and Configuring: Troubleshooting Data Storage
After watching this video, you will be able to troubleshoot data access and usage.
-
Microsoft Windows 10 - Installing and Configuring: Connecting to a Wireless Network
After watching this video, you will be able to configure Wi-Fi settings and Wi-Fi Direct.
-
Microsoft Windows 10 - Installing and Configuring: Troubleshooting a Network Connection
After watching this video, you will be able to troubleshoot network issues.
-
Microsoft Windows 10 - Installing and Configuring: Securing a Remote Network Connection
After watching this video, you will be able to configure VPN, IPsec, and Direct Access.
-
Microsoft Windows 10 - Installing and Configuring: Configuring Physical Storage
After watching this video, you will be able to configure disks, volumes, and file system options.
-
Microsoft Windows 10 - Installing and Configuring: Configuring Advanced Features
After watching this video, you will be able to configure Hyper-V and power settings.
-
Microsoft Windows 10 - Installing and Configuring: Provisioning Windows
After watching this video, you will be able to perform provisioning with the Windows Imaging and Configuration Designer tool.
-
Microsoft Windows 10 - Installing and Configuring: Configuring Windows with Policies
After watching this video, you will be able to configure Active Directory, Group Policies, and User Account Control.
-
Microsoft Windows 10 - Installing and Configuring: Implementing Windows
After watching this video, you will be able to implement a Windows installation.
-
Microsoft Windows 10 - Installing and Configuring: Connecting to a Network
After watching this video, you will be able to configure and support IPv4 and IPv6 settings and name resolution, and connect to a network.
-
Microsoft Windows 10 - Installing and Configuring: Securing a Network Connection
After watching this video, you will be able to configure network locations, Windows Firewall, and network discovery.
-
Microsoft Windows 10 - Installing and Configuring: Customizing Windows
After watching this video, you will be able to configure and customize the start menu, desktop, taskbar, and accessibility options.
-
Microsoft Windows 10 - Installing and Configuring: Configuring New Windows Features
After watching this video, you will be able to configure Cortana, Microsoft Edge, and Internet Explorer.
-
Microsoft Windows 10 - Installing and Configuring: Getting Your System Ready
After watching this video, you will be able to determine hardware requirements and compatibility, and choose the correct install type and edition to install.
-
Microsoft Windows 10 - Installing and Configuring: Getting Your Media Ready
After watching this video, you will be able to determine and create appropriate installation media.
-
Microsoft Windows 10 - Installing and Configuring: Performing a Local Installation
After watching this video, you will be able to perform a clean installation or an upgrade onto a physical hard disk drive.
-
Microsoft Windows 10 - Installing and Configuring: Performing a Portable Installation
After watching this video, you will be able to perform a new installation directly onto a virtual hard disk or bootable USB.
-
Microsoft Windows 10 - Installing and Configuring: Installing and Updating Drivers
After watching this video, you will be able to install, update, and roll back drivers.
-
Microsoft Windows 10 - Installing and Configuring: Configuring and Troubleshooting Drivers
After watching this video, you will be able to configure driver settings and resolve driver issues.
-
CompTIA A+ 220-902: NTFS Security Interactions
After watching this video, you will be able to define the interactions that occur when NTFS files are moved from one location to another.
-
Node.js: Configuring Web Server Responses
When you create HTTP servers using Node.js, you will be able to receive HTTP requests and send back HTTP responses. In this video, Andy Alfred demonstrates how to configure the response to send back in the application.
-
Securing Windows Server 2016: Configuring File Access Auditing
After watching this video, you will be able to configure file access auditing.
-
Securing Windows Server 2016: Configuring User and Device Claim Types
After watching this video, you will be able to configure user and device claim types.
-
Securing Windows Server 2016: Implementing Policy Changes and Staging
After watching this video, you will be able to implement policy changes and staging.
-
Securing Windows Server 2016: Performing Access-denied Remediation
After watching this video, you will be able to perform access-denied remediation.
-
Securing Windows Server 2016: Configuring Central Access Rules and Policies
After watching this video, you will be able to create and configure central access rules and policies.
-
Securing Windows Server 2016: Creating Resource Properties and Lists
After watching this video, you will be able to create and configure resource properties and lists.
-
Securing Windows Server 2016: Implement Workload-specific Security
After watching this video, you will be able to implement workload-specific security.
-
Securing Windows Server 2016: Implementing File Server Resource Manager (FSRM)
After watching this video, you will be able to implement the File Server Resource Manager (FSRM) role service, and describe the use of quotas, file screens, storage reports, and file management tasks.
-
Securing Windows Server 2016: Configuring FCI Using FSRM
After watching this video, you will be able to configure File Classification Infrastructure (FCI) using FSRM.
-
Securing Windows Server 2016: Implementing Work Folders
After watching this video, you will be able to implement work folders.
-
Securing Windows Server 2016: Securing App Development and Server Workloads
After watching this video, you will be able to secure application development and server workload infrastructure.
-
Securing Windows Server 2016: Nano Server Deployment
After watching this video, you will be able to determine usage scenarios, supported server workloads, and requirements for Nano Server deployments.
-
Securing Windows Server 2016: Installing and Configuring Nano Server
After watching this video, you will be able to install and configure Nano Server.
-
Securing Windows Server 2016: Desired State Configuration (DSC)
After watching this video, you will be able to implement security policies on Nano Server using Desired State Configuration (DSC).
-
Securing Windows Server 2016: Hyper-V Containers Usage
After watching this video, you will be able to determine usage scenarios and requirements for Windows Server and Hyper-V containers.
-
Securing Windows Server 2016: Installing and Configuring Hyper-V Containers
After watching this video, you will be able to install and configure Hyper-V containers.
-
Securing Windows Server 2016: Implementing Secure File Services and DAC
After watching this video, you will be able to implement a secure file services infrastructure and Dynamic Access Control (DAC).
-
Securing Windows Server 2016: Reviewing and Editing Suspicious Activities
After watching this video, you will be able to review and edit suspicious activities on the attack time line.
-
Securing Windows Server 2016: Using Operations Management Suite Security Solutions
After watching this video, you will be able to describe the usage and deployment of Operations Management Suite (OMS) for security threat detection.
-
Securing Windows Server 2016: Determining Threat Detection Solutions of OMS
After watching this video, you will be able to describe Operations Management Suite (OMS) security and auditing functions and the use of log analytics in threat detection.
-
Securing Windows Server 2016: Describe PAWs and LAPS
After watching this video, you will be able to describe PAWS, LAPS.
-
Securing Windows Server 2016: Configuring the Audit PNP Activity Policy
After watching this video, you will be able to configure the Audit PNP activity policy.
-
Securing Windows Server 2016: Module, Script Block, and Transcription Logging
After watching this video, you will be able to enable and configure module, script block, and transcription logging in Windows PowerShell.
-
Securing Windows Server 2016: Microsoft Advanced Threat Analytics (ATA)
After watching this video, you will be able to recognize usage and deployment scenarios for Microsoft Advanced Threat Analytics (ATA).
-
Securing Windows Server 2016: Installing Microsoft Advanced Threat Analytics
After watching this video, you will be able to install and configure Microsoft Advanced Threat Analytics (ATA) Center.
-
Securing Windows Server 2016: Installing and Configuring ATA Gateway
After watching this video, you will be able to install and configure an ATA gateway on a server.
-
Securing Windows Server 2016: Configuring Alerts in ATA Center
After watching this video, you will be able to configure alerts in ATA Center when suspicious activity is detected.
-
Securing Windows Server 2016: Securing Local Administrator Passwords Using LAPS
After watching this video, you will be able to secure local administrator passwords using LAPS; manage password parameters and properties using LAPS.
-
Securing Windows Server 2016: Configuring Advanced Audit Policies
After watching this video, you will be able to configure advanced audit policies.
-
Securing Windows Server 2016: Using Local and Advanced Auditing Policies
After watching this video, you will be able to determine the differences and usage scenarios for using local and advanced auditing policies.
-
Securing Windows Server 2016: Auditing Using Group Policy and AuditPol.exe
After watching this video, you will be able to implement auditing using Group Policy and AuditPol.exe, and implement auditing using Windows PowerShell.
-
Securing Windows Server 2016: Creating Expression-based Audit Policies
After watching this video, you will be able to create expression-based audit policies.
-
Securing Windows Server 2016: Implementing Privileged Access Workstations (PAWs)
After watching this video, you will be able to implement privileged access workstations (PAWs) and user rights assignments; implement a PAWS solution, configure user rights assignment group policies.
-
Securing Windows Server 2016: Security Options Settings in Group Policy
After watching this video, you will be able to configure security options settings in Group Policy.
-
Securing Windows Server 2016: Remote Credential Guard for Remote Desktop Access
After watching this video, you will be able to enable and configure remote credential guard for remote desktop access.
-
Securing Windows Server 2016: Local Administrator Password Solution (LAPS)
After watching this video, you will be able to implement local administrator password solution (LAPS); install and configure the LAPS tool.
-
Securing Windows Server 2016: Creating and Configuring Session Configuration Files
After watching this video, you will be able to create and configure session configuration files.
-
Securing Windows Server 2016: Creating and Configuring Role Capability Files
After watching this video, you will be able to create and configure role capability files.
-
Securing Windows Server 2016: Creating and Connecting to a JEA Endpoint
After watching this video, you will be able to create a JEA endpoint and connect to a JEA endpoint on a server for administration.
-
Securing Windows Server 2016: Viewing Logs in Windows Server 2016
After watching this video, you will be able to view logs in Server 2016.
-
Securing Windows Server 2016: Downloading WMF 5.1 to a Windows Server 2008 R2
After watching this video, you will be able to download WMF 5.1 to a Windows Server 2008 R2.
-
Securing Windows Server 2016: Configuring a JEA Endpoint on a Server Using DSC
After watching this video, you will be able to configure a JEA endpoint on a server using Desired State Configuration (DSC).
-
Securing Windows Server 2016: Implementing JIT Administration Principles
After watching this video, you will be able to implement JIT administration principles using time-based policies.
-
Securing Windows Server 2016: Creating and Implementing MIM Policies
After watching this video, you will be able to create and implement MIM policies.
-
Securing Windows Server 2016: Privileged Access Using PowerShell
After watching this video, you will be able to request privileged access using Windows PowerShell.
-
Securing Windows Server 2016: Implementing JEA solution
After watching this video, you will be able to implement just-enough-administration (JEA) - enable a JEA solution on Windows Server 2016.
-
A+ Practical: What Is Storage Spaces
After watching this video, you will be able to describe Storage Spaces.
-
CompTIA Linux+ 2014: Using the Output of One Command as Arguments to Another Command
In this video, Dan LaChance demonstrates how to use the output of one Linux command as command line argument for another command.
-
CompTIA Linux+ 2014: Sending Output to both stdout and a File
In this video, Dan LaChance demostrates how to send the Linux command line output to standard output devices and files by using the tee command.
-
CompTIA Linux+ 2014: Using Pipe on the Linux Command Line
In this video, Dan LaChance demonstrates how to pipe the result of one Linux command as input to another Linux command.
-
CompTIA Linux+ 2014: Using tar
In this video, Dan LaChance demonstrates how to work with file archives by using the Linux tar command.
-
CompTIA Linux+ 2014: Using cpio and dd
In this video, Dan LaChance demonstrates how to use the dd and cpio commands in Linux to copy disk information and create file archives.
-
CompTIA Linux+ 2014: Using Find to Locate and Act on Files
In this video, Dan LaChance explains how to use the find command in Linux to locate and act upon files.
-
CompTIA Linux+ 2014: Compressing and Decompressing Files and Folders
In this video, Dan LaChance describes Linux commands that are used to compress and decompress files.
-
CompTIA Linux+ 2014: Removing Files and Directories Recursively
In this video, Dan LaChance demonstrates how to remove files and directories recursively from the command line.
-
CompTIA Linux+ 2014: Using Simple and Advanced Wildcards
In this video, Dan LaChance describes how to use simple and advanced wildcards with Linux commands.
-
CompTIA Linux+ 2014: Using Advanced VI Text Editing Commands
In this video, Dan LaChance demonstrates how to copy, paste, substitute, and move text within a document in the vi editor.
-
CompTIA Linux+ 2014: Using Basic VI Modes
In this video, Dan LaChance describes the use of the basic vi editor modes.
-
CompTIA Linux+ 2014: Exiting, Closing, and Saving a Document in VI
In this video, Dan LaChance outlines the steps to cancel changes, save changes, and exit a document in the vi editor.
-
Windows Server 2016 - Networking: SMB Multichannel
After watching this video, you will be able to enable and configure SMB Multichannel.
-
Windows Server 2016 - Networking: Virtual Machine Multi-Queue (VMMQ)
After watching this video, you will be able to configure Virtual Machine Multi-Queue (VMMQ).
-
Windows Server 2016 - Networking: vRSS on VMQ Capable NICs
After watching this video, you will be able to configure virtual Receive Side Scaling (vRSS) on a Virtual Machine Queue (VMQ) capable network adapter.
-
Windows Server 2016 - Networking: Troubleshoot BranchCache
After watching this video, you will be able to troubleshoot BranchCache.
-
Windows Server 2016 - Networking: NIC Teaming
After watching this video, you will be able to implement NIC Teaming.
-
Windows Server 2016 - Networking: Switch Embedded Teaming (SET)
After watching this video, you will be able to implement the Switch Embedded Teaming (SET) solution.
-
Windows Server 2016 - Networking: NIC Teaming vs Switch Embedded Teaming (SET)
After watching this video, you will be able to identify when to use NIC Teaming or the Switch Embedded Teaming (SET) solution.
-
Windows Server 2016 - Networking: Receive Side Scaling (RSS)
After watching this video, you will be able to configure Receive Side Scaling (RSS).
-
Windows Server 2016 - Networking: Network Quality of Service (QoS) DCB
After watching this video, you will be able to configure network Quality of Service (QoS) with Data Center Bridging (DCB).
-
Windows Server 2016 - Networking: SMB Direct on RDMA Enabled NICs
After watching this video, you will be able to configure SMB Direct on Remote Direct Memory Access (RDMA) enabled network adapters.
-
Windows Server 2016 - Identity: Enumerating Group Membership
After watching this video, you will be able to enumerate group membership.
-
Windows Server 2016 - Identity: Managing Group Membership Using PowerShell
After watching this video, you will be able to automate group membership management using Windows PowerShell.
-
Windows Server 2016 - Identity: Delegating Management of AD Objects
After watching this video, you will be able to delegate the creation and management of Active Directory groups and OUs.
-
Windows Server 2016 - Identity: Default Active Directory Containers
After watching this video, you will be able to manage default Active Directory containers.
-
Windows Server 2016 - Identity: Managing Groups and OUs
After watching this video, you will be able to create, copy, configure, and delete groups and OUs.
-
Windows Server 2016 - Identity: Service Accounts
After watching this video, you will be able to create and configure Service Accounts.
-
Windows Server 2016 - Identity: Group Managed Service Accounts (gMSAs)
After watching this video, you will be able to create and configure Group Managed Service Accounts (gMSAs).
-
Windows Server 2016 - Identity: Kerberos Constrained Delegation (KCD)
After watching this video, you will be able to configure Kerberos Constrained Delegation (KCD).
-
Windows Server 2016 - Identity: Service Principal Names (SPNs)
After watching this video, you will be able to manage Service Principal Names (SPNs).
-
Windows Server 2016 - Identity: Virtual Accounts
After watching this video, you will be able to configure virtual accounts.
-
Windows Server 2016 - Identity: Password policy settings
After watching this video, you will be able to configure domain and local user password policy settings.
-
Windows Server 2016 - Identity: Bulk Active Directory Operations
After watching this video, you will be able to perform bulk Active Directory operations.
-
Windows Server 2016 - Identity: Configuring NTFS Permissions
After watching this video, you will be able to configure NTFS permissions.
-
Windows Server 2016 - Identity: Configuring Share Permissions
After watching this video, you will be able to configure share permissions.
-
Windows Server 2016 - Identity: Combining NTFS and Share Permissions
After watching this video, you will be able to combine NTFS and share permissions and determine effective permissions.
-
Windows Server 2016 - Identity: Offline Domain Join
After watching this video, you will be able to implement offline domain join.
-
Windows Server 2016 - Identity: Managing Inactive and Disabled Accounts
After watching this video, you will be able to manage inactive and disabled accounts.
-
Windows Server 2016 - Identity: Unlocking Disabled Accounts
After watching this video, you will be able to automate unlocking of disabled accounts using Windows PowerShell.
-
Windows Server 2016 - Identity: Automating Password Resets
After watching this video, you will be able to automate password resets using Windows PowerShell.
-
Windows Server 2016 - Identity: Group Nesting
After watching this video, you will be able to configure group nesting.
-
Windows Server 2016 - Identity: Converting Groups
After watching this video, you will be able to convert Active Directory groups, including security, distribution, universal, domain local, and domain global groups.
-
Windows Server 2016 - Identity: Managing Group Membership Using Group Policy
After watching this video, you will be able to manage group membership using Group Policy.
-
Windows Server 2016 - Identity: Automating the Creation of Active Directory Accounts
After watching this video, you will be able to automate the creation of Active Directory accounts.
-
Windows Server 2016 - Networking: Manage Relevant Properties Using IPAM
After watching this video, you will be able to manage and discover relevant properties using IPAM.
-
Windows Server 2016 - Networking: Configuring a Remote Access Solution
After watching this video, you will be able to configure the correct remote access solution for a given scenario.
-
Windows Server 2016 - Networking: Configuring Remote File Access
After watching this video, you will be able to configure remote file access for a given scenario.
-
Windows Server 2016 - Networking: Creating a High-performance Network
After watching this video, you will be able to create a high-performance network using advanced network infrastructure solutions.
-
Windows Server 2016 - Identity: Transfer and Seize Operations Master Roles
After watching this video, you will be able to transfer and seize operations master roles.
-
Windows Server 2016 - Identity: Read-only Domain Controller (RODC) Function
After watching this video, you will be able to identify read-only domain controller (RODC) features and functionality.
-
Windows Server 2016 - Identity: Installing and Configuring an RODC
After watching this video, you will be able to install and configure a read-only domain controller (RODC).
-
Windows Server 2016 - Identity: Domain Controller Cloning
After watching this video, you will be able to configure domain controller cloning.
-
Windows Server 2016 - Identity: Managing User and Computer Accounts
After watching this video, you will be able to create, copy, configure, and delete users and computers.
-
Windows Server 2016 - Identity: Template Accounts
After watching this video, you will be able to configure user templates.
-
Windows Server 2016 - Networking: Correctly Configure Advanced DHCP
After watching this video, you will be able to configure advanced DHCP for a given scenario.
-
Windows Server 2016 - Networking: Configure DNS Settings to Secure DNS
After watching this video, you will be able to configure DNS settings to secure DNS.
-
Windows Server 2016 - Networking: Single-Root I/O Virtualization (SR-IOV)
After watching this video, you will be able to configure Single-Root I/O Virtualization (SR-IOV) on a supported network adapter.
-
Windows Server 2016 - Networking: SDN Requirements and Usage Scenarios
After watching this video, you will be able to determine deployment scenarios and network requirements for deploying software-defined Networking (SDN).
-
Windows Server 2016 - Networking: Hyper-V Network Virtualization (HNV) with NVGRE
After watching this video, you will be able to determine requirements for implementing Hyper-V Network Virtualization (HNV) using Network Virtualization Generic Route Encapsulation (NVGRE).
-
Windows Server 2016 - Networking: Hyper-V Network Virtualization (HNV) with VXLAN
After watching this video, you will be able to determine requirements and scenarios for implementing Hyper-V Network Virtualization (HNV) using Virtual Extensible LAN (VXLAN) encapsulation.
-
Windows Server 2016 - Networking: Software Load Balancer (SLB)
After watching this video, you will be able to determine implementation scenarios for the Software Load Balancer (SLB), including North-South and East-West load balancing.
-
Windows Server 2016 - Networking: Windows Server Gateways
After watching this video, you will be able to determine implementation scenarios for Windows Server Gateways, including L3, GRE, and S2S.
-
Windows Server 2016 - Networking: Distributed Firewall Policies and Network Security
After watching this video, you will be able to determine usage scenarios and requirements for distributed firewall policies and network security groups.
-
Microsoft Windows Server 2016: Correctly Configure Basic DHCP
After watching this video, you will be able to configure DHCP for a given scenario.
-
Windows Server 2016 - Networking: Configuring DNS Zone Support
After watching this video, you will be able to configure DNS zone support.
-
Windows Server 2016 - Identity: Migration Tables
After watching this video, you will be able to create and configure a migration table.
-
Windows Server 2016 - Identity: Restoring Default GPOs
After watching this video, you will be able to reset default GPOs.
-
Windows Server 2016 - Identity: Delegating Group Policy Management
After watching this video, you will be able to delegate Group Policy management.
-
Windows Server 2016 - Identity: Group Policy Infrastructure Status Dashboard
After watching this video, you will be able to detect health issues using the Group Policy Infrastructure Status Dashboard.
-
Windows Server 2016 - Identity: Processing Order and Precedence
After watching this video, you will be able to configure processing order and precedence.
-
Windows Server 2016 - Identity: Block Inheritance
After watching this video, you will be able to configure blocking of inheritance.
-
Windows Server 2016 - Identity: Enforcing GPOs
After watching this video, you will be able to configure enforced policies.
-
Windows Server 2016 - Identity: Security Filtering and WMI Filtering
After watching this video, you will be able to configure security filtering and Windows Management Instrumentation (WMI) filtering.
-
Windows Server 2016 - Identity: Loopback Processing
After watching this video, you will be able to configure loopback processing.
-
Windows Server 2016 - Identity: Slow-link Processing and Group Policy Caching
After watching this video, you will be able to configure and manage slow-link processing and Group Policy Caching.
-
Windows Server 2016 - Identity: Client-side Extension (CSE)
After watching this video, you will be able to configure client-side extension (CSE) behavior.
-
Windows Server 2016 - Identity: Name Suffix Routing
After watching this video, you will be able to configure name suffix routing.
-
Windows Server 2016 - Identity: Sites and Subnets
After watching this video, you will be able to configure sites and subnets.
-
Windows Server 2016 - Identity: Site Links
After watching this video, you will be able to create and configure site links.
-
Windows Server 2016 - Identity: Site Coverage
After watching this video, you will be able to manage site coverage.
-
Windows Server 2016 - Identity: Registration of SRV Records
After watching this video, you will be able to manage registration of SRV records.
-
Windows Server 2016 - Identity: Moving Domain Controllers Between Sites
After watching this video, you will be able to move domain controllers between sites.
-
Windows Server 2016 - Identity: ADMX Central Store
After watching this video, you will be able to describe the function of the central store.
-
Windows Server 2016 - Identity: Starter GPOs
After watching this video, you will be able to manage starter GPOs.
-
Windows Server 2016 - Identity: GPO Links
After watching this video, you will be able to configure GPO links.
-
Windows Server 2016 - Identity: Local Group Policies
After watching this video, you will be able to configure multiple local group policies.
-
Windows Server 2016 - Identity: Managing GPOs
After watching this video, you will be able to back up, import, copy, and restore GPOs.
-
Windows Server 2016 - Identity: Upgrading SYSVOL Replication to DFSR
After watching this video, you will be able to upgrade SYSVOL replication to Distributed File System Replication (DFSR).
-
Windows Server 2016 - Identity: Multi-domain and Multi-forest Active Directory
After watching this video, you will be able to configure a multi-domain and multi-forest Active Directory infrastructure.
-
Windows Server 2016 - Identity: Deploying a Domain Controller
After watching this video, you will be able to deploy Windows Server 2016 domain controllers within a pre-existing Active Directory environment.
-
Windows Server 2016 - Identity: Upgrade AD DS to Windows Server 2016
After watching this video, you will be able to upgrade existing domains and forests.
-
Windows Server 2016 - Identity: Domain and Forest Functional Levels
After watching this video, you will be able to configure domain and forest functional levels.
-
Windows Server 2016 - Identity: User Principal Name (UPN) Suffixes
After watching this video, you will be able to configure multiple user principal name (UPN) suffixes.
-
Windows Server 2016 - Identity: AD DS Trusts
After watching this video, you will be able to configure external and realm trusts.
-
Windows Server 2016 - Identity: Forest Trusts
After watching this video, you will be able to configure forest trusts.
-
Windows Server 2016 - Identity: External and Realm Trusts
After watching this video, you will be able to configure shortcut trusts.
-
Windows Server 2016 - Identity: Trust Authentication
After watching this video, you will be able to configure trust authentication.
-
Windows Server 2016 - Identity: SID Filtering
After watching this video, you will be able to configure SID filtering.
-
Windows Server 2016 - Identity: Password Settings Objects (PSOs)
After watching this video, you will be able to configure and apply Password Settings Objects (PSOs).
-
Windows Server 2016 - Identity: Delegate password settings management
After watching this video, you will be able to delegate password settings management.
-
Windows Server 2016 - Identity: Account lockout policy settings
After watching this video, you will be able to configure account lockout policy settings.
-
Windows Server 2016 - Identity: Kerberos policy settings
After watching this video, you will be able to configure Kerberos policy settings within Group Policy.
-
Windows Server 2016 - Identity: Active Directory and SYSVOL Backup
After watching this video, you will be able to back up Active Directory and SYSVOL.
-
Windows Server 2016 - Identity: Managing Active Directory Offline
After watching this video, you will be able to perform offline management of Active Directory, including defragmentation of the Active Directory database and clean up of metadata.
-
Windows Server 2016 - Identity: Active Directory Snapshots
After watching this video, you will be able to configure Active Directory snapshots.
-
Windows Server 2016 - Identity: Object- and Container-level Recovery
After watching this video, you will be able to perform object- and container-level recovery.
-
Windows Server 2016 - Identity: Active Directory Restore
After watching this video, you will be able to perform Active Directory restore.
-
Windows Server 2016 - Identity: Active Directory Recycle Bin
After watching this video, you will be able to configure and restore objects by using the Active Directory Recycle Bin.
-
Windows Server 2016 - Identity: Active Directory Replication
After watching this video, you will be able to monitor and manage Active Directory replication.
-
Windows Server 2016 - Identity: Forcing a Group Policy Update
After watching this video, you will be able to force a Group Policy Update.
-
Windows Server 2016 - Identity: Software Installation Policies
After watching this video, you will be able to Configure software installation.
-
Microsoft Windows Server 2016: DHCP for IPv6
After watching this video, you will be able to implement IPv6 addressing using DHCPv6.
-
Microsoft Windows Server 2016: Import/Export DHCP Database and Configuration
After watching this video, you will be able to perform export and import of a DHCP server.
-
Windows Server 2016 - Networking: Migrate a DHCP Server
After watching this video, you will be able to perform DHCP server migration.
-
Microsoft Windows Server 2016: Manage the DHCP DB: Backup/Restore
After watching this video, you will be able to back up and restore the DHCP database.
-
Windows Server 2016 - Networking: DHCP Failover
After watching this video, you will be able to configure high availability using DHCP failover.
-
Windows Server 2016 - Networking: DHCP Name Protection
After watching this video, you will be able to configure DHCP name protection.
-
Windows Server 2016 - Networking: Troubleshooting DHCP
After watching this video, you will be able to troubleshoot DHCP.
-
Windows Server 2016 - Networking: Prerequisites for DNS
After watching this video, you will be able to determine DNS installation requirements.
-
Windows Server 2016 - Networking: DNS and Nano Server
After watching this video, you will be able to determine supported DNS deployment scenarios on Nano Server.
-
Microsoft Windows Server 2016: Install DNS Server Role
After watching this video, you will be able to install DNS.
-
Windows Server 2016 - Networking: DNS Forwarders
After watching this video, you will be able to configure forwarders.
-
Windows Server 2016 - Networking: DHCP Policies
After watching this video, you will be able to configure policies.
-
Microsoft Windows Server 2016: Authorize a DHCP Server
After watching this video, you will be able to authorize a DHCP server.
-
Microsoft Windows Server 2016: DHCP Scopes
After watching this video, you will be able to create and configure scopes.
-
Microsoft Windows Server 2016: DHCP Superscopes
After watching this video, you will be able to create and configure superscopes.
-
Microsoft Windows Server 2016: DHCP Multicast Scopes
After watching this video, you will be able to create and configure multicast scopes.
-
Microsoft Windows Server 2016: DHCP Reservations and Exclusions
After watching this video, you will be able to configure DHCP reservations and exclusions.
-
Microsoft Windows Server 2016: DHCP Options
After watching this video, you will be able to configure DHCP options.
-
Microsoft Windows Server 2016: DHCP Lease Period
After watching this video, you will be able to configure a lease period.
-
Microsoft Windows Server 2016: DHCP and DNS Integration
After watching this video, you will be able to configure DNS options from within DHCP.
-
Windows Server 2016 - Networking: PXE BOOT
After watching this video, you will be able to configure client and server for PXE boot.
-
Windows Server 2016 - Networking: DHCP Relay Agent
After watching this video, you will be able to configure DHCP Relay Agent.
-
Windows Server 2016 - Networking: Border Gateway Protocol (BGP)
After watching this video, you will be able to implement Border Gateway Protocol (BGP).
-
Microsoft Windows Server 2016: Configuring Windows 2016 Routing
After watching this video, you will be able to configure IPv4 and IPv6 routing.
-
Windows Server 2016 - Install, Store, and Compute: Configuring the Cluster Operation Mode
After watching this video, you will be able to configure cluster operation mode for the Network Load Balancing cluster.
-
Windows Server 2016 - Install, Store, and Compute: Upgrading an NLB Cluster
After watching this video, you will be able to define the requirements and procedure of performing an NLB cluster upgrade.
-
Microsoft Windows Server 2016: Configuring an IPv4 Host
After watching this video, you will be able to configure IPv4 addresses and options.
-
Windows Server 2016 - Networking: IPv4 Address Ranges
After watching this video, you will be able to understand IPv4 addresses and subnets.
-
Windows Server 2016 - Networking: IPv6 Address Configuration
After watching this video, you will be able to determine and configure appropriate IPv6 addresses.
-
Windows Server 2016 - Networking: IPv6 Address Ranges
After watching this video, you will be able to understand IPv6 addresses and subnets.
-
Windows Server 2016 - Networking: Implement IPv6 Options: Stateful vs Stateless
After watching this video, you will be able to understand IPv6 stateless/stateful addressing options.
-
Windows Server 2016 - Networking: IPv4 to IPv6 Transition Technologies
After watching this video, you will be able to configure IPv4 and IPv6 interoperability using ISATAP, 6to4, and Teredo transition technologies.
-
Microsoft Windows Server 2016: Install the DHCP Server Role
After watching this video, you will be able to install and configure DHCP servers.
-
Windows Server 2016 - Networking: DirectAccess Using the Wizard
After watching this video, you will be able to install and configure DirectAccess using the wizard option.
-
Windows Server 2016 - Networking: Post Deployment Client Configuration
After watching this video, you will be able to implement post deployment client configuration for DirectAccess.
-
Windows Server 2016 - Networking: DirectAccess Advanced Solutions
After watching this video, you will be able to implement server requirements using the DirectAccess Advanced Solution.
-
Windows Server 2016 - Networking: Install a DirectAccess Advanced Solution
After watching this video, you will be able to install and configure DirectAccess using the DirectAccess Advanced Solution.
-
Windows Server 2016 - Networking: Configure Client's DirectAccess Advanced Solution
After watching this video, you will be able to implement client configuration using DirectAccess Advanced Solution.
-
Windows Server 2016 - Networking: Troubleshoot DirectAccess
After watching this video, you will be able to troubleshoot DirectAccess.
-
Windows Server 2016 - Networking: RADIUS Server
After watching this video, you will be able to configure a RADIUS server including RADIUS proxy.
-
Windows Server 2016 - Networking: RADIUS Proxy
After watching this video, you will be able to configure a RADIUS server including RADIUS proxy.
-
Windows Server 2016 - Networking: RADIUS Clients
After watching this video, you will be able to configure RADIUS clients.
-
Windows Server 2016 - Networking: NPS Templates
After watching this video, you will be able to configure NPS templates.
-
Windows Server 2016 - Networking: RADIUS Accounting
After watching this video, you will be able to configure RADIUS accounting.
-
Windows Server 2016 - Networking: DNS Zone Scopes and Records
After watching this video, you will be able to configure DNS zone scopes and records.
-
Windows Server 2016 - Networking: DNS Policies for Zones
After watching this video, you will be able to configure policies for zones.
-
Windows Server 2016 - Networking: Network Address Translation (NAT)
After watching this video, you will be able to implement Network Address Translation (NAT).
-
Windows Server 2016 - Networking: Configure Routing
After watching this video, you will be able to configure routing.
-
Windows Server 2016 - Networking: Remote Access Gateway
After watching this video, you will be able to implement remote access and site-to-site (S2S) VPN solutions.
-
Windows Server 2016 - Networking: VPN Protocol Options
After watching this video, you will be able to configure different VPN protocol options
-
Windows Server 2016 - Networking: Authentication Options
After watching this video, you will be able to configure authentication options.
-
Windows Server 2016 - Networking: VPN Reconnect
After watching this video, you will be able to configure VPN reconnect.
-
Windows Server 2016 - Networking: Connection Profiles
After watching this video, you will be able to create and configure connection profiles.
-
Windows Server 2016 - Networking: Remote Access VPN vs. Site-to-site VPN
After watching this video, you will be able to determine when to use a remote access VPN and a site-to-site VPN.
-
Windows Server 2016 - Networking: DirectAccess Server Requirements
After watching this video, you will be able to implement server requirements for DirectAccess.
-
Windows Server 2016 - Networking: AD Integrated Zones and Secure Dynamic Updates
After watching this video, you will be able to configure secure dynamic updates.
-
Windows Server 2016 - Networking: DNS Secondary Zones
After watching this video, you will be able to create and configure secondary zones.
-
Windows Server 2016 - Networking: DNS Stub Zones
After watching this video, you will be able to create and configure stub zones.
-
Microsoft Windows Server 2016: DNS Zone Delegation
After watching this video, you will be able to configure a DNS zone delegation.
-
Windows Server 2016 - Networking: DNS GlobalNames Zone
After watching this video, you will be able to configure a GlobalNames zone.
-
Microsoft Windows Server 2016: DNS Resource Records (RR)
After watching this video, you will be able to create and configure DNS Resource Records (RR), including A, AAAA, PTR, SOA, NS, SRV, CNAME, and MX records.
-
Windows Server 2016 - Networking: DNS Zone Scavenging
After watching this video, you will be able to configure zone scavenging.
-
Windows Server 2016 - Networking: DNS Record Options
After watching this video, you will be able to configure record options, including Time To Live (TTL) and weight.
-
Windows Server 2016 - Networking: DNS Round Robin
After watching this video, you will be able to configure DNS round robin.
-
Windows Server 2016 - Networking: DNS Audit Events and Analytical Events
After watching this video, you will be able to use DNS audit and query events for auditing and troubleshooting your DNS zones.
-
Windows Server 2016 - Networking: DNS Unknown Record Support
After watching this video, you will be able to configure unknown record support.
-
Windows Server 2016 - Networking: DNS Root Hints
After watching this video, you will be able to configure Root Hints.
-
Windows Server 2016 - Networking: DNS Delegation
After watching this video, you will be able to configure delegation.
-
Windows Server 2016 - Networking: DNS Policies
After watching this video, you will be able to implement DNS policies.
-
Microsoft Windows Server 2016: DNS and PowerShell
After watching this video, you will be able to implement DNS global settings using Windows PowerShell.
-
Windows Server 2016 - Networking: Secure DNS (DNSSEC)
After watching this video, you will be able to configure Domain Name System Security Extensions (DNSSEC).
-
Windows Server 2016 - Networking: DNS-based Authentication of Named Entities (DANE)
After watching this video, you will be able to configure DNS-based Authentication of Named Entities (DANE).
-
Microsoft Windows Server 2016: DNS Socket Pool, Cache Locking, RRL, and Logging
After watching this video, you will be able to configure DNS socket pool, cache locking, and logging, and enable Response Rate Limiting.
-
Microsoft Windows Server 2016: DNS Recursion Settings
After watching this video, you will be able to configure recursion settings.
-
Microsoft Windows Server 2016: DNS Performance Tuning
After watching this video, you will be able to implement DNS performance tuning.
-
Windows Server 2016 - Networking: DNS Primary Zones
After watching this video, you will be able to create primary DNS zones.
-
Windows Server 2016 - Networking: DNS Active Directory Integration of Primary Zones
After watching this video, you will be able to configure Active Directory integration of primary zones.
-
Windows Server 2016 - Networking: BranchCache for Web and Application Servers
After watching this video, you will be able to implement BranchCache for web and application servers.
-
Windows Server 2016 - Networking: DFS Replication Scheduling
After watching this video, you will be able to configure DFS replication scheduling.
-
Windows Server 2016 - Networking: Remote Differential Compression (RDC)
After watching this video, you will be able to configure Remote Differential Compression (RDC) settings.
-
Windows Server 2016 - Networking: DFS Fault Tolerance
After watching this video, you will be able to configure DFS fault tolerance.
-
Windows Server 2016 - Networking: Clone a DFSR Database
After watching this video, you will be able to clone a Distributed File System Replication (DFSR) database.
-
Windows Server 2016 - Networking: Recover DFSR Databases
After watching this video, you will be able to recover DFSR databases.
-
Windows Server 2016 - Networking: Optimize DFS Replication
After watching this video, you will be able to optimize DFS replication.
-
Windows Server 2016 - Networking: BranchCache Overview
After watching this video, you will be able to identify the features and requirements of a BranchCache implementation.
-
Windows Server 2016 - Networking: Install and Configure BranchCache
After watching this video, you will be able to install and configure BranchCache.
-
Windows Server 2016 - Networking: BranchCache Distributed Cache Mode
After watching this video, you will be able to implement distributed and hosted cache modes.
-
Windows Server 2016 - Networking: BranchCache Hosted Cache Mode
After watching this video, you will be able to implement distributed and hosted cache modes.
-
Windows Server 2016 - Networking: DFS Staging
After watching this video, you will be able to configure DFS staging.
-
Windows Server 2016 - Networking: NPS Certificates
After watching this video, you will be able to configure NPS certificates.
-
Windows Server 2016 - Networking: Connection Request Policies
After watching this video, you will be able to configure connection request policies.
-
Windows Server 2016 - Networking: Network Policies for VPN Clients
After watching this video, you will be able to configure network policies for VPN and wireless and wired clients.
-
Windows Server 2016 - Networking: Network Policies for Wireless and Wired Clients
After watching this video, you will be able to configure network policies for VPN and wireless and wired clients.
-
Windows Server 2016 - Networking: Relocating NPS Policies
After watching this video, you will be able to import and export NPS policies.
-
Windows Server 2016 - Networking: WAP Overview
After watching this video, you will be able to identify usage and capabilities of the Web Application Proxy (WAP).
-
Windows Server 2016 - Networking: What's New in WAP 2016
After watching this video, you will be able to describe new features of the Web Application Proxy.
-
Windows Server 2016 - Networking: Branch Office Considerations
After watching this video, you will be able to identify the challenges faced by branch offices regarding file access and WAN consumption.
-
Windows Server 2016 - Networking: DFS Overview
After watching this video, you will be able to describe the process used by the Distributed File System (DFS).
-
Windows Server 2016 - Networking: DFS Namespaces
After watching this video, you will be able to install and configure DFS namespaces.
-
Windows Server 2016 - Networking: DFS Replication Targets
After watching this video, you will be able to configure DFS replication targets.
-
Securing Windows Server 2016 : Implementing Code Integrity (Device Guard) Policies
After watching this video, you will be able to implement code integrity (device guard) policies.
-
Securing Windows Server 2016 : Overview of Windows Server 2016 Malware Protection
After watching this video, you will be able to define Windows Server 2016 malware protection.
-
Securing Windows Server 2016 : Implementing Windows Defender Antimalware Solution
After watching this video, you will be able to implement an antimalware solution with Windows Defender.
-
Securing Windows Server 2016 : Integrating Windows Defender with WSUS
After watching this video, you will be able to integrate Windows Defender with WSUS and Windows Update.
-
Securing Windows Server 2016 : Configuring Windows Defender using Group Policy
After watching this video, you will be able to configure Windows Defender using Group Policy.
-
Securing Windows Server 2016 : Configuring Windows Defender using PowerShell
After watching this video, you will be able to configure Windows Defender scans using Windows PowerShell.
-
Securing Windows Server 2016 : Overview of AppLocker
After watching this video, you will be able to describe AppLocker.
-
Securing Windows Server 2016 : Implementing AppLocker Rules: GPO
After watching this video, you will be able to implement AppLocker rules using Group Policy.
-
Securing Windows Server 2016 : Implementing Control Flow Guard
After watching this video, you will be able to implement control flow guard.
-
Securing Windows Server 2016 : Creating Code Integrity Policy Rules
After watching this video, you will be able to create code integrity policy rules.
-
Securing Windows Server 2016 : Implement Device Guard Policies with GPO
After watching this video, you will be able to create code integrity file rules.
-
Securing Windows Server 2016 : Configuring WSUS Update Approvals and Deployments
After watching this video, you will be able to configure WSUS update approvals and deployments.
-
Securing Windows Server 2016 : Managing Updates Using WSUS
After watching this video, you will be able to manage updates using WSUS.
-
Securing Windows Server 2016: Managing BitLocker Certificates
After watching this video, you will be able to manage BitLocker certificates.
-
Securing Windows Server 2016: EFS Backup and Restore
After watching this video, you will be able to configure EFS backup and restore.
-
Securing Windows Server 2016: Features of File and Disk Encryption
After watching this video, you will be able to describe features of file and disk encryption.
-
Securing Windows Server 2016 : Overview of Server Patching and Updating Solutions
After watching this video, you will be able to describe the value features of Windows Server 2016 server patching and updating solutions.
-
Securing Windows Server 2016 : Overview of Windows Server Update Services (WSUS)
After watching this video, you will be able to define Windows Server Update Services (WSUS).
-
Securing Windows Server 2016 : Installing and Configuring WSUS
After watching this video, you will be able to install and configure WSUS.
-
Securing Windows Server 2016 : Configuring WSUS Automatic Approvals and Reporting
After watching this video, you will be able to configure WSUS automatic updates and reporting.
-
Securing Windows Server 2016 : Creating WSUS Computer Groups
After watching this video, you will be able to create WSUS computer groups.
-
Securing Windows Server 2016 : Troubleshooting WSUS Configuration and Deployments
After watching this video, you will be able to troubleshoot WSUS configuration and deployments.
-
Securing Windows Server 2016: BitLocker for Shielded VMs
After watching this video, you will be able to understand BitLocker's role in the Guarded Fabric solution.
-
Securing Windows Server 2016: Usage Scenarios for the Encrypting File System (EFS)
After watching this video, you will be able to determine usage scenarios for the EFS.
-
Securing Windows Server 2016: Configuring the EFS Recovery Agent
After watching this video, you will be able to configure the EFS recovery agent.
-
Securing Windows Server 2016: Deploying BitLocker
After watching this video, you will be able to deploy BitLocker without a trusted platform module (TPM) and deploy BitLocker with a TPM only.
-
Securing Windows Server 2016: Configuring the Network Unlock Feature
After watching this video, you will be able to configure the network unlock feature.
-
Securing Windows Server 2016: Configuring BitLocker Group Policy Settings
After watching this video, you will be able to configure BitLocker Group Policy settings.
-
Securing Windows Server 2016: Configuring BitLocker
After watching this video, you will be able to enable BitLocker to use secure boot for platform and BCD integrity validation.
-
Securing Windows Server 2016: Configuring BitLocker on CSVs and SANs
After watching this video, you will be able to configure BitLocker on clustered shared volumes (CSVs) and storage area networks (SANs).
-
Securing Windows Server 2016: Implementing BitLocker Recovery Process
After watching this video, you will be able to implement the BitLocker recovery process using self-recovery and recovery password retrieval solutions.
-
Securing Windows Server 2016: Overview of Disk Encryption
After watching this video, you will be able to recognize the value features of Windows Server 2016 disk encryption.
-
Securing Windows Server 2016: Secure Boot and Encryption Key Functionality
After watching this video, you will be able to determine hardware and firmware requirements for secure boot and encryption key functionality.
-
Securing Windows Server 2016: Overview of Windows Server 2016 BitLocker Technology
After watching this video, you will be able to describe BitLocker encryption technology in Windows Server 2016.
-
Securing Windows Server 2016: Configuring Connection Security Rules
After watching this video, you will be able to configure connection security rules.
-
Securing Windows Server 2016: Implementing Isolation Zones and Domain Isolation
After watching this video, you will be able to implement isolation zones and domain isolation.
-
Securing Windows Server 2016: SMB 3.1.1 Protocol Security
After watching this video, you will be able to identify SMB 3.1.1 protocol security scenarios and implementations.
-
Securing Windows Server 2016: Enabling SMB Encryption
After watching this video, you will be able to enable SMB encryption on SMB shares and SMB signing via Group Policy.
-
Securing Windows Server 2016: Disabling SMB 1.0
After watching this video, you will be able to disable SMB 1.0.
-
Securing Windows Server 2016: Securing DNS Traffic Using DNSSEC and DNS Policies
After watching this video, you will be able to secure DNS traffic using DNSSEC and DNS policies.
-
Securing Windows Server 2016: Microsoft Message Analyzer (MMA)
After watching this video, you will be able to install and configure Microsoft Message Analyzer (MMA) to analyze network traffic.
-
Securing Windows Server 2016: Principles of ESAE Administration
After watching this video, you will be able to implement an Enhanced Security Administrative Environment (ESAE) administrative forest design approach and determine usage scenarios and requirements for implementing ESAE forest design architecture to create a dedicated administrative forest.
-
Securing Windows Server 2016: Usage Scenarios for Clean Source Principles
After watching this video, you will be able to determine usage scenarios and requirements for implementing clean source principles in an Active Directory architecture.
-
Securing Windows Server 2016: Implementing Just-in-Time (JIT) Administration
After watching this video, you will be able to implement JIT administration.
-
Securing Windows Server 2016: Configuring Windows Firewall with Advanced Security
After watching this video, you will be able to configure basic Windows Firewall and Firewall with Advanced Security.
-
Securing Windows Server 2016: Network Location Profiles and Profile Rules
After watching this video, you will be able to configure and deploy network location profiles and profile rules in the GUI management console.
-
Securing Windows Server 2016: Configuring Firewall Rules
After watching this video, you will be able to configure firewall rules for multiple profiles using Group Policy in the GUI management console.
-
Securing Windows Server 2016: Configuring Connection Security Rules
After watching this video, you will be able to configure connection security rules using Group Policy in the GUI management console.
-
Securing Windows Server 2016: Configuring Firewall Policies
After watching this video, you will be able to configure Windows Firewall using Group Policy with GUI management and Windows PowerShell.
-
Securing Windows Server 2016: Configuring Authenticated Firewall Exceptions
After watching this video, you will be able to configure authenticated firewall exceptions and import and export settings.
-
Securing Windows Server 2016: Datacenter Firewall Overview
After watching this video, you will be able to understand the Datacenter Firewall.
-
Securing Windows Server 2016: Distributed Firewall and Software-defined Networking
After watching this video, you will be able to determine requirements and scenarios for distributed firewall implementation with software-defined networking.
-
Securing Windows Server 2016: Distributed Firewall and Network Security Groups
After watching this video, you will be able to determine usage scenarios for distributed firewall policies and network security groups.
-
Securing Windows Server 2016: How to Secure Network Traffic
After watching this video, you will be able to secure network traffic.
-
Securing Windows Server 2016: IPsec Modes and Authentication
After watching this video, you will be able to configure IPsec modes and IPsec authentication options.
-
Securing Windows Server 2016: Configuring Admin and TPM Trusted Attestation
After watching this video, you will be able to configure admin-trusted attestation and configure TPM-trusted attestation.
-
Securing Windows Server 2016: Configuring the Key Protection Service For HGS
After watching this video, you will be able to configure the Key Protection Service (KPS) For HGS.
-
Securing Windows Server 2016: Migrating VMs to Guarded Hosts
After watching this video, you will be able to migrate VMs to guarded hosts.
-
Securing Windows Server 2016: Troubleshooting Guarded Hosts
After watching this video, you will be able to troubleshoot guarded hosts.
-
Securing Windows Server 2016: Implementing Shielded and Encryption-supported VMs
After watching this video, you will be able to implement shielded and encryption-supported VMs.
-
Securing Windows Server 2016: Creating a Shielded VM
After watching this video, you will be able to determine requirements and scenarios for implementing shielded VMs and create a shielded VM using only a Hyper-V environment.
-
Securing Windows Server 2016: Enabling and Configuring vTPM
After watching this video, you will be able to enable and configure vTPM to allow an operating system and data disk encryption within a VM.
-
Securing Windows Server 2016: Encryption-supported and shielded VMs
After watching this video, you will be able to determine requirements and scenarios for implementing encryption-supported and shielded VMs.
-
Securing Windows Server 2016: Principles of ESAE Administration
After watching this video, you will be able to re-enforce Principles of ESAE administration.
-
Securing Windows Server 2016: Overview of Windows Firewall
After watching this video, you will be able to examine the features of Windows Firewall in Server 2016.
-
Securing Windows Server 2016: Securing Privileged Access
After watching this video, you will be able to work with the Microsoft Roadmap for securing privileged access.
-
Securing Windows Server 2016: Implementing Credential Guard
After watching this video, you will be able to determine requirements for implementing Credential Guard, and configure Credential Guard using Group Policy WMI, command prompt, and Windows PowerShell.
-
Securing Windows Server 2016: Implementing NTLM blocking
After watching this video, you will be able to implement NTLM blocking.
-
Securing Windows Server 2016: Creating Security Baselines
After watching this video, you will be able to define and create security baselines.
-
Securing Windows Server 2016: Installing and Configuring SCM
After watching this video, you will be able to install and configure Security Compliance Manager (SCM).
-
Securing Windows Server 2016: Creating, Viewing, and Importing Security Baselines
After watching this video, you will be able to create, view, and import security baselines.
-
Securing Windows Server 2016: Deploying Configurations to Servers
After watching this video, you will be able to deploy configurations to domain and nondomain joined servers.
-
Securing Windows Server 2016: Overview of Virtualization Infrastructure
After watching this video, you will be able to recognize virtualization infrastructure.
-
Securing Windows Server 2016: Implementing a Guarded Fabric Solution
After watching this video, you will be able to implement a guarded fabric solution.
-
Securing Windows Server 2016: The Host Guardian Service (HGS)
After watching this video, you will be able to install and configure the Host Guardian Service (HGS).
-
Securing Windows Server 2016: Creating an Administrative (Bastion) Forest
After watching this video, you will be able to create a new administrative (bastion) forest in an existing Active Directory environment using Microsoft Identity Manager (MIM) and configure trusts between production and bastion forests.
-
Securing Windows Server 2016: Creating Shadow Principals in Bastion Forest
After watching this video, you will be able to create shadow principals in bastion forest and configure the MIM web portal.
-
Securing Windows Server 2016: Requesting Privileged Access Using MIM Web Portal
After watching this video, you will be able to request privileged access using the MIM web portal.
-
Securing Windows Server 2016: Determining PAM solutions
After watching this video, you will be able to determine requirements and usage scenarios for Privileged Access Management (PAM) solutions.
-
A+ Practical: Environmental Impacts Enclosures
After watching this video, you will be able to describe environmental impacts.
-
A+ Practical: Proper Printer Toner Handling
After watching this video, you will be able to describe proper printer toner handling.
-
A+ Practical: Wireless WPS
After watching this video, you will be able to describe WPS.
-
A+ Practical: Microsoft Windows REGSVR32
After watching this video, you will be able to describe Microsoft Windows REGSVR32.
-
A+ Practical: iTunes/iCloud/Apple Configurator
After watching this video, you will be able to describe iTunes/iCloud/Apple Configurator.
-
A+ Practical: Google Sync
After watching this video, you will be able to describe Google Sync.
-
A+ Practical: Personally Identifiable Information
After watching this video, you will be able to describe personal identifiable information.
-
Windows Server 2016 - Identity: Upgrade and Migrate AD FS
After watching this video, you will be able to upgrade and migrate previous AD FS workloads to Windows Server 2016.
-
Windows Server 2016 - Identity: Claims-based Authentication
After watching this video, you will be able to implement claims-based authentication, including Relying Party Trusts.
-
Windows Server 2016 - Identity: Implementing Administrative Role Separation
After watching this video, you will be able to implement administrative role separation.
-
Windows Server 2016 - Identity: Configuring CA Backup and Recovery
After watching this video, you will be able to configure CA backup and recovery.
-
Windows Server 2016 - Identity: Managing Certificate Templates
After watching this video, you will be able to manage certificate templates.
-
Windows Server 2016 - Identity: Managing Certificate Deployment
After watching this video, you will be able to implement and manage certificate deployment.
-
Windows Server 2016 - Identity: Managing Certificate Validation and Revocation
After watching this video, you will be able to manage CA certificate validation and revocation.
-
Windows Server 2016 - Identity: Managing Certificate Renewal
After watching this video, you will be able to manage CA certificate renewal.
-
Windows Server 2016 - Identity: Managing Certificate Enrollment Using Group Policies
After watching this video, you will be able to manage certificate enrollment and renewal for computers and users using Group Policies.
-
Windows Server 2016 - Identity: Configuring Key Archival and Recovery
After watching this video, you will be able to configure and manage key archival and recovery.
-
Windows Server 2016 - Identity: Authentication Policies
After watching this video, you will be able to configure authentication policies.
-
Windows Server 2016 - Identity: Installing Standalone CAs
After watching this video, you will be able to install standalone CAs.
-
Windows Server 2016 - Identity: Configuring Certificate Revocation Lists
After watching this video, you will be able to configure Certificate Revocation List (CRL) distribution points.
-
Windows Server 2016 - Identity: Configuring an Online Responder
After watching this video, you will be able to install and configure Online Responder.
-
Windows Server 2016 - Identity: Control Panel Settings
After watching this video, you will be able to configure Control Panel settings.
-
Windows Server 2016 - Identity: Internet Explorer Settings
After watching this video, you will be able to configure Internet Explorer settings.
-
Windows Server 2016 - Identity: File and Folder Deployment
After watching this video, you will be able to configure file and folder deployment.
-
Windows Server 2016 - Identity: Shortcut Deployment
After watching this video, you will be able to configure shortcut deployment.
-
Windows Server 2016 - Identity: Item-level Targeting
After watching this video, you will be able to configure item-level targeting.
-
Windows Server 2016 - Identity: Installing Active Directory Certificate Authority
After watching this video, you will be able to install Active Directory Integrated Enterprise Certificate Authority (CA).
-
Windows Server 2016 - Identity: Installing Root and Subordinate CAs
After watching this video, you will be able to install offline root and subordinate CAs.
-
Windows Server 2016 - Identity: Printer Preferences
After watching this video, you will be able to configure printer preferences.
-
Windows Server 2016 - Identity: Map Network Drives
After watching this video, you will be able to define network drive mappings.
-
Windows Server 2016 - Identity: Power Options
After watching this video, you will be able to configure power options.
-
Windows Server 2016 - Identity: Custom Registry Settings
After watching this video, you will be able to configure custom registry settings.
-
Windows Server 2016 - Identity: Folder Redirection Policies
After watching this video, you will be able to configure folder redirection.
-
Windows Server 2016 - Identity: Scripts
After watching this video, you will be able to configure script processing.
-
Windows Server 2016 - Identity: Administrative Templates
After watching this video, you will be able to configure administrative templates.
-
Windows Server 2016 - Identity: Import Security Templates
After watching this video, you will be able to import security templates.
-
Windows Server 2016 - Identity: Import a Custom Administrative Template File
After watching this video, you will be able to import a custom administrative template file.
-
Windows Server 2016 - Identity: Property Filters for Administrative Templates
After watching this video, you will be able to configure property filters for administrative templates.
-
A+ Essentials: Dot Matrix Printers
After watching this video, you will be able to describe dot matrix printers.
-
A+ Essentials: Twisted Pair Cable
After watching this video, you will be able to describe twisted pair cable.
-
A+ Essentials: Coax Cable
After watching this video, you will be able to describe coax cable.
-
A+ Essentials: TCP Static vs Dynamic IP Addresses
After watching this video, you will be able to describe static vs dynamic IP addresses.
-
A+ Essentials: Common TCP/IP Ports
After watching this video, you will be able to describe common TCP/IP ports.
-
A+ Essentials: NAT vs DNAT
After watching this video, you will be able to describe NAT vs DNAT.
-
A+ Essentials: SSD vs Hybrid vs Magnetic Disks
After watching this video, you will be able to describe SSD vs hybrid vs magnetic disks.
-
A+ Essentials: Battery Chargers for Mobile Devices
After watching this video, you will be able to describe battery chargers for mobile devices.
-
A+ Essentials: Physically Protecting Mobile Devices
After watching this video, you will be able to describe physically protecting mobile devices.
-
A+ Essentials: Wireless Locator
After watching this video, you will be able to describe wireless locator.
-
A+ Essentials: CLI Troubleshooting Tools
After watching this video, you will be able to describe CLI troubleshooting tools.
-
A+ Essentials: AMD CPU Sockets FM1, FM2 and FM2+
After watching this video, you will be able to describe AMD CPU sockets FM1, FM2 and FM2+.
-
A+ Essentials: Disable Execute Bit
After watching this video, you will be able to describe the disable execute bit.
-
A+ Essentials: Firewire 400 vs 800
After watching this video, you will be able to compare firewire 400 vs 800.
-
A+ Essentials: HD15 Cable
After watching this video, you will be able to describe HD15 cable.
-
A+ Essentials: Composite Cable
After watching this video, you will be able to describe composite cable.
-
A+ Essentials: USB A to B
After watching this video, you will be able to describe USB A to B.
-
A+ Essentials: Thunderbolt to DVI
After watching this video, you will be able to describe Thunderbolt to DVI connectors.
-
A+ Essentials: HDMI toVGA
After watching this video, you will be able to describe HDMI to VGA.
-
A+ Essentials: Image Processing
After watching this video, you will be able to describe image processing.
-
A+ Essentials: Image Processing Cont
After watching this video, you will be able to describe troubleshooting image processing.
-
A+ Essentials: Inkjet Printers
After watching this video, you will be able to describe inkjet printers.
-
Windows Server 2016 - Identity: Remote Desktop Gateway Applications
After watching this video, you will be able to publish Remote Desktop Gateway applications.
-
Windows Server 2016 - Identity: HTTP to HTTPS Redirects and URLs
After watching this video, you will be able to configure HTTP to HTTPS redirects, configure internal and external Fully Qualified Domain Names (FQDNs).
-
Windows Server 2016 - Identity: Licensor Certificate AD RMS Server
After watching this video, you will be able to install a licensor certificate AD RMS server.
-
Windows Server 2016 - Identity: AD RMS Service Connection Point (SCP)
After watching this video, you will be able to manage AD RMS Service Connection Point (SCP).
-
Windows Server 2016 - Identity: AD RMS Templates
After watching this video, you will be able to manage AD RMS templates.
-
Windows Server 2016 - Identity: Exclusion Policies
After watching this video, you will be able to configure Exclusion Policies.
-
Windows Server 2016 - Identity: Back Up and Restore AD RMS
After watching this video, you will be able to back up and restore AD RMS.
-
A+ Essentials: xD Memory Card
After watching this video, you will be able to describe xD Memory Card.
-
A+ Essentials: eMMC
After watching this video, you will be able to describe eMMC.
-
A+ Essentials: 32 bit vs 64 bit System
After watching this video, you will be able to describe 32 bit vs 64 bit systems.
-
A+ Essentials: Intel CPU Sockets 1156,1366 and 1150
After watching this video, you will be able to describe Intel CPU sockets 1156,1366 and 1150.
-
Windows Server 2016 - Identity: Integrate WAP with AD FS
After watching this video, you will be able to integrate WAP with AD FS.
-
Windows Server 2016 - Identity: Multi-factor Authentication
After watching this video, you will be able to configure multi-factor authentication.
-
Windows Server 2016 - Identity: Device Registration
After watching this video, you will be able to implement and configure device registration.
-
Windows Server 2016 - Identity: AD FS and Microsoft Passport
After watching this video, you will be able to integrate AD FS with Microsoft Passport.
-
Windows Server 2016 - Identity: AD FS: Microsoft Azure and Office 365
After watching this video, you will be able to configure AD FS for use with Microsoft Azure and Office 365.
-
Windows Server 2016 - Identity: AD FS Authentication for LDAP Directories
After watching this video, you will be able to configure AD FS to enable authentication of users stored in LDAP directories.
-
Windows Server 2016 - Identity: Web Application Proxy (WAP)
After watching this video, you will be able to install and configure WAP.
-
Windows Server 2016 - Identity: WAP in Pass-through Mode
After watching this video, you will be able to implement WAP in pass-through mode.
-
Windows Server 2016 - Identity: WAP as AD FS Proxy
After watching this video, you will be able to implement WAP as AD FS proxy.
-
Windows Server 2016 - Identity: AD FS Requirements
After watching this video, you will be able to configure AD FS requirements.
-
Windows Server 2016 - Identity: Web Apps via WAP
After watching this video, you will be able to publish web apps via WAP.
-
A+ Practical: Security Zero Day Attack
After watching this video, you will be able to describe zero day attacks.
-
A+ Practical: Common Security Prevention Methods
After watching this video, you will be able to describe common security prevention methods.
-
A+ Practical: Security Content Filtering and Parental Controls
After watching this video, you will be able to describe content filtering and parental controls.
-
A+ Essentials: Unable to Decrypt email
After watching this video, you will be able to describe unable to decrypt email.
-
A+ Practical: Microsoft Windows Shadow Copy
After watching this video, you will be able to describe Microsoft Windows shadow copy.
-
A+ Practical: Microsoft Windows Gadgets and Sidebar
After watching this video, you will be able to describe Microsoft Windows gadgets and sidebar.
-
A+ Practical: Microsoft Windows Virtual XP Mode
After watching this video, you will be able to desribe Microsoft Windows XP mode.
-
A+ Practical: Microsoft Windows PXE, Netboot, and NFS
After watching this video, you will be able to describe PXE, Netboot, and NFS.
-
A+ Practical: Microsoft Windows Partition Management
After watching this video, you will be able to describe partition management.
-
A+ Practical: Microsoft Windows Upgrade Advisor
After watching this video, you will be able to describe the Misrocoft Windows upgrade advisor.
-
A+ Practical: Microsoft Windows System Tools
After watching this video, you will be able to describe Microsoft Windows system tools.
-
A+ Practical: Microsoft Windows Print and Auth Servers
After watching this video, you will be able to describe Microsoft Windows print and authentication servers.
-
A+ Practical: Mobile Device Network Connectivity
After watching this video, you will be able to describe mobile device network connectivity.
-
A+ Practical: Security Tailgating
After watching this video, you will be able to describe tailgating.
-
A+ Essentials: Wireless Indicator
After watching this video, you will be able to describe wireless indicator.
-
A+ Essentials: Command Line Troubleshooting Tools
After watching this video, you will be able to describe command line troubleshooting tools.
-
A+ Essentials: Command Line Tools Continued
After watching this video, you will be able to describe command line troubleshooting tools continued.
-
A+ Essentials: Troubleshooting Mobile Devices
After watching this video, you will be able to describe troubleshooting mobile devices.
-
A+ Essentials: No Bluetooth Connectivity
After watching this video, you will be able to describe no Bluetooth connectivity.
-
A+ Essentials: Troubleshooting External Monitor and Touchscreen
After watching this video, you will be able to troubleshooting External Monitors and Touchscreens.
-
A+ Essentials: Apps not Loading
After watching this video, you will be able to describe apps not loading.
-
A+ Essentials: Swollen Battery
After watching this video, you will be able to describe swollen battery.
-
A+ Essentials: GPS not Functioning
After watching this video, you will be able to describe why the GPS is not functioning.
-
A+ Essentials: Troubleshooting Speakers
After watching this video, you will be able to describe troubleshooting speakers.
-
A+ Essentials: Extremely Short Battery Life
After watching this video, you will be able to describe extremely short battery life.
-
Skype for Business 2015: Configure chat and conferencing
After watching this video, you will be able to determine chat and conferencing settings that should be used to meet specific needs.
-
Skype for Business 2015: Skype for Business Client Overview
After watching this video, you will be able to recognize the role of the Skype for Business clients.
-
Skype for Business 2015: Navigating the Client UI
After watching this video, you will be able to use the Skype for Business client.
-
Skype for Business 2015: User Management
After watching this video, you will be able to understand basic user management tasks related to Skype users.
-
Application Performance Engineering: Considerations for Performance Monitoring
After watching this video, you will be able to identify considerations for performance monitoring.
-
Application Performance Engineering: Test Validation, Baselines, and Archiving Tests
After watching this video, you will be able to recognize how to validate and archive performance tests, and use baselines.
-
Windows Server 2016 - Install, Store, and Compute: Managing Nano Server
After watching this video, you will be able to manage Nano Server.
-
Windows Server 2016 - Install, Store, and Compute: Installing Server Core
After watching this video, you will be able to install Server Core.
-
Windows Server 2016 - Install, Store, and Compute: Exercise: Choose Server 2016 Installation Options
After watching this video, you will be able to determine the appropriate installation options and features for a given scenario.
-
Windows Server 2016 - Networking: IPAM Overview
After watching this video, you will be able to identify management capabilities and features of IP Address Management (IPAM).
-
Windows Server 2016 - Networking: IPAM and Virtual IP Address Spaces
After watching this video, you will be able to use IPAM with System Center Virtual Machine Manager to manage physical and virtual IP address spaces.
-
Windows Server 2016 - Networking: Use IPAM to Manage DHCP Server Properties
After watching this video, you will be able to manage DHCP server properties using IPAM.
-
Windows Server 2016 - Networking: Use IPAM to Configure DHCP Scopes and Options
After watching this video, you will be able to configure DHCP scopes and options using IPAM.
-
Windows Server 2016 - Networking: IP Blocks and Ranges
After watching this video, you will be able to create and manage IP blocks and ranges.
-
Windows Server 2016 - Networking: Monitoring IP Utilization
After watching this video, you will be able to monitor utilization of IP address space.
-
Windows Server 2016 - Networking: Migrate Existing Workloads to IPAM
After watching this video, you will be able to migrate existing workloads to IPAM.
-
Windows Server 2016 - Networking: IPAM Database Storage Using SQL Server
After watching this video, you will be able to configure IPAM database storage using SQL Server.
-
Windows Server 2016 - Networking: IPAM Installation
After watching this video, you will be able to identify deployment and installation requirements for IP Address Management (IPAM).
-
Windows Server 2016 - Networking: Provision IPAM
After watching this video, you will be able to provision IPAM manually or by using group policy.
-
Windows Server 2016 - Networking: IPAM Server Discovery
After watching this video, you will be able to configure server discovery.
-
Windows Server 2016 - Networking: Configuring Connection Request Policies
After watching this video, you will be able to configure connection request policies.
-
Windows Server 2016 - Networking: IPAM and Role-based Access Control (RBAC)
After watching this video, you will be able to delegate administration for DNS and DHCP using role-based access control (RBAC).
-
Windows Server 2016 - Networking: Audit the DNS and DHCP Servers
After watching this video, you will be able to audit the changes performed on the DNS and DHCP servers.
-
Windows Server 2016 - Networking: Audit the IPAM Address Usage Trail
After watching this video, you will be able to audit the IPAM address usage trail.
-
Windows Server 2016 - Networking: Audit DHCP Lease Events and User Logon Events
After watching this video, you will be able to audit DHCP lease events and user logon events.
-
Windows Server 2016 - Networking: IPAM and DHCP Policies and Failover
After watching this video, you will be able to configure DHCP policies and failover using IPAM.
-
Windows Server 2016 - Networking: Use IPAM to Manage DNS Server Properties
After watching this video, you will be able to manage DNS server properties using IPAM.
-
Windows Server 2016 - Networking: Use IPAM to Manage DNS Zones and Records
After watching this video, you will be able to manage DNS zones and records using IPAM.
-
Windows Server 2016 - Networking: Cross-forest IP Address Management
After watching this video, you will be able to manage DNS and DHCP servers in multiple Active Directory forests.
-
Skype for Business 2015: Chat Room Categories
After watching this video, you will be able to recognize how categories are used to organize chat rooms.
-
Skype for Business 2015: Configure Chat Room Categories
After watching this video, you will be able to configure categories for chat rooms using the Control Panel.
-
Skype for Business 2015: Chat Policies
After watching this video, you will be able to list various chat policy settings.
-
Skype for Business 2015: Configure Chat Policies
After watching this video, you will be able to configure policy settings for chat usage.
-
Skype for Business 2015: Install and Upgrade Skype for Business
After watching this video, you will be able to install and upgrade Skype for Business.
-
Skype for Business 2015: Skype for Business Chat Overview
After watching this video, you will be able to describe chat features within Skype for Business.
-
Skype for Business 2015: Migration
After watching this video, you will be able to describe the steps involved with migration.
-
Skype for Business 2015: In-Place Upgrade
After watching this video, you will be able to describe the steps involved wth upgrades.
-
Skype for Business 2015: Mirroring and AlwaysOn
After watching this video, you will be able to describe the steps involved with upgrading from mirroring to AlwaysOn.
-
Skype for Business 2015: Schedule a Skype Meeting Broadcast
After watching this video, you will be able to schedule a meeting for broadcast.
-
Skype for Business 2015: Video Interop Server
After watching this video, you will be able to define the when the VIS should be used.
-
Skype for Business 2015: Office Online Server
After watching this video, you will be able to define when an Office Online Server should be used.
-
Skype for Business 2015: Conferencing Auto Attendant
After watching this video, you will be able to describe CAA service functionality.
-
Skype for Business 2015: Skype Meeting Broadcast
After watching this video, you will be able to describe how meeting broadcasts works.
-
Skype for Business 2015: Conferencing Settings
After watching this video, you will be able to identity specific conferencing settings and when they should be used.
-
Skype for Business 2015: Start a Skype for Business Impromptu Meeting
After watching this video, you will be able to launch an Impromptu Meeting.
-
Skype for Business 2015: Room Settings
After watching this video, you will be able to describe how settings can be applied to a specific chat room.
-
Skype for Business 2015: Start and Stop Persistent Chat Services
After watching this video, you will be able to use the chat services to start and stop the chat functionality.
-
Skype for Business 2015: Join a Chatroom
After watching this video, you will be able to connect to and participate in an existing chat room.
-
Skype for Business 2015: Conferencing Overview
After watching this video, you will be able to describe the conferencing services available with Skype for Business.
-
Skype for Business 2015: Skype for Business Editions
After watching this video, you will be able to differentiate Skype for Business editions.
-
Skype for Business 2015: Skype for Business On-Premises
After watching this video, you will be able to recognize when to use the Skype for Business on-premises solution.
-
Skype for Business 2015: Skype for Business Overview
After watching this video, you will be able to describe the purpose of Skype for Business.
-
Skype for Business 2015: Using Skype for Business PowerShell Cmdlets
After watching this video, you will be able to use PowerShell cmdlets to manage Skype for Business.
-
Skype for Business 2015: Site Design
After watching this video, you will be able to plan single and multiple site configurations for Skype for Business.
-
Skype for Business 2015: Install Skype for Business On-Premises
After watching this video, you will be able to Install a Skype for Business server in your on-premises network.
-
Skype for Business 2015: Skype for Business Server Roles
After watching this video, you will be able to list and describe various server roles.
-
Skype for Business 2015: Skype for Business Server Control Panel
After watching this video, you will be able to use the Skype for Business Server Control Panel tool.
-
Skype for Business 2015: Skype for Business PowerShell Cmdlets
After watching this video, you will be able to describe how PowerShell cmdlets can be used to manage Skype for Business.
-
Skype for Business 2015: Skype for Business Online
After watching this video, you will be able to recognize when to use the Skype for Business online solution.
-
Skype for Business 2015: Sign up for Skype for Business Online
After watching this video, you will be able to sign up and sign in to Skype for Business online.
-
Skype for Business 2015: Skype for Business Hybrid Solutions
After watching this video, you will be able to recognize how Skype for Business on-premises and online can be used together.
-
Skype for Business 2015: Requirements and Capacity Planning
After watching this video, you will be able to plan for resources needed by Skype for Business.
-
Windows Server 2016 - Install, Store, and Compute: Using PowerShell Direct
After watching this video, you will be able to identify the appropriate PowerShell Direct commands and syntax for a given scenario.
-
Windows Server 2016 - Install, Store, and Compute: Exercise: Choosing Virtual Disk Management Options
After watching this video, you will be able to choose virtual hard disk management options for a given scenario.
-
Windows Server 2016 - Install, Store, and Compute: Choosing VM Migration Method
After watching this video, you will be able to choose VM migration method for the given scenario.
-
Windows Server 2016 - Install, Store, and Compute: Determining Cluster Strategies
After watching this video, you will be able to determine cluster strategies for a given scenario.
-
Windows Server 2016 - Install, Store, and Compute: Choosing WSUS Topology
After watching this video, you will be able to choose WSUS topology appropriate for a given scenario.
-
Windows Server 2016 - Install, Store, and Compute: Determine Effective Permissions
After watching this video, you will be able to Determine Effective Permissions for a given scenario.
-
Windows Server 2016 - Identity: DNS SRV Record Registration Issues
After watching this video, you will be able to resolve DNS SRV record registration issues.
-
Windows Server 2016 - Identity: Global Catalog Servers
After watching this video, you will be able to implement a global catalog server.
-
Windows Server 2016 - Identity: Understanding Operations Master Roles
After watching this video, you will be able to define features and functionality of operations master roles.
-
Windows Server 2016 - Identity: Configuring the RODC
After watching this video, you will be able to perform a read-only domain controller (RODC) configuration for a given scenario.
-
Windows Server 2016 - Identity: Add or Remove a Domain Controller from a Domain
After watching this video, you will be able to add or remove a domain controller from a domain.
-
Windows Server 2016 - Identity: Considerations and Practices for DC Upgrades
After watching this video, you will be able to upgrade a domain controller.
-
Windows Server 2016 - Identity: ADDS on Server Core
After watching this video, you will be able to install AD DS on a Server Core installation.
-
Windows Server 2016 - Identity: Install from Media (IFM) Deployments
After watching this video, you will be able to install a domain controller using the Install from Media (IFM) option.
-
Windows Server 2016 - Install, Store, and Compute: Define the requirements to configure S2D
After watching this video, you will be able to define the requirements of S2D for a given scenario.
-
Windows Server 2016 - Install, Store, and Compute: Defining NLB Cluster Settings
After watching this video, you will be able to define appropriate NLB configuration details for a given scenario.
-
Windows Server 2016 - Identity: Creating a New Forest
After watching this video, you will be able to install a new AD forest.
-
Windows Server 2016 - Identity: Using AD FS and WAP
After watching this video, you will be able to describe how AD FS services and WAP are installed and configured.
-
Windows Server 2016 - Identity: Exercise: Define AD RMS Templates
After watching this video, you will be able to use AD RMS templates for a given scenario.
-
Windows Server 2016 - Identity: Exercise: Selecting the Appropriate Trust Type
After watching this video, you will be able to select the appropriate trust type for a given scenario.
-
Windows Server 2016 - Identity: Configuring Group Policy
After watching this video, you will be able to perform group policy configurations for a given scenario.
-
Windows Server 2016 - Identity: Using Group Policy Preferences and Settings
After watching this video, you will be able to use administrative templates and Group Policy preferences in a given scenario.
-
Windows Server 2016 - Identity: Identifying CA Architectural Components
After watching this video, you will be able to identify CA Architectural components to be deployed for a given scenario.
-
Windows Server 2016 - Identity: Recovering Server 2016 Active Directory
After watching this video, you will be able to demonstrate how to recover Active Directory in Windows Server 2016.
-
Windows Server 2016 - Identity: Determine Effective Permissions
After watching this video, you will be able to determine effective permissions for a given scenario.
-
Windows Server 2016 - Identity: Managing Active Directory Objects
After watching this video, you will be able to identify the correct steps used to manage Active Directory objects.
-
Microsoft PowerShell and SharePoint: Recycle Bin
Microsoft PowerShell and SharePoint allow administrators to work with a site collection's Recycle Bin. In this video, David Dye demonstrates how to retrieve and restore both first- and second-stage deleted items, how to delete a single item, and how to flush a Recycle Bin.
-
CompTIA Server+ 2014: BIOS and UEFI
In this video, Aaron Sampson describes the basic input/output system (BIOS) and Unified Extensible Firmware Interface (UEFI).
-
CompTIA Server+ 2014: NICs and Hard Drives
In this video, Aaron Sampson explains the features of network interface cards (NICs) and hard drives.
-
CompTIA Server+ 2014: Riser Cards and RAID Controllers
In this video, Aaron Sampson describes the working of riser cards and RAID controllers that enhance the capabilities of servers.
-
CompTIA Server+ 2014: Components of RAM
In this video, Aaron Sampson explains considerations when selecting server-based memory.
-
CompTIA Server+ 2014: Hot Swap versus Non-Hot Swap Components
In this video, Aaron Sampson explains the use of hot swappable components and non-hot swappable components in servers.
-
CompTIA Server+ 2014: Firmware
In this video, Aaron Sampson explains best practices for upgrading firmware.
-
CompTIA Server+ 2014: USB Interfaces and Ports
In this video, Aaron Sampson describes key considerations in relation to USB interfaces and ports.
-
CompTIA Server+ 2014: Addressing Security Concerns
In this video, Glen E. Clarke discusses security issues related to the installation of server operating systems.
-
CompTIA Server+ 2014: Configuring Hostnames
In this video, Glen E. Clarke demonstrates how to change a hostname on a Windows Server.
-
CompTIA Server+ 2014: Causes of Common Network Problems
The CompTIA Server+ certification covers the methodology required to maintain, support, and troubleshoot server hardware and software. In this video, Aaron Sampson describes some of the causes of common networking problems.
-
Securing Windows Server 2016: Describe Malware Security
After watching this video, you will be able to specify malware security components.
-
Docker for Windows Server: Launch A Docker Container Using PowerShell
After watching this video, you will be able to use PowerShell to manage a container.
-
Docker for Windows Server: Deploy Docker in Azure
After watching this video, you will be able to create a Docker configuration in the Microsoft Azure cloud.
-
Docker for Windows Server: Share and Tag a Docker Image
After watching this video, you will be able to tag a Docker image and push it to Docker Hub.
-
Docker for Windows Server: Docker in the Cloud
After watching this video, you will be able to determine when a Docker cloud deployment is appropriate.
-
Docker for Windows Server: Engine CLI
After watching this video, you will be able to describe the Engine CLI and related commands.
-
Docker for Windows Server: Compose CLI
After watching this video, you will be able to describe the Compose CLI and related commands.
-
Docker for Windows Server: Install and Use Docker
After watching this video, you will be able to recall how to deploy Docker containers on-premises and in the cloud.
-
Docker for Windows Server: Docker APIs
After watching this video, you will be able to describe Docker APIs and how they are used.
-
Docker for Windows Server: Machine CLI
After watching this video, you will be able to describe the Machine CLI and related commands.
-
Docker for Windows Server: DTR CLI
After watching this video, you will be able to describe the DTR CLI and related commands.
-
Docker for Windows Server: Create a Docker Swarm Cluster
After watching this video, you will be able to initialize Docker Swarm nodes.
-
Docker for Windows Server: Docker Community Edition
After watching this video, you will be able to identify Docker Community Edition characteristics.
-
Docker for Windows Server: Use Docker CLI Tools
After watching this video, you will be able to manage Docker containers using command line tools.
-
Docker for Windows Server: Docker Enterprise Edition
After watching this video, you will be able to identify Docker Enterprise Edition characteristics.
-
Docker for Windows Server: Install the Docker PowerShell Module
After watching this video, you will be able to make the Docker PowerShell module available in PowerShell.
-
Docker for Windows Server: Deploy a Multi-tiered App Using Docker Compose
After watching this video, you will be able to manage Docker using Compose CLI commands.
-
Docker for Windows Server: Provision a Docker Host Using the Machine CLI
After watching this video, you will be able to use the CLI to provision a Docker virtual machine.
-
Docker for Windows Server: Build a Docker Image Using the Engine CLI
After watching this video, you will be able to build an image from a Dockerfile using the engine CLI.
-
Docker for Windows Server: Install and Run a Linux Image on Windows
After watching this video, you will be able to run a Linux container on the Windows platform.
-
Docker for Windows Server: Update Docker for Windows
After watching this video, you will be able to install Docker updates on the Windows platform.
-
Docker for Windows Server: Install Docker Images locally on Windows 10
After watching this video, you will be able to use the Docker CLI to pull images down to a Windows 10 Docker host.
-
Docker for Windows Server: Install Docker Images locally on Windows Server 2016
After watching this video, you will be able to use the Docker CLI to pull images down to a Windows Server 2016 Docker host.
-
Docker for Windows Server: Virtualization Basics
After watching this video, you will be able to describe the concept and benefits of virtualization.
-
Docker for Windows Server: Container Basics
After watching this video, you will be able to describe containerization.
-
Docker for Windows Server: Docker Overview
After watching this video, you will be able to define the purpose of Docker.
-
Docker for Windows Server: Dockerfiles
After watching this video, you will be able to describe the purpose of Dockerfiles.
-
Docker for Windows Server: Virtualization and Containers
After watching this video, you will be able to compare virtual machines and containers.
-
Docker for Windows Server: Container Use Cases
After watching this video, you will be able to describe when containers should be used.
-
Docker for Windows Server: Docker Compose
After watching this video, you will be able to describe when to use Docker Compose.
-
Docker for Windows Server: Continuous Integration with Docker
After watching this video, you will be able to describe how continuous integration benefits software development and testing.
-
Docker for Windows Server: Docker Images
After watching this video, you will be able to describe the purpose of Docker images.
-
Docker for Windows Server: Docker Trusted Registry (DTR)
After watching this video, you will be able to describe how DTR manages Docker images.
-
Docker for Windows Server: Containers and Docker
After watching this video, you will be able to recall Docker container-related terminology.
-
Docker for Windows Server: Docker Swarm
After watching this video, you will be able to determine when and how to use Docker Swarm cluster and orchestration features.
-
Docker for Windows Server: Universal Control Plane (UCP)
After watching this video, you will be able to describe how UCP is used as a single Docker management interface.
-
Docker for Windows Server: Integration With Windows 10
After watching this video, you will be able to describe how Docker is integrated with Windows 10.
-
Docker for Windows Server: Windows Container Types
After watching this video, you will be able to compare and contrast Windows container types.
-
Docker for Windows Server: Integration With Windows Server 2016
After watching this video, you will be able to describe how Docker is integrated with Server 2016.
-
Docker for Windows Server: Docker Tools for Visual Studio
After watching this video, you will be able to describe how Visual Studio is used with Windows containers.
-
Docker for Windows Server: The Concept Of Containers
After watching this video, you will be able to describe the concept of containers and how they compare to virtual machines.
-
Docker for Windows Server: Hyper-V Containers
After watching this video, you will be able to describe how Hyper-V containers are used.
-
Docker for Windows Server: Docker and PowerShell
After watching this video, you will be able to list command PowerShell cmdlets used to manage Windows containers.
-
Docker for Windows Server: Install Container and Docker Support on Server 2016
After watching this video, you will be able to install Docker support on the Server 2016 platform.
-
Docker for Windows Server: Install Docker on Windows 10
After watching this video, you will be able to install Docker support on the Windows 10 platform.
-
Docker for Windows Server: Docker Installation Requirements
After watching this video, you will be able to determine what is needed to support a Docker infrastructure.
-
Docker for Windows Server: Create A Docker Account
After watching this video, you will be able to describe the process of creating a Docker account.
-
Docker for Windows Server: Docker Container Networking
After watching this video, you will be able to describe Docker network and port configurations.
-
Docker for Windows Server: Connect To a Docker Container Web Page
After watching this video, you will be able to ensure connectivity to a Docker web app is functional.
-
CompTIA A+ 220-901: Compare Laptop Parts
After watching this video, you will be able to compare laptop connectors.
-
CompTIA A+ 220-902: Toxic Waste Handling
After watching this video, you will be able to list proper toxic waste disposal and handling.
-
CompTIA A+ 220-902: Equipment Grounding
After watching this video, you will be able to use proper grounding equipment.
-
CompTIA A+ 220-902: Power Redundancy
After watching this video, you will be able to describe power redundancy.
-
CompTIA A+ 220-902: Airborne Dust and Debris
After watching this video, you will be able to recognize proper ventilation techniques.
-
CompTIA A+ 220-902: Personal Safety
After watching this video, you will be able to identify personal safety issues.
-
CompTIA A+ 220-902: Material Safety Data Sheet (MSDS)
After watching this video, you will be able to use the MSDS.
-
CompTIA A+ 220-902: Professionalism
After watching this video, you will be able to apply proper communication skills.
-
CompTIA A+ 220-902: Troubleshooting Theory
After watching this video, you will be able to define troubleshooting theory.
-
CompTIA A+ 220-902: Incidence Response
After watching this video, you will be able to recall incidence response procedures.
-
CompTIA A+ 220-902: Licensing and Personal Information
After watching this video, you will be able to identify licensing issues and personal information.
-
CompTIA A+ 220-902: Identify Troubleshooting Steps
After watching this video, you will be able to list logical troubleshooting steps.
-
CompTIA A+ 220-902: Hardware Issues
After watching this video, you will be able to diagnose and repair hardware issues in mobile devices.
-
CompTIA A+ 220-902: Data Security Issues
After watching this video, you will be able to diagnose and repair data security issues in mobile devices.
-
CompTIA A+ 220-902: Application Security Issues
After watching this video, you will be able to diagnose and repair application security issues in mobile devices.
-
CompTIA A+ 220-902: Operating System Issues
After watching this video, you will be able to diagnose and repair operating system issues in mobile devices.
-
CompTIA A+ 220-902: Signal Security Issues
After watching this video, you will be able to diagnose and repair wireless security issues in mobile devices.
-
CompTIA A+ 220-902: Operating System Security Issues
After watching this video, you will be able to diagnose and repair operating system security issues in mobile devices.
-
CompTIA A+ 220-902: Troubleshoot Wireless Connections
After watching this video, you will be able to describe the steps required to repair a wireless connectivity issue.
-
Automation Programming: Performing File Input and Output
After watching this video, you will be able to perform file operations, like open, close, read, and write, on text-based files.
-
Automation Programming: Using Lists, Tuples, and Dictionaries
After watching this video, you will be able to use lists, tuples, and dictionaries in Python.
-
Automation Programming: Creating and Running a Python Script
After watching this video, you will be able to create and run a basic Python script.
-
Automation Programming: Exercise: Using Python for Automation
After watching this video, you will be able to create a Python automation script.
-
Text File Processing & RegEx: Working with the Linux Shell
After watching this video, you will be able to work with the Linux shell to change, copy, create, and view directories and files.
-
Automation Programming: Managing Cron Jobs within Python
After watching this video, you will be able to use the python-crontab module to manage cron jobs.
-
Automation Programming: Creating Zipped Backups with Python
After watching this video, you will be able to create zipped backup files from within a Python script.
-
Automation Programming: Parsing XML Files
After watching this video, you will be able to parse XML files within a Python script.
-
Automation Programming: Retrieving Data from a Website
After watching this video, you will be able to use Python to scrape content from websites and report if a website is online.
-
Automation Programming: Manipulating CSV Files
After watching this video, you will be able to manipulate CSV files within a Python script.
-
Automation Programming: Processing JSON Files
After watching this video, you will be able to process JSON files within a Python script.
-
Text File Processing & RegEx: Using VIM
After watching this video, you will be able to use the VIM editor to insert, delete, append, and save data to files.
-
Text File Processing & RegEx: Viewing the Contents of Files
After watching this video, you will be able to view file contents using built-in shell commands like cat, tac, more, less, head, and tail.
-
Introduction to Automation: Identifying the Advantages of IT Automation
After watching this video, you will be able to identify the advantages automation has brought to IT processes and procedures.
-
Introduction to Automation: Using Automation for Configuration Management
After watching this video, you will be able to describe and identify tools that can be used to automate configuration management processes.
-
Introduction to Automation: Recognizing How IT Automation is Used
After watching this video, you will be able to recognize how and where IT automation can be used to meet business needs, and in particular, to meet IT requirements for business processes.
-
Introduction to Automation: Describing the History of Automation
After watching this video, you will be able to describe the history of automation and how automation has made inroads into IT processes.
-
Introduction to Automation: Defining Automation
After watching this video, you will be able to define automation and how automation can help or be used in IT processes.
-
Introduction to Automation: Using Automation in IT and Manufacturing
After watching this video, you will be able to recognize how IT automation and manufacturing automation are analogous.
-
Introduction to Automation: Orchestrating Automated Applications
After watching this video, you will be able to describe how to apply orchestration to manage automated virtual application containers.
-
Introduction to Automation: Monitoring Automated Cloud-Based Applications
After watching this video, you will be able to describe how to monitor automated cloud-based applications.
-
Introduction to Automation: Applying Automation to Virtualization
After watching this video, you will be able to describe and apply automation tools to manage or facilitate the use of virtualization.
-
Introduction to Automation: Working with Test Automation
After watching this video, you will be able to work with test automation tools.
-
Automation Programming: Using Variables and Operators
After watching this video, you will be able to use variables and operators to manipulate strings and numbers.
-
Automation Programming: Working with Functions and Loops
After watching this video, you will be able to work with functions and loops to process data.
-
Automation Programming: Installing Python
After watching this video, you will be able to install Python 3 on Linux, Windows, and Mac.
-
Automation Programming: Managing Packages with PIP Package Manager
After watching this video, you will be able to use the PIP Package Manager to manage Python packages on Windows 10.
-
Automating Your IT Infrastructure: Exercise: Using Automation in IT
After watching this video, you will be able to describe how automation can be used to help with common IT problems or situations
-
Automation Programming: Identifying How to Use Python to Automate
After watching this video, you will be able to identify how Python can be used to automate processes and operating system tasks.
-
Automating Your IT Infrastructure: Using SaaS to Monitor Automated Applications
After watching this video, you will be able to describe how to use SaaS to monitor automated cloud-based applications
-
Automation & Scalability: Managing and Provisioning Services
After watching this video, you will be able to manage and provision scalable IT services.
-
Automation & Scalability: Automating Deployments
After watching this video, you will be able to automate deployments to infrastructure using IT automation tools.
-
Version Control & GIT: Exercise: Using GIT for Automation
After watching this video, you will be able to configure and use GIT to handle versioning and manage automation scripts.
-
Automation & Scalability: Working with Scalability and Automation
After watching this video, you will be able to work with automation tools to manage scalability issues in an IT environment.
-
Version Control & GIT: Deploying to Azure Using GIT
After watching this video, you will be able to deploy a GIT repository to an Azure App Service.
-
Version Control & GIT: Automating Tasks Using GIT Hooks
After watching this video, you will be able to automate tasks within GIT by creating scripts for the built-in hooks.
-
Version Control & GIT: Pushing and Pulling Repositories
After watching this video, you will be able to push and pull repositories to retrieve changes or update branches in GIT.
-
Version Control & GIT: Using GIT to Deploy to Production
After watching this video, you will be able to use built-in methods for deploying files to a production environment in GIT.
-
Automation & Scalability: Automating Scaling
After watching this video, you will be able to use automation to automatically scale IT resources based on current or projected needs.
-
Automation & Scalability: Enabling Autoscaling
After watching this video, you will be able to recognize that you must enable autoscaling by using an appropriate deployment tier.
-
Automation & Scalability: Identifying Scaling Design Considerations
After watching this video, you will be able to identify the issues around building systems that can scale automatically.
-
Automated Monitoring: Comparing the Types of Monitoring
After watching this video, you will be able to compare the types of monitoring and where each type may best meet a business or IT requirement.
-
Automated Monitoring: Reporting on Automation
After watching this video, you will be able to describe how automation tools can create reports to manage IT resources.
-
Automated Monitoring: Recognizing How Monitoring Can Be Automated
After watching this video, you will be able to recognize how automation can be used to monitor IT processes and resources, as well as how monitoring processes can be automated.
-
Automated Monitoring: Identifying What to Monitor
After watching this video, you will be able to identify the IT resources and processes that should be monitored.
-
Automation & Scalability: Using Traffic Routing
After watching this video, you will be able to describe how to automate traffic routing.
-
Automation & Scalability: Exercise: Using Automation for Scalability
After watching this video, you will be able to describe how automation can be used to dynamically scale IT resources.
-
Automation & Scalability: Using an Automation Account
After watching this video, you will be able to describe how to create and use an automation account in the Cloud.
-
Automation & Scalability: Automating Network Load Balancing
After watching this video, you will be able to describe how automating network load balancing can maintain and scale IT processes.
-
Automated Monitoring: Using Automation with Auditing
After watching this video, you will be able to describe how automation tools can be used to facilitate handling audit and compliance objectives.
-
Automated Monitoring: Enabling Detailed Monitoring in the Cloud
After watching this video, you will be able to describe how to enable and use automatic monitoring in AWS.
-
Automated Monitoring: Creating an Alert in the Cloud
After watching this video, you will be able to describe how to create an alert that an automatic monitoring service can use in AWS.
-
Automated Monitoring: Exercise: Using Automation for Monitoring
After watching this video, you will be able to describe how automation can be used to monitor IT infrastructure.
-
Automated Monitoring: Monitoring Code and Build Automation
After watching this video, you will be able to describe how to automate builds by monitoring code.
-
Automated Monitoring: Using Nagios to Monitor Infrastructure
After watching this video, you will be able to describe how to use Nagios to monitor an IT environment's infrastructure.
-
Text File Processing & RegEx: Describing Regular Expressions (RegEx)
After watching this video, you will be able to describe the RegEx language and how it can be used to match against data.
-
Text File Processing & RegEx: Finding Files Matching a RegEx
After watching this video, you will be able to find files on a device by matching against RegEx expressions using grep.
-
Text File Processing & RegEx: Manipulating File Contents from the Shell
After watching this video, you will be able to manipulate the contents of files using cut, uniq, and sort.
-
Text File Processing & RegEx: Using Pipes and Output Redirection
After watching this video, you will be able to use pipes and output redirection to manipulate file output and contents.
-
Text File Processing & RegEx: Identifying Linux File Permissions
After watching this video, you will be able to identify Linux file permissions and how they are associated with world, group, and individual user access.
-
Text File Processing & RegEx: Comparing File and Directory Contents
After watching this video, you will be able to compare files and directories using the diff, wc, and nl commands.
-
Text File Processing & RegEx: Searching Logs Using RegEx
After watching this video, you will be able to use regular expressions and shell commands to filter log data and find critical events.
-
Text File Processing & RegEx: Validating Data Using RegEx
After watching this video, you will be able to validate string data by using regular expressions to check for matches to email addresses, phone numbers, hex numbers, URLs, and IP addresses.
-
Text File Processing & RegEx: Replacing File Contents Using RegEx
After watching this video, you will be able to replace the contents of files by using the sed command and regular expressions.
-
Text File Processing & RegEx: Using RegEx in Python
After watching this video, you will be able to use regular expressions in Python to find matching expressions in strings.
-
Version Control & GIT: Creating and Using Branches
After watching this video, you will be able to create and use branches to track changes to a file in GIT.
-
Version Control & GIT: Resolving Issues with Merges
After watching this video, you will be able to resolve merge conflicts between two branches in GIT.
-
Version Control & GIT: Configuring a GIT Repository
After watching this video, you will be able to configure both local and remote GIT repositories.
-
Version Control & GIT: Adding and Manipulating Files in a Repository
After watching this video, you will be able to add files and commit the changes to a repository in GIT.
-
Version Control & GIT: Recognizing the Need for Version Control
After watching this video, you will be able to recognize the need and uses for software, or file, version control and how GIT facilitates that process.
-
Version Control & GIT: Installing GIT on Linux, Windows, and Mac
After watching this video, you will be able to install GIT on multiple operating systems and create a GIT repository.
-
Text File Processing & RegEx: Exercise: Manipulating Text Files
After watching this video, you will be able to manipulate the contents of files and find patterns using regular expressions.
-
Version Control & GIT: Using a GUI Tool
After watching this video, you will be able to use GUI tools to view a GIT repository.
-
Version Control & GIT: Using the GIT Log and Viewing File Change History
After watching this video, you will be able to use and filter the GIT log and view the change history for a file.
-
Version Control & GIT: Comparing Changes to a Repository
After watching this video, you will be able to compare changes between branches and repositories.
-
Exchange 2016: Standard Deployment Solution
After watching this video, you will be able to identify standard deployment solutions.
-
Exchange 2016: Mail Processing
After watching this video, you will be able to describe mail processing.
-
Skype for Business 2015: Configure Client Policies
After watching this video, you will be able to user PowerShell and the GUI to manage client policies.
-
Skype for Business 2015: Client Authentication
After watching this video, you will be able to list authentication options available for clients.
-
Skype for Business 2015: Perform User Management Tasks
After watching this video, you will be able to use PowerShell and the GUI to manage users.
-
Skype for Business 2015: Client Policies
After watching this video, you will be able to describe how client policies are used to configure many users with similar needs.
-
Skype for Business 2015: Contacts
After watching this video, you will be able to understand the role of contacts in Skype for Business.
-
Skype for Business 2015: Client Configuration
After watching this video, you will be able to configure settings within the Skype for Business client.
-
Skype for Business 2015: Address Book
After watching this video, you will be able to understand the role of the address book in Skype for Business.
-
Skype for Business 2015: Interoperability with Legacy Solutions
After watching this video, you will be able to describe how Skype for Business can communicate with older legacy systems.
-
Skype for Business 2015: XMPP
After watching this video, you will be able to describe the purpose of the Extensible Messaging and Presence Protocol.
-
Skype for Business 2015: Mobility
After watching this video, you will be able to recognize how mobile devices interact with Skype for Business.
-
Skype for Business 2015: Federation
After watching this video, you will be able to describe the role federation plays in Skype for Business.
-
Skype for Business 2015: External Access Overview
After watching this video, you will be able to describe how external access to Skype for Business occurs.
-
Skype for Business 2015: Certificates
After watching this video, you will be able to explain how PKI certificates can secure Skype for Business communications.
-
Skype for Business 2015: Edge Server Overview
After watching this video, you will be able to describe how Edge Servers are used for external access.
-
Skype for Business 2015: Configuring archiving and external access
After watching this video, you will be able to apply archive settings.
-
Skype for Business 2015: Determine enterprise voice configurations
After watching this video, you will be able to determine the best voice configuraton settings given a set of requirements.
-
Skype for Business 2015: Data Retention Overview
After watching this video, you will be able to explain how and why data can be archived.
-
Skype for Business 2015: Call Management Features
After watching this video, you will be able to describe how incoming calls are handled with call management features.
-
Skype for Business 2015: Voice policies
After watching this video, you will be able to define voice policy settings and hower their scope can affect different sets of users.
-
Skype for Business 2015: Configure a Skype for Business Dial Plan
After watching this video, you will be able to use the Control Panel to create a dial plan.
-
Skype for Business 2015: Enable Enterprise Voice for users
After watching this video, you will be able to use the Control Panel to assign a voice policy to a user.
-
Skype for Business 2015: Dial Plans
After watching this video, you will be able to define dial plan settings and how their scope can affect different sets of users.
-
Skype for Business 2015: Archive Policies
After watching this video, you will be able to describe settings available in archive policies.
-
Skype for Business 2015: Configure an on-premises archive Policy
After watching this video, you will be able to apply archive settings on-premises.
-
Skype for Business 2015: Enterprise Voice Overview
After watching this video, you will be able to describe factors influencing enterprise voice configuration.
-
Skype for Business 2015: Skype PSTN and SIP Connectivity
After watching this video, you will be able to describe how Skype for Business allows connectivity with other communications systems.
-
Skype for Business 2015: Configure Skype settings in GPOs
After watching this video, you will be able to install and use the Group Policy ADMX files for Skype for Business.
-
Skype for Business 2015: Configure client settings and policies
After watching this video, you will be able to configure client settings individually and through the use of policies.
-
Skype for Business 2015: Client VDI
After watching this video, you will be able to determine when the client VDI should be used.
-
Skype for Business 2015: Group Policy Skype Settings
After watching this video, you will be able to descibe how Group Policy can be used to configure Skype for Business client settings.
-
Skype for Business 2015: Configure Client Security Options
After watching this video, you will be able to secure Skype for Business clients.
-
Skype for Business 2015: Skype for Business Trunking
After watching this video, you will be able to recognize how trunking interconnects Skype for Business and the PSTN.
-
Skype for Business 2015: Skype Cloud PBX
After watching this video, you will be able to recognize how a cloud PBX can replace an on-premises PBX phone system.
-
Skype for Business 2015: Mediation Server
After watching this video, you will be able to discuss the role a mediation server has within enterprise voice.
-
Exchange 2016: Implement Load Balancing (Part 1)
After watching this video, you will be able to implement load balancing for single namespace.
-
Exchange 2016: Mail Flow from External SMTP with Edge Transports
After watching this video, you will be able to describe mailflow from an external SMTP with Edge Transport servers.
-
Exchange 2016: Mail Flow to External SMTP - No Edge Transports
After watching this video, you will be able to describe mailflow to an external SMTP with no Edge Transport servers.
-
Exchange 2016: Exchange 2016 Transport - Architecture
After watching this video, you will be able to describe Exchange 2016 transport architecture.
-
Exchange 2016: Mail Flow from External SMTP - No Edge Transports
After watching this video, you will be able to describe mailflow from an external SMTP with no Edge Transport servers.
-
Exchange 2016: Set Up Redundancy for Intra-site Scenarios (Part 1)
After watching this video, you will be able to set up redundancy for intra-site scenarios.
-
Exchange 2016: Set Up Redundancy for Intra-site Scenarios (Part 2)
After watching this video, you will be able to implement redundancy for intra-site scenarios.
-
Exchange 2016: Implement Load Balancing (Part 2)
After watching this video, you will be able to implement load balancing for multiple namespace.
-
Exchange 2016: Multiple Namespaces with No Session Affinity
After watching this video, you will be able to describe multiple namespaces with no session affinity.
-
Exchange 2016: Mail Flow to External SMTP with Edge Transports
After watching this video, you will be able to describe mailflow to an external SMTP with Edge Transport servers.
-
Exchange 2016: PST Cons
After watching this video, you will be able to identify PST cons.
-
Exchange 2016: Mailbox Archiving
After watching this video, you will be able to archive mailboxes.
-
Existing title: EAC Screenshots
After watching this video, you will be able to describe EAC screenshots.
-
Exchange 2016: Configure the Managed Folder Assistant
After watching this video, you will be able to configure the managed folder assistant.
-
Exchange 2016: Implementing Retention Tags Step by Step
After watching this video, you will be able to implement retention tags step by step.
-
Exchange 2016: Plan and Delegate RBAC Roles for eDiscovery
After watching this video, you will be able to plan and delegate RBAC roles for eDiscovery.
-
Exchange 2016: Create Archive Policies
After watching this video, you will be able to create archive policies.
-
Exchange 2016: Create Archive Policies & Plan for Archive Storage
After watching this video, you will be able to create archive policies and plan for archive storage.
-
Exchange 2016: Configure On-premises Mailbox Archiving – EAC & EMS
After watching this video, you will be able to configure on-premises mailbox archiving with EAC and EMS.
-
Exchange 2016: Online Archiving Office 365 and Hybrid
After watching this video, you will be able to implement online archiving for Office 365 and Hybrid.
-
Exchange 2016: E-mail Address Policy
After watching this video, you will be able to define e-mail address policies.
-
Exchange 2016: EMS cmdlets
After watching this video, you will be able to describe EMS cmdlets.
-
Exchange 2016: Transport Rules
After watching this video, you will be able to identify transport rules.
-
Exchange 2016: Configure Accepted Domains
After watching this video, you will be able to configure accepted domains.
-
Exchange 2016: Configure Custom Rules Process
After watching this video, you will be able to configure custom rules process.
-
Exchange 2016: Configure Custom Rules XML
After watching this video, you will be able to configure custom rules XML.
-
Exchange 2016: DLP Transport Rules
After watching this video, you will be able to identify DLP transport rules.
-
Exchange 2016: Set Up Pre-built Rules
After watching this video, you will be able to set up pre-built rules.
-
Exchange 2016: EMS Deployment and Configuration
After watching this video, you will be able to describe EMS deployment and configuration.
-
Exchange 2016: Design a Data Loss Prevention DLP
After watching this video, you will be able to design a data loss prevention DLP.
-
Exchange 2016: Design Interorganization Mail Flow
After watching this video, you will be able to design interorganization mail flow.
-
Exchange 2016: Edge Transport
After watching this video, you will be able to define edge transport.
-
Exchange 2016: Managing Site Link Cost and Hub Sites
After watching this video, you will be able to manage site link cost and hub sites.
-
Exchange 2016: Configure Send/Receive Connectors
After watching this video, you will be able to configure send/receive connectors.
-
Exchange 2016: Design Shared Namespace Scenarios
After watching this video, you will be able to design shared namespaces.
-
Exchange 2016: Configuring an Edge Transport Server
After watching this video, you will be able to configure an edge transport server.
-
Exchange 2016: Antimalware
After watching this video, you will be able to describe antimalware.
-
Exchange 2016: Server Hosted Antivirus Applications
After watching this video, you will be able to identify server hosted antivirus applications.
-
Exchange 2016: Antispam
After watching this video, you will be able to describe antispam.
-
Exchange 2016: Antispam Management
After watching this video, you will be able to describe antispam management.
-
Exchange 2016: Transport High Availability Boundary
After watching this video, you will be able to identify transport high availability boundary.
-
Exchange 2016: Shadow Redundancy
After watching this video, you will be able to define shadow redundancy.
-
Exchange 2016: Design Intersite Mail Flow (Routing)
After watching this video, you will be able to design intersite mail flow routing.
-
Exchange 2016: Design Intersite Mail Flow (Site Links)
After watching this video, you will be able to design intersite mail flow site links.
-
Exchange 2016: Delivery Groups
After watching this video, you will be able to define delivery groups.
-
Exchange 2016: Exchange Mail Flow
After watching this video, you will be able to describe Exchange mail flow.
-
Exchange 2016: MX Record Resilience (Part 1)
After watching this video, you will be able to describe MX record resilience.
-
Exchange 2016: MX Record Resilience (Part 2)
After watching this video, you will be able to implement MX record resilience.
-
Exchange 2016: Shadow Redundancy Components
After watching this video, you will be able to identify shadow redundancy components.
-
Exchange 2016: Safety Net Operation
After watching this video, you will be able to describe safety net operation.
-
Exchange 2016: Namespace Models - Office Online Server
After watching this video, you will be able to describe namespace models for Office online server.
-
Exchange 2016: Namespace Models - Regional Namespace
After watching this video, you will be able to describe namespace models for a regional namespace.
-
Exchange 2016: Manage Organization Relationships
After watching this video, you will be able to manage organization relationships.
-
Exchange 2016: Plan Namespaces for Coexistence
After watching this video, you will be able to plan namespaces for coexistence.
-
Exchange 2016: Create a Sharing Policy via EAC
After watching this video, you will be able to create a sharing policy.
-
Exchange 2016: Edit a Default Sharing Policy via EAC
After watching this video, you will be able to edit a default sharing policy via EAC.
-
Exchange 2016: Firewall Requirements for Federated Sharing
After watching this video, you will be able to identify firewall requirements for federated sharing.
-
Exchange 2016: Manage Sharing Policies
After watching this video, you will be able to manage sharing policies.
-
Exchange 2016: Supported Coexistence Scenarios
After watching this video, you will be able to identify supported coexistence scenarios.
-
Exchange 2016: Configure Proxy Redirect
After watching this video, you will be able to configure proxy redirect.
-
Exchange 2016: Plan Firewall Configuration for Coexistence
After watching this video, you will be able to plan firewall configuration for coexistence.
-
Exchange 2016: Implement Password Synchronization
After watching this video, you will be able to implement password synchronization.
-
Exchange 2016: Plan and Configure Certificate and Firewall Requirements
After watching this video, you will be able to plan and configure certificate and firewall requirements.
-
Exchange 2016: Deploy and Manage Hybrid Configuration
After watching this video, you will be able to deploy and manage hybrid configuration.
-
Exchange 2016: Server Deploy Assist and Remote Connectivity Analyzer
After watching this video, you will be able to describe server deploy assist and remote connectivity analyzer.
-
Exchange 2016: What Is a Hybrid Configuration
After watching this video, you will be able to describe a hybrid configuration.
-
Exchange 2016: Prerequisites for Hybrid Deployment
After watching this video, you will be able to identify prerequisites for hybrid deployment.
-
Exchange 2016: Managing Exchange User Throttling Policy (Part 2)
After watching this video, you will be able to create a policy while managing user throttling policies.
-
Exchange 2016: Monitor System Status
After watching this video, you will be able to view monitoring system status.
-
Exchange 2016: Microsoft Federation Gateways Overview
After watching this video, you will be able to define Microsoft federation gateways.
-
Exchange 2016: Create Federation Trust Screenshots
After watching this video, you will be able to create federation trust screenshots.
-
Exchange 2016: X.509 Requirements for Federation
After watching this video, you will be able to identify X.509 requirements for federation.
-
Exchange 2016: Service Level Agreement (Part 1)
After watching this video, you will be able to define a service level agreement.
-
Exchange 2016: Service Level Agreement (Part 2)
After watching this video, you will be able to identify service level agreement metrics.
-
Exchange 2016: Audit Log Fields
After watching this video, you will be able to describe audit log fields.
-
Exchange 2016: Plan for Software Update Management
After watching this video, you will be able to plan for software update management.
-
Exchange 2016: Search the MailboxAuditLog
After watching this video, you will be able to search the MailboxAuditLog.
-
Exchange 2016: Administrative Mailbox Audit Logging
After watching this video, you will be able to implement administrative mailbox audit logging.
-
Exchange 2016: Configure Mailbox Audit Logging
After watching this video, you will be able to configure mailbox audit logging.
-
Exchange 2016: Managing Exchange User Throttling Policy (Part 1)
After watching this video, you will be able to manage Exchange user throttling policies.
-
Exchange 2016: Exchange Workload Management
After watching this video, you will be able to describe Exchange workload management.
-
Exchange 2016: Managing Workload Policy Modifications
After watching this video, you will be able to manage workload policy modifications.
-
Exchange 2016: Ethical Wall
After watching this video, you will be able to describe an ethical wall.
-
Exchange 2016: Ethical Wall with Distribution Groups (Part 1)
After watching this video, you will be able to describe an ethical wall with distribution groups.
-
Exchange 2016: Design and Configure Journaling (Part 2)
After watching this video, you will be able to implement journaling design and configuration.
-
Exchange 2016: Integrate In-Place Federated Searches with SharePoint
After watching this video, you will be able to integrate InPlace federated searches with SharePoint.
-
Exchange 2016: Perform a Query-based In-Place Hold
After watching this video, you will be able to perform a query-based In-Place hold.
-
Exchange 2016: Design and Configure Journaling (Part 1)
After watching this video, you will be able to design and configure journaling.
-
Exchange 2016: Create, Configure, and Deploy Message Classifications
After watching this video, you will be able to create, configure, and deploy message classifications.
-
Exchange 2016: Configure MailTips Screen Shot
After watching this video, you will be able to configure MailTips.
-
Exchange 2016: Ethical Wall with Distribution Groups (Part 2)
After watching this video, you will be able to create an ethical wall with distribution groups.
-
Exchange 2016: Transport Rules
After watching this video, you will be able to identify transport rules.
-
Exchange 2016: Managed Folders for Compliance
After watching this video, you will be able to manage folders for compliance.
-
Exchange 2016: Checklist to Remove 2010
After watching this video, you will be able to define the checklist to remove 2010.
-
Exchange 2016: Move the Exchange System Mailbox
After watching this video, you will be able to move the Exchange system mailbox.
-
Exchange 2016: Download the Migration Scripts
After watching this video, you will be able to download the migration scripts.
-
Exchange 2016: Migrate Mailboxes
After watching this video, you will be able to migrate mailboxes.
-
Exchange 2016: Cross-forest Move Using the EMS
After watching this video, you will be able to execute a cross-forest move using the EMS.
-
Exchange 2016: Single and Multi-phase Upgrade
After watching this video, you will be able to implement single and multi-phase upgrade.
-
Exchange 2016: Exchange 2016 Supported Upgrade Paths
After watching this video, you will be able to identify Exchange 2016 supported upgrade paths.
-
Exchange 2016: Identification, Investigation, and Mitigation
After watching this video, you will be able to describe identification, investigation, and mitigation.
-
Exchange 2016: Create and Configure a DAG
After watching this video, you will be able to create and configure a DAG.
-
Exchange 2016: Moving a Public Folder Item
After watching this video, you will be able to move a public folder item.
-
Exchange 2016: Migrate Public Folders
After watching this video, you will be able to migrate public folders.
-
Exchange 2016: Manage DAG Networks
After watching this video, you will be able to manage DAG networks.
-
Exchange 2016: Troubleshoot DAG Networks
After watching this video, you will be able to troubleshoot DAG networks.
-
Exchange 2016: Cluster Quorum (Part 2)
After watching this video, you will be able to describe cluster quorum.
-
Exchange 2016: DAG Deployment Process
After watching this video, you will be able to define the DAG deployment process.
-
Exchange 2016: DAG Architecture
After watching this video, you will be able to define DAG architecture.
-
Exchange 2016: Cluster Quorum (Part 1)
After watching this video, you will be able to describe cluster quorum operation.
-
Exchange 2016: Planning to Virtualize Exchange 2016
After watching this video, you will be able to plan Exchange 2016 virtualization.
-
Exchange 2016: Public Folder Capacity/Placement
After watching this video, you will be able to plan public folder capacity and placement.
-
Exchange 2016: Archive Mailbox Capacity/Placement
After watching this video, you will be able to plan archive mailbox capacity and placement.
-
Exchange 2016: Create and Configure Public Folders
After watching this video, you will be able to create and configure public folders.
-
Exchange 2016: Addresses and Address Management
After watching this video, you will be able to describe addresses and address management.
-
Exchange 2016: Create and Configure an Offline Address Book
After watching this video, you will be able to create and configure an offline address book.
-
Exchange 2016: Prepare AD and Install Exchange
After watching this video, you will be able to prepare AD and install Exchange.
-
Exchange 2016: Architectural Planning
After watching this video, you will be able to describe architectural planning.
-
Exchange 2016: Public Folder Planning Considerations
After watching this video, you will be able to identify public folder planning considerations.
-
Exchange 2016: Jetstress Utility
After watching this video, you will be able to describe Jetstress utility.
-
Exchange 2016: System Roles
After watching this video, you will be able to describe system roles, mailbox servers, HTTP proxy, and IIS.
-
Exchange 2016: Edge Protection
After watching this video, you will be able to define edge protection.
-
Exchange 2016: Planning Database Size and Performance
After watching this video, you will be able to plan Exchange database size and performance.
-
Exchange 2016: Deploying Mailbox Server Roles
After watching this video, you will be able to deploy mailbox server roles.
-
Exchange 2016: Management
After watching this video, you will be able to manage Exchange server.
-
Exchange 2016: The Role Based Access Control Model
After watching this video, you will be able to describe the role based access control model.
-
Exchange 2016: Deployment
After watching this video, you will be able to deploy Active Directory.
-
Exchange 2016: Installation
After watching this video, you will be able to install Exchange server.
-
Exchange 2016: Outlook Client Communication
After watching this video, you will be able to describe outlook client communication.
-
Exchange 2016: Hybrid Deployment
After watching this video, you will be able to define hybrid deployment.
-
Exchange 2016: BitLocker
After watching this video, you will be able to define BitLocker.
-
Exchange 2016: Smart Card Overview
After watching this video, you will be able to identify smart Card functions.
-
Exchange 2016: RBAC and Active Directory Split Permissions
After watching this video, you will be able to identify RBAC and active directory split permissions.
-
Exchange 2016: Configure Delegated Setup
After watching this video, you will be able to configure delegated setup.
-
Exchange 2016: Plan and Manage RBAC (Part 2)
After watching this video, you will be able to identify admin roles in RBAC.
-
Exchange 2016: Plan and Manage RBAC (Part 3)
After watching this video, you will be able to customize the RBAC system.
-
Exchange 2016: Using the Exchange Recover Server Option
After watching this video, you will be able to use the Exchange recover server option.
-
Exchange 2016: Plan and Manage RBAC (Part 1)
After watching this video, you will be able to define the management role group architecture in RBAC.
-
Exchange 2016: Plan and Configure Message Encryption for Office 365
After watching this video, you will be able to plan and configure for Office 365 message encryption.
-
Exchange 2016: Plan and Configure EOP Advanced Threat Protection
After watching this video, you will be able to plan and configure EOP advanced threat protection.
-
CompTIA A+ 220-902: Encrypted File System (EFS)
After watching this video, you will be able to describe how EFS protects your files.
-
Exchange 2016: Plan and Configure Information Rights Management
After watching this video, you will be able to plan and configure information rights management.
-
CompTIA A+ 220-902: Network Shares
After watching this video, you will be able to recognize how network shares work and their interaction with NTFS drives.
-
Exchange 2016: Setting Item-level Recovery (Part 1)
After watching this video, you will be able to set item-level recovery.
-
Exchange 2016: Setting Item-level Recovery (Part 2)
After watching this video, you will be able to set recoverable items retention, folder quota, and alerts.
-
Exchange 2016: Exchange Server Recovery
After watching this video, you will be able to describe Exchange server recovery.
-
Exchange 2016: Recovering Mailbox Databases
After watching this video, you will be able to recover mailbox databases.
-
Exchange 2016: Activate Lagged Mailbox Database Copies–Procedure 3
After watching this video, you will be able to enforce redelivery from safety net.
-
Exchange 2016: Backup and Restore Solutions and Strategies
After watching this video, you will be able to identify backup and restore solutions and strategies.
-
Exchange 2016: Activate Lagged Mailbox Database Copies–Procedure 2
After watching this video, you will be able to activate a lagged copy of the database.
-
Exchange 2016: Perform a Dial Tone Restore
After watching this video, you will be able to perform a dial tone restore.
-
Exchange 2016: In-Place Hold (Planning)
After watching this video, you will be able to define in-place hold.
-
Exchange 2016: Recover the Public Folder Hierarchy & Public Folders
After watching this video, you will be able to recover the public folder hierarchy and public folders.
-
Exchange 2016: Using the EMS to Manage Folder Permissions (Part 2)
After watching this video, you will be able to manage folder permissions with the EMS.
-
Exchange 2016: Configure Mailbox Permissions
After watching this video, you will be able to configure mailbox permissions.
-
Exchange 2016: Mailbox Permissions
After watching this video, you will be able to describe mailbox permissions.
-
Exchange 2016: Using the EMS to Manage Folder Permissions (Part 1)
After watching this video, you will be able to use the EMS to manage folder permissions.
-
Exchange 2016: Linked Mailboxes (Part 2)
After watching this video, you will be able to create and manage linked mailboxes.
-
Exchange 2016: Site Mailboxes
After watching this video, you will be able to define site mailboxes.
-
Exchange 2016: Manage Lagged Mailbox Database Copies
After watching this video, you will be able to manage lagged mailbox database copies.
-
Exchange 2016: Activate Lagged Mailbox Database Copies–Procedure 1
After watching this video, you will be able to describe procedure 1 of activate lagged mailbox database copies.
-
Exchange 2016: Set Up Room Mailbox Delegation
After watching this video, you will be able to set up room mailbox delegation.
-
Exchange 2016: Set Up Room Mailbox Delegation
After watching this video, you will be able to prepare room mailbox delegation.
-
Exchange 2016: Recipients in Exchange 2016
After watching this video, you will be able to describe recipients in Exchange 2016.
-
Exchange 2016: Configure Resource Mailboxes and Scheduling (Part 1)
After watching this video, you will be able to describe resource mailbox configuration and scheduling.
-
Exchange 2016: Configure DAG NIC Properties
After watching this video, you will be able to configure DAG NIC.
-
Exchange 2016: Collaboration within Exchange 2013
After watching this video, you will be able to define collaboration within Exchange 2013.
-
Exchange 2016: AutoReseed
After watching this video, you will be able to describe autoreseed.
-
Exchange 2016: Linked Mailboxes (Part 1)
After watching this video, you will be able to identify the operation of linked mailboxes.
-
Exchange 2016: Distribution Groups (Part 2)
After watching this video, you will be able to create and manage distribution groups.
-
Exchange 2016: Distribution Group Naming Policy
After watching this video, you will be able to describe distribution group naming policy.
-
Exchange 2016: Configure Resource Mailboxes and Scheduling (Part 2)
After watching this video, you will be able to configure resource mailboxes and scheduling.
-
Exchange 2016: Distribution Groups (Part 1)
After watching this video, you will be able to identify distribution groups.
-
Exchange 2016: Mobile Device Access Policies
After watching this video, you will be able to identify mobile device access policies.
-
Exchange 2016: Deploy Mobile OOTW and Configure OWA Policy
After watching this video, you will be able to deploy mobile OOTW and configure OWA policy.
-
Exchange 2016: Applying and Disassociating OWA Policy Using the EAC
After watching this video, you will be able to apply and disassociate OWA policy using the EAC.
-
Exchange 2016: Plan for Certificates
After watching this video, you will be able to plan for certificates.
-
Exchange 2016: Using the EMS to Configure Authentication
After watching this video, you will be able to use the EMS to configure authentication.
-
Exchange 2016: Configuring the Outlook Web Application (OWA) URLs
After watching this video, you will be able to configure outlook web application (OWA) URLs.
-
Exchange 2016: Examples Configuration Script
After watching this video, you will be able to describe configuration script.
-
Exchange 2016: CAS Configuration and Management Tasks
After watching this video, you will be able to describe CAS configuration and management tasks.
-
Exchange 2016: Configure Office Online Server (OOS)
After watching this video, you will be able to configure office online server (OOS).
-
Exchange 2016: Outlook Connectivity to the Exchange 2016 Solution
After watching this video, you will be able to describe outlook connectivity to the Exchange 2016 solution.
-
Exchange 2016: Autodiscover Service Operation
After watching this video, you will be able to define autodiscover service operation.
-
Exchange 2016: Client Communication Process (Part 2)
After watching this video, you will be able to use client communication process.
-
Exchange 2016: Virtual Directories (Part 2)
After watching this video, you will be able to implement virtual directories.
-
Exchange 2016: Client Communication Process (Part 1)
After watching this video, you will be able to define client communication process.
-
CompTIA A+ 220-902: Wireless Connectivity Issues
After watching this video, you will be able to diagnose and repair wireless connectivity issues in mobile devices.
-
CompTIA A+ 220-902: Mobile Display Issues
After watching this video, you will be able to diagnose and repair display issues in mobile devices.
-
CompTIA A+ 220-902: Security Soft Skills
After watching this video, you will be able to recognize soft skills that you can apply in your company to help secure your computers.
-
CompTIA A+ 220-902: List CompTIA's Troubleshooting Steps
After watching this video, you will be able to list the six steps of the CompTIA Troubleshooting model.
-
CompTIA A+ 220-902: Application Issues
After watching this video, you will be able to diagnose and repair application issues in mobile devices.
-
Exchange 2016: Configure URLs (Part 1)
After watching this video, you will be able to configure URLs.
-
Exchange 2016: Configure URLs (Part 2)
After watching this video, you will be able to define URL configuration.
-
Exchange 2016: Design Namespaces for Client Connectivity
After watching this video, you will be able to describe design namespaces for client connectivity.
-
CompTIA A+ 220-902: Physical Security Precautions
After watching this video, you will be able to identify precautions that you can take to help secure your computer.
-
CompTIA A+ 220-902: Dealing with Malware
After watching this video, you will be able to cleanse your computer of malware.
-
CompTIA A+ 220-902: Troubleshooting Startup Errors
After watching this video, you will be able to identify types of startup errors that you might encounter, and the tools you can use to diagnose them.
-
Exchange 2016: Configure the Scope of an RBAC Group
After watching this video, you will be able to configure the scope of an RBAC group.
-
Exchange 2016: Create a Distribution Group
After watching this video, you will be able to create a distribution group.
-
Exchange 2016: Plan and Configure IRM for eDiscovery
After watching this video, you will be able to plan and configure IRM for eDiscovery.
-
Exchange 2016: Troubleshoot Failed IRM Protection
After watching this video, you will be able to troubleshoot failed IRM protection.
-
Exchange 2016: Configure Transport Decryption
After watching this video, you will be able to configure transport decryption.
-
Exchange 2016: Configure Journal Decryption
After watching this video, you will be able to configure journal decryption.
-
Exchange 2016: Plan and Create Transport Protection Rules
After watching this video, you will be able to plan and create transport protection rules.
-
Exchange 2016: Plan and Create Outlook Protection Rules (EMS Only)
After watching this video, you will be able to plan and create Outlook protection rules (EMS only).
-
Exchange 2016: Differences between Legacy CAS and Exchange CAS
After watching this video, you will be able to describe the differences between legacy CAS and Exchange CAS.
-
CompTIA A+ 220-902: Troubleshooting Methodology
After watching this video, you will be able to follow the proper troubleshooting procedure to determine the issues with a computer.
-
CompTIA A+ 220-902: Resolving a Problem
After watching this video, you will be able to follow proper troubleshooting procedure to resolve a problem with a computer.
-
CompTIA A+ 220-902: Workstation Security
After watching this video, you will be able to configure your workstations to be more secure.
-
CompTIA A+ 220-902: Share NTFS Files
After watching this video, you will be able to configure a file with NTFS file permissions, and share it on the network.
-
CompTIA A+ 220-902: OS Troubleshooting Tools
After watching this video, you will be able to perform basic operating system troubleshooting strategies.
-
CompTIA A+ 220-902: OS Errors
After watching this video, you will be able to identify various types of operating system errors that you might encounter.
-
CompTIA A+ 220-902: Disk Troubleshooting Tools
After watching this video, you will be able to perform basic disk troubleshooting strategies.
-
CompTIA A+ 220-902: Software Troubleshooting Tools
After watching this video, you will be able to perform basic software troubleshooting strategies.
-
Exchange 2016: Interaction between CAS and Mailbox Services
After watching this video, you will be able to describe the interaction between CAS and mailbox services.
-
Exchange 2016: Virtual Directories (Part 1)
After watching this video, you will be able to define virtual directories.
-
CompTIA A+ 220-902: BitLocker
After watching this video, you will be able to distinguish between the different types of drive encryption and identify the features of each.
-
Fundamentals of DevOps: Behavior-driven Development
After watching this video, you will be able to describe how a behavior-driven Agile process can be achieved in a DevOps-structured business.
-
Fundamentals of DevOps: Feature-driven Development
After watching this video, you will be able to describe how a feature-driven Agile process can be achieved in a DevOps-structured business.
-
Fundamentals of DevOps: Test-driven Development
After watching this video, you will be able to describe how a test-driven Agile process can be achieved in a DevOps-structured business.
-
Fundamentals of DevOps: DevOps Governance
After watching this video, you will be able to describe common governance structures that can support a DevOps structure.
-
Fundamentals of DevOps: IT Asset Management
After watching this video, you will be able to describe optimal IT asset management processes that can support a DevOps structure.
-
Fundamentals of DevOps: Identify Development Methodologies
After watching this video, you will be able to identify the development methodologies for DevOps.
-
Fundamentals of DevOps: Information Technology Operations
After watching this video, you will be able to describe technology operations in a DevOps business structure.
-
Fundamentals of DevOps: Organizational Standardization
After watching this video, you will be able to describe how a DevOps structure influences the standards that an organization establishes.
-
Fundamentals of DevOps: Implementation Approaches
After watching this video, you will be able to describe the types of implementation approaches a DevOps-structured business can follow.
-
Fundamentals of DevOps: IT Service Management
After watching this video, you will be able to describe optimal IT service management processes that can support a DevOps structure.
-
Fundamentals of DevOps: Service or Help Desk
After watching this video, you will be able to describe best practices of a help desk service that can support a DevOps structure.
-
Fundamentals of DevOps: Waterfall Software Development
After watching this video, you will be able to describe how a DevOps-structured business reacts to traditional waterfall software development methodology.
-
Fundamentals of DevOps: Agile Software Development
After watching this video, you will be able to describe how a DevOps-structured business reacts to modern Agile software development methodology.
-
Fundamentals of DevOps: Rapid Application Software Development
After watching this video, you will be able to describe how a DevOps-structured business impacts a goal of rapid software development.
-
Fundamentals of DevOps: Prototyping Software Development
After watching this video, you will be able to describe how a DevOps-structured business impacts prototyping of software and applications.
-
Fundamentals of DevOps: Defect and Bug Tracking
After watching this video, you will be able to describe how a DevOps-structured business can effectively manage defects and bugs.
-
Fundamentals of DevOps: Backlog Management
After watching this video, you will be able to describe how a DevOps-structured business can effectively manage a backlog of work items.
-
Fundamentals of DevOps: Version Control System
After watching this video, you will be able to describe how a DevOps-structured business can effectively leverage a version control system.
-
Fundamentals of DevOps: Extreme Programming
After watching this video, you will be able to describe how a DevOps-structured business can manage the Extreme Agile software development approach.
-
Fundamentals of DevOps: Crystal Family Agile Methodologies
After watching this video, you will be able to describe how a DevOps-structured business can manage the Crystal family Agile software development approach.
-
Fundamentals of DevOps: Software Development Iterations
After watching this video, you will be able to describe how a DevOps-structured business can manage iterations of application delivery.
-
Fundamentals of DevOps: Development Scrums
After watching this video, you will be able to describe how a DevOps-structured business can manage the development Scrums of an Agile framework.
-
Fundamentals of DevOps: DevOps Overview
After watching this video, you will be able to describe the purpose of a DevOps organizational structure.
-
Fundamentals of DevOps: Business of Software Development
After watching this video, you will be able to describe how DevOps can fundamentally define an organization that’s primary purpose is software development.
-
Fundamentals of DevOps: Object-oriented Software Development
After watching this video, you will be able to describe the key aspects of object-oriented software development leveraging a DevOps structure.
-
Fundamentals of DevOps: Software Development
After watching this video, you will be able to describe the key aspects of software development in a DevOps structure.
-
Fundamentals of DevOps: Infrastructure Operations
After watching this video, you will be able to describe the key aspects of operations in a DevOps structure.
-
Fundamentals of DevOps: Deployment Approaches
After watching this video, you will be able to describe the types of deployment approaches a DevOps-structured business can follow.
-
Fundamentals of DevOps: Software Distribution
After watching this video, you will be able to describe the types of deployment approaches a DevOps-structured business can follow.
-
Fundamentals of DevOps: Process or Job Scheduling
After watching this video, you will be able to describe how processes and scheduling are optimized leveraging a DevOps structure.
-
Fundamentals of DevOps: Information Technology Auditing
After watching this video, you will be able to describe how information technology auditing are optimized leveraging a DevOps structure.
-
Fundamentals of DevOps: Malware Scanning
After watching this video, you will be able to describe malware scanning processes from a DevOps perspective.
-
Fundamentals of DevOps: Database Administration
After watching this video, you will be able to describe how the skillsets of database administrators compliment a DevOps structure.
-
Fundamentals of DevOps: Installation and Removal
After watching this video, you will be able to describe application life cycle management from a DevOps perspective.
-
CompTIA A+ 220-902: Discarding Drives
After watching this video, you will be able to identify the best practices for ensuring thorough data destruction and drive disposal.
-
CompTIA A+ 220-902: SOHO Wireless Security
After watching this video, you will be able to identify the best ways to secure your SOHO wireless network.
-
CompTIA A+ 220-902: Mobile Device Security
After watching this video, you will be able to configure your mobile devices to be more secure.
-
Exchange 2016: Using the Exchange Recover Server Option
After watching this video, you will be able to Using the Exchange Recover Server Option.
-
Exchange 2016: Search Audit Logs
After watching this video, you will be able to prepare search audit logs.
-
Exchange 2016: Configure MX Record Resilience
After watching this video, you will be able to configure MX record resilience.
-
Exchange 2016: Configure a Transport Rule
After watching this video, you will be able to configure transport rules.
-
Exchange 2016: Configure DAG NIC Properties
After watching this video, you will be able to Configure DAG NIC Properties.
-
Exchange 2016: Apply OWA Mailbox Policies
After watching this video, you will be able to apply OWA mailbox policies.
-
Exchange 2016: Steps to Remove 2010
After watching this video, you will be able to identify the steps to remove 2010.
-
Exchange 2016: Decommission UM
After watching this video, you will be able to decommission UM.
-
Exchange 2016: Certificate Requirements
After watching this video, you will be able to describe the certificate requirements for the Microsoft Federation Gateway Servers.
-
Exchange 2016: Namespace Models Practical
After watching this video, you will be able to implement namespace models.
-
PowerShell Essentials: Examining System Configuration Prior to DSC
After watching this video, you will be able to describe how to examine a system's configuration before DSC.
-
PowerShell Essentials: Identifying Requirements for DSC
After watching this video, you will be able to describe how to prepare a system environment for DSC.
-
PowerShell Essentials: Using Dot Sourcing
After watching this video, you will be able to use dot sourcing.
-
PowerShell Essentials: What is Desired State Configuration?
After watching this video, you will be able to describe Desired State Configuration (DSC).
-
PowerShell Essentials: Installing the DSC Feature in Windows Server 2016
After watching this video, you will be able to demonstrate how to install the DSC feature in Windows Server 2016.
-
PowerShell Essentials: Examining and Deploying an MOF File
After watching this video, you will be able to describe how to examine and deploy an MOF file.
-
PowerShell Essentials: Creating an MOF Using a DSC Script
After watching this video, you will be able to describe how to create an MOF using a DSC script.
-
PowerShell Essentials: Working with Distributed Dependencies
After watching this video, you will be able to describe how to work with distributed dependencies.
-
PowerShell Essentials: Logging with DSC
After watching this video, you will be able to describe how to log with DSC.
-
PowerShell Essentials: Examining DSC Resources
After watching this video, you will be able to describe how to examine DSC resources.
-
PowerShell Essentials: Working with Local Dependencies
After watching this video, you will be able to describe how to work with local dependencies.
-
PowerShell Essentials: Using Show-Command
After watching this video, you will be able to demonstrate how to use the Show-Command cmdlet in PowerShell.
-
PowerShell Essentials: Accessing the Help Cmdlet
After watching this video, you will be able to access help with the Help cmdlet.
-
PowerShell Essentials: Scripting Best Practices
After watching this video, you will be able to describe scripting best practices.
-
PowerShell Essentials: Tab Completion
After watching this video, you will be able to demonstrate how tab completion in PowerShell works.
-
PowerShell Essentials: Using ShowWindow with Help
After watching this video, you will be able to use ShowWindow with Help.
-
PowerShell Essentials: Using Parameter Lists
After watching this video, you will be able to recognize basic information in the Get-Help cmdlet.
-
PowerShell Essentials: Using-Full Option
After watching this video, you will be able to use the -full option in Windows PowerShell Help.
-
PowerShell Essentials: Using Line Breaks and Color Coding
After watching this video, you will be able to use line breaks and color coding.
-
PowerShell Essentials: Constructing a Windows PowerShell Query
After watching this video, you will be able to construct a PowerShell query.
-
PowerShell Essentials: Helpfile Tweaks
After watching this video, you will be able to access PowerShell Help commands and earlier versions of PowerShell.
-
PowerShell Essentials: Building Queries with Select and Where
After watching this video, you will be able to build queries with select and where.
-
PowerShell Essentials: Environment Variables
After watching this video, you will be able to use environment variables in PowerShell.
-
PowerShell Essentials: Under the Hood in PowerShell
After watching this video, you will be able to describe various aspects of the inner workings of PowerShell.
-
PowerShell Essentials: Fonts and Colors
After watching this video, you will be able to use fonts and colors in PowerShell.
-
PowerShell Essentials: Command History and Pop-ups
After watching this video, you will be able to utilize command history and pop-ups in PowerShell.
-
PowerShell Essentials: Debugging Techniques in Writing DSC Resources
After watching this video, you will be able to demonstrate basic debugging techniques in writing DSC resources.
-
PowerShell Essentials: Examining a Custom Resource
After watching this video, you will be able to demonstrate how to examine a custom resource.
-
PowerShell Essentials: Examining the DSC Resource Set Command
After watching this video, you will be able to describe usage of the DSC resource Set command.
-
PowerShell Essentials: Using the DSC Resource Designer
After watching this video, you will be able to demonstrate how to use the DSC Resource Designer.
-
PowerShell Essentials: DSC Resource Parameters
After watching this video, you will be able to demonstrate how to use the DSC Resource parameters.
-
PowerShell Essentials: Examining the DSC Resource Test Command
After watching this video, you will be able to describe usage of the DSC resource Test command.
-
PowerShell Essentials: Examining the DSC Resource Get Command
After watching this video, you will be able to describe usage of the DSC resource Get command.
-
PowerShell Essentials: Deploying Custom Resources with an SMB Pull Server
After watching this video, you will be able to demonstrate how to deploy custom resources with an SMB pull server.
-
PowerShell Essentials: Deploying Custom Resources with an HTTP Pull Server
After watching this video, you will be able to demonstrate how to deploy custom resources with an HTTP pull server.
-
PowerShell Essentials: Updating an Existing DSC Resource
After watching this video, you will be able to demonstrate how to update an existing DSC resource.
-
PowerShell Essentials: Deploying Custom Resources in Push Mode
After watching this video, you will be able to demonstrate how to deploy custom resources in push mode.
-
PowerShell Essentials: Understanding Resource Idempotency
After watching this video, you will be able to describe DSC resource idempotency.
-
PowerShell Essentials: Configuring Multiple Servers and Role Types
After watching this video, you will be able to demonstrate how to configure multiple servers and role types.
-
PowerShell Essentials: Creating an HTTPS Compliance Server
After watching this video, you will be able to demonstrate how to configure an HTTPS compliance server.
-
PowerShell Essentials: Dealing with Parameters
After watching this video, you will be able to describe the facets of working with parameters.
-
PowerShell Essentials: Dealing with Credentials
After watching this video, you will be able to describe how to work with plain text credentials to connect to remote nodes.
-
PowerShell Essentials: Using Encrypted Credentials
After watching this video, you will be able to demonstrate how to use encrypted credentials to connect to remote nodes.
-
PowerShell Essentials: Configuring Similar Sets of Servers
After watching this video, you will be able to demonstrate how to configure similar sets of servers.
-
PowerShell Essentials: Connecting Network Resources
After watching this video, you will be able to demonstrate how to connect to various network resources.
-
PowerShell Essentials: Understanding DSC Resource Types and Structures
After watching this video, you will be able to describe DSC resource types and structures.
-
PowerShell Essentials: Creating a Simple Composite Resource
After watching this video, you will be able to describe how to create a simple composite resource.
-
PowerShell Essentials: Understanding PowersShell Repositories
After watching this video, you will be able to describe the features of PowerShell repositories.
-
PowerShell Essentials: Work with Remote Systems
After watching this video, you will be able to demonstrate how to work with configurations, repositories, and DSC.
-
PowerShell Essentials: Configuring the LCM in Push Mode
After watching this video, you will be able to describe how to configure the LCM in push mode.
-
PowerShell Essentials: Querying Node Status
After watching this video, you will be able to demonstrate how to query node status.
-
PowerShell Essentials: Finding, Retrieving, and Using New Resources
After watching this video, you will be able to describe how to find, retrieve, and use new resources.
-
PowerShell Essentials: Working with the Local Configuration Manager(LCM)
After watching this video, you will be able to work with the local configuration manager (LCM).
-
PowerShell Essentials: Configuring the LCM in Pull Mode
After watching this video, you will be able to demonstrate how to configure the LCM in pull mode.
-
PowerShell Essentials: Creating an SMB Pull Server
After watching this video, you will be able to describe how to create an SMB pull server.
-
PowerShell Essentials: Pull and Push Configuration Modes
After watching this video, you will be able to describe pull and push configuration modes.
-
PowerShell Essentials: Securing an HTTP Pull Server
After watching this video, you will be able to describe how to secure an HTTP pull server.
-
PowerShell Essentials: Deploy Resources to Clients via an SMB Pull Server
After watching this video, you will be able to describe how to deploy resources to clients via a pull server.
-
PowerShell Essentials: Creating an HTTP Pull Server
After watching this video, you will be able to describe how to create an HTTP pull server.
-
PowerShell Essentials: Configuring Clients to Connect to a Pull Server
After watching this video, you will be able to demonstrate how to configure clients to connect to a pull server.
-
PowerShell Essentials: Windows Management Framework (WMF)
After watching this video, you will be able to describe the Windows Management Framework.
-
PowerShell Essentials: The Windows PowerShell ISE Interface
After watching this video, you will be able to navigate the Windows PowerShell Integrated Scripting Environment.
-
PowerShell Essentials: Using PowerShell cmdlets
After watching this video, you will be able to demonstrate basic PowerShell command usage.
-
PowerShell Essentials: Windows Commands
After watching this video, you will be able to describe basic Windows commands in PowerShell.
-
PowerShell Essentials: PowerShell Host Applications
After watching this video, you will be able to describe Windows PowerShell Host Applications.
-
PowerShell Essentials: Cmdlet Structure
After watching this video, you will be able to describe the cmdlet structure.
-
PowerShell Essentials: The Help System
After watching this video, you will be able to utilize the PowerShell help system.
-
PowerShell Essentials: Updating Help
After watching this video, you will be able to specify how to update help.
-
PowerShell Essentials: Basic PowerShell Commands
After watching this video, you will be able to describe basic PowerShell commands.
-
PowerShell Essentials: PowerShell Command History
After watching this video, you will be able to demonstrate how to use the PowerShell command history.
-
PowerShell Essentials: Running cmdlets in the ISE
After watching this video, you will be able to run cmdlets with the Windows PowerShell Integrated Scripting Environment.
-
PowerShell Essentials: Windows PowerShell vs. cmd.exe
After watching this video, you will be able to describe the differences between Windows PowerShell and the Windows command line.
-
PowerShell Essentials: Windows PowerShell Version History
After watching this video, you will be able to list the major version differences in Windows PowerShell.
-
PowerShell Essentials: What is PowerShell?
After watching this video, you will be able to describe PowerShell and its relationship with the .NET Framework.
-
PowerShell Essentials: The Importance of PowerShell
After watching this video, you will be able to recognize why learning PowerShell is important.
-
PowerShell Essentials: New Features in PowerShell 5.0
After watching this video, you will be able to provide an overview of new features in PowerShell 5.0.
-
PowerShell Essentials: PowerShell Best Practices
After watching this video, you will be able to describe best practices for working with Windows PowerShell.
-
PowerShell Essentials: Determining your Version of PowerShell
After watching this video, you will be able to determine the version of the Windows Management Framework and Windows PowerShell.
-
PowerShell Essentials: Installing PowerShell 5.1
After watching this video, you will be able to describe how to install the Windows Management Framework and PowerShell 5.1.
-
PowerShell Essentials: Working with Trusted Hosts
After watching this video, you will be able to describe how to work with trusted hosts.
-
PowerShell Essentials: Considerations and Common Mistakes
After watching this video, you will be able to describe the various considerations and common remoting mistakes with PowerShell.
-
PowerShell Essentials: Invoke-command and One-to-many Remoting
After watching this video, you will be able to demonstrate basic usage of invoke-command and one-to-many remoting.
-
PowerShell Essentials: Scripting Considerations
After watching this video, you will be able to describe scripting considerations with one-to-many remoting.
-
PowerShell Essentials: Understanding Output Formatting
After watching this video, you will be able to describe output formatting.
-
PowerShell Essentials: Enabling Windows PowerShell Remoting
After watching this video, you will be able to describe how to enable PowerShell remoting.
-
PowerShell Essentials: Understanding One-to-many Remoting
After watching this video, you will be able to describe the features of one-to-many remoting.
-
PowerShell Essentials: Serial Vs. Parallel Remoting
After watching this video, you will be able to describe the difference between serial and parallel remoting.
-
PowerShell Essentials: Understanding One-to-one Remoting
After watching this video, you will be able to describe one-to-one remoting.
-
PowerShell Essentials: Using One-to-one Remoting
After watching this video, you will be able to demonstrate how to perform one-to-one remoting.
-
PowerShell Essentials: DOT Syntax and the PowerShell ISE
After watching this video, you will be able to describe the PowerShell ISE, DOT syntax, color hinting, and IntelliSense.
-
PowerShell Essentials: Sorting Pipeline Output
After watching this video, you will be able to demonstrate how to sort pipeline output.
-
PowerShell Essentials: Working with the Command Pipeline
After watching this video, you will be able to demonstrate how to work with the command pipeline.
-
PowerShell Essentials: Manipulating the Command Pipeline
After watching this video, you will be able to demonstrate how to manipulate the command pipeline.
-
PowerShell Essentials: Understanding Remoting Architecture
After watching this video, you will be able to describe remoting architecture and its uses.
-
PowerShell Essentials: PowerShell Remoting Architecture
After watching this video, you will be able to describe basic functionality of remoting architecture.
-
PowerShell Essentials: Modifying Object Members Programmatically
After watching this video, you will be able to demonstrate how to modify object members programmatically.
-
PowerShell Essentials: Work with Aliases and Providers
After watching this video, you will be able to demonstrate how to work with aliases, providers, and the pipeline.
-
PowerShell Essentials: Discovering Object Members
After watching this video, you will be able to describe object members.
-
PowerShell Essentials: Working with Object Members
After watching this video, you will be able to demonstrate how to work with object members.
-
PowerShell Essentials: Discovering Providers
After watching this video, you will be able to demonstrate how to use providers.
-
PowerShell Essentials: Accessing Providers
After watching this video, you will be able to demonstrate how to access providers.
-
PowerShell Essentials: Saving Your Custom Aliases
After watching this video, you will be able to describe how to save custom aliases.
-
PowerShell Essentials: What are Providers?
After watching this video, you will be able to describe the purpose of providers.
-
PowerShell Essentials: What is the Pipeline?
After watching this video, you will be able to describe the purpose of pipelines.
-
PowerShell Essentials: Working with the Registry
After watching this video, you will be able to demonstrate how to work with the Windows registry.
-
PowerShell Essentials: Manipulating the Registry
After watching this video, you will be able to demonstrate how to manipulate registry values with PowerShell.
-
PowerShell Essentials: Working with Aliases
After watching this video, you will be able to demonstrate how to create aliases.
-
PowerShell Essentials: Creating Aliases
After watching this video, you will be able to describe how to work with aliases.
-
PowerShell Essentials: Displaying and Creating Aliases
After watching this video, you will be able to describe how to display and create aliases.
-
PowerShell Essentials: Use PowerShell
After watching this video, you will be able to demonstrate how to use PowerShell.
-
PowerShell Essentials: Understanding PowerShell Help File Syntax
After watching this video, you will be able to describe PowerShell help file syntax.
-
PowerShell Essentials: Comparison Operators
After watching this video, you will be able to demonstrate how to work with PowerShell comparison operators.
-
PowerShell Essentials: Working with Modules
After watching this video, you will be able to demonstrate how to work with Windows modules in PowerShell.
-
PowerShell Essentials: Help Syntax
After watching this video, you will be able to provide an overview of the features of help.
-
PowerShell Essentials: Switch Statements
After watching this video, you will be able to demonstrate how to use switch statements.
-
PowerShell Essentials: What is an Alias?
After watching this video, you will be able to describe aliases and how they're used.
-
PowerShell Essentials: Using Where-Object
After watching this video, you will be able to demonstrate how to use where-object.
-
PowerShell Essentials: If, Else, and Elseif Statements
After watching this video, you will be able to demonstrate how to use if, else, and elseif statements.
-
PowerShell Essentials: Understanding PowerShell cmdlets
After watching this video, you will be able to describe PowerShell cmdlets and how they differ from Windows commands.
-
PowerShell Essentials: Using Get
After watching this video, you will be able to demonstrate how to use Get.
-
PowerShell Essentials: Work with Formatting and Modules
After watching this video, you will be able to demonstrate the various uses of PowerShell formatting, remoting, and modules.
-
PowerShell Essentials: Configuring and Customizing PowerShell
After watching this video, you will be able to configure and customize PowerShell.
-
PowerShell Essentials: Listing Module Dependencies
After watching this video, you will be able to demonstrate how to list module dependencies.
-
PowerShell Essentials: Creating and Running a PowerShell Startup Script
After watching this video, you will be able to demonstrate how to create and run a basic PowerShell startup script.
-
PowerShell Essentials: Beginning to Format Windows PowerShell Output
After watching this video, you will be able to demonstrate basic PowerShell output formatting.
-
PowerShell Essentials: Parameter Binding
After watching this video, you will be able to demonstrate how to work with parameter binding in PowerShell.
-
PowerShell Essentials: Sending Command Output
After watching this video, you will be able to demonstrate how to send command output.
-
PowerShell Essentials: Sending Command Output to HTML
After watching this video, you will be able to demonstrate how to send command output to HTML.
-
PowerShell Essentials: Pipeline Data
After watching this video, you will be able to demonstrate how to work with pipeline data.
-
PowerShell Essentials: Differentiating Between Snap-ins and Modules
After watching this video, you will be able to compare the differences between snap-ins and modules.
-
PowerShell Essentials: Debugging Techniques in Consuming DSC Resources
After watching this video, you will be able to demonstrate basic debugging techniques in consuming DSC resources.
-
CompTIA A+ 220-901: Mobile Device Extras
After watching this video, you will be able to list mobile device spare batteries, protective cases, external credit card readers, and memory
-
CompTIA A+ 220-901: Troubleshooting Projector Display Issues
After watching this video, you will be able to troubleshoot projector display issues.
-
CompTIA A+ 220-901: Troubleshooting PC Display Issues
After watching this video, you will be able to troubleshoot PC display issues.
-
CompTIA A+ 220-901: Troubleshooting Tools for Hard Drives and RAID
After watching this video, you will be able to describe the troubleshooting tools for hard drives and RAID arrays.
-
CompTIA A+ 220-901: Troubleshooting RAID Arrays
After watching this video, you will be able to list RAID array failure solutions.
-
CompTIA A+ 220-901: Troubleshooting Hard Drive Failures
After watching this video, you will be able to compare hard drive failure solutions.
-
CompTIA A+ 220-901: PC Troubleshooting Tools
After watching this video, you will be able to distinguish the various PC troubleshooting tools.
-
CompTIA A+ 220-901: Power and PC Crashes
After watching this video, you will be able to list the various issues with system failures.
-
CompTIA A+ 220-901: Booting Sequence PC Issues
After watching this video, you will be able to compare the various booting issues.
-
CompTIA A+ 220-901: Mobile Device Accessories
After watching this video, you will be able to compare mobile device accessories
-
CompTIA A+ 220-901: Mobile Connectivity
After watching this video, you will be able to disseminate mobile device connectivity
-
CompTIA A+ 220-901: Mobile Device Connection Types
After watching this video, you will be able to describe mobile device connection types
-
CompTIA A+ 220-901: Mobile Devices with GPS
After watching this video, you will be able to describe mobile devices with GPS
-
CompTIA A+ 220-901: Smart Camera
After watching this video, you will be able to describe a smart camera
-
CompTIA A+ 220-901: Wearable Technology
After watching this video, you will be able to list the various wearable technologies
-
CompTIA A+ 220-901: Smartphones
After watching this video, you will be able to compare various smartphones
-
CompTIA A+ 220-901: Tablets
After watching this video, you will be able to describe tablets
-
CompTIA A+ 220-901: Laptop Form Factor
After watching this video, you will be able to describe laptop form factor.
-
CompTIA A+ 220-901: Laptop Screen Rotation Types
After watching this video, you will be able to compare the laptop screen rotation types.
-
CompTIA A+ 220-901: Laptop Docking Stations and Locks
After watching this video, you will be able to describe the laptop docking station and locks.
-
CompTIA A+ 220-901: Laptop Special Function Keys
After watching this video, you will be able to identify the laptop special function keys.
-
CompTIA A+ 220-901: Integrated Laptop Components
After watching this video, you will be able to describe laptop display integrated components.
-
CompTIA A+ 220-901: Laptop Display Types
After watching this video, you will be able to describe laptop display types.
-
CompTIA A+ 220-901: Laptop Peripherals
After watching this video, you will be able to recognize laptop peripherals.
-
CompTIA A+ 220-901: Laptop Components
After watching this video, you will be able to describe laptop components.
-
CompTIA A+ 220-901: Laptop Hardware
After watching this video, you will be able to compare laptop hardware.
-
CompTIA A+ 220-901: Laptop Ports
After watching this video, you will be able to describe laptop ports.
-
CompTIA A+ 220-901: Laptop Expansion Slots
After watching this video, you will be able to identify laptop expansion slots.
-
CompTIA A+ 220-901: Internet Connections Cellular
After watching this video, you will be able to compare Internet connection types.
-
CompTIA A+ 220-901: ISDN Internet Connections
After watching this video, you will be able to describe ISDN Internet connection types.
-
CompTIA A+ 220-901: Fiber and Satellite Internet Connections
After watching this video, you will be able to describe fiber and satellite Internet connection types.
-
CompTIA A+ 220-901: Modem and Firewall
After watching this video, you will be able to list characteristics of a modem and a firewall.
-
CompTIA A+ 220-901: Network Devices for Routers
After watching this video, you will be able to describe network devices for external connectivity.
-
Securing Windows Server 2016: Describe Installation and Configuration
After watching this video, you will be able to describe installation methods and configuration.
-
PowerShell Essentials: Documenting DSC Resources
After watching this video, you will be able to describe how to document DSC resources.
-
CompTIA A+ 220-901: Network Devices for a LAN
After watching this video, you will be able to describe network devices for the LAN.
-
CompTIA A+ 220-901: LAN, WAN, PAN, and MAN Network Types
After watching this video, you will be able to compare network types.
-
CompTIA A+ 220-901: Internet Connection Cable, DSL, and Dial-up
After watching this video, you will be able to compare Internet connection types.
-
CompTIA A+ 220-901: SOHO Wired Routers
After watching this video, you will be able to describe SOHO wired routers.
-
CompTIA A+ 220-901: SOHO Wireless Routers
After watching this video, you will be able to describe SOHO wireless routers.
-
CompTIA A+ 220-901: Wi-Fi Encryption Types
After watching this video, you will be able to describe Wi-Fi encryption types.
-
CompTIA A+ 220-901: Wi-Fi Standards 802.11
After watching this video, you will be able to list the various Wi-Fi standards.
-
CompTIA A+ 220-901: Networking Tools
After watching this video, you will be able to contrast the various networking tools.
-
CompTIA A+ 220-901: TCP vs. UDP
After watching this video, you will be able to compare TCP and UDP.
-
CompTIA A+ 220-901: TCP/IP Protocol Support
After watching this video, you will be able to list various protocols using TCP/IP.
-
CompTIA A+ 220-901: TCP and UDP Ports
After watching this video, you will be able to list TCP and UDP ports.
-
CompTIA A+ 220-901: TCP/IP Protocol
After watching this video, you will be able to recognize the TCP/IP protocol.
-
CompTIA A+ 220-901: Coaxial Cable
After watching this video, you will be able to compare coaxial cable types and connectors.
-
CompTIA A+ 220-901: Cable Characteristics Twisted Pair
After watching this video, you will be able to distinguish twisted pair cable and connectors.
-
CompTIA A+ 220-901: Fiber Cable
After watching this video, you will be able to compare fiber cable characteristics and connectors.
-
CompTIA A+ 220-901: Printer Maintenance for Thermal and Impact Printers
After watching this video, you will be able to recognize common techniques used for maintaining impact and thermal printers.
-
CompTIA A+ 220-901: Troubleshooting Printer Drivers
After watching this video, you will be able to troubleshoot printer drivers.
-
CompTIA A+ 220-901: Troubleshooting Print Queues
After watching this video, you will be able to troubleshoot print queue issues.
-
CompTIA A+ 220-901: Paper Jams
After watching this video, you will be able to troubleshoot paper jams.
-
CompTIA A+ 220-901: Printer Streaking, Fading, and Ghost Images
After watching this video, you will be able to troubleshoot printer streaking, fading, and ghosting.
-
CompTIA A+ 220-901: Proper Repair Procedures
After watching this video, you will be able to list proper repair procedures.
-
CompTIA A+ 220-901: Troubleshooting Mobile Device Software Issues
After watching this video, you will be able to troubleshoot mobile device software issues.
-
CompTIA A+ 220-901: Troubleshooting Mobile Device Issues
After watching this video, you will be able to troubleshoot mobile device issues.
-
CompTIA A+ 220-901: Command Line Network Troubleshooting Tools
After watching this video, you will be able to list command line network troubleshooting tools.
-
CompTIA A+ 220-901: Command Line Ping, TRACERT, and IPCONFIG
After watching this video, you will be able to describe command line troubleshooting tools.
-
CompTIA A+ 220-901: Network Troubleshooting Tools
After watching this video, you will be able to compare network troubleshooting tools.
-
CompTIA A+ 220-901: Troubleshooting Wired Networks
After watching this video, you will be able to troubleshoot wired networks.
-
CompTIA A+ 220-901: Troubleshooting Wireless Networks
After watching this video, you will be able to troubleshoot wireless networks.
-
System Center: Use Virtual Machine Manager
After watching this video, you will be able to configure and manage virtual machines and virtual networks.
-
System Center: Virtual Machine Dynamic and Power Optimization
After watching this video, you will be able to enable dynamic and power optimization.
-
System Center: Manage Virtual Machine Network Settings
After watching this video, you will be able to configure a virtual network adapter to connect to a VM network.
-
System Center: Virtual Machine Networks
After watching this video, you will be able to create and configure VM networks.
-
System Center: Logical Networks
After watching this video, you will be able to create and configure a logical network in VMM.
-
System Center: Store Virtual Machines
After watching this video, you will be able to store a virtual machine in the VMM library.
-
System Center: Virtual Machine Cloning
After watching this video, you will be able to create and deploy virtual machines by cloning.
-
System Center: Virtual Machines from a Existing Virtual Hard Disk
After watching this video, you will be able to create and deploy virtual machines from an existing virtual hard disk (VHD).
-
System Center: Virtual Machines from a Blank Virtual Hard Disk
After watching this video, you will be able to create and deploy virtual machines from a blank virtual hard disk (VHD).
-
System Center: Virtual Machine Manager Features
After watching this video, you will be able to describe provisioning methods and features for Virtual Machine Manager.
-
System Center: Install and Configure VMM
After watching this video, you will be able to install and configure VMM and the VMM library.
-
System Center: Add Virtual Machine Templates to the VMM Library
After watching this video, you will be able to create and manage virtual machine templates.
-
System Center: Add Profiles to the VMM Library
After watching this video, you will be able to create and add profiles to the VMM library.
-
System Center: Add File-based Resources to the VMM Library
After watching this video, you will be able to add file-based resources to the VMM library.
-
System Center: Overview of the VMM Library
After watching this video, you will be able to describe the Virtual Machine Manager library.
-
System Center: Back Up the VMM Database
After watching this video, you will be able to back up the Virtual Machine Manager configuration.
-
System Center: Upgrade to Virtual Machine Manager 2016
After watching this video, you will be able to upgrade to Virtual Machine Manager 2016.
-
System Center: VMM High Availability Mode
After watching this video, you will be able to deploy Virtual Machine Manager in high availability mode.
-
System Center: Virtual Machine Manager Console
After watching this video, you will be able to install Virtual Machine Manager console.
-
System Center: Virtual Machine Manager Installation
After watching this video, you will be able to install Virtual Machine Manager.
-
System Center: Virtual Machine Manager System Requirements
After watching this video, you will be able to describe Virtual Machine Manager system requirements.
-
System Center: What's New in Virtual Machine Manager
After watching this video, you will be able to describe what's new in Virtual Machine Manager 2016.
-
System Center: What is Virtual Machine Manager?
After watching this video, you will be able to describe what Virtual Machine Manager is.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Connect Health
After watching this video, you will be able to design for Connect Health.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Integrating Active Directory
After watching this video, you will be able to provide a scenario of Active Directory integration.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Designing Azure AD Identities
After watching this video, you will be able to design Azure AD Identities.
-
Windows 10: Planning For and Managing Devices in the Enterprise: User Self-service
After watching this video, you will be able to perform user self-service from the Azure Access Panel.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Azure Multi-factor Authentication
After watching this video, you will be able to apply Azure Multi-factor Authentication.
-
PowerShell Essentials: Writing DSC Resources Using PowerShell Classes
After watching this video, you will be able to describe how to write DSC resources using PowerShell classes.
-
PowerShell Essentials: Handling Machine Reboots
After watching this video, you will be able to describe how to handle machine reboots.
-
PowerShell Essentials: Unit Testing DSC Resources
After watching this video, you will be able to demonstrate how to unit test DSC resources.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Self-service Group Management
After watching this video, you will be able to design the Self-service Group Management Azure AD premium feature.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Group-based Application Access
After watching this video, you will be able to design the Group-based Application Access Azure AD premium feature.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Password Reset with Writeback
After watching this video, you will be able to design a Password Reset with Write-Back Azure AD premium feature.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Advanced Security Reporting
After watching this video, you will be able to design the Advanced Security Reporting Azure AD premium feature.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Designing Single Sign-on
After watching this video, you will be able to design a single sign-on.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Azure AD Synchronization Services
After watching this video, you will be able to plan for Azure AD Synchronization Services.
-
Windows 10: Planning For and Managing Devices in the Enterprise: AD Synchronization Tools
After watching this video, you will be able to List Active Directory synchronization tools.
-
CompTIA A+ 220-901: Identify PCI Ports
After watching this video, you will be able to identify motherboard slots and ports.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Designing Cloud App Discovery
After watching this video, you will be able to design the Cloud App discovery Azure AD premium feature.
-
CompTIA A+ 220-901: Memory Types
After watching this video, you will be able to identify different types of memory.
-
CompTIA A+ 220-901: Power Supply Connections
After watching this video, you will be able to label power supply connectors.
-
CompTIA A+ 220-901: Cables and Connectors
After watching this video, you will be able to compare cables and connectors.
-
CompTIA A+ 220-901: Printer Error Messages
After watching this video, you will be able to describe different types of printer device error messages.
-
CompTIA A+ 220-901: Maintenance Kit for Printers
After watching this video, you will be able to identify the maintenance kit for printers.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Company Branding
After watching this video, you will be able to define company branding.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Azure AD Reporting
After watching this video, you will be able to design and list Azure AD reporting.
-
System Center: Configuring SMA Runbooks
After watching this video, you will be able to configure SMA runbook workers.
-
System Center: Service Management Automation (SMA) Runbooks
After watching this video, you will be able to describe PowerShell workflow runbooks.
-
System Center: Deploy Service Management Automation
After watching this video, you will be able to deploy SMA.
-
System Center: Register the Service Management Automation Endpoint
After watching this video, you will be able to register the Windows Azure Pack with the Service Management Automation web service.
-
System Center: Configure SMA Runbooks
After watching this video, you will be able to Configure SMA runbooks.
-
System Center: SMA Management Portal
After watching this video, you will be able to configure runbook settings with SMA management portal.
-
System Center: SMA Windows PowerShell
After watching this video, you will be able to configure runbook settings with Windows PowerShell.
-
System Center: Tracking SMA Runbooks
After watching this video, you will be able to track SMA runbook history.
-
System Center: Scheduling SMA Runbooks
After watching this video, you will be able to schedule SMA runbooks.
-
System Center: Publishing SMA Runbooks
After watching this video, you will be able to publish SMA runbooks.
-
System Center: What's New in Service Management Automation
After watching this video, you will be able to describe what's new in Service Management Automation.
-
System Center: Overview of Service Management Automation
After watching this video, you will be able to describe Service Management Automation.
-
System Center: Use the Self-Service Portal
After watching this video, you will be able to customize the Service Manager self service portal.
-
System Center: Configuring Windows Azure Pack Features
After watching this video, you will be able to configure the installation of the Windows Azure Pack.
-
System Center: Install the Windows Azure Pack
After watching this video, you will be able to install the Windows Azure Pack for Windows Server.
-
System Center: Upgrade to Service Management Automation 2016
After watching this video, you will be able to describe how to upgrade to Service Management Automation 2016.
-
System Center: Deploy the SMA Runbook Worker
After watching this video, you will be able to install the Service Management Automation runbook worker.
-
System Center: Deploy the SMA PowerShell Module
After watching this video, you will be able to install the Service Management Automation PowerShell module.
-
System Center: Deploy Service Management Automation
After watching this video, you will be able to configure SMA runbook workers.
-
System Center: Service Management Automation System Requirements
After watching this video, you will be able to describe Service Management Automation system requirements.
-
System Center: Types of Service Manager Deployment
After watching this video, you will be able to describe different deployment scenarios for Service Manager.
-
System Center: Plan for Service Manager Deployment
After watching this video, you will be able to list the requirements for Service Manager deployment.
-
System Center: Moving Service Manager Databases
After watching this video, you will be able to move the Service Manager database.
-
System Center: Deploying Service Manager from the Command Line
After watching this video, you will be able to deploy Service Manager from the command line.
-
System Center: Service Manager Encryption Key
After watching this video, you will be able to back up the Service Manager encryption key.
-
System Center: Customizing the Self-Service Portal
After watching this video, you will be able to load-balance Service Manager management servers.
-
System Center: Using the Service Manager Self-Service Portal
After watching this video, you will be able to deploy self-service portal for Service Manager.
-
System Center: Enabling Service Manager Reporting
After watching this video, you will be able to run the data warehouse registration wizard to enable Service Manager reporting.
-
System Center: Installing the Data Warehouse Management Server
After watching this video, you will be able to configure Service Manager in Windows PowerShell.
-
System Center: Installing the Service Manager Management Server
After watching this video, you will be able to install Service Manager on Virtual Machines.
-
System Center: Preparing for Service Manager Deployment
After watching this video, you will be able to prepare for Service Manager deployment.
-
System Center: Runbook Properties
After watching this video, you will be able to customize the behavior of a runbook.
-
System Center: Service Manager SQL Server Requirements
After watching this video, you will be able to list Service Manager SQL server requirements.
-
System Center: Service Manager Software Requirements
After watching this video, you will be able to list Service Manager software requirements.
-
System Center: Service Manager System Requirements
After watching this video, you will be able to list Service Manager system requirements.
-
System Center: Service Manager Parts
After watching this video, you will be able to describe the six major parts of Service Manager.
-
System Center: What's New in Service Manager
After watching this video, you will be able to describe what's new in Service Manager.
-
System Center: Overview of Service Manager
After watching this video, you will be able to describe System Center 2016 Service Manager.
-
System Center: Create a Runbook
After watching this video, you will be able to create a runbook.
-
System Center: Tracking Runbooks
After watching this video, you will be able to activate and deactivate the audit trail for runbooks.
-
System Center: Controlling Runbooks
After watching this video, you will be able to add a smart link condition to a runbook.
-
System Center: Logging and Event Notifications
After watching this video, you will be able to configure runbook logging and notification settings.
-
System Center: Data Protection Manager Data Storage
After watching this video, you will be able to store data backed up by Data Protection Manager.
-
System Center: Preparing an Environment for Data Protection Manager
After watching this video, you will be able to describe how to deploy Data Protection Manager.
-
System Center: Data Protection Manager Servers
After watching this video, you will be able to describe Data Protection Manager server deployment.
-
System Center: Data Protection Manager Backup
After watching this video, you will be able to describe what Data Protection Manager can back up.
-
System Center: How Does Data Protection Manager Work?
After watching this video, you will be able to describe how Data Protection Manager works.
-
System Center: What Is Data Protection Manager 2016?
After watching this video, you will be able to describe what Data Protection Manager is.
-
System Center: Run Prerequisite Checker
After watching this video, you will be able to run prerequisite checker for System Center Configuration Manager.
-
System Center: Removing or Uninstalling Configuration Manager Sites
After watching this video, you will be able to remove or uninstall System Center Configuration Manager sites.
-
System Center: Upgrading Configuration Manager Evaluation Version
After watching this video, you will be able to upgrade to System Center Configuration Manager evaluation version to a full installation.
-
System Center: Installing Configuration Manager Console
After watching this video, you will be able to install System Center Configuration Manager console.
-
System Center: Installing Configuration Manager Using Command Line
After watching this video, you will be able to install System Center Configuration Manager using command line.
-
System Center: Installing Configuration Manager Using Setup Wizard
After watching this video, you will be able to install System Center Configuration Manager using the setup wizard.
-
System Center: Configuration Manager Prerequisites for Installing
After watching this video, you will be able to list the prerequisites for installing System Center Configuration Manager sites.
-
System Center: Types of Configuration Manager Sites
After watching this video, you will be able to name the types of sites for System Center Configuration Manager.
-
System Center: Scheduling Runbooks
After watching this video, you will be able to configure runbook scheduling.
-
System Center: Creating and Testing Runbooks
After watching this video, you will be able to create and test a runbook.
-
System Center: Building Orchestrator Runbooks
After watching this video, you will be able to build a runbook.
-
System Center: Configuring Orchestrator Databases
After watching this video, you will be able to configure Orchestrator databases.
-
System Center: Migrating Orchestrator Environments
After watching this video, you will be able to enable migration of Orchestrator to a new environment.
-
System Center: Upgrading to Orchestrator 2016
After watching this video, you will be able to upgrade to Orchestrator 2016.
-
System Center: Use Runbooks in Orchestration Console
After watching this video, you will be able to start and stop runbooks in Orchestration console.
-
System Center: Designing an Orchestrator Runbook
After watching this video, you will be able to design a Orchestrator runbook.
-
System Center: Orchestrator System Requirements
After watching this video, you will be able to discuss Orchestrator hardware configurations.
-
System Center: Deploying Runbooks
After watching this video, you will be able to deploy a runbook and track changes.
-
System Center: Orchestrator Runbooks
After watching this video, you will be able to create an Orchestrator runbook.
-
System Center: Orchestrator Console
After watching this video, you will be able to work with the Orchestration console in a browser.
-
System Center: Installing Orchestrator
After watching this video, you will be able to install Orchestrator.
-
System Center: System Center of Orchestrator
After watching this video, you will be able to describe System Center 2016 Orchestrator.
-
System Center: Use Operations Manager Web Console
After watching this video, you will be able to use Operations Manager web console.
-
System Center: Installing Operations Manager Gateway Server
After watching this video, you will be able to install Operations Manager gateway server.
-
System Center: Installing Operations Manager Reporting Server
After watching this video, you will be able to install Operations Manager reporting server.
-
System Center: Installing Operations Manager ACS
After watching this video, you will be able to install Operations Manager audit collections services.
-
System Center: Installing Operations Manager Web Console
After watching this video, you will be able to install Operations Manager web console.
-
System Center: Installing Operations Manager Operations Console
After watching this video, you will be able to install Operations Manager operations console.
-
System Center: Installing Operations Manager Management Server
After watching this video, you will be able to install Operations Manager management server.
-
System Center: Plan for Disaster Recovery
After watching this video, you will be able to plan for disaster recovery in Operations Manager.
-
System Center: Operations Manager Agents
After watching this video, you will be able to describe Operations Manager agents.
-
System Center: Operations Manager Disaster Recovery
After watching this video, you will be able to describe Operations Manager disaster recovery.
-
System Center: Operations Manager Resource Pool
After watching this video, you will be able to describe Operations Manager resource pool.
-
System Center: Operations Manager SQL Server
After watching this video, you will be able to describe SQL Server requirements with Operations Manager.
-
System Center: Management Group Components for Operations Manager
After watching this video, you will be able to describe management group components.
-
System Center: Operations Manager for UNIX and Linux
After watching this video, you will be able to recognize the UNIX and Linux operation systems for Operations Manager.
-
System Center: Operations Manager System Requirements
After watching this video, you will be able to list Operations Manager system requirements.
-
System Center: What's New in Operations Manager
After watching this video, you will be able to describe what's new in Operations Manager.
-
System Center: What is Operations Manager?
After watching this video, you will be able to describe Operations Manager key concepts.
-
System Center: Monitor Data Protection Manager
After watching this video, you will be able to monitor Data Protection Manager.
-
System Center: Improving Data Protection Manager Performance
After watching this video, you will be able to optimize Data Protection Manager data replication and synchronization.
-
System Center: Generating Reports for Data Protection Manager
After watching this video, you will be able to generate Data Protection Manager reports.
-
System Center: Setting Up Logging for Data Protection Manager
After watching this video, you will be able to set up Data Protection Manager logging.
-
System Center: Data Protection Manager Monitoring
After watching this video, you will be able to monitor with the Data Protection Manager console.
-
System Center: Data Protection Manager Deduplication
After watching this video, you will be able to use dedup with Data Protection Manager.
-
System Center: Adding Data Protection Manager Storage
After watching this video, you will be able to add storage to Data Protection Manager.
-
System Center: Installing DPM Agents
After watching this video, you will be able to install the DPM agent on a target system.
-
System Center: Installing Data Protection Manager
After watching this video, you will be able to install Data Protection Manager.
-
System Center: Creating a SQL Server Database for DPM
After watching this video, you will be able to create a SQL server database for Data Protection Manager.
-
System Center: Data Protection Manager Prerequisites
After watching this video, you will be able to recognize the prerequisites before installing Data Protection Manager.
-
System Center: Store Data Backed up by DPM
After watching this video, you will be able to store data backed up by Data Protection Manager.
-
System Center: DPM Tape Library Compatibility Test Tool
After watching this video, you will be able to run the DPM compatibility tool.
-
CompTIA A+ 220-902: Windows 7
After watching this video, you will be able to list the key features of Windows 7.
-
CompTIA A+ 220-902: Windows Vista
After watching this video, you will be able to describe the key features of Windows Vista.
-
CompTIA A+ 220-902: History of Windows
After watching this video, you will be able to compare the differences between the available versions of Windows.
-
CompTIA A+ 220-902: Automate a Windows Installation
After watching this video, you will be able to perform an automated Windows installation by preparing an answer file.
-
CompTIA A+ 220-902: User State Migration Tool and Windows Easy Transfer
After watching this video, you will be able to perform user migration using both the User State Migration Tool (USMT) and Windows Easy Transfer (WET).
-
CompTIA A+ 220-902: Upgrade Options
After watching this video, you will be able to perform an upgrade from one version of Windows to another.
-
CompTIA A+ 220-902: Answer Files
After watching this video, you will be able to prepare an answer file for an unattended installation.
-
CompTIA A+ 220-902: Installation Requirements
After watching this video, you will be able to identify the considerations and hardware required to perform a Windows installation.
-
CompTIA A+ 220-902: Windows 10
After watching this video, you will be able to describe the key features of Windows 10.
-
CompTIA A+ 220-902: Windows 8 and 8.1
After watching this video, you will be able to name the key features of Windows 8 and Windows 8.1.
-
CompTIA A+ 220-902: Operating Systems
After watching this video, you will be able to describe the functions provided by an operating system.
-
System Center: Device Management Solutions
After watching this video, you will be able to describe the four device management solutions for System Center Configuration Manager.
-
System Center: Configuration Manager Cloud Services
After watching this video, you will be able to name the cloud services available for System Center Configuration Manager.
-
System Center: Licensing for Configuration Manager
After watching this video, you will be able to list the licensing requirements for the different installation options with System Center Configuration Manager.
-
System Center: Branches of Configuration Manager
After watching this video, you will be able to describe the branches of System Center Configuration Manager.
-
System Center: What's New in System Center Configuration Manager
After watching this video, you will be able to describe the features and changes to System Center Configuration Manager.
-
System Center: Configuration Manager Prerequisite Checker
After watching this video, you will be able to run prerequisite checker for System Center Configuration Manager.
-
System Center: Configuration Manager Setup Downloader
After watching this video, you will be able to run setup downloader for System Center Configuration Manager.
-
System Center: Use Configuration Manager on Azure
After watching this video, you will be able to use Configuration Manager on Azure.
-
System Center: Configuration Manager Security
After watching this video, you will be able to describe security and privacy information for System Center Configuration Manager.
-
System Center: Configuration Manager Hierarchy
After watching this video, you will be able to describe the available topologies for System Center Configuration Manager.
-
CompTIA A+ 220-902: Command Line Interface (CLI)
After watching this video, you will be able to use the command line interface.
-
CompTIA A+ 220-902: Special Folders
After watching this video, you will be able to understand and explore folder settings in Windows.
-
CompTIA A+ 220-902: Windows Desktop
After watching this video, you will be able to personalize the Windows Desktop experience.
-
CompTIA A+ 220-902: Logging In to Windows
After watching this video, you will be able to log in to Windows through all of the various methods available.
-
System Center: Introduction to System Center Configuration Manager
After watching this video, you will be able to describe System Center Configuration Manager and what it is used for.
-
CompTIA A+ 220-902: Manage the Windows Installation
After watching this video, you will be able to perform management tasks to configure and personalize your Windows installation.
-
CompTIA A+ 220-902: Power Management
After watching this video, you will be able to optimize the power usage of your computer.
-
CompTIA A+ 220-902: Drive Management
After watching this video, you will be able to manage your storage drives in Windows.
-
CompTIA A+ 220-902: Administrative Tools
After watching this video, you will be able to use the Microsoft Management Console (MMC) to manage the administrative options on your computer.
-
CompTIA A+ 220-902: Control Panel
After watching this video, you will be able to use the Control Panel to manage your computer.
-
RabbitMQ: Debugging Using Firehose
After watching this video, you will be able to configure and use Firehose to debug issues by viewing messages on a node.
-
RabbitMQ: Using Monitoring
After watching this video, you will be able to use built-in and third-party plugins to monitor a RabbitMQ deployment's metrics.
-
RabbitMQ: Configuring Logs
After watching this video, you will be able to configure the log detail level and where the log files are stored.
-
RabbitMQ: Troubleshoot and Configure RabbitMQ
After watching this video, you will be able to configure and troubleshoot RabbitMQ.
-
RabbitMQ: Using the Shovel Plugin
After watching this video, you will be able to use shovels to move data between queues in different domains while handling connectivity issues.
-
RabbitMQ: Using the Federation Plugin
After watching this video, you will be able to use the federation plugin to handle message transmission between brokers even with poor connectivity.
-
RabbitMQ: Detecting Issues with Heartbeats
After watching this video, you will be able to configure and use heartbeats to detect network issues.
-
RabbitMQ: Working with TTL and Queue Length Limits
After watching this video, you will be able to work with the TTL settings for queues and messages and adjust the length of a message queue.
-
RabbitMQ: Configuring Persistence
After watching this video, you will be able to configure lazy queues, file handles, and async threads for the persistence layer.
-
RabbitMQ: Managing Disk Space
After watching this video, you will be able to use and configure the free disk space alarm.
-
RabbitMQ: Managing Memory
After watching this video, you will be able to manage the memory used by RabbitMQ and adjust the memory high watermark limit.
-
RabbitMQ: Securing Communications Using TLS
After watching this video, you will be able to secure communications between nodes or between clients using TLS.
-
Unix Essentials: Controling File System and Network Access
After watching this video, you will be able to configure Unix file system permissions, command execution, and firewall settings.
-
Unix Essentials: Testing Firewall Settings
After watching this video, you will be able to ensure configured firewall rules are in effect.
-
Unix Essentials: Uninstalling Unix Software
After watching this video, you will be able to use the pkg tool to remove software.
-
Unix Essentials: Managing Installed Unix Software
After watching this video, you will be able to use the pkg tool to view and update software.
-
Unix Essentials: Installing Software on Unix
After watching this video, you will be able to use the pkg tool to install software.
-
Unix Essentials: Software Management Overview
After watching this video, you will be able to describe how Unix handles software installation and maintenance.
-
Unix Essentials: Configuring IPv4
After watching this video, you will be able to enable IPv4 settings in Unix.
-
Unix Essentials: IPv4
After watching this video, you will be able to recognize configuration details for IPv4.
-
Unix Essentials: Daemons and Runlevels
After watching this video, you will be able to describe the concepts of daemons and runlevels.
-
Unix Essentials: Manage Unix Host Software
After watching this video, you will be able to manage software on a Unix host.
-
Unix Essentials: Installing a DHCP Server
After watching this video, you will be able to use the pkg command to install a DHCP server.
-
Unix Essentials: Configuring IPv6
After watching this video, you will be able to enable IPv6 settings in Unix.
-
Unix Essentials: IPv6
After watching this video, you will be able to recognize configuration details for IPv6.
-
Unix Essentials: Installing the Apache Web Server
After watching this video, you will be able to use the pkg command to install the Apache web server.
-
Unix Essentials: Configuring the DNS Server
After watching this video, you will be able to make configuration changes in DNS server files.
-
Unix Essentials: Installing a DNS Server
After watching this video, you will be able to use the pkg command to install a DNS server.
-
Unix Essentials: Configuring the DHCP Server
After watching this video, you will be able to make configuration changes in DHCP server files.
-
Unix Essentials: Regular Expressions
After watching this video, you will be able to recognize regex syntax for searching and filtering.
-
Unix Essentials: Exercise: IP Addressing and Apache Configuration
After watching this video, you will be able to configure IP and common network services.
-
Unix Essentials: Configuring the Apache Web Server
After watching this video, you will be able to make configuration changes in Apache server files.
-
Unix Essentials: Background Processes
After watching this video, you will be able to run Unix commands in the background.
-
Unix Essentials: Filtering With awk
After watching this video, you will be able to filter data using awk.
-
Unix Essentials: Filtering With grep
After watching this video, you will be able to filter data using grep.
-
Unix Essentials: Filtering and Formatting Commands
After watching this video, you will be able to recognize which Unix commands are used for filtering and formatting.
-
Unix Essentials: Looping
After watching this video, you will be able to use loops to iterate through a set of commands.
-
Unix Essentials: Conditional Execution
After watching this video, you will be able to use if statements to control script flow.
-
Unix Essentials: Variables
After watching this video, you will be able to recognize variable scopes and how they are used.
-
Unix Essentials: Scripting Overview
After watching this video, you will be able to specify how shell scripts are created and how they execute.
-
Unix Essentials: Automate Unix Commands
After watching this video, you will be able to filter data and create shell scripts.
-
Unix Essentials: Create a Shell Script
After watching this video, you will be able to configure and execute a shell script.
-
Unix Essentials: Cron Overview
After watching this video, you will be able to recognize how cron schedules tasks on a Unix system.
-
Unix Essentials: Common Unix Attacks
After watching this video, you will be able to identify attack methods in order to mitigate them.
-
Unix Essentials: Public Key Infrastructure (PKI)
After watching this video, you will be able to describe how the PKI hierarchy enhances security.
-
Unix Essentials: Hardening Overview
After watching this video, you will be able to identify how hardening can secure a host.
-
Unix Essentials: Scheduling a User Cron Job
After watching this video, you will be able to configure a repeating system cron job.
-
Unix Essentials: Set Recurring Jobs and Security Settings
After watching this video, you will be able to configure repeating cron jobs and harden Unix.
-
Unix Essentials: tcpdump
After watching this video, you will be able to view network packets using the tcpdump command.
-
LoadRunner 12 Essentials: Working with Scenarios
After watching this video, you will be able to practice creating and executing LoadRunner scenarios.
-
LoadRunner 12 Essentials: Creating an Analysis Session
After watching this video, you will be able to create an Analysis session and describe the LoadRunner Analysis interface.
-
LoadRunner 12 Essentials: Running a Load Test Scenario
After watching this video, you will be able to describe the LoadRunner Controller Run view and use the Controller to run and monitor a load test scenario.
-
LoadRunner 12 Essentials: Defining Service Level Agreements (SLAs)
After watching this video, you will be able to describe service level agreements (SLAs) and define SLAs in the Controller.
-
LoadRunner 12 Essentials: Rendezvous Points and Vuser Script Logs
After watching this video, you will be able to use rendezvous points during a scenario run and generate a Vuser script log.
-
LoadRunner 12 Essentials: Collating Load Test Results and Modifying a Scenario
After watching this video, you will be able to collate load test results in preparation for analysis and use the LoadRunner Controller to modify a load scenario during a test by increasing the load.
-
LoadRunner 12 Essentials: Application Errors and Performance Issues
After watching this video, you will be able to use the Controller's graphs to Identify application errors and performance issues during a test.
-
LoadRunner 12 Essentials: Transaction Analysis Reports and SLA Reports
After watching this video, you will be able to create a transaction analysis report and SLA report and describe their components.
-
LoadRunner 12 Essentials: Working with Analysis
After watching this video, you will be able to practice creating an analysis session and generating a report.
-
LoadRunner 12 Essentials: Viewing Load Test Scenario Information
After watching this video, you will be able to view load test scenario information in LoadRunner Analysis.
-
LoadRunner 12 Essentials: Cross Result and Merged Graphs
After watching this video, you will be able to work with cross result and merged graphs in Analysis.
-
LoadRunner 12 Essentials: Using Graphs
After watching this video, you will be able to use LoadRunner Analysis to graphically view performance and customize graph display.
-
LoadRunner 12 Essentials: Summary Reports
After watching this video, you will be able to access results of an analysis session in a summary report and describe its components.
-
LoadRunner 12 Essentials: Creating a Graph
After watching this video, you will be able to generate a custom graph in Analysis.
-
LoadRunner 12 Essentials: Creating HTML Reports
After watching this video, you will be able to publish results of an analysis session in an HTML report and describe its components.
-
LoadRunner 12 Essentials: Running Scripts from a Windows Command Prompt
After watching this video, you will be able to run Vuser scripts without using the VuGen interface.
-
LoadRunner 12 Essentials: Correlating Vuser Scripts
After watching this video, you will be able to describe the purpose of correlation and contrast it with parameterization and correlate Vuser scripts using Design Studio.
-
LoadRunner 12 Essentials: Working with Parameters
After watching this video, you will be able to work with existing parameters specified for a Vuser script.
-
LoadRunner 12 Essentials: Manual Correlation
After watching this video, you will be able to show how to search for values that need correlation and manually correlate Vuser scripts.
-
LoadRunner 12 Essentials: Manually Coding a Vuser Script
After watching this video, you will be able to manually program a Vuser script using the VuGen editor.
-
LoadRunner 12 Essentials: Monitoring the System under Load
After watching this video, you will be able to use the LoadRunner Controller to set up monitors to monitor the system under load.
-
LoadRunner 12 Essentials: Emulating User Types
After watching this video, you will be able to use the LoadRunner Controller to emulate different types of users.
-
LoadRunner 12 Essentials: Emulating Load Behavior
After watching this video, you will be able to use the Scenario Schedule options in LoadRunner Controller to emulate real load behavior.
-
LoadRunner 12 Essentials: Enhancing Vuser Scripts
After watching this video, you will be able to practice enhancing LoadRunner Vuser scripts by using features such as transactions, Vuser functions, parameters, and correlation.
-
LoadRunner 12 Essentials: Exploring the Controller
After watching this video, you will be able to describe purpose of the Controller and describe the Controller interface and scenario types.
-
LoadRunner 12 Essentials: Modifying Vuser Scripts
After watching this video, you will be able to use the LoadRunner Controller to modify Vuser script details.
-
LoadRunner 12 Essentials: Creating a Scenario
After watching this video, you will be able to create a LoadRunner scenario.
-
LoadRunner 12 Essentials: Using and Monitoring a Load Generator
After watching this video, you will be able to use the LoadRunner Controller to configure load generators to generate a load on a system, describe how load balancing is implemented and monitor the CPU use of a load generator.
-
LoadRunner 12 Essentials: Vuser Functions
After watching this video, you will be able to use general and protocol-specific Vuser functions in Vuser scripts.
-
LoadRunner 12 Essentials: Runtime Setting Validation
After watching this video, you will be able to describe the purpose of runtime settings, explore the runtime settings views in VuGen, and describe runtime setting value validation.
-
LoadRunner 12 Essentials: Exporting and Importing Runtime Settings
After watching this video, you will be able to export and import runtime settings.
-
LoadRunner 12 Essentials: Developing a Vuser Script
After watching this video, you will be able to practice developing Vuser scripts in LoadRunner's VuGen.
-
Securing Windows Server 2016 : Implementing AppLocker Rules: PowerShell
After watching this video, you will be able to implement AppLocker rules using PowerShell.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Conditional Access Policies
After watching this video, you will be able to design conditional access policies.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Compliance Policies
After watching this video, you will be able to design compliance policies.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Exchange ActiveSync Policies
After watching this video, you will be able to design ActiveSync policies.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Design for a Cloud/Hybrid Identity
After watching this video, you will be able to design Azure AD identities.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Mobile Device Management Authority
After watching this video, you will be able to design mobile device management authority.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Device Inventory
After watching this video, you will be able to design device inventory.
-
Windows 10: Planning For and Managing Devices in the Enterprise: The Company Portal
After watching this video, you will be able to customize the company portal.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Device Management
After watching this video, you will be able to list device management prerequisites.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Configuration Policies
After watching this video, you will be able to design configuration policies.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Company Terms and Conditions
After watching this video, you will be able to customize company terms and conditions.
-
Windows 10 - Planning For and Managing Devices in the Enterprise: Azure RemoteApp
After watching this video, you will be able to understand Azure RemoteApp.
-
Windows 10 - Planning For and Managing Devices in the Enterprise: Azure RemoteApp Configuration
After watching this video, you will be able to understand importing Azure RemoteApp template images.
-
Windows 10 - Planning For and Managing Devices in the Enterprise: Using the Azure RemoteApp Client
After watching this video, you will be able to access Azure remote apps using the remote app client.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Offline File Policies
After watching this video, you will be able to design for offline file policies.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Broadband Tethering
After watching this video, you will be able to configure broadband tethering.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Windows to Go and Sync Options
After watching this video, you will be able to design Windows to Go and sync options.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Power Policies
After watching this video, you will be able to design for power policies.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Configuring Remote Desktop Settings
After watching this video, you will be able to configure remote desktop settings.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Wi-Fi Direct
After watching this video, you will be able to design Wi-Fi direct plan.
-
Windows 10 - Planning For and Managing Devices in the Enterprise: Group Policy Objects
After watching this video, you will be able to configure Group Policy Objects (GPOs) for signed packages.
-
Windows 10: Planning For and Managing Devices in the Enterprise: RemoteApp
After watching this video, you will be able to design remoteApp and Desktop connection settings.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Refresh or Recycle
After watching this video, you will be able to design for using refresh or recycle.
-
Windows 10: Planning For and Managing Devices in the Enterprise: System Restore
After watching this video, you will be able to design for using system restore.
-
Windows 10 - Planning For and Managing Devices in the Enterprise: Restore Points
After watching this video, you will be able to design for using restore points.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Driver Rollback
After watching this video, you will be able to design for implementing driver rollback.
-
Windows 10 - Planning For and Managing Devices in the Enterprise: Remote Desktop Web Access
After watching this video, you will be able to understand Remote Desktop Web Access for Azure RemoteApp distribution.
-
Windows 10: Planning For and Managing Devices in the Enterprise: iOS and Android
After watching this video, you will be able to recognize support for iOS and Android.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Desktop Application Coexistence
After watching this video, you will be able to design desktop application coexistence using Hyper-V, Azure Remote App, and App-V.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Application Compatibility ToolKit
After watching this video, you will be able to design for desktop app compatibility using Application Compatibility Toolkit (ACT), including shims and compatibility database.
-
Windows 10 - Planning For and Managing Devices in the Enterprise: Microsoft Intune
After watching this video, you will be able to understand device management using Microsoft Intune.
-
Windows 10 - Planning For and Managing Devices in the Enterprise: User Experience Virtualization
After watching this video, you will be able to understand User Experience Virtualization (UE-V).
-
Windows 10: Planning For and Managing Devices in the Enterprise: Recovery Drive
After watching this video, you will be able to design for the recovery drive.
-
Windows 10: Planning For and Managing Devices in the Enterprise: EFS Recovery Agent
After watching this video, you will be able to design for the Encrypting File System recovery agent.
-
Windows 10: Planning For and Managing Devices in the Enterprise: BitLocker Policies
After watching this video, you will be able to configure BitLocker Policies.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Network Unlock Feature
After watching this video, you will be able to design for the Network Unlock Feature.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Mobile E-mail Data Protection
After watching this video, you will be able to design protection of data in e-mail when accessing it from a mobile device.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Policy Conflicts
After watching this video, you will be able to design policy conflicts.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Application Data Protection
After watching this video, you will be able to design for protection of data of applications using encryption.
-
Windows 10: Planning For and Managing Devices in the Enterprise: SharePoint Data Protection
After watching this video, you will be able to design SharePoint data protection when accessing it from a mobile device.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Plan Mobile Device Data Protection
After watching this video, you will be able to list design steps to take when planning and for the protection of data in e-mail and SharePoint when accessing them from mobile devices.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Full and Selective Wipes
After watching this video, you will be able to design for full and selective wipes.
-
Windows 10: Planning For and Managing Devices in the Enterprise: BitLocker Encryption
After watching this video, you will be able to design for BitLocker encryption.
-
Windows 10: Planning For and Managing Devices in the Enterprise: File and Disk Encryption
After watching this video, you will be able to design for file and disk encryption.
-
Windows 10: Planning For and Managing Devices in the Enterprise: VPN Reconnect
After watching this video, you will be able to enable VPN reconnect.
-
Windows 10: Planning For and Managing Devices in the Enterprise: VPN Connections
After watching this video, you will be able to design VPN connections and authentication.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Remote Desktop Settings
After watching this video, you will be able to configure Remote Desktop setting.
-
Windows 10: Planning For and Managing Devices in the Enterprise: BitLocker Certificates
After watching this video, you will be able to manage BitLocker certificates including backup and restores.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Manage EFS
After watching this video, you will be able to manage Encrypting File System.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Removable Device Audit Policies
After watching this video, you will be able to design for removable device audit policies.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Expression-based Audit Policies
After watching this video, you will be able to create expression-based audit policies.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Web Application Proxy
After watching this video, you will be able to use Web Application Proxy.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Dynamic Access Control
After watching this video, you will be able to design for Windows Server Dynamic Access Control.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Remote Authentication
After watching this video, you will be able to plan and design remote authentication.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Rights Management Services
After watching this video, you will be able to use Azure Rights Management Service (RMS).
-
Windows 10 - Planning For and Managing Devices in the Enterprise: Plan Updates and Recovery
After watching this video, you will be able to list design steps to take when planning for system and file recovery.
-
Windows 10: Planning For and Managing Devices in the Enterprise: Group Policy and AuditPol.exe
After watching this video, you will be able to design for auditing using Group Policy and AuditPol.ext.
-
Windows 10 - Planning For and Managing Devices in the Enterprise: OneDrive
After watching this video, you will be able to recover files from OneDrive.
-
Windows 10 - Planning For and Managing Devices in the Enterprise: File History
After watching this video, you will be able to design for previous versions of files and folders, File History.
-
Windows 10 - Planning For and Managing Devices in the Enterprise: Update History
After watching this video, you will be able to manage update history.
-
Windows 10 - Planning For and Managing Devices in the Enterprise: Windows Update Policies
After watching this video, you will be able to understand update settings and Windows Update policies.
-
Windows 10 - Planning For and Managing Devices in the Enterprise: Windows Store App Updates
After watching this video, you will be able to design for Windows Store App Updates.
-
Windows 10 - Planning For and Managing Devices in the Enterprise: Roll Back Device Updates
After watching this video, you will be able to roll back updates.
-
Mastering DevOps with Chef: Test an Apache Cookbook on Two Platforms
After watching this video, you will be able to use Test Kitchen to verify a simple Apache cookbook on Ubuntu and Centos.
-
Mastering DevOps with Chef: Configure Users and Groups with Search
After watching this video, you will be able to build a users cookbook that searches through a data bag to configure users and groups.
-
Mastering DevOps with Chef: Deploy a Simple Web Server
After watching this video, you will be able to build a simple Apache cookbook that configures a "hello, world" page to serve on the localhost.
-
Mastering DevOps with Chef: Testing Case Statements
After watching this video, you will be able to use ChefSpec to check case statement evaluation of node attributes.
-
Mastering DevOps with Chef: Use the HAProxy Community Cookbook
After watching this video, you will be able to configure a wrapper for the haproxy community cookbook to redirect traffic to a simple web server.
-
Mastering Docker for DevOps: Docker Hub Repositories
After watching this video, you will be able to define how you can use Docker Hub repositories to search for images.
-
Mastering Docker for DevOps: Docker Hub
After watching this video, you will be able to describe the Docker Hub registry service, including Docker ID.
-
Mastering Docker for DevOps: Docker Hub and Automated Builds
After watching this video, you will be able to recall how to perform automated builds.
-
Mastering Docker for DevOps: Repository Creation
After watching this video, you will be able to describe how to create both public and private repositories.
-
Mastering Docker for DevOps: Docker AWS VM Deployment
After watching this video, you will be able to deploy an AWS virtual machine running Docker.
-
Mastering Docker for DevOps: Docker in the Cloud
After watching this video, you will be able to describe the various Docker cloud deployment models.
-
Shell Scripting Essentials: Creating an Expect Script
After watching this video, you will be able to create a script that can automate inputs to another command or script using expect.
-
Shell Scripting Essentials: Using Advanced Bash Scripting Techniques
After watching this video, you will be able to create scripts that can trap signals and exit gracefully, display progress bar indicators, and read and modify data from a configuration file.
-
Shell Scripting Essentials: Using Interact for User Input in an Expect Script
After watching this video, you will be able to use the expect interact command to prompt the user for input in an automated script.
-
Shell Scripting Essentials: Reading Text File Data into an Array
After watching this video, you will be able to use mapfile to read data from a file into an array for further processing.
-
Shell Scripting Essentials: Sending an E-mail from a Shell Script
After watching this video, you will be able to send a dynamically generated e-mail from a Bash script using built-in mail tools and commands.
-
Shell Scripting Essentials: Selecting Data from Files with Awk
After watching this video, you will be able to use simple awk statements to extract data from a file or from the output of another command or script.
-
Shell Scripting Essentials: Manipulating File Contents with Sed
After watching this video, you will be able to edit file contents from within a Bash script by using the stream editor (sed).
-
Shell Scripting Essentials: Automating FTP in a Script
After watching this video, you will be able to automate an FTP session to transfer files.
-
Shell Scripting Essentials: Creating Expect Scripts with Autoexpect
After watching this video, you will be able to work with autoexpect to create scripts and control advanced features of expect.
-
Shell Scripting Essentials: Performing File and Directory Backups with rsync
After watching this video, you will be able to back up files or directories using rsync on a local system via an expect script.
-
Shell Scripting Essentials: Automating SCP File Transfers in a Script
After watching this video, you will be able to automate file transfers over SCP in an expect script.
-
Mastering DevOps with Python: Strings and Printing
After watching this video, you will be able to work with strings and print formatting.
-
Mastering DevOps with Python: Data Types, Numbers, and Operations
After watching this video, you will be able to recall syntax considerations for data types, numbers, and operations.
-
Shell Scripting Essentials: Comparing Bash to Ksh
After watching this video, you will be able to work with the Korn shell and identify some of its differences from Bash.
-
Shell Scripting Essentials: Using rsync over SSH for Secure Remote Backups
After watching this video, you will be able to use rsync and ssh to transfer or back up files and directories between remote systems via an expect script.
-
Shell Scripting Essentials: Automating with Bash
After watching this video, you will be able to create scripts to automate processes and create backups on local and remote systems.
-
Shell Scripting Essentials: Comparing Bash to Csh
After watching this video, you will be able to use the C shell and identify the differences between the two shell environments.
-
Shell Scripting Essentials: Controlling and Manipulating Running Scripts
After watching this video, you will be able to use command line tools and key presses to control and manipulate scripts.
-
Shell Scripting Essentials: Using Input and Output Redirection
After watching this video, you will be able to use input and output redirection to send the output to a device, stdout, and stderr.
-
Shell Scripting Essentials: Using and Manipulating Variables
After watching this video, you will be able to create, use, and manipulate variables within a script.
-
Shell Scripting Essentials: Working with Built-in Variables
After watching this video, you will be able to work with Bash's built-in variables to get data about the script and the environment.
-
Shell Scripting Essentials: Using Input and Output and Returning Results
After watching this video, you will be able to use read and echo to get user input and display script output, and recall how to return results at the end of the script.
-
Shell Scripting Essentials: Creating a Shell Script
After watching this video, you will be able to create, execute, document, and comment in a Bash script.
-
Shell Scripting Essentials: Passing and Using Arguments in Shell Scripts
After watching this video, you will be able to access and use parameters passed in from the command line to a Bash script.
-
Shell Scripting Essentials: Working with Environment Variables
After watching this video, you will be able to work with variables configured in the environment within a Bash script.
-
Shell Scripting Essentials: Formatting Variable Output
After watching this video, you will be able to use escaping and printf to control how variables and string data are displayed.
-
Shell Scripting Essentials: Applying Advanced Variable Manipulations
After watching this video, you will be able to create constants, control and understand variable scope, and export variables.
-
Shell Scripting Essentials: Creating and Using Functions
After watching this video, you will be able to create and use functions within a Bash script, creating a library of functions that can be used in another script.
-
Shell Scripting Essentials: Using While and Until Loops
After watching this video, you will be able to use while and until loops to iterate through a list or run until a condition is achieved.
-
Shell Scripting Essentials: Working with For Loops
After watching this video, you will be able to work with for loops and wildcards.
-
Shell Scripting Essentials: Creating a Case Statement
After watching this video, you will be able to create a case statement and use it in place of a nested if statement.
-
Shell Scripting Essentials: Using Break and Continue Inside a Loop
After watching this video, you will be able to use break and continue to control the iterations of a loop.
-
Shell Scripting Essentials: Creating Bash Scripts
After watching this video, you will be able to create, use, and run Bash scripts that can manipulate variables, return results from the environment, and use functions.
-
Shell Scripting Essentials: Using Parameters and Return Codes in Functions
After watching this video, you will be able to use parameters to pass data to a function and add return codes to get the status or result from a function.
-
Shell Scripting Essentials: Recognizing and Using Comparison Operators
After watching this video, you will be able to recognize numeric, string, and test comparison operators and create compound conditional statements.
-
Shell Scripting Essentials: Using if...then...else Statements
After watching this video, you will be able to work with conditional statements in Bash scripts and use the built-in test command to evaluate expressions.
-
Shell Scripting Essentials: Creating and Manipulating Arrays
After watching this video, you will be able to create an array by adding and removing elements and manipulate the data in the array.
-
Shell Scripting Essentials: Converting Numbers between Bases
After watching this video, you will be able to create and use a Bash script to convert numbers between different bases.
-
Shell Scripting Essentials: Performing Math Operations
After watching this video, you will be able to perform simple math operations in a Bash script and use the bc utility to do floating point math.
-
Shell Scripting Essentials: Applying Defaults for Input
After watching this video, you will be able to use default values for input and work with undefined variables.
-
Shell Scripting Essentials: Using Brace Expansion and Eval
After watching this video, you will be able to create generated strings using brace expansion and use eval to execute strings as commands.
-
Shell Scripting Essentials: Using Brace Expansion with Ranges
After watching this video, you will be able to use brace expansion to create, combine, and nest ranges, and create padded numeric values using zero padding.
-
Shell Scripting Essentials: Creating a Recursive Function and Script
After watching this video, you will be able to create recursive functions and scripts to solve repetitive problems.
-
Shell Scripting Essentials: Working with Directories
After watching this video, you will be able to use popd, pushd, dirs, pwd, cd, and $DIRSTACK to work with directories and directory structures in a Bash script.
-
Shell Scripting Essentials: Manipulating Strings
After watching this video, you will be able to manipulate strings using the built-in Bash string manipulation operations.
-
Shell Scripting Essentials: Catching and Trapping Interrupts and Signals
After watching this video, you will be able to catch signals or interrupts using traps in a Bash script to allow the script to exit gracefully or handle the interruption.
-
Shell Scripting Essentials: Using Conditions and Data Types in Bash
After watching this video, you will be able to work with conditional statements, loops, and arrays in Bash scripts and manipulate string and numeric data.
-
Shell Scripting Essentials: Handling the Results of Another Script
After watching this video, you will be able to execute commands for other scripts and then use the output.
-
Shell Scripting Essentials: Creating Scripts Inside a Script
After watching this video, you will be able to create a dynamic script inside a script and then execute that script.
-
Shell Scripting Essentials: Using Textual Progress Indicators
After watching this video, you will be able to create and implement progress indicators in a Bash script to show an activity or an estimate of when an activity should end.
-
Fundamentals of DevOps: Identify DevOps Testing Approaches
After watching this video, you will be able to identify the testing methodologies for DevOps.
-
Fundamentals of DevOps: Deployment Automation
After watching this video, you will be able to describe how the capability for mature deployment automation is essential for a DevOps structure.
-
Fundamentals of DevOps: Security Testing
After watching this video, you will be able to describe how the capability for mature security testing is essential for a DevOps structure.
-
Fundamentals of DevOps: Static Code Analysis
After watching this video, you will be able to describe how the quality of code is important for optimizing a DevOps delivery structure.
-
Fundamentals of DevOps: Continuous Delivery
After watching this video, you will be able to describe how continuous delivery can be achieved within a DevOps structure.
-
Fundamentals of DevOps: Performance Testing
After watching this video, you will be able to describe how the capability for mature performance testing is essential for a DevOps structure.
-
Fundamentals of DevOps: Automated Testing
After watching this video, you will be able to describe how the capability for mature automated testing is essential for a DevOps structure.
-
Fundamentals of DevOps: Build Testing
After watching this video, you will be able to describe how the capability for mature build testing is essential for a DevOps structure.
-
Fundamentals of DevOps: Unit Testing
After watching this video, you will be able to describe how the capability for mature unit testing is essential for a DevOps structure.
-
Fundamentals of DevOps: Functional and Nonfunctional Requirements
After watching this video, you will be able to describe how various types of requirements affect delivery of software in a DevOps structure.
-
Fundamentals of DevOps: Continuous Integration
After watching this video, you will be able to describe how continuous integration can be achieved in a DevOps structure.
-
Fundamentals of DevOps: Build Automation
After watching this video, you will be able to describe how the capability for build automation is essential for a DevOps structure.
-
Fundamentals of DevOps: Source Code Repository
After watching this video, you will be able to describe how a comprehensive source code repository is essential for a DevOps structure.
-
Fundamentals of DevOps: System Testing
After watching this video, you will be able to describe how the capability for mature system testing is essential for a DevOps structure.
-
Fundamentals of DevOps: Integration Testing
After watching this video, you will be able to describe how the capability for mature integration testing is essential for a DevOps structure.
-
Fundamentals of DevOps: User Acceptance Testing
After watching this video, you will be able to describe how the capability for mature user acceptance testing is essential for a DevOps structure.
-
Fundamentals of DevOps: Printers
After watching this video, you will be able to describe how print capabilities can be affected by a DevOps structure.
-
Fundamentals of DevOps: Server Administration
After watching this video, you will be able to describe how server administration capabilities can be leveraged in a DevOps structure.
-
Fundamentals of DevOps: Identify DevOps Management Approaches
After watching this video, you will be able to identify the development methodologies used by DevOps.
-
Fundamentals of DevOps: Specialized Devices
After watching this video, you will be able to describe how IT operations are impacted by specialized device management in a DevOps structure.
-
Fundamentals of DevOps: Networking
After watching this video, you will be able to describe how networking capabilities can be leveraged in a DevOps structure.
-
Fundamentals of DevOps: Mobile Device Management
After watching this video, you will be able to describe how mobile device management can be optimized leveraging a DevOps structure.
-
Fundamentals of DevOps: Corporate Culture
After watching this video, you will be able to describe how a DevOps structure can increase the collaboration between IT departments.
-
Fundamentals of DevOps: DevOps Process Highlights
After watching this video, you will be able to describe continuous processes enabled by a DevOps structure.
-
Fundamentals of DevOps: DevOps Adoption
After watching this video, you will be able to describe key factors of an organization that can impact the adoption of a DevOps structure.
-
Fundamentals of DevOps: Enterprise Architecture
After watching this video, you will be able to describe how a DevOps structure can complement an organization with an Enterprise Architecture program.
-
Skype for Business 2015: Chat Issues
After watching this video, you will be able to identify causes of chat issues.
-
Skype for Business 2015: Troubleshooting Address Book Issues
After watching this video, you will be able to solve address book problems.
-
Skype for Business 2015: Address Book Issues
After watching this video, you will be able to identify causes of address book issues.
-
Skype for Business 2015: Disable Windows Integrated Authentication
After watching this video, you will be able to configure Skype for Business authentication.
-
Skype for Business 2015: Deploy Office Online Server
After watching this video, you will be able to install an Office Online Server on-premises.
-
Skype for Business 2015: Deploy a Persistent Chat Server
After watching this video, you will be able to configure a persistent chat server.
-
Skype for Business 2015: Solve Problems Using a Structured Approach
After watching this video, you will be able to identify the source of problems and resolve issues.
-
Skype for Business 2015: Troubleshooting Chat Issues
After watching this video, you will be able to address the cause of chat issues.
-
Skype for Business 2015: Backup the Central Management Store
After watching this video, you will be able to safe guard CMS with backups.
-
Skype for Business 2015: Troubleshooting Conferencing Issues
After watching this video, you will be able to address the cause of conferencing issues.
-
Skype for Business 2015: Conferencing Issues
After watching this video, you will be able to identify causes of conferencing issues.
-
Skype for Business 2015: Troubleshooting Client Issues
After watching this video, you will be able to solve client issues causing problems.
-
Skype for Business 2015: Client Issues
After watching this video, you will be able to recognize client issues causing problems.
-
Skype for Business 2015: Troubleshooting Tools
After watching this video, you will be able to identify various GUI and command line tools used to troubleshoot Skype for Business.
-
Skype for Business 2015: Troubleshooting Overview
After watching this video, you will be able to explain how troubleshooting methodology can solve problems.
-
Skype for Business 2015: Incease services fault tolerance
After watching this video, you will be able to implement configurations that increase service availability.
-
Skype for Business 2015: Establish a Skype for Business performance baseline
After watching this video, you will be able to create a Data Collector Set that uses Skype for Business performance counters.
-
Skype for Business 2015: Use the Snooper tool
After watching this video, you will be able to analyze Skype for Business data using Snooper.
-
Skype for Business 2015: Create a Voice Policy
After watching this video, you will be able to create and configure a voice policy.
-
Skype for Business 2015: Create a PSTN Gateway configuration
After watching this video, you will be able to configure a PSTN gateway and associate it with a Mediation server pool.
-
Skype for Business 2015: Add a standalone Mediation server to the topology
After watching this video, you will be able to use the Topology Builder to define settings for a Mediation pool.
-
Skype for Business 2015: Configure Address Book Settings
After watching this video, you will be able to use PowerShell to configure address book settings.
-
Skype for Business 2015: Plan for High Availability
After watching this video, you will be able to use the Skype for Business Planning Tool to plan high availability.
-
Skype for Business 2015: Mobile app interaction with SfB users
After watching this video, you will be able to start an instant message conversation from the mobile app.
-
Skype for Business 2015: Skype for Business sign-in on a mobile device
After watching this video, you will be able to sign in to Skype for Business Online using the mobile app.
-
Skype for Business 2015: Install the Skype for Business mobile app
After watching this video, you will be able to install Skype for Business on an Android device.
-
Skype for Business 2015: Configure Skype for Business Online archiving
After watching this video, you will be able to apply archive settings to Skype for Business online.
-
Mastering DevOps with Python: Tuples and Arrays
After watching this video, you will be able to work with tuples and arrays in Python.
-
Mastering DevOps with Python: Functions
After watching this video, you will be able to declare functions, accept arguments, and return values from functions.
-
Mastering DevOps with Python: Classes
After watching this video, you will be able to create and instantiate a class.
-
Mastering DevOps with Python: File I/O
After watching this video, you will be able to work with file input and output operations.
-
Mastering DevOps with Python: Function Overloading
After watching this video, you will be able to use default arguments to implement function overloading.
-
Mastering DevOps with Python: Class Data and Methods
After watching this video, you will be able to define and initialize class variables and methods.
-
Mastering DevOps with Python: Loops and Branching
After watching this video, you will be able to use loops and branching in Python.
-
Mastering DevOps with Python: Dictionaries and Lists
After watching this video, you will be able to work with dictionaries and lists in Python.
-
Mastering DevOps with Python: Modules
After watching this video, you will be able to implement a module and include it in another source file.
-
Mastering DevOps with Python: Dates and Times
After watching this video, you will be able to convert dates and times between formats.
-
Mastering DevOps with Python: Inheritance
After watching this video, you will be able to define and instantiate a derived class.
-
Mastering DevOps with Python: Work with Classes and File I/O
After watching this video, you will be able to read a file and load it into a Python class.
-
Mastering DevOps with Python: Operator Overloading
After watching this video, you will be able to overload an operator in a class.
-
Mastering DevOps with Python: Regular Expression Search and Replace
After watching this video, you will be able to perform a search and replace using various regular expression modifiers.
-
Mastering DevOps with Python: Regular Expression Search Syntax
After watching this video, you will be able to work with regular expression search syntax using the standard RE module.
-
Mastering DevOps with Python: XML Parsing with SAX
After watching this video, you will be able to parse XML data with SAX using the standard XML module.
-
Mastering DevOps with Python: CRUD Operations
After watching this video, you will be able to build a table and perform CRUD operations from Python.
-
Mastering DevOps with Python: Database Creation
After watching this video, you will be able to create a database and a user in MySQL from Python.
-
Mastering DevOps with Python: Database Error Management
After watching this video, you will be able to handle errors returned from database queries in Python.
-
Mastering DevOps with Python: Database Transactions
After watching this video, you will be able to perform a transactional query with commit in Python.
-
Mastering DevOps with Chef: Overwriting Cookbook Attributes
After watching this video, you will be able to use node attribute precedence when overwriting cookbook attribute values.
-
Mastering DevOps with Chef: Local Dependency Resolution
After watching this video, you will be able to configure the Berksfile to point at a local dependency instead of a Chef Supermarket dependency.
-
Mastering DevOps with Chef: Role Cookbooks
After watching this video, you will be able to identify the limitations of using roles and explain the purpose of a role cookbook.
-
Mastering DevOps with Chef: Role and Environment Attributes
After watching this video, you will be able to assign node attributes at the role or environment level.
-
Mastering DevOps with Chef: Reusing Community Cookbooks
After watching this video, you will be able to distinguish why community cookbooks should be called as dependencies instead of forking upstream code bases.
-
Mastering DevOps with Chef: Library Cookbooks vs. Application Cookbooks
After watching this video, you will be able to distinguish the differences between library and application cookbooks.
-
Mastering DevOps with Chef: Uploading Cookbooks with Berkshelf
After watching this video, you will be able to manage Chef server cookbook versions with berkshelf.
-
Mastering DevOps with Chef: Installing Cookbook Dependencies
After watching this video, you will be able to configure and install dependencies in the metadata file with berkshelf.
-
Mastering DevOps with Chef: Logging Chef-client Runs
After watching this video, you will be able to configure the logging location on a node directly or as a node attribute with the chef-client cookbook.
-
Mastering DevOps with Chef: Scheduling a Chef-client Run
After watching this video, you will be able to configure the chef-client as a service with a community cookbook.
-
Mastering DevOps with Chef: Behavior-driven Development
After watching this video, you will be able to use Behavior-Driven Development (BDD) in the context of Chef cookbook development.
-
Mastering DevOps with Chef: Writing the First Test
After watching this video, you will be able to define an integration test and verify the results with kitchen login.
-
Mastering DevOps with Chef: Kitchen Converge
After watching this video, you will be able to execute the chef-client on a virtual machine generated by Test Kitchen.
-
Mastering DevOps with Chef: Kitchen Verify
After watching this video, you will be able to refactor a recipe and run kitchen verify with a test-driven approach.
-
Mastering DevOps with Chef: InSpec
After watching this video, you will be able to use the InSpec compliance language to write simple integration tests.
-
Mastering DevOps with Chef: Generating Tests
After watching this video, you will be able to generate unit and integration tests inside of a cookbook.
-
Mastering DevOps with Chef: Test Driven Cookbooks
After watching this video, you will be able to identify the Chef Development Kit tools used for unit and integration testing.
-
Mastering DevOps with Chef: The .kitchen.yml Driver
After watching this video, you will be able to configure a Test Kitchen driver to support deploying to physical, virtual, or cloud machines.
-
Mastering DevOps with Chef: Test Kitchen Setup
After watching this video, you will be able to list the components of the .kitchen.yml file.
-
Mastering DevOps with Chef: ChefSpec and RSpec
After watching this video, you will be able to execute the RSpec utility to test Chef recipes in memory.
-
Mastering DevOps with Chef: Pausing Tests with Pry
After watching this video, you will be able to configure the Pry Ruby gem to insert a breakpoint into a recipe.
-
Mastering DevOps with Chef: Writing Unit Tests
After watching this video, you will be able to utilize a simple formula to write ChefSpec tests.
-
Mastering Docker for DevOps: Docker Web Server
After watching this video, you will be able to create a web server using Dockerfile.
-
Mastering Docker for DevOps: Docker Images
After watching this video, you will be able to tag and publish a Docker image.
-
Mastering Docker for DevOps: Docker Swarm Creation
After watching this video, you will be able to use Docker to create a new swarm and add nodes to the swarm.
-
Mastering Docker for DevOps: Docker Swarm Overview
After watching this video, you will be able to recall key concepts of Docker swarm mode and how it relates to DevOps.
-
Mastering Docker for DevOps: Container Management
After watching this video, you will be able to describe the key concepts of containers and how they are managed.
-
Mastering Docker for DevOps: Overview of Docker for DevOps
After watching this video, you will be able to describe the role Docker can play in the DevOps landscape.
-
Mastering Docker for DevOps: Dockerizing Apps
After watching this video, you will be able to use Dockerfile to add an application to a container and run the application.
-
Mastering Docker for DevOps: Dockerfile
After watching this video, you will be able to develop with Dockerfile while ensuring that best practices are followed.
-
Mastering Docker for DevOps: Services and Docker Swarm
After watching this video, you will be able to deploy and inspect a service in Docker swarm.
-
Mastering Docker for DevOps: Docker Rolling Updates
After watching this video, you will be able to upgrade a service in Docker using rolling updates.
-
Mastering Docker for DevOps: Scaling Services
After watching this video, you will be able to use the Docker CLI to scale containers in the service.
-
Mastering Docker for DevOps: Stacks and Data Persistence
After watching this video, you will be able to demonstrate how to incorporate data persistence using redis.
-
Mastering Docker for DevOps: Stack Redeployment
After watching this video, you will be able to add a new service to a stack and redeploy.
-
Mastering Docker for DevOps: Distributed Application Bundles
After watching this video, you will be able to use Docker Compose to create a DAB.
-
Mastering Docker for DevOps: Swarm Service Configs
After watching this video, you will be able to work with configuration files using swarm service configs.
-
Mastering Docker for DevOps: Docker Secrets
After watching this video, you will be able to use Docker secrets to work with sensitive data.
-
Mastering Docker for DevOps: Docker Stacks
After watching this video, you will be able to define stacks and use Docker to create one.
-
Mastering Docker for DevOps: Working with a Docker Swarm
After watching this video, you will be able to create and configure a Docker swarm.
-
Mastering DevOps with Python: Loading Data from XML
After watching this video, you will be able to read data from XML and save it in a MySQL database.
-
Mastering DevOps with Python: XML Parsing with DOM
After watching this video, you will be able to use the DOM with the standard XML module to parse XML data.
-
Mastering DevOps with Python: Flask Framework
After watching this video, you will be able to create a web application project using Flask.
-
Mastering DevOps with Python: Environment Variables
After watching this video, you will be able to activate a virtual environment and install web programming prerequisites with pip.
-
Mastering DevOps with Python: WSGI
After watching this video, you will be able to run a web application through a Web Server Gateway Interface (WSGI) using the Apache web server.
-
Mastering DevOps with Python: Cookies
After watching this video, you will be able to use cookies in a web application.
-
Mastering DevOps with Python: HTTP Templates
After watching this video, you will be able to create a web application template using the Jinja2 language.
-
Mastering DevOps with Python: Routes
After watching this video, you will be able to define route mappings in a web application.
-
Mastering DevOps with Python: HTTP Methods
After watching this video, you will be able to respond to various HTTP methods in a web application.
-
Mastering DevOps with Python: HTTP Headers
After watching this video, you will be able to parse HTTP headers in a web application.
-
Mastering DevOps with Python: GUI Geometry
After watching this video, you will be able to use Tkinter geometry managers to organize widgets.
-
Mastering DevOps with Python: GUI Attributes
After watching this video, you will be able to modify Tkinter widgets using common attributes.
-
Mastering DevOps with Chef: Welcome to Chef
After watching this video, you will be able to describe how automation and version control contribute to DevOps.
-
Mastering DevOps with Python: Creating a Web Interface
After watching this video, you will be able to start a WSGI service and process an HTTP request.
-
Mastering DevOps with Python: Tkinter Widgets
After watching this video, you will be able to create a Tkinter window with some common widgets.
-
Mastering DevOps with Chef: Cookbooks
After watching this video, you will be able to identify how recipes are packaged and distributed with cookbooks.
-
Mastering DevOps with Chef: Installing the Chef Tooling
After watching this video, you will be able to install the Chef Development Kit (ChefDK).
-
Mastering DevOps with Chef: Chef Structure and Architecture
After watching this video, you will be able to describe the Chef distribution model and the declarative syntax used in writing Chef recipes.
-
Mastering DevOps with Chef: Ruby Basics
After watching this video, you will be able to describe Ruby basics such as variables, arrays, and objects.
-
Mastering DevOps with Chef: Resources and Recipes
After watching this video, you will be able to use the package and file resources inside of a Chef Recipe.
-
Mastering DevOps with Chef: Managing Files
After watching this video, you will be able to use the cookbook_file, remote_file, and template Chef resources to manage files.
-
Mastering DevOps with Chef: Ohai and the Node Object
After watching this video, you will be able to work with system profiling with Ohai and accessing node object attributes.
-
Mastering DevOps with Chef: Using Node Attributes
After watching this video, you will be able to refactor recipes to use node attributes instead of hard-coded values.
-
Mastering DevOps with Chef: Templates for Clarity
After watching this video, you will be able to manage dynamic file creation using the template resource.
-
Mastering DevOps with Chef: Running the Chef-client
After watching this video, you will be able to deploy a cookbook using the chef-client in local mode.
-
Mastering DevOps with Chef: Version Control with Git
After watching this video, you will be able to identify best practices of using Git for version control.
-
Mastering DevOps with Chef: Hosted Chef
After watching this video, you will be able to create an account on hosted Chef.
-
Mastering DevOps with Chef: The Chef Server Pull Model
After watching this video, you will be able to describe why a Chef server is used and the cookbook distribution model.
-
Mastering DevOps with Chef: The Chef-repo Directory
After watching this video, you will be able to describe the chef-repo components and the user authentication model.
-
Mastering DevOps with Chef: The Starter Kit
After watching this video, you will be able to configure a chef-repo using the Chef server starter kit.
-
Mastering DevOps with Chef: Separating Versions with Environments
After watching this video, you will be able to separate cookbook versions using Chef environments.
-
Mastering DevOps with Chef: Custom Run-lists with Roles
After watching this video, you will be able to configure run-lists for nodes in bulk with roles.
-
Mastering DevOps with Chef: The Search Method
After watching this video, you will be able to refactor a recipe to utilize search to create dynamic policy with a Chef server.
-
Mastering DevOps with Chef: Searching with Knife
After watching this video, you will be able to search for Chef server policy with knife.
-
Mastering DevOps with Chef: API Calls with Knife
After watching this video, you will be able to use the knife command to view Chef server policy and node details.
-
Mastering DevOps with Chef: Bootstrapping Nodes
After watching this video, you will be able to attach nodes to the Chef server with the knife bootstrap command.
-
Mastering DevOps with Chef: Uploading Cookbooks
After watching this video, you will be able to upload cookbook policy to the Chef server using knife.
-
Mastering DevOps with Chef: Community Code Guidelines
After watching this video, you will be able to describe the reusability of Chef cookbooks and best practices around utilizing community code.
-
Mastering DevOps with Chef: Data Bags
After watching this video, you will be able to create custom searchable datasets with data bags.
-
Mastering DevOps with Chef: Chef Supermarket
After watching this video, you will be able to search for cookbooks on supermarket.chef.io.
-
Microsoft SharePoint 2016: Plan for Storage and Large File Support
After watching this video, you will be able to design a SharePoint 2016 storage architecture, including ReFS and plan for large file support.
-
Microsoft SharePoint 2016: Define a Physical Topology by Using MinRoles
After watching this video, you will be able to design a SharePoint 2016 server farm topology by using MinRole.
-
Microsoft SharePoint 2016: Why Install SharePoint?
After watching this video, you will be able to recognize the goals of a SharePoint installation.
-
Microsoft SharePoint 2016: Tracking SharePoint Deployments
After watching this video, you will be able to plan and configure SharePoint 2016 service connection points and installation tracking and auditing.
-
Microsoft SharePoint 2016: Initial Deployment
After watching this video, you will be able to perform GUI or scripted deployments of SharePoint 2016.
-
Microsoft SharePoint 2016: Plan an App Hosting Model
After watching this video, you will be able to plan a SharePoint 2016 app hosting model.
-
Microsoft SharePoint 2016: Define Individual Server Requirements
After watching this video, you will be able to define individual SharePoint 2016 server requirements.
-
Microsoft SharePoint 2016: Plan for Networking and Load Balancing
After watching this video, you will be able to plan SharePoint 2016 server load balancing, network infrastructure, and basic request management.
-
Microsoft SharePoint 2016: Managing Search Results
After watching this video, you will be able to manage SharePoint 2016 query rules, keywords, synonyms, and other search aids.
-
Microsoft SharePoint 2016: Configure Content Sources
After watching this video, you will be able to define SharePoint 2016 search content sources and crawl schedules.
-
Microsoft SharePoint 2016: Using Enterprise Search
After watching this video, you will be able to planning SharePoint 2016 enterprise search.
-
Microsoft SharePoint 2016: Using Your Taxonomy for Navigation
After watching this video, you will be able to use the MMS terms for SharePoint 2016 managed navigation.
-
Microsoft SharePoint 2016: Compliance Tools
After watching this video, you will be able to plan the use of information management policies, document fingerprinting, and encryption.
-
Microsoft SharePoint 2016: Improved Mobile Navigation
After watching this video, you will be able to navigate using touch-based interface.
-
Microsoft SharePoint 2016: Building Site Collections
After watching this video, you will be able to create and maintain site collections.
-
Microsoft SharePoint 2016: Building Web Applications
After watching this video, you will be able to provide and configure web applications.
-
Microsoft SharePoint 2016: Overview of the SharePoint 2016 Logical Architecture
After watching this video, you will be able to identify logical elements of a SharePoint architecture.
-
Microsoft SharePoint 2016: Using Your Taxonomy Within a Site
After watching this video, you will be able to use the MMS terms within a site as available data values in SharePoint 2016.
-
Microsoft SharePoint 2016: Create and Manage Content Types
After watching this video, you will be able to create and propagate content types using the content type hub in SharePoint 2016.
-
Microsoft SharePoint 2016: Creating and Managing Terms
After watching this video, you will be able to create SharePoint 2016 terms and terms sets to define custom properties in MMS.
-
Microsoft SharePoint 2016: Using Managed Metadata
After watching this video, you will be able to create and configure the SharePoint 2016 managed metadata service.
-
Microsoft SharePoint 2016: Define Your Taxonomy
After watching this video, you will be able to define and understand how information architecture and taxonomy is used in SharePoint 2016.
-
Microsoft SharePoint 2016: Installing SharePoint using MinRole
After watching this video, you will be able to configure a SharePoint topology using MinRole-based assignments.
-
CompTIA A+ 220-901: Printer Maintenance for Laser and Inkjet Printers
After watching this video, you will be able to identify common techniques used to maintain laser and inkjet printers.
-
CompTIA A+ 220-901: Virtual Printing
After watching this video, you will be able to compare print options when using virtual printing.
-
CompTIA A+ 220-901: Impact Printing Technology
After watching this video, you will be able to list the characteristics of impact printers.
-
CompTIA A+ 220-901: Thermal Paper Printing Technology
After watching this video, you will be able to describe the process of thermal paper printing.
-
CompTIA A+ 220-901: Inkjet Printing Technology
After watching this video, you will be able to recognize the components and process of inkjet printing technology.
-
CompTIA A+ 220-901: Laser Printing Technology
After watching this video, you will be able to list the steps involved in laser printing.
-
CompTIA A+ 220-901: Public Shared Print Devices
After watching this video, you will be able to describe how public shared print devices work.
-
CompTIA A+ 220-901: Printer Sharing
After watching this video, you will be able to specify how to allow access to printers for printer sharing.
-
CompTIA A+ 220-901: Driver Support for Printers
After watching this video, you will be able to define the purpose of printer drivers.
-
CompTIA A+ 220-901: Bidirectional Devices
After watching this video, you will be able to describe bidirectional devices.
-
CompTIA A+ 220-901: Output Devices
After watching this video, you will be able to list output devices.
-
CompTIA A+ 220-901: Human Interface Devices
After watching this video, you will be able to describe human interface devices.
-
CompTIA A+ 220-901: Adapters and Converters
After watching this video, you will be able to compare adapters and converters.
-
CompTIA A+ 220-901: Device Cables and Connectors
After watching this video, you will be able to list the various cables and connectors.
-
CompTIA A+ 220-901: Display Cables
After watching this video, you will be able to recognize the various display cable types.
-
CompTIA A+ 220-901: Display Connectors
After watching this video, you will be able to describe the various display connector types.
-
CompTIA A+ 220-901: Different Monitor Features
After watching this video, you will be able to list the different monitor features.
-
CompTIA A+ 220-901: Different Types of Monitors
After watching this video, you will be able to recognize the different monitor types.
-
CompTIA A+ 220-901: Home Server
After watching this video, you will be able to recognize home server support.
-
CompTIA A+ 220-901: Thick and Thin Client Workstations
After watching this video, you will be able to compare thick and thin clients.
-
CompTIA A+ 220-901: Home Theater Workstation
After watching this video, you will be able to recognize home theater support.
-
CompTIA A+ 220-901: Gaming Workstation
After watching this video, you will be able to describe gaming support.
-
CompTIA A+ 220-901: Virtualized PC
After watching this video, you will be able to use virtualized PC support.
-
CompTIA A+ 220-901: Graphics and Audio/Video Designed Workstation
After watching this video, you will be able to list workstations to support graphics, audio, and video editing.
-
CompTIA A+ 220-901: Power Supply Specifications
After watching this video, you will be able to describe power supply specifications.
-
CompTIA A+ 220-901: Power Supply Types
After watching this video, you will be able to compare various power supply types.
-
CompTIA A+ 220-901: Wireless Connections
After watching this video, you will be able to describe wireless connections.
-
CompTIA A+ 220-901: Physical PC Connections
After watching this video, you will be able to describe the various PC connections.
-
CompTIA A+ 220-901: Characteristics and Cooling Options for CPUs
After watching this video, you will be able to compare the characteristics and cooling options for CPUs.
-
CompTIA A+ 220-901: Socket Types
After watching this video, you will be able to describe the various CPU types.
-
CompTIA A+ 220-901: Tape Drives
After watching this video, you will be able to describe tape drives.
-
CompTIA A+ 220-901: RAID Types
After watching this video, you will be able to describe RAID.
-
CompTIA A+ 220-901: Solid State and Flash Drives
After watching this video, you will be able to compare solid state and flash drives.
-
CompTIA A+ 220-901: Magnetic Hard Disk Drives
After watching this video, you will be able to list hard disk drive types.
-
CompTIA A+ 220-901: Optical Drives
After watching this video, you will be able to define optical drives.
-
CompTIA A+ 220-901: PC Expansion Cards
After watching this video, you will be able to compare the various expansion boards.
-
CompTIA A+ 220-901: Memory Configuration
After watching this video, you will be able to describe memory compatibility.
-
CompTIA A+ 220-901: Memory Parity and ECC
After watching this video, you will be able to compare and contrast parity and ECC.
-
CompTIA A+ 220-901: Media Capacity
After watching this video, you will be able to describe storage capacity.
-
CompTIA A+ 220-901: DDR, DDR2, DDR3, SODIMM, and DIMM
After watching this video, you will be able to compare and contrast various types of RAM.
-
CompTIA A+ 220-901: Motherboard Expansion Slots
After watching this video, you will be able to compare the motherboard expansion slots.
-
CompTIA A+ 220-901: Motherboard Types ITX
After watching this video, you will be able to list the various motherboard sizes for ITX.
-
CompTIA A+ 220-901: Motherboard Types ATX
After watching this video, you will be able to compare the various motherboard sizes for ATX.
-
CompTIA A+ 220-901: Motherboard Etymology
After watching this video, you will be able to describe motherboard etymology.
-
CompTIA A+ 220-901: BIOS/UEFI Boot Sequence
After watching this video, you will be able to describe BIOS/UEFI boot sequence.
-
CompTIA A+ 220-901: BIOS Component Information
After watching this video, you will be able to recognize BIOS components.
-
CompTIA A+ 220-901: Firmware Upgrades and BIOS
After watching this video, you will be able to describe firmware upgrades and BIOS.
-
CompTIA A+ 220-901: Primary Computing Functions
After watching this video, you will be able to describe primary computing functions.
-
CompTIA A+ 220-901: Motherboard Connectors
After watching this video, you will be able to list the various motherboard connectors.
-
CompTIA A+ 220-901: Motherboard Components
After watching this video, you will be able to contrast the various motherboard connections.
-
CompTIA A+ 220-901: Under the Hood
After watching this video, you will be able to describe the basic under-the-hood components of a computer.
-
Skype for Business 2015: Central Management Store
After watching this video, you will be able to understand the role of the CMS database.
-
Skype for Business 2015: Pool Pairing
After watching this video, you will be able to explain how pool pairing increases resiliency to failure.
-
Skype for Business 2015: DR Overview
After watching this video, you will be able to understand how disaster recovery and high availability differ.
-
Skype for Business 2015: AlwaysOn Availability Groups
After watching this video, you will be able to explan how availability groups provide high availability.
-
Skype for Business 2015: Load Balancing
After watching this video, you will be able to describe Skype for Business load balancing options.
-
Skype for Business 2015: Routing Groups
After watching this video, you will be able to explain how routing groups are relate to high availability.
-
Skype for Business 2015: Server Pooling
After watching this video, you will be able to describe how pooling servers provides high availability.
-
Skype for Business 2015: HA Overview
After watching this video, you will be able to describe the benefit of high availability.
-
Skype for Business 2015: Database Mirroring
After watching this video, you will be able to explain how database mirroring provides high availability.
-
Skype for Business 2015: Data Backups
After watching this video, you will be able to explain backup considerations for Skype for Business.
-
Skype for Business 2015: Failover
After watching this video, you will be able to describe how failover works.
-
Skype for Business 2015: Configure DNS Load Balancing Records
After watching this video, you will be able to improve availability using DNS load balancing.
-
Microsoft SharePoint 2016: SharePoint Upgrade
After watching this video, you will be able to determine which configurations might prevent a successful SharePoint 2016 upgrade.
-
Microsoft SharePoint 2016: Migrating On-premises to SharePoint Online
After watching this video, you will be able to plan and migrate SharePoint On-premises to SharePoint Online or a hybrid topology.
-
Microsoft SharePoint 2016: Performing the SharePoint Migration
After watching this video, you will be able to perform an upgrade by migration to SharePoint 2016.
-
Microsoft SharePoint 2016: Plan an Installation Sequence
After watching this video, you will be able to plan an installation sequence for SharePoint 2016.
-
Microsoft SharePoint 2016: Measure Upgrade Performance
After watching this video, you will be able to measure upgrade performance for SharePoint 2016.
-
Microsoft SharePoint 2016: Resolve Missing File System Components
After watching this video, you will be able to resolve missing file system components before upgrading to SharePoint 2016.
-
Microsoft SharePoint 2016: Resolve Orphan Objects
After watching this video, you will be able to resolve orphan objects before upgrading to SharePoint 2016.
-
Microsoft SharePoint 2016: Configure Web Application Authentication
After watching this video, you will be able to configure web application authentication for upgrading to SharePoint 2016.
-
Microsoft SharePoint 2016: Analyze Content Database Test Results
After watching this video, you will be able to analyze content database test results before upgrading to SharePoint 2016.
-
Microsoft SharePoint 2016: Perform Migration Precheck Tasks
After watching this video, you will be able to perform migration precheck tasks before upgrading to SharePoint 2016.
-
Microsoft SharePoint 2016: Configure Upgrade Farms
After watching this video, you will be able to configure upgrade farms for SharePoint 2016.
-
Microsoft SharePoint 2016: Configure Read-only Access for Content
After watching this video, you will be able to configure read-only access during an upgrade for content for SharePoint 2016.
-
Microsoft SharePoint 2016: Configure a Parallel Upgrade
After watching this video, you will be able to configure a parallel upgrade for SharePoint 2016.
-
Microsoft SharePoint 2016: Plan Removal of Servers in Rotation
After watching this video, you will be able to plan removal of servers in rotation during an upgrade for SharePoint 2016.
-
Microsoft SharePoint 2016: Resolve Configuration Conflict Issues
After watching this video, you will be able to resolve configuration conflict issues before upgrading to SharePoint 2016.
-
Microsoft SharePoint 2016: Enable a Developer Dashboard
After watching this video, you will be able to enable a SharePoint 2016 developer dashboard.
-
Microsoft SharePoint 2016: Analyze Usage Data
After watching this video, you will be able to analyze SharePoint 2016 usage data.
-
Microsoft SharePoint 2016: Perform Server-side Tracing
After watching this video, you will be able to perform SharePoint 2016 server-side tracing.
-
Microsoft SharePoint 2016: Perform Client-side Tracing
After watching this video, you will be able to perform SharePoint 2016 client-side tracing.
-
Microsoft SharePoint 2016: How to Prepare for a SharePoint Upgrade
After watching this video, you will be able to describe the relevant concerns in evaluating SharePoint 2016 content and customizations before upgrading.
-
Microsoft SharePoint 2016: Plan and Configure Zero Downtime Patching
After watching this video, you will be able to plan and configure SharePoint 2016 Zero Downtime Patching.
-
Microsoft SharePoint 2016: What Makes SharePoint Patching Challenging?
After watching this video, you will be able to describe the challenges and solutions available for patching SharePoint 2016.
-
Microsoft SharePoint 2016: Finding Diagnostic Information
After watching this video, you will be able to track down the correct information needed to help you resolve a SharePoint 2016 trouble ticket.
-
Microsoft SharePoint 2016: Troubleshooting SharePoint Hybrid Cloud Issues
After watching this video, you will be able to troubleshoot SharePoint 2016 hybrid cloud issues.
-
Microsoft SharePoint 2016: Analyze Diagnostic Logs
After watching this video, you will be able to analyze SharePoint 2016 diagnostic logs.
-
Microsoft SharePoint 2016: Monitor SharePoint Hybrid Cloud Deployments
After watching this video, you will be able to monitor SharePoint 2016 hybrid cloud deployments.
-
Microsoft SharePoint 2016: Monitor and Forecast Storage Needs
After watching this video, you will be able to monitor and forecast SharePoint 2016 storage needs.
-
Microsoft SharePoint 2016: Configure Usage and Health Providers
After watching this video, you will be able to configure SharePoint 2016 usage and health providers.
-
Microsoft SharePoint 2016: Establish Baseline Performance
After watching this video, you will be able to establish SharePoint 2016 baseline performance.
-
Microsoft SharePoint 2016: What is Involved in SharePoint Troubleshooting?
After watching this video, you will be able to describe the tools and techniques of SharePoint troubleshooting.
-
Microsoft SharePoint 2016: Plan and Configure Caching and a Caching Strategy
After watching this video, you will be able to plan and configure a SharePoint 2016 caching strategy.
-
Microsoft SharePoint 2016: Plan and Configure SQL Optimization
After watching this video, you will be able to plan and configure SQL optimization for SharePoint 2016.
-
Microsoft SharePoint 2016: Tune Network Performance
After watching this video, you will be able to tune SharePoint 2016 network performance.
-
Microsoft SharePoint 2016: Plan for Capacity Software Boundaries
After watching this video, you will be able to plan for SharePoint 2016 capacity software boundaries.
-
Microsoft SharePoint 2016: Adjusting Your Settings for SharePoint Optimization
After watching this video, you will be able to describe the goals and limitations of tuning a SharePoint 2016 environment for optimization.
-
Microsoft SharePoint 2016: Configure Page Performance Monitoring
After watching this video, you will be able to configure SharePoint 2016 page performance monitoring.
-
Microsoft SharePoint 2016: Configure Performance Counter Capture
After watching this video, you will be able to configure SharePoint 2016 performance counter capture.
-
Microsoft SharePoint 2016: Why SharePoint Admins Should Monitor Everything
After watching this video, you will be able to understand the requirements associated with monitoring SharePoint 2016.
-
Microsoft SharePoint 2016: Recovering a SharePoint Instance
After watching this video, you will be able to use the most appropriate method to recover a SharePoint 2016 farm.
-
Microsoft SharePoint 2016: Using Azure in your Backup and Recovery Solution
After watching this video, you will be able to configure a SharePoint 2016 recovery solution using SQL Database running in Azure and other Azure backup solutions.
-
Microsoft SharePoint 2016: How Can We Help Ensure SharePoint Recoverability?
After watching this video, you will be able to describe the tools and techniques used to create a recoverable SharePoint 2016 environment.
-
Microsoft SharePoint 2016: Plan for SQL Server Log Shipping
After watching this video, you will be able to plan for SQL Server Log shipping for SharePoint 2016.
-
Microsoft SharePoint 2016: Plan for SQL Server AlwaysOn Availability Groups
After watching this video, you will be able to Plan for SQL Server AlwaysOn Availability Groups for SharePoint 2016.
-
Microsoft SharePoint 2016: Plan for SQL Server Clustering
After watching this video, you will be able to plan for SQL Server clustering for SharePoint 2016.
-
Microsoft SharePoint 2016: Plan for SQL Server Aliases
After watching this video, you will be able to plan for SQL Server aliases for SharePoint 2016.
-
Microsoft SharePoint 2016: Plan for Network and Storage Redundancy
After watching this video, you will be able to plan for SharePoint 2016 network and storage redundancy.
-
Microsoft SharePoint 2016: Performing a Content Refresh to Another Farm
After watching this video, you will be able to plan a SharePoint 2016 nonproduction environment content refresh.
-
Microsoft SharePoint 2016: Recovering a Service Application
After watching this video, you will be able to plan for SharePoint 2016 service application recovery.
-
Microsoft SharePoint 2016: Recovering a Web Application or Site Collection
After watching this video, you will be able to plan for SharePoint 2016 content recovery.
-
Microsoft SharePoint 2016: Recovering a Farm
After watching this video, you will be able to plan for SharePoint 2016 farm configuration recovery.
-
Microsoft SharePoint 2016: Establishing Backup Schedules
After watching this video, you will be able to create a regular backup schedule in SharePoint or in SQL Server.
-
Microsoft SharePoint 2016: Plan and Configure Variations
After watching this video, you will be able to plan and configure SharePoint 2016 variations.
-
Microsoft SharePoint 2016: Plan and Configure Display Templates
After watching this video, you will be able to plan and configure SharePoint 2016 display templates.
-
Microsoft SharePoint 2016: Plan and Configure Content Deployment
After watching this video, you will be able to plan and configure SharePoint 2016 content deployment.
-
Microsoft SharePoint 2016: Plan and Configure Design Manager
After watching this video, you will be able to plan and configure SharePoint 2016 Design Manager.
-
Microsoft SharePoint 2016: Plan and Configure Product Catalog and Topic Pages
After watching this video, you will be able to plan and configure SharePoint 2016 product catalog and topic pages.
-
Microsoft SharePoint 2016: Plan and Configure Channels
After watching this video, you will be able to plan and configure SharePoint 2016 channels.
-
Microsoft SharePoint 2016: What is Web Content Management (WCM)?
After watching this video, you will be able to define and understand what SharePoint 2016 web content management (WCM) supports.
-
Microsoft SharePoint 2016: Plan for Server Distribution and Load Balancing
After watching this video, you will be able to plan for SharePoint 2016 physical server distribution and server load balancing.
-
Microsoft SharePoint 2016: Plan for Service Distribution
After watching this video, you will be able to plan for SharePoint 2016 service distribution.
-
Microsoft SharePoint 2016: How Can We Help Ensure SharePoint High Availability?
After watching this video, you will be able to describe the tools and techniques used to create a highly available SharePoint 2016 environment.
-
Microsoft SharePoint 2016: Records Management
After watching this video, you will be able to correctly define a records management site for disposition and retention.
-
Microsoft SharePoint 2016: Plan and Configure Record Disposition and Retention
After watching this video, you will be able to plan and configure SharePoint 2016 record disposition and retention.
-
Microsoft SharePoint 2016: Plan and Configure Durable Links
After watching this video, you will be able to plan and configure SharePoint 2016 durable links.
-
Microsoft SharePoint 2016: Plan and Configure Co-Authoring
After watching this video, you will be able to plan and configure SharePoint 2016 co-authoring.
-
Microsoft SharePoint 2016: Plan and Configure Document Routing
After watching this video, you will be able to plan and configure SharePoint 2016 document routing.
-
Microsoft SharePoint 2016: Plan and Configure E-Discovery
After watching this video, you will be able to plan and configure SharePoint 2016 E-Discovery.
-
Microsoft SharePoint 2016: What is Enterprise Content Management (ECM)?
After watching this video, you will be able to define and understand what SharePoint 2016 Enterprise Content Management (ECM) supports.
-
Microsoft SharePoint 2016: Exercise: Creating a Hybrid SharePoint Solution
After watching this video, you will be able to correctly configure hybrid SharePoint 2016 settings.
-
Microsoft SharePoint 2016: Configure Hybrid BCS
After watching this video, you will be able to configure hybrid SharePoint 2016 Business Data Connection Services (BCS).
-
Microsoft SharePoint 2016: Plan and Configure Data Loss Prevention
After watching this video, you will be able to plan and configure SharePoint 2016 data loss prevention, in-place holds, and document deletion features.
-
Microsoft SharePoint 2016: Plan and Configure Software Boundaries
After watching this video, you will be able to plan and configure SharePoint 2016 software boundaries.
-
Microsoft SharePoint 2016: Plan Large Document Repositories
After watching this video, you will be able to plan SharePoint 2016 large document repositories.
-
Microsoft SharePoint 2016: Additional Site Level Security Settings
After watching this video, you will be able to manage SharePoint 2016 anonymous access and HTML field security.
-
Microsoft SharePoint 2016: Configure SharePoint Permissions and Sharing
After watching this video, you will be able to use SharePoint 2016 permissions settings as well as SharePoint sharing tools.
-
Microsoft SharePoint 2016: Plan and Configure SharePoint Users and Groups
After watching this video, you will be able to plan and configure SharePoint 2016 users and groups.
-
Microsoft SharePoint 2016: Defining Site Collection and Site Security
After watching this video, you will be able to identify SharePoint 2016 site collection and site level security issues that need management.
-
Microsoft SharePoint 2016: Configure Web Application Policies
After watching this video, you will be able to plan and configure anonymous access and web application policies in SharePoint 2016.
-
Microsoft SharePoint 2016: Creating a Secure SharePoint Environment
After watching this video, you will be able to Create an SharePoint 2016 environment that has secure authentication and authorization.
-
Microsoft SharePoint 2016: Configure Delegated Service Administration
After watching this video, you will be able to configure SharePoint 2016 delegated service application administration.
-
Microsoft SharePoint 2016: Configure Kerberos for Service Applications
After watching this video, you will be able to plan for SharePoint 2016 Kerberos support for service applications.
-
Microsoft SharePoint 2016: Defining Service Application Security
After watching this video, you will be able to identify SharePoint 2016 service application security issues that need management.
-
Microsoft SharePoint 2016: Plan and Configure Information Rights Management
After watching this video, you will be able to plan and configure SharePoint 2016 information rights management (IRM).
-
Microsoft SharePoint 2016: What Are Search Engine Optimization (SEO) Settings?
After watching this video, you will be able to identify when and how to enable search engine optimization settings in SharePoint 2016.
-
Microsoft SharePoint 2016: Crafting the Result Page
After watching this video, you will be able to use SharePoint 2016 display templates and result types.
-
Microsoft SharePoint 2016: Defining the End User Search Experience
After watching this video, you will be able to use SharePoint 2016 result sources, search schema, analytics, and the enterprise search site.
-
Microsoft SharePoint 2016: Restraining Search
After watching this video, you will be able to use crawl rules to manage SharePoint 2016 search performance.
-
Microsoft SharePoint 2016: Secure Web Application Connections
After watching this video, you will be able to plan connection encryption in SharePoint 2016.
-
Microsoft SharePoint 2016: Configure Authentication
After watching this video, you will be able to plan and configure web application authentication settings in SharePoint 2016.
-
Microsoft SharePoint 2016: Defining Web Application Security
After watching this video, you will be able to identify web application level security issues that need management in SharePoint 2016.
-
Microsoft SharePoint 2016: Configure Farm Security
After watching this video, you will be able to configure farm security settings in SharePoint 2016.
-
Microsoft SharePoint 2016: Defining Farm Security
After watching this video, you will be able to identify farm level security issues that need management in SharePoint 2016.
-
Microsoft SharePoint 2016: Defining Search Parameters
After watching this video, you will be able to configure the correct settings for SharePoint 2016 enterprise search based upon a given scenario.
-
Microsoft SharePoint 2016: Configure a SharePoint Hybrid Installation
After watching this video, you will be able to configure SharePoint 2016 hybrid cloud settings.
-
Microsoft SharePoint 2016: Plan and Configure Excel Services via Office Online
After watching this video, you will be able to plan and configure Excel Services (Office Online only).
-
Microsoft SharePoint 2016: What is a SharePoint Hybrid Architecture?
After watching this video, you will be able to describe the structure and purpose of a SharePoint 2016 hybrid architecture.
-
Microsoft SharePoint 2016: Plan and Configure PowerPivot
After watching this video, you will be able to plan and configure PowerPivot.
-
Microsoft SharePoint 2016: Plan and Configure PowerView
After watching this video, you will be able to plan and configure PowerView.
-
Microsoft SharePoint 2016: Plan and Configure Reporting Services
After watching this video, you will be able to plan and configure reporting services.
-
Microsoft SharePoint 2016: Plan and Configure Performance Point
After watching this video, you will be able to plan and configure Performance Point and BI security.
-
Microsoft SharePoint 2016: What BI Tools are Available in SharePoint?
After watching this video, you will be able to describe the tools used to extract Business Intelligence in SharePoint 2016.
-
Microsoft SharePoint 2016: Configure SharePoint Hybrid Security
After watching this video, you will be able to configure SharePoint 2016 connections to Access Control Service and authentication for hybrid cloud deployment.
-
Microsoft SharePoint 2016: Configure Hybrid Settings
After watching this video, you will be able to configure SharePoint 2016 hybrid features including OneDrive Redirection, Hybrid Audiences, and Picker tools.
-
Microsoft SharePoint 2016: Configure SharePoint Hybrid Search
After watching this video, you will be able to configure SharePoint 2016 hybrid search settings.
-
Microsoft SharePoint 2016: Integrate SharePoint with Exchange
After watching this video, you will be able to connect SharePoint 2016 and Exchange Server.
-
Microsoft SharePoint 2016: Integrate SharePoint with Office Online
After watching this video, you will be able to connect SharePoint 2016 and Office Online.
-
Microsoft SharePoint 2016: Plan and Install Office Online Server
After watching this video, you will be able to plan and install Office Online Server.
-
Microsoft SharePoint 2016: Connecting SharePoint With Other On-premise Products
After watching this video, you will be able to describe the needs of integrating SharePoint with other Microsoft products.
-
Microsoft SharePoint 2016: Deploying Service Applications
After watching this video, you will be able to deploy the correct SharePoint 2016 service application for a given scenario.
-
Microsoft SharePoint 2016: Plan Translation Services in SharePoint 2016
After watching this video, you will be able to create and configure Translation Services in SharePoint 2016.
-
Microsoft SharePoint 2016: Plan PowerPoint Conversion in SharePoint 2016
After watching this video, you will be able to create and configure PowerPoint Conversion in SharePoint 2016.
-
Microsoft SharePoint 2016: Plan Word Automation Services in SharePoint 2016
After watching this video, you will be able to create and configure Word Automation Services in SharePoint 2016.
-
Microsoft SharePoint 2016: Integrate and Separate SharePoint Farms
After watching this video, you will be able to connect SharePoint 2016 farms to each other.
-
Microsoft SharePoint 2016: Integrate SharePoint with Project Server 2016
After watching this video, you will be able to connect SharePoint 2016 and Project Server 2016.
-
Microsoft SharePoint 2016: Integrate SharePoint Insights & Telemetry Features
After watching this video, you will be able to install SharePoint Insights and Server Telemetry features.
-
Microsoft SharePoint 2016: Deploying Add-ins (Apps) in SharePoint
After watching this video, you will be able to deploy add-ins (apps) in SharePoint.
-
Microsoft SharePoint 2016: Using the App Store
After watching this video, you will be able to create and configure App Store subscriptions.
-
Microsoft SharePoint 2016: Building the App (Add-In) Environment
After watching this video, you will be able to create and configure the App Store.
-
Microsoft SharePoint 2016: Deploying Sandbox Solutions
After watching this video, you will be able to deploy and manage sandbox solutions.
-
Microsoft SharePoint 2016: Deploying Farm Solutions
After watching this video, you will be able to deploy and upgrade farm solutions.
-
Microsoft SharePoint 2016: How Can Developers Customize SharePoint?
After watching this video, you will be able to understand how SharePoint can be extended with farm solutions, sandbox solutions, and add-ins.
-
Microsoft SharePoint 2016: Use a Secure Store Application in a BCS Model
After watching this video, you will be able to incorporate the Secure Store Service with BCS.
-
Microsoft SharePoint 2016: Plan Visio Services in SharePoint 2016
After watching this video, you will be able to create and configure Visio Services in SharePoint 2016.
-
Microsoft SharePoint 2016: Plan Access Services in SharePoint 2016
After watching this video, you will be able to create and configure Access Services in SharePoint 2016.
-
Microsoft SharePoint 2016: What Additional Services Does SharePoint 2016 Offer?
After watching this video, you will be able to describe the purpose of several additional SharePoint Service Applications.
-
Microsoft SharePoint 2016: Building Community Sites
After watching this video, you will be able to plan and configure community sites.
-
Microsoft SharePoint 2016: Connecting with Yammer
After watching this video, you will be able to configure SharePoint's Yammer settings.
-
Microsoft SharePoint 2016: Planning My Sites
After watching this video, you will be able to configure SharePoint My Sites.
-
Microsoft SharePoint 2016: Configuring the UPA
After watching this video, you will be able to secure and configure a UPA application.
-
Microsoft SharePoint 2016: Defining a User Profile Service Application (UPA)
After watching this video, you will be able to create a SharePoint UPA.
-
Microsoft SharePoint 2016: What Is Social Computing in SharePoint?
After watching this video, you will be able to define and understand the components of SharePoint social computing.
-
Microsoft SharePoint 2016: Create and Configure a Secure Store Application
After watching this video, you will be able to create and configure a Secure Store Application.
-
Microsoft SharePoint 2016: Using a BCS Application for Sites and Search
After watching this video, you will be able to incorporate BCS into site data and search.
-
Microsoft SharePoint 2016: Create and Configure a Business Connectivity Service
After watching this video, you will be able to create and secure a BCS model.
-
Microsoft SharePoint 2016: Why Connect SharePoint to Your Business Data?
After watching this video, you will be able to define and understand the importance of the BCS and Secure Store Applications.
-
Securing Windows Server 2016: Managing Local Policy on Nano Server
After watching this video, you will be able to manage local policy on Nano Server.
-
Terraform: Creating an IAM User With Admin Permissions
After watching this video, you will be able to create an IAM user in AWS that has administrative permissions.
-
Terraform: Modules
After watching this video, you will be able to configure modules in Terraform.
-
Terraform: Install Terraform on Ubuntu Linux
After watching this video, you will be able to install Terraform on the Ubuntu Linux platform.
-
Terraform: Install Terraform on MacOSX
After watching this video, you will be able to install Terraform on the MacOSX platform.
-
Terraform: Creating Access Keys and Key Pairs for an IAM User
After watching this video, you will be able to create access keys and key pairs for an IAM user in AWS.
-
Application Performance Engineering: Installation and Licensing
After watching this video, you will be able to identify key aspects of installing, licensing, and updating ANTS.
-
Application Performance Engineering: Overview of ANTS Performance Profiler
After watching this video, you will be able to recognize key features of the ANTS Performance Profiler tool including the system requirements.
-
Application Performance Engineering: SQL Query Profiling
After watching this video, you will be able to view SQL Query profiling results and navigate key options.
-
Application Performance Engineering: Configuring Advanced Options
After watching this video, you will be able to recognize key advanced options.
-
Application Performance Engineering: Chart Performance Counters
After watching this video, you will be able to identify various performance counters and set up custom counters.
-
Application Performance Engineering: Profile Sessions
After watching this video, you will be able to set up new profiling session, choose profiling mode, and start profiling.
-
Application Performance Engineering: Identify Key Functions of IBM APA
After watching this video, you will be able to recognize the various configuration options required to specify new observations in IBM APA.
-
Application Performance Engineering: Reporting
After watching this video, you will be able to navigate the report view, including the toolbar.
-
Application Performance Engineering: Observation Reports List
After watching this video, you will be able to navigate the Observation Reports List, including the tool bar.
-
Application Performance Engineering: The Execution Plan Diagram
After watching this video, you will be able to recognize key features of the execution plan diagram.
-
Application Performance Engineering: Database Calls View
After watching this video, you will be able to recognize key features of the database calls view.
-
Application Performance Engineering: The Call Graph
After watching this video, you will be able to recognize key features of the call graph.
-
Application Performance Engineering: The Methods Grid
After watching this video, you will be able to recognize key features of the methods tree.
-
Application Performance Engineering: Overview of IBM APA
After watching this video, you will be able to recognize key features of IBM's APA and licensing requirements.
-
Application Performance Engineering: ANTS Performance Profiler Key Features
After watching this video, you will be able to recognize key features of the ANTS performance profiler including the various methods for viewing different results.
-
Application Performance Engineering: Navigating Source Code
After watching this video, you will be able to use source code pane to navigate method source codes.
-
Application Performance Engineering: HTTP Requests
After watching this video, you will be able to view client and outgoing requests.
-
Application Performance Engineering: The Call Tree
After watching this video, you will be able to recognize key features of the calltree.
-
Application Performance Engineering: The Timeline
After watching this video, you will be able to recognize key features of the timeline.
-
Application Performance Engineering: I/O Profiling
After watching this video, you will be able to enable, view, and navigate I/O profiling results including code linking.
-
Application Performance Engineering: Options Tab
After watching this video, you will be able to identify important aspects of the options tab when configuring new observations.
-
Application Performance Engineering: Job Information Tab
After watching this video, you will be able to identify important aspects of the job information tab when configuring new observations.
-
Application Performance Engineering: Observations List
After watching this video, you will be able to navigate the Observations List view.
-
Application Performance Engineering: STC and System Properties
After watching this video, you will be able to navigate through the STC Properties View and the System Properties View.
-
Application Performance Engineering: Sched Options Tab
After watching this video, you will be able to identify important aspects of the sched options tab when configuring new observations.
-
Application Performance Engineering: Schedule Tab
After watching this video, you will be able to identify important aspects of the schedule tab when configuring new observations.
-
Application Performance Engineering: Subsystems Tab
After watching this video, you will be able to identify important aspects of the subsystems tab when configuring new observations.
-
Application Performance Engineering: Multistep Tab and Active Jobs Tab
After watching this video, you will be able to identify important aspects of the multistep tab when configuring new observations.
-
Application Performance Engineering: Source Program Mapping Repository
After watching this video, you will be able to configure source program mapping repository.
-
Application Performance Engineering: Recognizing Key APA GUI Tools and Preferences
After watching this video, you will be able to recognize the key tools in the APA GUI.
-
Application Performance Engineering: Establishing a New Connection
After watching this video, you will be able to establish a connection and log on to a z/OS.
-
Application Performance Engineering: HeapAnalyzer Tool
After watching this video, you will be able to recognize key features of IBM PMAT, including system requirements.
-
Application Performance Engineering: Navigating the View Tab
After watching this video, you will be able to configure key options in the view tab.
-
Application Performance Engineering: Use Gaps by Size and Gap Statistics
After watching this video, you will be able to navigate through the Gap by Size and Gap statistics and recognize what each is used for.
-
Application Performance Engineering: Navigate the List Analysis
After watching this video, you will be able to navigate through the objects list, types list, and root list, and recognize what each is used for.
-
Application Performance Engineering: Use the Tree View Analysis
After watching this video, you will be able to use the Tree View analysis.
-
Application Performance Engineering: Run HeapAnalyzer
After watching this video, you will be able to run the IBM heapanalyzer tool and process a heap dump.
-
Application Performance Engineering: Graph View
After watching this video, you will be able to generate a Graph View and use key buttons to display various data.
-
Application Performance Engineering: GC Table View
After watching this video, you will be able to generate a GC Table View and recognize its components.
-
Application Performance Engineering: Verbosegc Data Analysis
After watching this video, you will be able to navigate the console monitor and perform an analysis of verbosegc data.
-
Application Performance Engineering: Running the IBM PMAT Tool
After watching this video, you will be able to run the IBM PMAT tool.
-
Application Performance Engineering: Data Summaries
After watching this video, you will be able to generate a usage summary, duration summary, and AF summary, and recognize what each type reports.
-
Application Performance Engineering: Histogram Grouping
After watching this video, you will be able to group histogram by class, by class loader, and by package, and distinguish between these three methods.
-
Application Performance Engineering: Generating a Histogram
After watching this video, you will be able to generate a histogram and use the functionality within the context menu.
-
Application Performance Engineering: Navigating the Overview Tab
After watching this video, you will be able to recognize key aspects of the overview tab, including drilling down through a slice of the pie chart.
-
Application Performance Engineering: Leak Report
After watching this video, you will be able to generate a leak report.
-
Application Performance Engineering: Path to GC Roots
After watching this video, you will be able to use the Path to GC Roots.
-
Application Performance Engineering: Dominator Tree
After watching this video, you will be able to use the dominator tree display.
-
Application Performance Engineering: Running Class Loader Explorer
After watching this video, you will be able to use the Class Loader Explorer.
-
Application Performance Engineering: Running the Memory Analyzer
After watching this video, you will be able to run memory analyzer and open a heap dump.
-
Application Performance Engineering: Installing Memory Analyzer
After watching this video, you will be able to install the memory analyzer tool using IBM Support Assistant Tools Administration.
-
Application Performance Engineering: IBM Memory Analyzer Tool and Eclipse Memory Analyzer
After watching this video, you will be able to recognize key features of the IBM Memory Analyzer, including system requirements and how it relates to the Eclipse Memory Analyzer.
-
Application Performance Engineering: Configure the HeapAnalyzer
After watching this video, you will be able to configure key features in the options menu.
-
Application Performance Engineering: Printing a Histogram
After watching this video, you will be able to print a histogram using jmap.
-
Terraform: String and Boolean Variables
After watching this video, you will be able to use strings in Terraform.
-
Application Performance Engineering: Print a Heap Summary
After watching this video, you will be able to print a heap summary using jmap.
-
Terraform: Variable Parameters
After watching this video, you will be able to identify the parameters that can be set.
-
Application Performance Engineering: Generating Heap Dumps
After watching this video, you will be able to generate a heap dump using jmap.
-
Terraform: Variable Configuration
After watching this video, you will be able to configure variables in Terraform.
-
Application Performance Engineering: The jmap Tool
After watching this video, you will be able to recognize key features of jmap.
-
Terraform: Use Terraform Provisioners and Modules
After watching this video, you will be able to use modules in Terraform.
-
Terraform: Lists in Terraform
After watching this video, you will be able to define lists in Terraform.
-
Terraform: Assign Variables
After watching this video, you will be able to assign variables in Terraform.
-
Terraform: Using Input Variables in Terraform
After watching this video, you will be able to use variables to replace providor configuration.
-
Terraform: Input Variables
After watching this video, you will be able to define input variables within your Terraform confirguation.
-
Terraform: Assigning Maps
After watching this video, you will be able to assign maps in Terraform.
-
Terraform: Maps in Terraform
After watching this video, you will be able to use maps in Terraform.
-
Application Performance Engineering: The jstack Tool
After watching this video, you will be able to recognize key features of the jstack tool.
-
Terraform: Defining Output Variables
After watching this video, you will be able to define output variables within your Terraform configuration.
-
Application Performance Engineering: Pattern Modelling Analysis Tool
After watching this video, you will be able to recognize key features of IBM PMAT, including system requirements and known issues.
-
Application Performance Engineering: Limitations and Known Issues with jstack
After watching this video, you will be able to recognize limitations and known issues with jstack.
-
Application Performance Engineering: Key jstack Options
After watching this video, you will be able to use key options with jstack.
-
Terraform: Using Variables in Terraform
After watching this video, you will be able to use variables in Terraform.
-
Application Performance Engineering: Print a Stack Trace
After watching this video, you will be able to print a stack trace for a process, core file, or remote debug server.
-
Terraform: Viewing Output Variables in Terraform
After watching this video, you will be able to run terraform apply to populate your output.
-
Application Performance Engineering: Browse Heap Dumps
After watching this video, you will be able to use jhat to browse heap dumps.
-
Securing Windows Server 2016: Managing EFS Certificates
After watching this video, you will be able to manage EFS certificates.
-
Application Performance Engineering: The jhat Tool
After watching this video, you will be able to recognize key features of jhat for performance analysis.
-
Application Performance Engineering: Limitations and Known Issues with jmap
After watching this video, you will be able to recognize limitations and known issues using jmap.
-
Application Performance Engineering: Generate Class Loader Statistics
After watching this video, you will be able to generate class loader statistics using jmap.
-
Application Performance Engineering: Limitations and Known Issues with jhat
After watching this video, you will be able to recognize limitations and known issues with jhat.
-
Application Performance Engineering: Key jhat Options
After watching this video, you will be able to use key options with jhat.
-
Application Performance Engineering: Navigate Key Functionality
After watching this video, you will be able to navigate user interface and key functionality and reporting.
-
Application Performance Engineering: Install and Run the Thread and Monitor Dump Analyzer
After watching this video, you will be able to install and run the Thread and Monitor Dump Analyzer.
-
Application Performance Engineering: IBM Thread and Monitor Dump Analyzer Tool
After watching this video, you will be able to recognize key features of the IBM Thread and Monitor Dump Analyzer Tool including system requirements.
-
Application Performance Engineering: Logs, Tables, and Graphs
After watching this video, you will be able to view Logs, Tables, and Graphs.
-
Application Performance Engineering: Use Java and IBM Analysis Tools
After watching this video, you will be able to perform basic application performance analysis using Java and IBM performance analysis tools.
-
Application Performance Engineering: GCMV Interface
After watching this video, you will be able to navigate key features of the GCMV interface.
-
Application Performance Engineering: Installing/Running the GC and Memory Visualizer Tool
After watching this video, you will be able to install and run the GC and Memory Visualizer tool using IBM Support Assistant Workbench, load application verbose gc output data.
-
Application Performance Engineering: Garbage Collection and Memory Visualizer Tool
After watching this video, you will be able to recognize key features of the IBM Garbage Collection and Memory Visualizer Tool including system requirements.
-
Unix Essentials: Modifying a Group
After watching this video, you will be able to modify a Unix group from the command line.
-
Unix Essentials: Creating a Group
After watching this video, you will be able to create a Unix group from the command line.
-
Unix Essentials: Deleting a User Account
After watching this video, you will be able to delete a Unix user account from the command line.
-
Unix Essentials: Modifying a User Account
After watching this video, you will be able to modify a Unix user account from the command line.
-
Unix Essentials: SSH Into Unix Using PuTTY
After watching this video, you will be able to use PuTTY to establish Secure Shell (SSH) connection to a Unix host.
-
Unix Essentials: Enabling SSH Public Key Authentication
After watching this video, you will be able to enhance sign-in security with SSH public key authentication.
-
Unix Essentials: Unix Authentication Options
After watching this video, you will be able to describe various Unix user authentication options.
-
Unix Essentials: Deleting a Group
After watching this video, you will be able to delete a Unix group from the command line.
-
Unix Essentials: Create Users and Groups
After watching this video, you will be able to manage users and groups as well as authentication.
-
Unix Essentials: SSH Into Unix Using the SSH Command
After watching this video, you will be able to connect to a Unix host using the Secure Shell (SSH) protocol.
-
Unix Essentials: Standard Unix File System Permissions
After watching this video, you will be able to describe how Unix file system permissions work.
-
Unix Essentials: Special Permission Bits
After watching this video, you will be able to explain the purpose of Unix special permission bits.
-
Unix Essentials: Assigning Permissions Using ACLs
After watching this video, you will be able to use setfacl to assign ACL file system permissions.
-
Unix Essentials: File System Extended ACLs
After watching this video, you will be able to describe how ACLs provide added file system security.
-
Unix Essentials: Setting File System Permissions
After watching this video, you will be able to use chmod to set file system permissions.
-
Unix Essentials: Firewall Overview
After watching this video, you will be able to describe how firewall solutions protect hosts.
-
Unix Essentials: Configuring Sudo
After watching this video, you will be able to enable standard users to run privileged commands.
-
Unix Essentials: Elevated Privileges
After watching this video, you will be able to identify the importance of not logging in as root.
-
Unix Essentials: Assigning Special Permissions
After watching this video, you will be able to use chmod to set special permission bits.
-
Unix Essentials: Configuring the OpenBSD PF Firewall
After watching this video, you will be able to protect a Unix host from unwanted network traffic.
-
UNIX Essentials: Unix Deployment Options
After watching this video, you will be able to choose an appropriate Unix deployment option.
-
UNIX Essentials: Unix Overview
After watching this video, you will be able to describe the Unix operating system and how it is used.
-
UNIX Essentials: Creating a VMware FreeBSD Virtual Machine
After watching this video, you will be able to configure a VMware virtual machine using a FreeBSD disk image.
-
UNIX Essentials: Acquiring the FreeBSD VMware Image
After watching this video, you will be able to download and extract the FreeBSD VMware image.
-
UNIX Essentials: Installing FreeBSD from the DVD ISO
After watching this video, you will be able to perform a manual installation of a FreeBSD virtual machine.
-
UNIX Essentials: Acquiring the FreeBSD DVD ISO
After watching this video, you will be able to download the FreeBSD DVD ISO image.
-
UNIX Essentials: Unix Command Overview
After watching this video, you will be able to recognize standard Unix command line syntax.
-
UNIX Essentials: Exercise: Recall How Unix Can Be Installed
After watching this video, you will be able to list Unix deployment methods.
-
UNIX Essentials: Connecting to FreeBSD in the AWS Cloud
After watching this video, you will be able to make an SSH connection to a cloud-based FreeBSD virtual machine.
-
UNIX Essentials: Deploying FreeBSD in the AWS Cloud
After watching this video, you will be able to deploy a FreeBSD cloud-based virtual machine from a virtual machine image.
-
UNIX Essentials: Exploring Unix Shells and man Pages
After watching this video, you will be able to view man pages and switch between shells.
-
UNIX Essentials: Unix Shells
After watching this video, you will be able to list commonly used Unix shells.
-
UNIX Essentials: Unix Configuration Files
After watching this video, you will be able to describe Unix configuration file standards.
-
UNIX Essentials: The X Window System
After watching this video, you will be able to describe the X Window System and its benefits.
-
UNIX Essentials: Manage Unix With Common Commands
After watching this video, you will be able to perform common Unix tasks at the command line.
-
UNIX Essentials: Use the nano Text Editor
After watching this video, you will be able to edit files using the nano text editor.
-
UNIX Essentials: Unix Logs
After watching this video, you will be able to view Unix log files.
-
Unix Essentials: Navigating Unix File Systems
After watching this video, you will be able to use common Unix file system navigation commands.
-
Unix Essentials: File System Overview
After watching this video, you will be able to identify Unix file system concepts.
-
UNIX Essentials: Exercise: Recall Unix Commands
After watching this video, you will be able to use the Unix GUI and command line for management.
-
UNIX Essentials: Configure the Xorg X Window System
After watching this video, you will be able to configure the Unix X Window System.
-
Unix Essentials: Partitioning a Disk
After watching this video, you will be able to perform disk partitioning and the creation of file systems.
-
Unix Essentials: Searching for Files
After watching this video, you will be able to use the find command to search for files.
-
Unix Essentials: File System Mounting
After watching this video, you will be able to mount a file system to make it usable.
-
Unix Essentials: File Archiving
After watching this video, you will be able to use the tar command to archive files and directories.
-
Unix Essentials: Mounting a Network File System (NFS)
After watching this video, you will be able to mount an NFS file system.
-
Unix Essentials: Mounting an SMB File System
After watching this video, you will be able to mount an SMB file system.
-
Unix Essentials: Samba and Network File System (NFS)
After watching this video, you will be able to describe Samba and NFS.
-
Unix Essentials: Creating a User Account
After watching this video, you will be able to create a Unix user account from the command line.
-
Unix Essentials: Unix Users and Groups
After watching this video, you will be able to define how Unix users and groups are created and managed.
-
Unix Essentials: Configure Local and Remote File Systems
After watching this video, you will be able to create and manage Unix file systems.
-
Unix Essentials: Repairing Damaged File Systems
After watching this video, you will be able to use Unix commands to repair file systems.
-
PowerShell Essentials: Creating a DSC Configuration for a Linux Node
After watching this video, you will be able to describe how to create a DSC configuration for a Linux node.
-
PowerShell Essentials: Create a JEA Endpoint
After watching this video, you will be able to demonstrate how to create a JEA endpoint.
-
PowerShell Essentials: Overview of JEA
After watching this video, you will be able to describe the purpose of JEA.
-
PowerShell Essentials: Examining a Linux Machine's Config and Metaconfig
After watching this video, you will be able to demonstrate how to examine a Linux machine's config and metaconfig.
-
PowerShell Essentials: Publishing a Linux DSC Config
After watching this video, you will be able to demonstrate how to publish a Linux DSC config.
-
PowerShell Essentials: Resetting a JEA Endpoint
After watching this video, you will be able to demonstrate how to reset a JEA endpoint.
-
PowerShell Essentials: Testing a JEA Endpoint
After watching this video, you will be able to demonstrate how to test a JEA endpoint.
-
Kubernetes: Volumes
After watching this video, you will be able to work with volumes in Kubernetes.
-
Kubernetes: Services
After watching this video, you will be able to use Services in Kubernetes.
-
Kubernetes: Names
After watching this video, you will be able to describe Names in Kubernetes.
-
Kubernetes: Secrets and ConfigMap
After watching this video, you will be able to use Secrets and ConfigMaps in Kubernetes.
-
Kubernetes: ReplicationControllers
After watching this video, you will be able to work with a ReplicationController in Kubernetes.
-
Kubernetes: Ingress
After watching this video, you will be able to work with Ingress objects in Kubernetes.
-
Kubernetes: Labels and Selectors
After watching this video, you will be able to work with labels and selectors in Kubernetes.
-
Kubernetes: Annotations
After watching this video, you will be able to work with annotations in Kubernetes.
-
Kubernetes: PetSets
After watching this video, you will be able to work with PetSets in Kubernetes.
-
Kubernetes: Namespaces
After watching this video, you will be able to use namespaces in Kubernetes.
-
Kubernetes: gcloud and Kubectl
After watching this video, you will be able to use gcloud and kubectl.
-
Kubernetes: Kubectl Command-line Tool
After watching this video, you will be able to install the kubectl command-line tool in the Google Cloud SDK shell.
-
Kubernetes: Deploying Containers
After watching this video, you will be able to deploy containers from Google Cloud Launcher to Kubernetes.
-
Kubernetes: Cleaning Up Google Cloud Platform
After watching this video, you will be able to delete clusters and services using the Google Cloud SDK Shell.
-
Kubernetes: Pods
After watching this video, you will be able to work with pods in Kubernetes.
-
Kubernetes: Nodes
After watching this video, you will be able to use nodes in Kubernetes.
-
Kubernetes: Compute Engine Dashboard and API Overview
After watching this video, you will be able to use the compute engine dashboard and API.
-
Kubernetes: Kubernetes Engine Dashboards
After watching this video, you will be able to use the Kubernetes Engine dashboards on the Google Cloud Platform.
-
Kubernetes: Containers
After watching this video, you will be able to work with containers in Kubernetes.
-
Kubernetes: Use Kubernetes on Google Cloud Platform
After watching this video, you will be able to work with Kubernetes on the Google Cloud Platform.
-
Kubernetes: Cleaning up after Docker
After watching this video, you will be able to work with Docker commands to clean up images and containers.
-
Kubernetes: Installing Minikube on Windows 10
After watching this video, you will be able to install Minikube on a Windows 10 local machine.
-
Kubernetes: Kubernetes on a Local Machine
After watching this video, you will be able to describe using Kubernetes on a local machine.
-
Kubernetes: Using Google Cloud Shell
After watching this video, you will be able to use Google Cloud Shell to create a Kubernetes cluster.
-
Kubernetes: Kubernetes Clusters on Google Cloud Platform
After watching this video, you will be able to create a Kubernetes cluster using the Google Cloud Platform Console.
-
Kubernetes: Google Cloud SDK
After watching this video, you will be able to install the Google Cloud SDK.
-
Kubernetes: Install Kubernetes on Ubuntu Linux
After watching this video, you will be able to install Kubernetes on an Ubuntu Linux local machine.
-
Kubernetes: Installing Minikube on a Mac OS
After watching this video, you will be able to install Minikube locally on a Mac operating system.
-
Kubernetes: Use Kubernetes on a Local Machine
After watching this video, you will be able to use Kubernetes on a local machine.
-
Kubernetes: Kubectl Command Line Interface Tool
After watching this video, you will be able to use Kubectl command line interface tool.
-
Kubernetes: Working with Docker
After watching this video, you will be able to work with Docker.
-
Kubernetes: Installing Docker
After watching this video, you will be able to install Docker.
-
Kubernetes: Docker Swarms
After watching this video, you will be able to work with Docker Swarms.
-
Kubernetes: Docker Hub
After watching this video, you will be able to navigate and use Docker Hub.
-
Kubernetes: Introduction to Docker
After watching this video, you will be able to describe Docker and how it is used with Kubernetes.
-
Kubernetes: What Is Kubernetes?
After watching this video, you will be able to describe Kubernetes and how it is used for container management.
-
Securing Windows Server 2016 : Define Windows Malware Solutions
After watching this video, you will be able to recognize Windows Malware Solutions.
-
Securing Windows Server 2016: Secure the Network Infrastructure
After watching this video, you will be able to use mechanisms for securing the network infrastructure.
-
Securing Windows Server 2016: Overview of File Encryption
After watching this video, you will be able to describe the value features of Windows Server 2016 file encryption.
-
Kubernetes: Using the Kubernetes API
After watching this video, you will be able to work with the Kubernetes API.
-
Securing Windows Server 2016: Recall Features of File Encryption
After watching this video, you will be able to describe features of file encryption.
-
Securing Windows Server 2016: Comparing EFS and BitLocker
After watching this video, you will be able to identify EFS and BitLocker differences.
-
Securing Windows Server 2016: Configure Threat Detection
After watching this video, you will be able to describe threat detection solutions.
-
Kubernetes: kubelet
After watching this video, you will be able to work with kubelet.
-
Kubernetes: Extensions API
After watching this video, you will be able to recall how to work with the extensions API in Kubernetes.
-
Kubernetes: Apps API
After watching this video, you will be able to work with the apps API in Kubernetes.
-
Kubernetes: kube-controller-manager
After watching this video, you will be able to work with the Kubernetes controller manager.
-
Kubernetes: kube-apiserver
After watching this video, you will be able to describe the Kubernetes API server.
-
Kubernetes: Kubernetes API
After watching this video, you will be able to use the Kubernetes API.
-
Kubernetes: Kubernetes Nodes and Addons
After watching this video, you will be able to describe Kubernetes nodes and addons.
-
Kubernetes: Batch API
After watching this video, you will be able to use the batch API in Kubernetes.
-
Kubernetes: Autoscaling API
After watching this video, you will be able to work with the autoscaling API in Kubernetes.
-
Kubernetes: kube-proxy
After watching this video, you will be able to use the Kubernetes network proxy.
-
Kubernetes: kube-scheduler
After watching this video, you will be able to describe the use of the Kubernetes scheduler function.
-
Kubernetes: Authenticating Clusters
After watching this video, you will be able to authenticate a cluster in Kubernetes.
-
Kubernetes: Sharing a Cluster
After watching this video, you will be able to share a Kubernetes cluster.
-
Kubernetes: Using Cluster Autoscaler
After watching this video, you will be able to work with Kubernetes Cluster Autoscaler.
-
Kubernetes: Creating an Alpha Cluster
After watching this video, you will be able to create Kubernetes alpha clusters.
-
Kubernetes: Deleting a Cluster
After watching this video, you will be able to delete a cluster in Kubernetes.
-
Kubernetes: Understanding Kubeconfig
After watching this video, you will be able to describe Kubeconfig files.
-
Kubernetes: Upgrading a Cluster
After watching this video, you will be able to upgrade a Kubernetes cluster.
-
Kubernetes: Handling Kubernetes Clusters
After watching this video, you will be able to work with Kubernetes clusters.
-
Kubernetes: Preparing for Multicluster Ingress
After watching this video, you will be able to prepare an environment to work with multicluster Ingress with Kubernetes clusters.
-
Kubernetes: Kubernetes Master
After watching this video, you will be able to describe the Kubernetes Master.
-
Kubernetes: StatefulSet
After watching this video, you will be able to work with StatefulSets in Kubernetes.
-
Kubernetes: Deployment
After watching this video, you will be able to use Deployments in Kubernetes.
-
Kubernetes: Jobs
After watching this video, you will be able to implement Jobs in Kubernetes.
-
Kubernetes: DaemonSet
After watching this video, you will be able to work with DaemonSets in Kubernetes.
-
Kubernetes: ReplicaSet
After watching this video, you will be able to use ReplicaSets in Kubernetes.
-
Kubernetes: Autoscaling
After watching this video, you will be able to implement autoscaling in Kubernetes.
-
Kubernetes: Creating a Cluster
After watching this video, you will be able to create a Kubernetes cluster on Google Cloud Platform and using Minikube on Windows 10.
-
Kubernetes: Use Kubernetes Concepts
After watching this video, you will be able to work with Kubernetes concepts.
-
Kubernetes: Stopping a Cluster
After watching this video, you will be able to stop a Kubernetes cluster.
-
Kubernetes: Resizing a Cluster
After watching this video, you will be able to resize a Kubernetes cluster.
-
Terraform: Configure Terraform
After watching this video, you will be able to configure Terraform.
-
Terraform: Nondependent Resources
After watching this video, you will be able to describe nondependent resources.
-
Terraform: Explicit Dependencies
After watching this video, you will be able to create an explicit dependency.
-
Terraform: Implicit Dependencies
After watching this video, you will be able to create an implicit dependency.
-
Terraform: Terraform Provisioners
After watching this video, you will be able to describe provisions and how they are used.
-
Terraform: Create-time Provisioners
After watching this video, you will be able to run a provisioner.
-
Terraform: Defining Provisioners
After watching this video, you will be able to define a provisioner.
-
Terraform: Module Configurations
After watching this video, you will be able to configure modules in Terraform.
-
Terraform: Terraform Modules
After watching this video, you will be able to describe Terraform modules.
-
Terraform: Failed Provisioners
After watching this video, you will be able to describe how provisioners fail.
-
Terraform: Destroy-time Provisioners
After watching this video, you will be able to destroy a provisioner.
-
Terraform: Terraform Module Outputs
After watching this video, you will be able to use module outputs in Terraform.
-
Terraform: Plan and Apply Terraform Modules
After watching this video, you will be able to run terraform plan and terraform apply.
-
Terraform: Terraform Get Command
After watching this video, you will be able to use the Terraform get command to download modules.
-
Terraform: Local Values in Terraform Modules
After watching this video, you will be able to use the Consul Terraform module.
-
Application Performance Engineering: Recognizing User and Business Activities
After watching this video, you will be able to recognize user-faced functionality and capture the business process and system functions.
-
Application Performance Engineering: Determining Resource Usage Targets
After watching this video, you will be able to identify a process for determining resource usage targets.
-
Application Performance Engineering: Determining Performance Objectives
After watching this video, you will be able to identify a process for defining performance objectives.
-
Application Performance Engineering: Performance Objective Categories
After watching this video, you will be able to recognize the main categories of application performance objectives.
-
Application Performance Engineering: Key Performance Terminology
After watching this video, you will be able to define key IT performance terminology.
-
Application Performance Engineering: Executing the Test
After watching this video, you will be able to identify characteristics of implementing the performance test.
-
Application Performance Engineering: Considering Data Usage and Variance of Individuals
After watching this video, you will be able to recognize how individual user data and variances are taken into account.
-
Application Performance Engineering: Key Phases of Performance Engineering
After watching this video, you will be able to identify the key phases and activities in performance engineering.
-
Application Performance Engineering: Reporting Results and Tuning Recommendations
After watching this video, you will be able to report findings and make recommendations for tuning an application.
-
Application Performance Engineering: Collecting Baseline and Benchmark Data
After watching this video, you will be able to identify how to collect baseline and benchmarking data.
-
Application Performance Engineering: Developing a Performance Plan
After watching this video, you will be able to describe what a performance plan is and how it is used to maintain complete performance acceptance criteria.
-
Application Performance Engineering: Developing Acceptance Criteria
After watching this video, you will be able to identify requirement acceptance criteria from the perspective of end users, business functions, technical infrastructure, and contracts.
-
Application Performance Engineering: Understanding Performance Requirements and Goals
After watching this video, you will be able to distinguish between performance requirements and goals in the context of application function and end users.
-
Application Performance Engineering: Defining Resource Budgets and Capturing Metrics
After watching this video, you will be able to identify types of metrics that can be collected and how they can be captured.
-
Application Performance Engineering: Modeling the Application Usage
After watching this video, you will be able to describe usage scenarios.
-
Terraform: Upgrading Terraform
After watching this video, you will be able to upgrade Terraform.
-
Terraform: Install Terraform on Windows
After watching this video, you will be able to install Terraform on the Windows 10 platform.
-
Terraform: What Is Terraform?
After watching this video, you will be able to describe what Terraform is and how it is used.
-
Terraform: Using Interpolation Syntax
After watching this video, you will be able to use interpolation syntax to reference variables.
-
Terraform: JSON Syntax
After watching this video, you will be able to use JSON formatted configuration file syntax.
-
Terraform: Terraform HCL Syntax
After watching this video, you will be able to use HashiCorp Configuration Language (HCL) Terraform syntax.
-
Terraform: Terraform Commands
After watching this video, you will be able to identify Terraform commands.
-
Terraform: Built-in Functions
After watching this video, you will be able to identify and use the Terraform built-in functions.
-
Terraform: Conditionals
After watching this video, you will be able to use conditions with interpolations.
-
Terraform: Variables
After watching this video, you will be able to describe the different types of available variable references that can be used.
-
Terraform: Output
After watching this video, you will be able to configure outputs in Terraform.
-
Terraform: Overrides
After watching this video, you will be able to configure overrides in Terraform.
-
Terraform: Load Order
After watching this video, you will be able to describe load order and semantics in Terraform.
-
Terraform: Use Terraform Syntax
After watching this video, you will be able to use Terraform syntax.
-
Terraform: Resource Configuration
After watching this video, you will be able to configure resources in Terraform.
-
Terraform: Local Values
After watching this video, you will be able to configure local values in Terraform.
-
Terraform: Provider
After watching this video, you will be able to configure providers in Terraform.
-
Terraform: Data Sources
After watching this video, you will be able to describe Terraform data sources.
-
Terraform: Timeouts
After watching this video, you will be able to configure timeouts in Terraform.
-
Terraform: Lifecycle Block
After watching this video, you will be able to identify lifecycle block keys in Terraform.
-
Terraform: Meta-parameters
After watching this video, you will be able to identify meta-parameters in Terraform.
-
Terraform: Terraform Infrastructure Resources
After watching this video, you will be able to examine the different resources that Terraform can be used to manage.
-
Terraform: Set Up Configurations in Terraform
After watching this video, you will be able to set up configurations in Terraform.
-
Terraform: Data Source Life Cycle
After watching this video, you will be able to describe the data source life cycle in Terraform.
-
Terraform: Data Source Configuration
After watching this video, you will be able to create a data source configuration in Terraform.
-
Terraform: Configuring Terraform
After watching this video, you will be able to configure Terraform to launch a single AWS EC2 instance.
-
Terraform: Creating a Free AWS Account
After watching this video, you will be able to create a free AWS account.
-
Terraform: Modifying the Terraform Configuration
After watching this video, you will be able to modify a Terraform configuration.
-
Terraform: Terraform Apply
After watching this video, you will be able to run the terraform apply command to apply the changes from an execution plan.
-
Terraform: Terraform Plan
After watching this video, you will be able to run the terraform plan command to view your execution plan.
-
Terraform: Terraform Elastic IP
After watching this video, you will be able to assign an elastic IP to your EC2 instance.
-
Terraform: Destroying Infrastructure Managed By Terraform
After watching this video, you will be able to destroy infrastructure that is managed by Terraform.
-
Application Performance Engineering: Performance Engineering Key Terms
After watching this video, you will be able to list key terms used in software performance engineering.
-
Application Performance Engineering: Importance of Performance Engineering
After watching this video, you will be able to identify why software performance engineering is important, and describe monitoring, analyzing, and tuning.
-
Application Performance Engineering: Understanding the System Architecture
After watching this video, you will be able to identify and model the system architecture.
-
Application Performance Engineering: Recognizing Application Performance Test Types
After watching this video, you will be able to identify various types of application performance tests.
-
Application Performance Engineering: Considerations for Performance Management Tools
After watching this video, you will be able to identify considerations including solution sizing and application audits.
-
Application Performance Engineering: Building a Performance Culture
After watching this video, you will be able to embed a performance culture in the software development life cycle and describe competencies for strong performance management.
-
Application Performance Engineering: Key Performance Engineering Activities
After watching this video, you will be able to list key performance engineering and testing activities.
-
Application Performance Engineering: Performance and Risk Management
After watching this video, you will be able to describe the relationship between performance and risk in software development.
-
Application Performance Engineering: Performance Management Tools and General Reports
After watching this video, you will be able to identify key performance monitoring, analyzing, and tuning tools, and describe some general types of reports from these tools (dashboards, general, baselines, and Health Checks).
-
Application Performance Engineering: Assess Monitoring Ability and Make Recommendations
After watching this video, you will be able to assess current performance monitoring ability.
-
Application Performance Engineering: Application Performance Management Life Cycle
After watching this video, you will be able to list the steps in the application performance management cycle.
-
Application Performance Engineering: Performance Monitoring, Analysis, and Tuning
After watching this video, you will be able to describe Application Performance Monitoring, Analysis, and Tuning.
-
CompTIA A+ 220-902: Advantages of a Non-Windows OS
After watching this video, you will be able to list the advantages of using a non-Windows operating system.
-
CompTIA A+ 220-902: More Advanced Linux Commands
After watching this video, you will be able to perform more advanced tasks using Linux commands.
-
CompTIA A+ 220-902: File Sharing with Homegroups
After watching this video, you will be able to share files across a network using homegroups.
-
CompTIA A+ 220-902: Name Resolution
After watching this video, you will be able to describe how name resolution works.
-
CompTIA A+ 220-902: Advanced OS X Utilities
After watching this video, you will be able to use the more advanced utilities of an OS X system.
-
CompTIA A+ 220-902: OS X Features and Utilities
After watching this video, you will be able to use the basic features and functions of an OS X system.
-
CompTIA A+ 220-902: History of OS X
After watching this video, you will be able to recall the history of the Mac OS X system.
-
CompTIA A+ 220-902: Introduction to Other Operating Systems
After watching this video, you will be able to recognize the basic differences between the main operating system technologies.
-
CompTIA A+ 220-902: Sharing with a Homegroup
After watching this video, you will be able to join a homegroup and share your resources with it.
-
CompTIA A+ 220-902: File Sharing Options
After watching this video, you will be able to share files using a variety of methods.
-
CompTIA A+ 220-902: File Sharing with Shared Folders
After watching this video, you will be able to share files across a network using Shared Folders.
-
CompTIA A+ 220-902: File Sharing with OneDrive
After watching this video, you will be able to share files across the Internet using OneDrive.
-
CompTIA A+ 220-902: IP Addresses
After watching this video, you will be able to specify the functions of IP addresses in a network.
-
CompTIA A+ 220-902: Network Adapters
After watching this video, you will be able to configure an Ethernet connection in Windows.
-
CompTIA A+ 220-902: Network Memberships
After watching this video, you will be able to join your Windows device to the appropriate functional group.
-
CompTIA A+ 220-902: Networking Scenarios
After watching this video, you will be able to recognize the different types of networking scenarios in which you might use Windows.
-
System Center: Add a Hyper-V Host to VMM
After watching this video, you will be able to adding a virtualization host to the VMM fabric.
-
CompTIA A+ 220-902: Navigating in a Linux Environment
After watching this video, you will be able to navigate within the Linux operating system environment.
-
CompTIA A+ 220-902: Interacting with Linux
After watching this video, you will be able to demonstrate how to interact with the Linux operating system.
-
CompTIA A+ 220-902: Introduction to Linux
After watching this video, you will be able to describe the basic implementations of the Linux operating system.
-
CompTIA A+ 220-902: Advanced Linux Commands
After watching this video, you will be able to perform advanced tasks using Linux commands.
-
CompTIA A+ 220-902: Manipulating a Linux File System
After watching this video, you will be able to copy and move files within the Linux environment.
-
CompTIA A+ 220-901: Laser Printing Steps
After watching this video, you will be able to identify the steps involved in laser printing.
-
Windows 10 Creators Update New Features: Movies & TV
After watching this video, you will be able to describe the Movies & TV feature in the Windows Store.
-
Windows 10 Creators Update New Features: Windows Defender Security Center
After watching this video, you will be able to describe the Windows Defender Security Center in the Windows 10 Creators Update.
-
Windows 10 Creators Update New Features: Books
After watching this video, you will be able to describe the Books feature in the Windows Store.
-
Windows 10 Creators Update New Features: Lock Screen Customization
After watching this video, you will be able to demonstrate how to customize the lock screen in the Windows 10 Creators Update.
-
Windows 10 Creators Update New Features: Encryption
After watching this video, you will be able to describe the purpose and usage of encryption in the Windows 10 Creators Update.
-
Windows 10 Creators Update New Features: Setting up Wake
After watching this video, you will be able to demonstrate how to configure the way Windows behaves after sleep.
-
Windows 10 Creators Update New Features: SmartScreen Filter
After watching this video, you will be able to describe the Smart Screen Filter in the Windows 10 Creators Update.
-
Windows 10 Creators Update New Features: Windows Firewall
After watching this video, you will be able to describe the Windows Firewall in the Windows 10 Creators Update.
-
Windows 10 Creators Update New Features: Family Options
After watching this video, you will be able to describe the purpose and usage of family options in the Windows 10 Creators Update.
-
Windows 10 Creators Update New Features: Configuring SmartScreen
After watching this video, you will be able to demonstrate how to configure SmartScreen filters.
-
Windows 10 Creators Update New Features: Dark Mode
After watching this video, you will be able to demonstrate the dark mode feature in the Windows 10 Creators Update.
-
Windows 10 Creators Update New Features: Night Light
After watching this video, you will be able to demonstrate the night light feature in the Windows 10 Creators Update.
-
Windows 10 Creators Update New Features: Apps
After watching this video, you will be able to describe the Apps feature in the Windows Store.
-
Windows 10 Creators Update New Features: Get Started with Creators Update
After watching this video, you will be able to navigate key features of the Windows 10 Creators Update.
-
Windows 10 Creators Update New Features: Music
After watching this video, you will be able to describe the Music feature in the Windows Store.
-
Windows 10 Creators Update New Features: Games
After watching this video, you will be able to describe the Games feature in the Windows Store.
-
Windows 10 Creators Update New Features: The Storage Sense Feature
After watching this video, you will be able to describe the Storage Sense feature.
-
Windows 10 Creators Update New Features: Web Note and Ink Colors
After watching this video, you will be able to describe Web Note and Ink colors in the Windows 10 Creators Update.
-
Windows 10 Creators Update New Features: Battery Life and Streaming
After watching this video, you will be able to describe the battery life and streaming enhancements in the Windows 10 Creators Update.
-
Windows 10 Creators Update New Features: Apps and Features Settings
After watching this video, you will be able to describe apps and features settings in the Windows 10 Creators Update.
-
Windows 10 Creators Update New Features: Windows Hello Apps and Devices
After watching this video, you will be able to describe Windows Hello apps and devices in the Windows 10 Creators Update.
-
Windows 10 Creators Update New Features: How to Get the Creators Update
After watching this video, you will be able to describe how to obtain the Windows 10 Creators Update.
-
Windows 10 Creators Update New Features: Security Features
After watching this video, you will be able to describe new security features in the Windows 10 Creators Update.
-
Windows 10 Creators Update New Features: Cortana's New Features
After watching this video, you will be able to describe Cortana's new features in the Windows 10 Creators Update.
-
Windows 10 Creators Update New Features: Windows Hello
After watching this video, you will be able to describe Windows Hello in the Windows 10 Creators Update.
-
Windows 10 Creators Update New Features: Gaming Features
After watching this video, you will be able to describe gaming feature enhancements in the Windows 10 Creators Update.
-
Windows 10 Creators Update New Features: Telemetry and Data Collection
After watching this video, you will be able to describe telemetry and data collection in Windows 10.
-
Windows 10 Creators Update New Features: How to Install the Creators Update
After watching this video, you will be able to demonstrate how to install the Windows 10 Creators Update.
-
Windows 10 Creators Update New Features: 3D in Windows 10
After watching this video, you will be able to describe the implementation of 3D in the Windows 10 Creators Update.
-
Windows 10 Creators Update New Features: Exploring the Interface
After watching this video, you will be able to describe new features of the Windows 10 Creators Update interface.
-
Windows 10 Creators Update New Features: What is the Windows 10 Creators Update?
After watching this video, you will be able to describe the features of the Windows 10 Creators Update.
-
Windows 10 Creators Update New Features: Sign-in Options
After watching this video, you will be able to describe Windows sign-in options.
-
Windows 10 Creators Update New Features: The Maps App
After watching this video, you will be able to describe the Maps app.
-
Windows 10 Creators Update New Features: The Movies & TV App
After watching this video, you will be able to describe the Movies & TV app.
-
Windows 10 Creators Update New Features: Beam Game Broadcasting
After watching this video, you will be able to describe Beam Game Broadcasting.
-
Windows 10 Creators Update New Features: Phone Companion
After watching this video, you will be able to describe the Phone Companion app.
-
Windows 10 Creators Update New Features: Editing Photos
After watching this video, you will be able to demonstrate how to edit photos.
-
Windows 10 Creators Update New Features: The Photos App
After watching this video, you will be able to demonstrate how to use the Photos app.
-
Windows 10 Creators Update New Features: Work with Paint 3D
After watching this video, you will be able to demonstrate how to create a scene with Paint 3D.
-
Windows 10 Creators Update New Features: Applying Effects
After watching this video, you will be able to demonstrate how to apply effects with Paint 3D.
-
Windows 10 Creators Update New Features: 3D Text
After watching this video, you will be able to demonstrate how to create 3D text.
-
Windows 10 Creators Update New Features: Remix 3D
After watching this video, you will be able to demonstrate how to access Remix 3D and use assets.
-
Windows 10 Creators Update New Features: The History
After watching this video, you will be able to demonstrate how to use the history in Paint 3D.
-
Windows 10 Creators Update New Features: Drawing Tools
After watching this video, you will be able to demonstrate how to use the Paint 3D drawing tools.
-
Windows 10 Creators Update New Features: Adding a Background
After watching this video, you will be able to demonstrate how to create a scene and add a background image with Paint 3D.
-
Windows 10 Creators Update New Features: Applying Stickers
After watching this video, you will be able to demonstrate how to create stickers with Paint 3D.
-
Windows 10 Creators Update New Features: 3D Objects
After watching this video, you will be able to demonstrate how to create 3D objects.
-
Windows 10 Creators Update New Features: What Is Paint 3D?
After watching this video, you will be able to describe Paint 3D.
-
Windows 10 Creators Update New Features: Windows Ink-Enabled Apps
After watching this video, you will be able to describe how to access Windows Ink-enabled apps.
-
Windows 10 Creators Update New Features: Getting Started with Paint 3D
After watching this video, you will be able to demonstrate how to create new drawings with Paint 3D.
-
Windows 10 Creators Update New Features: Screen Sketch
After watching this video, you will be able to describe Screen Sketch and demonstrate its use.
-
Windows 10 Creators Update New Features: Sketchpad
After watching this video, you will be able to describe Sketchpad and demonstrate its use.
-
Windows 10 Creators Update New Features: Cropping Desktop Images
After watching this video, you will be able to demonstrate how to crop and save desktop images with Screen Sketch.
-
Windows 10 Creators Update New Features: The Ruler and Protractor
After watching this video, you will be able to demonstrate use of the ruler and protractor in Windows Ink.
-
Windows 10 Creators Update New Features: Work with Cortana and Edge
After watching this video, you will be able to demonstrate how to work with Cortana and Edge.
-
Windows 10 Creators Update New Features: Sticky Notes Intelligent Recognition
After watching this video, you will be able to describe sticky notes intelligent recognition.
-
Windows 10 Creators Update New Features: The Windows Ink Workspace
After watching this video, you will be able to describe the Windows Ink Workspace and how to access it.
-
Windows 10 Creators Update New Features: Setting Items with Cortana
After watching this video, you will be able to demonstrate how to set reminders and meetings with Cortana.
-
Windows 10 Creators Update New Features: Cortana on the Lock Screen
After watching this video, you will be able to demonstrate how to configure and use Cortana on the lock screen.
-
Windows 10 Creators Update New Features: Sticky Notes
After watching this video, you will be able to describe sticky notes.
-
Windows 10 Creators Update New Features: Things You Can Do with Cortana
After watching this video, you will be able to demonstrate giving Cortana voice-activated instructions.
-
Windows 10 Creators Update New Features: Signing In and Setting Up
After watching this video, you will be able to demonstrate how to sign in to and set up Cortana.
-
Windows 10 Creators Update New Features: Introduction to Cortana
After watching this video, you will be able to describe Cortana and its enhanced features in the Windows 10 Creators Update.
-
Windows 10 Creators Update New Features: Set Up Cortana for Voice Commands
After watching this video, you will be able to demonstrate how to configure a microphone and access Cortana by speaking.
-
Windows 10 Creators Update New Features: The Cortana Interface
After watching this video, you will be able to demonstrate the use of Cortana's features.
-
Windows 10 Creators Update New Features: The Hub
After watching this video, you will be able to describe the Hub in the Edge web browser.
-
Windows 10 Creators Update New Features: Reading Books
After watching this video, you will be able to describe e-reader features, including text-to-speech.
-
Windows 10 Creators Update New Features: Jump Lists
After watching this video, you will be able to describe jump lists in Microsoft Edge.
-
Windows 10 Creators Update New Features: Importing Favorites
After watching this video, you will be able to demonstrate how to import favorites in Microsoft Edge.
-
Windows 10 Creators Update New Features: Writing on, Saving, and Sharing Web Pages
After watching this video, you will be able to demonstrate how to write on web pages and save and share your web notes.
-
Windows 10 Creators Update New Features: Edge Extensions
After watching this video, you will be able to describe Edge extensions and how they're accessed.
-
Windows 10 Creators Update New Features: Tab Preview Bar
After watching this video, you will be able to describe the Tab Preview Bar in the Windows 10 Creators Update.
-
Windows 10 Creators Update New Features: Microsoft Edge Features
After watching this video, you will be able to describe features of Microsoft Edge in the Windows 10 Creators Update.
-
Windows 10 Creators Update New Features: Working with Windows Security and Privacy
After watching this video, you will be able to demonstrate how to use enhanced system and security features.
-
Windows 10 Creators Update New Features: Set Tabs Aside
After watching this video, you will be able to demonstrate how to set tabs aside in Microsoft Edge.
-
Windows 10 Creators Update New Features: Streamlined Reading
After watching this video, you will be able to describe streamlined reading and how to implement it.
-
Windows 10 Creators Update New Features: Game Bar
After watching this video, you will be able to describe the Game Bar.
-
Windows 10 Creators Update New Features: System Settings
After watching this video, you will be able to describe gaming features in System Settings.
-
Windows 10 Creators Update New Features: Work with Photos and Maps
After watching this video, you will be able to demonstrate how to draw with the Photos app and use the Maps app.
-
Windows 10 Creators Update New Features: Game Mode
After watching this video, you will be able to demonstrate how to activate Game Mode.
-
Team Foundation Server 2017: Managing Security
After watching this video, you will be able to manage user and roles in Team Foundation Server.
-
Team Foundation Server 2017: Configure the Application Tier
After watching this video, you will be able to use Team Foundation Server Command-Line tools to configure the application tier.
-
Team Foundation Server 2017: Monitor Server Health and Performance
After watching this video, you will be able to identify how to monitor the performance of your TFS server.
-
Team Foundation Server 2017: Build Agents and Controllers
After watching this video, you will be able to install and configure multiple build agents and controllers.
-
Team Foundation Server 2017: Install and Configure Lab Management
After watching this video, you will be able to create and manage lab environments for a team project on Team Foundation Server.
-
Team Foundation Server 2017: Manage Team Project Collections
After watching this video, you will be able to use the TFS administration console to manage team project collections.
-
Team Foundation Server 2017: Configuring a Team Project
After watching this video, you will be able to describe how to create a new team project in Team Foundation Server.
-
Team Foundation Server 2017: Reports by Work Item Changes
After watching this video, you will be able to create work Item query reports.
-
Team Foundation Server 2017: Configure Team Project Version Control Settings
After watching this video, you will be able to use the TFS administration console to manage team project version control settings.
-
Team Foundation Server 2017: Operate Lab Management
After watching this video, you will be able to describe how to use lab environments to develop, test, or run your application.
-
Team Foundation Server 2017: Applying Work Item Customizations
After watching this video, you will be able to describe how to modify or add a work item type.
-
Team Foundation Server 2017: Migrate and Upgrade Team Foundation Server
After watching this video, you will be able to describe how to migrate and upgrade Team Foundation Server.
-
Team Foundation Server 2017: Cross-project Reports
After watching this video, you will be able to create cross project reports from TFS.
-
Team Foundation Server 2017: Feature Toggles, Package Management, and Versioning
After watching this video, you will be able to describe how to implement continuous delivery to support your DevOps team when building and running your software in production.
-
Team Foundation Server 2017: Modifying a Process Template
After watching this video, you will be able to describe how to modify a process template.
-
Team Foundation Server 2017: Create an Agile Solution with TFS Tools
After watching this video, you will be able to create an Agile/Scrum solution with TFS tools.
-
Team Foundation Server 2017: Configure Version Control Proxy
After watching this video, you will be able to describe how to configure Team Foundation Server Proxy using the Team Foundation Server Configuration tool.
-
Team Foundation Server 2017: Managing Reporting
After watching this video, you will be able to describe how to analyze the progress and quality of your project by using the reports in SQL Server Reporting Services.
-
Team Foundation Server 2017: Configure for Backup and Recovery
After watching this video, you will be able to describe how to configure TFS for backup and recovery.
-
Team Foundation Server 2017: Download and Install Visual Studio
After watching this video, you will be able to describe how to download and install Visual Studio.
-
Team Foundation Server 2017: Importing Projects
After watching this video, you will be able to configure client connectivity to Team Foundation Server.
-
Team Foundation Server 2017: Sharing Visual Studio Projects
After watching this video, you will be able to identify the methods of sharing projects between TFS and Visual Studio.
-
Team Foundation Server 2017: Check In Your Work
After watching this video, you will be able to describe how to release applications with TFS 2017 Release Management.
-
Team Foundation Server 2017: Check Out and Edit Files
After watching this video, you will be able to describe how to check out and edit files from source control.
-
Team Foundation Server 2017: Using MSTest
After watching this video, you will be able to test applications with Visual Studio 2017 and TFS 2017.
-
Team Foundation Server 2017: Manage Pending Changes
After watching this video, you will be able to define how change control works within Visual Studio.
-
Team Foundation Server 2017: Configuring the Local File Structure
After watching this video, you will be able to create and manage Workspaces.
-
Team Foundation Server 2017: Get Files from the Server
After watching this video, you will be able to identify how to get versioned files from TFS.
-
Team Foundation Server 2017: Add Files to Version Control
After watching this video, you will be able to add .NET files to source control.
-
Team Foundation Server 2017: Use Visual Studio and TFS
After watching this video, you will be able to use Visual Studio and TFS to build applications.
-
Team Foundation Server 2017: Configuring a Team Build Definition
After watching this video, you will be able to create a build definition within your team project.
-
Team Foundation Server 2017: Configure Jenkins Jobs for TFS
After watching this video, you will be able to describe how to configure Jenkins to work with TFS.
-
Team Foundation Server 2017: Download and Install Jenkins
After watching this video, you will be able to download and install Jenkins.
-
Team Foundation Server 2017: Configure Visual Studio Code
After watching this video, you will be able to describe how configure .NET code to be versioned by TFS.
-
Team Foundation Server 2017: Create the .NET Project
After watching this video, you will be able to describe how to create a .NET project to be used for source control.
-
Team Foundation Server 2017: Setting up the TFS Repository
After watching this video, you will be able to analyze how to set up the TFS repository for continuous deployment.
-
Team Foundation Server 2017: Creating Java Projects
After watching this video, you will be able to identify how to use Eclipse and TFS for continuous code integration.
-
Team Foundation Server 2017: Writing the Jenkins Job
After watching this video, you will be able to write the Jenkins job to promote the Java code.
-
Team Foundation Server 2017: Writing the Publish Script
After watching this video, you will be able to describe how to write the publish script used by Jenkins.
-
Team Foundation Server 2017: Push the Code
After watching this video, you will be able to describe how .NET code gets pushed through the promotion pipeline.
-
Team Foundation Server 2017: Configure the Build Trigger
After watching this video, you will be able to describe how TFS and Jenkins use build triggers.
-
Team Foundation Server 2017: Create an Automated Build with TFS
After watching this video, you will be able to create an Automated Build with TFS.
-
Team Foundation Server 2017: Create the Build Action
After watching this video, you will be able to create the Jenkins build action for the .NET application.
-
Team Foundation Server 2017: Configure the Service
After watching this video, you will be able to discover the ways TFS and Jenkins configure build services.
-
Team Foundation Server 2017: Manage Pending Changes
After watching this video, you will be able to code a Java program and manages source control changes.
-
Team Foundation Server 2017: Importing Projects
After watching this video, you will be able to create Eclipse projects by importing them from TFS.
-
Team Foundation Server 2017: Get Files from the Server
After watching this video, you will be able to search for and retrieve updated code from source control.
-
Team Foundation Server 2017: Add Files to Version Control
After watching this video, you will be able to create new entries in TFS with modified Java code.
-
Team Foundation Server 2017: Sharing Eclipse Projects
After watching this video, you will be able to identify how to share projects between Eclipse and TFS.
-
Team Foundation Server 2017: Design an Eclipse Solution
After watching this video, you will be able to design a TFS/Eclipse Java application.
-
Team Foundation Server 2017: Check In Your Work
After watching this video, you will be able to describe how TFS uses versioning to manage your Java code.
-
Team Foundation Server 2017: Check Out and Edit Files
After watching this video, you will be able to retrieve code from source control and place them in the local file system.
-
Team Foundation Server 2017: Configuring a Maven Build in TFS
After watching this video, you will be able to create Maven jobs for TFS.
-
Team Foundation Server 2017: Configuring an Ant Build in TFS
After watching this video, you will be able to create ANT build scripts for TFS.
-
Mastering DevOps with JavaScript: Using Closures and IIFEs in JS
After watching this video, you will be able to create and use closures in JavaScript and understand how to use Immediately Invoked Function Expressions (IIFEs).
-
Mastering DevOps with JavaScript: Creating Objects with Constructors
After watching this video, you will be able to create JavaScript objects using constructor functions and a new keyword.
-
Mastering DevOps with JavaScript: Working with Scope in JS
After watching this video, you will be able to recall how global and function scope work within JavaScript.
-
Mastering DevOps with Splunk: Installing and Configuring Splunk
After watching this video, you will be able to install and configure Splunk.
-
Mastering DevOps with Splunk: Introducing Splunk
After watching this video, you will be able to describe basic concepts of Splunk and its configuration options.
-
Mastering DevOps with Splunk: Using the Search Processing Language
After watching this video, you will be able to work with the Splunk Search Processing Language (SPL).
-
Mastering DevOps with Splunk: Searching with Splunk
After watching this video, you will be able to use Splunk to search machine data.
-
Mastering DevOps with JavaScript: Using Node Events in JavaScript
After watching this video, you will be able to generate events and listen for events in a Node-based environment using EventEmitter.
-
Mastering DevOps with JavaScript: Enumerating Object Properties
After watching this video, you will be able to iterate through the enumerable properties of a JavaScript object.
-
Mastering DevOps with Splunk: Enriching Data
After watching this video, you will be able to use Splunk to describe machine data.
-
Mastering DevOps with Splunk: Using Splunk Alerts
After watching this video, you will be able to generate alerts with Splunk.
-
Mastering DevOps with Splunk: Monitoring with Splunk
After watching this video, you will be able to monitor system events using Splunk.
-
Team Foundation Server 2017: Team Foundation Server Overview/Installation Options
After watching this video, you will be able to describe the concepts of Team Foundation Server and its configuration options.
-
Mastering DevOps with Splunk: Working with Splunk
After watching this video, you will be able to use Splunk for data analysis and reporting.
-
Team Foundation Server 2017: Installing Windows Server 2016
After watching this video, you will be able to install and configure Windows Server 2016 on Amazon EC2.
-
Mastering DevOps with Splunk: Using Splunk's Lookup Feature
After watching this video, you will be able to work with Splunk's advanced searching.
-
Mastering DevOps with Splunk: Grouping Splunk Events
After watching this video, you will be able to use Splunk to group system events.
-
Mastering DevOps with Splunk: Analyzing and Visualizing Data
After watching this video, you will be able to describe advanced techniques used to analysis and visualize data.
-
Mastering DevOps with Splunk: Reporting with Splunk
After watching this video, you will be able to use Splunk to generate rich reports.
-
Team Foundation Server 2017: Enabling Remote Desktop
After watching this video, you will be able to configure Windows 2016 to accept remote connections.
-
Team Foundation Server 2017: Internet Explorer Enhanced Security Configuration
After watching this video, you will be able to configure security in Internet Explorer.
-
Team Foundation Server 2017: Adding Windows Roles
After watching this video, you will be able to add Windows roles and features to support TFS.
-
Team Foundation Server 2017: Using Active Directory
After watching this video, you will be able to join the server to the Active Directory Domain.
-
Team Foundation Server 2017: Installing the TFS Plugin for Eclipse
After watching this video, you will be able to configure client connectivity to Team Foundation Server.
-
Team Foundation Server 2017: Installing Eclipse
After watching this video, you will be able to install and configure Eclipse for Java development.
-
Team Foundation Server 2017: Install Team Foundation Server 2017
After watching this video, you will be able to install Team Foundation Server 2017 on a Windows machine.
-
Team Foundation Server 2017: Install SQL Server 2016
After watching this video, you will be able to install SQL Server 2016 on a Windows machine.
-
Team Foundation Server 2017: Use Team Foundation Server
After watching this video, you will be able to configure a Team Foundation Server installation on a Windows machine.
-
Team Foundation Server 2017: Installing an E-mail Server
After watching this video, you will be able to configure an SMTP Server for Team Foundation Server.
-
CompTIA A+ 220-901: Internet Connections
After watching this video, you will be able to compare Internet connections.
-
CompTIA A+ 220-901: Applying Networking Tools
After watching this video, you will be able to distinguish between networking tools.
-
CompTIA A+ 220-902: NTFS Security
After watching this video, you will be able to list the characteristics of NTFS files and how they each apply.
-
CompTIA A+ 220-902: Account Security
After watching this video, you will be able to describe the different types of user accounts and how they secure your computer.
-
CompTIA A+ 220-902: Introduction to Types of Security
After watching this video, you will be able to identify the different security strategies that you can employ.
-
CompTIA A+ 220-902: Introduction to Security Threats (Part 2)
After watching this video, you will be able to define and describe all of the various security threats that you might face.
-
CompTIA A+ 220-902: Introduction to Security Threats
After watching this video, you will be able to define and describe all of the various security threats that you might face.
-
CompTIA A+ 220-902: Create a Virtual Machine
After watching this video, you will be able to create a virtual machine.
-
CompTIA A+ 220-902: Mobile Synchronization
After watching this video, you will be able to synchronize data between a mobile and desktop device.
-
CompTIA A+ 220-902: Wireless Data
After watching this video, you will be able to describe how wireless data works.
-
CompTIA A+ 220-902: Mobile Operating Systems
After watching this video, you will be able to recognize the basics of mobile operating systems.
-
CompTIA A+ 220-902: Network Services
After watching this video, you will be able to identify the purposes of each of the types of network servers.
-
CompTIA A+ 220-902: Other Cloud Computing Options
After watching this video, you will be able to specify the other cloud computing options that exist.
-
CompTIA A+ 220-902: Public Cloud Computing
After watching this video, you will be able to list the pros and cons of public cloud computing.
-
CompTIA A+ 220-902: Private Cloud Computing
After watching this video, you will be able to list the pros and cons of private cloud computing.
-
CompTIA A+ 220-902: Introduction to Cloud Computing
After watching this video, you will be able to describe the basics of cloud computing.
-
CompTIA A+ 220-902: Virtual Machine Applications
After watching this video, you will be able to use commercial applications for virtual machines.
-
CompTIA A+ 220-902: Creating a Virtual Machine
After watching this video, you will be able to create your own virtual machine.
-
CompTIA A+ 220-902: Advanced VM Requirements
After watching this video, you will be able to recall the advanced requirements of a virtual machine.
-
CompTIA A+ 220-902: Virtual Machine Requirements
After watching this video, you will be able to identify the requirements of a virtual machine.
-
CompTIA A+ 220-902: Introduction to Virtual Machines
After watching this video, you will be able to describe the uses of a virtual machine.
-
CompTIA A+ 220-902: Navigate in Linux
After watching this video, you will be able to demonstrate how to navigate within the Linux environment.
-
CompTIA A+ 220-901: BIOS Troubleshooting
After watching this video, you will be able to identify BIOS configuration.
-
CompTIA A+ 220-901: Phablets and e-Readers
After watching this video, you will be able to contrast phablets and e-readers.
-
CompTIA A+ 220-901: Troubleshooting Print Devices
After watching this video, you will be able to identify print device issues.
-
CompTIA A+ 220-901: Troubleshoot Networking Connections
After watching this video, you will be able to identify network connectivity issues.
-
CompTIA A+ 220-901: Troubleshoot Display Issues
After watching this video, you will be able to diagnose and troubleshoot display issues.
-
CompTIA A+ 220-901: Compare Mobile Device Connectors
After watching this video, you will be able to contrast mobile device connectors.
-
Unix OS Fundamentals: The Unix Shell Families
In this video, Jamie Campbell describes the various Unix shells.
-
Unix OS Fundamentals: Storing Commands in a Script
In this video, Jamie Campbell describes how to store commands in a shell script.
-
Unix OS Fundamentals: Unix GUI
In this video, Jamie Campbell demonstrates how to install the Solaris Live Media with GUI on the UNIX system.
-
Unix OS Fundamentals: The Unix X Windows System
In this video, Jamie Campbell outlines the steps involved in installing the Unix X Windows System.
-
Unix OS Fundamentals: Joining Commands on the Command Line
In this video, Jamie Campbell describes how to join multiple commands in the command line in a Unix system.
-
Unix OS Fundamentals: Unix Shell Command Processing
In this video, Jamie Campbell demonstrates command line processing in the UNIX shell.
-
Unix OS Fundamentals: Unix and Networking
Unix is a network operating system. In this video, Jamie Campbell outlines the link between Unix and networking.
-
Unix OS Fundamentals: Unix as a Server
In this video, Jamie Campbell discusses Unix as a server.
-
Unix OS Fundamentals: Unix Command Line
In this video, Jamie Campbell demonstrates how to use the common Unix commands.
-
Unix OS Fundamentals: Unix as a Standalone System
In this video, Jamie Campbell describes the concept of Unix as a standalone system.
-
Unix OS Fundamentals: Command Executions
The Unix command line is a powerful interface with simple, easy-to-use commands. In this video, Jamie Campbell describes how to use special characters with commands. He also demonstrates how to run a command as a background process.
-
Master DevOps with Puppet: Resource Attributes and Types
After watching this video, you will be able to determine how to use attributes and types in Puppet.
-
Master DevOps with Puppet: Using Resources (Code)
After watching this video, you will be able to write code to use Puppet resources.
-
Master DevOps with Puppet: Implementing Parameterized Classes
After watching this video, you will be able to create Puppet parameterized classes.
-
Master DevOps with Puppet: Creating and Running a Puppet Class
After watching this video, you will be able to create classes to be used by Puppet for configuration.
-
Master DevOps with Puppet: Resource Types
After watching this video, you will be able to describe the Puppet resources types and how they are used.
-
Master DevOps with Puppet: Implementing Class Inheritance
After watching this video, you will be able to describe the class inheritance hierarchy.
-
Master DevOps with Puppet: Design a Puppet Solution
After watching this video, you will be able to design a Puppet master/Puppet agent configuration solution.
-
Master DevOps with Puppet: Resource Abstraction Layer
After watching this video, you will be able to analyze the Puppet resource abstraction layer.
-
Master DevOps with Puppet: Setting the Client Environment
After watching this video, you will be able to identify the methods of setting the client environment in Puppet.
-
Master DevOps with Puppet: Using the Environment on Puppet Master
After watching this video, you will be able to describe how to use environments on the Puppet master.
-
Master DevOps with Puppet: Working with Custom Resource Types
After watching this video, you will be able to write code to use custom Puppet resource types.
-
Master DevOps with Puppet: EPP Templates
After watching this video, you will be able to identify how EPP templates work within Puppet.
-
Microsoft System Center 2012 R2: Registering and Deploying a System Center 2012 R2 Orchestrator Integration Pack
The Deployment Manager within Microsoft System Center 2012 R2 allows you to easily register and deploy integration packs. In this video, Rafiq Wayani demonstrates how to register and deploy a System Center Orchestrator Integration pack.
-
Master DevOps with Puppet: Evaluating Templates
After watching this video, you will be able to analyze how to evaluate templates.
-
Master DevOps with Puppet: Puppet Search Path
After watching this video, you will be able to discover how the Puppet search path works.
-
Master DevOps with Puppet: Coding Techniques of Templating
After watching this video, you will be able to build and code Puppet templates.
-
Master DevOps with Puppet: Basics of Using Templates
After watching this video, you will be able to define the basics of using Puppet templates.
-
Master DevOps with Puppet: Use Puppet Files and Environments
After watching this video, you will be able to use Puppet file functionality and environments.
-
Master DevOps with Puppet: Advanced File Functionality with Puppet
After watching this video, you will be able to define how advanced file functionality works within Puppet.
-
Master DevOps with Puppet: The Defined Function
After watching this video, you will be able to analyze and use the Puppet Defined function.
-
Master DevOps with Puppet: The Include Function
After watching this video, you will be able to analyze the Puppet Include function.
-
Master DevOps with Puppet: Delivering Files with Puppet
After watching this video, you will be able to analyze the ways to deliver files with Puppet.
-
Master DevOps with Puppet: Using File Functions
After watching this video, you will be able to describe the Puppet file functions.
-
Master DevOps with Puppet: Creating a New Function
After watching this video, you will be able to code a new Puppet function.
-
Master DevOps with Puppet: Designing Custom Functions
After watching this video, you will be able to identify how to correctly design a custom Puppet function.
-
Master DevOps with Puppet: REST API Security
After watching this video, you will be able to define the techniques for Puppet REST API Security.
-
Master DevOps with Puppet: Testing the REST API with Curl
After watching this video, you will be able to describe how Puppet uses REST.
-
Mastering DevOps with JavaScript: Working with Assignment and Arithmetic Operators
After watching this video, you will be able to use the assignment and arithmetic operators to manipulate numeric data.
-
Jenkins 2: Work with Node Operations
After watching this video, you will be able to perform various regular node operations.
-
Mastering DevOps with JavaScript: Identifying Comparison Operators
After watching this video, you will be able to describe when to use comparison operators and the difference between the equality and identity operators.
-
Mastering DevOps with JavaScript: Using Comma and String Operators
After watching this video, you will be able to work with comma and string operators and recall how to concatenate strings and numbers.
-
Jenkins 2: Automated and Continuous Deployment in Jenkins
After watching this video, you will be able to facilitate automated and continuous deployment implemention with Jenkins.
-
Jenkins 2: Jenkins Server Migration
After watching this video, you will be able to migrate Jenkins between multiple servers.
-
Jenkins 2: Jenkins and .NET Deployment
After watching this video, you will be able to configure and deploy a .NET project into Jenkins for tasks and integration automation.
-
Jenkins 2: Jenkins and Java Deployment
After watching this video, you will be able to configure and deploy a Java project into Jenkins for tasks and integration automation.
-
Mastering DevOps with JavaScript: Implementing Shorthand Operators
After watching this video, you will be able to write more concise JavaScript code by using shorthand assignment operators.
-
Mastering DevOps with JavaScript: Using Logical Operators
After watching this video, you will be able to work with logical operators and describe how short-circuit evaluation can affect code.
-
Mastering DevOps with JavaScript: Creating Arrays
After watching this video, you will be able to use various methods of array creation in JavaScript.
-
Mastering DevOps with JavaScript: Understanding Hoisting in JS
After watching this video, you will be able to define what happens in the compile phase of JavaScript programs.
-
Mastering DevOps with JavaScript: Understanding Function Declarations and Expressions
After watching this video, you will be able to specify the difference between function declarations and function expressions.
-
Mastering DevOps with JavaScript: Creating Objects with Object Literals
After watching this video, you will be able to create JavaScript objects using object literals, and access and manipulate object properties.
-
Mastering DevOps with JavaScript: Creating and Using a Closure in JS
After watching this video, you will be able to create and use a closure in JavaScript.
-
Mastering DevOps with JavaScript: Slicing, Splicing, Combining, and Copying Arrays
After watching this video, you will be able to slice, splice, copy, and merge arrays.
-
Mastering DevOps with JavaScript: Looping JS Arrays
After watching this video, you will be able to use various methods for iterating JS arrays.
-
Mastering DevOps with JavaScript: Defining and Using Functions
After watching this video, you will be able to describe function definitions and parameters, and understand how to return values from functions.
-
Mastering DevOps with JavaScript: Sorting, Reversing, and Using Map on Arrays
After watching this video, you will be able to sort and reverse an array and use map to run functions against the array contents.
-
Mastering DevOps with JavaScript: Working with Promises
After watching this video, you will be able to use ES6 native built-in promises to handle asynchronous operations.
-
Mastering DevOps with JavaScript: Using Built-in Date Methods
After watching this video, you will be able to work with the Date object to manipulate the date, including working with the local time zone, UTC, and GMT date and times.
-
Mastering DevOps with JavaScript: Working with Built-in Math Methods
After watching this video, you will be able to use the built-in Math object to do calculations, manipulate numeric data, and perform math operations.
-
Mastering DevOps with JavaScript: Using Interactive Form Events
After watching this video, you will be able to implement interactive events like onblur, onfocus, and onsubmit to provide interactivity or react to user actions.
-
Mastering DevOps with JavaScript: Working with Page Event Handlers
After watching this video, you will be able to use page event handlers to respond to page loads and unloading, scrolling, and resizing of the browser window.
-
Master DevOps with Puppet: Understanding and Installing Puppet
After watching this video, you will be able to describe the concepts of Puppet and its configuration options.
-
Mastering DevOps with JavaScript: Using Built-in JavaScript Features
After watching this video, you will be able to use the built-in JavaScript event handlers to receive and react to events occurring on a web page.
-
Mastering DevOps with JavaScript: Manipulating Strings
After watching this video, you will be able to manipulate string objects by concatenating, splicing, adjusting case, finding patterns, and removing, adding, and replacing substrings.
-
Mastering DevOps with JavaScript: Handling Keyboard Events
After watching this video, you will be able to manage keyboard events from within elements and from within the document to provide a keyboard-friendly interface.
-
Mastering DevOps with JavaScript: Using Mouse Event Handlers
After watching this video, you will be able to respond to user actions with mouse event handlers such as click, double click, and the wheel.
-
Master DevOps with Puppet: Installing Puppet Master on AWS EC2
After watching this video, you will be able to install and configure Puppet master on Amazon Web Services EC2.
-
Master DevOps with Puppet: Getting It All to Work
After watching this video, you will be able to build out the Puppet cloud environment and getting it all to work.
-
Master DevOps with Puppet: Installing a Puppet Agent on AWS EC2
After watching this video, you will be able to install and configure Puppet agent on Amazon EC2.
-
Master DevOps with Puppet: Use Puppet
After watching this video, you will be able to set a Puppet agent to be configured by a Puppet master.
-
Master DevOps with Puppet: Using External Facts
After watching this video, you will be able to use external Puppet facts for advanced configuration options.
-
Master DevOps with Puppet: Hiera Overview
After watching this video, you will be able to describe how Hiera works within Puppet.
-
Master DevOps with Puppet: Using Core Puppet Facts
After watching this video, you will be able to use core Puppet facts for server configuration.
-
Master DevOps with Puppet: Using the Facter Commands
After watching this video, you will be able to use the Puppet Facter utility.
-
Master DevOps with Puppet: Using the FACTERLIB Variable
After watching this video, you will be able to use the Puppet FACTERLIB variable for custom configuration options.
-
Master DevOps with Puppet: Using Custom Facts
After watching this video, you will be able to use custom Puppet facts for server configuration.
-
Master DevOps with Puppet: The Three Layers of Hiera
After watching this video, you will be able to identify the three layers of Hiera and how they are used.
-
Master DevOps with Puppet: Installing and Configuring Hiera
After watching this video, you will be able to identify how Hiera is installed and configured in different versions of Puppet.
-
Master DevOps with Puppet: Coding a Puppet Module
After watching this video, you will be able to code a module to be used by Puppet.
-
Master DevOps with Puppet: Creating a Puppet Test Class
After watching this video, you will be able to create a Puppet test class to be used by Hiera.
-
Jenkins 2: Jenkins Pre and Post-build Actions Properties Files
After watching this video, you will be able to describe the steps involved in pre and post-build actions of adding properties files.
-
Jenkins 2: Jenkins Pre and Post-build Actions Properties
After watching this video, you will be able to describe the steps involved in pre and post-build actions of adding properties.
-
Jenkins 2: Working with Maven Build Jobs for Jenkins
After watching this video, you will be able to illustrate how to build and work with Maven build jobs.
-
Jenkins 2: Running Jenkins Build Jobs
After watching this video, you will be able to illustrate how to build and run new build jobs.
-
Jenkins 2: Build Steps in Jenkins
After watching this video, you will be able to list and describe the steps and processes involved with Jenkins builds.
-
Jenkins 2: Automating Unit and Integration Tests
After watching this video, you will be able to describe how to perform automated unit and integration testing in Jenkins.
-
Jenkins 2: Parametrized and Distributed Builds in Jenkins
After watching this video, you will be able to illustrate the advanced build concepts that are implemented with parameterized and distributed builds.
-
Jenkins 2: Using Jenkins with Other Languages
After watching this video, you will be able to describe how Jenkins facilitates compatibility with other languages.
-
Jenkins 2: Perform Pre and Post-build Operations
After watching this video, you will be able to create a freestyle project and perform pre and post-build operations.
-
Jenkins 2: Securing Jenkins Build Jobs
After watching this video, you will be able to list the security features and illustrate provisioning security in Jenkins build jobs.
-
Jenkins 2: Code Coverage in Jenkins
After watching this video, you will be able to specify how to use code coverage in Jenkins.
-
Jenkins 2: Ignoring Tests in Jenkins
After watching this video, you will be able to describe how to setup ignore tests and the fundamental concepts behind ignoring tests.
-
Jenkins 2: Detecting Foul Code in Jenkins
After watching this video, you will be able to illustrate how to detect foul codes in Jenkins by using code coverage.
-
Jenkins 2: Automated Acceptance and Performance Tests
After watching this video, you will be able to describe how to facilitate and provision acceptance and performance tests automation in Jenkins.
-
Jenkins 2: Displaying Test Results in JenKins
After watching this video, you will be able to illustrate how to cdisplay test results in Jenkins.
-
Jenkins 2: Configuring Test Reports in Jenkins
After watching this video, you will be able to illustrate how to configure and manage test reports in Jenkins.
-
Jenkins 2: Finding Bugs with FindBugs
After watching this video, you will be able to work with FindBugs to look for code defects and bugs.
-
Jenkins 2: PMD Rulesets in Jenkins
After watching this video, you will be able to demonstrate how to work with PMD Rulesets.
-
Jenkins 2: Verifying HTML Validity in Jenkins
After watching this video, you will be able to specify how to verify HTML validity in Jenkins.
-
Jenkins 2: Finding Security Defects with FindBugs
After watching this video, you will be able to list the security related bugs and use FindBugs to detect security threats and bugs.
-
Jenkins 2: Managing Nodes in Jenkins
After watching this video, you will be able to manage various node operations in Jenkins.
-
Jenkins 2: Configuring Nodes in Jenkins
After watching this video, you will be able to describe how to set up and configure mulitple nodes in Jenkins.
-
Jenkins 2: Master and Slave Node Architecture in Jenkins
After watching this video, you will be able to set up and configure master and slave node architecture in Jenkins.
-
Jenkins 2: Distributing Jobs over Nodes in Jenkins
After watching this video, you will be able to specify how to distribute various jobs over multiple nodes.
-
Jenkins 2: Reporting Using an External POM
After watching this video, you will be able to demonstrate how to achieve reporting configuration using an external pom.xml.
-
Jenkins 2: Introduction to Nodes in Jenkins
After watching this video, you will be able to describe the concept of nodes in Jenkins.
-
Jenkins 2: Automate Testing and Achieve CI
After watching this video, you will be able to perform various build and release operations.
-
Jenkins 2: Best Practices - Dos and Dont's
After watching this video, you will be able to list and describe the best practices of administering and maintaining Jenkins.
-
Jenkins 2: Maintaining Jenkins
After watching this video, you will be able to describe how to maintain Jenkins and its associated maintenance tasks.
-
Jenkins 2: Jenkins Backups
After watching this video, you will be able to set up and configure Jenkins backup and perform various backup activities.
-
Elasticsearch: Installing and Configuring Kibana
After watching this video, you will be able to install and configure Kibana in ELK Stack.
-
Elasticsearch: Working with Kibana as a Visualization Layer
After watching this video, you will be able to describe how Kibana can work as a visualization layer of ELK.
-
Elasticsearch: Understanding Kibana Dashboard
After watching this video, you will be able to describe the Kibana dashboard and its various components.
-
Elasticsearch: Improving Search Performance
After watching this video, you will be able to classify the principles and guidelines of improving search performance in Elasticsearch.
-
Elasticsearch: Scripting Use Case
After watching this video, you will be able to demonstrate a scripting model use case, including preindex with query API.
-
Elasticsearch: Implementing Elasticsearch Filtering
After watching this video, you will be able to implement filtering using Elasticsearch in various scenarios.
-
Elasticsearch: Working with Indexes in Kibana
After watching this video, you will be able to demonstrate the capabilities of Kibana when working with indexes.
-
Elasticsearch: Using Kibana's Dashboard Capabilities
After watching this video, you will be able to use the various capabilities of a Kibana dashboard and visual artifacts.
-
Elasticsearch: Using Kibana Plugin Features
After watching this video, you will be able to work with Kibana's prebuild plugin features.
-
Elasticsearch: Prebuilding Kibana Visualization
After watching this video, you will be able to list Kibana visualization components and metrics.
-
Elasticsearch: Log Analysis in Kibana and Elasticsearch
After watching this video, you will be able to analyze log data in Elasticsearch and create meaningful visualizations.
-
Elasticsearch: Analyzing Log Data Using ELK
After watching this video, you will be able to demonstrate how to use ELK analysis to monitor and analyze log data.
-
Elasticsearch: Building Bar Charts
After watching this video, you will be able to demonstrate how to use bar charts and incorporate various metrics to build more effective bar charts.
-
Elasticsearch: Building Pie Charts
After watching this video, you will be able to demonstrate how to use pie charts and use metrics to build rich pie charts.
-
Elasticsearch: Building Dashboards
After watching this video, you will be able to demonstrate how to build a Kibana dashboard by adding artifacts.
-
Elasticsearch: Creating Dashboards in Kibana
After watching this video, you will be able to list the features of dashboards in Kibana.
-
Elasticsearch: Kibana Reporting
After watching this video, you will be able to work with the reporting capabilities of Kibana by implementing X-Pack.
-
Elasticsearch: X-Pack and Reporting
After watching this video, you will be able to list the X-Pack and reporting features provided by Kibana.
-
Elasticsearch: Data Discovery Using the Time Filter
After watching this video, you will be able to demonstrate data discovery using the time filter features in Kibana.
-
Elasticsearch: Data Discovery in Kibana
After watching this video, you will be able to describe how to facilitate Kibana's data discovery capabilities.
-
Elasticsearch: Index and Field Management in Kibana
After watching this video, you will be able to specify how to configure and manage indexes and fields in Kibana.
-
Elasticsearch: ELK Stack Limitations
After watching this video, you will be able to describe and specify the limitations associated with ELK Stack.
-
Elasticsearch: Machine Learning Concepts
After watching this video, you will be able to describe the implementation and benefits of machine learning in analytics.
-
Elasticsearch: Field Filtering in Kibana
After watching this video, you will be able to work with filters and use the field filtering capabilities provided by Kibana.
-
Elasticsearch: Machine Learning Jobs in ELK
After watching this video, you will be able to work with machine learning jobs in ELK.
-
Elasticsearch: ELK Machine Learning Capabilities
After watching this video, you will be able to list the machine learning capabilities of Kibana and how they benefit data management.
-
Jenkins 2: Jenkins Continuous Integration
After watching this video, you will be able to specify the processes associated with Jenkins continuous integration.
-
Elasticsearch: Building Visualization Using Time Series
After watching this video, you will be able to use ELK to build different variations of time series.
-
Jenkins 2: Preparing Your Environment for Jenkins
After watching this video, you will be able to classify the prerequisites and the base technologies used when setting up Jenkins.
-
Jenkins 2: Architecture and Capabilities of Jenkins
After watching this video, you will be able to describe the architecture and capabilities of Jenkins and automating continuous integration with Jenkins.
-
Elasticsearch: Business Data Management Using ELK
After watching this video, you will be able to demonstrate how to manage business data with the help of business use cases.
-
Elasticsearch: Time Series
After watching this video, you will be able to demonstrate how to work with time series data visualization to exploit the capabilities provided by time series.
-
Jenkins 2: Configuring Jenkins Automation Tools
After watching this video, you will be able to list and configure the Jenkins tools that can be used in automating the process of integration.
-
Jenkins 2: Installing Jenkins
After watching this video, you will be able to demonstrate how to set up Jenkins.
-
Jenkins 2: Jenkins Prebuild Actions
After watching this video, you will be able to describe the various pre-build actions and how to perform them.
-
Jenkins 2: Setting Up Jenkins Projects
After watching this video, you will be able to demonstrate how to get started with a project in Jenkins.
-
Jenkins 2: Working with Jenkins Plugins
After watching this video, you will be able to list the most commonly used plugins in Jenkins and specify their purpose.
-
Jenkins 2: Jenkins Plugins
After watching this video, you will be able to specify the basic working process of adding, managing, and, upgrading plugins in Jenkins.
-
Jenkins 2: Jenkins Build Jobs Fundamentals
After watching this video, you will be able to describe what is a Jenkins build job.
-
Jenkins 2: Set Up Builds and Use Plugins
After watching this video, you will be able to set up a project and work with builds and plugins in Jenkins.
-
Jenkins 2: Creating a Jenkins Build Job
After watching this video, you will be able to build and configure a simple Jenkins build job.
-
Jenkins 2: Jenkins Reporting Tools
After watching this video, you will be able to demonstrate how to use Jenkins reporting.
-
Jenkins 2: Build Jobs in Action
After watching this video, you will be able to demonstrate how to work with Jenkins build jobs.
-
Kubernetes: Using kubemci to Deploy Multicluster Ingress
After watching this video, you will be able to work with the kubemci command-line tool to deploy global multicluster Ingress with Kubernetes clusters.
-
Kubernetes: Deploying an Application to Multiple Clusters
After watching this video, you will be able to deploy an application to multiple Kubernetes clusters.
-
Kubernetes: Tearing Down a Multicluster Ingress Deployment
After watching this video, you will be able to perform a tear down of a multicluster Ingress deployment.
-
Kubernetes: Testing a Global Multicluster Ingress Deployment
After watching this video, you will be able to test global multicluster Ingress with Kubernetes clusters.
-
Elasticsearch: ELK Fundamentals
After watching this video, you will be able to describe Elasticsearch, Logstash, and Kibana and list the components of ELK.
-
Elasticsearch: Data Management Methodologies
After watching this video, you will be able to describe data storage methodologies and NoSQL.
-
Elasticsearch: ELK Capabilities
After watching this video, you will be able to recall the capabilities of ELK.
-
Elasticsearch: Elasticsearch Plugin Management
After watching this video, you will be able to manage Elasticsearch plugins for better cluster management and feature sets.
-
Elasticsearch: Elasticsearch Cluster Management
After watching this video, you will be able to configure Elasticsearch clusters for storage reliability.
-
Elasticsearch: Elasticsearch Monitoring
After watching this video, you will be able to work with monitoring options and guidelines for cluster monitoring.
-
Elasticsearch: Scalability Concept Design
After watching this video, you will be able to define the concept of scalability design and capacity planning in Elasticsearch.
-
Elasticsearch: Elasticsearch Architectural Concepts
After watching this video, you will be able to describe the architectural concepts of Elasticsearch clusters and nodes.
-
Elasticsearch: Elasticsearch Component Configuration
After watching this video, you will be able to install and configure Elasticsearch on Windows.
-
Elasticsearch: Elasticsearch in Production
After watching this video, you will be able to install and work with multinode Elasticsearch, including master and data nodes.
-
Elasticsearch: Indexes and Sharding
After watching this video, you will be able to describe concept of indexes and sharding.
-
Elasticsearch: Configuring Single-node ELK Stack
After watching this video, you will be able to configure single-node Elasticsearch and Kibana.
-
Elasticsearch: Data Management in Elasticsearch
After watching this video, you will be able to describe concepts of structured and unstructured data management in Elasticsearch.
-
Elasticsearch: Understanding Data Dimensions and ELK Stack
After watching this video, you will be able to describe the problems and data types that ELK Stack can handle.
-
Elasticsearch: Understanding Logstash Mapping and Filtering
After watching this video, you will be able to recall mapping and filtering concepts of data ingestion using Logstash.
-
Elasticsearch: Using Data Input, Filter, and Output Plugins
After watching this video, you will be able to describe Logstash plugin management for input and output.
-
Elasticsearch: Demonstrating Data Filtering in Logstash
After watching this video, you will be able to demonstrate how data filtering is used in Logstash to get productive data.
-
Elasticsearch: Demonstrating Mapping in Logstash
After watching this video, you will be able to demonstrate how mapping works with Logstash in Elasticsearch.
-
Elasticsearch: Managing Logstash
After watching this video, you will be able to install and configure Logstash for data ingestion.
-
Elasticsearch: Understanding Logstash
After watching this video, you will be able to define Logstash and its role in ELK Stack.
-
Elasticsearch: Ingesting Data Using Logstash from Database
After watching this video, you will be able to prepare and configure Logstash to ingest data in Elasticsearch from databases.
-
Elasticsearch: Ingesting Data Using Logstash from File
After watching this video, you will be able to prepare and configure Logstash to ingest data in Elasticsearch from files.
-
Elasticsearch: Monitoring and Fault Detection in Logstash
After watching this video, you will be able to work with monitoring and fault detection using Logstash and Beats.
-
Elasticsearch: Demonstrating Enrichment of Data Using Grok
After watching this video, you will be able to demonstrate how to enrich data using grok and the lookup options.
-
Elasticsearch: Enriching Data Using Grok
After watching this video, you will be able to specify how to enrich data using grok and the lookup options.
-
Elasticsearch: Managing Search Results
After watching this video, you will be able to list and describe the common tasks in sorting and pagination of search results.
-
Elasticsearch: Using Elasticsearch Scalability Features
After watching this video, you will be able to work with the scalability features of Elasticsearch and manage multinode startup.
-
Elasticsearch: Understanding Elasticsearch's Aggregation Capability
After watching this video, you will be able to list and classify the types of aggregations available in Elasticsearch.
-
Elasticsearch: Implementing Autocomplete Suggestions
After watching this video, you will be able to implement autocomplete suggestions for users.
-
Elasticsearch: Indexing in Elasticsearch
After watching this video, you will be able to list Elasticsearch components and indexing documents using REST and API.
-
Elasticsearch: Ingesting Data Using Logstash
After watching this video, you will be able to prepare Logstash configuration to ingest data in Elasticsearch.
-
Elasticsearch: Understanding Sharding and Scalability
After watching this video, you will be able to describe how Elasticsearch scaling and sharding work internally.
-
Elasticsearch: Using Dataset and Index Application
After watching this video, you will be able to demonstrate how to index datasets and conduct search activities using Elasticsearch.
-
Elasticsearch: Working with Aggregation in Elasticsearch
After watching this video, you will be able to configure and work with metrics and bucket aggregation in Elasticsearch.
-
Elasticsearch: Scripting Language Basics
After watching this video, you will be able to describe the scripting language and query API in Elasticsearch.
-
Elasticsearch: Managing Relationships in Elasticsearch
After watching this video, you will be able to describe the concept of relationship management and limitations in Elasticsearch.
-
Jenkins 2: Jenkins Source Code Management
After watching this video, you will be able to describe how to configure source codes and manage source codes in Jenkins.
-
Jenkins 2: Creating Freestyle Build Jobs for Jenkins
After watching this video, you will be able to specify how we can create and provision a freestyle build job.
-
Jenkins 2: Build Triggers in Jenkins
After watching this video, you will be able to specify how to provision and work with build triggers in Jenkins.
-
Mastering Docker for DevOps: Deploying Docker to the Cloud
After watching this video, you will be able to deploy a Docker app on the cloud and verify the deployment.
-
Mastering Docker for DevOps: Docker Microsoft Azure VM Deployment
After watching this video, you will be able to deploy a Microsoft Azure virtual machine running Docker.
-
Mastering DevOps with JavaScript: Reading and Writing to Arrays
After watching this video, you will be able to manipulate arrays by adding and removing items.
-
Master DevOps with Puppet: Extending Facter
After watching this video, you will be able to describe how to extend the functionality of Facter.
-
Master DevOps with Puppet: Puppet File Server
After watching this video, you will be able to describe how the Puppet file server works.
-
Master DevOps with Puppet: Creating Ruby Defined Facts
After watching this video, you will be able to describe how to create Ruby based facts.
-
Master DevOps with Puppet: Directory Locations
After watching this video, you will be able to discover the ways Puppet uses local directories.
-
Master DevOps with Puppet: Roles and Profiles
After watching this video, you will be able to describe how to provide advanced configuration with roles and profiles.
-
Master DevOps with Puppet: Usage with Modules
After watching this video, you will be able to describe how to provide advanced configuration with modules.
-
Master DevOps with Puppet: Refactor Puppet Configuration
After watching this video, you will be able to refactor Puppet Configuration.