Certificazione MCTS Microsoft Certified Technology Specialist: MICROSOFT WINDOWS 7 CONFIGURATION
|
 |
Cos'è

|
La nuova certificazione Microsoft Certified Technology Specialist (MCTS) attesta il livello di competenza acquisito nella configurazione, supporto all'utente finale e nella risoluzione dei problemi relativi agli ambienti desktop in esecuzione su sistema operativo Microsoft Windows 7.
La certificazione MCTS è approvata ufficialmente da Microsoft ed è riconosciuta ai fini lavorativi, scolastici e universitari.
La certificazione MCTS e' riconosciuta come credito formativo negli Esami di Stato Conclusivi.
L'ITC V. Giordano promuove la certificazione MCTS su Windows 7 organizzando corsi di formazione tenuti da docenti accredidati Microsoft. Per gli esami ci si rivolge ai Test Center accreditati PROMETRIC.
L'esame MCTS su Windows 7, EXAM 70-680, intende validare le seguenti competenze:
- Installing, Upgrading and Migrating to Windows 7 (14%)
- Deploying Windows 7 (13%)
- Configuring Hardware and Applications (14%)
- Configuring Network Connectivity (14%)
- Configuring Access to Resources (13%)
- Configuring Mobile Computing (10%)
- Monitoring and Maintaining Systems that Run Windows 7 (11%)
- Configuring Backup and Recovery Options (11%)
|
Il Syllabus
 |
SKILLS ESAME 70-680
Installing, Upgrading, and Migrating to Windows 7 (14 percent)
- Perform a clean installation.
- identifying hardware requirements; setting up as the sole operating system; setting up as dual boot; installation methods; boot from the source of installation, preparing the installation source: USB, CD, network share, WDS
- Upgrade to Windows 7 from previous versions of Windows.
- upgrading from Windows Vista; migrating from Windows XP; upgrading from one edition of Windows 7 to another edition of Windows 7
- Migrate user profiles.
- migrating from one machine to another; migrating from previous versions of Windows; side-by-side vs. wipe and load
Deploying Windows 7 (13 percent)
- Capture a system image.
- preparing system for capture; creating a WIM file; automated capture; manual capture
- Prepare a system image for deployment.
- inserting an application into a system image; inserting a driver into a system image; inserting an update into a system image; configuring tasks to run after deployment
- Deploy a system image.
- automated deployment methods; manually deploying a customized image
- Configure a VHD.
- creating, deploying, booting, mounting, and updating VHDs; offline updates; offline servicing
Configuring Hardware and Applications (14 percent)
- Configure devices.
- updating, disabling, and uninstalling drivers; signed drivers; conflicts between drivers; configuring driver settings; resolving problem device driver
- Configure application compatibility.
- setting compatibility mode; implementing shims; compatibility issues with Internet Explorer
- Configure application restrictions.
- setting software restriction policies; setting application control policies; setting through group policy or local security policy
- Configure Internet Explorer.
- configuring compatibility view; configuring security settings; configuring providers; managing add-ons; controlling InPrivate mode; certificates for secure Web sites
Configuring Network Connectivity (14 percent)
- Configure IPv4 network settings.
- connecting to a network; configuring name resolution; setting up a connection for a network; network locations; resolving connectivity issues; APIPA
- Configure IPv6 network settings.
- configuring name resolution; connecting to a network; setting up a connection for a network; network locations; resolving connectivity issues; link local multicast name resolution
- Configure networking settings.
- adding a physically connected (wired) or wireless device; connecting to a wireless network; configuring security settings on the client; set preferred wireless networks; configuring network adapters; configuring location-aware printing
- Configure Windows Firewall.
- configuring rules for multiple profiles; allowing or denying an application; network-profile-specific rules; configuring notifications; configuring authenticated exceptions
- Configure remote management.
- remote management methods; configuring remote management tools; executing PowerShell commands
Configuring Access to Resources (13 percent)
- Configure shared resources.
- folder virtualization; shared folder permissions; printers and queues; configuring HomeGroup settings
- Configure file and folder access.
- encrypting files and folders by using EFS; configuring NTFS permissions; resolving effective permissions issues; copying files vs. moving files
- Configure user account control (UAC).
- configuring local security policy; configuring admin vs. standard UAC prompt behaviors; configuring Secure Desktop
- Configure authentication and authorization.
- resolving authentication issues; configuring rights; managing credentials; managing certificates; smart cards with PIV; elevating user privileges; multifactor authentication
- Configure BranchCache.
- distributed cache mode vs. hosted mode; network infrastructure requirements; configuring settings; certificate management
Configuring Mobile Computing (10 percent)
- Configure BitLocker and BitLocker To Go.
- configuring BitLocker and BitLocker To Go policies; managing Trusted Platform Module (TPM) PINs; configuring startup key storage; data recovery agent support
- Configure DirectAccess.
- configuring client side; configuring authentication; network infrastructure requirements
- Configure mobility options.
- configuring offline file policies; transparent caching; creating and migrating power policy
- Configure remote connections.
- establishing VPN connections and authentication; enabling a VPN reconnect; advanced security auditing; NAP quarantine remediation; dial-up connections; remote desktop; published apps
Monitoring and Maintaining Systems that Run Windows 7 (11 percent)
- Configure updates to Windows 7.
- configuring update settings; determining source of updates; configuring Windows Update policies; reviewing update history; checking for new updates; rolling back updates
- Manage disks.
- managing disk volumes; managing file system fragmentation; RAID; removable device policies
- Monitor systems.
- configuring event logging; filtering event logs; event subscriptions; data collector sets; generating a system diagnostics report
- Configure performance settings.
- configuring page files; configuring hard drive cache; updated drivers; configuring networking performance; configuring power plans; configuring processor scheduling; configuring desktop environment; configuring services and programs to resolve performance issues; mobile computing performance issues; configuring power
Configuring Backup and Recovery Options (11 percent)
- Configure backup.
- creating a system recovery disk; backing up files, folders, or full system; scheduling backups
- Configure system recovery options.
- configuring system restore points; restoring system settings; last known good configuration; complete restore; driver rollback
- Configure file recovery options.
- configuring file restore points; restoring previous versions of files and folders; restoring damaged or deleted files by using shadow copies; restore user profiles
|
|