Lesson 1 Evaluating Hardware Readiness and Capability |
|
1 | (26) |
|
|
2 | (8) |
|
|
2 | (5) |
|
Using the Windows Desktop |
|
|
7 | (1) |
|
Accessing Configuration Settings |
|
|
8 | (2) |
|
Introducing Windows 8 Editions |
|
|
10 | (2) |
|
Understanding Windows 8 System Requirements |
|
|
12 | (1) |
|
Selecting Installation Options |
|
|
13 | (4) |
|
Will the Hardware Support the New Operating System? |
|
|
13 | (1) |
|
Will the New Operating System Support the Existing Applications? |
|
|
14 | (1) |
|
Which Windows 8 Edition Should I Install? |
|
|
14 | (1) |
|
Which Processor Platform Should I Use? |
|
|
15 | (1) |
|
Should I Perform an Upgrade or a Clean Installation? |
|
|
15 | (1) |
|
Do I Have to Install Multiple Languages? |
|
|
16 | (1) |
|
Running Windows 8 Upgrade Assistant |
|
|
17 | (3) |
|
Identifying Upgrade Paths |
|
|
20 | (2) |
|
Upgrading Windows 8 Editions |
|
|
20 | (1) |
|
|
21 | (1) |
|
Upgrading from Earlier Windows Versions |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
23 | (3) |
|
|
26 | (1) |
Lesson 2 Installing Windows 8 |
|
27 | (29) |
|
Understanding the Windows 8 Boot Environment |
|
|
28 | (5) |
|
|
29 | (1) |
|
|
30 | (1) |
|
Understanding Windows PE Limitations |
|
|
30 | (1) |
|
|
31 | (1) |
|
Understanding the Windows 8 Startup Process |
|
|
32 | (1) |
|
Performing a Clean Installation |
|
|
33 | (10) |
|
Installing Third-Party Device Drivers |
|
|
40 | (1) |
|
Working with Installation Partitions |
|
|
41 | (1) |
|
|
42 | (1) |
|
|
43 | (5) |
|
|
43 | (2) |
|
Upgrading from Windows 7 to Windows 8 |
|
|
45 | (1) |
|
Upgrading Windows 8 Editions |
|
|
46 | (1) |
|
Migrating from Windows XP or Windows Vista |
|
|
47 | (1) |
|
|
48 | (4) |
|
|
52 | (1) |
|
|
52 | (3) |
|
|
55 | (1) |
Lesson 3 Migrating and Configuring User Data |
|
56 | (24) |
|
Configuring User Profiles |
|
|
57 | (3) |
|
|
58 | (1) |
|
Using Mandatory User Profiles |
|
|
59 | (1) |
|
Managing Profile Compatibility |
|
|
59 | (1) |
|
|
60 | (13) |
|
Using Windows Easy Transfer |
|
|
61 | (12) |
|
Using the User State Migration Tool |
|
|
73 | (1) |
|
Configuring Folder Redirection |
|
|
73 | (3) |
|
|
76 | (1) |
|
|
76 | (3) |
|
|
79 | (1) |
Lesson 4 Working with Disks and Devices |
|
80 | (21) |
|
Working with Devices and Drivers |
|
|
80 | (17) |
|
Understanding Device Drivers |
|
|
81 | (7) |
|
|
88 | (2) |
|
|
90 | (7) |
|
|
97 | (1) |
|
|
98 | (2) |
|
|
100 | (1) |
Lesson 5 Installing and Configuring Desktop Applications |
|
101 | (19) |
|
Configuring Program Defaults |
|
|
102 | (6) |
|
|
102 | (2) |
|
Modifying File Associations |
|
|
104 | (2) |
|
Modifying Autoplay Settings |
|
|
106 | (1) |
|
Setting Program Access Defaults |
|
|
106 | (1) |
|
|
107 | (1) |
|
Configuring Application Compatibility |
|
|
108 | (5) |
|
Troubleshooting Program Compatibility |
|
|
109 | (1) |
|
Setting Compatibility Modes |
|
|
110 | (1) |
|
Configuring Application Compatibility Policies |
|
|
111 | (2) |
|
Virtualizing Applications Using App-V |
|
|
113 | (3) |
|
|
116 | (1) |
|
|
116 | (3) |
|
|
119 | (1) |
Lesson 6 Installing and Configuring Windows Store Applications |
|
120 | (20) |
|
Installing and Configuring Windows Store Apps |
|
|
121 | (10) |
|
Installing, Reinstalling, and Updating Windows Store Apps |
|
|
121 | (7) |
|
Restricting Access to the Windows Store Content |
|
|
128 | (3) |
|
Adding Internal Content (Side Loading) |
|
|
131 | (1) |
|
Disabling the Windows Store |
|
|
132 | (3) |
|
|
135 | (1) |
|
|
136 | (3) |
|
|
139 | (1) |
Lesson 7 Controlling Access to Local Hardware and Applications |
|
140 | (14) |
|
Configuring Hardware Restrictions |
|
|
140 | (4) |
|
Controlling Device Installation |
|
|
141 | (1) |
|
Controlling Removable Storage Access |
|
|
142 | (2) |
|
Configuring Application Restrictions |
|
|
144 | (7) |
|
Using Software Restriction Policies |
|
|
144 | (3) |
|
|
147 | (4) |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
153 | (1) |
Lesson 8 Configuring Internet Explorer |
|
154 | (36) |
|
Administering Internet Explorer |
|
|
155 | (17) |
|
Configuring Internet Explorer |
|
|
156 | (16) |
|
|
172 | (1) |
|
Securing Internet Explorer |
|
|
172 | (13) |
|
Understanding Protected Mode |
|
|
172 | (4) |
|
Configuring Security Zones |
|
|
176 | (3) |
|
Configuring the SmartScreen Filter |
|
|
179 | (1) |
|
|
180 | (2) |
|
Browsing with Certificates |
|
|
182 | (3) |
|
|
185 | (1) |
|
|
185 | (4) |
|
|
189 | (1) |
Lesson 9 Configuring Client Hyper-V |
|
190 | (23) |
|
Installing Client Hyper-V and Configuring Virtual Machine |
|
|
191 | (9) |
|
Installing Client Hyper-V |
|
|
191 | (4) |
|
Exploring Hyper-V Manager |
|
|
195 | (1) |
|
Creating a Virtual Machine Using Hyper-V Manager |
|
|
196 | (1) |
|
Configuring Virtual Machine Settings |
|
|
197 | (3) |
|
|
200 | (3) |
|
Working with Virtual Switches |
|
|
203 | (3) |
|
Creating Virtual Hard Disks |
|
|
206 | (3) |
|
Understanding Virtual Hard Disk Formats |
|
|
206 | (2) |
|
Managing and Configuring Virtual Hard Disks |
|
|
208 | (1) |
|
|
209 | (1) |
|
|
210 | (2) |
|
|
212 | (1) |
Lesson 10 Configuring IP Settings |
|
213 | (40) |
|
|
214 | (14) |
|
|
215 | (1) |
|
|
215 | (1) |
|
|
216 | (8) |
|
|
224 | (3) |
|
|
227 | (1) |
|
|
228 | (13) |
|
Installing Network Support |
|
|
229 | (2) |
|
Using the Network and Sharing Center |
|
|
231 | (4) |
|
Managing Network Connections |
|
|
235 | (6) |
|
|
241 | (7) |
|
|
242 | (1) |
|
|
243 | (1) |
|
|
244 | (1) |
|
|
245 | (1) |
|
|
246 | (2) |
|
|
248 | (1) |
|
|
249 | (3) |
|
|
252 | (1) |
Lesson 11 Configuring Network Settings |
|
253 | (20) |
|
Configuring Network Settings |
|
|
254 | (1) |
|
Connecting to Wireless Networks |
|
|
254 | (4) |
|
Managing Preferred Wireless Networks |
|
|
258 | (3) |
|
Prioritizing Networks in Windows 8 |
|
|
258 | (2) |
|
Removing Wireless Networks/Profiles |
|
|
260 | (1) |
|
Configuring Network Adapters |
|
|
261 | (4) |
|
Configuring Location-Aware Printing |
|
|
265 | (2) |
|
|
267 | (1) |
|
|
268 | (4) |
|
|
272 | (1) |
Lesson 12 Configuring and Maintaining Network Security |
|
273 | (28) |
|
Defending Against Malware |
|
|
274 | (19) |
|
Using Windows 8 Action Center |
|
|
275 | (2) |
|
|
277 | (12) |
|
Introducing Windows Defender |
|
|
289 | (3) |
|
Using the Malicious Software Removal Tool |
|
|
292 | (1) |
|
Understanding Wireless Security |
|
|
293 | (3) |
|
Evaluating Wireless Networking Hardware |
|
|
293 | (1) |
|
Using Wired Equivalent Privacy |
|
|
294 | (1) |
|
Selecting an Authentication Method |
|
|
295 | (1) |
|
Using Wi-Fi Protected Access |
|
|
295 | (1) |
|
|
296 | (1) |
|
|
297 | (3) |
|
|
300 | (1) |
Lesson 13 Configuring Remote Management |
|
301 | (19) |
|
Using Remote Access Technologies |
|
|
301 | (14) |
|
Using Microsoft Management Console |
|
|
302 | (1) |
|
|
303 | (4) |
|
|
307 | (4) |
|
Using Windows Remote Management |
|
|
311 | (4) |
|
|
315 | (1) |
|
|
315 | (4) |
|
|
319 | (1) |
Lesson 14 Configuring Shared Resources |
|
320 | (43) |
|
Sharing Files and Folders |
|
|
321 | (16) |
|
Understanding Folder Sharing in Windows 8 |
|
|
321 | (1) |
|
|
322 | (1) |
|
|
323 | (3) |
|
|
326 | (3) |
|
|
329 | (2) |
|
|
331 | (1) |
|
Sharing the Public Folder |
|
|
332 | (1) |
|
|
333 | (2) |
|
Managing Share Permissions |
|
|
335 | (2) |
|
Combining Share and NTFS Permissions |
|
|
337 | (1) |
|
|
337 | (3) |
|
Configuring Near Field Communication (NFC) |
|
|
340 | (1) |
|
|
341 | (17) |
|
Understanding the Windows Print Architecture |
|
|
341 | (7) |
|
|
348 | (2) |
|
Configuring Printer Security |
|
|
350 | (2) |
|
Accessing a Shared Printer |
|
|
352 | (1) |
|
|
353 | (2) |
|
|
355 | (3) |
|
|
358 | (1) |
|
|
358 | (4) |
|
|
362 | (1) |
Lesson 15 Configuring File and Folder Access |
|
363 | (32) |
|
|
364 | (16) |
|
Understanding the Windows Permission Architecture |
|
|
364 | (6) |
|
Managing NTFS Permissions |
|
|
370 | (10) |
|
Using the Encrypting File System |
|
|
380 | (3) |
|
Encrypting a Folder with EFS |
|
|
381 | (1) |
|
Determining Whether a File or Folder is Encrypted |
|
|
382 | (1) |
|
|
383 | (1) |
|
Configuring Object Access Auditing |
|
|
384 | (6) |
|
|
390 | (1) |
|
|
390 | (4) |
|
|
394 | (1) |
Lessn 16 Configuring Local Security Settings |
|
395 | (21) |
|
Configuring Security for Windows 8 |
|
|
395 | (16) |
|
Configuring Local Security Policies |
|
|
396 | (3) |
|
Understanding User Account Control (UAC) |
|
|
399 | (2) |
|
Configuring User Account Control |
|
|
401 | (5) |
|
Configuring SmartScreen Filters |
|
|
406 | (3) |
|
|
409 | (2) |
|
|
411 | (1) |
|
|
412 | (3) |
|
|
415 | (1) |
Lesson 17 Configuring Authentication and Authorization |
|
416 | (47) |
|
Working with Users and Groups |
|
|
417 | (8) |
|
Understanding Local and Domain Users |
|
|
418 | (4) |
|
Understanding Local and Domain Groups |
|
|
422 | (3) |
|
Creating and Managing Local Users and Groups |
|
|
425 | (16) |
|
Using the User Accounts Control Settings |
|
|
426 | (9) |
|
Using the Local Users and Groups Snap-in |
|
|
435 | (6) |
|
Working with Domain Users and Groups |
|
|
441 | (1) |
|
Authenticating and Authorizing Users |
|
|
441 | (17) |
|
|
442 | (8) |
|
Using PIN and Picture Passwords |
|
|
450 | (2) |
|
|
452 | (1) |
|
|
453 | (2) |
|
|
455 | (1) |
|
|
455 | (1) |
|
Troubleshooting Authentication Issues |
|
|
456 | (1) |
|
|
456 | (2) |
|
|
458 | (1) |
|
|
458 | (4) |
|
|
462 | (1) |
Lesson 18 Configuring Remote Connections |
|
463 | (26) |
|
|
464 | (6) |
|
Understanding Network Infrastructure Requirements |
|
|
464 | (1) |
|
Understanding BranchCache Communications |
|
|
465 | (1) |
|
Understanding Content Information Versions |
|
|
466 | (1) |
|
Configuring BranchCache Settings |
|
|
467 | (3) |
|
Using Remote Network Connections |
|
|
470 | (16) |
|
Understanding Virtual Private Networking |
|
|
471 | (2) |
|
Authenticating Remote Users |
|
|
473 | (1) |
|
Creating a VPN Connection |
|
|
474 | (4) |
|
Creating a Broadband Connection |
|
|
478 | (2) |
|
|
480 | (1) |
|
|
481 | (5) |
|
|
486 | (1) |
|
|
486 | (2) |
|
|
488 | (1) |
Lesson 19 Configuring Mobility Options |
|
489 | (28) |
|
Using Windows Mobility Controls |
|
|
489 | (23) |
|
Opening Windows Mobility Center |
|
|
490 | (1) |
|
Configuring Mobile Display Options |
|
|
491 | (6) |
|
Configuring Presentation Settings |
|
|
497 | (1) |
|
Configuring Power Options |
|
|
498 | (6) |
|
|
504 | (8) |
|
|
512 | |
|
Configuring Windows To Go |
|
|
511 | (2) |
|
|
513 | (1) |
|
|
513 | (3) |
|
|
516 | (1) |
Lesson 20 Configuring Security for Mobile Devices |
|
517 | (24) |
|
Securing Your Mobile Devices |
|
|
518 | (10) |
|
|
518 | (1) |
|
Understanding BitLocker Requirements |
|
|
519 | (1) |
|
Enabling BitLocker on Operating System Drives |
|
|
520 | (5) |
|
Configuring BitLocker To Go |
|
|
525 | (3) |
|
Using Data Recovery Agents |
|
|
528 | (3) |
|
|
531 | (2) |
|
Using Windows Intune to Perform Remote Wipes |
|
|
533 | (1) |
|
Managing Location Settings |
|
|
533 | (4) |
|
Using Windows Location Provider (PLP) |
|
|
533 | (2) |
|
Using Personally Identifiable Information (PII) |
|
|
535 | (2) |
|
|
537 | (1) |
|
|
537 | (3) |
|
|
540 | (1) |
Lesson 21 Configuring and Managing Updates |
|
541 | (22) |
|
Configuring Update Settings |
|
|
542 | (5) |
|
|
542 | (2) |
|
|
544 | (2) |
|
Hiding and Restoring Updates |
|
|
546 | (1) |
|
Configuring Windows Update Policies |
|
|
547 | (8) |
|
Configuring Local Computer Policies and Microsoft Domain Group Policies to Manage Updates |
|
|
548 | (7) |
|
|
555 | (1) |
|
|
555 | (1) |
|
|
556 | (1) |
|
Updating Windows Store Applications |
|
|
557 | (2) |
|
|
559 | (1) |
|
|
559 | (3) |
|
|
562 | (1) |
Lesson 22 Managing Local Storage |
|
563 | (33) |
|
|
564 | (27) |
|
Understanding Partition Styles |
|
|
564 | (2) |
|
|
566 | (1) |
|
Understanding Volume Types |
|
|
567 | (1) |
|
Understanding File Systems |
|
|
568 | (1) |
|
Using the Disk Management Snap-in |
|
|
568 | (14) |
|
|
582 | (5) |
|
|
587 | (1) |
|
|
587 | (4) |
|
|
591 | (1) |
|
|
591 | (4) |
|
|
595 | (1) |
Lesson 23 Monitoring System Performance |
|
596 | (45) |
|
Monitoring and Diagnosing Performance |
|
|
597 | (22) |
|
|
598 | (10) |
|
The Comprehensive List of Performance Tools |
|
|
608 | (1) |
|
Using the Performance Monitor Console |
|
|
609 | (8) |
|
Using Reliability Monitor |
|
|
617 | (2) |
|
|
619 | (13) |
|
|
619 | (1) |
|
|
620 | (5) |
|
|
625 | (3) |
|
Viewing Advanced System Details in System Information |
|
|
628 | (1) |
|
Viewing System Configuration Details |
|
|
628 | (1) |
|
Adjusting Performance Settings |
|
|
629 | (1) |
|
Configuring Index Settings |
|
|
630 | (2) |
|
|
632 | (1) |
|
Troubleshooting Windows 8 |
|
|
632 | (3) |
|
Using the Windows Memory Diagnostic Tool |
|
|
633 | (1) |
|
Using the Windows Network Diagnostic Tool |
|
|
633 | (1) |
|
|
634 | (1) |
|
|
635 | (1) |
|
|
636 | (3) |
|
|
639 | (2) |
Lesson 24 Configuring Backup |
|
641 | (20) |
|
Configuring Data Protection |
|
|
641 | (16) |
|
Using Windows 7 File Recovery |
|
|
642 | (13) |
|
Creating a Windows 8 Recovery Drive |
|
|
655 | (2) |
|
|
657 | (1) |
|
|
658 | (2) |
|
|
660 | (1) |
Lesson 25 Configuring System Recovery Options |
|
661 | (22) |
|
Performing System Recovery of Windows 8 |
|
|
662 | (15) |
|
Understanding the Windows 8 Startup Process |
|
|
662 | (1) |
|
Troubleshooting Startup Failures |
|
|
663 | (2) |
|
Configuring System Restore Points |
|
|
665 | (2) |
|
Using the Last Known Good Configuration |
|
|
667 | (2) |
|
Performing a Complete Restore |
|
|
669 | (5) |
|
Performing Driver Rollbacks |
|
|
674 | (1) |
|
Exploring PC Refresh and PC Reset |
|
|
675 | (2) |
|
|
677 | (1) |
|
|
678 | (4) |
|
|
682 | (1) |
Lesson 26 Configuring File Recovery Options |
|
683 | (12) |
|
Overview of Windows 8 File Recovery Options |
|
|
683 | (7) |
|
|
684 | (4) |
|
Restoring Files and Folders |
|
|
688 | (2) |
|
Configuring File Restore Points |
|
|
690 | (2) |
|
|
692 | (1) |
|
|
693 | (1) |
|
|
694 | (1) |
Appendix A |
|
695 | (1) |
Index |
|
696 | |