Microsoft Certified Technology Specialist

Pre-Requisites: Knowledge in PC hardware and network installation, configuration, and administration concept in a stand-alone or network enjoyment. Proficiency with one or more MS windows NT/2000/ XP operating systems. Fluency in navigating operating systems and basic understanding of network services.

5-stars

Key Features

  • Online live classroom available
  • Quality learning materials
  • Small Class Sizes
  • State of the Art Facility
  • Free Retakes
  • Instructor Led Classroom training
  • Certified Industry Experienced Teachers
  • 100% Job Placement assistance

After passing this exam Candidates should be able to install, deploy, and upgrade to Windows 7, including ensuring hardware and software compatibility. Additionally, candidates should be able to configure pre-installation and post-installation system settings, Windows security features, network connectivity applications included with Windows 7, and mobile computing. Candidates should also be able to maintain systems, including monitoring for and resolving performance and reliability issues. Candidates should have a basic understanding of Windows PowerShell syntax.

Demonstrate your specialized technical expertise with a Microsoft Certified Technology Specialist (MCTS) credential. By earning this credential, you can prove your ability to successfully implement, build on, troubleshoot, and debug a particular Microsoft technology, such as a Windows operating system Windows 7 exam 70-680 also counts as credit toward the following certification(s):

  • MCITP: Enterprise Administrator
  • MCITP: Enterprise Desktop Administrator 7
  • MCITP: Enterprise Desktop Support Technician 7
  • Installing, Upgrading, and Migrating to Windows 7 (14 percent)
  • Perform a clean installation.
  • This objective may include but is not limited to: identifying hardware requirements; setting up as the sole operating system; setting up as dual boot; installation methods; boot from the source of installation, preparing the installation source: USB, CD, network share, WDS
  • Upgrade to Windows 7 from previous versions of Windows.
  • This objective may include but is not limited to: upgrading from Windows Vista; migrating from Windows XP; upgrading from one edition of Windows 7 to another edition of Windows 7
  • Migrate user profiles.
  • This objective may include but is not limited to: migrating from one machine to another; migrating from previous versions of Windows; side-by-side vs. wipe and load
  • Deploying Windows 7 (13 percent)
  • Capture a system image.
  • This objective may include but is not limited to: preparing system for capture; creating a WIM file; automated capture; manual capture
  • Prepare a system image for deployment.
  • This objective may include but is not limited to: inserting an application into a system image; inserting a driver into a system image; inserting an update into a system image; configuring tasks to run after deployment
  • Deploy a system image.
  • This objective may include but is not limited to: automated deployment methods; manually deploying a customized image
  • Configure a VHD.
  • This objective may include but is not limited to: creating, deploying, booting, mounting, and updating VHDs; offline updates; offline servicing
  • Configuring Hardware and Applications (14 percent)
  • Configure devices.
  • This objective may include but is not limited to: updating, disabling, and uninstalling drivers; signed drivers; conflicts between drivers; configuring driver settings; resolving problem device driver
  • Configure application compatibility.
  • This objective may include but is not limited to: setting compatibility mode; implementing shims; compatibility issues with Internet Explorer
  • Configure application restrictions.
  • This objective may include but is not limited to: setting software restriction policies; setting application control policies; setting through group policy or local security policy
  • Configure Internet Explorer.
  • This objective may include but is not limited to: configuring compatibility view; configuring security settings; configuring providers; managing add-ons; controlling InPrivate mode; certificates for secure Web sites
  • Configuring Network Connectivity (14 percent)
  • Configure IPv4 network settings.
  • This objective may include but is not limited to: connecting to a network; configuring name resolution; setting up a connection for a network; network locations; resolving connectivity issues; APIPA
  • Configure IPv6 network settings.
  • This objective may include but is not limited to: configuring name resolution; connecting to a network; setting up a connection for a network; network locations; resolving connectivity issues; link local multicast name resolution
  • Configure networking settings.
  • This objective may include but is not limited to: adding a physically connected (wired) or wireless device; connecting to a wireless network; configuring security settings on the client; set preferred wireless networks; configuring network adapters; configuring location-aware printing
  • Configure Windows Firewall.
  • This objective may include but is not limited to: configuring rules for multiple profiles; allowing or denying an application; network-profile-specific rules; configuring notifications; configuring authenticated exceptions
  • Configure remote management.
  • This objective may include but is not limited to: remote management methods; configuring remote management tools; executing PowerShell commands
  • Configuring Access to Resources (13 percent)
  • Configure shared resources.
  • This objective may include but is not limited to: folder virtualization; shared folder permissions; printers and queues; configuring HomeGroup settings
  • Configure file and folder access.
  • This objective may include but is not limited to: encrypting files and folders by using EFS; configuring NTFS permissions; resolving effective permissions issues; copying files vs. moving files
  • Configure user account control (UAC).
  • This objective may include but is not limited to: configuring local security policy; configuring admin vs. standard UAC prompt behaviors; configuring Secure Desktop
  • Configure authentication and authorization.
  • This objective may include but is not limited to: resolving authentication issues; configuring rights; managing credentials; managing certificates; smart cards with PIV; elevating user privileges; multifactor authentication
  • Configure BranchCache.
  • This objective may include but is not limited to: distributed cache mode vs. hosted mode; network infrastructure requirements; configuring settings; certificate management
  • Configuring Mobile Computing (10 percent)
  • Configure BitLocker and BitLocker To Go.
  • This objective may include but is not limited to: configuring BitLocker and BitLocker To Go policies; managing Trusted Platform Module (TPM) PINs; configuring startup key storage; data recovery agent support
  • Configure DirectAccess.
  • This objective may include but is not limited to: configuring client side; configuring authentication; network infrastructure requirements
  • Configure mobility options.
  • This objective may include but is not limited to: configuring offline file policies; transparent caching; creating and migrating power policy
  • Configure remote connections.
  • This objective may include but is not limited to: establishing VPN connections and authentication; enabling a VPN reconnect; advanced security auditing; NAP quarantine remediation; dial-up connections; remote desktop; published apps
  • Monitoring and Maintaining Systems that Run Windows 7 (11 percent)
  • Configure updates to Windows 7.
  • This objective may include but is not limited to: configuring update settings; determining source of updates; configuring Windows Update policies; reviewing update history; checking for new updates; rolling back updates
  • Manage disks.
  • This objective may include but is not limited to: managing disk volumes; managing file system fragmentation; RAID; removable device policies
    Monitor systems.
  • This objective may include but is not limited to: configuring event logging; filtering event logs; event subscriptions; data collector sets; generating a system diagnostics report
  • Configure performance settings.
  • This objective may include but is not limited to: configuring page files; configuring hard drive cache; updated drivers; configuring networking performance; configuring power plans; configuring processor scheduling; configuring desktop environment; configuring services and programs to resolve performance issues; mobile computing performance issues; configuring power
  • Configuring Backup and Recovery Options (11 percent)
  • Configure backup.
  • This objective may include but is not limited to: creating a system recovery disk; backing up files, folders, or full system; scheduling backups
  • Configure system recovery options.
  • This objective may include but is not limited to: configuring system restore points; restoring system settings; last known good configuration; complete restore; driver rollback
  • Configure file recovery options.
  • This objective may include but is not limited to: configuring file restore points; restoring previous versions

Course Number : MCTS-1-0100

Duration : 40 hours

1 Step 1

Request Information!

Who you are?

By submitting this form, you are giving your express written consent for Global Information Technology to contact you regarding our programs and services using email, telephone or text.  This consent is not required to purchase goods/services, and you may always call us directly at 1-866-464-4846.

reCaptcha v3
keyboard_arrow_leftPrevious
Nextkeyboard_arrow_right
FormCraft - WordPress form builder