Cisco Training Courses

Insoft has been serving IT community with official Cisco training offering since 2010. Find all the relevant information on Cisco training on this page.

View More

Cisco Certifications

Experience a blended learning approach that combines the best of instructor-led training and self-paced e-learning to help you prepare for your certification exam.

View More

Cisco Learning Credits

Cisco Learning Credits (CLCs) are prepaid training vouchers redeemed directly with Cisco that make planning for your success easier when purchasing Cisco products and services.

Have CLCs and want to redeem them?

Cisco Continuing Education

The Cisco Continuing Education Program offers all active certification holders flexible options to recertify by completing a variety of eligible training items.

View More

Cisco Digital Learning

Certified employees are VALUED assets. Explore Cisco official Digital Learning Library to educate yourself through recorded sessions.

Browse CDLL Catalogue

Cisco Business Enablement

The Cisco Business Enablement Partner Program focuses on sharpening the business skills of Cisco Channel Partners and customers.

View More

Fortinet Technical Certifications

The Fortinet Network Security Expert (NSE) program is an eight-level training and certification program to teach engineers of their network security for Fortinet FW skills and experience.

View More

Fortinet Technical Courses

Insoft is recognised as Fortinet Authorized Training Center in selected locations across EMEA.

View More

ATC Status

Check our ATC Status across selected countries in Europe.

View More

Fortinet Services Packages

Insoft Services has developed a specific solution to streamline and simplify the process of installing or migrating to Fortinet Products.

Browse Packages

Prepforce Bootcamp

The only comprehensive source available today to prepare for Fortinet NSE 8 certification globally.

View More

Microsoft Training

Insoft Services provides Microsoft training in EMEAR. We provide Microsoft technical training and certification courses that are led by world-class instructors.

View More

Technical Training

The evolution of Extreme Networks Technical Training provides a comprehensive progressive pathway from Associate to Professional accreditation.

View More

ATP Accreditation

As an authorised training partner (ATP), Insoft Services ensures that you receive the highest standards of education available.

View More

What we do

Through our global presence and partner ecosystem, we provide strategic IT consulting services to align IT services with customers' business goals.

View More

 

We are pleased to launch pre-scoped Enterprise Networking Consulting Packages, our ready-made solutions, tailored to ensure efficiency and cost containment.

 

View More

 

We specialize in the deployment of vendor-specific automation tools as well as open-source and vendor-independent solutions, that can be tuned in accordance with the business needs of a specific organization.

 

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

 

View More

 

We provide comprehensive IoT consultancy, deployment and support solutions for businesses that want to launch or improve their use of connected technologies. You’ll have the expert guidance you need to streamline operations, increase efficiency and maximize outcomes.

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

 

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

 

View More

 

We provide the highest level of expertise on Cisco consultancy services, that target audits of your current network and implementing updates for improved operational performance, secure data and compliant systems.

View More

 

We provide the highest level of expertise on Fortinet consultancy services that target audits of your current network and implementing updates for improved operational performance, secure data and compliant systems.

View More

 

Our team can help enterprises, get the most value from Extreme products and services following our predefined value-added packages or custom ones that fits business needs.

 

View More

About Us

Our training portfolio includes a wide range of IT training from IP providers, including Cisco, Extreme Networks, Fortinet, Microsoft, to name a few, in EMEA.

View More

Mobile Device Management

Contact Us

We would love to hear from you. Please complete this form to pre-book or request further information about our delivery options.

Data Protection & Privacy

I hereby allow Insoft Ltd. to contact me on this topic. Further, I authorise Insoft Ltd. processing, using collecting and storing my personal data for the purpose of these activities. All your data will be protected and secured as outlined in our privacy policy.

Close

Mobile Device Management

Enroll Now
Mobile Device Management
Duration
2 Days
Delivery
(Online and onsite)
Price
Price Upon Request

This two-day instructor-led course is intended for IT professionals who are responsible for developing a management strategy for mobile devices in the enterprise. Devices running Windows, iOS and Android operating systems will be covered. Utilizing various Microsoft technologies students will create a mobile device plan, configure mobile device management and master both connectivity and data security on these devices.

With the shift to BYOD (bring your own device) it is necessary that enterprises allow users to access information from a variety of devices with a minimum of risk to the loss of that information. The new tools implemented as a part of Windows Server 2012 and Windows Server 2012 R2 as well as System Center will allow for a complete set of BYOD enterprise policies.

  • Understand the various types of mobile devices which may connect to the enterprise.
  • Determine requirements for and connecting mobile devices via domain join, Workplace Join and VPNs.
  • Create a mobile device management strategy.
  • Configure a mobile device management infrastructure using Microsoft System Center products and Windows Server 2012 R2.
  • Secure corporate data when in transit or on the devices with IPSec and BitLocker.
  • Manage data security with Group Policy Objects (GPOs)
  • Synchronize data across multiple mobile devices using Work Folders in Windows 8/Windows 8.1.
  • Connecting to applications via Web Application Proxy.

Module 1: Overview of Mobile Device Management

In the past organizations either provided laptops or smart phones approved by the IT department and or allowed users to connect from their Windows based computers using options such as VPNs or Remote Desktop Gateways. These options still exist and remain common. However, the incredible growth of mobile devices from various vendors creates a need for managing access to data and applications from these devices. Organizations must determine the best methods for doing so in a secure manner.

Lessons

  • Lesson 1: What is Mobile Device Management?
  • Lesson 2: Overview of Device Management Options

Lab 1: None

  • None

After completing this module, students will be able to:

  • Understand the basics of mobile device management
  • Gain a high level overview of Microsoft Mobile Device Management tools

 

Module 2: Mobile Device Management Strategy and Infrastructure

Every organization has unique needs for connecting mobile devices to the corporate network to increase user productivity. Based on the principle of People-centric IT (PCIT) a mobile device strategy can be created to meet those needs. Once the strategy has been determined then it’s time to created the infrastructure.

Lessons

  • Lesson 1: Planning for a Mobile Device Management Strategy
  • Lesson 2: Designing a Mobile Device Management Infrastructure with Windows Server 2012 R2

Lab 1: Create the Mobile Device Management Infrastructure

  • Exercise 1: Prepare Active Directory.
  • Exercise 2: Prepare the Certification Authority.
  • Exercise 3: Prepare Active Directory Federation Services (ADFS).

After completing this module, students will be able to:

  • Create a mobile device management (MDM) strategy.
  • Design a mobile device management infrastructure based on Windows Server 2012 R2 technologies.

 

Module 3: Workplace Join and Work Folders

Allowing device connectivity is important, but more important is managing that connectivity. Workplace Join allows a way to track and control which devices can connect. Once connected users will need access to data, no matter the device. That data must be current and consistent without users manually copying files. Work Folders creates this ability.

Lessons

  • Lesson 1: Workplace Join for Mobile Devices
  • Lesson 2: Work Folders

Lab 1: Workplace Join Windows and iOS Devices

  • Exercise 1: Prepare the Workplace Join Infrastructure.
  • Exercise 2: Workplace Join an iOS Device.
  • Exercise 3: Workplace Join a Windows Device.

Lab 2: Work Folders

  • Exercise 1: Create the Work Folders Infrastructure.
  • Exercise 2: Install Work Folders on Devices.

After completing this module, students will be able to:

  • Set up the requirements for Workplace Join.
  • Workplace Join devices to Active Directory.
  • Create the Work Folders infrastructure.
  • Test Work Folders on devices.Resolve common application compatibility issues

 

Module 4: Web Application Proxy

In the previous module we learned how to connect non-domain devices to Active Directory for management and policies with Workplace Join. In addition we showed how to synchronize data between multiple devices using Work Folders. However almost always data will be used in some type of application, therefore a part of our MDM (Mobile Device Management) strategy must include accessing those applications from devices. This is the responsibility of Web Application Proxy.

Lessons

  • Lesson 1: Web Application Proxy Overview
  • Lesson 2: Installing the Web Application Proxy Role Service
  • Lesson 3: Configuring the WAP and Publishing Applications

Lab 1: Web Application Proxy

  • Exercise 1: Prepare the web application (website) on the SCCM virtual machine.
  • Exercise 2: Prepare the certificates.
  • Exercise 3: Install Web Application Proxy.
  • Exercise 4: Publish the application in Web Application Proxy.

After completing this module, students will be able to:

  • Understand the features and benefits of Web Application Proxy (WAP).
  • Install and configure WAP.
  • Publish and connect to applications using WAP.

 

Module 5: Mobile Device Management Security

One of the primary responsibilities of any IT professional is security. Physical security, network security and data security are critical. In this module we will look at how mobile devices affect security plans not just for BYOD, but also for the entire network infrastructure.

Lessons

  • Lesson 1: Overview of Enterprise and Mobile Device Management Security
  • Lesson 2: Hardening the Mobile Device Management Infrastructure

Lab 1: Securing the MDM Infrastructure and Communications

  • Exercise 1: Secure Accounts Used by MDM.
  • Exercise 2: Use Bitlocker to Encrypt a Client System.
  • Exercise 3: Configure IPSec.

After completing this module, students will be able to:

  • Understand security in the enterprise.
  • See how previously discussed MDM technologies are secured.
  • Harden the security infrastructure for mobile devices.

 

Module 6: Mobile Device Lifecycle and Application Management

In this module we will discover the process of managing mobile devices throughout their lifecycles. Technologies including the Microsoft Exchange Connector, System Center Configuration Manager and Windows InTune can be used for these purposes. We will also see how applications can be managed for mobile devices.

Lessons

  • Lesson 1: Mobile Device Lifecycle Management
  • Lesson 2: Configuring the SCCM Windows InTune Connector
  • Lesson 3: Mobile Device Application Management

Lab 1: Managing Mobile Devices with SCCM and Windows InTune

  • Exercise 1: Create the Microsoft and Windows InTune Accounts.
  • Exercise 2: Connect Windows InTune and Active Directory.
  • Exercise 3: Configure Windows InTune to be managed by Configuration Manager.
  • Exercise 4: Enroll an External Device in Windows InTune.

After completing this module, students will be able to:

  • Understand the Microsoft Exchange Connector.
  • Connect System Center Configuration Manager to Windows InTune.
  • Manage applications for mobile devices.

This course is intended for IT professionals who have experience with mobile devices and some version of Windows client and server operating systems. Previous experience with management tools such as Microsoft System Center Configuration Manager would also be valuable but is not required.

  • Basic understanding of TCP/IP and networking concepts.
  • Basic Windows and Active Directory knowledge.
  • Basic understanding of security concepts such as authentication and authorization.
  • Basic experience with a mobile device and mobile operating system.
  • Basic understanding of device management fundamentals.

This two-day instructor-led course is intended for IT professionals who are responsible for developing a management strategy for mobile devices in the enterprise. Devices running Windows, iOS and Android operating systems will be covered. Utilizing various Microsoft technologies students will create a mobile device plan, configure mobile device management and master both connectivity and data security on these devices.

With the shift to BYOD (bring your own device) it is necessary that enterprises allow users to access information from a variety of devices with a minimum of risk to the loss of that information. The new tools implemented as a part of Windows Server 2012 and Windows Server 2012 R2 as well as System Center will allow for a complete set of BYOD enterprise policies.

  • Understand the various types of mobile devices which may connect to the enterprise.
  • Determine requirements for and connecting mobile devices via domain join, Workplace Join and VPNs.
  • Create a mobile device management strategy.
  • Configure a mobile device management infrastructure using Microsoft System Center products and Windows Server 2012 R2.
  • Secure corporate data when in transit or on the devices with IPSec and BitLocker.
  • Manage data security with Group Policy Objects (GPOs)
  • Synchronize data across multiple mobile devices using Work Folders in Windows 8/Windows 8.1.
  • Connecting to applications via Web Application Proxy.

Module 1: Overview of Mobile Device Management

In the past organizations either provided laptops or smart phones approved by the IT department and or allowed users to connect from their Windows based computers using options such as VPNs or Remote Desktop Gateways. These options still exist and remain common. However, the incredible growth of mobile devices from various vendors creates a need for managing access to data and applications from these devices. Organizations must determine the best methods for doing so in a secure manner.

Lessons

  • Lesson 1: What is Mobile Device Management?
  • Lesson 2: Overview of Device Management Options

Lab 1: None

  • None

After completing this module, students will be able to:

  • Understand the basics of mobile device management
  • Gain a high level overview of Microsoft Mobile Device Management tools

 

Module 2: Mobile Device Management Strategy and Infrastructure

Every organization has unique needs for connecting mobile devices to the corporate network to increase user productivity. Based on the principle of People-centric IT (PCIT) a mobile device strategy can be created to meet those needs. Once the strategy has been determined then it’s time to created the infrastructure.

Lessons

  • Lesson 1: Planning for a Mobile Device Management Strategy
  • Lesson 2: Designing a Mobile Device Management Infrastructure with Windows Server 2012 R2

Lab 1: Create the Mobile Device Management Infrastructure

  • Exercise 1: Prepare Active Directory.
  • Exercise 2: Prepare the Certification Authority.
  • Exercise 3: Prepare Active Directory Federation Services (ADFS).

After completing this module, students will be able to:

  • Create a mobile device management (MDM) strategy.
  • Design a mobile device management infrastructure based on Windows Server 2012 R2 technologies.

 

Module 3: Workplace Join and Work Folders

Allowing device connectivity is important, but more important is managing that connectivity. Workplace Join allows a way to track and control which devices can connect. Once connected users will need access to data, no matter the device. That data must be current and consistent without users manually copying files. Work Folders creates this ability.

Lessons

  • Lesson 1: Workplace Join for Mobile Devices
  • Lesson 2: Work Folders

Lab 1: Workplace Join Windows and iOS Devices

  • Exercise 1: Prepare the Workplace Join Infrastructure.
  • Exercise 2: Workplace Join an iOS Device.
  • Exercise 3: Workplace Join a Windows Device.

Lab 2: Work Folders

  • Exercise 1: Create the Work Folders Infrastructure.
  • Exercise 2: Install Work Folders on Devices.

After completing this module, students will be able to:

  • Set up the requirements for Workplace Join.
  • Workplace Join devices to Active Directory.
  • Create the Work Folders infrastructure.
  • Test Work Folders on devices.Resolve common application compatibility issues

 

Module 4: Web Application Proxy

In the previous module we learned how to connect non-domain devices to Active Directory for management and policies with Workplace Join. In addition we showed how to synchronize data between multiple devices using Work Folders. However almost always data will be used in some type of application, therefore a part of our MDM (Mobile Device Management) strategy must include accessing those applications from devices. This is the responsibility of Web Application Proxy.

Lessons

  • Lesson 1: Web Application Proxy Overview
  • Lesson 2: Installing the Web Application Proxy Role Service
  • Lesson 3: Configuring the WAP and Publishing Applications

Lab 1: Web Application Proxy

  • Exercise 1: Prepare the web application (website) on the SCCM virtual machine.
  • Exercise 2: Prepare the certificates.
  • Exercise 3: Install Web Application Proxy.
  • Exercise 4: Publish the application in Web Application Proxy.

After completing this module, students will be able to:

  • Understand the features and benefits of Web Application Proxy (WAP).
  • Install and configure WAP.
  • Publish and connect to applications using WAP.

 

Module 5: Mobile Device Management Security

One of the primary responsibilities of any IT professional is security. Physical security, network security and data security are critical. In this module we will look at how mobile devices affect security plans not just for BYOD, but also for the entire network infrastructure.

Lessons

  • Lesson 1: Overview of Enterprise and Mobile Device Management Security
  • Lesson 2: Hardening the Mobile Device Management Infrastructure

Lab 1: Securing the MDM Infrastructure and Communications

  • Exercise 1: Secure Accounts Used by MDM.
  • Exercise 2: Use Bitlocker to Encrypt a Client System.
  • Exercise 3: Configure IPSec.

After completing this module, students will be able to:

  • Understand security in the enterprise.
  • See how previously discussed MDM technologies are secured.
  • Harden the security infrastructure for mobile devices.

 

Module 6: Mobile Device Lifecycle and Application Management

In this module we will discover the process of managing mobile devices throughout their lifecycles. Technologies including the Microsoft Exchange Connector, System Center Configuration Manager and Windows InTune can be used for these purposes. We will also see how applications can be managed for mobile devices.

Lessons

  • Lesson 1: Mobile Device Lifecycle Management
  • Lesson 2: Configuring the SCCM Windows InTune Connector
  • Lesson 3: Mobile Device Application Management

Lab 1: Managing Mobile Devices with SCCM and Windows InTune

  • Exercise 1: Create the Microsoft and Windows InTune Accounts.
  • Exercise 2: Connect Windows InTune and Active Directory.
  • Exercise 3: Configure Windows InTune to be managed by Configuration Manager.
  • Exercise 4: Enroll an External Device in Windows InTune.

After completing this module, students will be able to:

  • Understand the Microsoft Exchange Connector.
  • Connect System Center Configuration Manager to Windows InTune.
  • Manage applications for mobile devices.

This course is intended for IT professionals who have experience with mobile devices and some version of Windows client and server operating systems. Previous experience with management tools such as Microsoft System Center Configuration Manager would also be valuable but is not required.

  • Basic understanding of TCP/IP and networking concepts.
  • Basic Windows and Active Directory knowledge.
  • Basic understanding of security concepts such as authentication and authorization.
  • Basic experience with a mobile device and mobile operating system.
  • Basic understanding of device management fundamentals.
    Upcoming Dates
  • ` Jun 5 - Jun 6, 2023
  • ` Jul 3 - Jul 4, 2023
  • ` Jul 31 - Aug 1, 2023
  • ` Aug 28 - Aug 29, 2023
  • ` Sep 25 - Sep 26, 2023
  • ` Oct 23 - Oct 24, 2023