Foothill CollegeApproved Course Outlines

Physical Sciences, Mathematics & Engineering Division
C S 61AWINDOWS 8 CONFIGURATIONWinter 2014
4 hours lecture, 3 hours laboratory.5 Units

Total Quarter Learning Hours: 84 (Total of All Lecture, Lecture/Lab, and Lab hours X 12)
 
 Lecture Hours: 4 Lab Hours: 3 Lecture/Lab:
 Note: If Lab hours are specified, see item 10. Lab Content below.

Repeatability -
Statement: Not Repeatable.

Status -
 Course Status: ActiveGrading: Letter Grade with P/NP option
 Degree Status: ApplicableCredit Status: Credit
 Degree or Certificate Requirement: AS Degree
 GE Status: Non-GE

Articulation Office Information -
 Transferability: CSUValidation: 12/3/12

1. Description -
Introduction to configuring and troubleshooting Windows8 in an enterprise. It provides both lecture and laboratory exercises to enable the student to (1) Plan and perform the installation of Windows 8, (2) Install Windows 8 on computers that are running an existing operating system , (3) Configure disks, partitions, volumes, and device drivers in a Windows 8 system and configure network connectivity, (4) Implement Windows 8 technologies to desktops and network connections (5) Share files and printers, (6) Optimize and maintain Windows 8 based computers (7) Configure mobile computer settings and to enable remote access, (8) Create and configure virtual machines in Hyper-V for Windows 8 and describe how to use it to support legacy applications.
Prerequisite: None
Co-requisite: None
Advisory: None

2. Course Objectives -
Student will be able to:
  1. Plan and perform the installation of Windows 8.
  2. Install Windows 8 on computers that are running an existing operating system.
  3. Configure disks, partitions, volumes, and device drivers in a Windows 8 system.
  4. Configure network connectivity and troubleshoot connectivity issues.
  5. Install, configure, and maintain wireless network connections.
  6. Implement Windows 8 technologies to secure network connections.
  7. Share files and printers.
  8. Implement tools and technologies that can help secure Windows 8 desktops.
  9. Configure and control applications in Windows 8.
  10. Optimize and maintain Windows 8 based computers.
  11. Configure mobile computer settings and to enable remote access.
  12. Describe Hyper-V® for Windows 8 and describe how to use it to support legacy applications.
  13. Determine how to recover Windows 8 from various failures.
  14. Describe how to use Windows PowerShell to manage Windows 8.
3. Special Facilities and/or Equipment -
Computer laboratory with Servers to support Microsoft Virtual Machines
Website or course management system with an assignment posting component (through which all lab assignments are to be submitted) and a forum component (where students can discuss course material and receive help from the instructor). This applies to all sections, including on-campus (i.e., face-to-face) offerings.
When taught via Foothill Global Access, a fully functional and maintained course management system through which the instructor and students can interact.
When taught via Foothill Global Access, students must have currently existing e-mail accounts and ongoing access to computers with internet capabilities.

4. Course Content (Body of knowledge) -
  1. Installing and Deploying Windows 8
    1. Introducing Windows 8
      1. Understanding Windows 8 Editions
      2. Advantages of 64-bit Windows 8 Versions
    2. Preparing to Install Windows
      1. Hardware Requirements for Installing Windows 8
      2. Determining Device Compatibility and Screen Resolution
      3. Common Application-Compatibility Problems
      4. Methods for Mitigating Common Application-Compatibility Issues
      5. Options for Installing Windows 8
    3. Installing Windows 8
      1. Deciding When to Perform a Clean Installation
      2. Methods for Performing a Clean Installation
      3. What Is Windows To Go?
      4. Common Installation Errors
    4. Automating the Installation of Windows 8
      1. What Is the Windows Imaging File Format?
      2. Tools for Performing an Image-Based Installation
      3. The Image-Based Installation Process
      4. Using Answer files to Automate the Installation Process
      5. Building an Answer File by Using
      6. Windows SIM
      7. Building a Reference Installation by Using SysPrep
      8. What Is Windows PE?
      9. Creating Bootable Windows PE Media
      10. Using ImageX to Capture and Apply the Installation Image
      11. Modifying Images by Using DISM
    5. What Is Microsoft Volume Activation?
      1. What Is the Key Management Service?
      2. Troubleshooting Volume Activation
      3. Activating Windows 8
  2. Upgrading and Migrating to Windows 8
    1. Upgrading to Windows 8
      1. What Is an In-Place Upgrade?
      2. Supported Upgrade Paths
      3. Process for Upgrading to Windows 8
    2. Migrating to Windows 8
      1. What Is Migration?
      2. Process for Migrating to Windows 8
    3. Migrating to Windows 8
      1. Tools for Migrating User Data and Settings
      2. Migrating User Settings and Data by Using USMT
      3. What Is Folder Redirection?
  3. Managing Disks and Device Drivers
    1. Managing Disks, Partitions, and Volumes
      1. What Are MBR and GPT Disks?
      2. Disk Management Tools
      3. Converting an MBR Partition to a GPT Partition
      4. What Is a Simple Volume?
      5. What Are Spanned and Striped Volumes?
      6. Creating Spanned and Striped Volumes
      7. Purpose of Resizing a Volume
      8. Resizing a Volume
    2. Maintaining Disks, Partitions, and Volumes
      1. What Is Disk Fragmentation?
      2. Defragmenting a Disk
      3. What Are Disk Quotas?
      4. Configuring Disk Quotas
    3. Working with Virtual Hard Disks
      1. What Is Disk Fragmentation?
      2. Defragmenting a Disk
      3. What Are Disk Quotas?
      4. Configuring Disk Quotas
    4. Installing and Configuring Device Drivers
      1. Overview of Device Drivers in Windows 8
      2. Installing Devices and Drivers
      3. Installing Drivers into the Driver Store
      4. Device Driver Management Tools
      5. Options for Updating Drivers
      6. Managing Signed Drivers
      7. Options for Recovering from a Driver Issue
      8. Managing Drivers
  4. Configuring and Troubleshooting Network Connections
    1. Configuring IPv4 Network Connectivity
      1. What Is an IPv4 Address?
      2. What Is a Subnet Mask?
      3. What Is the Default Gateway?
      4. What Are Public and Private IPv4 Addresses?
      5. How to Configure an IPv4 Address
    2. Configuring IPv6 Network Connectivity
      1. Benefits of Implementing IPv6
      2. Windows 8 Support for IPv6
      3. What Is the IPv6 Address Space?
      4. IPv6 Address Types
      5. How to Configure an IPv6 Address
    3. Implementing Automatic IP Address Allocation
      1. Automatic IPv4 Configuration
      2. Automatic IPv6 Configuration
      3. How to Configure a Computer to Obtain an IPv4 Configuration Automatically
      4. Troubleshooting Client-Side IPv4 Autoconfiguration Issues
    4. Implementing Name Resolution
      1. Types of Computer Names
      2. Methods for Resolving Computer Names
    5. Troubleshooting Network Connectivity
      1. Tools for Troubleshooting Network Issues
      2. Process for Troubleshooting Network Issues
      3. How to Troubleshoot Common Network Issues
  5. Implementing Wireless Network Connections
    1. Overview of Wireless Networks
      1. What Is a Wireless Network?
      2. Wireless Network Technologies
      3. What Is Wireless Broadband?
      4. Security Protocols for a Wireless Network
    2. Implementing a Wireless Network
      1. Configuring Hardware for Connecting to a Wireless Network
      2. Wireless Network Settings
      3. Improving Wireless Signal Strength
      4. Process for Troubleshooting Wireless Network Connection Issues
  6. Implementing Network Security
    1. Overview of Threats to Network Security
      1. Common Network Security Threats
      2. What Is Defense-in-Depth?
      3. Options for Mitigation of Network Security Threats
    2. Configuring Windows Firewall
      1. Network Location Profiles
      2. Configuring Basic Firewall Settings
      3. Windows Firewall with Advanced Security Settings
      4. Well-Known Ports Used By Applications
      5. Configuring Inbound and Outbound Rules
    3. Securing Network Traffic
      1. Benefits of IPsec
      2. Using IPsec
      3. Tools for Configuring IPsec
      4. What Are Connection Security Rules?
      5. Configuring Authentication
      6. Choosing an Authentication Method
      7. Monitoring IPsec
      8. How to Configure a Connection Security Rule
    4. Configuring Windows Defender
      1. What Is Windows Defender?
      2. Scanning Options in Windows Defender
      3. Configuring Windows Defender Settings
  7. Configuring File Access and Printers on Windows 8 Clients
    1. Managing File Access
      1. What Are NTFS Permissions?
      2. What Is Permission Inheritance?
      3. Configuring NTFS Permissions for Files and Folders
      4. How Does the Copying and Moving of Files and Folders Affect Configured permissions?
    2. What Are Effective Permissions?
      1. Determining Effective Permissions
    3. Managing Shared Folders
      1. What Are Shared Folders?
      2. Methods of Sharing Folders
      3. Combining NTFS and Share Permissions
      4. The Network and Sharing Center
    4. Configuring File Compression
      1. What Is NTFS File Compression?
      2. What Is the Impact of Moving and Copying Compressed Files and Folders?
      3. What Is the Compressed (Zipped) Folders Feature?
      4. Compressing Files and Folders
    5. Managing Printers
      1. Overview of Printing Components
      2. Installing and Sharing a Printer
      3. Managing Client-Side Printing
    6. Overview of SkyDrive
      1. What Is SkyDrive?
      2. Configuring SkyDrive
      3. Sharing Files in SkyDrive
  8. Securing Windows 8 Desktops
    1. Authentication and Authorization in Windows 8
      1. What Are Authentication and Authorization?
      2. The Process of Authentication and Authoriztion
      3. Important Security Features in Windows 8
    2. Implementing GPOs
      1. What Is Group Policy?
      2. How Do You Apply GPOs?
      3. How Multiple Local GPOs Work
      4. How to Create Multiple Local GPOs
      5. How to Configure Local Security Policy Settings
    3. Securing Data with EFS and BitLocker
      1. What Is EFS?
      2. How to Encrypt Files and Folders with EFS
      3. What Is BitLocker?
      4. BitLocker Requirements
      5. BitLocker Modes
      6. Group Policy Settings for BitLocker
      7. Configuring BitLocker
      8. Configuring BitLocker To Go
      9. Recovering BitLocker-Encrypted Drives
    4. Configuring User Account Control
      1. What Is UAC?
      2. How UAC Works
      3. Configuring UAC Notification Settings
      4. How to Configure UAC with GPOs
  9. Configuring Applications
    1. Install and Configure Applications
      1. Installing Applications in Windows 8
      2. Configuring Default Program Settings
      3. Application Compatibility Issues
      4. Resolving Common Application Compatibility Issues
      5. When to Use Office 365
    2. Managing Apps from the Windows Store
      1. What Is the Windows Store?
      2. Managing Access to Windows Store
      3. What Is Sideloading?
    3. Configuring Internet Explorer Settings
      1. What Is Compatibility View?
      2. Privacy Features
      3. The SmartScreen Feature
      4. Other Security Features
      5. How to Configure Internet Explorer
    4. Configuring Application Restrictions in the Enterprise
      1. What Is AppLocker?
      2. AppLocker Rules
      3. How to Configure AppLocker Rules
      4. How to Enforce AppLocker Rules
  10. Optimizing and Maintaining Windows 8 Client Computers
    1. Optimizing the Performance of Windows 8
      1. Common Issues with Performance and Reliability
      2. Performance Information and Tools
      3. What Are Performance Monitor and Data Collector Sets?
      4. How to Use the Resource Monitor
      5. How to Analyze System Performance by Using Data Collector Sets and Performance Monitor
      6. Considerations for Monitoring System Performance in Windows 8
    2. Managing the Reliability of Windows 8
      1. Problems that Windows Diagnostics Tools Can Help to Resolve
      2. Windows Memory Diagnostics Tool
      3. Windows Network Diagnostics Tool
      4. Reliability Monitor
      5. Problems Reports and Solutions Tool
    3. Managing Windows 8 Updates
      1. Problems that Windows Diagnostics Tools Can Help to Resolve
      2. Windows Memory Diagnostics Tool
      3. Windows Network Diagnostics Tool
      4. Reliability Monitor
      5. Problems Reports and Solutions Tool
  11. Configuring Mobile Computing and Remote Access
    1. Configuring Mobile Computers and Device Settings
      1. Types of Mobile Computers and Devices
      2. Tools for Configuring Mobile Computers and Device Settings
      3. What Are Mobile Device Sync Partnerships?
      4. Power Plans and Power-Saving Options
      5. Configuring Power Plans
    2. Configuring VPN Access
      1. What Is a VPN Connection?
      2. Tunneling Protocols for VPN Connections
      3. What Is VPN Reconnect?
      4. How to Configure a VPN
      5. What Is the Connection Manager Administration Kit?
      6. Configuring and Distributing a Connection Profile
      7. How to Create a Connection Profile
    3. What Are Mobile Device Sync Partnerships?
      1. What Are Remote Desktop and Remote Assistance?
      2. Configuring Remote Desktop
      3. How to Configure Remote Assistance
    4. Overview of DirectAccess
      1. Complexities of Managing VPNs
      2. What Is DirectAccess?
      3. Components of DirectAccess
      4. What Is the Name Resolution Policy Table?
      5. How DirectAccess Works for Internal Clients
      6. How DirectAccess Works for External Clients
      7. Configuring DirectAccess
  12. Implementing Hyper-V
    1. Overview of Hyper-V
      1. What Is Client Hyper-V?
      2. Scenarios for Using Client Hyper-V
    2. Creating Virtual Machines
      1. Creating a Virtual Machine
      2. Configuring Virtual Machines
      3. Running Virtual Machines
    3. Managing Virtual Hard Disks
      1. What Is a Virtual Hard Disk?
      2. Configuring a Virtual Hard Disk
    4. Managing Snapshots
      1. What Is a Virtual Hard Disk?
      2. Configuring a Virtual Hard Disk
  13. Troubleshooting and Recovering Windows 8
    1. Backing Up and Restoring Files in Windows 8
      1. The Need for Data Backup
      2. File History and Recovery Tools
      3. How to Prepare for File Recovery
    2. Recovery Options in Windows 8
      1. The Windows 8 Startup Process
      2. Windows Startup and Recovery Options
      3. Windows System Restore
      4. What Is the Windows 8 BCD Store?
      5. Understanding the BCD Configuration Settings
      6. Advanced Boot Options
      7. Tools Available in Windows RE
      8. How to Resolve Startup-Related Problems
5. Repeatability - Moved to header area.
 
6. Methods of Evaluation -
A.Tests and quizzes
  • Written laboratory assignments which include configuration specifications, sample runs and documentation.
  • Final examination
  • 7. Representative Text(s) -
    Andrew J. Warren. Microsoft Official Curriculum 20687A Configuring Windows® 8. Redmond, WA: Microsoft Corporation, 2012.

    8. Disciplines -
    Computer Science
     
    9. Method of Instruction -
    1. Lectures
    2. On-line labs (for all sections, including those meeting face-to-face/on campus) consisting of
      1. A Lab assignment web-page located on a college-hosted course management system or other department-approved Internet environment. Here, the students will review the specification of each lab assignment and submit their completed lab work.
      2. A discussion web-page located on a college hosted course management system or other department-approved Internet environment. Here, students can request assistance from the instructor and interact publically with other class members.
    3. In person or on-line discussion which engages students and instructor in an ongoing dialog pertaining to all aspects of designing, implementing and analyzing programs.
    4. When course is taught fully on-line:
      1. Instructor-authored lecture materials, handouts, syllabus, assignments, tests, and other relevant course material will be delivered through a college hosted course management system or other department-approved Internet environment.
      2. Additional instructional guidelines for this course are listed in the attached addendum of CS department on-line practices.
     
    10. Lab Content -
    1. Installing and Deploying Windows 8
      1. Installing Windows 8
        1. Planning to Install Windows 8
        2. Performing a Clean Installation of Windows 8
      2. Performing an Unattended Installation of Windows 8
        1. Configuring an Answer File
        2. Using an Answer File to Install Windows 8
    2. Upgrading and Migrating to Windows 8
      1. Migrating to Windows 8
        1. Backing Up Important User Data and Settings
        2. Restoring User Data and Settings to a Target Computer
        3. Verifying Successful Migration of User Data and Settings
    3. Managing Disks and Device Drivers
      1. Managing Disks
        1. Creating Volumes
        2. Configuring Quotas
        3. Working with VHDs
      2. Configuring Device Drivers
        1. Installing Device Drivers
        2. Managing Device Drivers
    4. Configuring and Troubleshooting Network Connections
      1. Configuring Network Connection
        1. Enabling Automatic IPv4 Configuration
        2. Configuring IPv4 Manually
      2. Troubleshooting Network Connectivity
        1. Creating a Simulated Network Connectivity Problem
        2. Resolving a Network Connectivity Problem
    5. Implementing Wireless Network Connections
      1. Planning the Implementation of Wireless Network Connections
        1. Planning a Wireless Network
        2. Determining the Cause of Wireless Network Problems
        3. Configuring a Wireless Network Policy
    6. Implementing Network Security
      1. Configuring Inbound and Outbound Firewall Rules
        1. Creating an Inbound Firewall Rule
        2. Creating an Outbound Firewall Rule
      2. Configuring Connection Security Rules
        1. Creating and Configuring Connection Security Rules
      3. Configuring Host-Based Virus and Malware Protection
        1. Configuring Windows Defender
    7. Configuring File Access and Printers on Windows 8 Clients
      1. Configuring File Access
        1. Creating a Shared Folder for All Users
        2. Creating a Shared Folder for the Marketing Group
      2. Configuring Printers
        1. Creating and Sharing a Local Printer
    8. Securing Windows 8 Desktops
      1. Implementing Local GPOs
        1. Creating Multiple Local GPOs
        2. Testing the Application of the Local GPOs
      2. Securing Data
        1. Protecting Files with EFS
      3. Configuring and Testing UAC
        1. Modifying UAC Prompts
    9. Configuring Applications
      1. Configuring Internet Explorer Security
        1. Configuring Internet Explorer
      2. Configuring AppLocker
        1. Configuring AppLocker Rules
        2. Testing the AppLocker Rules
    10. Optimizing and Maintaining Windows 8 Client Computers
      1. Optimizing Windows 8 Performance
        1. Creating a Performance Baseline
        2. Introducing Additional Workload
        3. Measuring System Responsiveness Under Load
      2. Maintaining Windows Updates
        1. Configuring Windows Update
    11. Configuring Mobile Computing and Remote Access
      1. Configuring a Power Plan
        1. Creating and Configuring a New Power Plan
      2. Implementing a VPN Connection
        1. Creating and Testing a VPN Connection
      3. Implementing Remote Desktop
        1. Configuring a Remote Desktop Connection
    12. Implementing Hyper-V
      1. Creating Virtual Machines
        1. Discussion Creating Virtual Machines
    13. Troubleshooting and Recovering Windows 8
      1. Recovering Windows 8
        1. Exploring Windows 8 Recovery Options
        2. Introducing a simulated problem
        3. Resolving the problem
     
    11. Honors Description - No longer used. Integrated into main description section.
     
    12. Types and/or Examples of Required Reading, Writing and Outside of Class Assignments -
    1. Reading
    1.Textbook assigned reading averaging 50 pages per week.
  • On-line resources as directed by instructor though links pertinent to networking.
  • Library and reference material directed by instructor through course handouts.
  • Writing
    1. Technical prose documentation that supports and describes the laboratory exercises that are submitted for a grade.
    13. Need/Justification -
    This course is a restricted support course for the A.S. degree in Enterprise Networking.


    Course status: Active
    Last updated: 2014-06-19 12:38:38


    Foothill CollegeApproved Course Outlines