Define the challenges of enabling mobility
Compare the design options to enable a mobile workforce
Use the new Windows 10 features to support secure mobile access and hybrid identity
The proliferation of consumer devices and ubiquitous information access is driving the enterprise away from a device-centric model centered on corporate-owned and provisioned devices to a bring-your-own-device (BYOD) model in which employees use their own devices to access corporate applications and data. Workers expect consistent access to corporate tools and data regardless of the type of device they’re using. They also want their corporate-issued technology and resources to look and behave like their personal technology—always on and always available from any device, from virtually anywhere.
An enterprise model that supports the use of consumer devices in the workplace and the ability to work from virtually anywhere and anytime must move from a device-focused view of IT management to one that’s people centric. In reality it is not the device that is mobile, it is the users.
It is important that the IT challenges of BYOD, Mobile device management, cloud computing, and hybrid identities be understood before one can understand how Windows 10 helps address those issues.
Week 1: Planning and Deploying Enterprise Services for a Mobile Workforce
Study the enterprise model that supports the use of consumer devices in the workplace and the ability to work from virtually anywhere and anytime must move from a device focused view of IT management to one that’s people centric. In reality it is not the device that is mobile, it is the users.
Week 2: Moving Your Identity to Azure
Regardless of the specific technologies that organizations use to implement cloud computing solutions, we will look at the essential characteristics that are part of a cloud computing solution.
Week 3: Building a Strategy to Enable a Mobile Workforce
In this module we look at the elements needing to be addressed for building enterprise strategy, i.e. Users, Devices, Data, and Apps. As well as the new business threats introduced in this mobile first world.
Week 4: Data Access and Protection
Here we look at various services and tools to allow secure access to corporate data.
This course requires basic computer knowledge and experience.