Installing and Configuring System Center Configuration Manager (SCCM)
Getting Started with this Course • 26min
0 / 3 lessons complete
SCCM Configuration Manager Overview
Video | 8 min
Prerequisites in a Production Environment
Video | 12 min
Configuration Manager Overview Section Quiz
Quiz | 6 min
System Center Configuration Manager - Features and Capibilities • 31min
0 / 5 lessons complete
Asset Management
Video | 6 min
Administrative Tasks
Video | 5 min
Client Management Part 1
Video | 7 min
Client Management Part 2
Video | 5 min
Features and Capabilities Section Quiz
Quiz | 8 min
SCCM 1902 Lab Setup • 50min
0 / 12 lessons complete
This section is optional
Text | 1 min
Lab Overview
Video | 4 min
Downloading and Installing VirtualBox
Video | 2 min
Creating Your NAT Network and VMs
Video | 4 min
Downloading and Mounting Server 2019 ISO
Video | 2 min
Installing Windows Server 2019 Part 1
Video | 4 min
Installing Windows Server 2019 Part 2
Video | 3 min
Downloading and Mounting Windows 10 ISO
Video | 2 min
Installing Windows 10
Video | 4 min
Configuring SADC01
Video | 15 min
Configuring our SAWS01 Workstation
Video | 4 min
Configuring our SASCCM01 Server
Video | 5 min
Installing SCCM 1902 Installation • 1hr 17min
0 / 11 lessons complete
SCCM Compatability Check
Video | 2 min
Download Required SCCM Software
Video | 2 min
Installing the ADK
Video | 2 min
Creating the System Management Container
Free lesson
Video | 4 min
Creating Domain User Accounts
Video | 8 min
Extending the Active Directory Schema
Free lesson
Video | 5 min
Configure Windows Firewall with Group Policy for SCCM
Video | 7 min
Install SQL Server 2017
Video | 9 min
Installing SCCM Dependent Server Roles
Video | 3 min
Installing System Center Configuration Manager
Video | 5 min
Lab: Installing System Center Configuration Manager
Lab | 30 min
Configuration Manager Basics • 1hr 53min
0 / 8 lessons complete
Console Overview Part 1
Video | 12 min
Console Overview Part 2
| 5 min
Site System Roles
Video | 9 min
Creating and Managing Administrative Users
Video | 6 min
Creating Boundary and Boundary Groups
Video | 4 min
Client Discovery Methods
Video | 7 min
SCCM Basics Section Quiz
Quiz | 10 min
Lab: SCCM Basics
Lab | 60 min
Updating SCCM • 30min
0 / 7 lessons complete
Understanding Windows ADK Compatibility
Video | 4 min
Configuration Manager Update Overview
Video | 6 min
How to Verify Your ADK Version
Video | 2 min
Installing ADK 1903
Video | 2 min
Updating SCCM
Video | 4 min
Verifying Our Configuration After Update
Video | 6 min
Updating SCCM Section Quiz
Quiz | 6 min
SCCM Client Installation • 46min
0 / 4 lessons complete
Preparing for Client Installations with Group Policy
Free lesson
Video | 12 min
Client Push Installation
Free lesson
Video | 11 min
Deploying the SCCM Client with Group Policy
Video | 17 min
Manual Client Installation
Video | 6 min
User and Device Collections • 1hr 0min
0 / 13 lessons complete
Collections Overview and the Direct Rule
Video | 9 min
Creating Include/Exclude Collections
Video | 5 min
Query based User and Device Collections Introduction
Video | 2 min
Query Based User Collections Example #1
Video | 5 min
Query Based User Collections Example #2
Video | 3 min
Query Based User Collection Challenge #1
Video | 2 min
Query Based Device Collection Example #1
Video | 3 min
Role Based Administration
Video | 2 min
Assigning a User Collection to an Administrative Security Roll
Video | 10 min
Using a Collection to Enforce a Maintenance Window
Video | 4 min
Deploying Power Management to a Collection
Video | 6 min
Using a Collection to Turn-On the Remote Control Feature
Video | 4 min
User and Device Collection Section Quiz
Quiz | 5 min
Application Management • 2hr 34min
0 / 12 lessons complete
Application Management Overview
Video | 7 min
Creating an Application using an MSI Part 1
Video | 9 min
Creating an Application using an MSI Part 2
Video | 9 min
Supersedence Part 1
Video | 7 min
Supersedence Part 2
Video | 8 min
Creating an Application using an EXE
Video | 16 min
Creating an Application that requires Approval
Video | 12 min
Creating a Package using an MSI
Video | 9 min
Uninstalling an Application
Free lesson
Video | 5 min
Monitoring Applications
Video | 4 min
Lab: Application Deployment
Lab | 60 min
Application Management Section Quiz
Quiz | 8 min
Operating System Deployment • 23min
0 / 7 lessons complete
Create a Windows 10 Collection
Text | 2 min
OSD - The Basics
Video | 3 min
Setting Up a DHCP Server
Video | 2 min
Adding an Operating System to Configuration Manager
Video | 6 min
Create a Deployments folder for the Captured Image
Text | 1 min
Creating a Task Sequence
Video | 5 min
Enable PXE Support - Configure WDS
Video | 4 min
Endpoint Protection • 1hr 12min
0 / 10 lessons complete
An Overview of Network Security
Video | 8 min
Endpoint Protection Server Prerequisites
Video | 6 min
Endpoint Protection Licensing
Video | 1 min
Endpoint Protection Planning and Integration
Video | 5 min
Create a Shared Folder Named EPUdates
Text | 2 min
Endpoint Protection Server Configuration and Installation
Video | 9 min
Endpoint Protection Policy Overview
Video | 13 min
The Anti-malware Policy Settings Overview
Video | 7 min
Configuring an Automatic Deployment Rule (ADR)
Video | 7 min
Endpoint Protection Client Installation
Video | 14 min
Troubleshooting • 37min
0 / 4 lessons complete
SCCM Troubleshooting Overview
Video | 7 min
The CMTrace Overview
Video | 8 min
Deploying CMTrace to a Device Collection
Video | 7 min
Troubleshooting a failed Client Push Install
Video | 15 min
Problems and Solutions from the Message Board • 14min
0 / 5 lessons complete
Sign up to access this lesson
Click here to sign up and get access to this lesson!

Saving Progress...
An Overview of Network Security
- There are a number of threats that could affect you, or your organization
- Network Security is something that everyone will need to understand
- It’s your job, as an Endpoint Administrator to educate your users. I suggest that you show the users in your organization this video.
Adware – What is Adware? Adware is designed to display advertisements on your computer
- People have asked, how did adware get installed on my computer?
Most of the time you get Adware from downloading software bundles – These programs install adware alongside programs you can get for free.
- Adware knows what types of ads to display, based on the users computing habits. Sites visited and computer usage.
- For prevention download your software from an official site, not a third-party site.
Spyware – What is Spyware? Spyware is designed to steal a user’s personal information.
- Spyware is a form of malware which is short for malicious software
- Spyware is installed without the users knowledge, it runs in the background.
- Spyware can record audio, video, and record calls from your smartphone and capture credit card numbers.
For prevention – Be selective about what you download to your computer. Beware of clickable advertisements
Mitigation of spyware and adware
- Be aware that free software can include spyware or malware.
- Be sure that your antimalware software is up to date.
Viruses, Trojans and Rootkits
- These are all installed without user’s knowledge
What is a computer virus?
- A computer virus is a piece of code that is capable of copying itself, and has the potential of destroying data and corrupting your operating system.
- A virus can be application specific. For example, a macro virus for a Microsoft Word application can replace the regular commands with the same name, and run, when the command is selected. These malicious macros may start automatically when a document is opened or closed, without the user’s knowledge.
- A virus can be triggered by date and time or event, the virus could be triggered next time you visit a certain website as well.
Rootkit – What is a rootkit? A rootkit allows a person to get admin level access to your computer system.
Rootkits:
- Often replaces operating system files
- Allows criminals access to the device
- Applies to Windows, Linux/Unix
- For prevention avoid clicking a questionable email link. The rootkit is spread because the user clicks on a malicious link in an email, and now the root kit is spread to all recipients and sent to all the people in the users contact list.
Trojan
- Masquerades as legitimate software
- The user is fooled thinking that they are downloading and installing helpful software when in fact it is malware.
- The criminal takes control of the computer in the background and starts sending personal information over the internet to thieves.
- Trojans are executables, they have extensions like “exe” “vbs” “com “bat”. Generally, you have to open the file before you are affected.
- For prevention do not click on an attachment unless you are sure of the source.
Mitigation of Viruses, Trojans and Rootkits
- Educate your users, define each threat. Make your users aware of what to do and what not to do.
- Be sure your antimalware is up to date
- Beware of free software
Phishing
- Tricks victims into revealing personal or sensitive information such as passwords, SSN, addresses)
- Fraudulent email messages, telephone calls, website links
- Phishing is all about stealing personal information such as username and passwords Ransomware
- Blocks access to your computer until a ransom is paid
- It could encrypt data files until the ransom is paid
- Ransomware requests Bitcoin payments, (which are hard to trace to the recipient of the payment)
- Does not guarantee that you will get your data back if your system has been encrypted with the ransomware.
- Can be infected by viewing a website not just clicking.
- Ransomware features unbreakable encryption
- It can scramble your file names and add a different extension to your files.
Sign up to access the rest of this lesson
You must either log in or sign up to access this lesson.

Saving Progress...