Course details

Microsoft Windows Desktop Systems

IW1 Acad. year 2010/2011 Winter semester 5 credits

Current academic year

Guarantor

Language of instruction

Czech, English

Completion

Credit+Examination

Time span

  • 26 hrs lectures
  • 26 hrs pc labs

Department

Study literature

  • McLean, I., Thomas, O.: MCTS Self-Paced Training Kit (Exam 70-680): Configuring Microsoft Windows 7, Microsoft Press, 2009
  • Tulloch, M., Northrup, T., Honeycutt, J., Wilson, E., The Windows 7 Team at Microsoft: Windows 7 Resource Kit, Microsoft Press, 2009
  • Bott, E., Siechert, C., Stinson, C.: Mistrovství v Microsoft Windows 7, Computer Press, 2010
  • Russinovich, M. E., Solomon, D. A., Ionescu, A.: Windows Internals, Fifth Edition, Microsoft Press, 2010
  • Regan, P.: MCTS 70-680 Exam Cram: Microsoft Windows 7, Configuring, Que, 2011
  • Windows 7 Technical Library:http://technet.microsoft.com/en-us/library/dd349342.aspx

Fundamental literature

Syllabus of lectures

  1. Installation, Hardware requirements, Editions, Clean Install, Windows Product Activation, W7 upgrade, Upgrade Advisor
    Windows 7 Hardware Advisor, Deploying methods in Business environment.
  2. Windows 7 Migration and Easy Transfer. User State Migration Tool 3.0, Anytime Upgrade, Troubleshooting Installation. Application Compatibility.
    Deploying 7 from custom Image, imagex, drvload, wdscapture, wpeutil, oscdimg, peimg, bcdedid, copype, sysprep, wimscript.ini, autoanattent.xml
  3. Installation and Configuring Drivers. Drivers Signatures, HCL, Windows Software Engineering, Driver Verifier, Roll Back, Uninstall, Last Known Good. Device Maanger, Customizing apperiance, Aero
    Deployment: SMS server, system Center Configuration manager, SCCM, boot DVD, Network Share, Light Touch Installation, Zero Touch installation  
  4. Configuring Internet Explorer, Parental Controls, Dynamic Security, Protected mode, Phishing Filter, popup blocker, Security Zones, Content Advisor, RSS feeds, Internet printing.
    IE protected mode, internet zones, spyware, malware, mandatory integrity control.
  5. User Access Control. Accounts, Permissions, Manage Policies, Secure Desktop. Windows Defender.
    Deployment troubleshooting, user, profiles, roaming, profiles, ntuser.dat, Xp and 7 profiles, v2profiles, dsmod, user account template, offline files. Virtual files, registry, standard user analyzer,
  6. Windows Firewall, TCP/IP, Port, Network Interface, Traffic, Public, Private, Work, Home.
    GPO, local policy, multiple level group policy object, SOM, non admin, admin users. Policy categories, software settings, windows settings, administrative templates, computer configuration, user configuration,
  7. Using Network Sharing center, Internet Connection Sharing, DNS Name resolution, NAT, Troubleshooting connectivity. IPCONFIG, PING, TRACERT, PATHPING, APIPA
    GPO troubleshooting, prevent device installation. Order of inheritance, gpotool, gpresult, logs, system log, dcgpofix.
  8. Network and Sharing center, share files, folders, printers. Wireless Security, WEP, WPA, filtering MAC. Remote assistance and remote desktop.
    WFAS, IPSes, authentication, encryption AH, ESP, SHA-1, DH, DES 3DES, Kerberos, certificates, IP filter, NTLM, NTLMv2, preshared key
  9. Windows mail, Protocols: SMTP, POP3, IMAP4. Newsgroups. Windows Calendar, Meeting Space.
    access NTFS, smartcard, token, access controllist, permissions, local sec policy, event log.
  10. Windows sidebar, Media player, Media center, Windows Fax, Scan. Optimizing Vista, Rea

Course inclusion in study plans

  • Programme IT-BC-3, field BIT, 2nd year of study, Elective
Back to top