Skip to main content

Windows 10 Features for a Mobile Workforce: Configuring Additional Resources


About this course

IT Support: Networking Essentials is designed to introduce the core networking concepts to learners who are new to IT Support. The course begins by explaining the purpose of networking and then examines how networks are configured in homes, offices, between offices, and around the world with the Internet. This includes a review of network topologies, physical networking, and network protocols. The course concludes with an introduction to network troubleshooting, including how to troubleshoot common networking issues.

What you'll learn

  • Understanding networking topologies
  • Understanding LANs, WANs and the Internet
  • Understanding wireless and wired networks
  • Understanding network protocols
  • Understanding TCP/IP
  • Troubleshooting networking using built-in networking tools

Course Syllabus

Module 1: What’s new in Windows 10 Anniversary edition (1607)
The Windows 10 Anniversary Update, which was the second major update of Windows 10, was released August 2, 2016. As with all updates, this update provides new features and security measures. Discover what’s new in the Anniversary edition.
Module 2: Configure shared resources
Users need access to resources, including but not limited to files, folders, network shares, and printers. Your job, at times at least, is to let those users access what they need, and nothing more. That’s how you keep resources secure. This module covers all aspects of this, from configuring shared resources to configuring file and folder (and printer) access, and configuring authentication and authorization for both workgroups and domains.
Module 3: Securing corporate data
Encryption protects data from unauthorized access when other security measures fail. Much of the time failure is the result of someone gaining physical access to a machine and having the knowledge and time to figure out how to access the data on it. There are many ways this type of breach can occur. However, with Encrypting File System (EFS), the public and private keys that are generated during encryption ensure that only the user that encrypted the file can decrypt it. Technically, encrypted data can only be decrypted if the user’s personal encryption certificate is available, which is generated using the private key. Another user can’t access this key, and neither can a person who tries to access data to copy or move it who does not have the proper credentials. In this module, we also look at BitLocker and how it helps protect computers that are lost or stolen from data theft or exposure, and offers more secure data deletion when computers are decommissioned. Data on a lost or stolen computer is vulnerable to unauthorized access, either by running a software attack tool against it, or by transferring the computer's hard disk to a different computer. BitLocker helps mitigate unauthorized data access on lost or stolen computers by combining two major data-protection procedures: encrypting the entire Windows operating system volume on the hard disk, and encrypting multiple fixed volumes


In addition to their professional experience, candidates who take this course should already have the following technical knowledge:

  • Experience with Windows desktop administration, maintenance, and troubleshooting
  • Basic experience and understanding of Windows networking technologies
  • Introductory-level knowledge of Active Directory and Microsoft Intune

Meet the instructors

Philip E. Helsel

Philip E. Helsel

Senior Content Developer, Learning eXperiences Team Microsoft

Philip Helsel is a Senior Content Developer with the Microsoft Learning team, where he is currently focused on building IT Professional courses for Windows 10, Hyper-V, and Configuration Manager. He is also the planner for a new Microsoft Virtual Academy Enterprise Security channel.

Before joining Microsoft, he was a Pre-Sales Engineer and trainer at Fast Search and Transfer, a Pre-Sales Engineer at Oracle Corporation, and Sun Microsystems. He also served as a Captain in U.S. Army.

Phil has a BS degree in Mathematics & Physics, and a Masters in Computer Science. Mr. Helsel also has a number of certifications including his Microsoft Certified Trainer (MCT), MCITP in Server Virtualization, CCNA, VCP5, CISM, Security+, Network+, and others.

Kimberly Rasmusson-Anderson

Kimberly Rasmusson-Anderson

Senior Content Developer, Learning eXperiences Team Microsoft

Kimberly is a Senior Content Developer with the Microsoft Learning team.

She is responsible for building IT Professional courses. She is also the project manager for a new Microsoft Virtual Academy Enterprise Security channel.

Prior to this, Kimberly was a technical lead in the Microsoft Customer Service and Support organization.

  1. Course Number

  2. Classes Start

  3. Classes End

  4. Estimated Effort

    Total 9 to 12 hours