2017 icatt course catalogicatt.net/website/wp-content/uploads/2017/07/icatt... · icatt trending...
TRANSCRIPT
Trending and Emerging Technologies
2017
ICATT Course Catalog
Your people are great; we make them better!
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 1
Table of Contents
This table of contents is hyperlinked.
Table of Contents ....................................................................................................................... 1
ICATT Trending and Emerging Technologies Courses .............................................................. 2
Introduction ............................................................................................................................ 2
Trending and Emerging Technologies .................................................................................... 3
Artificial Intelligence ................................................................................................................ 4
Business Intelligence .............................................................................................................. 5
Digital Mesh............................................................................................................................ 7
Neural Networks ..................................................................................................................... 9
Agile Development ................................................................................................................11
Mindfulness ...........................................................................................................................13
Quantum Computing .............................................................................................................14
Cloud Computing ...................................................................................................................15
The Internet of Things (IoT) ...................................................................................................17
Big Data Analytics .................................................................................................................18
Text Analytics ........................................................................................................................20
Machine Learning ..................................................................................................................22
Soft Skills for Technical Professionals ...................................................................................23
Hi Tech Hi Touch ...................................................................................................................25
Fundamentals of Statistics for Trending and Emerging Technology ......................................27
ICATT Windows 10 Courses .....................................................................................................29
Installing & Configuring Windows 10 .....................................................................................29
Supporting & Troubleshooting Windows 10 ...........................................................................33
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 2
ICATT Trending and Emerging Technologies
Courses
Introduction
Private and public organizations are facing profound challenges and changes in the way they
serve and engage consumers. The changes include explosion of channels of communication
beyond conventional media, which completely transform interactions of and with consumers. It
resulted in massive amount of data that would provide further insights into operational
efficiency. The process of decision-making has also shifted from conventional to being
evidence-based and data-drive. The implications of these changes is that many operating
models have been disrupted. Organizations have to continuously adapt new technology and
respond to this consumer-driven world.
As the data complexity grows in terms of volume, velocity, veracity and variety, it becomes more
challenging to flesh out insights from it. This is the power of advanced analytics and big data
technologies come handy. Private and public organizations that have implemented and adopted
digital transformation have become very successful. Those lagging are either struggling to enjoy
sustained growth or achieve desired efficiency and performance.
Series of Training Courses in Trending and Emerging Technologies
ICATT (www.icatt.net) is pleased to present training course series on Trending and Emerging
Technologies. The expected outcome of these courses is to raise the level of awareness and to
develop a working knowledge of Trending and emerging technologies for the purpose of
incorporating these technologies into operational functions.
Each course is designed to be presented in two formats: Overview and expanded versions. The
overview version is a one day presentation; while the expanded version is presented in 5 days.
The courses are available in live face to face format, live remote format and delayed remote
format. All training sessions fully engage the training participants using Thiagi Four Door Training
Model (http://www.thiagi.com/games/2015/7/31/the-4door-elearning-approach). Thiagi’s
approach to learning allows learners to truly take hold of the material and embark on self-led
learning. This course will present the four concept or “doors” that enable learners to go about the
process in the manner that works best for them. Interactive activities and assignments will
engage learner to use 1) The Library, 2) The Playground, 3) The Café, and 4) The Evaluation
Center to take control and build the learning environment that works best for them.
Extended courses will include pre and post assessments, lecture, demonstration and discussion
of essential concepts combined with activities designed to integrate and provide greater
understanding to the course material and its application.
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 3
Trending and Emerging Technologies
This course is offered in a one-day overview version or a five-day in-depth exploration.
Overview
Technology is rapid and ever changing. Public and private organizations need to adapt at
remarkable pace in order to digitize and transform their operations. The changing landscape
comes with its own challenges and opportunities, which necessitate improved and continuous
understanding of trending and emerging technologies. This course will present research, proven
methodologies, tools, and frameworks that will help you separate the signal from the noise on
emerging technologies and trends.
Who is this course for? This course is for students who are interested in technology and how it
is rapidly changing and evolving in the world today.
Learning Objectives
1. Recognize the role rapidly changing technologies play in transforming the way we work,
interact, make decisions and manage systems.
2. Describe and evaluate the impact of the implementation of new software, hardware,
networking and computational technologies.
3. Investigate, test, and consider the use and cost effectiveness of software and/or
hardware in the business environment.
Course Outline
• Enterprise computing (database management, relationship management, etc.)
• Telecommunications convergence (Wi-Fi, Bluetooth, Voice Over Internet Protocol
[VOIP], etc.)
• Collaboration technologies
• Virtualization (artificial Intelligence programs, server virtualization, virtual and augmented
reality, etc.)
• Web technologies (Cloud computing, etc.)
• IT Infrastructure
• Big data storage and analytics, machine learning and data science platforms
• IOT Architecture and Platforms
Key Activities
● Preparation:
○ Learners rate their knowledge level of experience on a long wall chart
○ Partners introduce each other using memory devices
● Presentation:
○ Facilitator walks around the room while presenting information from peripherals
on wall and tabletops.
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 4
○ Learners are given pieces of course information and mingle around the room,
sharing the information they have. At the end everyone takes a written quiz.
● Practice:
○ Large group open-ended discussions that allow for a free exchange of ideas
based on questions posed by the instructor.
○ Floor diagramming - have learners create a system or process on the floor and
then use it as a learning tool.
○ Restaurant game - have learners pick terms from a ‘menu’ and ‘serve’ each other
the correct definition.
● Performance:
○ Partners test each other orally - partners orally test each other using prepared
test questions.
Artificial Intelligence
This course is offered in a one-day overview version or a five-day in-depth exploration.
Overview
Artificial Intelligence (AI) is a technology that emulates and enhances human performance. AI
based applications are already at the forefront of algorithmic decision-making and are
transforming operations, processes and interactions. In this course, you will become familiar with
the basic concepts of modern AI as well as some of its representative applications.
Who is this course for? This course is designed for leaders, managers, and other key personnel
who want to be introduced to the basic knowledge representation, problem solving, and learning
methods of AI.
Learning Objectives
1. Develop intelligent systems by assembling solutions to concrete computational problems
2. Identify the role of knowledge representation, problem solving, and learning in intelligent-
system engineering
3. Apply AI to the role of problem solving, vision, and language in understanding human
intelligence from a computational perspective
4. Explain the limitations of current Artificial Intelligence techniques.
Course Outline
• Reasoning: goal trees, problem solving and rule-based expert systems
• Search: depth-first, hill climbing, beam, optimal, branch and bound, A*, games, minimax,
and alpha-beta
• Constraints: interpreting line drawings, search, domain reduction, visual object recognition
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 5
• Learning: identification trees, disorder, neural nets, back propagation, genetic algorithms,
sparse spaces, phonology, near misses, felicity conditions, support vector machines, and
boosting
• Representations: classes, trajectories, transitions
• Architectures: GPS, SOAR, Subsumption, Society of Mind
• The AI business
• Model merging, cross-modal coupling, course summary
Key Activities
● Preparation:
○ Experience sharing - learners share stories of their experiences with the course
topic.
○ Learners gauge current feelings on a large peripheral of a thermometer.
● Presentation:
○ With music playing in the background, learners relax and visualize themselves
performing skills and job-related tasks.
○ In-class scavenger hunt - send learners on a search throughout the classroom to
find answers to a list of topic questions.
● Practice:
○ Small group discussions for brainstorming ideas and evaluating job-related
scenarios. Group notes will be written on flip charts and followed by large group
discussions.
○ Learning stations - learners walk through various learning stations in the room to
answer questions. Complete a process, or practice a skill.
○ Q&A Musical Chairs - learners play musical chairs as they answer review
questions.
● Performance:
○ Collaborative Post-test - learners are given a written post-test and are allowed to
work together to complete it.
Business Intelligence
This course is offered in a one-day overview version or a five-day in-depth exploration.
Overview
Business intelligence (BI) is an umbrella term that includes the applications, infrastructure, tools,
and best practices that enable access to and analysis of information to improve and optimize
decisions and performance. This course will present the basic concepts of Business Intelligence
along with current status and future emergence as a tool for business enhancement.
Who is this course for? This course is designed for leaders, managers, and other key
personnel involved in advanced or future technologies.
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 6
Learning Objectives
1. Define Business Intelligence and Business Intelligence Architecture
2. Describe the purpose of Business Intelligence in a business.
3. Identify the components (Business Intelligence Architecture) used to build Business
Intelligence Systems.
4. Define Online Analytical Processing (OLAP) as used for Business Intelligence.
5. Identify Business Intelligence tools/software currently in the market.
Course Outline
Module 1 – Decision Making and Decision Support Systems
• The role of computerized support for decision making and its importance.
• The role of Decision Support Systems (DSS)
• How DSS have changed over time
• The evolution of DSS applications and how DSS support each phase decision making
Module 2 – Business Intelligence Concepts and Platform Capabilities
• Terms – Business intelligence (BI), BI architecture, and their components
• Main components of BI platforms and their capabilities
• Competitive landscape of BI platforms
• Building blocks of business reports: types, components, and structure
• Components and structure of business reporting systems
Module 3 – Data Visualization and Dashboard Design
• Job responsibilities of BI analysts
• Importance of data visualization
• Types of data that can be visually represented
• Types of basic and composite charts
• Best practices for designing data visualizations
• Designing dashboards – guidelines and common pitfalls
Module 4 – Business Performance Management Systems
• Purpose of Business Performance Management (BPM) Systems and components
• Four phases of BPM cycle and how organizations typically deploy BPM
• Dashboards versus scorecards
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 7
• Benefits of using a balanced scorecard versus a Six Sigma in a BPM system
• The role of visual and business analytics (BA) in BI
Module 5 – BI Maturity, Strategy, and Summative Project
• Levels and factors that impact BI maturity within an organization
• Challenges and potential solutions for BI maturity within an organization
• Critical success factors for implementing a BI strategy and framework
• BI implementation targets
• Project: Use Micro Strategy visual analytics capabilities to analyze KPIs for a fast food
company to find the causes of problems
Key Activities
● Preparation:
○ Learners put together a floor model of system/process and have them arrange it
on the floor as they get acquainted.
○ Learners pick an item and use it to introduce themselves, explaining how the
object relates to them
● Presentation:
○ What-if Scenarios - present hypothetical situations and ask learners how to deal
with them successfully.
○ Group mural creation - assign learners topics to research and then ask them to
summarize the topics with a drawing on a large class mural.
● Practice:
○ Team activities requiring participants to work together to solve problems related
to the course objectives, followed by large group discussions.
○ Equipment labeling - learners label pieces of equipment or system components
with their proper names and functions.
○ Casino game - learners individually answer review questions and let other
learners bet if they think the answer is correct.
● Performance:
○ Puzzle Test - learners complete a crossword puzzle with information from the
course.
Digital Mesh
This course is offered in a one-day overview version or a five-day in-depth exploration.
Overview
Today, devices like phones, cars, camera and appliances are being used as connection points
that people use to access applications and information, or to interact with people, social
communities, governments and businesses. Digital mesh refers to a cooperative local network of
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 8
these devices, where they can automatically speak to each other and interoperate seamlessly.
This course will demonstrate the extent and depth of the mesh and look ahead to future
developments and expectations.
Who is this course for? This course is designed for anyone with an interest in Digital Mesh and
how it has changed the landscape of business. Specific roles that would benefit are:
• Management Positions (IT, Procurement, Finance, etc.).
• IT Professionals (Administrators, Service Managers).
Learning Objectives
1. Describe the digital mesh architecture of business systems.
2. Discuss the digital mesh architecture related to digital mesh devices
3. Identify the underlying features provided by a typical device mesh system.
4. List security and management issues that affect device mesh systems.
Course Outline
• The evolution of the digital mesh and device mesh
• Key elements of the digital mesh and device mesh
• Opportunities for the digital mesh and business
• Challenges of the digital mesh
• Applications of digital mesh
• Identify existing device meshes
• Impact of future digital mesh systems
Key Activities
● Preparation:
○ Learners mingle and discuss questions related to course topic.
○ Learners are given colored-objects to represent their level of expertise and asked
to form balanced teams by mixing the colors equally.
● Presentation:
○ Learners view and handle equipment - display pieces of equipment, explain each
one in order, and encourage learners to handle the equipment and ask
questions.
○ Teams research and present topics - give each team a topic to research and
then have them present their findings to the class.
● Practice:
○ Learning journal exercises designed for participants to compare their knowledge
of course topics and their views on course topics before and after instruction is
delivered.
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 9
○ Teams research and present a topic - teams research a topic and give a
presentation to the class.
○ Tic-Tac-Toe Review - learners play tic-tac-toe as they answer review questions.
● Performance:
○ Matching Cards - learners test their knowledge and understanding by matching
answer cards with question cards.
Neural Networks
This course is offered in a one-day overview version or a five-day in-depth exploration.
Overview
A neural network is an advanced machine learning technique based on how neurons and
synapses work in the human brain with the goal of solving problems in the same way that a
human would. This course will examine the background and the present and future application of
Neural Networks.
Who is this course for? This course is for students who have an interest in how neural networks
and complex natural human intelligence work together to solve problems.
Learning Objectives
1. Define a neural network
2. Design and implement various neural network architecture
3. Describe simple models of recurrent neural networks
4. Construct a simple neural program
5. Discuss strategies to make neural networks generalize better
Course Outline
Module 1: Introduction to the course - machine learning and neural nets
Module 2: The Perceptron learning procedure – An overview of the main types of neural network
architecture
• The backpropagation learning procedure – Learning the weights of a linear neuron
• Learning feature vectors for words – Learning to predict the next word
Module 3: Object recognition with neural nets (In this module we look at why object recognition
is difficult.)
• Optimization: How to make the learning go faster
Module 4: Recurrent neural networks –This module explores training recurrent neural networks
• More recurrent neural networks – We continue our look at recurrent neural networks
• Ways to make neural networks generalize better – We discuss strategies to make neural
networks generalize better
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 10
Module 5: Combining multiple neural networks to improve generalization
• In this module we look at why it helps to combine multiple neural networks to improve
generalization
• Hopfield nets and Boltzmann machines
Module 6: Restricted Boltzmann machines (RBMs) – This module deals with Boltzmann machine
learning
• Stacking RBMs to make Deep Belief Nets
• Deep neural nets with generative pre-training
• Modeling hierarchical structure with neural nets
• Recent and future applications of deep neural nets
Key Activities
● Preparation:
○ Learners research a course topic and build a 3D model out of their findings and
then describe their creations to the class.
○ Learners present objects from their geographical location to present to the class
during introductions.
● Presentation:
○ Video clip - play a brief videotaped scene that illustrates course content.
○ Teams research and present topics - give each team a topic to research and
then have them present their findings to the class.
● Practice:
○ Individual assessments that allow participants to compare their knowledge of
course topics and their views on course topics before and after instruction is
delivered.
○ Learners walk through ‘steps’ of a process - write each step of a process on
paper footprints and spread them out on the floor. Partners walk through steps
as they describe each step’s significance.
○ Q&A Hangman - partners play hangman game with review questions.
● Performance:
○ Learners Re-create the Course from Memory - the class works together to
recreate the main points of the course on a flipchart or wall mural.
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 11
Agile Development
This course is offered in a one-day overview version or a five-day in-depth exploration.
Overview
Agile development is an iterative approach to software delivery that builds software incrementally
from the start of the project, instead of trying to deliver it all at once near the end. This course will
present the approach, execution, and effectiveness of Agile development.
Who is this course for? This course is designed for anyone who is considering the use of Agile
Methods for software development, including project, program, and product managers.
Learning Objectives
1. Describe the history of Agile and how the collection of principles and practices came
together to enable customer success
2. Examine Agile methods, including: Scrum, Extreme Programming, Lean Software
Development and Kanban
3. Illustrate best practices from the various methodologies that will contribute to team
success
4. Define the Agile terminology, roles and forums with context
5. Describe the processes that support Agile principles to enable the delivery of great
products
Course Outline
Module 1: Why Agile – What are the problems that Agile is addressing?
• Software Development has historically been plagued by many problems including
inadequate requirements that lead to products that customers aren’t happy with and
sometimes can’t use. We will start the class by making the case for a shift to an Agile
approach to solve the problems inherent in software development.
Module 2: The Agile Paradigm Shift – Software Development is Complex
• The problems of software development are frequently the result of treating it like it is a
manufacturing process designed to replicate the same outcomes on each pass through
the process. We will learn how software development is a complex endeavor more like
driving on a freeway with high variation of experience each time we do it. We will discuss
the importance of building feedback loops into the process to accommodate variation.
Module 3: Agile Methodologies – What’s trending?
• In this section we will review the Agile methodologies that are trending. We will visit first
Lean which is foundational and influences all other Agile methodologies. Then we will do
an overview of Scrum. Scrum is the most popular Agile methodology and is great for
projects. Scrum or Scrum variants are being used by about 75% of those doing Agile, but
Scrum is not the only Agile approach. We’ll then see how Kanban might be a better
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 12
answer for operations and sustainment work. We will then review the Extreme
Programming practices that can be used mixed into other Agile approaches to help us
rapidly accommodate change.
Module 4: Building the Agile Team
• Traditional software development focuses on results needed from a project. Agile focuses
on creating a team that can deliver results over and over. In this section we will discuss
what makes a high-performing team and how to build that team. The section will also
cover the team roles associated with an Agile approach.
Module 5: Inspect and Adapt – Continuous Improvement
• The power of Agile comes from the fact that continuous improvement is built into the Agile
system. In this section we will review how People, Product and Process improve
themselves through a frequent inspect and adapt process. We will discuss the main Agile
ceremonies that help us accomplish this: Iteration Review/Demo and the Retrospective.
Key Activities
● Preparation:
○ Display course-related questions and ask learners to place a green dot by ones
they know and red dots by ones they don’t know.
○ Learners design their own logos on name cards and explain their significance to
the class.
● Presentation:
○ Model creation - using various materials, build a replica of what is being taught.
○ Learners read and review - have learners read assigned material, sum up the
main points with a partner, then join in class discussion about it.
● Practice:
○ Participant worksheet exercises developed for brainstorming ideas and
evaluating work-related scenarios and case studies.
○ Learners arrange components on a large wall display and piece together jumbled
components of a process or system on a wall peripheral.
○ Q&A Dice Game - Teams roll a dice and answer numbered question cards that
correspond to the number they rolled.
● Performance:
○ Learners Write a Course Summary - learners create a list, from memory, of
everything they’ve learned during a course session. They then share their lists to
create one big summary.
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 13
Mindfulness
This course is offered in a one-day overview version or a five-day in-depth exploration.
Overview
Mindfulness is the psychological process of bringing one's attention to the internal and external
experiences occurring in the present moment which can be developed through the practice of
meditation and other training. This course will present the concepts and demonstrate some basic
methodologies to effectively use Mindfulness.
Who is this course for? This course is for anyone wishing to improve their focus capacity and
become a mindful leader.
Learning Objectives
1. Define mindfulness
2. Compare mindfulness and meditation
3. Describe benefits of mindfulness
4. Identify different mindfulness techniques to minimize distractions and improve focus
5. Apply mindfulness in real-time
Course Outline
• Defining mindfulness – underlying principles, usefulness, and practical applications
• Mindfulness vs. Meditation
• Benefits of mindfulness
• Mindfulness techniques to improve focus and clarity
• Thought-leaders on mindfulness
• Practicing mindfulness, applying various mindfulness techniques
• Mindfulness in work and home life
Key Activities
● Preparation:
○ Learners construct a wall display of system/process on large pieces of poster
board and have them assemble the pieces into a giant wall peripheral.
○ Teams invent team names and create a team logo on flipchart paper and post it
on the wall.
● Presentation:
○ Props to illustrate concepts - facilitator presents a concept, idea, or process using
three-dimensional objects.
○ Partners teach each other - ask learners to research a topic and teach it to their
partners.
● Practice:
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 14
○ Open-ended worksheet exercises designed for participants to reflect on what
they have learned in the course.
○ Puzzle assembling - learners put together puzzles of processes, technical
equipment or systems.
○ High card answer game - members from two teams pick playing cards and get to
answer a question for points.
● Performance:
○ Mastery Demonstration - learners perform a skill or act out a scenario that
demonstrates their mastery of the training material.
Quantum Computing
This course is offered in a one-day overview version or a five-day in-depth exploration.
Overview
Quantum computing takes advantage of the strange ability of subatomic particles to exist in more
than one state at any time so that computing operations can be done much more quickly and use
less energy than classical computers. This course will present the basic concepts of Quantum
Computer and contrast them against traditional computing while demonstrating the advantages of
this radical new approach.
Who is this course for? This course is designed for leaders, managers, and other key personnel
interested in quantum computing and its comparison to conventional computing. Specific roles
that would benefit are Management Positions (IT, Procurement, Finance, etc.), IT Professionals
(Administrators, Service Managers), Staff of Service Providers.
Learning Objectives
1. Effectively compare and contrast quantum computing and conventional computing
2. Investigate the basic concepts and techniques of quantum computing and conventional
computing
3. Explain the implications of quantum computing for the theory of computation
4. Identify the techniques and procedures involved in the possible replacement of
conventional computing to quantum computing
Course Outline
• Introduction to computing (quantum and conventional)
• Quantum vs. conventional binary systems (qubit vs. binary)
• Quantum vs. conventional computation algorithms and how they work
• Advantages of quantum computers versus conventional computers
• The future of quantum computing
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 15
Key Activities
● Preparation:
○ Learners take visually-based notes that capture more information than traditional
word-based notes around a concept.
○ Learners are given cards with terms, concepts, and topics on them and then
mingle and gather each other’s existing knowledge of the item on their card.
● Presentation:
○ Storytelling to illustrate course content - facilitator tells a story that dramatically
illustrates a specific learning point.
○ Carousel brainstorm - have learners face each other in two circles, one inside the
other. Everyone asks the facing partner a question, gets a response, then outer
circle shifts clockwise to repeat the process.
● Practice:
○ Large group open-ended discussions that allow for a free exchange of ideas
based on questions posed by the instructor.
○ Learners add missing pieces to a peripheral - learners add missing pieces to a
wall or tabletop model of a system, process, or piece of equipment.
○ Pictionary game - learners draw pictures of key terms or concepts and ask
teammates to guess what the drawings represent.
● Performance:
○ Horse Race Test - Have teams race paper horses to a finish line by correctly
answering review questions.
Cloud Computing
This course is offered in a one-day overview version or a five-day in-depth exploration.
Overview
Cloud computing is about storing, accessing and processing data and programs over the Internet.
The cloud is just a metaphor for the Internet. One of the major advantages of using cloud services
is that we don't have to have an on premise big data infrastructure and we don't have to worry
about scalability. Cloud computing models offer the promise of massive cost savings combined
with increased IT agility. It is considered critical that government and industry begin adoption of
this technology in response to difficult economic constraints.
Who is this course for? This course is designed for technology professionals with no knowledge
of cloud computing; however, a knowledge of Internet technologies, Microsoft Windows, and Web
applications is beneficial.
Learning Objectives
1. Describing cloud computing
2. Identifying cloud computing infrastructures
3. Analyzing the benefits and risks of cloud computing
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 16
4. Evaluate and assess business and technical benefits of cloud computing
5. Comparing and contrasting cloud computing services
6. Evaluating cloud storage solutions
Course Outline
• Introduction to cloud computing
• Cloud computing components
o Clients
o Servers
• Cloud computing platforms
o Amazon Web Services (AWS)
o Google Cloud
o Microsoft Azure
• Cloud computing services
o Platform as a Service (PaaS)
o Software as a Service (SaaS)
• Cloud storage solutions
o Dropbox
o Google Drive
o Microsoft One Drive
• Benefits and risks of cloud computing
• Implementing cloud computing security solutions
Key Activities
● Preparation:
○ Learners introduce themselves using animal metaphors.
● Presentation:
○ Mnemonics for course terms and concepts - use memory devices to help
learners remember course terms, concepts, and processes.
○ Model building - ask learners in teams to build physical models representing
various aspects of the course material and then describe their creations to the
class.
● Practice:
○ Small group discussions for brainstorming ideas and evaluating job-related
scenarios. Group notes will be written on flip charts and followed by large group
discussions.
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 17
○ Partners create and correct errors - partners create errors or problems in a
process or system for each other to correct or solve.
○ Q&A Faceoff - two teams line up, face each other, and answer questions for
points.
● Performance:
○ Question Card Collaborative Post-test - give each learner an index card with
three questions on it and have them collaborate to find the answers.
The Internet of Things (IoT)
This course is offered in a one-day overview version or a five-day in-depth exploration.
Overview
The future is “The Internet of Things” - everyday devices equipped with sensors and connectivity
to work together, understand what we’re doing, and operate automatically to make our lives
easier. And, of course, we’ll be able to control and configure it all, likely with our tablets and
smartphones, or by speaking. After all, Siri and Google Now have taken voice recognition
mainstream. The Internet of Things is fast becoming a fixture in some industries, and the
technologies for transformative business applications are at hand. It is also the backbone of digital
mesh. This course explores the many business opportunities IoT presents, details its associated
implementation challenges and describes how organizations can accelerate their progress so they
don’t fall behind.
Who is this course for? This course is designed for anyone with an interest in the Internet of
Things and how it can change the landscape of business. Specific roles that would benefit are:
• Management Positions (IT, Procurement, Finance, etc.).
• IT Professionals (Administrators, Service Managers).
• Staff of Service Providers
Learning Objectives
1. Describe IoT and business ecosystems
2. Compare and contrast opportunities and challenges presented when using company IoTs
3. Explain how IoTs may be used to improve organizational growth
Course Outline
• Key Trends and Terms - IoT ecosystem
• Key Trends and Terms - Business ecosystems
• Changing the IoT landscape to reflect in business ecosystems
• Implementing the IoT in the business ecosystem
• Opportunities for IoT in businesses and organizations
• Five challenges of IoT in businesses and organizations
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 18
o Lack of Shared Infrastructure
o Lack of Common Standards
o Powering Devices
o Data Control and Security
o Data Sharing
• The future of the IoT in the workplace
Key Activities
● Preparation:
○ Learners find the same person who holds the same animal card as they,
introducing themselves to everyone they meet.
● Presentation:
○ Metaphors and analogies help explain new information.
○ Learners assemble definitions - give each learner part of a definition for a term or
concept in the course. Then ask them to piece their parts together into a
meaningful definition.
● Practice:
○ Team activities requiring participants to work together to solve problems related
to the course objectives, followed by large group discussions.
○ Problem solving circle- learners form a circle, toss a ball to each other, and pose
problems for the group to solve.
○ Q&A Checkers - teams play a game of checkers, and for each square they land
on, they have to answer a question.
● Performance:
○ Flash Card Post-Test - have partners quiz each other with questions on flash
cards.
Big Data Analytics
This course is offered in a one-day overview version or a five-day in-depth exploration.
Overview
Analyzing big data allows analysts, researchers, and business users to make better and faster
decisions using data that was previously inaccessible or unusable. This course will present the
basic concepts of Big Data Analytics to enable learners to understand the approach, value and
methodologies of using Big Data Analytics for more efficient, effective business practices.
Who is this course for? The course is intended for a general audience including business
people, managers, system architects/engineers, business/systems analysts, and software
developers.
Learning Objectives
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 19
1. Explain the history of data and big data analytics
2. Define key terms and understanding the jargon of data analytics
3. Describe basic phases of a data analytics project
4. Explore the different types of data
5. Discuss the overview of different mathematical approaches for data analytics
6. Examine the role of analytic reasoning and logic to guide and validate efforts
Course Outline
• Introduce Data Analysis and provide Big Data Definition
• Introduce the techniques and challenges in Big Data
• Interpret, report, and visualize the results of data analytics
• Verification and validation of data analytics projects and systems
• Transitions from project concept to deployed data analytic system
• Engineer computational and data storage considerations for data analytics
• Discover Data Analytics at Scale: Big Data
• Use Big Data tools and techniques (Apache Spark)
• Discuss current trends in data analytics
• Success and failures in big data analytics
• Key drivers for data analytics (data, math, computation and analysis)
• Introduce the techniques and challenges in Distributed Computing
• Show how the functional programming approach is particularly useful in tackling these
challenges
• Short overview of previous solutions: Google’s MapReduce and Apache Hadoop
• Introduce Apache Spark
Key Activities
• Preparation:
o Learners write their expectations on Post-Its and stick them on a wall. During the
course, learners remove these expectations as they are met.
• Presentation:
o Training video - learners find answers to prepared questions while watching a
related training video.
o Learners collaborate to define key terms - have learners work together to define
key terms and concepts.
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 20
• Practice:
o Learning journal exercises designed for participants to consider how they would
apply what they have learned to their own organization/job position.
o Detectives Exchange Clues - teams collect clues from each other and solve
problems and answer questions.
o Question Stations Relay - learners ‘harvest’ questions from stations around the
room and answer them with their teams.
• Performance:
o Learners Categorize Question Cards - learners are given a deck of question
cards that they must separate according to which ones they can answer and
which ones they cannot.
Text Analytics
This course is offered in a one-day overview version or a five-day in-depth exploration.
Overview
Data is becoming increasingly important as organizations look to make evidenced-based
decisions that enhance operations, improve efficiency, reduce risk, increase return on investment
and so on. Conventional methods of processing and analyzing data do not work with unstructured
data, which makes up more than 80% of all data being generated across the board. Such data is
often available in huge chunks of texts, tweets, posts, comments, none of which are stored in
traditional relational database framework and hence cannot easily be accessed, transformed and
analyzed. This where text analytics comes into play. It essentially reflects the process of
converting a highly unstructured data into valuable insights. This course will address the basics of
text analytics, natural language processing and text data mining in general.
Who is this course for? IT professionals with little to no experience to very experienced,
especially professionals in data analysis, data warehouse, data mining, business intelligence,
reporting, data science.
Learning Objectives
1. Perform text mining applications using structured & unstructured data;
2. Identify document term matrix, term frequency, term frequency inverse document, term
frequency for normalizing
3. Differentiate between size of word which indicates the frequency of the said word in a
word cloud, clustering based on related use for better insights and how to read the results
in context to make sense of the word
4. Identify from a practical case study the various steps of text mining in R and the use of
Positive and negative word banks
5. Familiarize yourself with Learn Web and Social media extraction using R, Risk sensing -
sentiment analysis, Twitter application management for extracting tweets
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 21
6. Explore the clustering concept, that is an integral part of text mining
7. Apply text analysis techniques to solve problems faced by governments and companies
Course Outline
• Introduction, Importance and Bag Of Words Representation
o Introduction to Text mining and this course
o Why text mining and sources of textual data, Bag of Words
• Terminology and Preprocessing Of Data
o Document and corpus
o Stemming of words
o Positive and negative features of a review
• DTM and TDM Format
o Document term matrix
o Term Frequency
o Term Frequency Inverse document
o Term frequency for normalizing
• Corpus Level Word Cloud
o Size of word indicates the frequency of the word
o Clustering based on related users for better insights
• Case Study on Real Project Part- 1
o Brief case study on Clinical Trials project
o Recognize the Business objective and description
o Unigram, Word cloud, cluster dendrogram
o Bigram Word cloud & semantic network
• Case Study on Real Project Part- 2
o Practical case study using R
o The various steps of Text mining in R
o Positive and negative words
Key Activities
• Preparation:
o Learners post their goals on paper sun rays and any obstacles on clouds. Then
they brainstorm ways of removing obstacles.
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 22
• Presentation:
o Big picture information - give learners a large pictogram overview of the course
or topic and encourage them to color it during presentation.
• Practice:
o Participant worksheet exercises developed for brainstorming ideas and
evaluating work-related scenarios and case studies.
o Procedure Cards Sort - partners get a deck of cards containing steps to a
procedure or process. They must shuffle the deck and lay the cards out in the
correct order.
o Question Dice Roll - learners answer review questions on cards and then roll
dice for points.
• Performance:
o Learners Write and Post What They Learned - learners write one or more
important things they learned in the program on a piece of paper and post it on
the wall for others to review.
Machine Learning
This course is offered in a one-day overview version or a five-day in-depth exploration.
Overview
Machine learning (ML) is a method of data analysis that automates analytical model building.
Using algorithms that iteratively learn from data, machine learning allows computers to find hidden
insights without being explicitly programmed where to look. This course will explain how to build
systems that learn and adapt using real-world applications.
Who is this course for? This course is designed for leaders, managers, and other key personnel
interested in the concept of machine learning and how it may have applications to their
organizations.
Learning Objectives
1. Identify supervised learning techniques for regression and classification.
2. Identify unsupervised learning techniques for data modeling and analysis.
3. Compare and contrast probabilistic versus non-probabilistic viewpoints.
4. Apply optimization and inference algorithms for model learning.
Course Outline
• Introduction
• Maximum Likelihood Estimation, Linear regression, Least Squares
• Ridge Regression, Bias-Variance, maximum a posteriori inference
• Ridge Regression, Bias-Variance, and Naïve Bayes algorithm
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 23
• Bayesian Linear Regression, subset selection for linear regression
• Nearest neighbor classification, Bayes classifiers, Linear classifiers
• Logistic regression, Laplace approximation, kernel methods, Gaussian processes
• Maximum Margin, Support Vector Machines, Trees, Random Forests, Boosting
• Clustering, k-means, Expectation–Maximization algorithm
• Markov models, hidden Markov models
• Model Selection and Selection criteria
Key Activities
• Preparation:
o Experience sharing - learners share stories of their experiences with machine
learning.
o Learners gauge current feelings on a large peripheral of a thermometer.
• Presentation:
o With music playing in the background, learners relax and visualize themselves
performing skills and job-related tasks.
o In-class scavenger hunt - send learners on a search throughout the classroom to
find answers to a list of topic questions.
• Practice:
o Small group discussions for brainstorming ideas and evaluating job-related
scenarios. Group notes will be written on flip charts and followed by large group
discussions.
o Learning stations - learners walk through various learning stations in the room to
answer questions. Complete a process, or practice a skill.
o Q&A Musical Chairs - learners play musical chairs as they answer review
questions.
• Performance:
o Collaborative Post-test - learners are given a written post-test and are allowed to
work together to complete it.
Soft Skills for Technical Professionals
This course is offered in a one-day overview version or a five-day in-depth exploration.
Overview
Recent research reveals that “85% of job success comes from having well-developed soft and
people skills, and only 15% of job success comes from technical skills and knowledge (hard
skills). Unfortunately, many professionals, especially those in technical fields such as Scientists,
Engineers, and IT professionals over depend on their technical skills.
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 24
The course contains great insights, tools, and processes that empower your people to develop the
12 soft skills that make or break their individual and collective success. The course will be divided
in three parts: Mastering Self, Getting Along, and Leading Others. There will be four soft skills
under each part.
Who is this course for? This course is designed to empower supervisors and managers who
wish to master self, get along with and lead others successfully to achieve extraordinary results,
meet the bottom line of their team, and contribute their share toward meeting the organization’s
mission.
Learning Objectives
1. Explain the vital role soft skills play in mastering self, getting along with and leading others
2. Discover the soft skills necessary to succeed in managerial positions
3. Identify tools, processes, and approaches that enable them improve their soft skills
4. Develop action plans to practice what they learned right away when they return to the
workplace.
Course Outline
• Part I: Mastering Self
o Soft Skill 1: Increasing self-awareness
o Soft Skill 2: Regulating Emotions Wittingly
o Soft Skill 3: Managing Time and Energy Wisely
o Soft Skill 4: Solving Problems & Making Right Decisions
• Part II: Getting Along with Others
o Soft Skill 5: Playing Teamwork
o Soft Skill 6: Communicating Effectively
o Soft Skill 7: Promoting Diversity & Embracing Inclusiveness
o Soft Skill 8: Turning Conflicts into Opportunities
• Part III: Leading Others
o Soft Skill 9: Motivating Others to Aim High
o Soft Skill 10: Coaching & Mentoring to Empower Others
o Soft Skill 11: Negotiating With Others for Win-Win Deals
o Soft Skill 12: Leading Others through Change Smoothly
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 25
Key Activities
• Preparation:
o Assessment: Learners gauge their current competency for each soft skill.
o Story sharing: Learners share their stories.
• Presentation:
o Video clips: Some video clips are played to reinforce learning.
o Study and present: Learners are given assignments to study their strength and
limitations against each soft skill, and present their findings.
o Group discussion: Learners are assigned topics to discuss in small groups and then
report back to the class.
• Practice:
o Experience sharing: Large group discussion based on some selected open-ended
questions to solicit some practical experiences of learners.
o Action items: Learners pick a few action items they intend to implement right away
when they return back to their workplace
• Performance:
o Using latest tools: Learners will be given tools they can use to improve their individual
and team performance.
o Lesson sharing: At the end of each soft skill session, learners pick one thing they
learned and explain how that could bring positive change, and ultimately performance
improvement in the workplace.
Hi Tech Hi Touch
This course is offered in a one-day overview version or a five-day in-depth exploration.
Overview
A multinational, publicly-traded organization providing a popular search engine ranks job
candidates on four factors, the most important of which is humility. A recent research study
suggests that we face an empathy deficit in the workforce. Related research suggests that our
“mirror neurons” help us empathize with others. In the late 90’s, author Daniel Goleman wrote that
emotional intelligence (the ability to process, use, and manage emotions in social settings) can
matter more than IQ to workplace success.
There are two parts to successful customer service and customer relationship building in a high-
tech environment – solutions and social sensibilities – or technology and touch. Building enduring
customer relationships requires attention to both parts.
This course will present concepts and demonstrate strategies to strengthen the competencies
associated with the “high touch” part of customer service and customer relationship building in a
high-tech environment.
Who is this course for? Individual and team-based client-facing information (IT) professionals.
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 26
Learning Objectives
1. Examine and discuss hi touch skills required to build and maintain enduring customer
relationships in a hi-tech environment
2. Identify impact of language and behavior on establishing and maintaining enduring
customer relationships in a hi-tech environment
3. Apply hi touch skills (in language and behavior) to relevant hi-tech customer scenarios
4. Differentiate specific hi touch skills required for the individual, team member, and
organization contributor roles
5. Create an action plan to enhance and establish enduring existing and future customer
relationships
Course Outline
• Hi Touch and Customer Relationship Building
• Hi Touch and Emotional Intelligence
• Hi Touch Skills for the IT Professional (EI Personal Competencies)
o Humility
o Listening
o Self-management
o Communication
o Practice
• Hi Touch Skills for the IT Team Member (EI Social Competencies)
o Empathy
o Patience
o Flexibility
o Practice
o Collaboration
o Customer Service
o Delegation
o Mentoring
o Practice
• Hi Touch Skills for the IT Organization Contributor (EI Social Competencies)
o Influencing
o Negotiation
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 27
o Vendor Management
o Hi Touch and Customer Relationship Maintenance
o Practice
Key Activities:
• Preparation:
o Learners are asked to generate a list of hi touch skills for a hi-tech environment.
o Small groups read assigned articles and present their learning to the larger class
group.
o Learners are asked to write and refer to, throughout the course, a significantly
challenging customer interaction they have experienced.
• Presentation:
o Learners view a humorous commercial video clip of an IT professional-customer
interaction.
• Practice:
o Large group open-ended discussions that allow for a free exchange of ideas based
on questions posed by the instructor.
o Group brain problem solving during which the entire class acts as ‘one brain’ and
works together to solve problems.
o Small groups respond to relevant scenarios.
• Performance:
o Learners “role play” a ‘hi touch’ response to their most challenging customer
interactions.
o Learners journal about everything they have learned in the program, the progress they
have made, and how they will apply the learning in the individual, team member, and
contributor roles.
Fundamentals of Statistics for Trending and Emerging Technologies
This course is offered in a one-day overview version or a five-day in-depth exploration.
Overview
Statistics is the science that turns data into information and then into knowledge. Based on the
collection, display, and analysis of data; statistics could help us in making wise decisions in the
face of uncertainty. This course covers applied statistical methodology from data analysis
viewpoint. In this course, you will become familiar with the basic concepts of modern statistic, as
well as some of the representative applications of statistics.
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 28
Who is this course for? This course is designed for leaders, managers, and other key personnel
who want to be introduced to the basic knowledge representation, problem solving, and learning
methods of statistics.
Learning Objectives
1. Recognize the extent to which Statistical is anticipated to fuel the next IT transformation
2. Explain the main features of traditional and modern statistics.
3. Identify the role of formal statistical theory and informal data analytic methods.
4. Distinguish statistical methods relevant to upper division interdisciplinary courses.
5. Analyze statistical data properly to enhance students’ critical thinking in domains involving
judgments based on data.
Course Outline
• Introduction
• Statistical Learning
• Exploratory data analysis
• Linear Methods for Regression
• Linear Methods for Classification
• Variance and Cross-Validation
• Resampling Methods: Cross-Validation and Bootstrap
• Tree-Based Methods
• Support Vector Machines and Flexible Discriminants
Key Activities
• Preparation:
o Experience sharing - learners share stories of their experiences with the course
topic.
o Learners gauge current feelings on a large peripheral of a thermometer.
• Presentation:
o With music playing in the background, learners relax and visualize themselves
performing skills and job-related tasks.
o In-class scavenger hunt - send learners on a search throughout the classroom to find
answers to a list of topic questions.
• Practice:
o Small group discussions for brainstorming ideas and evaluating job-related
scenarios. Group notes will be written on flip charts and followed by large group
discussions.
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 29
o Learning stations - learners walk through various learning stations in the room to
answer questions. Complete a process, or practice a skill.
o Q&A Musical Chairs - learners play musical chairs as they answer review questions.
• Performance:
o Collaborative Post-test - learners are given a written post-test and are allowed to work
together to complete it.
ICATT Windows 10 Courses
Installing & Configuring Windows 10
Course Length: Five Days
Overview
For organizations and their employees, Windows 10 may very well be Microsoft's greatest
platform ever. Windows 10 is not only more familiar from a user standpoint, but it also includes
so much of what businesses need—including enterprise-grade security, identity and information
protection features, which reduces complexity and proves a better experience for the modern
needs of business.
Who is the course for? This five-day course is for Information Technology professionals who
administer and support Windows 10 desktops, users, and network and security resources in a
Windows Server domain environment. This course may also provide some of the skills needed to
take the Microsoft Certified Solutions Associate (MCSA) 70-698 exam: Installing and Configuring
Windows 10.
Prerequisites: Students should have previous experience with installing and configuring
Windows based operating systems.
Learning Objectives
1. Plan, install, configure, and upgrade to Windows 10
2. Perform post-installation configuration
3. Install and manage apps
4. Implement networking
5. Implement network security
6. Manage Windows 10 with Group Policy
7. Implement remote management
8. Manage local storage.
9. Manage files and resources
10. Secure Windows 10
11. Implement remote connectivity
12. Maintain and update Windows 10
13. Recover and troubleshoot Windows 10
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 30
Topics Covered and Detailed Outline
Installing Windows 10
1. Overview of Windows 10
2. Planning your Windows 10 deployment
3. Installing and deploying Windows 10
4. Upgrading to Windows 10
5. Windows 10 installation maintenance
6. Managing volume activation
7. Lab: Upgrading to Windows 10
8. Migrating user settings
9. Upgrading from Windows 8.1 to Windows 10 (optional)
10. Lab: Maintaining a Windows 10 installation with Windows ICD
11. Create and configure a Windows Imaging and Configuration Designer (Windows ICD)
provisioning package
Performing Post-Installation Configuration (Overview of Management Tools)
1. Customizing the user interface
2. Managing devices, device drivers, and services
3. Configuring features, mobility, and power options
4. Overview of Client Hyper-V
5. Lab: Managing devices
6. Install a device driver
7. Resolving the device driver problem
8. Lab: Configuring features and power options
9. Turning on Windows features with Control Panel
10. Managing installed Windows features
11. Configuring power options
Implementing Networking (Home Groups, Workgroups, and Domains)
1. Configuring IPv4 network connectivity
2. Configuring IPv6 network connectivity
3. Implementing name resolution
4. Troubleshooting network connectivity
5. Implementing wireless network connectivity
6. Lab : Implementing network connections
7. Verifying and testing network connectivity
8. Configuring automatic IPv4 addressing
9. Configuring and testing name resolution
10. Lab : Troubleshooting network connections
11. Resolving a network problem
Implementing network security (Implementing Windows Firewall)
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 31
1. Connection security rules
2. Implementing Windows Defender
3. Lab: Implementing network security
4. Creating and testing inbound rules
5. Creating and testing outbound rules
6. Creating and testing connection security rules
7. Configuring Windows Defender
Managing Windows 10 with Group Policy (Overview of Group Policy)
1. Configuring Windows 10 devices with GPOs
2. Lab: Describe Windows Firewall.
3. Managing Windows 10 by using Group Policy
Implementing remote management (Using Remote Desktop)
1. Using Remote Assistance
2. Remoting with Windows PowerShell
3. Lab: Implementing remote management
4. Using Remote Desktop
5. Using Remote Assistance
6. Remoting with Windows PowerShell
Managing storage (Overview of Storage Options)
1. Managing disks, partitions, and volumes
2. Maintaining disks and volumes
3. Implementing Storage Spaces
4. Implementing and managing OneDrive
5. Working with virtual hard disks
6. Lab: Managing storage
7. Adding a disk
8. Creating a simple volume
9. Creating a storage space
Managing files and resources (Overview of File Systems)
1. Configuring and managing file access
2. Managing shared folders
3. Implementing Work Folders
4. Managing printers
5. Lab: Creating, securing, and sharing a folder
6. Creating, securing, and sharing a folder
7. Lab: Implementing Work Folders
8. Configuring Work Folders
9. Lab: Managing printers
10. Installing and sharing a printer
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 32
Deploying and managing apps (Overview of Apps in Windows 10)
1. The Windows Store and Windows Store for Business
2. Automating app deployment
3. Configure web browsers
4. Lab: Deploying and managing Windows Store apps
5. Side loading an app
6. Lab: Deploying apps with Windows ICD
7. Creating a provisioning package
8. Deploying the package
9. Verifying deployment
10. Lab: Configuring Microsoft Edge
11. Configuring and using Microsoft Edge
Securing Windows 10 (Managing user accounts)
1. Configuring UAC
2. Implementing and Managing BitLocker
3. Lab: Configuring user accounts
4. Managing user accounts
5. Configuring UAC
6. Lab : Managing data security
7. Using BitLocker
Implementing remote connectivity (Overview of remote connectivity options)
1. Implementing VPNs
2. Implementing DirectAccess
3. Lab: Implementing a VPN
4. Deploying a virtual private network (VPN) server
5. Creating a VPN connection
Maintaining Windows 10 (Updating Windows 10)
1. Monitoring Windows 10
2. Lab: Maintaining Windows
3. Configuring updates for a single device
4. Configuring updates with GPOs
5. Monitoring reliability and performance
Recovering Windows 10 (Recovering files)
1. Performing system recovery
2. Lab: Troubleshooting and recovery
3. Using File History to recover files
4. Using Previous Versions to recover files
5. Recovering a device with a restore point
6. Using the advanced startup options to recover a device
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 33
Learning Activities Based on Thiagi 4 Door Model
1. Library
A module for each segment created with various links and supplemental materials for installing
and configuring Windows 10 resources.
a. Books
▪ Exam Ref 70-698: Installing and Configuring Windows 10 with Practice Test- First Edition
https://www.microsoftpressstore.com/store/exam-ref-70-698-installing-and-configuring-windows-
9781509305049 - Andrew Bettany, Andrew Warren ISBN: 978-1-5093-0295-6
b. Streaming Videos
c. PowerPoint Slides Created with Camtasia Studio
2. Playground
▪ Digital learning labs, scenarios, and activities created with Articulate Storyline/Adobe
Captivate or any other game/scenario-based eLearning platform
▪ Digital learning labs, scenarios, and activities provided by Microsoft Learning Labs
▪ Microsoft Windows 10 70-698: Installing and Configuring Windows 10 - CBT Nuggets
provides students with hands-on virtual labs. In turn, labs can be used in Cafe for
discussions.
https://www.cbtnuggets.com/it-training/microsoft-windows-10-70-698-installing-and-configuring-
windows-devices.
3. Cafe
Discussion boards, blogs, and wikis for students to collaborate, reflect, and share ideas based on
lessons and scenarios.
4. Evaluation Center
Knowledge checks, Formative, Summative, and work-integrated assessments given throughout
course modules to test students’ knowledge of existing course content.
Supporting & Troubleshooting Windows 10
Course Length: Five Days
Overview
This course is designed to provide students with the knowledge and skills required to support
and troubleshoot Windows 10 PCs and devices in a Windows Server domain environment.
These skills include understanding of Windows 10 features, how they can be used in an Active
Directory environment and how to troubleshoot them.
Who is the course for? This five-day course is for Desktop Support technicians (Tier 2 support)
who support Windows 10 desktops, devices, users, and network and security resources in a
Windows domain environment. This course may also provide some of the skills needed to take
the Microsoft Certified Solutions Associate (MCSA) 70-697 exam: Windows 10 Configuring
Windows Devices.
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 34
Prerequisites: Students should have previous experience with installing and configuring
Windows based operating systems.
Learning Objectives
1. Describe the processes involved in planning and using a troubleshooting methodology
for Windows 10.
2. Troubleshoot startup issues and operating system services on a Windows 10 PC.
3. Resolve issues related to hardware devices and device drivers.
4. Troubleshoot Windows 10 PCs remotely.
5. Troubleshoot issues related to network connectivity.
6. Troubleshoot client configuration failures and Group Policy Object (GPO) application
issues.
7. Troubleshoot issues related to user settings.
8. Troubleshoot remote connectivity issues.
9. Resolve issues related to accessing resources from computers that are domain-joined.
10. Resolve issues related to accessing resources from computers that are not domain-joined.
11. Troubleshoot issues related to application installation and operation.
12. Recover a PC running Windows 10.
Topics Covered and Detailed Outline
Implementing a Troubleshooting Methodology
1. Overview of the Troubleshooting Steps
2. Troubleshooting Tools
3. Lab: Implementing a Troubleshooting Methodology
4. Implementing a Troubleshooting Methodology
5. Lab: Using Troubleshooting Tools
6. Using Troubleshooting Tools
Troubleshooting Startup Issues
1. Overview of the Windows 10 Startup Recovery Environment
2. Troubleshooting Startup Settings
3. Troubleshooting Operating System Services Issues
4. Recovering BitLocker-Protected Drives
5. Lab : Troubleshooting Startup Issues
6. Resolving a Startup Issue
7. Lab: Recovering BitLocker-Encrypted Drives
8. Recovering a BitLocker-Encrypted Drive
9. Creating a New BitLocker Password
Troubleshooting Hardware and Device Drivers
1. Troubleshooting Device Driver Failures
2. Overview of Hardware Troubleshooting
3. Troubleshooting Physical Failures
4. Monitoring Reliability
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 35
5. Configuring the Registry
6. Lab: Troubleshooting Device Driver Issues
7. Troubleshooting a Missing Device Driver
8. Resolving Hardware Problems
9. Resolving Device Driver Problem
10. Configuring Group Policy Settings to Control Device Installation
11. Lab: Troubleshooting Hardware Issues
12. Diagnosing Memory and Troubleshooting Failed Disk Redundancy
13. Accessing a Volume from a Failed Computer
Troubleshooting Remote Computers
1. Using Remote Desktop
2. Using Remote Assistance
3. Remoting with Windows PowerShell
4. Lab: Troubleshooting Remote Computer by using Remote Desktop and Remote
Assistance
5. Using Remote Desktop
6. Using Remote Assistance
7. Lab : Troubleshooting Remote Computer by Using Windows PowerShell
8. Using Windows PowerShell Remoting
Resolving Issues with Network Connectivity Issues
1. Determining Network Settings
2. Troubleshooting Network Connectivity
3. Troubleshooting Name Resolution
4. Lab: Resolving Network Connectivity Issues
5. Resolving a Network Problem
6. Troubleshooting a Wireless Network
Troubleshooting Group Policy
1. Overview of Group Policy Application
2. Resolving Client-Configuration Failures and GPO Application Issues
3. Lab: Troubleshooting Issues with Group Policy Application
4. Resolving Group Policy Application
5. Lab: Resolving Issues with Group Policy
6. Resolving Group Policy Application
Troubleshooting User Settings
1. Troubleshooting Login Issues
2. Troubleshooting the Application of User Settings
3. Lab: Troubleshooting Login Problems
4. Resolving Login Issue
5. Lab: Troubleshooting the Application of User Settings
6. Resolving Folder Redirection Issue
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 36
Troubleshooting Remote Connectivity
1. Troubleshooting VPN Connectivity Issues
2. Troubleshooting DirectAccess
3. Lab: Troubleshooting VPN Connectivity
4. Troubleshoot VPN Connectivity Issue
5. Lab: Configuring and Troubleshooting DirectAccess
6. Prepare the DirectAccess Implementation
7. Configuring and Verifying Client-Side Settings for DirectAccess
Troubleshooting Resource Access within a Domain
1. Troubleshooting File Permissions Issues
2. Recovering Files Encrypted by EFS
3. Troubleshooting Printer Access Issues
4. Lab: Troubleshooting File Access Issues
5. Resolving a File Access Issue
6. Lab: Troubleshooting Access to Encrypted Files
7. Encrypting and Recovering Access to Encrypted Files
8. Lab: Troubleshooting Printer Issues
9. Resolving a Printer Access Issue
Troubleshooting Resource Access for Clients That Are Not Domain Members
1. Configuring and Troubleshooting Device Registration
2. Configuring and Troubleshooting Work Folders
3. Configuring and Troubleshooting OneDrive Access
4. Lab: Troubleshooting Resource Access for Clients That Are Not Domain Members
5. Troubleshooting Device Registration
6. Troubleshooting Work Folders
7. Troubleshooting OneDrive for Business
Troubleshooting Applications
1. Troubleshooting Desktop App Installation Issues
2. Troubleshooting Desktop Apps
3. Managing Windows Store Apps
4. Troubleshooting Access to Company Web Applications
5. Lab: Troubleshooting Desktop Apps
6. Troubleshooting AppLocker Policy Application
7. Troubleshooting Application Compatibility Issues
8. Lab Troubleshooting Access to Company Web Applications
9. Troubleshooting Internet Explorer Issues
10. Troubleshooting Microsoft Edge Issues
Maintaining Windows 10
1. Managing and Troubleshooting Windows Activation
2. Monitoring and Troubleshooting Computer Performance
3. Applying Applications and Windows Updates
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 37
4. Lab: Monitoring and Troubleshooting Performance
5. Resolve a Performance-Related Issue
6. Resolve a CPU-Related Performance Issue
7. Resolve a Disk-Related Performance Issue
Recovering Data and Operating System
1. File Recovery in Windows 10
2. Recovering an Operating System
3. Lab : Recovering Data
4. Resolving Issues with Previous Versions
5. Lab : Provisioning Computer to Comply with Company Standards
6. Provision Computer to Comply with Company Standards
Learning Activities Based on Thiagi 4 Door Model
1. Library
A module for each segment created with various links and supplemental materials for supporting
and troubleshooting Windows 10 resources.
a. Books
o Bundle: Microsoft Specialist Guide to Microsoft Windows 10 (Exam 70-697,
Configuring Windows Devices) + MindTap® Networking, 1 term (6 months) Printed
Access Card for Wright/Plesniarski's Microsoft Specialist Guide to Microsoft Windows
10 (Exam 70-697, Configuring Windows Devices) - ISBN: 978-1-337-36665-6
a. Streaming Videos
b. PowerPoint Slides Created with Camtasia Studio
2. Playground
• Digital learning labs, scenarios, and activities created with Articulate Storyline/Adobe
Captivate or any other game/scenario-based elearning platform
• Digital learning labs, scenarios, and activities provided by Microsoft Learning Labs
• Microsoft Windows 10 70-697: Configuring Windows Devices - CBT Nuggets provides
students with hands-on virtual labs. In turn, labs can be used in Cafe for discussions.
https://www.cbtnuggets.com/it-training/microsoft-windows-10-70-697-configuring-windows-
devices1
3. Cafe
Discussion boards, blogs, and wikis for students to collaborate, reflect, and share ideas based on
lessons and scenarios. Students will use discussion boards to discuss CBT Nuggets exercises
with peers and instructor.
4. Evaluation Center
ICATT Trending and Emerging Technologies Course Catalog – Proprietary Information Page | 38
Formative, Summative, and work-integrated assessments given throughout course modules to
test students’ knowledge of existing course content.
Resources
• 70-697 - Supporting and Troubleshooting Windows 10 (M10982)
http://www.netcomlearning.com/courses/10982/10982-Supporting-and-Troubleshooting-Windows-
10-training.html
• 70-698 - Implementing and Managing Windows 10 (M206971-1)
http://www.netcomlearning.com/courses/20698/20698-Installing-and-Configuring-Windows-10-
training.html