BYOD (Bring Your Own Device) in education is a recurring topic that is coming up in conversations, and pops up in the media regularly too. There isn’t a ‘one-size-fits-all’ approach to BYOD in education, as each institution has different needs, policies, attitudes and current position. For some education customers, they are considering whether they’ll allow access to email from staff smartphones, whereas others may have been providing connections for students’ own laptops for years.
From an IT management point of view, there are many, many moving parts to implementing any kind of BYOD strategy, no matter how simple your plans. If you’re responsible for a BYOD strategy in a school, TAFE or university, then you may find the TechNet Jump Start training useful. The training is actually labelled ‘Consumerisation of IT’, which seems to be the phrase used in the US instead of Bring Your Own Device in education.
There are eight video sessions – all around an hour long – so there’s some real depth covered. If you’ve only got a bit of time available, I’d recommend the Keynote (01) and the Information Protection (06) sessions as particularly useful for education strategy decisions – closely followed by Desktop Virtualisation (08).
- (01): Keynote—Enabling the Consumerisation of IT
Bill Anderson and David Tesar kick off the course with the keynote session. After providing a high-level overview of the Consumerisation of IT, Bill provides commentary about BYOD business policy & strategy while David demonstrates several scenarios to setup the rest of the course.
- (02): End-to-End Security & Access
Bill Anderson leads the discussion with David Tesar about the all-important subject of providing access to devices using approaches that are secure end-to-end. Topics include DirectAccess, Server and Domain Isolation (SDI) & Network Access Protection (NAP), Updates to System Center Configuration Manager (SCCM), and System Center Endpoint Protection (SCEP).
- (03): User-Centric Application Delivery
Bill Anderson and David Tesar cover user-centric application delivery in this module. Discussion and demonstrations focus on Changes in User-Centric from System Center Configuration Manager (SCCM) 2007 to 2012, how the application delivery model works, Self Service and on-demand install, and Application Virtualization architecture.
- (04): Mobile Device Management
Bill Anderson and David Tesar focus on managing mobile devices, obviously a key concern when attempting to enable the consumerization of IT. After providing a great overview of Device Management using System Center Configuration Manager (SCCM) 2012, Bill dives into "light versus depth" management, the Light Management EAS Architecture, Depth Management (SCCM & Windows Intune) as well as EAS Policy support and considerations
- (05): Productive with Office 365
Andy O’Donald joins David Tesar during this session to illustrate how IT can make users within the organisation more productive using Office 365. After a brief overview of this cloud-based platform, Andy demonstrates features designed for users then transitions to the administrative tools built to empower IT to customize and control the experience using User Profiles. Finally, Andy describes the processes for Service Updates with Office 365.
- (06): Information Protection
Josh Heller leads David Tesar through a demo-rich discussion about information protection – a key topic when considering embracing BYOD. After describing Data Management Challenges, Josh uses lots of live demos to walk through Encrypting Information with AD RMS, the new Windows 8 File Server solution and several other protection-related topics.
- (07): Cloud Security and Management with Windows Intune
Craig Marl joins David Tesar to illustrate how Windows Intune enables IT departments to secure and manage users, devices and data. After a brief Windows Intune overview, Craig focuses on User centric management, User centric software distribution, and modern device management in Windows Intune.
- (08): Desktop Virtualisation
Adam Carter joins David Tesar through the extremely rich topic of Desktop Virtualisation. Adam leverages a scenario-rich approach to illustrate the new Microsoft User Experience Virtualisation (UE-V) then spends some great time on Microsoft Application Virtualization (App-V) and Microsoft Virtual Desktop Infrastructure (VDI). Additionally, Adam discusses Microsoft Enterprise Desktop Virtualization (MED-V) and Managing virtualisation with System Center and various User Scenarios.