Table of Contents for "Part One:  XP to Vista"

Sure, we've given you an outline for the first part of the XP-to-Win-7 set, but, heck, it's just an outline.  How much coverage do we really give to, say, BitLocker in comparison with .WIM files?  You can find out in this detailed track list.

The audio presentation is divided up into 11 CDs.  Each CD is divided into a number of tracks, each about seven to ten minutes long.  We've cross-indexed the tracks and subject description to the slide numbers printed in the Audio Companion.  So, for example, if you wanted to re-visit the subject of building a Windows PE disk, then you'd listen to track 4 on CD disc number 2.  The accompanying PowerPoint slide in the Audio Companion would be number 19.

This table of contents also appears in the front of the Audio Companion.

Volume / Track PowerPoint      slide numbers Subject
Disc 1 Introduction and Vista Overview
Track 1 1 Volume introduction
2 2-3 Vista Overview
3 4 Course Overview
4 5-7 Vista Versions
5 8-9 Hardware Requirements; Vista Anytime Upgrade
Disc 2 Deployment and Licensing
Track 1 none Volume introduction
2 10-14 Vista Deployment Overview
3 15-18 The Deployment Tools
4 19 Building a Simple Windows PE Disk
5 20-22 Windows Image (.WIM) Files
6 23-24 ImageX:  the Tool for Working With WIM Files
7 25-28 Mounting and Modifying WIMs with ImageX, Building a More Complete WinPE
8 29-32 Finishing the More Complete WinPE; Adding NIC drivers
9 33-35 Capturing and Applying Windows Images with ImageX and WinPE, Sysprep
10 36-40 Using Windows System Image Manager, Vista's Script Writer
11 41-42 Windows Deployment Services; Vista Licensing
Disc 3  Vista GUI and File Storage
Track 1 none Volume introduction
2 43-45 Aero Basic UI
3 46-47 Aero Glass UI and Hardware Requirements
4 48-52 UI Benefits and Disadvantages
5 53-56 Vista Storage - Search Folders and Tags
6 57-63 Vista Storage - Stacks, Windows Search
7 64-69 Protecting Your Data - Windows Backup and CompletePC
8 70-79 Restoring CompletePC Backups, Using "Previous Versions," Transactional NTFS & Registry
Disc 4  User Account Control
Track 1 none Volume introduction
2 80-83 Securing Vista: Overview, Review: Tokens and Privileges
3 84-87 UAC Overview
4 88-91 How UAC Splits Tokens
5 92-97 Controlling the Consent UI With Group Policies
6 98-102 Controlling Secure Desktop with Group Policies; Supporting Non-Standard Input Devices
7 103-104 How UAC Chooses Standard vs Admin Tokens
8 105-110 Controlling How UAC Elevates I
9 111-120 Controlling How UAC Elevates II:  Creating, Using, and Embedding Manifests
10 121-127 Installing Manifests; Turning Off UAC; Using Group Policies to Increase UAC Security
Disc 5 File and Registry Virtualization
Track 1 none Volume introduction
2 128-132 Overview of Folder and Registry Virtualization; Why Many Legacy Apps Fail on Vista and How to Fix Them
3 133-139 Folder and Registry Virtualization Examples; When to Use or Not Use Virtualization
4 140-145 Folder and Registry Virtualization Examples; Enabling and Disabling Virtualization; Logging Virtualization
Disc 6 Windows Integrity Control (WIC)
Track 1 none Volume introduction
2 146-148 WIC Fundamentals
3 149-150 Discretionary vs Mandatory Access Models
4 151-154 Discretionary/Mandatory Model Terminology; Is Windows Discretionary or Mandatory?
5 155-160 Windows Integrity Levels (ILs); How Objects Store Integrity Levels; Integrity Policy Types
6 161-165 How Objects Store ILs; Viewing ILs
7 166-171 Changing and Raising Integrity Levels
8 172-174 Setting Integrity Levels to "System"; Deleting Files; How Windows Stores User Integrity Levels
9 175-181 User Integrity Levels; Process Integrity Levels; Rules for Storing Integrity Levels; Viewing Process ILs
10 182-184 How Windows Uses or Doesn't Use Integrity Levels; How You Can Use Integrity Levels
11 185-188 "WIC Lite:" How Vista Keeps Admins From Deleting System Files
Disc 7 Device Installation Restrictions and BitLocker
Track 1 none Volume introduction
2 189-194 Blocking particular types of devices from installing with group policies
3 195-199 Step-by-step instructions on device restrictions
4 200-201 BitLocker introduction
5 202-203 BitLocker Details:  Why It's Secure
6 204-205 Using BitLocker Without TPM; Can I Recover From Failures?
7 206-210 BitLocker Setup Considerations
8 211-214 BitLocker Setup Considerations cont.; BitLocker Setup on an Upgraded PC; BitLocker Step-By-Steps With USB
9 215-223 Using the BitLocker Setup From Control Panel; BitLocker and USB Devices
10 224-231 Going Beyond the GUI: BitLocker Command Line Secrets; Installing BitLocker on Non-Boot Drives
11 232-237 Decrypting BitLocker Drives; Increasing and Decreasing Crypto; BitLocker Uses and Warnngs; BitLocker Recovery; BitLocker and AD
Disc 8 Windows Services, Security Defaults, and Firewall
Track 1 none Volume introduction
2 238-240 Vista Services - Review of How Services Affect Security and How We Manage Their Security Risks
3 241-245 Eliminated Services; Review of How Services Get Permissions and Privileges; How SVCHOST.EXE Works For Services; Vista Services Move to Session 0
4 246-249 Minimizing Service Privileges; Warnings About Minimizing Privileges
5 250-255 Overriding Services' Built-in Lists; using sc.exe to see service lists
6 256-260 Service Isolation; Reducing and Granting Service Permissions
7 261-267 Reducing and Granting Service Permissions cont.; Controlling Service Restarts; New "Delayed Auto-Start" Services
8 268-272 Security Default Changes (Power Users, Administrator disabled, Reduced Anonymous Access)
9 273-274 Security Default Changes cont.; Cryptographic Changes
10 275-281 Windows Firewall
Disc 9 Vista Networking, IE 7, and x64 Compatibility Issues
Track 1 none Volume introduction
2 282-285 Finding Where Vista Hide the NIC Properties
3 286-288 Modifying HOSTS; TCP Gets Faster
4 289-292 IP version 6
5 293-301 Windows Meeting Space - Setup, Use and Troubleshooting
6 302-304 Remote Desktop Changes
7 305-307 Internet Explorer 7.0 and Vista
8 308-309 Internet Explorer 7.0 - Security and Anti-Phishing
9 310-311 Administering Vista; Operating Systems and APIs
10 312-314 "Hooking the Kernel"; Rootkit Issues; Vista's PatchGuard Slows Down RootKits... But Kills Some Legitimate Apps
11 315-316 Vista Compatibility Issues - Drivers and Broken Server Apps
Disc 10  Windows Event Viewer
Track 1 none Volume introduction
2 317-318 Windows Event Monitor - What's New
3 319-325 Dissecting Events; The New Event Viewer UI; Centralizing Event Viewer Logs
4 326-332 Centralizing Event Viewer Logs cont.; Using WinRM
5 333-335 WinRM/Event Collection Troubleshooting
6 336-338 WinRM/Event Collection in a Workgroup; Event Triggers
Disc 11  Scheduler, Group Policies, BCDedit, and Performance
Track 1 none Volume introduction
2 339-347 Vista Task Scheduler
3 348-351 Group Policy Changes
4 352-355 Group Policy Changes cont.
5 356-358 Pre-Vista Group Policies and Sysvol; adm Files change to admx
6 359-363 Creating the Group Policy Central Store; Central Print Administration; Virtual Licensing; BOOT.INI replaced by BCD
7 364-368 BCD - The New Boot Database; Using BCDedit; changing boot options
8 369-372 BCD Option Entries
9 373-381 Stabilizing and Speeding Vista; Reliability Monitor; Superfetch; Ready Boost
10 382 Closing Comments