MCE Microsoft 365 Administrator Expert (w/ MCA Microsoft 365 Endpoint Administrator) ACCELERATED COMBO Training & Certification Boot Camp – 6 Days (2 Courses, 2 Exams, 2 Certs)
Training Schedule and Pricing
Our training model blends knowledge and certification prep into one solution. You can interact face-to-face with vendor-certified trainers at our training facilities or attend the same instructor-led live camp online.
-
Oct072024Delivery Format:CLASSROOM LIVEDate:10.07.2024 - 10.12.2024Location:SARASOTAPrice Includes:Instructor Led Class, Official Courseware, Labs and Exams$4,9956 days
-
Nov182024Delivery Format:CLASSROOM LIVEDate:11.18.2024 - 11.23.2024Location:DALLAS, TXPrice Includes:Instructor Led Class, Official Courseware, Labs and Exams$4,9956 days
-
Dec162024Delivery Format:CLASSROOM LIVEDate:12.16.2024 - 12.21.2024Location:SARASOTAPrice Includes:Instructor Led Class, Official Courseware, Labs and Exams$4,9956 days
What's Included
- 2 Microsoft Official Courses
- 2 Microsoft Test Vouchers
- 1 Retake Voucher (per exam, if needed)
- Microsoft Official Labs
- Onsite Pearson Vue Test Center
- Instructor Led Live Training
This Microsoft Official Boot Camp is an end-to-end training and certification program for Microsoft 365 Endpoint Administrator Associate and Microsoft 365 Administrator Expert. The MCE certification requires the MCA prerequisite. Certification Camps exclusively offers this 6 day Microsoft Official Accelerated Combo Boot Camp where students advance their skills and test to achieve certification while attending.
Student learn how to deploy, configure, protect, manage, monitor services, devices and client applications in a Microsoft 365 environment. They manage identity, security, access, policies, updates, and apps for endpoints. They implement and manage endpoints using Microsoft Intune, Windows 365, Windows Autopilot, Microsoft Defender for Endpoint, and Azure Active Directory (Azure AD), part of Microsoft Entra.
The Microsoft 365 Certified MCA/MCE combo boot camp is taught using TWO Microsoft Official Courseware Courses -
MD-102T00: Microsoft 365 Endpoint Administrator
MS-102T00: Microsoft 365 Administrator Essentials
While attending this 6 day camp - students take two exams MD-102 Endpoint Administrator and MS-102 Microsoft 365 Administrator to achieve the Microsoft MCA & MCE Official Certifications.
Topics Covered in this Official Boot Camp
Explore the Enterprise Desktop
Describe the benefits of Modern Management.
Explain the enterprise desktop life-cycle model.
Describe considerations for planning hardware strategies.
Describe considerations for post-deployment and retirement.
Examine the enterprise desktop life-cycle model
Examine planning and purchasing
Examine desktop deployment
Plan an application deployment
Plan for upgrades and retirement
Explore Windows Editions
Explain the differences between the different editions of Windows.
Select the most suitable Windows device for your needs.
Describe the minimum recommended hardware requirements for installing Windows 11
Examine Windows client editions and capabilities
Select client edition
Examine hardware requirements
Understand Microsoft Entra ID
Describe Microsoft Entra ID.
Compare Microsoft Entra ID to Active Directory Domain Services (AD DS).
Describe how Microsoft Entra ID is used as a directory for cloud apps.
Describe Microsoft Entra ID P1 and P2.
Describe Microsoft Entra Domain Services.
Examine Microsoft Entra ID
Compare Microsoft Entra ID and Active Directory Domain Services
Examine Microsoft Entra ID as a directory service for cloud apps
Compare Microsoft Entra ID P1 and P2 plans
Examine Microsoft Entra Domain Services
Manage Microsoft Entra identities
Describe RBAC and user roles in Microsoft Entra ID.
Create and manage users in Microsoft Entra ID.
Create and manage groups in Microsoft Entra ID.
Use Windows PowerShell cmdlets to manage Microsoft Entra ID.
Describe how you can synchronize objects from AD DS to Microsoft Entra ID.
Examine RBAC and user roles in Microsoft Entra ID
Create and manage users in Microsoft Entra ID
Create and manage groups in Microsoft Entra ID
Manage Microsoft Entra objects with Microsoft Graph PowerShell
Synchronize objects from AD DS to Microsoft Entra ID
Manage device authentication
Describe Microsoft Entra join.
Describe Microsoft Entra join prerequisites, limitations, and benefits.
Join device to Microsoft Entra ID.
Manage devices joined to Microsoft Entra ID.
Describe Microsoft Entra join
Examine Microsoft Entra join prerequisites limitations and benefits
Join devices to Microsoft Entra ID
Manage devices joined to Microsoft Entra ID
Enroll devices using Microsoft Configuration Manager
Describe Microsoft Endpoint Manager.
Understand the advantages of managing a client with Configuration Manager.
Deploy the Configuration Manager client.
Monitor the Configuration Manager client.
Manage Configuration Manager devices.
Deploy the Microsoft Configuration Manager client
Monitor the Microsoft Configuration Manager client
Manage the Microsoft Configuration Manager client
Enroll devices using Microsoft Intune
Prepare Microsoft Intune for device enrollment.
Configure Microsoft Intune for automatic enrollment.
Explain how to enroll Windows, Android, and iOS devices in Intune.
Explain when and how to use Intune Enrollment Manager.
Understand how to monitor and perform remote actions on enrolled devices.
Manage mobile devices with Intune
Enable mobile device management
Explain considerations for device enrollment
Manage corporate enrollment policy
Enroll Windows devices in Intune
Enroll Android devices in Intune
Enroll iOS devices in Intune
Explore device enrollment manager
Monitor device enrollment
Manage devices remotely
Execute, oversee, maintain device profiles
Describe the various types of device profiles in Intune.
Explain the difference between built-in and custom profiles.
Create and manage profiles.
Explore Intune device profiles
Create device profiles
Create a custom device profile
Monitor device profiles in Intune
Manage device sync in Intune
Manage devices in Intune using scripts
Examine user profile
Explore user profile types
Examine options for minimizing user profile size
Deploy and configure folder redirection
Sync user state with Enterprise State Roaming
Configure Enterprise State Roaming in Azure
Execute mobile application management
Explain Mobile Application Management.
Understand application considerations in MAM.
Explain how to use Configuration Manager for MAM.
Use Intune for MAM.
Implement and manage MAM policies.
Examine mobile application management
Examine considerations for mobile application management
Prepare line-of-business apps for app protection policies
Implement mobile application management policies in Intune
Manage mobile application management policies in Intune
Deploy and update applications
Explain how to deploy applications using Intune and Configuration Manager.
Learn how to deploy applications using Group Policy.
Understand Microsoft Store Apps.
Learn how to deploy apps using Microsoft Store Apps.
Learn how to configure Microsoft Store Apps.
Deploy applications with Intune
Add apps to Intune
Manage Win32 apps with Intune
Deploy applications with Configuration Manager
Deploying applications with Group Policy
Assign and publish software
Explore Microsoft Store for Business
Implement Microsoft Store Apps
Update Microsoft Store Apps with Intune
Assign apps to company employees
Administer endpoint applications
Explain how to manage apps in Intune.
Understand how to manage apps on nonenrolled devices.
Understand how to deploy Microsoft 365 Apps using Intune.
Learn how to configure and manage IE mode in Microsoft Edge.
Learn about app inventory options in Intune.
Manage apps with Intune
Manage Apps on non-enrolled devices
Deploy Microsoft 365 Apps with Intune
Additional Microsoft 365 Apps Deployment Tools
Configure Microsoft Edge Internet Explorer mode
App Inventory Review
Protect identities in Microsoft Entra ID
Describe Windows Hello for Business
Describe Windows Hello deployment and management
Describe Microsoft Entra ID Protection
Describe and manage self-service password reset in Microsoft Entra ID
Describe and manage multi-factor authentication
Explore Windows Hello for Business
Deploy Windows Hello
Manage Windows Hello for Business
Explore Microsoft Entra ID Protection
Manage self-service password reset in Microsoft Entra ID
Implement multi-factor authentication
Enable organizational access
Describe how you can access corporate resources
Describe VPN types and configuration
Describe Always On VPN
Describe how to configure Always On VPN
Enable access to organization resources
Explore VPN types and configuration
Explore Always On VPN
Deploy Always On VPN
Implement device compliance
Describe device compliance policy
Deploy a device compliance policy
Describe conditional access
Create conditional access policies
Protect access to resources using Intune
Explore device compliance policy
Deploy a device compliance policy
Explore conditional access
Create conditional access policies
Generate inventory and compliance reports
Generate inventory reports and Compliance reports using Microsoft Intune
Report and monitor device compliance
Create custom reports using the Intune Data Warehouse
Use the Microsoft Graph API for building custom reports
Report enrolled devices inventory in Intune
Monitor and report device compliance
Build custom Intune inventory reports
Access Intune using Microsoft Graph API
Deploy device data protection
Describe Windows Information Protection
Plan for Windows Information Protection usage
Implement and use Windows Information Protection
Describe the Encrypting File System (EFS)
Describe BitLocker
Explore Windows Information Protection
Plan Windows Information Protection
Implement and use Windows Information Protection
Explore Encrypting File System in Windows client
Explore BitLocker
Manage Microsoft Defender for Endpoint, Windows Client & Cloud Apps
Describe Microsoft Defender for Endpoint.
Describe key capabilities of Microsoft Defender for Endpoint.
Describe Microsoft Defender Application Guard.
Describe Microsoft Defender Exploit Guard.
Describe Windows Defender System Guard.
Explore Microsoft Defender for Endpoint
Examine key capabilities of Microsoft Defender for Endpoint
Explore Windows Defender Application Control and Device Guard
Explore Microsoft Defender Application Guard
Examine Windows Defender Exploit Guard
Explore Windows Defender System Guard
Explore Windows Security Center
Explore Windows Defender Credential Guard
Manage Microsoft Defender Antivirus
Manage Windows Defender Firewall
Explore Windows Defender Firewall with Advanced Security
Explore Microsoft Defender for Cloud Apps
Planning Microsoft Defender for Cloud Apps
Implement Microsoft Defender for Cloud Apps
Assess deployment readiness
Describe the guidelines for an effective enterprise desktop deployment.
Explain how to assess the current environment.
Describe the tools that you can use to assess your current environment.
Describe the methods of identifying and mitigating application compatibility issues.
Explain considerations for planning a phased rollout.
Examine deployment guidelines
Explore readiness tools
Assess application compatibility
Explore tools for application compatibility mitigation
Prepare network and directory for deployment
Plan a pilot
Deploy using the Microsoft Deployment Toolkit, Configuration Manager & Windows Autopilot
Describe the fundamentals of using images in traditional deployment methods.
Describe the key benefits, limitations, and decisions when planning a deployment of – Windows using Microsoft Deployment Toolkit (MDT).
Describe how Configuration Manager builds upon MDT and how both can work in harmony.
Explain the different options and considerations when choosing the user interaction experience during deployment, and which methods and tools support these experiences.
Evaluate traditional deployment methods
Set up the Microsoft Deployment Toolkit for client deployment
Manage and deploy images using the Microsoft Deployment Toolkit
Explore client deployment using Configuration Manager
Examine deployment components of Configuration Manager
Manage client deployment using Configuration Manager
Plan in-place upgrades using Configuration Manager
Use Autopilot for modern deployment
Examine requirements for Windows Autopilot
Prepare device IDs for Autopilot
Implement device registration and out-of-the-box customization
Examine Autopilot scenarios
Troubleshoot Windows Autopilot
Implement dynamic deployment methods
Describe how Subscription Activation works.
Describe the benefits of Provisioning Packages.
Explain how Windows Configuration Designer creates Provisioning Packages.
Describe the benefits of using MDM enrollment with Microsoft Entra join.
Examine subscription activation
Deploy using provisioning packages
Use Windows Configuration Designer
Use Microsoft Entra join with automatic MDM enrollment
Plan a transition to modern endpoint management
Identify usage scenarios for Microsoft Entra join.
Identify workloads that you can transition to Intune.
Identify prerequisites for co-management.
Identify considerations for transitioning to modern management.
Plan a transition to modern management using existing technologies.
Plan a transition to modern management using Microsoft Intune.
Explore using co-management to transition to modern endpoint management
Examine prerequisites for co-management
Evaluate modern management considerations
Evaluate upgrades and migrations in modern transitioning
Migrate data when modern transitioning
Migrate workloads when modern transitioning
Manage Windows 365 & Azure Virtual Desktop
Describe the key features of Windows 365.
Describe the Windows 365 management experience.
Describe the Windows 365 security model.
Describe the Windows 365 deployment options.
Describe the Windows 365 licensing model.
Explore Windows 365
Configure Windows 365
Administer Windows 365
Describe the key features of Azure Virtual Desktop
Describe the Azure Virtual Desktop management experience
Describe the Azure Virtual Desktop security model
Describe the Azure Virtual Desktop deployment options
Examine Azure Virtual Desktop
Explore Azure Virtual Desktop
Configure Azure Virtual Desktop
Administer Azure Virtual Desktop
Configure your MIcrosoft 365 experience
Explore your Microsoft 365 cloud environment
Configure your Microsoft 365 organizational profile
Manage your tenant subscriptions in Microsoft 365
Integrate Microsoft 365 with customer engagement apps
Configure tenant-level sharing settings for SharePoint and OneDrive
Configure tenant-level settings for Microsoft Teams
Enable Unified Audit Logging in Microsoft 365
Complete your tenant configuration in Microsoft 365
Manage users, licenses, guests, and contacts in Microsoft 365
Determine the user identity model for your organization
Create user accounts in Microsoft 365
Manage user account settings in Microsoft 365
Manage user licenses in Microsoft 365
Recover deleted user accounts in Microsoft 365
Perform bulk user maintenance in Microsoft Entra ID
Create and manage guest users using B2B collaboration
Collaborate with guests in a SharePoint site
Create and manage contacts
Manage groups in Microsoft 365
Examine groups in Microsoft 365
Create and manage groups in Microsoft 365
Create dynamic groups using Microsoft Entra rule builder
Create a Microsoft 365 group naming policy
Create groups in Exchange Online and SharePoint Online
Add a custom domain in Microsoft 365
Plan a custom domain for your Microsoft 365 deployment
Plan the DNS zones for a custom domain
Plan the DNS record requirements for a custom domain
Create a custom domain in Microsoft 365
Configure client connectivity to Microsoft 365
Examine how automatic client configuration works
Explore the DNS records required for client configuration
Configure Outlook clients
Troubleshoot client connectivity
Configure administrative roles in Microsoft 365
Explore the Microsoft 365 permission model
Explore the Microsoft 365 admin roles
Assign admin roles to users in Microsoft 365
Delegate admin roles to partners
Manage permissions using administrative units in Microsoft Entra ID
Elevate privileges using Microsoft Entra Privileged Identity Management
Examine best practices when configuring administrative roles
Manage tenant health and services in Microsoft 365
Monitor the health of your Microsoft 365 services
Monitor tenant health using Microsoft 365 Adoption Score
Monitor tenant health using Microsoft 365 usage analytics
Implement Microsoft 365 Network Connectivity Assessments and Insights
Implement Microsoft 365 Backup (Preview)
Develop an incident response plan
Request assistance from Microsoft
Deploy Microsoft 365 Apps for enterprise
Explore Microsoft 365 Apps for enterprise functionality
Complete a self-service installation of Microsoft 365 Apps for enterprise
Deploy Microsoft 365 Apps for enterprise with Microsoft Configuration Manager
Deploy Microsoft 365 Apps for enterprise from the cloud
Deploy Microsoft 365 Apps for enterprise from a local source
Manage updates to Microsoft 365 Apps for enterpris
Explore the update channels for Microsoft 365 Apps for enterprise
Manage your cloud apps using the Microsoft 365 Apps admin center
Analyze your Microsoft 365 workplace data using Microsoft Viva Insights
Examine the analytical features of Microsoft Viva Insights
Explore Personal insights
Explore Team insights
Explore Organization insights
Explore Advanced insights
Explore identity synchronization
Examine identity models for Microsoft 365
Examine authentication options for the hybrid identity model
Explore directory synchronization
Prepare for identity synchronization to Microsoft 365
Plan your Microsoft Entra ID deployment
Prepare for directory synchronization
Choose your directory synchronization tool
Plan directory synchronization using Microsoft Entra Connect Sync
Plan for directory synchronization using Microsoft Entra Cloud Sync
1100 XP Implement directory synchronization tools
Configure Microsoft Entra Connect Sync prerequisites
Configure Microsoft Entra Connect Sync
Monitor synchronization services using Microsoft Entra Connect Health
Configure Microsoft Entra Cloud Sync prerequisites
Configure Microsoft Entra Cloud Sync
Manage synchronized identities
Manage users with directory synchronization
Manage groups with directory synchronization
Maintain directory synchronization using Microsoft Entra Connect Sync security groups
Configure object filters for directory synchronization
Explore Microsoft Identity Manager
Troubleshoot directory synchronization
Manage secure user access in Microsoft 365
Examine the identity and access tools used in Microsoft 365
Manage user passwords
Implement Conditional Access policies
Enable pass-through authentication
Implement multifactor authentication
Explore passwordless authentication options
Explore self-service password management
Implement Microsoft Entra Smart Lockout
Explore Security Defaults in Microsoft Entra ID
Investigate authentication issues using sign-in logs
Explore security solutions in Microsoft Defender XDR
Enhance Exchange Online Protection with Microsoft Defender for Office 365
Protect your organization’s identities using Microsoft Defender for Identity
Protect your enterprise network against advanced threats using Microsoft Defender for Endpoint
Protect against cyber attacks using Microsoft 365 Threat Intelligence
Provide insight into suspicious activity using Microsoft Defender for Cloud App Security
Review the security reports in Microsoft Defender XDR
Examine Microsoft Secure Score
Explore Microsoft Secure Score
Assess your security posture with Microsoft Secure Score
Improve your secure score
Track your Microsoft Secure Score history and meet your goals
Examine Privileged Identity Management in Microsoft Entra ID
Explore Privileged Identity Management in Microsoft Entra ID
Configure Privileged Identity Management
Audit Privileged Identity Management
Examine Microsoft Entra ID Protection
Explore Microsoft Entra ID Protection
Enable the default protection policies in Microsoft Entra ID Protection
Explore the vulnerabilities and risk events detected by Microsoft Entra ID Protection
Plan your identity investigation
Enhance your email protection using Microsoft Defender for Office 365
Climb the security ladder from EOP to Microsoft Defender for Office 365
Expand EOP protections by using Safe Attachments and Safe Links
Manage spoofed intelligence
Configure outbound spam filtering policies
Manage email access in Microsoft 365
Submit messages, URLs, files, and attachments to Microsoft for analysis
Manage Safe Attachments
Protect users from malicious attachments by using Safe Attachments
Create Safe Attachment policies using Microsoft Defender for Office 365
Create Safe Attachments policies using PowerShell
Modify an existing Safe Attachments policy
Create a transport rule to bypass a Safe Attachments policy
Examine the end-user experience with Safe Attachments
Manage Safe Links
Protect users from malicious URLs by using Safe Links
Create Safe Links policies using Microsoft 365 Defender
Create Safe Links policies using PowerShell
Modify an existing Safe Links policy
Create a transport rule to bypass a Safe Links policy
Examine the end-user experience with Safe Links
Explore threat intelligence in Microsoft Defender XDR
Explore Microsoft Intelligent Security Graph
Explore alert policies in Microsoft 365
Run automated investigations and responses
Explore threat hunting with Microsoft Threat Protection
Explore advanced threat hunting in Microsoft Defender XDR
Explore threat analytics in Microsoft 365
Identify threat issues using Microsoft Defender reports
Implement app protection by using Microsoft Defender for Cloud Apps
Explore Microsoft Defender Cloud Apps
Deploy Microsoft Defender for Cloud Apps
Configure file policies in Microsoft Defender for Cloud Apps
Manage and respond to alerts in Microsoft Defender for Cloud Apps
Configure Cloud Discovery in Microsoft Defender for Cloud Apps
Troubleshoot Cloud Discovery in Microsoft Defender for Cloud Apps
Implement endpoint protection by using Microsoft Defender for Endpoint
Explore Microsoft Defender for Endpoint
Configure Microsoft Defender for Endpoint in Microsoft Intune
Onboard devices in Microsoft Defender for Endpoint
Manage endpoint vulnerabilities with Microsoft Defender Vulnerability Management
Manage device discovery and vulnerability assessment
Reduce your threat and vulnerability exposure
Implement threat protection by using Microsoft Defender for Office 365
Explore the Microsoft Defender for Office 365 protection stack
Examine the security policies and rules used in Microsoft Defender for Office 365
Investigate security attacks by using Threat Explorer
Identify cybersecurity issues by using Threat Trackers
Prepare for attacks with Attack simulation training
Examine data governance solutions in Microsoft Purview
Explore data governance and compliance in Microsoft Purview9 min
Protect sensitive data with Microsoft Purview Information Protection7 min
Govern organizational data using Microsoft Purview Data Lifecycle Management
Minimize internal risks with Microsoft Purview Insider Risk Management
Explore Microsoft Purview eDiscovery solution
Explore data management practices in Microsoft 365
Explore archive mailboxes in Microsoft 365
Enable archive mailboxes in Microsoft 365
Restore deleted data in Exchange Online
Restore deleted data in SharePoint Online
Explore retention in Microsoft 365
Explore retention by using retention policies and retention labels
Compare capabilities in retention policies and retention labels
Define the scope of a retention policy
Examine the principles of retention
Implement retention using retention policies, retention labels, and eDiscovery holds
Restrict retention changes by using Preservation Lock
Explore compliance in Microsoft 365
Plan for security and compliance in Microsoft 365
Plan your beginning compliance tasks in Microsoft Purview
Manage your compliance requirements with Compliance Manager
Examine the Compliance Manager dashboard
Analyze the Microsoft Compliance score
Implement Microsoft Purview Insider Risk Management
Explore insider risk management
Plan for insider risk management
Explore insider risk management policies
Create insider risk management policies
Investigate insider risk management activities and alerts
Explore insider risk management cases
Implement Microsoft Purview Information Barriers
Explore Microsoft Purview Information Barriers
Configure information barriers in Microsoft Purview
Examine information barriers in Microsoft Teams
Examine information barriers in OneDrive
Examine information barriers in SharePoint
Explore Microsoft Purview Data Loss Prevention
Examine data loss prevention for workloads
Examine DLP policies
Explore Endpoint data loss prevention
Explore adaptive protection in Microsoft Purview
View DLP policy results
Implement Microsoft Purview Data Loss Prevention
Plan to implement Microsoft Purview Data Loss Protection
Implement Microsoft Purview’s default DLP policies
Design a custom DLP policy
Create a custom DLP policy from a template
Configure email notifications for DLP policies
Configure policy tips for DLP policies
Implement data classification of sensitive information
Explore data classification
Implement data classification in Microsoft 365
Explore trainable classifiers
Create and retrain a trainable classified
View sensitive data using Content explorer and Activity explorer
Detect sensitive information documents using Document Fingerprinting
Explore sensitivity labels
Manage data protection using sensitivity labels
Explore what sensitivity labels can do
Determine a sensitivity label’s scope
Apply sensitivity labels automatically
Explore sensitivity label policies
Implement sensitivity labels
Plan your deployment strategy for sensitivity labels
Enable sensitivity labels for files in SharePoint and OneDrive
Examine the requirements to create a sensitivity label
Create sensitivity labels
Publish sensitivity labels
Remove and delete sensitivity labels
Certification Camps training is not the typical PowerPoint & Lecture presentation training center.
Certification Camps has developed a comprehensive training / delivery format which focuses on learning beyond the core content accessible to any Microsoft training provider. Our program incorporates interactive demonstrations with explanations which go beyond the content of the book. Additional content, videos, labs & demonstrations are provided to expand on advanced topics - providing additional insight and perspective.
As a Microsoft Certified Solutions Partner - we adhere to the strict guidelines, standards and requirements to use Microsoft's exclusive curriculum. More over - our standards go beyond the "minimum requirements" set forth by Microsoft Learning.
We leverage our partnership benefits of courseware customization to build end to end technology training solutions. Students gain practical skills which can be implemented immediately.
With many training centers - learning starts on the first day of class and ends on the last day. Our boot camp training program is designed to offer resources before, during and after the training event.
CERTIFICATION CAMPS FACILITIES
CAMPUS - Certification Camps built out a stand alone training center (not a hotel conference room) with spacious classrooms, new desk, Herman Miller Aeron chairs & comfortable common areas. Each student has a dedicated desk with two monitors. Each classroom has a maximum of two rows - so everyone is able to be engaged without the "back row" feeling.
CLASSROOM EQUIPMENT - Students work on a dedicated Dell Client Desktop with 32GB memory with 512GB SSD drives - All Labs are executed the extremely fast Microsoft Data Center Hosted Lab Environment .
CAMPUS INTERNET - The campus is connected with a 1Gbps (1,000 Mbps) Verizon Fios Business Connection which provides complete internet (including VPN) access for students.
COMMON AREA - Amenties including snacks, drinks (Coffee, 100% juices, sodas, etc) all complimentary.
LODGING - We use the Hyatt Place Lakewood Ranch. This "upgraded" hotel offers extremely comfortable beds, great breakfast and very fast internet access.
NEAR BY - Many shops, restaurants and grocery options are available within walking distance. Additionally - the hotel provided scheduled shuttle services. Restaurants like Cheesecake Factory, California Pizza Kitchen, Panera Bread, Bone Fish Grill, Ruby Tuesday's, Five Guys, Chipotle, Chili's and over 20 additional choices in the immediate area.