Use Your Software Assurance Training Vouchers Before They Expire, Forever

Author Archive for Della Wyler

Use Your Software Assurance Training Vouchers Before They Expire, Forever

Don’t Let Your Software Assurance Training Vouchers (SATVs) Go Unused

Has your organization purchased a Microsoft Software Volume Licensing agreement? If so, you may be eligible to redeem Microsoft Software Assurance Training Vouchers (SATVs) and get free training for select Microsoft courses. 

Remember: SATVs can only be redeemed for Microsoft Official Courseware (MOC) with an authorized Microsoft Partner like TechSherpas 365. If your organization doesn’t redeem its SATVs, you could be leaving free training dollars on the table!

Microsoft has announced plans to change, and eventually retire, Software Assurance Training Voucher (SATV) benefits. More information, including the expiration timetable, can be found in our blog article “Microsoft Software Assurance Training Voucher (SATV) – Update“.


How Do I Know if My Company Has Microsoft SATVs?

  • Locate your Microsoft Licensing Agreement (Your IT Director or Purchasing department usually has the Licensing Agreement.)
  • Identify the Benefits Administrator (BA) named in the Licensing Agreement (The BA is the individual in your company that has the right to access SATV information.)
  • Log into com/Licensing/ServiceCenterto access your company’s SATV information, such as # of available SATVs, Expiration Date, # of Used SATVs, # of remaining SATVs

How Does My Company Redeem SATVs?

  • Identify the employee that will utilize the SATVs and the number of training days included in the desired class
  • Activate the SATVs by assigning the appropriate number of SATVs (one for each day of training) to the student
  • Submit the student’s name and email address, along with the number of vouchers required, on the SATV website
  • The student will receive an automated email from Microsoft containing an 8-digit code

How Does My Company Use SATVs to Purchase Training?

  • Contact TechSherpas 365, an authorized Microsoft Learning Partner, and register for an SATV authorized Microsoft course
  • Forward the email with the 8-digit code to your Account Representative at TechSherpas 365
  • TechSherpas 365 will then redeem the SATV with Microsoft

What Kind of Training Can Be Redeemed with SATVs?

  • Courses can be delivered online, in the classroom, on-demand, and even on site
  • Choose from technical training in Azure, SQL Server, SharePoint, Windows 10, Windows Server, and more

Do SATVs Expire?

  • Yes, SATVs expire 180 days after they are created
  • Training Vouchers must be requested before your Software Assurance expires and used within 180 days of being requested


Redeem your SATVs today, and maximize the ROI on your Microsoft technologies investment.

The Phasing out of Microsoft SATV Benefits

Microsoft Software Assurance Training Voucher (SATV) – Update

Microsoft is updating Software Assurance benefits beginning in February 2020 to ensure Software Assurance stays relevant and useful to customers. With this change in direction, some Software Assurance benefits will be retired or changed to eliminate redundancies and better align Software Assurance benefits across Microsoft’s products and services portfolio. The changes made also simplify benefit redemptions and replace outdated implementation mechanisms. While each customer experience is unique, all customers can benefit from the ability to optimize their business performance through Software Assurance.

Microsoft is investing in new ways to help organizations deploy, train, and get support for the products and services they buy. Because those new ways overlap with some dated and underused Software Assurance benefits, and the redemption process for some benefits are cumbersome and outdated, Microsoft is retiring those overlapping and outdated benefits.

When are the SATV Changes Taking Place?

The changes will start in February 2020 and will gradually be implemented by January 1, 2022.

February 1, 2020:

  • Training vouchers can no longer be converted to planning services days.
  • Azure courses will be removed from training voucher redemption. Courses must be complete by this date in order to utilize SATVs.

February 1, 2021:

  • Retire accrual of new training vouchers.
  • New contracts after this date won’t have any training vouchers assigned and existing contracts won’t receive any additional training vouchers.

January 1, 2022:

  • Last day to redeem training vouchers for existing contracts.

Will the Changes Apply to All Active Software Assurance Contracts as of February 2020?

Beginning February 1, 2020, the changes apply to all contracts regardless of status—midterm, new, and renewal. There is still time to use the benefits already accrued, customers will still accrue deployment planning days, training days, and support incidents until February 2021. Deployment planning days and training vouchers can be used until January 2022.

How Long Do Customers Have to Use Their Existing Vouchers?

Customers can continue to redeem any accrued training days as vouchers until January 1, 2022. Azure content will be removed from the voucher course list beginning February 1, 2020.

Where Do Customers Go for Help with Their Training Benefit?

Azure Customers: Contact us today to assist with redeeming your existing Azure training vouchers before they are no longer available for redemption in February 2020. If your business or organization has identified an Azure project that is soon to kick off, please contact us today to talk about our Azure training solutions.

Non-Azure Microsoft Customers: Training vouchers will expire in January 2022, but don’t wait to schedule training. Contact us today to discuss a plan to redeem your vouchers before they expire.

Terrifying Cyber Crime Statistics

#1 | 780,000 records were lost per day in 2017

According to McAfee’s Economic Impact of Cyber Crime (February 2018) cyber criminals adapt at a fast pace. The scale of malicious activity across the internet is quite astounding. The figures are frightening on a monthly or yearly scale, let alone daily! Cyber criminals are constantly finding new technologies to target victims. With the introduction of Bitcoin, payment and transfers to/from cyber criminals is untraceable.

McAfee reports that one of the major internet service providers (ISP) sees 80 billion malicious scans a day

#2 | Over 24,000 malicious mobile apps are blocked daily

Symantec’s Internet Security Threat Report details that lifestyle apps are the main targets. The majority of these apps leak phone numbers. Further sensitive information like device location is also being made accessible. It would be completely impossible to monitor or check each of these apps for vulnerability issues. It’s essentially an open ticket for cyber criminals to do their worst.

In the first quarter of 2018, Google Play had over 3.8 million apps on their store.

#3 | Microsoft Office file formats are the most used file extensions

In the top 10 most malicious file extensions, Microsoft Office took the number 1 spot. Emails are a common way for cyber criminals to attack their victims. Emails are used on a daily basis around the world. If you see an email containing a .doc or .xls file extension, most users would relate it to Microsoft. Microsoft being a reputable company means people are more likely to open an attachment.

According to Cisco’s 2018 Annual Cybersecurity Report, 38% were Office formats

#4 | The U.S., U.K., & China are more vulnerable to Smart Home attacks

The majority of smart home devices are connected via an external network. If the router you’re using doesn’t have decent security protection, you could be opening up your home to a cyber attack. With smart home devices becoming more prevalent, criminals are finding new ways to exploit vulnerabilities.

According to Trend Micro, The U.S., accounted for 28% of smart home device incidents. The U.K. and China followed with 7% each

#5 | 21% of files aren’t protected

Varonis’s 2018 Global Data Risk Report is quite terrifying. 6.2 billion files were analysed. These files contained credit card information, health records, etc. 21% of these files were open for global access. Furthermore, 41% of companies have more than 1000 sensitive files open to everyone.

#6 | Healthcare industry ransomware attacks will quadruple

By 2020, CSO Online predicts ransomware attacks will be quadruple. The healthcare industry gets attacked more than most industries. Thankfully not all attacks will be successful. Healthcare industries should not give into demands and ensure their data is safe and backed up. Phishing emails are particularly common and often where cyber attacks originate from.

#7 | Cyber Crime to cost $6 trillion by 2021

In the 2017 Official Annual Cybercrime Report, it’s estimated that cyber crime will cost $6 trillion annually by 2021. In 2015, that figure was $3 trillion.

Cyber crime is now becoming more profitable than the global trade of illegal drugs!

#8 | 30% of phishing emails in the U.S. are opened

That’s almost one-third of all emails, according to Verizon’s 2018 Data Breach Investigations Report. Phishing emails no longer take the same approach they used to. Do you remember seeing an email from your bank, Apple, PayPal etc. asking for sensitive information? With the figures that high, it’s no wonder cyber criminals are preying on email victims.

So many of us receive these emails each day and 12% are clicking on the links/attachments contained within them

#9 | 58% of U.K. businesses sought cyber security advice

The Cyber Security Breaches Survey 2017 shows U.K. businesses are more aware of cyber issues. However, it also shows that a large percentage of businesses aren’t seeking any advice or potentially protecting themselves from threats.

79% of medium firms sought advice whereas only 50% of micro firms did

#10 | 300 billion passwords worldwide by 2020

It may seem like passwords are dying, due to encryption etc. but according to Cyber Security Media, they’re not. It’s predicted that 300 billion passwords will be used by 2020. That takes into account humans and machines! That’s an awful lot of passwords, all of which require cybersecurity protection. If not, that’s 300 billion potential threats, worldwide.

#11 | French president Emmanuel Macron emails hacked

Yes, even a president can get hacked! In 2017 Emmanuel Macron’s emails were hacked. His emails were posted online just days before he was due to go head to head against his opponent. 9GB worth of data was posted to Pastebin. Macron’s campaign confirmed it had been hacked.

#12 | More than 60% of fraud originates from mobile devices

The world has gone mobile, and so have fraudsters. 60% of fraud comes from mobile devices; of that figure, 80% comes from mobile apps. Once a cyber criminal has access to your mobile, it can access your mobile banking app and initiate multiple levels of cyber crime. Fraudulent transactions are now over double the value of real transactions.

#13 | 2.53 million fall victim to cyber crime in UAE

In 2016, Norton by Symantec reported over 2.5 million people were victims of cyber crime in UAE. Despite reports stating that awareness of cyber crime was high, people are still engaging in online behaviour that is deemed as risky. People know they should be aware of links and protect their information. 70% of those people still click on information that they aren’t 100% sure of. Millennial’s seem to be the most affected group of people.

53% of millennial’s experienced cyber crime in the last year

#14 | Netherlands have the lowest cyber crime rate

In 2015, Symantec reported the Netherlands as having the lowest cyber crime rate. Only 14% of the population were affected. Although 14% is still high, compared to other countries, it wasn’t! Indonesia, for example, was subject to the highest cyber crime rate in the world.

59% of the population fell victim to cyber crime

#15 | Personal data sells for as little as $0.20

Have you ever thought how much your personal data is worth to you? Well, to some, it could sell for as little as $0.20, up to $15. Credit card information and account information can be accessed and purchased much more easily than you might think. The value of information is dependent on the type of details included. For example, credit card details are more valuable than other information. As well as this, it’s also dependent on how easy it would be to resell the information. If it’s too difficult, the value of personal data decreases.

#16 | Japanese exchange lost $530 million due to hacking

Coincheck is one of the biggest Bitcoin and cryptocurrency exchanges in Asia. In January 2018 it reported that it had lost $530 million due to hacking. Due to the incident, Coincheck seized and stopped all sales and withdrawals of it’s cryptocurrency at the time. The cryptocurrency used for the exchange was called NEM. Coincheck deal with other cryptocurrencies too.

#17 | In 2016, Adware affected 75% of organisations

Cisco investigated 130 organisations in it’s Cisco 2017 Annual Cybersecurity Report. It found that 75% of companies were affected by adware. Adware in itself is a nuisance, but it can also facilitate further malware or virus attacks. Adware presents itself in the form of advertisements. Whether you’re using your device on or off the internet, adverts can be displayed. Often if you’re trying to perform an internet search, the results direct you to other websites or marketing pop-ups to obtain your personal data.

#18 | Average ransomware demand is $1,077

Although not every ransomware demand is paid, the average demand value is $1,077. Since the last report, this shows an increase of around 266%! When victims are faced with a ransom amount, they often pay up. We rely on the internet for daily activities, for personal and work. We rely on the internet to connect our devices, and even our homes with the introduction of smart home products.

Demands are significantly increasing because we’re so reliant on the internet. As ransomware attacks increase, we can expect the demand values to increase as well

#19 | China have the most malware in the world

Over 55% of China’s computers are infected with malware. Since 2014, that figure increased by nearly 30% more! Even with people being more and more aware about cyber crime, it’s clear to see it doesn’t stop attackers. Taiwan follow closely with 49% of their computers being infected. Of all the malware across the world, Trojans were the cause of the most infection. Trojan’s are malicious programs that provide a back-door kind of entry to computers.

Once hacked, attackers can access personal information, passwords, and infect other devices connected to the same network

#20 | 90% of hackers use encryption

Encryption is a process which involves encoding a message, information, or program. Encryption allows only authorised people to access it. For example, a document that may be readable in normal circumstances would appear completely illegible when encrypted. In order to access encrypted information, it must be decoded first. Hackers are of course aware of how best to hide their tracks. 90% of them use encrypted traffic to disguise what they’re doing. If we, as users, used encryption to the same level, it would be much more difficult for cyber crime to take place.

#21 | Companies take over 6 months to notice a data breach

For me, this is one of the most terrifying statistics. Research suggests that most businesses take up to 197 days to notice breach of their data. ZDNet reports finance firms can take an average of 98 days! Due to the amount of time it takes for companies to realise a data breach, attackers are able to obtain even more information. Think about it, imagine what a cyber criminal can obtain over a 6 month period. Certain industries are of course more vulnerable to attacks, due to the data they hold.

83% of finance companies incur over 50 attacks per month. Once data has been stolen, it gets sold on the black market


Source: Original report can be found on VPN Geeks.

Explore the TechSherpas Store

At TechSherpas , we provide essential training for those in the tech industry.  Our valuable training can bring you to the next level in your career! IT training in Atlanta isn’t always enough, however. In order to advance in your career, you need the right training and the right tools to make it happen. That’s why we also provide valuable products in our online store to help you get to the top. Here are just some of the available and valuable items that we offer.

TechSherpas Offers Even More Than IT Training in Atlanta

Computer Systems and Displays

Of course, we offer a wide variety of computer systems.  From barebone notebooks and systems to Blade servers to desktop computers, we are a one stop resource for all types of computer systems.  If you’re looking for notebooks, tablets, or workstations, you can find these in our store.  Whether you are building, repairing, or looking for a full system, TechSherpas is the place to find what you need.  

We also have computer displays, from monitors to electronic writing boards.


Our online store carries a variety of elements for your AIDC/POS systems.  We have barcode readers and verifiers, POS kiosks, check readers, keyboards, cash registers and pole displays, among other items.  We even have bundles and solutions to get you started.

Network & Communications

In our industry, it’s important to be connected.  We have a number of network and communications elements and devices.  

Consumer Electronics

We’re not all about tech professionals!  We have a large inventory of consumer electronics.  Whether you’re looking for a clock radio or a complete gaming system, we have you covered.

Multimedia Devices

Looking for graphic or sound cards?  Video modules?  Yup, it’s in our store!

Everything Else

This is only a small sampling of what we have on hand.  Basically, our goal is to have you covered for all of your technological needs.  We have such a wide variety of accessories, for computer systems, home theaters, gaming systems, and repairs.  We even have a large inventory of office supplies, so that the budding entrepreneur or massively successful businessperson can make one convenient stop to the TechSherpas store to get their needs, from wastebaskets to full computer systems.
Being a company that offers IT training in Altanta, we wouldn’t leave you without the latest in software.  Explore our software packages at the TechSherpas online store.


digital trends

Microsoft Windows Server 2016

Microsoft Windows Server 2016 became available to the public in October and is now being used by customers everywhere.  Our Tampa Microsoft training center is here to point out the new features with Windows Server 2016.

Tampa Microsoft Training Center Covers Windows Server 2016

Windows Server 2016 has a variety of new features that bring users into the next stage of Windows technology.  Some of these features include:

Active Directory Federation Services

Active Directory Federation Services provides access control and single sign on across a wide variety of applications.  In Windows Server 2016, AD FS enables three new options for sign on without passwords.  This will allow businesses and organizations to avoid the risk of stolen or phished passwords.  It will also allow you access without a password for compliant devices, making sign-in easier for users.

Storage Spaces Direct

This features allows you to build available and adaptable storage by using servers with local storage.  This means that industry standard servers with local storage can now be used in a way that will be easier, more adaptable, and will allow organizations to use storage devices that were not able to be used in the past.  

Nano Server

Nano Server has been updated to include a module for building Nano Server images.  Nano Server has a much smaller installation footprint that the graphical user interface installation.  If you are using the server, these updates make a convincing argument to using Nano.

  • There are less updates and reboots needed
  • It can be used across servers and physical sites
  • Nano hosts the most common Windows Server workloads
  • Nano is ideal for remote management


Microsoft and Docker development have worked together to bring you Docker-based containers.  This will allow you to isolate applications and services. The Windows Server Container is for workloads that are able to run on the same server without causing alarm.  This means they are low-trust.  Alternatively, the Hyper-V container is completely isolated.  This is for high-trust workloads.

Shielded VMs

Windows Server 2016 shielded VMs allow for better and more fine-tuned control over Hyper-V VM access.  You can even ensure that different Hyper-V admin groups can access only their designated VMs.  

Linux Secure Boot

Secure Boot is part of the Unified Extensible Firmware Interface specification.  This protects a server during startup against boot-time malware.  You can now enact Linux VMs under Windows Server 2016 Hyper-V without having to disable the Secure Boot feature, which is a brand new capability.


These are just some of the new and exciting features in Microsoft 2016 Server, according to our Tampa Microsoft training center.



What You Need to Know About Windows 10

If you are a Microsoft user, you know that many tech experts had issues with the format and technology of Windows 8.  As usual, Microsoft not only fixed the bugs, they came out with a bigger and better version.  The long anticipated Windows 10 has more features, is user friendly, and provides the latest in OS technology.  The new interface has many exciting things to unlock.  Here’s what our Microsoft official courseware instructors think you need to know about Windows 10.

Microsoft Official Courseware Providers Discuss Windows 10

The Return of the Start Menu

Windows 10 has brought back the very missed Start menu.  Now, you have the option between a higher tech version of the classic Start menu, and the Start screen that materialized in Windows 8.  You can customize your Start menu by pinning certain applications and programs to the Start menu.  You can add and remove items so that your Start menu gives you quick and customized access.

Multiple Desktops

You could always run a few apps at once on Microsoft.  You can run Word while running Google Chrome, and Excel.  Sometimes, though, this can get confusing.  Enter, the multiple desktop feature.  Now, you can use multiple desktops and flip between them with ease.  Tech professionals love and appreciate this addition, because it allows them to easily manage their workstation.

Fingerprint Locks

In the past, fingertip access was an external feature or built into your laptop.  Now, any touchscreen Windows 10 user can add extra security to their computer with fingerprint locks.  For tech professionals who handle sensitive and extensive material, this added level of security is a desirable feature.

Microsoft Edge

Say goodbye to Internet Explorer, and Hello to Microsoft Edge.  Internet explorer had multiple limitations that made it obsolete to industry professionals.  Now, Windows has developed Microsoft Edge, a newer, more updated browser with advanced features that bring it up to speed with other browsers of its kind.  It even allows extensions, one of the major missing components of IE.


If service is your favorite thing, Cortana is your own personal assistant.  This digital assistant feature enhances every aspect of Windows 10.  Among other capabilities, you can use Cortana to make requests, customization, and use voice command.

There is still much more to explore with Windows 10.  When you fully understand these basic new features, you will be on your way to mastering the operating system.  Windows 10 could be the ultimate platform of productivity.  Make sure you understand all that it can offer with our Microsoft official courseware programs.


Microsoft 10

Best Tech Positions in Today’s Job Market

Technical skills gained from IT Training Centers are essential to success in today’s job market. Tech jobs account for a large portion of the competitive job market, and are continuously on the rise.  Here are some of the best tech positions in today’s job market.

IT Training Centers Prepare You for These Top Tech Positions

Analytics Manager

Analytics Managers gather and analyze data.  They provide this data to business leaders to help them make business decisions.  The analytics manager can be essential to the operation of a company.  This job title covers a wide range of responsibilities.  Generally, a background in math and technical training are helpful if pursuing this career path.  The median salary is estimated to be slightly over $100,000.00, and it is a sought after position with many opportunities.

IT Manager

IT Managers can have excellent careers.  With a median base salary of $120,000.00 in today’s market, and IT Manager has unlimited possibilities.  This position is constantly on the market, making it a secure and employable industry.  IT Managers are responsible for a company’s technology.  They perform a number of tasks, including but not limited to upgrades, repairs, firewalls, and consultation.  They are essential for larger companies, giving them excellent job security.  It’s extremely important for an IT Manager to stay current, which is why we offer a wide variety of continued education for the IT professional.

Quality Assurance Manager

Quality Assurance Managers are rising in the tech industry.  While this job was formerly exclusive, it has now started to become an in-demand position.  QA managers help businesses stay on course.  They ensure that the business stays productive and profitable by implementing and monitoring programs that will maintain quality.  In the IT universe, QA managers work specifically with software and technology that will make the company or product successful and productive.  The median base salary for this position is $85,000 and rising, and definitely requires your certifications to be up to date on the latest software.

Software Development Manager

The more you become involved in the tech world, the more you will start to advance.  A Software Development Manager oversees the development of software from start to finish. They generally do very well, as they are responsible for creating and managing new, exciting advances in technology.

The opportunities available are endless when you take your IT training to the next level. If you create a basis in technology and stay current in your field with our IT training centers, there are thousands of great positions that will become available to you.


How to Train Remotely with Tech Sherpas

At TechSherpas , we are dedicated to giving you the best training possible while making sure that you are learning in a way that fits your lifestyle.  We offer remote learning opportunities so that you can advance your knowledge, career, and business with the necessary certifications.

Take Your Microsoft Training Courses Online

Virtual Live Training

Our virtual live training program is designed to offer the opportunity for a classroom setting to those who prefer or need to work remotely.  This experience  is like being in a classroom right at home.  Students attend a live, instructor-led class through their computer or connected device.  The class is pre-scheduled so that the instructor is right in front of you during the process.  This allows you to learn from your home, office, or other location.  Many students opt for this choice because it offers all of the benefits of attending a lecture at a traditional classroom.  You can communicate with your instructor live and follow along during the class.  You can even have the instructor get hands on, by showing you how to work through the exercises and taking over your computer.  

Virtual learning is an option that combines the benefit of human interaction and the convenience of learning remotely.  If you prefer a hands on approach to learning, but cannot travel to the classes, virtual learning may be for you.  

Microsoft On Demand Learning

If you would rather manage your own education, you may be looking for a more independent learning program. Thankfully, we are able to offer the tools to help you do so with one of our most popular programs.  

Microsoft is a leading technology company with constantly emerging and evolving software.  This is why Microsoft certifications are constantly in high demand, with professionals and employers.  Microsoft certifications make up some of our most sought out training opportunities. With our Microsoft partnership, we are able to offer on demand learning.  With this program, you can take your Microsoft training courses online.  Microsoft On Demand is training that is designed around your schedule, your budget, and your learning needs.  The program combines a number of different tools and resources that allow you to get the training you need.  Because these tools have been developed, you are able to set your own pace when it comes to building skills and obtaining your certification.  You can tackle the entire program at once, or spend a little time each day taking your Microsoft training courses online.  

Our remote programs allow you the flexibility you need when you have a busy schedule.  


Microsoft Certifications

Meet Microsoft Azure

When it comes to storage for your files and programs, you need the best for yourself and your clients.  Microsoft has taken it’s cloud computing platform to the next level with Microsoft Azure, released in 2010.  This is the ultimate sharing program, and is ideal for businesses or multiple users, as well as individuals with the need for privacy or mass storage.  It also happens to be one of the many Microsoft certifications we offer at TechSherpas 365 . 

Microsoft Certifications for Microsoft Azure

This platform is useful for any IT professional.  There are a number of tools and templates integrated within the system that make management of apps faster and user friendly.  You can manage your cloud infrastructure and storage with ease and efficiency.

Azure is known for its flexibility, supporting a vast selection of operating systems and programming languages.  You can use a wide variety of programs and integrate them with Azure.  By combining technologies that are already utilized by IT professionals everywhere, Azure has created a mass support system that is sought after at all levels.

Perhaps one of the most appealing and groundbreaking aspects of Microsoft Azure is its capability for ultimate security.  Many businesses and organizations store private client information that cannot be released at any cost.  This creates a hesitancy when it comes to storing data on a cloud, and forces business to undergo constant backups.  The storage equipment and space used to backup these businesses can be expensive and require constant upgrades, which also cause the business to incur charges.

With Microsoft Azure, you acquire a commitment to privacy.  Microsoft is the first major cloud provider to adopt the new international cloud privacy standard.  When you are certified in Microsoft Azure, you are able to provide your clients or company the ideal storage solution.  You have affordable space that provides high security, and the name Microsoft backing you up with assurance of your services and security standards.

You can offer your client flexible payment plans, since Microsoft Azure allows you to scale your payment plan to the services you need.  This also makes it a great tool for your own work, as you can grow your Microsoft Azure services while you grow in your industry and needs.  

At TechSherpas , we offer various levels of training and Microsoft certifications with Microsoft Azure.  We are a Gold Microsoft Learning Partner with an excellent reputation in IT training.   Our instructors have shown the highest level of competence and expertise with Microsoft technologies, and can help you take your career and your company to the next level of excellence.


Microsoft Azure

Learn all at once or five minutes at a time, anywhere, anytime with New MOC On-Demand

Now you can build Microsoft technical expertise while balancing the demands of your schedule. TechSherpas , your Microsoft Gold Learning Partner, is now offering Microsoft Official Courses On-Demand (MOC On-Demand).

What is MOC-On-Demand
MOC On-Demand combines high-quality video, reading, live hands-on labs and knowledge checks in a self-paced format to help you build skills on Microsoft technologies as your schedule allows—all at once or five minutes at a time. Once purchased, students will have 24/7 access to the course and labs for 90-days. The students will have access to the digital courseware indefinitely.

High-quality content, direct from the source. MOC On-Demand is brought to you by the people who write the software. The content is based on the same official courseware we use in our instructor-led training, and videos feature engaging experts hand-selected by Microsoft. It’s quality content!

Live hands-on labs. Unlike other on-demand offerings that offer simulated labs, MOC On-Demand gives you a live, real-time environment for hands-on training. In fact, it’s the same Microsoft hands-on Labs environment used in the classroom. The best way to learn is by doing, right?

Immediate feedback on mastery. MOC On-Demand’s modular course structure lets you control what order you follow while you learn at your own pace. You can concentrate on what you don’t know, or focus on what you need to know right now. Knowledge checks tell you whether you’ve mastered the content and are ready to move on, or you need to review the information further.

To get additional details and read the FAQ, click here

 MOC On-Demand Purchase Options

 As we launch this new product, we are offering two options at which you can purchase:

1)      Reduced price when bundled with our live instructor-led course

2)      Purchase MOC On-Demand course as a standalone product (digital courseware is included)

When purchased with the live class, it serves as a great supplement to the live instructor-led training. You still have the advantages of being in a live class with instructors who can answer questions and also assist with labs, but you now have the opportunity to go back and listen to an instructor anytime you need, over the next 90 days.

How to MOC On-Demand

Using MOC On-Demand is simple, and can be done anywhere there is an internet connection. You can view the training from any device, but labs will need to be completed on a desktop or laptop, not one of your handheld devices. Training begins in three simple steps:

1) Purchase Course – Purchase your course with TechSherpas

2) Redeem the code provided to you by TechSherpas – Within 24 hours of purchase, you will receive a Code, and link with instructions on how to redeem

3) Start learning On-Demand

MOC On-Demand Courses

There are currently four Microsoft On-Demand courses available for purchase:

  • 10747 – Administering System Center 2012 Configuration Manager
  • 10961 – Automating Administration with Windows PowerShell
  • 20483 – Programming in C#
  • 20341B: Core Solutions of Microsoft® Exchange Server 2013

Additional courses will be released in the coming months.

Coming February 11th:

  • 20331 – Core Solutions of Microsoft SharePoint Server 2013
  • 20410 – Installing and Configuring Windows Server
  • 20412 – Configuring Advanced Windows Server 2012 Services

Coming February 25th:

  • 20411 – Administering Windows Server 2012
  • 20413 – Designing and Implementing a Server Infrastructure
  • 10267 – Introduction to Web Development with Microsoft Visual Studio 2010

Coming March 3rd:

  • 20417 – Upgrading Your Skills to MCSA Windows Server 2012
  • 20697-1B: Installing & Configuring Windows 10
  • 20480 B – Programming in HTML5 with JavaScript and CSS3

MOC On-Demand puts you in control of your learning experience, and it’s only available through certified Microsoft Learning Partners, such as TechSherpas 365 . Click here to get started.