Description
Duration: 5 days
This five-day course teaches IT Professionals how they can enhance the security of the IT infrastructure that they administer. The beginning of this course emphasizes the importance of reacting as though Network breaches have already occurred and then shows you how to protect administrative credentials and right to ensure that the administrators can only perform the tasks that are needed when they are needed.
Details of this course are:
How to mitigate malware threats
How to use auditing and the Advanced Threat Analysis feature of Windows Server 2016 to identify security issues
How to secure a virtualization platform
How to use new deployment options (Nano server and containers) to enhance security.
How to help protect access to files using encryption and dynamic access control
How to enhance your network’s security.
******Note: Those who are considering earning a certification in Securing Windows Server will also benefit from this course. *****
Once you completed this course, you will be able to:
Secure Windows Server
Secure application development and a server workload infrastructure
Manage security baselines
Configure and manage JIT administration
Manage data security
Secure your virtualization infrastructure
Manage malware and threats
Configure advanced auditing
Manage software updates
Manage threats by using Advanced Threat Analytics (ATA and Microsoft Operations Management Suite (OMS)
Prerequisites
It is recommended that IT Professionals interested in taking this course have:
Complete courses in or have the equivalent knowledge of 740, 741, and 742
Solid and practical understanding of Active Directory Domain Services (AD DS) Principles
Solid and practical understanding of Microsoft Hyper-V Virtualization fundamentals
Understanding of Windows Server security principles
What’s included?
- Authorized Courseware
- Intensive Hands on Skills Development with an Experienced Subject Matter Expert
- Hands-on practice on real Servers and extended lab support 1.800.482.3172
- Examination Vouchers & Onsite Certification Testing- (excluding Adobe and PMP Boot Camps)
- Academy Code of Honor: Test Pass Guarantee
- Optional: Package for Hotel Accommodations, Lunch and Transportation
With several convenient training delivery methods offered, The Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Academy for an engaging and effective learning experience.
Methods
- Instructor Led (the best training format we offer)
- Live Online Classroom – Online Instructor Led
- Self-Paced Video
Speak to an Admissions Representative for complete details
Start | Finish | Public Price | Public Enroll | Private Price | Private Enroll |
---|---|---|---|---|---|
9/23/2024 | 9/27/2024 | ||||
10/14/2024 | 10/18/2024 | ||||
11/4/2024 | 11/8/2024 | ||||
11/25/2024 | 11/29/2024 | ||||
12/16/2024 | 12/20/2024 | ||||
1/6/2025 | 1/10/2025 | ||||
1/27/2025 | 1/31/2025 | ||||
2/17/2025 | 2/21/2025 | ||||
3/10/2025 | 3/14/2025 | ||||
3/31/2025 | 4/4/2025 | ||||
4/21/2025 | 4/25/2025 | ||||
5/12/2025 | 5/16/2025 | ||||
6/2/2025 | 6/6/2025 | ||||
6/23/2025 | 6/27/2025 | ||||
7/14/2025 | 7/18/2025 | ||||
8/4/2025 | 8/8/2025 | ||||
8/25/2025 | 8/29/2025 | ||||
9/15/2025 | 9/19/2025 | ||||
10/6/2025 | 10/10/2025 | ||||
10/27/2025 | 10/31/2025 | ||||
11/17/2025 | 11/21/2025 | ||||
12/8/2025 | 12/12/2025 | ||||
12/29/2025 | 1/2/2026 |
Curriculum
Module 1: Breach detection and using the Sysinternals tools
Lessons
Overview of breach detection
Using the Sysinternals tools to detect breaches
Lab: Basic breach detection and incident response strategies
Identifying attack types
Using incident-response strategies
Exploring the Sysinternals tools
Module 2: Protecting credentials and privileged access
Lessons
Understanding user rights
Computer and service accounts
Protecting credentials
Understanding privileged-access workstations and jump servers
Deploying a local administrator-password solution
Lab: User rights, security options, and group-managed service accounts
Configuring security options
Configuring restricted groups
Delegating privileges
Creating and managing group managed service accounts (MSAs)
Configuring the Credential Guard feature
Locating problematic accounts
Lab: Configuring and deploying LAPs
Installing a local administrator password solution (LAPs)
Configuring LAPs
Deploying LAPs
Module 3: Limiting administrator rights with Just Enough Administration
Lessons
Understanding JEA
Configuring and deploying JEA
Lab: Limiting administrator privileges by using JEA
Creating a role-capability file
Creating a session-configuration file
Creating a JEA endpoint
Connecting to a JEA endpoint
Deploying JEA by using Desire State Configuration (DSC)
Module 4: Privileged Access Management and administrative forests
Lessons
Understanding ESAE forests
Overview of MIM
Implementing JIT and Privileged Access Management by using MIM
Lab: Limiting administrator privileges by using Privileged Access Management
Using a layered approach to security
Exploring MIM
Configuring a MIM web portal
Configuring the Privileged Access feature
Requesting privileged access
Module 5: Mitigating malware and threats
Lessons
Configuring and managing Windows Defender
Using software restricting policies (SRPs) and AppLocker
Configuring and using Device Guard
Using and deploying the Enhanced Mitigation Experience Toolkit
Lab: Securing applications by using AppLocker, Windows Defender, Device Guard Rules, and the EMET.
Configuring Windows Defender
Configuring AppLocker
Configuring and deploying Device Guard
Deploying and using EMET
Module 6: Analysing activity by using advanced auditing and log analytics
Lessons
Overview of auditing
Understanding advanced auditing
Configuring Windows PowerShell auditing and logging
Lab: Configuring encryption and advanced auditing
Configuring auditing of file-system access
Auditing domain logons
Managing the configuration of advanced audit policies
Windows PowerShell logging and auditing
Module 7: Analysing activity with Microsoft Advanced Threat Analytics feature and Operations Management Suite
Lessons
Overview of Advanced Threat Analytics
Understanding OMS
Lab: Advanced Threat Analytics and Operations Management Suite
Using ATA and OMS
Preparing and deploying ATA
Preparing and deploying OMS
Module 8: Securing your virtualization an infrastructure
Lessons
Overview of Guarded Fabric VMs
Understanding shielded and encryption-supported VMs
Lab: Deploying and using Guarded Fabric with administrator-trusted attestation and shielded VMs
Deploying Guarded Fabric VMs with administrator-trusted attestation
Deploying a shielded VM
Module 9: Securing application development and server-workload infrastructure
Lessons
Using the Security Compliance Manager
Introduction to Nano Server
Understanding containers
Lab: Using the Security Compliance Manager
Configuring a security baseline for Windows Server 2016
Deploying a security baseline for Windows Server 2016
Lab: Deploying and Configuring Nano Server and containers
Deploying, managing, and securing Nano Server
Deploying, managing, and securing Windows Server containers
Deploying, managing, and securing Hyper-V containers
Module 10: Protecting data with encryption
Lessons
Planning and implementing encryption
Planning and Implementing BitLocker
Lab: Configuring EFS and BitLocker
Encrypting and recovering access to encrypted files
Using BitLocker to protect data
Module 11: Limiting access to file and folders
Lessons
Introduction to FSRM
Implementing classification management and file-management tasks
Understanding Dynamic Access Control (DAC)
Lab: Configuring quotas and file screening
Configuring FSRM quotas
Configuring file screening
Lab: Implementing DAC
Preparing DAC
Implementing DAC
Module 12: Using firewalls to control network traffic flow
Lessons
Understanding Windows Firewall
Software-defined distributed firewalls
Lab: Windows Firewall with Advanced Security
Creating and testing inbound rules
Creating and testing outbound rules
Module 13: Securing network traffic
Lessons
Network-related security threats and connection-security rules
Configuring advanced DNS settings
Examining network traffic with Microsoft Message Analyzer
Securing SMB traffic, and analyzing SMB traffic
Lab: Connection security rules and securing DNS
Creating and testing connection security rules
Configuring and testing DNSSEC
Lab: Microsoft Message Analyzer and SMB encryption
Using Microsoft Message Analyzer
Configuring and verifying SMB encryption on SMB shares
Module 14: Updating Windows Server
Lessons
Overview of WSUS
Deploying updates by using WSUS
Lab: Implementing update management
Implementing the WSUS server role
Configuring update settings
Approving and deploying an update by using WSUS
Deploying Windows Defender definition updates by using WSUS