IT Networking Training Catalog – 70-744 – Securing Windows Server 2016 (MCSE) Series!

Overview: This training series focuses on how to secure Windows Server 2016 environments. It covers methods and technologies for hardening server environments and securing virtual machine infrastructures using Shielded and encryption-supported virtual machines and Guarded Fabric. In addition, the series covers the protection of Active Directory and identity infrastructure with the Enhanced Security Administrative Environment (ESAE) Administrative Forest design approach and the management of privileged identities using Just-in-Time (JIT) and Just-Enough-Administration (JEA) approaches, along with Privileged Access Workstations (PAWs) and Local Administrator Password Solution (LAPS). The series also covers threat detection solutions, such as auditing, implementing Advanced Threat Analytics (ATA), the understanding of Operations Management Suite (OMS) solutions, and workload-specific security including the use of Nano Server for particular server workloads.

This series, along with the 70-741 and 70-742 series, will prepare you to take the MCSA: Windows Server 2016 exams. Taking the 70-744 series will then prepare you to take the MCSE: Cloud Platform and Infrastructure exams.

Series Taught By: Patrick Loner

Available CEUs for Course Series Completion: 16
Students can earn up to 16 CEUs for fully completing this course series. This information will be displayed on the certificate of completion. Learn More

$75.00Read more

Course Modules

(Duration: 1h 11m)

  1. Workbook (Pdf)
  2. Topic A: Understanding Types of Attacks
  3. Assume Breach
  4. Methods of Attack
  5. Attack Stages
  6. Prioritizing Resources
  7. Incident Response Strategy
  8. Ensuring Compliance
  9. Topic B: Detecting Security Breaches
  10. Locating Evidence
  11. Event Logs
  12. Examining Other Configurations
  13. Topic C: Using Sysinternals Tools
  14. Introducing Sysinternals
  15. Demo – Examining Sysinternals Tools
  16. System Monitor
  17. AccessChk
  18. Autoruns
  19. LogonSessions
  20. Process Explorer
  21. Process Monitor
  22. Sigcheck
  23. Demo – Using Sysinternals Tools
  24. Chapter 01 Review
  25. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 2h 22m)

  1. Workbook (Pdf)
  2. Topic A: User Rights and Privileges
  3. Principle of Least Privilege
  4. Configuring User Rights
  5. Configuring Account Security Options
  6. Demo – User Rights and Account Security Options
  7. Account Security Controls
  8. Complexity Options
  9. Password and Lockout Policies
  10. Demo
  11. – Configuring Account Policies in Group Policy
  12. Configuring Fine
  13. -Grained Password Policies
  14. Understanding PSO Application
  15. Protected Users Security Groups
  16. Delegating Administrative Control
  17. Demo
  18. – Delegating Control in AD DS
  19. Local Administrator Password Solutions (LAPS)
  20. LAPS Requirements
  21. LAPS Process
  22. Configuring and Managing Passwords
  23. Demo
  24. – Using LAPS
  25. Topic B: Working with Computer and Service Accounts
  26. What is a Computer Account?
  27. Computer Account Functionality
  28. Working with Secure Channel Passwords
  29. Service Account Types
  30. Group MSAs
  31. Demo
  32. – Configuring Group MSAs
  33. Topic C: Protecting User Credentials
  34. Introducing Credential Guard
  35. Credential Guard Requirements
  36. Configuring Credential Guard
  37. Verifying Credential Guard Operation
  38. Credential Guard Weaknesses
  39. NTLM Blocking
  40. Searching AD DS for Problem Accounts
  41. Demo
  42. – Locating Problem Accounts
  43. Topic D: Using Privileged Access Workstations
  44. The Need for Privileged Access Workstations
  45. Privileged Access Workstations
  46. Jump Servers
  47. Securing Domain Controllers
  48. Chapter 02 Review
  49. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 1h 12m)

  1. Workbook (Pdf)
  2. Topic A: Understanding and Deploying JEA
  3. Introduction to JEA
  4. JEA Components
  5. Session Configuration Files
  6. Demo
  7. – Creating a Session Configuration File
  8. Role Capability Files
  9. Demo
  10. – Create a Role Capability File
  11. JEA Endpoints
  12. Demo
  13. – Creating a JEA Endpoint
  14. Connecting to JEA Endpoints
  15. Deploying JEA Endpoints
  16. Topic B: Using Enhanced Security Administrative Environments (ESAE) Forests
  17. ESAE Forests
  18. Administrative Tiers
  19. ESAE Best Practices
  20. The Clean Source Principle
  21. Implementing the Clean Source Principle
  22. Topic C: Using Microsoft Identity Manager
  23. Overview of MIM
  24. MIM Requirements
  25. MIM Service Accounts
  26. Topic D: Using JIT Administration and PAM
  27. Overview of JIT Administration
  28. Privileged Access Management (PAM)
  29. PAM Components
  30. Creating an Administrative Forest
  31. Configuring Trust Relationships
  32. Shadow Principals
  33. Configuring the MIM Web Portal
  34. Managing and Configuring PAM Roles
  35. Chapter 03 Review
  36. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 1h 31m)

  1. Workbook (Pdf)
  2. Topic A: Configuring and Managing Windows Defender
  3. Understanding Malware
  4. Malware Sources
  5. Mitigation Methods
  6. Windows Defender
  7. Demo – Using Windows Defender
  8. Topic B: Restricting Software
  9. Controlling Applications
  10. Software Restriction Policies
  11. Security Levels
  12. AppLocker
  13. Support for AppLocker
  14. AppLocker Rules
  15. Creating Default Rules
  16. Demo – Using AppLocker
  17. Topic C: Using Device Guard
  18. Overview of Device Guard
  19. Device Guard Features
  20. Configuring Device Guard
  21. Device Guard Policies
  22. Deploying Code Integrity Policies
  23. Control Flow Guard
  24. Topic D: Patch Management with WSUS
  25. Overview of WSUS
  26. Deployment Options
  27. Server Requirements
  28. Configuring Clients
  29. Administering WSUS
  30. Approving Updates
  31. Demo
  32. – Installing and Configuring WSUS
  33. Chapter 04 Review
  34. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 1h 28m)

  1. Workbook (Pdf)Topic A: Configuring Auditing for Windows Server 2016
  2. Overview of Auditing
  3. The Purpose of Auditing
  4. Types of Events
  5. Auditing Goals
  6. Auditing File and Object Access
  7. Demo
  8. – Configuring Auditing
  9. Topic B: Advanced Auditing and Management
  10. Advanced Auditing
  11. Advanced Auditing Subcategories
  12. Dynamic Auditing
  13. Event Log Subscriptions
  14. Audit Collection Services (ACS)
  15. Demo
  16. – Configuring Event Forwarding
  17. Auditing with Windows PowerShell
  18. Demo
  19. – Using PowerShell with Audit Logs
  20. Transaction Logging
  21. Module Logging
  22. Script Block Logging
  23. Demo
  24. – Configuring PowerShell Logging
  25. Topic C: Deploying and Configuring ATA
  26. Overview of ATA
  27. Usage Scenarios
  28. Deployment Requirements
  29. ATA Gateways
  30. Port Mirroring
  31. Configuring ATA Center
  32. Topic D: Deploying and Configuring Operations Management Suite
  33. Introduction to Operations Management Suite
  34. Deployment Overview
  35. OMS Solutions
  36. Installing OMS
  37. OMS Solutions
  38. Chapter 05 Review
  39. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 44m)

  1. Workbook (Pdf)
  2. Topic A: Secure the Virtualization Infrastructure
  3. Introduction to Guarded Fabric
  4. Host Guardian Service
  5. Preparing HGS Nodes
  6. Installing and Configuring HGS
  7. Attestation and Encryption
  8. Attestation Methods
  9. Initializing HGS
  10. Configuring HGS Clients
  11. Topic B: Deploying Security Baselines
  12. Security Compliance Manager (SCM)
  13. SCM Requirements
  14. Demo
  15. – Installing SCM
  16. Demo
  17. – Configuring and Deploying Security Baselines
  18. Topic C: Deploying Nano Server
  19. Planning for Nano Server
  20. Understanding Nano Server Roles
  21. Installing Nano Server Roles
  22. Nano Server Installation
  23. Installation Steps
  24. Chapter 06 Review
  25. Review Quiz (Number of attempts

(Duration: 1h 4m)

  1. Workbook (Pdf)
  2. Topic A: Planning and Implementing File Encryption
  3. Introducing Encrypting File System
  4. EFS Features
  5. Encryption and Decryption
  6. Recovering EFS Files
  7. Demo
  8. – Using EFS
  9. Topic B: Planning and Implementing BitLocker
  10. Overview of BitLocker
  11. BitLocker and TPMs
  12. BitLocker Requirements
  13. Tools for Configuring and Managing BitLocker
  14. Deploying BitLocker
  15. Demo
  16. – Deploying BitLocker
  17. BitLocker on Hyper
  18. -V VMs
  19. BitLocker and CSVs
  20. Enabling BitLocker for CSV
  21. Network Unlock
  22. Network Unlock Process
  23. BitLocker Recovery
  24. Microsoft BitLocker Administration and Monitoring (MBAM)
  25. Chapter 07 Review
  26. Review Quiz (Number of attempts allowed: Unlimited)

(Duration: 1h 55m)

  1. Workbook (Pdf)
  2. Topic A: Using File Server Resource Manager
  3. Capacity Management
  4. Storage Management
  5. Introduction to FSRM
  6. Storage Management with File Server Resource Manager
  7. Overview of FSRM
  8. Installing and Configuring FSRM
  9. Demo
  10. – Installing and Configuring FSRM
  11. Quota Management
  12. Demo
  13. – Create and Manage Quotas
  14. File Screening
  15. Using File Groups
  16. Exceptions and Templates
  17. Demo
  18. – Implementing File Screening
  19. Storage Reports
  20. Report Tasks
  21. Demo
  22. – Generating Storage Reports
  23. Automatic File Management
  24. Topic B: Implementing Classification and File Management Tasks
  25. File Classification
  26. Classification Rules
  27. Demo
  28. – Configure File Classification
  29. File Management Tasks
  30. Topic C: Working with Dynamic Access Control
  31. Overview of Dynamic Access Control
  32. Dynamic Access Control Scenarios
  33. DAC Technologies
  34. Understanding Identity
  35. Understanding Claims
  36. Types of Claims
  37. Central Access Policies
  38. Policy Components
  39. DAC Prerequisites
  40. Demo
  41. – Implementing DAC
  42. Chapter 08 Review
  43. Review Quiz (Number

(Duration: 2h 14m)

  1. Workbook (Pdf)
  2. Topic A: Using the Windows Firewall with Advanced Security
  3. Types of Firewalls
  4. Well
  5. -Known Ports
  6. Host
  7. -Based Firewall
  8. Network Profiles
  9. Configuring the Windows Firewall
  10. Demo
  11. – Working with the Windows Firewall
  12. Topic B: Datacenter Firewall
  13. Network Controller
  14. Datacenter Firewall
  15. Network Security Groups
  16. Scenarios for Datacenter Firewall
  17. Topic C: Utilizing IP Security
  18. Overview of IP Security
  19. IPSec Protocols
  20. IPSec Usage Scenarios
  21. IPSec Configuration Tools
  22. Connection Security Rules
  23. Understanding Rule Types
  24. Rule Endpoints
  25. Authentication Settings
  26. Authentication Methods
  27. Encryption Settings
  28. Monitoring Connections
  29. Demo
  30. – Implementing IPSec
  31. Topic D: Configuring Advanced DNS Settings
  32. Managing DNS Services
  33. Optimizing DNS Name Resolution
  34. The GlobalNames Zone
  35. Implementing DNS Security
  36. DNS Security (DNSSEC)
  37. Implementing DNSSEC
  38. Demo
  39. – Configuring DNSSEC
  40. Introducing DNS Policies
  41. Implementing DNS Policies
  42. RRL Feature
  43. Demo
  44. – Configuring DNS Policies
  45. Topic E: Monitoring Network Traffic
  46. Microsoft Message Analyzer
  47. Demo
  48. – Using Microsoft Message Analyzer
  49. Topic F: Securing SMB Traffic
  50. SMB 3.1.1 Protocol Security
  51. SMB Encryption Requirements
  52. Encrypting SMB Shares
  53. Disabling Support for SMB 1.0
  54. Chapter 09 Review
  55. Course Closure
  56. Review Quiz (Number of attempts allowed: Unlimited

This course includes

  • about 13h 46m hours on-demand video
  • 9 downloadable Pdf Workbooks
  • Unlimited time access (During Membership)
  • Access on mobile and Desktop
  • Certificate of Completion

Course Features Include:

  • Expert Lectures
    Learn on-demand from top instructors who are industry subject matter experts. Our highly certified expert instructors possess a superior understanding of the subject matter in their fields and have the ability to convey this knowledge in an effective, engaging, and professional manner to a wide audience.

  • Certificates of Completion
    Upon completion of a series of courses you can earn a certificate of completion from Career Academy. Certificates of Completion will display your full name, course completed, as well as the date of completion. Students have the ability to print this out or save it digitally to showcase your accomplishment.

  • PowerPoint Visuals:
    Many of the in-depth theories and processes discussed in our courses can be learned most efficiently through the detailed PowerPoint slides presented. These visuals are accompanied by an instructor voice-over to provide our students with a clear, efficient, and complete presentation of concepts.

  • Professional Development Activities
    Students are provided access to professional development activity files which allow for an individual to test out course theories and apply the knowledge they earned from the course.

  • Review Quizzes
    Once a course is completed, test your knowledge by taking our course review quiz! Students have the ability to retake any review quizzes as many times as they wish to ensure they understand the material or to improve upon their scores.

  • Mobile Access
    With our universal course player, you can learn from your computer, tablet as well as mobile devices. Keep up with your training on the go!

Trusted by Aspiring IT Professionals, Corporations and
Government agencies
for more than a Decade

Get unlimited online access learn anywhere, anytime using your computer or mobile device!