IT Networking Training Catalog – 70-744 – Securing Windows Server 2016 (MCSE) Series!
Overview: This training series focuses on how to secure Windows Server 2016 environments. It covers methods and technologies for hardening server environments and securing virtual machine infrastructures using Shielded and encryption-supported virtual machines and Guarded Fabric. In addition, the series covers the protection of Active Directory and identity infrastructure with the Enhanced Security Administrative Environment (ESAE) Administrative Forest design approach and the management of privileged identities using Just-in-Time (JIT) and Just-Enough-Administration (JEA) approaches, along with Privileged Access Workstations (PAWs) and Local Administrator Password Solution (LAPS). The series also covers threat detection solutions, such as auditing, implementing Advanced Threat Analytics (ATA), the understanding of Operations Management Suite (OMS) solutions, and workload-specific security including the use of Nano Server for particular server workloads.
This series, along with the 70-741 and 70-742 series, will prepare you to take the MCSA: Windows Server 2016 exams. Taking the 70-744 series will then prepare you to take the MCSE: Cloud Platform and Infrastructure exams.
Series Taught By: Patrick Loner
Available CEUs for Course Series Completion: 16
Students can earn up to 16 CEUs for fully completing this course series. This information will be displayed on the certificate of completion. Learn More
$75.00Read more
Course Modules
(Duration: 1h 11m)
- Workbook (Pdf)
- Topic A: Understanding Types of Attacks
- Assume Breach
- Methods of Attack
- Attack Stages
- Prioritizing Resources
- Incident Response Strategy
- Ensuring Compliance
- Topic B: Detecting Security Breaches
- Locating Evidence
- Event Logs
- Examining Other Configurations
- Topic C: Using Sysinternals Tools
- Introducing Sysinternals
- Demo – Examining Sysinternals Tools
- System Monitor
- AccessChk
- Autoruns
- LogonSessions
- Process Explorer
- Process Monitor
- Sigcheck
- Demo – Using Sysinternals Tools
- Chapter 01 Review
- Review Quiz (Number of attempts allowed: Unlimited)
(Duration: 2h 22m)
- Workbook (Pdf)
- Topic A: User Rights and Privileges
- Principle of Least Privilege
- Configuring User Rights
- Configuring Account Security Options
- Demo – User Rights and Account Security Options
- Account Security Controls
- Complexity Options
- Password and Lockout Policies
- Demo
- – Configuring Account Policies in Group Policy
- Configuring Fine
- -Grained Password Policies
- Understanding PSO Application
- Protected Users Security Groups
- Delegating Administrative Control
- Demo
- – Delegating Control in AD DS
- Local Administrator Password Solutions (LAPS)
- LAPS Requirements
- LAPS Process
- Configuring and Managing Passwords
- Demo
- – Using LAPS
- Topic B: Working with Computer and Service Accounts
- What is a Computer Account?
- Computer Account Functionality
- Working with Secure Channel Passwords
- Service Account Types
- Group MSAs
- Demo
- – Configuring Group MSAs
- Topic C: Protecting User Credentials
- Introducing Credential Guard
- Credential Guard Requirements
- Configuring Credential Guard
- Verifying Credential Guard Operation
- Credential Guard Weaknesses
- NTLM Blocking
- Searching AD DS for Problem Accounts
- Demo
- – Locating Problem Accounts
- Topic D: Using Privileged Access Workstations
- The Need for Privileged Access Workstations
- Privileged Access Workstations
- Jump Servers
- Securing Domain Controllers
- Chapter 02 Review
- Review Quiz (Number of attempts allowed: Unlimited)
(Duration: 1h 12m)
- Workbook (Pdf)
- Topic A: Understanding and Deploying JEA
- Introduction to JEA
- JEA Components
- Session Configuration Files
- Demo
- – Creating a Session Configuration File
- Role Capability Files
- Demo
- – Create a Role Capability File
- JEA Endpoints
- Demo
- – Creating a JEA Endpoint
- Connecting to JEA Endpoints
- Deploying JEA Endpoints
- Topic B: Using Enhanced Security Administrative Environments (ESAE) Forests
- ESAE Forests
- Administrative Tiers
- ESAE Best Practices
- The Clean Source Principle
- Implementing the Clean Source Principle
- Topic C: Using Microsoft Identity Manager
- Overview of MIM
- MIM Requirements
- MIM Service Accounts
- Topic D: Using JIT Administration and PAM
- Overview of JIT Administration
- Privileged Access Management (PAM)
- PAM Components
- Creating an Administrative Forest
- Configuring Trust Relationships
- Shadow Principals
- Configuring the MIM Web Portal
- Managing and Configuring PAM Roles
- Chapter 03 Review
- Review Quiz (Number of attempts allowed: Unlimited)
(Duration: 1h 31m)
- Workbook (Pdf)
- Topic A: Configuring and Managing Windows Defender
- Understanding Malware
- Malware Sources
- Mitigation Methods
- Windows Defender
- Demo – Using Windows Defender
- Topic B: Restricting Software
- Controlling Applications
- Software Restriction Policies
- Security Levels
- AppLocker
- Support for AppLocker
- AppLocker Rules
- Creating Default Rules
- Demo – Using AppLocker
- Topic C: Using Device Guard
- Overview of Device Guard
- Device Guard Features
- Configuring Device Guard
- Device Guard Policies
- Deploying Code Integrity Policies
- Control Flow Guard
- Topic D: Patch Management with WSUS
- Overview of WSUS
- Deployment Options
- Server Requirements
- Configuring Clients
- Administering WSUS
- Approving Updates
- Demo
- – Installing and Configuring WSUS
- Chapter 04 Review
- Review Quiz (Number of attempts allowed: Unlimited)
(Duration: 1h 28m)
- Workbook (Pdf)Topic A: Configuring Auditing for Windows Server 2016
- Overview of Auditing
- The Purpose of Auditing
- Types of Events
- Auditing Goals
- Auditing File and Object Access
- Demo
- – Configuring Auditing
- Topic B: Advanced Auditing and Management
- Advanced Auditing
- Advanced Auditing Subcategories
- Dynamic Auditing
- Event Log Subscriptions
- Audit Collection Services (ACS)
- Demo
- – Configuring Event Forwarding
- Auditing with Windows PowerShell
- Demo
- – Using PowerShell with Audit Logs
- Transaction Logging
- Module Logging
- Script Block Logging
- Demo
- – Configuring PowerShell Logging
- Topic C: Deploying and Configuring ATA
- Overview of ATA
- Usage Scenarios
- Deployment Requirements
- ATA Gateways
- Port Mirroring
- Configuring ATA Center
- Topic D: Deploying and Configuring Operations Management Suite
- Introduction to Operations Management Suite
- Deployment Overview
- OMS Solutions
- Installing OMS
- OMS Solutions
- Chapter 05 Review
- Review Quiz (Number of attempts allowed: Unlimited)
(Duration: 44m)
- Workbook (Pdf)
- Topic A: Secure the Virtualization Infrastructure
- Introduction to Guarded Fabric
- Host Guardian Service
- Preparing HGS Nodes
- Installing and Configuring HGS
- Attestation and Encryption
- Attestation Methods
- Initializing HGS
- Configuring HGS Clients
- Topic B: Deploying Security Baselines
- Security Compliance Manager (SCM)
- SCM Requirements
- Demo
- – Installing SCM
- Demo
- – Configuring and Deploying Security Baselines
- Topic C: Deploying Nano Server
- Planning for Nano Server
- Understanding Nano Server Roles
- Installing Nano Server Roles
- Nano Server Installation
- Installation Steps
- Chapter 06 Review
- Review Quiz (Number of attempts
(Duration: 1h 4m)
- Workbook (Pdf)
- Topic A: Planning and Implementing File Encryption
- Introducing Encrypting File System
- EFS Features
- Encryption and Decryption
- Recovering EFS Files
- Demo
- – Using EFS
- Topic B: Planning and Implementing BitLocker
- Overview of BitLocker
- BitLocker and TPMs
- BitLocker Requirements
- Tools for Configuring and Managing BitLocker
- Deploying BitLocker
- Demo
- – Deploying BitLocker
- BitLocker on Hyper
- -V VMs
- BitLocker and CSVs
- Enabling BitLocker for CSV
- Network Unlock
- Network Unlock Process
- BitLocker Recovery
- Microsoft BitLocker Administration and Monitoring (MBAM)
- Chapter 07 Review
- Review Quiz (Number of attempts allowed: Unlimited)
(Duration: 1h 55m)
- Workbook (Pdf)
- Topic A: Using File Server Resource Manager
- Capacity Management
- Storage Management
- Introduction to FSRM
- Storage Management with File Server Resource Manager
- Overview of FSRM
- Installing and Configuring FSRM
- Demo
- – Installing and Configuring FSRM
- Quota Management
- Demo
- – Create and Manage Quotas
- File Screening
- Using File Groups
- Exceptions and Templates
- Demo
- – Implementing File Screening
- Storage Reports
- Report Tasks
- Demo
- – Generating Storage Reports
- Automatic File Management
- Topic B: Implementing Classification and File Management Tasks
- File Classification
- Classification Rules
- Demo
- – Configure File Classification
- File Management Tasks
- Topic C: Working with Dynamic Access Control
- Overview of Dynamic Access Control
- Dynamic Access Control Scenarios
- DAC Technologies
- Understanding Identity
- Understanding Claims
- Types of Claims
- Central Access Policies
- Policy Components
- DAC Prerequisites
- Demo
- – Implementing DAC
- Chapter 08 Review
- Review Quiz (Number
(Duration: 2h 14m)
- Workbook (Pdf)
- Topic A: Using the Windows Firewall with Advanced Security
- Types of Firewalls
- Well
- -Known Ports
- Host
- -Based Firewall
- Network Profiles
- Configuring the Windows Firewall
- Demo
- – Working with the Windows Firewall
- Topic B: Datacenter Firewall
- Network Controller
- Datacenter Firewall
- Network Security Groups
- Scenarios for Datacenter Firewall
- Topic C: Utilizing IP Security
- Overview of IP Security
- IPSec Protocols
- IPSec Usage Scenarios
- IPSec Configuration Tools
- Connection Security Rules
- Understanding Rule Types
- Rule Endpoints
- Authentication Settings
- Authentication Methods
- Encryption Settings
- Monitoring Connections
- Demo
- – Implementing IPSec
- Topic D: Configuring Advanced DNS Settings
- Managing DNS Services
- Optimizing DNS Name Resolution
- The GlobalNames Zone
- Implementing DNS Security
- DNS Security (DNSSEC)
- Implementing DNSSEC
- Demo
- – Configuring DNSSEC
- Introducing DNS Policies
- Implementing DNS Policies
- RRL Feature
- Demo
- – Configuring DNS Policies
- Topic E: Monitoring Network Traffic
- Microsoft Message Analyzer
- Demo
- – Using Microsoft Message Analyzer
- Topic F: Securing SMB Traffic
- SMB 3.1.1 Protocol Security
- SMB Encryption Requirements
- Encrypting SMB Shares
- Disabling Support for SMB 1.0
- Chapter 09 Review
- Course Closure
- Review Quiz (Number of attempts allowed: Unlimited
This course includes
- about 13h 46m hours on-demand video
- 9 downloadable Pdf Workbooks
- Unlimited time access (During Membership)
- Access on mobile and Desktop
- Certificate of Completion
Course Features Include:
Expert Lectures
Learn on-demand from top instructors who are industry subject matter experts. Our highly certified expert instructors possess a superior understanding of the subject matter in their fields and have the ability to convey this knowledge in an effective, engaging, and professional manner to a wide audience.Certificates of Completion
Upon completion of a series of courses you can earn a certificate of completion from Career Academy. Certificates of Completion will display your full name, course completed, as well as the date of completion. Students have the ability to print this out or save it digitally to showcase your accomplishment.PowerPoint Visuals:
Many of the in-depth theories and processes discussed in our courses can be learned most efficiently through the detailed PowerPoint slides presented. These visuals are accompanied by an instructor voice-over to provide our students with a clear, efficient, and complete presentation of concepts.Professional Development Activities
Students are provided access to professional development activity files which allow for an individual to test out course theories and apply the knowledge they earned from the course.Review Quizzes
Once a course is completed, test your knowledge by taking our course review quiz! Students have the ability to retake any review quizzes as many times as they wish to ensure they understand the material or to improve upon their scores.Mobile Access
With our universal course player, you can learn from your computer, tablet as well as mobile devices. Keep up with your training on the go!
Trusted by Aspiring IT Professionals, Corporations and
Government agencies for more than a Decade
Get unlimited online access learn anywhere, anytime using your computer or mobile device!