New Learning | Premium Moodle Theme

MOD 20744: Securing Windows Server 2016

Description

This five-day course teaches IT Professionals how they can enhance the security of the IT Infrastructure that they administer. The beginning of this course emphasizing the importance of reacting as though Network breaches have already occurred and then shows you how to protect administrative credentials and right to ensure that the administrators can only perform the tasks that are needed, when they are needed. 

Details of this course are:

  • How to mitigate malware threats
  • How to use auditing and the Advanced Threat Analysis feature of Windows Server 2016 to identify security issues 
  • How to secure a virtualization platform 
  • How to use new deployment options (Nano server and containers) to enhance security. 
  • How to help protect access to files using encryption and dynamic access control
  • How to enhance your network's security. 

******Note: Those who are considering earning a certification in Securing Windows Server will also benefit from this course. *****

 

Once you completed this course, you will be able to:

  • Secure Windows Server
  • Secure application development and a server workload infrastructure
  • Manage security baselines
  • Configure and manage JIT administration 
  • Manage data security 
  • Secure your virtualization infrastructure 
  • Manage malware and threats
  • Configure advanced auditing 
  • Manage software updates
  • Manage threats by using Advanced Threat Analytics (ATA and Microsoft Operations Management Suite (OMS) 

 

Prerequisites

It is recommended that IT Professionals interested in taking this course have: 

  • Complete courses in or have the equivalent knowledge of 740, 741, and 742
  • Solid and practical understanding of Active Directory Domain Services (AD DS) Principles 
  • Solid and practical understanding of Microsoft Hyper-V Virtualization fundamentals 
  • Understanding of Windows Server security principles 

Curriculum

Module 1: Breach detection and using the Sysinternals tools

Lessons

  • Overview of breach detection
  • Using the Sysinternals tools to detect breaches
     

Lab : Basic breach detection and incident response strategies

  • Identifying attack types
  • Using incident-response strategies
  • Exploring the Sysinternals tools


Module 2: Protecting credentials and privileged access
 

Lessons

  • Understanding user rights
  • Computer and service accounts
  • Protecting credentials
  • Understanding privileged-access workstations and jump servers
  • Deploying a local administrator-password solution
     

Lab : User rights, security options, and group-managed service accounts

  • Configuring security options
  • Configuring restricted groups
  • Delegating privileges
  • Creating and managing group managed service accounts (MSAs)
  • Configuring the Credential Guard feature
  • Locating problematic accounts
     

Lab : Configuring and deploying LAPs
Installing local administrator password solution (LAPs)
Configuring LAPs
Deploying LAPs

Module 3: Limiting administrator rights with Just Enough Administration

Lessons

  • Understanding JEA
  • Configuring and deploying JEA

Lab : Limiting administrator privileges by using JEA

  • Creating a role-capability file
  • Creating a session-configuration file
  • Creating a JEA endpoint
  • Connecting to a JEA endpoint
  • Deploying JEA by using Desire State Configuration (DSC)


Module 4: Privileged Access Management and administrative forests
 

Lessons

  • Understanding ESAE forests
  • Overview of MIM
  • Implementing JIT and Privileged Access Management by using MIM
     

Lab : Limiting administrator privileges by using Privileged Access Management

  • Using a layered approach to security
  • Exploring MIM
  • Configuring a MIM web portal
  • Configuring the Privileged Access feature
  • Requesting privileged access


Module 5: Mitigating malware and threats
 

Lessons

  • Configuring and managing Windows Defender
  • Using software restricting policies (SRPs) and AppLocker
  • Configuring and using Device Guard
  • Using and deploying the Enhanced Mitigation Experience Toolkit
     

Lab : Securing applications by using AppLocker, Windows Defender, Device Guard Rules, and the EMET.

  • Configuring Windows Defender
  • Configuring AppLocker
  • Configuring and deploying Device Guard
  • Deploying and using EMET


Module 6: Analysing activity by using advanced auditing and log analytics

Lessons

  • Overview of auditing
  • Understanding advanced auditing
  • Configuring Windows PowerShell auditing and logging
     

Lab : Configuring encryption and advanced auditing

  • Configuring auditing of file-system access
  • Auditing domain logons
  • Managing the configuration of advanced audit policies
  • Windows PowerShell logging and auditing


Module 7: Analysing activity with Microsoft Advanced Threat Analytics feature and Operations Management Suite

Lessons

  • Overview of Advanced Threat Analytics
  • Understanding OMS
     

Lab : Advanced Threat Analytics and Operations Management Suite

  • Using ATA and OMS
  • Preparing and deploying ATA
  • Preparing and deploying OMS


Module 8: Securing your virtualization an infrastructure

Lessons

  • Overview of Guarded Fabric VMs
  • Understanding shielded and encryption-supported VMs
     

Lab : Deploying and using Guarded Fabric with administrator-trusted attestation and shielded VMs

  • Deploying Guarded Fabric VMs with administrator-trusted attestation
  • Deploying a shielded VM


Module 9: Securing application development and server-workload infrastructure

Lessons

  • Using Security Compliance Manager
  • Introduction to Nano Server
  • Understanding containers
     

Lab : Using Security Compliance Manager

  • Configuring a security baseline for Windows Server 2016
  • Deploying a security baseline for Windows Server 2016
     

Lab : Deploying and Configuring Nano Server and containers

  • Deploying, managing, and securing Nano Server
  • Deploying, managing, and securing Windows Server containers
  • Deploying, managing, and securing Hyper-V containers


Module 10: Protecting data with encryption

Lessons

  • Planning and implementing encryption
  • Planning and implementing BitLocker
     

Lab : Configuring EFS and BitLocker

  • Encrypting and recovering access to encrypted files
  • Using BitLocker to protect data


Module 11: Limiting access to file and folders

Lessons

  • Introduction to FSRM
  • Implementing classification management and file-management tasks
  • Understanding Dynamic Access Control (DAC)
     

Lab : Configuring quotas and file screening

  • Configuring FSRM quotas
  • Configuring file screening
     

Lab : Implementing DAC

  • Preparing DAC
  • Implementing DAC


Module 12: Using firewalls to control network traffic flow

Lessons

  • Understanding Windows Firewall
  • Software-defined distributed firewalls
     

Lab : Windows Firewall with Advanced Security

  • Creating and testing inbound rules
  • Creating and testing outbound rules


Module 13: Securing network traffic

Lessons

  • Network-related security threats and connection-security rules
  • Configuring advanced DNS settings
  • Examining network traffic with Microsoft Message Analyzer
  • Securing SMB traffic, and analyzing SMB traffic
     

Lab : Connection security rules and securing DNS

  • Creating and testing connection security rules
  • Configuring and testing DNSSEC
     

Lab : Microsoft Message Analyzer and SMB encryption

  • Using Microsoft Message Analyzer
  • Configuring and verifying SMB encryption on SMB shares


Module 14: Updating Windows Server

Lessons

  • Overview of WSUS
  • Deploying updates by using WSUS
     

Lab : Implementing update management

  • Implementing the WSUS server role
  • Configuring update settings
  • Approving and deploying an update by using WSUS
  • Deploying Windows Defender definition updates by using WSUS

What's included?
 

  • Authorized Courseware
  • Intensive Hands on Skills Development with an Experienced Subject Matter Expert
  • Hands on practice on real Servers and extended lab support 1.800.482.3172
  • Examination Vouchers  & Onsite Certification Testing- (excluding Adobe and PMP Boot Camps) 
  • Academy Code of Honor: Test Pass Guarantee
  • Optional: Package for Hotel Accommodations, Lunch and Transportation

Training Formats

With several convenient training delivery methods offered, The Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Academy for an engaging and effective learning experience.

Methods

Instructor Led (the best training format we offer)
Live Online Classroom – Online Instructor Led
Self-Paced Video

Speak to an Admissions Representative for complete details

By far the most competitve price we found, which included exam vouchers, hands on labs, practice test and a true Master of Cyber Security concepts as our Instructor. Franklin Mesa was the best trainer I have ever had and i walked out certified on the last day of my CompTIA Security+ certification bootcamp. 

Marc Alfonso - CompTIA Security + Student

 

The Academy is one of the best educational values for today's job market.  I studied hard and got certified (A+ and N+).  Even though I had no prior IT experience, I now have a good job replacing obsolete computers in hospitals throughout the country.  At my job interview, I just slid my test scores and certification across the table to the interviewer, who is now my boss.  I was hired the next day.  

Not bad for a 65 year old.

John Arnett- Student 

"I congratulate The Academy for a great facility and good lab computers. The Academy is great and I will definitely be taking more courses and utilizing the services available. Omer Palo is an excellent instructor that truly knows his material. I never felt bored in his class which is a first for me. Thank You."

IT Director, Burger King Corporation

"The instructor Frank Martinez is excellent – he covered so much material in 2 weeks that was unbelievable! He definitely knows what he does and it shows in the way that he conducts each lecture. He is the greatest!"
"Thanks Academy for allowing me to experience the MCSA / MCSE + Security Boot camp."

IT Professional, Florida International University

 

Schedules

Contct Us


THE ACADEMY

1.800.482.3172

FTL: 954.351.7040

MIA: 305.648.2000


Request More Information

 

Current Promotions!

 

  _____________________________________

 

 

 

Email Newsletter icon, E-mail Newsletter icon, Email List icon, E-mail List icon Sign up for our Email Newsletter!

          

 

Students - Orbund Log-In