Windows Server
$2575
Per Participant
Note: This course is retired, Please contact Microtek Learning Consultant or email us at info@microteklearning.com for assistance.
20744: Securing Windows Server 2016 Training is aimed at professionals to teach them the leading methodologies to elevate the security level of the IT framework that they administer. This technical course educates them about the importance of assuming that network breaches have already occurred. It teaches how to protect administrative rights and credentials to make sure that administrators can execute only the tasks they need to. In this program, individuals will learn to assess activities by utilizing advanced log analytics and auditing. They will also learn to plan and secure data and mitigate threats and malware. This training course is suitable for IT Professionals who are responsible for administering Windows Server 2016 networks with full protection. It is also ideal for individuals who want to gain the 70-744 Securing Windows server certification.
This training is designed based on the objectives of the course variant 20744C.
Candidates must have:
This program by Microtek Learning is for IT experts who want to learn how to secure and administer networks in Windows Server 2016. These experts typically are associated with handling domain-based networks configured in Windows Server, with managed access to cloud and internet services.
Microtek Learning is a Microsoft Certified Partner for Learning Solutions. This class uses official Microsoft courseware and will be delivered by a Microsoft Certified Trainer (MCT).
Oops! For this course, there are currently no public schedules available. Clicking on "Notify Me" will allow you to express your interest.
For dates, times, and location customization of this course, get in touch with us.
You can also speak with a learning consultant by calling 800-961-0337.
This module frames the course so that students are thinking about security in environments where the infrastructure’s basis is predominantly Microsoft products. The module begins with teaching students about the “assume breach” philosophy and getting them to understand the different types of attacks that can occur, including attack timelines and vectors. Additionally, it gets students thinking about key resources, how they respond when they detect an incident, and how an organization’s direct needs and legislative requirements dictate its security policy.
Lab: Basic breach detection and incident response strategies
After completing this module, students will be able to:
This module covers user accounts and rights, computer and service accounts, credentials, Privileged Access Workstations, and the Local Administrator Password Solution. In this module, students will learn about configuring user rights and security options, protecting credentials by using Credential Guard, implementing Privileged Access Workstations, and managing and deploying Local Administrator Password Solution to manage local administrator account passwords.
Lab: Implementing user rights, security options, and group managed service accounts
Lab: Configuring and deploying LAPs
After completing this module, students will be able to:
This module explains how to deploy and configure Just Enough Administration (JEA), which is an administrative technology that allows students to apply role-based access control (RBAC) principles through Windows PowerShell remote sessions.
Lab: Limiting administrator privileges with JEA
After completing this module, students will be able to:
This module explains the concepts of Enhanced Security Administrative Environment (ESAE) forests, Microsoft Identity Manager (MIM), and Just In Time (JIT) Administration, or Privileged Access Management (PAM).
Lab: Limiting administrator privileges with PAM
After completing this module, students will be able to:
This module explains how to use tools such as Windows Defender, Windows AppLocker, Microsoft Device Guard, Windows Defender Application Guard, and Windows Defender Exploit Guard.
Lab: Securing applications with Windows Defender, AppLocker, and Device Guard Rules
After completing this module, students will be able to:
This module provides an overview of auditing, and then goes into detail about how to configure advanced auditing and Windows PowerShell auditing and logging.
Lab: Configuring advanced auditing
After completing this module, students will be able to:
This module explains the Microsoft Advanced Threat Analytics tool and the Microsoft Operations Management suite (OMS). It also explains how you can use them to monitor and analyse the security of a Windows Server deployment. You will also learn about Microsoft Azure Security Center, which allows you to manage and monitor the security configuration of workloads both on-premises and in the cloud.
Lab: Deploying ATA, Microsoft Operations Management Suite, and Azure Security Center
After completing this module, students will be able to:
This module explains how to configure Guarded Fabric VMs, including the requirements for shielded and encryption-supported VMs.
Lab: Guarded fabric with Admin-trusted attestation and shielded VMs
After completing this module, students will be able to:
This module describes the SCT, which is a free, downloadable set of tools that you can use to create and apply security settings. You will also learn about improving platform security by reducing the size and scope of application and compute resources by containerizing workloads.
Lab: Using SCT
Lab: Deploying and configuring containers
After completing this module, students will be able to:
This module explains how to configure Encrypting File System (EFS) and BitLocker drive encryption to protect data at rest. You will also learn about extending protection into the cloud by using Azure Information Protection.
Lab: Protecting data by using encryption and BitLocker
After completing this module, students will be able to:
This module explains how to optimize file services by configuring File Server Resource Manager (FSRM) and Distributed File System (DFS). Students also will learn how to manage access to shared files by configuring Dynamic Access Control (DAC).
Lab: Quotas and file screening
Lab: Implementing Dynamic Access Control
After completing this module, students will be able to:
This module explains how you can use Windows Firewall as an important part of an organization’s protection strategy. It explains the use of Internet Protocol security (IPsec) to encrypt network traffic and to establish security zones on your network. You will also learn about the Datacenter Firewall feature that you can use to help protect your on-premises virtual environments.
Lab: Configuring Windows Firewall with Advanced Security
After completing this module, students will be able to:
This module explores some of the Windows Server 2016 technologies that you can use to help mitigate network-security threats. It explains how you can configure DNSSEC to help protect network traffic, and use Microsoft Message Analyzer to monitor network traffic. The module also describes how to secure Server Message Block (SMB) traffic.
Lab: Securing DNS
Lab: Microsoft Message Analyzer and SMB encryption
After completing this module, students will be able to:
Some key lab exercises out of many other framed under 'Securing Windows Server 2016' exam course include:
Microsoft Certified Solutions Expert (MCSE): Cloud Platform and Infrastructure is the best related certification course with 'Securing Windows Server 2016 certification.
The best way to get practical proficiency in 'Windows Server 2016 Security' is to attend the online instructor- led training provided by the accredited training partner for Microsoft.
Under this training module, you will learn:
For many years, Microtek Learning has been helping organizations, leaders, and professionals to reach their maximum performance by addressing the challenges they are facing.
I'm really impressed with the storytelling skills of the instructor. She makes the session exciting by keeping things simple and easy to understand.
Texas
I was recommended the ITIL 4 Foundation course by an IT professional who had completed the same course at Microtek Learning. The training gave me a thorough understanding of service management that I felt I could take back to my job as an IT Project Management and apply it to improve the value of products and services.
Texas
I was sceptical at first whether to enrol with Microtek Learning or not, however, I am glad that I did- I got everything that was promised (maybe more). The trainer was very patient and knowledgeable and with his effort and mine, I was able to clear the exam with ease! Keep up the good work everyone.
MARTIN
TORONTO, CANADA