MICROSOFT 70 744 SECURING WINDOWS SERVER 2016
Microsoft windows Server Professional Training
Freshers and Career Changers
Online and Offline Classes
Week Days and Week Ends
60 Days
•Understand the concepts Microsoft windows Server
•Learn how to use advanced Microsoft windows Server functions.
•Learn how to use loop statement in Microsoft windows Server.
•How to write Microsoft windows Server scripts to automate redundant tasks.
•Learn Everything you need to know about Basic Microsoft windows Server
•What is Microsoft windows Server and How to Build apps using Microsoft windows Server.
•This course will teach you how to get moving in Microsoft windows Server.
•Learn Microsoft windows Server – A super fun way to improve your programming skills
•Microsoft windows Server -Learn how to use one component inside an other i.e complex components.
•
•Career guidance providing by It Expert
•Get Training from Certified Professionals
•Flexible batch timings – Weekend & weekdays.
•Our Trainers with 15+ years of teaching Experience
• Greater productivity and increased workforce morale
•Project manager can be assigned to track candidates’ performance
•Live project based on any of the selected use cases, involving implementation of the concepts
•Lifetime access to our 24×7 online support team who will resolve all your technical queries, through ticket based tracking system.
•
•.net Developer, Business Analysis, Software Testing, Software Development, Linux Administration, java, Automation Testing, hybris, qtp, lamp, css, xml, manual
•Core Java, java, python, php, plsql, Ios Development, Android Development, Software Development, Software Testing, hadoop, cloud, devops, Technical Support
•Java/j2ee, Microsoft, Erp, Cloud, Qa/testing, Automation Testing, Analytics, Machine Learning, Artificial Intelligence, Agile Project Management, Mobility
•Oracle DBA, Network Architect, Service Now Developer, Windows Admin, System Admin, BMC BPM, VM WARE, Linux Admin, Storage Admin, Project Manager (Data Center)
•Xml Publisher, Php Developer, Android Application Development, Html Tagging, E-publishing, Software Development
•
Chapter 01 – Introduction to Attacks, Breaches, and Detection
•Topic A: Understanding Types of Attacks
•Assume Breach
•Methods of Attack
•Attack Stages
•Prioritizing Resources
•Incident Response Strategy
•Ensuring Compliance
•Topic B: Detecting Security Breaches
•Locating Evidence
•Event Logs
•Examining Other Configurations
•Topic C: Using Sysinternals Tools
•Introducing Sysinternals
•Demo – Examining Sysinternals Tools
•System Monitor
•AccessChk
•Autoruns
•LogonSessions
•Process Explorer
•Process Monitor
•Sigcheck
•Demo – Using Sysinternals Tools
•Chapter 01 Summary
•Chapter 01 – Quiz
•Chapter 02 – Protecting Users and Workstations
•Topic A: User Rights and Privileges
•Principle of Least Privilege
•Configuring User Rights
•Configuring Account Security Options
•Demo – User Rights and Account Security Options
•Account Security Controls
•Complexity Options
•Password and Lockout Policies
•Demo – Configuring Account Policies in Group Policy
•Configuring Fine-Grained Password Policies
•Understanding PSO Application
•Protected Users Security Groups
•Delegating Administrative Control
•Demo – Delegating Control in AD DS
•Local Administrator Password Solutions (LAPS)
•LAPS Requirements
•LAPS Process
•Configuring and Managing Passwords
•Demo – Using LAPS
•Topic B: Working with Computer and Service Accounts
•What is a Computer Account?
•Computer Account Functionality
•Working with Secure Channel Passwords
•Service Account Types
•Group MSAs
•Demo – Configuring Group MSAs
•Topic C: Protecting User Credentials
•Introducing Credential Guard
•Credential Guard Requirements
•Configuring Credential Guard
•Verifying Credential Guard Operation
•Credential Guard Weaknesses
•NTLM Blocking
•Searching AD DS for Problem Accounts
•Demo – Locating Problem Accounts
•Topic D: Using Privileged Access Workstations
•The Need for Privileged Access Workstations
•Privileged Access Workstations
•Jump Servers
•Securing Domain Controllers
•Chapter 02 Summary
•Chapter 02 – Quiz
•Chapter 03 – Managing Administrative Access
•Topic A: Understanding and Deploying JEA
•Introduction to JEA
•JEA Components
•Session Configuration Files
•Demo – Creating a Session Configuration File
•Role Capability Files
•Demo – Create a Role Capability File
•JEA Endpoints
•Demo – Creating a JEA Endpoint
•Connecting to JEA Endpoints
•Deploying JEA Endpoints
•Topic B: Using Enhanced Security Administrative Environments (ESAE) Forests
•ESAE Forests
•Administrative Tiers
•ESAE Best Practices
•The Clean Source Principle
•Implementing the Clean Source Principle
•Topic C: Using Microsoft Identity Manager
•Overview of MIM
•MIM Requirements
•MIM Service Accounts
•Topic D: Using JIT Administration and PAM
•Overview of JIT Administration
•Privileged Access Management (PAM)
•PAM Components
•Creating an Administrative Forest
•Configuring Trust Relationships
•Shadow Principals
•Configuring the MIM Web Portal
•Managing and Configuring PAM Roles
•Chapter 03 Summary
•Chapter 03 – Quiz
•Chapter 04 – Configuring Anti-Malware and Patch Management
•Topic A: Configuring and Managing Windows Defender
•Understanding Malware
•Malware Sources
•Mitigation Methods
•Windows Defender
•Demo – Using Windows Defender
•Topic B: Restricting Software
•Controlling Applications
•Software Restriction Policies
•Security Levels
•AppLocker
•Support for AppLocker
•AppLocker Rules
•Creating Default Rules
•Demo – Using AppLocker
•Topic C: Using Device Guard
•Overview of Device Guard
•Device Guard Features
•Configuring Device Guard
•Device Guard Policies
•Deploying Code Integrity Policies
•Control Flow Guard
•Topic D: Patch Management with WSUS
•Overview of WSUS
•Deployment Options
•Server Requirements
•Configuring Clients
•Administering WSUS
•Approving Updates
•Demo – Installing and Configuring WSUS
•Chapter 04 Summary
•Chapter 04 – Quiz
•Chapter 05 – Auditing and Advanced Threat Analytics
•Topic A: Configuring Auditing for Windows Server 2016
•Overview of Auditing
•The Purpose of Auditing
•Types of Events
•Auditing Goals
•Auditing File and Object Access
•Demo – Configuring Auditing
•Topic B: Advanced Auditing and Management
•Advanced Auditing
•Advanced Auditing Subcategories
•Dynamic Auditing
•Event Log Subscriptions
•Audit Collection Services (ACS)
•Demo – Configuring Event Forwarding
•Auditing with Windows PowerShell
•Demo – Using PowerShell with Audit Logs
•Transaction Logging
•Module Logging
•Script Block Logging
•Demo – Configuring PowerShell Logging
•Topic C: Deploying and Configuring ATA
•Overview of ATA
•Usage Scenarios
•Deployment Requirements
•ATA Gateways
•Port Mirroring
•Configuring ATA Center
•Topic D: Deploying and Configuring Operations Management Suite
•Introduction to Operations Management Suite
•Deployment Overview
•OMS Solutions
•Installing OMS
•Chapter 05 Summary
•Chapter 05 – Quiz
•Chapter 06 – Securing the Infrastructure
•Topic A: Secure the Virtualization Infrastructure
•Introduction to Guarded Fabric
•Host Guardian Service
•Preparing HGS Nodes
•Installing and Configuring HGS
•Attestation and Encryption
•Attestation Methods
•Initializing HGS
•Configuring HSG Clients
•Topic B: Deploying Security Baselines
•Security Compliance Manager (SCM)
•SCM Requirements
•Demo – Installing SCM
•Demo – Configuring and Deploying Security Baselines
•Topic C: Deploying Nano Server
•Planning for Nano Server
•Understanding Nano Server Roles
•Installing Nano Server Roles
•Nano Server Installation
•Installation Steps
•Chapter 06 Summary
•Chapter 06 – Quiz
•Chapter 07 – Configuring Data Protection
•Topic A: Planning and Implementing File Encryption
•Introducing Encrypting File System
•EFS Features
•Encryption and Decryption
•Recovering EFS Files
•Demo – Using EFS
•Topic B: Planning and Implementing BitLocker
•Overview of BitLocker
•BitLocker and TPMs
•BitLocker Requirements
•Tools for Configuring and Managing BitLocker
•Deploying BitLocker
•Demo – Deploying BitLocker
•BitLocker on Hyper-V VMs
•BitLocker and CSVs
•Enabling BitLocker for CSV
•Network Unlock
•Network Unlock Process
•BitLocker Recovery
•Microsoft BitLocker Administration and Monitoring (MBAM)
•Chapter 07 Summary
•Chapter 07 – Quiz
•Chapter 08 – Advanced File Server Management
•Topic A: Using File Server Resource Manager
•Capacity Management
•Storage Management
•Introduction to FSRM
•Storage Management with File Server Resource Manager
•Overview of FSRM
•Installing and Configuring FSRM
•Demo – Installing and Configuring FSRM
•Quota Management
•Demo – Create and Manage Quotas
•File Screening
•Using File Groups
•Exceptions and Templates
•Demo – Implementing File Screening
•Storage Reports
•Report Tasks
•Demo – Generating Storage Reports
•Automatic File Management
•Topic B: Implementing Classification and File Management Tasks
•File Classification
•Classification Rules
•Demo – Configure File Classification
•File Management Task
•Topic C: Working with Dynamic Access Control
•Overview of Dynamic Access Control
•Dynamic Access Control Scenarios
•DAC Technologies
•Understanding Identity
•Understanding Claims
•Types of Claims
•Central Access Policies
•Policy Components
•DAC Prerequisites
•Demo – Implementing DAC
•Chapter 08 Summary
•Chapter 08 – Quiz
•Chapter 09 – Securing the Network Infrastructure
•Topic A: Using the Windows
We Provide advanced Software trainings. we believe in training the students with the latest technologies, methodologies and advancements in the IT industry. Our mission is to ease the transition from education to the professional world by providing a path of continuous learning and mentorship for students.
Subscribe to our newsletter to get the latest news, tips, and advice.
Jaipur Address:
J-100, Tiwari Ji Ka Bagh, Fateh Tibba, Adarsh Nagar, Jaipur, 302004.