This training series focuses on how to secure Windows Server 2016 environments. It covers methods and technologies for hardening server environments and securing virtual machine infrastructures using Shielded and encryption-supported virtual machines and Guarded Fabric. In addition, the series covers the protection of Active Directory and identity infrastructure with the Enhanced Security Administrative Environment (ESAE) Administrative Forest design approach and the management of privileged identities using Just-in-Time (JIT) and Just-Enough-Administration (JEA) approaches, along with Privileged Access Workstations (PAWs) and Local Administrator Password Solution (LAPS). The series also covers threat detection solutions, such as auditing, implementing Advanced Threat Analytics (ATA), the understanding of Operations Management Suite (OMS) solutions, and workload-specific security including the use of Nano Server for particular server workloads.
This series will then prepare you to take the MCSE: Cloud Platform and Infrastructure exams. Prior to this, you must complete the 70-740, 70-741, and 70-742 series and take the MCSA: Windows Server 2016 exams.
Course Curriculum
-
StartChapter 01 Introduction (1:51)
-
StartTopic A: Understanding Types of Attacks (0:23)
-
StartAssume Breach (3:16)
-
StartMethods of Attack (12:46)
-
StartAttack Stages (7:01)
-
StartPrioritizing Resources (3:30)
-
StartIncident Response Strategy (2:11)
-
StartEnsuring Compliance (2:04)
-
StartTopic B: Detecting Security Breaches (0:21)
-
StartLocating Evidence (1:40)
-
StartEvent Logs (2:35)
-
StartExamining Other Configurations (1:56)
-
StartTopic C: Using Sysinternals Tools (0:22)
-
StartIntroducing Sysinternals (2:31)
-
StartDemo - Examining Sysinternals Tools (1:51)
-
StartSystem Monitor (2:05)
-
StartAccessChk (1:31)
-
StartAutoruns (1:34)
-
StartLogonSessions (1:24)
-
StartProcess Explorer (1:37)
-
StartProcess Monitor (1:27)
-
StartSigcheck (1:18)
-
StartDemo - Using Sysinternals Tools (13:45)
-
StartChapter 01 Summary (1:31)
-
StartChapter 01 Review (0:09)
-
StartChapter 01 Quiz
-
StartChapter 02 Introduction (2:12)
-
StartTopic A: User Rights and Privileges (0:18)
-
StartPrinciple of Least Privilege (5:05)
-
StartConfiguring User Rights (3:24)
-
StartConfiguring Account Security Options (9:33)
-
StartDemo - User Rights and Account Security Options (16:04)
-
StartAccount Security Controls (2:15)
-
StartComplexity Options (3:29)
-
StartPassword and Lockout Policies (3:34)
-
StartDemo - Configuring Account Policies in Group Policy (4:22)
-
StartConfiguring Fine-Grained Password Policies (1:26)
-
StartUnderstanding PSO Application (2:55)
-
StartProtected Users Security Groups (3:22)
-
StartDelegating Administrative Control (4:12)
-
StartDemo - Delegating Control in AD DS (3:23)
-
StartLocal Administrator Password Solutions (LAPS) (6:25)
-
StartLAPS Requirements (1:40)
-
StartLAPS Process (1:13)
-
StartConfiguring and Managing Passwords (3:40)
-
StartDemo - Using LAPS (11:06)
-
StartTopic B: Working with Computer and Service Accounts (0:10)
-
StartWhat is a Computer Account? (1:40)
-
StartComputer Account Functionality (1:19)
-
StartWorking with Secure Channel Passwords (1:54)
-
StartService Account Types (2:05)
-
StartGroup MSAs (3:12)
-
StartDemo - Configuring Group MSAs (8:33)
-
StartTopic C: Protecting User Credentials (0:10)
-
StartIntroducing Credential Guard (2:13)
-
StartCredential Guard Requirements (1:30)
-
StartConfiguring Credential Guard (1:17)
-
StartVerifying Credential Guard Operation (1:22)
-
StartCredential Guard Weaknesses (1:19)
-
StartNTLM Blocking (3:33)
-
StartSearching AD DS for Problem Accounts (2:05)
-
StartDemo - Locating Problem Accounts (5:42)
-
StartTopic D: Using Privileged Access Workstations (0:32)
-
StartThe Need for Privileged Access Workstations (1:52)
-
StartPrivileged Access Workstations (1:41)
-
StartJump Servers (1:09)
-
StartSecuring Domain Controllers (6:20)
-
StartChapter 02 Summary (2:18)
-
StartChapter 02 Review (0:09)
-
StartChapter 02 Quiz