20744-C: Securing Windows Server 2016

4.5/5

This course explains how you can use auditing and the Advanced Threat Analysis feature in Windows Server 2016 to identify security issues. You will also learn how to mitigate malware threats, secure your virtualization platform, and use deployment options such as Nano server and containers to enhance security. The course also explains how you can help protect access to files by using encryption and dynamic access control, and how you can enhance your network’s security. Securing Windows Server 2016 course gives you an in-depth look at how you can harden your network against attacks. The course begins by emphasizing how important it is to assume that a breach has already occurred and then moves on to teach you techniques such as how to control administrative rights, who can do what in the organization, monitoring activity, managing privileges, and the ability to track who did what. 

Training Options

Classroom Training

Online Instructor Led

Onsite Training

Course Information

Module 1: ATTACKS, BREACH DETECTION, AND SYSINTERNALS TOOLS

  • Understanding attacks
  • Detecting breaches
  • Examining activity with the Sysinternals tool
  • Lab : Basic breach detection and incident response strategies

Module 2:  PROTECTING CREDENTIALS AND PRIVILEGED ACCESS

  • Understanding user rights
  • Computer and service accounts
  • Protecting credentials
  • Privileged-Access Workstations and jump servers
  • Local administrator-password solution
  • Lab : Implementing user rights, security options, and group-managed service accounts user rights, security options, and group-managed service accounts
  • Lab : Configuring and deploying LAPs

Module 3: LIMITING ADMINISTRATOR RIGHTS WITH JUST ENOUGH ADMINISTRATION

  • Understanding JEA
  • Verifying and deploying JEA
  • Lab : Limiting administrator privileges by using JEA

Module 4: PRIVILEGED ACCESS MANAGEMENT AND ADMINISTRATIVE FORESTS

  • ESAE forests
  • Overview of Microsoft Identity Manager
  • Overview of JIT administration and PAM
  • Lab : Limiting administrator privileges with PAM

Module 5: MITIGATING MALWARE AND THREATS

  • Configuring and managing Windows Defender
  • Restricting software
  • Configuring and using the Device Guard feature
  • Deploying and using the EMET
  • Lab : Securing applications by using AppLocker, Windows Defender, Device Guard Rules, and the EMET.

» Show More 👇

Module 6: ANALYZING ACTIVITY WITH ADVANCED AUDITING AND LOG ANALYTICS

  • Overview of auditing
  • Advanced auditing
  • Windows PowerShell auditing and logging
  • Lab : Configuring advanced auditing

Module 7: DEPLOYING AND CONFIGURING ADVANCED THREAT ANALYTICS AND MICROSOFT OPERATIONS MANAGEMENT SUITE

  • Deploying and configuring ATA
  • Deploying and configuring Microsoft Operations Management Suite
  • Lab : Deploying ATA and Microsoft Operations Management Suite

Module 8: SECURE VIRTUALIZATION INFRASTRUCTURE

  • Guarded Fabric
  • Shielded and encryption-supported virtual machines
  • Lab : Guarded Fabric with administrator-trusted attestation and shielded VMs

Module 9: SECURING APPLICATION DEVELOPMENT AND SERVER-WORKLOAD INFRASTRUCTURE

  • Using Security Compliance Manager
  • Introduction to Nano Server
  • Understanding containers
  • Lab : Using Security Compliance Manager
  • Lab: Deploying and Configuring Nano Server

Module 10: PLANNING AND PROTECTING DATA

  • Planning and implementing encryption
  • Planning and implementing BitLocker
  • Lab : Protecting data by using encryption and BitLocker

Module 11: OPTIMIZING AND SECURING FILE SERVICES

  • File Server Resource Manager
  • Implementing classification management and file-management tasks
  • Dynamic Access Control
  • Lab : Quotas and file screening
  • Lab : Implementing Dynamic Access Control

Module 12: SECURING NETWORK TRAFFIC WITH FIREWALLS AND ENCRYPTION

  • Understanding network-related security threats
  • Understanding Windows Firewall with Advanced Security
  • Configuring IPsec
  • Datacenter Firewall
  • Lab : Configuring Windows Firewall with Advanced Security

Module 13: SECURING NETWORK TRAFFIC

  • Network-related security threats and connection-security rules
  • Configuring advanced DNS settings
  • Examining network traffic with Microsoft Message Analyzer
  • Securing SMB traffic, and analyzing SMB traffic
  • Lab : Securing DNS
  • Lab : Microsoft Message Analyzer and SMB encryption

Module 14: UPDATING WINDOWS SERVER

  • Overview of WSUS
  • Deploying updates by using WSUS
  • Lab : Implementing update management

» Show Less 👆

Audience Profile

  • This course is for IT professionals who need to administer Windows Server 2016 networks securely. These professionals typically work with networks that are configured as Windows Server domain-based environments, with managed access to the Internet and cloud services.
  • Students who seek certification in the 70-744 Securing Windows server exam also will benefit from this course.

 

Q: What is Securing Windows Server 2016?

A: Windows Server 2016 delivers a big part of the leaps ahead in security through detailed features like Shielded VMs, Hyper V Containers, Nano Server, Log Analytic Insights, Credential Guard, New Administrative Modes, Device Guard, Control Flow Guard, and much more.

Q: What is the duration and audience of the 20744-C: Securing Windows Server 2016 course?

A: The duration of the course is 5 days. However, the target audience for this course is those IT professionals who want to know how they can enhance the security of the IT infrastructure that they administer.

Q: Is there any course related to the 20744-C: Securing Windows Server 2016 course?

A: The Microsoft Certified Solutions Expert (MCSE): Cloud Platform and Infrastructure is the corresponding course to the 'Securing Windows Server 2016' certification.

Q: How to Secure a Windows Server?

A: To secure Windows Server provides security protection created into the operating system to safeguard against security breaches, help block malicious attacks, and enhance the security of your virtual machines, applications, and data.

100% Business Fulfilment

Request more Information

    Corporate Training Options

    Online Instructor Led

    Live, Online Training by top Instructors and practitioners across the globe.

    Onsite
    Training

    Conduct training at the work location you desired.

    Classroom Training

    The Venue will be ideally located and easy to access with covid-19 SOP's.

    Overseas Training

    Travel to any desired location for your training.

    What People say?

    Mohammed Aljbreen Operation Specialist, SAMA

    The Clarity of the Content was very good. The explanation of the trainer with in-depth knowledge in a proper flow really impressed me to give 5 star rating.

    Arindam Chakraborty Systems Specialist, King Abdullah University of Sciences & Technology

    The Instructor was really impressive. Clear cut explanation of every topic he covered with real time scenarios.

    Sher Afzal Khan Cloud Engineer, Cloud 9 Networks

    The Trainer and the Course Material, both are good. Good flow of explanation with simple examples. The complete training was focused on current industry challenges.

    Jawed Ahmad Siddiqui Sr. System Administrator, Saudi Ceramics

    The Trainer’s presentation was impressed me to continue the course till end. Never feel bore till the entire sessions. She studied our mindset and follows.

      Not sure,
      which course to choose?

      Our Clients across the Globe!

      Our Corporate Clients