Microsoft 70-744: Securing Windows Server 2016 Online Certificate Course

Learn how to secure Windows Server 2016 environments

Microsoft 70-744: Securing Windows Server 2016 Online Certificate Course

NOW ONLY

US$199

Save US$500 (72%)
OFF RRP US$699
Get Info Pack

Learn how to secure Windows Server 2016 environments

This training series focuses on how to secure Windows Server 2016 environments. It covers methods and technologies for hardening server environments and securing virtual machine infrastructures using Shielded and encryption-supported virtual machines and Guarded Fabric. In addition, the series covers the protection of Active Directory and identity infrastructure with the Enhanced Security Administrative Environment (ESAE) Administrative Forest design approach and the management of privileged identities using Just-in-Time (JIT) and Just-Enough-Administration (JEA) approaches, along with Privileged Access Workstations (PAWs) and Local Administrator Password Solution (LAPS). The series also covers threat detection solutions, such as auditing, implementing Advanced Threat Analytics (ATA), the understanding of Operations Management Suite (OMS) solutions, and workload-specific security including the use of Nano Server for particular server workloads.

This series will then prepare you to take the MCSE: Cloud Platform and Infrastructure exams. Prior to this, you must complete the 70-740, 70-741, and 70-742 series and take the MCSA: Windows Server 2016 exams.

Course Fast Facts:

  1. Learn the fundamentals of Microsoft 70-744: Securing Windows Server 2016
  2. Comprehensive 10 module Accredited Certificate In Microsoft 70-744: Securing Windows Server 2016 Online Course
  3. Study along with simple instructions & demonstrations
  4. Written and developed by leading Microsoft experts
  5. Receive one-on-one online help & support
  6. Unlimited, lifetime access to online course
  7. Certificate of completion
  8. Study at your own pace with no rigid class timetables, 24/7 from any computer or smart device

Course Delivery

Courses are accessed online  by any device including PC, tablet or Smart Phone. Upon purchase an automated welcome email will be sent to you (please check your junk email inbox if not received as this is an automated email), in order for you to access your online course, which is Available 24/7 on any computer or smart mobile device. 

Recognition & Accreditation

All students who complete this course, receive a certificate of completion and will be issued a certificate via email.

Course Introduction

  • Introduction
  • Course Introduction
  • Instructor Introduction

Chapter 01 - Introduction to Attacks, Breaches, and Detection

  • Chapter 01 Introduction
  • Topic A: Understanding Types of Attacks
  • Assume Breach
  • Methods of Attack
  • Attack Stages
  • Prioritizing Resources
  • Incident Response Strategy
  • Ensuring Compliance
  • Topic B: Detecting Security Breaches
  • Locating Evidence
  • Event Logs
  • Examining Other Configurations
  • Topic C: Using Sysinternals Tools
  • Introducing Sysinternals
  • Demo - Examining Sysinternals Tools
  • System Monitor
  • AccessChk
  • Autoruns
  • LogonSessions
  • Process Explorer
  • Process Monitor
  • Sigcheck
  • Demo - Using Sysinternals Tools
  • Chapter 01 Summary
  • Chapter 01 Review
  • Chapter 01 Quiz

Chapter 02 - Protecting Users and Workstations

  • Chapter 02 Introduction
  • Topic A: User Rights and Privileges
  • Principle of Least Privilege
  • Configuring User Rights
  • Configuring Account Security Options
  • Demo - User Rights and Account Security Options
  • Account Security Controls
  • Complexity Options
  • Password and Lockout Policies
  • Demo - Configuring Account Policies in Group Policy
  • Configuring Fine-Grained Password Policies
  • Understanding PSO Application
  • Protected Users Security Groups
  • Delegating Administrative Control
  • Demo - Delegating Control in AD DS
  • Local Administrator Password Solutions (LAPS)
  • LAPS Requirements
  • LAPS Process
  • Configuring and Managing Passwords
  • Demo - Using LAPS
  • Topic B: Working with Computer and Service Accounts
  • What is a Computer Account?
  • Computer Account Functionality
  • Working with Secure Channel Passwords
  • Service Account Types
  • Group MSAs
  • Demo - Configuring Group MSAs
  • Topic C: Protecting User Credentials
  • Introducing Credential Guard
  • Credential Guard Requirements
  • Configuring Credential Guard
  • Verifying Credential Guard Operation
  • Credential Guard Weaknesses
  • NTLM Blocking
  • Searching AD DS for Problem Accounts
  • Demo - Locating Problem Accounts
  • Topic D: Using Privileged Access Workstations
  • The Need for Privileged Access Workstations
  • Privileged Access Workstations
  • Jump Servers
  • Securing Domain Controllers
  • Chapter 02 Summary
  • Chapter 02 Review
  • Chapter 02 Quiz

Chapter 03 - Managing Administrative Access

  • Chapter 03 Introduction
  • Topic A: Understanding and Deploying JEA
  • Introduction to JEA
  • JEA Components
  • Session Configuration Files
  • Demo - Creating a Session Configuration File
  • Role Capability Files
  • Demo - Create a Role Capability File
  • JEA Endpoints
  • Demo - Creating a JEA Endpoint
  • Connecting to JEA Endpoints
  • Deploying JEA Endpoints
  • Topic B: Using Enhanced Security Administrative Environments (ESAE) Forests
  • ESAE Forests
  • Administrative Tiers
  • ESAE Best Practices
  • The Clean Source Principle
  • Implementing the Clean Source Principle
  • Topic C: Using Microsoft Identity Manager
  • Overview of MIM
  • MIM Requirements
  • MIM Service Accounts
  • Topic D: Using JIT Administration and PAM
  • Overview of JIT Administration
  • Privileged Access Management (PAM)
  • PAM Components
  • Creating an Administrative Forest
  • Configuring Trust Relationships
  • Shadow Principals
  • Configuring the MIM Web Portal
  • Managing and Configuring PAM Roles
  • Chapter 03 Summary
  • Chapter 03 Review
  • Chapter 03 Quiz

Chapter 04 - Configuring Anti-Malware and Patch Management

  • Chapter 04 Introduction
  • Topic A: Configuring and Managing Windows Defender
  • Understanding Malware
  • Malware Sources
  • Mitigation Methods
  • Windows Defender
  • Demo - Using Windows Defender
  • Topic B: Restricting Software
  • Controlling Applications
  • Software Restriction Policies
  • Security Levels
  • AppLocker
  • Support for AppLocker
  • AppLocker Rules
  • Creating Default Rules
  • Demo - Using AppLocker
  • Topic C: Using Device Guard
  • Overview of Device Guard
  • Device Guard Features
  • Configuring Device Guard
  • Device Guard Policies
  • Deploying Code Integrity Policies
  • Control Flow Guard
  • Topic D: Patch Management with WSUS
  • Overview of WSUS
  • Deployment Options
  • Server Requirements
  • Configuring Clients
  • Administering WSUS
  • Approving Updates
  • Demo - Installing and Configuring WSUS
  • Chapter 04 Summary
  • Chapter 04 Review
  • Chapter 04 Quiz

Chapter 05 - Auditing and Advanced Threat Analytics

  • Chapter 05 Introduction
  • Topic A: Configuring Auditing for Windows Server 2016
  • Overview of Auditing
  • The Purpose of Auditing (
  • Types of Events
  • Auditing Goals
  • Auditing File and Object Access
  • Demo - Configuring Auditing
  • Topic B: Advanced Auditing and Management
  • Advanced Auditing
  • Advanced Auditing Subcategories
  • Dynamic Auditing
  • Event Log Subscriptions
  • Audit Collection Services (ACS)
  • Demo - Configuring Event Forwarding (6:59)
  • Start
  • Auditing with Windows PowerShell (1:58)
  • Start
  • Demo - Using PowerShell with Audit Logs
  • Transaction Logging
  • Module Logging
  • Script Block Logging
  • Demo - Configuring PowerShell Logging
  • Topic C: Deploying and Configuring ATA
  • Overview of ATA
  • Usage Scenarios
  • Deployment Requirements
  • ATA Gateways
  • Port Mirroring
  • Configuring ATA Center
  • Topic D: Deploying and Configuring Operations Management Suite
  • Introduction to Operations Management Suite
  • Deployment Overview
  • OMS Solutions
  • Installing OMS
  • OMS Solutions
  • Chapter 05 Summary
  • Chapter 05 Review
  • Chapter 05 Quiz

Chapter 06 - Securing the Infrastructure

  • Chapter 06 Introduction
  • Topic A: Secure the Virtualization Infrastructure
  • Introduction to Guarded Fabric
  • Host Guardian Service
  • Preparing HGS Nodes
  • Installing and Configuring HGS
  • Attestation and Encryption
  • Attestation Methods
  • Initializing HGS
  • Configuring HSG Clients
  • Topic B: Deploying Security Baselines
  • Security Compliance Manager (SCM)
  • SCM Requirements
  • Demo - Installing SCM
  • Demo - Configuring and Deploying Security Baselines
  • Topic C: Deploying Nano Server
  • Planning for Nano Server
  • Understanding Nano Server Roles
  • Installing Nano Server Roles
  • Nano Server Installation
  • Installation Steps
  • Chapter 06 Summary
  • Chapter 06 Review
  • Chapter 06 Quiz

Chapter 07 - Configuring Data Protection

  • Chapter 07 Introduction
  • Topic A: Planning and Implementing File Encryption
  • Introducing Encrypting File System
  • EFS Features
  • Encryption and Decryption
  • Recovering EFS Files
  • Demo - Using EFS
  • Topic B: Planning and Implementing BitLocker
  • Overview of BitLocker
  • BitLocker and TPMs
  • BitLocker Requirements
  • Tools for Configuring and Managing BitLocker
  • Deploying BitLocker
  • Demo - Deploying BitLocker
  • BitLocker on Hyper-V VMs
  • BitLocker and CSVs
  • Enabling BitLocker for CSV
  • Network Unlock
  • Network Unlock Process
  • BitLocker Recovery
  • Microsoft BitLocker Administration and Monitoring (MBAM)
  • Chapter 07 Summary
  • Chapter 07 Review
  • Chapter 07 Quiz

Chapter 08 - Advanced File Server Management

  • Chapter 08 Introduction
  • Topic A: Using File Server Resource Manager
  • Capacity Managemen
  • Storage Management
  • Introduction to FSRM
  • Storage Management with File Server Resource Manager
  • Overview of FSRM
  • Installing and Configuring FSRM
  • Demo - Installing and Configuring FSRM
  • Quota Management
  • Demo - Create and Manage Quotas
  • File Screening
  • Using File Groups
  • Exceptions and Templates
  • Demo - Implementing File Screening
  • Storage Reports
  • Report Tasks
  • Demo - Generating Storage Reports
  • Automatic File Management
  • Topic B: Implementing Classification and File Management Tasks
  • File Classification
  • Classification Rules
  • Demo - Configure File Classification
  • File Management Tasks
  • Topic C: Working with Dynamic Access Control
  • Overview of Dynamic Access Control
  • Dynamic Access Control Scenarios
  • DAC Technologies
  • Understanding Identity
  • Understanding Claims
  • Types of Claims
  • Central Access Policies
  • Policy Components
  • DAC Prerequisites
  • Demo - Implementing DAC
  • Chapter 08 Summary
  • Chapter 08 Review
  • Chapter 08 Quiz

Chapter 09 - Securing the Network Infrastructure

  • Chapter 09 Introduction
  • Topic A: Using the Windows Firewall with Advanced Security
  • Types of Firewalls
  • Well-Known Ports
  • Host-Based Firewall
  • Network Profiles
  • Configuring the Windows Firewall
  • Demo - Working with the Windows Firewall (
  • Topic B: Datacenter Firewall
  • Network Controller
  • Datacenter Firewall
  • Network Security Groups
  • Scenarios for Datacenter Firewall
  • Topic C: Utilizing IP Security
  • Overview of IP Security
  • IPSec Protocols
  • IPSec Usage Scenarios
  • IPSec Configuration Tools
  • Connection Security Rules
  • Understanding Rule Types
  • Rule Endpoints
  • Authentication Settings
  • Authentication Methods
  • Encryption Settings
  • Monitoring Connections
  • Demo - Implementing IPSec
  • Topic D: Configuring Advanced DNS Settings
  • Managing DNS Services
  • Optimizing DNS Name Resolution
  • The GlobalNames Zone
  • Implementing DNS Security
  • DNS Security (DNSSEC)
  • Implementing DNSSEC
  • Demo - Configuring DNSSEC
  • Introducing DNS Policies
  • Implementing DNS Policies
  • RRL Feature
  • Demo - Configuring DNS Policies
  • Topic E: Monitoring Network Traffic
  • Microsoft Message Analyzer
  • Demo - Using Microsoft Message Analyzer
  • Topic F: Securing SMB Traffic
  • SMB 3.1.1 Protocol Security
  • SMB Encryption Requirements
  • Encrypting SMB Shares
  • Disabling Support for SMB 1.0
  • Chapter 09 Summary
  • Chapter 09 Review
  • Chapter 09 Quiz

Entry requirements

Students must have basic literacy and numeracy skills.

Minimum education

Open entry. Previous schooling and academic achievements are not required for entry into this course.

Computer requirements

Students will need access to a computer and the internet. 

Minimum specifications for the computer are:

Windows:

  • Microsoft Windows XP, or later
  • Modern and up to date Browser (Internet Explorer 8 or later, Firefox, Chrome, Safari)

MAC/iOS

  • OSX/iOS 6 or later
  • Modern and up to date Browser (Firefox, Chrome, Safari)

All systems

  • Internet bandwidth of 1Mb or faster
  • Flash player or a browser with HTML5 video capabilities(Currently Internet Explorer 9, Firefox, Chrome, Safari)

Students will also need access the following applications:

Adobe Acrobat Reader

1.  Who are Courses For Success?

Courses For Success is a global course platform that started in 2008 with 5 courses, since then we have grown to over 10,000 online courses. As our courses are delivered online via the internet, we sell our courses worldwide.

Our courses span across many categories including Academic, Animal, Beauty, Business, Career, Counseling, Creative & Media, Health & Therapy, Hobbies & Trades, IT, Personal Development, Sports & Fitness.

Some of the companies we work with include Groupon, Living Social, CNN, Entrepreneur, Mashable, Reed UK, Stack Social and many more.

2.  Is there a refund/cancellation policy?

Yes, we have a 7-day money-back refund guarantee. Just send us an email to email/info)(coursesforsuccess.com with the subject Courses For Success Refund so we can accommodate your request.

3.  What is the FREE Personal Success Training Program?

The Personal Success Training Program was developed by Courses For Success to help our customers achieve success. Currently, we are offering this program for FREE with every course or bundle purchase this month. This is a limited time offer! We have received thousands of reviews for this program, please see: Personal Success Training Program Reviews

4.  Are there any requirements to study this course?

No, anyone who has an interest in learning more about this subject matter is encouraged to take our course. There are no entry requirements to take this course.

5.  Do I require to have finished high school to complete this course?

No, you do not require a High School Diploma or to have finished school to study this course, this course is open to anyone who would like to take this course.

6.  What if English is not my first language?

This course is provided in English, however, due to the digital nature of our training, you can take your time studying the material and make use of tools such as google translate and Grammarly.

7.  Is this course online or conducted in person?

All our courses are accessible online on any device. You may complete them at your own pace and at your own time.

8.  How do I receive my course?

After you have completed the payment, you will receive a confirmation email and tax receipt. You will also receive an email containing your course login details (username and password), as well as instructions on how to access and log in to your course via the internet with any device, please check your junk/spam folder in the event that you do not receive the email.

9.  When does this course start?

Providing you have internet access you can start this course whenever you like, just go to the login page and insert your username and password and you can access the online material.

10.  What is online learning like?

Online learning is easy, if not easier than a traditional academic situation. By studying an online course, the usual boundaries caused by location and time constraints are eliminated, meaning you are free to study where and when you want at your own pace. Of course, you will need to be able to self-manage your time and be organized, but with our help, you’ll soon find yourself settling into a comfortable rhythm of study.

11.  What computer skills do I need for my course?

You don't need to be a computer expert to succeed with our online training, but you should be comfortable typing, using the internet and be capable of using common software (such as Microsoft word).

12.  How long will you have access to the online course?

There is no time limit for completing this course, it can be studied in your own time at your own pace. Once you have purchased this course you will have unlimited lifetime access, meaning you can access this course whenever you want.

13.  How long will my course take?

Please see number of Hours to complete on Course Duration, under course summary.

14.  What is included with the course?

The onetime fee includes all training materials, including online content, diagrams, videos if included, interactive instructions and quizzes, plus you will receive a certificate upon completion.

15.  Do I need to buy textbooks?

All the required material for your course is included in the online system, you do not need to buy anything else.

16.  Is the course interactive?

Yes, all our courses are interactive.

17.  Is there an assessment or exam?

Yes, you will be required to complete a multiple-choice test online at the end of your course, you can do this test as many times as you require.

18.  What type of certificate will I receive?

You will receive a Certificate of Completion that is applicable worldwide, which demonstrates your commitment to learning new skills. You can share the certificate with your friends, relatives, co-workers and potential employers. Also, include it in your resume/CV, professional social media profiles and job applications.

Wendy Sue Hunt - 5 STAR REVIEW
"If you are considering taking any “Courses for Success”, I would highly recommend it. I have always been a firm believer it’s important to always sharpen your skills. You are never too old to learn more. I found the courses very helpful, interesting and easy to understand.
The term “Courses for Success” helped me in my current position to succeed. After completing the courses, I gave my manager the completion certificates. Recently I received a promotion too."
Valencia Marie Aviles - 5 STAR REVIEW
"I had a very good experience with my course. It has helped me to get multiple jobs and prepared me for almost everything I would need to know. The course was very informative and easy to understand and broken up perfectly to be done in a short amount of time while still learning a good amount! I would recommend Courses for Success to anyone trying to get abs certifications for job advancements, it is well worth it!"
ELENA GRIFFIN - 5 STAR REVIEW
"I have absolutely enjoyed the materials from Courses for Success. The materials are easy to understand which makes learning enjoyable. Courses for Success have great topics of interest which make you come back for more.
Thank you Courses for Success for being part of my learning journey and making education affordable!"

Our completion certificates are very valuable and will help you progress in your work environment and show employers how committed you are to learn new skills, you might even get a promotion.

19.  Will this course be credited by universities?

No, it is not equivalent to a college or university credit.

20.  Am I guaranteed to get a job with this certificate?

This course will give you the skills you need to help you obtain employment, but it’s up to you if you get the job or not.

21.  How will this course assist me with my career?

Studying and completing this course will show employers that you have the knowledge in this field, additionally you will gain more confidence in this area of expertise.

22.  How long is the certificate valid for?

The Certificates are valid for life and do not need renewing. 

23.  Can I take more than one course at a time?

Courses are studied online at your own pace and you are free to study as many or as few courses as you wish, we also offer online course bundles that allow you to save on additional courses so that you may get all the topics related to your training goals in one go.

24.  What are the Payment Methods available? Is there a payment plan?

We accept payments via PayPal, Credit Card, Bank Transfer and Amazon Pay for the USA. For payment plans, we offer Sezzle for USA & Canada, Afterpay for Australia & New Zealand. *For faster transaction Credit Card payments are preferred. Please purchase online via our website course product page or contact us at email/info)(coursesforsuccess.com, to pay via bank transfer.

25.  Can I purchase for multiple people?

Yes, you can do this by purchasing individually via website or send us a request via email at email/info)(coursesforsuccess.com

26.  Can I request for an invoice before purchase?

Yes, you can request for an invoice via email at email/info)(coursesforsuccess.com

27.  Purchase for a gift?

Yes, you can purchase this course as a gift, simply send an email to email/info)(coursesforsuccess.com, with the course details and we can accommodate this.

28.  Can I create my own course bundle?

Yes, you can customize your own bundle. Please send us the complete list with the exact course link of the courses you'd like to bundle up via email email/info)(coursesforsuccess.com and we will create them for you. *Each course access, time of completion and certification varies depending on the course type.

29.  How will I contact Courses For Success if I have any questions?

You can contact our support team, at any time through live chat on our website, or email at email/info)(coursesforsuccess.com, or by calling one of our phone numbers depending on which country you are in.  

About this Course

Learn how to secure Windows Server 2016 environments

This training series focuses on how to secure Windows Server 2016 environments. It covers methods and technologies for hardening server environments and securing virtual machine infrastructures using Shielded and encryption-supported virtual machines and Guarded Fabric. In addition, the series covers the protection of Active Directory and identity infrastructure with the Enhanced Security Administrative Environment (ESAE) Administrative Forest design approach and the management of privileged identities using Just-in-Time (JIT) and Just-Enough-Administration (JEA) approaches, along with Privileged Access Workstations (PAWs) and Local Administrator Password Solution (LAPS). The series also covers threat detection solutions, such as auditing, implementing Advanced Threat Analytics (ATA), the understanding of Operations Management Suite (OMS) solutions, and workload-specific security including the use of Nano Server for particular server workloads.

This series will then prepare you to take the MCSE: Cloud Platform and Infrastructure exams. Prior to this, you must complete the 70-740, 70-741, and 70-742 series and take the MCSA: Windows Server 2016 exams.

Course Fast Facts:

  1. Learn the fundamentals of Microsoft 70-744: Securing Windows Server 2016
  2. Comprehensive 10 module Accredited Certificate In Microsoft 70-744: Securing Windows Server 2016 Online Course
  3. Study along with simple instructions & demonstrations
  4. Written and developed by leading Microsoft experts
  5. Receive one-on-one online help & support
  6. Unlimited, lifetime access to online course
  7. Certificate of completion
  8. Study at your own pace with no rigid class timetables, 24/7 from any computer or smart device

Course Delivery

Courses are accessed online  by any device including PC, tablet or Smart Phone. Upon purchase an automated welcome email will be sent to you (please check your junk email inbox if not received as this is an automated email), in order for you to access your online course, which is Available 24/7 on any computer or smart mobile device. 

Recognition & Accreditation

All students who complete this course, receive a certificate of completion and will be issued a certificate via email.

Course Introduction

  • Introduction
  • Course Introduction
  • Instructor Introduction

Chapter 01 - Introduction to Attacks, Breaches, and Detection

  • Chapter 01 Introduction
  • Topic A: Understanding Types of Attacks
  • Assume Breach
  • Methods of Attack
  • Attack Stages
  • Prioritizing Resources
  • Incident Response Strategy
  • Ensuring Compliance
  • Topic B: Detecting Security Breaches
  • Locating Evidence
  • Event Logs
  • Examining Other Configurations
  • Topic C: Using Sysinternals Tools
  • Introducing Sysinternals
  • Demo - Examining Sysinternals Tools
  • System Monitor
  • AccessChk
  • Autoruns
  • LogonSessions
  • Process Explorer
  • Process Monitor
  • Sigcheck
  • Demo - Using Sysinternals Tools
  • Chapter 01 Summary
  • Chapter 01 Review
  • Chapter 01 Quiz

Chapter 02 - Protecting Users and Workstations

  • Chapter 02 Introduction
  • Topic A: User Rights and Privileges
  • Principle of Least Privilege
  • Configuring User Rights
  • Configuring Account Security Options
  • Demo - User Rights and Account Security Options
  • Account Security Controls
  • Complexity Options
  • Password and Lockout Policies
  • Demo - Configuring Account Policies in Group Policy
  • Configuring Fine-Grained Password Policies
  • Understanding PSO Application
  • Protected Users Security Groups
  • Delegating Administrative Control
  • Demo - Delegating Control in AD DS
  • Local Administrator Password Solutions (LAPS)
  • LAPS Requirements
  • LAPS Process
  • Configuring and Managing Passwords
  • Demo - Using LAPS
  • Topic B: Working with Computer and Service Accounts
  • What is a Computer Account?
  • Computer Account Functionality
  • Working with Secure Channel Passwords
  • Service Account Types
  • Group MSAs
  • Demo - Configuring Group MSAs
  • Topic C: Protecting User Credentials
  • Introducing Credential Guard
  • Credential Guard Requirements
  • Configuring Credential Guard
  • Verifying Credential Guard Operation
  • Credential Guard Weaknesses
  • NTLM Blocking
  • Searching AD DS for Problem Accounts
  • Demo - Locating Problem Accounts
  • Topic D: Using Privileged Access Workstations
  • The Need for Privileged Access Workstations
  • Privileged Access Workstations
  • Jump Servers
  • Securing Domain Controllers
  • Chapter 02 Summary
  • Chapter 02 Review
  • Chapter 02 Quiz

Chapter 03 - Managing Administrative Access

  • Chapter 03 Introduction
  • Topic A: Understanding and Deploying JEA
  • Introduction to JEA
  • JEA Components
  • Session Configuration Files
  • Demo - Creating a Session Configuration File
  • Role Capability Files
  • Demo - Create a Role Capability File
  • JEA Endpoints
  • Demo - Creating a JEA Endpoint
  • Connecting to JEA Endpoints
  • Deploying JEA Endpoints
  • Topic B: Using Enhanced Security Administrative Environments (ESAE) Forests
  • ESAE Forests
  • Administrative Tiers
  • ESAE Best Practices
  • The Clean Source Principle
  • Implementing the Clean Source Principle
  • Topic C: Using Microsoft Identity Manager
  • Overview of MIM
  • MIM Requirements
  • MIM Service Accounts
  • Topic D: Using JIT Administration and PAM
  • Overview of JIT Administration
  • Privileged Access Management (PAM)
  • PAM Components
  • Creating an Administrative Forest
  • Configuring Trust Relationships
  • Shadow Principals
  • Configuring the MIM Web Portal
  • Managing and Configuring PAM Roles
  • Chapter 03 Summary
  • Chapter 03 Review
  • Chapter 03 Quiz

Chapter 04 - Configuring Anti-Malware and Patch Management

  • Chapter 04 Introduction
  • Topic A: Configuring and Managing Windows Defender
  • Understanding Malware
  • Malware Sources
  • Mitigation Methods
  • Windows Defender
  • Demo - Using Windows Defender
  • Topic B: Restricting Software
  • Controlling Applications
  • Software Restriction Policies
  • Security Levels
  • AppLocker
  • Support for AppLocker
  • AppLocker Rules
  • Creating Default Rules
  • Demo - Using AppLocker
  • Topic C: Using Device Guard
  • Overview of Device Guard
  • Device Guard Features
  • Configuring Device Guard
  • Device Guard Policies
  • Deploying Code Integrity Policies
  • Control Flow Guard
  • Topic D: Patch Management with WSUS
  • Overview of WSUS
  • Deployment Options
  • Server Requirements
  • Configuring Clients
  • Administering WSUS
  • Approving Updates
  • Demo - Installing and Configuring WSUS
  • Chapter 04 Summary
  • Chapter 04 Review
  • Chapter 04 Quiz

Chapter 05 - Auditing and Advanced Threat Analytics

  • Chapter 05 Introduction
  • Topic A: Configuring Auditing for Windows Server 2016
  • Overview of Auditing
  • The Purpose of Auditing (
  • Types of Events
  • Auditing Goals
  • Auditing File and Object Access
  • Demo - Configuring Auditing
  • Topic B: Advanced Auditing and Management
  • Advanced Auditing
  • Advanced Auditing Subcategories
  • Dynamic Auditing
  • Event Log Subscriptions
  • Audit Collection Services (ACS)
  • Demo - Configuring Event Forwarding (6:59)
  • Start
  • Auditing with Windows PowerShell (1:58)
  • Start
  • Demo - Using PowerShell with Audit Logs
  • Transaction Logging
  • Module Logging
  • Script Block Logging
  • Demo - Configuring PowerShell Logging
  • Topic C: Deploying and Configuring ATA
  • Overview of ATA
  • Usage Scenarios
  • Deployment Requirements
  • ATA Gateways
  • Port Mirroring
  • Configuring ATA Center
  • Topic D: Deploying and Configuring Operations Management Suite
  • Introduction to Operations Management Suite
  • Deployment Overview
  • OMS Solutions
  • Installing OMS
  • OMS Solutions
  • Chapter 05 Summary
  • Chapter 05 Review
  • Chapter 05 Quiz

Chapter 06 - Securing the Infrastructure

  • Chapter 06 Introduction
  • Topic A: Secure the Virtualization Infrastructure
  • Introduction to Guarded Fabric
  • Host Guardian Service
  • Preparing HGS Nodes
  • Installing and Configuring HGS
  • Attestation and Encryption
  • Attestation Methods
  • Initializing HGS
  • Configuring HSG Clients
  • Topic B: Deploying Security Baselines
  • Security Compliance Manager (SCM)
  • SCM Requirements
  • Demo - Installing SCM
  • Demo - Configuring and Deploying Security Baselines
  • Topic C: Deploying Nano Server
  • Planning for Nano Server
  • Understanding Nano Server Roles
  • Installing Nano Server Roles
  • Nano Server Installation
  • Installation Steps
  • Chapter 06 Summary
  • Chapter 06 Review
  • Chapter 06 Quiz

Chapter 07 - Configuring Data Protection

  • Chapter 07 Introduction
  • Topic A: Planning and Implementing File Encryption
  • Introducing Encrypting File System
  • EFS Features
  • Encryption and Decryption
  • Recovering EFS Files
  • Demo - Using EFS
  • Topic B: Planning and Implementing BitLocker
  • Overview of BitLocker
  • BitLocker and TPMs
  • BitLocker Requirements
  • Tools for Configuring and Managing BitLocker
  • Deploying BitLocker
  • Demo - Deploying BitLocker
  • BitLocker on Hyper-V VMs
  • BitLocker and CSVs
  • Enabling BitLocker for CSV
  • Network Unlock
  • Network Unlock Process
  • BitLocker Recovery
  • Microsoft BitLocker Administration and Monitoring (MBAM)
  • Chapter 07 Summary
  • Chapter 07 Review
  • Chapter 07 Quiz

Chapter 08 - Advanced File Server Management

  • Chapter 08 Introduction
  • Topic A: Using File Server Resource Manager
  • Capacity Managemen
  • Storage Management
  • Introduction to FSRM
  • Storage Management with File Server Resource Manager
  • Overview of FSRM
  • Installing and Configuring FSRM
  • Demo - Installing and Configuring FSRM
  • Quota Management
  • Demo - Create and Manage Quotas
  • File Screening
  • Using File Groups
  • Exceptions and Templates
  • Demo - Implementing File Screening
  • Storage Reports
  • Report Tasks
  • Demo - Generating Storage Reports
  • Automatic File Management
  • Topic B: Implementing Classification and File Management Tasks
  • File Classification
  • Classification Rules
  • Demo - Configure File Classification
  • File Management Tasks
  • Topic C: Working with Dynamic Access Control
  • Overview of Dynamic Access Control
  • Dynamic Access Control Scenarios
  • DAC Technologies
  • Understanding Identity
  • Understanding Claims
  • Types of Claims
  • Central Access Policies
  • Policy Components
  • DAC Prerequisites
  • Demo - Implementing DAC
  • Chapter 08 Summary
  • Chapter 08 Review
  • Chapter 08 Quiz

Chapter 09 - Securing the Network Infrastructure

  • Chapter 09 Introduction
  • Topic A: Using the Windows Firewall with Advanced Security
  • Types of Firewalls
  • Well-Known Ports
  • Host-Based Firewall
  • Network Profiles
  • Configuring the Windows Firewall
  • Demo - Working with the Windows Firewall (
  • Topic B: Datacenter Firewall
  • Network Controller
  • Datacenter Firewall
  • Network Security Groups
  • Scenarios for Datacenter Firewall
  • Topic C: Utilizing IP Security
  • Overview of IP Security
  • IPSec Protocols
  • IPSec Usage Scenarios
  • IPSec Configuration Tools
  • Connection Security Rules
  • Understanding Rule Types
  • Rule Endpoints
  • Authentication Settings
  • Authentication Methods
  • Encryption Settings
  • Monitoring Connections
  • Demo - Implementing IPSec
  • Topic D: Configuring Advanced DNS Settings
  • Managing DNS Services
  • Optimizing DNS Name Resolution
  • The GlobalNames Zone
  • Implementing DNS Security
  • DNS Security (DNSSEC)
  • Implementing DNSSEC
  • Demo - Configuring DNSSEC
  • Introducing DNS Policies
  • Implementing DNS Policies
  • RRL Feature
  • Demo - Configuring DNS Policies
  • Topic E: Monitoring Network Traffic
  • Microsoft Message Analyzer
  • Demo - Using Microsoft Message Analyzer
  • Topic F: Securing SMB Traffic
  • SMB 3.1.1 Protocol Security
  • SMB Encryption Requirements
  • Encrypting SMB Shares
  • Disabling Support for SMB 1.0
  • Chapter 09 Summary
  • Chapter 09 Review
  • Chapter 09 Quiz

Entry requirements

Students must have basic literacy and numeracy skills.

Minimum education

Open entry. Previous schooling and academic achievements are not required for entry into this course.

Computer requirements

Students will need access to a computer and the internet. 

Minimum specifications for the computer are:

Windows:

  • Microsoft Windows XP, or later
  • Modern and up to date Browser (Internet Explorer 8 or later, Firefox, Chrome, Safari)

MAC/iOS

  • OSX/iOS 6 or later
  • Modern and up to date Browser (Firefox, Chrome, Safari)

All systems

  • Internet bandwidth of 1Mb or faster
  • Flash player or a browser with HTML5 video capabilities(Currently Internet Explorer 9, Firefox, Chrome, Safari)

Students will also need access the following applications:

Adobe Acrobat Reader

1.  Who are Courses For Success?

Courses For Success is a global course platform that started in 2008 with 5 courses, since then we have grown to over 10,000 online courses. As our courses are delivered online via the internet, we sell our courses worldwide.

Our courses span across many categories including Academic, Animal, Beauty, Business, Career, Counseling, Creative & Media, Health & Therapy, Hobbies & Trades, IT, Personal Development, Sports & Fitness.

Some of the companies we work with include Groupon, Living Social, CNN, Entrepreneur, Mashable, Reed UK, Stack Social and many more.

2.  Is there a refund/cancellation policy?

Yes, we have a 7-day money-back refund guarantee. Just send us an email to email/info)(coursesforsuccess.com with the subject Courses For Success Refund so we can accommodate your request.

3.  What is the FREE Personal Success Training Program?

The Personal Success Training Program was developed by Courses For Success to help our customers achieve success. Currently, we are offering this program for FREE with every course or bundle purchase this month. This is a limited time offer! We have received thousands of reviews for this program, please see: Personal Success Training Program Reviews

4.  Are there any requirements to study this course?

No, anyone who has an interest in learning more about this subject matter is encouraged to take our course. There are no entry requirements to take this course.

5.  Do I require to have finished high school to complete this course?

No, you do not require a High School Diploma or to have finished school to study this course, this course is open to anyone who would like to take this course.

6.  What if English is not my first language?

This course is provided in English, however, due to the digital nature of our training, you can take your time studying the material and make use of tools such as google translate and Grammarly.

7.  Is this course online or conducted in person?

All our courses are accessible online on any device. You may complete them at your own pace and at your own time.

8.  How do I receive my course?

After you have completed the payment, you will receive a confirmation email and tax receipt. You will also receive an email containing your course login details (username and password), as well as instructions on how to access and log in to your course via the internet with any device, please check your junk/spam folder in the event that you do not receive the email.

9.  When does this course start?

Providing you have internet access you can start this course whenever you like, just go to the login page and insert your username and password and you can access the online material.

10.  What is online learning like?

Online learning is easy, if not easier than a traditional academic situation. By studying an online course, the usual boundaries caused by location and time constraints are eliminated, meaning you are free to study where and when you want at your own pace. Of course, you will need to be able to self-manage your time and be organized, but with our help, you’ll soon find yourself settling into a comfortable rhythm of study.

11.  What computer skills do I need for my course?

You don't need to be a computer expert to succeed with our online training, but you should be comfortable typing, using the internet and be capable of using common software (such as Microsoft word).

12.  How long will you have access to the online course?

There is no time limit for completing this course, it can be studied in your own time at your own pace. Once you have purchased this course you will have unlimited lifetime access, meaning you can access this course whenever you want.

13.  How long will my course take?

Please see number of Hours to complete on Course Duration, under course summary.

14.  What is included with the course?

The onetime fee includes all training materials, including online content, diagrams, videos if included, interactive instructions and quizzes, plus you will receive a certificate upon completion.

15.  Do I need to buy textbooks?

All the required material for your course is included in the online system, you do not need to buy anything else.

16.  Is the course interactive?

Yes, all our courses are interactive.

17.  Is there an assessment or exam?

Yes, you will be required to complete a multiple-choice test online at the end of your course, you can do this test as many times as you require.

18.  What type of certificate will I receive?

You will receive a Certificate of Completion that is applicable worldwide, which demonstrates your commitment to learning new skills. You can share the certificate with your friends, relatives, co-workers and potential employers. Also, include it in your resume/CV, professional social media profiles and job applications.

Wendy Sue Hunt - 5 STAR REVIEW
"If you are considering taking any “Courses for Success”, I would highly recommend it. I have always been a firm believer it’s important to always sharpen your skills. You are never too old to learn more. I found the courses very helpful, interesting and easy to understand.
The term “Courses for Success” helped me in my current position to succeed. After completing the courses, I gave my manager the completion certificates. Recently I received a promotion too."
Valencia Marie Aviles - 5 STAR REVIEW
"I had a very good experience with my course. It has helped me to get multiple jobs and prepared me for almost everything I would need to know. The course was very informative and easy to understand and broken up perfectly to be done in a short amount of time while still learning a good amount! I would recommend Courses for Success to anyone trying to get abs certifications for job advancements, it is well worth it!"
ELENA GRIFFIN - 5 STAR REVIEW
"I have absolutely enjoyed the materials from Courses for Success. The materials are easy to understand which makes learning enjoyable. Courses for Success have great topics of interest which make you come back for more.
Thank you Courses for Success for being part of my learning journey and making education affordable!"

Our completion certificates are very valuable and will help you progress in your work environment and show employers how committed you are to learn new skills, you might even get a promotion.

19.  Will this course be credited by universities?

No, it is not equivalent to a college or university credit.

20.  Am I guaranteed to get a job with this certificate?

This course will give you the skills you need to help you obtain employment, but it’s up to you if you get the job or not.

21.  How will this course assist me with my career?

Studying and completing this course will show employers that you have the knowledge in this field, additionally you will gain more confidence in this area of expertise.

22.  How long is the certificate valid for?

The Certificates are valid for life and do not need renewing. 

23.  Can I take more than one course at a time?

Courses are studied online at your own pace and you are free to study as many or as few courses as you wish, we also offer online course bundles that allow you to save on additional courses so that you may get all the topics related to your training goals in one go.

24.  What are the Payment Methods available? Is there a payment plan?

We accept payments via PayPal, Credit Card, Bank Transfer and Amazon Pay for the USA. For payment plans, we offer Sezzle for USA & Canada, Afterpay for Australia & New Zealand. *For faster transaction Credit Card payments are preferred. Please purchase online via our website course product page or contact us at email/info)(coursesforsuccess.com, to pay via bank transfer.

25.  Can I purchase for multiple people?

Yes, you can do this by purchasing individually via website or send us a request via email at email/info)(coursesforsuccess.com

26.  Can I request for an invoice before purchase?

Yes, you can request for an invoice via email at email/info)(coursesforsuccess.com

27.  Purchase for a gift?

Yes, you can purchase this course as a gift, simply send an email to email/info)(coursesforsuccess.com, with the course details and we can accommodate this.

28.  Can I create my own course bundle?

Yes, you can customize your own bundle. Please send us the complete list with the exact course link of the courses you'd like to bundle up via email email/info)(coursesforsuccess.com and we will create them for you. *Each course access, time of completion and certification varies depending on the course type.

29.  How will I contact Courses For Success if I have any questions?

You can contact our support team, at any time through live chat on our website, or email at email/info)(coursesforsuccess.com, or by calling one of our phone numbers depending on which country you are in.  

We provide a 7 Day Money Back Refund on all Courses

Special Offer

 

Receive The Personal Success Training Program FREE, When You Purchase This Course - Limited Time Remaining!  (Value $600)

 

The Personal Success Training Program Helps You Stay Focused To Achieve Your Goals!
Benefits:
  • How to layout a Success Plan.
  • Get where you want to be in life.
  • How to unclutter your mind to succeed.
  • Achieve your dreams using your imagination.
  • How to have faith in yourself.
Features:
  • 12 month online access,  24/7 anywhere.
  • Complement your individual course purchase.
  • Thousands of positive reviews.
  • Limited Time Offer - Ends Soon.
 

Training 2 Or More People?


Empower your business with access to 500+ job & soft skills online training courses.

SUCCESS PRO - For Business

Course Summary

Course ID: 009SRMSWS
Delivery Mode: Online
Access: Unlimited Lifetime
Tutor Support: Yes
Time: Study at your own pace
Duration: 14 Hours
Assessments: Yes
Qualification: Certificate

Popular Courses and Bundles

Get a FREE Career Planner