Skip to content

Microsoft 70-744: Securing Windows Server 2016 Exam Prep


Stone River eLearning

Summary

Price
£12 inc VAT
Study method
Online
Duration
14 hours · Self-paced
Qualification
No formal qualification

Overview

This training series focuses on how to secure Windows Server 2016 environments. It covers methods and technologies for hardening server environments and securing virtual machine infrastructures using Shielded and encryption-supported virtual machines and Guarded Fabric. In addition, the series covers the protection of Active Directory and identity infrastructure with the Enhanced Security Administrative Environment (ESAE) Administrative Forest design approach and the management of privileged identities using Just-in-Time (JIT) and Just-Enough-Administration (JEA) approaches, along with Privileged Access Workstations (PAWs) and Local Administrator Password Solution (LAPS). The series also covers threat detection solutions, such as auditing, implementing Advanced Threat Analytics (ATA), the understanding of Operations Management Suite (OMS) solutions, and workload-specific security including the use of Nano Server for particular server workloads.

This series will then prepare you to take the MCSE: Cloud Platform and Infrastructure exams. Prior to this, you must complete the 70-740, 70-741, and 70-742 series and take the MCSA: Windows Server 2016 exams.

What You'll Learn

  • Deploy various security techniques to secure Windows Server
  • Provide a secure application development and a server workload infrastructure
  • Design and deploy security baselines
  • Ensure critical data security
  • Install and configure Windows Firewall and a software-defined distributed firewall
  • Inspect and secure incoming and outgoing network traffic
  • Secure virtualized environment
  • Mitigate and manage malware and threats
  • Monitor and manage threats by using Advanced Threat Analytics (ATA) and Microsoft Operations Management Suite (OMS)

Description

Class Curriculum

Course Introduction
Start Introduction (0:09)
Start Course Introduction (2:55)
Start Instructor Introduction (1:24)
Chapter 01 - Introduction to Attacks, Breaches, and Detection
Start Chapter 01 Introduction (1:51)
Start Topic A: Understanding Types of Attacks (0:23)
Start Assume Breach (3:16)
Start Methods of Attack (12:46)
Start Attack Stages (7:01)
Start Prioritizing Resources (3:30)
Start Incident Response Strategy (2:11)
Start Ensuring Compliance (2:04)
Start Topic B: Detecting Security Breaches (0:21)
Start Locating Evidence (1:40)
Start Event Logs (2:35)
Start Examining Other Configurations (1:56)
Start Topic C: Using Sysinternals Tools (0:22)
Start Introducing Sysinternals (2:31)
Start Demo - Examining Sysinternals Tools (1:51)
Start System Monitor (2:05)
Start AccessChk (1:31)
Start Autoruns (1:34)
Start LogonSessions (1:24)
Start Process Explorer (1:37)
Start Process Monitor (1:27)
Start Sigcheck (1:18)
Start Demo - Using Sysinternals Tools (13:45)
Start Chapter 01 Summary (1:31)
Start Chapter 01 Review (0:09)
Start Chapter 01 Quiz
Chapter 02 - Protecting Users and Workstations
Start Chapter 02 Introduction (2:12)
Start Topic A: User Rights and Privileges (0:18)
Start Topic B: Working with Computer and Service Accounts (0:10)
Start Topic C: Protecting User Credentials (0:10)
Start Topic D: Using Privileged Access Workstations (0:32)
Start Chapter 02 Summary (2:18)
Start Chapter 02 Review (0:09)
Start Chapter 02 Quiz
Chapter 03 - Managing Administrative Access
Start Chapter 03 Introduction (1:50)
Start Topic A: Understanding and Deploying JEA (0:17)
Start Topic B: Using Enhanced Security Administrative Environments Start Topic C: Using Microsoft Identity Manager (0:23)
Start Topic D: Using JIT Administration and PAM (0:31)
Start Chapter 03 Summary (2:48)
Start Chapter 03 Review (0:09)
Start Chapter 03 Quiz
Chapter 04 - Configuring Anti-Malware and Patch Management
Start Chapter 04 Introduction (1:45)
Start Topic A: Configuring and Managing Windows Defender (0:08)
Start Topic B: Restricting Software (0:13)
Start Topic C: Using Device Guard (0:14)
Start Topic D: Patch Management with WSUS (0:09)
Start Chapter 04 Summary (2:07)
Start Chapter 04 Review (0:09)
Start Chapter 04 Quiz
Chapter 05 - Auditing and Advanced Threat Analytics
Start Chapter 05 Introduction (1:12)
Start Topic A: Configuring Auditing for Windows Server 2016 (0:10)
Start Topic B: Advanced Auditing and Management (0:38)
Start Topic C: Deploying and Configuring ATA (0:08)
Start Topic D: Deploying and Configuring Operations Management Suite (0:06)
Start Chapter 05 Summary (1:59)
Start Chapter 05 Review (0:10)
Start Chapter 05 Quiz
Chapter 06 - Securing the Infrastructure
Start Chapter 06 Introduction (0:53)
Start Topic A: Secure the Virtualization Infrastructure (0:27)
Start Topic B: Deploying Security Baselines (0:07)
Start Topic C: Deploying Nano Server (0:12)
Start Chapter 06 Summary (0:46)
Start Chapter 06 Review (0:09)
Start Chapter 06 Quiz
Chapter 07 - Configuring Data Protection
Start Chapter 07 Introduction (1:49)
Start Topic A: Planning and Implementing File Encryption (0:11)
Start Topic B: Planning and Implementing BitLocker (0:13)
Start Chapter 07 Summary (0:48)
Start Chapter 07 Review (0:09)
Start Chapter 07 Quiz
Chapter 08 - Advanced File Server Management
Start Chapter 08 Introduction (1:06)
Start Topic A: Using File Server Resource Manager (0:17)
Start Capacity Management (2:51)
Start Storage Management (1:15)
Start Introduction to FSRM (1:16)
Start Storage Management with File Server Resource Manager (0:24)
Start Overview of FSRM (1:14)
Start Installing and Configuring FSRM (1:30)
Start Demo - Installing and Configuring FSRM (5:51)
Start Quota Management (2:53)
Start Demo - Create and Manage Quotas (11:51)
Start File Screening (2:31)
Start Using File Groups (1:54)
Start Exceptions and Templates (1:55)
Start Demo - Implementing File Screening (10:07)
Start Storage Reports (2:12)
Start Report Tasks (0:47)
Start Demo - Generating Storage Reports (6:51)
Start Automatic File Management (1:26)
Start Topic B: Implementing Classification and File Management Tasks (0:11)
Start File Classification (2:23)
Start Classification Rules (1:56)
Start Demo - Configure File Classification (8:06)
Start File Management Tasks (3:34)
Start Topic C: Working with Dynamic Access Control (0:10)
Start Overview of Dynamic Access Control (2:43)
Start Dynamic Access Control Scenarios (3:37)
Start DAC Technologies (1:13)
Start Understanding Identity (3:12)
Start Understanding Claims (3:14)
Start Types of Claims (2:18)
Start Central Access Policies (1:26)
Start Policy Components (1:35)
Start DAC Prerequisites (3:07)
Start Demo - Implementing DAC (16:09)
Start Chapter 08 Summary (1:51)
Start Chapter 08 Review (0:09)
Start Chapter 08 Quiz
Chapter 09 - Securing the Network Infrastructure
Start Chapter 09 Introduction (2:11)
Start Topic A: Using the Windows Firewall with Advanced Security (0:07)
Start Types of Firewalls (3:47)
Start Well-Known Ports (2:11)
Start Host-Based Firewall (2:24)
Start Network Profiles (2:16)
Start Configuring the Windows Firewall (4:12)
Start Demo - Working with the Windows Firewall (17:44)
Start Topic B: Datacenter Firewall (0:37)
Start Network Controller (2:09)
Start Datacenter Firewall (2:24)
Start Network Security Groups (0:52)
Start Scenarios for Datacenter Firewall (2:19)
Start Topic C: Utilizing IP Security (0:12)
Start Overview of IP Security (2:06)
Start IPSec Protocols (2:07)
Start IPSec Usage Scenarios (4:09)
Start IPSec Configuration Tools (0:59)
Start Connection Security Rules (0:54)
Start Understanding Rule Types (1:38)
Start Rule Endpoints (1:46)
Start Authentication Settings (2:57)
Start Authentication Methods (2:31)
Start Encryption Settings (1:32)
Start Monitoring Connections (0:56)
Start Demo - Implementing IPSec (7:09)
Start Topic D: Configuring Advanced DNS Settings (0:05)
Start Managing DNS Services (3:35)
Start Optimizing DNS Name Resolution (3:17)
Start The GlobalNames Zone (1:37)
Start Implementing DNS Security (4:44)
Start DNS Security (DNSSEC) (1:44)
Start Implementing DNSSEC (2:44)
Start Demo - Configuring DNSSEC (6:54)
Start Introducing DNS Policies (1:46)
Start Implementing DNS Policies (3:11)
Start RRL Feature (3:07)
Start Demo - Configuring DNS Policies (8:41)
Start Topic E: Monitoring Network Traffic (0:04)
Start Microsoft Message Analyzer (2:53)
Start Demo - Using Microsoft Message Analyzer (6:00)
Start Topic F: Securing SMB Traffic (0:30)
Start SMB 3.1.1 Protocol Security (2:12)
Start SMB Encryption Requirements (1:34)
Start Encrypting SMB Shares (1:26)
Start Disabling Support for SMB 1.0 (1:23)
Start Chapter 09 Summary (1:48)
Start Chapter 09 Review (0:09)
Start Chapter 09 Quiz
Start Course Closure (2:14)

Who is this course for?

  • This course is designed for those IT professionals who are currently working as network or system administrators in their organizations and are responsible to ensure network security.
  • These professionals typically work with networks that are configured as Windows Server domain-based environments, with managed access to the Internet and cloud services.

Requirements

  • The students wishing to enroll in this course are desired to have an understanding of the network security tools and techniques.
  • . They are also required to have a know-how of different types of network attacks and how they affect the business processes.

Career path

Network and Server Administrator

Questions and answers

Currently there are no Q&As for this course. Be the first to ask a question.

Reviews

Currently there are no reviews for this course. Be the first to leave a review.

FAQs

Interest free credit agreements provided by Zopa Bank Limited trading as DivideBuy are not regulated by the Financial Conduct Authority and do not fall under the jurisdiction of the Financial Ombudsman Service. Zopa Bank Limited trading as DivideBuy is authorised by the Prudential Regulation Authority and regulated by the Financial Conduct Authority and the Prudential Regulation Authority, and entered on the Financial Services Register (800542). Zopa Bank Limited (10627575) is incorporated in England & Wales and has its registered office at: 1st Floor, Cottons Centre, Tooley Street, London, SE1 2QG. VAT Number 281765280. DivideBuy's trading address is First Floor, Brunswick Court, Brunswick Street, Newcastle-under-Lyme, ST5 1HH. © Zopa Bank Limited 2024. All rights reserved.