Cademy logoCademy Marketplace

Course Images

Securing Microsoft systems

Securing Microsoft systems

  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • Delivered Online or In-Person

  • You travel to organiser or they travel to you

  • Redhill

  • 3 days

  • All levels

Description

Microsoft security training course description

A hands on training course focusing on security in the Microsoft environment. The course progresses from patch management onto the use of Microsoft security tools. Then server, desktop and network security are studied in the Microsoft environment.

What will you learn
  • Use Microsoft security tools.
  • Secure Microsoft servers.
  • Secure Microsoft desktops.
  • Secure Microsoft networks.
Microsoft security training course details
  • Who will benefit:
  • Technical server support staff.
    Technical desktop support staff.
    Technical network staff.
    Technical security staff.

  • Prerequisites:
  • Supporting Windows server 2016
    Networking Microsoft systems.

  • Duration
  • 3 days

Microsoft security training course contents

  • Introduction
  • Security threats, Microsoft defaults, admin accounts, security patches, patch management, patch tools. Hands on: Studying Microsoft defaults, applying security patches.

  • Microsoft security tools
  • Microsoft updates, WSUS, Inventory tool, baseline security analyser, URLscan, EventCombMT, Cipher security tool, Port reporter, PortQry. Tools hackers use. Hands on: Using Microsoft security tools.

  • Server security
  • Checklists, core server security, AD, Member server security, Domain controller security, Specific roles.
    Hands on Hardening Microsoft servers, security templates.

  • Active Directory
  • Admin authority in AD, group policy, trust and authentication.

  • Desktop security
  • Checklists, core client security, anti virus software, anti spyware software, firewalls, securing clients with AD, securing clients with group policy, software restriction policies.
    Hands on Securing Microsoft desktops.

  • Network security
  • Checklist, IP security, VPNs, PKI, certificate authorities, RAS, RRAS, IAS.
    Hands on: VPN configuration, IAS configuration.

  • Monitoring
  • Auditing, authorisation and logons, tracking, system monitoring, detecting attacks.
    Hands on: Monitoring Microsoft systems.

  • Summary
  • Microsoft security response centre, security advisories.

About The Provider

Tags

Reviews