top of page

Related Courses

Microsoft 70-744 Securing Windows Server 2016 Video Training Course & PDF Guides

Microsoft 70-744 Securing Windows Server 2016 Video Training Course & PDF Guides Download

 

Duration : 13.30 Hours

 

Size : 15.6 GB

 

304 Video Lessons

 

PART-01

 

001 Introduction

002 Course_Introduction

003 Instructor_Introduction

004 Chapter_01_-_Introduction

005 Topic_A_-_Understanding_Types_of_Attacks

006 Assume_Breach

007 Methods_of_Attack

008 Attack_Stages

009 Prioritizing_Resources

010 Incident_Response_Strategy

011 Ensuring_Compliance

012 Topic_B_-_Detecting_Security_Breaches

013 Locating_Evidence

014 Event_Logs

015 Examining_Other_Configurations

016 Topic_C_-_Using_Sysinternals_Tools

017 Introducing_Sysinternals

018 Demo_-_Examining_Sysinternals_Tools

019 System_Monitor

020 AccessChk

021 Autoruns

022 LogonSessions

023 Process_Explorer

024 Process_Monitor

025 Sigcheck

026 Demo_-_Using_Sysinternals_Tools

027 Chapter_01_Summary

028 Chapter_01_Review

029 Chapter_02_-_Introduction

030 Topic_A_-_User_Rights_and_Privileges

031 Principle_of_Least_Privilege

032 Configuring_User_Rights

033 Configuring_Account_Security_Options

034 Demo_-_User_Rights_and_Account_Security_Options

035 Account_Security_Controls

036 Complexity_Options

037 Password_and_Lockout_Policies

038 Demo_-_Configuring_Account_Policies_in_Group_Policy

039 Configuring_Fine-Grained_Password_Policies

040 Understanding_PSO_Application

041 Protected_Users_Security_Groups

042 Delegating_Administrative_Control

043 Demo_-_Delegating_Control_in_AD_DS

044 Local_Administrator_Password_Solutions_LAPS

045 LAPS_Requirements

046 LAPS_Process

047 Configuring_and_Managing_Passwords

048 Demo_-_Using_LAPS

049 Topic_B_-_Working_with_Computer_and_Service_Accounts

050 What_is_a_Computer_Account

 

 

 

PART-02

 

051 Computer_Account_Functionality

052 Working_with_Secure_Channel_Passwords

053 Service_Account_Types

054 Group_MSAs

055 Demo_-_Configuring_Group_MSAs

056 Topic_C_-_Protecting_User_Credentials

057 Introducing_Credential_Guard

058 Credential_Guard_Requirements

059 Configuring_Credential_Guard

060 Verifying_Credential_Guard_Operation

061 Credential_Guard_Weaknesses

062 NTLM_Blocking

063 Searching_AD_DS_for_Problem_Accounts

064 Demo_-_Locating_Problem_Accounts

065 Topic_D_-_Using_Privileged_Access_Workstations

066 The_Need_for_Privileged_Access_Workstations

067 Privileged_Access_Workstations

068 Jump_Servers

069 Securing_Domain_Controllers

070 Chapter_02_Summary

071 Chapter_02_Review

072 Chapter_03_-_Introduction

073 Topic_A_-_Understanding_and_Deploying_JEA

074 Introduction_to_JEA

075 JEA_Components

076 Session_Configuration_Files

077 Demo_-_Creating_a_Session_Configuration_File

078 Role_Capability_Files

079 Demo_-_Create_a_Role_Capability_File

080 JEA_Endpoints

081 Demo_-_Creating_a_JEA_Endpoint

082 Connecting_to_JEA_Endpoints

083 Deploying_JEA_Endpoints

084 Topic_B_-_Using_Enhanced_Security_Administrative_Environments_ESAE_Forests

085 ESAE_Forests

086 Administrative_Tiers

087 ESAE_Best_Practices

088 The_Clean_Source_Principle

089 Implementing_the_Clean_Source_Principle

090 Topic_C_-_Using_Microsoft_Identity_Manager

091 Overview_of_MIM

092 MIM_Requirements

093 MIM_Service_Accounts

094 Topic_D_-_Using_JIT_Administration_and_PAM

095 Overview_of_JIT_Administration

096 Privileged_Access_Management_PAM

097 PAM_Components

098 Creating_an_Administrative_Forest

099 Configuring_Trust_Relationships

100 Shadow_Principals

101 Configuring_the_MIM_Web_Portal

102 Managing_and_Configuring_PAM_Roles

103 Chapter_03_Summary

104 Chapter_03_Review

105 Chapter_04_Introduction

106 Topic_A_-_Configuring_and_Managing_Windows_Defender

107 Understanding_Malware

108 Malware_Sources

109 Mitigation_Methods

110 Windows_Defender

111 Demo_-_Using_Windows_Defender

112 Topic_B_-_Restricting_Software

113 Controlling_Applications

114 Software_Restriction_Policies

115 Security_Levels

116 AppLocker

117 Support_for_AppLocker

118 AppLocker_Rules

119 Creating_Default_Rules

 

 

PART-03

 

120 Demo_-_Using_AppLocker

121 Topic_C_-_Using_Device_Guard

122 Overview_of_Device_Guard

123 Device_Guard_Features

124 Configuring_Device_Guard

125 Device_Guard_Policies

126 Deploying_Code_Integrity_Policies

127 Control_Flow_Guard

128 Topic_D_-_Patch_Management_with_WSUS

129 Overview_of_WSUS

130 Deployment_Options

131 Server_Requirements

132 Configuring_Clients

133 Administering_WSUS

134 Approving_Updates

135 Demo_-_Installing_and_Configuring_WSUS

136 Chapter_04_Summary

137 Chapter_04_Review

138 Chapter_05_-_Introduction

139 Topic_A_-_Configuring_Auditing_for_Windows_Server_2016

 

 

PART-04

 

 

180 Attestation_and_Encryption

181 Attestation_Methods

182 Initializing_HGS

183 Configuring_HSG_Clients

184 Topic_B_-_Deploying_Security_Baselines

185 Security_Compliance_Manager_SCM

186 SCM_Requirements

187 Demo_-_Installing_SCM

188 Demo_-_Installing_SCM

189 Topic_C_-_Deploying_Nano_Server

190 Planning_for_Nano_Server

191 Understanding_Nano_Server_Roles

192 Installing_Nano_Server_Roles

193 Nano_Server_Installation

194 Installation_Steps

195 Chapter_06_Summary

196 Chapter_06_Review

197 Chapter_07_Introduction

198 Topic_A_-_Planning_and_Implementing_File_Encryption

199 Introducing_Encrypting_File_System

200 EFS_Features

201 Encryption_and_Decryption

202 Recovering_EFS_Files

203 Demo_-_Using_EFS

204 Topic_B_-_Planning_and_Implementing_BitLocker

 

 

 

PART-05

 

244 Topic_C_-_Working_with_Dynamic_Access_Control

245 Overview_of_Dynamic_Access_Control

246 Dynamic_Access_Control_Scenarios

247 DAC_Technologies

248 Understanding_Identity

249 Understanding_Claims

250 Types_of_Claims

251 Central_Access_Policies

252 Policy_Components

253 DAC_Prerequisites

254 Demo_-_Implementing_DAC

255 Chapter_08_Summary

 

 

PDF

 

File:Exam Ref 70-744 Securing Windows Server 2016 .pdf

Microsoft 70-744 Securing Windows Server 2016 Video Training Course & PDF Guides

SKU: EXT2021-0078
$12.00Price
  • You can Instant Download a PDF file 

    After successful payment , 

    This PDF File Contains Course Download links

    You can Download This Course immediately from click that Links.

bottom of page