Microsoft 70-744 Securing Windows Server 2016 Video Training Course & PDF Guides Download
Duration : 13.30 Hours
Size : 15.6 GB
304 Video Lessons
PART-01
001 Introduction
002 Course_Introduction
003 Instructor_Introduction
004 Chapter_01_-_Introduction
005 Topic_A_-_Understanding_Types_of_Attacks
006 Assume_Breach
007 Methods_of_Attack
008 Attack_Stages
009 Prioritizing_Resources
010 Incident_Response_Strategy
011 Ensuring_Compliance
012 Topic_B_-_Detecting_Security_Breaches
013 Locating_Evidence
014 Event_Logs
015 Examining_Other_Configurations
016 Topic_C_-_Using_Sysinternals_Tools
017 Introducing_Sysinternals
018 Demo_-_Examining_Sysinternals_Tools
019 System_Monitor
020 AccessChk
021 Autoruns
022 LogonSessions
023 Process_Explorer
024 Process_Monitor
025 Sigcheck
026 Demo_-_Using_Sysinternals_Tools
027 Chapter_01_Summary
028 Chapter_01_Review
029 Chapter_02_-_Introduction
030 Topic_A_-_User_Rights_and_Privileges
031 Principle_of_Least_Privilege
032 Configuring_User_Rights
033 Configuring_Account_Security_Options
034 Demo_-_User_Rights_and_Account_Security_Options
035 Account_Security_Controls
036 Complexity_Options
037 Password_and_Lockout_Policies
038 Demo_-_Configuring_Account_Policies_in_Group_Policy
039 Configuring_Fine-Grained_Password_Policies
040 Understanding_PSO_Application
041 Protected_Users_Security_Groups
042 Delegating_Administrative_Control
043 Demo_-_Delegating_Control_in_AD_DS
044 Local_Administrator_Password_Solutions_LAPS
045 LAPS_Requirements
046 LAPS_Process
047 Configuring_and_Managing_Passwords
048 Demo_-_Using_LAPS
049 Topic_B_-_Working_with_Computer_and_Service_Accounts
050 What_is_a_Computer_Account
PART-02
051 Computer_Account_Functionality
052 Working_with_Secure_Channel_Passwords
053 Service_Account_Types
054 Group_MSAs
055 Demo_-_Configuring_Group_MSAs
056 Topic_C_-_Protecting_User_Credentials
057 Introducing_Credential_Guard
058 Credential_Guard_Requirements
059 Configuring_Credential_Guard
060 Verifying_Credential_Guard_Operation
061 Credential_Guard_Weaknesses
062 NTLM_Blocking
063 Searching_AD_DS_for_Problem_Accounts
064 Demo_-_Locating_Problem_Accounts
065 Topic_D_-_Using_Privileged_Access_Workstations
066 The_Need_for_Privileged_Access_Workstations
067 Privileged_Access_Workstations
068 Jump_Servers
069 Securing_Domain_Controllers
070 Chapter_02_Summary
071 Chapter_02_Review
072 Chapter_03_-_Introduction
073 Topic_A_-_Understanding_and_Deploying_JEA
074 Introduction_to_JEA
075 JEA_Components
076 Session_Configuration_Files
077 Demo_-_Creating_a_Session_Configuration_File
078 Role_Capability_Files
079 Demo_-_Create_a_Role_Capability_File
080 JEA_Endpoints
081 Demo_-_Creating_a_JEA_Endpoint
082 Connecting_to_JEA_Endpoints
083 Deploying_JEA_Endpoints
084 Topic_B_-_Using_Enhanced_Security_Administrative_Environments_ESAE_Forests
085 ESAE_Forests
086 Administrative_Tiers
087 ESAE_Best_Practices
088 The_Clean_Source_Principle
089 Implementing_the_Clean_Source_Principle
090 Topic_C_-_Using_Microsoft_Identity_Manager
091 Overview_of_MIM
092 MIM_Requirements
093 MIM_Service_Accounts
094 Topic_D_-_Using_JIT_Administration_and_PAM
095 Overview_of_JIT_Administration
096 Privileged_Access_Management_PAM
097 PAM_Components
098 Creating_an_Administrative_Forest
099 Configuring_Trust_Relationships
100 Shadow_Principals
101 Configuring_the_MIM_Web_Portal
102 Managing_and_Configuring_PAM_Roles
103 Chapter_03_Summary
104 Chapter_03_Review
105 Chapter_04_Introduction
106 Topic_A_-_Configuring_and_Managing_Windows_Defender
107 Understanding_Malware
108 Malware_Sources
109 Mitigation_Methods
110 Windows_Defender
111 Demo_-_Using_Windows_Defender
112 Topic_B_-_Restricting_Software
113 Controlling_Applications
114 Software_Restriction_Policies
115 Security_Levels
116 AppLocker
117 Support_for_AppLocker
118 AppLocker_Rules
119 Creating_Default_Rules
PART-03
120 Demo_-_Using_AppLocker
121 Topic_C_-_Using_Device_Guard
122 Overview_of_Device_Guard
123 Device_Guard_Features
124 Configuring_Device_Guard
125 Device_Guard_Policies
126 Deploying_Code_Integrity_Policies
127 Control_Flow_Guard
128 Topic_D_-_Patch_Management_with_WSUS
129 Overview_of_WSUS
130 Deployment_Options
131 Server_Requirements
132 Configuring_Clients
133 Administering_WSUS
134 Approving_Updates
135 Demo_-_Installing_and_Configuring_WSUS
136 Chapter_04_Summary
137 Chapter_04_Review
138 Chapter_05_-_Introduction
139 Topic_A_-_Configuring_Auditing_for_Windows_Server_2016
PART-04
180 Attestation_and_Encryption
181 Attestation_Methods
182 Initializing_HGS
183 Configuring_HSG_Clients
184 Topic_B_-_Deploying_Security_Baselines
185 Security_Compliance_Manager_SCM
186 SCM_Requirements
187 Demo_-_Installing_SCM
188 Demo_-_Installing_SCM
189 Topic_C_-_Deploying_Nano_Server
190 Planning_for_Nano_Server
191 Understanding_Nano_Server_Roles
192 Installing_Nano_Server_Roles
193 Nano_Server_Installation
194 Installation_Steps
195 Chapter_06_Summary
196 Chapter_06_Review
197 Chapter_07_Introduction
198 Topic_A_-_Planning_and_Implementing_File_Encryption
199 Introducing_Encrypting_File_System
200 EFS_Features
201 Encryption_and_Decryption
202 Recovering_EFS_Files
203 Demo_-_Using_EFS
204 Topic_B_-_Planning_and_Implementing_BitLocker
PART-05
244 Topic_C_-_Working_with_Dynamic_Access_Control
245 Overview_of_Dynamic_Access_Control
246 Dynamic_Access_Control_Scenarios
247 DAC_Technologies
248 Understanding_Identity
249 Understanding_Claims
250 Types_of_Claims
251 Central_Access_Policies
252 Policy_Components
253 DAC_Prerequisites
254 Demo_-_Implementing_DAC
255 Chapter_08_Summary
File:Exam Ref 70-744 Securing Windows Server 2016 .pdf
Microsoft 70-744 Securing Windows Server 2016 Video Training Course & PDF Guides
You can Instant Download a PDF file
After successful payment ,
This PDF File Contains Course Download links
You can Download This Course immediately from click that Links.










































