Microsoft 70-744: Securing Windows Server 2016
4.0 (332 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
2,080 students enrolled

Microsoft 70-744: Securing Windows Server 2016

Windows Server 2016 Certification Prep Course
4.0 (332 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
2,080 students enrolled
Last updated 3/2019
English
English [Auto-generated]
Current price: $129.99 Original price: $199.99 Discount: 35% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 13.5 hours on-demand video
  • 9 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Deploy various security techniques to secure Windows Server
  • Provide a secure application development and a server workload infrastructure
  • Design and deploy security baselines
  • Ensure critical data security
  • Install and configure Windows Firewall and a software-defined distributed firewall
  • Inspect and secure incoming and outgoing network traffic
  • Secure virtualized environment
  • Mitigate and manage malware and threats
  • Monitor and manage threats by using Advanced Threat Analytics (ATA) and Microsoft Operations Management Suite (OMS)
Requirements
  • The students wishing to enroll in this course are desired to have an understanding of the network security tools and techniques.
  • . They are also required to have a know-how of different types of network attacks and how they affect the business processes.
Description

The 70-744: Securing Windows Server 2016 course covers the topic of enhancing the security of the IT infrastructure in detail. At the start, this course focuses on the importance of assuming that network breaches have occurred already, and then goes on to brief the students on how to rectify the breach and protect administrative credentials and rights to make sure that the system administrator can perform the necessary tasks to avoid such occurrences in future.

This course also teaches the in-depth knowledge about mitigation of malware, spyware and other threats that can compromise the security and integrity of any organization’s data. The course teaches the students on how to use the Advanced Threat Analysis feature in Windows Server 2016, securing virtualization platform, and use new deployment options.

The course 70-744: Securing Windows Server 2016 covers the exam topics of the Microsoft exam 70-744. This course is designed to help the aspiring candidates of the said exam. In addition to that, the course is equally helpful for network and system administrators working in a network security job-role. The course helps the students to understand the essential tools and techniques to secure the Windows Server 2016 environments.

This series will then prepare you to take the MCSE: Cloud Platform and Infrastructure exams. Prior to this, you must complete the 70-740, 70-741, and 70-742 series and take the MCSA: Windows Server 2016 exams.

Who this course is for:
  • This course is designed for those IT professionals who are currently working as network or system administrators in their organizations and are responsible to ensure network security.
  • These professionals typically work with networks that are configured as Windows Server domain-based environments, with managed access to the Internet and cloud services.
Course content
Expand all 304 lectures 13:43:50
+ Chapter 01 - Introduction to Attacks, Breaches, and Detection
25 lectures 01:11:14

Download Supporting files here

Preview 01:51
Assume Breach
03:16
Methods of Attack
12:46
Attack Stages
07:01
Prioritizing Resources
03:30
Ensuring Compliance
02:04
Topic B: Detecting Security Breaches
00:21
Locating Evidence
01:40
Event Logs
02:35
Examining Other Configurations
01:56
Topic C: Using Sysinternals Tools
00:22
Introducing Sysinternals
02:31
Demo - Examining Sysinternals Tools
01:52
System Monitor
02:05
AccessChk
01:31
Autoruns
01:35
LogonSessions
01:25
Process Explorer
01:37
Process Monitor
01:27
Demo - Using Sysinternals Tools
13:45
Chapter 01 Summary
01:31
Chapter 01 Review
00:09
Chapter 01 - Quiz
10 questions
+ Chapter 02 - Protecting Users and Workstations
43 lectures 02:21:46

Download Supporting files here

Chapter 02 - Introduction
02:12
Topic A: User Rights and Privileges
00:18
Principle of Least Privilege
05:05
Configuring User Rights
03:24
Configuring Account Security Options
09:33
Demo - User Rights and Account Security Options
16:04
Account Security Controls
02:16
Complexity Options
03:29
Password and Lockout Policies
03:34
Demo - Configuring Account Policies in Group Policy
04:22
Configuring Fine-Grained Password Policies
01:26
Understanding PSO Application
02:55
Protected Users Security Groups
03:22
Delegating Administrative Control
04:12
Demo - Delegating Control in AD DS
06:25
Local Administrator Password Solutions (LAPS)
03:24
LAPS Requirements
01:40
LAPS Process
01:13
Configuring and Managing Passwords
03:40
Demo - Using LAPS
11:06
Topic B: Working with Computer and Service Accounts
00:10
What is a Computer Account?
01:40
Computer Account Functionality
01:19
Working with Secure Channel Passwords
01:54
Service Account Types
02:05
Group MSAs
03:12
Demo - Configuring Group MSAs
08:33
Topic C: Protecting User Credentials
00:10
Introducing Credential Guard
02:13
Credential Guard Requirements
01:30
Configuring Credential Guard
01:17
Verifying Credential Guard Operation
01:22
Credential Guard Weaknesses
01:19
NTLM Blocking
03:33
Searching AD DS for Problem Accounts
02:05
Demo - Locating Problem Accounts
05:42
Topic D: Using Privileged Access Workstations
00:32
The Need for Privileged Access Workstations
01:52
Privileged Access Workstations
01:41
Jump Servers
01:09
Securing Domain Controllers
06:20
Chapter 02 Summary
02:19
Chapter 02 Review
00:09
Chapter 02 - Quiz
10 questions
+ Chapter 03 - Managing Administrative Access
33 lectures 01:11:22

Download Supporting files here

Chapter 03 - Introduction
01:50
Topic A: Understanding and Deploying JEA
00:17
Introduction to JEA
06:01
JEA Components
01:05
Session Configuration Files
03:06
Demo - Creating a Session Configuration File
03:17
Role Capability Files
02:32
Demo - Create a Role Capability File
07:31
JEA Endpoints
01:12
Demo - Creating a JEA Endpoint
02:15
Connecting to JEA Endpoints
01:52
Deploying JEA Endpoints
02:05
Topic B: Using Enhanced Security Administrative Environments (ESAE) Forests
00:17
ESAE Forests
02:34
Administrative Tiers
01:47
ESAE Best Practices
02:41
The Clean Source Principle
02:08
Implementing the Clean Source Principle
02:25
Topic C: Using Microsoft Identity Manager
00:23
Overview of MIM
02:36
MIM Requirements
01:50
MIM Service Accounts
02:51
Topic D: Using JIT Administration and PAM
00:31
Overview of JIT Administration
01:32
Privileged Access Management (PAM)
02:32
PAM Components
02:13
Creating an Administrative Forest
01:26
Configuring Trust Relationships
03:22
Shadow Principals
02:09
Configuring the MIM Web Portal
01:00
Managing and Configuring PAM Roles
01:05
Chapter 03 Summary
02:48
Chapter 03 Review
00:09
Chapter 03 - Quiz
10 questions
+ Chapter 04 - Configuring Anti-Malware and Patch Management
33 lectures 01:30:50

Download Supporting files here

Chapter 04 Introduction
01:45
Topic A: Configuring and Managing Windows Defender
00:08
Understanding Malware
04:43
Malware Sources
01:41
Mitigation Methods
03:26
Windows Defender
01:40
Demo - Using Windows Defender
06:43
Topic B: Restricting Software
00:13
Controlling Applications
01:40
Software Restriction Policies
02:49
Security Levels
01:16
AppLocker
02:40
Support for AppLocker
03:03
AppLocker Rules
01:56
Creating Default Rules
03:01
Demo - Using AppLocker
11:15
Topic C: Using Device Guard
00:14
Overview of Device Guard
02:06
Device Guard Features
02:11
Configuring Device Guard
01:43
Device Guard Policies
02:27
Deploying Code Integrity Policies
01:33
Control Flow Guard
01:24
Topic D: Patch Management with WSUS
00:09
Overview of WSUS
02:25
Deployment Options
02:05
Server Requirements
01:52
Configuring Clients
01:27
Administering WSUS
01:08
Approving Updates
01:47
Demo - Installing and Configuring WSUS
18:04
Chapter 04 Summary
02:07
Chapter 04 Review
00:09
Chapter 04 - Quiz
12 questions
+ Chapter 05 - Auditing and Advanced Threat Analytics
36 lectures 01:27:55

Download Supporting files here

Chapter 05 - Introduction
01:12
Topic A: Configuring Auditing for Windows Server 2016
00:10
Overview of Auditing
01:49
The Purpose of Auditing
01:29
Types of Events
04:49
Auditing Goals
00:56
Auditing File and Object Access
01:52
Demo - Configuring Auditing
10:03
Topic B: Advanced Auditing and Management
00:38
Advanced Auditing
01:11
Advanced Auditing Subcategories
02:40
Dynamic Auditing
02:38
Event Log Subscriptions
02:27
Audit Collection Services (ACS)
02:01
Demo - Configuring Event Forwarding
06:59
Auditing with Windows PowerShell
01:58
Demo - Using PowerShell with Audit Logs
08:00
Transaction Logging
02:02
Module Logging
01:06
Script Block Logging
00:50
Demo - Configuring PowerShell Logging
08:57
Topic C: Deploying and Configuring ATA
00:08
Overview of ATA
02:34
Usage Scenarios
05:08
Deployment Requirements
02:13
ATA Gateways
02:03
Port Mirroring
01:17
Configuring ATA Center
01:38
Topic D: Deploying and Configuring Operations Management Suite
00:06
Introduction to Operations Management Suite
00:53
Deployment Overview
01:40
OMS Solutions
01:32
Installing OMS
01:26
OMS Solutions
01:21
Chapter 05 Summary
01:59
Chapter 05 Review
00:10
Chapter 05 - Quiz
10 questions
+ Chapter 06 - Securing the Infrastructure
23 lectures 43:56

Download Supporting files here

Chapter 06 - Introduction
00:53
Topic A: Secure the Virtualization Infrastructure
00:27
Introduction to Guarded Fabric
03:16
Host Guardian Service
01:31
Preparing HGS Nodes
01:19
Installing and Configuring HGS
02:10
Attestation and Encryption
01:35
Attestation Methods
01:22
Initializing HGS
01:59
Configuring HSG Clients
01:24
Topic B: Deploying Security Baselines
00:07
Security Compliance Manager (SCM)
03:33
SCM Requirements
01:21
Demo - Installing SCM
03:12
Demo - Configuring and Deploying Security Baselines
11:53
Topic C: Deploying Nano Server
00:11
Planning for Nano Server
01:05
Understanding Nano Server Roles
00:45
Installing Nano Server Roles
02:06
Nano Server Installation
01:00
Installation Steps
01:53
Chapter 06 Summary
00:46
Chapter 06 Review
00:08
Chapter 06 - Quiz
10 questions
+ Chapter 07 - Configuring Data Protection
23 lectures 01:03:30

Download Supporting files here

Chapter 07 Introduction
01:49
Topic A: Planning and Implementing File Encryption
00:11
Introducing Encrypting File System
06:35
EFS Features
06:26
Encryption and Decryption
03:47
Recovering EFS Files
02:54
Demo - Using EFS
08:47
Topic B: Planning and Implementing BitLocker
00:13
Overview of BitLocker
03:21
BitLocker and TPMs
02:19
BitLocker Requirements
02:00
Tools for Configuring and Managing BitLocker
01:48
Deploying BitLocker
01:40
Demo - Deploying BitLocker
10:17
BitLocker on Hyper-V VMs
00:41
BitLocker and CSVs
01:42
Enabling BitLocker for CSV
01:08
Network Unlock
01:56
Network Unlock Process
01:12
BitLocker Recovery
03:01
Microsoft BitLocker Administration and Monitoring (MBAM)
00:46
Chapter 07 Summary
00:48
Chapter 07 Review
00:09
Chapter 07 - Quiz
10 questions
+ Chapter 08 - Advanced File Server Management
37 lectures 01:55:07

Download Supporting files here

Chapter 08 Introduction
01:06
Topic A: Using File Server Resource Manager
00:17
Capacity Management
02:51
Storage Management
01:15
Introduction to FSRM
01:16
Storage Management with File Server Resource Manager
00:24
Overview of FSRM
01:14
Installing and Configuring FSRM
01:30
Demo - Installing and Configuring FSRM
05:51
Quota Management
02:53
Demo - Create and Manage Quotas
11:51
File Screening
02:31
Using File Groups
01:54
Exceptions and Templates
01:55
Demo - Implementing File Screening
10:07
Storage Reports
02:12
Report Tasks
00:47
Demo - Generating Storage Reports
06:51
Automatic File Management
01:26
Topic B: Implementing Classification and File Management Tasks
00:11
File Classification
02:23
Classification Rules
01:56
Demo - Configure File Classification
08:06
File Management Task
03:35
Topic C: Working with Dynamic Access Control
00:10
Overview of Dynamic Access Control
02:43
Dynamic Access Control Scenarios
03:37
DAC Technologies
01:13
Understanding Identity
03:12
Understanding Claims
03:14
Types of Claims
02:18
Central Access Policies
01:26
Policy Components
01:35
DAC Prerequisites
03:07
Demo - Implementing DAC
16:09
Chapter 08 Summary
01:52
Chapter 08 Review
00:09
Chapter 08 - Quiz
13 questions
+ Chapter 09 - Securing the Network Infrastructure
48 lectures 02:13:42

Download Supporting files here

Chapter 09 Introduction
02:11
Topic A: Using the Windows Firewall with Advanced Security
00:07
Types of Firewalls
03:47
Well-Known Ports
02:12
Host-Based Firewall
02:24
Network Profiles
02:16
Configuring the Windows Firewall
04:12
Demo - Working with the Windows Firewall
17:44
Topic B: Datacenter Firewall
00:37
Network Controller
02:09
Datacenter Firewall
02:24
Network Security Groups
00:52
Scenarios for Datacenter Firewall
02:20
Topic C: Utilizing IP Security
00:12
Overview of IP Security
02:07
IPSec Protocols
02:07
IPSec Usage Scenarios
04:09
IPSec Configuration Tools
00:59
Connection Security Rules
00:54
Understanding Rule Types
01:38
Rule Endpoints
01:47
Authentication Settings
02:57
Authentication Methods
02:31
Encryption Settings
01:32
Monitoring Connections
00:56
Demo - Implementing IPSec
07:09
Topic D: Configuring Advanced DNS Settings
00:05
Managing DNS Services
03:35
Optimizing DNS Name Resolution
03:17
The GlobalNames Zone
01:37
Implementing DNS Security
04:44
DNS Security (DNSSEC)
01:44
Implementing DNSSEC
02:44
Demo - Configuring DNSSEC
06:54
Introducing DNS Policies
01:46
Implementing DNS Policies
03:11
RRL Feature
03:07
Demo - Configuring DNS Policies
08:41
Topic E: Monitoring Network Traffic
00:04
Microsoft Message Analyzer
02:53
Demo - Using Microsoft Message Analyzer
06:00
Topic F: Securing SMB Traffic
00:30
SMB 3.1.1 Protocol Security
02:12
SMB Encryption Requirements
01:34
Encrypting SMB Shares
01:26
Disabling Support for SMB 1.0
01:23
Chapter 09 Review Summary
01:48
Chapter 09 - Quiz
10 questions
Course Closure
02:14