Windows Server 2008 R2: Hacking and Securing

Learn hacking techniques, secure Windows Server 2008 R2 and protect the system from possible attacks.
3.5 (8 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
240 students enrolled
Take This Course
  • Lectures 36
  • Contents Video: 2.5 hours
  • Skill Level Beginner Level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works


Find online courses made by experts from around the world.


Take your courses with you and learn anywhere, anytime.


Learn and practice real-world skills and achieve your goals.

About This Course

Published 1/2015 English

Course Description

Windows Server 2008 R2: hacking and securing training is dedicated for those who manage Server systems and IT infrastructure: IT administrators, IT managers or project managers.

The course includes topics discussed from the point of view of the administrator and shows you step by step what to do to protect the Windows Server against possible attacks and loss of important data.

  • You will learn how to implement and manage security policies.
  • You will customize security policies for your specific requirements.
  • You will see how to create your own GPO.
  • You will get to know how to automate the deployment of security policies.
  • You will learn how to create the certificate templates which will improve your daily work with Windows Server 2008 R2.
  • You will discover a number of MMC plug-ins to help you properly configure the Windows Server.
  • You will see how to avoid the mistakes when using standard setup wizards.
  • You will learn what are the differences in the methods of authentication and why some of them can be dangerous.
  • You will get to know the methods of data encryption.
  • You will learn the effect of confirming the identity of users and computers.
  • You will discover how to monitor the security level of the system.
  • You'll find out what CAs are.
  • You will learn how to manage certificates and how to process requests to issue such certificates.
  • You will get to know the Administrative Templates.
  • You will see how to analyze the software installed on Windows Server, and how to study its effect on security level.
  • You will learn the tools to analyze installed applications.

What are the requirements?

  • Basic knowledge about Windows Server 2008 R2

What am I going to get from this course?

  • Secure Windows Server 2008 R2
  • Know methods of attacks and weak points of the system
  • Protect important data on server

What is the target audience?

  • IT Students
  • IT managers
  • system administrators

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.


Section 1: Introduction
Let's begin with some theory
System security policy - basics
Section 2: Good practicies in managing server
Server manager - overview and roles
Security Configuration Wizard
SCW: Firewall
SCW: Auditing
Section 3: Security policies
Functionality level
Increasing functional level
Windows security settings
Groups, system services and registry
Security Compliance Manager
SCM: Reviewing options
SCM: Configuring policy
SCM: Managing templates
Section 4: Data and application security
Introduction to data security
Theoretical basics about data and app security
Data encription
Using system mechanisms to protect data
Securing applications with AppLocker
Executable rules
AppLocker in practice
Section 5: Monitoring security level
What you should know about monitoring the security
Let's start with Windows Server Update services
Report viewer
Active Directory
Configuring advanced options
Section 6: Group policy managment
Group Policies
Linking the GPO
Local administrators
Section 7: Certificates
Certificates authority
Using CA
How to issue certificates automaticly
Section 8: Testing configuration
How to check settings in real environment?
CA website
Attack Surface Analyzer
Now it's your turn. Thank you for taking part in our training.

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

IT Security Academy, IT Security Certified Professional

IT Security Academy is a company that associates IT Security Professionals. Now we are proud to share our knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you pratical skills.

Instructor Biography

Hacking School, IT Security Experts - We turn beginners into professionals.

The Hacking School courses are prepared by people who are professionals in what they do. Authors of our courses are well known in the world of computer systems' security. Some of them took part in prominent international IT contests with great results.

We always provide you with up-to-date knowledge on IT security and ethical hacking. By joining us, you become part of a great international community, willing to help you and discuss.

Ready to start learning?
Take This Course