Windows Server 2008 R2: Hacking and Securing
3.3 (12 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
303 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Windows Server 2008 R2: Hacking and Securing to your Wishlist.

Add to Wishlist

Windows Server 2008 R2: Hacking and Securing

Learn hacking techniques, secure Windows Server 2008 R2 and protect the system from possible attacks.
3.3 (12 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
303 students enrolled
Last updated 1/2015
English
Curiosity Sale
Current price: $10 Original price: $100 Discount: 90% off
30-Day Money-Back Guarantee
Includes:
  • 2.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Secure Windows Server 2008 R2
  • Know methods of attacks and weak points of the system
  • Protect important data on server
View Curriculum
Requirements
  • Basic knowledge about Windows Server 2008 R2
Description

LAST UPDATED: JUNE 2017

Windows Server 2008 R2: hacking and securing training is dedicated for those who manage Server systems and IT infrastructure: IT administrators, IT managers or project managers.

The course includes topics discussed from the point of view of the administrator and shows you step by step what to do to protect the Windows Server against possible attacks and loss of important data.

  • You will learn how to implement and manage security policies.
  • You will customize security policies for your specific requirements.
  • You will see how to create your own GPO.
  • You will get to know how to automate the deployment of security policies.
  • You will learn how to create the certificate templates which will improve your daily work with Windows Server 2008 R2.
  • You will discover a number of MMC plug-ins to help you properly configure the Windows Server.
  • You will see how to avoid the mistakes when using standard setup wizards.
  • You will learn what are the differences in the methods of authentication and why some of them can be dangerous.
  • You will get to know the methods of data encryption.
  • You will learn the effect of confirming the identity of users and computers.
  • You will discover how to monitor the security level of the system.
  • You'll find out what CAs are.
  • You will learn how to manage certificates and how to process requests to issue such certificates.
  • You will get to know the Administrative Templates.
  • You will see how to analyze the software installed on Windows Server, and how to study its effect on security level.
  • You will learn the tools to analyze installed applications.
Who is the target audience?
  • IT Students
  • IT managers
  • system administrators
Students Who Viewed This Course Also Viewed
Curriculum For This Course
36 Lectures
02:16:04
+
Good practicies in managing server
4 Lectures 09:31

Security Configuration Wizard
02:31

SCW: Firewall
01:39

SCW: Auditing
02:18
+
Security policies
8 Lectures 25:12
Functionality level
01:06

Increasing functional level
03:53

Windows security settings
06:39

Groups, system services and registry
02:12

Security Compliance Manager
02:35

SCM: Reviewing options
03:28

SCM: Configuring policy
01:54

SCM: Managing templates
03:25
+
Data and application security
7 Lectures 28:10
Introduction to data security
02:16

Theoretical basics about data and app security
04:57

Data encription
06:27

Using system mechanisms to protect data
02:52

Securing applications with AppLocker
02:48

Executable rules
03:16

AppLocker in practice
05:34
+
Monitoring security level
5 Lectures 17:57
What you should know about monitoring the security
03:05

Let's start with Windows Server Update services
03:17

Report viewer
04:48

Active Directory
03:12

Configuring advanced options
03:35
+
Group policy managment
3 Lectures 10:19
Group Policies
04:36

Linking the GPO
03:11

Local administrators
02:32
+
Certificates
3 Lectures 18:55
Certificates authority
09:11

Using CA
06:40

How to issue certificates automaticly
03:04
+
Testing configuration
4 Lectures 16:27
How to check settings in real environment?
05:28

CA website
04:39

Attack Surface Analyzer
02:20

Now it's your turn. Thank you for taking part in our training.
04:00
About the Instructor
IT Security Academy
4.1 Average rating
2,441 Reviews
77,174 Students
25 Courses
IT Security Certified Professional

IT Security Academy is a company that associates IT Security Professionals. Now we are proud to share our knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you pratical skills.

Hacking School
4.1 Average rating
2,073 Reviews
70,256 Students
13 Courses
IT Security Experts - We turn beginners into professionals.

The Hacking School courses are prepared by people who are professionals in what they do. Authors of our courses are well known in the world of computer systems' security. Some of them took part in prominent international IT contests with great results.

We always provide you with up-to-date knowledge on IT security and ethical hacking. By joining us, you become part of a great international community, willing to help you and discuss.