MCSE Securing Windows Server 2016 (70-744)



Disclaimer: Tech-Act is an independent training services provider. Any use of third party trademarks, brand names, products and services is only referential.Tech-Act disclaims any sponsorship, affiliation or endorsement of or by any third parties. Tech-Act is an authorized training partner only where explicitly stated and as listed here.



REQUEST INFORMATION

IT Certification Training Courses
mta certification
microsoft technology associate certification
mcsa certification

MCSE Securing Windows Server 2016 (70-744)


About This Course

This course is developed to instill in-depth skills and knowledge to help you secure and protect IT infrastructure in enterprise IT ecosystem. The coursework focuses on concepts and methodologies to help you mitigate security/malware threats, configure admin credentials, utilize threat analysis techniques to identify security vulnerabilities. The course also teaches you to use DAC (dynamic access control) and encryption to restrict data access. Identify network threats and learn to protect admin rights and credentials with this course.

Learn to use auditing techniques along with advanced threat analysis tool in Windows Server 2016 to identify potential security problems. Learn to secure virtualization platforms, utilize deployment techniques like Nano server, containers, etc. to improve Windows Server 2016 security.


Who Should Attend This Course

The course is ideal for IT professionals who work with Windows Server who seek to hone their expertise and skills to securing Windows Server 2016 infrastructure in an enterprise IT ecosystem.


Why This Course

This course is your gateway to stand out from the crowd when it comes to securing Windows Server 2016. Hone the skills and expertise needed to secure and protect IT infrastructure for enterprise ecosystem with this course.

Since we know that enterprises all over the world are grappled with cybersecurity issues and cyber-attacks, which is the reason for the rise in the demand for security experts. Having a Microsoft certification is like icing on the cake in this scenario, as it will give you that competitive edge to secure a job with better pay prospects.

Securing Windows Server 2016 from Tech-Act is all that you need to master the skills to secure Windows Server 2016 infrastructure. Here are some exciting reasons to why Securing Windows Server 2016:

  • In huge demand
  • Microsoft certified thus, globally recognized

Helps you turn a master in:

  • Securing admin credentials
  • Deploying access workstations
  • Restricting admin rights
  • Managing access rights
  • Addressing and mitigating threats and malware
  • Analyzing activities using auditing techniques
  • Implementing and configuring advance level threat analysis methods
  • Configuring virtual machines and platforms
  • Utilizing containers and security compliance toolkit to enhance security
  • Protecting Windows Server 2016 data
  • Securing and optimizing file services
  • Securing and protecting network traffic using encryption and firewalls
  • Protecting network traffic using message analyzer and DNSSEC.

Course Objectives

This course will help you to:

  • Protect admin credentials and access
  • Deploy and configure server administration
  • Implement privileged access rights
  • Mitigate security and malware threats
  • Configure devices
  • Understand advance level threat analytics
  • Secure virtualization
  • Secure workload infrastructure
  • Secure server data using encryption and DAC
  • Use firewall for controlling network traffic
  • Update Windows Server

Prerequisites

Professionals who seek to enroll for this course are recommended to possess some amount of working knowledge pertaining to:

  • Windows Server security concepts
  • Networking basics including DNS, UDP and TCP/IP
  • Active directory domain services
  • Microsoft Hyper V Virtualization basics

Course Benefits


Professionals after completing this course will be able to:

  • Secure admin credentials
  • Deploy access workstations
  • Restrict admin rights
  • Manage access rights
  • Address and mitigate threats and malware
  • Analyze activities using auditing techniques
  • Implement and configure advance level threat analysis methods
  • Configure virtual machines and platforms
  • Utilize containers and security compliance toolkit to enhance security
  • Protect data
  • Secure and optimize file services
  • Secure and protect network traffic using encryption and firewalls
  • Protect network traffic using message analyzer and DNSSEC
  • Update Windows Server 2016

Curriculum


Windows Server 2016

Overview

This section covers how to mitigate malware threats, identify security issues by using Auditing and the Advanced Threat Analysis feature in Windows Server 2016. It demonstrates how to secure virtualization platform, use new deployment options, such as Nano server and containers to enhance security and how to protect access to files by using encryption and dynamic access control. 

Security Overview

This section provides a high level security overview. It explains what a bad vector is and other several attack vectors. It also covers different phases in an attack and phases associated with incident response.

Credentials and privileged access

Credentials and Privileged Access

This section explains fundamental components related to security. It discusses the concepts such as the principle of least privilege, cryptography options as well as password policies and settings.It demonstrates how to create an authentication policy.

Just Enough Administration

Implement Just Enough Administration

This section introduces a functionality called just enough administration (JEA). JEA provides RBAC functionality built on PowerShell remoting. It explains two important prerequisite files and how to create them. It also covers JEA endpoints and walks through the steps for settings.

Implementing ESAE

This section discusses Enhanced Security Administrative Environment (ESAE). It also explains architectural approach, administrative Active Directory, forest hosts privileged accounts, privileged groups and privileged access workstations.

Implementing JIT

This section covers Just in Time Administration. It explains self-service in terms of maintenance such as self-service password reset, role management and assignment and more all packaged within Microsoft Identity Manager (MIM). It also demonstrates how Privileged Access Management (PAM) can leverage ESAE framework to enable permission assignment to user accounts for a finite amount of time.

Implement malware protection

Implementing Malware Protection

This setion covers The Enhanced Mitigation Experience Toolkit (EMET). It explains pre-installation considerations and deployment options. It also shows set up,configuration options and how to use different graphical skins.

Configure Advanced Audit Policies

Configure advanced audit policies

This section gives an overview of audit policies. It explains what an organization needs to audit and how to create an audit policy in addition to advanced settings.

Create security baselines using SCM

This section explains benefits of using security baselines via security compliance manager (SCM). It shows where to obtain the download and addresses, how to get the tools up and running in addition to other complimentary tools.

Install and Configure Microsoft ATA

Install and Configure Microsoft ATA

This section introduces a Network Intrusion Detection System (NIDS) and gateway architecture. It demonstrates how to install and set up the ATA Center and the web interface.

Determine Threat Solution Using OMS

Determine threat solutions using OMS

This section introduces Microsoft Operations Management Suite. It explains how to use this tool and what type of deployment scenarios would be appropriate.

Secure a Virtualization Infrastructure

Secure a Virtualization Infrastructure

This section covers how to mitigate malware threats, identify security issues by using Auditing and the Advanced Threat Analysis feature in Windows Server 2016. It demonstrates how to secure virtualization platform, use new deployment options, such as Nano server and containers to enhance security and how to protect access to files by using encryption and dynamic access control.

Nano Servers and Containers

Nano Servers and Containers

This section covers how to mitigate malware threats, identify security issues by using Auditing and the Advanced Threat Analysis feature in Windows Server 2016. It demonstrates how to secure virtualization platform, use new deployment options, such as Nano server and containers to enhance security and how to protect access to files by using encryption and dynamic access control.

Configuring Disk and File Encryption

Configure disk and file encryption

This section discusses symmetric and asymmetric encryption. It demonstrates how to encrypt a folder or file using EFS. It also shows how to designate an EFS RA, Recovery Agent, to have a secondary certificate holder for backup access.

Implement FSRM and DAC

Implement FSRM and DAC

This section introduces File Server Resource Manager (FSRM). It explains how it can be installed in GUI as well as in PowerShell. It also demonstrates how to configure components to implement classification and automation of management tasks.

Configure Windows Firewall

Configure Windows Firewall

This section covers how to mitigate malware threats, identify security issues by using Auditing and the Advanced Threat Analysis feature in Windows Server 2016. It demonstrates how to secure virtualization platform, use new deployment options, such as Nano server and containers to enhance security and how to protect access to files by using encryption and dynamic access control.

Implement Server Patching and Updating

Implement Server Patching and Updating

This section discusses how server patching and update solutions can be achieved by setting up Windows Service Update Services (WSUS). It covers the the steps for set up and different deployment options to both small and large businesses. It explains requirements and terminology to assist planning for the deployments.

Secure Network Traffic

Secure Network Traffic

This section covers how to mitigate malware threats, identify security issues by using Auditing and the Advanced Threat Analysis feature in Windows Server 2016. It demonstrates how to secure virtualization platform, use new deployment options, such as Nano server and containers to enhance security and how to protect access to files by using encryption and dynamic access control.

Schedule & Fees


Online Instructor Led MCSE Securing Windows Server 2016 (70-744) Certification Training


Please contact us for more information on course fees and upcoming batch schedule.

Course FAQ


Why Tech-Act for Administering and Deploying System Center 2012 Configuration Manager Course?

Organizations all across the globe are enduring from a rising number of cyber -attacks and threats. As these threats evolve, the demand for security professionals too is skyrocketing at a fast pace. Securing Windows Server 2016 certification help validate an individual’s skills to secure, protect and deal with threats and attacks on Windows Server 2016.

Tech-Act, being a known name in the IT world, makes sure that all the trainers are industry certified and highly experienced from the best universities. Moreover, the coursework for this certification is developed in a learning- friendly way. The training covers all the necessary skills for becoming a Windows Server 2016 security expert. Most importantly, you can pick the pace of your training.

We are a recognized learning center forCompTIA, EC Council and Pearson Vue with both traditional and online learning facilities.

What are the key benefits Securing Windows Server 2016 course?

Professionals opting for this course will learn to:

  • Secure admin credentials
  • Deploy access workstations
  • Restrict admin rights
  • Manage access rights
  • Address and mitigate threats and malware
  • Analyze activities using auditing techniques
  • Implement and configure advance level threat analysis methods
  • Configure virtual machines and platforms
  • Utilize containers and security compliance toolkit to enhance security
  • Protect data
  • Secure and optimize file services
  • Secure and protect network traffic using encryption and firewalls
  • Protect network traffic using message analyzer and DNSSEC
  • Update Windows Server 2016

Do you have certified trainers onboard?

Yes, trainers at Tech-Act are industry certified to deliver the best learning experience with cool videos, quizzes and tools.

What is the eligibility criteria to enroll for Cloud Fundamentals course?

Professionals who seek to enroll for this course are recommended to possess some amount of working knowledge pertaining to:

  • Windows Server security concepts
  • Networking basics including DNS, UDP and TCP/IP
  • Active directory domain services
  • Microsoft Hyper V Virtualization basics

The course is ideal for IT professionals who work with Windows Server who seek to hone their expertise and skills to securing Windows Server 2016 infrastructure in an enterprise IT ecosystem.

Testimonials



0

Your Cart

REQUEST INFORMATION