[vc_row][vc_column][fancy_heading h1=”0″ style=”line” title=”Windows Server 2016: Strengthen Security `{`20744`}`”][/fancy_heading][/vc_column][/vc_row][vc_row][vc_column][vc_tta_tour style=”modern” shape=”round” color=”sky” spacing=”30″ controls_size=”md” active_section=”1″][vc_tta_section title=”Goals ” tab_id=”1604313113829-5136ad0d-d3a4″][vc_column_text]

  • Acquire the knowledge and skills to strengthen the security of an IT infrastructure.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Public ” tab_id=”1604313113859-5bbf87d0-e9ee”][vc_column_text]System and network engineers.[/vc_column_text][/vc_tta_section][vc_tta_section title=”Prerequisites ” tab_id=”1604313143278-04976038-1a77″][vc_column_text]Have taken the training “Windows Server 2016: Installation, Storage and Virtualization [20740]”, “Windows Server 2016: Network Services [20741]”, and “Windows Server 2016: Identity Management [20742]” or have the knowledge and equivalent skills, understanding of network fundamentals such as TCP / IP, UDP, DNS, AD DS principles and virtualization fundamentals with Hyper-V is fundamental, also have a good understanding of security principles in Windows Server.[/vc_column_text][/vc_tta_section][vc_tta_section title=”Duration ” tab_id=”1604313144473-c739b4d4-25db”][vc_column_text]3 Days.[/vc_column_text][/vc_tta_section][vc_tta_section title=”Pedagogical Methods ” tab_id=”1604313145182-79171c00-202b”][vc_column_text]Practical exercises and demonstrations will allow you to put into practice the theoretical concepts presented.

For “distance” training, they are carried out with a Teams or Zoom type videoconferencing tool, depending on the case, allowing the trainer to adapt his teaching methods.
Find all the details on distance sessions or virtual classes on our website.[/vc_column_text][/vc_tta_section][vc_tta_section title=”Programs ” tab_id=”1604313146077-d51d978b-5175″][vc_column_text]Detect breaks using Sysinternals

General Sysinternals tools

Protect credentials and privileged access

User rights Computer and service accounts Identifier protection Dedicated stations and intermediate servers Deployment of a local administrator password management solution

Limit administrator rights with JEA (Just Enough Administration)

DescriptionImplementation and deployment

Manage privileged access and administrative forests

The concept of administrative forest Introduction to Microsoft Identity Manager “Just In Time” administration and privileged access management with Microsoft Identity Manager

Limit malware and threats

Configuring and Managing Microsoft Defender Software Restrictions Policies and AppLocker Configuring and Using Device Guard Using and Deploying the Enhanced Mitigation Experience Toolkit

Analyze activity using advanced verification

Introduction: System Auditing Advanced Auditing Strategies Auditing and Recording PowerShell Sessions

Analyze activity with Microsoft Advanced Threat Analytics (ATA) and Operations Management Suite (OMS) functionality

Advanced Threat AnalyticsIntro to OMS

Secure your virtualized infrastructure

Protected infrastructure (Guarded Fabric) Encrypted (encryption-supported) and shielded (shielded) virtual machines

Ensure application development and server load infrastructure

Security Compliance Manager Nano ServerContainers

Protect data with encryption

Planning and Implementing Encrypting File System (EFS) Planning and Implementing BitLocker

Limit access to files and folders

File Server Resource Manager (FSRM) Automation of file management and classification Dynamic Access Control

Control network flows by means of firewalls

Windows Firewall Distributed Firewalls

Secure network traffic

Network Threats and Connection Security Rules Advanced DNS Settings Network Traffic Analysis with Microsoft Message Analyzer SMB Traffic Security and Analysis

Windows Server Update

WSU Overview Deploying Updates with WSUS[/vc_column_text][/vc_tta_section][vc_tta_section title=”Register for training” tab_id=”1604313146793-30c9db1d-85ea”][vc_column_text]