fbpx

Microsoft 20744: Securing Windows Server 2016

Microsoft 20744 Securing Windows Server 2016 Course

Microsoft 20744 Securing Windows Server 2016 Training

The Microsoft 20744 Securing Windows Server 2016 course is 5 days hands-on training course.

The 20744 Securing Windows Server 2016 training course provides training to IT professionals to enhance the security of the Windows Server 2016 IT infrastructure that they administer. The 20744 Securing Windows Server 2016 training course emphasises the importance of assuming that network breaches have occurred and then teaches students to protect administrative credentials and rights to ensure that administrators can perform only the tasks that they need to when they need to.

This 20744 Securing Windows Server 2016 training course provides auditing and the Advanced Threat Analysis feature in Windows Server 2016 to determine security issues.

Students will learn mitigation of malware threats, secure your virtualization platform, and use deployment options. The course covers encryption and dynamic access control, and how you can enhance your network’s security.

Practical understanding of networking fundamentals, including TCP/IP, User Datagram Protocol (UDP), and Domain Name System (DNS), Active Directory Domain Services (AD DS) principles, Microsoft Hyper-V virtualization fundamentals and Windows Server security principles.

There is no certification exam associated with this course.

Logitrain Microsoft 20744  Securing Windows Server 2016 course material

  • Secure Windows Server
  • Protect credentials and implement privileged access workstations
  • Limit administrator rights with Just Enough Administration
  • Manage privileged access
  • Mitigate malware and threats
  • Analyze activity with advanced auditing and log analytics
  • Deploy and configure Advanced Threat Analytics and Microsoft Operations Management Suite
  • Configure Guarded Fabric virtual machines (VMs)
  • Use the Security Compliance Toolkit (SCT) and containers to improve security
  • Plan and protect data
  • Optimize and secure file services
  • Secure network traffic with firewalls and encryption
  • Secure network traffic by using DNSSEC and Message Analyzer

 

This course is likely to add to the employment-related skills of the participants. The skills developed are likely to be used in the course of being an employee or working in a business.

  • Technical Consultants – Office 365
  • IT Support Officers
  • IT Consultants
  • Technical Specialists: Identity and Access Management
  • IT Helpdesk Support Officers
  • Infrastructure Support Officers
  • IT Service Desk Coordinators
  • Technology Support Coordinators
  • Understanding attacks
  • Detecting security breaches
  • Examining activity with the Sysinternals tool
  • Basic breach detection and incident response strategies
  • Identifying attack types
  • Exploring the Sysinternals tools
  • Understanding user rights
  • Computer and service accounts
  • Protecting credentials
  • Privileged-Access Workstations and jump servers
  • Local administrator-password solution
  • Implementing user rights, security options, and group-managed service accounts
  • Configuring user right and account-security options
  • Delegating privileges
  • Creating and managing group managed service accounts
  • Locating problematic accounts
  • Configuring and deploying LAPs
  • Installing and configuring LAPs
  • Deploying and testing LAPs
  • Understanding JEA
  • Verifying and deploying JEA
  • Limiting administrator privileges with JEA
  • Creating a role-capability file
  • Creating a session-configuration file
  • Creating a JEA endpoint
  • Connecting and testing a JEA endpoint
  • Deploying a JEA configuration to another computer
  • ESAE forests
  • Overview of Microsoft Identity Manager
  • Overview of JIT administration and PAM
  • Limiting administrator privileges with PAM
  • Layered approach to security
  • Configuring trust relationships and shadow principals
  • Requesting privileged access
  • Managing PAM roles
  • Configuring and managing Windows Defender
  • Restricting software
  • Configuring and using the Device Guard feature
  • Securing applications by using AppLocker, Windows Defender, Device Guard Rules, and the EMET.
  • Configuring Windows Defender
  • Configuring AppLocker
  • Configuring Device Guard
  • Overview of auditing
  • Advanced auditing
  • Windows PowerShell auditing and logging
  • Configuring advanced auditing
  • Configuring auditing of file-system access
  • Auditing domain sign-ins
  • Managing advanced audit policy configuration
  • Windows PowerShell logging and auditing
  • Deploying and configuring ATA
  • Deploying and configuring Microsoft Operations Management Suite
  • Deploying and configuring Azure Security Center
  • Deploying ATA and Microsoft Operations Management Suite
  • Preparing and deploying ATA
  • Preparing and deploying Microsoft Operations Management Suite
  • Deploying and configuring Azure Security Center
  • Guarded Fabric
  • Shielded and encryption-supported virtual machines
  • Guarded Fabric with administrator-trusted attestation and shielded VMs
  • Deploying a guarded fabric with administrator-trusted attestation
  • Deploying a shielded VM
  • Using SCT
  • Understanding containers
  • Using SCT
  • Configuring a security baseline for Windows Server 2016
  • Deploying a security baseline for Windows Server 2016
  • Deploying and Configuring containers
  • Deploying and managing a Windows container
  • Planning and implementing encryption
  • Planning and implementing BitLocker
  • Protecting data by using Azure Information Protection
  • Protecting data by using encryption and BitLocker
  • Encrypting and recovering access to encrypted files
  • Using BitLocker to protect data
  • File Server Resource Manager
  • Implementing classification and file-management tasks
  • Dynamic Access Control
  • Quotas and file screening
  • Configuring File Server Resource Manager quotas
  • Configuring file screening and storage reports
  • Implementing Dynamic Access Control
  • Preparing for implementing Dynamic Access Control
  • Implementing Dynamic Access Control
  • Validating and remediating Dynamic Access Control
  • Understanding network-related security threats
  • Understanding Windows Firewall with Advanced Security
  • Configuring IPsec
  • Datacenter Firewall
  • Configuring Windows Firewall with Advanced Security
  • Creating and testing inbound rules
  • Creating and testing outbound rules
  • Creating and testing connection security rule
  • Configuring advanced DNS settings
  • Examining network traffic with Microsoft Message Analyzer
  • Securing SMB traffic, and analysing SMB traffic
  • Securing DNS
  • Configuring and testing DNSSEC
  • Configuring DNS policies and RRL
  • Microsoft Message Analyzer and SMB encryption
  • Installing and using Message Analyzer
  • Configuring and verifying SMB encryption on SMB shares
Get our expert trainers at your premises. Logitrain Customised Team can tailor the course to meet your organisation's specific learning and development needs and business goals.
  • Date Format: DD dash MM dash YYYY
  • This field is for validation purposes and should be left unchanged.
Request Information
  • five star ratings
    High-quality, cost-effective training since 2004
  • This field is for validation purposes and should be left unchanged.

What is included with the Microsoft 20744 Securing Windows Server 2016 Course?

Logitrain course includes official certification exam fee.
Certificate of Attendance

Get a Certificate of Attendance to prove your commitment to learning

Logitrain is an Authorised Pearson VUE Test Centre.
No Exam Required

This training course does not have any exam associated with it

Logitrain courses, programs and packages includes course material.
Includes Course Material

Course material in digital format is included for flexibility and ease of use

Logitrain courses, packages and programs includes sample practise questions.
Includes Practise Questions

Practise questions are provided for better understanding of the key concepts

Skilled Trainers
Instructor-led Training

Attend the course with an instructor at our training center or from anywhere

Logitrain courses include price beat guarantee.
Our Price Beat Guarantee

Relax, we will beat competitor’s advertised price in Australia. Our course has no extra costs

Dates, Locations & Prices
Logitrain Live Online Training Banner

Location Type Duration Price Dates
Location Type Duration Price Dates

The supply of this course/package/program is governed by our terms and conditions. Please read them carefully before enrolling, as enrolment is conditional on acceptance of these terms and conditions. Proposed dates are given, courses run subject to availability and minimum registrations.

OUR ACCREDITATIONS

Find out why we are the leading choice to help boost your career in Australia

medal first placePrepare to get IT job ready in 8 weeks

Classroom trainingsTrained 15,000+ professionals and counting

training accessibilityExperienced Provider: Operating Since 2004

TeamworkTrained staff from 1200+ Australian Businesses

We Have Placed Candidates In
SATISFIED CUSTOMERS
Attend live virtual training program
SOME OF OUR CLIENTS

Over 1000 organisations have relied on Logitrain to be their trusted training partner.

five star ratings
High-quality, cost-effective training since 2004
Learn More
  • This field is for validation purposes and should be left unchanged.
create

Don’t Wait. Please fill the form now.