Introduction:

The course is designed to impart in-depth knowledge and skills to empower you to protect and secure the IT infrastructure. This course is introduced by highlighting the importance of assuming that network breaches have occurred already and then explains to you how to protect administrative credentials and rights. One can learn to configure administrative credentials, mitigate malware and security threats, use auditing and advanced threat analysis feature to identify security issues, as well as how to use encryption and DAC to limit access to data.

Objectives:

At the end of this course the participants will be able to:

  • Secure Windows Server
  • Limit administrator rights with Just Enough Administration.
  • Manage privilege access
  • Mitigate malware and threats
  • Analyze activity with advanced auditing and log analytics.
  • Deploy and configure Advanced Threat Analytics and Microsoft Operations Management Suite.
  • Configure Guarded Fabric virtual machines (VMs).
  • Use the Security Compliance Toolkit (SCT) and containers to improve security.
  • Plan and protect data.
  • Optimize and secure file services.
  • Secure network traffic with firewalls and encryption.
  • Secure network traffic by using DNSSEC and Message Analyzer.

Course Outline:

Unit 1: Attacks, Breach Detection, and Sysinternals Tools:

  • Understanding attacks
  • Detecting security breaches
  • Examining activity with the Sysinternals tools

Unit 2: Protecting Credentials and Privileged Access:

  • Understanding User Rights
  • Computer and Service Accounts
  • Protecting Credentials
  • Privileged Access Workstations and jump servers
  • Local administrator password solution

Unit 3: Limiting Administrator Rights with Just Enough Administration (JEA)

  • Understanding JEA
  • Verifying and Deploying JEA

Unit 4: Privileged Access Management and Administrative Forest:

  • ESAE forests
  • Overview of Microsoft Identity Manager (MIM)
  • Overview of JIT administration and PAM

Unit 5: Mitigating Malware and Threats:

  • Configuring and Managing Windows Defender
  • Restricting software
  • Configuring and Using Device Guard

Unit 6: Analyzing Activity with Advanced Auditing and Log Analytics:

  • Overview of Auditing
  • Advanced Auditing
  • Windows PowerShell Auditing and Logging

Unit 7: Deploying and Configuring Advanced Threat Analytics (ATA) and Operations Management Suite (OMS)

  • Deploying and configuring ATA
  • Deploying and configuring Microsoft Operations Management Suite
  • Deploying and configuring Azure Security Center

Unit 8: Secure Virtualization Infrastructure:

  • Guarded Fabric
  • Shielded and Encryption-Supported VMs

Unit 9: Securing Application Development and Server-Workload Infrastructure:

  • Using the Security Compliance Manager
  • Understanding Containers

Unit 10: Planning and Protecting Data:

  • Planning and Implementing Encryption
  • Planning and Implementing BitLocker
  • Protecting data by using Azure Information Protection

Unit 11: Optimizing and Securing File Services:

  • Introduction to FSRM
  • Implementing Classification and File-Management Tasks
  • Access Control (DAC)

Unit 12: Securing Network Traffic with Firewalls and Encryption:

  • Understand network-related security threats
  • Understanding Windows Firewall with Advanced Security
  • Configuring IPsec
  • Datacenter Firewall

Unit 13: Securing Network Traffic:

  • Configuring Advanced DNS Settings
  • Examining Network Traffic with Microsoft Message Analyzer
  • Securing Server Analyzing SMB Traf