• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

Course Images

Securing Microsoft systems

Securing Microsoft systems

  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • Delivered Online or In-Person

  • You travel to organiser or they travel to you

  • Redhill

  • 3 days

  • All levels

Description

Microsoft security training course description

A hands on training course focusing on security in the
Microsoft environment. The course progresses from
patch management onto the use of Microsoft security
tools. Then server, desktop and network security are
studied in the Microsoft environment.

What will you learn

  • Use Microsoft security tools.

  • Secure Microsoft servers.

  • Secure Microsoft desktops.

  • Secure Microsoft networks.

Microsoft security training course details

  • Who will benefit:

Technical server support staff.
Technical desktop support staff.
Technical network staff.
Technical security staff.

  • Prerequisites:

Supporting Windows server 2016
Networking Microsoft systems.

  • Duration

3 days

Microsoft security training course contents
  • Introduction


Security threats, Microsoft defaults, admin
accounts, security patches, patch management,
patch tools. Hands on: Studying Microsoft
defaults, applying security patches.

  • Microsoft security tools


Microsoft updates, WSUS, Inventory tool, baseline
security analyser, URLscan, EventCombMT,
Cipher security tool, Port reporter, PortQry. Tools
hackers use. Hands on: Using Microsoft security
tools.

  • Server security


Checklists, core server security, AD, Member
server security, Domain controller security,
Specific roles.
Hands on Hardening Microsoft
servers, security templates.

  • Active Directory


Admin authority in AD, group policy, trust and
authentication.

  • Desktop security


Checklists, core client security, anti virus software,
anti spyware software, firewalls, securing clients
with AD, securing clients with group policy,
software restriction policies.
Hands on Securing
Microsoft desktops.

  • Network security


Checklist, IP security, VPNs, PKI, certificate
authorities, RAS, RRAS, IAS.
Hands on: VPN
configuration, IAS configuration.

  • Monitoring


Auditing, authorisation and logons, tracking,
system monitoring, detecting attacks.
Hands on:
Monitoring Microsoft systems.

  • Summary


Microsoft security response centre, security
advisories.

About The Provider

Tags

Reviews