Securing Windows Server 2016

Securing Windows Server 2016

About Education 

This training aims to provide security skills in Windows Server 2016 environments and teaches participants the tools and techniques needed to secure your systems, detect threats and respond effectively. In Education Windows Defender, BitLocker, AppLocker, Dynamic Access Control, Just Enough Administration (JEA) are discussed. 

 

Prerequisites 

It is recommended to have the following knowledge and skills before attending this training: 

  • Basic network and security knowledge 
  • Experience in Windows Server administration 
  • Active Directory Domain Services (AD DS) configuration information 
  • Basic knowledge of using PowerShell 

 

Duration of Training 

  • Instructor-led training: 5 days (with hands-on lab work) 
  • Virtual instructor-led training: 5 days (with web-based lectures and hands-on labs) 

 

Who Should Participate? 

  • System administrators 
  • Security experts 
  • IT professionals who manage Windows Server infrastructure 
  • Network engineers looking to optimize Windows Server security 

 

Training Content and Laboratory Details 

Module 1: Understanding Attacks, Detecting Breaches, and Sysinternals Tools 

Topics: 

  • Understanding attack types and vectors 
  • Detecting security breaches 
  • Examining activities with Sysinternals tools 

Lab: 

  1. Identifying types of attacks
  2. Exploring Sysinternals tools 

 

Module 2: Credentials and Privileged Access Protection 

Topics: 

  • User rights and account security 
  • Privileged Access Workstations (PAWs) 
  • Local Administrator Password Solution (LAPS) 

Lab: 

  1. Configuring user rights
  2. LAPS deployment and testing 

 

Module 3: Limiting Administrators with Just Enough Administration (JEA) 

Topics: 

  • JEA's foundations 
  • JEA configuration and deployment 

Lab: 

  1. Create and test a JEA endpoint 

 

Module 4: Privileged Access Management (PAM) and Management Forests 

Topics: 

  • ESAE forests 
  • Microsoft Identity Manager (MIM) 
  • Just-in-Time Privilege Management (JIT) 

Lab: 

  1. Configuring and managing PAM roles 

 

Module 5: Malware and Threat Mitigation 

Topics: 

  • Configuring Windows Defender and AppLocker 
  • Using Device Guard 

Lab: 

  1. Application security with Windows Defender and AppLocker 

 

Module 6: Advanced Auditing and Log Analytics 

Topics: 

  • Advanced control configuration 
  • PowerShell logging 

Lab: 

  1. Configuring file system access control 
  2. PowerShell logging and auditing 

 

Module 7: Advanced Threat Analytics and Management Tools 

Topics: 

  • Advanced Threat Analytics (ATA) yapılandırması 
  • Using Microsoft Operations Management Suite (OMS) 

Lab: 

  1. Implementation and configuration of ATA and OMS 

 

Module 8: Security of Virtualization Infrastructure 

Topics: 

  • Shielded fabrics and Shielded VMs 

Lab: 

  1. Deploy Guarded Fabric with administrator-trusted authentication 

 

Module 9: Application Development and Server Workload Security 

Topics: 

  • Use of Security Compliance Toolkit (SCT) 
  • Configuring Windows and Hyper-V containers 

Lab: 

  1. Configuring security baselines with SCT
  2. Deploying Windows containers 

 

Module 10: Planning and Protecting Data 

Topics: 

  • Encryption and BitLocker applications 
  • Using Azure Information Protection 

Lab: 

  1. Protect data using encryption and BitLocker 

 

Module 11: Optimizing and Securing File Services 

Topics: 

  • Using File Server Resource Manager (FSRM) 
  • Dynamic Access Control (DAC) applications 

Lab: 

  1. Configuring FSRM quotas and file scanning settings 

 

Module 12: Securing Network Traffic with Firewalls and Encryption 

Topics: 

  • Windows Firewall and IPsec configurations 

Lab: 

  1. Configuring outbound and inbound rules 
  2. Creating connection security rules 

 

Module 13: Securing Network Traffic 

Topics: 

  • DNSSEC and SMB security 

Lab: 

  1. Configuring and testing DNSSEC 
  2. Verifying SMB encryption 

 

What You Will Gain at the End of Training 

Participants who complete this training will: 

  • Can use Windows Server 2016 security features. 
  • It can detect and manage malware threats. 
  • Can configure credential and privileged access management applications. 
  • Can apply dynamic access control and encryption methods. 
  • Can deploy and manage advanced threat analytics tools. 
Trainings

View more trainings

Contact Us

Write Your Requirements and We Will Contact You

We are happy to answer your questions and help you determine which of our services best suits your needs.

Advantages
Then what happens?
1

We will schedule a call at your convenience

2

We are having an exploratory and advisory meeting

3

We are preparing an offer

Consult Us