Звезды и С - Центр обучения и тестирования

Спец. предложения|Обучение|Вебинары|Сертификация|Тестирование|О нас|Работа с сайтом|Новости|Поиск
Обучение

Специальные предложения
CITRIX
Microsoft - Системные инженеры и администраторы MCSA, MCSE
Авторские курсы Microsoft
Microsoft Windows Server 2012 R2 / 2016
Microsoft Windows 10 / 8.1
Облачные технологии: Microsoft Windows Azure, Private Cloud, Office 365
Microsoft Exchange Server 2013 / 2016
Microsoft System Center
Microsoft Lync Server 2013 / Skype for business 2015
Microsoft SQL Server 2014 / 2016
Microsoft SharePoint 2013 / 2016
Microsoft Forefront
Microsoft BizTalk Server
Более ранние версии программных продуктов Microsoft
Microsoft - Разработчики MCSD, MCSE
Расписание курсов Microsoft в графическом формате
Microsoft Dynamics
Обучение корпоративных пользователей
Software Assurance - Бесплатные курсы обучения по ваучерам
Microsoft On-Demand
VMware
ITIL
Вечернее обучение
Условия обучения
Linux
Cisco

Курс M20744: Настройка безопасности в Windows Server 2016

Цена для физических лиц, р.: 30900
Цена для юридических лиц, р.: 31900
Цена вебинара для физических лиц, р.: 28900
Цена вебинара для юридических лиц, р.: 28900

Продолжительность курса (дней): 5

Даты (день): 23.10.2017, 27.11.2017, 15.01.2018, 19.02.2018, 02.04.2018, 21.05.2018

Даты (вечер): 23.10.2017, 27.11.2017, 15.01.2018, 19.02.2018, 02.04.2018, 21.05.2018

Курс готовит к тестам:

Цель:

Необходимая подготовка:

Предварительный тест:

Результат:

План курса:

20744B

Module 1: Attacks, breach detection, and Sysinternals tools

  • Understanding attacks
  • Detecting breaches
  • Examining activity with the Sysinternals tool
  • Lab : Basic breach detection and incident response strategies
    • Identifying attack types
    • Exploring the Sysinternals tools

Module 2: Protecting credentials and privileged access

  • Understanding user rights
  • Computer and service accounts
  • Protecting credentials
  • Privileged-Access Workstations and jump servers
  • Local administrator-password solution
  • Lab : Implementing user rights, security options, and group-managed service accounts
    • Configuring security options
    • Configuring restricted groups
    • Delegating privileges
    • Creating and managing group managed service accounts (MSAs)
    • Configuring the Credential Guard feature
    • Locating problematic accounts
  • Lab : Configuring and deploying LAPs
    • Installing and configuring LAPs
    • Deploying and testing LAPs

Module 3: Limiting administrator rights with Just Enough Administration

  • Understanding JEA
  • Verifying and deploying JEA
  • Lab : Limiting administrator privileges with JEA
    • Creating a role-capability file
    • Creating a session-configuration file
    • Creating a JEA endpoint
    • Connecting and testing a JEA endpoint
    • Deploying a JEA configuration to another computer

Module 4: Privileged access management and administrative forests

  • ESAE forests
  • Overview of Microsoft Identity Manager
  • Overview of JIT administration and PAM
  • Lab : Limiting administrator privileges with PAM
    • Layered approach to security
    • Configuring trust relationships and shadow principals
    • Requesting privileged access
    • Managing PAM roles

Module 5: Mitigating malware and threats

  • Configuring and managing Windows Defender
  • Restricting software
  • Configuring and using the Device Guard feature
  • Deploying and using the EMET
  • Lab : Securing applications by using AppLocker, Windows Defender, Device Guard Rules, and the EMET.
    • Configuring Windows Defender
    • Configuring AppLocker
    • Configuring Device Guard
    • Deploying and using EMET

Module 6: Analyzing activity with advanced auditing and log analytics

  • Overview of auditing
  • Advanced auditing
  • Windows PowerShell auditing and logging
  • Lab : Configuring advanced auditing
    • Configuring auditing of file-system access
    • Auditing domain sign-ins
    • Managing advanced audit policy configuration
    • Windows PowerShell logging and auditing

Module 7: Deploying and configuring Advanced Threat Analytics and Microsoft Operations Management Suite

  • Deploying and configuring ATA
  • Deploying and configuring Microsoft Operations Management Suite
  • Lab : Deploying ATA and Microsoft Operations Management Suite
    • Preparing and deploying ATA
    • Preparing and deploying Microsoft Operations Management Suite

Module 8: Secure Virtualization Infrastructure

  • Guarded Fabric
  • Shielded and encryption-supported virtual machines
  • Lab : Guarded Fabric with administrator-trusted attestation and shielded VMs
    • Deploying a guarded fabric with administrator-trusted attestation
    • Deploying a shielded VM

Module 9: Securing application development and server-workload infrastructure

  • Using SCM
  • Introduction to Nano Server
  • Understanding containers
  • Lab : Using SCM
    • Configuring a security baseline for Windows Server 2016
    • Deploying a security baseline for Windows Server 2016
  • Lab : Deploying and Configuring Nano Server
    • Deploying, managing, and securing Nano Server
    • Deploying, managing, and securing Windows container

Module 10: Planning and protecting data

  • Planning and implementing encryption
  • Planning and implementing BitLocker
  • Lab : Protecting data by using encryption and BitLocker
    • Encrypting and recovering access to encrypted files
    • Using BitLocker to protect data

Module 11: Optimizing and securing file services

  • File Server Resource Manager
  • Implementing classification management and file-management tasks
  • Dynamic Access Control
  • Lab : Quotas and file screening
    • Configuring File Server Resource Manager quotas
    • Configuring file screening and storage reports
  • Lab : Implementing Dynamic Access Control
    • Preparing for implementing Dynamic Access Control
    • Implementing Dynamic Access Control
    • Validating and remediating Dynamic Access Control

Module 12: Securing network traffic with firewalls and encryption

  • Understanding network-related security threats
  • Understanding Windows Firewall with Advanced Security
  • Configuring IPsec
  • Datacenter Firewall
  • Lab : Configuring Windows Firewall with Advanced Security
    • Creating and testing inbound rules
    • Creating and testing outbound rules
    • Creating and testing connection security rules

Module 13: Securing network traffic

  • Network-related security threats and connection-security rules
  • Configuring advanced DNS settings
  • Examining network traffic with Microsoft Message Analyzer
  • Securing SMB traffic, and analysing SMB traffic
  • Lab : Securing DNS
    • Configuring and testing DNSSEC
    • Configuring DNS policies and RRL
  • Lab : Microsoft Message Analyzer and SMB encryption
    • Installing and using Message Analyzer
    • Configuring and verifying SMB encryption on SMB shares

Module 14: Updating Windows Server

  • Overview of WSUS
  • Deploying updates by using WSUS
  • Lab : Implementing update management
    • Implementing the WSUS server role
    • Configuring update settings
    • Approving and deploying an update by using WSUS


  Спец. предложения|Обучение|Вебинары|Сертификация|Тестирование|О нас|Работа с сайтом|Новости|Поиск

   Тел: +74953633686 email: info@stars-s.ru

   125040, Москва, Ленинградский проспект, д. 5, стр. 2, под. 5, офис "Звезды и С"

  © Учебный центр "Звезды и С", 1991-2017