MS-20744 Securing Windows Server 2016

Szkolenie realizowane we współpracy z CBSG Polska Sp. z o.o., autoryzowanego Partnera Szkoleniowego firmy Microsoft
Stosujemy również rozwiązania kompleksowe: | |||
---|---|---|---|
|
Kluczowe zagadnienia szkolenia wg trenera:
- wykrywanie podatności z zastosowaniem narzędzi Sysinternals
- ochrona poświadczeń i dostępu uprzywilejowanego
- ograniczanie praw administracyjnych i konfiguracja Just Enough Administration (JEA)
- administrowanie rozwiązaniami Enhanced Security Administrative Environment (ESAE), Microsoft Identity Manager (MIM), and Just In Time (JIT) Administration oraz Privileged Access
- Management (PAM)
- zarządzanie rozwiązaniami chroniącymi przed zagrożeniami oraz złośliwym oprogramowaniem
- ochrona aplikacji z zastosowaniem AppLocker, Windows Defender, reguł Device Guard oraz EMET
- analiza aktywności za pomocą polityk kontroli i audytów
- zarządzanie zagrożeniami z zastosowaniem Advanced Threat Analytics (ATA) oraz Microsoft Operations Management Suite (OMS)
- zabezpieczanie infrastruktury wirtualnej
- zabezpieczanie wdrażania oprogramowanie oraz infrastruktury serwerowej
- zastosowanie Security Compliance Manager (SCM)
- wdrażanie kontenerów i Nano Server
- ochrona danych za pomocą szyfrowania
- ograniczanie dostępu do plików i folderów
- konfiguracja Windows Firewall oraz ochrona ruchu sieciowego
- zarządzanie aktualizacjami oprogramowania
Paweł Pławiak, Microsoft Certified Trainer
Czas trwania
- 40 godzin lekcyjnych (5 dni)
Tematyka zajęć
- Module 1: Breach detection and using the Sysinternals tools
Overview of breach detection
Using the Sysinternals tools to detect breaches
Lab : Basic breach detection and incident response strategies
- Module 2: Protecting credentials and privileged access
Understanding user rights
Computer and service accounts
Protecting credentials
Understanding privileged-access workstations and jump servers
Deploying a local administrator-password solution
Lab : User rights, security options, and group-managed service accounts
Lab : Configuring and deploying LAPs
- Module 3: Limiting administrator rights with Just Enough Administration
Understanding JEA
Configuring and deploying JEA
Lab : Limiting administrator privileges by using JEA
- Module 4: Privileged Access Management and administrative forests
Understanding ESAE forests
Overview of MIM
Implementing JIT and Privileged Access Management by using MIM
Lab : Limiting administrator privileges by using Privileged Access Management
- Module 5: Mitigating malware and threats
Configuring and managing Windows Defender
Using software restricting policies (SRPs) and AppLocker
Configuring and using Device Guard
Using and deploying the Enhanced Mitigation Experience Toolkit
Lab : Securing applications by using AppLocker, Windows Defender, Device Guard Rules, and the EMET.
- Module 6: Analysing activity by using advanced auditing and log analytics
Overview of auditing
Understanding advanced auditing
Configuring Windows PowerShell auditing and logging
Lab : Configuring encryption and advanced auditing
- Module 7: Analysing activity with Microsoft Advanced Threat Analytics feature and Operations Management Suite
Overview of Advanced Threat Analytics
Understanding OMS
Lab : Advanced Threat Analytics and Operations Management Suite
- Module 8: Securing your virtualization an infrastructure
Overview of Guarded Fabric VMs
Understanding shielded and encryption-supported VMs
Lab : Deploying and using Guarded Fabric with administrator-trusted attestation and shielded VMs
- Module 9: Securing application development and server-workload infrastructure
Using Security Compliance Manager
Introduction to Nano Server
Understanding containers
Lab : Using Security Compliance Manager
Lab : Deploying and Configuring Nano Server and containers
- Module 10: Protecting data with encryption
Planning and implementing encryption
Planning and implementing BitLocker
Lab : Configuring EFS and BitLocker
- Module 11: Limiting access to file and folders
Introduction to FSRM
Implementing classification management and file-management tasks
Understanding Dynamic Access Control (DAC)
Lab : Configuring quotas and file screening
Lab : Implementing DAC
- Module 12: Using firewalls to control network traffic flow
Understanding Windows Firewall
Software-defined distributed firewalls
Lab : Windows Firewall with Advanced Security
- Module 13: Securing network traffic
Network-related security threats and connection-security rules
Configuring advanced DNS settings
Examining network traffic with Microsoft Message Analyzer
Securing SMB traffic, and analysing SMB traffic
Lab : Connection security rules and securing DNS
Lab : Microsoft Message Analyzer and SMB encryption
- Module 14: Updating Windows Server
Overview of WSUS
Deploying updates by using WSUS
Lab : Implementing update management
Na cenę ma wpływ wiele czynników, takich jak: | |
---|---|
|