Securing Windows Server 2016 Video Course

70-744: Securing Windows Server 2016

Your Microsoft 70-744 exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the 70-744 certification test. Ace your Microsoft 70-744 at the first attempt and obtain the Securing Windows Server 2016 credential with ease.

# of Students
135
# of Lectures
294
Course Length
13 h
Course Rating
4.5
Price $32.99
Today $29.99

Curriculum for 70-744 Video Course

Introduction

  Video Name Time
  1. Course Introduction 02:55
  2. Instructor Introduction 01:24
  Video Name Time
  1. Chapter 01 - Introduction 01:56
  2. Topic A: Understanding Types of Attacks 00:22
  3. Assume Breach 03:16
  4. Methods of Attack 12:46
  5. Attack Stages 07:02
  6. Prioritizing Resources 03:30
  7. Incident Response Strategy 02:11
  8. Ensuring Compliance 02:04
  9. Topic B: Detecting Security Breaches 00:22
  10. Locating Evidence 01:40
  11. Event Logs 02:36
  12. Examining Other Configurations 01:51
  13. Topic C: Using Sysinternals Tools 00:22
  14. Introducing Sysinternals 02:32
  15. Demo - Examining Sysinternals Tools 01:52
  16. System Monitor 02:05
  17. AccessChk 01:32
  18. Autoruns 01:35
  19. LogonSessions 01:25
  20. Process Explorer 01:37
  21. Process Monitor 01:28
  22. Sigcheck 01:18
  23. Demo - Using Sysinternals Tools 13:45
  24. Chapter 01 Summary 01:31
  Video Name Time
  1. Chapter 02 - Introduction 02:12
  2. Topic A: User Rights and Privileges 00:18
  3. Principle of Least Privilege 05:05
  4. Configuring User Rights 03:24
  5. Configuring Account Security Options 09:33
  6. Demo - User Rights and Account Security Options 16:05
  7. Account Security Controls 02:16
  8. Complexity Options 03:30
  9. Password and Lockout Policies 03:34
  10. Demo - Configuring Account Policies in Group Policy 04:23
  11. Configuring Fine-Grained Password Policies 01:26
  12. Understanding PSO Application 02:55
  13. Protected Users Security Groups 03:22
  14. Delegating Administrative Control 04:13
  15. Demo - Delegating Control in AD DS 06:25
  16. Local Administrator Password Solutions (LAPS) 03:24
  17. LAPS Requirements 01:40
  18. LAPS Process 01:13
  19. Demo - Using LAPS 11:06
  20. Topic B: Working with Computer and Service Accounts 00:10
  21. What is a Computer Account? 01:40
  22. Computer Account Functionality 01:19
  23. Working with Secure Channel Passwords 01:55
  24. Service Account Types 02:05
  25. Group MSAs 00:38
  26. Demo - Configuring Group MSAs 08:33
  27. Topic C: Protecting User Credentials 00:10
  28. Introducing Credential Guard 02:13
  29. Credential Guard Requirements 01:30
  30. Configuring Credential Guard 01:17
  31. Verifying Credential Guard Operation 01:23
  32. Credential Guard Weaknesses 01:19
  33. NTLM Blocking 03:33
  34. Searching AD DS for Problem Accounts 02:05
  35. Demo - Locating Problem Accounts 05:42
  36. Topic D: Using Privileged Access Workstations 00:32
  37. The Need for Privileged Access Workstations 01:52
  38. Privileged Access Workstations 01:41
  39. Jump Servers 01:09
  40. Securing Domain Controllers 06:20
  41. Chapter 02 Summary 02:19
  Video Name Time
  1. Chapter 03 - Introduction 01:50
  2. Topic A: Understanding and Deploying JEA 00:17
  3. Introduction to JEA 06:01
  4. JEA Components 01:05
  5. Session Configuration Files 03:06
  6. Demo - Creating a Session Configuration File 03:18
  7. Role Capability Files 02:32
  8. Demo - Create a Role Capability File 07:31
  9. JEA Endpoints 01:12
  10. Demo - Creating a JEA Endpoint 02:15
  11. Connecting to JEA Endpoints 01:52
  12. Deploying JEA Endpoints 02:05
  13. Topic B: Using Enhanced Security Administrative Environments (ESAE) Forests 00:17
  14. ESAE Forests 02:34
  15. Administrative Tiers 01:47
  16. ESAE Best Practices 02:41
  17. The Clean Source Principle 02:08
  18. Implementing the Clean Source Principle 02:25
  19. Topic C: Using Microsoft Identity Manager 00:23
  20. Overview of MIM 02:36
  21. MIM Requirements 01:50
  22. MIM Service Accounts 02:51
  23. Topic D: Using JIT Administration and PAM 00:31
  24. Overview of JIT Administration 01:32
  25. Privileged Access Management (PAM) 02:32
  26. PAM Components 02:13
  27. Creating an Administrative Forest 01:26
  28. Configuring Trust Relationships 03:22
  29. Shadow Principals 02:09
  30. Configuring the MIM Web Portal 01:00
  31. Managing and Configuring PAM Roles 01:05
  32. Chapter 03 Summary 02:48
  Video Name Time
  1. Chapter 04 Introduction 01:45
  2. Topic A: Configuring and Managing Windows Defender 00:08
  3. Understanding Malware 04:43
  4. Malware Sources 01:41
  5. Mitigation Methods 03:26
  6. Windows Defender 01:40
  7. Demo - Using Windows Defender 06:43
  8. Topic B: Restricting Software 00:13
  9. Controlling Applications 01:40
  10. Software Restriction Policies 02:49
  11. Security Levels 01:16
  12. AppLocker 02:40
  13. Support for AppLocker 03:03
  14. AppLocker Rules 01:56
  15. Creating Default Rules 03:01
  16. Demo - Using AppLocker 11:15
  17. Topic C: Using Device Guard 00:14
  18. Overview of Device Guard 02:06
  19. Device Guard Features 02:12
  20. Configuring Device Guard 01:43
  21. Device Guard Policies 02:28
  22. Deploying Code Integrity Policies 01:33
  23. Control Flow Guard 01:25
  24. Topic D: Patch Management with WSUS 00:10
  25. Overview of WSUS 02:25
  26. Deployment Options 02:05
  27. Server Requirements 01:52
  28. Configuring Clients 01:27
  29. Administering WSUS 01:08
  30. Approving Updates 01:47
  31. Demo - Installing and Configuring WSUS 18:04
  32. Chapter 04 Summary 02:07
  Video Name Time
  1. Chapter 05 - Introduction 01:12
  2. Topic A: Configuring Auditing for Windows Server 2016 00:10
  3. Overview of Auditing 01:49
  4. The Purpose of Auditing 01:29
  5. Types of Events 04:49
  6. Auditing Goals 00:57
  7. Auditing File and Object Access 01:52
  8. Demo - Configuring Auditing 10:03
  9. Topic B: Advanced Auditing and Management 00:38
  10. Advanced Auditing 01:11
  11. Advanced Auditing Subcategories 02:40
  12. Dynamic Auditing 02:38
  13. Event Log Subscriptions 02:27
  14. Audit Collection Services (ACS) 02:01
  15. Demo - Configuring Event Forwarding 06:59
  16. Auditing with Windows PowerShell 01:58
  17. Demo - Using PowerShell with Audit Logs 08:00
  18. Transaction Logging 02:02
  19. Module Logging 01:06
  20. Script Block Logging 00:50
  21. Demo - Configuring PowerShell Logging 08:57
  22. Topic C: Deploying and Configuring ATA 00:08
  23. Overview of ATA 02:35
  24. Usage Scenarios 05:08
  25. Deployment Requirements 02:14
  26. ATA Gateways 02:03
  27. Port Mirroring 01:17
  28. Configuring ATA Center 01:38
  29. Topic D: Deploying and Configuring Operations Management Suite 00:06
  30. Introduction to Operations Management Suite 00:53
  31. Deployment Overview 01:40
  32. OMS Solutions 01:32
  33. Installing OMS 01:26
  34. OMS Solutions 01:21
  35. Chapter 05 Summary 01:59
  Video Name Time
  1. Chapter 06 - Introduction 00:53
  2. Topic A: Secure the Virtualization Infrastructure 00:27
  3. Introduction to Guarded Fabric 03:16
  4. Host Guardian Service 01:31
  5. Preparing HGS Nodes 01:20
  6. Installing and Configuring HGS 02:10
  7. Attestation and Encryption 01:35
  8. Attestation Methods 01:22
  9. Initializing HGS 01:59
  10. Configuring HSG Clients 01:24
  11. Topic B: Deploying Security Baselines 00:07
  12. Security Compliance Manager (SCM) 03:33
  13. SCM Requirements 01:21
  14. Demo - Installing SCM 03:12
  15. Demo - Configuring and Deploying Security Baselines 11:53
  16. Topic C: Deploying Nano Server 00:12
  17. Planning for Nano Server 01:05
  18. Understanding Nano Server Roles 00:45
  19. Installing Nano Server Roles 02:06
  20. Nano Server Installation 01:00
  21. Installation Steps 01:53
  22. Chapter 06 Summary 00:46
  Video Name Time
  1. Chapter 07 Introduction 01:49
  2. Topic A: Planning and Implementing File Encryption 00:11
  3. Introducing Encrypting File System 06:36
  4. EFS Features 06:26
  5. Encryption and Decryption 03:47
  6. Recovering EFS Files 02:54
  7. Demo - Using EFS 08:47
  8. Topic B: Planning and Implementing BitLocker 00:13
  9. Overview of BitLocker 03:21
  10. BitLocker and TPMs 02:19
  11. BitLocker Requirements 02:00
  12. Tools for Configuring and Managing BitLocker 01:49
  13. Deploying BitLocker 01:40
  14. Demo - Deploying BitLocker 10:17
  15. BitLocker on Hyper-V VMs 00:42
  16. BitLocker and CSVs 01:42
  17. Enabling BitLocker for CSV 01:08
  18. Network Unlock 01:56
  19. Network Unlock Process 01:12
  20. BitLocker Recovery 03:01
  21. Microsoft BitLocker Administration and Monitoring (MBAM) 00:46
  22. Chapter 07 Summary 00:48
  Video Name Time
  1. Chapter 08 Introduction 01:06
  2. Topic A: Using File Server Resource Manager 00:18
  3. Capacity Management 02:51
  4. Storage Management 01:15
  5. Introduction to FSRM 01:16
  6. Storage Management with File Server Resource Manager 00:24
  7. Overview of FSRM 01:14
  8. Installing and Configuring FSRM 01:30
  9. Demo - Installing and Configuring FSRM 05:51
  10. Quota Management 02:53
  11. Demo - Create and Manage Quotas 11:51
  12. File Screening 02:31
  13. Using File Groups 01:54
  14. Exceptions and Templates 01:55
  15. Demo - Implementing File Screening 10:07
  16. Storage Reports 02:12
  17. Report Tasks 00:47
  18. Demo - Generating Storage Reports 06:51
  19. Automatic File Management 01:26
  20. Topic B: Implementing Classification and File Management Tasks 00:12
  21. File Classification 02:23
  22. Classification Rules 01:56
  23. Demo - Configure File Classification 08:06
  24. File Management Task 03:35
  25. Topic C: Working with Dynamic Access Control 00:10
  26. Overview of Dynamic Access Control 02:43
  27. Dynamic Access Control Scenarios 03:37
  28. DAC Technologies 01:13
  29. Understanding Identity 03:12
  30. Understanding Claims 03:14
  31. Types of Claims 02:19
  32. Central Access Policies 01:27
  33. Policy Components 01:35
  34. DAC Prerequisites 03:07
  35. Demo - Implementing DAC 16:09
  36. Chapter 08 Summary 01:52
  Video Name Time
  1. Chapter 09 Introduction 02:12
  2. Topic A: Using the Windows Firewall with Advanced Security 00:07
  3. Types of Firewalls 03:47
  4. Well-Known Ports 02:12
  5. Host-Based Firewall 02:24
  6. Network Profiles 02:16
  7. Configuring the Windows Firewall 04:12
  8. Demo - Working with the Windows Firewall 17:44
  9. Topic B: Datacenter Firewall 00:37
  10. Network Controller 02:09
  11. Datacenter Firewall 02:24
  12. Network Security Groups 00:52
  13. Scenarios for Datacenter Firewall 02:20
  14. Topic C: Utilizing IP Security 00:12
  15. Overview of IP Security 02:07
  16. IPSec Protocols 02:07
  17. IPSec Usage Scenarios 04:09
  18. IPSec Configuration Tools 00:59
  19. Connection Security Rules 00:54
  20. Understanding Rule Types 01:38
  21. Rule Endpoints 01:47
  22. Authentication Settings 02:57
  23. Authentication Methods 02:31
  24. Encryption Settings 01:32
  25. Monitoring Connections 00:56
  26. Demo - Implementing IPSec 07:09
  27. Topic D: Configuring Advanced DNS Settings 00:05
  28. Managing DNS Services 03:35
  29. Optimizing DNS Name Resolution 03:17
  30. The GlobalNames Zone 01:37
  31. Implementing DNS Security 04:44
  32. DNS Security (DNSSEC) 01:44
  33. Implementing DNSSEC 02:44
  34. Demo - Configuring DNSSEC 06:54
  35. Introducing DNS Policies 01:47
  36. Implementing DNS Policies 03:11
  37. RRL Feature 03:07
  38. Demo - Configuring DNS Policies 08:41
  39. Topic E: Monitoring Network Traffic 00:04
  40. Microsoft Message Analyzer 02:53
  41. Demo - Using Microsoft Message Analyzer 06:00
  42. Topic F: Securing SMB Traffic 00:30
  43. SMB 3.1.1 Protocol Security 02:12
  44. SMB Encryption Requirements 01:34
  45. Encrypting SMB Shares 01:26
  46. Disabling Support for SMB 1.0 01:24
  47. Chapter 09 Review Summary 01:49
  48. Course Closure 02:14

Student Feedback

5 Stars
4 Stars
3 Stars
2 Stars
1 Star
4.5
Rating: 4.5
Overall Rating: Good.

Similar Courses

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

1200+ IT Certification Exams available: Get a free sample of any exam right now!
Try Free Demo

Try Free Demo

  • ABA
  • ACAMS
  • ACFE
  • ACI
  • ACSM
  • Adobe
  • AHIMA
  • AHIP
  • AHLEI
  • AICPA
  • AIWMI
  • Alfresco
  • AMA
  • Amazon
  • AndroidATC
  • APBM
  • API
  • APICS
  • Apple
  • Arista
  • Aruba
  • ASIS
  • ASQ
  • Atlassian
  • Autodesk
  • Avaya
  • Axis Communications
  • BACB
  • BCS
  • BICSI
  • Blockchain
  • Blue Coat
  • Blue Prism
  • C++ Institute
  • CA Technologies
  • Checkpoint
  • CIMA
  • Cisco
  • Citrix
  • CIW
  • Cloudera
  • CNCF
  • CompTIA
  • CSA
  • CWNP
  • CyberArc
  • Dell
  • DMI
  • DSCI
  • EMC
  • Esri
  • Exin
  • Extreme Networks
  • F5
  • FileMaker
  • FINRA
  • Fortinet
  • GAQM
  • GARP
  • Genesys
  • GIAC
  • Google
  • Guidance Software
  • H3C
  • HFMA
  • HIPAA
  • Hitachi
  • HP
  • HRCI
  • Huawei
  • IAPP
  • IBM
  • IFPUG
  • IIA
  • IIBA
  • Informatica
  • Isaca
  • iSAQB
  • ISC
  • iSQI
  • ISTQB
  • ITIL
  • Juniper
  • Lenovo
  • Linux Foundation
  • Logical Operations
  • LPI
  • Magento
  • Marketo
  • McAfee
  • Microsoft
  • Mulesoft
  • NACVA
  • NCMA
  • Network Appliance
  • NI
  • Nokia
  • Novell
  • Nuage Networks
  • Nutanix
  • OMG
  • Oracle
  • Palo Alto Networks
  • Pegasystems
  • PEOPLECERT
  • PMI
  • PRINCE2
  • Python Institute
  • QlikView
  • RedHat
  • Riverbed
  • RSA
  • Salesforce
  • SANS
  • SAP
  • SAS Institute
  • Scrum
  • SDI
  • ServiceNow
  • Six Sigma
  • SNIA
  • SOA
  • Software Certifications
  • SolarWinds
  • Splunk
  • SpringSource
  • Symantec
  • Teradata
  • Test Prep
  • The Open Group
  • Tibco
  • Unity Certification
  • VCE
  • Veeam
  • Veritas
  • Vmedu
  • VMware
  • WatchGuard
  • WorldatWork
  • Zend
Next Step
Next Step

Try Free Demo

  • Microsoft
Next Step
Next Step

Winter Sale! Get 25% Discount on All Your Purchases!

Passguide Products

Enter Your Email Address to Receive Your 25%
OFF
Discount Code Plus... Our Exclusive Weekly Deals

* We value your privacy. We will not rent or sell your email address