Training agenda
  1.  Attacks, breach detection, and Sysinternals tools

    • Understanding attacks
    • Detecting security breaches
    • Examining activity with the Sysinternals tools
  2.  Protecting credentials and privileged access

    • Understanding user rights
    • Computer and service accounts
    • Protecting credentials
    • Privileged Access Workstations and jump servers
    • Local administrator password solution
  3.  Limiting administrator rights with Just Enough Administration

    • Understanding JEA
    • Verifying and deploying JEA
  4.  Privileged access management and administrative forests

    • ESAE forests
    • Overview of Microsoft Identity Manager
    • Overview of JIT administration and PAM
  5. Mitigating malware and threats

    • Configuring and managing Windows Defender
    • Restricting software
    • Configuring and using the Device Guard feature
  6.  Analyzing activity with advanced auditing and log analytics

    • Overview of auditing
    • Advanced auditing
    • Windows PowerShell auditing and logging
  7.  Deploying and configuring Advanced Threat Analytics and Microsoft Operations Management Suite

    • Deploying and configuring ATA
    • Deploying and configuring Microsoft Operations Management Suite
    • Deploying and configuring Azure Security Center
  8.  Secure Virtualization Infrastructure

    • Guarded fabric
    • Shielded and encryption-supported virtual machines
  9. Securing application development and server-workload infrastructure

    • Using SCT
    • Understanding containers
  10.  Planning and protecting data

    • Planning and implementing encryption
    • Planning and implementing BitLocker
    • Protecting data by using Azure Information Protection
  11. Optimizing and securing file services

    • File Server Resource Manager
    • Implementing classification and file management tasks
    • Dynamic Access Control
  12. Securing network traffic with firewalls and encryption

    • Understanding network-related security threats
    • Understanding Windows Firewall with Advanced Security
    • Configuring IPsec
    • Datacenter Firewall
  13.  Securing network traffic
  14. Configuring advanced DNS settings
  15. Examining network traffic with Message Analyzer
  16. Securing and analyzing SMB traffic