Training agenda
-
Attacks, breach detection, and Sysinternals tools
-
Understanding attacks
-
Detecting security breaches
-
Examining activity with the Sysinternals tools
-
Protecting credentials and privileged access
-
Understanding user rights
-
Computer and service accounts
-
Protecting credentials
-
Privileged Access Workstations and jump servers
-
Local administrator password solution
-
Limiting administrator rights with Just Enough Administration
-
Understanding JEA
-
Verifying and deploying JEA
-
Privileged access management and administrative forests
-
ESAE forests
-
Overview of Microsoft Identity Manager
-
Overview of JIT administration and PAM
-
Mitigating malware and threats
-
Configuring and managing Windows Defender
-
Restricting software
-
Configuring and using the Device Guard feature
-
Analyzing activity with advanced auditing and log analytics
-
Overview of auditing
-
Advanced auditing
-
Windows PowerShell auditing and logging
-
Deploying and configuring Advanced Threat Analytics and Microsoft Operations Management Suite
-
Deploying and configuring ATA
-
Deploying and configuring Microsoft Operations Management Suite
-
Deploying and configuring Azure Security Center
-
Secure Virtualization Infrastructure
-
Guarded fabric
-
Shielded and encryption-supported virtual machines
-
Securing application development and server-workload infrastructure
-
Using SCT
-
Understanding containers
-
Planning and protecting data
-
Planning and implementing encryption
-
Planning and implementing BitLocker
-
Protecting data by using Azure Information Protection
-
Optimizing and securing file services
-
File Server Resource Manager
-
Implementing classification and file management tasks
-
Dynamic Access Control
-
Securing network traffic with firewalls and encryption
-
Understanding network-related security threats
-
Understanding Windows Firewall with Advanced Security
-
Configuring IPsec
-
Datacenter Firewall
-
Securing network traffic
-
Configuring advanced DNS settings
-
Examining network traffic with Message Analyzer
-
Securing and analyzing SMB traffic