Securing Windows Server 2016


This five-day, instructor-led course teaches IT professionals how they can enhance the security of the IT infrastructure that they administer. This course begins by emphasizing the importance of assuming that network breaches have occurred already, and then teaches you how to protect administrative credentials and rights to help ensure that administrators can perform only the tasks that they need to, when they need to.
This course explains how you can use auditing and the Advanced Threat Analysis feature in Windows Server 2016 to identify security issues. You will also learn how to mitigate malware threats, secure your virtualization platform, and use deployment options such as Nano server and containers to enhance security. The course also explains how you can help protect access to files by using encryption and dynamic access control, and how you can enhance your network’s security.

Audience profile

This course is for IT professionals who need to securely administer Windows Server 2016 networks. These professionals typically work with networks that are configured as Windows Server domain-based environments, with managed access to the internet and cloud services.
Students who seek certification in the 70-744 Securing Windows server exam also will benefit from this course.


Course Outline

  • Module 1: Attacks, breach detection, and Sysinternals tools
  • Module 2: Protecting credentials and privileged access
  • Module 3: Limiting administrator rights with Just Enough Administration
  • Module 4: Privileged access management and administrative forests
  • Module 5: Mitigating malware and threats
  • Module 6: Analyzing activity with advanced        auditing     and   log analytics
  • Module 7: Deploying and configuring Advanced Threat Analytics and Microsoft Operations Management Suite
  • Module 8: Secure Virtualization Infrastructure
  • Module 9: Securing application development     and   server workload infrastructure
  • Module 10: Planning and protecting data
  • Module 11: Optimizing and securing file services
  • Module 12: Securing network traffic with firewalls and encryption
  • Module 13: Securing network traffic