課程名稱:MCSE: Core Infrastructure 國際認可證書課程 (只教1科 : 070-744) (Fast Track) - 簡稱:MCSE Training Course (744 Fast) |
070-744 Securing Windows Server 2016 (12 hrs)
1. Dynamic Access Control
1.1 Overview of Dynamic Access Control
1.2 Requirements of Dynamic Access Control
1.3 Central Access Policies
1.4 Delivering the Central Access Policy to File Servers
1.5 To enable Kerberos Compound Authentication and Armoring
1.6 Creating and Tagging data with File Classification Infrastructure
1.7 Effective Access Permission
2. Work Folders for BYOD environment
2.1 Overview of Work Folders
2.2 Implementing Work Folders
3. Forest Functional Level
3.1 Forest Functional Levels available in Windows Server 2016
3.2 Guidelines for raising Forest Functional Level
3.3 Alternative UPN Suffixes
4. Managing ADDS Trusts
4.1 Types of Trust within a Forest (Intra-Forest)
4.2 Types of Inter-Forest Trust (Inter-Forest)
4.3 Creating Forest Trust
4.4 Updating UPN Suffixes for Forest Trust
4.5 Selective Authentication
5. Internet Protocol Security (IPSec)
5.1 Introduction to IPSec
5.2 Viewing the three default IPSec Policies
5.3 IPsec Configuration in Windows Server 2016
6. Designing Active Directory Site Topology for MNCs
6.1 Overview of designing Active Directory services for MNCs
6.2 Locating domain controllers to different sites
6.3 Client affinity of AD Sites
7. Local Administrator Password Solutions (LAPS)
7.1 Introduction to LAPS
7.2 Deploying and Configuring LAPS
7.3 LAPS Client and Group Policy deployment
7.4 Accessing Local Administrator Password in Active Directory
8. Just Enough Administration (JEA)
8.1 Overview of Just Enough Administration in Windows Server 2016
8.2 Creating a JEA Role Capability File
8.3 Convert Role Capability File as PowerShell Module
8.4 Creating a JEA Session Configuration File
8.5 Creating a JEA Endpoint
8.6 Connecting to JEA Endpoint
9. Privileged Access Workstation (PAW)
9.1 Active Directory Administrative Tier Model
9.2 Primary responsibilities and critical restrictions
9.3 Principal of Clean Source
9.4 Managing Exposure Risk
9.5 Enhanced Security Administrative Environment (ESAE)
9.6 Tier 0 Equivalency
9.7 What is a Privileged Access Workstation (PAW)?
9.8 PAW Deployment process
10. Windows Containers
10.1 Introduction to Windows Containers
10.2 Fundamental Concepts of Windows Containers
10.3 Windows Container Typtes
10.4 Introduction to Docker
10.5 Containers for Developers
10.6 Containers for IT Professionals
10.7 Configuring Windows Container Host
10.8 A Special Reminder on Hyper-V Container Host
10.9 Deploying a Hello-World container
10.10 Building Container Images
10.11 Hyper-V Containers
10.12 More about Hyper-V isolation
10.13 Container Networking Concepts
11. Security Compliance Manager
11.1 Overview of Security Compliance Manager
11.2 Installing and Configuring Security Configuration Manager
11.3 Importing Security Baseline
11.4 Customizing a Security Baseline for Windows 10
11.5 Exporting and Applying a Security Baseline to production environement
12. Protecting and Securing Windows Credentials
12.1 Attacks to Windows Credential Store
12.2 Requirements of Credential Guard
12.3 Configuring Credential Guard
12.4 Preventing NTLM authentication protocol
12.5 Windows Defender Remote Credential Guard
13. Concept of Microsoft Advanced Threat Analytics
13.1 Introduction to Microsoft ATA
13.2 Architectural Components of Microsoft ATA
13.3 Microsoft ATA Center
13.4 Microsoft ATA Gateways
13.5 Windows Server Event Forwarding Requirement
|