1. Advanced Services of ADCS
1.1 Network Device Enrollment Service
1.2 Cryptography Next Generation (CNG)
1.3 Certification Authority Web Enrollment (ADCS-CAWE)
1.4 Certificate Enrollment Web Service (ADCS-EWS) & Certificate Enrollment Policy Web Service (ADCS-EPS)
1.5 Microsoft Root CA Program
1.6 Group Policy regarding “Trusted Root Certification Authorities”
1.7 Certificate Trust List (CTL) policy
2. Dynamic Access Control
2.1 Overview of Dynamic Access Control
2.2 Requirements of Dynamic Access Control
2.3 Central Access Policies
2.4 Delivering the Central Access Policy to File Servers
2.5 To enable Kerberos Compound Authentication and Armoring
2.6 Creating and Tagging data with File Classification Infrastructure
2.7 Effective Access Permission
2.8 Dynamic Access Control Staging Policy
2.9 Reference Resource Property
3. Work Folders for BYOD environment
3.1 Overview of Work Folders
3.2 Implementing Work Folders
3.3 Multi-Sync Server deployment of Work Folders
3.4 A Case Study of Performance issues when using Work Folders
4. BranchCache
4.1 Configuring BranchCache
4.2 Prehashing and Preloading Content
5. Forest Functional Level
5.1 Forest Functional Levels available in Windows Server 2016
5.2 Guidelines for raising Forest Functional Level
5.3 Alternative UPN Suffixes
6. Configuring ADDS Forest
6.1 Additional Domains in existing Forest
6.2 Configuring a new domain tree to join existing forest
6.3 Conditional DNS Forwarding
6.4 Enabling Global Catalog (GC) for xyz.com
6.5 An Example of Domain-Wide authentication and Resource assessment
6.6 Assigning Permissions in a multi-domain environment
6.7 Active Directory Migration Tool
6.8 Deploying Child Domain
7. Managing ADDS Trusts
7.1 Types of Trust within a Forest (Intra-Forest)
7.2 Types of Inter-Forest Trust (Inter-Forest)
7.3 Creating Forest Trust
7.4 Updating UPN Suffixes for Forest Trust
7.5 External Trust (Optional Knowledge)
7.6 Selective Authentication
8. Active Directory Right Management Service (ADRMS)
8.1 Introduction to AD RMS
8.2 Deploying AD RMS
8.3 Using AD RMS
8.4 Introduction to AD RMS Rights Policy Template
8.5 Implementing AD RMS Rights Policy Template
8.6 Logging and Statistics Reports
8.7 AD RMS Exclusion Policies
8.8 AD RMS Super User Group
8.9 AD RMS Trust Policies
8.10 Decommissioning AD RMS Cluster
9. Active Directory Lightweight Directory Services
9.1 Introduction to AD LDS server role
9.2 Scenarios of using AD LDS
9.3 Deploying AD LDS Server Role
9.4 Working with AD LDS Instances
9.5 AD LDS Administration Tools
9.6 Managing AD LDS Organizational Units, Groups and Users
9.7 Managing Authentication
9.8 Managing Authorization and Delegation of AD LDS
9.9 Configuring LDAP over SSL for AD LDS
9.10 More above LDP.exe and Active Directory Domain Service (AD DS) and (AD LDS)
10. Internet Protocol Security (IPSec)
10.1 Introduction to IPSec
10.2 Deploying IPSec
10.3 Viewing the three default IPSec Policies
10.4 IPsec Configuration in Windows Server 2016
11. Designing Active Directory Site Topology for MNCs
11.1 Overview of designing Active Directory services for MNCs
11.2 Locating domain controllers to different sites
11.3 Site Link and Replication
11.4 Demonstrating MNCs with Multiple Active Directory Sites
11.5 Site Link Bridge
11.6 Using Site Link Bridge
11.7 Full Dynamic RPC
11.8 Client affinity of AD Sites
11.9 Automated Site Coverage
11.10 Filtering DC Locator DNS records
12. Local Administrator Password Solutions (LAPS)
12.1 Introduction to LAPS
12.2 Deploying and Configuring LAPS
12.3 LAPS Client and Group Policy deployment
12.4 Accessing Local Administrator Password in Active Directory
13. Just Enough Administration (JEA)
13.1 Overview of Just Enough Administration in Windows Server 2016
13.2 Creating a JEA Role Capability File
13.3 Convert Role Capability File as PowerShell Module
13.4 Creating a JEA Session Configuration File
13.5 Creating a JEA Endpoint
13.6 Connecting to JEA Endpoint
14. Privileged Access Workstation (PAW)
14.1 Active Directory Administrative Tier Model
14.2 Primary responsibilities and critical restrictions
14.3 Principal of Clean Source
14.4 Managing Exposure Risk
14.5 Enhanced Security Administrative Environment (ESAE)
14.6 Tier 0 Equivalency
14.7 What is a Privileged Access Workstation (PAW)?
14.8 PAW Deployment process
15. Windows Containers
15.1 Introduction to Windows Containers
15.2 Fundamental Concepts of Windows Containers
15.3 Windows Container Typtes
15.4 Introduction to Docker
15.5 Containers for Developers
15.6 Containers for IT Professionals
15.7 Configuring Windows Container Host
15.8 A Special Reminder on Hyper-V Container Host
15.9 Deploying a Hello-World container
15.10 Building Container Images
15.11 Hyper-V Containers
15.12 More about Hyper-V isolation
15.13 Container Networking Concepts
16. Security Compliance Manager
16.1 Overview of Security Compliance Manager
16.2 Installing and Configuring Security Configuration Manager
16.3 Importing Security Baseline
16.4 Customizing a Security Baseline for Windows 10
16.5 Exporting and Applying a Security Baseline to production environement
17. Protecting and Securing Windows Credentials
17.1 Attacks to Windows Credential Store
17.2 Requirements of Credential Guard
17.3 Configuring Credential Guard
17.4 Preventing NTLM authentication protocol
17.5 Windows Defender Remote Credential Guard
18. Concept of Microsoft Advanced Threat Analytics
18.1 Introduction to Microsoft ATA
18.2 Architectural Components of Microsoft ATA
18.3 Microsoft ATA Center
18.4 Microsoft ATA Gateways
18.5 Windows Server Event Forwarding Requirement