Explore Contact us

What you will learn

  • This five-day, instructor-led course teaches IT professionals how they can enhance the security of the IT infrastructure that they administer.
  • This course begins by emphasizing the importance of assuming that network breaches have occurred already, and then teaches you how to protect administrative credentials and rights to help ensure that administrators can perform only the tasks that they need to, when they need to.

Skills you will gain

  • Shareable Certificate Earn a Cerfiticate upon completion
  • On Demand or Face to Face Start instantly and learn at your own schedule
  • Flexible Schedule Set and maintain flexible deadlines
  • Intermediate For those with working experience or likely to have completed foundation level training  
  • English Subtitles: English

This course consists of 14 lessons

Breach detection and using the Sysinternals tools: Overview of breach detection - Using the Sysinternals tools to detect breaches

Protecting credentials and privileged access: Understanding user rights - Computer and service accounts - Protecting credentials - Understanding privileged-access workstations and jump servers - Deploying a local administrator-password solution

Limiting administrator rights with Just Enough Administration: Understanding JEA - Configuring and deploying JEA

Privileged Access Management and administrative forests: Understanding ESAE forests - Overview of MIM - Implementing JIT and Privileged Access Management by using MIM

Mitigating malware and threats: Configuring and managing Windows Defender - Using software restricting policies (SRPs) and AppLocker - Configuring and using Device Guard - Using and deploying the Enhanced Mitigation Experience Toolkit

Analysing activity by using advanced auditing and log analytics: Overview of auditing - Understanding advanced auditing - Configuring Windows PowerShell auditing and logging

Analysing activity with Microsoft Advanced Threat Analytics feature and Operations Management Suite: Overview of Advanced Threat Analytics - Understanding OMS

Securing your virtualization an infrastructure: Overview of Guarded Fabric VMs - Understanding shielded and encryption-supported VMs

Securing application development and server-workload infrastructure: Using Security Compliance Manager - Introduction to Nano Server - Understanding containers

Protecting data with encryption: Planning and implementing encryption - Planning and implementing BitLocker

Limiting access to file and folders: Introduction to FSRM - Implementing classification management and file-management tasks - Understanding Dynamic Access Control (DAC)

Using firewalls to control network traffic flow: Understanding Windows Firewall - Software-defined distributed firewalls

Securing network traffic: Network-related security threats and connection-security rules - Configuring advanced DNS settings - Examining network traffic with Microsoft Message Analyzer - Securing SMB traffic, and analysing SMB traffic

Updating Windows Server: Overview of WSUS - Deploying updates by using WSUS

Show more

Frequently asked questions

Shareable on LinkedIn

You can share your Course Certificates in the Certifications section of your LinkedIn profile, on printed resumes, CVs, or other documents.

Are you ready to begin learning exceptional new skills?

01225 308979


Find us at:
Go Courses Ltd.
Kemp House
152 - 160 City Road
United Kingdom

Registered Office:
Go Courses Ltd.
10 Laura Place
United Kingdom

View on a map

Delighted satisfaction rating