Kõik koolitused ühest kohast!

tk
Tagasi

MOC-40554 Microsoft Security Workshop: Implementing Windows 10 Security Features

This course is intended for IT Professionals that require a deeper understanding of Windows Security and to increase their knowledge level through a predominately hands-on experience with Microsoft threat detection tools for hybrid and cloud-based workloads.

Goals:

  • Understanding the current nature of the security threat landscape
  • Explain the built-in security defenses Windows 10
  • Windows 10 mitigations that you can configure
  • Learn the Windows 10 mitigations that require no configuration
  • Describe some of the external tools that enhance endpoint security

In addition to their professional experience, students who take this training should already have the following technical knowledge:

  • The current cybersecurity ecosystem
  • Experience with Windows Client and Server administration, maintenance, and troubleshooting.
  • Basic experience and understanding of Windows networking technologies, to include Windows Firewall network setting, DNS, DHCP, WiFi, and cloud services concepts.
  • Basic experience and understanding of Active Directory, including functions of a domain controller, sign on services, and an understanding of group policy.
  • Knowledge of and relevant experience in systems administration, using Windows 10.

Learners who take this training can meet the prerequisites by obtaining equivalent knowledge and skills through practical experience as a Security Administrator, System Administrator, or a Network Administrator.

Täpsema kirjelduse leiad: https://www.microsoft.com/en-us/learning/course.aspx?cid=40554

Program:

  • Module 1: How Windows 10 uses modern hardware features for securityToday’s security threat landscape is dominated by aggressive and tenacious threats. Originally, malicious attackers mostly focused on gaining community recognition through their exploits. Since then, attackers’ motives have shifted toward financial gain. Modern attacks increasingly focus on large-scale intellectual property theft, targeted system degradation that can result in financial loss, and even cyberterrorism that threatens the security of individuals, businesses, and national or regional interests all over the world. Attackers are typically highly trained individuals and security experts, some of whom are in the employ of nation states that have large budgets and vast human resources. Threats like these require a different approach to cybersecurity. In this module we look at the hardware security features in the latest Windows 10 releases to help mitigate these threats.
    • Lessons
      • Secure Boot and Unified Extensible Firmware Interface (UEFI)-based protection
      • Additional Hardware Security
    • After completing this module, you will be able to:
      • Describe hardware security features in the latest Windows 10 releases
      • List additional hardware-based security features available in the latest Windows 10 releases.
      • Provide a high-level overview of Secure Boot and Trusted Platform Module (TPM)
      • Describe process of Secure Boot and Trusted Boot
      • Describe the protection mechanism employed by Early Launch Antimalware
      • Explain how Data Execution Prevention works
      • Identify benefits of Address Space Layout Randomization
      • Provide an overview of Protected Processes
      • List Windows 10 improvements to Heap Protection
      • List Windows 10 Kernel Pool hardening features
  • Module 2: Windows 10 software security featuresWindows 10 includes a number of security features that protects your device, operating system, applications, and data. These features deliver comprehensive, built-in, and ongoing protection against cyber threats. In this module, you will learn about the most important of these features, including Windows Defender Firewall, Virtual Secure Mode, Credential Guard, Remote Credential Guard, and Device Guard, BitLocker and AppLocker, Windows Defender Antivirus, Windows Defender SmartScreen, and Windows 10 telemetry.
    • Lessons
      • Core built-in Windows 10 security features
      • Additional built-in software security features
    • After completing this module, you will be able to:
      • Describe core built-in Windows 10 security features
      • Describe additional built-in Windows 10 security features
      • Describe Windows Defender Firewall
      • Explain the architectural design that Virtual Secure Mode is based on
      • Describe Credential Guard
      • List the latest BitLocker enhancements
      • Provide an overview of Windows Defender Antivirus functionality
      • Explain the benefits provided by Windows Information Protection
      • List the Windows PowerShell networking cmdlets
      • Describe Windows Defender Remote Credential Guard
      • Explain the architectural design that Windows Defender Device Guard is based on
      • List the benefits of AppLocker with Windows Defender Device Guard
      • Describe Windows Defender Smart Screen
      • Provide an overview of Windows 10 Telemetry
  • Module 3: The latest Windows 10 Security-related FeaturesAs described in the first module of this course, contemporary security threat landscape is one of aggressive and tenacious threats. In recognition of this landscape, Microsoft continues to strengthen the security posture of Windows 10 by developing new and enhance existing security features intended to make it difficult and costly to find and exploit software vulnerabilities. These features are designed to:> Eliminate entire classes of vulnerabilities> Break exploitation techniques> Contain the damage and prevent persistence> Limit the window of opportunity to exploit This module provides an overview of some of the software and firmware threats faced in the current security landscape, and the mitigations that the latest versions of Windows 10 offer in response to these threats.
    • Lessons
      • An overview of the latest Windows 10 security-related features
      • Windows 10 Ransomware Case Study
    • Lab : Implementing Windows Defender Firewall with Advanced Security on Domain-joined Windows 10 Clients
      • Implement end-to-end IPsec connectivity between a Windows 10 domain-joined client and a Windows Serv
    • Lab : Implementing BitLocker on Domain-joined Windows 10 Clients
      • Encrypt non-operating system volumes by using BitLocker
      • Recovering access to BitLocker-encrypted volumes
    • Lab : Implementing AppLocker on Domain-joined Windows 10 Clients
      • Implement AppLocker on a domain-joined Windows 10 client
    • Lab : Implementing Windows Defender Device Guard Code Integrity on Domain-joined Windows 10 Clients
      • Implement Windows Defender Device Guard Code Integrity on a domain-joined Windows 10 client
    • Lab : Implementing Windows Defender Remote Credential Guard and Remote Admin mode on Domain-joined Windows
      • Implement Remote Desktop session protection with Remote Credential Guard
      • Implement Remote Desktop session protection with Restricted Admin Mode
    • After completing this module, you will be able to:
      • Describe the functionality Enterprise Certificate Pinning
      • Provide an overview of Windows Hello and Windows Hello for Business
      • Locate the listing of Windows 10 security settings configurable via Group Policy
      • Explain the benefits of Windows Defender Security Center
      • List the benefits of Control Flow Guard and Windows Defender Exploit Guard
      • Describe the functionality of Windows Defender Application Guard
      • Provide an overview of Windows Defender Advanced Threat Protection

Koolitaja:
Peep Võrno
Peep on serverite ja võrkude sügavama hingeelu vastu suurt huvi tundnud juba aastast 1992. Koolitajana aktiivsemalt ametis alates aastast 2003. IT spetsialistide koolituste koolitaja-konsultant.
Peep on alati rõõmsameelne, optimistlik ja õppijaid motiveeriv juhendaja. Ta räägib aeglaselt ja piisavalt valjult, et ikka kõik kuuleks; jaksab vajadusel seletada sama asja uuesti ja uuesti. Peab oluliseks aidata inimene üle hirmust kõige uue ja õppimise ees.
Sertifikaadid ja tunnistused

  • Microsoft Certified Trainer (MCT) aastast 2003
  • AASTA KOOLITAJA 2010

Koolitushind sisaldab:

  • ametlikke õppematerjale;
  • koolitaja konsultatsiooni õpitud teemade kohta e-posti teel pärast koolitust;
  • tunnistust.

Lisaväärtusena pakume:

  • sooje jooke koos küpsistega;
  • lõunasööki igal koolituspäeval;
  • soodushinnaga registreerimise võimalust järgmisele kalendrikoolitusele;
  • tasuta parkimist.

Küsin koolituse kohta lisainfot

Koolitusfirma tutvustus

IT Koolitus on juhtiv info- ja kommunikatsioonitehnoloogia ning IT projektijuhtimise koolitusteenuse pakkuja Baltikumis. Loen koolitusfirma kohta veel...

Osalen koolitusel

MOC-40554 Microsoft Security Workshop: Implementing Windows 10 Security Features

NB! Hetkel ei ole koolitusel aktiivset toimumisaega.
Kui soovid, et teavitaksime Sind, kui see või mõni sarnane koolitus taas toimumas on, siis palun jäta meile oma kontaktandmed ja täpsem soov.
Soovin teavitust kuni kuu jooksul.