3399 zł netto
KLUCZOWE ZAGADNIENIA
- wykrywanie podatności z zastosowaniem narzędzi Sysinternals
- ochrona poświadczeń i dostępu uprzywilejowanego
- ograniczanie praw administracyjnych i konfiguracja Just Enough Administration (JEA)
- administrowanie rozwiązaniami Enhanced Security Administrative Environment (ESAE), Microsoft Identity Manager (MIM), and Just In Time (JIT) Administration oraz Privileged Access
- Management (PAM)
- zarządzanie rozwiązaniami chroniącymi przed zagrożeniami oraz złośliwym oprogramowaniem
- ochrona aplikacji z zastosowaniem AppLocker, Windows Defender, reguł Device Guard oraz EMET
- analiza aktywności za pomocą polityk kontroli i audytów
- zarządzanie zagrożeniami z zastosowaniem Advanced Threat Analytics (ATA) oraz Microsoft Operations Management Suite (OMS)
- zabezpieczanie infrastruktury wirtualnej
- zabezpieczanie wdrażania oprogramowanie oraz infrastruktury serwerowej
- zastosowanie Security Compliance Manager (SCM)
- wdrażanie kontenerów i Nano Server
- ochrona danych za pomocą szyfrowania
- ograniczanie dostępu do plików i folderów
- konfiguracja Windows Firewall oraz ochrona ruchu sieciowego
- zarządzanie aktualizacjami oprogramowania
Paweł Pławiak, Microsoft Certified Trainer
CERTYFIKACJE ZAWODOWE
Certyfikacja podstawowa |
CertyfIkacja specjalistyczna |
Certyfikacja ekspercka |
FUNDAMENTALS |
ASSOCIATE |
EXPERT |
Tematyka szkolenia pokrywa zagadnienia wymagane na ścieżce MCSE: Cloud Platform and Infrastructure
Dowiedz się więcej o certyfikacjach Microsoft
POZIOM SZKOLENIA
podstawowy |
średniozaawansowany |
zaawansowany |
ekspercki |
100 |
200 |
300 |
400 |
TEMATYKA ZAJĘĆ
- Module 1: Attacks, breach detection, and Sysinternals tools
Understanding attacks
Detecting security breaches
Examining activity with the Sysinternals tools
Lab: Basic breach detection and incident response strategies
- Module 2: Protecting credentials and privileged access
Understanding user rights
Computer and service accounts
Protecting credentials
Privileged Access Workstations and jump servers
Local administrator password solution
Lab: Implementing user rights, security options, and group managed service accounts
Lab: Configuring and deploying LAPs
- Module 3: Limiting administrator rights with Just Enough Administration
Understanding JEA
Verifying and deploying JEA
Lab: Limiting administrator privileges by using JEA
- Module 4: Privileged access management and administrative forests
ESAE forests
Overview of Microsoft Identity Manager
Overview of JIT administration and PAM
Lab: Limiting administrator privileges with PAM
- Module 5: Mitigating malware and threats
Configuring and managing Windows Defender
Restricting software
Configuring and using Device Guard feature
Lab: Securing applications with Windows Defender, AppLocker, Device Guard Rules
- Module 6: Analysing activity with advanced auditing and log analytics
Overview of auditing
Advanced auditing
Windows PowerShell auditing and logging
Lab: Configuring advanced auditing
- Module 7: Deploying and configuring Advanced Threat Analytics and Microsoft Operations Management Suite
Deploying and configuring ATA
Deploying and configuring Microsoft OMS
Lab: Deploying ATA, Microsoft Operations Management Suite, and Azure Security Center
- Module 8: Securing Virtualization Infrastructure
Guarded fabric
Shielded and encryption-supported VMs
Lab: Guarded fabric with Admin-Trusted attestation and shielded VMs
- Module 9: Securing application development and server-workload infrastructure
Using SCT
Understanding containers
Lab: Using SCT
Lab: Deploying and configuring containers
- Module 10: Planning and protecting data
Planning and implementing encryption
Planning and implementing BitLocker
Protecting data by using Azure Information Protection
Lab: Protecting data by using encryption and BitLocker
- Module 11: Optimizing and securing file services
File Server Resource Manager
Implementing classification and file-management tasks
Dynamic Access Control (DAC)
Lab: Quotas and file screening
Lab: Implementing DAC
- Module 12: Sceuring network traffic with firewalls and encryption
Understanding network-related security threats
Understanding Windows Firewall with Advanced Security
Configuring IPsec
Datacenter Firewall
Lab: Configuring Windows Firewall with Advanced Security
- Module 13: Securing network traffic
Configuring advanced DNS settings
Examining network traffic with Message Analyzer
Securing and analyzing SMB traffic
Lab: Securing DNS
Lab: Microsoft Message Analyzer and SMB encryption