Securing Microsoft Windows Server 2016 (mentor)
- Overview: Securing Windows Server 2016 - Overview
- Overview: Attacks, breach detection, and Sysinternals tools
- Lesson 1: Understanding attacks
- Lesson 2: Detecting security breaches
- Lesson 3: Examining activity with the Sysinternals tools
- Lab 1: Basic breach detection and incident response strategies
- Overview: Protecting credentials and privileged access
- Lesson 1: Understanding user rights
- Lesson 2: Computer and service accounts
- Lesson 3: Protecting credentials
- Lab 2A: Implementing user rights, security options, and group managed service accounts
- Lesson 4: Privileged Access Workstations and jump servers
- Lesson 5: Local administrator password solution
- Lab 2B: Configuring and deploying LAPS
- Overview: Limiting administrator rights with Just Enough Administration
- Lesson 1: Understanding JEA
- Lesson 2: Verifying and deploying JEA
- Lab 3: Limiting administrator privileges with JEA
- Overview: Privileged access management and administrative forests
- Lesson 1: ESAE forests
- Lesson 2: Overview of Microsoft Identity Manager
- Lesson 3: Overview of JIT administration and PAM
- Lab 4: Limiting administrator privileges with PAM
- Overview: Mitigating malware and threats
- Lesson 1: Configuring and managing Windows Defender
- Lesson 2: Restricting software
- Lesson 3: Configuring and using the Windows Defender Device Guard feature
- Lab 5: Securing applications with Windows Defender, AppLocker, and Windows Defender Device Guard Rules
- Overview: Analyzing activity with advanced auditing and log analytics
- Lesson 1: Overview of auditing
- Lesson 2: Advanced auditing
- Lesson 3: Windows PowerShell auditing and logging
- Lab 6: Configuring advanced auditing
- Overview: Deploying and configuring Advanced Threat Analytics and Microsoft Operations Management Suite
- Lesson 1: Deploying and configuring ATA
- Lesson 2: Deploying and configuring Microsoft Operations Management Suite
- Lesson 3: Deploying and configuring Azure Security Center
- Lab 7: Deploying ATA, Microsoft Operations Management Suite, and Azure Security Center
- Overview: Secure virtualization infrastructure
- Lesson 1: Guarded fabric
- Lesson 2: Shielded and encryption-supported virtual machines
- Lab 8: Guarded fabric with Admin-trusted attestation and shielded VMs
- Overview: Securing application development and server-workload infrastructure
- Lesson 1: Using the SCT
- Lab 9A: Using the SCT
- Lesson 2: Understanding containers
- Lab 9B: Deploying and configuring containers
- Overview: Planning and protecting data
- Lesson 1: Planning and implementing encryption
- Lesson 2: Planning and implementing BitLocker
- Lab 10: Protecting data by using encryption and BitLocker
- Lesson 3: Protecting data by using Azure Information Protection
- Overview: Optimizing and securing file services
- Lesson 1: File Server Resource Manager
- Lesson 2: Implementing classification and file management tasks
- Lab 11A: Quotas and file screening
- Lesson 3: Dynamic Access Control
- Lab 11B: Implementing Dynamic Access Control
- Overview: Securing network traffic with firewalls and encryption
- Lesson 1: Understanding network-related security threats
- Lesson 2: Understanding Windows Firewall with Advanced Security
- Lesson 3: Configuring IPsec
- Lab 12: Configuring Windows Firewall with Advanced Security
- Lesson 4: Datacenter Firewall
- Overview: Securing network traffic
- Lesson 1: Configuring advanced DNS settings
- Lab 13A: Securing DNS
- Lesson 2: Examining network traffic with Message Analyzer
- Lesson 3: Securing and analyzing SMB traffic
- Lab 13B: Microsoft Message Analyzer and SMB encryption
Az oktatóról
Ország Tamás vagyok, egészen csekély gyermekkoromban kaptam el a számítógép-fertőzést, amiből szerencsére azóta sem gyógyultam ki. Fejlesztő, rendszerszervező és üzemeltető végzettségeim vannak, belekóstoltam mindegyikbe, végül az utóbbi ízlett/ízlik a legjobban, különös tekintettel a hálózatokra, szerverrendszerek fenntartására. Sok különböző környezetben megfordultam a mindenes IT SMB-től a nagybankokig, kutatóintézettől a saját vállalkozásig. Jelenleg a Training360 oktatóközpontot erősítem rendszermérnökként, vezető oktatóként. Nem zárom ki, hogy külső szemlélő számára kockának tűnhetek, mivel munkaidőn túl is körülvesznek a számítógépek. Mondhatjuk, szabadidőmben is mindenre kíváncsi vagyok.