Video description
In this Securing Windows Networks training course, expert author Mark Long teaches you the tools and functionalities available to secure Microsoft networks. This course is designed for users that have a basic understanding of Microsoft networking.
You will start by learning the basics of system security, then jump into learning about operating system security, including users and groups, permissions and rights, and managing user accounts. From there, Mark will teach you about Windows access control, protecting local data, and securing data in transit. This video tutorial also covers file sharing, securing the registry, system hardening, and Windows firewall. Finally, you will learn about security monitoring, backup and recovery, and Windows 10 security enhancements.
Once you have completed this computer based training course, you will be able to apply these tools, principles, and functionalities available to secure your own Windows networks. Working files are included, allowing you to follow along with the author throughout the lessons.
Table of contents
-
Introduction
- What To Expect From This Course 00:05:43
- About The Author 00:03:22
- Windows Threats 00:06:18
- Common Attacks 00:06:18
- Windows In The Enterprise 00:06:31
- Windows Networking Options 00:06:27
- Using The MMC 00:06:15
-
System Security Basics
- Physical Access Control 00:06:25
- Policies And Procedures 00:06:22
- Employee Education 00:06:04
- Emerging Threats 00:05:52
-
Operating System Security
- Windows Architecture Basics 00:06:07
- Active Directory And Kerberos 00:05:56
- Active Directory - Authentication, Authorization And Auditing 00:05:17
- Active Directory Structure 00:04:28
- Active Directory Design 00:04:52
- Users And Groups - Part 1 00:06:30
- Users And Groups - Part 2 00:04:30
- AGDLP 00:04:23
- Users And Groups Demo 00:05:41
- Permissions And Rights 00:03:22
- Group Policy Essentials - Part 1 00:05:36
- Group Policy Essentials - Part 2 00:03:52
- Configuring Group Policy 00:06:35
- User Account Policies 00:05:49
- Minimum Password Length 00:06:07
- Managing User Accounts 00:06:15
- Setting Logon Hours 00:05:37
- Delegation Of Authentication 00:06:16
- Delegation And SPN 00:06:00
- Configuring Delegation - Part 1 00:05:33
- Configuring Delegation - Part 2 00:05:59
- RDOCs 00:06:27
-
Windows Access Control
- Principle Of Least Privilege 00:06:26
- Windows Access Model 00:05:29
- Understanding UAC 00:06:10
- Configuring UAC 00:05:41
- Server 2012 UAC 00:05:25
- Kerberos 00:06:09
- NTLM 00:02:54
- DACLs 00:03:37
-
Protecting Local Data
- Protecting Local Data 00:05:20
- Encryption Essentials 00:05:59
- Understanding TPM 00:06:07
- Managing TPM 00:05:30
- EFS Basics - Part 1 00:05:37
- EFS Basics - Part 2 00:03:43
- Managing EFS 00:04:20
- Bitlocker Essentials 00:05:45
- Bitlocker Requirements 00:06:12
- Bitlocker Modes 00:05:29
- Managing Bitlocker 00:05:02
- Network Unlock 00:03:54
- Bitlocker To Go 00:06:23
-
Securing Data In Transit
- PKI Essentials - Part 1 00:06:34
- PKI Essentials - Part 2 00:05:59
- AD Certificate Services - Part 1 00:05:49
- AGDLP Certificate Services - Part 2 00:06:51
- CA Hierarchies - Part 1 00:06:18
- CA Hierarchies - Part 2 00:02:35
- CA Roles 00:05:09
-
File Sharing
- File Sharing Essentials 00:06:31
- Managing File Shares 00:06:00
- Administrative Shares - Part 1 00:06:12
- Administrative Shares - Part 2 00:05:39
- Disabling Administrative Shares 00:03:18
- Share And Access Permissions 00:06:18
- Special Permissions - Part 1 00:05:56
- Special Permissions - Part 2 00:03:28
-
Securing The Registry
- Understanding The Registry 00:06:00
- Securing Registry Utilities 00:04:44
- Registry Key Permissions 00:03:03
- Auditing Registry Access 00:03:53
-
System Hardening
- Defining Server Roles 00:06:06
- Using Server Manager 00:06:08
- Reducing The Attack Surface 00:05:16
- Server Core 00:05:52
- Applocker Essentials 00:06:03
- Security Templates 00:05:18
-
Windows Firewall
- Firewall Essentials - Part 1 00:06:07
- Firewall Essentials - Part 2 00:04:43
- Firewall With Advanced Security 00:05:24
-
Security Monitoring
- Auditing Essentials - Part 1 00:06:07
- Auditing Essentials - Part 2 00:05:48
- Default Auditing 00:02:40
- Auditing Events 00:03:09
- Auditing AD Objects 00:02:38
- Monitoring The Security Logs 00:04:56
-
Backup And Recovery
- Disaster Recovery Basics 00:05:38
- Backup Methods 00:05:48
- Backup Types 00:03:26
- System State Backups 00:03:17
- Restoring System State Backups 00:05:08
-
Windows 10 Security Enhancements
- Windows 10 00:06:00
- Device Guard 00:05:52
- Passport 00:06:15
- Enterprise Data Protection 00:05:47
- Windows Hello 00:05:17
-
Conclusion
- Wrap Up 00:05:37
Product information
- Title: Securing Windows Networks
- Author(s):
- Release date: September 2015
- Publisher(s): Infinite Skills
- ISBN: 9781771374903
You might also like
video
Securing Your Network from Attacks
Attacks on enterprise networks and home networks are a growing problem with daily targeted attacks that …
video
Windows 10 Exam 70-697: Configuring Windows Devices LiveLessons
8+ Hours of Video Instruction More than 8 hours of video instruction to help you configure …
video
Microsoft Windows Server 2012 Certification - Exam 70-413
In this Microsoft Windows Server 2012 Certification (Exam 70-413) training course, expert author John Savill teaches …
article
Reinventing the Organization for GenAI and LLMs
Previous technology breakthroughs did not upend organizational structure, but generative AI and LLMs will. We now …