Windows Server Advanced Security
(W8ASEV, Live Instructor-Led Training, 5 days)


Description

This SETC certified course provides participants with a comprehensive exploration of the art and science of securing a Windows Server environment. Beginning with a tour of the types of threats that are commonly found in a corporate network, the course proceeds through a complete exploration of the Plan, Detect, Respond and Protect lifecycle as it aplies in a Windows Server environment. If you want to protect your Windows servers from malware and hacker attacks, this is the course for you.

Dates and Pricing


Jan 15 to Jan 19, 2018$2,500/person Feb 12 to Feb 16, 2018$2,500/person Mar 12 to Mar 16, 2018$2,500/person

Outline

Server Security and Malware
The Anatomy of an Attack
PDRP: Plan, Detect, Respond, Prevent
Threat Sources
Threat Categories
Dealing with Viruses
Dealing with Worms
Dealing with Spyware
Dealing with Email Attacks
Dealing with Malevolent Scripts
What about IIS, WCF and other Remote Access Technologies?
What about Application Servers?
About Windows Security Measures and Tools
The Hacker View of Windows Server
About Authentication and Authorization
Security Architecture
Essential Security Principles
Forests, Trees and Domains
Exploring the SID
Server Authentication
Server Authorization
About Auditing and Logging
Security Architecture Planning
Server Architecture
Defining a Maintenance Plan
About Change Control
About Contingency Planning
Service Minimization
Applying Patches
Implementing Honeypots
Features and Tools
Secure Default Installation
About Usernames and Passwords
Internet Connection Firewall
Security Templates and Security Configuration
Microsoft Baseline Security Analyzer
Using Group Policy
Using IPSec
The Encrypted File System
Windows File Protection
Auditing
Implementing Auditing
Planning the Audit Strategy
Auditing from a Windows System
Auditing from a UNIX System
Securing Applications
Protecting the HTTP and FTP Server
Protecting Mail Servers
Protecting DNS Servers
Protecting Desktop Applications
Protecting Corporate Applications
Cryptography
About Cryptography
Overview of DES and AES
About Cryptographic Algorithms
Using EFS
What about SSL?
About Public Keys and Private Keys
Using SSL for Encrypted Communication
Authentication
Authentication Overview
Basic Authentication
Kerberos Authentication
Kerberos Architecture
Kerberos and Group Policy
Windows Support for Kerberos
Windows Server and PKI
VPNs and IPSec
VPN Essentials
About LAN to LAN VPNs
PPTP and L2TP for LAN to LAN VPNs
Implementing a Remote Access VPN
PPTP and L2TP for Remote Access VPNs
Using IPSec