Windows Security and Hardening

Fundamentals of Windows Security

1
WSH – Understanding the security transformation
2
WSH – Living in today’s digital world
3
WSH – Today’s threats
4
WSH – Ransomware preparedness
5
WSH – Identifying vulnerabilities
6
WSH – Recognizing breaches
7
WSH – Current security challenges
8
WSH – Focusing on zero trust

Building a Baseline

1
WSH – Overview of baselining
2
WSH – Introduction to policies, standards, procedures, and guidelines
3
WSH – Incorporating change management
4
WSH – Implementing a security framework
5
WSH – Building baseline controls
6
WSH – Incorporating best practices

Hardware and Virtualization

1
WSH – Physical servers and virtualization
2
WSH – Introduction to hardware certification
3
WSH – The firmware interface, TPM, and Secure Boot
4
WSH – Isolated protection with VBS
5
WSH – Protecting data from lost or stolen devices
6
WSH – Hardware security recommendations and best practices

Networking Fundamentals for Hardening Windows

1
WSH – Network security fundamentals
2
WSH – Understanding Windows network security
3
WSH – Windows Defender Firewall and Advanced Security
4
WSH – Web protection features in Microsoft Defender for Endpoint
5
WSH – Introducing Azure network security

Identity and Access Management

1
WSH – Identity and access management overview
2
WSH – Implementing account and access management
3
WSH – Understanding authentication, MFA, and going passwordless
4
WSH – Using Conditional Access and Identity Protection

Administration and Policy Management

1
WSH – Understanding device administration
2
WSH – Managing devices with Configuration Manager
3
WSH – Managing devices with Intune
4
WSH – Administering a security baseline

Deploying Windows Securely

1
WSH – Device provisioning and upgrading Windows
2
WSH – Building hardened Windows images
3
WSH – Provisioning devices with Windows Autopilot
4
WSH – Deploy images to Azure Virtual Desktop
5
WSH – Deploying Windows 365 Cloud PC

Keeping Your Windows Client Secure

1
WSH – Securing your Windows clients
2
WSH – Staying updated with Windows Update for Business
3
WSH – Enforcing policies and configurations
4
WSH – Enabling BitLocker to prevent data theft
5
WSH – Going passwordless with Windows Hello for Business
6
WSH – Configuring a device compliance policy
7
WSH – Deploying Windows Security Baselines
8
WSH – Configuring Windows Security features

Advanced Hardening for Windows Clients

1
WSH – Securing enterprise web browsers
2
WSH – Securing Microsoft 365 apps
3
WSH – Advanced protection features with Microsoft Defender

Mitigating Common Attack Vectors

1
WSH – Preventing an Adversary-in-the-Middle attack
2
WSH – Protecting against lateral movement and privilege escalation
3
WSH – Windows privacy settings

Server Infrastructure Management

1
WSH – Overview of the data center and the cloud (IaaS, PaaS, and SaaS)
2
WSH – Implementing access management in Windows servers
3
WSH – Understanding Windows Server management tools
4
WSH – Using Azure services to manage Windows servers
5
WSH – Connecting securely to Windows servers remotely

Keeping Your Windows Server Secure

1
WSH – Windows Server versions
2
WSH – Security roles in Windows Server
3
WSH – Configuring Windows updates
4
WSH – Configuring Windows Defender
5
WSH – Hardening Windows Server
6
WSH – Application Control Policies using WDAC
7
WSH – Implementing PowerShell security

Security Monitoring and Reporting

1
WSH – MDE features
2
WSH – Onboarding Windows clients to MDE
3
WSH – Collecting telemetry with Azure Monitor Logs
4
WSH – Monitoring with Azure Monitor and activity logs
5
WSH – Overview of Microsoft Defender for Cloud
6
WSH – Reporting in MEM
7
WSH – Monitoring health and updates of Office apps

Security Operations

1
WSH – Introducing the SOC
2
WSH – Understanding XDR
3
WSH – Using the Microsoft 365 Defender portal
4
WSH – Security operations with Defender for Endpoint
5
WSH – Investigating threats with Defender for Cloud
6
WSH – Enabling Azure native SIEM with Microsoft Sentinel
7
WSH – Protecting apps with Defender for Cloud Apps
8
WSH – Monitoring Hybrid environments with Defender for Identity
9
WSH – Data protection with Microsoft 365
10
WSH – Planning for business continuity

Testing and Auditing

1
WSH – Validating security controls
2
WSH – Vulnerability scanning overview
3
WSH – Planning for penetration testing
4
WSH – An insight into security awareness, training, and testing

Top 10 Recommendations and the Future

1
WSH – The 10 most important to-do’s
2
WSH – The future of device security and management
3
WSH – Security and the future

Be the first to add a review.

Please, login to leave a review
Add to Wishlist
Enrolled: 0 students
Lectures: 88

Archive

Working hours

Monday 9:30 am - 6.00 pm
Tuesday 9:30 am - 6.00 pm
Wednesday 9:30 am - 6.00 pm
Thursday 9:30 am - 6.00 pm
Friday 9:30 am - 5.00 pm
Saturday Closed
Sunday Closed
Windows Security and Hardening
Price:
Free