Fundamentals of Windows Security
1
WSH – Understanding the security transformation
2
WSH – Living in today’s digital world
3
WSH – Today’s threats
4
WSH – Ransomware preparedness
5
WSH – Identifying vulnerabilities
6
WSH – Recognizing breaches
7
WSH – Current security challenges
8
WSH – Focusing on zero trust
Building a Baseline
1
WSH – Overview of baselining
2
WSH – Introduction to policies, standards, procedures, and guidelines
3
WSH – Incorporating change management
4
WSH – Implementing a security framework
5
WSH – Building baseline controls
6
WSH – Incorporating best practices
Hardware and Virtualization
1
WSH – Physical servers and virtualization
2
WSH – Introduction to hardware certification
3
WSH – The firmware interface, TPM, and Secure Boot
4
WSH – Isolated protection with VBS
5
WSH – Protecting data from lost or stolen devices
6
WSH – Hardware security recommendations and best practices
Networking Fundamentals for Hardening Windows
1
WSH – Network security fundamentals
2
WSH – Understanding Windows network security
3
WSH – Windows Defender Firewall and Advanced Security
4
WSH – Web protection features in Microsoft Defender for Endpoint
5
WSH – Introducing Azure network security
Identity and Access Management
1
WSH – Identity and access management overview
2
WSH – Implementing account and access management
3
WSH – Understanding authentication, MFA, and going passwordless
4
WSH – Using Conditional Access and Identity Protection
Administration and Policy Management
1
WSH – Understanding device administration
2
WSH – Managing devices with Configuration Manager
3
WSH – Managing devices with Intune
4
WSH – Administering a security baseline
Deploying Windows Securely
1
WSH – Device provisioning and upgrading Windows
2
WSH – Building hardened Windows images
3
WSH – Provisioning devices with Windows Autopilot
4
WSH – Deploy images to Azure Virtual Desktop
5
WSH – Deploying Windows 365 Cloud PC
Keeping Your Windows Client Secure
1
WSH – Securing your Windows clients
2
WSH – Staying updated with Windows Update for Business
3
WSH – Enforcing policies and configurations
4
WSH – Enabling BitLocker to prevent data theft
5
WSH – Going passwordless with Windows Hello for Business
6
WSH – Configuring a device compliance policy
7
WSH – Deploying Windows Security Baselines
8
WSH – Configuring Windows Security features
Advanced Hardening for Windows Clients
1
WSH – Securing enterprise web browsers
2
WSH – Securing Microsoft 365 apps
3
WSH – Advanced protection features with Microsoft Defender
Mitigating Common Attack Vectors
1
WSH – Preventing an Adversary-in-the-Middle attack
2
WSH – Protecting against lateral movement and privilege escalation
3
WSH – Windows privacy settings
Server Infrastructure Management
1
WSH – Overview of the data center and the cloud (IaaS, PaaS, and SaaS)
2
WSH – Implementing access management in Windows servers
3
WSH – Understanding Windows Server management tools
4
WSH – Using Azure services to manage Windows servers
5
WSH – Connecting securely to Windows servers remotely
Keeping Your Windows Server Secure
1
WSH – Windows Server versions
2
WSH – Security roles in Windows Server
3
WSH – Configuring Windows updates
4
WSH – Configuring Windows Defender
5
WSH – Hardening Windows Server
6
WSH – Application Control Policies using WDAC
7
WSH – Implementing PowerShell security
Security Monitoring and Reporting
1
WSH – MDE features
2
WSH – Onboarding Windows clients to MDE
3
WSH – Collecting telemetry with Azure Monitor Logs
4
WSH – Monitoring with Azure Monitor and activity logs
5
WSH – Overview of Microsoft Defender for Cloud
6
WSH – Reporting in MEM
7
WSH – Monitoring health and updates of Office apps
Security Operations
1
WSH – Introducing the SOC
2
WSH – Understanding XDR
3
WSH – Using the Microsoft 365 Defender portal
4
WSH – Security operations with Defender for Endpoint
5
WSH – Investigating threats with Defender for Cloud
6
WSH – Enabling Azure native SIEM with Microsoft Sentinel
7
WSH – Protecting apps with Defender for Cloud Apps
8
WSH – Monitoring Hybrid environments with Defender for Identity
9
WSH – Data protection with Microsoft 365
10
WSH – Planning for business continuity
Testing and Auditing
1
WSH – Validating security controls
2
WSH – Vulnerability scanning overview
3
WSH – Planning for penetration testing
4
WSH – An insight into security awareness, training, and testing
Top 10 Recommendations and the Future
1
WSH – The 10 most important to-do’s
2
WSH – The future of device security and management
3
WSH – Security and the future
Be the first to add a review.
Please, login to leave a review