Introduction
  • Welcome to the course
  • Let's begin with some theory
  • System security policy - basics
Good practicies in managing server
  • Server manager - overview and roles
  • Security Configuration Wizard
  • SCW: Firewall
  • SCW: Auditing
Security policies
  • Functionality level
  • Increasing functional level
  • Windows security settings
  • Groups, system services and registry
  • Security Compliance Manager
  • SCM: Reviewing options
  • SCM: Configuring policy
  • SCM: Managing templates
Data and application security
  • Introduction to data security
  • Theoretical basics about data and app security
  • Data encription
  • Using system mechanisms to protect data
  • Securing applications with AppLocker
  • Executable rules
  • AppLocker in practice
Monitoring security level
  • What you should know about monitoring the security
  • Let's start with Windows Server Update services
  • Report viewer
  • Active Directory
  • Configuring advanced options
Group policy managment
  • Group Policies
  • Linking the GPO
  • Local administrators
Certificates
  • Certificates authority
  • Using CA
  • How to issue certificates automaticly
Testing configuration
  • How to check settings in real environment?
  • CA website
  • Attack Surface Analyzer
  • Now it's your turn. Thank you for taking part in our training.
Rootkits and Stealth Apps: Creating and Revealing v2.0 course
  • Writing a shellcode
BONUS section - get your coupon code here
  • Become CISS - Certified Ethical Hacking Training
  • BONUS LECTURE: Learn more and get to know our other courses
  • Thank you for joining the training