Sécurité Windows Server 2016 (MS20744)

Cette formation Microsoft Windows Server 2016 de cinq jours fournit aux participants les connaissances nécessaires pour améliorer la sécurité de l'infrastructure TI qu'ils administrent. Ce cours commence par une emphase sur l'importance de connaitre les types de menaces et démontre comment ils est possible de sécuriser les accès et permissions pour assurer que les administrateurs peuvent seulement exécutés des activités pour lesquelles il existe un privilège accordé explicitement.

 

Ce cours informe aussi comment il est possible de se protéger des attaques de programmes malicieux, l'identification des problèmes en utilisant les outils d'audit, la fonctionnalité Advanced Threat Analysis disponible avec Windows Server 2016, la sécurisation de la virtualisation et l'utilisation des nouvelles options de déploiement comme le Nano Server et les conteneurs pour améliorer la sécurité. Ce cours explique aussi comment vous pouvez utiliser le chiffrage et le contrôle d'accès dynamique pour améliorer la sécurité de votre réseau.

Plan de formation: 

Module 1: Attacks, breach detection, and Sysinternals tools

This module frames the course so that students are thinking about security in environments where the infrastructure’s basis is predominantly Microsoft products. The module begins with teaching students about the “assume breach” philosophy and getting them to understand the different types of attacks that can occur, including attack timelines and vectors. Additionally, it gets students thinking about key resources, how they respond when they detect an incident, and how an organization’s direct needs and legislative requirements dictate its security policy.

  • Understanding attacks

  • Detecting security breaches

  • Examining activity with the Sysinternals tools

 

Module 2: Protecting credentials and privileged access

This module covers user accounts and rights, computer and service accounts, credentials, Privileged Access Workstations, and the Local Administrator Password Solution. In this module, students will learn about configuring user rights and security options, protecting credentials by using Credential Guard, implementing Privileged Access Workstations, and managing and deploying Local Administrator Password Solution to manage local administrator account passwords.

  • Understanding user rights

  • Computer and service accounts

  • Protecting credentials

  • Privileged Access Workstations and jump servers

  • Local administrator password solution

 

Module 3: Limiting administrator rights with Just Enough Administration

This module explains how to deploy and configure Just Enough Administration (JEA), which is an administrative technology that allows students to apply role-based access control (RBAC) principles through Windows PowerShell remote sessions.

  • Understanding JEA

  • Verifying and deploying JEA

 

Module 4: Privileged access management and administrative forests

This module explains the concepts of Enhanced Security Administrative Environment (ESAE) forests, Microsoft Identity Manager (MIM), and Just In Time (JIT) Administration, or Privileged Access Management (PAM).

  • ESAE forests

  • Overview of Microsoft Identity Manager

  • Overview of JIT administration and PAM

 

Module 5: Mitigating malware and threats

This module explains how to use tools such as Windows Defender, Windows AppLocker, Microsoft Device Guard, Windows Defender Application Guard, and Windows Defender Exploit Guard.

  • Configuring and managing Windows Defender

  • Restricting software

  • Configuring and using the Device Guard feature

 

Module 6: Analyzing activity with advanced auditing and log analytics

This module provides an overview of auditing, and then goes into detail about how to configure advanced auditing and Windows PowerShell auditing and logging.

  • Overview of auditing

  • Advanced auditing

  • Windows PowerShell auditing and logging

 

Module 7: Deploying and configuring Advanced Threat Analytics and Microsoft

Operations Management Suite

This module explains the Microsoft Advanced Threat Analytics tool and the Microsoft Operations Management suite (OMS). It also explains how you can use them to monitor and analyse the security of a Windows Server deployment. You will also learn about Microsoft Azure Security Center, which allows you to manage and monitor the security configuration of workloads both on-premises and in the cloud.

  • Deploying and configuring ATA

  • Deploying and configuring Microsoft Operations Management Suite

  • Deploying and configuring Azure Security Center

 

Module 8: Secure Virtualization Infrastructure

 

This module explains how to configure Guarded Fabric VMs, including the requirements for shielded and encryption-supported VMs.

  • Guarded fabric

  • Shielded and encryption-supported virtual machines

Module 9: Securing application development and server-workload infrastructure

 

This module describes the SCT, which is a free, downloadable set of tools that you can use to create and apply security settings. You will also learn about improving platform security by reducing the size and scope of application and compute resources by containerizing workloads.

  • Using SCT

  • Understanding containers

 

Module 10: Planning and protecting data

 

This module explains how to configure Encrypting File System (EFS) and BitLocker drive encryption to protect data at rest. You will also learn about extending protection into the cloud by using Azure Information Protection.

  • Planning and implementing encryption

  • Planning and implementing BitLocker

  • Protecting data by using Azure Information Protection 

 

Module 11: Optimizing and securing file services

This module explains how to optimize file services by configuring File Server Resource Manager (FSRM) and Distributed File System (DFS). Students also will learn how to manage access to shared files by configuring Dynamic Access Control (DAC).

  • File Server Resource Manager

  • Implementing classification and file management tasks

  • Dynamic Access Control

 

Module 12: Securing network traffic with firewalls and encryption

This module explains how you can use Windows Firewall as an important part of an organization’s protection strategy. It explains the use of Internet Protocol security (IPsec) to encrypt network traffic and to establish security zones on your network. You will also learn about the Datacenter Firewall feature that you can use to help protect your on-premises virtual environments.

  • Understanding network-related security threats

  • Understanding Windows Firewall with Advanced Security

  • Configuring IPsec

  • Datacenter Firewall

 

Module 13: Securing network traffic

This module explores some of the Windows Server 2016 technologies that you can use to help mitigate network-security threats. It explains how you can configure DNSSEC to help protect network traffic, and use Microsoft Message Analyzer to monitor network traffic. The module also describes how to secure Server Message Block (SMB) traffic.

  • Configuring advanced DNS settings

  • Examining network traffic with Message Analyzer

  • Securing and analyzing SMB traffic

Module 1: Installing and configuring Windows Server 2016

This module explains how to install and perform post-installation configuration of Windows Server 2016 servers.

  • Introducing Windows Server 2016

  • Installing Windows Server 2016

  • Configuring Windows Server 2016

  • Preparing for upgrades and migrations

  • Migrating server roles and workloads

  • Windows Server activation models

 

Module 2: Overview of storage in Windows Server 2016

This module explains how to configure storage in Windows Server 2016.

  • Overview of storage in Windows Server 2016

  • Implementing Data Deduplication

  • Configuring iSCSI storage

  • Configuring the Storage Spaces feature in Windows Server 2016

 

Module 3: Implementing directory services

This module explains how to implement the Directory Services feature.

  • Deploying Active Directory domain controllers

  • Implementing service accounts

  • Azure AD

 

Module 4: Implementing AD FS

This module explains how to implement an AD FS deployment.

  • Overview of AD FS

  • Deploying AD FS

  • Implementing AD FS for a single organization

  • Implementing Web Application Proxy

  • Implementing SSO with Microsoft online services

 

Module 5: Implementing network services

This module explains how to configure advanced features for Dynamic Host Configuration Protocol (DHCP) and configure IP Address Management (IPAM).

  • Overview of networking enhancements

  • Implementing IPAM

  • Managing IP address spaces with IPAM

 

Module 6: Implementing Hyper-V

This module explains how to install and configure Hyper-V virtual machines.

  • Configuring the Hyper-V role in Windows Server 2016

  • Configuring Hyper-V storage

  • Configuring Hyper-V networking

  • Configuring Hyper-V virtual machines

 

Module 7: Configuring advanced networking features

This module explains how to implement an advanced networking infrastructure.

  • Overview of high-performance networking features

  • Configuring advanced Hyper-V networking features

 

Module 8: Implementing Software Defined Networking

This module explains how to implement software-defined networking.

  • Overview of SDN

  • Implementing network virtualization

  • Implementing Network Controller

Module 9: Implementing remote access

This module explains how to configure connectivity for remote users by using the DirectAccess feature.

  • Remote access overview

  • Implementing DirectAccess

  • Implementing VPN

 

Module 10: Deploying and managing Windows and Hyper-V containers

This module provides an overview of Windows Server 2016 containers. Additionally, it explains how to deploy, install, configure, and manage containers in Windows Server 2016.

  • Overview of containers in Windows Server 2016

  • Preparing for containers

  • Installing, configuring, and managing containers by using Docker

 

Module 11: Implementing failover clustering

This module explains how to implement failover clustering to provide high availability for network services and applications.

  • Overview of failover clustering

  • Implementing a failover cluster

  • Configuring highly available applications and services on a failover cluster

  • Maintaining a failover cluster

  • Implementing a stretch cluster

 

Module 12: Implementing failover clustering with Windows Server 2016 Hyper-V

 

This module explains how to deploy and manage Hyper-V virtual machines in a failover cluster.

  • Overview of the integration of Hyper-V Server 2016 with failover clustering

  • Implementing Hyper-V virtual machines on failover clusters

  • Implementing Windows Server 2016 Hyper-V virtual machine migration

  • Implementing Hyper-V Replica

FORMATION PUBLIQUE
DURÉE
COÛT
35 HEURES - 5 JOURS
2 695 $