Windows Server 2016 Security Hardening
Windows Server 2016 is not as secure “out of the box” as most organizations require. This course explains how to beef up security using encryption, updates, software restrictions, credential management, and security baselines.
Windows Server 2016 provides tools for administrators to armor-plate server systems to protect data, ensure stability, avoid malware and guard against credential theft. BitLocker and EFS protect data at rest with robust and manageable encryption as well as platform validation. In this course, Windows Server 2016 Security Hardening, you’ll discover how to harden your security so that it’s orders of magnitude more secure than the default configuration. First, you’ll discover how to encrypt server volumes and folders so only legitimate users have access. Next, you’ll explore how to build a Windows update architecture that keeps servers properly patched at all times. Then, you’ll learn how to stop password theft with Credential Guard and Virtualization Based Security. Finally, you’ll get organized about security hardening with free baselines, templates, and tools. By the end of this course, you’ll know how to set up BitLocker and EFS, automate update distribution with WSUS, restrict software with digital signatures and code integrity policies, protect Kerberos tickets and password hashes, and incorporate security best practices from Microsoft after tailoring them for your own organization.
Author Name: Glenn Weadock
Author Description:
Glenn E. Weadock (MDAA, MCAAA, MCT, MCSE, MCSA, MCITP, A+, Security+) is the president of Independent Software Inc., which he founded in 1982 after graduating from Stanford University’s engineering school. ISI provides expert witness, consulting, and training services in the IT field with a focus on operating systems and networking technologies. Glenn is the author of 18 commercial books on topics such as Windows clients and servers, Microsoft certification, website design, troubleshooting, and … more
There are no reviews yet.