Topics:
Attacks, Breach Detection, and Sysinternals Tools
Understanding attacks
Detecting security breaches
Examining activity with the Sysinternals tools
Protecting Credentials and Privileged Access
Understanding User Rights
Computer and Service Accounts
Protecting Credentials
Privileged Access Workstations and jump servers
Local administrator password solution
Limiting Administrator Rights with Just Enough Administration (JEA)
Understanding JEA
Verifying and Deploying JEA
Privileged Access Management and Administrative Forest
ESAE forests
Overview of Microsoft Identity Manager (MIM)
Overview of JIT administration and PAM
Mitigating Malware and Threats
Configuring and Managing Windows Defender
Restricting software
Configuring and Using Device Guard
Analyzing Activity with Advanced Auditing and Log Analytics
Overview of Auditing
Advanced Auditing
Windows PowerShell Auditing and Logging
Deploying and Configuring Advanced Threat Analytics (ATA) and Operations Management Suite (OMS)
Deploying and configuring ATA
Deploying and configuring Microsoft Operations Management Suite
Deploying and configuring Azure Security Center
Secure Virtualization Infrastructure
Guarded Fabric
Shielded and Encryption-Supported VMs
Securing Application Development and Server-Workload Infrastructure
Using Security Compliance Manager
Understanding Containers
Planning and Protecting Data
Planning and Implementing Encryption
Planning and Implementing BitLocker
Protecting data by using Azure Information Protection
Optimizing and Securing File Services
Introduction to FSRM
Implementing Classification and File-Management Tasks
Access Control (DAC)
Securing Network Traffic with Firewalls and Encryption
Understand network-related security threats
Understanding Windows Firewall with Advanced Security
Configuring IPsec
Datacenter Firewall
Securing Network Traffic
Configuring Advanced DNS Settings
Examining Network Traffic with Microsoft Message Analyzer
Securing Server Analyzing SMB Traffic