MOD 20744: Securing Windows Server 2016


Duration: 5 days 

This five-day course teaches IT Professionals how they can enhance the security of the IT infrastructure that they administer. The beginning of this course emphasizes the importance of reacting as though Network breaches have already occurred and then shows you how to protect administrative credentials and right to ensure that the administrators can only perform the tasks that are needed when they are needed.

Details of this course are:

How to mitigate malware threats
How to use auditing and the Advanced Threat Analysis feature of Windows Server 2016 to identify security issues
How to secure a virtualization platform
How to use new deployment options (Nano server and containers) to enhance security.
How to help protect access to files using encryption and dynamic access control
How to enhance your network’s security.
******Note: Those who are considering earning a certification in Securing Windows Server will also benefit from this course. *****

Once you completed this course, you will be able to:

Secure Windows Server
Secure application development and a server workload infrastructure
Manage security baselines
Configure and manage JIT administration
Manage data security
Secure your virtualization infrastructure
Manage malware and threats
Configure advanced auditing
Manage software updates
Manage threats by using Advanced Threat Analytics (ATA and Microsoft Operations Management Suite (OMS)


It is recommended that IT Professionals interested in taking this course have:

Complete courses in or have the equivalent knowledge of 740, 741, and 742
Solid and practical understanding of Active Directory Domain Services (AD DS) Principles
Solid and practical understanding of Microsoft Hyper-V Virtualization fundamentals
Understanding of Windows Server security principles

What’s included?

  • Authorized Courseware
  • Intensive Hands on Skills Development with an Experienced Subject Matter Expert
  • Hands-on practice on real Servers and extended lab support 1.800.482.3172
  • Examination Vouchers & Onsite Certification Testing- (excluding Adobe and PMP Boot Camps)
  • Academy Code of Honor: Test Pass Guarantee
  • Optional: Package for Hotel Accommodations, Lunch and Transportation

With several convenient training delivery methods offered, The Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Academy for an engaging and effective learning experience.


  • Instructor Led (the best training format we offer)
  • Live Online Classroom – Online Instructor Led
  • Self-Paced Video

Speak to an Admissions Representative for complete details

StartFinishPublic PricePublic Enroll Private PricePrivate Enroll


Module 1: Breach detection and using the Sysinternals tools


Overview of breach detection
Using the Sysinternals tools to detect breaches

Lab: Basic breach detection and incident response strategies

Identifying attack types
Using incident-response strategies
Exploring the Sysinternals tools

Module 2: Protecting credentials and privileged access


Understanding user rights
Computer and service accounts
Protecting credentials
Understanding privileged-access workstations and jump servers
Deploying a local administrator-password solution

Lab: User rights, security options, and group-managed service accounts

Configuring security options
Configuring restricted groups
Delegating privileges
Creating and managing group managed service accounts (MSAs)
Configuring the Credential Guard feature
Locating problematic accounts

Lab: Configuring and deploying LAPs
Installing a local administrator password solution (LAPs)
Configuring LAPs
Deploying LAPs

Module 3: Limiting administrator rights with Just Enough Administration


Understanding JEA
Configuring and deploying JEA
Lab: Limiting administrator privileges by using JEA

Creating a role-capability file
Creating a session-configuration file
Creating a JEA endpoint
Connecting to a JEA endpoint
Deploying JEA by using Desire State Configuration (DSC)

Module 4: Privileged Access Management and administrative forests


Understanding ESAE forests
Overview of MIM
Implementing JIT and Privileged Access Management by using MIM

Lab: Limiting administrator privileges by using Privileged Access Management

Using a layered approach to security
Exploring MIM
Configuring a MIM web portal
Configuring the Privileged Access feature
Requesting privileged access

Module 5: Mitigating malware and threats


Configuring and managing Windows Defender
Using software restricting policies (SRPs) and AppLocker
Configuring and using Device Guard
Using and deploying the Enhanced Mitigation Experience Toolkit

Lab: Securing applications by using AppLocker, Windows Defender, Device Guard Rules, and the EMET.

Configuring Windows Defender
Configuring AppLocker
Configuring and deploying Device Guard
Deploying and using EMET

Module 6: Analysing activity by using advanced auditing and log analytics


Overview of auditing
Understanding advanced auditing
Configuring Windows PowerShell auditing and logging

Lab: Configuring encryption and advanced auditing

Configuring auditing of file-system access
Auditing domain logons
Managing the configuration of advanced audit policies
Windows PowerShell logging and auditing

Module 7: Analysing activity with Microsoft Advanced Threat Analytics feature and Operations Management Suite


Overview of Advanced Threat Analytics
Understanding OMS

Lab: Advanced Threat Analytics and Operations Management Suite

Using ATA and OMS
Preparing and deploying ATA
Preparing and deploying OMS

Module 8: Securing your virtualization an infrastructure


Overview of Guarded Fabric VMs
Understanding shielded and encryption-supported VMs

Lab: Deploying and using Guarded Fabric with administrator-trusted attestation and shielded VMs

Deploying Guarded Fabric VMs with administrator-trusted attestation
Deploying a shielded VM

Module 9: Securing application development and server-workload infrastructure


Using the Security Compliance Manager
Introduction to Nano Server
Understanding containers

Lab: Using the Security Compliance Manager

Configuring a security baseline for Windows Server 2016
Deploying a security baseline for Windows Server 2016

Lab: Deploying and Configuring Nano Server and containers

Deploying, managing, and securing Nano Server
Deploying, managing, and securing Windows Server containers
Deploying, managing, and securing Hyper-V containers

Module 10: Protecting data with encryption


Planning and implementing encryption
Planning and Implementing BitLocker

Lab: Configuring EFS and BitLocker

Encrypting and recovering access to encrypted files
Using BitLocker to protect data

Module 11: Limiting access to file and folders


Introduction to FSRM
Implementing classification management and file-management tasks
Understanding Dynamic Access Control (DAC)

Lab: Configuring quotas and file screening

Configuring FSRM quotas
Configuring file screening

Lab: Implementing DAC

Preparing DAC
Implementing DAC

Module 12: Using firewalls to control network traffic flow


Understanding Windows Firewall
Software-defined distributed firewalls

Lab: Windows Firewall with Advanced Security

Creating and testing inbound rules
Creating and testing outbound rules

Module 13: Securing network traffic


Network-related security threats and connection-security rules
Configuring advanced DNS settings
Examining network traffic with Microsoft Message Analyzer
Securing SMB traffic, and analyzing SMB traffic

Lab: Connection security rules and securing DNS

Creating and testing connection security rules
Configuring and testing DNSSEC

Lab: Microsoft Message Analyzer and SMB encryption

Using Microsoft Message Analyzer
Configuring and verifying SMB encryption on SMB shares

Module 14: Updating Windows Server


Overview of WSUS
Deploying updates by using WSUS

Lab: Implementing update management

Implementing the WSUS server role
Configuring update settings
Approving and deploying an update by using WSUS
Deploying Windows Defender definition updates by using WSUS