Looking to stay ahead of the security curve? As you get to know the new security architecture and features of Windows 10—and learn to deploy them—gain the insights and knowledge you’ll need for the future.
Configure endpoint security, review additional security tools, like Windows Information Protection and Windows Defender Exploit Guard. In this course, you’ll get practical details on built-in, end-to-end protections and support for the larger ecosystem of ISV and OEM partners.
Learners who take this training can meet the prerequisites by obtaining equivalent knowledge and skills through practical experience as a Security Administrator, System Administrator, or a Network Administrator.
Learners should have a good foundation in accessing and using simple Windows PowerShell commands
This course is available in self-paced format. The course is designed for self-paced study of around 2-4 hours per week for 4 weeks, including lectures, quizzes and further readings. You can listen to the lecture, review the additional reading materials (links), attempt the quizzes (you may need to try some the options out in Excel), and work on the labs exercises at any time. So instead of using six weeks for studying, you can complete this course in few days as well.
Evolution of attacks.
Understanding the background for UEFU Secure Boot.
Trusted Platform Module (TPM) Overview.
Secure Boot to Trusted Boot.
Early Launch Antimalware (ELAM)
Data Execution Prevention.
Address Space Layout Randomization.
Heap protection or we all malloc() and free().
Kernel pool protections.
Windows Firewall with Advanced Security.
Virtual secure mode (VSM).
Credential Guard (CC).
Windows Defender Antivirus (WDAV).
Windows Information Protection (WIP).
PowerShell Network cmdlets
Remote Credential Guard.
AppLocker with Device Guard.
Windows Defender SmartScreen (WDSS).
Windows 10 level of telemetry
Enterprise Certificate Pinning.
Windows Hello and Windows Hello for Business.
New Group Policy setting Reference for Windows and Windows Server.
Windows Defender Security Center (WDSC).
Windows Defender Exploit Guard (WDEG).
Windows Defender Application Guard (WDAG).
Windows Defender Advance Threat Protection (ATP).
Ransomware as a service.
Case study: Windows 10 resistance to Petya ransomware attack.
Post Course Survey