Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Microsoft Security Fundamentals
Section 1: Introduction
Welcome to the Course (2:48)
Why Learn from Me? (2:26)
Course Prerequisites (2:30)
Course Live Demonstrations (1:16)
Section 2: Setting Up Your Virtualized Test Environment
Introduction (3:18)
Virtualization Requirements and Install Overview (5:53)
Download Windows Operating System ISO Files from My Website (2:56)
Download Windows Operating System ISO Files from Microsoft's Evaluation Center (3:03)
Creating Virtualbox Virtual Machines (8:15)
Some Additional Virtual Machine Settings (6:18)
Installing Windows 10 Enterprise Operating System (10:06)
Installing Windows Server 2016 Operating System (7:19)
Installing Windows Updates (3:52)
Setting Up Our Sandbox Internal LAN (6:49)
Introduction to Active Directory (9:18)
Active Directory Installation & Configuration (8:46)
DHCP Installation & Scope Configuration (8:08)
Adding Windows 10 PC to Our Active Directory Domain (2:45)
Section 3: Domain 1 Overview: Understanding Security Layers
Domain 1 Overview (1:03)
Section 4: Domain 1 – Part 1: Understanding Core Security Principles
Section Introduction
The CIA Triad (5:56)
Authentication, Authorization, and Accounting (AAA) (3:17)
Defense in Depth (4:42)
Least Privilege (3:35)
Risk Management (18:06)
Exploring Risk and Threats (6:11)
Attack Surface Analysis (8:46)
Social Engineering (7:53)
Understanding Core Security Principles Quiz
Section 5: Domain 1 – Part 2: Understanding Physical Security
Section Introduction
Introduction to Access Control (9:51)
Physical Site Security (7:46)
Computer Equipment Physical Security (7:31)
Removable & Mobile Device Security (11:14)
Keyloggers (6:34)
Understanding Physical Security Quiz
Section 6: Domain 1 – Part 3: Understanding Wireless Security
Section Introduction
Wireless Encryption Standards Overview (2:00)
Wireless Equivalent Privacy (WEP) (3:21)
Wi-Fi Protected Access (WPA) (2:22)
Wi-Fi Protected Access 2 (WPA2) (3:42)
Wi-Fi Protected Access 3 (WPA3) (2:42)
WPA Personal versus Enterprise Mode (3:09)
Live Demo: Wireless Router Configuration (10:50)
Understanding Wireless Security Quiz
Section 7: Domain 2 Overview: Understanding Operating System Security
Domain 2 Overview (2:39)
Section 8: Domain 2 – Part 1: Understanding User Authentication
Section Introduction
Authentication Basics (12:58)
Physical and Virtual Smart Cards (4:00)
Remote Authentication Dial-In User Service (RADIUS) (7:01)
Live Demo: Windows Server 2016 RADIUS Server (9:00)
Live Demo: Using Run As to Perform Administrative Tasks (11:05)
Understanding User Authentication Quiz
Section 9: Domain 2 – Part 2: Understanding Permissions
Section Introduction
Basic NT File System (NTFS) Permissions (8:48)
NTFS Advanced Permissions (4:34)
NTFS Inheritance (3:37)
Permissions Behavior when Moving and Copying Files (3:35)
Share Permissions (7:05)
Active Directory Groups (6:39)
Active Directory Organizational Units (3:22)
The Registry (6:11)
Live Demo: The Registry (3:59)
Live Demo: Basic NTFS Permissions (3:58)
Live Demo: Inheritance and Changing Ownership (8:15)
Live Demo: Effective Access (2:40)
Live Demo: Advanced NTFS Permissions (2:29)
Live Demo: Network Share and NTFS Permissions (11:52)
Live Demo: Moving and Copying Files and Folders (11:03)
Live Demo: Active Directory Groups (6:41)
Live Demo: Active Directory AD OUs, Delegation and Group Policy Management (13:18)
Live Demo: Active Directory Permissions (7:14)
Understanding Permissions Quiz
Section 10: Domain 2 – Part 3: Understanding Password Policies
Section Introduction
Understanding Microsoft Password Policies (11:55)
Understanding Microsoft Account Lockout Policies (8:26)
Common Password Attack Methods (5:57)
Live Demo: Password and Account Lockout Settings Demonstration (8:26)
Understanding Password Policies Quiz
Section 11: Domain 2 – Part 4: Understanding Audit Policies
Section Introduction
Introduction to Auditing (11:54)
What Can Be Audited (10:21)
Saving and Securing Audit Information (4:15)
Auditing Best Practices and Recommendations (7:32)
Live Demo: Auditing (9:02)
Understanding Audit Policies Quiz
Section 12: Domain 2 – Part 5: Understanding Encryption
Section Introduction
Introduction to Cryptography (5:40)
Symmetric Encryption (9:03)
Asymmetric Encryption (4:36)
Hashing Algorithms (7:25)
Digital Certificates and Certificate Authorities (8:44)
Live Demo: Digital Certificates (5:17)
Email Encryption Use Cases (12:14)
Windows Encrypting File System (EFS) Overview (6:12)
Live Demo: Windows EFS (16:52)
Live Demo: Moving and Copying Files/Folders with EFS (6:59)
BitLocker and BitLocker To Go Overview (6:53)
Live Demo: BitLocker (8:07)
Software versus Hardware Based Encryption (4:15)
Security Token Devices (2:15)
Live Demo: Run Only Trusted Applications via Software Restriction Policies (2:27)
Understanding Encryption Quiz
Section 13: Domain 2 – Part 6: Understanding Malware
Section Introduction
Introduction to Malware (0:45)
Buffer Overflows (5:50)
Viruses & Polymorphic Viruses (4:43)
Worms (2:00)
Trojan Horses (2:04)
Spyware and Adware (3:17)
Ransomware (4:03)
Rootkits (4:02)
Backdoors (3:48)
Zero Day Attacks (2:21)
Understanding Malware Quiz
Section 14: Domain 3 Overview: Understanding Network Security
Domain 3 Overview (1:09)
Section 15: Domain 3 – Part 1: Understanding Dedicated Firewalls
Section Introduction
Hardware Firewalls (10:56)
Stateful versus Stateless Firewalls (2:57)
Using Hardware versus Software Firewalls (2:35)
Live Demo: Windows Firewall (4:48)
Understanding Dedicated Firewalls Quiz
Section 16: Domain 3 – Part 2: Understanding Network Isolation
Section Introduction
Understanding Network Isolation (1:26)
Perimeter Networks (5:54)
Switch VLANs (5:32)
Routers (3:18)
Honeypots (2:20)
Network Address Translation (NAT) (7:06)
Virtual Private Network (VPN) (9:16)
IPSec (4:17)
VPN, IPSec and Network Isolation (1:12)
Live Demo: Server and Domain Isolation (7:10)
Understanding Network Isolation Quiz
Section 17: Domain 3 – Part 3: Understanding Protocol Security
Section Introduction
Protocol Spoofing (7:13)
Live Demo: Network Sniffing with WireShark (5:57)
Common Attack Methods (10:20)
DNSsec (2:29)
Live Demo: Enabling DNSsec on Windows Server 2016 (2:57)
Understanding Protocol Security Quiz
Section 18: Domain 4 Overview: Understanding Security Software
Domain 4 Overview (1:14)
Section 19: Domain 4 – Part 1: Understanding Client Protection
Section Introduction
User Account Control (UAC) (3:14)
Live Demo: How to Adjust UAC Settings in Windows (5:10)
Live Demo: AppLocker & Software Restriction Policies (9:20)
Live Demo: Windows Defender Antivirus (6:58)
Keeping Windows OS and Software Updated (6:36)
Live Demo: Encrypting Offline Folders (2:08)
Understanding Client Protection Quiz
Section 20: Domain 4 – Part 2: Understanding Email Protection
Section Introduction
Email Spam, Spoofing, Phishing and Pharming (14:50)
Dealing with Unwanted Emails (11:32)
Client versus Server Protection (2:13)
Understanding Email Protection Quiz
Section 21: Domain 4 – Part 3: Understanding Server Protection
Section Introduction
Server Hardening (3:50)
Separation of Services (2:15)
Keeping Servers Updated (2:03)
Secure Dynamic Domain Name System (DNS) Updates (2:49)
Live Demo: Secure Dynamic DNS (1:20)
Read-Only Domain Controllers (RODC) (3:31)
Understanding Server Protection Quiz
Section 22: Congratulations & Next Steps
Congratulations & Thank You! (0:55)
Live Demo: How to Adjust UAC Settings in Windows
Complete and Continue
Discussion
0
comments
Load more
0 comments