We may earn an affiliate commission when you visit our partners.
Course image
Glenn Weadock
Windows Server 2016 provides tools for administrators to armor-plate server systems to protect data, ensure stability, avoid malware and guard against credential theft. BitLocker and EFS protect data at rest with robust and manageable encryption as well as platform validation. In this course, Windows Server 2016 Security Hardening, you'll discover how to harden your security so that it's orders of magnitude more secure than the default configuration. First, you'll discover how to encrypt server volumes and folders so only legitimate users have access. Next, you'll explore how to build a Windows update architecture that keeps...
Read more
Windows Server 2016 provides tools for administrators to armor-plate server systems to protect data, ensure stability, avoid malware and guard against credential theft. BitLocker and EFS protect data at rest with robust and manageable encryption as well as platform validation. In this course, Windows Server 2016 Security Hardening, you'll discover how to harden your security so that it's orders of magnitude more secure than the default configuration. First, you'll discover how to encrypt server volumes and folders so only legitimate users have access. Next, you'll explore how to build a Windows update architecture that keeps servers properly patched at all times. Then, you'll learn how to stop password theft with Credential Guard and Virtualization Based Security. Finally, you'll get organized about security hardening with free baselines, templates, and tools. By the end of this course, you'll know how to set up BitLocker and EFS, automate update distribution with WSUS, restrict software with digital signatures and code integrity policies, protect Kerberos tickets and password hashes, and incorporate security best practices from Microsoft after tailoring them for your own organization.
Enroll now

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Provides hands-on labs and interactive materials to enhance learning experience
Focuses on best practices and industry standards for securing Windows Server
Taught by Glenn Weadock, an experienced instructor in server security
Students are expected to have some background in Windows Server administration, posing a potential barrier for beginners
May require access to additional software or resources, such as Windows Server and BitLocker

Save this course

Save Windows Server 2016 Security Hardening to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Windows Server 2016 Security Hardening. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Windows Server 2016 Security Hardening will develop knowledge and skills that may be useful to these careers:
Windows Server Administrator
Windows Server Administrators are responsible for the day-to-day operation of an organization's Windows Server systems. They also monitor and analyze system performance to identify and resolve problems. Taking this course can help you become a more effective Windows Server Administrator by providing you with the skills and knowledge you need to protect your organization's data and systems from cyber threats and security breaches.
Security Engineer
Security Engineers design, implement, and manage security systems to protect an organization's data and systems from cyber threats and security breaches. They also work with other IT professionals to develop and implement security policies and procedures. Taking this course can help you become a more effective Security Engineer by providing you with the skills and knowledge you need to protect your organization's data and systems from cyber threats and security breaches.
Security Architect
Security Architects design and implement security solutions to protect an organization's data and systems from cyber threats and security breaches. They also work with other IT professionals to develop and implement security policies and procedures. Taking this course can help you become a more effective Security Architect by providing you with the skills and knowledge you need to protect your organization's data and systems from cyber threats and security breaches.
Cybersecurity Analyst
Cybersecurity Analysts protect an organization's computer networks and systems from cyber threats and security breaches. They also investigate and respond to security incidents. Taking this course can help you become a more effective Cybersecurity Analyst by providing you with the skills and knowledge you need to protect your organization's data and systems from cyber threats and security breaches.
Security Consultant
Security Consultants help organizations identify and address security risks. They also develop and implement security solutions to protect an organization's data and systems from cyber threats and security breaches. Taking this course can help you become a more effective Security Consultant by providing you with the skills and knowledge you need to protect your organization's data and systems from cyber threats and security breaches.
Information Security Analyst
Information Security Analysts plan and implement security measures to protect an organization's computer networks and systems. They also monitor and analyze security systems to identify and respond to security breaches. Taking this course can help you become a more effective Information Security Analyst by providing you with the skills and knowledge you need to protect your organization's data and systems from cyber threats and security breaches.
Security Manager
Security Managers are responsible for developing and implementing an organization's security policies and procedures. They also oversee the organization's security team. Taking this course can help you become a more effective Security Manager by providing you with the skills and knowledge you need to protect your organization's data and systems from cyber threats and security breaches.
Security Analyst
Security Analysts monitor and analyze security systems to identify and respond to security breaches. They also work with other IT professionals to develop and implement security policies and procedures. Taking this course can help you become a more effective Security Analyst by providing you with the skills and knowledge you need to protect your organization's data and systems from cyber threats and security breaches.
Chief Information Security Officer
Chief Information Security Officers are responsible for developing and implementing an organization's overall security strategy. They also oversee the organization's security team. Taking this course can help you become a more effective Chief Information Security Officer by providing you with the skills and knowledge you need to protect your organization's data and systems from cyber threats and security breaches.
IT Auditor
IT Auditors evaluate an organization's IT systems and processes to ensure compliance with laws and regulations. They also identify and assess security risks. Taking this course can help you become a more effective IT Auditor by providing you with the skills and knowledge you need to protect your organization's data and systems from cyber threats and security breaches.
Network and Computer Systems Administrator
Network and Computer Systems Administrators are responsible for the day-to-day operation of an organization's computer systems and networks. They also monitor and analyze system performance to identify and resolve problems. Taking this course can help you become a more effective Network and Computer Systems Administrator by providing you with the skills and knowledge you need to protect your organization's data and systems from cyber threats and security breaches.
Systems Administrator
Systems Administrators are responsible for the day-to-day operation of an organization's computer systems and networks. They also monitor and analyze system performance to identify and resolve problems. Taking this course can help you become a more effective Systems Administrator by providing you with the skills and knowledge you need to protect your organization's data and systems from cyber threats and security breaches.
Computer Systems Analyst
Computer Systems Analysts help organizations get the most out of their hardware and software. They implement and upgrade computer systems, ensuring they meet the complex and evolving needs of the company. A strong understanding of Windows Server 2016 Security Hardening can help you become a more effective Computer Systems Analyst by enabling you to protect your organization's data and systems from cyber threats and security breaches.
Risk Analyst
Risk Analysts identify and assess security risks. They also develop and implement risk management strategies. Taking this course can help you become a more effective Risk Analyst by providing you with the skills and knowledge you need to protect your organization's data and systems from cyber threats and security breaches.
IT Manager
IT Managers are responsible for the overall management of an organization's IT systems and resources. They also develop and implement IT policies and procedures. Taking this course can help you become a more effective IT Manager by providing you with the skills and knowledge you need to protect your organization's data and systems from cyber threats and security breaches.

Reading list

We've selected three books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Windows Server 2016 Security Hardening.
Provides a comprehensive guide to Windows Server 2016 security. It covers a wide range of topics, including security architecture, threat mitigation, and incident response.
This guide provides a comprehensive reference to Windows Server 2016 security settings. It covers a wide range of topics, including security hardening, threat mitigation, and incident response.
This publication provides a set of best practices for securing information systems. It valuable resource for administrators who want to ensure that their systems are secure.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser