Microsoft Cybersecurity Stack: Securing Windows 10 in the Enterprise
Offered By: LinkedIn Learning
Course Description
Overview
Learn how to secure Windows 10 systems in corporate environments. Explore how to leverage key security features as part of a layered defense.
Windows 10 brings an array of security features and services to the table. In this course, instructor Pete Zerger discusses how to leverage these features as part of a layered defense, sharing what you need to know to design and implement a strategy for securing Windows 10 systems in corporate environments. Pete explores proactive measures like securing privileged credentials, thwarting phishing attacks, and detecting zero-day threats. He also covers the integration between Windows 10 and the advanced security features in the Microsoft cloud, such as cloud protection in Windows Defender. Plus, learn security strategies for working from home and public spaces, including how to approach common corporate remote access scenarios.
Windows 10 brings an array of security features and services to the table. In this course, instructor Pete Zerger discusses how to leverage these features as part of a layered defense, sharing what you need to know to design and implement a strategy for securing Windows 10 systems in corporate environments. Pete explores proactive measures like securing privileged credentials, thwarting phishing attacks, and detecting zero-day threats. He also covers the integration between Windows 10 and the advanced security features in the Microsoft cloud, such as cloud protection in Windows Defender. Plus, learn security strategies for working from home and public spaces, including how to approach common corporate remote access scenarios.
Syllabus
Introduction
- Securing Windows 10 in the enterprise
- What you should know
- Set up environment
- Cyber threats targeting Windows 10
- Windows 10 security features
- Developing a layered defense
- Policy-based management options
- Credential Guard and Device Guard
- Encrypting Windows devices
- Protecting against zero-day threats
- Managing privacy settings
- Windows Defender
- Managing updates
- Windows Insider
- Wi-Fi settings
- Proxy and browser
- Firewall configurations
- Securing remote access
- Securing cloud data
- Next steps
Taught by
Pete Zerger