Microsoft Cybersecurity Stack: Securing Windows 10 in the Enterprise
Offered By: LinkedIn Learning
Course Description
Overview
Learn how to secure Windows 10 systems in corporate environments. Explore how to leverage key security features as part of a layered defense.
Windows 10 brings an array of security features and services to the table. In this course, instructor Pete Zerger discusses how to leverage these features as part of a layered defense, sharing what you need to know to design and implement a strategy for securing Windows 10 systems in corporate environments. Pete explores proactive measures like securing privileged credentials, thwarting phishing attacks, and detecting zero-day threats. He also covers the integration between Windows 10 and the advanced security features in the Microsoft cloud, such as cloud protection in Windows Defender. Plus, learn security strategies for working from home and public spaces, including how to approach common corporate remote access scenarios.
Windows 10 brings an array of security features and services to the table. In this course, instructor Pete Zerger discusses how to leverage these features as part of a layered defense, sharing what you need to know to design and implement a strategy for securing Windows 10 systems in corporate environments. Pete explores proactive measures like securing privileged credentials, thwarting phishing attacks, and detecting zero-day threats. He also covers the integration between Windows 10 and the advanced security features in the Microsoft cloud, such as cloud protection in Windows Defender. Plus, learn security strategies for working from home and public spaces, including how to approach common corporate remote access scenarios.
Syllabus
Introduction
- Securing Windows 10 in the enterprise
- What you should know
- Set up environment
- Cyber threats targeting Windows 10
- Windows 10 security features
- Developing a layered defense
- Policy-based management options
- Credential Guard and Device Guard
- Encrypting Windows devices
- Protecting against zero-day threats
- Managing privacy settings
- Windows Defender
- Managing updates
- Windows Insider
- Wi-Fi settings
- Proxy and browser
- Firewall configurations
- Securing remote access
- Securing cloud data
- Next steps
Taught by
Pete Zerger
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network