Implementing Proactive Windows Security
Offered By: Pluralsight
Course Description
Overview
In this course, you will learn how to implement proactive solutions needed to defend against the most-used attack vectors of today and how to prepare your environment for the post-2015 security landscape.
In the future, the only way to secure Windows environment will be to implement proactive security and to stop relying only on reactive solutions like anti-malware. In this course, Implementing Proactive Windows Security, you will learn how to move from dead, reactive security measures to effective and proactive security measures. First, you'll learn how to implement BitLocker drive encryption in Windows. Next, you'll learn about protecting admin privileges with UAC and how UAC can be your best friend. Finally, you'll get a better understanding of IPsec - and why it's not as bad as people make it out to be. By the end of this course, you'll know how to design and implement proactive security in a Windows network, helping you better secure your environments for 2016 and beyond.
In the future, the only way to secure Windows environment will be to implement proactive security and to stop relying only on reactive solutions like anti-malware. In this course, Implementing Proactive Windows Security, you will learn how to move from dead, reactive security measures to effective and proactive security measures. First, you'll learn how to implement BitLocker drive encryption in Windows. Next, you'll learn about protecting admin privileges with UAC and how UAC can be your best friend. Finally, you'll get a better understanding of IPsec - and why it's not as bad as people make it out to be. By the end of this course, you'll know how to design and implement proactive security in a Windows network, helping you better secure your environments for 2016 and beyond.
Taught by
Sami Laiho
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity