Managing Privileged Identities in Windows Server 2016
Offered By: Pluralsight
Course Description
Overview
After implementation, the most important part of any IT infrastructure is its security. In this course, you'll learn the fundamental approaches necessary to secure your organization against many common attacks and possible breaches of security.
Managing the security of an enterprise environment is paramount to many organizations and network breaches can occur at any time, from any source, including internal threats from malicious users or administrators. In this course, Managing Privileged Identities in Windows Server 2016, you’ll learn how to approach securing your organization against many common attacks and breaches of security. First, you'll learn how to apply the core security concepts of the principle of least privilege. Next, you'll discover how to protect your most privileged identities. Finally, you'll explore how to restrict resource access and user rights to ensure that all users can perform only the tasks that are necessary and when they are necessary, all while minimizing the possibility of exposure to threats and unauthorized resource access. By the end of this course, you'll be able to implement these features to ensure the highest levels of security, while still maintaining the core functionality of your operations.
Managing the security of an enterprise environment is paramount to many organizations and network breaches can occur at any time, from any source, including internal threats from malicious users or administrators. In this course, Managing Privileged Identities in Windows Server 2016, you’ll learn how to approach securing your organization against many common attacks and breaches of security. First, you'll learn how to apply the core security concepts of the principle of least privilege. Next, you'll discover how to protect your most privileged identities. Finally, you'll explore how to restrict resource access and user rights to ensure that all users can perform only the tasks that are necessary and when they are necessary, all while minimizing the possibility of exposure to threats and unauthorized resource access. By the end of this course, you'll be able to implement these features to ensure the highest levels of security, while still maintaining the core functionality of your operations.
Syllabus
- Course Overview 1min
- Detecting and Analyzing Attacks and Security Breaches 52mins
- Protecting Credentials and Privileged Access 72mins
- Limiting Administrator Rights with Just Enough Administration 29mins
- Configuring Privileged Access Management and Administrative Forests 32mins
- Analyzing Activity Using Auditing and Logs 44mins
Taught by
Aaron Sampson
Related Courses
Google Cloud Fundamentals: Core InfrastructureGoogle via Coursera Google Cloud Big Data and Machine Learning Fundamentals
Google Cloud via Coursera Serverless Data Analysis with Google BigQuery and Cloud Dataflow en Français
Google Cloud via Coursera Essential Google Cloud Infrastructure: Foundation
Google Cloud via Coursera Elastic Google Cloud Infrastructure: Scaling and Automation
Google Cloud via Coursera