Managing Privileged Identities in Windows Server 2016
Offered By: Pluralsight
Course Description
Overview
After implementation, the most important part of any IT infrastructure is its security. In this course, you'll learn the fundamental approaches necessary to secure your organization against many common attacks and possible breaches of security.
Managing the security of an enterprise environment is paramount to many organizations and network breaches can occur at any time, from any source, including internal threats from malicious users or administrators. In this course, Managing Privileged Identities in Windows Server 2016, you’ll learn how to approach securing your organization against many common attacks and breaches of security. First, you'll learn how to apply the core security concepts of the principle of least privilege. Next, you'll discover how to protect your most privileged identities. Finally, you'll explore how to restrict resource access and user rights to ensure that all users can perform only the tasks that are necessary and when they are necessary, all while minimizing the possibility of exposure to threats and unauthorized resource access. By the end of this course, you'll be able to implement these features to ensure the highest levels of security, while still maintaining the core functionality of your operations.
Managing the security of an enterprise environment is paramount to many organizations and network breaches can occur at any time, from any source, including internal threats from malicious users or administrators. In this course, Managing Privileged Identities in Windows Server 2016, you’ll learn how to approach securing your organization against many common attacks and breaches of security. First, you'll learn how to apply the core security concepts of the principle of least privilege. Next, you'll discover how to protect your most privileged identities. Finally, you'll explore how to restrict resource access and user rights to ensure that all users can perform only the tasks that are necessary and when they are necessary, all while minimizing the possibility of exposure to threats and unauthorized resource access. By the end of this course, you'll be able to implement these features to ensure the highest levels of security, while still maintaining the core functionality of your operations.
Syllabus
- Course Overview 1min
- Detecting and Analyzing Attacks and Security Breaches 52mins
- Protecting Credentials and Privileged Access 72mins
- Limiting Administrator Rights with Just Enough Administration 29mins
- Configuring Privileged Access Management and Administrative Forests 32mins
- Analyzing Activity Using Auditing and Logs 44mins
Taught by
Aaron Sampson
Related Courses
Introduction to LinuxLinux Foundation via edX Rapid Deployment of SAP Solutions
SAP Learning SAP Screen Personas
SAP Learning Office 365: Managing Identities and Services
Microsoft via edX Microsoft Exchange Server 2016 - 3: Mailbox Databases
Microsoft via edX