Course List

+

MICROSOFT TECHNICAL

Microsoft Security Essentials

OVERVIEW

This three-day course is intended for information technology (IT) professionals who administer and support Windows 10 and Server 2012 Operating Systems. It is aimed at IT professionals who want to acquire the skills and knowledge necessary to provide the most secure Windows domain using existing Microsoft features.s.

 

Module 1: Securing Active Directory Domain Services. (Server 2012)

This module describes how to configure domain controller security, account security, password security, and Group Managed Service Accounts (gMSA).

 

Lessons

  • Securing domain controllers
  • Implementing account security
  • Implementing audit authentication
  • Configuring managed service accounts

Lab: Securing AD DS

  • Implementing security policies for accounts, passwords, and administrative groups
  • Deploying and configuring an RODC
  • Creating and associating a group MSA

 

After completing this module, students will be able to:

  • Secure domain controllers.
  • Implement account security.
  • Implement audit authentication.

Configure managed service accounts (MSAs).

 

 

 

 

 

 

 

Module 2: Securing Windows Servers Using Group Policy Objects (Server 2012)

This module describes Windows Server 2012 operating system security. It covers how to identify security threats, plan your strategy to mitigate security threats, and secure your Windows Server 2012 infrastructure.

Lessons

  • Security Overview for Windows Operating Systems
  • Configuring Security Settings
  • Restricting Software
  • Configuring Windows Firewall with Advanced Security

Lab: Increasing Security for Server Resources Lab: Configuring AppLocker and Windows Firewall

After completing this module, students will be able to:

  • Describe WindowsServer operating system security.
  • Configure security settings by using Group Policy.
  • Increase security for server resources.
  • Restrict unauthorized software from running on servers and clients.

Configure Windows Firewall with Advanced Security.

Module 3: Managing User and Service Accounts (Server 2012)

This module explains how to create, configure and automate the creation of user accounts. It also explains how to configure account-related properties of user objects. It further explains how to create and administer Managed Service Accounts.

Lessons

  • Configuring Password Policy and User Account Lockout Settings
  • Configuring Managed Service Accounts

Lab: Managing User and Service Accounts

After completing this module, students will be able to:

  • Configure password policy and user account lockout settings.

Configure managed service accounts.

 

 

 

Module 4: Managing Data Security. (Windows 10)

 

This module explains how the technologies available with Windows 10 work together to protect against data-related security threats. It provides an overview of these threats, and discusses possible mitigations and best practices for dealing with them. It describes defense-in-depth and Encrypting File System (EFS), and how you can use those methods to counter security threats. Additionally, this module describes how to configure, administer, and monitor BitLocker drive encryption.

 

Lessons

  • Overview of Data-Related Security Threats
  • Securing Data with EFS
  • Implementing and Managing BitLocker

Lab: Managing Data Security

  • Using EFS
  • Using BitLocker

Module 5: Managing Device Security (Windows 10)

This module explains how to mitigate security threats with the use of Security Compliance Toolkit, Windows Defender Exploit Guard, and security settings in GPOs. It also describes User Account Control (UAC), and how to configure it. This module also explains the use of AppLocker to configure application usage and restrictions.

Lessons

  • Using Security Settings to Mitigate Threats
  • Configuring UAC
  • Configuring Application Restrictions

Lab: Managing Device Security

  • Creating Security Policies
  • Testing Security Policies
  • Configuring UAC Prompts
  • Configuring and Testing AppLocker

After completing this module, students will be able to:

  • Use security settings to mitigate threats.
  • Configure UAC.
  • Configure application restrictions.

 

Module 6: Managing Network Security (Windows 10)

 

This module describes common network-related security threats, and describes options to mitigate them. It describes tools such as Windows Defender Firewall, IPsec connection security rules, and Windows Defender Antivirus, and how students can configure these tools to manage network security.

 

Lessons

  • Overview of Network-Related Security Threats
  • Windows Defender Firewall
  • Connection Security Rules
  • Windows Defender Antivirus

Lab: Managing Network Security

  • Creating and Testing Inbound Rules
  • Creating and Testing Outbound Rules
  • Creating and Testing Connection Security Rules
  • Configuring Windows Defender Antivirus

After completing this module, students will be able to:

  • Describe network-related security threats.
  • Manage Windows Defender Firewall.
  • Configure connection security rules.
  • Manage Windows Defender Antivirus.

 

 

 

 

 

 

 

Module 7: (Window 10)

 

Managing Windows 10 sign-in and identity.

This module defines identity and explains why identity is important in today’s network and cloud environments. It also provides an overview of Azure AD and how to extend on-premises identity to the cloud.

Lessons

  • Overview of enterprise identity
  • Overview of Azure AD Premium P2
  • Extending identity to the cloud

Lab: Extending on-premises AD DS to Azure AD

  • Activating a trial Azure subscription and creating an Azure AD tenant
  • Managing Azure AD groups
  • Configuring and enabling directory synchronization

Joining Windows 10 to Azure AD

 

Module 8:

 

Managing data access for Windows-based devices This module explains how to provide secure access to organizational data. Solutions discussed include Work Folders and RemoteApp programs. This module also explains how to configure and share data stored in Microsoft OneDrive for Business.

 

Lessons

  • Overview remote data access solutions
  • Implementing Work Folders
  • Implementing cloud data access
  • Publishing and using RemoteApp programs

Lab: Implementing and using Work Folders

  • Configuring and deploying Work Folders
  • Using Work Folders

Lab: Managing data access by using OneDrive

  • Configuring and using OneDrive for Business

Lab: Publishing and using RemoteApp programs

  • Publishing RemoteApp programs
  • Accessing published RemoteApp programs

After completing this module, students will be able to:

  • Describe remote data access solutions.
  • Implement Work Folders.
  • Implement cloud data.

Publish and use RemoteApp programs

 

Module 9

 

Planning and configuring Exchange Online services (Office 365)

 

This module describes how to plan and configure Exchange Online services. It also explains how to plan and configure anti-malware and anti-spam settings in Office 365.Lessons

  • Planning and configuring email flow in Office 365
  • Planning and configuring email protection in Office 365
  • Planning and configuring client access policies

Lab: Configuring email protection and client policies

  • Configuring email protection
  • Configuring client access policies

After completing this module, students will be able to:

  • Plan and configure email protection in Office 365.
  • Plan and configure client access policies.

DURATION

3 days

COST

€1,500

AVAILABILITY

Virtual: 6th, 7th, 17th, 18th, 19th & 0th August 2020

Back to Course List
-

Training with PFH

+

WHY TRAIN WITH PFH?

  • Pre-training evaluation - PFH will assess your training requirements and levels prior to attending training:
  • Instructor led tuition by highly qualified instructor
  • Comprehensive manual to accompany PFH public courses
  • Training can be customised to meet customer's specific requirements
  • Money back guarantee – If you are not happy with the quality of training received, PFH will refund payment
  • All PFH trainers are Certified which guarantees that the training you receive will be of the highest quality.

 

DURING TRAINING:

  • Each student will have their own PC
  • Comprehensive manual to accompany each training course
  • Complimentary coffee, tea, biscuits and fruit provided, along with light lunch provided for courses delivered in PFH
  • Certificates of Attendance provided to each student on completion of training
  • Air conditioned comfortable and spacious training rooms
  • Free parking

 

LEARNING GUARANTEE:

  • If a student feels they have not managed to reach their own personal course objectives, they are welcome to attend the:
  • Same public class within 6 months, at no charge
  • 60 day post training support – Students can call or email our instructors with any questions / problems they may be experiencing at home or work (or a maximum of 5 calls per course/delegate)

 

TRAINING FACILITIES PROVIDED BY PFH

When you're learning new skills and meeting new people it's important that you do so in comfortable, modern surroundings.

You'll enjoy a rewarding training course here at PFH premises and benefit from our modern training facilities.

Facilities provided include:

  • Air-conditioned training rooms
  • High-spec student PC's plus an instructor PC
  • Internet access and wireless internet access 
  • Convenient locations in Cork and Galway 
  • Overhead projector, whiteboard and flipchart in each room 
  • Course materials 
  • Free parking 
  • Daily refreshments & lunch

 

Please note that the above facilities are available to rent for your specialised training event also. Please contact PFH Training for rates and information.

Read More -

Training Types

+

INSTRUCTOR-LED TRAINING

Instructor-led training is an effective means of delivering information, as it allows for real-time feedback, questions and answers, manipulation and changeable delivery to suit the needs of learners in a real-time environment. Few educational opportunities are considered more valuable than meeting and interfacing directly with an instructor. 

 

All of our trainers are MCPs [Microsoft Certified Professionals], ECDL certified and MOS Experts which guarantees that the training you receive will be of the highest quality.

 

PFH has a large portfolio of trainers who can deliver training at our training centres in Cork and Galway, or Nationwide at customer premises or another training centre.

 

PFH offers instructor led training on our Public Schedule at our training centres in Cork and Galway. 

 

CUSTOMISED INSTRUCTOR- LED TRAINING

PFH provides customised training for groups of 1 to 12 at either PFH's Training Centres at Cork or Galway or on-site at your premises. Content can be taken from any of our course oulines and customised to suit the exact requirmements of your group and scheduled on dates that suit your delegates.  Group rates apply contact us for rates.

 

This method of training ensures your delegates get trained on exactly the topics they require in the duration of time that you can allow to give them.

 

SEMINAR STYLE TRAINING

Seminar training can be offered where companies require a large number of people to receive initial overview training on the New Interface of an Operating System or Office Applications. 

 

Seminar Training is based solely on demonstrating the New Features and is non hands-on training.  The benefits of this type of training is that attendees can get an initial feel for the New Interface of any given application and it can save a lot of time and money during an initial roll out.  This type of training instils an element of confidence when people return to their desks to work with the New Interface or Application.

 

Depending on how the roll out is managed with the installations, training could be run in tandem with this, and groups may also benefit from the trainer doing some “floor walking”  following the seminars to assist people when they are back at their desks.

 

The number of attendees is optional and can range from 20-50 per session.  This is dependant on the size of your room!

All training/seminar can be customised specifically to suit group requirements.

Read More -