MS Cybersecurity Pro Track: Windows 10 Security Features

Learn all about the Windows 10 out-of-the-box security stack, security features, security capabilities and more
Instructor:
Cristian Calinescu
5 students enrolled
English [Auto]
Understand the current nature of the security threat landscape
Explain the built-in security defenses Windows 10
Windows 10 mitigations that you can configure
Learn the Windows 10 mitigations that require no configuration
Describe some of the external tools that enhance endpoint security

In this course we will examine the out-of-the-box security features and technologies in the Windows 10 Operating system. We will cover topics like the hardware security features (Secure Boot, VSM, etc.) and software security features (Device Guard, Windows Defender Firewall, Credential Guard, AppLocker, etc.)

After completing this course, you will be able to:

  • Understand the current nature of the security threat landscape
  • Explain the built-in security defenses Windows 10
  • Understand Windows 10 mitigations that you can configure
  • Understand the Windows 10 mitigations that require no configuration
  • Describe some of the external tools that enhance endpoint security

This course is designed to get you started as quickly as possible. There are a variety of self-paced learning activities. You will get:

  • Video lectures on each topic explaining each concept thoroughly with examples (and Demonstrations where applicable)
  • Review questions (Final Exam) at the end of the course (quizz) to test your knowledge on the topics learned in the course
  • Hands-on Labs at the end of the course in which you will practice at your own pace. You will have 3 Labs available and  step by step instruction files available to complete the Labs tasks like: implementing Windows Defender Firewall rules, IPSec, Bitlocker and much more.
  • Final Exam at the end of the course – 20 questions to test your knowledge on the topics and concepts learned in the course
  • Links to official Microsoft resources/blogs/videos for further documentation.

This course is the sixth course from a series of 9 courses which address all aspects to become a Microsoft Cyber Security Professional . This cyber security track is designed to teach you, or fill in the knowledge gaps, all the aspects and technologies to become a successful cyber security professional. The entire track addresses mostly Microsoft security technologies, including the latest cloud services made available by Microsoft like: Azure ATP, Office 365 security features and services, Microsoft Intelligent Security Graph, Azure Active Directory Security and many more. This is the third course from a series of 9 courses:

  • Enterprise Cyber Security Fundamentals (Introduction to Cybersecurity) 
  • Threat Detection ( Detect security breaches early – explore the capabilities of Microsoft’s threat detection and mitigation tools – including hands on Lab) 
  • Powershell Security ( Learn how to use Powershell to enhance security and remediate new threats. Learn how to implement and use Desired State Configuration (DSC), Just Enough Administration (JEA) and many more – including hands on Lab) – to be released 
  • Manage Identity  (Learn the industry’s best practices in regards to managing identity and especially privileged identities. This course takes a hands-on approach to identity management. You will create a bastion host, configure Privileged Access Management, set up Microsoft Identity Manager PAM, and more – including hands on Lab) – to be released 
  • Office 365 Security ( Review the different types of threats that can target your organization and learn how to implement and manage Office 365 security features like Advanced Threat Protection, Threat Intelligence, and Advanced Security Management) – to be released 
  • Windows 10 Security Features ( Learn about the continually evolving security features of the Windows 10 operating system. Discover how to deploy its advanced capabilities – including hands on Lab) – to be released 
  • Windows Server 2016 Security Features ( Windows Server 2016 provides layers of protection that help address both known and emerging threats. This course addresses how to implement and leverage all these security features. Learn how it actively contributes to securing your infrastructure so you can better safeguard against security breaches – including hands on Lab) – to be released 
  • Microsoft Azure Security Features ( Learn Azure security best practices and understand the terminology, tools, and techniques for creating a highly secure, resilient cloud service. You will also learn about and use the additional security services offered in Azure and Intune) – to be released 
  • Planning and Implementing a Security Incident Response (Learn to manage an enterprise security incident while avoiding common errors, increasing both the effectiveness and efficiency of your incident response efforts) – to be released

Microsoft, Windows, Microsoft 365 and Microsoft Azure are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. This course is not certified, accredited, affiliated with, nor endorsed by Microsoft Corporation.

Introduction

1
Instructor Introduction
2
About the Course
3
Preparing the Lab Environment

Built-in Windows 10 defenses

1
Evolution of attacks

How Windows 10 uses modern hardware features for security

1
Secure Boot Process
2
Secure Boot to Trusted Boot
3
Additional Hardware Security
4
Section 3 Review Questions

Windows 10 software security features - Part 1

1
Windows Defender Firewall and Virtual Secure Mode
2
Credential Guard and Bitlocker
3
Antivirus and WIndows Information Protection
4
Section 4 Review Questions

Windows 10 software security features - Part 2

1
Windows Defender Remote Credential Guard
2
Device Guard
3
AppLocker with Device Guard
4
Windows Defender SmartScreen and WIndows 10 Telemetry
5
Section 5 Review Questions

Windows 10 New Security Features and Capabilities

1
Windows Hello and Hello for Business
2
Other Security Features and Capabilities
3
Ransomware Case Study
4
Section 6 Review Questions

Final Exam

1
Final Exam

70% passing score

Hands-On Labs

1
Hands-On Labs
You can view and review the lecture materials indefinitely, like an on-demand channel.
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!

Be the first to add a review.

Please, login to leave a review
c1cc20bd54b45f8479475d7ded572f98
30-Day Money-Back Guarantee

Includes

5 hours on-demand video
Full lifetime access
Access on mobile and TV
Certificate of Completion
1