Security and Advanced Services for Windows Server 2022 Training in Belgium

  • Learn via: Classroom
  • Duration: 5 Days
  • Level: Intermediate
  • Price: From €3,997+VAT
We can host this training at your preferred location. Contact us!

This five-day course will provide you with the knowledge and skills required to enhance the security of the IT infrastructure that you administer in Windows Server 2022, how to protect administrative credentials and rights to ensure that administrators can perform only the tasks that they need to.

This course also details how you can mitigate malware threats; identify security issues by using auditing and the Advanced Threat Analysis feature.

The course also explains how you can help secure file access by using encryption and dynamic access control, and how you can enhance your network’s security.

This course also provides students with the fundamental knowledge and skills to configure and manage Internet Information Services.

This course is intended to help provide pre-requisite skills supporting a broad range of Internet web applications, security, and knowledge to help support other products that use IIS. In keeping with that goal, this course will not focus on any particular web application or development practice.


Audience

This course is for IT professionals who need to administer Windows Server 2022 networks securely. These professionals typically work with networks that are configured as Windows Server domain-based environments, with managed access to the Internet and cloud services. No prior experience with any version of Internet Information Services is assumed


Candidates suitable for this course would be:

  • Network administrators who are relatively new to Windows Server security and related technologies, and who want to learn more about the security capabilities in Windows Server 2022.
  • This course is also suitable for understanding Windows Server 2016 and Windows Server 2019.
  • Administrators and developers that have little or no previous experience administering Microsoft Internet Information Services.
  • The course is not focused on web application development, although it does provide introductory material to configure Microsoft Internet Information Services for most common web applications.
  • The course focuses primarily on installing, configuring and securing Microsoft Internet Information Services.

Before attending this course, students must have:

Experience working in a Windows Sever infrastructure enterprise environment.

Experience with Windows Server administration, maintenance, and troubleshooting.

A solid, practical understanding of networking fundamentals, including TCP/IP, User Datagram Protocol (UDP), and Domain Name System (DNS).

A solid, practical understanding of the principles of Active Directory Domain Services (AD DS)

A solid, practical understanding of Microsoft Hyper-V virtualisation fundamentals.

An understanding of Windows Server security principles.

Additionally, students would benefit from having some previous Windows Server operating system experience, such as experience as a Windows Server systems administrator. An understanding of Windows PowerShell would be advantageous.

  • Secure Windows Server.
  • Secure application development and a server-workload infrastructure.
  • Manage security baselines.
  • Configure and manage just enough administration.
  • Manage data security.
  • Manage malware and threats.
  • Configure advanced auditing.
  • Optimize file services by configuring File Server Resource Manager (FSRM) and Distributed File System (DFS).
  • Manage threats by using Advanced Threat Analytics (ATA) and Microsoft Operations Management Suite.
  • Install IIS
  • Configure the default web site
  • Configure and manage application pools
  • Create additional web sites
  • Secure web sites and applications
  • Manage certificates in the Centralized Certificate Store
  • Backup and restore IIS

Module 1: Protecting credentials and privileged access

Explains how you can configure user rights and security options, protect credentials by using Windows Defender Credential Guard, implement privileged-access workstations, and manage and deploy a local administrator-password solution that you can use to manage passwords for local administrator accounts

Module 2: Advanced auditing and log analytics

Explains how to use advanced auditing and Windows PowerShell transcripts.

Module 3: Securing workloads

Describes the Microsoft Advanced Threat Analytics tool and explains the Security Compliance Toolkit (SCT), including how you can use it to configure, manage, and deploy baselines. Additionally, students will learn how to deploy and configure Hyper-V and Windows Server containers.

Module 4: Planning and protecting data

Explains how to configure Encrypting File System (EFS) and BitLocker drive encryption to protect data at rest. Students will also learn how to extend protection into the cloud by using Microsoft Azure Information Protection.

Module 5: Optimizing and securing file services

Explains how to optimise file services by configuring File Server Resource Manager (FSRM) and Distributed File System (DFS). Students will learn how to protect a device’s data by using encryption or BitLocker. Students also will learn how to manage access to shared files by configuring Dynamic Access Control (DAC).

Module 6: Just Enough Administration

Explains how to deploy and configure the Just Enough Administration (JEA) feature.

Module 7: Understanding and Installing Internet Information Services

Provides a basic overview about the network infrastructure planning and common concerns with implementing a web server. This module teaches students to perform an installation of IIS and verify the working web server by testing the default created website. The ability to install components and test functionality when needed will be continually reinforced throughout the course

Module 8: Configuring the Default Website

Describes how to plan and implement network requirements for a public website. Students will configure DNS records to support access to internal and public websites and create virtual directories and application folders for additional website content. These concepts will be built upon in future modules and students begin to work with different bindings for both internal and external websites and web applications.

Module 9: Configuring and Managing Application Pools

Provides students with the details and the benefits to the application pool architecture. Students will create and configure application pools to support additional applications and configure application pool recycle settings. This module teaches students to perform recycle events and examine the event logs for recycle events

Module 10: Creating Additional Websites

Introduces students to the process on how to examine existing website bindings to determine and resolve naming conflicts. This module teaches students to create new websites using unique bindings and avoiding naming conflicts.

Module 11: Securing Websites and Applications

Introduces students to secure internal and public websites for users and groups by using the built-in Anonymous, Windows and Basic authentication. This module also teaches students to configure file system permissions for specific users and groups and secure a website using URL Authorization Rules.

Module 12: Managing Certificates in the Centralised Store

Describes how to install and configure the Microsoft Internet Information Service feature Central Certificate Store to enable centralized and improved certificate management. This module will teach students to configure a website to use a secured binding with the Central Certificate Store and explore the benefits to centralized certificate management. Students will also learn to properly name certificates for the store

Module 13: Backing Up and Restoring IIS

Focuses on the concepts of recovering a website and web server from failure. This module teaches students how to manage, backup and recover the configuration files, along with requirements for recovering content and certificates.



Contact us for more detail about our trainings and for all other enquiries!

Upcoming Trainings

Join our public courses in our Belgium facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

Classroom / Virtual Classroom
09 november 2024
Brüksel, Brugge, Anvers
5 Days
Classroom / Virtual Classroom
09 november 2024
Brüksel, Brugge, Anvers
5 Days
Classroom / Virtual Classroom
14 november 2024
Brüksel, Brugge, Anvers
5 Days
Classroom / Virtual Classroom
14 november 2024
Brüksel, Brugge, Anvers
5 Days
Classroom / Virtual Classroom
18 november 2024
Brüksel, Brugge, Anvers
5 Days
Classroom / Virtual Classroom
18 november 2024
Brüksel, Brugge, Anvers
5 Days
Classroom / Virtual Classroom
21 november 2024
Brüksel, Brugge, Anvers
5 Days
Classroom / Virtual Classroom
23 november 2024
Brüksel, Brugge, Anvers
5 Days
Security and Advanced Services for Windows Server 2022 Training Course in Belgium

Belgium, or officially known as Kingdom of Belgium, is located in Northwestern Europe. With the country's 11.5 million population, Belgium is the 6th most densely populated country in Europe. The capital and largest city is Brussels. And other major and popular cities are Antwerp, Ghent, Charleroi, Liège, Bruges, Namur, and Leuven. The population of Belgium consists mostly of Flemings and Walloons. While the Flemings speak Dutch, the Walloons speak French.

The country is known for moules frites (mussels served with french fries) as well as waffles and of course; Belgian chocolate. Chocolate is one of Belgium’s main food exports. Another thing that Belgium is known for is its beautiful city Bruges. Bruges is one of Europe’s most well-preserved medieval towns and has its beautiful canals.

At Bilginç IT Academy, we understand the unique requirements of Belgium and incorporate innovative training methodologies to meet them. Explore our extensive training catalog, featuring diverse Certification Exam preparation courses and accredited corporate training programs that will revolutionize your perception of IT training.
By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.