MD-100T03 Protecting Windows 10 Training cursus MD100T03

Type product
Tijdsduur

MD-100T03 Protecting Windows 10 Training cursus MD100T03

OEM ICT Trainingen & Advies
Logo van OEM ICT Trainingen & Advies
Opleiderscore: starstarstarstarstar_half 9,0 OEM ICT Trainingen & Advies heeft een gemiddelde beoordeling van 9,0 (uit 218 ervaringen)

Tip: incompany training nodig? Vraag een offerte aan bij meerdere aanbieders!

Beschrijving

Protecting Windows 10 Training cursus MD100T03

In deze cursus MD-100T03 Protecting Windows 10 cursus komen onderstaande onderdelen voor. In deze eendaagse open inschrijving cursus leert u van een gecertificeerde docent in het Nederlands. Het cursusmateriaal is in het Engels. U ontvangt altijd een uitnodiging voor de locatie waarop u zich inschrijft. Onze cursuslocaties zijn in Almere en Utrecht. Geheel verzorgd met een luxe lunch.

About this course MD-100T03

In this course, students will learn how to secure the Windows 10 OS and protect the data on the device. Students will be introduced to common methods used for authentication and access control. This course will teach how to configure …

Lees de volledige beschrijving

Veelgestelde vragen

Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.

Nog niet gevonden wat je zocht? Bekijk deze onderwerpen: Microsoft Windows 10, Skype, Windows 8, INK-model en INK EFQM-model.

Protecting Windows 10 Training cursus MD100T03

In deze cursus MD-100T03 Protecting Windows 10 cursus komen onderstaande onderdelen voor. In deze eendaagse open inschrijving cursus leert u van een gecertificeerde docent in het Nederlands. Het cursusmateriaal is in het Engels. U ontvangt altijd een uitnodiging voor de locatie waarop u zich inschrijft. Onze cursuslocaties zijn in Almere en Utrecht. Geheel verzorgd met een luxe lunch.

About this course MD-100T03

In this course, students will learn how to secure the Windows 10 OS and protect the data on the device. Students will be introduced to common methods used for authentication and access control. This course will teach how to configure file and folder permissions and creating security policies. Students will also be introduced to the different types of external threats and how to leverage features like encryption and firewalls, as well as tools like Windows Defender.

Audience profile

Candidates for this exam are IT professionals who perform installation, configuration, general local management and maintenance of Windows 10 core services. Candidates may also be familiar with enterprise scenarios and cloud-integrated services.

At course completion

After completing this course, learners should be able to:

  • Describe the methods for securing Windows 10.
  • Configure account access and authentication.
  • Configure file and folder permissions.
  • Create security policies.
  • Describe common threats and methods for mitigating against them.

Course Outline

Module 1: Configuring Authorization & Authentication

This module introduces the tools and features of Windows 10 for authorizing access to Windows 10 clients. Students will learn about methods for how users sign-in to Windows 10. This module also covers restricting what users can or cannot do on a device through methods like UAC and account types.

Lessons

  • Using Security Settings to Mitigate Threats
  • Configuring User Account Control
  • Implementing Device Registration
  • Authentication

After completing this module, students will be able to:

  • Describe the different methods for securing data and the Windows 10 OS.
  • Describe the different types of user and service accounts.
  • Configure Windows Hello.
  • Configure user account control.

Module 2: Configuring Data Access and Usage

In this module, Students will learn about permissions. This module will cover considerations for different files systems. Students will learn how to configure file and folder permissions as well as shared folders. The module will conclude with configuring settings through methods such as local and group policy.

Lessons

  • Overview of File Systems
  • Configuring and Managing File Access
  • Configuring and Managing Shared Folders
  • Managing Security with Policies

Lab : Configuring and Managing Permissions and Shares

  • Creating, Managing, and Sharing a Folder
  • Using Conditions to Control Access and Effective Permissions

After completing this module, students will be able to:

  • Describe the differences and benefits of supported file systems.
  • Configure file and folder permissions.
  • Configure shared folders.
  • Secure Windows through local policy settings.

Module 3: Configuring Threat Protection

This module introduces students to protecting devices from external threats. Students will learn about the different types of common threats. This module will teach students about using encryption, firewalls, and IPSec to help protect against threats. The module will conclude with how to configure and use Windows Defender and AppLocker.

Lessons

  • Malware and Threat Protection
  • Windows Defender
  • Connection Security Rules
  • Advanced Protection Methods

Lab : Practice Lab: Managing Network Security

  • Creating and Testing Inbound Rules
  • Creating and Testing Outbound Rules
  • Creating and Testing Connection Security Rules
  • Configuring Windows Defender

After completing this module, students will be able to:

  • Identify common security threats
  • Describe the methods by which you can mitigate these common security threats.
  • Describe the different methods of encryption.
  • Describe how Windows firewall can secure the device.
  • Describe the benefits of using IPSec.
  • Describe the different features of Windows Defender.
  • Describe the benefits of using AppLocker.

Module 4: Course ConclusionLessons

  • Final Exam

Lab : Graded Lab

Learners should start this course already having the following skills:

  • Basic understanding of computer networks and hardware concepts.
  • Basic understanding of OS and Application concepts.
  • Experience with using the Windows OS.

Verrijk Uw Carrière met OEM's ICT Trainingen

Waarom kiezen voor OEM?
Ervaring: Meer dan 20 jaar expertise in ICT-trainingen.
Uitgebreide Selectie: Meer dan 1000 cursussen van 200 topmerken.
Hoge Tevredenheid: Beoordeeld met een 9.0 op Springest.
Kwaliteitsgarantie: Gecertificeerde docenten en award-winning E-learning.
Partnerschappen: Microsoft Partner, EC-Council Partner, Certiport en Pearson VUE.

Er zijn nog geen ervaringen.

Deel je ervaring

Heb je ervaring met deze cursus? Deel je ervaring en help anderen kiezen. Als dank voor de moeite doneert Springest € 1,- aan Stichting Edukans.

Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.