Training Video Course

70-744: Securing Windows Server 2016

PDFs and exam guides are not so efficient, right? Prepare for your Microsoft examination with our training course. The 70-744 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to Microsoft certification exam. Pass the Microsoft 70-744 test with flying colors.

Rating
4.64rating
Students
130
Duration
13:36:18 h
$16.49
$14.99

Curriculum for 70-744 Video Course

Name of Video Time
Play Video: Course Introduction
1. Course Introduction
02:55
Play Video: Instructor Introduction
2. Instructor Introduction
01:24
Name of Video Time
Play Video: Chapter 01 - Introduction
1. Chapter 01 - Introduction
01:56
Play Video: Topic A: Understanding Types of Attacks
2. Topic A: Understanding Types of Attacks
00:22
Play Video: Assume Breach
3. Assume Breach
03:16
Play Video: Methods of Attack
4. Methods of Attack
12:46
Play Video: Attack Stages
5. Attack Stages
07:02
Play Video: Prioritizing Resources
6. Prioritizing Resources
03:30
Play Video: Incident Response Strategy
7. Incident Response Strategy
02:11
Play Video: Ensuring Compliance
8. Ensuring Compliance
02:04
Play Video: Topic B: Detecting Security Breaches
9. Topic B: Detecting Security Breaches
00:22
Play Video: Locating Evidence
10. Locating Evidence
01:40
Play Video: Event Logs
11. Event Logs
02:36
Play Video: Examining Other Configurations
12. Examining Other Configurations
01:51
Play Video: Topic C: Using Sysinternals Tools
13. Topic C: Using Sysinternals Tools
00:22
Play Video: Introducing Sysinternals
14. Introducing Sysinternals
02:32
Play Video: Demo - Examining Sysinternals Tools
15. Demo - Examining Sysinternals Tools
01:52
Play Video: System Monitor
16. System Monitor
02:05
Play Video: AccessChk
17. AccessChk
01:32
Play Video: Autoruns
18. Autoruns
01:35
Play Video: LogonSessions
19. LogonSessions
01:25
Play Video: Process Explorer
20. Process Explorer
01:37
Play Video: Process Monitor
21. Process Monitor
01:28
Play Video: Sigcheck
22. Sigcheck
01:18
Play Video: Demo - Using Sysinternals Tools
23. Demo - Using Sysinternals Tools
13:45
Play Video: Chapter 01 Summary
24. Chapter 01 Summary
01:31
Name of Video Time
Play Video: Chapter 02 - Introduction
1. Chapter 02 - Introduction
02:12
Play Video: Topic A: User Rights and Privileges
2. Topic A: User Rights and Privileges
00:18
Play Video: Principle of Least Privilege
3. Principle of Least Privilege
05:05
Play Video: Configuring User Rights
4. Configuring User Rights
03:24
Play Video: Configuring Account Security Options
5. Configuring Account Security Options
09:33
Play Video: Demo - User Rights and Account Security Options
6. Demo - User Rights and Account Security Options
16:05
Play Video: Account Security Controls
7. Account Security Controls
02:16
Play Video: Complexity Options
8. Complexity Options
03:30
Play Video: Password and Lockout Policies
9. Password and Lockout Policies
03:34
Play Video: Demo - Configuring Account Policies in Group Policy
10. Demo - Configuring Account Policies in Group Policy
04:23
Play Video: Configuring Fine-Grained Password Policies
11. Configuring Fine-Grained Password Policies
01:26
Play Video: Understanding PSO Application
12. Understanding PSO Application
02:55
Play Video: Protected Users Security Groups
13. Protected Users Security Groups
03:22
Play Video: Delegating Administrative Control
14. Delegating Administrative Control
04:13
Play Video: Demo - Delegating Control in AD DS
15. Demo - Delegating Control in AD DS
06:25
Play Video: Local Administrator Password Solutions (LAPS)
16. Local Administrator Password Solutions (LAPS)
03:24
Play Video: LAPS Requirements
17. LAPS Requirements
01:40
Play Video: LAPS Process
18. LAPS Process
01:13
Play Video: Demo - Using LAPS
19. Demo - Using LAPS
11:06
Play Video: Topic B: Working with Computer and Service Accounts
20. Topic B: Working with Computer and Service Accounts
00:10
Play Video: What is a Computer Account?
21. What is a Computer Account?
01:40
Play Video: Computer Account Functionality
22. Computer Account Functionality
01:19
Play Video: Working with Secure Channel Passwords
23. Working with Secure Channel Passwords
01:55
Play Video: Service Account Types
24. Service Account Types
02:05
Play Video: Group MSAs
25. Group MSAs
00:38
Play Video: Demo - Configuring Group MSAs
26. Demo - Configuring Group MSAs
08:33
Play Video: Topic C: Protecting User Credentials
27. Topic C: Protecting User Credentials
00:10
Play Video: Introducing Credential Guard
28. Introducing Credential Guard
02:13
Play Video: Credential Guard Requirements
29. Credential Guard Requirements
01:30
Play Video: Configuring Credential Guard
30. Configuring Credential Guard
01:17
Play Video: Verifying Credential Guard Operation
31. Verifying Credential Guard Operation
01:23
Play Video: Credential Guard Weaknesses
32. Credential Guard Weaknesses
01:19
Play Video: NTLM Blocking
33. NTLM Blocking
03:33
Play Video: Searching AD DS for Problem Accounts
34. Searching AD DS for Problem Accounts
02:05
Play Video: Demo - Locating Problem Accounts
35. Demo - Locating Problem Accounts
05:42
Play Video: Topic D: Using Privileged Access Workstations
36. Topic D: Using Privileged Access Workstations
00:32
Play Video: The Need for Privileged Access Workstations
37. The Need for Privileged Access Workstations
01:52
Play Video: Privileged Access Workstations
38. Privileged Access Workstations
01:41
Play Video: Jump Servers
39. Jump Servers
01:09
Play Video: Securing Domain Controllers
40. Securing Domain Controllers
06:20
Play Video: Chapter 02 Summary
41. Chapter 02 Summary
02:19
Name of Video Time
Play Video: Chapter 03 - Introduction
1. Chapter 03 - Introduction
01:50
Play Video: Topic A: Understanding and Deploying JEA
2. Topic A: Understanding and Deploying JEA
00:17
Play Video: Introduction to JEA
3. Introduction to JEA
06:01
Play Video: JEA Components
4. JEA Components
01:05
Play Video: Session Configuration Files
5. Session Configuration Files
03:06
Play Video: Demo - Creating a Session Configuration File
6. Demo - Creating a Session Configuration File
03:18
Play Video: Role Capability Files
7. Role Capability Files
02:32
Play Video: Demo - Create a Role Capability File
8. Demo - Create a Role Capability File
07:31
Play Video: JEA Endpoints
9. JEA Endpoints
01:12
Play Video: Demo - Creating a JEA Endpoint
10. Demo - Creating a JEA Endpoint
02:15
Play Video: Connecting to JEA Endpoints
11. Connecting to JEA Endpoints
01:52
Play Video: Deploying JEA Endpoints
12. Deploying JEA Endpoints
02:05
Play Video: Topic B: Using Enhanced Security Administrative Environments (ESAE) Forests
13. Topic B: Using Enhanced Security Administrative Environments (ESAE) Forests
00:17
Play Video: ESAE Forests
14. ESAE Forests
02:34
Play Video: Administrative Tiers
15. Administrative Tiers
01:47
Play Video: ESAE Best Practices
16. ESAE Best Practices
02:41
Play Video: The Clean Source Principle
17. The Clean Source Principle
02:08
Play Video: Implementing the Clean Source Principle
18. Implementing the Clean Source Principle
02:25
Play Video: Topic C: Using Microsoft Identity Manager
19. Topic C: Using Microsoft Identity Manager
00:23
Play Video: Overview of MIM
20. Overview of MIM
02:36
Play Video: MIM Requirements
21. MIM Requirements
01:50
Play Video: MIM Service Accounts
22. MIM Service Accounts
02:51
Play Video: Topic D: Using JIT Administration and PAM
23. Topic D: Using JIT Administration and PAM
00:31
Play Video: Overview of JIT Administration
24. Overview of JIT Administration
01:32
Play Video: Privileged Access Management (PAM)
25. Privileged Access Management (PAM)
02:32
Play Video: PAM Components
26. PAM Components
02:13
Play Video: Creating an Administrative Forest
27. Creating an Administrative Forest
01:26
Play Video: Configuring Trust Relationships
28. Configuring Trust Relationships
03:22
Play Video: Shadow Principals
29. Shadow Principals
02:09
Play Video: Configuring the MIM Web Portal
30. Configuring the MIM Web Portal
01:00
Play Video: Managing and Configuring PAM Roles
31. Managing and Configuring PAM Roles
01:05
Play Video: Chapter 03 Summary
32. Chapter 03 Summary
02:48
Name of Video Time
Play Video: Chapter 04 Introduction
1. Chapter 04 Introduction
01:45
Play Video: Topic A: Configuring and Managing Windows Defender
2. Topic A: Configuring and Managing Windows Defender
00:08
Play Video: Understanding Malware
3. Understanding Malware
04:43
Play Video: Malware Sources
4. Malware Sources
01:41
Play Video: Mitigation Methods
5. Mitigation Methods
03:26
Play Video: Windows Defender
6. Windows Defender
01:40
Play Video: Demo - Using Windows Defender
7. Demo - Using Windows Defender
06:43
Play Video: Topic B: Restricting Software
8. Topic B: Restricting Software
00:13
Play Video: Controlling Applications
9. Controlling Applications
01:40
Play Video: Software Restriction Policies
10. Software Restriction Policies
02:49
Play Video: Security Levels
11. Security Levels
01:16
Play Video: AppLocker
12. AppLocker
02:40
Play Video: Support for AppLocker
13. Support for AppLocker
03:03
Play Video: AppLocker Rules
14. AppLocker Rules
01:56
Play Video: Creating Default Rules
15. Creating Default Rules
03:01
Play Video: Demo - Using AppLocker
16. Demo - Using AppLocker
11:15
Play Video: Topic C: Using Device Guard
17. Topic C: Using Device Guard
00:14
Play Video: Overview of Device Guard
18. Overview of Device Guard
02:06
Play Video: Device Guard Features
19. Device Guard Features
02:12
Play Video: Configuring Device Guard
20. Configuring Device Guard
01:43
Play Video: Device Guard Policies
21. Device Guard Policies
02:28
Play Video: Deploying Code Integrity Policies
22. Deploying Code Integrity Policies
01:33
Play Video: Control Flow Guard
23. Control Flow Guard
01:25
Play Video: Topic D: Patch Management with WSUS
24. Topic D: Patch Management with WSUS
00:10
Play Video: Overview of WSUS
25. Overview of WSUS
02:25
Play Video: Deployment Options
26. Deployment Options
02:05
Play Video: Server Requirements
27. Server Requirements
01:52
Play Video: Configuring Clients
28. Configuring Clients
01:27
Play Video: Administering WSUS
29. Administering WSUS
01:08
Play Video: Approving Updates
30. Approving Updates
01:47
Play Video: Demo - Installing and Configuring WSUS
31. Demo - Installing and Configuring WSUS
18:04
Play Video: Chapter 04 Summary
32. Chapter 04 Summary
02:07
Name of Video Time
Play Video: Chapter 05 - Introduction
1. Chapter 05 - Introduction
01:12
Play Video: Topic A: Configuring Auditing for Windows Server 2016
2. Topic A: Configuring Auditing for Windows Server 2016
00:10
Play Video: Overview of Auditing
3. Overview of Auditing
01:49
Play Video: The Purpose of Auditing
4. The Purpose of Auditing
01:29
Play Video: Types of Events
5. Types of Events
04:49
Play Video: Auditing Goals
6. Auditing Goals
00:57
Play Video: Auditing File and Object Access
7. Auditing File and Object Access
01:52
Play Video: Demo - Configuring Auditing
8. Demo - Configuring Auditing
10:03
Play Video: Topic B: Advanced Auditing and Management
9. Topic B: Advanced Auditing and Management
00:38
Play Video: Advanced Auditing
10. Advanced Auditing
01:11
Play Video: Advanced Auditing Subcategories
11. Advanced Auditing Subcategories
02:40
Play Video: Dynamic Auditing
12. Dynamic Auditing
02:38
Play Video: Event Log Subscriptions
13. Event Log Subscriptions
02:27
Play Video: Audit Collection Services (ACS)
14. Audit Collection Services (ACS)
02:01
Play Video: Demo - Configuring Event Forwarding
15. Demo - Configuring Event Forwarding
06:59
Play Video: Auditing with Windows PowerShell
16. Auditing with Windows PowerShell
01:58
Play Video: Demo - Using PowerShell with Audit Logs
17. Demo - Using PowerShell with Audit Logs
08:00
Play Video: Transaction Logging
18. Transaction Logging
02:02
Play Video: Module Logging
19. Module Logging
01:06
Play Video: Script Block Logging
20. Script Block Logging
00:50
Play Video: Demo - Configuring PowerShell Logging
21. Demo - Configuring PowerShell Logging
08:57
Play Video: Topic C: Deploying and Configuring ATA
22. Topic C: Deploying and Configuring ATA
00:08
Play Video: Overview of ATA
23. Overview of ATA
02:35
Play Video: Usage Scenarios
24. Usage Scenarios
05:08
Play Video: Deployment Requirements
25. Deployment Requirements
02:14
Play Video: ATA Gateways
26. ATA Gateways
02:03
Play Video: Port Mirroring
27. Port Mirroring
01:17
Play Video: Configuring ATA Center
28. Configuring ATA Center
01:38
Play Video: Topic D: Deploying and Configuring Operations Management Suite
29. Topic D: Deploying and Configuring Operations Management Suite
00:06
Play Video: Introduction to Operations Management Suite
30. Introduction to Operations Management Suite
00:53
Play Video: Deployment Overview
31. Deployment Overview
01:40
Play Video: OMS Solutions
32. OMS Solutions
01:32
Play Video: Installing OMS
33. Installing OMS
01:26
Play Video: OMS Solutions
34. OMS Solutions
01:21
Play Video: Chapter 05 Summary
35. Chapter 05 Summary
01:59
Name of Video Time
Play Video: Chapter 06 - Introduction
1. Chapter 06 - Introduction
00:53
Play Video: Topic A: Secure the Virtualization Infrastructure
2. Topic A: Secure the Virtualization Infrastructure
00:27
Play Video: Introduction to Guarded Fabric
3. Introduction to Guarded Fabric
03:16
Play Video: Host Guardian Service
4. Host Guardian Service
01:31
Play Video: Preparing HGS Nodes
5. Preparing HGS Nodes
01:20
Play Video: Installing and Configuring HGS
6. Installing and Configuring HGS
02:10
Play Video: Attestation and Encryption
7. Attestation and Encryption
01:35
Play Video: Attestation Methods
8. Attestation Methods
01:22
Play Video: Initializing HGS
9. Initializing HGS
01:59
Play Video: Configuring HSG Clients
10. Configuring HSG Clients
01:24
Play Video: Topic B: Deploying Security Baselines
11. Topic B: Deploying Security Baselines
00:07
Play Video: Security Compliance Manager (SCM)
12. Security Compliance Manager (SCM)
03:33
Play Video: SCM Requirements
13. SCM Requirements
01:21
Play Video: Demo - Installing SCM
14. Demo - Installing SCM
03:12
Play Video: Demo - Configuring and Deploying Security Baselines
15. Demo - Configuring and Deploying Security Baselines
11:53
Play Video: Topic C: Deploying Nano Server
16. Topic C: Deploying Nano Server
00:12
Play Video: Planning for Nano Server
17. Planning for Nano Server
01:05
Play Video: Understanding Nano Server Roles
18. Understanding Nano Server Roles
00:45
Play Video: Installing Nano Server Roles
19. Installing Nano Server Roles
02:06
Play Video: Nano Server Installation
20. Nano Server Installation
01:00
Play Video: Installation Steps
21. Installation Steps
01:53
Play Video: Chapter 06 Summary
22. Chapter 06 Summary
00:46
Name of Video Time
Play Video: Chapter 07 Introduction
1. Chapter 07 Introduction
01:49
Play Video: Topic A: Planning and Implementing File Encryption
2. Topic A: Planning and Implementing File Encryption
00:11
Play Video: Introducing Encrypting File System
3. Introducing Encrypting File System
06:36
Play Video: EFS Features
4. EFS Features
06:26
Play Video: Encryption and Decryption
5. Encryption and Decryption
03:47
Play Video: Recovering EFS Files
6. Recovering EFS Files
02:54
Play Video: Demo - Using EFS
7. Demo - Using EFS
08:47
Play Video: Topic B: Planning and Implementing BitLocker
8. Topic B: Planning and Implementing BitLocker
00:13
Play Video: Overview of BitLocker
9. Overview of BitLocker
03:21
Play Video: BitLocker and TPMs
10. BitLocker and TPMs
02:19
Play Video: BitLocker Requirements
11. BitLocker Requirements
02:00
Play Video: Tools for Configuring and Managing BitLocker
12. Tools for Configuring and Managing BitLocker
01:49
Play Video: Deploying BitLocker
13. Deploying BitLocker
01:40
Play Video: Demo - Deploying BitLocker
14. Demo - Deploying BitLocker
10:17
Play Video: BitLocker on Hyper-V VMs
15. BitLocker on Hyper-V VMs
00:42
Play Video: BitLocker and CSVs
16. BitLocker and CSVs
01:42
Play Video: Enabling BitLocker for CSV
17. Enabling BitLocker for CSV
01:08
Play Video: Network Unlock
18. Network Unlock
01:56
Play Video: Network Unlock Process
19. Network Unlock Process
01:12
Play Video: BitLocker Recovery
20. BitLocker Recovery
03:01
Play Video: Microsoft BitLocker Administration and Monitoring (MBAM)
21. Microsoft BitLocker Administration and Monitoring (MBAM)
00:46
Play Video: Chapter 07 Summary
22. Chapter 07 Summary
00:48
Name of Video Time
Play Video: Chapter 08 Introduction
1. Chapter 08 Introduction
01:06
Play Video: Topic A: Using File Server Resource Manager
2. Topic A: Using File Server Resource Manager
00:18
Play Video: Capacity Management
3. Capacity Management
02:51
Play Video: Storage Management
4. Storage Management
01:15
Play Video: Introduction to FSRM
5. Introduction to FSRM
01:16
Play Video: Storage Management with File Server Resource Manager
6. Storage Management with File Server Resource Manager
00:24
Play Video: Overview of FSRM
7. Overview of FSRM
01:14
Play Video: Installing and Configuring FSRM
8. Installing and Configuring FSRM
01:30
Play Video: Demo - Installing and Configuring FSRM
9. Demo - Installing and Configuring FSRM
05:51
Play Video: Quota Management
10. Quota Management
02:53
Play Video: Demo - Create and Manage Quotas
11. Demo - Create and Manage Quotas
11:51
Play Video: File Screening
12. File Screening
02:31
Play Video: Using File Groups
13. Using File Groups
01:54
Play Video: Exceptions and Templates
14. Exceptions and Templates
01:55
Play Video: Demo - Implementing File Screening
15. Demo - Implementing File Screening
10:07
Play Video: Storage Reports
16. Storage Reports
02:12
Play Video: Report Tasks
17. Report Tasks
00:47
Play Video: Demo - Generating Storage Reports
18. Demo - Generating Storage Reports
06:51
Play Video: Automatic File Management
19. Automatic File Management
01:26
Play Video: Topic B: Implementing Classification and File Management Tasks
20. Topic B: Implementing Classification and File Management Tasks
00:12
Play Video: File Classification
21. File Classification
02:23
Play Video: Classification Rules
22. Classification Rules
01:56
Play Video: Demo - Configure File Classification
23. Demo - Configure File Classification
08:06
Play Video: File Management Task
24. File Management Task
03:35
Play Video: Topic C: Working with Dynamic Access Control
25. Topic C: Working with Dynamic Access Control
00:10
Play Video: Overview of Dynamic Access Control
26. Overview of Dynamic Access Control
02:43
Play Video: Dynamic Access Control Scenarios
27. Dynamic Access Control Scenarios
03:37
Play Video: DAC Technologies
28. DAC Technologies
01:13
Play Video: Understanding Identity
29. Understanding Identity
03:12
Play Video: Understanding Claims
30. Understanding Claims
03:14
Play Video: Types of Claims
31. Types of Claims
02:19
Play Video: Central Access Policies
32. Central Access Policies
01:27
Play Video: Policy Components
33. Policy Components
01:35
Play Video: DAC Prerequisites
34. DAC Prerequisites
03:07
Play Video: Demo - Implementing DAC
35. Demo - Implementing DAC
16:09
Play Video: Chapter 08 Summary
36. Chapter 08 Summary
01:52
Name of Video Time
Play Video: Chapter 09 Introduction
1. Chapter 09 Introduction
02:12
Play Video: Topic A: Using the Windows Firewall with Advanced Security
2. Topic A: Using the Windows Firewall with Advanced Security
00:07
Play Video: Types of Firewalls
3. Types of Firewalls
03:47
Play Video: Well-Known Ports
4. Well-Known Ports
02:12
Play Video: Host-Based Firewall
5. Host-Based Firewall
02:24
Play Video: Network Profiles
6. Network Profiles
02:16
Play Video: Configuring the Windows Firewall
7. Configuring the Windows Firewall
04:12
Play Video: Demo - Working with the Windows Firewall
8. Demo - Working with the Windows Firewall
17:44
Play Video: Topic B: Datacenter Firewall
9. Topic B: Datacenter Firewall
00:37
Play Video: Network Controller
10. Network Controller
02:09
Play Video: Datacenter Firewall
11. Datacenter Firewall
02:24
Play Video: Network Security Groups
12. Network Security Groups
00:52
Play Video: Scenarios for Datacenter Firewall
13. Scenarios for Datacenter Firewall
02:20
Play Video: Topic C: Utilizing IP Security
14. Topic C: Utilizing IP Security
00:12
Play Video: Overview of IP Security
15. Overview of IP Security
02:07
Play Video: IPSec Protocols
16. IPSec Protocols
02:07
Play Video: IPSec Usage Scenarios
17. IPSec Usage Scenarios
04:09
Play Video: IPSec Configuration Tools
18. IPSec Configuration Tools
00:59
Play Video: Connection Security Rules
19. Connection Security Rules
00:54
Play Video: Understanding Rule Types
20. Understanding Rule Types
01:38
Play Video: Rule Endpoints
21. Rule Endpoints
01:47
Play Video: Authentication Settings
22. Authentication Settings
02:57
Play Video: Authentication Methods
23. Authentication Methods
02:31
Play Video: Encryption Settings
24. Encryption Settings
01:32
Play Video: Monitoring Connections
25. Monitoring Connections
00:56
Play Video: Demo - Implementing IPSec
26. Demo - Implementing IPSec
07:09
Play Video: Topic D: Configuring Advanced DNS Settings
27. Topic D: Configuring Advanced DNS Settings
00:05
Play Video: Managing DNS Services
28. Managing DNS Services
03:35
Play Video: Optimizing DNS Name Resolution
29. Optimizing DNS Name Resolution
03:17
Play Video: The GlobalNames Zone
30. The GlobalNames Zone
01:37
Play Video: Implementing DNS Security
31. Implementing DNS Security
04:44
Play Video: DNS Security (DNSSEC)
32. DNS Security (DNSSEC)
01:44
Play Video: Implementing DNSSEC
33. Implementing DNSSEC
02:44
Play Video: Demo - Configuring DNSSEC
34. Demo - Configuring DNSSEC
06:54
Play Video: Introducing DNS Policies
35. Introducing DNS Policies
01:47
Play Video: Implementing DNS Policies
36. Implementing DNS Policies
03:11
Play Video: RRL Feature
37. RRL Feature
03:07
Play Video: Demo - Configuring DNS Policies
38. Demo - Configuring DNS Policies
08:41
Play Video: Topic E: Monitoring Network Traffic
39. Topic E: Monitoring Network Traffic
00:04
Play Video: Microsoft Message Analyzer
40. Microsoft Message Analyzer
02:53
Play Video: Demo - Using Microsoft Message Analyzer
41. Demo - Using Microsoft Message Analyzer
06:00
Play Video: Topic F: Securing SMB Traffic
42. Topic F: Securing SMB Traffic
00:30
Play Video: SMB 3.1.1 Protocol Security
43. SMB 3.1.1 Protocol Security
02:12
Play Video: SMB Encryption Requirements
44. SMB Encryption Requirements
01:34
Play Video: Encrypting SMB Shares
45. Encrypting SMB Shares
01:26
Play Video: Disabling Support for SMB 1.0
46. Disabling Support for SMB 1.0
01:24
Play Video: Chapter 09 Review Summary
47. Chapter 09 Review Summary
01:49
Play Video: Course Closure
48. Course Closure
02:14

About Microsoft 70-744 Training Course

This training course is designed to help with Microsoft 70-744 (70-744: Securing Windows Server 2016) exam preparation Read More.

Microsoft 70-744 video course is aimed to equip individuals with knowledge and security techniques important in securing windows server. The course is mainly concerned with designing as well as the deployment of security baselines for windows server. The course is meant to measure an individual’s capability in the accomplishment of tasks such as securing the virtualized environment, provision of critical data security, and inspection as well as mitigation of incoming and outgoing network traffic among others.

In addition, the course is very beneficial to the students as it provides them with adequate knowledge and skills in order for them to perform excellently in their Microsoft 70-744 exam. Actually, the course covers every detail an individual may need to know in order to pass the 70-744 exam.

Description

The Microsoft 70-744 course is offered at an affordable cost. The course entails the topic of enhancing the security of the infrastructure of IT in deeper details. A student begins by learning the importance of making an assumption that breaches of a network have taken place already. The course further teaches students on how to initiate a rectification on the breach. Moreover, individuals such as system administrators are taught how to protect the administrative credentials as well as the rights of ensuring that they are capable of performing the required tasks effectively.

The students are also enlightened on how to mitigate malware, spyware and other potential threats that are capable of compromising the security as well as the integrity of any firm’s data. The course further equips students with knowledge and skills on how to utilize the Advanced Threat Analysis feature, securing virtualization platform and the usage of new deployment options. The main objective of this course is to help students perform well in the 70-744 exam as it covers all topics related to that examination. The series tutorial also prepares individuals for exams related to cloud platform and infrastructure.

Knowledge and skills students develop
  • Networking security techniques
  • Infrastructure security
  • Infrastructure management
  • Server management
  • Window defender configuration and management
  • Windows server auditing techniques
  • Data protection configuration
Requirements for this course
  • Any individual interested in taking this course should have a clear understanding of the tools and techniques of network security.
  • Students wishing to enroll this course are required to have a technical know-how of various types of network threats and attacks.
  • Every individual wishing to take this course must have completed the 70-740, 70-741 and 70-742 exams.
  • Every student taking this course should never fail to undertake assignments provided as they prepare him or her for the upcoming exam.
Examination paper design
  • The duration of the exam should be at least one and a half hours
  • The questions are in multiple choices
  • The answers should be either in single or multiple choices
  • An individual should answer not less than sixty questions
Audience to target
  • IT professionals currently working as network or system administrators in their companies.
  • College as well as university students studying courses related to networking and internet security.
  • Individuals who want to pass the 70-744 exam in order for them to become MCSE certified.
  • Any individual interested in gaining knowledge and technical expertise for enhancing security in IT infrastructure.
Job Opportunities
  • Network administrator
  • IT manager
  • Systems engineer
  • Technical support engineer
  • IT infrastructure engineer
  • IT support technician
  • Window server administrator

The holders of Microsoft 70-744 certification have the capability of earning a salary ranging between $255,123 and $917,683 annually.

Conclusion

The course is intended to equip individuals with knowledge and skills on how to secure windows server. After an individual is through with this course, he or she is capable of passing the 70-744 exam and get a high profile occupation.

Download Microsoft MCSE 70-744 Exam Questions & Answers

Get 100% Real Exam Questions, Accurate & Verified Answers As Seen in the Real Exam!
30 Days Free Updates, Instant Download!

Microsoft 70-744 Premium Bundle
$59.97
$39.97

70-744 Premium Bundle

  • Premium File: 208 Questions & Answers. Last update: Aug 4, 2020
  • Training Course: 295 Video Lectures
  • Study Guide: 599 Pages
  • Real Questions
  • 100% Accurate Answers
  • Fast Exam Updates
Get Unlimited Access to ALL Premium Files

70-744 Premium Bundle

Microsoft 70-744 Premium Bundle
  • Premium File: 208 Questions & Answers. Last update: Aug 4, 2020
  • Training Course: 295 Video Lectures
  • Study Guide: 599 Pages
  • Real Questions
  • 100% Accurate Answers
  • Fast Exam Updates
$59.97
$39.97
Get Unlimited Access to ALL Premium Files

Free 70-744 Exam Questions & 70-744 Dumps

File Name Size Votes
File Name
microsoft.passguide.70-744.v2020-07-22.by.emil.123q.vce
Size
1.96 MB
Votes
1
File Name
microsoft.selftestengine.70-744.v2020-03-18.by.eva.124q.vce
Size
2.01 MB
Votes
1
File Name
microsoft.braindumps.70-744.v2020-02-04.by.noah.121q.vce
Size
2.54 MB
Votes
1
File Name
microsoft.test4prep.70-744.v2019-10-30.by.noah.115q.vce
Size
1.84 MB
Votes
2
File Name
microsoft.prep4sure.70-744.v2019-09-10.by.caleb.100q.vce
Size
1.52 MB
Votes
3
File Name
microsoft.prep4sure.70-744.v2019-06-02.by.wahome.75q.vce
Size
1.8 MB
Votes
3
File Name
microsoft.test-inside.70-744.v2019-04-28.by.mark.73q.vce
Size
1023.03 KB
Votes
3
File Name
microsoft.selftestengine.70-744.v2018-12-20.by.raleigh.71q.vce
Size
2.06 MB
Votes
3
File Name
microsoft.mcse.securing.windows.server.2016.pass4sureexam.70-744.v2018-09-20.by.gladys.68q.vce
Size
1022.37 KB
Votes
2
File Name
microsoft.mcse.pass4sures.70-744.v2018-05-02.by.emilia.50q.vce
Size
1.61 MB
Votes
2

Comments (5)

Add Comment

Please post your comments about 70-744 Exams. Don't share your email address asking for 70-744 braindumps or 70-744 exam pdf files.

  • berat_
  • Netherlands
  • Jun 20, 2020

this course has helped me to achieve my aspiration of becoming a systems engineer. I will use the skills I gained from this course to manage and monitor all systems and infrastructure installed in our company. thank you, guys!

  • Ahmed
  • France
  • Jun 06, 2020

Guys, you have really made me proud. You have provided me with network and infrastructure security techniques. I will apply these techniques in my future career and I am sure they will help me so much.

  • junior22
  • United States
  • May 18, 2020

the course was wow! It has enabled me to perform excellently in my 70-744 exam. I am very sure it the best series tutorial to equip individuals with knowledge and skills in order for them to become MCSE certified.

  • lewis dyer
  • Israel
  • May 01, 2020

I have learned how to configure data protection. The knowledge I gained from this course will enable me to safeguard the information I have stored on my computer from being accessed by other individuals without my consent.

  • Kit
  • Costa Rica
  • Apr 09, 2020

it was an interesting course. Am very happy that I have gained knowledge as well as technical expertise necessary for enhancing network and internet security. I am very glad guys.

Add Comment

Purchase Individually

70-744  Premium File
70-744
Premium File
208 Q&A
$32.99 $29.99
70-744  Training Course
70-744
Training Course
208 Lectures
$16.49 $14.99
70-744  Study Guide
70-744
Study Guide
208 Pages
$16.49 $14.99

Microsoft Training Courses

Managing Microsoft SharePoint Server 2016 Training Course
70-339
Managing Microsoft SharePoint Server 2016
$14.99
Designing and Deploying Microsoft Exchange Server 2016 Training Course
70-345
Designing and Deploying Microsoft Exchange Server 2016
$14.99
Installing and Configuring Windows Server 2012 Training Course
70-410
Installing and Configuring Windows Server 2012
$14.99
Administering Windows Server 2012 Training Course
70-411
Administering Windows Server 2012
$14.99
Configuring Advanced Windows Server 2012 Services Training Course
70-412
Configuring Advanced Windows Server 2012 Services
$14.99
MCSE Designing and Implementing a Server Infrastructure Training Course
70-413
MCSE Designing and Implementing a Server Infrastructure
$14.99
MCSE Implementing an Advanced Server Infrastructure Training Course
70-414
MCSE Implementing an Advanced Server Infrastructure
$14.99
Upgrading Your Skills to MCSA Windows Server 2012 Training Course
70-417
Upgrading Your Skills to MCSA Windows Server 2012
$14.99
MCSA Querying Microsoft SQL Server 2012/2014 Training Course
70-461
MCSA Querying Microsoft SQL Server 2012/2014
$14.99
MCSA Administering Microsoft SQL Server 2012/2014 Databases Training Course
70-462
MCSA Administering Microsoft SQL Server 2012/2014 Databases
$14.99
MCSA Implementing a Data Warehouse with Microsoft SQL Server 2012/2014 Training Course
70-463
MCSA Implementing a Data Warehouse with Microsoft SQL Server 2012/2014
$14.99
Developing Microsoft SQL Server 2012/2014 Databases Training Course
70-464
Developing Microsoft SQL Server 2012/2014 Databases
$14.99
Designing Database Solutions for Microsoft SQL Server 2012 Training Course
70-465
Designing Database Solutions for Microsoft SQL Server 2012
$14.99
Implementing Data Models and Reports with Microsoft SQL Server 2012 Training Course
70-466
Implementing Data Models and Reports with Microsoft SQL Server 2012
$14.99
Designing Business Intelligence Solutions with Microsoft SQL Server 2012 Training Course
70-467
Designing Business Intelligence Solutions with Microsoft SQL Server 2012
$14.99
MCSD Programming in HTML5 with JavaScript and CSS3 Training Course
70-480
MCSD Programming in HTML5 with JavaScript and CSS3
$14.99
MCSD Programming in C# Training Course
70-483
MCSD Programming in C#
$14.99
MCSD Developing ASP.NET MVC Web Applications Training Course
70-486
MCSD Developing ASP.NET MVC Web Applications
$14.99
MCSD Developing Windows Azure and Web Services Training Course
70-487
MCSD Developing Windows Azure and Web Services
$14.99
Installation, Storage, and Compute with Windows Server 2016 Training Course
70-740
Installation, Storage, and Compute with Windows Server 2016
$14.99
MCSA Networking with Windows Server 2016 Training Course
70-741
MCSA Networking with Windows Server 2016
$14.99
Identity with Windows Server 2016 Training Course
70-742
Identity with Windows Server 2016
$14.99
Upgrading Your Skills to MCSA: Windows Server 2016 Training Course
70-743
Upgrading Your Skills to MCSA: Windows Server 2016
$14.99
Securing Windows Server 2016 Training Course
70-744
Securing Windows Server 2016
$14.99
Querying Data with Transact-SQL Training Course
70-761
Querying Data with Transact-SQL
$14.99
Developing SQL Databases Training Course
70-762
Developing SQL Databases
$14.99
Administering a SQL Database Infrastructure Training Course
70-764
Administering a SQL Database Infrastructure
$14.99
Provisioning SQL Databases Training Course
70-765
Provisioning SQL Databases
$14.99
Implementing a SQL Data Warehouse Training Course
70-767
Implementing a SQL Data Warehouse
$14.99
Developing SQL Data Models Training Course
70-768
Developing SQL Data Models
$14.99
Analyzing and Visualizing Data with Microsoft Power BI Training Course
70-778
Analyzing and Visualizing Data with Microsoft Power BI
$14.99
Analyzing and Visualizing Data with Microsoft Excel Training Course
70-779
Analyzing and Visualizing Data with Microsoft Excel
$14.99
SharePoint 2010 Training Course
77-886
SharePoint 2010
$14.99
Windows Operating System Fundamentals Training Course
98-349
Windows Operating System Fundamentals
$14.99
Software Development Fundamentals Training Course
98-361
Software Development Fundamentals
$14.99
Windows Server Administration Fundamentals Training Course
98-365
Windows Server Administration Fundamentals
$14.99
Networking Fundamentals Training Course
98-366
Networking Fundamentals
$14.99
Security Fundamentals Training Course
98-367
Security Fundamentals
$14.99
Introduction to Programming Using Python Training Course
98-381
Introduction to Programming Using Python
$14.99
Designing and Implementing an Azure AI Solution Training Course
AI-100
Designing and Implementing an Azure AI Solution
$14.99
Microsoft Azure Administrator Training Course
AZ-103
Microsoft Azure Administrator
$14.99
Microsoft Azure Administrator (beta) Training Course
AZ-104
Microsoft Azure Administrator (beta)
$14.99
Developing Solutions for Microsoft Azure Training Course
AZ-203
Developing Solutions for Microsoft Azure
$14.99
Developing Solutions for Microsoft Azure (beta) Training Course
AZ-204
Developing Solutions for Microsoft Azure (beta)
$14.99
Microsoft Azure Architect Technologies Training Course
AZ-300
Microsoft Azure Architect Technologies
$14.99
Microsoft Azure Architect Design Training Course
AZ-301
Microsoft Azure Architect Design
$14.99
Microsoft Azure Architect Technologies (beta) Training Course
AZ-303
Microsoft Azure Architect Technologies (beta)
$14.99
Microsoft Azure DevOps Solutions Training Course
AZ-400
Microsoft Azure DevOps Solutions
$14.99
Microsoft Azure Security Technologies Training Course
AZ-500
Microsoft Azure Security Technologies
$14.99
Microsoft Azure Fundamentals Training Course
AZ-900
Microsoft Azure Fundamentals
$14.99
Designing and Implementing a Data Science Solution on Azure Training Course
DP-100
Designing and Implementing a Data Science Solution on Azure
$14.99
Implementing an Azure Data Solution Training Course
DP-200
Implementing an Azure Data Solution
$14.99
Designing an Azure Data Solution Training Course
DP-201
Designing an Azure Data Solution
$14.99
Microsoft Dynamics 365 for Customer Service Training Course
MB-230
Microsoft Dynamics 365 for Customer Service
$14.99
Microsoft Dynamics CRM 2016 Customization and Configuration Training Course
MB2-712
Microsoft Dynamics CRM 2016 Customization and Configuration
$14.99
Microsoft Dynamics 365 Customization and Configuration Training Course
MB2-716
Microsoft Dynamics 365 Customization and Configuration
$14.99
Windows 10 Training Course
MD-100
Windows 10
$14.99
Managing Modern Desktops Training Course
MD-101
Managing Modern Desktops
$14.99
Microsoft 365 Identity and Services Training Course
MS-100
Microsoft 365 Identity and Services
$14.99
Microsoft 365 Mobility and Security Training Course
MS-101
Microsoft 365 Mobility and Security
$14.99
Deploying Microsoft 365 Teamwork Training Course
MS-300
Deploying Microsoft 365 Teamwork
$14.99
Deploying SharePoint Server Hybrid Training Course
MS-301
Deploying SharePoint Server Hybrid
$14.99
Microsoft 365 Security Administration Training Course
MS-500
Microsoft 365 Security Administration
$14.99
Microsoft 365 Fundamentals Training Course
MS-900
Microsoft 365 Fundamentals
$14.99

Microsoft Certifications

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

UP

LIMITED OFFER: GET 30% Discount

This is ONE TIME OFFER

ExamSnap Discount Offer
Enter Your Email Address to Receive Your 30% Discount Code

A confirmation link will be sent to this email address to verify your login. *We value your privacy. We will not rent or sell your email address.

Download Free Demo of VCE Exam Simulator

Experience Avanset VCE Exam Simulator for yourself.

Simply submit your e-mail address below to get started with our interactive software demo of your free trial.

Free Demo Limits: In the demo version you will be able to access only first 5 questions from exam.