EMAGISTER CUM LAUDE
      CompuEducación

      Protecting Windows 10

      CompuEducación
      En México

      Precio a consultar
      Si gustas, puedes llamar al centro en este momento

      Información importante

      Tipología Curso
      Nivel Nivel intermedio
      Lugar México
      Duración 1 Día
      Inicio Fechas a escoger
      • Curso
      • Nivel intermedio
      • México
      • Duración:
        1 Día
      • Inicio:
        Fechas a escoger
      Descripción

      In this course, students will learn how to secure the Windows 10 OS and protect the data on the device. Students will be introduced to common methods used for authentication and access control. This course will teach how to configure file and folder permissions and creating security policies. Students will also be introduced to the different types of external threats and how to leverage features like encryption and firewalls, as well as tools like Windows Defender.

      Instalaciones (1) y fechas
      Dónde se imparte y en qué fechas
      Inicio Ubicación
      Fechas a escoger
      México
      Plaza Polanco, Jaime Balmes No. 11, Edificio B Piso 7, Col. Los Morales Polanco, 11510, Ciudad de México (Distrito Federal), México
      Inicio Fechas a escoger
      Ubicación
      México
      Plaza Polanco, Jaime Balmes No. 11, Edificio B Piso 7, Col. Los Morales Polanco, 11510, Ciudad de México (Distrito Federal), México

      A tener en cuenta

      · ¿Cuáles son los objetivos de este curso?

      After completing this course, learners should be able to: Describe the methods for securing Windows 10. Configure account access and authentication. Configure file and folder permissions. Create security policies. Describe common threats and methods for mitigating against them.

      · ¿A quién va dirigido?

      Candidates for this exam are IT professionals who perform installation, configuration, general local management and maintenance of Windows 10 core services. Candidates may also be familiar with enterprise scenarios and cloud-integrated services.

      Preguntas & Respuestas

      Plantea tus dudas y otros usuarios podrán responderte

      Logros de este Centro

      2019
      Este centro lleva demostrando su calidad en Emagister
      16 años con Emagister

      ¿Cómo se consigue el sello CUM LAUDE?

      Todos los cursos están actualizados

      La valoración media es superior a 3,7

      Más de 50 reseñas en los últimos 12 meses

      Este centro lleva 16 años en Emagister.

      ¿Qué aprendes en este curso?

      Testing
      Windows
      Windows 8
      Windows Server
      Windows Vista
      Windows Store app
      Windows Server 2003
      Windows Server 2016
      Windows 10
      Authorizing
      Authorization

      Programa académico

      Course Outline

      Module 1: Configuring Authorization & Authentication
      This module introduces the tools and features of Windows 10 for authorizing access to Windows 10 clients. Students will learn about methods for how users sign-in to Windows 10. This module also covers restricting what users can or cannot do on a device through methods like UAC and account types.

      Lessons
      • Using Security Settings to Mitigate Threats
      • Configuring User Account Control
      • Implementing Device Registration
      • Authentication
      After completing this module, students will be able to:
      • Describe the different methods for securing data and the Windows 10 OS.
      • Describe the different types of user and service accounts.
      • Configure Windows Hello.
      • Configure user account control.
      Module 2: Configuring Data Access and Usage

      In this module, Students will learn about permissions. This module will cover considerations for different files systems. Students will learn how to configure file and folder permissions as well as shared folders. The module will conclude with configuring settings through methods such as local and group policy.

      Lessons
      • Overview of File Systems
      • Configuring and Managing File Access
      • Configuring and Managing Shared Folders
      • Managing Security with Policies
      • Lab : Configuring and Managing Permissions and Shares
      • Creating, Managing, and Sharing a Folder
      • Using Conditions to Control Access and Effective Permissions
      After completing this module, students will be able to:
      • Describe the differences and benefits of supported file systems.
      • Configure file and folder permissions.
      • Configure shared folders.
      • Secure Windows through local policy settings.
      Module 3: Configuring Threat Protection

      This module introduces students to protecting devices from external threats. Students will learn about the different types of common threats. This module will teach students about using encryption, firewalls, and IPSec to help protect against threats. The module will conclude with how to configure and use Windows Defender and AppLocker.

      Lessons
      • Malware and Threat Protection
      • Windows Defender
      • Connection Security Rules
      • Advanced Protection Methods
      • Lab : Practice Lab: Managing Network Security
      • Creating and Testing Inbound Rules
      • Creating and Testing Outbound Rules
      • Creating and Testing Connection Security Rules
      • Configuring Windows Defender
      After completing this module, students will be able to:
      • Identify common security threats
      • Describe the methods by which you can mitigate these common security threats.
      • Describe the different methods of encryption.
      • Describe how Windows firewall can secure the device.
      • Describe the benefits of using IPSec.
      • Describe the different features of Windows Defender.
      • Describe the benefits of using AppLocker.
      Module 4: Course Conclusion

      Lessons
      • Final Exam
      • Lab : Graded Lab