Speak to our team now +44 (0)1737 821590

Securing Microsoft systems

A 3 day
training course

Microsoft security training course description

A hands on training course focusing on security in the Microsoft environment. The course progresses from patch management onto the use of Microsoft security tools. Then server, desktop and network security are studied in the Microsoft environment.

Key outcomes from this course

By the end of the course delegates will be able to:
  • Use Microsoft security tools.
  • Secure Microsoft servers.
  • Secure Microsoft desktops.
  • Secure Microsoft networks.

Microsoft security training course details

Who will benefit:
Technical server support staff.
Technical desktop support staff.
Technical network staff.
Technical security staff
Supporting Windows 2003
Networking Microsoft Systems
3 days

Training approach

This structured training course seeks to build upon workbook learning through the use of group exercises, dynamic discussion and individual tasks in order to deliver an engaging and interactive module that will ensure all candidates are able to transfer their new skills into the workplace.

Overall ratings for this course:

Course review

"Hard concepts were explained very simply."
J. S., Framestore CFC
"Excellent presentation - very good course structure."
B. M., London Internet Exchange

Microsoft security training course contents

Security threats, Microsoft defaults, admin accounts, security patches, patch management, patch tools.
Hands on: Studying Microsoft defaults, applying security patches.

Microsoft security tools
Microsoft updates, WSUS, Inventory tool, baseline security analyser, URLscan, EventCombMT, Cipher security tool, Port reporter, PortQry. Tools hackers use.
Hands on: Using Microsoft security tools.

Server security
Checklists, core server security, AD, Member server security, Domain controller security, Specific roles.
Hands on Hardening Microsoft servers, security templates.

Active Directory
Admin authority in AD, group policy, trust and authentication.

Desktop security
Checklists, core client security, anti virus software, anti spyware software, firewalls, securing clients with AD, securing clients with group policy, software restriction policies.
Hands on: Securing Microsoft desktops.

Network security
Checklist, IP security, VPNs, PKI, certificate authorities, RAS, RRAS, IAS.
Hands on: VPN configuration, IAS configuration.

Auditing, authorisation and logons, tracking, system monitoring, detecting attacks.
Hands on: Monitoring Microsoft systems.

Microsoft security response center, security advisories.

Why Choose Us

SNT trainers score an average of over 90% on the three main areas of:
  • Ability to teach
  • Technical knowledge
  • Answering questions
“Excellently presented by a very knowledgeable and enthusiastic trainer.” P.D. General Dynamics

We limit our maximum class size to 8 delegates; often we have less than this. This ensures optimal interactivity between delegates and instructor.
"Excellent course. The small class size was a great benefit…" M.B. IBM

We write our own courses; courseware does not just consist of slides and our slides are diagrams not bullet point text. A typical chapter provides clearly defined objectives with a chapter overview, slides with text underneath, a quiz at the end to check the learning of the students. Hands on exercises are at the end and are used to reinforce the theory.

See Dates & Prices for this course

To enquire about this course

To reserve this course online