Microsoft Cybersecurity Stack: Securing Windows 10 in the Enterprise

Go to class
Write Review

Free Online Course: Microsoft Cybersecurity Stack: Securing Windows 10 in the Enterprise provided by LinkedIn Learning is a comprehensive online course, which lasts for 1-2 hours worth of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. Microsoft Cybersecurity Stack: Securing Windows 10 in the Enterprise is taught by Pete Zerger.

Overview
  • Learn how to secure Windows 10 systems in corporate environments. Explore how to leverage key security features as part of a layered defense.

    Windows 10 brings an array of security features and services to the table. In this course, instructor Pete Zerger discusses how to leverage these features as part of a layered defense, sharing what you need to know to design and implement a strategy for securing Windows 10 systems in corporate environments. Pete explores proactive measures like securing privileged credentials, thwarting phishing attacks, and detecting zero-day threats. He also covers the integration between Windows 10 and the advanced security features in the Microsoft cloud, such as cloud protection in Windows Defender. Plus, learn security strategies for working from home and public spaces, including how to approach common corporate remote access scenarios.

Syllabus
  • Introduction

    • Securing Windows 10 in the enterprise
    • What you should know
    • Set up environment
    1. Introduction to Windows 10 Security
    • Cyber threats targeting Windows 10
    • Windows 10 security features
    • Developing a layered defense
    2. Windows 10 in the Enterprise
    • Policy-based management options
    • Credential Guard and Device Guard
    • Encrypting Windows devices
    • Protecting against zero-day threats
    • Managing privacy settings
    3. Antivirus and Updates
    • Windows Defender
    • Managing updates
    • Windows Insider
    4. Working from Home and Public Spaces
    • Wi-Fi settings
    • Proxy and browser
    • Firewall configurations
    • Securing remote access
    • Securing cloud data
    Conclusion
    • Next steps