HOME > IT & Software > Windows Server 2008 R2- Hacking and Securing

Windows Server 2008 R2- Hacking and Securing

SynopsisWindows Server 2008 R2: Hacking and Securing, available at $1...
Windows Server 2008 R2- Hacking and Securing  No.1

Windows Server 2008 R2: Hacking and Securing, available at $19.99, has an average rating of 4, with 41 lectures, based on 114 reviews, and has 519 subscribers.

You will learn about Secure Windows Server 2008 R2 Know methods of attacks and weak points of the system Protect important data on server This course is ideal for individuals who are IT Students or IT managers or system administrators It is particularly useful for IT Students or IT managers or system administrators.

Enroll now: Windows Server 2008 R2: Hacking and Securing

Summary

Title: Windows Server 2008 R2: Hacking and Securing

Price: $19.99

Average Rating: 4

Number of Lectures: 41

Number of Published Lectures: 41

Number of Curriculum Items: 41

Number of Published Curriculum Objects: 41

Original Price: $89.99

Quality Status: approved

Status: Live

What You Will Learn

  • Secure Windows Server 2008 R2
  • Know methods of attacks and weak points of the system
  • Protect important data on server
  • Who Should Attend

  • IT Students
  • IT managers
  • system administrators
  • Target Audiences

  • IT Students
  • IT managers
  • system administrators
  • LAST UPDATED: 05/2024

    Windows Server 2008 R2: hacking and securing training is dedicated for those who manage Server systems and IT infrastructure: IT administrators, IT managers or project managers.
     
    The course includes topics discussed from the point of view of the administrator and shows you step by step what to do to protect the Windows Server against possible attacks and loss of important data. 

  • You will learn how to implement and manage security policies.

  • You will customize security policies for your specific requirements.

  • You will see how to create your own GPO.

  • You will get to know how to automate the deployment of security policies.

  • You will learn how to create the certificate templates which will improve your daily work with Windows Server 2008 R2.

  • You will discover a number of MMC plug-ins to help you properly configure the Windows Server.

  • You will see how to avoid the mistakes when using standard setup wizards.

  • You will learn what are the differences in the methods of authentication and why some of them can be dangerous.

  • You will get to know the methods of data encryption.

  • You will learn the effect of confirming the identity of users and computers.

  • You will discover how to monitor the security level of the system.

  • You’ll find out what CAs are.

  • You will learn how to manage certificates and how to process requests to issue such certificates.

  • You will get to know the Administrative Templates.

  • You will see how to analyze the software installed on Windows Server, and how to study its effect on security level.

  • You will learn the tools to analyze installed applications.

  • Course Curriculum

    Chapter 1: Introduction

    Lecture 1: Welcome to the course

    Lecture 2: Lets begin with some theory

    Lecture 3: System security policy – basics

    Chapter 2: Good practicies in managing server

    Lecture 1: Server manager – overview and roles

    Lecture 2: Security Configuration Wizard

    Lecture 3: SCW: Firewall

    Lecture 4: SCW: Auditing

    Chapter 3: Security policies

    Lecture 1: Functionality level

    Lecture 2: Increasing functional level

    Lecture 3: Windows security settings

    Lecture 4: Groups, system services and registry

    Lecture 5: Security Compliance Manager

    Lecture 6: SCM: Reviewing options

    Lecture 7: SCM: Configuring policy

    Lecture 8: SCM: Managing templates

    Chapter 4: Data and application security

    Lecture 1: Introduction to data security

    Lecture 2: Theoretical basics about data and app security

    Lecture 3: Data encription

    Lecture 4: Using system mechanisms to protect data

    Lecture 5: Securing applications with AppLocker

    Lecture 6: Executable rules

    Lecture 7: AppLocker in practice

    Chapter 5: Monitoring security level

    Lecture 1: What you should know about monitoring the security

    Lecture 2: Lets start with Windows Server Update services

    Lecture 3: Report viewer

    Lecture 4: Active Directory

    Lecture 5: Configuring advanced options

    Chapter 6: Group policy managment

    Lecture 1: Group Policies

    Lecture 2: Linking the GPO

    Lecture 3: Local administrators

    Chapter 7: Certificates

    Lecture 1: Certificates authority

    Lecture 2: Using CA

    Lecture 3: How to issue certificates automaticly

    Chapter 8: Testing configuration

    Lecture 1: How to check settings in real environment?

    Lecture 2: CA website

    Lecture 3: Attack Surface Analyzer

    Lecture 4: Now its your turn. Thank you for taking part in our training.

    Chapter 9: Rootkits and Stealth Apps: Creating and Revealing v2.0 course

    Lecture 1: Writing a shellcode

    Chapter 10: BONUS section – get your coupon code here

    Lecture 1: Become CISS – Certified Ethical Hacking Training

    Lecture 2: BONUS LECTURE: Learn more and get to know our other courses

    Lecture 3: Thank you for joining

    Instructors

  • Windows Server 2008 R2- Hacking and Securing  No.2
    IT Security Academy
    IT Security Certified Professional
  • Windows Server 2008 R2- Hacking and Securing  No.3
    Hacking School
    IT Security Experts – We turn beginners into professionals.
  • Rating Distribution

  • 1 stars: 3 votes
  • 2 stars: 4 votes
  • 3 stars: 7 votes
  • 4 stars: 36 votes
  • 5 stars: 64 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!