In this course, students will learn how to secure the Windows 10 OS and protect the data on the device. Students will be introduced to common methods used for authentication and access control. This course will teach how...In this course, students will learn how to secure the Windows 10 OS and protect the data on the device. Students will be introduced to common methods used for authentication and access control. This course will teach how to configure file and folder permissions and creating security policies. Students will also be introduced to the different types of external threats and how to leverage features like encryption and firewalls, as well as tools like Windows Defender.Show MoreCourse Prerequisites: Learners should start this course already having the following skills:
Basic understanding of computer netw...Learners should start this course already having the following skills:
Basic understanding of computer networks and hardware concepts.
Basic understanding of OS and Application concepts.
Attend training in a classroom environment at a campus near you. Instructor-led training is still the number one delivery method of choice because it allows you to interact and discuss the training material, either individually or in a group setting, and you gain access to expert knowledge from certified instructors. This form of guided learning is impactful and produces positive learning outcomes. Day, evening and Saturday classes are offered.
Duration 1 Day
Upcoming dates for Course MD-100T03-A: Protecting Windows 10
Hang on... we're fetching some dates from the Course Schedule.
This module introduces the tools and features of Windows 10 for authorizing access to Windows 10 clients. Students will learn about methods for how users sign-in to Windows 10. This module also covers restricting what users can or cannot do on a device through methods like UAC and account types. Lessons
Using Security Settings to Mitigate Threats
Configuring User Account Control
Implementing Device Registration
– See fewer details
Module 2: Configuring Data Access and Usage
In this module, Students will learn about permissions. This module will cover considerations for different files systems. Students will learn how to configure file and folder permissions as well as shared folders. The module will conclude with configuring settings through methods such as local and group policy. Lessons
Overview of File Systems
Configuring and Managing File Access
Configuring and Managing Shared Folders
Managing Security with Policies
Lab : Configuring and Managing Permissions and Shares
Creating, Managing, and Sharing a Folder
Using Conditions to Control Access and Effective Permissions
+ See more details
Module 3: Configuring Threat Protection
This module introduces students to protecting devices from external threats. Students will learn about the different types of common threats. This module will teach students about using encryption, firewalls, and IPSec to help protect against threats. The module will conclude with how to configure and use Windows Defender and AppLocker. Lessons
Malware and Threat Protection
Connection Security Rules
Advanced Protection Methods
Lab : Practice Lab: Managing Network Security
Creating and Testing Inbound Rules
Creating and Testing Outbound Rules
Creating and Testing Connection Security Rules
Configuring Windows Defender
+ See more details
Module 4: Course Conclusion
Lab : Graded Lab
+ See more details
CTU Training Solutions, Updated: May 27th, 2019
Share with friends
Request a Quote
The course information above is subject to change without notification due to market trends in the industry, legislation and/or programme version updates.
Terms and Conditions
Refer a friend
Save 23% when you register for the Cisco CCNA Routing and Switching (CCNAX) course at CTU, or share it with a friend and get 5% on your course of choice!
Either way you win!
Join the CTU community
Join the CTU Community Portal and gain access to superior resources.