Loading...
Login / Register

Course MD-100T03-A: Protecting Windows 10

In this course, students will learn how to secure the Windows 10 OS and protect the data on the device. Students will be introduced to common methods used for authentication and access control. This course will teach how... Show More
Course Prerequisites:
Learners should start this course already having the following skills: Basic understanding of computer netw... Show More
Request a Quote

Instructor-Led Training (ILT)

Attend training in a classroom environment at a campus near you. Instructor-led training is still the number one delivery method of choice because it allows you to interact and discuss the training material, either individually or in a group setting, and you gain access to expert knowledge from certified instructors. This form of guided learning is impactful and produces positive learning outcomes. Day, evening and Saturday classes are offered.

Exam
Included

Duration
1 Day

Course Schedule

Upcoming dates for Course MD-100T03-A: Protecting Windows 10

Module 1: Configuring Authorization & Authentication

This module introduces the tools and features of Windows 10 for authorizing access to Windows 10 clients. Students will learn about methods for how users sign-in to Windows 10. This module also covers restricting what users can or cannot do on a device through methods like UAC and account types.
Lessons

  • Using Security Settings to Mitigate Threats
  • Configuring User Account Control
  • Implementing Device Registration
  • Authentication

See fewer details

Module 2: Configuring Data Access and Usage

In this module, Students will learn about permissions. This module will cover considerations for different files systems. Students will learn how to configure file and folder permissions as well as shared folders. The module will conclude with configuring settings through methods such as local and group policy.
Lessons

  • Overview of File Systems
  • Configuring and Managing File Access
  • Configuring and Managing Shared Folders
  • Managing Security with Policies

Lab : Configuring and Managing Permissions and Shares

  • Creating, Managing, and Sharing a Folder
  • Using Conditions to Control Access and Effective Permissions

+ See more details

Module 3: Configuring Threat Protection

This module introduces students to protecting devices from external threats. Students will learn about the different types of common threats. This module will teach students about using encryption, firewalls, and IPSec to help protect against threats. The module will conclude with how to configure and use Windows Defender and AppLocker.
Lessons

  • Malware and Threat Protection
  • Windows Defender
  • Connection Security Rules
  • Advanced Protection Methods

Lab : Practice Lab: Managing Network Security

  • Creating and Testing Inbound Rules
  • Creating and Testing Outbound Rules
  • Creating and Testing Connection Security Rules
  • Configuring Windows Defender

+ See more details

Module 4: Course Conclusion

Lessons

  • Final Exam

Lab : Graded Lab

+ See more details

CTU Training Solutions , Updated: May 27th, 2019

Share with friends

Request a Quote

Your Name
Your Surname
Contact Number
Your Email
Company
Which campus would you like to study at?
Your job title
Will your training be sponsored?
Message
The course information above is subject to change without notification due to market trends in the industry, legislation and/or programme version updates. Terms and Conditions

Join the CTU community

Join the CTU Community Portal and gain access to superior resources.

Join for Free