Exam Ref 70-744 Securing Windows Server 2016

by ;
Edition: 1st
Format: Paperback
Pub. Date: 2016-12-20
Publisher(s): Microsoft Press
  • Complimentary 7-Day eTextbook Access - Read more
    When you rent or buy this book, you will receive complimentary 7-day online access to the eTextbook version from your PC, Mac, tablet, or smartphone. Feature not included on Marketplace Items.
List Price: $42.79

Buy Used

In Stock Usually Ships in 24-48 Hours
$29.99

Rent Book

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:1825 Days access
Downloadable:Lifetime Access
$45.59
$45.59

New Book

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

Prepare for Microsoft Exam 70-744–and help demonstrate your real-world mastery of securing Windows Server 2016 environments. Designed for experienced IT professionals ready to advance their status, Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the MCSE level.

Focus on the expertise measured by these objectives:

• Implement server hardening solutions

• Secure a virtualization infrastructure

• Secure a network infrastructure

• Manage privileged identities

• Implement threat detection solutions

• Implement workload-specific security

This Microsoft Exam Ref:

• Organizes its coverage by exam objectives

• Features strategic, what-if scenarios to challenge you

• Assumes you have experience as a Windows Server administrator and an understanding of basic networking and Hyper-V virtualization fundamentals, Active Directory Domain Services principles, and Windows Server security principles

Author Biography

Timothy L. Warner is an IT professional and technical trainer based in Nashville, TN. A computer enthusiast who authored his first BASIC program in 1981 on the Radio Shack TRS-80 Model III, Tim has worked in nearly every facet of IT, from systems administration and software architecture to technical writing and training. He can be reached via LinkedIn.

Craig Zacker is a writer, editor, and educator who has written or contributed to dozens of books on operating systems, networking, and PC hardware, as well as several college texts and online training courses. Craig is the author of the Windows Small Business Server 2008 Administrator's Pocket Consultant, and co-authored the MCITP Self-Paced Training Kit (Exam 70-686): Windows 7 Desktop Administrator.

Table of Contents

Chapter 1: Implement server hardening solutions

1.1 Configure disk and file encryption

1.2 Implement server patching and updating solutions

1.3 Implement malware protection

1.4 Protect credentials

1.5 Create security baselines

Chapter 2: Secure a virtualization infrastructure

2.1 Implement a Guarded Fabric solution

2.2 Implement Shielded and encryption-supported VMs

Chapter 3: Secure a network infrastructure

3.1 Configure Windows Firewall

3.2 Implement a Software Defined Distributed Firewall

3.3 Secure network traffic

Chapter 4: Manage privileged identities

4.1 Implement an Enhanced Security Administrative Environment (ESAE) administrative forest design approach

4.2 Implement Just-In-Time (JIT) Administration

4.3 Implement Just-Enough-Administration (JEA)

4.4 Implement Privileged Access Workstations (PAWs) and User Rights Assignments

4.5 Implement Local Administrator Password Solution (LAPS)

Chapter 5: Implement threat detection solutions

5.1 Configure advanced audit policies

5.2 Install and configure Microsoft Advanced Threat Analytics (ATA)

5.3. Determine threat detection solutions using Operations Management Suite (OMS)

Chapter 6: Implement workload-specific security

6.1 Secure application development and server workload infrastructure

6.2 Implement a secure file services infrastructure and Dynamic Access Control (DAC)

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.