In this course, you will learn how to implement proactive solutions needed to defend against the most-used attack vectors of today and how to prepare your environment for the post-2015 security landscape.
In the future, the only way to secure Windows environment will be to implement proactive security and to stop relying only on reactive solutions like anti-malware. In this course, Implementing Proactive Windows Security, you will learn how to move from dead, reactive security measures to effective and proactive security measures. First, you'll learn how to implement BitLocker drive encryption in Windows. Next, you'll learn about protecting admin privileges with UAC and how UAC can be your best friend. Finally, you'll get a better understanding of IPsec - and why it's not as bad as people make it out to be. By the end of this course, you'll know how to design and implement proactive security in a Windows network, helping you better secure your environments for 2016 and beyond.
Course Overview Hello everyone, my name is Sami Laiho, welcome to my course, Implementing Proactive Windows Security. I'm a senior technical fellow at my own company called Adminize. Security's always a compromise between security, usability, and cost. You can always get two, but never three. In the future, the only way to secure Windows environments is to implement proactive security and forget about trusting only reactive solutions like anti-malware. This course takes you through needed to sign and implementation considerations, while moving your company from reactive to proactive security. Some of the major topics that we will cover include what level of BitLocker security is really worth it, how do you really get rid of admin rights, and why IPsec is not as bad as people make it sound like. By the end of this course, you'll know how to design and implement proactive security in a Windows network. Before beginning the course, you should be familiar with the basics of Windows operating systems.