Prevent your data from leaking and minimize threats to your data's security. In this course, you will learn about how leaks occur and the software and hardware tools available within Windows 10 that can help mitigate any security risks.
Security threats will never go away; in fact, they are becoming more prevalent than ever. So, how do you mitigate security risks in this day and age? The answer? Windows 10. The new hardware and software capabilities unleashed will help protect your data from modern threats, and ultimately provide a secure environment. In this course, Securing Windows 10: Data at Rest, in Use, and in Transit, you will learn how to protect your data at any stage. First, you'll examine how data can leak and how to use BitLocker to protect your resting data. Next, you'll cover Dynamic Access Control from a client perspective and how to prevent co-mingling in your Windows data. Finally, you'll learn how to use the Secure Socket Tunneling Protocol (SSTP) and its VPN functionality as well as the client functionality of RMS encryption to secure data in transit. By the end of this course, you'll be able to secure your own data from multiple kinds of risks and attacks.
Mark has trained and / or consulted in 20 countries since 1999, after retooling himself as an IT admin in the Windows NT 4.0 era at a local college. He has taught students at various Microsoft and Symantec campuses and at a variety of academic, military, corporate, and training center locations as well as online. He is the lead singer in three rock bands he founded, sings jazz, does voice overs, and has dabbled in stand-up and improv.
Course Overview Hi everyone, my name is Mark Ingram. Welcome to my course, Securing Windows 10: Data at Rest, in Use, and in Transit. I am an online and offline trainer and consultant, working with a large variety of Microsoft server and client technologies. In this course, we're going to look at various ways that data can leak, regardless of whether it's on a server, you're actively using it, or it's being transmitted. Knowing what tools are available and how to use them can help mitigate any security risks to save you a lot of hardship in the long run. That being said, before beginning this course, you should be familiar with how to grant access to resources using NT of S and share permissions. Some of the major topics we'll cover include new BitLocker protection features, how UEFI, the modern replacement for BIOS, enables new hardware-based protection methods such as secure boot and device guard, how Enterprise Data Protection prevents confidential information from leaving your organization, accidentally or otherwise, and a couple of Enterprise technologies from the Windows 10 client perspective that give you greater control over who can do what, namely active directory rights management services and dynamic access control. By the end of this course, you'll know how to protect data drives using Windows 10, how to protect your drives from malicious code installing before startup and from various other attacks, and how to protect data from inadvertently leaving your organization. I hope you'll join me on this journey to learn a huge variety of software and hardware security features available to you using Windows 10 with the Securing Windows 10: Data at Rest, in Use, and in Transit course at Pluralsight.