Student Feedback
70-744: Securing Windows Server 2016 Certification Video Training Course Outline
Introduction
Chapter 01 - Introduction to Att...
Chapter 02 - Protecting Users an...
Chapter 03 - Managing Administra...
Introduction
70-744: Securing Windows Server 2016 Certification Video Training Course Info
Microsoft 70-744: Securing Windows Server 2016 Certification Preparation Course
What you will learn
Implement multiple security strategies to safeguard Windows Server systems
Establish a secure infrastructure for both application development and server workloads
Plan, design, and deploy security configuration baselines across the organization
Protect sensitive and business-critical data against unauthorized access and loss
Install, configure, and manage Windows Firewall along with software-defined distributed firewall features
Monitor, analyze, and control incoming and outgoing traffic to reduce exposure to threats
Strengthen security in virtualized environments by applying best practices and advanced configurations
Defend systems against malware, ransomware, and other sophisticated cyberattacks
Monitor and manage threats effectively using Microsoft Advanced Threat Analytics (ATA) and Microsoft Operations Management Suite (OMS)
Requirements
To get the most out of this course, participants should come with a solid foundation in IT concepts and some hands-on experience in security practices. While the program is designed to teach advanced skills in securing Windows Server 2016, learners will benefit greatly if they already understand the basics of how networks and security tools operate.
Before enrolling, it is recommended that students meet the following requirements:
Fundamental knowledge of security tools and practices
Learners should have prior exposure to essential security concepts and utilities commonly used in modern IT infrastructures. This may include experience with antivirus software, intrusion detection systems, vulnerability scanners, or similar tools.
Understanding of core network security principles
A basic awareness of key security methods will be highly valuable, including:
Encryption and how it protects data at rest and in transit
Authentication processes such as passwords, certificates, or multi-factor methods
The role of firewalls in controlling access and monitoring traffic
Familiarity with network-based threats and attacks
Students should recognize different types of attacks and understand how they affect organizations, such as:
Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS)
Phishing, social engineering, and credential theft
Malware, ransomware, and spyware campaigns
Brute-force attempts against passwords and accounts
Experience with Windows Server administration
Since the course builds directly on Windows Server technologies, learners should already have working knowledge of:Installing and configuring Windows Server systems
Managing users, groups, and permissions in domain-based environments
Performing administrative tasks such as Group Policy management, updates, and server roles
By meeting these requirements, participants will be well-prepared to absorb advanced topics and gain the maximum benefit from the training program. The course assumes learners are comfortable with foundational IT practices and are ready to expand their expertise into specialized areas of server security.
Course Description
The Microsoft 70-744: Securing Windows Server 2016 course offers an in-depth and practical guide to the security capabilities built into Windows Server 2016. The focus of this training is on enhancing the overall security posture of IT environments, preparing professionals to protect infrastructures from modern threats, and aligning learning outcomes with the requirements of the Microsoft 70-744 certification exam. By working through this program, learners will not only prepare for certification success but also acquire the practical skills necessary to safeguard enterprise systems in real-world settings.
This course begins by addressing the reality of today’s security landscape. Organizations across industries face increasingly complex and frequent cyberattacks, ranging from credential theft to ransomware and insider threats. Instead of assuming systems are safe until proven otherwise, the training emphasizes adopting a mindset that breaches may already exist. This approach allows administrators to think proactively, analyze vulnerabilities, and implement defensive strategies that limit potential damage. By studying this principle of compromise, students will develop the ability to secure privileged accounts, reduce risks from elevated rights, and build strong administrative practices that harden enterprise environments against future attacks.
A central theme of the training is protecting identities and credentials. Attackers often target privileged accounts to gain broad access across networks. To combat this, the course provides detailed instruction on implementing Just Enough Administration (JEA), which allows administrators to perform only the tasks necessary for their role, and Just-in-Time Administration (JIT), which grants elevated permissions only when required and for limited durations. These strategies, combined with technologies like Credential Guard, significantly reduce the attack surface by isolating credentials and preventing theft. Through hands-on demonstrations, learners will practice configuring these features and learn how to apply them consistently across enterprise systems.
Another major component of the course is data protection. With sensitive information forming the core of business operations, securing data against unauthorized access or loss is essential. The course explains how to implement BitLocker Drive Encryption to protect drives and devices, ensuring that data remains unreadable if lost or stolen. Students will also learn about securing organizational storage, designing policies for data access, and encrypting information in transit across networks. Special attention is given to deploying secure workloads in data centers and cloud environments, where administrators must balance accessibility with compliance requirements. These lessons prepare participants to safeguard critical data regardless of where it is stored or accessed.
The training then explores defending workloads and applications against malicious threats such as malware, spyware, and ransomware. Through lectures and lab-based exercises, students are introduced to the tools and techniques available in Windows Server 2016 to analyze, identify, and block harmful activity. Participants practice configuring antivirus solutions, monitoring suspicious behavior, and deploying multi-layered defense systems that make enterprise infrastructures more resilient. Realistic case studies highlight how attacks unfold and demonstrate the effectiveness of applying layered security strategies to minimize risk.
Network security is another vital area of focus in this program. Participants gain a thorough understanding of configuring and managing Windows Firewall to control both inbound and outbound traffic. The course also introduces advanced features such as distributed firewall policies available through software-defined networking (SDN). Students practice applying rules that inspect traffic, block unauthorized connections, and create secure network architectures for communication between on-premises environments, the internet, and cloud services. By mastering these capabilities, administrators are better prepared to secure hybrid infrastructures where traditional boundaries are less defined.
Virtualization security is emphasized throughout the training, reflecting its importance in modern enterprise environments. As organizations increasingly rely on virtualized workloads, it becomes essential to ensure that virtual machines and the virtualization fabric itself remain protected. The course covers how to secure Hyper-V by deploying shielded virtual machines, configuring guarded fabric, and monitoring secure virtualization environments. With practical exercises, students learn how to isolate sensitive workloads, prevent tampering, and build secure virtualization strategies that align with business needs in both cloud and on-premises scenarios.
Monitoring and responding to threats form a critical part of the course structure. Learners are introduced to Microsoft Advanced Threat Analytics (ATA), a powerful tool that uses behavioral analysis to detect unusual activity, such as lateral movement within a network or attempts to exploit stolen credentials. ATA provides real-time insights that help administrators act quickly to prevent escalation. In addition, the program explores Microsoft Operations Management Suite (OMS), which extends monitoring capabilities with reporting, automation, and centralized visibility across multiple systems. These tools allow administrators to view their environment holistically and respond to security incidents with speed and precision.
Throughout the course, practical labs are integrated to reinforce theoretical concepts. These labs replicate challenges commonly faced by system administrators, giving learners opportunities to apply solutions, troubleshoot configurations, and analyze outcomes in safe, controlled environments. By combining lecture-based content with interactive practice, the training ensures that participants develop both knowledge and confidence.
As the course progresses, learners build a comprehensive skill set that prepares them for a wide range of professional responsibilities. By the conclusion of the training, participants will be able to design, implement, and manage advanced security measures for Windows Server 2016 systems. They will understand how to protect identities, secure data, defend applications, configure networks, and safeguard virtualization platforms. More importantly, they will gain the ability to monitor, detect, and respond to ongoing threats with a proactive and methodical approach.
Detailed Course Syllabus
Module 1: Introduction to Windows Server 2016 Security
Understanding the modern threat landscape
Importance of assuming breaches have already occurred
Principles of proactive versus reactive security models
Identifying vulnerabilities in enterprise infrastructures
Overview of the Microsoft 70-744 certification exam objectives
Module 2: Protecting Administrative Credentials
Common attack vectors targeting privileged accounts
Implementing Just Enough Administration (JEA)
Deploying Just-in-Time Administration (JIT)
Role-based access control for minimizing exposure
Best practices for securing administrative sessions
Module 3: Credential Guard and Remote Credential Guard
Introduction to virtualization-based security features
Understanding Credential Guard architecture
Deploying Credential Guard in enterprise networks
Remote Credential Guard and protecting remote logins
Troubleshooting credential-related issues
Module 4: Securing Sensitive Data
The role of encryption in enterprise security
Deploying BitLocker Drive Encryption on servers and endpoints
Managing encryption keys and recovery options
Securing data at rest and data in transit
Data protection strategies in hybrid and cloud environments
Module 5: Malware and Threat Mitigation
Types of malware: spyware, ransomware, and trojans
Understanding attack methods and entry points
Configuring Windows Defender and antivirus solutions
Designing multi-layered defenses against threats
Practical labs in malware detection and response
Module 6: Network Security with Windows Firewall
Overview of Windows Firewall and advanced features
Creating inbound and outbound firewall rules
Managing policies across domain-based environments
Monitoring and logging firewall activity
Troubleshooting firewall misconfigurations
Module 7: Distributed Firewall in Software-Defined Networking
Introduction to software-defined networking (SDN) in Windows Server 2016
Implementing distributed firewall policies
Securing east-west traffic inside datacenter networks
Integrating SDN with traditional network defenses
Real-world examples of securing SDN environments
Module 8: Securing Virtualized Environments
Understanding virtualization security challenges
Deploying shielded virtual machines in Hyper-V
Configuring guarded fabric and Host Guardian Service (HGS)
Protecting workloads in shared and hybrid environments
Best practices for securing virtualization layers
Module 9: Security Baselines and Configuration Management
Importance of standardized security baselines
Using Microsoft Security Compliance Toolkit
Designing and deploying group policies for security compliance
Monitoring drift from baseline configurations
Automating baseline enforcement in large-scale environments
Module 10: Advanced Threat Analytics (ATA)
Introduction to Microsoft Advanced Threat Analytics
Detecting suspicious user behaviors in real time
Understanding lateral movement and pass-the-hash attacks
Configuring ATA for enterprise monitoring
Case studies in identifying and mitigating threats with ATA
Module 11: Microsoft Operations Management Suite (OMS)
Overview of OMS features and capabilities
Integrating OMS with Windows Server environments
Monitoring performance and detecting anomalies
Automating responses using OMS solutions
Using OMS dashboards for security and compliance visibility
Module 12: Threat Detection and Incident Response
Building an incident response plan for enterprises
Steps in threat identification, containment, and eradication
Monitoring logs and analyzing event data
Conducting root-cause analysis after an incident
Recovery strategies to maintain business continuity
Module 13: Hybrid and Cloud Security Integration
Challenges of securing hybrid infrastructures
Extending security policies to cloud-based workloads
Identity and access management in cloud-connected systems
Using Azure Security Center with Windows Server 2016
Best practices for hybrid security alignment
Module 14: Compliance and Regulatory Requirements
Understanding compliance frameworks (GDPR, HIPAA, etc.)
Mapping Windows Server 2016 features to compliance needs
Using baselines to support audits and reporting
Ensuring consistent application of policies across environments
Creating compliance documentation with OMS and Group Policy
Module 15: Building a Proactive Security Culture
Developing a security-first mindset for IT teams
Aligning security goals with business objectives
Training staff to recognize phishing and insider threats
Encouraging continuous monitoring and improvement
Future-proofing security strategies in evolving landscapes
Module 16: Certification Preparation
Exam objectives and key focus areas for 70-744
Practice scenarios and mock exams
Tips for managing exam time and case study questions
Reviewing core topics: identity, data, virtualization, networking
Final preparation strategies for success in certification
Learning Outcomes
After completing the full program, students will:
Deploy comprehensive security solutions in Windows Server 2016 environments
Protect administrative rights with advanced identity tools
Secure data using encryption, policies, and compliance strategies
Manage firewall and distributed network defenses effectively
Harden virtualization infrastructures with shielded VMs and guarded fabric
Detect and respond to threats with Microsoft ATA and OMS
Apply best practices for hybrid cloud security integration
Confidently attempt and succeed in the Microsoft 70-744 certification exam
Course objectives
Develop a security-first mindset based on the assumption of potential breaches.
Protect and manage administrative credentials using modern techniques like JEA and JIT.
Secure sensitive information and business-critical data using advanced encryption methods.
Configure network security with both traditional and software-defined firewalls.
Strengthen protection in virtualization platforms and secure shielded workloads.
Mitigate malware, spyware, ransomware, and other threats using layered defenses.
Utilize ATA and OMS for monitoring, analysis, and threat detection.
Establish and maintain baseline security configurations across multiple systems.
Align organizational security with compliance requirements and industry best practices.
Target audience
This course is intended for IT professionals who are actively working in system or network administration roles and have direct responsibility for securing their organization’s IT infrastructure. These professionals typically work within Windows Server domain-based networks, where they must manage user access, enforce security policies, and secure connections to external and cloud-based resources.
The course is also well-suited for those seeking to advance their careers in IT security, particularly individuals preparing for the Microsoft 70-744 certification exam. It is highly beneficial for system administrators, network administrators, security analysts, and infrastructure engineers who want to strengthen their ability to defend against advanced threats and vulnerabilities in enterprise environments.
Why take this course
Modern organizations depend heavily on IT infrastructures to deliver services, store sensitive data, and maintain continuous operations. With cyber threats becoming increasingly sophisticated and widespread, the need for professionals who can effectively secure enterprise environments is greater than ever.
This course provides a direct pathway to acquiring the knowledge and technical abilities required to safeguard Windows Server environments. By enrolling, you will not only prepare for the Microsoft 70-744 exam but also build practical skills that are highly valuable in real-world roles.
In addition, the training emphasizes a proactive approach to security, focusing on preventing, detecting, and responding to threats before they escalate into major incidents. This practical perspective ensures that learners are equipped to address today’s security challenges with confidence.
Learning outcomes
Upon completing this training, students will:
Gain confidence in deploying comprehensive security strategies across Windows Server environments.
Understand how to minimize risks associated with privileged accounts.
Learn to encrypt and secure sensitive data against theft or misuse.
Be capable of configuring both traditional and distributed firewalls.
Develop expertise in securing virtualization and cloud-connected workloads.
Acquire the skills to monitor and respond to suspicious activities using Microsoft tools.
Be fully prepared to sit for the Microsoft 70-744 certification exam.
Benefits of this course
Enrolling in the Microsoft 70-744: Securing Windows Server 2016 course provides a wide range of benefits for IT professionals and organizations alike. This training not only prepares participants for certification but also equips them with the real-world skills necessary to protect enterprise environments against modern cyber threats. The benefits extend across career growth, technical expertise, and organizational resilience.
Professional growth and career advancement
Develop specialized expertise in Windows Server 2016 security, a skill highly valued by employers.
Gain a competitive edge in the job market by holding a certification that demonstrates practical knowledge and hands-on abilities.
Open pathways to higher-level roles such as security administrator, systems engineer, or infrastructure security consultant.
Build confidence in taking on advanced projects that involve securing critical workloads and infrastructures.
Enhance credibility when working with teams, clients, or leadership by demonstrating certified skills in enterprise security.
Technical skill development
Acquire a deep understanding of administrative credential protection using modern techniques like Just Enough Administration and Just-in-Time Administration.
Learn how to secure sensitive business data through encryption, storage management, and compliance-based practices.
Develop expertise in deploying and managing firewalls, including both traditional and software-defined options.
Gain hands-on experience in securing virtualized environments with shielded virtual machines and guarded fabric.
Strengthen abilities to detect, monitor, and respond to suspicious activities using Microsoft Advanced Threat Analytics and Operations Management Suite.
Practical application in workplace environments
Improve day-to-day effectiveness in managing threats that target enterprise systems and data.
Build incident response strategies that contain threats before they escalate.
Learn to configure security baselines across multiple systems to ensure uniform and consistent protection.
Apply multi-layered defenses against malware, ransomware, and spyware to reduce risks of downtime and data loss.
Ensure that both on-premises and hybrid workloads are protected with security tools designed for real-world infrastructures.
Organizational benefits
Enhance the overall security posture of an organization by applying the skills gained in this course.
Protect critical business operations from disruptions caused by breaches and attacks.
Reduce the likelihood of data loss, compliance violations, and reputational damage.
Create a culture of proactive security, where threats are anticipated and managed before they cause harm.
Align IT operations with industry best practices and compliance requirements, ensuring that organizational infrastructures meet modern security standards.
Preparation for certification success
Gain thorough knowledge of all Microsoft 70-744 exam objectives.
Practice with real-world scenarios and labs that simulate exam case studies.
Develop strategies for approaching the exam with confidence and accuracy.
Build a strong foundation for pursuing additional certifications such as the MCSE: Cloud Platform and Infrastructure.
Achieve a credential that validates both technical skills and practical experience, making certification more meaningful in professional contexts.
Long-term career and learning opportunities
Build a solid platform for continuous growth in cybersecurity and server management.
Position yourself for future technologies by mastering security features that align with evolving IT environments.
Enhance adaptability in working with hybrid systems that combine on-premises and cloud services.
Gain the ability to mentor and train others within your organization, strengthening your role as a trusted expert.
Establish a career path that leads to higher-level certifications and advanced roles in IT security.
Enroll today
Taking the step to enroll in this course today can make an immediate difference in your career growth and professional capabilities. The demand for IT professionals who understand security in enterprise environments is rapidly increasing, and Windows Server 2016 continues to be widely deployed across organizations. By joining this training, you place yourself ahead of the curve in acquiring advanced skills that are directly applicable to modern infrastructures.
This course not only prepares you for the Microsoft 70-744 certification but also equips you with hands-on skills that can be used in your workplace right away. Every lesson is designed to combine theory with practical exercises, ensuring that the learning experience remains engaging, relevant, and career-focused.
Here are the reasons to enroll today:
Gain advanced security expertise for Windows Server 2016 environments
Prepare thoroughly for the Microsoft 70-744 certification exam
Strengthen your professional profile with in-demand security skills
Learn proactive strategies to defend against modern cyber threats
Apply knowledge immediately through interactive labs and real-world scenarios
Improve your chances of career growth and higher-level IT roles
Build a foundation for future certifications and specializations
Enrolling today is the first step toward securing both your career and your organization’s IT environment.