Scroll to top button

Securing Windows Server 2016 Exam 70-744

ISBN : 9781644591017

Create new career opportunities by getting Microsoft MCSE certified with the Securing Windows Server 2016 Exam 70-744 course and lab. The lab provides a hands-on learning experience in a safe, online environment. The complete course covers MCSE 70-744 exam objectives and provides expertise in managing privileged identities, securing a virtualization and network infrastructure, implementing threat detection solutions, workload-specific security, and server hardening solutions.

The Microsoft MCSE Securing Windows Server 2016 70-744 exam proves that the candidates can manage the protection of Active Directory and Identity infrastructures and manage privileged identities using Just in Time (JIT) and Just Enough Administration (JEA) approaches. The MCSA 70-744 exam covers the protection of Active Directory and identity infrastructure with the Enhanced Security Administrative Environment (ESAE) Administrative Forest design approach.

Lessons
Lessons
16+
Quizzes
190+
Flashcards
197+
Glossary of terms
197+
TestPrep
Pre Assessment Questions
40+
Post Assessment Questions
40+
Lab
Performance lab
Learn the real world skills using LiveLab.
58+
Video tutorials
Get interactive learning videos with transcripts and voice-over.
58+
Hours
Signify the duration of video tutorials in labs.
01:32+
Exam related FAQs
What are the prerequisites for this exam? There are no defined pre-requisites for this certification.
What is the exam registration fee? USD 165
Where do I take the exam? Microsoft
How many questions are asked in the exam? The exam contains 40-60 questions.
What is the duration of the exam? 150 minutes
What is the passing score? 700
What is the exam's retake policy?

Here are the retake policies:

  • If a candidate does not achieve a passing score on an exam the first time, the candidate must wait at least 24 hours before retaking the exam.
  • If a candidate does not achieve a passing score the second time, the candidate must wait at least 14 days before retaking the exam a third time.
  • A 14-day waiting period is also imposed for the fourth and fifth subsequent exam retakes. A candidate may not take a given exam any more than five times per year (12 months). This 12-month period starts the day of the fifth unsuccessful exam retake. The candidate is then eligible to retake the exam 12 months from that date. To take a given exam more than five times per year or to have the time between attempts waived, a candidate must submit a request and obtain prior permission from Microsoft. Requests should be sent to mlsecure@microsoft.com. These requests should include the following information:
  • MCID
  • Name
  • Email
  • Exam Number
  • If a candidate achieves a passing score on an exam, the candidate cannot take the exam again. Microsoft reserves the right to make some exams available for retake. For a complete list of exams that can be retaken annually, click here.
What is the validity of the certification? Microsoft certifications have no expiration. The certification holder is certified for life unless the vendor changes its policy.
Where can I find more information about this exam? To know more about the 70-744, click here.
What are the career opportunities after passing this exam?
  • Server Administrator
  • Server System Administrator
  • Windows Server Administrator
  • The Microsoft Official Academic Course Program
  • Using Encryption to Protect Data
  • Deploying and Configuring BitLocker
  • Deploying and Configuring EFS
  • Managing EFS and BitLocker Certificates
  • Skill Summary
  • Business Case Scenarios
  • Managing Updates Using WSUS
  • Implementing Windows Server Update Services (WSUS) Solutions
  • Skill Summary
  • Business Case Scenarios
  • Implementing an Antimalware Solution with Windows Defender
  • Using AppLocker to Manage Applications
  • Implementing Windows Security Features
  • Implementing NT Lan Manager (NTLM) Blocking
  • Skill Summary
  • Business Case Scenarios
  • Creating Security Baselines with Microsoft Security Compliance Toolkit
  • Skill Summary
  • Business Case Scenarios
  • Implementing a Guarded Fabric Solution
  • Implementing Shielded and Encrypted-Supported VMs
  • Skill Summary
  • Business Case Scenarios
  • Configuring Windows Firewall
  • Implementing a Software-Defined Distributed Firewall
  • Skill Summary
  • Business Case Scenarios
  • Configuring IPSec Policies
  • Securing SMB Protocol
  • Configuring Security for DNS
  • Installing and Configuring MMA to Analyze Network Traffic
  • Skill Summary
  • Business Case Scenarios
  • Implementing Enhanced Security Administrative Environment (ESAE)
  • Implementing Just-In-Time (JIT) Administration
  • Skill Summary
  • Business Case Scenarios
  • Implementing Just-Enough-Administration (JEA)
  • Skill Summary
  • Business Case Scenarios
  • Understanding the Principle of Least Privilege
  • Running Programs as an Administrator
  • Implementing Privileged Access Workstations (PAWs)
  • Implementing Local Administrator Password Solutions (LAPS)
  • Skill Summary
  • Business Case Scenarios
  • Configuring Advanced Audit Policies
  • Skill Summary
  • Business Case Scenarios
  • Implementing Microsoft Advanced Threat Analytics (ATA)
  • Skill Summary
  • Business Case Scenarios
  • Determining Threat Detection Solutions Using OMS
  • Skill Summary
  • Business Case Scenarios
  • Implementing Windows PowerShell Desired State Configuration (DSC)
  • Installing and Configuring Windows Nano Server
  • Installing and Configuring Windows Containers
  • Skill Summary
  • Business Case Scenarios
  • Using File Server Resource Manager
  • Supporting Work Folders
  • Using Dynamic Access Control
  • Configuring File Management Tasks
  • Skill Summary
  • Business Case Scenarios

Hands on Activities (Labs)

  • Deploying BitLocker Without TPM
  • Installing the Network Unlock Feature
  • Installing BitLocker
  • Enabling BitLocker to Use Secure Boot
  • Enabling VM Security Options
  • Configuring Group Policy Settings for Network Unlock
  • Encrypting a Folder or File Using EFS
  • Adding Recovery Agents for EFS
  • Configuring Automatic Updates Using Group Policies
  • Installing a WSUS Server
  • Creating a GPO to Enable AutoUpdate for Client Computers
  • Scheduling a Windows Defender Scan
  • Configuring Windows Defender with GPOs
  • Configuring Windows Defender Scans Using Windows PowerShell
  • Creating Code Integrity Policy Rules
  • Enabling Credential Guard Using Regedit
  • Exporting the Local Policy
  • Creating an AppLocker Rule
  • Getting AppLocker File Information Using Windows PowerShell
  • Enabling a Virtual Machine Secure Boot and TPM
  • Enabling Device Guard
  • Installing the HGS Role
  • Creating a Generation 2 Virtual Machine
  • Enabling a Virtual Machine Secure Boot and Shielding
  • Creating an Outbound Rule
  • Creating an Inbound Rule
  • Creating an Authentication Exemption Rule
  • Exporting a Firewall Policy
  • Creating a Firewall Rule Using PowerShell
  • Importing a Windows Firewall Rule into a Group Policy Object
  • Enabling the ICMP Traffic on the Sending Host
  • Creating the Required AD DS Security Groups
  • Creating a New GPO for Domain Isolation
  • Adding an IPsec Policy Rule
  • Enabling SMB Encryption
  • Configuring DNSSEC on an Active Directory Integrated Zone
  • Enabling PowerShell Module and Script Block Logging
  • Creating and Configuring a Session-Configuration File
  • Running Programs as an Administrator
  • Configuring User Rights Assignment
  • Enabling Restricted Admin and Windows Defender Remote Credential Guard Using Registry Editor
  • Turning on Windows Defender Remote Credential Guard by Using Group Policy
  • Implementing an Audit Policy
  • Auditing Files and Folders
  • Enabling Dynamic Access Control Resources
  • Defining Global Object Access Auditing
  • Configuring the Monitoring of Removable Storage Devices
  • Installing and Configuring a Nano Server
  • Installing Windows Containers
  • Installing File Server Resource Manager
  • Creating a Quota Template
  • Creating a File Screen
  • Creating File Groups
  • Creating a File Screen Template
  • Installing Work Folders
  • Enabling DAC for AD DS
  • Configuring Access-Denied Remediation
×