This course will confront you with the implementation of Windows system security. It will allow you to define an effective security policy based on the components of the enterprise network.
The main system vulnerabilities and configuration problems will be studied, and corrections and best practices to apply will be reviewed.
Protections implemented by the operating system will be studied and analyzed.
Specific Objectives:
- Define an effective security policy
- Implement an effective security policy
- Evaluate its configuration