Windows Server 2008 R2- Hacking and Securing
- IT & Software
- Mar 01, 2025

Windows Server 2008 R2: Hacking and Securing, available at $19.99, has an average rating of 4, with 41 lectures, based on 114 reviews, and has 519 subscribers.
You will learn about Secure Windows Server 2008 R2 Know methods of attacks and weak points of the system Protect important data on server This course is ideal for individuals who are IT Students or IT managers or system administrators It is particularly useful for IT Students or IT managers or system administrators.
Enroll now: Windows Server 2008 R2: Hacking and Securing
Summary
Title: Windows Server 2008 R2: Hacking and Securing
Price: $19.99
Average Rating: 4
Number of Lectures: 41
Number of Published Lectures: 41
Number of Curriculum Items: 41
Number of Published Curriculum Objects: 41
Original Price: $89.99
Quality Status: approved
Status: Live
What You Will Learn
Who Should Attend
Target Audiences
LAST UPDATED: 05/2024
Windows Server 2008 R2: hacking and securing training is dedicated for those who manage Server systems and IT infrastructure: IT administrators, IT managers or project managers.
The course includes topics discussed from the point of view of the administrator and shows you step by step what to do to protect the Windows Server against possible attacks and loss of important data.
You will learn how to implement and manage security policies.
You will customize security policies for your specific requirements.
You will see how to create your own GPO.
You will get to know how to automate the deployment of security policies.
You will learn how to create the certificate templates which will improve your daily work with Windows Server 2008 R2.
You will discover a number of MMC plug-ins to help you properly configure the Windows Server.
You will see how to avoid the mistakes when using standard setup wizards.
You will learn what are the differences in the methods of authentication and why some of them can be dangerous.
You will get to know the methods of data encryption.
You will learn the effect of confirming the identity of users and computers.
You will discover how to monitor the security level of the system.
You’ll find out what CAs are.
You will learn how to manage certificates and how to process requests to issue such certificates.
You will get to know the Administrative Templates.
You will see how to analyze the software installed on Windows Server, and how to study its effect on security level.
You will learn the tools to analyze installed applications.
Course Curriculum
Chapter 1: Introduction
Lecture 1: Welcome to the course
Lecture 2: Lets begin with some theory
Lecture 3: System security policy – basics
Chapter 2: Good practicies in managing server
Lecture 1: Server manager – overview and roles
Lecture 2: Security Configuration Wizard
Lecture 3: SCW: Firewall
Lecture 4: SCW: Auditing
Chapter 3: Security policies
Lecture 1: Functionality level
Lecture 2: Increasing functional level
Lecture 3: Windows security settings
Lecture 4: Groups, system services and registry
Lecture 5: Security Compliance Manager
Lecture 6: SCM: Reviewing options
Lecture 7: SCM: Configuring policy
Lecture 8: SCM: Managing templates
Chapter 4: Data and application security
Lecture 1: Introduction to data security
Lecture 2: Theoretical basics about data and app security
Lecture 3: Data encription
Lecture 4: Using system mechanisms to protect data
Lecture 5: Securing applications with AppLocker
Lecture 6: Executable rules
Lecture 7: AppLocker in practice
Chapter 5: Monitoring security level
Lecture 1: What you should know about monitoring the security
Lecture 2: Lets start with Windows Server Update services
Lecture 3: Report viewer
Lecture 4: Active Directory
Lecture 5: Configuring advanced options
Chapter 6: Group policy managment
Lecture 1: Group Policies
Lecture 2: Linking the GPO
Lecture 3: Local administrators
Chapter 7: Certificates
Lecture 1: Certificates authority
Lecture 2: Using CA
Lecture 3: How to issue certificates automaticly
Chapter 8: Testing configuration
Lecture 1: How to check settings in real environment?
Lecture 2: CA website
Lecture 3: Attack Surface Analyzer
Lecture 4: Now its your turn. Thank you for taking part in our training.
Chapter 9: Rootkits and Stealth Apps: Creating and Revealing v2.0 course
Lecture 1: Writing a shellcode
Chapter 10: BONUS section – get your coupon code here
Lecture 1: Become CISS – Certified Ethical Hacking Training
Lecture 2: BONUS LECTURE: Learn more and get to know our other courses
Lecture 3: Thank you for joining
Instructors

IT Security Academy
IT Security Certified Professional

Hacking School
IT Security Experts – We turn beginners into professionals.
Rating Distribution
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
- Random Picks
- Popular
- Hot Reviews
- Print Magic- DIY Marketing Materials Mastery
- Shopify Theme Development- Create Shopify Themes [2023]
- Advanced Photoshop Manipulations Tutorials Bundle
- Life Insurance Annuity Ultimate Buyer’s Guide
- Crypto Trading Mastery (Scalping, Day trading, price action)
- The Beginner Forex Trading Playbook
- Dibuja y Esculpe tu COVID para Impresión 3d en Blender 2.8X
- Step-By-Step Stock Market Analysis and Real-Time Trades
- 1YouTube Masterclass The Best Guide to YouTube Success
- 2Photoshop CC- Adjustement Layers, Blending Modes Masks
- 3Personal Finance
- 4SolidWorks Essential Training ( 2023 2024 )
- 5The Architecture of Oscar Niemeyer
- 6Advanced Photoshop Manipulations Tutorials Bundle
- 7Polymer Clay Jewelry Making Techniques for Beginners
- 8ZB Trading Cryptocurrency Price Action Course
- 1Linux Performance Monitoring Analysis Hands On !!
- 2Content Writing Mastery 1- Content Writing For Beginners
- 3Media Training for PrintOnline Interviews-Get Great Quotes
- 4Learn Facebook Ads from Scratch Get more Leads and Sales
- 5The Complete Digital Marketing Course Learn From Scratch
- 6C#- Start programming with C# (for complete beginners)
- 7[FREE] How to code 10 times faster with Emmet
- 8Driving Results through Data Storytelling