Securing Windows Server 2016

This course validates that you have the skills needed to move your company to the cloud, increase
user productivity and flexibility, reduce data loss, and improve data security for your organization.

Candidates for this exam secure Windows Server 2016 environments. Candidates are familiar with the methods and technologies used to harden server environments and secure virtual machine infrastructures using Shielded and encryption-supported virtual machines and Guarded Fabric.

Candidates manage the protection of Active Directory and Identity infrastructures and manage privileged identities using Just in Time (JIT) and Just Enough Administration (JEA) approaches, as well as implement Privileged Access Workstations (PAWs) and secure servers using the Local Administrator Password Solution (LAPS).

Candidates should also be able to use threat detection solutions such as auditing access, implementing Advanced Threat Analytics (ATA), deploying Operations Management Suite (OMS) solutions, and identifying solutions for specific workloads.


Duration

The duration of the program is three months. The ACE College for Women will conduct terminal examinations on completion of the course.


Class Timings

Classes are held from Monday to Saturday (6 days a week) between 07:30 a.m. to 03:30 p.m. to utilize the best timings of at-least four hours daily.


Student Assessment

Besides regular class tests, three internal/house examinations are conducted to fully prepare students for the final examination.


Eligibility Criteria

Intermediate or equivalent degree with a minimum of 50% marks from an accredited institution.


Course Fee

Admission Fee 15000
Tuition Fee 50000


Award of Certificate

Course Certificates would be awarded by The ACE College for Women to the successfull candidates.


Cancellation / Refund

In case a student leaves the college or applies for admission cancellation then the college shall not refund any paid amount.


Skills measured

   •   Implement Server Hardening Solutions (25-30%)
   •   Secure a Virtualization Infrastructure (5-10%)
   •   Secure a Network Infrastructure (10-15%)
   •   Manage Privileged Identities (25-30%)
   •   Implement Threat Detection Solutions (15-20%)
   •   Implement Workload-Specific Security (5-10%)