Learn how to track system intruders with honeypots and resource-integrity tools. Honeypots can lure attackers so that you can study their methods of operation, and resource-integrity tools can alert you to changes in files or other system resources.
Thursdays, October 8th to December 17th
11am, 1pm, and 3pm Eastern Time
John will cover topics including:
* Deploying, Managing, and Maintaining Windows * Key Features of Active Directory from Windows 2000 to Windows Server 2012 R2 PLUS Windows Server 2016 * Windows Server 2012 and 2012 R2 Hyper-V and Complementary Features * Key elements of Microsoft System Center 2012 and System Center 2012 R2 and major changes in the 2016 wave * Deploying, Migrating to, and Managing Hyper-V in Your Organization * Implementing a Private Cloud * Using PowerShell to Automate Common tasks * And much more!