Contrary to popular belief, the lack of disclosure details does not prevent the creation of exploits in no time flat. About 24 hours ago Microsoft released security bulletins regarding many vulnerabilities that can lead to remote execution of code or denial of service attacks. As expected exploits have been published that take advantage of some of those problems. Undoubtedly other exploits will appear soon that take advantage of many of the other problems. If you haven't loaded the necessary patches yet then you might consider doing as fast as possible before unscrupulous individuals unleash their "sploit-o-matic" tools against unprotected systems.
John Savill provides 12 hours of detailed instruction covering all the key aspects of a Hyper-V based virtualization environment covering both capabilities in Windows Server 2012 R2 and Windows Server 2016. John will walk attendees through resource allocation and architecture, storage, networking (including Network Virtualization), clustering, migration technologies, replication, private cloud, session virtualization, migration from other technologies, integration with Microsoft Azure, and more. At the end of this class, attendees will be able to architect and manage an enterprise-level Hyper-V environment.