What you will learn
Editing policies at both the host level as well as utilizing tools in Active Directory are covered and demonstrated to help keep your data safe, as well as any client data that the hosts may contain. Many different real world examples are presented as well as experiences from the presenter. See how your organization can benefit by protecting your Windows 10 computers from malware, wireless hacking, open firewall ports, browsing the web and much more.
Syllabus
Introduction and Overview of Windows 10 Host Security
Course — 00:12:05
K0060
An introduction on the Windows 10 operating system and a history of Windows security issues and features in Windows 10 that can protect your host.
Data Security
Course — 01:13:01
K0117, K0622, S0067
Data security in these videos is about protecting access from people who shouldn’t have access. NTFS security and share permissions are covered so you know how to properly share files and folders securely for your Windows hosts.
Authentication Mechanisms
Course — 00:37:19
K0065, K0336, K0452, K0608, S0067
There are policies in place to allow you to log into a computer and set the security to keep non-authorized personnel from accessing that data. These policies and procedures are demonstrated in this course.
Hardening Techniques
Course — 00:46:23
K0406, K0452, K0608, S0067, S0076, S0084, S0121
Learn how to update and patch your Windows 10 hosts both locally and through Active Directory automatically. You’ll also learn about firewalls and Windows Defender.
Local Group and Security Policy
Course — 00:16:58
K0065, K0608, S0043, S0067, S0121
Local policies drive security in Windows 10 in ways many don’t realize. Learn how to configure them in a few simple steps.
Web Browser Security
Course — 00:13:48
K0349, K0608, S0067
Browsing the web is one of the two biggest malware risks with Windows 10, with email being the second. Learn how to secure the Edge web browser in your Windows 10 hosts to keep malware away from your computer.
User Account Management
Course — 00:23:44
K0608, S0067, S0121
There are many types of accounts, but do you know the best policy for what type you should use when logging onto your Windows 10 host? In this course, we explain and demonstrate these features and options.
Application Management
Course — 00:30:21
K0480, K0608, K0610, S0067, S0121
Let’s talk about keeping your computer safe while loading applications is a safe way to operate your computer. Utilizing AppLocker, isolation and assigned access can help you do that. These concepts are discussed and demonstrated in this course.
Certificates
Course — 00:36:05
K0056, K0608, S0067, S0121, S0138
Why do we need certificates on our Windows 10 host? This course covers the many different reasons for and types of certificates, helping you understand how and why you need them.
Auditing Features
Course — 00:44:42
K0363, K0452, K0608, S0067
Windows logs tell us how our computer is doing and whether we should focus on any piece of hardware or software to fix an impending issue that could result in a breach.
Backup and Recovery
Course — 00:56:24
K0021, K0210, K0440, K0480, K0608, S0067
In case of disaster, encryption or other malady, you can use the different types of Windows backups to bring your data back as soon as possible to your Windows 10 hosts.
Wireless Security
Course — 00:35:26
K0071, K0104, K0375, K0428, K0452, K0608, S0067
More computers connect wirelessly to their corporate LAN and the internet than ever before. Learn about the different encryption types and the most secure way to connect.
Remote Access Security
Course — 00:23:56
K0071, K0104, K0247, K0375, K0608, S0067, S0267
Road warriors keep companies running by being able to sell anywhere. You need a secure platform from which to do this, and in this course we discuss and demonstrate these concepts.
Windows 10 Host Security Project
Project — 02:24:28
Practice your Windows 10 Host Security skills by solving challenges.
Windows 10 Host Security Skill Assessment
Assessment — 54 questions — 00:27:00

Meet the author
Professor Robert McMillen is a college instructor with over 50 technical certifications. He has an MBA and teaches Computer Science at Portland based colleges. Robert has earned multiple MCSEs and an MCT from Microsoft. He is the owner of Tech Publishing, a Portland-based network new media company. Robert has over 20 years of experience in network engineering and earned certifications from companies like Microsoft, Checkpoint, IBM, and Cisco. Some of his higher profile jobs have been restoring email for the government to prosecute Enron executives, training the network vulnerability assessment team for the U.S. Army, and relocating the Xbox world for Microsoft.
The details
Learning path insights

How to claim CPEs
Should you complete this learning path, you’ll be able to download a certificate of completion. Use this to claim your CPEs or CPUs.
Associated NICE Work Roles
All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.
- All-Source Analyst
- Mission Assessment Specialist
- Exploitation Analyst
No software. No set up. Unlimited access.
Skip the server racks and spin up a realistic environment with one click. Infosec Skills cyber ranges require no additional software, hardware or server space so your team can spend less time configuring environments and more time learning. Unlimited cyber range access is included in every lnfosec Skills subscription so your team can skill up however they learn best.

Plans & pricing
-
Infosec Skills Personal
- 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Custom certification practice exams (e.g., CISSP, Security+)
- Skill assessments
- Infosec peer community support
-
Infosec Skills Teams
- Team administration and reporting
- Dedicated client success manager
-
Single sign-on (SSO)
Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
-
Integrations via API
Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
- 190+ role-guided learning paths and assessments (e.g., Incident Response)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Create and assign custom learning paths
- Custom certification practice exams (e.g., CISSP, CISA)
- Optional upgrade: Guarantee team certification with live boot camps
Unlock 7 days of free training
- 1,400+ hands-on courses and labs
- Certification practice exams
- Skill assessments
You're in good company
We use Infosec Skills to provide continuous training to our technicians and to prepare them for various certifications. Infosec Skills allows us to create personalized training programs that focus on each of our technicians’ particular roles and see their progress as they take courses. We also, recommend it to clients to make their IT support teams better.
Caleb Yankus
This has been utilized to bridge the skills gap across our cyber team and to aid them as they prepare for their various certifications. It also has provided a nice learning foundation for our various cyber team members to utilize as we continue to find ways for cross-utilization with operations while minimizing the downtime needed to ensure everyone’s knowledge is the same.
Daniel Simpson
We use Infosec Skills to provide base level knowledge for employees. We also use the services to provide in depth learning for employees as they encounter new technologies. If an employee is is assigned to a new project, we can rely on Infosec Skills to provide a rapid concentrated learning environment. This rapid concentrated learning positions our employees for success.
Infosec Skills Teams client