inflearn logo

Major Information and Communication Infrastructure Windows Server Risk Assessment Strategy

Conducting Windows server competency training to break the trend of new and career-transitioning security consultants focusing solely on Linux servers. Understanding the Windows OS and its relationship with servers and programs installed on the OS, such as PC, WEB, WAS, and DBMS. Understanding vulnerabilities and continuing vulnerability assessment and improvement activities.

1 learners are taking this course

Level Intermediate

Course period 6 months

security training
security training
Engineer information security
Engineer information security
Industrial Security Exper
Industrial Security Exper
ISMS-P
ISMS-P
CPPG
CPPG
security training
security training
Engineer information security
Engineer information security
Industrial Security Exper
Industrial Security Exper
ISMS-P
ISMS-P
CPPG
CPPG

What you will gain after the course

  • Server Vulnerability Assessment (including Windows Server)

  • Understanding Critical Information and Communication Infrastructure

🚀 PM Project Management Capability Enhancement Training – Mastering Practical Vulnerability Assessment for Major Information Systems (Windows Server)

💡 “Have you ever properly learned how to perform Windows server inspections?”
In a reality where most security personnel gain experience primarily focused on Linux,
Windows server security inspection capabilities actually become a point of differentiation.
In this lecture, we will perfectly organize Windows server inspections based on Critical Information and Communication Infrastructure (CICI) standards
from a practical perspective.


📌 I highly recommend this course to the following people!

👶 New Security Personnel – Those who lack experience in Windows server inspection
📊 Junior/Senior Practitioners – Those who want to expand their scope after only working with Linux
🧑‍💻 Infrastructure PL / PM – Those who need to manage various assets in an integrated manner
🛡️ Security Consultants – Those who want to strengthen their public sector and ISMS-P response capabilities


🔥 Core Lecture Curriculum

🧩 1. Complete Understanding of the Inspection Structure for Critical Information and Communication Infrastructure Windows Servers

  • Inspection framework based on the protection measures for Critical Information and Communications Infrastructure

  • Understanding the specific characteristics of Windows within a Linux-centered structure

  • Reasons why Windows servers are rare in actual projects and corresponding response strategies


🔐 2. Key Account and Access Control Inspection

👤 Account Security Management

  • Rename Administrator account

  • Disable Guest account

  • Remove unnecessary accounts

🔑 Access Control

  • Removal of shared folders and restriction of access

  • Disable unused network interfaces

  • Control of administrator privileges and restriction of formatting permissions


📂 3. Registry-Based Security Audit (Core!)

🧠 The core of Windows is the Registry.

  • Checking Key Registry Security Settings

  • Verification of policy-based security settings

  • Complete summary of inspection points that differentiate it from other OSs

👉 “If you understand the registry, you can see Windows security”


🚫 4. Service and Vulnerability Assessment

📡 Blocking Unnecessary Services

  • Disable FTP, Telnet, SNMP, and DNS

  • Remove unnecessary scheduled tasks

🛡️ Security Settings

  • Apply the latest service packs and hotfixes

  • Security Patch Management Standards

📊 Specialized Inspection

  • Inspection of Windows-specific items such as MSSQL and ODBC

  • Check vaccine (V3) and policy application status


⚙️ 5. Operation and Security Management System

📅 Policy Management

  • Regular review of security policies and reporting system

  • Log Access Control Management

🔒 Physical Security

  • Server physical access control standards

🌐 Network Integration

  • Integration with DDoS response equipment

  • NTFS File System Management


🔍 6. Practical Inspection Strategy (Important!)

📌 Realistic Problems

  • Most organizations focus their inspections on Linux.

  • Lack of experience with Windows servers

📌 Problems

  • Lack of ability to inspect various assets such as PCs, DBs, WEB, and security equipment

  • Workforce structure biased toward specific assets

📌 Solution
👉 Essential to expand learning to include Windows servers
👉 Gain experience in inspecting various assets


📊 7. Expanding to a Project Management (PM) Perspective

📅 Inspection personnel deployment strategy
📄 How to write ISMS-P and Major Information Communication Infrastructure reports
📈 Risk assessment and establishment of improvement measures
🧠 How to integratedly manage various asset inspections


🎯 What you will gain from this course

✅ Perfect understanding of Windows server vulnerability assessment standards
✅ Acquisition of registry-based security inspection capabilities
✅ Expansion of inspection capabilities for various assets beyond Linux
✅ Strengthening response capabilities for public sector and ISMS-P
✅ Acquisition of checklists that can be used immediately in practice


👨‍🏫 Lecture Differentiation Points
📚 Practical-focused, field-based education
🛠️ Delivery of know-how based on actual project experience


💬 Key One-Line Summary
👉 “A lecture that turns Windows server inspection from a ‘blind spot’ into a ‘core competitive advantage’”


⚠️ Important Point!

📢 Windows servers are few, but that's why they are more important
📢 Because few people know how to handle this area, it becomes a competitive advantage
📢 If you prepare now, you can achieve clear differentiation


Start now!
If you want to take your security skills to the next level,
you must expand your expertise to Windows servers.
This course is the beginning. 🚀

Recommended for
these people

Who is this course right for?

  • Entry-level Security Consultant

  • Experienced Security Consultant

Need to know before starting?

  • Experienced in Critical Information and Communications Infrastructure

  • Experienced in Windows Server maintenance

Hello
This is jueygrace

233

Learners

19

Reviews

4.1

Rating

34

Courses

Security Consulting

Curriculum

All

3 lectures ∙ (7min)

Published: 
Last updated: 

Reviews

Not enough reviews.
Please write a valuable review that helps everyone!

jueygrace's other courses

Check out other courses by the instructor!

Similar courses

Explore other courses in the same field!

Limited time deal

$15,400.00

30%

$17.60