This five-day course will provide you with the knowledge and skills required to enhance the security of the IT infrastructure that you administer in Windows Server 2022, how to protect administrative credentials and rights to ensure that administrators can perform only the tasks that they need to.

This course also details how you can mitigate malware threats; identify security issues by using auditing and the Advanced Threat Analysis feature.

The course also explains how you can help secure file access by using encryption and dynamic access control, and how you can enhance your network’s security.

This course also provides students with the fundamental knowledge and skills to configure and manage Internet Information Services.

This course is intended to help provide pre-requisite skills supporting a broad range of Internet web applications, security, and knowledge to help support other products that use IIS. In keeping with that goal, this course will not focus on any particular web application or development practice.


This course is for IT professionals who need to administer Windows Server 2022 networks securely. These professionals typically work with networks that are configured as Windows Server domain-based environments, with managed access to the Internet and cloud services. No prior experience with any version of Internet Information Services is assumed

Candidates suitable for this course would be:

  • Network administrators who are relatively new to Windows Server security and related technologies, and who want to learn more about the security capabilities in Windows Server 2022.
  • This course is also suitable for understanding Windows Server 2016 and Windows Server 2019.
  • Administrators and developers that have little or no previous experience administering Microsoft Internet Information Services.
  • The course is not focused on web application development, although it does provide introductory material to configure Microsoft Internet Information Services for most common web applications.
  • The course focuses primarily on installing, configuring and securing Microsoft Internet Information Services.

Read more +


Before attending this course, students must have:

Experience working in a Windows Sever infrastructure enterprise environment.

Experience with Windows Server administration, maintenance, and troubleshooting.

A solid, practical understanding of networking fundamentals, including TCP/IP, User Datagram Protocol (UDP), and Domain Name System (DNS).

A solid, practical understanding of the principles of Active Directory Domain Services (AD DS)

A solid, practical understanding of Microsoft Hyper-V virtualisation fundamentals.

An understanding of Windows Server security principles.

Additionally, students would benefit from having some previous Windows Server operating system experience, such as experience as a Windows Server systems administrator. An understanding of Windows PowerShell would be advantageous.

Read more +

Delegates will learn how to

  • Secure Windows Server.
  • Secure application development and a server-workload infrastructure.
  • Manage security baselines.
  • Configure and manage just enough administration.
  • Manage data security.
  • Manage malware and threats.
  • Configure advanced auditing.
  • Optimize file services by configuring File Server Resource Manager (FSRM) and Distributed File System (DFS).
  • Manage threats by using Advanced Threat Analytics (ATA) and Microsoft Operations Management Suite.
  • Install IIS
  • Configure the default web site
  • Configure and manage application pools
  • Create additional web sites
  • Secure web sites and applications
  • Manage certificates in the Centralized Certificate Store
  • Backup and restore IIS
Read more +


Module 1: Protecting credentials and privileged access

Explains how you can configure user rights and security options, protect credentials by using Windows Defender Credential Guard, implement privileged-access workstations, and manage and deploy a local administrator-password solution that you can use to manage passwords for local administrator accounts

Module 2: Advanced auditing and log analytics

Explains how to use advanced auditing and Windows PowerShell transcripts.

Module 3: Securing workloads

Describes the Microsoft Advanced Threat Analytics tool and explains the Security Compliance Toolkit (SCT), including how you can use it to configure, manage, and deploy baselines. Additionally, students will learn how to deploy and configure Hyper-V and Windows Server containers.

Module 4: Planning and protecting data

Explains how to configure Encrypting File System (EFS) and BitLocker drive encryption to protect data at rest. Students will also learn how to extend protection into the cloud by using Microsoft Azure Information Protection.

Module 5: Optimizing and securing file services

Explains how to optimise file services by configuring File Server Resource Manager (FSRM) and Distributed File System (DFS). Students will learn how to protect a device’s data by using encryption or BitLocker. Students also will learn how to manage access to shared files by configuring Dynamic Access Control (DAC).

Module 6: Just Enough Administration

Explains how to deploy and configure the Just Enough Administration (JEA) feature.

Module 7: Understanding and Installing Internet Information Services

Provides a basic overview about the network infrastructure planning and common concerns with implementing a web server. This module teaches students to perform an installation of IIS and verify the working web server by testing the default created website. The ability to install components and test functionality when needed will be continually reinforced throughout the course

Module 8: Configuring the Default Website

Describes how to plan and implement network requirements for a public website. Students will configure DNS records to support access to internal and public websites and create virtual directories and application folders for additional website content. These concepts will be built upon in future modules and students begin to work with different bindings for both internal and external websites and web applications.

Module 9: Configuring and Managing Application Pools

Provides students with the details and the benefits to the application pool architecture. Students will create and configure application pools to support additional applications and configure application pool recycle settings. This module teaches students to perform recycle events and examine the event logs for recycle events

Module 10: Creating Additional Websites

Introduces students to the process on how to examine existing website bindings to determine and resolve naming conflicts. This module teaches students to create new websites using unique bindings and avoiding naming conflicts.

Module 11: Securing Websites and Applications

Introduces students to secure internal and public websites for users and groups by using the built-in Anonymous, Windows and Basic authentication. This module also teaches students to configure file system permissions for specific users and groups and secure a website using URL Authorization Rules.

Module 12: Managing Certificates in the Centralised Store

Describes how to install and configure the Microsoft Internet Information Service feature Central Certificate Store to enable centralized and improved certificate management. This module will teach students to configure a website to use a secured binding with the Central Certificate Store and explore the benefits to centralized certificate management. Students will also learn to properly name certificates for the store

Module 13: Backing Up and Restoring IIS

Focuses on the concepts of recovering a website and web server from failure. This module teaches students how to manage, backup and recover the configuration files, along with requirements for recovering content and certificates.

Read more +

Why choose QA

Dates & Locations

Need to know

Frequently asked questions

How can I create an account on myQA.com?

There are a number of ways to create an account. If you are a self-funder, simply select the "Create account" option on the login page.

If you have been booked onto a course by your company, you will receive a confirmation email. From this email, select "Sign into myQA" and you will be taken to the "Create account" page. Complete all of the details and select "Create account".

If you have the booking number you can also go here and select the "I have a booking number" option. Enter the booking reference and your surname. If the details match, you will be taken to the "Create account" page from where you can enter your details and confirm your account.

Find more answers to frequently asked questions in our FAQs: Bookings & Cancellations page.

How do QA’s virtual classroom courses work?

Our virtual classroom courses allow you to access award-winning classroom training, without leaving your home or office. Our learning professionals are specially trained on how to interact with remote attendees and our remote labs ensure all participants can take part in hands-on exercises wherever they are.

We use the WebEx video conferencing platform by Cisco. Before you book, check that you meet the WebEx system requirements and run a test meeting (more details in the link below) to ensure the software is compatible with your firewall settings. If it doesn’t work, try adjusting your settings or contact your IT department about permitting the website.

How do QA’s online courses work?

QA online courses, also commonly known as distance learning courses or elearning courses, take the form of interactive software designed for individual learning, but you will also have access to full support from our subject-matter experts for the duration of your course. When you book a QA online learning course you will receive immediate access to it through our e-learning platform and you can start to learn straight away, from any compatible device. Access to the online learning platform is valid for one year from the booking date.

All courses are built around case studies and presented in an engaging format, which includes storytelling elements, video, audio and humour. Every case study is supported by sample documents and a collection of Knowledge Nuggets that provide more in-depth detail on the wider processes.

When will I receive my joining instructions?

Joining instructions for QA courses are sent two weeks prior to the course start date, or immediately if the booking is confirmed within this timeframe. For course bookings made via QA but delivered by a third-party supplier, joining instructions are sent to attendees prior to the training course, but timescales vary depending on each supplier’s terms. Read more FAQs.

When will I receive my certificate?

Certificates of Achievement are issued at the end the course, either as a hard copy or via email. Read more here.

Let's talk

By submitting this form, you agree to QA processing your data in accordance with our Privacy Policy and Terms & Conditions. You can unsubscribe at any time by clicking the link in our emails or contacting us directly.