Learn to securely deploy and manage BitLocker Drive Encryption in just two days, ideal for IT professionals seeking to enhance data security and regulatory compliance with hands-on lab experience.
EnrollPlan BitLocker deployment strategies for organizational security.
Implement BitLocker across diverse system configurations.
Recover encrypted data successfully after security breaches.
Integrate BitLocker with Microsoft SCCM, Active Directory, and MBAM.
This 2-day instructor-led course teaches you everything you need to know about BitLocker. This course includes hands-on labs. These labs reinforce and expand on the instructor-led portion by having you actually deploy and operate BitLocker. You’ll practice techniques for setting up a BitLocker-enabled environment, implementing BitLocker on multiple system configurations, and recovering BitLocker after the detection of a possible compromise. Data security is an increasingly critical part of IT. More and more organizations require data encryption in order to meet regulatory security requirements. BitLocker Drive Encryption is a popular choice to meet these requirements. BitLocker is a highly effective and low-cost data encryption technology that’s built into Windows. But because of this strong protection, your organization must understand and carefully plan for BitLocker deployment to avoid data loss and system downtime. Although the labs focus primarily on Windows 10 and Windows Server 2012, the class also applies to Windows 7, Windows 8, Windows Server 2008, and Windows Server 2016.
Context and background
Understanding BitLocker
Understanding BitLocker to Go
Cryptography
Trusted Platform Module (TPM)
Pre-Boot Authentication
System Tamper Detection
System Integrity Verification
Network Unlock
Encrypted Drive Support
BitLocker Initialization
BitLocker Operation
BitLocker Suspend and Resume
BitLocker to Go Architecture
Prerequisites
Examining Hardware Capabilities
Planning Configuration Options
Planning Recovery Options
Planning User Interaction Scenarios
Planning Recovery Key Access and Use
Planning BitLocker Deployment Through System Center Configuration Manager (SCCM)
Planning BitLocker Deployment Through Microsoft Deployment Toolkit (MDT)
Planning BitLocker Deployment Through Microsoft Baseline Administration and Monitoring (MBAM) and Microsoft Desktop Optimization Pack (MDOP)
Identifying BitLocker Users and Devices
Educating BitLocker Users
Configuring BitLocker Options
Enabling BitLocker
Encrypting the Drive
Verifying BitLocker Operation
Configuring BitLocker Options
Enabling BitLocker
Encrypting the Drive
Verifying BitLocker Operation
Deploying BitLocker Through Group Policy
Deploying BitLocker Through PowerShell
Deploying BitLocker Through SCCM, Altiris, and MBAM
Normal BitLocker Use
Suspending and Resuming BitLocker
BitLocker Recovery Mode
Recovering BitLocker Devices
Preventing BitLocker Recovery Mode
Managing the Trusted Platform Module (TPM)
Your team deserves training as unique as they are.
Let us tailor the course to your needs at no extra cost.
Trusted by Engineers at:
and more...
Aaron Steele
Casey Pense
Chris Tsantiris
Javier Martin
Justin Gilley
Kathy Le
Kelson Smith
Oussama Azzam
Pascal Rodmacq
Randall Granier
Aaron Steele
Casey Pense
Chris Tsantiris
Javier Martin
Justin Gilley
Kathy Le
Kelson Smith
Oussama Azzam
Pascal Rodmacq
Randall Granier