Planning and Deploying BitLocker Drive Encryption

Learn to securely deploy and manage BitLocker Drive Encryption in just two days, ideal for IT professionals seeking to enhance data security and regulatory compliance with hands-on lab experience.

Course Thumbnail

Essential Skills Gained

Checkmark

Plan BitLocker deployment strategies for organizational security.

Checkmark

Implement BitLocker across diverse system configurations.

Checkmark

Recover encrypted data successfully after security breaches.

Checkmark

Integrate BitLocker with Microsoft SCCM, Active Directory, and MBAM.

Format

  • Instructor-led
  • 2 days with lectures and hands-on labs.

Audience

  • CISOs
  • IT Architects
  • System Administrators
  • Technical Support Engineers

Description

This 2-day instructor-led course teaches you everything you need to know about BitLocker. This course includes hands-on labs. These labs reinforce and expand on the instructor-led portion by having you actually deploy and operate BitLocker. You’ll practice techniques for setting up a BitLocker-enabled environment, implementing BitLocker on multiple system configurations, and recovering BitLocker after the detection of a possible compromise. Data security is an increasingly critical part of IT. More and more organizations require data encryption in order to meet regulatory security requirements. BitLocker Drive Encryption is a popular choice to meet these requirements. BitLocker is a highly effective and low-cost data encryption technology that’s built into Windows. But because of this strong protection, your organization must understand and carefully plan for BitLocker deployment to avoid data loss and system downtime. Although the labs focus primarily on Windows 10 and Windows Server 2012, the class also applies to Windows 7, Windows 8, Windows Server 2008, and Windows Server 2016.

Calendar icon

Upcoming Course Dates

July 16-17, 2025

7:00 AM - 3:00 PM

Virtual: Online - America/Los_Angeles

Enroll

$1595

September 24-25, 2025

7:00 AM - 3:00 PM

Virtual: Online - America/Los_Angeles

Enroll

$1595

November 12-13, 2025

8:00 AM - 4:00 PM

Virtual: Online - America/Denver

Enroll

$1595

Course Outline

Download PDF

Understanding and Analyzing BitLocker

  1. Context and background

  2. Understanding BitLocker

  3. Understanding BitLocker to Go

  4. Cryptography

  5. Trusted Platform Module (TPM)

Understanding BitLocker

  1. Pre-Boot Authentication

  2. System Tamper Detection

  3. System Integrity Verification

  4. Network Unlock

  5. Encrypted Drive Support

BitLocker Architecture

  1. BitLocker Initialization

  2. BitLocker Operation

  3. BitLocker Suspend and Resume

  4. BitLocker to Go Architecture

Planning for BitLocker Deployment and Support

  1. Prerequisites

  2. Examining Hardware Capabilities

  3. Planning Configuration Options

  4. Planning Recovery Options

IT Planning

  1. Planning User Interaction Scenarios

  2. Planning Recovery Key Access and Use

  3. Planning BitLocker Deployment Through System Center Configuration Manager (SCCM)

  4. Planning BitLocker Deployment Through Microsoft Deployment Toolkit (MDT)

  5. Planning BitLocker Deployment Through Microsoft Baseline Administration and Monitoring (MBAM) and Microsoft Desktop Optimization Pack (MDOP)

User Planning

  1. Identifying BitLocker Users and Devices

  2. Educating BitLocker Users

Deploying BitLocker

  1. Configuring BitLocker Options

  2. Enabling BitLocker

  3. Encrypting the Drive

  4. Verifying BitLocker Operation

  5. Configuring BitLocker Options

  6. Enabling BitLocker

  7. Encrypting the Drive

  8. Verifying BitLocker Operation

Multiple Devices

  1. Deploying BitLocker Through Group Policy

  2. Deploying BitLocker Through PowerShell

  3. Deploying BitLocker Through SCCM, Altiris, and MBAM

Troubleshooting BitLocker Deployment and Operational Issues

  1. Normal BitLocker Use

  2. Suspending and Resuming BitLocker

  3. BitLocker Recovery Mode

  4. Recovering BitLocker Devices

  5. Preventing BitLocker Recovery Mode

  6. Managing the Trusted Platform Module (TPM)

Your Team has Unique Training Needs.

Your team deserves training as unique as they are.

Let us tailor the course to your needs at no extra cost.