Planning and Deploying BitLocker Drive Encryption
This 2-day instructor-led course teaches you everything you need to know about BitLocker. This course includes hands-on labs. These labs reinforce and expand on the instructor-led portion by having you actually deploy and operate BitLocker. You’ll practice techniques for setting up a BitLocker-enabled environment, implementing BitLocker on multiple system configurations, and recovering BitLocker after the detection of a possible compromise.
Data security is an increasingly critical part of IT. More and more organizations require data encryption in order to meet regulatory security requirements. BitLocker Drive Encryption is a popular choice to meet these requirements. BitLocker is a highly effective and low-cost data encryption technology that’s built into Windows. But because of this strong protection, your organization must understand and carefully plan for BitLocker deployment to avoid data loss and system downtime.
Although the labs focus primarily on Windows 10 and Windows Server 2012, the class also applies to Windows 7, Windows 8, Windows Server 2008, and Windows Server 2016.
After completing this course, student will understand how to:
- Plan for BitLocker deployment for both new and existing computers
- Create a recovery plan for lost encryption keys
- Identify computers that meet BitLocker hardware security requirements
- Determine optimal settings for encryption and data recovery
- Choose a strategy that minimizes BitLocker Recovery events
- Select and implement a BitLocker deployment method
- Implement an organization-wide or limited-scope BitLocker deployment
- Plan BitLocker integration with Microsoft System Center Configuration Manager (SCCM), Active Directory Domain Services, and Microsoft BitLocker Administration and Monitoring (MBAM)
- Support BitLocker systems in the field with minimal downtime
Anyone involved in planning, deploying, or supporting BitLocker. This includes CISOs, IT architects, system administrators, server administrators, disaffected college students, and technical support engineers.
A strong understanding of Windows deployment and management in an enterprise environment is required. Familiarity with cryptography and data storage technology is highly recommended.