home > training > BITLOCK: Planning and Deploying BitLocker Drive Encryption Training

76 Student Comments

BITLOCK: Planning and Deploying BitLocker Drive Encryption Training Course

BitLocker Drive Encryption Training


  • 2 Days
  • Helps achieve HIPAA compliance with laptops
  • Includes "BitLocker to Go" for USB
  • Helps achieve GDPR compliance
  • Exclusive course - taught by Mike Danseglio, creator of BitLocker!
  • Included in the "all-you-can-eat" Microsoft Live Training Subscription Learn More

Interface Gold™Gold Benefits: Retake this course for one year. Replay™ class recordings included. Money-back guarantee. Price Match available. MS SubscriptionIncluded in the "all-you-can-eat" Microsoft Live Training Subscription.

Dates Available
Class Time
to Run
Live Online
Rewatch with
May 22 - May 23
Replay™ AvailableThis class date includes Interface Replay™ class recordings, available for online viewing 1 hour after each class day ends.
7AM - 3PM (PHX)
This class date is Guaranteed to Run and will not change.
Guaranteed To Run
Attend Live Online
Rewatch with Replay™
Register today - no risk!  No cancellation fees.  Full money back guarantee!
BitLocker 2-Day Course at Interface Technical Training
  • This field is for validation purposes and should be left unchanged.

Course Description

This 2-day instructor-led BitLocker training course teaches you everything you need to know about BitLocker. This course includes hands-on labs. These labs reinforce and expand on the instructor-led portion by having you actually deploy and operate BitLocker. You’ll practice techniques for setting up a BitLocker-enabled environment, implementing BitLocker on multiple system configurations, and recovering BitLocker after the detection of a possible compromise.

Data security is an increasingly critical part of IT. More and more organizations require data encryption in order to meet regulatory security requirements. BitLocker Drive Encryption is a popular choice to meet these requirements. BitLocker is a highly effective and low-cost data encryption technology that’s built into Windows. But because of this strong protection, your organization must understand and carefully plan for BitLocker deployment to avoid data loss and system downtime.

Although the labs focus primarily on Windows 10 and Windows Server 2012, the class also applies to Windows 7, Windows 8, Windows Server 2008, and Windows Server 2016.


Understanding and Analyzing BitLocker

Analyzing BitLocker

  • Context and background
  • Understanding BitLocker
  • Understanding BitLocker to Go
  • Cryptography
  • Trusted Platform Module (TPM)


Understanding BitLocker

  • Pre-Boot Authentication
  • System Tamper Detection\
  • System Integrity Verification
  • Network Unlock
  • Encrypted Drive Support


BitLocker Architecture

  • BitLocker Initialization
  • BitLocker Operation
  • BitLocker Suspend and Resume
  • BitLocker to Go Architecture


Planning for BitLocker Deployment and Support

Planning BitLocker Deployment

  • Prerequisites
  • Examining Hardware Capabilities
  • Planning Configuration Options
  • Planning Recovery Options


IT Planning

  • Planning User Interaction Scenarios
  • Planning Recovery Key Access and Use
  • Planning BitLocker Deployment Through System Center Configuration Manager (SCCM)
  • Planning BitLocker Deployment Through Microsoft Deployment Toolkit (MDT)
  • Planning BitLocker Deployment Through Microsoft Baseline Administration and Monitoring (MBAM) and Microsoft Desktop Optimization Pack (MDOP)


User Planning

  • Identifying BitLocker Users and Devices
  • Educating BitLocker Users


Deploying BitLocker

Single Standalone Device

  • Configuring BitLocker Options
  • Enabling BitLocker
  • Encrypting the Drive
  • Verifying BitLocker Operation


Single Domain-Joined Device

  • Configuring BitLocker Options
  • Enabling BitLocker
  • Encrypting the Drive
  • Verifying BitLocker Operation


Multiple Devices

  • Deploying BitLocker Through Group Policy
  • Deploying BitLocker Through PowerShell
  • Deploying BitLocker Through SCCM, Altiris, and MBAM


Troubleshooting BitLocker Deployment and Operational Issues

  • Normal BitLocker Use
  • Suspending and Resuming BitLocker
  • BitLocker Recovery Mode
  • Recovering BitLocker Devices
  • Preventing BitLocker Recovery Mode
  • Managing the Trusted Platform Module (TPM)

Anyone involved in planning, deploying, or supporting BitLocker. This includes CISOs, IT architects, system administrators, server administrators, disaffected college students, and technical support engineers.


A strong understanding of Windows deployment and management in an enterprise environment is required. Familiarity with cryptography and data storage technology is highly recommended.

What You Will Learn

After completing this course, student will understand how to:

  • Plan for BitLocker deployment for both new and existing computers
  • Create a recovery plan for lost encryption keys
  • Identify computers that meet BitLocker hardware security requirements
  • Determine optimal settings for encryption and data recovery
  • Choose a strategy that minimizes BitLocker Recovery events
  • Select and implement a BitLocker deployment method
  • Implement an organization-wide or limited-scope BitLocker deployment
  • Plan BitLocker integration with Microsoft System Center Configuration Manager (SCCM), Active Directory Domain Services, and Microsoft BitLocker Administration and Monitoring (MBAM)
  • Support BitLocker systems in the field with minimal downtime
Student Comments (76)
Comments about the Courseware
"Great introduction for first time use of BitLocker."
April 19, 2022 | BITLOCK Student
Comments about the Instructor
"Mike is an amazing instructor - Not only does he know his material, he has personality and made the class fun, which doesn't happen very often in these types of settings. I would jump at the opportunity to take more classes led by him."
January 4, 2022 | BITLOCK Student
Comments about enhancing the Courseware
"I don't know that it would be necessary. There are enough topics and situations covered that explain the standard implementation, that any other optional uses such as deployment through SCCM are just another graphical representation of the same base coverage."
January 4, 2022 | BITLOCK Student
Comments about the Instructor
"havent had a 'class' in years. Mike was extremely enjoyable to have as an istructor. having real first hand knowledge to pass on is fantastic! not just reguritating some power point slides"
January 4, 2022 | BITLOCK Student
Comments about the Courseware
"i plan to look for more classes tuaght by Mike. this was a great session"
January 4, 2022 | BITLOCK Student
Load More Comments