INFORMIT logo
InformIT Home About InformIT Oracle Workforce Development Program Cisco Networking Academy Program Microsoft IT Training & Certification Other Intensive Training International IT Certifications
ABOUT
  Windows Essentials  
  SQL Server Administrator  
  Windows Server 2003  
   
  Office Power User  
  Office Specialist  
  MICROSOFT CERTIFICATION  
  MICROSOFT TRAINING & CERT.  
     
   
 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 
 
Designing Security for Microsoft Networks
 
Course 2830: 3 days; Instructor-led
Introduction

This instructor-led course provides students with the knowledge and skills to design a secure network infrastructure. Topics include assembling the design team, modeling threats, and analyzing security risks in order to meet business requirements for securing computers in a networked environment. The course encourages decision-making skills through an interactive tool that simulates real-life scenarios that the target audience may encounter. Students are given the task of collecting the information and sorting through the details to resolve the given security requirement.

To top of page

Course Objectives

After completing the course, students will be able to:

  • Plan a framework for network security.
  • Identify threats to network security.
  • Analyze security risks.
  • Design security for physical resources.
  • Design security for computers.
  • Design security for accounts.
  • Design security for authentication.
  • Design security for data.
  • Design security for data transmission.
  • Design security for network perimeters.
  • Design an incident response procedure.

To top of page

Microsoft Certified Professional Exams

This course will help the student prepare for the following Microsoft Certified Professional exam:

To top of page

Prerequisites

Before attending this course, students must have:

  • A strong familiarity with Microsoft Windows® 2000 core technologies.
  • A strong familiarity with Windows 2000 networking technologies and implementation
  • A strong familiarity with Windows 2000 directory services technologies and implementation

To top of page

Course Outline

Module 1: Introduction to Designing Security

This module describes the basic framework for designing network security and introduces key concepts used throughout the course. It also introduces an ongoing case study that is utilized in the labs.

  • Introduction to Designing Security for Microsoft Networks
  • Contoso Pharmaceuticals: A Case Study
Module 2: Creating a Plan for Network Security

This module discusses the importance of security policies and procedures in a security design. It also explains how a security design team must include representation from various members of your organization. After completing this module, you will be able use a framework for designing security and create a security design team.

  • Introduction to Security Policies
  • Defining a Process for Designing Network Security
  • Creating a Security Design Team
Module 3: Identifying Threats to Network Security

This module explains how to identify likely threats to a network and explains attacker motivations. After completing this module, you will be able to explain common threats and predict threats by using a threat model.

  • Introduction to Security Threats
  • Predicting Threats to Security
Module 4: Analyzing Security Risks

This module explains how to determine what resources in an organization require protection and how to categorize them in order to assign an appropriate level of protection. After completing this module, you will be able to apply a framework for planning risk management.

  • Introduction to Risk Management
  • Creating a Risk Management Plan
Module 5: Creating a Security Design for Physical Resources

This module describes threats and risks to physical resources in an organization, as well as how to secure facilities, computers, and hardware. After completing this module, you will be able to design security for physical resources.

  • Determining Threats and Analyzing Risks to Physical Resources
  • Designing Security for Physical Resources
Module 6: Creating a Security Design for Computers

This module explains how to determine threats and analyze risks to computers on your network. After completing this module, you will be able to design security for computers.

  • Determining Threats and Analyzing Risks to Computers
  • Designing Security for Computers
Module 7: Creating a Security Design for Accounts

This module describes the threats and risks to accounts in an organization. After completing this module, you will be able to design security for accounts.

  • Determining Threats and Analyzing Risks to Accounts
  • Designing Security for Accounts
Module 8: Creating a Security Design for Authentication

This module describes threats and risks to authentication. After completing this module, you will be able to design security for authentication.

  • Determining Threats and Analyzing Risks to Authentication
  • Designing Security for Authentication
Module 9: Creating a Security Design for Data

This module examines threats and risks to data. After completing this module, you will be able to design security for data.

  • Determining Threats and Analyzing Risks to Data
  • Designing Security for Data
Module 10: Creating a Security Design for Data Transmission

This module discusses threats and risks to data transmission. After completing this module, you will be able to design security for data transmission.

  • Determining Threats and Analyzing Risks to Data Transmission
  • Designing Security for Data Transmission
Module 11: Creating a Security Design for Network Perimeters

This module describes threats to the points where your network connects to other networks, such as the Internet. After completing this module, you will be able to design security for network perimeters.

  • Determining Threats and Analyzing Risks to Network Perimeters
  • Designing Security for Network Perimeters
Module 12: Designing Responses to Security Incidents

This module provides information about auditing and creating procedures to direct how you respond to security incidents. After completing this module, you will be able to design an audit policy and an incident response procedure.

  • Introduction to Auditing and Incident Response
  • Designing an Audit Policy
  • Designing an Incident Response Procedure
 
 
 

 
 


INFORMIT - Skill Development Center
Jl. Purnawarman 9c, Bandung 40117- Phone (022) 4224 168 / 4223 168
Fax. (022) 4231 168 - E-mail: info@informit.tc

 
  Home | About Us | Oracle | Cisco | Microsoft | Other Training | Certification | Training Calendar  
© 2006, InformIT Ganesa Pratama. All Right Reserved