• Technical IT

    Solutions delivered throughout the UK
  • Business Applications

    Solutions delivered throughout the UK
  • Professional Best Practice

    Solutions delivered throughout the UK
  • Professional Development

    Solutions delivered throughout the UK

2830 - Designing Security for Microsoft Networks Maidenhead

  • Price £875.00
  • Duration 3 day(s)
All major credit cards accepted

Description

This three-day, instructor-led course provides you with the knowledge and skills to design a secure network infrastructure. Topics include assembling the design team, modelling threats, and analysing security risks in order to meet business requirements for securing computers in a networked environment. The course encourages decision-making skills through an interactive tool that simulates real-life scenarios that the target audience may encounter. You are given the task of collecting the information and sorting through the details to resolve the given security requirement.

Prerequisites

Before attending this course, students must have:

A strong familiarity with Windows Server 2003 core technologies, such as those covered in Microsoft Official Curriculum (MOC) Course 2273: Managing and Maintaining a Microsoft Windows Server 2003 Environment.

A strong familiarity with Windows Server 2003 networking technologies and implementation, such as those covered in: MOC Course 2276: Implementing a Microsoft Windows Server 2003 Network Infrastructure: Network Hosts, and MOC Course 2277: Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services, and MOC Course 2278: Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure.

A strong familiarity with Windows Server 2003 directory services technologies and implementation, such as those covered in MOC Course 2279: Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure

Skills

Plan a framework for network security.
Identify threats to network security.
Analyze security risks.
Design security for physical resources.
Design security for computers.
Design security for accounts and services.
Design security for authentication.
Design security for data.
Design security for data transmission.
Design security for network perimeters.
Design an incident response procedure.
 

In addition, this course contains three teachable appendices that cover:

Designing an acceptable use policy.
Designing policies for managing networks.
Designing an operations framework for managing security.

Leads to examination:

70-298 – Designing Security for a Microsoft Windows Server 2003 Network

Course Content

Module 1: Introduction to Designing Security

Introduction to Designing Security for Microsoft Networks
Contoso Pharmaceuticals: A Case Study
 

Module 2: Creating a Plan for Network Security

Introduction to Security Policies
Defining a Process for Designing Network Security
Creating a Security Design Team
 

Module 3: Identifying Threats to Network Security

Introduction to Security Threats
Predicting Threats to Security
 

Module 4: Analyzing Security Risks

Introduction to Risk Management
Creating a Risk Management Plan
 

Module 5: Designing Physical Security for Network Resources

Determining Threats and Analyzing Risks to Physical Resources
Designing Security for Physical Resources
 

Module 6: Creating a Security Design for Computers

Determining Threats and Analyzing Risks to Computers
Designing Security for Computers
 

Module 7: Creating a Security Design for Accounts

Determining Threats and Analyzing Risks to Accounts
Designing Security for Accounts
 

Module 8: Creating a Security Design for Authentication

Determining Threats and Analyzing Risks to Authentication
Designing Security for Authentication
 

Module 9: Creating a Security Design for Data

Determining Threats and Analyzing Risks to Data
Designing Security for Data
 

Module 10: Creating a Security Design for Data Transmission

Determining Threats and Analyzing Risks to Data Transmission
Designing Security for Data Transmission
 

Module 11: Creating a Security Design for Network Perimeters

Determining Threats and Analyzing Risks to Network Perimeters
Designing Security for Network Perimeters
 

Module 12: Designing Responses to Security Incidents

Introduction to Auditing and Incident Response
Designing an Audit Policy
Designing an Incident Response Procedure
 

Make Enquiry

Course Enquiry
  •  
  •  

Book Now

Course Enquiry
  •  
  •  

Find your local training centre

Address4 Cordwallis Park
Cookham Road
Maidenhead
SL6 7BZ
Phone01423 790107