Corporate HomeCorporate ProfileWorldwide OfficesSolutions At WorkEmployment  
LRS Education Services
LEARN  >  Find a Class  >  Class Summary

MS2810 - Fundamentals of Network Security

If you have any questions about registering for this class, please call (877) 832-0688 Ext. 1493 or email us at
This course provides students with the knowledge and skills to manage network security within an organization. Students who complete this course will be able to identify security threats and vulnerabilities and respond and recover from security incidents.
Click here for a printer-friendly version of this page.
Upcoming classes
Number Class Date Location Length Cost Sign up
MS2810 Sep 02, 2014 - Sep 05, 2014 Springfield 4 days $1995.00 Register
Contact us for additional availability.


Course MS2152, Implementing Microsoft Windows 2000 Professional and Server or equivalent experience; Course AT300, Network+ or equivalent experience
Detailed Class Syllabus

Articulating Security Threats and Vulnerabilities
  • Explaining how information is attacked

  • Assessing and articulating the impact of risks to information

  • Preparing to Secure Information
  • Identifying how information is secured

  • Resolving ethical dilemmas when sharing information

  • Implementing Secure Computing Baselines
  • Physically securing baselines

  • Recognizing and identifying threats to trusted computing bases

  • Establishing a secure baseline

  • Monitoring a secure baseline

  • Maintaining a secure baseline

  • Securing Information Using Authentication and Access Control
  • Using accounts for authentication and authorization

  • Implementing authentication

  • Implement an access control strategy

  • Using Cryptography to Secure Information
  • Introduction to cryptography

  • Assessing the strength of encryption methods

  • Using hash functions

  • Protecting information by using symmetric encryption

  • Protecting information by using asymmetric encryption

  • Using a PKI to Secure Information
  • Introduction to certificates

  • Explain the purpose of a PKI

  • Deploying and managing certificates

  • Securing Internet Applications and Components
  • Securing Web servers against common attacks

  • Securing databases against common threats

  • Configuring security for common Internet protocols

  • Configuring security for Web browsers

  • Implementing Security for E-Mail and Instant Messaging
  • Securing e-mail servers against common threats

  • Securing e-mail and instant messaging clients against common threats

  • Managing Security for Directory Services and DNS
  • Securing directory services against common threats

  • Securing DNS against common threats

  • Securing Data Transmission
  • Identifying threats to network devices

  • Implementing security for common data transmission

  • Implementing security for remote access

  • Implementing and Monitoring Security for Network Perimeters
  • Introduction to network perimeters

  • Implementing security on inbound and outbound traffic

  • Monitoring network traffic

  • Managing Operational Security
  • Identifying security policies and procedures

  • Educating users on security policies and procedures

  • Applying security policies to operational management

  • Preserving Business Continuity
  • Prepare to recover from disasters

  • Performing a secure backup and recovery

  • Responding to Security Incidents
  • Identifying and Responding to security threats

  • Investigating security incidents
    Microsoft Partner Gold LearningPrometricEC-Council