Corporate HomeCorporate ProfileWorldwide OfficesSolutions At WorkEmployment  
LRS Education Services
LEARN  >  Find a Class  >  Class Summary

MS2830 - Designing Security for Microsoft Networks

If you have any questions about registering for this class, please call (877) 832-0688 Ext. 1493 or email us at getsmart@LRS.com
This course provides students with the knowledge and skills to design a secure network for computers running Microsoft operating systems. The course emphasizes the design aspects of security including threat identification and risk assessment. It also provides best practices and guidelines for developing and verifying effective security policies and procedures.
Click here for a printer-friendly version of this page.
 
This course has not been scheduled yet. Please contact us by clicking the link below to learn about availability.
Contact us for additional availability.
This class is available as a self-learning class also. Please contact LRS Education for more information about E-Learning.

Prerequisites

Course MS2153, Implementing a Microsoft Windows 2000 Network Infrastructure and course MS2154, Implementing and Administering Microsoft Windows 2000 Directory Services or equivalent experience
 
Detailed Class Syllabus


Module 1: Introduction to Designing Security
  • Introduction to Designing Security for Microsoft Networks

  • Contoso Pharmaceuticals: A Case Study


  • Module 2: Creating a Plan for Network Security
  • Introduction to Security Policies

  • Defining a Process for Designing Network Security

  • Creating a Security Design Team


  • Module 3: Identifying Threats to Network Security
  • Introduction to Security Threats

  • Predicting Threats to Security


  • Module 4: Analyzing Security Risks
  • Introduction to Risk Management

  • Creating a Risk Management Plan


  • Module 5: Creating a Security Design for Physical Resources
  • Determining Threats and Analyzing Risks to Physical Resources

  • Designing Security for Physical Resources


  • Module 6: Creating a Security Design for Computers
  • Determining Threats and Analyzing Risks to Computers

  • Designing Security for Computers


  • Module 7: Creating a Security Design for Accounts
  • Determining Threats and Analyzing Risks to Accounts

  • Designing Security for Accounts


  • Module 8: Creating a Security Design for Authentication
  • Determining Threats and Analyzing Risks to Authentication

  • Designing Security for Authentication


  • Module 9: Creating a Security Design for Data
  • Determining Threats and Analyzing Risks to Data

  • Designing Security for Data


  • Module 10: Creating a Security Design for Data Transmission
  • Determining Threats and Analyzing Risks to Data Transmission

  • Designing Security for Data Transmission


  • Module 11: Creating a Security Design for Network Perimeters
  • Determining Threats and Analyzing Risks to Network Perimeters

  • Designing Security for Network Perimeters


  • Module 12: Designing Responses to Security Incidents
  • Introduction to Auditing and Incident Response

  • Designing an Audit Policy

  • Designing an Incident Response Procedure


  • Appendix A: Designing an Acceptable Use Policy
  • Analyzing Risks That Users Introduce

  • Designing Security for Computer Use


  • Appendix B: Designing Policies for Managing Networks
  • Analyzing Risks to Managing Networks

  • Designing Security for Managing Networks


  • Appendix C: Designing an Operations Framework to Manage Security
  • Analyzing Risks to Ongoing Network Operations

  • Designing a Framework for Ongoing Network Operations
  •  
    Microsoft Partner Gold LearningPrometricEC-Council