iSelfSchooling.com  Since 1999     References  |  Search more  | Oracle Syntax  | Free Online Oracle Training

    Home      .Services     Login       Start Learning     Certification      .                 .Share your BELIEF(s)...

 

. Online Accounting        .Copyright & User Agreement   |
    .Vision      .Biography     .Acknowledgement

.Contact Us      .Comments/Suggestions       Email2aFriend    |

 

 

Designing Security for Microsoft Networks

 

 

More Resources by Google:

 

Designing Security for Microsoft Networks

Course No. 
Course Length: 

2830
2 days

Introduction
This two-day, instructor-led course provides you with the knowledge and skills to design a secure network infrastructure. Topics include assembling the design team, modeling threats, and analyzing security risks in order to meet business requirements for securing computers in a networked environment. The course encourages decision-making skills through an interactive tool that simulates real-life scenarios that the target audience may encounter. You are given the task of collecting the information and sorting through the details to resolve the given security requirement.

At Course Completion 
After completing this course, you will be able to:

  • Plan a framework for network security.

  • Identify threats to network security.

  • Analyze security risks.

  • Design security for physical resources.

  • Design security for computers.

  • Design security for accounts.

  • Design security for authentication.

  • Design security for data.

  • Design security for data transmission.

  • Design security for network perimeters.

  • Design an incident response procedure.


Course Outline

Module 1: Introduction to Designing Security

Topics:  

  • Introduction to Designing Security for Microsoft Networks

  • Contoso Pharmaceuticals: A Case Study

Module 2:  Creating a Plan for Network Security

Topics:  

  • Introduction to Security Policies

  • Defining a Process for Designing Network Security

  • Creating a Security Design Team

Lab:  

Skills:  
After completing this module, you will be able to:

  • Describe common elements of security policies and procedures.

  • Create a security design framework by using the Microsoft Solutions Framework (MSF) process model.

  • Create a security design team.

 

Module 3: Identifying Threats to Network Security

Topics:  

  • Introduction to Security Threats

  • Predicting Threats to Security

Lab:  

Skills:  
After completing this module, you will be able to:

  • Explain common network vulnerabilities and how attackers can exploit them.

  • Predict threats to security by using the STRIDE (Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, and Elevation of privilege) threat model.

 

 Module 4: Analyzing Security Risks

Topics:  

  • Introduction to Risk Management

  • Creating a Risk Management Plan

Lab:  


Skills:
After completing this module, you will be able to:

  • Explain the purpose and operation of risk management.

  • Draft the elements of a risk management plan.

Module 5: Creating a Security Design for Physical Resources

Topics:  

  • Determining Threats and Analyzing Risks to Physical Resources

  • Designing Security for Physical Resources

Lab:  

Skills:  
After completing this module, you will be able to:

  • Determine threats and analyze risks to physical resources.

  • Design security for physical resources.

 

Module 6: Creating a Security Design for Computers

Topics:  

  • Determining Threats and Analyzing Risks to Computers

  • Designing Security for Computers

Lab:  

Skills:  
After completing this module, you will be able to:

  • Determine threats and analyze risks to computers.

  • Design security for computers.

 

Module 7: Creating a Security Design for Accounts

Topics:

  • Determining Threats and Analyzing Risks to Accounts

  • Designing Security for Accounts

 

Lab:

Skills:  
After completing this module, you will be able to:

  • Determine threats and analyze risks to accounts.

  • Design security for accounts.

Module 8: Creating a Security Design for Authentication

Topics:

  • Determining Threats and Analyzing Risks to Authentication

  • Designing Security for Authentication

Lab:

Skills:  
After completing this module, you will be able to:

  • Determine threats and analyze risks to authentication.

  • Design security for authentication

 

Module 9: Creating a Security Design for Data

Topics:  

  • Determining Threats and Analyzing Risks to Data

  • Designing Security for Data

Lab:

Skills:  
After completing this module, you will be able to:

  • Determine threats and analyze risks to data.

  • Design security for data

 

Module 10: Troubleshooting Network Access

Topics:  

  • Determining Threats and Analyzing Risks to Data Transmission

  • Designing Security for Data Transmission

Lab:

Skills:  
After completing this module, you will be able to:

  • Determine threats and analyze risks to data transmission.

  • Design security for data transmis


 

Module 11: Creating a Security Design for Network Perimeters

Topics:  

  • Determining Threats and Analyzing Risks to Network Perimeters

  • Designing Security for Network Perimeters

Lab:

Skills:  

After completing this module, you will be able to:

  • Determine threats and analyze risks to network perimeters.

  • Design security for network perimeters.

Module 12:  Designing Responses to Security Incidents

Topics

  • Introduction to Auditing and Incident Response

  • Designing an Audit Policy

  • Designing an Incident Response Procedure

Skills:

After completing this module, you will be able to:

  • Explain the importance of auditing and incident response.

  • Design an auditing policy.

  • Design an incident response procedure.

 

 

 

Google
 
Web web site