Designing
Security for Microsoft Networks
|
Course
No.
Course Length:
|
2830
2 days
|
Introduction
This two-day, instructor-led course provides you with
the knowledge and skills to design a secure network infrastructure. Topics
include assembling the design team, modeling threats, and analyzing
security risks in order to meet business requirements for securing
computers in a networked environment. The course encourages
decision-making skills through an interactive tool that simulates
real-life scenarios that the target audience may encounter. You are given
the task of collecting the information and sorting through the details to
resolve the given security requirement.
At
Course Completion
After completing this course, you will be able to:
-
Plan a framework for
network security.
-
Identify threats to network
security.
-
Analyze security risks.
-
Design security for
physical resources.
-
Design security for
computers.
-
Design security for
accounts.
-
Design security for
authentication.
-
Design security for data.
-
Design security for data
transmission.
-
Design security for network
perimeters.
-
Design an incident response
procedure.
|
|
Module
1: Introduction to Designing Security
|
Topics:
|
Module
2: Creating a Plan for Network Security
|
Topics:
-
Introduction to Security
Policies
-
Defining a Process for
Designing Network Security
-
Creating a Security Design
Team
Lab:
Skills:
After completing this module, you will be able to:
-
Describe common elements of
security policies and procedures.
-
Create a security design
framework by using the Microsoft Solutions Framework (MSF) process
model.
-
Create a security design
team.
|
Module
3: Identifying Threats to Network Security
|
Topics:
Lab:
Skills:
After completing this module, you will be able to:
-
Explain common network
vulnerabilities and how attackers can exploit them.
-
Predict threats to security
by using the STRIDE (Spoofing, Tampering, Repudiation, Information
disclosure, Denial of service, and Elevation of privilege) threat
model.
|
Module
4: Analyzing Security Risks
|
Topics:
Lab:
Skills:
After completing this module, you will be able to:
|
Module
5: Creating a Security Design for Physical Resources
|
Topics:
Lab:
Skills:
After completing this module, you will be able to:
|
Module
6: Creating a Security Design for Computers
|
Topics:
Lab:
Skills:
After completing this module, you will be able to:
|
Module
7: Creating a Security Design for Accounts
|
Topics:
Lab:
Skills:
After completing this module, you will be able to:
|
Module
8: Creating a Security Design for Authentication
|
Topics:
Lab:
Skills:
After completing this module, you will be able to:
|
Module
9: Creating a Security Design for Data
|
Topics:
Lab:
Skills:
After completing this module, you will be able to:
|
Module
10: Troubleshooting Network Access
|
Topics:
Lab:
Skills:
After completing this module, you will be able to:
|
Module
11: Creating a Security Design for Network Perimeters
|
Topics:
Lab:
Skills:
After completing this module,
you will be able to:
|
Module
12: Designing Responses to Security Incidents
|
Topics
-
Introduction to Auditing
and Incident Response
-
Designing an Audit Policy
-
Designing an Incident
Response Procedure
Skills:
After completing this module,
you will be able to:
-
Explain the importance of
auditing and incident response.
-
Design an auditing policy.
-
Design an incident response
procedure.
|