Fundamentals of Network Security

Course Details:

  • Days: 5
  • Course Code: MS2810
  • Booking: Please ring 08450 50 45 05



Overview

This four-day, instructor-led course provides students with the knowledge and skills to begin supporting network security within an organization. Students who complete this course will be able to identify security threats and vulnerabilities, and help respond to and recover from security incidents.

This course will cover security concepts that are prerequisites for attending other Microsoft Official Curriculum (MOC) courses for security specialists and help prepare students for the CompTIA Security+ exam.

This course has been approved as CompTIA Authorised Quality Curriculum (CAQC) for the CompTIA Security+ certification. The CAQC program assures students that all test objectives for the CompTIA Security+ certification exam are covered in the course materials.

Although the course focuses on Microsoft product- and technology-specific implementation of security concepts, many of these same concepts can be applied to other technologies.


Prerequisites

Before attending this course, students must have:

  • One year of experience managing Windows 2000 Server or have equivalent knowledge and skills, such as those described in MOC Course 2152: Implementing Microsoft Windows 2000 Professional and Server.


Delegates will learn how to

  • Explain common attacks against network assets, the associated threats and vulnerabilities, and what network security personnel do to secure assets.
  • Explain how to use cryptography to secure information and how to choose an appropriate encryption method for an organisation.
  • Secure information in an organisation by using authentication and access control.
  • Secure data transmission by identifying threats to network devices and implementing security for common data transmission, remote access, and wireless network traffic.
  • Identify, respond to, and assist in the formal investigation of security incidents.
  • Implement secure computing baselines in an organisation.
  • Deploy and manage certificates.
  • Secure Web servers against common attacks and configure security for Web browsers.
  • Protect e-mail messages and instant messaging from common security threats.
  • Identify common security threats and vulnerabilities to directory services and DNS, and then apply security methods to protect them.
  • Identify network perimeter threats and monitor perimeter security for a network.
  • Identify types of security policies to manage operational security, and then use these policies to ensure compliance by users in an organisation.
  • Preserve business continuity by implementing a secure disaster recovery strategy, communicating risks to others, and performing secure backup and recovery.


Outline

    Module 1: Preparing to Secure Information

    • Explaining How Assets Are Attacked
    • Explaining How Assets Are Secured

    Module 2: Implementing Security-Enhanced Computing Baselines

    • Introduction to Trusted Computing Bases
    • Establishing a Security Baseline
    • Monitoring a Security Baseline
    • Helping to Secure Computers Physically
    • Maintaining a Security Baseline

    Module 3: Helping to Protect Information Using Authentication and Access Control

    • Introduction to Access Control
    • Implementing an Authentication Strategy
    • Implementing an Access Control Strategy

    Module 4: Using Cryptography to Help Protect Information

    • Introduction to Cryptography
    • Using Symmetric Encryption
    • Using Hash Functions
    • Using Public Key Encryption

    Module 5: Using a PKI to Help Protect Information

    • Introduction to Certificates
    • Introduction to Public Key Infrastructure
    • Deploying and Managing Certificates

    Module 6: Securing Internet Applications and Components

    • Helping to Protect Web Servers
    • Configuring Security for Common Internet Protocols
    • Configuring Security for Web Browsers
    • Configuring Security for Databases

    Module 7: Implementing Security for E-Mail and Instant Messaging

    • Securing E-Mail Servers
    • Securing E-Mail Clients
    • Securing Instant Messaging

    Module 8: Managing Security for Directory Services and DNS

    • Helping protect Directory Services Against Common Threats
    • Helping Protect DNS Against Common Threats

    Module 9: Securing Data Transmission

    • Identifying Threats to Network Devices
    • Implementing Security for Common Data Transmission
    • Implementing Security for Remote Access
    • Implementing Security for Wireless Network Traffic

    Module 10: Implementing and Monitoring Security for Network Perimeters

    • Introduction to Network Perimeters
    • Implementing Security on Inbound and Outbound Network Traffic
    • Monitoring Network Traffic

    Module 11: Managing Operational Security

    • Establishing Security Policies and Procedures
    • Educating Users about Security Policies
    • Applying Security Policies to Operational Management
    • Resolving Ethical Dilemmas When Helping to Protect Assets

    Module 12: Preserving Business Continuity

    • Preparing to Recover from Disasters
    • Communicating the Impact of Risks
    • Performing a Security-Enhanced Backup and Recovery

    Module 13: Responding to Security Incidents

    • Identifying Security Incidents
    • Responding to Security Incidents
    • Investigating Security Incidents


Leads to examination

    CompTIA Security +

Leads to certification

Recommended follow on course

For more information or advice please complete the form below.

Name*  
Phone*  
Mobile  
Email*  
Receive info on...   MCSE
MCDBA
MCAD
MCP
MCSA
MCDST
MCSD
Other
Status   Company
Individual
Where did you hear about us?*  
Comments  
Address  

* These fields are required

 

e-Learning           Classroom       Online Demo         Benefits          Contact us          Sitemap
  

Microsoft Training © 2005.

Please Note: We are not Microsoft. We are a training company that provides training materials and classes to gain your Microsoft certification.