Designing Security for Microsoft Networks (2830) Seminar
training classes conferences & workshops presented by Netcom Learning
register for training on FindaSeminar.com
Price protection. The price to attend Designing Security for Microsoft Networks (2830)
is set by the training provider. There is no added
charge for our services.
We honor most training
provider coupons*.
Call a representative to see if your discount coupon
applies.
Privacy. Your personal information
won't be shared with anyone but the training provider Netcom Learning.
Security. When you register for this
seminar on FindaSeminar.com your personal data and payment
information is safely collected and processed using secure SSL
encryption technology.
Flexibility. FindaSeminar.com offers
you three ways to register for Designing Security for Microsoft Networks (2830)
seminar by Netcom Learning. Register online, by
phone (800) 349-1935,or fax (800) 712-5569
Who should attend Designing Security for Microsoft Networks (2830)
This course is intended for IT systems engineers and security specialists who are responsible for establishing security policies and procedures for an organization.
Reviews
Write and read Netcom Learning reviews
and reviews about the training seminar Designing Security for Microsoft Networks (2830) on the
Seminar News Network and the
Training News Network.
Frequently asked questions and registration options for the
training seminar Designing Security for Microsoft Networks (2830)
This course is intended for IT systems engineers and security specialists who are responsible for establishing security policies and procedures for an organization.
This course will cover such topics as assembling the design team, modeling threats, and analyzing security risks in order to meet business requirements for securing computers in a networked environment. (see
full course description)
Seminar
/ Training class dates & locations
print the agenda
Training Course
Syllabus:
Description
Elements of this syllabus are subject to change.
This three-day, instructor-led course provides you with the knowledge and skills to design a secure network infrastructure. Topics include assembling the design team, modeling threats, and analyzing security risks in order to meet business requirements for securing computers in a networked environment. The course encourages decision-making skills through an interactive tool that simulates real-life scenarios that the target audience may encounter. You are given the task of collecting the information and sorting through the details to resolve the given security requirement.
Audience
This course is intended for IT systems engineers and security specialists who are responsible for establishing security policies and procedures for an organization. Students should have one to three years of experience designing related business solutions.
Objectives
· Plan a framework for network security. · Identify threats to network security. · Analyze security risks. · Design security for physical resources. · Design security for computers. · Design security for accounts. · Design security for authentication. · Design security for data. · Design security for data transmission. · Design security for network perimeters. · Design an incident response procedure.
Required Prerequisites
· Implementing, Managing, and Maintaining Win 2003 Server Network Infrastructure: Network Services (2277) · Managing and Maintaining a Microsoft Windows Server 2003 Environment (2273) · Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (2278)
Exams
· 70-298 : Designing Security for a Microsoft Windows Server 2003 Network
Outline
Introduction to Designing Security
Introduction to Designing Security for Microsoft Networks
Contoso Pharmaceuticals: A Case Study
Creating a Plan for Network Security
Introduction to Security Policies
Defining a Process for Designing Network Security
Creating a Security Design Team
Identifying Threats to Network Security
Introduction to Security Threats
Predicting Threats to Security
Analyzing Security Risks
Introduction to Risk Management
Creating a Risk Management Plan
Creating a Security Design for Physical Resources
Determining Threats and Analyzing Risks to Physical Resources
Designing Security for Physical Resources
Creating a Security Design for Computers
Determining Threats and Analyzing Risks to Computers
Designing Security for Computers
Creating a Security Design for Accounts
Determining Threats and Analyzing Risks to Accounts
Designing Security for Accounts
Creating a Security Design for Authentication
Determining Threats and Analyzing Risks to Authentication
Designing Security for Authentication
Creating a Security Design for Data
Determining Threats and Analyzing Risks to Data
Designing Security for Data
Creating a Security Design for Data Transmission
Determining Threats and Analyzing Risks to Data Transmission
Designing Security for Data Transmission
Creating a Security Design for Network Perimeters
Determining Threats and Analyzing Risks to Network Perimeters
Designing Security for Network Perimeters
Designing Responses to Security Incidents
Introduction to Auditing and Incident Response
Designing an Audit Policy
Designing an Incident Response Procedure
Designing an Acceptable Use Policy
Analyzing Risks That Users Introduce
Designing Security for Computer Use
Designing Policies for Managing Networks
Analyzing Risks to Managing Networks
Designing Security for Managing Networks
Designing an Operations Framework to Manage Security
Analyzing Risks to Ongoing Network Operations
Designing a Framework for Ongoing Network Operations
Seminar Summary:
This course will cover such topics as assembling the design team, modeling threats, and analyzing security risks in order to meet business requirements for securing computers in a networked environment. (see
full course description)