Progettare la Sicurezza per le Reti Microsoft
Corso
A Torino
Hai bisogno di un coach per la formazione?
Ti aiuterà a confrontare vari corsi e trovare l'offerta formativa più conveniente.
Descrizione
-
Tipologia
Corso
-
Luogo
Torino
Obiettivo del corso: This three-day instructor-led course provides you with the knowledge and skills to design a secure network infrastructure. Topics include assembling the design team, modeling threats, and analyzing security risks in order to meet business requirements for securing computers in a networked environment. The course encourages decision-making skills through an interactive tool. Rivolto a: This course is intended for IT systems engineers and security specialists who are responsible for establishing security policies and procedures for an organization.
Sedi e date
Luogo
Inizio del corso
Inizio del corso
Opinioni
Materie
- Security
- Framework
- Management
- Windows
- Reti
- E-business
- Addetto paghe
Programma
Designing Security for Microsoft Networks
Elements of this syllabus are subject to change.
This three-day instructor-led course provides you with the knowledge and skills to design a secure network infrastructure. Topics include assembling the design team, modeling threats, and analyzing security risks in order to meet business requirements for securing computers in a networked environment. The course encourages decision-making skills through an interactive tool that simulates real-life scenarios that the target audience may encounter. You are given the task of collecting the information and sorting through the details to resolve the given security requirement.
Audience
This course is intended for IT systems engineers and security specialists who are responsible for establishing security policies and procedures for an organization. Students should have one to three years of experience designing related business solutions.
At Course Completion
After completing this course, you will be able to:
§ Plan a framework for network security.
§ Identify threats to network security.
§ Analyze security risks.
§ Design security for physical resources.
§ Design security for computers.
§ Design security for accounts.
§ Design security for authentication.
§ Design security for data.
§ Design security for data transmission.
§ Design security for network perimeters.
§ Design an incident response procedure.
In addition, this course contains three teachable appendices that cover:
§ Designing an acceptable use policy.
§ Designing policies for managing networks.
§ Designing an operations framework for managing security.
Prerequisites
This course requires that students meet the following prerequisites:
§ A strong familiarity with
Microsoft® Windows® 2000 core technologies, such as those covered in Microsoft Official Curriculum (MOC)
Course 2152, Implementing Microsoft Windows 2000 Professional and Server.
§ A strong familiarity with
Windows 2000 networking technologies and implementation, such as those covered in MOC Course 2153, Implementing a Microsoft Windows 2000 Network Infrastructure.
§ A strong familiarity with
Windows 2000 directory services technologies and implementation, such as those covered in MOC Course 2154, Implementing and Administering Microsoft Windows 2000 Directory Services.
Student Materials
The student kit includes a comprehensive workbook and other necessary materials for this class.
Module 1: Introduction to Designing SecurityThis module describes the basic framework for designing network security and introduces key concepts used throughout the course. It also introduces an ongoing case study that is utilized in the labs.
Lessons
§ Introduction to DesigningSecurity for Microsoft Networks
§ Contoso Pharmaceuticals: A
Case Study
Module 2: Creating a Plan for Network SecurityThis module discusses the importance of security policies and procedures in a security design. It also explains how a security design team must include representation from various members of your organization. After completing this module, you will be able use a framework for designing security and create a security design team.
Lessons
§ Introduction to SecurityPolicies
§ Defining a Process forDesigning Network Security
§ Creating a Security Design
Team
Lab A: Planning a
Security Framework
After completing this module, you will be able to:
§ Describe common elements of security policies and procedures.
§ Create a security design framework by using the Microsoft Solutions Framework (MSF) process model.
§ Create a security design team.
Module 3: Identifying Threats to Network
Security
This module explains how to identify likely threats to a network and explains attacker motivations. After completing this module, you will be able to explain common threats and predict threats by using a threat model.
Lessons
§ Introduction to SecurityThreats
§ Predicting Threats to
Security
Lab A: Identifying Threats to Network SecurityAfter completing this module, you will be able to:
§ Explain common network vulnerabilities and how attackers can exploit them.
§ Predict threats to security by using the STRIDE (Spoofing, Tampering, Repudiation, Information disclosure,
Denial of service, and Elevation of privilege) threat model.
Module 4: Analyzing Security Risks
This module explains how to determine what resources in an organization require protection and how to categorize them in order to assign an appropriate level of protection. After completing this module, you will be able to apply a framework for planning risk management.
Lessons
§ Introduction to RiskManagement
§ Creating a Risk ManagementPlan
Lab A: Analyzing Security Threats
After completing this module, you will be able to:
§ Explain the purpose and operation of risk management.
§ Draft the elements of a risk management plan.
Module 5: Creating a Security Design for
Physical Resources
This module describes threats and risks to physical resources in an organization, as well as how to secure facilities, computers, and hardware. After completing this module, you will be able to design security for physical resources.
Lessons
§ Determining Threats andAnalyzing Risks to Physical Resources
§ Designing Security for
Physical Resources
Lab A: Designing Security for Physical Resources
After completing this module, you will be able to:
§ Determine threats and analyze risks to physical resources.
§ Design security for physical resources.Module 6: Creating a Security Design for
Computers
This module explains how to determine threats and analyze risks to computers on your network. After completing this module, you will be able to design security for computers.
Lessons
§ Determining Threats andAnalyzing Risks to Computers
§ Designing Security for
Computers
Lab A: Designing Security for Computers
After completing this module, you will be able to:
§ Determine threats and analyze risks to computers.
§ Design security for computers.Module 7: Creating a Security Design for
Accounts
This module describes the threats and risks to accounts in an organization. After completing this module, you will be able to design security for accounts.
Lessons
§ Determining Threats andAnalyzing Risks to Accounts
§ Designing Security for
Accounts
Lab A: Designing Security for Accounts
After completing this module, you will be able to:
§ Determine threats and analyze risks to accounts.
§ Design security for accounts.Module 8: Creating a Security Design for
Authentication
This module describes threats and risks to authentication. After completing this module, you will be able to design security for authentication.
Lessons
§ Determining Threats andAnalyzing Risks to Authentication
§ Designing Security for
Authentication
Lab A: Designing Authentication SecurityAfter completing this module, you will be able to:
§ Determine threats and analyze risks to authentication.
§ Design security for authentication.Module 9: Creating a Security Design for Data
This module examines threats and risks to data. After completing this module, you will be able to design security for data.
Lessons
§ Determining Threats andAnalyzing Risks to Data
§ Designing Security for Data
Lab A: Designing Security for Data
After completing this module, you will be able to:
§ Determine threats and analyze risks to data.
§ Design security for data.Module 10: Creating a Security Design for Data
Transmission
This module discusses threats and risks to data transmission. After completing this module, you will be able to design security for data transmission.
Lessons
§ Determining Threats andAnalyzing Risks to Data Transmission
§ Designing Security for Data
Transmission
Lab A: Designing Security for Data Transmission
After completing this module, you will be able to:
§ Determine threats and analyze risks to data transmission.
§ Design security for data transmission.Module 11: Creating a Security Design for
Network Perimeters
This module describes threats to the points where your network connects to other networks, such as the Internet. After completing this module, you will be able to design security for network perimeters.
Lessons
§ Determining Threats andAnalyzing Risks to Network Perimeters
§ Designing Security for
Network Perimeters
Lab A: Designing Security for Network Perimeters
After completing this module, you will be able to:
§ Determine threats and analyze risks to network perimeters.
§ Design security for network perimeters.Module 12: Designing Responses to SecurityIncidents
This module provides information about auditing and creating procedures to direct how you respond to security incidents. After completing this module, you will be able to design an audit policy and an incident response procedure.
Lessons
§ Introduction to Auditing andIncident Response
§ Designing an Audit Policy
§ Designing an Incident
Response Procedure
Lab A: Designing an Incident Response Procedure
After completing this module, you will be able to:
§ Explain the importance of auditing and incident response.
§ Design an auditing policy.
§ Design an incident response procedure.
Appendices
Appendix A: Designing an Acceptable Use Policy
This appendix provides information about creating policies for acceptable use of network resources by users.
Lessons
§ Analyzing Risks That UsersIntroduce
§ Designing Security for
Computer Use
Appendix B: Designing Policies for Managing
Networks
This appendix offers guidelines for ensuring that network administrators manage networks in a secure manner.
Lessons
§ Analyzing Risks to ManagingNetworks
§ Designing Security for
Managing Networks
Appendix C: Designing an Operations Framework to Manage SecurityThis appendix explains how to create a framework to ensure security of a network as the network changes and as the security requirements of the organization change.
Lessons
§ Analyzing Risks to OngoingNetwork Operations
§ Designing a Framework for
Ongoing Network Operations
Hai bisogno di un coach per la formazione?
Ti aiuterà a confrontare vari corsi e trovare l'offerta formativa più conveniente.
Progettare la Sicurezza per le Reti Microsoft