Module 1: Introduction to Designing Security
Introduction to Designing Security for Microsoft Networks
Contoso Pharmaceuticals: A Case Study
Module 2: Creating a Plan for Network Security
Introduction to Security Policies
Defining a Process for Designing Network Security
Creating a Security Design Team
Module 3: Identifying Threats to Network Security
Introduction to Security Threats
Predicting Threats to Security
Module 4: Analyzing Security Risks
Introduction to Risk Management
Creating a Risk Management Plan
Module 5: Creating a Security Design for Physical Resources
Determining Threats and Analyzing Risks to Physical Resources
Designing Security for Physical Resources
Module 6: Creating a Security Design for Computers
Determining Threats and Analyzing Risks to Computers
Designing Security for Computers
Module 7: Creating a Security Design for Accounts
Determining Threats and Analyzing Risks to Accounts
Designing Security for Accounts
Module 8: Creating a Security Design for Authentication
Determining Threats and Analyzing Risks to Authentication
Designing Security for Authentication
Module 9: Creating a Security Design for Data
Determining Threats and Analyzing Risks to Data
Designing Security for Data
Module 10: Creating a Security Design for Data Transmission
Determining Threats and Analyzing Risks to Data Transmission
Designing Security for Data Transmission
Module 11: Creating a Security Design for Network Perimeters
Determining Threats and Analyzing Risks to Network Perimeters
Designing Security for Network Perimeters
Module 12: Designing Responses to Security Incidents
Introduction to Auditing and Incident Response
Designing an Audit Policy
Designing an Incident Response Procedure
Appendix A: Designing an Acceptable Use Policy
Analyzing Risks That Users Introduce
Designing Security for Computer Use
Appendix B: Designing Policies for Managing Networks
Analyzing Risks to Managing Networks
Designing Security for Managing Networks
Appendix C: Designing an Operations Framework to Manage Security
Analyzing Risks to Ongoing Network Operations
Designing a Framework for Ongoing Network Operations