MS-2830 - Designing Security for Microsoft Networks

This course provides students with the knowledge and skills to design a secure network for computers running Microsoft operating systems. The course emphasizes the design aspects of security including threat identification and risk assessment. It also provides best practices and guidelines for developing and verifying effective security policies and procedures.

Student Testimonials

Instructor did a great job, from experience this subject can be a bit dry to teach but he was able to keep it very engaging and made it much easier to focus. Student
Excellent presentation skills, subject matter knowledge, and command of the environment. Student
Instructor was outstanding. Knowledgeable, presented well, and class timing was perfect. Student

Click here to print this page »

Prerequisites


Course MS2153, Implementing a Microsoft Windows 2000 Network Infrastructure and course MS2154, Implementing and Administering Microsoft Windows 2000 Directory Services or equivalent experience

Detailed Class Syllabus

Module 1: Introduction to Designing Security

Introduction to Designing Security for Microsoft Networks
Contoso Pharmaceuticals: A Case Study

Module 2: Creating a Plan for Network Security

Introduction to Security Policies
Defining a Process for Designing Network Security
Creating a Security Design Team

Module 3: Identifying Threats to Network Security

Introduction to Security Threats
Predicting Threats to Security

Module 4: Analyzing Security Risks

Introduction to Risk Management
Creating a Risk Management Plan

Module 5: Creating a Security Design for Physical Resources

Determining Threats and Analyzing Risks to Physical Resources
Designing Security for Physical Resources

Module 6: Creating a Security Design for Computers

Determining Threats and Analyzing Risks to Computers
Designing Security for Computers

Module 7: Creating a Security Design for Accounts

Determining Threats and Analyzing Risks to Accounts
Designing Security for Accounts

Module 8: Creating a Security Design for Authentication

Determining Threats and Analyzing Risks to Authentication
Designing Security for Authentication

Module 9: Creating a Security Design for Data

Determining Threats and Analyzing Risks to Data
Designing Security for Data

Module 10: Creating a Security Design for Data Transmission

Determining Threats and Analyzing Risks to Data Transmission
Designing Security for Data Transmission

Module 11: Creating a Security Design for Network Perimeters

Determining Threats and Analyzing Risks to Network Perimeters
Designing Security for Network Perimeters

Module 12: Designing Responses to Security Incidents

Introduction to Auditing and Incident Response
Designing an Audit Policy
Designing an Incident Response Procedure

Appendix A: Designing an Acceptable Use Policy

Analyzing Risks That Users Introduce
Designing Security for Computer Use

Appendix B: Designing Policies for Managing Networks

Analyzing Risks to Managing Networks
Designing Security for Managing Networks

Appendix C: Designing an Operations Framework to Manage Security

Analyzing Risks to Ongoing Network Operations
Designing a Framework for Ongoing Network Operations