M2810: Fundamentals of Network Security

Level
Total time

M2810: Fundamentals of Network Security

Perpetual Solutions
Logo Perpetual Solutions
Provider rating: starstarstarstarstar 10 Perpetual Solutions has an average rating of 10 (out of 1 reviews)

Need more information? Get more details on the site of the provider.

Starting dates and places

There are no known starting dates for this product.

Description

Prerequisites:

Before attending this course, students must have one year of experience managing Windows 2000 Server or have equivalent knowledge and skills, such as those described in MOC Course 2152: Implementing Microsoft Windows 2000 Professional and Server.

Course Description:

This four-day, instructor-led course provides students with the knowledge and skills to begin supporting network security within an organization. Students who complete this course will be able to identify security threats and vulnerabilities, and help respond to and recover from security incidents.

This course will cover security concepts that are prerequisites for attending other Microsoft Official Curriculum (MOC) co…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Prerequisites:

Before attending this course, students must have one year of experience managing Windows 2000 Server or have equivalent knowledge and skills, such as those described in MOC Course 2152: Implementing Microsoft Windows 2000 Professional and Server.

Course Description:

This four-day, instructor-led course provides students with the knowledge and skills to begin supporting network security within an organization. Students who complete this course will be able to identify security threats and vulnerabilities, and help respond to and recover from security incidents.

This course will cover security concepts that are prerequisites for attending other Microsoft Official Curriculum (MOC) courses for security specialists and help prepare students for the CompTIA Security+ exam.

This course has been approved as CompTIA Authorized Quality Curriculum (CAQC) for the CompTIA Security+ certification. The CAQC program assures students that all test objectives for the CompTIA Security+ certification exam are covered in the course materials.

Although the course focuses on Microsoft product- and technology-specific implementation of security concepts, many of these same concepts can be applied to other technologies.

This course includes the following modules:

Preparing to Secure Information

  • Explaining How Assets Are Attacked
  • Explaining How Assets Are Secured
  • Lab A: Preparing to Secure Information

Implementing Secure Computing Baselines

  • Introduction to Trusted Computing Bases
  • Establishing a Secure Baseline
  • Monitoring a Secure Baseline
  • Securing Computers Physically
  • Maintaining a Secure Baseline
  • Lab A: Maintaining Baseline Security

Securing Information Using Authentication and Access Control

  • Introduction to Access Control
  • Implementing an Authentication Strategy
  • Implementing an Access Control Strategy
  • Lab A: Securing Accounts (MBSA)

Using Cryptography to Secure Information

  • Introduction to Cryptography
  • Using Symmetric Encryption
  • Using Hash Functions
  • Using Public Key Encryption
  • Lab A: Using Cryptography to Secure Information

Using a PKI to Secure Information

  • Introduction to Certificates
  • Introduction to Public Key Infrastructure
  • Deploying and Managing Certificates
  • Lab A: Using Certificates

Securing Internet Applications and Components

  • Securing Web Servers
  • Configuring Security for Common Internet Protocols
  • Configuring Security for Web Browsers
  • Configuring Security for Databases
  • Lab A: Securing Web Servers
  • Lab B: Protecting Clients from Active Content

Implementing Security for E-Mail and Instant Messaging

  • Securing E-Mail Servers
  • Securing E-Mail Clients
  • Securing Instant Messaging
  • Lab A: Securing Mail Servers

Managing Security for Directory Services and DNS

  • Securing Directory Services Against Common Threats
  • Securing DNS Against Common Threats
  • Lab A: Managing Security for Directory Services and DNS

Securing Data Transmission

  • Identifying Threats to Network Devices
  • Implementing Security for Common Data Transmission
  • Implementing Security for Remote Access
  • Implementing Security for Wireless Network Traffic
  • Lab A: Securing Data Transmission
  • Lab B: Using IPSec to Secure Data Transmission

Implementing and Monitoring Security for Network Perimeters

  • Introduction to Network Perimeters
  • Implementing Security on Inbound and Outbound Network Traffic
  • Monitoring Network Traffic
  • Lab A: Implementing and Monitoring Security for Network Perimeters

Managing Operational Security

  • Establishing Security Policies and Procedures
  • Educating Users about Security Policies
  • Applying Security Policies to Operational Management
  • Resolving Ethical Dilemmas When Securing Assets
  • Lab A: Managing Operational Security

Preserving Business Continuity

  • Preparing to Recover from Disasters
  • Communicating the Impact of Risks
  • Performing a Secure Backup and Recovery
  • Lab A: Preserving Business Continuity

Responding to Security Incidents

  • Identifying Security Incidents
  • Responding to Security Incidents
  • Investigating Security Incidents
  • Lab A: Responding to Security Incidents

For online live training advice please visit our Learning Advice Centre on our website. Be sure to follow us on Twitter to receive special course offers, news and updates!

There are no reviews yet.

Share your review

Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.