Course 2830: Designing Security for Microsoft Networks Three days, Instructor-led Introduction

smileybloatΔίκτυα και Επικοινωνίες

20 Νοε 2013 (πριν από 3 χρόνια και 9 μήνες)

71 εμφανίσεις


Course 2830:
Designing Security for Microsoft Networks

Three days
,
Instructor
-
led


Introduction

This three
-
day, instructor
-
led course provides you with the knowledge and skills to design a secure network infrastructure. Topics
include assembling the desig
n team, modeling threats, and analyzing security risks in order to meet business requirements for
securing computers in a networked environment. The course encourages decision
-
making skills through an interactive tool that
simulates real
-
life scenarios tha
t the target audience may encounter. You are given the task of collecting the information and
sorting through the details to resolve the given security requirement.


Audience

This course is intended for IT systems engineers and security specialists who are

responsible for establishing security policies and
procedures for an organization. Students should have one to three years of experience designing related business solutions.



At Course Completion

After completing this course, you will be able to:




慮⁡⁦牡mewo牫⁦o爠retwo牫⁳散 物ty.



䥤Intify⁴h牥at猠soetwo牫⁳散 物ty.



䅮慬yze⁳散 物ty⁲ 獫献



De獩杮⁳散 物ty⁦o爠灨y獩捡c⁲ 獯ur捥献



De獩杮⁳散 物ty⁦o爠捯m灵te牳r



De獩杮⁳散 物ty⁦o爠r捣ount献



De獩杮⁳散 物ty⁦o爠ruthenti捡cion.



De獩杮⁳散 物ty⁦o爠摡t愮



De獩杮⁳散 物ty⁦o爠摡t愠a牡n獭s獳ion.



De獩杮⁳散 物ty⁦o爠retwo牫⁰ 物mete牳r



De獩杮⁡ ⁩n捩摥nt⁲ 獰sn獥⁰so捥摵牥.


䥮⁡摤ition,⁴hi猠sou牳r⁣ ntain猠sh牥e⁴e慣a慢le⁡灰en摩捥猠ch慴⁣ ve爺



De獩杮in朠慮⁡捣数t慢le⁵
獥⁰sli捹.



De獩杮in朠灯li捩e猠景爠r慮慧in朠getwo牫献



De獩杮in朠慮灥牡tion猠晲慭ewo牫⁦o爠r慮慧in朠獥捵物ty.


Prerequisites

This course requires that students meet the following prerequisites:



䄠獴牯n朠g慭ili慲ity⁷ith⁍i捲c獯ft⁗in摯w玮′000⁣ r
e⁴e捨nolo杩e猬⁳s捨⁡猠 ho獥⁣sve牥搠dn⁍i捲csoft⁏ffi捩al⁃u牲i捵lum
(MOC)
Cou牳r′152
: 䥭灬ementin朠gi捲c獯ft⁗in摯w猠s000 偲Pfe獳ion慬⁡ 搠de牶e爮



䄠獴牯n朠g慭ili慲ity⁷ith⁗in
摯w猠s000etwo牫in朠ge捨nolo杩e猠慮d⁩m灬ement慴ion,⁳ 捨⁡猠 ho獥⁣sve牥搠dn⁍OC
Cou牳r
2153
:⁉ 灬ementin朠愠䵩捲g獯ft⁗in摯w猠s000 Netwo牫⁉ f牡獴牵捴u牥.



䄠獴牯n朠g慭ili慲ity⁷
ith⁗in摯w猠s000⁤ 牥捴o特⁳敲vi捥猠ce捨nolo杩e猠慮搠dm灬ement慴ion,⁳ 捨⁡猠 ho獥⁣sve牥搠dn⁍OC
Cou牳r′154
:⁉ 灬ementin朠慮搠d摭ini獴e物n朠gi捲c獯ft⁗in摯w猠s000⁄i牥捴o特⁓e牶i捥c
.



Course Outline


Module 1: Introduction to Designing Security

This module describes the basic framework for designing network security and introduces key concepts used throughout the cour
se.
It also introduces an ongoing case study that is utilized in
the labs.

Lessons



䥮t牯摵捴ion⁴o⁄e獩杮in朠ge捵物ty⁦o爠ri捲c獯ft⁎etwo牫s



Conto獯⁐ 慲m慣auti捡c猺⁁⁃慳a⁓tu摹


Module 2: Creating a Plan for Network Security

This module discusses the importance of security policies and procedures in a security d
esign. It also explains how a security design
team must include representation from various members of your organization. After completing this module, you will be able us
e a
framework for designing security and create a security design team.

Lessons



䥮t
牯摵捴ion⁴o⁓e捵物ty⁐ li捩es



Definin朠愠偲o捥獳⁦c爠re獩杮in朠getwo牫⁓e捵物ty



C牥慴in朠愠ge捵物ty⁄e獩gn⁔ 慭

Lab A: Planning a Security Framework

After completing this module, you will be able to:




Describe common elements of security policies
and procedures.



Create a security design framework by using the Microsoft Solutions Framework (MSF) process model.



Create a security design team.


Module 3: Identifying Threats to Network Security

This module explains how to identify likely threats
to a network and explains attacker motivations. After completing this module,
you will be able to explain common threats and predict threats by using a threat model.

Lessons



䥮t牯摵捴ion⁴o⁓e捵物ty⁔ 牥ats



偲P摩捴in朠周牥慴猠so⁓e捵物ty

Lab A: Ident
ifying Threats to Network Security

After completing this module, you will be able to:



E硰l慩n⁣ mmonetwo牫⁶ulne牡bilitie猠慮搠dow⁡ t慣ae牳⁣慮⁥硰loit⁴hem.



偲P摩捴⁴h牥慴猠so⁳散 物ty⁢ ⁵獩ng⁴he⁓呒䥄E
S灯ofin本⁔ m灥物n本⁒e灵摩慴ion,⁉ fo牭a
tion⁤ 獣losu牥,⁄eni慬f⁳敲vi捥c⁡ 搠
Elev慴ionf⁰物vile来)⁴h牥慴o摥l.


Module 4: Analyzing Security Risks

This module explains how to determine what resources in an organization require protection and how to categorize them in orde
r to
assign an a
ppropriate level of protection. After completing this module, you will be able to apply a framework for planning risk
management.

Lessons



䥮t牯摵捴ion⁴o⁒i獫⁍慮慧ement



C牥慴in朠愠gi獫⁍慮慧ement⁐ 慮

Lab A: Analyzing Security Threats

After completi
ng this module, you will be able to:



E硰l慩n⁴he⁰ 牰r獥⁡n搠d灥牡tionf⁲ 獫慮慧ement.



D牡ft⁴he⁥lement猠sf⁡⁲i獫慮a来ment⁰ 慮.


Module 5: Creating a Security Design for Physical Resources

This module describes threats and risks to physical
resources in an organization, as well as how to secure facilities, computers, and
hardware. After completing this module, you will be able to design security for physical resources.

Lessons



Dete牭inin朠周牥慴猠慮搠dn慬yzin朠gi獫猠so⁐ y獩捡c⁒e獯u牣rs



De獩杮in朠ge捵物ty⁦o爠偨y獩捡c⁒e獯u牣rs

Lab A: Designing Security for Physical Resources

After completing this module, you will be able to:



Dete牭ine⁴h牥慴猠慮搠慮慬yze⁲ sk猠so⁰ y獩捡c⁲ 獯u牣r献



De獩杮⁳散 物ty⁦o爠灨y獩捡c⁲ 獯ur捥献


Module

6: Creating a Security Design for Computers

This module explains how to determine threats and analyze risks to computers on your network. After completing this module, y
ou
will be able to design security for computers.

Lessons



Dete牭inin朠周牥慴猠慮搠dn
慬yzin朠gi獫猠so⁃om灵te牳



De獩杮in朠ge捵物ty⁦o爠rom灵te牳

Lab A: Designing Security for Computers

After completing this module, you will be able to:



Dete牭ine⁴h牥慴猠慮搠慮慬yze⁲ sk猠so⁣ m灵te牳r



De獩杮⁳散 物ty⁦o爠捯m灵te牳r


Module 7: Cre
ating a Security Design for Accounts

This module describes the threats and risks to accounts in an organization. After completing this module, you will be able to

design
security for accounts.

Lessons



Dete牭inin朠周牥慴猠慮搠dn慬yzin朠gi獫猠so⁁捣 unts



De獩杮in朠ge捵物ty⁦o爠r捣ounts

Lab A: Designing Security for Accounts

After completing this module, you will be able to:



Dete牭ine⁴h牥慴猠慮搠慮慬yze⁲ sk猠so⁡捣 unt献



De獩杮⁳散 物ty⁦o爠r捣ount献





Module 8: Creating a Security Design for Au
thentication

This module describes threats and risks to authentication. After completing this module, you will be able to design security
for
authentication.

Lessons



Dete牭inin朠周牥慴猠慮搠dn慬yzin朠gi獫猠so⁁ thenti捡cion



De獩杮in朠ge捵物ty⁦o爠ruth
enti捡cion

Lab A: Designing Authentication Security

After completing this module, you will be able to:



Dete牭ine⁴h牥慴猠慮搠慮慬yze⁲ sk猠so⁡ thenti捡cion.



De獩杮⁳散 物ty⁦o爠ruthenti捡cion.


Module 9: Creating a Security Design for Data

This mod
ule examines threats and risks to data. After completing this module, you will be able to design security for data.

Lessons



Dete牭inin朠周牥慴猠慮搠dn慬yzin朠gi獫猠so⁄慴a



De獩杮in朠ge捵物ty⁦o爠r慴a

Lab A: Designing Security for Data

After completin
g this module, you will be able to:



Dete牭ine⁴h牥慴猠慮搠慮慬yze⁲ sk猠so⁤慴愮



De獩杮⁳散 物ty⁦o爠摡t愮


Module 10: Creating a Security Design for Data Transmission

This module discusses threats and risks to data transmission. After completing thi
s module, you will be able to design security for
data transmission.

Lessons



Dete牭inin朠周牥慴猠慮搠dn慬yzin朠gi獫猠so⁄慴愠a牡n獭s獳ion



De獩杮in朠ge捵物ty⁦o爠r慴愠a牡nsmi獳ion

Lab A: Designing Security for Data Transmission

After completing this m
odule, you will be able to:



Dete牭ine⁴h牥慴猠慮搠慮慬yze⁲ sk猠so⁤慴愠a牡n獭s獳ion.



De獩杮⁳散 物ty⁦o爠摡t愠a牡n獭s獳ion.


Module 11: Creating a Security Design for Network Perimeters

This module describes threats to the points where your network
connects to other networks, such as the Internet. After completing
this module, you will be able to design security for network perimeters.

Lessons



Dete牭inin朠周牥慴猠慮搠dn慬yzin朠gi獫猠so⁎etwo牫⁐敲imete牳



De獩杮in朠ge捵物ty⁦o爠retwo牫⁐敲imete牳

Lab A: Designing Security for Network Perimeters

After completing this module, you will be able to:



Dete牭ine⁴h牥慴猠慮搠慮慬yze⁲ sk猠soetwo牫⁰ 物mete牳r



De獩杮⁳散 物ty⁦o爠retwo牫⁰ 物mete牳r


Module 12: Designing Responses to Security Incid
ents

This module provides information about auditing and creating procedures to direct how you respond to security incidents. Afte
r
completing this module, you will be able to design an audit policy and an incident response procedure.

Lessons



䥮t牯摵捴io
n⁴o⁁ 摩tin朠慮搠䥮捩dent⁒e獰sn獥



De獩杮in朠慮⁁ 摩t⁐ li捹



De獩杮in朠慮⁉ 捩摥nt⁒e獰sn獥⁐牯捥摵牥

Lab A: Designing an Incident Response Procedure

After completing this module, you will be able to:



E硰l慩n⁴he⁩m灯牴慮捥f⁡ 摩ting⁡ 搠dn捩摥
nt⁲ 獰sn獥s



De獩杮⁡ ⁡ 摩tin朠灯li捹.



De獩杮⁡ ⁩n捩摥nt⁲ 獰sn獥⁰so捥摵牥.

Lessons



䅮慬yzin朠gi獫猠周慴⁕獥牳⁉ t牯du捥



De獩杮in朠ge捵物ty⁦o爠rom灵te爠r獥