Learn: in:
» back to Search Results

Course rating of 0 Vendor rating of 5


This five-day instructor-led course addresses the MCSA and MCSE skills path for IT Pro security practitioners, specifically addressing the training needs of those preparing for the 70-299 certification exam.


 
Course Outline
This five-day course addresses the MCSA and MCSE skills path for IT Pro security practitioners, specifically addressing the training needs of those preparing for the 70-299 certification exam.The primary product focus is on Microsoft Windows Server 2003 based infrastructure solutions but will include some client focused content where appropriate. This learning product is to provide functional skills in planning and implementing infrastructure security.This course is part of the Security Portfolio and will act as the primary entry point for IT Professionals at the implementation level. MOC 2810 will provide an entry point for students to broaden their awareness of security issues. Students will be encouraged to enhance their security design skills by attending MOC 2830.Microsoft Certification examsNo Microsoft Certification exams are associated with this course currently.

Course Outline

Module 1: Planning and Configuring an Authentication and Authorization Strategy

This module explains how to evaluate the infrastructure of your organization and create and document an authorization and authentication plan that allows the appropriate level of access to various security principals. It also describes trust relationships, domain and forest functional levels, and basic security principles.

Lessons
  • Components of an Authentication Model
  • Planning and Implementing an Authentication Strategy
  • Groups and Basic Group Strategy in Windows Server 2003
  • Creating Trusts in Windows Server 2003
  • Planning, Implementing, and Maintaining an Authorization Strategy Using Groups
Lab : Planning and Configuring an Authentication and Authorization Strategy
  • Planning and Implementing a Resource Authorization Strategy
  • Planning and Implementing a Cross-Forest Authentication Strategy
  • Planning and Implementing an Authentication Policy
After completing this module, students will be able to:
  • Describe the components, tools, and protocols that support authentication.
  • Plan and implement an authentication strategy in a multi-forest organization.
  • Determine the necessary group structure for a multi-domain or multi-forest environment.
  • Create trusts in a Windows Server 2003 environment.
  • Plan, implement, and maintain an authorization strategy in a multi-forest organization.
Module 2: Installing, Configuring, and Managing Certification Authorities

This module describes the fundamentals of the systems that make secure communication possible. It describes methods, such as a public key infrastructure (PKI), that enable you to securely communicate on networks.

Lessons
  • Overview of a PKI
  • Introduction to Certification Authorities
  • Installing a Certification Authority
  • Managing a Certification Authority
  • Backing Up and Restoring a Certification Authority
Lab : Installing and Configuring a Certification Authority
  • Installing an Enterprise Subordinate Certification Authority
  • Backing up a Certification Authority
After completing this module, students will be able to:
  • Describe a PKI.
  • Describe the applications and components that are used in a PKI.
  • Install a certification authority.
  • Create and publish Certificate Revocation Lists (CRLs) and Authority Information Access (AIA) distribution points.
  • Back up and restore a certification authority.
Module 3: Configuring, Deploying, and Managing Certificates

This module explains how to ensure that the certificates are issued to the correct security principals and for the intended purpose. It describes, for example, how to make the deployment of certificates an easy and straightforward task for end users.

Lessons
  • Overview of Digital Certiificates
  • Deploying and Revoking User and Computer Certificates
  • Configuring Certificate Templates
  • Managing Certificates
Lab : Deploying and Managing Certificates
  • Configuring Multipurpose Certificate Templates
  • Configuring Certificate Autoenrollment
  • Updating a Certificate Template
  • Implementing a Key Archiving Strategy
After completing this module, students will be able to:
  • Configure certificate templates in a Microsoft Windows Server 2003 PKI environment.
  • Deploy, enroll, and revoke certificates in a Windows Server 2003 PKI environment.
  • Describe the applications and components that are used in a PKI.
  • Export, import, and archive certificates and keys in a Windows Server 2003 PKI environment.
Module 4: Planning, Implementing, and Troubleshooting Smart Card Certificates

This module describes how to deploy, manage, and configure certificates and certificate templates in a public key infrastructure (PKI) environment.

Lessons
  • Introduction to Multifactor Authentication
  • Planning and Implementing a Smart Card Infrastructure
  • Managing and Troubleshooting a Smart Card Infrastructure
Lab : Implementing Smart Cards
  • Configuring a Smart Card Enrollment Station
  • Simulation: Enrolling Users for Smart Cards
After completing this module, students will be able to:
  • Describe the concepts of and applications for multifactor authentication.
  • Plan and implement a smart card infrastructure.
  • Manage and troubleshoot a smart card infrastructure.
Module 5: Planning, Implementing, and Troubleshooting Encrypting File System

This module describes how to plan, implement, and troubleshoot Encrypting File System (EFS).

Lessons
  • Introduction to EFS
  • Implementing EFS in a Standalone Microsoft Windows XP Environment
  • Planning and Implementing EFS in a Domain Environment
  • Implementing EFS File Sharing
  • Troubleshooting EFS
Lab : Planning, Implementing, and Troubleshooting Encrypting File System
  • Implementing Certificates to Support EFS
  • Configuring Group Policy to Support EFS
After completing this module, students will be able to:
  • Describe EFS and how it works.
  • Implement EFS in a standalone Microsoft Windows XP environment.
  • Plan and implement EFS in a domain environment that has a PKI.
  • Implement EFS file sharing.
  • Troubleshoot EFS problems.
Module 6: Planning, Configuring, and Deploying a Secure Member Server Baseline

The security of a network depends on the security configuration of the servers that make up the network. Any breach of security on a single server can jeopardize the security of all computers in the network, thereby jeopardizing the security of the network itself. In this module, students will learn how to create secure baselines for servers.

Lessons
  • Overview of a Member Server Baseline
  • Planning a Secure Member Server Baseline
  • Configuring Additional Security Settings
  • Deploying Security Templates
  • Securing Servers by Using the Security Configuration Wizard
Lab : Planning a Member Server Baseline
  • Planning a Secure Member Server Baseline
After completing this module, students will be able to:
  • Describe the components that make up a secure member server baseline.
  • Plan a secure member server baseline.
  • Configure additional security settings.
  • Deploy security templates.
  • Secure servers by using the Security Configuration Wizard (SCW).
Module 7: Planning, Configuring, and Implementing Secure Baselines for Server Roles

In this module, students will learn how to create secure baselines for various server roles.

Lessons
  • Planning and Configuring a Secure Baseline for Domain Controllers
  • Planning and Configuring a Secure Baseline for DNS Servers
  • Planning and Configuring a Secure Baseline for Infrastructure Servers
  • Planning a Secure Baseline for File and Print Servers
  • Planning and Configuring a Secure Baseline for IIS Servers
After completing this module, students will be able to:
  • Plan and configure a secure baseline for domain controllers.
  • Plan and configure a secure baseline for Domain Name System (DNS) servers.
  • Plan and configure a secure baseline for infrastructure servers.
  • Plan a secure baseline for file and print servers.
  • Plan and configure a secure baseline for Internet Information Services (IIS) servers.
Module 8: Planning, Configuring, Implementing, and Deploying a Secure Client Computer Baseline

In this module, students will learn how to create secure baselines for client computers.

Lessons
  • Planning and Implementing a Secure Client Computer Baseline
  • Securing Applications on Client Computers
  • Planning and Implementing a Software Restriction Policy
  • Implementing Security for Mobile Clients
Lab : Planning, Implementing, Configuring, and Deploying a Secure Client Computer Baseline
  • Planning Security Templates for Client Computers
  • Implementing Security Templates for Client Computers
After completing this module, students will be able to:
  • Plan a secure client computer baseline.
  • Secure applications on client computers.
  • Plan and implement a software restriction policy on client computers.
  • Implement security on mobile computers.
Module 9: Planning and Implementing Software Updates

In this module, students will learn how to plan and implement update management strategies on computers.

Lessons
  • Introduction to Software Update Management
  • Implementing Microsoft Baseline Security Analyzer
  • Installing Windows Server Update Services
  • Managing a WSUS Infrastructure
Lab : Planning and Implementing Software Updates
  • Configure MBSA Integration with WSUS Server
After completing this module, students will be able to:
  • Describe the need for update management and the tools that you can use to implement update management strategies.
  • Implement MBSA.
  • Install WSUS.
  • Manage a WSUS infrastructure.
Module 10: Planning, Deploying, and Troubleshooting Data Transmission Security

This module provides students with the information they need to plan and troubleshoot data transmission security.

Lessons
  • Secure Data Transmission Methods
  • Introducing IPSec
  • Planning and Implementing Data Transmission Security Using IPSec
  • Troubleshooting IPSec Communications
Lab : Implementing and Troubleshooting Data Transmission Security
  • Planning IPSec Security
  • Implementing IPSec Security
After completing this module, students will be able to:
  • Describe various methods for securing data transmission.
  • Describe the purpose and function of IPSec.
  • Plan and implement data transmission security using IPSec.
  • Troubleshoot IPSec communication.
Module 11: Planning and Implementing Security for Wireless Networks

A wireless network uses technology that enables two or more devices to communicate through standard network protocols and electromagnetic waves-not network cabling-to carry signals over part or all of the communication path. This module describes how to plan and implement security for wireless networks.

Lessons
  • Introduction to Securing Wireless Networks
  • Implementing 802.1x Authentication
  • Planning a Secure WLAN Strategy
  • Implementing a Secure WLAN
  • Troubleshooting Wireless Networks
Lab : Planning and Implementing Security for Wireless Networks
  • Configuring Active Directory for Wireless Networks
  • Configuring Certificate Templates and Certificate Autoenrollment
  • Configuring Remote Access Policies for Wireless Devices
  • Configuring Group Policy for Wireless Networks
After completing this module, students will be able to:
  • Describe the components and features of a secure wireless LAN (WLAN) and a wireless infrastructure.
  • Plan a secure WLAN infrastructure.
  • Implement a secure WLAN infrastructure.
  • Troubleshoot WLAN errors and components.
Module 12: Planning and Implementing Perimeter Security with Internet Security and Acceleration Server 2004

Networks in organizations today are commonly interconnected-various networks within an organization connect to each other, and corporate networks connect to the Internet. Although this presents new business opportunities, it can also cause concerns about security, performance, and manageability.

Lessons
  • Introduction to Internet Security and Acceleration Server 2004
  • Installing and Managing ISA Server 2004
  • Securing a Perimeter Network by Using ISA Server 2004
  • Publishing Servers on a Perimeter Network
  • Planning a Perimeter Network
  • Implementing a Perimeter Network
  • Securing an ISA Server 2000 Computer
After completing this module, students will be able to:
  • Describe the ISA Server 2004 features.
  • Install and manage ISA Server 2004.
  • Configure a perimeter network by using ISA Server 2004.
  • Publish servers on a perimeter network by using ISA Server 2004.
Module 13: Securing Remote Access

Remote access enables remote access clients to access corporate networks as if they were directly connected to the corporate network. The remote access clients connect to the network by using dial-up communication links. The security of a network is compromised if unauthorized remote users gain access to intranet-based resources. An effective network access security design ensures confirmation of the identity of the clients attempting to access your organization's network resources and protection of specific resources from inappropriate access by users.

Lessons
Introduction to Remote Access Technologies and Vulnerabilities
Planning a Remote Access Strategy
Deploying Network Access Quarantine Control Components

Lab : Implementing a Secure VPN Solution
  • Configuring a VPN Connection
  • Configuring the VPN Server for Remote Access Quarantine
  • Configuring a Connection Manager Service Profile
After completing this module, students will be able to:
  • Describe the various remote access technologies used for remote access and the threats associated with remote access.
  • Plan a remote access strategy.
  • Implement and configure a virtual private network (VPN) server.
  • Deploy Network Access Quarantine Control components.


Prerequisites & Certificates
Pre-Requisites

Before attending this course, students must have: - Completed MOC 2810 or equivalent knowledge. - Experience implementing a Windows 2000 or Windows Server 2003 Active Directory environment. Experience with organizational resources such as Web, FTP and Exchange servers, (not expected to have detailed knowledge) shared resources and network services such as DHCP, DNS and WINS also helpful.

Certificates offered

Certificate of Completion


Cancellation Policy
Cancellations or postponements received more than ten business days prior to the first day of the course will be fully refunded less a $75 processing fee. The cost of the course is payable, in full, for any cancellations or postponements received within ten business days, or less, prior to the first day of the course.
Map & Reviews
Acend Corporate Learning
[ View Provider's Profile ]

Reviews
 

This course has not yet been rated by one of our members.

If you have taken a course through this vendor please log into your account and leave feedback for this vendor. You will be helping ensure our members get directed to the best training facilities.

Here are some reviews of the training vendor.
The course content was excellent ... if there was things that weren't relevant you could skip and spend more time on things that you needed to learn. Training provider was excellent as her skill level was superb and her communication skills were superb.
Reviewed by 2015
This course should have dual screens
Reviewed by 2015
I was not able to finish the whole entire course. When creating course training please make sure that it fits the allotted time (beginning to the end). We had two breaks and Instructor did not allow us to listen to the course. I had maybe another 10 mins to finish the whole course, but the Instructor said that it was 4:30pm and it is Ok and we can go home. It is not Ok not to be able to finish the course..
Reviewed by 2014
Mentored training actually worked quite well for me. The instructor is there in the room all the time, available if needed. A lot of material for one day, but I did manage to complete it without feeling too rushed.
Reviewed by 2014
It is not possible to complete a beginner's course in one day. There is a lot of information to absorb. It is wonderful that one can re-sit a session within a limited time.
Reviewed by 2013
To bottom line my feelings about the course: Course -- helpful but this comment is made with reservations. Instructor -- excellent !
Reviewed by 2013
The course material was far too heavy for the duration of the course. The material needs to be reduced so that students do not feel rushed or pressured with time, or the duration of the class needs to be extended.
Reviewed by 2013
Overall, the course has been well handled by the Training Provider. But i would expect that, somehow, there is a time allotted in the afternoon for more visible and face to face interaction between the TP and the whole class. Others may be asking questions that may not have been thought of by other learners but may be helpful.
Reviewed by 2013
Very impressed and would highly recommend.
Reviewed by 2013
The trainer was excellent...easy to talk to and very helpful and informed.
Reviewed by 2013
This was a very good learning environment. I prefer having an instructor present in case I have questions but also be able to work at my own pace.
Reviewed by 2013
I could have used some more time to go through the exercises in the sharepoint database.
Reviewed by 2013
re Instructor assessment. ques. are N/A as it was independant mentored study. Flash based training module had 1 hiccup where ctrl-b key was captured by OS and I had to hunt for alt-b to complete the module. Class mentor was unaware of flaw. I felt that the design of the module would have prevented me from completing the section if I was unable to locate alternative keystroke. Worthwhile day.
Reviewed by 2012
Course is very good but not enough time to complete the exercises. Should be at least another 1.5 hours longer.
Reviewed by 2012
Using the self-teaching method made for a more relaxed working environment. As the instructor's assistance was on a one-on-one basis I was not hesitate to ask questions.
Reviewed by 2012
Would prefer an instructor led (classroom) style of training over a computer based course.
Reviewed by 2012
I would suggest that the course manual contain more visual material (e.g. screen shots) versus words. The course was very well. I did not think I would like the on line method of training but I did. I also liked the fact that I could work through my lunch to complete the course earlier. I had to catch the go train so it worked better for me.
Reviewed by 2012
Susan was an excellent instructor, and was very helpful with providing extra "tips" not covered within the course material.
Reviewed by 2012
I only realized after completing 2 units thoroughly that there is not enough time allotted for a lot practicing. I would tell students in advance that getting through the videos and practicing later in your own time is recommended.
Reviewed by 2012
Enjoyed the flexibility of the "Modern Classroom" style of learning where you can move at your own pace and focus on what you need most. You can even move to the next chapter if you need help and the instructor is busy. Definitely dress warmly as the classroom was really over air-conditioned!
Reviewed by 2012
I loved the Adobe InDesign course but as a new user I felt there was so much material to cover and I wanted to take my time getting familiar with the program and learning about everything. I think if the class had been 2 days instead of 1 it would have been perfect!
Reviewed by 2012
Manual provided was totally different then computer training. Expected more hands on training instead of just watching an instruction video.
Reviewed by 2012
Great
Reviewed by 2012
The video - was not at all interactive - only concepts were presented. The manual completedly different from the video material. I have no objections to using different approaches but a course on any software must include interactive materials.
Reviewed by 2012
The course was set up in a way which was easy to follow. However, I thought there was a lot of information to take in the day. The instructor was very helpful and very knowledgeable.
Reviewed by 2012
The training provider, Melanie, was exceptional. She was very knowledgeable and sat with me personally for hands on training. I found the course to be long and difficult to complete in one day.
Reviewed by 2012
The amount of material was a little much (maybe an hour) to cover in the allotted time - but otherwise good.
Reviewed by 2011
The room was too cold for me. The Instructor was very helpful.
Reviewed by 2011
A co worker of mine, did not receive the certificate of completing the course. As well, I received a website to log to after the course for 30 days (The Online Support). Although the vendor ID number does not exisit. I have gone back to my contact at Last Minute Training, and haven't received any feedback from her. The course was good, the follow up, was the greatest service.
Reviewed by 2011
Would like to have access to the on-line training materials for this course for a period of time after course completion
Reviewed by 2011
Hi - the server crashed during my session and I would like to reschedule. Can someone contact me to do this?
Reviewed by 2011
need-to-train-a-group-banner

This course currently does not have any dates scheduled. Please call 1-877-313-8881 to enquire about future dates or scheduling a private, in house course for your team.

This page has been viewed 600 times.