Learn: in:
» back to Search Results

Course rating of 0 Vendor rating of 4


This five-day course addresses the MCSA and MCSE skills path for IT Pro security practitioners, specifically addressing the training needs of those preparing for the 70-299 certification exam.


 
Course Outline

This five-day course addresses the MCSA and MCSE skills path for IT Pro security practitioners, specifically addressing the training needs of those preparing for the 70-299 certification exam.The primary product focus is on Microsoft Windows Server 2003 based infrastructure solutions but will include some client focused content where appropriate. This learning product is to provide functional skills in planning and implementing infrastructure security. This course is part of the Security Portfolio and will act as the primary entry point for IT Professionals at the implementation level. MOC 2810 will provide an entry point for students to broaden their awareness of security issues. Students will be encouraged to enhance their security design skills by attending MOC 2830

Audience Profile:
The course is for a system administrator or system engineer who has the foundation implementation skills and knowledge for the deployment of secure Microsoft Windows Server 2003 based solutions. This course is not intended to provide design skills, but will cover planning skills at a level sufficient to enable decision making for the implementation process.



 

Course Outline:


Module 1: Planning and Configuring an Authentication and Authorization Strategy

This module explains how to evaluate the infrastructure of your organization and create and document an authorization and authentication plan that allows the appropriate level of access to various security principals. It also describes trust relationships, domain and forest functional levels, and basic security principles.

Lessons:
Components of an Authentication Model
Planning and Implementing an Authentication Strategy
Groups and Basic Group Strategy in Windows Server 2003
Creating Trusts in Windows Server 2003
Planning, Implementing, and Maintaining an Authorization Strategy Using Groups

Lab : Planning and Configuring an Authentication and Authorization Strategy
Planning and Implementing a Resource Authorization Strategy
Planning and Implementing a Cross-Forest Authentication Strategy
Planning and Implementing an Authentication Policy

After completing this module, students will be able to:
Describe the components, tools, and protocols that support authentication.
Plan and implement an authentication strategy in a multi-forest organization.
Determine the necessary group structure for a multi-domain or multi-forest environment.
Create trusts in a Windows Server 2003 environment.
Plan, implement, and maintain an authorization strategy in a multi-forest organization.

Module 2: Installing, Configuring, and Managing Certification Authorities
This module describes the fundamentals of the systems that make secure communication possible. It describes methods, such as a public key infrastructure (PKI), that enable you to securely communicate on networks.

Lessons
Overview of a PKI
Introduction to Certification Authorities
Installing a Certification Authority
Managing a Certification Authority
Backing Up and Restoring a Certification Authority

Lab : Installing and Configuring a Certification Authority
Installing an Enterprise Subordinate Certification Authority
Backing up a Certification Authority

After completing this module, students will be able to:
Describe a PKI.
Describe the applications and components that are used in a PKI.
Install a certification authority.
Create and publish Certificate Revocation Lists (CRLs) and Authority Information Access (AIA) distribution points.
Back up and restore a certification authority.

Module 3: Configuring, Deploying, and Managing Certificates
This module explains how to ensure that the certificates are issued to the correct security principals and for the intended purpose. It describes, for example, how to make the deployment of certificates an easy and straightforward task for end users.

Lessons
Overview of Digital Certiificates
Deploying and Revoking User and Computer Certificates
Configuring Certificate Templates
Managing Certificates

Lab : Deploying and Managing Certificates
Configuring Multipurpose Certificate Templates
Configuring Certificate Autoenrollment
Updating a Certificate Template
Implementing a Key Archiving Strategy

After completing this module, students will be able to:
Configure certificate templates in a Microsoft Windows Server 2003 PKI environment.
Deploy, enroll, and revoke certificates in a Windows Server 2003 PKI environment.
Describe the applications and components that are used in a PKI.
Export, import, and archive certificates and keys in a Windows Server 2003 PKI environment.

Module 4: Planning, Implementing, and Troubleshooting Smart Card Certificates
This module describes how to deploy, manage, and configure certificates and certificate templates in a public key infrastructure (PKI) environment.

Lessons
Introduction to Multifactor Authentication
Planning and Implementing a Smart Card Infrastructure
Managing and Troubleshooting a Smart Card Infrastructure

Lab : Implementing Smart Cards
Configuring a Smart Card Enrollment Station
Simulation: Enrolling Users for Smart Cards

After completing this module, students will be able to:
Describe the concepts of and applications for multifactor authentication.
Plan and implement a smart card infrastructure.
Manage and troubleshoot a smart card infrastructure.

Module 5: Planning, Implementing, and Troubleshooting Encrypting File System
This module describes how to plan, implement, and troubleshoot Encrypting File System (EFS).

Lessons
Introduction to EFS
Implementing EFS in a Standalone Microsoft Windows XP Environment
Planning and Implementing EFS in a Domain Environment
Implementing EFS File Sharing
Troubleshooting EFS

Lab : Planning, Implementing, and Troubleshooting Encrypting File System
Implementing Certificates to Support EFS
Configuring Group Policy to Support EFS

After completing this module, students will be able to:
Describe EFS and how it works.
Implement EFS in a standalone Microsoft Windows XP environment.
Plan and implement EFS in a domain environment that has a PKI.
Implement EFS file sharing.
Troubleshoot EFS problems.

Module 6: Planning, Configuring, and Deploying a Secure Member Server Baseline
The security of a network depends on the security configuration of the servers that make up the network. Any breach of security on a single server can jeopardize the security of all computers in the network, thereby jeopardizing the security of the network itself. In this module, students will learn how to create secure baselines for servers.

Lessons
Overview of a Member Server Baseline
Planning a Secure Member Server Baseline
Configuring Additional Security Settings
Deploying Security Templates
Securing Servers by Using the Security Configuration Wizard

Lab : Planning a Member Server Baseline
Planning a Secure Member Server Baseline

After completing this module, students will be able to:
Describe the components that make up a secure member server baseline.
Plan a secure member server baseline.
Configure additional security settings.
Deploy security templates.
Secure servers by using the Security Configuration Wizard (SCW).

Module 7: Planning, Configuring, and Implementing Secure Baselines for Server Roles
In this module, students will learn how to create secure baselines for various server roles.

Lessons
Planning and Configuring a Secure Baseline for Domain Controllers
Planning and Configuring a Secure Baseline for DNS Servers
Planning and Configuring a Secure Baseline for Infrastructure Servers
Planning a Secure Baseline for File and Print Servers
Planning and Configuring a Secure Baseline for IIS Servers

After completing this module, students will be able to:
Plan and configure a secure baseline for domain controllers.
Plan and configure a secure baseline for Domain Name System (DNS) servers.
Plan and configure a secure baseline for infrastructure servers.
Plan a secure baseline for file and print servers.
Plan and configure a secure baseline for Internet Information Services (IIS) servers.
Module 8: Planning, Configuring, Implementing, and Deploying a Secure Client Computer Baseline
In this module, students will learn how to create secure baselines for client computers.

Lessons
Planning and Implementing a Secure Client Computer Baseline
Securing Applications on Client Computers
Planning and Implementing a Software Restriction Policy
Implementing Security for Mobile Clients

Lab : Planning, Implementing, Configuring, and Deploying a Secure Client Computer Baseline
Planning Security Templates for Client Computers
Implementing Security Templates for Client Computers

After completing this module, students will be able to:
Plan a secure client computer baseline.
Secure applications on client computers.
Plan and implement a software restriction policy on client computers.
Implement security on mobile computers.

Module 9: Planning and Implementing Software Updates
In this module, students will learn how to plan and implement update management strategies on computers.

Lessons
Introduction to Software Update Management
Implementing Microsoft Baseline Security Analyzer
Installing Windows Server Update Services
Managing a WSUS Infrastructure

Lab : Planning and Implementing Software Updates
Configure MBSA Integration with WSUS Server

After completing this module, students will be able to:
Describe the need for update management and the tools that you can use to implement update management strategies.
Implement MBSA.
Install WSUS.
Manage a WSUS infrastructure.

Module 10: Planning, Deploying, and Troubleshooting Data Transmission Security
This module provides students with the information they need to plan and troubleshoot data transmission security.

Lessons
Secure Data Transmission Methods
Introducing IPSec
Planning and Implementing Data Transmission Security Using IPSec
Troubleshooting IPSec Communications

Lab : Implementing and Troubleshooting Data Transmission Security
Planning IPSec Security
Implementing IPSec Security

After completing this module, students will be able to:
Describe various methods for securing data transmission.
Describe the purpose and function of IPSec.
Plan and implement data transmission security using IPSec.
Troubleshoot IPSec communication.

Module 11: Planning and Implementing Security for Wireless Networks
A wireless network uses technology that enables two or more devices to communicate through standard network protocols and electromagnetic waves-not network cabling-to carry signals over part or all of the communication path. This module describes how to plan and implement security for wireless networks.

Lessons
Introduction to Securing Wireless Networks
Implementing 802.1x Authentication
Planning a Secure WLAN Strategy
Implementing a Secure WLAN
Troubleshooting Wireless Networks

Lab : Planning and Implementing Security for Wireless Networks
Configuring Active Directory for Wireless Networks
Configuring Certificate Templates and Certificate Autoenrollment
Configuring Remote Access Policies for Wireless Devices
Configuring Group Policy for Wireless Networks

After completing this module, students will be able to:
Describe the components and features of a secure wireless LAN (WLAN) and a wireless infrastructure.
Plan a secure WLAN infrastructure.
Implement a secure WLAN infrastructure.
Troubleshoot WLAN errors and components.

Module 12: Planning and Implementing Perimeter Security with Internet Security and Acceleration Server 2004
Networks in organizations today are commonly interconnected-various networks within an organization connect to each other, and corporate networks connect to the Internet. Although this presents new business opportunities, it can also cause concerns about security, performance, and manageability.

Lessons
Introduction to Internet Security and Acceleration Server 2004
Installing and Managing ISA Server 2004
Securing a Perimeter Network by Using ISA Server 2004
Publishing Servers on a Perimeter Network
Planning a Perimeter Network
Implementing a Perimeter Network
Securing an ISA Server 2000 Computer

After completing this module, students will be able to:
Describe the ISA Server 2004 features.
Install and manage ISA Server 2004.
Configure a perimeter network by using ISA Server 2004.
Publish servers on a perimeter network by using ISA Server 2004.

Module 13: Securing Remote Access
Remote access enables remote access clients to access corporate networks as if they were directly connected to the corporate network. The remote access clients connect to the network by using dial-up communication links. The security of a network is compromised if unauthorized remote users gain access to intranet-based resources. An effective network access security design ensures confirmation of the identity of the clients attempting to access your organization's network resources and protection of specific resources from inappropriate access by users.

Lessons
Introduction to Remote Access Technologies and Vulnerabilities
Planning a Remote Access Strategy
Deploying Network Access Quarantine Control Components

Lab : Implementing a Secure VPN Solution
Configuring a VPN Connection
Configuring the VPN Server for Remote Access Quarantine
Configuring a Connection Manager Service Profile

After completing this module, students will be able to:
Describe the various remote access technologies used for remote access and the threats associated with remote access.
Plan a remote access strategy.
Implement and configure a virtual private network (VPN) server.
Deploy Network Access Quarantine Control components.



With (R)Evolution, TekSource is transforming the way IT professionals receive training. Our courses are led by Certified Instructors and supported by online course mentors. Course content is delivered through expert video modules and interactive features, in tandem with virtual lab exercises and progress quizzes. When you take training with TekSource, you get a comprehensive training solution that incorporates the following value add components into one “revolutionary” offering:

Pre-class Facilitation

We start the learning process well before you arrive at our door with lots of communication and information. Our instructors, coordinators and facilitators will ensure that when course participants arrive, they will have all the tools they need to be successful and students will have already started to learn

In our Facility with Certified instructors
With (R)Evolution, each course is supported by a certified instructor who facilitates, coaches and mentors the students through the learning process - their only job is to ensure our students’ success. Students attend class in one day increments (which can be non-consecutive days for multi-day courses).
    * Since the course content is provided by the expert video modules, the in-class instructor can devote 100% of their time to individual instruction and guidance.
    * Our exclusive consultative learning approach ensures that the needs of each student are assessed and support during and subsequent to the course is tailored to them.

Expert Video Modules
(R)Evolution guarantees consistent, high quality instruction, and uniform delivery of the course material mapped to official vendor course curriculum with no missed topics.
    * Content is delivered by World Class Experts and Certified Trainers and it has been edited and produced so that students are presented the best possible delivery of the course material.
    * Self Scheduled progress matches the learning speed of each student – it allows for instant review, and results in improved retention.

Interactive Content
Throughout the Learning experience, instruction is reinforced with practical exercises, lab exercises completed in live lab environments and progress checks that give immediate feedback to the student regarding their progress.
    * Keeps students engaged, on track and in line with their objectives
    * Provides instant feedback, real time results and acts as a measure for the instructor to provide further mentorship

Online Mentoring and Support
The online mentoring support that is included with (R)Evolution starts when the student enters the classroom and continues for 6 months. As both a 3rd training resource in the classroom and as a valuable support service that is available 24/7, students have yet another mechanism to support their learning.
    * Reinforces learning and acts as a support during the classroom session
    * Assistance applying course concepts
    * Access to our facility and ability to re-take some or all of the training is absolute assurance that required learning is received


Prerequisites & Certificates
Pre-Requisites

Before attending this course, students must have: Completed MOC 2810 or equivalent knowledge. Experience implementing a Windows 2000 or Windows Server 2003 Active Directory environment. Experience with organizational resources such as Web, FTP and Exchange servers, (not expected to have detailed knowledge) shared resources and network services such as DHCP, DNS and WINS also helpful.

Certificates offered

Certificate of Completion


Cancellation Policy
Cancellations or postponements received more than ten business days prior to the first day of the course, will be subject to a 15% administration fee, and course ware fees where applicable. The cost of the course is payable, in full, for any cancellations or postponements received within ten business days, or less, prior to the first day of the course.

Map & Reviews
TekSource Corporate Learning
[ View Provider's Profile ]

Reviews
 

This course has not yet been rated by one of our members.

If you have taken a course through this vendor please log into your account and leave feedback for this vendor. You will be helping ensure our members get directed to the best training facilities.

Here are some reviews of the training vendor.
A quick note to say thanks very much for the information I garnered at the course. The training was very informative and practical; the handout material contains a lot of information that will be helpful in future.
Reviewed by 2014
I found the course to be useful and easy to follow. Would use their service again.
Reviewed by 2014
I really enjoyed this training session, I found it incredible helpful for our needs of customizing our CRM. The instructor was good
Reviewed by 2013
By choice, and as I didn't want to disturb the man next to me, I didn't ask to many questions of the instructor. I realize that taking the same course at the same time would have been ideal, but I understand why we were put in the same space. I had a few computer glitches which shuffled the course material around a bit which I eventually found a work around for. A lot of material for one day and I did find myself paying attention to the clock to make sure I finished at a reasonable time.
Reviewed by 2012
very well organized and flexible. Helped me with my specific needs. Steve was very helpful.
Reviewed by 2012
I thought that the course content was excellent, it covered a wide variety of new features in 2010 at a sufficeint level of detail. The video instructor was also very diliegent about highlighting the various ribbon features and showing alternate methods of completing a task. This teaching method may not be for everyone, but I enjoyed the ability to learn at my own pace, without being slowed down by questions that were not relevant to me. It would be nice to have better control over the video streaming in order to skip over/ahead on topics that are familiar to the user.
Reviewed by 2012
the instructor was very knowledgeable, and most importantly patient.
Reviewed by 2012
Found that the advance training was where my level was at already on most items (wishing there was a super advanced training). Found the ‘instructor’ not to be conversant on the program I was being trained on (probably the same level as I was) which was frustrating. He did ask other personnel which did have more knowledge but did not give me a clear answer (said it was part of the limits of the program and what I was looking for was very customized, duh this is why I took the advanced) He was willing to go over the ideas of tables and relationships with me which was not covered in the course, which I was thankful for. The course did delivered though what it had said it would and it was good to get reinforcement on what I had learned on my own, that I was on the right track.
Reviewed by 2012
The course was really useful for me.
Reviewed by 2012
over all it is a good experience and I learnt something out of it.
Reviewed by 2012
Course content was not as comprehensive as I'd hoped. Would have liked more indepth lessons about macros.
Reviewed by 2012
It would be great to separate two different session for the topic. It was usufull and meantime it was too much information.
Reviewed by 2012
Hi, There was one problem with the flow. I'm not completely sure as to how best to describe it but basically, it didn't flow from one module to the next. Specifically, if I was in a particular module (say the introduction or first sub-module) and it completed, I was not automatically taken to the next sub-module within the overall module (a module being a section of the course). Feel free to give me a call to discuss at 416-686-3141.
Reviewed by 2012
The first hour of the course was difficult due to the noisy environment. There were 3 separate software platforms being mentored by 2 instructors simultaneously. As each required unique start up instructions, it was very difficult to concentrate on the video teaching for my session in spite of the headphones as there was a significant amount of background noise. I suggest that future sessions that are mentored rather than led be done as dedicated sessions (i.e. only 1 software platform being taught at a time) to minimize the impact of this situation. Additionally, the 2 instructors had side conversations that had nothing to do with teaching the sessions and needed to be asked not to do this as I found it was hindering my ability to listen to the video lesson. Unwilling to crank the volume on the headset, I could hear them clearly over the top of the lesson I was listening to.
Reviewed by 2012
Everyone was extremely laid back, kind and courteous. I felt very comfortable and no matter who you were in contact with, all employees were approachable.
Reviewed by 2012
While the instructor had a basic understanding of Project 2010, he did not have "advanced" knowledge which was the level of the course. He had not really used the software in "real life" so didn't have any context. Whenever I had questions, he looked for answers from microsoft.com (I could have done the same). I was hoping the instructor would provided added knowledge to what I was learning from the videos.
Reviewed by 2012
Fantastic and very relevant. The instructor was very pleasant and helpful.
Reviewed by 2012
Too many mistakes made in the videos, this made it confusing about what to follow and what to avoid. Seminar presenter got off-topic too much which made me pressed for time.
Reviewed by 2011
There really is not enough time in one day to do all the exersizes in the training manual, watch all the videos, take the quizzes, and discuss specifc issues with the instructor. I would suggest improving the video intruction to actual take you through some of the exersizes rather than leaving you to do it on your own, because you really only learn by doing.
Reviewed by 2011
Thought the directions in the book exercises exercises could be written a little clearer.
Reviewed by 2011
My second course with TekSource and it's always an enjoyable experience. It's a nice clean office environment close to the subway. And the staff is excellent and helpful.
Reviewed by 2011
Not instructor led hence one star rating
Reviewed by 2011
The only somewhat critical comment I have is that it can be difficult to concentrate when the mentor is explaining to another student. In a small classroom setting, I guess that is just a reality of mentor-assisted training.
Reviewed by 2011
Steve Meggenson understand French. He helped me a lot with my documents from work. Now I know how to use Access for my work. I should take this course 5 years ago! But, it's not too late! I want to take the monitored or coach course with Steve again because he can read and understand french!
Reviewed by 2011
I wish that there had been more examples and more exercises for pivot tables and vlook up. They are very valuable tools.
Reviewed by 2011
Very positive experience.
Reviewed by 2011
need-to-train-a-group-banner

This course currently does not have any dates scheduled. Please call 1-877-313-8881 to enquire about future dates or scheduling a private, in house course for your team.

This page has been viewed 583 times.