Learn: in:
» back to Search Results

Course rating of 0 Vendor rating of 4


This three-day instructor-led course provides you with the knowledge and skills to design a secure network infrastructure.


 
Course Outline

About this Course:
Elements of this syllabus are subject to change.
This three-day instructor-led course provides you with the knowledge and skills to design a secure network infrastructure. Topics include assembling the design team, modeling threats, and analyzing security risks in order to meet business requirements for securing computers in a networked environment. The course encourages decision-making skills through real-life scenarios that the target audience may encounter. You are given the task of collecting the information and sorting through the details to resolve the given security requirement.

Audience Profile:
This course is intended for IT systems engineers and security specialists who are responsible for establishing security policies and procedures for an organization. Students should have one to three years of experience designing related business solutions.

At Course Completion:
After completing this course, students will be able to:
Plan a framework for network security.
Identify threats to network security.
Analyze security risks.
Design security for physical resources.
Design security for computers.
Design security for accounts and services.
Design security for authentication.
Design security for data.
Design security for data transmission.
Design security for network perimeters.
Design an incident response procedure.
In addition, this course contains three teachable appendices that cover:
Designing an acceptable use policy.
Designing policies for managing networks.
Designing an operations framework for managing security


  Course Outline:


Module 1: Introduction to Designing Security
A security design is a comprehensive plan that guides the implementation of security policies and procedures for an organization. A security design helps an organization to organize its assets to implement security in a consistent and effective manner. This module describes the basic framework for designing network security and introduces key concepts used throughout the course. It also introduces a fictional organization which the labs in the course use as an ongoing case study.

Lessons
Introduction to Designing Security for Microsoft Networks
Contoso Pharmaceuticals: A Case Study

After completing this module, students will be able to:
Provide an overview of designing security for Microsoft networks.
Describe the components of the case study for this course.

Module 2: Creating a Plan for Network Security
Plans for network security include documented security policies and procedures. These policies and procedures, when implemented, help to secure networks against compromises. This module describes the importance of security policies and procedures in a security design, and explains how a security design team must include representation from various members of the organization. The module also introduces the Microsoft Solutions Framework (MSF) process model, which provides a comprehensive framework that can be used to create a security design.

Lessons
Introduction to Security Policies
Designing Security by Using a Framework
Creating a Security Design Team

Lab : Creating a Plan for Network Security
Exercise 1: Identifying Reasons Why Security Policies Fail
Exercise 2: Determining the Members of a Security Design Team

After completing this module, students will be able to:
Describe common elements of security policies and procedures.
Create a security design framework by using the MSF process model.
Create a security design team.

Module 3: Identifying Threats to Network Security
Without security measures and controls in place, your data may be subjected to an attack. Some attacks are passive, which means that information is monitored; others are active, which means that the information is altered with intent to corrupt or destroy the data or the network itself. Your networks and data are vulnerable to any of these types of attacks if you do not have a security plan in place.

In this module, you will learn how to identify possible threats to a network and understand common motivations of attackers. The module introduces the STRIDE (Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, Elevation of privilege) threat model as an effective way to predict where threats may occur in an organization.

Lessons
Introduction to Security Threats
Predicting Threats to Security

Lab : Identifying Threats to Network Security
Exercise 1: Identifying and Categorizing Threats by Using a Threat Model
Exercise 2: Documenting Security Threats

After completing this module, students will be able to:
Explain common network vulnerabilities and how attackers can exploit them.
Predict threats to security by using a threat model.

Module 4: Analyzing Security Risks
Many organizations cannot react to new security threats before their business is affected. Managing the security of their infrastructures—and the business value that those infrastructures deliver—has become a primary concern for information technology (IT) departments.

The Microsoft approach to security risk management is proactive and can assist organizations of all sizes with their response to the requirements presented by these environmental and legal challenges. A formal security risk management process enables enterprises to operate in the most cost-efficient manner by adopting a known and acceptable level of business risk. It also gives organizations a consistent, clear path to organize and prioritize limited resources in order to manage risk.

In this module, you will learn how to determine what resources in your organization require protection and how to prioritize those resources based on their value. You will then develop a risk management plan, based on the MOF risk model, to identify and analyze risks proactively and to determine an appropriate level of protection for each resource.

Lessons
Introduction to Risk Management
Creating a Risk Management Plan

Lab : Analyzing Security Risks
Exercise 1: Applying Quantitative and Qualitative Risk Analysis

After completing this module, students will be able to:
Explain the purpose and operation of risk management.
Create a risk management plan.

Module 5: Designing Physical Security for Network Resources
Physical security refers to physical measures designed to safeguard personnel, property, and information. The term applies to architectural features such as location, layout, barriers, doors, locks and bolts, and lighting, but also includes measures such as access control systems, alarm systems, and CCTV systems.

In this module, you will determine threats and analyze physical risks to resources in an organization. You will then learn how to design security for facilities, computers, mobile devices, and hardware. You will also learn about implementing disaster recovery as a way to protect physical resources. This module focuses on physical access to resources and how to protect them. Other modules will focus on access to data and how to protect it.

Lessons
Creating a Plan for Physical Security
Creating a Design for Physical Security of Network Resources

Lab : Designing Physical Security for Network Resources
Exercise 1: Identifying Potential Physical Vulnerabilities
Exercise 2: Implementing Countermeasures

After completing this module, students will be able to:
Create a plan for physical security.
Create a design for physical security of network resources.

Module 6: Designing Security for Network Hosts
The Windows Server 2003, Windows XP Professional, and Windows Vista operating systems provide many features and capabilities that you can use to configure and maintain a secure network operating environment. In fact, there are security capabilities in nearly every area of Windows. Many of these security features and capabilities have been added or enhanced since the introduction of the Microsoft Windows 2000 Professional and Windows 2000 Server operating systems.

In this module, you will learn how to determine threats and analyze risks to network hosts in an organization. You will also learn how to design security for network hosts throughout their life cycles, from initial purchase to decommissioning.

Lessons
Creating a Security Plan for Network Hosts
Creating a Design for the Security of Network Hosts

Lab : Designing Security for Network Hosts
Exercise 1: Identifying Vulnerabilities When Applying Security Updates
Exercise 2: Identifying Vulnerabilities When Decommissioning Computers
After completing this module, students will be able to:
Create a security plan for network hosts.
Create a design for the security of network hosts.

Module 7: Designing Security for Accounts and Services
Computer networks use accounts to grant users, applications, and network services access to the information on a network. Network services are server applications that are usually hosted on dedicated server computers.

If an attacker gains access to an account that has excessive privileges, or breaks the password that is associated with an account, the attacker can obtain authorized access to a network.

Windows services are executable programs that run in sessions outside the session that the user who is currently logged on is using. In this way, services run in the background, independent of any user session. Services can start automatically when the computer starts, and can also be paused and restarted. Services may not show a user interface, although they typically communicate with a user interface to control and administer the service. Because of this behavior, services are ideal for use on a server or whenever you require long-term functionality that does not interfere with other users who are working on the same computer. In addition to services that Microsoft has created, many third-party vendors design products to be deployed as services running continuously in the background. Antivirus services are an example of this type of product.

In this module, you will learn how to determine threats and analyze risks to accounts and services in an organization. You will also learn how to design security for accounts and services, including determining security requirements, creating policies, and designing strategies to manage security.

Lessons
Creating a Security Plan for Accounts
Creating a Security Plan for Services
Creating a Design for Security of Accounts and Services

Lab : Designing Security for Accounts and Services
Exercise 1: Identifying Potential Account Vulnerabilities
Exercise 2: Applying Countermeasures

After completing this module, students will be able to:
Create a security plan for accounts.
Create a security plan for services.
Create a design for security of accounts and services.

Module 8: Designing Security for Authentication
In this module, you will learn how to determine threats and analyze risks to authentication. You will learn how to design security for authenticating local users, remote users, and users who access your network across the Internet. You will also learn when to choose multifactor authentication for additional security.

Lessons
Creating a Security Plan for Authentication
Creating a Design for Security of Authentication

Lab : Designing Security for Authentication
Exercise 1: Identifying Potential Authentication Vulnerabilities
Exercise 2: Applying Countermeasures

After completing this module, students will be able to:
Create a security plan for authentication.
Create a design for security of authentication.

Module 9: Designing Security for Data
Business data is one of the most valuable resources in many organizations. If data were to be irreparably damaged, lost, or exposed to competitors, many organizations would be adversely affected and perhaps even driven out of business. For client hosts, protecting data can be particularly daunting because portable computers can be stolen from mobile users, and backing up data for mobile users is very difficult. Protecting data that is stored on servers is still a significant challenge, but for most organizations it is one that is achievable. For these reasons, many companies require their end users to store their critical data on servers managed by their information technology (IT) department. Data can be protected through the use of access control lists (ACLs) on files and folders, by using encryption, and by using an effective backup and restore strategy.

In this module, you will learn how to determine threats and analyze risks to data in an organization. You will learn how to design an access control model for files and folders in order to protect data that is stored on network servers. You will also learn about considerations for encrypting and managing data.

Lessons
Creating a Security Plan for Data
Creating a Design for Security of Data

Lab : Designing Security for Data
Exercise 1: Identifying Potential Data Vulnerabilities
Exercise 2: Designing Countermeasures

After completing this module, students will be able to:
Create a security plan for data.
Create a design for security of data.

Module 10: Designing Security for Data Transmission
In this module, you will learn how to determine threats and analyze risks to data transmission in an organization. You will also learn how to design security for various types of data transmission, including traffic on local area networks (LANs), wide area networks (WANs), Virtual Private Networks (VPNs), wireless networks, and the Internet.

Lessons
Creating a Security Plan for Data Transmission
Creating a Design for Security of Data Transmission

Lab : Designing Security for Data
Exercise 1: Identifying Potential Data Transmission Vulnerabilities
Exercise 2: Implementing Countermeasures

After completing this module, students will be able to:
Create a security plan for data transmission.
Create a design for security of data transmission.

Module 11: Designing Security for Network Perimeters
Properly configured firewalls and border routers are the cornerstone of perimeter security. However, all of these devices must be properly secured because the entire network is put at risk when any one of them is compromised. Organizations must therefore invest time and resources in securing not only the Virtual Private Network (VPN) servers and the remote access servers (RAS), but also the mobile computers that are used to connect to those servers. To do business on and through the Internet, organizations must make some of their business applications and data accessible through the Internet. Traditional packet-filtering firewalls block network ports and computer addresses, but ports must be opened for the business applications. This means that your organization requires firewalls or proxy servers that are application-aware and capable of filtering network traffic at the application layer.

In this module, you will learn how to determine threats and analyze risks to network perimeters. You will also learn how to design security for network perimeters, including perimeter networks (also known as DMZs, demilitarized zones, and screened subnets), and for computers that connect directly to the Internet.

Lessons
Creating a Security Plan for the Perimeter of a Network
Creating a Design for Security of Network Perimeters

Lab : Designing Security Network Perimeters
Exercise 1: Identifying Potential Perimeter Network Vulnerabilities
Exercise 2: Implementing Countermeasures

After completing this module, students will be able to:
Create a security plan for the perimeter of a network.
Create a design for security of network perimeters.

Module 12: Responding to Security Incidents
Network security for an organization is an exercise in prevention. A good security design that is properly implemented will prevent most of the most common attacks. However, it is very likely that an attacker will eventually penetrate the defenses that you design.

When an attack happens, the key to limiting damage is early detection and a rapid and orderly response. Auditing is an important tool to help you to detect network abnormalities that may indicate attacks. An incident response procedure is a series of steps that you design in advance to guide your organization during a security incident.

Lessons
Introduction to Auditing and Incident Response
Designing an Audit Policy
Designing and Incident Response Procedure

Lab : Responding to Security Incidents
Exercise 1: Identifying Potential Vulnerabilities
Exercise 2: Implementing an Incident Response Team
Exercise 3: Implementing an Incident Response Plan

After completing this module, students will be able to:
Describe auditing and incident response.
Design an audit policy.
Design an incident response procedure.

Module 13: Appendix A: Designing an Acceptable Use Policy
This appendix provides information about creating policies for acceptable use of network resources by users.

Lessons
Analyzing Risks That Users Introduce
Designing Security for Computer Use

Module 14: Appendix B: Designing Policies for Managing Networks
This appendix offers guidelines for ensuring that network administrators manage networks in a secure manner.

Lessons
Analyzing Risks to Managing Networks
Designing Security for Managing Networks

Module 15: Appendix C: Designing an Operations Framework to Manage Security
This appendix explains how to create a framework to ensure security of a network as the network changes and as the security requirements of the organization change.

Lessons
Analyzing Risks to Ongoing Network Operations
Designing a Framework for Ongoing Network Operations



With (R)Evolution, TekSource is transforming the way IT professionals receive training. Our courses are led by Certified Instructors and supported by online course mentors. Course content is delivered through expert video modules and interactive features, in tandem with virtual lab exercises and progress quizzes. When you take training with TekSource, you get a comprehensive training solution that incorporates the following value add components into one “revolutionary” offering:

Pre-class Facilitation

We start the learning process well before you arrive at our door with lots of communication and information. Our instructors, coordinators and facilitators will ensure that when course participants arrive, they will have all the tools they need to be successful and students will have already started to learn

In our Facility with Certified instructors
With (R)Evolution, each course is supported by a certified instructor who facilitates, coaches and mentors the students through the learning process - their only job is to ensure our students’ success. Students attend class in one day increments (which can be non-consecutive days for multi-day courses).
    * Since the course content is provided by the expert video modules, the in-class instructor can devote 100% of their time to individual instruction and guidance.
    * Our exclusive consultative learning approach ensures that the needs of each student are assessed and support during and subsequent to the course is tailored to them.

Expert Video Modules
(R)Evolution guarantees consistent, high quality instruction, and uniform delivery of the course material mapped to official vendor course curriculum with no missed topics.
    * Content is delivered by World Class Experts and Certified Trainers and it has been edited and produced so that students are presented the best possible delivery of the course material.
    * Self Scheduled progress matches the learning speed of each student – it allows for instant review, and results in improved retention.

Interactive Content
Throughout the Learning experience, instruction is reinforced with practical exercises, lab exercises completed in live lab environments and progress checks that give immediate feedback to the student regarding their progress.
    * Keeps students engaged, on track and in line with their objectives
    * Provides instant feedback, real time results and acts as a measure for the instructor to provide further mentorship

Online Mentoring and Support
The online mentoring support that is included with (R)Evolution starts when the student enters the classroom and continues for 6 months. As both a 3rd training resource in the classroom and as a valuable support service that is available 24/7, students have yet another mechanism to support their learning.
    * Reinforces learning and acts as a support during the classroom session
    * Assistance applying course concepts
    * Access to our facility and ability to re-take some or all of the training is absolute assurance that required learning is received.


Prerequisites & Certificates
Pre-Requisites

A strong familiarity with Windows Server 2003 core technologies, such as those covered in Microsoft Official Curriculum (MOC) Course 2273: Managing and Maintaining a Microsoft Windows Server 2003 Environment. A strong familiarity with Windows Server 2003 networking technologies and implementation, such as those covered in: MOC Course 2276: Implementing a Microsoft Windows Server 2003 Network Infrastructure: Network Hosts, and MOC Course 2277: Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services, and MOC Course 2278: Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure. A strong familiarity with Windows Server 2003 directory services technologies and implementation, such as those covered in MOC Course 2279: Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.

Certificates offered

Certificate of Completion


Cancellation Policy
Cancellations or postponements received more than ten business days prior to the first day of the course, will be subject to a 15% administration fee, and course ware fees where applicable. The cost of the course is payable, in full, for any cancellations or postponements received within ten business days, or less, prior to the first day of the course.

Map & Reviews
TekSource Corporate Learning
[ View Provider's Profile ]

Reviews
 

This course has not yet been rated by one of our members.

If you have taken a course through this vendor please log into your account and leave feedback for this vendor. You will be helping ensure our members get directed to the best training facilities.

Here are some reviews of the training vendor.
A quick note to say thanks very much for the information I garnered at the course. The training was very informative and practical; the handout material contains a lot of information that will be helpful in future.
Reviewed by 2014
I found the course to be useful and easy to follow. Would use their service again.
Reviewed by 2014
I really enjoyed this training session, I found it incredible helpful for our needs of customizing our CRM. The instructor was good
Reviewed by 2013
By choice, and as I didn't want to disturb the man next to me, I didn't ask to many questions of the instructor. I realize that taking the same course at the same time would have been ideal, but I understand why we were put in the same space. I had a few computer glitches which shuffled the course material around a bit which I eventually found a work around for. A lot of material for one day and I did find myself paying attention to the clock to make sure I finished at a reasonable time.
Reviewed by 2012
very well organized and flexible. Helped me with my specific needs. Steve was very helpful.
Reviewed by 2012
I thought that the course content was excellent, it covered a wide variety of new features in 2010 at a sufficeint level of detail. The video instructor was also very diliegent about highlighting the various ribbon features and showing alternate methods of completing a task. This teaching method may not be for everyone, but I enjoyed the ability to learn at my own pace, without being slowed down by questions that were not relevant to me. It would be nice to have better control over the video streaming in order to skip over/ahead on topics that are familiar to the user.
Reviewed by 2012
the instructor was very knowledgeable, and most importantly patient.
Reviewed by 2012
Found that the advance training was where my level was at already on most items (wishing there was a super advanced training). Found the ‘instructor’ not to be conversant on the program I was being trained on (probably the same level as I was) which was frustrating. He did ask other personnel which did have more knowledge but did not give me a clear answer (said it was part of the limits of the program and what I was looking for was very customized, duh this is why I took the advanced) He was willing to go over the ideas of tables and relationships with me which was not covered in the course, which I was thankful for. The course did delivered though what it had said it would and it was good to get reinforcement on what I had learned on my own, that I was on the right track.
Reviewed by 2012
The course was really useful for me.
Reviewed by 2012
over all it is a good experience and I learnt something out of it.
Reviewed by 2012
Course content was not as comprehensive as I'd hoped. Would have liked more indepth lessons about macros.
Reviewed by 2012
It would be great to separate two different session for the topic. It was usufull and meantime it was too much information.
Reviewed by 2012
Hi, There was one problem with the flow. I'm not completely sure as to how best to describe it but basically, it didn't flow from one module to the next. Specifically, if I was in a particular module (say the introduction or first sub-module) and it completed, I was not automatically taken to the next sub-module within the overall module (a module being a section of the course). Feel free to give me a call to discuss at 416-686-3141.
Reviewed by 2012
The first hour of the course was difficult due to the noisy environment. There were 3 separate software platforms being mentored by 2 instructors simultaneously. As each required unique start up instructions, it was very difficult to concentrate on the video teaching for my session in spite of the headphones as there was a significant amount of background noise. I suggest that future sessions that are mentored rather than led be done as dedicated sessions (i.e. only 1 software platform being taught at a time) to minimize the impact of this situation. Additionally, the 2 instructors had side conversations that had nothing to do with teaching the sessions and needed to be asked not to do this as I found it was hindering my ability to listen to the video lesson. Unwilling to crank the volume on the headset, I could hear them clearly over the top of the lesson I was listening to.
Reviewed by 2012
Everyone was extremely laid back, kind and courteous. I felt very comfortable and no matter who you were in contact with, all employees were approachable.
Reviewed by 2012
While the instructor had a basic understanding of Project 2010, he did not have "advanced" knowledge which was the level of the course. He had not really used the software in "real life" so didn't have any context. Whenever I had questions, he looked for answers from microsoft.com (I could have done the same). I was hoping the instructor would provided added knowledge to what I was learning from the videos.
Reviewed by 2012
Fantastic and very relevant. The instructor was very pleasant and helpful.
Reviewed by 2012
Too many mistakes made in the videos, this made it confusing about what to follow and what to avoid. Seminar presenter got off-topic too much which made me pressed for time.
Reviewed by 2011
There really is not enough time in one day to do all the exersizes in the training manual, watch all the videos, take the quizzes, and discuss specifc issues with the instructor. I would suggest improving the video intruction to actual take you through some of the exersizes rather than leaving you to do it on your own, because you really only learn by doing.
Reviewed by 2011
Thought the directions in the book exercises exercises could be written a little clearer.
Reviewed by 2011
My second course with TekSource and it's always an enjoyable experience. It's a nice clean office environment close to the subway. And the staff is excellent and helpful.
Reviewed by 2011
Not instructor led hence one star rating
Reviewed by 2011
The only somewhat critical comment I have is that it can be difficult to concentrate when the mentor is explaining to another student. In a small classroom setting, I guess that is just a reality of mentor-assisted training.
Reviewed by 2011
Steve Meggenson understand French. He helped me a lot with my documents from work. Now I know how to use Access for my work. I should take this course 5 years ago! But, it's not too late! I want to take the monitored or coach course with Steve again because he can read and understand french!
Reviewed by 2011
I wish that there had been more examples and more exercises for pivot tables and vlook up. They are very valuable tools.
Reviewed by 2011
Very positive experience.
Reviewed by 2011
need-to-train-a-group-banner

This course currently does not have any dates scheduled. Please call 1-877-313-8881 to enquire about future dates or scheduling a private, in house course for your team.

This page has been viewed 586 times.