Learn: in:
» back to Search Results

Course rating of 0 Vendor rating of 4

This four-day, instructor-led course provides the knowledge to begin supporting network security within an organization. Upon completion you'll be able to identify security threats & vulnerabilities, & help respond to & recover from security incidents.

Course Outline
This four-day, instructor-led course provides students with the knowledge and skills to begin supporting network security within an organization. Students who complete this course will be able to identify security threats and vulnerabilities, and help respond to and recover from security incidents.

This course will cover security concepts that are prerequisites for attending other Microsoft Official Curriculum (MOC) courses for security specialists and help prepare students for the CompTIA Security+ exam.

This course has been approved as CompTIA Authorized Quality Curriculum (CAQC) for the CompTIA Security+ certification. The CAQC program assures students that all test objectives for the CompTIA Security+ certification exam are covered in the course materials.

Although the course focuses on Microsoft product- and technology-specific implementation of security concepts, many of these same concepts can be applied to other technologies.

This course is designed for administrators who are responsible for the day-to-day administration of Microsoft Windows® 2000. Students should have general knowledge of networking concepts and one or more years of experience managing Windows 2000. Other IT professionals may also take this course on the path to becoming a security specialist. 

At Course Completion
After completing this course, students will be able to:
    * Explain common attacks against network assets, the associated threats and vulnerabilities, and what network security personnel do to secure assets.
    * Explain how to use cryptography to secure information and how to choose an appropriate encryption method for an organization.
    * Implement secure computing baselines in an organization.
    * Secure information in an organization by using authentication and access control.
    * Deploy and manage certificates.
    * Secure data transmission by identifying threats to network devices and implementing security for common data transmission, remote access, and wireless network traffic.
    * Secure Web servers against common attacks and configure security for Web browsers.
    * Protect e-mail messages and instant messaging from common security threats.
    * Identify common security threats and vulnerabilities to directory services and DNS, and then apply security methods to protect them.
    * Identify network perimeter threats and monitor perimeter security for a network.
    * Identify types of security policies to manage operational security, and then use these policies to ensure compliance by users in an organization.
    * Preserve business continuity by implementing a secure disaster recovery strategy, communicating risks to others, and performing secure backup and recovery.
    * Identify, respond to, and assist in the formal investigation of security incidents.

Microsoft Certified Professional Exams
This course helps you prepare for the following Microsoft Certified Professional exams:
    * CompTIA Security+ exam

Course Outline Module
1: Preparing to Secure Information
    * Explaining How Assets Are Attacked
    * Explaining How Assets Are Secured

Lab A: Preparing to Secure Information

Module 2: Implementing Secure Computing Baselines
    * Introduction to Trusted Computing Bases
    * Establishing a Secure Baseline
    * Monitoring a Secure Baseline
    * Securing Computers Physically
    * Maintaining a Secure Baseline

Lab A: Maintaining Baseline Security

Module 3: Securing Information Using Authentication and Access Control

    * Introduction to Access Control
    * Implementing an Authentication Strategy
    * Implementing an Access Control Strategy

Lab A: Securing Accounts (MBSA)

Module 4: Using Cryptography to Secure Information
    * Introduction to Cryptography
    * Using Symmetric Encryption
    * Using Hash Functions
    * Using Public Key Encryption

Lab A: Using Cryptography to Secure Information

Module 5: Using a PKI to Secure Information
    * Introduction to Certificates
    * Introduction to Public Key Infrastructure
    * Deploying and Managing Certificates

Lab A: Using Certificates

Module 6: Securing Internet Applications and Components
    * Securing Web Servers
    * Configuring Security for Common Internet Protocols
    * Configuring Security for Web Browsers
    * Configuring Security for Databases

Lab A: Securing Web Servers
Lab B: Protecting Clients from Active Content

Module 7: Implementing Security for E-Mail and Instant Messaging
    * Securing E-Mail Servers
    * Securing E-Mail Clients
    * Securing Instant Messaging

Lab A: Securing Mail Servers

Module 8: Managing Security for Directory Services and DNS

    * Securing Directory Services Against Common Threats
    * Securing DNS Against Common Threats

Lab A: Managing Security for Directory Services and DNS

Module 9: Securing Data Transmission Lessons
    * Identifying Threats to Network Devices
    * Implementing Security for Common Data Transmission
    * Implementing Security for Remote Access
    * Implementing Security for Wireless Network Traffic

Lab A: Securing Data Transmission
Lab B: Using IPSec to Secure Data Transmission

Module 10: Implementing and Monitoring Security for Network Perimeters

    * Introduction to Network Perimeters
    * Implementing Security on Inbound and Outbound Network Traffic
    * Monitoring Network Traffic

Lab A: Implementing and Monitoring Security for Network Perimeters

Module 11: Managing Operational Security

    * Establishing Security Policies and Procedures
    * Educating Users about Security Policies
    * Applying Security Policies to Operational Management
    * Resolving Ethical Dilemmas When Securing Assets

Lab A: Managing Operational Security

Module 12: Preserving Business Continuity

    * Preparing to Recover from Disasters
    * Communicating the Impact of Risks
    * Performing a Secure Backup and Recovery

Lab A: Preserving Business Continuity

Module 13: Responding to Security Incidents 

    * Identifying Security Incidents
    * Responding to Security Incidents
    * Investigating Security Incidents

Lab A: Responding to Security Incidents
Prerequisites & Certificates

Before attending this course, students must have one year of experience managing Windows 2000 Server or have equivalent knowledge and skills, such as those described in course 2152: Implementing Microsoft Windows 2000 Professional and Server.

Certificates offered

The student kit includes a comprehensive workbook and other necessary materials for this class. Certificate of completion.

Cancellation Policy
10 business day cancellation policy. if the course is confirmed and the student cancels within 10 days of the course, then they get charged and apply a credit for future courses. If they cancel outside of 10 business days, then there are no charges at all.
Map & Reviews
CTE Solutions
[ View Provider's Profile ]


This course has not yet been rated by one of our members.

If you have taken a course through this vendor please log into your account and leave feedback for this vendor. You will be helping ensure our members get directed to the best training facilities.

Here are some reviews of the training vendor.
I realize that we are constantly dealing with technology, but I still think for a registration fee of almost $3,000, that a hardcover book should be included. I know that the option to print the book on a one-time basis exists.
Reviewed by 2016
Reviewed by 2016
The instructor was very knowledgeable and answered all questions. Jarod did an excellent job presenting.
Reviewed by 2015
The room was cold. I had to sit next to the space heater. It would be good to tell future patrons to dress warmly AHEAD of time. No suprises.
Reviewed by 2015
He was great and offered his contact info for further questions.
Reviewed by 2015
Howard was a fantastic instructor and the course was exactly what I required.
Reviewed by 2014
The trainer was excellent - the course exceeded my expectations.
Reviewed by 2014
This course provides an excellent overview and a bit of practice on the various functions of SharePoint 2013. I was disappointed at the number of exceedingly long breaks given after each module. I would have preferred less break time and more content to the course. Having never taken a SharePoint course with another provider, I don't know if this is the norm with all providers of just this one in particular.
Reviewed by 2014
I ranked the "Use of Technology" low because for Users who were remote the VM's that were setup were a little wonky. Could be very slow at times and then sometimes they needed to be refreshed to work properly with the lab. In some instances we couldn't follow along as replication would not occur fast enough and we would have our lab cut short (for us remote Users).
Reviewed by 2014
The instructor was good at remembering to acknowledge the online students even though he was facing a classroom of students also.
Reviewed by 2014
Insructor was not so good with the live examples. Also the handouts was not so useful
Reviewed by 2013
The trainer was excellent, very knowledgeable and had a lot of valuable experience to share. The problem was that there were way too many workshops that took too long and interfered with getting the maximum benefit from the instructor and the course.
Reviewed by 2013
This was quite informative. It was a great opportunity to have ‘real life’ discussions with certified PMs. The instructor had excellent examples and was able to share his PM experiences with us with concrete examples. In addition, this was a great opportunity to network with private sector/public sector PMs and develop a better appreciation of PM on both sides of the fence. Cheers, CL
Reviewed by 2013
Reviewed by 2013
I did not like the video format
Reviewed by 2013
As a remote attendee, it appeared the instructor paid attention to the "Attendee" and "Chat" windows only a few times throughout the day, so I was not confident that he would see if I sent a message or raised my hand during the course.
Reviewed by 2013
The chairs were not very comfortable and the material contained spelling and grammatical error (a few but still)as well as repetition of words.
Reviewed by 2013
Was a bit slow the last 1/2 day. Of course, for some, this was the last of a 4 day course (not just 2 days).
Reviewed by 2013
I really enjoyed the course and I learned a lot. The pace was excellent.
Reviewed by 2013
Reviewed by 2013
The room was excellent on its own - less distraction and no noise around you. There was no direction to the room when I walked in and therefore was not sure if I was heading in the right direction. We were not provided with the direction that there was coffee and fridge on the 3rd floor, and the bathroom floor was dirty.
Reviewed by 2012
This course was great, very informative, had Lionel as instructor and he was also very good.
Reviewed by 2012
Instructor was eager to assist but lacked subject matter expertise. Course time management was very poor. Content provided could have been delivered effectively in a one day course.
Reviewed by 2012
Good Course, good trainer. All questions addressed equally and in a timely professional manner.
Reviewed by 2011
The course content was interesting; however, the instructor didn't have enough knowledge about Microsoft Sharepoint 2010 Development and wasn't able to answer questions without google search. In the future CTE needs to make sure the instructors have real on-hands experience and are highly trained in the technologies they are supposed be teaching.
Reviewed by 2011

This course currently does not have any dates scheduled. Please call 1-877-313-8881 to enquire about future dates or scheduling a private, in house course for your team.

This page has been viewed 563 times.