- Microsoft Windows Server Training
- Implementing and Administering Security in a Microsoft Windows Server 2003 Network (M2823)
This 5-day instructor-led course provides the functional skills you need to plan and implement infrastructure security and helps prepare you for the Implementing and Administering Security in a Microsoft Windows Server 2003 Network exam (Exam 70-299).
- Course Outline
Part of Microsoft's Security Portfolio, this 5-day instructor-led course provides the functional skills you need to plan and implement infrastructure security and helps prepare you for the Implementing and Administering Security in a Microsoft Windows Server 2003 Network exam (Exam 70-299). Though the primary product focus is on Microsoft Windows Server 2003-based infrastructure solutions, some client-focused content is included where appropriate.
Further, this course addresses the MCSA and MCSE skills path for IT professional security practitioners, serving as the primary entry point for those at the implementation level. Implementing and Administering Security in a Microsoft Windows Server 2003 Network.
This course will help you prepare for this Microsoft Certified Professional exam:
- Exam 70-299: Implementing and Administering Security in a Microsoft Windows Server 2003 Network
- Plan and configure an authorization and authentication strategy
- Install, configure, and manage certification authorities
- Configure, deploy, and manage certificates
- Plan, implement, and troubleshoot smart card certificates
- Plan, implement, and troubleshoot Encrypting File System (EFS)
- Plan, configure, and deploy a secure member server baseline
- Plan, configure, and implement secure baselines for server roles
- Plan, configure, implement, and deploy client computer baselines
- Plan and implement software updates
- Plan, deploy, and troubleshoot data transmission security
- Plan and implement security for wireless networks
- Plan and implement perimeter security with Internet Security and Acceleration (ISA) Server 2004
- Secure remote access
System administrators or system engineers who have the basic knowledge and skills to deploy secure Microsoft Windows Server 2003-based solutions. This course is not intended to provide design skills; however, it covers planning skills at a level sufficient to enable decision making for the implementation process.
1. Planning and Configuring an Authentication and Authorization Strategy
Learn to evaluate the infrastructure of your organization and create and document an authorization and authentication plan that allows the appropriate level of access to various security principals. Examine trust relationships, domain and forest functional levels, and basic security principles.
- Components of an Authentication Model
- Planning and Implementing an Authentication Strategy
- Groups and Basic Group Strategy in Windows Server 2003
- Creating Trusts in Windows Server 2003
- Planning, Implementing, and Maintaining an Authorization Strategy Using Groups
Discover the fundamentals of the systems that make secure communication possible. Learn methods, such as a public key infrastructure (PKI), that enable you to securely communicate on networks.
- Overview of a PKI
- Introduction to Certification Authorities
- Installing a Certification Authority
- Managing a Certification Authority
- Backing Up and Restoring a Certification Authority
Ensure certificates are issued to the correct security principals and for the intended purpose. Learn how to make the deployment of certificates an easy and straightforward task for end users.
- Overview of Digital Certificates
- Deploying and Revoking User and Computer Certificates
- Configuring Certificate Templates
- Managing Certificates
Deploy, manage, and configure certificates and certificate templates in a PKI environment.
- Introduction to Multifactor Authentication
- Planning and Implementing a Smart Card Infrastructure
- Managing and Troubleshooting a Smart Card Infrastructure
- Introduction to EFS
- Implementing EFS in a Stand-Alone Microsoft Windows XP Environment
- Planning and Implementing EFS in a Domain Environment
- Implementing EFS File Sharing
- Troubleshooting EFS
The security of a network depends on the security configuration of the servers that make up the network. Any breach of security on a single server can jeopardize the security of all computers in the network, thereby jeopardizing the security of the network itself. In this section, learn how to create secure baselines for servers.
- Overview of a Member Server Baseline
- Planning a Secure Member Server Baseline
- Configuring Additional Security Settings
- Deploying Security Templates
- Securing Servers by Using the Security Configuration Wizard
- Planning and Configuring a Secure Baseline for Domain Controllers
- Planning and Configuring a Secure Baseline for DNS Servers
- Planning and Configuring a Secure Baseline for Infrastructure Servers
- Planning a Secure Baseline for File and Print Servers
- Planning and Configuring a Secure Baseline for IIS Servers
- Planning and Implementing a Secure Client Computer Baseline
- Securing Applications on Client Computers
- Planning and Implementing a Software Restriction Policy
- Implementing Security for Mobile Clients
- Introduction to Software Update Management
- Implementing Microsoft Baseline Security Analyzer (MBSA)
- Installing Windows Server Update Services (WSUS)
- Managing a WSUS Infrastructure
- Secure Data Transmission Methods
- Introducing IPSec
- Planning and Implementing Data Transmission Security Using IPSec
- Troubleshooting IPSec Communications
A wireless network uses technology that enables two or more devices to communicate through standard network protocols and electromagnetic waves - not network cabling - to carry signals over part or all of the communication path.
- Introduction to Securing Wireless Networks
- Implementing 802.1x Authentication
- Planning a Secure WLAN Strategy
- Implementing a Secure WLAN
- Troubleshooting Wireless Networks
Networks in organizations today are commonly interconnected - various networks within an organization connect to each other, and corporate networks connect to the Internet. Although this presents new business opportunities, it can also cause concerns about security, performance, and manageability.
- Introduction to Internet Security and Acceleration Server 2004
- Installing and Managing ISA Server 2004
- Securing a Perimeter Network by Using ISA Server 2004
- Publishing Servers on a Perimeter Network
- Planning a Perimeter Network
- Implementing a Perimeter Network
- Securing an ISA Server 2000 Computer
Remote access enables outside, or remote access, clients to access corporate networks as if they were directly connected to the corporate network. The remote access clients connect to the network by using dial-up communication links. The security of a network is compromised if unauthorized remote users gain access to intranet-based resources. An effective network access security design ensures confirmation of the identity of the clients attempting to access your organization's network resources and protection of specific resources from inappropriate access by users.
- Introduction to Remote Access Technologies and Vulnerabilities
- Planning a Remote Access Strategy
- Deploying Network Access Quarantine Control Components
Lab - Course Topic 1: Planning and Configuring an Authentication and Authorization Strategy
- Planning and Implementing a Resource Authorization Strategy
- Planning and Implementing a Cross-Forest Authentication Strategy
- Planning and Implementing an Authentication Policy
- Installing an Enterprise Subordinate Certification Authority
- Backing up a Certification Authority
- Configuring Multipurpose Certificate Templates
- Configuring Certificate Autoenrollment
- Updating a Certificate Template
- Implementing a Key Archiving Strategy
- Configuring a Smart Card Enrollment Station
- Simulation: Enrolling Users for Smart Cards
- Implementing Certificates to Support EFS
- Configuring Group Policy to Support EFS
Lab - Course Topic 8: Planning, Implementing, Configuring, and Deploying a Secure Client Computer Baseline
- Planning Security Templates for Client Computers
- Implementing Security Templates for Client Computers
- Configure MBSA Integration with WSUS Server
- Planning IPSec Security
- Implementing IPSec Security
- Configuring Active Directory for Wireless Networks
- Configuring Certificate Templates and Certificate Autoenrollment
- Configuring Remote Access Policies for Wireless Devices
- Configuring Group Policy for Wireless Networks
- Configuring a Virtual Private Network (VPN) Connection
- Configuring the VPN Server for Remote Access Quarantine
- Configuring a Connection Manager Service Profile
- Prerequisites & Certificates
- Experience implementing a Windows 2000 or Windows Server 2003 Active Directory environment - Experience with organizational resources such as web, FTP, and Exchange servers (detailed knowledge not expected) - Experience with shared resources and network services such as DHCP, DNS, and WINS is helpful
Certificate of Completion
- Cancellation Policy
We require 16 calendar days notice to reschedule or cancel any registration. Failure to provide the required notification will result in 100% charge of the course. If a student does not attend a scheduled course without prior notification it will result in full forfeiture of the funds and no reschedule will be allowed. Within the required notification period, only student substitutions will be permitted.
Reschedules are permitted at anytime with 16 or more calendar days notice. Enrollments must be rescheduled within six months of the cancel date or funds on account will be forfeited.
- Map & Reviews
[ View Provider's Profile ]
ReviewsHere are some reviews of the training vendor.
This course has not yet been rated by one of our members.
If you have taken a course through this vendor please log into your account and leave feedback for this vendor. You will be helping ensure our members get directed to the best training facilities.
This course currently does not have any dates scheduled. Please call 1-877-313-8881 to enquire about future dates or scheduling a private, in house course for your team.
This page has been viewed 262 times.