Course code: MOC 2830« Back

Designing Security for Microsoft Networks

This three-day, instructor-led course provides you with the knowledge and skills to design a secure network infrastructure. Topics include assembling the design team, modeling threats, and analyzing security risks in order to meet business requirements for securing computers in a networked environment. The course encourages decision-making skills through an interactive tool that simulates real-life scenarios that the target audience may encounter. You are given the task of collecting the information and sorting through the details to resolve the given security requirement.

This course has been removed from our portfolio
This section contains overview of retired courses which don’t belong to GOPAS course offer any more or were replaced by new course versions.
For more information about possibility to buy retired courses contact our customer services department (__Klientskyservis@gopas.cz) or business department (__Obchod@gopas.cz).

AffiliateDurationCatalogue priceHandbook priceITB
Praha3 18 050 CZK included in course price 30
Brno3 18 050 CZK included in course price 30
Bratislava3 420,00 EUR 189,00 EUR 30

User intensity level

Who is the course for

This course is intended for IT systems engineers and security specialists who are responsible for establishing security policies and procedures for an organization. Students should have one to three years of experience designing related business solutions.

What we teach you

  • Plan a framework for network security.
  • Identify threats to network security.
  • Analyze security risks.
  • Design security for physical resources.
  • Design security for computers.
  • Design security for accounts.
  • Design security for authentication.
  • Design security for data.
  • Design security for data transmission.
  • Design security for network perimeters.
  • Design an incident response procedure.

    Required skills

  • A strong familiarity with Microsoft Windows® 2000 core technologies, such as those covered in Microsoft Official Curriculum (MOC) Course 2152: Implementing Microsoft Windows 2000 Professional and Server.
  • A strong familiarity with Windows 2000 networking technologies and implementation, such as those covered in MOC Course 2153: Implementing a Microsoft Windows 2000 Network Infrastructure.
  • A strong familiarity with Windows 2000 directory services technologies and implementation, such as those covered in MOC Course 2154: Implementing and Administering Microsoft Windows 2000 Directory Services.

    Teaching methods

    Instructor-led classroom training with self-paced practical exercises in virtual environment

    Teaching materials

    The student kit includes a comprehensive workbook and other necessary materials for this class.

    Course Outline

    Module 1: Introduction to Designing Security
  • Introduction to Designing Security for Microsoft Networks
  • Contoso Pharmaceuticals: A Case Study

    Module 2: Creating a Plan for Network Security

  • Introduction to Security Policies
  • Defining a Process for Designing Network Security
  • Creating a Security Design Team
  • Describe common elements of security policies and procedures.
  • Create a security design framework by using the Microsoft Solutions Framework (MSF) process model.
  • Create a security design team.

    Module 3: Identifying Threats to Network Security

  • Introduction to Security Threats
  • Predicting Threats to Security
  • Explain common network vulnerabilities and how attackers can exploit them.
  • Predict threats to security by using the STRIDE (Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, and Elevation of privilege) threat model.

    Module 4: Analyzing Security Risks

  • Introduction to Risk Management
  • Creating a Risk Management Plan
  • Explain the purpose and operation of risk management.
  • Draft the elements of a risk management plan.

    Module 5: Creating a Security Design for Physical Resources

  • Determining Threats and Analyzing Risks to Physical Resources
  • Designing Security for Physical Resources
  • Determine threats and analyze risks to physical resources.
  • Design security for physical resources.

    Module 6: Creating a Security Design for Computers

  • Determining Threats and Analyzing Risks to Computers
  • Designing Security for Computers
  • Determine threats and analyze risks to computers.
  • Design security for computers.

    Module 7: Creating a Security Design for Accounts

  • Determining Threats and Analyzing Risks to Accounts
  • Designing Security for Accounts
  • Determine threats and analyze risks to accounts.
  • Design security for accounts.

    Module 8: Creating a Security Design for Authentication

  • Determining Threats and Analyzing Risks to Authentication
  • Designing Security for Authentication
  • Determine threats and analyze risks to authentication.
  • Design security for authentication.

    Module 9: Creating a Security Design for Data

  • Determining Threats and Analyzing Risks to Data
  • Designing Security for Data
  • Determine threats and analyze risks to data.
  • Design security for data.

    Module 10: Creating a Security Design for Data Transmission

  • Determining Threats and Analyzing Risks to Data Transmission
  • Designing Security for Data Transmission
  • Determine threats and analyze risks to data transmission.
  • Design security for data transmission.

    Module 11: Creating a Security Design for Network Perimeters

  • Determining Threats and Analyzing Risks to Network Perimeters
  • Designing Security for Network Perimeters
  • Determine threats and analyze risks to network perimeters.
  • Design security for network perimeters.

    Module 12: Designing Responses to Security Incidents

  • Introduction to Auditing and Incident Response
  • Designing an Audit Policy
  • Designing an Incident Response Procedure
  • Explain the importance of auditing and incident response.
  • Design an auditing policy.
  • Design an incident response procedure.

    Appendix A: Designing an Acceptable Use Policy

  • Analyzing Risks That Users Introduce
  • Designing Security for Computer Use

    Appendix B: Designing Policies for Managing Networks

  • Analyzing Risks to Managing Networks
  • Designing Security for Managing Networks

    Appendix C: Designing an Operations Framework to Manage Security

  • Analyzing Risks to Ongoing Network Operations
  • Designing a Framework for Ongoing Network Operations
  • Previous courses

    no preceding courses

    Next courses

    no following course
    Tištěná příručka MOC 2830

    Price:
    4950 CZK
    Elektronická příručka MOC 2830

    Price:
    4550 CZK
    Tištěná příručka MOC 2830

    Price:
    189 EUR
    Elektronická příručka MOC 2830

    Price:
    Literature is available in printed or electronic form.
    The prices are without VAT.