Kurs 73328 - Microsoft Windows Server 2003 Designing Security Part 1 - Online

Unverbindlich in kontakt treten Zentraler Informatikdienst

Um die Anfrage zu senden, müssen sie die Datenschutzpolitik akzeptieren

Informationen über Kurs 73328 - Microsoft Windows Server 2003 Designing Security Part 1 - Online

  • Ziele
    - Identify goals of security design. - Identify guidelines for securing a network. - Identify areas in Microsoft networks that need to be considered for a security design. - Identify common network vulnerabilities. - Match different stages of a network attack with their descriptions. - Identify characteristics of the STRIDE Threat Model. - Identify characteristics of the Microsoft Operations Framework (MOF) risk management process. - Identify steps in the process of identifying possible risks to assets. - Identify strategies for risk management.
  • Anforderungen
    This course is intended for IT systems engineers and security specialists who are responsible for establishing security policies and procedures for an organization. Users should have one to three years of experience designing related business solutions.
  • Titel
    Kurs 73328 - Microsoft Windows Server 2003 Designing Security Part 1
  • Inhalt
    Course Overview

    The course covers designing a secure network infrastructure. Topics include assembling the design team, modeling threats, and analyzing security risks in order to meet business requirements for securing computers in a networked environment. The course encourages decision-making skills through an interactive tool that simulates real-life scenarios that the target Audience may encounter. This course focuses on the requirements of Microsoft Exam 70-298.

    Deployment Options

    Self-Study

    Accreditation

    Not applicable

    Total Learning Time

    7 hours

    Objectives

    Unit 1: Security Design Overview 3 hours

    - Identify guidelines for securing a network.
    - Identify areas in Microsoft networks that need to be considered for a security design.
    - Identify characteristics of an effective security policy.
    - Identify reasons for failure of security policies.
    - Identify guidelines for creating policies and procedures.
    - Identify features of Microsoft Solutions Framework (MSF).
    - Identify tasks of the phases of network security design.
    - Match roles of security design team members with description of their responsibilities.
    - Match teams that manage security design with their description.
    - Identify guidelines for creating a security design team.
    - Identify guidelines for analyzing the technical constraints that affect security design.

    Unit 2: Identifying and Managing Security Risks 2 hours

    - Identify common network vulnerabilities.
    - Match different stages of a network attack with their descriptions.
    - Identify characteristics of the STRIDE Threat Model.
    - Identify guidelines for creating threat model teams.
    - Identify features of risk management.
    - Identify advantages of risk management.
    - Identify categories of common assets and the risks associated with them.

    Unit 3: Analyzing Security Risks 2 hours

    - Identify characteristics of the Microsoft Operations Framework (MOF) risk management process.
    - Identify steps in the process of identifying possible risks to assets.
    - Identify strategies for risk management.
    - Identify guidelines for creating risk management plans.
    - Identify reasons for using risk management controls.
    - Identify common threats to physical resources.
    - Identify ways of protecting the physical resources of an organization.
    - Identify ways of securing facilities.
    - Identify ways of securing computers.
    - Identify ways of minimizing security risks for portable and mobile devices.
    - Identify guidelines for disaster recovery planning.

    Course Access


    Each student has access to the course for a period of 6 months from the day of enrollment in the course.

Ähnliche angebote die in bezug zu ihrer anfrage "microsoft" stehen

Diese webseite verwendet cookies.
Wenn sie weiterhin auf der webseite navigieren stimmen sie der nutzung dieser zu.
Vehr sehen  |