Home > Kurse - Seminare > Microsoft > Online > Kurs 73330 - Microsoft Windows Server 2003 Designing Security Part 3 - Online

Kurs 73330 - Microsoft Windows Server 2003 Designing Security Part 3 - Online

Unverbindlich in kontakt treten Zentraler Informatikdienst

Um die Anfrage zu senden, müssen sie die Datenschutzpolitik akzeptieren

Informationen über Kurs 73330 - Microsoft Windows Server 2003 Designing Security Part 3 - Online

  • Ziele
    - Identify security threats to WLANs. - Identify features of 802.11-based basic security. - Identify features of the VPN technology. - Identify the security aspects associated with the perimeter of a network. - Match the network perimeter types with their functions. - Identify the steps for designing secure screened subnets. - Identify features of the auditing process. - Identify features of incident response procedure. - Sequence the steps for planning an incident response procedure.
  • Anforderungen
    As per the Microsoft ILT, this series is intended for IT systems engineers and security specialists who are responsible for establishing security policies and procedures for an organization. Students should have one to three years of experience designing related business solutions.
  • Titel
    Kurs 73330 - Microsoft Windows Server 2003 Designing Security Part 3
  • Inhalt
    Course Overview

    This multi-part curriculum will focus closely on the exam requirements. However, to fully prepare for certification, it should be used in conjunction with other learning/training resources in addition to ample real-world experience. The principal areas covered are the conceptual, logical, and physical designs for network infrastructure security, data access control strategies, and physical design for client infrastructure security.

    Deployment Options

    Self-Study

    Accreditation

    Not applicable

    Total Learning Time

    7 hours

    Objectives

    Unit 1: Security Design for Infrastructure 3 hours

    - Identify features of 802.11-based basic security.
    - Identify features of the VPN technology.
    - Identify features of IP Sec.
    - Identify guidelines for designing a CA hierarchy.
    - Identify guidelines for creating an enrollment strategy.
    - Identify guidelines for creating a revocation and auditing strategy.
    - Identify guidelines for implementing security for CA Servers.
    - Identify guidelines for determining security requirements for data transmission.
    - Identify guidelines for determining security requirements for data transmission.
    - Match the protocols that secure transmission at the application layer with their features.
    - Identify the steps for configuring IPSec to secure communication at the network layer.
    - Identify guidelines for securing communication at the Data Link and Physical layers.
    - Identify guidelines for choosing a VPN Tunneling protocol.

    Unit 2: Designing Security for Network Perimeter 2 hours

    - Identify the security aspects associated with the perimeter of a network.
    - Match the network perimeter types with their functions.
    - Identify the steps for designing secure screened subnets.
    - Identify guidelines for protecting perimeter devices.
    - Sequence the steps for planning an audit policy.
    - Match each auditing tool with its function.
    - Identify features of intrusion detection systems.

    Unit 3: Responses to Security Incidents 2 hours

    - Identify features of the auditing process.
    - Identify features of incident response procedure.
    - Sequence the steps for planning an incident response procedure.
    - Identify guidelines for creating an incident response team.
    - Identify the contents required in a communication plan.
    - Identify guidelines for analyzing a security incident.
    - Identify methods to limit the damage from an attack.

    Course Access


    Each student has access to the course for a period of 6 months from the day of enrollment in the course.

Ähnliche Angebote die in Bezug zu Ihrer Anfrage "Microsoft" stehen

Diese Webseite verwendet Cookies. Wenn Sie weiterhin navigieren, verstehen wir das Sie der Nutzung einverstanden sind. Vehr sehen  |