Kurs 73329 - Microsoft Windows Server 2003 Designing Security Part 2
Ziele- Identify reasons for security breach through misappropriation of user accounts. - Identify guidelines for granting rights and permissions to different user accounts and groups. - Identify considerations for using and managing accounts. - Identify tasks to be performed for designing an access control model. - Identify guidelines for designing a permission structure for registry keys to secure registry data. - Identify guidelines for designing access control for files and folders. - Identify tasks to be performed for designing security for IIS. - Match the business needs of a Web-based organization with the security provisions that can be established to meet these needs. - Identify tasks to be performed for securing Web sites and applications.
AnforderungenThis course is intended for IT systems engineers and security specialists who are responsible for establishing security policies and procedures for an organization. The learners should have one to three years of experience with the Windows Server 2003 interface, Windows/Network OS Security, and designing related business solutions.
TitelKurs 73329 - Microsoft Windows Server 2003 Designing Security Part 2
InhaltCourse Overview
This course focuses on the requirements of Microsoft Exam 70-298. However, to fully prepare for the certification, it should be used in conjunction with other learning/training resources in addition to ample real-world experience. The principal areas covered are the conceptual, logical, and physical designs for network infrastructure security, data access control strategies, and physical design for client infrastructure security.
Deployment Options
Self-Study
Accreditation
Not applicable
Total Learning Time
7 hours
Objectives
Unit 1: Designing Security for Accounts 3 hours
- Identify guidelines for granting rights and permissions to different user accounts and groups.
- Identify considerations for using and managing accounts.
- Identify guidelines for securing administrative and service accounts.
- Associate storage locations of account passwords with the formats in which they are stored.
- Match the storage locations of account passwords with the formats in which they are stored.
- Identify common vulnerabilities of authentication.
- Identify tasks to be performed to determine authentication requirements.
- Identify features of authentication protocols used on a LAN to authenticate users.
- Match the Web-based authentication methods used by IIS 6.0 with their features.
- Match remote authentication protocols with their features.
- Identify benefits of using multifactor authentication.
- Identify threats associated with each phase in the security life cycle of a computer.
- Match the methods of securing an initial installation with their descriptions.
- Identify considerations for mapping a security policy to a baseline security template for creating a secure baseline configuration.
- Identify tasks to be performed for designing security for specific computer roles.
- Identify techniques for designing security for client computers.
- Match the methods of applying security updates with their descriptions.
- Match GPO settings that can be configured for deploying software updates with their characteristics.
- Identify benefits of software update services (SUS).
- Match common methods of assessing security of computers with their descriptions.
- Identify tasks to be performed to manage administrative risks in a network infrastructure.
- Identify tasks to be performed for securing administration practices of servers.
- Identify guidelines for securing Emergency Management Services (EMS).
Unit 2: Security Design for Data 2 hours
- Identify tasks to be performed for designing an access control model.
- Identify guidelines for designing a permission structure for registry keys to secure registry data.
- Identify guidelines for designing access control for files and folders.
- Identify guidelines for designing a file encryption and decryption strategy to recover an Encrypting File System (EFS).
- Identify guidelines for designing Encrypting File System (EFS) policies.
- Identify guidelines for designing policies to manage data securely.
Unit 3: Web Security 2 hours
- Identify tasks to be performed for designing security for IIS.
- Match the business needs of a Web-based organization with the security provisions that can be established to meet these needs.
- Identify tasks to be performed for securing Web sites and applications.
- Identify guidelines for designing user authentication for IIS.
- Identify guidelines for creating monitoring and maintenance strategies for IIS.
- Identify considerations for designing authentication for remote network access using IAS as a RADIUS server.
- Identify guidelines for designing an authentication and authorization strategy using IAS.
Course Access
Each student has access to the course for a period of 6 months from the day of enrollment in the course.
Ähnliche angebote die in bezug zu ihrer anfrage "microsoft" stehen