Kurs 73329 - Microsoft Windows Server 2003 Designing Security Part 2

Mehr Information

Kurs 73329 - Microsoft Windows Server 2003 Designing Security Part 2

  • Ziele - Identify reasons for security breach through misappropriation of user accounts. - Identify guidelines for granting rights and permissions to different user accounts and groups. - Identify considerations for using and managing accounts. - Identify tasks to be performed for designing an access control model. - Identify guidelines for designing a permission structure for registry keys to secure registry data. - Identify guidelines for designing access control for files and folders. - Identify tasks to be performed for designing security for IIS. - Match the business needs of a Web-based organization with the security provisions that can be established to meet these needs. - Identify tasks to be performed for securing Web sites and applications.
  • Anforderungen This course is intended for IT systems engineers and security specialists who are responsible for establishing security policies and procedures for an organization. The learners should have one to three years of experience with the Windows Server 2003 interface, Windows/Network OS Security, and designing related business solutions.
  • Titel Kurs 73329 - Microsoft Windows Server 2003 Designing Security Part 2
  • Inhalt Course Overview

    This course focuses on the requirements of Microsoft Exam 70-298. However, to fully prepare for the certification, it should be used in conjunction with other learning/training resources in addition to ample real-world experience. The principal areas covered are the conceptual, logical, and physical designs for network infrastructure security, data access control strategies, and physical design for client infrastructure security.

    Deployment Options

    Self-Study

    Accreditation

    Not applicable

    Total Learning Time

    7 hours

    Objectives

    Unit 1: Designing Security for Accounts 3 hours

    - Identify guidelines for granting rights and permissions to different user accounts and groups.
    - Identify considerations for using and managing accounts.
    - Identify guidelines for securing administrative and service accounts.
    - Associate storage locations of account passwords with the formats in which they are stored.
    - Match the storage locations of account passwords with the formats in which they are stored.
    - Identify common vulnerabilities of authentication.
    - Identify tasks to be performed to determine authentication requirements.
    - Identify features of authentication protocols used on a LAN to authenticate users.
    - Match the Web-based authentication methods used by IIS 6.0 with their features.
    - Match remote authentication protocols with their features.
    - Identify benefits of using multifactor authentication.
    - Identify threats associated with each phase in the security life cycle of a computer.
    - Match the methods of securing an initial installation with their descriptions.
    - Identify considerations for mapping a security policy to a baseline security template for creating a secure baseline configuration.
    - Identify tasks to be performed for designing security for specific computer roles.
    - Identify techniques for designing security for client computers.
    - Match the methods of applying security updates with their descriptions.
    - Match GPO settings that can be configured for deploying software updates with their characteristics.
    - Identify benefits of software update services (SUS).
    - Match common methods of assessing security of computers with their descriptions.
    - Identify tasks to be performed to manage administrative risks in a network infrastructure.
    - Identify tasks to be performed for securing administration practices of servers.
    - Identify guidelines for securing Emergency Management Services (EMS).

    Unit 2: Security Design for Data 2 hours

    - Identify tasks to be performed for designing an access control model.
    - Identify guidelines for designing a permission structure for registry keys to secure registry data.
    - Identify guidelines for designing access control for files and folders.
    - Identify guidelines for designing a file encryption and decryption strategy to recover an Encrypting File System (EFS).
    - Identify guidelines for designing Encrypting File System (EFS) policies.
    - Identify guidelines for designing policies to manage data securely.

    Unit 3: Web Security 2 hours

    - Identify tasks to be performed for designing security for IIS.
    - Match the business needs of a Web-based organization with the security provisions that can be established to meet these needs.
    - Identify tasks to be performed for securing Web sites and applications.
    - Identify guidelines for designing user authentication for IIS.
    - Identify guidelines for creating monitoring and maintenance strategies for IIS.
    - Identify considerations for designing authentication for remote network access using IAS as a RADIUS server.
    - Identify guidelines for designing an authentication and authorization strategy using IAS.

    Course Access

    Each student has access to the course for a period of 6 months from the day of enrollment in the course.

Ähnliche angebote die in bezug zu ihrer anfrage "microsoft" stehen

  • Kurse - Seminare: Microsoft PowerPoint

  • Bildungszentren: medienreich Training
  • Mehr Information
  • Kurse - Seminare: Microsoft Project - Fortschritt

  • Bildungszentren: medienreich Training
  • Mehr Information
  • Kurse - Seminare: Microsoft Project - Aufbau

  • Bildungszentren: medienreich Training
  • Mehr Information
  • Master of Arts Education

  • Bildungszentren: Konservatorium Wien Privatuniversität
  • Mehr Information
  • Bachelor in Computer Science

  • Bildungszentren: Webster University Vienna
  • Mehr Information
  • Bachelor in Information Management

  • Bildungszentren: Webster University Vienna
  • Mehr Information
  • Bachelor in Information Systems

  • Bildungszentren: Webster University Vienna
  • Mehr Information