Introduction Course Materials Prerequisites Course Outline Microsoft Official Curriculum Microsoft Certified Professional Program Facilities
Module 1: Assessing security Risks Identifying Risks to Data Identifying Risks to Services Identifying Potential Threats Introducing Common Security Standards Planning Network Security Review
Module 2: Introducing Windows 2000 Security Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to Resources Introducing Encryption Technologies Encrypting Stored and Transmitted Data Introducing Public Key Infrastructure Technology Review
Module 3: Planning Administrative Access Determining the Appropriate Administrative Model Designing Administrative Group Strategies Planning Local Administrative Access Planning Remote Administrative Access Lab A: Planning Secure Administrative Access Review
Module 4: Planning User Accounts Designing Account Policies and Group Policy Planning Account Creation and Location Planning Delegation of Authority Auditing User Account Actions Lab A: Planning a Security-based OU Structure Review
Module 5: Securing Windows 2000-based Computers Planning Physical Security for Windows 2000-based Computers Evaluating Security Requirements Designing Security Configuration Templates Lab A: Analyzing a Security Template Evaluating Security Configuration Deploying Security Configuration Templates Lab B: Designing Customized Security Templates Review
Module 6: Securing File and Print Resources Examining Windows 2000 File System Security Protecting Resources Using DACLs Encrypting Data Using EFS Lab A: Managing EFS Recovery Keys Auditing Restore Access Securing Backup and Restore Procedures Protecting Data from Viruses Lab B: Planning Data Security Review
Module 8: Providing Secure Access to Non-Microsoft Clients Providing Secure Network Access to UNIX Clients Providing Secure Network Access to NetWare Clients Providing Secure Access to Macintosh Clients Securing Network Services in a Heterogeneous Network Monitoring for Security Breaches Lab A: Securing Telnet Transmissions Review
Module 9: Providing Secure Access to Remote Users Identifying the Risks of Providing Remote Access Designing Security for Dial-UP Connections Designing Security for VPN Connections Centralizing Remote Access Security Settings Lab A: Using RADIUS Authentication Review
Module 10: Providing Secure Access to Remote Offices Defining Private and Public Networks Securing Connections Using Routers Securing VPN Connections Between Remote Offices Identifying Security Requirements Lab A: Planning Secure Connections for Remote Offices Review
Module 11: Providing Secure Network Access to Internet Users Identifying Potential Risks from the Internet Using Firewalls to Protect Network Resources Using Screened Subnets to Protect Network Resources Securing Public Access to a Screened Subnet Lab A: Designing a Screened Subnet Review
Module 12: Providing Secure Internet Access to Network Users Protecting Internal Network Resources Planning Internet Usage Policies Managing Internet Access Through Proxy Server Configuration Managing Internet Access Through Client-side Configuration Lab A: Securing the Internal Network When Accessing the Internet Review
Module 13: Extending the Network to Partner Organizations Providing Access to Partner Organizations Securing Applications Used by Partners Securing Connections Used by Remote Partners Structuring Active Directory to Manage Partner Accounts Authenticating Partners from Trusted Domains Lab A: Planning Partner Connectivity Review
Module 14: Designing a Public Key Infrastructure Introducing a Public Key Infrastructure Using Certificates Examining the Certificate Life Cycle Choosing a Certification Authority Planning a Certification Authority Hierarchy Mapping Certificates to User Accounts Managing CA Maintenance Strategies Lab A: Using Certificate-based Authentication Review
Module 15: Developing a Security Plan Designing a Security Plan Defining Security Requirements Maintaining the Security Plan Lab A: Developing a Security Plan Review
Appendix A: SSL Port Assignments Appendix B: Acceptable Internet Use Policy Appendix C: Internet Explorer Security Settings Classroom Setup Guide Classroom Requirements Classroom Configuration Setup Instructions Automated Classroom Setup Classroom Setup Checklist Customization Information