Designing Security for a Microsoft Windows Server 2003

   
 
 
 
 
 
 
   
 

Designing Security for a Microsoft Windows Server 2003 Network 70-298


The course Designing Security for a Microsoft Windows Server 2003 Network gives the student the knowledge to design a secure network infrastructure. Upon course completion students will successfully learn to design and manage strong security procedures and analyze security risks in order to meet your company's requirements for securing computers in a networked environment.

Audience:
 

Anyone who works within a typically complex computing environment in medium to large companies.

Did you know that being certified would increase your salary tremendously? Microsoft certification is a leading credential that validates your experience and skills to keep you competitive in today's changing business environment. Technical and Professional certification is becoming more popular today. Because of the rise of the Internet, and the overall growth of the Information Technology, companies are finding it hard to find the right person to fill IT positions, being certified is even more important today!

n Our easy-to-use delivery format allows you to concentrate on the lesson at hand and not how to run the delivery software - saving you time and frustration. Our comprehensive course materials are delivered in an easy-to- understand format - allowing you to get the most out of your time. n

Our courses incorporate audio, video, and text training and then the total experience is reinforced with exercises and practice tests to ensure that you have really grasped the material.

This Course is available online or via DVD's:
Key:
Online Course = All items marked with are included.
DVD Study Kit = Everything! - If its marked with then its included.
For Pricing - Click Here
Live Video,
instructor-led
DVD
Courses =
Interactive
DVD's
Online
Courses =
Online Streaming Video
(Broadband min 512k)
12 Months subscription
Featuring live instructor-led classroom-like sessions in digital video format. Multimedia-rich delivery brings experienced subject matter experts to your desktop or laptop.
Training Simulations  
DVD Courses = Delivered on DVD
Online Courses = Online Access
Interactive hands-on practice lab
Email Support  
 
1 Year's Technical Email Support
E-Books
DVD Courses= Delivered
on DVD
Online Courses = Downloadable
Free Upgrades  
12 months of Free Upgrades.
Compatibility with:  

XP | Win 2003/8 server | Vista
Exam Simulator  
Exam Simulator for closest replication to the real exam!

 

 

Content on this page requires a newer version of Adobe Flash Player.

Get Adobe Flash player

 

 
 
 

 

   
 
 

Designing Security for a Microsoft Windows Server 2003 Network - Learning Segments

 
 
Creating the Conceptual Design for Network Infrastructure Security by Gathering and Analyzing Business and Technical Requirements
Analyze business requirements for designing security. Considerations include existing policies and procedures, sensitivity of data, cost, legal requirements, end-user impact, interoperability, maintainability, scalability, and risk.
  • Analyze existing security policies and procedures.
  • Analyze the organizational requirements for securing data.
  • Analyze the security requirements of different types of data.
  • Analyze risks to security within the current IT administration structure and security practices.
Design a framework for designing and implementing security. The framework should include prevention, detection, isolation, and recovery.
  • Predict threats to your network from internal and external sources.
  • Design a process for responding to incidents.
  • Design segmented networks.
  • Design a process for recovering services.
Analyze technical constraints when designing security.
  • Identify capabilities of the existing infrastructure.
  • Identify technology limitations.
  • Analyze interoperability constraints.
Creating the Logical Design for Network Infrastructure Security
Design a public key infrastructure (PKI) that uses Certificate Services.
  • Design a certification authority (CA) hierarchy implementation. Types include geographical, organizational, and trusted.
  • Design enrollment and distribution processes.
  • Establish renewal, revocation and auditing processes.
  • Design security for CA servers.
Design a logical authentication strategy.
  • Design certificate distribution.
  • Design forest and domain trust models.
  • Design security that meets interoperability requirements.
  • Establish account and password requirements for security.
Design security for network management.
  • Manage the risk of managing networks.
  • Design the administration of servers by using common administration tools. Tools include Microsoft Management Console (MMC), Terminal Server, Remote Desktop for Administration, Remote Assistance, and Telnet.
  • Design security for Emergency Management Services.
Creating the Physical Design for Client Infrastructure Security
Design a client authentication strategy.
  • Analyze authentication requirements.
  • Establish account and password security requirements.
Design a security strategy for client remote access.
  • Design remote access policies.
  • Design access to internal resources.
  • Design an authentication provider and accounting strategy for remote network access by using Internet Authentication Service (IAS).
Design a strategy for securing client computers. Considerations include desktop and portable computers.
  • Design a strategy for hardening client operating systems.
  • Design a strategy for restricting user access to operating system features.
Design a security update infrastructure.
  • Design a Software Update Services (SUS) infrastructure.
  • Design Group Policy to deploy software updates.
  • Design a strategy for identifying computers that are not at the current patch level.
 
Creating the Physical Design for Network Infrastructure Security
Design network infrastructure security.
  • Specify the required protocols for a firewall configuration.
  • Design IP filtering.
  • Design an IPSec policy.
  • Secure a DNS implementation.
  • Design security for data transmission.
Design security for wireless networks.
  • Design public and private wireless LANs.
  • Design 802.1x authentication for wireless networks.
Design user authentication for Internet Information Services (IIS).
  • Design user authentication for a Web site by using certificates.
  • Design user authentication for a Web site by using IIS authentication.
  • Design user authentication for a Web site by using RADIUS for IIS authentication.
Design security for Internet Information Services (IIS).
  • Design security for Web sites that have different technical requirements by enabling only the minimum required services.
  • Design a monitoring strategy for IIS.
  • Design an IIS baseline that is based on business requirements.
  • Design a content management strategy for updating an IIS server.
Design security for communication between networks.
  • Select protocols for VPN access.
  • Design VPN connectivity.
  • Design demand-dial routing between internal networks.
Design security for communication with external organizations.
  • Design an extranet infrastructure.
  • Design a strategy for cross-certification of Certificate Services.
Design security for servers that have specific roles. Roles include domain controller, network infrastructure server, file server, IIS server, terminal server, and POP3 mail server.
  • Define a baseline security template for all systems.
  • Create a plan to modify baseline security templates according to role.
Designing an Access Control Strategy for Data
Design an access control strategy for directory services.
  • Create a delegation strategy.
  • Analyze auditing requirements.
  • Design the appropriate group strategy for accessing resources.
  • Design a permission structure for directory service objects.
Design an access control strategy for files and folders.
  • Design a strategy for the encryption and decryption of files and folders.
  • Design a permission structure for files and folders.
  • Design security for a backup and recovery strategy.
  • Analyze auditing requirements.
Design an access control strategy for the registry.
  • Design a permission structure for registry objects.
  • Analyze auditing requirements.





 

Full motion video

Each class is presented in full motion video allowing you to see the steps, hear the explanations, and perform the tasks which includes our interactive hands-on training simulations, students will learn from real-world scenarios taught by our expert instructor.

Instructor-Led Training

Combines both the convenience and affordability of computer-based training with the effectiveness of a traditional classroom setting. The instructors featured in our multi-media DVD's are not only certified in their area of expertise, but also have years of real world experience and are subject matter experts in their fields.

E-BOOKS (PDF)

We supply a complete line of e-books to offer a complete training solution. Our courses include e-books for CompTIA, CISCO and Microsoft certifications.Supplied on DVD for DVD courses or downloadable for Online Courses.


Practice Exam Simulators

We offer exam simulators for all technical certifications. Our exam simulators are the closest replication to the real exam!

Our exam simulators creates a simulation of an actual certification exam. Under timed conditions, IntelliSage? sets up a test with 60 randomly chosen questions designed to help you get ready for the real exam. As with the Practice Exam, the Certification Simulator allows you to mark questions you cannot answer for review at the end of the test.
If you ask, IntelliSage? will show you the correct answer. IntelliSage? will also explain why it is the correct answer when you select the "Learn Now" feature. The Practice Exam is the first IntelliSage? step in getting you ready to pass your certification exams.

Hands-on Lab Simulation

Hands-on Lab Simulation is a crucial component of your IT training. Practice make perfect. Step-by-step hands-on labs with detail instructions are included to reinforce all key concepts. When you complete a topic, choose the Lab Simulation button to select the associated hands-on lab exercises. Labs allow you to reinforce concepts by performing the tasks you've just learned..

Free Upgrades

A unique benefit of the our Learning System, is that
it allows you to stay current with the ever-changing certification requirements. When a certification test changes and we produce an upgrade for the certification program, we offer our customers free upgrades on their interactive DVD's for up to 1 year from date of original purchase? absolutely free!

 



MCP 70-298 Training Course

 
 
 
Online Course:£210 ex. VAT
DVD Study Kit: £210 ex. VAT
List Price:£495  
Online Library: 95% off
 
 
 

 
1yr Unlimited Online Access to 143 Courses
Save 95%

      What's included in each option?


 
mcse training
 ©Copyright 2010 All Rights Reserved
Designing Security for a Microsoft Windows Server 2003