Microsoft Course 2823 - Implementing and Administering Security in a Microsoft Windows Server 2003 Network — A 5-Day Course

contact usEnquire about this course

This course has now been retired. Please see the Microsoft Security section for a list of current courses.

Course Synopsis

This five-day instructor-led M2823 course addresses the MCSA and MCSE skills path for IT Pro security practitioners, specifically addressing the training needs of those preparing for the 70-299 certification exam.

The primary product focus is on Microsoft Windows Server™ 2003 based infrastructure solutions but will include some client focused content where appropriate. This learning product is to provide functional skills in planning and implementing infrastructure security.

This course is part of the Security Portfolio and will act as the primary entry point for IT Professionals at the implementation level. Course 2810 will provide an entry point for students to broaden their awareness of security issues. Students will be encouraged to enhance their security design skills by attending Course 2830.

Course Objectives

On completion of this M2823 training course, delegates should be able to:

Intended Audience

The course is for a system administrator or system engineer who has the foundation implementation skills and knowledge for the deployment of secure Microsoft Windows Server 2003 based solutions. This course is not intended to provide design skills, but will cover planning skills at a level sufficient to enable decision making for the implementation process.

Course Prerequisites

Before attending this course, students must have:

Microsoft Certified Professional Exams

This course will help the student prepare for the following MCP exam:

Course Materials

The student kit includes a comprehensive workbook and other necessary materials for this class.

The following software is provided for use in the classroom:


This course has been retired and is no longer available.

Outline Course Contents

Planning and Configuring an Authorization and Authentication Strategy

This module explains how to evaluate the infrastructure of your organization and create and document an authorization and authentication plan that allows the appropriate level of access to various security principals. It also describes trust relationships, domain and forest functional levels, and basic security principles.

Installing, Configuring, and Managing Certification Authorities

This module describes the fundamentals of the systems that make secure communication possible. It describes methods, such as a public key infrastructure (PKI), that enable you to securely communicate on networks.

Configuring, Deploying, and Managing Certificates

This module explains how to ensure that the certificates are issued to the correct security principals and for the intended purpose. It describes, for example, how to make the deployment of certificates an easy and straightforward task for end users.

Planning, Implementing, and Troubleshooting Smart Card Certificates

This module describes how to deploy, manage, and configure certificates and certificate templates in a public key infrastructure (PKI) environment.

Planning, Implementing, and Troubleshooting Encrypting File System

This module describes how to plan, implement, and troubleshoot Encrypting File System (EFS).

Planning, Configuring, and Deploying a Secure Member Server Baseline

The security of a network depends on the security configuration of the servers that make up the network. Any breach of security on a single server can jeopardize the security of all computers in the network, thereby jeopardizing the security of the network itself. In this module, students will learn how to create secure baselines for servers.

Planning, Configuring, and Implementing Secure Baselines for Server Roles

In this module, students will learn how to create secure baselines for various server roles.

Planning, Configuring, Implementing, and Deploying a Secure Client Computer Baseline

In this module, students will learn how to create secure baselines for client computers.

Planning and Implementing Software Update Services

In this module, students will learn how to plan and implement update management strategies on computers.

Planning, Deploying, and Troubleshooting Data Transmission Security

This module provides students with the information they need to plan and troubleshoot data transmission security.

Planning and Implementing Security for Wireless Networks

A wireless network uses technology that enables two or more devices to communicate through standard network protocols and electromagnetic waves-not network cabling-to carry signals over part or all of the communication path. This module describes how to plan and implement security for wireless networks.

Planning and Implementing Perimeter Security with Internet Security and Acceleration Server 2000

Networks in organizations today are commonly interconnected-various networks within an organization connect to each other, and corporate networks connect to the Internet. Although this presents new business opportunities, it can also cause concerns about security, performance, and manageability.

Securing Remote Access

Remote access enables remote access clients to access corporate networks as if they were directly connected to the corporate network. The remote access clients connect to the network by using dial-up communication links. The security of a network is compromised if unauthorized remote users gain access to intranet-based resources. An effective network access security design ensures confirmation of the identity of the clients attempting to access your organization's network resources and protection of specific resources from inappropriate access by users.