Microsoft Course 2830 - Designing Security for Microsoft Networks — A 3-Day Course

contact usEnquire about this course

This course has now been retired. Please see the Microsoft Security section for a list of current courses.

Course Synopsis

This three-day, instructor-led course provides you with the knowledge and skills to design a secure network infrastructure. Topics include assembling the design team, modeling threats, and analyzing security risks in order to meet business requirements for securing computers in a networked environment. The course encourages decision-making skills through an interactive tool that simulates real-life scenarios that the target audience may encounter. You are given the task of collecting the information and sorting through the details to resolve the given security requirement.

Course Objectives

On completion of this course, delegates should be able to:

Intended Audience

This course is intended for IT systems engineers and security specialists who are responsible for establishing security policies and procedures for an organization. Students should have one to three years of experience designing related business solutions.

Course Prerequisites

Before attending this course, students must have:

Microsoft Certified Professional Exams

This course will help the student prepare for the following MCP exams:

Course Materials

The student kit includes a comprehensive workbook and other necessary materials for this class.

Schedule

This course has been retired and is no longer available.


Outline Course Contents

Introduction to Designing Security

This module describes the basic framework for designing network security and introduces key concepts used throughout the course. It also introduces an ongoing case study that is utilized in the labs.

Creating a Plan for Network Security

This module discusses the importance of security policies and procedures in a security design. It also explains how a security design team must include representation from various members of your organization. After completing this module, you will be able use a framework for designing security and create a security design team.

Identifying Threats to Network Security

This module explains how to identify likely threats to a network and explains attacker motivations. After completing this module, you will be able to explain common threats and predict threats by using a threat model.

Analyzing Security Risks

This module explains how to determine what resources in an organization require protection and how to categorize them in order to assign an appropriate level of protection. After completing this module, you will be able to apply a framework for planning risk management.

Creating a Security Design for Physical Resources

This module describes threats and risks to physical resources in an organization, as well as how to secure facilities, computers, and hardware. After completing this module, you will be able to design security for physical resources.

Creating a Security Design for Computers

This module explains how to determine threats and analyze risks to computers on your network. After completing this module, you will be able to design security for computers.

Creating a Security Design for Accounts

This module describes the threats and risks to accounts in an organization. After completing this module, you will be able to design security for accounts.

Creating a Security Design for Authentication

This module describes threats and risks to authentication. After completing this module, you will be able to design security for authentication.

Creating a Security Design for Data

This module examines threats and risks to data. After completing this module, you will be able to design security for data.

Creating a Security Design for Data Transmission

This module discusses threats and risks to data transmission. After completing this module, you will be able to design security for data transmission.

Creating a Security Design for Network Perimeters

This module describes threats to the points where your network connects to other networks, such as the Internet. After completing this module, you will be able to design security for network perimeters.

Designing Responses to Security Incidents

This module provides information about auditing and creating procedures to direct how you respond to security incidents. After completing this module, you will be able to design an audit policy and an incident response procedure.