Данный курс обеспечивает слушателей начальными знаниями и навыками, необходимыми для реализации сетевой безопасности в организации.
Курс разработан для администраторов сетей на базе операционной системы Windows 2000 и специалистов по компьютерной безопасности.
Программа курса соответствует требованиям международного стандарта сертификации CompTIA Security+.
Слушателям выдаются учебные материалы, авторизованные Microsoft.
По окончании курса слушатели получают сертификат компании Microsoft международного образца.
Module 1: Preparing to Secure Information |
| Explaining How Assets Are Attacked
Explaining How Assets Are Secured |
|
Module 2: Implementing Security-Enhanced Computing Baselines |
| Introduction to Trusted Computing Bases
Establishing a Security Baseline
Monitoring a Security Baseline
Helping to Secure Computers Physically
Maintaining a Security Baseline |
|
Module 3: Helping to Protect Information Using Authentication and Access Control |
| Introduction to Access Control
Implementing an Authentication Strategy
Implementing an Access Control Strategy |
|
Module 4: Using Cryptography to Help Protect Information |
| Introduction to Cryptography
Using Symmetric Encryption
Using Hash Functions
Using Public Key Encryption |
|
Module 5: Using a PKI to Help Protect Information |
| Introduction to Certificates
Introduction to Public Key Infrastructure
Deploying and Managing Certificates |
|
Module 6: Securing Internet Applications and Components |
| Helping to Protect Web Servers
Configuring Security for Common Internet Protocols
Configuring Security for Web Browsers
Configuring Security for Databases |
|
Module 7: Implementing Security for E-Mail and Instant Messaging |
| Securing E-Mail Servers
Securing E-Mail Clients
Securing Instant Messaging |
|
Module 8: Managing Security for Directory Services and DNS |
| Helping protect Directory Services Against Common Threats
Helping Protect DNS Against Common Threats |
|
Module 9: Securing Data Transmission |
| Identifying Threats to Network Devices
Implementing Security for Common Data Transmission
Implementing Security for Remote Access
Implementing Security for Wireless Network Traffic |
|
Module 10: Implementing and Monitoring Security for Network Perimeters |
| Introduction to Network Perimeters
Implementing Security on Inbound and Outbound Network Traffic
Monitoring Network Traffic |
|
Module 11: Managing Operational Security |
| Establishing Security Policies and Procedures
Educating Users about Security Policies
Applying Security Policies to Operational Management
Resolving Ethical Dilemmas When Helping to Protect Assets |
|
Module 12: Preserving Business Continuity |
| Preparing to Recover from Disasters
Communicating the Impact of Risks
Performing a Security-Enhanced Backup and Recovery |
|
Module 13: Responding to Security Incidents |
| Identifying Security Incidents
Responding to Security Incidents
Investigating Security Incidents |
|