Designing Security for Microsoft Networks
Course
In London
Description
-
Type
Course
-
Location
London
-
Duration
3 Days
This three-day instructor-led course provides you with the knowledge and skills to design a secure network infrastructure. Topics include assembling the design team, modeling threats, and analyzing security risks in order to meet business requirements for securing computers in a networked environment. The course encourages decision-making skills through real-life scenarios that the target audience may encounter. You are given the task of collecting the information and sorting through the.
Facilities
Location
Start date
Start date
Reviews
Course programme
Lessons
- Introduction to Designing Security for Microsoft Networks
- Contoso Pharmaceuticals: A Case Study
- Provide an overview of designing security for Microsoft networks
- Describe the components of the case study for this course
Lessons
- Introduction to Security Policies
- Designing Security by Using a Framework
- Creating a Security Design Team
- Exercise 1: Identifying Reasons Why Security Policies Fail
- Exercise 2: Determining the Members of a Security Design Team
- Describe common elements of security policies and procedures
- Create a security design framework by using theMSFprocess model
- Create a security design team
Your networks and data are vulnerable to any of these types of attacks if you do not have a security plan in place. In this module, you will learn how to identify possible threats to a network and understand common motivations of attackers. The module introduces theSTRIDE(Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, Elevation of privilege) threat model as an effective way to predict where threats may occur in an organization.
Lessons
- Introduction to Security Threats
- Predicting Threats to Security
- Exercise 1: Identifying and Categorizing Threats by Using a Threat Model
- Exercise 2: Documenting Security Threats
- Explain common network vulnerabilities and how attackers can exploit them
- Predict threats to security by using a threat model
In this module, you will learn how to determine what resources in your organization require protection and how to prioritize those resources based on their value. You will then develop a risk management plan, based on theMOFrisk model, to identify and analyze risks proactively and to determine an appropriate level of protection for each resource.
Lessons
- Introduction to Risk Management
- Creating a Risk Management Plan
- Exercise 1: Applying Quantitative and Qualitative Risk Analysis
- Explain the purpose and operation of risk management
- Create a risk management plan
In this module, you will determine threats and analyze physical risks to resources in an organization. You will then learn how to design security for facilities, computers, mobile devices, and hardware. You will also learn about implementing disaster recovery as a way to protect physical resources. This module focuses on physical access to resources and how to protect them. Other modules will focus on access to data and how to protect it.
Lessons
- Creating a Plan for Physical Security
- Creating a Design for Physical Security of Network Resources
- Exercise 1: Identifying Potential Physical Vulnerabilities
- Exercise 2: Implementing Countermeasures
- Create a plan for physical security
- Create a design for physical security of network resources
In this module, you will learn how to determine threats and analyze risks to network hosts in an organization. You will also learn how to design security for network hosts throughout their life cycles, from initial purchase to decommissioning.
Lessons
- Creating a Security Plan for Network Hosts
- Creating a Design for the Security of Network Hosts
- Exercise 1: Identifying Vulnerabilities When Applying Security Updates
- Exercise 2: Identifying Vulnerabilities When Decommissioning Computers
- Create a security plan for network hosts.
- Create a design for the security of network hosts.
If an attacker gains access to an account that has excessive privileges, or breaks the password that is associated with an account, the attacker can obtain authorized access to a network.
Windows services are executable programs that run in sessions outside the session that the user who is currently logged on is using. In this way, services run in the background, independent of any user session. Services can start automatically when the computer starts, and can also be paused and restarted. Services may not show a user interface, although they typically communicate with a user interface to control and administer the service. Because of this behavior, services are ideal for use on a server or whenever you require long-term functionality that does not interfere with other users who are working on the same computer. In addition to services that Microsoft has created, many third-party vendors design products to be deployed as services running continuously in the background. Antivirus services are an example of this type of product.
In this module, you will learn how to determine threats and analyze risks to accounts and services in an organization. You will also learn how to design security for accounts and services, including determining security requirements, creating policies, and designing strategies to manage security.
Lessons
- Creating a Security Plan for Accounts
- Creating a Security Plan for Services
- Creating a Design for Security of Accounts and Services
- Exercise 1: Identifying Potential Account Vulnerabilities
- Exercise 2: Applying Countermeasures
- Create a security plan for accounts
- Create a security plan for services
- Create a design for security of accounts and services
Lessons
- Creating a Security Plan for Authentication
- Creating a Design for Security of Authentication
- Exercise 1: Identifying Potential Authentication Vulnerabilities
- Exercise 2: Applying Countermeasures
- Create a security plan for authentication
- Create a design for security of authentication
In this module, you will learn how to determine threats and analyze risks to data in an organization. You will learn how to design an access control model for files and folders in order to protect data that is stored on network servers. You will also learn about considerations for encrypting and managing data.
Lessons
- Creating a Security Plan for Data
- Creating a Design for Security of Data
- Exercise 1: Identifying Potential Data Vulnerabilities
- Exercise 2: Designing Countermeasures
- Create a security plan for data
- Create a design for security of data
Lessons
- Creating a Security Plan for Data Transmission
- Creating a Design for Security of Data Transmission
- Exercise 1: Identifying Potential Data Transmission Vulnerabilities
- Exercise 2: Implementing Countermeasures
- Create a security plan for data transmission
- Create a design for security of data transmission
Traditional packet-filtering firewalls block network ports and computer addresses, but ports must be opened for the business applications. This means that your organization requires firewalls or proxy servers that are application-aware and capable of filtering network traffic at the application layer.
In this module, you will learn how to determine threats and analyze risks to network perimeters. You will also learn how to design security for network perimeters, including perimeter networks (also known as DMZs, demilitarized zones, and screened subnets), and for computers that connect directly to the Internet.
Lessons
- Creating a Security Plan for the Perimeter of a Network
- Creating a Design for Security of Network Perimeters
- Exercise 1: Identifying Potential Perimeter Network Vulnerabilities
- Exercise 2: Implementing Countermeasures
- Create a security plan for the perimeter of a network
- Create a design for security of network perimeters
When an attack happens, the key to limiting damage is early detection and a rapid and orderly response. Auditing is an important tool to help you to detect network abnormalities that may indicate attacks. An incident response procedure is a series of steps that you design in advance to guide your organization during a security incident.
Lessons
- Introduction to Auditing and Incident Response
- Designing an Audit Policy
- Designing and Incident Response Procedure
- Exercise 1: Identifying Potential Vulnerabilities
- Exercise 2: Implementing an Incident Response Team
- Exercise 3: Implementing an Incident Response Plan
- Describe auditing and incident response
- Design an audit policy
- Design an incident response procedure
This appendix provides information about creating policies for acceptable use of network resources by users.
Lessons
- Analyzing Risks That Users Introduce
- Designing Security for Computer Use
This appendix offers guidelines for ensuring that network administrators manage networks in a secure manner.
Lessons
- Analyzing Risks to Managing Networks
- Designing Security for Managing Networks
This appendix explains how to create a framework to ensure security of a network as the network changes and as the security requirements of the organization change.
Lessons
- Analyzing Risks to Ongoing Network Operations
- Designing a Framework for Ongoing Network Operations
Designing Security for Microsoft Networks