|  
  
  
  
  |  | 
 Course 2150—Five 
      days—Instructor-led
      
 Preliminary Course SyllabusDesigning a Secure Microsoft Windows 2000 Network
 
 Table of Contents
 
 Introduction
 At Course Completion
 Microsoft Certified Professional Exams
 Prerequisites
 Course Materials and Software
 Course Outline
 
 This provides students with the knowledge and skills necessary to design a
      security framework for small, medium, and enterprise networks using
      Microsoft® Windows® 2000 technologies. This course contains four units
      that describe security in specific areas of the network:
 
        Unit 1, Providing Secure Access to Local Network Users
        Unit 2, Providing Secure Access to Remote Users and Remote
          Offices
        Unit 3, Providing Secure Access Between Private and Public
          Networks
        Unit 4, Providing Secure Access to Partners Return to top
 At the end of the course, students will be able to:
 
        Identify the security risks associated with managing resource access
          and data flow on the network.
        Describe how key technologies within Windows 2000 are used to secure
          a network and its resources.
        Plan a Windows 2000 administrative structure so that permissions are
          granted only to appropriate users.
        Plan an Active Directory™ directory service structure that
          facilitates secure and verifiable user account creation and
          administration.
        Define minimum security requirements for Windows 2000-based domain
          controllers, application servers, file and print servers, and
          workstations.
        Design a strategy for securing local storage of data and providing
          secure network access to file and print resources.
        Design end-to-end security for the transmission of data between
          hosts on the network.
        Design a strategy for securing access for non-Microsoft clients
          within a Windows 2000-based network.
        Design a strategy for securing local resources accessed by remote
          users using dial-in or Virtual Private Network (VPN) technologies.
        Design a strategy for securing local resources accessed by remote
          offices within a wide area network (WAN) environment.
        Protect private network resources from public network users.
        Design a strategy for securing private network user access to public
          networks.
        Design a strategy for authenticating trusted users over public
          networks.
        Design a strategy for securing data and application access for the
          private network when accessed by trusted partners.
        Plan for an e-commerce implementation between your organization and
          external business partners that facilitates business communication.
        Design a structured methodology for securing a Windows 2000 network. Return to top
 This course will help the student prepare for the following Microsoft
      Certified Professional exam:
 Return to top
 This course requires that students meet the following prerequisites:
      
      The course materials, lectures, and lab exercises are in English. To
      benefit fully from the instruction, students need an understanding of the
      English language and completion of the prerequisites.
 Return to top
 The course materials are yours to keep.
 You will be provided with the following software for use in the
      classroom:
       
        Windows 2000 Advanced Server
        Network Monitor 2.0
        Microsoft Proxy Server 2.0 Return to top
 
 Day 1Module 1: Assessing Security RisksTopicsWhat is at Risk?What are the Potential Threats to the Network?
 Describing Common Security Standards
 Planning Enterprise Security
 LabIntroducing Northwind TradersSkillsStudents will be able to:
 
        Determine what is at risk if security is compromised on a network.
        Determine common threats against network security.
        Review common standards against which security is measured.
        Discuss a methodology for securing enterprise networks. Module 2: Introducing the Windows 2000 Security ModelTopicsThe role of Directory Services in the Security FrameworkIdentifying Authentication Methods Available Within Windows 2000 Networks
 Controlling Access to Resources on Windows 2000 Networks
 Introducing Encryption Technology
 Encrypting Stored and Transmitted Data in Windows 2000 Networks
 Introducing Public Key Infrastructure Technology
 LabsAssessing Security in Given ScenariosWhat Type of Authentication Is Available in Given Scenarios?
 SkillsStudents will be able to:
 
        Analyze the role of Windows 2000 Active Directory in the Windows
          2000 security framework.
        Describe the authentication protocols used by Windows 2000.
        Describe how objects and resources are secured in Windows 2000.
        Examine common methods of encrypting and validating data.
        Describe how Windows 2000 supports the encryption of both stored
          data and transmitted data.
        Describe how a public key infrastructure can be used to implement
          certificate-based identification and authentication.
        Plan security for local resources and access on a local network. Unit 1: Providing Secure Access to Local Network UsersModule 3: Planning Administrative Access
       TopicsDefining the Administrative StructureAssigning Administrative Roles
 Providing Administrative Access
 LabsPlanning an Administration StructureSecondary Logon and Remote Administration
 SkillsStudents will be able to:
 
        Define the network administrative roles that exist in an
          organization.
        Plan memberships in the Windows 2000 administrative groups.
        Plan secure administrative access to the network. Module 4: Planning User AccountsTopicsDesigning a Domain and Organizational Unit StructurePlanning Account Creation and Location
 Planning Delegation of Authority
 Designing an Audit Policy for Tracking Account Changes
 LabsPlanning a Security-based OU StructureGroup Policy Security Settings
 SkillsStudents will be able to:
 
        Design a Windows 2000 domain and organizational unit (OU) structure
          that will support your account and group policy configuration.
        Plan for the creation of accounts within the OU structure using both
          batch methodology and the Active Directory Users and Computers
          console.
        Plan a delegation of authority strategy for OUs.
        Design an audit strategy that will track changes made to the Active
          Directory contents. Day 2Module 5: Securing Windows 2000-Based ComputersTopicsEvaluating the Security Requirements of Windows 2000-Based SystemsSecuring Physical Access to Windows 2000-Based Systems
 Designing Security Configuration Policies
 Analysis of Security Configuration
 LabsPlanning a Security Baseline TemplateEvaluating a Baseline Template
 SkillsStudents will be able to:
 
        Evaluate the security requirements for Windows 2000-based systems
          with respect to their role in the enterprise network.
        Plan physical and hardware configuration measures to secure Windows
          2000-based systems.
        Design security configuration templates that can be used to enforce
          security settings.
        Plan the use of security baseline templates to evaluate the current
          security configuration of a Windows 2000-based system. Module 6: Securing File and Print ResourcesTopicsComparing the Security of Windows 2000 File SystemsProtecting Data Using Access Control Lists
 Encrypting Data Using EFS
 Auditing Resource Access
 Securing Backup and Restore Procedures
 Protecting Data From Viruses
 LabsPlanning Data SecurityManaging EFS Recovery
 SkillsStudents will be able to:
 
        Describe the security provided in the file systems supported by
          Windows 2000.
        Design a security strategy for protecting the registry, files
          resources, and print resources by using Access Control Lists.
        Design a strategy for the protection and recovery of file resources
          using EFS.
        Design an auditing strategy to determine file and print resource
          access.
        Design a secure backup and restore procedure that allows for
          disaster recovery.
        Plan for virus protection in your network security design. Day 3Module 7: Securing Communication Channels on the Local NetworkTopicsDemonstration: Investigating Web AccessAssessing Network Data Visibility Risks
 Evaluating Network Authentication Methods
 Protecting Network Data Transmission from Packet-Level Impersonation
 Encrypting Network Data Transmissions with Internet Protocol Security (IPSec)
 LabsPlanning Network Data Transmission SecurityEvaluating Transport Security using IPSec Policies
 SkillsStudents will be able to:
 
        Assess potential risks to data risks to data when it is transported
          between clients on the Local Area Network.
        Compare and contrast the network authentication methods that can be
          used by Windows 2000 clients and down-level clients.
        Design a strategy for protecting data transmissions on the private
          network from packet-level impersonation.
        Design an IPSec strategy for encrypting private network data
          transmissions. Module 8: Providing Secure Access to Non-Microsoft ClientsTopicsDemonstration: Investigating a TelNet ConnectionProviding Secure Access to IP-Based Clients
 Providing Secure Access to NetWare Clients
 Providing Secure Access to Macintosh Clients
 LabsPlanning Non-Microsoft Client Access to Shared ResourcesInvestigating IP Protocol Risks
 SkillsStudents will be able to:
 
        Describe the inherent risks and the management strategy involved
          when deploying standard IP client/server sockets-based applications.
        Describe the additional security measures that must be taken when
          integrating NetWare clients on your network.
        Describe the additional security measures that must be taken when
          integrating Macintosh clients on your network. Unit 2: Providing Secure Access to Remote Users and OfficesModule 9: Providing Secure Access to Remote Users
       TopicsPlanning Remote Access SecurityAuthentication and Accounting Providers
 Planning Server-side Security for Remote Connectivity
 Planning Client-side Security for Remote Connectivity
 LabsPlanning Secure Remote AccessAnalyzing Remote Data Transmissions
 SkillsStudents will be able to:
 
        Compare and contrast the common methods that may be used by remote
          users to connect to the private network.
        Compare and contrast the server configuration options available to
          allow secure remote connectivity to your network by individual users.
        Compare and contrast the client configuration options available to
          allow secure connectivity to a remote private network.
        Create a distributed authentication framework for remote clients. Day 4Module 10: Providing Secure Access to Remote OfficesTopicsComparing Private and Public NetworksSecuring WAN Links Over a Private Network
 Securing WAN Links Over a Public Network
 LabsPlanning Secure Connections for a New Remote OfficeInvestigating Tunneling Filters
 SkillsStudents will be able to:
 
        Introduce how public and private networks interact and describe the
          common physical technologies that are used to provide connectivity.
        Plan secure WAN links to branch offices using dedicated network
          connections.
        Plan secure WAN links to branch offices using tunneling technologies
          over public networks. Unit 3: Providing Secure Access Between Private and Public NetworksModule 11: Maintaining Security When Allowing Public Access to Your
      Private Network
       TopicsPotential RisksProtecting Networks using Firewalls
 Demonstration: Port Mapping Example
 Protecting Resources Exposed on the Internet
 Planning Placement of Servers in a Firewall Configuration
 LabsPlanning an ISP Using Windows 2000Validate a Demilitarized Zone Configuration
 Planning Common Packet Filtering
 SkillsStudents will be able to:
 
        Analyze the common threats that are introduced when your private
          network is connected to a public network.
        Design a firewall strategy for protecting your private network.
        Design a secure method for exposing private network resources to the
          public network.
        Plan secure placement of servers when working with interconnected
          private and public networks. Module 12: Maintaining Security When Accessing Public Networks from
      Your NetworkTopicsAnalyzing Threats Introduced by an Internet ConnectionProtecting Internet Network Addressing Schemes
 Using Server-Side Configuration to Control Content Accessed by Network
      Users
 Using Client-Side Configuration to Control Content Accessed by Network
      Users
 LabsPlanning a Deployment Plan for the Client SystemsUsing NetStat to View What Is Being Used by the Clients
 Configuring Proxy Server to Only Allow Specific Protocol Usage
 SkillsStudents will be able to:
 
        Analyze the various threats that are introduced to the network when
          users are allowed to access the Internet.
        Design a strategy for protecting the private network IP addressing
          scheme from the public network.
        Design the server side requirements for maintaining security when
          authenticated users access public networks.
        Design the client-side requirements for maintaining security when
          authenticated users access public networks.
        Plan security when trusted individuals and organizations access
          private network data and resources over a public network. Day 5Unit 4: Providing Secure Access to PartnersModule 13: Authenticating Trusted Partners
       TopicsAuthenticating Partners Using Windows 2000 User AccountsAuthenticating Partners Using Trusted Domains
 Authenticating Partners Using Internet Technologies
 Planning Certificate-Based Authentication
 LabsPlanning Authentication Methods for Partner OrganizationsInvestigating the Effects of Certificate Revocation
 SkillsStudents will be able to:
 
        Design a secure framework for partner access using Windows 2000 user
          accounts.
        Design a secure framework for trusted partners to access the private
          network by using trust relationships.
        Compare and contrast the methods available for authenticating
          clients by using Internet technologies.
        Design a certificate-based authentication framework for a Windows
          2000 network. Module 14: Providing Secure Resource Access to Trusted PartnersTopicsProviding Secure Access Using Resource PermissionsSecuring Access for Remote Partners
 Providing Secure Partner Access to Data Using Terminal Services
 Providing Secure Partner Access to Data Using Web Technologies
 Providing Secure Partner Access to Data Using Messaging
 LabsSelecting Access Methods for PartnersConfiguring a Certificate Authority Hierarchy
 SkillsStudents will be able to:
 
        Design secure resource access for trusted partners by using access
          control lists.
        Plan which resources will be exposed to trusted partners and where
          those resources will be placed on the network.
        Design secure resource access to trusted partners by using terminal
          services.
        Design secure access to resources using Web technologies.
        Design secure resource sharing using a messaging solution. Module 15: Providing Business to Business and E-Commerce SecurityTopicsPlanning for Business-to-Business ApplicationsPlanning for Secure Business Communication Between Partners
 LabsPlanning an E-Commerce SitePlanning a Personalization and Membership Server
 SkillsStudents will be able to:
 
        Describe the various technologies commonly used when implementing
          secure business-to-business applications.
        Plan knowledge management and business communications between
          business partners. Module 16: TitleTopicsDeveloping a Security TeamDefining the Scope of Security
 Analyzing the Current Network Configuration
 Designing a Security Baseline for Your Network
 Developing and Implementing a Project Plan
 Maintaining Security
 Maintaining Awareness of Current Security Issues
 SkillsStudents will be able to:
 
        Plan the composition of a security team that will develop your
          organization's security plan.
        Determine the security needs for your network based on your local
          network, remote networks, public networks and associations with
          trusted partners.
        Analyze the current security configuration of your network.
        Design the security baseline for your network based on your
          organization's security goals.
        Design a security plan rollout.
        Design a strategy to maintain your network's current level of
          security as the security landscape changes. 
   
          
 
 
    Return to top
   |  |