The focus of this course is Microsoft Windows Server 2003 based infrastructure solutions and includes some client focused content. This learning product is to provide functional skills in planning and implementing infrastructure security. Who Should Attend: The course is for a system administrator or system engineer who has the foundation implementation skills and knowledge for the deployment of secure Microsoft Windows Server 2003 based solutions. This course is not intended to provide design skills, but will cover planning skills at a level sufficient to enable decision making for the implementation process. At Course Completion: After completing this course, students will gain the skills to: - Plan and configure an authorization and authentication strategy in a multi-forest organization. - Install, configure, and manage a certification authority (CA). - Configure, deploy, and manage certificates. - Plan, implement, and troubleshoot smart card certificates. - Plan, implement, and troubleshoot Encrypting File System (EFS). - Plan, configure, and deploy a secure member server baseline. - Plan, configure, and implement secure baselines for server roles. - Plan, configure, implement, and deploy a secure client computer baseline. - Plan and implement Software Update Services. - Plan, implement, and troubleshoot data transmission security. - Plan and implement security for wireless networks. - Plan and implement perimeter security with Internet Security and Acceleration Server (ISA) 2000. - Secure remote access. |
Prerequisite(s) or equivalent knowledge: |
2810 Fundamentals of Network Security |
|
Outline: | |
Lesson 1: Planning and Configuring an Authorization and Authentication Strategy |
Groups and Basic Group Strategy in Windows Server 2003 Creating Trusts in Windows Server 2003 Planning, Implementing, and Maintaining an Authorization Strategy Using Groups Components of an Authentication Model Planning and Implementing an Authentication Strategy | |
Lesson 2: Installing, Configuring, and Managing Certification Authorities |
Introduction to PKI and Certification Authorities Installing a Certification Authority Managing a Certification Authority Backing Up and Restoring a Certification Authority |
Lesson 3: Configuring, Deploying, and Managing Certificates |
Configuring Certificate Templates Deploying and Revoking User and Computer Certificates Managing Certificates |
Lesson 4: Planning, Implementing, and Troubleshooting Smart Card Certificates |
Introduction to Multifactor Authentication Planning and Implementing a Smart Card Infrastructure Managing and Troubleshooting a Smart Card Infrastructure |
Lesson 5: Planning, Implementing, and Troubleshooting Encrypting File System |
Introduction to EFS Implementing EFS in a Standalone Microsoft Windows XP Environment Planning and Implementing EFS in a Domain Environment with a PKI Implementing EFS File Sharing Troubleshooting EFS | |
Lesson 6: Planning, Configuring, and Deploying a Secure Member Server Baseline |
Overview of a Member Server Baseline Planning a Secure Member Server Baseline Configuring Additional Security Settings Deploying Security Templates |
Lesson 7: Planning, Configuring, and Implementing Secure Baselines for Server Roles |
Planning and Configuring a Secure Baseline for Domain Controllers Planning and Configuring a Secure Baseline for DNS Servers Planning and Configuring a Secure Baseline for Infrastructure Servers Planning a Secure Baseline for File and Print Servers Planning and Configuring a Secure Baseline for IIS Servers |
Lesson 8: Planning, Configuring, Implementing, and Deploying a Secure Client Computer Baseline |
Planning and Implementing a Secure Client Computer Baseline Configuring and Deploying a Client Computer Baseline Planning and Implementing a Software Restriction Policy Implementing Security for Mobile Clients |
Lesson 9: Planning and Implementing Software Update Services |
Introduction to Software Update Services and Update Management Planning an Update Management Strategy Implementing an SUS Infrastructure | |
Lesson 10: Planning, Deploying, and Troubleshooting Data Transmission Security |
Secure Data Transmission Methods Introducing IPSec Planning Data Transmission Security Implementing Secure Data Transmission Methods Troubleshooting IPSec Communications |
Lesson 11: Planning and Implementing Security for Wireless Networks |
Introduction to Securing Wireless Networks Implementing 802.1x Authentication Planning a Secure WLAN Strategy Implementing a Secure WLAN Troubleshooting Wireless Networks |
Lesson 12: Planning and Implementing Perimeter Security with Internet Security and Acceleration Server 2000 |
Introduction to Internet Security and Acceleration Server 2000 Installing ISA Server 2000 Securing a Perimeter Network with ISA Server 2000 Publishing Servers on a Perimeter Network Securing ISA Server Computers |
Lesson 13: Securing Remote Access |
Introduction to Remote Access Technologies and Vulnerabilities Planning a Remote Access Strategy Deploying Network Access Quarantine Control Components |