Данный курс обеспечивает слушателей знаниями и навыками, необходимыми для проектирования безопасной сетевой инфраструктуры.
Курс предназначен для специалистов, ответственных за создание политик и процедур безопасности в организации
Слушателям выдаются учебные материалы, авторизованные Microsoft.
По окончании курса слушатели получают сертификат компании Microsoft международного образца.
Module 1: Introduction to Designing Security |
| Introduction to Designing Security for Microsoft Networks
Contoso Pharmaceuticals: A Case Study |
|
Module 2: Creating a Plan for Network Security |
| Introduction to Security Policies
Defining a Process for Designing Network Security
Creating a Security Design Team |
|
Module 3: Identifying Threats to Network Security |
| Introduction to Security Threats
Predicting Threats to Security |
|
Module 4: Analyzing Security Risks |
| Introduction to Risk Management
Creating a Risk Management Plan |
|
Module 5: Creating a Security Design for Physical Resources |
| Determining Threats and Analyzing Risks to Physical Resources
Designing Security for Physical Resources |
|
Module 6: Creating a Security Design for Computers |
| Determining Threats and Analyzing Risks to Computers
Designing Security for Computers |
|
Module 7: Creating a Security Design for Accounts |
| Determining Threats and Analyzing Risks to Accounts
Designing Security for Accounts |
|
Module 8: Creating a Security Design for Authentication |
| Determining Threats and Analyzing Risks to Authentication
Designing Security for Authentication |
|
Module 9: Creating a Security Design for Data |
| Determining Threats and Analyzing Risks to Data
Designing Security for Data |
|
Module 10: Creating a Security Design for Data Transmission |
| Determining Threats and Analyzing Risks to Data Transmission
Designing Security for Data Transmission |
|
Module 11: Creating a Security Design for Network Perimeters |
| Determining Threats and Analyzing Risks to Network Perimeters
Designing Security for Network Perimeters |
|
Module 12: Designing Responses to Security Incidents |
| Introduction to Auditing and Incident Response
Designing an Audit Policy
Designing an Incident Response Procedure |
|