Данный курс обеспечивает слушателей начальными знаниями и навыками, необходимыми для реализации сетевой безопасности в организации.
Курс разработан для администраторов сетей на базе операционной системы Windows 2000 и специалистов по компьютерной безопасности.
Программа курса соответствует требованиям международного стандарта сертификации CompTIA Security+.
Слушателям выдаются учебные материалы, авторизованные Microsoft.
По окончании курса слушатели получают сертификат компании Microsoft международного образца.
Module 1: Preparing to Secure Information |
 | Explaining How Assets Are Attacked
Explaining How Assets Are Secured |
|
Module 2: Implementing Security-Enhanced Computing Baselines |
 | Introduction to Trusted Computing Bases
Establishing a Security Baseline
Monitoring a Security Baseline
Helping to Secure Computers Physically
Maintaining a Security Baseline |
|
Module 3: Helping to Protect Information Using Authentication and Access Control |
 | Introduction to Access Control
Implementing an Authentication Strategy
Implementing an Access Control Strategy |
|
Module 4: Using Cryptography to Help Protect Information |
 | Introduction to Cryptography
Using Symmetric Encryption
Using Hash Functions
Using Public Key Encryption |
|
Module 5: Using a PKI to Help Protect Information |
 | Introduction to Certificates
Introduction to Public Key Infrastructure
Deploying and Managing Certificates |
|
Module 6: Securing Internet Applications and Components |
 | Helping to Protect Web Servers
Configuring Security for Common Internet Protocols
Configuring Security for Web Browsers
Configuring Security for Databases |
|
Module 7: Implementing Security for E-Mail and Instant Messaging |
 | Securing E-Mail Servers
Securing E-Mail Clients
Securing Instant Messaging |
|
Module 8: Managing Security for Directory Services and DNS |
 | Helping protect Directory Services Against Common Threats
Helping Protect DNS Against Common Threats |
|
Module 9: Securing Data Transmission |
 | Identifying Threats to Network Devices
Implementing Security for Common Data Transmission
Implementing Security for Remote Access
Implementing Security for Wireless Network Traffic |
|
Module 10: Implementing and Monitoring Security for Network Perimeters |
 | Introduction to Network Perimeters
Implementing Security on Inbound and Outbound Network Traffic
Monitoring Network Traffic |
|
Module 11: Managing Operational Security |
 | Establishing Security Policies and Procedures
Educating Users about Security Policies
Applying Security Policies to Operational Management
Resolving Ethical Dilemmas When Helping to Protect Assets |
|
Module 12: Preserving Business Continuity |
 | Preparing to Recover from Disasters
Communicating the Impact of Risks
Performing a Security-Enhanced Backup and Recovery |
|
Module 13: Responding to Security Incidents |
 | Identifying Security Incidents
Responding to Security Incidents
Investigating Security Incidents |
|