Instructor Notes The Introduction module provides students with an overview of the course content, materials, and logistics for Course 2830A, Designing Security for Microsoft Networks..
Trang 1Contents
Introduction 1
Prerequisites 3
Microsoft Official Curriculum 7
Microsoft Certified Professional Program 8
Facilities 10
Introduction
Trang 2Information in this document, including URL and other Internet Web site references, is subject to change without notice Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or should be inferred Complying with all applicable copyright laws is the responsibility of the user Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property
2002 Microsoft Corporation All rights reserved
Microsoft, MS-DOS, Windows, Windows NT, Active Directory, ActiveX, BizTalk, PowerPoint, Visio, and Windows Media are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries
The names of actual companies and products mentioned herein may be the trademarks of their respective owners
Trang 3Instructor Notes
The Introduction module provides students with an overview of the course
content, materials, and logistics for Course 2830A, Designing Security for
Microsoft Networks
This course contains teachable appendices, which are modules that do not contain practices, assessments, or labs If you have time at the end of the course, you can use the appendices as lecture material
To teach this course, you need the following materials:
Delivery Guide
Trainer Materials compact disc
To prepare for this course, you must:
Complete the Course Preparation Checklist that is included with the trainer course materials
Presentation:
30 minutes
Note
Required materials
Preparation tasks
Trang 4iv Introduction
How to Teach This Module
This section contains information that will help you to teach this module Welcome students to the course and introduce yourself Provide a brief overview of your background to establish credibility
Ask students to introduce themselves and provide their background, product experience, and expectations of the course
Record student expectations on a whiteboard or flip chart that you can reference later in class
Tell students that everything they will need for this course is provided at their desk
Have students write their names on both sides of the name card
Describe the contents of the student workbook and the Student Materials compact disc
This course has assessment items for each lesson, located on the Student Materials compact disc You can use them as pre-assessments to help students identify areas of difficulty, or you can use them as post-assessments to validate learning
Consider using them to reinforce learning at the end of the day You can also use them at the beginning of the day as a review for the content that was taught
on the previous day
Tell students where they can send comments and feedback on this course Demonstrate how to open the Web page that is provided on the Student
Materials compact disc by double-clicking Autorun.exe or Default.htm in the
StudentCD folder on the Trainer Materials compact disc
Describe the prerequisites for this course This is an opportunity for you to identify students who may not have the appropriate background or experience
to attend this course
Briefly describe each module and what students will learn Be careful not to go into too much detail because the course is introduced in detail in Module 1 Explain how this course will meet students’ expectations by relating the information that is covered in individual modules to their expectations
Explain that this course contains teachable appendices, which are modules that do not contain practices, assessments, or labs If you have time at the end of the course, you can use the appendices as lecture material Encourage students to read the material on their own
Introduction
Course materials
Important
Prerequisites
Course outline
Note
Trang 5Explain the Microsoft® Official Curriculum (MOC) program and present the list
of additional recommended courses
Refer students to the Microsoft Official Curriculum Web page at http://www.microsoft.com/traincert/training/ for information about curriculum paths
Inform students about the Microsoft Certified Professional (MCP) program, any certification exams that are related to this course, and the various certification options
Explain the class hours, extended building hours for labs, parking, restroom location, meals, phones, message posting, and where smoking is or is not allowed
Let students know if your facility has Internet access that is available for them
to use during class breaks
Also, make sure that the students are aware of the recycling program if one is available
Microsoft Official
Curriculum
Microsoft Certified
Professional program
Facilities
Trang 7Introduction
***************************** ILLEGAL FOR NON - TRAINER USE ******************************
Trang 82 Introduction
Course Materials
***************************** ILLEGAL FOR NON - TRAINER USE ******************************
The following materials are included with your kit:
Name card Write your name on both sides of the name card
Student workbook The student workbook contains the material covered in
class, in addition to the hands-on lab exercises
Student Materials compact disc The Student Materials compact disc
contains the Web page that provides you with links to resources pertaining
to this course, including additional readings, review and lab answers, lab files, multimedia presentations, and course-related Web sites
To open the Web page, insert the Student Materials compact disc into the CD-ROM drive, and then in the root directory of the compact disc,
double-click Autorun.exe or Default.htm
Assessments There are assessments for each lesson, located on the Student
Materials compact disc You can use them as pre-assessments to identify areas of difficulty, or you can use them as post-assessments to validate
learning
Course evaluation To provide feedback on the course, training facility, and
instructor, you will have the opportunity to complete an online evaluation near the end of the course
To provide additional comments or inquire about the Microsoft® Certified Professional (MCP) program, send e-mail to mcphelp@microsoft.com.
Note
Trang 9Prerequisites
***************************** ILLEGAL FOR NON - TRAINER USE ******************************
This course is intended for Information Technology (IT) systems engineers and security specialists who are responsible for establishing security policies and procedures for an organization Students should have one to three years of experience designing related business solutions
This course requires that you meet the following prerequisites:
A strong familiarity with Microsoft® Windows® 2000 core technologies,
such as those covered in Course 2152, Implementing Microsoft Windows
2000 Professional and Server
A strong familiarity with Windows 2000 networking technologies and
implementation, such as those covered in MOC Course 2153, Implementing
a Microsoft Windows 2000 Network Infrastructure
A strong familiarity with Windows 2000 directory services technologies and
implementation, such as those covered in MOC Course 2154, Implementing
and Administering Microsoft Windows 2000 Directory Services
Trang 104 Introduction
Course Outline
***************************** ILLEGAL FOR NON - TRAINER USE ******************************
Module 1, “Introduction to Designing Security,” describes the basic framework for designing network security and introduces key concepts used throughout the course It also introduces an ongoing case study that is utilized in the labs Module 2, “Creating a Plan for Network Security,” discusses the importance of security policies and procedures in a security design It also explains how a security design team must include representation from various roles in your organization After completing this module, you will be able use a framework for designing security and creating a security design team
Module 3, “Identifying Threats to Network Security,” explains how to identify likely threats to a network, and it explains attacker motivations After
completing this module, you will be able to explain common threats and predict threats by using a threat model
Module 4, “Analyzing Security Risks,” explains how to determine what resources in an organization require protection and how to categorize them in order to determine an appropriate level of protection After completing this module, you will be able to apply a framework for planning risk management Module 5, “Creating a Security Design for Physical Resources,” describes threats and risks to physical resources in an organization and how to secure facilities, computers, and hardware After completing this module, you will be able to design security for physical resources
Module 6, “Creating a Security Design for Computers,” explains how to determine threats and analyze risks to computers on your network After completing this module, you will be able to design security for computers Module 7, “Creating a Security Design for Accounts,” describes the threats and risks to accounts in an organization After completing this module, you will be able to design security for accounts
Trang 11Course Outline (continued)
***************************** ILLEGAL FOR NON - TRAINER USE ******************************
Module 8, “Creating a Security Design for Authentication,” describes threats and risks to authentication After completing this module, you will be able to design security for authentication
Module 9, “Creating a Security Design for Data,” examines threats and risks to data After completing this module, you will be able to design security for data Module 10, “Creating a Security Design for Data Transmission,” discusses threats and risks to data transmission After completing this module, you will be able to design security for data transmission
Module 11, “Creating a Security Design for Network Perimeters,” describes threats to the points where your network connects to other networks, such as the Internet After completing this module, you will be able to design security for network perimeters
Module 12, “Designing Responses to Security Incidents,” provides information about auditing and creating procedures to direct how you respond to security incidents After completing this module, you will be able to design an audit policy and incident response procedures
Appendix A, “Designing an Acceptable Use Policy,” explains how to create policies for acceptable use of network resources by users
Appendix B, “Designing Policies for Managing Networks,” offers guidelines for ensuring that network administrators manage the network in a secure manner
Appendix C, “Designing an Operations Framework to Manage Security,”
explains how to create a framework to ensure security of a network as the network changes and as the security requirements of the organization change
Trang 126 Introduction
Initial Logon Procedure
***************************** ILLEGAL FOR NON - TRAINER USE ******************************
To meet the complexity requirements for the password that you will use in this course, you must include characters in your password from at least three of the following four categories:
Uppercase letters (A to Z)
Lowercase letters (a to z)
Numbers (0 to 9)
Symbols (! @ # $)
To create the password that you will use in this course, you must log on either
as Studentxx, where xx is your student number, or as Student, depending on
the classroom setup
Ç Log on to your account
1 Press CTRL+ALT+DEL to open the Log On to Windows dialog box
2 In the User name box, type Studentxx or Student
3 In the Password box, type P@ssw0rd
4 In the Log on to box, select the name of the domain that is used in the course or the name of your computer, and then click OK
The Logon Message dialog box appears, stating that your password must be
changed at initial logon
Ç Change your password
1 In the Logon Message dialog box, click OK
2 In the New Password box, type your new password
3 In the Confirm New Password box, retype your password, and then click
OK
4 In the Change Password dialog box, click OK
Complex passwords
Tasks
Trang 13Microsoft Official Curriculum
***************************** ILLEGAL FOR NON - TRAINER USE ******************************
Microsoft Training and Certification develops Microsoft Official Curriculum (MOC), including MSDN® Training, for computer professionals who design, develop, support, implement, or manage solutions by using Microsoft products and technologies These courses provide comprehensive skills-based training in instructor-led and online formats
For more information, visit the Microsoft Training and Certification Web site at http://www.microsoft.com/traincert/
Introduction
Microsoft Training and
Certification information
Trang 148 Introduction
Microsoft Certified Professional Program
***************************** ILLEGAL FOR NON - TRAINER USE ******************************
Microsoft Training and Certification offers a variety of certification credentials for developers and IT professionals The Microsoft Certified Professional program is the leading certification program for validating your experience and skills, keeping you competitive in today’s changing business environment The Microsoft Certified Professional program includes the following certifications
MCSA on Microsoft Windows 2000 The Microsoft Certified Systems Administrator (MCSA) certification is designed for professionals who implement, manage, and troubleshoot existing network and system environments based on Windows 2000 platforms, including the Windows NET Server family Implementation responsibilities include installing and configuring parts of the systems Management responsibilities include administering and supporting the systems
The Microsoft Certified Systems Engineer (MCSE) credential is the premier certification for professionals who analyze the business requirements and design and implement the infrastructure for business solutions based on the Windows 2000 platform and Microsoft server software, including the Windows NET Server family Implementation responsibilities include installing, configuring, and troubleshooting network systems
The Microsoft Certified Application Developer (MCAD) for Microsoft .NET credential is appropriate for professionals who use Microsoft technologies to develop and maintain department-level applications, components, Web or desktop clients, or back-end data services or work in teams developing enterprise applications The credential covers job tasks ranging from developing to deploying and maintaining these solutions
Introduction
MCP certifications