1. Trang chủ
  2. » Công Nghệ Thông Tin

Tài liệu Training and certification doc

16 335 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Designing Security for Microsoft Networks
Trường học Microsoft Corporation
Chuyên ngành Computer Networking
Thể loại Course materials
Năm xuất bản 2002
Định dạng
Số trang 16
Dung lượng 577,33 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Instructor Notes The Introduction module provides students with an overview of the course content, materials, and logistics for Course 2830A, Designing Security for Microsoft Networks..

Trang 1

Contents

Introduction 1

Prerequisites 3

Microsoft Official Curriculum 7

Microsoft Certified Professional Program 8

Facilities 10

Introduction

Trang 2

Information in this document, including URL and other Internet Web site references, is subject to change without notice Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or should be inferred Complying with all applicable copyright laws is the responsibility of the user Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property

 2002 Microsoft Corporation All rights reserved

Microsoft, MS-DOS, Windows, Windows NT, Active Directory, ActiveX, BizTalk, PowerPoint, Visio, and Windows Media are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries

The names of actual companies and products mentioned herein may be the trademarks of their respective owners

Trang 3

Instructor Notes

The Introduction module provides students with an overview of the course

content, materials, and logistics for Course 2830A, Designing Security for

Microsoft Networks

This course contains teachable appendices, which are modules that do not contain practices, assessments, or labs If you have time at the end of the course, you can use the appendices as lecture material

To teach this course, you need the following materials:

„ Delivery Guide

„ Trainer Materials compact disc

To prepare for this course, you must:

„ Complete the Course Preparation Checklist that is included with the trainer course materials

Presentation:

30 minutes

Note

Required materials

Preparation tasks

Trang 4

iv Introduction

How to Teach This Module

This section contains information that will help you to teach this module Welcome students to the course and introduce yourself Provide a brief overview of your background to establish credibility

Ask students to introduce themselves and provide their background, product experience, and expectations of the course

Record student expectations on a whiteboard or flip chart that you can reference later in class

Tell students that everything they will need for this course is provided at their desk

Have students write their names on both sides of the name card

Describe the contents of the student workbook and the Student Materials compact disc

This course has assessment items for each lesson, located on the Student Materials compact disc You can use them as pre-assessments to help students identify areas of difficulty, or you can use them as post-assessments to validate learning

Consider using them to reinforce learning at the end of the day You can also use them at the beginning of the day as a review for the content that was taught

on the previous day

Tell students where they can send comments and feedback on this course Demonstrate how to open the Web page that is provided on the Student

Materials compact disc by double-clicking Autorun.exe or Default.htm in the

StudentCD folder on the Trainer Materials compact disc

Describe the prerequisites for this course This is an opportunity for you to identify students who may not have the appropriate background or experience

to attend this course

Briefly describe each module and what students will learn Be careful not to go into too much detail because the course is introduced in detail in Module 1 Explain how this course will meet students’ expectations by relating the information that is covered in individual modules to their expectations

Explain that this course contains teachable appendices, which are modules that do not contain practices, assessments, or labs If you have time at the end of the course, you can use the appendices as lecture material Encourage students to read the material on their own

Introduction

Course materials

Important

Prerequisites

Course outline

Note

Trang 5

Explain the Microsoft® Official Curriculum (MOC) program and present the list

of additional recommended courses

Refer students to the Microsoft Official Curriculum Web page at http://www.microsoft.com/traincert/training/ for information about curriculum paths

Inform students about the Microsoft Certified Professional (MCP) program, any certification exams that are related to this course, and the various certification options

Explain the class hours, extended building hours for labs, parking, restroom location, meals, phones, message posting, and where smoking is or is not allowed

Let students know if your facility has Internet access that is available for them

to use during class breaks

Also, make sure that the students are aware of the recycling program if one is available

Microsoft Official

Curriculum

Microsoft Certified

Professional program

Facilities

Trang 7

Introduction

***************************** ILLEGAL FOR NON - TRAINER USE ******************************

Trang 8

2 Introduction

Course Materials

***************************** ILLEGAL FOR NON - TRAINER USE ******************************

The following materials are included with your kit:

„ Name card Write your name on both sides of the name card

„ Student workbook The student workbook contains the material covered in

class, in addition to the hands-on lab exercises

„ Student Materials compact disc The Student Materials compact disc

contains the Web page that provides you with links to resources pertaining

to this course, including additional readings, review and lab answers, lab files, multimedia presentations, and course-related Web sites

To open the Web page, insert the Student Materials compact disc into the CD-ROM drive, and then in the root directory of the compact disc,

double-click Autorun.exe or Default.htm

„ Assessments There are assessments for each lesson, located on the Student

Materials compact disc You can use them as pre-assessments to identify areas of difficulty, or you can use them as post-assessments to validate

learning

„ Course evaluation To provide feedback on the course, training facility, and

instructor, you will have the opportunity to complete an online evaluation near the end of the course

To provide additional comments or inquire about the Microsoft® Certified Professional (MCP) program, send e-mail to mcphelp@microsoft.com.

Note

Trang 9

Prerequisites

***************************** ILLEGAL FOR NON - TRAINER USE ******************************

This course is intended for Information Technology (IT) systems engineers and security specialists who are responsible for establishing security policies and procedures for an organization Students should have one to three years of experience designing related business solutions

This course requires that you meet the following prerequisites:

„ A strong familiarity with Microsoft® Windows® 2000 core technologies,

such as those covered in Course 2152, Implementing Microsoft Windows

2000 Professional and Server

„ A strong familiarity with Windows 2000 networking technologies and

implementation, such as those covered in MOC Course 2153, Implementing

a Microsoft Windows 2000 Network Infrastructure

„ A strong familiarity with Windows 2000 directory services technologies and

implementation, such as those covered in MOC Course 2154, Implementing

and Administering Microsoft Windows 2000 Directory Services

Trang 10

4 Introduction

Course Outline

***************************** ILLEGAL FOR NON - TRAINER USE ******************************

Module 1, “Introduction to Designing Security,” describes the basic framework for designing network security and introduces key concepts used throughout the course It also introduces an ongoing case study that is utilized in the labs Module 2, “Creating a Plan for Network Security,” discusses the importance of security policies and procedures in a security design It also explains how a security design team must include representation from various roles in your organization After completing this module, you will be able use a framework for designing security and creating a security design team

Module 3, “Identifying Threats to Network Security,” explains how to identify likely threats to a network, and it explains attacker motivations After

completing this module, you will be able to explain common threats and predict threats by using a threat model

Module 4, “Analyzing Security Risks,” explains how to determine what resources in an organization require protection and how to categorize them in order to determine an appropriate level of protection After completing this module, you will be able to apply a framework for planning risk management Module 5, “Creating a Security Design for Physical Resources,” describes threats and risks to physical resources in an organization and how to secure facilities, computers, and hardware After completing this module, you will be able to design security for physical resources

Module 6, “Creating a Security Design for Computers,” explains how to determine threats and analyze risks to computers on your network After completing this module, you will be able to design security for computers Module 7, “Creating a Security Design for Accounts,” describes the threats and risks to accounts in an organization After completing this module, you will be able to design security for accounts

Trang 11

Course Outline (continued)

***************************** ILLEGAL FOR NON - TRAINER USE ******************************

Module 8, “Creating a Security Design for Authentication,” describes threats and risks to authentication After completing this module, you will be able to design security for authentication

Module 9, “Creating a Security Design for Data,” examines threats and risks to data After completing this module, you will be able to design security for data Module 10, “Creating a Security Design for Data Transmission,” discusses threats and risks to data transmission After completing this module, you will be able to design security for data transmission

Module 11, “Creating a Security Design for Network Perimeters,” describes threats to the points where your network connects to other networks, such as the Internet After completing this module, you will be able to design security for network perimeters

Module 12, “Designing Responses to Security Incidents,” provides information about auditing and creating procedures to direct how you respond to security incidents After completing this module, you will be able to design an audit policy and incident response procedures

Appendix A, “Designing an Acceptable Use Policy,” explains how to create policies for acceptable use of network resources by users

Appendix B, “Designing Policies for Managing Networks,” offers guidelines for ensuring that network administrators manage the network in a secure manner

Appendix C, “Designing an Operations Framework to Manage Security,”

explains how to create a framework to ensure security of a network as the network changes and as the security requirements of the organization change

Trang 12

6 Introduction

Initial Logon Procedure

***************************** ILLEGAL FOR NON - TRAINER USE ******************************

To meet the complexity requirements for the password that you will use in this course, you must include characters in your password from at least three of the following four categories:

„ Uppercase letters (A to Z)

„ Lowercase letters (a to z)

„ Numbers (0 to 9)

„ Symbols (! @ # $)

To create the password that you will use in this course, you must log on either

as Studentxx, where xx is your student number, or as Student, depending on

the classroom setup

Ç Log on to your account

1 Press CTRL+ALT+DEL to open the Log On to Windows dialog box

2 In the User name box, type Studentxx or Student

3 In the Password box, type P@ssw0rd

4 In the Log on to box, select the name of the domain that is used in the course or the name of your computer, and then click OK

The Logon Message dialog box appears, stating that your password must be

changed at initial logon

Ç Change your password

1 In the Logon Message dialog box, click OK

2 In the New Password box, type your new password

3 In the Confirm New Password box, retype your password, and then click

OK

4 In the Change Password dialog box, click OK

Complex passwords

Tasks

Trang 13

Microsoft Official Curriculum

***************************** ILLEGAL FOR NON - TRAINER USE ******************************

Microsoft Training and Certification develops Microsoft Official Curriculum (MOC), including MSDN® Training, for computer professionals who design, develop, support, implement, or manage solutions by using Microsoft products and technologies These courses provide comprehensive skills-based training in instructor-led and online formats

For more information, visit the Microsoft Training and Certification Web site at http://www.microsoft.com/traincert/

Introduction

Microsoft Training and

Certification information

Trang 14

8 Introduction

Microsoft Certified Professional Program

***************************** ILLEGAL FOR NON - TRAINER USE ******************************

Microsoft Training and Certification offers a variety of certification credentials for developers and IT professionals The Microsoft Certified Professional program is the leading certification program for validating your experience and skills, keeping you competitive in today’s changing business environment The Microsoft Certified Professional program includes the following certifications

„ MCSA on Microsoft Windows 2000 The Microsoft Certified Systems Administrator (MCSA) certification is designed for professionals who implement, manage, and troubleshoot existing network and system environments based on Windows 2000 platforms, including the Windows NET Server family Implementation responsibilities include installing and configuring parts of the systems Management responsibilities include administering and supporting the systems

The Microsoft Certified Systems Engineer (MCSE) credential is the premier certification for professionals who analyze the business requirements and design and implement the infrastructure for business solutions based on the Windows 2000 platform and Microsoft server software, including the Windows NET Server family Implementation responsibilities include installing, configuring, and troubleshooting network systems

The Microsoft Certified Application Developer (MCAD) for Microsoft .NET credential is appropriate for professionals who use Microsoft technologies to develop and maintain department-level applications, components, Web or desktop clients, or back-end data services or work in teams developing enterprise applications The credential covers job tasks ranging from developing to deploying and maintaining these solutions

Introduction

MCP certifications

Ngày đăng: 21/12/2013, 19:15

TỪ KHÓA LIÊN QUAN