NR Computer Learning Center (NRCLC) offers hands-on training to help students understand the Security Layers, OS Security, Network Security, Security Software. This course will also help students prepare for MTA 98-367 Certification exam.
Windows Server 2008
Technology
Windows Server 2008
Topic
- Understanding Security Layers
- Understand core security principles.
- confidentiality; integrity; availability
- how threat and risk impact principles
- principle of least privilege
- social engineering
- attack surface
- Understand physical security
- site security, computer security
- removable devices and drives
- access control
- mobile device security
- disable Log On Locally, keyloggers
- Understand Internet security, browser settings
- zones, secure Web sites
- Understand wireless security.
- Understand specific security types: keys; SSID; MAC filters
- Understanding Operating System Security
- Understand user authentication
- multifactor, smart cards, RADIUS
- Public Key Infrastucture (PKI)
- understand the certificate chain
- biometrics, Kerberos and time skew
- using Run As to perform administrative tasks
- password reset procedures
- Understand permissions
- file; share; registry
- Active Directory
- NTFS vs. FAT
- enabling or disabling inheritance
- moving or copying files within the same disk or on another disk
- multiple groups with different permissions
- basic permissions and advanced permissions take ownership, delegation
- Understand password policies, password complexity, account lockout
- password length, password history, time between password changes
- enforce by using group policies, common attack methods
- Understand audit policies, types of auditing
- what can be audited, enabling auditing
- what to audit for specific purposes
- where to save audit information
- how to secure audit information
- Understand encryption, EFS
- how EFS encrypted folders impact moving/copying files
- BitLocker (To Go) vs TPM
- software-based encryption
- MAIL encryption and signing and other uses
- VPN; public-key / private key; encryption algorithms
- certificate properties; certificate services
- PKI/certificate services infrastructure; token devices
- Understand malware, buffer overflow; worms; Trojans;spyware
- Understanding Network Security Understand dedicated firewalls
- types of hardware firewalls and their characteristics
- why to use a hardware firewall instead of a software firewall
- SCMs and UTMs; stateful vs. stateless inspection
- Understand Network Access Protection (NAP)
- purpose of NAP; requirements for NAP
- Understand network isolation, VLANs; routing
- honeypot; perimeter networks; NAT; VPN; Ipsec
- Server and Domain Isolation
- Understand protocol security, protocol spoofing
- IPSec; tunneling; DNSsec; network sniffing
- common attack methods,
- Understand Security Software
- Understand client protection, antivirus
- User Account Control (UAC)
- keeping client operating system and software updated
- encrypting offline folders; software restriction policies,
- Understand e-mail protection
- antispam; antivirus; spoofing, phishing, and pharming
- client vs. server protection; SPF records
- PTR records
- Understand server protection.
- separation of services
- hardening
- keeping server updated
- secure dynamic DNS updates
- disabling unsecure authentication protocols
- Read-Only Domain Controllers; separate management VLAN
- Microsoft Baseline Security Analyzer (MBSA)
Target Audience
- Students who are interested in building the career in Security, Network Administration or System Administration
- Student preparing for MTA Exam
The Training Includes
- Classroom instruction
- Hands-on workshops
- Training Material
- Quick Reference Guide
For more information
call 714-505-3475