Who should attend
This course is designed for administrators who are responsible for the day-to-day administration of Microsoft Windows. Participants should have general knowledge of networking concepts and one or more years of experience managing Windows. Other IT professionals may also take this course on the path to becoming a security specialist.
About the course
This course provides participants with the knowledge and skills to begin supporting network security within an organization. Participants who complete this course will be able to identify security threats and vulnerabilities, and help respond to and recover from security incidents.
This course will cover security concepts that are prerequisites for attending other Microsoft Official Curriculum (MOC) courses for security specialists and help prepare participants for the CompTIA Security+ exam.
This course has been approved as CompTIA Authorized Quality Curriculum (CAQC) for the CompTIA Security+ certification. The CAQC program assures participants that all test objectives for the CompTIA Security+ certification exam are covered in the course materials.
Although the course focuses on Microsoft product- and technology-specific implementation of security concepts, many of these same concepts can be applied to other technologies.
After completing this course, participants will be able to:
- Explain common attacks against network assets, the associated threats and vulnerabilities, and what network security personnel do to secure assets.
- Explain how to use cryptography to help protect information and how to choose an appropriate encryption method for an organization.
- Implement security-enhanced computing baselines in an organization.
- Help protect information in an organization by using authentication and access control.
- Deploy and manage certificates.
- Help protect transmission of data by identifying threats to network devices and implementing security for common data transmission, remote access, and wireless network traffic.
- Help protect Web servers against common attacks and configure security for Web browsers.
- Help protect e-mail messages and instant messaging from common security threats.
- Identify common security threats and vulnerabilities to directory services and DNS, and then apply security methods to help protect them.
- Identify network perimeter threats and monitor perimeter security for a network.
- Identify types of security policies to manage operational security, and then use these policies to ensure compliance by users in an organization.
- Preserve business continuity by implementing a security-enhanced disaster recovery strategy, communicating risks to others, and performing secure backup and recovery.
- Identify, respond to, and assist in the formal investigation of security incidents.
- Course mechanics
- Threats and secret-key crypto
- Hashes & message digests
- Public key algorithms
- Number theory
- Operating system vulnerabilities
- Intrusion detection
- Authentication systems
- Email security (PGP, S/MIME)
- IP security (IPsec)
- SSL, TLS
A variety of methodologies will be used during the course that includes:
- (30%) Based on Case Studies
- (30%) Techniques
- (30%) Role Play
- (10%) Concepts
- Pre-test and Post-test
- Variety of Learning Methods
- Case Studies and Self Questionaires
- Group Work
Videos and materials
Because of COVID-19, many providers are cancelling or postponing in-person programs or providing online participation options.
We are happy to help you find a suitable online alternative.