Levi, Ray & Shoup, Inc.
  • Courses
  • Site Content

MS-2810 - Fundamentals of Network Security

This course provides students with the knowledge and skills to manage network security within an organization. Students who complete this course will be able to identify security threats and vulnerabilities and respond and recover from security incidents.

Click here to print this page »


Course MS2152, Implementing Microsoft Windows 2000 Professional and Server or equivalent experience; Course AT300, Network+ or equivalent experience

Detailed Class Syllabus

Articulating Security Threats and Vulnerabilities

Explaining how information is attacked
Assessing and articulating the impact of risks to information

Preparing to Secure Information

Identifying how information is secured
Resolving ethical dilemmas when sharing information

Implementing Secure Computing Baselines

Physically securing baselines
Recognizing and identifying threats to trusted computing bases
Establishing a secure baseline
Monitoring a secure baseline
Maintaining a secure baseline

Securing Information Using Authentication and Access Control

Using accounts for authentication and authorization
Implementing authentication
Implement an access control strategy

Using Cryptography to Secure Information

Introduction to cryptography
Assessing the strength of encryption methods
Using hash functions
Protecting information by using symmetric encryption
Protecting information by using asymmetric encryption

Using a PKI to Secure Information

Introduction to certificates
Explain the purpose of a PKI
Deploying and managing certificates

Securing Internet Applications and Components

Securing Web servers against common attacks
Securing databases against common threats
Configuring security for common Internet protocols
Configuring security for Web browsers

Implementing Security for E-Mail and Instant Messaging

Securing e-mail servers against common threats
Securing e-mail and instant messaging clients against common threats

Managing Security for Directory Services and DNS

Securing directory services against common threats
Securing DNS against common threats

Securing Data Transmission

Identifying threats to network devices
Implementing security for common data transmission
Implementing security for remote access

Implementing and Monitoring Security for Network Perimeters

Introduction to network perimeters
Implementing security on inbound and outbound traffic
Monitoring network traffic

Managing Operational Security

Identifying security policies and procedures
Educating users on security policies and procedures
Applying security policies to operational management

Preserving Business Continuity

Prepare to recover from disasters
Performing a secure backup and recovery

Responding to Security Incidents

Identifying and Responding to security threats
Investigating security incidents