Levi, Ray & Shoup, Inc.
  • Courses
  • Site Content

MS-2810 - Fundamentals of Network Security

This course provides students with the knowledge and skills to manage network security within an organization. Students who complete this course will be able to identify security threats and vulnerabilities and respond and recover from security incidents.

Click here to print this page »

Prerequisites


Course MS2152, Implementing Microsoft Windows 2000 Professional and Server or equivalent experience; Course AT300, Network+ or equivalent experience

Detailed Class Syllabus


Articulating Security Threats and Vulnerabilities


Explaining how information is attacked
Assessing and articulating the impact of risks to information

Preparing to Secure Information


Identifying how information is secured
Resolving ethical dilemmas when sharing information

Implementing Secure Computing Baselines


Physically securing baselines
Recognizing and identifying threats to trusted computing bases
Establishing a secure baseline
Monitoring a secure baseline
Maintaining a secure baseline

Securing Information Using Authentication and Access Control


Using accounts for authentication and authorization
Implementing authentication
Implement an access control strategy

Using Cryptography to Secure Information


Introduction to cryptography
Assessing the strength of encryption methods
Using hash functions
Protecting information by using symmetric encryption
Protecting information by using asymmetric encryption

Using a PKI to Secure Information


Introduction to certificates
Explain the purpose of a PKI
Deploying and managing certificates

Securing Internet Applications and Components


Securing Web servers against common attacks
Securing databases against common threats
Configuring security for common Internet protocols
Configuring security for Web browsers

Implementing Security for E-Mail and Instant Messaging


Securing e-mail servers against common threats
Securing e-mail and instant messaging clients against common threats

Managing Security for Directory Services and DNS


Securing directory services against common threats
Securing DNS against common threats

Securing Data Transmission


Identifying threats to network devices
Implementing security for common data transmission
Implementing security for remote access

Implementing and Monitoring Security for Network Perimeters


Introduction to network perimeters
Implementing security on inbound and outbound traffic
Monitoring network traffic

Managing Operational Security


Identifying security policies and procedures
Educating users on security policies and procedures
Applying security policies to operational management

Preserving Business Continuity


Prepare to recover from disasters
Performing a secure backup and recovery

Responding to Security Incidents


Identifying and Responding to security threats
Investigating security incidents