Package Includes:
  • 3 Sessions featuring live instructor-led classroom sessions with full audio, video and demonstration components
  • Printable courseware
  • Microsoft Authorized MeasureUp Exam Simulation
  • Exclusive LearningZone 7x24 Live Mentor Click for More Details
    Help Whenever you need it! Exclusive LearningZone - Chat Live with our Certified Instructors anytime around the clock (7x24)
  • Focused on practical solutions to real-world development problems
  • Free 1 Year Upgrade Policy
OURexpertText
Bill Hatfield

Kevin Wolford - Mr. Wolford started his computer career in 1983. He has been a technical writer, network administrator, and trainer. Kevin spent many years with Novell and is a CNI and Master CNE. In 1998 Kevin founded Tech Training, giving him a chance to test his training ideas. He is also an MCSE, Microsoft Certified Trainer MCT, and is certified in SMS, SQL Server, TCP/IP, NT Workstation, NT Server, Exchange Server, Windows 9x and 2000. Kevin has authored Microsoft certification books for New Riders and Sybex. He owns a consulting company dedicated to teaching complex technical topics in a simple way. He was involved in the early stages of Windows.NET Server's development and beta testing.

Course Features:
Course Outline TXT
Level 1
Designing Security for Networks
1.1 Overview of Security Issues
Planning For Network Security
2.1 Security Policies
2.2 Security Design Process
2.3 Security Design Team
Identifying Threats
3.1 Introduction to Threats
3.2 Predicting Threats to Security
Analyzing Security Risks
4.1 Introduction to Risk Management
4.2 Creating a Risk Management Plan
Level 2
Securing Physical Resources
1.1 Threats and Risks to Computers
1.2 Design Security to Physical Resources
Securing Computers
2.1 Threats and Risks to Computers
2.2 Designing Security for Computers
Securing Accounts
3.1 Threats and Risks to Accounts
3.2 Designing Security for Accounts
Securing User Authorization
4.1 Threats and Risks to User Authorization
4.2 Designing Security for Authorization
Level 3
Securing Data
1.1 Threats and Risks to Data
1.2 Designing Security for Data
Securing Data Transmission
2.1 Threats and Risks to Data Transmission
2.2 Security for Data Transmission
Securing Network Perimeter
3.1 Threats and risks to Network Perimeter
3.2 Security for Network Perimeters
Response and Incidence
4.1 Auditing and Incident Response
4.2 Designing an Audit Policy
4.3 Incident Response Procedure