Learn Online with StaffKit Training Courses
Online Employee Business and Computer Training

Windows Server 2003 Security MCSE 70-298 Training


Summary:

This series explains how to analyze requirements and design a secure Windows Server 2003 network in a medium to large environment. Specific aspects presented are public key infrastructure, Internet Information Services (IIS), IP Security (IPSec), wireless

This Windows Server 2003 Security MCSE 70-298 online training series provides over 33 hours of self-paced courseware. This web-based training provides 6 months of unlimited access to all of the following lessons:

1 . Defining a Baseline Security Template
2 . Designing a Secure Network Framework
3 . Designing an Access Control Strategy for Files and Folders
4 . Designing an Encrypted File System and Securing Backup/Restore Processes
5 . Designing Network Infrastructure Security
6 . Designing Role-Based Server Security
7 . Practice Exam
8 . Securing a Public Key Infrastructure and Network Management Processes
9 . Securing Active Directory
10 . Securing Data Transmissions and Wireless Networks
11 . Securing Internet Information Services
12 . Securing VPNs, Extranets, and Network Clients

Lesson Detail:

Defining a Baseline Security Template
This course explains what you need in order to apply consistent security settings across a network. It also details how to deploy security templates efficiently throughout a network, focusing on the use of Group Policy Objects (GPO) and scripting techniqu


  • Administrative security tools overview
  • Working with predefined security templates
  • Adding security templates snap-ins
  • Reapplying default security settings
  • Configuring security templates
  • Configuring security for down-level clients
  • Deploying security templates
  • Reviewing the result of security policy settings
  • Using security configuration and analysis to review security settings
  • Using the secedit.exe command-line tool

Designing a Secure Network Framework
This course explains how to design a secure Windows Server 2003 network framework by analyzing business requirements, and both internal and external threats. It also details how to create an incident response plan and examines interoperability issues.


  • Analyzing existing security Policies and procedures
  • Determining requirements for securing data
  • Analyzing current security practices
  • Predicting network threats
  • Recognizing external threats
  • Implementing risk analysis
  • Responding to security incidents
  • Analyzing technical constraints

Designing an Access Control Strategy for Files and Folders
This course examines common risks such as data corruption and security breaches that can affect a network's file shares. This course also explains how to design a permission structure for files and folders, as well as best practices for securing the Windo


  • Analyzing risks to data
  • Reviewing access control and access control lists
  • Access to resources
  • Working with security groups
  • Defining a security group retirement policy
  • Delegating security group maintenance
  • Analyzing auditing requirements
  • Designing an access control strategy for the registry
  • Setting registry access permissions via group policy
  • Designing a permission structure for registry objects

Designing an Encrypted File System and Securing Backup/Restore Processes
This course explains how to encrypt files using the Encrypted File System (EFS). The course also discusses how to design a secure backup and recovery strategy for network resources, including securing the backup process.


  • Encrypted File System
  • Encrypting files and folders
  • Certificate storage, enrollment, and renewal
  • Creating a strategy for the encryption and decryption of files and folders
  • Configuring file recovery agents
  • Backing up keys
  • Disabling EFS
  • Backup and restore process security basics
  • Designing a secure backup process
  • Designing a secure recovery process
  • Securing EMS
  • Securing the Recovery Console
  • Configuring startup and recovery options

Designing Network Infrastructure Security
This course examines how to protect data as it is transmitted through a network infrastructure by use of IP Security (IPSec). This course also explains how to secure the Domain Naming System (DNS) service, another area of an enterprise network subject to


  • Network infrastructure security basics
  • Assessing risk for network services
  • IPSec overview
  • Phase I security association
  • Phase II security association
  • IPSec policies overview
  • IPSec rules
  • How IPSec policy is applied
  • IPSec driver modes and best practices
  • Designing IPSec policies
  • Designing IP filtering and configuring a firewall
  • Securing DNS

Designing Role-Based Server Security
This course explains how to modify baseline security templates based on functions of an individual or group of servers. This course specifically addresses security configurations for Domain Controllers, Internet Information Services (IIS) Servers, POP3 Ma


  • Common server roles
  • Adding or changing server roles
  • Configuring security for domain controllers
  • Securing the Internet Information Server (IIS)
  • Configuring security for POP3 mail servers
  • Securing network infrastructure servers
  • Securing remote access servers
  • Securing file, print, terminal, and streaming media servers
  • Modifying baseline security templates according to role

Practice Exam
This course provides five practice exams for the Microsoft 70-298 certification exam.


  • Practice Exam 1
  • Practice Exam 2
  • Practice Exam 3
  • Practice Exam 4
  • Practice Exam 5

Securing a Public Key Infrastructure and Network Management Processes
This course explains the deployment of public key infrastructures (PKI), the certificate authorities that establish and verify identities of organizations, and the implementation of PKI in the Windows Server 2003 environment. This course also covers secur


  • PKI basics
  • Designing a certification authority implementation
  • Designing a logical authentication strategy
  • Designing security for CA servers
  • Designing certificate distribution
  • Requesting, approving, and revoking certificates
  • Renewing and auditing certificates
  • Managing the risks of network administration
  • Securing MMC, Remote Assistance, and Telnet
  • Securing Terminal Services and Remote Desktop
  • Designing security for EMS
  • Designing a Security Update infrastructure
  • Trust relationship basics
  • Designing forest and domain trust models
  • Designing security for interoperability

Securing Active Directory
This course explains how to secure Active Directory user accounts and use auditing to identify any security incidents to the Active Directory database. This course also discusses best practices in assigning user permissions to network resources and data.


  • Designing an access control strategy for directory services
  • Analyzing risks to directory services
  • Establishing account security policies
  • Using restricted groups
  • Creating a Kerberos policy
  • Establishing password security
  • Creating an account lockout policy
  • Creating an auditing policy
  • Auditing logon events and object access
  • Analyzing auditing data
  • Creating a delegation strategy
  • Designing the appropriate group strategy for accessing resources

Securing Data Transmissions and Wireless Networks
This course explains how to secure wireless network traffic including the technologies available and the challenges they present. This course also discusses common vulnerabilities in a wireless network and how to design a secure wireless LAN.


  • SSL/TLS,SMIME and SMB
  • Configuring IIS to use SSL
  • Securing switches and segments
  • Wireless network types and threats
  • Wireless history
  • PKI and RADIUS/IAS overview
  • WLAN network infrastructure
  • Creating a wireless network policy
  • Designing authentication for wireless networks
  • Designing and testing wireless access infrastructure

Securing Internet Information Services
This course explains how to create a secure IIS deployment for an enterprise network with a focus on user authentication. It also examines common vulnerabilities of Web servers, along with how to secure Web server software with options offered in Windows


  • Designing user authentication for IIS
  • Designing certificate authentication
  • Configuring anonymous and basic authentication
  • Configuring digest and integrated Windows authentication
  • Designing RADIUS authentication
  • Securing IIS installations
  • Hardening IIS
  • New security features in IIS 6.0
  • Designing a monitoring strategy for IIS
  • Configuring IIS logging and monitoring Event Log activities
  • Enabling security auditing and health detection

Securing VPNs, Extranets, and Network Clients
This course discusses the use of Windows Server 2003 as a VPN and provides details on the use of two common, standards-based routing protocols: Routing Information Protocol (RIP) and Open Shortest Path First (OSPF). This course also explains how to secure


  • Using Windows Server 2003 as a router
  • Building routing tables
  • Designing demand dial routing between internal networks
  • Designing VPN connectivity
  • PPTP
  • L2TP
  • Using remote access policies
  • Designing an extranet infrastructure
  • Hardening client operating systems
  • Securing laptop computers
  • Analyzing authentication requirements
  • Choosing authentication protocols
  • Choosing a remote access method
  • Designing remote access policies
  • Creating a remote access policy
  • Using Internet Authentication service

Certification:
Windows Server 2003 Security MCSE 70-298


Audience:
This series is for anyone preparing for the Designing Security for a Microsoft Windows Server 2003 Network MCSE 70-298 certification exam or for anyone who wants to learn more about designing security for a Windows Server 2003 network.


Features:

  • A Course Topics list contains active hyperlinks, permitting quick access to specific topics.
  • Find-A-Word allows learners to look up an unfamiliar term in the Glossary, on the Web, or in a dictionary. In addition, it lets them find other occurrences of the term in the same course.
  • Search text enables learners to rapidly search all text within a course to easily retrieve information required.
  • Courses challenge the learner with a variety of question formats, including multi-step simulations, true/false, multiple choice, and fill-in-the-blank.
  • A skill assessment generates a customized learning path based on the results of a pre-test.
  • A glossary provides a reference for definitions of unfamiliar terms.
  • Bookmarking tracks the learner's progress in a course.

Technical Requirements:


What You Get:

You will receive Unlimited Access to all of the Windows Server 2003 Security MCSE 70-298 training tutorials listed above. Your online training courses will be available from anywhere you have internet access.This e-learning series includes all of the online training tutorials listed and is provided in an interactive, self-paced format. Retake any or all of our computer training as often as you want. Our online tutorials allow you to learn anywhere, anytime from any computer with internet access. All courses allow for 6 months of unlimited access (1 user), include a variety of features and qualify for Continuing Education Unit credit.


Web-Based Training Products:


Windows Server 2003 Security MCSE 70-298 Online Training Series

Only $99.95    staffkit

You might also be interested in our Microsoft Certifications Package which includes all of the Windows Server 2003 Security MCSE 70-298 training courses listed above plus hundreds of hours of related online training courses

 

Microsoft Certifications Package

Only $249.95   staffkit

Windows Server 2003 Security MCSE 70-298
Training Series
Total Courses: 12
Total Time: 33+ hours
$119.99
Only $99.95
Available in Package only
Total Courses: 829
Total Time: 1776+ hours
$499.99
Only $249.95
Satisfaction Guaranteed    BBB Online Accredited Business          Fruad Protection Guaranteed By American Express            Paypal World Seller

Reviews:

'offers employers an excellent way to train their staff economically and without having to send them out of the office.'
HRMReport.com

'this is a must have resource'
California Technology Magazine

'this is theUltimate
Career Development
Package.'
MidWest Technology Journal

Read more customer
reviews about our
e-learning training tutorials

StaffKit offers a centralized e-learning solution for business, computer, technical, compliance and employee training.
Copyright © 2001-2014 StaffKit All Rights Reserved