Windows Server 2003 Security MCSE 70-298 Training
This online training series explains how to analyze requirements and design a secure Windows Server 2003 network in a medium to large environment. Specific aspects presented are public key infrastructure, Internet Information Services (IIS), IP Security (IPSec), wireless LAN, VPN, Active Directory, Encrypted File System (EFS), and backup and recovery processes.
This Windows Server 2003 Security MCSE 70-298 online training series provides 33 hours of self-paced courseware. This web-based training provides 1 year of unlimited access to all of the following lessons:
1 . Designing a Secure Network Framework
2 . Defining a Baseline Security Template
3 . Designing Role-Based Server Security
4 . Securing a Public Key Infrastructure and Network Management Processes
5 . Designing Network Infrastructure Security
6 . Securing Data Transmissions and Wireless Networks
7 . Securing Internet Information Services
8 . Securing VPNs, Extranets, and Network Clients
9 . Securing Active Directory
10 . Designing an Access Control Strategy for Files and Folders
11 . Designing an Encrypted File System and Securing Backup/Restore Processes
12 . Practice Exam
Designing a Secure Network Framework
This course explains how to design a secure Windows Server 2003 network framework by analyzing business requirements, and both internal and external threats. It also details how to create an incident response plan and examines interoperability issues.
- Analyzing existing security Policies and procedures
- Determining requirements for securing data
- Analyzing current security practices
- Predicting network threats
- Recognizing external threats
- Implementing risk analysis
- Responding to security incidents
- Analyzing technical constraints
Defining a Baseline Security Template
This course explains what you need in order to apply consistent security settings across a network. It also details how to deploy security templates efficiently throughout a network, focusing on the use of Group Policy Objects (GPO) and scripting techniques.
- Administrative security tools overview
- Working with predefined security templates
- Adding security templates snap-ins
- Reapplying default security settings
- Configuring security templates
- Configuring security for down-level clients
- Deploying security templates
- Reviewing the result of security policy settings
- Using security configuration and analysis to review security settings
- Using the secedit.exe command-line tool
Designing Role-Based Server Security
This course explains how to modify baseline security templates based on functions of an individual or group of servers. This course specifically addresses security configurations for Domain Controllers, Internet Information Services (IIS) Servers, POP3 Mail Servers, and other infrastructure servers.
- Common server roles
- Adding or changing server roles
- Configuring security for domain controllers
- Securing the Internet Information Server (IIS)
- Configuring security for POP3 mail servers
- Securing network infrastructure servers
- Securing remote access servers
- Securing file, print, terminal, and streaming media servers
- Modifying baseline security templates according to role
Securing a Public Key Infrastructure and Network Management Processes
This course explains the deployment of public key infrastructures (PKI), the certificate authorities that establish and verify identities of organizations, and the implementation of PKI in the Windows Server 2003 environment. This course also covers security administration and the related tasks and tools needed to secure a Microsoft operating system.
- PKI basics
- Designing a certification authority implementation
- Designing a logical authentication strategy
- Designing security for CA servers
- Designing certificate distribution
- Requesting, approving, and revoking certificates
- Renewing and auditing certificates
- Managing the risks of network administration
- Securing MMC, Remote Assistance, and Telnet
- Securing Terminal Services and Remote Desktop
- Designing security for EMS
- Designing a Security Update infrastructure
- Trust relationship basics
- Designing forest and domain trust models
- Designing security for interoperability
Designing Network Infrastructure Security
This course examines how to protect data as it is transmitted through a network infrastructure by use of IP Security (IPSec). This course also explains how to secure the Domain Naming System (DNS) service, another area of an enterprise network subject to security vulnerabilities.
- Network infrastructure security basics
- Assessing risk for network services
- IPSec overview
- Phase I security association
- Phase II security association
- IPSec policies overview
- IPSec rules
- How IPSec policy is applied
- IPSec driver modes and best practices
- Designing IPSec policies
- Designing IP filtering and configuring a firewall
- Securing DNS
Securing Data Transmissions and Wireless Networks
This course explains how to secure wireless network traffic including the technologies available and the challenges they present. This course also discusses common vulnerabilities in a wireless network and how to design a secure wireless LAN.
- SSL/TLS,SMIME and SMB
- Configuring IIS to use SSL
- Securing switches and segments
- Wireless network types and threats
- Wireless history
- PKI and RADIUS/IAS overview
- WLAN network infrastructure
- Creating a wireless network policy
- Designing authentication for wireless networks
- Designing and testing wireless access infrastructure
Securing Internet Information Services
This course explains how to create a secure IIS deployment for an enterprise network with a focus on user authentication. It also examines common vulnerabilities of Web servers, along with how to secure Web server software with options offered in Windows Server 2003.
- Designing user authentication for IIS
- Designing certificate authentication
- Configuring anonymous and basic authentication
- Configuring digest and integrated Windows authentication
- Designing RADIUS authentication
- Securing IIS installations
- Hardening IIS
- New security features in IIS 6.0
- Designing a monitoring strategy for IIS
- Configuring IIS logging and monitoring Event Log activities
- Enabling security auditing and health detection
Securing VPNs, Extranets, and Network Clients
This course discusses the use of Windows Server 2003 as a VPN and provides details on the use of two common, standards-based routing protocols: Routing Information Protocol (RIP) and Open Shortest Path First (OSPF). This course also explains how to secure client workstations and remote access services for end users.
- Using Windows Server 2003 as a router
- Building routing tables
- Designing demand dial routing between internal networks
- Designing VPN connectivity
- Using remote access policies
- Designing an extranet infrastructure
- Hardening client operating systems
- Securing laptop computers
- Analyzing authentication requirements
- Choosing authentication protocols
- Choosing a remote access method
- Designing remote access policies
- Creating a remote access policy
- Using Internet Authentication service
Securing Active Directory
This course explains how to secure Active Directory user accounts and use auditing to identify any security incidents to the Active Directory database. This course also discusses best practices in assigning user permissions to network resources and data.
- Designing an access control strategy for directory services
- Analyzing risks to directory services
- Establishing account security policies
- Using restricted groups
- Creating a Kerberos policy
- Establishing password security
- Creating an account lockout policy
- Creating an auditing policy
- Auditing logon events and object access
- Analyzing auditing data
- Creating a delegation strategy
- Designing the appropriate group strategy for accessing resources
Designing an Access Control Strategy for Files and Folders
This course examines common risks such as data corruption and security breaches that can affect a network's file shares. This course also explains how to design a permission structure for files and folders, as well as best practices for securing the Windows Registry.
- Analyzing risks to data
- Reviewing access control and access control lists
- Access to resources
- Working with security groups
- Defining a security group retirement policy
- Delegating security group maintenance
- Analyzing auditing requirements
- Designing an access control strategy for the registry
- Setting registry access permissions via group policy
- Designing a permission structure for registry objects
Designing an Encrypted File System and Securing Backup/Restore Processes
This course explains how to encrypt files using the Encrypted File System (EFS). The course also discusses how to design a secure backup and recovery strategy for network resources, including securing the backup process.
- Encrypted File System
- Encrypting files and folders
- Certificate storage, enrollment, and renewal
- Creating a strategy for the encryption and decryption of files and folders
- Configuring file recovery agents
- Backing up keys
- Disabling EFS
- Backup and restore process security basics
- Designing a secure backup process
- Designing a secure recovery process
- Securing EMS
- Securing the Recovery Console
- Configuring startup and recovery options
This course provides five practice exams for the Microsoft 70-298 certification exam.
- Practice Exam 1
- Practice Exam 2
- Practice Exam 3
- Practice Exam 4
- Practice Exam 5
Windows Server 2003 Security MCSE 70-298
This online training series is for anyone preparing for the Designing Security for a Microsoft Windows Server 2003 Network MCSE 70-298 certification exam or for anyone who wants to learn more about designing security for a Windows Server 2003 network.
- A Course Topics list contains active hyperlinks, permitting quick access to specific topics.
- Find-A-Word allows learners to look up an unfamiliar term in the Glossary, on the Web, or in a dictionary. In addition, it lets them find other occurrences of the term in the same course.
- Search text enables learners to rapidly search all text within a course to easily retrieve information required.
- Courses challenge the learner with a variety of question formats, including multi-step simulations, true/false, multiple choice, and fill-in-the-blank.
- A skill assessment generates a customized learning path based on the results of a pre-test.
- A glossary provides a reference for definitions of unfamiliar terms.
- Bookmarking tracks the learner's progress in a course.
- Internet connection
- Browser: Internet Explorer, FireFox, Chrome, Safari, Opera or any standards compliant browser.
- Authorware and Macromedia Flash player recommended but not required.
What You Get:
You will receive Unlimited Access to all of the Windows Server 2003 Security MCSE 70-298 training tutorials listed above. Your online training courses will be available from anywhere you have internet access.This e-learning series includes all of the online training tutorials listed and is provided in an interactive, self-paced format. Retake any or all of our computer training as often as you want. Our online tutorials allow you to learn anywhere, anytime from any computer with internet access. All courses allow for 1 year unlimited access (1 user), include a variety of features and qualify for Continuing Education Unit credit.
StaffKit is a leader in providing online computer training tutorials and online education. We have customers use our online training courses in over 75 countries. StaffKit has been providing e-learning solutions for 10 years.
Web-Based Training Products:
Windows Server 2003 Security MCSE 70-298 Online Training Series
You might also be interested in our Microsoft Certifications Package which includes all of the Windows Server 2003 Security MCSE 70-298 training courses listed above plus hundreds of hours of related online training courses