LearnKey Training

Windows Server 2003 Security Implementation Course

Windows Server 2003 Security Implementation Course

Back to Product Page


Windows Server 2003 Security Implementation Course

5 Sessions -
14 Hours of Interactive Training

The Windows Server 2003 Security Implementation course from LearnKey prepares you with the knowledge and skills needed to implement, manage, maintain, and troubleshoot security in a Windows Server 2003 network infrastructure. Expert instructor Tom Carpenter will delve into security issues, such as policies, network communications, authentication/authorization/access (AAA), and public key infrastructure. At the conclusion of the course, you will be prepared to pass MCP exam 70-299.

Benefits
  • Information security skills are in demand throughout the world
  • Increase your earning potential through certification
  • This course meets all Microsoft exam 70-299 objectives

About The Author
Tom Carpenter is a trainer, consultant and author specializing in networking technologies and Microsoft solutions. Tom has written more than 15 books on topics ranging from Windows Server to wireless networking. He has trained more than 30,000 IT professionals since 1997 in face-to-face training classes and he has taught more than 60,000 through webinars and online training programs. He holds certifications with Microsoft, CompTIA and CWNP and is the current CTO for CWNP - the premiere 802.11 wireless administration certification program. With more than 20 years experience in the IT industry, Tom brings a wealth of experience to any training program.

Session 1

Section A: Introduction

  • Prerequisites
  • Security Fundamentals
  • Threats
  • Tools
  • Principles

Section B: Security Structure

  • Overview
  • Users
  • Groups
  • Organizational Units
  • Domains
  • Trees
  • Forests
  • Structure Review

Section C: Authentication

  • Identity
  • Authentication Process
  • Protocols
  • Kerberos

Section D: Implementing Security

  • Password Policy
  • Account Lockout Policy
  • Kerberos Policy
  • LM Authentication Policy

Section E: Web Authentication

  • Process
  • Anonymous Access
  • Authenticated Access
  • Delegated Authentication
  • View User Accounts
  • IIS Manager
  • Test Implementation

Section F: Trust Relationships

  • Managing Relationships
  • Trust Types
  • Authentication Methods
  • SID Filtering
  • Creating Trusts

Section G: Group Hierarchies

  • Understanding Groups
  • Types and Scopes
  • Local and Domain Local
  • Global and Universal
  • Group Relationships
  • Group Permissions

Section H: Group Types

  • Functional Levels
  • Built-in Groups
  • Tools for Managing
  • net group Command
  • Restricted Groups

Session 2

Section A: Authorization

  • ACLs
  • Authorization Processes
  • Process Example
  • Authorization Rules
  • Permissions

Section B: Managing ACLs

  • Security Permissions
  • Security Settings
  • Add Permissions
  • Group Permissions
  • Explicit Denial

Section C: Permissions

  • Registry
  • Printers
  • Active Directory Objects
  • Services

Section D: Security Templates

  • Planning
  • Adding Security Templates
  • Default Security Templates
  • Copy Template
  • New Template
  • Configuration-based Template

Section E: Role-based Templates

  • Domain Controllers Template
  • Event Log
  • Audit Policy
  • File Servers Template
  • System Services
  • Web Servers Template

Section F: Deploying Templates

  • Create OUs
  • Move to OUs
  • Create GPO
  • Edit GPO
  • Import Settings

Section G: Troubleshooting Templates

  • gpupdate
  • Synchronize Time
  • GPO Permissions
  • Advanced System Information
  • RSoP
  • RSoP Wizard
  • Event Viewer

Section H: Policies and Troubleshooting

  • System Policies
  • Troubleshooting .pol
  • Policy Editor

Session 3

Section A: Client Security

  • Security Planning
  • Determine Needs
  • Client Roles
  • Group Policy Editor
  • Registry Editing
  • Hide Network Places
  • Display Settings

Section B: Restricting Software

  • Determine Restrictions
  • Restricting Users
  • Restricting Documents
  • Restricting Levels
  • Additional Rules
  • Creating Hash Rule

Section C: Distributing Software

  • Software Distribution Steps
  • Read Access
  • Distributing in AD
  • Deployment Methods
  • Deployment Options

Section D: Securing Servers

  • Determining Roles
  • DNS and DHCP Servers
  • Domain Controllers
  • Integrating DNS
  • Disabling Root Hints
  • Securing Registry
  • Authorizing DHCP
  • Securing syskey

Section E: Securing Web Servers

  • IIS 6.0
  • IIS 6.0 Subcomponents
  • Enabling Web Extensions
  • Securing Web Access
  • Secure Logging Configuration
  • Directory Security
  • Home Directory

Section F: Securing Exchange Servers

  • Precautions
  • Exchange Server Ports
  • Securing SQL Servers
  • SQL Server Authorization
  • SQL Server Logging
  • Securing IAS Servers

Section G: Security Setting Analysis

  • MBSA Tool
  • Generate MBSA Report
  • View MBSA Report
  • MBSACLI Tool
  • View MBSACLI Report
  • Security Configuration and Analysis Tool
  • Compare Security Settings

Session 4

Section A: PKI

  • Essentials
  • Terminology
  • Hierarchies
  • Certificate Needs

Section B: Installing Certificate Services

  • Installation Steps
  • CA Type
  • Configuring Components
  • Policy Module
  • Exit Module and Storage
  • Configuring Settings
  • Configuring Security

Section C: Certificate Templates

  • Using Templates
  • Default User Templates
  • Default Computer Templates
  • Default Service Templates
  • Managing Templates
  • Configuring Templates
  • Creating New Certificates
  • Requesting New Certificates

Section D: Managing Certificates

  • Deploying and Revoking
  • CRLs
  • Certificate Availability
  • Add Certificate Snap-in
  • Requesting Certificates
  • Requesting in IE
  • Revoking Certificates

Section E: Backup and Restoration

  • Configuring
  • Exporting Keys
  • Backing Up CA
  • Backing Up System State

Section F: Wireless Security

  • Overview
  • Networking Threats
  • Standards
  • Authentication
  • Encryption
  • Best Practices
  • Creating Network Policies
  • Configure Settings

Session 5

Section A: Managing Updates and Patches

  • Considerations
  • Service Packs and Updates
  • Chaining Updates
  • Testing Procedures
  • Updating Methods
  • Tiered SUS Architecture
  • Installing Updates
  • Configuring Updates

Section B: Understanding IPSec

  • Foundations
  • Architecture
  • Security Associations
  • Policies
  • Planning
  • Configuring
  • Troubleshooting

Section C: Managing IPSec

  • Viewing Network Traffic
  • Filtering
  • Analyzing Network Traffic
  • Creating New Filter Action
  • Creating New Policies
  • Implementing Policies
  • Enabling Client

Section D: Managing SSL

  • Deploying SSL
  • SSL Ports
  • SSL Configuration Prerequisites
  • DNS Configuration
  • IIS Manager
  • Implementing SSL
  • Enabling Certificates

Section E: Securing RRAS

  • Fundamentals
  • VPN Protocols
  • Configuration Options
  • Configuration Services
  • Remote Access Policies