Fundamentals of Network Security
Module 1: Preparing to Secure InformationLessons
• Explaining How Assets Are Attacked
• Explaining How Assets Are Secured
Lab : Preparing to Secure Information
Module 2: Implementing Security-Enhanced Computing BaselinesLessons
• Introduction to Trusted Computing Bases
• Establishing a Security Baseline
• Monitoring a Security Baseline
• Helping to Secure Computers Physically
• Maintaining a Security Baseline
Lab : Maintaining Baseline Security
Module 3: Helping to Protect Information Using Authentication and Access ControlLessons
• Introduction to Access Control
• Implementing an Authentication Strategy
• Implementing an Access Control Strategy
Lab : Securing Accounts (MBSA)
Module 4: Using Cryptography to Help Protect InformationLessons
• Introduction to Cryptography
• Using Symmetric Encryption
• Using Hash Functions
• Using Public Key Encryption
Lab : Using Cryptography to Help Protect Information
Module 5: Using a PKI to Help Protect InformationLessons
• Introduction to Certificates
• Introduction to Public Key Infrastructure
• Deploying and Managing Certificates
Lab : Using Certificates
Module 6: Securing Internet Applications and ComponentsLesson
• Helping to Protect Web Servers
• Configuring Security for Common Internet Protocols
• Configuring Security for Web Browsers
• Configuring Security for Databases
Lab : Securing Web ServersLab : Protecting Clients from Active Content
Module 7: Implementing Security for E-Mail and Instant MessagingLessons
• Securing E-Mail Servers
• Securing E-Mail Clients
• Securing Instant Messaging
Lab : Securing Mail Servers
Module 8: Managing Security for Directory Services and DNSLessons
• Helping protect Directory Services Against Common Threats
• Helping Protect DNS Against Common Threats
Lab : Managing Security for Directory Services and DNS
Module 9: Securing Data TransmissionLessons
• Identifying Threats to Network Devices
• Implementing Security for Common Data Transmission
• Implementing Security for Remote Access
• Implementing Security for Wireless Network Traffic
Lab : Securing Data TransmissionLab : Using IPSec to Secure Data Transmission
Module 10: Implementing and Monitoring Security for Network PerimetersLessons
• Introduction to Network Perimeters
• Implementing Security on Inbound and Outbound Network Traffic
• Monitoring Network Traffic
Lab : Implementing and Monitoring Security for Network Perimeters
Module 11: Managing Operational SecurityLessons
• Establishing Security Policies and Procedures
• Educating Users about Security Policies
• Applying Security Policies to Operational Management
• Resolving Ethical Dilemmas When Helping to Protect Assets
Lab : Managing Operational Security
Module 12: Preserving Business ContinuityLessons
• Preparing to Recover from Disasters
• Communicating the Impact of Risks
• Performing a Security-Enhanced Backup and Recovery
Lab : Preserving Business Continuity
Module 13: Responding to Security IncidentsLessons
• Identifying Security Incidents
• Responding to Security Incidents
• Investigating Security Incidents
Lab : Responding to Security Incidents