Microsoft Windows 2003 Security
Protect against hacker threats with Encryption File System and Kerberos.
This course is not currently offered by Global Knowledge. Information here is provided for reference only.
Windows Server 2003 has a vastly improved security infrastructure over Windows 2000. Utilizing Kerberos Authentication Protocol and Public Key Infrastructure, Windows 2003 offers the potential for the security needed in your mission-critical enterprise. Security and network professionals will need to learn all these new features to take advantage of Windows Server 2003. This initial security course will teach you how to utilize the strengths of Windows Server 2003 to protect your organization.
What You'll Learn
- Learn how to utilize Kerberos authentication protocol in Windows 2003
- Use Group Policy to secure user accounts
- Use the built-in Public Key Infrastructure and establish an enterprise Certificate Authority
- Assistance in preparing for Microsoft Exam 70-299
Who Needs to Attend
Professionals responsible for system and network security administration, including security analysts and network designers.
Our Microsoft Windows Server 2003 course is required before taking this course.
There are no follow-ons for this course.
Title 1: Windows 2003 Security Concepts and Hacker Threats
Get a solid introduction to security including physical and network security. Learn Windows 2003 security terminology and concepts including the use of access and permissions. View a demonstration lab that puts these concepts to use. Use the Windows 2003 Active Directory database to manage information for Windows 2003 domains. Understand the organization of domains into trees and forests. Learn about objects and their permissions. Get an introduction to some of the tools hackers can use to threaten the security of a network.
Title 2: Configuring User Accounts and Groups
Get an understanding of user accounts and groups in Windows 2003 systems. Learn about default user accounts and compare domain and local accounts. Understand the use of groups in Windows 2003. Learn about security principals and the difference between domain and local accounts. Understand the proper way to deploy groups, and the new group membership rules in active directory.
Title 3: Configuring File Permissions
Learn how to properly setup and deploy file permissions on the NTFS file system. Understand the tools available to view and change permissions. Use the new centralized permission configuration tool for easier analysis of deployed permissions.
Title 4: Active Directory Security
Learn about the active directory design principles including forests and trees and the proper placement of domain controllers. Learn about delegating management at the OU level and how to define trusts between domains.
Title 5: Setting Enterprise Policy Using Group Policy
Learn about the use of Group Policy in Windows 2003 systems. Get an overview of the benefits of using Group Policy and learn the objects it can be applied to. Learn about the predefined Group Policies. Understand script configuration and the application of Group Policy. View demonstration labs that put these concepts to use.
Title 6: Security Policies and Authenticating Users
Get an overview of the use of access tokens and permissions in Windows 2003. Understand the difference between different types of encryption methods. Learn about trusted third parties, public key certificates, and Kerberos tickets. View demonstration labs that put these concepts to use. Learn how to define security for users and computer systems using the group policy editor. Learn how to properly defined user rights and security options And properly defined logon security policies and audit policies for your active directory domains. Compare the traditional NTLM Windows NT authentication method and the new Kerberos Windows 2003 authentication method. The security measures involved in configuring Kerberos are explained. The various elements behind key strength will be identified and described.
Title 7: Configuring and Using Certificate Services
This title introduces you to public key cryptosystems, which makes up a public and private key pair and how they are generated. You will learn how this key pair is used in issuing certificates and how to determine if a certificate is authentic. You will view a demonstration lab that shows you how to install Microsoft Certificate Services and how to manage certificates locally.
Title 8: Smart Cards and File Encryption
Learn about the use of smart cards for authentication in Windows 2003 systems. Learn how smart card readers are installed and how smart cards are configured for user logon. Understand how smart cards are used for e-mail encryption and Web transactions. Understand the process of encrypting files and adding a data recovery agent.
Title 9: SSL,TLS, and Signatures
Learn about shared a secret keys and public key cryptography. And how to configure outlook with certificates for secure email communications. Learn about secure socket layer and transport layer security and deployment steps.
Title 10: Authentication, Encryption, and VPNs
Learn how to set up a wireless LAN authentication and port base
Learn what makes network security vulnerable to attack. Find out how to guard your system from data capture, message stream modification, and replay attacks. Understand the use of protocols for encrypting and authenticating data. Learn how data is encapsulated using IPsec in tunnel mode. Configure an IP Security Policy and monitor security associations with the IPsecMon utility. Understand the overhead costs of authentication and encryption and how security lockdown can affect some basic services. Set up a virtual private network using the point to point tunneling protocol and L2TP encapsulation.
Title 11: Network Authentication and ISA Server
Learn about the dial-in access features of windows server 2003 lead how to configure your thoughts occasion methods and use a radius server for back-end authentication. Setup remote access policies. Learn about the Internet security and Acceleration server that works with windows server 2003 as a basic firewall proxy and caching server.