40032 Networking and Security Fundamentals

Základní info

40032 Networking and Security Fundamentals

Students will gain an understanding of these topics: Network Infrastructures, Network Hardware, Protocols and Services, Security Layers, Windows 10 Operating System Security, Advanced Network Security, New Security Software.

TARGET AUDIENCE
This course provides an appropriate entry point to a future career in technology and assumes some hands-on experience or training but does not assume on-the-job experience.

COURSE OBJECTIVES
(As of June 23, 2016, this new course includes updates for Windows 10, in addition to updates to new security and threat terms)

After completing this course, students will be able to:
•Understand Network Infrastructures
•Understand Network Hardware
•Understand Protocols and Services
•Understand Security Layers
•Understand Operating System Security
•Understand Network Security
•Understand Security Software

Top
COURSE OUTLINE
1 - UNDERSTAND SECURITY LAYERS
Understand core security principles
Confidentiality; integrity; availability; how threat and risk impact principles; principle of least privilege; social engineering; attack surface analysis; threat modelling
Understand physical security
Site security; computer security; removable devices and drives; access control; mobile device security; keyloggers
Understand Internet security
Browser security settings; secure websites
Understand wireless security
Advantages and disadvantages of specific security types; keys; service set identifiers (SSIDs); MAC filters

1 - UNDERSTANDING LOCAL AREA NETWORKING
2 - DEFINING NETWORKS WITH THE OSI MODEL
2 - UNDERSTAND OPERATING SYSTEM SECURITY
Understand user authentication
Multifactor authentication; physical and virtual smart cards; Remote Authentication Dial-In User Service (RADIUS); biometrics; use Run As to perform administrative tasks
Understand permissions
File system permissions; share permissions; registry; Active Directory; enable or disable inheritance; behavior when moving or copying files within the same disk or on another disk; multiple groups with different permissions; basic permissions and advanced permissions; take ownership; delegation; inheritance
Understand password policies
Password complexity; account lockout; password length; password history; time between password changes; enforce by using Group Policies; common attack methods; password reset procedures; protect domain user account passwords
Understand audit policies
Types of auditing; what can be audited; enable auditing; what to audit for specific purposes; where to save audit information; how to secure audit information
Understand encryption
Encrypting file system (EFS); how EFS-encrypted folders impact moving/copying files; BitLocker (To Go); TPM; software-based encryption; MAIL encryption and signing and other uses; virtual private network (VPN); public key/private key; encryption algorithms; certificate properties; certificate services; PKI/certificate services infrastructure; token devices; lock down devices to run only trusted applications
Understand malware
Buffer overflow; viruses, polymorphic viruses; worms; Trojan horses; spyware; ransomware; adware; rootkits; backdoors; zero day attacks

3 - UNDERSTAND NETWORK SECURITY
Understand dedicated firewalls
Types of hardware firewalls and their characteristics; when to use a hardware firewall instead of a software firewall; stateful versus stateless firewall inspection; Security Compliance Manager; security baselines
Understand network isolation
Routing; honeypot; perimeter networks; network address translation (NAT); VPN; IPsec; server and domain isolation
Understand protocol security
Protocol spoofing; IPsec; tunneling; DNSsec; network sniffing; denial-of-service (DoS) attacks; common attack methods

3 - UNDERSTANDING WIRED AND WIRELESS NETWORKS
4 - UNDERSTANDING INTERNET PROTOCOL
4 - UNDERSTANDING SECURITY SOFTWARE
Understand client protection
Antivirus; protect against unwanted software installations; User Account Control (UAC); keep client operating system and software updated; encrypt offline folders, software restriction policies; principle of least privilege
Understand email protection
Antispam, antivirus, spoofing, phishing, and pharming; client versus server protection; Sender Policy Framework (SPF) records; PTR records
Understand server protection
Separation of services; hardening; keep server updated; secure dynamic Domain Name System (DNS) updates; disable unsecure authentication protocols; Read-Only Domain Controllers (RODC)

5 - IMPLEMENTING TCP/IP IN THE COMMAND LINE
5 - UNDERSTANDING NETWORK INFRASTRUCTURES
Understand the concepts of Internet, intranet, and extranet
Virtual Private Network (VPN), security zones, firewalls
Understand local area networks (LANs)
Perimeter networks; addressing; reserved address ranges for local use (including local loopback IP), VLANs; wired LAN and wireless LAN
Understand wide area networks (WANs)
Leased lines, dial-up, ISDN, VPN, T1, T3, E1, E3, DSL, cable, and more, and their characteristics (speed, availability)
Understand wireless networking
Types of wireless networking standards and their characteristics (802.11a,b,g,n, including different GHz ranges), types of network security (WPA, WEP, 802.1X, and others), point-to-point (P2P) wireless, wireless bridging
Understand network topologies and access methods
Star, mesh, ring

6 - UNDERSTANDING NETWORK HARDWARE
Understand switches
Transmission speed, number and type of ports, number of uplinks, speed of uplinks, managed or unmanaged switches, VLAN capabilities, Layer 2 and Layer 3 switches and security options, hardware redundancy, support, backplane speed, switching types and MAC table, understand capabilities of hubs versus switches
Understand routers
Transmission speed considerations, directly connected routes, static routing, dynamic routing (routing protocols), default routes; routing table and how it selects best route(s); routing table memory, network address translation (NAT), software routing in Windows Server; Quality of Service (QoS)
Understand media types
Cable types and their characteristics, including media segment length and speed; fiber optic; twisted pair shielded or nonshielded; catxx cabling, wireless; susceptibility to external interference (machinery and power cables); susceptibility to electricity (lightning), susceptibility to interception
Understand the Open Systems Interconnection (OSI) model
OSI model; Transmission Control Protocol (TCP) model; examples of devices, protocols, applications, and which OSI/TCP layer they belong to; TCP and User Datagram Protocol (UDP); well-known ports for most used purposes (not necessarily Internet); packets and frames
Understand IPv4
Subnetting, IPconfig, why use Internet Protocol version 4 (IPv4), addressing, ipv4toipv6 tunneling protocols to ensure backward compatibility, dual IP stack, subnetmask, gateway, ports, packets, reserved address ranges for local use (including local loopback IP)
Understand IPv6
Subnetting, IPconfig, why use IPv6, addressing, ipv4toipv6 tunneling protocols to ensure backward compatibility, dual IP stack, subnetmask, gateway, ports, packets, reserved address ranges for local use (including local loopback IP)
Understand names resolution
DNS, Windows Internet Name Service (WINS), steps in the name resolution process
Understand networking services
Dynamic Host Configuration Protocol (DHCP), remote access
Understand TCP/IP
Tools (such as ping), tracert, pathping, Telnet, IPconfig, netstat, reserved address ranges for local use (including local loopback IP), protocols

6 - WORKING WITH NETWORKING SERVICES
7 - UNDERSTANDING WIDE AREA NETWORKS
8 - DEFINING NETWORK INFRASTRUCTURES AND NETWORK SECURITY
9 - UNDERSTANDING SECURITY LAYERS
10 - AUTHENTICATION, AUTHORIZATION, AND ACCOUNTING
11 - UNDERSTANDING SECURITY POLICIES
12 - UNDERSTANDING NETWORK SECURITY
13 - PROTECTING THE SERVER AND CLIENT
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Top
RELATED
Related Certifications
Microsoft Technology Associate (MTA): IT Infrastructure
MTA: Networking Fundamentals
MTA: Security Fundamentals
Related Exams
Networking Fundamentals
Security Fundamentals

40032 Networking and Security Fundamentals

Vybraný termín:

 ONLINE

Cena

Kontaktovat dodavatele


Kontrola proti spamu. Kolik je sedm a osm ? Součet zapište číslicemi.