Maricopa Community Colleges  CIS175CG   20036-20086 
Official Course Description: MCCCD Approval: 05/27/03
CIS175CG 20036-20086 L+L 3 Credit(s) 4 Period(s)
Designing a Secure Microsoft Windows 2000 Network
Information and skills necessary to design a security framework for small, medium and enterprise networks using MS Windows 2000 technologies. Covers security risks and requirements, administrative access, user accounts, file resources, and backup procedures. Securing access emphasized.
Prerequisites: None.
Cross-References: CCT223
Go to Competencies    Go to Outline
 
MCCCD Official Course Competencies:
 
CIS175CG   20036-20086 Designing a Secure Microsoft Windows 2000 Network
1. Describe various data risks. (I)
2. Identify potential threats against network security. (I)
3. Summarize how key technologies within Windows 2000 are used to secure a network and its resources. (II)
4. Plan secure local and remote administrative access to a network. (III)
5. Design account policies for user accounts. (IV)
6. Plan account creation and location. (IV)
7. Evaluate security requirements and configurations. (V)
8. Describe file and print resources. (VI)
9. Identify various backup and restore procedures. (VI)
10. Assess network for potential risks to data. (VII)
11. Design a strategy for securing network access to non- Microsoft clients. (VIII)
12. Design a secure network for various remote users. (IX)
13. Differentiate between a private and public network. (X)
14. Plan and design a secure connection between two remote networks. (X)
15. Analyze possible threats to a network when connected to the Internet. (XI)
16. Determine which computers, protocols and users are allowed access to the Internet. (XII)
17. Summarize methods to extend a network to other trusted partner organizations. (XIII)
18. List and describe the basic components of a Public Key Infrastructure (PKI). (XIV)
19. Summarize certificate use and their life cycle. (XIV)
20. Design and maintain a security plan. (XV)
Go to Description    Go to top of Competencies
 
MCCCD Official Course Outline:
 
CIS175CG   20036-20086 Designing a Secure Microsoft Windows 2000 Network
    I. Security Risks
        A. Overview
        B. Data Risks
        C. Service Risks
        D. Potential Threats
        E. Common Security Standards
        F. Network Security Planning
      II. Windows 2000 Security
          A. Overview
          B. Security Features
          C. User Account Authentication
          D. Access to Resources
          E. Encryption Technologies
          F. Stored and Transmitted Data
          G. Public Key Infrastructure Technology
        III. Administrative Access
            A. Overview
            B. Administrative Model
            C. Designing Administrative Group Strategies
            D. Local Administrative Access
            E. Remote Administrative Access
          IV. User Accounts
              A. Account Policies
              B. Group Policy
              C. Account Creation and Location
              D. Delegation of Authority
              E. User Account Actions
            V. Windows 2000-Based Computers
                A. Overview
                B. Physical Security
                C. Security Requirements
                D. Security Configuration Templates
                E. Security Evaluation
              VI. File and Print Resources
                  A. Windows 2000 File System Security
                  B. Protecting Resources Using Discretionary Access Control Lists (DACLs)
                  C. Data Encryption Using Encrypting File System (EFS)
                  D. Resource Access Auditing
                  E. Backup and Restore Procedures
                  F. Protecting Data From Viruses
                VII. Communication Channels
                    A. Overview
                    B. Network Data Visibility Risks
                    C. Application-Layer Security
                    D. Internet Protocol (IP) Layer Security
                    E. Network Traffic Encryption
                  VIII. Secure Access to Non-Microsoft Clients
                      A. UNIX Clients
                      B. NetWare Clients
                      C. Macintosh Clients
                      D. Heterogeneous Network
                      E. Security Breaches
                    IX. Secure Access to Remote Users
                        A. Risks
                        B. Dial-Up Connections
                        C. Virtual Private Network (VPN) Connections
                        D. Remote Access Security Settings
                      X. Secure Access to Remote Offices
                          A. Private Networks
                          B. Public Networks
                          C. Connections Using Routers
                          D. VPN Connections
                          E. Security Requirements
                        XI. Secure Network Access to Internet Users
                            A. Risks
                            B. Firewalls Use
                            C. Screened Subnets
                            D. Public Access
                          XII. Secure Internet Access to Network Users
                              A. Protection of Internal Network Resources
                              B. Internet Usage Polices
                              C. Proxy Server Configuration
                              D. Client-Side Configuration
                            XIII. Extending Network to Partner Organizations
                                A. Overview
                                B. Access to Partner Organizations
                                C. Secure Applications Used by Partners
                                D. Secure Connections Used by Remote Partners
                                E. Active Directory to Manage Partner Accounts
                                F. Partners from Trusted Domains
                              XIV. Public Key Infrastructure (PKI)
                                  A. Overview
                                  B. Introduction
                                  C. Using Certificates
                                  D. Certificate Life Cycle
                                  E. Certification Authority
                                  F. Certification Authority Hierarchy
                                  G. Certificates to User Accounts
                                  H. Certification Authority Maintenance Strategies
                                XV. Security Plan
                                    A. Overview
                                    B. Design
                                    C. Security Requirements
                                    D. Maintenance
                                Go to Description    Go to top of Competencies    Go to top of Outline