Maricopa Community Colleges  CCT223   20036-20086 
Official Course Description: MCCCD Approval: 07/22/08
CCT223 20036-20086 L+L 3 Credit(s) 4 Period(s)
Designing a Secure Microsoft Windows 2000 Network
Information and skills necessary to design a security framework for small, medium and enterprise networks using MS Windows 2000 technologies. Covers security risks and requirements, administrative access, user accounts, file resources, and backup procedures. Securing access emphasized.
Prerequisites: None.
Cross-References: CIS175CG
MCCCD Official Course Outline:
 
CCT223   20036-20086 Designing a Secure Microsoft Windows 2000 Network
    I. Security Risks
        A. Overview
        B. Data Risks
        C. Service Risks
        D. Potential Threats
        E. Common Security Standards
        F. Network Security Planning
      II. Windows 2000 Security
          A. Overview
          B. Security Features
          C. User Account Authentication
          D. Access to Resources
          E. Encryption Technologies
          F. Stored and Transmitted Data
          G. Public Key Infrastructure Technology
        III. Administrative Access
            A. Overview
            B. Administrative Model
            C. Designing Administrative Group Strategies
            D. Local Administrative Access
            E. Remote Administrative Access
          IV. User Accounts
              A. Account Policies
              B. Group Policy
              C. Account Creation and Location
              D. Delegation of Authority
              E. User Account Actions
            V. Windows 2000-Based Computers
                A. Overview
                B. Physical Security
                C. Security Requirements
                D. Security Configuration Templates
                E. Security Evaluation
              VI. File and Print Resources
                  A. Windows 2000 File System Security
                  B. Protecting Resources Using Discretionary Access Control Lists (DACLs)
                  C. Data Encryption Using Encrypting File System (EFS)
                  D. Resource Access Auditing
                  E. Backup and Restore Procedures
                  F. Protecting Data From Viruses
                VII. Communication Channels
                    A. Overview
                    B. Network Data Visibility Risks
                    C. Application-Layer Security
                    D. Internet Protocol (IP) Layer Security
                    E. Network Traffic Encryption
                  VIII. Secure Access to Non-Microsoft Clients
                      A. UNIX Clients
                      B. NetWare Clients
                      C. Macintosh Clients
                      D. Heterogeneous Network
                      E. Security Breaches
                    IX. Secure Access to Remote Users
                        A. Risks
                        B. Dial-Up Connections
                        C. Virtual Private Network (VPN) Connections
                        D. Remote Access Security Settings
                      X. Secure Access to Remote Offices
                          A. Private Networks
                          B. Public Networks
                          C. Connections Using Routers
                          D. VPN Connections
                          E. Security Requirements
                        XI. Secure Network Access to Internet Users
                            A. Risks
                            B. Firewalls Use
                            C. Screened Subnets
                            D. Public Access
                          XII. Secure Internet Access to Network Users
                              A. Protection of Internal Network Resources
                              B. Internet Usage Polices
                              C. Proxy Server Configuration
                              D. Client-Side Configuration
                            XIII. Extending Network to Partner Organizations
                                A. Overview
                                B. Access to Partner Organizations
                                C. Secure Applications Used by Partners
                                D. Secure Connections Used by Remote Partners
                                E. Active Directory to Manage Partner Accounts
                                F. Partners from Trusted Domains
                              XIV. Public Key Infrastructure (PKI)
                                  A. Overview
                                  B. Introduction
                                  C. Using Certificates
                                  D. Certificate Life Cycle
                                  E. Certification Authority
                                  F. Certification Authority Hierarchy
                                  G. Certificates to User Accounts
                                  H. Certification Authority Maintenance Strategies
                                XV. Security Plan
                                    A. Overview
                                    B. Design
                                    C. Security Requirements
                                    D. Maintenance
                                Go to Description    Go to top of Competencies    Go to top of Outline