课程详情 在线报名
垃圾邮件,黑客、病毒入侵,耗损企业生产力,面对层出不穷的网络攻击事件,你的网络够安全吗?当你部署防火墙、入侵检测与防毒软件之后,你知道还有哪些技术可以协助你部署更安全无忧的IT环境?
我们特别邀请安全专家为你规划如下安全培训课程,带你深入探讨防御企业网络的新思维,协助你有效防堵恶意入侵,真正为企业建立无“黑”的IT安全环境。
培训对象:
企业信息安全主管、信息安全业内人士、网络安全技术人员、IT或安全管理人员等
通过本课程你可以学习到:
解释共同的攻击反对网络财产、伴生的威胁和弱点,并且什么网络安全人员做巩固财产。
解释如何使用密码学帮助保护信息和如何选择组织的适当的加密方法。
实施在组织的安全改进的计算的基础线。
通过使用认证和存取控制,帮助保护在组织的信息。
部署并且处理证明。
帮助通过辨认对网络设备的威胁和实施共同的数据传输、远程存取和无线网络交通的安全保护数据传输。
帮助保护网络服务器以防止共同的攻击和配置网浏览器的安全
帮助保护电子邮件和立即传讯免受普通安全威胁。
辨认对名址服务和域名服务器的普通安全威胁和弱点,然后运用安全方法帮助保护他们。
辨认网络周长威胁和显示器网络的周长安全。
辨认安全策略的类型处理操作的安全,然后使用这些政策由组织的用户保证服从。
通过实施一个安全改进的灾害恢复战略,传达风险对其他和执行安全备份与补救保存企业连续性。
辨认,反应对,并且协助安全事件的正式调查。
课程时间:共6次课,3小时/次 60%理论学习,40%动手实验
主办单位:微软(*)有限公司 教育培训与认证事业部 厦门高士达微软高级技术教育中心
课程大纲:
课程模块 |
课程内容 |
实验内容 |
Module1: Preparing to Secure Information |
Explaining How Assets Are Attacked Explaining How Assets Are Secured |
Preparing to Secure Information |
Module2: Implementing Security-Enhanced Computing Baselines |
Introduction to Trusted Computing Bases Establishing a Security Baseline Monitoring a Security Baseline Helping to Secure Computers Physically Maintaining a Security Baseline |
Maintaining Baseline Security |
Module3: Helping to Protect Information Using Authentication and Access Control |
Introduction to Access Control Implementing an Authentication Strategy Implementing an Access Control Strategy |
Securing Accounts (MBSA) |
Module4: Using Cryptography to Help Protect Information |
Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption |
Using Cryptography to Help Protect Information |
Module5: Using a PKI to Help Protect Information |
Introduction to Certificates Introduction to Public Key Infrastructure Deploying and Managing Certificates |
Using Certificates |
Module6: Securing Internet Applications and Components |
Helping to Protect Web Server Configuring Security for Common Internet Protocols Configuring Security for Web Browsers Configuring Security for Databases |
Securing Web Servers Protecting Clients from Active Content |
Module7: Implementing Security for E-Mail and Instant Messaging |
Securing E-Mail Servers Securing E-Mail Clients Securing Instant Messaging |
Securing Mail Servers |
Module8: Managing Security for Directory Services and DNS |
Helping protect Directory Services Against Common Threats Helping Protect DNS Against Common Threats |
Managing Security for Directory Services and DNS |
Module9: Securing Data Transmission |
Identifying Threats to Network Devices Implementing Security for Common Data Transmission Implementing Security for Remote Access Implementing Security for Wireless Network Traffic |
Securing Data Transmission Using IPSec to Secure Data Transmission |
Module10: Implementing and Monitoring Security for Network Perimeters |
Introduction to Network Perimeters Implementing Security on Inbound and Outbound Network Traffic Monitoring Network Traffic |
Implementing and Monitoring Security for Network Perimeters |
Module11: Managing Operational Security |
Establishing Security Policies and Procedures Educating Users about Security Policies Applying Security Policies to Operational Management Resolving Ethical Dilemmas When Helping to Protect Assets |
Managing Operational Security |
Module12: Preserving Business Continuity |
Preparing to Recover from Disasters Communicating the Impact of Risks Performing a Security-Enhanced Backup and Recovery |
Preserving Business Continuity |
Module13: Responding to Security Incidents |
Identifying Security Incidents Responding to Security Incidents Investigating Security Incidents |
Responding to Security Incidents |
只要一个电话
我们免费为您回电