print to filestore.globalknowledge.net/course-overviews/ie/m40367_a_.pdfexamining types of...

60
M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200 Security Fundamentals Duration: 3 Days Course Code: M40367 Version: A Overview: This three-day MTA Training course helps you prepare for Microsoft Technology Associate Exam 98-367, and build an understanding of these topics: Security Layers, Operating System Security, Network Security, Security Software. This course leverages the same content as found in the Microsoft Official Academic Course (MOAC) for this exam. Target Audience: The Microsoft Technology Associate (MTA) is Microsoft’s newest suite of technology certification exams that validate fundamental knowledge needed to begin building a career using Microsoft technologies. This program provides an appropriate entry point to a future career in technology and assumes some hands-on experience or training but does not assume on-the-job experience. Objectives: After completing this course, students will be able to: Understand Network Security Understand Security Layers Understand Security Software Understand Operating System Security

Upload: others

Post on 03-Aug-2020

17 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Security Fundamentals

Duration: 3 Days Course Code: M40367 Version: A

Overview:

This three-day MTA Training course helps you prepare for Microsoft Technology Associate Exam 98-367, and build an understanding of thesetopics: Security Layers, Operating System Security, Network Security, Security Software. This course leverages the same content as found inthe Microsoft Official Academic Course (MOAC) for this exam.

Target Audience:

The Microsoft Technology Associate (MTA) is Microsoft’s newest suite of technology certification exams that validate fundamental knowledgeneeded to begin building a career using Microsoft technologies. This program provides an appropriate entry point to a future career intechnology and assumes some hands-on experience or training but does not assume on-the-job experience.

Objectives:

After completing this course, students will be able to: Understand Network Security

Understand Security Layers Understand Security Software

Understand Operating System Security

Page 2: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Content:

Understanding Security Layers line line line

Introducing Security Understanding Confidentiality Understanding ConfidentialityUnderstanding Integrity Understanding IntegrityUnderstanding Availability Understanding Availability

line Defining Threats and Risk Management Defining Threats and Risk ManagementUnderstanding Confidentiality Understanding the Principle of Least Understanding the Principle of LeastUnderstanding Integrity Privilege PrivilegeUnderstanding Availability Understanding Attack Surface Understanding Attack SurfaceDefining Threats and Risk Management Understanding Social Engineering Understanding Social EngineeringUnderstanding the Principle of Least Linking Cost with Security Linking Cost with SecurityPrivilege Looking at Physical Security as the First Looking at Physical Security as the FirstUnderstanding Attack Surface Line of Defense Line of DefenseUnderstanding Social Engineering Understanding Site Security Understanding Site SecurityLinking Cost with Security Understanding Computer Security Understanding Computer SecurityLooking at Physical Security as the First Authenticating with What You Know Authenticating with What You KnowLine of Defense Authenticating with What You Own or Authenticating with What You Own orUnderstanding Site Security Possess PossessUnderstanding Computer Security Authenticating with What You Are Authenticating with What You AreAuthenticating with What You Know Introducing RADIUS and TACACS1 Introducing RADIUS and TACACS1Authenticating with What You Own or Using Run As Using Run AsPossess Introducing Directory Services with Active Introducing Directory Services with ActiveAuthenticating with What You Are Directory DirectoryIntroducing RADIUS and TACACS1 Looking at Domain Controllers Looking at Domain ControllersUsing Run As Introducing NTLM Introducing NTLMIntroducing Directory Services with Active Introducing Kerberos Introducing KerberosDirectory Using Organizational Units Using Organizational UnitsLooking at Domain Controllers Looking at Objects Looking at ObjectsIntroducing NTLM Using Groups Using GroupsIntroducing Kerberos Looking at Web Server Authentication Looking at Web Server AuthenticationUsing Organizational Units Comparing Rights and Permissions Comparing Rights and PermissionsLooking at Objects Looking at NTFS Looking at NTFSUsing Groups Using NTFS Permissions Using NTFS PermissionsLooking at Web Server Authentication Looking at Effective NTFS Permissions Looking at Effective NTFS PermissionsComparing Rights and Permissions Copying and Moving Files Copying and Moving FilesLooking at NTFS Using Folder and File Owners Using Folder and File OwnersUsing NTFS Permissions Sharing Drives and Folders Sharing Drives and FoldersLooking at Effective NTFS Permissions Looking at Special and Administrative Looking at Special and AdministrativeCopying and Moving Files Shares SharesUsing Folder and File Owners Introducing the Registry Introducing the RegistrySharing Drives and Folders Using Encryption to Protect Data Using Encryption to Protect DataLooking at Special and Administrative Examining Types of Encryption Examining Types of EncryptionShares Introducing Public Key Infrastructure Introducing Public Key InfrastructureIntroducing the Registry Encrypting Email Encrypting EmailUsing Encryption to Protect Data Encrypting Files with EFS Encrypting Files with EFSExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in WindowsIntroducing Public Key Infrastructure Introducing IPSec Introducing IPSecEncrypting Email Encrypting with VPN Technology Encrypting with VPN TechnologyEncrypting Files with EFS Using Auditing to Complete the Security Using Auditing to Complete the SecurityEncrypting Disks in Windows Picture PictureIntroducing IPSec Using Password Complexity to Make a Using Password Complexity to Make aEncrypting with VPN Technology Stronger Password Stronger PasswordUsing Auditing to Complete the Security Using Account Lockout to Prevent Using Account Lockout to Prevent HackingPicture Hacking Looking at Password LengthUsing Password Complexity to Make a Looking at Password Length Using Password History to EnforceStronger Password Using Password History to Enforce SecurityUsing Account Lockout to Prevent Hacking Security Setting the Time between PasswordLooking at Password Length Setting the Time between Password ChangesUsing Password History to Enforce Security Changes Using Password Group Policies to EnforceSetting the Time between Password Using Password Group Policies to SecurityChanges Enforce Security Understanding Common Attack MethodsUsing Password Group Policies to Enforce Understanding Common Attack Methods Examining Hardware Firewalls and TheirSecurity Examining Hardware Firewalls and Their CharacteristicsUnderstanding Common Attack Methods Characteristics Using Hardware Firewalls versus Software

Page 3: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Examining Hardware Firewalls and Their Using Hardware Firewalls versus FirewallsCharacteristics Software Firewalls Using Stateful versus Stateless InspectionUsing Hardware Firewalls versus Software Using Stateful versus Stateless Controlling Access with Network AccessFirewalls Inspection Protection (NAP)Using Stateful versus Stateless Inspection Controlling Access with Network Access Understanding the Purpose of NAPControlling Access with Network Access Protection (NAP) Looking at How NAP WorksProtection (NAP) Understanding the Purpose of NAP Examining the Requirements for NAPUnderstanding the Purpose of NAP Looking at How NAP Works Using Isolation to Protect the NetworkLooking at How NAP Works Examining the Requirements for NAP Understanding Virtual LANsExamining the Requirements for NAP Using Isolation to Protect the Network Understanding RoutingUsing Isolation to Protect the Network Understanding Virtual LANs Looking at Intrusion Detection andUnderstanding Virtual LANs Understanding Routing Intrusion Prevention SystemsUnderstanding Routing Looking at Intrusion Detection and Looking at HoneypotsLooking at Intrusion Detection and Intrusion Intrusion Prevention Systems Looking at DMZsPrevention Systems Looking at Honeypots Understanding Network AddressLooking at Honeypots Looking at DMZs Translation (NAT)Looking at DMZs Understanding Network Address Understanding Virtual Private NetworksUnderstanding Network Address Translation Translation (NAT) (VPNs)(NAT) Understanding Virtual Private Networks Understanding Internet Protocol SecurityUnderstanding Virtual Private Networks (VPNs) (IPsec)(VPNs) Understanding Internet Protocol Security Using Other VPN ProtocolsUnderstanding Internet Protocol Security (IPsec) Looking at Server and Domain Isolation(IPsec) Using Other VPN Protocols Protecting Data with Protocol SecurityUsing Other VPN Protocols Looking at Server and Domain Isolation Understanding TunnelingLooking at Server and Domain Isolation Protecting Data with Protocol Security Using DNS Security Extensions (DNSSEC)Protecting Data with Protocol Security Understanding Tunneling Looking at Protocol SpoofingUnderstanding Tunneling Using DNS Security Extensions Utilizing Network SniffingUsing DNS Security Extensions (DNSSEC) (DNSSEC) Understanding Common NETWORKLooking at Protocol Spoofing Looking at Protocol Spoofing Attack MethodsUtilizing Network Sniffing Utilizing Network Sniffing Securing Wireless NetworkUnderstanding Common NETWORK Attack Understanding Common NETWORK Using Service Set Identifier (SSID)Methods Attack Methods Understanding KeysSecuring Wireless Network Securing Wireless Network Utilizing MAC FiltersUsing Service Set Identifier (SSID) Using Service Set Identifier (SSID) Considering Pros and Cons of SpecificUnderstanding Keys Understanding Keys Security TypesUtilizing MAC Filters Utilizing MAC Filters Protecting Your Computer from MalwareConsidering Pros and Cons of Specific Considering Pros and Cons of Specific Utilizing Windows UpdatesSecurity Types Security Types Utilizing User Account ControlProtecting Your Computer from Malware Protecting Your Computer from Malware Using Windows FirewallUtilizing Windows Updates Utilizing Windows Updates Using Offline FilesUtilizing User Account Control Utilizing User Account Control Locking Down a Client ComputerUsing Windows Firewall Using Windows Firewall Protecting Your EmailUsing Offline Files Using Offline Files Dealing with SpamLocking Down a Client Computer Locking Down a Client Computer Relaying EmailProtecting Your Email Protecting Your Email Securing Internet ExplorerDealing with Spam Dealing with Spam Looking at Cookies and Privacy SettingsRelaying Email Relaying Email Examining Content ZonesSecuring Internet Explorer Securing Internet Explorer Phishing and PharmingLooking at Cookies and Privacy Settings Looking at Cookies and Privacy Settings Protecting Your ServerExamining Content Zones Examining Content Zones Placing the ServerPhishing and Pharming Phishing and Pharming Hardening the ServerProtecting Your Server Protecting Your Server Using Secure Dynamic DNSPlacing the Server Placing the ServerHardening the Server Hardening the ServerUsing Secure Dynamic DNS Using Secure Dynamic DNS line

Understanding ConfidentialityUnderstanding Integrity

line line Understanding AvailabilityUnderstanding Confidentiality Understanding Confidentiality Defining Threats and Risk ManagementUnderstanding Integrity Understanding Integrity Understanding the Principle of LeastUnderstanding Availability Understanding Availability PrivilegeDefining Threats and Risk Management Defining Threats and Risk Management Understanding Attack SurfaceUnderstanding the Principle of Least Understanding the Principle of Least Understanding Social EngineeringPrivilege Privilege Linking Cost with SecurityUnderstanding Attack Surface Understanding Attack Surface Looking at Physical Security as the FirstUnderstanding Social Engineering Understanding Social Engineering Line of Defense

Page 4: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Linking Cost with Security Linking Cost with Security Understanding Site SecurityLooking at Physical Security as the First Looking at Physical Security as the First Understanding Computer SecurityLine of Defense Line of Defense Authenticating with What You KnowUnderstanding Site Security Understanding Site Security Authenticating with What You Own orUnderstanding Computer Security Understanding Computer Security PossessAuthenticating with What You Know Authenticating with What You Know Authenticating with What You AreAuthenticating with What You Own or Authenticating with What You Own or Introducing RADIUS and TACACS1Possess Possess Using Run AsAuthenticating with What You Are Authenticating with What You Are Introducing Directory Services with ActiveIntroducing RADIUS and TACACS1 Introducing RADIUS and TACACS1 DirectoryUsing Run As Using Run As Looking at Domain ControllersIntroducing Directory Services with Active Introducing Directory Services with Active Introducing NTLMDirectory Directory Introducing KerberosLooking at Domain Controllers Looking at Domain Controllers Using Organizational UnitsIntroducing NTLM Introducing NTLM Looking at ObjectsIntroducing Kerberos Introducing Kerberos Using GroupsUsing Organizational Units Using Organizational Units Looking at Web Server AuthenticationLooking at Objects Looking at Objects Comparing Rights and PermissionsUsing Groups Using Groups Looking at NTFSLooking at Web Server Authentication Looking at Web Server Authentication Using NTFS PermissionsComparing Rights and Permissions Comparing Rights and Permissions Looking at Effective NTFS PermissionsLooking at NTFS Looking at NTFS Copying and Moving FilesUsing NTFS Permissions Using NTFS Permissions Using Folder and File OwnersLooking at Effective NTFS Permissions Looking at Effective NTFS Permissions Sharing Drives and FoldersCopying and Moving Files Copying and Moving Files Looking at Special and AdministrativeUsing Folder and File Owners Using Folder and File Owners SharesSharing Drives and Folders Sharing Drives and Folders Introducing the RegistryLooking at Special and Administrative Looking at Special and Administrative Using Encryption to Protect DataShares Shares Examining Types of EncryptionIntroducing the Registry Introducing the Registry Introducing Public Key InfrastructureUsing Encryption to Protect Data Using Encryption to Protect Data Encrypting EmailExamining Types of Encryption Examining Types of Encryption Encrypting Files with EFSIntroducing Public Key Infrastructure Introducing Public Key Infrastructure Encrypting Disks in WindowsEncrypting Email Encrypting Email Introducing IPSecEncrypting Files with EFS Encrypting Files with EFS Encrypting with VPN TechnologyEncrypting Disks in Windows Encrypting Disks in Windows Using Auditing to Complete the SecurityIntroducing IPSec Introducing IPSec PictureEncrypting with VPN Technology Encrypting with VPN Technology Using Password Complexity to Make aUsing Auditing to Complete the Security Using Auditing to Complete the Security Stronger PasswordPicture Picture Using Account Lockout to Prevent HackingUsing Password Complexity to Make a Using Password Complexity to Make a Looking at Password LengthStronger Password Stronger Password Using Password History to EnforceUsing Account Lockout to Prevent Hacking Using Account Lockout to Prevent SecurityLooking at Password Length Hacking Setting the Time between PasswordUsing Password History to Enforce Security Looking at Password Length ChangesSetting the Time between Password Using Password History to Enforce Using Password Group Policies to EnforceChanges Security SecurityUsing Password Group Policies to Enforce Setting the Time between Password Understanding Common Attack MethodsSecurity Changes Examining Hardware Firewalls and TheirUnderstanding Common Attack Methods Using Password Group Policies to CharacteristicsExamining Hardware Firewalls and Their Enforce Security Using Hardware Firewalls versus SoftwareCharacteristics Understanding Common Attack Methods FirewallsUsing Hardware Firewalls versus Software Examining Hardware Firewalls and Their Using Stateful versus Stateless InspectionFirewalls Characteristics Controlling Access with Network AccessUsing Stateful versus Stateless Inspection Using Hardware Firewalls versus Protection (NAP)Controlling Access with Network Access Software Firewalls Understanding the Purpose of NAPProtection (NAP) Using Stateful versus Stateless Looking at How NAP WorksUnderstanding the Purpose of NAP Inspection Examining the Requirements for NAPLooking at How NAP Works Controlling Access with Network Access Using Isolation to Protect the NetworkExamining the Requirements for NAP Protection (NAP) Understanding Virtual LANsUsing Isolation to Protect the Network Understanding the Purpose of NAP Understanding RoutingUnderstanding Virtual LANs Looking at How NAP Works Looking at Intrusion Detection andUnderstanding Routing Examining the Requirements for NAP Intrusion Prevention SystemsLooking at Intrusion Detection and Intrusion Using Isolation to Protect the Network Looking at HoneypotsPrevention Systems Understanding Virtual LANs Looking at DMZsLooking at Honeypots Understanding Routing Understanding Network Address

Page 5: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Looking at DMZs Looking at Intrusion Detection and Translation (NAT)Understanding Network Address Translation Intrusion Prevention Systems Understanding Virtual Private Networks(NAT) Looking at Honeypots (VPNs)Understanding Virtual Private Networks Looking at DMZs Understanding Internet Protocol Security(VPNs) Understanding Network Address (IPsec)Understanding Internet Protocol Security Translation (NAT) Using Other VPN Protocols(IPsec) Understanding Virtual Private Networks Looking at Server and Domain IsolationUsing Other VPN Protocols (VPNs) Protecting Data with Protocol SecurityLooking at Server and Domain Isolation Understanding Internet Protocol Security Understanding TunnelingProtecting Data with Protocol Security (IPsec) Using DNS Security Extensions (DNSSEC)Understanding Tunneling Using Other VPN Protocols Looking at Protocol SpoofingUsing DNS Security Extensions (DNSSEC) Looking at Server and Domain Isolation Utilizing Network SniffingLooking at Protocol Spoofing Protecting Data with Protocol Security Understanding Common NETWORKUtilizing Network Sniffing Understanding Tunneling Attack MethodsUnderstanding Common NETWORK Attack Using DNS Security Extensions Securing Wireless NetworkMethods (DNSSEC) Using Service Set Identifier (SSID)Securing Wireless Network Looking at Protocol Spoofing Understanding KeysUsing Service Set Identifier (SSID) Utilizing Network Sniffing Utilizing MAC FiltersUnderstanding Keys Understanding Common NETWORK Considering Pros and Cons of SpecificUtilizing MAC Filters Attack Methods Security TypesConsidering Pros and Cons of Specific Securing Wireless Network Protecting Your Computer from MalwareSecurity Types Using Service Set Identifier (SSID) Utilizing Windows UpdatesProtecting Your Computer from Malware Understanding Keys Utilizing User Account ControlUtilizing Windows Updates Utilizing MAC Filters Using Windows FirewallUtilizing User Account Control Considering Pros and Cons of Specific Using Offline FilesUsing Windows Firewall Security Types Locking Down a Client ComputerUsing Offline Files Protecting Your Computer from Malware Protecting Your EmailLocking Down a Client Computer Utilizing Windows Updates Dealing with SpamProtecting Your Email Utilizing User Account Control Relaying EmailDealing with Spam Using Windows Firewall Securing Internet ExplorerRelaying Email Using Offline Files Looking at Cookies and Privacy SettingsSecuring Internet Explorer Locking Down a Client Computer Examining Content ZonesLooking at Cookies and Privacy Settings Protecting Your Email Phishing and PharmingExamining Content Zones Dealing with Spam Protecting Your ServerPhishing and Pharming Relaying Email Placing the ServerProtecting Your Server Securing Internet Explorer Hardening the ServerPlacing the Server Looking at Cookies and Privacy Settings Using Secure Dynamic DNSHardening the Server Examining Content ZonesUsing Secure Dynamic DNS Phishing and Pharming

Protecting Your Server linePlacing the Server Understanding Confidentiality

line Hardening the Server Understanding IntegrityUnderstanding Confidentiality Using Secure Dynamic DNS Understanding AvailabilityUnderstanding Integrity Defining Threats and Risk ManagementUnderstanding Availability Understanding the Principle of LeastDefining Threats and Risk Management line PrivilegeUnderstanding the Principle of Least Understanding Confidentiality Understanding Attack SurfacePrivilege Understanding Integrity Understanding Social EngineeringUnderstanding Attack Surface Understanding Availability Linking Cost with SecurityUnderstanding Social Engineering Defining Threats and Risk Management Looking at Physical Security as the FirstLinking Cost with Security Understanding the Principle of Least Line of DefenseLooking at Physical Security as the First Privilege Understanding Site SecurityLine of Defense Understanding Attack Surface Understanding Computer SecurityUnderstanding Site Security Understanding Social Engineering Authenticating with What You KnowUnderstanding Computer Security Linking Cost with Security Authenticating with What You Own orAuthenticating with What You Know Looking at Physical Security as the First PossessAuthenticating with What You Own or Line of Defense Authenticating with What You ArePossess Understanding Site Security Introducing RADIUS and TACACS1Authenticating with What You Are Understanding Computer Security Using Run AsIntroducing RADIUS and TACACS1 Authenticating with What You Know Introducing Directory Services with ActiveUsing Run As Authenticating with What You Own or DirectoryIntroducing Directory Services with Active Possess Looking at Domain ControllersDirectory Authenticating with What You Are Introducing NTLMLooking at Domain Controllers Introducing RADIUS and TACACS1 Introducing KerberosIntroducing NTLM Using Run As Using Organizational UnitsIntroducing Kerberos Introducing Directory Services with Active Looking at Objects

Page 6: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Using Organizational Units Directory Using GroupsLooking at Objects Looking at Domain Controllers Looking at Web Server AuthenticationUsing Groups Introducing NTLM Comparing Rights and PermissionsLooking at Web Server Authentication Introducing Kerberos Looking at NTFSComparing Rights and Permissions Using Organizational Units Using NTFS PermissionsLooking at NTFS Looking at Objects Looking at Effective NTFS PermissionsUsing NTFS Permissions Using Groups Copying and Moving FilesLooking at Effective NTFS Permissions Looking at Web Server Authentication Using Folder and File OwnersCopying and Moving Files Comparing Rights and Permissions Sharing Drives and FoldersUsing Folder and File Owners Looking at NTFS Looking at Special and AdministrativeSharing Drives and Folders Using NTFS Permissions SharesLooking at Special and Administrative Looking at Effective NTFS Permissions Introducing the RegistryShares Copying and Moving Files Using Encryption to Protect DataIntroducing the Registry Using Folder and File Owners Examining Types of EncryptionUsing Encryption to Protect Data Sharing Drives and Folders Introducing Public Key InfrastructureExamining Types of Encryption Looking at Special and Administrative Encrypting EmailIntroducing Public Key Infrastructure Shares Encrypting Files with EFSEncrypting Email Introducing the Registry Encrypting Disks in WindowsEncrypting Files with EFS Using Encryption to Protect Data Introducing IPSecEncrypting Disks in Windows Examining Types of Encryption Encrypting with VPN TechnologyIntroducing IPSec Introducing Public Key Infrastructure Using Auditing to Complete the SecurityEncrypting with VPN Technology Encrypting Email PictureUsing Auditing to Complete the Security Encrypting Files with EFS Using Password Complexity to Make aPicture Encrypting Disks in Windows Stronger PasswordUsing Password Complexity to Make a Introducing IPSec Using Account Lockout to Prevent HackingStronger Password Encrypting with VPN Technology Looking at Password LengthUsing Account Lockout to Prevent Hacking Using Auditing to Complete the Security Using Password History to EnforceLooking at Password Length Picture SecurityUsing Password History to Enforce Security Using Password Complexity to Make a Setting the Time between PasswordSetting the Time between Password Stronger Password ChangesChanges Using Account Lockout to Prevent Using Password Group Policies to EnforceUsing Password Group Policies to Enforce Hacking SecuritySecurity Looking at Password Length Understanding Common Attack MethodsUnderstanding Common Attack Methods Using Password History to Enforce Examining Hardware Firewalls and TheirExamining Hardware Firewalls and Their Security CharacteristicsCharacteristics Setting the Time between Password Using Hardware Firewalls versus SoftwareUsing Hardware Firewalls versus Software Changes FirewallsFirewalls Using Password Group Policies to Using Stateful versus Stateless InspectionUsing Stateful versus Stateless Inspection Enforce Security Controlling Access with Network AccessControlling Access with Network Access Understanding Common Attack Methods Protection (NAP)Protection (NAP) Examining Hardware Firewalls and Their Understanding the Purpose of NAPUnderstanding the Purpose of NAP Characteristics Looking at How NAP WorksLooking at How NAP Works Using Hardware Firewalls versus Examining the Requirements for NAPExamining the Requirements for NAP Software Firewalls Using Isolation to Protect the NetworkUsing Isolation to Protect the Network Using Stateful versus Stateless Understanding Virtual LANsUnderstanding Virtual LANs Inspection Understanding RoutingUnderstanding Routing Controlling Access with Network Access Looking at Intrusion Detection andLooking at Intrusion Detection and Intrusion Protection (NAP) Intrusion Prevention SystemsPrevention Systems Understanding the Purpose of NAP Looking at HoneypotsLooking at Honeypots Looking at How NAP Works Looking at DMZsLooking at DMZs Examining the Requirements for NAP Understanding Network AddressUnderstanding Network Address Translation Using Isolation to Protect the Network Translation (NAT)(NAT) Understanding Virtual LANs Understanding Virtual Private NetworksUnderstanding Virtual Private Networks Understanding Routing (VPNs)(VPNs) Looking at Intrusion Detection and Understanding Internet Protocol SecurityUnderstanding Internet Protocol Security Intrusion Prevention Systems (IPsec)(IPsec) Looking at Honeypots Using Other VPN ProtocolsUsing Other VPN Protocols Looking at DMZs Looking at Server and Domain IsolationLooking at Server and Domain Isolation Understanding Network Address Protecting Data with Protocol SecurityProtecting Data with Protocol Security Translation (NAT) Understanding TunnelingUnderstanding Tunneling Understanding Virtual Private Networks Using DNS Security Extensions (DNSSEC)Using DNS Security Extensions (DNSSEC) (VPNs) Looking at Protocol SpoofingLooking at Protocol Spoofing Understanding Internet Protocol Security Utilizing Network SniffingUtilizing Network Sniffing (IPsec) Understanding Common NETWORKUnderstanding Common NETWORK Attack Using Other VPN Protocols Attack MethodsMethods Looking at Server and Domain Isolation Securing Wireless Network

Page 7: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Securing Wireless Network Protecting Data with Protocol Security Using Service Set Identifier (SSID)Using Service Set Identifier (SSID) Understanding Tunneling Understanding KeysUnderstanding Keys Using DNS Security Extensions Utilizing MAC FiltersUtilizing MAC Filters (DNSSEC) Considering Pros and Cons of SpecificConsidering Pros and Cons of Specific Looking at Protocol Spoofing Security TypesSecurity Types Utilizing Network Sniffing Protecting Your Computer from MalwareProtecting Your Computer from Malware Understanding Common NETWORK Utilizing Windows UpdatesUtilizing Windows Updates Attack Methods Utilizing User Account ControlUtilizing User Account Control Securing Wireless Network Using Windows FirewallUsing Windows Firewall Using Service Set Identifier (SSID) Using Offline FilesUsing Offline Files Understanding Keys Locking Down a Client ComputerLocking Down a Client Computer Utilizing MAC Filters Protecting Your EmailProtecting Your Email Considering Pros and Cons of Specific Dealing with SpamDealing with Spam Security Types Relaying EmailRelaying Email Protecting Your Computer from Malware Securing Internet ExplorerSecuring Internet Explorer Utilizing Windows Updates Looking at Cookies and Privacy SettingsLooking at Cookies and Privacy Settings Utilizing User Account Control Examining Content ZonesExamining Content Zones Using Windows Firewall Phishing and PharmingPhishing and Pharming Using Offline Files Protecting Your ServerProtecting Your Server Locking Down a Client Computer Placing the ServerPlacing the Server Protecting Your Email Hardening the ServerHardening the Server Dealing with Spam Using Secure Dynamic DNSUsing Secure Dynamic DNS Relaying Email

Securing Internet ExplorerLooking at Cookies and Privacy Settings line

line Examining Content Zones Understanding ConfidentialityUnderstanding Confidentiality Phishing and Pharming Understanding IntegrityUnderstanding Integrity Protecting Your Server Understanding AvailabilityUnderstanding Availability Placing the Server Defining Threats and Risk ManagementDefining Threats and Risk Management Hardening the Server Understanding the Principle of LeastUnderstanding the Principle of Least Using Secure Dynamic DNS PrivilegePrivilege Understanding Attack SurfaceUnderstanding Attack Surface Understanding Social EngineeringUnderstanding Social Engineering line Linking Cost with SecurityLinking Cost with Security Understanding Confidentiality Looking at Physical Security as the FirstLooking at Physical Security as the First Understanding Integrity Line of DefenseLine of Defense Understanding Availability Understanding Site SecurityUnderstanding Site Security Defining Threats and Risk Management Understanding Computer SecurityUnderstanding Computer Security Understanding the Principle of Least Authenticating with What You KnowAuthenticating with What You Know Privilege Authenticating with What You Own orAuthenticating with What You Own or Understanding Attack Surface PossessPossess Understanding Social Engineering Authenticating with What You AreAuthenticating with What You Are Linking Cost with Security Introducing RADIUS and TACACS1Introducing RADIUS and TACACS1 Looking at Physical Security as the First Using Run AsUsing Run As Line of Defense Introducing Directory Services with ActiveIntroducing Directory Services with Active Understanding Site Security DirectoryDirectory Understanding Computer Security Looking at Domain ControllersLooking at Domain Controllers Authenticating with What You Know Introducing NTLMIntroducing NTLM Authenticating with What You Own or Introducing KerberosIntroducing Kerberos Possess Using Organizational UnitsUsing Organizational Units Authenticating with What You Are Looking at ObjectsLooking at Objects Introducing RADIUS and TACACS1 Using GroupsUsing Groups Using Run As Looking at Web Server AuthenticationLooking at Web Server Authentication Introducing Directory Services with Active Comparing Rights and PermissionsComparing Rights and Permissions Directory Looking at NTFSLooking at NTFS Looking at Domain Controllers Using NTFS PermissionsUsing NTFS Permissions Introducing NTLM Looking at Effective NTFS PermissionsLooking at Effective NTFS Permissions Introducing Kerberos Copying and Moving FilesCopying and Moving Files Using Organizational Units Using Folder and File OwnersUsing Folder and File Owners Looking at Objects Sharing Drives and FoldersSharing Drives and Folders Using Groups Looking at Special and AdministrativeLooking at Special and Administrative Looking at Web Server Authentication SharesShares Comparing Rights and Permissions Introducing the RegistryIntroducing the Registry Looking at NTFS Using Encryption to Protect DataUsing Encryption to Protect Data Using NTFS Permissions Examining Types of EncryptionExamining Types of Encryption Looking at Effective NTFS Permissions Introducing Public Key Infrastructure

Page 8: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Introducing Public Key Infrastructure Copying and Moving Files Encrypting EmailEncrypting Email Using Folder and File Owners Encrypting Files with EFSEncrypting Files with EFS Sharing Drives and Folders Encrypting Disks in WindowsEncrypting Disks in Windows Looking at Special and Administrative Introducing IPSecIntroducing IPSec Shares Encrypting with VPN TechnologyEncrypting with VPN Technology Introducing the Registry Using Auditing to Complete the SecurityUsing Auditing to Complete the Security Using Encryption to Protect Data PicturePicture Examining Types of Encryption Using Password Complexity to Make aUsing Password Complexity to Make a Introducing Public Key Infrastructure Stronger PasswordStronger Password Encrypting Email Using Account Lockout to Prevent HackingUsing Account Lockout to Prevent Hacking Encrypting Files with EFS Looking at Password LengthLooking at Password Length Encrypting Disks in Windows Using Password History to EnforceUsing Password History to Enforce Security Introducing IPSec SecuritySetting the Time between Password Encrypting with VPN Technology Setting the Time between PasswordChanges Using Auditing to Complete the Security ChangesUsing Password Group Policies to Enforce Picture Using Password Group Policies to EnforceSecurity Using Password Complexity to Make a SecurityUnderstanding Common Attack Methods Stronger Password Understanding Common Attack MethodsExamining Hardware Firewalls and Their Using Account Lockout to Prevent Examining Hardware Firewalls and TheirCharacteristics Hacking CharacteristicsUsing Hardware Firewalls versus Software Looking at Password Length Using Hardware Firewalls versus SoftwareFirewalls Using Password History to Enforce FirewallsUsing Stateful versus Stateless Inspection Security Using Stateful versus Stateless InspectionControlling Access with Network Access Setting the Time between Password Controlling Access with Network AccessProtection (NAP) Changes Protection (NAP)Understanding the Purpose of NAP Using Password Group Policies to Understanding the Purpose of NAPLooking at How NAP Works Enforce Security Looking at How NAP WorksExamining the Requirements for NAP Understanding Common Attack Methods Examining the Requirements for NAPUsing Isolation to Protect the Network Examining Hardware Firewalls and Their Using Isolation to Protect the NetworkUnderstanding Virtual LANs Characteristics Understanding Virtual LANsUnderstanding Routing Using Hardware Firewalls versus Understanding RoutingLooking at Intrusion Detection and Intrusion Software Firewalls Looking at Intrusion Detection andPrevention Systems Using Stateful versus Stateless Intrusion Prevention SystemsLooking at Honeypots Inspection Looking at HoneypotsLooking at DMZs Controlling Access with Network Access Looking at DMZsUnderstanding Network Address Translation Protection (NAP) Understanding Network Address(NAT) Understanding the Purpose of NAP Translation (NAT)Understanding Virtual Private Networks Looking at How NAP Works Understanding Virtual Private Networks(VPNs) Examining the Requirements for NAP (VPNs)Understanding Internet Protocol Security Using Isolation to Protect the Network Understanding Internet Protocol Security(IPsec) Understanding Virtual LANs (IPsec)Using Other VPN Protocols Understanding Routing Using Other VPN ProtocolsLooking at Server and Domain Isolation Looking at Intrusion Detection and Looking at Server and Domain IsolationProtecting Data with Protocol Security Intrusion Prevention Systems Protecting Data with Protocol SecurityUnderstanding Tunneling Looking at Honeypots Understanding TunnelingUsing DNS Security Extensions (DNSSEC) Looking at DMZs Using DNS Security Extensions (DNSSEC)Looking at Protocol Spoofing Understanding Network Address Looking at Protocol SpoofingUtilizing Network Sniffing Translation (NAT) Utilizing Network SniffingUnderstanding Common NETWORK Attack Understanding Virtual Private Networks Understanding Common NETWORKMethods (VPNs) Attack MethodsSecuring Wireless Network Understanding Internet Protocol Security Securing Wireless NetworkUsing Service Set Identifier (SSID) (IPsec) Using Service Set Identifier (SSID)Understanding Keys Using Other VPN Protocols Understanding KeysUtilizing MAC Filters Looking at Server and Domain Isolation Utilizing MAC FiltersConsidering Pros and Cons of Specific Protecting Data with Protocol Security Considering Pros and Cons of SpecificSecurity Types Understanding Tunneling Security TypesProtecting Your Computer from Malware Using DNS Security Extensions Protecting Your Computer from MalwareUtilizing Windows Updates (DNSSEC) Utilizing Windows UpdatesUtilizing User Account Control Looking at Protocol Spoofing Utilizing User Account ControlUsing Windows Firewall Utilizing Network Sniffing Using Windows FirewallUsing Offline Files Understanding Common NETWORK Using Offline FilesLocking Down a Client Computer Attack Methods Locking Down a Client ComputerProtecting Your Email Securing Wireless Network Protecting Your EmailDealing with Spam Using Service Set Identifier (SSID) Dealing with SpamRelaying Email Understanding Keys Relaying EmailSecuring Internet Explorer Utilizing MAC Filters Securing Internet Explorer

Page 9: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Looking at Cookies and Privacy Settings Considering Pros and Cons of Specific Looking at Cookies and Privacy SettingsExamining Content Zones Security Types Examining Content ZonesPhishing and Pharming Protecting Your Computer from Malware Phishing and PharmingProtecting Your Server Utilizing Windows Updates Protecting Your ServerPlacing the Server Utilizing User Account Control Placing the ServerHardening the Server Using Windows Firewall Hardening the ServerUsing Secure Dynamic DNS Using Offline Files Using Secure Dynamic DNS

Locking Down a Client ComputerProtecting Your Email

line Dealing with Spam lineUnderstanding Confidentiality Relaying Email Understanding ConfidentialityUnderstanding Integrity Securing Internet Explorer Understanding IntegrityUnderstanding Availability Looking at Cookies and Privacy Settings Understanding AvailabilityDefining Threats and Risk Management Examining Content Zones Defining Threats and Risk ManagementUnderstanding the Principle of Least Phishing and Pharming Understanding the Principle of LeastPrivilege Protecting Your Server PrivilegeUnderstanding Attack Surface Placing the Server Understanding Attack SurfaceUnderstanding Social Engineering Hardening the Server Understanding Social EngineeringLinking Cost with Security Using Secure Dynamic DNS Linking Cost with SecurityLooking at Physical Security as the First Looking at Physical Security as the FirstLine of Defense Line of DefenseUnderstanding Site Security line Understanding Site SecurityUnderstanding Computer Security Understanding Confidentiality Understanding Computer SecurityAuthenticating with What You Know Understanding Integrity Authenticating with What You KnowAuthenticating with What You Own or Understanding Availability Authenticating with What You Own orPossess Defining Threats and Risk Management PossessAuthenticating with What You Are Understanding the Principle of Least Authenticating with What You AreIntroducing RADIUS and TACACS1 Privilege Introducing RADIUS and TACACS1Using Run As Understanding Attack Surface Using Run AsIntroducing Directory Services with Active Understanding Social Engineering Introducing Directory Services with ActiveDirectory Linking Cost with Security DirectoryLooking at Domain Controllers Looking at Physical Security as the First Looking at Domain ControllersIntroducing NTLM Line of Defense Introducing NTLMIntroducing Kerberos Understanding Site Security Introducing KerberosUsing Organizational Units Understanding Computer Security Using Organizational UnitsLooking at Objects Authenticating with What You Know Looking at ObjectsUsing Groups Authenticating with What You Own or Using GroupsLooking at Web Server Authentication Possess Looking at Web Server AuthenticationComparing Rights and Permissions Authenticating with What You Are Comparing Rights and PermissionsLooking at NTFS Introducing RADIUS and TACACS1 Looking at NTFSUsing NTFS Permissions Using Run As Using NTFS PermissionsLooking at Effective NTFS Permissions Introducing Directory Services with Active Looking at Effective NTFS PermissionsCopying and Moving Files Directory Copying and Moving FilesUsing Folder and File Owners Looking at Domain Controllers Using Folder and File OwnersSharing Drives and Folders Introducing NTLM Sharing Drives and FoldersLooking at Special and Administrative Introducing Kerberos Looking at Special and AdministrativeShares Using Organizational Units SharesIntroducing the Registry Looking at Objects Introducing the RegistryUsing Encryption to Protect Data Using Groups Using Encryption to Protect DataExamining Types of Encryption Looking at Web Server Authentication Examining Types of EncryptionIntroducing Public Key Infrastructure Comparing Rights and Permissions Introducing Public Key InfrastructureEncrypting Email Looking at NTFS Encrypting EmailEncrypting Files with EFS Using NTFS Permissions Encrypting Files with EFSEncrypting Disks in Windows Looking at Effective NTFS Permissions Encrypting Disks in WindowsIntroducing IPSec Copying and Moving Files Introducing IPSecEncrypting with VPN Technology Using Folder and File Owners Encrypting with VPN TechnologyUsing Auditing to Complete the Security Sharing Drives and Folders Using Auditing to Complete the SecurityPicture Looking at Special and Administrative PictureUsing Password Complexity to Make a Shares Using Password Complexity to Make aStronger Password Introducing the Registry Stronger PasswordUsing Account Lockout to Prevent Hacking Using Encryption to Protect Data Using Account Lockout to Prevent HackingLooking at Password Length Examining Types of Encryption Looking at Password LengthUsing Password History to Enforce Security Introducing Public Key Infrastructure Using Password History to EnforceSetting the Time between Password Encrypting Email SecurityChanges Encrypting Files with EFS Setting the Time between PasswordUsing Password Group Policies to Enforce Encrypting Disks in Windows Changes

Page 10: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Security Introducing IPSec Using Password Group Policies to EnforceUnderstanding Common Attack Methods Encrypting with VPN Technology SecurityExamining Hardware Firewalls and Their Using Auditing to Complete the Security Understanding Common Attack MethodsCharacteristics Picture Examining Hardware Firewalls and TheirUsing Hardware Firewalls versus Software Using Password Complexity to Make a CharacteristicsFirewalls Stronger Password Using Hardware Firewalls versus SoftwareUsing Stateful versus Stateless Inspection Using Account Lockout to Prevent FirewallsControlling Access with Network Access Hacking Using Stateful versus Stateless InspectionProtection (NAP) Looking at Password Length Controlling Access with Network AccessUnderstanding the Purpose of NAP Using Password History to Enforce Protection (NAP)Looking at How NAP Works Security Understanding the Purpose of NAPExamining the Requirements for NAP Setting the Time between Password Looking at How NAP WorksUsing Isolation to Protect the Network Changes Examining the Requirements for NAPUnderstanding Virtual LANs Using Password Group Policies to Using Isolation to Protect the NetworkUnderstanding Routing Enforce Security Understanding Virtual LANsLooking at Intrusion Detection and Intrusion Understanding Common Attack Methods Understanding RoutingPrevention Systems Examining Hardware Firewalls and Their Looking at Intrusion Detection andLooking at Honeypots Characteristics Intrusion Prevention SystemsLooking at DMZs Using Hardware Firewalls versus Looking at HoneypotsUnderstanding Network Address Translation Software Firewalls Looking at DMZs(NAT) Using Stateful versus Stateless Understanding Network AddressUnderstanding Virtual Private Networks Inspection Translation (NAT)(VPNs) Controlling Access with Network Access Understanding Virtual Private NetworksUnderstanding Internet Protocol Security Protection (NAP) (VPNs)(IPsec) Understanding the Purpose of NAP Understanding Internet Protocol SecurityUsing Other VPN Protocols Looking at How NAP Works (IPsec)Looking at Server and Domain Isolation Examining the Requirements for NAP Using Other VPN ProtocolsProtecting Data with Protocol Security Using Isolation to Protect the Network Looking at Server and Domain IsolationUnderstanding Tunneling Understanding Virtual LANs Protecting Data with Protocol SecurityUsing DNS Security Extensions (DNSSEC) Understanding Routing Understanding TunnelingLooking at Protocol Spoofing Looking at Intrusion Detection and Using DNS Security Extensions (DNSSEC)Utilizing Network Sniffing Intrusion Prevention Systems Looking at Protocol SpoofingUnderstanding Common NETWORK Attack Looking at Honeypots Utilizing Network SniffingMethods Looking at DMZs Understanding Common NETWORKSecuring Wireless Network Understanding Network Address Attack MethodsUsing Service Set Identifier (SSID) Translation (NAT) Securing Wireless NetworkUnderstanding Keys Understanding Virtual Private Networks Using Service Set Identifier (SSID)Utilizing MAC Filters (VPNs) Understanding KeysConsidering Pros and Cons of Specific Understanding Internet Protocol Security Utilizing MAC FiltersSecurity Types (IPsec) Considering Pros and Cons of SpecificProtecting Your Computer from Malware Using Other VPN Protocols Security TypesUtilizing Windows Updates Looking at Server and Domain Isolation Protecting Your Computer from MalwareUtilizing User Account Control Protecting Data with Protocol Security Utilizing Windows UpdatesUsing Windows Firewall Understanding Tunneling Utilizing User Account ControlUsing Offline Files Using DNS Security Extensions Using Windows FirewallLocking Down a Client Computer (DNSSEC) Using Offline FilesProtecting Your Email Looking at Protocol Spoofing Locking Down a Client ComputerDealing with Spam Utilizing Network Sniffing Protecting Your EmailRelaying Email Understanding Common NETWORK Dealing with SpamSecuring Internet Explorer Attack Methods Relaying EmailLooking at Cookies and Privacy Settings Securing Wireless Network Securing Internet ExplorerExamining Content Zones Using Service Set Identifier (SSID) Looking at Cookies and Privacy SettingsPhishing and Pharming Understanding Keys Examining Content ZonesProtecting Your Server Utilizing MAC Filters Phishing and PharmingPlacing the Server Considering Pros and Cons of Specific Protecting Your ServerHardening the Server Security Types Placing the ServerUsing Secure Dynamic DNS Protecting Your Computer from Malware Hardening the Server

Utilizing Windows Updates Using Secure Dynamic DNSUtilizing User Account Control

line Using Windows FirewallUnderstanding Confidentiality Using Offline Files lineUnderstanding Integrity Locking Down a Client Computer Understanding ConfidentialityUnderstanding Availability Protecting Your Email Understanding IntegrityDefining Threats and Risk Management Dealing with Spam Understanding AvailabilityUnderstanding the Principle of Least Relaying Email Defining Threats and Risk ManagementPrivilege Securing Internet Explorer Understanding the Principle of Least

Page 11: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Understanding Attack Surface Looking at Cookies and Privacy Settings PrivilegeUnderstanding Social Engineering Examining Content Zones Understanding Attack SurfaceLinking Cost with Security Phishing and Pharming Understanding Social EngineeringLooking at Physical Security as the First Protecting Your Server Linking Cost with SecurityLine of Defense Placing the Server Looking at Physical Security as the FirstUnderstanding Site Security Hardening the Server Line of DefenseUnderstanding Computer Security Using Secure Dynamic DNS Understanding Site SecurityAuthenticating with What You Know Understanding Computer SecurityAuthenticating with What You Own or Authenticating with What You KnowPossess line Authenticating with What You Own orAuthenticating with What You Are Understanding Confidentiality PossessIntroducing RADIUS and TACACS1 Understanding Integrity Authenticating with What You AreUsing Run As Understanding Availability Introducing RADIUS and TACACS1Introducing Directory Services with Active Defining Threats and Risk Management Using Run AsDirectory Understanding the Principle of Least Introducing Directory Services with ActiveLooking at Domain Controllers Privilege DirectoryIntroducing NTLM Understanding Attack Surface Looking at Domain ControllersIntroducing Kerberos Understanding Social Engineering Introducing NTLMUsing Organizational Units Linking Cost with Security Introducing KerberosLooking at Objects Looking at Physical Security as the First Using Organizational UnitsUsing Groups Line of Defense Looking at ObjectsLooking at Web Server Authentication Understanding Site Security Using GroupsComparing Rights and Permissions Understanding Computer Security Looking at Web Server AuthenticationLooking at NTFS Authenticating with What You Know Comparing Rights and PermissionsUsing NTFS Permissions Authenticating with What You Own or Looking at NTFSLooking at Effective NTFS Permissions Possess Using NTFS PermissionsCopying and Moving Files Authenticating with What You Are Looking at Effective NTFS PermissionsUsing Folder and File Owners Introducing RADIUS and TACACS1 Copying and Moving FilesSharing Drives and Folders Using Run As Using Folder and File OwnersLooking at Special and Administrative Introducing Directory Services with Active Sharing Drives and FoldersShares Directory Looking at Special and AdministrativeIntroducing the Registry Looking at Domain Controllers SharesUsing Encryption to Protect Data Introducing NTLM Introducing the RegistryExamining Types of Encryption Introducing Kerberos Using Encryption to Protect DataIntroducing Public Key Infrastructure Using Organizational Units Examining Types of EncryptionEncrypting Email Looking at Objects Introducing Public Key InfrastructureEncrypting Files with EFS Using Groups Encrypting EmailEncrypting Disks in Windows Looking at Web Server Authentication Encrypting Files with EFSIntroducing IPSec Comparing Rights and Permissions Encrypting Disks in WindowsEncrypting with VPN Technology Looking at NTFS Introducing IPSecUsing Auditing to Complete the Security Using NTFS Permissions Encrypting with VPN TechnologyPicture Looking at Effective NTFS Permissions Using Auditing to Complete the SecurityUsing Password Complexity to Make a Copying and Moving Files PictureStronger Password Using Folder and File Owners Using Password Complexity to Make aUsing Account Lockout to Prevent Hacking Sharing Drives and Folders Stronger PasswordLooking at Password Length Looking at Special and Administrative Using Account Lockout to Prevent HackingUsing Password History to Enforce Security Shares Looking at Password LengthSetting the Time between Password Introducing the Registry Using Password History to EnforceChanges Using Encryption to Protect Data SecurityUsing Password Group Policies to Enforce Examining Types of Encryption Setting the Time between PasswordSecurity Introducing Public Key Infrastructure ChangesUnderstanding Common Attack Methods Encrypting Email Using Password Group Policies to EnforceExamining Hardware Firewalls and Their Encrypting Files with EFS SecurityCharacteristics Encrypting Disks in Windows Understanding Common Attack MethodsUsing Hardware Firewalls versus Software Introducing IPSec Examining Hardware Firewalls and TheirFirewalls Encrypting with VPN Technology CharacteristicsUsing Stateful versus Stateless Inspection Using Auditing to Complete the Security Using Hardware Firewalls versus SoftwareControlling Access with Network Access Picture FirewallsProtection (NAP) Using Password Complexity to Make a Using Stateful versus Stateless InspectionUnderstanding the Purpose of NAP Stronger Password Controlling Access with Network AccessLooking at How NAP Works Using Account Lockout to Prevent Protection (NAP)Examining the Requirements for NAP Hacking Understanding the Purpose of NAPUsing Isolation to Protect the Network Looking at Password Length Looking at How NAP WorksUnderstanding Virtual LANs Using Password History to Enforce Examining the Requirements for NAPUnderstanding Routing Security Using Isolation to Protect the NetworkLooking at Intrusion Detection and Intrusion Setting the Time between Password Understanding Virtual LANs

Page 12: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Prevention Systems Changes Understanding RoutingLooking at Honeypots Using Password Group Policies to Looking at Intrusion Detection andLooking at DMZs Enforce Security Intrusion Prevention SystemsUnderstanding Network Address Translation Understanding Common Attack Methods Looking at Honeypots(NAT) Examining Hardware Firewalls and Their Looking at DMZsUnderstanding Virtual Private Networks Characteristics Understanding Network Address(VPNs) Using Hardware Firewalls versus Translation (NAT)Understanding Internet Protocol Security Software Firewalls Understanding Virtual Private Networks(IPsec) Using Stateful versus Stateless (VPNs)Using Other VPN Protocols Inspection Understanding Internet Protocol SecurityLooking at Server and Domain Isolation Controlling Access with Network Access (IPsec)Protecting Data with Protocol Security Protection (NAP) Using Other VPN ProtocolsUnderstanding Tunneling Understanding the Purpose of NAP Looking at Server and Domain IsolationUsing DNS Security Extensions (DNSSEC) Looking at How NAP Works Protecting Data with Protocol SecurityLooking at Protocol Spoofing Examining the Requirements for NAP Understanding TunnelingUtilizing Network Sniffing Using Isolation to Protect the Network Using DNS Security Extensions (DNSSEC)Understanding Common NETWORK Attack Understanding Virtual LANs Looking at Protocol SpoofingMethods Understanding Routing Utilizing Network SniffingSecuring Wireless Network Looking at Intrusion Detection and Understanding Common NETWORKUsing Service Set Identifier (SSID) Intrusion Prevention Systems Attack MethodsUnderstanding Keys Looking at Honeypots Securing Wireless NetworkUtilizing MAC Filters Looking at DMZs Using Service Set Identifier (SSID)Considering Pros and Cons of Specific Understanding Network Address Understanding KeysSecurity Types Translation (NAT) Utilizing MAC FiltersProtecting Your Computer from Malware Understanding Virtual Private Networks Considering Pros and Cons of SpecificUtilizing Windows Updates (VPNs) Security TypesUtilizing User Account Control Understanding Internet Protocol Security Protecting Your Computer from MalwareUsing Windows Firewall (IPsec) Utilizing Windows UpdatesUsing Offline Files Using Other VPN Protocols Utilizing User Account ControlLocking Down a Client Computer Looking at Server and Domain Isolation Using Windows FirewallProtecting Your Email Protecting Data with Protocol Security Using Offline FilesDealing with Spam Understanding Tunneling Locking Down a Client ComputerRelaying Email Using DNS Security Extensions Protecting Your EmailSecuring Internet Explorer (DNSSEC) Dealing with SpamLooking at Cookies and Privacy Settings Looking at Protocol Spoofing Relaying EmailExamining Content Zones Utilizing Network Sniffing Securing Internet ExplorerPhishing and Pharming Understanding Common NETWORK Looking at Cookies and Privacy SettingsProtecting Your Server Attack Methods Examining Content ZonesPlacing the Server Securing Wireless Network Phishing and PharmingHardening the Server Using Service Set Identifier (SSID) Protecting Your ServerUsing Secure Dynamic DNS Understanding Keys Placing the Server

Utilizing MAC Filters Hardening the ServerConsidering Pros and Cons of Specific Using Secure Dynamic DNS

line Security TypesUnderstanding Confidentiality Protecting Your Computer from MalwareUnderstanding Integrity Utilizing Windows Updates lineUnderstanding Availability Utilizing User Account Control Understanding ConfidentialityDefining Threats and Risk Management Using Windows Firewall Understanding IntegrityUnderstanding the Principle of Least Using Offline Files Understanding AvailabilityPrivilege Locking Down a Client Computer Defining Threats and Risk ManagementUnderstanding Attack Surface Protecting Your Email Understanding the Principle of LeastUnderstanding Social Engineering Dealing with Spam PrivilegeLinking Cost with Security Relaying Email Understanding Attack SurfaceLooking at Physical Security as the First Securing Internet Explorer Understanding Social EngineeringLine of Defense Looking at Cookies and Privacy Settings Linking Cost with SecurityUnderstanding Site Security Examining Content Zones Looking at Physical Security as the FirstUnderstanding Computer Security Phishing and Pharming Line of DefenseAuthenticating with What You Know Protecting Your Server Understanding Site SecurityAuthenticating with What You Own or Placing the Server Understanding Computer SecurityPossess Hardening the Server Authenticating with What You KnowAuthenticating with What You Are Using Secure Dynamic DNS Authenticating with What You Own orIntroducing RADIUS and TACACS1 PossessUsing Run As Authenticating with What You AreIntroducing Directory Services with Active line Introducing RADIUS and TACACS1Directory Understanding Confidentiality Using Run AsLooking at Domain Controllers Understanding Integrity Introducing Directory Services with Active

Page 13: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Introducing NTLM Understanding Availability DirectoryIntroducing Kerberos Defining Threats and Risk Management Looking at Domain ControllersUsing Organizational Units Understanding the Principle of Least Introducing NTLMLooking at Objects Privilege Introducing KerberosUsing Groups Understanding Attack Surface Using Organizational UnitsLooking at Web Server Authentication Understanding Social Engineering Looking at ObjectsComparing Rights and Permissions Linking Cost with Security Using GroupsLooking at NTFS Looking at Physical Security as the First Looking at Web Server AuthenticationUsing NTFS Permissions Line of Defense Comparing Rights and PermissionsLooking at Effective NTFS Permissions Understanding Site Security Looking at NTFSCopying and Moving Files Understanding Computer Security Using NTFS PermissionsUsing Folder and File Owners Authenticating with What You Know Looking at Effective NTFS PermissionsSharing Drives and Folders Authenticating with What You Own or Copying and Moving FilesLooking at Special and Administrative Possess Using Folder and File OwnersShares Authenticating with What You Are Sharing Drives and FoldersIntroducing the Registry Introducing RADIUS and TACACS1 Looking at Special and AdministrativeUsing Encryption to Protect Data Using Run As SharesExamining Types of Encryption Introducing Directory Services with Active Introducing the RegistryIntroducing Public Key Infrastructure Directory Using Encryption to Protect DataEncrypting Email Looking at Domain Controllers Examining Types of EncryptionEncrypting Files with EFS Introducing NTLM Introducing Public Key InfrastructureEncrypting Disks in Windows Introducing Kerberos Encrypting EmailIntroducing IPSec Using Organizational Units Encrypting Files with EFSEncrypting with VPN Technology Looking at Objects Encrypting Disks in WindowsUsing Auditing to Complete the Security Using Groups Introducing IPSecPicture Looking at Web Server Authentication Encrypting with VPN TechnologyUsing Password Complexity to Make a Comparing Rights and Permissions Using Auditing to Complete the SecurityStronger Password Looking at NTFS PictureUsing Account Lockout to Prevent Hacking Using NTFS Permissions Using Password Complexity to Make aLooking at Password Length Looking at Effective NTFS Permissions Stronger PasswordUsing Password History to Enforce Security Copying and Moving Files Using Account Lockout to Prevent HackingSetting the Time between Password Using Folder and File Owners Looking at Password LengthChanges Sharing Drives and Folders Using Password History to EnforceUsing Password Group Policies to Enforce Looking at Special and Administrative SecuritySecurity Shares Setting the Time between PasswordUnderstanding Common Attack Methods Introducing the Registry ChangesExamining Hardware Firewalls and Their Using Encryption to Protect Data Using Password Group Policies to EnforceCharacteristics Examining Types of Encryption SecurityUsing Hardware Firewalls versus Software Introducing Public Key Infrastructure Understanding Common Attack MethodsFirewalls Encrypting Email Examining Hardware Firewalls and TheirUsing Stateful versus Stateless Inspection Encrypting Files with EFS CharacteristicsControlling Access with Network Access Encrypting Disks in Windows Using Hardware Firewalls versus SoftwareProtection (NAP) Introducing IPSec FirewallsUnderstanding the Purpose of NAP Encrypting with VPN Technology Using Stateful versus Stateless InspectionLooking at How NAP Works Using Auditing to Complete the Security Controlling Access with Network AccessExamining the Requirements for NAP Picture Protection (NAP)Using Isolation to Protect the Network Using Password Complexity to Make a Understanding the Purpose of NAPUnderstanding Virtual LANs Stronger Password Looking at How NAP WorksUnderstanding Routing Using Account Lockout to Prevent Examining the Requirements for NAPLooking at Intrusion Detection and Intrusion Hacking Using Isolation to Protect the NetworkPrevention Systems Looking at Password Length Understanding Virtual LANsLooking at Honeypots Using Password History to Enforce Understanding RoutingLooking at DMZs Security Looking at Intrusion Detection andUnderstanding Network Address Translation Setting the Time between Password Intrusion Prevention Systems(NAT) Changes Looking at HoneypotsUnderstanding Virtual Private Networks Using Password Group Policies to Looking at DMZs(VPNs) Enforce Security Understanding Network AddressUnderstanding Internet Protocol Security Understanding Common Attack Methods Translation (NAT)(IPsec) Examining Hardware Firewalls and Their Understanding Virtual Private NetworksUsing Other VPN Protocols Characteristics (VPNs)Looking at Server and Domain Isolation Using Hardware Firewalls versus Understanding Internet Protocol SecurityProtecting Data with Protocol Security Software Firewalls (IPsec)Understanding Tunneling Using Stateful versus Stateless Using Other VPN ProtocolsUsing DNS Security Extensions (DNSSEC) Inspection Looking at Server and Domain IsolationLooking at Protocol Spoofing Controlling Access with Network Access Protecting Data with Protocol SecurityUtilizing Network Sniffing Protection (NAP) Understanding Tunneling

Page 14: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Understanding Common NETWORK Attack Understanding the Purpose of NAP Using DNS Security Extensions (DNSSEC)Methods Looking at How NAP Works Looking at Protocol SpoofingSecuring Wireless Network Examining the Requirements for NAP Utilizing Network SniffingUsing Service Set Identifier (SSID) Using Isolation to Protect the Network Understanding Common NETWORKUnderstanding Keys Understanding Virtual LANs Attack MethodsUtilizing MAC Filters Understanding Routing Securing Wireless NetworkConsidering Pros and Cons of Specific Looking at Intrusion Detection and Using Service Set Identifier (SSID)Security Types Intrusion Prevention Systems Understanding KeysProtecting Your Computer from Malware Looking at Honeypots Utilizing MAC FiltersUtilizing Windows Updates Looking at DMZs Considering Pros and Cons of SpecificUtilizing User Account Control Understanding Network Address Security TypesUsing Windows Firewall Translation (NAT) Protecting Your Computer from MalwareUsing Offline Files Understanding Virtual Private Networks Utilizing Windows UpdatesLocking Down a Client Computer (VPNs) Utilizing User Account ControlProtecting Your Email Understanding Internet Protocol Security Using Windows FirewallDealing with Spam (IPsec) Using Offline FilesRelaying Email Using Other VPN Protocols Locking Down a Client ComputerSecuring Internet Explorer Looking at Server and Domain Isolation Protecting Your EmailLooking at Cookies and Privacy Settings Protecting Data with Protocol Security Dealing with SpamExamining Content Zones Understanding Tunneling Relaying EmailPhishing and Pharming Using DNS Security Extensions Securing Internet ExplorerProtecting Your Server (DNSSEC) Looking at Cookies and Privacy SettingsPlacing the Server Looking at Protocol Spoofing Examining Content ZonesHardening the Server Utilizing Network Sniffing Phishing and PharmingUsing Secure Dynamic DNS Understanding Common NETWORK Protecting Your Server

Attack Methods Placing the ServerSecuring Wireless Network Hardening the Server

line Using Service Set Identifier (SSID) Using Secure Dynamic DNSUnderstanding Confidentiality Understanding KeysUnderstanding Integrity Utilizing MAC FiltersUnderstanding Availability Considering Pros and Cons of Specific lineDefining Threats and Risk Management Security Types Understanding ConfidentialityUnderstanding the Principle of Least Protecting Your Computer from Malware Understanding IntegrityPrivilege Utilizing Windows Updates Understanding AvailabilityUnderstanding Attack Surface Utilizing User Account Control Defining Threats and Risk ManagementUnderstanding Social Engineering Using Windows Firewall Understanding the Principle of LeastLinking Cost with Security Using Offline Files PrivilegeLooking at Physical Security as the First Locking Down a Client Computer Understanding Attack SurfaceLine of Defense Protecting Your Email Understanding Social EngineeringUnderstanding Site Security Dealing with Spam Linking Cost with SecurityUnderstanding Computer Security Relaying Email Looking at Physical Security as the FirstAuthenticating with What You Know Securing Internet Explorer Line of DefenseAuthenticating with What You Own or Looking at Cookies and Privacy Settings Understanding Site SecurityPossess Examining Content Zones Understanding Computer SecurityAuthenticating with What You Are Phishing and Pharming Authenticating with What You KnowIntroducing RADIUS and TACACS1 Protecting Your Server Authenticating with What You Own orUsing Run As Placing the Server PossessIntroducing Directory Services with Active Hardening the Server Authenticating with What You AreDirectory Using Secure Dynamic DNS Introducing RADIUS and TACACS1Looking at Domain Controllers Using Run AsIntroducing NTLM Introducing Directory Services with ActiveIntroducing Kerberos line DirectoryUsing Organizational Units Understanding Confidentiality Looking at Domain ControllersLooking at Objects Understanding Integrity Introducing NTLMUsing Groups Understanding Availability Introducing KerberosLooking at Web Server Authentication Defining Threats and Risk Management Using Organizational UnitsComparing Rights and Permissions Understanding the Principle of Least Looking at ObjectsLooking at NTFS Privilege Using GroupsUsing NTFS Permissions Understanding Attack Surface Looking at Web Server AuthenticationLooking at Effective NTFS Permissions Understanding Social Engineering Comparing Rights and PermissionsCopying and Moving Files Linking Cost with Security Looking at NTFSUsing Folder and File Owners Looking at Physical Security as the First Using NTFS PermissionsSharing Drives and Folders Line of Defense Looking at Effective NTFS PermissionsLooking at Special and Administrative Understanding Site Security Copying and Moving FilesShares Understanding Computer Security Using Folder and File OwnersIntroducing the Registry Authenticating with What You Know Sharing Drives and Folders

Page 15: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Using Encryption to Protect Data Authenticating with What You Own or Looking at Special and AdministrativeExamining Types of Encryption Possess SharesIntroducing Public Key Infrastructure Authenticating with What You Are Introducing the RegistryEncrypting Email Introducing RADIUS and TACACS1 Using Encryption to Protect DataEncrypting Files with EFS Using Run As Examining Types of EncryptionEncrypting Disks in Windows Introducing Directory Services with Active Introducing Public Key InfrastructureIntroducing IPSec Directory Encrypting EmailEncrypting with VPN Technology Looking at Domain Controllers Encrypting Files with EFSUsing Auditing to Complete the Security Introducing NTLM Encrypting Disks in WindowsPicture Introducing Kerberos Introducing IPSecUsing Password Complexity to Make a Using Organizational Units Encrypting with VPN TechnologyStronger Password Looking at Objects Using Auditing to Complete the SecurityUsing Account Lockout to Prevent Hacking Using Groups PictureLooking at Password Length Looking at Web Server Authentication Using Password Complexity to Make aUsing Password History to Enforce Security Comparing Rights and Permissions Stronger PasswordSetting the Time between Password Looking at NTFS Using Account Lockout to Prevent HackingChanges Using NTFS Permissions Looking at Password LengthUsing Password Group Policies to Enforce Looking at Effective NTFS Permissions Using Password History to EnforceSecurity Copying and Moving Files SecurityUnderstanding Common Attack Methods Using Folder and File Owners Setting the Time between PasswordExamining Hardware Firewalls and Their Sharing Drives and Folders ChangesCharacteristics Looking at Special and Administrative Using Password Group Policies to EnforceUsing Hardware Firewalls versus Software Shares SecurityFirewalls Introducing the Registry Understanding Common Attack MethodsUsing Stateful versus Stateless Inspection Using Encryption to Protect Data Examining Hardware Firewalls and TheirControlling Access with Network Access Examining Types of Encryption CharacteristicsProtection (NAP) Introducing Public Key Infrastructure Using Hardware Firewalls versus SoftwareUnderstanding the Purpose of NAP Encrypting Email FirewallsLooking at How NAP Works Encrypting Files with EFS Using Stateful versus Stateless InspectionExamining the Requirements for NAP Encrypting Disks in Windows Controlling Access with Network AccessUsing Isolation to Protect the Network Introducing IPSec Protection (NAP)Understanding Virtual LANs Encrypting with VPN Technology Understanding the Purpose of NAPUnderstanding Routing Using Auditing to Complete the Security Looking at How NAP WorksLooking at Intrusion Detection and Intrusion Picture Examining the Requirements for NAPPrevention Systems Using Password Complexity to Make a Using Isolation to Protect the NetworkLooking at Honeypots Stronger Password Understanding Virtual LANsLooking at DMZs Using Account Lockout to Prevent Understanding RoutingUnderstanding Network Address Translation Hacking Looking at Intrusion Detection and(NAT) Looking at Password Length Intrusion Prevention SystemsUnderstanding Virtual Private Networks Using Password History to Enforce Looking at Honeypots(VPNs) Security Looking at DMZsUnderstanding Internet Protocol Security Setting the Time between Password Understanding Network Address(IPsec) Changes Translation (NAT)Using Other VPN Protocols Using Password Group Policies to Understanding Virtual Private NetworksLooking at Server and Domain Isolation Enforce Security (VPNs)Protecting Data with Protocol Security Understanding Common Attack Methods Understanding Internet Protocol SecurityUnderstanding Tunneling Examining Hardware Firewalls and Their (IPsec)Using DNS Security Extensions (DNSSEC) Characteristics Using Other VPN ProtocolsLooking at Protocol Spoofing Using Hardware Firewalls versus Looking at Server and Domain IsolationUtilizing Network Sniffing Software Firewalls Protecting Data with Protocol SecurityUnderstanding Common NETWORK Attack Using Stateful versus Stateless Understanding TunnelingMethods Inspection Using DNS Security Extensions (DNSSEC)Securing Wireless Network Controlling Access with Network Access Looking at Protocol SpoofingUsing Service Set Identifier (SSID) Protection (NAP) Utilizing Network SniffingUnderstanding Keys Understanding the Purpose of NAP Understanding Common NETWORKUtilizing MAC Filters Looking at How NAP Works Attack MethodsConsidering Pros and Cons of Specific Examining the Requirements for NAP Securing Wireless NetworkSecurity Types Using Isolation to Protect the Network Using Service Set Identifier (SSID)Protecting Your Computer from Malware Understanding Virtual LANs Understanding KeysUtilizing Windows Updates Understanding Routing Utilizing MAC FiltersUtilizing User Account Control Looking at Intrusion Detection and Considering Pros and Cons of SpecificUsing Windows Firewall Intrusion Prevention Systems Security TypesUsing Offline Files Looking at Honeypots Protecting Your Computer from MalwareLocking Down a Client Computer Looking at DMZs Utilizing Windows UpdatesProtecting Your Email Understanding Network Address Utilizing User Account ControlDealing with Spam Translation (NAT) Using Windows Firewall

Page 16: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Relaying Email Understanding Virtual Private Networks Using Offline FilesSecuring Internet Explorer (VPNs) Locking Down a Client ComputerLooking at Cookies and Privacy Settings Understanding Internet Protocol Security Protecting Your EmailExamining Content Zones (IPsec) Dealing with SpamPhishing and Pharming Using Other VPN Protocols Relaying EmailProtecting Your Server Looking at Server and Domain Isolation Securing Internet ExplorerPlacing the Server Protecting Data with Protocol Security Looking at Cookies and Privacy SettingsHardening the Server Understanding Tunneling Examining Content ZonesUsing Secure Dynamic DNS Using DNS Security Extensions Phishing and Pharming

(DNSSEC) Protecting Your ServerLooking at Protocol Spoofing Placing the Server

line Utilizing Network Sniffing Hardening the ServerUnderstanding Confidentiality Understanding Common NETWORK Using Secure Dynamic DNSUnderstanding Integrity Attack MethodsUnderstanding Availability Securing Wireless NetworkDefining Threats and Risk Management Using Service Set Identifier (SSID) lineUnderstanding the Principle of Least Understanding Keys Understanding ConfidentialityPrivilege Utilizing MAC Filters Understanding IntegrityUnderstanding Attack Surface Considering Pros and Cons of Specific Understanding AvailabilityUnderstanding Social Engineering Security Types Defining Threats and Risk ManagementLinking Cost with Security Protecting Your Computer from Malware Understanding the Principle of LeastLooking at Physical Security as the First Utilizing Windows Updates PrivilegeLine of Defense Utilizing User Account Control Understanding Attack SurfaceUnderstanding Site Security Using Windows Firewall Understanding Social EngineeringUnderstanding Computer Security Using Offline Files Linking Cost with SecurityAuthenticating with What You Know Locking Down a Client Computer Looking at Physical Security as the FirstAuthenticating with What You Own or Protecting Your Email Line of DefensePossess Dealing with Spam Understanding Site SecurityAuthenticating with What You Are Relaying Email Understanding Computer SecurityIntroducing RADIUS and TACACS1 Securing Internet Explorer Authenticating with What You KnowUsing Run As Looking at Cookies and Privacy Settings Authenticating with What You Own orIntroducing Directory Services with Active Examining Content Zones PossessDirectory Phishing and Pharming Authenticating with What You AreLooking at Domain Controllers Protecting Your Server Introducing RADIUS and TACACS1Introducing NTLM Placing the Server Using Run AsIntroducing Kerberos Hardening the Server Introducing Directory Services with ActiveUsing Organizational Units Using Secure Dynamic DNS DirectoryLooking at Objects Looking at Domain ControllersUsing Groups Introducing NTLMLooking at Web Server Authentication line Introducing KerberosComparing Rights and Permissions Understanding Confidentiality Using Organizational UnitsLooking at NTFS Understanding Integrity Looking at ObjectsUsing NTFS Permissions Understanding Availability Using GroupsLooking at Effective NTFS Permissions Defining Threats and Risk Management Looking at Web Server AuthenticationCopying and Moving Files Understanding the Principle of Least Comparing Rights and PermissionsUsing Folder and File Owners Privilege Looking at NTFSSharing Drives and Folders Understanding Attack Surface Using NTFS PermissionsLooking at Special and Administrative Understanding Social Engineering Looking at Effective NTFS PermissionsShares Linking Cost with Security Copying and Moving FilesIntroducing the Registry Looking at Physical Security as the First Using Folder and File OwnersUsing Encryption to Protect Data Line of Defense Sharing Drives and FoldersExamining Types of Encryption Understanding Site Security Looking at Special and AdministrativeIntroducing Public Key Infrastructure Understanding Computer Security SharesEncrypting Email Authenticating with What You Know Introducing the RegistryEncrypting Files with EFS Authenticating with What You Own or Using Encryption to Protect DataEncrypting Disks in Windows Possess Examining Types of EncryptionIntroducing IPSec Authenticating with What You Are Introducing Public Key InfrastructureEncrypting with VPN Technology Introducing RADIUS and TACACS1 Encrypting EmailUsing Auditing to Complete the Security Using Run As Encrypting Files with EFSPicture Introducing Directory Services with Active Encrypting Disks in WindowsUsing Password Complexity to Make a Directory Introducing IPSecStronger Password Looking at Domain Controllers Encrypting with VPN TechnologyUsing Account Lockout to Prevent Hacking Introducing NTLM Using Auditing to Complete the SecurityLooking at Password Length Introducing Kerberos PictureUsing Password History to Enforce Security Using Organizational Units Using Password Complexity to Make aSetting the Time between Password Looking at Objects Stronger Password

Page 17: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Changes Using Groups Using Account Lockout to Prevent HackingUsing Password Group Policies to Enforce Looking at Web Server Authentication Looking at Password LengthSecurity Comparing Rights and Permissions Using Password History to EnforceUnderstanding Common Attack Methods Looking at NTFS SecurityExamining Hardware Firewalls and Their Using NTFS Permissions Setting the Time between PasswordCharacteristics Looking at Effective NTFS Permissions ChangesUsing Hardware Firewalls versus Software Copying and Moving Files Using Password Group Policies to EnforceFirewalls Using Folder and File Owners SecurityUsing Stateful versus Stateless Inspection Sharing Drives and Folders Understanding Common Attack MethodsControlling Access with Network Access Looking at Special and Administrative Examining Hardware Firewalls and TheirProtection (NAP) Shares CharacteristicsUnderstanding the Purpose of NAP Introducing the Registry Using Hardware Firewalls versus SoftwareLooking at How NAP Works Using Encryption to Protect Data FirewallsExamining the Requirements for NAP Examining Types of Encryption Using Stateful versus Stateless InspectionUsing Isolation to Protect the Network Introducing Public Key Infrastructure Controlling Access with Network AccessUnderstanding Virtual LANs Encrypting Email Protection (NAP)Understanding Routing Encrypting Files with EFS Understanding the Purpose of NAPLooking at Intrusion Detection and Intrusion Encrypting Disks in Windows Looking at How NAP WorksPrevention Systems Introducing IPSec Examining the Requirements for NAPLooking at Honeypots Encrypting with VPN Technology Using Isolation to Protect the NetworkLooking at DMZs Using Auditing to Complete the Security Understanding Virtual LANsUnderstanding Network Address Translation Picture Understanding Routing(NAT) Using Password Complexity to Make a Looking at Intrusion Detection andUnderstanding Virtual Private Networks Stronger Password Intrusion Prevention Systems(VPNs) Using Account Lockout to Prevent Looking at HoneypotsUnderstanding Internet Protocol Security Hacking Looking at DMZs(IPsec) Looking at Password Length Understanding Network AddressUsing Other VPN Protocols Using Password History to Enforce Translation (NAT)Looking at Server and Domain Isolation Security Understanding Virtual Private NetworksProtecting Data with Protocol Security Setting the Time between Password (VPNs)Understanding Tunneling Changes Understanding Internet Protocol SecurityUsing DNS Security Extensions (DNSSEC) Using Password Group Policies to (IPsec)Looking at Protocol Spoofing Enforce Security Using Other VPN ProtocolsUtilizing Network Sniffing Understanding Common Attack Methods Looking at Server and Domain IsolationUnderstanding Common NETWORK Attack Examining Hardware Firewalls and Their Protecting Data with Protocol SecurityMethods Characteristics Understanding TunnelingSecuring Wireless Network Using Hardware Firewalls versus Using DNS Security Extensions (DNSSEC)Using Service Set Identifier (SSID) Software Firewalls Looking at Protocol SpoofingUnderstanding Keys Using Stateful versus Stateless Utilizing Network SniffingUtilizing MAC Filters Inspection Understanding Common NETWORKConsidering Pros and Cons of Specific Controlling Access with Network Access Attack MethodsSecurity Types Protection (NAP) Securing Wireless NetworkProtecting Your Computer from Malware Understanding the Purpose of NAP Using Service Set Identifier (SSID)Utilizing Windows Updates Looking at How NAP Works Understanding KeysUtilizing User Account Control Examining the Requirements for NAP Utilizing MAC FiltersUsing Windows Firewall Using Isolation to Protect the Network Considering Pros and Cons of SpecificUsing Offline Files Understanding Virtual LANs Security TypesLocking Down a Client Computer Understanding Routing Protecting Your Computer from MalwareProtecting Your Email Looking at Intrusion Detection and Utilizing Windows UpdatesDealing with Spam Intrusion Prevention Systems Utilizing User Account ControlRelaying Email Looking at Honeypots Using Windows FirewallSecuring Internet Explorer Looking at DMZs Using Offline FilesLooking at Cookies and Privacy Settings Understanding Network Address Locking Down a Client ComputerExamining Content Zones Translation (NAT) Protecting Your EmailPhishing and Pharming Understanding Virtual Private Networks Dealing with SpamProtecting Your Server (VPNs) Relaying EmailPlacing the Server Understanding Internet Protocol Security Securing Internet ExplorerHardening the Server (IPsec) Looking at Cookies and Privacy SettingsUsing Secure Dynamic DNS Using Other VPN Protocols Examining Content Zones

Looking at Server and Domain Isolation Phishing and PharmingProtecting Data with Protocol Security Protecting Your Server

line Understanding Tunneling Placing the ServerUnderstanding Confidentiality Using DNS Security Extensions Hardening the ServerUnderstanding Integrity (DNSSEC) Using Secure Dynamic DNSUnderstanding Availability Looking at Protocol SpoofingDefining Threats and Risk Management Utilizing Network Sniffing

Page 18: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Understanding the Principle of Least Understanding Common NETWORK linePrivilege Attack Methods Understanding ConfidentialityUnderstanding Attack Surface Securing Wireless Network Understanding IntegrityUnderstanding Social Engineering Using Service Set Identifier (SSID) Understanding AvailabilityLinking Cost with Security Understanding Keys Defining Threats and Risk ManagementLooking at Physical Security as the First Utilizing MAC Filters Understanding the Principle of LeastLine of Defense Considering Pros and Cons of Specific PrivilegeUnderstanding Site Security Security Types Understanding Attack SurfaceUnderstanding Computer Security Protecting Your Computer from Malware Understanding Social EngineeringAuthenticating with What You Know Utilizing Windows Updates Linking Cost with SecurityAuthenticating with What You Own or Utilizing User Account Control Looking at Physical Security as the FirstPossess Using Windows Firewall Line of DefenseAuthenticating with What You Are Using Offline Files Understanding Site SecurityIntroducing RADIUS and TACACS1 Locking Down a Client Computer Understanding Computer SecurityUsing Run As Protecting Your Email Authenticating with What You KnowIntroducing Directory Services with Active Dealing with Spam Authenticating with What You Own orDirectory Relaying Email PossessLooking at Domain Controllers Securing Internet Explorer Authenticating with What You AreIntroducing NTLM Looking at Cookies and Privacy Settings Introducing RADIUS and TACACS1Introducing Kerberos Examining Content Zones Using Run AsUsing Organizational Units Phishing and Pharming Introducing Directory Services with ActiveLooking at Objects Protecting Your Server DirectoryUsing Groups Placing the Server Looking at Domain ControllersLooking at Web Server Authentication Hardening the Server Introducing NTLMComparing Rights and Permissions Using Secure Dynamic DNS Introducing KerberosLooking at NTFS Using Organizational UnitsUsing NTFS Permissions Looking at ObjectsLooking at Effective NTFS Permissions line Using GroupsCopying and Moving Files Understanding Confidentiality Looking at Web Server AuthenticationUsing Folder and File Owners Understanding Integrity Comparing Rights and PermissionsSharing Drives and Folders Understanding Availability Looking at NTFSLooking at Special and Administrative Defining Threats and Risk Management Using NTFS PermissionsShares Understanding the Principle of Least Looking at Effective NTFS PermissionsIntroducing the Registry Privilege Copying and Moving FilesUsing Encryption to Protect Data Understanding Attack Surface Using Folder and File OwnersExamining Types of Encryption Understanding Social Engineering Sharing Drives and FoldersIntroducing Public Key Infrastructure Linking Cost with Security Looking at Special and AdministrativeEncrypting Email Looking at Physical Security as the First SharesEncrypting Files with EFS Line of Defense Introducing the RegistryEncrypting Disks in Windows Understanding Site Security Using Encryption to Protect DataIntroducing IPSec Understanding Computer Security Examining Types of EncryptionEncrypting with VPN Technology Authenticating with What You Know Introducing Public Key InfrastructureUsing Auditing to Complete the Security Authenticating with What You Own or Encrypting EmailPicture Possess Encrypting Files with EFSUsing Password Complexity to Make a Authenticating with What You Are Encrypting Disks in WindowsStronger Password Introducing RADIUS and TACACS1 Introducing IPSecUsing Account Lockout to Prevent Hacking Using Run As Encrypting with VPN TechnologyLooking at Password Length Introducing Directory Services with Active Using Auditing to Complete the SecurityUsing Password History to Enforce Security Directory PictureSetting the Time between Password Looking at Domain Controllers Using Password Complexity to Make aChanges Introducing NTLM Stronger PasswordUsing Password Group Policies to Enforce Introducing Kerberos Using Account Lockout to Prevent HackingSecurity Using Organizational Units Looking at Password LengthUnderstanding Common Attack Methods Looking at Objects Using Password History to EnforceExamining Hardware Firewalls and Their Using Groups SecurityCharacteristics Looking at Web Server Authentication Setting the Time between PasswordUsing Hardware Firewalls versus Software Comparing Rights and Permissions ChangesFirewalls Looking at NTFS Using Password Group Policies to EnforceUsing Stateful versus Stateless Inspection Using NTFS Permissions SecurityControlling Access with Network Access Looking at Effective NTFS Permissions Understanding Common Attack MethodsProtection (NAP) Copying and Moving Files Examining Hardware Firewalls and TheirUnderstanding the Purpose of NAP Using Folder and File Owners CharacteristicsLooking at How NAP Works Sharing Drives and Folders Using Hardware Firewalls versus SoftwareExamining the Requirements for NAP Looking at Special and Administrative FirewallsUsing Isolation to Protect the Network Shares Using Stateful versus Stateless InspectionUnderstanding Virtual LANs Introducing the Registry Controlling Access with Network Access

Page 19: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Understanding Routing Using Encryption to Protect Data Protection (NAP)Looking at Intrusion Detection and Intrusion Examining Types of Encryption Understanding the Purpose of NAPPrevention Systems Introducing Public Key Infrastructure Looking at How NAP WorksLooking at Honeypots Encrypting Email Examining the Requirements for NAPLooking at DMZs Encrypting Files with EFS Using Isolation to Protect the NetworkUnderstanding Network Address Translation Encrypting Disks in Windows Understanding Virtual LANs(NAT) Introducing IPSec Understanding RoutingUnderstanding Virtual Private Networks Encrypting with VPN Technology Looking at Intrusion Detection and(VPNs) Using Auditing to Complete the Security Intrusion Prevention SystemsUnderstanding Internet Protocol Security Picture Looking at Honeypots(IPsec) Using Password Complexity to Make a Looking at DMZsUsing Other VPN Protocols Stronger Password Understanding Network AddressLooking at Server and Domain Isolation Using Account Lockout to Prevent Translation (NAT)Protecting Data with Protocol Security Hacking Understanding Virtual Private NetworksUnderstanding Tunneling Looking at Password Length (VPNs)Using DNS Security Extensions (DNSSEC) Using Password History to Enforce Understanding Internet Protocol SecurityLooking at Protocol Spoofing Security (IPsec)Utilizing Network Sniffing Setting the Time between Password Using Other VPN ProtocolsUnderstanding Common NETWORK Attack Changes Looking at Server and Domain IsolationMethods Using Password Group Policies to Protecting Data with Protocol SecuritySecuring Wireless Network Enforce Security Understanding TunnelingUsing Service Set Identifier (SSID) Understanding Common Attack Methods Using DNS Security Extensions (DNSSEC)Understanding Keys Examining Hardware Firewalls and Their Looking at Protocol SpoofingUtilizing MAC Filters Characteristics Utilizing Network SniffingConsidering Pros and Cons of Specific Using Hardware Firewalls versus Understanding Common NETWORKSecurity Types Software Firewalls Attack MethodsProtecting Your Computer from Malware Using Stateful versus Stateless Securing Wireless NetworkUtilizing Windows Updates Inspection Using Service Set Identifier (SSID)Utilizing User Account Control Controlling Access with Network Access Understanding KeysUsing Windows Firewall Protection (NAP) Utilizing MAC FiltersUsing Offline Files Understanding the Purpose of NAP Considering Pros and Cons of SpecificLocking Down a Client Computer Looking at How NAP Works Security TypesProtecting Your Email Examining the Requirements for NAP Protecting Your Computer from MalwareDealing with Spam Using Isolation to Protect the Network Utilizing Windows UpdatesRelaying Email Understanding Virtual LANs Utilizing User Account ControlSecuring Internet Explorer Understanding Routing Using Windows FirewallLooking at Cookies and Privacy Settings Looking at Intrusion Detection and Using Offline FilesExamining Content Zones Intrusion Prevention Systems Locking Down a Client ComputerPhishing and Pharming Looking at Honeypots Protecting Your EmailProtecting Your Server Looking at DMZs Dealing with SpamPlacing the Server Understanding Network Address Relaying EmailHardening the Server Translation (NAT) Securing Internet ExplorerUsing Secure Dynamic DNS Understanding Virtual Private Networks Looking at Cookies and Privacy Settings

(VPNs) Examining Content ZonesUnderstanding Internet Protocol Security Phishing and Pharming

line (IPsec) Protecting Your ServerUnderstanding Confidentiality Using Other VPN Protocols Placing the ServerUnderstanding Integrity Looking at Server and Domain Isolation Hardening the ServerUnderstanding Availability Protecting Data with Protocol Security Using Secure Dynamic DNSDefining Threats and Risk Management Understanding TunnelingUnderstanding the Principle of Least Using DNS Security ExtensionsPrivilege (DNSSEC) lineUnderstanding Attack Surface Looking at Protocol Spoofing Understanding ConfidentialityUnderstanding Social Engineering Utilizing Network Sniffing Understanding IntegrityLinking Cost with Security Understanding Common NETWORK Understanding AvailabilityLooking at Physical Security as the First Attack Methods Defining Threats and Risk ManagementLine of Defense Securing Wireless Network Understanding the Principle of LeastUnderstanding Site Security Using Service Set Identifier (SSID) PrivilegeUnderstanding Computer Security Understanding Keys Understanding Attack SurfaceAuthenticating with What You Know Utilizing MAC Filters Understanding Social EngineeringAuthenticating with What You Own or Considering Pros and Cons of Specific Linking Cost with SecurityPossess Security Types Looking at Physical Security as the FirstAuthenticating with What You Are Protecting Your Computer from Malware Line of DefenseIntroducing RADIUS and TACACS1 Utilizing Windows Updates Understanding Site SecurityUsing Run As Utilizing User Account Control Understanding Computer SecurityIntroducing Directory Services with Active Using Windows Firewall Authenticating with What You Know

Page 20: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Directory Using Offline Files Authenticating with What You Own orLooking at Domain Controllers Locking Down a Client Computer PossessIntroducing NTLM Protecting Your Email Authenticating with What You AreIntroducing Kerberos Dealing with Spam Introducing RADIUS and TACACS1Using Organizational Units Relaying Email Using Run AsLooking at Objects Securing Internet Explorer Introducing Directory Services with ActiveUsing Groups Looking at Cookies and Privacy Settings DirectoryLooking at Web Server Authentication Examining Content Zones Looking at Domain ControllersComparing Rights and Permissions Phishing and Pharming Introducing NTLMLooking at NTFS Protecting Your Server Introducing KerberosUsing NTFS Permissions Placing the Server Using Organizational UnitsLooking at Effective NTFS Permissions Hardening the Server Looking at ObjectsCopying and Moving Files Using Secure Dynamic DNS Using GroupsUsing Folder and File Owners Looking at Web Server AuthenticationSharing Drives and Folders Understanding Security Policies Comparing Rights and PermissionsLooking at Special and Administrative line Looking at NTFSShares Using Password Policies to Enhance Using NTFS PermissionsIntroducing the Registry Security Looking at Effective NTFS PermissionsUsing Encryption to Protect Data Copying and Moving FilesExamining Types of Encryption Using Folder and File OwnersIntroducing Public Key Infrastructure line Sharing Drives and FoldersEncrypting Email Understanding Confidentiality Looking at Special and AdministrativeEncrypting Files with EFS Understanding Integrity SharesEncrypting Disks in Windows Understanding Availability Introducing the RegistryIntroducing IPSec Defining Threats and Risk Management Using Encryption to Protect DataEncrypting with VPN Technology Understanding the Principle of Least Examining Types of EncryptionUsing Auditing to Complete the Security Privilege Introducing Public Key InfrastructurePicture Understanding Attack Surface Encrypting EmailUsing Password Complexity to Make a Understanding Social Engineering Encrypting Files with EFSStronger Password Linking Cost with Security Encrypting Disks in WindowsUsing Account Lockout to Prevent Hacking Looking at Physical Security as the First Introducing IPSecLooking at Password Length Line of Defense Encrypting with VPN TechnologyUsing Password History to Enforce Security Understanding Site Security Using Auditing to Complete the SecuritySetting the Time between Password Understanding Computer Security PictureChanges Authenticating with What You Know Using Password Complexity to Make aUsing Password Group Policies to Enforce Authenticating with What You Own or Stronger PasswordSecurity Possess Using Account Lockout to Prevent HackingUnderstanding Common Attack Methods Authenticating with What You Are Looking at Password LengthExamining Hardware Firewalls and Their Introducing RADIUS and TACACS1 Using Password History to EnforceCharacteristics Using Run As SecurityUsing Hardware Firewalls versus Software Introducing Directory Services with Active Setting the Time between PasswordFirewalls Directory ChangesUsing Stateful versus Stateless Inspection Looking at Domain Controllers Using Password Group Policies to EnforceControlling Access with Network Access Introducing NTLM SecurityProtection (NAP) Introducing Kerberos Understanding Common Attack MethodsUnderstanding the Purpose of NAP Using Organizational Units Examining Hardware Firewalls and TheirLooking at How NAP Works Looking at Objects CharacteristicsExamining the Requirements for NAP Using Groups Using Hardware Firewalls versus SoftwareUsing Isolation to Protect the Network Looking at Web Server Authentication FirewallsUnderstanding Virtual LANs Comparing Rights and Permissions Using Stateful versus Stateless InspectionUnderstanding Routing Looking at NTFS Controlling Access with Network AccessLooking at Intrusion Detection and Intrusion Using NTFS Permissions Protection (NAP)Prevention Systems Looking at Effective NTFS Permissions Understanding the Purpose of NAPLooking at Honeypots Copying and Moving Files Looking at How NAP WorksLooking at DMZs Using Folder and File Owners Examining the Requirements for NAPUnderstanding Network Address Translation Sharing Drives and Folders Using Isolation to Protect the Network(NAT) Looking at Special and Administrative Understanding Virtual LANsUnderstanding Virtual Private Networks Shares Understanding Routing(VPNs) Introducing the Registry Looking at Intrusion Detection andUnderstanding Internet Protocol Security Using Encryption to Protect Data Intrusion Prevention Systems(IPsec) Examining Types of Encryption Looking at HoneypotsUsing Other VPN Protocols Introducing Public Key Infrastructure Looking at DMZsLooking at Server and Domain Isolation Encrypting Email Understanding Network AddressProtecting Data with Protocol Security Encrypting Files with EFS Translation (NAT)Understanding Tunneling Encrypting Disks in Windows Understanding Virtual Private NetworksUsing DNS Security Extensions (DNSSEC) Introducing IPSec (VPNs)

Page 21: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Looking at Protocol Spoofing Encrypting with VPN Technology Understanding Internet Protocol SecurityUtilizing Network Sniffing Using Auditing to Complete the Security (IPsec)Understanding Common NETWORK Attack Picture Using Other VPN ProtocolsMethods Using Password Complexity to Make a Looking at Server and Domain IsolationSecuring Wireless Network Stronger Password Protecting Data with Protocol SecurityUsing Service Set Identifier (SSID) Using Account Lockout to Prevent Understanding TunnelingUnderstanding Keys Hacking Using DNS Security Extensions (DNSSEC)Utilizing MAC Filters Looking at Password Length Looking at Protocol SpoofingConsidering Pros and Cons of Specific Using Password History to Enforce Utilizing Network SniffingSecurity Types Security Understanding Common NETWORKProtecting Your Computer from Malware Setting the Time between Password Attack MethodsUtilizing Windows Updates Changes Securing Wireless NetworkUtilizing User Account Control Using Password Group Policies to Using Service Set Identifier (SSID)Using Windows Firewall Enforce Security Understanding KeysUsing Offline Files Understanding Common Attack Methods Utilizing MAC FiltersLocking Down a Client Computer Examining Hardware Firewalls and Their Considering Pros and Cons of SpecificProtecting Your Email Characteristics Security TypesDealing with Spam Using Hardware Firewalls versus Protecting Your Computer from MalwareRelaying Email Software Firewalls Utilizing Windows UpdatesSecuring Internet Explorer Using Stateful versus Stateless Utilizing User Account ControlLooking at Cookies and Privacy Settings Inspection Using Windows FirewallExamining Content Zones Controlling Access with Network Access Using Offline FilesPhishing and Pharming Protection (NAP) Locking Down a Client ComputerProtecting Your Server Understanding the Purpose of NAP Protecting Your EmailPlacing the Server Looking at How NAP Works Dealing with SpamHardening the Server Examining the Requirements for NAP Relaying EmailUsing Secure Dynamic DNS Using Isolation to Protect the Network Securing Internet Explorer

Understanding Virtual LANs Looking at Cookies and Privacy SettingsAuthentication, Authorization, and Accounting Understanding Routing Examining Content Zonesline Looking at Intrusion Detection and Phishing and Pharming

Starting Security with Authentication Intrusion Prevention Systems Protecting Your ServerLooking at Honeypots Placing the ServerLooking at DMZs Hardening the Server

line Understanding Network Address Using Secure Dynamic DNSUnderstanding Confidentiality Translation (NAT)Understanding Integrity Understanding Virtual Private NetworksUnderstanding Availability (VPNs) lineDefining Threats and Risk Management Understanding Internet Protocol Security Understanding ConfidentialityUnderstanding the Principle of Least (IPsec) Understanding IntegrityPrivilege Using Other VPN Protocols Understanding AvailabilityUnderstanding Attack Surface Looking at Server and Domain Isolation Defining Threats and Risk ManagementUnderstanding Social Engineering Protecting Data with Protocol Security Understanding the Principle of LeastLinking Cost with Security Understanding Tunneling PrivilegeLooking at Physical Security as the First Using DNS Security Extensions Understanding Attack SurfaceLine of Defense (DNSSEC) Understanding Social EngineeringUnderstanding Site Security Looking at Protocol Spoofing Linking Cost with SecurityUnderstanding Computer Security Utilizing Network Sniffing Looking at Physical Security as the FirstAuthenticating with What You Know Understanding Common NETWORK Line of DefenseAuthenticating with What You Own or Attack Methods Understanding Site SecurityPossess Securing Wireless Network Understanding Computer SecurityAuthenticating with What You Are Using Service Set Identifier (SSID) Authenticating with What You KnowIntroducing RADIUS and TACACS1 Understanding Keys Authenticating with What You Own orUsing Run As Utilizing MAC Filters PossessIntroducing Directory Services with Active Considering Pros and Cons of Specific Authenticating with What You AreDirectory Security Types Introducing RADIUS and TACACS1Looking at Domain Controllers Protecting Your Computer from Malware Using Run AsIntroducing NTLM Utilizing Windows Updates Introducing Directory Services with ActiveIntroducing Kerberos Utilizing User Account Control DirectoryUsing Organizational Units Using Windows Firewall Looking at Domain ControllersLooking at Objects Using Offline Files Introducing NTLMUsing Groups Locking Down a Client Computer Introducing KerberosLooking at Web Server Authentication Protecting Your Email Using Organizational UnitsComparing Rights and Permissions Dealing with Spam Looking at ObjectsLooking at NTFS Relaying Email Using GroupsUsing NTFS Permissions Securing Internet Explorer Looking at Web Server AuthenticationLooking at Effective NTFS Permissions Looking at Cookies and Privacy Settings Comparing Rights and Permissions

Page 22: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Copying and Moving Files Examining Content Zones Looking at NTFSUsing Folder and File Owners Phishing and Pharming Using NTFS PermissionsSharing Drives and Folders Protecting Your Server Looking at Effective NTFS PermissionsLooking at Special and Administrative Placing the Server Copying and Moving FilesShares Hardening the Server Using Folder and File OwnersIntroducing the Registry Using Secure Dynamic DNS Sharing Drives and FoldersUsing Encryption to Protect Data Looking at Special and AdministrativeExamining Types of Encryption SharesIntroducing Public Key Infrastructure line Introducing the RegistryEncrypting Email Understanding Confidentiality Using Encryption to Protect DataEncrypting Files with EFS Understanding Integrity Examining Types of EncryptionEncrypting Disks in Windows Understanding Availability Introducing Public Key InfrastructureIntroducing IPSec Defining Threats and Risk Management Encrypting EmailEncrypting with VPN Technology Understanding the Principle of Least Encrypting Files with EFSUsing Auditing to Complete the Security Privilege Encrypting Disks in WindowsPicture Understanding Attack Surface Introducing IPSecUsing Password Complexity to Make a Understanding Social Engineering Encrypting with VPN TechnologyStronger Password Linking Cost with Security Using Auditing to Complete the SecurityUsing Account Lockout to Prevent Hacking Looking at Physical Security as the First PictureLooking at Password Length Line of Defense Using Password Complexity to Make aUsing Password History to Enforce Security Understanding Site Security Stronger PasswordSetting the Time between Password Understanding Computer Security Using Account Lockout to Prevent HackingChanges Authenticating with What You Know Looking at Password LengthUsing Password Group Policies to Enforce Authenticating with What You Own or Using Password History to EnforceSecurity Possess SecurityUnderstanding Common Attack Methods Authenticating with What You Are Setting the Time between PasswordExamining Hardware Firewalls and Their Introducing RADIUS and TACACS1 ChangesCharacteristics Using Run As Using Password Group Policies to EnforceUsing Hardware Firewalls versus Software Introducing Directory Services with Active SecurityFirewalls Directory Understanding Common Attack MethodsUsing Stateful versus Stateless Inspection Looking at Domain Controllers Examining Hardware Firewalls and TheirControlling Access with Network Access Introducing NTLM CharacteristicsProtection (NAP) Introducing Kerberos Using Hardware Firewalls versus SoftwareUnderstanding the Purpose of NAP Using Organizational Units FirewallsLooking at How NAP Works Looking at Objects Using Stateful versus Stateless InspectionExamining the Requirements for NAP Using Groups Controlling Access with Network AccessUsing Isolation to Protect the Network Looking at Web Server Authentication Protection (NAP)Understanding Virtual LANs Comparing Rights and Permissions Understanding the Purpose of NAPUnderstanding Routing Looking at NTFS Looking at How NAP WorksLooking at Intrusion Detection and Intrusion Using NTFS Permissions Examining the Requirements for NAPPrevention Systems Looking at Effective NTFS Permissions Using Isolation to Protect the NetworkLooking at Honeypots Copying and Moving Files Understanding Virtual LANsLooking at DMZs Using Folder and File Owners Understanding RoutingUnderstanding Network Address Translation Sharing Drives and Folders Looking at Intrusion Detection and(NAT) Looking at Special and Administrative Intrusion Prevention SystemsUnderstanding Virtual Private Networks Shares Looking at Honeypots(VPNs) Introducing the Registry Looking at DMZsUnderstanding Internet Protocol Security Using Encryption to Protect Data Understanding Network Address(IPsec) Examining Types of Encryption Translation (NAT)Using Other VPN Protocols Introducing Public Key Infrastructure Understanding Virtual Private NetworksLooking at Server and Domain Isolation Encrypting Email (VPNs)Protecting Data with Protocol Security Encrypting Files with EFS Understanding Internet Protocol SecurityUnderstanding Tunneling Encrypting Disks in Windows (IPsec)Using DNS Security Extensions (DNSSEC) Introducing IPSec Using Other VPN ProtocolsLooking at Protocol Spoofing Encrypting with VPN Technology Looking at Server and Domain IsolationUtilizing Network Sniffing Using Auditing to Complete the Security Protecting Data with Protocol SecurityUnderstanding Common NETWORK Attack Picture Understanding TunnelingMethods Using Password Complexity to Make a Using DNS Security Extensions (DNSSEC)Securing Wireless Network Stronger Password Looking at Protocol SpoofingUsing Service Set Identifier (SSID) Using Account Lockout to Prevent Utilizing Network SniffingUnderstanding Keys Hacking Understanding Common NETWORKUtilizing MAC Filters Looking at Password Length Attack MethodsConsidering Pros and Cons of Specific Using Password History to Enforce Securing Wireless NetworkSecurity Types Security Using Service Set Identifier (SSID)Protecting Your Computer from Malware Setting the Time between Password Understanding KeysUtilizing Windows Updates Changes Utilizing MAC Filters

Page 23: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Utilizing User Account Control Using Password Group Policies to Considering Pros and Cons of SpecificUsing Windows Firewall Enforce Security Security TypesUsing Offline Files Understanding Common Attack Methods Protecting Your Computer from MalwareLocking Down a Client Computer Examining Hardware Firewalls and Their Utilizing Windows UpdatesProtecting Your Email Characteristics Utilizing User Account ControlDealing with Spam Using Hardware Firewalls versus Using Windows FirewallRelaying Email Software Firewalls Using Offline FilesSecuring Internet Explorer Using Stateful versus Stateless Locking Down a Client ComputerLooking at Cookies and Privacy Settings Inspection Protecting Your EmailExamining Content Zones Controlling Access with Network Access Dealing with SpamPhishing and Pharming Protection (NAP) Relaying EmailProtecting Your Server Understanding the Purpose of NAP Securing Internet ExplorerPlacing the Server Looking at How NAP Works Looking at Cookies and Privacy SettingsHardening the Server Examining the Requirements for NAP Examining Content ZonesUsing Secure Dynamic DNS Using Isolation to Protect the Network Phishing and Pharming

Understanding Virtual LANs Protecting Your ServerUnderstanding Routing Placing the Server

line Looking at Intrusion Detection and Hardening the ServerUnderstanding Confidentiality Intrusion Prevention Systems Using Secure Dynamic DNSUnderstanding Integrity Looking at HoneypotsUnderstanding Availability Looking at DMZsDefining Threats and Risk Management Understanding Network Address lineUnderstanding the Principle of Least Translation (NAT) Understanding ConfidentialityPrivilege Understanding Virtual Private Networks Understanding IntegrityUnderstanding Attack Surface (VPNs) Understanding AvailabilityUnderstanding Social Engineering Understanding Internet Protocol Security Defining Threats and Risk ManagementLinking Cost with Security (IPsec) Understanding the Principle of LeastLooking at Physical Security as the First Using Other VPN Protocols PrivilegeLine of Defense Looking at Server and Domain Isolation Understanding Attack SurfaceUnderstanding Site Security Protecting Data with Protocol Security Understanding Social EngineeringUnderstanding Computer Security Understanding Tunneling Linking Cost with SecurityAuthenticating with What You Know Using DNS Security Extensions Looking at Physical Security as the FirstAuthenticating with What You Own or (DNSSEC) Line of DefensePossess Looking at Protocol Spoofing Understanding Site SecurityAuthenticating with What You Are Utilizing Network Sniffing Understanding Computer SecurityIntroducing RADIUS and TACACS1 Understanding Common NETWORK Authenticating with What You KnowUsing Run As Attack Methods Authenticating with What You Own orIntroducing Directory Services with Active Securing Wireless Network PossessDirectory Using Service Set Identifier (SSID) Authenticating with What You AreLooking at Domain Controllers Understanding Keys Introducing RADIUS and TACACS1Introducing NTLM Utilizing MAC Filters Using Run AsIntroducing Kerberos Considering Pros and Cons of Specific Introducing Directory Services with ActiveUsing Organizational Units Security Types DirectoryLooking at Objects Protecting Your Computer from Malware Looking at Domain ControllersUsing Groups Utilizing Windows Updates Introducing NTLMLooking at Web Server Authentication Utilizing User Account Control Introducing KerberosComparing Rights and Permissions Using Windows Firewall Using Organizational UnitsLooking at NTFS Using Offline Files Looking at ObjectsUsing NTFS Permissions Locking Down a Client Computer Using GroupsLooking at Effective NTFS Permissions Protecting Your Email Looking at Web Server AuthenticationCopying and Moving Files Dealing with Spam Comparing Rights and PermissionsUsing Folder and File Owners Relaying Email Looking at NTFSSharing Drives and Folders Securing Internet Explorer Using NTFS PermissionsLooking at Special and Administrative Looking at Cookies and Privacy Settings Looking at Effective NTFS PermissionsShares Examining Content Zones Copying and Moving FilesIntroducing the Registry Phishing and Pharming Using Folder and File OwnersUsing Encryption to Protect Data Protecting Your Server Sharing Drives and FoldersExamining Types of Encryption Placing the Server Looking at Special and AdministrativeIntroducing Public Key Infrastructure Hardening the Server SharesEncrypting Email Using Secure Dynamic DNS Introducing the RegistryEncrypting Files with EFS Using Encryption to Protect DataEncrypting Disks in Windows Examining Types of EncryptionIntroducing IPSec line Introducing Public Key InfrastructureEncrypting with VPN Technology Understanding Confidentiality Encrypting EmailUsing Auditing to Complete the Security Understanding Integrity Encrypting Files with EFSPicture Understanding Availability Encrypting Disks in Windows

Page 24: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Using Password Complexity to Make a Defining Threats and Risk Management Introducing IPSecStronger Password Understanding the Principle of Least Encrypting with VPN TechnologyUsing Account Lockout to Prevent Hacking Privilege Using Auditing to Complete the SecurityLooking at Password Length Understanding Attack Surface PictureUsing Password History to Enforce Security Understanding Social Engineering Using Password Complexity to Make aSetting the Time between Password Linking Cost with Security Stronger PasswordChanges Looking at Physical Security as the First Using Account Lockout to Prevent HackingUsing Password Group Policies to Enforce Line of Defense Looking at Password LengthSecurity Understanding Site Security Using Password History to EnforceUnderstanding Common Attack Methods Understanding Computer Security SecurityExamining Hardware Firewalls and Their Authenticating with What You Know Setting the Time between PasswordCharacteristics Authenticating with What You Own or ChangesUsing Hardware Firewalls versus Software Possess Using Password Group Policies to EnforceFirewalls Authenticating with What You Are SecurityUsing Stateful versus Stateless Inspection Introducing RADIUS and TACACS1 Understanding Common Attack MethodsControlling Access with Network Access Using Run As Examining Hardware Firewalls and TheirProtection (NAP) Introducing Directory Services with Active CharacteristicsUnderstanding the Purpose of NAP Directory Using Hardware Firewalls versus SoftwareLooking at How NAP Works Looking at Domain Controllers FirewallsExamining the Requirements for NAP Introducing NTLM Using Stateful versus Stateless InspectionUsing Isolation to Protect the Network Introducing Kerberos Controlling Access with Network AccessUnderstanding Virtual LANs Using Organizational Units Protection (NAP)Understanding Routing Looking at Objects Understanding the Purpose of NAPLooking at Intrusion Detection and Intrusion Using Groups Looking at How NAP WorksPrevention Systems Looking at Web Server Authentication Examining the Requirements for NAPLooking at Honeypots Comparing Rights and Permissions Using Isolation to Protect the NetworkLooking at DMZs Looking at NTFS Understanding Virtual LANsUnderstanding Network Address Translation Using NTFS Permissions Understanding Routing(NAT) Looking at Effective NTFS Permissions Looking at Intrusion Detection andUnderstanding Virtual Private Networks Copying and Moving Files Intrusion Prevention Systems(VPNs) Using Folder and File Owners Looking at HoneypotsUnderstanding Internet Protocol Security Sharing Drives and Folders Looking at DMZs(IPsec) Looking at Special and Administrative Understanding Network AddressUsing Other VPN Protocols Shares Translation (NAT)Looking at Server and Domain Isolation Introducing the Registry Understanding Virtual Private NetworksProtecting Data with Protocol Security Using Encryption to Protect Data (VPNs)Understanding Tunneling Examining Types of Encryption Understanding Internet Protocol SecurityUsing DNS Security Extensions (DNSSEC) Introducing Public Key Infrastructure (IPsec)Looking at Protocol Spoofing Encrypting Email Using Other VPN ProtocolsUtilizing Network Sniffing Encrypting Files with EFS Looking at Server and Domain IsolationUnderstanding Common NETWORK Attack Encrypting Disks in Windows Protecting Data with Protocol SecurityMethods Introducing IPSec Understanding TunnelingSecuring Wireless Network Encrypting with VPN Technology Using DNS Security Extensions (DNSSEC)Using Service Set Identifier (SSID) Using Auditing to Complete the Security Looking at Protocol SpoofingUnderstanding Keys Picture Utilizing Network SniffingUtilizing MAC Filters Using Password Complexity to Make a Understanding Common NETWORKConsidering Pros and Cons of Specific Stronger Password Attack MethodsSecurity Types Using Account Lockout to Prevent Securing Wireless NetworkProtecting Your Computer from Malware Hacking Using Service Set Identifier (SSID)Utilizing Windows Updates Looking at Password Length Understanding KeysUtilizing User Account Control Using Password History to Enforce Utilizing MAC FiltersUsing Windows Firewall Security Considering Pros and Cons of SpecificUsing Offline Files Setting the Time between Password Security TypesLocking Down a Client Computer Changes Protecting Your Computer from MalwareProtecting Your Email Using Password Group Policies to Utilizing Windows UpdatesDealing with Spam Enforce Security Utilizing User Account ControlRelaying Email Understanding Common Attack Methods Using Windows FirewallSecuring Internet Explorer Examining Hardware Firewalls and Their Using Offline FilesLooking at Cookies and Privacy Settings Characteristics Locking Down a Client ComputerExamining Content Zones Using Hardware Firewalls versus Protecting Your EmailPhishing and Pharming Software Firewalls Dealing with SpamProtecting Your Server Using Stateful versus Stateless Relaying EmailPlacing the Server Inspection Securing Internet ExplorerHardening the Server Controlling Access with Network Access Looking at Cookies and Privacy SettingsUsing Secure Dynamic DNS Protection (NAP) Examining Content Zones

Understanding the Purpose of NAP Phishing and Pharming

Page 25: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Looking at How NAP Works Protecting Your Serverline Examining the Requirements for NAP Placing the Server

Understanding Confidentiality Using Isolation to Protect the Network Hardening the ServerUnderstanding Integrity Understanding Virtual LANs Using Secure Dynamic DNSUnderstanding Availability Understanding RoutingDefining Threats and Risk Management Looking at Intrusion Detection andUnderstanding the Principle of Least Intrusion Prevention Systems linePrivilege Looking at Honeypots Understanding ConfidentialityUnderstanding Attack Surface Looking at DMZs Understanding IntegrityUnderstanding Social Engineering Understanding Network Address Understanding AvailabilityLinking Cost with Security Translation (NAT) Defining Threats and Risk ManagementLooking at Physical Security as the First Understanding Virtual Private Networks Understanding the Principle of LeastLine of Defense (VPNs) PrivilegeUnderstanding Site Security Understanding Internet Protocol Security Understanding Attack SurfaceUnderstanding Computer Security (IPsec) Understanding Social EngineeringAuthenticating with What You Know Using Other VPN Protocols Linking Cost with SecurityAuthenticating with What You Own or Looking at Server and Domain Isolation Looking at Physical Security as the FirstPossess Protecting Data with Protocol Security Line of DefenseAuthenticating with What You Are Understanding Tunneling Understanding Site SecurityIntroducing RADIUS and TACACS1 Using DNS Security Extensions Understanding Computer SecurityUsing Run As (DNSSEC) Authenticating with What You KnowIntroducing Directory Services with Active Looking at Protocol Spoofing Authenticating with What You Own orDirectory Utilizing Network Sniffing PossessLooking at Domain Controllers Understanding Common NETWORK Authenticating with What You AreIntroducing NTLM Attack Methods Introducing RADIUS and TACACS1Introducing Kerberos Securing Wireless Network Using Run AsUsing Organizational Units Using Service Set Identifier (SSID) Introducing Directory Services with ActiveLooking at Objects Understanding Keys DirectoryUsing Groups Utilizing MAC Filters Looking at Domain ControllersLooking at Web Server Authentication Considering Pros and Cons of Specific Introducing NTLMComparing Rights and Permissions Security Types Introducing KerberosLooking at NTFS Protecting Your Computer from Malware Using Organizational UnitsUsing NTFS Permissions Utilizing Windows Updates Looking at ObjectsLooking at Effective NTFS Permissions Utilizing User Account Control Using GroupsCopying and Moving Files Using Windows Firewall Looking at Web Server AuthenticationUsing Folder and File Owners Using Offline Files Comparing Rights and PermissionsSharing Drives and Folders Locking Down a Client Computer Looking at NTFSLooking at Special and Administrative Protecting Your Email Using NTFS PermissionsShares Dealing with Spam Looking at Effective NTFS PermissionsIntroducing the Registry Relaying Email Copying and Moving FilesUsing Encryption to Protect Data Securing Internet Explorer Using Folder and File OwnersExamining Types of Encryption Looking at Cookies and Privacy Settings Sharing Drives and FoldersIntroducing Public Key Infrastructure Examining Content Zones Looking at Special and AdministrativeEncrypting Email Phishing and Pharming SharesEncrypting Files with EFS Protecting Your Server Introducing the RegistryEncrypting Disks in Windows Placing the Server Using Encryption to Protect DataIntroducing IPSec Hardening the Server Examining Types of EncryptionEncrypting with VPN Technology Using Secure Dynamic DNS Introducing Public Key InfrastructureUsing Auditing to Complete the Security Encrypting EmailPicture Encrypting Files with EFSUsing Password Complexity to Make a line Encrypting Disks in WindowsStronger Password Understanding Confidentiality Introducing IPSecUsing Account Lockout to Prevent Hacking Understanding Integrity Encrypting with VPN TechnologyLooking at Password Length Understanding Availability Using Auditing to Complete the SecurityUsing Password History to Enforce Security Defining Threats and Risk Management PictureSetting the Time between Password Understanding the Principle of Least Using Password Complexity to Make aChanges Privilege Stronger PasswordUsing Password Group Policies to Enforce Understanding Attack Surface Using Account Lockout to Prevent HackingSecurity Understanding Social Engineering Looking at Password LengthUnderstanding Common Attack Methods Linking Cost with Security Using Password History to EnforceExamining Hardware Firewalls and Their Looking at Physical Security as the First SecurityCharacteristics Line of Defense Setting the Time between PasswordUsing Hardware Firewalls versus Software Understanding Site Security ChangesFirewalls Understanding Computer Security Using Password Group Policies to EnforceUsing Stateful versus Stateless Inspection Authenticating with What You Know SecurityControlling Access with Network Access Authenticating with What You Own or Understanding Common Attack Methods

Page 26: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Protection (NAP) Possess Examining Hardware Firewalls and TheirUnderstanding the Purpose of NAP Authenticating with What You Are CharacteristicsLooking at How NAP Works Introducing RADIUS and TACACS1 Using Hardware Firewalls versus SoftwareExamining the Requirements for NAP Using Run As FirewallsUsing Isolation to Protect the Network Introducing Directory Services with Active Using Stateful versus Stateless InspectionUnderstanding Virtual LANs Directory Controlling Access with Network AccessUnderstanding Routing Looking at Domain Controllers Protection (NAP)Looking at Intrusion Detection and Intrusion Introducing NTLM Understanding the Purpose of NAPPrevention Systems Introducing Kerberos Looking at How NAP WorksLooking at Honeypots Using Organizational Units Examining the Requirements for NAPLooking at DMZs Looking at Objects Using Isolation to Protect the NetworkUnderstanding Network Address Translation Using Groups Understanding Virtual LANs(NAT) Looking at Web Server Authentication Understanding RoutingUnderstanding Virtual Private Networks Comparing Rights and Permissions Looking at Intrusion Detection and(VPNs) Looking at NTFS Intrusion Prevention SystemsUnderstanding Internet Protocol Security Using NTFS Permissions Looking at Honeypots(IPsec) Looking at Effective NTFS Permissions Looking at DMZsUsing Other VPN Protocols Copying and Moving Files Understanding Network AddressLooking at Server and Domain Isolation Using Folder and File Owners Translation (NAT)Protecting Data with Protocol Security Sharing Drives and Folders Understanding Virtual Private NetworksUnderstanding Tunneling Looking at Special and Administrative (VPNs)Using DNS Security Extensions (DNSSEC) Shares Understanding Internet Protocol SecurityLooking at Protocol Spoofing Introducing the Registry (IPsec)Utilizing Network Sniffing Using Encryption to Protect Data Using Other VPN ProtocolsUnderstanding Common NETWORK Attack Examining Types of Encryption Looking at Server and Domain IsolationMethods Introducing Public Key Infrastructure Protecting Data with Protocol SecuritySecuring Wireless Network Encrypting Email Understanding TunnelingUsing Service Set Identifier (SSID) Encrypting Files with EFS Using DNS Security Extensions (DNSSEC)Understanding Keys Encrypting Disks in Windows Looking at Protocol SpoofingUtilizing MAC Filters Introducing IPSec Utilizing Network SniffingConsidering Pros and Cons of Specific Encrypting with VPN Technology Understanding Common NETWORKSecurity Types Using Auditing to Complete the Security Attack MethodsProtecting Your Computer from Malware Picture Securing Wireless NetworkUtilizing Windows Updates Using Password Complexity to Make a Using Service Set Identifier (SSID)Utilizing User Account Control Stronger Password Understanding KeysUsing Windows Firewall Using Account Lockout to Prevent Utilizing MAC FiltersUsing Offline Files Hacking Considering Pros and Cons of SpecificLocking Down a Client Computer Looking at Password Length Security TypesProtecting Your Email Using Password History to Enforce Protecting Your Computer from MalwareDealing with Spam Security Utilizing Windows UpdatesRelaying Email Setting the Time between Password Utilizing User Account ControlSecuring Internet Explorer Changes Using Windows FirewallLooking at Cookies and Privacy Settings Using Password Group Policies to Using Offline FilesExamining Content Zones Enforce Security Locking Down a Client ComputerPhishing and Pharming Understanding Common Attack Methods Protecting Your EmailProtecting Your Server Examining Hardware Firewalls and Their Dealing with SpamPlacing the Server Characteristics Relaying EmailHardening the Server Using Hardware Firewalls versus Securing Internet ExplorerUsing Secure Dynamic DNS Software Firewalls Looking at Cookies and Privacy Settings

Using Stateful versus Stateless Examining Content ZonesInspection Phishing and Pharming

line Controlling Access with Network Access Protecting Your ServerUnderstanding Confidentiality Protection (NAP) Placing the ServerUnderstanding Integrity Understanding the Purpose of NAP Hardening the ServerUnderstanding Availability Looking at How NAP Works Using Secure Dynamic DNSDefining Threats and Risk Management Examining the Requirements for NAPUnderstanding the Principle of Least Using Isolation to Protect the Network Protecting the Server and ClientPrivilege Understanding Virtual LANs lineUnderstanding Attack Surface Understanding Routing Protecting the Client ComputerUnderstanding Social Engineering Looking at Intrusion Detection andLinking Cost with Security Intrusion Prevention SystemsLooking at Physical Security as the First Looking at Honeypots lineLine of Defense Looking at DMZs Understanding ConfidentialityUnderstanding Site Security Understanding Network Address Understanding IntegrityUnderstanding Computer Security Translation (NAT) Understanding AvailabilityAuthenticating with What You Know Understanding Virtual Private Networks Defining Threats and Risk Management

Page 27: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Authenticating with What You Own or (VPNs) Understanding the Principle of LeastPossess Understanding Internet Protocol Security PrivilegeAuthenticating with What You Are (IPsec) Understanding Attack SurfaceIntroducing RADIUS and TACACS1 Using Other VPN Protocols Understanding Social EngineeringUsing Run As Looking at Server and Domain Isolation Linking Cost with SecurityIntroducing Directory Services with Active Protecting Data with Protocol Security Looking at Physical Security as the FirstDirectory Understanding Tunneling Line of DefenseLooking at Domain Controllers Using DNS Security Extensions Understanding Site SecurityIntroducing NTLM (DNSSEC) Understanding Computer SecurityIntroducing Kerberos Looking at Protocol Spoofing Authenticating with What You KnowUsing Organizational Units Utilizing Network Sniffing Authenticating with What You Own orLooking at Objects Understanding Common NETWORK PossessUsing Groups Attack Methods Authenticating with What You AreLooking at Web Server Authentication Securing Wireless Network Introducing RADIUS and TACACS1Comparing Rights and Permissions Using Service Set Identifier (SSID) Using Run AsLooking at NTFS Understanding Keys Introducing Directory Services with ActiveUsing NTFS Permissions Utilizing MAC Filters DirectoryLooking at Effective NTFS Permissions Considering Pros and Cons of Specific Looking at Domain ControllersCopying and Moving Files Security Types Introducing NTLMUsing Folder and File Owners Protecting Your Computer from Malware Introducing KerberosSharing Drives and Folders Utilizing Windows Updates Using Organizational UnitsLooking at Special and Administrative Utilizing User Account Control Looking at ObjectsShares Using Windows Firewall Using GroupsIntroducing the Registry Using Offline Files Looking at Web Server AuthenticationUsing Encryption to Protect Data Locking Down a Client Computer Comparing Rights and PermissionsExamining Types of Encryption Protecting Your Email Looking at NTFSIntroducing Public Key Infrastructure Dealing with Spam Using NTFS PermissionsEncrypting Email Relaying Email Looking at Effective NTFS PermissionsEncrypting Files with EFS Securing Internet Explorer Copying and Moving FilesEncrypting Disks in Windows Looking at Cookies and Privacy Settings Using Folder and File OwnersIntroducing IPSec Examining Content Zones Sharing Drives and FoldersEncrypting with VPN Technology Phishing and Pharming Looking at Special and AdministrativeUsing Auditing to Complete the Security Protecting Your Server SharesPicture Placing the Server Introducing the RegistryUsing Password Complexity to Make a Hardening the Server Using Encryption to Protect DataStronger Password Using Secure Dynamic DNS Examining Types of EncryptionUsing Account Lockout to Prevent Hacking Introducing Public Key InfrastructureLooking at Password Length Encrypting EmailUsing Password History to Enforce Security line Encrypting Files with EFSSetting the Time between Password Understanding Confidentiality Encrypting Disks in WindowsChanges Understanding Integrity Introducing IPSecUsing Password Group Policies to Enforce Understanding Availability Encrypting with VPN TechnologySecurity Defining Threats and Risk Management Using Auditing to Complete the SecurityUnderstanding Common Attack Methods Understanding the Principle of Least PictureExamining Hardware Firewalls and Their Privilege Using Password Complexity to Make aCharacteristics Understanding Attack Surface Stronger PasswordUsing Hardware Firewalls versus Software Understanding Social Engineering Using Account Lockout to Prevent HackingFirewalls Linking Cost with Security Looking at Password LengthUsing Stateful versus Stateless Inspection Looking at Physical Security as the First Using Password History to EnforceControlling Access with Network Access Line of Defense SecurityProtection (NAP) Understanding Site Security Setting the Time between PasswordUnderstanding the Purpose of NAP Understanding Computer Security ChangesLooking at How NAP Works Authenticating with What You Know Using Password Group Policies to EnforceExamining the Requirements for NAP Authenticating with What You Own or SecurityUsing Isolation to Protect the Network Possess Understanding Common Attack MethodsUnderstanding Virtual LANs Authenticating with What You Are Examining Hardware Firewalls and TheirUnderstanding Routing Introducing RADIUS and TACACS1 CharacteristicsLooking at Intrusion Detection and Intrusion Using Run As Using Hardware Firewalls versus SoftwarePrevention Systems Introducing Directory Services with Active FirewallsLooking at Honeypots Directory Using Stateful versus Stateless InspectionLooking at DMZs Looking at Domain Controllers Controlling Access with Network AccessUnderstanding Network Address Translation Introducing NTLM Protection (NAP)(NAT) Introducing Kerberos Understanding the Purpose of NAPUnderstanding Virtual Private Networks Using Organizational Units Looking at How NAP Works(VPNs) Looking at Objects Examining the Requirements for NAPUnderstanding Internet Protocol Security Using Groups Using Isolation to Protect the Network

Page 28: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

(IPsec) Looking at Web Server Authentication Understanding Virtual LANsUsing Other VPN Protocols Comparing Rights and Permissions Understanding RoutingLooking at Server and Domain Isolation Looking at NTFS Looking at Intrusion Detection andProtecting Data with Protocol Security Using NTFS Permissions Intrusion Prevention SystemsUnderstanding Tunneling Looking at Effective NTFS Permissions Looking at HoneypotsUsing DNS Security Extensions (DNSSEC) Copying and Moving Files Looking at DMZsLooking at Protocol Spoofing Using Folder and File Owners Understanding Network AddressUtilizing Network Sniffing Sharing Drives and Folders Translation (NAT)Understanding Common NETWORK Attack Looking at Special and Administrative Understanding Virtual Private NetworksMethods Shares (VPNs)Securing Wireless Network Introducing the Registry Understanding Internet Protocol SecurityUsing Service Set Identifier (SSID) Using Encryption to Protect Data (IPsec)Understanding Keys Examining Types of Encryption Using Other VPN ProtocolsUtilizing MAC Filters Introducing Public Key Infrastructure Looking at Server and Domain IsolationConsidering Pros and Cons of Specific Encrypting Email Protecting Data with Protocol SecuritySecurity Types Encrypting Files with EFS Understanding TunnelingProtecting Your Computer from Malware Encrypting Disks in Windows Using DNS Security Extensions (DNSSEC)Utilizing Windows Updates Introducing IPSec Looking at Protocol SpoofingUtilizing User Account Control Encrypting with VPN Technology Utilizing Network SniffingUsing Windows Firewall Using Auditing to Complete the Security Understanding Common NETWORKUsing Offline Files Picture Attack MethodsLocking Down a Client Computer Using Password Complexity to Make a Securing Wireless NetworkProtecting Your Email Stronger Password Using Service Set Identifier (SSID)Dealing with Spam Using Account Lockout to Prevent Understanding KeysRelaying Email Hacking Utilizing MAC FiltersSecuring Internet Explorer Looking at Password Length Considering Pros and Cons of SpecificLooking at Cookies and Privacy Settings Using Password History to Enforce Security TypesExamining Content Zones Security Protecting Your Computer from MalwarePhishing and Pharming Setting the Time between Password Utilizing Windows UpdatesProtecting Your Server Changes Utilizing User Account ControlPlacing the Server Using Password Group Policies to Using Windows FirewallHardening the Server Enforce Security Using Offline FilesUsing Secure Dynamic DNS Understanding Common Attack Methods Locking Down a Client Computer

Examining Hardware Firewalls and Their Protecting Your EmailCharacteristics Dealing with Spam

line Using Hardware Firewalls versus Relaying EmailUnderstanding Confidentiality Software Firewalls Securing Internet ExplorerUnderstanding Integrity Using Stateful versus Stateless Looking at Cookies and Privacy SettingsUnderstanding Availability Inspection Examining Content ZonesDefining Threats and Risk Management Controlling Access with Network Access Phishing and PharmingUnderstanding the Principle of Least Protection (NAP) Protecting Your ServerPrivilege Understanding the Purpose of NAP Placing the ServerUnderstanding Attack Surface Looking at How NAP Works Hardening the ServerUnderstanding Social Engineering Examining the Requirements for NAP Using Secure Dynamic DNSLinking Cost with Security Using Isolation to Protect the NetworkLooking at Physical Security as the First Understanding Virtual LANsLine of Defense Understanding Routing lineUnderstanding Site Security Looking at Intrusion Detection and Understanding ConfidentialityUnderstanding Computer Security Intrusion Prevention Systems Understanding IntegrityAuthenticating with What You Know Looking at Honeypots Understanding AvailabilityAuthenticating with What You Own or Looking at DMZs Defining Threats and Risk ManagementPossess Understanding Network Address Understanding the Principle of LeastAuthenticating with What You Are Translation (NAT) PrivilegeIntroducing RADIUS and TACACS1 Understanding Virtual Private Networks Understanding Attack SurfaceUsing Run As (VPNs) Understanding Social EngineeringIntroducing Directory Services with Active Understanding Internet Protocol Security Linking Cost with SecurityDirectory (IPsec) Looking at Physical Security as the FirstLooking at Domain Controllers Using Other VPN Protocols Line of DefenseIntroducing NTLM Looking at Server and Domain Isolation Understanding Site SecurityIntroducing Kerberos Protecting Data with Protocol Security Understanding Computer SecurityUsing Organizational Units Understanding Tunneling Authenticating with What You KnowLooking at Objects Using DNS Security Extensions Authenticating with What You Own orUsing Groups (DNSSEC) PossessLooking at Web Server Authentication Looking at Protocol Spoofing Authenticating with What You AreComparing Rights and Permissions Utilizing Network Sniffing Introducing RADIUS and TACACS1Looking at NTFS Understanding Common NETWORK Using Run As

Page 29: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Using NTFS Permissions Attack Methods Introducing Directory Services with ActiveLooking at Effective NTFS Permissions Securing Wireless Network DirectoryCopying and Moving Files Using Service Set Identifier (SSID) Looking at Domain ControllersUsing Folder and File Owners Understanding Keys Introducing NTLMSharing Drives and Folders Utilizing MAC Filters Introducing KerberosLooking at Special and Administrative Considering Pros and Cons of Specific Using Organizational UnitsShares Security Types Looking at ObjectsIntroducing the Registry Protecting Your Computer from Malware Using GroupsUsing Encryption to Protect Data Utilizing Windows Updates Looking at Web Server AuthenticationExamining Types of Encryption Utilizing User Account Control Comparing Rights and PermissionsIntroducing Public Key Infrastructure Using Windows Firewall Looking at NTFSEncrypting Email Using Offline Files Using NTFS PermissionsEncrypting Files with EFS Locking Down a Client Computer Looking at Effective NTFS PermissionsEncrypting Disks in Windows Protecting Your Email Copying and Moving FilesIntroducing IPSec Dealing with Spam Using Folder and File OwnersEncrypting with VPN Technology Relaying Email Sharing Drives and FoldersUsing Auditing to Complete the Security Securing Internet Explorer Looking at Special and AdministrativePicture Looking at Cookies and Privacy Settings SharesUsing Password Complexity to Make a Examining Content Zones Introducing the RegistryStronger Password Phishing and Pharming Using Encryption to Protect DataUsing Account Lockout to Prevent Hacking Protecting Your Server Examining Types of EncryptionLooking at Password Length Placing the Server Introducing Public Key InfrastructureUsing Password History to Enforce Security Hardening the Server Encrypting EmailSetting the Time between Password Using Secure Dynamic DNS Encrypting Files with EFSChanges Encrypting Disks in WindowsUsing Password Group Policies to Enforce Introducing IPSecSecurity line Encrypting with VPN TechnologyUnderstanding Common Attack Methods Understanding Confidentiality Using Auditing to Complete the SecurityExamining Hardware Firewalls and Their Understanding Integrity PictureCharacteristics Understanding Availability Using Password Complexity to Make aUsing Hardware Firewalls versus Software Defining Threats and Risk Management Stronger PasswordFirewalls Understanding the Principle of Least Using Account Lockout to Prevent HackingUsing Stateful versus Stateless Inspection Privilege Looking at Password LengthControlling Access with Network Access Understanding Attack Surface Using Password History to EnforceProtection (NAP) Understanding Social Engineering SecurityUnderstanding the Purpose of NAP Linking Cost with Security Setting the Time between PasswordLooking at How NAP Works Looking at Physical Security as the First ChangesExamining the Requirements for NAP Line of Defense Using Password Group Policies to EnforceUsing Isolation to Protect the Network Understanding Site Security SecurityUnderstanding Virtual LANs Understanding Computer Security Understanding Common Attack MethodsUnderstanding Routing Authenticating with What You Know Examining Hardware Firewalls and TheirLooking at Intrusion Detection and Intrusion Authenticating with What You Own or CharacteristicsPrevention Systems Possess Using Hardware Firewalls versus SoftwareLooking at Honeypots Authenticating with What You Are FirewallsLooking at DMZs Introducing RADIUS and TACACS1 Using Stateful versus Stateless InspectionUnderstanding Network Address Translation Using Run As Controlling Access with Network Access(NAT) Introducing Directory Services with Active Protection (NAP)Understanding Virtual Private Networks Directory Understanding the Purpose of NAP(VPNs) Looking at Domain Controllers Looking at How NAP WorksUnderstanding Internet Protocol Security Introducing NTLM Examining the Requirements for NAP(IPsec) Introducing Kerberos Using Isolation to Protect the NetworkUsing Other VPN Protocols Using Organizational Units Understanding Virtual LANsLooking at Server and Domain Isolation Looking at Objects Understanding RoutingProtecting Data with Protocol Security Using Groups Looking at Intrusion Detection andUnderstanding Tunneling Looking at Web Server Authentication Intrusion Prevention SystemsUsing DNS Security Extensions (DNSSEC) Comparing Rights and Permissions Looking at HoneypotsLooking at Protocol Spoofing Looking at NTFS Looking at DMZsUtilizing Network Sniffing Using NTFS Permissions Understanding Network AddressUnderstanding Common NETWORK Attack Looking at Effective NTFS Permissions Translation (NAT)Methods Copying and Moving Files Understanding Virtual Private NetworksSecuring Wireless Network Using Folder and File Owners (VPNs)Using Service Set Identifier (SSID) Sharing Drives and Folders Understanding Internet Protocol SecurityUnderstanding Keys Looking at Special and Administrative (IPsec)Utilizing MAC Filters Shares Using Other VPN ProtocolsConsidering Pros and Cons of Specific Introducing the Registry Looking at Server and Domain IsolationSecurity Types Using Encryption to Protect Data Protecting Data with Protocol Security

Page 30: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Protecting Your Computer from Malware Examining Types of Encryption Understanding TunnelingUtilizing Windows Updates Introducing Public Key Infrastructure Using DNS Security Extensions (DNSSEC)Utilizing User Account Control Encrypting Email Looking at Protocol SpoofingUsing Windows Firewall Encrypting Files with EFS Utilizing Network SniffingUsing Offline Files Encrypting Disks in Windows Understanding Common NETWORKLocking Down a Client Computer Introducing IPSec Attack MethodsProtecting Your Email Encrypting with VPN Technology Securing Wireless NetworkDealing with Spam Using Auditing to Complete the Security Using Service Set Identifier (SSID)Relaying Email Picture Understanding KeysSecuring Internet Explorer Using Password Complexity to Make a Utilizing MAC FiltersLooking at Cookies and Privacy Settings Stronger Password Considering Pros and Cons of SpecificExamining Content Zones Using Account Lockout to Prevent Security TypesPhishing and Pharming Hacking Protecting Your Computer from MalwareProtecting Your Server Looking at Password Length Utilizing Windows UpdatesPlacing the Server Using Password History to Enforce Utilizing User Account ControlHardening the Server Security Using Windows FirewallUsing Secure Dynamic DNS Setting the Time between Password Using Offline Files

Changes Locking Down a Client ComputerUsing Password Group Policies to Protecting Your Email

line Enforce Security Dealing with SpamUnderstanding Confidentiality Understanding Common Attack Methods Relaying EmailUnderstanding Integrity Examining Hardware Firewalls and Their Securing Internet ExplorerUnderstanding Availability Characteristics Looking at Cookies and Privacy SettingsDefining Threats and Risk Management Using Hardware Firewalls versus Examining Content ZonesUnderstanding the Principle of Least Software Firewalls Phishing and PharmingPrivilege Using Stateful versus Stateless Protecting Your ServerUnderstanding Attack Surface Inspection Placing the ServerUnderstanding Social Engineering Controlling Access with Network Access Hardening the ServerLinking Cost with Security Protection (NAP) Using Secure Dynamic DNSLooking at Physical Security as the First Understanding the Purpose of NAPLine of Defense Looking at How NAP WorksUnderstanding Site Security Examining the Requirements for NAP lineUnderstanding Computer Security Using Isolation to Protect the Network Understanding ConfidentialityAuthenticating with What You Know Understanding Virtual LANs Understanding IntegrityAuthenticating with What You Own or Understanding Routing Understanding AvailabilityPossess Looking at Intrusion Detection and Defining Threats and Risk ManagementAuthenticating with What You Are Intrusion Prevention Systems Understanding the Principle of LeastIntroducing RADIUS and TACACS1 Looking at Honeypots PrivilegeUsing Run As Looking at DMZs Understanding Attack SurfaceIntroducing Directory Services with Active Understanding Network Address Understanding Social EngineeringDirectory Translation (NAT) Linking Cost with SecurityLooking at Domain Controllers Understanding Virtual Private Networks Looking at Physical Security as the FirstIntroducing NTLM (VPNs) Line of DefenseIntroducing Kerberos Understanding Internet Protocol Security Understanding Site SecurityUsing Organizational Units (IPsec) Understanding Computer SecurityLooking at Objects Using Other VPN Protocols Authenticating with What You KnowUsing Groups Looking at Server and Domain Isolation Authenticating with What You Own orLooking at Web Server Authentication Protecting Data with Protocol Security PossessComparing Rights and Permissions Understanding Tunneling Authenticating with What You AreLooking at NTFS Using DNS Security Extensions Introducing RADIUS and TACACS1Using NTFS Permissions (DNSSEC) Using Run AsLooking at Effective NTFS Permissions Looking at Protocol Spoofing Introducing Directory Services with ActiveCopying and Moving Files Utilizing Network Sniffing DirectoryUsing Folder and File Owners Understanding Common NETWORK Looking at Domain ControllersSharing Drives and Folders Attack Methods Introducing NTLMLooking at Special and Administrative Securing Wireless Network Introducing KerberosShares Using Service Set Identifier (SSID) Using Organizational UnitsIntroducing the Registry Understanding Keys Looking at ObjectsUsing Encryption to Protect Data Utilizing MAC Filters Using GroupsExamining Types of Encryption Considering Pros and Cons of Specific Looking at Web Server AuthenticationIntroducing Public Key Infrastructure Security Types Comparing Rights and PermissionsEncrypting Email Protecting Your Computer from Malware Looking at NTFSEncrypting Files with EFS Utilizing Windows Updates Using NTFS PermissionsEncrypting Disks in Windows Utilizing User Account Control Looking at Effective NTFS PermissionsIntroducing IPSec Using Windows Firewall Copying and Moving FilesEncrypting with VPN Technology Using Offline Files Using Folder and File Owners

Page 31: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Using Auditing to Complete the Security Locking Down a Client Computer Sharing Drives and FoldersPicture Protecting Your Email Looking at Special and AdministrativeUsing Password Complexity to Make a Dealing with Spam SharesStronger Password Relaying Email Introducing the RegistryUsing Account Lockout to Prevent Hacking Securing Internet Explorer Using Encryption to Protect DataLooking at Password Length Looking at Cookies and Privacy Settings Examining Types of EncryptionUsing Password History to Enforce Security Examining Content Zones Introducing Public Key InfrastructureSetting the Time between Password Phishing and Pharming Encrypting EmailChanges Protecting Your Server Encrypting Files with EFSUsing Password Group Policies to Enforce Placing the Server Encrypting Disks in WindowsSecurity Hardening the Server Introducing IPSecUnderstanding Common Attack Methods Using Secure Dynamic DNS Encrypting with VPN TechnologyExamining Hardware Firewalls and Their Using Auditing to Complete the SecurityCharacteristics PictureUsing Hardware Firewalls versus Software line Using Password Complexity to Make aFirewalls Understanding Confidentiality Stronger PasswordUsing Stateful versus Stateless Inspection Understanding Integrity Using Account Lockout to Prevent HackingControlling Access with Network Access Understanding Availability Looking at Password LengthProtection (NAP) Defining Threats and Risk Management Using Password History to EnforceUnderstanding the Purpose of NAP Understanding the Principle of Least SecurityLooking at How NAP Works Privilege Setting the Time between PasswordExamining the Requirements for NAP Understanding Attack Surface ChangesUsing Isolation to Protect the Network Understanding Social Engineering Using Password Group Policies to EnforceUnderstanding Virtual LANs Linking Cost with Security SecurityUnderstanding Routing Looking at Physical Security as the First Understanding Common Attack MethodsLooking at Intrusion Detection and Intrusion Line of Defense Examining Hardware Firewalls and TheirPrevention Systems Understanding Site Security CharacteristicsLooking at Honeypots Understanding Computer Security Using Hardware Firewalls versus SoftwareLooking at DMZs Authenticating with What You Know FirewallsUnderstanding Network Address Translation Authenticating with What You Own or Using Stateful versus Stateless Inspection(NAT) Possess Controlling Access with Network AccessUnderstanding Virtual Private Networks Authenticating with What You Are Protection (NAP)(VPNs) Introducing RADIUS and TACACS1 Understanding the Purpose of NAPUnderstanding Internet Protocol Security Using Run As Looking at How NAP Works(IPsec) Introducing Directory Services with Active Examining the Requirements for NAPUsing Other VPN Protocols Directory Using Isolation to Protect the NetworkLooking at Server and Domain Isolation Looking at Domain Controllers Understanding Virtual LANsProtecting Data with Protocol Security Introducing NTLM Understanding RoutingUnderstanding Tunneling Introducing Kerberos Looking at Intrusion Detection andUsing DNS Security Extensions (DNSSEC) Using Organizational Units Intrusion Prevention SystemsLooking at Protocol Spoofing Looking at Objects Looking at HoneypotsUtilizing Network Sniffing Using Groups Looking at DMZsUnderstanding Common NETWORK Attack Looking at Web Server Authentication Understanding Network AddressMethods Comparing Rights and Permissions Translation (NAT)Securing Wireless Network Looking at NTFS Understanding Virtual Private NetworksUsing Service Set Identifier (SSID) Using NTFS Permissions (VPNs)Understanding Keys Looking at Effective NTFS Permissions Understanding Internet Protocol SecurityUtilizing MAC Filters Copying and Moving Files (IPsec)Considering Pros and Cons of Specific Using Folder and File Owners Using Other VPN ProtocolsSecurity Types Sharing Drives and Folders Looking at Server and Domain IsolationProtecting Your Computer from Malware Looking at Special and Administrative Protecting Data with Protocol SecurityUtilizing Windows Updates Shares Understanding TunnelingUtilizing User Account Control Introducing the Registry Using DNS Security Extensions (DNSSEC)Using Windows Firewall Using Encryption to Protect Data Looking at Protocol SpoofingUsing Offline Files Examining Types of Encryption Utilizing Network SniffingLocking Down a Client Computer Introducing Public Key Infrastructure Understanding Common NETWORKProtecting Your Email Encrypting Email Attack MethodsDealing with Spam Encrypting Files with EFS Securing Wireless NetworkRelaying Email Encrypting Disks in Windows Using Service Set Identifier (SSID)Securing Internet Explorer Introducing IPSec Understanding KeysLooking at Cookies and Privacy Settings Encrypting with VPN Technology Utilizing MAC FiltersExamining Content Zones Using Auditing to Complete the Security Considering Pros and Cons of SpecificPhishing and Pharming Picture Security TypesProtecting Your Server Using Password Complexity to Make a Protecting Your Computer from MalwarePlacing the Server Stronger Password Utilizing Windows UpdatesHardening the Server Using Account Lockout to Prevent Utilizing User Account Control

Page 32: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Using Secure Dynamic DNS Hacking Using Windows FirewallLooking at Password Length Using Offline FilesUsing Password History to Enforce Locking Down a Client Computer

line Security Protecting Your EmailUnderstanding Confidentiality Setting the Time between Password Dealing with SpamUnderstanding Integrity Changes Relaying EmailUnderstanding Availability Using Password Group Policies to Securing Internet ExplorerDefining Threats and Risk Management Enforce Security Looking at Cookies and Privacy SettingsUnderstanding the Principle of Least Understanding Common Attack Methods Examining Content ZonesPrivilege Examining Hardware Firewalls and Their Phishing and PharmingUnderstanding Attack Surface Characteristics Protecting Your ServerUnderstanding Social Engineering Using Hardware Firewalls versus Placing the ServerLinking Cost with Security Software Firewalls Hardening the ServerLooking at Physical Security as the First Using Stateful versus Stateless Using Secure Dynamic DNSLine of Defense InspectionUnderstanding Site Security Controlling Access with Network AccessUnderstanding Computer Security Protection (NAP) lineAuthenticating with What You Know Understanding the Purpose of NAP Understanding ConfidentialityAuthenticating with What You Own or Looking at How NAP Works Understanding IntegrityPossess Examining the Requirements for NAP Understanding AvailabilityAuthenticating with What You Are Using Isolation to Protect the Network Defining Threats and Risk ManagementIntroducing RADIUS and TACACS1 Understanding Virtual LANs Understanding the Principle of LeastUsing Run As Understanding Routing PrivilegeIntroducing Directory Services with Active Looking at Intrusion Detection and Understanding Attack SurfaceDirectory Intrusion Prevention Systems Understanding Social EngineeringLooking at Domain Controllers Looking at Honeypots Linking Cost with SecurityIntroducing NTLM Looking at DMZs Looking at Physical Security as the FirstIntroducing Kerberos Understanding Network Address Line of DefenseUsing Organizational Units Translation (NAT) Understanding Site SecurityLooking at Objects Understanding Virtual Private Networks Understanding Computer SecurityUsing Groups (VPNs) Authenticating with What You KnowLooking at Web Server Authentication Understanding Internet Protocol Security Authenticating with What You Own orComparing Rights and Permissions (IPsec) PossessLooking at NTFS Using Other VPN Protocols Authenticating with What You AreUsing NTFS Permissions Looking at Server and Domain Isolation Introducing RADIUS and TACACS1Looking at Effective NTFS Permissions Protecting Data with Protocol Security Using Run AsCopying and Moving Files Understanding Tunneling Introducing Directory Services with ActiveUsing Folder and File Owners Using DNS Security Extensions DirectorySharing Drives and Folders (DNSSEC) Looking at Domain ControllersLooking at Special and Administrative Looking at Protocol Spoofing Introducing NTLMShares Utilizing Network Sniffing Introducing KerberosIntroducing the Registry Understanding Common NETWORK Using Organizational UnitsUsing Encryption to Protect Data Attack Methods Looking at ObjectsExamining Types of Encryption Securing Wireless Network Using GroupsIntroducing Public Key Infrastructure Using Service Set Identifier (SSID) Looking at Web Server AuthenticationEncrypting Email Understanding Keys Comparing Rights and PermissionsEncrypting Files with EFS Utilizing MAC Filters Looking at NTFSEncrypting Disks in Windows Considering Pros and Cons of Specific Using NTFS PermissionsIntroducing IPSec Security Types Looking at Effective NTFS PermissionsEncrypting with VPN Technology Protecting Your Computer from Malware Copying and Moving FilesUsing Auditing to Complete the Security Utilizing Windows Updates Using Folder and File OwnersPicture Utilizing User Account Control Sharing Drives and FoldersUsing Password Complexity to Make a Using Windows Firewall Looking at Special and AdministrativeStronger Password Using Offline Files SharesUsing Account Lockout to Prevent Hacking Locking Down a Client Computer Introducing the RegistryLooking at Password Length Protecting Your Email Using Encryption to Protect DataUsing Password History to Enforce Security Dealing with Spam Examining Types of EncryptionSetting the Time between Password Relaying Email Introducing Public Key InfrastructureChanges Securing Internet Explorer Encrypting EmailUsing Password Group Policies to Enforce Looking at Cookies and Privacy Settings Encrypting Files with EFSSecurity Examining Content Zones Encrypting Disks in WindowsUnderstanding Common Attack Methods Phishing and Pharming Introducing IPSecExamining Hardware Firewalls and Their Protecting Your Server Encrypting with VPN TechnologyCharacteristics Placing the Server Using Auditing to Complete the SecurityUsing Hardware Firewalls versus Software Hardening the Server PictureFirewalls Using Secure Dynamic DNS Using Password Complexity to Make a

Page 33: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Using Stateful versus Stateless Inspection Stronger PasswordControlling Access with Network Access Understanding Network Security Using Account Lockout to Prevent HackingProtection (NAP) line Looking at Password LengthUnderstanding the Purpose of NAP Using Dedicated Firewalls to Protect a Using Password History to EnforceLooking at How NAP Works Network SecurityExamining the Requirements for NAP Setting the Time between PasswordUsing Isolation to Protect the Network ChangesUnderstanding Virtual LANs line Using Password Group Policies to EnforceUnderstanding Routing Understanding Confidentiality SecurityLooking at Intrusion Detection and Intrusion Understanding Integrity Understanding Common Attack MethodsPrevention Systems Understanding Availability Examining Hardware Firewalls and TheirLooking at Honeypots Defining Threats and Risk Management CharacteristicsLooking at DMZs Understanding the Principle of Least Using Hardware Firewalls versus SoftwareUnderstanding Network Address Translation Privilege Firewalls(NAT) Understanding Attack Surface Using Stateful versus Stateless InspectionUnderstanding Virtual Private Networks Understanding Social Engineering Controlling Access with Network Access(VPNs) Linking Cost with Security Protection (NAP)Understanding Internet Protocol Security Looking at Physical Security as the First Understanding the Purpose of NAP(IPsec) Line of Defense Looking at How NAP WorksUsing Other VPN Protocols Understanding Site Security Examining the Requirements for NAPLooking at Server and Domain Isolation Understanding Computer Security Using Isolation to Protect the NetworkProtecting Data with Protocol Security Authenticating with What You Know Understanding Virtual LANsUnderstanding Tunneling Authenticating with What You Own or Understanding RoutingUsing DNS Security Extensions (DNSSEC) Possess Looking at Intrusion Detection andLooking at Protocol Spoofing Authenticating with What You Are Intrusion Prevention SystemsUtilizing Network Sniffing Introducing RADIUS and TACACS1 Looking at HoneypotsUnderstanding Common NETWORK Attack Using Run As Looking at DMZsMethods Introducing Directory Services with Active Understanding Network AddressSecuring Wireless Network Directory Translation (NAT)Using Service Set Identifier (SSID) Looking at Domain Controllers Understanding Virtual Private NetworksUnderstanding Keys Introducing NTLM (VPNs)Utilizing MAC Filters Introducing Kerberos Understanding Internet Protocol SecurityConsidering Pros and Cons of Specific Using Organizational Units (IPsec)Security Types Looking at Objects Using Other VPN ProtocolsProtecting Your Computer from Malware Using Groups Looking at Server and Domain IsolationUtilizing Windows Updates Looking at Web Server Authentication Protecting Data with Protocol SecurityUtilizing User Account Control Comparing Rights and Permissions Understanding TunnelingUsing Windows Firewall Looking at NTFS Using DNS Security Extensions (DNSSEC)Using Offline Files Using NTFS Permissions Looking at Protocol SpoofingLocking Down a Client Computer Looking at Effective NTFS Permissions Utilizing Network SniffingProtecting Your Email Copying and Moving Files Understanding Common NETWORKDealing with Spam Using Folder and File Owners Attack MethodsRelaying Email Sharing Drives and Folders Securing Wireless NetworkSecuring Internet Explorer Looking at Special and Administrative Using Service Set Identifier (SSID)Looking at Cookies and Privacy Settings Shares Understanding KeysExamining Content Zones Introducing the Registry Utilizing MAC FiltersPhishing and Pharming Using Encryption to Protect Data Considering Pros and Cons of SpecificProtecting Your Server Examining Types of Encryption Security TypesPlacing the Server Introducing Public Key Infrastructure Protecting Your Computer from MalwareHardening the Server Encrypting Email Utilizing Windows UpdatesUsing Secure Dynamic DNS Encrypting Files with EFS Utilizing User Account Control

Encrypting Disks in Windows Using Windows FirewallIntroducing IPSec Using Offline Files

line Encrypting with VPN Technology Locking Down a Client ComputerUnderstanding Confidentiality Using Auditing to Complete the Security Protecting Your EmailUnderstanding Integrity Picture Dealing with SpamUnderstanding Availability Using Password Complexity to Make a Relaying EmailDefining Threats and Risk Management Stronger Password Securing Internet ExplorerUnderstanding the Principle of Least Using Account Lockout to Prevent Looking at Cookies and Privacy SettingsPrivilege Hacking Examining Content ZonesUnderstanding Attack Surface Looking at Password Length Phishing and PharmingUnderstanding Social Engineering Using Password History to Enforce Protecting Your ServerLinking Cost with Security Security Placing the ServerLooking at Physical Security as the First Setting the Time between Password Hardening the ServerLine of Defense Changes Using Secure Dynamic DNSUnderstanding Site Security Using Password Group Policies to

Page 34: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Understanding Computer Security Enforce SecurityAuthenticating with What You Know Understanding Common Attack Methods lineAuthenticating with What You Own or Examining Hardware Firewalls and Their Understanding ConfidentialityPossess Characteristics Understanding IntegrityAuthenticating with What You Are Using Hardware Firewalls versus Understanding AvailabilityIntroducing RADIUS and TACACS1 Software Firewalls Defining Threats and Risk ManagementUsing Run As Using Stateful versus Stateless Understanding the Principle of LeastIntroducing Directory Services with Active Inspection PrivilegeDirectory Controlling Access with Network Access Understanding Attack SurfaceLooking at Domain Controllers Protection (NAP) Understanding Social EngineeringIntroducing NTLM Understanding the Purpose of NAP Linking Cost with SecurityIntroducing Kerberos Looking at How NAP Works Looking at Physical Security as the FirstUsing Organizational Units Examining the Requirements for NAP Line of DefenseLooking at Objects Using Isolation to Protect the Network Understanding Site SecurityUsing Groups Understanding Virtual LANs Understanding Computer SecurityLooking at Web Server Authentication Understanding Routing Authenticating with What You KnowComparing Rights and Permissions Looking at Intrusion Detection and Authenticating with What You Own orLooking at NTFS Intrusion Prevention Systems PossessUsing NTFS Permissions Looking at Honeypots Authenticating with What You AreLooking at Effective NTFS Permissions Looking at DMZs Introducing RADIUS and TACACS1Copying and Moving Files Understanding Network Address Using Run AsUsing Folder and File Owners Translation (NAT) Introducing Directory Services with ActiveSharing Drives and Folders Understanding Virtual Private Networks DirectoryLooking at Special and Administrative (VPNs) Looking at Domain ControllersShares Understanding Internet Protocol Security Introducing NTLMIntroducing the Registry (IPsec) Introducing KerberosUsing Encryption to Protect Data Using Other VPN Protocols Using Organizational UnitsExamining Types of Encryption Looking at Server and Domain Isolation Looking at ObjectsIntroducing Public Key Infrastructure Protecting Data with Protocol Security Using GroupsEncrypting Email Understanding Tunneling Looking at Web Server AuthenticationEncrypting Files with EFS Using DNS Security Extensions Comparing Rights and PermissionsEncrypting Disks in Windows (DNSSEC) Looking at NTFSIntroducing IPSec Looking at Protocol Spoofing Using NTFS PermissionsEncrypting with VPN Technology Utilizing Network Sniffing Looking at Effective NTFS PermissionsUsing Auditing to Complete the Security Understanding Common NETWORK Copying and Moving FilesPicture Attack Methods Using Folder and File OwnersUsing Password Complexity to Make a Securing Wireless Network Sharing Drives and FoldersStronger Password Using Service Set Identifier (SSID) Looking at Special and AdministrativeUsing Account Lockout to Prevent Hacking Understanding Keys SharesLooking at Password Length Utilizing MAC Filters Introducing the RegistryUsing Password History to Enforce Security Considering Pros and Cons of Specific Using Encryption to Protect DataSetting the Time between Password Security Types Examining Types of EncryptionChanges Protecting Your Computer from Malware Introducing Public Key InfrastructureUsing Password Group Policies to Enforce Utilizing Windows Updates Encrypting EmailSecurity Utilizing User Account Control Encrypting Files with EFSUnderstanding Common Attack Methods Using Windows Firewall Encrypting Disks in WindowsExamining Hardware Firewalls and Their Using Offline Files Introducing IPSecCharacteristics Locking Down a Client Computer Encrypting with VPN TechnologyUsing Hardware Firewalls versus Software Protecting Your Email Using Auditing to Complete the SecurityFirewalls Dealing with Spam PictureUsing Stateful versus Stateless Inspection Relaying Email Using Password Complexity to Make aControlling Access with Network Access Securing Internet Explorer Stronger PasswordProtection (NAP) Looking at Cookies and Privacy Settings Using Account Lockout to Prevent HackingUnderstanding the Purpose of NAP Examining Content Zones Looking at Password LengthLooking at How NAP Works Phishing and Pharming Using Password History to EnforceExamining the Requirements for NAP Protecting Your Server SecurityUsing Isolation to Protect the Network Placing the Server Setting the Time between PasswordUnderstanding Virtual LANs Hardening the Server ChangesUnderstanding Routing Using Secure Dynamic DNS Using Password Group Policies to EnforceLooking at Intrusion Detection and Intrusion SecurityPrevention Systems Understanding Common Attack MethodsLooking at Honeypots line Examining Hardware Firewalls and TheirLooking at DMZs Understanding Confidentiality CharacteristicsUnderstanding Network Address Translation Understanding Integrity Using Hardware Firewalls versus Software(NAT) Understanding Availability FirewallsUnderstanding Virtual Private Networks Defining Threats and Risk Management Using Stateful versus Stateless Inspection

Page 35: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

(VPNs) Understanding the Principle of Least Controlling Access with Network AccessUnderstanding Internet Protocol Security Privilege Protection (NAP)(IPsec) Understanding Attack Surface Understanding the Purpose of NAPUsing Other VPN Protocols Understanding Social Engineering Looking at How NAP WorksLooking at Server and Domain Isolation Linking Cost with Security Examining the Requirements for NAPProtecting Data with Protocol Security Looking at Physical Security as the First Using Isolation to Protect the NetworkUnderstanding Tunneling Line of Defense Understanding Virtual LANsUsing DNS Security Extensions (DNSSEC) Understanding Site Security Understanding RoutingLooking at Protocol Spoofing Understanding Computer Security Looking at Intrusion Detection andUtilizing Network Sniffing Authenticating with What You Know Intrusion Prevention SystemsUnderstanding Common NETWORK Attack Authenticating with What You Own or Looking at HoneypotsMethods Possess Looking at DMZsSecuring Wireless Network Authenticating with What You Are Understanding Network AddressUsing Service Set Identifier (SSID) Introducing RADIUS and TACACS1 Translation (NAT)Understanding Keys Using Run As Understanding Virtual Private NetworksUtilizing MAC Filters Introducing Directory Services with Active (VPNs)Considering Pros and Cons of Specific Directory Understanding Internet Protocol SecuritySecurity Types Looking at Domain Controllers (IPsec)Protecting Your Computer from Malware Introducing NTLM Using Other VPN ProtocolsUtilizing Windows Updates Introducing Kerberos Looking at Server and Domain IsolationUtilizing User Account Control Using Organizational Units Protecting Data with Protocol SecurityUsing Windows Firewall Looking at Objects Understanding TunnelingUsing Offline Files Using Groups Using DNS Security Extensions (DNSSEC)Locking Down a Client Computer Looking at Web Server Authentication Looking at Protocol SpoofingProtecting Your Email Comparing Rights and Permissions Utilizing Network SniffingDealing with Spam Looking at NTFS Understanding Common NETWORKRelaying Email Using NTFS Permissions Attack MethodsSecuring Internet Explorer Looking at Effective NTFS Permissions Securing Wireless NetworkLooking at Cookies and Privacy Settings Copying and Moving Files Using Service Set Identifier (SSID)Examining Content Zones Using Folder and File Owners Understanding KeysPhishing and Pharming Sharing Drives and Folders Utilizing MAC FiltersProtecting Your Server Looking at Special and Administrative Considering Pros and Cons of SpecificPlacing the Server Shares Security TypesHardening the Server Introducing the Registry Protecting Your Computer from MalwareUsing Secure Dynamic DNS Using Encryption to Protect Data Utilizing Windows Updates

Examining Types of Encryption Utilizing User Account ControlIntroducing Public Key Infrastructure Using Windows Firewall

line Encrypting Email Using Offline FilesUnderstanding Confidentiality Encrypting Files with EFS Locking Down a Client ComputerUnderstanding Integrity Encrypting Disks in Windows Protecting Your EmailUnderstanding Availability Introducing IPSec Dealing with SpamDefining Threats and Risk Management Encrypting with VPN Technology Relaying EmailUnderstanding the Principle of Least Using Auditing to Complete the Security Securing Internet ExplorerPrivilege Picture Looking at Cookies and Privacy SettingsUnderstanding Attack Surface Using Password Complexity to Make a Examining Content ZonesUnderstanding Social Engineering Stronger Password Phishing and PharmingLinking Cost with Security Using Account Lockout to Prevent Protecting Your ServerLooking at Physical Security as the First Hacking Placing the ServerLine of Defense Looking at Password Length Hardening the ServerUnderstanding Site Security Using Password History to Enforce Using Secure Dynamic DNSUnderstanding Computer Security SecurityAuthenticating with What You Know Setting the Time between PasswordAuthenticating with What You Own or Changes linePossess Using Password Group Policies to Understanding ConfidentialityAuthenticating with What You Are Enforce Security Understanding IntegrityIntroducing RADIUS and TACACS1 Understanding Common Attack Methods Understanding AvailabilityUsing Run As Examining Hardware Firewalls and Their Defining Threats and Risk ManagementIntroducing Directory Services with Active Characteristics Understanding the Principle of LeastDirectory Using Hardware Firewalls versus PrivilegeLooking at Domain Controllers Software Firewalls Understanding Attack SurfaceIntroducing NTLM Using Stateful versus Stateless Understanding Social EngineeringIntroducing Kerberos Inspection Linking Cost with SecurityUsing Organizational Units Controlling Access with Network Access Looking at Physical Security as the FirstLooking at Objects Protection (NAP) Line of DefenseUsing Groups Understanding the Purpose of NAP Understanding Site SecurityLooking at Web Server Authentication Looking at How NAP Works Understanding Computer Security

Page 36: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Comparing Rights and Permissions Examining the Requirements for NAP Authenticating with What You KnowLooking at NTFS Using Isolation to Protect the Network Authenticating with What You Own orUsing NTFS Permissions Understanding Virtual LANs PossessLooking at Effective NTFS Permissions Understanding Routing Authenticating with What You AreCopying and Moving Files Looking at Intrusion Detection and Introducing RADIUS and TACACS1Using Folder and File Owners Intrusion Prevention Systems Using Run AsSharing Drives and Folders Looking at Honeypots Introducing Directory Services with ActiveLooking at Special and Administrative Looking at DMZs DirectoryShares Understanding Network Address Looking at Domain ControllersIntroducing the Registry Translation (NAT) Introducing NTLMUsing Encryption to Protect Data Understanding Virtual Private Networks Introducing KerberosExamining Types of Encryption (VPNs) Using Organizational UnitsIntroducing Public Key Infrastructure Understanding Internet Protocol Security Looking at ObjectsEncrypting Email (IPsec) Using GroupsEncrypting Files with EFS Using Other VPN Protocols Looking at Web Server AuthenticationEncrypting Disks in Windows Looking at Server and Domain Isolation Comparing Rights and PermissionsIntroducing IPSec Protecting Data with Protocol Security Looking at NTFSEncrypting with VPN Technology Understanding Tunneling Using NTFS PermissionsUsing Auditing to Complete the Security Using DNS Security Extensions Looking at Effective NTFS PermissionsPicture (DNSSEC) Copying and Moving FilesUsing Password Complexity to Make a Looking at Protocol Spoofing Using Folder and File OwnersStronger Password Utilizing Network Sniffing Sharing Drives and FoldersUsing Account Lockout to Prevent Hacking Understanding Common NETWORK Looking at Special and AdministrativeLooking at Password Length Attack Methods SharesUsing Password History to Enforce Security Securing Wireless Network Introducing the RegistrySetting the Time between Password Using Service Set Identifier (SSID) Using Encryption to Protect DataChanges Understanding Keys Examining Types of EncryptionUsing Password Group Policies to Enforce Utilizing MAC Filters Introducing Public Key InfrastructureSecurity Considering Pros and Cons of Specific Encrypting EmailUnderstanding Common Attack Methods Security Types Encrypting Files with EFSExamining Hardware Firewalls and Their Protecting Your Computer from Malware Encrypting Disks in WindowsCharacteristics Utilizing Windows Updates Introducing IPSecUsing Hardware Firewalls versus Software Utilizing User Account Control Encrypting with VPN TechnologyFirewalls Using Windows Firewall Using Auditing to Complete the SecurityUsing Stateful versus Stateless Inspection Using Offline Files PictureControlling Access with Network Access Locking Down a Client Computer Using Password Complexity to Make aProtection (NAP) Protecting Your Email Stronger PasswordUnderstanding the Purpose of NAP Dealing with Spam Using Account Lockout to Prevent HackingLooking at How NAP Works Relaying Email Looking at Password LengthExamining the Requirements for NAP Securing Internet Explorer Using Password History to EnforceUsing Isolation to Protect the Network Looking at Cookies and Privacy Settings SecurityUnderstanding Virtual LANs Examining Content Zones Setting the Time between PasswordUnderstanding Routing Phishing and Pharming ChangesLooking at Intrusion Detection and Intrusion Protecting Your Server Using Password Group Policies to EnforcePrevention Systems Placing the Server SecurityLooking at Honeypots Hardening the Server Understanding Common Attack MethodsLooking at DMZs Using Secure Dynamic DNS Examining Hardware Firewalls and TheirUnderstanding Network Address Translation Characteristics(NAT) Using Hardware Firewalls versus SoftwareUnderstanding Virtual Private Networks line Firewalls(VPNs) Understanding Confidentiality Using Stateful versus Stateless InspectionUnderstanding Internet Protocol Security Understanding Integrity Controlling Access with Network Access(IPsec) Understanding Availability Protection (NAP)Using Other VPN Protocols Defining Threats and Risk Management Understanding the Purpose of NAPLooking at Server and Domain Isolation Understanding the Principle of Least Looking at How NAP WorksProtecting Data with Protocol Security Privilege Examining the Requirements for NAPUnderstanding Tunneling Understanding Attack Surface Using Isolation to Protect the NetworkUsing DNS Security Extensions (DNSSEC) Understanding Social Engineering Understanding Virtual LANsLooking at Protocol Spoofing Linking Cost with Security Understanding RoutingUtilizing Network Sniffing Looking at Physical Security as the First Looking at Intrusion Detection andUnderstanding Common NETWORK Attack Line of Defense Intrusion Prevention SystemsMethods Understanding Site Security Looking at HoneypotsSecuring Wireless Network Understanding Computer Security Looking at DMZsUsing Service Set Identifier (SSID) Authenticating with What You Know Understanding Network AddressUnderstanding Keys Authenticating with What You Own or Translation (NAT)Utilizing MAC Filters Possess Understanding Virtual Private Networks

Page 37: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Considering Pros and Cons of Specific Authenticating with What You Are (VPNs)Security Types Introducing RADIUS and TACACS1 Understanding Internet Protocol SecurityProtecting Your Computer from Malware Using Run As (IPsec)Utilizing Windows Updates Introducing Directory Services with Active Using Other VPN ProtocolsUtilizing User Account Control Directory Looking at Server and Domain IsolationUsing Windows Firewall Looking at Domain Controllers Protecting Data with Protocol SecurityUsing Offline Files Introducing NTLM Understanding TunnelingLocking Down a Client Computer Introducing Kerberos Using DNS Security Extensions (DNSSEC)Protecting Your Email Using Organizational Units Looking at Protocol SpoofingDealing with Spam Looking at Objects Utilizing Network SniffingRelaying Email Using Groups Understanding Common NETWORKSecuring Internet Explorer Looking at Web Server Authentication Attack MethodsLooking at Cookies and Privacy Settings Comparing Rights and Permissions Securing Wireless NetworkExamining Content Zones Looking at NTFS Using Service Set Identifier (SSID)Phishing and Pharming Using NTFS Permissions Understanding KeysProtecting Your Server Looking at Effective NTFS Permissions Utilizing MAC FiltersPlacing the Server Copying and Moving Files Considering Pros and Cons of SpecificHardening the Server Using Folder and File Owners Security TypesUsing Secure Dynamic DNS Sharing Drives and Folders Protecting Your Computer from Malware

Looking at Special and Administrative Utilizing Windows UpdatesShares Utilizing User Account Control

line Introducing the Registry Using Windows FirewallUnderstanding Confidentiality Using Encryption to Protect Data Using Offline FilesUnderstanding Integrity Examining Types of Encryption Locking Down a Client ComputerUnderstanding Availability Introducing Public Key Infrastructure Protecting Your EmailDefining Threats and Risk Management Encrypting Email Dealing with SpamUnderstanding the Principle of Least Encrypting Files with EFS Relaying EmailPrivilege Encrypting Disks in Windows Securing Internet ExplorerUnderstanding Attack Surface Introducing IPSec Looking at Cookies and Privacy SettingsUnderstanding Social Engineering Encrypting with VPN Technology Examining Content ZonesLinking Cost with Security Using Auditing to Complete the Security Phishing and PharmingLooking at Physical Security as the First Picture Protecting Your ServerLine of Defense Using Password Complexity to Make a Placing the ServerUnderstanding Site Security Stronger Password Hardening the ServerUnderstanding Computer Security Using Account Lockout to Prevent Using Secure Dynamic DNSAuthenticating with What You Know HackingAuthenticating with What You Own or Looking at Password LengthPossess Using Password History to Enforce lineAuthenticating with What You Are Security Understanding ConfidentialityIntroducing RADIUS and TACACS1 Setting the Time between Password Understanding IntegrityUsing Run As Changes Understanding AvailabilityIntroducing Directory Services with Active Using Password Group Policies to Defining Threats and Risk ManagementDirectory Enforce Security Understanding the Principle of LeastLooking at Domain Controllers Understanding Common Attack Methods PrivilegeIntroducing NTLM Examining Hardware Firewalls and Their Understanding Attack SurfaceIntroducing Kerberos Characteristics Understanding Social EngineeringUsing Organizational Units Using Hardware Firewalls versus Linking Cost with SecurityLooking at Objects Software Firewalls Looking at Physical Security as the FirstUsing Groups Using Stateful versus Stateless Line of DefenseLooking at Web Server Authentication Inspection Understanding Site SecurityComparing Rights and Permissions Controlling Access with Network Access Understanding Computer SecurityLooking at NTFS Protection (NAP) Authenticating with What You KnowUsing NTFS Permissions Understanding the Purpose of NAP Authenticating with What You Own orLooking at Effective NTFS Permissions Looking at How NAP Works PossessCopying and Moving Files Examining the Requirements for NAP Authenticating with What You AreUsing Folder and File Owners Using Isolation to Protect the Network Introducing RADIUS and TACACS1Sharing Drives and Folders Understanding Virtual LANs Using Run AsLooking at Special and Administrative Understanding Routing Introducing Directory Services with ActiveShares Looking at Intrusion Detection and DirectoryIntroducing the Registry Intrusion Prevention Systems Looking at Domain ControllersUsing Encryption to Protect Data Looking at Honeypots Introducing NTLMExamining Types of Encryption Looking at DMZs Introducing KerberosIntroducing Public Key Infrastructure Understanding Network Address Using Organizational UnitsEncrypting Email Translation (NAT) Looking at ObjectsEncrypting Files with EFS Understanding Virtual Private Networks Using GroupsEncrypting Disks in Windows (VPNs) Looking at Web Server Authentication

Page 38: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Introducing IPSec Understanding Internet Protocol Security Comparing Rights and PermissionsEncrypting with VPN Technology (IPsec) Looking at NTFSUsing Auditing to Complete the Security Using Other VPN Protocols Using NTFS PermissionsPicture Looking at Server and Domain Isolation Looking at Effective NTFS PermissionsUsing Password Complexity to Make a Protecting Data with Protocol Security Copying and Moving FilesStronger Password Understanding Tunneling Using Folder and File OwnersUsing Account Lockout to Prevent Hacking Using DNS Security Extensions Sharing Drives and FoldersLooking at Password Length (DNSSEC) Looking at Special and AdministrativeUsing Password History to Enforce Security Looking at Protocol Spoofing SharesSetting the Time between Password Utilizing Network Sniffing Introducing the RegistryChanges Understanding Common NETWORK Using Encryption to Protect DataUsing Password Group Policies to Enforce Attack Methods Examining Types of EncryptionSecurity Securing Wireless Network Introducing Public Key InfrastructureUnderstanding Common Attack Methods Using Service Set Identifier (SSID) Encrypting EmailExamining Hardware Firewalls and Their Understanding Keys Encrypting Files with EFSCharacteristics Utilizing MAC Filters Encrypting Disks in WindowsUsing Hardware Firewalls versus Software Considering Pros and Cons of Specific Introducing IPSecFirewalls Security Types Encrypting with VPN TechnologyUsing Stateful versus Stateless Inspection Protecting Your Computer from Malware Using Auditing to Complete the SecurityControlling Access with Network Access Utilizing Windows Updates PictureProtection (NAP) Utilizing User Account Control Using Password Complexity to Make aUnderstanding the Purpose of NAP Using Windows Firewall Stronger PasswordLooking at How NAP Works Using Offline Files Using Account Lockout to Prevent HackingExamining the Requirements for NAP Locking Down a Client Computer Looking at Password LengthUsing Isolation to Protect the Network Protecting Your Email Using Password History to EnforceUnderstanding Virtual LANs Dealing with Spam SecurityUnderstanding Routing Relaying Email Setting the Time between PasswordLooking at Intrusion Detection and Intrusion Securing Internet Explorer ChangesPrevention Systems Looking at Cookies and Privacy Settings Using Password Group Policies to EnforceLooking at Honeypots Examining Content Zones SecurityLooking at DMZs Phishing and Pharming Understanding Common Attack MethodsUnderstanding Network Address Translation Protecting Your Server Examining Hardware Firewalls and Their(NAT) Placing the Server CharacteristicsUnderstanding Virtual Private Networks Hardening the Server Using Hardware Firewalls versus Software(VPNs) Using Secure Dynamic DNS FirewallsUnderstanding Internet Protocol Security Using Stateful versus Stateless Inspection(IPsec) Controlling Access with Network AccessUsing Other VPN Protocols line Protection (NAP)Looking at Server and Domain Isolation Understanding Confidentiality Understanding the Purpose of NAPProtecting Data with Protocol Security Understanding Integrity Looking at How NAP WorksUnderstanding Tunneling Understanding Availability Examining the Requirements for NAPUsing DNS Security Extensions (DNSSEC) Defining Threats and Risk Management Using Isolation to Protect the NetworkLooking at Protocol Spoofing Understanding the Principle of Least Understanding Virtual LANsUtilizing Network Sniffing Privilege Understanding RoutingUnderstanding Common NETWORK Attack Understanding Attack Surface Looking at Intrusion Detection andMethods Understanding Social Engineering Intrusion Prevention SystemsSecuring Wireless Network Linking Cost with Security Looking at HoneypotsUsing Service Set Identifier (SSID) Looking at Physical Security as the First Looking at DMZsUnderstanding Keys Line of Defense Understanding Network AddressUtilizing MAC Filters Understanding Site Security Translation (NAT)Considering Pros and Cons of Specific Understanding Computer Security Understanding Virtual Private NetworksSecurity Types Authenticating with What You Know (VPNs)Protecting Your Computer from Malware Authenticating with What You Own or Understanding Internet Protocol SecurityUtilizing Windows Updates Possess (IPsec)Utilizing User Account Control Authenticating with What You Are Using Other VPN ProtocolsUsing Windows Firewall Introducing RADIUS and TACACS1 Looking at Server and Domain IsolationUsing Offline Files Using Run As Protecting Data with Protocol SecurityLocking Down a Client Computer Introducing Directory Services with Active Understanding TunnelingProtecting Your Email Directory Using DNS Security Extensions (DNSSEC)Dealing with Spam Looking at Domain Controllers Looking at Protocol SpoofingRelaying Email Introducing NTLM Utilizing Network SniffingSecuring Internet Explorer Introducing Kerberos Understanding Common NETWORKLooking at Cookies and Privacy Settings Using Organizational Units Attack MethodsExamining Content Zones Looking at Objects Securing Wireless NetworkPhishing and Pharming Using Groups Using Service Set Identifier (SSID)Protecting Your Server Looking at Web Server Authentication Understanding Keys

Page 39: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Placing the Server Comparing Rights and Permissions Utilizing MAC FiltersHardening the Server Looking at NTFS Considering Pros and Cons of SpecificUsing Secure Dynamic DNS Using NTFS Permissions Security Types

Looking at Effective NTFS Permissions Protecting Your Computer from MalwareCopying and Moving Files Utilizing Windows Updates

line Using Folder and File Owners Utilizing User Account ControlUnderstanding Confidentiality Sharing Drives and Folders Using Windows FirewallUnderstanding Integrity Looking at Special and Administrative Using Offline FilesUnderstanding Availability Shares Locking Down a Client ComputerDefining Threats and Risk Management Introducing the Registry Protecting Your EmailUnderstanding the Principle of Least Using Encryption to Protect Data Dealing with SpamPrivilege Examining Types of Encryption Relaying EmailUnderstanding Attack Surface Introducing Public Key Infrastructure Securing Internet ExplorerUnderstanding Social Engineering Encrypting Email Looking at Cookies and Privacy SettingsLinking Cost with Security Encrypting Files with EFS Examining Content ZonesLooking at Physical Security as the First Encrypting Disks in Windows Phishing and PharmingLine of Defense Introducing IPSec Protecting Your ServerUnderstanding Site Security Encrypting with VPN Technology Placing the ServerUnderstanding Computer Security Using Auditing to Complete the Security Hardening the ServerAuthenticating with What You Know Picture Using Secure Dynamic DNSAuthenticating with What You Own or Using Password Complexity to Make aPossess Stronger PasswordAuthenticating with What You Are Using Account Lockout to Prevent lineIntroducing RADIUS and TACACS1 Hacking Understanding ConfidentialityUsing Run As Looking at Password Length Understanding IntegrityIntroducing Directory Services with Active Using Password History to Enforce Understanding AvailabilityDirectory Security Defining Threats and Risk ManagementLooking at Domain Controllers Setting the Time between Password Understanding the Principle of LeastIntroducing NTLM Changes PrivilegeIntroducing Kerberos Using Password Group Policies to Understanding Attack SurfaceUsing Organizational Units Enforce Security Understanding Social EngineeringLooking at Objects Understanding Common Attack Methods Linking Cost with SecurityUsing Groups Examining Hardware Firewalls and Their Looking at Physical Security as the FirstLooking at Web Server Authentication Characteristics Line of DefenseComparing Rights and Permissions Using Hardware Firewalls versus Understanding Site SecurityLooking at NTFS Software Firewalls Understanding Computer SecurityUsing NTFS Permissions Using Stateful versus Stateless Authenticating with What You KnowLooking at Effective NTFS Permissions Inspection Authenticating with What You Own orCopying and Moving Files Controlling Access with Network Access PossessUsing Folder and File Owners Protection (NAP) Authenticating with What You AreSharing Drives and Folders Understanding the Purpose of NAP Introducing RADIUS and TACACS1Looking at Special and Administrative Looking at How NAP Works Using Run AsShares Examining the Requirements for NAP Introducing Directory Services with ActiveIntroducing the Registry Using Isolation to Protect the Network DirectoryUsing Encryption to Protect Data Understanding Virtual LANs Looking at Domain ControllersExamining Types of Encryption Understanding Routing Introducing NTLMIntroducing Public Key Infrastructure Looking at Intrusion Detection and Introducing KerberosEncrypting Email Intrusion Prevention Systems Using Organizational UnitsEncrypting Files with EFS Looking at Honeypots Looking at ObjectsEncrypting Disks in Windows Looking at DMZs Using GroupsIntroducing IPSec Understanding Network Address Looking at Web Server AuthenticationEncrypting with VPN Technology Translation (NAT) Comparing Rights and PermissionsUsing Auditing to Complete the Security Understanding Virtual Private Networks Looking at NTFSPicture (VPNs) Using NTFS PermissionsUsing Password Complexity to Make a Understanding Internet Protocol Security Looking at Effective NTFS PermissionsStronger Password (IPsec) Copying and Moving FilesUsing Account Lockout to Prevent Hacking Using Other VPN Protocols Using Folder and File OwnersLooking at Password Length Looking at Server and Domain Isolation Sharing Drives and FoldersUsing Password History to Enforce Security Protecting Data with Protocol Security Looking at Special and AdministrativeSetting the Time between Password Understanding Tunneling SharesChanges Using DNS Security Extensions Introducing the RegistryUsing Password Group Policies to Enforce (DNSSEC) Using Encryption to Protect DataSecurity Looking at Protocol Spoofing Examining Types of EncryptionUnderstanding Common Attack Methods Utilizing Network Sniffing Introducing Public Key InfrastructureExamining Hardware Firewalls and Their Understanding Common NETWORK Encrypting EmailCharacteristics Attack Methods Encrypting Files with EFS

Page 40: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Using Hardware Firewalls versus Software Securing Wireless Network Encrypting Disks in WindowsFirewalls Using Service Set Identifier (SSID) Introducing IPSecUsing Stateful versus Stateless Inspection Understanding Keys Encrypting with VPN TechnologyControlling Access with Network Access Utilizing MAC Filters Using Auditing to Complete the SecurityProtection (NAP) Considering Pros and Cons of Specific PictureUnderstanding the Purpose of NAP Security Types Using Password Complexity to Make aLooking at How NAP Works Protecting Your Computer from Malware Stronger PasswordExamining the Requirements for NAP Utilizing Windows Updates Using Account Lockout to Prevent HackingUsing Isolation to Protect the Network Utilizing User Account Control Looking at Password LengthUnderstanding Virtual LANs Using Windows Firewall Using Password History to EnforceUnderstanding Routing Using Offline Files SecurityLooking at Intrusion Detection and Intrusion Locking Down a Client Computer Setting the Time between PasswordPrevention Systems Protecting Your Email ChangesLooking at Honeypots Dealing with Spam Using Password Group Policies to EnforceLooking at DMZs Relaying Email SecurityUnderstanding Network Address Translation Securing Internet Explorer Understanding Common Attack Methods(NAT) Looking at Cookies and Privacy Settings Examining Hardware Firewalls and TheirUnderstanding Virtual Private Networks Examining Content Zones Characteristics(VPNs) Phishing and Pharming Using Hardware Firewalls versus SoftwareUnderstanding Internet Protocol Security Protecting Your Server Firewalls(IPsec) Placing the Server Using Stateful versus Stateless InspectionUsing Other VPN Protocols Hardening the Server Controlling Access with Network AccessLooking at Server and Domain Isolation Using Secure Dynamic DNS Protection (NAP)Protecting Data with Protocol Security Understanding the Purpose of NAPUnderstanding Tunneling Looking at How NAP WorksUsing DNS Security Extensions (DNSSEC) line Examining the Requirements for NAPLooking at Protocol Spoofing Understanding Confidentiality Using Isolation to Protect the NetworkUtilizing Network Sniffing Understanding Integrity Understanding Virtual LANsUnderstanding Common NETWORK Attack Understanding Availability Understanding RoutingMethods Defining Threats and Risk Management Looking at Intrusion Detection andSecuring Wireless Network Understanding the Principle of Least Intrusion Prevention SystemsUsing Service Set Identifier (SSID) Privilege Looking at HoneypotsUnderstanding Keys Understanding Attack Surface Looking at DMZsUtilizing MAC Filters Understanding Social Engineering Understanding Network AddressConsidering Pros and Cons of Specific Linking Cost with Security Translation (NAT)Security Types Looking at Physical Security as the First Understanding Virtual Private NetworksProtecting Your Computer from Malware Line of Defense (VPNs)Utilizing Windows Updates Understanding Site Security Understanding Internet Protocol SecurityUtilizing User Account Control Understanding Computer Security (IPsec)Using Windows Firewall Authenticating with What You Know Using Other VPN ProtocolsUsing Offline Files Authenticating with What You Own or Looking at Server and Domain IsolationLocking Down a Client Computer Possess Protecting Data with Protocol SecurityProtecting Your Email Authenticating with What You Are Understanding TunnelingDealing with Spam Introducing RADIUS and TACACS1 Using DNS Security Extensions (DNSSEC)Relaying Email Using Run As Looking at Protocol SpoofingSecuring Internet Explorer Introducing Directory Services with Active Utilizing Network SniffingLooking at Cookies and Privacy Settings Directory Understanding Common NETWORKExamining Content Zones Looking at Domain Controllers Attack MethodsPhishing and Pharming Introducing NTLM Securing Wireless NetworkProtecting Your Server Introducing Kerberos Using Service Set Identifier (SSID)Placing the Server Using Organizational Units Understanding KeysHardening the Server Looking at Objects Utilizing MAC FiltersUsing Secure Dynamic DNS Using Groups Considering Pros and Cons of Specific

Looking at Web Server Authentication Security TypesComparing Rights and Permissions Protecting Your Computer from Malware

line Looking at NTFS Utilizing Windows UpdatesUnderstanding Confidentiality Using NTFS Permissions Utilizing User Account ControlUnderstanding Integrity Looking at Effective NTFS Permissions Using Windows FirewallUnderstanding Availability Copying and Moving Files Using Offline FilesDefining Threats and Risk Management Using Folder and File Owners Locking Down a Client ComputerUnderstanding the Principle of Least Sharing Drives and Folders Protecting Your EmailPrivilege Looking at Special and Administrative Dealing with SpamUnderstanding Attack Surface Shares Relaying EmailUnderstanding Social Engineering Introducing the Registry Securing Internet ExplorerLinking Cost with Security Using Encryption to Protect Data Looking at Cookies and Privacy SettingsLooking at Physical Security as the First Examining Types of Encryption Examining Content Zones

Page 41: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Line of Defense Introducing Public Key Infrastructure Phishing and PharmingUnderstanding Site Security Encrypting Email Protecting Your ServerUnderstanding Computer Security Encrypting Files with EFS Placing the ServerAuthenticating with What You Know Encrypting Disks in Windows Hardening the ServerAuthenticating with What You Own or Introducing IPSec Using Secure Dynamic DNSPossess Encrypting with VPN TechnologyAuthenticating with What You Are Using Auditing to Complete the SecurityIntroducing RADIUS and TACACS1 Picture lineUsing Run As Using Password Complexity to Make a Understanding ConfidentialityIntroducing Directory Services with Active Stronger Password Understanding IntegrityDirectory Using Account Lockout to Prevent Understanding AvailabilityLooking at Domain Controllers Hacking Defining Threats and Risk ManagementIntroducing NTLM Looking at Password Length Understanding the Principle of LeastIntroducing Kerberos Using Password History to Enforce PrivilegeUsing Organizational Units Security Understanding Attack SurfaceLooking at Objects Setting the Time between Password Understanding Social EngineeringUsing Groups Changes Linking Cost with SecurityLooking at Web Server Authentication Using Password Group Policies to Looking at Physical Security as the FirstComparing Rights and Permissions Enforce Security Line of DefenseLooking at NTFS Understanding Common Attack Methods Understanding Site SecurityUsing NTFS Permissions Examining Hardware Firewalls and Their Understanding Computer SecurityLooking at Effective NTFS Permissions Characteristics Authenticating with What You KnowCopying and Moving Files Using Hardware Firewalls versus Authenticating with What You Own orUsing Folder and File Owners Software Firewalls PossessSharing Drives and Folders Using Stateful versus Stateless Authenticating with What You AreLooking at Special and Administrative Inspection Introducing RADIUS and TACACS1Shares Controlling Access with Network Access Using Run AsIntroducing the Registry Protection (NAP) Introducing Directory Services with ActiveUsing Encryption to Protect Data Understanding the Purpose of NAP DirectoryExamining Types of Encryption Looking at How NAP Works Looking at Domain ControllersIntroducing Public Key Infrastructure Examining the Requirements for NAP Introducing NTLMEncrypting Email Using Isolation to Protect the Network Introducing KerberosEncrypting Files with EFS Understanding Virtual LANs Using Organizational UnitsEncrypting Disks in Windows Understanding Routing Looking at ObjectsIntroducing IPSec Looking at Intrusion Detection and Using GroupsEncrypting with VPN Technology Intrusion Prevention Systems Looking at Web Server AuthenticationUsing Auditing to Complete the Security Looking at Honeypots Comparing Rights and PermissionsPicture Looking at DMZs Looking at NTFSUsing Password Complexity to Make a Understanding Network Address Using NTFS PermissionsStronger Password Translation (NAT) Looking at Effective NTFS PermissionsUsing Account Lockout to Prevent Hacking Understanding Virtual Private Networks Copying and Moving FilesLooking at Password Length (VPNs) Using Folder and File OwnersUsing Password History to Enforce Security Understanding Internet Protocol Security Sharing Drives and FoldersSetting the Time between Password (IPsec) Looking at Special and AdministrativeChanges Using Other VPN Protocols SharesUsing Password Group Policies to Enforce Looking at Server and Domain Isolation Introducing the RegistrySecurity Protecting Data with Protocol Security Using Encryption to Protect DataUnderstanding Common Attack Methods Understanding Tunneling Examining Types of EncryptionExamining Hardware Firewalls and Their Using DNS Security Extensions Introducing Public Key InfrastructureCharacteristics (DNSSEC) Encrypting EmailUsing Hardware Firewalls versus Software Looking at Protocol Spoofing Encrypting Files with EFSFirewalls Utilizing Network Sniffing Encrypting Disks in WindowsUsing Stateful versus Stateless Inspection Understanding Common NETWORK Introducing IPSecControlling Access with Network Access Attack Methods Encrypting with VPN TechnologyProtection (NAP) Securing Wireless Network Using Auditing to Complete the SecurityUnderstanding the Purpose of NAP Using Service Set Identifier (SSID) PictureLooking at How NAP Works Understanding Keys Using Password Complexity to Make aExamining the Requirements for NAP Utilizing MAC Filters Stronger PasswordUsing Isolation to Protect the Network Considering Pros and Cons of Specific Using Account Lockout to Prevent HackingUnderstanding Virtual LANs Security Types Looking at Password LengthUnderstanding Routing Protecting Your Computer from Malware Using Password History to EnforceLooking at Intrusion Detection and Intrusion Utilizing Windows Updates SecurityPrevention Systems Utilizing User Account Control Setting the Time between PasswordLooking at Honeypots Using Windows Firewall ChangesLooking at DMZs Using Offline Files Using Password Group Policies to EnforceUnderstanding Network Address Translation Locking Down a Client Computer Security

Page 42: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

(NAT) Protecting Your Email Understanding Common Attack MethodsUnderstanding Virtual Private Networks Dealing with Spam Examining Hardware Firewalls and Their(VPNs) Relaying Email CharacteristicsUnderstanding Internet Protocol Security Securing Internet Explorer Using Hardware Firewalls versus Software(IPsec) Looking at Cookies and Privacy Settings FirewallsUsing Other VPN Protocols Examining Content Zones Using Stateful versus Stateless InspectionLooking at Server and Domain Isolation Phishing and Pharming Controlling Access with Network AccessProtecting Data with Protocol Security Protecting Your Server Protection (NAP)Understanding Tunneling Placing the Server Understanding the Purpose of NAPUsing DNS Security Extensions (DNSSEC) Hardening the Server Looking at How NAP WorksLooking at Protocol Spoofing Using Secure Dynamic DNS Examining the Requirements for NAPUtilizing Network Sniffing Using Isolation to Protect the NetworkUnderstanding Common NETWORK Attack Understanding Virtual LANsMethods line Understanding RoutingSecuring Wireless Network Understanding Confidentiality Looking at Intrusion Detection andUsing Service Set Identifier (SSID) Understanding Integrity Intrusion Prevention SystemsUnderstanding Keys Understanding Availability Looking at HoneypotsUtilizing MAC Filters Defining Threats and Risk Management Looking at DMZsConsidering Pros and Cons of Specific Understanding the Principle of Least Understanding Network AddressSecurity Types Privilege Translation (NAT)Protecting Your Computer from Malware Understanding Attack Surface Understanding Virtual Private NetworksUtilizing Windows Updates Understanding Social Engineering (VPNs)Utilizing User Account Control Linking Cost with Security Understanding Internet Protocol SecurityUsing Windows Firewall Looking at Physical Security as the First (IPsec)Using Offline Files Line of Defense Using Other VPN ProtocolsLocking Down a Client Computer Understanding Site Security Looking at Server and Domain IsolationProtecting Your Email Understanding Computer Security Protecting Data with Protocol SecurityDealing with Spam Authenticating with What You Know Understanding TunnelingRelaying Email Authenticating with What You Own or Using DNS Security Extensions (DNSSEC)Securing Internet Explorer Possess Looking at Protocol SpoofingLooking at Cookies and Privacy Settings Authenticating with What You Are Utilizing Network SniffingExamining Content Zones Introducing RADIUS and TACACS1 Understanding Common NETWORKPhishing and Pharming Using Run As Attack MethodsProtecting Your Server Introducing Directory Services with Active Securing Wireless NetworkPlacing the Server Directory Using Service Set Identifier (SSID)Hardening the Server Looking at Domain Controllers Understanding KeysUsing Secure Dynamic DNS Introducing NTLM Utilizing MAC Filters

Introducing Kerberos Considering Pros and Cons of SpecificUsing Organizational Units Security Types

line Looking at Objects Protecting Your Computer from MalwareUnderstanding Confidentiality Using Groups Utilizing Windows UpdatesUnderstanding Integrity Looking at Web Server Authentication Utilizing User Account ControlUnderstanding Availability Comparing Rights and Permissions Using Windows FirewallDefining Threats and Risk Management Looking at NTFS Using Offline FilesUnderstanding the Principle of Least Using NTFS Permissions Locking Down a Client ComputerPrivilege Looking at Effective NTFS Permissions Protecting Your EmailUnderstanding Attack Surface Copying and Moving Files Dealing with SpamUnderstanding Social Engineering Using Folder and File Owners Relaying EmailLinking Cost with Security Sharing Drives and Folders Securing Internet ExplorerLooking at Physical Security as the First Looking at Special and Administrative Looking at Cookies and Privacy SettingsLine of Defense Shares Examining Content ZonesUnderstanding Site Security Introducing the Registry Phishing and PharmingUnderstanding Computer Security Using Encryption to Protect Data Protecting Your ServerAuthenticating with What You Know Examining Types of Encryption Placing the ServerAuthenticating with What You Own or Introducing Public Key Infrastructure Hardening the ServerPossess Encrypting Email Using Secure Dynamic DNSAuthenticating with What You Are Encrypting Files with EFSIntroducing RADIUS and TACACS1 Encrypting Disks in WindowsUsing Run As Introducing IPSec lineIntroducing Directory Services with Active Encrypting with VPN Technology Understanding ConfidentialityDirectory Using Auditing to Complete the Security Understanding IntegrityLooking at Domain Controllers Picture Understanding AvailabilityIntroducing NTLM Using Password Complexity to Make a Defining Threats and Risk ManagementIntroducing Kerberos Stronger Password Understanding the Principle of LeastUsing Organizational Units Using Account Lockout to Prevent PrivilegeLooking at Objects Hacking Understanding Attack Surface

Page 43: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Using Groups Looking at Password Length Understanding Social EngineeringLooking at Web Server Authentication Using Password History to Enforce Linking Cost with SecurityComparing Rights and Permissions Security Looking at Physical Security as the FirstLooking at NTFS Setting the Time between Password Line of DefenseUsing NTFS Permissions Changes Understanding Site SecurityLooking at Effective NTFS Permissions Using Password Group Policies to Understanding Computer SecurityCopying and Moving Files Enforce Security Authenticating with What You KnowUsing Folder and File Owners Understanding Common Attack Methods Authenticating with What You Own orSharing Drives and Folders Examining Hardware Firewalls and Their PossessLooking at Special and Administrative Characteristics Authenticating with What You AreShares Using Hardware Firewalls versus Introducing RADIUS and TACACS1Introducing the Registry Software Firewalls Using Run AsUsing Encryption to Protect Data Using Stateful versus Stateless Introducing Directory Services with ActiveExamining Types of Encryption Inspection DirectoryIntroducing Public Key Infrastructure Controlling Access with Network Access Looking at Domain ControllersEncrypting Email Protection (NAP) Introducing NTLMEncrypting Files with EFS Understanding the Purpose of NAP Introducing KerberosEncrypting Disks in Windows Looking at How NAP Works Using Organizational UnitsIntroducing IPSec Examining the Requirements for NAP Looking at ObjectsEncrypting with VPN Technology Using Isolation to Protect the Network Using GroupsUsing Auditing to Complete the Security Understanding Virtual LANs Looking at Web Server AuthenticationPicture Understanding Routing Comparing Rights and PermissionsUsing Password Complexity to Make a Looking at Intrusion Detection and Looking at NTFSStronger Password Intrusion Prevention Systems Using NTFS PermissionsUsing Account Lockout to Prevent Hacking Looking at Honeypots Looking at Effective NTFS PermissionsLooking at Password Length Looking at DMZs Copying and Moving FilesUsing Password History to Enforce Security Understanding Network Address Using Folder and File OwnersSetting the Time between Password Translation (NAT) Sharing Drives and FoldersChanges Understanding Virtual Private Networks Looking at Special and AdministrativeUsing Password Group Policies to Enforce (VPNs) SharesSecurity Understanding Internet Protocol Security Introducing the RegistryUnderstanding Common Attack Methods (IPsec) Using Encryption to Protect DataExamining Hardware Firewalls and Their Using Other VPN Protocols Examining Types of EncryptionCharacteristics Looking at Server and Domain Isolation Introducing Public Key InfrastructureUsing Hardware Firewalls versus Software Protecting Data with Protocol Security Encrypting EmailFirewalls Understanding Tunneling Encrypting Files with EFSUsing Stateful versus Stateless Inspection Using DNS Security Extensions Encrypting Disks in WindowsControlling Access with Network Access (DNSSEC) Introducing IPSecProtection (NAP) Looking at Protocol Spoofing Encrypting with VPN TechnologyUnderstanding the Purpose of NAP Utilizing Network Sniffing Using Auditing to Complete the SecurityLooking at How NAP Works Understanding Common NETWORK PictureExamining the Requirements for NAP Attack Methods Using Password Complexity to Make aUsing Isolation to Protect the Network Securing Wireless Network Stronger PasswordUnderstanding Virtual LANs Using Service Set Identifier (SSID) Using Account Lockout to Prevent HackingUnderstanding Routing Understanding Keys Looking at Password LengthLooking at Intrusion Detection and Intrusion Utilizing MAC Filters Using Password History to EnforcePrevention Systems Considering Pros and Cons of Specific SecurityLooking at Honeypots Security Types Setting the Time between PasswordLooking at DMZs Protecting Your Computer from Malware ChangesUnderstanding Network Address Translation Utilizing Windows Updates Using Password Group Policies to Enforce(NAT) Utilizing User Account Control SecurityUnderstanding Virtual Private Networks Using Windows Firewall Understanding Common Attack Methods(VPNs) Using Offline Files Examining Hardware Firewalls and TheirUnderstanding Internet Protocol Security Locking Down a Client Computer Characteristics(IPsec) Protecting Your Email Using Hardware Firewalls versus SoftwareUsing Other VPN Protocols Dealing with Spam FirewallsLooking at Server and Domain Isolation Relaying Email Using Stateful versus Stateless InspectionProtecting Data with Protocol Security Securing Internet Explorer Controlling Access with Network AccessUnderstanding Tunneling Looking at Cookies and Privacy Settings Protection (NAP)Using DNS Security Extensions (DNSSEC) Examining Content Zones Understanding the Purpose of NAPLooking at Protocol Spoofing Phishing and Pharming Looking at How NAP WorksUtilizing Network Sniffing Protecting Your Server Examining the Requirements for NAPUnderstanding Common NETWORK Attack Placing the Server Using Isolation to Protect the NetworkMethods Hardening the Server Understanding Virtual LANsSecuring Wireless Network Using Secure Dynamic DNS Understanding RoutingUsing Service Set Identifier (SSID) Looking at Intrusion Detection and

Page 44: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Understanding Keys Intrusion Prevention SystemsUtilizing MAC Filters line Looking at HoneypotsConsidering Pros and Cons of Specific Understanding Confidentiality Looking at DMZsSecurity Types Understanding Integrity Understanding Network AddressProtecting Your Computer from Malware Understanding Availability Translation (NAT)Utilizing Windows Updates Defining Threats and Risk Management Understanding Virtual Private NetworksUtilizing User Account Control Understanding the Principle of Least (VPNs)Using Windows Firewall Privilege Understanding Internet Protocol SecurityUsing Offline Files Understanding Attack Surface (IPsec)Locking Down a Client Computer Understanding Social Engineering Using Other VPN ProtocolsProtecting Your Email Linking Cost with Security Looking at Server and Domain IsolationDealing with Spam Looking at Physical Security as the First Protecting Data with Protocol SecurityRelaying Email Line of Defense Understanding TunnelingSecuring Internet Explorer Understanding Site Security Using DNS Security Extensions (DNSSEC)Looking at Cookies and Privacy Settings Understanding Computer Security Looking at Protocol SpoofingExamining Content Zones Authenticating with What You Know Utilizing Network SniffingPhishing and Pharming Authenticating with What You Own or Understanding Common NETWORKProtecting Your Server Possess Attack MethodsPlacing the Server Authenticating with What You Are Securing Wireless NetworkHardening the Server Introducing RADIUS and TACACS1 Using Service Set Identifier (SSID)Using Secure Dynamic DNS Using Run As Understanding Keys

Introducing Directory Services with Active Utilizing MAC FiltersDirectory Considering Pros and Cons of Specific

line Looking at Domain Controllers Security TypesUnderstanding Confidentiality Introducing NTLM Protecting Your Computer from MalwareUnderstanding Integrity Introducing Kerberos Utilizing Windows UpdatesUnderstanding Availability Using Organizational Units Utilizing User Account ControlDefining Threats and Risk Management Looking at Objects Using Windows FirewallUnderstanding the Principle of Least Using Groups Using Offline FilesPrivilege Looking at Web Server Authentication Locking Down a Client ComputerUnderstanding Attack Surface Comparing Rights and Permissions Protecting Your EmailUnderstanding Social Engineering Looking at NTFS Dealing with SpamLinking Cost with Security Using NTFS Permissions Relaying EmailLooking at Physical Security as the First Looking at Effective NTFS Permissions Securing Internet ExplorerLine of Defense Copying and Moving Files Looking at Cookies and Privacy SettingsUnderstanding Site Security Using Folder and File Owners Examining Content ZonesUnderstanding Computer Security Sharing Drives and Folders Phishing and PharmingAuthenticating with What You Know Looking at Special and Administrative Protecting Your ServerAuthenticating with What You Own or Shares Placing the ServerPossess Introducing the Registry Hardening the ServerAuthenticating with What You Are Using Encryption to Protect Data Using Secure Dynamic DNSIntroducing RADIUS and TACACS1 Examining Types of EncryptionUsing Run As Introducing Public Key InfrastructureIntroducing Directory Services with Active Encrypting Email lineDirectory Encrypting Files with EFS Understanding ConfidentialityLooking at Domain Controllers Encrypting Disks in Windows Understanding IntegrityIntroducing NTLM Introducing IPSec Understanding AvailabilityIntroducing Kerberos Encrypting with VPN Technology Defining Threats and Risk ManagementUsing Organizational Units Using Auditing to Complete the Security Understanding the Principle of LeastLooking at Objects Picture PrivilegeUsing Groups Using Password Complexity to Make a Understanding Attack SurfaceLooking at Web Server Authentication Stronger Password Understanding Social EngineeringComparing Rights and Permissions Using Account Lockout to Prevent Linking Cost with SecurityLooking at NTFS Hacking Looking at Physical Security as the FirstUsing NTFS Permissions Looking at Password Length Line of DefenseLooking at Effective NTFS Permissions Using Password History to Enforce Understanding Site SecurityCopying and Moving Files Security Understanding Computer SecurityUsing Folder and File Owners Setting the Time between Password Authenticating with What You KnowSharing Drives and Folders Changes Authenticating with What You Own orLooking at Special and Administrative Using Password Group Policies to PossessShares Enforce Security Authenticating with What You AreIntroducing the Registry Understanding Common Attack Methods Introducing RADIUS and TACACS1Using Encryption to Protect Data Examining Hardware Firewalls and Their Using Run AsExamining Types of Encryption Characteristics Introducing Directory Services with ActiveIntroducing Public Key Infrastructure Using Hardware Firewalls versus DirectoryEncrypting Email Software Firewalls Looking at Domain Controllers

Page 45: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Encrypting Files with EFS Using Stateful versus Stateless Introducing NTLMEncrypting Disks in Windows Inspection Introducing KerberosIntroducing IPSec Controlling Access with Network Access Using Organizational UnitsEncrypting with VPN Technology Protection (NAP) Looking at ObjectsUsing Auditing to Complete the Security Understanding the Purpose of NAP Using GroupsPicture Looking at How NAP Works Looking at Web Server AuthenticationUsing Password Complexity to Make a Examining the Requirements for NAP Comparing Rights and PermissionsStronger Password Using Isolation to Protect the Network Looking at NTFSUsing Account Lockout to Prevent Hacking Understanding Virtual LANs Using NTFS PermissionsLooking at Password Length Understanding Routing Looking at Effective NTFS PermissionsUsing Password History to Enforce Security Looking at Intrusion Detection and Copying and Moving FilesSetting the Time between Password Intrusion Prevention Systems Using Folder and File OwnersChanges Looking at Honeypots Sharing Drives and FoldersUsing Password Group Policies to Enforce Looking at DMZs Looking at Special and AdministrativeSecurity Understanding Network Address SharesUnderstanding Common Attack Methods Translation (NAT) Introducing the RegistryExamining Hardware Firewalls and Their Understanding Virtual Private Networks Using Encryption to Protect DataCharacteristics (VPNs) Examining Types of EncryptionUsing Hardware Firewalls versus Software Understanding Internet Protocol Security Introducing Public Key InfrastructureFirewalls (IPsec) Encrypting EmailUsing Stateful versus Stateless Inspection Using Other VPN Protocols Encrypting Files with EFSControlling Access with Network Access Looking at Server and Domain Isolation Encrypting Disks in WindowsProtection (NAP) Protecting Data with Protocol Security Introducing IPSecUnderstanding the Purpose of NAP Understanding Tunneling Encrypting with VPN TechnologyLooking at How NAP Works Using DNS Security Extensions Using Auditing to Complete the SecurityExamining the Requirements for NAP (DNSSEC) PictureUsing Isolation to Protect the Network Looking at Protocol Spoofing Using Password Complexity to Make aUnderstanding Virtual LANs Utilizing Network Sniffing Stronger PasswordUnderstanding Routing Understanding Common NETWORK Using Account Lockout to Prevent HackingLooking at Intrusion Detection and Intrusion Attack Methods Looking at Password LengthPrevention Systems Securing Wireless Network Using Password History to EnforceLooking at Honeypots Using Service Set Identifier (SSID) SecurityLooking at DMZs Understanding Keys Setting the Time between PasswordUnderstanding Network Address Translation Utilizing MAC Filters Changes(NAT) Considering Pros and Cons of Specific Using Password Group Policies to EnforceUnderstanding Virtual Private Networks Security Types Security(VPNs) Protecting Your Computer from Malware Understanding Common Attack MethodsUnderstanding Internet Protocol Security Utilizing Windows Updates Examining Hardware Firewalls and Their(IPsec) Utilizing User Account Control CharacteristicsUsing Other VPN Protocols Using Windows Firewall Using Hardware Firewalls versus SoftwareLooking at Server and Domain Isolation Using Offline Files FirewallsProtecting Data with Protocol Security Locking Down a Client Computer Using Stateful versus Stateless InspectionUnderstanding Tunneling Protecting Your Email Controlling Access with Network AccessUsing DNS Security Extensions (DNSSEC) Dealing with Spam Protection (NAP)Looking at Protocol Spoofing Relaying Email Understanding the Purpose of NAPUtilizing Network Sniffing Securing Internet Explorer Looking at How NAP WorksUnderstanding Common NETWORK Attack Looking at Cookies and Privacy Settings Examining the Requirements for NAPMethods Examining Content Zones Using Isolation to Protect the NetworkSecuring Wireless Network Phishing and Pharming Understanding Virtual LANsUsing Service Set Identifier (SSID) Protecting Your Server Understanding RoutingUnderstanding Keys Placing the Server Looking at Intrusion Detection andUtilizing MAC Filters Hardening the Server Intrusion Prevention SystemsConsidering Pros and Cons of Specific Using Secure Dynamic DNS Looking at HoneypotsSecurity Types Looking at DMZsProtecting Your Computer from Malware Understanding Network AddressUtilizing Windows Updates line Translation (NAT)Utilizing User Account Control Understanding Confidentiality Understanding Virtual Private NetworksUsing Windows Firewall Understanding Integrity (VPNs)Using Offline Files Understanding Availability Understanding Internet Protocol SecurityLocking Down a Client Computer Defining Threats and Risk Management (IPsec)Protecting Your Email Understanding the Principle of Least Using Other VPN ProtocolsDealing with Spam Privilege Looking at Server and Domain IsolationRelaying Email Understanding Attack Surface Protecting Data with Protocol SecuritySecuring Internet Explorer Understanding Social Engineering Understanding TunnelingLooking at Cookies and Privacy Settings Linking Cost with Security Using DNS Security Extensions (DNSSEC)Examining Content Zones Looking at Physical Security as the First Looking at Protocol Spoofing

Page 46: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Phishing and Pharming Line of Defense Utilizing Network SniffingProtecting Your Server Understanding Site Security Understanding Common NETWORKPlacing the Server Understanding Computer Security Attack MethodsHardening the Server Authenticating with What You Know Securing Wireless NetworkUsing Secure Dynamic DNS Authenticating with What You Own or Using Service Set Identifier (SSID)

Possess Understanding KeysAuthenticating with What You Are Utilizing MAC Filters

line Introducing RADIUS and TACACS1 Considering Pros and Cons of SpecificUnderstanding Confidentiality Using Run As Security TypesUnderstanding Integrity Introducing Directory Services with Active Protecting Your Computer from MalwareUnderstanding Availability Directory Utilizing Windows UpdatesDefining Threats and Risk Management Looking at Domain Controllers Utilizing User Account ControlUnderstanding the Principle of Least Introducing NTLM Using Windows FirewallPrivilege Introducing Kerberos Using Offline FilesUnderstanding Attack Surface Using Organizational Units Locking Down a Client ComputerUnderstanding Social Engineering Looking at Objects Protecting Your EmailLinking Cost with Security Using Groups Dealing with SpamLooking at Physical Security as the First Looking at Web Server Authentication Relaying EmailLine of Defense Comparing Rights and Permissions Securing Internet ExplorerUnderstanding Site Security Looking at NTFS Looking at Cookies and Privacy SettingsUnderstanding Computer Security Using NTFS Permissions Examining Content ZonesAuthenticating with What You Know Looking at Effective NTFS Permissions Phishing and PharmingAuthenticating with What You Own or Copying and Moving Files Protecting Your ServerPossess Using Folder and File Owners Placing the ServerAuthenticating with What You Are Sharing Drives and Folders Hardening the ServerIntroducing RADIUS and TACACS1 Looking at Special and Administrative Using Secure Dynamic DNSUsing Run As SharesIntroducing Directory Services with Active Introducing the RegistryDirectory Using Encryption to Protect Data lineLooking at Domain Controllers Examining Types of Encryption Understanding ConfidentialityIntroducing NTLM Introducing Public Key Infrastructure Understanding IntegrityIntroducing Kerberos Encrypting Email Understanding AvailabilityUsing Organizational Units Encrypting Files with EFS Defining Threats and Risk ManagementLooking at Objects Encrypting Disks in Windows Understanding the Principle of LeastUsing Groups Introducing IPSec PrivilegeLooking at Web Server Authentication Encrypting with VPN Technology Understanding Attack SurfaceComparing Rights and Permissions Using Auditing to Complete the Security Understanding Social EngineeringLooking at NTFS Picture Linking Cost with SecurityUsing NTFS Permissions Using Password Complexity to Make a Looking at Physical Security as the FirstLooking at Effective NTFS Permissions Stronger Password Line of DefenseCopying and Moving Files Using Account Lockout to Prevent Understanding Site SecurityUsing Folder and File Owners Hacking Understanding Computer SecuritySharing Drives and Folders Looking at Password Length Authenticating with What You KnowLooking at Special and Administrative Using Password History to Enforce Authenticating with What You Own orShares Security PossessIntroducing the Registry Setting the Time between Password Authenticating with What You AreUsing Encryption to Protect Data Changes Introducing RADIUS and TACACS1Examining Types of Encryption Using Password Group Policies to Using Run AsIntroducing Public Key Infrastructure Enforce Security Introducing Directory Services with ActiveEncrypting Email Understanding Common Attack Methods DirectoryEncrypting Files with EFS Examining Hardware Firewalls and Their Looking at Domain ControllersEncrypting Disks in Windows Characteristics Introducing NTLMIntroducing IPSec Using Hardware Firewalls versus Introducing KerberosEncrypting with VPN Technology Software Firewalls Using Organizational UnitsUsing Auditing to Complete the Security Using Stateful versus Stateless Looking at ObjectsPicture Inspection Using GroupsUsing Password Complexity to Make a Controlling Access with Network Access Looking at Web Server AuthenticationStronger Password Protection (NAP) Comparing Rights and PermissionsUsing Account Lockout to Prevent Hacking Understanding the Purpose of NAP Looking at NTFSLooking at Password Length Looking at How NAP Works Using NTFS PermissionsUsing Password History to Enforce Security Examining the Requirements for NAP Looking at Effective NTFS PermissionsSetting the Time between Password Using Isolation to Protect the Network Copying and Moving FilesChanges Understanding Virtual LANs Using Folder and File OwnersUsing Password Group Policies to Enforce Understanding Routing Sharing Drives and FoldersSecurity Looking at Intrusion Detection and Looking at Special and AdministrativeUnderstanding Common Attack Methods Intrusion Prevention Systems Shares

Page 47: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Examining Hardware Firewalls and Their Looking at Honeypots Introducing the RegistryCharacteristics Looking at DMZs Using Encryption to Protect DataUsing Hardware Firewalls versus Software Understanding Network Address Examining Types of EncryptionFirewalls Translation (NAT) Introducing Public Key InfrastructureUsing Stateful versus Stateless Inspection Understanding Virtual Private Networks Encrypting EmailControlling Access with Network Access (VPNs) Encrypting Files with EFSProtection (NAP) Understanding Internet Protocol Security Encrypting Disks in WindowsUnderstanding the Purpose of NAP (IPsec) Introducing IPSecLooking at How NAP Works Using Other VPN Protocols Encrypting with VPN TechnologyExamining the Requirements for NAP Looking at Server and Domain Isolation Using Auditing to Complete the SecurityUsing Isolation to Protect the Network Protecting Data with Protocol Security PictureUnderstanding Virtual LANs Understanding Tunneling Using Password Complexity to Make aUnderstanding Routing Using DNS Security Extensions Stronger PasswordLooking at Intrusion Detection and Intrusion (DNSSEC) Using Account Lockout to Prevent HackingPrevention Systems Looking at Protocol Spoofing Looking at Password LengthLooking at Honeypots Utilizing Network Sniffing Using Password History to EnforceLooking at DMZs Understanding Common NETWORK SecurityUnderstanding Network Address Translation Attack Methods Setting the Time between Password(NAT) Securing Wireless Network ChangesUnderstanding Virtual Private Networks Using Service Set Identifier (SSID) Using Password Group Policies to Enforce(VPNs) Understanding Keys SecurityUnderstanding Internet Protocol Security Utilizing MAC Filters Understanding Common Attack Methods(IPsec) Considering Pros and Cons of Specific Examining Hardware Firewalls and TheirUsing Other VPN Protocols Security Types CharacteristicsLooking at Server and Domain Isolation Protecting Your Computer from Malware Using Hardware Firewalls versus SoftwareProtecting Data with Protocol Security Utilizing Windows Updates FirewallsUnderstanding Tunneling Utilizing User Account Control Using Stateful versus Stateless InspectionUsing DNS Security Extensions (DNSSEC) Using Windows Firewall Controlling Access with Network AccessLooking at Protocol Spoofing Using Offline Files Protection (NAP)Utilizing Network Sniffing Locking Down a Client Computer Understanding the Purpose of NAPUnderstanding Common NETWORK Attack Protecting Your Email Looking at How NAP WorksMethods Dealing with Spam Examining the Requirements for NAPSecuring Wireless Network Relaying Email Using Isolation to Protect the NetworkUsing Service Set Identifier (SSID) Securing Internet Explorer Understanding Virtual LANsUnderstanding Keys Looking at Cookies and Privacy Settings Understanding RoutingUtilizing MAC Filters Examining Content Zones Looking at Intrusion Detection andConsidering Pros and Cons of Specific Phishing and Pharming Intrusion Prevention SystemsSecurity Types Protecting Your Server Looking at HoneypotsProtecting Your Computer from Malware Placing the Server Looking at DMZsUtilizing Windows Updates Hardening the Server Understanding Network AddressUtilizing User Account Control Using Secure Dynamic DNS Translation (NAT)Using Windows Firewall Understanding Virtual Private NetworksUsing Offline Files (VPNs)Locking Down a Client Computer line Understanding Internet Protocol SecurityProtecting Your Email Understanding Confidentiality (IPsec)Dealing with Spam Understanding Integrity Using Other VPN ProtocolsRelaying Email Understanding Availability Looking at Server and Domain IsolationSecuring Internet Explorer Defining Threats and Risk Management Protecting Data with Protocol SecurityLooking at Cookies and Privacy Settings Understanding the Principle of Least Understanding TunnelingExamining Content Zones Privilege Using DNS Security Extensions (DNSSEC)Phishing and Pharming Understanding Attack Surface Looking at Protocol SpoofingProtecting Your Server Understanding Social Engineering Utilizing Network SniffingPlacing the Server Linking Cost with Security Understanding Common NETWORKHardening the Server Looking at Physical Security as the First Attack MethodsUsing Secure Dynamic DNS Line of Defense Securing Wireless Network

Understanding Site Security Using Service Set Identifier (SSID)Understanding Computer Security Understanding Keys

line Authenticating with What You Know Utilizing MAC FiltersUnderstanding Confidentiality Authenticating with What You Own or Considering Pros and Cons of SpecificUnderstanding Integrity Possess Security TypesUnderstanding Availability Authenticating with What You Are Protecting Your Computer from MalwareDefining Threats and Risk Management Introducing RADIUS and TACACS1 Utilizing Windows UpdatesUnderstanding the Principle of Least Using Run As Utilizing User Account ControlPrivilege Introducing Directory Services with Active Using Windows FirewallUnderstanding Attack Surface Directory Using Offline FilesUnderstanding Social Engineering Looking at Domain Controllers Locking Down a Client Computer

Page 48: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Linking Cost with Security Introducing NTLM Protecting Your EmailLooking at Physical Security as the First Introducing Kerberos Dealing with SpamLine of Defense Using Organizational Units Relaying EmailUnderstanding Site Security Looking at Objects Securing Internet ExplorerUnderstanding Computer Security Using Groups Looking at Cookies and Privacy SettingsAuthenticating with What You Know Looking at Web Server Authentication Examining Content ZonesAuthenticating with What You Own or Comparing Rights and Permissions Phishing and PharmingPossess Looking at NTFS Protecting Your ServerAuthenticating with What You Are Using NTFS Permissions Placing the ServerIntroducing RADIUS and TACACS1 Looking at Effective NTFS Permissions Hardening the ServerUsing Run As Copying and Moving Files Using Secure Dynamic DNSIntroducing Directory Services with Active Using Folder and File OwnersDirectory Sharing Drives and FoldersLooking at Domain Controllers Looking at Special and Administrative lineIntroducing NTLM Shares Understanding ConfidentialityIntroducing Kerberos Introducing the Registry Understanding IntegrityUsing Organizational Units Using Encryption to Protect Data Understanding AvailabilityLooking at Objects Examining Types of Encryption Defining Threats and Risk ManagementUsing Groups Introducing Public Key Infrastructure Understanding the Principle of LeastLooking at Web Server Authentication Encrypting Email PrivilegeComparing Rights and Permissions Encrypting Files with EFS Understanding Attack SurfaceLooking at NTFS Encrypting Disks in Windows Understanding Social EngineeringUsing NTFS Permissions Introducing IPSec Linking Cost with SecurityLooking at Effective NTFS Permissions Encrypting with VPN Technology Looking at Physical Security as the FirstCopying and Moving Files Using Auditing to Complete the Security Line of DefenseUsing Folder and File Owners Picture Understanding Site SecuritySharing Drives and Folders Using Password Complexity to Make a Understanding Computer SecurityLooking at Special and Administrative Stronger Password Authenticating with What You KnowShares Using Account Lockout to Prevent Authenticating with What You Own orIntroducing the Registry Hacking PossessUsing Encryption to Protect Data Looking at Password Length Authenticating with What You AreExamining Types of Encryption Using Password History to Enforce Introducing RADIUS and TACACS1Introducing Public Key Infrastructure Security Using Run AsEncrypting Email Setting the Time between Password Introducing Directory Services with ActiveEncrypting Files with EFS Changes DirectoryEncrypting Disks in Windows Using Password Group Policies to Looking at Domain ControllersIntroducing IPSec Enforce Security Introducing NTLMEncrypting with VPN Technology Understanding Common Attack Methods Introducing KerberosUsing Auditing to Complete the Security Examining Hardware Firewalls and Their Using Organizational UnitsPicture Characteristics Looking at ObjectsUsing Password Complexity to Make a Using Hardware Firewalls versus Using GroupsStronger Password Software Firewalls Looking at Web Server AuthenticationUsing Account Lockout to Prevent Hacking Using Stateful versus Stateless Comparing Rights and PermissionsLooking at Password Length Inspection Looking at NTFSUsing Password History to Enforce Security Controlling Access with Network Access Using NTFS PermissionsSetting the Time between Password Protection (NAP) Looking at Effective NTFS PermissionsChanges Understanding the Purpose of NAP Copying and Moving FilesUsing Password Group Policies to Enforce Looking at How NAP Works Using Folder and File OwnersSecurity Examining the Requirements for NAP Sharing Drives and FoldersUnderstanding Common Attack Methods Using Isolation to Protect the Network Looking at Special and AdministrativeExamining Hardware Firewalls and Their Understanding Virtual LANs SharesCharacteristics Understanding Routing Introducing the RegistryUsing Hardware Firewalls versus Software Looking at Intrusion Detection and Using Encryption to Protect DataFirewalls Intrusion Prevention Systems Examining Types of EncryptionUsing Stateful versus Stateless Inspection Looking at Honeypots Introducing Public Key InfrastructureControlling Access with Network Access Looking at DMZs Encrypting EmailProtection (NAP) Understanding Network Address Encrypting Files with EFSUnderstanding the Purpose of NAP Translation (NAT) Encrypting Disks in WindowsLooking at How NAP Works Understanding Virtual Private Networks Introducing IPSecExamining the Requirements for NAP (VPNs) Encrypting with VPN TechnologyUsing Isolation to Protect the Network Understanding Internet Protocol Security Using Auditing to Complete the SecurityUnderstanding Virtual LANs (IPsec) PictureUnderstanding Routing Using Other VPN Protocols Using Password Complexity to Make aLooking at Intrusion Detection and Intrusion Looking at Server and Domain Isolation Stronger PasswordPrevention Systems Protecting Data with Protocol Security Using Account Lockout to Prevent HackingLooking at Honeypots Understanding Tunneling Looking at Password Length

Page 49: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Looking at DMZs Using DNS Security Extensions Using Password History to EnforceUnderstanding Network Address Translation (DNSSEC) Security(NAT) Looking at Protocol Spoofing Setting the Time between PasswordUnderstanding Virtual Private Networks Utilizing Network Sniffing Changes(VPNs) Understanding Common NETWORK Using Password Group Policies to EnforceUnderstanding Internet Protocol Security Attack Methods Security(IPsec) Securing Wireless Network Understanding Common Attack MethodsUsing Other VPN Protocols Using Service Set Identifier (SSID) Examining Hardware Firewalls and TheirLooking at Server and Domain Isolation Understanding Keys CharacteristicsProtecting Data with Protocol Security Utilizing MAC Filters Using Hardware Firewalls versus SoftwareUnderstanding Tunneling Considering Pros and Cons of Specific FirewallsUsing DNS Security Extensions (DNSSEC) Security Types Using Stateful versus Stateless InspectionLooking at Protocol Spoofing Protecting Your Computer from Malware Controlling Access with Network AccessUtilizing Network Sniffing Utilizing Windows Updates Protection (NAP)Understanding Common NETWORK Attack Utilizing User Account Control Understanding the Purpose of NAPMethods Using Windows Firewall Looking at How NAP WorksSecuring Wireless Network Using Offline Files Examining the Requirements for NAPUsing Service Set Identifier (SSID) Locking Down a Client Computer Using Isolation to Protect the NetworkUnderstanding Keys Protecting Your Email Understanding Virtual LANsUtilizing MAC Filters Dealing with Spam Understanding RoutingConsidering Pros and Cons of Specific Relaying Email Looking at Intrusion Detection andSecurity Types Securing Internet Explorer Intrusion Prevention SystemsProtecting Your Computer from Malware Looking at Cookies and Privacy Settings Looking at HoneypotsUtilizing Windows Updates Examining Content Zones Looking at DMZsUtilizing User Account Control Phishing and Pharming Understanding Network AddressUsing Windows Firewall Protecting Your Server Translation (NAT)Using Offline Files Placing the Server Understanding Virtual Private NetworksLocking Down a Client Computer Hardening the Server (VPNs)Protecting Your Email Using Secure Dynamic DNS Understanding Internet Protocol SecurityDealing with Spam (IPsec)Relaying Email Using Other VPN ProtocolsSecuring Internet Explorer line Looking at Server and Domain IsolationLooking at Cookies and Privacy Settings Understanding Confidentiality Protecting Data with Protocol SecurityExamining Content Zones Understanding Integrity Understanding TunnelingPhishing and Pharming Understanding Availability Using DNS Security Extensions (DNSSEC)Protecting Your Server Defining Threats and Risk Management Looking at Protocol SpoofingPlacing the Server Understanding the Principle of Least Utilizing Network SniffingHardening the Server Privilege Understanding Common NETWORKUsing Secure Dynamic DNS Understanding Attack Surface Attack Methods

Understanding Social Engineering Securing Wireless NetworkLinking Cost with Security Using Service Set Identifier (SSID)

line Looking at Physical Security as the First Understanding KeysUnderstanding Confidentiality Line of Defense Utilizing MAC FiltersUnderstanding Integrity Understanding Site Security Considering Pros and Cons of SpecificUnderstanding Availability Understanding Computer Security Security TypesDefining Threats and Risk Management Authenticating with What You Know Protecting Your Computer from MalwareUnderstanding the Principle of Least Authenticating with What You Own or Utilizing Windows UpdatesPrivilege Possess Utilizing User Account ControlUnderstanding Attack Surface Authenticating with What You Are Using Windows FirewallUnderstanding Social Engineering Introducing RADIUS and TACACS1 Using Offline FilesLinking Cost with Security Using Run As Locking Down a Client ComputerLooking at Physical Security as the First Introducing Directory Services with Active Protecting Your EmailLine of Defense Directory Dealing with SpamUnderstanding Site Security Looking at Domain Controllers Relaying EmailUnderstanding Computer Security Introducing NTLM Securing Internet ExplorerAuthenticating with What You Know Introducing Kerberos Looking at Cookies and Privacy SettingsAuthenticating with What You Own or Using Organizational Units Examining Content ZonesPossess Looking at Objects Phishing and PharmingAuthenticating with What You Are Using Groups Protecting Your ServerIntroducing RADIUS and TACACS1 Looking at Web Server Authentication Placing the ServerUsing Run As Comparing Rights and Permissions Hardening the ServerIntroducing Directory Services with Active Looking at NTFS Using Secure Dynamic DNSDirectory Using NTFS PermissionsLooking at Domain Controllers Looking at Effective NTFS PermissionsIntroducing NTLM Copying and Moving Files lineIntroducing Kerberos Using Folder and File Owners Understanding Confidentiality

Page 50: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Using Organizational Units Sharing Drives and Folders Understanding IntegrityLooking at Objects Looking at Special and Administrative Understanding AvailabilityUsing Groups Shares Defining Threats and Risk ManagementLooking at Web Server Authentication Introducing the Registry Understanding the Principle of LeastComparing Rights and Permissions Using Encryption to Protect Data PrivilegeLooking at NTFS Examining Types of Encryption Understanding Attack SurfaceUsing NTFS Permissions Introducing Public Key Infrastructure Understanding Social EngineeringLooking at Effective NTFS Permissions Encrypting Email Linking Cost with SecurityCopying and Moving Files Encrypting Files with EFS Looking at Physical Security as the FirstUsing Folder and File Owners Encrypting Disks in Windows Line of DefenseSharing Drives and Folders Introducing IPSec Understanding Site SecurityLooking at Special and Administrative Encrypting with VPN Technology Understanding Computer SecurityShares Using Auditing to Complete the Security Authenticating with What You KnowIntroducing the Registry Picture Authenticating with What You Own orUsing Encryption to Protect Data Using Password Complexity to Make a PossessExamining Types of Encryption Stronger Password Authenticating with What You AreIntroducing Public Key Infrastructure Using Account Lockout to Prevent Introducing RADIUS and TACACS1Encrypting Email Hacking Using Run AsEncrypting Files with EFS Looking at Password Length Introducing Directory Services with ActiveEncrypting Disks in Windows Using Password History to Enforce DirectoryIntroducing IPSec Security Looking at Domain ControllersEncrypting with VPN Technology Setting the Time between Password Introducing NTLMUsing Auditing to Complete the Security Changes Introducing KerberosPicture Using Password Group Policies to Using Organizational UnitsUsing Password Complexity to Make a Enforce Security Looking at ObjectsStronger Password Understanding Common Attack Methods Using GroupsUsing Account Lockout to Prevent Hacking Examining Hardware Firewalls and Their Looking at Web Server AuthenticationLooking at Password Length Characteristics Comparing Rights and PermissionsUsing Password History to Enforce Security Using Hardware Firewalls versus Looking at NTFSSetting the Time between Password Software Firewalls Using NTFS PermissionsChanges Using Stateful versus Stateless Looking at Effective NTFS PermissionsUsing Password Group Policies to Enforce Inspection Copying and Moving FilesSecurity Controlling Access with Network Access Using Folder and File OwnersUnderstanding Common Attack Methods Protection (NAP) Sharing Drives and FoldersExamining Hardware Firewalls and Their Understanding the Purpose of NAP Looking at Special and AdministrativeCharacteristics Looking at How NAP Works SharesUsing Hardware Firewalls versus Software Examining the Requirements for NAP Introducing the RegistryFirewalls Using Isolation to Protect the Network Using Encryption to Protect DataUsing Stateful versus Stateless Inspection Understanding Virtual LANs Examining Types of EncryptionControlling Access with Network Access Understanding Routing Introducing Public Key InfrastructureProtection (NAP) Looking at Intrusion Detection and Encrypting EmailUnderstanding the Purpose of NAP Intrusion Prevention Systems Encrypting Files with EFSLooking at How NAP Works Looking at Honeypots Encrypting Disks in WindowsExamining the Requirements for NAP Looking at DMZs Introducing IPSecUsing Isolation to Protect the Network Understanding Network Address Encrypting with VPN TechnologyUnderstanding Virtual LANs Translation (NAT) Using Auditing to Complete the SecurityUnderstanding Routing Understanding Virtual Private Networks PictureLooking at Intrusion Detection and Intrusion (VPNs) Using Password Complexity to Make aPrevention Systems Understanding Internet Protocol Security Stronger PasswordLooking at Honeypots (IPsec) Using Account Lockout to Prevent HackingLooking at DMZs Using Other VPN Protocols Looking at Password LengthUnderstanding Network Address Translation Looking at Server and Domain Isolation Using Password History to Enforce(NAT) Protecting Data with Protocol Security SecurityUnderstanding Virtual Private Networks Understanding Tunneling Setting the Time between Password(VPNs) Using DNS Security Extensions ChangesUnderstanding Internet Protocol Security (DNSSEC) Using Password Group Policies to Enforce(IPsec) Looking at Protocol Spoofing SecurityUsing Other VPN Protocols Utilizing Network Sniffing Understanding Common Attack MethodsLooking at Server and Domain Isolation Understanding Common NETWORK Examining Hardware Firewalls and TheirProtecting Data with Protocol Security Attack Methods CharacteristicsUnderstanding Tunneling Securing Wireless Network Using Hardware Firewalls versus SoftwareUsing DNS Security Extensions (DNSSEC) Using Service Set Identifier (SSID) FirewallsLooking at Protocol Spoofing Understanding Keys Using Stateful versus Stateless InspectionUtilizing Network Sniffing Utilizing MAC Filters Controlling Access with Network AccessUnderstanding Common NETWORK Attack Considering Pros and Cons of Specific Protection (NAP)Methods Security Types Understanding the Purpose of NAP

Page 51: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Securing Wireless Network Protecting Your Computer from Malware Looking at How NAP WorksUsing Service Set Identifier (SSID) Utilizing Windows Updates Examining the Requirements for NAPUnderstanding Keys Utilizing User Account Control Using Isolation to Protect the NetworkUtilizing MAC Filters Using Windows Firewall Understanding Virtual LANsConsidering Pros and Cons of Specific Using Offline Files Understanding RoutingSecurity Types Locking Down a Client Computer Looking at Intrusion Detection andProtecting Your Computer from Malware Protecting Your Email Intrusion Prevention SystemsUtilizing Windows Updates Dealing with Spam Looking at HoneypotsUtilizing User Account Control Relaying Email Looking at DMZsUsing Windows Firewall Securing Internet Explorer Understanding Network AddressUsing Offline Files Looking at Cookies and Privacy Settings Translation (NAT)Locking Down a Client Computer Examining Content Zones Understanding Virtual Private NetworksProtecting Your Email Phishing and Pharming (VPNs)Dealing with Spam Protecting Your Server Understanding Internet Protocol SecurityRelaying Email Placing the Server (IPsec)Securing Internet Explorer Hardening the Server Using Other VPN ProtocolsLooking at Cookies and Privacy Settings Using Secure Dynamic DNS Looking at Server and Domain IsolationExamining Content Zones Protecting Data with Protocol SecurityPhishing and Pharming Understanding TunnelingProtecting Your Server line Using DNS Security Extensions (DNSSEC)Placing the Server Understanding Confidentiality Looking at Protocol SpoofingHardening the Server Understanding Integrity Utilizing Network SniffingUsing Secure Dynamic DNS Understanding Availability Understanding Common NETWORK

Defining Threats and Risk Management Attack MethodsUnderstanding the Principle of Least Securing Wireless Network

line Privilege Using Service Set Identifier (SSID)Understanding Confidentiality Understanding Attack Surface Understanding KeysUnderstanding Integrity Understanding Social Engineering Utilizing MAC FiltersUnderstanding Availability Linking Cost with Security Considering Pros and Cons of SpecificDefining Threats and Risk Management Looking at Physical Security as the First Security TypesUnderstanding the Principle of Least Line of Defense Protecting Your Computer from MalwarePrivilege Understanding Site Security Utilizing Windows UpdatesUnderstanding Attack Surface Understanding Computer Security Utilizing User Account ControlUnderstanding Social Engineering Authenticating with What You Know Using Windows FirewallLinking Cost with Security Authenticating with What You Own or Using Offline FilesLooking at Physical Security as the First Possess Locking Down a Client ComputerLine of Defense Authenticating with What You Are Protecting Your EmailUnderstanding Site Security Introducing RADIUS and TACACS1 Dealing with SpamUnderstanding Computer Security Using Run As Relaying EmailAuthenticating with What You Know Introducing Directory Services with Active Securing Internet ExplorerAuthenticating with What You Own or Directory Looking at Cookies and Privacy SettingsPossess Looking at Domain Controllers Examining Content ZonesAuthenticating with What You Are Introducing NTLM Phishing and PharmingIntroducing RADIUS and TACACS1 Introducing Kerberos Protecting Your ServerUsing Run As Using Organizational Units Placing the ServerIntroducing Directory Services with Active Looking at Objects Hardening the ServerDirectory Using Groups Using Secure Dynamic DNSLooking at Domain Controllers Looking at Web Server AuthenticationIntroducing NTLM Comparing Rights and PermissionsIntroducing Kerberos Looking at NTFS lineUsing Organizational Units Using NTFS Permissions Understanding ConfidentialityLooking at Objects Looking at Effective NTFS Permissions Understanding IntegrityUsing Groups Copying and Moving Files Understanding AvailabilityLooking at Web Server Authentication Using Folder and File Owners Defining Threats and Risk ManagementComparing Rights and Permissions Sharing Drives and Folders Understanding the Principle of LeastLooking at NTFS Looking at Special and Administrative PrivilegeUsing NTFS Permissions Shares Understanding Attack SurfaceLooking at Effective NTFS Permissions Introducing the Registry Understanding Social EngineeringCopying and Moving Files Using Encryption to Protect Data Linking Cost with SecurityUsing Folder and File Owners Examining Types of Encryption Looking at Physical Security as the FirstSharing Drives and Folders Introducing Public Key Infrastructure Line of DefenseLooking at Special and Administrative Encrypting Email Understanding Site SecurityShares Encrypting Files with EFS Understanding Computer SecurityIntroducing the Registry Encrypting Disks in Windows Authenticating with What You KnowUsing Encryption to Protect Data Introducing IPSec Authenticating with What You Own orExamining Types of Encryption Encrypting with VPN Technology Possess

Page 52: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Introducing Public Key Infrastructure Using Auditing to Complete the Security Authenticating with What You AreEncrypting Email Picture Introducing RADIUS and TACACS1Encrypting Files with EFS Using Password Complexity to Make a Using Run AsEncrypting Disks in Windows Stronger Password Introducing Directory Services with ActiveIntroducing IPSec Using Account Lockout to Prevent DirectoryEncrypting with VPN Technology Hacking Looking at Domain ControllersUsing Auditing to Complete the Security Looking at Password Length Introducing NTLMPicture Using Password History to Enforce Introducing KerberosUsing Password Complexity to Make a Security Using Organizational UnitsStronger Password Setting the Time between Password Looking at ObjectsUsing Account Lockout to Prevent Hacking Changes Using GroupsLooking at Password Length Using Password Group Policies to Looking at Web Server AuthenticationUsing Password History to Enforce Security Enforce Security Comparing Rights and PermissionsSetting the Time between Password Understanding Common Attack Methods Looking at NTFSChanges Examining Hardware Firewalls and Their Using NTFS PermissionsUsing Password Group Policies to Enforce Characteristics Looking at Effective NTFS PermissionsSecurity Using Hardware Firewalls versus Copying and Moving FilesUnderstanding Common Attack Methods Software Firewalls Using Folder and File OwnersExamining Hardware Firewalls and Their Using Stateful versus Stateless Sharing Drives and FoldersCharacteristics Inspection Looking at Special and AdministrativeUsing Hardware Firewalls versus Software Controlling Access with Network Access SharesFirewalls Protection (NAP) Introducing the RegistryUsing Stateful versus Stateless Inspection Understanding the Purpose of NAP Using Encryption to Protect DataControlling Access with Network Access Looking at How NAP Works Examining Types of EncryptionProtection (NAP) Examining the Requirements for NAP Introducing Public Key InfrastructureUnderstanding the Purpose of NAP Using Isolation to Protect the Network Encrypting EmailLooking at How NAP Works Understanding Virtual LANs Encrypting Files with EFSExamining the Requirements for NAP Understanding Routing Encrypting Disks in WindowsUsing Isolation to Protect the Network Looking at Intrusion Detection and Introducing IPSecUnderstanding Virtual LANs Intrusion Prevention Systems Encrypting with VPN TechnologyUnderstanding Routing Looking at Honeypots Using Auditing to Complete the SecurityLooking at Intrusion Detection and Intrusion Looking at DMZs PicturePrevention Systems Understanding Network Address Using Password Complexity to Make aLooking at Honeypots Translation (NAT) Stronger PasswordLooking at DMZs Understanding Virtual Private Networks Using Account Lockout to Prevent HackingUnderstanding Network Address Translation (VPNs) Looking at Password Length(NAT) Understanding Internet Protocol Security Using Password History to EnforceUnderstanding Virtual Private Networks (IPsec) Security(VPNs) Using Other VPN Protocols Setting the Time between PasswordUnderstanding Internet Protocol Security Looking at Server and Domain Isolation Changes(IPsec) Protecting Data with Protocol Security Using Password Group Policies to EnforceUsing Other VPN Protocols Understanding Tunneling SecurityLooking at Server and Domain Isolation Using DNS Security Extensions Understanding Common Attack MethodsProtecting Data with Protocol Security (DNSSEC) Examining Hardware Firewalls and TheirUnderstanding Tunneling Looking at Protocol Spoofing CharacteristicsUsing DNS Security Extensions (DNSSEC) Utilizing Network Sniffing Using Hardware Firewalls versus SoftwareLooking at Protocol Spoofing Understanding Common NETWORK FirewallsUtilizing Network Sniffing Attack Methods Using Stateful versus Stateless InspectionUnderstanding Common NETWORK Attack Securing Wireless Network Controlling Access with Network AccessMethods Using Service Set Identifier (SSID) Protection (NAP)Securing Wireless Network Understanding Keys Understanding the Purpose of NAPUsing Service Set Identifier (SSID) Utilizing MAC Filters Looking at How NAP WorksUnderstanding Keys Considering Pros and Cons of Specific Examining the Requirements for NAPUtilizing MAC Filters Security Types Using Isolation to Protect the NetworkConsidering Pros and Cons of Specific Protecting Your Computer from Malware Understanding Virtual LANsSecurity Types Utilizing Windows Updates Understanding RoutingProtecting Your Computer from Malware Utilizing User Account Control Looking at Intrusion Detection andUtilizing Windows Updates Using Windows Firewall Intrusion Prevention SystemsUtilizing User Account Control Using Offline Files Looking at HoneypotsUsing Windows Firewall Locking Down a Client Computer Looking at DMZsUsing Offline Files Protecting Your Email Understanding Network AddressLocking Down a Client Computer Dealing with Spam Translation (NAT)Protecting Your Email Relaying Email Understanding Virtual Private NetworksDealing with Spam Securing Internet Explorer (VPNs)Relaying Email Looking at Cookies and Privacy Settings Understanding Internet Protocol SecuritySecuring Internet Explorer Examining Content Zones (IPsec)

Page 53: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Looking at Cookies and Privacy Settings Phishing and Pharming Using Other VPN ProtocolsExamining Content Zones Protecting Your Server Looking at Server and Domain IsolationPhishing and Pharming Placing the Server Protecting Data with Protocol SecurityProtecting Your Server Hardening the Server Understanding TunnelingPlacing the Server Using Secure Dynamic DNS Using DNS Security Extensions (DNSSEC)Hardening the Server Looking at Protocol SpoofingUsing Secure Dynamic DNS Utilizing Network Sniffing

line Understanding Common NETWORKUnderstanding Confidentiality Attack Methods

line Understanding Integrity Securing Wireless NetworkUnderstanding Confidentiality Understanding Availability Using Service Set Identifier (SSID)Understanding Integrity Defining Threats and Risk Management Understanding KeysUnderstanding Availability Understanding the Principle of Least Utilizing MAC FiltersDefining Threats and Risk Management Privilege Considering Pros and Cons of SpecificUnderstanding the Principle of Least Understanding Attack Surface Security TypesPrivilege Understanding Social Engineering Protecting Your Computer from MalwareUnderstanding Attack Surface Linking Cost with Security Utilizing Windows UpdatesUnderstanding Social Engineering Looking at Physical Security as the First Utilizing User Account ControlLinking Cost with Security Line of Defense Using Windows FirewallLooking at Physical Security as the First Understanding Site Security Using Offline FilesLine of Defense Understanding Computer Security Locking Down a Client ComputerUnderstanding Site Security Authenticating with What You Know Protecting Your EmailUnderstanding Computer Security Authenticating with What You Own or Dealing with SpamAuthenticating with What You Know Possess Relaying EmailAuthenticating with What You Own or Authenticating with What You Are Securing Internet ExplorerPossess Introducing RADIUS and TACACS1 Looking at Cookies and Privacy SettingsAuthenticating with What You Are Using Run As Examining Content ZonesIntroducing RADIUS and TACACS1 Introducing Directory Services with Active Phishing and PharmingUsing Run As Directory Protecting Your ServerIntroducing Directory Services with Active Looking at Domain Controllers Placing the ServerDirectory Introducing NTLM Hardening the ServerLooking at Domain Controllers Introducing Kerberos Using Secure Dynamic DNSIntroducing NTLM Using Organizational UnitsIntroducing Kerberos Looking at ObjectsUsing Organizational Units Using Groups lineLooking at Objects Looking at Web Server Authentication Understanding ConfidentialityUsing Groups Comparing Rights and Permissions Understanding IntegrityLooking at Web Server Authentication Looking at NTFS Understanding AvailabilityComparing Rights and Permissions Using NTFS Permissions Defining Threats and Risk ManagementLooking at NTFS Looking at Effective NTFS Permissions Understanding the Principle of LeastUsing NTFS Permissions Copying and Moving Files PrivilegeLooking at Effective NTFS Permissions Using Folder and File Owners Understanding Attack SurfaceCopying and Moving Files Sharing Drives and Folders Understanding Social EngineeringUsing Folder and File Owners Looking at Special and Administrative Linking Cost with SecuritySharing Drives and Folders Shares Looking at Physical Security as the FirstLooking at Special and Administrative Introducing the Registry Line of DefenseShares Using Encryption to Protect Data Understanding Site SecurityIntroducing the Registry Examining Types of Encryption Understanding Computer SecurityUsing Encryption to Protect Data Introducing Public Key Infrastructure Authenticating with What You KnowExamining Types of Encryption Encrypting Email Authenticating with What You Own orIntroducing Public Key Infrastructure Encrypting Files with EFS PossessEncrypting Email Encrypting Disks in Windows Authenticating with What You AreEncrypting Files with EFS Introducing IPSec Introducing RADIUS and TACACS1Encrypting Disks in Windows Encrypting with VPN Technology Using Run AsIntroducing IPSec Using Auditing to Complete the Security Introducing Directory Services with ActiveEncrypting with VPN Technology Picture DirectoryUsing Auditing to Complete the Security Using Password Complexity to Make a Looking at Domain ControllersPicture Stronger Password Introducing NTLMUsing Password Complexity to Make a Using Account Lockout to Prevent Introducing KerberosStronger Password Hacking Using Organizational UnitsUsing Account Lockout to Prevent Hacking Looking at Password Length Looking at ObjectsLooking at Password Length Using Password History to Enforce Using GroupsUsing Password History to Enforce Security Security Looking at Web Server AuthenticationSetting the Time between Password Setting the Time between Password Comparing Rights and PermissionsChanges Changes Looking at NTFSUsing Password Group Policies to Enforce Using Password Group Policies to Using NTFS Permissions

Page 54: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Security Enforce Security Looking at Effective NTFS PermissionsUnderstanding Common Attack Methods Understanding Common Attack Methods Copying and Moving FilesExamining Hardware Firewalls and Their Examining Hardware Firewalls and Their Using Folder and File OwnersCharacteristics Characteristics Sharing Drives and FoldersUsing Hardware Firewalls versus Software Using Hardware Firewalls versus Looking at Special and AdministrativeFirewalls Software Firewalls SharesUsing Stateful versus Stateless Inspection Using Stateful versus Stateless Introducing the RegistryControlling Access with Network Access Inspection Using Encryption to Protect DataProtection (NAP) Controlling Access with Network Access Examining Types of EncryptionUnderstanding the Purpose of NAP Protection (NAP) Introducing Public Key InfrastructureLooking at How NAP Works Understanding the Purpose of NAP Encrypting EmailExamining the Requirements for NAP Looking at How NAP Works Encrypting Files with EFSUsing Isolation to Protect the Network Examining the Requirements for NAP Encrypting Disks in WindowsUnderstanding Virtual LANs Using Isolation to Protect the Network Introducing IPSecUnderstanding Routing Understanding Virtual LANs Encrypting with VPN TechnologyLooking at Intrusion Detection and Intrusion Understanding Routing Using Auditing to Complete the SecurityPrevention Systems Looking at Intrusion Detection and PictureLooking at Honeypots Intrusion Prevention Systems Using Password Complexity to Make aLooking at DMZs Looking at Honeypots Stronger PasswordUnderstanding Network Address Translation Looking at DMZs Using Account Lockout to Prevent Hacking(NAT) Understanding Network Address Looking at Password LengthUnderstanding Virtual Private Networks Translation (NAT) Using Password History to Enforce(VPNs) Understanding Virtual Private Networks SecurityUnderstanding Internet Protocol Security (VPNs) Setting the Time between Password(IPsec) Understanding Internet Protocol Security ChangesUsing Other VPN Protocols (IPsec) Using Password Group Policies to EnforceLooking at Server and Domain Isolation Using Other VPN Protocols SecurityProtecting Data with Protocol Security Looking at Server and Domain Isolation Understanding Common Attack MethodsUnderstanding Tunneling Protecting Data with Protocol Security Examining Hardware Firewalls and TheirUsing DNS Security Extensions (DNSSEC) Understanding Tunneling CharacteristicsLooking at Protocol Spoofing Using DNS Security Extensions Using Hardware Firewalls versus SoftwareUtilizing Network Sniffing (DNSSEC) FirewallsUnderstanding Common NETWORK Attack Looking at Protocol Spoofing Using Stateful versus Stateless InspectionMethods Utilizing Network Sniffing Controlling Access with Network AccessSecuring Wireless Network Understanding Common NETWORK Protection (NAP)Using Service Set Identifier (SSID) Attack Methods Understanding the Purpose of NAPUnderstanding Keys Securing Wireless Network Looking at How NAP WorksUtilizing MAC Filters Using Service Set Identifier (SSID) Examining the Requirements for NAPConsidering Pros and Cons of Specific Understanding Keys Using Isolation to Protect the NetworkSecurity Types Utilizing MAC Filters Understanding Virtual LANsProtecting Your Computer from Malware Considering Pros and Cons of Specific Understanding RoutingUtilizing Windows Updates Security Types Looking at Intrusion Detection andUtilizing User Account Control Protecting Your Computer from Malware Intrusion Prevention SystemsUsing Windows Firewall Utilizing Windows Updates Looking at HoneypotsUsing Offline Files Utilizing User Account Control Looking at DMZsLocking Down a Client Computer Using Windows Firewall Understanding Network AddressProtecting Your Email Using Offline Files Translation (NAT)Dealing with Spam Locking Down a Client Computer Understanding Virtual Private NetworksRelaying Email Protecting Your Email (VPNs)Securing Internet Explorer Dealing with Spam Understanding Internet Protocol SecurityLooking at Cookies and Privacy Settings Relaying Email (IPsec)Examining Content Zones Securing Internet Explorer Using Other VPN ProtocolsPhishing and Pharming Looking at Cookies and Privacy Settings Looking at Server and Domain IsolationProtecting Your Server Examining Content Zones Protecting Data with Protocol SecurityPlacing the Server Phishing and Pharming Understanding TunnelingHardening the Server Protecting Your Server Using DNS Security Extensions (DNSSEC)Using Secure Dynamic DNS Placing the Server Looking at Protocol Spoofing

Hardening the Server Utilizing Network SniffingUsing Secure Dynamic DNS Understanding Common NETWORK

line Attack MethodsUnderstanding Confidentiality Securing Wireless NetworkUnderstanding Integrity line Using Service Set Identifier (SSID)Understanding Availability Understanding Confidentiality Understanding KeysDefining Threats and Risk Management Understanding Integrity Utilizing MAC FiltersUnderstanding the Principle of Least Understanding Availability Considering Pros and Cons of SpecificPrivilege Defining Threats and Risk Management Security Types

Page 55: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Understanding Attack Surface Understanding the Principle of Least Protecting Your Computer from MalwareUnderstanding Social Engineering Privilege Utilizing Windows UpdatesLinking Cost with Security Understanding Attack Surface Utilizing User Account ControlLooking at Physical Security as the First Understanding Social Engineering Using Windows FirewallLine of Defense Linking Cost with Security Using Offline FilesUnderstanding Site Security Looking at Physical Security as the First Locking Down a Client ComputerUnderstanding Computer Security Line of Defense Protecting Your EmailAuthenticating with What You Know Understanding Site Security Dealing with SpamAuthenticating with What You Own or Understanding Computer Security Relaying EmailPossess Authenticating with What You Know Securing Internet ExplorerAuthenticating with What You Are Authenticating with What You Own or Looking at Cookies and Privacy SettingsIntroducing RADIUS and TACACS1 Possess Examining Content ZonesUsing Run As Authenticating with What You Are Phishing and PharmingIntroducing Directory Services with Active Introducing RADIUS and TACACS1 Protecting Your ServerDirectory Using Run As Placing the ServerLooking at Domain Controllers Introducing Directory Services with Active Hardening the ServerIntroducing NTLM Directory Using Secure Dynamic DNSIntroducing Kerberos Looking at Domain ControllersUsing Organizational Units Introducing NTLMLooking at Objects Introducing Kerberos lineUsing Groups Using Organizational Units Understanding ConfidentialityLooking at Web Server Authentication Looking at Objects Understanding IntegrityComparing Rights and Permissions Using Groups Understanding AvailabilityLooking at NTFS Looking at Web Server Authentication Defining Threats and Risk ManagementUsing NTFS Permissions Comparing Rights and Permissions Understanding the Principle of LeastLooking at Effective NTFS Permissions Looking at NTFS PrivilegeCopying and Moving Files Using NTFS Permissions Understanding Attack SurfaceUsing Folder and File Owners Looking at Effective NTFS Permissions Understanding Social EngineeringSharing Drives and Folders Copying and Moving Files Linking Cost with SecurityLooking at Special and Administrative Using Folder and File Owners Looking at Physical Security as the FirstShares Sharing Drives and Folders Line of DefenseIntroducing the Registry Looking at Special and Administrative Understanding Site SecurityUsing Encryption to Protect Data Shares Understanding Computer SecurityExamining Types of Encryption Introducing the Registry Authenticating with What You KnowIntroducing Public Key Infrastructure Using Encryption to Protect Data Authenticating with What You Own orEncrypting Email Examining Types of Encryption PossessEncrypting Files with EFS Introducing Public Key Infrastructure Authenticating with What You AreEncrypting Disks in Windows Encrypting Email Introducing RADIUS and TACACS1Introducing IPSec Encrypting Files with EFS Using Run AsEncrypting with VPN Technology Encrypting Disks in Windows Introducing Directory Services with ActiveUsing Auditing to Complete the Security Introducing IPSec DirectoryPicture Encrypting with VPN Technology Looking at Domain ControllersUsing Password Complexity to Make a Using Auditing to Complete the Security Introducing NTLMStronger Password Picture Introducing KerberosUsing Account Lockout to Prevent Hacking Using Password Complexity to Make a Using Organizational UnitsLooking at Password Length Stronger Password Looking at ObjectsUsing Password History to Enforce Security Using Account Lockout to Prevent Using GroupsSetting the Time between Password Hacking Looking at Web Server AuthenticationChanges Looking at Password Length Comparing Rights and PermissionsUsing Password Group Policies to Enforce Using Password History to Enforce Looking at NTFSSecurity Security Using NTFS PermissionsUnderstanding Common Attack Methods Setting the Time between Password Looking at Effective NTFS PermissionsExamining Hardware Firewalls and Their Changes Copying and Moving FilesCharacteristics Using Password Group Policies to Using Folder and File OwnersUsing Hardware Firewalls versus Software Enforce Security Sharing Drives and FoldersFirewalls Understanding Common Attack Methods Looking at Special and AdministrativeUsing Stateful versus Stateless Inspection Examining Hardware Firewalls and Their SharesControlling Access with Network Access Characteristics Introducing the RegistryProtection (NAP) Using Hardware Firewalls versus Using Encryption to Protect DataUnderstanding the Purpose of NAP Software Firewalls Examining Types of EncryptionLooking at How NAP Works Using Stateful versus Stateless Introducing Public Key InfrastructureExamining the Requirements for NAP Inspection Encrypting EmailUsing Isolation to Protect the Network Controlling Access with Network Access Encrypting Files with EFSUnderstanding Virtual LANs Protection (NAP) Encrypting Disks in WindowsUnderstanding Routing Understanding the Purpose of NAP Introducing IPSecLooking at Intrusion Detection and Intrusion Looking at How NAP Works Encrypting with VPN Technology

Page 56: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Prevention Systems Examining the Requirements for NAP Using Auditing to Complete the SecurityLooking at Honeypots Using Isolation to Protect the Network PictureLooking at DMZs Understanding Virtual LANs Using Password Complexity to Make aUnderstanding Network Address Translation Understanding Routing Stronger Password(NAT) Looking at Intrusion Detection and Using Account Lockout to Prevent HackingUnderstanding Virtual Private Networks Intrusion Prevention Systems Looking at Password Length(VPNs) Looking at Honeypots Using Password History to EnforceUnderstanding Internet Protocol Security Looking at DMZs Security(IPsec) Understanding Network Address Setting the Time between PasswordUsing Other VPN Protocols Translation (NAT) ChangesLooking at Server and Domain Isolation Understanding Virtual Private Networks Using Password Group Policies to EnforceProtecting Data with Protocol Security (VPNs) SecurityUnderstanding Tunneling Understanding Internet Protocol Security Understanding Common Attack MethodsUsing DNS Security Extensions (DNSSEC) (IPsec) Examining Hardware Firewalls and TheirLooking at Protocol Spoofing Using Other VPN Protocols CharacteristicsUtilizing Network Sniffing Looking at Server and Domain Isolation Using Hardware Firewalls versus SoftwareUnderstanding Common NETWORK Attack Protecting Data with Protocol Security FirewallsMethods Understanding Tunneling Using Stateful versus Stateless InspectionSecuring Wireless Network Using DNS Security Extensions Controlling Access with Network AccessUsing Service Set Identifier (SSID) (DNSSEC) Protection (NAP)Understanding Keys Looking at Protocol Spoofing Understanding the Purpose of NAPUtilizing MAC Filters Utilizing Network Sniffing Looking at How NAP WorksConsidering Pros and Cons of Specific Understanding Common NETWORK Examining the Requirements for NAPSecurity Types Attack Methods Using Isolation to Protect the NetworkProtecting Your Computer from Malware Securing Wireless Network Understanding Virtual LANsUtilizing Windows Updates Using Service Set Identifier (SSID) Understanding RoutingUtilizing User Account Control Understanding Keys Looking at Intrusion Detection andUsing Windows Firewall Utilizing MAC Filters Intrusion Prevention SystemsUsing Offline Files Considering Pros and Cons of Specific Looking at HoneypotsLocking Down a Client Computer Security Types Looking at DMZsProtecting Your Email Protecting Your Computer from Malware Understanding Network AddressDealing with Spam Utilizing Windows Updates Translation (NAT)Relaying Email Utilizing User Account Control Understanding Virtual Private NetworksSecuring Internet Explorer Using Windows Firewall (VPNs)Looking at Cookies and Privacy Settings Using Offline Files Understanding Internet Protocol SecurityExamining Content Zones Locking Down a Client Computer (IPsec)Phishing and Pharming Protecting Your Email Using Other VPN ProtocolsProtecting Your Server Dealing with Spam Looking at Server and Domain IsolationPlacing the Server Relaying Email Protecting Data with Protocol SecurityHardening the Server Securing Internet Explorer Understanding TunnelingUsing Secure Dynamic DNS Looking at Cookies and Privacy Settings Using DNS Security Extensions (DNSSEC)

Examining Content Zones Looking at Protocol SpoofingPhishing and Pharming Utilizing Network Sniffing

line Protecting Your Server Understanding Common NETWORKUnderstanding Confidentiality Placing the Server Attack MethodsUnderstanding Integrity Hardening the Server Securing Wireless NetworkUnderstanding Availability Using Secure Dynamic DNS Using Service Set Identifier (SSID)Defining Threats and Risk Management Understanding KeysUnderstanding the Principle of Least Utilizing MAC FiltersPrivilege line Considering Pros and Cons of SpecificUnderstanding Attack Surface Understanding Confidentiality Security TypesUnderstanding Social Engineering Understanding Integrity Protecting Your Computer from MalwareLinking Cost with Security Understanding Availability Utilizing Windows UpdatesLooking at Physical Security as the First Defining Threats and Risk Management Utilizing User Account ControlLine of Defense Understanding the Principle of Least Using Windows FirewallUnderstanding Site Security Privilege Using Offline FilesUnderstanding Computer Security Understanding Attack Surface Locking Down a Client ComputerAuthenticating with What You Know Understanding Social Engineering Protecting Your EmailAuthenticating with What You Own or Linking Cost with Security Dealing with SpamPossess Looking at Physical Security as the First Relaying EmailAuthenticating with What You Are Line of Defense Securing Internet ExplorerIntroducing RADIUS and TACACS1 Understanding Site Security Looking at Cookies and Privacy SettingsUsing Run As Understanding Computer Security Examining Content ZonesIntroducing Directory Services with Active Authenticating with What You Know Phishing and PharmingDirectory Authenticating with What You Own or Protecting Your ServerLooking at Domain Controllers Possess Placing the Server

Page 57: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Introducing NTLM Authenticating with What You Are Hardening the ServerIntroducing Kerberos Introducing RADIUS and TACACS1 Using Secure Dynamic DNSUsing Organizational Units Using Run AsLooking at Objects Introducing Directory Services with ActiveUsing Groups DirectoryLooking at Web Server Authentication Looking at Domain ControllersComparing Rights and Permissions Introducing NTLMLooking at NTFS Introducing KerberosUsing NTFS Permissions Using Organizational UnitsLooking at Effective NTFS Permissions Looking at ObjectsCopying and Moving Files Using GroupsUsing Folder and File Owners Looking at Web Server AuthenticationSharing Drives and Folders Comparing Rights and PermissionsLooking at Special and Administrative Looking at NTFSShares Using NTFS PermissionsIntroducing the Registry Looking at Effective NTFS PermissionsUsing Encryption to Protect Data Copying and Moving FilesExamining Types of Encryption Using Folder and File OwnersIntroducing Public Key Infrastructure Sharing Drives and FoldersEncrypting Email Looking at Special and AdministrativeEncrypting Files with EFS SharesEncrypting Disks in Windows Introducing the RegistryIntroducing IPSec Using Encryption to Protect DataEncrypting with VPN Technology Examining Types of EncryptionUsing Auditing to Complete the Security Introducing Public Key InfrastructurePicture Encrypting EmailUsing Password Complexity to Make a Encrypting Files with EFSStronger Password Encrypting Disks in WindowsUsing Account Lockout to Prevent Hacking Introducing IPSecLooking at Password Length Encrypting with VPN TechnologyUsing Password History to Enforce Security Using Auditing to Complete the SecuritySetting the Time between Password PictureChanges Using Password Complexity to Make aUsing Password Group Policies to Enforce Stronger PasswordSecurity Using Account Lockout to PreventUnderstanding Common Attack Methods HackingExamining Hardware Firewalls and Their Looking at Password LengthCharacteristics Using Password History to EnforceUsing Hardware Firewalls versus Software SecurityFirewalls Setting the Time between PasswordUsing Stateful versus Stateless Inspection ChangesControlling Access with Network Access Using Password Group Policies toProtection (NAP) Enforce SecurityUnderstanding the Purpose of NAP Understanding Common Attack MethodsLooking at How NAP Works Examining Hardware Firewalls and TheirExamining the Requirements for NAP CharacteristicsUsing Isolation to Protect the Network Using Hardware Firewalls versusUnderstanding Virtual LANs Software FirewallsUnderstanding Routing Using Stateful versus StatelessLooking at Intrusion Detection and Intrusion InspectionPrevention Systems Controlling Access with Network AccessLooking at Honeypots Protection (NAP)Looking at DMZs Understanding the Purpose of NAPUnderstanding Network Address Translation Looking at How NAP Works(NAT) Examining the Requirements for NAPUnderstanding Virtual Private Networks Using Isolation to Protect the Network(VPNs) Understanding Virtual LANsUnderstanding Internet Protocol Security Understanding Routing(IPsec) Looking at Intrusion Detection andUsing Other VPN Protocols Intrusion Prevention SystemsLooking at Server and Domain Isolation Looking at HoneypotsProtecting Data with Protocol Security Looking at DMZsUnderstanding Tunneling Understanding Network AddressUsing DNS Security Extensions (DNSSEC) Translation (NAT)Looking at Protocol Spoofing Understanding Virtual Private NetworksUtilizing Network Sniffing (VPNs)

Page 58: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Understanding Common NETWORK Attack Understanding Internet Protocol SecurityMethods (IPsec)Securing Wireless Network Using Other VPN ProtocolsUsing Service Set Identifier (SSID) Looking at Server and Domain IsolationUnderstanding Keys Protecting Data with Protocol SecurityUtilizing MAC Filters Understanding TunnelingConsidering Pros and Cons of Specific Using DNS Security ExtensionsSecurity Types (DNSSEC)Protecting Your Computer from Malware Looking at Protocol SpoofingUtilizing Windows Updates Utilizing Network SniffingUtilizing User Account Control Understanding Common NETWORKUsing Windows Firewall Attack MethodsUsing Offline Files Securing Wireless NetworkLocking Down a Client Computer Using Service Set Identifier (SSID)Protecting Your Email Understanding KeysDealing with Spam Utilizing MAC FiltersRelaying Email Considering Pros and Cons of SpecificSecuring Internet Explorer Security TypesLooking at Cookies and Privacy Settings Protecting Your Computer from MalwareExamining Content Zones Utilizing Windows UpdatesPhishing and Pharming Utilizing User Account ControlProtecting Your Server Using Windows FirewallPlacing the Server Using Offline FilesHardening the Server Locking Down a Client ComputerUsing Secure Dynamic DNS Protecting Your Email

Dealing with SpamRelaying EmailSecuring Internet ExplorerLooking at Cookies and Privacy SettingsExamining Content ZonesPhishing and PharmingProtecting Your ServerPlacing the ServerHardening the ServerUsing Secure Dynamic DNS

lineUnderstanding ConfidentialityUnderstanding IntegrityUnderstanding AvailabilityDefining Threats and Risk ManagementUnderstanding the Principle of LeastPrivilegeUnderstanding Attack SurfaceUnderstanding Social EngineeringLinking Cost with SecurityLooking at Physical Security as the FirstLine of DefenseUnderstanding Site SecurityUnderstanding Computer SecurityAuthenticating with What You KnowAuthenticating with What You Own orPossessAuthenticating with What You AreIntroducing RADIUS and TACACS1Using Run AsIntroducing Directory Services with ActiveDirectoryLooking at Domain ControllersIntroducing NTLMIntroducing KerberosUsing Organizational UnitsLooking at ObjectsUsing GroupsLooking at Web Server Authentication

Page 59: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Comparing Rights and PermissionsLooking at NTFSUsing NTFS PermissionsLooking at Effective NTFS PermissionsCopying and Moving FilesUsing Folder and File OwnersSharing Drives and FoldersLooking at Special and AdministrativeSharesIntroducing the RegistryUsing Encryption to Protect DataExamining Types of EncryptionIntroducing Public Key InfrastructureEncrypting EmailEncrypting Files with EFSEncrypting Disks in WindowsIntroducing IPSecEncrypting with VPN TechnologyUsing Auditing to Complete the SecurityPictureUsing Password Complexity to Make aStronger PasswordUsing Account Lockout to PreventHackingLooking at Password LengthUsing Password History to EnforceSecuritySetting the Time between PasswordChangesUsing Password Group Policies toEnforce SecurityUnderstanding Common Attack MethodsExamining Hardware Firewalls and TheirCharacteristicsUsing Hardware Firewalls versusSoftware FirewallsUsing Stateful versus StatelessInspectionControlling Access with Network AccessProtection (NAP)Understanding the Purpose of NAPLooking at How NAP WorksExamining the Requirements for NAPUsing Isolation to Protect the NetworkUnderstanding Virtual LANsUnderstanding RoutingLooking at Intrusion Detection andIntrusion Prevention SystemsLooking at HoneypotsLooking at DMZsUnderstanding Network AddressTranslation (NAT)Understanding Virtual Private Networks(VPNs)Understanding Internet Protocol Security(IPsec)Using Other VPN ProtocolsLooking at Server and Domain IsolationProtecting Data with Protocol SecurityUnderstanding TunnelingUsing DNS Security Extensions(DNSSEC)Looking at Protocol SpoofingUtilizing Network SniffingUnderstanding Common NETWORKAttack Methods

Page 60: Print To Filestore.globalknowledge.net/course-overviews/IE/M40367_A_.pdfExamining Types of Encryption Encrypting Disks in Windows Encrypting Disks in Windows ... Using Other VPN Protocols

M40367 A www.globalknowledge.ie [email protected] 353-1-814 8200

Securing Wireless NetworkUsing Service Set Identifier (SSID)Understanding KeysUtilizing MAC FiltersConsidering Pros and Cons of SpecificSecurity TypesProtecting Your Computer from MalwareUtilizing Windows UpdatesUtilizing User Account ControlUsing Windows FirewallUsing Offline FilesLocking Down a Client ComputerProtecting Your EmailDealing with SpamRelaying EmailSecuring Internet ExplorerLooking at Cookies and Privacy SettingsExamining Content ZonesPhishing and PharmingProtecting Your ServerPlacing the ServerHardening the ServerUsing Secure Dynamic DNS

Further Information:

For More information, or to book your course, please call us on 353-1-814 8200

[email protected]

www.globalknowledge.ie

Global Knowledge, 3rd Floor Jervis House, Millennium Walkway, Dublin 1