Americas

  • United States

Microsoft rolls out one-day security training events

Opinion
Jun 16, 20043 mins
Enterprise ApplicationsMicrosoftSecurity

* Hands-on Microsoft security training at a city near you

Microsoft has launched a one-day training event that will be held at dozens of venues around the U.S. from now through the end of the year. The hands-on event will give you the information and guidance you need to help you implement and manage security in a Windows-based network.

The classes began last week, so I apologize for not telling you sooner, but there should still be availability somewhere near you over the next six months. Check https://www.msftsecuritytraining.com/courses.asp?ct=hp to find a session near you, and register as soon as possible. Classes are generally limited to 20 people or fewer, depending on the facility, so registering early is a plus.

The all-day session is divided into four areas or “labs”:

Lab 1: Managing Security Updates – hands-on exercises that cover patch management technologies, including Microsoft Baseline Security Analyzer (MBSA), Microsoft Software Update Services (SUS), and Microsoft Systems Management Server (SMS) 2003.

Lab 2: Implementing Server Security – hands-on exercises that cover key concepts necessary to increase security for Windows server computers.

Lab 3: Implementing Client Security for Windows 2000 and Windows XP – hands-on exercises that cover technologies for managing the configuration of client security.

Lab 4: Implementing Application Security – hands-on exercises that introduce key security concepts for Windows Server System applications.

As an example of what you will learn by doing, the exercises for Lab 3 consist of:

Exercise 1: Implementing Security By Using Software Restriction Policies

* Creating a new GPO for software restriction.

* Changing software-restriction policy rules.

* Verifying the software restriction policies.

Exercise 2: Troubleshooting Software Restriction Policies

* Using Event Viewer to identify software restriction policies in force.

* Using the Resultant Set of Policy console to examine software restriction policies.

Exercise 3: Protecting Client Computers by Using Internet Connection Firewall (ICF)

* Examining the status of TCP ports.

* Enabling ICF.

* Verifying that ICF is blocking access to TCP ports.

* Using Group Policy to enable ICF.

Exercise 4: Protecting Data by Using Encrypting File System (EFS)

* Encrypting files and folders by using EFS.

* Examining EFS certificates.

* Exporting and importing EFS certificates.

Exercise 5: Recovering Encrypted Data with a Data Recovery Agent

* Examining the EFS data-recovery agent certificate.

* Creating and configuring a new EFS data-recovery agent certificate.

* Restoring access to encrypted files.

Now you may already know how to do these things, you may even feel that you could teach the class yourself. But how many people on your staff can do them without help? How many people have you thought about training, but still haven’t been able to find the time? Here’s a chance to send those folks to a training session where they’ll get real hands-on work, and it won’t be on your production network. Get your people registered today.