M2810: Fundamentals of Network Security

4 Day Course
Hands On
Official Microsoft Curriculum
Code M2810

This course has been retired. The CompTIA Security+ course is recommended as an alternative.


Collapse all

Preparing to Secure Information (3 topics)

  • Explaining How Assets Are Attacked
  • Explaining How Assets Are Secured
  • Lab A: Preparing to Secure Information

Implementing Secure Computing Baselines (6 topics)

  • Introduction to Trusted Computing Bases
  • Establishing a Secure Baseline
  • Monitoring a Secure Baseline
  • Securing Computers Physically
  • Maintaining a Secure Baseline
  • Lab A: Maintaining Baseline Security

Securing Information Using Authentication and Access Control (4 topics)

  • Introduction to Access Control
  • Implementing an Authentication Strategy
  • Implementing an Access Control Strategy
  • Lab A: Securing Accounts (MBSA)

Using Cryptography to Secure Information (5 topics)

  • Introduction to Cryptography
  • Using Symmetric Encryption
  • Using Hash Functions
  • Using Public Key Encryption
  • Lab A: Using Cryptography to Secure Information

Using a PKI to Secure Information (4 topics)

  • Introduction to Certificates
  • Introduction to Public Key Infrastructure
  • Deploying and Managing Certificates
  • Lab A: Using Certificates

Securing Internet Applications and Components (6 topics)

  • Securing Web Servers
  • Configuring Security for Common Internet Protocols
  • Configuring Security for Web Browsers
  • Configuring Security for Databases
  • Lab A: Securing Web Servers
  • Lab B: Protecting Clients from Active Content

Implementing Security for E-Mail and Instant Messaging (4 topics)

  • Securing E-Mail Servers
  • Securing E-Mail Clients
  • Securing Instant Messaging
  • Lab A: Securing Mail Servers

Managing Security for Directory Services and DNS (3 topics)

  • Securing Directory Services Against Common Threats
  • Securing DNS Against Common Threats
  • Lab A: Managing Security for Directory Services and DNS

Securing Data Transmission (6 topics)

  • Identifying Threats to Network Devices
  • Implementing Security for Common Data Transmission
  • Implementing Security for Remote Access
  • Implementing Security for Wireless Network Traffic
  • Lab A: Securing Data Transmission
  • Lab B: Using IPSec to Secure Data Transmission

Implementing and Monitoring Security for Network Perimeters (4 topics)

  • Introduction to Network Perimeters
  • Implementing Security on Inbound and Outbound Network Traffic
  • Monitoring Network Traffic
  • Lab A: Implementing and Monitoring Security for Network Perimeters

Managing Operational Security (5 topics)

  • Establishing Security Policies and Procedures
  • Educating Users about Security Policies
  • Applying Security Policies to Operational Management
  • Resolving Ethical Dilemmas When Securing Assets
  • Lab A: Managing Operational Security

Preserving Business Continuity (4 topics)

  • Preparing to Recover from Disasters
  • Communicating the Impact of Risks
  • Performing a Secure Backup and Recovery
  • Lab A: Preserving Business Continuity

Responding to Security Incidents (4 topics)

  • Identifying Security Incidents
  • Responding to Security Incidents
  • Investigating Security Incidents
  • Lab A: Responding to Security Incidents


Before attending this course, students must have one year of experience managing Windows 2000 Server or have equivalent knowledge and skills, such as those described in MOC Course 2152: Implementing Microsoft Windows 2000 Professional and Server.

Course PDF