NWCCD 2018-19 Catalog 
    Apr 01, 2023  
NWCCD 2018-19 Catalog [This is an Archived Catalog.]

Add to Portfolio (opens a new window)

MSFT 1570 - Secure User Endpoint and Server Systems

This course introduces students to the process of designing safeguards for secure server based platforms and endpoint devices. Students learn how to assemble the design team, assess and quantify risks, and recommend countermeasures and remedial activities for securing server based and endpoint technology in a networked environment. Student develop their analytical skills, their ability to define a problem, and develop a plan of action. The course gives students the foundational knowledge needed to prepare for the Microsoft 98-367 exam - Security Fundamentals.

Credits: 3

Instructional Method Lecture

Successful completion of MSFT 2605 Windows Client Operating System, MSFT 1520 Windows Server Networking, and COSC 2020 Linux Fundamentals or CSEC 1500 Computer Network Security +, or instructor consent.

Minimum Student Competencies
Upon completion of MSFT 1570 Secure User Endpoint and Server Systems, the student will:

  1. identify key members of a security design team.
  2. evaluate common assets and value to a typical business and industry.
  3. describe risks and threats common to a typical business and industry.
  4. estimate potential loss, frequency of loss and the cost of the risk.
  5. outline countermeasures and remedial activities for common assets in relation to points of access.
  6. recognize a framework for security that includes prevention, detection, isolation, and recovery.
  7. devise a strategy for securing endpoint devices to include but not limited to desktops, laptops, smart devices and the operating systems contained therein.
  8. assemble a strategy for security server platforms to include Windows and Linux operating systems, cloud and virtualized environments.
  9. model secure network administration and support procedures.
  10. indicate an action plan for security countermeasure implementation.
  11. formulate an action plan for effective monitoring and remediation of newly identified risk.
  12. express policies that outline goals, assigns responsibility, documents procedures that support and maintain the security plan.
  13. review an incident response plan.

Add to Portfolio (opens a new window)