tailieunhanh - Module 6: Creating a Security Design for Computers

In this module, students will learn how to determine threats and analyze risks to computers in an organization. Students will also learn how to design security for computers throughout the computers’ life cycles, from initial purchase to decommissioning. | Microsoft Training Certification Module 6 Creating a Security Design for Computers Contents Overview 1 Lesson Determining Threats and Analyzing Risks to Computers 2 Lesson Designing Security for Computers 8 Lab A Designing Security for Computers 23 Microsoft Information in this document including URL and other Internet Web site references is subject to change without notice. Unless otherwise noted the example companies organizations products domain names e-mail addresses logos people places and events depicted herein are fictitious and no association with any real company organization product domain name e-mail address logo person place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright no part of this document may be reproduced stored in or introduced into a retrieval system or transmitted in any form or by any means electronic mechanical photocopying recording or otherwise or for any purpose without the express written permission of Microsoft Corporation. Microsoft may have patents patent applications trademarks copyrights or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft the furnishing of this document does not give you any license to these patents trademarks copyrights or other intellectual property. 2002 Microsoft Corporation. All rights reserved. Microsoft MS-DOS Windows Windows NT Active Directory ActiveX BizTalk PowerPoint Visio and Windows Media are either registered trademarks or trademarks of Microsoft Corporation in the United States and or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Module 6 Creating a Security Design for Computers iii Instructor Notes Presentation In this module students will learn how to determine threats and analyze risks to 60 .