Flylib.com
MCSE Training Kit (Exam 70-220): Designing Microsoft Windows 2000 Network Security: Designing Microsoft(r) Windows(r) 2000 Network Security (IT-Training Kits)
MCSE Training Kit (Exam 70-220): Designing Microsoft Windows 2000 Network Security: Designing Microsoft(r) Windows(r) 2000 Network Security (IT-Training Kits)
ISBN: 0735611343
EAN: 2147483647
Year: 2001
Pages: 172
Authors:
Microsoft Corporation
BUY ON AMAZON
Cover
LOC Page
About This Book
Intended Audience
Prerequisites
Reference Materials
About the Supplemental Course Materials CD-ROM
Features of This Book
Chapter and Appendix Overview
Getting Started
The Microsoft Certified Professional Program
Technical Support
Chapter 1 -- Introduction to Microsoft Windows 2000 Security
Chapter Scenario: Lucerne Publishing
Lesson 1: Microsoft Windows 2000 Security Services Overview
Lesson 2: Determining Security Business Requirements
Lesson 3: Designing Security to Meet Technical Requirements
Review
Chapter 2 -- Designing Active Directory for Security
Chapter Scenario: Wide World Importers
Lesson 1: Designing Your Forest Structure
Lesson 2: Designing Your Domain Structure
Lesson 3: Designing an OU Structure
Lesson 4: Designing an Audit Strategy
Activity: Designing an Audit Strategy
Lab 2-1: Designing Active Directory for Security
Review
Chapter 3 -- Designing Authentication for a Microsoft Windows 2000 Network
Chapter Scenario: Market Florist
Lesson 1: Designing Authentication in a Microsoft Windows 2000 Network
Lesson 2: Designing Kerberos Authentication
Lesson 3: NTLM Authentication
Lesson 4: Authenticating Down-Level Clients
Lesson 5: Planning Server Placement for Authentication
Activity: Analyzing Authentication Network Infrastructure
Lab 3-1: Designing Authentication for the Network
Review
Chapter 4 -- Planning a Microsoft Windows 2000 Administrative Structure
Chapter Scenario: Hanson Brothers
Lesson 1: Planning Administrative Group Membership
Lesson 2: Securing Administrative Access to the Network
Activity: Administering the Network
Lab 4-1: Designing Administration for a Microsoft Windows 2000 Network
Review
Chapter 5 -- Designing Group Security
Chapter Scenario: Hanson Brothers
Lesson 1: Designing Microsoft Windows 2000 Security Groups
Activity: Reviewing Group Memberships
Lesson 2: Designing User Rights
Lab 5-1: Designing Security Groups and User Rights
Review
Chapter 6 -- Securing File Resources
Chapter Scenario: Wide World Importers
Lesson 1: Securing Access to File Resources
Activity: Evaluating Permissions
Lesson 2: Securing Access to Print Resources
Lesson 3: Planning EFS Security
Lab 6-1: Securing File and Print Resources
Review
Chapter 7 -- Designing Group Policy
Chapter Scenario: Wide World Importers
Lesson 1: Planning Deployment of Group Policy
Lesson 2: Troubleshooting Group Policy
Activity: Troubleshooting Group Policy Application
Lab 7-1: Planning Group Policy Deployment
Review
Chapter 8 -- Securing Microsoft Windows 2000-based Computers
Chapter Scenario: Market Florist
Lesson 1: Planning Microsoft Windows 2000 Security Templates
Activity: Evaluating a Security Template
Lesson 2: Analyzing Security Settings with Security Configuration and Analysis
Lesson 3: Planning the Deployment of Security by Using Security Templates
Lab 8-1: Planning Security Templates
Review
Chapter 9 -- Designing Microsoft Windows 2000 Services Security
Chapter Scenario: Lucerne Publishing
Lesson 1: Designing DNS Security
Activity: Designing DNS for Internal and External Use
Lesson 2: Designing DHCP Security
Lesson 3: Designing RIS Security
Lesson 4: Designing SNMP Security
Lesson 5: Designing Terminal Services Security
Lab 9-1: Planning Security for Network Services
Review
Chapter 10 -- Planning a Public Key Infrastructure
Chapter Scenario: Blue Yonder Airlines
Lesson 1: Planning a Certification Authority Hierarchy
Lesson 2: Managing Certification Authorities
Activity: Planning Certificate Renewal Settings
Lesson 3: Using Certificates for Authentication
Lab 10-1: Planning a PKI Deployment
Review
Chapter 11 -- Securing Data at the Application Layer
Chapter Scenario: Fabrikam Inc.
Lesson 1: Planning Authenticity and Integrity of Transmitted Data
Lesson 2: Planning Encryption of Transmitted Data
Activity: Determining Key Usage
Lab 11-1: Providing Application-Layer Security for Contoso Ltd.
Review
Chapter 12 -- Securing Data with Internet Protocol Security (IPSec)
Chapter Scenario: Fabrikam, Inc.
Lesson 1: Designing IPSec Policies
Activity: Evaluating IPSec Scenarios
Lesson 2: Planning IPSec Deployment
Lab 12-1: Designing IPSec Security
Review
Chapter 13 -- Securing Access for Remote Users and Networks
Chapter Scenario: Hanson Brothers
Lesson 1: Planning Remote Access Security
Lesson 2: Designing Remote Access Security for Users
Lesson 3: Designing Remote Access Security for Networks
Lesson 4: Designing Remote Access Policy
Activity: Designing Remote Access Policy
Lesson 5: Planning RADIUS Security
Lab 13-1: Designing Security for Remote Access Users
Review
Chapter 14 -- Securing an Extranet
Chapter Scenario: Market Florist
Lesson 1: Identifying Common Firewall Strategies
Activity: Identifying Firewall Features
Lesson 2: Securing Internet-Accessible Resources in a DMZ
Lesson 3: Securing Data Flow Through a DMZ
Lab 14-1: Designing Firewall Rules
Review
Chapter 15 -- Securing Internet Access
Chapter Scenario: Wide World Importers
Lesson 1: Designing an Internet Acceptable Use Policy
Lesson 2: Securing Access to the Internet by Private Network Users
Activity: Identifying Security Design Risks
Lesson 3: Restricting Access to Content on the Internet
Lesson 4: Auditing Internet Access
Lab 15-1: Designing Secure Internet Access
Review
Chapter 16 -- Securing Access in a Heterogeneous Network Environment
Chapter Scenario: Blue Yonder Airlines
Lesson 1: Providing Interoperability Between Windows 2000 and Heterogeneous Networks
Lesson 2: Securing Authentication in a Heterogeneous Network
Activity: Identifying Authentication Risks in a Heterogeneous Network Environment
Lesson 3: Designing Directory Synchronization and Integration
Lesson 4: Securing Access to Windows 2000 Resources
Lesson 5: Securing Windows 2000 User Access to Heterogeneous Networks
Lab 16-1: Securing Heterogeneous Clients
Review
Chapter 17 -- Designing a Security Plan
Chapter Scenario: Fabrikam Inc.
Lesson 1: Defining a Security Policy
Lesson 2: Developing a Security Plan
Lesson 3: Maintaining a Security Plan
Review
Appendix -- Answers
Glossary
A
B
C
D
E
F
G
H
I
K
L
M
N
O
P
Q
R
S
T
U
V
W
Z
About This Electronic Book
Create a List of Favorite Topics
External Links
Enlarge Graphics
Use Accessibility Shortcut Keys
Use the Shortcut Menu Commands
Customize the Help Viewer
Print the Current Topic
Full-Text Search
Use Full-Text Search
Advanced Full-Text Search
Search for Information
Find Information with Advanced Full-Text Search
Search for Words or Phrases
Define Search Terms
Use Nested Expressions
Search for Words in the Titles of Topic Files
Find Words Similar to Your Search Term
Search Previous Results
About Microsoft Press
MCSE Training Kit (Exam 70-220): Designing Microsoft Windows 2000 Network Security: Designing Microsoft(r) Windows(r) 2000 Network Security (IT-Training Kits)
ISBN: 0735611343
EAN: 2147483647
Year: 2001
Pages: 172
Authors:
Microsoft Corporation
BUY ON AMAZON
Project Management JumpStart
Developing Project Management Skills
Defining the Project Goals
Assessing Risk
Budgeting 101
Appendix B Sample Project Management Forms
Metrics and Models in Software Quality Engineering (2nd Edition)
Applying the Seven Basic Quality Tools in Software Development
The Exponential Model
How Do You Know Your Product Is Good Enough to Ship?
Audit and Assessment
Software Process Improvement Sequences
SQL Hacks
Hack 2. Connect to SQL from a Program
Joins, Unions, and Views
Hack 28. Avoid Dividing by Zero
Hack 96. Create an Audit Trail
Hack 100. Run SQL from a Web Page
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
A (Very) Short Introduction to Transaction Processing
Summary
Client 3Processing Queries
Summary
JDBC Architecture Overview
Microsoft VBScript Professional Projects
Procedures
Customizing the Desktop
Maintaining a 30-Day Summary Log Archive
Processing and Consolidating Report Data
Report Distribution and Remote Archive Management
VBScript in a Nutshell, 2nd Edition
Error Handling and Debugging
Running Your Code
The Language Reference
Section A.6. Date and Time
Section B.9. Variable Type Constants
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies