Flylib.com
MCSE Training Kit (Exam 70-220): Designing Microsoft Windows 2000 Network Security: Designing Microsoft(r) Windows(r) 2000 Network Security (IT-Training Kits)
MCSE Training Kit (Exam 70-220): Designing Microsoft Windows 2000 Network Security: Designing Microsoft(r) Windows(r) 2000 Network Security (IT-Training Kits)
ISBN: 0735611343
EAN: 2147483647
Year: 2001
Pages: 172
Authors:
Microsoft Corporation
BUY ON AMAZON
Cover
LOC Page
About This Book
Intended Audience
Prerequisites
Reference Materials
About the Supplemental Course Materials CD-ROM
Features of This Book
Chapter and Appendix Overview
Getting Started
The Microsoft Certified Professional Program
Technical Support
Chapter 1 -- Introduction to Microsoft Windows 2000 Security
Chapter Scenario: Lucerne Publishing
Lesson 1: Microsoft Windows 2000 Security Services Overview
Lesson 2: Determining Security Business Requirements
Lesson 3: Designing Security to Meet Technical Requirements
Review
Chapter 2 -- Designing Active Directory for Security
Chapter Scenario: Wide World Importers
Lesson 1: Designing Your Forest Structure
Lesson 2: Designing Your Domain Structure
Lesson 3: Designing an OU Structure
Lesson 4: Designing an Audit Strategy
Activity: Designing an Audit Strategy
Lab 2-1: Designing Active Directory for Security
Review
Chapter 3 -- Designing Authentication for a Microsoft Windows 2000 Network
Chapter Scenario: Market Florist
Lesson 1: Designing Authentication in a Microsoft Windows 2000 Network
Lesson 2: Designing Kerberos Authentication
Lesson 3: NTLM Authentication
Lesson 4: Authenticating Down-Level Clients
Lesson 5: Planning Server Placement for Authentication
Activity: Analyzing Authentication Network Infrastructure
Lab 3-1: Designing Authentication for the Network
Review
Chapter 4 -- Planning a Microsoft Windows 2000 Administrative Structure
Chapter Scenario: Hanson Brothers
Lesson 1: Planning Administrative Group Membership
Lesson 2: Securing Administrative Access to the Network
Activity: Administering the Network
Lab 4-1: Designing Administration for a Microsoft Windows 2000 Network
Review
Chapter 5 -- Designing Group Security
Chapter Scenario: Hanson Brothers
Lesson 1: Designing Microsoft Windows 2000 Security Groups
Activity: Reviewing Group Memberships
Lesson 2: Designing User Rights
Lab 5-1: Designing Security Groups and User Rights
Review
Chapter 6 -- Securing File Resources
Chapter Scenario: Wide World Importers
Lesson 1: Securing Access to File Resources
Activity: Evaluating Permissions
Lesson 2: Securing Access to Print Resources
Lesson 3: Planning EFS Security
Lab 6-1: Securing File and Print Resources
Review
Chapter 7 -- Designing Group Policy
Chapter Scenario: Wide World Importers
Lesson 1: Planning Deployment of Group Policy
Lesson 2: Troubleshooting Group Policy
Activity: Troubleshooting Group Policy Application
Lab 7-1: Planning Group Policy Deployment
Review
Chapter 8 -- Securing Microsoft Windows 2000-based Computers
Chapter Scenario: Market Florist
Lesson 1: Planning Microsoft Windows 2000 Security Templates
Activity: Evaluating a Security Template
Lesson 2: Analyzing Security Settings with Security Configuration and Analysis
Lesson 3: Planning the Deployment of Security by Using Security Templates
Lab 8-1: Planning Security Templates
Review
Chapter 9 -- Designing Microsoft Windows 2000 Services Security
Chapter Scenario: Lucerne Publishing
Lesson 1: Designing DNS Security
Activity: Designing DNS for Internal and External Use
Lesson 2: Designing DHCP Security
Lesson 3: Designing RIS Security
Lesson 4: Designing SNMP Security
Lesson 5: Designing Terminal Services Security
Lab 9-1: Planning Security for Network Services
Review
Chapter 10 -- Planning a Public Key Infrastructure
Chapter Scenario: Blue Yonder Airlines
Lesson 1: Planning a Certification Authority Hierarchy
Lesson 2: Managing Certification Authorities
Activity: Planning Certificate Renewal Settings
Lesson 3: Using Certificates for Authentication
Lab 10-1: Planning a PKI Deployment
Review
Chapter 11 -- Securing Data at the Application Layer
Chapter Scenario: Fabrikam Inc.
Lesson 1: Planning Authenticity and Integrity of Transmitted Data
Lesson 2: Planning Encryption of Transmitted Data
Activity: Determining Key Usage
Lab 11-1: Providing Application-Layer Security for Contoso Ltd.
Review
Chapter 12 -- Securing Data with Internet Protocol Security (IPSec)
Chapter Scenario: Fabrikam, Inc.
Lesson 1: Designing IPSec Policies
Activity: Evaluating IPSec Scenarios
Lesson 2: Planning IPSec Deployment
Lab 12-1: Designing IPSec Security
Review
Chapter 13 -- Securing Access for Remote Users and Networks
Chapter Scenario: Hanson Brothers
Lesson 1: Planning Remote Access Security
Lesson 2: Designing Remote Access Security for Users
Lesson 3: Designing Remote Access Security for Networks
Lesson 4: Designing Remote Access Policy
Activity: Designing Remote Access Policy
Lesson 5: Planning RADIUS Security
Lab 13-1: Designing Security for Remote Access Users
Review
Chapter 14 -- Securing an Extranet
Chapter Scenario: Market Florist
Lesson 1: Identifying Common Firewall Strategies
Activity: Identifying Firewall Features
Lesson 2: Securing Internet-Accessible Resources in a DMZ
Lesson 3: Securing Data Flow Through a DMZ
Lab 14-1: Designing Firewall Rules
Review
Chapter 15 -- Securing Internet Access
Chapter Scenario: Wide World Importers
Lesson 1: Designing an Internet Acceptable Use Policy
Lesson 2: Securing Access to the Internet by Private Network Users
Activity: Identifying Security Design Risks
Lesson 3: Restricting Access to Content on the Internet
Lesson 4: Auditing Internet Access
Lab 15-1: Designing Secure Internet Access
Review
Chapter 16 -- Securing Access in a Heterogeneous Network Environment
Chapter Scenario: Blue Yonder Airlines
Lesson 1: Providing Interoperability Between Windows 2000 and Heterogeneous Networks
Lesson 2: Securing Authentication in a Heterogeneous Network
Activity: Identifying Authentication Risks in a Heterogeneous Network Environment
Lesson 3: Designing Directory Synchronization and Integration
Lesson 4: Securing Access to Windows 2000 Resources
Lesson 5: Securing Windows 2000 User Access to Heterogeneous Networks
Lab 16-1: Securing Heterogeneous Clients
Review
Chapter 17 -- Designing a Security Plan
Chapter Scenario: Fabrikam Inc.
Lesson 1: Defining a Security Policy
Lesson 2: Developing a Security Plan
Lesson 3: Maintaining a Security Plan
Review
Appendix -- Answers
Glossary
A
B
C
D
E
F
G
H
I
K
L
M
N
O
P
Q
R
S
T
U
V
W
Z
About This Electronic Book
Create a List of Favorite Topics
External Links
Enlarge Graphics
Use Accessibility Shortcut Keys
Use the Shortcut Menu Commands
Customize the Help Viewer
Print the Current Topic
Full-Text Search
Use Full-Text Search
Advanced Full-Text Search
Search for Information
Find Information with Advanced Full-Text Search
Search for Words or Phrases
Define Search Terms
Use Nested Expressions
Search for Words in the Titles of Topic Files
Find Words Similar to Your Search Term
Search Previous Results
About Microsoft Press
MCSE Training Kit (Exam 70-220): Designing Microsoft Windows 2000 Network Security: Designing Microsoft(r) Windows(r) 2000 Network Security (IT-Training Kits)
ISBN: 0735611343
EAN: 2147483647
Year: 2001
Pages: 172
Authors:
Microsoft Corporation
BUY ON AMAZON
CISSP Exam Cram 2
Question-Handling Strategies
Exam Prep Questions
Exam Prep Questions
Database Management
Exam Prep Questions
VBScript Programmers Reference
Control of Flow
Classes in VBScript (Writing Your Own COM Objects)
Windows Script Components
Server-Side Web Scripting
Appendix B Variable Naming Convention
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
SWT Event Handling, Threading, and Displays
Trees
Other Important SWT Components
SWT Graphics and Image Handling
Sample Application
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Cisco Unified Communications
Cisco IP Phones
Review Questions
Summary
Bulk Trace Analysis
FileMaker 8 Functions and Scripts Desk Reference
Get(HighContrastColor)
TrimAll()
Truncate()
ValueListItems()
Administering FileMaker Server from the Command Line
Python Programming for the Absolute Beginner, 3rd Edition
Part II: GUI Programming
Grids
Advanced GUI Coding Techniques
PyForm: A Persistent Object Viewer
String Module Utilities
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies