Each chapter opens with a "Before You Begin" section, which prepares you for completing the chapter. Then the text presents a scenario involving fictitious companies, which is used to illustrate the design decisions you will face when designing Windows 2000 security.
The chapters are then divided into lessons. Most of the chapters contain activities and labs that give you an opportunity to use and explore the design skills presented.
The "Review" section at the end of the chapter allows you to test what you have learned in the chapter's lessons.
The appendix, "Answers," contains all of the answers to the questions asked in each chapter.
Several types of Notes appear throughout the lessons.
The following conventions are used throughout this book:
Icon | Represents |
---|---|
| Supplemental course materials. This material includes Windows 2000 white papers and Knowledge Base articles. You will find these files on the book's Supplemental Course Materials CD-ROM. |
| An activity or lab. You should perform the activity or lab to give yourself an opportunity to use the design skills being presented in the lesson. You will find the answers to the activity and lab exercise questions in the appendix, "Answers." |
| Chapter review questions. These questions at the end of each chapter allow you to test what you have learned in the lessons. You will find the answers to the review questions in the appendix, "Answers." |
The content of this training kit requires the use of fictitious company and domain names in fictitious scenarios. This training kit makes every effort to avoid using domain names that represent live Web sites. To accomplish this, each domain name illustrated in the book for fictitious companies uses the nonexistent top-level domain .tld, rather than the standards of .com or .net. In reality, domain names should represent an organization's identity.