70-220 ALS designing Microsoft Windows 2000 network security package

70-220 ALS designing Microsoft Windows 2000 network security package

60,74 €(IVA inc.)

INDICE: About This Book. Intended Audience. Prerequisites. Reference Materials. About the Supplemental Course Materials CD-ROM. Features of This Book. Chapter and Appendix Overview. Getting Started. About the Online Book . Sample Readiness Review Questions. The Microsoft Certified Professional Program. Technical Support. Chapter 1: Introduction to Microsoft Windows 2000 Security. Chapter Scenario: Lucerne Publishing. Lesson 1: Microsoft Windows 2000 Security Services Overview. Lesson 2: Designing Security Business Requirements. Lesson 3:Designing Security to Meet Technical Requirements. Chapter 2: Designing Active Directory for Security. Chapter Scenario: Wide World Importers . Lesson 1: Designing Your Forest Structure. Lesson 2: Designing Your Domain Structure. Lesson 3: Designing an OU Structure. Lesson 4: Designing an Audit Strategy. Activity: Designing an Audit Strategy. Lab 2-1: Designing Active Directory for Security. Chapter 3: Designing Authentication for a Microsoft Windows 2000 Network. Chapter Scenario: Market Florist. Lesson 1: Designing Authentication in a Microsoft Windows 2000 Network. Lesson 2: Designing Kerberos Authentication. Lesson 3: NTLM Authentication. Lesson 4: Authenticating Down-Level Clients. Lesson 5: Planning Server Placement for Authentication. Activity: Analyzing Authentication Network Infrastructure. Lab 3-1: Designing Authentication for the Network. Chapter 4: Planning a Microsoft Windows 2000 Administrative Structure. Chapter Scenario: Hanson Brothers. Lesson 1: Planning Administrative Group Membership. Lesson 2: Securing Administrative Access to the Network. Activity: Administering the Network. Lab 4-1: Designing Administration for a Microsoft Windows 2000 Network. Chapter 5: Designing Group Security. Chapter Scenario: HansonBrothers. Lesson 1: Designing Microsoft Windows 2000 Security Groups. Activity: Reviewing Group Memberships. Lesson 2: Designing User Rights. Lab 5-1: Designing Security Groups and User Rights. Chapter 6: Securing File Resources. Chapter Scenario: Wide World Importers. Lesson 1: Securing Access to File Resources. Activity: Evaluating Permissions. Lesson 2: Securing Access to Print Resources. Lesson 3: Planning EFS Security. Lab 6-1: Securing File and Print Resources. Chapter 7: Designing Group Policy. Chapter Scenario: Wide World Importers. Lesson 1: Planning Deployment of Group Policy. Lesson 2: Troubleshooting Group Policy. Activity: Troubleshooting Group Policy Application. Lab 7-1: Planning Group Policy Deployment. Chapter 8: Securing Microsoft Windows 2000-Based Computers. Chapter Scenario: Market Florist. Lesson 1: Planning Microsoft Windows 2000 Security Templates. Activity: Evaluating a Security Template. Lesson 2: Analyzing Security Settings with Security Configuration and Analysis. Lesson3: Planning the Deployment of Security by Using Security Templates. Lab 8-1: Planning Security Templates. Chapter 9: Designing Microsoft Windows 2000 Services Security. Chapter Scenario: Lucerne Publishing. Lesson 1: Designing DNS Security. Activity: Designing DNS for Internal and External Use. Lesson 2: Designing DHCP Security. Lesson 3: Designing RIS Security. Lesson 4: Designing SNMPSecurity. Lesson 5: Designing Terminal Services Security. Lab 9-1: Planning Security for Network Services. Chapter 10: Planning a Public Key Infrastructure. Chapter Scenario: Blue Yonder Airlines. Lesson 1: Planning a Certification Authority Hierarchy. Lesson 2: Managing Certification Authorities. Activity: Planning Certificate Renewal Settings. Lesson 3: Using Certificates for Authentication. Lab 10-1: Planning a PKI Deployment. Chapter 11: Securing Data at the Application Layer. Chapter Scenario: Fabrikam Inc. Lesson 1: Planning Authenticity and Integrity of Transmitted Data. Lesson 2: Planning Encryption of Transmitted Data. Activity: Determining Key Usage. Lab 11-1: Providing Application-Layer Security for Contoso Ltd. Chapter 12: Securing Data with Internet Protocol Security (IPSec). Chapter Scenario: Fabrikam Inc. Lesson 1: Designing IPSecPolicies. Activity: Evaluating IPSec Scenarios. Lesson 2: Planning IPSec Deployment. Lab 12-1: Designing IPSec Security. Chapter 13: Securing Access for Remote Users and Networks. Chapter Scenario: Hanson Brothers. Lesson 1: PlanningRemote Access Security. Lesson 2: Designing Remote Access Security for Users.Lesson 3: Designing Remote Access Security for Networks. Lesson 4: Designing Remote Access Policy. Activity: Designing Remote Access Policy. Lesson 5: Planning RADIUS Security. Lab 13-1: Designing Security for Remote Access Users. Chapter 14: Securing an Extranet. Chapter Scenario: Market Florist. Lesson 1: Identifying Common Firewall Strategies. Activity: Identifying Firewall Features.Lesson 2: Securing Internet-Accessible Resources in a DMZ. Lesson 3: SecuringData Flow Through a DMZ. Lab 14-1: Designing Firewall Rules. Chapter 15: Securing Internet Access. Chapter Scenario: Wide World Importers. Lesson 1: Designing an Internet Acceptable Use Policy. Lesson 2: Securing Access to the Internet by Private Network Users. Activity: Identifying Security Design Risks. Lesson 3: Restricting Access to Content on the Internet. Lesson 4: Auditing Internet Access. Lab 15-1: Designing Secure Internet Access. Chapter 16: Securing Access in a Heterogeneous Network Environment. Chapter Scenario: Blue Yonder Airlines. Lesson 1: Providing Interoperability Between Windows 2000 and Heterogeneous Networks. Lesson 2: Securing Authentication in a Heterogeneous Network. Activity: Identifying Authentication Risks in a Heterogeneous Network Environment. Lesson 3: Designing Directory Synchronization and Integration. Lesson 4: Securing Access to Windows 2000 Resources. Lesson 5: Securing Windows 2000 UserAccess to Heterogeneous Networks. Lab 16-1: Securing Heterogeneous Clients. Chapter 17: Designing a Security Plan. Chapter Scenario: Fabrikam Inc. Lesson 1: Defining a Security Policy. Lesson 2: Developing a Security Plan. Lesson 3: Maintaining a Security Plan. Appendix: Answers. Index.

  • ISBN: 978-0-470-06752-9
  • Editorial: John Wiley & Sons
  • Encuadernacion: Cartoné
  • Páginas: 997
  • Fecha Publicación: 18/04/2008
  • Nº Volúmenes: 1
  • Idioma: Inglés