Warehouse Stock Clearance Sale

Grab a bargain today!


70–220 ALS Designing Microsoft Windows 2000 Network Security Package
By

Rating

Product Description
Product Details

Table of Contents

About This Book.
Intended Audience.


Prerequisites.


Reference Materials.


About the Supplemental Course Materials CD-ROM.


Features of This Book.


Chapter and Appendix Overview.


Getting Started.


About the Online Book .


Sample Readiness Review Questions.


The Microsoft Certified Professional Program.


Technical Support.


Chapter 1: Introduction to Microsoft Windows 2000
Security.


Chapter Scenario: Lucerne Publishing.


Lesson 1: Microsoft Windows 2000 Security Services Overview.


Lesson 2: Designing Security Business Requirements.


Lesson 3: Designing Security to Meet Technical Requirements.


Chapter 2: Designing Active Directory for Security.


Chapter Scenario: Wide World Importers .


Lesson 1: Designing Your Forest Structure.


Lesson 2: Designing Your Domain Structure.


Lesson 3: Designing an OU Structure.


Lesson 4: Designing an Audit Strategy.


Activity: Designing an Audit Strategy.


Lab 2-1: Designing Active Directory for Security.


Chapter 3: Designing Authentication for a Microsoft Windows
2000 Network.


Chapter Scenario: Market Florist.


Lesson 1: Designing Authentication in a Microsoft Windows 2000
Network.


Lesson 2: Designing Kerberos Authentication.


Lesson 3: NTLM Authentication.


Lesson 4: Authenticating Down-Level Clients.


Lesson 5: Planning Server Placement for Authentication.


Activity: Analyzing Authentication Network Infrastructure.


Lab 3-1: Designing Authentication for the Network.


Chapter 4: Planning a Microsoft Windows 2000 Administrative
Structure.


Chapter Scenario: Hanson Brothers.


Lesson 1: Planning Administrative Group Membership.


Lesson 2: Securing Administrative Access to the Network.


Activity: Administering the Network.


Lab 4-1: Designing Administration for a Microsoft Windows 2000
Network.


Chapter 5: Designing Group Security.


Chapter Scenario: Hanson Brothers.


Lesson 1: Designing Microsoft Windows 2000 Security Groups.


Activity: Reviewing Group Memberships.


Lesson 2: Designing User Rights.


Lab 5-1: Designing Security Groups and User Rights.


Chapter 6: Securing File Resources.


Chapter Scenario: Wide World Importers.


Lesson 1: Securing Access to File Resources.


Activity: Evaluating Permissions.


Lesson 2: Securing Access to Print Resources.


Lesson 3: Planning EFS Security.


Lab 6-1: Securing File and Print Resources.


Chapter 7: Designing Group Policy.


Chapter Scenario: Wide World Importers.


Lesson 1: Planning Deployment of Group Policy.


Lesson 2: Troubleshooting Group Policy.


Activity: Troubleshooting Group Policy Application.


Lab 7-1: Planning Group Policy Deployment.


Chapter 8: Securing Microsoft Windows 2000-Based
Computers.


Chapter Scenario: Market Florist.


Lesson 1: Planning Microsoft Windows 2000 Security
Templates.


Activity: Evaluating a Security Template.


Lesson 2: Analyzing Security Settings with Security
Configuration and Analysis.


Lesson 3: Planning the Deployment of Security by Using Security
Templates.


Lab 8-1: Planning Security Templates.


Chapter 9: Designing Microsoft Windows 2000 Services
Security.


Chapter Scenario: Lucerne Publishing.


Lesson 1: Designing DNS Security.


Activity: Designing DNS for Internal and External Use.


Lesson 2: Designing DHCP Security.


Lesson 3: Designing RIS Security.


Lesson 4: Designing SNMP Security.


Lesson 5: Designing Terminal Services Security.


Lab 9-1: Planning Security for Network Services.


Chapter 10: Planning a Public Key Infrastructure.


Chapter Scenario: Blue Yonder Airlines.


Lesson 1: Planning a Certification Authority Hierarchy.


Lesson 2: Managing Certification Authorities.


Activity: Planning Certificate Renewal Settings.


Lesson 3: Using Certificates for Authentication.


Lab 10-1: Planning a PKI Deployment.


Chapter 11: Securing Data at the Application Layer.


Chapter Scenario: Fabrikam Inc.


Lesson 1: Planning Authenticity and Integrity of Transmitted
Data.


Lesson 2: Planning Encryption of Transmitted Data.


Activity: Determining Key Usage.


Lab 11-1: Providing Application-Layer Security for Contoso
Ltd.


Chapter 12: Securing Data with Internet Protocol Security
(IPSec).


Chapter Scenario: Fabrikam Inc.


Lesson 1: Designing IPSec Policies.


Activity: Evaluating IPSec Scenarios.


Lesson 2: Planning IPSec Deployment.


Lab 12-1: Designing IPSec Security.


Chapter 13: Securing Access for Remote Users and
Networks.


Chapter Scenario: Hanson Brothers.


Lesson 1: Planning Remote Access Security.


Lesson 2: Designing Remote Access Security for Users.


Lesson 3: Designing Remote Access Security for Networks.


Lesson 4: Designing Remote Access Policy.


Activity: Designing Remote Access Policy.


Lesson 5: Planning RADIUS Security.


Lab 13-1: Designing Security for Remote Access Users.


Chapter 14: Securing an Extranet.


Chapter Scenario: Market Florist.


Lesson 1: Identifying Common Firewall Strategies.


Activity: Identifying Firewall Features.


Lesson 2: Securing Internet-Accessible Resources in a DMZ.


Lesson 3: Securing Data Flow Through a DMZ.


Lab 14-1: Designing Firewall Rules.


Chapter 15: Securing Internet Access.


Chapter Scenario: Wide World Importers.


Lesson 1: Designing an Internet Acceptable Use Policy.


Lesson 2: Securing Access to the Internet by Private Network
Users.


Activity: Identifying Security Design Risks.


Lesson 3: Restricting Access to Content on the Internet.


Lesson 4: Auditing Internet Access.


Lab 15-1: Designing Secure Internet Access.


Chapter 16: Securing Access in a Heterogeneous Network
Environment.


Chapter Scenario: Blue Yonder Airlines.


Lesson 1: Providing Interoperability Between Windows 2000 and
Heterogeneous Networks.


Lesson 2: Securing Authentication in a Heterogeneous
Network.


Activity: Identifying Authentication Risks in a Heterogeneous
Network Environment.


Lesson 3: Designing Directory Synchronization and
Integration.


Lesson 4: Securing Access to Windows 2000 Resources.


Lesson 5: Securing Windows 2000 User Access to Heterogeneous
Networks.


Lab 16-1: Securing Heterogeneous Clients.


Chapter 17: Designing a Security Plan.


Chapter Scenario: Fabrikam Inc.


Lesson 1: Defining a Security Policy.


Lesson 2: Developing a Security Plan.


Lesson 3: Maintaining a Security Plan.


Appendix: Answers.


Index.

About the Author

Microsoft Corporation - Founded in 1975, Microsoft (Nasdaq ?MSFT?) is the worldwide leader in software for personal and business computing. The company offers a wide range of products and services designed to empower people through great software?any time, any place and on any device.

Ask a Question About this Product More...
 
Look for similar items by category
People also searched for
This title is unavailable for purchase as none of our regular suppliers have stock available. If you are the publisher, author or distributor for this item, please visit this link.

Back to top