ALS Designing Microsoft Windows 2000 Network Security

ALS Designing Microsoft Windows 2000 Network Security

By: Microsoft Official Academic Course (author)Hardback

1 - 2 weeks availability

Description

This official MCSE TRAINING KIT teaches IT professionals how to design network security solutions in Windows 2000 as they prepare for MCP Exam 70-220, a core elective on the new Windows 2000 MCSE track. The kit balances conceptual information with practical application: students learn through an integrated system of skill-building tutorials, case study examples, and self-assessment tools. Topics map directly to the objectives measured by the MCP exam, including analyzing business requirements for security; evaluating the technical environment; analyzing security requirements; planning a Windows 2000 network security solution; designing secure access between networks; and designing security for communications channels. Business scenario examples help students apply the concepts they learn to real-world work situations. An economical alternative to classroom instruction, this MCSE TRAINING KIT enables students to set their own pace and learn by doing!

Create a review

About Author

Microsoft Corporation - Founded in 1975, Microsoft (Nasdaq 'MSFT') is the worldwide leader in software for personal and business computing. The company offers a wide range of products and services designed to empower people through great software-any time, any place and on any device.

Contents

About This Book. Intended Audience. Prerequisites. Reference Materials. About the Supplemental Course Materials CD-ROM. Features of This Book. Chapter and Appendix Overview. Getting Started. About the Online Book . Sample Readiness Review Questions. The Microsoft Certified Professional Program. Technical Support. Chapter 1: Introduction to Microsoft Windows 2000 Security. Chapter Scenario: Lucerne Publishing. Lesson 1: Microsoft Windows 2000 Security Services Overview. Lesson 2: Designing Security Business Requirements. Lesson 3: Designing Security to Meet Technical Requirements. Chapter 2: Designing Active Directory for Security. Chapter Scenario: Wide World Importers . Lesson 1: Designing Your Forest Structure. Lesson 2: Designing Your Domain Structure. Lesson 3: Designing an OU Structure. Lesson 4: Designing an Audit Strategy. Activity: Designing an Audit Strategy. Lab 2-1: Designing Active Directory for Security. Chapter 3: Designing Authentication for a Microsoft Windows 2000 Network. Chapter Scenario: Market Florist. Lesson 1: Designing Authentication in a Microsoft Windows 2000 Network. Lesson 2: Designing Kerberos Authentication. Lesson 3: NTLM Authentication. Lesson 4: Authenticating Down-Level Clients. Lesson 5: Planning Server Placement for Authentication. Activity: Analyzing Authentication Network Infrastructure. Lab 3-1: Designing Authentication for the Network. Chapter 4: Planning a Microsoft Windows 2000 Administrative Structure. Chapter Scenario: Hanson Brothers. Lesson 1: Planning Administrative Group Membership. Lesson 2: Securing Administrative Access to the Network. Activity: Administering the Network. Lab 4-1: Designing Administration for a Microsoft Windows 2000 Network. Chapter 5: Designing Group Security. Chapter Scenario: Hanson Brothers. Lesson 1: Designing Microsoft Windows 2000 Security Groups. Activity: Reviewing Group Memberships. Lesson 2: Designing User Rights. Lab 5-1: Designing Security Groups and User Rights. Chapter 6: Securing File Resources. Chapter Scenario: Wide World Importers. Lesson 1: Securing Access to File Resources. Activity: Evaluating Permissions. Lesson 2: Securing Access to Print Resources. Lesson 3: Planning EFS Security. Lab 6-1: Securing File and Print Resources. Chapter 7: Designing Group Policy. Chapter Scenario: Wide World Importers. Lesson 1: Planning Deployment of Group Policy. Lesson 2: Troubleshooting Group Policy. Activity: Troubleshooting Group Policy Application. Lab 7-1: Planning Group Policy Deployment. Chapter 8: Securing Microsoft Windows 2000-Based Computers. Chapter Scenario: Market Florist. Lesson 1: Planning Microsoft Windows 2000 Security Templates. Activity: Evaluating a Security Template. Lesson 2: Analyzing Security Settings with Security Configuration and Analysis. Lesson 3: Planning the Deployment of Security by Using Security Templates. Lab 8-1: Planning Security Templates. Chapter 9: Designing Microsoft Windows 2000 Services Security. Chapter Scenario: Lucerne Publishing. Lesson 1: Designing DNS Security. Activity: Designing DNS for Internal and External Use. Lesson 2: Designing DHCP Security. Lesson 3: Designing RIS Security. Lesson 4: Designing SNMP Security. Lesson 5: Designing Terminal Services Security. Lab 9-1: Planning Security for Network Services. Chapter 10: Planning a Public Key Infrastructure. Chapter Scenario: Blue Yonder Airlines. Lesson 1: Planning a Certification Authority Hierarchy. Lesson 2: Managing Certification Authorities. Activity: Planning Certificate Renewal Settings. Lesson 3: Using Certificates for Authentication. Lab 10-1: Planning a PKI Deployment. Chapter 11: Securing Data at the Application Layer. Chapter Scenario: Fabrikam Inc. Lesson 1: Planning Authenticity and Integrity of Transmitted Data. Lesson 2: Planning Encryption of Transmitted Data. Activity: Determining Key Usage. Lab 11-1: Providing Application-Layer Security for Contoso Ltd. Chapter 12: Securing Data with Internet Protocol Security (IPSec). Chapter Scenario: Fabrikam Inc. Lesson 1: Designing IPSec Policies. Activity: Evaluating IPSec Scenarios. Lesson 2: Planning IPSec Deployment. Lab 12-1: Designing IPSec Security. Chapter 13: Securing Access for Remote Users and Networks. Chapter Scenario: Hanson Brothers. Lesson 1: Planning Remote Access Security. Lesson 2: Designing Remote Access Security for Users. Lesson 3: Designing Remote Access Security for Networks. Lesson 4: Designing Remote Access Policy. Activity: Designing Remote Access Policy. Lesson 5: Planning RADIUS Security. Lab 13-1: Designing Security for Remote Access Users. Chapter 14: Securing an Extranet. Chapter Scenario: Market Florist. Lesson 1: Identifying Common Firewall Strategies. Activity: Identifying Firewall Features. Lesson 2: Securing Internet-Accessible Resources in a DMZ. Lesson 3: Securing Data Flow Through a DMZ. Lab 14-1: Designing Firewall Rules. Chapter 15: Securing Internet Access. Chapter Scenario: Wide World Importers. Lesson 1: Designing an Internet Acceptable Use Policy. Lesson 2: Securing Access to the Internet by Private Network Users. Activity: Identifying Security Design Risks. Lesson 3: Restricting Access to Content on the Internet. Lesson 4: Auditing Internet Access. Lab 15-1: Designing Secure Internet Access. Chapter 16: Securing Access in a Heterogeneous Network Environment. Chapter Scenario: Blue Yonder Airlines. Lesson 1: Providing Interoperability Between Windows 2000 and Heterogeneous Networks. Lesson 2: Securing Authentication in a Heterogeneous Network. Activity: Identifying Authentication Risks in a Heterogeneous Network Environment. Lesson 3: Designing Directory Synchronization and Integration. Lesson 4: Securing Access to Windows 2000 Resources. Lesson 5: Securing Windows 2000 User Access to Heterogeneous Networks. Lab 16-1: Securing Heterogeneous Clients. Chapter 17: Designing a Security Plan. Chapter Scenario: Fabrikam Inc. Lesson 1: Defining a Security Policy. Lesson 2: Developing a Security Plan. Lesson 3: Maintaining a Security Plan. Appendix: Answers. Index.

Product Details

  • publication date: 01/07/2001
  • ISBN13: 9780470065785
  • Format: Hardback
  • Number Of Pages: 998
  • ID: 9780470065785
  • weight: 2054
  • ISBN10: 0470065788

Delivery Information

  • Saver Delivery: Yes
  • 1st Class Delivery: Yes
  • Courier Delivery: Yes
  • Store Delivery: Yes

Prices are for internet purchases only. Prices and availability in WHSmith Stores may vary significantly

Close