Business Accounting
Communication
Database
Document Management
e-Commerce
Networking
Office Suites
Personal Finance
Presentation
Project Management
Reports & Forms
Schedule & Contact Management
Spreadsheet
Tax Preparation
Training & Tutorials
Word Processing
|
|
CIW Server Administrator Part 2: User Management CBT Training CD |
List Price:
Your Price: |
|
|
|
Product Info |
Reviews |
<< 1 >>
Rating: Summary: CIW Server Administrator Part 2: User Management Review: Course Overview
This is the second course in a five part series that will teach students how to manage users. The essentials of user management are presented, as well as the techniques for managing users in Windows 2000 and managing users in Linux. Students will learn how to deal with the SAM, user rights, policies, and shared folders. In addition, they will learn how to deal with manually and automatically adding users in Linux, linuxconf, password files, and policies.
Learn To
Identify authentication methods.
Identify features of the peer-to-peer network security model.
Identify features of shares in peer-to-peer settings.
Identify features of the Security Accounts Manager (SAM).
Add a user account.
Modify user rights.
Match files for manually adding Unix users with their purposes.
Identify features of automated account creation.
Add a user by using the linuxconf program.
Audience
The audience for this course includes LAN/WAN administrators, system administrators, systems managers, intranet administrators, network engineers, and internetworking engineers. The prerequisite for this course is that students must have CIW Foundations certification or equivalent experience. CIW accepts CompTIA's i-Net+ certification in place of the CIW Foundations course. This course covers exam number 1D0-450. In addition, students should have taken the first part of this series (87001).
Deployment Options
e-Learning
Accreditation
NASBA credits: 4 CPE Credits
CEU credits: 0.70 CEUs
Language Options
US English
Total Learning Time
7 to 8 hours
Objectives
Unit 1: User Management Essentials 3 hours
Identify authentication methods.
Identify features of the peer-to-peer network security model.
Identify features of shares in peer-to-peer settings
Identify features of the user-level access security model
Identify considerations for establishing user-level shares
Create a user name-based network share.
Customize share permissions.
Match universal permissions with their descriptions.
Match Windows 2000 access permissions with their descriptions.
Identify features of Unix permissions.
Match Novell rights with their descriptions.
Identify the key password practices.
Match the key network policies with their descriptions.
Identify the characteristics of a standard operating procedure (SOP).
Identify considerations for creating a logon account policy.
Unit 2: Managing Users in Windows 2000 2 hours
Identify features of the Security Accounts Manager (SAM).
Add a user account.
Modify user rights.
Select a remote system to administer.
Identify considerations for managing the user environment.
Enforce system policies in Windows 2000.
Identify considerations for policy planning.
Identify considerations for auditing in Windows 2000 Server.
Identify functions of the Shared Folders snap-in.
Establish a shared folder by using the Computer Management snap-in.
Control access to shares by using the Computer Management snap-in.
Identify features of New Technology File System (NTFS) partitions.
Enable auditing in Microsoft Windows 2000.
Identify features of permissions in Windows Explorer.
Identify the steps required to change ownership by using Windows Explorer.
Unit 3: Managing Users in Linux 2 - 3 hours
Match files for manually adding Unix users with their purposes.
Identify features of automated account creation.
Add a user by using the linuxconf program.
Delete a user account from the accounts database by using the linuxconf program.
Identify features of groups.
Identify functions of Linux system accounts.
Identify functions of the password file.
Identify considerations for developing account policies.
Apply password aging in Linux.
<< 1 >>
|
|
|
|