Business Accounting
Communication
Database
Document Management
e-Commerce
Networking
Office Suites
Personal Finance
Presentation
Project Management
Reports & Forms
Schedule & Contact Management
Spreadsheet
Tax Preparation
Training & Tutorials
Word Processing
|
|
Microsoft® Windows® 2000 Network Management Part 5: Group Policy CBT Training CD |
List Price:
Your Price: |
|
|
|
Product Info |
Reviews |
<< 1 >>
Rating: Summary: Microsoft® Windows® 2000 Network Management Part 5 Review: Course Overview
This is the last course in a five part series that covers implementing group policy, group policy and desktop management, and managing network security. Group Policy Object (GPO) operation, Group Inheritance, instruction about software deployment by using Group Policy, troubleshooting Group Policy problems, server monitoring methods, detecting security breaches, and auditing are also covered. Finally, the course will cover Windows 2000 updates, service packs, hot fixes, and security hot fixes.
Learn To
Identify attributes of Group Policy.
Identify types of Group Policy settings.
Identify features of Group Policy Object (GPO) storage.
Identify characteristics of Group Policy inheritance.
Identify features of Group Policy processing control.
Identify characteristics of Group Policy slow network connection detection.
Identify features of user environment management in Group Policy.
Identify features of Administrative Template settings types.
Identify Administrative Template settings commonly used to secure user desktops and to restrict user access to network resources and applications.
Identify features of software management technologies.
Match phases of the software life cycle with their characteristics.
Identify features of software installation using the assignment and publication methods.
Identify features of account policies.
Identify names of password policy settings.
Configure an account lockout setting.
Identify features of server monitoring methods.
Identify common security events.
Enable security auditing.
Audience
The intended audience for this course includes Network Administrators and Technical Support Specialists. Candidates for this exam work in medium to very large computing environments that use Microsoft Windows 2000 network and directory services. Candidates have at least six months of experience administering and supporting Windows 2000 server and client operating systems that use Active Directory services. This course maps to Microsoft exam 70-218. In addition, learners should have taken the first four parts of the series (72515-72518)
Deployment Options
e-Learning
Accreditation
NASBA credits: 4 CPE Credits
Language Options
US English, German
Total Learning Time
6 to 8 hours
Objectives
Unit 1: Group Policy Structure and Operation 1 hour
Identify attributes of Group Policy.
Identify types of Group Policy settings.
Identify features of GPO storage.
Sequence the steps of the process for applying Group Policy settings.
Identify characteristics of GPO links.
Create a linked GPO.
Create an unlinked GPO.
Link an existing GPO to domains and organizational units.
Unit 2: Active Directory and Inheritance 1 hour
Identify characteristics of Group Policy inheritance.
Identify features of Group Policy processing control.
Identify characteristics of Group Policy slow network connection detection.
Identify the features of conflict resolution of Group Policy settings.
Identify characteristics of Group Policy inheritance modification methods.
Block a Group Policy inheritance.
Force Group Policy inheritance to all child containers.
Filter a GPO for a user account.
Identify methods to troubleshoot Group Policy problems.
Unit 3: Group Policy and Desktop Management 1 hour
Identify features of user environment management in Group Policy.
Identify features of Administrative Template settings types.
Identify Administrative Template settings commonly used to secure user desktops and to restrict user access to network resources and applications.
Implement user Administrative Template settings.
Implement a computer Administrative Templates policy.
Implement a user Administrative Template policy.
Identify features of Security Configuration and Analysis.
Identify features of Group Policy script settings.
Identify the process of applying script settings in Group Policy.
Copy a script to a Group Policy Template.
Add a script to a GPO.
Identify features of folder redirection.
Redirect a folder to a server location.
Identify methods to troubleshoot Group Policy problems.
Unit 4: Group Policy and Software Management 1 hour
Identify features of software management technologies.
Match phases of the software life cycle with their characteristics.
Identify features of software installation using the assignment and publication methods.
Deploy a software package by using Software Installation.
Deploy a mandatory software upgrade.
Redeploy software by applying a service pack.
Remove a deployed software package by modifying the associated Group Policy.
Identify methods to troubleshoot software deployment.
Unit 5: Managing Network Security 1 - 2 hours
Identify features of account policies.
Identify names of password policy settings.
Configure an account lockout setting.
Assign a user logon script.
Unit 6: Security Breaches and Logon Security 1 - 2 hours
Identify features of server monitoring methods.
Identify common security events.
Enable security auditing.
Identify characteristics of smart card authentication.
Identify features of service packs and hot fixes.
<< 1 >>
|
|
|
|