Business Accounting
Communication
Database
Document Management
e-Commerce
Networking
Office Suites
Personal Finance
Presentation
Project Management
Reports & Forms
Schedule & Contact Management
Spreadsheet
Tax Preparation
Training & Tutorials
Word Processing
|
|
Microsoft Windows 2000 Designing Security Curriculum CBT Training CDs |
List Price:
Your Price: |
|
|
|
Product Info |
Reviews |
<< 1 >>
Rating: Summary: Microsoft Windows 2000 Designing Security Curriculum CBT Tra Review: Course Overview
This curriculum provides participants with an opportunity to learn the Windows 2000 security model and technologies to plan for a secure enterprise network.
# This curriculum consists of five courses: Course 72437 Microsoft Windows 2000 Network - Designing Security Part 1: Security Planning
# Course 72438 Microsoft Windows 2000 Network - Designing Security Part 2: Securing Local Networks
# Course 72439 Microsoft Windows 2000 Network - Designing Security Part 3: Securing Remote Access
# Course 72440 Microsoft Windows 2000 Network - Designing Security Part 4: Securing Internet Access
# Course 72441 Microsoft Windows 2000 Network - Designing Security Part 5: Securing Access to Partners
Learn To
See individual course descriptions for specific course objectives and scope.
Audience
This curriculum is intended for System Administrators and System Analysts, which will prepare learners for the Microsoft Exam 70-220.
Deployment Options
e-Learning
Accreditation
NASBA credits: 4 CPE Credits Per Course
ITCAP credits: 2.5 Credit Hours
CEU credits: 3.50 CEUs
Language Options
US English
Total Learning Time
30 to 40 hours
Microsoft Windows 2000 Network - Designing Security Part 1: Security Planning
Course Overview
This is the first course in a five-part series of the Microsoft Windows 2000 Network - Designing Security curriculum which prepares participants for Microsoft Exam 70-220. This course provides participants with an opportunity to learn the Windows 2000 security model and technologies to plan for a secure enterprise network, creating and analyzing a network security plan, planning secure and effective strategies for creating security groups, delegating administration and placing and inheriting security policies.
Learn To
# Identify the risks and threats against which security should be provided.
# Identify the windows 2000 security model and technologies available to plan a secure enterprise network.
# Create and analyze the network security plan that is based on the business, organizational and technical factors.
# Identify how to plan a secure and effective strategy for creating security groups, delegating administration, and placing and inheriting security policies.
Audience
This course is intended for System Administrators and System Analysts. Participants should have taken Microsoft Windows 2000: Administration Series (courses 72410 - 72412), Microsoft Windows 2000 Installation, Configuration, & Administration Series (courses 72413 - 72420), and Microsoft Windows 2000 Implementing and Administering a Windows 2000 Network Infrastructure Series (courses 72421 - 72425).
Deployment Options
e-Learning
Accreditation
NASBA credits: 4 CPE Credits
CEU credits: 0.70 CEUs
Language Options
German, US English
Total Learning Time
6 to 8 hours
Objectives
Unit 1: Network Security: An Introduction 2 - 3 hours
# Match various disclosures of data attacks with their descriptions.
# Match various corruptions of data threats with their descriptions.
# Match the various denials of service attacks with their descriptions.
# Identify the potential threats against which the most important resources are to be secured.
# Match the components of the Windows 2000 security model with their functions.
# Match the features of Windows 2000 Active Directory with the threats against which they protect a network in a specified situation.
# Match the authentication protocols with the situations in which they are used.
# Match the Windows 2000 access control features with the situations in which they provide security.
# Match the Windows 2000 encryption technologies with the situations in which they provide security.
Unit 2: Network Security Plan: Analyzing 2 - 3 hours
# Identify the security planning guidelines based on the geographical scope of an organization.
# Identify the security planning guidelines based on the security requirements of internal users.
# Identify the security planning guidelines based on the security requirements of external users.
# Identify the security planning guidelines based on the cost of operations.
# Identify the security planning guidelines to be considered for accommodating the growth plan of an organization.
# Identify the appropriate security plan for a specified business scenario.
# Analyze a specific network security plan on the basis of business factors.
# Identify the network security planning guidelines related to company processes.
# Match organizational structures with their implications on the network security plan.
# Identify the guidelines for a network security plan at various stages of the service and product life cycle.
# Identify the guidelines for the change management plan to ensure network security.
# Identify the most appropriate security plan for a specified organizational setup.
# Evaluate a specific security plan on the basis of organizational factors.
# Match various types of IT management structures with their characteristics.
# Identify the network security planning guidelines related to the technical environment of an organization.
# Identify the most appropriate security plan for a specified technical scenario.
# Identify the impact of a change in a security plan on the existing technical environment in a specified situation.
# Evaluate a specific security plan on the basis of technical factors.
Unit 3: Distributed Security: Planning 2 hours
# Match various types of security groups with their scopes.
# Identify the default access rights granted to built-in Windows 2000 administrative groups.
# Identify the considerations for assigning memberships to security groups.
# Match security group scopes with the situations in which they are used.
# Design a security group strategy for easy administration and enhanced network performance.
# Identify the guidelines for designing a strategy for the delegation of administration.
# Design a strategy to delegate administrative authority.
# Identify the rules for placing security policies in sites, domains, and OUs.
# Identify the rules for inheriting security policies in sites, domains, and OUs.
# Identify the recommendations for designing Group Policy.
Microsoft Windows 2000 Network - Designing Security Part 2: Securing Local Networks
Course Overview
This is the second course in a five-part series of the Microsoft Windows 2000 Network - Designing Security curriculum which prepares participants for Microsoft Exam 70-220. This course provides participants with an opportunity to learn how to secure files, folders, and printers in a network by using access permissions, create an EFS strategy, a backup plan, and an audit policy. Participants will also learn to identify the security settings for a kiosk and a portable computer, design DNS, RIS and SNMP security, design a network data protection strategy and select network authentication methods, and design an authentication strategy for integration with non-Microsoft clients.
Learn To
# Identify how to secure files, folders, and printers in a network by using access permissions.
# Create an EFS strategy, a backup plan, and an audit policy.
# Identify the security settings for a kiosk and a portable computer.
# Design DNS, RIS, and SNMP security.
# Design a network data protection strategy and select the network authentication method that is best suited for a specified situation.
# Design an authentication strategy for integration with non-Microsoft clients.
Audience
This course is appropriate for System Administrators and System Analysts. Participants should have taken Microsoft Windows 2000: Administration Series (courses 72410 - 72412), Microsoft Windows 2000 Installation, Configuration, & Administration Series (courses 72413 - 72420), and Microsoft Windows 2000 Implementing and Administering a Windows 2000 Network Infrastructure Series (courses 72421 - 72425).
Deployment Options
e-Learning
Accreditation
NASBA credits: 4 CPE Credits
CEU credits: 0.70 CEUs
Language Options
US English, German
Total Learning Time
6 to 8 hours
Objectives
Unit 1: Designing Local Security 3 - 4 hours
# Match standard folder access permissions with their descriptions.
# Match standard file access permissions with their descriptions.
# Match special access permissions with their descriptions.
# Identify the rules that control access permissions for files and folders.
# Identify the appropriate access design for specific files and folders.
# Evaluate the permission set applied for files and folders for the specified requirements.
# Match printer permissions with their descriptions.
# Match the types of printer users with their descriptions.
# Match printer configuration options with their uses.
# Identify the considerations for ensuring printer security in an organization.
# Design a strategy to ensure printer security in a specified situation.
# Evaluate printer security in a specified scenario.
# Identify the characteristics of EFS.
# Identify the recovery policy considerations for implementing EFS in an organization.
# Identify the considerations for implementing EFS in an organization.
# Design an EFS strategy in a specified situation.
# Match different types of backup with their functions.
# Identify the guidelines to create a backup plan.
# Match the types of security templates with their uses.
# Identify the security settings for a kiosk.
# Identify the security settings for a portable computer.
# Match the events that can be audited in Windows 2000 with their descriptions.
# Identify the decisions involved in planning an audit policy for a specified situation.
# Identify the considerations to secure Windows 2000 DNS.
# Design security for a Windows 2000 DNS server.
# Match RIS security strategies with the situations in which they are used.
# Set SNMP security properties by using the Computer Management console.
Unit 2: Security on a LAN 3 - 4 hours
# Match network data transmission risks with the situations in which they can exist.
# Match the IPSec encryption algorithms with the guidelines used to select them.
# Match the IPSec authentication methods with the guidelines used to select them.
# Identify the guidelines that are used to select various IPSec integrity algorithms.
# Design a strategy for protecting network data transmission on a private network from packet-level impersonation in a specified scenario.
# Evaluate the network data protection strategy used to protect the data transmitted on a private network from packet level impersonation.
# Match network authentication methods with their features.
# Identify the guidelines for selecting network authentication methods.
# Identify the network authentication method that is best suited for a specified situation.
# Sequence the steps performed for setting up a Macintosh client connection with a Windows 2000 server.
# Install File Server for Macintosh by using Windows 2000 Server.
# Configure File Server for Macintosh by using Windows 2000 Server.
# Create a Macintosh-accessible volume by using Windows 2000 Server.
# Set a password for a Macintosh-accessible volume by using Windows 2000 Server.
# Install authentication files on a Macintosh client.
# Sequence the steps performed for setting up a NetWare client connection with a Windows 2000 server.
# Install Gateway Service for NetWare by using Windows 2000 Server.
# Set the default tree and context by using Windows 2000 Server.
# Enable a gateway to NetWare resources by using Windows 2000 Server.
# Activate the gateway to NetWare resources by using Windows 2000 Server.
# Change the NetWare NDS password by using Windows 2000 Server.
# Set up a Telnet connection by using Windows 2000 Server.
# Identify the guidelines that are used to authenticate non-Microsoft clients on a Windows 2000 network.
# Design an authentication strategy for integrating non-Microsoft clients with Windows 2000 Server in a specified scenario.
Microsoft Windows 2000 Network - Designing Security Part 3: Securing Remote Access
Course Overview
This is the third course in a five-part series of the Microsoft Windows 2000 Network - Designing Security curriculum which prepares participants for Microsoft Exam 70-220. This course provides participants with an opportunity to learn how to design security solutions for a Windows 2000 network and design a secure remote access security strategy for an enterprise network.
Learn To
# Design security solutions for a Windows 2000 network.
# Design a secure remote access security strategy for an enterprise network.
Audience
This course is appropriate for System Administrators and System Analysts. Participants should have taken Microsoft Windows 2000: Administration Series (courses 72410 - 72412), Microsoft Windows 2000 Installation, Configuration, & Administration Series (courses 72413 - 72420), and Microsoft Windows 2000 Implementing and Administering a Windows 2000 Network Infrastructure Series (courses 72421 - 72425).
Deployment Options
e-Learning
Accreditation
NASBA credits: 4 CPE Credits
CEU credits: 0.70 CEUs
Language Options
German, US English
Total Learning Time
6 to 8 hours
Objectives
Unit 1: Designing Security Solutions 3 - 4 hours
# Identify the appropriate PKI encryption method to be used in a specified situation.
# Identify the features of a CA.
# Identify the features of a certificate server.
# Match the CA types with the functions that they perform.
# Identify the guidelines for implementing a specific hierarchy of CAs to secure remote access.
# Match the guidelines to be followed for integrating third-party CAs with their purposes.
# Identify the hierarchy of CAs that ensures secure remote access in a specified situation.
# Match the certificate management processes with the situations in which they are used.
# Identify the situation in which a specific type of certificate mapping is used.
# Implement the appropriate certificate management process in a specified situation.
# Design strategies in a PKI to provide security to the network of an organization.
Unit 2: Designing WAN Security 3 - 4 hours
# Match the various types of firewalls with their basic functions.
# Identify the functions of the Proxy server.
# Identify the benefits of RADIUS.
# Identify the benefits of demand-dial routing.
# Identify the benefits of a VPN.
# Identify the most appropriate RAS security element to be used in a specified situation.
# Match RAS authentication protocols with the situations in which they are used.
# Identify the situations in which the use of a specific RAS encryption method is appropriate for securing data.
# Match the remote access policy elements with the scenarios in which they are used.
# Identify the situations in which a specific remote access proxy management method is to be used to secure data.
# Identify the most appropriate design implementation decisions to provide secure remote access to an enterprise network.
# Design a remote access security strategy.
Microsoft Windows 2000 Network - Designing Security Part 4: Securing Internet Access
Course Overview
This is the fourth course in a five-part series of the Microsoft Windows 2000 Network - Designing Security curriculum which prepares participants for Microsoft Exam 70-220. This course provides participants with an opportunity to learn how to address security issues encountered when the public is allowed to access their network and security issues encountered when public networks are accessed from their network.
Learn To
# Identify the security threats introduced by Internet connections.
# Identify the benefits of a firewall.
# Identify the limitations of a firewall.
# Identify the features of IPSec communication modes.
# Identify the actions that need to be performed while designing an IPSec policy.
# Identify the sequence of steps in the phases of IPSec negotiation.
Audience
This course is for System Administrators and System Analysts. Participants should have taken Microsoft Windows 2000: Administration series (courses 72410 - 72412), Microsoft Windows 2000 Installation, Configuration, & Administration Series (courses 72413 - 72420), and Microsoft Windows 2000 Implementing and Administering a Windows 2000 Network Infrastructure Series (courses 72421 - 72425).
Deployment Options
e-Learning
Accreditation
NASBA credits: 4 CPE Credits
CEU credits: 0.70 CEUs
Language Options
German, US English
Total Learning Time
6 to 8 hours
Objectives
Unit 1: Securing Private Networks 3 - 4 hours
# Identify the security threats introduced by Internet connections.
# Identify the benefits of a firewall.
# Identify the limitations of a firewall.
# Match the components of a firewall with their functions.
# Match the various types of firewall implementations with their security features.
# Identify the guidelines for selecting a firewall implementation for a specified situation.
# Identify the appropriate server placement strategy to be used in a given situation.
# Evaluate a firewall strategy in a specific situation.
Unit 2: Securing Communication Channels 3 - 4 hours
# Match the IPSec protocols with their features.
# Identify the features of IPSec communication modes.
# Match the predefined security policies with their features.
# Match the activities that occur in an IPSec management strategy with their examples.
# Identify the actions that need to be performed while designing an IPSec policy.
# Identify the sequence of steps in the phases of IPSec negotiation.
# Identify the situation in which you use a specific security level.
# Match the data authentication methods with the situations in which they are to be used.
# Match the algorithm with the guidelines for selecting the algorithm.
# Match the filter action with the guidelines for selecting the filter action.
# Design an IPSec solution in a specified scenario.
# Analyze an IPSec design in a specific situation.
# Identify the features of SMB.
# Enable SMB signing by using the registry editor.
# Identify the features of CIFS.
Microsoft Windows 2000 Network - Designing Security Part 5: Securing Access to Partners
Course Overview
This is the final course in a five-part series of the Microsoft Windows 2000 Network - Designing Security curriculum which prepares participants for Microsoft Exam 70-220. This course provides participants with an opportunity to learn how electronic collaboration between business partners can be established without compromising security.
Learn To
# Design a strategy for implementing an authentication method and a secure VPN.
# Identify the benefits and the security features of Terminal Services, the features of message queuing, and sequence the steps involved in message queuing authentication.
# Identify the steps involved in securing an e-commerce Web server, the features of SSL and SET, and the strategies for maintaining e-commerce security.
Audience
This course is for System Administrators and System Analysts. Participants should have taken Microsoft Windows 2000: Administration series (courses 72410 - 72412), Microsoft Windows 2000 Installation, Configuration, & Administration Series (courses 72413 - 72420), and Microsoft Windows 2000 Implementing and Administering a Windows 2000 Network Infrastructure Series (courses 72421 - 72425).
Deployment Options
e-Learning
Accreditation
NASBA credits: 4 CPE Credits
CEU credits: 0.70 CEUs
Language Options
German, US English
Total Learning Time
6 to 8 hours
Objectives
Unit 1: Securing Partner Access 3 - 4 hours
# Identify the features of the user account-based authentication method.
# Identify the features of the trusted domain-based authentication method.
# Identify the features of the Kerberos-based authentication method.
# Identify the features of the certificate-based authentication method.
# Identify the guidelines for selecting an appropriate authentication method.
# Identify the appropriate strategy for authenticating trusted partners.
# Evaluate the effectiveness of the authentication strategy for trusted partners.
# Match the placement of a VPN server in conjunction to a firewall with its related benefits.
# Evaluate the effectiveness of a VPN solution for a given scenario.
# Identify the benefits of Terminal Services.
# Identify the security features of Terminal Services.
# Identify the features of message queuing.
# Sequence the steps involved in message queuing authentication.
Unit 2: E-Commerce Security 3 - 4 hours
# Identify the steps for securing an e-commerce Web server.
# Identify the features of SSL.
# Identify the features of SET.
# Identify the strategies for minimizing the risks involved in e-commerce.
# Identify the strategies that help to recover from a security breach.
<< 1 >>
|
|
|
|