Business Accounting
Communication
Database
Document Management
e-Commerce
Networking
Office Suites
Personal Finance
Presentation
Project Management
Reports & Forms
Schedule & Contact Management
Spreadsheet
Tax Preparation
Training & Tutorials
Word Processing
|
|
Lotus Domino R5 System Administration Part 7: Security Planning and Implementation Training CD |
List Price:
Your Price: |
|
|
|
Product Info |
Reviews |
<< 1 >>
Rating: Summary: Lotus Domino R5 System Administration Part 7: Security Plann Review: Lotus Domino R5 System Administration Part 7: Security Planning and Implementation Training CD
Course Overview
This is the seventh course in a ten part series for system administrators who are responsible for Domino server and Notes client. At the completion of this course, students will learn how to plan and implement Domino security at an organization; control the access to user IDs and Domino servers; secure Domino database by using database ACLS, roles, and forms and view access lists; secure a document by using Readers and Authors field, and document encryption; and secure mail by encrypting and signing mail.
Learn To
Plan and implement Domino security at an organization.
Control the access to user IDs and Domino servers.
Secure Domino database by using database ACLS, roles, and forms and view access lists.
Secure a document by using Readers and Authors field, and document encryption.
Secure mail by encrypting and signing mail.
Audience
This course series is for system administrators who are responsible for Domino server and Notes client. Participants should have completed NETg course 13403, Lotus Domino R5 Development Part 1: Basic Concepts or have equivalent knowledge and have completed the first six courses in this series.
Deployment Options
e-Learning
Accreditation
NASBA credits: 4 CPE Credits
CEU credits: 0.70 CEUs
Language Options
Korean, US English
Total Learning Time
6 to 8 hours
Objectives
Unit 1: Domino Security 1.5 - 2 hours
Match each member of the Domino Security team with their responsibilities.
Match the strategies that may be used to secure servers with their functionality.
Match the strategies that may be used to secure applications with their functionality.
Match the strategies that may be used to secure IDs with their functionality.
Unit 2: ID and Server Security 1.5 - 2 hours
Identify the contents of Lotus Notes R5 user IDs.
Identify the strategies for the use of password for ID files.
Sequence the steps involved in the process of verifying a client accessing a Domino server.
Identify the features of ID cross-certification.
Add a cross-certificate to authenticate a user from a different organization on demand.
Add a cross-certificate by Notes mail demand to authenticate a user from a different organization.
Identify the guidelines for ensuring maximum physical security for Domino servers.
Identify the functions of types of server access controls.
Implement the Domino server security by using the server document.
Restrict the access to Passthru server by using the fields in the server document.
Restrict agents by using the server document.
Customize the Public Directory Profile to specify the server security related settings for Domino Directory.
Unit 3: Database Security 1 - 2 hours
Given a scenario, identify the access level required to enable a user to perform specific operations.
Assign a user type to a name in the ACL from the workspace.
Identify the access level required to replicate specified changes to a database replica, in a given scenario.
Identify the guidelines for setting server access in the database ACL to ensure proper database replication.
Create a role from the workspace.
Control access to a form by creating a form Create access list.
Control access to a view by creating a view read access list.
Unit 4: Document Security 1 hour
Identify the characteristics of the Readers field in document security.
Identify the characteristics of the Authors Field in document security.
Match the ways used to encrypt documents with their features.
Create keys used for encryption.
Manually apply encryption keys to fields.
Unit 5: Mail Security 1 hour
Identify the features of Mail encryption.
Identify the events that occur in the process of outgoing mail encryption.
Identify the events involved in the process of verifying the author of Notes mail messages.
Practice on one of the events.
Identify the events involved in the process of verifying the author of S/MIME mail messages.
<< 1 >>
|
|
|
|