Звезды и С - Главная Тел: +7 495 363 36 86
e-mail: info@stars-s.ru
Москва, Ленинградский пр-кт, д. 5, стр. 2
План проезда
ВЕРСИЯ ДЛЯ СЛАБОВИДЯЩИХВЕРСИЯ ДЛЯ СЛАБОВИДЯЩИХ

-->

Курс M2159: Deploying and Managing Microsoft Internet Security and Acceleration Server 2000

Цена для физических лиц, р.:
Цена для юридических лиц, р.:
Продолжительность курса (дней): 3

Даты (день): 04.04.1931, 04.04.1931, 04.04.2002, 02.05.2002, 13.06.2002, 11.07.2002, 15.08.2002, 18.09.2002, 23.10.2002, 27.11.2002, 25.12.2002, 20.01.2003, 12.02.2003, 19.03.2003, 23.04.2003, 11.06.2003, 16.07.2003, 20.08.2003, 24.09.2003, 29.10.2003, 03.12.2003, 21.01.2004, 25.02.2004, 31.03.2004, 05.05.2004, 09.06.2004, 14.07.2004, 18.08.2004, 13.10.2004, 10.11.2004, 15.12.2004, 09.02.2005, 09.03.2005, 06.04.2005, 04.05.2005, 10.06.2009

Даты (вечер): 04.04.1931, 04.04.1931, 02.05.2002, 13.06.2002, 11.07.2002, 15.08.2002, 18.09.2002, 23.10.2002, 27.11.2002, 25.12.2002, 12.02.2003, 19.03.2003, 23.04.2003, 11.06.2003, 16.07.2003, 20.08.2003, 24.09.2003, 29.10.2003, 03.12.2003, 21.01.2004, 25.02.2004, 31.03.2004, 05.05.2004, 09.06.2004, 14.07.2004, 18.08.2004, 13.10.2004, 10.11.2004, 15.12.2004, 09.02.2005, 09.03.2005, 06.04.2005, 04.05.2005

Курс готовит к тестам: 70-227

Цель:

The goal of this course is to provide Information Technology (IT) professionals with the knowledge and skills to deploy and manage Microsoft Internet Security and Acceleration (ISA) Server 2000 in an enterprise environment.

This course is intended for IT professionals and is not intended for network architects. Three of the major job roles performed by IT professionals to be addressed by this course include Web administrators, network administrators, and security administrators.

Необходимая подготовка:

  • Successfully completed Course 2152, Implementing Microsoft Windows 2000 Professional and Server or have equivalent knowledge of Microsoft Windows® 2000 Professional and Windows 2000 Server.
  • Successfully completed Course 2153, Implementing a Microsoft Windows 2000 Network Infrastructure.

The course materials, lectures, and lab exercises are in English. To benefit fully from the instruction, students need an understanding of the English language and completion of the prerequisites.

Предварительный тест:

Результат:

План курса:

Module 1: Overview of Microsoft ISA Server

The following topics are covered in this module:

  • Introducing ISA Server
  • Using Caching
  • Using Firewalls
  • Deployment Scenarios for ISA Server.

At the end of this module, you will be able to explain the use of ISA Server as a cache server and as an enterprise firewall. This includes:

  • Explaining the use of ISA Server.
  • Describing the use of Web caching.
  • Describing the use of firewalls.
  • Identifying common deployment scenarios for ISA Server.

Module 2: Installing and Maintaining ISA Server

The following topics are covered in this module:

  • Installing ISA Server
  • Installing and Configuring ISA Server Clients
  • Maintaining an ISA Server

At the end of this module, you will be able to install and configure ISA Server as a cache server and as a firewall. This includes:

  • Install ISA Server on a computer running Windows 2000 Server.
  • Configure computers as Web proxy, Firewall, or SecureNAT clients for ISA Server.
  • Perform administrative tasks for maintaining ISA Server.

Module 3: Enabling Security-Enhanced Internet Access

The following topics are covered in this module:

  • Accessing Policies and Rules Overview
  • Creating Policy Elements
  • Configuring Access Polices and Rules
  • Configuring Bandwidth Rules
  • Using ISA Server Authentication

At the end of this module, you will be able to configure access policies to enable security-enhanced Internet access for client computers. This includes:

  • Explaining the use of access policies and rules to enable Internet access.
  • Creating policy elements.
  • Configuring access polices and rules.
  • Configuring bandwidth rules.
  • Explaining the use of authentication for outgoing Web requests.

Module 4: Configuring Caching

The following topics are covered in this module:

  • Cache Overview
  • Configuring Cache Policy
  • Configuring Cache Settings
  • Configuring Scheduled Content Downloads

At the end of this module, you will be able to configure ISA Server as a caching server. This includes:

  • Describing the cache process that ISA Server uses to process requests from client computers.
  • Configuring the cache policy.
  • Configuring cache settings.
  • Configuring scheduled content downloads.

Module 5: Configuring Access for Remote Clients and Networks

The following topics are covered in this module:

  • VPN Overview
  • Configuring VPNs

At the end of this module, you will be able to configure VPN access. This includes:

  • Explaining the use of VPNs and ISA Server.
  • Configuring VPNs by using ISA Server.

Module 6: Configuring the Firewall

The following topics are covered in this module:

  • Securing the Server
  • Examining Perimeter Networks
  • Examining Packet Filtering and IP Routing
  • Configuring Packet Filtering and IP Routing
  • Configuring Application Filters

At the end of this module, you will be able to configure ISA Server as a firewall. This includes:

  • Securing the ISA Server computer.
  • Explaining the use of perimeter networks.
  • Explaining the use of packet filtering and IP routing.
  • Configuring packet filtering and IP routing.
  • Configuring application filters.

Module 7: Configuring Access to Internal Resources

The following topics are covered in this module:

  • Introduction to Publishing
  • Configuring Web Publishing
  • Configuring Server Publishing
  • Adding an H.323 Gatekeeper

At the end of this module, you will be able to configure access to selected internal resources. This includes:

  • Explaining the concepts associated with server publishing.
  • Configuring Web publishing.
  • Configuring server publishing.
  • Adding an H.323 Gatekeeper.

Module 8: Monitoring and Reporting

The following topics are covered in this module:

  • Planning a Monitoring and Reporting Strategy
  • Monitoring Intrusion Detection
  • Monitoring ISA Server Activity
  • Analyzing ISA Server Activity by Using Reports
  • Monitoring Real-Time Activity
  • Testing the ISA Server Configuration

At the end of this module, you will be able to monitor ISA Server activities by using alerts, logging, reporting, and real-time monitoring. This includes:

  • Planning a strategy for monitoring and reporting ISA Server activities.
  • Configuring alerts to monitor intrusion detection.
  • Configuring logging to monitor ISA Server activity.
  • Using reports to analyze ISA Server activity.
  • Monitoring ISA Server computer activity.
  • Testing the ISA Server configuration.

Module 9: Configuring ISA Server for an Enterprise

The following topics are covered in this module:

  • Introducing ISA Server Enterprise Edition
  • Installing ISA Server in the Enterprise
  • Using Enterprise Policies and Array Policies
  • Managing Network Connections
  • Scaling ISA Server
  • Extending and Automating ISA Server Functionality

At the end of this module, you will be able to install and configure ISA Server for an enterprise environment. This includes:

  • Describing the use of ISA Server in an enterprise environment.
  • Installing ISA Server in an enterprise environment.
  • Using enterprise and array policies.
  • Scaling ISA Server.
  • Managing network connections.
  • Extending and automating ISA Server functionality.


  О нас|ASTRA LINUX|KASPERSKY|CITRIX|MICROSOFT|POSTGRES|CISCO|≡ Вендоры|Поиск

   Тел: +74953633686 email: info@stars-s.ru

   125040, Москва, Ленинградский проспект, д. 5, стр. 2, под. 5, офис "Звезды и С"

  © Учебный центр "Звезды и С", 1991-2022, Оферта