The goal of this course is to provide Information Technology (IT)
professionals with the knowledge and skills to deploy and manage Microsoft
Internet Security and Acceleration (ISA) Server 2000 in an enterprise
environment.
This course is intended for IT professionals and is not intended for network
architects. Three of the major job roles performed by IT professionals to be
addressed by this course include Web administrators, network administrators, and
security administrators.
Необходимая подготовка:
Successfully completed Course 2152, Implementing Microsoft Windows 2000
Professional and Server or have equivalent knowledge of Microsoft
Windows® 2000 Professional and Windows 2000 Server.
Successfully completed Course 2153, Implementing a Microsoft Windows
2000 Network Infrastructure.
The course materials, lectures, and lab exercises are in English. To
benefit fully from the instruction, students need an understanding of the
English language and completion of the prerequisites.
Хотите записаться?
info@stars-s.ru,
Skype или наши много-канальные телефоны :
+7 (495) 363-36-86
План курса:
Module 1: Overview of Microsoft ISA Server
The following topics are covered in this module:
Introducing ISA Server
Using Caching
Using Firewalls
Deployment Scenarios for ISA Server.
At the end of this module, you will be able to explain the use
of ISA Server as a cache server and as an enterprise firewall. This includes:
Explaining the use of ISA Server.
Describing the use of Web caching.
Describing the use of firewalls.
Identifying common deployment scenarios for ISA Server.
Module 2: Installing and Maintaining ISA Server
The following topics are covered in this module:
Installing ISA Server
Installing and Configuring ISA Server Clients
Maintaining an ISA Server
At the end of this module, you will be able to install and
configure ISA Server as a cache server and as a firewall. This includes:
Install ISA Server on a computer running Windows 2000 Server.
Configure computers as Web proxy, Firewall, or SecureNAT clients for ISA
Server.
Perform administrative tasks for maintaining ISA Server.
Module 3: Enabling Security-Enhanced Internet Access
The following topics are covered in this module:
Accessing Policies and Rules Overview
Creating Policy Elements
Configuring Access Polices and Rules
Configuring Bandwidth Rules
Using ISA Server Authentication
At the end of this module, you will be able to configure access
policies to enable security-enhanced Internet access for client computers. This
includes:
Explaining the use of access policies and rules to enable Internet access.
Creating policy elements.
Configuring access polices and rules.
Configuring bandwidth rules.
Explaining the use of authentication for outgoing Web requests.
Module 4: Configuring Caching
The following topics are covered in this module:
Cache Overview
Configuring Cache Policy
Configuring Cache Settings
Configuring Scheduled Content Downloads
At the end of this module, you will be able to configure ISA
Server as a caching server. This includes:
Describing the cache process that ISA Server uses to process requests from
client computers.
Configuring the cache policy.
Configuring cache settings.
Configuring scheduled content downloads.
Module 5: Configuring Access for Remote Clients and Networks
The following topics are covered in this module:
VPN Overview
Configuring VPNs
At the end of this module, you will be able to configure VPN
access. This includes:
Explaining the use of VPNs and ISA Server.
Configuring VPNs by using ISA Server.
Module 6: Configuring the Firewall
The following topics are covered in this module:
Securing the Server
Examining Perimeter Networks
Examining Packet Filtering and IP Routing
Configuring Packet Filtering and IP Routing
Configuring Application Filters
At the end of this module, you will be able to configure ISA
Server as a firewall. This includes:
Securing the ISA Server computer.
Explaining the use of perimeter networks.
Explaining the use of packet filtering and IP routing.
Configuring packet filtering and IP routing.
Configuring application filters.
Module 7: Configuring Access to Internal Resources
The following topics are covered in this module:
Introduction to Publishing
Configuring Web Publishing
Configuring Server Publishing
Adding an H.323 Gatekeeper
At the end of this module, you will be able to configure access
to selected internal resources. This includes:
Explaining the concepts associated with server publishing.
Configuring Web publishing.
Configuring server publishing.
Adding an H.323 Gatekeeper.
Module 8: Monitoring and Reporting
The following topics are covered in this module:
Planning a Monitoring and Reporting Strategy
Monitoring Intrusion Detection
Monitoring ISA Server Activity
Analyzing ISA Server Activity by Using Reports
Monitoring Real-Time Activity
Testing the ISA Server Configuration
At the end of this module, you will be able to monitor ISA
Server activities by using alerts, logging, reporting, and real-time monitoring.
This includes:
Planning a strategy for monitoring and reporting ISA Server activities.
Configuring alerts to monitor intrusion detection.
Configuring logging to monitor ISA Server activity.
Using reports to analyze ISA Server activity.
Monitoring ISA Server computer activity.
Testing the ISA Server configuration.
Module 9: Configuring ISA Server for an Enterprise
The following topics are covered in this module:
Introducing ISA Server Enterprise Edition
Installing ISA Server in the Enterprise
Using Enterprise Policies and Array Policies
Managing Network Connections
Scaling ISA Server
Extending and Automating ISA Server Functionality
At the end of this module, you will be able to install and
configure ISA Server for an enterprise environment. This includes:
Describing the use of ISA Server in an enterprise environment.
Installing ISA Server in an enterprise environment.
Using enterprise and array policies.
Scaling ISA Server.
Managing network connections.
Extending and automating ISA Server functionality.