Курс 2150E: Designing a Secure Microsoft Windows 2000 Network
Цена для физических лиц, р.: 4500
Цена для юридических лиц, р.: 4500
Продолжительность курса (дней): 20
Курс готовит к тестам:
70-220
Цель:
Необходимая подготовка: Знания и навыки в следующих областях:
ИЛИ
ИЛИ
Необходимо знание английского языка в пределах чтения компьютерно-ориентированного материала.
Результат обучения: Получение следующих знаний и навыков:
Содержание курса:
Модуль 1. Assessing Security Risks
What is at Risk What are the Potential Threats to the Network Describing Common Security Standards Planning Enterprise Security
Модуль 2. Introducing the Windows 2000 Security Model
The role of Directory Services in the Security Framework
Identifying Authentication Methods Available Within Windows 2000 Networks
Controlling Access to Resources on Windows 2000 Networks
Introducing Encryption Technology
Encrypting Stored and Transmitted Data in Windows 2000 Networks
Introducing Public Key Infrastructure Technology
Модуль 3. Planning Administrative Access
Defining the Administrative Structure
Assigning Administrative Roles
Providing Administrative Access
Модуль 4. Planning User Accounts
Designing a Domain and Organizational Unit Structure
Planning Account Creation and Location
Planning Delegation of Authority
Designing an Audit Policy for Tracking Account Changes
Модуль 5. Securing Windows 2000-Based Computers
Evaluating the Security Requirements of Windows 2000-Based Systems
Securing Physical Access to Windows 2000-Based Systems
Designing Security Configuration Policies
Analysis of Security Configuration
Модуль 6. Securing File and Print Resources
Comparing the Security of Windows 2000 File Systems
Protecting Data Using Access Control Lists
Encrypting Data Using EFS
Auditing Resource Access
Securing Backup and Restore Procedures
Protecting Data From Viruses
Модуль 7. Securing Communication Channels on the Local Network
Demonstration: Investigating Web Access
Assessing Network Data Visibility Risks
Evaluating Network Authentication Methods
Protecting Network Data Transmission from Packet-Level Impersonation
Encrypting Network Data Transmissions with Internet Protocol Security (IPSec)
Модуль 8. Providing Secure Access to Non-Microsoft Clients
Demonstration: Investigating a TelNet Connection
Providing Secure Access to IP-Based Clients
Providing Secure Access to NetWare Clients
Providing Secure Access to Macintosh Clients
Модуль 9. Providing Secure Access to Remote Users
Planning Remote Access Security
Authentication and Accounting Providers
Planning Server-side Security for Remote Connectivity
Planning Client-side Security for Remote Connectivity
Модуль 10. Providing Secure Access to Remote Offices
Comparing Private and Public Networks
Securing WAN Links Over a Private Network
Securing WAN Links Over a Public Network
Модуль 11. Providing Secure Network Access to Internet Users
Potential Risks
Protecting Networks using Firewalls
Demonstration: Port Mapping Example
Protecting Resources Exposed on the Internet
Planning Placement of Servers in a Firewall Configuration
Модуль 12. Providing Secure Internet Access to Network Users
Analyzing Threats Introduced by an Internet Connection
Protecting Internet Network Addressing Schemes
Using Server-Side Configuration to Control Content Accessed by Network Users
Using Client-Side Configuration to Control Content Accessed by Network Users
Модуль 13. Extending the Network to Partner Organizations
Authenticating Partners Using Windows 2000 User Accounts
Authenticating Partners Using Trusted Domains
Authenticating Partners Using Internet Technologies
Planning Certificate-Based Authentication
Модуль 14. Designing a Public Key Infrastructure
Providing Secure Access Using Resource Permissions
Securing Access for Remote Partners
Providing Secure Partner Access to Data Using Terminal Services
Providing Secure Partner Access to Data Using Web Technologies
Providing Secure Partner Access to Data Using Messaging
Модуль 15. Developing a Security Plan
Planning for Business-to-Business Applications
Planning for Secure Business Communication Between Partners
|