Звезды и С - Центр обучения и тестирования

Спец. предложения|Обучение|Вебинары|Сертификация|Тестирование|О нас|Работа с сайтом|Новости|Поиск

Курс 2150E: Designing a Secure Microsoft Windows 2000 Network

Цена для физических лиц, р.: 4500
Цена для юридических лиц, р.: 4500

Продолжительность курса (дней): 20

Курс готовит к тестам: 70-220

Цель:

Необходимая подготовка:

Знания и навыки в следующих областях:

  • Working knowledge of Windows 2000 Directory Services.
  • Completion of course 1560 " Upgrading Support Skills from Microsoft Windows NT 4.0 to Microsoft Windows 2000".

ИЛИ

  • Completion of course 2154 " Implementing and Administering Windows 2000 Directory Services".

ИЛИ

  • Эквивалентный объем знаний.

Необходимо знание английского языка в пределах чтения компьютерно-ориентированного материала.

Результат обучения:

Получение следующих знаний и навыков:

  • Identify the security risks associated with managing resource access and data flow on the network.
  • Describe how key technologies within Windows 2000 are used to secure a network and its resources.
  • Plan a Windows 2000 administrative structure so that permissions are granted only to appropriate users.
  • Plan an Active Directory™ directory service structure that facilitates secure and verifiable user account creation and administration.
  • Define minimum security requirements for Windows 2000-based domain controllers, application servers, file and print servers, and workstations.
  • Design a strategy for securing local storage of data and providing secure network access to file and print resources.
  • Design end-to-end security for the transmission of data between hosts on the network.
  • Design a strategy for securing access for non-Microsoft clients within a Windows 2000-based network.
  • Design a strategy for securing local resources accessed by remote users using dial-in or Virtual Private Network (VPN) technologies.
  • Design a strategy for securing local resources accessed by remote offices within a wide area network (WAN) environment.
  • Protect private network resources from public network users.
  • Design a strategy for securing private network user access to public networks.
  • Design a strategy for authenticating trusted users over public networks.
  • Design a strategy for securing data and application access for the private network when accessed by trusted partners.
  • Plan for an e-commerce implementation between your organization and external business partners that facilitates business communication.
  • Design a structured methodology for securing a Windows 2000 network

Содержание курса:

Модуль 1. Assessing Security Risks

What is at Risk
What are the Potential Threats to the Network
Describing Common Security Standards
Planning Enterprise Security

Модуль 2. Introducing the Windows 2000 Security Model

The role of Directory Services in the Security Framework

Identifying Authentication Methods Available Within Windows 2000 Networks

Controlling Access to Resources on Windows 2000 Networks

Introducing Encryption Technology

Encrypting Stored and Transmitted Data in Windows 2000 Networks

Introducing Public Key Infrastructure Technology

Модуль 3. Planning Administrative Access

Defining the Administrative Structure
Assigning Administrative Roles
Providing Administrative Access

Модуль 4. Planning User Accounts

Designing a Domain and Organizational Unit Structure

Planning Account Creation and Location

Planning Delegation of Authority

Designing an Audit Policy for Tracking Account Changes

Модуль 5. Securing Windows 2000-Based Computers

Evaluating the Security Requirements of Windows 2000-Based Systems
Securing Physical Access to Windows 2000-Based Systems
Designing Security Configuration Policies
Analysis of Security Configuration

Модуль 6. Securing File and Print Resources

Comparing the Security of Windows 2000 File Systems
Protecting Data Using Access Control Lists
Encrypting Data Using EFS
Auditing Resource Access
Securing Backup and Restore Procedures
Protecting Data From Viruses

Модуль 7. Securing Communication Channels on the Local Network

Demonstration: Investigating Web Access
Assessing Network Data Visibility Risks
Evaluating Network Authentication Methods
Protecting Network Data Transmission from Packet-Level Impersonation
Encrypting Network Data Transmissions with Internet Protocol Security (IPSec)

Модуль 8. Providing Secure Access to Non-Microsoft Clients

Demonstration: Investigating a TelNet Connection
Providing Secure Access to IP-Based Clients
Providing Secure Access to NetWare Clients
Providing Secure Access to Macintosh Clients

Модуль 9. Providing Secure Access to Remote Users

Planning Remote Access Security
Authentication and Accounting Providers
Planning Server-side Security for Remote Connectivity
Planning Client-side Security for Remote Connectivity

Модуль 10. Providing Secure Access to Remote Offices

Comparing Private and Public Networks
Securing WAN Links Over a Private Network
Securing WAN Links Over a Public Network

Модуль 11. Providing Secure Network Access to Internet Users

Potential Risks
Protecting Networks using Firewalls
Demonstration: Port Mapping Example
Protecting Resources Exposed on the Internet
Planning Placement of Servers in a Firewall Configuration

Модуль 12. Providing Secure Internet Access to Network Users

Analyzing Threats Introduced by an Internet Connection
Protecting Internet Network Addressing Schemes
Using Server-Side Configuration to Control Content Accessed by Network Users
Using Client-Side Configuration to Control Content Accessed by Network Users

Модуль 13. Extending the Network to Partner Organizations

Authenticating Partners Using Windows 2000 User Accounts
Authenticating Partners Using Trusted Domains
Authenticating Partners Using Internet Technologies
Planning Certificate-Based Authentication

Модуль 14. Designing a Public Key Infrastructure

Providing Secure Access Using Resource Permissions
Securing Access for Remote Partners
Providing Secure Partner Access to Data Using Terminal Services
Providing Secure Partner Access to Data Using Web Technologies
Providing Secure Partner Access to Data Using Messaging

Модуль 15. Developing a Security Plan

Planning for Business-to-Business Applications
Planning for Secure Business Communication Between Partners


  Спец. предложения|Обучение|Вебинары|Сертификация|Тестирование|О нас|Работа с сайтом|Новости|Поиск

  © Учебный центр "Звезды и С"
  Разработка: Metric
  Optimizer.ru   CyberPlat logo            
  Rambler's Top100 Rambler's Top100