Muutke küpsiste eelistusi

70-220: MCSE Guide to Designing Microsoft Windows 2000 Security [Multiple-component retail product]

  • Formaat: Multiple-component retail product, 440 pages, kõrgus x laius x paksus: 234x188x30 mm, kaal: 885 g, Illustrations, Contains 1 Paperback / softback and 1 CD-ROM
  • Ilmumisaeg: 29-Jan-2002
  • Kirjastus: Course Technology Inc
  • ISBN-10: 0619016884
  • ISBN-13: 9780619016883
Teised raamatud teemal:
  • Multiple-component retail product
  • Hind: 124,74 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Multiple-component retail product, 440 pages, kõrgus x laius x paksus: 234x188x30 mm, kaal: 885 g, Illustrations, Contains 1 Paperback / softback and 1 CD-ROM
  • Ilmumisaeg: 29-Jan-2002
  • Kirjastus: Course Technology Inc
  • ISBN-10: 0619016884
  • ISBN-13: 9780619016883
Teised raamatud teemal:
Designed to provide students and network administrators with the knowledge they need to design and implement an effective security strategy in a network environment, this guide book prepares individuals for the MCSE certification exam #70-220 Designing Security for a Windows Microsoft 2000 Network.

Provides the knowledge needed to design and implement an effective security strategy in a network environment and prepare individuals for the MCSE certification exam #70-220 Designing Security for a Windows Microsoft 2000 Network.
Preface xi
Identifying Security Risks
1(20)
Internal Security Risks
2(6)
Access to Information
3(1)
Access to Network Traffic
4(1)
Access to Administrative Rights
5(1)
Access to Network Services
6(2)
External Security Risks
8(3)
Access to the Internal Network
8(2)
Sending Information on Public Networks
10(1)
Managing Security Risks
11(1)
Chapter Summary
12(1)
Key Terms
13(1)
Review Questions
13(4)
Setup For Hands-on Projects
17(1)
Hands-on Projects
18(1)
Case Projects
19(2)
Corporate Components to Security Planning
21(36)
Identifying Business Models
22(14)
Ownership and Control
23(3)
Products and Services
26(2)
Business Processes
28(3)
Corporate Geographic Scope
31(1)
Corporate Management Model
32(3)
Relationships with Other Organizations
35(1)
Identifying Corporate Strategies and Goals
36(3)
Corporate Vision and Goals
36(1)
Growth Strategies
37(1)
Integration with IT
38(1)
Identifying IT Administrative Structures
39(1)
Identifying the Current Technical Environment
40(8)
Corporate Locations
41(1)
Networking Infrastructure
42(2)
Networking Services
44(1)
Network Administration
45(1)
Configuration Change Management
46(1)
Client Requirements
46(2)
Identifying the Current Security Model
48(2)
Physical Security
48(1)
Network Security
49(1)
Chapter Summary
50(1)
Review Questions
51(3)
Hands-on Projects
54(2)
Case Projects
56(1)
Securing Resources on Windows 2000 Servers
57(52)
Implementing User Authentication
58(7)
Kerberos v5 Authentication
59(3)
NTLM Authentication
62(1)
Down-level Client Authentication
63(1)
Certificate-based Authentication
63(2)
Remote Access Authentication
65(1)
Accessing Resources
65(5)
Security Principals
66(1)
Access Tokens
66(1)
Access Control Lists
67(3)
Securing File Resources
70(8)
Share Permissions
70(4)
NTFS Permissions
74(3)
Combining Share and NTFS Permissions
77(1)
Encrypting File System
78(3)
The File Encryption Process
79(1)
Implementing EFS
79(1)
Managing Data Recovery
80(1)
Securing Printers
81(1)
Setting Printer Security
81(1)
Securing The Registry
82(4)
Default Registry Settings
85(1)
Configuring an Audit Policy
86(7)
Managing Event Logs
89(4)
Planning Best Practices
93(2)
Chapter Summary
95(1)
Key Terms
95(2)
Review Questions
97(5)
Setup for Hands-on Projects
102(1)
Hands-on Projects
102(5)
Case Projects
107(2)
Designing Active Directory for Security
109(60)
Active Directory Components
110(6)
Active Directory Domains
111(1)
Active Directory Trees
111(1)
Active Directory Forests
112(1)
Organizational Units
113(1)
Sites
114(1)
Domain and Forest Design---Security Planning Implications
115(1)
Securing Active Directory
116(9)
Security Templates
117(8)
Managing Account Policies
125(3)
Password Policy
125(1)
Account Lockout Policy
126(1)
Kerberos Policy
127(1)
Account Policies Security Implications
127(1)
Delegating Administrative Tasks
128(11)
Permission Inheritance
129(1)
Managing Delegation
130(7)
Designing Active Directory for Delegation
137(2)
Implementing Security Groups
139(5)
Group Types and Scopes
139(1)
Default and Built-in Groups
140(3)
Managing Security Groups
143(1)
Implementing Group Policies for Security
144(11)
Group Policy Overview
144(3)
Managing Group Policies
147(8)
Planning Best Practices
155(1)
Chapter Summary
155(1)
Key Terms
156(1)
Review Questions
157(4)
Hands-on Projects
161(6)
Case Projects
167(2)
Implementing a Public Key Infrastructure
169(50)
Public Key Infrastructure (PKI) Overview
170(12)
Public and Private Keys
170(4)
Certificate Authorities
174(3)
Application Support
177(5)
Planning and Implementing a Public Key Infrastructure
182(6)
Designing the Certificate Server Hierarchy
182(2)
Planning the Certificate Server Type
184(2)
Identifying Client Certificate Needs
186(2)
Windows 2000 Certificate Server Implementation
188(11)
Installing Certificate Servers
188(3)
Configuring Servers to Use Certificates
191(5)
Managing Certification Requests
196(1)
Managing Certification Revocations
197(2)
Mapping User Accounts to Certificates
199(2)
Certificate Server Client Implementation
201(4)
Integration with Third-Party CAs
205(2)
Choosing a Third-Party PKI Solution
206(1)
Integrating Windows 2000 PKI and a Third-Party PKI
207(1)
Planning Best Practices
207(1)
Chapter Summary
208(1)
Key Terms
209(1)
Review Questions
210(4)
Hands-on Projects
214(3)
Case Projects
217(2)
Securing Network Services
219(46)
Implementing DNS and DHCP Security
220(11)
DNS Zones in Windows 2000
221(3)
DNS and DHCP Integration Concepts
224(2)
Securing Dynamic Updates to DNS
226(5)
Implementing Remote Installation Services Security
231(7)
RIS Requirements
232(1)
Configuring RIS
232(1)
Installing Windows 2000 Professional Clients Using RIS
233(1)
Securing Remote Installation Services
234(4)
Implementing Terminal Server Security
238(6)
Securing Terminal Services
241(3)
Implementing SNMP Security
244(3)
Securing Community Memberships
245(1)
Authorizing Management Stations
246(1)
Securing SNMP Transmissions
247(1)
Securing Servers Using Security Templates
247(3)
Default Security Settings
248(2)
Implementing Secure Access for NonMicrosoft Clients
250(4)
Securing Network Access to UNIX Clients
251(1)
Securing Network Access to Netware Clients
252(1)
Securing Network Access to Macintosh Clients
253(1)
Planning Best Practices
254(1)
Chapter Summary
255(1)
Key Terms
256(2)
Review Questions
258(3)
Hands-on Projects
261(2)
Case Projects
263(2)
Securing Network Communications
265(30)
Implementing Server Message Block Signing
266(5)
Configuring SMB Security
266(5)
Securing Network Traffic Using IP Security
271(16)
Authentication Header Protocol
272(2)
Encapsulating Security Payload
274(1)
IPSec Modes
275(2)
IPSec with Windows 2000
277(1)
IPSec Policy Configuration
278(5)
IPSec Policy Creation
283(1)
IPSec Deployment
284(3)
Planning Best Practices
287(1)
Chapter Summary
288(1)
Key Terms
288(1)
Review Questions
289(3)
Hands-on Projects
292(2)
Case Projects
294(1)
Securing Access For Remote Access Users
295(46)
Implementing and Configuring Routing and Remote Access
296(12)
Configuring a Dial-up Server
296(4)
Configuring Remote Access Clients
300(2)
Implementing Virtual Private Network Access
302(3)
VPN Server Configuration
305(2)
VPN Client Configuration
307(1)
Securing Remote Access
308(8)
Configuring Remote Access Authentication
308(4)
Configuring Callback Options
312(2)
Remote Access Account Lockout
314(1)
User Education
315(1)
Remote Access Policies
316(7)
Remote Access Policy Concepts
317(1)
Configuring Remote Access Policies
318(4)
Planning for Remote Access Policies
322(1)
Internet Authentication Server
323(7)
Introduction to Remote Authentication Dial-in User Service (RADIUS)
323(3)
Implementing IAS as a RADIUS Server
326(4)
Planning Best Practices
330(1)
Chapter Summary
330(1)
Key Terms
331(1)
Review Questions
332(4)
Hands-on Projects
336(3)
Case Projects
339(2)
Securing Access Between Corporate Locations
341(36)
Security Risks for Data Between Corporate Locations
342(3)
Configuring Windows 2000 as a Router
345(15)
Configuring Routing Options
345(12)
Securing the Windows 2000 Router
357(3)
Configuring and Securing Virtual Private Networks
360(5)
VPN Tunneling Protocol Options
361(4)
Configuring Secure Access to Partner Organizations
365(3)
Securing Data Transmissions
365(1)
Securing Resource Access to the Company Network
366(2)
Planning Best Practices
368(1)
Chapter Summary
368(1)
Key Terms
369(1)
Review Questions
370(3)
Hands-on Projects
373(2)
Case Projects
375(2)
Designing Secure Access to the Internet
377(36)
Securing the Internal Network from the Internet
378(15)
Network Address Translation
380(5)
Configuring Firewalls
385(5)
Implementing Demilitarized Zones
390(3)
Securing User Access to the Internet
393(9)
Implementing Proxy Services
394(2)
Configuring Internet Clients
396(6)
Planning Best Practices
402(1)
Chapter Summary
403(1)
Key Terms
404(1)
Review Questions
405(3)
Hands-on Projects
408(3)
Case Projects
411(2)
APPENDIX A Exam Objectives for MCSE Certification Exam νm;70-220: Designing Security for a Microsoft Windows 2000 Network
413(6)
Analyzing Business Requirements
413(1)
Analyzing Technical Requirements
414(1)
Analyzing Security Requirements
415(1)
Designing a Windows 2000 Security Solution
415(1)
Designing a Security Solution for Access Between Networks
416(1)
Designing Security for Communication Channels
417(2)
Glossary 419(8)
Index 427