Flylib.com
MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network: Study Guide and DVD Training System (Exam 70-214)
MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network: Study Guide and DVD Training System (Exam 70-214)
ISBN: 1931836841
EAN: 2147483647
Year: 2003
Pages: 162
Authors:
Will Schmied
,
Thomas W. Shinder
BUY ON AMAZON
Table of Contents
BackCover
MCSEMCSA Implementing Administering Security in a Windows 2000 Network Study Guide (Exam 70-214)
Foreword
The Path to MCSA and MCSE
Your Exam Day Experience
Final Thoughts
Part I: Implementing, Managing, and Troubleshooting Baseline Security
Chapter 1: Basic Windows 2000 Security: Using Security Templates
Windows 2000 Active Directory Review
The Basic Windows 2000 Security Tools
Exam 70-124: Objective 1.1: Configuring Basic Windows 2000 Security with Templates
Exam 70-124: Objective 1.2: Deploying Security Templates
Exam 70-124: Objective 1.2: Analyzing Your Security Configuration
Summary of Exam Objectives
Exam Objectives Fast Track
Exam Objectives Frequently Asked Questions
Self Test
Chapter 2: Advanced Security Template and Group Policy Issues
Exam 70-124: Objective 1.4: Configuring Role-Based Server Security
Exam 70-124: Objective 1.5: Creating Secure Workstations
Exam 70-124: Objective 1.3: Security Template Application Issues
Exam 70-124: Objective 3.4: Securing Server Message Block Traffic
Summary of Exam Objectives
Exam Objectives Fast Track
Exam Objectives Frequently Asked Questions
Self Test
Part II: Implementing, Managing, and Troubleshooting Service Packs and Security Updates
Chapter 3: Identifying, Installing, and Troubleshooting Required Updates
Exam 70-124: Objective 2.1: Identifying Required Updates
Exam 70-124: Objective 2.2, 2.3: Deploying and Managing Updates
Exam 70-124: Objective 2.4: Troubleshooting Update Installations
Summary of Exam Objectives
Exam Objectives Fast Track
Exam Objectives Frequently Asked Questions
Self Test
Part III: Implementing and Managing a Public Key Infrastructure (PKI) and Encrypting File System (EFS)
Chapter 4: Installing, Configuring, Managing Windows 2000 Certificate Authorities
Cryptography and You: What is it All About?
Exam 70-124: Objective 3.1.4: Certificate Authorities
Exam 70-124: Objective 5.1, 5.1.1, 5.2: Installing and Managing Windows 2000 Certificate Authorities
Exam 70-124: Objective 5.3: Advanced Certificate Management Issues
Summary of Exam Objectives
Exam Objectives Fast Track
Exam Objectives Frequently Asked Questions
Self Test
Chapter 5: Managing and Troubleshooting the Encrypting File System
The Role of EFS in a Network Security Plan
Using the Encrypting File System
Exam 70-124: Objective 5.4: User Operations
Exam 70-124: Objective 5.4: EFS Architecture and Troubleshooting
Summary of Exam Objectives
Exam Objectives Fast Track
Exam Objectives Frequently Asked Questions
Self Test
Part IV: Implementing, Managing, and Troubleshooting Secure Communication Channels
Chapter 6: Configuring and Troubleshooting Windows IP Security
The Need for Network Security
IP Security Overview
IP Security Management Tools
Exam 70-124: Objective 3.1, 3.1.1, 3.2: Deploying and Troubleshooting Windows IP Security
Summary of Exam Objectives
Exam Objectives Fast Track
Exam Objectives Frequently Asked Questions
Self Test
Chapter 7: Implementing Secure Wireless Networks
Exam 70-124: Objective 3.3: Wireless LAN Security Issues
Exam 70-124: Objective 3.3.1, 3.3.3: Configuring Windows Client Computers for Wireless LAN Security
Summary of Exam Objectives
Exam Objectives Fast Track
Exam Objectives Frequently Asked Questions
Self Test
Part V: Configuring, Managing, and Troubleshooting Authentication and Remote Access Security
Chapter 8: Configuring Secure Network and Internet Authentication Methods
Network Authentication in Windows 2000
Kerberos Overview
Kerberos in Windows 2000
Exam 70-124: Objective 4.1.4: Configuring Kerberos Trusts
Exam 70-124: Objective 4.1, 4.1.1: Configuring User Authentication
Exam 70-124: Objective 4.1.5, 4.2: Configuring Web Authentication
Summary of Exam Objectives
Exam Objectives Fast Track
Exam Objectives Frequently Asked Questions
Self Test
Chapter 9: Configuring and Troubleshooting Remote Access and VPN Authentication
Exam 70-124: Objective 4.3: Remote Access Authentication Methods
Exam 70-124: Objective 4.4: Configuring a Remote Access Server
Exam 70-124: Objective 4.4: Configuring a Virtual Private Networking Server
Exam 70-124: Objective 4.3, 4.4: Configuring Network Clients for Secure Remote Access
Troubleshooting Remote Access Problems
Summary of Exam Objectives
Exam Objectives Fast Track
Exam Objectives Frequently Asked Questions
Self Test
Part VI: Monitoring and Responding to Security Incidents
Chapter 10: Configuring and Using Auditing and the Event Logs
Auditing for Increased Security
Exam 70-124: Objective 6.1: Auditing Windows 2000
Exam 70-124: Objective 6.1, 6.1.1, 6.2: Auditing Best Practices
Exam 70-124: Objective 6.1: Auditing Internet Information Services
Exam 70-124: Objective 6.1.2: Windows Auditing Tools
Summary of Exam Objectives
Exam Objectives Fast Track
Exam Objectives Frequently Asked Questions
Self Test
Chapter 11: Responding to and Recovering from Security Breaches
Exam 70-124: Objective 6.3: Security Incidents
Exam 70-124: Objective 6.3: Malware Issues
Exam 70-124: Objective 6.3, 6.3.2, 6.3.3: Incident Response
Forensics
Summary of Exam Objectives
Exam Objectives Fast Track
Exam Objectives Frequently Asked Questions
Self Test
Part VII: Appendixes
Appendix A: Utilities for the White Hat
Introduction
White Hat Vulnerability Testing
White Hat Protection Tools
Summary
Appendix B: Port Numbers and Associated Attacks
Port Numbers
Appendix C: Self Test Questions, Answers, and Explanations
Chapter 2: Advanced Security Template and Group Policy Issues
Chapter 3: Identifying, Installing, and Troubleshooting Required Updates
Chapter 4: Installing, Configuring, and Managing Windows 2000 Certificate Authorities
Chapter 5: Managing and Troubleshooting the Encrypting File System
Chapter 6: Configuring and Troubleshooting Windows IP Security
Chapter 7: Implementing Secure Wireless Networks
Chapter 8: Configuring Secure Network and Internet Authentication Methods
Chapter 9: Configuring and Troubleshooting Remote Access and Virtual Private Networking Authentication
Chapter 10: Configuring and Using Auditing and the Event Logs
Chapter 11: Responding to and Recovering from Security Breaches
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Figures
List of Tables
List of Exercises
List of Sidebars
MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network: Study Guide and DVD Training System (Exam 70-214)
ISBN: 1931836841
EAN: 2147483647
Year: 2003
Pages: 162
Authors:
Will Schmied
,
Thomas W. Shinder
BUY ON AMAZON
Strategies for Information Technology Governance
Structures, Processes and Relational Mechanisms for IT Governance
Integration Strategies and Tactics for Information Technology Governance
An Emerging Strategy for E-Business IT Governance
Measuring and Managing E-Business Initiatives Through the Balanced Scorecard
Governing Information Technology Through COBIT
Metrics and Models in Software Quality Engineering (2nd Edition)
Measurement Errors
Defect Removal Effectiveness and Process Maturity Level
Code Integration Pattern
Possible Metrics for Acceptance Testing to Evaluate Vendor-Developed Software
Conducting Software Project Assessments
SQL Tips & Techniques (Miscellaneous)
Using SQL Data Definition Language (DDL) to Create Data Tables and Other Database Objects
Performing Multiple-table Queries and Creating SQL Data Views
Working with Comparison Predicates and Grouped Queries
Retrieving and Manipulating Data Through Cursors
Writing Advanced Queries and Subqueries
Mastering Delphi 7
The Delphi Programming Language
The Run-Time Library
Delphis Database Architecture
The Microsoft .NET Architecture from the Delphi Perspective
Appendix A Extra Delphi Tools by the Author
802.11 Wireless Networks: The Definitive Guide, Second Edition
The Original Direct Sequence PHY
TGnSync
Using 802.11 on Windows
Using 802.11 on Linux
11 Performance Calculations
Special Edition Using FileMaker 8
Working with Custom Menus
Working with Table View
Window Management Techniques
Troubleshooting
Exporting Grouped Data
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies