McsaMcse Training Kit Implementing And Administering Security In A Windows 1002000 Network [Electronic resources]

نسخه متنی -صفحه : 82/ 1
نمايش فراداده

Sitemap

Cover

LOC

About This Book

Intended Audience

Prerequisites

Reference Materials

About The CD-ROMs

Features of This Book

Chapter and Appendix Overview

Where to Find Specific Skills in This Book

Getting Started

Software Requirements

Setup Instructions

The Microsoft Certified Professional Program

Microsoft Certification Benefits

Technical Support

Evaluation Edition Software Support

Chapter 1: Group Policy

Lesson 1: Active Directory and Group Policy

Lesson 2: Configuring Group Policy

Lesson 3: Configuring Client Computer Security Policy

Lesson 4: Troubleshooting Group Policy Application

Lesson 5: Security Limitations

Chapter 2: User Accounts and Security Groups

Lesson 1: Creating Local User Accounts and Security Groups

Lesson 2: Working with Active Directory Domain Accounts and Security Groups

Chapter 3: Restricting Accounts, Users, and Groups

Lesson 1: Understanding Account Policies

Lesson 2: Managing User Rights

Lesson 3: Controlling Access Through Restricted Groups

Lesson 4: Administering Security Templates

Chapter 4: Account-Based Security

Lesson 1: Managing File System Permissions

Lesson 2: Implementing Share Service Security

Lesson 3: Using Audit Policies

Lesson 4: Including Registry Security

Chapter 5: Certificate Authorities

Lesson 1: Understanding Certificates

Lesson 2: Installing Windows 2000 Certificate Services

Lesson 3: Maintaining Certificate Authorities

Chapter 6: Managing a Public Key Infrastructure

Lesson 1: Working with Computer Certificates

Lesson 2: Deploying User Certificates

Lesson 3: Using Smart Card Certificates

Lesson 4: Deploying S/MIME Certificates

Chapter 7: Increasing Authentication Security

Lesson 1: Supporting Earlier Versions of Windows Clients

Lesson 2: Supporting Macintosh Clients

Lesson 3: Trust Relationships

Chapter 8: IP Security

Lesson 1: Configuring IPSec Within a Domain

Lesson 2: Configuring IPSec Between Untrusted Networks

Lesson 3: Configuring IPSec on Internet Servers

Lesson 4: Troubleshooting IPSec Configuration

Chapter 9: Remote Access and VPN

Lesson 1: Securing RRAS Servers

Lesson 2: Managing RRAS Authentication

Lesson 3: Securing Remote Clients

Lesson 4: Securing Communications Using a VPN

Chapter 10: Wireless Security

Lesson 1: Setting Up a Wireless Network

Lesson 2: Securing Wireless Networks

Lesson 3: Configuring Clients for Wireless Security

Chapter 11: Public Application Server Security

Lesson 1: Providing Internet Security

Lesson 2: Configuring Microsoft SQL Server for Internet Security

Lesson 3: Securing Microsoft Exchange Server for the Internet

Chapter 12: Web Service Security

Lesson 1: Securing Public Web Servers

Lesson 2: Web Authentication

Lesson 3: Using Secure Sockets Layer

Chapter 13: Intrusion Detection and Event Monitoring

Lesson 1: Establishing Intrusion Detection for Public Servers

Lesson 2: Event Monitoring in the Private Network

Chapter 14: Software Maintenance

Lesson 1: Working with Service Packs and Hotfixes

Lesson 2: Automating Updates with Microsoft Software Update Services

Lesson 3: Deploying Updates in the Enterprise

Appendix: Questions and Answers

Glossary

About This eBook