Keystone Windows 2000 Design Network Security 英文光碟正式版 (4片裝) 軟體簡介: KeystoneWindows2000DesignNetworkSecurity英文光碟正式版(4片裝)(教學軟體) Keystone公司:Windows2000網路安全設計課程是屬於Windows2000的MCSE課 程之一#70-220,但是這也是在學習Windows2000或者應該說是所有的網路的學習 課程都應該重視的一門課程,因為在現在的網路安全已不像是之前的單一網路或是 區域網路了而網路與網路之間的傳遞或是溝通常常是為駭客開啟另一扇大門,所以 如何可以建構一套完整而且安全性高的網路環境是每一個學習網路架設或是管理甚 至是使用者都應該學習的重要課題之一,Keystone公司所推出的教育系列軟體一向 是學習電腦所不可以或缺的重要教學光碟,而這次所推出的教育光碟更是萬中選一 的重要教材之一,內容完整,彙集資料豐富,操作容易而所有的資料及習作更都是 由講師親自操作的哦!!是你所不可以放過的。 CourseDescription Afterusinghiscourseyouwillhavetheskillsrequiredtotoanalyzethe businessrequirementsforsecurityanddesignasecuritysolutionthatmeets businessrequirements. DetailedCourseOutlines: Level1 1.0IntroductiontoSecurity 1.1WhatisSecurity? 1.2WhatisaRisk? 1.3TypesofAttacks 1.4RiskAnalysis 1.5AcceptableLevelsofSecurity 2.0SecuringtheLocalNetwork 2.1BusinessNeeds 2.2DomainStructure&Trusts 2.3GroupPolicies 2.4Authentication 2.5ControllingAccess 2.6SecuringComputersResources&Communications 2.7Non-MicrosoftClients 3.0ControllingAdministrativeAccess 3.1AdministrativeAccess 3.2ControllingAccess 3.3UsingTerminalServices 3.4InstallingTerminalServices 4.0DesignIssuesforUserAccounts 4.1AccountPolicies 4.2GroupPolicyObject 4.3StrategiesforUserCreation 4.4DelegationofAuthority 4.5AuditingUserActions 5.0ComputerSecurity 5.1PhysicalSecurity Level2 1.0SecurityBaselines 1.1WhatisaBaseline? 1.2DeployingSecurityTemplates 2.0SecuringaFile&PrintEnvironment 2.1FileSystemSecurity&SharePermissions 2.2PrintResources 2.3SecuringtheRegistry 2.4SecuringDataThroughEFS 2.5SecuringtheBackup/RestoreProcess 2.6Viruses 3.0SecuringNetworkCommunications 3.1AssessingRisk 3.2CostofSecuringTransmissions 3.3ApplicationLayerSecurity 3.4ProtocolSecurity(IPSEC) 4.0SecuringAccessforNon-MicrosoftClients 4.1UNIXClients 4.2NetWareClients 4.3MacintoshClients 4.4NetworkServices Level3 1.0RemoteAccess 1.1Risks 1.2Authentication 1.3Protocols 1.4ProtectionTechniques 1.5RemoteAccessPolicies 1.6RemoteAccessModels 1.7NT4.0RASSever 1.8VirtualPrivateNetworks(VPN) 1.9RADIUSServer 1.10VPN&RADIUSExample 2.0SecuringAccesstoRemoteOffices 2.1ConnectionMethods 2.2SecurityattheRouter 2.3VPN's 2.4DesigningYourSolution 3.0SecuringIncomingInternetAccess 3.1Risks(inherittoInternetAccess) 3.2SecureNetworkDesignorFirewallDesigns 3.3FilteringRules 4.0SecuringAccesstotheInternet 4.1VirusProtection 4.2ModemControl 4.3NetworkAddressTranslation(NAT)Server 4.4ProtectingDNS 4.5LimitingAccesstoInternetServices 4.6UserTraining 4.7ProxyServer 4.8ManagingAccessthroughInternetExplorer Level4 1.0SecuringAccessfromExternalEntities 1.1WhatisanExtranet? 1.2SecurityMechanisms 1.3Applications 1.4ConnectionTypes 1.5ActiveDirectoryDesignIssues 2.0DesigningaPublicKeyInfrastructure 2.1WhatisaPKI? 2.2DeignProcessforaPKI 2.3CertificateTemplates 2.4CertificateLifeCycle 2.5CertificateAuthorities 2.6Installing&ConfiguringPKI 3.0DesigningaSecureEnvironment 3.17StepDesignProcess 3.2BuildingaPlanningTeam 3.3SecurityRequirements 3.4DefiningtheScopeofaProject 3.5BuildingaProjectTeam 3.6DevelopingaPlan 3.7Deployment 3.8Maintenance 4.0ADiscussionofBusiness 4.1TheGrandPlan 4.2Microsoft'sDefinitionofSecurity 4.3ManagingResourceAccess 4.4AuditingResourceAccess 4.5ProperAuthentication 4.6EncryptionofData 4.7UnderstandingBusinessProcess Keystone.Windows.2000.Design.Network.Security