CCED实用教程

副标题:无

作   者:周山芙 编

分类号:

ISBN:9787302015017

微信扫一扫,移动浏览光盘

简介

本书主要介绍了设计一个安全的Windows 2000网络的相关知识。其中,包括Active Directory的安全特性、管理权限的规划、用户账号及访问权限的设计和管理、Windows 2000计算机的安全设置、计算机资源的保护、通信安全以及公钥基础结构的设计等内容。本书的内容,既包括了对Windows 2000的网络安全性体系结构的详细介绍,还包括了着手设计一个满足需求的网络系统的阐述。学习本书可以很好的掌握Windows 2000安全网络的知识。 本书适用于计划参加相关的微软认证考试的人员使用。

目录

introduction

course materials

prerequisites

course outline

microsoft official curriculum

microsoft certified professional program

facilities


module 1: assessing security risks

identifying risks to data

identifying risks to services

identifying potential threats

introducing common security standards

planning network security

review


module 2: introducing windows 2000 security

introducing security features in active directory

authenticating user accounts

securing access to resources

.introducing encryption technologies

encrypting stored and transmitted data

introducing public key infrastructure technology

review


module 3: planning administrative access

determining the appropriate administrative model

designing administrative group strategies

planning local administrative access

planning remote administrative access

lab a: planning secure administrative access

review


module 4: planning user accounts

designing account policies and group policy

planning account creation and location

planning delegation of authority

auditing user account actions

lab a: planning a security-based ou structure

review


module 5: securing windows 2000-based computers

planning physical security for windows 2000-based computers

evaluating security requirements

designing security configuration templates

lab a: analyzing a security template

evaluating security configuration

deploying security configuration templates

lab b: designing customized security templates

review


module 6: securing file and print resources

examining windows 2000 file system security

protecting resources using dacls

encrypting data using efs

lab a: managing efs recovery keys

auditing restore access

securing backup and restore procedures

protecting data from viruses

lab b: planning data security

review


module 7: securing communication channels

assessing network data visibility risks

designing application-layer security

designing ip-layer security

deploying network traffic encryption

lab a: planning transmission security

review


module 8: providing secure access to non-microsoft clients

providing secure network access to unix clients

providing secure network access to netware clients

providing secure access to macintosh clients

securing network services in a heterogeneous network

monitoring for security breaches

lab a: securing telnet transmissions

review


module 9: providing secure access to remote users

identifying the risks of providing remote access

designing security for dial-up connections

designing security for vpn connections

centralizing remote access security settings

lab a: using radius authentication

review


module 10: providing secure access to remote offices

defining private and public networks

securing connections using routers

securing vpn connections between remote offices

identifying security requirements

lab a: planning secure connections for remote offices

review


module 11: providing secure network access to internet users

identifying potential risks from the internet

using firewalls to protect network resources

using screened subnets to protect network resources

securing public access to a screened subnet

lab a: designing a screened subnet

review


module 12: providing secure internet access to network users

protecting internal network resources

planning internet usage policies

managing internet access through proxy server configuration

managing internet access through client-side configuration

lab a: securing the internal network when accessing the internet

review


module 13: extending the network to partner organizations

providing access to partner organizations

securing applications used by partners

securing connections used by remote partners

structuring active directory to manage partner accounts

authenticating partners from trusted domains

lab a: planning partner connectivity

review


module 14: designing a public key infrastructure

introducing a public key infrastructure

using certificates

examining the certificate life cycle

choosing a certification authority

planning a certification authority hierarchy

mapping certificates to user accounts

managing ca maintenance strategies

lab a: using certificate-based authentication

review


module 15: developing a security plan

designing a security plan

defining security requirements

maintaining the security plan

lab a: developing a security plan

review


appendix a: ssl port assignments

appendix b: acceptable internet use policy

appendix c: internet explorer security settings

classroom setup guide

classroom requirements

classroom configuration

setup instructions

automated classroom setup

classroom setup checklist

customization information


已确认勘误

次印刷

页码 勘误内容 提交人 修订印次

CCED实用教程
    • 名称
    • 类型
    • 大小

    光盘服务联系方式: 020-38250260    客服QQ:4006604884

    意见反馈

    14:15

    关闭

    云图客服:

    尊敬的用户,您好!您有任何提议或者建议都可以在此提出来,我们会谦虚地接受任何意见。

    或者您是想咨询:

    用户发送的提问,这种方式就需要有位在线客服来回答用户的问题,这种 就属于对话式的,问题是这种提问是否需要用户登录才能提问

    Video Player
    ×
    Audio Player
    ×
    pdf Player
    ×
    Current View

    看过该图书的还喜欢

    some pictures

    解忧杂货店

    东野圭吾 (作者), 李盈春 (译者)

    loading icon