Articoli correlati a McSa/McSe Self-Paced Training Kit Exam 70-214: Implementing...

McSa/McSe Self-Paced Training Kit Exam 70-214: Implementing and Administering in a Microsoft Windows 2000 Network - Rilegato

 
9780735618787: McSa/McSe Self-Paced Training Kit Exam 70-214: Implementing and Administering in a Microsoft Windows 2000 Network
Vedi tutte le copie di questo ISBN:
 
 
Learn how to implement security services for a Windows® 2000 network—and prepare for the Microsoft® Certified Professional (MCP) Exam—with this official Microsoft study guide. Work at your own pace through the lessons and hands-on exercises. And use the testing tool on CD to measure what you know and where to focus your studies—before taking the actual exam. As you develop the real-world expertise needed to help manage network security, you’re also preparing for MCP Exam 70-214—an elective for MCSA or MCSE certification. BUILD THE SKILLS TO: · Help secure client computers with file system permissions, Group Policy, and other baseline security measures · Configure IPSec and SSL to help protect communication channels for both private and public servers · Manage user and network authentication, certificates, and public key encryption · Implement security measures for RAS, VPNs, and wireless networks · Help protect Microsoft Internet Information Services, Microsoft Exchange Server, and Microsoft SQL Server™ from unauthorized access · Maintain software integrity with service packs, security updates, and hot fixes · Monitor events, detect network intrusions, and implement prevention and recovery measures YOUR KIT INCLUDES: · Comprehensive self-paced study guide that maps to MCP exam goals and objectives · Learn-by-doing exercises for skills you can apply to the job · Lesson summaries and review questions, including a complete Q&A summary · Testing tool that generates realistic practice exams with automated scoring and explanations for both correct and incorrect answers · 120-day evaluation version of Windows 2000 Server · Fully searchable eBook version of the study guide 

Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.

L'autore:

Developed by senior editors and content managers at Microsoft Corporation.

Contenuti:
Book xv
CHAPTER 1 Group Policy 1
About This Chapter 1
Before You Begin 2
Lesson 1: Active Directory and Group Policy 3
Understanding Active Directory Structures 3
Practice: Designing an Active Directory Hierarchy 5
Lesson Review 7
Lesson Summary 7
Lesson 2: Configuring Group Policy 8
Understanding Group Policy 8
Managing Group Policy 13
Practice: Managing Group Policy 16
Lesson Review 26
Lesson Summary 26
Lesson 3: Configuring Client Computer Security Policy 27
Using Client-Side Group Policy Configuration 27
Configuring Group Policy by Type of Worker 28
Configuring Internet Explorer Using Group Policy 29
Practice: Configuring Group Policy for Clients 31
Lesson Review 43
Lesson Summary 44
Lesson 4: Troubleshooting Group Policy Application 45
Understanding Typical Group Policy Application Problems 45
Understanding Windows NT 4 Domain Migration Issues 47
Anticipating Problems Relating to Windows NT 4 Trust Relationships 48
Practice: Troubleshooting the Application of Group Policy 48
Lesson Review 51
Lesson Summary 51
Lesson 5: Security Limitations 52
Understanding the Role of Group Policy in Network Security 52
Practice: Circumventing the Security Limitations of Group Policy 53
Lesson Review 55
Lesson Summary 55
CHAPTER 2 User Accounts and Security Groups 57
About This Chapter 57
Before You Begin 58
Lesson 1: Creating Local User Accounts and Security Groups 59
Managing User Accounts 59
Managing Security Groups 62
Authenticating a User on a Local Computer 64
Practice: Creating User Accounts and Security Groups 69
Lesson Review 72
Lesson Summary 73
Lesson 2: Working with Active Directory Domain Accounts and Security Groups 74
Working with Domains 74
Authenticating Domain User Accounts 75
Using Domain Security Groups Effectively 81
Practice: Creating User Accounts and Security Groups 85
Lesson Review 89
Lesson Summary 90
CHAPTER 3 Restricting Accounts, Users, and Groups 91
About This Chapter 91
Before You Begin 92
Lesson 1: Understanding Account Policies 93
Applying Account Policies 93
What Are the Account Policy Settings? 94
Practice: Configuring Account Policies 100
Lesson Review 103
Lesson Summary 103
Lesson 2: Managing User Rights 104
Assigning User Rights 104
Practice: Modifying User Rights 105
Lesson Review 108
Lesson Summary 108
Lesson 3: Controlling Access Through Restricted Groups 109
Applying Restricted Group Settings 109
Practice: Creating a Restricted Group 110
Lesson Review 112
Lesson Summary 112
Lesson 4: Administering Security Templates 113
Understanding the Purpose of Security Templates 114
Why Use Predefined Security Templates? 115
Managing Security Templates 116
Practice: Managing Security Templates 118
Lesson Review 129
Lesson Summary 130
CHAPTER 4 Account-Based Security 131
About This Chapter 131
Before You Begin 132
Lesson 1: Managing File System Permissions 133
Managing Permissions-Based Security 133
Establishing Permissions Best Practices 140
Troubleshooting Permissions Problems 142
Practice: Securing Files and Folders 144
Lesson Review 151
Lesson Summary 151
Lesson 2: Implementing Share Service Security 153
Understanding Share Security 153
Managing Shares and Share Security 155
Share Security Best Practices 156
Practice: Applying Shares and Share Permissions 156
Lesson Review 160
Lesson Summary 160
Lesson 3: Using Audit Policies 161
Which Security Mechanisms Are Used in Auditing? 161
Managing Auditing 163
Practice: Enabling Auditing 165
Lesson Review 170
Lesson Summary 171
Lesson 4: Including Registry Security 172
Why Use Registry Security? 172
Editing the Registry 173
Practice: Exploring the Registry 174
Lesson Review 176
Lesson Summary 176
CHAPTER 5 Certificate Authorities 177
About This Chapter 177
Before You Begin 177
Lesson 1: Understanding Certificates 178
How Encryption Works 178
Verifying Identities with Digital Signatures 180
Combining Encryption and Certificates 181
Lesson Review 187
Lesson Summary 188
Lesson 2: Installing Windows 2000 Certificate Services 189
Installing Certificate Authorities 189
Best Practices 194
Practice: Establishing a CA Hierarchy 195
Lesson Review 201
Lesson Summary 201
Lesson 3: Maintaining Certificate Authorities 202
Revoking Certificates 202
Issuing Certificates 203
Backing Up and Restoring CAs 203
Practice: Managing CAs 206
Lesson Review 211
Lesson Summary 211
CHAPTER 6 Managing a Public Key Infrastructure 213
About This Chapter 213
Before You Begin 213
Lesson 1: Working with Computer Certificates 214
Understanding the Purpose of Computer Certificates 214
Identifying How a Certificate Is Used 214
Using Certificate Templates 215
Deploying Computer Certificates 216
Practice: Using Two Methods to Deploy Computer Certificates 218
Lesson Review 223
Lesson Summary 223
Lesson 2: Deploying User Certificates 224
Deploying Certificates to Users 224
Moving Certificates 227
Practice: Deploying and Moving Certificates 229
Lesson Review 235
Lesson Summary 236
Lesson 3: Using Smart Card Certificates 237
Using Smart Cards 237
Issuing Smart Cards 239
Modifying the Smart Card Removal Behavior Policy 241
Troubleshooting Smart Card Enrollment 243
Practice: Deploying a Smart Card 244
Lesson Review 251
Lesson Summary 252
Lesson 4: Deploying S/MIME Certificates 253
How S/MIME Certificates Are Used 253
Troubleshooting S/MIME Deployment 254
Practice: Sending Digitally Signed Email 254
Lesson Review 258
Lesson Summary 258
CHAPTER 7 Increasing Authentication Security 259
About This Chapter 259
Before You Begin 259
Lesson 1: Supporting Earlier Versions of Windows Clients 260
Authentication Basics 260
Windows 2000 Network Authentication 261
Creating a Secure Environment 263
Practice: Enabling a Secure Mixed-Client Environment 264
Lesson Review 268
Lesson Summary 268
Lesson 2: Supporting Macintosh Clients 269
Supporting Macintosh Computers Securely 269
Practice: Enabling Macintosh Clients to Access Windows 2000 Servers 270
Lesson Review 277
Lesson Summary 278
Lesson 3: Trust Relationships 279
Understanding Trust Relationships 279
Managing External Trust Relationships 280
Practice: Creating an External Trust Relationship 280
Lesson Review 284
Lesson Summary 285
CHAPTER 8 IP Security 287
About This Chapter 287
Before You Begin 288
Lesson 1: Configuring IPSec Within a Domain 289
Understanding the IPSec Basics 289
IPSec in Windows 2000 291
Distributing IKE Secret Keys 292
IPSec Within a Private Network 292
Determining IP Security Method by Server Role 292
Practice: Enabling IPSec Between Domain Members 294
Lesson Review 301
Lesson Summary 302
Lesson 2: Configuring IPSec Between Untrusted Networks 303
Providing a Secret Key 303
What Are the IPSec Exceptions? 305
Practice: Creating a Simple Encrypted Tunnel Between Domains 305
Lesson R...

Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.

  • EditoreMicrosoft Pr
  • Data di pubblicazione2003
  • ISBN 10 073561878X
  • ISBN 13 9780735618787
  • RilegaturaCopertina rigida
  • Numero edizione1
  • Numero di pagine700
  • RedattoreStrebe Matthew

Compra usato

Condizioni: buono
Ship within 24hrs. Satisfaction... Scopri di più su questo articolo

Spese di spedizione: GRATIS
In U.S.A.

Destinazione, tempi e costi

Aggiungere al carrello

Altre edizioni note dello stesso titolo

9788120322813: Mcsa/mcse Self Paced Training Kit Exam: 70-214 -implementing And Administering Security In A Microsoft® Windows® 2000 Network

Edizione in evidenza

ISBN 10:  8120322819 ISBN 13:  9788120322813
Casa editrice: Prentice Hall India, 2003
Brossura

I migliori risultati di ricerca su AbeBooks

Foto dell'editore

Corporation, Microsoft, Strebe, Matthew
ISBN 10: 073561878X ISBN 13: 9780735618787
Antico o usato Rilegato Quantità: 1
Da:
BooksRun
(Philadelphia, PA, U.S.A.)
Valutazione libreria

Descrizione libro Hardcover. Condizione: Good. Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported. Codice articolo 073561878X-11-1

Informazioni sul venditore | Contatta il venditore

Compra usato
EUR 8,88
Convertire valuta

Aggiungere al carrello

Spese di spedizione: GRATIS
In U.S.A.
Destinazione, tempi e costi
Foto dell'editore

Strebe, Matthew
Editore: Microsoft Press (2003)
ISBN 10: 073561878X ISBN 13: 9780735618787
Antico o usato Paperback Quantità: 1
Da:
WorldofBooks
(Goring-By-Sea, WS, Regno Unito)
Valutazione libreria

Descrizione libro Paperback. Condizione: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Codice articolo GOR002225357

Informazioni sul venditore | Contatta il venditore

Compra usato
EUR 6,45
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 5,63
Da: Regno Unito a: U.S.A.
Destinazione, tempi e costi
Foto dell'editore

Corporation, Microsoft; Strebe, Matthew
Editore: Microsoft Press (2003)
ISBN 10: 073561878X ISBN 13: 9780735618787
Antico o usato Rilegato Quantità: 1
Da:
Irish Booksellers
(Portland, ME, U.S.A.)
Valutazione libreria

Descrizione libro Condizione: Good. SHIPS FROM USA. Used books have different signs of use and do not include supplemental materials such as CDs, Dvds, Access Codes, charts or any other extra material. All used books might have various degrees of writing, highliting and wear and tear and possibly be an ex-library with the usual stickers and stamps. Dust Jackets are not guaranteed and when still present, they will have various degrees of tear and damage. All images are Stock Photos, not of the actual item. book. Codice articolo 6-073561878x-G

Informazioni sul venditore | Contatta il venditore

Compra usato
EUR 15,35
Convertire valuta

Aggiungere al carrello

Spese di spedizione: GRATIS
In U.S.A.
Destinazione, tempi e costi
Foto dell'editore

Corporation, Microsoft; Strebe, Matthew
Editore: Microsoft Press (2003)
ISBN 10: 073561878X ISBN 13: 9780735618787
Antico o usato Rilegato Quantità: 1
Da:
OM Books
(Sevilla, SE, Spagna)
Valutazione libreria

Descrizione libro Condizione: usado- bueno. Codice articolo 9780735618787

Informazioni sul venditore | Contatta il venditore

Compra usato
EUR 490,00
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 35,99
Da: Spagna a: U.S.A.
Destinazione, tempi e costi