Designing a Secure Microsoft Windows 2000 Network =Microsoft Windows 2000 网络安全设计 /

副标题:无

作   者:微软公司 著

分类号:

ISBN:9787900056801

微信扫一扫,移动浏览光盘

简介

本书详细讨论了Microsoft Windows 2000及其安全性设计的基本知识、并通过具体实验培养读者的动手能力。全书由15个单元和3个附录组成。本书含光盘。

目录


Contents
lntrod uction
InstructOr Notes
Introduction
Course Materials
Prerequisites
Course Outline
Course Outline continued
Course Outline continued
Course Outline continued
Course Outline continued
Microsoft Official Curriculum
Microsoft Certified Professional Program
Facilities
Module 1: Assessing Security Risks
Instructor Notes
Overview
Identifying Risks to Data
Identifying Risks to Services
Identifying Potential Threats
Introducing Common Security Standards
Planning Network Security
Review
ModuIe 2:lntroducing Windows 2000 Security
Instructor Notes
Overview
Introducing Security Features in Active Directory
Authenticating User Accounts
Securing Access to Resources
Introducing Encryption Technologies
Encrypting Stored and Transndtted Data
Introducing Public Key Infrastructure Technology
Review
ModuIe 3: Planning Administrative Access
Instructor Notes
Overview
Detendning the Appropriate Adndnistrative Model
Designing Adndnistrative Group Strategies
Planning Local Adndnistrative Access
Planning Remote AdIninistrative Access
Lab A: Planning Secure Adndnistrative Access
Review
Module 4: Planning User Accounts
Instructor Notes
Overview
Designing Account Policies and Group Policy
Planning Account Creation and Location
Planning Delegation of Authority
Auditing User Account Actions
Lab A Planning a Securitybased OU Structure
Review
Module 5: Secuing Windows 2000based Computers
Instructor Notes
Overview
Planning Physical Security fOr Windows 2000based Computers
Evaluating Security Requirements
Designing Security Configuration Templates
Lab Af Analyzing a Security Template
Evaluating Security Configuration
Deploying Security Configuration Templates
Lab B: Designing Custondzed Security TemPlates
Review
ModuIe 6:Securing FiIe and Print Resources
Instructor Notes
Overview
Exandning Windows 2000 File System Security
Protecting Resources Using DACLs
Encrypting Data Using EFS
Lab A:Managing EFS Recovery Keys
Auditing Resource Access
Securing Backup and Restore Procedures
Protecting Data frOm Viruses
Lab B Planning Data Security
Review
ModuIe 7: Securing Cmmunication Channels
Instructor Notes
Overview
Assessing Network Data Visibility Risks
Designing ApplicationLayer Security
Designing IPLayer Security
Deploying Network Traffic Encryption
Lab A: Planning Transndssion Security
Review
ModuIe 8:Providing Secure Access to NonMicrosoft CIier
Instructor Notes
Overview
Providing Secure Network Access to UNIX Clients
Providing Secure Network Access to NetWare Clients
Providing Secure Access to Macintosh Clients
Securing Network Services in a Heterogeneous Network
Monitoring for Security Breaches
Lab A: Securing Telnet Transndssions
Review
ModuIe 9: Providing Secure Access to Remote Users
Instructor Notes
Overview
Identifying the Risks of Providing Remote Access
Designing Security fOr DialUp Connections
Designing Security for VPN Connections
Centralizing Remote Access Security Settings
Lab A: Using RADIUS Authentication
ModuIe 10: Providing Secure Access to Remote Offices
Instructor Notes
Overview:
Defining Private and Public Networks
Securing Connections Using Routers
Securing VPN Connections Between Remote Offices
Identifying Security Requirements
Lab A: Planning Secure Connections for Remote Offices
Review
Module 11:Providing Secure N6tWork Access to lnternot Users
InstructOr NotCs t
Overview t
Identifying POtential Risks from the Intemet
Using Firewalls to Protect Network Resources
Using Screened Subnets to Protect Network Resources
Securing PUblic Access tO a Screened Subnet
Lab A: Designing a Screened Subnet
Review
ModuIe 12:Providing Secure lnt6rn6t Access to NatWork Users
Instructor NotCs
Overview*
Protecting Internal Network Resources
Planning Intemet Usage Policies
Managing lntemet Access Thrugh boxy Server Configuration
Managing Intemet Access Thrugh Clientside Configuration
Lab Af Securing the Intemal Network When Accessing the Internet
Review t
MQdule 13: Extending the NetWork to Partner Organizations
Instfuctor Notes
Overview
PrOviding Access to Partner Organizations
Securing Applications Used by Pedners
Securing Connections Used by Remote Partners
Smicturing Active DirectOry to Manage Patner Accounts
Authenticating Pwtners from Trusted Domains
Lab A: Planning Partner Connectivity
Review
Instructor Notes
Overview
Introducing a Public Key Infrastructure
Using Certificates
Exandning the Certificate Life Cycle
Choosing a Certification Authority
Planning a Certification Authority Hierarchy
Mapping Certificates to User Accounts
Managing CA Maintenance Strategies
Lab A: Using Certificatebased Authentication
Review
Module 15:DeveIoping a Security PIan
InstructOr Notes
Overview
Designing a Security Plan
Defining Security Requirements
Maintaining the Security Plan
Lab A: Developing a Security Plan
Review
Appendix A:SSL Port Assignments
Appendix B:Acceptable lnternet Use Policy
Appendix C:lnternet Explorer Security Settings

已确认勘误

次印刷

页码 勘误内容 提交人 修订印次

Designing a Secure Microsoft Windows 2000 Network =Microsoft Windows 2000 网络安全设计 /
    • 名称
    • 类型
    • 大小

    光盘服务联系方式: 020-38250260    客服QQ:4006604884

    意见反馈

    14:15

    关闭

    云图客服:

    尊敬的用户,您好!您有任何提议或者建议都可以在此提出来,我们会谦虚地接受任何意见。

    或者您是想咨询:

    用户发送的提问,这种方式就需要有位在线客服来回答用户的问题,这种 就属于对话式的,问题是这种提问是否需要用户登录才能提问

    Video Player
    ×
    Audio Player
    ×
    pdf Player
    ×
    Current View

    看过该图书的还喜欢

    some pictures

    解忧杂货店

    东野圭吾 (作者), 李盈春 (译者)

    亲爱的云图用户,
    光盘内的文件都可以直接点击浏览哦

    无需下载,在线查阅资料!

    loading icon