did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780782152333

MCSE Windows® 2000 Network Security Design Study Guide: Exam 70-220, Revised and Updated, 2nd Edition

by ;
  • ISBN13:

    9780782152333

  • ISBN10:

    0782152333

  • Format: eBook
  • Copyright: 2006-02-01
  • Publisher: Sybex
  • Purchase Benefits
List Price: $59.99
We're Sorry.
No Options Available at This Time.

Summary

The new Windows 2000 MCSE certification track is here! And Sybex, the leader in certification self-study material, has what you need to approach the exams with confidence. The MCSE: Windows 2000 Network Security Design Study Guide provides in-depth coverage of all official exam objectives. In addition to the practical, real-world instruction in the book, the accompanying CD comes with the following valuable study tools: Pre-Assessment Exams Case Study Questions Electronic Flashcards for PCs and Palm Devices Sample Adaptive Exams Bonus Review Questions Searchable Electronic Version of Entire Book Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Table of Contents

Introduction
Assessment Test
Analyzing the Company Model and Processes
The Analysis Process
The Network Design Process
Understanding Basic Design Criteria
Business Model Analysis
The Multinational Startup
Analyzing the Business Plan
Analyzing Corporate Operations
Analyzing Company Strategies
The Multinational Startup
Analyzing the Management Model
Evaluating the Business Requirements of the End User
Analyzing the IT Management Structure
The Multinational Startup
Enterprise Risk Assessment
Identifying Areas That Are Vulnerable
The Basics of Risk Management
The Multinational Startup
Evaluating the Current Technical Environment
Documenting the Current Environment
Accessing Data, Systems, and Resources
Analyzing Network Roles and Responsibilities. S. Johnson Candy Company
Evaluating the Impact of the Security Design on the Technical Environment
Windows 2000 Security Concepts
Security Policy Components
The Effect of Security Design on Existing Systems and Applications
Upgrades and Restructuring
Analyzing the Technical Support Structure
Analyze Existing and Planned Network and Systems Management. S. Johnson Candy Company
Designing Security Baselines
Distributed Security Strategies
Hudson Adoption Agency
Designing the Security Solution
Audit Policies
Delegating Authority and Security Groups
Implementing Group Policy Security Settings
The Placement and Inheritance of Security Policies
Designing an Encrypting File System Strategy
Designing Your Security Plan
Hudson Adoption Agency
Choosing an Authentication Strategy
Certificate-Based Authentication
Kerberos Authentication
Clear-Text Passwords
Digest Authentication
Smart Cards
NTLM
RADIUS
Secure Sockets Layer/Transport Layer Security (SSL/TLS)
Martin & Martin Golf Cart Corporation
An Integration and Authentication Strategy
Defining Your Network
Connecting Business Partners
Authentication Protocols
Windows 2000 and Internet Security
Microsoft Certificate Server
Access for Trusted Partners
Single Sign-On
SSO in Normal Networks
Network Integration
SSO for Improved Security
SSL and SSO
Martin & Martin Golf Cart Corporation
Enhancing Security Using Public Keys
How PKI Works
Prerequisites for Implementing PKI
Designing Your Public Key Infrastructure
Certification Authority Hierarchies
Certificate Server Roles
Basic Security Requirements for Certificates
Certificate Management
PKI Integration
Certificate Mapping
Docter's Sushi Emporium, Inc
Building a DNS/SNMP Security Solution
Locating a Domain Name Controller
Windows 2000 and DNS
Windows 2000 Name Service
Simple Network Management Protocol (SNMP) Security
Docter's Sushi Emporium, Inc
Designing Remote Services Security
Understanding Remote Installation
Terminal Services
Terminal Services Security
Terminal Services and Firewalls
Gebelt's River and Desert Guide Corp
Providing Secure Access at the Network Level
Access to Public Networks from a Private Network
Virtual Private Networking
Virtual Private Networking Security
VPNs and Firewalls
VPNs and NAT
The Pass-Through VPN
Configuration of the CWW VPN Server
Configuration of the SS VPN Server
Filtering Configuration
Configuration of the VPN Client Computer
Establishing the Pass-Through VPN Connection
Troubleshooting 101 for VPNs
Tro
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program