Sold Out
Book Categories |
Introduction
Chapter 1 Analyzing Business Requirements
—Analyze the existing and planned
business models.
—Analyze the existing and planned
organizational structures. Considerations
include management model; company
organization; vendor, partner, and customer
relationships; and acquisition plans.
—Analyze factors that influence company
strategies.
—Analyze business and security
requirements for the end user.
—Analyze the structure of IT management.
Considerations include type of administration,
such as centralized and decentralized; funding
model; outsourcing; decision—making process;
and change—management process.
—Analyze the current physical model and
information security model.
Chapter 2 Analyzing Technical Requirements
—Evaluate the company's existing and planned
technical environment.
—Analyze the impact of the security design on
the existing and planned technical
environment.
Chapter 3 Analyzing Security Requirements
—Design a security baseline for a
Windows 2000 network that includes domain
controllers, operations masters, application
servers, file and print servers, RAS servers,
desktop computers, portable computers, and
kiosks.
—Identify the required level of security for each
resource. Resources include printers, files,
shares, Internet access, and dial—in
access.
Chapter 4 Designing a Windows 2000 Security Solution
—Design an audit policy.
—Design a delegation of authority
strategy.
—Design the placement and inheritance of
security policies for sites, domains, and
organizational units.
—Design an Encrypting File System
strategy.
—Design an authentication strategy.
—Design a security group strategy.
—Design a Public Key Infrastructure.
—Design Windows 2000 network services
security.
Chapter 5 Designing a Security Solution for Access
between Networks
—Provide secure access to public networks from
a private network.
—Provide external users with secure access to
private network resources.
—Provide secure access between private
networks.
—Design Windows 2000 security for remote
access users.
Chapter 6 Designing Security for Communication
Channels —
—Design an SMB—signing solution.
— Design an IPSec solution.
Index
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionMCSE
X
This Item is in Your InventoryMCSE
X
You must be logged in to review the productsX
X
X
Add MCSE, MCSE: Windows 2000 Network Security Design Exam Notes provides the fastest and most effective way to make sure you're ready to pass the Windows 2000 Network Security Design exam. The unique, innovative Exam Notes approach helps you gain and ret, MCSE to the inventory that you are selling on WonderClubX
X
Add MCSE, MCSE: Windows 2000 Network Security Design Exam Notes provides the fastest and most effective way to make sure you're ready to pass the Windows 2000 Network Security Design exam. The unique, innovative Exam Notes approach helps you gain and ret, MCSE to your collection on WonderClub |