书籍详情
CCED实用教程
作者:周山芙编
出版社:清华大学出版社
出版时间:1994-07-01
ISBN:9787302015017
定价:¥180.00
内容简介
本书主要介绍了设计一个安全的Windows2000网络的相关知识。其中,包括ActiveDirectory的安全特性、管理权限的规划、用户账号及访问权限的设计和管理、Windows2000计算机的安全设置、计算机资源的保护、通信安全以及公钥基础结构的设计等内容。本书的内容,既包括了对Windows2000的网络安全性体系结构的详细介绍,还包括了着手设计一个满足需求的网络系统的阐述。学习本书可以很好的掌握Windows2000安全网络的知识。本书适用于计划参加相关的微软认证考试的人员使用。
作者简介
暂缺《CCED实用教程》作者简介
目录
Introduction
Course Materials
Prerequisites
Course Outline
Microsoft Official Curriculum
Microsoft Certified Professional Program
Facilities
Module 1: Assessing security Risks
Identifying Risks to Data
Identifying Risks to Services
Identifying Potential Threats
Introducing Common Security Standards
Planning Network Security
Review
Module 2: Introducing Windows 2000 Security
Introducing Security Features in Active Directory
Authenticating User Accounts
Securing Access to Resources
Introducing Encryption Technologies
Encrypting Stored and Transmitted Data
Introducing Public Key Infrastructure Technology
Review
Module 3: Planning Administrative Access
Determining the Appropriate Administrative Model
Designing Administrative Group Strategies
Planning Local Administrative Access
Planning Remote Administrative Access
Lab A: Planning Secure Administrative Access
Review
Module 4: Planning User Accounts
Designing Account Policies and Group Policy
Planning Account Creation and Location
Planning Delegation of Authority
Auditing User Account Actions
Lab A: Planning a Security-based OU Structure
Review
Module 5: Securing Windows 2000-based Computers
Planning Physical Security for Windows 2000-based Computers
Evaluating Security Requirements
Designing Security Configuration Templates
Lab A: Analyzing a Security Template
Evaluating Security Configuration
Deploying Security Configuration Templates
Lab B: Designing Customized Security Templates
Review
Module 6: Securing File and Print Resources
Examining Windows 2000 File System Security
Protecting Resources Using DACLs
Encrypting Data Using EFS
Lab A: Managing EFS Recovery Keys
Auditing Restore Access
Securing Backup and Restore Procedures
Protecting Data from Viruses
Lab B: Planning Data Security
Review
Module 7: Securing Communication Channels
Assessing Network Data Visibility Risks
Designing Application-Layer Security
Designing IP-Layer Security
Deploying Network Traffic Encryption
Lab A: Planning Transmission Security
Review
Module 8: Providing Secure Access to Non-Microsoft Clients
Providing Secure Network Access to UNIX Clients
Providing Secure Network Access to NetWare Clients
Providing Secure Access to Macintosh Clients
Securing Network Services in a Heterogeneous Network
Monitoring for Security Breaches
Lab A: Securing Telnet Transmissions
Review
Module 9: Providing Secure Access to Remote Users
Identifying the Risks of Providing Remote Access
Designing Security for Dial-UP Connections
Designing Security for VPN Connections
Centralizing Remote Access Security Settings
Lab A: Using RADIUS Authentication
Review
Module 10: Providing Secure Access to Remote Offices
Defining Private and Public Networks
Securing Connections Using Routers
Securing VPN Connections Between Remote Offices
Identifying Security Requirements
Lab A: Planning Secure Connections for Remote Offices
Review
Module 11: Providing Secure Network Access to Internet Users
Identifying Potential Risks from the Internet
Using Firewalls to Protect Network Resources
Using Screened Subnets to Protect Network Resources
Securing Public Access to a Screened Subnet
Lab A: Designing a Screened Subnet
Review
Module 12: Providing Secure Internet Access to Network Users
Protecting Internal Network Resources
Planning Internet Usage Policies
Managing Internet Access Through Proxy Server Configuration
Managing Internet Access Through Client-side Configuration
Lab A: Securing the Internal Network When Accessing the Internet
Review
Module 13: Extending the Network to Partner Organizations
Providing Access to Partner Organizations
Securing Applications Used by Partners
Securing Connections Used by Remote Partners
Structuring Active Directory to Manage Partner Accounts
Authenticating Partners from Trusted Domains
Lab A: Planning Partner Connectivity
Review
Module 14: Designing a Public Key Infrastructure
Introducing a Public Key Infrastructure
Using Certificates
Examining the Certificate Life Cycle
Choosing a Certification Authority
Planning a Certification Authority Hierarchy
Mapping Certificates to User Accounts
Managing CA Maintenance Strategies
Lab A: Using Certificate-based Authentication
Review
Module 15: Developing a Security Plan
Designing a Security Plan
Defining Security Requirements
Maintaining the Security Plan
Lab A: Developing a Security Plan
Review
Appendix A: SSL Port Assignments
Appendix B: Acceptable Internet Use Policy
Appendix C: Internet Explorer Security Settings
Classroom Setup Guide
Classroom Requirements
Classroom Configuration
Setup Instructions
Automated Classroom Setup
Classroom Setup Checklist
Customization Information
Course Materials
Prerequisites
Course Outline
Microsoft Official Curriculum
Microsoft Certified Professional Program
Facilities
Module 1: Assessing security Risks
Identifying Risks to Data
Identifying Risks to Services
Identifying Potential Threats
Introducing Common Security Standards
Planning Network Security
Review
Module 2: Introducing Windows 2000 Security
Introducing Security Features in Active Directory
Authenticating User Accounts
Securing Access to Resources
Introducing Encryption Technologies
Encrypting Stored and Transmitted Data
Introducing Public Key Infrastructure Technology
Review
Module 3: Planning Administrative Access
Determining the Appropriate Administrative Model
Designing Administrative Group Strategies
Planning Local Administrative Access
Planning Remote Administrative Access
Lab A: Planning Secure Administrative Access
Review
Module 4: Planning User Accounts
Designing Account Policies and Group Policy
Planning Account Creation and Location
Planning Delegation of Authority
Auditing User Account Actions
Lab A: Planning a Security-based OU Structure
Review
Module 5: Securing Windows 2000-based Computers
Planning Physical Security for Windows 2000-based Computers
Evaluating Security Requirements
Designing Security Configuration Templates
Lab A: Analyzing a Security Template
Evaluating Security Configuration
Deploying Security Configuration Templates
Lab B: Designing Customized Security Templates
Review
Module 6: Securing File and Print Resources
Examining Windows 2000 File System Security
Protecting Resources Using DACLs
Encrypting Data Using EFS
Lab A: Managing EFS Recovery Keys
Auditing Restore Access
Securing Backup and Restore Procedures
Protecting Data from Viruses
Lab B: Planning Data Security
Review
Module 7: Securing Communication Channels
Assessing Network Data Visibility Risks
Designing Application-Layer Security
Designing IP-Layer Security
Deploying Network Traffic Encryption
Lab A: Planning Transmission Security
Review
Module 8: Providing Secure Access to Non-Microsoft Clients
Providing Secure Network Access to UNIX Clients
Providing Secure Network Access to NetWare Clients
Providing Secure Access to Macintosh Clients
Securing Network Services in a Heterogeneous Network
Monitoring for Security Breaches
Lab A: Securing Telnet Transmissions
Review
Module 9: Providing Secure Access to Remote Users
Identifying the Risks of Providing Remote Access
Designing Security for Dial-UP Connections
Designing Security for VPN Connections
Centralizing Remote Access Security Settings
Lab A: Using RADIUS Authentication
Review
Module 10: Providing Secure Access to Remote Offices
Defining Private and Public Networks
Securing Connections Using Routers
Securing VPN Connections Between Remote Offices
Identifying Security Requirements
Lab A: Planning Secure Connections for Remote Offices
Review
Module 11: Providing Secure Network Access to Internet Users
Identifying Potential Risks from the Internet
Using Firewalls to Protect Network Resources
Using Screened Subnets to Protect Network Resources
Securing Public Access to a Screened Subnet
Lab A: Designing a Screened Subnet
Review
Module 12: Providing Secure Internet Access to Network Users
Protecting Internal Network Resources
Planning Internet Usage Policies
Managing Internet Access Through Proxy Server Configuration
Managing Internet Access Through Client-side Configuration
Lab A: Securing the Internal Network When Accessing the Internet
Review
Module 13: Extending the Network to Partner Organizations
Providing Access to Partner Organizations
Securing Applications Used by Partners
Securing Connections Used by Remote Partners
Structuring Active Directory to Manage Partner Accounts
Authenticating Partners from Trusted Domains
Lab A: Planning Partner Connectivity
Review
Module 14: Designing a Public Key Infrastructure
Introducing a Public Key Infrastructure
Using Certificates
Examining the Certificate Life Cycle
Choosing a Certification Authority
Planning a Certification Authority Hierarchy
Mapping Certificates to User Accounts
Managing CA Maintenance Strategies
Lab A: Using Certificate-based Authentication
Review
Module 15: Developing a Security Plan
Designing a Security Plan
Defining Security Requirements
Maintaining the Security Plan
Lab A: Developing a Security Plan
Review
Appendix A: SSL Port Assignments
Appendix B: Acceptable Internet Use Policy
Appendix C: Internet Explorer Security Settings
Classroom Setup Guide
Classroom Requirements
Classroom Configuration
Setup Instructions
Automated Classroom Setup
Classroom Setup Checklist
Customization Information
猜您喜欢