CCED实用教程

CCED实用教程
作 者: 周山芙
出版社: 清华大学出版社
丛编项: 微软培训与认证系列教材
版权说明: 本书为公共版权或经版权方授权,请支持正版图书
标 签: 微软认证
ISBN 出版时间 包装 开本 页数 字数
未知 暂无 暂无 未知 0 暂无

作者简介

暂缺《CCED实用教程》作者简介

内容简介

本书主要介绍了设计一个安全的Windows2000网络的相关知识。其中,包括ActiveDirectory的安全特性、管理权限的规划、用户账号及访问权限的设计和管理、Windows2000计算机的安全设置、计算机资源的保护、通信安全以及公钥基础结构的设计等内容。本书的内容,既包括了对Windows2000的网络安全性体系结构的详细介绍,还包括了着手设计一个满足需求的网络系统的阐述。学习本书可以很好的掌握Windows2000安全网络的知识。本书适用于计划参加相关的微软认证考试的人员使用。

图书目录

Introduction

Course Materials

Prerequisites

Course Outline

Microsoft Official Curriculum

Microsoft Certified Professional Program

Facilities

Module 1: Assessing security Risks

Identifying Risks to Data

Identifying Risks to Services

Identifying Potential Threats

Introducing Common Security Standards

Planning Network Security

Review

Module 2: Introducing Windows 2000 Security

Introducing Security Features in Active Directory

Authenticating User Accounts

Securing Access to Resources

Introducing Encryption Technologies

Encrypting Stored and Transmitted Data

Introducing Public Key Infrastructure Technology

Review

Module 3: Planning Administrative Access

Determining the Appropriate Administrative Model

Designing Administrative Group Strategies

Planning Local Administrative Access

Planning Remote Administrative Access

Lab A: Planning Secure Administrative Access

Review

Module 4: Planning User Accounts

Designing Account Policies and Group Policy

Planning Account Creation and Location

Planning Delegation of Authority

Auditing User Account Actions

Lab A: Planning a Security-based OU Structure

Review

Module 5: Securing Windows 2000-based Computers

Planning Physical Security for Windows 2000-based Computers

Evaluating Security Requirements

Designing Security Configuration Templates

Lab A: Analyzing a Security Template

Evaluating Security Configuration

Deploying Security Configuration Templates

Lab B: Designing Customized Security Templates

Review

Module 6: Securing File and Print Resources

Examining Windows 2000 File System Security

Protecting Resources Using DACLs

Encrypting Data Using EFS

Lab A: Managing EFS Recovery Keys

Auditing Restore Access

Securing Backup and Restore Procedures

Protecting Data from Viruses

Lab B: Planning Data Security

Review

Module 7: Securing Communication Channels

Assessing Network Data Visibility Risks

Designing Application-Layer Security

Designing IP-Layer Security

Deploying Network Traffic Encryption

Lab A: Planning Transmission Security

Review

Module 8: Providing Secure Access to Non-Microsoft Clients

Providing Secure Network Access to UNIX Clients

Providing Secure Network Access to NetWare Clients

Providing Secure Access to Macintosh Clients

Securing Network Services in a Heterogeneous Network

Monitoring for Security Breaches

Lab A: Securing Telnet Transmissions

Review

Module 9: Providing Secure Access to Remote Users

Identifying the Risks of Providing Remote Access

Designing Security for Dial-UP Connections

Designing Security for VPN Connections

Centralizing Remote Access Security Settings

Lab A: Using RADIUS Authentication

Review

Module 10: Providing Secure Access to Remote Offices

Defining Private and Public Networks

Securing Connections Using Routers

Securing VPN Connections Between Remote Offices

Identifying Security Requirements

Lab A: Planning Secure Connections for Remote Offices

Review

Module 11: Providing Secure Network Access to Internet Users

Identifying Potential Risks from the Internet

Using Firewalls to Protect Network Resources

Using Screened Subnets to Protect Network Resources

Securing Public Access to a Screened Subnet

Lab A: Designing a Screened Subnet

Review

Module 12: Providing Secure Internet Access to Network Users

Protecting Internal Network Resources

Planning Internet Usage Policies

Managing Internet Access Through Proxy Server Configuration

Managing Internet Access Through Client-side Configuration

Lab A: Securing the Internal Network When Accessing the Internet

Review

Module 13: Extending the Network to Partner Organizations

Providing Access to Partner Organizations

Securing Applications Used by Partners

Securing Connections Used by Remote Partners

Structuring Active Directory to Manage Partner Accounts

Authenticating Partners from Trusted Domains

Lab A: Planning Partner Connectivity

Review

Module 14: Designing a Public Key Infrastructure

Introducing a Public Key Infrastructure

Using Certificates

Examining the Certificate Life Cycle

Choosing a Certification Authority

Planning a Certification Authority Hierarchy

Mapping Certificates to User Accounts

Managing CA Maintenance Strategies

Lab A: Using Certificate-based Authentication

Review

Module 15: Developing a Security Plan

Designing a Security Plan

Defining Security Requirements

Maintaining the Security Plan

Lab A: Developing a Security Plan

Review

Appendix A: SSL Port Assignments

Appendix B: Acceptable Internet Use Policy

Appendix C: Internet Explorer Security Settings

Classroom Setup Guide

Classroom Requirements

Classroom Configuration

Setup Instructions

Automated Classroom Setup

Classroom Setup Checklist

Customization Information