This course provides students with the knowledge and skills necessary to design a security framework for small, medium, and enterprise networks by using Microsoft Windows® 2000 technologies. This course contains four units that describe how to help protect specific areas of the network:
- Unit 1: Providing Security-Enhanced Access to Local Network Users
- Unit 2: Providing Security-Enhanced Access to Remote Users and Remote Offices
- Unit 3: Providing Security-Enhanced Access Between Private and Public Networks
- Unit 4: Providing Security-Enhanced Access to Partners
At the end of the course, students will be able to:
- Identify the security risks associated with managing resource access and data flow on the network.
- Describe how key technologies within Windows 2000 are used to help protect a network and its resources.
- Plan a Windows 2000 administrative structure so that permissions are granted only to appropriate users.
- Plan an Active Directory directory service structure that facilitates security-enhanced and verifiable user account creation and administration.
- Define minimum security requirements for Windows 2000based domain controllers, application servers, file and print servers, and workstations.
- Design a strategy for to help protect local storage of data and provide security-enhanced network access to file and print resources.
- Design end-to-end security for the transmission of data between hosts on the network.
- Design a strategy to help provide security-enhanced access for non-Microsoft clients within a Windows 2000based network.
- Design a strategy to help protect local resources accessed by remote users who use dial-up or virtual private network (VPN) technologies.
- Design a strategy to help protect local resources accessed by remote offices within a wide area network (WAN) environment.
- Help protect private network resources from public network users.
- Design a strategy to help protect private network user access to public networks.
- Design a strategy for authenticating trusted users over public networks.
- Design a strategy to help protect data and application access for the private network when accessed by trusted partners.
- Plan for an e-commerce implementation between your organization and external business partners that facilitates business communication.
- Design a structured methodology for securing a Windows 2000 network.