Segnalaci il tuo interesse per questo corso compilando questo modulo  
Diventa nostro fan su Facebook

|
|
Corso MOC 2823 - Implementing and Administering Security in a Microsoft Windows Server 2003 Network 2003 |
2003 |
Microsoft |
Categoria |
Corsi MOC in accordo con Pipeline |
Livello |
|
Prerequisiti |
E' consigliabile avere frequentato il corso MOC2810 "Fundamentals of Network Security". E' inoltre necessaria esperienza nella implementazione dei servizi di directory in ambiente Windows 2000 o Windows Server 2003 e conoscenza anche non di dettaglio relativamente a risorse quali Web, FTP, Exchange Server, DHCP, DNS e WINS. |
|
Al termine del corso gli allievi saranno in grado di:
progettare e configurare una strategia di autorizzazione e autenticazione, installare, configurare e gestire una certification authority (CA), configurare, distribuire e gestire certificati, progettare e implementare certificati smart card, progettare e implementare EFS (Encrypting File System), progettare e implementare Software Update Services, progettare e implementare la sicurezza per reti di tipo wireless, progettare e implementare la sicurezza del perimetro con Internet Security and Acceleration Server (ISA) 2000, rendere sicuri gli accessi remoti alla infrastruttura. |
|
Planning and Configuring an Authorization and Authentication Strategy
Groups and Basic Group Strategy in Windows Server 2003
Creating Trusts in Windows Server 2003
Planning, Implementing, and Maintaining an Authorization Strategy Using Groups
Components of an Authentication Model
Planning and Implementing an Authentication Strategy
Installing, Configuring, and Managing Certification Authorities
Introduction to PKI and Certification Authorities
Installing a Certification Authority
Managing a Certification Authority
Backing Up and Restoring a Certification Authority
Configuring, Deploying, and Managing Certificates
Configuring Certificate Templates
Deploying and Revoking User and Computer Certificates
Managing Certificates
Planning, Implementing, and Troubleshooting Smart Card Certificates
Introduction to Multifactor Authentication
Planning and Implementing a Smart Card Infrastructure
Managing and Troubleshooting a Smart Card Infrastructure
Planning, Implementing, and Troubleshooting Encrypting File System
Introduction to EFS
Implementing EFS in a Standalone Microsoft Windows XP Environment
Planning and Implementing EFS in a Domain Environment with a PKI
Implementing EFS File Sharing
Troubleshooting EFS
Planning, Configuring, and Deploying a Secure Member Server Baseline
Overview of a Member Server Baseline
Planning a Secure Member Server Baseline
Configuring Additional Security Settings
Deploying Security Templates
Planning, Configuring, and Implementing Secure Baselines for Server Roles
Planning and Configuring a Secure Baseline for Domain Controllers
Planning and Configuring a Secure Baseline for DNS Servers
Planning and Configuring a Secure Baseline for Infrastructure Servers
Planning a Secure Baseline for File and Print Servers
Planning and Configuring a Secure Baseline for IIS Servers
Planning, Configuring, Implementing, and Deploying a Secure Client Computer Baseline
Planning and Implementing a Secure Client Computer Baseline
Configuring and Deploying a Client Computer Baseline
Planning and Implementing a Software Restriction Policy
Implementing Security for Mobile Clients
Planning and Implementing Software Update Services
Introduction to Software Update Services and Update
Management Planning an Update Management Strategy
Implementing an SUS Infrastructure
Planning, Deploying, and Troubleshooting Data Transmission Security
Secure Data Transmission Methods
Introducing IPSec
Planning Data Transmission Security
Implementing Secure Data Transmission Methods
Troubleshooting IPSec Communications
Planning and Implementing Security for Wireless Networks
Introduction to Securing Wireless Networks
Implementing 802.1x Authentication
Planning a Secure WLAN Strategy
Implementing a Secure WLAN
Troubleshooting Wireless Networks
Planning and Implementing Perimeter Security with Internet Security and Acceleration Server 2000
Introduction to Internet Security and Acceleration Server 2000
Installing ISA Server 2000
Securing a Perimeter Network with ISA Server 2000
Publishing Servers on a Perimeter Network
Securing ISA Server Computers
Securing Remote Access
Introduction to Remote Access Technologies and Vulnerabilities
Planning a Remote Access Strategy
Deploying Network Access Quarantine Control Components
|
|
Corso di gruppo |
Corso personalizzato (1 o 2 partecipanti) |
35 ore |
non previsto |
min. 5 - max. 10 partecipanti |
2 persone: sconto del 50% |
Corso individuale a distanza su VoIP |
non previsto |
|
VIDEO TUTORIAL |
|