Microsoft exam 70-298, "Designing Security for a Microsoft Windows® Server 2003 Network" is a core requirement for the MCSE (Microsoft Certified Systems Engineer) on Microsoft Windows® 2003. It is designed for candidates who "operate in medium to very large computing environments that use the Windows Server 2003 network operating system." VTC author, Brian Culp, discusses analyzing, designing, and configuring security for networks. The tutorial provides real-world job situations and solutions, as well as solid source material to take and pass the 70-298 test.
Title: Microsoft Windows Server 2003 (70-298) Author: Brian Culp SKU: 33524 ISBN: 1-932808-02-7 Release Date: 2004-08-26 Duration: 7 hrs / 92 lessons Captions: No Compatibility: Vista/XP/2000, OS X, Linux QuickTime 7, Flash 8
Network Security Design
Intro and Overview (05:30)
Analyze Existing Policies (06:57)
Organizational Requirements (06:15)
Principles of Security Design (05:43)
Analyze Risks to Current Administration (04:02)
Design a Recovery Process (04:49)
Creating the Security Framework
Security Guideposts (03:33)
Design Segmented Networks (04:47)
Identify Technology Limitations (04:43)
Analyze Interoperability Constraints (03:24)
Threat Modeling (05:03)
Logical Security Design
Designing Public Key Infrastructure (04:30)
Public Key Cryptography (04:57)
Certificate Services (05:37)
Microsoft Certification Services (04:20)
Design a CA Hierarchy (05:28)
Trusted CA (03:46)
Design Security for CA Servers (02:59)
Certificate Enrollment Process (04:55)
Design Certification Enrollment (05:08)
Separating CA Admin Roles (04:46)
Design Trust Models (04:20)
Domain/Trees/Forests (05:02)
External and Internal Trusts (06:26)
Shortcut/Realm/Cross-Forest Trusts (05:07)
Restricting Trust Relationships (04:19)
Design Administration of Servers (04:27)
Software Update Services (02:44)
Using SUS (03:48)
Design SUS Infrastructure (03:31)
Identify Current Patch Level (02:28)
Microsoft Baseline Security Analyzer (02:07)
Creating a Baseline Analysis (04:35)
Physical Security Design
Design Network Infrastructure Security (06:01)
Firewall Configuration (04:20)
Active Directory Considerations (04:15)
Design an IPSec Policy (04:22)
Enabling IPSec (05:11)
IPSec Policy Rules (04:05)
Configuring IPSec Policy (05:10)
IPSec Policy Example pt. 1 (04:32)
IPSec Policy Example pt. 2 (04:28)
Securing DNS Traffic (04:10)
Security for Wireless Networks (04:00)
Wireless Network Threats (05:10)
Wireless Encryption and Security (05:40)
Design 802.1x Authentication pt. 1 (03:26)
Design 802.1x Authentication pt. 2 (03:49)
Secure Communication Between Networks
Designing Security for IIS (05:37)
Controlling Access to Web Sites (06:44)
Design IIS Authentication (03:52)
User Authentication Using Certificates (04:58)
Design VPN Connectivity (02:45)
Remote Access Protocols (06:59)
Setting Up a VPN (06:41)
Router to Router VPN (05:17)
Select Protocols for VPN Access (02:55)
Design Secure VPN Connectivity (04:39)
Demand Dial Routing (06:23)
Design Secure Demand Dial Routing (04:09)
Configuring NAT (06:24)
Configuring a Firewall (06:22)
Security Templates for Server Systems (03:19)
Understanding Security Templates (04:53)
Modify Security Templates (03:32)
Security Configuration and Analysis (04:20)
Security Template Best Practices (04:13)
Design An Access Control Strategy
Design an Access Control Strategy (05:04)
Create a Delegation Strategy (02:59)
Delegating Control (06:28)
Analyze Auditing Requirements (03:58)
Using NTFS Permissions (03:19)
NTFS Permission Behavior (05:15)
Share and NTFS Permissions (05:49)
The Effective Permission (02:11)
Access Control for Files and Folders (04:33)
Backup and Recovery Strategy (04:20)
EFS Strategy (04:31)
Permissions for Registry Objects (04:55)
Design a Group Strategy (04:45)
Design Client Infrastructure Security
Design a Client Authentication Strategy (02:51)
Analyze Authentication Requirements (03:31)
Hardening Client Operating Systems (04:25)
Strategy for Client Remote Access (03:18)
Remote Access Policies (06:24)
Default Remote Access Policies (07:05)
Create a Remote Access Policy (05:50)
Remote Access Authentication Protocols (06:55)
Design Authentication Using IAS (02:51)
Authenticating with IAS (05:31)
Configuring the IAS Server (06:33)
Credits
About this Author (01:00)
0 comments: