Wednesday, July 15, 2009

VTC - MCSA & MCSE (70-298) Microsoft Windows Server 2003


VTC - MCSA & MCSE (70-298) Microsoft Windows Server 2003 | 173 MB

Microsoft exam 70-298, "Designing Security for a Microsoft Windows® Server 2003 Network" is a core requirement for the MCSE (Microsoft Certified Systems Engineer) on Microsoft Windows® 2003. It is designed for candidates who "operate in medium to very large computing environments that use the Windows Server 2003 network operating system." VTC author, Brian Culp, discusses analyzing, designing, and configuring security for networks. The tutorial provides real-world job situations and solutions, as well as solid source material to take and pass the 70-298 test.

Title: Microsoft Windows Server 2003 (70-298) Author: Brian Culp SKU: 33524 ISBN: 1-932808-02-7 Release Date: 2004-08-26 Duration: 7 hrs / 92 lessons Captions: No Compatibility: Vista/XP/2000, OS X, Linux QuickTime 7, Flash 8

Network Security Design
Intro and Overview (05:30)
Analyze Existing Policies (06:57)
Organizational Requirements (06:15)
Principles of Security Design (05:43)
Analyze Risks to Current Administration (04:02)
Design a Recovery Process (04:49)

Creating the Security Framework
Security Guideposts (03:33)
Design Segmented Networks (04:47)
Identify Technology Limitations (04:43)
Analyze Interoperability Constraints (03:24)
Threat Modeling (05:03)
Logical Security Design
Designing Public Key Infrastructure (04:30)
Public Key Cryptography (04:57)
Certificate Services (05:37)
Microsoft Certification Services (04:20)
Design a CA Hierarchy (05:28)
Trusted CA (03:46)
Design Security for CA Servers (02:59)
Certificate Enrollment Process (04:55)
Design Certification Enrollment (05:08)
Separating CA Admin Roles (04:46)
Design Trust Models (04:20)
Domain/Trees/Forests (05:02)
External and Internal Trusts (06:26)
Shortcut/Realm/Cross-Forest Trusts (05:07)
Restricting Trust Relationships (04:19)
Design Administration of Servers (04:27)
Software Update Services (02:44)
Using SUS (03:48)
Design SUS Infrastructure (03:31)
Identify Current Patch Level (02:28)
Microsoft Baseline Security Analyzer (02:07)
Creating a Baseline Analysis (04:35)

Physical Security Design
Design Network Infrastructure Security (06:01)
Firewall Configuration (04:20)
Active Directory Considerations (04:15)
Design an IPSec Policy (04:22)
Enabling IPSec (05:11)
IPSec Policy Rules (04:05)
Configuring IPSec Policy (05:10)
IPSec Policy Example pt. 1 (04:32)
IPSec Policy Example pt. 2 (04:28)
Securing DNS Traffic (04:10)
Security for Wireless Networks (04:00)
Wireless Network Threats (05:10)
Wireless Encryption and Security (05:40)
Design 802.1x Authentication pt. 1 (03:26)
Design 802.1x Authentication pt. 2 (03:49)

Secure Communication Between Networks
Designing Security for IIS (05:37)
Controlling Access to Web Sites (06:44)
Design IIS Authentication (03:52)
User Authentication Using Certificates (04:58)
Design VPN Connectivity (02:45)
Remote Access Protocols (06:59)
Setting Up a VPN (06:41)
Router to Router VPN (05:17)
Select Protocols for VPN Access (02:55)
Design Secure VPN Connectivity (04:39)
Demand Dial Routing (06:23)
Design Secure Demand Dial Routing (04:09)
Configuring NAT (06:24)
Configuring a Firewall (06:22)
Security Templates for Server Systems (03:19)
Understanding Security Templates (04:53)
Modify Security Templates (03:32)
Security Configuration and Analysis (04:20)
Security Template Best Practices (04:13)

Design An Access Control Strategy
Design an Access Control Strategy (05:04)
Create a Delegation Strategy (02:59)
Delegating Control (06:28)
Analyze Auditing Requirements (03:58)
Using NTFS Permissions (03:19)
NTFS Permission Behavior (05:15)
Share and NTFS Permissions (05:49)
The Effective Permission (02:11)
Access Control for Files and Folders (04:33)
Backup and Recovery Strategy (04:20)
EFS Strategy (04:31)
Permissions for Registry Objects (04:55)
Design a Group Strategy (04:45)

Design Client Infrastructure Security
Design a Client Authentication Strategy (02:51)
Analyze Authentication Requirements (03:31)
Hardening Client Operating Systems (04:25)
Strategy for Client Remote Access (03:18)
Remote Access Policies (06:24)
Default Remote Access Policies (07:05)
Create a Remote Access Policy (05:50)
Remote Access Authentication Protocols (06:55)
Design Authentication Using IAS (02:51)
Authenticating with IAS (05:31)
Configuring the IAS Server (06:33)

Credits
About this Author (01:00)

0 comments:

Post a Comment | Feed

Post a Comment



Related Posts with Thumbnails
 

Blog Archive

Recent Posts

  © Free E-Books U ask v provide by Free E-Books Download 2012

Disclaimer: This blog does not store any files on its server.We only index and link to content provided by sites.

USER AGREEMENT PLEASE READ : The creator of THIS PAGE or the ISP(s) hosting any content on this site take NO responsibility for the way you use the information provided on this site. These links here are for educational purposes only and SHOULD BE VIEWED ONLY. If you download any files to view them, you are agreeing to delete them within a 24 hour period. If you are affiliated with any government, or ANTI-Piracy group or any other related group or were formally a worker of one you CANNOT enter this web site, cannot access any of its files and you cannot view any of the HTML files. All the objects on this site are PRIVATE property and are meant for previewing only. If you enter this site without following these agreements you are not agreeing to these terms and you are violating code 431.322.12 of the Internet Privacy Act signed by Bill Clinton in 1995 and that means that you CANNOT threaten our ISP(s) or any person(s) or company storing these files, cannot prosecute any person(s) affiliated with this page which includes family, friends or individuals who run or enter this web site. If you want to remove links to your website, Please send an email to professionalstudents[at]gmail[dot]com.