會員登錄
軟體搜尋
您的位置: 網站首頁 >> 專業知識教學 >> 電腦教學認證 >> 商品詳情
商品詳情
商品編號:CB0451-4 碟片數量:4片 銷售價格:800 瀏覽次數:34725 【轉載TXT文檔】 |
您可能也喜歡:
DVD27696--Docker與微服務實戰 2022版 中文教學版(DVD一片裝)
DVD27697--零基礎玩轉Linux+Ubuntu實戰視頻課程 MP4格式 中文教學版(DVD一片裝)
DVD27221--15堂占星入門全攻略:探秘占星師 開啟有錢有趣又有閒的迷人職業 MP4格式 中文教學版(DVD一片裝)
DVD27262--SketchUP Advanced Architecture 2022 (SketchUp技巧教學) 英文教學版(DVD一片裝)
DVD13515--Neil Peart Taking Center Stage A Lifetime Of Live Performance 2011 D1 教學 英文正式版(DVD一片裝)
商品描述
Keystone Windows 2000 Design Network Security 英文光碟正式版 (4片裝)
軟體簡介:
Keystone Windows 2000 Design Network Security 英文光碟正式版 (4片裝)(教學軟體)
Keystone 公司: Windows 2000 網路安全設計課程是屬於Windows 2000的 MCSE 課
程之一#70-220,但是這也是在學習 Windows 2000或者應該說是所有的網路的學習
課程都應該重視的一門課程,因為在現在的網路安全已不像是之前的單一網路或是
區域網路了而網路與網路之間的傳遞或是溝通常常是為駭客開啟另一扇大門,所以
如何可以建構一套完整而且安全性高的網路環境是每一個學習網路架設或是管理甚
至是使用者都應該學習的重要課題之一,Keystone公司所推出的教育系列軟體一向
是學習電腦所不可以或缺的重要教學光碟,而這次所推出的教育光碟更是萬中選一
的重要教材之一,內容完整,彙集資料豐富,操作容易而所有的資料及習作更都是
由講師親自操作的哦!!是你所不可以放過的。
Course Description
After using his course you will have the skills required to to analyze the
business requirements for security and design a security solution that meets
business requirements.
Detailed Course Outlines:
Level 1
1.0 Introduction to Security
1.1 What is Security?
1.2 What is a Risk?
1.3 Types of Attacks
1.4 Risk Analysis
1.5 Acceptable Levels of Security
2.0 Securing the Local Network
2.1 Business Needs
2.2 Domain Structure & Trusts
2.3 Group Policies
2.4 Authentication
2.5 Controlling Access
2.6 Securing Computers Resources & Communications
2.7 Non-Microsoft Clients
3.0 Controlling Administrative Access
3.1 Administrative Access
3.2 Controlling Access
3.3 Using Terminal Services
3.4 Installing Terminal Services
4.0 Design Issues for User Accounts
4.1 Account Policies
4.2 Group Policy Object
4.3 Strategies for User Creation
4.4 Delegation of Authority
4.5 Auditing User Actions
5.0 Computer Security
5.1 Physical Security
Level 2
1.0 Security Baselines
1.1 What is a Baseline?
1.2 Deploying Security Templates
2.0 Securing a File & Print Environment
2.1 File System Security & Share Permissions
2.2 Print Resources
2.3 Securing the Registry
2.4 Securing Data Through EFS
2.5 Securing the Backup/Restore Process
2.6 Viruses
3.0 Securing Network Communications
3.1 Assessing Risk
3.2 Cost of Securing Transmissions
3.3 Application Layer Security
3.4 Protocol Security (IPSEC)
4.0 Securing Access for Non-Microsoft Clients
4.1 UNIX Clients
4.2 NetWare Clients
4.3 Macintosh Clients
4.4 Network Services
Level 3
1.0 Remote Access
1.1 Risks
1.2 Authentication
1.3 Protocols
1.4 Protection Techniques
1.5 Remote Access Policies
1.6 Remote Access Models
1.7 NT 4.0 RAS Sever
1.8 Virtual Private Networks (VPN)
1.9 RADIUS Server
1.10 VPN & RADIUS Example
2.0 Securing Access to Remote Offices
2.1 Connection Methods
2.2 Security at the Router
2.3 VPN's
2.4 Designing Your Solution
3.0 Securing Incoming Internet Access
3.1 Risks (inherit to Internet Access)
3.2 Secure Network Design or Firewall Designs
3.3 Filtering Rules
4.0 Securing Access to the Internet
4.1 Virus Protection
4.2 Modem Control
4.3 Network Address Translation (NAT) Server
4.4 Protecting DNS
4.5 Limiting Access to Internet Services
4.6 User Training
4.7 Proxy Server
4.8 Managing Access through Internet Explorer
Level 4
1.0 Securing Access from External Entities
1.1 What is an Extranet?
1.2 Security Mechanisms
1.3 Applications
1.4 Connection Types
1.5 Active Directory Design Issues
2.0 Designing a Public Key Infrastructure
2.1 What is a PKI?
2.2 Deign Process for a PKI
2.3 Certificate Templates
2.4 Certificate Life Cycle
2.5 Certificate Authorities
2.6 Installing & Configuring PKI
3.0 Designing a Secure Environment
3.1 7 Step Design Process
3.2 Building a Planning Team
3.3 Security Requirements
3.4 Defining the Scope of a Project
3.5 Building a Project Team
3.6 Developing a Plan
3.7 Deployment
3.8 Maintenance
4.0 A Discussion of Business
4.1 The Grand Plan
4.2 Microsoft's Definition of Security
4.3 Managing Resource Access
4.4 Auditing Resource Access
4.5 Proper Authentication
4.6 Encryption of Data
4.7 Understanding Business Process
Keystone.Windows.2000.Design.Network.Security
軟體簡介:
Keystone Windows 2000 Design Network Security 英文光碟正式版 (4片裝)(教學軟體)
Keystone 公司: Windows 2000 網路安全設計課程是屬於Windows 2000的 MCSE 課
程之一#70-220,但是這也是在學習 Windows 2000或者應該說是所有的網路的學習
課程都應該重視的一門課程,因為在現在的網路安全已不像是之前的單一網路或是
區域網路了而網路與網路之間的傳遞或是溝通常常是為駭客開啟另一扇大門,所以
如何可以建構一套完整而且安全性高的網路環境是每一個學習網路架設或是管理甚
至是使用者都應該學習的重要課題之一,Keystone公司所推出的教育系列軟體一向
是學習電腦所不可以或缺的重要教學光碟,而這次所推出的教育光碟更是萬中選一
的重要教材之一,內容完整,彙集資料豐富,操作容易而所有的資料及習作更都是
由講師親自操作的哦!!是你所不可以放過的。
Course Description
After using his course you will have the skills required to to analyze the
business requirements for security and design a security solution that meets
business requirements.
Detailed Course Outlines:
Level 1
1.0 Introduction to Security
1.1 What is Security?
1.2 What is a Risk?
1.3 Types of Attacks
1.4 Risk Analysis
1.5 Acceptable Levels of Security
2.0 Securing the Local Network
2.1 Business Needs
2.2 Domain Structure & Trusts
2.3 Group Policies
2.4 Authentication
2.5 Controlling Access
2.6 Securing Computers Resources & Communications
2.7 Non-Microsoft Clients
3.0 Controlling Administrative Access
3.1 Administrative Access
3.2 Controlling Access
3.3 Using Terminal Services
3.4 Installing Terminal Services
4.0 Design Issues for User Accounts
4.1 Account Policies
4.2 Group Policy Object
4.3 Strategies for User Creation
4.4 Delegation of Authority
4.5 Auditing User Actions
5.0 Computer Security
5.1 Physical Security
Level 2
1.0 Security Baselines
1.1 What is a Baseline?
1.2 Deploying Security Templates
2.0 Securing a File & Print Environment
2.1 File System Security & Share Permissions
2.2 Print Resources
2.3 Securing the Registry
2.4 Securing Data Through EFS
2.5 Securing the Backup/Restore Process
2.6 Viruses
3.0 Securing Network Communications
3.1 Assessing Risk
3.2 Cost of Securing Transmissions
3.3 Application Layer Security
3.4 Protocol Security (IPSEC)
4.0 Securing Access for Non-Microsoft Clients
4.1 UNIX Clients
4.2 NetWare Clients
4.3 Macintosh Clients
4.4 Network Services
Level 3
1.0 Remote Access
1.1 Risks
1.2 Authentication
1.3 Protocols
1.4 Protection Techniques
1.5 Remote Access Policies
1.6 Remote Access Models
1.7 NT 4.0 RAS Sever
1.8 Virtual Private Networks (VPN)
1.9 RADIUS Server
1.10 VPN & RADIUS Example
2.0 Securing Access to Remote Offices
2.1 Connection Methods
2.2 Security at the Router
2.3 VPN's
2.4 Designing Your Solution
3.0 Securing Incoming Internet Access
3.1 Risks (inherit to Internet Access)
3.2 Secure Network Design or Firewall Designs
3.3 Filtering Rules
4.0 Securing Access to the Internet
4.1 Virus Protection
4.2 Modem Control
4.3 Network Address Translation (NAT) Server
4.4 Protecting DNS
4.5 Limiting Access to Internet Services
4.6 User Training
4.7 Proxy Server
4.8 Managing Access through Internet Explorer
Level 4
1.0 Securing Access from External Entities
1.1 What is an Extranet?
1.2 Security Mechanisms
1.3 Applications
1.4 Connection Types
1.5 Active Directory Design Issues
2.0 Designing a Public Key Infrastructure
2.1 What is a PKI?
2.2 Deign Process for a PKI
2.3 Certificate Templates
2.4 Certificate Life Cycle
2.5 Certificate Authorities
2.6 Installing & Configuring PKI
3.0 Designing a Secure Environment
3.1 7 Step Design Process
3.2 Building a Planning Team
3.3 Security Requirements
3.4 Defining the Scope of a Project
3.5 Building a Project Team
3.6 Developing a Plan
3.7 Deployment
3.8 Maintenance
4.0 A Discussion of Business
4.1 The Grand Plan
4.2 Microsoft's Definition of Security
4.3 Managing Resource Access
4.4 Auditing Resource Access
4.5 Proper Authentication
4.6 Encryption of Data
4.7 Understanding Business Process
Keystone.Windows.2000.Design.Network.Security