Windows 2000 – Internet and Extranet Security

This course is included in our On-demand training solution.


To enable students to design inbound and outbound Internet security solutions and secure partner access to network and to provide an overview of PKI and enable students to design PKI security solutions

Target Audience

Students preparing for Microsoft exam 70-220; personnel in medium to very large computing environments that use the Windows 2000 network operating system


Experience in designing network infrastructures in environments that support 200-26,000+ users and 5-150+ physical locations using typical network services and applications including file and print, database, messaging, proxy server or firewall, dial-in server, desktop management, and web hosting

Expected Duration

375 min.

Course Objectives

Windows 2000 – Internet and Extranet Security

  • outline approaches to protecting a network against viruses, securing modem connections, and restricting Internet access.
  • identify threats to network security and give an account of how firewalls and screened subnets can increase security.
  • outline how client-side proxy server configurations can be used to increase network security and restrict Internet usage.
  • plan a firewall strategy.
  • plan a strategy to allow Internet access while maintaining local network security.
  • outline the security benefits of firewalls, identify methods for screening network data, and analyze firewall requirements for a network.
  • outline the approaches used for implementing firewalls as barriers to the network and identify security issues relating to firewall placement and public access.
  • plan the position of firewalls within a network and select rules to apply to firewalls.
  • identify requirements for granting network access to business partners.
  • list methods of increasing security for extranet access, and outline security considerations for implementing dial-up access to an extranet.
  • assess the security requirements for connecting two networks.
  • identify the uses of Active Directory in managing partner access and give an account of trust relationships.
  • plan a strategy for sharing network information securely between partners.
  • define public key infrastructure’s (PKI’s) function, outline the elements of PKI, and identify requirements for certificate use.
  • outline certificate types and templates and give details of a certificate’s life span.
  • identify Certificate Authority (CA) types and hierarchies.
  • outline the components of a public key infrastructure (PKI) maintenance plan, back up a Certificate Authority (CA), and restore a CA’s logs from a backup.
  • back up and restore a Certificate Authority (CA).
  • identify uses of public key infrastructure (PKI) in network security and assess Certificate Authority (CA) requirements on a network.
  • identify the structure of a Certificate Authority (CA) hierarchy, outline the function of each level, and list criteria that determine CA organization.
  • structure a Certificate Authority (CA) hierarchy according to organizational requirements.
  • give an account of certificate-mapping issues.
  • design a certificate-mapping strategy.