Windows 2000 – Managing and Securing Resources

This course is included in our On-demand training solution.

Overview

To enable students to design suitable administrative structures for Active Directory, to design security for users and groups, and to explain the resource and data security requirements for Windows 2000 computers.

Target Audience

Students preparing for Microsoft exam 70-220; personnel in medium to very large computing environments that use the Windows 2000 network operating system

Prerequisites

Experience in designing network infrastructures in environments that support 200-26,000+ users and 5-150+ physical locations using typical network services and applications including file and print, database, messaging, proxy server or firewall, dial-in server, desktop management, and web hosting

Expected Duration

345 min.

Course Objectives

Windows 2000 – Managing and Securing Resources

  • assess administrative model requirements for an organization.
  • identify secure structures and hierarchies when planning an administrative model.
  • design an administrative model for an organization.
  • identify methods of delegating control securely on a network.
  • plan delegation of control on a network.
  • define group types and scopes and identify issues relating to security group implementation.
  • plan a group strategy.
  • identify the function of policies and outline security considerations for their implementation.
  • give an account of Group Policy inheritance and object placement.
  • plan policy inheritance and placement.
  • give an account of security classifications, methods of securing access to resources, permissions, and the security advantages of NTFS.
  • identify data security considerations and outline strategies for data encryption and protection.
  • give an account of auditing and outline considerations for planning an auditing strategy.
  • assign permissions and design an auditing policy.
  • determine and plan appropriate security measures for computers.
  • identify security templates and settings and give an account of network-wide computer security implementation.
  • plan strategies for securing network resources.
  • identify tools and protocols that enable the integration of Windows 2000 networks with UNIX, NetWare, and Macintosh clients.
  • identify secure solutions to interoperability requirements.
  • give an account of authentication strategies.
  • select appropriate authentication protocols.
  • SUBSCRIPTION COST



     

    NEED HELP OR NOT SURE?