فروشگاه سافت پیک - فروشگاه فیلم های آموزشی شبکه ، گرافیک

فروشگاه سافت پیک - فروشگاه فیلم های آموزشی شبکه ، گرافیک ، سع بعدی ، نرم افزار ، مالتی مدیا ، طراحی وب و برنامه نویسی و آموزش ز

فروشگاه سافت پیک - فروشگاه فیلم های آموزشی شبکه ، گرافیک

فروشگاه سافت پیک - فروشگاه فیلم های آموزشی شبکه ، گرافیک ، سع بعدی ، نرم افزار ، مالتی مدیا ، طراحی وب و برنامه نویسی و آموزش ز

آموزش Microsoft Windows Server 2003(70-298) Tutorials



آموزش Microsoft Windows Server 2003 (70-298) Tutorialsمحصول موسسه آموزشی VTC به مدت زمان 7 ساعت ارائه شده در قالب 1 حلقه CD

Network Security Design
Intro and Overview
Analyze Existing Policies
Organizational Requirements
Principles of Security Design
Analyze Risks to Current Administration
Design a Recovery Process
Creating the Security Framework
Security Guideposts
Design Segmented Networks
Identify Technology Limitations
Analyze Interoperability Constraints
Threat Modeling
Logical Security Design
Designing Public Key Infrastructure
Public Key Cryptography
Certificate Services
Microsoft Certification Services
Design a CA Hierarchy
Trusted CA
Design Security for CA Servers
Certificate Enrollment Process
Design Certification Enrollment
Separating CA Admin Roles
Design Trust Models
Domain/Trees/Forests
External and Internal Trusts
Shortcut/Realm/Cross-Forest Trusts
Restricting Trust Relationships
Design Administration of Servers
Software Update Services
Using SUS
Design SUS Infrastructure
Identify Current Patch Level
Microsoft Baseline Security Analyzer
Creating a Baseline Analysis
Physical Security Design
Design Network Infrastructure Security
Firewall Configuration
Active Directory Considerations
Design an IPSec Policy
Enabling IPSec
IPSec Policy Rules
Configuring IPSec Policy
IPSec Policy Example pt. 1
IPSec Policy Example pt. 2
Securing DNS Traffic
Security for Wireless Networks
Wireless Network Threats
Wireless Encryption and Security
Design 802.1x Authentication pt. 1
Design 802.1x Authentication pt. 2
Secure Communication Between Networks
Designing Security for IIS
Controlling Access to Web Sites
Design IIS Authentication
User Authentication Using Certificates
Design VPN Connectivity
Remote Access Protocols
Setting Up a VPN
Router to Router VPN
Select Protocols for VPN Access
Design Secure VPN Connectivity
Demand Dial Routing
Design Secure Demand Dial Routing
Configuring NAT
Configuring a Firewall
Security Templates for Server Systems
Understanding Security Templates
Modify Security Templates
Security Configuration and Analysis
Security Template Best Practices
Design An Access Control Strategy
Design an Access Control Strategy
Create a Delegation Strategy
Delegating Control
Analyze Auditing Requirements
Using NTFS Permissions
NTFS Permission Behavior
Share and NTFS Permissions
The Effective Permission
Access Control for Files and Folders
Backup and Recovery Strategy
EFS Strategy
Permissions for Registry Objects
Design a Group Strategy
Design Client Infrastructure Security
Design a Client Authentication Strategy
Analyze Authentication Requirements
Hardening Client Operating Systems
Strategy for Client Remote Access
Remote Access Policies
Default Remote Access Policies
Create a Remote Access Policy
Remote Access Authentication Protocols
Design Authentication Using IAS
Authenticating with IAS
Configuring the IAS Server


برای کسب اطلاعات بیشتر کلیک کرده...

نظرات 0 + ارسال نظر
برای نمایش آواتار خود در این وبلاگ در سایت Gravatar.com ثبت نام کنید. (راهنما)
ایمیل شما بعد از ثبت نمایش داده نخواهد شد