Home
Username:
Password:
Microsoft Windows Server 2003 (70-298) Training

CD Contents For This Title

 All the chapters and lesson contents of Microsoft Windows Server 2003 (70-298) are listed below.

To help you evaluate our training, we have made some of the tutorials for Microsoft Windows Server 2003 (70-298) freely available. Click on any of the linked lesson listings below to preview FREE!

Microsoft exam 70-298, \"Designing Security for a Microsoft Windows® Server 2003 Network\" is a core requirement for the MCSE (Microsoft Certified Systems Engineer) on Microsoft Windows® 2003. It is designed for candidates who \"operate in medium to very large computing environments that use the Windows Server 2003 network operating system.\" VTC author, Brian Culp, discusses analyzing, designing, and configuring security for networks. The tutorial provides real-world job situations and solutions, as well as solid source material to take and pass the 70-298 test. To begin learning today, simply click on one of the Microsoft Windows® Server 2003 (70-293) lessons.

Choose your media type:


QT To view the Free Tutorials listed below, you must have QuickTime installed. Please note that the online free samples have been compressed for quicker downloads. Purchased CDs have higher sound and video quality.
Monitor resolution needs to be set to at least 1024 by 768 to view the entire movie.

Network Security Design
  Intro and Overview (05:30)
  Analyze Existing Policies (06:57)
  Organizational Requirements (06:15)
  Principles of Security Design (05:43)
  Analyze Risks to Current Administration (04:02)
  Design a Recovery Process (04:49)
Creating the Security Framework
  Security Guideposts (03:33)
  Design Segmented Networks (04:47)
  Identify Technology Limitations (04:43)
  Analyze Interoperability Constraints (03:24)
  Threat Modeling (05:03)
Logical Security Design
  Designing Public Key Infrastructure (04:30)
  Public Key Cryptography (04:57)
  Certificate Services (05:37)
  Microsoft Certification Services (04:20)
  Design a CA Hierarchy (05:28)
  Trusted CA (03:46)
  Design Security for CA Servers (02:59)
  Certificate Enrollment Process (04:55)
  Design Certification Enrollment (05:08)
  Separating CA Admin Roles (04:46)
  Design Trust Models (04:20)
  Domain/Trees/Forests (05:02)
  External and Internal Trusts (06:26)
  Shortcut/Realm/Cross-Forest Trusts (05:07)
  Restricting Trust Relationships (04:19)
  Design Administration of Servers (04:27)
  Software Update Services (02:44)
  Using SUS (03:48)
  Design SUS Infrastructure (03:31)
  Identify Current Patch Level (02:28)
  Microsoft Baseline Security Analyzer (02:07)
  Creating a Baseline Analysis (04:35)
Physical Security Design
  Design Network Infrastructure Security (06:01)
  Firewall Configuration (04:20)
  Active Directory Considerations (04:15)
  Design an IPSec Policy (04:22)
  Enabling IPSec (05:11)
  IPSec Policy Rules (04:05)
  Configuring IPSec Policy (05:10)
  IPSec Policy Example pt. 1 (04:32)
  IPSec Policy Example pt. 2 (04:28)
  Securing DNS Traffic (04:10)
  Security for Wireless Networks (04:00)
  Wireless Network Threats (05:10)
  Wireless Encryption and Security (05:40)
  Design 802.1x Authentication pt. 1 (03:26)
  Design 802.1x Authentication pt. 2 (03:49)
Secure Communication Between Networks
  Designing Security for IIS (05:37)
  Controlling Access to Web Sites (06:44)
  Design IIS Authentication (03:52)
  User Authentication Using Certificates (04:58)
  Design VPN Connectivity (02:45)
  Remote Access Protocols (06:59)
  Setting Up a VPN (06:41)
  Router to Router VPN (05:17)
  Select Protocols for VPN Access (02:55)
  Design Secure VPN Connectivity (04:39)
  Demand Dial Routing (06:23)
  Design Secure Demand Dial Routing (04:09)
  Configuring NAT (06:24)
  Configuring a Firewall (06:22)
  Security Templates for Server Systems (03:19)
  Understanding Security Templates (04:53)
  Modify Security Templates (03:32)
  Security Configuration and Analysis (04:20)
  Security Template Best Practices (04:13)
Design An Access Control Strategy
  Design an Access Control Strategy (05:04)
  Create a Delegation Strategy (02:59)
  Delegating Control (06:28)
  Analyze Auditing Requirements (03:58)
  Using NTFS Permissions (03:19)
  NTFS Permission Behavior (05:15)
  Share and NTFS Permissions (05:49)
  The Effective Permission (02:11)
  Access Control for Files and Folders (04:33)
  Backup and Recovery Strategy (04:20)
  EFS Strategy (04:31)
  Permissions for Registry Objects (04:55)
  Design a Group Strategy (04:45)
Design Client Infrastructure Security
  Design a Client Authentication Strategy (02:51)
  Analyze Authentication Requirements (03:31)
  Hardening Client Operating Systems (04:25)
  Strategy for Client Remote Access (03:18)
  Remote Access Policies (06:24)
  Default Remote Access Policies (07:05)
  Create a Remote Access Policy (05:50)
  Remote Access Authentication Protocols (06:55)
  Design Authentication Using IAS (02:51)
  Authenticating with IAS (05:31)
  Configuring the IAS Server (06:33)
Credits
  About this Author (01:00)

Title Information / Pricing

Title: Microsoft Windows Server 2003 (70-298)
Author: Brian Culp
SKU: 33524
ISBN: 1-932808-02-7
Release Date: 2004-08-26
Price:
Duration: 7 hrs / 92 lessons
Work Files: No
Captions: No
Compatibility: Vista/XP/2000, OS X, Linux
QuickTime 7

Online University Access all our Training for only 30

The Online University provides unlimited 24/7 access to ALL of VTC's incredible training content for the low fixed price of just $30/month (USD)


Related Titles

 

Select Bandwidth

Click "High Bandwidth" if you want to view movies at the highest quality available. Click "Low Bandwidth" if on a slow dial-up connection. The low bandwidth movies are slightly more compressed and smaller in file size, allowing for faster streaming.

* Bandwidth selection only available for QuickTime versions of tutorials, not Flash.


Select:

Now Shipping

Autodesk Sketchbook Pro 6 for Desktop and iPad

Autodesk Sketchbook Pro 6 for Desktop and iPad

View the first three chapters of this tutorial FREE!


Client Testimonials

I have had my share of many tutorials for years; but, Mark Bremmer's lessons on Poser 7 have left me speechless! I love this guy! VTC should be...

Kevin Parviz