Microsoft Windows Server 2003 (70-298) Training
CD Contents For This Title
All the chapters and lesson contents of Microsoft Windows Server 2003 (70-298) are listed below.
To help you evaluate our training, we have made some of the tutorials for Microsoft Windows Server 2003 (70-298) freely available. Click on any of the linked lesson listings below to preview FREE!
To help you evaluate our training, we have made some of the tutorials for Microsoft Windows Server 2003 (70-298) freely available. Click on any of the linked lesson listings below to preview FREE!
Microsoft exam 70-298, \"Designing Security for a Microsoft Windows® Server 2003 Network\" is a core requirement for the MCSE (Microsoft Certified Systems Engineer) on Microsoft Windows® 2003. It is designed for candidates who \"operate in medium to very large computing environments that use the Windows Server 2003 network operating system.\" VTC author, Brian Culp, discusses analyzing, designing, and configuring security for networks. The tutorial provides real-world job situations and solutions, as well as solid source material to take and pass the 70-298 test. To begin learning today, simply click on one of the Microsoft Windows® Server 2003 (70-293) lessons.
Choose your media type:
To view the Free Tutorials listed below, you must have QuickTime installed. Please note that the online free samples have been compressed for quicker downloads. Purchased CDs have higher sound and video quality.
Monitor resolution needs to be set to at least 1024 by 768 to view the entire movie.
Monitor resolution needs to be set to at least 1024 by 768 to view the entire movie.
Network Security Design
|
||
Intro and Overview | (05:30) | |
Analyze Existing Policies | (06:57) | |
Organizational Requirements | (06:15) | |
Principles of Security Design | (05:43) | |
Analyze Risks to Current Administration | (04:02) | |
Design a Recovery Process | (04:49) | |
Creating the Security Framework
|
||
Security Guideposts | (03:33) | |
Design Segmented Networks | (04:47) | |
Identify Technology Limitations | (04:43) | |
Analyze Interoperability Constraints | (03:24) | |
Threat Modeling | (05:03) | |
Logical Security Design
|
||
Designing Public Key Infrastructure | (04:30) | |
Public Key Cryptography | (04:57) | |
Certificate Services | (05:37) | |
Microsoft Certification Services | (04:20) | |
Design a CA Hierarchy | (05:28) | |
Trusted CA | (03:46) | |
Design Security for CA Servers | (02:59) | |
Certificate Enrollment Process | (04:55) | |
Design Certification Enrollment | (05:08) | |
Separating CA Admin Roles | (04:46) | |
Design Trust Models | (04:20) | |
Domain/Trees/Forests | (05:02) | |
External and Internal Trusts | (06:26) | |
Shortcut/Realm/Cross-Forest Trusts | (05:07) | |
Restricting Trust Relationships | (04:19) | |
Design Administration of Servers | (04:27) | |
Software Update Services | (02:44) | |
Using SUS | (03:48) | |
Design SUS Infrastructure | (03:31) | |
Identify Current Patch Level | (02:28) | |
Microsoft Baseline Security Analyzer | (02:07) | |
Creating a Baseline Analysis | (04:35) | |
Physical Security Design
|
||
Design Network Infrastructure Security | (06:01) | |
Firewall Configuration | (04:20) | |
Active Directory Considerations | (04:15) | |
Design an IPSec Policy | (04:22) | |
Enabling IPSec | (05:11) | |
IPSec Policy Rules | (04:05) | |
Configuring IPSec Policy | (05:10) | |
IPSec Policy Example pt. 1 | (04:32) | |
IPSec Policy Example pt. 2 | (04:28) | |
Securing DNS Traffic | (04:10) | |
Security for Wireless Networks | (04:00) | |
Wireless Network Threats | (05:10) | |
Wireless Encryption and Security | (05:40) | |
Design 802.1x Authentication pt. 1 | (03:26) | |
Design 802.1x Authentication pt. 2 | (03:49) | |
Secure Communication Between Networks
|
||
Designing Security for IIS | (05:37) | |
Controlling Access to Web Sites | (06:44) | |
Design IIS Authentication | (03:52) | |
User Authentication Using Certificates | (04:58) | |
Design VPN Connectivity | (02:45) | |
Remote Access Protocols | (06:59) | |
Setting Up a VPN | (06:41) | |
Router to Router VPN | (05:17) | |
Select Protocols for VPN Access | (02:55) | |
Design Secure VPN Connectivity | (04:39) | |
Demand Dial Routing | (06:23) | |
Design Secure Demand Dial Routing | (04:09) | |
Configuring NAT | (06:24) | |
Configuring a Firewall | (06:22) | |
Security Templates for Server Systems | (03:19) | |
Understanding Security Templates | (04:53) | |
Modify Security Templates | (03:32) | |
Security Configuration and Analysis | (04:20) | |
Security Template Best Practices | (04:13) | |
Design An Access Control Strategy
|
||
Design an Access Control Strategy | (05:04) | |
Create a Delegation Strategy | (02:59) | |
Delegating Control | (06:28) | |
Analyze Auditing Requirements | (03:58) | |
Using NTFS Permissions | (03:19) | |
NTFS Permission Behavior | (05:15) | |
Share and NTFS Permissions | (05:49) | |
The Effective Permission | (02:11) | |
Access Control for Files and Folders | (04:33) | |
Backup and Recovery Strategy | (04:20) | |
EFS Strategy | (04:31) | |
Permissions for Registry Objects | (04:55) | |
Design a Group Strategy | (04:45) | |
Design Client Infrastructure Security
|
||
Design a Client Authentication Strategy | (02:51) | |
Analyze Authentication Requirements | (03:31) | |
Hardening Client Operating Systems | (04:25) | |
Strategy for Client Remote Access | (03:18) | |
Remote Access Policies | (06:24) | |
Default Remote Access Policies | (07:05) | |
Create a Remote Access Policy | (05:50) | |
Remote Access Authentication Protocols | (06:55) | |
Design Authentication Using IAS | (02:51) | |
Authenticating with IAS | (05:31) | |
Configuring the IAS Server | (06:33) | |
Credits
|
||
About this Author | (01:00) |
Title Information / Pricing
Title: | Microsoft Windows Server 2003 (70-298) |
Author: | Brian Culp |
SKU: | 33524 |
ISBN: | 1-932808-02-7 |
Release Date: | 2004-08-26 |
Price: | |
Duration: | 7 hrs / 92 lessons |
Work Files: |
No |
Captions: | No |
Compatibility: |
Vista/XP/2000, OS X, Linux QuickTime 7 |
Online University Access all our Training for only 30
The Online University provides unlimited 24/7 access to ALL of VTC's incredible training content for the low fixed price of just $30/month (USD)
Related Titles
Select Bandwidth
Now Shipping
Client Testimonials
I have now completed the entire set of tutorials for your PowerPoint 2007 course at the Virtual Training Company. May I say that you have...
Mrs N Rambally