Beställningsvara. Skickas inom 7-10 vardagar. Fri frakt för medlemmar vid köp för minst 249 kr.
You can get there The Network Security Fundamentals Project Manual offers a wealth of easy-to-read, practical, and up-to-date activities that reinforce fundamental network security concepts. You will develop the core competencies and skills you'll need in the real world, including how to:* Install Network Monitor and capture traffic* Encrypt files using folder properties and the cipher command* Install and use Certificate Services* Configure an IPsec policy that requires authentication and encryption* Use RSoP to view effective policy settings* Configure Automatic Updates using the System utility and Group Policy* Choose an IDS and position it on a network With five to seven projects per chapter ranging from easy to more advanced, the Network Security Fundamentals Project Manual is ideal for both traditional and online courses and is an excellent companion to Cole's Network Security Fundamentals ISBN: 978-0-470-10192-6. Wiley Pathways helps you achieve your goals The texts and project manuals in this series offer a coordinated curriculum for learning information technology. Learn more at www.wiley.com/go/pathways.
Rachelle Reese has been designing and developing technical training courses for over ten years and has written a number of books on programming. She has an MA from San Jose State University. She is also a Microsoft Certified Application Developer (MCAD).
1. Computer and Network Security Principles1.1. Identifying and Analyzing Risk 21.2. Installing Windows XP Professional 61.3. Installing Windows Server 2003 91.4. Using Microsoft Security Baseline Analyzer 131.5. Viewing Local Security Policy 181.6. Creating a Written Security Policy 242. Network and Server Security2.1. Managing Server Roles 282.2. Managing Services and Ports 342.3. Using Network Monitor 382.4. Configuring Windows Firewall 422.5. Designing Border Security 453. Cryptography3.1. Understanding Cryptography Concepts 483.2. Managing Driver Signing 493.3. Using Encrypting File System 533.4. Installing Certificate Services 573.5. Managing Certificate Authority Trusts 633.6. Requesting and Issuing Certificates 673.7. Revoking Certificates 704. Authentication4.1. Comparing Credentials 754.2. Creating User Accounts 764.3. Configuring an Active Directory Domain Controller 824.4. Joining a Domain 894.5. Managing Password and Account Lockout Policies 934.6. Managing Authentication Protocols 1014.7. Managing Logon Restrictions 1035. Authorization and Access Control5.1. Comparing Access Control Models 1115.2. Managing Groups 1125.3. Assigning Permissions 1175.4. Troubleshooting Effective Permissions 1255.5. Viewing User Right Assignments 1296. Securing Network Transmission6.1. Designing Network Perimeters 1336.2. Implementing IP Address Filtering on IIS 1356.3. Using IPsec Default Policies 1396.4. Implementing Packet Filtering with IPsec 1436.5. Implementing IPsec Encryption 1507. Remote Access and Wireless Security7.1. Understanding Remote Access Protocols and Wireless Security 1567.2. Designing Remote Access and Wireless Access 1587.3. Enabling Routing and Remote Access 1607.4. Configuring a Dial-up Client 1667.5. Configuring a VPN Client 1717.6. Defining Remote Access Policies 1768. Server Roles and Security8.1. Using Default Templates 1838.2. Creating and Applying a Baseline Template 1888.3. Creating and Applying an Incremental Template 1938.4. Securing DNS 1978.5. Securing a File Server 2038.6. Securing a Web and FTP Server 2099. Protecting Against Malware9.1. Identifying Malware 2179.2. Comparing Antivirus, Anti-Spyware, and Anti-Malware Programs 2189.3. Creating a Managed Computer 2219.4. Securing Internet Explorer 2249.5. Securing Outlook Express 23210. Ongoing Security Management10.1. Configuring Automatic Updates 23710.2. Configuring Auditing 24110.3. Using Event Viewer 24510.4. Performing Remote Management with MMC 25010.5. Using Telnet 25610.6. Using Remote Desktop for Administration 26011. Disaster Recovery and Fault Tolerance11.1. Planning for the Worst 26411.2. Responding to a Security Incident 27011.3. Configuring Backups 27211.4. Planning a RAID Configuration 28211.5. Eliminating Single Points of Failure 28412. Intrusion Detection and Forensics12.1. Understanding Terminology 28812.2. Comparing Intrusion Detection System Types 29012.3. Investigating the Honeynet Project 29212.4. Using Forensics Tools 29412.5. Investigating an Attack 299