MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network: Study Guide and DVD Training System (Exam 70-214)
Chapter 1: Basic Windows 2000 Security: Using Security Templates
- Head of the Class…Active Directory: It's Just a Big Database
- Head of the Class…Group Policy Security Versus Security Templates
- Damage & Defense…Password Age Policies
- Notes from the Underground…Brute-Force Attacks
- Damage & Defense…Shutting Out Hackers
- Damage & Defense…Safety First!
Chapter 2: Advanced Security Template and Group Policy Issues
- Notes from the Underground…Buffer Overrun Heaven
- Damage & Defense…The Importance of Updating IIS
- Head of the Class…Watch Where You Assign Blame
- Head of the Class…Protect That Laptop
Chapter 3: Identifying, Installing, and Troubleshooting Required Updates
- Damage & Defense…Get Those Hotfixes!
- Notes from the Underground…You're Not Alone
- Head of the Class…Test, Backup, Deploy
Chapter 4: Installing, Configuring, & Managing Windows 2000 Certificate Authorities
- Head of the Class…The Need for Stand-alone CAs
- Damage & Defense…Revoke Those Certificates
- Notes from the Underground…Nothing in Life Is Perfect
Chapter 5: Managing and Troubleshooting the Encrypting File System
- Head of the Class…Public Key Cryptography
- Damage & Defense…Encryption Does Not Apply to Diskettes
- Notes from the Underground…Watch the Recovery Agents!
- Head of the Class…The EFS Callback Functions
Chapter 6: Configuring and Troubleshooting Windows IP Security
- Damage & Defense…The Importance of Password Policies
- Notes from the Underground…Nothing in Life Is Perfect
- Head of the Class…IPSec Finer Points
Chapter 7: Implementing Secure Wireless Networks
- Head of the Class…So What Are 802.1x and 802.11x, Exactly?
- Damage & Defense…Preventing Dictionary Attacks Using EAP
- Head of the Class…The Legal Status of War Driving and Responsibility of Wireless Network Owners and Operators
- Notes from the Underground…MAC Spoofing
- Head of the Class…More Information on WEP
Chapter 8: Configuring Secure Network and Internet Authentication Methods
- Damage & Defense…No Replay Here
- Notes from the Underground…Safe Kerberos
- Head of the Class…Verifying Your Encryption Level
- Head of the Class…Allow IIS to Control Password
Chapter 9: Configuring and Troubleshooting Remote Access and VPN Authentication
- Head of the Class…Hash: Not Just for Breakfast Anymore
- Head of the Class…RAS versus RRAS: What's the Difference?
- Notes from the Underground…Identify Remote Users
- Head of the Class…Why Do We Need to Worry About an RAS Server? No One Uses Them Anymore, Right?
- Damage & Defense…Considerations for L2TP Ports
- Damage & Defense…NAT and the End User's Home Network
Chapter 10: Configuring and Using Auditing and the Event Logs
- Notes from the Underground…Don't Overdo It
- Head of the Class…Test Your Policies
- Damage & Defense…Auditing and Your Security Policy
- Notes from the Underground…Hack Alert, Hack Alert!
Chapter 11: Responding to and Recovering from Security Breaches
- Damage & Defense…Proactive versus Reactive Security Management
- Notes from the Underground…Back Orifice
- Notes from the Underground…BSOD with SMBdie
- Head of the Class…Forensic Procedures