購物須知 |  常見問題 |  軟體破解 |  問題反應 |  加入最愛 |  查看購物車
xyz軟體王 新品上架 手動下單 查看購物車

xyz軟體王

xyz軟體銀行

當前位置: 網站首頁 >> 專業知識教學 >> 電腦教學認證 >> 商品詳情
會員登錄
最新上架
商品分類

商品詳情

Keystone Windows 2000 Design Network Security 英文光碟正式版 (4片裝)
商品編號:
本站售價:NT$320
碟片片數:4片
瀏覽次數:35071

轉載TXT文檔】  

您可能感興趣:

您可能也喜歡:

商品描述



Keystone Windows 2000 Design Network Security 英文光碟正式版 (4片裝) -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= 軟體名稱:Keystone Windows 2000 Design Network Security 英文光碟正式版 (4片裝) 語系版本:英文版 光碟片數:4片裝 破解說明: 系統支援:WIN 9x/WIN ME/WIN NT/WIN 2000/WIN XP/WIN 2003 軟體類型:電腦教學認證 硬體需求:PC 更新日期:2004/2/11 官方網站:http://www.keystonelearning.com/cgi-bin/ncommerce3/ExecMacro/Category/keystonecat.d2w/report?cgmenbr=7020&cgrfnbr=5452 中文網站:http://www.keystonelearning.com/cgi-bin/ncommerce3/ExecMacro/Category/keystonecat.d2w/report?cgmenbr=7020&cgrfnbr=5452 軟體簡介: 銷售價格:320 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= 軟體簡介: Keystone Windows 2000 Design Network Security 英文光碟正式版 (4片裝)(教學軟體) Keystone 公司: Windows 2000 網路安全設計課程是屬於Windows 2000的 MCSE 課 程之一#70-220,但是這也是在學習 Windows 2000或者應該說是所有的網路的學習 課程都應該重視的一門課程,因為在現在的網路安全已不像是之前的單一網路或是 區域網路了而網路與網路之間的傳遞或是溝通常常是為駭客開啟另一扇大門,所以 如何可以建構一套完整而且安全性高的網路環境是每一個學習網路架設或是管理甚 至是使用者都應該學習的重要課題之一,Keystone公司所推出的教育系列軟體一向 是學習電腦所不可以或缺的重要教學光碟,而這次所推出的教育光碟更是萬中選一 的重要教材之一,內容完整,彙集資料豐富,操作容易而所有的資料及習作更都是 由講師親自操作的哦!!是你所不可以放過的。 Course Description After using his course you will have the skills required to to analyze the business requirements for security and design a security solution that meets business requirements. Detailed Course Outlines: Level 1 1.0 Introduction to Security 1.1 What is Security? 1.2 What is a Risk? 1.3 Types of Attacks 1.4 Risk Analysis 1.5 Acceptable Levels of Security 2.0 Securing the Local Network 2.1 Business Needs 2.2 Domain Structure & Trusts 2.3 Group Policies 2.4 Authentication 2.5 Controlling Access 2.6 Securing Computers Resources & Communications 2.7 Non-Microsoft Clients 3.0 Controlling Administrative Access 3.1 Administrative Access 3.2 Controlling Access 3.3 Using Terminal Services 3.4 Installing Terminal Services 4.0 Design Issues for User Accounts 4.1 Account Policies 4.2 Group Policy Object 4.3 Strategies for User Creation 4.4 Delegation of Authority 4.5 Auditing User Actions 5.0 Computer Security 5.1 Physical Security Level 2 1.0 Security Baselines 1.1 What is a Baseline? 1.2 Deploying Security Templates 2.0 Securing a File & Print Environment 2.1 File System Security & Share Permissions 2.2 Print Resources 2.3 Securing the Registry 2.4 Securing Data Through EFS 2.5 Securing the Backup/Restore Process 2.6 Viruses 3.0 Securing Network Communications 3.1 Assessing Risk 3.2 Cost of Securing Transmissions 3.3 Application Layer Security 3.4 Protocol Security (IPSEC) 4.0 Securing Access for Non-Microsoft Clients 4.1 UNIX Clients 4.2 NetWare Clients 4.3 Macintosh Clients 4.4 Network Services Level 3 1.0 Remote Access 1.1 Risks 1.2 Authentication 1.3 Protocols 1.4 Protection Techniques 1.5 Remote Access Policies 1.6 Remote Access Models 1.7 NT 4.0 RAS Sever 1.8 Virtual Private Networks (VPN) 1.9 RADIUS Server 1.10 VPN & RADIUS Example 2.0 Securing Access to Remote Offices 2.1 Connection Methods 2.2 Security at the Router 2.3 VPN's 2.4 Designing Your Solution 3.0 Securing Incoming Internet Access 3.1 Risks (inherit to Internet Access) 3.2 Secure Network Design or Firewall Designs 3.3 Filtering Rules 4.0 Securing Access to the Internet 4.1 Virus Protection 4.2 Modem Control 4.3 Network Address Translation (NAT) Server 4.4 Protecting DNS 4.5 Limiting Access to Internet Services 4.6 User Training 4.7 Proxy Server 4.8 Managing Access through Internet Explorer Level 4 1.0 Securing Access from External Entities 1.1 What is an Extranet? 1.2 Security Mechanisms 1.3 Applications 1.4 Connection Types 1.5 Active Directory Design Issues 2.0 Designing a Public Key Infrastructure 2.1 What is a PKI? 2.2 Deign Process for a PKI 2.3 Certificate Templates 2.4 Certificate Life Cycle 2.5 Certificate Authorities 2.6 Installing & Configuring PKI 3.0 Designing a Secure Environment 3.1 7 Step Design Process 3.2 Building a Planning Team 3.3 Security Requirements 3.4 Defining the Scope of a Project 3.5 Building a Project Team 3.6 Developing a Plan 3.7 Deployment 3.8 Maintenance 4.0 A Discussion of Business 4.1 The Grand Plan 4.2 Microsoft's Definition of Security 4.3 Managing Resource Access 4.4 Auditing Resource Access 4.5 Proper Authentication 4.6 Encryption of Data 4.7 Understanding Business Process Keystone.Windows.2000.Design.Network.Security -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

..::我的購物車::..