computer training image
Online Training Classes Purchased Securely
Shopping cart  Shopping cart
0 Product(s) in cart
Total $0.00
> Checkout
Online Payments

Benefits of Computer Coach's online computer training classes

  • Accessible 24 hours a day 7 days a week, so you can learn when you have time.
  • Cost-effective solutions, so you don’t go broke learning the skills you need.
  • Available Anytime, anywhere with an Internet connection, so you can study at your house, office, or where you feel comfortable.
  • Interactive & fun courses allow for greater retention of course topics.
  • Easy to use so you can start learning right away.
  • Full of hands-on labs so you can get the practice you need
  • HTML Based so you don’t need any additional downloads
  • Live Mentor Available to ask questions and get clarification

online computer training questions answered

Page Windows 2000 Security Design 70-220 Online Course

12 Month Subscription - $70
Live Mentor +$30

Summary:
This series provides a detailed look at network security, and is intended as preparation for the MCSE 70-220 Exam: Designing Security for a Microsoft Windows 2000 Network. Topics include analyzing business and technical requirements, planning a strategy, and designing and implementing security using the templates, objects, and services provided in Windows 2000. Students taking this course should be advanced Windows administrators, with MCSE certifications 70-210, 70-215, 70-216, and 70-217 or equivalent experience.

Audience:
This series is for anyone who wants to take the MCSE Exam 70-220 for Windows 2000 certification.

Features:
●  Exercises that allow users to practice the application
●  A file containing the text of the exercises
●  Simulations that allow users to practice course skills, even if they don't have access to the application
●  A glossary
●  A Skill Assessment

Certification:
Windows 2000 Security Design MCSE 70-220

Topics included in this course:
Windows 2000 Security Design 70-220:1 Analyzing Business Requirements 
Windows 2000 Security Design 70-220:2 Analyzing Technical Requirements 
Windows 2000 Security Design 70-220:3 Establishing a Security Baseline 
Windows 2000 Security Design 70-220:4 Planning Security for System Resources
Windows 2000 Security Design 70-220:5 Designing a Security Group Strategy 
Windows 2000 Security Design 70-220:6 Designing Security Policy Inheritance  
Windows 2000 Security Design 70-220:7 Protecting Resources with Auditing and Encryption 
Windows 2000 Security Design 70-220:8 Using Native Windows 2000 Authentication 
Windows 2000 Security Design 70-220:9 Using Alternate Authentication Strategies 
Windows 2000 Security Design 70-220:10 Designing a Public Key Infrastructure 
Windows 2000 Security Design 70-220:11 Designing Security for Network Services  
Windows 2000 Security Design 70-220:12 Designing Security for Access between Networks  
Windows 2000 Security Design 70-220:13 Designing Security for Communications Channels

Windows 2000 Security Design 70-220:1 Analyzing Business Requirements 
Summary:
This course shows users how to identify business considerations that will affect the structure and implementation of proposed network security designs.

Objectives:
After completing this course, students will be able to:
Analyze existing and planned business models, including company model, geographic scope, and company processes
Analyze existing and planned organizational structures
Analyze the structure of IT management
List factors that influence company strategies
Outline the current physical model and information security model
Analyze business and security requirements for the end user
Calculate internal and external security risks

Topics:
Business Models
Organization and Management
Company Strategies
Physical and Information Security Models
Risk Analysis
End User Requirements
top

Windows 2000 Security Design 70-220:2 Analyzing Technical Requirements 
Summary:
This course shows users how to evaluate an existing IT infrastructure in preparation for developing a security design.

Objectives:
After completing this course, students will be able to:
Evaluate the company's existing and planned technical environment
Analyze company size and user and resource distribution
Assess available connectivity between work sites and remote sites
Assess net available bandwidth
Analyze performance requirements
Analyze the method of accessing data and systems
Analyze network roles and responsibilities
Analyze the impact of a proposed security design on the existing and planned technical environment

Topics:
Network Connectivity and Topology
Network Bandwidth and Performance
Data and Systems Access
Roles and Responsibilities
Analyzing the Existing Security Design
top

Windows 2000 Security Design 70-220:3 Establishing a Security Baseline 
Summary:
This course introduces users to the security provided by Active Directory and shows users how to implement security for domain controllers, servers, and workstations using security templates provided by Windows 2000.

Objectives:
After completing this course, students will be able to:
Describe the role of security templates and domain security policies in establishing a security baseline
Create and modify security templates to implement a standard level of security
Identify the level of security that standard security templates provide for domain controllers and operations masters
Identify the level of security that standard security templates provide for servers, desktop computers, portable computers, and kiosks

Topics:
Active Directory
Domain Controllers
Servers, Desktop Computers, and Kiosks
Policies and Templates
top

Windows 2000 Security Design 70-220:4 Planning Security for System Resources
Summary:
This course shows users how to plan and implement security for system resources including printers, files, shares, registry keys, Internet access, and dial-in access.

Objectives:
After completing this course, students will be able to:
Use file system and share permissions to provide security for files and folders
Analyze the default permissions provided for files and folders
Analyze user and system access to registry keys
Analyze the permissions structure governing printers, dial-in access, and Internet access

Topics:
File and Folder Security
Default Settings for Files and Folders
Registry Keys
Security for Other Resources
top

Windows 2000 Security Design 70-220:5 Designing a Security Group Strategy 
Summary:
This course shows users how to plan membership in security groups and how to use group structure to assign permissions.

Objectives:
After completing this course, students will be able to:
Identify the types and scopes of groups in Windows 2000
Identify default groups and user accounts
Design a security group strategy
Design a delegation of authority strategy

Topics:
Understanding Groups in Windows 2000
Default Groups and Users
Managing Security Groups
Delegation of Authority
top

Windows 2000 Security Design 70-220:6 Designing Security Policy Inheritance  
Summary:
This course shows users how to design the placement and inheritance of security policies for sites, domains, and organizational units.

Objectives:
After completing this course, students will be able to:
Describe Group Policy and its application
Create, edit, apply, and import Group Policies
Explain the inheritance relationships among Group Policies in an Active Directory hierarchy
Explain how Group Policies are implemented in mixed-mode environments
Design a Group Policy strategy

Topics:
Understanding Group Policies
Implementing Group Policies
Group Policy Inheritance
Group Policies in Mixed Mode
Designing Group Policy Strategies
top

Windows 2000 Security Design 70-220:7 Protecting Resources with Auditing and Encryption 
Summary:
This course shows users how to design and implement an audit policy and how to design a strategy for using the Encrypting File System (EFS).

Objectives:
After completing this course, students will be able to:
Design an audit strategy
Implement and configure an audit policy
Describe the encryption provided by the Encrypting File System
Plan for the recovery and management of encrypted files
Design a strategy for securing files and folders with encryption

Topics:
Designing an Audit Policy
Implementing an Audit Policy
Using the Encrypting File System (EFS)
File Recovery and Management with EFS
Designing an EFS Strategy
top

Windows 2000 Security Design 70-220:8 Using Native Windows 2000 Authentication 
Summary:
This course explains the Kerberos authentication model and shows users how to implement security with Kerberos in Windows 2000 networks and mixed networks.

Objectives:
After completing this course, students will be able to:
Describe the security model provided by Windows 2000
Describe Microsoft's implementation of the Kerberos standard
Implement and troubleshoot Kerberos authentication on a Windows 2000 network
Describe the requirements for using Kerberos authentication in mixed networks

Topics:
Kerberos Authentication
Kerberos Tickets
Kerberos Client/Server Exchange
Kerberos and Interoperability
top

Windows 2000 Security Design 70-220:9 Using Alternate Authentication Strategies 
Summary:
This course explains authentication models other than Kerberos that are available under Windows 2000 and shows users how to implement security with these methods in Windows 2000 networks and in mixed networks.

Objectives:
After completing this course, students will be able to:
Explain LM, NTLM, and NTLMv2 authentication and their use in a Windows 2000 environment
Explain digest authentication
Explain the use of certificate-based authentication
Describe Secure Sockets Layer (SSL) transmission
Explain smart cards
Explain RADIUS authentication
Identify the strategies that allow Windows 2000 authentication to interoperate with other operating systems

Topics:
NTLM and Digest Authentication
Certificate-Based Authentication and SSL
Smart Cards
RADIUS
Authentication and Interoperability
top

Windows 2000 Security Design 70-220:10 Designing a Public Key Infrastructure 
Summary:
This course explains strategies and procedures for using Certificate Services in Windows 2000 networks and in mixed networks.

Objectives:
After completing this course, students will be able to:
Design Certificate Authority (CA) hierarchies
Identify certificate server roles
Manage certificates
Integrate with third-party certificate authorities
Map certificates to user accounts

Topics:
Understanding Certificate Services
Installing Certificate Services
Configuring Certificate Services
Managing Certificates
Interoperability and Third-Party PKI
top

Windows 2000 Security Design 70-220:11 Designing Security for Network Services  
Summary:
This course explains strategies for securing Windows 2000 network services, including Domain Name Service, Remote Installation Services, and the Simple Network Management Protocol.

Objectives:
After completing this course, students will be able to:
Identify key security risks connected with the Domain Name Service (DNS)
Describe the dynamic DNS update process
Design Windows 2000 DNS security
Design Windows 2000 Remote Installation Services security
Design Windows 2000 SNMP security

Topics:
Understanding DNS
The Dynamic Update Process
DNS Security
RIS Security
SNMP Security
top

Windows 2000 Security Design 70-220:12 Designing Security for Access between Networks  
Summary:
This course explains how to provide secure access from a private network to the Internet, how to provide partners and other external users with secure access to private networks, and how to provide secure access between multiple local or wide area networks (LANs or WANs).

Objectives:
After completing this course, students will be able to:
Provide secure access to public networks from a private network
Provide external users with secure access to private network resources
Provide secure access for users using Remote Access Services
Provide secure access between private networks
Use public networks to provide secure access between private networks

Topics:
Secure Access to Public Networks
Secure Access for External and Remote Users
Secure Access between Private Networks
Secure Access across Public Networks
top

Windows 2000 Security Design 70-220:13 Designing Security for Communications Channels
Summary:
This course explains how to use SMB signing and the IPSec protocol to secure traffic within private networks and across public networks and how to enable and enforce the use of SMB signing and IPSec through Windows 2000 Group Policy.

Objectives:
After completing this course, students will be able to:
Explain SMB signing
Describe IPSec architecture
Implement an IPSec solution
Design an IPSec management strategy
Design security policies for IPSec

Topics:
SMB Signing
IPSec Architecture
IPSec Negotiation and Encryption
IPSec Management
IPSec Policies
top

12 Month Subscription - $70
Live Mentor +$30