Back to home Page

Email Lawson

 

Microsoft Certified System Engineer training series
Learnkey Classic Series Includes (7 Courses): 31 CDs

Session 1


Section A: Introduction
Overview
Windows 2000 Family

Section B: Installation
Hardware Requirements
Upgrade Requirements
Upgrading Windows 98
Clean Installation

Section C: Unattended Installs & Cloning
Automated Installs
Support Tools
Setup Manager
Cloning Windows 2000
Sysprep

Section D: Remote Installation Services
Overview
Setting Up RIS
Installing RIS
RIS Limitations
Client Installation Wizard

Section E: Installation Troubleshooting
Boot Problems
Hardware Compatibility List
Service Packs

Section F: Windows Installer
Overview
Windows Installation Services
Benefits
Active Directory

Section G: Hardware Devices
Overview
Managing Hardware
Device Manager
System Control Panel
Multiple Processors
I/O Devices

Section H: Storage Devices
Hard Disk Support
Management Tools
Create a Partition
Dynamic Disk Volumes
Fault Tolerance
Upgrading from Basic to Dynamic

Total Time: 108 Minutes

Session 2

Section A: Disk Management
File Systems
NTFS 5.0
Mount Volume
Modify Mount

Section B: NTFS Permissions
File System Security
Permissions Properties
Apply Permissions
Deny
NTFS Compression
Copying & Moving

Section C: Quotas
NTFS Quotas
Setup Quotas
Monitoring Quotas
New Quotas

Section D: Encryption
Overview
NTFS Encryption
Encrypted Files
Recovery Agents
Copy & Move Files

Section E: Other Hardware Support
Display Devices
Multiple Monitors
Troubleshoot Video Adapters
Modem Install
Fax Service Management
Fax Properties

Section F: Mobile Computer Management
Mobile Hardware
Power Management
Power Settings
Hibernate

Section G: Networking
Overview
Network Cards
Configure Network Cards
LAN Connection
Server Service
TCP/IP

Section H: TCP/IP Configuration
Overview
IP Address Assignment
Domain Name System
Configure TCP/IP

Total Time: 117 Minutes

Session 3

Section A: TCP/IP Troubleshooting
Ping
Other Utilities
Telnet

Section B: Dial-Up Networking
Dial-Up Wizard
Dial-Up Properties
Network Wizard

Section C: Virtual Private Networks
VPN Overview
VPN Wizard

Section D: Internet Connection
Overview
Configuring ICS
Configuring the Client

Section E: Sharing Resources
Overview
User Setup
Access Control
Share vs. NTFS
Connecting to Resources

Section F: Monitoring Shared Resources
Tools
Share Information
Performance Monitor

Section G: Managing Web Resources
IIS 5.0
Running IIS 5.0
Web Folders

Total Time: 112 Minutes

Session 4

Section A: Printing
MS Technology
Local Printing
Add Printer
Printer Properties
Sharing Printers
Share Properties

Section B: Network Printer
Internet Printing
Connect to Internet Printer
Connect to Network Printer
Active Directory

Section C: Managing Print Jobs
Overview
Printer Jobs
Printer Properties
Redirect Jobs

Section D: Local Accounts
User Accounts
Create Local Users
Add Users
Advanced Management
Create Local Group
Built-in Groups
System Groups
Run As

Section E: GUI Features
Desktop
Display Properties
Personalized Menu
Menu Options
Accessibility Items
Multi-Language

Section F: User Profiles
Overview
Manage Profiles
Roaming Profiles
Mandatory Profiles

Total Time: 107 Minutes

Session 5

Section A: Document Management
My Documents
My Pictures
Offline Folders
Create & User Documents
View Offline Files
Use Offline Folders
Synchronize Offline Files

Section B: Security
Overview
Policies
Account Policies
Local Policies
Security Policies

Section C: Auditing & Group Policies
Auditing
Audit Details
Event Viewer
Group Policies
Create MMC Group Policies
Local Computer Policies
User Policies

Section D: Optimizing Performance
Overview
Signing
Hardware Profiles
Application Performance
Paging Files
Task Scheduler
Performance Monitor

Section E: Disaster Recovery
Windows Backup
Storage Media
Emergency Repair Disk
Safe Boot Options

Section F: Recovery Console
Overview
Using the Console
Limitations
Repair

Total Time: 107 Minutes

 

Session 1
Section A: Introduction
Overview
Our Company
Windows 2000 Family

Section B: Installation
Requirements
Upgrade Requirements
Upgrade Process
Clean Installation
After the Install
Performing the Upgrade
Configuration

Section C: Installation Automation
Unattended Installation
Setup manager
Extracting a File
Setup manager Wizard

Section D: Installation Issues
Sysprep
Running the Unattended Install
Troubleshooting
Service Packs

Section E: Hardware Support
Overview
Driver Signing
Update Drivers
Group Policy
Troubleshooting

Total Time: 89 Minutes

Session 2
Section A: Hard Disk Support
Overview
Basic Upgrade to Dynamic
Disk Manager Service
Volume Types
Configure Volumes

Section B: Fault Tolerance
Overview
RAID 5
Recovering Data
Break & Reestablish Minor

Section C: Volume Mount Point
Overview
Move Folder to New Drive
Mount Volumes
Verify Volume Mount

Section D: NTFS Options
Compression
NTFS vs. FAT Properties
Compress Drives & Folders
Copy & Move Compressed Files
Disk Quotas
Monitoring Quotas
Changing Quotas
Changing Ownership

Section E: User Accounts
Overview
Domain User
Create Local User
User Properties
Access Permissions

Section F: Groups
Overview
Mixed Mode
Native Mode
Creating Groups
Using Groups for Access
Windows 2000 Group Structuring

Total Time: 100 Minutes

Session 3
Section A: Network Connections
Overview
LAN
Configure Connections
New Connection
Network Services
Add Network Services

Section B: Remote Access
Overview
RRAS
Virtual Private Network
Configure RAS & RRAS
Enable RAS & RRAS
Configure Server Properties
Configure Dial-In Ports

Section C: VPN Features
Setup VPN
Filters

Section D: Remote Access Policies
Overview
Create Policy
Permissions
Dial-In Profiles
Default Policy
Accepting Connections
VPN Policies

Section E: Terminal Services
Overview
Requirements
Remote Administration
Application Server Mode
Install Terminal Services

Section F: Terminal Service Licensing
Services Licensing
Licensing Server
Installing Server
Activate Server

Section G: Using Terminal Services
Overview
Add Application
Application Compatibility
Configure Remote User
Use Terminal Service

Total Time: 114 Minutes

Session 4
Section A: Local & Shared Access
Local File Access
Local NTFS Permissions
Shared File Access
Shared Permissions
Permissions Tips

Section B: Distributed File Systems
Overview
DFS Setup
Connect to DFS
DFS Replication
Root Replica

Section C: Web Service
Overview
NTFS Permissions
Web Folders
Configure Folder Security
Access Web Folder

Section D: Printer Access
Overview
Printer Connection
New Printer Port
Share Printer
Find Printer
Printing Control
Permissions & Properties
Internet Printing

Section E: Interoperability
NetWare
Gateway for NetWare
Install Gateway Service
Macintosh
Create Macintosh Shares
Macintosh File Server

Total Time: 107 Minutes

Session 5
Section A: Monitoring Performance
Checking Performance
Use System Monitor
Performance Stats
Monitor % Processor Time
Performance Logs & Baselines

Section B: Optimizing System Performance
Tuning Memory
Page Files
Task Manager
Optimize Disks
Optimize Applications

Section C: Security Policies
Overview
Local Security Policies
Auditing & User Rights Policies
Auditing Setup
Event Log
EFS

Section D: Enterprise Security
Group Policy
Security configuration
Use Security Templates
Security Analysis
Security Templates

Section E: Disaster Recovery
Backup
Backup Wizard
System State Data
Restore Wizard
Safe Boot Options
Recovery Console
Recovery Console Uses

Section F: Troubleshooting
Tools & Tips
Connectivity
Disks
Printing

Total Time: 95 Minutes

 

Session 1

Section A: Windows 2000 Networking
Networking Features
OSI Model
Layered Components
TCP/IP Protocol Architecture
Native ATM
Network Services

Section B: TCP/IP & IPX/SPX Installation
Install Protocols
TCP/IP Properties
DNS & WINS
IPX/SPX Properties

Section C: Network Bindings & Packet Filters
Network Bindings
TCP/IP Packet Filtering
Enable Filtering

Section D: DHCP Installation
Features
How DHCP Works
Install DHCP

Section E: DHCP Scoping
Scopes
Create Scopes
Superscopes
Create Superscope
Multicast Scope
Create Multicast Scope

Section F: DHCP Options
Server Wide
Scope Wide
Authorize
Verify DHCP
Monitoring DHCP
Conflict Detection
Reservations
Performance Monitor

Total Time: 104 Minutes

Session 2

Section A: IP Routing
Routing Example
Protocols
RIP & OSPF
OSPF Areas
ROUTE Command

Section B: RIP Routing
Enable Routing
Connection 1
Connection 2
Routing Table
Verify Routing

Section C: OSPF & Static Routing
Add OSPF
OSPF Properties
Connection 1
Connection 2
OSPF Stats
Add Static Routes
Routing Table

Section D: Demand-Dial Routing
Other Routing Service
Features
Example
Add Interface
Properties
Demand-Dial Filters
Add IP Filter

Section E: Monitoring Traffic
Overview
Performance Monitor

Section F: LAN Internet Connection Shearing
Introduction
Features
Configure NAT
ICS Addresses
DHCP
DNS

Section G: Modem Internet Connection Sharing
Dial-Up Connection
Internet Connection Wizard
Dial-Up Properties
Enable ICS

Total Time: 98 Minutes

Session 3

Section A: IP Security
Features
Options
IPSec Snap-In
Policy Details
Transport Mode
Filter Settings
Key Exchange

Section B: IPSec Assignment
Secures Server
Group Policy
Assign Policy
IPSec Verify
Restart IPSec Service

Section C: DNS Overview
Name Space
Resolution Types
Zones
Features
Install DNS
Root Servers
New Zone
New Records

Section D: DNS Servers
Secondary Zone Server
Enable Zone
Delegate A Zone
Caching Only Server

Section E: DNS/Zone Settings
DNS Properties
Advanced
Logging/Monitoring
Dynamic Updates
Start Authority
Zone Transfers
Security

Section F: DNS Monitoring
DNS Client
Configure Client
Select Counters
Logging
Log Settings
DNSCMD/NS Lookup
Create Reverse Lookup

Total Time: 107 Minutes

Session 4

Section A: WINS
Introduction
Enhanced Features
Installing WINS
WINS MMC
Back Up
Intervals
Database Verification
Advanced Settings

Section B: WINS Client
Troubleshooting
Name Check
Set WINS Server
Verify
WINS Table
Node Type

Section C: WINS Replication
Introduction
Usage
Configure
Type
Partners Properties
Advanced Properties
Verify

Section D: WINS Monitoring
Static Mapping
Tombstoning
Verify Options
Back Up Database
Performance Monitor

Section E: Network Services Integration
Introduction
DNS in DHCP
WINS in DHCP
Scope vs. Server Options
WINS in DNS

Section F: Certificate Authority Setup
Introduction
Certificate Contents
Certificate Authority
Cryptography
Certificate Options

Total Time: 90 Minutes

Session 5

Section A: Certificate Management
Certificate Details
Policy Module
Other Policy
Certificate to Issue
Status Object
Assign Certificate
Public Key Policies
Auto Certificate Request
Verify Client Authentication

Section B: Remote Access Services
Introduction
RAS Example
Configure RAS
Authentication & Encryption
Other Properties

Section C: RAS Policies
Features
Set Dial-In Permissions
Create Policy
Configure Profile
Policy Ordering

Section D: RAS & VPN
Access Ports
VPN Ports
VPN Addresses
VPN Client
Setup
Connect
VPN Status
Performance Monitor

Total Time: 75 Minutes

 

Session 1

Section A: Active Directory Concepts
Logical Structure
Active Directory Domains
Active Directory Naming
Domain Controllers
Physical Structure
Domain name System

Section B: Active Directory Installation
Installation Requirements
Configuring Active Directory
Verifying the Installation

Section C: Operations Masters
Schema Master
Domain Naming Master
RID master
Infrastructure Master
PDC Emulator
Global Catalog Server
Performance

Section D: Physical Structure
Implementation
Site Structure
Creating Sites
Creating Subnets
Site Links
Site Link Bridge
Moving Domain Controllers

Section E: Replication Management
Intra-site
Inter-site
Scheduling
Inter DC Relationships

Total Time: 84 Minutes

Session 2

Section A: Backup
AD Back
Restoring Active Directory
Non-Authoritative Restore
Authoritative Restore
Distinguished Name
Restore AD

Section B: User Management
Create User
User Properties
Account Options
Profile
Telephone
Organization
Dial-in
Security
Terminal Services

Section C: Object Management
Group Scope & Type
Group Properties
Computer Accounts
Computer Properties
Move Objects

Section D: Resource Management
Resource Sharing
Sharing Printers
Locate Printers
Security
Advanced Access

Section E: Active Directory Optimization
Group Strategy
Group Example
AD Object Replication
Performance Monitor
NTDS Monitoring
Support Tools
Troubleshooting

Section F: DNS Integration
TCP/IP Name Resolution
Name Space
DNS Resolution Types
Zones

Total Time: 96 Minutes

Session 3

Section A: DNS Implementation
Integrated Zones
New Zone
Zone Type
Zone Transfers
WINS Issues

Section B: Remote Installation Services
RIS Requirements
Image Support
RIS Process
Install RIS
Setup Wizard
Authorize RIS

Section C: RIS Client Configuration
Delegate Authority
Advanced Properties
Prestage a Client
Boot Disk
RIS Troubleshooting

Section D: Group Policy Introduction
Features
Group Policy Objects
Group Policy Snap-in

Section E: Group Policy Creation
Implementation
Setting Policy
Test Policy

Section F: Scripts & Folders
Security
No Override
Link Policy
Modify Policy
Scripts
Folder Redirection

Total Time: 90 Minutes

Session 4

Section A: Inheritance & Delegation
Inheritance Policy
Testing Policy
Overriding Policy
Delegating Authority

Section B: Security Policies
Group Policy Security
Password Policy Settings
Account Lockout Policy
Local Policies

Section C: Audit Policy
Auditing Options
Domain Level Auditing
Viewing the Log

Section D: Security Templates
Overview
Creating Policies
Security Template Snap-in
SCAT Database

Section E: Application Deployment
Overview
Installer Package
Software Deployment Policy
Development Options
Software Categories
Testing Setup

Section F: Software Assignment
Package Creation
Software Deployment Troubleshooting

Total Time: 102 Minutes

 

Session 1

Section A: Design Process
Introduction
Design Elements & Goals
Design Analysis
Technical Requirements

Section B: TCP/IP Introduction
Services Strategies
TCP/IP Networking
Features with Windows 2000

Section C: IP Addressing
Addressing Basics
Address Classes
Subnet Mask
Determining Scheme

Section D: IP Subnetting
Requirements
Examples
High Order Rule
Maximum Hosts
Subnet Ranges
Configuration Methods

Section E: TCP/IP Security
Filters
IPSec
Authentication Only
Encryption & Authentication
Protection Levels
Secure Conversations

Section F: TCP/IP Availability & Performance
Enhance Availability
Optimizing Performance
Quality of Service

Section G: DHCP Design
Design Decisions
Features
Integration
LAN Design
Scope Examples
Routed Design
Supported Options

Total Time: 94 Minutes

Session 2

Section A: DHCP Security
Securing DHCP
Screened Subnets

Section B: DHCP Availability & Performance
Enhance Availability
Enhance Performance
Lease Length

Section C: DNS Design
Design Decisions
DNS Features
Zone Types
Choosing Zone Types

Section D: DNS Integration
Internet Connected
Integrating DNS
Namespace Issues
Manual Integration

Section E: DNS Security, Availability & Performance
Dynamic Update
Zone Replication
Screened Subnets
Enhance Availability
Enhance Performance

Section F: WINS Design
Design Decisions
Features
LAN Considerations
Routed Networks
Client Conversations

Section G: WINS Replication
Replication Options
Multi-Server Issues

Section H: WINS Security, Availability & Performance
Securing WINS
Screened Subnet
Enhancing Availability
Optimizing Performance

Total Time: 87 Minutes

Session 3

Section A: NAT Design
Design Decisions
Features
Function
Options

Section B: NAT Security, Availability & Performance
Restrict Traffic
VPN Tunnels
Enhance Services

Section C: Microsoft Proxy Server Design
Design Decisions
Features
Server Placement
Address Issues
Address Translation
Client Software

Section D: Microsoft Proxy Server Security
Active Directory
Non-Active Directory
Screened Subnet Design
Packet Filters
Domain Filters
Web Publishing

Section E: Microsoft Proxy Server Availability & Performance
Proxy Server Arrays
Active Caching
Passive Caching
Proxy Server Hierarchy
Traffic Distribution

Section F: Extranet Routing Design
Design Decisions
RRAS Features
Router Placement
Router Integration
Routing Design
Static Routing
RIP Routing
OSPF Routing
IBMP Routing
DHCP Routing

Section G: Router Security
IP Filters
Authenticating Routers
Screened Subnets

Section H: Router Security Using Tunnels
IPSec Tunnels
VPN Tunnels
Authentication & Encryption

Section I: Router Availability & Performance
Enhance Availability
Enhance Performance

Total Time: 99 Minutes

Session 4

Section A: RAS Introduction
Design Decisions
Dial-In Features
VPN Features
RAS Integration

Section B: RAS Dial-In Design
LAN Link
Routed Link

Section C: RAS VPN Design
Routed Link
Tunnel Selection
VPN Outside Firewall
Firewall Issues
RAS Placement

Section D: RAS Security
Authentication
Encryption
Remote Access Policy

Section E: RAS Availability & Performance
Enhance Availability
Optimizing Performance

Section F: RADIUS Introduction
Design Decisions
Components
Features

Section G: RADIUS Design
Client Placement
Connection Types
Server Placement
Authentication Domain

Section H: RADIUS Security, Availability & Performance
Secure Access
Screened Subnet Issues
Enhance Availability
Optimizing Performance

Total Time: 92 Minutes

Session 5

Section A: Dfs Design
Design Decisions
Dfs Functions
Root Placement
Replication
Define Dfs Links
Set Shared Folders

Section B: Dfs Security, Availability, and Performance
Secure Dfs
Optimize Availability
File Replication Services
Optimize Performance

Section C: Designing Management Strategies
Develop Plan
Service Variations
Verifying Compliance
Anticipate Changes
Data Collection
Event Generation

Section D: Tools and Strategies
Network Utilities
Data Analysis
Response Strategies

Section E: Combining Services Design
Introduction
Optimization
Constraints
Security
Isolate Services
Enhance Availability
Clustering
Optimizing Performance
Resource Contention

Total Time: 80 Minutes

 

Session 1

Section A: Introduction
Overview
What is Active Directory?
Domain Structure
Active Directory Benefits
Active Directory Components
Operations Master

Section B: Active Directory Design Strategy
Why Design?
Active Directory Architect
Design Process

Section C: Business Analysis
Analyze Organization
Security Needs

Section D: Technical Analysis
IT Management
Evaluate Environment
Desktop Management
Analyze Impact

Section E: Data Gathering
United Space systems
USS IT Functions
USS Interviews
USS Network Map
USS Network Servers

Section F: Planning Active Directory Names
Strategy
Namespace Options
Other Names

Total Time: 105 Minutes

Session 2

Section A: DNS Server Strategy
Plan DNS
DNS in Active Directory
DNS Servers
Other Services

Section B: Directory Services Architecture
Directory Design
Single Domain
Using a Tree
Building a Tree
Active Directory Tree
Using a Forest
Active Directory Forest

Section C: Active Directory Resource Access
Forest Resources
Trusts
Kerberos
Authorization
Shortcut Trusts

Section D: Active Directory Delegation
Delegation Options
Business Factors
Design Structure
Location Design
Organizational Design
Decentralization
OU Structure
Admins Group
Delegate Control

Section E: Active Directory Permissions
Overview
Ownership
Specific Permissions
Wizard vs. Manual
Scope of Permissions
Site Level
Best Practices

Section F: Group Policy
Overview
Business Factors
Creating Group Policy
Configuration Options
Change Policy
Linking Policy

Total Time: 111 Minutes

Session 3

Section A: Applying Group Policy
GPO Types
Site Level GPO
Domain Level GPO
OU Level GPO
Design Guidelines
Group Policy Performance
Optimizing Performance

Section B: Group Policy Delegation
GPO Control
Group Policy MMC
Blocking & Filtering
Delegating Control

Section C: Organizational Units
OU Strategy
Upper Level OUs
Lower Level OUs
OUs with a Purpose
Designing Security Groups

Section D: Directory Services Coexistence
Overview
NetWare Interoperability

Section E: Site Topology
Overview
Design Site Structure
Site Links
USS Network
Creating a New Site
Creating Subnets
Inter-Site Transports
Default Sites

Section F: Active Directory Replication
Overview
Inter-Site Replication
Bridgeheads
Between Domains

Total Time: 100 Minutes

Session 4

Section A: Active Directory Schema
Defining Schema
Schema Modification
Classes
Modification Issues
Schema Policy

Section B: Flexible Single Master Operations
FSMO Roles
Placement & Operations Grouping
Moving Roles

Section C: Designing Service Locations
Domain Controllers
Global Catalog Servers
Sites & Servers
DNS Servers

Section D: Active Directory Implementation Plan
Overview
NT Upgrade

Section E: Migration to Active Directory
Plan Migration
Clone Principle
Account Domains
Migrating Accounts & Resources

Total Time: 85 Minutes

 

Session 1

Section A: Security Design Process
Security Design Categories
Risks to Data & Services
Security Design Process
Analyzing Business Requirements
Designing Security Baseline

Section B: Securing Windows 2000 Systems
Security Baseline
Physical Security Planning
Hardware Configuration Security
Securing Passwords & Templates
Evaluating Security
Verifying & Analyzing a Security Baseline
Automating Security Analysis
Deploying Security Configurations
Guidelines for GPO Deployment
Processing Order of Policies
Identifying Effective Policy

Section C: Authentication Strategy Design
Introduction
Kerberos & Certificate-based
NTLM, Clear Text & Digest
Secure Sockets Layer & Radius
Determining Correct Authentication Method

Section D: Unix Authentication Strategy
Integration with Unix Systems
Designing Unix Integration
NFS Access
Securing TCP/IP Programs

Section E: Macintosh Authentication Strategy
Integrating with Macintosh
Macintosh Authentication
Designing the Macintosh Integration

Section F: NetWare Authentication Strategy
Integrating with NetWare
NetWare Authentication
NetWare Connectivity Risk & Solution

Total Time: 86 Minutes

Session 2

Section A: File & Print Strategy
Introduction
File System Security
Using DACLS & DACL Inheritance
NTFS & Share Permissions
Combining Permissions
Print Resources

Section B: EFS & Auditing
EFS Features & Protection
EFS Recovery & Options
Audit Resources
Classified Auditing

Section C: Administrative Model
Assigning Access
Centralized, Decentralized & Hybrid
Roles & Tasks Defined
Security Management

Section D: Local & Remote Administrative Access
Planning Local
Run as Service
Planning Remote & Encryption Options
Securing VPN
Design Decisions

Section E: Terminal Services Security
Remote Administration & Encryption Choices
Preferred Configuration
Telnet Administration

Section F: Delegation of Authority & Account Planning
Planning
Account Placement
Custom & Nesting Groups
Managing Administrators

Section G: Audit & Account Policies
Audit Policy
Audit Strategy
Design Policies
Group Policy
Inheritance

Section H: Public Key Infrastructure
Introduction
Certificate Uses & Requirements
CA Hierarchy
Third-party & Commercial CAs
Private CA

Total Time: 106 Minutes

Session 3

Section A: PKI Design
CA Guidelines
Availability
CA Usage & Organizational Hierarchy
Location Hierarchy

Section B: Certificate Management
Mapping Certificates
CA Maintenance Strategies
Hardware & Compromise Recovery
Minimize Risk

Section C: Network Services Security
DNS Security
RIS Security
SNMP Security

Section D: Secure Communication Channels
Designing Security
SMB Signing
Designing an IPSec Solution
Selecting an IPSec Mode & Security Policies
IPSec Negotiations Policies & Filters
Managing IPSec

Section E: Remote-to-Private Networks
Introduction
Security Design Risks & Solutions
Avoiding Security Weaknesses
RAS Policies & Benefits of VPN Connections
Securing VPN Access
Using Radius to Centralize RAS Security

Section F: Private-to-Private Networks
Security Design Risks & Solutions
Router Security

Section G: Public-to-Private Networks
The Internet
Solutions
Using Firewalls
Using Screened Subnets
Avoiding Vulnerabilities

Section H: Securing Access to Private Networks
Access to a Screened Subnet
Traffic to an Http and FTP Server
Traffic to a DNS & Messaging Server
Traffic to an Application Server
PPTP & L2TP Traffic to a Tunnel Server
Traffic to a Terminal Services Server

Section I: Analyzing Business Requirements
Introduction
Analyzing Structure of IT Management
Analyzing Technical Requirements
Security Design Summary

Total Time: 114 Minutes

 

 

Back to home Page

Email Lawson