After completing Windows 2000 Security Design MCSE 70-220: Protecting Resources with Auditing and Encryption, the user should be able to:
| Design an audit strategy |
| Implement and configure an audit policy |
| Describe the encryption provided by the Encrypting File System |
| Plan for the recovery and management of encrypted files |
| Design a strategy for securing files and folders with encryption |
|
Designing an Audit Policy
| Configuring auditing |
| Auditing policy settings |
| Choosing events and objects to audit |
Implementing an Audit Policy
| Managing the security log |
| Filtering events |
| Event interpretation |
Using the Encrypting File System (EFS)
| Encrypting files and folders |
| Remote encryption |
| The encryption process |
| Five levels of encryption |
| Key storage |
File Recovery and Management with EFS
| Setting recovery policy |
| Recovery certificate security |
| Recovering files |
Designing an EFS Strategy
| Planning an EFS strategy |
| Best practices |
|
This course has the following features:
| Exercises that allow users to practice in Windows 2000 |
| A file containing the text of the exercises |
| Simulations that allow users to practice course skills, even if they don't have access to Windows 2000 |
| A glossary |
| A Skill Assessment |
|
| All courses in the series Windows 2000 Professional, a passing score on MCSE exam 70-210, or equivalent experience |
| All courses in the series Windows 2000 Server MCSE 70-215, a passing score on MCSE exam 70-215, or equivalent experience |
| All courses in the series Windows 2000 Network Administration MCSE 70-216, a passing score on MCSE exam 70-216, or equivalent experience |
| All courses in the series Windows 2000 Active Directory MCSE 70-217, a passing score on MCSE exam 70-217, or equivalent experience |
| Windows 2000 Security Design MCSE 70-220: Analyzing Business Requirements (W22001) |
| Windows 2000 Security Design MCSE 70-220: Analyzing Technical Requirements (W22002) |
| Windows 2000 Security Design MCSE 70-220: Establishing a Security Baseline (W22003) |
| Windows 2000 Security Design MCSE 70-220: Planning Security for System Resources (W22004) |
| Windows 2000 Security Design MCSE 70-220: Designing a Security Group Strategy (W22005) |
| Windows 2000 Security Design MCSE 70-220: Designing Security Policy Inheritance (W22006) |
|
| Windows 2000 Security Design MCSE 70-220: Using Native Windows 2000 Authentication (W22008) |
| Windows 2000 Security Design MCSE 70-220: Using Alternate Authentication Strategies (W22009) |
| Windows 2000 Security Design MCSE 70-220: Designing a Public Key Infrastructure (W22010) |
| Windows 2000 Security Design MCSE 70-220: Designing Security for Network Services (W22011) |
| Windows 2000 Security Design MCSE 70-220: Designing Security for Access between Networks (W22012) |
| Windows 2000 Security Design MCSE 70-220: Designing Security for Communications Channels (W22013) |
|
Microsoft® is a registered trademark of Microsoft Corporation.
Windows 2000® is a trademark of Microsoft Corporation.
|
Get more out of your Software
Improve your Skills
Prepare for Certification
Save time every time and reduce frustration.
Our online training material lets you:
TEST your skills
LIST the areas where you need additional training
Take lessons that TEACH SKILLS to improve these areas
Tests your skills again
NO HIDDEN CHARGES.
NO SETUP or SHIPPING CHARGES.
NO ads or banners in the training material.
No selling of your personal information, no email lists.
Just 100% Quality Training at one low price.
Repeat the courses as often as you need, you have 12 months of unlimited
access and can view your scores anytime so you can easily track your progress.
Our training is tested and guaranteed to provide RESULTS and save you TIME.
All courseware is online 24 hours a day.
Our courseware is optimized so content delivery is fast even with a 28.8 modem
connection.
If you can get on the Internet you can access the training, ANYWHERE, ANYTIME.