DESCRIPTION
This course explains how to safeguard intranet, Internet and e-commerce transactions with IPSec. This course will thoroughly cover how to deploy and administer bulletproof Windows 2000 security policies. Also enriched with practical approach on how to defend against hacking, spoofing, sniffing and DDS attacks and secure your network with firewalls, proxy servers.

By the end of this course, participants are able to :

· Understand the threats to your windows 2000 enterprise network and the appropriate countermeasures

· Understand windows 2000 based security mechanisms and use them to proactively defeat attackers

· Build secure firewalls and implement strong authentication policies on VPNs

COURSE OUTLINE

Design the Infrastructure
• Windows 2000 network services
• Network implementation plan
• Protocols supported by Windows 2000

Introduction Active Directory Infrastructure
• Architecture Active Directory
• How Active Directory Work
• Active Directory Design, Planning Processes

Implementing Active Directory Forest and Domain Structure
• Create A Forest and Domain Structure
• Configuring Active Directory Integrated DNS
• Raising Forest and Domain Functional Level
• Creating Trust Relationships

Implementing an Organizational Unit (OU)
• Managing OU
• Delegating Administrative Control for OU
• Planning OU Strategy

Administering User Account
• Creating, Modifying and Administering User Account
• Creating User Profile
• Creating Home Directories
• Creating Logon Script
• Maintaining User Account

Administering Group Policy Object
• Group Policy Concept
• Creating , Configuring, Implementing GPO
• Delegating Administrative Control GPO
• Plan GPO Strategy for the Enterprise
IPSec Protocol
• Introducing IPSec
• IPSec Architecture
• Authentication Method
• IP Packet filtering
• IPSec Policies
• Monitoring IPSec

RADIUS
• Introducing RADIUS
• Configuring RADIUS Server
• Creating RADIUS Client

Attacking Method
• Attacker Phillosophy
• What are the Target
• Attack Methods

Configuration ISA
• Install the ISA
• Local Configuration Address- Table
• Install Firewall Client
• Install Web Proxy

Access Policy
• ISA Systems Security
• Policy Elements
• IP Packet Filters

ISA Server Cache
• Internet Caching
• Active Caching
• Schedule Caching

Monitoring Network Activity
• Network Monitor
• Windows 2000 Administration tools

Who Should Attend

· Computer and Network Administrators

· Software Developers

· IT Managers

· Analyst and IT Consultant

FACILITIES

  • Certificate, Quality Training Kit (Pencil case: Erase, Bolpoint, Pencil, Tipe X, Stabillo, Flash Disk 8 GB), Bag.
  • Training Material (HandOut & SoftCopy)
  • Convenient training facilities in stars hotel
  • Lunch and Coffee Breaks
  • Souvenir

Permintaan Brosur penawaran Training ( Harga, Waktu dan Tempat) silahkan Menghubungi kami.

Catatan :

  • Pelatihan ini dapat di-customized sesuai kebutuhan perusahaan Anda bila diselenggarakan dalam bentuk In-House Training. Untuk permintaan In-House Training dengan jenis topik lainya, silahkan mengirimkan ke alamat email yang tercantum di web kami.
  • Request Training. Jika anda membutuhkan informasi pelatihan yang belum tercantum pada website ini, atau anda ingin memberikan usulan materi yang sesuai dengan tingkat kebutuhan perusahaan anda, silahkan mengirimkan ke alamat emailyang tercantum.
  • Bila tidak ada tanggal dan waktu atau yang tercantum sudah kadaluarsa didalam artikel mohon tanyakan kepada kami untuk jadwal terbarunya.
  • Peserta bisa mengajukan Tanggal Pelatihan / Training selain yang tertera pada silabus penawaran.
Advertisements