|
This course examines common risks such as data corruption and security breaches that can affect a network's file shares. This course also explains how to design a permission structure for files and folders, as well as best practices for securing the Windows Registry.
Objectives:
- Design an access control strategy for files and folders
- Analyze auditing requirements
- Design an access control strategy for the registry
- Design a permission structure for registry objects
Topics:
- Analyzing risks to data
- Reviewing access control and access control lists
- Access to resources
- Working with security groups
- Defining a security group retirement policy
- Delegating security group maintenance
- Analyzing auditing requirements
- Designing an access control strategy for the registry
- Setting registry access permissions via group policy
- Designing a permission structure for registry objects
|
P500+ Processor, 128MB of RAM; Windows 2000, 2003, XP, Minimum screen resolution 800x600, Internet Explorer 5.5 or higher; Windows Media Player 9.0 or higher; Flash 8.0 or higher; 56K minimum connection; broadband (256 kpbs or higher) connection recommended; Javascript, DHTML and cookies enabled; Sound card with speakers or headphones strongly recommended.
|
Product names mentioned in this catalog may be trademarks/servicemarks or registered trademarks/servicemarks of their respective companies and are hereby acknowledged. All product names that are known to be trademarks or service marks have been appropriately capitalized. Use of a name in this catalog is for identification purposes only, and should not be regarded as affecting the validity of any trademark or service mark, or as suggesting any affiliation between MindLeaders.com, Inc. and the trademark/servicemark proprietor.
Terms of Use:
|
Copyright � 2006 Webteks. All rights reserved.
|
|
|