|
This course introduces security issues that arise at the operating system level in a network. It covers the major areas of vulnerability for operating systems such as Windows 2000 and Linux. It shows how built-in security features can be activated, how to configure password settings, and how to set permissions on files, folders, and shares.
Objectives:
- Describe the most widely-used industry security standards
- List the key vulnerabilities of Windows 2000 and Linux operating systems
- Describe the built-in security features of Windows 2000
- Use Pluggable Authentication Modules to improve authentication on Linux systems
- Configure password settings for improved security
- Set permissions on files, folders and shares
Topics:
- Security principles
- Evaluation criteria
- Security levels and mechanisms
- Windows 2000 security
- Windows 2000 security architecture
- Linux security
- Pluggable authentication modules
- Passwords
- Verifying system state
- Protecting accounts
- Password aging in Linux
- Windows 2000 file systems
- Remote file access
- Linux file systems
|
P500+ Processor, 128MB of RAM; Windows 2000, 2003, XP, Minimum screen resolution 800x600, Internet Explorer 5.5 or higher; Windows Media Player 9.0 or higher; Flash 8.0 or higher; 56K minimum connection; broadband (256 kpbs or higher) connection recommended; Javascript, DHTML and cookies enabled; Sound card with speakers or headphones strongly recommended.
|
Product names mentioned in this catalog may be trademarks/servicemarks or registered trademarks/servicemarks of their respective companies and are hereby acknowledged. All product names that are known to be trademarks or service marks have been appropriately capitalized. Use of a name in this catalog is for identification purposes only, and should not be regarded as affecting the validity of any trademark or service mark, or as suggesting any affiliation between MindLeaders.com, Inc. and the trademark/servicemark proprietor.
Terms of Use:
|
Copyright � 2006 Webteks. All rights reserved.
|
|
|