|
This course shows how to protect data against loss due to a disaster, system failure, or intrusion. Topics include permissions, access control lists, auditing, network security, and controlling remote access to the system.
Objectives:
- Locate the files that control default system access
- Locate where password encryption and password aging information is stored
- Control default file or directory permissions
- List the places where unneeded network services and processes can be disabled
- Describe the process of restricting root and remote access to the system
Topics:
- Physical security
- Controlling system access
- Storing user account information
- Controlling file access
- Permission schemes for user and group IDs
- Access Control Lists (ACLs)
- Managing ACL entries
- Setting path and identification permission
- Monitoring users and system usage
- Obtaining login information
- Using firewalls and securing network services
- Other network security methods
- Remote system operations and the trusted host
- Restricting FTP
- Restricting root access
- Monitoring superuser access
- Automated Security Enhancement Tool (ASET)
|
P500+ Processor, 128MB of RAM; Windows 2000, 2003, XP, Minimum screen resolution 800x600, Internet Explorer 5.5 or higher; Windows Media Player 9.0 or higher; Flash 8.0 or higher; 56K minimum connection; broadband (256 kpbs or higher) connection recommended; Javascript, DHTML and cookies enabled; Sound card with speakers or headphones strongly recommended.
|
Product names mentioned in this catalog may be trademarks/servicemarks or registered trademarks/servicemarks of their respective companies and are hereby acknowledged. All product names that are known to be trademarks or service marks have been appropriately capitalized. Use of a name in this catalog is for identification purposes only, and should not be regarded as affecting the validity of any trademark or service mark, or as suggesting any affiliation between MindLeaders.com, Inc. and the trademark/servicemark proprietor.
Terms of Use:
|
Copyright � 2006 Webteks. All rights reserved.
|
|
|