Table of Contents

  1. Network Protocol Security
    1. Configuring Protocol Security Using IPSec Policies
  2. Configuring Security for Data Transmission
    1. Planning for Network Protocol Security
    2. IPSec Policies for Secure Network Communications
    3. Planning Security for Data Transmission
    4. Encryption Protocols
    5. Securing Data Transmission Between Client Computers
    6. Secure Data Transmission Using IPSec
    7. Troubleshooting Security for Data Transmission
    8. RSop
  3. Planning Secure Network Administration Methods
    1. Telnet
    2. Remote Administration using Terminal Services
  4. Plan Security for Wireless Networks
    1. IEEE 802.11 Authentication
    2. Shared Key Authentication
    3. Wired Equivalent Privacy (WEP)
    4. WEP Encryption
    5. Wireless MAC Payload
    6. 802.1x
  5. Configuring Directory Services for Certificate Publication
  6. Plan a Public Key Infrastructure that uses Certificate Services.
    1. PKI Components
    2. Certificate Authorities (CAs)
    3. Enterprise CA
    4. Standalone CA
    5. Planning the Enrolment and Distribution of Certificates
    6. Using Smart Cards for Authentication
    7. Smart Card Logon
  7. Plan a Framework for Planning and Implementing Security
    1. The Planning Phase
    2. The Building Phase
    3. The Managing Phase
    4. Planning for Security Monitoring
    5. Planning a Change and Configuration Management Framework
    6. Planning a Security Update Infrastructure
    7. Software Update Services (SUS)