MCSE Designing Security for a Windows Server 2003 Network (Exam 70-298)

1st Edition

Study Guide and DVD Training System

Authors: Syngress
Hardcover ISBN: 9781932266559
eBook ISBN: 9780080479279
Imprint: Syngress
Published Date: 15th February 2004
Page Count: 800
64.95 + applicable tax
39.99 + applicable tax
49.95 + applicable tax
64.95 + applicable tax
Compatible Not compatible
VitalSource PC, Mac, iPhone & iPad Amazon Kindle eReader
ePub & PDF Apple & PC desktop. Mobile devices (Apple & Android) Amazon Kindle eReader
Mobi Amazon Kindle eReader Anything else

Institutional Access


MCSE Designing Security for a Microsoft Windows Server 2003 Network (Exam 70-298) Study Guide and DVD Training System is a one-of-a-kind integration of text, DVD-quality instructor led training, and Web-based exam simulation and remediation. This system gives you 100% coverage of the official Microsoft 70-298 exam objectives plus test preparation software for the edge you need to pass the exam on your first try:

Key Features

  • DVD Provides a "Virtual Classroom": Get the benefits of instructor led training at a fraction of the cost and hassle
  • Guaranteed Coverage of All Exam Objectives: If the topic is listed in Microsoft's Exam 70-298 objectives, it is covered here
  • Fully Integrated Learning: This system includes a study guide, DVD training and Web-based practice exams


Microsoft engineers and consultants wanting to demonstrate a certain level of expertise to their employer. Those starting new certifications as well as those upgrading from prior tracks and lesser certifications

Table of Contents

Chapter 1 Designing a Secure Network Framework Introduction 1.1 Analyzing Business Requirements for Security Design 1.1.1 Analyzing Existing Security Policies and Procedures 1.1.2 Determining Requirements for Securing Data 1.4 Analyzing Current Security Practices 1.2 Designing a Framework for Implementing Security 1.2.1 Predicting Threats to Your Network 1.1.3 Analyzing Security Requirements for Different 12.2 Responding to Security Incidents 1.2.4 Recovering Network Services After an Attack 1.3 Analyzing Technical Constraints when Designing Security 1.3.2 Identifying Technology Limitations 1.3.3 Analyzing Interoperability Constraints Chapter 2 Securing Servers Based on Function Introduction 3.7.1 Defining a Baseline Security Template 3.7 Design Security for Servers that Have Specific Roles 3.7.2 Modifying Baseline Security Templates According to Role Chapter 3 Designing a Secure Public Key Introduction 2.1 Designing a Public Key Infrastructure 2.1.1 Designing a Certification Authority Implementation 2.2 Designing a Logical Authentication Strategy 2.1.4 Designing Security for CA Servers 2.2.2 Designing Certificate Distribution 2.1.2 Designing Enrollment and Distribution 2.1.2 Approving Certificates by CA Administrators 2.1.3 Revoking Certificates by CA Administrators 2.1.3 Establishing Renewal and Auditing Chapter 4 Securing the Network Management Introduction 2.3 Securing the Network Management Process 2.3.1 Managing the Risks of Network Administration 2.3.2 Securing Common Administrative Tools 2.3.3 Designing Security for Emergency Management 2.4 Designing a Security Update Infrastructure 2.4.1 Designing a Software Upd


No. of pages:
© Syngress 2004
eBook ISBN:
Hardcover ISBN:

About the Author