server-security
ABOUT THE COURSE
Improperly configured systems, including both servers and workstations, can becompromised and the data destroyed or stolen, or used to store illegal data, relay spam e-mail, or attack other systems.
What You Will Learn
The following tables list Microsoft Certifications by name and describe how they enable IT professionals to display and validate their skills and experience.
Key Features
20 hours of high quality eLearning content
What You Will Learn
Achievements in work
72 end of chapter quizzes
CD's
Participation Certificate
Who Should Attend
Security Professionals
Security Officers
Security Auditors
Network/System Administrators
Anyone who is concerned about the integrity of the network infrastructure
| |
Module 01: | Microsoft/IIS risks |
Module 02: | Installing Windows 2000 Review |
Module 03: | Microsoft Security Internals Review |
Module 04: | Footprinting and Scanning Microsoft IIS |
Module 05: | Enumeration |
Module 06: | Hacking |
Module 07: | Types of Attacks |
Module 08: | IIS Configuration |
Module 09: | Building a Secure IIS Web Server |