--------------------------------------------------------------------
SearchWin2000's Certification, Training and Career Tip
--------------------------------------------------------------------
TODAY'S TIP: Raising the security bar for the Windows 2000 MCSE
====================================================================
SPONSORED BY: VeriSign - The Internet Trust Company
====================================================================
Pinpoint the right security solution for your company - FREE Guide
from industry leader VeriSign gives you all the facts. Learn how to:
- Add the most powerful online encryption - 128-bit
- Quickly authenticate your site
Get your FREE Guide now at
http://www.verisign.com/cgi-bin/go.cgi?a=n061140330003000!
--------------------------------------------------------------------
"Raising the security bar for the Windows 2000 MCSE"
By Ed Tittel, LANWrights, Inc.
In the wake of the Code Red worm, some experts have voiced the
opinion that the Windows MCSE is light on security. While I can't
dispute the relative lack of security coverage in the required core
exams (70-210, 70-215, 70-216, and 70-217), there are two exams on
the Windows 2000 MCSE track that cover most of the important security
bases pretty well:
- 70-220 Designing Security for a Microsoft Windows 2000 Network
- 70-227 Installing, Configuring, and Administering Microsoft
Internet Security and Acceleration (ISA) Server 2000, Enterprise
Edition
Given the overall requirements for obtaining a Windows MCSE these
days, pursuing this approach to the MCSE curriculum shows a profound
interest in (or bias toward) security matters. Ironically, it's also
entirely possible -- and statistics on exams indicate highly likely
as well -- that somebody could upgrade an existing MCSE or obtain a
new one without taking either or both of these exams. That said,
between these two exams, the most important Win2k technical security
topics are covered.
The 70-220 exam deals with the broad range of internal corporate
security issues and design topics, among them:
- Corporate or organizational requirements for security, including
risk analysis, creating security policies and mapping those policies
into organizational, geographical and political realities.
- Understanding how a company or organizational IT infrastructure and
information assets define security requirements.
- The impact of security designs on existing systems and
applications. This also includes upgrades, new product deployments,
technical support requirements and integrating security concerns into
network and systems management.
- Creating a proper Windows 2000 security infrastructure including
audit policies, delegation of authority, placement and inheritance of
group security policies, authentication strategies, PKI
infrastructures and network services security.
- Designing security for communications channels, including
SMB-signing, IPSec solutions, VPN links and remote access controls.
The 70-227 addresses an equally broad range of security issues and
design topics, but focuses on the peripheries or "security
boundaries" between organizational units and the outside world via
the Internet. Topics include:
- Managing network address translations, local address tables and
name- and address-handling services.
- Configuring and managing ISA Server's proxy, multimedia streaming
and remote access capabilities.
- Managing VPN connections through ISA server, including VPN
endpoints at the ISA server, and VPN pass-throughs.
- Configuring, securing and maintaining ISA Server's firewall
capabilities, including packet filters, access control and bandwidth
policies, especially policy elements such as schedules, bandwidth
priorities, destination sets, client address sets, protocol
definitions and content groups.
- Configuring and managing client computers for ISA Server services,
including client authentication, network context management, network
address translation (SecureNAT), firewall client and Web browser
software.
- Managing ISA Server, including configuring intrusion detection,
related alerts and alarms, monitoring alert status, checking ports
and connections and analyzing ISA Server performance.
In addition, this exam also covers Internet acceleration topics, such
as those related to high availability options (clustering and load
balancing) and cache management that do not have direct security
implications.
Between these two exams, MCSE candidates can glean important aspects
of designing, implementing, configuring, managing and troubleshooting
their organization's security infrastructure. But if they want to get
up-to-speed for a full-fledged security certification like CISSP,
SANS-GIAC, or ICSA, they'll also need to bone up on:
- Legal and ethical matters related to privacy and confidentiality,
plus investigation and prosecution of intrusions or unauthorized
access.
- Potential vulnerabilities related to applications and systems
design and development.
- Cryptography, including symmetric and asymmetric keys, PKI design
and deployment and certificate services.
- Physical security policies, practices, procedures and auditing
techniques.
For generalist MCSE, however, the 70-220 and 70-227 combo does a
pretty good job preparing candidates for key Win2k technical security
issues. Though MCSEs aren't yet required to master these topics, they
certainly have the opportunity to do so within the current MCSE
framework. Whether these optional elements will ever become required
-- or if required elements start to include more security coverage --
is anybody's guess. But recent events and the growing concern for
security demonstrate that one or the other scenario is increasingly
likely and warranted.
Ed Tittel is a principal at a small content development company based
in Austin, Texas, and the creator of the Exam Cram series, and has
worked on over 30 certification-related books on Microsoft, Novell
and Sun related topics.
====================================================================
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
DID YOU LIKE THIS TIP?
====================================================================
We rely on your feedback! Whether you loved this tip or hated it, why
not let us know? Rate it at
http://www.searchWin2000.com/tip/1,289483,sid1_gci769251,00.html.
Have additional comments? E-mail us at mailto:[EMAIL PROTECTED]
to sound off.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
====================================================================
WIN! WIN! WIN!
--------------------------------------------------------------------
Our September Tip of the Month contest is in full swing! Get in on
the action for your chance to win this month's grand prize - an iBOT
Pro Firewire desktop video camera w/microphone!
Check out August's winning tips, check out this month's prize and
submit a tip of your own today at
http://searchwin2000.techtarget.com/tipsHallOfFame/0,289489,sid1_prz751595_cts751583,00.html.
--------------------------------------------------------------------
CONFERENCE NOTICE FOR MEMBERS
--------------------------------------------------------------------
Attend the FREE Windows Decisions 2002 conference coming to Chicago
on November 5-7. We have now opened up this event to the general
public, so apply today as we still want to give you the best shot at
being a conference delegate. This conference will give you the tools
and information you need to conquer ongoing Win2k issues and move
ahead to Windows XP, .Net Server, 64-bit computing, and other
next-generation technology. Visit http://www.windowsdecisions2002.com
today for more details.
====================================================================
If you would like to sponsor this or any TechTarget newsletter,
please contact Mike Kelly at mailto:[EMAIL PROTECTED].
====================================================================
If you no longer wish to receive this newsletter simply reply to
this message with "REMOVE" in the subject line. Or, visit
http://searchWin2000.techtarget.com/register
and adjust your subscriptions accordingly.
If you choose to unsubscribe using our automated processing, you
must send the "REMOVE" request from the email account to which
this newsletter was delivered. Please allow 24 hours for your
"REMOVE" request to be processed.