Windows 2000 Security Design 70-220 - Analyzing Technical Requirements
This online training course shows users how to evaluate an existing IT infrastructure in preparation for developing a security design.
This lesson is part of our Windows 2000 Security Design 70-220 online training series which contains 40 hours of self-paced courseware. Our web-based training provides 1 year of unlimited access.
After completing this course you will be able to:
- Evaluate the company's existing and planned technical environment
- Analyze company size and user and resource distribution
- Assess available connectivity between work sites and remote sites
- Assess net available bandwidth
- Analyze performance requirements
- Analyze the method of accessing data and systems
- Analyze network roles and responsibilities
- Analyze the impact of a proposed security design on the existing and planned technical environment
- Network Connectivity and Topology
- Network Bandwidth and Performance
- Data and Systems Access
- Roles and Responsibilities
- Analyzing the Existing Security Design
This course is for anyone who wants to get the most out of using Windows 2000 Security Design 70-220.
- Internet connection
- Browser: Internet Explorer, FireFox, Chrome, Safari, Opera or any standards compliant browser.
- Authorware and Macromedia Flash player recommended but not required.
Retake any or all of our computer training as often as you want. Our online tutorials allow you to learn anywhere, anytime from any computer with internet access. All courses allow for 1 year unlimited access (1 user), includes a variety of features and all courses qualify for Continuing Education Unit credit.
StaffKit is an e-learning leader in providing computer training tutorials and online education. We have satisfied customers in over 75 countries using our online training courses. We have been a leading provider of self-paced web based training for the past 10 years.