0% found this document useful (0 votes)
73 views

Nas Syllabus

This document outlines the topics covered in a course on network administration and security. It discusses installing and configuring Windows server and professional, managing users and groups, Active Directory, DNS, DHCP, routing services, and remote access. It also covers network security topics like encryption, firewalls, intrusion detection systems, virtual private networks, and disaster recovery. The practical sessions include installing Windows, Terminal Services, DNS, DHCP, and configuring networks and using security tools.

Uploaded by

ALOK
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
73 views

Nas Syllabus

This document outlines the topics covered in a course on network administration and security. It discusses installing and configuring Windows server and professional, managing users and groups, Active Directory, DNS, DHCP, routing services, and remote access. It also covers network security topics like encryption, firewalls, intrusion detection systems, virtual private networks, and disaster recovery. The practical sessions include installing Windows, Terminal Services, DNS, DHCP, and configuring networks and using security tools.

Uploaded by

ALOK
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

6.

3 NETWORK ADMINISTRATION & SECURITY


L T P
6 - 4
1. Introduction to Windows server, Professional and
Windows 2003 server,
Installation & configuration of Windows server
professional, Installation &
configuration of Windows server.

2. User & Group Managements, NTFS & share permissions.


Using device manager, Drivers signing& signature
verification. Managing Ports, Installing & Managing &
configuring printers. Disk Management Tools & Tasks,
File Systems,User Management. Installing Active
Directory.

3. Domain user account, configuring user account


properties. Domain groups. Viewing a user’s effective
permission. Creating and managing shares. Implementing
files and folder NTFS & share permission, Special
permission, inheritance. Implementing Shadow copies.
Implementing and Managing the Distributed File
system( DFS). Auditing Access to Resources.

4. Installing and Configuring Terminal Services.


Managing servers remotely using terminal services
( Remote desktop). Backup restoring data.

5. Installing DNS. Implementing DNS in windows


networks.

6. Installing and configuring DHCP. Monitoring and


Managing Internet information services ( IIS 6.0)
Remote Access server. Configuring & Implementing VPN.
Configuring & Implementing Remote Access services.

7. Configuring & Implementing routing services.


Configuring & implementing ICS. Active directory
services. Implementing active directory services
forest.

Corrected and Approved By B.T.E. On Dated 17.08.2016


8. Planning implementing an OU structure. Implementing
server roles. Restoring active directory.
9. Local and domain security policies. Working with
group policy

NETWORK SECURITY
1. Introduction
Need for securing a network; Principles of Security,
Type of attacks,
introduction to cyber crime, cyber law-Indian
Perspective (IT Act 2000 and
amended 2008), cyber ethics, ethical hacking. What is
hacking? attacker,
phreaker .

2. Securing Data over Internet Introduction to basic


encryption and decryption, concept of symmetric and
asymmetric key cryptography, overview of DES, RSA and
PGP. Introduction to Hashing: MD5, SSL, SSH, HTTPS,
Digital Signatures, Digital certification, IPSec

3. Virus, Worms and Trojans Definitions, preventive


measures – access central, checksum verification,
process configuration, virus scanners, heuristic
scanners, application level virus scanners, deploying
virus protection.

4. Firewalls
Definition and types of firewalls, firewall
configuration, Limitations of
firewall.

5. Intrusion Detection System (IDS)


Introduction; IDS limitations – teardrop attacks,
counter measures; Host basedIDS set up

6. Handling Cyber Assets- Configuration policy as per


standards,
Disposable policy

7. Virtual Private Network (VPN)


Basics, setting of VPN, VPN diagram, configuration of
required objects,
exchanging keys, modifying security policy

8. Disaster and Recovery


Disaster categories; network disasters – cabling,
topology, single point of
failure, save configuration files; server disasters –
UPS, RAID, Clustering,
Backups, server recovery

List Of Practicals
1. Installation & configuration of Windows
professional.
2. Installation & configuration of Windows server.
3. Installing and Configuring Terminal Services
4. Installing DNS. Implementing DNS in windows
networks.
5. Installing and configuring DHCP.
6. Configuring & Implementing routing services
7.Configuration and setup of ad hoc network and
infrastructure network.
8 NET tools, Deployment of NETTOOLS.
9. Tracing of email origin using email trace pro
utility.
10. Use of keylogges and anti key logger to secure your
system.

You might also like