Built on NT technology, Windows 2000 Professional delivers |
the business operating system to the next generation of computing. | With built-in Web and application services, Internet-standard security, | and record-breaking performance at a low cost, it is one of the best | operating systems for doing business on the Internet. Learn all about | it in Virtual Training Company's tutorial. You will soon be able to | customize your desktop, configure hardware, and use the | control panel as author Louis Dipaola teaches you step by step | how to use Windows 2000. This tutorial is a wonderful resource | in preparing for the Microsoft Certification Exam #70-210. | | Tutorials covered on this CD: | Introduction to Windows 2000 | Welcome to Windows 2000 Professional | | Windows NT Installation | Minimum Hardware Requirements | Hardware Compatibility List | Installation Options | Upgrading to Windows 2000 | Menu Installation Mode | Graphical Installation Mode | Automatic Installations | | Desktop Customization | Active Desktop and Display | Configuring Mouse Settings | Customizing the Taskbar | Customizing the Start Menu | Explorer Views | | Accessibility | Using the Magnifier | The Narrator | On-screen Keyboard | Accessibility Wizard and the Utility Manager | | System Configuration Tools | MMC | Administration Tools | Control Panel | | Hardware Configuration | Using the Hardware Wizard | Using the Device Manager | Hardware Profiles and Driver Signing | Hardware Resources | | Using the Control Panel | Adding and Removing Programs | Installing and Configuring Communication Devices | Keyboard and Mouse Configurations and Controllers | Power Options and UPS | Regional Options (Multi-language Settings) | Scanners and Cameras | Sound and Multimedia | | File System Options | Changing Folder Settings from Control Panel and Explorer | Working with Hidden and Super Hidden Files | Using My Pictures | Customizing Folder Wizard | Configuration and Synchronization of Offline Folders | Useful File System Features | Searching on a Windows 2000 Machine | Configuration of Index Services | | Sharing Files and Folders | Sharing Resources | Share and File Permissions | NTFS | Auditing File Access | Taking File Ownership | Permission Changes When Copying and Moving Files | | Disk Administration and Configuration | Introduction to Disk Administration | Working with FAT, FAT32 and NTFS | Creating Partitions | Partition Configuration | Mounting a Drive | Dynamic Disks | Creating and Extending Volumes | Spanning Volumes | Striping Volumes | Conversion from FAT to NTFS | Configuring Disk Quotas | Disk Maintenance | | Networking | My Network Places | Using the Add My Network Places Wizard | Mapping a Drive | Configuring Protocols | Configuring Clients and Network Services | Using the Network Configuration Wizard | Configuring Protocols and Services on Network Connections | Internet Options | Configuring the Network Identification | Automatic Private IP Addressing | | Printing | Adding Local and Network Printers | Adding Printers from within a Program | Sharing Printers on a Network | Setting Up Print Pooling | Scheduling Print Jobs | Setting Print Priorities | Spooler Settings and Separator Pages | Printer Security | Troubleshooting Printers | | User and Group Configuration | Making/Deleting Users with Users and Passwords Utility | Changing Passwords from Users and Passwords Utility | Advanced Users and Passwords Utility Configuration | Managing Users with the MMC | Setting Home Directory | Managing Groups | Profiles | Active Directory Services | | Monitoring and Streamlining Performance | Using Performance Monitor | Making and Using Performance Monitor Logs | Virtual Memory and System Response | Setting Environmental Variables | Configuring Startup and Recovery | Configuring Services | | Security and Monitoring System Use | Local Security Policies: Account Policies | Local Security Policies: Local Policies (Auditing) | Local Security Policies: Local Policies (User Rights) | Local Security Policies: Local Policies (Security Options) | Local Security Policies: Public Key Policies | Local Security Policies: IP Security | Monitoring the System with the Event Viewer | Using the Run As Command | Encrypting Files (EFS) | | Booting and Troubleshooting | Recovering with a Windows 2000 Boot Disk | Emergency Repair Disk | Using the Windows 2000 Backup Utility | Using the Backup Wizard | Restore Data | Installing the Recovery Console | Scheduling Tasks | Recovery Console | | Registry | Regedit and Regedit 32 | Changing Registry Values | Adding and Deleting Keys and Values | Securing Keys | Auditing the Registry | Backing Up the Registry with Regedit |
|