Tutorial Descriptions [Tutorial Overview]
M1 Inside
the Linux Kernel
Who should attend: Application programmers and kernel developers. You should be reasonably familiar with C programming in the UNIX environment, but no prior experience with the UNIX or Linux kernel code is assumed. This tutorial will give you an introduction to the structure of the Linux kernel, the basic features it provides, and the most important algorithms it employs. The Linux kernel aims to achieve conformance with existing standards and compatibility with existing operating systems; however, it is not a reworking of existing UNIX kernel code. The Linux kernel was written from scratch to provide both standard and novel features, and takes advantage of the best practice of existing UNIX kernel designs. Although the material will focus on the release version of the Linux kernel, it will also address aspects of the development kernel codebase where its substance differs. It will not contain any detailed examination of the source code but will, rather, offer an overview and roadmap of the kernel's design and functionality. Topics include:
Theodore Ts'o has been a Linux kernel developer since almost the very beginnings of Linuxhe implemented POSIX job control in the 0.10 Linux kernel. He is the maintainer and author for the Linux COM serial port driver, and the Comtrol Rocketport driver. He architected and implemented Linux's tty layer. Outside of the kernel, he is also the maintainer of the e2fsck filesystem consistency checker. Theodore is currently employed by VA Linux Systems. Stephen Tweedie works on Linux kernel internals and high availability for Red Hat, Inc. Before that he worked on VMS filesystem internals for Digital's Operating Systems Software Group. He has been contributing to Linux for a number of years, in particular designing some of the high-performance algorithms central to the ext2fs filesystem and the virtual memory code.
M2 Configuring and Administering Samba Servers
Who should attend: System and network administrators who wish to integrate Samba running on a UNIX-based machine with Microsoft Windows clients. No familiarity with Windows networking concepts will be assumed. Samba is a freely available suite of programs that allows UNIX-based machines to provide file and print services to Microsoft Windows PCs without installing any third-party software on the clients. This allows users to access necessary resources from both PC and UNIX workstations. As Samba makes its way into more and more network shops all over the world, it is common to see "configuring Samba servers" listed as a desired skill on many job descriptions for network administrators. This tutorial will use real-world examples taken from daily administrative tasks. Topics include:
Gerald Carter has been a member of the Samba Team since 1998 and is employed by VA Linux Systems. He is currently working on a guide to LDAP for system administrators with O'Reilly Publishing. He holds a masters degree in computer science from Auburn University where he was also previously employed as a network and systems administrator. Gerald has published articles with various Web based magazines such as Linuxworld, and has authored instructional courses for companies such as Linuxcare. In addition to this, he acted as the lead author of Teach Yourself Samba in 24 Hours by Sams Publishing.
M3
UNIX/Linux Network Administration
Who should attend: System administrators who are implementing network services and need some background in the configuration of those services as well as the basics of the protocols. Attendees should have used or have been clients of an IP network and should have a basic knowledge of system administration, but need not be experienced network administrators. Both beginning and intermediate-level network administrators will leave the tutorial having learned something. Today, system administrators are being tasked with bringing their office environments on-line. Whether the goal is a stand-alone client attached to the Internet or a distributed network of Web servers, the prospect of configuring all the necessary network services can be daunting. Attendees will take away configuration examples, as well as brief overviews of the underlying protocols, which they can put to work after the conference. Topics include (with a special emphasis on security):
At the completion of the course, attendees should feel confident in their ability to set up and maintain secure network services. The tutorial will be conducted in an open manner that encourages question-and-answer interruptions. Joshua Jensen was the first Red Hat instructor and examiner, and has been with Red Hat for 3 years. In that time he has written and maintained large parts of the Red Hat curriculum: Networking Services and Security, System Administration, and the Red Hat Certified Engineer course and exam. Joshua has worked with Linux for six years, and has been teaching Cisco Internetworking and Linux courses since the beginning of 1998.
T1 Who should attend: People with system administration duties, advanced-beginner to intermediate Perl experience, and a desire to make their jobs easier and less stressful in times of sysadmin crises. Perl was originally created to help with system administration, so it is a wonder that there isn't more instructional material devoted to helping people use Perl for this purpose. This tutorial hopes to begin to remedy this situation by giving you six solid hours of instruction geared towards putting your existing Perl knowledge to practice in the system administration realm. The morning section will concentrate on the power of Perl in this context. Based on the instructor's O'Reilly book, we'll take a multi-platform look at using Perl in cutting-edge and old-standby system administration domains. Topics include:
In the afternoon, we will look at putting our Perl knowledge to work for us to solve time-critical system administration problems using short Perl programs. Centered around a set of "battle stories" and the Perl source code used to deal with them, we'll discuss different approaches to dealing with crises using Perl. At the end of the day, you'll walk away from this class with Perl approaches and techniques that can help you solve your daily system administration problems. You'll have new ideas in hand for writing small Perl programs to get you out of big sysadmin pinches. On top of all this, you are also likely to deepen your knowledge of Perl. David N. Blank-Edelman is the Director of Technology at the Northeastern University College of Computer Science and the author of the O'Reilly book Perl for System Administration. He has spent the last 15 years of his life as a system/network administrator in large multi-platform environments, including Brandeis University, Cambridge Technology Group, and the MIT Media Laboratory. He has served as Senior Technical Editor for the Perl Journal and has written many magazine articles on world music.
T2 Exploring the Potential of LDAP NEW
Who should attend: Administrators and programmers interested in the potential of the Lightweight Directory Access Protocol (LDAP) and in exploring issues related to deploying an LDAP infrastructure. This tutorial is not designed to be a how-to for a specific LDAP server, nor is it an LDAP developers' course. Rather, it is an evaluation of the potential of LDAP to allow the consolidation of existing deployed directories. No familiarity with LDAP or other Directory Access Protocols will be assumed. System administrators today run many directory services, though they may be called by such names as DNS and NIS. LDAP, the up-and-coming successor to the X500 directory, promises to allow administrators to consolidate multiple existing directories into one. Vendors across operating system platforms are lending support. Topics include:
Gerald Carter has been a member of the Samba Team since 1998 and is employed by VA Linux Systems. He is currently working on a guide to LDAP for system administrators with O'Reilly Publishing. He holds a master's degree in computer science from Auburn University where he was also previously employed as a network and systems administrator. Gerald has published articles with various Web based magazines such as Linuxworld, and has authored instructional course for companies such as Linuxcare. In addition to this, he acted as the lead author of Teach Yourself Samba in 24 Hours by Sams Publishing.
T3 Linux
System Administration
Who should attend: System administrators who are planning on implementing a Linux solution in a production environment. Course attendees should be familiar with the basics of system administration in a UNIX/Linux environment: user-level commands, administration commands, and TCP/IP networking. Novice and intermediate administrators should leave the tutorial having learned something. From a single server to a network of workstations, the Linux environment can be a daunting management task for administrators knowledgeable in other platforms. Starting with a single server and finishing with a multi-server 1,000+ user environment, case studies will provide practical information for using Linux in the real world. Topics include (with a special emphasis on security):
At the completion of the course attendees should feel confident in their ability to set up and maintain a secure and useful Linux network. The tutorial will be conducted in an open manner that allows for question-and-answer interruptions. Joshua Jensen was the first Red Hat instructor and examiner, and has been with Red Hat for 3 years. In that time he has written and maintained large parts of the Red Hat curriculum: Networking Services and Security, System Administration, and the Red Hat Certified Engineer course and exam. Joshua has worked with Linux for six years, and has been teaching Cisco Internetworking and Linux courses since the beginning of 1998.
W1 Building and Using a Personal Beowulf NEW
Who should attend: The tutorial is designed for individuals or small groups who need a personal supercomputer but are restricted to a limited budget. This tutorial, unlike most tutorials on Beowulfs, is aimed at small installations rather than, for example, national labs. The goal is to provide attendees with practical advice on how to put together the hardware, install the software, and use the system to actually speed up the tasks they want performed. Topics include:
Tutorial materials include a CD-ROM for the Scyld Beowulf Distribution. Vlakkies Schreuder holds a Ph.D. in Computational Fluid Mechanics and is currently working on a second Ph.D. in Parallel Systems. He has been solving practical problems in mathematical modeling in academia and private industry for about 20 years, and has been a UNIX sysadmin for more than 15 years. He uses his personal Beowulf to solve problems in software development, computational fluid dynamics, data analysis, scientific visualization and animation.
W2 Internet Security for UNIX & Linux System Administrators
NEW
Who should attend: UNIX and Linux system and network administrators and operations/support staff. After completing the tutorial, you should be able to establish and maintain a site that allows the benefits of Internet connectivity while protecting your organization's information. You will learn strategies to reduce the threat of Internet intrusions and to improve the security of your UNIX and Linux systems connected to the Internet, as well as how to set up and manage Internet services appropriate to your site's mission. Topics include:
Ed DeHart is a former member of the CERT Coordination Center at Carnegie Mellon University which he helped found in 1988. Ed has also owned an ISP, Pittsburgh OnLine Inc, that operated several UNIX servers. Currently, Ed is President of Prism Servers, Inc., a manufacturer of Internet Firewalls and UNIX based Internet Servers.
W3 Who should attend: Experienced Perl programmers interested in honing their Perl skills for quick prototyping, system utilities, software tools, system management tasks, database access, and Web programming. Students should have used Perl for basic scripting for several months before taking this course. Topics include:
Upon completion of this course, students will understand many of the more esoteric, yet extremely powerful features available in Perl. Numerous code examples will be presented as a means of demonstrating advanced features of the Perl language. Daniel Klein has been teaching a wide variety of Unix-related subjects since 1984, has been involved with Unix since 1976, and with Perl since 1995. His experience covers a broad range of disciplines, most recently involving dozens of high-performance Web sites, but also includes the Internals of almost every Unix kernel released in the past 24 years, real-time process control, compilers and interpreters, medical diagnostic systems, system security and administration, Web-related systems and servers, graphical user interface management systems, and a racetrack betting system. He contributes regularly to the proceedings of the USENIX Association, and is also their Tutorial Coordinator.
W4 Practical Wireless IP: Concepts, Administration, and Security NEW
Who should attend: Users, administrators, managers, and anyone who is interested in learning about some of the fundamental security and usage issues that we all must come to grips with in purchasing, setting up, and using wireless IP services. The primary focus is on wireless IP services for laptops, although we'll glance at some popular mobile devices, such as handheld systems and cell phones with Internet access. The tutorial is targeted at beginning to intermediate wireless users. It assumes some knowledge of TCP/IP networking and client/server computing, the ability or willingness to use administrative GUIs to setup a device, and a general knowledge of common laptop environments. This course is focused on the practical understanding and usage of wireless technologies, and is not an in-depth analysis of Radio Frequencies or the various wireless protocols (e.g., Bluetooth, CDPD, GPRS). Whether you like it or not, wireless services are popping up everywhere. As time goes on, more of your personal and corporate data communications will be done over various types of wireless devices. Just as in the wired world, we're faced with a proliferation of business and technical choices concerning security, hardware, software, protocols, and administration. The good news is that generally somebody else will handle these complicated issues for users (of course, that "someone else" may be you!). However, since most wireless services users are carrying their devices everywhere they go, you and your organization will still be responsible for understanding and managing the devices you possess. Since the purpose of wireless is to share data when you aren't directly attached to a wired resource, you need to understand the fundamental security and usage options. In this course we will cover a number of topics that affect you in implementing, managing and using wireless services. Some of the topics will be demonstrated live using popular wireless devices. Topics include:
Philip Cox is a consultant for SystemExperts Corporation, a consulting firm that specializes in system security and management. He is a well-known authority in the areas of system integration and security. He is the lead author of Windows 2000 Security Handbook and Technical Editor of Hacking Linux Exposed, both from Osborne McGraw-Hill. His experience includes Windows NT/2000, UNIX, and IP based networks integration, secure network design and implementation, and Information Security Policy development. Phil frequently writes and lectures on issues dealing with UNIX & NT integration and on Information Security. He holds a BS in Computer Science. Brad C. Johnson is Vice President of SystemExperts Corporation. He has participated in seminal industry initiatives like the Open Software Foundation, X/Open, and the IETF, and has often published about open systems. Brad has served as a technical advisor to organizations such as Dateline NBC and CNN on security matters. He is a regular tutorial instructor and conference speaker on topics related to practical network security, penetration analysis, middleware, and distributed systems. Prior to joining SystemExperts, Brad was a member of the technical staffs at the Open Software Foundation, Digital Equipment Corporation, Data General Corporation, and Bell Telephone Laboratories. Brad holds a Bachelor of Arts degree in Computer Science from Rutgers University and a Master of Science degree in Applied Management from Lesley University.
|
Last changed:
ml,
Monday, 27-Aug-2001 20:47:32 EDT
|
Conference index |