Tutorials:
Overview |
By Day
(Sunday,
Monday, Tuesday) |
By Instructor | All in One File
T1 Advanced Solaris Systems Administration Topics Peter Baer Galvin, Corporate Technologies Who should attend: UNIX administrators who need more knowledge of Solaris administration. We will discuss the major new features of recent Solaris releases, including which to use (and how) and which to avoid. This in-depth course will provide the information you need to run a Solaris installation effectively. Updated to include Solaris 8 and several other new topics. Topics include:
Peter Baer Galvin (T1)
is the chief technologist for Corporate Technologies, Inc., and was the systems manager for Brown University's
Computer Science Department. He has written articles for Byte and other
magazines, is systems admnistration columnist for SunWorld, and is
co-author of the Operating Systems Concepts and the Applied Operating
Systems Concepts textbooks. As a consultant and trainer, Peter has taught
tutorials on security and systems administration and has given talks at many
conferences.
Who should attend: System and network administrators who will need to implement or maintain Windows 2000based systems and networks, and site managers charged with selecting and setting site security requirements. The security implications of a large Windows 2000 (Win2K) deployment are not yet well understood. This tutorial presents the problems and solutions surrounding Win2K and the security of the networks it runs on. It will cover the design of Win2K from a security standpoint and outline what Win2K has "out of the box" for security, along with Win2K-related risks and appropriate countermeasures. It will conclude with specific recommendations on firewalling Win2K and offer pointers on how to "harden" the system. Topics include:
Phil Cox
(M5, T2)
is a consultant for SystemExperts
Corporation, a consulting firm that specializes in system security and
management. Phil frequently writes and lectures on issues bridging the gap
between UNIX and Windows NT. He is a featured columnist in ;login;, the
USENIX Association Magazine and has served on numerous USENIX program
committees. Phil holds a B.S. in computer science from the College of
Charleston, South Carolina.
Who should attend: This class will cover a range of timely and interesting UNIX system administration topics. It is intended for system and network administrators who are interested in picking up several new technologies in an accelerated manner. The format consists of five topics spread throughout the day. SNMP: An introduction to SNMP, followed by discussion and live examples of popular SNMP agents for Linux, HP-UX, Solaris, and others. We will look at packaged agents, freely available ones, and also command-line SNMP tools. RRDtool and Cricket: These free network monitoring tools can be combined to create a highly customizable Web-based network management system. Those familiar with Perl will be able to apply examples from this section to almost any monitoring scenario. Although everyone understands the value of UNIX system logs, many organizations are still in the Stone Age of log management. This section will discuss popular logging strategies and several free tools to help facilitate their use. Host security: Although the specific configuration tips apply to Linux and Solaris, the concepts are generic, applying well to other UNIX operating systems. The section will include technical discussion designed to help administrators determine weak points in their own installations. Firewall configuration: This section will integrate ideas from the rest of the day. Examples will be drawn from Cisco and Checkpoint, but the focus will be on generic firewalling strategy. Several tools to check firewall configuration will be demonstrated.
Evi Nemeth
(S3, T3),
a faculty member in
computer sci ence at the University of Colorado, has managed UNIX systems
for the past 20 years, both from the front lines and from the ivory tower. She
is co-author of the UNIX System Administration Handbook.
Who should attend: Anyone who is designing, implementing or maintaining a UNIX environment with 2 to 20,000+ hosts. System administrators, architects, and managers who need to maintain multiple hosts with few admins. This tutorial won't propose one "perfect solution." Instead, it will try to raise all the questions you should ask in order to design the right solution for your needs. Topics include:
The class will concentrate on UNIX, but integration with NT/2000 will also be discussed.
Lee Damon
(S12, T4)
holds a B.S. in
speech communication from Oregon State University. He has been a UNIX system
administrator since 1985 and has been active in SAGE since its inception. He is
a member of the SAGE Ethics Working Group and was one of the commentators on the SAGE Ethics document. He has championed awareness of ethics in the systems
administration community, including writing it into policy documents.
Who should attend: Anyone involved with network design, implementation, and support, and content providers who need familiarity with wireless technologies and how those technologies can affect their service offerings. A basic understanding of wired network architecture over local and/or wide areas is required. For years people have dreamed of "unwired" access--anywhere, anytime--to networks and the data they contain. Recently, the advent of standards for wireless LANs, the development of powerful handheld devices, and widespread deployment of services such as digital cellular systems have made the promise of wireless networking more realizable than ever before. Topics include:
Jon Rochlis (T5)
is a independent consultant, providing
high-level advice to large and small businesses in the areas of networking,
network security, distributed systems design and management, and electronic
commerce. He has been a senior consultant with SystemExperts Corp., an
engineering manager with BBN Planet (now GTE), Director of the Cambridge
Technology Center of OpenVision Technologies, and a technical supervisor for the
Development Group of MIT's Distributed Computing and Network Services (DCNS),
the follow-on to Project Athena. Jon has also served on the NEARnet Technical
Committee. He holds a B.S. degree in computer science and engineering from MIT.
Who should attend: Both current and prospective Linux system administrators. It will cover configuring and managing Linux computer systems in production environments, with a focus on the administrative issues involved in deploying Linux systems for real-world tasks and problems arising from both commercial and R&D contexts. Topics include:
Aeleen Frisch
(M8, T6)
has been a system administra tor for over 15 years. She currently looks after
a very heterogeneous network of UNIX and Windows NT systems. She is the author
of several books, including Essential Windows NT System
Administration.
Who should attend: People who investigate computer crimes and are familiar with systems or network administration and the Internet. This tutorial will explain where evidence can be found, how it can be retrieved securely, how to build a picture of the "crime scene," and what can be done beforehand to make investigations easier and more successful. Examples are drawn from UNIX, Windows NT, and telecommunications hardware. Topics include:
Steve Romig (T7)
is in charge of the Ohio State
University Incident Response Team, which provides incident response assistance,
training, consulting, and security auditing service for The Ohio State
University community. He is also working with a group of people from Central
Ohio businesses to improve Internet security response and practices. In years
past Steve has worked as lead UNIX system administrator at one site with 40,000
users and 12 hosts and another site with 3,000 users and over 500 hosts. Steve
received his B.S. in mathematics (computer science track) from Carnegie Mellon
University in 1983. You can reach him by phone at 1-614-688-3412 or by email at
romig@net.ohio-state.edu.
Who should attend: Perl programmers interested in honing their existing Perl skills for quick prototyping, system utilities, software tools, system management tasks, database access, and WWW programming. Participants should have several months' experience of basic Perl scripting. Topics include:
Upon completion of this course, students will be able to:
Tom Christiansen (T8)
has been involved with Perl
since day zero of its initial public release in 1987. Lead author of The Perl Cookbook, co-author of the second editions of Programming Perl and Learning Perl, and co-author of Learning Perl on Win32 Systems, Tom is also the major caretaker of Perl's online documentation. He holds undergraduate degrees in computer science and Spanish and a master's in computer science. He now lives in Boulder, Colorado.
Who should attend: This fast-paced tutorial is intended for UNIX administrators who are already familiar with configuring and administering sendmail and who want to learn how to convert to sendmail 8.11 or who want to understand sendmail security better, particularly on firewalls and other similar systems. Sendmail is a powerful Mail Transport Agent that can be configured for many different environments, from firewalls through workstation mail servers. These environments have different security requirements; in particular, in a pure relay configuration (with no local user accounts or delivery) sendmail can be configured to relinquish root permissions. Topics include:
Eric Allman
(M3, T9)
is the original author of sendmail. He is the
author of syslog, tset, the -me troff macros, and trek. He was the chief
programmer on the INGRES database management project, designed database user and application interfaces at Britton Lee,and contributed to the Ring Array
Processor project at the International Computer Science Institute. He is a
former member of the USENIX Board of Directors.
Who should attend: System administrators involved in the design, implementation, and administration of Legato NetWorker. Participants should be familiar with basic NetWorker installation and administration. Participants who are planning to use, but are not yet using, NetWorker should review the NetWorker documentation. Anyone who has implemented a medium to large installation of any commercial backup software package understands the challenges of such a project. This tutorial will focus on the challenges unique to Legato NetWorker, with a heavy emphasis on automation, monitoring, and reporting. The tutorial will also answer questions all NetWorker administrators find themselves asking, and it will provide scripts that can be used to automate NetWorker. Topics include:
After completing this tutorial, participants will be able to answer these questions, will know how to avoid common pitfalls, and will have the tools necessary to completely automate their NetWorker installation.
W. Curtis Preston
(T10, T13)
is a Practice Principal for Collective Technologies and
manages their Backup and Recovery Practice. He has been specializing in backup
and recovery for over seven years and has designed, implemented, and audited
enterprisewide backup and recovery systems for many Fortune 500 and e-commerce
companies. His O'Reilly & Associates book, UNIX Backup &
Recovery, has sold over 20,000 copies, and he writes a regular column for
UnixReview online and SysAdmin magazine. Curtis's Web address is
https://www.backupcentral.com, and he can be reached at curtis@backupcentral.com.
Who should attend: Newly promoted technical managers and those who expect promotion in the near future. So you have done well at your technical job and have been asked to take on some management responsibility. You understand the technical side of the jobs your group is doing. What do you need to succeed as a manager? This class and the accompanying "Management 102" will orient you, introduce you to the skills you will need to be most effective, and suggest ways you can guide your own growth as a manager. (N.B.: The tutorial "Communicating with Everyone" is highly recommended, but not essential.) Topics include:
Stephen Johnson
(M11, M14, T11, T14)
has been a technical manager on and off for nearly two
decades, in both large and small companies. At AT&T, he is best known for
writing Yacc, Lint, and the Portable C Compiler. He served as the head of the
UNIX Languages Department at AT&T's Summit Labs. He has also been involved
in a number of Silicon Valley startup companies. He served for ten years on the
USENIX Board of Directors, four of them as president. He presented an invited
talk on management at LISA three years ago, he has taught USENIX tutorials on
technical subjects, and he has led management training seminars at LISA and the
USENIX Annual Conference, as well as at Transmeta.
Who should attend: UNIX system and network administrators already familiar with or responsible for sendmail, who want to learn how to move their sites to sendmail 8.11 or who want to better understand sendmail security, particularly on firewalls and other similar systems. Sendmail 8.11, the latest release of Open Source sendmail, has many new features. In many cases mail administrators can just compile the new release of sendmail and use their old configuration files, but "power users" may wish to utilize the many new capabilities of version 8.11. Topics include:
Time permitting, musings on the future direction of sendmail will be indulged in.
Gregory Neil Shapiro (T12)
began his professional career as a system administrator for Worcester
Polytechnic Institute (WPI) after graduating from WPI in 1992. During his tenure as senior UNIX system administrator, he became involved with beta testing the BIND name server, the sendmail mail transfer agent, and other UNIX utilities such as emacs and screen. He contributed the secure zones functionality included
in BIND 4.9.X. When presented with the opportunity to join Sendmail, Inc., he
packed his bags and headed west. As lead engineer at Sendmail, Inc., he has
continued to support the open source version while working on Sendmail Pro and
Sendmail Switch, the commercial versions.
Who should attend: UNIX administrators who need to back up and recover their Oracle 7 or 8 database, and NT engineers who need to know more about Oracle architecture and recovery. Topics include:
W. Curtis Preston
(T10, T13)
is a Practice Principal for Collective Technologies and
manages their Backup and Recovery Practice. He has been specializing in backup
and recovery for over seven years and has designed, implemented, and audited
enterprisewide backup and recovery systems for many Fortune 500 and e-commerce
companies. His O'Reilly & Associates book, UNIX Backup &
Recovery, has sold over 20,000 copies, and he writes a regular column for
UnixReview online and SysAdmin magazine. Curtis's Web address is
https://www.backupcentral.com, and he can be reached at curtis@backupcentral.com.
Who should attend: New technical managers or those who expect to be managers soon. (This is a companion tutorial to "Management 101." The tutorial on "Communicating with Everybody:" is also recommended, but not required.) Many managers report that their job seemed very powerful when before they took it, does not feel that way now. This tutorial offers practical techniques that allow people to empower themselves and others. True empowerment comes from within and can be developed even in a hostile environment. Empowering yourself also helps you empower your employees and your boss. Topics include:
Stephen Johnson
(M11, M14, T11, T14)
has been a technical manager on and off for nearly two
decades, in both large and small companies. At AT&T, he is best known for
writing Yacc, Lint, and the Portable C Compiler. He served as the head of the
UNIX Languages Department at AT&T's Summit Labs. He has also been involved
in a number of Silicon Valley startup companies. He served for ten years on the
USENIX Board of Directors, four of them as president. He presented an invited
talk on management at LISA three years ago, he has taught USENIX tutorials on
technical subjects, and he has led management training seminars at LISA and the
USENIX Annual Conference, as well as at Transmeta.
|
Need help? Use our Contacts page.
Last changed: 29 Aug 2000 bleu |
|