Intrusion Detection and Network Forensics Marcus J. Ranum, Network Flight Recorder, Inc. Who should attend: Topics include: What is IDS? Can IDS help? Types and trends in IDS design Concepts for building your IDS Tools for building your IDS Reporting and recording Network forensics Resources and references Marcus J. Ranum is CEO and founder of Network Flight Recorder, Inc. He is the principal author of several major Internet firewall products, including the DEC SEAL, the TIS Gauntlet, and the TIS Internet Firewall Toolkit. Marcus has been managing UNIX systems and network security for over 13 years, including configuring and managing whitehouse.gov. Marcus is a frequent lecturer and conference speaker on computer security topics, and is co-author with Daniel Geer and Aviel Rubin of The Web Security Sourcebook. Advanced Topics in Windows NT Security Phil Cox, Networking Technology Solutions Who should attend: Many Windows NT security issues require more than a basic understanding of security exposures and potential control measures. This course is designed for system and network administrators and system programmers who are already technically proficient with Windows NT security and want to learn more about advanced features. Topics include: Details of Windows NT related to security and their implications
Tradeoffs in designing and implementing suitable Practical exercise in defending NT using a firewall Dealing with Windows NT authentication Securing the Windows registry The Security Configuration Manager Phil Cox is a consultant for Networking Technology Solutions, and is a member of a government incident response team. Phil frequently writes and lectures on issues bridging the gap between UNIX and Windows NT. He is a featured columnist in ;login:, the USENIX Association magazine, and is on the upcoming USENIX LISA program committee. Phil has a B.S. in Computer Science from the College of Charleston, South Carolina. Secure Networking An Introduction to Virtual Private Networks Tina Bird, Secure Netorking Group Who should attend: Virtual private networking technology provides a flexible mechanism for addressing connectivity needs within many organizations. This class focuses on assessing business and technical requirements for remote access and extranet connections, evaluating VPN technology, integrating VPNs within an existing network infrastructure, and common implementation difficulties. Topics include: After completing this course, students will be ready to evaluate their requirements for remote access and begin testing commercial VPN implementations. Tina Bird is a security analyst at Secure Network Group, a consulting firm in Lawrence, Kansas specializing in the installation and management of secure wide-area networks. She has implemented and managed a variety of wide-area-network security technologies, such as firewalls and VPN packages; built and supported extranet and intranet remote access packages; and developed, implemented, and enforced corporate IS security policies in a variety of environments. Her main focus in the last year has been on the evaluation and implemen-tation of virtual private networking solutions in small- to mid-sized networks (40 to 4000 hosts). Tina is the moderator of the Virtual Private Networks mailing list. She has a B.S. in physics from Notre Dame and an M.S. and Ph.D. in astrophysics from the University of Minnesota. |
Need help? Use our Contacts page. First posted: May 1999 Last changed: May 1999 |
|