Ganzheitlicher Ansatz für IT Infrastruktur Sicherheit: John Craddock zeigt Ihnen wie's geht

Beim ersten TechNet Event des neuen Jahres steht das Thema Sicherheit im Vordergrund. Wir freuen uns, Ihnen auch in diesem Jahr ein Seminar von John Craddock und Sally Storey in der Schweiz anbieten zu können. Das Seminar steht unter dem Titel "Building End-To-End Infrastructure Security".

Nachfolgend finden Sie die Details zu diesem kostenlosen englisch-sprachigen Seminar:

Datum: 30. Januar 2007 / 09:00 - 16:30 UhrOrt: World Trade Center, Leutschenbachstrasse 95, 8050 Zürich, Switzerland

Registration: hier

 

Like many IT professionals, you might have attended security seminars and sessions over the years and gained an appreciation of the various security technologies available. But when, where and how these technologies can and should be leveraged can often be confusing.

Infrastructure security is frequently only considered once server roles and network connectivity has been implemented, a problem made worse by inadequate training. When security technologies are not deployed until late in a project, the result can be poor implementation, weak documentation and compliance testing.

"Think security” to maximise the availability, integrity and confidentiality of data.

In this information-packed seminar, John Craddock presents a holistic approach to implementing security in order to maximise the availability, integrity and confidentiality of data within an organisation. This seminar will help you to “think security”: work out what’s needed to logically implement a secure environment, then leverage the technologies to build a cohesive solution.

Agenda:
09:00 Registration
09:30 Is Your IT Infrastructure Secure?
11:15 Securing Your Network

12:45 Lunch
13:45 Locking Down Servers and Workstations
15:15 Vista Technologies

16:30 End

Topics covered:

  • Identifying business assets
  • Threat modeling
  • Security policy and response planning
  • Deploying IPSec for domain and server isolation
  • Building rules and filters
  • Identifying protocol and port requirements
  • Firewall configurations
  • Managing server roles and lockdown policies
  • Patch management and compliance testing
  • Creating Software Restriction Policies (SRP)
  • Least privileged user access
  • Establishing client security and software policy
  • Client and server attack vectors
  • Managing through group policies
  • Network Access Protection (NAP)
  • Vista security enhancements

 

 

 

 

 

Biographies:

John Craddock has designed and implemented computing systems ranging from embedded high-speed industrial controllers through to distributed IT solutions. John works as a consultant providing services to industry leaders including Microsoft. He was a key player in the Government Gateway Project, has designed high-availability web portals and help companies build Active Directory solutions to support their business critical environments. In addition to his role as a consultant, he has written over 20 technical training courses that have been published worldwide. He co-authored 'Investigating and Managing Objects and Attributes for Microsoft Windows 2000 and Microsoft Windows Server 2003' which is part of the Active Directory Forestry series. John lectures internationally and has written and presented technical sessions at MTB, MEC, Tech•Ed, Microsoft IT Forum, JDP and deployment conferences.

Sally Storey has worked in management and consulting in the IT industry for Novell, Microsoft and now, independently. Sally works as a consultant on enterprise infrastructure projects in operations, logistics and deployment roles. Sally is ITIL qualified and specializes in building process that keep systems highly available and secure. Sally co-authored the Active Directory® Forestry series with John Craddock.