IT's Showtime - webcasts from Steve Riley, Jesper and Rafal
Follow this link to access free webcasts from technical experts showing you how to get the maximum value from a range of Microsoft technologies including Security of course. Please give feedback to this post if there are topics you'd like us to cover or if you have suggestions how we can make this even better.
Adam has already looked at the content - here's a link to his article.
Here's a list of the content that's available right now - more is being added very soon including
Practicing Better than Best: Getting and Staying Secure the Right Way Session 1
Steve Riley, Jesper M. JohanssonPracticing Better than Best: Getting and Staying Secure the Right Way Session 2
Steve Riley, Jesper M. JohanssonPracticing Better than Best: Getting and Staying Secure the Right Way Session 3
Steve Riley, Jesper M. JohanssonPracticing Better than Best: Getting and Staying Secure the Right Way Session 4
Steve Riley, Jesper M. JohanssonPracticing Better than Best: Getting and Staying Secure the Right Way Session 5
Steve Riley, Jesper M. JohanssonManaging Dynamic Storage Services - Lessons Learned
Mark LicataMicrosoft Identity Management Strategy and Roadmap
Andreas LutherIn-depth Look at Client Security Enhancements in Windows XP SP 2
Ryan BurkhardtTCP/IP for Security Administrators
Steve RileyExchange Server 2003 Cluster Deployments: Best Practices
Scott SchnollBuilding High Security Networks
Graham Calladine, Paul CullimoreStretching Directory Boundaries - Cross Platform Identity Management, Authentication and Security Session 1
John Craddock, Sally StoreyStretching Directory Boundaries - Cross Platform Identity Management, Authentication and Security Session 2
John Craddock, Sally StoreyStretching Directory Boundaries - Cross Platform Identity Management, Authentication and Security Session 3
John Craddock, Sally StoreyStretching Directory Boundaries - Cross Platform Identity Management, Authentication and Security Session 4
John Craddock, Sally StoreyStretching Directory Boundaries - Cross Platform Identity Management, Authentication and Security Session 5
John Craddock, Sally StoreyCryptography Overview
Rafal Lukawiecki