Beim ersten TechNet Event des neuen Jahres steht das Thema Sicherheit im Vordergrund. Wir freuen uns, Ihnen auch in diesem Jahr ein Seminar von John Craddock und Sally Storey in der Schweiz anbieten zu können. Das Seminar steht unter dem Titel "Building End-To-End Infrastructure Security".
Nachfolgend finden Sie die Details zu diesem kostenlosen englisch-sprachigen Seminar:
Datum: 30. Januar 2007 / 09:00 - 16:30 UhrOrt: World Trade Center, Leutschenbachstrasse 95, 8050 Zürich, Switzerland
Like many IT professionals, you might have attended security seminars and sessions over the years and gained an appreciation of the various security technologies available. But when, where and how these technologies can and should be leveraged can often be confusing.
Infrastructure security is frequently only considered once server roles and network connectivity has been implemented, a problem made worse by inadequate training. When security technologies are not deployed until late in a project, the result can be poor implementation, weak documentation and compliance testing.
"Think security” to maximise the availability, integrity and confidentiality of data.
In this information-packed seminar, John Craddock presents a holistic approach to implementing security in order to maximise the availability, integrity and confidentiality of data within an organisation. This seminar will help you to “think security”: work out what’s needed to logically implement a secure environment, then leverage the technologies to build a cohesive solution.
Agenda:09:00 Registration09:30 Is Your IT Infrastructure Secure? 11:15 Securing Your Network12:45 Lunch13:45 Locking Down Servers and Workstations 15:15 Vista Technologies 16:30 End
Identifying business assets
Security policy and response planning
Deploying IPSec for domain and server isolation
Building rules and filters
Identifying protocol and port requirements
Managing server roles and lockdown policies
Patch management and compliance testing
Creating Software Restriction Policies (SRP)
Least privileged user access
Establishing client security and software policy
Client and server attack vectors
Managing through group policies
Network Access Protection (NAP)
Vista security enhancements
Biographies:John Craddock has designed and implemented computing systems ranging from embedded high-speed industrial controllers through to distributed IT solutions. John works as a consultant providing services to industry leaders including Microsoft. He was a key player in the Government Gateway Project, has designed high-availability web portals and help companies build Active Directory solutions to support their business critical environments. In addition to his role as a consultant, he has written over 20 technical training courses that have been published worldwide. He co-authored 'Investigating and Managing Objects and Attributes for Microsoft Windows 2000 and Microsoft Windows Server 2003' which is part of the Active Directory Forestry series. John lectures internationally and has written and presented technical sessions at MTB, MEC, Tech•Ed, Microsoft IT Forum, JDP and deployment conferences. Sally Storey has worked in management and consulting in the IT industry for Novell, Microsoft and now, independently. Sally works as a consultant on enterprise infrastructure projects in operations, logistics and deployment roles. Sally is ITIL qualified and specializes in building process that keep systems highly available and secure. Sally co-authored the Active Directory® Forestry series with John Craddock.