hit counter
Nuovi video seminari Technet Spotlight sulla sicurezza - NonSoloSecurity Blog di Feliciano Intini - Site Home - TechNet Blogs

NonSoloSecurity Blog di Feliciano Intini

Notizie, best practice, strategie ed innovazioni di Sicurezza (e non solo) su tecnologia Microsoft

Nuovi video seminari Technet Spotlight sulla sicurezza

Nuovi video seminari Technet Spotlight sulla sicurezza

  • Comments 2
  • Likes

Sia che siate in vacanza, sia che siate ancora/già al lavoro, probabilmente in questo periodo avrete un po' di tempo libero in più del solito. Il mio personale invito è sicuramente quello di usarlo per ritemprarvi nel corpo e nello spirito, ma se qualcuno volesse approfittarne per un aggiornamento sugli aspetti di sicurezza della piattaforma Microsoft potrebbe valutare la visione di una serie di video seminari tratti dai recenti eventi pubblici di Microsoft (Technet Spotlight): ho selezionato per voi quelli in ambito security (ovviamente)

  • Windows Security Boundaries - Mark Russinovich - 07/08/2008
    In this session, learn what constitutes a security boundary; get a tour through core Windows technologies, including user sessions, Code Integrity, PatchGuard, Service Security Hardening, and User Account Control, to learn where Windows currently defines such boundaries; and gain insight into why application compatibility and user experience make defining boundaries much more difficult than it might seem.
  • Virtualization and Security: What Does It Mean for Me? - Steve Riley - 07/08/2008
    Virtualization is the Next Big Thing, and certainly you've at least examined it, and probably are using several virtualized servers already. How are you handling the security of your images? How are you securing the guest and host operating systems, and the applications you're running? Virtualization raises certain unique security requirements, and provides some interesting security capabilities, too. Join Steve Riley as he explores the interesting aspects of virtualization and security.
  • Securing Your IT Infrastructure with Windows Server 2008 - John Weston - 07/16/2008
    Windows Server 2008 offers rich capabilities for securing your IT Infrastructure and proving tools to ease with compliance mandates. This session discusses the Windows security and compliance features such as Network Access Protection, Right Management Services, and Active Directory Federation Service subsystem. In addition we will discuss why auditing is important and how to configure an audit policy with Windows Server 2008.
  • Windows Logins Revealed - Mark Minasi - 07/08/2008
    Every day we log into our Windows systems. But what really happens when we do? How DO our workstations and our domain controllers exchange logon information without revealing our passwords? Security hardening guides talk about how scary old-style LM, NTLM and NTLMv2 logons are, but why EXACTLY do they say that-particularly when it's practically impossible to keep all of the old-style logins from happening even in the most modern network? How DOES AD's favorite logon protocol, Kerberos, work? How is it more secure than the old guys, and where should you look more closely at securing it?
  • Introduction to Microsoft Forefront Code Name "Stirling" - Brad Wright - 07/08/2008
    Forefront code name "Stirling" is a single product that delivers comprehensive, coordinated protection with unified security management and reporting across clients, server applications, and the network edge. In this session, learn what Stirling is all about-from the infrastructure, to the protection, to the reporting-and how we're integrating with the System Center platform to provide increased protection and easier management of security. Get your questions answered in this session and meet the team behind development of Forefront code name "Stirling."
  • A Hackers Diary: How I Can Hack Your Vulnerable Services and How You Can Stop Me - Marcus Murray - 07/08/2008
    This live session demonstrates how a hacker will try to exploit vulnerable applications in order to compromise remote systems and how you can defend yourself from such attacks. Marcus Murray and Hasain Alshakarti of the TrueSec Security Team expose the latest and greatest in exploitation frameworks using live demonstrations and at the same time demonstrate and talk about countermeasures that are effective in the real world. The countermeasures discussion includes a step-by-step-approach using the latest technology from Microsoft, as well as the processes needed for a successful security implementation. After this session you will understand the impact of exploitation frameworks and how to protect from them.
  • The Spy Who Hacked Me! - Alex Smolen,Rudolph Araujo - 07/08/2008
    This is a joint presentation with Rudolph Araujo, a fellow Developer Security MVP, which will draw on his malware and Visual C/C++ skills and Alex's Web security skills.  The session demonstrates both traditional malware in the form of rootkits, and newer JavaScript-based backdoors and Trojan horses that can stealthily achieve their malicious end. The presenters will discuss and demonstrate the various types of new and innovative exploits that go into making such an attack successful. They will use automated attack frameworks and advanced malware tactics to demonstrate eye opening exploits. The presentation will focus on the complex strategies of modern day Internet attackers-not focused on just 15 minutes of fame by making their compromises public, but on silently stealing information and compromising business in as subtle and covert of a manner as possible.

Come sempre succede, la scoperta di questi video ha aperto un mondo di altre risorse video in area security che, anche se meno recenti, meritano comunque di essere portate alla vostra attenzione: appena possibile li aggiungerò al mio Microsoft Security Portal e vi avviserò con un post specifico.

Se invece siete interessati anche a temi non-security vi riporto i link degli eventi recenti da cui ho tratto questi video:

Altri post/risorse correlate:

Share this post :
Comments
Your comment has been posted.   Close
Thank you, your comment requires moderation so it may take a while to appear.   Close
Leave a Comment