Educause Security Discussion mailing list archives

SANS .edu Securing Windows in Minneapolis


From: Karen A Swanberg <swanberg () UMN EDU>
Date: Tue, 16 May 2006 11:02:58 -0500

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


The University of Minnesota's Office of Information Technology (OIT) has
partnered with the SANS Institute to host the popular SANS SEC505
Securing Windows 6-day course in Minneapolis, Minnesota from July 24
through July 29, 2006. This course will be offered at a substantial
discount.

Registration is now open at
http://www.umn.edu/oit/SANS
Highlights of the event are below. Questions should be directed to
sans () umn edu.

Date/Time: Monday, July 24th through Saturday, July 29th; 9am to 5pm
each day.

Registration Fee:

Employees of accredited educational institutions, state and local
law enforcement agencies, and state and local governments qualify for
the discounted fee of $1025. The course fee for all others is $2,895.

Although not required, upon completion of the course attendees will be
eligible to sit for the associated SANS GIAC certification exam for an
additional fee of $300 ($500 if signing up for the exam after the last
day of the course). More information on this GIAC certification can be
found at http://www.giac.org/certifications/security/gcwn.php.

Course: SANS "SECURITY 505: Securing Windows". The Securing Windows
Track is a comprehensive curriculum for securing Windows 2000/XP/2003
networks. This program brings the confusing complexity of Windows
2000/XP/2003 security into clear focus by starting with foundational
security services, such as Active Directory and Group Policy, and
advancing in a logical progression to particular products or features
which rely on these foundations, such as IIS and IPSec. This Track
provides best practices for security, hands-on exercises, extensive
documentation/screenshots, a CD-ROM of security scripts, and an
objective account of Windows security (neither bashing Microsoft nor
toeing the party line). This Track will also prepare participants for
the GIAC Certified Windows Security Administrator (GCWN) certification
exams.

Who Should Attend:
  o Anyone who manages a Windows network
  o Anyone whose IIS web server was compromised
  o Anyone who is planning to deploy Active Directory, Group Policy,
IPSec or a PKI
  o Anyone who would like to learn how to automate and script their work
  o NT, Unix and NetWare administrators new to Windows 2000/XP/2003
  o Anyone interested in the security aspects of Active Directory

  A Sampling of Topics:
  o Active Directory Design
  o Delegation of Authority
  o Dynamic DNS
  o Group Policy Design
  o Security Templates
  o PKI Installation and Management
  o Encrypting File System
  o Smart Cards and Tokens
  o IPSec and VPNs
  o RRAS and RADIUS
  o 802.1X Wireless Security
  o Making An IIS Bastion Host
  o IIS Authentication and Authorization
  o IIS ISAPI Extensions and Filters
  o Windows Scripting Skills
  o Scripting Interfaces: ADSI, CDO, WMI

What to Bring:
You must bring your own laptop that is running Windows for use the
entire week of the training. We suggest a disposable Windows install.

Instructor: Jason Fossen is the founder and president of Fossen
Networking & Security, which provides consultation for Microsoft Windows
2000/XP/2003 solutions and security. In addition to the consulting
practice, Jason is also a prolific author and guest speaker at national
security conferences on a variety of topics, including cryptography, PKI
deployment, firewall design, web server security, IPSec, and Virtual
Private Networking. Jason graduated from the University of Virginia and
received his Master's degree from the University of Texas at Austin.

- -                                                    -
Karen Swanberg | OIT Security and Assurance | U. of Mn
- -     swanberg :at: umn.edu | 612-625-8807           -

    "I wanna live, I wanna experience the universe,
              and I wanna eat pie." -Urgo
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (SunOS)
Comment: Made with pgp4pine 1.76

iD8DBQFEae3p/r8s5wLh1bARAodSAJwPQ4kwDcK3qyy/wntvh3VjKZRNrACfWpL2
1TMCqHahNQS2deYfQRuLU3I=
=T6Ct
-----END PGP SIGNATURE-----

Current thread: