Wrapup.

Slides:



Advertisements
Similar presentations
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Advertisements

Innosoft international inc. Ó 1999 Innosoft International, Inc. Using LDAPv3 for Directory-Enabled Applications & Networking Greg Lavender Director of.
JARED BIRD Nagios: Providing Value Throughout the Organization.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
Chapter 7 HARDENING SERVERS.
Providing secure open- access networks Oliver Gorwits Oxford University Computing Services.
Security Tools CS-480b Dick Steflik. CACLS Windows NT, W2000, XP Displays or modifies access control lists (ACLs) of files.
Event Viewer Was of getting to event viewer Go to –Start –Control Panel, –Administrative Tools –Event Viewer Go to –Start.
Linux System Administration LINUX SYSTEM ADMINISTRATION.
CNT-150VT. Question #1 Your name Question #2 Your computer number ##
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring, Managing, and Troubleshooting Resource Access.
2010 Cisco Configuration Elements APRICOT 2010 Kuala Lumpur, Malaysia.
Penetration Testing Training Day Capture the Flag Training.
Chapter 7: Using Windows Servers to Share Information.
Securing Microsoft® Exchange Server 2010
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 2 Designing Microsoft® Exchange Server 2010 Integration with the Current Infrastructure.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring, Managing, and Troubleshooting Resource Access.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Remote access typically involves allowing telnet, SSH connections to the router Remote requires.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
System Security Basics. Information System Security The protection of information systems against unauthorized access to or modification of information,
Module 11: Implementing ISA Server 2004 Enterprise Edition.
APRICOT 2008 Network Management Taipei, Taiwan February 20-24, 2008 Cisco configuration elelements.
Cisco Configuration Elements Network Monitoring and Management Tutorial.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
1 Host Hardening Chapter 6 Copyright 2003 Prentice-Hall.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Internet Authentication Service.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
INFORMATION SECURITY UNIX & DB2. Introduction THE OBJECTIVE IS TO DESIGN SECURITY MEASURES FOR A MILITARY SYSTEM SYSTEM RUNNING A DB2 SERVER ON UNIX FOCUS.
Network Management Workshop Apricot 2010 Kuala Lumpur Managing network configuration with RANCID.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Host Security Overview Onion concept of security Defense in depth How secure do you need to be? You can only reduce risk Tradeoffs - more security means:
Module 7: Implementing Security Using Group Policy.
Securing the Linux Operating System Erik P. Friebolin.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Linux Operations and Administration
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Essential Services Lesson 5. Objectives Naming Resolution In today’s networks, you assign logical addresses, such as with IP addressing. Unfortunately,
Cisco configuration elelements
Unit 36: Internet Server Management
Basharat Institute of Higher Education
CompTIA Security+ Study Guide (SY0-401)
3.1 Types of Servers.
REPLICATION & LOAD BALANCING
Working at a Small-to-Medium Business or ISP – Chapter 8
Managing network configuration with RANCID
Review End of Semester.
Module Overview Installing and Configuring a Network Policy Server
Implementing Active Directory Domain Services
Securing the Network Perimeter with ISA 2004
CompTIA Security+ Study Guide (SY0-401)
Cisco configuration elements
Vulnerability Scanning With 'lynis'
Welcome To : Group 1 VC Presentation
CompTIA Server+ Certification (Exam SK0-004)
REDHAT LINUX Training Syllabus
ISMS Information Security Management System
IS4680 Security Auditing for Compliance
Chapter 8: Monitoring the Network
IS4680 Security Auditing for Compliance
LINUX SYSTEM ADMINISTRATION
AbbottLink™ - IP Address Overview
Computer Network Administration
Designing IIS Security (IIS – Internet Information Service)
06 | SQL Server and the Cloud
Presentation transcript:

Wrapup

Overview First half Last half

First half

First Half Shells What is a shell and what does it do Most popular shells Redirection shell variables environment export and environment

First Half Scripting Centered on BASH Basic operators (conditionals, if, test, case, for, while, here docs, trap, signals, etc)

First Half Utilities and Filters What are filters and why to use them Filter examples (tail, diff, etc) Basics of regular expressions grep sed

First half NTP Syslog Centralized clock Many networked programs need a synchronized clock Syslog Need a common clock when monitoring errors on a network

First half SSH DNS Distributed File Systems RAID DNSSec NFS SMB SAN NAS RAID

First Half System Auditing System Hardening Run levels Services/Daemons iptables permissions Account management System Hardening basic practices vulnerability databases

Last half Wireless I and II

Last Half

Last Half Network Auditing Network Hardening hardware roles Tools (hubs, switches, routers, etc.) Tools (ping, nmap, wireshark, etc.) Network Hardening firewalls dhcp hazards rogue devices vpn roles

Last half User Management LDAP eMail Keberos Good as standalone Better when teamed with another product eMail TLS SPF Verifies a domains valid mail servers Does not validate content

Last Half Replication Load Balancing Types: What is it Differences Primary/backup Master/Slave Multi-master Load Balancing What is it Round Robin Reverse Proxies Differences How to do

Last Half System Administration su sudo special attributes (suid, guid, sticky bit) booting basics init device files file systems tar, compress, gzip and zip package management Why?

Last Half SNMP basics of protocol security concerns Most common version Most secure version

Last Half Configuration Management Security Policies What is supposed to be on the systems What IS on the systems Security Policies Policies Procedures Objectives Confidentiality Integrity Availability

Last Half AWK who named for how to spell basic use $n is the field on a line blank is default delimiter what is default std out role of BEGIN and END