Mastering Internet and LAN Security training seminars presented by SkillPath Seminars register now on

findaseminar logo balls
event search registration and marketing services since 2002
Advanced Search

Mastering Internet and LAN Security  

 Email information about this seminar Mastering Internet and LAN Security by SkillPath Seminars to yourself your manager or associates Email this event... View and register for other training seminars like Mastering Internet and LAN Security by SkillPath Seminars on Find similar training.. Find and register for other training seminars by SkillPath Seminars on Other seminars from SkillPath Seminars


training seminars by SkillPath Seminars SkillPath Seminars   


Internet Security Specialist, Network Admins, Security Admins, CIO's, CTO's


see Registration info for seminar cost, group discount etc.

Seminar Summary:

Provide high-level protection for your Internet-connected systems and data security (see full course description)


 Seminar / Training class dates & locations


No seminar dates for this event are currently scheduled.  Please use the seminars search box above or choose one of the following additional training search options to find similar training.

security+internet+intruders+intruder+detection+firewall+hacker+virus+website+ftp+LAN+data+mastering training seminars workshops conferences online training

Providers course catalog

Find seminars by state

Find seminars by city

Request on site training

Use Advanced Search

NEW  Don't miss training you want to attend

Receive a personal Training Alert when training you want to attend comes to your area. Create a personal Training Alert now  it's Free and only takes a minute!




share this page 

print the agenda print agenda for the Mastering Internet and LAN Security seminar



Training Course Syllabus:

You’ll learn ...
Protecting your LAN from the outside world, yet allowing workstation access to the Internet
How to develop an effective "early warning" system that will alert you to potential intruders and quickly differentiate them from legitimate users
Testing the effectiveness of firewall software ... is yours providing the protection you need or just giving you a false sense of security?
How to choose and enable the correct encryption technique to match your organization´s needs for secure data transmission
And much more
If you think computer attacks only happen to the Amazons® and Yahoos® of the world, think again. This year, your chances are greater than 1 in 4 that your company´s computer system will be hacked—largely due to the "chinks in the armor" caused by Internet connections and the growing sophistication of hackers who can hit a "target" computer hundreds of times a day searching for any weakness or entry point. In this intensive hands-on workshop, you´ll learn how to put your system through "real world" hacker tests ... and then use what you learn to tailor your system´s security capabilities to achieve a solid, locked-down facade that will quickly discourage would-be intruders.



Day one: 8:00 a.m. – 5:00 p.m.

The secrets to securely configuring your operating system
In this session, you´ll learn about the procedures that are critical to securing your system and get into the specifics of operating system configurations that provide solid defenses against intruders and attacks. You´ll learn step-by-step security procedures for configuring both Windows NT® and UNIX®/Linux®-based operating systems and find out how vulnerable default OS installation can be—especially when your systems aren´t physically secure. You´ll also learn the pre- and post-installation steps that must be taken to create a secure foundation for all your systems.
You´ll also discover ...
The major security risks of popular server operating systems such as Windows NT ... and how to minimize them
How to ensure security for users who define their own passwords, by setting up seven important password guidelines
The 14 critical configuration problems with UNIX systems and how to overcome them
How to correctly configure and analyze the information contained in your security log, so you don´t miss a red flag

Web server software configuration—what you must know

Default Web server software installations are virtually open doors to hackers and crackers—especially in the area of authentication. In this session, you´ll start off with a look at how users are authenticated on the most popular Web server software packages, and we´ll show you how to correctly configure authentication on each one. You´ll also find out how to configure access control based on IP address, host name, user name and password. Plus you´ll learn about ...
A step-by-step checklist to verify the configuration and security of your Web server software
Hidden security flaws in Microsoft® Internet Information Server and Apache® Web Server ... and the most effective methods to patch them
How to correctly configure Web server logs to save space and still get the information you need to monitor your Web site
Important guidelines for safe and secure Web programming
How to safely set up remote authoring and administration of your site

Client-side security—protecting against browser attacks

Since many remote attacks are also directed at client browsers, it´s equally important to provide effective browser security. Unprotected browsers are a target for malicious Web site programs that can wreak havoc on individual PCs and then infiltrate other computers connected to the same network. And because it´s seldom detected until weeks after the initial attack, this type of "hidden" intrusion can be quite dangerous. This session will show you how to prevent remote attacks on your local system and network computers through proper configuration of Internet browsers. Once your browsers are protected, you can have peace of mind, knowing that your organization is safely using the Internet. You´ll learn ...
How to protect against data extraction by remote Web sites
How scripting languages such as JavaScriptTM and ActiveX® can be used to crash your computer—and the options you have to prevent this from happening
How to disable cookies if you´re concerned about security breaches
How to fix the latest security gaps found in Internet Explorer and Netscape® browsers
What to look for when initiating a secure Internet transaction, to make sure that confidentiality is maintained

Protecting your organization and your customers with cryptography

Anyone taking payments for goods or services over the Internet has the need for an extremely high level of security ... and so do sites with content that´s restricted to a certain type or level of user, like confidential price listings. This session will show you how to achieve the security that´s needed while allowing access to qualified remote users or customers. You´ll find out what it takes to enable Secure Sockets Layer (SSL) on your Web server and discover why you need to rely on a third-party Certification Authority (CA) to make it work. You´ll also learn ...
The three different certificate configuration settings for Microsoft® Internet Information Server and how each may affect your remote clients
What a key pair is and how it is used to secure your site and protect your customers
The difference between Public Key and Private Key systems, and the features of asymmetric and symmetric encryption
How to enable encryption at the application level using SHTTP
How to incorporate a free encryption program known as PGP—Pretty Good Privacy

Firewalls—do you really need one?

When are firewalls absolutely essential and when are they merely a waste of resources? This session will clear up any misconceptions about firewalls, and you´ll discover if your Internet- or WAN-connected networks actually need a firewall—or if you can provide as much or more security by using other methods. You´ll learn how firewalls protect Internet-connected networks and how easily they can be defeated if not properly configured. You´ll also find out ...
What type of firewall software is available and which packages offer the best protection
How to configure security on a router without using expensive firewall software
The types of attacks that firewalls offer little or no protection against
How to determine the best location of a network firewall, to ensure maximum protection while still providing a high level of access to your remote users and customers
Why firewall logs may not be the best place to look for signs of possible intruders

Day two: 8:00 a.m. – 5:00 p.m.


Using a proxy server to allow Internet access and provide network protection

More and more companies are providing access to the Internet for their employees ... while this can be very beneficial, it can also increase security risks. This session will show you how to allow Internet access and protect your network from attack by properly installing and configuring a proxy server. You´ll learn how some of the major proxy server software packages function, and you´ll install and configure Microsoft Internet Security and Acceleration (ISA) Server.
You´ll also discover ...
How to control access to Internet sites, using a proxy server
The right way to configure logging services to allow proper monitoring of your proxy server
How to configure your proxy server to block ports and functions so it will act as a firewall—and virtually eliminate the risk of exposing your systems and information to the Internet
What limitations you can expect for your internal network users connecting to the Internet through
Where to find the bugs in some of the most popular proxy software packages—and how to fix them before they cause you problems

How hackers break into LAN-connected systems—and how you can keep them out

The only way to truly build up the defenses of your systems is to anticipate how hackers will most likely attempt to break in. In this session, you´ll learn about the most common methods and tools hackers use ... and you´ll get hands-on experience using them to break into a Web server in the classroom. You´ll then learn the best methods to protect against this type of attack and configure your lab Web server to block an intruder. And, to make sure, you´ll then test your configurations by attempting to break into each system in the lab. You´ll also learn ...
The utilities used to attempt break-ins on UNIX®, Linux® and Windows NT® Web servers
How intruders can use the NetBIOS Auditing Tool to uncover commonly used passwords
How port scanners can be used to identify open TCP and UDP ports on your system—and how that information can be used to develop an attack
How sniffers can intercept unencrypted data and even extract passwords which can allow hackers free access to your systems
The use of utilities such as L0phtCrack, Crack and NTcrack by hackers to run dictionary or brute force attacks against your servers

Building the best intruder detection system

You may think you´ve covered all the bases and have a really secure system, but can you tell if someone has hacked into your system? This session will show you how to build an effective intruder detection system, so you can feel confident that no one´s slipping into your systems without being noticed. You´ll find out the best ways to detect intruders and learn about the immediate steps you must take if you verify that an intruder has been present—actions that will minimize your systems´ potential for harm. We´ll also show you ...
Six methods that intruders use to obtain passwords and how to detect and protect against each one
The five most common types of reconnaissance scans that are used by intruders to hack into your systems
Four commonly used Denial of Service attacks and how to quickly detect them
Three techniques used by intruder detection systems to match signatures with incoming traffic in order to sound an alert to various types of attacks, including "Ping-O-Death," "WinNuke" and others
How you can automate your system to reconfigure the firewall, send e-mail to the administrator, save attack information or accomplish other protective tasks if an intruder is detected

From the hacker files: Case studies that will help you build solid defenses

This session explores several of the most famous computer security breaches to date. You´ll get the technical details behind the actions of individuals who hacked, crashed, stole from and vandalized some high-profile computers for a variety of reasons. Not only are these accounts fascinating, but they´re also great training ... you´ll learn how to keep hackers who use the same deceptions and break-in techniques from damaging your site or accessing sensitive information. We´ll also cover ...
How an individual launched a worm program that crashed more than 6,000 computer systems in only a few hours
The man who was accused of accessing the systems of Novell®, Motorola®, NEC and others by fraudulently obtaining user accounts
How a Chicago woman masterminded a scheme that involved hacking into a real estate company´s voicemail system to steal more than $1.2 million in goods and services
The German hacker who attempted to steal software and government secrets and sell them to the Soviet KGB by using a supposedly defunct computer account at Lawrence Berkeley Laboratory in the U.S.
How a New Hampshire teenager broke into and defaced the Web site along with two other high-profile sites

Developing a security policy

One of the keys to establishing true system security is documentation ... and this session will show you, in detail, how to develop an effective but simple security policy. You´ll learn how to develop your own customized policy, and we´ll identify the important details you need to address. You´ll also find out how seemingly insignificant oversights can lead to large problems and learn why having a security policy makes your job much easier when it comes to dealing with new or existing systems and end users. We´ll also discuss ...
The absolute musts for every security policy—and why they´re so vital
How to complete a risk analysis—a key component of an effective security policy
How to develop security checklists for servers, workstations, Web sites, firewalls, intruder detection systems and more
The secrets to defining the rights and responsibilities of users

Seminar Summary:

Provide high-level protection for your Internet-connected systems and data security (see full course description)

print this agenda print agenda for the Mastering Internet and LAN Security training seminar

 view dates and locations for this seminar




Custom Search