|
Full Day (9:00 a.m.5:00 p.m.)
|
|
S1 Amsterdam/ Stockholm/ Copenhagen
|
Rik Farrow
|
Hands-on Linux Security Class: Learn How to Defend Linux/UNIX Systems by Learning to Think Like a Hacker (Day 1 of 2)
|
|
S2
Bonn |
John Sellens
|
System and Network Monitoring
|
|
S3 International 10
|
Mike Ciavarella and Lee Damon
|
Seven Habits of the Highly Effective System Administrator
|
|
S4
International 4 & 5
|
James Mauro and Richard McDougall
|
Solaris Kernel Performance, Observability, and Debugging
|
|
S5 Sydney
|
Radia Perlman
|
Bridges, Routers, Switches, and Internetworking Protocols
|
|
S6
International 6 & 7
|
Trent Hein and Ned McClain
|
Essential Topics in System Administration
|
|
S7
International 3
|
Esther Filderman and Alf Wachsmann
|
An Introduction to OpenAFS and Its Administration
|
|
S8 Consulate
|
Brad C. Johnson
|
Network Security Profiles: Protocol Threats, Intrusion Classes, and How Hackers Find Exploits
|
|
S9
International 8 & 9
|
Tom Christiansen
|
Advanced Perl Programming
|
|
|
Full Day (9:00 a.m.5:00 p.m.)
|
|
M1 Amsterdam/ Stockholm/ Copenhagen
|
Rik Farrow
|
Hands-on Linux Security Class: Learn How to Defend Linux/UNIX Systems by Learning to Think Like a Hacker (Day 2 of 2)
|
|
M2
International 6 & 7
|
John Sellens
|
System and Network Monitoring: Tools in Depth
|
|
M3 Sydney
|
Peter Baer Galvin
|
Advanced Solaris System Administration Topics
|
|
M4
International 4 & 5 |
Marcus Ranum
|
System Log Aggregation, Statistics, and Analysis
|
|
M5 Bonn
|
Radia Perlman and Charlie Kaufman
|
Network Security Protocols: Theory and Current Standards
|
|
M6 Consulate
|
Trent Hein and Ned McClain
|
Six More Essential Topics in System Administration
|
|
Half Day Tutorials (a.m.)
|
|
M7
International 3
|
Steve Acheson and Doug Dexter
|
Designing, Implementing and Using PKI to Provide Enterprise Security Services
|
|
M8
International 10
|
Brad C. Johnson and Richard E. Mackey, Jr.
|
Security Standards and Why You Need to Understand Them
|
|
M9
International 8 & 9 |
Gerald Carter
|
Kerberos 5Revenge of the Three-Headed Dog
|
|
Half Day Tutorials (p.m.)
|
|
M10 International 8 & 9
|
David N. Blank-Edelman
|
Over the Edge System Administration, Volume 1
|
|
M11 International 10
|
Geoff Halprin
|
Troubleshooting: A Basic Skill
|
|
M12 International 3
|
Æleen Frisch
|
Beyond Shell Scripts: 21st-Century Automation Tools and Techniques
|
|
|
Full Day (9:00 a.m.5:00 p.m.)
|
|
T1 Zurich/London
|
David Rhoades
|
Network Security Assessments WorkshopHands-on
(Day 1 of 2)
|
|
T2 Amsterdam/ Stockholm/ Copenhagen
|
Gerald Carter
|
Implementing LDAP Directories
|
|
T3 International 4 & 5
|
Æleen Frisch
|
Administering Linux in Production Environments
|
|
T4 Bonn
|
Eric Allman
|
Advanced Technology in Sendmail
|
|
T5 International 10
|
Heison Chak
|
VoIP Principles and Implementation with Asterisk
|
|
T6 Consulate
|
Marc Staveley
|
System and Network Performance Tuning
|
|
Half Day Tutorials (a.m.)
|
|
T7 International 8 & 9
|
Mike Ciavarella
|
Advanced Shell Programming
|
|
T8 International 6 & 7
|
Jacob Farmer
|
Eliminating Backup System Bottlenecks Using Disk-to-Disk and Other Methods
|
|
T9 International 3
|
David Skoll
|
Combating Spam Using Sendmail, MIMEDefang, and Perl
|
|
Half Day Tutorials (p.m.)
|
|
T10
International 8 & 9 |
Mike Ciavarella
|
Documentation Techniques for SysAdmins
|
|
T11 International 6 & 7
|
Peter Baer Galvin
|
Solaris 10 Security Features
|
|
T12 International 3
|
W. Curtis Preston
|
Administering NetBackup
|
|
Full Day (9:00 a.m.5:00 p.m.)
|
|
W1 Zurich/London
|
David Rhoades
|
Network Security Assessments WorkshopHands-on
(Day 2 of 2)
|
|
W2
Sydney
|
Marcus Ranum
|
Defeating Junk/Spam Email
|
|
Half Day Tutorials (a.m.)
|
|
W3
Yukon/ Mackenzie/ Rio Grande |
Mark-Jason Dominus
|
Regular Expression Mastery
|
|
W4
Champagne
|
Steve Acheson and Laura Kuiper
|
Cisco Device Configuration Basics, Part 1
|
|
W5
Bonn
|
W. Curtis Preston
|
Oracle Backup and Recovery
|
|
Half Day Tutorials (p.m.)
|
|
W6
Bonn |
Mark-Jason Dominus
|
Perl Program Repair Shop and Red Flags
|
|
W7
Champagne |
Steve Acheson and Laura Kuiper
|
Cisco Device Configuration Basics, Part 2
|
|
W8
Yukon/ Mackenzie/ Rio Grande |
Mark Burgess
|
Introduction to Host Configuration and Maintenance with Cfengine
|
|
|
Full Day (9:00 a.m.5:00 p.m.)
|
|
R1
Zurich/London
|
David Rhoades
|
Hacking & Securing Web-based ApplicationsHands-on
(Day 1 of 2)
|
|
R2
Sydney
|
Gerald Carter
|
Managing Samba 2.2 & 3.0
|
|
Half Day Tutorials (a.m.)
|
|
R3
Yukon/ Mackenzie/ Rio Grande |
David N. Blank-Edelman
|
Perl for System Administration
|
|
R4
Bonn |
Peter Baer Galvin
|
Next-Generation Security Tools
|
|
R5
Champagne
|
William LeFebvre
|
Introduction to Domain Name System Administration
|
|
Half Day Tutorials (p.m.)
|
|
R6
Yukon/ Mackenzie/ Rio Grande |
David N. Blank-Edelman
|
Perl Saves the Day: Writing Small Perl Programs to Get You Out of Big Sysadmin Pinches
|
|
R7
Bonn |
Theodore Ts'o
|
Recovering from Linux Hard Drive Disasters
|
|
R8
Champagne |
Tom Limoncelli
|
Introduction to Massive Upgrades and Changes
|
|
|
Full Day (9:00 a.m.5:00 p.m.)
|
|
F1
Zurich/London
|
David Rhoades
|
Hacking & Securing Web-based ApplicationsHands-on
(Day 2 of 2)
|
|
F2
Champagne
|
Steve Acheson and Laura Kuiper
|
Cisco Security Features
|
|
Half Day Tutorials (a.m.)
|
|
F3
Yukon/ Mackenzie/ Rio Grande
|
Tom Limoncelli
|
Time Management for System Administrators: Getting It All Done and Not Going (More) Crazy!
|
|
F4
International 7 & 8
|
Mark Burgess
|
Advanced Topics in Host Configuration and Maintenance with Cfengine
|
|
F5
Bonn
|
William LeFebvre
|
Intermediate Topics in Domain Name System Administration
|