| 
					 | 
				
				
| 
 Full Day (9:00 a.m.5:00 p.m.)
   
					 | 
				
				
				
					 
					 | 
				
S1 Amsterdam/ Stockholm/ Copenhagen
 | 
				
Rik Farrow
 | 
  Hands-on Linux Security Class: Learn How to Defend Linux/UNIX Systems by Learning to Think Like a Hacker (Day 1 of 2) 
 
 | 
 
 | 
S2
 Bonn | 
				
 John Sellens
 | 
 System and Network Monitoring 
 
 | 
 
 | 
S3 International 10
 
 | 
Mike Ciavarella and Lee Damon
 | 
 Seven Habits of the Highly Effective System Administrator 
 
 | 
 
 | 
S4
 International 4 & 5
 | 
James Mauro and Richard McDougall
 | 
 
Solaris Kernel Performance, Observability, and Debugging 
 
 | 
 
 | 
S5 Sydney
 
 | 
 Radia Perlman
 | 
Bridges, Routers, Switches, and Internetworking Protocols
 | 
 
 | 
S6
 International 6 & 7
 | 
Trent Hein and Ned McClain
 | 
 
Essential Topics in System Administration 
 
 | 
 
 | 
S7
 International 3
 | 
Esther Filderman and Alf Wachsmann
 | 
 
An Introduction to OpenAFS and Its Administration 
 
 | 
 
 | 
S8 Consulate
 | 
 Brad C. Johnson
 | 
 
Network Security Profiles: Protocol Threats, Intrusion Classes, and How Hackers Find Exploits 
 
 | 
 
 | 
S9
 International 8 & 9
 | 
Tom Christiansen
 | 
 
Advanced Perl Programming 
 
 | 
 
 | 
					| 
						
					 | 
				
				
| 
 Full Day (9:00 a.m.5:00 p.m.)
   
					 | 
				
				
				
					 
					 | 
				
M1 Amsterdam/ Stockholm/ Copenhagen
 | 
Rik Farrow
 | 
  Hands-on Linux Security Class: Learn How to Defend Linux/UNIX Systems by Learning to Think Like a Hacker (Day 2 of 2) 
 
 | 
 
 | 
M2
 International 6 & 7
 | 
John Sellens 
 
 | 
System and Network Monitoring: Tools in Depth 
 
 
 | 
 
 | 
M3 Sydney
 
 | 
Peter Baer Galvin
 | 
   Advanced Solaris System Administration Topics 
 
 
 | 
 
 | 
M4
 International 4 & 5 | 
Marcus Ranum
 | 
  
System Log Aggregation, Statistics, and Analysis 
 
 | 
 
 | 
M5 Bonn
 | 
Radia Perlman and Charlie Kaufman 
 
 | 
Network Security Protocols: Theory and Current Standards 
 
 | 
 
 | 
M6 Consulate
 | 
Trent Hein and Ned McClain 
 
 | 
  Six More Essential Topics in System Administration 
 
 | 
 
 | 
				
| 
 Half Day Tutorials (a.m.)   
					 | 
				
				
				
					 
					 | 
				
M7
 International 3
 | 
 Steve Acheson and Doug Dexter  
 
 | 
  Designing, Implementing and Using PKI to Provide Enterprise Security Services 
 
 | 
 
 | 
M8
 International 10
 | 
  Brad C. Johnson and Richard E. Mackey, Jr. 
 
 | 
  Security Standards and Why You Need to Understand Them 
 
 | 
 
 | 
M9
 International 8 & 9 | 
 Gerald Carter 
 
 | 
  Kerberos 5Revenge of the Three-Headed Dog  
 
 | 
 
 | 
| 
 Half Day Tutorials (p.m.)   
 | 
				
 
 | 
M10 International 8 & 9
 | 
David N. Blank-Edelman 
 
 | 
  Over the Edge System Administration, Volume 1 
 
 | 
 
 | 
M11 International 10
 | 
Geoff Halprin 
 
 | 
  Troubleshooting: A Basic Skill  
 
 | 
 
 | 
M12 International 3
 | 
Æleen Frisch 
 
 | 
Beyond Shell Scripts: 21st-Century Automation Tools and Techniques
  
 
 | 
 
 | 
					| 
						
					 | 
				
				
| 
 Full Day (9:00 a.m.5:00 p.m.)
   
					 | 
				
				
				
					 
					 | 
				
T1 Zurich/London
 | 
David Rhoades
 | 
  
Network Security Assessments WorkshopHands-on
(Day 1 of 2) 
 
 | 
 
 | 
T2 Amsterdam/ Stockholm/ Copenhagen
 | 
Gerald Carter
 | 
Implementing LDAP Directories 
 
 | 
 
 | 
T3 International 4 & 5
 | 
Æleen Frisch
 | 
Administering Linux in Production Environments 
 
 | 
 
 | 
T4 Bonn
 | 
Eric Allman
 | 
  
Advanced Technology in Sendmail 
 
 | 
 
 | 
T5 International 10
 | 
Heison Chak
 | 
  VoIP Principles and Implementation with Asterisk 
 
 | 
 
 | 
T6 Consulate
 | 
Marc Staveley
 | 
System and Network Performance Tuning 
 
 
 | 
 
 | 
| 
 Half Day Tutorials (a.m.)   
 | 
				
 
 | 
T7 International 8 & 9
 | 
 Mike Ciavarella
 | 
Advanced Shell Programming 
 
 | 
 
 | 
T8 International 6 & 7
 | 
Jacob Farmer
 | 
  Eliminating Backup System Bottlenecks Using Disk-to-Disk and Other Methods 
 
 | 
 
 | 
T9 International 3
 | 
 David Skoll
 | 
Combating Spam Using Sendmail, MIMEDefang, and Perl 
 
 | 
 
 | 
| 
 Half Day Tutorials (p.m.)   
 | 
				
 
 | 
T10
 International 8 & 9 | 
 Mike Ciavarella
 | 
Documentation Techniques for SysAdmins 
 
 | 
 
 | 
T11 International 6 & 7
 | 
 Peter Baer Galvin
 | 
  Solaris 10 Security Features 
 
 | 
 
 | 
T12 International 3
 | 
 W. Curtis Preston
 | 
Administering NetBackup 
 
 | 
					| 
						
					 | 
				
				
| 
 Full Day (9:00 a.m.5:00 p.m.)
   
					 | 
				
				
				
					 
					 | 
				
W1 Zurich/London
 | 
David Rhoades
 | 
  Network Security Assessments WorkshopHands-on
(Day 2 of 2) 
 
 | 
 
 | 
W2
 Sydney
 | 
Marcus Ranum 
 
 | 
  Defeating Junk/Spam Email
 | 
 
 | 
| 
 Half Day Tutorials (a.m.)   
 | 
				
 
 | 
W3
 Yukon/ Mackenzie/ Rio Grande | 
 Mark-Jason Dominus 
 | 
Regular Expression Mastery 
 
 | 
 
 | 
W4 
Champagne 
 | 
Steve Acheson and Laura Kuiper 
 | 
   Cisco Device Configuration Basics, Part 1  
 | 
 
 | 
W5
 Bonn
 | 
W. Curtis Preston
 | 
Oracle Backup and Recovery  
 
 | 
 
 | 
| 
 Half Day Tutorials (p.m.)   
 | 
				
 
 | 
W6
 Bonn | 
 Mark-Jason Dominus 
 | 
Perl Program Repair Shop and Red Flags
 
 
 | 
 
 | 
W7
 Champagne | 
Steve Acheson and Laura Kuiper 
 | 
  Cisco Device Configuration Basics, Part 2  
 
 
 | 
 
 | 
W8
 Yukon/ Mackenzie/ Rio Grande | 
Mark Burgess
 | 
Introduction to Host Configuration and Maintenance with Cfengine 
 
 | 
 
 | 
					| 
						
					 | 
				
				
| 
 Full Day (9:00 a.m.5:00 p.m.)
   
					 | 
				
				
				
					 
					 | 
				
R1
 Zurich/London
 | 
David Rhoades
 | 
  Hacking & Securing Web-based ApplicationsHands-on
(Day 1 of 2) 
 
 | 
 
 | 
R2 
Sydney 
 | 
Gerald Carter
 | 
Managing Samba 2.2 & 3.0 
 | 
 
 | 
| 
 Half Day Tutorials (a.m.)   
 | 
				
 
 | 
R3
 Yukon/ Mackenzie/ Rio Grande | 
David N. Blank-Edelman
 | 
  Perl for System Administration 
 
 | 
 
 | 
R4
 Bonn | 
Peter Baer Galvin
 | 
  Next-Generation Security Tools 
 
 | 
 
 | 
R5 
Champagne 
 | 
William LeFebvre
 | 
Introduction to Domain Name System Administration
 | 
 
 | 
| 
 Half Day Tutorials (p.m.)   
 | 
				
 
 | 
R6
 Yukon/ Mackenzie/ Rio Grande | 
David N. Blank-Edelman
 | 
  Perl Saves the Day: Writing Small Perl Programs to Get You Out of Big Sysadmin Pinches 
 
 | 
 
 | 
R7
 Bonn | 
Theodore Ts'o
 | 
  Recovering from Linux Hard Drive Disasters 
 
 | 
 
 | 
R8
 Champagne | 
Tom Limoncelli
 | 
Introduction to Massive Upgrades and Changes  
 
 | 
 
 | 
					| 
						
					 | 
				
				
| 
 Full Day (9:00 a.m.5:00 p.m.)
   
					 | 
				
				
				
					 
					 | 
				
F1
 Zurich/London
 | 
David Rhoades
 | 
  Hacking & Securing Web-based ApplicationsHands-on
(Day 2 of 2) 
 
 | 
 
 | 
F2 
Champagne
 
 | 
Steve Acheson and Laura Kuiper 
 | 
 
Cisco Security Features
 | 
 
 | 
| 
 Half Day Tutorials (a.m.)   
 | 
				
 
 | 
F3 
Yukon/ Mackenzie/ Rio Grande
 
 | 
Tom Limoncelli
 | 
Time Management for System Administrators: Getting It All Done and Not Going (More) Crazy! 
 | 
 
 | 
F4 
International 7 & 8
 
 | 
Mark Burgess
 | 
 
Advanced Topics in Host Configuration and Maintenance with Cfengine
 | 
 
 | 
F5 
Bonn
 
 | 
William LeFebvre
 | 
Intermediate Topics in Domain Name System Administration
 |