|  Tutorials: 
Overview | 
By Day 
(Monday, Tuesday, Wednesday) | 
By Instructor | All in One File 
 M1 	Implementing LDAP Directories NEW
 Gerald Carter, Samba Team/Hewlett-Packard
 
Who should attend: Both LDAP directory administrators and architects. The focus is on integrating standard network services with LDAP directories. The examples are based on UNIX hosts and the OpenLDAP directory server and will include actual working demonstrations throughout the course.
 System administrators today run a variety of directory services, although these are referred to by names such as DNS and NIS. The Lightweight Directory Access Protocol (LDAP) is the up-and-coming successor to the X500 directory and has the promise of allowing administrators to consolidate multiple existing directories into one.
 
Topics include:
 
Replacing NIS domains
Integrating Samba user accounts
Authenticating RADIUS clients
Integrating MTAs such as Sendmail, Qmail, or Postfix
Creating address books for mail clients
Managing user access to HTTP and FTP services
Storing DNS zone information
Managing printer information
 
Gerald Carter (M1, T2), a member of the SAMBA Team since 1998,  is employed by Hewlett Packard as a Software Engineer, working on SAMBA-based print appliances. He is writing a guide to LDAP for system administrators, to be published by O'Reilly. Jerry holds an M.S. in computer science from Auburn University, where he also served as a network and system administrator. He has published articles with Web-based magazines such as Linuxworld and has authored courses for companies such as Linuxcare. He recently completed the second edition of Teach Yourself SAMBA in 24 Hours (Sams Publishing). 
M2 Hacking and Securing Web-Based Applications 
NEWDavid Rhoades, Maven Security Consulting
 
Who should attend: People who are auditing Web application security, developing Web applications, or managing the development of a Web application.
 Although numerous commercial and freeware tools assist in locating network-level security vulnerabilities, these tools are incapable of locating application-level issues. This course will demonstrate how to identify security weaknesses for Web-enabled services that could be exploited by remote users.
 With numerous real-world examples, this course is based on fact and experience, not theory. The material applies to Web portals, e-commerce, online banking, shopping, subscription-based services, and any Web-enabled application.
 
Topics include:
 
Information-gathering attacks: How hackers read between the lines
User sign-on process: Many sites contain serious flaws which expose them to the threat of bad publicity and loss of customer confidence
User sign-off process: Are users really signed off?
OS & Web server weaknesses: buffer overflows and default
material
Encryption: Finding the weakest link
Session tracking
URL rewriting, basic authentication, and cookie: strengths and weaknesses
Session cloning, IP hopping, and other subtle dangers
A recipe for strong session IDsAuthentication: server, session, 
transactional
Transaction-level issues
Hidden form elements
Unexpected user input
GET vs. POST
JavaScript filters
Improper server logic  
David Rhoades (M2) is president of Maven Security Consulting Inc. Since 1996 David has been providing information protection services for various Fortune 500 customers. His work has taken him across the United States, and to Europe and Asia, where he has lectured and consulted in various areas of information security. David holds a B.S. in computer engineering from Pennsylvania State University and is an instructor for the SANS Institute, the MIS Training Institute, and Sensecurity (based in Singapore). 
 
 M3 Perl for System Administration: The Networking Power Hours  
NEW
 David N. Blank-Edelman, Northeastern University CCS
 
Who should attend: System and
network administrators with at least advanced-beginner to intermediate Perl skills (important prerequisite).
 After offering several successful survey courses on using Perl to make system administration easier, it is time to go deeper. In this course we'll take an hour per subject to probe how Perl can be used to work with three different network-related topics. We'll cover the necessary background material to get you jump-started and then dive into the approaches, tools and methods you need to successfully use your existing Perl skills to tame these areas.
 
Topics include:
 
SNMP: The Simple Network Management Protocol isn't always so simple to use or understand, but it is ubiquitous. We'll learn how to use Perl to query and configure SNMP versions 1*- and 3*-capable devices like switches, routers, and workstations.
Packet Play: It is not uncommon to have to sniff a network looking for specific packets (or sometimes even produce them yourself). Maybe you're debugging a network service or performing a penetration test. We'll look at both sniffing for specific packets and creating them
ourselves from Perl.
Network Monitoring and Mapping: With SNMP and packet skills under our belt, we can begin to approach the hard topic of continuously monitoring a network and displaying the results. This module will tie together the two previous modules and work toward building simple tools to help. We'll also look at some of the more advanced free tools already built to solve this problem.
LDAP: If you don't already have a directory service running in your environment, chances are you will soon. It is equally likely that this directory service will be built on or be accessible by the Lightweight Directory Access Protocol. We'll
see how to use Perl to perform common LDAP operations.
Mail: Perl is an excellent tool for speaking different mail protocols. We'll learn how to use it to send mail with SMTP and perform
different mail operations using POP3 and IMAP. Once we know how to receive mail, we'll look at the process of parsing the mail to help us deal with it.
Potpourri: There are so many topics in the networking arena that we bend the one-topic-per-hour rule for the last hour. In this module we'll look at how to parse logs
efficiently and effectively, roll your own daemons, and use encrypted transports from Perl. 
David N. Blank-Edelman (M3)  is the Director of Technology at the  Northeastern University College of Computer Science and the author of the O'Reilly book Perl for System Administration. He has spent the last 16 years as a system/network administrator in large multi-platform environments, including Brandeis University, Cambridge Technology Group, and the MIT Media Laboratory. He has served as Senior Technical Editor for the Perl Journal. 
 
 M4 	System and Network Performance Tuning
 Marc Staveley, Soma Networks
 
Who should attend: Novice and advanced UNIX system and network administrators, and UNIX developers concerned about network performance impacts. A basic understanding of UNIX system facilities and network environments is assumed.
 We'll examine the virtual memory system, the I/O system, and the file system, NFS tuning and performance strategies, common network performance problems, examples of network capacity planning, and application issues. We'll also cover guidelines for capacity planning and customized monitoring based on your workloads and traffic patterns. Analysis periods for particular situations will be provided. 
Topics include:
 
Performance tuning strategies
Server tuning
Filesystem and disk tuning
Memory consumption and swap space
System resource monitoring
NFS issues
Automounter and other tricksNetwork performance, design, and capacity planning
Application tuning
System resource usage
Memory allocation
Code profiling
Job scheduling and queuing
Real-time issues
Managing response time 
Marc Staveley (M4) works at Soma Networks, where he is applying his 18 years of experience with UNIX development and administration in leading their IT group. Previously Marc had been an independent consultant, and he has also held positions at Sun Microsystems, NCR, Princeton University, and the University of Waterloo. He is a frequent speaker on the topics of standards-based development, multi-threaded programming, system administration, and performance tuning. 
 M5 Inside the Linux Kernel (updated for version 2.6)
 Ted Ts'o, IBM Linux Technology Center
 
Who should attend: Application programmers and kernel developers. You should be reasonably familiar with C
programming in the UNIX environment, but no prior experience with the UNIX or Linux kernel code is assumed.
 This tutorial will give you an introduction to the structure of the Linux kernel, the basic features it provides, and the most important algorithms it employs.
 The Linux kernel aims to achieve conformance with existing standards and compatibility with existing operating systems; however, it is not a reworking of existing UNIX kernel code. The Linux kernel was written from scratch to provide both standard and novel features, and takes advantage of the best practice of existing UNIX kernel designs.
 Although the material will focus on the latest release version of the Linux kernel (v. 2.6), it will also address aspects of the development kernel codebase (v. 2.7) where its substance differs from 2.6. It will not contain any detailed examination of the source code but will, rather, offer an overview and roadmap of the kernel's design and functionality.
 
Topics include:
 
Theodore Ts'o (M5) has been a Linux kernelHow the Linux kernel is organized: scheduler, virtual memory system, filesystem layers, device driver layers, and networking stacks
The interface between each module and the rest of the
kernel, and the functionality provided by that interface
The common kernel support functions and algorithms used by that module
How modules provide for multiple implementations of similar functionality (network protocols, filesystem types, device drivers, and architecture-specific machine interfaces)Basic ground rules of kernel programming (dealing with issues such as races and deadlock conditions)
Implementation of the most important kernel algorithms and their general properties (aspects of portability, performance, and functionality)
The main similarities and differences between Linux and traditional UNIX kernels, with attention to places where Linux implements significantly different algorithms
Details of the Linux scheduler, its VM system, and the ext2fs file system
The strict requirements for ensuring that kernel code is portable.
  developer since almost the very beginnings of Linuxhe implemented POSIX job control in the 0.10 Linux kernel. He is the maintainer and author for the Linux COM serial port driver and the Comtrol Rocketport driver. He architected and implemented Linux's tty layer. Outside of the kernel, he is the maintainer of the e2fsck filesystem consistency checker. Ted is a Senior Technical Staff Member of IBM's Linux Technology Center. 
 
 
 M6 	Network Security Protocols: Theory and Current Standards
NEW
 Radia Perlman, Sun Microsystems
 
Who should attend: Anyone who wants to understand the theory behind network security protocol design, with an overview of the alphabet soup of standards and cryptography. This tutorial is especially useful for anyone who needs 
to design or implement a network security solution, but it is also useful to anyone who needs to understand existing offerings in order to deploy and manage them. Although the tutorial is technically deep, no background other than intellectual curiosity and a good night's sleep in the recent past is required.
 First, without worrying about the details of particular standards, we discuss the pieces out of which all these protocols are built.
 We then cover subtle design issues, such as how secure email interacts with distribution lists, how designs maximize security in the face of export laws, and the kinds of mistakes people generally make when designing protocols.
 Armed with this conceptual knowledge of the toolkit of tricks, we describe and critique current standards. 
Topics include:
 
Radia Perlman (M6, T6) is a Distinguished EngineerWhat problems are we trying to solve?
Cryptography
Key distribution
Trust hierarchies
Public key (PKI) vs. secret key solutionsHandshake issues
Diffie-Hellman
Man-in-middle defense
Perfect forward secrecy
Reflection attacksPKI standards
Real-time protocols
SSL/TLS
IPsec (including AH, ESP, and IKE)Secure email
Web security
  at Sun Microsystems. She is known for her contributions to bridging (spanning tree algorithm) and routing (link state routing), as well as security (sabotage-proof networks). She is the author of Interconnections: Bridges, Routers, Switches, and Internetworking Protocols, and co-author of Network Security: Private Communication in a Public World, two of the top 10 networking reference books, according to Network Magazine. She is one of the 25 people whose work 
has most influenced the networking industry, according to Data Communications Magazine. She holds about 50 issued patents, an S.B. and S.M in mathematics and a Ph.D. in computer science from MIT and an honorary doctorate from KTH, the Royal Institute of Technology in Sweden. 
 
 
 M7  	Advanced Topics in System Administration and Security NEW
 Trent Hein and Ned McClain, Applied Trust
 
Who should attend: System and network administrators who are interested in picking up several new technologies in an accelerated manner.
 This tutorial covers six topics of critical importance to all system administrators and power users.
 
Trent Hein (M7) is co-founder of Applied Trust Engineering.Digital forensics tools and techniques: Investigating computer security incidents has become a necessary skill for all system administrators. We'll discuss the secrets of digital forensics, including how to find out what happened without destroying possible evidence. This section will highlight several incident investigation tools and give examples of their use in real-life scenarios.
Linux kernel tuning: As Linux's popularity in production environments increases, the need for knowledge on tuning a Linux kernel becomes ever so important. Whether it's performance, security, or functionality you're looking to cajole your system into, we'll give you the what to's and the how to's, and even the what you can'ts of this rare art.
Handling digital forensic evidence: Information collected from a digital crime scene must be handled according to a strict set of rules. We'll talk about what you should do with log files, filesystems, and other digital evidence that might be used in court. This section will get you comfortable with all aspects
of evidence handling, from secure evidence collection to the chain of custody.
Stateful firewalls: Keeping up with the latest security technology can be a challenge, but it is essential to prevent unwanted intrusions. We'll cover the latest in basic firewall technology on both Cisco and Linux platforms. Specific topics covered include context-based access control, reflexive access lists, and stateful filtering using iptables.
Network intrusion detection systems: New NIDS products are appearing every day. We'll evaluate the strengths and weaknesses of various technologies, and what might work best for your organization. Leave this section with the information you need to select and implement a NIDS solution that's right for you.
Performance crisis case studies #3: Don't miss the latest episode of this incredibly popular segment! We've taken a new set of real-life system administration performance crises and dissected them, providing insight on how to diagnose and remedy situations that you might someday face. This is a great way
to gain practical knowledge in the performance arena.  Trent worked on the 4.4 BSD port to the MIPS architecture at Berkeley, is co-author of both the UNIX Systems Administration Handbook and the Linux Administration Handbook, and holds a B.S. in computer science from the University of Colorado. 
 
 Ned McClain (M7), co-founder and CTO of Applied
  Trust Engineering, lectures around the globe on applying cutting-edge technology in production computing environments. Ned holds a B.S. in computer science from Cornell University and is a contributing author 
to both the UNIX System Administration Handbook and the Linux Administration Handbook. 
 
 M8 Logging & Security: Building an Enterprise Logging Infrastructure
 Tina Bird, Stanford University
 
Who should attend: System administrators and network managers responsible for monitoring and maintaining the health and well-being of computers and network devices in an enterprise environment. Participants should be familiar with the UNIX and Windows operating systems and basic network security, although some review is provided.
 The purpose of this tutorial is to illustrate the importance of a network-wide centralized logging infrastructure, to introduce several approaches to monitoring audit logs, and to explain the types of information and forensics that can be obtained with well-managed logging systems.
 Every device on your networkrouters, servers, firewalls, application
softwarespits out millions of lines of audit information a day. Hidden within the data that indicate normal day-to-day operation (and known problems) are the first clues that systems are breaking down, attackers are breaking in, and end users are breaking up. If you manage that data flow, you can run your networks more effectively. 
Topics include:
 
The extent of the audit problem: how much data are you generating every day, and how useful is it?
Logfile content: improving the quality of the data in your logs
Logfile generation: syslog and its relatives, including building a
central loghost, and integrating Microsoft Windows systems into your UNIX log system
Log management: centralizing, parsing, and storing all that data
Legal issues: what you can do to be sure you can use your logfiles for human resources issues and for legal prosecution
 This class won't teach you how to write Perl scripts to simplify your logfiles. It will teach you how to build a log management infrastructure, how to figure out what your log data means, and what in the world you do with it once you've acquired it. 
Tina Bird (M8), as a Computer Security Officer for Stanford University, works on the design and   implementation of security infrastructure; providing security alerts for the 40,000-host network; healthcare information security; and extending Stanford's logging infrastructure. Tina moderates the Log Analysis and VPN mailing lists; with Marcus Ranum, she runs www.loganalysis.org. Tina has a B.S. in physics from the University of Notre Dame and a master's degree and Ph.D. in astrophysics from the University of Minnesota. 
 
 
T1 Advanced Solaris System Administration Topics  UPDATEDPeter Baer Galvin, Corporate Technologies
 
Who should attend: UNIX administrators who need more knowledge of Solaris administration. 
We will discuss the major new features of recent Solaris releases, including which to use (and how) and which to avoid. This in-depth course will provide the information you need to run a Solaris installation effectively. Updated to include Solaris 9 features and functions.
 
Topics include:
 
Installing and upgrading
Architecting your facility
Choosing appropriate hardware
Planning your installation, filesystem layout, post-installation steps
Installing (and removing) patches and packagesAdvanced features of Solaris 2
Filesystems and their uses
The /proc filesystem and commands
Useful tips and techniquesNetworking and the kernel
Virtual IP: configuration and uses
Kernel and performance tuning: new features, adding devices, tuning, debugging commands
Devices: naming conventions, drivers, gotchasEnhancing Solaris
High availability essentials: disk failures and recovery, RAID levels, uses and performance, H/A technology and implementation
Performance: how to track down and resolve bottlenecks, Solaris Resource Manager
Tools: useful free tools, tool use strategies
Security: locking down Solaris, system modifications, tools, SunScreen
Resources and references 
Peter Baer Galvin (T1) is the Chief Technologist for   Corporate Technologies, and was the systems manager for Brown University's Computer Science Department. He has written articles for Byte and other magazines, is a columnist for SunWorld, and is coauthor of the Operating Systems Concepts and the Applied Operating Systems Concepts textbooks. Peter has taught tutorials on security and system administration and has given talks at many conferences and institutions. 
 
 T2 Managing Samba 2.2 & 3.0 NEW
 Gerald Carter, Samba Team/Hewlett-Packard
 
Who should attend: System administrators who are currently managing Samba servers or are planning to deploy new servers this year. This course will outline the new features of Samba 3.0, including working demonstrations throughout the course session.
 Samba is a freely available suite of programs that allows UNIX-based machines to provide file and print services to Microsoft Windows PCs without installing any third-party software on the clients. This allows users to access necessary resources from both PCs and UNIX workstations. As Samba makes its way into more and more network shops all over the world, it is common to see
"configuring/managing Samba servers" listed as a desired skill on many job descriptions for network administrators.
 
Topics include:
 
Providing basic file and print services
Upgrading Samba servers from version 2.2 to 3.0
Integrating with Windows NT 4.0 and Active Directory authentication services
Centrally managing printer drivers for Windows clients
Managing NetBIOS network browsing
Implementing a Samba primary domain controller along with Samba backup domain controllers
Migrating from a Windows NT 4.0 domain to a Samba domain
Utilizing account storage alternatives to smbpasswd (such as LDAP)
Making use of Samba VFS modules for features such as virus scanning and a network recycle bin 
Gerald Carter (M1, T2), a member of the SAMBA Team since 1998,  is employed by Hewlett Packard as a Software Engineer, working on SAMBA-based print appliances. He is writing a guide to LDAP for system administrators, to be published by O'Reilly. Jerry holds an M.S. in computer science from Auburn University, where he also served as a network and system administrator. He has published articles with Web-based magazines such as Linuxworld and has authored courses for companies such as Linuxcare. He recently completed the second edition of Teach Yourself SAMBA in 24 Hours (Sams Publishing). 
 
 
 T3 System and Network Monitoring
 John Sellens, Certainty Solutions
 
Who should attend: Network and system administrators interested in real-life, practical, host- and network-based monitoring of their systems and networks. Participants should have an understanding of the fundamentals of networking, basic familiarity with computing and network components, and some familiarity with UNIX and scripting languages.
 Participants will leave this tutorial able to immediately start using a number of monitoring systems and techniques that will improve their ability to manage and maintain their systems and networks. 
 
Topics include:  
John Sellens (T3, W3) has been involved in system and networkMonitoring: goals, techniques,
reporting
SNMP: the protocol, reference
materials, relevant RFCs
Introduction to SNMP MIBs (Management Information Bases)
SNMP tools and libraries
Other non-SNMP tools
Security concerns when using SNMP and other tools on the network
Monitoring applications: introductions, use, benefits and complications, installation and configuration (Big Brother, Nagios, SNIPS, MRTG, Cricket, etc.)
Special situations: remote locations, firewalls, etc.
Monitoring implementation roadmap: policies, practices, notifications, escalations, reporting
  administration since 1986 and is the author of several related USENIX papers, a number of ;login: articles, and SAGE booklet #7, System and Network Administration for Higher Reliability. He holds an M.S. in computer science from the University of Waterloo and is a chartered accountant. He is currently the General Manager for Certainty Solutions (formerly known as GNAC) in Toronto. Prior to joining Certainty, John was the Director of Network Engineering at UUNET Canada and was a staff member in computing and information technology at the University of Waterloo for 11 years. 
 
 
 T4 Building Internet-Facing Systems NEW
 Geoff Halprin, Mitel/E-Smith
 
Who should attend: Intermediate to senior software developers and project managers involved in the building and management of modern software systems.
 This tutorial provides practical advice on how to design, build, deploy, and manage Internet-facing systems. We examine the core attributes of Internet systems (scalability, reliability, manageability, maintainability, and security), how to architect and build Internet systems, common mistakes and failures in Internet systems, how to deploy Internet systems, and how to manage Internet systems across their life.
 
Topics include:
 
Building Internet-facing applications
Defining attributes of Internet-facing systems
System architecture: building to cope with change
Operations management: building systems to run
Common failures (and how to avoid them) of design, development, process, integration, and deploymentDeploying Internet applications
Thinking about deployment: availability considerations, backend system integration, failure mode analysis, security exposures analysis, production support preparation
Business continuity planning
Managing Internet applications
System availability planning
What does the business need?
What are the resource implications?Command and control of Internet applications: trust, configuration management, change management, data management
The critical elements of managing 24x7 operations
Network management (how do we know when something went wrong?)
Problem diagnosis (what went wrong?)
Disaster recovery procedures (how do we resume service?)
Change management (how do we minimize the risk of service disruption?) 
Geoff Halprin (T4)  has over 25 years of experience  in building software systems, from system management tools to network monitoring software and embedded mission-critical billing systems for Internet Service Providers. He has spent more years troubleshooting other peoples programs than he cares to remember. Geoff is also president of SAGE: The System Administrators Guild. 
 
 
 T5 Beyond Shell Scripts: 21st-Century Automation Tools and Techniques NEW
 Aeleen Frisch, Exponential Consulting
 
Who should attend: System administrators who want to explore new ways of automating administrative tasks. Shell scripts are appropriate for many jobs, but more complex operations will often benefit from sophisticated tools.
 
Automating installations
Vendor-supplied tools
Alternative approaches
State-of-the-art package control
Heterogeneous environmentsMark Burgess's cfengine package
Basic and advanced configurations
Usesinstallations & beyond; "self-healing" system configurations; data collection; and more
When not to use cfengineOther tools
Expectautomating interactive processes, what to Expect; using it with other tools; security issues
Amanda for enterprise backupprerequisites; configuration; optimizing
STEM, a new package for automating network operationsthe context and tool capabilities; suggested uses; performance and security issues
Nagios to monitor network and device performancehow it works; sample configurations; extending Nagios
RRDTool for examining retrospective system databasic operation; advanced graphing; options for data collection 
Aeleen Frisch (T5, W6) has been a system administrator for  over 20 years. She currently looks after a pathologically heterogeneous network of UNIX and Windows systems. She is the author of several books, including Essential System Administration (now in its 3rd edition). 
 
 
 T6 Bridges, Routers, Switches, and Internetworking Protocols  NEW
 Radia Perlman, Sun Microsystems
 
Who should attend: Anyone who might need to design a protocol, implement a protocol, write network-based applications, or plan or manage a network, or anyone who is just curious about what is really going on under the covers in a network, and how things got the way they are. Anyone with the courage to see things from different angles, and not just parrot orthodoxy. Paradoxically, this tutorial is good as an introduction to people who are incredibly confused by all the terms and don't know where to start, as well as people who have been using this stuff for years, assumed they understood it, and want to see how all the pieces fit. 
The concepts of IP addresses, masks, MAC addresses, routing algorithms, domains, switches, bridges, are pervasive when dealing with networks. We all use these terms and configure these things, but what is really going on? What are the implications of choosing a switch vs. a router? What kinds of things can go wrong in a protocol that is misdesigned, misimplemented, or mismanaged? This tutorial describes the major protocols involved in the network infrastructure. It describes conceptually what goes on in the packet switches (both layer 2/bridges and layer 3/routers), as well as the implications on endnodes. It contrasts connection-oriented approaches such as ATM and MPLS with connectionless approaches such as IPv4 and IPv6. It covers the endnode-visible pieces of layer 3, such as neighbor-discovery and address autoconfiguration. It covers intradomain routing algorithms (distance vector such as RIP and link state such as OSPF or IS-IS) and interdomain (BGP). It describes the spanning tree algorithm used by bridges and switches. 
Topics include:
 
Radia Perlman (M6, T6) is a Distinguished EngineerLayer 2 (MAC) addresses
Why 6 bytes?
Relation to layer 3 addresses (IP)Bridges
Basic idea
Why it's more powerful than
a repeater
Station address learning and
forwarding
Spanning treeWhat are switches? "switched Ethernet"
Connection-oriented networks: ATM, MPLS
Connectionless protocols: IPv4, IPv6, and comparison with others
Neighbor discovery (ARP, DHCP)
Routing (distance vector vs. link state, interdomain vs. intradomain)
IP Multicast
NAT  at Sun Microsystems. She is known for her contributions to bridging (spanning tree algorithm) and routing (link state routing), as well as security (sabotage- proof networks). She is the author of Interconnections: Bridges, Routers, Switches, and Internetworking Protocols, and co-author of Network Security: Private Communication in a Public World, two of the top 10 networking reference books, according to Network Magazine. She is one of the 25 people whose work 
has most influenced the networking industry, according to Data Communications Magazine. She holds about 50 issued patents, an S.B. and S.M in mathematics and a Ph.D. in computer science from MIT and an honorary doctorate from KTH, the Royal Institute of Technology in Sweden. 
 
 
 T7 Network Security Profiles: A Collection (Hodgepodge) of Stuff Hackers Know About You
 Brad C. Johnson, SystemExperts Corp.
 
Who should attend: Network, system, and firewall administrators; security auditors and those audited; those responding to intrusions or responsible for applications or systems that might be targets for crackers. Participants should understand the basics of TCP/IP networking. Examples will use actual tools and will also include small amounts of HTML, JavaScript, and Tcl.
 This tutorial will review the ways crackers work, what protocols and tools they use, and a number of current methods and exploits. You'll learn how to
generate vulnerability profiles of your
systems. Additionally, we'll review some important management policies and issues.
 
Brad C. Johnson (T7) is vice president of SystemExperts Corporation.Profiles: what can an intruder determine about your site remotely?
Review of profiling methodologies: different "viewpoints" generate different types of profiling information
Techniques: scanning, online research, TCP/IP protocol "mis"uses, denial of service, cracking clubs
Important intrusion areas: discovery techniques, SSL, SNMP, WWW, DNS
Tools: scotty, strobe, netcat, ISS, SATAN, SAINT, mscan, sscan, queso, curl, Nmap, SSLeay/upget
Defining management policies to minimize intrusion risk
  He has participated in seminal industry initiatives such as the Open Software Foundation, X/Open, and the IETF, and has published often about open systems. Brad has served as a technical advisor to organizations such as Dateline NBC and CNN on security matters. He is a regular tutorial instructor and conference speaker on topics related to practical network security, penetration analysis, middleware, and distributed systems. Brad holds a B.A. in computer science from Rutgers University and an M.S. in applied management from Lesley University. 
 
 T8 Linux-Based Firewalls NEW
 Joshua Jensen, Red Hat, Inc.
 
Who should attend: Network and security administrators who are charged with implementing network security and looking for Linux-related solutions. Attendees should have a basic understanding of TCP/IP and some experience in configuring network services. 
This tutorial will offer extensive configuration examples for Linux-based packet firewalls, common scenarios, and overviews of useful tools that will provide valuable solutions. At the completion of the course, attendees should feel confident in their ability to set up and maintain secure networks with flexible access control. The instructor encourages questions during the presentation.
 
Networking overview
Linux kernel firewall capabilities
/proc kernel tuning
Linux 2.4 and Netfilter
Table and structure
Firewall rules and targets
User chains
Simple stateful approaches
IPChains compatibility
Advanced connection tracking
Performance tuning
Network address translation
Port forwarding
Round-robin load balancing
SNAT and masquerading
Sniffers you should fear (and use)
Traffic monitoring
Practical solutions to common
problems 
Joshua Jensen (T8) was   the first Red Hat instructor and examiner, and has been with Red Hat for 4 years. In that time he has written and maintained large parts of the Red Hat curriculum: Networking Services and Security, System Administration, Apache and Secure Web Server Administration, and the Red Hat Certified Engineer course and exam. Joshua has worked with Linux for 7 years, and has been teaching Cisco Internetworking and Linux courses since 1998. 
 
W1 WiFi Security: The Trials and Tribulations of Designing, Deploying, and Using WiFi Networks Securely  NEWWilliam A. Arbaugh, University of Maryland, College Park
 
Who should attend: Designers, administrators, and power users of WiFi networks who need to design, deploy, and/or operate a WiFi network. Previous experience with or knowledge of wireless networking is helpful but not required.
 This tutorial will present the security problems with current and legacy WiFi equipment, and then explain the more recent and proposed standard changes designed to mitigate and in some cases eliminate those problems, e.g., WiFi Protected Access (WPA) and Robust Security Network (RSN). Following the explanations, a detailed design example will be presented and the participants will be shown how to design, deploy, and test wireless architectures using legacy, WPA, and RSN equipment.
 Finally, participants will be shown how to build and test an architecture using open source software.
 
Topics include:
 
Known attacks against legacy WiFi equipment and the open source tools used for the attacks
WiFi Protected Access and RSN: what are the changes, and what do they mean?
Designing a secure WiFi network
Deploying a secure WiFi network using open source tools
Testing your WiFi network using open source tools
 
William Arbaugh (W1) has spent over 15 years performing security   research and engineering. Arbaugh and his students were among the first to identify security flaws in the IEEE 802.11 standard, as well as several proposed fixes to the standard. He and his students are actively involved in the IEEE and the IETF standards processes, doing their best to ensure that future standards are more robust. He and Jon Edney are the authors of a forthcoming book (Addison-Wesley, Fall 2003) entitled Wi-Fi Protected Access: Wireless Security and 802.11. 
 
 W2 Solaris Internals: Architecture, Tips, and Tidbits
 James Mauro and Richard McDougall, 
Sun Microsystems, Inc.
 
Who should attend: Software engineers, application architects and developers, kernel developers, device driver writers, system administrators, performance analysts, capacity planners, Solaris users who wish to know more about the system they're using and the information available from bundled and unbundled tools, and anyone interested in operating system internals.
 The installed base of Solaris systems being used for various commercial data-processing applications across all market segments and scientific computing applications has grown dramatically over the last several years, and it continues to grow. As an operating system, Solaris has evolved considerably, with some significant changes made to the UNIX SVR4 source base on which the early system was built. An understanding of how the system works is required in order to design and develop applications that take maximum advantage of the various features of the operating system, to understand the data made available via bundled system utilities, and to optimally configure and tune a Solaris system for a particular application or load.
 
Topics include:
the major subsystems of the Solaris 8 kernel. We review the major features of the release and take a look at how the major subsystems are tied together. We cover in detail the implementation of Solaris services (e.g. system calls) and low-level functions, such as synchronization primitives, clocks and timers, and trap and interrupt handling. We discuss the system's memory architecture; the virtual memory model, process address space and kernel address space, and memory allocation. The Solaris process/thread model is discussed, along with the kernel dispatcher and the various scheduling classes implemented and supported. We cover the Virtual File System (VFS) subsystem, the implementation of the Unix File System (UFS), and file IO-related topics.
All topics are covered with an eye to the practical application of the information, such as for performance tuning or software development. Solaris networking (topics related to TCP/IP and STREAMS) is not covered in this course.
After completing this course, participants will have a solid understanding of the internals of the major areas of the Solaris kernel that they will be able to apply to systems performance analysis, tuning, load/behavior analysis, and application development.
 
James Mauro (W2) is a Senior Staff Engineer in the Performance and Availability Engineering group at Sun Microsystems. Jim's current projects are focused on quantifying and improving enterprise platform availability, including minimizing recovery times for data services and Solaris. He co-developed a framework for system availability measurement and benchmarking and is working on implementing this framework within Sun. Jim co-authored Solaris Internals: Architecture Tips and Techniques (Sun Microsystems Press/
Prentice Hall, 2000). 
Richard McDougall (W2), an Established Engineer in the Performance Application Engineering Group at Sun Microsystems, focuses on large systems performance and architecture. He has over twelve years of experience in UNIX performance tuning, application/kernel development, and capacity planning. Richard is the author of many papers and tools for measuring, monitoring, tracing, and sizing UNIX systems, including the memory-sizing methodology for Sun, the MemTool set for Solaris, the recent Priority Paging memory algorithms in Solaris, and many unbundled tools for Solaris, and is co-author of Solaris Internals: Architecture Tips and Techniques (Sun Microsystems Press/Prentice Hall, 2000). 
 
 W3 System and Network Monitoring: Tools in Depth  NEW
 John Sellens, Certainty Solutions
 
Who should attend: Network and system administrators ready to implement comprehensive monitoring of their systems and networks using the best of the freely available tools. Participants should have an understanding of the fundamentals of networking, familiarity with computing and network components, UNIX system administration experience, and some understanding of UNIX programming and scripting languages.
 This tutorial will provide in-depth instruction in the installation and configuration of some of the most popular
and effective system and network monitoring tools, including Nagios, Cricket, MRTG, and Orca. It will build on the background provided by the introductory "System and Network Monitoring" tutorial, so participants should be familiar with the topics covered in that tutorial.
 Participants should expect to leave
the tutorial with the information needed to immediately implement, extend, and manage popular monitoring tools on their systems and networks.
 
Topics include: for Nagios, Cricket, MRTG, and Orca:
 
Installation
Configuration, options, how to manage larger and non-trivial configurations
Reporting and notifications, proactive and reactive
Special cases: interesting problems
How to write scripts or programs to extend functionality
Dealing effectively with network boundaries and remote sites
Security concerns, access control
Ongoing operations
 
John Sellens (T3, W3) has been involved in system and network 
 administration since 1986 and is the author of several related USENIX papers, a number of ;login: articles, and SAGE booklet #7, System and Network Administration for Higher Reliability. He holds an M.S. in computer science from the University of Waterloo and is a chartered accountant. He is currently the General Manager for Certainty Solutions (formerly known as GNAC) in Toronto. Prior to joining Certainty, John was the Director of Network Engineering at UUNET Canada and was a staff member in computing and information technology at the University of Waterloo for 11 years. 
 W4 Building Honey Pots for Intrusion Detection
 Marcus Ranum, NFR Security, Inc.
 
Who should attend: System and network managers with administrative skills and a security background. The tutorial examples will be based on UNIX/Linux. While the materials may be of interest to a Windows/NT administrator, attendees will benefit most if they have at least basic UNIX system administration skills. 
This class provides a technical introduction to the art of building honey pot systems for intrusion detection and burglar- alarming networks. Students completing this class will come away armed with the knowledge that will enable them to easily assemble their own honey pot, install it, maintain it, keep it secure, and analyze the data from it. 
Topics include:
 
Introduction
IDSes
Fundamentals of burglar alarms
Fundamentals of honey pots
Fundamentals of log-data
analysis
Spoofing serversOverview of our honey pot's design
System initialization
Services
Spoofing server implementation walkthrough
Multiway address/traffic manipulation
Logging architecture: syslogs, XML logs, statistical processing
Simple tricks for information visualization
Crunchy implementation details
How to write spoofing rules
How to write log filtering rules
Management
Getting help in analyzing attacks
Keeping up to date
 Auxiliary materials: Attendees will receive a bootable CD-ROM containing a mini UNIX kernel and preconfigured software, and will also have source-code access to the honey-pot building toolkit. Attendees may also wish to review The Honeynet Project, eds., Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community (Addison-Wesley, 2001).
 
Marcus Ranum (W4) is  founder and CTO of NFR Security, Inc. He has been working in the computer/network security field for over 14 years and is credited with designing and implementing the first commercial Internet firewall product. Marcus also designed and implemented other significant security technologies, including the TIS firewall toolkit and the TIS Gauntlet firewall. As a researcher for ARPA, Marcus set up and managed the Whitehouse.gov email server. Widely known as a teacher and industry visionary, he has been the recipient of both the TISC Clue award and the ISSA lifetime achievement award. Marcus lives in Maryland with his wife, Katrina, and a small herd of cats. 
 
 
 W5 Advanced Topics in DNS Administration
 Jim Reid, Nominum
 
Who should attend: DNS administrators who wish to extend their understanding of how to configure and manage name servers running BIND9. Attendees should have some experience 
of running a name server and be familiar with DNS jargon for resource records, 
as well as the syntax of zone files and named.conf. 
This tutorial will answer the question, "I've set up master (primary) and slave (secondary) name servers. What else can I do with the name server?"
Topics include:
 
Jim Reid (W5), started using a PDP11/45 running V7The BIND9 logging subsystem
Getting the most from the name server's logs
Managing the name server with rndc
Configuring split DNS: internal and external versions of a domain
Using the views mechanism of BIND9 to implement split DNS
Setting up an internal root server
Securing the name server
Running it chroot()
Using access control lists
Preventing unwanted access
Dynamic DNS (DDNS)
Dynamic updates with nsupdate
IPv6
Resolving and answering queries with IPv6
Setting up A6/DNAME chains and AAAA records to resolve IPv6 addresses
The Lightweight Resolver Daemon, lwresd
Secure DNS (DNSSEC)
Using Transaction Signatures (TSIG)
How to sign zones with dnssec-keygen and dnssec-signzone
  UNIX 21 years ago and has been working with UNIX systems ever since. He worked for three years at Origin on behalf of Philips Electronics, where he wrote a DNS management system and designed, built, and ran the DNS infrastructure for the corporate network, one of the biggest in the world. He has over a decade's experience in writing and teaching training courses ranging from kernel internals, through system administration and network security, to DNS administration. He's a frequent speaker at conferences and workshops in Europe and the U.S. His book on DNS administration with BIND9 will be published in 2002. 
 W6 But Is It UNIX? A Mac OS X Administrator's Survival Guide  NEW
 Aeleen Frisch, Exponential Consulting
 
Who should attend: UNIX system administrators who want or need to administer Macintosh systems running Mac OS X and/or Mac OS X Server. Familiarity with standard UNIX system administration concepts and tasks is assumed. No previous Macintosh experience is necessary.
 Experienced Macintosh users who want to learn about system administration tasks in the Mac OS X environment will also benefit from this course.
 People very familiar with Max OS X or with the NeXTSTEP environment 
will find much of this material to be 
a review. Note that comparisons with NeXTSTEP will not be made. We will note interactions between the UNIX implementation and the Mac graphical user/administrative environment.
Topics include:
 
Aeleen Frisch (T5, W6) has been a system administrator forWhat is this beast and what's Darwin (and why should I care)?
Basic tasks
Installation hints and pitfalls
Software packages
Startup and shutdown
Files and filesystems
Filesystem layout
File types: resource forks,
applications, etc.User management
Users and groups
Mac OS X shared domains
Managed preferences
Networking
Client configuration
Managing standard TCP/IP
daemons: DNS, DHCP, NTP, and so on
The Mac OS X multiprotocol environment
Rendezvous and its implications
Process management and performance
Managing funky Mac peripherals and user expectations
Mac OS X security architecture and implementation
  over 20 years. She currently looks after a pathologically heterogeneous network of UNIX and Windows systems. She is the author of several books, including Essential System Administration (now in its 3rd edition). 
 
 
 W7 Sendmail Configuration and Operation (updated for Sendmail 8.12)
 Eric Allman, Sendmail, Inc.
 
Who should attend: System administrators who want to learn more about the sendmail program, particularly details of configuration and operational issues (this tutorial will not cover mail front ends). This intense, fast-paced tutorial is aimed at people who have already been exposed to sendmail. It describes the latest release of sendmail from Berkeley, version 8.12.
Topics include:
 
Eric Allman (W7) is the original author of sendmail.The basic concepts of configuration: mailers, options, macros, classes, keyed files (databases), and rewriting rules and rulesets
Configuring sendmail using the M4 macro package
Day-to-day management issues, including alias and forward files, "special" recipients (files, programs, and include files), mailing lists, command line flags, tuning, and security
How sendmail interacts with DNSes
  He is the author of syslog, tset, the -me troff macros, and trek. He was the chief programmer on the INGRES database management project, designed database user and application interfaces at Britton Lee (later Sharebase), and contributed to the Ring Array Processor project at the International Computer Science Institute. He is a former member of the USENIX Board of Directors. 
 
 W8 Disaster Planning and Recovery: How to Keep Your Company (and Your Job) Alive  
NEW
 Evan Marcus, Veritas Software
 
Who should attend: Anyone responsible for their organization's data. Disaster planning is like insurance: nobody wants to talk about it, and everyone runs from the salesmen. But when you need it, you are very glad to have it! And if you don't have it when you need it, it is too late to do anything about it. Have you ever been robbed or had an accident or a medical emergency? If you had insurance, you did personal disaster planning.
 After 9/11, the companies that survived were those that had disaster plans in place. This tutorial will show you 
what you need to think about, what you need to plan for (and what you can safely avoid), and how you can put a plan into effect if (God forbid!) you ever need to use it.
 We will explore the key aspects of developing a disaster recovery plan, including the key components, testing the plan, and some of the technology that can speed recovery, with an eye toward balancing cost and benefit. We will also take a close look at one organization that recovered completely very quickly after 9/11.
 
Topics include:
 
What a DR plan should contain
The costs of developing a DR plan
Do you need a DR plan at all?
The legal and civil liabilities of not having a plan
Downtime and data loss as two sides of the same coin
Four different methods for testing your DR plan
DR as a subset of high availability
Methods and technologies for protecting data through a disaster
How disasters might affect the people who are responsible for recovery
Building and staffing DR teams
The role of senior management in DR
Convincing management that a DR plan is necessary
A real-life case study of a company that survived the 9/11 disaster
 
Evan Marcus (W8) is a Senior Systems Engineer  and High Availability Specialist with VERITAS Software Corporation. Evan has more than 14 years of experience in UNIX system administration. While working at Fusion Systems and OpenVision Software, Evan worked to bring to market the first high-availability software application for SunOS and Solaris. He is the author of several articles and talks on the design of high-availability systems and is the co-author, with Hal Stern, of Blueprints for High Availability: Designing Resilient Distributed Systems (John Wiley & Sons, 2000). 
 
 
 |