Tutorial Descriptions
[Tutorial Overview]
S1 Windows NT and
UNIX Integration: Problems and Solutions
Who should attend: System administrators who are responsible for heterogeneous Windows NT and UNIXbased systems. Attendees should have user-level knowledge of both UNIX and Windows NT, and it's recommended they have systems administration experience in at least one of these OSes. Today's organizations choose computing solutions from a variety of vendors. Often, integrating the solutions into a seamless, manageable enterprise is an afterthought, left up to system administrators. This course covers specific problem areas in administering a mixture of UNIX and Windows NT systems. The focus will be on practical solutions that can be applied today to real-world administration problems. Topics include:
For each of the areas of interest we will cover:
Phil Cox (S1, M1)
is a consultant for SystemExperts Corporation. Phil frequently
writes and lectures on issues bridging the
gap between UNIX and Windows NT. He is a featured columnist in ;login:,
the magazine of USENIX & SAGE, and has served on numerous USENIX program
committees. Phil holds a B.S. Who should attend: Network and system administrators, security administrators, and technical auditors who want to secure their UNIX/NTbased networks. Is your UNIX/NTbased network infrastructure up to meeting the challenge of malicious marauders? In this tutorial we'll present the methodologies used by today's hackers to gain access to your networks and critical data. We'll demonstrate a typical attack exploiting both well-known and little-known NT-based vulnerabilities. We'll show how NT attackers can leverage UNIX vulnerabilities to circumvent traditional security mechanisms. And we'll identify opportunities to better secure the host and networks against more esoteric attacks. All examples will be demonstrated on a live network of machines. Topics include:
George Kurtz (S6, M4) has performed hundreds of firewall, net
work, and e-commercerelated security assessments throughout his security
consulting career. He is a regular speaker at many security conferences and is
frequently quoted in The Wall Street Journal, InfoWorld, USA
Today, and the Associated Press. He is the co-author of the widely acclaimed
Hacking Exposed: Network Security Secrets and Solutions.
Who should attend: Users and administrators who want detailed information on how to get the best performance out of their Windows NT workstations and servers. Topics include:
We will cover each of the system resources in detail--CPU, memory, disk, and network--and will show how to analyze their performance and how to break up bottlenecks.
Mark T. Edmead (S3) has over 20 years' experience in soft
ware product development, system design, and project management. He was awarded
the Entrepreneur of the Year 1988 finalist award sponsored by Arthur Young and
Venture Magazine. Previously he taught advanced Windows 3.1 and Windows
NT programming at UC San Diego. He is currently a senior Windows NT instructor
for Learning Tree International and a consultant for IBM Global Services,
assisting clients with Windows BackOffice solutions and e-commerce security. He
is the co-author of Windows NT: Performance, Monitoring and Tuning
(Macmillan Publishing).
Who should attend: This tutorial is aimed at operating system developers, applications programmers, and system administrators who need to understand the internal behavior and architecture of Windows NT and Windows 2000. (Note: The information presented is valid for both NT Version 4 and Windows 2000.) Windows NT/2000 is built on a new operating system code base, similar in many ways to well-established OSes such as UNIX and VMS, and very different from Microsoft's DOS/Win16/Windows 9x platforms. This tutorial will describe the behavior of Windows NT/2000 from a "system architecture" point of view. Using a variety of tools, we will explore internal interfaces and the behavior of the system, show how the OS implements fundamental operating-system functions such as scheduling and memory management, and show how the architecture affects some of its functionality. Topics include:
Jamie Hanrahan (S5)
is an independent consultant specializing in system software
development and training. He has shipped over two dozen Windows NT and
Windows 2000 drivers to clients, and has presented his Windows NT/2000
Device Driver and Internals seminars to literally thousands of students from
most of the major Windows hardware vendors. He is writing a book on Windows
NT/2000 device drivers, to be published by O'Reilly and Associates. His
Windows 2000 device driver and internals seminars are offered through Azius
Developer Training.
Who should attend: System and network administrators who will need to implement or maintain Windows 2000based systems and networks, and site managers charged with selecting and setting site security requirements. The security implications of a large Windows 2000 (Win2K) deployment are not yet well understood. The instructors of this tutorial present the problems and solutions surrounding Win2K and the security of the networks it runs on. They'll cover the design of Win2K from a security standpoint and outline what Win2K has "out of the box" for security. In addition, they'll discuss Win2K-related risks and appropriate countermeasures. They will conclude with specific recommendations on firewalling Win2K, as well as pointers on how to "harden" the system. Topics include:
Phil Cox (S1, M1) is a consultant for SystemExperts Corporation,
a consulting firm that specializes in system security and management. Phil
frequently writes and lectures on issues bridging the gap between UNIX and
Windows NT. He is a featured columnist in ;login:, the magazine of USENIX
& SAGE, and has served on numerous USENIX program committees. Phil holds a
B.S. in computer science from the College of Charleston, South Carolina.
Who should attend: System and network administrators who wish to integrate Samba running on a UNIX-based machine with Microsoft Windows clients. No familiarity with Windows networking concepts will be assumed. Samba is a freely available suite of programs that allows UNIX-based machines to provide file and print services to Microsoft Windows PCs without installing any third-party software on the clients. This allows users to access necessary resources from both PCs and UNIX workstations. As Samba makes its way into more and more network shops all over the world, it is common to see "configuring Samba servers" listed as a desired skill on many job descriptions for network administrators. This tutorial will use real-world examples taken from daily administrative tasks. Topics include:
Gerald Carter (S1, M2) has been a member of the Samba Team
since 1998 and has been maintaining Samba servers for the past four years. As a
network manager at Auburn University, Gerald maintains approximately 700 PCs and
30 Solaris 2.x servers. He is the lead author of Teach Yourself Samba
in 24 Hours (Sams Publishing) and has worked as an instructor or technical
reviewer for major publishers.
Who should attend: System administrators responsible for Windows NT and Windows 2000 servers. Topics include:
Aeleen Frisch (M3) has been a system administrator for over
15 years. She currently looks after a very heterogeneous network of UNIX and
Windows NT systems. She is the author of several books, including Essential
Windows NT System Administration.
Aeleen Frisch (M3) has been a system administrator for over 15
years. She currently looks after a very heterogeneous network of UNIX and
Windows NT systems. She is the author of several books, including Essential
Windows NT System Administration.
Who should attend: Network and system administrators who have been charged with upgrading NT4 networks, security administrators who are responsible for making sure that the Windows 2000 environment will be in compliance with corporate policies, and system auditors who will be assessing the migration from NT4 to Windows 2000. Windows 2000 offers a wealth of new security options. In order to take advantage of these features, great care must be taken when planning the migration strategy from NT4 to Windows 2000. During this session, we'll develop a multi-phase approach for successfully migrating from NT4 and securing the Windows 2000 environment. Topics include:
We will also demonstrate vulnerabilities inherent in default installation modes and mixed NT4Windows 2000 environments. Countermeasures and recommended security settings will be presented for each potential weakness.
George Kurtz (S2, M4) has performed hundreds of firewall, net
work, and e-commercerelated security assessments throughout his security
consulting career. He is a regular speaker at many security conferences and is
frequently quoted in The Wall Street Journal, InfoWorld, USA
Today, and the Associated Press. He is the co-author of the widely acclaimed
Hacking Exposed: Network Security Secrets and Solutions.
|
Need help? Use our Contacts page.
Last changed: 6 July 2000 jr |
|