HG76: How to Audit UNIX and Windows Security


(4 days, 32 CPE credits, $2200)
  • October 24-27, 2017, in Bethesda, MD

Please click: Here for Registration Form


For more information on seminar dates, locations, and hotels, and how to register, please click here:
Schedule/Registration/Locations/Hotels for IS Audit Training

The UNIX and Windows operating systems share much in common. This class takes advantage of the similarities in their

architectures to show you easy techniques to audit both. The class starts by showing you how both UNIX and Windows security work, how they are similar and how they are different.

Unlike classes designed for system administrators, this class is designed for auditors. It shows you how the architecture works, how the security works, where the control points are, and how to audit the security. This class will not make you a system administrator; it will make you a better auditor. If you are going to learn to audit one of these operating systems, you will likely be auditing the other in the near future. This course takes advantage of the similarities in the two systems to teach you both at once. You will learn a model for computer security that will be valuable to you in auditing any type of computer.

You will learn a systematic approach to auditing both operating systems and to making practical, recommendations to improve their security.

HG76: You Will Learn:

  • How UNIX security works
  • How Windows security works and what it inherited from UNIX
  • Where the control points are for both UNIX and Windows security
  • How to assess the security at each control point
  • How to plan and scope your UNIX or Windows security audit
  • What data to collect, how to collect it, and how to interpret it
  • How to conduct the audit, from planning and scoping through follow-up
  • What all the related buzzwords and acronyms mean
  • How to conduct UNIX and Windows security audits rapidly and efficiently, with maximum benefit to your organization

The workbook is a valuable reference, and includes complete audit programs.

Who Should Attend HG76?

  • Information Techology auditors who will be auditing any distributed systems including UNIX and Windows
  • Financial auditors who want to learn more about IT auditing with UNIX and Windows computers

Class Outline

     Table of contents and Class Outline: HG76: How to Audit UNIX and Windows Security
							 
I     Concepts and Keywords					  
	A.     Introduction					  
		How UNIX and Windows Are Similar
		How UNIX and Windows Are Different
	B.     How the Security Works	
		How UNIX Security Works
		How Windows Security Works
		Networking with UNIX and Windows				
	C. 	Setting the Stage
		A Working Example				
		The Audit Program	

II.     Action Plan						 
	A.     How to Audit UNIX Security
		Planning, Scoping, Data Gathering and Analysis
		Auditing How Users Are Identified and Authenticated
		Auditing How Files Are Protected
		Auditing How Resources Are Protected
		Auditing Delegation of Authority
		Auditing Separation of Duties
		Auditing theTrusted Computing Base
		Auditing Networks
	B.     How to Audit Windows Security
		Planning, Scoping, Data Gathering and Analysis
		Auditing How Users Are Identified and Authenticated
		Auditing How Files Are Protected
		Auditing How Resources Are Protected
		Auditing Delegation of Authority
		Auditing Separation of Duties
		Auditing theTrusted Computing Base
		Auditing Networks
	C.     Wrap-up, Working Papers, and Follow-Up		

III   Forms and Reference					
	A.     Basic Security Model				
	B.     UNIX Audit Program		
	C.     Windows Audit Program			
	D.     How TCP/IP Works			
	E.     How SSL (Secure Sockets Layer) Works
	F.     How Kerberos Works			
INDEX	


Please note that these seminars are available for In-House Sessions.

You can save more money by learning about our seminar Discounts

Return to Top of Page         Return to Home Page







































Stu Henderson offers MVS security audits, consulting, seminars, articles, and other information sharing related to information security and auditing. His consulting includes: security reviews, risk assessments, RACF implementation assistance, and Information Technology audit technical counseling.
His most popular seminars provide: RACF training, mainframe audit training including MVS and z/OS audit training. His RACF seminars include: "Effective RACF Administration", "Advanced RACF Administration", and "UNIX (USS) for RACF Administrators".
His audit seminars include: "How to Audit TCP/IP Security" and "How to Audit UNIX and Windows Security"
Information on class location and schedules, as well as articles, links and other useful information sharing may be found on his website at www.stuhenderson.com