HG76: How to Audit UNIX and Windows Security
(4 days, 32 CPE credits, $2200)
- October 24-27, 2017, in Bethesda, MD
Please click: Here for Registration Form
For more information on seminar dates, locations, and hotels, and how to register, please click here:
Schedule/Registration/Locations/Hotels for IS Audit Training
The UNIX and Windows operating systems share much in common. This class takes advantage of the similarities in their
architectures to show you easy techniques to audit both. The class starts by showing you how both UNIX and Windows security work, how they are similar and how they are different.Unlike classes designed for system administrators, this class is designed for auditors. It shows you how the architecture works, how the security works, where the control points are, and how to audit the security. This class will not make you a system administrator; it will make you a better auditor. If you are going to learn to audit one of these operating systems, you will likely be auditing the other in the near future. This course takes advantage of the similarities in the two systems to teach you both at once. You will learn a model for computer security that will be valuable to you in auditing any type of computer.
You will learn a systematic approach to auditing both operating systems and to making practical, recommendations to improve their security.
HG76: You Will Learn:
- How UNIX security works
- How Windows security works and what it inherited from UNIX
- Where the control points are for both UNIX and Windows security
- How to assess the security at each control point
- How to plan and scope your UNIX or Windows security audit
- What data to collect, how to collect it, and how to interpret it
- How to conduct the audit, from planning and scoping through follow-up
- What all the related buzzwords and acronyms mean
- How to conduct UNIX and Windows security audits rapidly and efficiently, with maximum benefit to your organization
The workbook is a valuable reference, and includes complete audit programs.
Who Should Attend HG76?
- Information Techology auditors who will be auditing any distributed systems including UNIX and Windows
- Financial auditors who want to learn more about IT auditing with UNIX and Windows computers
Class Outline
Table of contents and Class Outline: HG76: How to Audit UNIX and Windows Security I Concepts and Keywords A. Introduction How UNIX and Windows Are Similar How UNIX and Windows Are Different B. How the Security Works How UNIX Security Works How Windows Security Works Networking with UNIX and Windows C. Setting the Stage A Working Example The Audit Program II. Action Plan A. How to Audit UNIX Security Planning, Scoping, Data Gathering and Analysis Auditing How Users Are Identified and Authenticated Auditing How Files Are Protected Auditing How Resources Are Protected Auditing Delegation of Authority Auditing Separation of Duties Auditing theTrusted Computing Base Auditing Networks B. How to Audit Windows Security Planning, Scoping, Data Gathering and Analysis Auditing How Users Are Identified and Authenticated Auditing How Files Are Protected Auditing How Resources Are Protected Auditing Delegation of Authority Auditing Separation of Duties Auditing theTrusted Computing Base Auditing Networks C. Wrap-up, Working Papers, and Follow-Up III Forms and Reference A. Basic Security Model B. UNIX Audit Program C. Windows Audit Program D. How TCP/IP Works E. How SSL (Secure Sockets Layer) Works F. How Kerberos Works INDEX
Please note that these seminars are available for In-House Sessions.
You can save more money by learning about our seminar Discounts
Return to Top of Page Return to Home Page
Stu Henderson offers MVS security audits, consulting, seminars, articles, and other information sharing related to information security and auditing. His consulting includes: security reviews, risk assessments, RACF implementation assistance, and Information Technology audit technical counseling.
His most popular seminars provide: RACF training, mainframe audit training including MVS and z/OS audit training. His RACF seminars include: "Effective RACF Administration", "Advanced RACF Administration", and "UNIX (USS) for RACF Administrators".
His audit seminars include: "How to Audit TCP/IP Security" and "How to Audit UNIX and Windows Security"
Information on class location and schedules, as well as articles, links and other useful information sharing may be found on his website at www.stuhenderson.com