|
Information Security Training
from the Henderson Group |
This page is: |
Quick Links: HOME PAGE CONTACT US INFOSEC TRAINING
NEWSLETTERS AND USER GROUPS ARTICLES
ABOUT US OTHER INFO SOURCES |
You will learn:
For more information on seminar dates, locations, and hotels, and how to
register, please click here:
Please note that you can save money by holding these classes in-house. Call
Stu at (301) 229-7187 for details.
Note also the classes we offer for Information Security Training, as
listed on the left under QUICK LINKS.
|
"A must for all information systems auditors." --- Molly Eichhoefer, Florida DOT
"The Action Plans for Developing the Audit are an excellent tool and reference for use six months or a year
from date of class." |
Table of Contents and Class Outline: HG63: How to Audit Windows, UNIX, and TCP/IP Security I Keywords and Concepts A. Introduction B. What Windows Is and How Its Security Works C. What UNIX Is and How Its Security Works D. What TCP/IP Is and How Its Security Works E. Control Objectives F. The Audit Programs II Action Plan A. Windows (NT, 2000, and XP) 1. How it Works and its Different Versions 2. How its Security Works 3. How to Audit its Security (data-gathering, analysis, reporting) B. UNIX 1. How it Works and its Different Versions 2. How its Security Works 3. How to Audit its Security (data-gathering, analysis, reporting) C. TCP/IP 1. How it Works and its Different Versions 2. How its Security Works 3. How to Audit its Security (data-gathering, analysis, reporting) D. Effect of Connecting Windows and UNIX Computers with TCP/IP E. Wrap-up, Working Papers, Follow-up III Forms and Reference A. Basic Security Model B. Forms to Document the Audit C. Audit Plans D. Model Documents E. Windows Reference Material F. UNIX Reference Material G. TCP/IP Reference Material INDEXReturn to Top of Page