Information Security Training
from the Henderson Group
This page is:
AUDIT TRAINING: HG63: Windows, UNIX, TCP/IP

Quick Links:

HOME PAGE

CONTACT US

INFOSEC TRAINING

IT AUDIT TRAINING

NEWSLETTERS AND USER GROUPS

ARTICLES PRIVACY STATEMENT

ABOUT US

OTHER INFO SOURCES


HG63: How to Audit Windows, UNIX, and TCP/IP Security


(3 Days, 24 CPE Credits; $1470)



This class shows you how to audit the security for these two operating systems and the standard network protocol to connect them. You will learn how Windows security works, how UNIX security works, and how TCP/IP security works. You will then learn how to audit the security for them all. This class will be useful if you need to audit applications involving both operating systems, if you know one of them and need to learn the other, or if you just want to be competent in auditing the most common desktop and server platforms.

You will learn:

  • How Windows security works and how to audit it
  • How UNIX security works and how to audit it
  • How TCP/IP security works and how to audit it
  • How to audit security when the three are combined
  • Where the control points are and how to evaluate them
  • What data to collect and how to interpret it
  • How to conduct the audit, from planning and scoping through follow-up
  • What all the related buzzwords and acronyms mean
  • How to conduct the audit rapidly and efficiently, with maximum benefit to your organization
The workbook is a valuable reference and includes a complete audit program.

For more information on seminar dates, locations, and hotels, and how to register, please click here:
Schedule/Registration/Locations/Hotels

Return to Top of Page

Return to Home Page


Who Should Attend HG63?

  • Information Techology auditors who will be auditing Windows, UNIX, and/or TCP/IP based applications
  • IT auditors who want a solid foundation in these critical platforms
  • Financial auditors who want to learn more about IT auditing

Please note that you can save money by holding these classes in-house. Call Stu at (301) 229-7187 for details.

Note also the classes we offer for Information Security Training, as listed on the left under QUICK LINKS.

"A must for all information systems auditors."
--- Molly Eichhoefer, Florida DOT

"The Action Plans for Developing the Audit are an excellent tool and reference for use six months or a year from date of class."
---Bobbi Henry, IRS

                      Table of Contents and Class Outline:
                HG63: How to Audit Windows, UNIX, and TCP/IP Security

I     Keywords and Concepts

   A.  Introduction
   B.  What Windows Is and How Its Security Works
   C.  What UNIX Is and How Its Security Works
   D.  What TCP/IP Is and How Its Security Works
   E.  Control Objectives
   F.  The Audit Programs


II    Action Plan


   A.  Windows (NT, 2000, and XP)
       1.  How it Works and its Different Versions
       2.  How its Security Works
       3.  How to Audit its Security (data-gathering, analysis, reporting)

   B.  UNIX
       1.  How it Works and its Different Versions
       2.  How its Security Works
       3.  How to Audit its Security (data-gathering, analysis, reporting)

   C.  TCP/IP
       1.  How it Works and its Different Versions
       2.  How its Security Works
       3.  How to Audit its Security (data-gathering, analysis, reporting)

   D.  Effect of Connecting Windows and UNIX Computers with TCP/IP

   E.  Wrap-up, Working Papers, Follow-up


III   Forms and Reference

   A.  Basic Security Model
   B.  Forms to Document the Audit
   C.  Audit Plans
   D.  Model Documents
   E.  Windows Reference Material
   F.  UNIX Reference Material
   G.  TCP/IP Reference Material

INDEX                                         
Return to Top of Page

Return to Home Page