|
Information Security Training
from the Henderson Group |
This page is: |
Quick Links: HOME PAGE CONTACT US INFOSEC TRAINING
NEWSLETTERS AND USER GROUPS ARTICLES
ABOUT US OTHER INFO SOURCES |
You will learn:
For more information on seminar dates, locations, and hotels, and how to
register, please click here:
Please note that you can save money by holding these classes in-house. Call
Stu at (301) 229-7187 for details.
Note also the classes we offer for Information Security Training, as
listed on the left under QUICK LINKS.
|
"A must for all information systems auditors." --- Molly Eichhoefer, Florida DOT
"The Action Plans for Developing the Audit are an excellent tool and reference for use six months or a year
from date of class." |
Table of Contents and Class Outline: HG70: How to Audit Cross-Platform Applications I Keywords and Concepts A. Introduction B. How Common Security Concepts are Reflected on Different Platforms C. How Connecting Different Platforms Affects Security D. What to Do If You Aren't Familiar with a Given Platform E. Control Objectives F. The Audit Program II Action Plan A. Scoping, Planning, and Basic Data-Gathering B. Evaluation of Each Platform's User Identification C. Evaluation of Each Platform's Data Protection D. Evaluation of Connection Security E. Evaluation of the Protection for the Application's Data on All Platforms F. Wrap-up, Working Papers, Follow-up III Forms and Reference A. Basic Security Model B. Forms to Document Platforms and Links Between Them C. Audit Plan D. Model Documents E. Security Details for Various Platforms UNIX Security Details Windows NT and Windows/2000 Security Details MVS with RACF Security Details MVS with ACF2 Security Details MVS with TopSecret Details CICS Security Details MQ Series Security Details DB2 Security Details TCP/IP Security Details INDEXReturn to Top of Page