Cover V04, I02
Article
Sidebar 1

mar95.tar


Sidebar: SANS Tutorials

Monday, April 24: 9:00 AM to 5:00 PM

Topics in Network Administration

Evi Nemeth (Univ. of Colorado) and Trent Hein (XOR Network Engineering)

This course provides guidance on solving very common network management problems that confront system administrators. It includes advice on when and how to use some of the public domain software that is included with the course instructors' new UNIX System Administration Handbook.

UNIX Security: Threats and Solutions

Matt Bishop (Univ. of California at Davis)

This course will discuss some threats to UNIX security and how to deal with them. The format of the class will be to analyze case histories in depth, to show what attacks the attackers exploited, how the systems administrators might have closed those loopholes, and how the intruders were discovered. Concepts and mechanisms will be discussed, as well as publicly available tools. This day is divided into four sections each of which focuses on non-network problems.

Sendmail Configuration and DNS Management

Rob Kolstad (BSDI) and Tina Darmohray (Great Circle Associates)

This course presents an introduction to the DNS system, history and motivation, configuration and management. It will also look at how to modify, program, and debug sendmail configuration files.

Tuesday, April 25: 9:00 AM to 5:00 PM

Topics in System Administration

Evi Nemeth (Univ. of Colorado) and Trent Hein (XOR Network Engineering)

This course provides a survey of some key areas that are of concern to many system administrators: Survey of Dial-Up Networking, USENET News in the 90s, Security Tools, Introduction to Sendmail8, and Policy and Politics.

Surfing 2000 Part I: Catching The Wave, An Introduction to The Internet

Amy Kreiling (Univ. of North Carolina) with John Stewart (Cisco)

If you already have a home page, but want or need to know more, this two-day course is just what you need. And, if you don't know what is meant by a home page, then this is the place, too.

UNIX Security Course 2: Threats and Solutions from the Network and Security Challenges in Programs

Matt Bishop (Univ. of California at Davis)

This course analyzes incidents in which attackers have tried to gain illicit access to UNIX systems. We discuss the attacks used, why the exploited holes existed, how the system administrators responded, and how they closed the holes.

Managing, Hiring, Ethics, and Policy for System Administrators

Rob Kolstad (BSDI) and Tina Darmohray (Great Circle Associates)

This course starts with tips and techniques for effective management and hiring of system administrators and effective management of your own time, then moves on to explore ethical and policy questions that shape the work environment for system administrators.

Wednesday, April 26: 8:30 AM to 3:45 PM

Practical Perl

Tom Christiansen

Perl is an excellent programming tool for many challenges, including system management tasks. It has become the programming language of choice for many system administrators because of its interpretive nature and incredibly rich feature set. Perl is a publicly available and highly portable interpreted programming language, with syntax and features that resemble C combined with the best parts of sh, sed, awk, and several other powerful UNIX tools.

Surfing 2000 Part II: Building A Successful World-Wide Web

Amy Kreiling (Univ. of North Carolina) with John Stewart (Cisco)

The first day (Tuesday) helped you learn about all of the important current Internet Discovery and Retrieval Tools. In this second day, you'll get an inside look at the World Wide Web, its browsers and servers.

UNIX Security Course 3: UNIX Security Tools and Internal Security

Dr. Matt Bishop (Univ. of California at Davis) and Rob Kolstad (BSDI)

The goal of this course is to assist UNIX security administrators, and interested users, in locating and using publicly available programs to improve the security of their systems. The class will compare the uses and drawbacks of several different programs, with an emphasis on when to use which.

Constructing Firewalls for Network Security

Tina Darmohray (Great Circle Associates)

Often, the success of an enterprise depends heavily on digital communications. Until now, the techniques and tools required to secure a functional TCP/IP network have been an art -- acquired only through trial and error. This course presents issues and solutions surrounding the securing of functional internetwork connections and construction of an Internet Firewall.

Saturday, April 29: 9:00 AM to 4:00 PM

Four Keys to Professional Advancement: Managing Users; Managing Your Boss; Effective Technical Presentations; Effective Writing

Bill Howell, Rob Kolstad, Alan Paller, and Carolyn Sherman

Now, more than ever, raises and promotions go to the people who are good communicators as well as good technicians. If you are interested in improving your communications skills, this four-part course gives you tips and techniques that can help.

The Most Useful Tools For System Administrators: Where to Find Them, How to Use Them

Bjorn Satdeva (/sys/admin, inc.)

This course is aimed at UNIX system administrators, and will teach a number of different publicly available tools which will be useful in their daily work.

UNIX System and Network Performance Tuning

Marcus Ranum, Trusted Information Systems

This class is an introduction to the arcane art of performance tuning and benchmarking. Since system tuning is UNIX version specific, the class will focus on providing a strong grounding in what factors influence performance, and how to identify bottlenecks in various parts of the system.