|
This course provides information on how to define a baseline of network performance for security auditing, analyze log files, create a network security assessment report, and suggest ways to improve compliance to a security policy.
Objectives:
- Audit network activity in Windows NT/2000 and Linux
- Use log analysis to identify suspicious network activity
- Create a security audit report
- Recommend steps for improving security compliance
- Enable proactive detection of security problems
- Configure a personal firewall
- Use SSH for data security and authentication
Topics:
- Log analysis
- Firewall and router logs
- Operating system logs
- Filtering logs
- Suspicious activity
- Additional logs
- Log auditing tools
- Generating reports
- Auditing recommendations
- Creating the assessment report
- Improving compliance
- Improving router security
- Enabling proactive detection
- Host auditing solutions
- Personal firewalls
- Replacing and updating services
- Secure shell
|
P500+ Processor, 128MB of RAM; Windows 2000, 2003, XP, Minimum screen resolution 800x600, Internet Explorer 5.5 or higher; Windows Media Player 9.0 or higher; Flash 8.0 or higher; 56K minimum connection; broadband (256 kpbs or higher) connection recommended; Javascript, DHTML and cookies enabled; Sound card with speakers or headphones strongly recommended.
|
Product names mentioned in this catalog may be trademarks/servicemarks or registered trademarks/servicemarks of their respective companies and are hereby acknowledged. All product names that are known to be trademarks or service marks have been appropriately capitalized. Use of a name in this catalog is for identification purposes only, and should not be regarded as affecting the validity of any trademark or service mark, or as suggesting any affiliation between MindLeaders.com, Inc. and the trademark/servicemark proprietor.
Terms of Use:
|
Copyright � 2006 Webteks. All rights reserved.
|
|
|