Mastering Internet And LAN Security Seminar training classes conferences & workshops presented by SkillPath Seminars register for training on


Add your seminars

Training Calendar Creator Seminar Venues Training Provider Directory

New Seminar Search:  

find similar training...
Search by state...
Email this event ...

Customer Support

Do you need help finding the right class, date, or location or other assistance?

Request information about upcoming training seminars workshops and conferences in   and other cities listed on Submit a support request and receive a prompt reply.

We guarantee this SkillPath Seminars training seminar

We are an authorized partner of SkillPath Seminars


Price protection. The price to attend Mastering Internet And LAN Security is set by the training providerThere is no added charge for our services.

We honor most training provider coupons
*.   Call  a representative to see if your discount coupon applies.

Privacy. Your personal information won't be shared with anyone but the training provider SkillPath Seminars.

Security. When you register for this seminar on your personal data and payment information is safely collected and processed using secure SSL encryption technology.

Flexibility. offers you three ways to register for Mastering Internet And LAN Security seminar by SkillPath Seminars.
Register online, by phone, or fax.
Who should attend Mastering Internet And LAN Security
Write and read SkillPath Seminars reviews and reviews about the training seminar Mastering Internet And LAN Security on the Seminar News Network and the Training News Network.

Frequently asked questions and registration options for the training seminar Mastering Internet And LAN Security

Find Training Near You
Use our clickable map to find training near you
Use Our Clickmap
Education and training domain names

Education and training news articles

hotel seminars meeting space directory
hotel meeting space training facilities restaurant and lodging


Mastering Internet And LAN Security  

 Email information about this seminar Mastering Internet And LAN Security by SkillPath Seminars to yourself your manager or associates Email this event... View and register for other training seminars like Mastering Internet And LAN Security by SkillPath Seminars on Find similar training.. Find and register for other training seminars by SkillPath Seminars on Other seminars from SkillPath Seminars


training seminars by SkillPath Seminars SkillPath Seminars   




see Registration info for seminar cost, group discount etc.

Seminar Summary:

In this intensive hands-on workshop, you´ll learn how to put your system through  (see full course description)


 Seminar / Training class dates & locations


No seminar dates for this event are currently scheduled.  Please use the seminars search box above or choose one of the following additional training search options to find similar training.

internet+lan+security+lock+down+system+security training seminars workshops conferences online training

Providers course catalog

Find seminars by state

Find seminars by city

Request on site training

Use Advanced Search

NEW  Don't miss training you want to attend

Receive a personal Training Alert when training you want to attend comes to your area. Create a personal Training Alert now  it's Free and only takes a minute!




share this page 

print the agenda print agenda for the Mastering Internet And LAN Security seminar



Training Course Syllabus:

In this seminar you´ll learn...

  • Protecting your LAN from the outside world, yet allowing workstation
    access to the Internet

  • How to develop an effective "early warning" system that will alert you
    to potential intruders and quickly differentiate them from legitimate users

  • Testing the effectiveness of firewall software ... is yours providing
    the protection you need or just giving you a false sense of security?

  • How to choose and enable the correct encryption technique to match your
    organization´s needs for secure data transmission

  • And much more

If you think computer attacks only happen to the Amazons® and Yahoos® of
the world, think again. This year, your chances are greater than 1 in 4
that your company´s computer system will be hacked—largely due to the
"chinks in the armor" caused by Internet connections and the growing
sophistication of hackers who can hit a "target" computer hundreds of
times a day searching for any weakness or entry point. In this intensive
hands-on workshop, you´ll learn how to put your system through "real
world" hacker tests ... and then use what you learn to tailor your
system´s security capabilities to achieve a solid, locked-down facade that
will quickly discourage would-be intruders.




Day one: 8:00 a.m. – 5:00 p.m.


The secrets to securely configuring your operating system

In this session, you´ll learn about the procedures that are critical to
securing your system and get into the specifics of operating system
configurations that provide solid defenses against intruders and attacks. You´ll
learn step-by-step security procedures for configuring both Windows NT® and
UNIX®/Linux®-based operating systems and find out how vulnerable default OS
installation can be—especially when your systems aren´t physically secure.
You´ll also learn the pre- and post-installation steps that must be taken to
create a secure foundation for all your systems.

You´ll also discover ...

  • The major security risks of popular server operating systems such as
    Windows NT ... and how to minimize them

  • How to ensure security for users who define their own passwords, by
    setting up seven important password guidelines

  • The 14 critical configuration problems with UNIX systems and how to
    overcome them

  • How to correctly configure and analyze the information contained in your
    security log, so you don´t miss a red flag

  • Web server software configuration—what you must know

Default Web server software installations are virtually open doors to hackers
and crackers—especially in the area of authentication. In this session, you´ll
start off with a look at how users are authenticated on the most popular Web
server software packages, and we´ll show you how to correctly configure
authentication on each one. You´ll also find out how to configure access control
based on IP address, host name, user name and password. Plus you´ll learn about

  • A step-by-step checklist to verify the configuration and security of your
    Web server software

  • Hidden security flaws in Microsoft® Internet Information Server and
    Apache® Web Server ... and the most effective methods to patch them

  • How to correctly configure Web server logs to save space and still get the
    information you need to monitor your Web site

  • Important guidelines for safe and secure Web programming

  • How to safely set up remote authoring and administration of your site

  • Client-side security—protecting against browser attacks

Since many remote attacks are also directed at client browsers, it´s equally
important to provide effective browser security. Unprotected browsers are a
target for malicious Web site programs that can wreak havoc on individual PCs
and then infiltrate other computers connected to the same network. And because
it´s seldom detected until weeks after the initial attack, this type of "hidden"
intrusion can be quite dangerous. This session will show you how to prevent
remote attacks on your local system and network computers through proper
configuration of Internet browsers. Once your browsers are protected, you can
have peace of mind, knowing that your organization is safely using the Internet.
You´ll learn ...

  • How to protect against data extraction by remote Web sites

  • How scripting languages such as JavaScriptTM and ActiveX® can be used to
    crash your computer—and the options you have to prevent this from happening

  • How to disable cookies if you´re concerned about security breaches

  • How to fix the latest security gaps found in Internet Explorer and
    Netscape® browsers

  • What to look for when initiating a secure Internet transaction, to make
    sure that confidentiality is maintained

  • Protecting your organization and your customers with cryptography


Anyone taking payments for goods or services over the Internet has the need
for an extremely high level of security ... and so do sites with content that´s
restricted to a certain type or level of user, like confidential price listings.
This session will show you how to achieve the security that´s needed while
allowing access to qualified remote users or customers. You´ll find out what it
takes to enable Secure Sockets Layer (SSL) on your Web server and discover why
you need to rely on a third-party Certification Authority (CA) to make it work.
You´ll also learn ...

  • The three different certificate configuration settings for Microsoft®
    Internet Information Server and how each may affect your remote clients

  • What a key pair is and how it is used to secure your site and protect your

  • The difference between Public Key and Private Key systems, and the
    features of asymmetric and symmetric encryption

  • How to enable encryption at the application level using SHTTP

  • How to incorporate a free encryption program known as PGP—Pretty Good

  • Firewalls—do you really need one?


When are firewalls absolutely essential and when are they merely a waste of
resources? This session will clear up any misconceptions about firewalls, and
you´ll discover if your Internet- or WAN-connected networks actually need a
firewall—or if you can provide as much or more security by using other methods.
You´ll learn how firewalls protect Internet-connected networks and how easily
they can be defeated if not properly configured. You´ll also find out ...

  • What type of firewall software is available and which packages offer the
    best protection

  • How to configure security on a router without using expensive firewall

  • The types of attacks that firewalls offer little or no protection against

  • How to determine the best location of a network firewall, to ensure
    maximum protection while still providing a high level of access to your remote
    users and customers

  • Why firewall logs may not be the best place to look for signs of possible


Day two: 8:00 a.m. – 5:00 p.m.

Using a proxy server to allow Internet access and provide network protection

More and more companies are providing access to the Internet for their
employees ... while this can be very beneficial, it can also increase security
risks. This session will show you how to allow Internet access and protect your
network from attack by properly installing and configuring a proxy server.
You´ll learn how some of the major proxy server software packages function, and
you´ll install and configure Microsoft Internet Security and Acceleration (ISA)

You´ll also discover ...

  • How to control access to Internet sites, using a proxy server

  • The right way to configure logging services to allow proper monitoring of
    your proxy server

  • How to configure your proxy server to block ports and functions so it will
    act as a firewall—and virtually eliminate the risk of exposing your systems
    and information to the Internet

  • What limitations you can expect for your internal network users connecting
    to the Internet through

  • Where to find the bugs in some of the most popular proxy software
    packages—and how to fix them before they cause you problems

  • How hackers break into LAN-connected systems—and how you can keep them out


The only way to truly build up the defenses of your systems is to anticipate
how hackers will most likely attempt to break in. In this session, you´ll learn
about the most common methods and tools hackers use ... and you´ll get hands-on
experience using them to break into a Web server in the classroom. You´ll then
learn the best methods to protect against this type of attack and configure your
lab Web server to block an intruder. And, to make sure, you´ll then test your
configurations by attempting to break into each system in the lab. You´ll also
learn ...

  • The utilities used to attempt break-ins on UNIX®, Linux® and Windows NT®
    Web servers

  • How intruders can use the NetBIOS Auditing Tool to uncover commonly used

  • How port scanners can be used to identify open TCP and UDP ports on your
    system—and how that information can be used to develop an attack

  • How sniffers can intercept unencrypted data and even extract passwords
    which can allow hackers free access to your systems

  • The use of utilities such as L0phtCrack, Crack and NTcrack by hackers to
    run dictionary or brute force attacks against your servers

  • Building the best intruder detection system


You may think you´ve covered all the bases and have a really secure system,
but can you tell if someone has hacked into your system? This session will show
you how to build an effective intruder detection system, so you can feel
confident that no one´s slipping into your systems without being noticed. You´ll
find out the best ways to detect intruders and learn about the immediate steps
you must take if you verify that an intruder has been present—actions that will
minimize your systems´ potential for harm. We´ll also show you ...

  • Six methods that intruders use to obtain passwords and how to detect and
    protect against each one

  • The five most common types of reconnaissance scans that are used by
    intruders to hack into your systems

  • Four commonly used Denial of Service attacks and how to quickly detect

  • Three techniques used by intruder detection systems to match signatures
    with incoming traffic in order to sound an alert to various types of attacks,
    including "Ping-O-Death," "WinNuke" and others

  • How you can automate your system to reconfigure the firewall, send e-mail
    to the administrator, save attack information or accomplish other protective
    tasks if an intruder is detected

  • From the hacker files: Case studies that will help you build solid


This session explores several of the most famous computer security breaches
to date. You´ll get the technical details behind the actions of individuals who
hacked, crashed, stole from and vandalized some high-profile computers for a
variety of reasons. Not only are these accounts fascinating, but they´re also
great training ... you´ll learn how to keep hackers who use the same deceptions
and break-in techniques from damaging your site or accessing sensitive
information. We´ll also cover ...

  • How an individual launched a worm program that crashed more than 6,000
    computer systems in only a few hours

  • The man who was accused of accessing the systems of Novell®, Motorola®,
    NEC and others by fraudulently obtaining user accounts

  • How a Chicago woman masterminded a scheme that involved hacking into a
    real estate company´s voicemail system to steal more than $1.2 million in
    goods and services

  • The German hacker who attempted to steal software and government secrets
    and sell them to the Soviet KGB by using a supposedly defunct computer account
    at Lawrence Berkeley Laboratory in the U.S

  • How a New Hampshire teenager broke into and defaced the Web site
    along with two other high-profile sites

  • Developing a security policy


One of the keys to establishing true system security is documentation ... and
this session will show you, in detail, how to develop an effective but simple
security policy. You´ll learn how to develop your own customized policy, and
we´ll identify the important details you need to address. You´ll also find out
how seemingly insignificant oversights can lead to large problems and learn why
having a security policy makes your job much easier when it comes to dealing
with new or existing systems and end users. We´ll also discuss ...

  • The absolute musts for every security policy—and why they´re so vital

  • How to complete a risk analysis—a key component of an effective security

  • How to develop security checklists for servers, workstations, Web sites,
    firewalls, intruder detection systems and more

  • The secrets to defining the rights and responsibilities of users

CEU Credits: 1.6
CPE Credits: 16
Field of Study: Specialized Knowledge & Application
NASBA#: 107719


Seminar Summary:

In this intensive hands-on workshop, you´ll learn how to put your system through  (see full course description)

print this agenda print agenda for the Mastering Internet And LAN Security training seminar

 view dates and locations for this seminar






  Also try the advanced seminar search tool

   FindaSeminar HomeComputer Training

unix training
training classes

 © 2002-2014™ All Rights Reserved.  Terms of Use |  Privacy Policy |  Training News Network


Custom Search