? Home | Site Map | Search | Contacts
About Us
News
Alerts
Events
Services
Resources
Report Incidents
Incident Statistics
Security FAQS
Training
Vacancies
Links

Search NISER
? NISER > SANS/NISER Asia Pacific Conference 2002 > Track 1: GSEC
Welcome to SANS/NISER Asia Pacific Conference 2002
October 7 - 12, 2002
Kuala Lumpur, Malaysia
Get Brochure(PDF)
Main | FAQS | Track 1: GSEC | Track 2: GCFW | Track 5: GCWN | Registration | Accommodation

SANS SECURITY ESSENTIALS (6 DAYS)
10/7 Mon. 1.1 SANS Security Essentials I: Networking Concepts Edward Luck
10/8 Tue. 1.2 SANS Security Essentials II: Network Security Overview Edward Luck
10/9 Wed. 1.3 SANS Security Essentials III: Internet Security Technologies Edward Luck
10/10 Thu. 1.4 SANS Security Essentials IV: Secure Communications Edward Luck
10/11 Fri. 1.5 SANS Security Essentials V: Windows Security Edward Luck
10/12 Sat. 1.6 SANS Security Essentials VI: Unix Security Edward Luck
?
Pricing RM $9,101 (US $2,395) with certification exam(s) for GIAC certification
Rate includes lunches and breaks.
Go to the Registration page to enrol in this conference and how to make payment.
?
Venue HOTEL NIKKO KUALA LUMPUR
165, Jalan Ampang,
50450 Kuala Lumpur, Malaysia
?
TRACK SUMMARY

The SANS Security Essentials program is designed for computer professionals who are either new to the Information Security field or who wish to fill in the gaps in their knowledge in an intensive, fast-paced setting. The SANS community has forged a consensus on the essential knowledge and skills for information security. This track offers comprehensive coverage of the essentials that were determined by that collaborative process: information assurance fundamentals, ip concepts and behavior, the Internet threat, antivirus tools, security policies, password management and cracking, PGP, cryptography, and Windows and Unix security-related topics including backup and auditing. Few organizations will feel comfortable allowing system administrators or security professionals to have security responsibility, or even root or administrator access, without their having mastered these essentials. This course can be used to prepare for the GIAC Security Essentials Certification (GSEC).

Certification Information
You have six months following the conference to complete GIAC certification requirements. Detailed information can be found at http://www.giac.org/steps.php.

SPECIAL NOTE: SANS Security Essentials has been evaluated by the NSA and is fully compliant with the NSTISSI 4013 training standards.


COURSES
SANS Security Essentials I:
Networking Concepts

Edward Luck, Fulcrum group of companies, Melbourne AU
Monday, October 7, 2002
9:00 AM 5:00 PM

A key way attackers gain access to a company's resources is through a network which is connected to the Internet. Therefore having an understanding of how networks and the related protocols like TCP/IP work is critical to being able to analyze network traffic and determine hostile traffic. Being able to protect against these attacks using devices such as routers and firewalls is just as important. A company wants to try to prevent as many attacks as possible; but in cases where it cannot prevent an attack, it must detect it in a timely manner.

?

Topics Include:
Network Fundamentals
  • Network Topologies
  • Ethernet, Token Ring
  • Wireless
  • Wiring
  • Network Devices
  • VLANS
IP Concepts
  • Packets and Addresses
  • IP Service Ports
  • IP Protocols
  • TCP
  • UDP
  • ICMP
  • DNS
IP Behavior
  • TCPDUMP
  • Recognizing and Understanding
  • UDP
  • TCP
  • ICMP
  • TCP Behavior
IOS and Router Filters
  • Routers
  • IOS
  • Routing
  • Routing Protocols
  • Access Control Lists
Host-based Perimeter Protection
  • Vulnerabilities
  • Four Primary Threats
  • Personal Firewalls
"Great exposure to the needed tools for protecting against threats and for identifying vulnerabilities"
-- Larry Garmon, Fujitsu Network Services
"Anyone who is starting in security NEEDS this course"
-- Andrew Stephens, Compaq
Back To Top ^

1.2 SANS Security Essentials II:
Network Security Overview
Edward Luck, Fulcrum group of companies, Melbourne AU
Tuesday, October 8, 2002
9:00 AM 5:00 PM

In order to secure an enterprise network, you must have an understanding of the general principles of network security. In this course, you will learn about six key areas of network security. The day starts with information assurance foundations, where students look at both current and historical computer security threats, and how they have impacted confidentiality, integrity, and availability. The first half of the day also covers the instruction for creating sound security policies and password management, including tools for password strengths on both Unix and Windows platforms. The second half of the day is spent on understanding the information warfare threat and the six steps of incident handling. The day draws to a close by looking at what can be done to test and protect a web server in your company.

?

Topics Include:
Information Assurance Foundations
  • Bedrock principles
  • Threat model
  • Three attacks from history
  • Vulnerabilities
  • Five basic countermeasures
  • Policy
  • Defense in depth

Computer Security Policies

  • Characteristics of good policies
  • Defining policies
  • How policies serve as insurance
  • Specific policies

Password Management

  • Password cracking
  • Password cracking for defense
  • Windows NT - L0phtcrack
  • UNIX - Crack
  • Password attack countermeasures
Incident Handling
  • Preparation
  • Identification
  • Containment
  • Eradication
  • Recovery
  • Lessons Learned

Information Warfare

  • Offensive Information Warfare
  • Defensive Information Warfare
  • Threats
  • Defenses

Web Security

  • Web communication
  • Web security protocols
  • Active content
  • Cracking web applications
  • Web application defenses
"Well developed, broad-range course which uses examples that are? continually reinforced for both small and large companies alike."
-- D. Laurie, AT&T
"This was a great class, it really opened my eyes."
-- Richard Murphy, EDS
Back To Top ^

1.3 SANS Security Essentials III:
Internet Security Technologies
Edward Luck, Fulcrum group of companies, Melbourne AU
Wednesday, October 9, 2002
9:00 AM 5:00 PM

Military agencies, banks, and retailers offering electronic commerce programs, and dozens of other types of organizations are demanding to know what threats they are facing and what they can do to alleviate those threats. In this course, you will obtain a roadmap that will help you understand the paths available to organizations that are considering or planning to deploy various security devices and tools such as intrusion detection systems and firewalls. The course goes beyond the narrow technical view and offers a full context for the deployment of these promising new technologies. When it comes to securing your enterprise there is or single technology that is going to solve all of a company's security issues. However, by implementing an in-depth defense strategy that includes multiple defensive measures, you can go a long way in securing your enterprise. Each section in this course covers one tool that will play a part in a company's overall information assurance program.

?

Topics Include:
Host-based intrusion detection
  • TCP Wrappers, Nuke Nabber, Back Officer Friendly
  • AtGuard
  • Syslog
  • Tripwire
  • Forensics
Network-based ID
  • Commercial tools
  • CIDF, CVE
  • Shadow
Honeypots
  • What they Are, How to Deploy Them
  • Deception Toolkit
Firewalls and Perimeters
  • Firewalls and Policy Enforcement
  • Packet filtering, State Aware, Proxy
  • Intrusion Detection using Firewall Logs
  • Effect of Firewalls on IDS Sensors
  • Firewall Avoidance Techniques, Modems,
  • Backdoors
Risk Assessment and Auditing
  • Introduction to Risk Management
  • Calculation of Acceptable Loss
  • Dollar Driven Versus Qualitative
  • Knowledge Based (Accreditation)
  • Securing NT Step by Step
  • Introduction to Auditing
  • Risk Assessment Checklists
  • Vulnerability scanners
  • Common Vulnerability and Initiative
  • Saint
  • Nessus
  • ISS Security Scanner
Security Policy
  • How all these Capabilities Work Together
  • Automated Response
  • Chain of Custody and Legal Issues
Introduction to Information Warfare
  • Know your Enemy-Ankle Biters to full IW
  • Cyberwar in the Real World
  • Cyberwar Scenario
Future directions
  • Where these Technologies are Heading
"Excellent class - a quick and time efficient way to get current on computer security terminology, technology & trends"
-- Brent Rhymes, NetIQ
"Before completing this course, I was unlikely to rate anything 'perfect'. I have to say that SANS does a wonderful job. I liked that all the instructors were 'touchable' and were more than happy to share their time-even during the lunch hour! (I had 3 instructors total)"
-- Carol Rivers, Lawrence Livermore National Lab
Back To Top ^

1.4 SANS Security Essentials IV:
Secure Communications
Edward Luck, Fulcrum group of companies, Melbourne AU
Thursday, October 10, 2002
9:00 AM 5:00 PM

There is no silver bullet when it comes to security. However, there is one technology that would help solve a lot of security issues, though few companies use it. This technology is encryption. Concealing the meaning of a message can prevent unauthorized parties from reading sensitive information. Day 4 looks at various aspects of encryption and how it can be used to secure a company's assets. A related area called steganography, or information hiding, is also covered. Based on the wide number of viruses that are being circulated and the impact they have to companies, virus and virus detection are addressed as well. This section finishes by looking at various attacks that encryption can help prevent.

?

Topics Include:
Cryptography
  • Need for cryptography
  • Types of encryption
    • Symmetric
    • Asymmetric
    • Hash
  • Ciphers
  • Digital substitution
  • Algorithms
  • Real-world cryptosystems
  • VPN's

Steganography

  • Types of stego
  • Applications
  • Detection
PGP
  • Installing and using PGP
  • Signing data and what it means
  • Key Management
  • Key Servers

Anti-Viral Tools on Desktops

  • Malicious code
  • Virus and hoax information
  • Organizational anti-viral policy
  • Desktop anti-viral care, feeding, and recovery of damaged files and systems
"The SANS training provides a clear path through the confusing world of? security."
-- Lyde Andrews, CareAlliance Health Services
"I swear I saw light bulbs switch on over some people's heads! I wish I could make the course mandatory for my department and the management of our company!!!"
-- John Myers, Logicon
Back To Top ^

1.5 SANS Security Essentials V:
Windows Security
Edward Luck, Fulcrum group of companies, Melbourne AU
Friday, October 11, 2002
9:00 AM 5:00 PM

You will find many different versions of the Windows operating system in use in the enterprise, so as a security professional, it is invaluable to have a general understanding of how these variants work. In this section, different versions of the Windows operating system will be covered-Windows 98, Windows NT 4.0, Windows XPand Windows 2000/XP. Differences between desktop and server editions will be clarified. Critical security functions, such as the use of NTFS for access control, enabling and using auditing, hardening the OS and backing up a Windows system, will be covered. A Microsoft's IIS web server module is included.

?

Topics Include:
Windows Security Administration (for 98, NT, XP and 2000)
  • Legacy Windows Desktop Systems
  • Setting File System Access Controls
  • Setting Security Relevant Registry Keys
  • Hardening Windows NT Step-by-Step
  • Secure Account Policies
  • Group Policy
  • Security Baselines
Backups for Windows NT
  • Third Party Products
  • NT Backup
  • Best Practices
  • NT Tape Management
  • Emergency Repair Strategies
Basic Windows NT Auditing
  • What Makes a Good Audit
  • User, Service, and File Auditing
  • Log Management
  • Log Filtering
  • Free and Nearly Free Tools
  • Automation
IIS Security
  • Installing and Configuring
  • Hardening the Web Server
  • Removing Unneeded Components
"Great information. Lots of areas are well covered"
-- Gerard Chartrand, PWGSC
"This course is good for a general overview of Windows security. Liked the fact that auditing and backup were covered."
-- Robert Armstrong, RCMP
Back To Top ^

1.6 SANS Security Essentials VI:
Unix Security
Edward Luck, Fulcrum group of companies, Melbourne AU
Saturday, October 12, 2002
9:00 AM 5:00 PM

Based on industry consensus standards, this course provides step-by-step guidance on improving the security of any Unix operating system. The course combines practical "how to" instructions with background information for Unix beginners and security advice and "best practices" for administrators of all levels of expertise.

?

Topics Include:
Basics
  • A Brief History of Unix
  • Booting Unix
The Unix File System
  • File System Layout
  • Files, Directories, and Links
  • Ownership and Permissions
  • The Physical File System
  • Manipulating Files and Directories
  • Unix Privilege
Passwords
  • Usernames and User IDs
  • The Superuser
Access Control
  • Usernames, UIDs, the superuser
  • Blocking accounts, expiration, etc.
  • Restricting superuser access
  • Boot-level access control
  • Disabling .rhosts
Additional Security Configuration
  • File system access control
  • Kernel tuning for security
  • Security for the cron system
Backups and Archives
  • tar, dump, and dd
  • Tricks and techniques
  • Networked backups
"An amazing intro for people who have never used UNIX and the term that you should be familiar with."
-- Angie Carfrae
"Very good starting point for the understanding of UNIX. I have taken several UNIX courses and this course explains it the best."
-- Robert Armstrong, RCMP
Back To Top ^



Disclaimers and copyright information
Last Update August 22, 2002