Black Hat Digital Self Defense
Trainiing

Note: if the class is overfilled, you will be contacted should this occur.

training
USA 2002 Training
Caesars Palace, Las Vegas, NV
July 29-30, 2002

All course materials, lunch and two coffee breaks will be provided.
You must provide your own laptop.

Course Length: 1 day

NOTE: this is a one day course that is offered on two different days. Please specify which day ypu would prefer on the Registration form.

This class is SOLD OUT

training
One Day Course, Offered two days
Mon, July 29 & Tues, July 30
Using Active Directory to Manage Security
Laura Robinson
What to bring:
Students should come prepared with a laptop a laptop with Windows 2000 server CD

A comprehensive one day course, Using Active Directory to Manage Security explores the most powerful, yet least understood, part of Windows 2000- Active Directory. Active Directory is the place to manage some of the most significant aspects of your security infrastructure, but its functionality is often underutilized or misunderstood.

This will be a “from the ground up” training session, covering:

  • Active Directory Components, both logical and “physical”, providing the basis for AD design structures
  • Group Policy, perhaps the single most powerful functionality provided by Active Directory, including
    • Organizational Unit structures and effective design for both delegation of administration and effective application of Group Policy
    • Security Policy Deployment using Group Policy and .inf files
    • Customization of .inf files to extend the capabilities of Group Policy’s security settings
    • Patch Deployment via Group Policy using .msi files
    • IPSec Policies for automatic deployment of IPSec encryption functionality
  • Security-Sensitive Accounts, including all of the built-in administrative accounts and groups (Administrators, Domain Admins, Enterprise Admins and Schema Admins), why you should be concerned about them, and how to secure them
  • Common Weaknesses in Active Directory Design and how to avoid them
  • Active Directory and NetworkAuditing, without which your security might as well be nonexistent

This is a hands-on course, and all attendees are expected to bring a laptop and Windows 2000 Server or Advanced Server CD, as we will be building an Active Directory infrastructure in class and testing the results of the policies and settings we implement.

Course Length: 1 day

NOTE: this is a one day course that is offered on two different days. Please specify which day ypu would prefer on the Registration form.

This class is SOLD OUT

Trainer:

Laura Robinson is a consultant and trainer who specializes in Active Directory design and has been involved architecting AD implementations ranging from 600 to 60,000 users, for companies supporting millions of customers. She authored several chapters of the Microsoft Press book, "Windows 2000 TCP/IP Protocols and Services Technical Reference", has been working with Windows 2000 since Beta 1 and teaching it since Beta 2, and has continued her involvement in Microsoft's operating system technologies through her work with .Net servers in 2001. Laura is a Microsoft Certified Trainer and Systems Engineer on both NT and Windows 2000; a Certified Lotus Professional Systems Administrator, Application Developer and Instructor; and an instructor for Real World Security's @ctive Defense education series. Laura is currently emplyed in IntelliMark's IT Solutions

Black Hat Logo
(c) 1996-2007 Black Hat