In addition to analyzing security concepts, the series of webinars "Tales of Security" describes how: aws certified solutions architect - associate salary
manage access with security tools and group policies
organize security at different levels of infrastructure
manage public key infrastructure (PKI) to support applications
set up secure remote and mobile access
secure the network perimeter
protect the system from data leakage and much more
Participation fee is free.
The duration of each webinar is 1 hour
Speaker - Andrey Shokhanov
Speaker
Andrey Shokhanov, Microsoft Certified Trainer
WebST1.0 Security Approaches
At the first webinar, we will look at the basics of information security, as well as:
the direction of the attacks and the targets the attackers are trying to reach
generally accepted standards and methodology for information security
building a security concept using the example of the seven-level model "Defense in Depth"
Date and time of the event - July 27 from 16:00 Kyiv time
WebST2.0 Authentication, or Face Control as a Factor of Protecting Corporate Information
In addition to a brief overview of the concept of authentication, the webinar will cover the following topics:
Class Protocols;
LAN Authentification;
Multifactor Authentification.
Date and time of the event - August 10, 16:00 Kiev time
WebST2.1 Authentication, or Face Control as a Factor of Protecting Corporate Information (continued)
In addition to a brief overview of the concept of authentication, the webinar will cover the following topics:
Class Protocols;
LAN Authentification;
Multifactor Authentification.
Date and time of the event - August 31, 16:00 Kiev time
WebST3.0 Security in Microsoft Infrastructure, or What a sysadmin shouldn't do
This webinar will discuss what tools can be used to ensure security in the Microsoft environment, as well as some practical tips for configuring the security of servers and workstations.
Date and time of the event - September 14 from 16:00 Kiev time
WebST4.0 Access Control, or We Are Responsible for Those Who Have Rights
As you might guess from the title, this webinar includes consideration of:
Rights / Permissions (Rights)
Permissions (Classical)
Permissions (New, DynamicAccessControl)
Date and time of the event - September 28 from 16:00 Kyiv time
WebST4.1 Access Control, or We Are Responsible for Granted Rights (continued)
As you might guess from the title, this webinar includes consideration of:
Rights / Permissions (Rights)
Permissions (Classical)
Permissions (New, DynamicAccessControl)
Date and time of the event - September 28 from 16:00 Kyiv time
WebST5.0 Remote Access or Uninvited Guests Denied Entry
In this webinar, we will look at how to secure the infrastructure by providing remote access via:
Remote auth
WiFi
Date and time of the event - October 26 from 16:00 Kiev time
WebST5.1 Remote Access or Uninvited Guests Denied Entry (continued)
In this webinar, we will look at how to secure the infrastructure by providing remote access via:
VPN
Direct Access
Date and time of the event - November 09 from 16:00 Kiev time
WebST6.0 Audit, or an IT Auditor
Sometimes events happen that require answering the question "who did it?" or "when did the problem occur?" This can happen "rarely, but aptly", so you should prepare for the answer to the question in advance.
In this webinar, we'll look at how Microsoft products can make it easier for a sysadmin to track and log information about when and by whom changes were made to the system using:
Audit Remote Access
Audit Object Access
No comments:
Post a Comment