Monday, August 31, 2020

Free webinars "Tales of safety"

In addition to analyzing security concepts, the series of webinars "Tales of Security" describes how: aws certified solutions architect - associate salary

manage access with security tools and group policies

organize security at different levels of infrastructure

manage public key infrastructure (PKI) to support applications

set up secure remote and mobile access

secure the network perimeter

protect the system from data leakage and much more

Participation fee  is free.

The duration of each webinar is 1 hour

Speaker - Andrey Shokhanov

Speaker

Andrey Shokhanov, Microsoft Certified Trainer

WebST1.0 Security Approaches

At the first webinar, we will look at the basics of information security, as well as:

the direction of the attacks and the targets the attackers are trying to reach

generally accepted standards and methodology for information security

building a security concept using the example of the seven-level model "Defense in Depth"

Date and time of the event - July 27 from 16:00 Kyiv time

WebST2.0 Authentication, or Face Control as a Factor of Protecting Corporate Information

In addition to a brief overview of the concept of authentication, the webinar will cover the following topics:

Class Protocols;

LAN Authentification;

Multifactor Authentification.

Date and time of the event - August 10, 16:00 Kiev time

WebST2.1 Authentication, or Face Control as a Factor of Protecting Corporate Information (continued)

In addition to a brief overview of the concept of authentication, the webinar will cover the following topics:

Class Protocols;

LAN Authentification;

Multifactor Authentification.

Date and time of the event - August 31, 16:00 Kiev time

WebST3.0 Security in Microsoft Infrastructure, or What a sysadmin shouldn't do

This webinar will discuss what tools can be used to ensure security in the Microsoft environment, as well as some practical tips for configuring the security of servers and workstations.

Date and time of the event - September 14 from 16:00 Kiev time

WebST4.0 Access Control, or We Are Responsible for Those Who Have Rights

As you might guess from the title, this webinar includes consideration of:

Rights / Permissions (Rights)

Permissions (Classical)

Permissions (New, DynamicAccessControl)

Date and time of the event - September 28 from 16:00 Kyiv time

WebST4.1 Access Control, or We Are Responsible for Granted Rights (continued)

As you might guess from the title, this webinar includes consideration of:

Rights / Permissions (Rights)

Permissions (Classical)

Permissions (New, DynamicAccessControl)

Date and time of the event - September 28 from 16:00 Kyiv time

WebST5.0 Remote Access or Uninvited Guests Denied Entry

In this webinar, we will look at how to secure the infrastructure by providing remote access via:

Remote auth

WiFi

Date and time of the event - October 26 from 16:00 Kiev time

WebST5.1 Remote Access or Uninvited Guests Denied Entry (continued)

In this webinar, we will look at how to secure the infrastructure by providing remote access via:

VPN

Direct Access

Date and time of the event - November 09 from 16:00 Kiev time

WebST6.0 Audit, or an IT Auditor

Sometimes events happen that require answering the question "who did it?" or "when did the problem occur?" This can happen "rarely, but aptly", so you should prepare for the answer to the question in advance.

In this webinar, we'll look at how Microsoft products can make it easier for a sysadmin to track and log information about when and by whom changes were made to the system using:

Audit Remote Access

Audit Object Access

No comments:

Post a Comment

Run Your Applications Locally, Over Your Organization's Network, or Anywhere in the World

Applications are easy to use and with COMSOL Server™, they are easy to access, deploy, and share, too. You can install the COMSOL Server™ so...