| Sidebar: SANS Tutorials
 
Monday, April 24: 9:00 AM to 5:00 PM 
Topics in Network Administration 
Evi Nemeth (Univ. of Colorado) and Trent Hein (XOR Network
Engineering) 
This course provides guidance on solving very common
network management 
problems that confront system administrators. It includes
advice on 
when and how to use some of the public domain software
that is included 
with the course instructors' new UNIX System Administration
Handbook. 
UNIX Security: Threats and Solutions 
Matt Bishop (Univ. of California at Davis) 
This course will discuss some threats to UNIX security
and how to 
deal with them. The format of the class will be to analyze
case histories 
in depth, to show what attacks the attackers exploited,
how the systems 
administrators might have closed those loopholes, and
how the intruders 
were discovered. Concepts and mechanisms will be discussed,
as well 
as publicly available tools. This day is divided into
four sections 
each of which focuses on non-network problems. 
Sendmail Configuration and DNS Management 
Rob Kolstad (BSDI) and Tina Darmohray (Great Circle
Associates) 
This course presents an introduction to the DNS system,
history and 
motivation, configuration and management. It will also
look at how 
to modify, program, and debug sendmail configuration
files. 
Tuesday, April 25: 9:00 AM to 5:00 PM 
Topics in System Administration 
Evi Nemeth (Univ. of Colorado) and Trent Hein (XOR Network
Engineering) 
This course provides a survey of some key areas that
are of concern 
to many system administrators: Survey of Dial-Up Networking,
USENET 
News in the 90s, Security Tools, Introduction to Sendmail8,
and Policy 
and Politics. 
Surfing 2000 Part I: Catching The Wave, An Introduction
to The Internet 
Amy Kreiling (Univ. of North Carolina) with John Stewart
(Cisco) 
If you already have a home page, but want or need to
know more, this 
two-day course is just what you need. And, if you don't
know what 
is meant by a home page, then this is the place, too. 
UNIX Security Course 2: Threats and Solutions from the
Network 
and Security Challenges in Programs 
Matt Bishop (Univ. of California at Davis) 
This course analyzes incidents in which attackers have
tried to gain 
illicit access to UNIX systems. We discuss the attacks
used, why the 
exploited holes existed, how the system administrators
responded, 
and how they closed the holes. 
Managing, Hiring, Ethics, and Policy for System Administrators 
Rob Kolstad (BSDI) and Tina Darmohray (Great Circle
Associates) 
This course starts with tips and techniques for effective
management 
and hiring of system administrators and effective management
of your 
own time, then moves on to explore ethical and policy
questions that 
shape the work environment for system administrators. 
Wednesday, April 26: 8:30 AM to 3:45 PM 
Practical Perl 
Tom Christiansen 
Perl is an excellent programming tool for many challenges,
including 
system management tasks. It has become the programming
language of 
choice for many system administrators because of its
interpretive 
nature and incredibly rich feature set. Perl is a publicly
available 
and highly portable interpreted programming language,
with syntax 
and features that resemble C combined with the best
parts of sh, 
sed, awk, and several other powerful UNIX tools. 
Surfing 2000 Part II: Building A Successful World-Wide
Web 
Amy Kreiling (Univ. of North Carolina) with John Stewart
(Cisco) 
The first day (Tuesday) helped you learn about all of
the important 
current Internet Discovery and Retrieval Tools. In this
second day, 
you'll get an inside look at the World Wide Web, its
browsers and 
servers. 
UNIX Security Course 3: UNIX Security Tools and Internal
Security 
Dr. Matt Bishop (Univ. of California at Davis) and Rob
Kolstad 
(BSDI) 
The goal of this course is to assist UNIX security administrators,
and interested users, in locating and using publicly
available programs 
to improve the security of their systems. The class
will compare the 
uses and drawbacks of several different programs, with
an emphasis 
on when to use which. 
Constructing Firewalls for Network Security 
Tina Darmohray (Great Circle Associates) 
Often, the success of an enterprise depends heavily
on digital communications. 
Until now, the techniques and tools required to secure
a functional 
TCP/IP network have been an art -- acquired only through
trial 
and error. This course presents issues and solutions
surrounding the 
securing of functional internetwork connections and
construction of 
an Internet Firewall. 
Saturday, April 29: 9:00 AM to 4:00 PM 
Four Keys to Professional Advancement: Managing Users;
Managing 
Your Boss; Effective Technical Presentations; Effective
Writing 
Bill Howell, Rob Kolstad, Alan Paller, and Carolyn Sherman 
Now, more than ever, raises and promotions go to the
people who are 
good communicators as well as good technicians. If you
are interested 
in improving your communications skills, this four-part
course gives 
you tips and techniques that can help. 
The Most Useful Tools For System Administrators: Where
to 
Find Them, How to Use Them 
Bjorn Satdeva (/sys/admin, inc.) 
This course is aimed at UNIX system administrators,
and will teach 
a number of different publicly available tools which
will be useful 
in their daily work. 
UNIX System and Network Performance Tuning 
Marcus Ranum, Trusted Information Systems 
This class is an introduction to the arcane art of performance
tuning 
and benchmarking. Since system tuning is UNIX version
specific, the 
class will focus on providing a strong grounding in
what factors influence 
performance, and how to identify bottlenecks in various
parts of the 
system.  
 
 
 |