In this next real-training (tm) webinar I will simulate an intrusion by an outside attacker. Ultimately, as the attacker I will stumble upon of the honey-trap files set up as recommended in one of my recent webinar as an effective way to catch intruders. That will generate an alert which will signal us to change roles and put on the hat of information security officer.
Come with me as I track the intruder’s footsteps through the security logs of the file server, domain controller, VPN server and finally the firewall itself. You will learn how to link events from all of these systems to reconstruct the intruder’s actions. I’ll show you how to use handle IDs, client addresses and other gems of information from the Windows security log to follow the bad guys.
We will use events from Account Logon, Process Tracking, Logon/Logoff, Object Access categories and more. This webinar will break the “neat” needle on the security geek scale.
This is real training and there will be an opportunity to have your questions answered live.
CAN'T MAKE THE LIVE EVENT? REGISTER ANYWAY TO GET THE RECORDED VERSION.
Title: Anatomy of a Hack: Tracking an Intruder with Security Logs
Date: Wednesday, October 29, 2008 12:00 PM - 1:00 PM EDT
Date: Wednesday, October 29, 2008 12:00 PM - 1:00 PM EDT
This is real training.
Thanks as always for reading and best wishes on security,
Randy Franklin Smith
Subscription Information
You can unsubscribe below but try fine-tuning what type of information I send you. I have 5 different categories emails I send out - you can choose which to receive.
Ultimate Windows Security is a division of Monterey Technology Group, Inc. ©2006-2008 Monterey Technology Group, All rights reserved. You may forward this email in its entirety but all other rights reserved.
Disclaimer: We do our best to provide quality information and expert commentary but use all information at your own risk.
No comments:
Post a Comment