Geeks With Blogs
Virtualisation Technology Architecture and Industry Comments from the Front-Lines

Just did a John Craddock 2-Day Intensive Seminar on "Security Active Directory Access" at the Novotel in London. 

Four Words:  What an amazing event!

To see Craddock peel the layers behind Microsoft's Premier Directory Services was absolutely incredible.

If you think you know Active Directory Services, do this course with John.  He and and his colleague Sally Storey are very talented presenters in tune with demands of the market place and delivering secure, stable technologies geared towards the ENTERPRISE.

Abstract as follows:

A Two Day Seminar presented by John Craddock, in association with Microsoft TechNet

Novotel, Euston: 14th and 15th March 2007
This exciting two-day seminar presented by industry leading experts John Craddock and Sally Storey in association with Microsoft TechNet, will address any concerns you have about IT infrastructure security and Active Directory using engaging real-world examples relevant to your business needs.

Below is an outline of how the seminar will benefit you, the topics covered, biographies of the event’s speakers and a detailed schedule, followed by a registration form for you to complete.

Day 1: Building End-to-End Infrastructure Security
Windows XP, Vista, Server 2003 and Active Directory

Many IT Professionals will have attended security seminars and sessions over the years. Through contact with these training events they may have gained an appreciation of the various security technologies that are available. However, unless they have had extensive field experience, when, where and how these technologies can and should be leveraged can often be confusing. Poor deployment and process management of security will result in a suboptimal infrastructure and introduce additional vulnerabilities.

Infrastructure security is frequently only considered once server roles and network connectivity has been implemented and this is exacerbated by training that can be insular and only focuses on particular technologies. Our experience is that security technologies are often not deployed until late in a project, this can lead to poor implementation, weak documentation and compliance testing.

In this seminar we will engender a holistic approach to implementing security in order to maximise the availability, integrity and confidentiality of the data within an organization. We want attendees to think security, work out what they need to logically implement a secure environment and then leverage the technologies to build a cohesive solution.

Throughout the seminar demonstrations will illustrate and augment the topics.

Day 2: Building an Active Directory Disaster Recovery Plan
Do you have an Active Directory Disaster Recovery Plan? If the answer is no, or your plan is not tried and tested, this seminar is for you.

A rock-solid Active Directory infrastructure is pivotal to the success of any Windows 2000 or Windows Server 2003 deployment. The infrastructure consists of a number of critical components: the Active Directory database, domain controllers, global catalogs, FSMO roles, replication, SYSVOL, system services and DNS. The success of any deployment depends on reliable design and deployment combined with procedures to rapidly and successfully recover from any type of infrastructure component failure.

This seminar will explain the role and dependencies of each component, examine potential failure points and show you how to minimize their impact through best practice design combined with well honed recovery techniques. You will learn best practices for server and role placement and how to take a proactive approach to backup and disaster recovery. We will show you how to take a systematic approach to minimizing the impact of a series of incidents with scenarios that range from the loss of a single domain controller through to a catastrophic forest failure.

Throughout the seminar demonstrations will illustrate and augment the topics.

Topics covered include:

  • Identifying business assets
  • Threat modeling
  • Security policy and response planning
  • Deploying IPSec for domain and server isolation
  • Building rules and filters
  • Identifying protocol and port requirements
  • Firewall configurations
  • Managing server roles and lockdown policies
  • Patch management and compliance testing
  • Creating Software Restriction Policies (SRP)
  • Least privileged user access
  • Establishing client security and software policy
  • Client and server attack vectors
  • Client Protection Technologies
  • Network Access Protection (NAP)
  • Vista security enhancements

Topics covered include:

  • Active Directory database
  • The Global Catalog
  • Troubleshooting SYSVOL
  • FRS Replication
  • Managing FSMO roles
  • Metadata cleanup
  • DNS dependencies
  • Useful tools: ntdsutil, repadmin, dcdiag, dsquery...
  • System State backup
  • Restoring a DC through reinstallation
  • Restoring from backup
  • Authoritative restores
  • Non-Authoritative restores
  • Recovery of GC and FSMO roles
  • Recovering a Forest
  • Managing RID pools
  • Recovering the root domain
  • Recovering users and groups

Posted on Monday, March 19, 2007 8:47 PM | Back to top

Comments on this post: John Craddock and the AD Seminars

No comments posted yet.
Your comment:
 (will show your gravatar)

Copyright © Jason Miles | Powered by: