CW084-4: Network and Systems Management

Note: this course has a non-standard academic year, and runs from September to early February.

Here is your first assignment, due January 15, 2007.

Here is your second assignment, due February 9, 2007.

Past papers from February 2005 and February 2004 are now available as PDF documents.

A "typical" scenario to start with.

Check out the Golden Rules of Systems Administration (which we will discuss in class).

Part 1: IT Security

The notes for this part of the course are based on material from Kevin Day's book:
Inside the Security Mind: Making the Tough Decisions
Prentice-Hall, 2003, ISBN: 0-13-111829-3.

Some Useful Stuff

Securing and Optimizing Linux (free downloads).
The SE Linux (security enhanced) site from the NSA.
The Linux Documentation Project's guides to all things GNU/Linux.

The RIPE whois database search service (good for Europe).
The ARIN whois database search service (good for America/Everywhere Else).

Part 2: Operating Systems and Case Studies

Access the Lab Tasks webpage.

Part 3: Further notes on Network and Systems Security

Here are the Intro to Computer Security slides which include the Security Policy material discussed in class.

Note: these course notes accompany "Network Security Essentials" by William Stallings, and have been produced by Henric Johnson.
All files are Microsoft PPT (PowerPoint) format.
Do not download these slides from Stallings's site. Cut down on network bandwidth utilization and use these local copies (thanks).

The additional material on SMTP is taken from a set of slides that accompany the Kurose/Ross "Computer Networking" textbook.
Refer to my annotated booklist for more details.

Return to the main page.