1 00:00:01,470 --> 00:00:07,850 Walk up to a course on dealing with the tax also on how a system administrators should react if his 2 00:00:07,850 --> 00:00:09,410 computer network is attacked 3 00:00:12,090 --> 00:00:15,360 this is an important aspect of all computer security policies. 4 00:00:17,420 --> 00:00:21,560 You shouldn't approach attacks as a possibility but as a fact waiting to happen. 5 00:00:26,090 --> 00:00:31,790 In this module you'll learn among other things how to draw up an action strategy for fighting launched 6 00:00:31,790 --> 00:00:35,540 attacks. 7 00:00:35,550 --> 00:00:40,900 We'll talk about preparing the aspect of a company's security policy. 8 00:00:40,950 --> 00:00:46,500 We'll try to give you examples of technological solutions that can ensure constant availability of services 9 00:00:47,250 --> 00:00:51,260 even if you're battling the consequences of attacks or system failures. 10 00:00:54,220 --> 00:00:59,740 You'll learn how to use standard Windows tools to monitor system security and user's activity on a regular 11 00:00:59,740 --> 00:01:00,600 basis. 12 00:01:05,750 --> 00:01:11,270 Another topic we'll cover at some length is the issue of documenting an attack which is a branch of 13 00:01:11,270 --> 00:01:12,460 computer forensics 14 00:01:15,310 --> 00:01:18,150 using an attack case as an example. 15 00:01:18,190 --> 00:01:23,680 We'll examine the core of a proper administrative response to malware and to stop it from spreading 16 00:01:23,770 --> 00:01:29,540 and remove it from an attack to computer system. 17 00:01:29,550 --> 00:01:30,620 See you in the training.