The Computer and Network Security Web site provides access to a number of resources and security training materials. The following instructional materials are now available.SANS step-by-step guides have been provided by the 2003 IT Security Symposium. Written by leading security practitioners, these guides offer assistance for the novice to expert level administrator.
- Computer Security Incident Handling
An action plan for dealing with intrusion, cyber-theft, and other security-related events
- Disaster Recovery and Business Continuity
A survival guide for developing and maintaining business continuity and disaster recovery plans
- Securing Linux
Survival guide for Linux security
- Securing Windows 2000
A consensus document by security professionals from dozens of user organizations
- Windows NT Security
A consensus document from eighty-seven large user organizations
- The CERT OCTAVE Program (Operationally Critical Threat, Asset, and Vulnerability Evaluation), a well-established risk evaluation program, is another option for guiding risk assessment. IET has purchased this program material and, with the permission of Carnegie Mellon University, provides the material for your review and use.
Security Policies Made Easy, a reference for individuals looking for ideas or text when developing security policies. If you are affiliated with UC Davis, you are licensed to use this text in your security policy.
To access the security training materials on these secure sites, you must have a UCD LoginID and UCD Kerberos Password.