and remote networks Configuring user accounts, user profiles and system policies Installing applications in the Citrix MetaFrame multi-user environment. Using various Citrix MetaFrame utilities to administer Citrix MetaFrame servers, shadow ICA connections, measure bandwidth utilization Implementing server farms, publish applications inside and outside of server farms and migrate published applications Configuring ICA browser settings, ICA gateways and load balancing for Citrix MetaFrame servers Configuring Application Launching and Embedding (ALE) with the ICA Web Clients Monitoring and troubleshooting Citrix MetaFrame servers Windows 2000 MCSE Upgrade course 5/3/2001 for support for the Kerberos version 5 authentication protocol for authenticating Windows 2000 users and integration of Windows 2000 security with other operating systems that use Kerberos-based security with public key infrastructure to support certificate services. Penetration Testing . I attended the Internet Security Systems Ethical Hacker course. I set up and demonstrated the use of pen testing machines using industry standard tools for use in internet data centers. Nessus, Sam Spade, ISS scanner and other industry standard methods were used as well as public domain security testing tools amd special scripts. Penetration testing can now be undertaken to government CHECK Health Check Team standards. Full process undertaken including passive external analysis, web site testing, name server testing, stealth/firewall testing (hping/firewalk) portscanning with Windows and Linux based tools and all common utilities (as above). Research undertaken on #linuxwarez #!r00t and to obtain 0-day exploits from ADM, r00tabega and Team TESO. |
|
To Contact Me |
Phone: 07768 113497 Fax: 01473 423491 |
Security / Web Hosting Infrastucture Design Work |
Home Page | Network Penetration Testing | Firewall and VPN Engineering | Network Design | Security Policy | Network Support | Employment / Contract History | CV and References | Personal |