Messaging Security School

SearchSecurity.com's Messaging Security School has brought together some of the most knowledgeable experts in the messaging security field to offer you personal instruction on how to secure the information handled by your organization's knowledge workers.

What is messaging security? The answer differs for every enterprise. To some, it means keeping malicious code out of end-users' inboxes. To others it's all about wireless devices and mobile malware. Still others know how critical it is to keep tabs on instant messaging use. Yet an effective enterprise messaging security strategy incorporates all these elements and more.

SearchSecurity.com has brought together some of the most knowledgeable experts in the messaging security field to offer you personal instruction on how to secure the information handled by your organization's knowledge workers. Each of the lessons below is comprised of a webcast, technical tip, podcast and a quiz, and all are available on-demand for your convenience.

   Course outline
   Spam 2.0: New threats and new strategies
   Managing traffic: Keeping your content where it belongs
   The changing threat of email attacks
   Defending mobile devices from viruses, spyware and malware
   Essential practices for securing mobile devices
  Secure instant messaging
   Countermeasures for malicious email code
   Securing Microsoft Exchange

SCHOOL HIGHLIGHTS
Our editors would like your feedback on this Security School
Learn how you can earn CPE credits from (ISC)²
Visit our other Security Schools
Visit our email security and secure instant messaging resource centers
Submit a question to messaging security expert and Messaging Security School instructor Michael Cobb
Download free security IT software


Messaging Security School Course Outline



-->
Michael Cobb, CISSP, ISSAP
-->
Michael Cobb, CISSP, ISSAP
Spam 2.0: New threats and new strategies
Instructor: Michael Cobb, CISSP-ISSAP, Cobweb Applications Ltd.
NEW It's no wonder the spam problem continues unabated. The proliferation of botnets and profit motives are spurring new spam techniques that are getting through filters and clogging inboxes. Innovative techniques, such as embedding them in PDFs or within images, are tricking spam filters and users. While inroads have been made, the war on spam has certainly not been won. Instead, new battle lines are being re-drawn and security professionals must stay on top of these emerging tricks.



-->
Mike Rothman
-->
Mike Rothman
Managing traffic: Keeping content where it belongs
Instructor: Mike Rothman, president and principal analyst, Security Incite
As business needs demand that customers and partners receive sensitive enterprise data, there is an increased need to protect outbound messaging content. Learn about the product and technology options on the market today to protect outbound messaging content, and get advice on how to establish sound messaging business processes.



@34775 The changing threat of email attacks
Instructor: Mike Rothman, president and principal analyst, Security Incite
Email threats have evolved from the basic mass-mailing viruses and worms of yesteryear into the advanced image-based phishing and newsletter-hijacking attacks that are wreaking havoc in today's enterprise environment. Learn why these threats go far beyond the traditional problems that administrators and security managers have faced in the past, and how best to align messaging defenses to meet tomorrow's challenges.



Sandra Kay Miller
Defending mobile devices from viruses, spyware and malware
Instructor: Sandra Kay Miller, technical editor, Information Security magazine
There has been a noticable rise in the number of unique mobile malware threats facing enterprise devices. This lesson will serve as a primer on the top mobile threat vectors -- including malware from the network, other devices, SMS and more -- and misconceptions about mobile malware, plus methods to mitigate emerging mobile threats.



Essential practices for securing mobile devices
Instructor: Lisa Phifer, VP, Core Competence Inc.
For workers who conduct their business on the go, mobile devices represent a critical lifeline to enterprise applications and data, but precautions are required to avoid enterprise network breaches and private data disclosures. In this lesson, Lisa Phifer examines inherent weaknesses in mobile messaging devices, and discusses not only how to lock down mobile platforms to protect against emerging threats and risky end-user behaviors, but also how to ensure Bluetooth-enabled handsets aren't vulnerable to attack.



@12957 Secure instant messaging
Instructor: Michael Cobb, CISSP-ISSAP, Cobweb Applications Ltd.
Instant messaging is the most rapidly adopted communications medium in history and it's already become an indispensable business tool for many. But like all Internet-based services, IM faces a number of complicated security issues and IM users are always at risk of falling prey to attacks. In this lesson, Michael Cobb offers an overview of the IM security landscape, an update on the latest attacks and some quick tips for safer IM use.



Countermeasures for malicious email code
Instructor: Tom Bowers, CISSP, PMP and a Certified Ethical Hacker
Today's malware continues to raise the security stakes. Enterprises are now facing numerous evolving threats like targeted and blended attacks, zero-day exploits, botnets and phishing schemes. The attacks aren't the only things evolving; so are today's product sets. In this lesson, attendees will get an overview of the email threat landscape, tips for malware protection success and guidance on the future of email attacks.



Lee Benjamin
Securing Microsoft Exchange
Instructor: Lee Benjamin, Microsoft MVP, ExchangeGuy Consulting
Exchange Server is arguably the most widely used enterprise messaging system in the market today. What's more, Microsoft is planning for a major revamp pf the product in 2007. This lesson will explain how to protect your Exchange 2003 environment today from spam, malware and Web-based attacks, and what to anticipate from the new features coming in Exchange Server 2007.

Security School
Final exam
After you've completed all the lessons in SearchSecurity.com's Messaging Security School, take this final exam to assess your knowledge of identity and access management based on what you've learned in this school.

-->

This was first published in October 2006

Dig deeper on Email Security Guidelines, Encryption and Appliances

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close