Midwest Data Recovery
Company Profile  Services  Online Evaluation  Shipping Instructions  Contact Us
 Midwest Data Recovery
24 HR Emergency Service
Data Recovery Profile
Data Recovery Mission
International Coverage
North America Coverage
US Coverage
Data Recovery News
Data Recovery Articles
Seminars & Events
Data Recovery News
Shipping Information
Contact Us
Data Recovery Home

Columbus Disaster Recovery & Business Development Seminars and Recommended Events

Midwest Data Recovery provides information on seminars, meetings and other educational events throughout the Midwest. This is an information service to help you find interesting computer, data security, disaster recovery and data recovery education related events in your area. This service is selective and does NOT cover all computer, data security, disaster recovery and data recovery related events that are taking place throughout the Midwest. Also, events are often cancelled or changed in some way, so please make sure to call and confirm before attending any of the events or meetings listed here. Also, you may want to inquire on any costs involved. As part of this service, Midwest Data Recovery welcomes any suggestions you have. Please let us know of any event that you think would be of interest to others. Simply, email us at [email protected]@seniorsmedsource.com

Columbus, Ohio

Business Intelligence Seminar (Crystal & BO)

Dates: Wednesday, August 04, 2004 through Wednesday, August 04, 2004
Times: 9:00AM - Noon
Contact: ()
Location: TBA

Description: Join us for the August Business Intelligence Seminar. This event is free and will have all new content. The focus this quarter is "Leverage Enterprise Reporting" and will include a variety of topics to help Crystal Reports and Crystal Enterprise users get the most out of the leading Enterprise Reporting platform. Specific topics will include:
  • Business Views In Depth & the New CE Repository - Learn about the CE Semantic layer and how you can simplify and standardize data sourcing for report designers, on-demand viewing, report instance viewing and report exploration. See "view time security" in action and learn how to share report objects like text boxes, formula functions and graphics across reports on a secure basis.
  • Learn how to Leverage Crystal Enterprise Architecture with .Net. See examples of .Net applications accessing, managing and delivering Crystal Enterprise features and objects.
  • Creative SQL Commands in Crystal Reports - Find out how you leverage SQL Commands in Crystal Reports to solve complex data problems without resorting to sub-reports, stored procedures or ETL.
  • Ad Hoc Query & Analysis - Don't miss this overview of the Business Object's Web Intelligence Ad Hoc Query & Analysis solution. This state of the art solution offers outstanding Web based self serve access to relational data with an analytical twist. Rated among the best ad hoc tools in the industry.
  • Business Objects/Crystal Product Roadmap update - Get the latest on the product evolution, find out what's coming up in version 11 (just 2 quarters away), Learn about next year's release and the integration of Crystal and Business Objects.
  • Crystal Certification and Education Roadmap update - Find out about the requirements and benefits of Crystal Certification and updates to new training classes that will be offered soon.
As always certified instructors and consultants will be on-hand to answer your questions Advanced Registration is Required. Limited Seating. Call 614-318-1300 to reserve your seat. A Result Data event.

Columbus, Ohio

Title: Data Management Seminar
Dates: Wednesday, November 03, 2004 through Wednesday, November 03, 2004
Times: 9:00AM - 5:00PM
Contact: ()
Location:TBA

Description: Join us to see the latest advancements in Data Modeling, Database Design and Data Warehousing technologies. This seminar series is free and includes presentations from industry experts, certified instructors and consultants. Call us or check back at this Web site for the updated agenda.

For more information or to register call us at 614-318-1300

Columbus, Ohio
Title: Data Modeling Concepts & DB Design
Dates: Tuesday, August 24, 2004 through Tuesday, August 24, 2004
Times: 9:00AM - 5:00PM
Contact: Sue Roberts ([email protected])
Location: Result Data Training Room 1
Result Data Headquarters
6185 Huntley Road. Suite Q
Columbus, OH 43229

Description: 1 Day class - Instructor led, manual activities
$425 per person

This one day course covers the most important aspects of data modeling and database design. It is structured to provide a comprehensive review of data modeling concepts as well as the most important topics regarding relational database design. It includes a thorough review of the "rules of normalization" and includes important modeling background information including a brief review of various modeling notations. It also covers naming conventions and provides relevant review and examples of naming standards issues and best practices. It concludes with a basic review data warehousing concepts and dimensional data modeling.

Audience: Individuals interested in learning about database design, data modeling concepts and methodologies. This includes, but is not limited to, database administrators, prorammers, business analysts, report designers, business intelligence specialists and data warehouseing personnel.

www.resultdata.com
tel: 614.318.1300


Columbus, Ohio

Title: Data Modeling with AllFusion ERwin
Dates: Wednesday, August 25, 2004 through Wednesday, August 25, 2004
Times: 9:00AM - 5:00PM
Contact: Sue Roberts ([email protected])
Location: Result Data Training Room 1
Result Data Headquarters
6185 Huntley Road. Suite Q
Columbus, OH 43229

Description: 1 Day class - Instructor led, computer activities
$425/per person

This one day course is designed for students interested in developing a solid understanding and basic skills related to data modeling with Computer Associates' AllFusion ERwin Data Modeler. The class begins with a short review of data modeling concepts then moves on to specifics concerning the use of the ERwin Data Modeler software. Topics include application layout, building the logical and physical data model, database management tasts, comparing models & databases and more. Students will work through a series of hands-on exercises to help demonstrate the concepts of data modeling and how they are addressed by the ERwin software. The course is taught by an experienced consultant with a backround in data modeling and substantial real world exposure.

Audience: Individuals interested in learning how to use the AllFusion ERwin Data Modeler. This includes, but is not limited to, database administrators, programmers, business analysts, report designers, business intelligence specialists and data warehousing personnel.

www.resultdata.com
tel: 614.318.1300


Columbus, Ohio

Title: Data Modeling Concepts & DB Design
Dates: Tuesday, September 21, 2004 through Tuesday, September 21, 2004
Times: 9:00AM - 5:00PM
Contact: Sue Roberts ([email protected])
Location: Result Data Training Room 2
Result Data Headquarters
6185 Huntley Road. Suite Q
Columbus, OH 43229

Description: 1 Day class - Instructor led, manual activities

$425 per person

This one day course covers the most important aspects of data modeling and database design. It is structured to provide a comprehensive review of data modeling concepts as well as the most important topics regarding relational database design. It includes a thorough review of the "rules of normalization" and includes important modeling background information including a brief review of various modeling notations. It also covers naming conventions and provides relevant review and examples of naming standards issues and best practices. It concludes with a basic review data warehousing concepts and dimensional data modeling.

Audience: Individuals interested in learning about database design, data modeling concepts and methodologies. This includes, but is not limited to, database administrators, prorammers, business analysts, report designers, business intelligence specialists and data warehouseing personnel.

www.resultdata.com
tel: 614.318.1300

Columbus, Ohio

Title: Data Modeling with AllFusion ERwin
Dates: Wednesday, September 22, 2004 through Wednesday, September 22, 2004
Times: 9:00AM - 5:00PM
Contact: Sue Roberts ([email protected])
Location: Result Data Training Room 2
Result Data Headquarters
6185 Huntley Road. Suite Q
Columbus, OH 43229


Description: 1 Day class - Instructor led, computer activities
$425/per person

This one day course is designed for students interested in developing a solid understanding and basic skills related to data modeling with Computer Associates' AllFusion ERwin Data Modeler. The class begins with a short review of data modeling concepts then moves on to specifics concerning the use of the ERwin Data Modeler software. Topics include application layout, building the logical and physical data model, database management tasts, comparing models & databases and more. Students will work through a series of hands-on exercises to help demonstrate the concepts of data modeling and how they are addressed by the ERwin software. The course is taught by an experienced consultant with a backround in data modeling and substantial real world exposure.

Audience: Individuals interested in learning how to use the AllFusion ERwin Data Modeler. This includes, but is not limited to, database administrators, programmers, business analysts, report designers, business intelligence specialists and data warehousing personnel.

www.resultdata.com
tel: 614.318.1300


Columbus, Ohio
July 26 - 30, 2004


PC Techs, Network Administrators, Help Desk Personnel
Cost: $2295
Seminar Summary:
This hands-on class introduces students to computer hardware, PC operating system software, and networking technologies. Participants will dismantle and completely reassemble a PC, giving them the ability to confidently upgrade, troubleshoot and repair any hardware problem. (see full course description)

Training Course Syllabus:

Description: This hands-on class introduces students to computer hardware, PC operating system software, and networking technologies. Participants will dismantle and completely reassemble a PC, giving them the ability to confidently upgrade, troubleshoot and repair any hardware problem. Attendees will be given the opportunity to partition and format hard drives as well as install and upgrade various operating systems. Students will also learn how to set up and maintain a network, including layout, cabling, devices and protocols, and will learn to use troubleshooting utilities and techniques necessary in production environments today. Upon completion students will also be well prepared to pass the CompTIA A+ and Net+ certification exams.

Prerequisites: Students should have a working knowledge of the Windows operating system

CALL 800 ) 349-1935


Columbus, Ohio
July 26 - 30, 2004

For: Network Administrators, Internet Security Administrators
Cost: $2295

Seminar Summary: Today's companies need certified security professionals to protect and maintain their vital information. Security Administration is a five day course that builds an understanding of hacking, authentication, encryption, prevention and deterrence, viruses, worms, "Denial of Service" attacks, auditing, and scanning. (see full course description)

Training Course Syllabus:

Description: Today's companies need certified security professionals to protect and maintain their vital information. Security Administration is a five day course that builds an understanding of hacking, authentication, encryption, prevention and deterrence, viruses, worms, "Denial of Service" attacks, auditing, and scanning. Students learn to establish solid security policies, implement Intrusion Detection Systems, determine security threats, build deterrence and prevention systems, and audit their network for potential threats.

Prerequisites: Knowledge of fundamental system administration procedures on UNIX, Linux, mainframe, or Microsoft Windows operating systems. Knowledge of internetworking fundamentals including IP addressing and subnets.

Follow up course: Advanced Computer Security Administration

Overview of Topics Covered:

Security Basics
  • Why We Need Security
  • Hacker Motivations
  • How to Protect Network Resources
  • Security Services
  • Increasing Latency Through Security Mechanisms
  • Security Policies and Access Control
  • Risk Factors for Data Security
  • Authentication Policy and Procedures
  • Maintaining Data Integrity and Confidentiality
  • Security Components
  • Identifying and Implementing Security Policies
  • Understanding Audit Trails
  • Security-Related Organizations, Warning Services, and Certifications
  • Security Architectures
  • How to Use Firewalls, Intrusion Detection Systems (IDS), and Scanning Options
  • Enhanced Logging and Auditing
    Encryption Techniques
  • Encryption and Internetworking
  • Encryption in Enterprise Networks
  • Understanding Trust Relationships
  • Symmetric Key Encryption
  • Public Key Encryption
  • One-Way Encryption
  • Data Encryption Standard
  • Working with Digital Certificates
  • SSL Encryption and Web Servers
  • Use Pretty Good Privacy (PGP) to Sign a Document
  • Deploying S/MIME
  • Public Key Infrastructure (PKI) vs Certificate Authority (CA)
  • Encryption Protocols and System Performance TCP/IP Security
  • TCP/IP Security Issues
  • Authenticating TCP/IP
  • TCP/IP Stack Elements and Security Challenges
  • IP, UDP, and TCP Header Security
  • The TCP/IP Stack and Operating System Functionality
  • Routing Issues and Security
  • IPv6 Features and Security
    Intrusions And Threats
  • Intrusion Threats
  • Scanning Attacks
  • Detecting a NIC in "Promiscuous Mode"
  • Sniffing Attacks, Including Sniffing E-Mail, Telnet, NFS, NIS, And Web Traffic
  • E-Mail Bombing
  • Scanning and Cracking a Share
  • System Bug-Based Attacks
  • Causes and Results of a Denial of Service (DOS) Attacks
  • Defining and Conducting Buffer Overflow Attacks
  • How to Protect Your Operating Systems, Routers, and Equipment Against Physical Attacks
  • Brute Force Attack
  • Dictionary Attack
  • Social Engineering
  • Understanding Key Logging
  • Identifying Trojans
  • Describe the Effects of a Worm
  • Three Virus Types (Boot Sector, Macro, File Attaching)
  • IP Spoofing
  • Perimeter Security
  • Concepts of Perimeter Security
  • Proxy-Server-Level Firewall Security
  • Microsoft Proxy Server
  • Firewall Implementations
  • Features of a Packet Filtering Firewall
  • Features of a Proxy-Based Firewall
  • Understand Service Redirection, Service Passing, and Gateway Daemons
  • Application-Level Gateways
  • Circuit-Level Gateways
  • Fundamental Firewall Topology
  • Proxy Services and Data Confidentiality
  • Proxy Caching in Regards to Performance
  • The Importance of Securing Routers
  • Securing Routers and Router Security
    Detecting Intruders
  • Ways to Detect and Distract Internal Hackers
  • IDS Rules
  • Intrusion Detection Issues in Hub-Based and Switched Networks
  • Host-Based (i.e., Log-Based) Intrusion Detection
  • Implementing Host-Based Intrusion Detection
  • Implementing Network-Based Intrusion Detection
  • Distracting Hackers Once You Have Detected them Auditing
  • Specific Operating System Areas to Audit
  • Specific Network Elements to Audit
  • Specific Ways to Audit a System
    Incident Response
  • Define Incident Response
  • General Steps to Take When Responding to an Incident
  • The Importance of a Well-Defined Security Policy in Regards to Incident Response
  • Appropriate Authorities to Contact Regarding Theft of Data and Assorted Attacks
  • Specific NT And UNIX Security Issues
  • The NT and UNIX Login Process Particular Operating System Areas That Hackers Target
  • Accounts Database Storage Procedures Account And Permissions
  • Key Administrative Accounts, and the Commands Used to Obtain Them
  • Effective Operating System Policies
  • Adding and Removing Users in Windows NT and UNIX
  • User-Level Security Measures in Windows NT and UNIX
  • Group-Level Security Measures in Windows NT and UNIX
  • Rights Versus Permissions
  • Password Aging in Windows NT and UNIX
  • Restricting Users According to Groups
  • Understand How to Establish Profiles to Ensure User Security
  • Restrict User Access Based on Time
  • Renaming and Removing Groups in Windows NT
  • Controlling the Ability for Users to Upgrade Permissions on a Process-Specific Basis Using Groups and/or Scripts
    Services And Shares
  • Locking Down Services for More Effective Security
  • Operating System Add-ons
  • Disabling and Removing Unnecessary Services
  • Controlling Specific Services, Including FTP, Telnet, and HTTP
  • Scanning and Protecting Shares
  • Identifying Specific Operating System Attacks Tools
  • Understanding Keyloggers
  • Using Cracking Programs Such as "John The Ripper" and "L0phtcrack"
  • Securing Local and Roaming User Profiles
  • How to Deploy Port Blocking and Monitoring
  • Specific Attacks on UNIX
  • Issues Regarding NFS, NIS, and the Rlogin Programs
  • Modifying the Windows NT Registry for Security
  • Denying Interactive Login on UNIX and NT Systems
  • How Tcpwrapper Functions
  • Deploying and Configuring Md5
  • Configuring COPS
  • Utilizing a Host Scanner
    Logging And Analysis
  • Understanding Host-Scanning Logs and View Results
  • Applying System Patches and Hot Fixes
  • Conducting Detailed Log Analysis
  • Logging Daemons for NT, UNIX and Novell, as well as Cisco IOS
  • Log Analysis Tools
  • Check System Logs and Identify Specific Threats
  • Checksum Analysis
  • Understanding the Auditing Process
  • Practicality in Auditing
  • Risk Management Practices
    Physical Security Measures
    • Analyzing Physical Security
    • Last Issues Regarding Router and Firewall Placement
    • Identifying Steps to Take to Secure a Web Server Operating System And Application Specifics
    • Implementing Network and Vulnerability Scanners
    • Local and Remote Promiscuous Mode Detection
    • Denying Service to Networks and System Hosts
    • Threats and Vulnerabilities
    • Analyzing Security Policies
    • Creating Effective Security Through Changing User Habits and the Security Policy Itself
    • Network and Vulnerability Scanners
    • Securing Apache Server in Linux
    • Securing Microsoft IIS Web Server
    • Configure Server and Daemon Logs
    • How to Conduct Auditing of Various Operating Systems
    • Ways to Check for Last Local and Remote Logon in UNIX
    • Configure Auditing in Windows NT
    • Conducting Network-Based Auditing
    • Installing and Configuring SSH as an Alternative to Telnet
    • Configure SSH Clients
    • Installation and Configuration of RAS and Microsoft VPN for Internet Communications
    CALL 800 ) 349-1935

    For more information about our disaster recovery or business continuity services, please contact Tosca Ragnini at 1-866-786-2595.

  • ------------------------------------------------------------------------------------------------------
    Data Recovery Services | RAID Services | Hard Drives | Tapes | Removables | Compact Flash |
    Online Evaluation | Data Recovery Articles | Disaster Recovery Articles |
    About Us | Contact Us | Midwest Data Recovery
    Links | Sitemap
    24 HR EMERGENCY

    11/21/17
    ------------------------------------------------------------------------------------------------------