System Administrator

Released in April 1999, "System Administrator Incident Preparation & Response for Windows NT," Version 1.1, is a more technical look at the security threats facing the average government network.

More important, the CD takes the user step-by-step through the process of configuring a network for security and how to identify intrusions, collect information on incidents and how to coordinate with local and DOD Computer Emergency Response Teams.

The types of computer crimes outlined in this CD are of a more technical nature, running the gamut from viruses to Trojan horses, worms and denial-of-service attacks. The CD walks the user through each type of attack and then gives detailed examples of the most common techniques used by hackers to carry out the attacks.

Possibly the most important lesson of the course, however, comes during the Notification Process module. The segments teach systems administrators how best to respond to intrusions and hacks and how to ensure that their actions will not hinder any future investigation by senior- level federal law enforcement agencies.

Back to the main story: DOD uses video, CD-ROMs to teach security


Magnificent Discretion

This four-part video takes a light-hearted look at some common-senseprecautions that all information workers should take during the course oftheir daily routines.

Auditors and Evaluators

The CD offersan interactive, multimedia tour of the basics of information assurance andcomputer crime.

Main story:

DOD uses video, CD-ROMs to teach security

For more information,visit the DISA Infosec World Wide Web site at or DOD'sAdvanced Distributed Learning Network at

BY Dan Verton
Mar. 27, 2000

More Related Links


  • Defense
    The Pentagon (Photo by Ivan Cholakov / Shutterstock)

    DOD CIO hits pause on JEDI cloud acquisition

    Dana Deasy set cloud as his office's top priority. But when it comes to the JEDI request for proposal, he's directed staff to "pause" to compile a comprehensive review.

  • Cybersecurity
    By Gorodenkoff shutterstock ID 761940757

    Waging cyber war without a rulebook

    As the U.S. looks to go on the offense in the cyber domain, critical questions remain unanswered around who will take the lead and how clearly to draw the rules of engagement.

  • Government Innovation Awards
    Government Innovation Awards -

    Deadline extended for Rising Star nominations

    You now have until July 18 to help us identify the early-career innovators and change agents in government IT.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.