E-mail Security School Lesson 1: E-mail Security Essentials

In Lesson 1 of E-mail Security School, guest instructor Joel Snyder teaches you standards-based ways to increase the security of SMTP-based e-mail, as well as the architecture for identifying and defining e-mail security threats from the IP layer through SMTP, MIME and up to the content layer.

   Webcast: E-mail security: Taming the beast, part one -- The essentials
   Technical paper: Filling SMTP gaps -- The secrets to using e-mail standards
   Quiz: Do you have a firm e-mail security foundation?
   About the Instructor
   Discussion Forum

E-mail Security School Home

Lesson 1: E-mail security essentials

Lesson 2: Threats and mitigation strategies

Lesson 3: E-mail policy control

Discussion Forum


Webcast: E-mail security: Taming the beast, part one -- The essentials

Guest instructor Joel Snyder lays the groundwork for creating a holistic e-mail security strategy, including an explanation of how SMTP works, and a methodology for dissecting and understanding e-mail security. This webcast is available on-demand. Participants who register with a valid e-mail address and attend all three course webcasts will receive a certificate of completion from In addition, through our agreement with (ISC)⊃2;, all CISSPs and SSCPs who attend this webcast can earn 1 CPE credit.


Find out how you can earn CPE credits


Technical paper: Filling SMTP gaps -- The secrets to using e-mail standards

Learn how to add encryption to the SMTP protocol, as well as how to add data integrity, sender authentication and encryption to e-mail messages -- all using standards that have been available since 1999.



Quiz: Do you have a firm e-mail security foundation?

The final part of this lesson is the quiz to assess your knowledge of e-mail security essentials. In order to successfully pass the quiz, you need to attend the webcast and read the technical paper.



About the Instructor
Joel Snyder is a senior partner with Opus One, a consulting firm in Tucson, Ariz. He sent his first network e-mail in 1980, and has been designing and implementing enterprise e-mail systems ever since. He is partially to blame for the X.400 messaging standards and has been trying to atone for them ever since.

Security School Discussion Forum

Round out your Security School experience by interacting with our guest instructor Joel Snyder and your peers. The Security School Discussion Forum is an online community where you can find answers, share strategies and give advice.

Check out some of the latest postings:

The pros and cons of dropping attachments
Why isn't dropping certain attachments (pif, scr, etc.) a good practice? I think it's safe to say that most companies have no use for these files. I agree that dropping them is not the ONLY solution, but for many file types, it is a good practice. >>1 new reply

The value of using multiple AV engines
What is the value of using multiple antivirus engines on the SMTP or Exchange front ends? Is this a recommended practice rather than relying on a product with a single engine at the edge? >>1 new reply

Encrypting Outlook/Exchange e-mail
Does standard Outlook/Exchange e-mail going out over the Internet get encrypted, or do we need to do something to make that happen? Is the default S/MIME a type of encryption? >>1 new reply

Email Alerts

Register now to receive IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

COMMENTS powered by Disqus  //  Commenting policy