Guys,

Brainbench is running a contest, and as a result, all of their tests are free 
for 2 weeks. Not Cisco nor CompTIA, but useful nonetheless.

http://www.brainbench.com/

-- 


Joey Kelly
< Minister of the Gospel | Linux Consultant >
http://joeykelly.net
GPG key fingerprint = 8F11 D859 81A6 DE8C 5429  4A07 7146 1AFD 5C41 161E


"I may have invented it, but Bill made it famous."
 --- David Bradley, the IBM employee that invented CTRL-ALT-DEL
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : /pipermail/general_brlug.net/attachments/20050321/9416e7cb/attachment.bin
From [EMAIL PROTECTED]  Mon Mar 21 19:32:51 2005
From: [EMAIL PROTECTED] (Joey Kelly)
Date: Mon Mar 21 19:28:58 2005
Subject: [brlug-general] need feedback on security talk outline
Message-ID: <[EMAIL PROTECTED]>

Guys,

Here is an outline for a security talk I gave a few years ago. I am trying to 
update it for content, correctness, etc., and would appreciate any and all 
feedback. I know it needs a little work, but "given enough eyes, all bugs are 
shallow". Don't worry, you won't hurt my feelings.

Thanks.

http://joeykelly.net/rants/securitytalk.txt
-- 


Joey Kelly
< Minister of the Gospel | Linux Consultant >
http://joeykelly.net
GPG key fingerprint = 8F11 D859 81A6 DE8C 5429  4A07 7146 1AFD 5C41 161E


"I may have invented it, but Bill made it famous."
 --- David Bradley, the IBM employee that invented CTRL-ALT-DEL
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : /pipermail/general_brlug.net/attachments/20050321/80fd3708/attachment.bin
From [EMAIL PROTECTED]  Mon Mar 21 20:12:54 2005
From: [EMAIL PROTECTED] (-ray)
Date: Mon Mar 21 20:12:18 2005
Subject: [brlug-general] need feedback on security talk outline
In-Reply-To: <[EMAIL PROTECTED]>
References: <[EMAIL PROTECTED]>
Message-ID: <[EMAIL PROTECTED]>


> Here is an outline for a security talk I gave a few years ago. I am 
> trying to update it for content, correctness, etc., and would appreciate 
> any and all feedback. I know it needs a little work, but "given enough 
> eyes, all bugs are shallow". Don't worry, you won't hurt my feelings.

One big omission I see is Social Engineering.  It's the easiest way to 
hack, and the most overlooked aspect of security (i like talking about 
Social Engineering).

Some other topics you may want to mention.  These may be included in the 
topics you have already:

Virii, Worms, DDoS (botnets), Spam, Spyware
Data Theft, e-Terrorists, Data Destruction
Natural disasters - Disaster Recovery/Business Continuity
Intrusion prevention (as well as detection)
User training
Security costs/ROI

Those topics came from a talk i gave to some MBAs on the managerial 
aspects of security.  There was also a section on how to think like a 
hacker.  If you want i can send it, it's .ppt but i created it in 
OpenOffice.

ray
-- 
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Ray DeJean                                       http://www.r-a-y.org
Systems Engineer                    Southeastern Louisiana University
IBM Certified Specialist              AIX Administration, AIX Support
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Reply via email to