Guys, Brainbench is running a contest, and as a result, all of their tests are free for 2 weeks. Not Cisco nor CompTIA, but useful nonetheless.
http://www.brainbench.com/ -- Joey Kelly < Minister of the Gospel | Linux Consultant > http://joeykelly.net GPG key fingerprint = 8F11 D859 81A6 DE8C 5429 4A07 7146 1AFD 5C41 161E "I may have invented it, but Bill made it famous." --- David Bradley, the IBM employee that invented CTRL-ALT-DEL -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: not available Url : /pipermail/general_brlug.net/attachments/20050321/9416e7cb/attachment.bin From [EMAIL PROTECTED] Mon Mar 21 19:32:51 2005 From: [EMAIL PROTECTED] (Joey Kelly) Date: Mon Mar 21 19:28:58 2005 Subject: [brlug-general] need feedback on security talk outline Message-ID: <[EMAIL PROTECTED]> Guys, Here is an outline for a security talk I gave a few years ago. I am trying to update it for content, correctness, etc., and would appreciate any and all feedback. I know it needs a little work, but "given enough eyes, all bugs are shallow". Don't worry, you won't hurt my feelings. Thanks. http://joeykelly.net/rants/securitytalk.txt -- Joey Kelly < Minister of the Gospel | Linux Consultant > http://joeykelly.net GPG key fingerprint = 8F11 D859 81A6 DE8C 5429 4A07 7146 1AFD 5C41 161E "I may have invented it, but Bill made it famous." --- David Bradley, the IBM employee that invented CTRL-ALT-DEL -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: not available Url : /pipermail/general_brlug.net/attachments/20050321/80fd3708/attachment.bin From [EMAIL PROTECTED] Mon Mar 21 20:12:54 2005 From: [EMAIL PROTECTED] (-ray) Date: Mon Mar 21 20:12:18 2005 Subject: [brlug-general] need feedback on security talk outline In-Reply-To: <[EMAIL PROTECTED]> References: <[EMAIL PROTECTED]> Message-ID: <[EMAIL PROTECTED]> > Here is an outline for a security talk I gave a few years ago. I am > trying to update it for content, correctness, etc., and would appreciate > any and all feedback. I know it needs a little work, but "given enough > eyes, all bugs are shallow". Don't worry, you won't hurt my feelings. One big omission I see is Social Engineering. It's the easiest way to hack, and the most overlooked aspect of security (i like talking about Social Engineering). Some other topics you may want to mention. These may be included in the topics you have already: Virii, Worms, DDoS (botnets), Spam, Spyware Data Theft, e-Terrorists, Data Destruction Natural disasters - Disaster Recovery/Business Continuity Intrusion prevention (as well as detection) User training Security costs/ROI Those topics came from a talk i gave to some MBAs on the managerial aspects of security. There was also a section on how to think like a hacker. If you want i can send it, it's .ppt but i created it in OpenOffice. ray -- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Ray DeJean http://www.r-a-y.org Systems Engineer Southeastern Louisiana University IBM Certified Specialist AIX Administration, AIX Support =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
