----------  Forwarded Message  ----------

Subject: [logs] Take a USENIX tutorial ONLINE (56930) (fwd)
Date: Thu, 20 Dec 2001 09:55:32 -0600 (CST)
From: Tina Bird <[EMAIL PROTECTED]>
To: Log Analysis Mailing List <[EMAIL PROTECTED]>

A little bit more of that self-promotion...

---------- Forwarded message ----------
Date: Wed, 19 Dec 2001 17:10:36 -0800 (PST)
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Take a USENIX tutorial ONLINE (56930)

USENIX is pleased to announce the second installment in our
online tutorial pilot program.  Now you can take our popular and
highly regarded full-day tutorials LIVE from your work or home.

Using state-of-the-art Virtual Classroom techniques, these tutorials
allow you to ask the presenter questions and interact with your
fellow class members much as you would if you were sitting in a
real classroom.

Our first offering of online tutorials sold out within hours of making
this announcement, so we urge you to register immediately. For your
convenience, we have included brief descriptions of the four courses
that will be offered. Each course is designed to last two hours a week
for three successive weeks.

For detailed course descriptions, instructor bios and to register,
please visit:
http://www.usenix.org/events/elearning/

------------------------

Advanced Solaris System Administration Topics
Taught by Peter Baer Galvin
January 16, 23, 30
11am Eastern/8am Pacific

Peter's highly regarded tutorial discusses the major new features
of recent Solaris releases, including which to use (and how) and
which to avoid. This in-depth course will provide the information
you need to run a Solaris installation effectively.

------------------------

Network Security Profiles: A Collection (Hodgepodge) of Stuff
Hackers Know About You
Taught by Brad Johnson
January, 14, 24, 28
11am Eastern/8am Pacific

A hit on our first online series, this course reviews the ways
crackers (i.e., hackers or determined intruders) learn things about
your site (your profile), what protocols and tools they use, and a
number of current methods and exploits that you should be aware of.
The course will focus primarily on the common TCP/IP-based
protocols, such as WWW, SSL, DNS, ICMP, and SNMP, which underlie
virtually all Internet applications.  This course concentrates on
examples drawn from public-domain tools that are widely available
and commonly used by crackers.

------------------------

Finding the Forest From The Trees: What System Logs tell you about
Your Network Security
Taught By TINA BIRD, Counterpane Internet Security
January 15, 22, 29
2pm Eastern/11am Pacific

Tina's course illustrates the importance of a network-wide
centralized logging infrastructure, to introduce several approaches to
monitoring audit logs, and to explain the types of information and
forensics that can be obtained with well-managed logging systems.
Every device on your network--routers, servers, firewalls, and application
software--spits out millions of lines of audit information each day. Hidden
within the data that indicates normal day-to-day operation (and known
problems) are the first clues that an attacker is starting to probe and
penetrate your network. If you can sift through the audit data and find
those clues, you can learn a lot about your present state of security and
maybe even catch attackers in the act.

------------------------

System and Network Performance Tuning
TAUGHT BY Marc Staveley
January 30, February 6 and 13
2pm Eastern/11am Pacific

This course explores techniques for tuning systems, networks, and
application code. Starting from a single-system view, we'll examine
how the virtual memory system, the I/O system, and the file system
can be measured and optimized.  This course also explores Network
File System tuning and performance strategies. Detailed treatment
of network performance problems will lead to examples of network
capacity planning.


**************************************************************
If you do NOT want to receive email announcements about USENIX
Association activities, please reply to this message, and you will
not receive future email notices.
**************************************************************


---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

-------------------------------------------------------

-- 
Douglas J Hunley (doug at hunley.homeip.net) - Linux User #174778
Admin: http://linux.nf  Admin: http://hunley.homeip.net

printk(KERN_ERR "msp3400: chip reset failed, penguin on i2c bus?\n");
        2.2.16 /usr/src/linux/drivers/char/msp3400.c
_______________________________________________
Linux-users mailing list
Archives, Digests, etc at http://linux.nf/mailman/listinfo/linux-users

Reply via email to