>             Day 1 - Comparing the commands between Microsoft and Linux,
>             3 way Handshake, Portnumbers, NetBIOS over TCP/IP
>             Day 2 - Advanced TCP/IP: Ping Sweep, Portscans, IP Spoofing,
>             Promiscuous Mode, Fingerprinting
>             Day 3 - Attacking Microsoft Operating Systems
>             Day 4 - Attacking Linux Operating Systems
>             Day 5 - Attacking WLAN

>             Day 1 - Sniffing Techniques
>             Day 2 - Security Analyzer, Firewalling with iptables
>             Day 3 - Intrusion Detection System
>             Day 4 - Building a Honeypot
>             Day 5 - Logfiles

Expensive. I'd rather buy books on the topic.
And with extra effort you can get detailed and authoritative
information from the internet too.



ed [!] http://i.keepsilent.net
Professor at the University of my Living Room Sofa
Senior Researcher of the Kitchen Refrigerator

--
Philippine Linux Users' Group (PLUG) Mailing List
[EMAIL PROTECTED] (#PLUG @ irc.free.net.ph)
Official Website: http://plug.linux.org.ph
Searchable Archives: http://marc.free.net.ph
.
To leave, go to http://lists.q-linux.com/mailman/listinfo/plug
.
Are you a Linux newbie? To join the newbie list, go to
http://lists.q-linux.com/mailman/listinfo/ph-linux-newbie

Reply via email to