0
Securing Your NetworkTECH Class 4290/4390          Presented by:   Vince Ada & Jason Reverri
Sans Internet Storm Centerhttp://isc.sans.orgSans Reading Roomhttp://www.sans.org/reading_room/            Microsoft Malwa...
Photo CreditsSlide 2 http://www.flickr.com/photos/walkinline/Slide 3 http://www.flickr.com/photos/billyboysfotocolection/S...
NetVU Tech-4290/4390
NetVU Tech-4290/4390
NetVU Tech-4290/4390
NetVU Tech-4290/4390
NetVU Tech-4290/4390
NetVU Tech-4290/4390
NetVU Tech-4290/4390
NetVU Tech-4290/4390
NetVU Tech-4290/4390
NetVU Tech-4290/4390
NetVU Tech-4290/4390
NetVU Tech-4290/4390
NetVU Tech-4290/4390
NetVU Tech-4290/4390
NetVU Tech-4290/4390
Upcoming SlideShare
Loading in...5
×

NetVU Tech-4290/4390

587

Published on

NetVU National Conference 2011

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
587
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "NetVU Tech-4290/4390"

  1. 1. Securing Your NetworkTECH Class 4290/4390 Presented by: Vince Ada & Jason Reverri
  2. 2. Sans Internet Storm Centerhttp://isc.sans.orgSans Reading Roomhttp://www.sans.org/reading_room/ Microsoft Malware Protection Center http://blogs.technet.com/b/mmpc/Darknethttp://www.darknet.org.uk/ Packetlife http://packetlife.net/blog/SecLists.org Security Mailing List Archivehttp://www.seclists.org PaulDotCom http://www.pauldotcom.com/Schneier on Securityhttp://www.schneier.com/ Paul de Souza http://paulcsfi.wordpress.com/2600 updateshttp://www.2600.com/rss.xml SecurityTube http://www.securitytube.netCommandLine Kung FUhttp://blog.commandlinekungfu.com Offensive Security http://www.offensive-security.comGoogle Online Security Bloghttp://googleonlinesecurity.blogspot.com Metasploit Unleashed http://www.offensive-security.com/metasploit-Irongeek unleashed/Metasploit_Unleashed_Information_Security_Traininghttp://www.irongeek.com Metasploit 101Jeremiah Grossman (Whitehat Security) http://www.securitytube.net/video/786http://jeremiahgrossman.blogspot.com BackTrack LinuxBrian Krebs http://www.backtrack-linux.org/http://krebsonsecurity.com Great video presentation by Dave Marcus on social networks socialSC Magazine engineering:http://www.scmagazineus.com http://www.irongeek.com/i.php?page=videos/dojocon-2010- videos#Using%20Social%20Networks%20To%20Profile,%20FindMcAfee Labs %20and%200wn%20Your%20Victimshttp://blogs.mcafee.com/mcafee-labs
  3. 3. Photo CreditsSlide 2 http://www.flickr.com/photos/walkinline/Slide 3 http://www.flickr.com/photos/billyboysfotocolection/Slide 5 http://www.flickr.com/photos/christianpayne/Slide 8 http://www.flickr.com/photos/sprengben/Slide 10 http://www.flickr.com/photos/giantginkgo/Slide 11 http://www.flickr.com/photos/ignacio_conejo/Slide 12 http://www.flickr.com/photos/home_of_chaos/Slide 13 http://www.flickr.com/photos/sklathillSlide 14 http://www.flickr.com/photos/donsolo/Slide 15 http://www.flickr.com/photos/mr_beaver/Slide 16 http://www.flickr.com/photos/schmiegl/Slide 17 http://www.flickr.com/photos/60295308@N00Photos used under Creative Commons license
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×