A little bit more of that self-promotion... ---------- Forwarded message ---------- Date: Wed, 19 Dec 2001 17:10:36 -0800 (PST) From: enotifyat_private To: tbird@precision-guesswork.com Subject: Take a USENIX tutorial ONLINE (56930) USENIX is pleased to announce the second installment in our online tutorial pilot program. Now you can take our popular and highly regarded full-day tutorials LIVE from your work or home. Using state-of-the-art Virtual Classroom techniques, these tutorials allow you to ask the presenter questions and interact with your fellow class members much as you would if you were sitting in a real classroom. Our first offering of online tutorials sold out within hours of making this announcement, so we urge you to register immediately. For your convenience, we have included brief descriptions of the four courses that will be offered. Each course is designed to last two hours a week for three successive weeks. For detailed course descriptions, instructor bios and to register, please visit: http://www.usenix.org/events/elearning/ ------------------------ Advanced Solaris System Administration Topics Taught by Peter Baer Galvin January 16, 23, 30 11am Eastern/8am Pacific Peter's highly regarded tutorial discusses the major new features of recent Solaris releases, including which to use (and how) and which to avoid. This in-depth course will provide the information you need to run a Solaris installation effectively. ------------------------ Network Security Profiles: A Collection (Hodgepodge) of Stuff Hackers Know About You Taught by Brad Johnson January, 14, 24, 28 11am Eastern/8am Pacific A hit on our first online series, this course reviews the ways crackers (i.e., hackers or determined intruders) learn things about your site (your profile), what protocols and tools they use, and a number of current methods and exploits that you should be aware of. The course will focus primarily on the common TCP/IP-based protocols, such as WWW, SSL, DNS, ICMP, and SNMP, which underlie virtually all Internet applications. This course concentrates on examples drawn from public-domain tools that are widely available and commonly used by crackers. ------------------------ Finding the Forest From The Trees: What System Logs tell you about Your Network Security Taught By TINA BIRD, Counterpane Internet Security January 15, 22, 29 2pm Eastern/11am Pacific Tina's course illustrates the importance of a network-wide centralized logging infrastructure, to introduce several approaches to monitoring audit logs, and to explain the types of information and forensics that can be obtained with well-managed logging systems. Every device on your network--routers, servers, firewalls, and application software--spits out millions of lines of audit information each day. Hidden within the data that indicates normal day-to-day operation (and known problems) are the first clues that an attacker is starting to probe and penetrate your network. If you can sift through the audit data and find those clues, you can learn a lot about your present state of security and maybe even catch attackers in the act. ------------------------ System and Network Performance Tuning TAUGHT BY Marc Staveley January 30, February 6 and 13 2pm Eastern/11am Pacific This course explores techniques for tuning systems, networks, and application code. Starting from a single-system view, we'll examine how the virtual memory system, the I/O system, and the file system can be measured and optimized. This course also explores Network File System tuning and performance strategies. Detailed treatment of network performance problems will lead to examples of network capacity planning. ************************************************************** If you do NOT want to receive email announcements about USENIX Association activities, please reply to this message, and you will not receive future email notices. ************************************************************** --------------------------------------------------------------------- To unsubscribe, e-mail: loganalysis-unsubscribeat_private For additional commands, e-mail: loganalysis-helpat_private
This archive was generated by hypermail 2b30 : Thu Dec 20 2001 - 09:42:27 PST