Security Basics mailing list archives
RE: learning ethical hacking
From: "Louie" <tech.louie () verizon net>
Date: Thu, 9 Sep 2004 08:45:08 -0700
Hey well any info on this topic with book or does anyone have any pdf files or something to start with? -----Original Message----- From: karora () opsource net [mailto:karora () opsource net] Sent: Wednesday, September 08, 2004 9:21 PM To: D K Cc: tech.louie () verizon net; linux user; security-basics () securityfocus com Subject: Re: learning ethical hacking Could you suggest a few books, Websites...?? It'll be great help Thanks Kapil
Get your hands on hacking exposed books u should be able to do well with that. Or if you can take some of the foundstone ultimate hacking courses they will give u a good insight. On Sat, 4 Sep 2004 08:20:15 -0700, Louie <tech.louie () verizon net> wrote:Did you ever find the site you were looking for? I'm also thinking about security but most people tell me to learn how to hack first then get into security... Louie -----Original Message----- From: linux user [mailto:linuxteam () gmail com] Sent: Tuesday, August 31, 2004 1:14 AM To: security-basics () securityfocus com Subject: learning ethical hacking Hi All, Could you please let me know where should i start learning about network, and web security, I have been using linux mainly for several years, windows for a couple of years, and solaris from time to time, I would like to consolidate my knoweldge regarding the above operatings system through a deep exopsure to security. i am thinking of books, mailing lists, and training courses, i also stumbled once on a hacker group that would let you joing if you solve
a puzzle, some kind of message encryption, but i do not remmber the site any more, the main objective is secure a career in network security. TIA ant ant --------------------------------------------------------------------- --- --- Computer Forensics Training at the InfoSec Institute. All of our
class
sizes are guaranteed to be 12 students or less to facilitate
one-on-one
interaction with one of our expert instructors. Gain the in-demand skills of a certified computer examiner, learn to recover trace data left behind by fraud, theft, and cybercrime perpetrators. Discover
the
source of computer crime and abuse so that it never happens again. http://www.infosecinstitute.com/courses/computer_forensics_training.h tml
------------------------------------------------------------------------
---- --------------------------------------------------------------------- ------ Computer Forensics Training at the InfoSec Institute. All of our
class
sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand skills of a certified computer examiner, learn to recover trace data left
behind
by fraud, theft, and cybercrime perpetrators. Discover the source of computer crime and abuse so that it never happens again. http://www.infosecinstitute.com/courses/computer_forensics_training.h tml
------------------------------------------------------------------------ ----
---------------------------------------------------------------------- ----- Computer Forensics Training at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand
skills
of a certified computer examiner, learn to recover trace data left behind
by
fraud, theft, and cybercrime perpetrators. Discover the source of
computer
crime and abuse so that it never happens again. http://www.infosecinstitute.com/courses/computer_forensics_training.ht ml
------------------------------------------------------------------------ ----
--------------------------------------------------------------------------- Computer Forensics Training at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand skills of a certified computer examiner, learn to recover trace data left behind by fraud, theft, and cybercrime perpetrators. Discover the source of computer crime and abuse so that it never happens again. http://www.infosecinstitute.com/courses/computer_forensics_training.html ----------------------------------------------------------------------------
Current thread:
- Re: Fwd: learning ethical hacking, (continued)
- Re: Fwd: learning ethical hacking Suramya Tomar (Sep 12)
- Re[2]: learning ethical hacking Jeffrey S. Sims (Sep 10)
- Re: Re[2]: learning ethical hacking Über GuidoZ (Sep 13)
- RE: learning ethical hacking Hugo Deckx (Sep 09)
- Re: learning ethical hacking Bartek Krajnik (Sep 16)
- Re: learning ethical hacking Dr. S. A. Vetha Manickam (Sep 17)
- Re: learning ethical hacking [courses] Andy Cuff (Sep 20)
- Re: learning ethical hacking GuidoZ (Sep 21)
- Re: learning ethical hacking David King (Sep 30)
- Re: learning ethical hacking David King (Sep 30)
- RE: learning ethical hacking Louie (Sep 13)
- Re: learning ethical hacking Ryan Salner (Sep 13)
- RE: learning ethical hacking Nick Falcon (Sep 13)
- RE: learning ethical hacking Clement Dupuis (Sep 15)
- Re: learning ethical hacking Mike (Sep 15)
- RE: learning ethical hacking Louie (Sep 16)
- Re: learning ethical hacking GuidoZ (Sep 16)
- Re: learning ethical hacking Kluge (Sep 16)
- Re: learning ethical hacking Shawn Duffy (Sep 16)
- RE: learning ethical hacking David Gillett (Sep 15)
- RE: learning ethical hacking Jonathan Loh (Sep 16)