Security Basics mailing list archives

Re: learning ethical hacking


From: "Wayne M Burke" <wburke () secureye com>
Date: Fri, 17 Sep 2004 19:20:41 +0100

I would rather recommend www.mile2.com

They have enhanced the class bringing it up to date.

Cheers,

Wayne
----- Original Message ----- From: "SecurityList" <securitylist () singaporesoma com>
To: "security basics" <security-basics () securityfocus com>
Sent: Thursday, September 16, 2004 1:09 AM
Subject: Re: learning ethical hacking


I just attended the CertifiedEthical Hacker course.
Very hands on, very practical and certainly very useful to my work.

However, not highly reviewd (I mean CEH is did not get too good reviews).
IMHO, it was very good!

You may want to attend the course (see www.eccouncil.org)
However, they want to verify your identity and intention for enrolling in
this course - for good reasons.

Soma
greatsoma () gmail com

----- Original Message -----
From: "Mike" <securitybasics () infinity77 net>
To: "security basics" <security-basics () securityfocus com>
Sent: Thursday, September 16, 2004 2:43 AM
Subject: Re: learning ethical hacking


While we're on the topic of learning ethical hacking. I thought I point
out
the "Hacking Revealed" series from LearnkKey. I haven't had time to check
it
out yet but plan on getting around to it soon. I have heard no reviews of
it
yet, if anyone has checked it out already I'd love to hear from you.

Mike

----- Original Message -----
From: "Eddie Adlfs" <tsmayhem () gmail com>
To: <tech.louie () verizon net>
Cc: <karora () opsource net>; "D K" <dwarkeeper () gmail com>; "linux user"
<linuxteam () gmail com>; <security-basics () securityfocus com>
Sent: Monday, September 13, 2004 6:38 AM
Subject: Re: learning ethical hacking


> If you really want to get into systems and try som real exploiting + a
> wad of tricky levels I'd like to suggest http:///www.dievo.org/ which
> once was wargames.unix.se
>
>
> On Thu, 9 Sep 2004 08:45:08 -0700, Louie <tech.louie () verizon net> > wrote:
> > Hey well any info on this topic with book or does anyone have any pdf
> > files or something to start with?
> >
> >
> > -----Original Message-----
> > From: karora () opsource net [mailto:karora () opsource net]
> > Sent: Wednesday, September 08, 2004 9:21 PM
> > To: D K
> > Cc: tech.louie () verizon net; linux user;
> > security-basics () securityfocus com
> > Subject: Re: learning ethical hacking
> >
> > Could you suggest a few books, Websites...??
> >
> > It'll be great help
> > Thanks
> > Kapil
> >
> >
> > > Get your hands on hacking exposed books u should be able to do well
> > > with that. Or if you can take some of the foundstone ultimate
hacking
> > > courses they will give u a good insight.
> > >
> > >
> > >
> > >
> > > On Sat, 4 Sep 2004 08:20:15 -0700, Louie <tech.louie () verizon net>
> > > wrote:
> > >> Did you ever find the site you were looking for? I'm also thinking
> > >> about security but most people tell me to learn how to hack first
> > >> then get into security...
> > >>
> > >> Louie
> > >>
> > >> -----Original Message-----
> > >> From: linux user [mailto:linuxteam () gmail com]
> > >> Sent: Tuesday, August 31, 2004 1:14 AM
> > >> To: security-basics () securityfocus com
> > >> Subject: learning ethical hacking
> > >>
> > >> Hi All,
> > >>
> > >> Could you please let me know where should i start learning about
> > >> network, and web security, I   have been using linux mainly for
> > >> several years, windows for a couple of years, and solaris from > > >> time
> > >> to time, I would like to consolidate  my knoweldge regarding the
> > >> above operatings system through a deep exopsure to security. i am
> > >> thinking of books, mailing lists, and training courses, i also
> > >> stumbled once on a hacker group that would let you joing if you
solve
> >
> > >> a puzzle, some kind of message encryption, but i do not remmber > > >> the
> > >> site any more, the main objective is secure a career in network
> > >> security.
> > >>
> > >> TIA
> > >>
> > >> ant ant
> > >>
> >
---------------------------------------------------------------------
> > >> ---
> > >> ---
> > >> Computer Forensics Training at the InfoSec Institute. All of our
> > class
> > >> sizes are guaranteed to be 12 students or less to facilitate
> > one-on-one
> > >> interaction with one of our expert instructors. Gain the in-demand
> > >> skills of a certified computer examiner, learn to recover trace
data
> > >> left behind by fraud, theft, and cybercrime perpetrators. Discover
> > the
> > >> source of computer crime and abuse so that it never happens again.
> > >>
> > >>
http://www.infosecinstitute.com/courses/computer_forensics_training.h
> > >> tml
> > >>
>
------------------------------------------------------------------------
> > >> ----
> > >>
> >
---------------------------------------------------------------------
> > >> ------
> > >> Computer Forensics Training at the InfoSec Institute. All of our
> > class
> > >> sizes
> > >> are guaranteed to be 12 students or less to facilitate one-on-one
> > >> interaction with one of our expert instructors. Gain the in-demand
> > >> skills of
> > >> a certified computer examiner, learn to recover trace data left
> > behind
> > >> by
> > >> fraud, theft, and cybercrime perpetrators. Discover the source of
> > >> computer
> > >> crime and abuse so that it never happens again.
> > >>
> > >>
http://www.infosecinstitute.com/courses/computer_forensics_training.h
> > >> tml
> > >>
>
------------------------------------------------------------------------
> > ----
> > >>
> > >>
> > >
> >
----------------------------------------------------------------------
> > > -----
> > > Computer Forensics Training at the InfoSec Institute. All of our
class
> > > sizes
> > > are guaranteed to be 12 students or less to facilitate one-on-one
> > > interaction with one of our expert instructors. Gain the in-demand
> > skills
> > > of
> > > a certified computer examiner, learn to recover trace data left
behind
> > by
> > > fraud, theft, and cybercrime perpetrators. Discover the source of
> > computer
> > > crime and abuse so that it never happens again.
> > >
> > >
http://www.infosecinstitute.com/courses/computer_forensics_training.ht
> > > ml
> > >
>
------------------------------------------------------------------------
> > ----
> > >
> > >
> >
> >
> >
> >
>

--------------------------------------------------------------------------
-
> > Computer Forensics Training at the InfoSec Institute. All of our > > class
sizes
> > are guaranteed to be 12 students or less to facilitate one-on-one
> > interaction with one of our expert instructors. Gain the in-demand
skills of
> > a certified computer examiner, learn to recover trace data left > > behind
by
> > fraud, theft, and cybercrime perpetrators. Discover the source of
computer
> > crime and abuse so that it never happens again.
> >
> >
http://www.infosecinstitute.com/courses/computer_forensics_training.html
>

--------------------------------------------------------------------------
--
> >
> >
>
>
>
> --
> Eddie
> -----------------------------------------------------------------------
> All e-mails sent to me is subject to de-html'izing
> -----------------------------------------------------------------------
>

--------------------------------------------------------------------------
-
> Computer Forensics Training at the InfoSec Institute. All of our class
sizes
> are guaranteed to be 12 students or less to facilitate one-on-one
> interaction with one of our expert instructors. Gain the in-demand
skills
of
> a certified computer examiner, learn to recover trace data left behind
by
> fraud, theft, and cybercrime perpetrators. Discover the source of
computer
> crime and abuse so that it never happens again.
>
> http://www.infosecinstitute.com/courses/computer_forensics_training.html

--------------------------------------------------------------------------
--
>
>
>
>



--------------------------------------------------------------------------
-
Computer Forensics Training at the InfoSec Institute. All of our class
sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills
of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
--------------------------------------------------------------------------
--


---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
----------------------------------------------------------------------------






---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
----------------------------------------------------------------------------


Current thread: