NetVU Tech-4290/4390

18
Presented by: Vince Ada & Jason Reverri Securing Your Network TECH Class 4290/4390

Transcript of NetVU Tech-4290/4390

Page 1: NetVU Tech-4290/4390

Presented by:Vince Ada & Jason Reverri

Securing Your NetworkTECH Class 4290/4390

Page 2: NetVU Tech-4290/4390
Page 3: NetVU Tech-4290/4390
Page 4: NetVU Tech-4290/4390
Page 5: NetVU Tech-4290/4390
Page 6: NetVU Tech-4290/4390
Page 7: NetVU Tech-4290/4390
Page 8: NetVU Tech-4290/4390
Page 9: NetVU Tech-4290/4390
Page 10: NetVU Tech-4290/4390
Page 11: NetVU Tech-4290/4390
Page 12: NetVU Tech-4290/4390
Page 13: NetVU Tech-4290/4390
Page 14: NetVU Tech-4290/4390
Page 15: NetVU Tech-4290/4390
Page 16: NetVU Tech-4290/4390
Page 17: NetVU Tech-4290/4390

Sans Internet Storm Centerhttp://isc.sans.org

Sans Reading Roomhttp://www.sans.org/reading_room/

Darknethttp://www.darknet.org.uk/

SecLists.org Security Mailing List Archivehttp://www.seclists.org

Schneier on Securityhttp://www.schneier.com/

2600 updateshttp://www.2600.com/rss.xml

CommandLine Kung FUhttp://blog.commandlinekungfu.com

Google Online Security Bloghttp://googleonlinesecurity.blogspot.com

Irongeekhttp://www.irongeek.com

Jeremiah Grossman (Whitehat Security)http://jeremiahgrossman.blogspot.com

Brian Krebshttp://krebsonsecurity.com

SC Magazinehttp://www.scmagazineus.com

McAfee Labshttp://blogs.mcafee.com/mcafee-labs

Microsoft Malware Protection Centerhttp://blogs.technet.com/b/mmpc/

Packetlifehttp://packetlife.net/blog/

PaulDotComhttp://www.pauldotcom.com/

Paul de Souzahttp://paulcsfi.wordpress.com/

SecurityTubehttp://www.securitytube.net

Offensive Securityhttp://www.offensive-security.com

Metasploit Unleashedhttp://www.offensive-security.com/metasploit-unleashed/Metasploit_Unleashed_Information_Security_Training

Metasploit 101http://www.securitytube.net/video/786

BackTrack Linuxhttp://www.backtrack-linux.org/

Great video presentation by Dave Marcus on social networks social engineering:http://www.irongeek.com/i.php?page=videos/dojocon-2010-videos#Using%20Social%20Networks%20To%20Profile,%20Find%20and%200wn%20Your%20Victims

Page 18: NetVU Tech-4290/4390

Photo Credits

Slide 2 http://www.flickr.com/photos/walkinline/Slide 3 http://www.flickr.com/photos/billyboysfotocolection/Slide 5 http://www.flickr.com/photos/christianpayne/Slide 8 http://www.flickr.com/photos/sprengben/Slide 10 http://www.flickr.com/photos/giantginkgo/Slide 11 http://www.flickr.com/photos/ignacio_conejo/Slide 12 http://www.flickr.com/photos/home_of_chaos/Slide 13 http://www.flickr.com/photos/sklathillSlide 14 http://www.flickr.com/photos/donsolo/Slide 15 http://www.flickr.com/photos/mr_beaver/Slide 16 http://www.flickr.com/photos/schmiegl/Slide 17 http://www.flickr.com/photos/60295308@N00

Photos used under Creative Commons license