|
TRAINING PROGRAM
Overview | By Day (Monday,
Tuesday) |
By Instructor | All in One File
|
|
To meet your needs, the training program at Security '04 provides in-depth, immediately useful training in the latest techniques, effective tools, and best strategies.
USENIX tutorials survey the topic, then dive into the specifics of what to do and how to do it. Instructors are well-known experts in their fields, selected for their ability to teach complex subjects. Attend tutorials at Security '04 and take valuable skills back to your company or organization. New topics are woven in with old favorites to create the most comprehensive training program to date. Register now to guarantee your first choiceseating is limited.
|
|
Our Guarantee
If you're not happy, we're not happy. If you feel a
tutorial does not meet the high standards you have come to expect from USENIX,
let us know by the first break and we will change you to any other available
tutorial immediately.
|
|
Continuing Education Units (CEUs)
USENIX provides Continuing Education Units for a small additional
administrative fee. The CEU is a nationally recognized standard unit of measure
for continuing education and training and is used by thousands of organizations.
Each full-day tutorial qualifies for 0.6 CEUs. You
can request CEU credit by completing the CEU section on the registration form.
USENIX provides a certificate for each attendee taking a tutorial for CEU credit
and maintains transcripts for all CEU students. CEUs are not the same as college
credits. Consult your employer or school to determine their applicability.
|
|
|
|
Full Day (9:00 a.m.5:00 p.m.)
|
|
M1
|
Richard Bejtlich
|
New! Network Security Monitoring with Open Source Tools
|
|
M2
|
Marcus Ranum
|
Intrusion Detection and Prevention Systems
|
|
M3
|
Radia Perlman
|
Network Security Protocols: Theory and Current Standards
|
|
M4
|
Brad Johnson
|
New!
Network Security Profiles: Protocol Threats, Intrusion Classes, and How Hackers Find Exploits
|
|
|
Full Day (9:00 a.m.5:00 p.m.)
|
|
T1
|
Gary McGraw
|
New!
Building a Software Security Capability: How to Foster Best Practices in Software Security
|
|
T2
|
Marcus Ranum
|
New! System Log Aggregation, Statistics, and Analysis
|
|
T3
|
David Rhoades
|
New! Network Security Assessments Workshop
|
|
T4
|
Moti Yung
|
New!
Malicious Cryptography
|
|
|
| |
|