|Home | Talks | Training | Register | Contests | Venue | Sponsors | Team | Archives | Press | Contact Us |||
English | اردو
Call for Papers
Friday-Tuesday, November 06-10, 2009, Lahore.
Training - 1: Linux System and Network Administration For Hackers
Training: Linux System and Network Administration For Hackers
Trainer: To Be Decided - Esecurity
Duration: Two Days - Saturday and Sunday November 07 - 08, 2009.
Cost: See below. Discount applicable if you register early.
Please download and fill Training Registration Form and post along with payment to the address given in the form.
After you have posted the registration form, please send an electronic copy to the email address given below:
register AT chase DOT org DOT pk
A confirmation email will be sent once the post has been received. After the payment has been successfully transferred, a receipt will also be posted to your address as well which you should produce at the time of the event.
A good and stable operating system plays a pivotal role in all the tasks which are performed by a hacker or information security professional. The way a hacker maintains, operates and plays with an operating system is fundamentally different from the way a normal user performs these tasks.
The operating system of choice of many hackers is always an open source operating system and most of the time it is Linux. Apart from being free and open source, it is more secure and stable than many other operating systems. With the proprietary software whose source code is not made available, there is always a danger that the programmers might have left some backdoor in their software so as to exploit it at their will when desired.
It is this reason that hackers and information security community tends to use Free and Open Source Software. Indeed, most of the tools used in the world of hackers and information security specialists are Free and Open Source. They can themselves see the source code, audit it for any vulnerabilities and loopholes left there, and then can use it for the purpose they like it. And it is for these reasons that one important motto of hackers and information security specialists is that source code should be open and freely available.
Linux System and Network Administration for Hackers is a hands-on training course which is meant to teach the participants all what is needed to effectively use Linux for purposes of penetration testing and information security. A tentative outline of the content to be covered during the training session is provided below.
This training is meant for general enthusiasts with some knowledge of computers and operating systems, computer science and engineering students, professionals and researchers. Those who already work in the field of information security but still have not tested what Linux is, would benefit most from this training as it will introduce them to a new avenue of hacking and that of Free and Open Source Software.
Main contents of this course are as following:
Installation And Configuration
Linux Command Set
Boot And Shutdown
Handling X Window
Linux File System
Compiling and Building Kernel
Network Servers Installation and Administration
Linux Network Programming
|© CHASE 2006-2009,|