Ever wonder what monitoring a honeypot might be like? The folks over at SIG^2 have a Web site online where the handlers who monitor their honeypot post a daily diary. If you read the diary starting on November 2 you can gain some insight into what they've seen and how they work to bait intruders further. Their honeypot was compromised on that date and they've posted an analysis of the intrusion, which occured using Secure Shell (SSH) where they'd set of intentionally weak password.
Past Sessions Available for Instant Access! Access to Recordings through May 20, 2015
Semester 1: October 30th to December 4th
Semester 2: January 22nd to February 19th
John Savill will cover topics including:
* Deploying, Managing, and Maintaining Windows * Key Features of Active Directory from Windows 2000 to Windows Server 2012 * Key elements of System Center 2012 and System Center 2012 R2 * Deploying, Migrating to and Managing Hyper-V in Your Organization * Implementing a Private Cloud * Using PowerShell to Automate Common Tasks * PLUS a preview of Windows 10