VashTS wrote:I'd be interested in some more training in that area.
I received the E-mail for the Security 401 course and while it looks good, I'm worried it might be a bit too broad or I'd go in already knowing a lot of if not most of the stuff in the course.
Define "that area." 401 is not necessarily an "intro" course as in "Hey here is security for dummies." 401 is meant to introduce its students into a wide variety of areas they may not have been exposed to in the security arena.
Day 1 - Networking Concepts: routers, networks, interconnections, physical security, etc
Day 2 - Defense In-Depth: policies, planning, DRM, into to web app security, intro to biometrics, etc
Day 3 - Internet Security Technologies: Intrusion Detection/Prevention, Honeypots, assessments, etc.
Day 4 - Secure Communications: crypto, stego, messaging, opsec, etc.
Day 5 - Windows Security
Day 6 - Linux Security
That's enough to fill a lot of space however, you stated that it may too broad or you'd know much of it. With that said, let's assume you're fluid in all of the listed. Pick your poison. What is your objective. Do you want to defend, do you want to "offend" do you want to be a web application specialist, do you want to dig into forensics, etc., etc, etc. This is a question only you can answer as only you are aware of your capabilities. What I would advise is to begin by picking a poison (red pill/blue pill) and go from there.
What does your typical day consist of. E.g., would make no sense for you to take content on Linux if professionally your goal is to stay in a Windows world. Much like myself, I semi-halted CCIE studies because I primarily use Juniper now. Makes little sense for me to waste time. So... What is it you do during the average course of a week. Protect, compromise, response, forensics. Baseline a few of these topics and make a choice.
Because of your signature, I interpret there is a lot of Windows. Perhaps the GWCN would be suitable: http://www.sans.org/security-training/s ... ows-77-mid