Check out the new USENIX Web site.
12th 
USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA
USENIX '03 Home  | USENIX Home  | Events  | Publications  | Membership


Author/Speakers

Register Now!     TRAINING PROGRAM

Overview | By Day (Monday, Tuesday) | By Instructor | All in One File
To meet your needs, the training program at Security '04 provides in-depth, immediately useful training in the latest techniques, effective tools, and best strategies.

USENIX tutorials survey the topic, then dive into the specifics of what to do and how to do it. Instructors are well-known experts in their fields, selected for their ability to teach complex subjects. Attend tutorials at Security '04 and take valuable skills back to your company or organization. New topics are woven in with old favorites to create the most comprehensive training program to date. Register now to guarantee your first choice—seating is limited.

Our Guarantee
If you're not happy, we're not happy. If you feel a tutorial does not meet the high standards you have come to expect from USENIX, let us know by the first break and we will change you to any other available tutorial immediately.
Continuing Education Units (CEUs)
USENIX provides Continuing Education Units for a small additional administrative fee. The CEU is a nationally recognized standard unit of measure for continuing education and training and is used by thousands of organizations.
    Each full-day tutorial qualifies for 0.6 CEUs. You can request CEU credit by completing the CEU section on the registration form. USENIX provides a certificate for each attendee taking a tutorial for CEU credit and maintains transcripts for all CEU students. CEUs are not the same as college credits. Consult your employer or school to determine their applicability.

Monday, August 9, 2004    
 Full Day (9:00 a.m.–5:00 p.m.)    
M1 Richard Bejtlich New! Network Security Monitoring with Open Source Tools
M2 Marcus Ranum Intrusion Detection and Prevention Systems
M3 Radia Perlman Network Security Protocols: Theory and Current Standards
M4 Brad Johnson New! Network Security Profiles: Protocol Threats, Intrusion Classes, and How Hackers Find Exploits
Tuesday, August 10, 2004    
 Full Day (9:00 a.m.–5:00 p.m.)    
T1 Gary McGraw New! Building a Software Security Capability: How to Foster Best Practices in Software Security
T2 Marcus Ranum New! System Log Aggregation, Statistics, and Analysis
T3 David Rhoades New! Network Security Assessments Workshop
T4 Moti Yung New! Malicious Cryptography

?Need help? Use our Contacts page.

Last changed: 8 June 2004 jel