The hottest security skills employers are seeking for 2010: 1. Red teaming/penetration testing (systems/networks and applications) 2. Forensics 3. Security essentials 4. Reverse engineering malware 5. Auditing networks and systems (hands-on testing) 6. Intrusion detection 7. Security management and leadership 8. Securing virtual systems 9. CISSP certification Plus: Effective presentation skills for security professionals Not surprisingly you'll find the highest rated courses in the world on each of these topics in New Orleans (January), Orlando (March), and San Diego (May).
See: http://www.sans.org/index.php
Alan
Please note two free ISACA presentations for those of you in New Orleans next week:
Wednesday Jan 13 6:00-9pm - COINS program for Security Leadership given by Stephen Northcutt
Friday Jan 15 6:30-9:30 - HackLab given by John Strand, SANS instructor
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************************************************************* TRAINING UPDATE
-- SANS Security East 2010, New Orleans, January 10-18, 2010 19 courses, bonus evening presentations: Top 7 Trends in Incident Response and Computer Forensics, Advanced Forensic Techniques and more
http://www.sans.org/security-east-2010/index.php
-- SANS AppSec 2010, San Francisco, January 29-February 5, 2010 8 courses, bonus evening presentations, including Social Zombies: Your Friends Want to Eat Your Brains
http://www.sans.org/appsec-2010/index.php
-- SANS Phoenix, February 14 -February 20, 2010
http://www.sans.org/phoenix-2010/index.php
-- SANS 2010, Orlando, March 6 - March 15, 2010 38 courses and bonus evening presentations, including Software Security Street Fighting Style
http://www.sans.org/sans-2010/index.php
-- SANS Northern Virginia Bootcamp 2010, April 6-13
http://www.sans.org/reston-2010/index.php
Looking for training in your own community? http://sans.org/community/ Save on On-Demand training (30 full courses) - See samples at
http://www.sans.org/ondemand/spring09.php
Plus Tokyo, Bangalore, Oslo and Dublin all in the next 90 days. For a list of all upcoming events, on-line and live:
*************************************************************************
**************************** Sponsored Link: ****************************
1) Participation is needed! Be a part of this years 2010 SANS Log Management Report by completing the survey and have a chance to win a $250 AMEX Card.
Click here to complete the survey an be automatically registered.
http://www.sans.org/info/52959
*************************************************************************
Part I for this issue has been compiled by Rohan Kotian at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems.
Description: PDF-XChange Viewer is a PDF reader for Windows Operating Systems from Tracker Software Products. A memory corruption vulnerability has been identified in this application and it can be triggered by a specially crafted PDF file. The specific flaw is an input validation error in "PDFXCview.exe". Note that the vulnerable code might also be present with bundles that are installed by default, for example the PDF-XChange shell extension "XCShInfo.dll". In such cases the vulnerability will be exploited on selecting or hovering the mouse pointer over, the malicious PDF file. Successful exploitation will allow an attacker to execute arbitrary code in the context of the affected application. Some technical details for the vulnerability are publicly available.
Status: Vendor confirmed, updates available.
Description: Net Transport also known as NetXfer is a download manager from Xi Software and it supports most of the popular Internet protocols. A buffer overflow vulnerability has been identified in this application and the vulnerability can be triggered by a specially crafted packet to the ed2k port. The specific flaw is caused by boundary error while processing certain eDonkey packets. Successful exploitation might allow an attacker to execute arbitrary code in the context of the affected application. Full technical details for the vulnerability are publicly available via the proof-of-concept.
Status: Vendors confirmed, no updates available.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 7812 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely. ______________________________________________________________________
(c) 2010. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.