Course list http://www.c-jump.com/bcc/

Security - Botnets


  1. Malware
  2. Botnets
  3. Bots
  4. Spam
  5. Botnet Activity
  6. Phishing
  7. Internet Relay Chat
  8. No Simple Answers
  9. Firewalls Effectiveness Fading
  10. Zero-day attacks
  11. Windows
  12. Unix and Linux
  13. Botnet Survival
  14. Botnet Survival, cont.
  15. Command and Control
  16. Command and Control, cont.
  17. Modular Capability
  18. Web Exploitation
  19. Web Exploitation, cont.
  20. Web Exploitation, cont.
  21. IP Tracking and Web Kits
  22. IP Tracking and Web Kits, cont.
  23. Spam
  24. Storm Worm
  25. Storm Worm, cont.
  26. Storm Worm, cont.
  27. Making Money, DDoS
  28. Making Money, Spam
  29. Google PageRank Calculations
  30. Botnets using Botnets
  31. Google PageRank Expolits
  32. Google PageRank Expolits, cont.
  33. Sources

1. Malware


2. Botnets


3. Bots


4. Spam



5. Botnet Activity


6. Phishing


7. Internet Relay Chat


8. No Simple Answers


9. Firewalls Effectiveness Fading


10. Zero-day attacks


11. Windows


12. Unix and Linux


13. Botnet Survival


14. Botnet Survival, cont.


15. Command and Control


16. Command and Control, cont.


17. Modular Capability


18. Web Exploitation


19. Web Exploitation, cont.


20. Web Exploitation, cont.


21. IP Tracking and Web Kits


22. IP Tracking and Web Kits, cont.



23. Spam



24. Storm Worm



25. Storm Worm, cont.



26. Storm Worm, cont.



27. Making Money, DDoS



28. Making Money, Spam



29. Google PageRank Calculations



30. Botnets using Botnets



31. Google PageRank Expolits



32. Google PageRank Expolits, cont.



33. Sources