[ALUG] FREE IT WORKSHOPS AT JR INSTITUTE.
Hamisi Jabe
hamsoj80 at gmail.com
Mon Oct 3 15:50:22 EAT 2016
For better Approaching of this i feel should come as follows
1. Linux
2. Monitoring
3. Security
4. Visualization
5. Windows Last
Also Rogers and Mir, i think your the one receiving the registrations from
members who wants to atttend, May be you can give us a view also what
members are selecting mostly for training.
But for IT Experts, they should start with linux as the core foundation
then others will follow, it will make a very good approach for them
Thanks
On Mon, Oct 3, 2016 at 3:42 PM, Fredson Mawenya via Linux <
linux at lists.habari.co.tz> wrote:
> I think form Andreas suggestion we include both,as I know we are expecting
> to get freshers from College/University and not only IT professional from
> the industry
>
> Regards,
>
> Fredson Mawenya,
> Wireless/NOC Dept,
> Habari Node Limited.
> Tel. 2050220, 2050221, 2050244, 2544323
> Mobile:0784242440 0713265827
> Hotline:+255 715651316
>
>
> *Email : mawenya at habari.co.tz <support at habari.co.tz>*
>
> *"Always Reliable,Always on time"*
> [image: Paytan-logo]
>
> On Mon, Oct 3, 2016 at 3:32 PM, Mr Mir via Linux <linux at lists.habari.co.tz
> > wrote:
>
>> Andreas Lomayani,Hamisi
>> What is the possibility of getting a small syllabus / contents prepared
>> for the 15th which will lead to the more advanced training for the up
>> coming weeks, it will keep the momentum and participants will also have a
>> direction, maybe later on for some certification.
>>
>> Rgds
>> mir
>>
>>
>> On 03/10/2016, 3:17 PM, "Hamisi Jabe via Linux" <linux at lists.habari.co.tz
>> >
>> wrote:
>>
>> >Dear Andreas,
>> >
>> >Too much have already covered from your point outs
>> >
>> >What is the big effect on this
>> > Why is it a really stupid idea to use pirate copies?
>> >As 99% of users use pirate copies of windows and office
>> > Why should I pay extra attention to networked printes etc.?
>> >
>> >Just to brainstorm as we are waiting for the training
>> >
>> >
>> >Thanks
>> >
>> >
>> >
>> >-----Original Message-----
>> >From: Linux [mailto:linux-bounces at lists.habari.co.tz] On Behalf Of
>> Andreas
>> >Tauscher via Linux
>> >Sent: Monday, October 3, 2016 3:09 PM
>> >To: Lomayani S. Laizer <lomlaizer at gmail.com>; Linux Users in Arusha
>> ><linux at lists.habari.co.tz>
>> >Subject: Re: [ALUG] FREE IT WORKSHOPS AT JR INSTITUTE.
>> >
>> >On 03.10.2016 10:08, Lomayani S. Laizer via Linux wrote:
>> >> One thing interesting to mention here. I know most people will be
>> >> interested in security but this is most trick topic. Need high skills
>> >> more than any topic
>> >>
>> >> Imagine teaching how to secure web servers or email server while most
>> >> people dont know how to configure web services and email services
>> >> Teaching securing a network someone dont know even how to configure a
>> >vlan.
>> >
>> >Uh yeah.
>> >
>> >> If someone go for security he have to have knowledge of most of basic
>> >> stuff
>> >
>> >Leave the advanced security things.
>> >Often are already the very basics missing.
>> >
>> >Starting with things like:
>> >
>> >Why are updates are important?
>> >Why do I have to know what in my network is going on?
>> >Why should I split my network in subnets?
>> >Why must no user have administrative rights?
>> >Why does encryption in the LAN matter?
>> >Why should I read the logfiles?
>> >Why is it a really stupid idea to use pirate copies?
>> >Why should I use switches with management capabilites?
>> >Why should I pay extra attention to networked printes etc.?
>> >Why should I have a separated network for all the gadgets people brining
>> >in?
>> >Why is a shared WiFi password a bad idea?
>> >...
>> >
>> >And then piece by piece the needed tools are coming like VLANS.
>> >How do I read logfiles? If I install software like snort or software like
>> >integrity why I'm doing it and for what specific I'm looking for?
>> >Why is all this useless nonsense if nobody reading the reports because
>> >they
>> >are unreadable because of 1000000 false alarms per hour?
>> >
>> >And cleaning up with the wide spread opinion: I have installed a
>> firewall,
>> >an IDS and was running a fancy colourful penetration test I found
>> >somewhere
>> >and now I am safe.
>> >
>> >Security is causing permanent and daily work and learning.
>> >Already this understanding is often missing.
>> >
>> >Starting with such very basics like: Why do I have already a serious
>> >problem
>> >if my users have to know what an IP address is?
>> >
>> >Andreas
>> >
>> >
>> >_______________________________________________
>> >The Arusha Linux User Group: http://unix.or.tz
>> >Linux mailing list
>> >Linux at lists.habari.co.tz
>> >http://lists.habari.co.tz/cgi-bin/mailman/listinfo/linux
>> >
>> >The Arusha LUG mailing list is generously hosted by Habari Node Ltd:
>> >http://www.habari.co.tz/
>> >
>> >The above comments and data are owned by whoever posted them (including
>> >attachments if any). The mailing list host is not responsible for them in
>> >any way.
>> >
>>
>>
>> _______________________________________________
>> The Arusha Linux User Group: http://unix.or.tz
>> Linux mailing list
>> Linux at lists.habari.co.tz
>> http://lists.habari.co.tz/cgi-bin/mailman/listinfo/linux
>>
>> The Arusha LUG mailing list is generously hosted by Habari Node Ltd:
>> http://www.habari.co.tz/
>>
>> The above comments and data are owned by whoever posted them (including
>> attachments if any). The mailing list host is not responsible for them in
>> any way.
>>
>
>
> _______________________________________________
> The Arusha Linux User Group: http://unix.or.tz
> Linux mailing list
> Linux at lists.habari.co.tz
> http://lists.habari.co.tz/cgi-bin/mailman/listinfo/linux
>
> The Arusha LUG mailing list is generously hosted by Habari Node Ltd:
> http://www.habari.co.tz/
>
> The above comments and data are owned by whoever posted them (including
> attachments if any). The mailing list host is not responsible for them in
> any way.
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.habari.co.tz/pipermail/linux/attachments/20161003/26c55ad2/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image002.jpg
Type: image/jpeg
Size: 15595 bytes
Desc: not available
URL: <http://lists.habari.co.tz/pipermail/linux/attachments/20161003/26c55ad2/attachment-0001.jpg>
More information about the Linux
mailing list