<Links>
	<Link linkType="CourseMap">
		<DisplayName>Course Introduction</DisplayName>
		<URL>../mod1/module.htm</URL>
		<Name>mod1</Name>
		<TopicNames>
			<Topic firstPageIdx="0">Introduction</Topic>
		</TopicNames>
	</Link>
	<Link linkType="CourseMap">
		<DisplayName>Sniffers</DisplayName>
		<URL>../mod2/module.htm</URL>
		<Name>mod2</Name>
		<TopicNames>
			<Topic firstPageIdx="0">Introduction</Topic>
			<Topic firstPageIdx="1">What is a Sniffer?</Topic>
			<Topic firstPageIdx="4">How Do Sniffers Work?</Topic>
			<Topic firstPageIdx="10">Conclusion</Topic>
		</TopicNames>
	</Link>
	<Link linkType="CourseMap">
		<DisplayName>Wireshark and the Analysis Process</DisplayName>
		<URL>../mod3/module.htm</URL>
		<Name>mod3</Name>
		<TopicNames>
			<Topic firstPageIdx="0">Introduction</Topic>
			<Topic firstPageIdx="1">What is Wireshark?</Topic>
			<Topic firstPageIdx="6">Display Filters</Topic>
			<Topic firstPageIdx="12">The Analysis Process</Topic>
			<Topic firstPageIdx="16">Conclusion</Topic>
		</TopicNames>
	</Link>
	<Link linkType="CourseMap">
		<DisplayName>Client-Side Attacks</DisplayName>
		<URL>../mod4/module.htm</URL>
		<Name>mod4</Name>
		<TopicNames>
			<Topic firstPageIdx="0">Introduction</Topic>
			<Topic firstPageIdx="1">Client-Side Attachks Overview</Topic>			
			<Topic firstPageIdx="5">Attack Surfaces</Topic>
			<Topic firstPageIdx="8">Attack Vectors</Topic>
			<Topic firstPageIdx="12">Evading Detection</Topic>
			<Topic firstPageIdx="15">Conclusion</Topic>
		</TopicNames>
	</Link>
	<Link linkType="CourseMap">
		<DisplayName>Bots and Botnets</DisplayName>
		<URL>../mod5/module.htm</URL>
		<Name>mod5</Name>
		<TopicNames>
			<Topic firstPageIdx="0">Introduction</Topic>
			<Topic firstPageIdx="1">The Trouble with Botnets</Topic>
			<Topic firstPageIdx="4">Botnet Architecture and Capabilities</Topic>
			<Topic firstPageIdx="7">Botnet Vectors</Topic>
			<Topic firstPageIdx="12">Conclusion</Topic>
		</TopicNames>
	</Link>
	<Link linkType="CourseMap">
		<DisplayName>Conclusion</DisplayName>
		<URL>../mod6/module.htm</URL>
		<Name>mod6</Name>
		<TopicNames>
			<Topic firstPageIdx="0">Summary and Conclusion</Topic>
		</TopicNames>
	</Link>	
	
	<Link linkType="ExtResp">
		<DisplayName>Security Technical Implementation Guides (STIGS) and Supporting Documents</DisplayName>
		<URL>http://iase.disa.mil/stigs/</URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	
	<Link linkType="ExtResp">
		<DisplayName>Snort™ website (powered by Sourcefire™)</DisplayName>
		<URL>http://www.snort.org</URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	
	<Link linkType="ExtResp">
		<DisplayName>tcpdump website</DisplayName>
		<URL>http://www.tcpdump.org</URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	
	<Link linkType="ExtResp">
		<DisplayName>WinDump website</DisplayName>
		<URL>http://www.winpcap.org/windump</URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	
	<Link linkType="ExtResp">
		<DisplayName>Wireshark website</DisplayName>
		<URL>http://www.wireshark.org</URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	
	<Link linkType="ExtResp">
		<DisplayName>Committee on National Security Systems (CNSS) Instruction No. 4009, 26 April 2010, National Information Assurance (IA) Glossary</DisplayName>
		<URL>http://www.cnss.gov/Assets/pdf/cnssi_4009.pdf</URL>
		<TargetWindow>externalWindow</TargetWindow>
	</Link>
	
	<Link linkType="ExtResp">
		<DisplayName>Cyberspace Operations Lexicon</DisplayName>
		<URL>../common/cw/data/CyberLexicon.pdf</URL>
		<TargetWindow>externalWindow</TargetWindow>

</Links>

