Article Search

1 Result(s) Found
Rajat Kumar (Tech Head)
January 30, 2017

In this session we covers some of the technology and processes used by cyber security professionals when protecting an organization’s network, equipment and data. First, it briefly covers the many types of firewalls, security appliances, and software that are currently used, including best practices.

Next, this session explains botnets, the kill chain, behaviour-based security, and using NetFlow to monitor a network. Including the CSIRT team and the security playbook. It briefly covers the tools that cyber security professionals use to detect and prevent network attacks.

0 Comments  |   2 Kudos   |   1,692 Views

Ads Here