If you need to identify and stop network, operating system, and application vulnerabilities, then you’ll probably want to consider an IDS or IPS. In this video, you’ll learn about intrusion identification technologies and how they are used to prevent the exploit of vulnerabilities.
The information traversing the network can be a valuable source of forensic data. In this video, you’ll learn about some common data gathering techniques for network traffic data.
When do you detect, and when do you prevent? In this video, you’ll learn the advantages of cameras vs. guards and the differences between IDS and IPS strategies.
This second video on network devices covers the supporting cast of infrastructure hardware and software. In this video, you’ll learn about VPN concentrators, intrusion detection and prevention technologies, and protocol analyzers.
As network professionals, we rely on some core security devices to protect our network. In this video, you’ll learn about network-based firewalls, host-based firewalls, IDS/IPS, and VPN concentrators.
The network is a constantly moving river of information, and it may be necessary to occasionally test the water as it flows by. In this video module, you’ll learn the reasons for scanning your network and the different technologies available to gather information. We’ll also dive into packet analyzers, intrusion detection systems, intrusion prevention systems, and port scanners.
Not all network devices are common in every environment. In this video you’ll learn about specialized network devices that go beyond the capabilities of traditional networks such as content switches, IDS/IPS, load balancers, bandwidth shapers, proxy servers, and more.