If you have a wireless network of any significant size, then you probably have a wireless LAN controller. In this video, you’ll learn how wireless LAN controllers are used to configure and manage our wireless networks.
What’s the best way to gather information during a security incident? In this video, you’ll learn some techniques for gathering details and how to report after the security event is over.
The syslog protocol is a standard method of consolidating logs from all of your network devices. In this video, you’ll learn how syslog is used for enterprise log management and reporting.
You can’t stop the bad guys if you can’t see them. In this video, you’ll learn how alarms, alerts, and trends can help you visualize your organization’s security.