Be the first to like this
From our February 2010 meeting. Given by Steve Jaworski and Bryan Young.
Implementing security features already included with your Layer 2 and 3 infrastructures can provide your organization additional protection. This presentation will focus on features your vendors should or should be providing you. Topics covered in this presentation include Access-lists, Arp Inspection, DHCP Snooping, 802.1x, private VLANS, MAC Address security, routing security, and other various topics. Tools to test or attack each of these topics will also be discussed.
Clipping is a handy way to collect important slides you want to go back to later.