• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Keeping them Honest: Testing and Validation of Network Security Devices
 

Keeping them Honest: Testing and Validation of Network Security Devices

on

  • 1,239 views

You know what your firewall, NAC system and IPS are supposed to do, but do you know how well they're doing it? Learn how to verify that your network security devices are working appropriately and ...

You know what your firewall, NAC system and IPS are supposed to do, but do you know how well they're doing it? Learn how to verify that your network security devices are working appropriately and doing so under load. Learn methodologies for testing these various types of devices, where these devices commonly fail and how to design dynamic and comprehensive test cases to identify these failures.

Statistics

Views

Total Views
1,239
Views on SlideShare
1,236
Embed Views
3

Actions

Likes
1
Downloads
65
Comments
0

1 Embed 3

http://www.slideshare.net 3

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Keeping them Honest: Testing and Validation of Network Security Devices Keeping them Honest: Testing and Validation of Network Security Devices Presentation Transcript

    • Keeping ‘em Honest Testing and Validation of Network Security Devices Dustin D. Trammell Security Researcher BreakingPoint Systems, Inc.
    • About Me Dustin D. Trammell http://www.dustintrammell.com Founder, Computer Academic Underground (CAU) Co-Founder, Austin Hacker Association (AHA!) Employed by BreakingPoint Systems, Inc. Security Researcher Research properties and scope of vulnerabilities Development of dynamic attacks and exploits
    • Background & Terminology: Anatomy of an Attack
    • Anatomy of an Attack: Overview
    • Anatomy of an Attack: Network
    • Anatomy of an Attack: Target