SlideShare une entreprise Scribd logo
1  sur  18
Télécharger pour lire hors ligne
Securing Your Network
TECH Class 4290/4390
          Presented by:
   Vince Ada & Jason Reverri
Sans Internet Storm Center
http://isc.sans.org

Sans Reading Room
http://www.sans.org/reading_room/            Microsoft Malware Protection Center
                                             http://blogs.technet.com/b/mmpc/
Darknet
http://www.darknet.org.uk/                   Packetlife
                                             http://packetlife.net/blog/
SecLists.org Security Mailing List Archive
http://www.seclists.org                      PaulDotCom
                                             http://www.pauldotcom.com/
Schneier on Security
http://www.schneier.com/                     Paul de Souza
                                             http://paulcsfi.wordpress.com/
2600 updates
http://www.2600.com/rss.xml                  SecurityTube
                                             http://www.securitytube.net
CommandLine Kung FU
http://blog.commandlinekungfu.com            Offensive Security
                                             http://www.offensive-security.com
Google Online Security Blog
http://googleonlinesecurity.blogspot.com     Metasploit Unleashed
                                             http://www.offensive-security.com/metasploit-
Irongeek                                     unleashed/Metasploit_Unleashed_Information_Security_Training
http://www.irongeek.com
                                             Metasploit 101
Jeremiah Grossman (Whitehat Security)        http://www.securitytube.net/video/786
http://jeremiahgrossman.blogspot.com
                                             BackTrack Linux
Brian Krebs                                  http://www.backtrack-linux.org/
http://krebsonsecurity.com
                                             Great video presentation by Dave Marcus on social networks social
SC Magazine                                  engineering:
http://www.scmagazineus.com                  http://www.irongeek.com/i.php?page=videos/dojocon-2010-
                                             videos#Using%20Social%20Networks%20To%20Profile,%20Find
McAfee Labs                                  %20and%200wn%20Your%20Victims
http://blogs.mcafee.com/mcafee-labs
Photo Credits

Slide 2 http://www.flickr.com/photos/walkinline/
Slide 3 http://www.flickr.com/photos/billyboysfotocolection/
Slide 5 http://www.flickr.com/photos/christianpayne/
Slide 8 http://www.flickr.com/photos/sprengben/
Slide 10 http://www.flickr.com/photos/giantginkgo/
Slide 11 http://www.flickr.com/photos/ignacio_conejo/
Slide 12 http://www.flickr.com/photos/home_of_chaos/
Slide 13 http://www.flickr.com/photos/sklathill
Slide 14 http://www.flickr.com/photos/donsolo/
Slide 15 http://www.flickr.com/photos/mr_beaver/
Slide 16 http://www.flickr.com/photos/schmiegl/
Slide 17 http://www.flickr.com/photos/60295308@N00

Photos used under Creative Commons license

Contenu connexe

Tendances

Corncon 2021 - Inside the Unlikely Romance
Corncon 2021 - Inside the Unlikely RomanceCorncon 2021 - Inside the Unlikely Romance
Corncon 2021 - Inside the Unlikely RomanceCasey Ellis
 
TechCrunch Early Stage 2020 - How to prioritize security at your startup
TechCrunch Early Stage 2020 - How to prioritize security at your startupTechCrunch Early Stage 2020 - How to prioritize security at your startup
TechCrunch Early Stage 2020 - How to prioritize security at your startupCasey Ellis
 
Photosynth Introduction
Photosynth IntroductionPhotosynth Introduction
Photosynth IntroductionMicroMiel
 
WordPress Security 2014 - The Basics of Security
WordPress Security 2014 - The Basics of SecurityWordPress Security 2014 - The Basics of Security
WordPress Security 2014 - The Basics of SecurityTony Perez
 
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne BurkeExtreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne BurkeEC-Council
 
Joomladay Netherlands - Security
Joomladay Netherlands - SecurityJoomladay Netherlands - Security
Joomladay Netherlands - SecurityWilco Jansen
 
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...Casey Ellis
 
RELEASE THE HOUNDS, PART 2: 9 YEARS IS A LONG ASS TIME
RELEASE THE HOUNDS, PART 2: 9 YEARS IS A LONG ASS TIMERELEASE THE HOUNDS, PART 2: 9 YEARS IS A LONG ASS TIME
RELEASE THE HOUNDS, PART 2: 9 YEARS IS A LONG ASS TIMECasey Ellis
 
How to free your computer from virus-shara aguirre-director of happiness.m4v
How to free your computer from virus-shara aguirre-director of happiness.m4vHow to free your computer from virus-shara aguirre-director of happiness.m4v
How to free your computer from virus-shara aguirre-director of happiness.m4vShara Aguirre
 
Instalar un grupo_y_excluir_otro
Instalar un grupo_y_excluir_otroInstalar un grupo_y_excluir_otro
Instalar un grupo_y_excluir_otroJames Jara
 
Httpd sys content_t_apache_linux
Httpd sys content_t_apache_linuxHttpd sys content_t_apache_linux
Httpd sys content_t_apache_linuxJames Jara
 
Bug bounty or beg bounty?
Bug bounty or beg bounty?Bug bounty or beg bounty?
Bug bounty or beg bounty?Casey Ellis
 
Instalar cliente bittorrent
Instalar cliente bittorrentInstalar cliente bittorrent
Instalar cliente bittorrentJames Jara
 
WordPress Security - Learning From Hacks
WordPress Security - Learning From HacksWordPress Security - Learning From Hacks
WordPress Security - Learning From HacksTony Perez
 
10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps SecurityDatto
 
Installar un paquete_rpm_linux
Installar un paquete_rpm_linuxInstallar un paquete_rpm_linux
Installar un paquete_rpm_linuxJames Jara
 
KEYNOTE: Nullcon 2021 - Security Research and Disclosure - The Unauthorized B...
KEYNOTE: Nullcon 2021 - Security Research and Disclosure - The Unauthorized B...KEYNOTE: Nullcon 2021 - Security Research and Disclosure - The Unauthorized B...
KEYNOTE: Nullcon 2021 - Security Research and Disclosure - The Unauthorized B...Casey Ellis
 
Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.
Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.
Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.Vladyslav Radetsky
 
Community Career Center: The Beginner’s Guide to LastPass
Community Career Center: The Beginner’s Guide to LastPassCommunity Career Center: The Beginner’s Guide to LastPass
Community Career Center: The Beginner’s Guide to LastPassKeitaro Matsuoka
 
Teknologi antivirus vs malware 2015 expanded
Teknologi antivirus vs malware 2015 expandedTeknologi antivirus vs malware 2015 expanded
Teknologi antivirus vs malware 2015 expandedAlfons Tanujaya
 

Tendances (20)

Corncon 2021 - Inside the Unlikely Romance
Corncon 2021 - Inside the Unlikely RomanceCorncon 2021 - Inside the Unlikely Romance
Corncon 2021 - Inside the Unlikely Romance
 
TechCrunch Early Stage 2020 - How to prioritize security at your startup
TechCrunch Early Stage 2020 - How to prioritize security at your startupTechCrunch Early Stage 2020 - How to prioritize security at your startup
TechCrunch Early Stage 2020 - How to prioritize security at your startup
 
Photosynth Introduction
Photosynth IntroductionPhotosynth Introduction
Photosynth Introduction
 
WordPress Security 2014 - The Basics of Security
WordPress Security 2014 - The Basics of SecurityWordPress Security 2014 - The Basics of Security
WordPress Security 2014 - The Basics of Security
 
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne BurkeExtreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
 
Joomladay Netherlands - Security
Joomladay Netherlands - SecurityJoomladay Netherlands - Security
Joomladay Netherlands - Security
 
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
 
RELEASE THE HOUNDS, PART 2: 9 YEARS IS A LONG ASS TIME
RELEASE THE HOUNDS, PART 2: 9 YEARS IS A LONG ASS TIMERELEASE THE HOUNDS, PART 2: 9 YEARS IS A LONG ASS TIME
RELEASE THE HOUNDS, PART 2: 9 YEARS IS A LONG ASS TIME
 
How to free your computer from virus-shara aguirre-director of happiness.m4v
How to free your computer from virus-shara aguirre-director of happiness.m4vHow to free your computer from virus-shara aguirre-director of happiness.m4v
How to free your computer from virus-shara aguirre-director of happiness.m4v
 
Instalar un grupo_y_excluir_otro
Instalar un grupo_y_excluir_otroInstalar un grupo_y_excluir_otro
Instalar un grupo_y_excluir_otro
 
Httpd sys content_t_apache_linux
Httpd sys content_t_apache_linuxHttpd sys content_t_apache_linux
Httpd sys content_t_apache_linux
 
Bug bounty or beg bounty?
Bug bounty or beg bounty?Bug bounty or beg bounty?
Bug bounty or beg bounty?
 
Instalar cliente bittorrent
Instalar cliente bittorrentInstalar cliente bittorrent
Instalar cliente bittorrent
 
WordPress Security - Learning From Hacks
WordPress Security - Learning From HacksWordPress Security - Learning From Hacks
WordPress Security - Learning From Hacks
 
10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security
 
Installar un paquete_rpm_linux
Installar un paquete_rpm_linuxInstallar un paquete_rpm_linux
Installar un paquete_rpm_linux
 
KEYNOTE: Nullcon 2021 - Security Research and Disclosure - The Unauthorized B...
KEYNOTE: Nullcon 2021 - Security Research and Disclosure - The Unauthorized B...KEYNOTE: Nullcon 2021 - Security Research and Disclosure - The Unauthorized B...
KEYNOTE: Nullcon 2021 - Security Research and Disclosure - The Unauthorized B...
 
Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.
Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.
Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.
 
Community Career Center: The Beginner’s Guide to LastPass
Community Career Center: The Beginner’s Guide to LastPassCommunity Career Center: The Beginner’s Guide to LastPass
Community Career Center: The Beginner’s Guide to LastPass
 
Teknologi antivirus vs malware 2015 expanded
Teknologi antivirus vs malware 2015 expandedTeknologi antivirus vs malware 2015 expanded
Teknologi antivirus vs malware 2015 expanded
 

En vedette

Global Health Action-Haiti
Global Health Action-HaitiGlobal Health Action-Haiti
Global Health Action-HaitiGirija Sankar
 
Wilmshurst & Fryxell 1995
Wilmshurst & Fryxell 1995Wilmshurst & Fryxell 1995
Wilmshurst & Fryxell 1995jfwilmshurst
 
So050 ben expertise_in_biofuels
So050 ben expertise_in_biofuelsSo050 ben expertise_in_biofuels
So050 ben expertise_in_biofuelsRavi Jethra
 
NetVU Tech-4290/4390
NetVU Tech-4290/4390NetVU Tech-4290/4390
NetVU Tech-4290/4390jreverri
 
So603 b incineration plant
So603 b incineration plantSo603 b incineration plant
So603 b incineration plantRavi Jethra
 
Friends of search 2016 - een samenvatting in beeld
Friends of search 2016 - een samenvatting in beeldFriends of search 2016 - een samenvatting in beeld
Friends of search 2016 - een samenvatting in beeldJudith Verhoef
 
Solucionario 5to secundaria
Solucionario 5to secundaria Solucionario 5to secundaria
Solucionario 5to secundaria MaestroJCH
 

En vedette (10)

Hydro power
Hydro powerHydro power
Hydro power
 
Global Health Action-Haiti
Global Health Action-HaitiGlobal Health Action-Haiti
Global Health Action-Haiti
 
Biogas Brochure
Biogas BrochureBiogas Brochure
Biogas Brochure
 
Wilmshurst & Fryxell 1995
Wilmshurst & Fryxell 1995Wilmshurst & Fryxell 1995
Wilmshurst & Fryxell 1995
 
So050 ben expertise_in_biofuels
So050 ben expertise_in_biofuelsSo050 ben expertise_in_biofuels
So050 ben expertise_in_biofuels
 
NetVU Tech-4290/4390
NetVU Tech-4290/4390NetVU Tech-4290/4390
NetVU Tech-4290/4390
 
S0601 b power
S0601 b powerS0601 b power
S0601 b power
 
So603 b incineration plant
So603 b incineration plantSo603 b incineration plant
So603 b incineration plant
 
Friends of search 2016 - een samenvatting in beeld
Friends of search 2016 - een samenvatting in beeldFriends of search 2016 - een samenvatting in beeld
Friends of search 2016 - een samenvatting in beeld
 
Solucionario 5to secundaria
Solucionario 5to secundaria Solucionario 5to secundaria
Solucionario 5to secundaria
 

Similaire à NetVU Tech-4290/4390

One Trick 2 0 Tools Tds March 2011a
One Trick 2 0 Tools Tds March 2011aOne Trick 2 0 Tools Tds March 2011a
One Trick 2 0 Tools Tds March 2011aAnn Walker Smalley
 
Niels G's security websites list
Niels G's security websites listNiels G's security websites list
Niels G's security websites listBill Hagestad II
 
Play withmultimedia mac
Play withmultimedia macPlay withmultimedia mac
Play withmultimedia macMaso Lin
 
Ruby and Framework Security
Ruby and Framework SecurityRuby and Framework Security
Ruby and Framework SecurityCreston Jamison
 
BYOM Build Your Own Methodology (in Mobile Forensics)
BYOM Build Your Own Methodology (in Mobile Forensics)BYOM Build Your Own Methodology (in Mobile Forensics)
BYOM Build Your Own Methodology (in Mobile Forensics)Reality Net System Solutions
 
WebDev References
WebDev ReferencesWebDev References
WebDev Referencesdynamis
 
Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015Nilesh Sapariya
 
Attack Chaining: Advanced Maneuvers for Hack Fu
Attack Chaining: Advanced Maneuvers for Hack FuAttack Chaining: Advanced Maneuvers for Hack Fu
Attack Chaining: Advanced Maneuvers for Hack FuRob Ragan
 
Ferramentas de apoio ao desenvolvedor
Ferramentas de apoio ao desenvolvedorFerramentas de apoio ao desenvolvedor
Ferramentas de apoio ao desenvolvedorLuciano Filho
 
Menggunakan Kali Linux Untuk Mengetahui Kelemahan Implementasi TI
Menggunakan Kali Linux Untuk  Mengetahui Kelemahan Implementasi TIMenggunakan Kali Linux Untuk  Mengetahui Kelemahan Implementasi TI
Menggunakan Kali Linux Untuk Mengetahui Kelemahan Implementasi TIIsmail Fahmi
 
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...EC-Council
 
Internetsafety networkedparent
Internetsafety networkedparentInternetsafety networkedparent
Internetsafety networkedparentKaren Brooks
 
העתיד כבר כאן - שימוש בטכנולוגיות החדשות כבר היום
העתיד כבר כאן - שימוש בטכנולוגיות החדשות כבר היוםהעתיד כבר כאן - שימוש בטכנולוגיות החדשות כבר היום
העתיד כבר כאן - שימוש בטכנולוגיות החדשות כבר היוםRonny Orbach
 
モジュール指向勉強会-コードリーディングを始める前に-
モジュール指向勉強会-コードリーディングを始める前に-モジュール指向勉強会-コードリーディングを始める前に-
モジュール指向勉強会-コードリーディングを始める前に-Hiroki Kondo
 
Distributed facilitation basics
Distributed facilitation basicsDistributed facilitation basics
Distributed facilitation basicsMark Kilby
 
[IGC 2017] 잔디소프트 윤세민 - HTML5, 크로스플랫폼, 그리고 MMORPG feat. 매드월드
[IGC 2017] 잔디소프트 윤세민 - HTML5, 크로스플랫폼, 그리고 MMORPG feat. 매드월드[IGC 2017] 잔디소프트 윤세민 - HTML5, 크로스플랫폼, 그리고 MMORPG feat. 매드월드
[IGC 2017] 잔디소프트 윤세민 - HTML5, 크로스플랫폼, 그리고 MMORPG feat. 매드월드강 민우
 

Similaire à NetVU Tech-4290/4390 (20)

One Trick 2 0 Tools Tds March 2011a
One Trick 2 0 Tools Tds March 2011aOne Trick 2 0 Tools Tds March 2011a
One Trick 2 0 Tools Tds March 2011a
 
Niels G's security websites list
Niels G's security websites listNiels G's security websites list
Niels G's security websites list
 
Play withmultimedia mac
Play withmultimedia macPlay withmultimedia mac
Play withmultimedia mac
 
Ruby and Framework Security
Ruby and Framework SecurityRuby and Framework Security
Ruby and Framework Security
 
Security news 20151119
Security news 20151119Security news 20151119
Security news 20151119
 
BYOM Build Your Own Methodology (in Mobile Forensics)
BYOM Build Your Own Methodology (in Mobile Forensics)BYOM Build Your Own Methodology (in Mobile Forensics)
BYOM Build Your Own Methodology (in Mobile Forensics)
 
One Trick 2.0 Tools
One Trick 2.0 ToolsOne Trick 2.0 Tools
One Trick 2.0 Tools
 
WebDev References
WebDev ReferencesWebDev References
WebDev References
 
Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015
 
Attack Chaining: Advanced Maneuvers for Hack Fu
Attack Chaining: Advanced Maneuvers for Hack FuAttack Chaining: Advanced Maneuvers for Hack Fu
Attack Chaining: Advanced Maneuvers for Hack Fu
 
Ferramentas de apoio ao desenvolvedor
Ferramentas de apoio ao desenvolvedorFerramentas de apoio ao desenvolvedor
Ferramentas de apoio ao desenvolvedor
 
Menggunakan Kali Linux Untuk Mengetahui Kelemahan Implementasi TI
Menggunakan Kali Linux Untuk  Mengetahui Kelemahan Implementasi TIMenggunakan Kali Linux Untuk  Mengetahui Kelemahan Implementasi TI
Menggunakan Kali Linux Untuk Mengetahui Kelemahan Implementasi TI
 
Web services and JavaScript
Web services and JavaScriptWeb services and JavaScript
Web services and JavaScript
 
Pwned in high ed
Pwned in high edPwned in high ed
Pwned in high ed
 
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...
 
Internetsafety networkedparent
Internetsafety networkedparentInternetsafety networkedparent
Internetsafety networkedparent
 
העתיד כבר כאן - שימוש בטכנולוגיות החדשות כבר היום
העתיד כבר כאן - שימוש בטכנולוגיות החדשות כבר היוםהעתיד כבר כאן - שימוש בטכנולוגיות החדשות כבר היום
העתיד כבר כאן - שימוש בטכנולוגיות החדשות כבר היום
 
モジュール指向勉強会-コードリーディングを始める前に-
モジュール指向勉強会-コードリーディングを始める前に-モジュール指向勉強会-コードリーディングを始める前に-
モジュール指向勉強会-コードリーディングを始める前に-
 
Distributed facilitation basics
Distributed facilitation basicsDistributed facilitation basics
Distributed facilitation basics
 
[IGC 2017] 잔디소프트 윤세민 - HTML5, 크로스플랫폼, 그리고 MMORPG feat. 매드월드
[IGC 2017] 잔디소프트 윤세민 - HTML5, 크로스플랫폼, 그리고 MMORPG feat. 매드월드[IGC 2017] 잔디소프트 윤세민 - HTML5, 크로스플랫폼, 그리고 MMORPG feat. 매드월드
[IGC 2017] 잔디소프트 윤세민 - HTML5, 크로스플랫폼, 그리고 MMORPG feat. 매드월드
 

Dernier

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 

Dernier (20)

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

NetVU Tech-4290/4390

  • 1. Securing Your Network TECH Class 4290/4390 Presented by: Vince Ada & Jason Reverri
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. Sans Internet Storm Center http://isc.sans.org Sans Reading Room http://www.sans.org/reading_room/ Microsoft Malware Protection Center http://blogs.technet.com/b/mmpc/ Darknet http://www.darknet.org.uk/ Packetlife http://packetlife.net/blog/ SecLists.org Security Mailing List Archive http://www.seclists.org PaulDotCom http://www.pauldotcom.com/ Schneier on Security http://www.schneier.com/ Paul de Souza http://paulcsfi.wordpress.com/ 2600 updates http://www.2600.com/rss.xml SecurityTube http://www.securitytube.net CommandLine Kung FU http://blog.commandlinekungfu.com Offensive Security http://www.offensive-security.com Google Online Security Blog http://googleonlinesecurity.blogspot.com Metasploit Unleashed http://www.offensive-security.com/metasploit- Irongeek unleashed/Metasploit_Unleashed_Information_Security_Training http://www.irongeek.com Metasploit 101 Jeremiah Grossman (Whitehat Security) http://www.securitytube.net/video/786 http://jeremiahgrossman.blogspot.com BackTrack Linux Brian Krebs http://www.backtrack-linux.org/ http://krebsonsecurity.com Great video presentation by Dave Marcus on social networks social SC Magazine engineering: http://www.scmagazineus.com http://www.irongeek.com/i.php?page=videos/dojocon-2010- videos#Using%20Social%20Networks%20To%20Profile,%20Find McAfee Labs %20and%200wn%20Your%20Victims http://blogs.mcafee.com/mcafee-labs
  • 18. Photo Credits Slide 2 http://www.flickr.com/photos/walkinline/ Slide 3 http://www.flickr.com/photos/billyboysfotocolection/ Slide 5 http://www.flickr.com/photos/christianpayne/ Slide 8 http://www.flickr.com/photos/sprengben/ Slide 10 http://www.flickr.com/photos/giantginkgo/ Slide 11 http://www.flickr.com/photos/ignacio_conejo/ Slide 12 http://www.flickr.com/photos/home_of_chaos/ Slide 13 http://www.flickr.com/photos/sklathill Slide 14 http://www.flickr.com/photos/donsolo/ Slide 15 http://www.flickr.com/photos/mr_beaver/ Slide 16 http://www.flickr.com/photos/schmiegl/ Slide 17 http://www.flickr.com/photos/60295308@N00 Photos used under Creative Commons license