| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Learn about network attack vectors that an adversary can use
to control, and influence network traffic flows and exfiltrate
data by exploiting network devices and protocols in the LAN,
WAN and Cloud. Defensive methods and techniques for monitoring and protecting against the outlined attack vectors will
be discussed. This presentation explores advanced methods
and techniques that penetration testers, network engineers
and security auditors need to understand about network
infrastructure and protocols.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast