Friday, 12 November 2004

Looks like TopLayer will be hosting a series of three “webinars” (oh how these new clichés bug me) on the topic of Understanding Network Intrusion Prevention.

I am not personally familiar with the company, but the content looks interesting. It is advertised as free training, and specifically not a sales pitch. 

Here's the info and links to sign up if you're interested. Each session will last for about 60 minutes. From their email and web site, the session will include:

  • Understanding problems that Network IPS can solve
  • Network Intrusion Prevention technology overview
  • Vulnerabilities, exploits, regular expressions, and protocol validation
  • Comparing and contrasting IPS technology to IDS technology
  • Requirements for in-line operations
  • Reliable, scalable network IPS deployment scenarios
This educational webinar series will be led by Top Layer's senior engineering team. Individuals that are investigating or installing network intrusion prevention technologies should attend this webinar series. There will be a question and answer period at the end of each session. Each webinar is an educational session, it is not a sales presentation.

To Register: http://www.toplayer.com/content/news/webinars.jsp

Detailed Descriptions of the Sessions:

Network Intrusion Prevention Webinar Session I

Topic: "Problems that Can be Solved by Network IPS"

  • Background of IPS and Attacks
  • Problem Review
  • Massive Network Attacks
  • Known and Unknown Network Exploits
  • Requirements for an Inline Network Device

Register Now>       December 8       12:00 PM Eastern Daylight Time (EDT)

Network Intrusion Prevention Webinar Session II

Topic: "Network IPS Deployment Goals"

  • Brief Review of Session I
  • Universe of Attacks
  • IPS Mechanisms
  • Protection vs. Recognition & Classification
  • Requirements for Inline Network Device

Register Now>       December 9       12:00 PM Eastern Daylight Time (EDT)
 

Network Intrusion Prevention Webinar Session III

Topic: "Network IPS Requirements and Example"

  • Brief Review of Session I & II
  • Network Usage Model
  • Network and Security Performance/High Availability Requirements
  • The challenges of IP Fragments and TCP Segments
  • Security Event Reporting
  • IPS Deployment Example

Register Now>       December 15       12:00 PM Eastern Daylight Time (EDT)
 



Add/Read: Comments [0]
IT Security | Tech
Friday, 12 November 2004 15:17:01 (Pacific Standard Time, UTC-08:00)
#  Trackback

Referred by:
http://search.daum.net/ [Referral]
Comments are closed.