Presented at
NolaCon 2015,
June 12, 2015, 3 p.m.
(Unknown duration).
Section - 1 Key Feature Differentiators between UTM, NGFW, Cisco ASA, and SIEM. Research Examples will be reserved for market leaders and comparing offerings associated with each. Section - 2 Popular Detection IDS & FW utilities and their usage in typical network topographies. Section - 3 Methods and Tool-sets for Evading Firewalls and IDS Evasion Countermeasures IDS & FW Abstract Methodology IDS & FW Penetration Testing Section - 4 Tools and Reporting Format utilized to translate and present metrics from auditing data. Creation of your own Virtual Testing Lab Section - 5 Advanced Malware Testing Advanced Evasion Techniques(APT) Testing
Presenters:
-
Jonathan Suldo
The past 5 years I've taken the hobby and made it a profession as Penetration Tester and Information Security Analyst. I've had the privilege to gain experience working across various domains of Information Security. Currently, I'm a contracting Information Security Analyst for my own Cyber Security company called Arma-Net,llc. I perform Contracting and Consulting associated with a wide variety of Cyber Security projects. In the more recent months I have been providing consulting and managed security services for Information Assurance- Governance, Risk, and Compliance auditing. The auditing work has evolved mainly into hacking/auditing of "cutting edge" Enterprise grade Security appliances. It has became a personal interest and research focus of mine. I'd like to share some of high level tools and methods I use for these testing processes.
Links:
Similar Presentations: