In Chapter 7, we learned about the various types of IDPSs, how they operate, and how to implement them. If you were considering a small business that had limited resources, which implementations would you consider more valuable/more effective? Are some IDPSs better than others? What control strategy would you chose for a small business?

Intrusion Detection (IDS) Best Practices best network security

Defcon 19 – Mamma’s Don’t Let Your Babies Grow Up To Be Pen TestersThis talk at Defcon 19 provides a humorous look at what it takes to be a penetration tester. The speakers discuss some of the issues that they did not expect when they took on the role of looking for vulnerabilities in a client’s system. It provides a reality check for anyone hoping to enter this field. In the end, they do say how much they love the work.

You can also find slides from this talk here:

"Get 15% discount on your first 3 orders with us"
Use the following coupon

Order Now