Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
How do firewalls track sessions? How does SSL secure data? Why is UDP believed to be so bad, and can it be secured? How do routers route, and can they be tricked? To be an effective security administrator requires fairly detailed knowledge of certain networking communications protocols. Some of the early protocols (still in use today, like TCP for instance) really weren't even developed with high security in mind! Steve Riley will increase your knowledge of how protocols format and transmit information, which will help you better understand how and where to make security decisions. This session is guaranteed to be full of geeky chatter and diagram-laden PowerPoints!
https://www.microsoft.com/emea/spotlight/sessionh.aspx?videoid=9