Ending the Tyranny of Expensive Security Tools
Home » Webinars » Network Security » Ending the Tyranny of Expensive Security Tools
This webinar shows how to use the security functionality of
existing monitoring systems, network devices, and open
source applications instead of relying on expensive dedicated
security tools.
Last modified on 2023-11-30 (release notes)
Ending the Tyranny of Expensive Security Tools
4:55 Introduction |
||
00-Additional Information and Errata | 85K | 2015-11-20 |
Introduction | 4:55 | 2017-02-02 |
57:26 Overview of Security-Related Tools |
||
Monitoring Tools | 12:10 | 2017-02-02 |
System and Network Control Tools | 8:01 | 2017-02-02 |
Other Tools | 9:51 | 2017-02-02 |
Wireless Security | 10:38 | 2017-02-02 |
Open-Source Security Distros | 8:26 | 2017-02-02 |
Pentest Dropboxes | 3:17 | 2017-02-02 |
Malware and Threat Analysis Tools | 5:03 | 2017-02-02 |
13:50 Conclusions |
||
Conclusions and Questions | 13:50 | 2017-02-02 |
Slide Deck |
||
Tyranny of Expensive Security Tools | 10.0M | 2015-10-01 |