Get started
Bring yourself up to speed with our introductory content.
Network Security Best Practices and Products
What is data loss prevention? -- An introduction to DLP
Most network security products focus on keeping the bad guys -- Trojans, viruses and hackers -- outside of the network, but data loss prevention (DLP) keeps the good stuff -- sensitive enterprise data -- in. With more business data leaks tainting ... Continue Reading
How to choose the best firewall for your enterprise
Learn how to choose the best firewall for your enterprise. This guide gives you purchasing advice, tells you which IT team is responsible for the perimeter security solution and offers a checklist of risks you must assess before making deciding ... Continue Reading
Firewall implementation: Perimeter security placement and management
For your enterprise firewall implementation, understand where your perimeter security goes, how many you need, what precautions to be aware of and know how to manage and maintain your firewall. Continue Reading
-
Cisco Information Security Specialist (CISS)
Cisco Information Security Specialist (CISS) is an entry-level certification attesting that the holder has demonstrated the foundational knowledge and skills required to install and support a Cisco Self-Defending Network... (Continued) Continue Reading
Audiobook: Intrusion Prevention Fundamentals
Intrusion Prevention Fundamentals: An introduction to network attack mitigation with IPS Continue Reading
dynamic packet filter
A dynamic packet filter is a firewall facility that can monitor the state of active connections and use this information to determine which network packets to allow through the firewall.Continue Reading
rule base
In the context of a computer server acting as a firewall, a rule base is a set of rules that govern what is and what is not allowed through the firewall.Continue Reading
Intrusion detection systems -- introduction to IDS and IPCop
This article, excerpted from the book "Configuring IPCop Firewalls: Closing Borders with Open Source," explores how intrusion detection systems (IDS) and intrusion prevention systems (IPS) including Snort and IPCop protect the network from malicious...Continue Reading
Network access control
No network security topic is hotter these days than network access control (NAC). The general concept behind NAC is to secure the network by giving it the power to decide which endpoint devices to let in, namely those that are compliant with all ...Continue Reading
Guide to network security
This guide introduces you to the main components in whole network security. You'll find articles, tutorials, tips, tools, white papers and more to pump up your network security quickly.Continue Reading
-
Open source network tools
Some of the most commonly used, enterprise-ready open source tools are used for networking applications; likewise, many networking tasks can be accomplished quickly and cheaply using open source tools. In this guide, we present advice and resources ...Continue Reading
Crash Course: Security patching and upgrades
Keeping your network safe and secure is a never ending job. Just when you think your defenses can't get any better, a new worm hits the net or a flaw is detected in your hardware. That's where security patching and upgrades come in. Get the latest ...Continue Reading
Crash Course: Firewalls
Firewalls aren't as simple as they used to be. Use our Crash Course to learn the latest and make sure your firewall is right for your network.Continue Reading
Turtle Firewall
Turtle Firewall is an open source firewall program written in Perl that supports Linux Kernels 2.4.x and iptables. Turtle Firewall was written by Andrea Frigido of Frisoft, and is available under the GNU Public License (GPL) .Continue Reading
Intrusion Detection and Prevention Learning Guide