Top five security service provider tips of 2007

Security service providers have spoken and the top security tips of 2007 are in. Nessus, Snort, Windows patch management and ethical hacking tools and techniques occupied security providers minds over the course of the year. Check out our top five tips of 2007 and make sure you're up to speed.

This Content Component encountered an error

Security service providers have spoken and the top security tips of 2007 are in. Nessus, Snort, Windows patch management and ethical hacking tools and techniques occupied security providers minds over the course of the year. Check out these top five tips of 2007 and make sure you're up to speed.

TIP #1----------------------------------------------------------------------------------------------

Nessus Tutorial: Using the open source vulnerability scanning tool
This guide will help you with the basics of Nessus -- a robust, free vulnerability scanning tool that fits your budget and matches commercial product feature sets. Use this expert step-by-step guidance to learn everything from installation and configuration techniques, to running a scan, to managing reports and interpreting results.

TIP #2----------------------------------------------------------------------------------------------

WSUS vs. SMS: Choosing a Windows patch management tool
If you formerly used Microsoft's Software Update Services to manage customers' patches there are several options for replacing SUS. Learn what the alternatives are and their pros and cons.

TIP #3----------------------------------------------------------------------------------------------

How to test Snort
You may need to test Snort to ensure that the open source IDS is detecting malicious activity on your client's network or to determine how the custom rule you wrote will impact Snort's performance. Learn best practices for testing Snort in this edition of Snort Report by intrusion detection expert Richard Bejtlich.

TIP #4----------------------------------------------------------------------------------------------

Network penetration testing: Ethical hacking tools and techniques
Learn about the ethical hacking tools and techniques needed to run an efficient network penetration test, including information gathering, port and vulnerability scanning, and password cracking.

TIP #5----------------------------------------------------------------------------------------------

Detect events without Snort IDS rules
Snort can perform several important detection tasks without any rules. In this edition of Richard Bejtlich's Snort Report, you will learn to run Snort IDS and analyze what it detects based on the Snort.conf file.


This was first published in December 2007

Dig deeper on Threat management and prevention

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

MicroscopeUK

SearchCloudProvider

SearchSecurity

SearchStorage

SearchNetworking

SearchCloudComputing

SearchConsumerization

SearchDataManagement

SearchBusinessAnalytics

Close