Tip

Top five security service provider tips of 2007

Editors at SearchSecurityChannel.com

Security service providers have spoken and the top security tips of 2007 are in. Nessus, Snort, Windows patch management and ethical hacking tools and techniques occupied security providers minds over the course of the year. Check out these top five tips of 2007 and make sure you're up to speed.

TIP #1----------------------------------------------------------------------------------------------

    Requires Free Membership to View

Nessus Tutorial: Using the open source vulnerability scanning tool
This guide will help you with the basics of Nessus -- a robust, free vulnerability scanning tool that fits your budget and matches commercial product feature sets. Use this expert step-by-step guidance to learn everything from installation and configuration techniques, to running a scan, to managing reports and interpreting results.

TIP #2----------------------------------------------------------------------------------------------

WSUS vs. SMS: Choosing a Windows patch management tool
If you formerly used Microsoft's Software Update Services to manage customers' patches there are several options for replacing SUS. Learn what the alternatives are and their pros and cons.

TIP #3----------------------------------------------------------------------------------------------

How to test Snort
You may need to test Snort to ensure that the open source IDS is detecting malicious activity on your client's network or to determine how the custom rule you wrote will impact Snort's performance. Learn best practices for testing Snort in this edition of Snort Report by intrusion detection expert Richard Bejtlich.

TIP #4----------------------------------------------------------------------------------------------

Network penetration testing: Ethical hacking tools and techniques
Learn about the ethical hacking tools and techniques needed to run an efficient network penetration test, including information gathering, port and vulnerability scanning, and password cracking.

TIP #5----------------------------------------------------------------------------------------------

Detect events without Snort IDS rules
Snort can perform several important detection tasks without any rules. In this edition of Richard Bejtlich's Snort Report, you will learn to run Snort IDS and analyze what it detects based on the Snort.conf file.


This was first published in December 2007

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.