Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by University of Twente. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by University of Twente or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Defense techniques

 
Share
 

Manage episode 310646532 series 3066353
Content provided by University of Twente. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by University of Twente or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
This lecture discusses two main techniques to protect your network: Intrusion Detection Systems (IDS) and Firewalls. The IDS part discusses host-based versus network-based ID systems, passive versus reactive systems, as well as the main operation of an IDS (data capturing, signature versus anomaly-based operation). The firewall part compares different kind of firewalls: network-level, transport-level as well as application-level firewalls, and discusses stateless versus stateful systems. the lec
  continue reading

5 episodes

Artwork

Defense techniques

Network Security

published

iconShare
 
Manage episode 310646532 series 3066353
Content provided by University of Twente. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by University of Twente or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
This lecture discusses two main techniques to protect your network: Intrusion Detection Systems (IDS) and Firewalls. The IDS part discusses host-based versus network-based ID systems, passive versus reactive systems, as well as the main operation of an IDS (data capturing, signature versus anomaly-based operation). The firewall part compares different kind of firewalls: network-level, transport-level as well as application-level firewalls, and discusses stateless versus stateful systems. the lec
  continue reading

5 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Listen to this show while you explore
Play