Cybrary is the world's largest online cyber security community. Cybrary provides free online training in the form of self-paced, online videos that allow users to customize their learning based on their own personal needs. On this channel, you'll gain access to our exclusive live classroom events, hosted by our team of accomplished Subject Matter Experts in the cyber security and IT industries.
Combating Advanced Cyber-threats grows more challenging every day. Cyber criminals are cloaking their attacks within Secure Sockets Layer (SSL) traffic, knowing very well that perimeter security devices are blind to their exploits.
Despite solving the dilemma that all of your network security devices can have the ability to scrutinize SSL traffic with the right tools in place, the issue of maintaining user privacy is the next concern. How can you inspect SSL traffic for threats while maintaining the privacy of employee online banking, healthcare, and shopping transactions?
Increased SSL usage causes new headaches for IT security. Monitoring and enforcing compliance with internal and external standards for acceptable use of SSL encryption is difficult at best and needs to be able to look at ALL SSL traffic, not just port 443. Implementation of weak encryption keys and sub-par cipher suites often give organizations a false sense of security.
This workshop will provid Decision Makers and Security Practitioners with the knowledge to equip existing security devices to inspect SSL traffic and maintain high performance capabilities, while maintaining user privacy and enforcing SSL-usage standards, with a common criteria certified device.
Don’t miss this opportunity to learn more.
Note: You can only view this event logged into Cybrary's website.
Learn how to develop a defensive arsenal against some of today's most powerful cyber threats in Cybrary's first live classroom event. Post-Exploitation Hacking SME Joseph Perry will be presenting on the tools, process and practice strategies to mitigate cyber threats LIVE, and you're invited to have a front-row seat! Gain valuable knowledge on the defensive measures that matter most when protecting sensitive data.