top of page

Recent Talks for Network Administrators

Archive of Talks for Network Administrators

If you would like a copy of any of the materials listed in any of the talks and presentations below please contact me.

Nebraska State June 2013

NE State 2013 Best Practices PPT
BYOInsecurity Wireless Afternoon Lab 
BYO(D) Managment and Control Morning Lab


Resources

12 Steps to Bring Your Own Device (BYOD) Success
Advanced Threat Report-Fire eye
Avoiding Common Pitfalls of Evaluating and Implementing DCIM Solutions
ARP Spoofing Tutorial
BYOD-Trends
Defending Against Compromised Certificates
Defence against Drive-By Downloads
FAQ for Small and Medium Business Mobile Security
Forrester How iPads Are Opening the Doors to Hackers
Hacking Tools
Hardening Authentication
Hardening Network Infrastructure
Internet Security Threat Report 2013
IPV6 Firewall Requirements
Minimize Effectiveness of SQL Injection Attacks
Mitigations Guidance for Distributed Denial of Service Attacks
Monitoring Your Infrastructure
Port Security on Cisco Access Switches
Protect Against Cross Site Scripting (XSS) Attacks
Reducing the Effectiveness of Pass-the-Hash
Security Information Management Systems and Application Monitoring
Service Oriented Architecture Security Vulnerabilities - Web Services 
Sophos Mobile Device Security
White Paper-Disaster Preparedness
WIFI Best Practices To-Do list for home users

bottom of page
Cookie Settings