Главная
Study mode:
on
1
Intro
2
The Problem
3
Overview
4
Building a Network
5
Traditional Hardware
6
Alternatives
7
Requirements
8
Device Placement
9
Virtualization Requirements
10
Price Analysis
11
Budgeting
12
Virtualization
13
Linux KVM
14
Virtual Server
15
Sourcing Hardware
16
Architecture Layout
17
Infrastructure Installation
18
PFsense Box
19
Mikrotik
20
Security
21
Testing
22
Freeradius
23
Virtual virtualization
24
Memory requirements
25
Malware execution
26
Conclusion
Description:
Learn how to effectively secure endpoints in this comprehensive 46-minute conference talk from HouSecCon 6 (2015). Explore the challenges of endpoint security, traditional hardware solutions, and innovative alternatives. Discover strategies for building a robust network, including device placement, virtualization requirements, and budgeting considerations. Dive into Linux KVM, virtual server setups, and hardware sourcing. Gain insights on infrastructure installation, security testing, and malware execution analysis. Master the implementation of PFsense, Mikrotik, and Freeradius for enhanced protection. Equip yourself with the knowledge to create a resilient and cost-effective endpoint security architecture.

Arm Your Endpoints

Add to list