Secure a Home Network Like a Hack!

In this blog, let’s build a procedure, using open source tools, to secure like a cyber security professional an example of network, a home network, simple as that! Introduction Definitely, a home network like it sounds looks easy : a small router that gives access to internet with basic features, a local area network with…...

Paid one time Membership Required

You must be a Paid one time member to access this content.

Join Now

Already a member? Log in here
Read More

IDS/IPS General Function

In this blog, we talk about the general idea about using and IDS or IPS. let’s recall that IDS/IPS stands for intrusion detection and prevention systems. We give examples of implementations of vendors and leaders of the market. Scope of an IDS/IPS Let’s start from a basic setup: clients that try to access ressources on…

Read More

WAFing… A Grasp Of Web Application Firewalling

Introduction Dans cet article nous discutons de la fonction de base d’un WAF ou pare-feu d’applications web. Comme son nom l’indique il s’agit de sécuriser l’application, plus précisemment l’accès à cette application, et ne se préoccupe pas nécessairement d’autres aspects sécuritaires : réseau, d’autres applicatifs (niveau 7 OSI) ou de transport (niveau 4 et 5…

Read More

Setup A Checkpoint Lab Using VirtualBox And GNS3 On Windows

In this blog, we will setup a Checkpoint lab using virtualbox and gns3 on windows. Introduction In this lab we implement a basic security architecture to demonstrate the operation of a firewall cluster to protect our network. Our “security domain” is segmented into four zones: Security topology Our security topology is compound by two security…...

Free level Membership Required

You must be a Free level member to access this content.

Join Now

Already a member? Log in here
Read More