Hacking NGFW and NGIPS For Fun and Profits
Section - 1 Key Feature Differentiators between UTM, NGFW, Cisco ASA, and SIEM. Research Examples will be reserved for market leaders and comparing offerings associated with each. Section - 2 Popular Detection IDS & FW utilities and their usage in typical network topographies. Section - 3 Methods and Tool-sets for Evading Firewalls and IDS Evasion Countermeasures IDS & FW Abstract Methodology IDS & FW Penetration Testing Section - 4 Tools and Reporting Format utilized to translate and present metrics from auditing data. Creation of your own Virtual Testing Lab Section - 5 Advanced Malware Testing Advanced Evasion Techniques(APT) Testing