Networks -- Data Highways and Hacker Haunts
Details
In this session, we'll cover the various means by which network configuration and interactions can lead to unwanted exposure and how to use more secure alternatives.
Also discussed: the all-important topic of network ports and how they can be exploited if left open.
Cloud Security
Web Security
Hacking
Information Security
