Ixia Cyber Combat

April 2nd, 2019

Ixia Cyber Combat

Ukraine » 
April 2nd, 2019

Event Website

InfoSec Conference Summary

The description was submitted by the Conference Organizer. We sometimes edit it to enhance the listing.

Hackers around the world hone their skills by regularly competing in building an attack strategy! What we, the defenders of corporate information security systems, worse? To defeat the enemy, you need to practice a lot and be able to put yourself in his place. Now this opportunity will be available to all security specialists who want to become real cyber warriors!

Register for the first cyberpolygon Ixia Cyber ​​Combat in Europe and the CIS, where information security fans learn to identify and reflect any cyber attacks in the traffic flow. For the simulation, we will combine in a single environment monitoring tools, detection and protection against threats, as well as a generator of realistic BreakingPoint traffic from Ixia, which includes viruses and all kinds of attacks.

The main goal of the training is to teach the correct use of equipment for detecting and repelling threats (WAF, NGFW, ADS, NPM, SIEM). At the same time, a potential participant does not need to have any special knowledge – the basic understanding of the solutions of F5 Networks, Palo Alto Networks, AlienVault and Flowmon Networks, which will be used to repel attacks simulated by Ixia Breaking Point, will suffice.

For those who still doubt their abilities, there is good news: our cyber examiners will help you with all the tasks. Each of them will be assigned to a team of 2 participants and will help to cope with any questions to identify and repel threats. Within the rules, of course. They will also be happy to answer any question regarding the information security system in your organization.

Submit a review for this event.

Did you attend Ixia Cyber Combat? Let us know how it was and share your experience with the greater community.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.