Answering the question: "How do firewalls and intrusion-detection systems work?" This video covers operational security for enterprise networks, in particular rule-based and flow-based packet filtering.
Based on Computer Networking: A Top-Down Approach 8th edition, Chapter 9.
Slides are copyright 1996-2020 J.F. Kurose, K.W. Ross All Rights Reserved., and freely available here: [ Ссылка ]
Background music: [ Ссылка ]
Ещё видео!