Network Security Fundamentals [Electronic resources]

Gert De Laet, Gert Schauwers

نسخه متنی -صفحه : 196/ 144
نمايش فراداده

SANS Initiatives and Programs

Some of the programs of the SANS Institute are as follows:

  • Information security training: intensive This immersion training is designed to help you master the practical steps necessary for defending systems and networks against the most dangerous attacks.

  • The GIAC certification program The Global Information Assurance Certification (GIAC) was founded in 1999 by SANS and offers certifications that address multiple specialty areas (security essentials, intrusion detection, incident handling, and more).

  • Consensus security awareness training This training makes users aware that even a tightly secured system can be compromised when a user accidentally opens back doors that allow malicious code to enter the network.

  • SANS weekly bulletins and alerts Newsletters and alerts are sent out to about 200,000 people.

  • SANS information security reading room This area on the website contains more than 1,200 papers about up-to-date topics of interest to security professionals.

  • SANS Step-By-Step Guides Security professionals have been working together to compile step-to-step guides for hardening operating systems and applications.

  • The SANS Security Policy Project Here you can find a set of field-proven security policies. This part will be discussed in more detail in the next section.

  • Vendor-related resources This section contains tools and outside support resources.

  • Information security glossary This area offers a glossary of common terms.

  • Internet Storm Center The Storm Center is a powerful tool for detecting rising Internet threats. The Storm Center uses advanced data correlation and visualization techniques to analyze data collected from more than 3,000 firewalls and intrusion detection systems in more than 60 countries.

  • SCORE Security Consensus Operational Readiness Evaluation (SCORE) is a community of security professionals from a wide range of organizations and backgrounds working to develop consensus regarding minimum standards and best practice information.

  • SANS/FBI annual top 20 Internet security vulnerability list This list covers over 230 well-known, often-exploited vulnerabilities.

  • Intrusion detection FAQ These are frequently asked questions about intrusion detection and answers to those questions.