Cybersecurity workshops based on the DNS protocol
During the meeting, you will learn, among others:
- How does malware bypass NGFW-type security by hiding its communication in the DNS protocol?
- How long does data leakage in DNS queries take?
- What is DGA?
- What mechanisms do attackers use to hide their presence on your network?
- Protection and monitoring against these types of attacks.
A detailed agenda and registration form you can find HERE.
We will be very pleased if you want to join the group of specialists who want to share their knowledge and experience.