About Session
- • Methodologies for testing firewall configurations without operational disruption
- • Using packet capture tools to verify firewall behavior
- • Protocol compliance testing
- • Introduction to digital twins for modeling and simulation
- • Simulating common attack vectors to verify protection
Lab Exercise: Testing and validating the implemented ruleset