Supporting Event: Certified Information Systems Security Professional (CISSP® ) certification (25 Jun 2018)

Supporting Event: Certified Information Systems Security Professional (CISSP® ) certification (25 Jun 2018)

Certified Information Systems Security Professional (CISSP®) certification Date: 25-29 June,...

Supporting Event: GDPR Hands-on workshop 2018 (26 Jun 2018)

GDPR Hands-on workshop 2018 Date: 26th June, 2018 (Tue)Time: 9:00am - 6:00PM (Whole day workshop...

Supporting: (ISC)2 Online Training Options (Especially for APAC based candidates)

Supporting: (ISC)2 Online Training Options (Especially for APAC based candidates)

1. CISSP Online Instructor-Led Training30 Apr - 27 Jun 2018 (19:00-21:30 | GMT+8)Training Only:...

  • Supporting Event: Certified Information Systems Security Professional (CISSP® ) certification (25 Jun 2018)

    Supporting Event: Certified Information Systems Security Professional (CISSP® ) certification (25...

  • Supporting Event: GDPR Hands-on workshop 2018 (26 Jun 2018)

  • Supporting: (ISC)2 Online Training Options (Especially for APAC based candidates)

    Supporting: (ISC)2 Online Training Options (Especially for APAC based candidates)

Software Defined Network and how can it help enhancing Cloud Security

Date: Apr 7, 2016 (Thur)

Time: 7:00 pm

Venue: Room Z414, Zone Z, The Hong Kong Polytechnic University, Hung Hom, Hong Kong

Fee: Free of charge

Registrationhttp://www.eventnook.com/event/csakse1604

 

Highlights:

SDN as defined by the Open Networking Foundation (ONF), is the physical separation of the network control plane from the forwarding plane and where the control plane controls several devices. In traditional, a SDN architecture departs from legacy solutions by building networks from three abstractions or layers. First, the infrastructure layer acts as the foundation for a SDN architecture. The infrastructure consists of both physical and virtual network devices such as switches and routers. These devices implement the OpenFlow protocol as a standards-based method of implementing traffic forwarding rules.

Second, the control layer consists of a centralized control plane for the entire network. The control plane is decoupled from the underlying infrastructure to provide a single centralized view of the entire network. The SDN controller provides this control layer and utilizes OpenFlow southbound to communicate with the infrastructure layer.

Third, the application layer consists of network services, orchestration tools, and business applications that interact with the control layer. These applications leverage open interfaces to communicate with the control layer and the network state. In particular, security vendors can put their effort on this layer to protect and defend the attacks from inside or outside of the network.

For more detail: http://www.eventnook.com/event/csakse1604

Contact: This email address is being protected from spambots. You need JavaScript enabled to view it.