Learn the basic concepts and techniques of Intrusion Detection Systems (IDS) and other network-related defense strategies. Students will set up, configure, and monitor an Intrusion Detection System utilizing different leading edge products. Current network defense strategies will be discussed and popular tools will be used. Students will be able to apply the correct IDS and defense strategies for different business’ goals.
Learning Objectives
Explain IDS/IPS terminology.
Select current IDS/IPS tools.
Assess the system’s configurations.
Assess system integrity
Measure abnormal activity patterns on the network.
Construct defense mechanisms.
Assess policy violations.
Validate policy violations.
Resolve abnormal activity.
Determine appropriate defense strategies.
Framework Connections
Specialty Areas
- Risk Management
- Cyber Defense Analysis
- Incident Response
- Digital Forensics
- Exploitation Analysis
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.