Learn the basic concepts and techniques of Intrusion Detection Systems (IDS) and other network-related defense strategies. Students will set up, configure, and monitor an Intrusion Detection System utilizing different leading edge products. Current network defense strategies will be discussed and popular tools will be used. Students will be able to apply the correct IDS and defense strategies for different business’ goals.
Explain IDS/IPS terminology.
Select current IDS/IPS tools.
Assess the system’s configurations.
Assess system integrity
Measure abnormal activity patterns on the network.
Construct defense mechanisms.
Assess policy violations.
Validate policy violations.
Resolve abnormal activity.
Determine appropriate defense strategies.