Intrusion Detection: Best Practices

Beginner
  • 14 videos | 45m 56s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 9 users Rating 4.4 of 9 users (9)
Intrusion detection systems (IDS) allow you to monitor traffic and send alerts when abnormal activities have been detected. In this 14-video course, you will explore concepts of traffic analysis and IDS, including network forensic analysis, sniffing and sensors, signal and noise, and brute force analysis. To begin, you will examine approaches to network security through traffic analysis, then take a look at tools and techniques used by IDS. Learners will also explore the network forensic approach to computer networks; learn how to describe types of application controls that can be used for traffic analysis; placement and use of sniffing and IDS sensors; and examine concepts of signal and noise when it comes to network traffic analysis. You will learn how to perform IDS with Snort with a sample ruleset; configure Bro to detect common attack patterns; use Wireshark to inspect network packets; and perform nmap scans with methods to evade IDS detection. In the final tutorials, you will perform brute force analysis with nmap, and a mock denial of service (DoS) attack with nmap.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe the approaches to network security through traffic analysis
    Describe the tools and techniques used by intrusion detection systems
    Describe the network forensic approach to computer networks
    Describe the types of application controls that can be used for traffic analysis
    Describe the placement and use of sniffing and ids sensors
    Describe the concepts of signal and noise when it comes to network traffic analysis
  • Perform ids with snort using a sample ruleset
    Configure bro to detect a common attack pattern
    Use wireshark to inspect network packets
    Perform nmap scans using methods to evade ids detection
    Perform a brute force analysis with nmap
    Perform a mock dos attack with nmap
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 26s
  • 4m 43s
    Upon completion of this video, you will be able to describe the approaches to network security through traffic analysis. FREE ACCESS
  • Locked
    3.  Intrusion Detection Techniques
    3m 19s
    After completing this video, you will be able to describe the tools and techniques used by intrusion detection systems. FREE ACCESS
  • Locked
    4.  Network Forensic Analysis
    2m 46s
    After completing this video, you will be able to describe the computer network forensic approach. FREE ACCESS
  • Locked
    5.  Application Control Types
    3m 16s
    Upon completion of this video, you will be able to describe the types of application controls that can be used for traffic analysis. FREE ACCESS
  • Locked
    6.  Sniffing and Sensors
    2m 50s
    Upon completion of this video, you will be able to describe the placement and use of sniffing and IDS sensors. FREE ACCESS
  • Locked
    7.  Signal and Noise
    3m 15s
    After completing this video, you will be able to describe the concepts of signal and noise when it comes to network traffic analysis. FREE ACCESS
  • Locked
    8.  IDS with Snort
    5m 15s
    Find out how to perform IDS with Snort using a sample ruleset. FREE ACCESS
  • Locked
    9.  IDS with Bro
    3m 18s
    In this video, you will configure Bro to detect a common attack pattern. FREE ACCESS
  • Locked
    10.  Wireshark Network Monitoring
    2m 46s
    Learn how to use Wireshark to inspect network traffic. FREE ACCESS
  • Locked
    11.  Evading IDS with nmap
    3m 46s
    In this video, you will perform nmap scans using methods to avoid IDS detection. FREE ACCESS
  • Locked
    12.  Brute Force Analysis
    3m 30s
    During this video, you will learn how to perform a brute force attack with nmap. FREE ACCESS
  • Locked
    13.  DOS Attack with nmap
    4m 42s
    In this video, you will perform a mock Denial of Service attack with nmap. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 4s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.2 of 180 users Rating 4.2 of 180 users (180)
Rating 4.6 of 63 users Rating 4.6 of 63 users (63)
Rating 4.5 of 202 users Rating 4.5 of 202 users (202)