Intrusion Detection: Best Practices
Beginner
- 14 videos | 45m 56s
- Includes Assessment
- Earns a Badge
Intrusion detection systems (IDS) allow you to monitor traffic and send alerts when abnormal activities have been detected. In this 14-video course, you will explore concepts of traffic analysis and IDS, including network forensic analysis, sniffing and sensors, signal and noise, and brute force analysis. To begin, you will examine approaches to network security through traffic analysis, then take a look at tools and techniques used by IDS. Learners will also explore the network forensic approach to computer networks; learn how to describe types of application controls that can be used for traffic analysis; placement and use of sniffing and IDS sensors; and examine concepts of signal and noise when it comes to network traffic analysis. You will learn how to perform IDS with Snort with a sample ruleset; configure Bro to detect common attack patterns; use Wireshark to inspect network packets; and perform nmap scans with methods to evade IDS detection. In the final tutorials, you will perform brute force analysis with nmap, and a mock denial of service (DoS) attack with nmap.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe the approaches to network security through traffic analysisDescribe the tools and techniques used by intrusion detection systemsDescribe the network forensic approach to computer networksDescribe the types of application controls that can be used for traffic analysisDescribe the placement and use of sniffing and ids sensorsDescribe the concepts of signal and noise when it comes to network traffic analysis
-
Perform ids with snort using a sample rulesetConfigure bro to detect a common attack patternUse wireshark to inspect network packetsPerform nmap scans using methods to evade ids detectionPerform a brute force analysis with nmapPerform a mock dos attack with nmapSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 26s
-
4m 43sUpon completion of this video, you will be able to describe the approaches to network security through traffic analysis. FREE ACCESS
-
3m 19sAfter completing this video, you will be able to describe the tools and techniques used by intrusion detection systems. FREE ACCESS
-
2m 46sAfter completing this video, you will be able to describe the computer network forensic approach. FREE ACCESS
-
3m 16sUpon completion of this video, you will be able to describe the types of application controls that can be used for traffic analysis. FREE ACCESS
-
2m 50sUpon completion of this video, you will be able to describe the placement and use of sniffing and IDS sensors. FREE ACCESS
-
3m 15sAfter completing this video, you will be able to describe the concepts of signal and noise when it comes to network traffic analysis. FREE ACCESS
-
5m 15sFind out how to perform IDS with Snort using a sample ruleset. FREE ACCESS
-
3m 18sIn this video, you will configure Bro to detect a common attack pattern. FREE ACCESS
-
2m 46sLearn how to use Wireshark to inspect network traffic. FREE ACCESS
-
3m 46sIn this video, you will perform nmap scans using methods to avoid IDS detection. FREE ACCESS
-
3m 30sDuring this video, you will learn how to perform a brute force attack with nmap. FREE ACCESS
-
4m 42sIn this video, you will perform a mock Denial of Service attack with nmap. FREE ACCESS
-
1m 4s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.