Intrusion Prevention: Best Practices
IT Security
| Beginner
- 13 videos | 49m 56s
- Includes Assessment
- Earns a Badge
Intrusion prevention helps one to detect and stop various attacks that other security components may miss. In this 13-video course, learners explore objectives and tools of intrusion prevention, including kernal attack prevention, vulnerability discovery, remediation strategies, scan detection, and evasion techniques. Begin by examining approaches to intrusion prevention systems (IPS), and how it differs from intrusion detection systems (IDS). Then take a look at options and deployment strategies for IPS; discover the advantages and disadvantages of various approaches to IPS, and view the role of IPS in preventing kernal attacks. Explore the methods used to discover vulnerabilities, and the remediation strategies related to intrusions. Next, learn how to block an attacker after too many failed login attempts; how to describe methods used in IPS to evade intrusions; and how to use tools, including netstat, to scan for potential intrusions on a local system. In the final two tutorials in this course, you will scan a system for potential malware infections using nmap, and use Suricata to implement a packet diversion for intrusion prevention.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe approaches to ips and how it differs from idsDescribe options and deployment strategies for ipsDescribe advantages and disadvantages of various approaches to ipsDescribe the role of ips in preventing kernel attacksDescribe methods used to discover vulnerabilitiesDescribe remediation strategies related to intrusions
-
Block an attacker after too many failed login attemptsDescribe methods used in ips to evade intrusionsUse tools to scan for potential intrusions on a local systemScan a system for potential malware infections using nmapUse suricata to implement a packet diversion for intrusion preventionSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 28s
-
3m 55sUpon completion of this video, you will be able to describe approaches to intrusion prevention systems and how it differs from intrusion detection systems. FREE ACCESS
-
3m 57sUpon completion of this video, you will be able to describe options and deployment strategies for intrusion prevention systems. FREE ACCESS
-
3m 35sAfter completing this video, you will be able to describe the advantages and disadvantages of various approaches to IPS. FREE ACCESS
-
3m 18sAfter completing this video, you will be able to describe the role of IPS in preventing kernel attacks. FREE ACCESS
-
4m 57sAfter completing this video, you will be able to describe methods used to discover vulnerabilities. FREE ACCESS
-
4m 15sAfter completing this video, you will be able to describe remediation strategies related to intrusions. FREE ACCESS
-
4m 13sLearn how to block an attacker after too many failed login attempts. FREE ACCESS
-
3m 49sAfter completing this video, you will be able to describe methods used in IPS to prevent intrusions. FREE ACCESS
-
4m 59sIn this video, you will learn how to use tools to scan for potential intrusions on your local system. FREE ACCESS
-
3m 1sIn this video, find out how to scan a system for potential malware infections using Nmap. FREE ACCESS
-
7m 18sIn this video, you will use Suricata to implement a packet diversion for intrusion prevention. FREE ACCESS
-
1m 11s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.