Intrusion Detection: Best Practices
Beginner
- 14 Videos | 45m 56s
- Includes Assessment
- Earns a Badge
Intrusion detection systems (IDS) allow you to monitor traffic and send alerts when abnormal activities have been detected. In this 14-video course, you will explore concepts of traffic analysis and IDS, including network forensic analysis, sniffing and sensors, signal and noise, and brute force analysis. To begin, you will examine approaches to network security through traffic analysis, then take a look at tools and techniques used by IDS. Learners will also explore the network forensic approach to computer networks; learn how to describe types of application controls that can be used for traffic analysis; placement and use of sniffing and IDS sensors; and examine concepts of signal and noise when it comes to network traffic analysis. You will learn how to perform IDS with Snort with a sample ruleset; configure Bro to detect common attack patterns; use Wireshark to inspect network packets; and perform nmap scans with methods to evade IDS detection. In the final tutorials, you will perform brute force analysis with nmap, and a mock denial of service (DoS) attack with nmap.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursedescribe the approaches to network security through traffic analysisdescribe the tools and techniques used by intrusion detection systemsdescribe the network forensic approach to computer networksdescribe the types of application controls that can be used for traffic analysisdescribe the placement and use of sniffing and IDS sensorsdescribe the concepts of signal and noise when it comes to network traffic analysis
-
perform IDS with Snort using a sample rulesetconfigure Bro to detect a common attack patternuse Wireshark to inspect network packetsperform nmap scans using methods to evade IDS detectionperform a brute force analysis with nmapperform a mock DOS attack with nmapsummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 26sUP NEXT
-
2.Traffic Analysis for Network Security4m 43s
-
3.Intrusion Detection Techniques3m 19s
-
4.Network Forensic Analysis2m 46s
-
5.Application Control Types3m 16s
-
6.Sniffing and Sensors2m 50s
-
7.Signal and Noise3m 15s
-
8.IDS with Snort5m 15s
-
9.IDS with Bro3m 18s
-
10.Wireshark Network Monitoring2m 46s
-
11.Evading IDS with nmap3m 46s
-
12.Brute Force Analysis3m 30s
-
13.DOS Attack with nmap4m 42s
-
14.Course Summary1m 4s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.YOU MIGHT ALSO LIKE

COURSE
Discovery and Attack Vectors