Intrusion Prevention: Best Practices
IT Security
| Beginner
- 13 Videos | 49m 56s
- Includes Assessment
- Earns a Badge
Intrusion prevention helps one to detect and stop various attacks that other security components may miss. In this 13-video course, learners explore objectives and tools of intrusion prevention, including kernal attack prevention, vulnerability discovery, remediation strategies, scan detection, and evasion techniques. Begin by examining approaches to intrusion prevention systems (IPS), and how it differs from intrusion detection systems (IDS). Then take a look at options and deployment strategies for IPS; discover the advantages and disadvantages of various approaches to IPS, and view the role of IPS in preventing kernal attacks. Explore the methods used to discover vulnerabilities, and the remediation strategies related to intrusions. Next, learn how to block an attacker after too many failed login attempts; how to describe methods used in IPS to evade intrusions; and how to use tools, including netstat, to scan for potential intrusions on a local system. In the final two tutorials in this course, you will scan a system for potential malware infections using nmap, and use Suricata to implement a packet diversion for intrusion prevention.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursedescribe approaches to IPS and how it differs from IDSdescribe options and deployment strategies for IPSdescribe advantages and disadvantages of various approaches to IPSdescribe the role of IPS in preventing kernel attacksdescribe methods used to discover vulnerabilitiesdescribe remediation strategies related to intrusions
-
block an attacker after too many failed login attemptsdescribe methods used in IPS to evade intrusionsuse tools to scan for potential intrusions on a local systemscan a system for potential malware infections using nmapuse Suricata to implement a packet diversion for intrusion preventionsummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 28sUP NEXT
-
2.Intrusion Prevention Techniques3m 55s
-
3.IPS Deployment Strategy3m 57s
-
4.IPS Systems3m 35s
-
5.Preventing Kernel Attacks3m 18s
-
6.Vulnerability Discovery4m 57s
-
7.Remediation Strategies4m 15s
-
8.Brute-Force Prevention4m 13s
-
9.Evasion Techniques3m 49s
-
10.Local System Awareness4m 59s
-
11.Detecting Malware Infections3m 1s
-
12.Packet Diversion7m 18s
-
13.Course Summary1m 11s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.