Intrusion Prevention: Best Practices

IT Security    |    Beginner
  • 13 videos | 49m 56s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 13 users Rating 4.4 of 13 users (13)
Intrusion prevention helps one to detect and stop various attacks that other security components may miss. In this 13-video course, learners explore objectives and tools of intrusion prevention, including kernal attack prevention, vulnerability discovery, remediation strategies, scan detection, and evasion techniques. Begin by examining approaches to intrusion prevention systems (IPS), and how it differs from intrusion detection systems (IDS). Then take a look at options and deployment strategies for IPS; discover the advantages and disadvantages of various approaches to IPS, and view the role of IPS in preventing kernal attacks. Explore the methods used to discover vulnerabilities, and the remediation strategies related to intrusions. Next, learn how to block an attacker after too many failed login attempts; how to describe methods used in IPS to evade intrusions; and how to use tools, including netstat, to scan for potential intrusions on a local system. In the final two tutorials in this course, you will scan a system for potential malware infections using nmap, and use Suricata to implement a packet diversion for intrusion prevention.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe approaches to ips and how it differs from ids
    Describe options and deployment strategies for ips
    Describe advantages and disadvantages of various approaches to ips
    Describe the role of ips in preventing kernel attacks
    Describe methods used to discover vulnerabilities
    Describe remediation strategies related to intrusions
  • Block an attacker after too many failed login attempts
    Describe methods used in ips to evade intrusions
    Use tools to scan for potential intrusions on a local system
    Scan a system for potential malware infections using nmap
    Use suricata to implement a packet diversion for intrusion prevention
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 28s
  • 3m 55s
    Upon completion of this video, you will be able to describe approaches to intrusion prevention systems and how it differs from intrusion detection systems. FREE ACCESS
  • Locked
    3.  IPS Deployment Strategy
    3m 57s
    Upon completion of this video, you will be able to describe options and deployment strategies for intrusion prevention systems. FREE ACCESS
  • Locked
    4.  IPS Systems
    3m 35s
    After completing this video, you will be able to describe the advantages and disadvantages of various approaches to IPS. FREE ACCESS
  • Locked
    5.  Preventing Kernel Attacks
    3m 18s
    After completing this video, you will be able to describe the role of IPS in preventing kernel attacks. FREE ACCESS
  • Locked
    6.  Vulnerability Discovery
    4m 57s
    After completing this video, you will be able to describe methods used to discover vulnerabilities. FREE ACCESS
  • Locked
    7.  Remediation Strategies
    4m 15s
    After completing this video, you will be able to describe remediation strategies related to intrusions. FREE ACCESS
  • Locked
    8.  Brute-Force Prevention
    4m 13s
    Learn how to block an attacker after too many failed login attempts. FREE ACCESS
  • Locked
    9.  Evasion Techniques
    3m 49s
    After completing this video, you will be able to describe methods used in IPS to prevent intrusions. FREE ACCESS
  • Locked
    10.  Local System Awareness
    4m 59s
    In this video, you will learn how to use tools to scan for potential intrusions on your local system. FREE ACCESS
  • Locked
    11.  Detecting Malware Infections
    3m 1s
    In this video, find out how to scan a system for potential malware infections using Nmap. FREE ACCESS
  • Locked
    12.  Packet Diversion
    7m 18s
    In this video, you will use Suricata to implement a packet diversion for intrusion prevention. FREE ACCESS
  • Locked
    13.  Course Summary
    1m 11s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 4.7 of 27 users Rating 4.7 of 27 users (27)
Rating 4.5 of 139 users Rating 4.5 of 139 users (139)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 32 users Rating 4.6 of 32 users (32)
Rating 4.6 of 36 users Rating 4.6 of 36 users (36)
Rating 4.7 of 7 users Rating 4.7 of 7 users (7)