Understanding Intrusion Detection Systems [Online Code]

Number of Videos:2.75 hours – 45 lessonsUser Level:BeginnerAn outsider might be inside your network and ready to release attack traffic. A disgruntled employee might be inside your system and ready to delete files. You’re a systems or network admin and it’s your job to prevent these types of malicious events. Where do you begin? A

Number of Videos:2.75 hours – 45 lessons
User Level:Beginner
An outsider might be inside your network and ready to release attack traffic. A disgruntled employee might be inside your system and ready to delete files. You’re a systems or network admin and it’s your job to prevent these types of malicious events.

Where do you begin? A good start is knowing with some certainty that the attackers are even present and a good intrusion detection system will do just that. In this video, security expert Ric Messier explains why intrusion detection systems are necessary, what they do, how they work, where to find them, and how to implement them.

Understand intrusion detection: Its meaning, its value, and how to implement itMaster the workings of host-based and network-based intrusion detection systemsLearn about network captures, cryptographic hashes, alerting, incident response, and moreGain awareness of anomaly based and signature based intrusion detection systemsLearn to use open source intrusion detection systems like Snort, Suricata, and BroUnderstand how to perform file integrity checks using Tripwire and SamhainReview multiple forms of built-into-the-OS IDS systems

Ric Messier directs the Cybersecurity & Digital Forensics program at Champlain College in Burlington, VT. He runs the private security firm WasHere Consulting and is also a Senior Consultant with the security firm IP Architects, LLC. He is author of multiple O’Reilly security titles, including Professional Guide to Wireless Network Hacking and Penetration Testing, Introduction to Penetration Testing, and Mastering Python – Networking and Security.

Mac Minimum System Requirements:Mac Recommended System Requirements:Processor:   AnyRAM:   AnyHard Disk:   2GBVideo Card:   AnySupported OS:   Mac Yosemite 10.10, Mac Mavericks 10.9, Mac Mountain Lion 10.8, Mac Lion 10.7, Mac Snow Leopard 10.6, Mac Leopard 10.5, Mac OS X, Macintosh

Product Features

  • Learn Understanding Intrusion Detection Systems from a professional trainer on your own time at your own desk.
  • This visual training method offers users increased retention and accelerated learning.
  • Breaks even the most complex applications down into simplistic steps.

Goal-oriented email templates