Intrusion Detection Training
Commitment | 5 Days, 7-8 hours a day. |
Language | English |
User Ratings | Average User Rating 4.8 See what learners said |
Price | REQUEST |
Delivery Options | Instructor-Led Onsite, Online, and Classroom Live |
COURSE OVERVIEW
Intrusion Detection Training delivers the technical knowledge, insight, and hands-on training you need to defend your network with confidence. You will learn about the underlying theory of TCP/IP and the most used application protocols, such as HTTP so that you can intelligently examine network traffic for signs of an intrusion. You will get plenty of practice learning to configure and master different open-source tools like tcpdump, Wireshark, Snort, Bro, and many more.
Our goal in Intrusion Detection Training is to acquaint you with the core knowledge, tools, and techniques to defend your networks. The training will prepare you to put your new skills and knowledge to work immediately upon returning to a live environment
WHAT'S INCLUDED?
- 5 days of Intrusion Detection Training with an expert instructor
- Intrusion Detection Electronic Study Guide
- Certificate of Completion
- 100% Satisfaction Guarantee
RESOURCES
- Intrusion Detection Training – https://www.wiley.com/
- Intrusion Detection – https://www.packtpub.com/
- Intrusion Detection – https://store.logicaloperations.com/
- Intrusion Detection – https://us.artechhouse.com/
- Intrusion Detection Training – https://www.amazon.com/
RELATED COURSES
- 5G Wireless Security Training
- Cloud Security Fundamentals Training
- Fundamentals of Information Systems Security Training
- Certified Ethical Hacking (CEH) Training v12
- CompTIA Security+ Certification Training (SY0-601)
- ICS/SCADA Security Essentials Training
- Intrusion Prevention Training
- Cybersecurity Foundations Training
- Cyber Threats Detection and Mitigation Training
- Cyber Threats Hunting (CCTHP) Training
- Cyber Threat Intelligence Analysis Training
- Cybersecurity Investigations and Network Forensics Analysis
ADDITIONAL INFORMATION
COURSE OBJECTIVES
Upon completing this Intrusion Detection Training course, learners will be able to meet these objectives:
- How to analyze traffic traversing your site to avoid becoming another “Hacked!” headline
- How to place, customize, and tune your IDS/IPS for maximum detection
- Hands-on detection, analysis, and network forensic investigation with a variety of open-source tools
- TCP/IP and common application protocols to gain insight into your network traffic, enabling you to distinguish normal from abnormal traffic
- The benefits of using signature-based, flow, and hybrid traffic analysis frameworks to augment detection
CUSTOMIZE IT
- We can adapt this Intrusion Detection Training course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this Intrusion Detection course, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the Intrusion Detection course around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Intrusion Detection Training course in a manner understandable to lay audiences.
AUDIENCE/TARGET GROUP
The target audience for this Intrusion Detection course:
- Network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of BIG-IP Access Policy Manager
CLASS PREREQUISITES
The knowledge and skills that a learner must have before attending this Intrusion Detection Training course are:
- Common Security and Network terminology
- TCP/IP addressing, routing, and internetworking concepts
COURSE SYLLABUS
Intrusion Detection Training
- Traffic Analysis Fundamentals
- Traffic Analysis and application controls
- Network monitoring
- Network traffic forensics
- Open-Source IDS: Snort and Bro
- Network Traffic Forensics and Monitoring
- Configure and run open-source Snort and write Snort signatures
- Configure and run open-source Bro to provide a hybrid traffic analysis framework
- Understand TCP/IP component layers to identify normal and abnormal traffic
- Use open-source traffic analysis tools to identify signs of an intrusion
- Comprehend the need to employ network forensics to investigate traffic to identify a possible intrusion
- Use Wireshark to carve out suspicious file attachments
- Write tcpdump filters to selectively examine a particular traffic trait
- Craft packets with Scapy
- Use the open-source network flow tool SiLK to find network behavior anomalies
- Use your knowledge of network architecture and hardware to customize the placement of IDS sensors and sniff traffic off the wire