Intrusion Detection System: Deployment

WBSVR17

Enrollment
Home

Cloud Computing

Computer Education Techniques and CETi Technology Partners

The CETi course search engine reflects an independent aggregation and evaluation of proprietary software and open source software websites and information technology training subject matter, course offerings, and training services.

 

DURATION: 4 days

FEE: $1,580
Call for group fee.

AUDIENCE:

  • Security Analyst
  • Web Designer
  • Webmaster
  • Network Administrator
  • System Analyst
  • System Designer

DATES:

MAJOR TOPICS:
  • Intrusion detection
  • Network security tools
  • IDS role
  • IDS internetwork topology deployment
  • Monitoring traffic at the network border
  • Traffic analysis on switched networks
  • Firewall architecture
  • Sensor network architecture
  • Hacking techniques - recognizing
  • Points of attack - determining
  • Mapping out the territory
  • IDS - detecting probes and scans
  • Attacks - detecting in progress
  • Buffer overruns - how they are crafted
  • Denial of service attacks - detecting
  • Protocol analyzers - protecting against misuse
  • Attacks
  • IDS - managing and maintaining
  • Automating responses
  • ISS Realsecure
  • NFR: Network Flight Recorder
  • Custom attack signatures - developing
  • IDSs
 
Contact Me
Send Outline
Distance-learning
Private Course - Tailored
Send to a Colleague

 

Effective February 27, 2012, the course dates listed on CETi and technology partner websites only will be available based upon approved and authorized user ID.

The course material and training aids utilized in Computer Education Techniques web-based and instructor-led courses are from multiple sources: courseware generated by staff members, licensed materials, textbooks, source vendor documentation, and open education resources.

Not all courses are available for delivery in a distance-learning medium.

Certain courses only should be taught by the source software company training company and open source purveyor.

 


Copyright Acknowledgement: The software product(s) listed in this course search engine are owned and copyrighted by their respective companies. CETi makes no representation regarding ownership in any of the software products that we train on.

Computer Education Techniques and its technology partner courses are not intended for or available to the general public. They are for employees from Fortune 1000 companies, government municipalities, consulting companies, healthcare providers, and mid-sized businesses. Individuals attending such courses will be required to execute a statement acknowledging that the employer will be paying for them to attend a course and has a licensed version of the software.