Intrusion Detection System Training
Our favourite subject, In addition to the many product vendors there are various vendor independent suppliers offering IDS training. The latter may allow you to sample a variety of different products and if they aren't regurgitating vendor information, may even present the products warts and all. Probably best suited to someone looking for an IDS solution or a security manager looking for IDS technology overview. However, if you have already purchased an IDS and wish to take your knowledge to the next level, then the vendor courses may be able to answer all those nagging queries you have outstanding.
This certification option is centered on Snort, the industry leading open source intrusion prevention solution. Candidates are assessed on a wide range of criteria that encompasses all the necessary open source components and technical skills for successf ...
This hands-on track offers a practical working knowledge in intrusion detection and traffic analysis, taught by top practitioners/authors in the field. This is the most advanced program in network intrusion detection that has ever been taught. All of the ...
Packet Analysis and Intrusion Detection 5 Day You'll learn how to properly read and interpret packets and packet headers including IP, TCP, ICMP, and UDP. You will learn how to distinguish between normal, abnormal, and malicious traffic. You will also c ...
The Intrusion Prevention training offered by InfoSec Institute covers all areas of intrusion prevention. Host Intrusion Prevention and Network Intrusion Prevention are covered in great detail. You will learn the technical details that make Intrusion Preve ...
In order to protect computer systems against hacker attacks, various firewalls are used today. Doubtlessly, firewalls increase IT security. However, firewalls cannot ward off all attacks. They are useless against attacks initiated from within the network ...
The Solaris Operating System Network Intrusion Detection course provides students with the knowledge and skills necessary to perform the advanced administration skills required to firewall, monitor, log, identify and respond to network security breaches.