Jump to content
Welcome Guest!

Join us now to get access to all our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, and so, so much more. It's also quick and totally free, so what are you waiting for?

This site uses cookies! Learn More

This site uses cookies!

For providing our services, we do use cookies.
But get used, this is what most of modern web do!
However we have to warn you since we are obligated to so due to EU laws.

By continuing to use this site, you agree to allow us to store cookies on your computer. :)
And no, we will not eat your computer nor you will be able to eat those cookies :P

Sign in to follow this  

Understanding Intrusion Detection Systems Training Video -Infinite Skills

Recommended Posts


Understanding Intrusion Detection Systems Training Video - Infinite Skills
English | Size: 0.99 GB (1,059,256,402 Bytes)
Category: CBTs
Understanding Intrusion Detection Systems Training Video
An outsider might be inside your network and ready to release attack traffic. A disgruntled employee might be inside your system and ready to delete files. You're a systems or network admin and it's your job to prevent these types of malicious events.

Where do you begin? A good start is knowing with some certainty that the attackers are even present and a good intrusion detection system will do just that. In this video, security expert Ric Messier explains why intrusion detection systems are necessary, what they do, how they work, where to find them, and how to implement them.

* Understand intrusion detection: Its meaning, its value, and how to implement it
* Master the workings of host-based and network-based intrusion detection systems
* Learn about network captures, cryptographic hashes, alerting, incident response, and more
* Gain awareness of anomaly based and signature based intrusion detection systems
* Learn to use open source intrusion detection systems like Snort, Suricata, and Bro
* Understand how to perform file integrity checks using Tripwire and Samhain
* Review multiple forms of built-into-the-OS IDS systems

Download link:





Links are Interchangeable - No Password - Single Extraction

Share this post

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

Sign in to follow this