Intrusion Detection and Response in Networked Environments


Overview/Description
To describe how to detect and respond to network intruders

Target Audience
Network administrators, firewall administrators, system administrators, application developers, and IT security officers

Prerequisites
A good knowledge of networking and internetworking, including a detailed knowledge of the OSI model and the TCP/IP protocol suite

Expected Duration
240 Minutes

Objectives:

Intrusion Detection and Response in Networked Environments

  • identify common targets for attack on a network.
  • discuss how to respond to potential combined attacks against a network.
  • discuss how to counteract IP-based attacks.
  • run a check for suspicious ports on a networked computer.
  • discuss the principles of detecting network intruders.
  • describe how to distract network intruders and limit the damage they can cause.
  • set up a decoy account and monitor both failed and successful login attempts.
  • describe the characteristics and features of intrusion detection systems.
  • describe the different types of intrusion detection mechanisms.
  • discuss the deployment of intrusion detection systems.
  • discuss how to respond to and manage computer-related security incidents.
  • recognize the functionality and deployment issues of intrusion detection.

  • Course Number: 69196_eng