Array ( [0] => 1 )
Intrusion, Detection, Attacks and Countermeasures
Description
This course teaches you how to recognize the various stages of attacks and intrusions: scanning, exploits, elevation of privilege, trojans and backdoors. Every attack is different. The source of an attack might be an automated tool, a script kiddy, or a security expert working for a foreign government, and the source strongly effects the style and timing of the attack.
Course Objectives
Identify vulnerable targets on your system
• Mitigate your security risks
• Recognize common and unusual attack patterns
• Create effective filters, honeypots, and firewalls
• Know and disable your enemies
• Recognize real detects versus false alarms, and know when to report them
• Set up your system to avoid false detects
• Evaluate ID systems and third-party tools
• Learn about automated response and manualresponse in relation to real-time analysis
• Propose and justify ID expenditures to management
Prerequesite
None
Who Should Attend
Intermediate to advanced, UNIX and NT system and network administrators, incident handling team members, information security and audit professionals, IP network managers.
Type
On-site & Public
Duration
2 days