Workshop's eBook: Inside IDS Systems with SNORT and OSSIM. Learn the principles of intrusion detection process, algorithms used in IDS

Download
File
SNORT and OSSIM_epub.epub
PenTest_OSSIM.pdf

Table of Contents:


 

 

1) Intrusion detection systems (IDS).

Common theory on network attacks
Classifying attacks
First generation of IDS – history of creating and capabilities
Current generation IDS – capabilities and setup


 

2) Signature-based IDS algorithms.

Purpose of creating signature-based algorithms
Understanding of detection process
Signature-based algorithms benefits
Signature-based algorithms restrictions
Typical application for such algorithms


 

3) Statistical anomaly-based IDS algorithms.

Purpose of creating anomaly-based algorithms
Understanding of detection process
Anomaly-based algorithms benefits
Anomaly-based algorithms restrictions
Typical application for such algorithms


 

4) IDS with artificial intelligence anomaly detection.

Purpose of creating AI-based algorithms
Understanding of detection process
AI-based algorithms benefits
AI-based algorithms restrictions
Typical application for such algorithms
Methods of bypassing IDS with anomaly-based IDS


 

5) Typical methods of bypassing IDS.

Methods of bypassing IDS with signature-based IDS
Methods of bypassing IDS with anomaly-based IDS
Methods of bypassing IDS with AI-based IDS


 

6) Understanding SIEM-systems underlying principles and event correlation.

Mission of SIEMs
Understanding SIEM architecture
Event correlation algorithms
Benefits SIEM gives
Restrictions and typical problems with SIEM systems
Comparison of currently presented SIEMs on market
Future of SIEM and IDS development


 

Visit the original course:

Taking part in the course will get you:

  • More material;
  • Instructor's guidance;
  • Exercises and challenges;
  • Open discussion with the instructor and other students;
  • Certificate of Completion.

COURSES >>


Download
File
SNORT and OSSIM_epub.epub
PenTest_OSSIM.pdf

July 15, 2019
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Inline Feedbacks
View all comments

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013