
File | |
---|---|
SNORT and OSSIM_epub.epub | |
PenTest_OSSIM.pdf |
Table of Contents:
1) Intrusion detection systems (IDS).
Common theory on network attacks
Classifying attacks
First generation of IDS – history of creating and capabilities
Current generation IDS – capabilities and setup
2) Signature-based IDS algorithms.
Purpose of creating signature-based algorithms
Understanding of detection process
Signature-based algorithms benefits
Signature-based algorithms restrictions
Typical application for such algorithms
3) Statistical anomaly-based IDS algorithms.
Purpose of creating anomaly-based algorithms
Understanding of detection process
Anomaly-based algorithms benefits
Anomaly-based algorithms restrictions
Typical application for such algorithms
4) IDS with artificial intelligence anomaly detection.
Purpose of creating AI-based algorithms
Understanding of detection process
AI-based algorithms benefits
AI-based algorithms restrictions
Typical application for such algorithms
Methods of bypassing IDS with anomaly-based IDS
5) Typical methods of bypassing IDS.
Methods of bypassing IDS with signature-based IDS
Methods of bypassing IDS with anomaly-based IDS
Methods of bypassing IDS with AI-based IDS
6) Understanding SIEM-systems underlying principles and event correlation.
Mission of SIEMs
Understanding SIEM architecture
Event correlation algorithms
Benefits SIEM gives
Restrictions and typical problems with SIEM systems
Comparison of currently presented SIEMs on market
Future of SIEM and IDS development
Visit the original course:
Taking part in the course will get you:
- More material;
- Instructor's guidance;
- Exercises and challenges;
- Open discussion with the instructor and other students;
- Certificate of Completion.
File | |
---|---|
SNORT and OSSIM_epub.epub | |
PenTest_OSSIM.pdf |