Introduction
- TCP/IP for
Intrusion Detection
- Internet Security
Threats
- Common Hacker
Attacks
Intrusion
Detection
-
What is Intrusion Detection ?
-
Targets of an Itrusion Detection System
-
Network- versus Host-based Detection System
-
Structure of an Intrusion Detection System
-
Intrusion Detection Process
-
Limits of an Intrusion Detection System
Network-based
Intrusion Detection Systems
-
Introduction
-
Architecture
-
Distributed Network-Node System
-
Benefits
Host-based
Intrusion Detection Systems
-
Introduction
-
Architecture
-
Distributed Host-based System
-
Benefits
IDS
Signatures and Analysis
-
Concept
-
Common Vulnerabilities and Exposures
-
Normal Traffic Signatures
-
Abnormal Traffic Signatures
Open
Source IDS
-
Snort (Architecture, Installation, Configuration, Logs,..)
Business
Aspects
-
Requirements Definition
-
Tool Selection and Evaluation Process
Commercial
Intrusion Detection Tools
-
NFR, BlackICE, ISS, ....
Organizations
and Standards |