Intrusion Detection
Course Description
Discover the tools commonly used to detect network intrusions, and either prevent them or alert staff to the intrusion attempt. Determine the appropriate location for placement of an intrusion detection system (IDS), and tune the rulesets used for an IDS so false positives are reduced. Use a variety of open-source tools, and learn to implement an appropriate IDS for a particular scenario.