Intrusion Training Courses and Workshops

Schools providing training courses, certificates, diplomas or degree programs of Intrusion Detection/Protection Systems




Total 174 training courses and degree programs available around the world.

United States - United Kingdom - Canada - Australia - India

Popular courses:
Implementing Cisco Intrusion Prevention System
Cisco Intrusion Prevention System
IBM Security Network Intrusion Prevention System 4.6 Config and Deployment
Intrusion Detection
Junos Intrusion Prevention System Functionality
Juniper Junos Intrusion Prevention System Functionality


Junos Intrusion prevention System Functionality

Course Format: Classroom
School/Trainer: Global Knowledge USA
Training Center(s)/Venue(s): Arlington, Atlanta, Cary, Irving, Morristown, New York City, Santa Clara, Schaumburg, Seattle, United States
  V

This two-day course is designed to provide an introduction to the Intrusion Prevention System (IPS) feature set available on the Juniper Networks SRX Series Services Gateway. The course covers concepts, ideas, and terminology relating to providing intrusion prevention using the SRX Series platform. Hands-on labs offer students the opportunity to configure various IPS features and to test and analyze those functions. This course is based on the Junos operating system Release 12.1X44-D10.4.

Content
Overview of IPS Functionality
Reasons for Network Attacks
Categories of Attacks
Anatomy of an Attack
IPS Mechanisms on SRX Series Devices
Lab 1: Initial Configuration
Initial Device Configuration
Deployment Options for IPS Functionality
Management Options
Network Settings
Preparing the SRX Series Device for IPS Features
Lab 2: Initial IDP Setup
IPS Terminology and Concepts
Terminology Overview
Attack Objects
IPS Rulebase Details
Rule Match Conditions
Rule Actions
Terminal Rules
IP Actions
Notification
Terminology Review
IPS Traffic Flow ... [Read More]

CyberSec First Responder: Threat Detection and Response (Certificate)

Course Format: Classroom
School/Trainer: Global Knowledge USA
Training Center(s)/Venue(s): Arlington, Atlanta, Cary, Irving, Morristown, New York City, Santa Clara, Schaumburg, Seattle, United States
  V


This course covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size of the organization, this individual may act alone or may be a member of a computer security incident response team (CSIRT). The course introduces strategies, frameworks, methodologies, and tools to manage cybersecurity risks, identify various types of common threats, design and operate secure computing and networking environments, assess and audit the organization&,#146,s security, collect, and analyze cybersecurity intelligence, and handle incidents as they occur. The course also covers closely related information assurance topics such as auditing and forensics to provide a sound basis for a comprehensive approach to security aimed toward those on the front lines of defense. In addition, this course can help students who are looking to fulfill DoD directive 8570.01 for information assurance (IA) training. This program is designed for personnel performing IA functions, establishing IA policies and implementing security measures and procedures fo... [Read More]

Implementing Cisco Intrusion Prevention System

Course Format: Classroom
School/Trainer: Global Knowledge USA
Training Center(s)/Venue(s): Arlington, Atlanta, Cary, Irving, Morristown, New York City, Santa Clara, Schaumburg, Seattle, United States
  V

This five-day course is designed to provide network security engineers with the knowledge and skills needed to deploy Cisco Intrusion Prevention System (IPS)-based security solutions. Successful delegates will be able to reduce the risk to the IT infrastructure and applications using Cisco IPS features, and provide detailed operations support for the Cisco IPS.

Introduction to Intrusion Prevention and Detection, Cisco IPS Software, and Supporting Devices
Evaluating Intrusion Prevention and Intrusion Detection Systems
Choosing Cisco IPS Software, Hardware, and Supporting Applications
Evaluating Network IPS Traffic Analysis Methods, Evasion Possibilities, and Anti-Evasive Countermeasures
Choosing a Network IPS and IDS Deployment Architecture

Installing and Maintaining Cisco IPS Sensors
Integrating the Cisco IPS Sensor into a Network
Performing the Cisco IPS Sensor Initial Setup
Managing Cisco IPS Devices

Applying Cisco IPS Security Policies
Configuring Basic Traffic Analysis
Implementing Cisco IPS Signatures and Responses
Configuring Cisco IPS Signature Engines and the Signature Databa... [Read More]

Junos Intrusion prevention System Functionality

Course Format: Classroom
School/Trainer: Global Knowledge Canada
Training Center(s)/Venue(s): Halifax, Mississauga, Montreal, Ottawa, Toronto, Winnipeg, Canada
  V

This two-day course is designed to provide an introduction to the Intrusion Prevention System (IPS) feature set available on the Juniper Networks SRX Series Services Gateway. The course covers concepts, ideas, and terminology relating to providing intrusion prevention using the SRX Series platform. Hands-on labs offer students the opportunity to configure various IPS features and to test and analyze those functions. This course is based on the Junos operating system Release 12.1X44-D10.4.

Content
Overview of IPS Functionality
Reasons for Network Attacks
Categories of Attacks
Anatomy of an Attack
IPS Mechanisms on SRX Series Devices
Lab 1: Initial Configuration
Initial Device Configuration
Deployment Options for IPS Functionality
Management Options
Network Settings
Preparing the SRX Series Device for IPS Features
Lab 2: Initial IDP Setup
IPS Terminology and Concepts
Terminology Overview
Attack Objects
IPS Rulebase Details
Rule Match Conditions
Rule Actions
Terminal Rules
IP Actions
Notification
Terminology Review
IPS Traffic Flow ... [Read More]

CyberSec First Responder: Threat Detection and Response (Certificate)

Course Format: Classroom
School/Trainer: Global Knowledge Canada
Training Center(s)/Venue(s): Halifax, Mississauga, Montreal, Ottawa, Toronto, Winnipeg, Canada
  V


This course covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size of the organization, this individual may act alone or may be a member of a computer security incident response team (CSIRT). The course introduces strategies, frameworks, methodologies, and tools to manage cybersecurity risks, identify various types of common threats, design and operate secure computing and networking environments, assess and audit the organization&,#146,s security, collect, and analyze cybersecurity intelligence, and handle incidents as they occur. The course also covers closely related information assurance topics such as auditing and forensics to provide a sound basis for a comprehensive approach to security aimed toward those on the front lines of defense. In addition, this course can help students who are looking to fulfill DoD directive 8570.01 for information assurance (IA) training. This program is designed for personnel performing IA functions, establishing IA policies and implementing security measures and procedures fo... [Read More]

Implementing Cisco Intrusion Prevention System

Course Format: Classroom
School/Trainer: Global Knowledge Canada
Training Center(s)/Venue(s): Halifax, Mississauga, Montreal, Ottawa, Toronto, Winnipeg, Canada
  V

This five-day course is designed to provide network security engineers with the knowledge and skills needed to deploy Cisco Intrusion Prevention System (IPS)-based security solutions. Successful delegates will be able to reduce the risk to the IT infrastructure and applications using Cisco IPS features, and provide detailed operations support for the Cisco IPS.

Introduction to Intrusion Prevention and Detection, Cisco IPS Software, and Supporting Devices
Evaluating Intrusion Prevention and Intrusion Detection Systems
Choosing Cisco IPS Software, Hardware, and Supporting Applications
Evaluating Network IPS Traffic Analysis Methods, Evasion Possibilities, and Anti-Evasive Countermeasures
Choosing a Network IPS and IDS Deployment Architecture

Installing and Maintaining Cisco IPS Sensors
Integrating the Cisco IPS Sensor into a Network
Performing the Cisco IPS Sensor Initial Setup
Managing Cisco IPS Devices

Applying Cisco IPS Security Policies
Configuring Basic Traffic Analysis
Implementing Cisco IPS Signatures and Responses
Configuring Cisco IPS Signature Engines and the Signature Databa... [Read More]

Junos Intrusion prevention System Functionality

Course Format: Classroom
School/Trainer: Global Knowledge UK
Training Center(s)/Venue(s): Aberdeen, Bath, Bristol, Leeds, London, Wokingham, United Kingdom
  V

This two-day course is designed to provide an introduction to the Intrusion Prevention System (IPS) feature set available on the Juniper Networks SRX Series Services Gateway. The course covers concepts, ideas, and terminology relating to providing intrusion prevention using the SRX Series platform. Hands-on labs offer students the opportunity to configure various IPS features and to test and analyze those functions. This course is based on the Junos operating system Release 12.1X44-D10.4.

Content
Overview of IPS Functionality
Reasons for Network Attacks
Categories of Attacks
Anatomy of an Attack
IPS Mechanisms on SRX Series Devices
Lab 1: Initial Configuration
Initial Device Configuration
Deployment Options for IPS Functionality
Management Options
Network Settings
Preparing the SRX Series Device for IPS Features
Lab 2: Initial IDP Setup
IPS Terminology and Concepts
Terminology Overview
Attack Objects
IPS Rulebase Details
Rule Match Conditions
Rule Actions
Terminal Rules
IP Actions
Notification
Terminology Review
IPS Traffic Flow ... [Read More]

CyberSec First Responder: Threat Detection and Response (Certificate)

Course Format: Classroom
School/Trainer: Global Knowledge UK
Training Center(s)/Venue(s): Aberdeen, Bath, Bristol, Leeds, London, Wokingham, United Kingdom
  V


This course covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size of the organization, this individual may act alone or may be a member of a computer security incident response team (CSIRT). The course introduces strategies, frameworks, methodologies, and tools to manage cybersecurity risks, identify various types of common threats, design and operate secure computing and networking environments, assess and audit the organization&,#146,s security, collect, and analyze cybersecurity intelligence, and handle incidents as they occur. The course also covers closely related information assurance topics such as auditing and forensics to provide a sound basis for a comprehensive approach to security aimed toward those on the front lines of defense. In addition, this course can help students who are looking to fulfill DoD directive 8570.01 for information assurance (IA) training. This program is designed for personnel performing IA functions, establishing IA policies and implementing security measures and procedures fo... [Read More]

Implementing Cisco Intrusion Prevention System

Course Format: Classroom
School/Trainer: Global Knowledge UK
Training Center(s)/Venue(s): Aberdeen, Bath, Bristol, Leeds, London, Wokingham, United Kingdom
  V

This five-day course is designed to provide network security engineers with the knowledge and skills needed to deploy Cisco Intrusion Prevention System (IPS)-based security solutions. Successful delegates will be able to reduce the risk to the IT infrastructure and applications using Cisco IPS features, and provide detailed operations support for the Cisco IPS.

Introduction to Intrusion Prevention and Detection, Cisco IPS Software, and Supporting Devices
Evaluating Intrusion Prevention and Intrusion Detection Systems
Choosing Cisco IPS Software, Hardware, and Supporting Applications
Evaluating Network IPS Traffic Analysis Methods, Evasion Possibilities, and Anti-Evasive Countermeasures
Choosing a Network IPS and IDS Deployment Architecture

Installing and Maintaining Cisco IPS Sensors
Integrating the Cisco IPS Sensor into a Network
Performing the Cisco IPS Sensor Initial Setup
Managing Cisco IPS Devices

Applying Cisco IPS Security Policies
Configuring Basic Traffic Analysis
Implementing Cisco IPS Signatures and Responses
Configuring Cisco IPS Signature Engines and the Signature Databa... [Read More]

Intrusion Detection

Course Format: Classroom
School/Trainer: Global Knowledge UAE
Training Center(s)/Venue(s): Abu Dhabi, Dubai, United Arab Emirates
  V


Configure and run open-source Snort and write Snort signatures

Configure and run open-source Bro to provide a hybrid traffic analysis framework

Understand TCP/IP component layers to identify normal and abnormal traffic

Use open-source traffic analysis tools to identify signs of an intrusion

Comprehend the need to employ network forensics to investigate traffic to identify and investigate a possible intrusion

Use Wireshark to carve out suspicious file attachments

Write tcpdump filters to selectively examine a particular traffic trait

Synthesize disparate log files to widen and augment analysis

Use the open-source network flow tool SiLK to find network behavior anomalies

Use your knowledge of network architecture and hardware to customize placement of IDS sensors and sniff traffic off the wire

IBM Security Network Intrusion Prevention System 4.6 Config and Deployment

Course Format: Classroom
School/Trainer: Global Knowledge USA IBM Training Centers
Training Center(s)/Venue(s): Arlington, Atlanta, Cary, Irving, Morristown, New York City, Santa Clara, Schaumburg, Seattle, United States
  V

This course provides concepts, methods, and practices necessary to successfully use IBM Security Network Intrusion Prevention System with a focus on providing in-depth practices necessary to successfully manage IBM Security Network Intrusion Prevention System appliances. Students get in-depth hands-on lab exercises to learn about the appliance&,#146,s operational modes and how to properly deploy the appliance in any environment. Students also master managing and configuring the various policies that control the IBM Security Network Intrusion Prevention System appliance. As this course primarily leverages the IBM Security SiteProtector System, attendees of this class should have mastered that product prior to attending.

Course Content
## Introduction to IBM Security Network Intrusion Prevention System
## Connecting the appliance
## Setting up the appliance
## Managing the appliance
## Configuring firewall
## Configuring security events
## Configuring protection policies
## Configuring user specified policies
## Configuring SNORT
## QRadar SIEM integration

IBM Security Network Intrusion Prevention System 4.6 Config and Deployment

Course Format: Classroom
School/Trainer: Global Knowledge Canada IBM Training Centres
Training Center(s)/Venue(s): Halifax, Mississauga, Montreal, Ottawa, Toronto, Winnipeg, Canada
  V

This course provides concepts, methods, and practices necessary to successfully use IBM Security Network Intrusion Prevention System with a focus on providing in-depth practices necessary to successfully manage IBM Security Network Intrusion Prevention System appliances. Students get in-depth hands-on lab exercises to learn about the appliance&,#146,s operational modes and how to properly deploy the appliance in any environment. Students also master managing and configuring the various policies that control the IBM Security Network Intrusion Prevention System appliance. As this course primarily leverages the IBM Security SiteProtector System, attendees of this class should have mastered that product prior to attending.

Course Content
## Introduction to IBM Security Network Intrusion Prevention System
## Connecting the appliance
## Setting up the appliance
## Managing the appliance
## Configuring firewall
## Configuring security events
## Configuring protection policies
## Configuring user specified policies
## Configuring SNORT
## QRadar SIEM integration

IBM Security Network Intrusion Prevention System 4.6 Config and Deployment

Course Format: Classroom
School/Trainer: Global Knowledge UK IBM Training Centres
Training Center(s)/Venue(s): Aberdeen, Bath, Bristol, Leeds, London, Wokingham, United Kingdom
  V

This course provides concepts, methods, and practices necessary to successfully use IBM Security Network Intrusion Prevention System with a focus on providing in-depth practices necessary to successfully manage IBM Security Network Intrusion Prevention System appliances. Students get in-depth hands-on lab exercises to learn about the appliance&,#146,s operational modes and how to properly deploy the appliance in any environment. Students also master managing and configuring the various policies that control the IBM Security Network Intrusion Prevention System appliance. As this course primarily leverages the IBM Security SiteProtector System, attendees of this class should have mastered that product prior to attending.

Course Content
## Introduction to IBM Security Network Intrusion Prevention System
## Connecting the appliance
## Setting up the appliance
## Managing the appliance
## Configuring firewall
## Configuring security events
## Configuring protection policies
## Configuring user specified policies
## Configuring SNORT
## QRadar SIEM integration

IBM Security Network Intrusion Prevention System 4.6 Config and Deployment

Course Format: Classroom
School/Trainer: Global Knowledge UAE IBM Training Center
Training Center(s)/Venue(s): Abu Dhabi, Dubai, United Arab Emirates
  V

This course provides concepts, methods, and practices necessary to successfully use IBM Security Network Intrusion Prevention System with a focus on providing in-depth practices necessary to successfully manage IBM Security Network Intrusion Prevention System appliances. Students get in-depth hands-on lab exercises to learn about the appliance&,#146,s operational modes and how to properly deploy the appliance in any environment. Students also master managing and configuring the various policies that control the IBM Security Network Intrusion Prevention System appliance. As this course primarily leverages the IBM Security SiteProtector System, attendees of this class should have mastered that product prior to attending.

Course Content
## Introduction to IBM Security Network Intrusion Prevention System
## Connecting the appliance
## Setting up the appliance
## Managing the appliance
## Configuring firewall
## Configuring security events
## Configuring protection policies
## Configuring user specified policies
## Configuring SNORT
## QRadar SIEM integration

Intrusion Detection

Course Format: Classroom
School/Trainer: Global Knowledge India
Training Center(s)/Venue(s): Bangalore, Chennai, Delhi, Pune, India
  V


Configure and run open-source Snort and write Snort signatures

Configure and run open-source Bro to provide a hybrid traffic analysis framework

Understand TCP/IP component layers to identify normal and abnormal traffic

Use open-source traffic analysis tools to identify signs of an intrusion

Comprehend the need to employ network forensics to investigate traffic to identify and investigate a possible intrusion

Use Wireshark to carve out suspicious file attachments

Write tcpdump filters to selectively examine a particular traffic trait

Synthesize disparate log files to widen and augment analysis

Use the open-source network flow tool SiLK to find network behavior anomalies

Use your knowledge of network architecture and hardware to customize placement of IDS sensors and sniff traffic off the wire

Intrusion Detection

Course Format: Classroom
School/Trainer: Global Knowledge Malaysia
Training Center(s)/Venue(s): Petaling Jaya, Malaysia
  V


Configure and run open-source Snort and write Snort signatures

Configure and run open-source Bro to provide a hybrid traffic analysis framework

Understand TCP/IP component layers to identify normal and abnormal traffic

Use open-source traffic analysis tools to identify signs of an intrusion

Comprehend the need to employ network forensics to investigate traffic to identify and investigate a possible intrusion

Use Wireshark to carve out suspicious file attachments

Write tcpdump filters to selectively examine a particular traffic trait

Synthesize disparate log files to widen and augment analysis

Use the open-source network flow tool SiLK to find network behavior anomalies

Use your knowledge of network architecture and hardware to customize placement of IDS sensors and sniff traffic off the wire

Intrusion Detection

Course Format: Classroom
School/Trainer: Global Knowledge Indonesia
Training Center(s)/Venue(s): Jakarta, Indonesia
  V


Configure and run open-source Snort and write Snort signatures

Configure and run open-source Bro to provide a hybrid traffic analysis framework

Understand TCP/IP component layers to identify normal and abnormal traffic

Use open-source traffic analysis tools to identify signs of an intrusion

Comprehend the need to employ network forensics to investigate traffic to identify and investigate a possible intrusion

Use Wireshark to carve out suspicious file attachments

Write tcpdump filters to selectively examine a particular traffic trait

Synthesize disparate log files to widen and augment analysis

Use the open-source network flow tool SiLK to find network behavior anomalies

Use your knowledge of network architecture and hardware to customize placement of IDS sensors and sniff traffic off the wire

Intrusion Detection

Course Format: Classroom
School/Trainer: Global Knowledge China
Training Center(s)/Venue(s): Guangzhou, China
  V


Configure and run open-source Snort and write Snort signatures

Configure and run open-source Bro to provide a hybrid traffic analysis framework

Understand TCP/IP component layers to identify normal and abnormal traffic

Use open-source traffic analysis tools to identify signs of an intrusion

Comprehend the need to employ network forensics to investigate traffic to identify and investigate a possible intrusion

Use Wireshark to carve out suspicious file attachments

Write tcpdump filters to selectively examine a particular traffic trait

Synthesize disparate log files to widen and augment analysis

Use the open-source network flow tool SiLK to find network behavior anomalies

Use your knowledge of network architecture and hardware to customize placement of IDS sensors and sniff traffic off the wire

IBM Security Network Intrusion Prevention System 4.6 Config and Deployment

Course Format: Classroom
School/Trainer: Global Knowledge India IBM Training Center
Training Center(s)/Venue(s): Bangalore, Chennai, Delhi, Pune, India
  V

This course provides concepts, methods, and practices necessary to successfully use IBM Security Network Intrusion Prevention System with a focus on providing in-depth practices necessary to successfully manage IBM Security Network Intrusion Prevention System appliances. Students get in-depth hands-on lab exercises to learn about the appliance&,#146,s operational modes and how to properly deploy the appliance in any environment. Students also master managing and configuring the various policies that control the IBM Security Network Intrusion Prevention System appliance. As this course primarily leverages the IBM Security SiteProtector System, attendees of this class should have mastered that product prior to attending.

Course Content
## Introduction to IBM Security Network Intrusion Prevention System
## Connecting the appliance
## Setting up the appliance
## Managing the appliance
## Configuring firewall
## Configuring security events
## Configuring protection policies
## Configuring user specified policies
## Configuring SNORT
## QRadar SIEM integration

IBM Security Network Intrusion Prevention System 4.6 Config and Deployment

Course Format: Classroom
School/Trainer: Global Knowledge Malaysia IBM Training Center
Training Center(s)/Venue(s): Petaling Jaya, Malaysia
  V

This course provides concepts, methods, and practices necessary to successfully use IBM Security Network Intrusion Prevention System with a focus on providing in-depth practices necessary to successfully manage IBM Security Network Intrusion Prevention System appliances. Students get in-depth hands-on lab exercises to learn about the appliance&,#146,s operational modes and how to properly deploy the appliance in any environment. Students also master managing and configuring the various policies that control the IBM Security Network Intrusion Prevention System appliance. As this course primarily leverages the IBM Security SiteProtector System, attendees of this class should have mastered that product prior to attending.

Course Content
## Introduction to IBM Security Network Intrusion Prevention System
## Connecting the appliance
## Setting up the appliance
## Managing the appliance
## Configuring firewall
## Configuring security events
## Configuring protection policies
## Configuring user specified policies
## Configuring SNORT
## QRadar SIEM integration

Pages: 1 2 3 4 5 6 ...


Find Intrusion training courses, certificates, diplomas and degrees in Countries:



Australia - Canada - India - Indonesia - Ireland - Malaysia - New Zealand
Pakistan - Philippines - Singapore - South Africa - United Arab Emirates
United Kingdom - United States



Tips:
Our combined search function does not only provide you with the training courses and students, but also talent resumes and jobs, or shared apartments nearby for rent.



- Other Topics -
- Online/E-learning -
Intrusion
Ask for Training
Add Courses