This Chapter helps you prepare for the EC-Council Certified Ethical Hacker (CEH) Exam by covering the following EC-Council objectives, which include understanding the business aspects of penetration testing. This includes items such as
Identify IDS components
IDS systems are composed of network sensors, central monitoring systems, report analysis systems, database and storage components, and the response box.
Identify IDS alert types
Alert types include positives, negative, false positives, and ...