CHAPTER 8

Monitoring and Analysis

In this chapter, you will learn about

•  Events of interest

•  Intrusion detection systems

•  Security alerts and false positives

•  Comparing network-based and host-based intrusion detection systems

•  Comparing intrusion detection systems and intrusion prevention systems

•  Detecting and preventing attacks

•  Wireless intrusion detection and prevention systems

•  Security information and event management tools

•  Performing security testing and assessments

•  Vulnerability assessments

•  Penetration tests

Operating and Maintaining Monitoring Systems

Monitoring systems within an information technology (IT) network helps to prevent, detect, and correct potential security incidents. Intrusion detection systems ...

Get SSCP Systems Security Certified Practitioner All-in-One Exam Guide, Third Edition, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.