Video description
An outsider might be inside your network and ready to release attack traffic. A disgruntled employee might be inside your system and ready to delete files. You're a systems or network admin and it's your job to prevent these types of malicious events.
Where do you begin? A good start is knowing with some certainty that the attackers are even present and a good intrusion detection system will do just that. In this video, security expert Ric Messier explains why intrusion detection systems are necessary, what they do, how they work, where to find them, and how to implement them.
- Understand intrusion detection: Its meaning, its value, and how to implement it
- Master the workings of host-based and network-based intrusion detection systems
- Learn about network captures, cryptographic hashes, alerting, incident response, and more
- Gain awareness of anomaly based and signature based intrusion detection systems
- Learn to use open source intrusion detection systems like Snort, Suricata, and Bro
- Understand how to perform file integrity checks using Tripwire and Samhain
- Review multiple forms of built-into-the-OS IDS systems
Publisher resources
Table of contents
-
Introduction
- Welcome 00:02:06
- What Will Be Covered 00:02:14
- About The Author 00:01:05
-
Host-Based
- Logs - Windows 00:03:34
- Auditing - Windows 00:04:56
- Logs - Linux 00:04:00
- Auditing - Linux 00:04:33
- Cryptographic Hashes 00:04:30
- File Settings 00:03:42
- Tripwire Configuration 00:04:16
- Tripwire Operation 00:04:56
- OSSEC 00:03:21
- OSSEC Installation 00:03:06
- OSSEC Operation 00:03:15
- Samhain Configuration 00:03:45
- Samhain Operation 00:03:48
- Centralized Logging 00:03:57
- Logwatch 00:05:04
-
Network-Based
- Network Captures 00:03:08
- Snort Overview 00:03:47
- Snort Configuration 00:04:19
- Snort Usage 00:04:49
- Snort Rules 00:05:35
- Monitoring Consoles 00:03:58
- Suricata Overview 00:02:43
- Suricata Configuration 00:05:39
- Suricata Usage 00:03:03
- Suricata Rules 00:02:57
- Bro IDS Overview 00:02:09
- Bro IDS Configuration 00:03:00
- Bro IDS Usage 00:03:12
- Bro IDS Rules 00:04:12
- Oinkmaster 00:03:47
- Barnyard2 00:04:13
-
Endpoint Protection
- Antivirus 00:04:50
- Data Loss Prevention 00:03:39
- Windows Defender 00:03:24
- Application Protection 00:03:05
- Network Monitoring - Application Usage 00:03:23
- Spyware 00:03:33
- Browser Alerts 00:03:08
- Browser Protections 00:04:09
- Encryption Certificates 00:04:13
- E-Mail 00:04:11
-
Conclusion
- Conclusion 00:04:16
Product information
- Title: Understanding Intrusion Detection Systems
- Author(s):
- Release date: July 2016
- Publisher(s): Infinite Skills
- ISBN: 9781491962695
You might also like
book
Cybersecurity Blue Team Toolkit
A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data …
video
TCP/IP Fundamentals
8+ Hours of Video Instruction Overview TCP/IP Fundamentals LiveLessons provides more than 8 hours of video …
video
Hands-On pfSense 2.x for Firewalls and Routers
Elite network security with open source software! About This Video Install and navigate pfSense and become …
video
The Complete Cybersecurity Bootcamp (Video Collection): Threat Defense, Ethical Hacking, and Incident Handling
More than 25 Hours of Expert Video Instruction This course is a complete guide to help …