Call Us : +91-771045-0011 | +91-771045-0022

Intrusion Detection Systems

In this Two days webinar we will Start with introduction and comparison of various open source IDS systems available . Later we will proceed to compa....

Duration: 2 Days
Course Fee: INR 1500.00/ USD 20.00
INTRUSION DETECTION SYSTEMS

In this Two days webinar we will Start with introduction and comparison of various open source IDS systems available .
Later we will proceed to compare various IDS pros and cons . Its always a challenge for CISO's and other IT managers to choose the best IDS for their organization .

We will try to answer all their questions and challenges faced by them when choosing IDS technology .This webinar will be Totally Live session giving the attendees facility to interact with the prominent speaker

No Batch Available In This Course Yet.

1.) Attendees will learn about different methods of securing Network and web assets by using intrusion detection Systems ( IDS ) . We will primarily focus on open source technologies and not the paid solutions available .

2.) Secondly attendees will learn about factors to consider while choosing and successfully deploying an IDS system on Network/Servers .

3.) IDS plays an important role in an organization for securing or giving alert on any unwanted intrusion and hence forms the major skill set for cyber security experts where they should be able to work on IDS technology effectively.

1.) Skills about IDS systems

2.) about choosing appropriate IDS on the basis of scenario

3.) skills to effectively write signatures for counterfeiting web and network based attacks .

1.) Attendees should be familiar with basics of network attacks and web attacks .

2.) Attendees should be familiar with basics and working of server and websites.

3.) Candidates should be familiar with various internet protocols and their working.

This webinar is scheduled for 2 days

1.) On First day we will be talking about various IDS options available for an organization ,
     Limitations of IDS systems and what we should not expect from any of these IDS .
     Signature based and anomaly based detection and on which you should bet for security .


2.) On second day we will work around signatures and rules writing using PCRE and will see further details into Rule headers . How these signatures can be bypassed by hackers/intruders . Best practices for writing rules that security experts should follow .



Contact Us

+91-771045-0011

Request more information

Proudly Operated from India

© 2016 Copyrights. All Rights Reserved

See more of Cyber Intelligence by logging in.
Connect with cyber security experts,Discover job opportunities,Online Training, Information Security Advisory and lot more.

Sign Up Log In