Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-866-716-6688 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Cyber Threats Detection and Mitigation

Networking Signature Development Understood

GK# 2041 Vendor# NT301

Course Overview

TOP

Cyber threats are increasing at an alarming rate every year and the ability for organizations to defend against full-scaled distributed attacks quickly and effectively is becoming more and more difficult. In order to be safe and secure on today's Internet, organizations must learn to become more automated. This means being capable of characterizing attacks across hundreds or even thousands of IP sessions and improving their ability to recognize attack commonalities. With intrusion detection systems and trained network security auditors, organizations have a reliable means to prioritize, and isolate only the most critical threats in real time.

Taught by leaders in network defense who work in the computer security industry, this course demonstrates how to defend large scale network infrastructure by building and maintaining intrusion detection systems, network security auditing, and incident response techniques.

Schedule

TOP
  • Delivery Format:
  • Date:
  • Location:
  • Access Period:

$

What You'll Learn

TOP
  • Identify the best defensive measures to effectively protect a network
  • Setup and maintain an intrusion detection system
  • Conceptualize and develop intrusion detection rules and rule sets
  • Analyze and respond to intrusion attempts
  • Recover from a successful intrusion

Who Should Attend

TOP
  • Network defenders who want to respond to networking threats
  • Incident responders needing to quickly address system security breaches
  • Individuals who need a firm understanding of signature development and Snort
Course Delivery
Request this course in a different delivery format.
Enroll