Hands-On
Beating Hackers Today: Intrusion Analysis, Detection & Protection

Course Description:
Considerable concern has resulted from reports that Google, and what has been reported as more than 20 other companies, have fallen under hacking attacks thought to emanate from China. There is nothing special about news of hacking. What has changed is the recent realization that it is likely that the latest breed of hacker is no longer an individual amateur wanting to prove their individual skill as a challenge, but may well be serious government funded professional group. It is thought that attacks have been perpetrated on commercial, banking and defense corporations as well as high profile Internet businesses like Google and Yahoo.

With potential in the future from terror groups as well, detecting attempted intrusions attacks early and effectively is critical, not just to protect human rights, as was thought to be the motivation for the Google attacks but also to protect major commercial Interests and national security. Detecting potential attacks and being aware of likely threats is important to all organizations. It is no longer just security experts that need security skills, but it should be within the knowledge base of all technical professionals.

This course provides an understanding of the jargon that surrounds this field. It analyzes the different classes of attack that have been identified and examines some of the methods that have been employed by hackers. Having established the form of the threats it teaches how to detect and recognize these threats without crippling the networks being defended. It then goes on to establishing countermeasures and good practice to minimize or remove the threats.

Students learn the inner workings of the "real" TCPIP protocols from intrusion detection points of view. In addition to studying the normal or expected TCPIP conventions and behavior the course examines malicious or unexpected patterns that may be seen in the wild. This provides participants a more accurate view of real world situations that they would encounter and prepares them to determine what is going on in the actual network traffic. WireShark is used to produce an audit trail of traffic flowing in and out of the network and allows packet content to be analyzed for abnormalities. Students learn how to recognize the warnings and alerts produced by intrusion detection systems and determine the source of problem as well as capturing pertinent activities afterwards. Hands-On exercises on analysis tools are used to achieve this.

The course finally goes on to examine how Intrusion Detection Systems can be deployed to automate detection and potentially undertake countermeasures to protect.

Students Will Learn:

Course Length:
3 Days



 
Beating Hackers Today: Intrusion Analysis, Detection & Protection Categories:
IT/Networking    Additional Courses    
 

 

Outside Plant
Pole Climbing Pole Climbing
Pole Top Rescue /1st Aid/CPR Cert Pole Top Rescue /1st Aid/CPR Cert
OSHA Confined Space OSHA Confined Space
OSP Bonds & Grounds OSP Bonds & Grounds
Telephone I & R Telephone I & R
Noise Mitigation Noise Mitigation
Copper Splicing Copper Splicing
OSP Tester, Fault Loc... OSP Tester, Fault Loc...
DSL - IMT DSL - IMT
T1 & T3 T1 & T3
T1 Spans & HDSL T1 Spans & HDSL
Adv. OSP/DSL Field Adv. OSP/DSL Field
Special Circuits Special Circuits
OSP Fault - I&R OSP Fault - I&R
IPTV Intallers IPTV Intallers
Fiber Optics -ER Fiber Optics -ER
CO Bonds & Grounds CO Bonds & Grounds
Utility Locating Utility Locating
Fiber Optics-Industry Apps Fiber Optics-Industry Apps
xDSL xDSL
IPTV for Telecos IPTV for Telecos
Cat 5-6-7 Cert Cat 5-6-7 Cert
MetroE Field-Tech MetroE Field-Tech
Air Pressure Air Pressure
Air Dryer Air Dryer
Click Here For More Courses
Central Office
CO Bonds & Grounds CO Bonds & Grounds
CO Power CO Power
CO IMTR CO IMTR
SONET/SDH SONET/SDH
ISDN ISDN
Frame Relay Frame Relay
SS7 SS7
DDS DDS
Internetworking ATM Internetworking ATM
DWDM/Routing DWDM/Routing
DMS10 DMS10
DMS100 DMS100
MetroE Field-Tech MetroE Field-Tech
T1 & T3 T1 & T3
T1T3 for CATV T1T3 for CATV
Special Circuits Special Circuits
CS 1500 Centrex CS 1500 Centrex
VoIP/Data-Voice VoIP/Data-Voice
BGP BGP
Nortel/Norstar CallPilot Nortel/Norstar CallPilot
Nortel BCM50 Nortel BCM50
Metro Eternet Metro Eternet
Digital TV Crossover Digital TV Crossover
Click Here For More Courses
Fiber Optics
Und. Fiber Und. Fiber
Fiber ISP/OSP Combo Fiber ISP/OSP Combo
Hands-On FTTH Hands-On FTTH
Fiber Management Fiber Management
Fiber WAN/Storage Fiber WAN/Storage
Fiber Adv. Testing Fiber Adv. Testing
Fiber Optics Adv. Splicing Fiber Optics Adv. Splicing
Fiber Optic - ISP/LANs Fiber Optic - ISP/LANs
Fiber Optics -ER Fiber Optics -ER
Adv Fiber Optics Adv Fiber Optics
FTTH-NGN FTTH-NGN
Fiber Optics-Industry Apps Fiber Optics-Industry Apps
Click Here For More Courses
IT/Networking
Internetworking Essentials Internetworking Essentials
Adv. Internetworking Adv. Internetworking
Network+ Network+
A+ Cert A+ Cert
Gigabit Networks Gigabit Networks
SONET/SDH SONET/SDH
CCNA BootCamp CCNA BootCamp
TCP/IP TCP/IP
SNMP SNMP
Bridges, Routers & Switches Bridges, Routers & Switches
Network Management Network Management
Advanced Networking Advanced Networking
Cisco Simplified Cisco Simplified
Metro Eternet Metro Eternet
FTTH-NGN FTTH-NGN
IP-CAST IP-CAST
CS 1500 Centrex CS 1500 Centrex
Digital TV Crossover Digital TV Crossover
LTE-In Depth LTE-In Depth
LTE Core LTE Core
LTE Air Interface LTE Air Interface
LTE and 4G LTE and 4G
LTE Charging Mgmt and Apps LTE Charging Mgmt and Apps
Mobile Detection Mobile Detection
Carrier Wireless Carrier Wireless
VoIP/Data-Voice VoIP/Data-Voice
VMware View VMware View
Click Here For More Courses
Energy / Power / Safety
OSHA Confined Space OSHA Confined Space
Ladder Safety and Fall Protect Ladder Safety and Fall Protect
Mine Safety Mine Safety
Voltage Cable Splicing Voltage Cable Splicing
Elec Transformer Elec Transformer
Power Quality Power Quality
Substation Testing Substation Testing
Elec Testing Elec Testing
Click Here For More Courses
Certification Courses
CCNT - Cert CCNT - Cert
CTP Prep CTP Prep
Network+ Network+
A+ Cert A+ Cert
CCNA BootCamp CCNA BootCamp
MCSA-Core-1 MCSA-Core-1
Fiber ISP/OSP Combo Fiber ISP/OSP Combo
Click Here For More Courses
Additional Courses
TeleCom Mgmt TeleCom Mgmt
TeleCom Tech TeleCom Tech
Emerging Tech Emerging Tech
Understanding IPTV Understanding IPTV
IPTV for Telecos IPTV for Telecos
IPTV Tech IPTV Tech
TelCom Network Testing TelCom Network Testing
TeleCom 1 TeleCom 1
TeleCom 2 TeleCom 2
Nortel CS1000 Nortel CS1000
NARS/BARS NARS/BARS
Nortel/Norstar CallPilot Nortel/Norstar CallPilot
Metro Eternet Metro Eternet
CallPilot User/Sys Admin CallPilot User/Sys Admin
CallPilot Basic Admin CallPilot Basic Admin
CS1000 End User CS1000 End User
CS1000 & TM CS1000 & TM
Nortel/Norstar MICS Nortel/Norstar MICS
Nortel CallPilot Nortel CallPilot
IPTV Intallers IPTV Intallers
Fiber Optics-Industry Apps Fiber Optics-Industry Apps
CS 1500 Centrex CS 1500 Centrex
Digital TV Crossover Digital TV Crossover
LTE-In Depth LTE-In Depth
LTE Core LTE Core
LTE Air Interface LTE Air Interface
LTE and 4G LTE and 4G
LTE Charging Mgmt and Apps LTE Charging Mgmt and Apps
Mobile Detection Mobile Detection
VMware View VMware View
Click Here For More Courses
 

BTS Offfers BICSI CECs
BTS offers BICSI CECs for most of our courses. You can find out more information about our BICSI CECs by clicking here.

Copyright Information
Product names mentioned herein may be trademarks/servicemarks or registered trademarks/servicemarks of their respective companies and are hereby acknowledged. All product names that are known to be trademarks or service marks have been appropriately capitalized. Use of the name BTS, inc./the url: www.btstraining.com is for identification purposes only, and should not be regarded as affecting the validity of any trademark or service mark, or as suggesting any affiliation between BTS, Inc. and the trademark/servicemark proprietor.