Center for Qualified CyberSecurity Excellence & Mastery

"Where Qualified Cyber Education Happens"

Real-Time Tools and Methodologies for Discovering and Reacting to Network Intrusion Attempts

An essential component in any comprehensive enterprise security program is the ability to detect when your networks or systems are being probed or attacked, or have been compromised in some manner. Intrusion detection systems give you this critical monitoring capability.

In this up-close, 72 hour class look at intrusion detection systems (IDS), you’ll get a firm grip on everything from the leading IDS systems and attack signatures to creating a Threat Management Procedure. You will learn about the different types of intrusion detection systems, how they operate, how they should be managed, how and where they should be deployed, who the players are, and whether IDS is something that should be outsourced or kept in-house. After installing multiple IDS solutions, you will benefit from a demonstration of hacker attack methodologies and see for yourself how IDS can help to detect them. You will explore new directions in the IDS arena that promise to make intrusion detection systems easier to manage and a more effective part of your information security strategy. Through a wide array of exciting hands-on exercises you will not only install and configure IDS systems but you will observe first-hand many hacker “attacks” and exploits and how they appear to IDS systems. Implementation exercises will include of a representative sample of the latest IDS tools will include a combination of both freeware and commercial IDS tools. You will have the opportunity to create real attack scenarios to see how and learn from the best how to detect, read, react, and defend your network against from serious attacks.

 

Class Fee: $3,990
Time:72 hrs
Learning Level: Entry
Contact Hours: 27 hr Lecture 35 hr labs
Prerequisites:Understanding of TCP/IP Protocols
Credits: 50 CPE / 3 CEU
Method of Delivery:Residential (100% face-to-face) or Hybrid
Instructor:TBD
Method of Evaluation:95 % attendance 2. 100 % completion of Lab
Grading:Pass = Attendance+ labs & quizzes Fail > 95% Attendance

Sample Job Titles:
IA Operational Engineer
IA Security Officer
IS Analyst/Administrator
IS Manager/ IS Specialist
IS Security Engineer
IS Systems Security Manager
Platform Specialist/ Security Administrator
Security Analyst/ Security Control Assessor

 

This 72 hour accelerated class is taught using face to face modality or hybrid modality. Class includes 72 hours of contact studies, labs, reading assignments and final exam - passing the final exam is a requirement for graduation.

KU Outcomes:

Who Should Attend: CIOs with responsibility for Computer Security, Network Administrators, Information Security Architects, Auditors, Consultants, and all others concerned with network perimeter security.
Learning Objectives different types of intrusion detection systems, how they operate, how they should be managed, how and where they should be deployed, who the players are, and whether IDS is something that should be outsourced or kept in-house. After installing multiple IDS solutions, you will benefit from a demonstration of hacker attack methodologies and see for yourself how IDS can help to detect them.

Text Materials: labs, SU Pen Testing Materials, resource CD’s and attack handouts.

Machines a Dual Core 4M Ram, 350 Gig drives, running MS OS, linux, and VMWare Workstation

Tools for class: Whois, Google Hacking, Nslookup, Sam Spade, Traceroute, NMap, HTTrack, Superscan,

 

CLICK TO ROLL DOWN OUR CLASS SYLLABUS

 

Grades - All students must ordinarily take all quizzes, labs, final exam and submit the class practical in order to be eligible for a Q/ISP, Q/IAP, Q/SSE, or Q/WP credential unless granted an exception in writing by the President.