 |
|
Ultimate Intrusion Detection, Prevention & Analysis (Hands-on) |
Intake 22 21 Jun 2011
|
|
|
 |
 |
* The Most Comprehensive Intrusion Detection Course Ever Taught *
* and Become a Certified Intrusion Detection Specialist *
Unique Course Feature
This is the most in-depth intrusion detection course taught and
includes the latest attack patterns and numerous real-world
examples of network traces and analysis tips. Besides,
this course features:
- Strong emphasis on technical and practical analysis skills so as to prepare you to go back to the workplace as an effective intrusion analyst
- Over 30+ hands-on labs on deployment of various intrusion detection systems including Snort, e-Trust, BlackICE, RealSecure
- In-depth coverage of course materials to establish a solid foundation for the practical assignment and drills on sample questions to improve your accuracy
- Course leaded by qualified and knowledgeable i-Total instructors with over 10-year pure information security experiences
Course Outline
For comprehensive coverage of the examination curriculum, we structure
this course into 4 modules with a total of 24 contact hours.
Details about individual modules are given below. Please email us at
info@i-TotalSecurity.net for more information.
Course Module |
Description |
1 |
Hacker's View of TCP/IP
This module provides an understanding of the inner
workings of the "real" TCP/IP protocols from intrusion
detection point of views. In addition to studying the
normal or expected TCP/IP conventions and behavior,
this module examines malicious or unexpected patterns
that may be seen in the wild. This provides participants
a more accurate view of real world situations that they
would encounter and prepares them to determine what is
going on in the actual network traffic. |
2 |
Packet Analysis Using Sniffers (Hands-On*)
This module teaches how to use windump and ethereal
to produce an audit trail of traffic flowing in and
out of your network and the ultimate skills in analyze
the content and abnormalities of packets. At the
end of this module, students are able to validate
the warnings and alerts produced by intrusion detection
system and determine the source of problem as well
as capturing pertinent activities afterwards. Hands-on
exercises on using windump and other traffic analysis
tools will be arranged.
|
3 |
IDS Deployments - e-Trust, Intact, Snort and RealSecure (Hands-On*)
This module introduces ever aspect of an intrusion
detection infrastructure. Starting with an overview
of Snort, students are taught the skills of configuring
Snort as an intrusion detection system, writing and
amending effective IDS rules and examining its various
capacities for capturing different types of output.
Next, the more advanced features of other IDS such as
e-Trust, Intact, and RealSecure will be examined indepth.
Live demonstrations and hands-on labs of various intrusion
detection systems will be provided. |
4 |
IDS Signatures, Rules and Analysis (Hands-On*)
This module teaches the skills in analyzing some latest
exploits and defining IDS signatures for use in some
intrusion detection systems. Besides, the art and
skills of analyzing and correlating firewall and
other higher fidelity logs are discussed and practiced.
To strengthen student's intrusion analysis abilities,
hundreds of real world attack patterns and traces will
be reviewed, and the method of assessing the severity
and implication of attacks will be discussed.
Hands-on exercises in identifying and designing
IDS signatures will be arranged. |
* To get the most value out of the course, students are required to bring their own notebook computers.
Course Date & Venue
Date | 8 Evenings Starting 7:00pm - 10:00pm |
Time | 7:00pm - 10:00pm |
Venue | 7D, Trust Tower, 68 Johnston Road, Wan Chai, Hong Kong [See Map] |
*i-TotalSecurity reserves the rights to modify the schedule as required.
Course Fee
Lectures & Workshops (30 Hours) = HK$6,980.00*
Enroll 1 week before course commencement.
Course Leader
Mr. Alen Lo, MBA(CUHK), BSc(HKU), CISA, CISSP, CISM, CEH, IRCA Certified ISMS Lead Auditor
He has over 15 years of solid experiences on information systems
security, control and audit. During this period, he has been
responsible for assessing the efficiency and effectiveness of
information systems security and controls, implementing information security management systems for various
financial institutions, insurance companies, government departments, telecommunications service providers, commercial data centres, utilities
and multi-national conglomerate.
Moreover, Alen has over 10 years of international teaching
experiences and has been an instructor of the HKU SPACE, the SCS of
the Chinese of University of Hong Kong, and the Open University of Hong Kong
designing and delivering various award-bearing e-Commerce and information
systems security courses and seminars for numerous public, leading, listed
and military organizations in Asia Pacific, Europe, Greater China, Oceania and Middle East.
About i-TotalSecurity
A pioneer in information systems control and security education and
consultancy who bring the best knowledge, skills and practices to meet
the certification and working needs of individuals and corporations.
Since 1995, our qualified and no-nonsense security specialists are
teaching information security with students from leading corporations,
government and military organizations internationally.
Enquiry
Call us at +852 2965.4445 or e-mail info@i-TotalSecurity.net
|
|
|