Automated Network Defense Training:
Automated Network Defense Training Course with hands-on labs (Online, Onsite and Classroom Live)
Learn how to defend large-scale network infrastructures by building and maintaining IDS/IPS and mastering advanced signature-writing techniques.
Cyber threats are increasing at an alarming rate every year and the ability for organizations to defend against full-scale, distributed attacks quickly and effectively has become much more difficult. An Intrusion Detection/ Prevention System (IDS/IPS) affords security administrators the ability to automate the process of identifying attacks among the thousands of connections on their network, provided the system is properly configured and the signatures are well written.
Automated Network Defense Training covers the following topics:
- Automated Network Defense Training: Intrusions
- Automated Network Defense: Intrusion Detection
- Automated Network Defense: Snort Rule Options
- Automated Network Defense: Snort Configuration and Variables
- Automated Network Defense: Tracking State Across Sessions Using Flowbits
- And more…
This Automated Network Defense Training course teaches how to defend enterprise infrastructure at scale using a combination of tools and platforms such as IDS/IPS, firewalls, and SIEMs. Configuring and tuning these systems properly maximize their effectiveness at catching and stopping threats while reducing alert fatigue for analysts and responders. Students learn to identify gaps in coverage, write basic and complex signatures, manage rule sets for optimization, use chain rules to detect multistage events, and implement decoding and fingerprinting capabilities to overcome evasion techniques.
Your Registration Includes
- 5 days Automated Network Defense Training with an expert instructor
- Automated Network Defense Study Guide
- Certificate of Completion
- 100% Satisfaction Guarantee
- Automated Network Defense Training – https://www.wiley.com/
- Automated Network Defense Training – https://www.packtpub.com/
- Automated Network Defense – https://store.logicaloperations.com/
- Automated Network Defense Training – https://us.artechhouse.com/
- Automated Network Defense Training – https://www.amazon.com/
- Cybersecurity Foundations
- Network Forensics and Investigation Training
- Windows Exploitation and Analysis Training (WEA)
- We can adapt this Automated Network Defense course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this Automated Network Defense course, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the Automated Network Defense Course around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Automated Network Defense course in manner understandable to lay audiences.
The target audience for this Automated Network Defense course:
- Incident Responders who need to understand and react to IDS alerts
- Network Defenders seeking to automate threat detection
- IDS administrators who wish to improve their signature writing skills
- Security Operations Center Staff seeking to automate traffic analysis
- Penetration Testers looking to reduce their network visibility
The knowledge and skills that a learner must have before attending this Automated Network Defense course are:
- TCP/IP Networking
- Network Forensics and Investigation
Upon completing this Network Forensics and Investigation course, learners will be able to meet these objectives:
- Explain the benefits and limitations of different security technologies (IDS/IPS, firewalls, VPNs, web proxies, etc.)
- Identify optimal platform deployment and gaps in coverage
- Write basic and complex IDS signatures to identify malicious traffic flows, and tune them to reduce false positives
- Use reassembly and pre-processing engines to automatically reconstruct streams of network data prior to analysis
- Apply decoding and other tools to overcome attacker evasion techniques
- Implement automated fingerprinting of encrypted traffic flows to detect anomalous or malicious flows
- Common Threats
- Intrusion Detection
- Introduction to Snort
- Introduction to Bro
- Snort Configuration and Variables
- Snort Output
- Output Plugins
- Signature Writing
- Snort Rule Options
- The Detect Offset Pointer (DOE)
- DOE Content Modifiers
- DOE Rule Options
- Snort Packet Header Rule Options
- Post Detection
- Effective Rule Writing
- Perl Compatible Regular Expressions
- Tracking State Across Sessions Using Flowbits
Using the tools, skills, and methodologies taught in Days 1 through 4 of the class, students are given several packet captures containing a variety of scanning and exploitation techniques. They are tasked with identifying the significant elements of the attack and translating them into IDS signatures. Finally, they are tasked with tuning those signatures to reduce false-positives and limit excessive events.
- Setup and Configure an IDS to match a network topology map
- Define Network Variables
- Configure Output Statements
- Write over 30 Signatures
- Analyze and Write Signatures based attack patterns
- Tune signatures to reduce false positives and false negatives
Automated Network Defense Training Course Wrap-Up
Whether you are looking for general information or have a specific question, we want to help!
Request More Information