This course examines the best practices for intrusion detection, prevention, and incident response. Key topics will include strategies, techniques and technologies used in attacking and defending information systems, and how to design secure networks and protect against intrusion, malware and other hacker exploits.
- Assess the various detection and prevention tools, technologies, and techniques used to monitor and respond to network intrusion incidents.
- Evaluate the principles of incident handling and reporting in order to deploy resources to manage an incident and prevent future security breaches.
- Develop an incident response plan that incorporates attack tracing, evidence collection, and analysis.
- Be aware of the design elements of secure networks and employ emerging technologies to ensure continuity of operation.