National CAE Designated Institution
  • Classroom
  • Online, Instructor-Led
Course Description

This course introduces the student to intrusion detection methods in use today. Topics include the types of intrusion detection products, traffic analysis, and planning and placement of intrusion detection solutions. Upon completion, students should be able to plan and implement intrusion detection solution for networks and host-based systems.

Learning Objectives

  • Explain the purpose of practices used to secure a corporate environment
  • Apply environmental reconnaissance techniques using appropriate tools and processes
  • Compare and contrast the general purpose and reasons for using various cybersecurity tools and techniques
  • Explain the purpose of practices used to secure a corporate environment
  • Apply environmental reconnaissance techniques using appropriate tools and processes
  • Compare and contrast the general purpose and reasons for using various cybersecurity tools and techniques
  • Describe the relationship between frameworks, common policies, controls and procedures
  • Implement an information security vulnerability management process
  • Analyze the output resulting from a vulnerability scan
  • Analyze the results of a network reconnaissance
  • Distinguish threat data or behavior to determine the impact of an incident
  • Explain the importance of communication during the incident response process
  • Prepare a toolkit and use appropriate forensics tools during an investigation
  • Analyze common symptoms to select the best course of action to support incident response|

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.