Intrusion detection technology and the approaches taken by intrusion detection systems both at the network and host level. Examine the differences between using host-based and network-based Intrusion Detection Systems and how each of them can be implemented. Analyse the different responses required depending on the risk/threat to the system and how to handle intrusions. How an Intrusion Detection System responds to an alarm. How to design and deploy an Intrusion Detection System to fit the requirements of differing organizations ranging from small LAN based system to multi-level distributed systems. -- Course Website
Prerequisites: 314259 (v.1)<br/> Cyber Security Concepts 510<br/> <br/> or any previous version