User name:
Password:
 

 

Copyright © 2006.
cisco-certificatiom.co.uk
All Rights Reserved
CIW Security 1D0-470 Series: Attack Detection and Response
Product Code: ciws09 Time: 3.0 hour(s) CEUs: Available

Summary:

This course provides information on how to detect, distract, and deter hacker activity, and suggests ways to create a security and response policy.

Objectives:

  • Deter and distract hackers using proactive detection techniques
  • Describe the different types of IDS architectures
  • Audit and create rules using eTrust
  • Audit your network using Snort
  • Create and implement a response policy


Topics:

  • Proactive detection
  • Distracting the hacker
  • Deterring the hacker
  • Intrusion detection
  • Intrusion detection architecture
  • IDS rules and actions
  • Intrusion detection software
  • Auditing with eTrust
  • Creating rules in eTrust
  • Auditing with Snort
  • Planning for response
  • Documentation and assessment
  • Executing the response plan

Technical Requirements:

P500+ Processor, 128MB of RAM; Windows 2000, 2003, XP, Minimum screen resolution 800x600, Internet Explorer 5.5 or higher; Windows Media Player 9.0 or higher; Flash 8.0 or higher; 56K minimum connection; broadband (256 kpbs or higher) connection recommended; Javascript, DHTML and cookies enabled; Sound card with speakers or headphones strongly recommended.

Copyright � 2006 Webteks. All rights reserved.