×
Phoenix TS

Network Intrusion Detection Training

This training teaches students about detection evaluation, analysis, situation handling, theories in understanding hackers, intelligence gathering, and coordinated attacks.

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Course Outline

Through lecture and hands-on exercises, the Network Intrusion Detection training course covers the topic completely. Lessons address detection evaluation, analysis and situation handling. Theories involved in understanding hackers, intelligence gathering and coordinated attacks are also discussed. Finally, students look into an arsenal of preventative and aggressive security measures. 

This training is most ideal for security analysts, as this course will put students in full control of their network’s security. 

Schedule

Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 301-258-8200.

[image]

Not seeing a good fit?

Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.

Contact Us

Learn more about custom training

Course Outline

Part 1: Data

Module 1: Organizing Data Vantage, Domain, Actions and Validity

Module 2: Vantage: Understanding Sensor Placements in Networks

Module 3: Sensors in the Network Domain

Module 4: Data in the Service Domain

Module 5: Sensors in the Service Domain

Module 6: Data and Sensors in the Host Domain

Module 7: Data and Sensors in the Active Domain

 

Part 2: Tools

Module 8:  Getting Data in One Place

Module 9: The Silk Suite

Module 10: Reference and Look Up

 

Part 3: Analytics

Module 11: Exploratory Data Analysis and Visualization

Module 12: On Analyzing Test

Module 13: On Fumbling

Module 14: On Volume and Time

Module 15: On Graphs

Module 16: On Insider Threats

Module 17: On Threat Intelligence

Module 18: Application Identification

Module 19: On Network Mapping

Module 20: On Working with Ops

Module 21: Conclusion 

Network Intrusion Detection Training FAQs

Who should take this course?

This course is designed for security, systems and intrusion detection analysts; network administrators and engineers; Security managers;
and government and military workers who need to meet IA training requirements.

What is the recommended experience for this course?

Students should have an understanding of TCP/IP, hexadecimal, and
the Linux command-line.

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Phoenix TS is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints re-garding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site: www.nasbaregistry.org

Subscribe now

Get new class alerts, promotions, and blog posts

Phoenix TS needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.

Download Course Brochure

Enter your information below to download this brochure!

Name(Required)