Главная
Study mode:
on
1
Intro
2
Threats
3
Types of IDS
4
Security Agents
5
Capture Data
6
SNART
7
Simple Smart Rule
8
Policy Definition
9
Policy Violation
10
FTP
11
Napster
12
QuickTime
13
QuickTime Example
14
SMTP Example
15
Telnet Root Login
16
Port Scan
17
Ping Sweep
18
NMap
19
User Profiling
20
Honeypots
21
intrusion prevention systems
22
cisco intrusion detection system
23
Conclusions
Description:
Explore intrusion detection systems (IDS) in this comprehensive 51-minute video lecture from Prof Bill Buchanan's "Introduction to Security and Network Forensics" book. Delve into various IDS types, security agents, and data capture techniques. Learn about SNART, policy definition and violation, and examine examples using FTP, Napster, QuickTime, SMTP, and Telnet. Investigate port scanning, ping sweeps, and NMap. Discover user profiling, honeypots, intrusion prevention systems, and Cisco IDS. Gain valuable insights into network security and forensics through practical examples and in-depth explanations.

Introduction to Security and Network Forensics - Intrusion Detection Systems

Bill Buchanan OBE
Add to list
0:00 / 0:00