Главная
Study mode:
on
1
Intro
2
Threats
3
Types of IDS
4
Capture
5
snort
6
Policy
7
Policy violation
8
Napster violation
9
QuickTime violation
10
SMTP violation
11
Telnet logon
12
Port scans
13
Ping sweep
14
Account scans
15
Nmap
16
User Profiling
17
Honeypot
18
Intrusion Prevention
Description:
Learn about Intrusion Detection Systems (IDS) in this comprehensive 51-minute video lecture from Prof Bill Buchanan OBE's "Introduction to Security and Network Forensics" series. Explore various IDS types, capture methods, and tools like Snort. Examine policy violations, including Napster, QuickTime, and SMTP examples. Dive into network security concepts such as port scans, ping sweeps, and account scans using Nmap. Understand user profiling, honeypots, and intrusion prevention techniques. Gain valuable insights into network forensics and security practices essential for IT professionals and cybersecurity enthusiasts.

Introduction to Security and Network Forensics - Intrusion Detection Systems

Bill Buchanan OBE
Add to list