YoVDO

Measuring the Efficacy of Real Time Intrusion Detection Systems

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Algorithms Courses Network Protocols Courses Data Classification Courses Intrusion Detection Systems Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the efficacy of real-time intrusion detection systems in this 55-minute conference talk from ANYCon 2017. Delve into network protocols, IDS monitoring, and best practices for cybersecurity. Examine detection techniques, problems with KDD, and the importance of data classification. Learn about the role of algorithms and information gain in improving intrusion detection. Gain insights into cutting-edge research questions and contributions in the field of network security.

Syllabus

Intro
ANYCAN
Introduction
Background
Definitions - Network Protocols
Definitions - IDS
IDS Monitoring
Best Practices
Detection Techniques
Problems with KDD
Data Classification matters
The Algorithm Matters
Information Gain
Research Question
Contribution


Related Courses

Systems and Application Security
(ISC)² via Coursera
Fundamentals of Computer Network Security
University of Colorado System via Coursera
Basic Network and Database Security
IBM via edX
Information Security Operations Center ISOC for Non-Techies
Udemy
Cybersecurity of Networks from Scratch to Advanced
Udemy