Digital Investigator - Intrusion Detection Examples
Offered By: Bill Buchanan OBE via YouTube
Course Description
Overview
Explore real-world network intrusion detection scenarios through practical examples in this 34-minute video lecture. Delve into various types of intrusions, including P2P communications, viruses, and different scanning techniques such as TCP scans, ARP sweeps, OS scans, user account scans, and Tet scans. Learn how to identify and analyze suspicious network activities, interpret logging data, and understand the importance of monitoring for potential security threats. Gain valuable insights into the digital investigator's role in detecting and responding to network intrusions, enhancing your cybersecurity skills and knowledge.
Syllabus
Intro
Types of intrusions
P2P communications
Viruses
Logging In
Scanning
TCP Scans
ARP Sweep
OS Scan
User Account Scan
Tet Scan
Taught by
Bill Buchanan OBE
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity