Intrusion Prevention Training

SEC-204

In Intrusion Prevention: Stop Hackers Before They Start, you will learn how this groundbreaking IPS technology works, how to deploy it, and how to manage it efficiently and effectively. Tired of hackers, worms, and buffer overflows? Get Instruction Prevention training

Intrusion Prevention Course Overview

COURSE LENGTH:
5-DAY

 


The latest technology in information security is Intrusion Prevention. Rather than relying on human intervention to respond to an attack, Intrusion Prevention Systems automatically stops hackers, worms, and disgruntled employees before their attacks can complete. This all happens before they can cause damage, potentially saving your organization millions. In Intrusion Prevention: Stop Hackers Before They Start, you will learn how this groundbreaking IPS technology works, how to deploy it, and how to manage it efficiently and effectively.

As with any new automated technology, there are many perils to avoid when implementing it. Just as Intrusion Prevention Systems can prevent hackers and worms, they can easily be configured incorrectly which can block legitimate users from doing their jobs. The intrusion prevention training you receive in this system and network security course will enable you to deploy intrusion prevention systems safely.

The Intrusion Prevention training offered by InfoSec Institute covers all areas of intrusion prevention. Host Intrusion Prevention and Network Intrusion Prevention are covered in great detail. You will learn the technical details that make Intrusion Prevention Systems so effective. Much of technical learning is best done by doing, so you will experience a multitude of hands on lab exercises using popular technologies like Entercept, Okena, Inline Snort, Netscreen, Internet Security Security Systems, Top Layer. Additionally, you will learn how to enable Intrusion Prevention features built into operating systems such as OpenBSD, Solaris, Linux and even Tru64.


HOW YOU'LL BENEFIT:

  • Get practical skills planning, implementing and maintaining the hottest information security technology, IPS.

  • Prevent hackers, worms, and disgruntled employees from destroying your organizations information assets, a skill that could be worth millions to your current or potential employer.

  • Learn in a multi-platform enviornment. Get intrusion prevention training on Windows, Linux, BSD and Solaris. No one else offers this breadth and depth.

  • More than interesting theories and lecture, get your hands dirty in our dedicated intrusion prevention training (IPS) lab.

  • Learn hands-on skills that are difficult to gain in a corporate or government working environment, such as deploying multiple intrusion prevention systems (IPS) and attacking them.

  • Top Intrusion Prevention Course Available
  • Boot Camp Stye
  • Taught only by Industry Experts
"Great instructor - thoroughly covered all topics with expertise. He focused our attention to the pertinent information. ... a great experience"

Jeremy J. Pearson,
Joint Staff, Pentagon

Learn To Master:

  • Understanding hashing functions
  • Understanding buffer overflows
  • Anatomy of an exploit
  • Network protocol based attacks
  • Intrusion Prevention vs. Intrusion Detection
  • Intrusion Prevention deployment strategies
  • The stack and heap data structures
  • The role the Kernel plays in attacks
  • Linux, Solaris and Windows Kernels
  • Unix system calls and the Windows API
  • Vulnerability development and discovery
  • Malicious worm internals
  • Host Intrusion Prevention
  • Syscall Interception
  • Non-executable stacks
  • Non-executable heaps
  • Page protection
  • Heuristic and behavioral blocking
  • Network Intrusion Prevention
  • Web application IPS
  • Layer 7 Intrusion Prevention
  • Packet scrubbing
  • Shunting and session sniping
  • Attack signature development
  • Mixed mode IPS
  • DDoS Prevention
  • Calculating ROI for Intrusion Prevention

Instructor-led hands-on lab exercises

  • Hack into an unprotected system
  • Utilize a buffer overflow
  • Implement a no-exec stack
  • Attack a no-exec stack
  • Implement an no-exec heap
  • Attack a no-exec heap
  • Syscall Redirection
  • Implement page protection in Linux
  • Page protection on Windows
  • Page protection on OpenBSD
  • Kernel hardening with PaX
  • grsecurity Lockdown
  • Use a stack canary
  • Implement a Host Intrusion Prevention System
  • Attempt two previous attacks against the Host
  • Attempt two previous attacks against the Host Intrusion Prevention System
  • Deploy Network Intrusion Prevention
  • Capture an attack and write an IPS rule
  • Build in web server layer 7 IPS
  • Session sniping exercise
  • Data correlation and multiple firewall blocking
  • Shunting with routers


Dates & Locations




Unfortuantely, no public enrollment courses currently match your criteria

Your name can be added to a wait list for an upcomming course, or we can schedule to run an On-Site course in your local area if you have 6 students or more. Complete the following form if you would like to recieve information concerning our wait list policy and/or On-Site training

Full Name:
Company:
Work Phone #:
Email:
Any questions we can answer?
(optional)
 

The best in the world come train with us





See what our students are saying

  • Mario Rodrguez

    U.S. ARMY

    "you have set the standard"

    "You have set the standard for instruction. Innovative and teaches you how to think through a problem with sound logic."


    Find out more
  • "...well worth the money"

    "It was fantastic! I learned more then i could have ever dreamed! even if I dont pass the exam the knowledge i got was well worth the money I spent!! and i had a good time leanring as well!"


    Find out more
  • "nice to have a dedicated training laptop provided"

    "I got a lot out of the real world scenarios presented in class. Jeremy is very knowledgeable in the field of penetration testing. Would definitely take classes again if he is the instructor. The course books are a great reference, and it was nice to have a dedicated training laptop provided by Infosec and not have to bring my own and waste time installing programs during class"


    Find out more
  • Rummy Dabgotra

    MTS Allstream

    "invaluable to my career"

    "Dan is an excellent instructor and incredibly knowledgeable. Great presenter and very helpful. The course was very intense but well structured. The hours were long but it really allows you to get your head wrapped around it. Slide notes were very good as well as the lab pre-info. The labs tied well into the course. The content and knowledge gained will be invaluable to my career."


    Find out more

Pricing

Call (866)-471-0059 or fill out this short form for current pricing

YOU GET

  • 5 Days of Expert Instruction from an instructor with real-world intrusion prevention experience with deep knowledge of intrusion prevention training strategies.
  • Guaranteed small class size (less than 10-16 Students), you get an intimate learning setting not offered at any of our competitors.
  • All meals, snacks and refreshments included.
  • Lecture, Lab Exercise and Text book
  • CD-ROM with every tool and custom script used in course.

Other Related Tools & Resources For Our Students

Be sure to check out our R&D site. We post tutorials, labs, white papers and articles to help you in your continued education. There are frequently forensics videos available. If you haven't taken a course with us yet, check out some of the types of thigns you'll be doing and learning about in class.

OUR STUDENTS SAY:
InfoSec Institute has an excellent instructor and this is the best IT security class I have ever taken. His knowledge and method of teaching are unsurpassed.