Intrusion Prevention Online Training

Learn how to automatically stops hackers, worms, and disgruntled employees before their attacks can be completed.

Course Overview

The latest technology in information security is Intrusion Prevention. Rather than relying on human intervention to respond to an attack, Intrusion Prevention Systems automatically stops hackers, worms, and disgruntled employees before their attacks can be completed. This all happens before they can cause damage, potentially saving your organization millions. In Intrusion Prevention you will learn how this groundbreaking IPS technology works, how to deploy it, and how to manage it efficiently and effectively.

As with any new automated technology, there are many perils to avoid when implementing it. Just as Intrusion Prevention Systems can prevent hackers and worms, they can easily be configured incorrectly which can block legitimate users from doing their jobs. The intrusion prevention training you receive in this system and network security course will enable you to deploy intrusion prevention systems safely.

Rest assured, we have made every effort to replicate the same training experience you would receive in our Instructor-Led Intrusion Prevention course. Many online or CBT training offerings are simply a recording of a talking head. InfoSec Institute’s Intrusion Prevention Online includes a shipment of software that is loaded onto your computer, which allows you to complete over 30 hours of hands-on lab exercises! Not only do you get high quality instruction from an expert instructor, with InfoSec Institute, you also perform hands-on lab exercises that allow for real knowledge transfer.

How You’ll Benefit:

  • Attend the same course as the Instructor-Led Intrusion Prevention in an online format.
  • Interact with over 47 online modules, taught by an expert instructor.
  • We ship you a number of Virtual Machines (VMs) pre-installed with hundreds of tools and scripts that you use to perform over 31 hands-on lab exercises. These are the same lab exercises as the instructor-led class.
  • Get practical skills planning, implementing, and maintaining the hottest information security technology, IPS.
  • Prevent hackers, worms, and disgruntled employees from destroying your organizations information assets, a skill that could be worth millions to your current or potential employer.
  • Learn in a multi-platform environment. Get intrusion prevention training on Windows, Linux, BSD and Solaris. No one else offers this breadth and depth.
  • More than interesting theories and lecture – get your hands dirty in hands-on labs.
  • Learn hands-on skills that are difficult to gain in a corporate or government working environment, such as deploying multiple intrusion prevention systems (IPS) and attacking them.

The Intrusion Prevention training offered by InfoSec Institute covers all areas of intrusion prevention. Host Intrusion Prevention and Network Intrusion Prevention are covered in great detail.

You will learn the technical details that make Intrusion Prevention Systems so effective. Much of technical learning is best done by doing, so you will experience a multitude of hands on lab exercises using popular technologies like Entercept, Okena, Inline Snort, Netscreen, Internet Security Security Systems, Top Layer. Additionally, you will learn how to enable Intrusion Prevention features built into operating systems such as OpenBSD, Solaris, Linux and even Tru64.

Required Prerequisites:

  • Understanding of the Windows Operating System
  • Grasp the Linux Operating System or other Unix-based OS
  • Understanding of the TCP/IP protocols
  • Exposure to network reconnaissance and associated tools (nmap, nessus, netcat)
  • Desire to learn about ethical hacking, and get great intrusion prevention training!

View Pricing

We will never share any of your information, spam you or annoy you with pushy sales pitches.


    • Understanding buffer overflows
    • Anatomy of an exploit
    • Network protocol based attacks
    • Intrusion Prevention vs. Intrusion Detection
    • Intrusion Prevention deployment strategies
    • The stack and heap data structures
    • The role the Kernel plays in attacks
    • Linux, Solaris and Windows Kernels
    • Unix system calls and the Windows API
    • Vulnerability development and discovery
    • Malicious worm internals
    • Host Intrusion Prevention
    • Syscall Interception
    • Non-executable stacks
    • Non-executable heaps
    • Page protection
    • Heuristic and behavioral blocking
    • Network Intrusion Prevention
    • Web application IPS
    • Layer 7 Intrusion Prevention
    • Packet scrubbing
    • Shunting and session sniping
    • Attack signature development
    • Mixed mode IPS
    • DDoS Prevention
    • Calculating ROI for Intrusion Prevention

    Hands-On Labs

      • Attacking RDP (Remote Desktop Protocol) in Windows XP, 2003 & Vista
      • Hack into an unprotected system
      • Utilize a buffer overflow
      • Implement a no-exec stack
      • Attack a no-exec stack
      • Implement an no-exec heap
      • Attack a no-exec heap
      • Syscall Redirection
      • Implement page protection in Linux
      • Page protection on Windows
      • Page protection on OpenBSD
      • Kernel hardening with PaX
      • Security Lockdown
      • Use a stack canary
      • Implement a Host Intrusion Prevention System
      • Attempt two previous attacks against the Host
      • Attempt two previous attacks against the Host Intrusion Prevention System
      • Deploy Network Intrusion Prevention
      • Capture an attack and write an IPS rule
      • Build in web server layer 7 IPS
      • Session sniping exercise
      • Data correlation and multiple firewall blocking
      • Shunting with routers

      Book your course

        What Our Students Are Saying

        Without any question, InfoSec has the most gifted individual instructors. Our instructor for this class was both an excellent educator and a premier/world class security expert. He was able to clearly explain and impart to the students, the most complicated security techniques I have ever heard of or imagined. I simply can not find the words to recommend him and Infosec security training more highly.

        John Hollan GE

        Advanced Ethical Hacking Training Boot Camp
        Ready to get started? Get instant pricing for this award-winning boot camp. View course pricing