RE110
Information technology

Cybersecurity: Preventing and Detecting Intrusions

Deploy IDS/IPS and analyze attacks to secure systems


Digitization makes things easier, but it also opens up loopholes in the integrity of systems. Not anticipating them means putting the company's and its customers' data at risk... and therefore its credibility.

Objectives

To provide the knowledge and skills required to identify the various types of intrusions and attacks on TCP/IP networks as well as the mechanisms which can be used to detect them, and to choose among the available detection tools.

Is it for you ?

Network specialists (other than DBAs) .

Prerequisite

Knowledge of TCP/IP (Course RE102).

Your benefits

  • Identify threats and understand common network attack techniques
  • Deploy IDS/IPS systems and design their placement within network architecture
  • Use analysis and detection tools (Wireshark, Snort, Nessus, Kali)
  • Analyze traffic traces and detect anomalies, false positives, and false negatives
  • Develop incident response plans and manage security incidents effectively
  • Content

    • Uses of intrusion detection systems
    • Common security threats: examples and characteristics of certain attacks
    • Security problems with TCP/IP: fragmentation, ICMP, OS fingerprinting, DNS, denial of service, etc.
    • Principles of vulnerability identification, presentation of tools for detecting intrusions and analyzing vulnerability: commercial and free software, and examples of use (TCPdump, Wireshark, Snort 2.9.X, Kali, Nessus, DenyAll and Nikto)
    • Architecture of an intrusion detection system: IDS vs. IPS, physical and logical location in the network, system disturbance analysis and system abuse detection, alarms, logging, link with the security gateway (Firewall)
    • Errors to avoid, false positives and false negatives
    • Securing servers and workstations
    • Trace analysis
    • Autopsies (Forensic)
    • Managing security incidents: preparing an action plan for handling intrusions
    • Administering an intrusion detection system
    • Trace analysis case studies and exercises.

    💡 Useful information

    Our training sessions are offered in Montreal or Quebec City, in person or in virtual format. Dates and locations are provided when you select your session below. If you have any questions regarding registration, schedules, the language of instruction, or cancellation policies, please consult our FAQ .

    Duration
    2 days
    Schedule
    9h to 16h
    Regular fee
    $1,035
    Preferential fee A preferential rate is offered to public institutions, to members of certain professional organizations as well as to companies that do a certain amount of business with Technologia. To know more, please read the "Registration and rates" section on our FAQ page. Please note that preferential rates are not available for online training courses. Discounts cannot be combined with other offers.
    $930
    Private or personalized training

    Do you have several employees interested in the same training course? Whether in person at your offices or remotely in virtual mode, we offer private training courses tailored to your team's needs. Group rates are available. Contact us for more details or request a quote online.

    Request a quote

    Request in-company training

    Do you have several employees interested in the same training course? Whether in person at your offices or remotely in virtual mode, we offer private training courses tailored to your team's needs. Group rates are available. Contact us for more details or request a quote online.

    Tell us more
    Added to cart View my cart