WHATS NEW ON PENTEST MAGAZINE? 20% discount code: IT10PT - TopicsExpress



          

WHATS NEW ON PENTEST MAGAZINE? 20% discount code: IT10PT pentestmag/levels-page/ ONLINE COURSE: Journey In The World of The XSS - MODULE 3 - Introduction to XPS Attacks (Cross Protocol Scripting) - XPS Attack Vectors - Introduction to scapy - Network Packet manipulation with scapy - Detect the vulnerabilities that allow you to perform XPS attacks - XPS practical example: linksys 0day introduction - Test NEW WORKSHOP: The World of IDS systems (START: 8th December) 1) Introduction to intrusion detection systems (IDS). Common theory on network attacks Classifying attacks First generation of IDS - history of creating and capabilities Current generation IDS - capabilities and setup Test - Try to install Snort by yourself and make sure of detecting basic attacks 2) Signature-based IDS algorithms. Purpose of creating signature-based algorithms Understanding of detection process Signature-based algorithms benefits Signature-based algorithms restrictions Typical application for such algorithms Test - Try to write your own rule for detecting concrete signatures in network traffic in SnortIDS or SurricataIDS 3) Statistical anomaly-based IDS algorithms. Purpose of creating anomaly-based algorithms Understanding of detection process Anomaly-based algorithms benefits Anomaly-based algorithms restrictions Typical application for such algorithms Test - Try to setup and test anomaly detection preprocessor for Snort - PHAD 4) IDS with artificial intelligence anomaly detection. Purpose of creating AI-based algorithms Understanding of detection process AI-based algorithms benefits AI-based algorithms restrictions Typical application for such algorithms Methods of bypassing IDS with anomaly-based IDS 5) Typical methods of bypassing IDS. Methods of bypassing IDS with signature-based IDS Methods of bypassing IDS with anomaly-based IDS Methods of bypassing IDS with AI-based IDS Test - Try to bypass SnortIDS with one of methods described 6) Understanding SIEM-systems underlying principles and event correlation. Mission of SIEMs Understanding SIEM architecture Event correlation algorithms Benefits SIEM gives Restrictions and typical problems with SIEM systems Comparison of currently presented SIEMs on market Future of SIEM and IDS development Test - Try to install OSSIM (opensource SIEM) and setup it to collect events. Setup event correlation By the end of this workshop you will know how intrusion detection systems work.Learn the main principles of intrusion detection process, algorithms used in IDS. Also this workshop provides detailed description of several methods used by hackers to bypass IDS. 20% discount code: IT10PT pentestmag/levels-page/
Posted on: Thu, 04 Dec 2014 11:37:34 +0000

Trending Topics



Recently Viewed Topics




© 2015