Cisco IPS 6.0 Instructor Series: Overview

This course is included in our On-demand training solution.

Overview

This course is part of Skillsoft's Instructor Series, technical courses presented in spontaneous lecture-style by subject matter experts. This is 1 of 6 of the Implementing Cisco Intrusion Prevention Systems (IPS) 6.0 series. This course delivers the knowledge and skills needed to design, install, configure, and maintain a Cisco Intrusion Prevention System (IPS) sensor for small, medium, and enterprise networks, and also procedures for managing IPS alarms.

Target Audience

This course is a necessity for any student that desires to learn more about securing networks using the latest in Cisco technologies. This course is also recommended for any student interested in professional level Cisco certifications or beyond.

Prerequisites

The IPS course focuses on the technology required for securing complex networks. To fully benefit from this course, the student must be familiar with general networking concepts and have Cisco router operation and configuration experience. The student should also be familiar with the Windows Operating System. Successful completion of the course Securing Cisco Network Devices (or equivalent experience) is strongly recommended.

Expected Duration

91 min.

Course Objectives

Explaining Intrusion Prevention

Examining Cisco IPS Products

Examining Cisco IPS Sensor Software Solutions

Examining Evasive Techniques

  • – Explain what an evasive technique is and provide examples of evasive techniques – Explain how attackers use string match attacks to avoid detection by intrusion detection and intrusion prevention products – Explain how attackers use fragmentation attacks to avoid detection by intrusion detection and intrusion prevention products – Explain how attackers use session attacks to avoid detection by intrusion detection and intrusion prevention products – Explain how attackers use insertion attacks to avoid detection by intrusion detection and intrusion prevention products – Explain how attackers use evasion attacks to avoid detection by intrusion detection and intrusion prevention products – Explain how attackers use TTL-based attacks to avoid detection by intrusion detection and intrusion prevention products – Explain how attackers use encryption-based attacks to avoid detection by intrusion detection and intrusion prevention products
  • SUBSCRIPTION COST



     

    NEED HELP OR NOT SURE?