Explore real-world network intrusion detection scenarios through practical examples in this 34-minute video lecture. Delve into various types of intrusions, including P2P communications, viruses, and different scanning techniques such as TCP scans, ARP sweeps, OS scans, user account scans, and Tet scans. Learn how to identify and analyze suspicious network activities, interpret logging data, and understand the importance of monitoring for potential security threats. Gain valuable insights into the digital investigator's role in detecting and responding to network intrusions, enhancing your cybersecurity skills and knowledge.
Overview
Syllabus
Intro
Types of intrusions
P2P communications
Viruses
Logging In
Scanning
TCP Scans
ARP Sweep
OS Scan
User Account Scan
Tet Scan
Taught by
Bill Buchanan OBE