Duration 2 weeks
Weekly study 10 hours
Learn to monitor the network and detect intrusions
In this course you will learn how to secure endpoints (servers and hosts) on networks. You will examine rule manipulations in signature-based IDS (HIDS/NIDS).
What topics will you cover?
- Operating system security
- Access control
Who is the course for?
This course is designed for people familiar with basic computing who want to learn about the techniques and technologies of network security.
Please note that the individuals detailed in the “Who will you learn with?” section below, are current staff members and may be subject to change.